Miami CISO Executive Summit
June 26, 2018 | The Ritz-Carlton Coconut Grove, Miami
June 26, 2018
The Ritz-Carlton Coconut Grove, Miami
Collaborate with your peers
Get together with your peers to tackle top business challenges through peer-driven content and discussions at the Miami CISO Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Investing in your people and the right technologies
Innovating with advanced technologies and new delivery models
Influencing business stakeholders and enterprise outcomes
Miami CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.
Governing Body Co-Chairs
Ken Athanasiou
AutoNation, Inc.
VP, CISO
Brad Dettmer
Wyndham Destinations
CIO
Gary Eppinger
Carnival Corporation
Global VP, CISO & Privacy Officer
Juan Gomez-Sanchez
Lennar Corporation
Chief Security Officer
John Graham
Jabil Circuit, Inc.
CISO
Lou Grande
Red Lobster Seafood Company
SVP, IT
Donagh Herlihy
Bloomin Brands
Executive Vice President and Chief Technology Officer
Marcos Marrero
HIG Capital
Director of Information Security
Scott McBee
Darden
CISO
Agenda
June 25, 2018
June 26, 2018
7:00am - 7:45am Registration & Breakfast
8:00am - 8:30am Keynote
CIO/CISO Collaboration - Facing the Security Reality Together
Hosted by One Identity
Brad Dettmer
CIO
Wyndham Destinations
Walter Yosafat
SVP & Global CIO
Wyndham Worldwide Corporation
Stan Kreydin
CTO & CISO
Wyndham Destinations
As technological advances become increasingly mandatory for businesses, CIOs and CISOs face dual objectives of digital advancements and system stability. In this session, they will candidly discuss how their roles have evolved with the changing digital landscape, giving you insight into their challenges, successes and lessons for the future.
8:30am - 9:00am Networking Break
9:00am - 9:50am Breakout Session
Cultivating Talent and Redefining the “Unicorn Candidate”
Hosted by ServiceNow
Ken Athanasiou
VP, CISO
AutoNation, Inc.
Donagh Herlihy
Executive Vice President and Chief Technology Officer
Bloomin Brands
Juan Gomez-Sanchez
Chief Security Officer
Lennar Corporation
As technological needs increase and the available talent pool shrinks, companies are left wondering how to meet their staffing needs. Join regional leaders as they discuss how to think outside the box regarding talent. This panel will encourage you to abandon the “unicorn candidate,” realizing that the perfect candidate likely doesn’t exist while real, qualified individuals are right in front of you. Come explore how to cultivate talent from within, recruit unconventional candidates and retain your skilled employees.
9:00am - 9:50am Breakout Session
Cybercriminal Operations Revealed
Hosted by Trend Micro Incorporated
Eduardo Cabrera
Chief Cybersecurity Officer
Trend Micro Inc.
Most criminal syndicates today include a cyber arm, because of the vast amounts of money it can make targeting businesses around the world. Eduardo Cabrera dives into how these organizations are set up, how they pick their targets, their infection routines and how they maximize breach access for the highest profits. Join this session for a better understanding of how cybercriminals work and ways you can guard against attacks.
9:00am - 9:50am Executive Boardroom
Communicating Cyber Risks to the Board
Hosted by Cisco Systems, Inc.
Dmitry Kuchynski
Security Principal
Cisco Systems, Inc.
Christopher Roche
CIO
Florida Power & Light
CIOs and CISOs are increasingly being asked to report on cybersecurity at board meetings. This can mean everything from simply keeping the board members abreast of the current landscape to convincing them a big spend is needed to keep the organization safe. How do executives address cybersecurity across business units and assess whether a business is structured properly to avoid a breach? What is the best way to quantify a company’s risk exposure? In this interactive boardroom session, gain insight from your peers as they talk through effective strategies on what the board actually wants (and needs) to hear.
