March 4-5, 2019
Bell Harbor International Conference Center | Seattle, WA


May 21, 2019
Yum! Brands Center of Restaurant Excellence | Plano, TX

Education Tracks

The following tracks are used to guide the curriculum in every conversation. A conversation could be a large two-day forum or an afternoon round table. Subjects could include current industry issues or trends, vertical sector issues or trends, or an innovation working group to create a breakthrough in organizational or industry thinking. 

Leadership: Strategy, Innovation, and Change

  • Discover the innovations that change the value proposition to your business
  • Engage your emerging leaders in the business and help prepare them for the future of risk and security
  • Create a roadmap to help drive employee engagement, empowerment, and your program performance

Organizational Strength

  • Discover strategies for leadership and organization change that influence how your program is perceived by the business
  • Learn how to optimize the people performing roles and executing processes
  • Hear how others are embedding the security and risk goals into the larger organizational mission

Enterprise Security Risk Management

  • Learn who owns the risk within your organization
  • Align your team and programs with successful risk and resilience strategies
  • Be a part of the discussion around the convergence of cyber and physical security


  • Learn how to address the risks leading to enterprise longevity and stakeholder confidence
  • Explore how to assess your cyber situation and correct any deficiencies
  • Understand, define and be prepared for the risk and the actions needed to address that risk before the incident


  • Align your business against a scorecard for technology
  • Hear how to scale, maintain, and create reliable solutions for your organization
  • See the latest in current and emerging technology and hear how it is being applied across multiple markets

A forum of strategic leadership and innovative conversations.
This is where theory and practice converge.

We invite you to a powerful education forum focused on both the challenges and opportunities organizations face in risk, resilience, and the business value of security.

Leaders and their teams discuss the newest and most important strategies driving our industry. And hear how those strategies are executed by how they organize their people, processes, and technology against a program road-map. 

The Great Conversation (TGC) is designed to inform, engage, and ultimately provide attendees with the tools needed to take risk, resilience, and security programs to the next level. 

Of all attendees surveyed:


consider TGC content exceptional


Launch or advance a program initiative based on TGC content


Recommend TGC to their colleagues & peers 


“I am honored to be a part of this ground-breaking

and thought-provoking conversation. It sets the stage

for others to follow.”

-Mike Howard, Former Chief Security Officer, Microsoft Corporation 


Explore a sample of past sessions

The Business Value of an Enterprise Risk and Security Management Strategy
John Turey, Vice President of Enterprise Risk and Security Management, TE Connectivity
The Great Conversation opens with a thought leader and practitioner in security risk management. You will learn how business executives (CEO, COO, CFO, CTO) are thinking about enterprise risks and what you can do to enhance your role as a strategic enterprise business partner. Walk away with a high-level framework in which you can leverage then engage the “enterprise owners of risk” in your organization.

Why Technology Will Change the Way You Do Security
Dr. Thomas Cellucci, Founder & CEO, Cellucci Associates, Inc.
We have discussed how people perform roles in a process and how important the culture is to the overall program’s success. Now we will learn how to use technology to redefine the new security functions and the evolving value it accelerates in the organization. Once you have technology expertise embedded in the security risk assessment and business optimization efforts it can fundamentally change the strategy and planning. Robotics can replace human security officers.  Drones can be utilized for site surveillance. Artificial Intelligence can be used to access activity, monitoring activism & social media activities for potential brand and reputation issues, as well as threats that could lead to workplace violence or active shooter incidents.  Learn how the technology will change how you approach your risk programs.

Managing the ‘Insider’ Threat
Michael Gelles, Managing Director, Deloitte Consulting, LLP
You think you have the risk, strategy and program identified; you believe you have an effective security technology solutions architecture in place; and then you find that you have not fully realized the insider threat to your enterprise. You also are once again building a guiding coalition between human resources, legal, IT and security to create a proactive and measurable strategy for success.

Risk Planning and Resilience: What We Can Learn From the X-Event
Kristina Anderson, Executive Director and Founder, Koshka Foundation for Safe Schools
The Great Conversation continues with a riveting story from the eyes of a victim then quickly moves into a breakdown of the lessons learned around all-hazards risk, resilience and security. Every security executive knows there are powerful forces that keep us from doing the right thing the first time until the wrong thing happens to us.

Strategic Leadership: A Journey
Mike Howard, Chief Security Officer, Microsoft
Microsoft CSO Mike Howard shared his career path and lessons learned along the way. He discussed the value of mentorship and explained how mentors at the Oakland Police Department and the CIA influenced his own career. He shared examples of leadership and change management and his own insights on leadership.

The Evolution of Security: Leadership, Innovation, and a Changing Workforce
Michael Mason, SVP, Chief Security Officer, Verizon Communications
In the private-sector security community, we often focus on technological advances intended to make us more effective at executing the duties associated with our roles as security leaders. We focus on information gathering until we reach the point where we are deleting more information each day than we are digesting. However, our business is still a people-oriented business. This presentation focused on the manner each of us, as private-sector security leaders, impacts today’s security workforce, as well as challenging the too often accepted conventional wisdom about the young men and women who comprise that workforce.

Security in An Age of Technological Disruption
Kimo Quaintance, George C. Marshall European Center for Security Studies, Thought Leader

Traditional planning cycles that served the needs of stable hierarchies are being thrown into chaos by dynamic networks that possess the advantage of rapid adaptation and innovation. Democratizing technology and pervasive connectivity are driving a great diffusion of power that sees no signs of slowing. How can security organizations adapt to such an unpredictable environment, when we are expected to not only survive such continual disruptions, but thrive and create new sources of value?


Why should you attend TGC?

Hear from industry leaders:


Join the conversation

Follow us on Twitter or LinkedIn to hear from thought leaders and keep up to date with the newest updates. Join the conversation and connect with other attendees using #2019GreatConversation