CISO Miami Summit | March 14, 2019 | Four Seasons Miami - Miami, FL, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Thursday, March 14, 2019 - CISO Miami Summit

8:00 am - 8:45 am

Registration & Networking Breakfast

 

8:45 am - 8:55 am

Welcome Address & Opening Remarks

Presented by:

Annalisa Fernandez, Intercultural Strategist, Because Culture View details

 
 
 

8:55 am - 9:25 am

Keynote Presentation

All Eyes on You

Security breaches are the most intimidating threats for CISOs and security executives. Because of that, upper level management, shareholders and even consumers are focusing now more than ever on the security department. With that, CISOs need to see this as an opportunity to work closely with business stakeholders to incorporate cybersecurity strategy with their organization's business initiatives. This is an ideal opportunity to address skill shortages and increase professional development of the internal security workforce. 

Takeaways: 

  1. How the CISO's role has changed 
  2. The latest security threats and how they can positively impact your team 
  3. How to measures your teams shortcomings and areas for improvement

Presented by:

Gary Eppinger, CISO, Carnival Corporation View details

 
 
 

9:30 am - 10:00 am

Think Tank

How Augmented Analytics Will Help Your Organization

Augmented Analytics focus on specific areas of augmented intelligence, using machine learning to enhance how data and analytics are presented and shared. As the capabilities of this technology advance rapidly, it is pivotal to understand these advancements. 

Takeaways:

  1. Learn more about Augmented Analytics' role as a key feature of data preparation and management, process management, process mining and data science platforms.
  2. How to optimize the decisions and actions of all entire team, not just those of analysts and data scientists
  3. Using Augmented Analytics to automate the process of data preparation, insight generation and insight visualization

Presented by:

David Less, CIO, JL Audio Inc.

 
 

10:05 am - 10:30 am

Executive Exchange

 

Think Tank

The Future of Autonomous Things

Today, we are seeing more Autonomous Things technology than ever before. As a result, functions formerly performed by humans are being replaced with AI. This technology's automation goes beyond the automation by using AI to deliver innovative behaviors that interact more efficiently and effectively with their surroundings and with their end-users.

Takeaways:

  1. Cover the latest innovations in autonomous and networked entities for 2019
  2. Learn how these innovations will shape the different industries and business landscapes
  3. Discuss the potential compromises to privacy and safety in the future of AI.

Presented by:

Luis Noguerol, NOAA Information System Security Officer, US Department of Commerce

 
 

10:30 am - 10:40 am

Morning Networking Coffee Break

 

10:45 am - 11:10 am

Executive Exchange

 

Share:

Executive Boardroom

Hunting in the Depths: The Need for a Strategic Threat Detection Model

This research presents and justifies a revolutionary Threat Hunting strategy that aligns Hunting operations to a hybrid Kill Chain model that incorporates the recursive nature of Lateral Movement into the Lockheed Martin Kill Chain. Existing security models are analyzed in relation to threat detection; these include the Lockheed Martin's Kill Chain, Mandiant's Attack Lifecycle model, David Bianco's Pyramid of Pain, as well as Defense in Depth. "Hunting with Arbitrary Indicators of Compromise (Ad-hoc Searching)" (aka, the "Shotgun" approach) and "Focused Threat Operations (Depth-First Searching)" (aka, the "Detection Chokepoints" approach) are reviewed as Threat Hunting strategies. Data provided by survey participants was analyzed as well. This included: demographics, controls, organizational maturity, and Threat Hunting tactics. It was noted that visibility was significantly lacking in Weaponization and Reconnaissance compared to the other phases of the Kill Chain and that indicators gained from each progressive phase of the Kill Chain were perceived to have increasingly more value than those from the prior phases. An innovative Strategic Threat Hunting Model aligned to the SANS Institute's five recommendations for improving the Maturity of Threat Hunting is also presented (Cole, 2017). In this model, it is recommended that detection be distributed within each phase of the attack lifecycle as the "Depth of Detection" can be audited at each stage of the Kill Chain to discern any variances / gaps. This comprehensive Breadth-First Threat Hunting Strategy is superior to both Ad-Hoc and Depth-First searching techniques in that it forces attackers to escalate their Level of Effort for evasion and obfuscation by as much as a factor of seven as they are required to actively evade the Hunt Team at every stage of the attack lifecycle. Ultimately, by strategically aligning Threat Hunting tactics across all seven phases of the Kill Chain the probability for detecting an attacker is increased by as much as 700%.

