ElevateIT: Phoenix Technology Summit 2023

Sheraton Phoenix Downtown
March 7, 2023
340 N 3rd St Phoenix, AZ 85004

Optimizing IT & Cybersecurity to Accelerate Business Enablement

Join us at the ElevateIT: Phoenix Technology Summit 2023 and hear from Key Regional C-Suite Technology Executives, Industry & Subject Matter Experts, and Law Enforcement as we address the following questions, share insights and expertise and discuss best practices on how to optimize & secure your business to accelerate profitability and growth.

  • How do I help my company keep and grow its market base within one of the most disruptive chaotic times in history?
  • Can I capitalize on the disruption to create a competitive advantage?
  • How do I create value while maintaining digital trust?
Today without question, process automation, data protection, and process security (cybersecurity) are the top strategic components of governance and innovation. Adding digital cybersecurity for accuracy and speed can be key to adding value and trust. And “trust” is THE key characteristic to business growth.

Keynote Presentation

Aligning Your Teams & Resources to Mitigate Risk Amidst Financial Uncertainty







Panelists


Gunjan Goel


Chief Information Officer
ST Engineering North America
Keynote Speaker

Steven Kolombaris


Chief Information Security Officer
Sotheby’s
Keynote Speaker

Aligning Your Teams & Resources to Mitigate Risk Amidst Financial Uncertainty

Tech Theater I | 9am - 10am


Aligning Your Team & Resources to Mitigate Risk Amidst Financial Uncertainty
How can CIOs & CISOs transform and thrive in a highly disruptive and chaotic ecosystem?

According to Gartner, “57% of boards of directors believe an economically and politically polarized society is the biggest source of risk.”

Preparing and planning for uncertainty and embracing change is an art and essential for 2023 Executives. With the world in chaos and businesses in constant disruption, Leadership must position and execute agile processes and teams that are completely aligned with the business. Embracing automation will be a game changer.

Accessibility to key stakeholders including an aligned board member capable of making quick decisive decisions can make the difference between success and failure.  

An agile modular decision-making governance strategy, aligned with the business, must have a clear and decisive pathway to the top. Governance means the possibility of pivoting quickly with processes that can do the same. Transparency and accessibility along with expressed and clearly communicated risk factors are elements of what is now called a “compossible” business. 
 
  • Composability as an Asset
  • Streamlining Third Party Vendor Management with New Processes for Auditing Off-The-Shelf Applications
  • Hiring and Retaining Top Talent
  • Identifying and Mitigating Staff Burnout
  • Key Strategies for preparing your Cybersecurity Team for Future Risks
  • Detecting Threats in Decentralized IT Environments
  • Improving the Digital Business by Remodeling Security Architecture
  • Steps to measure Organization’s Security Posture
  • Adjusting to changes in regulatory guidelines







  • THE ElevateIT
    ADVANTAGE


    ElevateIT inspires and empowers idea creation through a disruptive transformational culture by attracting the finest speakers and vendors imparting solid strategies able to quickly be implemented within Enterprises and Start-Ups alike.

    We strive to bring together the ever-changing multi-facets of the Technology Industry in a fun, safe and informative atmosphere and feel fortunate to have good friends, good partners and a priceless reputation with our industry community. See what we mean for yourself by watching our summit videos.



    Gold Sponsors



    Exabeam is a global cybersecurity leader that created New-Scale SIEMTM for advancing security operations. Built for security people by security people, we reduce business risk and elevate human performance. The powerful combination of our cloud-scale security log management, behavioral analytics, and automated investigation experience gives security operations an unprecedented advantage over adver .... saries including insider threats, nation-states, and other cybercriminals. We Detect the UndetectableTM by understanding normal behavior, even as normal keeps changing – giving security operations teams a holistic view of incidents for a faster, more complete response.


