ElevateIT: DFW Technology Summit 2022

Irving Convention Center
May 26, 2022
500 Las Colinas Blvd W Irving, TX 75039

Optimizing Intelligent Change for the Future

How do I help my company keep and grow market base within this most disruptive chaotic time in history? Can I capitalize on the disruption to create a competitive advantage? How do I create value while maintaining digital trust? Once you have created a flexible strategic business model both on paper and in practice that answers these 3 questions, you will be in prime position for 2022 and beyond.

Managing change intelligently includes weaving in three main strategic attributes: Tightly integrated, comprehensive and intelligently automated. 
The profitable digital marketplace requires transactional immediacy and transactional immediacy requires digitizing and securing data, applications and workflows both at rest and in process.
 
Today without question, data protection and process security (cybersecurity) are the top strategic components of governance and innovation, bumping it up to first position with governance impact. Adding digital cybersecurity for accuracy and speed can be key to adding value and trust. And “trust” is THE  key characteristic to grow customers for 2022.
The second position, and just as important is a positive customer experience which also includes “a reputation KPI” that is intuitively based on behavioral analytics that is easy to use with a very personal “touch.” Although the vast number of customers are digital natives and enjoy the push button experience, they also expect it to be proactively personal, familiar, and private.

The go-to companies for 2022 must have a positive reputation which includes customer data protection, quality products and services and proactive, consistent and on-time delivery. The way forward is the hyper intelligent digital marketplace. Are you making the right decisions for a marketplace edge for 2022 and beyond? Join us for these discussions and ElevateIT’s  promise for delivering valuable and impactful and timely content.

See Our 2021 Technology Summit Below

2021 Keynote Cybersecurity Panel






Panelists


Aaron Baillio
CISO, University of Oklahoma

Mustapha Kebbeh
CISO, Brinks, Inc.

Robert Pace
CISO, Invitation Homes

Sailija Kotra-Turner
CISO, Brown Forman

Title: The Future Metrics and ROI for Cybersecurity

Tech Theater I | 8am - 9am


Dr. Chase Cunningham
CISO, Ericom Software
Moderator
Digital transformation, ransom cyber-attacks, and agile development projects are demanding an enormous investment from the business. CISOs and their teams must adopt a broader skill set to continue to meet the business’s demands. It is harder to hire cybersecurity talent today than it was 3 to 4 years ago.

“By 2023, 30% of chief information security officers’ (CISOs’) effectiveness will be directly measured on the role’s ability to create value for the business.”- Gartner

  1. Designing a new dimension and the characteristics necessary for a CISO and Security Professional in the future. 
  2. Digitization requires a broader and diverse skill set. How are you meeting these demands?
  3. Developing requirements for adopting a “Lean” approach. What are its advantages and disadvantages?
  4. Can security be agile and adaptive everywhere embracing immediate opportunities?
  5. What sophisticated methodologies like Internet of Behavior (IoB) devices and solutions, blockchain and facial recognition have you implemented or are you considering?
  6. Thoughts on adopting Distributed Cloud, AI engineering and cybersecurity meshes.
  7. How are you meeting the need for cybersecurity balance? How confident are you?  What still needs to be done?







THE ElevateIT
ADVANTAGE


ElevateIT inspires and empowers idea creation through a disruptive transformational culture by attracting the finest speakers and vendors imparting solid strategies able to quickly be implemented within Enterprises and Start-Ups alike.

We strive to bring together the ever-changing multi-facets of the Technology Industry in a fun, safe and informative atmosphere and feel fortunate to have good friends, good partners and a priceless reputation with our industry community. See what we mean for yourself by watching our summit videos.



