ElevateIT: Houston Technology Summit 2021

NRG Center
October 13, 2021
1 NRG Park Houston, TX 77054

Expanding and Evolving within the Digital Revolution

At the heart of the Digital Revolution is quick-term, short-term, and long-term growth and profitability. The acceleration of automation development from inception throughout the supply chain will drive customer demands now and in the future. Simply put, companies embracing faster a positive seamless digital customer experience will be the relevant companies for the future. Employing effective digitization both internally and externally will create efficiency, more effective use of resources, and evolution of culture. Are you ready for 2021 and the Digital Revolution?

The 3rd Annual ElevateIT: Houston Technology Summit will now be hosted both in-person & virtually on October 13th, 2021.

The ElevateIT: Houston Technology Summit is designed with your goals in mind, and we are excited to connect you with local experts and resources to assist with your IT & Security needs. We hope you will join us for a full day of Peer-to-Peer Networking, Educational Presentations by Industry Leaders, and 50+ vendors to evaluate. Be sure to attend, either live or virtually, and be entered to win one of our Grand Prize Drawings for 1-of-2 Pre-paid Visa Gift Cards totaling $5000!


Featured Speaker Kevin Mitnick
World's Most Famous Hacker







World's Most
Famous Hacker
Once one of the FBI’s Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide. Kevin and his Global Ghost Team™ now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering. As CEO and chief “white hat” hacker at one of the most advanced boutique security firms in the world, Kevin mentors leaders, executives, and staff on both the theory and practice of social engineering, topics on which he is the leading global authority. Kevin also helps consumers—from students to retirees—learn how to protect their information and themselves from harm, using understandable terms and a friendly approach. Kevin’s insights on current events are highly sought, leading to hundreds of media appearances. He has been a commentator, security analyst, or interview subject on CNN, CNBC, Al Jazeera, FOX News, CBC, BBC, Radio Moscow, Tech TV, National Public Radio, Playboy, Good Morning America, and 60 Minutes—to name just a few. He has been called before Congress (both the House and the Senate) to testify on security matters affecting the United States. Kevin also works in partnership with KnowBe4 to produce critically acclaimed security awareness training programs to counteract social engineering and to improve security effectiveness. Kevin's books include 'Art of Intrusion: The Real Story Behind the Exploits of Hackers, Intruders and Deceivers' and 'Art of Deception: Controlling the Human Element of Security, which are mandatory readings for security professionals. His autobiography, 'Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker, a New York Times bestseller, is now available in fifteen languages.

Title: Worlds Most Famous Hacker

He’s the catalyst of the information security industry, a best-selling author, renowned security speaker and the head of an elite information security firm with a 100% success rate. All of that began with Kevin’s action-packed rise through the ranks of hackers worldwide, driven by an insatiable curiosity, a passion for seemingly impossible challenges and an unstoppable sense of humor.

Tech Theater I | 4pm - 5pm







THE ElevateIT
ADVANTAGE


ElevateIT inspires and empowers idea creation through a disruptive transformational culture by attracting the finest speakers and vendors imparting solid strategies able to quickly be implemented within Enterprises and Start-Ups alike.

We strive to bring together the ever-changing multi-facets of the Technology Industry in a fun, safe and informative atmosphere and feel fortunate to have good friends, good partners and a priceless reputation with our industry community. See what we mean for yourself by watching our summit videos.



Gold Sponsors



Malwarebytes secures endpoints, making workplaces resilient. Our adaptive cyber protection predicts and detects attacks with multi-layer detection across the kill chain. We enable active threat response with machine learning that is actionable and automated, allowing for full recovery when a compromise occurs. We empower enterprise endpoint orchestration across siloed IT and Security organizations .... , simplifying security management, and making responses effective. Malwarebytes makes endpoints resilient so workplaces can protect and remediate, and employees can regain control of their digital lives.
Connected devices are now a significant part of the network ecosystem across all industries. These devices can range widely, from cameras and payment card systems to medical devices and HVAC control systems, and are a critical part of business operations. However, they cannot be taken out of service, even to be patched, and typically have an expected service life of many years. Often, these device .... s run rudimentary operating systems, and cannot support corporate endpoint security agents. Ordr is IoT device security made simple. Ordr makes it easy to secure the millions of enterprise IoT and unmanaged devices such as manufacturing machines, building systems, medical equipment, printers and more that run within global networks. Ordr is the only purpose-built platform to discover and secure every unmanaged device – IoT, OT, and IoMT. The Ordr Systems Control Engine (SCE) will discover every connected device, profile device behaviors and risks, and automate response. Ordr not only identifies devices with vulnerabilities, weak ciphers, weak certificates, and active threats, but also those that exhibit malicious or suspicious behaviors. Ordr enables networking and security teams to easily automate response by dynamically creating policies that isolate mission-critical devices, those that share sensitive data (PCI, PHI, PII) or run vulnerable operating systems. The Ordr platform can be deployed on-premise or in the cloud, and offers a zero-touch, agentless deployment.


