7:00 AM - 8:30 AM        

Networking Breakfast

8:00 AM - 8:30 AM          

Executive Spotlight: A Blended Family: A Privacy & Security Partnership

Speaker: Kevin Haynes, Chief Privacy Officer, The Nemours Foundation

Description: This session will focus on the important, absolutely necessary partnership between privacy and security. Oftentimes these two disciplines are confused with each other, but the success of a privacy program is dependent on a strong partnership with security – just as a security program can find value with their privacy counterparts. We will engage in a discussion about creating and fostering relationships with privacy programs. The success of protecting an organization’s information is only improved for forging a strong bond between privacy and security. 5 bullet points that describe what the attendee will learn from your session:

1. The importance of including privacy in the planning, implementation, and monitoring of a security program

2. The principles that govern a privacy program

3. How privacy frameworks and principles map to the information security equivalents

4. Privacy through the experience of an information security officer

5. Best practices about creating a strong relationship with the privacy officer

8:35 AM - 9:25 AM  

Closing Plenary: Anticipating Tomorrow’s Risks to Respond Today

Moderator: John Masserini, Chief Information Security Officer, Millicom (Tigo) Telecommunications

9:30 AM - 12:00 PM

1:1 Meeting Zone

Description: 1:1 Meetings between Suppliers and Delegates

12:15 PM - 1:30 PM

Awards Luncheon with Conference Closing Q&A

1:30 PM - 11:59 ‍‍‍PM          


Spring 2018 Agenda

Day 1 - Sunday, May 20, 2018

12:00 PM - 5:00 PM        


4:30 PM - 4:40 PM          

Welcome and Introduction to Security Leadership Exchange

Speaker: Philip McKay, CEO, nGage Events

4:40 PM - 5:30 PM  

Executive Spotlight: Comcast

Speaker: Myrna Soto, Corporate SVP and CISO, Comcast

5:35 PM - 6:25 PM

Executive Spotlight: Model Driven Security: It's Here Today

Speaker: Jim Routh, CISM, CSSLP, Chief Security Officer, Aetna

Description: Three years ago, Aetna Global Security hired a chief data scientist for security – a former NSA data scientist who did an outstanding job building over a hundred models and a big-data infrastructure dedicated to security. The purpose of hiring this data scientist: To take multiple sources of log files from newly deployed controls and determine how best to allocate scarce resources for cyber hunting. Soon, while this project was underway, six other implementations of machine-learning-driven point solutions catapulted Aetna Global Security into a model-driven security deployment using data analytics. In this keynote address, which will set the tone for our cybersecurity discussions at this two-day event, Jim Routh, Chief Security Officer at Aetna, will discuss what his organization learned from this experience, and the implications for security talent management and information sharing going forward.

6:30 PM - 7:00 PM

Keynote Presentation: Qualys

7:00 PM - 9:00 PM          

Security Leadership Exchange Welcome Dinner

Day 2 - Monday, May 21, 2018

7:00 AM - 8:00 AM        

Networking Breakfast

8:00 AM - 8:45 AM          

CISO Panel Discussion: The Art of Aligning Security Goals with Business Goals

Moderator: Devon Bryan, CISO, The Federal Reserve

Panelists: Daniel Conroy, CISO, UTC | David Hahn, CISO, Hearst | Wafaa Mamilli, VP, CISO, Eli Lily | Hussein Syed, CISO, RJW Barnabas Health

Description:It’s been said that one of the great paradoxes of our generation is that the same internet technologies that bring so much positive transformation – and in some cases disruption – also bring with them so much peril from cyber miscreants seeking to subvert, disrupt, and exploit internet-connected systems. As is true with so many other aspects of our lives, the go-to-market strategies of modern business is now also IT-centric and is synonymous with staggering volumes of very sensitive information constantly processed in real time across intricately connected, and increasingly global, high-speed data networks. This panel discussion will address how: CISOs are tacking this challenge of digital transformation CISOs are balancing threat-driven, risk-based trade-offs to ensure that cybersecurity programs, policies, and strategies enable business to go further To better collaborate and partner with business colleagues to make sure expectations are met and go-to-market strategies are supported

8:50 AM - 9:10 AM  

Keynote Presentation: IBM  - The Rol‍‍‍e of Security in Digital Transformation

Speaker: David Cass, Global Partner Cloud Security Services & CISO Cloud & SaaS Operations, IBM

9:30 AM - 11:45 PM

Use Case Boardroom Presentations

Description: 25 minute breakout sessions. Suppliers and delegates discuss challenges faced, strategy, implementation, outcome, and the future.

12:00 PM - 1:00 PM

Networking Lunch

12:40 PM - 1:00 PM          

Fireside Chat: ManageEngine

1:10 PM - 1:40 PM        

CISO Panel Discussion: Developing a Leading-Edge Intelligence Program

Moderator: Tim Callahan, SVP, Global Chief Security Officer, Aflac

Panelists: Mike Towers, VP and CISO, Allergan | Richard Rushing, CISO, Motorola Mobility | Joey Johnson, CISO, Premise Health

Description: Many information security professionals will remember when we relied primarily on a defensive posture to protect our organizations from cyberthreats. We spoke about the layers of defense and took comfort if we could architect in three or four layers to keep the bad guys out. It seems the criminals also began to understand the defensive in-depth strategy. They started to find the soft underbelly of defenses and attacked there – using the help of innocent technology users through social engineering, phishing and other methods to get through. Security professionals had to start looking at security from a different angle. This panel will detail the methods and best practices when implementing a leading threat intelligence program.

• Attendees will learn about the changes in defensive posture that have led to security professionals looking at security from an outside perspective.

• Attendees will learn about proactive measures that can be taken to stay ahead of criminals and hackers, particularly how to implement a threat intelligence program.

• Attendees will learn about the two general types of intelligence – strategic and tactical – and how to utilize them as proactive mechanisms.

• Attendees will learn where intelligence comes from.

• Attendees will learn how to convert internal information to intelligence, as well as best practices associated with this method

Use Case Boardroom Presentations

Description: 25 minute breakout sessions. Suppliers and delegates discuss challenges faced, strategy, implementation, outcome, and the future.

3:00 PM - 5:40 PM          

1:1 Meeting Zone

Description: 1:1 Meetings between Suppliers and Delegates

5:40 PM - 7:00 PM

Free Time

7:00 PM - 9:30 PM

Security Leadership Exchange Networking Dinner

Day 3 - Tuesday, May 22, 2018

Fall 2018 Agenda Coming Soon!

Click to Inquire about Attending Security Leadership ExchangeClick to Inquire about Sponsoring Security Leadership Exchange

“An exceptional conference experience through cutting edge content, peer-to-peer information sharing, and ready t‍‍‍o implement solutions.”

September 23-25, 2018 | Sheraton Grand at Wild Horse Pass | Phoenix, AZ

IT Security Exchange

Security Leadership Exchange is produced by the MIS Training Institute in conjunction with nGage Events LLC

© 2018 Security Leadership Exchange



Why Attend



nGage Events LogoMISTI Logo

September 23-25, 2018 | Sheraton Grand at Wild Horse Pass, Phoenix, AZ

Why Sponsor