Go Back
United States Summit

The CISO Chapter North America

Boston Marriott Long Wharf, MA

2 Days
-
Boston Marriott Long Wharf

A bit about our summit

What we're known for

File

Industry Analysis

Glean the knowledge of your peers to shape your organisation's future

File

Peer-Led

Workshops, Fireside Chats & Keynote Addresses

File

1 on 1 Meetings

Strategic BANT-qualified meetings based on project alignment

File

Custom Agenda

Be in control of your own agenda. Maximise your experience.

The Technology Chapter

Audience

We BANT qualify all executives pre-event to identify their current projects, challenges and investment priorities. This results in hyper qualified and project led 1 on 1 meetings with executives and solution partners onsite, which in turn leads to tangible partnership opportunities.

Audience illustration
  • 70+
    Senior Executives
  • 12
    Solution Partners
  • 6:1
    Executive to Solution Partner Ratio
  • 54%
    C-Suite Executives
  • 46%
    SVP, VP, Director & Heads of

Agenda

Day 1

17:30 - 19:00
Welcome Drinks Reception

Kickstart your summit experience and meet new peers with drinks and canapés

19:00 - 21:30
Gala Dinner & Platinum Keynote with Q&A

Enjoy a 3 course silver service dinner in the ballroom. Hear from some special guest speakers and our signature sponsor.

 

Platinum Keynote: Cyera 

"The Art & Science of Using AI to Make Data Security Easy"

Data has become the fastest-growing business resource—and the most vulnerable. Traditional security approaches have reached their limits. This keynote explores how AI-native data security transforms the security landscape by combining machine learning, generative AI, natural language processing, and statistical validation into a unified defense strategy.
Discover how modern security teams are leveraging AI to achieve complete visibility across petabytes of data in hours, automatically classify business-critical information with 95% precision, and orchestrate controls across their entire data ecosystem. Through real-world examples we'll demonstrate how AI-native classification, comprehensive data discovery, and intelligent access governance enable CISOs, CDOs, and data leaders to turn data from a liability into a strategic advantage.

 

Rob Preta
Name
Rob Preta
Position
CISO - Data, Security & Governance
Company
Cyera
21:30
Drinks & Networking

Continue conversations and building relationships at the bar

Day 2

07:00 - 08:20
Breakfast

Fuel up for a full day of networking, experiences and content

08:30 - 08:40
Welcome Address

Welcome Address by our Master of Ceremonies

08:40 - 09:20
Panel Discussion

"Balancing Innovation and Risk: Building Resilient Security Strategies in a Complex Threat Landscape"

This panel brings together leading CISOs and cybersecurity experts to discuss the delicate balance between driving innovation and maintaining robust security. As organisations adopt cutting-edge technologies like AI, IoT, and cloud computing, they face an ever-expanding attack surface. Panelists will share insights on how to align security initiatives with business goals, ensure compliance, and build a culture of security at every level of the organisation. Topics include emerging threats, regulatory challenges, and the role of collaboration in building resilient and adaptive security strategies.

09:20 - 10:00
Risk Prioritization: Quantifying risk for system owners to drive security improvements

This session explores how to effectively quantify and prioritise cybersecurity risks to empower system owners in making informed, data-driven decisions. Attendees will learn practical methods to translate technical vulnerabilities into measurable business impact, enabling smarter resource allocation and continuous security improvement.

Key Takeaways:

  1. Understand frameworks and metrics for quantifying cyber risk and linking it to business outcomes.

  2. Learn how to empower system owners with actionable risk insights to prioritise mitigation efforts effectively.

Brian Armstrong
Name
Brian Armstrong
Position
Executive Director, Cyber Security Governance
Company
Providence Health
09:20 - 10:00
A Modern Framework for Cloud Visibility

Hosted by Wiz, this workshop explores how enterprises can regain control and visibility across sprawling multi-cloud environments. As cloud adoption accelerates, blind spots increase—creating challenges for security, compliance, and performance. Wiz will demonstrate a modern framework for achieving unified visibility, contextual risk understanding, and prioritised remediation across all cloud assets, empowering teams to move faster and more securely.

Key Takeaways:

  • Complete Cloud Visibility: How Wiz helps organisations uncover every asset, configuration, and identity across multi-cloud environments
  • Contextual Risk Understanding: Why visibility alone isn’t enough—discover how to correlate misconfigurations, vulnerabilities, and exposures for real risk insight
  • Secure at the Speed of Cloud: Best practices for implementing scalable, automated visibility that enhances security without slowing innovation.
Wiz
09:20 - 10:00
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
10:00 - 10:30
Networking Break
10:35 - 11:10
Safely Enabling Agentic AI at Scale

Agentic AI—autonomous agents that can plan, reason, and act on behalf of humans—are quickly becoming vital to business operations. As their use and numbers scales, so do the risks. These non-human identities need to be treated as first-class-citizens—meaning that they are verified, authenticated, authorized, and governed with the same rigor as human users. Attempting to manage AI agents without a modern identity foundation can result in over-permissioning, undetected hijacking, and other security blind spots. This roundtable will explore how organizations can safely and strategically enable AI agents through identity-first security.

