ElevateIT: DFW Technology Summit 2023

Irving Convention Center
June 7, 2023
500 Las Colinas Blvd W Irving, TX 75039

Optimizing IT & Cybersecurity to Accelerate Business Enablement

Join us at the ElevateIT: Dallas/Fort Worth Technology Summit 2023 and hear from Key Regional C-Suite Technology Executives, Industry & Subject Matter Experts, and Law Enforcement as we address the following questions, share insights and expertise and discuss best practices on how to optimize & secure your business to accelerate profitability and growth.

  • How do I help my company keep and grow its market base within one of the most disruptive chaotic times in history?
  • Can I capitalize on the disruption to create a competitive advantage?
  • How do I create value while maintaining digital trust?
Today without question, process automation, data protection, and process security (cybersecurity) are the top strategic components of governance and innovation. Adding digital cybersecurity for accuracy and speed can be key to adding value and trust. And “trust” is THE key characteristic to business growth.

SEE OUR 2022 EVENT BELOW

2022 Keynote Cybersecurity Panel






Panelists



Tera Davis


Managing Director
CyberOne Security
Moderator


Richard Murray


Supervisory Special Agent
FBI Dallas Cyber Task Force
Keynote Speaker

Chris Bates


Chief Information Security Officer
SentinelOne
Panelist

Mike Anderson


Chief Digital & Information Officer
Netskope
Panelist

Cybersecurity: Gaps and Predictions For 2022

Tech Theater I | 9am - 10am

Formerly categorized as a necessary overhead expense, cybersecurity has been recategorized as a necessary investment equipped with its own key performance indicators and return on investment (ROI) expectations.

Compliance has become the baseline benchmark from which to build. The focus for Top Executives has shifted to demonstrating value and protecting revenue streams.

Dependence on and expectations from third-party partners have taken center stage to fill many of the cybersecurity gaps including the visibility gap, fragmentation gap, and talent gap.

Top Enterprise Leaders are sifting through and targeting their most prevalent data to feed into third-party tools in order to obtain accurate 360-degree visibility and reduced risk.

The first goal is to reduce overly redundant and outmoded systems that introduce an extra layer of vulnerabilities while reducing costs from their removal. The second goal is to reduce false positives by boosting Automated Software-as-a-Service (ASaaS) with transparency. Viewing components such as vulnerabilities, unpatched systems, and misconfigurations enables prioritization.

The third goal is to acquire the necessary missing elements which can include talent as well as automated tools. What we will see is more open positions for Cybersecurity Architects, Analysts as well as highly skilled Analytics and Sales Engineers provided by third-party partners. With the talent pool being limited and highly competitive, ASaaS accompanied by proven critical thinking analytics skills both internally and from third-party partners will take center stage within key stakeholders’ budgets.

Increased complexity for governance and therefore security professionals especially for the CISO as the Top Enterprise Security Leader is driven by continued demand for “data regulations, expanded data-sovereignty laws, and an increased privacy demand from customers. Duplicating policies, security controls, and frameworks has led to the proliferation of stopgap actions to retrofit data classification and data tagging along with meeting customer expectations.

So, with these overwhelming challenges and complexities, where do we start and how do we plan? First, we begin with compliance as the baseline which will also begin at the endpoint. A priority is the ASaaS gathering of data from multiple data sources while normalizing and standardizing for faster, accurate analysis.

What do we do with all those legacy systems? How do we deal with disparate and poorly implemented systems? How do we create a nimble, resilient ecosystem? Join these best and brightest third-party leaders speedily creating a path forward for their advice and possible roadmap in an interactive open discussion.







THE ElevateIT
ADVANTAGE


ElevateIT inspires and empowers idea creation through a disruptive transformational culture by attracting the finest speakers and vendors imparting solid strategies able to quickly be implemented within Enterprises and Start-Ups alike.

We strive to bring together the ever-changing multi-facets of the Technology Industry in a fun, safe and informative atmosphere and feel fortunate to have good friends, good partners and a priceless reputation with our industry community. See what we mean for yourself by watching our summit videos.