    Lunch & Learn Sponsors



    AXONIUS. /Ax-OH-nee-us/ (noun) 1. A team of ambitious, hard-working, and driven people taking on the biggest challenges in IT and security today. (See also: Axonians.) 2. A platform that correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action to control complexity. Solving a Foundational Challenge Without an accurate understanding .... of what’s in your environment, everything else suffers. But IT and security teams struggle to manage a complex sprawl of devices, users, cloud services, and software. And traditional approaches to compiling an asset inventory are manual and error-prone. So in 2017, after years in the Israel Defense Forces’ Unit 8200, our co-founders came together to solve that age-old problem.
    Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes how workloads and devices are communicating, creates granular segmentation policies which only allow necessary communication, and automatically isolates ransomware and breaches. Assume breach. Minimize impact. Increase resilience.


    Breakfast Sponsor



    Scale Computing engineered the Scale Computing Platform, an IT infrastructure solution that allows organizations to do more with less. Scale Computing HyperCore software eliminates the need for traditional IT silos of virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available platform for running applications. The pat .... ented self-healing platform automatically identifies, mitigates, and corrects problems in the infrastructure in real-time, enabling applications to achieve maximum uptime even when local IT resources and staff are scarce. Today, the ever-expanding expectations of our digital world demand more applications run outside the cloud or data center, close to where they are used by people, devices and IoT technologies. But managing the sprawl of complex infrastructure to run applications locally in distributed locations is an escalating burden on IT departments. Attempts to handle these edge workloads with tools built for the cloud or traditional data centers result in excess cost, complexity, and fragility that fail to deliver on the promise of edge computing. With SC//Platform, you can run applications and process data outside centralized data centers, at the edge of your network closest to where that data is created and utilized.


    Breakout Presentation Sponsors



    Founded by mathematicians and cyber defense experts in 2013, Darktrace is a global leader in cybersecurity AI, delivering complete AI-powered solutions in its mission to free the world of cyber disruption. We protect more than 7,700 customers from the world’s most complex threats, including ransomware, cloud, and SaaS attacks. Our roots lie deep in innovation. The Darktrace AI Research Centre b .... ased in Cambridge, UK, has conducted research establishing new thresholds in cyber security, with technology innovations backed by over 115 patents and pending applications. The company’s European R&D center is located in The Hague, Netherlands. First-ever Cyber AI Loop With groundbreaking Self-Learning AI, Darktrace empowers bespoke solutions unique to each customer based on continuous visibility into an organization’s entire digital ecosystem. Darktrace is now executing on a Cyber AI Loop, an industry-first set of cyber capabilities that will not just prevent, detect, respond, and heal from cyber-attacks, but do it all at once. An always-on, feedback system with deep, interconnected understanding of the enterprise creates a virtuous cycle in which each capability strengthens and hardens the entire security ecosystem. Trusted Across the World Our customers include public sector agencies, education institutions, media, organizations supplying critical infrastructure, and businesses of all sizes across every industry. Headquartered in Cambridge, UK, Darktrace has more than 2,000 employees located across more than 100 countries. Darktrace was named one of TIME magazine’s “Most Influential Companies” for 2021. Darktrace has been certified compliant with the ISO/IEC 27001:2013 information security standard by the British Standards Institution.
    The Authority in Managed Detection and Response, eSentire is recognized industry-wide because we offer the world’s most complete threat response capability. Through Managed Risk, Managed Detection and Response, and Digital Forensics and Incident Response services, we put your business ahead of disruption.
    RiskRecon traces its beginnings to 2011 when our founder, Kelly White, asked himself, “Is it possible to measure the security program quality of any company simply by looking its Internet-facing presence?” Kelly is a long-time information security practitioner and bank CISO who witnessed first-hand the need for adapting third-party risk controls to meet the new challenges resulting from dec .... entralized IT and SaaS apps. He has many years of hands-on experiencing building big data and analytics solutions to detect fraud and security vulnerabilities in high-velocity transaction environments. Like most organizations at the time, his bank’s third-party risk management assessments relied heavily on questionnaires and other vendor attestations. This approach worked well ten years ago with a small number of large vendors, mostly in-house deployments, purchases controlled by central IT, and a well-defined set of Internet vulnerabilities. With the decentralization of IT purchasing and rapid adoption of SaaS, this approach was becoming less effective and more resource-intensive. What if instead of trying to use the “old” risk management model, his institution could trust an objective source that automatically pinpointed specific gaps in any organization’s security programs and performance? Questionnaires and surveys are helpful in evaluating one’s intent but provide little verifiable insight into actual practices and discipline. After realizing there were no such solutions available, he decided to build his own. After testing and validating his solution with many peers, Kelly decided to pursue the idea full-time and founded RiskRecon, officially incorporated in October 2015. RiskRecon is headquartered in Salt Lake City, UT with a presence in Boston, MA, and representatives around the world.
    Cybersecurity is constantly changing. Time favors the adversary. Today’s challenges are nothing like tomorrow’s. Threats are becoming more and more advanced leveraging the power of automation. Some wait and react. At SentinelOne, we innovate. Our mission is to defeat every attack, every second, of every day. Our Singularity Platform instantly defends against cyberattacks – performing at a fa .... ster speed, greater scale, and higher accuracy than possible from any single human or even a crowd. So, if our tech seems like something from the future, good — that’s exactly what it is. We are defenders. It is why we exist. Born from the hustle, we’ve spent decades sharpening ourselves to make things better for our customers. How? With our autonomous technology, we create a sustainable advantage, not the momentary edge. Through relentless innovation, we give ourselves the power to challenge the accepted standards of today. By putting our customers first, we turn traditional customer relationships into true partnerships.
    ThreatGEN is bridging the “cybersecurity skills gap” and revolutionizing cybersecurity training and education with the ThreatGEN® Red vs. Blue Game-Based Cybersecurity Simulation Platform, developed by our world-renowned cybersecurity experts and published authors. ThreatGEN® Red vs. Blue uses powerful computer gaming technology and active adversary simulation A.I. to provide an interacti .... ve, exciting, and modernized approach to cybersecurity training and education, IR tabletop exercises (TTX), that makes them much more practical, effective, and cost-efficient!

