NATIONAL 2019 Symposium Recap

Click Here for the National 2019 Photo Gallery


Saturday Welcome Reception and Dinner Cruise

After boarding the Naples Princess, attendees, their guests and sponsors got a chance to get to know each other and enjoyed an exquisite dinner reception along with music, memories and epic sunset views.



2nd Annual Executive Alliance Bocce Ball Tournament

The competition was fierce and the weather was hot, but that didn't deter the teams from battling it out on the sand for all the glory!

Congratulations to team Foul Play who took home the WIN in 2019!


sunday reception

Sunday Symposium Opening Dinner

Hosted by the Ritz Carlton, the Welcome Dinner was a chance to re-connect and meet with new peers and to kick off the official start of the Symposium.


Monday Symposium Sessions


Welcome from Executive Alliance

Mary Lou Heastings, CEO of Executive Alliance, welcomed attendees and set the stage for the speakers and hosts, giving an overview of the current state of leadership in the security space.



Monday Keynote: Strategies for the Future

Don Clewley, Head of Information Governance, Risk and Data Protection at The Clorox Company, addressed the confluence of privacy regulations and cybersecurity threats, shared his insights into the latest trends he is seeing at the highest levels and explained how he is dealing with challenges as well as championing the successes of his organization.



Opening Up the Talent Funnel
Lynda Fleury, Global Chief Information Security Officer at Unum, spoke on how she handles the challenge of industry wide cyber personnel shortages, cultivates talent, attracts new blood and maintains lasting relationships with technology experts while pushing innovation.


Defense in Diversification and the Proactive SOC

Matt Cauthorn, Vice President of Security at ExtraHop Networks, explained how security operations now need to adapt to how data-first approaches to security architectures are illuminating natural consolidation points and how leveraging other parts of the organization improves security posture through smarter processes and practice.



IoT and the Future

Dr. Grant Jacoby, SVP, Director - Information Security Strategy & Development at Fifth Third Bank and Bob Marcotte, CISO at Amundi Pioneer, spoke on how as more data is shared across an ever-growing number of platforms, the risks become much greater- leading to intense pressure on security organizations to get it right the first time.



Visualization and Performance for CISOs

Jorge Conde-Berrocal, Founder and CEO of V3 Cybersecurity, Inc., addressed the benefits of effective communication between the CISO and stakeholders; the organizational value of using maturity assessment information on a real time basis and discussed why peer benchmarking helps establish due care for your organization. V3 successfully launched their new Minerva Platform at National 2019 and held a champagne toast to commemorate the occasion with attendees. Congratulations!


The Rocket Ride of Successes, Failures and Life After
Jesus "Laz" Montano, Former CISO at MassMutual, Metlife and Voya Financial gave an in-depth, personal interview about his career journey that spans 30+ years. Laz shared his insights on the trials and challenges for CISOs (especially at large organizations) and the life lessons he has learned from his fast-paced career as an executive across many different firms.



Bridging Security Intelligence: Hacking, Threat Hunting, AI, Behavioral Anomalies and Incident Response
Michael Melore, Cyber Security Advisor at IBM gave a sobering presentation about the private and state- sponsored dark web actors that are well orchestrated, are using innovative AI technologies and tooling, and are leveraging digital currencies. He demonstrated existing tech and how it can be used to destroy entire infrastructures.


Innovating on the CISO Role

Mary Dickerson, Asst. Vice-Chancellor, IT Security/CISO at the University of Houston, Kostas Georgakopoulos, CISO at Procter & Gamble and Charles Newberry, Global CISO at DuPont gave unique perspectives from their varied environments on how CISOs are innovating in their roles, and discussed expectations of their role in the future.



Every Breath You Take: How to Make Identity Sing
Mike Kiser, Senior Strategist in the Office of the CTO from SailPoint Technologies used Sting and The Police as he explored how to make identity successful within our organizations; just as they overcame obstacles to creating a musical masterpiece, he mapped out how to use the same tactics to breakthrough implementation barriers as you protect key resources and create new business opportunities.


