CISO New York Summit | July 20, 2023 | New York, NY, USA


Registration & Networking Breakfast

8:30 AM - 9:00 AM

Welcome Address

9:00 AM - 9:10 AM

Keynote Panel: Future Leadership - Strategize and Adapt for 2023 and Beyond

9:10 AM - 9:40 AM

This session will explore the challenges and opportunities that executives face in the ‘Office of the CISO’. The role continues to evolve with the rapid pace of technological advancements and increasing cyber security threats. Speakers will discuss the latest trends, evolving threat landscape, collaboration from CISO, and required skills for future leaders in this field.

Henry Jia

Chief Information Security Officer

Bank of Communications Co

Peter Tse

Information Security Officer

CTBC Bank Co

Rahul Bhardwaj

Deputy Chief Information Security Officer


Keynote Sponsor: Put AI to Work in Your Business

9:45 AM - 10:15 AM
The current AI landscape presents an opportunity for businesses to achieve a significant breakthrough in productivity and competitiveness amidst a challenging economic environment and talent shortages. Consumers around the world have been awakened to the possibility of AI to augment their abilities and improve work. But AI for business has unique needs: governance, a modern data foundation, and intelligent automation across tools and teams that allows organizations to seize new opportunities for growth. Learn from business leaders how they are taking advantage of this convergence of new technologies, unleashing creativity, and up-leveling skills with AI and automation at scale.

Chris Bontempo

Chief Marketing and Communications Officer

IBM Americas


10:15 AM - 10:25 AM

Executive Boardroom: Embedding the Attacker’s Perspective

10:25 AM - 10:50 AM
Join Evan Anderson, Co-Founder & Chief Offensive Strategist at Randori, an IBM Company, for an exciting session that dives into the fast-paced world of offensive security. It’s clear from talking with hundreds of organizations that attackers and defenders often come to dramatically different conclusions around risk - even when looking at the same information. In this session, switch teams for a day as we pull back the curtain behind the system that keeps one of the world’s most advanced attack platforms on target 24/7/365. Through examples, Evan will show how Randori (and attackers) are leveraging AI and decades of experience to discover, classify and prioritize millions of targets daily across some of the world’s largest organizations. He’ll break down the 6 “tempting” factors every vulnerability team should be using to prioritize risk.

Evan Anderson

Chief Offensive Strategist


Think Tank: Managing the increasing Cyber attack surface area

10:55 AM - 11:20 AM
The organization’s perimeter has traditionally been the focus of attack surface management. This has gone through a radical transformation over the last couple of years, from third party vendors and contractors to Cloud services and API that connect in various ways to the organization systems and data. Identifying and managing the attack surface is fundamental to protecting the company assets from cyber threats. It is imperative to look beyond the traditional firewall and ask the right risk based questions to truly understand the effective attack surface that needs to be protected and monitored.

Peter Bassey

Senior Level Vice President - Technology Portfolio Manager/Cyber SME

Credit Suisse

Roundtable Discussions

11:25 AM - 11:50 AM

Executive Boardroom: Shut The Front Door - A Risk-based Case for Zero Trust Authentication

11:55 AM - 12:20 PM
Authentication is broken, and longer, stronger passwords combined with first-generation MFA did not save the day. Hopefully, this is no longer controversial. We have over a decade's worth of data showing how most successful breaches involve stolen credentials. Now we are witnessing a rapidly rising number of breaches bypassing existing MFA. It is beyond time to address this problem head-on, but what are the key requirements for MFA that is up to the task? While the situation is dire, this will be a very hopeful view of the path forward. Help IS on the way!

Kurt Johnson

Chief Strategy Officer

Beyond Identity

Panel Discussion: Artificial Intelligence and Machine Learning - Opportunities and Risks for Cyberse

12:25 PM - 12:50 PM

Artificial intelligence (AI) and machine learning (ML) are rapidly changing the technology world, and cybersecurity is no exception. These technologies are being leveraged to improve cybersecurity, but there are also new risks and challenges that organizations need to be aware of before deploying.

On the positive side, AI and ML are being used to automate tasks, identify threats, and respond to incidents more quickly and effectively than ever before. However, unwarranted false alerts resulting from ML bias, complexity in deployment and maintenance, high cost of developing and maintaining the technologies and additional regulations controlling these technologies are some of the negative impacts.

Cyber criminals have also started using AI and ML to design more sophisticated malware, launch more targeted attacks, automate attack tasks. As these technologies continue to develop, they are likely to find even more ways to use them to make cyberattacks more lethal and profitable.

This session will address the opportunities and the risks these tools present and analyze whether these tools eventually will help organizations to better protect themselves from cyber-attacks, or their negative impacts would outweigh the positivity.

Amit Basu

Vice President, CIO & CISO

International Seaways

Keith Donnelly

VP, Global Head of Risk Management

Broadridge Financial

Innovation Session: Achieving Cloud Security in an Era of Digital Transformation

12:50 PM - 1:00 PM

Amid enormous pandemic-generated disruption and geopolitical tensions, companies have experienced increased and more sophisticated cyber attacks. As a result, organizations now must be more vigilant and proactive when trying to ward off cyberthreats. How are companies tackling these challenges in a world of digital transformation?

