7:00 AM - 8:00 AM        

Networking Breakfast

8:00 AM - 8:10 AM

Day 3 Kick off & Morning Welcome

Speaker: Philip McKay, CEO, nGage Events

8:10 AM - 9:15 AM        

General Session Panel: Outlook Cloudy: Cutting Through the Hype of Digital Migrations to the Cloud, Zero Trust, and IAM Maturity

Moderator: Joey Johnson, CISO, Premise Health


- Larry Whiteside, Chief Cyber and Security Officer, Greenway Health

- Michael Dierickx, Director PSIRT at United Technologies

- Alex Bohrani, CISO

- Lewis Brodnax, CISO, Greensky

Description: Panelists from across industries discuss how they cut through the hype and BS surrounding cloud migration, IAM, Zero Trust, and the impacts of emergent regulation.

9:30 AM - 12:30 PM

1:1 Meeting Zone

Description: 1:1 Meetings between Suppliers and Delegates

12:30 PM - 1:00 PM

Awards Luncheon with Conference Closing Q&A

1:00 PM - 5:00 PM          


Day 1 - Monday, May 6, 2019

2:00 PM - 4:30 PM        

Check In & Badge Pick-up

4:30 PM - 4:40 PM          

Welcome and Introduction to Security Leadership Exchange

Speaker: Philip McKay, CEO, nGage Events

4:40 PM - 5:25 PM

Opening Keynote Address: The History of Security and the Fight to Protect Ourselves: From Early Satellites to the Morris Worm to Modern Ransomware and Stealth Attacks

Speaker: Michael Miora, SVP & CISO, Korn Ferry

Description: Most of us think about Information Security as a new, hot and stimulating topic. Almost everyone in modern industry has heard and thought about attacks, breaches, data compromises and defenses. However, Cyber Warfare pre-dates the modern computing era. As far back as 1976, when I started my first job in astrodynamics working on Air Force satellites, security was an important consideration even decades before the Internet and our powerful computing devices.  

The security story I want to share begins in the late 1970s. As a young, UC Berkeley graduate, my attention was on mathematics and getting a job! I never imagined that I would focus on security for the next few decades. I never envisioned myself as a critical decision maker, whose actions would affect the course and success of a multi-billion dollar, global enterprise.  

Understanding the security story will help us all be better at identifying what needs to protected and how we need to define and design our protections.

5:30 PM - 6:15 PM          

Keynote Presentation: I Believe, I Belong, I Matter ℠ – The Art of Curating Commitment in Yourself and Others

Speaker: Malcolm Harkins, Chief Security and Trust Officer, BlackBerry Cylance, Inc.

Description: Ever wonder how to create lasting commitment from your employees and for yourself? How to get your teams to stay engaged battling thru the challenges we see day in and day out? How to improve your connections in relationships both inside and out of work? In this talk, I will explore how logic leads to reason and how emotion leads to action. I will go through my personal journey exploring and sharing lessons from my +25 years managing people and leading teams.

6:30 PM - 8:30 PM

IT Security Exchange Welcome Reception & Dinner

Designed to foster interaction among executives and build relationships with potential clients and customers. 

Day 2 - Tuesday, May 7, 2019

7:30 AM - 8:30 AM        

Networking Breakfast

8:30 AM - 8:40 AM

Day 2 Kick off & Morning Welcome

Speaker: Doug Manoni, CyberRisk Alliance

8:40 AM - 9:20 AM          

End User Keynote Presentation: Security at the Speed of Business

Speaker: Juan Gomez-Sanchez, Chief Security Officer, Lennar

9:20 AM - 9:50 AM  

Sponsor Keynote Presentation: Qualys

Speaker: Asif Awan, CTO, Container Security, Qualys

Description: Security Roles in the World of Kubernetes, Containers and FunctionsDigital Transformation 2.0 is upon us -- thanks to containers and functions. As applications are getting containerized, distributed into using a service mesh of microservices, and critical business actions implemented as functions, the way they are developed, deployed and managed (DevOps) has also changed. Development and Operation roles are also evolving to align the responsibilities with the new computing paradigm driven by containers. How does an enterprise align their security roles in this new reality, so that security and compliance gets seamlessly woven into the DevOps pipelines and doesn't become an afterthought or a hindrance to the rapid development and deployment of business functionality? This talk covers the changing state of applications, infrastructure and the engineering roles, and recommends changes in security roles and teams to adapt to the transformation.

10:00 AM - 12:00 PM

Use Case Boardroom Presentations

Description: 25 minute breakout sessions. Suppliers and delegates discuss challenges faced, strategy, implementation, outcome, and the future.

12:00 PM - 1:00 PM

Networking Lunch

12:40 PM - 1:00 PM          

Fireside Chat

1:05 PM - 1:50 PM        

CISO Panel Discussion: CISO Year In Review: Where We've Been and Where We are Going

Moderator: Darrin Reynolds, Reynolds Privacy


- Tellis Williams, CISO, AXA

- Richard Rushing, CISO, Motorola Mobility

- Hussein Syed, CISO, RJWBarnabas Health

2:00 PM - 2:55 PM

Use Case Boardroom Presentations

Description: 25 minute breakout sessions. Suppliers and delegates discuss challenges faced, strategy, implementation, outcome, and the future.

3:10 PM - 6:05 PM          

1:1 Meeting Zone

Description: 1:1 Meetings between Suppliers and Delegates

6:05 PM - 7:00 PM

Open Time

7:00 PM - 9:30 PM

Security Leadership Exchange Networking Activity: Dinner & Casino Night

Day 3 - Wednesday, May 8, 2019

Spring 2019 Agenda

May 6-8, 2019 | Ponte Vedra Inn & Club | Ponte Vedra Beach, FL


2020 Agenda coming soon!

"Emerging Definitions of Security ROI"