ElevateIT: Houston Technology Summit 2022

NRG Center
September 14, 2022
1 NRG Park Houston, TX 77054

Optimizing Intelligent Change for the Future

How do I help my company keep and grow market base within this most disruptive chaotic time in history? Can I capitalize on the disruption to create a competitive advantage? How do I create value while maintaining digital trust? Once you have created a flexible strategic business model both on paper and in practice that answers these 3 questions, you will be in prime position for 2022 and beyond.

Managing change intelligently includes weaving in three main strategic attributes: Tightly integrated, comprehensive and intelligently automated. 
The profitable digital marketplace requires transactional immediacy and transactional immediacy requires digitizing and securing data, applications and workflows both at rest and in process.
 
Today without question, data protection and process security (cybersecurity) are the top strategic components of governance and innovation, bumping it up to first position with governance impact. Adding digital cybersecurity for accuracy and speed can be key to adding value and trust. And “trust” is THE  key characteristic to grow customers for 2022.
The second position, and just as important is a positive customer experience which also includes “a reputation KPI” that is intuitively based on behavioral analytics that is easy to use with a very personal “touch.” Although the vast number of customers are digital natives and enjoy the push button experience, they also expect it to be proactively personal, familiar, and private.

The go-to companies for 2022 must have a positive reputation which includes customer data protection, quality products and services and proactive, consistent and on-time delivery. The way forward is the hyper intelligent digital marketplace. Are you making the right decisions for a marketplace edge for 2022 and beyond? Join us for these discussions and ElevateIT’s  promise for delivering valuable and impactful and timely content.

Keynote Presentation

Where Are Bad Actors Taking Us Now: A Prevention And Enforcement Perspective













THE ElevateIT
ADVANTAGE


ElevateIT inspires and empowers idea creation through a disruptive transformational culture by attracting the finest speakers and vendors imparting solid strategies able to quickly be implemented within Enterprises and Start-Ups alike.

We strive to bring together the ever-changing multi-facets of the Technology Industry in a fun, safe and informative atmosphere and feel fortunate to have good friends, good partners and a priceless reputation with our industry community. See what we mean for yourself by watching our summit videos.



Gold Sponsors



Armis offers the markets leading asset intelligence platform designed to address the new threat landscape that connected devices create. 40 Fortune 100 companies trust our real-time, and continuous protection to see with full context all managed, unmanaged assets across IT, Cloud, IoT devices, medical devices (IoMT), operational technology (OT), and industrial control systems (ICS), and 5G. .... About Page Hero Armis customers are from across all industries, verticals, and segments including governments, state, local, education (SLED), healthcare, critical infrastructure providers (CIP), retail, manufacturing, smart cities, transport, energy including organizations such as Colgate Palmolive, Allegro Microsystems, Takeda Pharmaceuticals, Mondelez, PepsiCo, DocuSign, the Booking Group, and many more. Armis is a privately held company headquartered in Palo Alto, California.


Lunch & Learn Sponsors



Orca Security provides comprehensive security and compliance for AWS, Azure, and GCP - without the gaps in coverage, alert fatigue, and operational costs of agents. Orca’s Cloud Security Platform detects and prioritizes risks in minutes ﹣ not months ﹣ and is trusted by global innovators, including Databricks, Autodesk, and Gannett.


