Protect SummIT Agenda
Wednesday, February 12
11:00 a.m.Registration
12:00 p.m. - 12:45 p.m.Networking Lunch
12:45 p.m. - 1:05 p.m.Welcome Remarks
Bob Rossi, VP, Networking, Digital Workspace & Security Solutions, CDW
1:05 p.m. - 1:25 p.m.Opening Remarks
Bob Bragdon, SVP and Publisher, CSO
1:25 p.m. - 2:10 p.m.Raising the Roof on Resiliency: How to Reduce Risks While Enabling New Technologies and a Modern Workforce
Theresa Payton, First Female White House CIO, Leading Cybersecurity Expert, and 2019 Woman Cybersecurity Leader of the Year

Every day, the news is full of new technologies -- but are they just hype, or will they be realities in the workplace?  And what predictions should you anticipate that affect newer technologies in your organization?  If you’re leveraging technologies like clouds, blockchain, cryptocurrency, AI, machine learning and IoT in your organization’s go to market strategy, you need to consider how these data elements are not only safe from hackers, but how your organization can be resilient if the worst happens.  Join us for this session as Theresa Payton explains -- from her experience at the White House until today -- the enduring security strategies that allow organizations to harness newer technologies to achieve business goals, all while incorporating safeguards to fight cybercriminals and provide operational resiliency.
2:15 p.m. - 2:45 p.m.Optimizing Cybersecurity: Best Practices in Resource Management
Jeremy Weiss, Cybersecurity Practice Lead, CDW

In today’s complex security landscape, organizations are expected to be efficient with technology while enabling a secure business workflow.  Yet these same organizations face a plethora of tools, shortage of talent, and a lot of noise.  Join us for this session as we take a look at best practices in managing security’s complexity along with strategies designed to do more with less.
2:45 p.m. - 3:15 p.m.Networking Break
3:15 p.m. - 4:00 p.m.Pragmatic Zero Trust: Identity as the New Security Perimeter
Teju Shyamsundar, Sr. Product Marketing Manager, Okta

With users accessing corporate resources across a variety of devices, platforms and clients, organizations are seeing an increase in phishing, password spray, brute force and other identity based attacks.  This -- combined with organizations shifting to cloud-centric environments -- has made the perimeter-centric view of security obsolete while paving the way for practical applications of zero trust models.  Join us for this session to understand how your organization can achieve more powerful outcomes by combining cloud security with identity, network and endpoint security, all while achieving more holistic protection with zero trust across the enterprise.
The Melting Glacier of Incompatible Initiatives: Applying Zero Trust Security to the Modern Enterprise
Tim Strickland, CISSP, Zero Trust Security Specialist, Palo Alto Networks

Most large organizations have executive-sponsored initiatives related to modernizing the workplace and IT, leveraging modern networking and cloud technologies, and the requirement for zero trust security.  Yet few organizations are considering how each one of these objectives are completely incompatible with the others.  Join us for this session as we take a closer look at the incompatibilities, how to solve for them, and our shocking opinion about the answer:  that it’s not firewalls. 
4:20 p.m. - 4:45 p.m.Selling the Value of Cyber Resiliency to Your Organization
Astin Thomas, CIO, Sunbelt-Solomon Solutions
Moderator: Bob Bragdon, SVP and Publisher, CSO

Sunbelt-Solomon Solutions, a Trilantic Capital Partners portfolio company, is the largest power solutions provider to utility, commercial, industrial and rental organizations in the United States.  While the organization is privately held, it’s CIO is seasoned in both public and private environments and organizations of varied sizes.  Join us for this session to understand how these factors influence an organization’s approach to cyber resiliency, ways to successfully communicate with corporate leadership, and how to sell the value of security to the business.
4:45 p.m. - 5:30 p.m.Free Time
5:30 p.m. - 7:30 p.m.Networking Dinner in the Solutions Showcase
Enjoy cocktails and small plates while you network with Protect SummIT participants and partners.

