ElevateIT: Houston Technology Summit 2023

Hyatt Regency Houston West
September 21, 2023
13210 Katy Fwy Houston, TX 77079

Optimizing IT & Cybersecurity to Accelerate Business Enablement

Join us at the ElevateIT: Houston Technology Summit 2023 and hear from Key Regional C-Suite Technology Executives, Industry & Subject Matter Experts, and Law Enforcement as we address the following questions, share insights and expertise and discuss best practices on how to optimize & secure your business to accelerate profitability and growth.

  • How do I help my company keep and grow its market base within one of the most disruptive chaotic times in history?
  • Can I capitalize on the disruption to create a competitive advantage?
  • How do I create value while maintaining digital trust?
Today without question, process automation, data protection, and process security (cybersecurity) are the top strategic components of governance and innovation. Adding digital cybersecurity for accuracy and speed can be key to adding value and trust. And “trust” is THE key characteristic to business growth.

SEE OUR 2022 EVENT BELOW

Keynote Presentation

Where Are Bad Actors Taking Us Now: A Prevention And Enforcement Perspective







Panelists


George Reeves


Cybersecurity Advisor
U.S. Department of Homeland Security
Keynote Speaker

Marc Crudgington


Founder
CyberFore Systems
Keynote Speaker

Rob Kotarski


Supervisory Special Agent
Houston FBI
Keynote Speaker

Where Are Bad Actors Taking Us Now: A Prevention And Enforcement Perspective

Tech Theater I | 9am - 10am

This interactive Keynote Fireside Chat features two of Houston’s Finest – Robert Kotarski - FBI Supervisory Special Agent and Marc Crudgington – Founder, CyberFore Systems.

With new and advanced cyber threats being deployed daily, it is imperative that Executive Leadership be aware of the emerging threats and have a plan to prevent attacks.

This Keynote will dive deeper into the common types of bad actors, their evolving methods, and the activities being taken by organizations and law enforcement to combat them.







THE ElevateIT
ADVANTAGE


ElevateIT inspires and empowers idea creation through a disruptive transformational culture by attracting the finest speakers and vendors imparting solid strategies able to quickly be implemented within Enterprises and Start-Ups alike.

We strive to bring together the ever-changing multi-facets of the Technology Industry in a fun, safe and informative atmosphere and feel fortunate to have good friends, good partners and a priceless reputation with our industry community. See what we mean for yourself by watching our summit videos.



Gold Sponsors



Armis offers the markets leading asset intelligence platform designed to address the new threat landscape that connected devices create. 40 Fortune 100 companies trust our real-time, and continuous protection to see with full context all managed, unmanaged assets across IT, Cloud, IoT devices, medical devices (IoMT), operational technology (OT), and industrial control systems (ICS), and 5G. .... About Page Hero Armis customers are from across all industries, verticals, and segments including governments, state, local, education (SLED), healthcare, critical infrastructure providers (CIP), retail, manufacturing, smart cities, transport, energy including organizations such as Colgate Palmolive, Allegro Microsystems, Takeda Pharmaceuticals, Mondelez, PepsiCo, DocuSign, the Booking Group, and many more. Armis is a privately held company headquartered in Palo Alto, California.
Secureworks protects organizations with battle-tested, best-in-class cybersecurity solutions. Built on the Taegis™ Cloud-Native Security Platform, our purpose-driven products prevent, detect, and respond to continuously evolving threats and vulnerabilities to help you slash risk, optimize existing IT investments, and close the current cyber skills gap.


Lunch & Learn Sponsors



IronEdge is the premier IT solutions provider for Texas-based businesses. We provide SERVICE CENTRIC STRATEGY AND SUPPORT to eliminate the frustration companies face with technology. We provide CUSTOM IT SOLUTIONS. IronEdge’s offerings include Texas-based help desk support, cyber-security strategy and services, cloud solutions, project planning and implementation, backup and recovery services.
Orca Security provides comprehensive security and compliance for AWS, Azure, and GCP - without the gaps in coverage, alert fatigue, and operational costs of agents. Orca’s Cloud Security Platform detects and prioritizes risks in minutes ﹣ not months ﹣ and is trusted by global innovators, including Databricks, Autodesk, and Gannett.