Breakfast Sponsors






Sponsorship Available




Breakout Presentation Sponsors



As the world’s most experienced provider of backup and disaster recovery solutions, for 35 years we’ve been solving the challenges of IT teams by bringing innovation, ambition, and countless hours of iteration to the solutions they rely on to keep businesses running smoothly. In the process, we’ve redefined the way companies protect their data – the very foundation of modern business in an .... era where immediate access to critical systems and applications is key to business continuity and essential to continuing growth and success.
AXONIUS. /Ax-OH-nee-us/ (noun) 1. A team of ambitious, hard-working, and driven people taking on the biggest challenges in IT and security today. (See also: Axonians.) 2. A platform that correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action to control complexity. Solving a Foundational Challenge Without an accurate understanding .... of what’s in your environment, everything else suffers. But IT and security teams struggle to manage a complex sprawl of devices, users, cloud services, and software. And traditional approaches to compiling an asset inventory are manual and error-prone. So in 2017, after years in the Israel Defense Forces’ Unit 8200, our co-founders came together to solve that age-old problem.
Protecting corporate networks, cloud and virtualized environments, IoT and industrial control systems, Darktrace autonomously detects and fights back against emerging cyber-threats across the enterprise.
Fluency is the only SIEM that is fully compliant with Sigma, the open source standard in SIEM rules. Fluency can run all Sigma rules simultaneously without a performance hit. There is no conversion of rules, nor is there down selection. The rules analyze data as it enters the system, always creating real time alerts, meaning zero mean time to detection (MTTD). Fluency is even compatible to the pro .... posed features of Sigma. This means that your analysts benefit from the largest community of open source researchers for log analysis. ​ It doesn't stop with Sigma. Fluency is the only pure real time SIEM. Fluency watches data as it is collected, while traditional SIEMs store data and then search a database to detect. Fluency maintains state and alerts immediately upon a match. Stateful detection allows for machine learning and historical correlation to improve the accuracy, therefore reducing noise and alert fatigue. A database query is a pitiful means of detection. Detection is a balancing act of matching knowledge to the event, while excluding matches that are wrong. Good security considers not just fields and values. Good security considers state, situational knowledge, environment, and history. There is more to quality detection than what can be placed in a database search.
Our mission is to secure and empower productivity in a privacy-focused world, where work and play can happen anywhere. With everything now in the cloud, it’s critical that cybersecurity follows you wherever you go, securing your data from the endpoint all the way to the cloud. Mobility and cloud technology have become essential, as most of us now work and manage our personal lives digitally. Wit .... h a platform that integrates endpoint and cloud security technologies, Lookout solutions can be tailored for any industry and any company size, from individual users to large global enterprises and governmental organizations. In 2007, Lookout co-founders, John Hering, Kevin Mahaffey and James Burgess came together with a goal of protecting people from the security and privacy risks that emerge as the world becomes more connected. Before smartphones were in everyone’s pocket, they recognized that mobility would have a profound impact on the way we work and live. Fast forward to today, Lookout is the leader in delivering integrated endpoint-to-cloud security. With a cloud-delivered platform, we secure data for the world’s leading enterprises and ensure they comply with regulations while respecting the privacy of their team who now work anywhere. We are also trusted by millions of individuals around the world to protect their digital identity and mobile devices.
Why Wiz? At its core, magic is defined by a deep understanding of your environment and using natural means to create seemingly impossible outcomes. We wanted our company name to be born out of the notion that our approach to security is solving customer problems that seem impossible today. It allows us to emphasize our ambitious objective to completely change how we’re approaching cloud security .... as an industry. The magic ingredient? Every single person on team Wiz. We truly believe that as a company we are in a unique position to drive change and our name -Wiz- is the ultimate representation of exactly that.

Silver Sponsors






Sponsorship Available




Drink Sponsor



Cloud compliance We undergo independent verification of our security, privacy, and compliance controls to help you meet your regulatory and policy objectives. Find details on our full set of compliance offerings, like ISO/IEC 27001/27017/27018/27701, SOC 1/2/3, PCI DSS, VPAT (WCAG, U.S. Section 508, EN 301 549), and FedRAMP certifications, and alignment with HIPAA, GDPR, and CCPA, among others, in .... our compliance resource center. Data privacy Protecting the privacy of Google Cloud Platform and Google Workspace customers is a priority and codified in our Enterprise Privacy Commitments, which guide our security and privacy practices. Learn more about how we protect the privacy and keep you in control in our privacy resource center. Transparency We work to earn your trust through transparency. We state and adhere to a concrete set of trust principles that govern our approach to security. We only process data in accordance with our terms and data protection agreements and clearly outline our policies on responding to government requests.


Registration Sponsor



Security. Trust. Innovation. The Internet of Things represents the next great wave in business transformation. Today, BlackBerry already secures more than 500M endpoints including 175M cars on the road. Through independent research, Frost & Sullivan determined that BlackBerry is well-positioned to secure all IoT endpoints, and upwards of 96% of all cyber threats in the current landscape (read .... the Frost & Sullivan Assessment). BlackBerry is leading the way with a single platform for securing, managing, and optimizing how intelligent endpoints are deployed in the enterprise, enabling our customers to stay ahead of the technology curve that will reshape every industry.