Gold Sponsors



Security. Trust. Innovation. The Internet of Things represents the next great wave in business transformation. Today, BlackBerry already secures more than 500M endpoints including 175M cars on the road. Through independent research, Frost & Sullivan determined that BlackBerry is well-positioned to secure all IoT endpoints, and upwards of 96% of all cyber threats in the current landscape (read .... the Frost & Sullivan Assessment). BlackBerry is leading the way with a single platform for securing, managing and optimizing how intelligent endpoints are deployed in the enterprise, enabling our customers to stay ahead of the technology curve that will reshape every industry.
The Authority in Managed Detection and Response, eSentire is recognized industry-wide because we offer the world’s most complete threat response capability. Through Managed Risk, Managed Detection and Response, and Digital Forensics and Incident Response services, we put your business ahead of disruption.
Malwarebytes secures endpoints, making workplaces resilient. Our adaptive cyber protection predicts and detects attacks with multi-layer detection across the kill chain. We enable active threat response with machine learning that is actionable and automated, allowing for full recovery when a compromise occurs. We empower enterprise endpoint orchestration across siloed IT and Security organizations .... , simplifying security management and making responses effective. Malwarebytes makes endpoints resilient so workplaces can protect and remediate, and employees can regain control of their digital lives.


Lunch & Learn Sponsors



Aiden is a team of do’ers bringing deep experience and fresh energy to solve IT’s tenacious threats. We’re experienced entrepreneurs, software architects, and developers with billion-dollar experience. technology should just work without requiring legions of IT professionals to maintain constant vigilance and perform routine tasks automatically. every risk, every update, and every new insigh .... t matters and should be shared to benefit everyone. enhancing the capabilities of organizations previously left out of technological innovation will keep all of us safer, healthier, and more productive. everyone deserves access to the IT sophistication usually only available to the top 1% of businesses. Democratizing access and understanding drive everything we do. clarity reigns supreme. Every communication and configuration must be easy to understand.
Cloud compliance We undergo independent verification of our security, privacy, and compliance controls to help you meet your regulatory and policy objectives. Find details on our full set of compliance offerings, like ISO/IEC 27001/27017/27018/27701, SOC 1/2/3, PCI DSS, VPAT (WCAG, U.S. Section 508, EN 301 549) and FedRAMP certifications, and alignment with HIPAA, GDPR, and CCPA, among others, in .... our compliance resource center. Data privacy Protecting the privacy of Google Cloud Platform and Google Workspace customers is a priority and codified in our Enterprise Privacy Commitments, which guide our security and privacy practices. Learn more about how we protect privacy and keep you in control in our privacy resource center. Transparency We work to earn your trust through transparency. We state and adhere to a concrete set of trust principles that govern our approach to security. We only process data in accordance with our terms and data protection agreements and clearly outline our policies on responding to government requests.


Breakfast Sponsors



Why Scale Computing Scale Computing Chief Executive Officer Jeff Ready and cofounders Jason Collier and Scott Loughmiller set out to simplify IT and revolutionize the virtualization market when they created Scale Computing. Scale Computing engineered HC3, the IT infrastructure platform that allows organizations to do more with less. Scale Computing HC3® software eliminates the need for tradit .... ional IT silos of virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available platform for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects problems in the infrastructure in real-time, enabling applications to achieve maximum uptime even when local IT resources and staff are scarce.


