Building Resilience and Aligning Strategies: Navigating Cybersecurity and Business Challenges in the Modern Era
In 2025, resilience in operations, business, and cybersecurity is paramount. Companies must adapt to new regulations, manage third-party dependencies, and ensure data privacy. With evolving cybersecurity threats like insider attacks and AI-driven breaches, fresh threat management strategies are essential.
Aligning business goals with cybersecurity, understanding the evolving CISO role, and fostering leadership collaboration are key. This Summit will explore these themes, offering insights and strategies for the future.
Immerse yourself in thought-provoking insights
Exclusively curated from our previous
Security Physical Summit
Core Themes
Resiliency in Operations, Business, and Cybersecurity
In 2025, companies must prioritize building resilience across operations, business, and cybersecurity. This involves adapting to new regulations like DORA, managing dependencies on third parties, and ensuring robust data governance and privacy measures.
Cybersecurity Threats and Management
The landscape of cybersecurity threats is evolving, with sophisticated insider threats and AI-driven attacks becoming a threat. Examining the evolving nature of threat management and identifying new behaviors essential for staff to navigate the changing threat landscape.
Business and Cybersecurity Alignment
Aligning business objectives with cybersecurity is crucial for organisational success. Understanding how the CISO role is developing, promoting collaboration and trust within leadership, and ensuring that cybersecurity is integrated into the fabric of all business operations.
Agenda
1:10 pm - 1:35 pm
Keynote
Standardized Resilience: Building a Future-Ready Cyber Infrastructure
Building a strong and compliant cyber ecosystem in today's fast-changing digital landscape is an ongoing challenge. In this keynote session, Richard White, CISO, will explain how he has approached addressing this complex challenge. You will gain insights into how standardization can enhance cybersecurity and learn from real-world audit successes and failures. Explore how compliance affects organizational integrity and recognize the significance of standardization in cybersecurity. Don’t miss this opportunity to deepen your understanding and practice of cybersecurity!
Join this keynote address to discuss:
- Explore collaboration strategies that enhance resilience and protect digital assets
- Learn from real-world examples of audit successes and failures
- Discover the business impacts of compliance on organizational integrity
1:40 pm - 2:20 pm
Panel
Mastering Resilience: Strengthening Business and Operational Continuity
Resilience in business and operations has become more critical than ever. With the prospect of new regulations on the horizon in the US and abroad, cyber teams are increasingly prioritizing resilience as a core principle. Resilience is a key aim in cyber leadership, as leaders must implement strong operational and business continuity plans. Join this session to unpack how security leaders are considering their business, operational and cyber resiliency and how global regulatory changes are pushing forward strategic plans.
Key Takeaways:
- Balanced Approach: Learn how to balance prevention with response and recovery for a comprehensive cybersecurity strategy
- Regulatory Adaptation: Understand the importance of adapting to new regulations such as US cybersecurity frameworks and the EU's DORA to ensure compliance and resilience
- Mindset Shift: Discover why shifting away from a "zero tolerance for failure" mindset is critical for long-term success
2:20 pm - 2:45 pm
Keynote
Comprehensive Pentesting: Security Testing as a Business Enabler in The Age of Innovation
Most security testing today is purely tactical- we find vulnerabilities and sometimes fix them. But what if a comprehensive approach to security testing could enable organizations to aggressively innovate and take full advantage of business opportunities?
Join us to discuss:
- Focus on what matters most- Internet-facing, mission-critical assets
- Not all PTaaS is created equal- how to get the most from PTaaS
- Risk-based vulnerability management that works
- Maximizing testing value- pattern discovery, remediation and reporting
3:00 pm - 4:00 pm
Roundtables
Track 1: Navigating the Evolving Landscape of Cybersecurity Threats
The landscape of cybersecurity threats is rapidly evolving, with sophisticated insider threats and AI-driven attacks becoming more prevalent. This roundtable will delve into the challenges of managing these advanced threats, with a particular emphasis on insider threats. Participants will explore the need for enhanced risk management strategies and an understanding of human behavior to stay ahead of these threats and protect their organizations effectively.
Key Takeaways:
• Understanding Insider Threats: Learn about the latest insider threats, including AI-driven risks, and their impact on security
• Enhanced Risk Management: Explore strategies to manage insider threats alongside other cybersecurity risks for effective risk management
• Human Behavior and Security Awareness: Understand the role of security awareness training in mitigating insider threats through improved human behaviour
Track 2: The Future of Security is Empowering Developers to Succeed
Rapid software delivery is essential for staying competitive, attracting customers, and growing market share. Yet, application security often lags, creating friction for developers. Modern software delivery demands collaboration between platform engineering and security leadership. Successful companies nurture this partnership to ensure smooth app performance, enhance user experience, and drive innovation. In this roundtable, we’ll explore how organizations can balance speed and security to achieve these goals. By aligning on shared objectives, security and platform teams can ensure reliable apps, boost user satisfaction, and accelerate innovation.
