Summit Recap


Pre-Summit Reception and Dinner

Executives met on the HGU rooftop and got to know each other while taking in fantastic views of the city.



Executive Keynote - Cybersecurity in 2019: Threats, Risks and How to Protect Our Crown Jewels

Rachel Wilson, Managing Director, Head of Cybersecurity for Wealth Management and Investment Technology at Morgan Stanley gave an electrifying presentation about potential cyber risks and attack scenarios to organizations. She stunned the audience with stories from her time at the NSA and forecasted what threats are emerging in 2020 and beyond.



Cyber Wellness - The Future of Cyber Risk Management

David X Martin, an expert on cyber risk management and Special Counselor to State Dept. demonstrated how companies are adapting intelligence driven strategies, quantifying cyber security risks and integrating the oversight of cyber security risk with operational risk.



Preparing for Quantum: Identifying the Risk Quantum Computing Will Pose to your Security Program
Chris Bontempo, Vice President, Security Marketing, Routes and Offerings, North America at IBM shared insights on how organizations can and are preparing for the quantum computing leap and how to quantify the risk involved with protecting and storing assets well into the future.



Break and Networking



Innovating on the CISO Role
Linda Angles, CISO  at Conduent and Roger Parsley Managing Director, Cyber Security at Robert Half Legal focused on how CISOs are adapting or not, and their expectations of their role in the future.



The Impact of AI on Access Automation
Donovan Blaylock II, Technology Evangelist at SailPoint discussed how artificial intelligence completely changes the model of automated access and explained the costs in an effort to better understand the actual impacts AI has on information security going forward.


Opening Up the Talent Funnel
Art Hopkins, Executive Director, Technology Sector - Information Officers Practice at Russell Reynolds Associates gave an in depth interview on how companies are addressing the problematic shortage of cybersecurity skills at their organization and how security leadership teams are working to fill the gaps.



Network Intelligence – How Visibility & Control are Crucial for Managing and Securing your Corporate Network

Tomer Egozi, Vice President of Sales at Allot showed how to identify what applications are being used across the enterprise and how protect users and business infrastructure from the growing menace of cyber threats -aligning application performance to the business priorities.



Top Priorities - Polling

An interactive, live polling session with the focus on what the top priorities are for security teams moving forward.



Lunch and Networking 



Waiting for the Other Link to Drop: Avoiding a Future Cybersecurity Attack

Rob Forgione, Systems Engineer at Zix Corporation delved into the tools they provide to counteract the growing threat of infiltration due to email vectors and showed where to focus security attention due to financial, healthcare and federal laws dictating data preservation compliance.



Forward Thinking Strategies for Cyber Resilience Management

Joe DePaul, Head of Finex Cyber E&O- FINEX North America at Willis Towers Watson provided insights into how organizations maintain confidence in their ability to insulate their brand, protect their customers, optimize operational efficiencies and support growth.



Executive Roundtable Discussions

Facilitated by executives from a diversity of industries across seven different topics, the highly rated Executive Roundtables wrapped up the Summit session.



Reception and Networking with Prize Drawings

Executive Alliance, our strategic partners and the New York Fall attendees closed out the summit with camaraderie and collaboration. 

Thank you to everyone for a terrific NYF 2019 and we look forward to seeing everyone at the National Symposium!


Thank You to our 2019 New York Fall Summit Sponsors


Cybercriminals are growing in number and sophistication, rendering traditional solutions powerless against today’s advanced threat actors. IBM Security, with ~8,000 security professionals worldwide, helps more than 12,000 clients address their most critical needs: implementing a risk-based security strategy; threat management; and enabling digital trust. 
Over the past decade, IBM has invested more than $2 billion in security research and development, resulting in 3,700+ security-related patents, and acquired 19 security companies to grow its portfolio. Today, IBM Security delivers next-generation security technology and services, including artificial intelligence, orchestrated incident response, cloud-based solution, and state-of-the-art security operations centers. For more information, please visit ibm.com/security
SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. SailPoint’s open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. 
  • The benefits of self-service access to systems, applications and data
  • Protection against cyber-attacks with strong identity management
  • The connection between identity governance and compliance
  • How their c-suite sees the role of identity governance evolving in the future
To learn more about SailPoint, please visit www.sailpoint.com or contact Bob Caldiero - bob.caldiero@sailpoint.com

Established in 1996, Allot is a leading global provider of innovative network intelligence and security solutions for service providers and enterprises worldwide, enhancing value to their customers. Our solutions are deployed globally for network and application analytics, traffic control and shaping, and network-based security services. 
With over 20 years’ experience empowering service providers and enterprises to get more out of their networks and to manage them more efficiently, we enable network operators to clearly see and understand their networks from within. Allot provides its customers with the tools to optimize, innovate, and capitalize on every opportunity; to learn about users and network behaviors; to improve quality of service and reduce costs; and to detect security breaches to protect their own networks and their users from attacks. All of this is achieved while increasing value to customers and deploying new services more quickly than ever before.
or contact Steve Smith at ssmith@allot.com
Layer 1-1
Zix Corporation (Zix) is a leader in email security. Trusted by the nation’s most influential institutions in healthcare, finance and government, Zix delivers a superior experience and easy-to-use solutions for email encryption and data loss prevention, advanced threat protection, unified information archiving and bring your own device (BYOD) mobile security. Focusing on the protection of business communication, Zix enables its customers to better secure data and meet compliance needs. Zix is publicly traded on the Nasdaq Global Market under the symbol ZIXI. 
For more information, visit www.zixcorp.com.  Or contact Jeff Teti at: jteti@zixcorp.com
BeyondTrust helps companies defend against threats related to stolen credentials, misused privileges, and unwanted remote access, while empowering people. 
Our privileged access management platform offers the broadest set of capabilities to:
  • Discover, manage, audit, and monitor privileged accounts of all types
  • Remove excessive end user privileges on Windows, Mac, Unix, Linux and network devices
  • Secure, manage, and audit vendor and internal remote privileged access, and access and support remote systems
  • Identify, prioritize, and remediate vulnerabilities and inform privilege decisions with risk insights
  • Audit, report, and recover changes across Microsoft Windows platforms
This approach has been recognized by top analysts from Gartner and BeyondTrust is trusted by more than 20,000 customers worldwide, including over half of the Fortune 100.
If you have an upcoming project or are currently evaluating PAM solutions, please contact Normal Zulauf, Regional Manager, at nzulauf@beyondtrust.com
Gigamon is leading the convergence of networking and security operations to help organizations reduce complexity and increase efficiency of their security stack. Our GigaSECURE® Security Delivery Platform is a next-generation network packet broker that helps customers make threats more visible across cloud, hybrid and on-premises environments, deploy resources faster and maximize the performance of their security tools.
Global 5000 companies and government agencies rely on Gigamon solutions to make them more agile and cut costs. 
For more information, visit www.gigamon.com
Or contact Michael Pinto at:  michael.pinto@gigamon.com

Tanium offers a proven platform for endpoint visibility and control that transforms how organizations manage and secure their computing devices with unparalleled speed and agility. Many of the world's largest and most sophisticated organizations, including more than half of the Fortune 100, top retailers and financial institutions, and four branches of the US Armed Forces rely on Tanium to make confident decisions, operate efficiently and effectively, and remain resilient against disruptions. Tanium recently ranked 4th on the Forbes list of "Top 100 Private Companies In Cloud Computing For 2018" and 55th on FORTUNE's list of the "100 Best Medium Workplaces”.

Visit us at www.tanium.com ,  follow us on Twitter at @Tanium or contact us at:  info@tanium.com