Breakout Presentation Sponsors



AXONIUS. /Ax-OH-nee-us/ (noun) 1. A team of ambitious, hard-working, and driven people taking on the biggest challenges in IT and security today. (See also: Axonians.) 2. A platform that correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action to control complexity. Solving a Foundational Challenge Without an accurate understand .... ing of what’s in your environment, everything else suffers. But IT and security teams struggle to manage a complex sprawl of devices, users, cloud services, and software. And traditional approaches to compiling an asset inventory are manual and error-prone. So in 2017, after years in the Israel Defense Forces’ Unit 8200, our co-founders came together to solve that age-old problem.
As the world’s most experienced provider of backup and disaster recovery solutions, for 35 years we’ve been solving the challenges of IT teams by bringing innovation, ambition, and countless hours of iteration to the solutions they rely on to keep businesses running smoothly. In the process, we’ve redefined the way companies protect their data – the very foundation of modern business in an .... era where immediate access to critical systems and applications is key to business continuity and essential to continuing growth and success.
For over three decades, our customers have come to rely on CBI as their trusted advisor to meet their unique needs with solutions from the best professionals in the industry. We are a privately owned, services-led team of individuals that are obsessed with cybersecurity and making this world a safer place for everyone. Cybersecurity continues to shift and change. So does CBI. Our passion to ele .... vate our clients’ cybersecurity posture is the force that drives our growth. We work to continually advance our skills and technologies, innovate and evolve our services, and improve our client satisfaction. Our connected team of sales and technology experts is a growing presence throughout the U.S., providing global capabilities to clients of all sizes and industries. Comprised of strategists, former CISOs, and security experts, we eagerly spend our time and energy identifying and stopping would-be threats before they crop up on our clients’ radars. It’s with this team of experts that we are able to deliver on our promise — to help defend and secure your network and endpoints; test and monitor areas of operational risk; and protect your data.
GoSecure Titan Managed Detection and Response helps all organizations reduce dwell time by preventing breaches before they happen. GoSecure Titan MDR offers a market-leading portfolio of modular detection and response capabilities, delivered as a cloud service, to protect critical data and assets. GoSecure is the first and only security provider to offer a full spectrum from managed threat hunting .... to managed incident response and forensics services across the endpoint, network and inbox.
Our mission is to secure and empower productivity in a privacy-focused world, where work and play can happen anywhere. With everything now in the cloud, it’s critical that cybersecurity follows you wherever you go, securing your data from the endpoint all the way to the cloud. Mobility and cloud technology have become essential, as most of us now work and manage our personal lives digitally. .... With a platform that integrates endpoint and cloud security technologies, Lookout solutions can be tailored for any industry and any company size, from individual users to large global enterprises and governmental organizations. In 2007, Lookout co-founders, John Hering, Kevin Mahaffey and James Burgess came together with a goal of protecting people from the security and privacy risks that emerge as the world becomes more connected. Before smartphones were in everyone’s pocket, they recognized that mobility would have a profound impact on the way we work and live. Fast forward to today, Lookout is the leader in delivering integrated endpoint-to-cloud security. With a cloud-delivered platform, we secure data for the world’s leading enterprises and ensure they comply with regulations while respecting the privacy of their team who now work anywhere. We are also trusted by millions of individuals around the world to protect their digital identity and mobile devices.
NETWORK SECURITY ISN’T JUST OUR BUSINESS. IT’S OUR PASSION. The first iteration of Sentinel Intrusion Prevention Systems began in Dallas, Texas, in 1995, at the dawn of the World Wide Web. Although we started as web developers, we soon shifted our focus to network security, driven by the belief that everyone—and every sized company—has the fundamental right to be secure on the Internet. .... Small businesses, state and local government entities, and companies with lean IT departments that simply didn’t have the security expertise or the time to put one more thing on their already overflowing plates. We couldn’t find an integrated solution that checked all the boxes, so, we assembled a team of innovators and developed our own.
You may be asking yourself: What the heck is Web3? Was there such thing as a Web1 and Web2? How did we get to Web3? What is the metaverse, NFTs, DeFi, Crypto, Decentralization, Blockchain and how are they all related? Here is a good place to start: https://www.notboring.co/p/the-value-chain-of-the-open-metaverse Next best way to learn is to join us at our upcoming events! < M I S S .... I O N > To make Web3 accessible to all through simplified, captivating, and adaptive learning experiences on all mediums. < W H O > The Web3 Texas community is a collective medium for developers, designers, entrepreneurs and enthusiasts who want to learn more about Web3 and its associated technologies, protocols, business models, theories, ideologies, etc. and to discuss them with like-minded, curious people. < W H A T > We cover a variety of technical topics across a spectrum of Web3 protocols and technologies such as blockchains, bridges, coins/tokens, blockchain explorers, wallets (software, multisig, hardware) NFTs, marketplaces, hash graphs, ERC standards, decentralized finance, Bitcoin, Ethereum, alt coins, meme coins, real estate tokens/fictionalization, metaverses, virtual real estate, wearables, and so much more. We also cover academic and theory-based topics that relate to the aforementioned technologies and also include other topics such as decentralized trust, consensus algorithms, crypto-economics, rug-pulls/scams, ICOs, non-fungible vs fungible vs semi-fungible, peer-to-peer communications and the social implications of distributed systems. < W H E N > We will aim to host either an educational event or social event at least once a month. < W H E R E > We proudly hail from the great city of Mckinney, Texas. We will strive to keep as many events within the local Dallas area. < W H O > Our events are open to all humans from beginner to expert. Come along to learn more and have some fun! From time-to-time we will have sponsors who will speak at our meetups, as they are an important participant in our community. < G L O B A L F A M > Web3 Sydney: https://www.meetup.com/web3sydney/ Original source and credit Description: Web3 Sydney - https://www.meetup.com/web3sydney/ Code of Conduct for Meetups: Austin JavaScript - https://austinjavascript.com/code-of-conduct/
We accelerate your Digital Transformation. Versa is unique among SASE vendors, providing an end-to-end solution that both simplifies and secures the modern network. Versa SASE, based on VOS™, delivers a broad set of capabilities via the cloud and on-premises for building agile and secure enterprise networks, as well as highly efficient managed service offerings. The Versa mission is to addre .... ss the security and networking challenges that Enterprises and Service Providers face, and connect branch offices, home offices, and users to applications wherever they exist. To simplify and secure your business. In 2012, we saw that forward-thinking enterprises and service providers were becoming concerned about their ongoing reliance on legacy network hardware and complex, static WAN architectures that prohibited their organizations from digitizing their business and embracing the cloud. We saw the need to converge and integrate in the cloud and on-premises security, networking, and analytics within a single software operation system (VOS). This, combined with a single-pass parallel processing architecture, was necessary to decrease latency, increase performance, improve security, reduce complexity, and enhance visibility network-wide.

