Future of IT & Cybersecurity

National Summit

November 6, 2025 - New York, NY

Attend this event

Company is Required

By clicking the “Register" button, you are agreeing to the Privacy Policy and Terms of Use

Visionaries

Erin B (Filler) The AES Corporation
Erin Boyd

Chief Digital Commercial Transformation Officer

The AES Corporation

Summit Speaker

Dr. Erin Boyd is an energy economist with 25+ years of experience working across a multi- dimensional spectrum of organizations, economies and sectors including: consultancies focused on small to large scale energy access in developing and emerging markets as well as competitive behavior in European electricity markets; public and private utilities crafting optimal energy tariffs to incent desired outcomes; non-profits and trade organizations contributing to public policy and regulation in everything from EV charging to federal allocation of water rights for hydro; and now for a Fortunate 500 Global Energy Company, AES, where she is Chief Digital Commercial Transformation Officer. Underlying every aspect of her work is the utilization of data and analytics, with Erin considering herself a closet data scientist. Erin also loves to speak publicly and presents any chance she can, including at TEDx.

Chris Roberts HillBilly Hit Squad
Chris Roberts

vCISO

HillBilly Hit Squad

Summit Speaker

Hacker, InfoSec, Safety, CyberStuff Researcher, Advisor, @Hacknotcrime henchman, and various other names on the technical side of the world Chris is currently serving as a vCISO or advisor for a number of entities and organizations around the globe. His most recent projects are focused within the threat intelligence, identity, cryptography, Artificial Intelligence, and services space. I’ve been fortunate to be elbow deep in technology for more years than I care to remember, and these days am involved in both tactical and strategic discussions with clients across the spectrum of industries talking maturity, risk, and how to effect change. Oh, and I just got called a Scottish Security Warlock....I’m kinda digging it. Happy to connect, to talk and discuss what we can ALL do to effect change in this world, to collaborate and to communicate in a way that benefits all….I’d prefer folks didn’t use this forum to sell me certs, software or anything that has a hooded matrix theme (I DO come with a warning label...)

Tony Parrillo Schneider Electric
Tony Parrillo

VP, Enterprise IT Global Head of Security

Schneider Electric

Summit Speaker

Experienced and passionate cybersecurity leader. Responsible for all facets of cyber security to Schneider Electric's enterprise IT, encompassing approximately 140,000 employees in 100 countries, including 220 factories, 35 distribution centers, and 1,200 sites

Amit Basu International Seaways
Amit Basu

VP, CIO & CISO

International Seaways

Summit Speaker

Amit Basu is the head of IT and IT Security at International Seaways (INSW). INSW, headquartered in New York City, is one of the largest tanker companies providing energy transportation services worldwide. Amit is a proven IT leader with over 25 years of experience in maritime IT and has pioneered several technology innovations in maritime. Over the last decade, Amit has led a digital transformation in INSW with a Cloud-Only IT strategy and is instrumental in designing a multi-layered cybersecurity framework promoting a cyber resilience culture. Amit holds an MBA as well as a Master of Science degree in Information Management from the Stevens Institute of Technology, New Jersey. He is also a Certified Information Security Manager from ISACA, certified in Cybersecurity Risk Management by HarvardX, Cybersecurity Oversight by Carnegie Mellon University, Maritime Cybersecurity by Lloyds Maritime, and Artificial Intelligence by MIT Sloan School of Management. Amit is an advisory board member for the Cybersecurity program at Pace University and Ithaca College, on the advisory board of Exium, and a member of the Governing Body of New York CIO Executive Summit.

Yabing Wang Justworks
Yabing Wang

CISO

Justworks

Summit Speaker

Yabing Wang is the VP and Chief Information Security Officer at Justworks. She has been in the technology world for 25 years, and has more than 20 years of extensive leadership experience in cybersecurity across different industries. Yabing thrives in transforming security into a business enabler through executive leadership, program delivery, and partnership with all stakeholders. She has built global security practices and strengthened cyber resilience at multiple fortune 100 companies and tech-forward companies.

