<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

    Not Found

  • 08:00AM

    Registration & Coffee in the Exhibition Area

  • 8:50AM
    dan haagman-1

    Chair’s Opening Remarks & Speed Networking

    Arrow
  • 9:00AM
    Panel Discussion-1

    PANEL DISCUSSION: Aligning Cybersecurity Governance with Business Objectives

    Arrow

    •    Establishing effective cybersecurity and AI governance, including frameworks, policies, procedures, training, and incidents response plans
    •    Monitoring and implementing legal and compliance requirements based on evolving laws and best practices 
    •    Managing and mitigating cybersecurity incident, cross-border transfer, and geopolitical risks
    •    Translating business priorities into actionable cybersecurity strategies.
    •    Ensuring executive buy-in and effective communication with the board.


    Aaron Katz, Chief Information Security Officer, THE TWC GROUP
    Corey Dennis, Chief Privacy Officer & Assistant General Counsel, LEGEND BIOTECH
    Alan Halfenger, Chief Compliance Officer, ARCTARIS IMPACT INVESTORS
    Emily Milan, Chief Information Security Officer, LEGEND BIOTECH

    Moderator: Prof. Dan Haagman, CEO Chaleit, Honorary Professor of Practice, CISO, CHALEIT



  • 9:40AM

    Brand & Executive Impersonation – The Use of AI by Threat Actors.

    Arrow

    Paul Pak, Chief Information Security Officer & Privacy Officer, JENNISON ASSOCIATES  

  • 10:00AM

    Cyber Crisis Simulation - Incident Response Management in Action Led by Cytactic

    Arrow

    Omer Itzhak, VP of Product, CYTACTIC
    Tim Brown, Chief Information Security Officer,  SOLARWINDS 
    Stacey Cameron, Chief Information Security Officer, HALCYON


     

  • 10:30AM

    Networking Break in the Exhibition Area

  • CISO PROGRAM

  • 11:00AM

    Spotlight Session - Axonius & Cribl

    Arrow
    Jordan Farkas, Principal Sales Engineer, AXONIUS
    Senior Representative, CRIBL
  • 11:10AM

    The Future of Risk Management – Adapting to a New Era of Threats

    Arrow

    •    Bridging the Gap: Why today’s risk management strategies fall short and how to align security with business transformation.
    •    Emerging Threats: The impact of AI, evolving supply chain risks, and post-quantum security challenges.
    •    Future-Ready Security: How organizations can redefine their approach to compliance, automation, and proactive defense.
    Aaron Katz, Chief Information Security Officer, THE TWC GROUP

  • 11:30AM

    From Compliance to Control: Real-Time Detection and Response Across the Supply Chain

    Arrow

    1. Supply Chain Attacks Are Accelerating Faster Than Defenses: Cybercrime is growing exponentially, with attackers increasingly targeting third parties. Supply chain breaches are up 200% year-over-year, highlighting how vulnerable organizations are through their vendor ecosystems.

    2. Traditional TPRM Approaches Are Outdated and Reactive: Point-in-time assessments, manual questionnaires, and slow remediation workflows leave companies exposed. Most third-party risk programs lack real-time visibility, making it impossible to detect or respond quickly to emerging threats.

    3. TPRM Must Shift from Compliance-Driven to Security-Driven: Organizations spend heavily on GRC, yet most of that effort is reactive and administrative. To keep pace with dynamic threats, security teams need to adopt continuous monitoring, automation, and proactive incident response practices.

    4. Supply Chain Security Should Operate Like a SOC Function: The future of third-party risk lies in SOC-aligned operations — combining threat intelligence, early warning systems, and rapid response. Just like with internal environments, companies must extend cybersecurity discipline to the full vendor landscape.


