IN-PERSON

Miami CIO Executive Summit

June 26, 2018 | The Ritz-Carlton Coconut Grove, Miami

June 26, 2018
The Ritz-Carlton Coconut Grove, Miami

Collaborate with your peers

Get together with your peers to tackle top business challenges through peer-driven content and discussions at the Miami CIO Executive Summit.

Join your peers to discuss the most critical issues impacting CIOs today:

Investing in your people and the right technologies

Innovating with advanced technologies and new delivery models

Influencing business stakeholders and enterprise outcomes

Miami CIO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CIOs, for CIOs.

Governing Body Co-Chairs

Ken Athanasiou

AutoNation, Inc.
VP, CISO

Brad Dettmer

Wyndham Destinations
CIO

Gary Eppinger

Carnival Corporation
Global VP, CISO & Privacy Officer

Juan Gomez-Sanchez

Lennar Corporation
Chief Security Officer

John Graham

Jabil Circuit, Inc.
CISO

Lou Grande

Red Lobster Seafood Company
SVP, IT

Donagh Herlihy

Bloomin Brands
Executive Vice President and Chief Technology Officer

Marcos Marrero

HIG Capital
Director of Information Security

Scott McBee

Darden
CISO

Agenda


June 25, 2018

6:00pm - 8:30pm  Governing Body Welcome Reception

Dinner and Entertainment

Join us on the terrace for a relaxing evening featuring dinner and salsa dancers as entertainment.

7:00am - 7:45am  Registration & Breakfast

8:00am - 8:30am  Keynote

CIO/CISO Collaboration - Facing the Security Reality Together

Brad Dettmer headshot

Brad Dettmer

CIO

Wyndham Destinations

Walter Yosafat headshot

Walter Yosafat

SVP & Global CIO

Wyndham Worldwide Corporation

Stan Kreydin headshot

Stan Kreydin

CTO & CISO

Wyndham Destinations

As technological advances become increasingly mandatory for businesses, CIOs and CISOs face dual objectives of digital advancements and system stability. In this session, they will candidly discuss how their roles have evolved with the changing digital landscape, giving you insight into their challenges, successes and lessons for the future.

8:30am - 9:00am  Networking Break

9:00am - 9:50am  Breakout Session

Cultivating Talent and Redefining the “Unicorn Candidate”

Ken Athanasiou headshot

Ken Athanasiou

VP, CISO

AutoNation, Inc.

Donagh Herlihy headshot

Donagh Herlihy

Executive Vice President and Chief Technology Officer

Bloomin Brands

Juan Gomez-Sanchez headshot

Juan Gomez-Sanchez

Chief Security Officer

Lennar Corporation

As technological needs increase and the available talent pool shrinks, companies are left wondering how to meet their staffing needs. Join regional leaders as they discuss how to think outside the box regarding talent. This panel will encourage you to abandon the “unicorn candidate,” realizing that the perfect candidate likely doesn’t exist while real, qualified individuals are right in front of you.  Come explore how to cultivate talent from within, recruit unconventional candidates and retain your skilled employees.

9:00am - 9:50am  Breakout Session

Cybercriminal Operations Revealed

Eduardo Cabrera headshot

Eduardo Cabrera

Chief Cybersecurity Officer

Trend Micro Inc.

Most criminal syndicates today include a cyber arm, because of the vast amounts of money it can make targeting businesses around the world. Eduardo Cabrera dives into how these organizations are set up, how they pick their targets, their infection routines and how they maximize breach access for the highest profits. Join this session for a better understanding of how cybercriminals work and ways you can guard against attacks.

9:00am - 9:50am  Executive Boardroom

Communicating Cyber Risks to the Board

Dmitry Kuchynski headshot

Dmitry Kuchynski

Security Principal

Cisco Systems, Inc.

Christopher Roche headshot

Christopher Roche

CIO

Florida Power & Light

CIOs and CISOs are increasingly being asked to report on cybersecurity at board meetings. This can mean everything from simply keeping the board members abreast of the current landscape to convincing them a big spend is needed to keep the organization safe. How do executives address cybersecurity across business units and assess whether a business is structured properly to avoid a breach? What is the best way to quantify a company’s risk exposure? In this interactive boardroom session, gain insight from your peers as they talk through effective strategies on what the board actually wants (and needs) to hear.

9:00am - 9:50am  Executive Boardroom

AI in Data Breaches – The Dark Side of Machine Learning

Tom Pace headshot

Tom Pace

Sr. Director, Professional Services

Cylance

Victor Campos headshot

Victor Campos

Senior Director, IT Security

Brightstar Corp.

Unless you live under a rock, you have watched numerous high-profile companies fall prey to hacks and data breaches. With hostile threats becoming faster and less predictable, how do you stay ahead in the threat landscape? As AI and machine learning become key tools for the average company, they are also valuable assets to hackers in attacks. Look at the methods hackers are currently using, how AI and machine learning can be used to breach your company’s firewalls, and ways you can stay ahead of the individuals who are working to breach your security.

