Protect SummIT Agenda
Monday, February 25
11:00 a.m.Registration
12:00 p.m. - 12:45 p.m.Networking Lunch
12:45 p.m. - 1:15 p.m.Welcome and Opening Remarks
Brett Schmidt, VP, West Region, CDW
Bob Bragdon, SVP and Publisher, CSO
1:15 p.m. - 2:00 p.m.The Future of Cybersecurity:  A Friendly Hacker's Perspective
Keren Elazari, Cyber Security Analyst, Author & Researcher

Cybersecurity is no longer about protecting secrets.  It's about our way of life that relies on digital technology, everywhere -- from clouds to smartphones, from sensors to webcams, to stock markets and so much more.  In this environment, are you and your organization thinking about what's next?  Join us for this session where we’ll inspire security and IT executives and managers to act on what matters most.  We’ll shed light on emerging security threats, new attack vectors and techniques, what we can learn from friendly hackers and how to work with them, and practical ideas on how executives and managers can make a difference in their organizations.  We’ll discuss the future workforce and business challenges in this space and how to foster more diversity in cybersecurity.  Finally, we’ll look at the future of cybersecurity and learn why resilience will be defined not just by our efforts to balance technology’s benefits against the risks it brings with it, but by how we evolve our paradigms about security, privacy and digital access.
2:00 p.m. - 2:30 p.m.Cybersecurity: Deciphering the Noise and Developing a Cohesive Strategy
Alyssa Miller, Manager, Information Security Solutions Practice, CDW

A recent survey found that CEOs in the United States rate cybersecurity as their primary concern for 2019. At the same time, the landscape of security technologies and best practices competing for security budgets is constantly evolving and expanding. As a result, defining a strategy to address cyber threats for an organization can be complex. In this session, we’ll explore ways to address crucial threats by uniting various technologies and security activities into a cohesive cybersecurity program. We’ll offer strategies to prioritize security initiatives to effectively and efficiently reduce overall security risk across the organization. And we’ll share trends and lessons learned through thousands of security assessments and deployments from a vast portfolio of security technologies.
2:30 p.m. - 3:00 p.m.Networking Break
Ask the experts in "CDW's Bring IT On" area during the break. The answer to your challenge might be right here onsite!
3:00 p.m. - 3:45 p.m.Getting Ahead of the Threat: Emerging Threats and Lessons Learned for the Digital World
Curt Aubley, VP Solution Architecture & Integration, CrowdStrike

What are the latest emerging threats targeting your endpoints, public and private cloud computing assets, and non-traditional devices across IoT?  And what strategic assets do you need to protect as your organization continues its digital transformation journey?  Join us for this session as we explore answers to these questions -- and share cybersecurity intelligence and lessons learned to help you protect endpoints, cloud assets, and IoT attack surfaces.  We’ll also reveal security strategies that leverage predictive intelligence, artificial intelligence and hyperscale technologies.
Drink, Sync, Think: Cybersecurity in the Information Age
Marty Ward, VP, Product Marketing, Sophos

We’ve been promised the Big Data dream for years. In it, we’d have access to every piece of critical IT and security data -- which would finally help defenders stay one step ahead of attackers. But the dream hasn’t come true. The reality of Big Data has been an overwhelming amount of information that IT teams must painstakingly aggregate in the hope of finding meaningful and actionable insights. Most organizations discovered they don’t have Big Data resources -- and instead ended up with a Big Data problem. Simply put, the scale and coordination of today’s attacks can’t be contained by simply hiring more people or buying more siloed technologies. So where do we go from here? The answer involves automating data collection (drink), integrating (sync), and analyzing (think) with AI-based security technology. Join us for this session to understand the evolution of security from point products to integrated, synchronized systems that can deliver truly secure environments and more efficient use of resources.
3:45 p.m. - 4:00 p.m.Networking Break
4:00 p.m. - 4:45 p.m.How to Capitalize on Today’s Security Renaissance
Aaron Miller, Director, Americas Sustaining Systems Engineering, Palo Alto Networks

Companies all over the world are leveraging technology to out-innovate and disrupt their competition.  As enterprises continue this shift to digital transformation, it’s critical they recognize that what worked well in the past for security may not achieve future goals.  Clouds, machine learning, automation:  all of these capabilities empower enterprises to deliver profound efficiencies to their information security strategies, but if enterprises drive change without insight to the problems they’re really trying to solve, they’ll find themselves stuck in a loop of investment without progress.  Join us for this session to get an understanding of today’s changing security market -- and a pragmatic vision for the future of the industry.
Cloud Security: Managing Risk While Minimizing Business Friction
Kaushik Narayan, VP, CTO Cloud BU, McAfee

