Southeast US Summit
Hybrid Summit October 11 - 12, 2022
This hybrid summit's agenda will cover Zero Trust, IAM, Ransomware, Privacy, Fraud, Payments, IoT, Cryptocurrency, End Point Protection, Cloud Security and more.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
AMA Conference Center, 3rd Floor
Name :
AMA Conference Center, 3rd Floor
Address :
1170 Peachtree St NE #300, Atlanta, GA, USA
Troy Leach
Security Executive in Residence
Cloud Security Alliance
David Pollino
Former CISO
PNC Bank
Ari Redbord
Head of Legal and Government Affairs
TRM Labs
John Kindervag
Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow
ON2IT Cybersecurity
Lisa Sotto
Partner
Hunton Andrews Kurth LLP
Jeremy Grant
Managing Director, Technology Business Strategy
Venable LLP
Grant Schneider
Senior Director for Cybersecurity services ( Former U.S. federal CISO)
Venable LLP
Tom Field
SVP of Editorial
ISMG
Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world,...
Jay Schiavo
Vice President of Products, Certificate Solutions
Entrust
Schiavo is the vice president of products for the Entrust Certificate Solutions product segment. He and his team shape the future vision and strategy, making it easy for customers to consume the solutions across the Entrust SSL, PKI, and Digital...
David Nolan
Chief Information Security Officer
Aaron's
As the Chief Information Security Officer at Aaron’s; David is accountable for information security and risk leadership, strategy, budget, and operational excellence for the Aaron’s and BrandsMart USA businesses. He is a servant-leader and mentor to a robust team of...
Erich Kron
Security Awareness Advocate
KnowBe4
Kron is a security awareness advocate at KnowBe4 and a veteran information security professional with over 25 years of experience in the medical, aerospace manufacturing and defense fields. Kron is the former security manager for the U.S. Army's 2nd Regional...
Stoddard Manikin
CISO
Children's Healthcare of Atlanta
Roger Brassard
Sr. Product Manager
Carbonite and Webroot, OpenText Security Solutions
Brassard is a 22-year veteran product manager who specializes in capturing customer and partner concerns, staying abreast of industry trends, including regulatory changes, and translating that information into cross-functional development teams to solve the cybersecurity business problems of today and...
Kory Daniels
CISO
Trustwave
As the CISO at Trustwave, Daniels is accountable for ensuring the security of the organization and its clients, partners and stakeholders by leveraging Trustwave's own cybersecurity platforms. He is an innovator and leader in cyberthreat detection program transformation. Over the...
Robert Glore
Technical Staff Assistant
U.S. Secret Service
Jimmy Lummis
Senior GRC Specialist
Children's Healthcare of Atlanta
Joshua Reed
Network Intrusion Forensic Analyst
U.S. Secret Service
Josh Reed has over 15 years law enforcement experience and began working with the USSS in 2013. He is a certified computer, mobile device, skimming device examiner, and holds several professional certifications. He has instructed at the National Computer Forensic...
Anna Delaney
Director, ISMG Productions
ISMG
Felicia Hedgebeth
CISO
Georgia Department of Banking and Finance
With over 28 years in both Information Security and Information Technology, Felicia can bridge the gap between security and IT to meet business goals and objectives of my organization. In her current role as Chief Information Security Officer, for the...
Bill Wyatt
Chief Information Security Officer & CIO
State of Georgia Office of the State Treasurer
James DeLuccia
Product Security Chief
Honeywell
James leads the security market strategy for global products across Honeywell on Azure and Amazon. In combination with this role, James is responsible for leading, generating, and commercializing cybersecurity market benefits and independent offerings. Author of two books, the most...
Corey Elinburg
Sr. VP and CISO
CommonSpirit Health
Corey Elinburg is a System SVP and Chief Information Security Officer for CommonSpirit Health, the largest nonprofit health system in the United States serving more than 1,000 care sites in 21 states. Corey joined CommonSpirit in September 2020 as a...
Ray Griffin
CISO
Cox Media Group
Ray has more than 20 years of information technology and security leadership experience with a demonstrable track record of successfully leading complex cybersecurity programs for global companies. Ray is currently the CISO at Cox media group where he is responsible...
Jim Salmonson
Technical Solutions Architect
Cisco Systems
Salmonson is a technical solutions architect at Cisco Systems, with over 25 years of experience in information security. His contributions have allowed him to grow with Fortune 500 organizations, education, state and local governments and the federal government. He previously...
Monique Hart
CISO
Piedmont Healthcare
Michael Owens
BISO
Equifax
Ben Murphy
SVP, Head of Cyber Operations
Truist
Ben Murphy leads the Corporate Cyber Security Cyber Operations & Engineering team. His organization incudes nine teams that focus on Infrastructure Protection and Security Threat Monitoring and Response. Ben’s group is responsible for the operations of two cyber fusion centers...
Stanton Gatewood
Cyber Security Coordinator/Advisor
US DHS/CISA
Mr. Gatewood is the US DHS/CISA -R4 Cyber Security Coordinator for the State of Georgia. He is a Distiguished Fellow at the Ponemon Institute. Gatewood is the former Chief Information Security Officer for the State of Georgia, Board of Regents...
Michael Novinson
Managing Ediitor
ISMG
Phyllis Woodruff
VP, IT Risk & Compliance
Global Payments
Phyllis Woodruff has more than 25 years management experience and a strong track record of building resilient and nimble teams. Her domain has been financial services with a focus on security, risk and compliance. Her last two years have been...
Kenneth Foster
VP of IT Governance, Risk and Compliance
Fleetcor
Ken is currently VP of IT Governance, Risk, and Compliance at Fleetcor with more than 20 years of experience in the field focusing on platform architecture and security. I previously held the positions as Head of Global Cyber Risk Governance...
David Levine
Vice President Corporate & Information Security & CSO
Ricoh, USA
David Levine is Vice President of Information Security and CISO for Ricoh USA, Inc. In this role, he has responsibility for operational security, security policy, access management, eDiscovery and litigation support and HIPAA compliance. Levine chairs Ricoh’s Security Advisory Councils,...
Kevin Gowen
CISO
Synovus Financial Corp.
Kevin Gowen serves as Chief Information Security Officer for Synovus and is responsible for information and cyber security, physical security, business continuity, fraud, and financial crimes. He was named Chief Information Security Officer in 2015. Gowen earned Bachelor’s and Master’s...
Amelia Paro
Director Of Channel Development
ID Agent
Paro leads Kaseya's channel team, working with MSPs and channel partners around the globe. She is an experienced sales professional with over 10 years of experience in the technology industry in B2B and B2C environments. Her past sales experience includes...
Zachary Bulliner
Senior Special Agent
U.S. Secret Service
Bob Varnadoe
CISO
NCR Corporation
Bob Varnadoe is Chief Information Security Officer for NCR Corporation. His duties include overall information security and operational/IT aspects of NCR’s privacy program, IT risk management, and compliance company-wide, training and awareness for information security, and oversight of the deployment...
Tim Frazier
Sales Engineer
Anvilogic
Frazier has been in the cyber game for over 15 years as a consultant, practitioner, content builder, vendor and conference speaker. He has been an IT/cyber jack of all trades, from writing risk management frameworks to running projects for implementing...
Matt Mintzer
Solutions Engineer
Snyk
View Agenda
How to Keep Your Security Programs Proactive in an Ever-Evolving Threat Landscape
David Levine, Vice President Corporate & Information Security & CSO, Ricoh, USA
Phyllis Woodruff, VP, IT Risk & Compliance, Global Payments
Ben Murphy, SVP, Head of Cyber Operations, Truist

