June 1st

3:30 pm

Registration

4:00 pm - 4:45 pm WELCOME DAY SPECIAL CONTENT

Panel: Broadening and Deepening the Talent Pool to Attract and Retain Our Future Leaders

Moderator

Josh Reid

Principal, Cyber Markets Leader

Crowe LLP

Catrena Slaughter

Chief Information Security Officer – Mars Wrigley

Mars Inc.

Neil Daswani

Co-Director of the Stanford Advanced Cybersecurity Program

Stanford University

Eric Pickersgill

SVP, Chief Information Security Officer

FINRA

Session Details Arrow Icon
  • How do we make Information Security career opportunities compete with other technically demanding, highly responsible roles?
  • Demonstrating that understanding your people as individuals with their own career goals and versions of work-life balance that can be catered to beyond one-size-fits-all approaches improves every Talent Management metric
  • Highlighting the opportunities we still have as Security professionals to further develop and encourage women to rise into senior leadership positions within our organizations
  • Showcasing companies that are finding success with new ideas and innovations in this area. What can other organizations learn from their experience and apply to their own efforts?
4:55 pm - 5:30 pm WELCOME DAY SPECIAL CONTENT

Panel: Looking Forward: Where Will Information Security Be in 10 Years, AI’s Role, and What We’re Doing to Get There?

Moderator

Josh Reid

Principal, Cyber Markets Leader

Crowe LLP

Linda Marcone

CISO

Crate & Barrel

Stacey Myers

Principal Cyber Operations Engineer

MITRE

Param Vig

SVP , Chief Information Security Officer

Solventum

Session Details Arrow Icon
  • Itemizing what has changed in terms of the threatscape, workload, and security mentality of people working in different environments from day-to-day
  • Identifying and mitigating new vulnerabilities and risks
  • Are there some positives in a distributed workforce that we can capitalize upon further by recognizing and reinforcing them?
  • Discussing best practices to collaborate with HR and department heads to make changing working conditions an opportunity to improve our organization’s capabilities and behaviors
  • Offering key takeaways based on our experiences with these issues to date that other information security professionals can apply to their own work
5:30 pm

Drinks Reception

June 2nd

Stream 1 Chair

Abie John

Chief Information Security Officer

Halliburton

Stream 2 Co-Chair

Josh Reid

Principal, Cyber Markets Leader

Crowe LLP

7:30 am - 8:15 am

registration & breakfast

8:15 am - 8:20 am

Opening Remarks and Important Announcements

8:20 am - 8:30 am

Chair’s Welcome Address

8:30 am - 9:05 am KEYNOTE

The State of the CISO: Leading in the Age of AI-Powered Threats and Defenses

Phil Venables

Strategic Security Advisor, Google

Google

Session Details Arrow Icon
  • CISOs on the Front Lines: CISOs face increasing pressure daily due to sophisticated cyber threats and the rise of artificial intelligence (AI). the current challenges CISOs face in building resilient and secure organizations
  • Adopting AI Tools: CISOs must rapidly adopt and assess AI security tools to help organizations identify threats faster, reduce repetitive tasks, and enhance team expertise
  • Benefits of AI-powered Security: Examples of tangible benefits organizations gain from embracing AI-driven security solutions will be shared
  • Key Considerations for CISOs: Guidance on evaluating, deploying, and managing AI security tools to strengthen defenses will be provided
  • The Importance of Strong Relationships: The value of strong relationships between CISOs, the C-suite, and the board of directors will be emphasized as crucial for successful security transformations
9:05 am - 9:40 am KEYNOTE

Enabling Resilient, Secure Critical Infrastructure - What is the Right Balance and How Do You Achieve It

Nasrin Rezai

SVP, CISO

Verizon

Session Details Arrow Icon
  • Offering an overview of threat landscape and impacts to critical infrastructure 
  • Evolution of technology and impact to effective defense
  • How do you balance resiliency, availability and security
  • Zero trust in an interconnected ecosystem
9:45 am - 10:20 am Workshops
Workshop

Business Risk Impact — Scoring & Analysis

Christopher Simm

Chief Technology Officer

Bulletproof

Session Details Arrow Icon
  • Establish cybersecurity as a board-level priority by aligning risk decisions with enterprise objectives and executive accountability
  • Quantify business impact through structured analysis of potential financial, operational, and reputational loss tied to cyber risk
  • Develop a resilient business continuity strategy that integrates cyber response, recovery planning, and stakeholder alignment
10:25 am - 12:05 pm Pre-Arranged One-To-One Meetings Arrow Icon

These mutually agreed-upon conversations are arranged and facilitated by Executive Platforms staff to ensure attendees have valuable discussions about their top-of-mind questions, challenges, and opportunities.

