Arrival: Sunday, August 24, 2025
Dinner on your own.
SINET will provide transportation to all planned activities except to and from the airport. Jackson is a small community and Uber is not recommended – prearranging a taxi to take you to and from the airport is advised. We recommend the below companies.
Jackson Hole Taxi (307) 699-3369
Teton Mountain Taxi (307) 699-7969
Andrew (Transportation Service) (307) 699-8455
6:00 PM
Robert will be at The Wort Hotel Bar.
We welcome anyone who is interested to join him for cocktails.
Day One: Monday, August 25, 2025
Times subject to change.
8:30 AM
Buses depart from Wyoming Inn
SINET Risk Executive Workshop
Four Seasons Resort and Residences Jackson Hole
9:30 AM – 9:40 AM
Setting the Stage
Yonesy Nunez, Chief Cybersecurity Risk Officer, The Depository Trust & Clearing Corporation – Chair of SINETJackson Hole
Robert Rodriguez, Chairman & Founder, SINET and Venture Partner, SYN Ventures
9:40 AM – 10:30 AM
Attendee Introductions
10:30 AM – 11:05 AM
Calm in the Storm: What the MGM breach taught me about managing stress as a CISO
Kurt John, CISO, ConEdison
What if the most high-profile crisis of your career felt less stressful than a normal day as a CISO? In this talk, Kurt John reflects on leading through Expedia’s support during the MGM breach – an event that paradoxically provided more clarity, energy, and focus than in his day-to-day operations. Through this lens, he explores the hidden drivers of executive stress in cybersecurity: ambiguity, misalignment, and the absence of meaningful progress indicators. Attendees will walk away with a fresh perspective on structuring their teams and their own mindset to thrive amid uncertainty.
11:05 AM – 11:45 AM
The AI Security Imperative: Balancing Innovation with Robust Governance
Jonathan Dambrot, CEO, Cranium
Rich Baich, CISO, AT&T
As enterprises rapidly accelerate their investment in AI, the critical need for a proactive security and governance strategy has never been more urgent.
In this session, we will address the:
11:45 AM – 12:00 PM
Break
12:00 PM – 12:30 PM
Enhancing Risk Reduction Through A Zero Trust Architecture
Taher Elgamal, Partner, Evolution Equity Partners
The Cybersecurity industry has been growing over the last few decades to protect the online experience for all users. Traditionally, security only gets designed after some number of attacks or breaches have happened, after all, there is no reason to secure systems that are not being used. The industry usually attempts to mitigate against certain attacks. The growth of the industry helped many organizations improve the security posture of their digital systems. The focus on fixing existing issues created and continues to create gaps in the overall security posture. That is great news for new companies to start, but are we solving the main business problems, The idea of Cyber Resilience, rather that Cyber Security has been discussed many times but are there practical ways to get there. I believe resilience is what we should seek. The idea of Zero Trust Architecture can in fact be a CISO’s best tool to get to an overall resilient digital existence. I would like to have a discussion around these topics.
12:30 PM – 1:10 PM
The Interconnected Battlefield: How We Got Here & Where We’re Headed
John Watters, Partner, SYN Ventures
To prepare for what’s next, we must understand how we got here. This presentation explores the history of cybercrime and its association with global events, from the early days of worms and malware to today’s sophisticated, AI enabled state-affiliated operations. We will examine how historical geopolitical and cyber events have fundamentally shaped the modern threat landscape, turning cyberspace into a primary domain for economic warfare. We will discuss how cyber defenders must adjust their strategy to combat adversaries who now launch highly customized, high-probability campaigns against targeted organizations and extended ecosystems.
1:10 PM – 2:10 PM
SINET Hosted Lunch
2:10 PM – 2:45 PM
AI Security & Deployment – A conversation with Erik Naugle
Erik Naugle, VP, Cyber Security, Intuit
Danny Hatfield, Managing Director, Venture Banking, Stifel Bank
2:45 PM – 3:25 PM
The Future of Endpoint Ransomware: a Browser-Native Approach
Vivek Ramachandra, Founder, SquareX
This talk will discuss how Browser Native Ransomwares work, including multiple demos on how these attacks can unfold in real life. We will take a look at the impact of Browser Native Ransomware when compared to traditional ransomwares, especially when it comes to its ability to laterally move across the organization. We will also examine how AI powered browsers like Perplexity Comet are fundamentally changing the way people browse, and how they can be exploited by Browser Native Ransomware attacks. Lastly, we will deep dive into the architectural limitations of SASE/SSE, endpoint DLP and EDRs and what enterprises can do to safeguard against the rise of Browser Native Ransomwares.
3:25 PM – 3:35 PM
Break
3:35 PM – 4:10 PM
Enhancing Security and Reducing Costs Through Strategic Design Partnerships
Louis Bobelis, Deputy CISO, Axis Capital
Megan Simon, Senior Leader – IT Governance, Risk and Compliance, Axis Capital
Tim Brown, CISO, SolarWinds
In this presentation, we will explore how leveraging design partnership opportunities with innovative startups and global security leaders has significantly enhanced and refined our organizations’ security tool stacks. By collaborating with these partners, we have been able to integrate cutting-edge technologies that have greatly improved our security posture, while also achieving substantial cost savings. Our collaborative approach has driven our organization towards a more secure and cost-effective future.
