Chief Information Security Officer

Full Day Meeting


May 06, 2020


Unfortunately, there isn’t a cyber defense or information system that is 100% secure. What’s safe today won’t be tomorrow given the profitable nature of cybercrime. Criminals are constantly finding new methods of attack. That said, it’s critical to be on top of the latest business and tech strategies to safeguard your organization’s data.

The Argyle Group presents the CYBERSECURITY LEADERSHIP FORUM New York event, an intimate gathering of CISOs and senior-level IT & cybersecurity executives in search of peer-to-peer discussions and deep-dive examination of the latest cybersecurity technologies and processes.

 With an emphasis on advanced threat defense, endpoint protection, cloud security, security analytics and intelligence, data protection, and emerging trends in identity and access management, this must-attend event will present cybersecurity case studies from top-tier companies with an enterprise perspective.  

By attending this “by invitation only” event, you will better understand:

  • The latest cyber threats and defenses (ransomware, denial of service (DoS), state sponsored attacks, and more)
  • Actionable strategies for securing cloud-based systems, data and infrastructure
  • Data privacy regulations including the latest NY legislation (SHIELD Act, pending laws and related lawsuits)
  • Future of cybersecurity operations - How automation technologies, processes and solutions are transforming the digital enterprise

Join us for this day of deep dive discussions regarding the above and more. You’re also invited to join us for our CIO LEADERSHIP FORUM – New York event taking place the previous day on Tuesday, May 5. Attend one or both events and walk away with specific strategies and actionable steps to take your organization to the next level of digital transformation and data security.

Join Us at this Event

Enter your mobile number to receive updates and reminders regarding this event.

Who Should Attend


If you'd like to recommend a speaker, please email

Jerry Gamblin

Jerry Gamblin

Principal Security Engineer

Kenna Security

Michael Mazza

Michael Mazza

Executive Director

Morgan Stanley

Juan Morales

Juan Morales

Deputy CISO, Global Information Security

Realogy Corporation

Sajed Naseem

Sajed Naseem

Chief Information Security Officer

New Jersey Court System

Eric Wenck

Eric Wenck

Chief Information Officer

Catapult Learning


Download Agenda
7:30am - 8:30am
8:30am - 8:40am
8:40am - 9:15am
KEYNOTE PRESENTATION: Security Architecture - Identifying and Analyzing Architecture and Design Vulnerabilities

Session description coming soon.

Michael Mazza
Executive Director
Morgan Stanley


9:15am - 9:45am
Table Talks

Join us for these intimate group peer-to-peer Table Talk discussions, whereas topics of discussion will be based upon the topics you indicated you would like to discuss further, as per your answers in Argyle’s pre-event insight survey. In these off-the-record exchanges of ideas, session attendees will have the opportunity to share their greatest challenges, pain points, and real-world decision-making efforts & solutions to said obstacles.

9:45am - 10:05am
THOUGHT LEADERSHIP:The Journey To Risk-Based Vulnerability Management

With an exponential increase in the volume and velocity of new vulnerabilities, security and operations teams find it difficult, if not impossible, to meet the increasing remediation demands.

In this presentation, we will discuss and explore practical ways to address the increasing challenges and roadblocks of modern vulnerability management. In particular, how does a practitioner transition from a traditional vulnerability management program to a data-driven Risk-Based Vulnerability Management Program?

Jerry Gamblin
Principal Security Engineer
Kenna Security

10:05am - 10:30am


10:30am - 10:50am
THOUGHT LEADERSHIP: Blockchain-Based Solutions for Cybersecurity

Blockchain is one of the biggest buzz words of the past few years.  NASA and many other risk-laden enterprises have implemented blockchain-based solutions to improve cybersecurity and prevent denial of service (DoS) and other attacks.  Blockchain can be used to ensure that data is encrypted, which makes modification of the data more difficult.  Could blockchain be your next best line of defense? 

In this session, key takeaways will include:

  • Pros and cons of blockchain-based solutions
  • What’s working in terms of blockchain as a cybersecurity tool
  • How blockchain security is evolving
10:50am - 11:35am
PANEL DISCUSSION: Establishing & Enhancing Security in Cloud Environments

Cybersecurity in the cloud is a growing issue. Building virtual walls to protect the massive amount of data that most enterprises now store in the cloud, requires specific policies, controls, and procedures. Deciding which cloud security solution makes the best sense and crafting processes to protect data and infrastructure is a 24-hour a day job. Anyone tasked with ensuring the security of a cloud environment will want to attend this robust discussion of cloud security essentials.

