Building Trust in the Digital World

November 14-16, 2022 | Saddlebrook Resort & Spa | Tampa, FL

2022 Agenda

  • Building the Next Generation of Cybersecurity Workforce
  • Operational Security – The Next Evolution in Risk Reduction
  • The Growing Threat of Ransomware
  • Cybersecurity Risk and Exposure, a Key Factor in Partnership Decisions
  • The Journey Towards Zero Trust
  • Best Practices with Cybersecurity in the Cloud
  • Vendor Management Best Practices
Key Topics

Day 1 | Monday | November 14

2:00 PM - 4:30 PM


3:30 PM - 3:35 PM

Welcome to the Security Leadership Exchange Summit

Speaker: Philip McKay, CEO, nGage Events

3:35 PM - 3:45 PM

Meet Our Impact Partner




How, Exactly, Human-I-T Uses Your Technology to Make an Impact

Human-I-T is a nonprofit social enterprise that makes it easy for businesses and organizations to become environmental and social leaders by repurposing their outdated technology, rather than recycling it. By donating more than ten million pounds of electronic waste to us, our partners have helped us empower hundreds of thousands of people with access to opportunities that live online. All donations are tax-deductible and receive corporate-grade data destruction. Join us in creating a world where everyone can use digital technology to unlock their full potential.

Brandon SmithVP, Business DevelopmentHuman-I-T

Randy H

3:45 PM - 4:15 PM          

Cybersecurity Panel

Future SOC and the Need for MDR

Modern security operations center functions allow organizations to rapidly detect, analyze, investigate and actively respond through threat mitigation and containment by combining technology and human expertise to perform threat hunting, monitoring, and rapid response. The main benefit of MDR is that it helps rapidly identify and limit the impact of threats without the need for additional staffing; moreover, this type of augmentation allows companies to repurpose their cyber talent where it most needed, without having to pay for expensive, additional analysts who are in short supply. The use of such finely tuned detection engines using state-of-the-art artificial intelligence and machine learning enable limited resources to be used more effectively and viably.

Panelists will share their take on:

  • How to modernize the impact of Sec/Ops
  • Ways to make up for the talent gap
  • How to keep pace with the changing threat landscape

John J. MasseriniSenior Research AnalystTag Cyber

Grant Jacoby

Sr. Dir. Strategic Technology Development (SVP)

Fifth Third Bank

Yanek Korff

Chief of Staff and Co-Founder



4:15 PM - 5:00 PM          

End User Panel

Moderated discussion between security thought leaders around the most pressing issues facing the cybersecurity industry and our increasingly digital society.

5:00 PM - 5:10 PM          


5:10 PM - 5:50 PM

Thought Leader Panel

No More Department of "No" | Security as a Business Enabler

It is a tale as old as time, "IT, the business, and Security have different priorities". But is this true? IT wants technology to work, Security wants technology to be safe and the business wants to innovate and move fast. There is a growing sentiment that security is the "Department of No" for IT and the business. Phrases like, "You can't do that." and "You cannot use that application." often come to mind.

Join this executive leaders discussion with Chris Cochran of Axonius and his guests as they discuss:

  • What role does security play within the business
  • How can this relationship be improved
  • The stories of when things go well and when it has gone horribly wrong

Chris Cochran

Creative Director of Media


& Co-Founder

Hacker Valley Media


Jason Loomis

Chief Information Security Officer



Mary Ann Blair

AVP, Chief Information Security Officer

Carnegie Mellon

5:50 PM - 6:00 PM

Welcome to the Leadership Roundtables

In this special session, attendees have the opportunity to break into groups to discuss among their peers, topics spanning leadership challenges and technical solutions.

Moderators will guide the conversation on the first day and again on the last day of the event to share how their perceptions have changed over the course of the event.

Randy HeroldCISOManpower Group
Randy H

6:00 PM - 7:00 PM

Leadership Roundtables

Leadership Break Out

  • Security Frameworks

  • Key Metrics

  • Important Points of Collaboration

Technical Solutions Break Out

  • Resiliency

  • API Security

  • Zero Trust

  • Digitization

  • Microsoft E3 vs E5

  • Still Phishing after all these Years

7:00 PM - 8:30 PM

Security Leadership Exchange Welcome Reception & Dinner
Enjoy casual networking in a luxury setting to build new connections and establish relationships with potential clients and customers.

Day 2 | Tuesday | November 15

7:00 AM - 8:00 AM           Networking Breakfast

8:00 AM - 8:40 AM          

Keynote Presentation

All Roads Lead to Identity | From AD to ZT: Building an Identity Foundation for Enterprise Zero Trust

As countless enterprises rush headlong towards their interpretation of Zero Trust, many are overlooking the foundational elements that will ensure success in the end. This discussion will highlight several foundational aspects of Identity Management that provide a critical foundation upon which to build your Zero Trust deployment.