Sponsored by:

Carbon Black View details

 
 

Ben Tedesco, Security Strategist, Carbon Black View details

 
 
 

11:15 am - 11:40 am

Executive Exchange

 

Think Tank

Technology Across Cultural Borders

In a globalized world, cultural differences present challenges but provide the opportunity for innovation and global excellence. Starting from C-level topics about preserving the corporate and brand message, explore the cultural side of digital communication and the objectives in localizing content, information, and engagement strategies for digital and mobile world forums. As technology grants unprecedented access to new markets, examine different regional communication styles and perceptions of time, discover why emojis aren't universal, and explore cultural preferences and norms for privacy and information governance on the global stage. 

Takeaways: 

  1. Explore the cultural challenges in leadership and communication, including the cultural elements in digital communication and in information. 
  2. Preserve the corporate message with global consistency across borders for a meaningful digital experience in all markets. 
  3. Decode how information governance and privacy norms are affected by world cultures, enabling effective global policy creation, application, and dissemination.

Presented by:

Annalisa Fernandez, Intercultural Strategist, Because Culture View details

 
 
 

11:45 am - 12:10 pm

Executive Exchange

 

Share:

Thought Leadership

ENABLING A BUSINESS-FIRST NETWORK: Moving from Software-defined to a Self-driving Wide Area Network

The Silver Peak Unity EdgeConnect SD-WAN platform enables enterprises to shift to a business-first networking model where the network enables the business. Advancements in AI and machine learning enable EdgeConnect to continuously adapt to deliver real-time response and eliminate the impact of network disruptions. EdgeConnect unifies SD-WAN, firewall, segmentation, routing, WAN optimization and application visibility and control in a single platform. EdgeConnect is business-driven so business priorities are reflected in the way the network behaves to deliver the highest quality of experience.

Sponsored by:

Silver Peak Systems View details

 
 

Scott Gibson, Regional Sales Director - US South Region, Silver Peak Systems View details

 
 
 

12:15 pm - 12:40 pm

Executive Exchange

 

Share:

Thought Leadership

From the Front Lines: 5 Best Practices for Application Defense in Depth

Everyone knows applications are the lifeblood of the enterprise, but as the threats multiply and come at an ever-faster rate, protecting those applications becomes a massive challenge. Layer in the issues associated with moving applications to the cloud, using open source code, implementing rapid release cycles, and being forced to use legacy apps when the development team is long gone, and it's easy to see that application security can be a thankless, endless job. 

Layered security, or defense-in-depth, is an admirable goal. The problem is, how do you achieve it? We've been on the front lines for years, finding what works and what doesn't. In the process we have distilled five best practices that will help enterprises of any size tackle the thorny problem of application security in a dynamic world where change is the only constant. 

A combination of defenses at the edge, in the network and inside the applications themselves forms the core of the best practices. Layered on top are two additional practices that make all the difference: full real-time visibility with analytics, to help beleaguered security analysts quickly distinguish real threats from noise and take action based on full context; and a consumption model that allow the enterprise to quickly, easily and cost-effectively move protections to where they will do the most good. The result? Vastly improved application security, effective remediation, and a DevSecOps model that works.

Sponsored by:

Imperva View details

 
 

, , View details

 
 
 

12:40 pm - 1:50 pm

Working Lunch & Panel

Diversity by Design in Artificial Intelligence

Artificial intelligence can enhance the customer journey, and make our organizational processes smarter, more inclusive, and more innovative. But AI is not infallible and objective, as algorithms may reflect conscious and subconscious human bias by encoding our historical norms. At this critical stage of foundational data framework, perpetuating these biases through AI risks not only replicating, but amplifying, unfair biases against certain groups. We will decode the ethical debate about privacy, equity, values, and inclusion in AI, and explore strategies towards a multidisciplinary approach with accountability for unbiased and transparent models.

Moderated by:

Annalisa Fernandez, Intercultural Strategist, Because Culture View details

 
 

Panelists:

Gary Eppinger, CISO, Carnival Corporation View details

 
 

Lars Schmekel, CISO, Miami Dade County

 

Chris Harrison, CTO, Nova Southeastern University View details

 
 

Greg Taffet, MC, Board Member of South Florida Digital Alliance, former CIO, US Gas and Electric View details

 
 
 

1:55 pm - 2:20 pm

Executive Exchange

 

Share:

Executive Boardroom

Where Are We on Our Journey? Effective Dashboards for Decision Making

How fast are we going? Are we going in the right direction? How much fuel do we have in the tank? These are common questions for those on the move. Companies on a digital transformation journey need effective dashboards to help them understand the myriad data sources screaming for attention. We will discuss best practices for the various types of dashboards that can be used to make the most important decisions for your company.