Happy Hour Reception Sponsors



Why Comcast Business? Our products and services provide a significant value and are scalable to meet the needs of your organization. We treat customer service with the utmost importance; as such, we assign a dedicated account executive to your account to ensure the best customer experience. Our network is built to serve your business today and well into the future. So when you need carrier-grad .... e data and Internet services for business-critical applications, choose America’s leading enhanced fiber optic network, with speeds up to 100 Gbps, high reliability, and scalability. Each day our network handles up to 6 terabytes of Internet traffic per second each day, the Comcast network handles: Over 142 million completed phone calls Over 136 million delivered emails Over 12 million received voicemails Customer support The support structure we offer is just as important as the products and services we deliver. Trained technicians monitor our vast network 24/7 to optimize its performance. And our dedicated national account team is equipped to handle your needs.
CyberOne is a dedicated cybersecurity company that improves the security capabilities of customers cost effectively. While focused on services, CyberOne also resells best-of-breed products to provide a complete solution. We partner with our clients to align and execute their long-term security strategy. What Guides Us? Trust. As your security partner, our commitment is to build and maintain .... trust through complete transparency and total alignment on your key objectives. Respect. Respect is something to be earned. We'll set a clear path for objectives with you and show you how we'll achieve them. Open Communication. Relationships are the foundation of our business. We'll work with you to ensure an open dialogue as often as you would like. No conversation is ever too trivial. Accountability. It’s our responsibility to set clear expectations, manage them on your behalf, and own up in the unlikely event that something does not go as intended.
Where developers dream bigger. Developers change the way the world experiences the web: they drive the next groundbreaking innovation, power the companies that connect us and create experiences that can transform our lives. And we built Fastly to make sure they always have what they need to make it happen. Our powerful edge cloud network empowers developers to run, secure, and deliver websites and .... applications — as close to the users as possible, to create unforgettable experiences a global scale. Built by developers. Driven by values. There’s so much more to Fastly than technology. At the heart of our work, we aim to improve human lives — and from the beginning, we’ve grown with a deliberate focus on transparency, integrity, and inclusion.



Event Agenda






  September 14, 2022 » 8:00 am - 9:00 am
Keynote Presentation - Where Are Bad Actors Taking Us Now: A Prevention And Enforcement Perspective
 
Speaker:
Nick Adam, Managing Director
JPMorgan Chase

 
Speaker:
Rob Kotarski, Supervisory Special Agent
Houston FBI

 
  September 14, 2022 » 11:00 am - 12:00 pm
Armis - Title TBD
 
Presented By:

TBD
 
  September 14, 2022 » 9:00 am - 10:00 am
TBD - Breakfast Sponsor

 
  September 14, 2022 » 10:00 am - 11:00 am
Closed - Please Tour and Evaluate Exhibitors
 
Presented By:

 
  September 14, 2022 » 12:00 pm - 1:00 pm
Closed - Please Tour and Evaluate Exhibitors
 
Presented By:

 
  September 14, 2022 » 1:00 pm - 2:00 pm
TBD

 
  September 14, 2022 » 2:00 pm - 3:00 pm
TBD

 
  September 14, 2022 » 3:00 pm - 4:00 pm
Closed - Please Tour and Evaluate Sponsors
 
Presented By:

 
  September 14, 2022 » 3:00 pm - 4:00 pm
ThreatGen - Cybersecurity Skills Challenge

 
  September 14, 2022 » 5:00 pm - 6:00 pm
Prizes and Giveaways

 
  September 14, 2022 » 8:00 am - 9:00 am
Closed - Please Tour and Evaluate Exhibitors
 
Presented By:

 
  September 14, 2022 » 9:00 am - 10:00 am
Closed - Please Tour and Evaluate Exhibitors
 
Presented By:

 
  September 14, 2022 » 10:00 am - 11:00 am
TBD

 
  September 14, 2022 » 11:00 am - 12:00 pm
Wiz - CNAPP – Finding the Worst Security Risks
 
Presented By:

Are you familiar with the new category of ‘CNAPP’? Security challenges in the cloud are different than those that exist on-prem, but the overall processes to build and maintain a secure environment are the same. A cloud-native application protection platform is a simplified security architecture that enables enterprises to holistically benefit from the cloud-native ecosystem. It allows them to leapfrog the cost and complexity of siloed security products to a continuous security fabric, without major investments in tools or developer talent. Learn first-hand from the experts on the ROI/benefits of CNAPP and real-world approaches to deploying in your existing environment.
 
