Building Trust in the Digital World

November 14-16, 2022 | Saddlebrook Resort & Spa | Tampa, FL

  • Building the Next Generation of Cybersecurity Workforce
  • Operational Security – The Next Evolution in Risk Reduction
  • The Growing Threat of Ransomware
  • Cybersecurity Risk and Exposure, a Key Factor in Partnership Decisions
  • The Journey Towards Zero Trust
  • Best Practices with Cybersecurity in the Cloud
  • Vendor Management Best Practices
2022 Key Topics

2022 Agenda

Day 1 - Monday, November 14

2:00 PM - 4:30 PM          

Conference Registration

3:45 PM - 3:55 PM          

Conference Welcome


Philip McKay, CEO, nGage Events

3:55 PM - 4:05 PM          

Meet Our Impact Partner


Brandon Smith, VP, Business Development, Human-I-T

Creating a circular economy for the betterment of people and the planet.

We produce over 57.4 million tonnes of e-waste annually- greater than the weight of the Great Wall of China, Earth's heaviest artificial object. At the same time, 47% of Americans lack a home device and broadband internet connection. Hear from Human-I-T on how they're teaming up with businesses to solve two problems with one solution by giving equipment a second life to help bridge the Digital Divide for students, families, and nonprofits across the globe.

4:05 PM - 4:50 PM          

Cybersecurity Panel

Future SOC and the Need for MDR

Modern security operations center functions allow organizations to rapidly detect, analyze, investigate and actively respond through threat mitigation and containment by combining technology and human expertise to perform threat hunting, monitoring, and rapid response. The main benefit of MDR is that it helps rapidly identify and limit the impact of threats without the need for additional staffing; moreover, this type of augmentation allows companies to repurpose their cyber talent where it most needed, without having to pay for expensive, additional analysts who are in short supply. The use of such finely tuned detection engines using state-of-the-art artificial intelligence and machine learning enable limited resources to be used more effectively and viably.

Panelists will share their take on:

  • How to modernize the impact of Sec/Ops
  • Ways to make up for the talent gap
  • How to keep pace with the changing threat landscape


John J. Masserini, Senior Research Analyst, Tag Cyber


Grant Jacoby, Sr. Dir. Strategic Technology Development (SVP),       Fifth Third Bank


Yanek Korff, Chief of Staff and Co-Founder, Expel


John Menezes, President & CEO, Stratejm


Vladimir Svidesskis, Head of Security Compliance & Risk, Vaco

4:50 PM - 5:20 PM

Darktrace Keynote

How AI Can Think Like an Attacker

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.


Ryan Schuler, Senior Cyber Technology Specialist, Darktrace

5:20 PM - 5:30 PM          


5:30 PM - 6:15 PM

Thought Leader Panel

No More Department of "No" | Security as a Business Enabler

It is a tale as old as time, "IT, the business, and Security have different priorities". But is this true? IT wants technology to work, Security wants technology to be safe and the business wants to innovate and move fast. There is a growing sentiment that security is the "Department of No" for IT and the business. Phrases like, "You can't do that." and "You cannot use that application." often come to mind.

Join this executive leaders discussion with Chris Cochran of Axonius and his guests as they discuss:

  • What role does security play within the business
  • How can this relationship be improved
  • The stories of when things go well and when it has gone horribly wrong


Chris Cochran, Creative Director of Media, Axonius                                   & Co-Founder, Hacker Valley Media


Jason Loomis, Chief Information Security Officer, Freshworks


Mary Ann Blair, AVP, Chief Information Security Officer, Carnegie Mellon

6:15 PM - 6:45 PM


Effective Metrics: Automate Your Data Analytics Cycle

Do your analytics lack real-time information devaluing them before they’ve even been presented?

Are time intensive, manual reporting processes limiting your ability to provide valuable Information Security data analytics to your business leaders?

The ability to process and provide real-time data analytics while minimizing team member cycles should be valuable to every organization. The key to valuable business metrics is real-time data.

Let’s get you there!


Randy Herold, CISO, Manpower Group

6:45 PM - 7:00 PM

Engaging Your End-User Audience for Cybersecurity


Pat Shannon, President & CEO, GreatestTrainingEver.com


T. Sean Shannon, Chief Creative Officer, GreatestTrainingEver.com

7:00 PM - 8:30 PM

Welcome Reception & Dinner

Sponsored by

Enjoy casual networking in a luxury setting to build new connections and establish relationships with potential clients and customers.