Attend this session to learn what might be missing from your security, data center and cloud infrastructure, and:

  • How to configure cloud security that meets business needs
  • Common hybrid cloud issues and how to address them
  • Best practices for automation, monitoring and measurement of cloud security
  • Proven processes for handling cloud-centric identity and access management


Eric Wenck
Chief Information Officer
Catapult Learning

11:35am - 11:55am


11:55am - 12:15pm
THOUGHT LEADERSHIP: Addressing Risk & Security in SaaS Agreements

From data access and stability issues to lack of transparency, SaaS requires strong agreements between organizations and technology providers.  A SaaS agreement is a legal contract, and failure to include the right risk and security related language and clauses could land your enterprise in a hack-laden crisis situation.

In this session, you will learn:

  • What to include in your written agreements
  • What some companies have left out and the results of such
12:15pm - 1:00pm
PANEL DISCUSSION: Cyber-Resilience as a Company Culture

Almost one-third of all U.S. businesses have suffered a data breach, and attacks are on the rise.  Although cybersecurity is top of mind of every CISO, the most secure enterprises have taken cybersecurity to a culture level.  Employees are often the first line of defense to avoid a cyber intrusion and that’s why building a cybersecurity culture in the workplace is more important than just pushing policies.

In this session, topics of discussion will include, yet will not be limited to:

  • Why it’s so difficult to create a security culture
  • Tips for gaining employee and executive buy-in
  • Which training and engagement processes actually work
  • Metrics that will help you monitor post-training behavior
  • How to make even the most tech queasy employees feel comfortable reporting security issues


Juan Morales
Deputy CISO, Global Information Security
Realogy Corporation

1:00pm - 2:00pm


2:00pm - 2:35pm
ROUNDTABLE DISCUSSION: Secret Sauce to Recruiting, Training & Retaining Top Tech Talent

The universal challenge of securing top tech talent rages on! Finding IT employees with the skillsets you require is no easy task in an everchanging tech-centric culture and economy. Job candidates have a vast array of employment choices and offers - and your organization must employ innovative hiring technique to remain competitive.

In this session, we will conduct a very lively group discussion regarding:

  • How to use training as a retention and attraction tool
  • Surprising resources and methods some companies are using to find employable tech talent
2:35pm - 2:55pm


2:55pm - 3:40pm
FIRESIDE CHAT: U.S Political & State Sanctioned Cyber-Attacks and Challenges

From propaganda, to espionage and the threat of election tampering, national cybersecurity risk is at an all-time high. State-sponsored attacks are operations that include direct nation-state activity and proxy activity carried out by criminals, governments, political parties, and “hacktivists”. Attend this session and learn more about the latest national threats, responses and how to best defend your enterprise in 2020 and beyond.

Topics of conversation will include, yet not be limited to:

  • Updates on government-wide rules to name and sanction actors who assist with nation-state-sponsored cyberattacks
  • Cities that have been crippled by cyber-attacks and lessons learned in the attacks
  • Nationwide cybersecurity trends expected in 2020 and beyond
3:40pm - 4:15pm
KEYNOTE PRESENTATION: Real Talk on Ransomware

Ransomware attacks bring companies to their knees! One of the most damaging cyberattacks, ransomware worries top every CISO’s nightmare scenario list. According to most industry estimates, ransomware cost Americans over 7.5 billion dollars in 2019 alone.  This session will delve into the latest ransomware attacks and how to defend your organization.

In this timely session, you will learn:

  • The latest iterations of ransomware attacks
  • What to do before, during and after an attack
  • The latest technologies available to fend off these dangerous attacks

Sajed Naseem
Chief Information Security Officer
New Jersey Court System

4:15pm - 4:20pm
4:20pm - 5:20pm


This event will feature insights from top executives, including

  • Thought Leadership Spotlight Partner

  • Panel & App Partner

Interested in sponsoring an event?

Speak to one of our dedicated sponsorship teams

Sponsorship Information

Advisory Board

We are proud to share with you the following Argyle Industry Influencers. Their contributions to Argyle help keep the programs we offer our membership current and relevant, so we can continue delivering you premiere experiences, content development, and membership engagement.