    Steve Cobb, Chief Information Security Officer, SECURITYSCORECARD

  • 11:50AM

    PANEL DISCUSSION: AI and Machine Learning in Cybersecurity

    Arrow

    •    Exploring how AI and machine learning can enhance the efficiency of security teams by automating repetitive tasks and focusing human efforts on complex threats
    •    How AI tools can assist in containing and mitigating threats in real-time by analyzing vast amounts of data quickly
    •    Using machine learning to identify anomalies in user behavior and detect insider threats or compromised accounts
    •    Leveraging machine learning to create dynamic security systems that evolve with new threat patterns and emerging attack vectors
    •    Discussing the emerging arms race between AI-powered cybersecurity defenses and AI-driven attack methods
    Ejona Zeneli, Information Security Officer, UNION BANK ALBANIA
    Samrah Kazmi, Expert Chief Information Security Officer, PRIMARY VENTURE PARTNERS
    River Nygryn, Chief Information Security Officer, HAMMOND CARE
    Paul Pak, Chief Information Security Officer & Privacy Officer, JENNISON ASSOCIATES  
    Alaa Moussawi, Chief Data Scientist, NEW YORK CITY COUNCIL
    Moderator: 
    Nathan Smolenski, Chief Information Security Officer, CYERA

  • 12:20PM

    Navigating U.S. Privacy Laws in the Cloud

    Arrow

    •    Understanding CCPA, state-level privacy regulations, and their impact
    •    Applying controls to safeguard personal data in the cloud
    •    Mapping compliance requirements to cloud service configurations
    Corey Dennis, Chief Privacy Officer & Assistant General Counsel, LEGEND BIOTECH

  • 12:40PM

    Risk, Resilience & Reinvention: A CISO’s Role in Shaping the Future Enterprise

    Arrow

    •    Why CISOs must evolve from gatekeepers to strategic enablers of innovation
    •    How to operationalize digital trust, not just talk about it
    •    Lessons from the intersection of risk, ethics, and emerging tech (including AI, quantum, and sustainability)
    Samrah Kazmi, Chief Information Security Officer, PRIMARY VENTURE PARTNERS

  • DEVSECOPS & CLOUD PROGRAM

  • 11:00AM

    Spotlight Session - The Path to Zero Trust

    Arrow

    The adoption of the cloud and shift to mobile and remote work drives the ever increasing necessity to shift to zero trust. Understanding what zero trust is, why it is crucial, and how to think about it is essential to limit potential missteps. This session will explore these topics to help avoid pitfalls and enable a smoother zero trust adoption.
    Brandon Leiker, Principal Solutions Architect, 11:11 SYSTEMS 

  • 11:10AM

    CLOUD FOCUS: Resilience in the Cloud

    Arrow

    Cyber-attacks continue to escalate in both frequency and sophistication, creating unprecedented challenges. Malicious actors are focused on inflicting maximum damage to those that fall victim. In a world where it is “not if, but when”, the ability to effectively manage risk using a holistic approach to achieve resilience in the cloud is crucial. This session will explore essential framework aligned functions and outcomes, including how zero trust enables achievement of those outcomes. 

    Brandon Leiker, Principal Solutions Architect, 11:11 SYSTEMS 

  • 11:30AM

    DEVSECOPS FOCUS: FIRESIDE CHAT: Breaking Down Silos: Uniting Risk, Trust & Safety, and Security in the Age of AI

    Arrow

    Fraud, identity abuse, misinformation, platform exploitation, and emerging AI-driven threats no longer fit neatly into one team’s charter. Risk, Trust & Safety, and InfoSec leaders are increasingly facing the same adversaries, just from different angles. In this fireside chat, experts will explore why collaboration across these functions is no longer optional, but essential.

    Reema Moussa, Associate Attorney, GOODWIN
    Alexandra van Nievelt, Senior Manager, Global Marketplace Risk, WALMART 

  • 11:50AM

    DEVSECOPS FOCUS: PANEL DISCUSSION: AI in DevSecOps: Hype vs. Reality

    Arrow

    •    Where AI is truly making an impact in security automation.
    •    The risks of blindly trusting AI-driven security tools.
    •    Balancing human expertise and AI-driven decision-making.