    Silver Sponsors



    The team at ThreatLocker® has been developing cybersecurity tools for decades, including programs to enhance email and content security, and this is our most innovative and ambitious cybersecurity solution yet. We developed this unique cybersecurity system because we believe that organizations should have complete control of their networks and should not have to live in fear of the next malware a .... ttack. We envision a future in which all organizations can chart their own course free from the influence of cyber criminals and the damage their incursions cause, and our team of veteran cybersecurity professionals created ThreatLocker® to make this vision a reality.

    Drink Sponsor





    Registration Sponsor





    Happy Hour Reception Sponsors



    Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection w .... ith Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes. For the last three decades, Check Point Software Technologies Ltd. (www.checkpoint.com) has set the standard for Cyber Security. Our mission is to secure your everything. Across the ever-evolving digital world, from enterprise networks through cloud transformations, from securing remote employees to defending critical infrastructures, we protect organizations from the most imminent cyber threats. With Check Point Infinity, the only consolidated cyber security solution across cloud, networks, endpoints, mobile and IoT, we are continuously pioneering cyber security innovation with the most advanced AI-based threat Intelligence and prevention technologies, unified security management, and cloud security automation to help protect organizations from 6th generation of cyber attacks. With over 3,500 security experts, a world-acclaimed research and intelligence unit, and the broadest ecosystem of business and technology partners, we protect over 100,000 organizations of all sizes across all industry verticals in 88 countries to achieve allow better experiences for in a safer digital world. Check Point Incident Response Team (CPIRT) offers 24/7, data(Intelligence)-driven, and vendor-agnostic incident response services. The CPIRT global team helps our customers manage, mitigate, and understand active cyber incidents. The team helps customers of all sizes prepare for cyber incidents through proactive services; such as Playbook Development, Tabletop Exercises, and Threat Hunting.


    VIP Sponsor






    Event Agenda






      March 7, 2023 » 8:00 am - 9:00 am
    Breakfast Sponsor - TBD
     
    Presented By:

     
      March 7, 2023 » 9:00 am - 10:00 am
    Keynote Presentation - Aligning Your Team & Resources to Mitigate Risk Amidst Financial Uncertainty
     
    Speaker:
    Gunjan Goel
    Chief Information Officer
    ST Engineering North America

     
    Speaker:
    Steven Kolombaris
    CISO
    Sotherby’s

    Aligning Your Team & Resources to Mitigate Risk Amidst Financial Uncertainty
    How can CIOs & CISOs transform and thrive in a highly disruptive and chaotic ecosystem?

