We look forward to seeing you at an upcoming in-person gathering
Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.
June 21, 2023 | Pier Sixty
June 21, 2023
Pier Sixty
Get together with New York's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Evolving Sourcing & Development Tactics to Build a Sustainable Talent Pipeline
Enhancing visibility, reducing response time, and understanding insights to protect against threats
Strengthening traditional IAM approaches to keep up with the pace of digital acceleration
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.
Michael Cena
A+E Networks
Vice President, Head of Cyber Security
Zouhair Guelzim
L'Oreal Americas
VP, Chief Information Security Officer
Brian Lozada
Amazon Prime Video & Studios
Chief Information Security Officer
Tomas Maldonado
National Football League
Chief Information Security Officer
Tod Mitchinson
New York Life
VP, Chief Information Security Officer
Michael Palmer
Hearst
Chief Information Security Officer
Kylie Watson
Sumitomo Mitsui Banking Corporation
CISO
Teresa Zielinski
General Electric
Chief Information and Product Security Officer
7:45am - 8:30am Registration & Breakfast
8:30am - 9:15am Keynote
Hosted by Illumio
John Coyle
CEO and Founder of "Speaking Design Thinking"
Guest Speaker
John K. Coyle is the founder and CEO of "Art of Really Living" and one of the world's leading experts in innovation and design thinking. Through the metaphor of sport, learn how individuals and teams can use innovation approaches to identify and leverage their unique strengths (and design around weaknesses). Become empowered to solve old problems in new ways and achieve breakthrough results. Understand how to apply the “Design Thinking” process to business and personal challenges.
This will empower you to:
9:15am - 9:40am Networking Break
9:40am - 10:25am Breakout Session
Hosted by Island
Scott Montgomery
VP, Strategic Accounts
Island.Io
One of the most widely deployed applications in the Enterprise has also become one of the most strategic – yet it was an application that was never built or designed for the Enterprise? The browser has changed the way we work in the modern era, however it is unapologetically based on consumer needs and preferences. What if the browser was designed for the enterprise? What could that do for security, productivity and work itself? Join us to see how this technology is transforming the way companies do business.
In this session, we will share details on:
9:40am - 10:25am Breakout Session
Hosted by Red Canary
Harry Halikias
Director, Cyber Security
New York Public Library
For some, responding to a ransomware scenario should be easy. "Just restore the backups." Still, boardrooms, executive suites, business owners, security professionals and policymakers continue struggling to understand the nuances and complexities of this persisting issue. Don't get too comfortable.
Join this interactive, practical, and fresh discussion to:
9:40am - 10:25am Executive Boardroom
Hosted by Qualys
Reshma Budhwani
VP, Chief Technology Security Officer
New York Life
Tony Chryseliou
Global Information Security Executive
Sony Corporation of America
Corey Smith
Senior Director of Solution Architecture
Qualys
Shift Left? Shift Right? CSPM/CWPP/CNAPP, CDR… the list of cloud security acronyms and slogans can be terrifyingly long. Terms are often used interchangeably depending upon the prism of the vendor you speak with. At the end of the day, it’s crucial as a security leader to have a clear thought-process on what tools your organization uses, so you aren’t fighting with one arm tied behind your back.
Join this executive boardroom to discuss:
9:40am - 10:25am Executive Boardroom
Hosted by Rapid7
Jason Mical
Field Chief Technology Officer - Americas
Rapid7
Bob Brown
CISO
Federal Home Loan Bank of New York
Doug Greene
VP, Chief Information Security Officer
Guardian Life Insurance
Tod Mitchinson
VP, Chief Information Security Officer
New York Life
In today’s threat landscape, security teams are frequently forced into reactive positions, lowering security program efficacy and sustainability. Strong foundational security program components, including vulnerability and asset management processes, are essential to building resilience in a persistently elevated threat climate.
Join this interactive boardroom to discuss:
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to a small number of attendees (seating priority is given to CISOs).
To reserve your seat, please contact:
NAME at PHONE or EMAIL
9:40am - 10:25am Executive Boardroom
Hosted by CyberArk
Clarence Hinton
Chief Strategy Officer
CYBERARK
Michael Cena
Vice President, Head of Cyber Security
A+E Networks
Naresh Podila
Chief Information Security Officer
Danaher UK
The number of human and machine identities seeking access to data and critical business systems has grown exponentially, in turn increasing the threat landscape and challenging traditional IAM paradigms. How do security leaders keep a pulse on tools and capabilities to assess their organization’s cybersecurity posture?
Join this boardroom to discuss:
9:40am - 10:25am Executive Boardroom
Hosted by Cisco Secure
Wolfgang Goerlich
Advisory CISO
Cisco Secure
Aaron Katz
CISO, Genesis
Digital Currency Group
Ian Rathie
Managing Director, Chief Information Security Officer
Fitch Ratings
Cybersecurity and technology leaders are being constantly challenged to up-level their own technology and strategies to keep the business safe and these days they're doing it all while working with tighter budgets or fewer resources. These restrictions may find security leaders asking what to prioritize, how much time and energy can be spent on each project and where to start. But what actually works in cybersecurity?
Join this boardroom to discuss:
10:25am - 11:00am Networking Break
10:30am - 10:55am Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
Parking Information
Self-parking is located right inside the Chelsea Piers complex as you enter the venue. Self-parking is based on availability and posted hourly parking rates apply. Drivers pay as they exit the complex. Chelsea Piers Parking Rates can be found here.
For inquiries related to this community, please reach out to your dedicated contact.