ElevateIT: TOLA Technology Summit II

October 14, 2020
Online, Virtual Convention

Disruptive Innovation in Technology

The ElevateIT: TOLA Technology Summit II is an Executive Level IT & Cybersecurity Conference developed specifically for Senior Level Technology Executives and Practitioners. This multi-day event features presentations from some of the best minds in the industry, including Annette Moore – CIO, NASA; Mark Stone – CIO, Texas A&M University System; George Crawford – CIO/CISO, Catapult Energy Systems; Marc Crudgington – CISO, Woodforest National Bank; Scott Howitt – CIO, McAfee. The October 14th ElevateIT: TOLA Technology Summit II will host all Cloud Security Alliance TOLA Chapters for their Annual Conference, and will provide deeps discounts on related Cybersecurity Training through our partner Intrinsec Security. Attendees join us to hear from industry experts, evaluate 50+ leading solutions providers, network with peers, and explore career development and educational opportunities. We also provide attendees an opportunity to win not only vendor prizes and giveaways, but all be entered into our Grand Prize Drawings, one of three Pre-paid Visa Gift Cards valued at $2500, $1500, or $1000. 6 CPE Credits are also made available to those who attend. We expect this event to be the largest IT & Cybersecurity Conference in the TOLA Region this year!


Keynote Speaker Scott Howitt
SVP & CIO, McAfee







SVP & CIO, McAfee
Scott Howitt is Senior Vice President and Chief Information Officer (CIO) at McAfee. He is responsible for McAfee’s corporate systems, leading the Information Security and IT organizations, and for driving the company’s cloud transformation. Alignment of technology to company strategy, partnerships with product and sales teams to ignite innovation, and positive customer experiences are guiding principles on which Scott and his teams focus.

Scott joined McAfee from MGM Resorts International, where he served as Chief Information Security Officer (CISO) and CIO while leading the information security and privacy program for all 27 resorts worldwide. Prior to MGM Resorts, his leadership journey included executive roles at JCPenney, Alliance Data, and Electronic Data Systems (EDS). He was also a Commissioner on Nevada’s DHS Cyber Security Commission and was a founding member and served on the Board of the Retail and Hospitality ISAC. Scott earned his B.A. in Physics from the University of Texas and attained his CISSP in 2005. In his free time, Scott is a voracious reader and avid hiker, and he enjoys spending time with his wife and three daughters.

Title: Is Your Technical C-Suite Becoming Way Too Crowded?

The rapid changes in the workplace, increasing market pressure, and global competition has caused some organizations to over-rotate on the hiring of C-Suite technical talent.

Digital Business Officer, Chief Technology Officer, Chief Innovation Officer, and Chief Integration Officer are some of the titles that we see emerging in the enterprise. Is the role of the CIO eroding or have we just not kept up with the changing world? How can you as a technology leader evolve with the changing landscape to ensure you keep your seat at the table?

Tech Theater I | 8am - 9am







THE ElevateIT
ADVANTAGE


ElevateIT inspires and empowers idea creation through a disruptive transformational culture by attracting the finest speakers and vendors imparting solid strategies able to quickly be implemented within Enterprises and Start-Ups alike.

We strive to bring together the ever-changing multi-facets of the Technology Industry in a fun, safe and informative atmosphere and feel fortunate to have good friends, good partners and a priceless reputation with our industry community. See what we mean for yourself by watching our summit videos.



Gold Sponsors



Malwarebytes secures endpoints, making workplaces resilient. Our adaptive cyber protection predicts and detects attacks with multi-layer detection across the kill chain. We enable active threat response with machine learning that is actionable and automated, allowing for full recovery when a compromise occurs. We empower enterprise endpoint orchestration across siloed IT and Security organizations .... , simplifying security management, and making responses effective. Malwarebytes makes endpoints resilient so workplaces can protect and remediate, and employees can regain control of their digital lives.
SentinelOne, headquartered in Mountain View, California, is a provider of next-generation endpoint security, serving more than 2000 customers globally, including 3 of the Fortune 10. Leveraging a single autonomous agent architecture and cloud analytics platform – the SentinelOne solution enables customers to defend against the most advanced cyber threats, including malware, ransomware, and non-m .... alware attacks. Deployed via the cloud, on premise or as a multi-tenant managed service, customers use SentinelOne to protect their servers, VDI, cloud and endpoint systems (including cross platform coverage for Windows, Windows legacy, macOS, and Linux), hunt threats, and replace legacy antivirus.
Connected devices are now a significant part of the network ecosystem across all industries. These devices can range widely, from cameras and payment card systems to medical devices and HVAC control systems, and are a critical part of business operations. However, they cannot be taken out of service, even to be patched, and typically have an expected service life of many years. Often, these device .... s run rudimentary operating systems, and cannot support corporate endpoint security agents. Ordr is IoT device security made simple. Ordr makes it easy to secure the millions of enterprise IoT and unmanaged devices such as manufacturing machines, building systems, medical equipment, printers and more that run within global networks. Ordr is the only purpose-built platform to discover and secure every unmanaged device – IoT, OT, and IoMT. The Ordr Systems Control Engine (SCE) will discover every connected device, profile device behaviors and risks, and automate response. Ordr not only identifies devices with vulnerabilities, weak ciphers, weak certificates, and active threats, but also those that exhibit malicious or suspicious behaviors. Ordr enables networking and security teams to easily automate response by dynamically creating policies that isolate mission-critical devices, those that share sensitive data (PCI, PHI, PII) or run vulnerable operating systems. The Ordr platform can be deployed on-premise or in the cloud, and offers a zero-touch, agentless deployment.