Gold Sponsors



Every second, another 127 devices connect to the Internet. That’s 328 million “things” per month. By 2025, we’ll see 75 billion IoT devices. Our objective is to give our customers peace of mind in knowing that they can effectively manage and secure this explosive growth of unmanaged devices in their environment. We’re focused on making connected device security simple through our zero .... touch agentless deployment, one common platform for multiple stakeholders, and automation of policies to secure devices. With Ordr, you will know exactly what’s connected to the network, in real time, all the time. You will know know what’s vulnerable, what’s behaving maliciously and why. You can then automate response for any connected device, and enforce on any networking and security infrastructure. We make the complex problem of securing every connected devices simple — from traditional IT devices to newer and more vulnerable IoT, IoMT or OT.
iboss is a cloud security company that provides organizations and their employees fast and secure access to the Internet on any device, from any location, in the cloud. The iboss SASE cloud platform provides network security as a service, delivered in the cloud, as a complete SaaS offering. This eliminates the need for traditional network security appliances, such as firewalls and web gateway pr .... oxies, which are ineffective at protecting a cloud-first and mobile world. Leveraging a purpose-built cloud architecture backed by 230+ issued and pending patents and more than 100 points of presence globally, iboss processes over 100 billion transactions daily, blocking nearly 4 billion malware threats per day. More than 4,000 global enterprises trust the iboss SASE cloud platform to support their workforce, including a large number of Fortune 50 companies. To learn more, visit https://www.iboss.com/.
Malwarebytes secures endpoints, making workplaces resilient. Our adaptive cyber protection predicts and detects attacks with multi-layer detection across the kill chain. We enable active threat response with machine learning that is actionable and automated, allowing for full recovery when a compromise occurs. We empower enterprise endpoint orchestration across siloed IT and Security organizations .... , simplifying security management and making responses effective. Malwarebytes makes endpoints resilient so workplaces can protect and remediate, and employees can regain control of their digital lives.


Lunch & Learn Sponsors



Since 1996, Extreme has been pushing the boundaries of networking technology, driven by a vision of making it simpler and faster as well as more agile and secure. But our higher purpose has always been helping our customers connect beyond the network… strengthening their relationships with those they serve. Today, we call that Customer-Driven Networking.
KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. With KACE, you can effectively address your endpoint management needs with individual products for specific tasks or as an integrated .... UEM solution.


Breakfast Sponsors



At Datto, we believe there is no limit to what small and medium businesses can achieve with the right technology. As the world’s leading provider of cloud-based software and security solutions purpose-built for delivery by managed service providers (MSPs), Datto's proven Unified Continuity, Networking, and Business Management solutions drive cyber resilience, efficiency, and growth for MSPs. Del .... ivered via an integrated platform, Datto's solutions help its global ecosystem of MSP partners serve over one million businesses around the world. From proactive dynamic detection and prevention to fast, flexible recovery from cyber incidents, Datto’s solutions defend against costly downtime and data loss in servers, virtual machines, cloud applications, or anywhere data resides. Datto has won awards for its rapid growth, product excellence, superior technical support, and fostering an outstanding workplace.
Data Magic Computer Services, at its core, is a family business that values technology and smart, effective solutions. Cliff Jones and Shane Kimbrel started a computer networking company in Texas in 1994, with Jones offering technical expertise and Kimbrel using his business education to handle the sales and marketing side of things. As technology has evolved a great deal over the years, our fa .... mily values and work ethic have stayed the same. Our goal is to cover absolutely all of your IT needs with one easy, positive experience. We offer a wide range of knowledge and expertise to remove the obstacles that hold you back and provide innovative, unique solutions designed to improve the way you work. Our team is made up of an amazing group of individuals who understand and appreciate excellent customer services, with years of experience in technology and business operation.


