Industry Dive's Dive D Icon
Industry Dive's Dive D Icon

Navigating cyber risk and business continuity

Recorded
Aug 12, 2025
Aug
2025
2pm ET
Virtual event on-demand
Virtual event
Register for free

Navigating cyber risk and business continuity

Recorded
Aug 12, 2025
2pm ET
Virtual event
Register for free

In an ideal world, cybersecurity and information technology operate invisibly in the background. Yet as organizations rapidly expand their digital footprints and as the regulatory landscape shifts, this ideal becomes increasingly challenging to achieve. The proliferation of devices, platforms and applications added to an established portfolio of legacy technology creates an ever-widening attack surface that CIOs and CISOs must monitor and protect, which can lead to friction between security requirements and operational efficiency.

This exclusive virtual event, jointly hosted by CIO Dive and Cybersecurity Dive, brings together technology and security leaders to explore how organizations can effectively manage cybersecurity risks without limiting technology's potential. Through expert panels and strategic discussions, we'll examine practical approaches to creating a security framework that protects expanding technology estates while remaining largely invisible to end users.

Questions we’ll explore:

  • How can CIOs and CISOs better align technology and security objectives when managing expanding technology estates?
  • What can tech executives do when technology fails?
  • What are the most critical measures businesses should take to protect operations?
  • How can leaders navigate regulation and compliance related to cyber risk?
  • How can organizations maintain compliance across expanding technology estates without creating bottlenecks?
  • How can execs ensure legacy tech doesn’t become a liability?

Who Should Attend?

  • Senior IT executives leading technology and security strategy
  • Executives looking to deploy AI-based security tools
  • CEOs and other C-suite leaders interested in cybersecurity
  • Decision-makers at cybersecurity vendors and providers

Register for free

Watch now











Success

Your seat has been reserved! Please check your email for a registration confirmation and more information on how to access the event.

Event powered by

No items found.

Join CIO Dive and Cybersecurity Dive’s virtual event exploring how CIOs and CISOs can manage cyber risk without disrupting business operations. Learn strategies for how to combat cyberattacks and navigate changing regulations and compliance requirements — all while managing ballooning technology estates.

Session 1 Inside the CIO-CISO Relationship Together, CIOs and CISOs are responsible for defending an organization against service interruptions and cyber risk. They can jointly enable companies to move at the speed of innovation while safeguarding data and systems. Alongside a CIO-CISO duo, we will delve into the leadership habits that security and IT professionals can adopt to ensure business continuity when technology fails and strong cyber defenses as well as striking a delicate balance between security and technology efficiency in their organization’s day-to-day operations. Sponsored Session Evolving from Vulnerability Management to Exposure Management Cyber risks have evolved significantly since vulnerability management was introduced, so we must evolve the way we manage them. Join us for a discussion around the challenges of achieving asset visibility, enacting appropriate vulnerability response and defining organizational risk appetite. In this discussion, we will touch on how adopting an exposure management mindset can help you address these challenges and better manage your cyber risk. Presented by Ivanti Sponsored Session A CIO’s guide to navigating risk through metrics, technology, and compliance What’s next for CIOs? As the role continues to evolve, CIOs are challenged to drive innovation, while managing risk and aligning technology across the business. In this session, Brad Rumph, Field CTO at Tines, offers practical guidance to navigating that complexity. You’ll learn underused metrics that CIOs should leverage for smarter product and business decisions, how to properly evaluate new technologies before investing, and how the roles of the CIO and CTO will continue to evolve over the next decade. Presented by Tines Session 2 How to Navigate U.S. Cyber Disclosure Rules and Regulations CISOs and CIOs are closely tracking how federal regulations are shifting amid political pressure and deregulation policies. Organizations look to security chiefs to help them comply with SEC rules for cyber incident reporting, among other disclosure requirements. In this panel discussion, experts will provide guidance and discuss strategies on how to manage the shifting risk and cyber-disclosure reporting space without disrupting business operations. Sponsored Session Breaking the Breach Cycle: A Unified Approach to Cyber Resilience Every executive is wrestling with tool sprawl, data risk, and AI uncertainty-but your attackers don’t care. In this fast-paced session, we’ll dive into how identity and access controls, data protection, application security, and threat detection can stop attackers in their tracks and shrink the breach window. Our experts will show you how to connect your business priorities to cybersecurity strategies to outpace threats and cut complexity-without slowing down the business. If you’re tired of fragmented security strategies, this session will show what resilience really looks like in action. Presented by OpenText Session 3 Tackling Risks Posed by Legacy Tech Legacy systems are a challenge to CIOs and CISOs, creating potential operational and security risks to the business. Not only are legacy systems more prone to failure, forgotten tools can be targets for cybercriminals, can become increasingly expensive to support and can create compliance and regulatory headaches. In this session, we’ll talk to technology and security experts who can provide strategic advice on what to do when technology fails and how to build a security strategy that brings legacy systems along while maintaining the current pace of technological change.

If you have questions about registration, if you’re interested in speaking, or have any other questions, contact us at [email protected].

Speakers

Scott Algeier // Executive Director // IT-ISAC
Scott Arnold // CIO // Tampa General Hospital
Jim Bowie // CISO // Tampa General Hospital
Matthew Eggers // VP, Cybersecurity Policy // US Chamber of Commerce
Matt Gorham // Leader, Cyber and Risk Innovation Institute // PwC
Fritz Y. Jean Louis // Principal Cybersecurity Advisor // Info-Tech
Kris Lovejoy // Global Security & Resiliency Leader // Kyndryl
Jason Manar // CISO // Kaseya
Christina Powers // Partner - Cybersecurity // West Monroe
Matt Ashare // Senior Reporter  // CIO Dive
Eric Geller // Senior Reporter // Cybersecurity Dive
David Jones // Reporter // Cybersecurity Dive
Roberto Torres // Editor // CIO Dive
Lindsey Wilkinson // Reporter // CIO Dive
Chris Goettl // {{ Presented by Ivanti }} // VP, Product Management // Ivanti
Brad Rumph // {{ Presented by Tines }} // Field CTO // Tines
Greg Clark // {{ Presented by OpenText }} // OpenText Enterprise Cybersecurity // OpenText
Grayson Milbourne // {{ Presented by OpenText }} // Senior Principal Threat Hunter // OpenText
Victor Tham // {{ Presented by OpenText }} // Cybersecurity Strategist // OpenText

About our newsroom

CIO Dive and Cybersecurity Dive provide in-depth journalism and insight into the most impactful news and trends shaping their industries, covering topics such as IT strategy, AI, threats, policy, and more.

CIO Dive and Cybersecurity Dive are leading publications operated by Informa TechTarget. Our business journalists spark ideas and shape agendas for 16 million decision makers in 20+ competitive industries.