4:10 PM – 4:45 PM
Authenticating the Impostor: Why Identity programs have an open door
Jeff Farinich, CISO, New American Funding
In recent years, threat actors have increasingly exploited a critical gap in many organizations’ identity programs: the absence of Identity Verification (IDV). While significant investments have been made in areas such as Multi-Factor Authentication (MFA), Identity Governance and Administration (IGA), Privileged Access Management (PAM), and more recently, Just-in-Time (JIT) and Non-Human Identity (NHI) controls, IDV has not been prioritized or even entirely absent. This oversight has been a key factor in the success of high-profile cyberattacks by threat actor groups such as North Korea (DPRK) and Scatter Spider, with incidents making mainstream headlines. In this session, I will share a real-world IDV implementation journey—from initial concept to full organizational adoption—highlighting the challenges faced, lessons learned, and the outcomes achieved. The goal is to encourage more organizations to recognize the importance of IDV and take action before they become the next headline.
4:45 PM – 5:35 PM
A conversation with Sanjeev Bhasker and Aravind Swaminathan
Aravind Swaminathan, Partner, Orrick
Sanjeev Bhasker, Acting General Counsel, Office of National Cyber Director
5:35 PM
Day One Presentations Conclude
6:00 PM – 9:00 PM
Dinner at The Mangy Moose
Come enjoy delicious BBQ, live music, and a lively atmosphere
Plus ones welcome
8:30 PM
Transportation provided back to The Wyoming Inn
Day Two: Tuesday, August 26, 2025
Times subject to change.
7:45 AM
Buses depart from Wyoming Inn for Turpin Meadow Ranch
SINET Risk Executive Workshop
Turpin Meadow Ranch
Please note that there is limited cell service or WiFi at Turpin Meadow Ranch. Please plan accordingly.
9:10 AM – 9:50 AM
Navigating an Onchain Future
Jeff Lunglhofer, CISO, Coinbase
Over the past year, crypto and blockchain technology have surged into the national spotlight. Recent regulatory clarity and legislation have solidified their place in the financial system – but that’s only part of the story. If cryptocurrency is simply a way to transfer value, what does it really mean to be onchain? This session will explore the practical use cases that blockchain and crypto unlock for businesses, ranging from financial services to social media. We’ll also examine the implications for security teams and discuss how organizations can prepare to meet the unique security challenges that will emerge as more of the world moves onchain.
9:50 AM – 10:20 AM
Topic to be announced
Aravind Swaminathan, Partner, Orrick
10:20 AM – 10:30 AM
Break
10:30 AM – 11:15 AM
From Nation-State to Nation-Hack: CISOs in the Age of Proxy Conflict
Rich Baich, CISO, AT&T
Carey Frey, CSO, TELUS
Modern geopolitical conflict is no longer declared — it’s embedded. Nation-states are quietly planting prepositioned capabilities across global supply chains, software, and hardware, waiting to trigger disruption. From hidden kill switches in critical tech to the weaponization of smartphones and edge infrastructure, the battlefield is everywhere — and invisible. As threats to democratic stability escalate, cyber resilience is no longer optional. This session explores the critical need for deliberate planning, rapid response, and resilient recovery to ensure continuity in the face of digital sabotage.
11:15 AM – 11:50 AM
Ransomware 2030: Building Resilience in the Age of Autonomous Threats
Andrew Wilder, CISO, Vetcor
As ransomware continues to evolve from opportunistic disruption to precision-targeted extortion, the next frontier will be shaped by AI-driven attacks, deepfake-enabled social engineering, and autonomous malware capable of adapting in real time.
Let’s talk more about –
– The rise of ransomware-as-a-service, Attacker LLMs, and AI-enhanced payloads
– How to operationalize resilience through continuous DR testing and Executive Tabletop Exercises
11:50 AM – 12:25 PM
Injecting Empathy into Insider Threat Analysis
Brandon Swafford, CISO, HPS Investment Partners
The lives of people are complicated, dynamic and full of contradictions. Often in the eyes of a typical SOC they are a name without a face, lumped in with the Windows 11 laptops and Linux virtual machines. The nature of insider threat prevention and detection is rooted in the emotions and ambiguities of people’s behavior as they interact with technology. We will discuss examples of how to deploy controls, code better rules and detections into traditional tools and, how AI could make an impact on the analysis of insider threat data.
12:25 PM – 1:05 PM
SINET Hosted Lunch
1:05 PM – 1:35 PM
Establishing an Organizational Risk Appetite
Brandon Pinzon, CISO, SPKTR Ventures
1:35 PM – 2:10 PM
Risk Leadership in the Age of Velocity: From Reactive Compliance to Strategic Agility
Yonesy Nunez, Chief Cybersecurity Risk Officer, The Depository Trust & Clearing Corporation
The velocity of change, driven by AI, cyber threats, regulatory shifts, and geopolitical instability, has outpaced traditional risk frameworks. This session challenges risk leaders to move beyond reactive, checklist-driven approaches and toward dynamic strategies that align with business outcomes. We will explore how top organizations are evolving governance models, embedding risk into transformation efforts, and using agility as a core competency. Join us to reframe risk leadership not as a control function, but as a strategic force multiplier in times of uncertainty.
2:10 PM
Day Two Presentations Conclude
2:10 PM – 2:30 PM
Break
2:30 PM – 4:30 PM
Activities:
Horseback Riding, Fly Fishing, UTV Riding, E-Bikes
5:30 PM – 7:30 PM
Dinner hosted at Turpin Meadow Ranch
7:30 PM
Transportation provided back to The Wyoming Inn
Optional Day Three: Wednesday, August 27, 2025
Details about the optional fly-fishing activity will be shared with attendees through our app.