Cybersecurity strategies are shifting from a reactive stance to proactive approach. This change gives organizations the ability to be more agile with their security program. In this keynote session, our panel of industry experts will share their experience and insights on:

  • Is it possible to be prepared for the unknown cyber threat?
  • Team retention and talent acquisitions, including strategies for different generations
  • Promoting and driving a security and risk-aware culture
  • Current threat landscape’s most prevalent features-Cloud Security/Attacks, Human Error, Evil Proxy
David Levine
Phyllis Woodruff
Ben Murphy
  • 09:10 AM
  • 09:39 AM
  • 09:45 AM
  • 10:14 AM
Track A
Corey Elinburg
Ray Griffin
Michael Owens
Ben Murphy
Track A: Strategies to Mitigate Risk and Exposure During Your Merger or Acquisition
Corey Elinburg, Sr. VP and CISO, CommonSpirit Health
Ray Griffin, CISO, Cox Media Group
Michael Owens, BISO, Equifax
Ben Murphy, SVP, Head of Cyber Operations, Truist

2021 M&A transactions were up 55% in in the U.S. over 2020. And 2022 is on pace to be even bigger. This wave of post-Covid M&A demands that cyber security leaders improve their efficacy. Panelists for this session are seasoned practitioners who are eager to share their experiences from the initial phase during due diligence through day-one integration of the M&A cycle: 

  • Ensure that a subsidiary cannot expose the parent company to cyber risks through the M&A process
  • Be a player and practice due diligence in the M&A process from start to integration
  • Leverage integrated risk assessments and automated smart questionnaires to gain a real-time snapshot into what a company’s cyber risk posture and overall GRC looks like
  • 09:45 AM
  • 10:14 AM
Track B
Kenneth Foster
James DeLuccia
David Levine
Kevin Gowen
Track B: Third-Party Selection and Management: What You Need to Know and Do Before and After You Sign
Kenneth Foster, VP of IT Governance, Risk and Compliance, Fleetcor
James DeLuccia, Product Security Chief, Honeywell
David Levine, Vice President Corporate & Information Security & CSO, Ricoh, USA
Kevin Gowen, CISO, Synovus Financial Corp.

