Cyber Security

Quick 5 Interview: Milan Patel, Senior Product Manager - IAM Security at Broadcom

Milan Patel is the Senior Product Manager – IAM Security at Broadcom, specializing in identity and access management (IAM), cloud security, and enterprise security. An experienced IT and cybersecurity leader, he focuses on delivering secure IAM solutions that strengthen enterprise identity protection and support digital transformation at scale.

  1. What motivates you to attend Kodi Connect events?  

The ability to connect with likeminded leaders in cybersecurity is critical as we look at collaborative ways to continue innovation in cybersecurity. Hackers collaborate to do bad things, why shouldn't cybersecurity leaders collaborate in a similar manner to progress security for good? Kodi provides the ecosystem to foster collaboration across various cybersecurity backgrounds.

  1. How do Kodi Connect events provide value for your time?  

A Kodi event will expand your network and reach and will offer you to see what other problems exist in the cybersecurity space. For me personally, it allowed me to learn about various problems cybersecurity leaders are solving and discuss areas of intersection, for example between identity management and data management.

  1. What’s one major trend shaping the future of IT and cybersecurity over the next few years?

Establishing governance and auditability for trustworthy, provenanced AI. AI agents will outnumber humans and to ensure those AI agents, non-human identities are being secured, audited, and governed at the scale of their deployment will be a key cybersecurity trend and problem to solve. They say with any new platform that gets created, it creates a 20% more risk of security exposure than those before - AI agents present a much larger risk and security exposure that will need to be addressed over the next few years. 

  1.  How do you stay current in such a fast-moving industry?

Staying connected with cybersecurity leaders, in which Kodi events is an example. Additionally, nothing beats the conversations with customers and practitioners of security products as that allows for remaining in tune with the market and adjacent markets.

  1. How do you disconnect and recharge outside of work?

Spend time with family, play basketball, watch sports, and enjoy each conversation I have with people that I already know or people that I have just met.

Kodi Connect Key Takeaways: 
  • Cybersecurity leadership collaboration drives stronger enterprise security: Kodi Connect events enable cybersecurity leaders to collaborate across IAM, data security, and cloud security domains—mirroring attacker collaboration to proactively strengthen defenses and accelerate cybersecurity innovation.
  • Identity management and governance are central to modern cybersecurity strategy: A key focus area is securing and governing both human and non-human identities, including AI agents, with strong emphasis on auditability, identity governance, and risk management in enterprise cybersecurity environments.
  • AI security and non-human identity protection are emerging cybersecurity priorities: As AI agents scale across enterprises, cybersecurity and IT leaders must address governance, provenance, and security risks to reduce exposure and ensure trustworthy, secure AI-driven systems.
Stay Connected with IT & Cybersecurity Leaders

Discover more insights from top IT executives, CISOs, and cybersecurity leaders, and explore upcoming executive networking events designed to drive meaningful connections and real-world solutions. Browse all upcoming events at https://www.kodiconnect.com/events to find opportunities near you.

Connect, Collaborate, and Lead:
Join us for an exclusive evening designed for Cybersecurity leaders, including CISOs, VPs, Directors, and senior-level executives from various industries. Hosted in an intimate, first-class setting, this event is crafted to help you build meaningful connections with your peers and explore innovative solutions to the challenges you face.At Kodi Connect, we believe that the best insights come from open conversations. Our format prioritizes genuine networking, peer-to-peer discussions, and solution-oriented roundtables, providing a unique space for collaborative dialogue.
  1. This is some text inside of a div block.
What to Expect:
Networking and Connections: Enjoy multiple opportunities to connect with senior Cybersecurity leaders in a relaxed, informal setting. These moments are designed to foster meaningful conversations and set the tone for deeper discussions throughout the event. Drinks and appetizers will be provided to create a welcoming atmosphere for introductions and exchanges.
Engaging Discussions & Meetings: Take part in multiple small-group discussions, each focused on a specific theme or industry challenge. These sessions are moderated to promote active participation and open dialogue, offering you the chance to both learn and share your own insights. The intimate format ensures that conversations can be tailored to your specific interests, maximizing the relevance and value of each discussion.
Continued Networking Opportunities: Throughout the event, there will be informal moments to reconnect with fellow attendees. These are ideal times to exchange contact details, revisit important discussions, or explore new connections in a more relaxed, open setting.
Private Dinner: A select group of senior executives will be invited to an exclusive dinner, offering a private, intimate environment to build deeper connections and explore collaboration opportunities. This dining experience provides a more personal space to continue conversations over a three-course meal.
Key Discussion Themes
Cybersecurity Strategies & Challenges
Cloud Security
Artificial Intelligence & Machine Learning in Cybersecurity
Threat Detection & Response
Workforce Innovation & Leadership in Cybersecurity
We continuously adapt and update discussion topics based on our registered audience to ensure relevance and value. Final themes will be sent to registered guests prior to the event.
Why Attend:
Expand Your Network with Local Cybersecurity Leaders: Meet and connect with senior Cybersecurity executives from your area, building relationships that can provide long-term professional value.
Stay Ahead of Industry Trends: Learn about the latest industry developments, technologies, and strategies that are shaping the future of Cybersecurity leadership.
Learn from Peer Successes and Challenges: Benefit from the experiences of your peers by learning from both their successes and the challenges they’ve overcome, informing your own strategies.
Collaborate on Industry Initiatives: Take part in conversations that aim to drive progress in the Cybersecurity sector, contributing to shared solutions for common challenges.

