CISO BFSI Summit US | July 19, 2022 | New York, NY, USA


Registration & Networking Breakfast

8:30 AM - 9:00 AM

Welcome Address

9:00 AM - 9:10 AM

Keynote Presentation - Telling Compelling Stories with Data

9:10 AM - 9:40 AM

We live in a data-driven world, where effective graphics are key to the delivery of information. When a graphical piece of information is done right, you can't tell thatthere is design behind it - information flows to the viewer clearly and efficiently.

Dona Wong will demonstrate:

  1. How to turn data into a compelling, persuasive story
  2. How to use graphics effectively in your presentations
  3. The Dos and Don'ts of information graphics- common pitfalls and how to avoid them

Keynote Presentation - Fearless in the Face of Uncertainty

9:45 AM - 10:10 AM
The BFSI industry has topped the X-Force Threat Intelligence Index as the most-attacked industry for the third year in a row. As the threat landscape expands, alertfatigue continues to be a serious problem in terms of risk management and security analyst turnover. Chris will discuss the current climate within the SOAR space andhis views on the trends and future needs of firms seeking to organize Incident Response orchestration. Machine learning and artificial intelligence can assist asecurity team in prioritizing their response strategy, ensuring that analysts can focus on the critical incidents that could dramatically impact their business.

AM Break

10:10 AM - 10:20 AM

Think Tank - How Augmented Analytics Will Help Your Organization

10:20 AM - 10:45 AM

Augmented Analytics focus on specific areas of augmented intelligence, using machine learning to enhance how data and analytics are presented andshared. As the capabilities of this technology advance rapidly, it is pivotal to understand these advancements.


  1. Learn more about Augmented Analytics' role as a key feature of data preparation and management, process management, process miningand data science platforms
  2. How to optimize the decisions and actions of all entire team, not just those of analysts and data scientists
  3. Using Augmented Analytics to automate the process of data preparation, insight generation and insight visualization

Executive Boardroom

10:50 AM - 11:15 AM

Think Tank - Machines Are Friends Not Foes: Cognitive Computing Accelerates the Journey

11:20 AM - 11:45 AM

Popular movies, books and television shows typically position advanced technology as a threat to humanity and all we hold dear. Yet cognitive computing technologies such as Artificial Intelligence (AI), Machine Learning (ML), Natural Language Processing and Augmented Reality (AR) are helping CIOs and CISOs make better decisions faster. We will discuss how cognitive computing can help us navigate the acceleration of activity and decisions that we are experiencing on our digital transformation journeys.


  1. New cognitive computing technologies can be unnerving and difficult to trust
  2. Used properly, cognitive computing technologies such as AI, ML and AR can provide data to humans in such a way to enable us to betterprioritize the decisions we must make and make those decisions more effectively

Executive Boardroom - 3 Best Practices for Application Security (and Bonus Tip)

11:50 AM - 12:15 PM
Applications are the lifeblood of the enterprise, but as the threats multiply, as applications move to the cloud, as legacy applications need to bemaintained, and as organizations seek competitive advantage with new technologies and faster release cycles, it's easy to see that applicationsecurity can be a thankless, endless and challenging job. Imperva has distilled three best practices (and a bonus tip) that help enterprises of any size vastly improve and simplify application security,accelerate threat detection and operationalize application security in a dynamic world where change is the only constant.

Executive Boardroom- Does Data Matter in Business?

12:15 PM - 12:40 PM

Does Data Matter in Business? An interactive and humoroussurvey of lessons from neuroscience and Tableau's largest customers on Data Science, Executive Decision-Making, and the shift to a Data-Driven Culture

Even as data becomes vogue, and data scientists our new celebrities and heroes, there is a elephant in the middle of the room we don't wantto talk about: do people ignore data? More specifically, do executivesand decision-makers ignore what the data says? Learn what neuroscience says about why we ignore data, what some leading companies are doing about it, and what you can do to ensure that you're not left behind.

Think Tank - Tales From the SOC

12:20 PM - 12:45 PM

Let Neustar take you through the key workings of our world class SOC. Learn how we mitigate attacks of all shapes and sizes. Get an overviewof the types of attacks and trends we are seeing. See first hand via our interactive demonstrations how our daily attacks are handled and see a live global attack map. Most importantly though - come prepared with questions to make this interactive and let our experts help and guide you regarding your own needs online Security.