  • 10:30 am – 10:50 am: Meeting Slot 1/Networking
  • 10:55 am – 11:15 am: Meeting Slot 2/Networking
  • 11:20 am – 11:40 am: Meeting Slot 3/Networking
  • 11:45 am – 12:05 pm: Meeting Slot 4/Networking
12:10 pm - 12:45 pm Case Studies
Stream One

Adversity as a Teacher: How Cross-Industry Learnings Can Guide Your Security Evolution

Eric Smith

U.S. Chief Information Security Officer

TD Bank

Session Details Arrow Icon
  • Leveraging real-time incident and intelligence data to proactively respond to ever-changing threat landscapes
  • Dissecting news articles, social media feeds, and industry chatter to protect your own environment
  • Drive reactive reviews of shared infrastructure vulnerabilities, especially in large, multi-tenant environments
  • Analyzing use cases of notable public incident responses to shape your own response playbook
Stream Two

Why Many Security Metrics Suck, and How We Can Make Them Better

Session Details Arrow Icon
  • Many security metrics are disconnected from business objectives, making them difficult to interpret and act upon
  • Metrics often focus on the quantity of events beyond our control, instead of effectiveness or business impact
  • Too many metrics and inconsistent definitions lead to confusion and “analysis paralysis,” hindering effective action
  • What makes for a good metric?
12:45 pm - 1:45 pm THEMED LUNCH DISCUSSIONS

Explore this year’s themed lunch discussions led by industry leaders, where executives engage in focused conversations over a meal, discussing topics they’re passionate about alongside their peers.

Getting the Most Out of IaaS Now and in the Future

Dave Adams

CIO

American Enterprise Instiute

AI-Driven Fraud – The Next Big Business Risk

Shreya Radovich

Senior Manager, Cybersecurity

Crocs

Cyber Incident Response: Lessons Learned and Tales from the Trenches

Serge Jorgensen

Incident Response Principal

Crowe LLP

Managing Risk & Compliance in a Penalty-Free Zone

Charles Britt

Senior Manager, Cybersecurity Governance, Risk, & Compliance

Fairfax County Public Schools

In the Age of AI-Empowered Social Engineering, How Do We Stay One Step Ahead of the Threat Actors?

Felicia Hedgebeth

CIO

Georgia Department of Banking and Finance

Fortifying the Perimeter: Mitigating Physical Security Threats in the Age of Cyber Risks

Cora Malcolm

Chief Technology Officer

Provo Water Company Ltd

1:45 pm - 2:20 pm KEYNOTE

Fireside Chat: The BISO Advantage: Bridging Business Objectives with Cybersecurity to Fuel Innovation and Drive Growth

Garima Maheshwari

Vice President, Business Information Security Officer

Johnson & Johnson

Session Details Arrow Icon

This session will explore the importance of the Business Information Security Officer (BISO) within organizations, including how they serve as a critical link between cybersecurity and business demands. This session will explore:

  • Essential responsibilities of BISOs to shape a security-first culture within an organization and how their alignment with business objectives help drive proactive cybersecurity strategies that support organizational growth
  • The impact of regulatory requirements on business operations and how a more mature BISO organization can contribute to enhancing organizational resilience and ensuring effective risk management
  • The importance of business continuity and partnership through practical examples
2:25 pm - 3:00 pm Workshops
Workshop

Translating AI Security Investments into Business Value: A BISO's Guide to Modern Security Operations

Owen Burns

Global Director, Services and Identity Protection

CrowdStrike

Session Details Arrow Icon

Join Owen Burns for a business-focused session on aligning AI-powered security operations with enterprise objectives. Drawing from Fortune 500 case studies, learn how successful BISOs are quantifying the business impact of AI security investments, reducing operational costs, and communicating security value to stakeholders. This session will provide practical frameworks for measuring ROI, managing risk appetite, and building cross-functional support while navigating the transformation to AI-enhanced security operations.

