IN-PERSON

Florida CISO Executive Summit

December 5, 2019 | Loews Miami Beach Hotel

December 5, 2019
Loews Miami Beach Hotel

Collaborate with your peers

Get together with your peers to tackle top business challenges through peer-driven content and discussions at the Florida CISO Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Investing in your people and the right technologies

Innovating with advanced technologies and new delivery models

Influencing business stakeholders and enterprise outcomes

Florida CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Ken Athanasiou

VF Corporation
Global CISO

Shawn Bowen

Restaurant Brands International
CISO

Roland Cloutier

ADP
SVP & Global CSO

Gary Eppinger

Carnival Corporation
Global VP, CISO & Privacy Officer

Juan Gomez-Sanchez

Lennar Corporation
Chief Security Officer

Gram Ludlow

Marriott Vacations Worldwide Corporation
VP, Global Information Security

Marcos Marrero

H.I.G. Capital
VP of Information Security

Dave Pearson

Sykes Enterprises, Inc.
EVP & CIO

Christine Vanderpool

Florida Crystals
Vice President & Chief Information Security Officer

Agenda


December 4, 2019

December 5, 2019

6:00pm - 8:30pm  Governing Body Welcome Reception

Unpacking the CIO Narrative & Managing the Brand of IT

Thornton May headshot

Thornton May

Futurist

Every CIO has a unique story. Every IT organization has a brand related to value creation and service experience. Each of us has something to teach and something to learn. Futurist and anthropologist Thornton May will precipitate animated C-2-C conversations unlocking the accumulated wisdom in the room summarizing lessons learned leading in an era where uncertainty has become a central feature of modern capitalism. The future belongs to those with the analytical and rhetorical power to make their models and stories count.

In this session, you’ll discover:

  • How to put uncertainty to good use
  • Why story-telling is the newest must-have skill
  • What the new decade will bring


7:30am - 8:15am  Registration & Breakfast

8:15am - 8:30am  Opening Comments

8:30am - 9:00am  Keynote

Alliances at the Intersection of Tech and Talent

Cheryl Altany headshot

Cheryl Altany

Global Segment Strategy Head – Education | STEM | Campuses

Carrier

Nicole Ford headshot

Nicole Ford

VP and Chief Information Security Officer

Carrier

Many security leaders face the challenges of a tight talent marketplace – but few have taken the steps to develop internal and external partnerships to attract and retain security talent Nicole Ford and Cheryl Altany are trailblazing a new path towards building a best in class security team.

In this fireside chat, you’ll learn how Carrier is:

  • Establishing a security organization
  • Building relationships and talent pipelines with universities
  • Creating meaningful and innovative partnerships to drive business value

9:00am - 9:20am  Networking Break

9:20am - 10:10am  CIO & CISO Featured Session

In it for the Long Haul — The Future of Partnerships

John Koester headshot

John Koester

Sr. Director & CISO

HD Supply

Keith Rosenbauer headshot

Keith Rosenbauer

VP IT & CIO

HD Supply

Making an immediate impact is essential as an executive in a new company. This CIO and CISO duo are leveraging their fresh perspectives and passion for change. HD Supply's Keith Rosenbauer and John Koester built a relationship founded on trust, transparency and shared tenets.

In this session, hear key learnings including:

  • Tips for establishing a transparent relationship
  • Post-sale vendor engagement despite timeline changes
  • Mutual investments in one another

9:20am - 10:10am  CISO Featured Session

Digital Risk Explosion — Managing Risk in a Hyper-Outsourcing World

Eric Blatte headshot

Eric Blatte

President & Co-Founder

RiskRecon

Digital transformation has dramatically transformed the enterprise risk surface, automating a vast array of processes while outsourcing a vast array of systems and services. Through this frenetic reshaping, few organizations truly understand the nature of their new risk reality and how to successfully manage it.

In this interactive discussion we will:

  • Explore the true nature of the enterprise cyber risk surface
  • Discuss threats and regulations driving organizations to better manage their extended enterprise
  • Share insights on how to better manage third-party risk (hint: good data!)