Breakout Presentation Sponsors



As the world’s most experienced provider of backup and disaster recovery solutions, for 35 years we’ve been solving the challenges of IT teams by bringing innovation, ambition, and countless hours of iteration to the solutions they rely on to keep businesses running smoothly. In the process, we’ve redefined the way companies protect their data – the very foundation of modern business in an .... era where immediate access to critical systems and applications is key to business continuity and essential to continuing growth and success.
AXONIUS. /Ax-OH-nee-us/ (noun) 1. A team of ambitious, hard-working, and driven people taking on the biggest challenges in IT and security today. (See also: Axonians.) 2. A platform that correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action to control complexity. Solving a Foundational Challenge Without an accurate understanding .... of what’s in your environment, everything else suffers. But IT and security teams struggle to manage a complex sprawl of devices, users, cloud services, and software. And traditional approaches to compiling an asset inventory are manual and error-prone. So in 2017, after years in the Israel Defense Forces’ Unit 8200, our co-founders came together to solve that age-old problem.
Darktrace, a global leader in cyber security AI, delivers world-class technology that protects over 7,400 customers worldwide from advanced threats, including ransomware and cloud and SaaS attacks. The company’s fundamentally different approach applies Self-Learning AI to enable machines to understand the business in order to autonomously defend it. Headquartered in Cambridge, UK, the com .... pany has 1,500 employees and over 30 offices worldwide. Darktrace was named one of TIME magazine’s ‘Most Influential Companies’ for 2021.
Fluency is the only SIEM that is fully compliant with Sigma, the open source standard in SIEM rules. Fluency can run all Sigma rules simultaneously without a performance hit. There is no conversion of rules, nor is there down selection. The rules analyze data as it enters the system, always creating real time alerts, meaning zero mean time to detection (MTTD). Fluency is even compatible to the pro .... posed features of Sigma. This means that your analysts benefit from the largest community of open source researchers for log analysis. ​ It doesn't stop with Sigma. Fluency is the only pure real time SIEM. Fluency watches data as it is collected, while traditional SIEMs store data and then search a database to detect. Fluency maintains state and alerts immediately upon a match. Stateful detection allows for machine learning and historical correlation to improve the accuracy, therefore reducing noise and alert fatigue. A database query is a pitiful means of detection. Detection is a balancing act of matching knowledge to the event, while excluding matches that are wrong. Good security considers not just fields and values. Good security considers state, situational knowledge, environment, and history. There is more to quality detection than what can be placed in a database search.
HouSecCon is THE Houston-area cybersecurity conference. We've been around since 2010. We are NOT a vendor-con. This page will talk about the latest news about the conference, including dates for the show, training events, and general info.
Our mission is to secure and empower productivity in a privacy-focused world, where work and play can happen anywhere. With everything now in the cloud, it’s critical that cybersecurity follows you wherever you go, securing your data from the endpoint all the way to the cloud. Mobility and cloud technology have become essential, as most of us now work and manage our personal lives digitally. Wit .... h a platform that integrates endpoint and cloud security technologies, Lookout solutions can be tailored for any industry and any company size, from individual users to large global enterprises and governmental organizations. In 2007, Lookout co-founders, John Hering, Kevin Mahaffey and James Burgess came together with a goal of protecting people from the security and privacy risks that emerge as the world becomes more connected. Before smartphones were in everyone’s pocket, they recognized that mobility would have a profound impact on the way we work and live. Fast forward to today, Lookout is the leader in delivering integrated endpoint-to-cloud security. With a cloud-delivered platform, we secure data for the world’s leading enterprises and ensure they comply with regulations while respecting the privacy of their team who now work anywhere. We are also trusted by millions of individuals around the world to protect their digital identity and mobile devices.
Why Wiz? At its core, magic is defined by a deep understanding of your environment and using natural means to create seemingly impossible outcomes. We wanted our company name to be born out of the notion that our approach to security is solving customer problems that seem impossible today. It allows us to emphasize our ambitious objective to completely change how we’re approaching cloud security .... as an industry. The magic ingredient? Every single person on team Wiz. We truly believe that as a company we are in a unique position to drive change and our name -Wiz- is the ultimate representation of exactly that.

Drink Sponsor



Cloud compliance We undergo independent verification of our security, privacy, and compliance controls to help you meet your regulatory and policy objectives. Find details on our full set of compliance offerings, like ISO/IEC 27001/27017/27018/27701, SOC 1/2/3, PCI DSS, VPAT (WCAG, U.S. Section 508, EN 301 549), and FedRAMP certifications, and alignment with HIPAA, GDPR, and CCPA, among others, in .... our compliance resource center. Data privacy Protecting the privacy of Google Cloud Platform and Google Workspace customers is a priority and codified in our Enterprise Privacy Commitments, which guide our security and privacy practices. Learn more about how we protect the privacy and keep you in control in our privacy resource center. Transparency We work to earn your trust through transparency. We state and adhere to a concrete set of trust principles that govern our approach to security. We only process data in accordance with our terms and data protection agreements and clearly outline our policies on responding to government requests.


Registration Sponsor



Security. Trust. Innovation. The Internet of Things represents the next great wave in business transformation. Today, BlackBerry already secures more than 500M endpoints including 175M cars on the road. Through independent research, Frost & Sullivan determined that BlackBerry is well-positioned to secure all IoT endpoints, and upwards of 96% of all cyber threats in the current landscape (read .... the Frost & Sullivan Assessment). BlackBerry is leading the way with a single platform for securing, managing, and optimizing how intelligent endpoints are deployed in the enterprise, enabling our customers to stay ahead of the technology curve that will reshape every industry.


Happy Hour Reception Sponsors



Why Comcast Business? Our products and services provide a significant value and are scalable to meet the needs of your organization. We treat customer service with the utmost importance; as such, we assign a dedicated account executive to your account to ensure the best customer experience. Our network is built to serve your business today and well into the future. So when you need carrier-grad .... e data and Internet services for business-critical applications, choose America’s leading enhanced fiber optic network, with speeds up to 100 Gbps, high reliability, and scalability. Each day our network handles up to 6 terabytes of Internet traffic per second each day, the Comcast network handles: Over 142 million completed phone calls Over 136 million delivered emails Over 12 million received voicemails Customer support The support structure we offer is just as important as the products and services we deliver. Trained technicians monitor our vast network 24/7 to optimize its performance. And our dedicated national account team is equipped to handle your needs.
Through our partnership, Fastly and CyberOne have a shared mission of helping customers improve their security capabilities with best-of-breed cybersecurity products, including Fastly’s Nex-Gen WAF, the first and only unified WAF solution.


VIP Sponsor



Synack, the most trusted crowdsourced security testing platform, delivers smarter penetration testing for dynamic attack surfaces on a continuous cadence. The company’s hacker-powered, AI-enabled pen test provides access to the best worldwide talent, scalable and smart technology, and insights that secure our nation's critical infrastructure and leading brands and businesses.



Event Agenda






  September 14, 2022 » 9:00 am - 10:00 am
Keynote Presentation - Where Are Bad Actors Taking Us Now: A Prevention And Enforcement Perspective
 
Speaker:
George Reeves
Cybersecurity Advisor
U.S. Department of Homeland Security

 
Speaker:
Marc Crudgington
Founder
CyberFore

 
Speaker:
Rob Kotarski
Supervisory Special Agent
Houston FBI
 
Presented By:

 
  September 14, 2022 » 10:00 am - 11:00 am
Closed - Please Tour and Evaluate Exhibitors
 
Presented By:

 
  September 14, 2022 » 11:00 am - 12:00 pm
Armis - The Current State of CyberSecurity: The Good, The Bad, and the Ugly
 
Speaker:
Terrence Davis
Sales Engineer
Armis
 
Presented By:

Today's CyberSecurity Landscape hasn't changed all that much in the last 10 to 15 years.  There are a few new threat vectors that have appeared recently that we all should be aware of, and of course, there are the old vectors that we've been seeing for years.  But it's not all doom and gloom.  There have been improvements.  I will cover the Good, the Bad, and the Ugly based on reports from some of the leading Investigation Reports in today's CyberSecurity Landscape.
 
  September 14, 2022 » 12:00 pm - 1:00 pm
Closed: Please attend the Lunch & Learn Sessions in Tech Theaters 2, 3, of VIP Theaters
 
Presented By:

 
  September 14, 2022 » 1:00 pm - 2:00 pm
Secureworks - Threat Hunting: What It Is and Isn’t
 
Speaker:
Robert Higham
CTU Senior Researcher
Secureworks
 
Presented By:

Companies of all shapes and sizes are compromised by threat actors despite heavy investments in security products and skilled resources. Why? Because threat actors are doing their best to blend in by limiting their use of custom malware and opting instead to use our own software and applications against us. Threat Hunting appears to be a viable solution but many companies struggle justifying the cost or fail to get the desired results. Join Secureworks Senior Security Researcher Robert Higham as he shares his experiences building a Threat Hunting program at a Fortune 50 company and training dozens of companies of various sizes, markets and countries across the globe to do the same.
 
  September 14, 2022 » 3:00 pm - 4:00 pm
Closed - Please Tour and Evaluate Sponsors
 
Presented By:

 
  September 14, 2022 » 4:00 pm - 5:00 pm
ThreatGen - Cybersecurity Skills Challenge
 
Presented By:


ThreatGEN® Red vs. Blue is the next evolution in cybersecurity education, training, and IR tabletop exercises. It is a game-based cybersecurity simulation platform that combines the power of an actual computer gaming engine and active adversary simulation A.I., to provide the most practical and effective way for ANYONE to learn cybersecurity, from beginners to experts, and even leadership.
 
  September 14, 2022 » 5:00 pm - 5:15 pm
Prizes and Giveaways
 
Presented By:

 
  September 14, 2022 » 9:00 am - 10:00 am
Closed - Please attend the Keynote Session in Tech Theater I
 
Presented By:

 
  September 14, 2022 » 11:00 am - 12:00 pm
Wiz - CNAPP – Finding the Worst Security Risks
 
Speaker:
Gabe Schuyler
Enterprise Solutions Engineer
WIZ
 
Presented By:

Are you familiar with the new category of ‘CNAPP’? Security challenges in the cloud are different than those that exist on-prem, but the overall processes to build and maintain a secure environment are the same. A cloud-native application protection platform is a simplified security architecture that enables enterprises to holistically benefit from the cloud-native ecosystem. It allows them to leapfrog the cost and complexity of siloed security products to a continuous security fabric, without major investments in tools or developer talent. Learn first-hand from the experts on the ROI/benefits of CNAPP and real-world approaches to deploying in your existing environment.
 
  September 14, 2022 » 12:00 pm - 1:00 pm
Orca Security - Cloud Security: Why Context Matters
 
Speaker:
Zac Wilson
Sr. Field Engineer
Orca Security
 
Presented By:

In 2021 alone, there were dozens of publicly disclosed data breaches involving misconfigured storage buckets, compromised credentials and ransomware. In 2022 and beyond, this is expected to climb as companies continue modernizing their applications and infrastructure in the cloud. Unfortunately, such modernization introduces a number of new challenges related to emerging concepts, technologies and complexities that can leave organizations vulnerable and exposed.  During this talk, Zac Wilson from Orca Security will be discussing current and emerging cloud security threats, reasons why cloud security is so challenging, best practices, lessons learned and why context is a key ingredient for delivering effective cloud security.
 