9:50am - 10:20am  Networking Break

10:20am - 11:10am  Breakout Session

Not Just Cryptocurrency — Practical Blockchain Uses and Potential

Ram Marupudi headshot

Ram Marupudi

Enterprise Architect

Southeastern Grocers, Inc.

Ben Miron headshot

Ben Miron

Director of Information & Cyber Security (CISO)

NextEra Energy Resources

Patrick O'Leary headshot

Patrick O'Leary

Vice President of Architecture, Infrastructure and Network Engineering

Southeastern Grocers

“Blockchain” is undoubtedly the year’s biggest IT buzzword, but how are companies actually using this emerging technology? The potential is endless — from increasing product traceability and visibility to simplifying records for audits, blockchain might not be a cryptocurrency, but it can save you time and money. This panel will discuss specific usage cases of how companies are employing blockchain now, while posing relevant questions about implementation and execution.

10:20am - 11:10am  Breakout Session

Fortify Your Defenses by Making Cyber Attacks Expensive

Bill Swearingen headshot

Bill Swearingen

Director of Cyber Defense

CenturyLink

There’s a saying: Defenders have to get security right every time, but an attacker only has to get it right once. In this session, Bill Swearingen will explore the phases of a cyber attack, identifying points where defenders can make it prohibitively expensive for the attacker to keep going. Learn how changing your perception of the inevitable attack can help you develop techniques to gain the upper hand. Hear about actionable processes that shift power to the defense and allow the good guys to come out on top.

10:20am - 11:10am  Executive Boardroom

Zero Trust is a Journey, Not a Destination

Sean Frazier headshot

Sean Frazier

Advisory CISO - Federal

Duo Security

Juan Gomez-Sanchez headshot

Juan Gomez-Sanchez

Chief Security Officer

Lennar Corporation

Chris Bitner headshot

Chris Bitner

Vice President, Global Chief Information Security Officer

Bloomin' Brands, Inc.

One of the inherent problems for CIOs and CISOs is how too many things run way too openly with too many default connections. This significant issue has led some to adopt a Zero Trust model to simplify security holistically. In other words, Zero Trust centers on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access. In this interactive session, learn from your peers, as they discuss their cloud migration and mobile journeys as it relates to a Zero Trust.  Benefit from case studies on how organizations have rolled out an ongoing Zero Trust ecosystem and how ‘defense in depth’ security models have become too complex for some on this journey.

10:20am - 11:10am  Executive Boardroom

Evolution of an Integrated Cybersecurity Office: A CISO’s Perspective

John Graham headshot

John Graham

CISO

Jabil Circuit, Inc.

Toni Buhrke headshot

Toni Buhrke

World Wide Director of Channel & Inside Systems Engineering

ForeScout Technologies, Inc.

The hyper-growth of IoT across the enterprise is forcing leaders to reassess how they secure their networks. Recent Forrester research has unveiled some hidden technical and organizational challenges IT professionals should be aware of when managing their overall security framework. There appears to be a dynamic shift in the way organizations are handling security and risk. Join this interactive session, led by ForeScout, to discuss effective strategies for devising information risk and value metrics, as well as security operational metrics, that are relevant to the board and executive team. Come ready to learn and share what organizations can do to better defend IoT-enabled systems from cyberattacks and mature the SOC into an Integrated Cybersecurity Fusion Center.

11:10am - 11:40am  Networking Break

12:20pm - 12:50pm  Keynote

Emotional Safety — The Secret Sauce of Smart Decisions

Henry Evans headshot

Henry Evans

Author, "Step Up: Lead in Six Moments That Matter"

Everyone has the potential to better demonstrate true leadership. The question we may not be asking is: Does the person with the formal title or authority always have to lead? Organizations that generate a safe environment of leadership at every level gain a strong competitive advantage. Join Henry Evans as he explains how to increase the speed and quality of your organization’s decisions by empowering leaders at every level.

12:50pm - 1:20pm  Networking Break

1:20pm - 2:10pm  Breakout Session

Combining AI and Human Intelligence to Erase the Failure Component

Dave Pearson headshot

Dave Pearson

EVP & CIO

Sykes Enterprises, Inc.

As your company embraces the AI trend, how can you maximize the benefits of machine learning without suffering from the typical errors that occur when technology replaces humans? In this session, Dave Pearson shares how his company uses AI to study its employees’ interactions with customers, building a system that combines human performance with AI. This future-looking project not only makes AI more believable, it also allows humans and machines to learn from each other. Pearson will challenge you to view digital transformation as a relentless pursuit of excellence, with AI as a key tool to improve the customer experience, regardless of your industry.