Learning Outcomes:

  • Live DDoS Attack & Mitigation Demonstrations
  • Education on DDoS and other online attacks
  • Fundamental understanding of a SOC
  • Learn from key Neustar customer case study examples
  • Your questions answered on your particular business securityrequirements

Networking Lunch

12:50 PM - 1:50 PM

Think Tank - Regulations Mean Change

1:55 PM - 2:20 PM

More complex regulations, such as the General Data Protection Regulation (GDPR), have come into play due to the rise of data breaches forces. Asdata today is viewed as a such an asset, it is also a tremendous liability. Understanding that, organizations must consider both while they implementtechnologies that will be both innovative their business, but also cost effective.


  1. Understand the latest regulations, such as GDPR
  2. How to tell your CEO and other business stakeholders that data protection can be a key differentiator for your organization
  3. The steps needed to take to be regulatory compliant

Thought Leadership

2:25 PM - 2:50 PM

Legacy Data vs Legacy IT: Overcoming the Challenge and Realizing the Opportunity

In today's evolving insurance market, being stuck with complex, inefficient systems limits your ability to optimize the customer experience, hampers revenue opportunities, and magnifies operational costs across lines of business. While many traditional insurers continue to struggle with the challenges posed by legacy IT systems and processes, industry innovators are discovering new ways to operationalize their data to leverage advanced analytics, AI & Machine Learning capabilities to transform their business. Drawing upon recently launched industryresearch and existing customer examples, MarkLogic's Chief Strategy Officer for Insurance, Steve Forcash will discuss the opportunity that exists for insurance firms to leverage all their data to their advantage.

Key takeaways:

  • Determine key data management issues currently experienced across firms;
  • Identify operational inefficiencies relating to legacy IT systems;
  • Highlight areas where a modern, efficient and cost-effective way to integrate data across the business could benefit the firm;
  • Examine the threat of new Insurtech start-ups who aren't hindered by legacy systems and
  • Understand the opportunity established players have by utilising their legacy data.

Think Tank

2:55 PM - 3:20 PM

Executive Boardroom

3:25 PM - 3:50 PM

Shift Left to Improve Security in Your Cloud-Native Applications

The concept of "shift left" engages security earlier in the development cycle of cloud-native applications, reducing risk as development is accelerated. However, migrating to cloud-native environments often causes loss of existing security capabilities. With the abstraction of the compute layer, security teams need "shift up", focusing on protection of the application itself and securing the DevOps ecosystem that enables it. 

Attend this session to learn why Shifting Up provides improved security and cost efficiency in cloud-native environments, including:

  • Container environments
  • Containers as a Service (CaaS)
  • Serverless implementations

Afternoon Networking Coffee Break

3:50 PM - 4:00 PM

Thought Leadership

4:00 PM - 4:25 PM

Closing Panel

4:30 PM - 5:15 PM

The recent U.S. government bans against Russian-based security products and Chinese smartphones are the latest results of suspicion and distrust of competing world powers. Organizations working with government entities must be aware of the geopolitical stipulations regarding their business relationships. Even with the geopolitical landscape, the buying decisions of security products are still based on trust in the supplier. It is important for CISOs and security leaders to incorporate geopolitical risk in all business-critical software, hardware and services purchasing decisions - even if that means considering local alternatives. 


  1. Review the geopolitical landscape and how it has effected industries and organizations
  2. What to be aware of with your buying decisions
  3. What to anticipate and prepare for in the coming years

Closing Remarks

5:15 PM - 5:25 PM

A CISO's role, goals and objectives have drastically changed over the years as most CISOs supervise teams and units beyond their IT's security. Because of these changes in responsibilities, a CISO's success is measured in greater business metrics. As a result, the role of a CISO has become both more attractive and more demanding.


  1. What are the significant changes regarding the role of the CISO
  2. How to keep up with the changing requirements
  3. How to properly measure a CISO's success

Summit Happy Hour

5:30 PM - 6:30 PM