Breakout Presentation Sponsors



As the world’s most experienced provider of backup and disaster recovery solutions, for 35 years we’ve been solving the challenges of IT teams by bringing innovation, ambition, and countless hours of iteration to the solutions they rely on to keep businesses running smoothly. In the process, we’ve redefined the way companies protect their data – the very foundation of modern business in an .... era where immediate access to critical systems and applications is key to business continuity and essential to continuing growth and success.
Bitglass delivers data and threat protection for any interaction, on any device, anywhere. Operating at cloud scale across a global network of over 200 points of presence, Bitglass delivers unrivaled performance and uptime to ensure secure business continuity for the largest organizations. Bitglass was founded in 2013 by a team of industry veterans with a proven track record of innovation and .... execution.
Armor is a cloud security company that takes the complexity out of protecting your data, whether it resides in a private, public, or hybrid cloud—or in an on-premise IT environment. We provide managed security solutions that give you a clear picture of threats facing your organization and are designed with PCI, HIPAA, and GDPR compliance in mind.
Security. Trust. Innovation. The Internet of Things represents the next great wave in business transformation. Today, BlackBerry already secures more than 500M endpoints including 175M cars on the road. Through independent research, Frost & Sullivan determined that BlackBerry is well-positioned to secure all IoT endpoints, and upwards of 96% of all cyberthreats in the current landscape (read .... the Frost & Sullivan Assessment). BlackBerry is leading the way with a single platform for securing, managing, and optimizing how intelligent endpoints are deployed in the enterprise, enabling our customers to stay ahead of the technology curve that will reshape every industry.
Imperva is a cybersecurity leader with a mission to protect data and all paths to it. We protect the data of over 6,000 global customers from cyber attacks through all stages of their digital transformation. Our products are informed by the Imperva Research Lab, a global threat intelligence community, that feeds the latest security and compliance expertise into our solutions.
We believe that Penetration Testing (PT), as it stands today, is obsolete. Software and algorithms can do a better job at penetration testing and help businesses continually assess and improve their cyber risks using the threat-oriented approach. Pcysys (an acronym for “Proactive Cyber Systems”) was founded by Arik Liberzon who understood that enterprises do not have an effective means of k .... nowing the true cyber risk that they carry, and have no way of understanding which vulnerabilities have the highest negative business impact potential. Arik modeled his mastership of ethical hacking techniques into software and together with the serial IT entrepreneur, Arik Faingold, founded Pcysys. Soon thereafter, Mr. Liberzon was joined by a group of Israel’s elite cyber researchers and cyber warfare experts, who share the passion of giving organizations the upper hand in their struggle to fence off cyber attacks. Our mission is to develop an automated cyber risk validation platform that would enable them to defend against the best of the worst-intended hackers.
Veeam® is the leader in backup solutions that deliver Cloud Data Management™. Veeam provides a single platform for modernizing backup, accelerating hybrid cloud and securing your data. Our solutions are simple to install and run, flexible enough to fit into any environment and always reliable. When founded in 2006, we focused on simplifying backups for virtual machines. We quickly becam .... e a leader in backup with the fastest and most reliable data recovery in virtual environments. We make sure data is always available, protected and actively working for businesses across the globe. This means, regardless of where your data resides – physical systems, SaaS services, public cloud, private cloud, hybrid cloud, or multi-cloud – our platform helps hundreds of thousands of companies keep their businesses running. We continue to charge forward to innovate the industry and deliver simple, flexible and reliable solutions to our 400,000+ customers. Veeam Cloud Data Management Platform is the most complete solution to help our customers evolve the way they manage data, making it smarter and more self-governing while ensuring its availability across any application or cloud infrastructure. It's a single platform for cloud, virtual and physical to meet all your needs. It helps customers on the journey to modernizing their Backup practice, accelerating hybrid cloud, and adhering to data security standards and regulations.

Silver Sponsors



Area 1 is rooted in our founders’ experience in national security — including gaining advanced insight into potential missile strikes to preempt those attacks before launch. In other words — preempting attacks while in enemy territory. This proactive approach, when applied to cybersecurity, shifts the email security industry paradigm. You can no longer afford to get Phished first, then .... respond after. Area 1’s enhanced detection models go into the wild to preemptively detect and thwart sophisticated attacks like Business Email Compromise, malware, credential harvesting, and other financial fraud that evade email gateways (SEGs) and cloud email suites.