The need for third-party risk management has never been greater. Even though the risks to your company, customers and partners can be substantial, the processes, methods, and mediums used today are frequently flawed and even potentially misleading. In this panel discussion we dive into:

  • What does the current TPRM risk landscape look like today?
  • What’s working and not working in TPRM?
  • What are the risks and mitigation strategies?
  • Best practices and recommendations for an effective program and what’s needed in the future
  • 10:20 AM
  • 10:49 AM
Track A
Jim Salmonson
Track A: Starting Your Journey to Zero Trust: "Who's Knocking at the Front Door"
Jim Salmonson, Technical Solutions Architect, Cisco Systems

As your organization defines what a zero trust architecture might look like, have you taken initial steps to align it with a mature security model? A zero trust strategy can reduce risk - it's more than just a check mark to meet cyber insurance requirements. Even smaller advancements with identity and device posturing can help to reduce risk. Let’s be sure to ask, "Who's knocking at your front door?" before we let them in.

  • 10:20 AM
  • 10:49 AM
Track B
Erich Kron
Track B: Your Ransomware Hostage Rescue Guide
Erich Kron, Security Awareness Advocate, KnowBe4

As ransomware attacks become increasingly targeted and damaging, infected businesses run the risk of having their data held hostage and their network operations disrupted for days or weeks. The danger has never been more real. Organizations must understand the core fundamentals of ransomware prevention, response, rescue and recovery. This session will explore some of the latest features of ransomware strains and review key takeaways, including proven methods of attack prevention and mitigation.

  • 10:55 AM
  • 11:09 AM
Track A
Roger Brassard
Track A: How to Become Cyber Resilient in Today’s Business World
Roger Brassard, Sr. Product Manager, Carbonite and Webroot, OpenText Security Solutions

OpenText Security Solutions delivers a complete cyber resilience framework, encompassing data security and management. Modeled on NIST, our services prevent and protect, detect and respond, restore and recover data, as well as adapt and comply with compliance needs. Learn how Webroot Email Threat Protection keeps organizations safe from email-borne threats and Email Continuity keeps business email accessible - your first two steps toward cyber resilience.

  • 10:55 AM
  • 11:09 AM
Track B
Amelia Paro
Track B: Graphus: From Phishing Attack Overload to IT Team Relief
Amelia Paro, Director Of Channel Development, ID Agent

Phishing is one the most dangerous cybersecurity threats, causing businesses to lose money, reputation and peace of mind. Legacy email security solutions such as Secure Email Gateways, or SEGs, consistently fail to prevent advanced cyberthreats. In this session, learn how AI-powered email security by Graphus works, why it is far superior to conventional security and how it detects and rapidly eliminates the most sophisticated phishing attacks, including zero-day attacks, business email compromise or BEC, account takeover or ATO, credential theft and ransomware. As these attacks grow more sophisticated, not even Google Workspace or Microsoft 365 native security can filter them out, but the Graphus AI can.

Exhibits & Networking Break

Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!

  • 11:10 AM
  • 11:29 AM
  • 11:30 AM
  • 11:59 AM
Track A
David Levine
David Nolan
Michael Owens
Kevin Gowen
Track A: Why Strong Partnerships with Executive Leadership Are Essential for Good Data Governance
David Levine, Vice President Corporate & Information Security & CSO, Ricoh, USA
David Nolan, Chief Information Security Officer, Aaron's
Michael Owens, BISO, Equifax
Kevin Gowen, CISO, Synovus Financial Corp.

A recent nationwide survey 23% of CISOs report to the CEO, while nearly 45% reported into a CIO. With Data Governance ultimately being about people, processes, and technology--the foundation for data governance—are “musts.” In this session, you will hear from practitioners who have actuated strong partnerships with executives. They will share:  

  • Tried and true approaches for getting buy-in and clear ownership 
  • Strategies for breaking down data silos
  • Approaches to find the right balance between flexibility and data governance standards
  • 11:30 AM
  • 11:59 AM
Track B
Robert Glore
Zachary Bulliner
Joshua Reed
Track B: U.S Secret Service on Business Email Compromise and Cyber-Enabled Fraud
Robert Glore, Technical Staff Assistant, U.S. Secret Service
Zachary Bulliner, Senior Special Agent, U.S. Secret Service
Joshua Reed, Network Intrusion Forensic Analyst, U.S. Secret Service

Business Email Compromise (BEC) and related email account compromise scams resulted in nearly $2.4 billion in reported losses from victims in 2021, the most of any category disclosed to the FBI’s Internet Crime Complaint Center (IC3.) In this presentation and fireside chat, Our panelists will outline the anatomy of a BEC scheme, share insights into criminals' methods - and why they're working, and provide techniques to prevent these crimes.

