7:15am – 8:30am

8:30am – 8:50am

Welcome and Opening Remarks

Mary Lou Heastings
Executive Alliance Inc.

8:50am – 9:20am

The High Stakes of Security

Richard Warner 
Former PBS Host and Georgia Radio Hall of Fame Inductee


Former host of Georgia Business on PBS and executive security strategist, Richard Warner revealed the statistics that were conglomerated from industry leading whitepapers and illustrated the takeaways gleaned from the research.

9:20am – 9:45am

Evolution of the CISO

mike tiddy_150.png

Mike Tiddy


BNSF Railway Company

Cynthia Watson
Cynthia Watson
First Financial Bankshares, Inc.

Company decisions are being driven by technologies that foster increased productivity and bring growth to the bottom line, which in turn presents opportunities for leadership teams to re-invent and transform their businesses.  How does the CISO of today become the CISO of tomorrow, with capabilities to navigate through change and disruptions that impact their business?

9:45am – 10:15am

Network Data: Powering the Modern SOC


Charlie Bollom

Vice President of Sales

ExtraHop, Platinum Sponsor


Data is a blessing and a curse. Get the right data, in the right amount, at the right time, and you are in the driver’s seat. The wrong data, too little data, too much data, or the wrong timing, and you are in the hot seat. The explosion of data and its byproduct, network traffic, create structural problems for the SOC.

In this session, attendees will learn how taking a different approach to data – one that emphasizes speed, fidelity, and the elimination of data silos – can enable more successful threat hunting and incident response. Topics covered include the impact of TLS 1.3 and encryption on data and its ripple effect on security operations, as well as best practices for threat hunting. The session will also delve into how network traffic analysis can serve as the foundation of more effective security practices, data-driven decisions, and a mature, proactive SOC.

10:15am – 10:50am

Break and Networking in the Sponsor Pavilion

10:50am – 11:10am

The Year Ahead


Patrick Benoit

Deputy CISO

Cheetah Digital


As the breadth and complexity of information security threats continue to increase, security leaders are increasing their focus on building an organization that is able to detect, analyze, take action, recover, and communicate.  As part of this focus, developing a risk resilience environment, with input from the business units, will take center stage. Join In this interview session, CISOs will share insights on their strategies and supporting plans to continue to build a resilient environment for their companies.

11:10am – 11:40am

Navigating through Cloud Security


Todd Vancil

Vice President, Americas Systems Engineering

Symantec, Platinum Sponsor


Understand how advanced security tools and techniques can help you take back control of your cloud apps, cloud data and rogue users.

  • Learn how to protect sensitive data and intellectual property inside and outside your perimeter,

  • See what cloud apps are being used and how to easily protect all cloud apps, not just the most popular ones

  • Get rid of manual auditing and quickly discover sensitive assets stored in the cloud

11:40am – 11:50am

What’s Next?

This Interactive polling session with executives in attendance. focuses on priorities, execution and adding value.

11:50am – 12:10pm

Mitigating the Resurgence of Ransomware Attacks with Identity Governance


Donovan Blaylock

Technology Evangelist

SailPoint, Gold Sponsor


Ransomware… To different extents we are all familiar with this term. Today I’d like to focus on how we have seen Identity Governance used as a part of an enterprise’s overall Security architecture to help mitigate the risk and breadth of different kinds of ransomware attacks. 


12:10pm – 12:30pm

The X Factor in an “A” Team

Mindset…this team knows it can deliver.  What does it take to find and build a team that is invested, persistent, and knows how to overcome major challenges thrown its way? In an interview setting, CISOs will share their insights into the traits that make up “A” team members, why they are great problem solvers, and how to keep these employees motivated and challenged.

12:30pm – 1:35pm

Lunch and Networking

1:35pm – 1:55pm

What is Cryptojacking? How to Prevent your Network from Being Exploited


David Marshall

Resales Solutions Architect

Allot Communications, Gold Sponsor


Crypto-jacking, the hijacking of IT resources for the purpose of covert crypto-mining, made its first appearance in September of 2017. Since then it has surpassed many other cybercrimes such as ransomware and as such is of primary concern. 

The right approach to protecting against this threat and indeed others, is a layered approach that implement protections at all phases of a successful crypto-jacking attack; infiltration, infecting end-points with crypto-mining software, mining and exfiltration of the cryptocurrency. No end-point is safe crypto-jacking has been uncovered on computers, smartphones and IoT devices, including physical security devices.

1:55pm – 2:10pm

Senior Management’s Toughest Questions

In an interactive polling session, executives in attendance will weigh in on what their senior team is asking and holding them accountable for.

2:10pm – 2:20pm

What is “Zero Trust” and How Can I Get There?


Allan Cox

Principal Solutions Engineer

CyberArk, Silver Sponsor


The term “Zero Trust” has been making the rounds since Forrester coined it as a new way to think about our security architecture. The premise is we should not trust anything inside or outside our networks and verify everything and anything trying to connect to the networks. So, what does “Zero Trust” really mean to our organizations? 

2:20pm – 2:45pm

Scaling the Organization

With limited resources available, CISOs are looking in new directions on how they can continue to keep pace with the demand from their companies.  The focus of this session is on innovation, productivity, and other ways for security organizations to work smarter. 

2:45pm – 2:55pm
Past the Perimeter: Earned Access Through A Zero-Trust Model

Matthew Cantwell

Enterprise Sales

Duo Security,  Silver Sponsor


In this talk you will learn:

  • Why the traditional perimeter-focused security model won’t meet the needs of most modern organizations
  • How a zero-trust security model can overcome these challenges
  • How you can incorporate this approach into your existing architecture without starting from scratch.
2:55pm – 3:30pm

Break and Networking

3:30pm – 4:30pm

Executive Roundtable Discussions

Facilitated by executives, breakout sessions with your peers on topics determined by attendees during registration.


Topic #1: Measuring Security as a Business Value

Kevin Dunn

SVP and Chief Information Officer / CISO

U.S. Retirement & Benefits Partners


Topic #2:  The Zero Trust Security Model

Dorai Babu

Director of Security

The Travelers Companies


Topic #3: Examining the Threat Landscape

Asif Effendi

Director of Security

Baker Hughes, a GE Company

Topic #4:  Developing Talent for the Future
Jaimin Shah
Information Security Officer

Topic #5: Security Analytics & Threat Intelligence – Are We There Yet?

Clay Baum

Information Security Officer

Origin Bank 


Topic #6: Adaptive Security – Innovating for the Future

Joel Lytle

Director of Information Security

Jackson Walker LLP


Topic #7: Blockchain

Dr. Ram Dantu

Director, Center for Information and Cyber Security

University of North Texas (UNT)

4:30pm – 4:45pm

Closing Remarks

4:45pm – 5:45pm 
Reception and Networking with Prize Drawings