Go Back
United States Summit

The CISO Chapter North America

The Royal Sonesta, MA

2 Days
-
Royal Sonesta

A bit about our summit

What we're known for

File

Industry Analysis

Glean the knowledge of your peers to shape your organisation's future

File

Peer-Led

Workshops, Fireside Chats & Keynote Addresses

File

1 on 1 Meetings

Strategic BANT-qualified meetings based on project alignment

File

Custom Agenda

Be in control of your own agenda. Maximise your experience.

The Technology Chapter

Audience

We BANT qualify all executives pre-event to identify their current projects, challenges and investment priorities. This results in hyper qualified and project led 1 on 1 meetings with executives and solution partners onsite, which in turn leads to tangible partnership opportunities.

Audience illustration
  • 70+
    Senior Executives
  • 12
    Solution Partners
  • 6:1
    Executive to Solution Partner Ratio
  • 54%
    C-Suite Executives
  • 46%
    SVP, VP, Director & Heads of

Agenda

Day 1

18:30 - 19:00
Welcome Drinks Reception

Kickstart your summit experience and meet new peers with drinks and canapés

19:00 - 21:30
Gala Dinner

Enjoy a 3 course silver service dinner in the ballroom and hear from some special guest speakers

21:30
Drinks & Networking

Continue conversations and building relationships at the bar

Day 2

07:30 - 08:30
Breakfast

Fuel up for a full day of networking, experiences and content

08:30 - 09:15
Welcome Address

MOC

Opening Keynote with Q&A

Signature Sponsor

09:20 - 10:00
Enhancing Security Efficiency: Mastering Cybersecurity Automation

This workshop focuses on the transformative power of cybersecurity automation to streamline threat detection, incident response, and compliance processes. CISOs will explore how security orchestration, automation, and response (SOAR) platforms, coupled with AI-powered threat detection, can significantly reduce human error, accelerate response times, and enhance overall security effectiveness. Through expert insights, you will gain actionable strategies for automating key security tasks, improving efficiency, and proactively mitigating risks your organisations.

Key Takeaways:

  • Understand how SOAR platforms and AI-driven tools can enhance threat detection and incident response.
  • Learn to implement automation strategies to streamline compliance and reduce human errors in security processes.
09:20 - 10:00
Building a Stronghold: Implementing Zero-Trust Security Models

IT Security leaders will learn essential strategies for implementing Zero-Trust Security Models to enhance organisational security. Explore the core principles of Zero-Trust, which require strict verification for every access request, regardless of the user’s location. Focus areas include advanced identity and access management (IAM), enforcing least privilege access, and continuous monitoring to detect and prevent potential threats. Learn how to adopt a Zero-Trust architecture to mitigate risks, improve data protection, and ensure secure access management.

Key Takeaways:

  • Gain insights into identity and access management (IAM) best practices for a Zero-Trust environment.
  • Learn to implement least privilege access and continuous monitoring to strengthen security frameworks.
09:20 - 10:00
Securing the Cloud: Best Practices for a Robust Cloud Security Strategy

This workshop is designed to equip CISOs with the knowledge and tools needed to secure cloud environments. As more organisations migrate to the cloud, ensuring robust security is essential. You  will explore key areas such as cloud-native security, multi-cloud security strategies, and identity federation to protect data across cloud platforms. Through real-world case studies and hands-on guidance, you will learn how to implement effective security measures, manage risks, and ensure compliance while maximising the flexibility and scalability of cloud solutions.

Key Takeaways:

  • Understand cloud-native security and best practices for securing cloud infrastructures.
  • Learn to manage multi-cloud security and implement identity federation to enhance access control.
09:20 - 10:00
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
10:05 - 10:45
Demo / Innovation Sessions
10:45 - 11:00
Networking Break
11:00 - 11:40
Proactive Defence: Leveraging Threat Intelligence and Predictive Analytics

This workshop empowers CISOs with the tools and strategies needed to proactively defend their organisations from cyber threats. By leveraging threat intelligence platforms and machine learning-based predictive analytics, participants will learn to anticipate and mitigate risks before they can cause damage. The session will cover best practices for real-time data monitoring, allowing security teams to detect threats early and respond swiftly. You will leave with actionable insights on integrating threat intelligence and predictive analytics into their security operations to enhance risk management and resilience.

