Building Trust in the

Digital World

November 14-16, 2022 | Ponte Vedra Inn & Club | Ponte Vedra Beach, FL

2022 Agenda

  • Building the Next Generation of Cybersecurity Workforce
  • Operational Security – The Next Evolution in Risk Reduction
  • The Growing Threat of Ransomware
  • Cybersecurity Risk and Exposure, a Key Factor in Partnership Decisions
  • The Journey Towards Zero Trust
  • Best Practices with Cybersecurity in the Cloud
  • Vendor Management Best Practices
Key Topics

Day 1 | Monday | November 14

2:00 PM - 4:30 PM


3:30 PM - 3:35 PM

Welcome to the Security Leadership Exchange Summit

Speaker: Philip McKay, CEO, nGage Events

3:35 PM - 3:45 PM

Meet Our Impact Partner




How, Exactly, Human-I-T Uses Your Technology to Make an Impact

Human-I-T is a nonprofit social enterprise that makes it easy for businesses and organizations to become environmental and social leaders by repurposing their outdated technology, rather than recycling it. By donating more than ten million pounds of electronic waste to us, our partners have helped us empower hundreds of thousands of people with access to opportunities that live online. All donations are tax-deductible and receive corporate-grade data destruction. Join us in creating a world where everyone can use digital technology to unlock their full potential.

Brandon SmithVP, Business DevelopmentHuman-I-T

Randy H

3:45 PM - 4:15 PM          

State of Cybersecurity

Cybersecurity as a National Security Imperative
This address by Cybersecurity and Infrastructure Security Agency (CISA), will focus on the role cybersecurity plays in the national security landscape.

4:15 PM - 5:00 PM          

End User Panel

Moderated discussion between security thought leaders around the most pressing issues facing the cybersecurity industry and our increasingly digital society.

5:00 PM - 5:10 PM          


5:10 PM - 5:50 PM

Thought Leader Panel

No More Department of "No" | Security as a Business Enabler

It is a tale as old as time, "IT, the business, and Security have different priorities". But is this true? IT wants technology to work, Security wants technology to be safe and the business wants to innovate and move fast. There is a growing sentiment that security is the "Department of No" for IT and the business. Phrases like, "You can't do that." and "You cannot use that application." often come to mind.

Join this executive leaders discussion with Chris Cochran of Axonius and his guests as they discuss:

  • What role does security play within the business
  • How can this relationship be improved
  • The stories of when things go well and when it has gone horribly wrong

Chris Cochran

Creative Director of Media


& Co-Founder

Hacker Valley Media


Jason Loomis

Chief Information Security Officer



Mary Ann Blair

AVP, Chief Information Security Officer

Carnegie Mellon

5:50 PM - 6:00 PM

Welcome to the Leadership Roundtables

In this special session, attendees have the opportunity to break into groups to discuss among their peers, topics spanning leadership challenges and technical solutions.

Moderators will guide the conversation on the first day and again on the last day of the event to share how their perceptions have changed over the course of the event.

Randy HeroldCISOManpower Group
Randy H

6:00 PM - 7:00 PM

Leadership Roundtables

Leadership Break Out

  • Security Frameworks

  • Key Metrics

  • Important Points of Collaboration

Technical Solutions Break Out

  • Resiliency

  • API Security

  • Zero Trust

  • Digitization

  • Microsoft E3 vs E5

  • Still Phishing after all these Years

7:00 PM - 8:30 PM

Security Leadership Exchange Welcome Reception & Dinner
Enjoy casual networking in a luxury setting to build new connections and establish relationships with potential clients and customers.

Day 2 | Tuesday | November 15

7:00 AM - 8:00 AM           Networking Breakfast

8:00 AM - 8:40 AM          

Keynote Presentation

All Roads Lead to Identity

From AD to ZT – Building an Identity foundation for Enterprise Zero Trust

As countless enterprises rush headlong towards their interpretation of Zero Trust, many are overlooking the foundational elements that will ensure success in the end. This discussion will highlight several foundational aspects of Identity Management that provide a critical foundation upon which to build your Zero Trust deployment.