  September 14, 2022 » 12:00 pm - 1:00 pm
Orca Security - Cloud Security: Why Context Matters
 
Speaker:
Zac Wilson, Sr. Field Engineer
Orca Security
 
Presented By:

In 2021 alone, there were dozens of publicly disclosed data breaches involving misconfigured storage buckets, compromised credentials and ransomware. In 2022 and beyond, this is expected to climb as companies continue modernizing their applications and infrastructure in the cloud. Unfortunately, such modernization introduces a number of new challenges related to emerging concepts, technologies and complexities that can leave organizations vulnerable and exposed.  During this talk, Zac Wilson from Orca Security will be discussing current and emerging cloud security threats, reasons why cloud security is so challenging, best practices, lessons learned and why context is a key ingredient for delivering effective cloud security.
 
  September 14, 2022 » 1:00 pm - 2:00 pm
Arcserve - Immutable Storage: Level-Up Your Ransomware Readiness
 
Speaker:
Martin Merrill, Principle Consultant
Arcserve
 
Presented By:

Data is expected to grow to 200 ZB by the end of 2025.  That means more data to manage, more data to protect. IDC now recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new "1" is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies allows for a resilient recovery plan – and it’s critical that your cyber security plan includes a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us for this do-not-miss discussion as we share best practices to help keep your data protected and secure via multiple layers of defense.

Presenter, Martin Merrill, Principal Consultant Arcserve
 
  September 14, 2022 » 2:00 pm - 3:00 pm
TBD

 
  September 14, 2022 » 3:00 pm - 4:00 pm
TBD

 
  September 14, 2022 » 4:00 pm - 5:00 pm
Web3 Texas - Digital Wallets and Security
 
Speaker:
Nick James, Founder
WEB3 Texas
 
Presented By:

Do you know what a digital (crypto) wallet is?

Maybe you purchased some crypto or bought an NFT, on the whim of a YouTube or TikTok video or maybe a family member or friend showed you how.

In order to have purchased that crypto or NFT, let’s call them “digital assets”, it very likely that you created what’s called a digital wallet, or more commonly referred to as a crypto wallet.

The reality of the future is that in order to participate in the next version of the Web, aka Web3, you WILL need a digital wallet, just as you need a browser or app to access the internet today.

Little do many know, self-custody of these digital assets in one’s digital wallet poses a significant risk, if one does not know how to manage and secure the digital wallet.

In keeping with our mission, Web3 Texas will be presenting on this very topic at a very foundational level.

During this session, you can expect to learn at least, if not more, of the follow basics on digital wallets:

1. What is Web3
2. Why Bitcoin?
3. Major Industries in Web3
4. Pre-reqs to Accessing the Web3
5. Using Digital Wallets
6. How Wallets Work
7. Wallet Map
8. Protecting Wallet Credentials
9. Multi-Wallet & Wallet Twin
10. Wallet Permissions and Sessions
11. Avoiding Scams and Theft
12. Not Your Keys, Not Your Coins
13. Wallet Recovery

We believe that such foundational learning is crucial in everyone’s entrance and participation in Web3.

So please join us, in-person, as we explore Digital Wallets.
 
  September 14, 2022 » 5:00 pm - 6:00 pm
Closed - Please Tour and Evaluate Exhibitors
 
Presented By:

 
  September 14, 2022 » 8:00 am - 9:00 am
Closed - Please Tour and Evaluate Exhibitors
 
Presented By:

 
  September 14, 2022 » 9:00 am - 10:00 am
Closed - Please Tour and Evaluate Exhibitors
 
Presented By:

 
  September 14, 2022 » 10:00 am - 11:00 am
TBD

 
  September 14, 2022 » 11:00 am - 12:00 pm
Fluency - Observability is a Must Have Component of Your Cybersecurity
 
Speaker:
Christopher Jordan, CEO, Co-Founder
Fluency Security
 
Presented By:

Time-sensitive insights are a must have when your teams are dealing with nation state actors and criminal gangs.  Their use of technology is changing and advancing daily.  How can you deal with zero-day intrusions, BEC, or insider threats when you don't have depth of insight into your total infrastructure?  Combining live streaming analytics along with the ability to pull all your defense-in-depth security products together to get deeper insight is only the beginning of Observability.  Come learn how you can change your approach to the next level.
 
  September 14, 2022 » 12:00 pm - 1:00 pm
TBD

 
  September 14, 2022 » 1:00 pm - 2:00 pm
Darktrace - Stopping Attacks, Not Your Business: AI & Autonomous Response
 
Speaker:
Hayden Wood, Cyber Security Executive
Darktrace
 
Presented By:

With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join Hayden in this session where he explores the benefits of Autonomous Response as a must-have that goes beyond ‘defense’. Includes real-world threat finds and attack scenarios.
  