  September 14, 2022 » 1:00 pm - 2:00 pm
Arcserve - Immutable Storage: Level-Up Your Ransomware Readiness
 
Speaker:
Martin Merrill
Principle Consultant
Arcserve
 
Presented By:

Data is expected to grow to 200 ZB by the end of 2025.  That means more data to manage, more data to protect. IDC now recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new "1" is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies allows for a resilient recovery plan – and it’s critical that your cyber security plan includes a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us for this do-not-miss discussion as we share best practices to help keep your data protected and secure via multiple layers of defense.

Presenter, Martin Merrill, Principal Consultant Arcserve
 
  September 14, 2022 » 2:00 pm - 3:00 pm
HouSecCon - Building Cooperation and Understanding Between Security and IT
 
Speaker:
Dr. Gerald Auger, Phd
Founder, Simply Cyber & CISO
ThreatGen

 
Speaker:
Michael Farnum
CTO, Set Solutions & Founder
HouSecCon
 
Presented By:

Because many “older” information security/cybersecurity professionals started in an information technology (IT) role first, they understand IT and the role it plays in their organization. Today, it is common to go straight into the security field without working in IT first, but it is still important for the modern security professional and the modern IT professional to have a good understanding of each other’s mindsets and priorities.  Join Dr. Gerald Auger and Michael Farnum as they talk about the differences and parallels between IT and info/cyber security. There will also be some bonus discussion for those who are interested in moving from IT to cyber and what that looks like in today’s world.
 
  September 14, 2022 » 4:00 pm - 5:00 pm
Web3 Texas - Digital Wallets and Security
 
Speaker:
Nick James
Founder
WEB3 Texas
 
Presented By:

Do you know what a digital (crypto) wallet is?

Maybe you purchased some crypto or bought an NFT, on the whim of a YouTube or TikTok video or maybe a family member or friend showed you how.

In order to have purchased that crypto or NFT, let’s call them “digital assets”, it very likely that you created what’s called a digital wallet, or more commonly referred to as a crypto wallet.

The reality of the future is that in order to participate in the next version of the Web, aka Web3, you WILL need a digital wallet, just as you need a browser or app to access the internet today.

Little do many know, self-custody of these digital assets in one’s digital wallet poses a significant risk, if one does not know how to manage and secure the digital wallet.

In keeping with our mission, Web3 Texas will be presenting on this very topic at a very foundational level.

During this session, you can expect to learn at least, if not more, of the follow basics on digital wallets:

1. What is Web3
2. Why Bitcoin?
3. Major Industries in Web3
4. Pre-reqs to Accessing the Web3
5. Using Digital Wallets
6. How Wallets Work
7. Wallet Map
8. Protecting Wallet Credentials
9. Multi-Wallet & Wallet Twin
10. Wallet Permissions and Sessions
11. Avoiding Scams and Theft
12. Not Your Keys, Not Your Coins
13. Wallet Recovery

We believe that such foundational learning is crucial in everyone’s entrance and participation in Web3.

So please join us, in-person, as we explore Digital Wallets.
 
  September 14, 2022 » 5:00 pm - 5:15 pm
Prize Announcements and Giveaways in Tech Theater I
 
Presented By:

 
  September 14, 2022 » 8:00 am - 9:00 am
Closed: Time Dedicated to Touring and Evaluating our Sponsors
 
Presented By:

 
  September 14, 2022 » 9:00 am - 10:00 am
Closed - Please attend the Keynote Session in Tech Theater I
 
Presented By:

 
  September 14, 2022 » 11:00 am - 12:00 pm
Fluency - Observability is a Must Have Component of Your Cybersecurity
 
Speaker:
Christopher Jordan
CEO, Co-Founder
Fluency Security
 
Presented By:

Time-sensitive insights are a must have when your teams are dealing with nation state actors and criminal gangs.  Their use of technology is changing and advancing daily.  How can you deal with zero-day intrusions, BEC, or insider threats when you don't have depth of insight into your total infrastructure?  Combining live streaming analytics along with the ability to pull all your defense-in-depth security products together to get deeper insight is only the beginning of Observability.  Come learn how you can change your approach to the next level.
 
  September 14, 2022 » 12:00 pm - 1:00 pm
Iron Edge - Cybersecurity for Executives and Owners
 
Speaker:
Andrew Moore
Chief Operating Officer
Iron Edge
 
Presented By:

An informative overview of what executives and business owners need to know about the current state of cybersecurity. Dive into the events that are shaping security and what leaders can do to help prevent interruption to their businesses. Concrete steps are provided on ways to mitigate risk, secure business data and build a program for lasting results.
 
  September 14, 2022 » 1:00 pm - 2:00 pm
Darktrace - Stopping Attacks, Not Your Business: AI & Autonomous Response
 
Speaker:
Hayden Wood
Cyber Security Executive
Darktrace
 
Presented By:

With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join Hayden in this session where he explores the benefits of Autonomous Response as a must-have that goes beyond ‘defense’. Includes real-world threat finds and attack scenarios.
  
Topic for this session– Autonomous Response – 
Explore today’s threats and challenges

How advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough.
 
  September 14, 2022 » 5:00 pm - 5:15 pm
Prize Announcements and Giveaways in Tech Theater I
 
Presented By:

 
  September 14, 2022 » 8:00 am - 9:00 am
Closed: Time Dedicated to Touring and Evaluating our Sponsors
 
Presented By:

 
  September 14, 2022 » 9:00 am - 10:00 am
Closed - Please attend the Keynote Session in Tech Theater I
 
Presented By:

 
  September 14, 2022 » 11:00 am - 12:00 pm
Lookout - A Holistic Approach to Data Centric Cloud Security
 
Speaker:
Aaron Cockerill
Chief Strategy Officer
Lookout
 
Presented By:

As apps and data have moved to the cloud to support the hybrid work style, IT is struggling to protect data and to provide a secure and productive work environment.

Lookout can help. At Lookout, we deliver a full cloud security stack that allows you to secure your workforce and device, helps you secure access to private apps, and protects your data across various SaaS and cloud apps deployed in a multi cloud environment. Come join us to know more about how Lookout goes above and beyond to secure your data using the industry’s most advanced cloud security platform.
 
  September 14, 2022 » 12:00 pm - 1:00 pm
Closed: Please attend the Lunch & Learn Sessions in Tech Theaters 2, 3, of VIP Theaters
 
Presented By:

 
  September 14, 2022 » 1:00 pm - 2:00 pm
Axonius - Shrink the Attack Surface
 
Speaker:
Justin Moss
Senior Sales Engineer
Axonius
 
Presented By:

Discovering, identifying, inventorying, and assessing all digital assets — a continuous process known as Attack Surface Management (ASM) — is essential for organizations to secure their environment. After all, you can’t protect what you don’t know about.

External threats, vulnerabilities, shadow IT, and cloud misconfigurations are a few critical areas that may sneakily pose risks to organizations. The goal for IT and security teams looking to protect against these potential adversaries? Managing and shrinking the attack surface. This can be accomplished by focusing on asset visibility. 

Join this session and equip your team with the tools they need to create an ASM strategy. The session will provide you a new perspective on: 

 - How your existing technology can work together to discover all of your digital assets 
- Techniques for identifying, categorizing, and normalizing digital assets
 - Using an asset inventory to identify external threats, misconfigurations, shadow IT, and policy violations - Where to use automation to continuously assess your assets for threats 
- The future of ASM: Cyber Asset Attack Surface Management (CAASM) and External Attack Surface Management (EASM)
 
  September 14, 2022 » 5:00 pm - 5:15 pm
Prize Announcements and Giveaways in Tech Theater I
 
Presented By:

 
  September 14, 2022 » 8:00 am - 9:00 am
Closed: Time Dedicated to Touring and Evaluating our Sponsors
 
Presented By:

 
  September 14, 2022 » 9:00 am - 10:00 am
Closed - Please attend the Keynote Session in Tech Theater I
 
Presented By:

 
  September 14, 2022 » 11:00 am - 12:00 pm
CISO Roundtable - Creating A Culture of Organizational Resilience
 