Discussion Questions:

  • Given the anticipated proliferation of AI agents within organizations, how prepared are your current IAM systems and processes to provision, manage the lifecycle, and govern thousands of non-human identities operating autonomously or on behalf of users?

  • How can we ensure that AI agents are granted only the minimum privileges necessary and that sensitive actions require explicit human oversight and approval, validated through secure, out-of-band methods, without creating excessive operational friction?

  • What specific capabilities do we need to implement or enhance within our digital identity infrastructure to detect, monitor, and audit AI agent activity effectively, and how will this help us differentiate between legitimate agent behavior and malicious use or security incidents?

  • Considering that AI agents blur the lines between automation and human-driven interactions, how does prioritizing a robust, agent-aware digital identity strategy become foundational not just for security, but for enabling scalable, compliant, and trustworthy AI adoption across the business?

Advait
Name
Advait Deodhar
Position
VP
Company
Ping Identity
Ping Identity
10:35 - 11:10
From Blind Spot to Board Priority: Managing Cryptographic Risk in the Age of AI, Quantum, and Zero Trust.

Cryptography secures every identity, transaction, and connection — yet most organizations can’t see all the keys, certificates, and algorithms they rely on. This hidden gap is a growing target for threat actors, especially with AI-driven attacks and post-quantum disruption on the horizon. Learn how to discover and prioritize vulnerabilities, automate cryptographic inventory, and make cryptographic risk a measurable part of your security strategy.

Key takeaways: Cryptography secures every identity, transaction, and connection, but most organizations lack visibility into all the keys, certificates, and algorithms they depend on.

  • In this session, you'll learn how to:

  • Discover and prioritize cryptographic vulnerabilities

  • Automate cryptographic inventory and management

  • Make cryptographic risk a measurable part of your overall security strategy

Keyfactor
10:35 - 11:10
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
11:15 - 11:55
Advanced Cyber Response by Leveraging a Clean Room Architecture

Attendees will learn why clean room architecture is necessary to perform proper forensic investigation during a cyberattack. The workshop will cover preparing and initiating a clean room, how to use it to understand a cyber attacker’s tactics and techniques, and why it helps when developing a mitigation plan for an incident. Specific clean room design strategies, use cases, and actionable next steps will be shared throughout this workshop. The importance of vaulted backup copies to feed a clean room will also be highlighted.

Key Takeaways:

  • The purpose of a clean room during the investigation phase of cyber incident response.
  • Why building and testing a clean room is a key component of a cyber resilience strategy and a hallmark of the most cyber-mature organizations.
  • What a digital jump bag is and how it is used to deploy the minimum viable response capability inside a clean room.
  • Best practices for clean room architecture, including network isolation, environmental prerequisites, and recommended forensic capabilities.
  • The role that data protection software and vaulted backups play in feeding data to a clean room.
  • How clean room speeds cyber response, reduces RTO, and lessens the risk of re-infection during the mitigation phase of an incident.
Stephen Gyarmati
Name
Stephen Gyarmati
Position
Director, Solutions Architecture
Company
Cohesity
Cohesity
11:15 - 11:55
Hyperproof Demo

Discover Hyperproof: An Overview of Hyperproof’s AI-Powered Platform

Join Hyperproof’s demo session where we’ll explore how the platform empowers your team to streamline compliance operations, mitigate risks, and build trust with customers and stakeholders, with AI embedded across every workflow. This engaging session will dive into key product areas like Hyperproof’s controls module, risk module, and reporting, showcasing how Hyperproof AI provides a continuous, proactive assurance GRC engine built on intelligence and tailored to your business needs. Attendees will gain a comprehensive understanding of how the Hyperproof platform can increase compliance productivity, improve stakeholder visibility, and reduce time spent on manual processes like evidence collection and audit prep.

Tyler Angle
Name
Tyler Angle
Position
Solutions Architect
Company
Hyperproof
Ricardo Oelkers
Name
Ricardo Oelkers
Position
Strategic Account Executive
Company
Hyperproof
Hyperproof
11:15 - 11:55
Pentera Demo

Discover innovative solutions in action. Our partners will showcase their latest tools, technologies, and strategies designed to address real-world challenges and unlock new opportunities. This is your chance to see the possibilities first-hand, ask questions, and explore how these solutions could drive results for your organisation.

Pentera
11:15 - 11:55
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners.
11:15 - 11:55
Keyfactor

Discover innovative solutions in action. Our partners will showcase their latest tools, technologies, and strategies designed to address real-world challenges and unlock new opportunities. This is your chance to see the possibilities first-hand, ask questions, and explore how these solutions could drive results for your organisation.