Richard Rushing Motorola Mobility a Lenovo Company
Richard Rushing

CISO

Motorola Mobility a Lenovo Company

Summit Speaker

Mr. Richard Rushing is the Chief Information Security Officer for Motorola Mobility LLC.; Richard participates in several corporate, community, private, and government Security Council’s and working groups setting standards, policies, and solutions to current and emerging security issues. As Chief Information Security Officer for Motorola Mobility, he has led the security effort by developing an international team to tackle the emerging threats of mobile devices, targeted attacks, and cyber-crime. He organized developed and deployed practices, tools and techniques to protect the intellectual property across the worldwide enterprise. A much-in-demand international speaker on information security Richard has presented at many leading security conferences and seminars around the world.

Heather Reed
Heather Reed

Head of Cybersecurity and ISMS Lead

Nestle Purina PetCare North America

Summit Speaker

Nestlé Information Technology is the digital arm of the worlds largest nutrition, health, and wellness company. You may know us best for chocolate, coffee and wateressentials of our humble beginnings and still core to our business today. With 150+ years in business, 2,000+ brands, and 270,000+ diverse team membersyoure joining an organization thats revolutionizing food and championing global humanitarian efforts with technology at its core. We are relied upon as a trusted strategic partner tackling Nestles digital transformations across our portfolio of Nestlé businessesfrom Gerber® to Purina® and every food and beverage brand in between supporting you, your family, and your pets. From ensuring teams have the right technology to do their jobs, to building the infrastructure to support machine learning and AI technology, we are skilled as both businesspeople and technologists with deep curiosity to keep learning. To support our people and their families in the ways they need us to most, we offer inclusive benefits, flexibility, continuous learning options, and unique career opportunities. We find ongoing inspiration from the vast number of backgrounds, cultures, and communities amongst our team members. This sense of belonging and connection are often why people join us, stay, and advance their careers within the Nestlé network. What continues to unite us is the desire to develop and grow together in our pursuits, and to relentlessly remain a Force for Good.

Agenda

All times Eastern Time

8:30 AM-9:15 AM

Breakfast & Registration


9:15 AM-9:30 AM

Opening Remarks


9:30 AM-10:00 AM
Keynote

The AI Acceleration Era: Security, Trust & Competitive Advantage

Artificial intelligence is reshaping how organizations operate, compete, and protect themselves. But while AI offers speed and scale, it also introduces new risks from data leakage to biased models and attack surface expansion. This keynote explores how companies are weaving AI into their business and security strategies without compromising trust. We examine the frameworks guiding responsible AI adoption, how to embed governance from day one, and the balance between innovation and oversight. The message is clear: AI isn’t optional—but trust, transparency, and resilience are non-negotiable.


10:05 AM-10:20 AM
Vision Voices

“When AI Writes Malware What’s Left for Us” How to Secure a World Where Machines Hack Machines

We’re entering a world where attackers don’t sleep, don’t miss, and don’t need human hands. AI-generated malware, autonomous phishing, synthetic identities—these aren’t future threats. They’re already here. This session shares the unsettling reality of what happens when artificial intelligence is used against us and why traditional defenses are too slow to keep up. It walks through real-world examples of how attackers are using generative AI to build faster, more sophisticated campaigns and how defenders can respond with speed, context, and automation. But this session goes beyond fear. It’s a blueprint for the next phase of cybersecurity. One that leans into AI-driven defense, collaborative threat modeling, and human-machine partnerships. If machines are attacking machines, what’s left for us? Creativity. Judgment. Strategy. And a renewed sense of purpose in a job that’s never been more critical or more human.


10:20 AM-10:40 AM

Networking Break


10:40 AM-10:55 AM
Disruptor

From Chaos to Control: Solving Data Sprawl & DSPM at Scale

Sensitive data is everywhere—stored, shared, and duplicated across environments without clear ownership. Data Security Posture Management (DSPM) has emerged to help organizations regain control. In this roundtable, leaders from heavily regulated industries walk through their DSPM implementations: how they located hidden data, prioritized risks, and implemented policy-based protection at scale. Expect real-world lessons on mapping data flows, minimizing blast radius, and integrating data security into DevOps and compliance workflows. If you're struggling with data chaos, this session shows how to take charge.


11:00 AM-11:15 AM
Vision Voices

The Inexorable inevitability of "Q" Day

Q Day isn't science fiction anymore, it’s a countdown, an inevitability. What was Fiction is becoming a Fact.  The moment quantum computers can break today's encryption, every secret ever stored becomes vulnerable: Intellectual property, financial records, even national security archives.