Support Your Local Cybersecurity Community: Be part of Kodi Connect’s mission to bring the local Cybersecurity leadership community together, fostering collaboration and growth in your region.
Mentor and Be Mentored: Share your expertise while learning from others in a setting designed for mutual growth and support within the Cybersecurity community.
Discover Local Solutions: Engage with local vendors and solution providers who understand the unique needs and challenges of your region, and explore potential collaborations.
Leave with Fresh Perspectives: Gain new insights and potential solutions that can address your most pressing Cybersecurity challenges, bringing fresh ideas back to your organization.
Invite-Only Leadership Gatherings:
Our Cybersecurity Leadership Networking Evenings are exclusive, invite-only gatherings, curated specifically for senior executives. By carefully vetting our guest list, we aim to bring together leaders with similar roles, seniority, and industry backgrounds to foster relevant and impactful discussions. While we strive to create a balanced mix of peers, we also value diversity of experience and perspective.
Who We Invite:
No Sales or Consultancy Roles: We are unable to accept registrations from individuals in sales, business development, account management, or consultancy roles. Our focus is on creating a peer-driven environment for end-users.
Senior-Level Decision Makers: Our events are tailored for those currently holding Chief, VP, Director, or Senior positions. Attendees should have the appropriate background to contribute meaningfully to the discussion and share insights with their peers.
End-User Organizations Only: We invite executives from end-user companies, typically within the Fortune 1000, that do not provide solutions in the subject field. This helps ensure that the event remains focused on real-world challenges and solutions, rather than product promotion.
Industry Relevance: Attendees should work in industries that align with the event’s topics, ensuring that discussions are relevant to their specific business challenges and areas of expertise.

Active Participation: We encourage attendees who are willing to engage, share experiences, and participate fully in the roundtable discussions. Our format thrives on interaction, and active involvement ensures a rich and productive experience for all.
Space is Limited:
Due to the exclusive nature of the event, space is limited, and registration requires approval. We regret that we may need to decline those who do not meet the above criteria. However, we welcome you to apply for future events or explore other opportunities with us.
No Internal Approval Needed:
Ideas and insights shared at the event reflect your personal viewpoints, not your company’s stance. Therefore, internal approval is not required for participation.
Registration Information:
Attendance is by invitation only, and space is limited. To ensure your spot at this exclusive gathering of
Cybersecurity leaders, we encourage you to register early. Simply click the link at the top of the page to complete the registration form.
If you have any questions or need assistance at any stage of the process, our dedicated team is here to help. Don’t hesitate to reach out — we’re committed to making your experience seamless from start to finish:

Insights Library

Explore Blogs

Board Member Interviews

Quick 5 Interview: Gopala Gudapati, SAP Cybersecurity Manager at Celanese

Gopala Gudapati is the SAP Cyber Security Manager at Celanese, specializing in SAP cybersecurity, enterprise security, and IT infrastructure protection. A cybersecurity leader with 30+ years of IT experience, he secures complex SAP systems in the chemical and oil & gas industries, ensuring strong enterprise risk management and operational resilience.

Read more

Board Member Interviews

Quick 5 Interview: Milan Patel, Senior Product Manager - IAM Security at Broadcom

Milan Patel is the Senior Product Manager – IAM Security at Broadcom, specializing in identity and access management (IAM), cloud security, and enterprise security. An experienced IT and cybersecurity leader, he focuses on delivering secure IAM solutions that strengthen enterprise identity protection and support digital transformation at scale.

Read more

Board Member Interviews

Quick 5 Interview: Sanjoy Sakar, SVP, Director - Application Development & Support at First Citizens Bank

Sanjoy Sarkar is the Senior Vice President and Director of Robotics & Digital Automation at First Citizens Bank, specializing in AI, automation, cloud computing, and digital transformation. A technology executive and digital transformation leader, he drives enterprise AI and automation strategies that improve efficiency, scalability, and business performance.

Read more

Board Member Interviews

Quick 5 Interview: Marcus Clark, Director of Digital Transformation at Novolex.

Marcus F. Clark is the Director of Digital Transformation at Novolex, specializing in digital transformation, enterprise IT strategy, and technology leadership. A seasoned IT executive and digital transformation leader, Marcus drives innovative, scalable solutions that align technology with business goals across complex organizations.

Read more