National Banner_web.png


All Summits and Symposium qualify for CPE Credits.


Saturday, October 20, 2018

4:30pm - 8:00pm

Evening Reception, Sunset Dinner Cruise and beach music on the Intracoastal Waterway.

A complimentary luxury motor coach will transport our guests round-trip to the boat

(based on availability as space is limited. 21 years and older)

Sunday, October 21, 2018

11:00am - 3:00pm

Bike Ride - 11:30am - 2:30pm. Self guided. Fantastic views along the Intracoastal Waterway.  

1st Annual EA Bocce Ball Beach Tournament starting at 11am.

7:00pm - 9:00pm
Opening Welcome Reception, Chef’s Dinner and Beach Music
Complimentary for Our Attendees and Their Guest  (21 years & older)

Monday, October 22, 2018

7:30am - 8:40am
Registration Opens with a Breakfast Buffet and Networking in the Sponsor Pavilion for Symposium Attendees.

8:40am - 9:00am

Welcome and Opening Remarks

Mary Lou Heastings
Executive Alliance Inc.
Richard Warner
Symposium Moderator

9:00am - 9:40am

Morning Keynote - The Business Side of Defending Businesses


Jay Leek

Managing Director



Jay Leek, Managing Director of ClearSky, and previous CISO of Blackstone, will provide insights into the shifts he is seeing in information security, critical factors that will poise companies for success in the future, and what it will take to get there.  ClearSky is a venture capital/growth equity firm investing in innovative companies providing technology and services to enterprise customers, with a special focus on the power sector, and companies that offer transformative solutions for cybersecurity, industrial security and critical infrastructure security.


9:40am - 10:05am

Guiding Information Security into the Future


Brian Lawhorn

Corporate Vice President,

Chief Information Security Officer

The Kroger Company

Interview session with Brian Lawhorn, CISO at Kroger on his focus for the future, challenges he sees, expectations for success, and the key skills and strategies he will need for his organization to be successful.


10:05am - 10:25am 
Think like a CISO

Chip Crane

North American Technical Executive

IBM, Gold Sponsor

CISOs face incredible challenges as they navigate a world of threats from every vector while dealing with the business pressures of an ever expanding marketplace.  The problems are complex and grow in depth every day. Join this interactive session to find out how many CISOs learn to face and overcome the problems of modern business.
10:25am -11:05am

Morning Break - powered by ExtraHop Logo - Large 

11:05am -11:30am

The Shift in Information Security


JD Rogers

Chief Information Security Officer

American Financial Group Inc.

From a beginning years ago as techies, to now a savvy group of seasoned business executives, security leaders are now at the forefront of their organizations.  This session with JD Rogers, CISO at The Great American Insurance Company will focus on the latest thought leadership on problem solving as the current information security landscape becomes more diverse and complex.


11:30am -12:00pm

#NoDarkspace: Learn why, what, and how to monitor and automate east-west and cloud security investigations using Network Traffic Analytics (NTA)


Matt Cauthorn

VP of Security

ExtraHop, Platinum Sponsor


What is darkspace, and what do you need to do about it? Once an attacker compromises a physical, virtual, or cloud host, their next step is to roam your extended (cloud, hosted, and on-prem) network looking for opportunity. The attacker looks like an insider: just one reason they are hard to identify. Another is the increasing use of encryption, including TLS 1.3, that will make it even less likely you can detect these activities without new tools. Gartner and other analysts are recommending Network Traffic Analytics (NTA) as an important element of a healthy risk posture, primarily because of its payoff in better threat detection and response. We will walk through examples of blind spots and use cases for efficient and automated threat management for East-West and South-North attack activities. Then, as part of upgrading your security maturity, we will review case studies to leverage NTA’s auto-discovery and visibility to reduce your attack surface, improve audit and pen test results, and make SOC analysts more productive.


12:00pm - 12:20pm

The X Factor in an A Team


Raymond Lipps




Paul Horn


HD Vest Financial Services


Mindset…this team knows it can deliver.  In this interview session with Paul Horn, CISO of HD Vest Financial Services and Raymond Lipps, CISO of Celgene, find out what CISOs think it takes to find and build a team that is invested, persistent, and knows how to overcome major challenges thrown its way.


12:20pm -12:40pm

Privileged Attack Vectors - Building Effective Defense Strategies to Protect Organizations


Morey Haber

Chief Technology Officer

BeyondTrust, Gold Sponsor


Cyber-attacks continue to increase in volume and sophistication. As a result, data breaches are no longer surprising or even news worthy. It’s not a matter of if, but a matter of when you will be successfully breached. This session will provide a comprehensive view of how privileges, passwords, and vulnerabilities are being leveraged as attack vectors and how you can properly take measurable steps to defend against them.


12:40pm - 1:45pm

Lunch and Networking Outside in the Courtyard

We are going to enjoy the Florida weather!

1:45pm - 2:00pm

Top of Mind

Live interactive polling session on top concerns of information security executives.


2:00pm – 2:20pm
“And Then There Was Light...”

Phil McQuitty

Sr Director, Identity & Data Governance Strategy

Office of CTO

Sailpoint, Gold Sponsor


This presentation will discuss the historical and notable absence of unstructured file stores (e.g. file shares, cloud shares, MS SharePoint, etc.) from the Identity Governance coverage umbrella.  Identity Governance and Administration vendors are primarily ensuring that the right people have the right access to the right data throughout the identity life cycle.  Omitting the unstructured data stores from this paradigm is clearly not viable in today's environment.   We will show why this space has been long isolated from good access governance / controls, discuss a bit about how the enterprise has been keeping that data secure up until now, and how things have recently taken a significant turn for the better.  There is no reason the enterprise should feel exposed in this area of identity governance and access control.  We will discuss a new and winning approach to this very challenging problem space.


2:20pm – 2:40pm
Innovative Approaches to Information Security

Patrick Benoit

Deputy CISO

Cheetah Digital


John Masserini

Global CISO


Patrick Benoit, Deputy CISO of Cheetah Digital, and John Masserini, Global CISO of Millicom Tigo, will provide insights into what their organizations are doing to drive innovative approaches in information security through processes, people and technology.


2:40pm – 3:10pm 
Your Bank’s Digital Side Door

Ed Adams

Distinguished Research Fellow at The Ponemon Institute

President and CEO

Security Innovation, Silver Sponsor


Why does my bank’s website require multi-factor authentication but my money management software does not? How are they communicating with each other? These questions led to a deeply disturbing exploration of the 20 year old Open Financial Exchange (OFX) protocol and the 3000+ North American banks that support it. 30 different implementations running in the wild amount to an inviting attack surface — a digital side door into millions of consumers’ privacy and personal savings.


3:10pm - 3:15pm
Day One Wrap-Up
3:15pm - 6:00pm
Break - Free Time for Attendees
6:00pm - 7:30pm

Cocktail Reception with Prize Drawings
Complimentary for Our Attendees and Their Guest  (21 years & older)


Tuesday, October 23, 2018

8:00am – 9:10am

Breakfast and Networking in the Sponsor Pavilion for Attendees