Lunch & Learn Sponsors



Since 1996, Extreme has been pushing the boundaries of networking technology, driven by a vision of making it simpler and faster as well as more agile and secure. But our higher purpose has always been helping our customers connect beyond the network… strengthening their relationships with those they serve. Today, we call that Customer-Driven Networking.
We are the only security vendor that accelerates your digital transformation journey with a proven security platform that is data-centric, cloud-smart, and as fast as your business.
KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. With KACE, you can effectively address your endpoint management needs with individual products for specific tasks or as an integrated .... UEM solution.


Breakfast Sponsors



At the heart of the Digital Revolution is quick-term, short-term, and long-term growth and profitability. The acceleration of automation development from inception throughout the supply chain will drive customer demands now and in the future. Simply put, companies embracing faster a positive seamless digital customer experience will be the relevant companies for the future. Employing effective dig .... itization both internally and externally will create efficiency, more effective use of resources, and evolution of culture. Are you ready for 2021 and the Digital Revolution? The 3rd Annual ElevateIT: Houston Technology Summit will now be hosted both in-person & virtually on October 13th, 2021. The ElevateIT: Houston Technology Summit is designed with your goals in mind, and we are excited to connect you with local experts and resources to assist with your IT & Security needs. We hope you will join us for a full day of Peer-to-Peer Networking, Educational Presentations by Industry Leaders, and 50+ vendors to evaluate. Be sure to attend, either live or virtually, and be entered to win one of our Grand Prize Drawings for 1-of-2 Pre-paid Visa Gift Cards totaling $5000!
Area 1 is rooted in our founders’ experience in national security — including gaining advanced insight into potential missile strikes to preempt those attacks before launch. In other words — preempting attacks while in enemy territory. This proactive approach, when applied to cybersecurity, shifts the email security industry paradigm. You can no longer afford to get Phished first, then respo .... nd after. Area 1’s enhanced detection models go into the wild to preemptively detect and thwart sophisticated attacks like Business Email Compromise, malware, credential harvesting, and other financial fraud that evade email gateways (SEGs) and cloud email suites.
At the heart of the Digital Revolution is quick-term, short-term, and long-term growth and profitability. The acceleration of automation development from inception throughout the supply chain will drive customer demands now and in the future. Simply put, companies embracing faster a positive seamless digital customer experience will be the relevant companies for the future. Employing effective dig .... itization both internally and externally will create efficiency, more effective use of resources, and evolution of culture. Are you ready for 2021 and the Digital Revolution? The 3rd Annual ElevateIT: Houston Technology Summit will now be hosted both in-person & virtually on October 13th, 2021. The ElevateIT: Houston Technology Summit is designed with your goals in mind, and we are excited to connect you with local experts and resources to assist with your IT & Security needs. We hope you will join us for a full day of Peer-to-Peer Networking, Educational Presentations by Industry Leaders, and 50+ vendors to evaluate. Be sure to attend, either live or virtually, and be entered to win one of our Grand Prize Drawings for 1-of-2 Pre-paid Visa Gift Cards totaling $5000!