9:20am - 10:10am  CISO Executive Boardroom

Security Operations — Building and Maturing an Effective SOC

Shawn Bowen headshot

Shawn Bowen

CISO

Restaurant Brands International

James Nolin headshot

James Nolin

Sr. Director IT Operations

Spirit Airlines

When it comes to taking your data from you, cyber criminals never rest. If they can’t get in one way, they will try another. Therefore, when managing incidents for your enterprise, it is critical to ensure that threats and attacks are properly identified, analyzed, communicated, defended, investigated and reported.

During this boardroom discussion on cyber operations, discover:

  • How to develop effective principles and procedures for security operations centers
  • How determine what is best to outsource vs what should be kept internal
  • How to create effective communication and reporting strategies for the entire organization

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). To reserve your seat, please contact John Seabury at 971-222-2369 or John.Seabury@evanta.com.

10:10am - 10:30am  Networking Break

10:30am - 11:20am  CISO Featured Session

Threat Intelligence – Capturing Cybercrime DNA

Keith Rayle headshot

Keith Rayle

Strategist

Fortinet, Inc.

Join Keith Rayle from Fortinet to discuss methods of ‘fingerprinting’ attacks according to methodology frameworks, creating patterns that can be used for further analysis. We will then unpack how orchestrated attacks can be linked upwards to individuals and cybercrime rings, providing the potential to use current technologies to develop predictive attack insight.

Join this session to learn about the:

  • Current use of advanced technologies to analyze malware
  • Attack frameworks and patterns they can reveal
  • Cybercriminal countering methods

10:30am - 11:20am  CISO Executive Boardroom

Cyber-Risk Management — New Approaches for Reducing Your Cyber-Exposure

Kevin Flynn headshot

Kevin Flynn

Senior Product Manager

Tenable

Gram Ludlow headshot

Gram Ludlow

VP, Global Information Security

Marriott Vacations Worldwide Corporation

When it comes to reducing cyber risk, overcoming vulnerability overload is critical. Find out how predictive prioritization will improve your vulnerability management efforts so you can focus on what matters most to your business. 

During this peer-discussion you will explore:

  • How to use threat intelligence to move the most dangerous vulnerabilities up your priority list
  • The resources required to effectively assess your environment and prioritize your efforts in a predictive manner
  • Practices that will help you take appropriate actions to make your organization more secure
  • How to make your staff more efficient by drastically reducing the number of high priority vulnerabilities they need to remediate

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). To reserve your seat, please contact John Seabury at 971-222-2369 or John.Seabury@evanta.com.

11:20am - 11:45am  Networking Break

11:45am - 12:30pm  Lunch & Comments

Lunch & Interactive Discussion

In this networking lunch you have the opportunity to have relevant and topical conversations with your peers. The below questions are a guideline for you to start your table conversations.

Digital transformation

  • How do you define digital transformation?
  • Transform or optimize? Are you changing your business model or are you optimizing your current business model with digital?

Security operations

  • How have you decided what to outsource and keep internally?
  • How have you developed effective principles and procedures for a security operations center?
  • What best practices have you identified in evaluating incidents in the environment?

Delivering business value

  • How do you help the business make better decisions and reduce friction for major change initiatives?

Communicating risk

  • Which metrics will help you craft a compelling story that inspires action?

Talent and developing leaders

  • What is your greatest challenge related to developing and retaining your top talent?
  • As a leader, how are you supporting growth amongst your top talent?
  • How do you keep people motivated and continuously redirecting and retooling themselves?