    According to Gartner, “57% of boards of directors believe an economically and politically polarized society is the biggest source of risk.”

    Preparing and planning for uncertainty and embracing change is an art and essential for 2023 Executives. With the world in chaos and businesses in constant disruption, Leadership must position and execute agile processes and teams that are completely aligned with the business. Embracing automation will be a game changer.

    Accessibility to key stakeholders including an aligned board member capable of making quick decisive decisions can make the difference between success and failure.  

    An agile modular decision-making governance strategy, aligned with the business, must have a clear and decisive pathway to the top. Governance means the possibility of pivoting quickly with processes that can do the same. Transparency and accessibility along with expressed and clearly communicated risk factors are elements of what is now called a “compossible” business. 
     
  • Composability as an Asset
  • Streamlining Third Party Vendor Management with New Processes for Auditing Off-The-Shelf Applications
  • Hiring and Retaining Top Talent
  • Identifying and Mitigating Staff Burnout
  • Key Strategies for preparing your Cybersecurity Team for Future Risks
  • Detecting Threats in Decentralized IT Environments
  • Improving the Digital Business by Remodeling Security Architecture
  • Steps to measure Organization’s Security Posture
  • Adjusting to changes in regulatory guidelines
  •  
      March 7, 2023 » 10:00 am - 11:00 am
    Closed - Please Tour and Evaluate Exhibitors

     
      March 7, 2023 » 11:00 am - 12:00 pm
    Exabeam - How to Build an Insider Threat Program
     
    Speaker:
    Jeannie Warner
    CISSP, Director of Product Marketing
    Exabeam
     
    Presented By:

    Sometimes just having a SOC isn’t enough to address insider threat issues. Security operations teams are managing massive amounts of data across billions of events from on premises to the cloud. Looking for specific needles like insider threats in this complex haystack has special requirements that encompass both searching historic data and seeing evolving credential behavior changes as they happen.

    Whether from downsizing or expanding the business, employees, vendors, contractors, and more are moving in and out of your environment. And often, it is during turbulent times that insider threats go unobserved as everything  changes so quickly. Insider threat initiatives require a new, more focused approach.

    This presentation will explore:

    The common scenarios that indicate you need an insider threat team, how to build a mission statement, and tools

    Four attributes of a successful insider threat program

    How behavioral analytics baseline “normal” behavior of users and devices – showing risk faster

    An automated investigation experience that replaces manual routines and effectively guides new insider threat teams.

    Demo:

    Advanced Analytics” – Creating watch lists, using anomalies to guide investigation of internal threats,  Identifying compromised credentials vs malicious activity.

     
      March 7, 2023 » 12:00 pm - 1:00 pm
    Closed - Please attend the Lunch & Learn Sessions in Tech Theaters 2, 3, or VIP Theaters

     
      March 7, 2023 » 1:00 pm - 2:00 pm
    TBD

     
      March 7, 2023 » 3:00 pm - 4:00 pm
    Closed - Please Tour and Evaluate Exhibitors

     
      March 7, 2023 » 4:00 pm - 5:00 pm
    ThreatGen - Cybersecurity Skills Challenge

     
      March 7, 2023 » 5:00 pm - 5:15 pm
    Prizes and Giveaways

     
      March 7, 2023 » 9:00 am - 10:00 am
    Closed - Please attend the Keynote Session in Tech Theater 1

     
      March 7, 2023 » 11:00 am - 12:00 pm
    TBD

     
      March 7, 2023 » 12:00 pm - 1:00 pm
    Lunch and Learn - Axonius - A Common Sense Approach to SaaS Management: Understanding Breadth, Depth and Context
     
    Speaker:
    Constantine Vorobetz
    Senior Sales Engineer
    Axonius
     
    Presented By:

    A common sense approach to SaaS Management should be comprehensive and address both business value and risk management of the organization.  Over the past few years, various tools have emerged to address some aspects of SaaS management or SaaS Security Posture Management, but these approaches still leave companies with gaps in visibility and siloed information.  