Zero to 60 in 180 days: How We Managed the Impossible

John Masserini, Global CISO at Millicom (Tigo) described how a global telecom and cable provider managed the impossible - deploying a fully integrated, global Identity Management solution in 180 days. He revealed the approach taken, the challenges faced and the reasons behind the deadlines.


monday reception

Monday Evening Cocktail Reception

Tuesday Symposium Sessions


Tuesday Keynote: Converging Cybersecurity, Physical security, and Privacy Programs to Improve Effectiveness and Efficiency
Paul Connelly, VP of Information Protection & Security and CISO at HCA Healthcare spoke on how he brought together the three pillars of security at HCA- Privacy, Cyber and Physical and explained how he made the business case to his leadership, how it has changed his job, his leadership role in the company, and why others should be considering this approach.



Forward Thinking Strategies for Business Resiliency

Deena Swatzie, Group VP, Cybersecurity at SunTrust Banks focused on how organizations are building capabilities to scale quickly and continue to focus on the protections of their assets.


Palo Alto

What Makes a Next-Gen SOC?

Lior Kolnik, Head of Security Research at Demisto, A Palo Alto Networks Company focused on current pitfalls- including log-based detection, siloed tools, and manual processes that leave security teams playing catch up. He ended by visualizing the ideal next-gen SOC, driven by analytics-based detection, integrated data, and automated response with human oversight.


Foreign Direct Investment in Critical Technologies and Infrastructure


Michael Barba, Managing Director, National Security Compliance at BDO, showcased what happens when a company has foreign investment. He explained what the Committee on Foreign Investment in the United States is and does, what types of transactions CFIUS reviews and investigates, how FIRRMA will affect foreign transactions and showed best practices on how IT Security professionals will need to prepare and effectively manage the CFIUS process in all stages – from preparation, to submission, to review.
Moving Beyond Perimeter Security
Daniel Thuss, Sr Software Engineering Manager for Zero Trust at Akamai spoke on how to help companies move beyond the perimeter  - and have the cloud enable choice in infrastructure, applications, access, and identity for personas in their environment.
Executive Roundtables with Debriefs
Executive Roundtables formally closed the Symposium with great interactive discussions. Executives facilitating the breakout sessions included Anil Varghese, SVP and CISO at Exeter Finance Corp., Patrick Benoit, Business Information Security Officer at CBRE Group, Inc., Jan Wardle, Cyber Security Principal at FedEx, Frosty Walker, CISO at the Texas Education Agency, Jeff Johnson, Director, Cyber Security Operations at AutoNation and Steve Arrington, CISO at Genesco.
tuesday recption
Closing Cocktail Reception and Networking with Prize Drawings
The Symposium closed with an evening reception where everyone had the chance to relax and have some fun. Thank you to everyone for an amazing National 2019- the EA community really made this Symposium special and we hope to see everyone again in 2020!


Thank You to our 2019 National Symposium Sponsors



ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out. Our breakthrough approach analyzes all network interactions and applies advanced machine learning for complete visibility, real-time detection, and guided investigation. With this approach, we help the world’s leading enterprises including Hasbro, Credit Suisse, Caesars Entertainment, and British Airways to rise above the noise of alerts, organizational silos, and runaway technology. Whether you’re investigating threats, ensuring delivery of critical applications, or securing your investment in cloud, ExtraHop helps you protect and accelerate your business.

For more information, please visit or contact Charlie Bollom at

ExtraHop Revealx Datasheet

Palo Alto-1


Demisto- A Palo Alto Networks Company

Demisto is a leading Security Orchestration, Automation, and Response (SOAR) platform that helps security teams accelerate incident response, standardize and scale processes, and learn from each incident while working together.

Demisto combines security orchestration and automation, incident management, and interactive investigation to help security teams meet these challenges and best leverage existing and new security investments.