1:20pm - 2:10pm  Breakout Session

API Management in a Multi-Cloud, Hybrid and Microservices World

Prithpal Bhogill headshot

Prithpal Bhogill

Product Manager

Google Cloud

In the extremely mobile culture we live in today, employees and customers require greater flexibility and efficiency within the cloud. Likewise, with the Internet of Things, CIOs and CISOs are going to see a tremendous number of devices and consumer products producing and communicating a huge amount of data. With these challenges, an API Management platform could provide a solution and help reduce risk in cloud migration, managing microservices and improving security. In this session, listen to case study examples of how APIs can provide end-to-end visibility and facilitate interconnection in this ever-changing environment.

1:20pm - 2:10pm  Executive Boardroom

The Key Pillars of Cloud Security

Marcos Marrero headshot

Marcos Marrero

Director of Information Security

HIG Capital

Gram Ludlow headshot

Gram Ludlow

VP, Global Information Security

Marriott Vacations Worldwide Corporation

Chris Barngrover headshot

Chris Barngrover

Director of North American Solution Engineering

Saviynt

With hybrid IT becoming the norm, critical enterprise assets like sensitive data and infrastructure now reside beyond the traditional perimeter. As organizations gain control over shadow IT, they’re also under pressure to deliver sanctioned cloud platforms that meet security and compliance mandates. With cloud providers offering varying degrees of control over security, identity becomes the common thread binding the security and trust fabric together. This discussion will delve into real-world security challenges around cloud adoption. Learn about the security controls needed to gain visibility and protect your applications, data and infrastructure with a well thought-out, privileged-access governance strategy.

1:20pm - 2:10pm  Executive Boardroom

Operational Metrics That Effectively Communicate Cyber Exposure

John Masserini headshot

John Masserini

CISO

Millicom (Tigo) Telecommunications

Tom Lynn headshot

Tom Lynn

Regional Manager

Tenable

Jack Way headshot

Jack Way

Executive Director, Security & IT Compliance

Sykes Enterprises, Inc.

Cyber exposure is all about coverage — ensuring that you’re measuring the right things to secure the business. Equally important? Defining your operational metrics to create a strategic baseline for a business discussion between the CISO, the CIO and the business. This translates raw security data into a common language so you can communicate your security program goals and needs. Join the discussion on how to build the right approach to operational metrics — one that can enable your organization to better understand and address its cyber exposure gap and best defend the modern attack surface.

2:10pm - 2:30pm  Networking Break

2:30pm - 3:20pm  Breakout Session

Going All In With the Cloud

Tim Moran headshot

Tim Moran

SVP, Global IT, Financial Technology

Live Nation Entertainment

The journey to the cloud for Live Nation kicked off in 2015 with a mandate to get out of the data center business. Focusing on the growth of the business, the company made the strategic decision to migrate to the cloud. Following an aggressive timeline, Live Nation migrated its systems to the cloud and shut down related servers and storage in the data center. Tim Moran, SVP of Global IT for Live Nation, shares the pitfalls and successes of the journey and advantages his organization has found with the shift.

2:30pm - 3:20pm  Executive Boardroom

Developing a Comprehensive Digital Security Strategy

Brian Philips headshot

Brian Philips

Chief Solutions Architect

NETSCOUT | Arbor

Gary Eppinger headshot

Gary Eppinger

Global VP, CISO & Privacy Officer

Carnival Corporation

Lars Schmekel headshot

Lars Schmekel

CISO

County of Miami-Dade

Cyberattacks are inevitable. How can companies build a digital security strategy that will stay ahead of the enemy? In this session, look at elements that should be considered when creating a security strategy, and discuss how to find the right metrics and methods to sell your plan to the board. Hear from your peers about how to bake security systems into existing company processes and adapt to ever-changing threats to your systems.

2:30pm - 3:20pm  Executive Boardroom

The Artificial Intelligence Imperative: Automation to AI-based applications - Concerns and Opportunities

Sudhir  Jha headshot

Sudhir Jha

SVP & Global Head of Product Management & Strategy Infosys

Infosys

Balaji Rangaswamy headshot

Balaji Rangaswamy

CIO

KLX Aerospace Solutions

Employing Artificial Intelligence (AI) capabilities, businesses can leverage existing enterprise investments in newer ways to become future-ready. For businesses keen on digital transformation the need is to adopt the right technology without disrupting existing IT infrastructures. For many this is a journey that begins with automation and is fully realized with specifically crafted applications running on and benefiting from an AI platform that provides a range of capabilities including Machine Learning. In this interactive session, we will discuss how enterprises are taking this journey with some real life examples.

3:20pm - 3:40pm  Networking Break

3:40pm - 4:20pm  Keynote

The Agile Vision for World Fuel

Tim Ramsay headshot

Tim Ramsay

Vice President, Information Security

World Fuel Services Corporation

Jeff Smith headshot

Jeff Smith

EVP and COO

World Fuel Services Corporation

In this session, Tim Ramsay and Jeff Smith discuss how an agile approach to their leadership have transformed World Fuel's security program. 

4:20pm - 5:00pm  Closing Reception & Prize Drawing

June 25, 2018

Location


Your Community Partners


Presenting Sponsors
National Sponsors

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

John Seabury

Program Manager

503-929-9168

john.seabury@evanta.com