Speaker:
Ali Qutob
CISO
The Hain Celestial Group

 
Speaker:
Mario Chiock
CISO & Fellow
Schlumberger

 
Speaker:
Moderator - Michael S. Oberlaender
Global Security Thought Leader & CISO
Company Strictly Confidential

 
Speaker:
Ross A. Leo
Chief Information Security Officer (CISO/DPO)
Galen Data

 
Speaker:
Doug Rinehart
Global CISO
Newfold Digital
 
Presented By:

Creating a Culture of Organization Resilience
According to Gartner, “The COVID-19 pandemic has exposed the inability of traditional business continuity management planning to support the organization’s response to a large-scale disruption. With continued disruption likely, it is recommended that risk leaders recognize organizational resilience as a strategic imperative and build an organization-wide resilience strategy that also engages staff, stakeholders, customers and suppliers.”
During this interactive Roundtable, the panel will discuss strategies centered on convincing the board to settle on risk tolerance levels and invest money in resiliency. Additionally, panelists will discuss strategies to develop, implement, and execute overall organizational resilience.
 
  September 14, 2022 » 12:00 pm - 1:00 pm
Dustin Sachs - Bias in Information Security
 
Speaker:
Dustin S. Sachs
Sr. Manager, Information Security Risk Management
World Fuel Services
 
Presented By:

Bias is an often misunderstood and underappreciated aspect of decision-making. However, similar to the observer principle in physics, the identification, and recognition of bias helps to alleviate its effects. In this session, we will discuss the types of bias that are most common in information security. We will discuss how the various biases affect such things as the risk assessment process. Finally, we will discuss ways to counter the biases to create a more objective.
 
  September 14, 2022 » 1:00 pm - 2:00 pm
Women In Technology Roundtable - Thriving in Tech: Conversations in Leadership
 
Speaker:
Aparna Mathur
VP Information Technology
Nabors Industries

 
Speaker:
Crystal C. Chatman
Head Of Information Security
Company Confidential

 
Speaker:
Dolly Kripalani
Vice President of IT
National Oilwell Varco

 
Speaker:
Ivelisse Torres
SNR Director of Information Security
ABM Industries

 
Speaker:
Maria O'Neill
Chief Information Officer
American Bureau of Shipping

 
Speaker:
Padma Sree Ventrapragada
VP Technology Risk and Controls
AIG

 
Speaker:
Paula Smetana Stuart
Chief Information Officer
Crescent Energy
 
Presented By:

Although most Top Executives believe DEI is important, how to implement a successful policy while successfully embedding it into the current culture is not clear and not easy.  Many leaders are not predisposed to discussing diversity and inclusion openly. Many don’t know even how to begin or whether the discussion will be well received.

In this session, our panelists we will discuss how accel in the historically male dominated Technology Industry. Our panelists will touch on challenges they’ve overcome while making professional strides; how building-in effective programs to promote diversity, equity and inclusion continues to improve the bottom line; how each has grown professionally as a result of past mentors/influences and DEI programs; and how they plan to or are currently mentoring the next wave of technology leaders. Finally, the sessions will commence with a look forward, and word from each of the panelists on the changes they foresee on the horizon.
 
  September 14, 2022 » 2:00 pm - 3:00 pm
CIO Roundtable - Composability in Action
 
Speaker:
Alexis Collins
Chief Information Officer
Norton Rose Fulbright

 
Speaker:
Joe Carroll
Chief Information Officer
Citgo Petroleum

 
Speaker:
Ken Piddington
CIO
US Silica Company

 
Speaker:
Lisa Rogers
Chief Information Officer
NOVA Medical

 
Speaker:
Sai Yedavelli
Chief Information Officer
LivaNova
 
Presented By:

According to Gartner research, “highly composable organizations recognize that iterative delivery processes, collaborative workstyles, and integrated systems drive better results.” 

Preparing and planning for uncertainty and embracing change is an art and essential for 2022 Executives. With the world and businesses in constant disruption, Leadership must position and execute agile processes and teams that are completely aligned with the business. Embracing Composability will be a game changer.