Join us to discuss:
- The evolving partnership between security and platform engineering teams
- Best practices to handle competing priorities and shared responsibilities
- How to keep systems resilient despite inevitable cyber attacks, vulnerabilities, and coding mistakes
Track 3: Harnessing AI: Current Uses and Future Aspirations
Artificial Intelligence (AI), especially generative AI, is transforming industries, with many organizations adopting it to improve efficiency. This roundtable session will gather senior security leaders to discuss their AI implementation strategies, successes, and challenges. Participants will share use cases and best practices, aiming to provide insights on leveraging AI effectively.
Join this roundtable to discuss:
• When discussing potential AI strategies for the next five years, what do you envision?
• Unpacking your AI so far – have you seen the desired benefits so far?
• How do you adjust and review your strategy, and how do you pivot when necessary?
3:00 pm - 6:30 pm
1:1 Meetings
4:10 pm - 4:40 pm
Workshop
Unlocking the Power of Adaptive Leadership: Guiding Teams Through Change
In today's dynamic business environment, CISOs must be adaptable leaders who can transition between different leadership styles based on the situation and the people they are working with. This interactive session will explore timeless leadership philosophies and demonstrate how to apply various styles effectively. Join us to discover how to harness your team's skills, engage stakeholders, and navigate the inherent "changeability" of your business.
Join this interactive session to explore:
- Learn how to adapt your leadership style to different situations and team dynamics
- Understand the importance of a stakeholder mindset in advocating for necessary changes
- Develop strategies to enhance your business's ability to handle unexpected challenges and course corrections
4:45 pm - 5:15 pm
Workshop
Go Hack Yourself: More War Stories from over 100,000 Pentests
Many organizations grapple with the daunting task of ensuring their risk assessment practices are truly effective against real-world threats. In this engaging session, Ellen Sundra will challenge conventional methods by emphasizing real-world exploitability and impact. Drawing from over 100,000 autonomous pentests, she’ll share compelling stories and actionable insights that reveal how viewing your cyber terrain through an attacker’s lens can uncover hidden vulnerabilities, optimize resource allocation, and fortify your defenses against advanced threats. Don’t miss this chance to learn from a leading industry trailblazer on why it’s time to “go hack yourself” to build resilience in today’s borderless threat environment.
Join this session to discuss:
- Focus on Real-World Exploitability: Challenge traditional risk assessments by emphasizing real-world impact
- Attacker’s Perspective: Uncover hidden vulnerabilities by viewing your cyber terrain through an attacker’s lens
- Build Resilience: Learn to fortify defenses against advanced threats by adopting an "offence-driven defense" approach
7:30 pm - 9:30 pm
Gala Dinner
8:00 am - 8:40 am
Panel
Why Cybersecurity is Now a Business Strategy
Cybersecurity is no longer just a technical issue; it's a critical business strategy. This panel will discuss the impact of cyber breaches on reputation, the importance of the CISO as a business leader, and how robust cybersecurity practices can provide a competitive advantage.
Join this session to examine how security can be integrated as a fundamental business function:
- CISO as a Business Leader: Unpack the CISO's role as a vital business leader who aligns cybersecurity with business goal
- Outcome-Driven Approach: Consider how the CISOs can be outcome-driven, adding value and integrating cybersecurity into business strategies
- Competitive Edge: Explore how strong cybersecurity practices can enhance your organization's competitive edge and build trust with stakeholders
8:40 am - 9:10 am
Keynote
The AI Paradox in International Relations: A Guide for Cyber Leaders
The rapid evolution of the internet and artificial intelligence (AI) presents a paradox for international relations (IR), where differing rates of change create significant tensions. This keynote will explore the intersection of internet layers and international systems, emphasizing the need for a comprehensive framework to understand these dynamics. By examining the implications for national security and the role of human operators, Nazli Choucri, Professor of Political Science at MIT, will aim to provide insights into the pathways and transitions necessary for a cohesive knowledge economy.
Join this keynote address to discuss:
- Exploring the gap between the fast-paced internet evolution and the slower progression of international relations and its effects on cybersecurity
- Emphasizing the need for a framework to address the complexities of cyber interactions and their national security implications, particularly regarding the roles of CISOs and cyber leaders
- Discussing how AI influences the future of international systems and the knowledge economy, and how cyber leaders can adapt to improve organizational security and resilience
9:20 am - 12:10 am
1:1 Meetings
9:20 am - 10:20 pm
Roundtables
Track 1: Navigating the Evolving Landscape of Cybersecurity Threats
The landscape of cybersecurity threats is rapidly evolving, with sophisticated insider threats and AI-driven attacks becoming more prevalent. This roundtable will delve into the challenges of managing these advanced threats, with a particular emphasis on insider threats. Participants will explore the need for enhanced risk management strategies and an understanding of human behavior to stay ahead of these threats and protect their organizations effectively.