Keyfactor
12:00 - 13:00
Lunch
13:05 - 13:45
Strengthening Identity & Access Management (IAM) in the Age of Zero Trust

Workshop: Strengthening Identity & Access Management (IAM) in the Age of Zero Trust

As identity becomes the new security perimeter, robust IAM strategies are critical to protecting enterprise data and enabling secure digital transformation.
Join this interactive session to explore how leading CISOs are modernizing access controls, implementing adaptive authentication, and aligning IAM programs with Zero Trust frameworks.

Key takeaways:

  • Building a unified identity strategy across hybrid environments

  • Managing privileged access at scale

  • Integrating IAM with automation and threat detection tools

  • Lessons learned from real-world implementations

Whether you’re refining an existing IAM roadmap or starting fresh, this session will provide actionable insights to strengthen your organization’s identity security posture.

Commonwealth Care alliance
Name
Adam Fairhall
Position
Deputy CISO
Company
Commonwealth Care Alliance
13:05 - 13:45
Building a Security Program - No Borders, No Bias, No BS
  • Moving Beyond the traditional "Castle and Moat", organizations now use cloud services, SaaS applications, and have employees working from anywhere on any device. This means the attack surface is now everywhere.
  • A Vendor-Neutral, technology first approach: vendor bias can significantly hinder a cybersecurity program. When a single vendor's solutions are adopted across the board, it can lead to vendor lock-in, limited flexibility, and a lack of best-of-breed solutions.
  • Measuring & Maturing the program: To build a sustainable cybersecurity program, you can't just buy a product and call it a day. The program needs to be a continuous process of improvement.
Rob Preta
Name
Rob Preta
Position
Data Security & AI Governance Officer
Company
Cyera
Cyera
13:05 - 13:45
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
13:50 - 14:30
Mastering Data Privacy and Compliance: Strategies for Securing Sensitive Data

With regulations tightening and data volumes growing, privacy is a moving target. This session covers the strategies and tools CISOs need to ensure sensitive data remains protected while meeting evolving compliance obligations.

Key Takeaways:

  • Learn how to operationalise privacy across hybrid and multi-cloud environments.

  • Gain insights into emerging regulatory trends and their security implications.

Sharon Kelly
Name
Sharon Kelly
Position
CISO
Company
New Jersey Institute of Technology
13:50 - 14:30
Security Validation at the Heart of Exposure Management

Surprisingly, the majority of breach-reasons today are NOT vulnerability-related, but rather caused by misconfiguration, application interfaces, supply chain or credential related security gaps.

Exposure Management is here to allow a strategy and process for addressing the reduction of risk over the entire attack surface.

This session will present a simple, pragmatic approach to implementing an Exposure Management strategy with minimal incremental investment while focusing on automation and validation.

Pentera
13:50 - 14:30
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
14:30 - 15:00
Networking Break
15:05 - 15:45
Realizing Actual Cyber Resilience Value

This workshop explores how organisations can move beyond theoretical resilience frameworks to achieve measurable, outcome-driven cyber resilience. Participants will learn how to align resilience strategy with business objectives, quantify the value of resilience investments, and embed adaptability across people, processes, and technology. Through real-world examples and peer discussion, attendees will uncover practical methods to demonstrate tangible ROI from resilience initiatives.

Key Takeaways:

  • Translating Strategy into Value: How to link cyber resilience efforts directly to business performance and risk reduction metrics.
  • Measuring Resilience ROI: Practical approaches to quantify the financial and operational impact of resilience investments.
  • Building Sustainable Resilience: Best practices for fostering a culture of adaptability that strengthens resilience across the enterprise.
Jinks Shirgaonkar
Name
Jinks Shirgaonkar
Position
Director IT Security, Risk & Compliance
Company
ICU Medical
Danny Dawes
Name
Danny Dawes
Position
MD, Managed Detection & Response (MxDR)
Company
Accenture Security Services
15:05 - 15:45
Cyera Demo

Discover innovative solutions in action. Our partners will showcase their latest tools, technologies, and strategies designed to address real-world challenges and unlock new opportunities. This is your chance to see the possibilities first-hand, ask questions, and explore how these solutions could drive results for your organisation.

Cyera
15:05 - 15:45
Wiz Demo

Discover innovative solutions in action. Our partners will showcase their latest tools, technologies, and strategies designed to address real-world challenges and unlock new opportunities. This is your chance to see the possibilities first-hand, ask questions, and explore how these solutions could drive results for your organisation.

14:20 - 15:00
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners.
15:50 - 16:30
Keynote - Is Artificial Intelligence the future of Cybersecurity
Mark Alvarado
Name
Mark Alvarado
Position
CISO
Company
Academy Sports + Outdoor
16:30 - 17:00
Drink & Nibbles

Join Us

Register Interest

Meet with fellow industry leaders and solve today’s greatest business
challenges.

File

Join Our Partner Network

Join our Partner Network and position your brand as a thought leader. Partnering with us unlocks excess to our community of engaged executives and offers a wealth of benefits.

File

Join the Executive Community

Our Executive Community is the heart of innovation and leadership. By joining our Executive Community, you gain unparalleled access to a world of opportunities.