Key Takeaways:

  • Understand how to integrate threat intelligence platforms and predictive analytics for early threat detection.
  • Learn to leverage real-time data monitoring to proactively mitigate risks and enhance cyber defence.
11:00 - 11:40
Mastering Data Privacy and Compliance: Strategies for Securing Sensitive Data

Equip yourself with the knowledge and tools necessary to navigate the complex landscape of data privacy and compliance regulations, such as GDPR. You will explore best practices for implementing GDPR compliance tools, ensuring data encryption, and leveraging privacy-enhancing technologies (PETs) to protect sensitive data across all operations. Through real-world examples and expert guidance, participants will learn how to build robust data privacy frameworks that mitigate risks, ensure regulatory compliance, and safeguard their organisation’s reputation.

Key Takeaways:

  • Learn to implement GDPR compliance tools and best practices for data privacy across the organisation.
  • Understand how to leverage data encryption and privacy-enhancing technologies (PETs) to secure sensitive information.
11:00 - 11:40
Securing the Edge: Advanced Strategies for Endpoint Security

As remote work and Bring Your Own Device (BYOD) policies become more common, protecting endpoints has become critical to securing organisational data. This workshop provides CISOs with the strategies and tools necessary to secure laptops, mobile devices, and other endpoints. You will explore advanced technologies like Endpoint Detection and Response (EDR), Mobile Device Management (MDM), and Endpoint Protection Platforms (EPP). The session will focus on how to implement a layered defence strategy to detect, protect, and respond to endpoint threats in real-time, ensuring the security of the organisation's perimeter.

Key Takeaways:

  • Learn how to deploy EDR, MDM, and EPP solutions to secure endpoints across the organisation.
  • Gain insights on creating a comprehensive endpoint security strategy to protect against evolving threats.
11:00 - 11:40
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
11:45 - 12:30
Panel Discussion

"Balancing Innovation and Risk: Building Resilient Security Strategies in a Complex Threat Landscape"

This panel brings together leading CISOs and cybersecurity experts to discuss the delicate balance between driving innovation and maintaining robust security. As organisations adopt cutting-edge technologies like AI, IoT, and cloud computing, they face an ever-expanding attack surface. Panelists will share insights on how to align security initiatives with business goals, ensure compliance, and build a culture of security at every level of the organisation. Topics include emerging threats, regulatory challenges, and the role of collaboration in building resilient and adaptive security strategies.

12:30 - 13:30
Lunch
13:30 - 14:00
Keynote with Q&A - Platinum Sponsor
14:05 - 14:45
Strengthening Access Control: Best Practices in Identity and Access Management (IAM)

This workshop is designed to help CISOs implement robust Identity and Access Management (IAM) frameworks to protect sensitive information. As organisations scale, managing user access becomes increasingly complex. Attendees will explore critical IAM strategies such as Multi-Factor Authentication (MFA), identity governance, and Privileged Access Management (PAM) to ensure that only authorised users can access critical systems. Through practical guidance and real-world examples, you will learn how to establish secure, compliant access control policies that reduce the risk of unauthorised access and safeguard organisational data.

Key Takeaways:

  • Understand how to implement Multi-Factor Authentication (MFA) and identity governance for stronger access control.
  • Learn best practices for Privileged Access Management (PAM) to protect high-risk accounts and systems.
14:05 - 14:45
Building a Security-First Culture: Effective Security Awareness and Training

Security awareness and training is now critical in preventing cyber threats. With human error being a leading cause of security breaches, this session helps CISOs design effective employee training programs. Learn how to implement ongoing security education, conduct phishing simulations, and run awareness campaigns to improve overall organisational vigilance. The workshop will provide actionable insights into fostering a security-first culture, empowering employees to recognise threats and respond appropriately, ultimately reducing the risk of breaches caused by human error.

