Protect SummIT Agenda
Monday, August 19
11:00 a.m. Registration
12:00 p.m. - 1:00 p.m.Networking Lunch with Hosted Roundtables
1:00 p.m. - 1:30 p.m.Welcome and Opening Remarks
Lisa Gau, VP, Corporate Sales, East Region, CDW
Bob Bragdon, SVP and Publisher, CSO
1:30 p.m. - 2:15 p.m.The Future of Cybersecurity: A Friendly Hacker's Perspective
Keren Elazari, Cyber Security Analyst, Author & Researcher

Cybersecurity is no longer about protecting secrets.  It's about our way of life that relies on digital technology, everywhere -- from clouds to smartphones, from sensors to webcams, to stock markets and so much more.  In this environment, are you and your organization thinking about what's next?  Join us for this session where we’ll inspire security and IT executives and managers to act on what matters most.  We’ll shed light on emerging security threats, new attack vectors and techniques, what we can learn from friendly hackers and how to work with them, and practical ideas on how executives and managers can make a difference in their organizations.  We’ll discuss the future workforce and business challenges in this space and how to foster more diversity in cybersecurity.  Finally, we’ll look at the future of cybersecurity and learn why resilience will be defined not just by our efforts to balance technology’s benefits against the risks it brings with it, but by how we evolve our paradigms about security, privacy and digital access.
2:20 p.m. - 2:50 p.m.Inside-Out Security: Why We Should Build Castles Instead of Warehouses
Alyssa Miller, Manager, Information Security Solutions Practice, CDW

Medieval castle builders made effective use of simple design principles to defend the most valuable assets inside.  Centuries later, we’ve forgotten those valuable lessons as we defend our IT assets.  From the moment we began enabling multi-user systems, we’ve approached how we defend our information in all the wrong ways.  Join us for this session as we look at a completely different approach to designing security in our systems.  We’ll explore new ways to understand what assets are, what threats they face, and how to leverage three basic types of defense mechanisms to effectively protect what we hold most dear.  To add context to this new approach, we’ll draw on trends and lessons learned from thousands of security assessments and deployments across a vast portfolio of security technologies.  All of this will show why it’s time to defend your crown jewels inside a fortified castle rather than a thinly constructed warehouse.
2:50 p.m. - 3:20 p.m.Networking Break
Ask the experts in "CDW's Bring IT On" area during the break. The answer to your challenge might be right here onsite!
3:20 p.m. - 3:50 p.m.Customer Keynote or Executive Interview
4:00 p.m. - 4:45 p.m.Partner Breakout Hosted by CiscoPartner Breakout Hosted by Trend Micro
David Roth, VP, US Northeast, Trend Micro
4:45 p.m. - 5:30 p.m.Free Time
5:30 p.m. - 7:00 p.m.Networking Dinner in the IT Showcase
Grab a cocktail and network with SummIT attendees and partners. Don't miss the opportunity to ask the experts at CDW's "Bring IT On" area!

Tuesday, August 20
7:30 a.m. - 8:30 a.m.Networking Breakfast with Discussion Tables
8:30 a.m. - 8:45 a.m. Welcome
Bob Bragdon, SVP and Publisher, CSO
8:45 a.m. - 9:30 a.m. Winning at Cyber Leadership: Get Your IT Together
G. Mark Hardy, Founder & CEO, National Security Corporation

People, process, and technology.  You hire for people.  You budget for technology.  But strategic success comes from successfully integrating your assets in a repeatable process that matures with time and expertise.  Cyber security has fought its way to the boardroom agenda, but solutions require more than just throwing money at the problem.  Like the shift to a wartime economy over 75 years ago, we must reprioritize assets to address the most critical risks we recognize as informed leaders.  Join us for this session as we explore ways to integrate your security resources in a workable methodology that’s responsive to executive governance, effectively manages cyber risk, and meets the ever-growing list of compliance requirements we face in a globalized economy.
9:35 a.m. - 10:20 a.m.Partner Keynote Presentation Hosted by CrowdStrike
10:20 a.m. - 10:50 a.m.Networking Break
Grab some coffee and refreshments along with an opportunity to compare notes with your peers.
10:50 a.m. - 11:20 a.m.Customer Keynote or Executive Interview
11:30 a.m. - 12:15 p.m.Partner Breakout Hosted by FireEyePartner Breakout Hosted by Proofpoint
12:15 p.m. - 1:15 p.m.Networking Lunch with Discussion Tables
1:15 p.m. - 2:00 p.m.Partner Keynote Presentation Hosted by Palo Alto Networks
2:05 p.m. - 2:35 p.m.Customer Panel Discussion
2:35 p.m. - 3:00 p.mWrap Up Remarks
Lisa Gau, VP, Corporate Sales, East Region, CDW
3:00 p.m.Departures