This presentation will cover:

  • A full perspective of the evolving cybersecurity landscape
  • How digital security can enable the journey to the cloud
  • Digital transformation and the impact it has on cloud security
  • How Lacework secures your network from code to cloud

Dustin Gleich

Director, Sales Engineering


Networking Lunch

1:00 PM - 1:40 PM

Think Tank: Essential Data practices – ‘Beyond the boundaries of domain and scale’

1:40 PM - 2:05 PM

Satyam Singh

AVP Collections Data Management


Think Tank: Is Digital Transformation Driving the Need for DevSecOps?

2:10 PM - 2:35 PM

There are over 20 million developers working for Enterprise organizations across the globe. The universal desire for faster innovation and Digital Transformation has led to DevOps empowered developers demanding efficient reuse of code, which in turn has led to a growing dependence on open source and third-party software libraries. This velocity means applications are developed faster but it also introduces new security risks. 

Join us as we discuss how the modern software supply chain and the drive for digital innovation is putting organizations at risk. And whether it is time to empower every developer to be a DevSecOps expert?

Raghu Sankaran



Juan Carlos Castillo

Director, Information Security & Compliance


Executive Boardroom - Beyond Passwordless: Zero-Trust “Always Verify” Security with No User Action

2:40 PM - 3:05 PM

Join Thi Nguyen-Huu, President and CEO of WinMagic, as he brings new insights and innovation to the world of passwordless authentication.

Passwordless authentication frees users from having to remember their passwords. WinMagic has further revolutionized the passwordless experience by introducing no-user-action — no passwords, no traditional MFA and no hardware keys. The user only needs to unlock the endpoint for seamless, secure and virtually invisible access to their online apps and services.

Learn about WinMagic’s state-of-the-art FIDO-based authentication that delivers uncompromising, phishing-resistant security. Thi will introduce a new concept featuring a “user + endpoint device” entity where the endpoint verifies the user in real-time. MagicEndpoint offers secure online authentication and continuous verification to support your Zero Trust strategy. Combine this revolutionary no-user-action approach with WinMagic’s 25 years of continuous innovation in full disk encryption and secure MFA for preboot login and Windows sign-on.

Whether you’re starting your passwordless journey or building your use case, come discover how to achieve powerful security with the best user experience.

Thi Nguyen-Huu

President and CEO


Think Tank: Cyber Resilience - Why it is more critical in the post-pandemic world and what to do

3:10 PM - 3:35 PM
Cyber resilience is the ability to withstand and quickly recover from cyberattacks. It involves the ability to protect information assets like systems, networks, and data from cyber threats, as well as the ability to detect and respond to cyber incidents in a timely and effective manner, so that the normal operations of the organization is minimally affected. The COVID-19 pandemic has accelerated the shift to remote work and digital transformation, creating new opportunities for cybercriminals and as a direct consequence of that a cybercrime pandemic emerged. That has made the cyber resilience more critical than ever for organizations of all sizes in the post pandemic world. In this Think Tank session, we will collaboratively examine the true implications of cyber resilience; how the health pandemic created a cyber pandemic, which has forced organization to aim for cyber resilience and finally the path organizations should follow in their journey towards cyber resilience.

Amit Basu

Vice President, CIO & CISO

International Seaways

Executive Boardroom: Driving Innovation in Digital Supply Chain Risk Management

3:40 PM - 4:05 PM

Every organization is experiencing risks in its digital supply chain.  Whether that risk is seen or unseen, there is a weak link somewhere.  As these risks continue to rise, it is critical that firms effectively assess, monitor, and manage supply chain risk to prioritize the threats that would have the largest impact on their business operations.

Join third-party risk experts from RiskRecon by Mastercard for this session, where attendees will learn:

  • Why supply chain risk management has become a priority
  • How supply chain risk impacts your organization
  • How you can manage supply chain risk effectively

Mark Nafe

Director, Solutions Consulting


Closing Keynote Panel: Diversity & Inclusion - The Positive Impact on Transformation

4:10 PM - 4:40 PM

Embracing diversity and inclusion can have an immense impact on a CISO's role by promoting innovation, expanding the talent pool, improving risk management, enhancing employee engagement, fostering cultural competence, and reducing biases. These factors contribute to the overall effectiveness of the security function and the organization's ability to adapt to evolving security challenges.

Join this session to discuss:

  • Enhance problem solving and innovation
  • Improved Risk Management
  • Enhanced employee engagement and retention
  • Cultural competence and global readiness
  • Mitigating biases and blind spots

Reena Parekh

Head of US Data Security - Data Defense and Access Assurance


Jeevan Lobo

Vice President (Security & Governance)


Closing Remarks

4:45 PM - 4:55 PM

Summit Happy Hour

5:00 PM - 6:00 PM