Go Back
United States Summit

The CISO Chapter North America

Boston Marriott Long Wharf, MA

2 Days
-
Boston Marriott Long Wharf

A bit about our summit

What we're known for

File

Industry Analysis

Glean the knowledge of your peers to shape your organisation's future

File

Peer-Led

Workshops, Fireside Chats & Keynote Addresses

File

1 on 1 Meetings

Strategic BANT-qualified meetings based on project alignment

File

Custom Agenda

Be in control of your own agenda. Maximise your experience.

The Technology Chapter

Audience

We BANT qualify all executives pre-event to identify their current projects, challenges and investment priorities. This results in hyper qualified and project led 1 on 1 meetings with executives and solution partners onsite, which in turn leads to tangible partnership opportunities.

Audience illustration
  • 70+
    Senior Executives
  • 12
    Solution Partners
  • 6:1
    Executive to Solution Partner Ratio
  • 54%
    C-Suite Executives
  • 46%
    SVP, VP, Director & Heads of

Agenda

Day 1

17:30 - 19:00
Welcome Drinks Reception

Kickstart your summit experience and meet new peers with drinks and canapés

19:00 - 21:30
Gala Dinner & Signature Keynote with Q&A

Enjoy a 3 course silver service dinner in the ballroom. Hear from some special guest speakers and our signature sponsor.

21:30
Drinks & Networking

Continue conversations and building relationships at the bar

Day 2

07:00 - 08:20
Breakfast

Fuel up for a full day of networking, experiences and content

08:30 - 09:15
Welcome Address

Welcome Address by our Master of Ceremonies

Platinum Keynote with Q&A

Hear from our platinum sponsor

09:20 - 10:00
Countering the AI-Powered Adversary: Defending Against Automated Threat Campaigns

Attackers are increasingly using AI to scale, personalise, and automate cyberattacks. From deepfake-enabled social engineering to AI-driven malware, the threat landscape is shifting fast. We’ll explore the tools, tactics, and intelligence needed to defend against this new class of adversary.

Key Takeaways:

  • Identify the latest AI-powered attack vectors and their potential impact on enterprise security.

  • Gain actionable defence strategies, from detection to proactive disruption of automated threats.

09:20 - 10:00
Adaptive Security Architectures for the AI-Driven Enterprise

As AI transforms every corner of the enterprise, security architectures must evolve to keep pace. This session explores how to move beyond static Zero Trust models towards adaptive, intelligence-driven frameworks that respond dynamically to context, user behaviour, and emerging threats.

Key Takeaways:

  • Learn how to design adaptive architectures that integrate AI-powered analytics for real-time decision-making.

  • Discover governance approaches that maintain agility without compromising control.

09:20 - 10:00
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
10:00 - 10:20
Networking Break
10:25 - 11:05
Building a Security-First Culture: Effective Security Awareness and Training

Technology can only go so far—people remain a critical line of defence. This session looks at how to embed security-first thinking across your organisation, designing training that is engaging, role-specific, and aligned to real-world threats.

Key Takeaways:

  • Discover proven methods for shifting employee behaviour from compliance to active risk reduction.

  • Learn how to measure and improve the effectiveness of security awareness programmes.

Summer Ives
Name
Summer Ives
Position
Global Head of Cybersecurity & Risk Strategy & Operational Excellence - Chief of Staff
Company
The Estée Lauder Company
10:25 - 11:05
Safely Enabling Agentic AI at Scale

Agentic AI—autonomous agents that can plan, reason, and act on behalf of humans—are quickly becoming vital to business operations. As their use and numbers scales, so do the risks. These non-human identities need to be treated as first-class-citizens—meaning that they are verified, authenticated, authorized, and governed with the same rigor as human users. Attempting to manage AI agents without a modern identity foundation can result in over-permissioning, undetected hijacking, and other security blind spots. This roundtable will explore how organizations can safely and strategically enable AI agents through identity-first security.

Discussion Questions:

  • Given the anticipated proliferation of AI agents within organizations, how prepared are your current IAM systems and processes to provision, manage the lifecycle, and govern thousands of non-human identities operating autonomously or on behalf of users?

  • How can we ensure that AI agents are granted only the minimum privileges necessary and that sensitive actions require explicit human oversight and approval, validated through secure, out-of-band methods, without creating excessive operational friction?

  • What specific capabilities do we need to implement or enhance within our digital identity infrastructure to detect, monitor, and audit AI agent activity effectively, and how will this help us differentiate between legitimate agent behavior and malicious use or security incidents?

