ElevateIT: Houston Technology Summit 2021

NRG Center
October 13, 2021
1 NRG Park Houston, TX 77054

Expanding and Evolving within the Digital Revolution

At the heart of the Digital Revolution is quick-term, short-term, and long-term growth and profitability. The acceleration of automation development from inception throughout the supply chain will drive customer demands now and in the future. Simply put, companies embracing faster a positive seamless digital customer experience will be the relevant companies for the future. Employing effective digitization both internally and externally will create efficiency, more effective use of resources, and evolution of culture. Are you ready for 2021 and the Digital Revolution?

The 3rd Annual ElevateIT: Houston Technology Summit will now be hosted both in-person & virtually on October 13th, 2021.

The ElevateIT: Houston Technology Summit is designed with your goals in mind, and we are excited to connect you with local experts and resources to assist with your IT & Security needs. We hope you will join us for a full day of Peer-to-Peer Networking, Educational Presentations by Industry Leaders, and 50+ vendors to evaluate. Be sure to attend, either live or virtually, and be entered to win one of our Grand Prize Drawings for 1-of-2 Pre-paid Visa Gift Cards totaling $5000!


Featured Speaker Kevin Mitnick
World's Most Famous Hacker







World's Most
Famous Hacker
Once one of the FBI’s Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide. Kevin and his Global Ghost Team™ now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering. As CEO and chief “white hat” hacker at one of the most advanced boutique security firms in the world, Kevin mentors leaders, executives, and staff on both the theory and practice of social engineering, topics on which he is the leading global authority. Kevin also helps consumers—from students to retirees—learn how to protect their information and themselves from harm, using understandable terms and a friendly approach. Kevin’s insights on current events are highly sought, leading to hundreds of media appearances. He has been a commentator, security analyst, or interview subject on CNN, CNBC, Al Jazeera, FOX News, CBC, BBC, Radio Moscow, Tech TV, National Public Radio, Playboy, Good Morning America, and 60 Minutes—to name just a few. He has been called before Congress (both the House and the Senate) to testify on security matters affecting the United States. Kevin also works in partnership with KnowBe4 to produce critically acclaimed security awareness training programs to counteract social engineering and to improve security effectiveness. Kevin's books include 'Art of Intrusion: The Real Story Behind the Exploits of Hackers, Intruders and Deceivers' and 'Art of Deception: Controlling the Human Element of Security, which are mandatory readings for security professionals. His autobiography, 'Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker, a New York Times bestseller, is now available in fifteen languages.

Title: Worlds Most Famous Hacker

He’s the catalyst of the information security industry, a best-selling author, renowned security speaker and the head of an elite information security firm with a 100% success rate. All of that began with Kevin’s action-packed rise through the ranks of hackers worldwide, driven by an insatiable curiosity, a passion for seemingly impossible challenges and an unstoppable sense of humor.

Tech Theater I | 4pm - 5pm







THE ElevateIT
ADVANTAGE


ElevateIT inspires and empowers idea creation through a disruptive transformational culture by attracting the finest speakers and vendors imparting solid strategies able to quickly be implemented within Enterprises and Start-Ups alike.

We strive to bring together the ever-changing multi-facets of the Technology Industry in a fun, safe and informative atmosphere and feel fortunate to have good friends, good partners and a priceless reputation with our industry community. See what we mean for yourself by watching our summit videos.