Silver Sponsors



We deliver purpose-built cyber security services that proactively defend business ecosystems of all sizes against today’s threats by utilizing large, real-time datasets with industry leading analytics, and technologies. Our threat intelligence data detects your most potent cybersecurity risks, while intuitive automations mitigate threats against your attack surface effectively and efficiently, p .... roviding the business and technical outcomes you need to both stay secure and to support your business objectives. Our highly-skilled team brings a unique and diverse range of backgrounds and frontline experience to the table, including former government cyber officials from organizations such as the National Security Agency, Federal Bureau of Investigation, Unit 8200, GCHQ, as well as seasoned veterans from across the cyber security industry. Our expertise, combined with the largest commercially available and exclusive-use dataset available and an extensive set of automation playbooks and data connectors, allows us to deliver on our philosophy of operational threat alerting, mitigation and resolution.
Organizations that increasingly rely on APIs to power their businesses trust Cequence Security to deliver the most comprehensive API Security Platform on the market. The Platform has proven to be effective in preventing online fraud, business logic attacks, exploits and unintended data leakage, which helps our F500 customers remain resilient in today’s ever-changing business and threat landscape .... . Cequence is the only API Security Platform vendor that unifies runtime API visibility, security risk monitoring, and patented behavioral fingerprinting technology to consistently detect and protect against ever evolving online attacks without the development and deployment friction associated with alternative offerings.
Where developers dream bigger. Developers change the way the world experiences the web: they drive the next groundbreaking innovation, power the companies that connect us and create experiences that can transform our lives. And we built Fastly to make sure they always have what they need to make it happen. Our powerful edge cloud network empowers developers to run, secure, and deliver websites .... and applications — as close to the users as possible, to create unforgettable experiences a global scale. Built by developers. Driven by values. There’s so much more to Fastly than technology. At the heart of our work, we aim to improve human lives — and from the beginning, we’ve grown with a deliberate focus on transparency, integrity, and inclusion.
Delivering solutions that ensure information remains secure and trackable no matter how or where it travels, without hindering collaboration effectiveness, has been our mission for over eight years. As an early and on-going innovator in Rights Management technology, we have now expanded our solution suite with an open, agile Data-Centric Security Platform. The Platform enables organizations to .... unify best-of-breed Data-Centric Security Solutions with existing Enterprise systems to address the inherent limitations in various data protection point solutions. The cohesive Data-Centric Security framework also automates the protection of documents as they are discovered, classified, downloaded and shared, ensuring the sensitive information is consistently protected without impacting collaboration workflow. Our combination of deep expertise in data security, a drive to provide the most innovative solutions, and unwavering commitment to customer success, is enabling organizations to leverage the best technologies available on the market to ensure that their sensitive information is secure throughout its lifecycle.