John J. MasseriniSenior Research AnalystTag Cyber


8:40 AM - 9:20 AM  

Keynote Presentation

The Accelerated Evolution of Cybersecurity and the Role Cyber Defenders Play

Cybercrime, according to the World Economic Forum’s Global Risk Report 2020, costs businesses more than US$6 trillion per year. In the 2 years since the report was published cybercriminals have, upped their monetization demands, attacked critical infrastructure such as Colonial Pipeline, utilized supply chain attacks, and continued to inflict untold damage on businesses and consumers. The woes don’t stop there, the conflict in Ukraine has seen attacks on power grid infrastructure and destructive data wipers, causing heightened potential cyber-attack alerts to be issued by governments across the globe. The presenter will explore some of the recent cyber-incidents, including those in Ukraine, how cybersecurity and the role of cyber defenders may be changing, and how the increased focus of regulation around cyber incidents may affect the role of cybersecurity teams.

Tony Anscombe

Chief Security Evangelist



9:20 AM - 9:40 AM

Thought Leader Presentation

The Great Distraction: Mergers & Acquisitions Impact to Cybersecurity

Mergers & Acquisitions can present an unexpected challenge to an organization’s security posture and operations.  The public announcement of a potential deal is as distracting as tremors through the deck plates of a ship.  Priorities shift in an instant.  Bad actors and insiders assemble as a new raft of spear-phishing arrives at Inboxes.  Join us as we reveal the playbook for avoiding the pitfalls of devaluation, sidestepping the landmines of integration challenges, and fulfilling your mission to protect what matters most.

Topics include:

  • Cyber Due Diligence
  • The Many Distractions of M&A
  • Threats to (and from) the Deal- The Challenges of Integration

Darin Reynolds

Chief Information Security Officer



9:40 AM - 9:55 AM


9:55 AM - 10:50 AM          

Case Study Presentations

10:50 AM - 11:05 AM


11:05 AM - 12:00 PM          

Case Study Presentations

12:00 PM - 12:50 PM

Networking Lunch

12:50 PM - 1:00 PM

Pulse of the Market

Recap of key finding and trends discussed at the event.

Speakers: SLE Advisory Board

1:00 PM - 1:30 PM        General Session

Securing Your Digital Supply Chain with Situational Awareness

Securing a vendor ecosystem is no longer just for companies needing to meet compliance mandates. Every organization relies on vendors to help push their business forward, which leaves firms of all shapes and sizes more susceptible to a third-party security incident.  Staying ahead of risks to your digital supply chain and gaining visibility into your vendor network is key to staying safe in today's threat landscape. More importantly, you need to be able to prioritize risk and understand where threats are coming from to act before it's too late.  

Join our session to learn how to:

  • Gain total visibility into digital supply chain threats
  • Using inherent risk to prioritize third-party threats
  • Build an action-oriented vendor risk program

Kelly White

Advisor & Founder



1:50 PM - 2:00 PM


2:00 PM - 2:55 PM

Use Case Boardroom PresentationDescription: 25 minute breakout sessions. Suppliers and delegates discuss challenges faced, strategy, implementation, outcome, and the future.

2:55 PM - 3:05 PM


3:05 PM - 6:00 PM          

1:1 Meeting ZoneDescription: 1:1 Meetings between Sponsors and Delegates

6:00 PM - 7:00 PM

Open Time

7:00 PM - 9:30 PM

Security Leadership Exchange Networking Activity: Dinner & Casino Night

Day 3 | Wednesday | Nov 16

7:00 AM - 8:00 AM        

Networking Breakfast

8:00 AM - 8:45 AM        

Fireside Chat

How I Survived a Ransomware Attack - Stories from a CISO

One of the largest cyber threats impacting organizations today is ransomware. It has shut down hospitals and schools, locked up critical infrastructure such as oil pipeline providers, and cost billions in losses. There is insurance now focused exclusively on ransomware and the insurance providers are even getting stricter on how they pay out. There are criminals and nation states behind these ransomware attacks who are figuring out how to beat all our defenses. Hear firsthand from a CISO at a critical infrastructure facility who survived a ransomware attack. He will share many lessons learned that will be invaluable for all to hear.

Diana Parr St Marie

Sr. Principal Cyber Advisor to US Cyber Command

Cyber Instincts

Roger Caslow




8:45 AM - 8:55 AM


8:55 AM - 12:00 PM

1:1 Meeting ZoneDescription: 1:1 Meetings between Suppliers and Delegates

12:00 PM - 1:00 PM

Awards Luncheon with Conference Closing Q&A

1:00 PM          

Shuttles to Airport