For more information, please visit


Akamai Technologies
Akamai secures and delivers digital experiences for the world’s largest companies. Akamai’s intelligent edge platform surrounds everything, from the enterprise to the cloud, so customers and their businesses can be fast, smart, and secure. Top brands globally rely on Akamai to help them realize competitive advantage through agile solutions that extend the power of their multi-cloud architectures. Akamai keeps decisions, apps and experiences closer to users than anyone — and attacks and threats far away. Akamai’s portfolio of edge security, web and mobile performance, enterprise access and video delivery solutions is supported by unmatched customer service, analytics and 24/7/365 monitoring.

For more information, please visit


In an industry focused on building walls, IBM Security is focused on creating an open, connected security ecosystem. We leverage AI, cloud, orchestration and collaboration to help clients prove compliance, stop threats, and grow their business securely.  Monitoring 70B+ security events per day, IBM is the #1 provider of enterprise security solutions and a leader in 12 security market segments. Our strategy challenges us to approach our work, support over clients, and lead the industry with forward-thinking solutions and services, allowing you to be fearless in the face of cyber uncertainty.

For more information, please visit 

SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. SailPoint’s open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. 

Sailpoint Identity is Security

Read what your peers are saying about:

  • The benefits of self-service access to systems, applications and data
  • Protection against cyber attacks with strong identity management
  • The connection between identity governance and compliance
  • How their c-suite sees the role of identity governance evolving in the future
To learn more about SailPoint, please visit 

V3 CyberSecurity, Inc
V3 Cybersecurity, Inc. is a unique company focused on contextualization of security programs from a business perspective.  Our decades of experience in working with Fortune ranked clients has taught us that the business of security remains a fairly immature discipline.  Despite all of the advances in technical controls and number of new security companies, organizations have a significant gap in understanding and managing the business of security.

As we continue to see performance pressures of the economy hit many security service providers, we see these economic conditions driving behavior and business practices that do not align with our VIRTUE based approach to business.  We understand that the very best talent in the security space will require a new type of corporate culture.  We believe in transparent and flexible working environment with a focus on VALUE based performance for our clients.  Remaining true to our principles over time will ensure that we create an environment to deliver on the VISION of our clients.

To learn more, please visit us at: or call us at:  833-932-7383.

 helps companies defend against threats related to stolen credentials, misused privileges, and unwanted remote access, while empowering people. 

Our privileged access management platform offers the broadest set of capabilities to:

  • Discover, manage, audit, and monitor privileged accounts of all types
  • Remove excessive end user privileges on Windows, Mac, Unix, Linux and network devices
  • Secure, manage, and audit vendor and internal remote privileged access, and access and support remote systems
  • Identify, prioritize, and remediate vulnerabilities and inform privilege decisions with risk insights
  • Audit, report, and recover changes across Microsoft Windows platforms

This approach has been recognized by top analysts from Gartner and BeyondTrust is trusted by more than 20,000 customers worldwide, including over half of the Fortune 100.

If you have an upcoming project or are currently evaluating PAM solutions, contact Natalie Salser at



Gigamon is leading the convergence of networking and security operations to help organizations reduce complexity and increase efficiency of their security stack. Our GigaSECURE® Security Delivery Platform is a next-generation network packet broker that helps customers make threats more visible across cloud, hybrid and on-premises environments, deploy resources faster and maximize the performance of their security tools.

Global 5000 companies and government agencies rely on Gigamon solutions to make them more agile and cut costs. 

For more information, visit



Founded in 2004, Prevalent helps enterprises manage risk in third-party business relationships. Prevalent delivers the industry’s only purpose-built, unified platform that integrates a powerful combination of automated assessments, continuous monitoring, and evidence sharing for collaboration between enterprises and vendors. No other product on the market combines all three components, providing the best solution for a highly-functioning, effective third-party risk program.

To learn more, please visit
Thank You to all who attended and stay tuned for 2020!



national sponsors