In this session, we’ll cut through the hype and get real about quantum risk. What is Q Day? Why is inevitable? And why aren't organizations ready, despite years of warnings. Join us for a candid look at the quantum threat landscape, the false comfort of legacy crypto and the human and strategic blind spots that could cost us everything. 


11:15 AM-11:35 AM

Networking Break


11:35 AM-12:20 PM
Panel

Mental Fatigue, Burnout & the Human Risk Factor in Cybersecurity

Cybersecurity isn’t just a technical challenge—it’s a human one. With mounting pressure, 24/7 threats, and increasing accountability, today’s workforce is under immense stress. This leadership roundtable explores the intersection of mental wellness, organizational resilience, and insider risk. Topics include burnout detection, human error trends, building psychologically safe teams, and fostering a culture where security isn’t just enforced—but owned. Learn how executives are rethinking workforce sustainability in security, with practical strategies for retention, performance, and mental clarity at every level.


12:25 PM-12:40 PM
Disruptor

Securing the Browser: Where Work Gets Done, and Data Gets Lost

The browser has become the new productivity core and a growing security liability. As organizations embrace SaaS, hybrid work, and unmanaged devices, traditional security controls are falling short. This session explores how forward-thinking companies are reimagining browser security to protect data where it’s most at risk. From secure enterprise browsers to lightweight isolation and real-time data control, we cover the technologies driving visibility and policy enforcement without disrupting work. Browser security isn’t just an endpoint issue—it’s now a front-line defense.


12:40 PM-1:40 PM

Lunch & Networking


1:40 PM-2:15 PM
Fireside Chat

Regulators Are Watching: Navigating SEC, DORA, and AI Governance

Regulatory expectations have surged and so has executive accountability. Whether it’s SEC cyber disclosures, DORA’s operational resilience mandates, or AI governance frameworks, organizations must now demonstrate control, transparency, and readiness. This discussion brings together security, legal, and finance perspectives on building scalable compliance systems that don’t drain resources. Discover how to automate evidence collection, maintain board-level reporting readiness, and shift from reactive compliance to proactive assurance. Governance is no longer a cost center—it’s a strategic differentiator.


2:20 PM-2:35 PM
Vision Voices

“The Day I Realized Compliance Doesn’t Equal Safety” Why We Need to Rethink Cyber Governance

It was a normal day. Until it wasn’t. The company passed every audit, ticked every compliance box, and followed every framework. And then it got breached. This session shares a brutally honest exploration of what happens when organizations confuse regulatory alignment with real security. It highlights the danger of over-reliance on frameworks like NIST, ISO, and SOC 2 as endpoints instead of tools. This session shares how CISOs can flip the governance model from compliance-led to risk-informed. You’ll hear how real-time evidence, business-aligned metrics, and continuous control validation are reshaping how cyber risk is communicated and managed. This session isn’t anti-compliance. It’s pro-resilience. It’s for every leader who’s ever wondered, “If we’re doing everything right, why do we still feel exposed?”


2:35 PM-2:55 PM

Networking Break


2:55 PM-3:10 PM
Disruptor

Beyond Buzzwords: What Zero Trust Really Looks Like in 2025

Zero Trust is no longer a future vision—it’s a current necessity. But while the term dominates security roadmaps, its real-world execution remains complex. This panel cuts through the noise, bringing together leaders who’ve rolled out Zero Trust principles across identity, device, and workload layers. Learn how they overcame organizational resistance, measured progress, and aligned security with productivity. Whether you're building from scratch or refining your model, this discussion offers candid lessons from those living Zero Trust every day.


3:10 PM-3:55 PM
Panel

What’s Next in Cyber? Investment Priorities from the Boardroom

Cybersecurity has earned its place in the boardroom, but now comes the hard part: making smart investment decisions under scrutiny. This closing panel unpacks where executive teams are placing their bets for 2025 and beyond. Hear how top decision-makers evaluate risk, justify spend, and align cybersecurity with business growth. The conversation spans budget trends, M&A signals, innovation priorities, and the shifting expectations around ROI. Walk away with a board-level view of what’s moving the needle and what’s being left behind.


3:55 PM-4:00 PM

Closing Remarks & Raffle Giveaway


4:00 PM-5:00 PM

Cocktail Reception


In Partnership With