Not long ago, clouds were valued for agility and cost reduction, but they’ve now evolved as a core and strategic ingredient for digital transformation. For IT security executives and managers, this means managing risk across a multitude of providers and evolving cloud platforms like SaaS, PaaS and IaaS. Ultimately, cloud security is not just about driving a new security stack, but transforming security as a business enabler that manages risk with minimal amount of friction to business and development teams. Join us for this session as we review cloud service trends and what it means to have a strong cloud security posture now and into the future.
4:45 p.m. - 5:30 p.m.Free Time
5:30 p.m. - 7:00 p.m.Networking Dinner in IT Showcase
Enjoy cocktails and small plates while you network with Protect SummIT participants and partners. Don't miss the opportunity to ask the experts at CDW's "Bring IT On" area!

Tuesday, February 26
7:30 a.m. - 8:45 a.m.Networking Breakfast with Discussion Tables
Engage with your executive peers in meaningful discussions. Pick a topic and share how it’s working in your organization -- or learn from others about what’s working for them, including:
  • Managing Security in the Cloud Era
  • Best Practices in Endpoint Security
  • Managing Privacy, Governance and the New Regulatory Landscape
  • Best Practices in Identity and Access Management
  • New Strategies in Application Security   
  • Modern Strategies to Manage Cyber Risk
  • Optimizing Network Security Monitoring Tools
  • Securing the Organization in the AI Era
  • Creating a Data Loss Prevention Strategy
  • Best Practices in Communicating with Senior Management and the Board
8:45 a.m. - 9:00 a.m. Welcome
Bob Bragdon, SVP and Publisher, CSO
9:00 a.m. - 9:45 a.m. Hunting and Intel: How to Get Amazing Results from Existing People and Technology
Steven Booth, CSO, FireEye

The Defender vs. Adversary dynamic is all about people finding people. And while technology can detect malware, what about human behavior, artifacts, and tactics/techniques/procedures that indicate a human is doing evil in an environment? That’s where the creative use of resources becomes paramount. Join us for this session to learn how to use intel to detect non-malware, understand APT techniques, link phishing campaigns to actors, build predictive defenses, and prioritize vulnerabilities and threats based on the actor -- not what the press is reporting.
9:45 a.m. - 10:30 a.m.#YOLO: Solving Authentication in the Cloud Era
Wendy Nather, Head of the Advisory CISO Team, Duo Security

In today’s environment, people can be anywhere, using any device, accessing applications both in the cloud and in the datacenter. The temptation with this complexity is to say “trust no one,” but savvy consumers won’t stand for heavy-handed IT that slows them down just as business is becoming more agile. The #YOLO challenge -- You Only Login Once -- is the call to make trusted access easier, while maintaining or increasing security as needed. Join us to learn about these concepts and more.
10:30 a.m. - 11:00 a.m.Networking Break
Grab some coffee and refreshments along with an opportunity to compare notes with your peers.
11:00 a.m. - 11:45 a.m. The Security Staffing Challenge: Strategies to Solve a Persistent Problem
Andre' Allen, CISO, ENGIE North America
Chuck Markarian, CISO, PACCAR
Alyssa Miller, Manager, Information Security Solutions Practice, CDW
Bob Bragdon, SVP and Publisher, CSO

According to CSO’s 2018 Security Priorities Study, more than half of enterprise organizations plan to increase the size of their security team. At the same time, qualified security professionals remain difficult to find. How are organizations coping with this supply and demand challenge? Where do they see opportunities to find new talent? And what can they do to make positions attractive for recruiting and retention? Join us for this session as we explore answers to these questions and more.
11:45 a.m. - 12:00 p.m.Wrap Up Remarks
Brett Schmidt, VP, West Region, CDW
12:00 p.m. - 1:00 p.m.Networking Lunch with Discussion Tables
Engage with your executive peers in meaningful discussions. Pick a topic and share how it’s working in your organization -- or learn from others about what’s working for them, including:
  • Managing Security in the Cloud Era
  • Best Practices in Endpoint Security
  • Managing Privacy, Governance and the New Regulatory Landscape
  • Best Practices in Identity and Access Management
  • New Strategies in Application Security   
  • Modern Strategies to Manage Cyber Risk
  • Optimizing Network Security Monitoring Tools
  • Securing the Organization in the AI Era
  • Creating a Data Loss Prevention Strategy
  • Best Practices in Communicating with Senior Management and the Board
1:00 p.m.Departures

Agenda Subject to Change.