ElevateIT: DFW Technology Summit 2021

Irving Convention Center
May 19, 2021
500 Las Colinas Blvd W Irving, TX 75039

Expanding and Evolving within the Digital Revolution

At the heart of the Digital Revolution is quick-term, short-term and long-term growth and profitability. The acceleration of automation development from inception throughout the supply chain will drive customer demands now and in the future. Simply put, companies embracing faster a positive seamless digital customer experience will be the relevant companies for the future. Employing effective digitization both internally and externally will create efficiency, a more effective use of resources and an evolution of culture. Are you ready for 2021 and the Digital Revolution?

The 3rd Annual ElevateIT: DFW Technology Summit will now be hosted both in-person & virtually on May 19th, 2021.

The ElevateIT: DFW Technology Summit is designed with your goals in mind, and we are excited to connect you with local experts and resources to assist with your IT & Security needs. We hope you will join us for a full day of Peer-to-Peer Networking, Educational Presentations by Industry Leaders, and 50+ vendors to evaluate. Be sure to attend, either live or virtually, and be entered to win one of our Grand Prize Drawings for 1-of-2 Pre-paid Visa Gift Cards totaling $5000!

2021 Keynote Cybersecurity Panel






Panelists


Aaron Baillio
CISO, University of Oklahoma

Mustapha Kebbeh
CISO, Brinks, Inc.

Robert Pace
CISO, Invitation Homes

Sailija Kotra-Turner
CISO, Brown Forman

Title: The Future Metrics and ROI for Cybersecurity

Tech Theater I | 8am - 9am


Dr. Chase Cunningham
CISO, Ericom Software
Moderator
Digital transformation, ransom cyber-attacks, and agile development projects are demanding an enormous investment from the business. CISOs and their teams must adopt a broader skill set to continue to meet the business’s demands. It is harder to hire cybersecurity talent today than it was 3 to 4 years ago.

“By 2023, 30% of chief information security officers’ (CISOs’) effectiveness will be directly measured on the role’s ability to create value for the business.”- Gartner

  1. Designing a new dimension and the characteristics necessary for a CISO and Security Professional in the future. 
  2. Digitization requires a broader and diverse skill set. How are you meeting these demands?
  3. Developing requirements for adopting a “Lean” approach. What are its advantages and disadvantages?
  4. Can security be agile and adaptive everywhere embracing immediate opportunities?
  5. What sophisticated methodologies like Internet of Behavior (IoB) devices and solutions, blockchain and facial recognition have you implemented or are you considering?
  6. Thoughts on adopting Distributed Cloud, AI engineering and cybersecurity meshes.
  7. How are you meeting the need for cybersecurity balance? How confident are you?  What still needs to be done?







THE ElevateIT
ADVANTAGE


ElevateIT inspires and empowers idea creation through a disruptive transformational culture by attracting the finest speakers and vendors imparting solid strategies able to quickly be implemented within Enterprises and Start-Ups alike.

We strive to bring together the ever-changing multi-facets of the Technology Industry in a fun, safe and informative atmosphere and feel fortunate to have good friends, good partners and a priceless reputation with our industry community. See what we mean for yourself by watching our summit videos.



