“We live in a society exquisitely dependent on science
and technology, in which hardly anyone knows anything
about science and technology.” – Carl Sagan
CISO Assembly
November 5, 2019
New York, NY
Security in the Digital Age
Past Speakers Include...
Topics to be covered include:
- The changing cloud compliance, risk, and cloud management framework. How to address cloud adoption and real-world cloud security challenges
- Utilizing security analytics that can help you detect compliance violations in real time while examining under behavior to speed up attack detection and response
- Ways to better manage authentication, password policies and enforce protocols to ensure consistency across enterprise-wide, customer, social and third-party systems
- What AI means for security teams and how can intelligent automation benefit your organization
- Using data governance to provide enhancement and streamlined decision making to protect the interest of data stakeholders
The Assembly will feature members from...














Title Representation
Industry Breakdown
Org. Size by Revenue
Agenda
7:15am-8:05am
Breakfast & Registration
8:05am-8:10am
Opening Remarks
Presented By:
8:10am-9:00am
Keynote Panel: “What are your top security concerns and how are you proactively securing the enterprise?“
![]() |
WW formerly Weight Watchers |
![]() |
![]() |
![]() |
9:10am-9:40am
Member Roundtable: “Assessing and Quantifying Cyber Risk“
Member Roundtable: “Integrated Assurance – An integrated approach to proactive risk management“
9:45am-10:15am
Workshop Presenter: “All your queues belong to us: Using math to sharpen security operations”
Workshop Presenter: “Cyber defense approaches: What are we missing?”
10:15am-10:40am
Networking
10:40am-11:20am
CXO Panel: “Gearing up for 2020: Best practices to secure remote worker “
Moderated by:![]() |
![]() |
![]() |
UBS |
![]() |
Infor |
11:20am-11:50am
Thought Leader Presenter: “Defense in Diversification: Improving cybersecurity through smart consolidation”
12:00pm-12:30pm
Member Roundtable: “Network Security & Cloud Migration”
Forbes
Member Roundtable: “Security is Everybody’s Job. How a culture of secure thinking is the only way to ensure a secure environment.”
Prudential Financial
12:35pm-1:05pm
Workshop Presenter: “Web Stack Attacks: Magecart and Vendor Threats“
Workshop Presenter: “The Evolution of Threats and Threat Detection”
1:05pm-1:55pm
Lunch & Birds of a Feather
1:55pm-2:10pm
Disrupter Presenters: “Real Time Threat Handling for Defenders”
2:10pm-2:25pm
Disrupter Presenters: “Start your Journey to Passwordless authentication“
2:25pm-2:40pm
Disrupter Presenters: “Preparing for 2020 – Prioritize Unstructured Data Security and Risk“
2:40pm-3:05pm
Networking
3:05pm-3:50pm
“How Augmented Intelligence Can Make Security Tests Smarter“
![]() |
![]() |
![]() |
3:50pm-4:30pm
WIT Panel: The Future of Women in Technology
Moderated by:![]() |
![]() |
![]() |
DB |
![]() |
4:30pm-4:40pm
Closing Remarks & Raffle Drawing
4:40pm-5:40pm
Cocktail Hour and Networking
5:45pm-8:30pm
Private Dinner
Partners
Senior Supporter
Senior Supporter
Senior Supporter
Networking Sponsor
Networking Sponsor
Media Partners


Got questions? We’ve got answers!
Why should I attend?
Your time is valuable and we make sure to make the most of it! We take the time to figure out your challenges and customize your experience to meet your needs. Our agendas are tailored to your feedback and we pride ourselves in covering the most cutting-edge content delivered by renowned industry experts. Look forward to building enduring partnerships and together we’ll go straight to the top.
Where is the event taking place?
The event is by invitation-only. The location will be released to all attendees once your registration has been confirmed.
What is the dress code?
We recommend business attire. Most attendees wear suits or comparable attire. Ties are optional.
Can I bring a colleague with me?
Yes! We always urge our members to refer their colleagues! We love adding new members to the community, especially if they come highly recommended by a current member. Either have them reach out to your Apex POC or have them fill out the Member Registration Form.
What if I have dietary restrictions?
No problem! Please let your Apex POC know as soon as possible in order for us to work with the venue on providing alternate options for you at the event.
What if I want to speak at an assembly?
Apex is always looking for speakers that can contribute their valuable insight. If you would like to speak, please contact your Apex POC or fill out the Speaker Registration Form on the Assemblies page. Please keep in mind that we receive many inquiries for speaking and sessions are available on a first come first served basis. But no need to worry, we have plenty of opportunities available at future assemblies.
I plan on being in attendance, but what if something comes up and I have to cancel?
We understand that something may come up on your calendar! Before canceling with us, please know that we will have a separate room for attendees to step out for work-related activities (meetings, emails, conference calls, etc.). If you must cancel, we just ask that you let us know at least 48 hours in advance so that we can open up the waitlist for another member.
With an alarming number of breaches, it is clear that the attack surface has greatly expanded. As enterprises work to develop a progressive strategy, there is an increasing need to deploy and manage a variety of advanced internal and external security services. This leaves the Chief Information Security Officer faced with a multitude of challenges to maintain and run a secure enterprise.
The CISO is at the center of the security dialogue and is ultimately responsible for the guidance and leadership of an increasingly intricate technology landscape. Given the weight of that responsibility, the search for the most transformative solutions that enable them to protect the enterprise is constant and the need to stay ahead of the curve, a must.
On November 5, 2019 in New York, NY Apex Assembly united visionary leaders, entrepreneurs and industry security experts for a full day of content and networking, where we examined the challenges of 2019 and concentrate on the most pressing issues of 2019 in the information technology security sector.
Through collaboration with our executive community, we have discovered key industry challenges and trends. These topics form the foundation of the Assembly and will be addressed through informative introductions, member roundtables, case studies and interactive workshops.
Topics covered include: