Prioritizing Digital Executive Protection to Manage Corporate Risk
2025.11.13-BlackCloak-LandingPage-1540x660-1

Sponsored By:

BlackCloak Logo CMYK-Black 6 1-1
Thursday, November 13

1 pm ET

Executives are often the weakest link in an organization’s security chain. They often handle the most sensitive data—often on the fly—and have access to a company’s most valuable assets. They are increasingly targeted by threat actors seeking to leverage their credentials, access, and status to execute destructive and costly attacks. Personal digital privacy is not enough for these high-value targets and their families, as 70 percent of executives have fallen victim to at least one cyberattack against their personal assets. As AI-driven social engineering attacks rise, protecting executives’ personal information and privacy should be a critical corporate risk management priority. But typically, it is not prioritized, nor is it widely integrated into enterprise cybersecurity strategies.

This webinar explores the security challenges organizations face in protecting the personal digital lives of executives and their families—including a lack of visibility into their devices and online behaviors—and the extent to which they are taking steps to do so.

Join our roundtable panel of experts, including Mitch Ashley, analyst at The Futurum Group, Ingrid Gliottone, Chief Experience Officer for BlackCloak, Sarah Rosen, Managing Director of Private Client Services for BlackCloak, and Chris Roberts, Technical Solutions Architect /Regional Field CTO for WWT, who will share their extensive knowledge and experiences on AI-driven social engineering, personal data protection and risk management. They will discuss a variety of topics, including:

- The evolving AI social engineering threat landscape

- The risks AI social engineering attacks pose to executives and their families

- Executive behavior that makes them more vulnerable to attack

- The challenge of securing executives' PII

- Best practices and real-world examples

Key Takeaways

1. The security challenges posed by AI social engineering attacks and how they differ from traditional security concerns.

2. The importance of prioritizing the protection of executives’ personal digital lives to offset corporate risk -- and why it's critical to act now.

3. Important steps to gain visibility into and protect executives’ personal digital footprints, harden their personal devices and accounts, and protect their homes (scanning home networks, smart home access points, etc.).

4. Real-world insights and best practices for securing executives and their families against AI social engineering attacks, enabling organizations to adopt AI technologies securely and confidently.

Register Below:

We'll send you an email confirmation and calendar invite 

Headshot-Ingrid Gliottone-Chief-modified

Ingrid Gliottone

Chief Experience Officer - BlackCloak

Ingrid is responsible for ensuring that all BlackCloak digital protection clients attain peace of mind, knowing that they, their families, and their companies are well-protected from targeted cyberattacks, financial fraud, and identity theft, among other modern-day digital risks. She oversees the close collaboration between BlackCloak’s client service and security operations center (SOC) teams. She ensures that all BlackCloak customer-centric strategies, from onboarding and ad hoc client support to monthly CISO reports, client education, and threat notifications, are executed with an exceptional experience that results in increased customer loyalty and renewals.

Ingrid is also the architect of the Concierge Client Support team that is akin to the Genius Bar of cybersecurity & online privacy - experts in both the subject matter and in making people feel at ease. She’s created an entire library of educational materials, including client guides, webinars and Q&As, designed to be digestible by cybersecurity practitioners and novices alike.

Ingrid is a certified Information Privacy Professional (CIPP/US) and a Certified Information Privacy Professional/Information Technology (CIPP/IT) through the International Association of Privacy Professionals (IAPP). Ingrid holds a B.A. in Mathematics from the College of the Holy Cross, a MBA from the University of Rhode Island and a Master's in Information Assurance from Northeastern University. In 2021, she was recognized as “A Top Woman in Cybersecurity” by Cyber Defense Magazine.

Headshot_SarahRosen-modified

Sarah Rosen

Managing Director of Private Client Services - BlackCloak
Sarah Kay Rosen is an accomplished leader with nearly 20 years of experience in building high-performing teams and driving business transformation in SaaS and technology companies. In her role at BlackCloak, Sarah focuses on protecting the personal digital lives of high-net-worth families, providing tailored cybersecurity solutions to safeguard their digital presence from threats like cybercrime, identity theft, and privacy breaches. She works closely with her clients to develop personalized strategies that ensure their online security while maintaining a high level of discretion and trust.

Prior to BlackCloak, she held leadership roles at Automox and CyberGRX, where she honed her expertise in cyber risk management and sales enablement, successfully helping organizations strengthen their cybersecurity and improve customer success strategies.
Malcolm Harkins - Headhsot-modified

Malcolm Harkins

Chief Security & Trust Officer - HiddenLayer
As Chief Security and Trust Officer at HiddenLayer, Malcolm is responsible for enabling business growth through trusted infrastructure, systems, and business processes, and oversees peer outreach to drive global improvement in understanding cyber risks and best practices for managing and mitigating those risks.   He is also an independent board member and advisor to several organizations.  He enjoys being an executive coach to CISOs and others in a wide variety of information risk roles.  Key areas of focus include the ethics around technology risk, social responsibility, total cost of controls, public policy, and driving more industry accountability.

Previously, Malcolm was the Chief Security and Trust Officer at Cylance, and prior to that, he was Vice President and Chief Security and Privacy Officer (CSPO) at Intel Corporation,  responsible for managing the risk, controls, privacy, security, and other related compliance activities for all of Intel’s information assets, products, and services.  Before becoming Intel’s first CSPO, he was the Chief Information Security Officer (CISO).  Over Malcolm’s 24 years with Intel, he also held roles in finance, procurement, and various business operations.  
Headshot_ChrisRoberts-modified

Chris Roberts

Technical Solutions Architect /Regional Field CTO - WWT
Chris has been lurking around the cybersecurity industry since before its inception. His most recent projects have been focused within the aerospace, deception, deepfake, identity, cryptography, AI/AdversarialAI, and services sectors.

Over the years, he's founded or worked with numerous organizations specializing in human research, data intelligence, transportation, cryptography, and deception technologies. Currently, he’s working on spreading risk, maturity, collaboration, and communication messaging across the industry. When not working, he can be found in Eureka, Missouri, charging around the countryside on a mountain bike, or hunkered down with the kids experimenting on ways to take over the planet.
Mitch_Ashley

Mitch Ashley

VP and Practice Lead, DevOps and AppDev - The Futurum Group
Mitch Ashley is a technology executive and entrepreneur who is an advisor, analyst, product creator and tech leader, bringing 30+ years in cybersecurity, DevOps, cloud, AI, product development, software engineering and networking. Mitch is Chief Technology Advisor with The Futurum Group and CTO of Techstrong Group’s tech media platforms covering DevOps, cybersecurity, AI, cloud native, cloud infrastructure, platforms and ITSM. A highly sought-after C-level and product advisor, analyst, CTO, CIO and head of engineering, Mitch’s analyst research is available on TechstrongResearch.com and FuturumGroup.com.