Gold Sponsors



Every second, another 127 devices connect to the Internet. That’s 328 million “things” per month. By 2025, we’ll see 75 billion IoT devices. Our objective is to give our customers peace of mind in knowing that they can effectively manage and secure this explosive growth of unmanaged devices in their environment. We’re focused on making connected device security simple through our zero .... touch agentless deployment, one common platform for multiple stakeholders, and automation of policies to secure devices. With Ordr, you will know exactly what’s connected to the network, in real time, all the time. You will know know what’s vulnerable, what’s behaving maliciously and why. You can then automate response for any connected device, and enforce on any networking and security infrastructure. We make the complex problem of securing every connected devices simple — from traditional IT devices to newer and more vulnerable IoT, IoMT or OT.
iboss is a cloud security company that provides organizations and their employees fast and secure access to the Internet on any device, from any location, in the cloud. The iboss SASE cloud platform provides network security as a service, delivered in the cloud, as a complete SaaS offering. This eliminates the need for traditional network security appliances, such as firewalls and web gateway pr .... oxies, which are ineffective at protecting a cloud-first and mobile world. Leveraging a purpose-built cloud architecture backed by 230+ issued and pending patents and more than 100 points of presence globally, iboss processes over 100 billion transactions daily, blocking nearly 4 billion malware threats per day. More than 4,000 global enterprises trust the iboss SASE cloud platform to support their workforce, including a large number of Fortune 50 companies. To learn more, visit https://www.iboss.com/.
Malwarebytes secures endpoints, making workplaces resilient. Our adaptive cyber protection predicts and detects attacks with multi-layer detection across the kill chain. We enable active threat response with machine learning that is actionable and automated, allowing for full recovery when a compromise occurs. We empower enterprise endpoint orchestration across siloed IT and Security organizations .... , simplifying security management and making responses effective. Malwarebytes makes endpoints resilient so workplaces can protect and remediate, and employees can regain control of their digital lives.


Lunch & Learn Sponsors



Since 1996, Extreme has been pushing the boundaries of networking technology, driven by a vision of making it simpler and faster as well as more agile and secure. But our higher purpose has always been helping our customers connect beyond the network… strengthening their relationships with those they serve. Today, we call that Customer-Driven Networking.
KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. With KACE, you can effectively address your endpoint management needs with individual products for specific tasks or as an integrated .... UEM solution.


Breakfast Sponsors



At Datto, we believe there is no limit to what small and medium businesses can achieve with the right technology. As the world’s leading provider of cloud-based software and security solutions purpose-built for delivery by managed service providers (MSPs), Datto's proven Unified Continuity, Networking, and Business Management solutions drive cyber resilience, efficiency, and growth for MSPs. Del .... ivered via an integrated platform, Datto's solutions help its global ecosystem of MSP partners serve over one million businesses around the world. From proactive dynamic detection and prevention to fast, flexible recovery from cyber incidents, Datto’s solutions defend against costly downtime and data loss in servers, virtual machines, cloud applications, or anywhere data resides. Datto has won awards for its rapid growth, product excellence, superior technical support, and fostering an outstanding workplace.
Data Magic Computer Services, at its core, is a family business that values technology and smart, effective solutions. Cliff Jones and Shane Kimbrel started a computer networking company in Texas in 1994, with Jones offering technical expertise and Kimbrel using his business education to handle the sales and marketing side of things. As technology has evolved a great deal over the years, our fa .... mily values and work ethic have stayed the same. Our goal is to cover absolutely all of your IT needs with one easy, positive experience. We offer a wide range of knowledge and expertise to remove the obstacles that hold you back and provide innovative, unique solutions designed to improve the way you work. Our team is made up of an amazing group of individuals who understand and appreciate excellent customer services, with years of experience in technology and business operation.