Event Agenda













Intelligent Automation Panel
Hyperautomation with AI/ML Toward and Intelligent Composable Business



Jeff Loyd
AVP Cloud Strategy & Architecture
GM Financial

Nick James
SVP, Third Party Cyber Risk Leader
Confidential

Erin Liao
VP, Head of E2E 5G Systems
Ericson

Chandra Gundlapalli
Global VP Applications
Unisys

Conference Exhibitors

Supporting Sponsors


Advisory Board




Aaron Mattson
Aaron Mattson
CISO
Andrews Distributing
Adam Little
Adam Little
Executive Director
JP Morgan Chase
Asif Effendi
Asif Effendi
Sr. Product Security Leader
Baker Hughes
Bhavesh Advani
Bhavesh Advani
VP, Cybersecurity & Tech Infrastructure
Fidelity Investments
Bill Floyd
Bill Floyd
CTO
Lexipol
Bill McDonnald
Bill McDonnald
CIO
WIS International
Bob Pacheco
Bob Pacheco
CTO
Tarrant County College District
Brad Coleman
Brad Coleman
VP. Dir Technology Solutions
Federal Home Loan Bank of Dallas
Brad Waisanen
Brad Waisanen
VP. IS Global Security
TTI Inc
Branden Williams
Branden Williams
Director, Cyber Security
Union Bank
Brandy Holbert
Brandy Holbert
VP. IT Applications Development
Hiltop Holdings
Brian White
Brian White
VP Support & Repair
Ericsson
Brim Basom
Brim Basom
CIO
Mothers Against Drunk Driving
Carissa De Santis
Carissa De Santis
VP of IT
Dickey's Barbecue Restaurants, Inc.
Cary Edwards
Cary Edwards
CIO
JDC Healthcare Management
Chandra Gundlapalli
Chandra Gundlapalli
Global VP, Applications
Unisys
Chris Barnes
Chris Barnes
CTO
Howard, LLP
Chris Woods
Chris Woods
Fellow
Lockheed Martin
Christopher Mahanna
Christopher Mahanna
CIO
QM Consulting
Clinton Osteen
Clinton Osteen
Sr Dir of IT
Granite Properties
Craig Broussard
Craig Broussard
Global Infrastructure Director
NHC Corp
Dave Belanger
Dave Belanger
CISO
Maxor National Pharmacy Services
Dave Bergh
Dave Bergh
vCISO
Fortium Partners
Deepak Chebbi
Deepak Chebbi
Director Solutions Architecture
AmerisourceBergen Corporation
Dennis Fink
Dennis Fink
Information Risk & Security
Toyota
Eddie Ho
Eddie Ho
Former CIO
Community Banks
Garth Reis
Garth Reis
CTO
Barrow, Hanley, Mewhinney & Strauss
Gary Petroski
Gary Petroski
ITSO
National Weather Service
George Pulikkathara
George Pulikkathara
CISSP, CISM, CISA - Global Director Client Information Security
Avanade, Inc.
Glenn Johnson
Glenn Johnson
VP Infrastructure Operations
Hudson Advisors
Gregory Wilson
Gregory Wilson
CISO
Pioneer Natural Resources
Gustavo Vasconcelos
Gustavo Vasconcelos
VP Applications Development
BenefitMall
Jana Gilmore
Jana Gilmore
Director of IT
PawTree
Ian Schneller
Ian Schneller
SVP Global Information Security
Bank of America
Jeff DeFord
Jeff DeFord
CTO
Parkland Health & Hospital System
Jaimin Shah
Jaimin Shah
Information Security Officer
Greystar
Jessica Nemmers
Jessica Nemmers
Director of Information & Security
Commercial Metals Company
James Carpenter
James Carpenter
Director
Texas Scottish Rite Hospital
Jimmy Williams
Jimmy Williams
CIO
Chactaw Nation of Oklahoma
James Clent
James Clent
CIO
Remington Hotels
Jeanette Wayne
Jeanette Wayne