Join the U.S. Secret Service to learn about;

  • The reality of BEC scams today - and how the criminals are succeeding;
  • Best practices to prevent BEC scams;
  • Ways to report cyber-enabled financial fraud cybercrimes.
Key Considerations in Securing an Evolving Threat Landscape
Jay Schiavo, Vice President of Products, Certificate Solutions, Entrust

The digital landscape continues to evolve and become more complex, and with the rapid growth in identities - from human identities to machine identities, the attack surface is expanding. With the added complexity of changing regulations and the looming threat of post-quantum, organizations need to gain visibility into their IT and OT environments and ensure they're future-proof. Join Entrust for this session where we will discuss some of the key trends in the digital security landscape and share some best practices and considerations to help ensure your connected ecosystems stay secure.

Jay Schiavo
  • 12:05 PM
  • 12:34 PM
Lunch & Networking Break
  • 12:35 PM
  • 01:19 PM
Cloud Native Application Security: Embracing Developer-First Security for the Cloud Era
Matt Mintzer, Solutions Engineer, Snyk

Join Matt Mitzner, solutions engineer at Snyk, to learn how Snyk's AppSec and CloudSec platform allows developers to not only build securely but also build at a pace that allows them to stay competitive. This Tech Talk will share how Snyk is differentiated in the market and why our platform is not only trusted by security teams but also loved by developers because it allows security to scale and developers to move faster.

Matt Mintzer
  • 01:40 PM
  • 01:54 PM
Don’t Get Caught in a Compromising Position: Defend & Detect Across Your Threat Landscape
Tim Frazier, Sales Engineer, Anvilogic

Threat detection is at the heart of building foundational security to shift with the evolving threat landscape. In this session, we will demonstrate how to build behavioral attack-pattern scenarios correlating detection use cases across different data domains, which helps to keep up with your threat landscape. You will learn how to easily start to build and implement sequence-based detections in your environment. The right methods, frameworks and detections are fundamental to understanding your threat landscape and comprehending the correct path. We will show you how to cover the steps to defend against various compromises that have been identified across numerous industries.

Tim Frazier
  • 02:00 PM
  • 02:29 PM
Building Digital Trust – a CISO Perspective
Kory Daniels, CISO, Trustwave

In an era of data proliferation, supply chain convergence, and an expanding attack surface, how are CISOs responding?  Hear from Kory Daniels, CISO at leading managed cybersecurity provider Trustwave, on how leading enterprises are adapting their approaches to build digital trust and resilience both inside and outside the business. 

Kory Daniels
  • 02:35 PM
  • 03:04 PM
Exhibits & Networking Break

Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!

  • 03:05 PM
  • 03:24 PM
Incident Response: Are You Prepared for Your Organization's Worst Day?
Stoddard Manikin, CISO, Children's Healthcare of Atlanta
Monique Hart, CISO, Piedmont Healthcare
Bob Varnadoe , CISO, NCR Corporation
Jimmy Lummis, Senior GRC Specialist, Children's Healthcare of Atlanta

It's not a matter of "if" the next cyberattack will strike--it's a matter of "when.” The extent of your preparedness is one of the biggest factors determining what that day (and beyond) is going to be like for you and your organization.
When that day arrives, it’s too late to ask: Who have I prepared? How did I prepared them? What tools do I have at-the-ready? This panel of Industry experts will lend their experiences and lessons learned to unpack those questions as well as navigate us through the following:

  • What threats are most likely to cause the biggest disruption?
  • What are you doing now to protect your environment - and where are your biggest gaps?
  • How can we leverage all of the security controls in our environment for an effective, layered defense?
Stoddard Manikin
Monique Hart
Bob Varnadoe
Jimmy Lummis
  • 03:25 PM
  • 03:54 PM
Clouded Judgment: Why Security & Cloud Are Aligned
Phyllis Woodruff, VP, IT Risk & Compliance, Global Payments
Kenneth Foster, VP of IT Governance, Risk and Compliance, Fleetcor
Stanton Gatewood, Cyber Security Coordinator/Advisor, US DHS/CISA

The perceived conflict between profitability and speed to market versus security is rife in our organizations. Understanding this is important, and combating it is crucial. Cyber security leaders guide and influence the discussion, and thereby mindset, as both are indispensable to business goals. Making cloud secure is our best path forward. What are the necessary building blocks, and how can you create and promote a secure cloud strategy?

  • Discuss key points to win converts to a security mindset
  • Deal with M&As that have existing cloud environments
  • Retool teams and install effective guard rails
  • What role can compliance play?
Phyllis Woodruff
Kenneth Foster
Stanton Gatewood
  • 04:00 PM
  • 04:29 PM
Cocktail Reception
  • 04:35 PM
  • 05:34 PM
Day 2 Agenda

All content from Day 1 will be available on demand from 9 AM - 5 PM EST on Day 2, Wednesday, October 12th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.

