ElevateIT: Houston Technology Summit 2021

NRG Center
October 13, 2021
1 NRG Park Houston, TX 77054

Expanding and Evolving within the Digital Revolution

How do I help my company keep and grow market base within this most disruptive chaotic time in history? Can I capitalize on the disruption to create a competitive advantage? How do I create value while maintaining digital trust? Once you have created a flexible strategic business model both on paper and in practice that answers these 3 questions, you will be in prime position for 2022 and beyond.

Managing change intelligently includes weaving in three main strategic attributes: Tightly integrated, comprehensive and intelligently automated. 
The profitable digital marketplace requires transactional immediacy and transactional immediacy requires digitizing and securing data, applications and workflows both at rest and in process.
 
Today without question, data protection and process security (cybersecurity) are the top strategic components of governance and innovation, bumping it up to first position with governance impact. Adding digital cybersecurity for accuracy and speed can be key to adding value and trust. And “trust” is THE  key characteristic to grow customers for 2022.
The second position, and just as important is a positive customer experience which also includes “a reputation KPI” that is intuitively based on behavioral analytics that is easy to use with a very personal “touch.” Although the vast number of customers are digital natives and enjoy the push button experience, they also expect it to be proactively personal, familiar, and private.

The go-to companies for 2022 must have a positive reputation which includes customer data protection, quality products and services and proactive, consistent and on-time delivery. The way forward is the hyper intelligent digital marketplace. Are you making the right decisions for a marketplace edge for 2022 and beyond? Join us for these discussions and ElevateIT’s  promise for delivering valuable and impactful and timely content.


Featured Speaker Kevin Mitnick
World's Most Famous Hacker







World's Most
Famous Hacker
Once one of the FBI’s Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide. Kevin and his Global Ghost Team™ now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering. As CEO and chief “white hat” hacker at one of the most advanced boutique security firms in the world, Kevin mentors leaders, executives, and staff on both the theory and practice of social engineering, topics on which he is the leading global authority. Kevin also helps consumers—from students to retirees—learn how to protect their information and themselves from harm, using understandable terms and a friendly approach. Kevin’s insights on current events are highly sought, leading to hundreds of media appearances. He has been a commentator, security analyst, or interview subject on CNN, CNBC, Al Jazeera, FOX News, CBC, BBC, Radio Moscow, Tech TV, National Public Radio, Playboy, Good Morning America, and 60 Minutes—to name just a few. He has been called before Congress (both the House and the Senate) to testify on security matters affecting the United States. Kevin also works in partnership with KnowBe4 to produce critically acclaimed security awareness training programs to counteract social engineering and to improve security effectiveness. Kevin's books include 'Art of Intrusion: The Real Story Behind the Exploits of Hackers, Intruders and Deceivers' and 'Art of Deception: Controlling the Human Element of Security, which are mandatory readings for security professionals. His autobiography, 'Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker, a New York Times bestseller, is now available in fifteen languages.

Title: Worlds Most Famous Hacker

He’s the catalyst of the information security industry, a best-selling author, renowned security speaker and the head of an elite information security firm with a 100% success rate. All of that began with Kevin’s action-packed rise through the ranks of hackers worldwide, driven by an insatiable curiosity, a passion for seemingly impossible challenges and an unstoppable sense of humor.

Tech Theater I | 4pm - 5pm







THE ElevateIT
ADVANTAGE


ElevateIT inspires and empowers idea creation through a disruptive transformational culture by attracting the finest speakers and vendors imparting solid strategies able to quickly be implemented within Enterprises and Start-Ups alike.

We strive to bring together the ever-changing multi-facets of the Technology Industry in a fun, safe and informative atmosphere and feel fortunate to have good friends, good partners and a priceless reputation with our industry community. See what we mean for yourself by watching our summit videos.



