Defending the digital realm
Intensifying global conflicts, economic instability, and new regulations are placing significant pressure on cyber leaders to perform. While CISOs once faced questions about surviving cyberattacks, to retain their place, they must continue to evolve.
At this Summit, we’ll delve into three pivotal themes that are key to the continued growth of the cyber leader. AI governance and security, where we explore robust frameworks and ethical guidelines to balance innovation with safety; building high-performing teams and setting the right culture for success, focusing on collaboration, empowerment, and strong leadership to drive excellence in cybersecurity; and transforming CISO roles for strategic and operational strength, highlighting the integration of security strategies with business objectives to enhance opportunities and build trust. let's drive innovation and excellence together!
Immerse yourself in thought-provoking insights
Exclusively curated from our previous
Security Physical Summit
Core Themes
Ensuring Responsible AI Governance and Robust Security
Unlock the potential of AI with robust governance frameworks and ethical guidelines. Proactively mitigate risks to ensure compliance and security. Balance innovation with safety to integrate trustworthy AI. Foster a culture of continuous improvement, evaluating new technologies for both benefits and risks, promoting a culture of secure AI use and building stakeholder confidence.
Creating High-Performing Teams: Cultivating a Success-Driven Culture
A leader is only as effective as their team. To build a high-performing cybersecurity team, focus on creating a culture that emphasizes collaboration and open communication. Empower team members and promote a healthy work-life balance. Strong leadership is essential for guiding the team effectively toward achieving security objectives. By fostering a supportive and inclusive environment, you can attract and retain top talent, driving the team toward excellence.
Transforming CISO Roles for Strategic and Operational Strength
Cybersecurity can be a strategic enabler for businesses, rather than just a cost center. By aligning security strategies with business objectives and collaborating with executives, we can integrate security into operations. Emphasizing the benefits of effective cybersecurity enhances business opportunities, builds trust and reputation, and fosters support from stakeholders.
Agenda
1:10 pm - 1:35 pm
Keynote
1:40 pm - 2:20 pm
Panel
Can AI Enhance Your Cyber Resilience?
As resilience becomes increasingly important due to regulatory and business pressures, Chief Information Security Officers (CISOs) face new opportunities and challenges. They must balance using AI to enhance security with the need to defend against AI-driven attacks. While AI can promote innovation and efficiency, it requires careful management for ethical use and compliance. By integrating AI into their cybersecurity strategies, CISOs can protect critical assets and enable secure innovation in the digital landscape.
Join this panel session to discuss:
- AI Governance Framework: What key elements should be included in an AI governance framework to effectively manage risks and maintain trust within an organization?
- Resilience through AI: How can AI be leveraged to enhance cyber resilience, ensuring robust defense mechanisms and quick recovery from incidents?
- Promoting a Security Culture: How can organizations promote a security culture that adapts to changes brought about by AI, and what role do CISOs play in this transformation?
2:20 pm - 2:45 pm
Diamond Keynote
Change Starts with Testing
The threat is always one step of our defense and the gap continues to grow at a rate that budgets can’t keep up with. Most security testing today is purely tactical and only focuses on what vulnerabilities were found. The opportunity before us is to change the game and leverage powerful data from testing to engineer out vulnerabilities and take the exploitable opportunities permanently off the market by never existing.
Join us to discuss:
- Focus on what matters most and why
- Testing data is the new gold to drive change “left”
- Risk-based vulnerability management that works
- Maximizing testing value- pattern discovery, remediation and reporting
3:00 pm - 6:30 pm
1:1 Meetings
3:00 pm - 4:00 pm
Roundtables
Track 1: AI Security Unleashed: Empowering Leaders to Drive Secure Cloud Innovation
In today's dynamic business environment, AI platforms enhance efficiency and agility. Security leaders must ask how to harness this power securely. By focusing on data detection and response, as well as data exfiltration prevention, they can advance productivity safely. Successful AI adoption depends on prioritizing resilience and understanding controllable factors. This session will provide actionable insights to navigate AI security challenges in the cloud era, focusing on leadership and strategic foresight.
Join us to explore:
- AI Guidelines: Design frameworks that balance innovation and security for confident AI integration
- AI Content Monitoring: Implement robust monitoring to track AI-generated content, ensuring compliance and mitigating risks associated with unauthorized or harmful material
- Data Exfiltration Prevention: Explore proactive strategies to detect and prevent data leakage, manage data rights, and enhance operational response
Track 2: The Blind Spot in Your Stack — A CISO Working Session on Data-Layer Defense
Your stack is strong—but what about the parts no one owns? In this closed-door, peer-driven session, Alex Hesterberg, CEO of Superna, will lead an unfiltered conversation about the growing exposure gap at the data layer. This will be a strategic exchange designed for CISOs who know that dashboards and alerts aren’t enough when the real target is data. You’ll leave with sharper questions for your team, new perspective on your blast radius, and a clear sense of what a modern data-layer defense should look like
We’ll explore critical questions:
- If 10GB of files walked out tomorrow, would your team notice?
- If you had perfect visibility into your data, could anyone act on it?