Drink Sponsor



Our mission is to enable legal and ethical data operations. That means ensuring data is accessible to only those who need it, for the right reasons, and in the right form. With proper data access controls, organizations can truly maximize the utility of their data. Since our founding in 2015, Immuta has now become the leader in cloud data access control. That comes by applying our expertise in .... engineering, security, ethics, and law. But, more importantly, it requires a relentless focus on our customers’ needs.


Registration Sponsor



We believe that a safe internet is like clean water – a universal right. Bolster builds AI/ML technology to protect regular citizens from bad actors on the internet. Your favorite brands from technology to eCommerce use our software to detect and takedown threats that might attack their customers, employees, or partners. Bolster the internet. Online fraud prevention has centered around commun .... ity-powered blacklists for years. For a site to get on the list, a human had to look at it. As the internet and the scam sites on it continue to grow, we don’t think that human intervention is scalable. We built a suite of computer vision, natural language processing, and deep learning models to mimic how a person looks at and categorizes a page. With 100ms verdicts and 1/100,000 false positives, our AI is faster and more accurate than a human. With a focus on intelligent infrastructure, scalable deep learning, and elegant design, we constantly innovate on our technology – making it more accessible for engineers, easier to use for operations teams, and more extensible for the future of online fraud.


Happy Hour Reception Sponsors



Why Wiz? At its core, magic is defined by a deep understanding of your environment and using natural means to create seemingly impossible outcomes. We wanted our company name to be born out of this notion that our approach to security is solving customer problems that seem impossible today. It allows us to emphasize our ambitious objective to completely change how we’re approaching cloud securit .... y as an industry. The magic ingredient? Every single person on team Wiz. We truly believe that as a company we are in a unique position to drive change and our name -Wiz- is the ultimate representation of exactly that.


VIP Sponsor



Synack, the most trusted crowdsourced security testing platform, delivers smarter penetration testing for dynamic attack surfaces on a continuous cadence. The company’s hacker-powered, AI-enabled pen test provides access to the best worldwide talent, scalable and smart technology, and insights that secure our nation's critical infrastructure and leading brands and businesses.