    Varun Duggal Principal R&D Solutions Architect, AT&T LABS
    Robert LaRosa, Information Security Engineer, GELLER
    Alexandra van Nievelt, Senior Manager, Global Marketplace Risk, WALMART


     

  • 12:20PM

    CLOUD FOCUS: Detection Engineering and SecOps Automation in Azure: Leveraging Sentinel, Logic Apps, Workbooks, and Azure Functions

    Arrow

    A technical demonstration of how SecOps and DevOps teams can use a powerful mix of Azure technologies to monitor their cloud environment and automate remediation actions for suspicious activity
    Felipe G, Cyber Security Engineer, HELABA

  • 12:40PM

    DEVSECOPS FOCUS: Securing the Trade: DevSecOps in High-Frequency Trading Environments

    Arrow

    •    Balancing Speed and Security – How to integrate security into ultra-low-latency trading systems without impacting performance.
    •    Automating Threat Detection & Incident Response – Leveraging AI, real-time monitoring, and DevSecOps pipelines to detect and mitigate threats instantly.
    •    Protecting Market Data & FIX Protocol Communications – Best practices for securing trade execution, preventing data leaks, and ensuring regulatory compliance.
    Carl Gordon, DevOps Engineer/Trade Support/Automation, CREDIT SUISSE

  • 1:00PM

    Lunch & Networking Break in the Exhibition Area

  • CISO PROGRAM

  • 2:00PM

    PANEL DISCUSSION: Leadership in Cybersecurity: Driving Organizational Change

    Arrow

    •    Aligning Cybersecurity with Business Objectives: Exploring how leaders can integrate cybersecurity into the organization’s strategic goals to ensure it is viewed as a growth enabler, not just a cost center
    •    The Evolving Role of the CISO: Exploring how CISOs can move from technical specialists to strategic advisors who drive board-level decisions
    •    How CISOs can lead the adoption of autonomous AI tools while embedding security and governance from day one — avoiding "shadow agents" that operate outside oversight
    •    Leadership in Zero Trust Environments: How leaders can champion the adoption of Zero Trust models to strengthen organizational security
    •    How leaders can future-proof their organizations by adopting advanced encryption techniques such as homomorphic encryption to protect sensitive data

    Craig Shrader, Chief Information Security Officer & Country Cyber Security Lead – Canada, HSBC
    Alan Halfenger, Chief Compliance Officer, ARCTARIS IMPACT INVESTORS
    Moderator: 
    Prof. Dan Haagman, CEO Chaleit, Honorary Professor of Practice, CISO, CHALEIT

  • 2:30PM

    RAG Models for More Secure Guard Rails: From Theory to Application

    Arrow

    This talk will cover the fundamentals of AI in an intuitive manner, while diving into the math of basic concepts such as vector embeddings.
    This talk aims to explain why hallucinations occur, and how we can better avoid them.
    This talk covers how to deploy your very own personalized RAG Model, from A to Z.
    Alaa Moussawi, Chief Data Scientist, NEW YORK CITY COUNCIL

  • 2:50PM

    Leading With Empathy & Grace – Secrets to Developing High Performing Teams

    Arrow

    In a world where leadership is often measured by metrics, margins, and milestones, Leading with Empathy & Grace offers a timely and transformative perspective. Tammy Klotz—a seasoned cybersecurity executive—delivers a deeply personal and practical blueprint for leading with humanity, humility, and heart.
    •    Build psychological safety and team resilience by leading with authenticity in high-stakes, high-velocity security environments
    •    Protect your leadership energy through boundary-setting and intentional self-care to avoid burnout in 24/7 incident response roles
    •    Leverage empathy and cultural awareness as strategic tools for improving stakeholder alignment, zero-trust adoption, and security-first culture
    Tammy Klotz, Chief Information Security Officer, TRINSEO

  • 3:10PM

    The CISO’s Dilemma: Leading Through Chaos, Building for Resilience

    Arrow

    •    Navigating the dual role of risk manager and business enabler
    •    Building trust across the board, executive team, and technical ranks
    •    Evolving the security function from reactive to resilient
    Prof. Dan Haagman, CEO Chaleit, Honorary Professor of Practice, CISO, CHALEIT
    Tony Gonzalez,  Chief Information Security Officer, North America, (former) QBE  