John J. MasseriniSenior Research AnalystTag Cyber


8:40 AM - 9:20 AM  

Keynote Presentation

The Accelerated Evolution of Cybersecurity and the Role Cyber Defenders Play

Cybercrime, according to the World Economic Forum’s Global Risk Report 2020, costs businesses more than US$6 trillion per year. In the 2 years since the report was published cybercriminals have, upped their monetization demands, attacked critical infrastructure such as Colonial Pipeline, utilized supply chain attacks, and continued to inflict untold damage on businesses and consumers. The woes don’t stop there, the conflict in Ukraine has seen attacks on power grid infrastructure and destructive data wipers, causing heightened potential cyber-attack alerts to be issued by governments across the globe. The presenter will explore some of the recent cyber-incidents, including those in Ukraine, how cybersecurity and the role of cyber defenders may be changing, and how the increased focus of regulation around cyber incidents may affect the role of cybersecurity teams.

Tony Anscombe

Chief Security Evangelist



9:20 AM - 9:40 AM

Thought Leader Presentation

The Great Distraction: Mergers & Acquisitions Impact to Cybersecurity

Mergers & Acquisitions can present an unexpected challenge to an organization’s security posture and operations.  The public announcement of a potential deal is as distracting as tremors through the deck plates of a ship.  Priorities shift in an instant.  Bad actors and insiders assemble as a new raft of spear-phishing arrives at Inboxes.  Join us as we reveal the playbook for avoiding the pitfalls of devaluation, sidestepping the landmines of integration challenges, and fulfilling your mission to protect what matters most.

Topics include:

  • Cyber Due Diligence
  • The Many Distractions of M&A
  • Threats to (and from) the Deal- The Challenges of Integration

Darin Reynolds

Chief Information Security Officer



9:40 AM - 9:55 AM


9:55 AM - 10:50 AM          

Case Study Presentations

10:50 AM - 11:05 AM


11:05 AM - 12:00 PM          

Case Study Presentations

12:00 PM - 12:50 PM

Networking Lunch

12:50 PM - 1:00 PM

Pulse of the Market

Recap of key finding and trends discussed at the event.

Speakers: SLE Advisory Board

1:00 PM - 1:30 PM        General Session

Securing Your Digital Supply Chain with Situational Awareness

Securing a vendor ecosystem is no longer just for companies needing to meet compliance mandates. Every organization relies on vendors to help push their business forward, which leaves firms of all shapes and sizes more susceptible to a third-party security incident.  Staying ahead of risks to your digital supply chain and gaining visibility into your vendor network is key to staying safe in today's threat landscape. More importantly, you need to be able to prioritize risk and understand where threats are coming from to act before it's too late.  

Join our session to learn how to:

  • Gain total visibility into digital supply chain threats
  • Using inherent risk to prioritize third-party threats
  • Build an action-oriented vendor risk program

Kelly White

Advisor & Founder



1:50 PM - 2:00 PM


2:00 PM - 2:55 PM

Use Case Boardroom PresentationDescription: 25 minute breakout sessions. Suppliers and delegates discuss challenges faced, strategy, implementation, outcome, and the future.

2:55 PM - 3:05 PM


3:05 PM - 6:00 PM          

1:1 Meeting ZoneDescription: 1:1 Meetings between Sponsors and Delegates

6:00 PM - 7:00 PM

Open Time

7:00 PM - 9:30 PM

Security Leadership Exchange Networking Activity: Dinner & Casino Night

Day 3 | Wednesday | Nov 16

7:00 AM - 8:00 AM        

Networking Breakfast

8:00 AM - 8:45 AM        

Panel Discussion

How I Survived a Ransomware Attack - Stories from a CISO

One of the largest cyber threats impacting organizations today is ransomware. It has shut down hospitals and schools, locked up critical infrastructure such as oil pipeline providers, and cost billions in losses. There is insurance now focused exclusively on ransomware and the insurance providers are even getting stricter on how they pay out. There are criminals and nation states behind these ransomware attacks who are figuring out how to beat all our defenses. Hear firsthand from a CISO at a critical infrastructure facility who survived a ransomware attack. He will share many lessons learned that will be invaluable for all to hear.

Diana Parr, who is an advisor to US Cyber Command, will moderate this session.


Diana Parr St Marie

Sr. Principal Cyber Advisor to US Cyber Command

Cyber Instincts

8:45 AM - 8:55 AM


8:55 AM - 12:00 PM

1:1 Meeting ZoneDescription: 1:1 Meetings between Suppliers and Delegates

12:00 PM - 1:00 PM

Awards Luncheon with Conference Closing Q&A

1:00 PM          

Shuttles to Airport