Summit Recap

Pre-Summit Dinner
Executive attendees enjoyed camaraderie and cuisine at the Capital Grille Buckhead. 
Welcome and Opening Remarks
CEO of Executive Alliance, Mary Lou Heastings, took the stage to welcome the executive attendees and comment on the focus of security executives in 2019 and beyond.
Keynote: Forging the Future
Jamil Farshchi, CISO at Equifax, shared his insights into what he sees down the road, the “must haves” that the security industry has to accomplish to drive change, the challenges the industry is facing, and where there are opportunities for wins. He also dove into the issues facing a CISO coming into an organization that has had a breach and outlined his strategy of the 4 Cs, and the success he has had because of it.
Opening Up the Talent Funnel
Haddon Bennett,  SVP and Chief Information Security Officer at Change Healthcare spoke on how he handles the challenge of industry wide cyber personnel shortages, cultivates talent, attracts new blood and maintains lasting relationships with technology experts while pushing innovation.
Defense in Diversification and the Proactive SOC
Curtis Walters, Vice President of Sales at ExtraHop Networks explained how security operations now need to adapt to how data-first approaches to security architectures are illuminating natural consolidation points and how leveraging other parts of the organization improves security posture through smarter processes and practice.
Cybersecurity – Today’s News and Tomorrow’s Forecast
Summit moderator and journalist Richard Warner, provided the latest on changes going on in the security environment and what trends are being forecasted for the future.
What Makes a Next-Gen SOC?
Bruce Hembree, Worldwide Security Architect of the Americas from Demisto- A Palo Alto Networks Company contextualized the bleakness of today's SOCs before he cast an optimistic eye towards the future. He interacted with the audience and visualized the ideal next-gen SOC, driven by analytics-based detection, integrated data, and automated response with human oversight.
Truths & Myths – Cyber Security Compensation
Art Hopkins, Executive Director, Technology Sector - Information Officers Practice at Russell Reynolds Associates engaged the audience in a enthralling discussion about the state of compensation in cyber leadership roles and what candidates are looking for and how far companies are willing to negotiate.
Bridging Security Intelligence: Hacking, Threat Hunting, AI, Behavioral Anomalies and Incident Response
Michael Melore, Cyber Security Advisor at IBM gave a sobering presentation about the private and state- sponsored dark web actors that are well orchestrated, are using innovative AI technologies and tooling, and are leveraging digital currencies. He demonstrated existing tech and how it can be used to destroy entire infrastructures. Then, he ended on a lighter note with a story about his band, The Bayshore Sandpipers. 🤘
The Impact of AI on Access Automation
Donovan Blaylock, Technology Evangelist for SailPoint discussed how artificial intelligence completely changes the model of automated access in an effort to better understand the actual impacts AI has on Information Security going forward.
Lunch and Networking
IoT in the World of Information Security
Michael Marsilio, Information Security and Compliance Officer at Paradies Lagardere focused on how organizations are building out their infrastructure and teams to ensure they are ready for the challenges they face.
Addressing Remote Vendor Privileged Access in The Digital Age
Mitch Moosbrugger, Regional Director of the Southeast at CyberArk spoke on how they are helping to manage and secure the cloud-first environments that house the data and assets crucial to the digital integration with vendors and remote workers. 
Forward Thinking Strategies for Business Resilience Management
Michele Stewart, CISO at RentPath, Kenneth Foster, Head Global Cyber Risk Governance at Fiserv and Almir Rocha, VP Governance, Risk & Compliance at FleetCor gave their view on how the future of today's companies depend on business resilience to maintain confidence - and how organizations are building capabilities to scale quickly and continue to focus on the protections of their assets.
Waiting for the Other Link to Drop: Avoiding a Future Cybersecurity Attack
Rob Forgione, Systems Engineer at Zix Corporation delved into the tools they provide to counteract the growing threat of infiltration due to email vectors and showed where to focus security attention due to financial, healthcare and federal laws dictating data preservation compliance.
Executive Roundtable Discussions
The highly rated Executive Roundtables wrapped up the Summit session.
Reception and Networking with Prize Drawings
The Summit closed with an afternoon reception where executive attendees and sponsors had the chance to relax and have some fun.
Thank you to everyone for a terrific Atlanta 2019 and we look forward to seeing everyone at the National Symposium!