Gold Sponsors



Security. Trust. Innovation. The Internet of Things represents the next great wave in business transformation. Today, BlackBerry already secures more than 500M endpoints including 175M cars on the road. Through independent research, Frost & Sullivan determined that BlackBerry is well-positioned to secure all IoT endpoints, and upwards of 96% of all cyber threats in the current landscape (read .... the Frost & Sullivan Assessment). BlackBerry is leading the way with a single platform for securing, managing, and optimizing how intelligent endpoints are deployed in the enterprise, enabling our customers to stay ahead of the technology curve that will reshape every industry.
Your Technology. Simplified. Delivered. Managed. Computex Technology Solutions is an award-winning solution provider committed to helping customers evolve their business through technology for over 30 years. We create seamless, integrated technology experiences that inspire your team to greater heights. Our expertise, software, and services combine to help enterprises stand with us at the forefron .... t of cloud connectivity and collaboration. Our goals are yours, and together we will surpass them. Awarded as the largest Cybersecurity firm in Houston by HBJ, Computex can streamline your processes, and tailor any solution to your business. With our SOC (Security Operations Center) as-a-service, we can monitor, detect, prevent, and mediate any threats alongside our Everything-as-a-Service (XaaS) solutions and 24x7x365 support from our certified engineers and architects.
Malwarebytes secures endpoints, making workplaces resilient. Our adaptive cyber protection predicts and detects attacks with multi-layer detection across the kill chain. We enable active threat response with machine learning that is actionable and automated, allowing for full recovery when a compromise occurs. We empower enterprise endpoint orchestration across siloed IT and Security organizations .... , simplifying security management, and making responses effective. Malwarebytes makes endpoints resilient so workplaces can protect and remediate, and employees can regain control of their digital lives.
Connected devices are now a significant part of the network ecosystem across all industries. These devices can range widely, from cameras and payment card systems to medical devices and HVAC control systems, and are a critical part of business operations. However, they cannot be taken out of service, even to be patched, and typically have an expected service life of many years. Often, these device .... s run rudimentary operating systems, and cannot support corporate endpoint security agents. Ordr is IoT device security made simple. Ordr makes it easy to secure the millions of enterprise IoT and unmanaged devices such as manufacturing machines, building systems, medical equipment, printers and more that run within global networks. Ordr is the only purpose-built platform to discover and secure every unmanaged device – IoT, OT, and IoMT. The Ordr Systems Control Engine (SCE) will discover every connected device, profile device behaviors and risks, and automate response. Ordr not only identifies devices with vulnerabilities, weak ciphers, weak certificates, and active threats, but also those that exhibit malicious or suspicious behaviors. Ordr enables networking and security teams to easily automate response by dynamically creating policies that isolate mission-critical devices, those that share sensitive data (PCI, PHI, PII) or run vulnerable operating systems. The Ordr platform can be deployed on-premise or in the cloud, and offers a zero-touch, agentless deployment.


Lunch & Learn Sponsors



Since 1996, Extreme has been pushing the boundaries of networking technology, driven by a vision of making it simpler and faster as well as more agile and secure. But our higher purpose has always been helping our customers connect beyond the network… strengthening their relationships with those they serve. Today, we call that Customer-Driven Networking.
Your Organization Runs on Email. It’s the main way you communicate internally and externally and you rely on it being available all day, every day. It’s a gateway to other critical IT systems and home to a treasure trove of corporate information your employee's value. For all it offers, email needs to be protected and managed or it risks exposing your organization and your data to attack. Your .... customers and your supply chain are far too valuable to take that chance. It also needs to be effectively archived to meet growing compliance, e-discovery, and legal obligations.
We are the only security vendor that accelerates your digital transformation journey with a proven security platform that is data-centric, cloud-smart, and as fast as your business.
KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. With KACE, you can effectively address your endpoint management needs with individual products for specific tasks or as an integrated .... UEM solution.


Breakfast Sponsors



Area 1 is rooted in our founders’ experience in national security — including gaining advanced insight into potential missile strikes to preempt those attacks before launch. In other words — preempting attacks while in enemy territory. This proactive approach, when applied to cybersecurity, shifts the email security industry paradigm. You can no longer afford to get Phished first, then respo .... nd after. Area 1’s enhanced detection models go into the wild to preemptively detect and thwart sophisticated attacks like Business Email Compromise, malware, credential harvesting, and other financial fraud that evade email gateways (SEGs) and cloud email suites.