Breakout Presentation Sponsors



As the world’s most experienced provider of backup and disaster recovery solutions, for 35 years we’ve been solving the challenges of IT teams by bringing innovation, ambition, and countless hours of iteration to the solutions they rely on to keep businesses running smoothly. In the process, we’ve redefined the way companies protect their data – the very foundation of modern business in an .... era where immediate access to critical systems and applications is key to business continuity and essential to continuing growth and success.
Bitglass delivers data and threat protection for any interaction, on any device, anywhere. Operating at cloud scale across a global network of over 200 points of presence, Bitglass delivers unrivaled performance and uptime to ensure secure business continuity for the largest organizations. Bitglass was founded in 2013 by a team of industry veterans with a proven track record of innovation and .... execution.
Armor is a cloud security company that takes the complexity out of protecting your data, whether it resides in a private, public, or hybrid cloud—or in an on-premise IT environment. We provide managed security solutions that give you a clear picture of threats facing your organization and are designed with PCI, HIPAA, and GDPR compliance in mind.
Security. Trust. Innovation. The Internet of Things represents the next great wave in business transformation. Today, BlackBerry already secures more than 500M endpoints including 175M cars on the road. Through independent research, Frost & Sullivan determined that BlackBerry is well-positioned to secure all IoT endpoints, and upwards of 96% of all cyberthreats in the current landscape (read .... the Frost & Sullivan Assessment). BlackBerry is leading the way with a single platform for securing, managing, and optimizing how intelligent endpoints are deployed in the enterprise, enabling our customers to stay ahead of the technology curve that will reshape every industry.
Imperva is a cybersecurity leader with a mission to protect data and all paths to it. We protect the data of over 6,000 global customers from cyber attacks through all stages of their digital transformation. Our products are informed by the Imperva Research Lab, a global threat intelligence community, that feeds the latest security and compliance expertise into our solutions.
We believe that Penetration Testing (PT), as it stands today, is obsolete. Software and algorithms can do a better job at penetration testing and help businesses continually assess and improve their cyber risks using the threat-oriented approach. Pcysys (an acronym for “Proactive Cyber Systems”) was founded by Arik Liberzon who understood that enterprises do not have an effective means of k .... nowing the true cyber risk that they carry, and have no way of understanding which vulnerabilities have the highest negative business impact potential. Arik modeled his mastership of ethical hacking techniques into software and together with the serial IT entrepreneur, Arik Faingold, founded Pcysys. Soon thereafter, Mr. Liberzon was joined by a group of Israel’s elite cyber researchers and cyber warfare experts, who share the passion of giving organizations the upper hand in their struggle to fence off cyber attacks. Our mission is to develop an automated cyber risk validation platform that would enable them to defend against the best of the worst-intended hackers.
Veeam® is the leader in backup solutions that deliver Cloud Data Management™. Veeam provides a single platform for modernizing backup, accelerating hybrid cloud and securing your data. Our solutions are simple to install and run, flexible enough to fit into any environment and always reliable. When founded in 2006, we focused on simplifying backups for virtual machines. We quickly becam .... e a leader in backup with the fastest and most reliable data recovery in virtual environments. We make sure data is always available, protected and actively working for businesses across the globe. This means, regardless of where your data resides – physical systems, SaaS services, public cloud, private cloud, hybrid cloud, or multi-cloud – our platform helps hundreds of thousands of companies keep their businesses running. We continue to charge forward to innovate the industry and deliver simple, flexible and reliable solutions to our 400,000+ customers. Veeam Cloud Data Management Platform is the most complete solution to help our customers evolve the way they manage data, making it smarter and more self-governing while ensuring its availability across any application or cloud infrastructure. It's a single platform for cloud, virtual and physical to meet all your needs. It helps customers on the journey to modernizing their Backup practice, accelerating hybrid cloud, and adhering to data security standards and regulations.

Silver Sponsors



Area 1 is rooted in our founders’ experience in national security — including gaining advanced insight into potential missile strikes to preempt those attacks before launch. In other words — preempting attacks while in enemy territory. This proactive approach, when applied to cybersecurity, shifts the email security industry paradigm. You can no longer afford to get Phished first, then .... respond after. Area 1’s enhanced detection models go into the wild to preemptively detect and thwart sophisticated attacks like Business Email Compromise, malware, credential harvesting, and other financial fraud that evade email gateways (SEGs) and cloud email suites.