     

    An effective approach to SaaS management should cover three (3) core concepts to ensure its business value for stakeholders: 

    • Breadth: The ability to discover both known and unknown SaaS applications, providing complete and actionable visibility into interconnectivity flows.
    • Depth: Uncover and mitigate various security risks, such as user access policies, password policies, and more that put sensitive customer and business data at risk - including identifying misconfigured SaaS settings and suspicious or malicious behavior.
    • Context: Provide Correlation and valuable data insights between SaaS apps, cloud services, devices and users in the organization’s environment.

    In this presentation, we’ll review the core concepts above in detail and discuss how to;

    1. Effectively discover SaaS Apps in your environment, 
    2. Manage internal policies with confidence and ensure that your SaaS applications are properly configured. 
    3. Validate that SaaS users have access and proper permissions to various applications.
    4. How to track and inform SaaS cost optimization and spend for your organization.
     
      March 7, 2023 » 1:00 pm - 2:00 pm
    TBD

     
      March 7, 2023 » 2:00 pm - 3:00 pm
    TBD

     
      March 7, 2023 » 4:00 pm - 5:00 pm
    TBD

     
      March 7, 2023 » 5:00 pm - 5:15 pm
    Prize Announcements and Giveaways in Tech Theater 1

     
      March 7, 2023 » 9:00 am - 10:00 am
    Closed - Please attend the Keynote Session in Tech Theater 1

     
      March 7, 2023 » 11:00 am - 12:00 pm
    TBD

     
      March 7, 2023 » 12:00 pm - 1:00 pm
    Lunch and Learn - Illumio - TBD
     
    Presented By:

     
      March 7, 2023 » 1:00 pm - 2:00 pm
    TBD

     
      March 7, 2023 » 5:00 pm - 5:15 pm
    Prize Announcements and Giveaways in Tech Theater 1

     
      March 7, 2023 » 9:00 am - 10:00 am
    Closed - Please attend the Keynote Session in Tech Theater 1

     
      March 7, 2023 » 11:00 am - 12:00 pm
    CISO Roundtable - Strategies for Future-Proofing your Security Team
     
    Speaker:
    Lester Godsey
    Maricopa County
    CISO

     
    Speaker:
    Scottard Banks
    Chief Information Security Officer
    SmartRent

    Following Introductions, this CISO led panel will briefly discuss the challenges brought about involving the hybrid workforce due to the covid pandemic. Then Panelists will transition into the following current & future-looking topics:

  • The Importance of Adopting a Prevention First Approach
  • Strategies for Securing the Software Supply Chain (both internally and with focus on your customers & suppliers)
  • Simplifying Security Processes for Long-Term Sustainability
  • Disrupting Disinformation & Social Engineering Campaigns
  • Mitigating Risk from 3rd Party Vulnerabilities
  • Preparing for a Compromise of a Cloud Services Provider
  • Hiring and Retaining Top Talent
  •  
      March 7, 2023 » 12:00 pm - 1:00 pm
    Lunch Session - Integrating the Whole of State Approach to Cybersecurity in Arizona
     
    Presented By:

     
      March 7, 2023 » 1:00 pm - 2:00 pm
    Women In Technology Roundtable - Fostering Diversity & Inclusion in Our Workplace
     
    Speaker:
    Briana Brown
    VP of Technology & Innovation
    Bayless Integrated Healthcare

     
    Speaker:
    Lisa Faison
    Deputy Chief Information Officer
    City of Goodyear

     
    Speaker:
    Nicole McMackin
    CEO
    ITC

     
    Speaker:
    Sarah VanSlyke
    Deputy CTO
    Town of Gilbert

    Why do we need to bother about Diversity and Inclusion (D&I)? Is there value in taking the critical steps to evolve into a more diverse culture? Research has found that D&I 1) helps foster and contribute to enriched innovation, collaboration, and creativity; 2) broadens the talent pool and attracts enhanced skill sets. 3) Improves market reputation and trust therefore increasing customer base. 4) Improves investor and regulatory relationships and much more.

