Florida CIO Virtual Executive Summit

May 25, 2021 | 8:00am - 3:00pm EDT

May 25, 2021 | 8:00am - 3:00pm EDT

REGISTER NOW

Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Florida CIO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CIOs today:

Bringing cloud back down to earth

Identity, access and the strategic approach to trust

The nuances of back-to-office planning and hybrid workforces

Co-Chairs

Shawn Bowen

World Fuel Services
Vice President & Chief Information Security Officer

Otto Contreras

City of Miami, FL
Deputy CIO

Gary Eppinger

Carnival Cruise Lines
Global Chief Information Security Officer & Privacy Officer

Juan Gomez-Sanchez

Lennar
Chief Security Officer

Kevin Grayling

Florida Crystals Corporation
Vice President & Chief Information Officer

Gram Ludlow

Marriott Vacations Worldwide Corporation
VP, Global Information Security

Marcos Marrero

H.I.G. Capital
Chief Information Security Officer

Dave Pearson

Sykes Enterprises
Executive VP & Chief Information Officer

Luis Suarez

H.I.G. Capital
Senior VP & Chief Information Officer

Christine Vanderpool

Florida Crystals Corporation
Vice President & Chief Information Security Officer

What to Expect

Connect with your CIO community through a variety of different session formats at the upcoming Virtual Executive Summit. You'll have the opportunity to listen, engage and create lasting relationships with like-minded peers.

Sessions

Hear from CIO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join intimate, interactive discussions with peers in Boardroom sessions.

Meet the Speakers

Don't miss this opportunity to meet with CIO practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the Florida community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. Be sure to opt in when you register and get matched based on your key priorities.

Agenda


May 25, 2021

8:00am - 8:45am EDT Virtual Summit Keynote

The Path to Alignment – The CIO and CISO Relationship

Christopher Rogers headshot

Christopher Rogers

Chief Security Officer & Deputy CIO

Sykes Enterprises

Dave Pearson headshot

Dave Pearson

Executive VP & Chief Information Officer

Sykes Enterprises

Louis Lerman headshot

Louis Lerman

Vice President & Chief Information Security Officer

MEDNAX

CIO-CISO partnerships are built on trust and thrive when leaders invest in each other throughout the organization. Last year, SYKES dealt with an increase in threats and attacks while pivoting to a remote workforce in 23 countries across the globe and the strong partnership between CIO Dave Pearson and CSO Christopher Rogers helped enable the company to quickly adapt and respond.

Join this keynote as Dave and Christopher share their story on how to:

  • Strengthen the IT-Security partnership to fuel innovation and accelerate new technology deployments
  • Ensure security is represented as a holistic element of the organization
  • Collaborate in different business sectors while moving business initiatives forward

8:45am - 9:00am EDT Break

9:00am - 10:00am EDT Virtual Summit Boardroom

Modern Data Protection for Modern Challenges

Juan Gomez-Sanchez headshot

Juan Gomez-Sanchez

Chief Security Officer

Lennar

Brad Linch headshot

Brad Linch

Senior Enterprise Sales Engineer

Veeam

 For many businesses, the path of digital transformation presents challenges — including reliance on legacy systems, skills gaps and performance concerns. CIOs are challenged to provide a modern data protection solution that unblocks potential pitfalls and delivers the results their organization needs to succeed.

Join this boardroom to discuss:

  • Building a comprehensive data management & data protection strategy that encompasses cloud, SaaS, virtual and physical workloads
  • Accelerating data protection capabilities while maximizing potential to achieve governance, security and productivity goals
  • Strategies to make data fluid across the enterprise while freeing up resources constrained by legacy tools and focusing them on accelerating innovative projects


9:00am - 10:00am EDT Virtual Summit Boardroom

Securing and Scaling Cloud Environments

Hillery Hunter headshot

Hillery Hunter

CTO, IBM Cloud

IBM

Igor Spektor headshot

Igor Spektor

VP, Chief Information Security Officer

TracFone Wireless

Studies show that 74% of CEOs believe cloud computing will be the most helpful technology to deliver results over the next 2-3 years. How can businesses digitally transform with cloud, while ensuring they have a secure environment where customers’ data is not compromised?
Join us for an interactive boardroom that explores how businesses can:

  • Make the transition to cloud rapidly while keeping experiences frictionless for consumers
  • Build secure and open hybrid cloud architecture and distributed cloud environments
  • Explore strategic cloud options and execute on them seamlessly

By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address: ibm.biz/marketingoptout

9:00am - 10:00am EDT Virtual Summit Boardroom

Is Identity and Access Enlightenment Possible?