Event Agenda













Intelligent Automation Panel
Hyperautomation with AI/ML Toward and Intelligent Composable Business



Jeff Loyd
AVP Cloud Strategy & Architecture
GM Financial

Nick James
SVP, Third Party Cyber Risk Leader
Confidential

Erin Liao
VP, Head of E2E 5G Systems
Ericson

Chandra Gundlapalli
Global VP Applications
Unisys

Conference Exhibitors

Supporting Sponsors


Advisory Board




Aaron Mattson
Aaron Mattson
CISO
Andrews Distributing
Adam Little
Adam Little
IT/IS Risk Management
USAA
Asif Effendi
Asif Effendi
Sr. Product Security Leader
Baker Hughes
Bhavesh Advani
Bhavesh Advani
VP, Cybersecurity & Tech Infrastructure
Fidelity Investments
Bill Floyd
Bill Floyd
CTO
Lexipol
Bill Huang
Bill Huang
Technology Advisor
Capital Asset Advisors
Bill McDonnald
Bill McDonnald
CIO
WIS International
Bob Pacheco
Bob Pacheco
CTO
Tarrant County College District
Brad Coleman
Brad Coleman
VP. Dir Technology Solutions
Federal Home Loan Bank of Dallas
Brad Waisanen
Brad Waisanen
VP. IS Global Security
TTI Inc
Branden Williams
Branden Williams
Strategy Vice President, IAM Strategy
Ping Identity
Brandy Holbert
Brandy Holbert
VP. IT Applications Development
Hiltop Holdings
Brian White
Brian White
VP Support & Repair
Ericsson
Brim Basom
Brim Basom
CIO
Mothers Against Drunk Driving
Carissa De Santis
Carissa De Santis
Chief Technology Officer
JAMCO Interests LLC
Cary Edwards
Cary Edwards
Information Technology Consulting
CJ Edwards · Self-employed
Chandra Gundlapalli
Chandra Gundlapalli
Senior Vice President of Digital Transformation Strategy
CriticalRiver Inc.
Chris Barnes
Chris Barnes
CTO
Howard, LLP
Christopher Mahanna
Christopher Mahanna
Chief Technology Officer
Car Capital Technologies
Chris Woods
Chris Woods
Fellow
Lockheed Martin
Clinton Osteen
Clinton Osteen
Sr Dir of IT
Granite Properties
Craig Broussard
Craig Broussard
Executive Counselor
Info-Tech Research Group
David Belanger
David Belanger
Chief Security Officer
Bestow
Dave Bergh
Dave Bergh
Chief Information Security Officer & Vice President of Information Technology
Blucora
Deepak Chebbi
Deepak Chebbi
Director, Business Application IT
AmerisourceBergen Corporation
Dennis Fink
Dennis Fink
Lead Risk Consultant - Sensitive Data Strategy and Protection
USAA
Eddie Ho
Eddie Ho
Business Risk and Control Officer
Wells Fargo
Georgeo X. Pulikkathara
Georgeo X. Pulikkathara
Vice President, Chief Information Security Officer
DataStax
Garth Reis
Garth Reis
CTO
Barrow, Hanley, Mewhinney & Strauss
Glenn Johnson
Glenn Johnson
Director of IT Infrastructure
Security Finance
Gary Petroski
Gary Petroski
ITSO
National Weather Service
Gustavo Vasconcelos
Gustavo Vasconcelos
Founder & CEO
Asinpa LLC
Ian Schneller
Ian Schneller
Chief Information Security Officer
Health Care Service Corporation
Jaimin Shah
Jaimin Shah
Chief Information Security Officer
American First Finance
Gregory Wilson
Gregory Wilson
CISO
Pioneer Natural Resources
Jana Gilmore
Jana Gilmore
Director of IT
PawTree
James Clent
James Clent
CIO & CISO
Loyalty Ventures, Inc
Jeanette M. Wayne
Jeanette M. Wayne
Vice President - Information Technology
TDS
James Carpenter
James Carpenter
Director
Texas Scottish Rite Hospital
Jorge Hernandez
Jorge Hernandez
VP of IT
Azteca Comunicaciones Columbia