  • 09:00 AM
  • 05:29 PM

This hybrid summit's agenda will cover Zero Trust, IAM, Ransomware, Privacy, Fraud, Payments, IoT, Cryptocurrency, End Point Protection, Cloud Security and more.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

AMA Conference Center, 3rd Floor
Name :
AMA Conference Center, 3rd Floor
Address :
1170 Peachtree St NE #300, Atlanta, GA, USA

Troy Leach
Security Executive in Residence
Cloud Security Alliance
David Pollino
Former CISO
PNC Bank
Ari Redbord
Head of Legal and Government Affairs
TRM Labs
John Kindervag
Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow
ON2IT Cybersecurity
Lisa Sotto
Partner
Hunton Andrews Kurth LLP
Jeremy Grant
Managing Director, Technology Business Strategy
Venable LLP
Grant Schneider
Senior Director for Cybersecurity services ( Former U.S. federal CISO)
Venable LLP

Tom Field
SVP of Editorial
ISMG
Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world,...
Jay Schiavo
Vice President of Products, Certificate Solutions
Entrust
Schiavo is the vice president of products for the Entrust Certificate Solutions product segment. He and his team shape the future vision and strategy, making it easy for customers to consume the solutions across the Entrust SSL, PKI, and Digital...
David Nolan
Chief Information Security Officer
Aaron's
As the Chief Information Security Officer at Aaron’s; David is accountable for information security and risk leadership, strategy, budget, and operational excellence for the Aaron’s and BrandsMart USA businesses. He is a servant-leader and mentor to a robust team of...
Erich Kron
Security Awareness Advocate
KnowBe4
Kron is a security awareness advocate at KnowBe4 and a veteran information security professional with over 25 years of experience in the medical, aerospace manufacturing and defense fields. Kron is the former security manager for the U.S. Army's 2nd Regional...
Stoddard Manikin
CISO
Children's Healthcare of Atlanta
Roger Brassard
Sr. Product Manager
Carbonite and Webroot, OpenText Security Solutions
Brassard is a 22-year veteran product manager who specializes in capturing customer and partner concerns, staying abreast of industry trends, including regulatory changes, and translating that information into cross-functional development teams to solve the cybersecurity business problems of today and...
Kory Daniels
CISO
Trustwave
As the CISO at Trustwave, Daniels is accountable for ensuring the security of the organization and its clients, partners and stakeholders by leveraging Trustwave's own cybersecurity platforms. He is an innovator and leader in cyberthreat detection program transformation. Over the...
Robert Glore
Technical Staff Assistant
U.S. Secret Service
Jimmy Lummis
Senior GRC Specialist
Children's Healthcare of Atlanta
Joshua Reed
Network Intrusion Forensic Analyst
U.S. Secret Service
Josh Reed has over 15 years law enforcement experience and began working with the USSS in 2013. He is a certified computer, mobile device, skimming device examiner, and holds several professional certifications. He has instructed at the National Computer Forensic...
Anna Delaney
Director, ISMG Productions
ISMG
Felicia Hedgebeth
CISO
Georgia Department of Banking and Finance
With over 28 years in both Information Security and Information Technology, Felicia can bridge the gap between security and IT to meet business goals and objectives of my organization. In her current role as Chief Information Security Officer, for the...
Bill Wyatt
Chief Information Security Officer & CIO
State of Georgia Office of the State Treasurer
James DeLuccia
Product Security Chief
Honeywell
James leads the security market strategy for global products across Honeywell on Azure and Amazon. In combination with this role, James is responsible for leading, generating, and commercializing cybersecurity market benefits and independent offerings. Author of two books, the most...
Corey Elinburg
Sr. VP and CISO
CommonSpirit Health
Corey Elinburg is a System SVP and Chief Information Security Officer for CommonSpirit Health, the largest nonprofit health system in the United States serving more than 1,000 care sites in 21 states. Corey joined CommonSpirit in September 2020 as a...
Ray Griffin
CISO
Cox Media Group
Ray has more than 20 years of information technology and security leadership experience with a demonstrable track record of successfully leading complex cybersecurity programs for global companies. Ray is currently the CISO at Cox media group where he is responsible...
Jim Salmonson
Technical Solutions Architect
Cisco Systems
Salmonson is a technical solutions architect at Cisco Systems, with over 25 years of experience in information security. His contributions have allowed him to grow with Fortune 500 organizations, education, state and local governments and the federal government. He previously...
Monique Hart
CISO
Piedmont Healthcare
Michael Owens
BISO
Equifax
Ben Murphy
SVP, Head of Cyber Operations
Truist
Ben Murphy leads the Corporate Cyber Security Cyber Operations & Engineering team. His organization incudes nine teams that focus on Infrastructure Protection and Security Threat Monitoring and Response. Ben’s group is responsible for the operations of two cyber fusion centers...
Stanton Gatewood
Cyber Security Coordinator/Advisor
US DHS/CISA
Mr. Gatewood is the US DHS/CISA -R4 Cyber Security Coordinator for the State of Georgia. He is a Distiguished Fellow at the Ponemon Institute. Gatewood is the former Chief Information Security Officer for the State of Georgia, Board of Regents...
Michael Novinson
Managing Ediitor
ISMG
Phyllis Woodruff
VP, IT Risk & Compliance
Global Payments
Phyllis Woodruff has more than 25 years management experience and a strong track record of building resilient and nimble teams. Her domain has been financial services with a focus on security, risk and compliance. Her last two years have been...
Kenneth Foster
VP of IT Governance, Risk and Compliance
Fleetcor
Ken is currently VP of IT Governance, Risk, and Compliance at Fleetcor with more than 20 years of experience in the field focusing on platform architecture and security. I previously held the positions as Head of Global Cyber Risk Governance...
David Levine
Vice President Corporate & Information Security & CSO
Ricoh, USA
David Levine is Vice President of Information Security and CISO for Ricoh USA, Inc. In this role, he has responsibility for operational security, security policy, access management, eDiscovery and litigation support and HIPAA compliance. Levine chairs Ricoh’s Security Advisory Councils,...
Kevin Gowen
CISO
Synovus Financial Corp.
Kevin Gowen serves as Chief Information Security Officer for Synovus and is responsible for information and cyber security, physical security, business continuity, fraud, and financial crimes. He was named Chief Information Security Officer in 2015. Gowen earned Bachelor’s and Master’s...
Amelia Paro
Director Of Channel Development
ID Agent
Paro leads Kaseya's channel team, working with MSPs and channel partners around the globe. She is an experienced sales professional with over 10 years of experience in the technology industry in B2B and B2C environments. Her past sales experience includes...
Zachary Bulliner
Senior Special Agent
U.S. Secret Service
Bob Varnadoe
CISO
NCR Corporation
Bob Varnadoe is Chief Information Security Officer for NCR Corporation. His duties include overall information security and operational/IT aspects of NCR’s privacy program, IT risk management, and compliance company-wide, training and awareness for information security, and oversight of the deployment...
Tim Frazier
Sales Engineer
Anvilogic
Frazier has been in the cyber game for over 15 years as a consultant, practitioner, content builder, vendor and conference speaker. He has been an IT/cyber jack of all trades, from writing risk management frameworks to running projects for implementing...
Matt Mintzer
Solutions Engineer
Snyk