Topic for this session– Autonomous Response – 
Explore today’s threats and challenges

How advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough.
 
  September 14, 2022 » 2:00 pm - 3:00 pm
TBD

 
  September 14, 2022 » 3:00 pm - 4:00 pm
TBD

 
  September 14, 2022 » 4:00 pm - 5:00 pm
TBD

 
  September 14, 2022 » 5:00 pm - 6:00 pm
Closed - Please Tour and Evaluate Exhibitors
 
Presented By:

 
  September 14, 2022 » 8:00 am - 9:00 am
Closed - Please Tour and Evaluate Exhibitors
 
Presented By:

 
  September 14, 2022 » 9:00 am - 10:00 am
Closed - Please Tour and Evaluate Exhibitors
 
Presented By:

 
  September 14, 2022 » 10:00 am - 11:00 am
TBD

 
  September 14, 2022 » 11:00 am - 12:00 pm
Lookout - A Holistic Approach to Data Centric Cloud Security
 
Speaker:
Aaron Cockerill, Chief Strategy Officer
Lookout
 
Presented By:

As apps and data have moved to the cloud to support the hybrid work style, IT is struggling to protect data and to provide a secure and productive work environment.

Lookout can help. At Lookout, we deliver a full cloud security stack that allows you to secure your workforce and device, helps you secure access to private apps, and protects your data across various SaaS and cloud apps deployed in a multi cloud environment. Come join us to know more about how Lookout goes above and beyond to secure your data using the industry’s most advanced cloud security platform.
 
  September 14, 2022 » 12:00 pm - 1:00 pm
Closed - Please Tour and Evaluate Exhibitors
 
Presented By:

 
  September 14, 2022 » 1:00 pm - 2:00 pm
Axonius
 
Presented By:

 
  September 14, 2022 » 2:00 pm - 3:00 pm
TBD

 
  September 14, 2022 » 3:00 pm - 4:00 pm
TBD

 
  September 14, 2022 » 4:00 pm - 5:00 pm
TBD

 
  September 14, 2022 » 5:00 pm - 6:00 pm
Closed - Please Tour and Evaluate Exhibitors
 
Presented By:

 
  September 14, 2022 » 8:00 am - 9:00 am
Closed: Time dedicated to touring and evaluating our sponsors
 
Presented By:

 
  September 14, 2022 » 9:00 am - 10:00 am
Closed: Time dedicated to touring and evaluating our sponsors
 
Presented By:

 
  September 14, 2022 » 10:00 am - 11:00 am
TBD
 
Presented By:

 
  September 14, 2022 » 11:00 am - 12:00 pm
CISO Roundtable
 
Presented By:

Creating a Culture of Organization Resilience
According to Gartner, “The COVID-19 pandemic has exposed the inability of traditional business continuity management planning to support the organization’s response to a large-scale disruption. With continued disruption likely, it is recommended that risk leaders recognize organizational resilience as a strategic imperative and build an organization-wide resilience strategy that also engages staff, stakeholders, customers and suppliers.”
During this interactive Roundtable, the panel will discuss strategies centered on convincing the board to settle on risk tolerance levels and invest money in resiliency. Additionally, panelists will discuss strategies to develop, implement, and execute overall organizational resilience.
 
  September 14, 2022 » 12:00 pm - 1:00 pm
Dustin Sachs - Bias in Information Security
 
Speaker:
Dustin S. Sachs, Sr. Manager, Information Security Risk Management
World Fuel Services
 
Presented By:

Bias is an often misunderstood and underappreciated aspect of decision-making. However, similar to the observer principle in physics, the identification, and recognition of bias helps to alleviate its effects. In this session, we will discuss the types of bias that are most common in information security. We will discuss how the various biases affect such things as the risk assessment process. Finally, we will discuss ways to counter the biases to create a more objective.
 