Gold Sponsors



Security. Trust. Innovation. The Internet of Things represents the next great wave in business transformation. Today, BlackBerry already secures more than 500M endpoints including 175M cars on the road. Through independent research, Frost & Sullivan determined that BlackBerry is well-positioned to secure all IoT endpoints, and upwards of 96% of all cyber threats in the current landscape (read .... the Frost & Sullivan Assessment). BlackBerry is leading the way with a single platform for securing, managing, and optimizing how intelligent endpoints are deployed in the enterprise, enabling our customers to stay ahead of the technology curve that will reshape every industry.
Your Technology. Simplified. Delivered. Managed. Computex Technology Solutions is an award-winning solution provider committed to helping customers evolve their business through technology for over 30 years. We create seamless, integrated technology experiences that inspire your team to greater heights. Our expertise, software, and services combine to help enterprises stand with us at the forefron .... t of cloud connectivity and collaboration. Our goals are yours, and together we will surpass them. Awarded as the largest Cybersecurity firm in Houston by HBJ, Computex can streamline your processes, and tailor any solution to your business. With our SOC (Security Operations Center) as-a-service, we can monitor, detect, prevent, and mediate any threats alongside our Everything-as-a-Service (XaaS) solutions and 24x7x365 support from our certified engineers and architects.
Malwarebytes secures endpoints, making workplaces resilient. Our adaptive cyber protection predicts and detects attacks with multi-layer detection across the kill chain. We enable active threat response with machine learning that is actionable and automated, allowing for full recovery when a compromise occurs. We empower enterprise endpoint orchestration across siloed IT and Security organizations .... , simplifying security management, and making responses effective. Malwarebytes makes endpoints resilient so workplaces can protect and remediate, and employees can regain control of their digital lives.
Connected devices are now a significant part of the network ecosystem across all industries. These devices can range widely, from cameras and payment card systems to medical devices and HVAC control systems, and are a critical part of business operations. However, they cannot be taken out of service, even to be patched, and typically have an expected service life of many years. Often, these device .... s run rudimentary operating systems, and cannot support corporate endpoint security agents. Ordr is IoT device security made simple. Ordr makes it easy to secure the millions of enterprise IoT and unmanaged devices such as manufacturing machines, building systems, medical equipment, printers and more that run within global networks. Ordr is the only purpose-built platform to discover and secure every unmanaged device – IoT, OT, and IoMT. The Ordr Systems Control Engine (SCE) will discover every connected device, profile device behaviors and risks, and automate response. Ordr not only identifies devices with vulnerabilities, weak ciphers, weak certificates, and active threats, but also those that exhibit malicious or suspicious behaviors. Ordr enables networking and security teams to easily automate response by dynamically creating policies that isolate mission-critical devices, those that share sensitive data (PCI, PHI, PII) or run vulnerable operating systems. The Ordr platform can be deployed on-premise or in the cloud, and offers a zero-touch, agentless deployment.


Lunch & Learn Sponsors



Since 1996, Extreme has been pushing the boundaries of networking technology, driven by a vision of making it simpler and faster as well as more agile and secure. But our higher purpose has always been helping our customers connect beyond the network… strengthening their relationships with those they serve. Today, we call that Customer-Driven Networking.
Your Organization Runs on Email. It’s the main way you communicate internally and externally and you rely on it being available all day, every day. It’s a gateway to other critical IT systems and home to a treasure trove of corporate information your employee's value. For all it offers, email needs to be protected and managed or it risks exposing your organization and your data to attack. Your .... customers and your supply chain are far too valuable to take that chance. It also needs to be effectively archived to meet growing compliance, e-discovery, and legal obligations.
We are the only security vendor that accelerates your digital transformation journey with a proven security platform that is data-centric, cloud-smart, and as fast as your business.
KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. With KACE, you can effectively address your endpoint management needs with individual products for specific tasks or as an integrated .... UEM solution.


Breakfast Sponsors



Area 1 is rooted in our founders’ experience in national security — including gaining advanced insight into potential missile strikes to preempt those attacks before launch. In other words — preempting attacks while in enemy territory. This proactive approach, when applied to cybersecurity, shifts the email security industry paradigm. You can no longer afford to get Phished first, then respo .... nd after. Area 1’s enhanced detection models go into the wild to preemptively detect and thwart sophisticated attacks like Business Email Compromise, malware, credential harvesting, and other financial fraud that evade email gateways (SEGs) and cloud email suites.