View Agenda
How to Keep Your Security Programs Proactive in an Ever-Evolving Threat Landscape
David Levine, Vice President Corporate & Information Security & CSO, Ricoh, USA
Phyllis Woodruff, VP, IT Risk & Compliance, Global Payments
Ben Murphy, SVP, Head of Cyber Operations, Truist

Cybersecurity strategies are shifting from a reactive stance to proactive approach. This change gives organizations the ability to be more agile with their security program. In this keynote session, our panel of industry experts will share their experience and insights on:

  • Is it possible to be prepared for the unknown cyber threat?
  • Team retention and talent acquisitions, including strategies for different generations
  • Promoting and driving a security and risk-aware culture
  • Current threat landscape’s most prevalent features-Cloud Security/Attacks, Human Error, Evil Proxy
David Levine
Phyllis Woodruff
Ben Murphy
  • 09:10 AM
  • 09:39 AM
  • 09:45 AM
  • 10:14 AM
Track A
Corey Elinburg
Ray Griffin
Michael Owens
Ben Murphy
Track A: Strategies to Mitigate Risk and Exposure During Your Merger or Acquisition
Corey Elinburg, Sr. VP and CISO, CommonSpirit Health
Ray Griffin, CISO, Cox Media Group
Michael Owens, BISO, Equifax
Ben Murphy, SVP, Head of Cyber Operations, Truist

2021 M&A transactions were up 55% in in the U.S. over 2020. And 2022 is on pace to be even bigger. This wave of post-Covid M&A demands that cyber security leaders improve their efficacy. Panelists for this session are seasoned practitioners who are eager to share their experiences from the initial phase during due diligence through day-one integration of the M&A cycle: 

  • Ensure that a subsidiary cannot expose the parent company to cyber risks through the M&A process
  • Be a player and practice due diligence in the M&A process from start to integration
  • Leverage integrated risk assessments and automated smart questionnaires to gain a real-time snapshot into what a company’s cyber risk posture and overall GRC looks like
  • 09:45 AM
  • 10:14 AM
Track B
Kenneth Foster
James DeLuccia
David Levine
Kevin Gowen
Track B: Third-Party Selection and Management: What You Need to Know and Do Before and After You Sign
Kenneth Foster, VP of IT Governance, Risk and Compliance, Fleetcor
James DeLuccia, Product Security Chief, Honeywell
David Levine, Vice President Corporate & Information Security & CSO, Ricoh, USA
Kevin Gowen, CISO, Synovus Financial Corp.