  September 14, 2022 » 1:00 pm - 2:00 pm
Women In Technology Roundtable
 
Speaker:
Aparna Mathur, VP Information Technology
Nabors Industries

 
Speaker:
Dolly Kripalani, Vice President of IT
National Oilwell Varco

 
Speaker:
Ivelisse Torres, SNR Director of Information Security
ABM Industries

 
Speaker:
Maria O'Neill, Chief Information Officer
American Bureau of Shipping

 
Speaker:
Padma Sree Ventrapragada, VP Technology Risk and Controls
AIG

 
Speaker:
Paula Smetana Stuart, Chief Information Officer
Crescent Energy
 
Presented By:

Although most Top Executives believe DEI is important, how to implement a successful policy while successfully embedding it into the current culture is not clear and not easy.  Many leaders are not predisposed to discussing diversity and inclusion openly. Many don’t know even how to begin or whether the discussion will be well received.

In this session, our panelists we will discuss how accel in the historically male dominated Technology Industry. Our panelists will touch on challenges they’ve overcome while making professional strides; how building-in effective programs to promote diversity, equity and inclusion continues to improve the bottom line; how each has grown professionally as a result of past mentors/influences and DEI programs; and how they plan to or are currently mentoring the next wave of technology leaders. Finally, the sessions will commence with a look forward, and word from each of the panelists on the changes they foresee on the horizon.
 
  September 14, 2022 » 2:00 pm - 3:00 pm
CIO Roundtable - Composability in Action
 
Speaker:
Alexis Collins, Chief Information Officer
Norton Rose Fulbright

 
Speaker:
Joe Carroll, Chief Information Officer
Citgo Petroleum

 
Speaker:
Ken Piddington, CIO
US Silica Company

 
Speaker:
Lisa Rogers, Chief Information Officer
NOVA Medical

 
Speaker:
Sai Yedavelli, Chief Information Officer
LivaNova
 
Presented By:

According to Gartner research, “highly composable organizations recognize that iterative delivery processes, collaborative workstyles, and integrated systems drive better results.” 

Preparing and planning for uncertainty and embracing change is an art and essential for 2022 Executives. With the world and businesses in constant disruption, Leadership must position and execute agile processes and teams that are completely aligned with the business. Embracing Composability will be a game changer.

In this panel we will discuss best practices for developing cross-team collaboration and building out integration capabilities for data, analytics and applications.
 
  September 14, 2022 » 3:00 pm - 4:00 pm
TBD
 
Presented By:

 
  September 14, 2022 » 4:00 pm - 5:00 pm
Chief Privacy Officer Panel
 
Presented By:

 
  September 14, 2022 » 5:00 pm - 6:00 pm
Closed: Time dedicated to touring and evaluating our sponsors
 
Presented By:

 







ThreatGen Cybersecurity Skills Challenge
Tech Theater I 4p-5p


Conference Exhibitors

Supporting Sponsors


Advisory Board




Diego Souza
Diego Souza
Global Cyber Security Executive | Board Advisor | Global Chief Information Security Officer
Cummins Inc.
Ernie Neumann
Ernie Neumann
CTO
Six Foot, LLC
Jerich Beason
Jerich Beason
CISO
Capital One
Jeff Roberts
Jeff Roberts
Founder & CEO
Innovation Vista
James Watson
James Watson
CIO
Total Safety US, Inc
Jim O'Brien
Jim O'Brien
US Business Unit Cyber Security Officer
CGI
Leticia Huerta
Leticia Huerta
Blockchain Products, Business Controls
Onyx by JPMorgan Chase
Mahendra Nambiar
Mahendra Nambiar
Founder
Aggregation Consulting
Mark Lynd
Mark Lynd
Top 10 Global AI & Cybersecurity Professional
Relevant Track
Mike Till
Mike Till
CTO
Treverity
Michael S. Oberlaender
Michael S. Oberlaender
Global Security Thought Leader & CISO
Company Strictly Confidential
Reid Wisa
Reid Wisa
Global Cyber Security Director | Board Advisor | MBA | Master of Computer Science | CISSP | CRISC | Head of Information Security
Tailored Brands, Inc.
Robert Harris
Robert Harris
Vice President of Engineering
ONE Discovery Inc.
Sindhu Menon
Sindhu Menon
Chief Information Officer
Harris County
Stephen Webster
Stephen Webster
Head of Microgrid OS
Enchanted Rock
Worth Davis
Worth Davis
Senior Vice President
Calian
Xiaoying Hu
Xiaoying Hu
Cybersecurity Manager
Katy ISD
Sada Krishnan
Sada Krishnan
AVP of IT
Situs
Ross A. Leo
Ross A. Leo
Chief Information Security Officer (CISO/DPO)
Galen Data

ElevateIT: Houston Technology Summit 2021