Protect SummIT Agenda
Wednesday, February 12
11:00 a.m.Registration
12:00 p.m. - 12:45 p.m.Networking Lunch
12:45 p.m. - 1:05 p.m.Welcome Remarks
Mike Rapplean, VP, South Region, CDW
1:05 p.m. - 1:25 p.m.Opening Remarks
Bob Bragdon, SVP and Publisher, CSO
1:25 p.m. - 2:10 p.m.Raising the Roof on Resiliency: How to Reduce Risks While Enabling New Technologies and a Modern Workforce
Theresa Payton, First Female White House CIO, Leading Cybersecurity Expert, and 2019 Woman Cybersecurity Leader of the Year

Every day, the news is full of new technologies -- but are they just hype, or will they be realities in the workplace?  And what predictions should you anticipate that affect newer technologies in your organization?  If you’re leveraging technologies like clouds, blockchain, cryptocurrency, AI, machine learning and IoT in your organization’s go to market strategy, you need to consider how these data elements are not only safe from hackers, but how your organization can be resilient if the worst happens.  Join us for this session as Theresa Payton explains -- from her experience at the White House until today -- the enduring security strategies that allow organizations to harness newer technologies to achieve business goals, all while incorporating safeguards to fight cybercriminals and provide operational resiliency.
2:15 p.m. - 2:45 p.m.CDW Keynote
Jeremy Weiss, Cybersecurity Practice Lead, CDW
2:45 p.m. - 3:15 p.m.Networking Break
3:15 p.m. - 4:00 p.m.Partner Breakout
Teju Shyamsundar, Sr. Product Marketing Manager, Okta
How Zero Trust Security Can Melt the Glacier of Incompatible Initiatives
Tim Strickland, CISSP, Zero Trust Security Specialist, Palo Alto Networks

Most large organizations have executive sponsored initiatives related to modernizing the workplace and IT, leveraging modern networking and cloud technologies, and taking advantage of zero trust security models.  Yet few organizations are considering how each one of these objectives are completely incompatible with the others.  Join us for this session as we take a closer look at the incompatibilities, how to solve for them, and our shocking opinion about the answer:  that it’s not firewalls.
4:20 p.m. - 4:45 p.m.Customer Keynote or Executive Interview
4:45 p.m. - 5:30 p.m.Free Time
5:30 p.m. - 7:30 p.m.Networking Dinner in the Solutions Showcase
Enjoy cocktails and small plates while you network with Protect SummIT participants and partners.

Thursday, February 13
7:30 a.m. - 8:30 a.m.Networking Breakfast
8:30 a.m. - 8:45 a.m. Welcome
Bob Bragdon, SVP and Publisher, CSO
8:45 a.m. - 9:20 a.m. Putting Risk Management to Work
Joe Levy, CTO, Sophos

While advances in attacker sophistication often dominate news cycles, cybersecurity is keeping pace across technology, analytics, and response.  By leveraging best practices in data science, high-utility management platforms, and the synthesis of intelligence and operators, this merging of technology and services is biased toward “doers” over “thinkers” -- and essentially blends systems that can proactively deliver the right information and workflows along with automated response where possible.  All of this portends the continued transformation of cybersecurity from standalone products to the fusion of products and services.  Join us for this session for a view of this practice as we illustrate what’s possible through attacker behaviors and data from a managed threat response service.
9:25 a.m. - 10:00 a.m.Getting InfoSec Back in Your Cloud Game by Crafting a Smart Cloud Cybersecurity Story
Brooke Noelke, Senior Enterprise Cloud Security Strategist/Architect , McAfee

Since Aristotle’s time, bad guys have been leveraging the emotional impact of stories, therefore the good guys must also be empowered to use stories as an impactful aspect of human decision-making.  At the same time, huge cloud programs are struggling due to InfoSec concerns, yet InfoSec isn’t getting much of that cloud funding.  How do you get InfoSec back in the game as part of critical decision processes?  And how do you secure the InfoSec funding to help your company’s cloud program succeed?  Join us for this session as we discuss objective critical issues, provide outlines on how to craft the story to both objectively support and emotionally back your credibility, and talk about the art and science of making your case.  You’ll learn the importance of impactful, business-aligned narratives to secure funding, support, and momentum to protect what matters in complex cloud transformations.
10:05 a.m. - 10:35 a.m.Networking Break
Grab some coffee and refreshments along with an opportunity to compare notes with your peers in the Bring IT On Lounge.
10:40 a.m. - 11:10 a.m.Executive Interview
Christopher Frenz, AVP, Information Security , Interfaith Medical Center
Moderator: Bob Bragdon, SVP and Publisher, CSO
11:15 a.m. - 11:50 a.m.Partner Keynote
Dave Lewis, Global Advisory CISO, Duo Security
11:55 a.m. - 12:30 p.m.Cybersecurity and Data Regulation: Standing at the Crossroads
Jon Wojan, Principal Cybersecurity & Compliance Architect, Microsoft

Another year has passed, along with another batch of high profile compromises, leaving today’s governments increasingly frustrated with private industry's inability to manage their own affairs.  At the same time, GDPR has landed and now organizations are faced with how various states in the U.S are beginning to pattern and enact their own iterations of data privacy, breach notification and data disposal regulations. Join us for this session as we look to the near future to see how regulation is evolving and how your organization can capitalize on it.
12:30 p.m. - 12:50 p.m.Wrap Up Remarks
Mike Rapplean, VP, South Region, CDW
12:50 p.m. - 2:00 p.m.Networking Lunch with Discussion Tables
2:00 p.m.Departures

Agenda Subject to Change.