12:30pm - 1:00pm  Keynote

The C-Level Mandate for Secure Cloud Transformation

Ken Athanasiou headshot

Ken Athanasiou

Global CISO

VF Corporation

Patrick Foxhoven headshot

Patrick Foxhoven

CIO & VP of Emerging Technologies

Zscaler

The new way of work is remote, mobile-first, and cloud-based. Employees expect instant, secure access to applications, information, and resources. Meanwhile, threats proliferate, VPNs lag, hardware costs rise, and little is truly secure. Hub-and-spoke networks employing castle-and-moat security are no longer tenable, and leaders that cling to legacy architectures put enterprises at risk. In this session, we'll discuss how enterprise IT leaders can:

  • Improve customer digital experience while safeguarding sensitive information
  • Increase user performance while minimizing risk
  • Drive revenue and scalability while controlling costs

1:00pm - 1:20pm  Networking Break

1:20pm - 2:10pm  CIO & CISO Featured Session

Risky Business — A Reputational Risk Workshop 2.0

Rashmi Airan headshot

Rashmi Airan

Ethics Speaker

Author & Thought Leader

Juan Gomez-Sanchez headshot

Juan Gomez-Sanchez

Chief Security Officer

Lennar Corporation

 One oversight, one moment of turning your head the other way is all it takes to alter the course of your entire career. As executives find themselves operating in more gray areas than ever before, how can they find clarity?

Join this interactive workshop to discover how:

  • Ethical blind spots lead to global scandals
  • Risk factors and individual pressure points put reputations on the line
  • Ethical vigilance can support a transparent organization

1:20pm - 2:10pm  CISO Executive Boardroom

IAM in the Digital Age

Christine Vanderpool headshot

Christine Vanderpool

Vice President & Chief Information Security Officer

Florida Crystals

Marcos Marrero headshot

Marcos Marrero

VP of Information Security

H.I.G. Capital

Mayank Choudhary headshot

Mayank Choudhary

SVP, Strategy

ObserveIT

From making the business case for deploying an IAM program to developing compelling metrics down the road, getting buy-in on an access program is key. Join this roundtable discussion to benchmark your framework and vet future plans, and learn the most innovative tactics security leaders are using for IAM at their organization, including:

  • Methodologies that satisfy users while maintaining adequate access controls
  • Communication techniques to streamline acceptance of IAM across the business
  • Roadmaps for deciding what technology is the best fit

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). To reserve your seat, please contact John Seabury at 971-222-2369 or John.Seabury@evanta.com.

2:10pm - 2:30pm  Networking Break

2:30pm - 3:20pm  CISO Featured Session

Are You a Means, Motive or Opportunity CISO?

Shawn Bowen headshot

Shawn Bowen

CISO

Restaurant Brands International

Ben Murphy headshot

Ben Murphy

Vice President, Deputy Chief Information Security Officer

Aflac

Marcos Marrero headshot

Marcos Marrero

VP of Information Security

H.I.G. Capital

Christine Vanderpool headshot

Christine Vanderpool

Vice President & Chief Information Security Officer

Florida Crystals

When a crime is committed and is assessed at trial, the prosecutor is asked to provide the means, the motive and the opportunity of the suspected of committing the offense. This is how CISOs think about risks and how to address them. You need all three to be fully effective, but the question is: are you a means, motive or opportunity CISO?

In this session you’ll learn to:

  • Evaluate your own default mindsets
  • Lean on teammates to help broader your perspective
  • Cultivate your own version of a perfect defense

2:30pm - 3:20pm  CISO Executive Boardroom

Upcoming Trends in Threat Intelligence

Richard La Bella headshot

Richard La Bella

Chief Information Security Officer

VITAS Healthcare

Sheryl Hanchar headshot

Sheryl Hanchar

Vice President, CISO

Cobham

Staying up to date on the current threat intelligence landscape is imperative when it comes to protecting against a cyberattack. With new technologies such as IoT and AI gaining momentum, CIOs and CISOs must continue to maintain awareness of new threats and how to integrate combative response to these threats across the business.

In this boardroom, you will discuss:

  • Industry examples of successes and pitfalls in threat intelligence
  • Bridging the gap between technology, marketing, and the entire enterprise
  • Incorporating threat intelligence into the business model and business transformation

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). To reserve your seat, please contact John Seabury at 971-222-2369 or John.Seabury@evanta.com.