The need for third-party risk management has never been greater. Even though the risks to your company, customers and partners can be substantial, the processes, methods, and mediums used today are frequently flawed and even potentially misleading. In this panel discussion we dive into:

  • What does the current TPRM risk landscape look like today?
  • What’s working and not working in TPRM?
  • What are the risks and mitigation strategies?
  • Best practices and recommendations for an effective program and what’s needed in the future
  • 10:20 AM
  • 10:49 AM
Track A
Jim Salmonson
Track A: Starting Your Journey to Zero Trust: "Who's Knocking at the Front Door"
Jim Salmonson, Technical Solutions Architect, Cisco Systems

As your organization defines what a zero trust architecture might look like, have you taken initial steps to align it with a mature security model? A zero trust strategy can reduce risk - it's more than just a check mark to meet cyber insurance requirements. Even smaller advancements with identity and device posturing can help to reduce risk. Let’s be sure to ask, "Who's knocking at your front door?" before we let them in.

  • 10:20 AM
  • 10:49 AM
Track B
Erich Kron
Track B: Your Ransomware Hostage Rescue Guide
Erich Kron, Security Awareness Advocate, KnowBe4

As ransomware attacks become increasingly targeted and damaging, infected businesses run the risk of having their data held hostage and their network operations disrupted for days or weeks. The danger has never been more real. Organizations must understand the core fundamentals of ransomware prevention, response, rescue and recovery. This session will explore some of the latest features of ransomware strains and review key takeaways, including proven methods of attack prevention and mitigation.

  • 10:55 AM
  • 11:09 AM
Track A
Roger Brassard
Track A: How to Become Cyber Resilient in Today’s Business World
Roger Brassard, Sr. Product Manager, Carbonite and Webroot, OpenText Security Solutions

OpenText Security Solutions delivers a complete cyber resilience framework, encompassing data security and management. Modeled on NIST, our services prevent and protect, detect and respond, restore and recover data, as well as adapt and comply with compliance needs. Learn how Webroot Email Threat Protection keeps organizations safe from email-borne threats and Email Continuity keeps business email accessible - your first two steps toward cyber resilience.

  • 10:55 AM
  • 11:09 AM
Track B
Amelia Paro
Track B: Graphus: From Phishing Attack Overload to IT Team Relief
Amelia Paro, Director Of Channel Development, ID Agent

Phishing is one the most dangerous cybersecurity threats, causing businesses to lose money, reputation and peace of mind. Legacy email security solutions such as Secure Email Gateways, or SEGs, consistently fail to prevent advanced cyberthreats. In this session, learn how AI-powered email security by Graphus works, why it is far superior to conventional security and how it detects and rapidly eliminates the most sophisticated phishing attacks, including zero-day attacks, business email compromise or BEC, account takeover or ATO, credential theft and ransomware. As these attacks grow more sophisticated, not even Google Workspace or Microsoft 365 native security can filter them out, but the Graphus AI can.

Exhibits & Networking Break

Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!

  • 11:10 AM
  • 11:29 AM
  • 11:30 AM
  • 11:59 AM
Track A
David Levine
David Nolan
Michael Owens
Kevin Gowen
Track A: Why Strong Partnerships with Executive Leadership Are Essential for Good Data Governance
David Levine, Vice President Corporate & Information Security & CSO, Ricoh, USA
David Nolan, Chief Information Security Officer, Aaron's
Michael Owens, BISO, Equifax
Kevin Gowen, CISO, Synovus Financial Corp.

A recent nationwide survey 23% of CISOs report to the CEO, while nearly 45% reported into a CIO. With Data Governance ultimately being about people, processes, and technology--the foundation for data governance—are “musts.” In this session, you will hear from practitioners who have actuated strong partnerships with executives. They will share:  

  • Tried and true approaches for getting buy-in and clear ownership 
  • Strategies for breaking down data silos
  • Approaches to find the right balance between flexibility and data governance standards
  • 11:30 AM
  • 11:59 AM
Track B
Robert Glore
Zachary Bulliner
Joshua Reed
Track B: U.S Secret Service on Business Email Compromise and Cyber-Enabled Fraud
Robert Glore, Technical Staff Assistant, U.S. Secret Service
Zachary Bulliner, Senior Special Agent, U.S. Secret Service
Joshua Reed, Network Intrusion Forensic Analyst, U.S. Secret Service

Business Email Compromise (BEC) and related email account compromise scams resulted in nearly $2.4 billion in reported losses from victims in 2021, the most of any category disclosed to the FBI’s Internet Crime Complaint Center (IC3.) In this presentation and fireside chat, Our panelists will outline the anatomy of a BEC scheme, share insights into criminals' methods - and why they're working, and provide techniques to prevent these crimes.