  • DEVSECOPS & CLOUD PROGRAM

  • 2:00PM

    CLOUD FOCUS: PANEL DISCUSSION: The Future of Cloud Security: Balancing Innovation, Compliance, and Resilience

    Arrow

    •    How can organizations innovate rapidly in the cloud without compromising security or regulatory compliance?
    •    How can businesses design cloud infrastructures to withstand disruptions, ransomware attacks, and evolving threat landscapes?
    •    What are the best practices for fostering cross-team collaboration and ensuring everyone is invested in secure outcomes?
    •    How will emerging technologies like AI-driven security analytics, post-quantum cryptography, and zero trust frameworks shape the next generation of cloud security?
    Bijit Ghosh, Chief Technology Officer, Global Head of Cloud Product & Engineering & AI/ML, DEUTSCHE BANK
    Sean Greenberg, Senior Cloud Security Engineer, Practice Lead Cloud Security, CERBERUS CAPITAL MANAGEMENT
    Robert LaRosa, Information Security Engineer, GELLER


    Moderator: Pieter Vanlperen, Adjunct Professor – Code Security, Kill Chain, Cloud Application Security, Threat Intel, NEW YORK UNIVERSITY

  • 2:30PM

    DEVSECOPS FOCUS: The Rhythm of Security

    Arrow

    •    The dot com era was punk rock, Cybersecurity is Heavy Metal
    •    How to stay ahead of the curve while it is still being defined
    •    What is the glue that binds Security Programs to the Business?
    •    How to avoid becoming Noise to the business
    Robert LaRosa, Information Security Engineer, GELLER

  • 2:50PM

    CLOUD FOCUS: Enhancing Cloud Security with Mobile Device Management

    Arrow

    •    Unified Security Posture: Strategies for integrating MDM with cloud security protocols to protect enterprise data.
    •    Real-World Applications: Examples of successful MDM implementations enhancing security in diverse industries.
    Sean Greenberg, Senior Cloud Security Engineer, Practice Lead Cloud Security, CERBERUS CAPITAL MANAGEMENT

  • 3:10PM

    HYBRID FOCUS: Integrating AI and Cloud Security: Strategies for Effective DevSecOps Transformation

    Arrow

    •    Leveraging AI for DevSecOps Automation
    •    Architecting Secure Multi-Cloud Environments
    •    Driving Digital Transformation with DevSecOps
    Varun Duggal Principal R&D Solutions Architect, AT&T LABS

  • 3:30PM

    Networking Break in the Exhibition Area

  • 4:00PM
    Panel Discussion-1

    PANEL DISCUSSION: My Story – The Journey of the Chief Information Security Officer (CISO)

    Arrow

    In this session, hear from some of the top cybersecurity leaders as they share their personal journeys to becoming a Chief Information Security Officer (CISO). Learn about the challenges they faced, the key decisions that shaped their careers, and the skills that helped them succeed in an ever-evolving security landscape. This discussion will offer insights into leadership, risk management, and the future of the CISO role in a rapidly digitizing world.
    Tammy Klotz, Chief Information Security Officer, TRINSEO
    Aaron Katz, Chief Information Security Officer, THE TWC GROUP
    River Nygryn, Chief Information Security Officer, HAMMOND CARE

    Moderator: Prof. Dan Haagman, CEO Chaleit, Honorary Professor of Practice, CISO, CHALEIT

     

  • 4:40PM

    Is Your Cybersecurity Program Ready for AI?

    Arrow

    •    AI-Powered Threats: The New Attack Landscape
    •    How cybercriminals are leveraging AI for advanced phishing, deepfakes, and automated attacks
    •    AI for Defense: Strengthening Your Security Posture
    •    How AI and machine learning can enhance threat detection, response, and automation
    River Nygryn,  Chief Information Security Officer, HAMMOND CARE

  • 5:00PM

    Chair's Closing Remarks

  • 5:05PM

    End of Conference & Networking Drinks