3:20pm - 3:40pm  Networking Break

3:40pm - 3:50pm  Closing Comments

3:50pm - 4:20pm  Keynote

Five Years From Now — Emerging Trends

Thornton May headshot

Thornton May

Futurist

As emerging technologies continue to impact every department, leaders must stay abreast of upcoming trends. Are you prepared for the shifts that will change IT and business alignment? Join leading IT futurist Thornton May, as he reveals the top trends executives need to navigate when building resilient roadmaps and partnerships for the never-ending road of disruption ahead.

In this keynote, you’ll learn to:

  • Take action based on critical technology trends
  • Create space for future tech and talent
  • Generate business value and metrics

4:20pm - 5:00pm  Closing Reception & Prize Drawing

5:15pm - 5:25pm  Networking Break

5:25pm - 6:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Peer-to-Peer Meetings

6:45pm - 7:30pm  Lunch & Comments

6:50pm - 7:00pm  Break

7:00pm - 7:05pm  Lunch & Comments

7:05pm - 7:35pm  Keynote

Lunch Keynote

Lunch Keynote

6:00pm - 8:30pm  Governing Body Welcome Reception

Unpacking the CIO Narrative & Managing the Brand of IT

Thornton May headshot

Thornton May

Futurist

Every CIO has a unique story. Every IT organization has a brand related to value creation and service experience. Each of us has something to teach and something to learn. Futurist and anthropologist Thornton May will precipitate animated C-2-C conversations unlocking the accumulated wisdom in the room summarizing lessons learned leading in an era where uncertainty has become a central feature of modern capitalism. The future belongs to those with the analytical and rhetorical power to make their models and stories count.

In this session, you’ll discover:

  • How to put uncertainty to good use
  • Why story-telling is the newest must-have skill
  • What the new decade will bring


7:30am - 8:15am  Registration & Breakfast

8:15am - 8:30am  Opening Comments

8:30am - 9:00am  Keynote

Alliances at the Intersection of Tech and Talent

Cheryl Altany headshot

Cheryl Altany

Global Segment Strategy Head – Education | STEM | Campuses

Carrier

Nicole Ford headshot

Nicole Ford

VP and Chief Information Security Officer

Carrier

Many security leaders face the challenges of a tight talent marketplace – but few have taken the steps to develop internal and external partnerships to attract and retain security talent Nicole Ford and Cheryl Altany are trailblazing a new path towards building a best in class security team.

In this fireside chat, you’ll learn how Carrier is:

  • Establishing a security organization
  • Building relationships and talent pipelines with universities
  • Creating meaningful and innovative partnerships to drive business value

9:00am - 9:20am  Networking Break

9:20am - 10:10am  CIO & CISO Featured Session

In it for the Long Haul — The Future of Partnerships

John Koester headshot

John Koester

Sr. Director & CISO

HD Supply

Keith Rosenbauer headshot

Keith Rosenbauer

VP IT & CIO

HD Supply

Making an immediate impact is essential as an executive in a new company. This CIO and CISO duo are leveraging their fresh perspectives and passion for change. HD Supply's Keith Rosenbauer and John Koester built a relationship founded on trust, transparency and shared tenets.

In this session, hear key learnings including:

  • Tips for establishing a transparent relationship
  • Post-sale vendor engagement despite timeline changes
  • Mutual investments in one another

9:20am - 10:10am  CIO Executive Boardroom

Building a Roadmap to Guide Your Digital Journey

Chad Simpson headshot

Chad Simpson

Deputy CIO

City Furniture

Jason Lingle headshot

Jason Lingle

Principal Executive Architect

ServiceNow

Jag Tailor headshot

Jag Tailor

SVP Global Information Systems

Sony Pictures Entertainment

Digital Transformation is already a tired buzzword, but CIOs are living it and are looking to hone their
strategies and speed up implementation. Join this interactive roundtable session to discuss:

  • What key components should go into your digital journey blueprint
  • Going beyond IT services to cross-functional workflow automation on a single platform and shared data model
  • What a digital journey maturity model looks like (including velocity, experience and intelligence)

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs). To reserve your seat, please contact John Seabury at 971-222-2369 or John.Seabury@evanta.com.