Breakout Presentation Sponsors



As the world’s most experienced provider of backup and disaster recovery solutions, for 35 years we’ve been solving the challenges of IT teams by bringing innovation, ambition, and countless hours of iteration to the solutions they rely on to keep businesses running smoothly. In the process, we’ve redefined the way companies protect their data – the very foundation of modern business in an .... era where immediate access to critical systems and applications is key to business continuity and essential to continuing growth and success.
The Aviatrix cloud network platform delivers the advanced cloud networking, security and operational visibility that enterprises require, while maintaining the simplicity and agility of cloud. More than 550 customers worldwide leverage Aviatrix to design and operate their enterprise cloud network and security consistently in and across all their public clouds.
Protecting corporate networks, cloud and virtualized environments, IoT and industrial control systems, Darktrace autonomously detects and fights back against emerging cyber-threats across the enterprise.
For over 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing and easy-to-use products give consumers and businesses the peace of mind to enjoy the full potential of their technology.
Forcepoint is the leading user and data protection cybersecurity company, entrusted to safeguard organizations while driving digital transformation and growth. Our solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value.
The traditional reseller at the time was focused on selling as much equipment as possible to as many customers as possible. By contrast, Layer 3 Communications’ founding theory was that our success would be determined by our ability to deliver compelling services to our customers with equipment just being a means to an end. Consistent with that theory our first three hires were engineers who con .... tinue to work at Layer 3 Communications today. In fact, Greg Hart, our first addition to the team now runs the entire engineering organization. Throughout our history, we have maintained the philosophy that the people who work at Layer 3 are our value proposition, not the equipment on our line card. In 2004 Craig Wall was living in Austin and had a senior business development role at Dell Computer. He independently developed the same philosophy - customers needed services, not more hardware. He joined the growing Layer 3 Communications team and formed the Western Region. Today, Layer 3 Communications has offices throughout the Southeast and Texas. While the services and products we offer continue to evolve, we still hang our hat on the belief that customers do business with us because of the smart people who work here not what equipment they can buy from us.
For far too long, security companies have been content to pacify customers with detect-and-remediate solutions that are no match for today’s smartest malware. Menlo Security is a different breed. We believe: ~ Security should prevent, not react. ~ Organizations shouldn’t have to sacrifice productivity for security. ~ Perfect security is possible. As a group of unrelenting cybersecurity .... experts, we pioneered an entirely reimagined, impervious approach to security. One that’s built on Zero Trust principles and that leverages isolation as a core architectural pillar. It’s the only way to truly eliminate malware, secure work, and protect productivity—the stuff that matters most to the businesses we work with and their end users. As migration to the cloud quickens and application workloads move to SaaS, security is being rearchitected to meet a new set of challenges. Menlo Security is at the forefront of this shift—empowering organizations to adapt and map their journey to Secure Access Service Edge (SASE) and beyond.

Silver Sponsors



Arista Networks is an industry leader in cognitive cloud networking solutions for large data center and campus environments. Arista’s award-winning platforms deliver availability, agility, automation analytics, and security through CloudVision® and Arista EOS®, an advanced network operating system. For more information, visit www.arista.com.
Cloudian® is a Silicon Valley-based file and object storage company specializing in S3-compatible object storage systems. With technology roots in the large-scale enterprise message space, Cloudian introduced its object-based platform, HyperStore®, in 2011. Cloudian products are offered by partners including VMware, Hewlett Packard Enterprise, and QCT, and by reseller partners worldwide. Cloudia .... n was founded with a clear vision: to revolutionize data storage by bringing object storage to the enterprise. Unlike the expensive, complex, and proprietary object storage products which came before it, Cloudian’s technology allows all sizes and types of users to realize the benefits of object storage in their own data centers. Conquer the Unstructured Data Challenge Datacenter managers, broadcasters, researchers, and software developers need solutions to help them contend with the explosive growth in unstructured data. Across all industries – from media to medical, to industrial – new applications, formats, and technologies are driving this rapid increase of data, creating issues around storage costs and complexity. An affordable, highly scalable, easy-to-use storage system was needed. The Answer: A Standard API and Limitless Scalability First, the revolutionary new solution needed to be built on a widely accepted API that software developers would embrace. Amazon’s S3-API was rapidly becoming the de facto object storage standard. Next, the solution demanded a highly scalable platform. Cloudian already had such an S3 object storage platform — the company’s genesis was in the world of large-scale wireless messaging systems with Gemini Mobile, an innovator in the design and deployment of the first mobile messaging platforms. Cloudian built a platform to meet these needs and requirements and launched the HyperStore object storage solution in 2011. Cloudian’s most recent achievement towards the vision to revolutionize enterprise storage is the launch of Cloudian HyperFile®, the industry’s first object storage-based file solution to combine full enterprise-class NAS feature set and scale-out performance, saving companies 70% TCO vs traditional NAS. Today, enterprises and service providers alike are building reliable, affordable, and scalable storage solutions with Cloudian, the leading fully native S3 file and object storage solution.