Nicole Ford headshot

Nicole Ford

VP and Chief Information Security Officer

Carrier

James Nolin headshot

James Nolin

Sr. Director IT Operations

Spirit Airlines

Wolf Goerlich headshot

Wolf Goerlich

Advisory CISO

Duo Security

 What would it mean for the world of business if an organization could fully and effortlessly manage the access of its users? Every enterprise requires safeguards to ensure that the right people are accessing the right systems and information, and finding that balance between agility and security is a unique challenge for any CISO. After so many years spent tackling this issue, has a new way forward revealed itself?

Join this session to discuss:

  • Prudent approaches to right-size the balance of security controls and agile access
  • Ways your peers discuss strategy for trust and access with other senior leaders
  • New technologies that are improving the world of IAM

10:00am - 10:45am EDT Virtual Summit Keynote

Work from Anywhere and the Evolution of Culture and Talent

Kevin Grayling headshot

Kevin Grayling

Vice President & Chief Information Officer

Florida Crystals Corporation

Curtis Peterson headshot

Curtis Peterson

SVP, Operations

RingCentral

As organizations have embraced remote work out of necessity during the pandemic, the market for tech talent has shifted dramatically. Employers can compete for tech talent regardless of location while simultaneously creating a culture that is founded on collaboration and communication. This session will address the unique opportunities the work from anywhere movement have provided to enable a productive and purpose-led organization. 

Join this session for a discussion on:

  • What you can do to maximize the benefits of a distributed workforce
  • How you’re thinking about the future of talent and culture
  • How an increasingly remote tech talent landscape can provide more equitable access

10:45am - 11:00am EDT Break

11:00am - 12:00pm EDT Virtual Summit Boardroom

Accelerating Security at the Pace of the Business

Otto Contreras headshot

Otto Contreras

Deputy CIO

City of Miami, FL

David Galloway headshot

David Galloway

VP, IT

Oxbow

In 2020, the multi-decade process of turning the digital enterprise inside out accelerated instantly. We’ve now passed an inflection point – most cyber assets live outside the old “walls” of the organization and cybersecurity controls must be scalable, flexible and reliable. How are CIOs partnering with CISOs to establish a security strategy that is an enabler of the digital business rather than an obstacle?

In this interactive session, you’ll discuss:

  • Redesigning cybersecurity architecture to enable the work-from-anywhere culture
  • Foundational technologies to support a global cybersecurity mesh
  • Reconceptualizing traditional ideas of how to approach security within the enterprise and shifting the business mindset

11:00am - 12:00pm EDT Virtual Summit Boardroom

Collaboration to Drive the Future Enterprise

Jennifer Greenman headshot

Jennifer Greenman

Chief Information Officer

Cancer Treatment Centers of America

Gram Ludlow headshot

Gram Ludlow

VP, Global Information Security

Marriott Vacations Worldwide Corporation

Remote work is here to stay for many organizations, which creates myriad new opportunities and imperatives for IT and security solutions that power cross-company collaboration. Is your current application portfolio up to the task?

Join this session to discuss:

  • Gaps and challenges in your current solution set
  • Integrated, user-centric solutions that make collaboration seamless
  • Strategies for expanding upon existing cloud frameworks to evolve with the current landscape

12:00pm - 12:45pm EDT Virtual Summit Keynote

Navigating A People-Centric Approach to Security

Lucia Milica headshot

Lucia Milica

Global Resident CISO

Proofpoint

With remote work, organizations around the world are at a greater risk of cyber threats than ever before, and cybercriminals are taking advantage of the situation. In this session, you will examine the biggest challenges security leaders face, and why a people-centric approach to security is everyone’s biggest opportunity to better protect their organization.