10:10am - 10:30am  Networking Break

10:30am - 11:20am  CIO Featured Session

A CIO’s Guide to the No-Limits Mindset

Rosa Akhtarkhavari headshot

Rosa Akhtarkhavari

CIO

City of Orlando

Roger Brennan headshot

Roger Brennan

Police Captain

City of Orlando

The CIO is the tip of the spear when it comes to driving impact throughout the business. Yet, with this leadership comes the burden of responsibility of widespread initiative implementation and ensuring their vision encompasses the needs of stakeholders across the enterprise. Join Rosa Akhtarkhavari to learn how the City of Orlando is delivering maximum impact and lasting change that meets everyone’s needs.

In this keynote, you’ll hear about:

  • Positioning IT as a true business partner
  • Defining success for a large-scale project
  • Modernizing IT to drive business outcomes

10:30am - 11:20am  CISO Featured Session

Threat Intelligence – Capturing Cybercrime DNA

Keith Rayle headshot

Keith Rayle

Strategist

Fortinet, Inc.

Join Keith Rayle from Fortinet to discuss methods of ‘fingerprinting’ attacks according to methodology frameworks, creating patterns that can be used for further analysis. We will then unpack how orchestrated attacks can be linked upwards to individuals and cybercrime rings, providing the potential to use current technologies to develop predictive attack insight.

Join this session to learn about the:

  • Current use of advanced technologies to analyze malware
  • Attack frameworks and patterns they can reveal
  • Cybercriminal countering methods

10:30am - 11:20am  CIO Executive Boardroom

Speeding Up the Digital Business with Content in the Cloud

Tom Murphy headshot

Tom Murphy

Associate Vice President, IT/Chief Information Security Officer

University of Miami

Luis Suarez headshot

Luis Suarez

SVP & CIO

H.I.G. Capital

Anisha Vaswani headshot

Anisha Vaswani

Corporate CIO

Box

Still encumbered by legacy business processes? Struggling to speed up onboarding, improve customer experience, and secure collaboration across the extended enterprise? Business processes need to keep up with the digitization of your enterprise. 

Join a group of your peers to discuss how to:

  • Identify opportunities for improving outdated processes
  • Unlock new customer experiences with digital practices
  • Empower your workplace with seamless business processes

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs). To reserve your seat, please contact John Seabury at 971-222-2369 or John.Seabury@evanta.com.

11:20am - 11:45am  Networking Break

11:45am - 12:30pm  Lunch & Comments

Lunch & Interactive Discussion

In this networking lunch you have the opportunity to have relevant and topical conversations with your peers. The below questions are a guideline for you to start your table conversations.

Digital transformation

  • How do you define digital transformation?
  • Transform or optimize? Are you changing your business model or are you optimizing your current business model with digital?

Security operations

  • How have you decided what to outsource and keep internally?
  • How have you developed effective principles and procedures for a security operations center?
  • What best practices have you identified in evaluating incidents in the environment?

Delivering business value

  • How do you help the business make better decisions and reduce friction for major change initiatives?

Communicating risk

  • Which metrics will help you craft a compelling story that inspires action?

Talent and developing leaders

  • What is your greatest challenge related to developing and retaining your top talent?
  • As a leader, how are you supporting growth amongst your top talent?
  • How do you keep people motivated and continuously redirecting and retooling themselves?

12:30pm - 1:00pm  Keynote

The C-Level Mandate for Secure Cloud Transformation

Ken Athanasiou headshot

Ken Athanasiou

Global CISO

VF Corporation

Patrick Foxhoven headshot

Patrick Foxhoven

CIO & VP of Emerging Technologies

Zscaler

The new way of work is remote, mobile-first, and cloud-based. Employees expect instant, secure access to applications, information, and resources. Meanwhile, threats proliferate, VPNs lag, hardware costs rise, and little is truly secure. Hub-and-spoke networks employing castle-and-moat security are no longer tenable, and leaders that cling to legacy architectures put enterprises at risk. In this session, we'll discuss how enterprise IT leaders can:

