We look forward to seeing you at an upcoming in-person gathering
Gartner cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.
June 25, 2025 | Pier Sixty
June 25, 2025
Pier Sixty
Get together with New York's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Strengthening cybersecurity's influence as a key factor in business decisions
Driving innovative ideas into a leadership vision that fosters cyber resilience and personal growth
Establishing trust and understanding amid complex compliance changes and data ecosystems
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Reshma Budhwani
New York Life
VP, Chief Technology Security Officer
Tomas Maldonado
National Football League
Chief Information Security Officer
Tod Mitchinson
New York Life
VP, Chief Information Security Officer
Lauren Rosenblatt
Public Service Enterprise Group Inc
VP, Chief Information Security Officer
READ MORE
David Sheidlower
Turner Construction
Chief Information Security Officer and Privacy Officer
Kylie Watson
Sumitomo Mitsui Banking Corporation
CISO
Teresa Zielinski
GE Vernova
VP, Global CISO
The Performance Paradox — Mental Health and High Productivity
Today's relentless pursuit of success can lead to profound dissatisfaction and dramatically affect mental health. Accomplishments lack satisfaction, work is ceaseless, sleep and self-care are sacrificed. Recognizing this, leaders can play a pivotal role in breaking this cycle and nurturing a healthier and more fulfilled life for themselves and their teams.
Join this keynote from a mental health educator and former lawyer to learn:
Securing Data Flow in the AI-Quantum Era
Sensitive data movement can be risky but restricting it outright can create operational and security challenges. In an era of agentic AI, generative AI, and emerging quantum computing, organizations need security frameworks that protect data while ensuring agility. This session explores how modern security platforms enable secure data flow, adapt to diverse use cases and prepare for the post-quantum encryption (PQE) shift.
Join this keynote to learn:
The Convergence of Physical and Cyber Securities – A Modern Playbook
No matter the industry, CISOs are paying closer attention at the connections between cyber and physical securities. Threat detection in the cyber space is one thing but using that information to enhance security or even stop crimes in the physical world — is next level. Being able to quickly mobilize after finding risks could prevent damages or loss to an organization — or maybe even save lives.
Join this session to explore:
A CISO’s Next Move
For many tenured CISOs, their careers started at a time when many companies didn’t even have a CISO. While the world has changed, now might be the time for you to also make a change. Is your next career move becoming a CISO at a larger (or start-up) organization, a board member, a CIO, a professor or maybe something totally unexpected? Let’s explore career options with panelists who have done it themselves.
Join this session to ask panelists:
Beyond the Headlines – Stories of Cyber Resiliency
Fostering true cyber resiliency requires balancing preparation across the organization with what actually unfolds during a major event. Hear the behind-the-scenes stories of events highlighted in the news from the CISOs who led their teams through them. Because we all know, it’s not if it’s going to happen… but when.
Come with your questions to join this dynamic session focused on:
Security Hot Topics Workshop— Pulse Check Your Priorities
Security continues to find its way into the boardroom and even into headlines. CISOs are feeling the heat to foster and explain strategic value, opportunities, and implications of key priorities and new innovations. In this workshop, you'll have the chance to pick topics that most interest you and have a dynamic dialogue about them with your peers.
Join this interactive session to:
Table Themes Include: Quantum Computing; AI vs. Talent; Personal Liability; Leading Through M&A; Next-Gen Technology; Passwordless Authentication; Building Your Brand; Life After CISO/Board Membership; Succession Planning
Taming Third Party Risk with Advanced Technologies
Cyber threats are increasingly sophisticated and pervasive, making conventional TPRM approaches like questionnaires inadequate. AI/ML and threat intelligence have the potential to transform TPRM, as well as extending into 4th, 5th parties and beyond. Leveraging key insights can help CISOs stay ahead of evolving risks and enhance security programs, even with limited resources.
Join this session to discuss:
Identity Security in the Agentic AI Era
The rise of Agentic AI is increasing risks and complexities for Non-Human Identities (NHIs) in cloud environments. AI agents need extensive NHI access, posing new challenges in identity governance and security.
Join this roundtable to discuss:
True Defense Against API & Application Incidents
Cybersecurity measures are adept at detecting and responding to incidents across various layers, but the application layer often remains vulnerable. Many organizations have a massive vulnerability backlog that demands timely and effective defense.
Join us to explore:
Reducing Application Delivery Tech Debt from the Inside Out
With high volumes of sensitive data now flowing through web browsers, three in five organizations say data leakage is likely given current IT and security infrastructures. Stop playing catch-up. Discover new approaches to enterprise operations to reduce risk while simplifying operations.
Join this roundtable to discover:
Streamlining Compliance for Operational Excellence
Navigating today’s complex regulatory environment is a challenge for even the most resourceful enterprises. From PCI DSS to DORA and HIPAA, businesses must adopt smarter strategies to meet evolving compliance requirements while maintaining operational efficiency.
Join this session to:
Beyond Visibility — Proactive SaaS Security in a Shifting Landscape
SaaS adoption has skyrocketed but so have the risks — from shadow SaaS to evolving identity threats. Static security measures won’t cut it. Organizations need a flexible, real-time approach to securing SaaS environments while maintaining agility.
Join this discussion to dive into:
Protecting Innovation — Rethinking Data Security Strategies
AI makes creating and consuming data easier than ever, with shadow AI and dark data presenting new challenges to security teams. As the tactics for protecting data evolve, security leaders must adopt a risk-based strategy to protect mission-critical data and safeguard innovation.
Join this session to discover:
Escaping Security Dogma – Redefining Human Risk Management
Security awareness programs have long been driven by dogma rather than data, often leading to ineffective and misaligned outcomes. With industry shifts and emerging trends, the modern CISO must adopt a smarter, data-driven approach to managing human cyber risk. Security leaders are moving beyond traditional training and using metrics that matter to prove the real impact of their efforts.
Join your peers to discuss:
Be Ready! Preparing Your People for a Cyber Crisis
Security leaders face unprecedented challenges as evolving threats, including those posed by generative AI, rapidly increase enterprise risk. While new technologies offer defenses, they also introduce vulnerabilities. A cyber-ready workforce is crucial for organizational resilience, but how do you equip your organization to face the future of threats with confidence?
Join this interactive boardroom to discuss:
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
Governing Body Reception
Finish the day sharing lessons learned with your peers over light fare and drinks at this closing reception hosted by your Governing Body members.
Leadership Book Swap
You are invited to bring your favorite leadership books for a Book Swap at the Executive Summit throughout the day. Which books have influenced you as a leader? Bring a book with your notes in the margins or a fresh copy to leave, and then swap for a book one of your fellow executives has brought. This idea was inspired by a Governing Body Member!
Apply to participate in the New York CISO Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
For inquiries related to this community, please reach out to your dedicated contact.