In this session, you will explore:

  • How remote work and the move to the cloud has changed the nature of threats to data
  • The ways in which organizations are building controls to better understand and protect their employees
  • The impact of changing behaviors, employee culture and workplace environment on people risk
  • How today’s threats are informing your data protection practices/controls

12:45pm - 1:15pm EDT Networking

Meet the Speakers

Don't miss this opportunity to meet with CIO practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the Florida community. 

1:15pm - 1:30pm EDT Break

1:30pm - 3:00pm EDT Virtual Peer-to-Peer Meetings

Peer-to-Peer Meetings

Meet virtually for in-depth conversations with your colleagues

May 25, 2021

8:00am - 8:45am EDT Virtual Summit Keynote

The Path to Alignment – The CIO and CISO Relationship

Christopher Rogers headshot

Christopher Rogers

Chief Security Officer & Deputy CIO

Sykes Enterprises

Dave Pearson headshot

Dave Pearson

Executive VP & Chief Information Officer

Sykes Enterprises

Louis Lerman headshot

Louis Lerman

Vice President & Chief Information Security Officer

MEDNAX

CIO-CISO partnerships are built on trust and thrive when leaders invest in each other throughout the organization. Last year, SYKES dealt with an increase in threats and attacks while pivoting to a remote workforce in 23 countries across the globe and the strong partnership between CIO Dave Pearson and CSO Christopher Rogers helped enable the company to quickly adapt and respond.

Join this keynote as Dave and Christopher share their story on how to:

  • Strengthen the IT-Security partnership to fuel innovation and accelerate new technology deployments
  • Ensure security is represented as a holistic element of the organization
  • Collaborate in different business sectors while moving business initiatives forward

8:45am - 9:00am EDT Break

9:00am - 10:00am EDT Virtual Summit Boardroom

Is Identity and Access Enlightenment Possible?

Nicole Ford headshot

Nicole Ford

VP and Chief Information Security Officer

Carrier

James Nolin headshot

James Nolin

Sr. Director IT Operations

Spirit Airlines

Wolf Goerlich headshot

Wolf Goerlich

Advisory CISO

Duo Security

 What would it mean for the world of business if an organization could fully and effortlessly manage the access of its users? Every enterprise requires safeguards to ensure that the right people are accessing the right systems and information, and finding that balance between agility and security is a unique challenge for any CISO. After so many years spent tackling this issue, has a new way forward revealed itself?

Join this session to discuss:

  • Prudent approaches to right-size the balance of security controls and agile access
  • Ways your peers discuss strategy for trust and access with other senior leaders
  • New technologies that are improving the world of IAM

9:00am - 10:00am EDT Virtual Summit Boardroom

Risk – Measuring What Counts

Shawn Bowen headshot

Shawn Bowen

Vice President & Chief Information Security Officer

World Fuel Services

Andrew Cannata headshot

Andrew Cannata

Global Chief Information Security Officer

Primo Water Corporation

Rich Latayan headshot

Rich Latayan

Chief Information Security Officer

AAA National

Eduardo Ortiz headshot

Eduardo Ortiz

Head of Cybersecurity

Techtronic Industries North America, Inc.

Sophisticated enterprise risk management strategy is not necessarily the full mitigation of risk. For most information security executives, strategic risk management describes a cross-organizational framework to assess different areas of risk and determine when accepting those risks is in the net interest of the business. In order to inform strategy and accountability for risk management, CISOs must be able to leverage meaningful metrics and messaging.