  • Improve customer digital experience while safeguarding sensitive information
  • Increase user performance while minimizing risk
  • Drive revenue and scalability while controlling costs

1:00pm - 1:20pm  Networking Break

1:20pm - 2:10pm  CIO & CISO Featured Session

Risky Business — A Reputational Risk Workshop 2.0

Rashmi Airan headshot

Rashmi Airan

Ethics Speaker

Author & Thought Leader

Juan Gomez-Sanchez headshot

Juan Gomez-Sanchez

Chief Security Officer

Lennar Corporation

 One oversight, one moment of turning your head the other way is all it takes to alter the course of your entire career. As executives find themselves operating in more gray areas than ever before, how can they find clarity?

Join this interactive workshop to discover how:

  • Ethical blind spots lead to global scandals
  • Risk factors and individual pressure points put reputations on the line
  • Ethical vigilance can support a transparent organization

1:20pm - 2:10pm  CIO Executive Boardroom

Closing the Gap – Driving Transformation

Dan Sarrosick headshot

Dan Sarrosick

Financial Services Customer Success Executive

Nutanix

Amado Cruz headshot

Amado Cruz

Vice President, Global Technology

Assurant

Chrissy Shannon headshot

Chrissy Shannon

Vice President of Information Technology

Anchor Glass Container

Otto Contreras headshot

Otto Contreras

Deputy CIO

City of Miami

DevOps increasingly plays an important role in transforming today’s digital landscape and driving business revenue. To quickly deliver new customer-centric services or simply just to fail fast, IT teams are transitioning to DevOps models that close the gap between development and operations while drastically increasing their business relevance.

During this boardroom discussion, we’ll unpack:

  • Defining DevOps and envisioning an outcome
  • Successes in transforming your delivery model
  • Common pitfalls in driving DevOps in organizations

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs). To reserve your seat, please contact John Seabury at 971-222-2369 or John.Seabury@evanta.com.

2:10pm - 2:30pm  Networking Break

2:30pm - 3:20pm  CIO Executive Boardroom

Artificial Intelligence for the Enterprise

Prashant Cherukuri headshot

Prashant Cherukuri

CIO

Qualfon

Deep neural networks are bringing new capabilities to AI and creating smart systems that can outperform human labor at many tasks. These new systems bring business advantage to successful implementers, but success is not easy to come by.
This session gives an opportunity for you and your peers to discuss:

  • The difference between AI hype and reality
  • Progress and challenges in implementing AI-based initiatives
  • How to achieve real business value through AI

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs). To reserve your seat, please contact John Seabury at 971-222-2369 or John.Seabury@evanta.com.

3:20pm - 3:40pm  Networking Break

3:40pm - 3:50pm  Closing Comments

3:50pm - 4:20pm  Keynote

Five Years From Now — Emerging Trends

Thornton May headshot

Thornton May

Futurist

As emerging technologies continue to impact every department, leaders must stay abreast of upcoming trends. Are you prepared for the shifts that will change IT and business alignment? Join leading IT futurist Thornton May, as he reveals the top trends executives need to navigate when building resilient roadmaps and partnerships for the never-ending road of disruption ahead.

In this keynote, you’ll learn to:

  • Take action based on critical technology trends
  • Create space for future tech and talent
  • Generate business value and metrics

4:20pm - 5:00pm  Closing Reception & Prize Drawing

5:15pm - 5:25pm  Networking Break

5:25pm - 6:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Peer-to-Peer Meetings

6:45pm - 7:30pm  Lunch & Comments

6:50pm - 7:00pm  Break

7:00pm - 7:05pm  Lunch & Comments

7:05pm - 7:35pm  Keynote

Lunch Keynote

Lunch Keynote

December 4, 2019

December 5, 2019

Location


Venue & Accommodation

Loews Miami Beach Hotel

Your Community Partners


National Thought Leaders
National Sponsors
Local Sponsors
Global Thought Leader

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

John Seabury

Senior Program Manager - Territory Specialist

503-929-9168

john.seabury@evanta.com