-
08:00 – 08:45
Registration & Coffee in the Exhibition Area
-
8:45 - 8:55
Chair’s Opening Remarks
Johanthan Sander - Field CTO - Astrix Security
-
8:55- 9:00
Speed Networking – Making new connections at CISO Financial Services NY!
During this 5-minute networking session, the aim of the game is to go and meet two people you don't already know.
-
09:00 - 09:30
Opening Panel: Confessions of CISOs: What They Don’t Tell You About the Job
- How can sleepless nights, board politics, and regulator heat be managed without burnout?
- Which AI-driven threats and hybrid risks are keeping CISOs awake in 2026?
- When speed clashes with security and compliance with agility, how can the trade-offs be survived?
- What do CISOs wish had been known before stepping into the role?
Moderator: Mo Jamous, EX Chief Information Officer, Consumer & Business Banking – U.S. Bank
Matthew Presson, CISO for the Americas – Bullish
Paul Pak, Chief Information Security Officer, Head of Information Governance - Jennison Associates
Scot Miller, SVP, Information Security - Rocket (Advisory board member)
Christopher Russell, CISO & Head of Tokenization – TZERO GROUP
-
09:30 - 10:00
Presentation: Did you know your firm has crypto trading platform?
Paul Pak - Chief Information Security Officer, Head of Information Governance - Jennison Associates
From ramp and dump schemes (pig butchering) to executive assassinations/executive cyber stalking, why you need to have a Brand and Executive Protection Program in the world of AI and why you need one now.
-
10:00 - 10:30
Expert Ask-Me-Anything: AI, Risk & Regulation
An informal, interactive session where the audience will ask questions live, on the spot.
Speakers respond in real time to questions on AI risk and security, regulatory challenges (SEC, NYDFS, DORA), board-level communication, and building resilient cyber teams.
Moderator: Alexander Abramov, Head of Information Risk -Financial Services
Mo Jamous, EX Chief Information Officer, Consumer & Business Banking – U.S. Bank
Robert LaRosa, Information Security Engineer – GELLER
Johanthan Sander, Field CTO- Astrix Security
-
10:30-10:45
Malware, Money Laundering & the Markets: Unmasking Hidden Financial Exposures
Donovan Stevens - Principal Sales Engineer - SpyCloud
Financial services organizations face a uniquely complex attack surface – one where cybercriminals exploit exposed consumer identities, often without detection. At the center of this threat: infostealer malware, silently exfiltrating identity data including authentication cookies, credentials, and session tokens to bypass MFA and expose critical access points.
In this session, we’ll share our findings on how malware infections are fueling fraud, money laundering, and platform abuse across banks, insurers, and payment service providers. We’ll walk through a few real-world examples revealing how security and fraud teams are leveraging recaptured darknet data to detect the intersection of legitimate accounts with criminal marketplaces – surfacing hidden exposures before damage is done.
Whether it’s a single infected consumer device linked to fraudulent activity and 30+ suspicious accounts, or credentials surfacing on Telegram, these threats are happening now. Join us to better understand the lifecycle of malware-based threats and how leading financial institutions are using identity-centric strategies to prevent attacks using recaptured data.
-
10:45-11:00
Fireside chat with Fastly
Kelly Shortridge, Chief Product Officer -Fastly
-
11:00-11:30
Mid-Morning Coffee & Networking in the Exhibition Area
-
The CISO Boardroom
-
11:30-12:00
Presentation: Agentic AI in Financial Services: Strategic Defense for the Autonomous Threat Era
Frank Teruel - Chief Operating Officer - ArkoseLabs
- Potential fraud patterns targeting financial services through agentic AI
- Strategic principles for adaptive trust in authentication and transaction flows
- Decision criteria for evolving your security architecture beyond traditional bot detection
-
12:00-12:15
Live Poll Debate: Would You Trust AI to Act Before Your Team Can?
Experts go head-to-head, using real incidents and risks from the field. We’ll start with a live poll to see where the room stands, then run it again at the end to track if minds have shifted.
The debate centers on one tough question: should we ever let technology act on its own during a live cyber incident in financial services?
The audience is part of it too so ask your questions, share your views, and see how your take stacks up against your peers.
John Decker, Chief Technology Officer -Trian Partners
Mo Jamous, EX Chief Information Officer, Consumer & Business Banking – U.S. Bank
-
12:15-13:00
Discussion group A: What Happens When Agentic AI Runs Your Security Ops Before You Do?
What risks come with AI-on-AI escalation between defenders and adversaries?
- How can effective oversight frameworks be built for AI-augmented SOCs?
- What early wins, and early fails are showing up in adopting agentic AI for security?
- How can human analysts stay in the loop when machines move first?
