CIO Southwest US Summit | June 24, 2021 | Virtual Summit - Real-time Online Conversations
↓ Agenda Key
Keynote Presentation
Visionary speaker presents to entire audience on key issues, challenges and business opportunities
Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.
Executive Visions
Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics
Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.
Thought Leadership
Solution provider-led session giving high-level overview of opportunities
Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.
Think Tank
End user-led session in boardroom style, focusing on best practices
Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.
Roundtable
Interactive session led by a moderator, focused on industry issue
Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.
Case Study
Overview of recent project successes and failures
Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.
Focus Group
Discussion of business drivers within a particular industry area
Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.
Analyst Q&A Session
Moderator-led coverage of the latest industry research
Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.
Vendor Showcase
Several brief, pointed overviews of the newest solutions and services
Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.
Executive Exchange
Pre-determined, one-on-one interaction revolving around solutions of interest
Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.
Open Forum Luncheon
Informal discussions on pre-determined topics
Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.
Networking Session
Unique activities at once relaxing, enjoyable and productive
Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.
9:15 am - 9:30 am
9:30 am - 10:10 am
Presented by:
Michael Anderson, CISO & CTO, Dallas Independent School District
Marty Ray, Chief Information Security Officer, Fossil Group, Inc.
Aakrati Adhvaryu, Director, Identity & Access Management & Cyber Security, Baker Hughes
10:10 am - 10:40 am
With the dramatic increase in distributed workforces and the growing adoption of cloud applications, companies face unprecedented levels of IP, data, and identity sprawl beyond the enterprise firewall. Every endpoint is an entry into your business, cybercriminals have more ways to break in than ever before, and human error on the inside is a constant risk. Historically, endpoint security has been a zero-sum gameâ?"with the odds inevitably stacked against IT. But rather than protect devices, what if you could just control the security of them?
In this presentation, see how Chrome OS and Chrome Browser are secure by designâ?"embedding security into every workflow to provide proactive protection for users, devices, applications, and data, wherever work happens. This is cloud-first security control in the hands of the modern businesses that will thrive moving forward.
Sponsored by:
Google
Presented by:
Robert DeVito, Global Director, Chrome Customer & Partner Sales Engineering, Google
10:40 am - 11:00 am
Many technologists have had their departments shift from being 'cost centers' to revenue generators for their organizations. That isn't the only shift that is coming for IT and cybersecurity executives. Margins are reduced and expectations are high. Innovation has to move faster. Leadership has to evolve. Risk has a whole new meaning going into 2021. The energy sector has been as hard hit as anyone.
Join Ismail Dandia and J.D. Miller as they talk
about improving ROI while doing more with less.
Presented by:
Ismail Dandia, Global IT Director - Transformation, Shell
11:00 am - 11:20 am
The disruption of a pandemic reveals broader CX trends that are escalating rapidly. We'll discuss agility and how CX organizations can prepare themselves for service in uncertain times.
Sponsored by:
Freshworks
Presented by:
Sam Eriksmoen, Sr Solutions Engineer, Freshworks
The move to broad-based remote work has accelerated many organizations business requirements to move more infrastructure and services into the cloud. Experts agree that the top priority for cloud migration should be data security and privacy. However, recent studies discovered that 70% of organizations experienced a public cloud security incident in the last year. With 80% of organizations predicted to migrate toward cloud, hosting, and colocation services by 2025, new attack surfaces will arise and create greater security vulnerabilities.
To fully benefit from rapid technological transformation, it is imperative that enterprises embrace strategies for safeguarding their infrastructure and services both during and after cloud migration. In this session, we will discuss common challenges and the tools and strategies IT and security leaders are finding most effective for managing a secure transformation to the cloud.
Sponsored by:
Centrify
Presented by:
Jason Mitchell, Senior Vice President, Engineering, Centrify
11:20 am - 11:40 am
Having recently found myself in a role dedicated to IAM, I
quickly learned there was a gap in my knowledge. With 15 years of cybersecurity
experience, it never occurred to me how little I understand about this domain.
Entitlements, provisionables, and requestables are just part of an entirely new
language I've been learning. Let us discuss why there is a gap in our knowledge
and what we can do to overcome it.
Presented by:
Cindy (Satterfield) Heiner, Executive Director, Cybersecurity & Technology Controls, JPMorgan Chase & Co.
11:40 am - 12:00 pm
Legacy software supply chain "exploits", such as Struts incident at Equifax, prey on publicly disclosed open source vulnerabilities that are left unpatched in the wild. Conversely, next-generation software supply chain "attacks" are far more sinister because bad actors are no longer waiting for public vulnerability disclosures. Instead, they are actively injecting malicious code into open source projects that feed the global supply chain.