Day 2 - Tuesday, November 15

7:30 AM - 8:30 AM

Networking Breakfast

8:30 AM - 9:00 AM          

Keynote Presentation

All Roads Lead to Identity | From AD to ZT: Building an Identity Foundation for Enterprise Zero Trust

As countless enterprises rush headlong towards their interpretation of Zero Trust, many are overlooking the foundational elements that will ensure success in the end. This discussion will highlight several foundational aspects of Identity Management that provide a critical foundation upon which to build your Zero Trust deployment.


John J. Masserini, Senior Research Analyst, Tag Cyber

9:00 AM - 9:30 AM  

Keynote Presentation

The Accelerated Evolution of Cybersecurity and the Role Cyber Defenders Play

Cybercrime, according to the World Economic Forum’s Global Risk Report 2020, costs businesses more than US$6 trillion per year. In the 2 years since the report was published cybercriminals have, upped their monetization demands, attacked critical infrastructure such as Colonial Pipeline, utilized supply chain attacks, and continued to inflict untold damage on businesses and consumers. The woes don’t stop there, the conflict in Ukraine has seen attacks on power grid infrastructure and destructive data wipers, causing heightened potential cyber-attack alerts to be issued by governments across the globe. The presenter will explore some of the recent cyber-incidents, including those in Ukraine, how cybersecurity and the role of cyber defenders may be changing, and how the increased focus of regulation around cyber incidents may affect the role of cybersecurity teams.


Tony Anscombe, Chief Security Evangelist, ESET

9:30 AM - 9:40 AM

Transition - Travel to Case Study Boardrooms

9:50 AM - 11:15 AM

Case Study Presentations

11:15 AM - 11:25 AM


11:30 AM - 12:25 PM

Case Study Presentations

12:25 PM - 1:25 PM

Networking Lunch

1:25 PM - 1:55 PM

Thought Leader Presentation

The Great Distraction: Mergers & Acquisitions Impact to Cybersecurity

Mergers & Acquisitions can present an unexpected challenge to an organization's security posture and operations.  The public announcement of a potential deal is as distracting as tremors through the deck plates of a ship.  Priorities shift in an instant.  Bad actors and insiders assemble as a new raft of spear-phishing arrives at Inboxes.  Join us as we reveal the playbook for avoiding the pitfalls of devaluation, sidestepping the landmines of integration challenges, and fulfilling your mission to protect what matters most.

Topics include:

  • Cyber Due Diligence
  • The Many Distractions of M&A
  • Threats to (and from) the Deal - The Challenges of Integration


Darin Reynolds, Chief Information Security Officer, Edgio

1:55 PM - 2:05 PM

Transition - Travel to Case Study Boardrooms

2:10 PM - 3:35 PM

Use Case Boardroom Presentations

25-minute breakout sessions. Suppliers and delegates discuss challenges faced, strategy, implementation, outcome and the future.

3:35 PM - 3:45 PM

Transition - Travel to 1:1 Meeting Zone

3:50 PM - 6:45 PM

1:1 Meeting Zone

1:1 meetings between Sponsors and Delegates.

6:45 PM - 7:00 PM

Transition to Networking Reception & Casino Night

7:00 PM - 9:00 PM

Evening Networking - Dinner & Casino Night

Sponsored by

Day 3 - Wednesday, November 16

7:00 AM - 8:00 AM

Networking Breakfast

8:00 AM - 8:45 AM        

Fireside Chat

How I Survived a Ransomware Attack - Stories from a CISO

One of the largest cyber threats impacting organizations today is ransomware. It has shut down hospitals and schools, locked up critical infrastructure such as oil pipeline providers, and cost billions in losses. There is insurance now focused exclusively on ransomware and the insurance providers are even getting stricter on how they pay out. There are criminals and nation states behind these ransomware attacks who are figuring out how to beat all our defenses. Hear firsthand from a CISO at a critical infrastructure facility who survived a ransomware attack. He will share many lessons learned that will be invaluable for all to hear.


Diana Parr St Marie, Sr. Principal Cyber Advisor to US Cyber Command, Cyber Instincts


Roger Caslow, CISO, HRSD

8:45 AM - 8:55 AM

Transition - Travel to 1:1 Meeting Zone

9:00 AM - 12:00 PM

1:1 Meeting Zone

1:1 meetings between Sponsors and Delegates.

12:00 PM - 1:00 PM

Awards Luncheon with Conference Closing Q&A

1:00 PM          

Attendee Departures

Safe travels to all who attended SLE!