Cloud Security Alliance TOLA Chapters Annual Conference




The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events .... and products. CSA’s activities, knowledge and extensive network benefit the entire community impacted by cloud — from providers and customers, to governments, entrepreneurs and the assurance industry — and provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem. CSA operates the most popular cloud security provider certification program, the CSA Security, Trust & Assurance Registry (STAR), a three-tiered provider assurance program of self-assessment, 3rd-party audit and continuous monitoring. CSA also manages the CSA Global Consulting Program, a professional program it developed that allows cloud users to work with a network of trusted security professionals and organizations that offer qualified professional services based on CSA best practices. In 2009, CSA released the Security Guidance for Critical Areas of Focus In Cloud Computing, providing a practical, actionable road map to managers wanting to adopt the cloud paradigm safely and securely. The following year, CSA launched the industry’s first cloud security user certification, the Certificate of Cloud Security Knowledge (CCSK), the benchmark for professional competency in cloud computing security, along with the Cloud Controls Matrix (CCM), the world’s only meta-framework of cloud-specific security controls mapped to leading standards, best practices and regulations. By way of follow up, in 2015 together with (ISC)², CSA debuted the Certified Cloud Security Professional (CCSP) certification, representing the advanced skills required to secure the cloud. CSA’s comprehensive research program works in collaboration with industry, higher education and government on a global basis. CSA research prides itself on vendor neutrality, agility and integrity of results. CSA has a presence in every continent except Antarctica. With our own offices, partnerships, member organizations and chapters, there are always CSA experts near you. CSA holds dozens of high quality educational events around the world and online. Please check out our events page for more information.



Cybersecurity Certification Training




Founded in 2010, Intrinsec Security Inc. specializes in providing IT personnel with educational services on cloud and cyber security. Best known for their background in cloud security, Intrinsec has become a leading cloud security trainer around the globe and continuously works with Fortune 100 and large government agencies to ensure their staff are qualified and committed to cloud security. Cu .... rrently operating within the United States and Canada, Intrinsec travels across North America to support security-focused businesses, organizations and professionals alike to enhance their security capabilities while working with highly complex IT and IS business environments. The educational services they provide—whether that’s training staff, developing custom training material or consulting—all share one purpose; to guide IT personnel through the ever-changing world of information security and to equip them with the knowledge, skills and resources necessary to foster professional growth. Intrinsec’s combined strategic partnerships with CompTIA, (ISC)², ISACA, EC-Council and Cloud Security Alliance, has created a portfolio of vendor-neutral training programs capable of servicing professionals with any level of experience, in every area of security.


Lunch & Learn Sponsors



For three decades we've been helping people to protect their digital worlds. From a small, dynamic company we've grown into a global brand with over 110 million users in 202 countries and territories. Many things have changed, but our core aspirations, philosophy, and values remain the same – to help build a more secure digital world where everyone can truly Enjoy Safer Technology.
Merlin is the premier cybersecurity platform that represents reputable cybersecurity brands, invests in visionary technologies, and brings everything into its lab where engineers integrate, test, and deliver some of the world’s most groundbreaking security solutions. These solutions empower enterprises to more simply and effectively secure their systems, data, and users no matter how security th .... reats and regulatory compliance requirements evolve.