In this panel we will discuss best practices for developing cross-team collaboration and building out integration capabilities for data, analytics and applications.
 
  September 14, 2022 » 4:00 pm - 5:00 pm
Data Privacy Panel - Are You Ready For CPRA January 1, 2023 And The Forthcoming Federal Privacy Law?
 
Speaker:
Harvey Nusz
President
ISACA Greater Houston

 
Speaker:
Ajit Singh
Chief Information Officer
Southwestern National Bank

 
Speaker:
Doug Rinehart
Global CISO
Newfold Digital
 
Presented By:

Is Your Company Ready for CPRA? And a Possible Federal Privacy Law for the US? 
 
The purpose of this panel is to introduce you to the topic of Data Protection and Data Privacy, the upcoming Data Privacy Regulations, and how that is going to be big business. Our Moderator and Panelists will reveal and discuss what it will take to get ready for CPRA if your company must comply, as it will become effective 1/1/23, when the Virginia VCDPA law also becomes effective, and then identify the additional three state laws effective by 12/31/23. Takeaways also include:

1. The importance of continuous Data Discovery - especially for CPRA - and some requirements and points to consider when choosing a Discovery tool.

2. A few other key areas of CPRA and VCDPA, and points to consider in operationalizing data privacy. 

3. What is entirely different, and perhaps good, about the new US Federal Privacy Bill. 

Panelists and Moderator:

Panelist 1: Ajit Singh, CIO, Southwestern National Bank
Panelist 2: David Sledge, Director of IT, American Productivity and Quality Center.

Moderator: Harvey Nusz, Data Protection / Privacy Lead, in the Cybersecurity Practice of Capgemini.

Note: All three are Cybersecurity and Data Privacy Professionals, and are heavily involved in Data Protection / Data Privacy.
 
  September 14, 2022 » 5:00 pm - 5:15 pm
Prize Announcements and Giveaways in Tech Theater I
 
Presented By:

 







ThreatGen Cybersecurity Skills Challenge
Tech Theater I 4p-5p


Conference Exhibitors

Supporting Sponsors


Advisory Board




Diego Souza
Diego Souza
Global Cyber Security Executive | Board Advisor | Global Chief Information Security Officer
Cummins Inc.
Ernie Neumann
Ernie Neumann
CTO
Six Foot, LLC
Jerich Beason
Jerich Beason
CISO
Capital One
Jeff Roberts
Jeff Roberts
Founder & CEO
Innovation Vista
James Watson
James Watson
CIO
Total Safety US, Inc
Jim O'Brien
Jim O'Brien
US Business Unit Cyber Security Officer
CGI
Leticia Huerta
Leticia Huerta
Blockchain Products, Business Controls
Onyx by JPMorgan Chase
Mahendra Nambiar
Mahendra Nambiar
Founder
Aggregation Consulting
Mark Lynd
Mark Lynd
Top 10 Global AI & Cybersecurity Professional
Relevant Track
Mike Till
Mike Till
CTO
Treverity
Moderator - Michael S. Oberlaender
Moderator - Michael S. Oberlaender
Global Security Thought Leader & CISO
Company Strictly Confidential
Reid Wisa
Reid Wisa
Global Cyber Security Director | Board Advisor | MBA | Master of Computer Science | CISSP | CRISC | Head of Information Security
Tailored Brands, Inc.
Robert Harris
Robert Harris
Vice President of Engineering
ONE Discovery Inc.
Sindhu Menon
Sindhu Menon
Chief Information Officer
Harris County
Stephen Webster
Stephen Webster
Head of Microgrid OS
Enchanted Rock
Worth Davis
Worth Davis
Senior Vice President
Calian
Xiaoying Hu
Xiaoying Hu
Cybersecurity Manager
Katy ISD
Sada Krishnan
Sada Krishnan
AVP of IT
Situs
Ross A. Leo
Ross A. Leo
Chief Information Security Officer (CISO/DPO)
Galen Data

ElevateIT: Houston Technology Summit 2021