Home Events February 2026 Chapter Meeting

February 2026 Chapter Meeting

Join us on-site in New York City or on Long Island, or virtually, for our February 2026 Chapter Meeting on February 23, 2026 featuring presentations from the faculty of Columbia University Technology Management. The registration link can be found below.

Chapter Members can get their promo codes that grants complimentary admission to this Chapter Meeting by logging into the Chapter website and navigating to their “My Page”. Non-members and the public are invited to attend and can register for a nominal fee.

Our annual membership is $40 for professionals and $15 for students. Membership in the Chapter is open to all cybersecurity professionals and students. If you are not already a member, please visit our membership page for more information.

This event will qualify for two Continuing Professional Education (CPE) credits.

Agenda:

5:00pm – 6:00pm: Doors open, networking, event setup

6:00pm – 6:10pm: Welcome address and updates, presented by the ISC2 New York City & Long Island Chapter Leadership

6:10pm – 6:30pm: Opening remarks, presented by Columbia University Technology Management

6:30pm – 7:15pm: The AI Supply Chain Has Shifted – And So Has Your Attack Surface, presented by Anthony Candeias, Lecturer, M.S. Technology Management, Columbia SPS

7:15pm – 8:00pm: Contagion Risk Scoring: Measles Rebounds, While Windows 10 Lingers, presented by Dr. Corey Hirsch, Lecturer M.S. Technology Management, Columbia SPS

⚠️ Registrations for New York City: Due to building security requirements, we will be closing ticket sales to our New York City site at 12:00 pm on February 20, 2026 (one business day before the event).

ℹ️ Registrations for Long Island and Virtual: We will be closing ticket sales to our Long Island site and Virtual admission at 3:00 pm on February 23, 2026 (the day of the event)

All times in Eastern Timezone.

Topic Summary: The AI Supply Chain Has Shifted – And So Has Your Attack Surface

For years, security teams have chased vulnerabilities hidden deep in software dependencies. Now the supply chain has expanded: AI agents that browse the web, generate code, and install their own tools have turned the entire internet into a potential attack vector. This session explores the new threat landscape, the human risks of AI dependency, and what actually works when your traditional playbook no longer applies.

Speaker Bio: Anthony Candeias, Lecturer, M.S. Technology Management, Columbia SPS

Anthony J. Candeias is a technology, artificial intelligence, and cybersecurity executive, professor, and advisor with more than 15 years of experience leading enterprise technology, global security, and governance, risk, and compliance (GRC) programs across finance, healthcare, and education.

Candeias is an active investor and advisor to early-stage cybersecurity and infrastructure startups, partnering with venture firms and founders on product-market fit, go-to-market strategy, and growth planning.

As an educator, Candeias has served as faculty at Columbia University, New York University, and Fordham University, where he has designed and taught graduate-level courses in cybersecurity, information security management, incident response, and risk management. His teaching emphasizes the intersection of enterprise risk, governance, and modern security operations, preparing students to navigate both technical and strategic challenges in today’s digital economy.

Earlier in his career, Candeias directed security operations at Columbia University, managed global security and privacy programs at the Ford Foundation, and held technology leadership roles at Goldman Sachs. His work has included partnering with law enforcement on advanced persistent threat (APT) investigations, building enterprise SOC and incident response programs, and integrating security into cloud and AI-driven solutions.

He holds a Master of Science in Technology Management from Columbia University, a Master of Science in Cybersecurity and a Bachelor of Science in Computer Systems Management from Fordham University, as well as advanced certificates from Seton Hall Law School and Harvard Business School. He maintains over a dozen professional certifications, including CISSP-ISSMP, GWAPT, GMON, CCNP Security, MCSE, CEH, and CompTIA Security+.

Topic Summary: Contagion Risk Scoring: Measles Rebounds, While Windows 10 Lingers

The US is expected to shortly lose its certified measles elimination status, 25 years after achieving it, and with it the carbon-host herd immunity that prevented viral outbreaks, saving lives. A billion remaining Windows 10 instances presents a parallel contagion risk, among silicon-hosts. Scoring the risks, managing, and mitigating them, use aligned metrics and methods. What can the network defender learn from the public health practitioner?

Speaker: Dr. Corey Hirsch, Lecturer, M.S. Technology Management, Columbia SPS

Dr. Corey Hirsch serves as CISO of Teledyne Technologies. Teledyne is a provider of enabling technologies for industrial growth markets including aerospace and defense, deepwater oil and gas, oceanographic research, air and water quality monitoring, electronic design, factory automation and medical imaging.

Dr. Hirsch, CISM, is a graduate of the FBI’s CISO Academy at Quantico, teaches on Columbia’s Masters of Technology Management and Enterprise Risk Management programs with a focus on cyber-security.

Hirsch served from 2005 – 2015 as CIO of Teledyne LeCroy, a leader in Electronic Test and Measurement equipment including oscilloscopes and protocol analyzers, prior to promotion to CISO of Teledyne Technologies, LeCroy’s corporate parent.
Prior to joining LeCroy in 2001, Hirsch led the EMEA region of Tektronix as VP Europe through EMU phase I and II, the culmination of a 24-year career with a leading Test and Measurement firm.

With 43 years’ experience in technology design and manufacturing, and 18 years’ tenure teaching on post-graduate programs in the US and UK, Hirsch is a widely recognized speaker, author, and practitioner in Cyber Security, ERM and related fields. He has authored articles in journals such as JISSEC on ERM and information security. He developed and implemented a system for aligning risk management across a diverse enterprise, and published the methodology in a book chapter.

    ||         Registration (NYC/LI & Remote)         ||

Scroll to top