CISO NY 2025
Presentations
Day 1
Paul Pak
Chief Information Security Officer & Privacy Officer, JENNISON ASSOCIATES
Omer Itzhak, VP of Product, CYTACTIC
Tim Brown, Chief Information Security Officer, SOLARWINDS
Stacey Cameron, Chief Information Security Officer, HALCYON
TBC PDF Presentation
Track A: CISO PROGRAM
• Emerging Threats: The impact of AI, evolving supply chain risks, and post-quantum security challenges.
• Future-Ready Security: How organizations can redefine their approach to compliance, automation, and proactive defense.
Understanding Agentic AI: What distinguishes agentic AI from traditional AI systems, and why does this matter for security?
Security Risks and Threats: Exploring the unique vulnerabilities of agentic AI, including prompt injection and data poisoning.
Governance and Compliance: Strategies for aligning agentic AI deployment with regulatory frameworks like the EU AI Act and implementing effective oversight mechanisms.
TBC PDF Presentation
• Applying controls to safeguard personal data in the cloud
• Mapping compliance requirements to cloud service configurations
Model, from A to Z.
TBC PDF Presentation
heart.
• Build psychological safety and team resilience by leading with authenticity in high-stakes, high-velocity security environments
• Protect your leadership energy through boundary setting and intentional self-care to avoid burnout in 24/7 incident response roles
• Leverage empathy and cultural awareness as strategic tools for improving stakeholder alignment, zero-trust adoption, and security-first culture
Track B: DEVSECOPS & CLOUD PROGRAM
essential to limit potential missteps. This session will explore these topics to help avoid pitfalls and enable a smoother zero trust adoption.
TBC PDF Presentation
• How to stay ahead of the curve while it is still being defined
• What is the glue that binds Security Programs to the business?
• How to avoid becoming Noise to the business
• Real-World Applications: Examples of successful MDM implementations enhancing security in diverse industries
• AI-Powered Threats: The New Attack Landscape
• How cybercriminals are leveraging AI for advanced phishing, deepfakes, and automated attacks
• AI for Defense: Strengthening Your Security Posture
• How AI and machine learning can enhance threat detection, response, and automation