3:05 pm - 4:15 pm Pre-Arranged One-To-One Meetings Arrow Icon

These mutually agreed-upon conversations are arranged and facilitated by Executive Platforms staff to ensure attendees have valuable discussions about their top-of-mind questions, challenges, and opportunities.

  • 3:05 pm – 3:25 pm: Meeting Slot 5/Networking
  • 3:30 pm – 3:50 pm: Meeting Slot 6/Networking
  • 3:55 pm – 4:15 pm: Meeting Slot 7/Networking
4:20 pm - 4:55 pm Case Studies
Stream One

Speeding Up Security: How AI and Machine Learning are Revolutionizing Threat Detection and Response

Sherrod DeGrippo

Director, Threat Intelligence Strategy

Microsoft

Session Details Arrow Icon
  • Diving into the current trends, threat actors, and techniques shaping today’s digital risk environment
  • Learning how to create a proactive, intelligence-led security strategy to stay ahead of emerging threats
  • Exploring how AI tools and machine learning enhance threat detection, prediction, and response times
  • Discovering the benefits and challenges of collaborating with industry partners to share real-time threat intelligence data
  • Gaining insights on translating threat intelligence into actionable steps that enhance incident response and mitigation efforts
Stream Two

The Growing Crypto Economy and Ransomware: Key Security Considerations for Organizations in 2025

Linda Marcone

CISO

Crate & Barrel

Session Details Arrow Icon
  • Explosive growth in the Crypto Economy: Why Cyber professionals need to be early adopters
  • Evolving Threat Landscape: How rapid adoption of crypto will quickly evolve the attack surface.
  • Ransomware’s Crypto Link – The Business of Extortion: How crypto enables and incentivizes ransomware attacks
  • Future-Proofing for the Crypto-Ransomware Threat: Emerging trends and long-term security considerations.
4:55 pm - 5:30 pm KEYNOTE

Working from Home: The DPRK IT Worker Threat

Delfim Martins

Vice President Cyber Defense

GSK

Session Details Arrow Icon
  • Scope of the Threat
  • Impact on Organizations
  • Indicators and Red Flags
  • Mitigation Measures
5:30 pm - 6:05 pm KEYNOTE

Adapting to Change: What Leaders Can Learn from a Historic CPG Merger

Jeffry Northrop

Chief Information Officer, Mars Wrigley North America

Mars Inc

Session Details Arrow Icon
  • Cybersecurity Integration: Ensure that security protocols and risk management strategies are unified across both organizations to avoid vulnerabilities during the merger process.
  • Data Protection and Privacy: Prioritize compliance and safeguard customer and corporate data by aligning privacy policies across merged entities.
  • Risk Management in Transition: Implement continuous monitoring and robust risk assessments to mitigate potential security threats arising from system integrations.
  • Building a Resilient Security Culture: Foster a culture of cybersecurity awareness among employees to ensure ongoing protection during organizational changes and beyond.
6:05 pm - 6:10 pm

Chair’s Closing Remarks

Abie John

Chief Information Security Officer

Halliburton

6:15 pm

Drinks Reception

June 3rd

7:30 am - 8:25 am

registration & breakfast

8:25 am - 8:35 am

Chair's Welcome Address

Abie John

Chief Information Security Officer

Halliburton

8:35 am - 9:10 am KEYNOTE

Why Does Security Culture Become Complacent, and What Can We Do About It?

Abie John

Chief Information Security Officer

Halliburton

Session Details Arrow Icon
  • Recognize how routine breeds blind spots and challenge teams to question assumptions regularly
  • Address fatigue from constant alerts by prioritizing clarity and relevance in communication
  • Reinforce accountability through leadership modeling and regular engagement, not just policy
  • Build momentum with quick wins and visible progress to keep security top of mind
9:10 am - 9:45 am KEYNOTE

Building Maturity Into Your Cybersecurity Program: Strategies for Success

Nate Vanderheyden

Deputy Chief Information Security Officer

Morgan Stanley

Session Details Arrow Icon
  • When you look at your security program, is the whole greater than the sum of its parts?
  • Explore what characteristics exemplify maturity in a security program and common inhibitors
  • Establishing a robust framework with strategies for interoperability and cohesion within your program
  • Practical recommendations to build maturity through strategy, execution, and reinforcement
9:50 am - 10:25 am KEYNOTE