- How fast can you contain a breach once it hits your unstructured data?
Track 3: Mastering AI Risk Management: Ensuring Safe and Secure AI Deployment
In the rapidly evolving landscape of AI, ensuring robust privacy and security controls is paramount. This session will delve into the complexities of AI risk management, providing cyber leaders with the tools and frameworks necessary to identify, assess, and mitigate risks associated with AI systems. By focusing on ethical considerations, compliance, and robust security measures, this session aims to equip leaders with actionable insights to master the challenges of AI governance effectively.
Join this roundtable session to discuss:
- AI Risk Management Frameworks: Implement frameworks to address security, privacy, ethics, and compliance in AI
- Ethical AI Deployment: Ensure AI systems align with organisational values and regulations
- Comprehensive Security Controls: Essential security measures for all stages of the AI pipeline
4:10 pm - 4:40 pm
Learning Lab
Cyber Groundhog Day…
This workshop takes a relational and strategic look at the repetitive nature of today’s cybersecurity programs and how doing the same thing year after year quietly sets teams up to fail. We’ll unpack why traditional checkbox compliance, stale training, and legacy tools are losing their punch, and explore how people-first, risk-based approaches are the way forward.
This isn’t your typical “cyber best practices” session. We’re flipping the script to expose what isn’t working and how to actually move the needle.
Join us as we explore:
- Why security teams feel stuck in a loop (and what to do about it)
- How to balance compliance with real risk-based defense
- What actually makes security training stick
- How to re-humanize your program without burning everyone out
4:45 pm - 5:15 pm
Workshop
Navigating Software Risks: What’s Next for 2025?
Join Veracode’s CISO, Sohail Iqbal, as he shares invaluable insights from over 15 years of research on the ever-evolving software security landscape. In this engaging session, you'll discover how to transition from reactive patching to a proactive, context-driven approach to managing risk. Explore the new challenges posed by GenAI, which accelerates code risk, and learn how to keep pace with the rapid generation and remediation of code. Leave knowing practical strategies to enhance your security posture and align it with your business objectives.
Join us to discover:
- Why do organizations have more security debt despite having more tools
- Actionable approach to building secure by-design applications
- A new way of thinking about prioritization and AI that could have a significant impact on your backlog
- How to assess unified risk across the organization to understand the implications and prioritization
7:20 pm - 9:30 pm
Gala Dinner
8:30 pm - 9:00 pm
Dinner Keynote
Cybersecurity As a Strategic Opportunity
In today’s digital age, organisations must view cybersecurity as a strategic enabler rather than just a technical requirement. Dr. Dave Chatterjee argues for integrating cybersecurity into core business strategies to foster trust and innovation. By leveraging real-world case studies and the Commitment-Preparedness-Discipline (CPD) framework, he illustrates how businesses can manage risks, unlock new models, and strengthen stakeholder confidence. This keynote is a call to action for executives, board members, and technology leaders to reimagine cybersecurity as a boardroom imperative—one that empowers organizations to thrive in the face of adversity and opportunity alike.
Key Takeaways:
8:00 am - 8:10 am
Day 2 Opening
8:00 am - 8:40 am
Panel
The Key Traits of a Successful and Influential Leader
Effective leaders build trust, inspire innovation, and drive performance. For cyber leaders, these traits are essential for guiding teams and ensuring the security of IT infrastructure. In this session, we will explore how leaders can leverage these qualities to enhance their organization's security posture through effective endpoint management. We will discuss key leadership traits and strategies that promote innovation, trust, and teamwork, creating a lasting positive impact on the organization and its members.
Join this engaging session to discuss:
- High-Performing Teams: Attract and retain top talent with secure, seamless access to resources
- Influencing Stakeholders: Enhance collaboration with secure access to information and systems
- Adapting to Change: Promote resilience and accountability by managing evolving access rights
8:40 pm - 9:05 pm
Platinum Keynote
AI Won't help you here!
As we continue to make advancements in data processing and close in on AGI, we also experience what seems to be an overuse of AI, resulting in a deterioration in humans' trust in such AI applications. In this talk, we'll take a step back and discuss the way that AI has been abused (rather than used), the challenges in deploying AI in specific scenarios, and the different available approaches (hint - not every AI is a GenAI) to address problem sets.
We'll cover the practical aspects of what we expect AI to solve and whether we actually get what we "paid" for (i.e., how to set metrics for the efficacy of the AI solution and measure it consistently to evaluate it against other AI implementations).
Join this session to discuss:
- Demystifying the buzz around AI and GenAI specifically
- Understand the strengths and weaknesses of AI applications
- Create a simple methodology for mapping problems to potential solutions
- Create success criteria around applying AI to your environment
9:20 am - 12:10 pm
1:1 Meetings
9:20 am - 10:20 am
Roundtables
Track 1: AI Security Unleashed: Empowering Leaders to Drive Secure Cloud Innovation
In today's dynamic business environment, AI platforms enhance efficiency and agility. Security leaders must ask how to harness this power securely. By focusing on data detection and response, as well as data exfiltration prevention, they can advance productivity safely. Successful AI adoption depends on prioritizing resilience and understanding controllable factors. This session will provide actionable insights to navigate AI security challenges in the cloud era, focusing on leadership and strategic foresight.