Breakout Presentation Sponsors



As the world’s most experienced provider of backup and disaster recovery solutions, for 35 years we’ve been solving the challenges of IT teams by bringing innovation, ambition, and countless hours of iteration to the solutions they rely on to keep businesses running smoothly. In the process, we’ve redefined the way companies protect their data – the very foundation of modern business in an .... era where immediate access to critical systems and applications is key to business continuity and essential to continuing growth and success.
Armor is a cloud security company that takes the complexity out of protecting your data, whether it resides in a private, public, or hybrid cloud—or in an on-premise IT environment. We provide managed security solutions that give you a clear picture of threats facing your organization and are designed with PCI, HIPAA, and GDPR compliance in mind.
The Aviatrix cloud network platform delivers the advanced cloud networking, security and operational visibility that enterprises require, while maintaining the simplicity and agility of cloud. More than 550 customers worldwide leverage Aviatrix to design and operate their enterprise cloud network and security consistently in and across all their public clouds.
For over 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing and easy-to-use products give consumers and businesses the peace of mind to enjoy the full potential of their technology.
Forcepoint is the leading user and data protection cybersecurity company, entrusted to safeguard organizations while driving digital transformation and growth. Our solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value.
GoSecure Titan Managed Detection and Response helps all organizations reduce dwell time by preventing breaches before they happen. GoSecure Titan MDR offers a market-leading portfolio of modular detection and response capabilities, delivered as a cloud service, to protect critical data and assets. GoSecure is the first and only security provider to offer a full spectrum from managed threat hunting .... to managed incident response and forensics services across the endpoint, network, and inbox.
The traditional reseller at the time was focused on selling as much equipment as possible to as many customers as possible. By contrast, Layer 3 Communications’ founding theory was that our success would be determined by our ability to deliver compelling services to our customers with equipment just being a means to an end. Consistent with that theory our first three hires were engineers who con .... tinue to work at Layer 3 Communications today. In fact, Greg Hart, our first addition to the team now runs the entire engineering organization. Throughout our history, we have maintained the philosophy that the people who work at Layer 3 are our value proposition, not the equipment on our line card. In 2004 Craig Wall was living in Austin and had a senior business development role at Dell Computer. He independently developed the same philosophy - customers needed services, not more hardware. He joined the growing Layer 3 Communications team and formed the Western Region. Today, Layer 3 Communications has offices throughout the Southeast and Texas. While the services and products we offer continue to evolve, we still hang our hat on the belief that customers do business with us because of the smart people who work here not what equipment they can buy from us.
For far too long, security companies have been content to pacify customers with detect-and-remediate solutions that are no match for today’s smartest malware. Menlo Security is a different breed. We believe: ~ Security should prevent, not react. ~ Organizations shouldn’t have to sacrifice productivity for security. ~ Perfect security is possible. As a group of unrelenting cybersecurity .... experts, we pioneered an entirely reimagined, impervious approach to security. One that’s built on Zero Trust principles and that leverages isolation as a core architectural pillar. It’s the only way to truly eliminate malware, secure work, and protect productivity—the stuff that matters most to the businesses we work with and their end users. As migration to the cloud quickens and application workloads move to SaaS, security is being rearchitected to meet a new set of challenges. Menlo Security is at the forefront of this shift—empowering organizations to adapt and map their journey to Secure Access Service Edge (SASE) and beyond.
Our vision is to put an end to the constant struggle with the perpetual lag in cyberthreat detection, remediation, and mitigation. The gap between the truth and perceptions formulated from sporadic simulations leaves companies increasingly at risk, even as they increase their cybersecurity spend. Our security should be as real-world as the threat of attack. That’s why we are spearheading the Aut .... omated Security Validation™ revolution by providing the validated, true remediation roadmap that every organization needs to confidently reduce cybersecurity exposure. Pentera’s platform is helping over 300 organizations in over 60 countries around the world discover their real-world, real-time security exposure by emulating real-life attacks on every cybersecurity layer, all day, every day. Eliminate guesswork, ditch delays, and embrace automated security validation for a continuous understanding of your risk. Tune out the false alarms and never-ending lists of vulnerabilities. Turn to the one true picture of your network to reduce risk. Stop simulating, start validating.