Thank You to our 2019 Atlanta Summit Sponsors



ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out. Our breakthrough approach analyzes all network interactions and applies advanced machine learning for complete visibility, real-time detection, and guided investigation. With this approach, we help the world’s leading enterprises including Hasbro, Credit Suisse, Caesars Entertainment, and British Airways to rise above the noise of alerts, organizational silos, and runaway technology. Whether you’re investigating threats, ensuring delivery of critical applications, or securing your investment in cloud, ExtraHop helps you protect and accelerate your business.

For more information, please visit or contact Brent Johnston at 

ExtraHop Revealx Datasheet


Demisto- A Palo Alto Networks Company
Demisto is a leading Security Orchestration, Automation, and Response (SOAR) platform that helps security teams accelerate incident response, standardize and scale processes, and learn from each incident while working together.

Demisto combines security orchestration and automation, incident management, and interactive investigation to help security teams meet these challenges and best leverage existing and new security investments.

For more information, please visit

IBM Security Shield Wordmark Stack Black

In an industry focused on building walls, IBM Security is focused on creating an open, connected security ecosystem. We leverage AI, cloud, orchestration and collaboration to help clients prove compliance, stop threats, and grow their business securely.  Monitoring 70B+ security events per day, IBM is the #1 provider of enterprise security solutions and a leader in 12 security market segments. Our strategy challenges us to approach our work, support over clients, and lead the industry with forward-thinking solutions and services, allowing you to be fearless in the face of cyber uncertainty.

For more information, please visit 
SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. SailPoint’s open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. 
  • The benefits of self-service access to systems, applications and data

  • Protection against cyberattacks with strong identity management

  • The connection between identity governance and compliance

  • How their c-suite sees the role of identity governance evolving in the future

To learn more about SailPoint, please visit 
CyberArk is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including more than 50 percent of the Fortune 500, to protect against external attackers and malicious insiders. 
Now more than ever, companies are embracing digital technologies – migrating to the cloud, adopting SaaS and evolving their solutions with robotic process automation and DevOps. However, this digital transformation is increasing the attack surface – and securing privileged access is a critical step organizations should take.
Partner with CyberArk on this journey and provide protection for all privileged credentials no matter what they are – human or machine – or where they are – on premise, in the cloud or in hybrid environments.
Want to learn more about us? Visit our website, learn more about Privileged Access Security, or request a demo of our solution.
Also, don’t just take it from us. Read below for 3rd party analysts who have named CyberArk a leader in our space:

Zix Corporation (Zix) is a leader in email security. Trusted by the nation’s most influential institutions in healthcare, finance and government, Zix delivers a superior experience and easy-to-use solutions for email encryption and data loss prevention, advanced threat protection, unified information archiving and bring your own device (BYOD) mobile security. Focusing on the protection of business communication, Zix enables its customers to better secure data and meet compliance needs. Zix is publicly traded on the Nasdaq Global Market under the symbol ZIXI. 

For more information, visit

Jeff Hall, Senior Regional Sales Manager,

Case Study:


Area 1 Security
Area 1 Security has been recognized by Gartner as the cybersecurity industry’s only preemptive solution for preventing business email compromise (BEC), the #1 cause of security breaches worldwide. Area 1’s cloud-based anti-phishing solution protects Fortune 500 leaders across industries that include financial services, healthcare, manufacturing, consumer products and technology. 