Moderated by Valery Milman - Sr. Manager, Systems Engineering - ForeScout
Ellis Wong, Chief Information Security Officer - JST Capital
Scot Miller, SVP, Information Security - Rocket (Advisory board member)
Mahesh Addanki, Cyber Security Engineer - BlackRock
-
Cloud & DevSecOps Lab
-
11:30-12:00
Presentation: Lessons from the Trenches: DevSecOps in Regulated Finance
Ellis Wong - Chief Information Security Officer - JST Capital
- Which pipeline controls are best enforced through policy-as-code?
- How can security checks be safely delegated to dev teams in regulated contexts?
- What metrics demonstrate DevSecOps reducing audit findings?
- Where does human review still outperform automated tools in Financial Services?
-
12:00-12:15
A Reality Check for DevSecOps Leaders
The moderator will share a series of real-world statements, with the audience voting yes / no / maybe before opening the discussion. The focus is on how security, development, and operations actually work together in practice.
Topics include managing third-party risk in fast-moving cloud environments, navigating overlapping compliance requirements, measuring what really matters for boards, and whether current resilience and incident-response plans would stand up in a real event.
Julia Cherashore, Senior Fellow - Data Foundation / Adjunct Professor - Fordham University
-
12:15-12:45
Presentation: When Banks Hold the Keys: The New CISO Reality Post-SAB 122
Christopher Russell - CISO & Head of Tokenization - TZERO GROUP
- What SAB 122 changes for CISO accountability and audit scrutiny
- How “probable loss” is being interpreted, measured, and defended in practice
- The evolving institutional threat landscape once banks hold the keys
- How existing security, identity, and governance models must adapt conceptually
-
13:00 – 14:00
Lunch & Networking in the Exhibition Area
-
TRACK A
-
14:00-14:20
Presentation: The Five Habits of Highly Secure Organizations
Ben Rothke - Senior Information Security Manager - Experian
Companies that have developed world-class information security programs have achieved their goals by focusing on security within a risk-mitigation framework.
This session will reveal the five main habits shared by the most secure organizations. By focusing on these habits, organizations can spend much less on security while gaining a significant level of security.
-
TRACK B
-
14:00-14:20
Presentation: Insider Risk 2.0: When AI Changes the Threat Landscape
Hasan Dimdik - Senior Workplace Security Engineer - ING
AI is changing the nature of insider risk, amplifying the impact of trusted users and blurring the boundary between productivity and threat. As identities gain more power and controls struggle to keep pace, organisations must rethink insider risk through behaviour, context, and AI-driven defence.
-
Plenary sessions
-
14:20-14:40
Presentation : Beyond the Breach: What Diplomatic Targets Reveal About Financial Sector Risks
Gharun Lacy - Deputy Assistant Secretary of State for Cyber and Technology Security Bureau of Diplomatic Security - U.S. Department of State
-
14;40-15:10
Panel Discussion: Who Owns the Fallout around when GenAI use misfires — Security, Risk, or the Board?
- Who owns AI risk when models impact lending, underwriting, or fraud detection?
- How do organisations embed AI monitoring into existing cyber and risk management frameworks?
- What guardrails help prevent AI misuse without stifling innovation?
- How should firms prepare for AI-specific incidents such as data leakage or model poisoning?
Moderator: Neil Cohen, Head of Marketing - Portal26
Robert LaRosa, Information Security Engineer - GELLER
-
15:10-15:40
Presentation by Darryl Jones, VP, Consumer Segment Strategy -Ping Identity
-
15:40- 16:10
Afternoon Break & Networking in the Exhibition Area
-
16:10-16:30
Panel Discussion: Cloud Security: What’s Working and Where We’re Over-Engineering
- Where cloud security breaks in real operating environments
- Where DevSecOps enables delivery, and where it introduces friction
- Which signals drive action versus noise during cloud incidents
- What leaders would simplify or remove from today’s cloud security stack
Moderator: Julia Cherashore, Senior Fellow - Data Foundation / Adjunct Professor - Fordham University
Mahesh Addanki, Cyber Security Engineer - BlackRock
Aaron Katz, Chief Information Security Officer-THE TCW GROUP
-
16:30-17:00
Panel Discussion: How to Stop Compliance Spend Becoming a Black Hole?
- Where do compliance frameworks overlap across borders, and how can the duplication be cut?
- What makes a compliance budget credible as resilience spending?
- When does compliance move from obligation to competitive advantage?
- Which signals of audit readiness build market trust?
Moderator: Alexander Abramov, Head of Information Risk -Financial Services
Nishit Mehta, Vice President, Analytics Solutions Manager – JPMorganChase
Robert LaRosa, Information Security Engineer - GELLER
-
17:00 -17:05
Chair’s Closing Remarks
Johanthan Sander - Field CTO - Astrix Security
-
17:05 - 18:00
Networking drinks and Prize Draw
Not Found