The Cyber Arms Race: How to Stay a Step Ahead of Cyber Crime

Cynthia Kaiser

(Former) Deputy Assistant Director, Cyber Division

Federal Bureau of Investigation (FBI)

Session Details Arrow Icon
  • Outsmart AI-Driven Threats – Learn how to use generative AI defensively to detect and neutralize sophisticated cyberattacks before they cause damage.
  • Reduce Ransomware Risk – Discover proven strategies to harden your systems, minimize exposure, and recover quickly without paying a ransom.
  • Stay Ahead of Emerging Threats – Gain insights into the latest tactics used by cybercriminals and how to proactively adapt your defenses.
  • Boost Incident Response Speed -Leverage AI-powered tools and playbooks to respond to breaches faster and limit operational disruption.
10:25 am - 11:15 am Pre-Arranged One-To-One Meetings Arrow Icon

These mutually agreed-upon conversations are arranged and facilitated by Executive Platforms staff to ensure attendees have valuable discussions about their top-of-mind questions, challenges, and opportunities.

  • 10:30 am – 10:50am: Meeting Slot 8/Networking
  • 10:55am – 11:15am: Meeting Slot 9/Networking
11:20 am - 11:55 am Workshops
Workshop

AI in Cybersecurity: A Fireside Chat on Revolutionizing Threat Defense

Matt Fryer

CISO Architect and Field CTO

Fortinet, Inc

Mark Alvarado

Director of Cybersecurity

Academy Sports & Outdoors

Session Details Arrow Icon

Join us for an intimate fireside chat exploring how Artificial Intelligence is transforming cybersecurity and creating both unprecedented opportunities and complex challenges for today’s leaders. In this candid conversation, Academy Sports and Fortinet will share real-world insights and emerging trends that are reshaping how organizations defend against cyber threats. This isn’t your typical presentation—it’s an open dialogue designed to spark meaningful follow-up discussion about the intersection of AI and cybersecurity.

What You’ll Experience:

  • Frank discussion about what you need to know about AI and cybersecurity—get beyond the buzzwords and hype
  • challenges, explore practical solutions, and learn from fellow leaders navigating similar decisions
  • Strategic insights on future-proofing your organization against evolving threats while harnessing AI’s potential for competitive advantage
12:00 pm - 12:35 pm KEYNOTE

Advancing Data Security in the Age of AI: Identity, Integrity, and Innovation

Sekhar Nagasundaram

Staff Vice President Technology – Cybersecurity, Head of Cybersecurity Threat Management

Elevance Health

Session Details Arrow Icon
  • Explore how AI is reshaping the data security landscape—creating both opportunities and vulnerabilities
  • Examine the intersection of identity management, access controls, and AI-driven data usage
  • Learn how to protect sensitive data while enabling AI-powered business processes
  • Identify key risks introduced by large language models and generative AI tools
  • Discover strategies for aligning security frameworks with evolving data governance demands
  • Gain practical insights from real-world implementations and lessons learned
12:35 pm - 1:35 pm

Excutive Lunch Seating

12:35 pm - 1:35 pm THEMED LUNCH DISCUSSIONS

Explore this year’s themed lunch discussions led by industry leaders, where executives engage in focused conversations over a meal, discussing topics they’re passionate about alongside their peers.

Futureproofing Your Data Loss Prevention Strategies

Jeremy Memmott

Executive Director of IT & Cybersecurity

Mountain Land Physical Therapy

Active Directory and Data Privacy as the Top Priority

Omar Valerio

CIO / CTO

Westminster Christian School

1:35 pm - 2:10 pm KEYNOTE

Software Supply Chain Security: Top 10 Risks & Mitigations

Cassie Crossley

VP, Supply Chain Security

Schneider Electric

Session Details Arrow Icon
  • Software has a supply chain too
  • Only some aspects of that supply chain are getting attention (build process & vulnerabilities)
  • Purchasers (everyone) and producers (most everyone) of software are at risk
  • 10 major risks in the software supply chain, and the mitigations that we should be doing
2:10 pm - 2:20 pm

Chair’s Closing Remarks

Abie John

Chief Information Security Officer

Halliburton

Sessions From Previous Years

Download The Agenda PDF

"*" indicates required fields

Are you a Delegate or Solution Provider/Vendor?*