Breakout Presentation Sponsors



As the world’s most experienced provider of backup and disaster recovery solutions, for 35 years we’ve been solving the challenges of IT teams by bringing innovation, ambition, and countless hours of iteration to the solutions they rely on to keep businesses running smoothly. In the process, we’ve redefined the way companies protect their data – the very foundation of modern business in an .... era where immediate access to critical systems and applications is key to business continuity and essential to continuing growth and success.
The Aviatrix cloud network platform delivers the advanced cloud networking, security and operational visibility that enterprises require, while maintaining the simplicity and agility of cloud. More than 550 customers worldwide leverage Aviatrix to design and operate their enterprise cloud network and security consistently in and across all their public clouds.
Protecting corporate networks, cloud and virtualized environments, IoT and industrial control systems, Darktrace autonomously detects and fights back against emerging cyber-threats across the enterprise.
For over 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing and easy-to-use products give consumers and businesses the peace of mind to enjoy the full potential of their technology.
Forcepoint is the leading user and data protection cybersecurity company, entrusted to safeguard organizations while driving digital transformation and growth. Our solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value.
The traditional reseller at the time was focused on selling as much equipment as possible to as many customers as possible. By contrast, Layer 3 Communications’ founding theory was that our success would be determined by our ability to deliver compelling services to our customers with equipment just being a means to an end. Consistent with that theory our first three hires were engineers who con .... tinue to work at Layer 3 Communications today. In fact, Greg Hart, our first addition to the team now runs the entire engineering organization. Throughout our history, we have maintained the philosophy that the people who work at Layer 3 are our value proposition, not the equipment on our line card. In 2004 Craig Wall was living in Austin and had a senior business development role at Dell Computer. He independently developed the same philosophy - customers needed services, not more hardware. He joined the growing Layer 3 Communications team and formed the Western Region. Today, Layer 3 Communications has offices throughout the Southeast and Texas. While the services and products we offer continue to evolve, we still hang our hat on the belief that customers do business with us because of the smart people who work here not what equipment they can buy from us.
For far too long, security companies have been content to pacify customers with detect-and-remediate solutions that are no match for today’s smartest malware. Menlo Security is a different breed. We believe: ~ Security should prevent, not react. ~ Organizations shouldn’t have to sacrifice productivity for security. ~ Perfect security is possible. As a group of unrelenting cybersecurity .... experts, we pioneered an entirely reimagined, impervious approach to security. One that’s built on Zero Trust principles and that leverages isolation as a core architectural pillar. It’s the only way to truly eliminate malware, secure work, and protect productivity—the stuff that matters most to the businesses we work with and their end users. As migration to the cloud quickens and application workloads move to SaaS, security is being rearchitected to meet a new set of challenges. Menlo Security is at the forefront of this shift—empowering organizations to adapt and map their journey to Secure Access Service Edge (SASE) and beyond.

Silver Sponsors



Arista Networks is an industry leader in cognitive cloud networking solutions for large data center and campus environments. Arista’s award-winning platforms deliver availability, agility, automation analytics, and security through CloudVision® and Arista EOS®, an advanced network operating system. For more information, visit www.arista.com.
Cloudian® is a Silicon Valley-based file and object storage company specializing in S3-compatible object storage systems. With technology roots in the large-scale enterprise message space, Cloudian introduced its object-based platform, HyperStore®, in 2011. Cloudian products are offered by partners including VMware, Hewlett Packard Enterprise, and QCT, and by reseller partners worldwide. Cloudia .... n was founded with a clear vision: to revolutionize data storage by bringing object storage to the enterprise. Unlike the expensive, complex, and proprietary object storage products which came before it, Cloudian’s technology allows all sizes and types of users to realize the benefits of object storage in their own data centers. Conquer the Unstructured Data Challenge Datacenter managers, broadcasters, researchers, and software developers need solutions to help them contend with the explosive growth in unstructured data. Across all industries – from media to medical, to industrial – new applications, formats, and technologies are driving this rapid increase of data, creating issues around storage costs and complexity. An affordable, highly scalable, easy-to-use storage system was needed. The Answer: A Standard API and Limitless Scalability First, the revolutionary new solution needed to be built on a widely accepted API that software developers would embrace. Amazon’s S3-API was rapidly becoming the de facto object storage standard. Next, the solution demanded a highly scalable platform. Cloudian already had such an S3 object storage platform — the company’s genesis was in the world of large-scale wireless messaging systems with Gemini Mobile, an innovator in the design and deployment of the first mobile messaging platforms. Cloudian built a platform to meet these needs and requirements and launched the HyperStore object storage solution in 2011. Cloudian’s most recent achievement towards the vision to revolutionize enterprise storage is the launch of Cloudian HyperFile®, the industry’s first object storage-based file solution to combine full enterprise-class NAS feature set and scale-out performance, saving companies 70% TCO vs traditional NAS. Today, enterprises and service providers alike are building reliable, affordable, and scalable storage solutions with Cloudian, the leading fully native S3 file and object storage solution.


