AGENDA
SECURE MIAMI AGENDA 2023 / register today!

Join Nicole Eagan, Chief AI and Strategy Officer for Darktrace, to cut through the Generative AI hype. Nicole will break down how applying the right type of AI to the right security challenge can transform the workflow of your security team and help you stay ahead of a rapidly evolving threat landscape. Nicole will also provide actionable advice for fostering a productive and trusted relationship between your security team and AI so that you can use it responsibly and effectively to protect your business.

To increase security readiness given today’s dynamic attack surfaces and diverse cyber threats, security professionals need to move away from traditional vulnerability-centric methods to a new approach that identifies exploitable security exposures in their live IT environments.
Gartner describes Exposure Management (EM) as a new framework that incorporates the adversary's view to continuously uncover exploitable security gaps, and prioritize remediation accordingly. One of the pillars of EM is security validation, which provides evidence of attackers’ possible achievements in the context of an organization’s deployed assets, configurations, and security controls.

Moderator: Angela Polania / Principal at Elevate
Panelists:
![]()
|
Chris Hatter / Chief Information Security Officer at Qwiet AI |
![]()
|
Gary Hutchins / Senior Sales Engineer at Sysdig |
![]() |
Matt Shea / Chief Strategy Officer at MixMode |
![]() |
Robert Grillo / Vice President & Chief Information Officer at Florida International University |

Moderator: Vitra A. Gopee / Chief Operations Officer at DigitalEra Group
Panelists:
![]()
|
Carlos Buenano / Principal Solutions Architect at Armis |
![]()
|
Cristian Rodriguez / Field Chief Technology Officer of the Americas at Crowdstrike |
![]()
|
Justin Scarpaci / Technical Strategist at Sevco |
![]()
|
Nathan Wenzler / Chief Security Strategist at Tenable |


Moderator: Ignacio "Iggy" Alvarez / Founder & Managing Partner at Algo Law Firm
Panelists:
![]()
|
Alex Babar / Director Product Marketing at Brinqa |
![]()
|
Alan Thatcher / Senior Manager Field Architect at Lacework |
![]()
|
Chris Usserman / Director of Security Architecture at Infoblox |
![]()
|
Ron Nixon / Field CISO at Cohesity |

Moderator: Joe Toste / Host of the Public Sector Show by TechTables
Panelists:
![]()
|
Andrew Phillips / Senior Director of Engineering at ShareFile |
![]()
|
Helvetiella Longoria / Chief Information Security Officer at Florida International University |
![]()
|
Julie O'Brien / Chief Marketing Officer at Dazz |
![]()
|
Michelle Jackman / Cloud Security Leader at Palo Alto Networks |

Who should be involved in risk assessment from the Imperial High Command? How can we recruit others for the cybersecurity cause? Why is the language of cybersecurity the preparation needed for emerging cyber risks and threats?
In this session, you’ll see the mistakes Darth Vader and others made, so you don’t suffer the same fate.


Cyber-attacks generally reflect geo-political conditions and economic realities. This is especially true in the public sector. 2022 was a year of both conflict and macro- economic pressures that fostered innovation and evolution of cyber attacks.
During this keynote, Kevin Mandia will discuss what we've witnessed on the front lines, responding to hundreds of cyber intrusions in 2022, and how those insights can help defenders better prepare for 2023. He will share the TTPS of the attackers as well as the trends in cyber defense so public defenders can make more informed decisions.

Moderator: Luis Ortega / Vice President at Allied Universal Risk Advisory and Consulting Services
Panelists:
![]()
|
Chris Brown / Senior Network Security Instructor & Cyber SME at Corelight |
![]()
|
Lawrence Embil / Cybersecurity Manager at Miami Dade County |
![]()
|
Morgan Wright / Chief Security Advisor at SentinelOne |
![]()
|
Paul Martini / Chief Executive Officer at iboss |

Attendees will learn:
- GPS vs Google Maps - Why cybersecurity must evolve and it will regardless of who is on board
- How to and why you should move away from a “haystack” defense strategy (SIEMs, EDRs, etc.)
- How to use the network as the source of truth
"In a dark place we find ourselves, and a little more knowledge lights our way." - Master Yoda