Join this fireside chat with Ax Sharma, Senior Security Researcher, Sonatype and Michelle Dufty, Senior Vice President, Marketing Sonatype to:
1) Understand software supply chain attacks and their impact on the open-source ecosystem
2) Deep dive into prominent real-world examples of dependency confusion, typosquatting and brandjacking malware
3) Learn how your organization can proactively protect itself against software supply chain attacks
Sponsored by:
Sonatype
Presented by:
Ax Sharma, Senior Security Researcher, Sonatype
Michelle Dufty, Senior Vice President of Marketing, Sonatype
The miniaturization of electronic gadgets, the IoT (Internet of Things) and the economization of tech production has enabled consumers to a wealth of information. That also means that bad actors also have new and ever increasing access to that data as well. This session dives into how ransomware will impact each of our organizations this year and how it has gone from being an expensive annoyance to something that can be deadly depending on your industry.
Key Takeaways:
Sponsored by:
Rubrik
Presented by:
Joshua Stenhouse, Field CTO - Security, Rubrik
12:00 pm - 12:30 pm
In today's world, there's a common thread connecting almost every organization across all industries and regions: uncertainty. Change - often disruptive - is happening faster. Customer demands rise for a more convenient digital experience, security threats are growing as cloud-based cyberattacks increased by 630% and a complex, ever-changing web of regulations extends from country to country. So, how can businesses digitally transform with cloud, while also ensuring they have a secure environment where customers' data is not compromised? The answer is clear: with a secure and open hybrid cloud architecture. This next-generation cloud architecture magnifies the benefits of cloud while simplifying IT operations, data access, interoperability, security, and more.
Takeaways:
Sponsored by:
IBM
12:30 pm - 12:50 pm
Industry4.0 has brought all things connected, powered by tech and driven by sophisticated A.I models. Digital twin which is a living and breathing model of a physical asset has become a game changer and is being applied to enterprise to understand existing models, identify bottle necks, optimize and accelerate innovation. It is equally important that Digital identity of a Digital twin is protected and regulated.
Presented by:
Rameshwar Balanagu, Head of Enterprise Architecture, Avaya
12:50 pm - 1:10 pm
We've demonstrated that we can be incredibly productive in multiple constructs - together - and apart; so, how do we make sure that we get the most of both? We have an opportunity to reimagine how we use the space we work in and optimize our workforce and that's an exciting place to be. Zoom offers innovation that never stops - so that you can implement hybrid work in the optimal construct for your organization, your customers, and your partners. In this presentation we will discuss Zoom's vision for the future of hybrid work and how you can prepare your company for the reopening of the office and be successful in this new hybrid work model.
Sponsored by:
Zoom
Presented by:
Gary Sorrentino, Global Deputy CIO, Zoom
With attack surface sprawl and growing numbers of vulnerabilities to address, security and IT teams are increasingly challenged to meet remediation targets. To overcome this problem, teams need an automated way of identifying and correlating the highest risk vulnerabilities with the right remediation steps.
Sponsored by:
HCL BigFix
Presented by:
Bret Lenmark, Director of Product Marketing, BigFix, HCL BigFix
1:10 pm - 1:30 pm
While digital transformation has fostered much of industry's attention, organizations also need to shift focus to changing workforce dynamics. In this session with Vikas Parikh, Chief Architect from LyondellBasell, we will explore how successful leaders and decision-makers understand that the only way to plan forward as a stronger company is by looking through an inclusive lens.
It has been proven that diverse and inclusive companies are proven to innovate more readily and succeed in driving digital transformation. A recent study by McKinsey reported that 'companies in the top-quartile for gender diversity on executive teams were 21% more likely to outperform on profitability and 27% more likely to have superior value creation'. Yet why is progress so slow when we recognize the competitive edge?
Presented by:
Vikas Parikh, Chief Architect, LyondellBasell
1:30 pm - 1:50 pm
Ransomware is a clear and present danger to companies and global supply chains. With ransomware attacks crippling gasoline, food, and healthcare in the US, companies must pivot to a proactive approach to interrupting the kill chain whenever possible. Todd Carroll, CISO and former FBI Deputy Special Agent in Charge, gives an overview of how threat actors choose their targets, locate infiltration points, infect systems, and extort organizations. Leaving this session, you will know how to break the ransomware kill chain at multiple points.
Sponsored by:
CybelAngel
Presented by:
Todd Carroll, CISO & VP Operations, NA, CybelAngel
1:50 pm - 2:10 pm
Sponsored by:
Twilio
2:10 pm - 2:20 pm