NYF Banner.png


Over the past year, technology and the IoT has exploded - and security challenges are only becoming more fluid. For organizations to stay at the apex, collaboration with the best minds in the space and a future-forward mindset is more important than ever. The 2018 Summit Topics are developed with CIOs, CISOs and executives and provide a tremendous amount of value to those who are looking to understand best practices in IT. The peer-to-peer Executive Roundtable Sessions have proven to be an exceptional resource for executives- providing real answers to issues facing their organizations and the industry.

7:15am – 8:40am

8:40am – 9:00am
Registration Opens with a Breakfast Buffet and Networking in the Sponsor Pavilion

Welcome and Opening Remarks

Mary Lou Heastings
Executive Alliance Inc.
Richard Warner 
Television and Radio Host
Summit Moderator

9:00am – 9:30am

State of the Industry


Michael Barba
Managing Director - Technology and Business Transformation Services



Darin Mastricola

Vice President, IT Compliance and Governance

Sompo International

9:30am – 9:50am

Guiding Information Security into the Future


Lee Parrish

Vice President, Chief Information Security Officer

Blucora, Inc.


With a career that has spanned two decades as CISO at global Fortune 500 corporations, engineering and data management firms, Lee Parrish with Blucora will focus on key skills needed, what will set CISOs apart, and how he and his peers plan to overcome some of the biggest challenges facing the industry in the future.

9:50am – 10:20am

Complete Lifecycle Approach to Advanced Threat Protection


Gregory Shadle

Enterprise Director Systems Engineering

Symantec, Platinum Sponsor


Due to the inevitability of advanced targeted attacks that fly under the radar of traditional, preventative-based security technologies, there is a shift toward a more modern defense-in-depth strategy—one that provides the intelligence, context, and real-time situational awareness needed to detect today's advanced threats. This defense is the first to integrate a business process view that aligns with how your security team operationalizes new intelligence and technologies to fortify your security infrastructure against future attacks. This session will provide insights into how this approach will empower your organization, enabling you to adopt the best new technologies that drive your business.

10:20am – 11:00am

Morning Break - Powered by symantec_logo_powered by


11:00am – 11:20am

Top of Mind

top of mind.png
Richard Warner 
Summit Moderator

Interactive polling session with executive attendees discussing some of their top issues of the day and how their industry peers respond.

11:20am – 11:40am

Cloud Security: The Art of Securing the Perimeter When There's No Perimeter.


Michael Melore

Cyber Security Advisor

IBM, Gold Sponsor


Securing the cloud is more challenging than securing an on-premise infrastructure. How do you secure what you don't own? How do you secure external services your business users may be subscribing to without your knowledge and authorization? How do you maintain compliance when multi cloud providers are part of your ecosystem? Who owns the security responsibility for different services offered? This session will focus on effective security approaches to these variables.

11:40am – 12:00pm

The Shift in Information Security

From a beginning years ago as techies, to now a savvy group of seasoned business executives, security leaders are now at the forefront of their organizations.  This CISO discussion focuses on some of the latest thought leadership on problem solving as the current information security landscape becomes more diverse and complex.

12:00pm – 12:20pm

Privileged Attack Vectors - Building Effective Defense Strategies to Protect Organizations


Morey Haber

Chief Technology Officer

BeyondTrust, Gold Sponsor


Cyber-attacks continue to increase in volume and sophistication. As a result, data breaches are no longer surprising or even news worthy. It’s not a matter of if, but a matter of when you will be successfully breached. This session will provide a comprehensive view of how privileges, passwords, and vulnerabilities are being leveraged as attack vectors and how you can properly take measurable steps to defend against them.

12:20pm – 1:30m

Lunch and Networking

1:30pm – 1:45pm

What’s Next?

whats next

Interactive polling session with executives discussing where their concerns are as they look at the state of the industry.

1:45pm – 2:05pm

Your Bank’s Digital Side Door


Ed Adams

Distinguished Research Fellow at The Ponemon Institute

Co-founder and Chairman of OnBoard Security, Inc.

President and CEO of Security Innovation, Inc.

Gold Sponsor


Why does my bank’s website require multi-factor authentication but my money management software does not? How are they communicating with each other? These questions led to a deeply disturbing exploration of the 20 year old Open Financial Exchange (OFX) protocol and the 3000+ North American banks that support it. 30 different implementations running in the wild amount to an inviting attack surface — a digital side door into millions of consumers’ privacy and personal savings.


2:05pm – 3:05pm

Executive Breakout Roundtable Discussions - Rotation 1


Byron Arnao

Senior Director & Evangelist

Capital One

Topic #1: Blockchain

The amazing technology that burst Bitcoin (BTC/BTH) and the newly sustaining Ethereum (ETH/ETC) onto the scene! It is used in financial management services, logistics management, medical records, etc.

Can a transaction be securely verified without the identity of the user being captured?            


Lisa Tarsi

Head of Security Team

Scholastic Corporation 

Topic #2: Measuring Security as a Business Value

Quantifying and proving the value of security to your CEO and business units still proves to be difficult. How are security organizations being successful in showcasing their strategies and underlying results?


Bernadette Gleason

Vice President, Information Security Officer


Topic #3: “Security Awareness Investment…is it Worth it?

Increased spending on security awareness training for employees is expected to still continue at a fast rate. The question often being asked by senior management is “how much value are we getting in return for the amount of spend?”  


Todd Gordon

Director, Information Security

EisnerAmper LLP

 Topic #4: Cyber Risk Discussions at the Board Level

As information on the challenges surrounding information security continues to gain traction with senior business leaders, security organizations need timely and actionable data to help reduce their company’s risk profile.  Discussions being held at board levels have moved to a more mature conversation with the focus on risk and its impact to a company’s brand, customer and revenues.


Christine Whalley

Director, Information Security

Barnard College 

Topic #5: Information Risk Management Programs – Getting It Right

Cyber security readiness continues to evolve at a rapid pace as changes in the threat landscape forces organizations to be more vigilant than ever before.  In turn, the evaluation and prioritization of risk has taken on more importance to the business in order to make the right decisions.  



3:05pm – 3:25pm
Afternoon Break
3:25pm – 4:35pm
Executive Breakout Roundtable Discussions - Rotation 2 with Debriefs
4:30pm – 4:45pm

Closing Remarks

4:45pm – 5:45pm
Reception and Networking with Prize Drawings