Happy Hour Reception Sponsors



We believe that simplicity is the foundation of modern data management. Our mission is to radically simplify how organizations manage their data and unlock limitless value. Your data is a uniquely valuable asset to the business, but first, it needs to be protected and available at all times. With the Cohesity platform, you can ensure continuity and repurpose your data for additional value. Start b .... y eliminating infrastructure silos to remove cost and complexity, then do more with your data through value-added apps and services. One Platform. Limitless Potential. Your Choice. The Industry’s First Comprehensive Multicloud Platform for Data Management Services.
We are a customer-focused cloud solutions provider that aims to create a streamlined customer experience. We provide managed infrastructure and cloud services to amplify the value of your staff. Our goal is to simplify your workload and enable your IT team to concentrate on their business objectives. Allowing you to focus on the critical tasks, and we'll handle everything else. We offer compute, d .... ata protection, cybersecurity and managed services all on a centralized platform so you can be more efficient.
Today, there’s more data and users outside the enterprise than inside, causing the network perimeter as we know it to dissolve. We need a new perimeter. One that is built in the cloud, and follows and protects data — wherever it goes. One that provides protection without slowing down or creating friction for the business. One that enables fast and secure access to the cloud and web using one o .... f the world’s largest and fastest security networks, so you never have to sacrifice security for performance. This is the new perimeter. This is the Netskope Security Cloud. Reimagine your perimeter.



Event Agenda
Download Agenda













Intelligent Automation Panel
Fundamentals for Intelligent Automation Enablement (Tech Theater 1 9AM - 10AM)




Allen Wuescher
Vice President and CIO
Toshiba Intl. Corporation

Sudhakar Virupakshi
Chief Information Officer
Par Pacific - Stanford, MIT

Sonya Bridges
AVP of IT Solutions
DFW International Airport

Ajit Singh
Chief Information Officer
Southwestern National Bank


Embracing Intelligent Automation to enrich employee and customer experiences, enhance data utilization and protection, reduce cost while fostering collaboration, transparency and trust is top of mind for decision makers in 2021 and beyond.

Analysis and measurement along with streamlining processes have overwhelmingly supported automating key functions faster, better cheaper. Effectively using Data Analytics across all functions of the Enterprise have been key to successful automation projects. Keeping data safe at rest and in motion is a must to have ongoing confidence in Intelligent Automation systems.

Cybersecurity is an important and fundamental component of success of any Intelligent Automation initiative. Preventative measures to avert security incidents is necessary as post event detection is meaningless to operations. Breaches of automated systems will cause abrupt systemic failures with a high risk of large negative operational impact that will take time and intellectual sophistication to research and resolve.

The most enlightened companies have Data Scientists on board to support intelligent automation initiatives and need a solid approach to securing these initiatives. Cyber-attacks and security tools evolve rapidly and keeping current with the latest technology in this space is a perpetual initiative. 

Please join these Top Executive thought leaders for insights in a frank discussion.


Conference Exhibitors

Supporting Sponsors


Advisory Board




Diego Souza
Diego Souza
Global Cyber Security Executive | Board Advisor | Global Chief Information Security Officer
Cummins Inc.
Ernie Neumann
Ernie Neumann
CTO
Six Foot, LLC
Jerich Beason
Jerich Beason
CISO
Capital One
Hector Paredes
Hector Paredes
CIO
YAS Partners Corporation
Jeff Roberts
Jeff Roberts
Founder & CEO
Innovation Vista
James Watson
James Watson
CIO
Total Safety US, Inc
Jim O'Brien
Jim O'Brien
US Business Unit Cyber Security Officer
CGI
Leticia Huerta
Leticia Huerta
Blockchain Products, Business Controls
Onyx by JPMorgan Chase
Mahendra Nambiar
Mahendra Nambiar
Founder
Aggregation Consulting
Mark Lynd
Mark Lynd
Top 10 Global AI & Cybersecurity Professional
Relevant Track
Mike Till
Mike Till
CTO
Treverity
Michael S. Oberlaender
Michael S. Oberlaender
Global Security Thought Leader & CISO
Company Strictly Confidential
Reid Wisa
Reid Wisa
Global Cyber Security Director | Board Advisor | MBA | Master of Computer Science | CISSP | CRISC | Head of Information Security
Tailored Brands, Inc.
Robert Harris
Robert Harris
Vice President of Engineering
ONE Discovery Inc.
Sindhu Menon
Sindhu Menon
Chief Information Officer
Harris County
Stephen Webster
Stephen Webster
Head of Microgrid OS
Enchanted Rock
Worth Davis
Worth Davis
Senior Vice President
Calian
Xiaoying Hu
Xiaoying Hu
Cybersecurity Manager
Katy ISD
Sada Krishnan
Sada Krishnan
AVP of IT
Situs
Ross A. Leo
Ross A. Leo
Chief Information Security Officer (CISO/DPO)
Galen Data
Robin Austin
Robin Austin
CTO
Colliers Group

ElevateIT: Houston Technology Summit 2021