Join the U.S. Secret Service to learn about;

  • The reality of BEC scams today - and how the criminals are succeeding;
  • Best practices to prevent BEC scams;
  • Ways to report cyber-enabled financial fraud cybercrimes.
Key Considerations in Securing an Evolving Threat Landscape
Jay Schiavo, Vice President of Products, Certificate Solutions, Entrust

The digital landscape continues to evolve and become more complex, and with the rapid growth in identities - from human identities to machine identities, the attack surface is expanding. With the added complexity of changing regulations and the looming threat of post-quantum, organizations need to gain visibility into their IT and OT environments and ensure they're future-proof. Join Entrust for this session where we will discuss some of the key trends in the digital security landscape and share some best practices and considerations to help ensure your connected ecosystems stay secure.

Jay Schiavo
  • 12:05 PM
  • 12:34 PM
Lunch & Networking Break
  • 12:35 PM
  • 01:19 PM
Cloud Native Application Security: Embracing Developer-First Security for the Cloud Era
Matt Mintzer, Solutions Engineer, Snyk

Join Matt Mitzner, solutions engineer at Snyk, to learn how Snyk's AppSec and CloudSec platform allows developers to not only build securely but also build at a pace that allows them to stay competitive. This Tech Talk will share how Snyk is differentiated in the market and why our platform is not only trusted by security teams but also loved by developers because it allows security to scale and developers to move faster.

Matt Mintzer
  • 01:40 PM
  • 01:54 PM
Don’t Get Caught in a Compromising Position: Defend & Detect Across Your Threat Landscape
Tim Frazier, Sales Engineer, Anvilogic

Threat detection is at the heart of building foundational security to shift with the evolving threat landscape. In this session, we will demonstrate how to build behavioral attack-pattern scenarios correlating detection use cases across different data domains, which helps to keep up with your threat landscape. You will learn how to easily start to build and implement sequence-based detections in your environment. The right methods, frameworks and detections are fundamental to understanding your threat landscape and comprehending the correct path. We will show you how to cover the steps to defend against various compromises that have been identified across numerous industries.

Tim Frazier
  • 02:00 PM
  • 02:29 PM
Building Digital Trust – a CISO Perspective
Kory Daniels, CISO, Trustwave

In an era of data proliferation, supply chain convergence, and an expanding attack surface, how are CISOs responding?  Hear from Kory Daniels, CISO at leading managed cybersecurity provider Trustwave, on how leading enterprises are adapting their approaches to build digital trust and resilience both inside and outside the business. 

Kory Daniels
  • 02:35 PM
  • 03:04 PM
Exhibits & Networking Break

Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!

  • 03:05 PM
  • 03:24 PM
Incident Response: Are You Prepared for Your Organization's Worst Day?
Stoddard Manikin, CISO, Children's Healthcare of Atlanta
Monique Hart, CISO, Piedmont Healthcare
Bob Varnadoe , CISO, NCR Corporation
Jimmy Lummis, Senior GRC Specialist, Children's Healthcare of Atlanta

It's not a matter of "if" the next cyberattack will strike--it's a matter of "when.” The extent of your preparedness is one of the biggest factors determining what that day (and beyond) is going to be like for you and your organization.
When that day arrives, it’s too late to ask: Who have I prepared? How did I prepared them? What tools do I have at-the-ready? This panel of Industry experts will lend their experiences and lessons learned to unpack those questions as well as navigate us through the following:

  • What threats are most likely to cause the biggest disruption?
  • What are you doing now to protect your environment - and where are your biggest gaps?
  • How can we leverage all of the security controls in our environment for an effective, layered defense?
Stoddard Manikin
Monique Hart
Bob Varnadoe
Jimmy Lummis
  • 03:25 PM
  • 03:54 PM
Clouded Judgment: Why Security & Cloud Are Aligned
Phyllis Woodruff, VP, IT Risk & Compliance, Global Payments
Kenneth Foster, VP of IT Governance, Risk and Compliance, Fleetcor
Stanton Gatewood, Cyber Security Coordinator/Advisor, US DHS/CISA

The perceived conflict between profitability and speed to market versus security is rife in our organizations. Understanding this is important, and combating it is crucial. Cyber security leaders guide and influence the discussion, and thereby mindset, as both are indispensable to business goals. Making cloud secure is our best path forward. What are the necessary building blocks, and how can you create and promote a secure cloud strategy?

  • Discuss key points to win converts to a security mindset
  • Deal with M&As that have existing cloud environments
  • Retool teams and install effective guard rails
  • What role can compliance play?
Phyllis Woodruff
Kenneth Foster
Stanton Gatewood
  • 04:00 PM
  • 04:29 PM
Cocktail Reception
  • 04:35 PM
  • 05:34 PM
Day 2 Agenda

All content from Day 1 will be available on demand from 9 AM - 5 PM EST on Day 2, Wednesday, October 12th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.

  • 09:00 AM
  • 05:29 PM

Speaker Interviews

October 11 - 12, 2022

Southeast US Summit