Key Takeaways:
• Understanding Insider Threats: Learn about the latest insider threats, including AI-driven risks, and their impact on security
• Enhanced Risk Management: Explore strategies to manage insider threats alongside other cybersecurity risks for effective risk management
• Human Behavior and Security Awareness: Understand the role of security awareness training in mitigating insider threats through improved human behaviour
Track 2: The Future of Security is Empowering Developers to Succeed
Rapid software delivery is essential for staying competitive, attracting customers, and growing market share. Yet, application security often lags, creating friction for developers. Modern software delivery demands collaboration between platform engineering and security leadership. Successful companies nurture this partnership to ensure smooth app performance, enhance user experience, and drive innovation. In this roundtable, we’ll explore how organizations can balance speed and security to achieve these goals. By aligning on shared objectives, security and platform teams can ensure reliable apps, boost user satisfaction, and accelerate innovation.
Join us to discuss:
- The evolving partnership between security and platform engineering teams
- Best practices to handle competing priorities and shared responsibilities
- How to keep systems resilient despite inevitable cyber attacks, vulnerabilities, and coding mistakes
Track 3: Harnessing AI: Current Uses and Future Aspirations
Artificial Intelligence (AI), especially generative AI, is transforming industries, with many organizations adopting it to improve efficiency. This roundtable session will gather senior security leaders to discuss their AI implementation strategies, successes, and challenges. Participants will share use cases and best practices, aiming to provide insights on leveraging AI effectively.
Join this roundtable to discuss:
• When discussing potential AI strategies for the next five years, what do you envision?
• Unpacking your AI so far – have you seen the desired benefits so far?
• How do you adjust and review your strategy, and how do you pivot when necessary?
10:30 am - 11:00 am
Future Focus Speakers
Shaping the Future of the CISO: An Interactive Discussion on the Ever-Expanding Role
The role of the Chief Information Security Officer (CISO) is rapidly evolving, with expanding responsibilities and varying career paths, with potential transitions into CIO, CTO or other executive roles, in addition to other consultancy roles and board positions. This interactive session will ask the audience to share their perspective on the future of the CISO role and explore how cyber leadership is evolving.
Join this session to discuss:
- Understanding the evolving scope of the CISO role and potential career paths in other executive positions
- What does the CISO role look like to you over the next 5 – 10 years?
- Addressing the personal pressures and challenges faced by CISOs in their evolving roles
11:05 am - 11:35 am
Interactive Session
Securing the C-Suite: Lessons and Strategies from a High-Profile Attack
In the aftermath of a high-profile attack on a Healthcare executive, in this 30-minute workshop we will explore the evolving landscape of executive protection. We'll examine the lessons learned from the incident and discuss actionable insights for strengthening the security posture of C-suite executives. articipants will gain practical tools for improving executive safety in today’s complex threat environment.
Key Takeaways:
- Best practices executive protection
- Strategies for integrating security with executive leadership
- Tools for identifying and mitigating emerging security threats
12:35 pm - 1:00 pm
Closing Keynote
CISO and Business Alignment: Can This Be Fixed by AI?
The challenge of aligning security with business objectives often positions security functions as obstacles rather than enablers. As CISOs become business leaders, this perception needs to change. In the keynote, Ravi Thatavarthy will share insights from his experience at Rite Aid, where he used AI to bridge alignment gaps and engage stakeholders. He will discuss how aligning security across business functions can improve perceptions of his team as enablers, emphasizing a positive mindset that showcases how AI drives business success. CISOs must cultivate a "yes" mentality to effectively lead organizational change.
Join this keynote address to discuss:
- Approach: Understanding the business needs and problems, and becoming a proactive business partner
- Architecture: Creating solutions that do not compromise data security
- Outcomes: Forming innovation groups, proactively engaging with leadership, and achieving business alignment
1:00 pm - 2:10 pm
1:1 Meetings
2:15 pm - 2:30 pm
Beyond the Challenges
Fairmont Copley Plaza
Fairmont Copley Plaza is a luxury 5-star hotel, centrally located in Boston's historic Back Bay area. It’s been a downtown landmark and symbol of the city's rich history since 1912.
Why attend?
Connect with like-minded senior leaders for a curated agenda, focused on tackling your current business critical challenges and driving industry forward.
Be a part of exclusive shared learning, horizon scanning and actionable insights enabling organizations to deliver transformative strategies.
Build meaningful relationships with solution providers matched to your business priorities to help accelerate your projects and deliver your objectives.