Takeaways:

  1. Digital Transformation is providing an increasing amount of data to be understood and analyzed in order to make the right decisions
  2. Effective dashboards are a key tenet of consuming this onslaught of data

Sponsored by:

CenturyLink View details

 
 

Scott Luongo, IT Solutions Client Partner, CenturyLink View details

 
 
 

2:25 pm - 2:50 pm

Executive Exchange

 

Think Tank

A.I. - The Future Technology Disruptor of all Industries and Sectors

Over the last few years, Artificial Intelligence (A.I.) has been gaining momentum across all industries and all spectrum's of the world from consumer solutions such as Siri and Alexa leveraging Machine Learning to disruptive technologies such as Uber and Lyft as well as Social Media channels such as Facebook, Instagram, Snapchat and Twitter to the extreme side of Quantum computing attempting to solve the world's biggest and most complex challenges. Some of the key advantages of A.I., are the ability to gain deeper knowledge from data, and to leverage that intelligence into providing significantly better services, support, marketing and sales efforts so as help accelerate, grow and scale companies and organizations across the globe and industries.

Presented by:

Chris Harrison, CTO, Nova Southeastern University View details

 
 
 

2:55 pm - 3:20 pm

Executive Exchange

 

Executive Boardroom

Everything Old Is New Again

In this presentation, we will examine a few notable past breaches and discuss the similarities to more recent breaches - are there lessons not being learned; pitfalls that we can avoid?

Sponsored by:

Thales eSecurity, Inc. View details

 
 

Presented by:

Joe Tomasone, SE, Southeast, Thales eSecurity, Inc. View details

 
 
 

3:20 pm - 3:30 pm

Afternoon Networking Coffee Break

 

3:35 pm - 4:00 pm

Executive Exchange

 

Think Tank

Mobilizing Workforce (Business Anywhere)

In the near future, it is predicted that digital twins or the digital representation of a real-world system will exist for billions of different things. The implication of digital twins will be base-line and simple at first, but as developments take place, digital twins will improve their ability to collect and present the right data and apply the right analytics in order to respond effectively and efficiently.

Takeaways:

  1. Understanding the opportunity for digital twins in your organization and how to implement them
  2. How digital twins create more dynamic processes for an organization's business model
  3. Covering the business implications of digital twins for your organization

Presented by:

Sapana Patel, Sr. Director of Solution Delivery & Architecture, Spirit Airlines View details

 
 
 

4:05 pm - 4:30 pm

Executive Exchange

 

Innovation Partner Showcase

What's the Big Deal about SD-WAN? Seeing the Forest for the Trees

SD-WAN is one of the hottest topics in networking today, with numerous articles, presentations, and webinars touting its many benefits. By and large, by focusing almost exclusively on these benefits, the bigger picture view of SD-WAN as a transformational technology is often lost.

Understanding this big picture view provides an important perspective on the value of SD-WAN, yielding practical insights that help to differentiate among the numerous vendors and approaches in the market.

This session explains SD-WAN from the big picture, emphasizing the truly unique and revolutionary aspects of this important technology.

Takeaways

  1. An understanding of SD-WAN from the big picture perspective
  2. A deeper appreciation of its transformational potential
  3. Practical insights that help to differentiate among vendors

Sponsored by:

GTT Communications View details

 
 

Rich Vidil, VP, Sales Engineering, Enterprise, GTT Communications View details

 
 
 

4:35 pm - 5:00 pm

Executive Exchange

 

Think Tank

Machine Learning Is Here to Help, Not Replace

Over the next few years, machine learning (ML) will be a regular security practice and will offset skills and staffing shortfalls. Today though, ML is better at addressing smaller, more specific problems. Technology leaders have to understand that humans and machines complement each other and work better together than alone, as ML can assist humans in addressing uncertainty by presenting relevant information.

Takeaways:

  1. Discuss the ways machine learning can assist teams and organizations
  2. How to make the right machine learning choices for your organization
  3. The future of machine learning

Presented by:

Don Cox, Chief Information Security Officer, MEDNAX, Inc. View details

 
 
 

5:00 pm - 5:15 pm

What's the Next Stop On the Transformation Journey?

Our Governing Board will summarize the learnings from the day and discuss the path forward for building an ongoing community of CIOs where common issues can be addressed and success stories can be shared.

Takeaways:

  1. Building an ongoing community with your peers can be an invaluable resource for tackling the digital transformation projects ahead of you.
  2. Sharing stories of success (and failures) is not reserved to a one-day CIO Summit, but should be shared on a regular basis with your peers.

Presented by:

Tery Howard, Master of Ceremonies, CEO, former SVP and Chief Technology Officer, Miami Dolphins and Hard Rock Stadium View details

 
 
 

5:15 pm - 6:30 pm

Summit Happy Hour