    Have you taken the initiative to measure your company’s D&I so that you know where to begin and what gaps you need to fill? By performing a full gap analysis based on D&I it can promote credibility and key stakeholders buy-in and highlight your strengths and weaknesses.

    Continued measured results based on qualified quantifying markers, like customer and employee surveys and monitored project goals and revenue goals, will help spearhead forward progress. Although most Top Executives believe D&I is important, how to implement a successful policy while successfully embedding it into the current culture is not clear and not easy.

    Many leaders are not predisposed to discussing diversity and inclusion openly. Many don’t know even how to begin or whether the discussion will be well received. By inviting in third party professional trainers and advisors planning and forward progression will go more smoothly. Forward-thinking Executives will make Diversity and Inclusion a priority to create a competitive edge and maintain resilience. Interact with these amazing thought leaders and take steps toward improving D&I.
     
      March 7, 2023 » 2:00 pm - 3:00 pm
    CIO Roundtable - The Developing Role of the CIO: Growth Through Organizational Resilience
     
    Speaker:
    Joseph Oddo
    CIO
    Triwest Healthcare Alliance

     
    Speaker:
    Scott Hicar
    Senior Vice President, CIO
    Benchmark Electronics

    According to Gartner research, “four out of five CEOs are increasing digital technology investments to counter current economic pressures, including inflation, scarce talent and supply constraints.”

    The Executive Panel will discuss the ever-changing role of the CIO in the face of economic uncertainty, supply chain and talent shortages, and how adaptation & agility will take priority for years to come.

    During this one-hour session, panelists will share their experience, expertise, and predictions on the following subjects:

  • Growing Brands using Cloud First Solutions
  • Composability is Key
  • Executing a Digital IT Strategy
  • Strategies for Measuring IT Value
  • Importance of investing in mission critical IT
  • Prioritizing Agility & Composability over Transformation
  • Develop a Digital Immunity Strategy
  • Hiring and Retaining top talent
  • Importance of Sustainability
  •  
      March 7, 2023 » 4:00 pm - 5:00 pm
    Data Privacy Panel - TBD

     
      March 7, 2023 » 5:00 pm - 5:15 pm
    Prize Announcements and Giveaways in Tech Theater 1

     







    ThreatGen Cybersecurity Skills Challenge
    Tech Theater I 4p-5p


    Conference Exhibitors

    Supporting Sponsors


    Advisory Board




    Aaron Gette
    Aaron Gette
    Chief Information Officer
    EOS Fitness
    Bianca Lochner, Ph.D
    Bianca Lochner, Ph.D
    Chief Information Officer
    City of Scottsdale
    Brian Ruzycki
    Brian Ruzycki
    CIO & CTO
    Homeowners Financial Group USA, LLC
    Brian Johnson
    Brian Johnson
    Former Head of Cybersecurity
    Paypal
    Briana Brown
    Briana Brown
    VP of Technology & Innovation
    Bayless Integrated Healthcare
    Chris Bowen
    Chris Bowen
    Chief Information Security Officer & Founder
    ClearDATA
    Gunjan Goel
    Gunjan Goel
    Chief Information Officer
    ST Engineering North America
    Ian McClarty
    Ian McClarty
    President
    PhoenixNAP
    Leo Hauguel, CISSP, NSA-IAM
    Leo Hauguel, CISSP, NSA-IAM
    Founder
    Sonoran Desert Security User Group
    Lisa Faison
    Lisa Faison
    Deputy Chief Information Officer
    City of Goodyear
    Patrick Pendleton
    Patrick Pendleton
    Chief Information Officer
    National University
    Ryan Gruver
    Ryan Gruver
    IT Director
    Banner Health
    Sarah VanSlyke
    Sarah VanSlyke
    Deputy CTO
    Town of Gilbert
    Shannon Lawson
    Shannon Lawson
    Chief Information Security Officer
    City of Phoenix
    Tanay Karmakar
    Tanay Karmakar
    Director of IT Strategy & Development
    M3bi, LLC
    Vasil Dimovski
    Vasil Dimovski
    CIO, Taskforce & Regional Director
    Cinch I.T.

    ElevateIT: Phoenix Technology Summit 2023