Unlike traditional email defenses, Area 1 blocks phishing campaigns during the earliest stages of an attack cycle, before they hit employees’ inboxes. Area 1 was named this year’s Google Partner of the Year for Security, and has also been recognized by leading analysts as the only pay-per-performance anti-phishing solution.

BeyondTrust helps companies defend against threats related to stolen credentials, misused privileges, and unwanted remote access, while empowering people. 
Our privileged access management platform offers the broadest set of capabilities to:
  • Discover, manage, audit, and monitor privileged accounts of all types

  • Remove excessive end user privileges on Windows, Mac, Unix, Linux and network devices

  • Secure, manage, and audit vendor and internal remote privileged access, and access and support remote systems

  • Identify, prioritize, and remediate vulnerabilities and inform privilege decisions with risk insights

  • Audit, report, and recover changes across Microsoft Windows platforms

This approach has been recognized by top analysts from Gartner and BeyondTrust is trusted by more than 20,000 customers worldwide, including over half of the Fortune 100.
If you have an upcoming project or are currently evaluating PAM solutions, please contact Natalie Salser at
Duo Security
Duo Security, now part of Cisco, is the leading provider of Trusted Access security and multi-factor authentication. Duo's zero-trust security platform, Duo Beyond, enables organizations to provide trusted access to all of their critical applications - for any user, from anywhere, and with any device. Duo is a trusted partner to more than 14,000 customers globally, including Dresser-Rand, Etsy, Facebook, Paramount Pictures, Random House, Zillow and more. Founded in Ann Arbor, Michigan, Duo has offices in growing hubs in Detroit; Austin, Texas; San Mateo, California; and London.
 For more information, visit
Fidelis Cybersecurity is a leading provider of threat detection, hunting and response solutions. Fidelis combats the full spectrum of cyber-crime, data theft and espionage by providing full visibility across hybrid cloud / on-prem environments, automating threat and data theft detection, empowering threat hunting and optimizing incident response with context, speed and accuracy.
For more information, visit
Gigamon is leading the convergence of networking and security operations to help organizations reduce complexity and increase efficiency of their security stack. Our GigaSECURE® Security Delivery Platform is a next-generation network packet broker that helps customers make threats more visible across cloud, hybrid and on-premises environments, deploy resources faster and maximize the performance of their security tools.
Founded in 2004, Prevalent helps enterprises manage risk in third-party business relationships. Prevalent delivers the industry’s only purpose-built, unified platform that integrates a powerful combination of automated assessments, continuous monitoring, and evidence sharing for collaboration between enterprises and vendors. No other product on the market combines all three components, providing the best solution for a highly-functioning, effective third-party risk program.
To learn more, please visit

The Sonatype journey started 10 years ago, just as the concept of “open source” software development was gaining steam.  From our humble beginning as core contributors to Apache Maven, to supporting the world’s largest repository of open source components (Central), to distributing the world's most popular repository manager (Nexus), we’ve played a meaningful role in helping the world embrace the power of open innovation. 

Our integrated open source governance platform (Nexus) helps more than 1,000 organizations and 10 million software developers simultaneously accelerate innovation and improve application security. Our machine learning engine (Nexus Intelligence) has analyzed more than 31 million open source components. We continuously feed this intelligence to our customers so they make better innovation decisions early and everywhere across their development lifecycle. 

DevOps teams eliminate friction associated with manual governance and ship secure software faster than ever -- which makes everyone happy:  developers, security professionals, and IT ops.

To learn more, please visit


Varonis is a pioneer in data security and analytics, specializing in software for data protection, threat detection and response, and compliance. Varonis protects enterprise data by analyzing data activity, perimeter telemetry, and user behavior; prevents disaster by locking down sensitive data; and efficiently sustains a secure state with automation.

For more information, visit
Or contact Julia Duffy,, 770-530-9847, Account Manager or
David Rickey, , 954-205-1719, Regional Sales Director
Thank You to all who attended and we hope to see all of you on the beach in Naples for National 2019!