9:00am - 9:50am Executive Boardroom
AI in Data Breaches – The Dark Side of Machine Learning
Hosted by Cylance
Tom Pace
Sr. Director, Professional Services
Cylance
Victor Campos
Senior Director, IT Security
Brightstar Corp.
Unless you live under a rock, you have watched numerous high-profile companies fall prey to hacks and data breaches. With hostile threats becoming faster and less predictable, how do you stay ahead in the threat landscape? As AI and machine learning become key tools for the average company, they are also valuable assets to hackers in attacks. Look at the methods hackers are currently using, how AI and machine learning can be used to breach your company’s firewalls, and ways you can stay ahead of the individuals who are working to breach your security.
9:50am - 10:20am Networking Break
10:20am - 11:10am Breakout Session
Not Just Cryptocurrency — Practical Blockchain Uses and Potential
Hosted by Security Risk Advisors
Ram Marupudi
Enterprise Architect
Southeastern Grocers, Inc.
Ben Miron
Director of Information & Cyber Security (CISO)
NextEra Energy Resources
Patrick O'Leary
Vice President of Architecture, Infrastructure and Network Engineering
Southeastern Grocers
“Blockchain” is undoubtedly the year’s biggest IT buzzword, but how are companies actually using this emerging technology? The potential is endless — from increasing product traceability and visibility to simplifying records for audits, blockchain might not be a cryptocurrency, but it can save you time and money. This panel will discuss specific usage cases of how companies are employing blockchain now, while posing relevant questions about implementation and execution.
10:20am - 11:10am Breakout Session
Fortify Your Defenses by Making Cyber Attacks Expensive
Hosted by CenturyLink
Bill Swearingen
Director of Cyber Defense
CenturyLink
There’s a saying: Defenders have to get security right every time, but an attacker only has to get it right once. In this session, Bill Swearingen will explore the phases of a cyber attack, identifying points where defenders can make it prohibitively expensive for the attacker to keep going. Learn how changing your perception of the inevitable attack can help you develop techniques to gain the upper hand. Hear about actionable processes that shift power to the defense and allow the good guys to come out on top.
10:20am - 11:10am Executive Boardroom
Zero Trust is a Journey, Not a Destination
Hosted by Duo Security
Sean Frazier
Advisory CISO - Federal
Duo Security
Juan Gomez-Sanchez
Chief Security Officer
Lennar Corporation
Chris Bitner
Vice President, Global Chief Information Security Officer
Bloomin' Brands, Inc.
One of the inherent problems for CIOs and CISOs is how too many things run way too openly with too many default connections. This significant issue has led some to adopt a Zero Trust model to simplify security holistically. In other words, Zero Trust centers on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access. In this interactive session, learn from your peers, as they discuss their cloud migration and mobile journeys as it relates to a Zero Trust. Benefit from case studies on how organizations have rolled out an ongoing Zero Trust ecosystem and how ‘defense in depth’ security models have become too complex for some on this journey.
10:20am - 11:10am Executive Boardroom
Evolution of an Integrated Cybersecurity Office: A CISO’s Perspective
Hosted by ForeScout Technologies Inc.
John Graham
CISO
Jabil Circuit, Inc.
Toni Buhrke
World Wide Director of Channel & Inside Systems Engineering
ForeScout Technologies, Inc.
The hyper-growth of IoT across the enterprise is forcing leaders to reassess how they secure their networks. Recent Forrester research has unveiled some hidden technical and organizational challenges IT professionals should be aware of when managing their overall security framework. There appears to be a dynamic shift in the way organizations are handling security and risk. Join this interactive session, led by ForeScout, to discuss effective strategies for devising information risk and value metrics, as well as security operational metrics, that are relevant to the board and executive team. Come ready to learn and share what organizations can do to better defend IoT-enabled systems from cyberattacks and mature the SOC into an Integrated Cybersecurity Fusion Center.
11:10am - 11:40am Networking Break
June 25, 2018
June 26, 2018
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.