Breakout Presentation Sponsors



Acuerdo is fundamentally changing the way businesses address reform in the wake of recent events, applying frameworks that reposition clients to be more productive, flexible, and resistant to change. In addition to thought leadership and deep consultancy, Acuerdo brings an In-network provider community of over 100 cloud technology companies, delivering choice, marketplace insights, engineering, an .... d buying power to their clients.
Through the industry-leading Concierge Security™ Team, Arctic Wolf provides the 24x7 managed cybersecurity protection IT-constrained companies need to keep their valuable business data safe. Personal, predictable protection – it’s the Arctic Wolf difference.
Armor is a cloud security company that takes the complexity out of protecting your data, whether it resides in a private, public, or hybrid cloud—or in an on-premise IT environment. We provide managed security solutions that give you a clear picture of threats facing your organization and are designed with PCI, HIPAA, and GDPR compliance in mind.
Protecting corporate networks, cloud and virtualized environments, IoT and industrial control systems, Darktrace autonomously detects and fights back against emerging cyber-threats across the enterprise.
Meet your dedicated technology team leaders. Our team members strive to create innovative IT solutions and data center deployments for all levels of customers. Since 2010, we have helped enterprise, commercial, state and local governments, hospitals and schools with their technology needs. We are always expanding and staying at the forefront of technology changes in the industry. We look for .... ward to working with you too.
HPE is a global, edge-to-cloud Platform-as-a-Service company built to transform your business. How? By helping you connect, protect, analyze, and act on all your data and applications wherever they live, from edge to cloud, so you can turn insights into outcomes at the speed required to thrive in today’s complex world.
Ivanti is changing the IT landscape by breaking down IT silos with increased visibility, shared data, and automated processes. We’re helping customers respond to user demands and market changes, comply with regulations, and secure the entire organization—all while reducing costs. We call it the Power of Unified IT.
Through a powerful combination of our technology, people and partners, we help organizations transform their customer experience into a business-driving competitive advantage. We make it easy for contact centers to win every customer interaction, deliver great customer experiences, and achieve their business goals—all from the flexibility and reliability of the cloud. Recognized as a market l .... eader by Gartner, Forrester, Ventana, Ovum, Frost and DMG, NICE inContact supports over 430,000 contact center agents in enterprise, midmarket, government organizations and business process outsourcers (BPOs) who operate in multiple divisions, locations and global regions.
Founded in the heart of San Francisco, Remediant leads with innovation, delivering enterprise-class cybersecurity solutions that enable real-time monitoring, zero trust protection of privileged accounts and Just-In-Time Administration (JITA) across IT/Security ecosystems. We protect organizations from stolen credentials being used to take their data, which is the #1 attack vector across all breach .... es. While the threat landscape continues to evolve significantly, the provider landscape has not. Remediant was created by Tim Keeler and Paul Lanzi in response to changing security needs. SecureONE was developed because available security solutions offered insufficient protection against the increasing threat of state-sponsored attacks. Because most data breaches involve a compromised privilege account at some point in the attack chain, Remediant understands the crucial role privilege access plays in security. Since 1996, every Privileged Access Management solution on the market has been built on top of the concept of a password vault. SecureONE is the first PAM solution to bring the ease of an agent-less and vault-less approach, while also delivering continuous detection of new privileged access across the enterprise. Based on a Zero-trust model, SecureONE ensures privileged access is precisely allocated and continuously inventoried by granting privileged access on a Just-In-Time, Just-Enough basis using two-factor authentication. Remediant strives to bring a new level of control and insight over the distribution, usage, and protection of privileged access in enterprise environments.
Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won't be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to recover a multi .... -TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem.

Beverage Sponsor



Malwarebytes will be provide a $5 Starbucks Gift Card to all who register to attend. Simply swing by their booth on the day of the event and claim your reward.



Event Agenda
Download Agenda













C-Suite Leadership Panel
Leading IT Innovation from the Ground for Aerospace, Aviation, and Defense



Annette Moore
CIO
NASA

Moderator: Jesse Carrillo
CIO
Hines

Christopher Wood
Technology Fellow
Lockheed Martin

Bryan Tutor
VP & CIO
Elbit Systems of America

Conference Exhibitors

Supporting Sponsors


Advisory Board




Diego Souza
Diego Souza
Managing Director - Cyber Security
United Airlines
Ernie Neumann
Ernie Neumann
VP of IT & Infrastructure Operations
Six Foot, LLC
Hector Paredes
Hector Paredes
CIO
YAS Partners Corporation
James Watson
James Watson
CIO
Total Safety US, Inc
Jeff Roberts
Jeff Roberts
Executive Managing Director, IT
JLL Capital Markets
Jim O'Brien
Jim O'Brien
US Business Unit Cyber Security Officer
CGI
Jerich Beason
Jerich Beason
Global Director, Information Security Strategy & Governance
AECOM
Leticia Huerta
Leticia Huerta
Cybersecurity and Integrated Risk Management
ENGIE North America Inc
Mahendra Nambiar
Mahendra Nambiar
CIO
Johnson Law Group
Mark Lynd
Mark Lynd
Top 10 Global AI & Cybersecurity Professional
Relevant Track
Mike Till
Mike Till
CTO
Treverity
Michael S. Oberlaender
Michael S. Oberlaender
Global Security Thought Leader & CISO
Company Strictly Confidential
Sada Krishnan
Sada Krishnan
AVP of IT
Situs
Ross A. Leo
Ross A. Leo
CISO
ObserveSmart Invisalert Solutions, Inc
Robin Austin
Robin Austin
CTO
Colliers Group
Reid Wisa
Reid Wisa
Enterprise Security Lead
GE Oil & Gas
Sindhu Menon
Sindhu Menon
CIO
City of College Station
Robert Harris
Robert Harris
Director of Information and Technology
Driven Inc
Stephen Webster
Stephen Webster
MRE Consulting
CTO
Worth Davis
Worth Davis
EVP/Chief Technology Officer
Computex
Xiaoying Hu
Xiaoying Hu
CISO
City of College Station

ElevateIT: TOLA Technology Summit II