Thursday, February 13
7:30 a.m. - 8:30 a.m.Networking Breakfast
8:30 a.m. - 8:45 a.m. Welcome
Bob Bragdon, SVP and Publisher, CSO
8:45 a.m. - 9:20 a.m. Putting Risk Management to Work
Joe Levy, CTO, Sophos

While advances in attacker sophistication often dominate news cycles, cybersecurity is keeping pace across technology, analytics, and response.  By leveraging best practices in data science, high-utility management platforms, and the synthesis of intelligence and operators, this merging of technology and services is biased toward “doers” over “thinkers” -- and essentially blends systems that can proactively deliver the right information and workflows along with automated response where possible.  All of this portends the continued transformation of cybersecurity from standalone products to the fusion of products and services.  Join us for this session for a view of this practice as we illustrate what’s possible through attacker behaviors and data from a managed threat response service.
9:25 a.m. - 10:00 a.m.Getting InfoSec Back in Your Cloud Game by Crafting a Smart Cloud Cybersecurity Story
Brooke Noelke, Senior Enterprise Cloud Security Strategist/Architect , McAfee

Since Aristotle’s time, bad guys have been leveraging the emotional impact of stories, therefore the good guys must also be empowered to use stories as an impactful aspect of human decision-making.  At the same time, huge cloud programs are struggling due to InfoSec concerns, yet InfoSec isn’t getting much of that cloud funding.  How do you get InfoSec back in the game as part of critical decision processes?  And how do you secure the InfoSec funding to help your company’s cloud program succeed?  Join us for this session as we discuss objective critical issues, provide outlines on how to craft the story to both objectively support and emotionally back your credibility, and talk about the art and science of making your case.  You’ll learn the importance of impactful, business-aligned narratives to secure funding, support, and momentum to protect what matters in complex cloud transformations.
10:05 a.m. - 10:35 a.m.Networking Break
Grab some coffee and refreshments along with an opportunity to compare notes with your peers in the Bring IT On Lounge.
10:40 a.m. - 11:10 a.m.Leveraging a Merger to Optimize Security Opportunities
Christopher Frenz, AVP, Information Security , Interfaith Medical Center
Moderator: Bob Bragdon, SVP and Publisher, CSO

As Interfaith Medical Center prepares to merge three organizations, they face the challenges and opportunities that come with standardizing and optimizing security for the greater organization.  All of this is creating lessons learned about how to plan ahead, identify potential problems to head off before the fact, and find efficiencies for the long run.  Join us for this session to learn how they’ve prepared, including securing appropriate funding that includes a zero trust model.
11:15 a.m. - 11:50 a.m.Zero Trust and the Flaming Sword of Justice
Dave Lewis, Global Advisory CISO, Duo Security

Security breaches become headlines, and breach headlines that were rare just five years ago seem to occupy today’s daily news cycle.  At the same time, the outdated image of an information security practitioner running through the office brandishing their flaming sword of justice above their heads screaming “thou shall not pass” is now from a bygone era.  In fact, many of today’s data breaches are made possible by missteps and misconfigurations, and compounding this are security issues introduced to website authentication mechanisms that enforce bad end user behavior. As a result, security debt has become a significant problem for most organizations, and attackers will exploit it to their advantage. On top of keeping system hygiene front-of-mind, today’s defenders need to focus on proper “network zone segmentation” – now more commonly called “zero trust networks.” Join us for this session as we discuss the dissolution of the traditional perimeter, and why today’s security leaders need to focus on the strength of authentication, authorization and trust models for users.
11:55 a.m. - 12:30 p.m.Cybersecurity and Data Regulation: Standing at the Crossroads
Jon Wojan, Principal Cybersecurity & Compliance Architect, Microsoft

Another year has passed, along with another batch of high profile compromises, leaving today’s governments increasingly frustrated with private industry's inability to manage their own affairs.  At the same time, GDPR has landed and now organizations are faced with how various states in the U.S are beginning to pattern and enact their own iterations of data privacy, breach notification and data disposal regulations. Join us for this session as we look to the near future to see how regulation is evolving and how your organization can capitalize on it.
12:30 p.m. - 12:50 p.m.Wrap Up Remarks
Bob Rossi, VP, Networking, Digital Workspace & Security Solutions, CDW
12:50 p.m. - 2:00 p.m.Networking Lunch with Discussion Tables
Engage with your executive peers in meaningful discussions. Pick a topic and share how it’s working in your organization -- or learn from others about what’s working for them, including:

•    Vulnerability and Incident Response
•    Cyber Risk and Resilience
•    Cloud Security
•    The New Regulatory Landscape
2:00 p.m.Departures

Agenda Subject to Change.