CISO NY 2025
Presentations
Day 1
Paul Pak
Chief Information Security Officer & Privacy Officer, JENNISON ASSOCIATES
TBC PDF Presentation
Omer Itzhak, VP of Product, CYTACTIC
Tim Brown, Chief Information Security Officer, SOLARWINDS
Stacey Cameron, Chief Information Security Officer, HALCYON
TBC PDF Presentation
Track A: CISO PROGRAM
• Emerging Threats: The impact of AI, evolving supply chain risks, and post-quantum security challenges.
• Future-Ready Security: How organizations can redefine their approach to compliance, automation, and proactive defense.
Understanding Agentic AI: What distinguishes agentic AI from traditional AI systems, and why does this matter for security?
Security Risks and Threats: Exploring the unique vulnerabilities of agentic AI, including prompt injection and data poisoning.
Governance and Compliance: Strategies for aligning agentic AI deployment with regulatory frameworks like the EU AI Act and implementing effective oversight mechanisms.
TBC PDF Presentation
• Applying controls to safeguard personal data in the cloud
• Mapping compliance requirements to cloud service configurations
Model, from A to Z.
TBC PDF Presentation
heart.
• Build psychological safety and team resilience by leading with authenticity in high-stakes, high-velocity security environments
• Protect your leadership energy through boundary setting and intentional self-care to avoid burnout in 24/7 incident response roles
• Leverage empathy and cultural awareness as strategic tools for improving stakeholder alignment, zero-trust adoption, and security-first culture
• Building trust across the board, executive team, and technical ranks
• Evolving the security function from reactive to resilient
TBC PDF Presentation
Track B: DEVSECOPS & CLOUD PROGRAM
essential to limit potential missteps. This session will explore these topics to help avoid pitfalls and enable a smoother zero trust adoption.
TBC PDF Presentation
• How to stay ahead of the curve while it is still being defined
• What is the glue that binds Security Programs to the business?
• How to avoid becoming Noise to the business
TBC PDF Presentation
• Real-World Applications: Examples of successful MDM implementations enhancing security in diverse industries
• AI-Powered Threats: The New Attack Landscape
• How cybercriminals are leveraging AI for advanced phishing, deepfakes, and automated attacks
• AI for Defense: Strengthening Your Security Posture
• How AI and machine learning can enhance threat detection, response, and automation