<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

CISO NY  2025 
Presentations

Day 1


Paul Pak

Chief Information Security Officer & Privacy Officer, JENNISON ASSOCIATES 

TBC PDF Presentation

 

            

 


Omer Itzhak, VP of Product, CYTACTIC

Tim Brown, Chief Information Security Officer, SOLARWINDS

Stacey Cameron, Chief Information Security Officer, HALCYON

TBC PDF Presentation

 

            

 


Track A: CISO PROGRAM



• Bridging the Gap: Why today’s risk management strategies fall short and how to align security with business transformation.
• Emerging Threats: The impact of AI, evolving supply chain risks, and post-quantum security challenges.
• Future-Ready Security: How organizations can redefine their approach to compliance, automation, and proactive defense.

Download PDF Presentation

 

            

 


Understanding Agentic AI: What distinguishes agentic AI from traditional AI systems, and why does this matter for security?

Security Risks and Threats: Exploring the unique vulnerabilities of agentic AI, including prompt injection and data poisoning.

Governance and Compliance: Strategies for aligning agentic AI deployment with regulatory frameworks like the EU AI Act and implementing effective oversight mechanisms.

TBC PDF Presentation

 

            

 


• Understanding CCPA, state-level privacy regulations, and their impact
• Applying controls to safeguard personal data in the cloud
• Mapping compliance requirements to cloud service configurations

Download PDF Presentation

            

 


• Why CISOs must evolve from gatekeepers to strategic enablers of innovation
• How to operationalize digital trust, not just talk about it
• Lessons from the intersection of risk, ethics, and emerging tech (including AI, quantum, and sustainability)

TBC PDF Presentation

 

            

 



This talk will cover the fundamentals of AI in an intuitive manner, while diving into the math of basic concepts such as vector embeddings. This talk aims to explain why hallucinations occur, and how we can better avoid them. This talk covers how to deploy your very own personalized RAG 
Model, from A to Z. 

TBC PDF Presentation

            

 


In a world where leadership is often measured by metrics, margins, and milestones, Leading with Empathy & Grace offers a timely and transformative perspective. Tammy Klotz—a seasoned cybersecurity executive—delivers a deeply personal and practical blueprint for leading with humanity, humility, and 
heart.
• Build psychological safety and team resilience by leading with authenticity in high-stakes, high-velocity security environments
• Protect your leadership energy through boundary setting and intentional self-care to avoid burnout in 24/7 incident response roles
• Leverage empathy and cultural awareness as strategic tools for improving stakeholder alignment, zero-trust adoption, and security-first culture

Download PDF Presentation 

 

            

 


• Navigating the dual role of risk manager and business enabler
• Building trust across the board, executive team, and technical ranks
• Evolving the security function from reactive to resilient 

TBC PDF Presentation


 

            

 


Track B: DEVSECOPS & CLOUD PROGRAM


The adoption of the cloud and shift to mobile and remote work drives the ever increasing necessity to shift to zero trust. Understanding what zero trust is, why it is crucial, and how to think about it is 
essential to limit potential missteps. This session will explore these topics to help avoid pitfalls and enable a smoother zero trust adoption.

TBC PDF Presentation


 

            

 


A technical demonstration of how SecOps and DevOps teams can use a powerful mix of Azure technologies to monitor their cloud environment and automate remediation actions for suspicious 
activity.

Download PDF Presentation 

            

 


• The dot com era was punk rock, Cybersecurity is Heavy Metal
• How to stay ahead of the curve while it is still being defined
• What is the glue that binds Security Programs to the business?
• How to avoid becoming Noise to the business

TBC PDF Presentation

            

 


• Unified Security Posture: Strategies for integrating MDM with cloud security protocols to protect enterprise data.
• Real-World Applications: Examples of successful MDM implementations enhancing security in diverse industries


• Leveraging AI for DevSecOps Automation
• Architecting Secure Multi-Cloud Environments
• Driving Digital Transformation with DevSecOps 

TBC PDF Presentation


• AI-Powered Threats: The New Attack Landscape

• How cybercriminals are leveraging AI for advanced phishing, deepfakes, and automated attacks

• AI for Defense: Strengthening Your Security Posture

•  How AI and machine learning can enhance threat detection, response, and automation

TBC PDF Presentation