Evening Reception, Sunset Dinner Cruise and beach music on the Intracoastal Waterway.
A complimentary luxury motor coach will transport our guests round-trip to the boat
(based on availability as space is limited. 21 years and older)
11:00am - 3:00pm
Bike Ride - 11:30am - 2:30pm. Self guided. Fantastic views along the Intracoastal Waterway.
1st Annual EA Bocce Ball Beach Tournament starting at 11am.
9:00am - 9:40am
Morning Keynote - The Business Side of Defending Businesses
Jay Leek, Managing Director of ClearSky, and previous CISO of Blackstone, will provide insights into the shifts he is seeing in information security, critical factors that will poise companies for success in the future, and what it will take to get there. ClearSky is a venture capital/growth equity firm investing in innovative companies providing technology and services to enterprise customers, with a special focus on the power sector, and companies that offer transformative solutions for cybersecurity, industrial security and critical infrastructure security.
9:40am - 10:05am
Interview session with Brian Lawhorn, CISO at Kroger on his focus for the future, challenges he sees, expectations for success, and the key skills and strategies he will need for his organization to be successful.
Morning Break - powered by
The Shift in Information Security
From a beginning years ago as techies, to now a savvy group of seasoned business executives, security leaders are now at the forefront of their organizations. This session with JD Rogers, CISO at The Great American Insurance Company will focus on the latest thought leadership on problem solving as the current information security landscape becomes more diverse and complex.
#NoDarkspace: Learn why, what, and how to monitor and automate east-west and cloud security investigations using Network Traffic Analytics (NTA)
What is darkspace, and what do you need to do about it? Once an attacker compromises a physical, virtual, or cloud host, their next step is to roam your extended (cloud, hosted, and on-prem) network looking for opportunity. The attacker looks like an insider: just one reason they are hard to identify. Another is the increasing use of encryption, including TLS 1.3, that will make it even less likely you can detect these activities without new tools. Gartner and other analysts are recommending Network Traffic Analytics (NTA) as an important element of a healthy risk posture, primarily because of its payoff in better threat detection and response. We will walk through examples of blind spots and use cases for efficient and automated threat management for East-West and South-North attack activities. Then, as part of upgrading your security maturity, we will review case studies to leverage NTA’s auto-discovery and visibility to reduce your attack surface, improve audit and pen test results, and make SOC analysts more productive.
12:00pm - 12:20pm
Mindset…this team knows it can deliver. In this interview session with Paul Horn, CISO of HD Vest Financial Services and Raymond Lipps, CISO of Celgene, find out what CISOs think it takes to find and build a team that is invested, persistent, and knows how to overcome major challenges thrown its way.
Privileged Attack Vectors - Building Effective Defense Strategies to Protect Organizations
Cyber-attacks continue to increase in volume and sophistication. As a result, data breaches are no longer surprising or even news worthy. It’s not a matter of if, but a matter of when you will be successfully breached. This session will provide a comprehensive view of how privileges, passwords, and vulnerabilities are being leveraged as attack vectors and how you can properly take measurable steps to defend against them.
Lunch and Networking Outside in the Courtyard
We are going to enjoy the Florida weather!
Live interactive polling session on top concerns of information security executives.
Sr Director, Identity & Data Governance Strategy
Office of CTO
Sailpoint, Gold Sponsor
This presentation will discuss the historical and notable absence of unstructured file stores (e.g. file shares, cloud shares, MS SharePoint, etc.) from the Identity Governance coverage umbrella. Identity Governance and Administration vendors are primarily ensuring that the right people have the right access to the right data throughout the identity life cycle. Omitting the unstructured data stores from this paradigm is clearly not viable in today's environment. We will show why this space has been long isolated from good access governance / controls, discuss a bit about how the enterprise has been keeping that data secure up until now, and how things have recently taken a significant turn for the better. There is no reason the enterprise should feel exposed in this area of identity governance and access control. We will discuss a new and winning approach to this very challenging problem space.
Patrick Benoit, Deputy CISO of Cheetah Digital, and John Masserini, Global CISO of Millicom Tigo, will provide insights into what their organizations are doing to drive innovative approaches in information security through processes, people and technology.
Distinguished Research Fellow at The Ponemon Institute
President and CEO
Security Innovation, Silver Sponsor
Why does my bank’s website require multi-factor authentication but my money management software does not? How are they communicating with each other? These questions led to a deeply disturbing exploration of the 20 year old Open Financial Exchange (OFX) protocol and the 3000+ North American banks that support it. 30 different implementations running in the wild amount to an inviting attack surface — a digital side door into millions of consumers’ privacy and personal savings.
Cocktail Reception with Prize Drawings
Complimentary for Our Attendees and Their Guest (21 years & older)
Breakfast and Networking in the Sponsor Pavilion for Attendees