-
8:00
Registration and Light Breakfast
-
8:45
Chair's Opening Remarks
-
8:50
OPENING PANEL: Confessions of CISOs – Today’s Operational Reality
• Insights into the unfiltered realities CISOs face as cyber risk, AI adoption, and regulatory scrutiny converge.
• Exploring how security leaders are balancing innovation demands with shrinking tolerance for failure.
• What CISOs wish boards understood about operational risk, talent constraints, and security debt.
George Coleman, Vice President, Chief Information Security Officer, ARIEL INVESTMENTS -
9:35
KEYNOTE: AI Security in Enterprise Operations – Opportunities & Risks
• Insights into how generative AI is simultaneously strengthening security operations while expanding the attack surface.
• Exploring the emerging threat landscape driven by AI-enabled phishing, fraud, and automation.
• How to establish governance, oversight, and accountability for enterprise AI adoption. -
10:05
EXPERT AMA: AI, Governance & Regulatory Complexity
• What CISOs need to know about evolving AI regulation and executive accountability.
• How to manage uncertainty when laws, standards, and expectations are still forming.
• Insights from peers on engaging legal, risk, and compliance teams early.
Bruce Phillips, Senior Vice President, & Chief Information Security Officer, WILLISTON FINANCIAL GROUP -
10:35
10 Minute Spotlight Session – Trend Micro
-
10:45
Morning Break & Networking
-
Track A - Strategic Leadership
-
11:15
15 minute spotlight session
-
11:30
Presentation: Who Owns AI Risk When Things Go Wrong?
• Exploring accountability models when AI systems cause financial, legal, or reputational damage.
• What boards and regulators will expect CISOs to answer after an AI-driven incident.
• How to define ownership across security, data, legal, and product teams. -
12:00
DISCUSSION GROUP: Reality Check: Security Investments That Truly Deliver
• Insights into which security investments are driving measurable risk reduction versus noise.
• How to justify spend using business-aligned metrics instead of technical outputs.
• What CISOs are deprioritizing to reduce tool sprawl and operational friction.
Allah Rakha Sheikh, Chief Information Officer, MADISON MUTUAL -
12:30
PANEL DISCUSSION: Zero Trust in Practice: What’s Working and What’s Not
• Exploring why Zero Trust remains difficult to operationalize at scale.
• How to align identity, access, and network controls without disrupting the business.
• Insights from real implementations, successes, failures, and lessons learned. -
1:15
Presentation: Leadership Masterclass: How to Communicate Risk in Business Terms
• How to translate cyber threats into financial, operational, and reputational impact.
• Insights into metrics and dashboards that resonate with boards and executives.
• What separates high-trust CISOs from those stuck in technical reporting.
Pal Vankayalapati, Chief Information Security Officer, PLZ CORP -
Track B - Cloud & DevSecOps
-
11:30
Presentation: DevSecOps in the Real World: Balancing Speed, Security & Burnout
• Insights into the cultural and operational barriers slowing DevSecOps maturity.
• How to embed security into pipelines without overwhelming development teams.
• What can be done to reduce friction and improve adoption across engineering. -
12:00
DISCUSSION GROUP: Cutting Through the Hype: Cloud Security Tools That Drive Value
• What tools are delivering real visibility and risk reduction in cloud environments.
• How to evaluate vendors against outcomes rather than feature sets.
• Insights into simplifying cloud security stacks without increasing exposure. -
12:30
PANEL DISCUSSION: Multi-Cloud Resilience & Regulatory Proof Points
• Exploring how organizations are proving security and compliance across hybrid estates.
• How to maintain resilience when visibility, controls, and ownership are fragmented.
• What regulators and auditors increasingly expect to see. -
1:15
Presentation: From Breach Headlines to Board Confidence
• Insights into how public cyber incidents are reshaping board expectations.
• How to proactively address reputational risk before an incident occurs.
• What boards now expect CISOs to explain in the first 48 hours after a breach. -
1:45
Lunch Break & Networking
-
2:45
Keynote: Rethinking Third-Party Cyber Risk: From “Obvious Controls” to Proactive Prevention
• Insights into why foundational TPRM controls are often undervalued and how reframing them drives stronger adoption.
• How to design onboarding and ongoing monitoring practices that reduce third-party cyber risk before incidents occur.
• Exploring peer collaboration as a catalyst for improving TPRM maturity and prevention strategies.
Josh Aubery, Chief Compliance & Privacy Officer, WELLBE SENIOR MEDICAL -
3:15
LIVE DEBATE: Risk Roulette
In cybersecurity, every decision comes with trade-offs, and not all risks are created equal. In this high-energy, live debate, top security leaders face off to tackle some of the toughest “what-if” scenarios CISOs encounter daily, from ransomware vs. silent data breaches, to strict access controls vs. business agility, and everything in between.
Audiences will witness real-time arguments, expert insights, and a clash of perspectives as panelists defend their stance on difficult security dilemmas. Attendees will gain insights into:
• A deeper understanding of the trade-offs behind major security decisions
• Actionable frameworks for prioritizing risk in their own organizations
• Fresh insights into how leading CISOs think under pressure
Expect surprises, audience polling, and lively debate, because in cybersecurity, sometimes there is no right answer… only what’s worse.
Arpine Long, Deputy Chief Information Security Officer, COLLECTIVE HEALTH -
4:00
Afternoon Break & Networking Break
-
4:30
KEYNOTE: From resilience to antifragility: Rethinking Cybersecurity
• Insights into moving beyond just recovering from attacks to strengthening systems.
• How to learn from incidents and continuously adapt your defenses.
• Exploring ways to build security that evolves with threats and turns challenges into growth.
Bruce Phillips, Senior Vice President, & Chief Information Security Officer, WILLISTON FINANCIAL GROUP -
5:00
FIRESIDE CHAT: The Board, the Breach & the Blame Game
• Exploring how accountability is assigned after a major incident.
• What boards get right, and wrong, in the aftermath of breaches.
• Insights into how you can protect credibility under scrutiny. -
5:20
Closing Remarks & End of Conference
-
5:30 - 6:30
Networking Reception
Not Found