Key Takeaways:

  • Learn how to create ongoing security training programs to empower employees against threats.
  • Implement phishing simulations and awareness campaigns to reduce human error and strengthen your security posture.
14:05 - 14:45
Fortifying Networks: Mastering Security and Segmentation Techniques

Focus on advanced network security strategies to protect organisational infrastructures from cyber threats. As organisations grow and become more complex, implementing effective network segmentation becomes crucial in containing breaches and minimising damage. CISOs will explore key technologies like Software-Defined Networking (SDN), Network Access Control (NAC), and micro-segmentation. The session will provide practical insights into segmenting networks, controlling access, and using micro-segmentation to limit attack surfaces, ensuring a resilient and secure network infrastructure.

Key Takeaways:

  • Understand the principles of network segmentation, including SDN and micro-segmentation, to limit attack exposure.
  • Learn how to implement NAC to enforce strict access controls and enhance network security.
14:05 - 14:45
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
14:50 - 15:30
Demo / Innovation Sessions
15:30 - 15:45
Networking Break
15:45 - 16:25
Resilience in Action: Effective Incident Response and Disaster Recovery Strategies

CISOs today have to have a comprehensive strategy for building resilient incident response and disaster recovery plans. A well-prepared response can minimise downtime and reduce the impact of security breaches. You will explore key tools like Disaster Recovery as a Service (DRaaS), backup automation and incident response platforms to enhance recovery capabilities and streamline operations. The session will provide guidance on designing, testing, and implementing plans that ensure quick recovery and business continuity in the event of an incident.

Key Takeaways:

  • Learn how to integrate DRaaS and backup automation for faster recovery and minimised business disruption.
  • Develop and implement effective incident response platforms to respond to breaches swiftly and efficiently.
15:45 - 16:25
Securing the IoT Ecosystem: Best Practices for Protecting Connected Devices

This workshop focuses on the growing security challenges posed by the Internet of Things (IoT). As organisations increasingly adopt connected devices, the attack surface expands, requiring specialised security measures. As a CISO, you will learn how to implement robust IoT security frameworks, manage devices effectively, and ensure secure communication protocols across the network. You will gain invaluable insights on protecting IoT devices, securing data transmission, and mitigating vulnerabilities to reduce risks associated with IoT deployments.

Key Takeaways:

  • Learn to implement IoT security frameworks to safeguard connected devices from emerging threats.
  • Understand best practices for device management and secure communication protocols to enhance IoT security.
15:45 - 16:25
Harnessing AI and ML for Advanced Cybersecurity

Explore the transformative role of Artificial Intelligence (AI) and Machine Learning (ML) in enhancing cybersecurity defences. As cyber threats evolve, AI and ML technologies are critical in detecting patterns, identifying anomalies, and responding to threats in real-time. CISOs will gain insights into AI-driven threat detection, automated vulnerability scanning, and anomaly detection to strengthen their organisation's security posture. Through hands-on demonstrations, you will learn how to integrate AI and ML into your security operations to proactively prevent, detect, and mitigate cyber risks.

Key Takeaways:

  • Learn how to leverage AI-driven threat detection and automated vulnerability scanning for proactive security.
  • Gain insights into anomaly detection techniques to identify and respond to emerging threats in real time.
15:45 - 16:25
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
16:30 - 17:00
Keynote & Closing Remarks
17:00 - 17:30
Drink & Nibbles

Join Us

Register Interest

Meet with fellow industry leaders and solve today’s greatest business
challenges.

File

Join Our Partner Network

Join our Partner Network and position your brand as a thought leader. Partnering with us unlocks excess to our community of engaged executives and offers a wealth of benefits.

File

Join the Executive Community

Our Executive Community is the heart of innovation and leadership. By joining our Executive Community, you gain unparalleled access to a world of opportunities.