Happy Hour Reception Sponsors



We believe that simplicity is the foundation of modern data management. Our mission is to radically simplify how organizations manage their data and unlock limitless value. Your data is a uniquely valuable asset to the business, but first, it needs to be protected and available at all times. With the Cohesity platform, you can ensure continuity and repurpose your data for additional value. Start b .... y eliminating infrastructure silos to remove cost and complexity, then do more with your data through value-added apps and services. One Platform. Limitless Potential. Your Choice. The Industry’s First Comprehensive Multicloud Platform for Data Management Services.
NETdepot is a world-leading managed infrastructure and cloud services provider whose mission is to provide an excellent, frictionless customer experience. We strive to enamor our customers by accelerating the time to value of our products and by creating successful outcomes through well-architected solutions. As a company with over 20 years of success, industry leadership, and expertise, our partn .... ers can plan their growth strategies around our foundry of products and services. We focus exclusively on five key areas: Compute Storage Backups as a Service (BaaS) Disaster Recovery as a Service (DRaaS) Security as a Service (SECaaS)
Today, there’s more data and users outside the enterprise than inside, causing the network perimeter as we know it to dissolve. We need a new perimeter. One that is built in the cloud, and follows and protects data — wherever it goes. One that provides protection without slowing down or creating friction for the business. One that enables fast and secure access to the cloud and web using one o .... f the world’s largest and fastest security networks, so you never have to sacrifice security for performance. This is the new perimeter. This is the Netskope Security Cloud. Reimagine your perimeter.



Event Agenda
Download Agenda













Intelligent Automation Panel
Fundamentals for Intelligent Automation Enablement (Tech Theater 1 9AM - 10AM)




Allen Wuescher
Vice President and CIO
Toshiba Intl. Corporation

Sudhakar Virupakshi
Chief Information Officer
Par Pacific - Stanford, MIT

Sonya Bridges
AVP of IT Solutions
DFW International Airport

Ajit Singh
Chief Information Officer
Southwestern National Bank


Embracing Intelligent Automation to enrich employee and customer experiences, enhance data utilization and protection, reduce cost while fostering collaboration, transparency and trust is top of mind for decision makers in 2021 and beyond.

Analysis and measurement along with streamlining processes have overwhelmingly supported automating key functions faster, better cheaper. Effectively using Data Analytics across all functions of the Enterprise have been key to successful automation projects. Keeping data safe at rest and in motion is a must to have ongoing confidence in Intelligent Automation systems.

Cybersecurity is an important and fundamental component of success of any Intelligent Automation initiative. Preventative measures to avert security incidents is necessary as post event detection is meaningless to operations. Breaches of automated systems will cause abrupt systemic failures with a high risk of large negative operational impact that will take time and intellectual sophistication to research and resolve.

The most enlightened companies have Data Scientists on board to support intelligent automation initiatives and need a solid approach to securing these initiatives. Cyber-attacks and security tools evolve rapidly and keeping current with the latest technology in this space is a perpetual initiative. 

Please join these Top Executive thought leaders for insights in a frank discussion.


Conference Exhibitors

Supporting Sponsors


Advisory Board




Diego Souza
Diego Souza
Managing Director - Cyber Security
United Airlines
Ernie Neumann
Ernie Neumann
VP of IT & Infrastructure Operations
Six Foot, LLC
Hector Paredes
Hector Paredes
CIO
YAS Partners Corporation
Jerich Beason
Jerich Beason
CISO
Epiq
James Watson
James Watson
CIO
Total Safety US, Inc
Jeff Roberts
Jeff Roberts
Executive Managing Director, IT
JLL Capital Markets
Jim O'Brien
Jim O'Brien
US Business Unit Cyber Security Officer
CGI
Leticia Huerta
Leticia Huerta
Cybersecurity and Integrated Risk Management
ENGIE North America Inc
Mahendra Nambiar
Mahendra Nambiar
CIO
Johnson Law Group
Mark Lynd
Mark Lynd
Top 10 Global AI & Cybersecurity Professional
Relevant Track
Mike Till
Mike Till
CTO
Treverity
Michael S. Oberlaender
Michael S. Oberlaender
Global Security Thought Leader & CISO
Company Strictly Confidential
Sada Krishnan
Sada Krishnan
AVP of IT
Situs
Ross A. Leo
Ross A. Leo
CISO
ObserveSmart Invisalert Solutions, Inc
Robin Austin
Robin Austin
CTO
Colliers Group
Reid Wisa
Reid Wisa
Enterprise Security Lead
GE Oil & Gas
Sindhu Menon
Sindhu Menon
CIO
City of College Station
Robert Harris
Robert Harris
Director of Information and Technology
Driven Inc
Stephen Webster
Stephen Webster
MRE Consulting
CTO
Worth Davis
Worth Davis
EVP/Chief Technology Officer
Computex
Xiaoying Hu
Xiaoying Hu
CISO
City of College Station

ElevateIT: Houston Technology Summit 2021