Jessica Nemmers
Jessica Nemmers
Chief Security Officer
Elevate
John Henthorne
John Henthorne
VP of IT
DeGolyer and MacNaughton
John Delano
John Delano
Vice President, Ministry and Support Services
CHRISTUS Health
Kalaivani Shanmugam
Kalaivani Shanmugam
Security Delivery Lead
Michaels
Khan Md Anwarus Salam
Khan Md Anwarus Salam
CTO
Apex Asset Managment
Lester Lewis
Lester Lewis
Chief Technology Officer
MetaVerse Capital
Jimmy Williams
Jimmy Williams
CIO
Chactaw Nation of Oklahoma
Juan Arias
Juan Arias
SVP Business Technology
Bank of America
Louis Martinez
Louis Martinez
Chief Information Officer
Synerio
Max Horne
Max Horne
Financial Planner
Self-Employed
Marvin Nevels
Marvin Nevels
Compliance Officer
Wells Fargo
Nimesh Mehta
Nimesh Mehta
Senior Vice President and Chief Information Officer
National Life Group
Reuben Najera
Reuben Najera
Director of IT
Shermco Industries
Mark Lynd
Mark Lynd
Top 10 Global AI & Cybersecurity Professional
Relevant Track
Puneet Nanda
Puneet Nanda
CISO
Tanium
Randal Senter
Randal Senter
Director of Information Security Governance and Risk Management
Southern Glazer's Wine & Spirits
Randy Stroud
Randy Stroud
CISO
Self-Employed
Randy Krzyston
Randy Krzyston
IT Security Director, IT Governance, Risk & Compliance
EVO Payments
Satish Dave
Satish Dave
Chief Information Officer
AEG Vision
Michael Anderson
Michael Anderson
CISO
Dallas County
Sharad Karkera
Sharad Karkera
Chief Technology Officer
Channel Control Merchants, LLC
Rebecca Cap Mertens
Rebecca Cap Mertens
CTO
Publishing Concepts
Sonya Bridges
Sonya Bridges
Assistant Director
North Texas Tollway Authority
Steve Taff
Steve Taff
CTO
Lanvera
Richard Alvarado
Richard Alvarado
Manager
Deloitte & Touche LLP
Rusty Kennington
Rusty Kennington
Chief Information Officer
Henry Company
Timothy Marshall
Timothy Marshall
Vice President Institutional Technology/Chief Information
Indian River State College
Shelby Neal
Shelby Neal
Business Risk and Controls Advisor Lead
USAA
Tony Wasson
Tony Wasson
Executive Director of IT
Trinity Industries, Inc
Subhendu Rath
Subhendu Rath
Chief Transformation Officer-Strategic
IT Solutions LLC
Ty Brewer
Ty Brewer
VP Management Systems
History Maker Homes
Robert Pace
Robert Pace
Vice President Information Security | CISO
Invitation Homes
Mike Madero
Mike Madero
AVP, Information Security
Mr. Cooper
Todd Trimble
Todd Trimble
Security Leader
Equinix
Shannon Albright
Shannon Albright
VP Info Sec Operations
RoundPoint Mortgage Servicing Corp
Jeff DeFord
Jeff DeFord
CTO
Parkland Health & Hospital System
Zubair Faiz
Zubair Faiz
Chief Information Office
Airrosti
Terry Raitt
Terry Raitt
Vice President, Information Security
National Bankruptcy Services
Saj Khan
Saj Khan
Technology Officer
City of Carrollton
Robin Austin
Robin Austin
CTO
Colliers Group
Vibha Gore
Vibha Gore
VP of Enterprise Applications
Stream Realty Partner
Ravi Boggaram
Ravi Boggaram
CTO Sr Director, Global Digital Services
PepsiCo
Sree Sreenath
Sree Sreenath
CTO
Bed Beacon
Simon Speight
Simon Speight
Advisor and Consultant
Patriarch Capital Ltd
Vineet Rao
Vineet Rao
SVP, CIO
Inspirus
Thomas Sweet
Thomas Sweet
VP of IT Solutions
GM Financial
Scot Miller
Scot Miller
SVP, CISO
Mr. Cooper

ElevateIT: DFW Technology Summit 2021