Event Agenda












ThreatGen Cybersecurity Skills Challenge
Tech Theater I 4p-5p


Conference Exhibitors

Supporting Sponsors


Advisory Board




Adam Little
Adam Little
IT/IS Risk Management
USAA
Bill Huang
Bill Huang
Technology Advisor
Capital Asset Advisors
Branden Williams
Branden Williams
Strategy Vice President, IAM Strategy
Ping Identity
Carissa De Santis
Carissa De Santis
Chief Technology Officer
JAMCO Interests LLC
Cary Edwards
Cary Edwards
Information Technology Consulting
CJ Edwards · Self-employed
Chandra Gundlapalli
Chandra Gundlapalli
Senior Vice President of Digital Transformation Strategy
CriticalRiver Inc.
Christopher Mahanna
Christopher Mahanna
Chief Technology Officer
Car Capital Technologies
Craig Broussard
Craig Broussard
Executive Counselor
Info-Tech Research Group
Dave Bergh
Dave Bergh
Chief Information Security Officer & Vice President of Information Technology
Blucora
Deepak Chebbi
Deepak Chebbi
Director, Business Application IT
AmerisourceBergen Corporation
Dennis Fink
Dennis Fink
Lead Risk Consultant - Sensitive Data Strategy and Protection
USAA
Eddie Ho
Eddie Ho
Business Risk and Control Officer
Wells Fargo
Georgeo X. Pulikkathara
Georgeo X. Pulikkathara
Vice President, Chief Information Security Officer
DataStax
Glenn Johnson
Glenn Johnson
Director of IT Infrastructure
Security Finance
Gustavo Vasconcelos
Gustavo Vasconcelos
Founder & CEO
Asinpa LLC
Jaimin Shah
Jaimin Shah
Chief Information Security Officer
American First Finance
James Clent
James Clent
CIO & CISO
Loyalty Ventures, Inc
Jeanette M. Wayne
Jeanette M. Wayne
Vice President - Information Technology
TDS
Jessica Nemmers
Jessica Nemmers
Chief Security Officer
Elevate
John Delano
John Delano
Vice President, Ministry and Support Services
CHRISTUS Health
Kalaivani Shanmugam
Kalaivani Shanmugam
Security Delivery Lead
Michaels
Khan Md Anwarus Salam
Khan Md Anwarus Salam
CTO
Apex Asset Managment
Lester Lewis
Lester Lewis
Chief Technology Officer
MetaVerse Capital
Louis Martinez
Louis Martinez
Chief Information Officer
Synerio
Max Horne
Max Horne
Financial Planner
Self-Employed
Marvin Nevels
Marvin Nevels
Compliance Officer
Wells Fargo
Nimesh Mehta
Nimesh Mehta
Senior Vice President and Chief Information Officer
National Life Group
Reuben Najera
Reuben Najera
Director of IT
Shermco Industries
Puneet Nanda
Puneet Nanda
CISO
Tanium
Randal Senter
Randal Senter
Director of Information Security Governance and Risk Management
Southern Glazer's Wine & Spirits
Randy Stroud
Randy Stroud
CISO
Self-Employed
Randy Krzyston
Randy Krzyston
IT Security Director, IT Governance, Risk & Compliance
EVO Payments
Satish Dave
Satish Dave
Chief Information Officer
AEG Vision
Michael Anderson
Michael Anderson
CISO
Dallas County
Sharad Karkera
Sharad Karkera
Chief Technology Officer
Channel Control Merchants, LLC
Sonya Bridges
Sonya Bridges
Assistant Director
North Texas Tollway Authority
Richard Alvarado
Richard Alvarado
Manager
Deloitte & Touche LLP
Rusty Kennington
Rusty Kennington
Chief Information Officer
Henry Company
Shelby Neal
Shelby Neal
Business Risk and Controls Advisor Lead
USAA
Subhendu Rath
Subhendu Rath
Chief Transformation Officer-Strategic
IT Solutions LLC
Robert Pace
Robert Pace
Vice President Information Security | CISO
Invitation Homes
Todd Trimble
Todd Trimble
Security Leader
Equinix
William Floyd
William Floyd
Technology Advisor, Strategic Leader
Brigham Young University
Zubair Faiz
Zubair Faiz
Chief Information Office
Airrosti
Terry Raitt
Terry Raitt
Vice President, Information Security
National Bankruptcy Services
Saj Khan
Saj Khan
Technology Officer
City of Carrollton
Sree Sreenath
Sree Sreenath
CTO
Bed Beacon
Simon Speight
Simon Speight
Advisor and Consultant
Patriarch Capital Ltd

ElevateIT: DFW Technology Summit 2021