CIO, Technical Diagnostic Services
TDS
Jorge Hernandez
Jorge Hernandez
VP of IT
Azteca Comunicaciones Columbia
John Henthorne
John Henthorne
VP of IT
DeGolyer and MacNaughton
John Delano
John Delano
Regional CIO - Southwest
Advent Health
Juan Arias
Juan Arias
SVP Business Technology
Bank of America
Kalaivani Shanmugam
Kalaivani Shanmugam
Security Delivery Lead
Michaels
Khan Md Anwarus Salam
Khan Md Anwarus Salam
CTO
Apex Asset Managment
Lester Lewis
Lester Lewis
Director of Server & Network Management
Dallas County
Louis Martinez
Louis Martinez
CIO
PDX, Inc
Mark Lynd
Mark Lynd
Top 10 Global AI & Cybersecurity Professional
Relevant Track
Marvin Nevels
Marvin Nevels
Chief Privacy Officer
Santander Consumer USA
Nimesh Mehta
Nimesh Mehta
CIO
National Life Group
Max Horne
Max Horne
CIO - SVP of IT
Colonial Savings
Puneet Nanda
Puneet Nanda
Head of Information Security, CISO, CISM
Verizon
Michael Anderson
Michael Anderson
CISO
Dallas County
Mike Madero
Mike Madero
AVP, Information Security
Mr. Cooper
Randal Senter
Randal Senter
Associate Director
DTCC
Randy Stroud
Randy Stroud
CISO
Hunt Companies
Randy Krzyston
Randy Krzyston
Sr Manager IT Security & Compliance
Brinks Home Security
Ravi Boggaram
Ravi Boggaram
CTO Sr Director, Global Digital Services
PepsiCo
Rebecca Cap Mertens
Rebecca Cap Mertens
CTO
Publishing Concepts
Reuben Najera
Reuben Najera
Director of IT
Shermco Industries
Richard Alvarado
Richard Alvarado
Director, Risk & Compliance
Epsilon
Robert Pace
Robert Pace
Vp of Information Security & Compliance
First American Payment Systems
Rusty Kennington
Rusty Kennington
CIO
Corsicana Mattress Company
Saj Khan
Saj Khan
Technology Officer
City of Carrollton
Robin Austin
Robin Austin
CTO
Colliers Group
Satish Dave
Satish Dave
CIO
Riata Capital Group, LLC
Simon Speight
Simon Speight
CTO
American Help Desk
Scot Miller
Scot Miller
SVP, CISO
Mr. Cooper
Shannon Albright
Shannon Albright
VP Info Sec Operations
RoundPoint Mortgage Servicing Corp
Sharad Karkera
Sharad Karkera
CTO
US LawShield
Shelby Neal
Shelby Neal
VP of IT
Accuhealth
Sonya Bridges
Sonya Bridges
AVP, Information Technology Svcs
DFW International Airport
Sree Sreenath
Sree Sreenath
CTO
Bed Beacon
Steve Taff
Steve Taff
CTO
Lanvera
Subhendu Rath
Subhendu Rath
Sr. Director IT Enterprise Systems
Susan G. Komen Foundation
Terry Raitt
Terry Raitt
VP, Information Security
National Bankruptcy Services
Thomas Sweet
Thomas Sweet
VP of IT Solutions
GM Financial
Timothy Marshall
Timothy Marshall
CIO
Dallas Community College District
Todd Trimble
Todd Trimble
Sr. Director Information Security
Global Payments, Inc.
Tony Wasson
Tony Wasson
Executive Director of IT
Trinity Industries, Inc
Ty Brewer
Ty Brewer
VP Management Systems
History Maker Homes
Vibha Gore
Vibha Gore
VP of Enterprise Applications
Stream Realty Partner
Vineet Rao
Vineet Rao
SVP, CIO
Inspirus
William Haung
William Haung
Former CIO of SPS Business Unit
Mitchell International
Zubair Faiz
Zubair Faiz
CIO
Healthcare Highways, Inc.

ElevateIT: DFW Technology Summit 2021