Silver Sponsors



At the heart of the Digital Revolution is quick-term, short-term, and long-term growth and profitability. The acceleration of automation development from inception throughout the supply chain will drive customer demands now and in the future. Simply put, companies embracing faster a positive seamless digital customer experience will be the relevant companies for the future. Employing effective dig .... itization both internally and externally will create efficiency, more effective use of resources, and evolution of culture. Are you ready for 2021 and the Digital Revolution? The 3rd Annual ElevateIT: Houston Technology Summit will now be hosted both in-person & virtually on October 13th, 2021. The ElevateIT: Houston Technology Summit is designed with your goals in mind, and we are excited to connect you with local experts and resources to assist with your IT & Security needs. We hope you will join us for a full day of Peer-to-Peer Networking, Educational Presentations by Industry Leaders, and 50+ vendors to evaluate. Be sure to attend, either live or virtually, and be entered to win one of our Grand Prize Drawings for 1-of-2 Pre-paid Visa Gift Cards totaling $5000!
At the heart of the Digital Revolution is quick-term, short-term, and long-term growth and profitability. The acceleration of automation development from inception throughout the supply chain will drive customer demands now and in the future. Simply put, companies embracing faster a positive seamless digital customer experience will be the relevant companies for the future. Employing effective dig .... itization both internally and externally will create efficiency, more effective use of resources, and evolution of culture. Are you ready for 2021 and the Digital Revolution? The 3rd Annual ElevateIT: Houston Technology Summit will now be hosted both in-person & virtually on October 13th, 2021. The ElevateIT: Houston Technology Summit is designed with your goals in mind, and we are excited to connect you with local experts and resources to assist with your IT & Security needs. We hope you will join us for a full day of Peer-to-Peer Networking, Educational Presentations by Industry Leaders, and 50+ vendors to evaluate. Be sure to attend, either live or virtually, and be entered to win one of our Grand Prize Drawings for 1-of-2 Pre-paid Visa Gift Cards totaling $5000!


Happy Hour Reception Sponsors



Today, there’s more data and users outside the enterprise than inside, causing the network perimeter as we know it to dissolve. We need a new perimeter. One that is built in the cloud, and follows and protects data — wherever it goes. One that provides protection without slowing down or creating friction for the business. One that enables fast and secure access to the cloud and web using one o .... f the world’s largest and fastest security networks, so you never have to sacrifice security for performance. This is the new perimeter. This is the Netskope Security Cloud. Reimagine your perimeter.



Event Agenda
Download Agenda





Intelligent Automation Panel
The Strategic Impact for Intelligent Automation



· Embracing Intelligent Automation to enrich employee and customer experiences, enhance data utilization and protection, reduce cost while fostering collaboration, transparency and trust is top of mind for decision makers in 2021 and beyond.

· Analysis and measurement along with streamlining processes have overwhelmingly supported automating key functions faster, better cheaper.  Effectively using Data Analytics across all functions of the Enterprise have been key to successful automation projects.

· Confident Executive business decisions are made through viewing a 360-degree data lens and most enlightened companies have Data Scientists on board to support intelligent automation initiatives.

· Machine Learning and Artificial Intelligence enable visibility within data protection, augmenting major supply chain functions for faster delivery as well as empowering comprehensive governance decisions to encourage unfettered growth.

Please join these Top Executive thought leaders for insights in a frank discussion.

Conference Exhibitors

Supporting Sponsors


Advisory Board




Diego Souza
Diego Souza
Managing Director - Cyber Security
United Airlines
Ernie Neumann
Ernie Neumann
VP of IT & Infrastructure Operations
Six Foot, LLC
Hector Paredes
Hector Paredes
CIO
YAS Partners Corporation
James Watson
James Watson
CIO
Total Safety US, Inc
Jeff Roberts
Jeff Roberts
Executive Managing Director, IT
JLL Capital Markets
Jim O'Brien
Jim O'Brien
US Business Unit Cyber Security Officer
CGI
Jerich Beason
Jerich Beason
Global Director, Information Security Strategy & Governance
AECOM
Leticia Huerta
Leticia Huerta
Cybersecurity and Integrated Risk Management
ENGIE North America Inc
Mahendra Nambiar
Mahendra Nambiar
CIO
Johnson Law Group
Mark Lynd
Mark Lynd
Top 10 Global AI & Cybersecurity Professional
Relevant Track
Mike Till
Mike Till
CTO
Treverity
Michael S. Oberlaender
Michael S. Oberlaender
Global Security Thought Leader & CISO
Company Strictly Confidential
Sada Krishnan
Sada Krishnan
AVP of IT
Situs
Ross A. Leo
Ross A. Leo
CISO
ObserveSmart Invisalert Solutions, Inc
Robin Austin
Robin Austin
CTO
Colliers Group
Reid Wisa
Reid Wisa
Enterprise Security Lead
GE Oil & Gas
Sindhu Menon
Sindhu Menon
CIO
City of College Station
Robert Harris
Robert Harris
Director of Information and Technology
Driven Inc
Stephen Webster
Stephen Webster
MRE Consulting
CTO
Worth Davis
Worth Davis
EVP/Chief Technology Officer
Computex
Xiaoying Hu
Xiaoying Hu
CISO
City of College Station

ElevateIT: Houston Technology Summit 2021