Join this session to discuss:

  • Metrics that work – and don’t work – in describing information security risk
  • The role that the CISO plays in setting risk management strategy
  • Effective cross-functional partnerships in risk management

10:00am - 10:45am EDT Virtual Summit Keynote

Work from Anywhere and the Evolution of Culture and Talent

Kevin Grayling headshot

Kevin Grayling

Vice President & Chief Information Officer

Florida Crystals Corporation

Curtis Peterson headshot

Curtis Peterson

SVP, Operations

RingCentral

As organizations have embraced remote work out of necessity during the pandemic, the market for tech talent has shifted dramatically. Employers can compete for tech talent regardless of location while simultaneously creating a culture that is founded on collaboration and communication. This session will address the unique opportunities the work from anywhere movement have provided to enable a productive and purpose-led organization. 

Join this session for a discussion on:

  • What you can do to maximize the benefits of a distributed workforce
  • How you’re thinking about the future of talent and culture
  • How an increasingly remote tech talent landscape can provide more equitable access

10:45am - 11:00am EDT Break

11:00am - 12:00pm EDT Virtual Summit Boardroom

Collaboration to Drive the Future Enterprise

Jennifer Greenman headshot

Jennifer Greenman

Chief Information Officer

Cancer Treatment Centers of America

Gram Ludlow headshot

Gram Ludlow

VP, Global Information Security

Marriott Vacations Worldwide Corporation

Remote work is here to stay for many organizations, which creates myriad new opportunities and imperatives for IT and security solutions that power cross-company collaboration. Is your current application portfolio up to the task?

Join this session to discuss:

  • Gaps and challenges in your current solution set
  • Integrated, user-centric solutions that make collaboration seamless
  • Strategies for expanding upon existing cloud frameworks to evolve with the current landscape

11:00am - 12:00pm EDT Virtual Summit Boardroom

Defeating Ransomware By Protecting Active Directory

Tony Cole headshot

Tony Cole

CTO

Attivo Networks

Christine Vanderpool headshot

Christine Vanderpool

Vice President & Chief Information Security Officer

Florida Crystals Corporation

Marcos Marrero headshot

Marcos Marrero

Chief Information Security Officer

H.I.G. Capital

The majority of corporate ransomware attacks involve the compromise of Active Directory (AD) and the SolarWinds Congressional hearings highlighted critical security gaps related to privilege escalation and lateral movement detection.  Defending against this stage 2 of an attack has escalated to atop 2021 priority for every CISO. Active Directory is inherently complex and insecure, and without the right tools to understand vulnerabilities and live attacks, comes with dire consequences when its control is lost to an attacker.

Join this session discuss methods to strengthen your defense strategy, including:

  • Why Active Directory is the attack vector of choice for 2021
  • How ransomware uses AD to accomplish their goals
  • How data cloaking conceals credentials, AD objects, and data to prevent lateral movement and derail attacks
  • What automated tools can be deployed to improve your security posture and accelerate detection of AD live attacks.

12:00pm - 12:45pm EDT Virtual Summit Keynote

Navigating A People-Centric Approach to Security

Lucia Milica headshot

Lucia Milica

Global Resident CISO

Proofpoint

With remote work, organizations around the world are at a greater risk of cyber threats than ever before, and cybercriminals are taking advantage of the situation. In this session, you will examine the biggest challenges security leaders face, and why a people-centric approach to security is everyone’s biggest opportunity to better protect their organization.

In this session, you will explore:

  • How remote work and the move to the cloud has changed the nature of threats to data
  • The ways in which organizations are building controls to better understand and protect their employees
  • The impact of changing behaviors, employee culture and workplace environment on people risk
  • How today’s threats are informing your data protection practices/controls

12:45pm - 1:15pm EDT Networking

Meet the Speakers

Don't miss this opportunity to meet with CIO practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the Florida community. 

1:15pm - 1:30pm EDT Break

1:30pm - 3:00pm EDT Virtual Peer-to-Peer Meetings

Peer-to-Peer Meetings

Meet virtually for in-depth conversations with your colleagues

REGISTER

Your Community Partners


Key Partners
Program Partners

Florida CIO Program Manager


For inquiries related to this event, please reach out to your dedicated program contact.

Kaila Overton

Program Manager

kaila.overton@evanta.com