  • Considering that AI agents blur the lines between automation and human-driven interactions, how does prioritizing a robust, agent-aware digital identity strategy become foundational not just for security, but for enabling scalable, compliant, and trustworthy AI adoption across the business?

Ping Identity
11:00 - 11:40
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
11:10 - 11:50
Collaboration Session

Step away from passive listening and into active problem-solving. In this highly interactive session, you’ll work alongside your peers to explore some of the most pressing challenges and exciting opportunities facing your role today. Share experiences, exchange fresh perspectives, and leave with practical ideas you can take back to your organisation.

11:10 - 11:50
Partner Demo

Discover innovative solutions in action. Our partners will showcase their latest tools, technologies, and strategies designed to address real-world challenges and unlock new opportunities. This is your chance to see the possibilities first-hand, ask questions, and explore how these solutions could drive results for your organisation.

11:10 - 11:50
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners.
11:55 - 12:35
Proactive Defence: Leveraging Threat Intelligence and Predictive Analytics

Static threat feeds are no longer enough. This session focuses on blending advanced threat intelligence with predictive analytics to anticipate and neutralise threats before they strike.

Key Takeaways:

  • Learn how to integrate predictive capabilities into your threat intelligence programme.

  • Identify use cases where AI-enhanced threat modelling drives measurable risk reduction.

11:55 - 12:35
AI-Augmented Security Operations: Accelerating Detection, Response, and Recovery

Security operations centres are evolving fast. We’ll explore how AI is transforming the SOC—enabling faster detection, automated triage, and improved recovery without sacrificing human oversight.

Key Takeaways:

  • Explore real-world examples of AI integration into SOC workflows for maximum impact.

  • Understand the balance between automation and human decision-making in critical incidents.

11:55 - 12:35
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
12:35 - 13:30
Lunch
13:35 - 14:15
Mastering Data Privacy and Compliance: Strategies for Securing Sensitive Data

With regulations tightening and data volumes growing, privacy is a moving target. This session covers the strategies and tools CISOs need to ensure sensitive data remains protected while meeting evolving compliance obligations.

Key Takeaways:

  • Learn how to operationalise privacy across hybrid and multi-cloud environments.

  • Gain insights into emerging regulatory trends and their security implications.

13:35 - 14:15
Strengthening Access Control: Best Practices in Identity and Access Management (IAM)

IAM remains one of the most critical components of any security strategy. We’ll share best practices for streamlining access control, reducing privilege sprawl, and securing identities in an increasingly decentralised workforce.

Key Takeaways:

  • Understand the latest approaches to identity governance and privileged access management.

  • Learn how to implement adaptive access policies that reduce risk without impacting productivity.

13:35 - 14:15
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners. 
14:20 - 15:00
Collaboration Session

Step away from passive listening and into active problem-solving. In this highly interactive session, you’ll work alongside your peers to explore some of the most pressing challenges and exciting opportunities facing your role today. Share experiences, exchange fresh perspectives, and leave with practical ideas you can take back to your organisation.

14:20 - 15:00
Partner Demo

Discover innovative solutions in action. Our partners will showcase their latest tools, technologies, and strategies designed to address real-world challenges and unlock new opportunities. This is your chance to see the possibilities first-hand, ask questions, and explore how these solutions could drive results for your organisation.

14:20 - 15:00
Strategic, predetermined and agreed meetings based on project alignment with executives and solution partners.
15:05 - 15:55
Keynote
15:55 - 16:10
Networking Break
16:10 - 17:00
Panel Discussion

"Balancing Innovation and Risk: Building Resilient Security Strategies in a Complex Threat Landscape"

This panel brings together leading CISOs and cybersecurity experts to discuss the delicate balance between driving innovation and maintaining robust security. As organisations adopt cutting-edge technologies like AI, IoT, and cloud computing, they face an ever-expanding attack surface. Panelists will share insights on how to align security initiatives with business goals, ensure compliance, and build a culture of security at every level of the organisation. Topics include emerging threats, regulatory challenges, and the role of collaboration in building resilient and adaptive security strategies.

17:00 - 17:30
Drink & Nibbles

Join Us

Register Interest

Meet with fellow industry leaders and solve today’s greatest business
challenges.

File

Join Our Partner Network

Join our Partner Network and position your brand as a thought leader. Partnering with us unlocks excess to our community of engaged executives and offers a wealth of benefits.

File

Join the Executive Community

Our Executive Community is the heart of innovation and leadership. By joining our Executive Community, you gain unparalleled access to a world of opportunities.