Join us to explore:
- AI Guidelines: Design frameworks that balance innovation and security for confident AI integration
- AI Content Monitoring: Implement robust monitoring to track AI-generated content, ensuring compliance and mitigating risks associated with unauthorized or harmful material
- Data Exfiltration Prevention: Explore proactive strategies to detect and prevent data leakage, manage data rights, and enhance operational response
Track 2: The Blind Spot in Your Stack — A CISO Working Session on Data-Layer Defense
Your stack is strong—but what about the parts no one owns? In this closed-door, peer-driven session, Alex Hesterberg, CEO of Superna, will lead an unfiltered conversation about the growing exposure gap at the data layer. This will be a strategic exchange designed for CISOs who know that dashboards and alerts aren’t enough when the real target is data. You’ll leave with sharper questions for your team, new perspective on your blast radius, and a clear sense of what a modern data-layer defense should look like
We’ll explore critical questions:
- If 10GB of files walked out tomorrow, would your team notice?
- If you had perfect visibility into your data, could anyone act on it?
- How fast can you contain a breach once it hits your unstructured data?
Track 3: Mastering AI Risk Management: Ensuring Safe and Secure AI Deployment
In the rapidly evolving landscape of AI, ensuring robust privacy and security controls is paramount. This session will delve into the complexities of AI risk management, providing cyber leaders with the tools and frameworks necessary to identify, assess, and mitigate risks associated with AI systems. By focusing on ethical considerations, compliance, and robust security measures, this session aims to equip leaders with actionable insights to master the challenges of AI governance effectively.
Join this roundtable session to discuss:
- AI Risk Management Frameworks: Implement frameworks to address security, privacy, ethics, and compliance in AI
- Ethical AI Deployment: Ensure AI systems align with organisational values and regulations
- Comprehensive Security Controls: Essential security measures for all stages of the AI pipeline
10:30 am - 11:00 am
Presentation
Stress Comes with the Job: Leader and Employee Perspectives
In the fast-paced world of cybersecurity, leaders such as CISOs face immense pressures. The ongoing threat of cyberattacks, the responsibility to protect sensitive data, and the need to stay ahead of evolving threats create a challenging environment. This session will explore two high-pressure scenarios that cyber leaders commonly encounter and discuss effective stress management strategies for both individuals and teams, providing insights into maintaining resilience and performance under pressure.
Join this session to discuss:
- Techniques for leaders to stay calm and focused during high-pressure situations
- Strategies to support and build a resilient cybersecurity team
- Best practices for communicating during crises to stakeholders and team members
11:05 am - 11:35 am
Sponsor Workshop
The Impact of Modernizing Cloud Security
Currently, enterprises struggle with cloud security because they operate in silos, limiting visibility, creating inconsistent policies, and slowing response times. A more effective approach is to adopt a horizontal, integrated security framework that promotes collaboration, centralized controls, and real-time data sharing across teams. This shift enhances visibility, accelerates incident response, ensures consistent policy enforcement, and strengthens overall security posture.
Join this session to learn how several Wiz customers have successfully transformed their security operations this way, resulting in improved threat detection, compliance, and agility in managing cloud environments.
Leave having discussed:
- Problem statement: The current cloud security operating model is not working
- Why is it not working? cloud security is typically done vertically in silos
- A better approach: Need to transform to a horizontal approach and break down silos
- The impact of doing the above. Examples from Wiz customers
12:35 pm - 1:00 pm
Closing Keynote
A Mindset Shift: Embracing Simplicity in Cybersecurity
The need for effective digital transformation is significant in today’s landscape of evolving digital threats. Kevin J. Scott, the CTO/CIO of the PGA of America, has successfully navigated this landscape by implementing strategies rooted in a philosophical approach of simplicity, effectively reducing his organisation's attack surface. In this session, Kevin will share his experiences, outlining the steps he took and the approach that guided his success. Attendees will gain insights into applying these strategies within their organisations, making this session vital for any cyber leader aiming to enhance digital defences.
Join this session to explore:
- Mindset shift: Understanding how simplicity is the weapon against attackers
- Practical Strategies: Discover actionable steps to make your organization less attractive to hackers
- Real-World Insights: Apply lessons from Kevin's experience to your challenges
1:05 pm - 2:10 pm
1:1 Meetings
2:15 pm - 2:30 pm
Beyond the Challenges

Fairmont Dallas - Dallas TX
Fairmont Dallas is ideally located in the heart of the downtown Dallas Arts District, surrounded by an array of fine-dining restaurants, shopping, arts and entertainment.

Why attend?
Connect with like-minded senior leaders for a curated agenda, focused on tackling your current business critical challenges and driving industry forward.
Be a part of exclusive shared learning, horizon scanning and actionable insights enabling organizations to deliver transformative strategies.
Build meaningful relationships with solution providers matched to your business priorities to help accelerate your projects and deliver your objectives.