North Texas is a hot bed disruptive innovation for startups and established firms alike. From Finance to Health Care, Technology to Manufacturing, the Dallas/Fort Worth area is where business gets done! We know that with ever changing markets and technologies, it is imperative that organizations can adapt with speed and skill. There must be a shift in IT strategies to ensure that the right steps are taken to power the global digital transformation. The ElevateIT: DFW Technology Summit is designed with your goals in mind, and we are excited to connect you with local experts and resources to assist with your IT & Security needs. The 2nd Annual ElevateIT: DFW Technology Summit will be hosted at the Irving Convention Center on March 18th, 2020. We hope you will join us for a full day of Peer-to-Peer Networking, Educational Presentations by Industry Leaders, and 50+ vendors to evaluate. Be sure to attend and get entered to win Door Prizes, Free Parking, and a $2500 Visa Gift Card Grand Prize!
enSilo protects businesses around the world from data breaches and disruption caused by cyber attacks. The enSilo Endpoint Security Platform comprehensively secures endpoints in real-time pre- and post-infection without alert fatigue, excessive dwell time or breach anxiety while also containing incident response costs by orchestrating automated detection, prevention and incident response actions against advanced malware.
Protecting corporate networks, cloud and virtualized environments, IoT and industrial control systems, Darktrace autonomously detects and fights back against emerging cyber-threats across the enterprise.
Datrium is on a mission to simplify the multi-cloud data lifecycle. Our platform provides you with unprecedented speed, agility, and efficiency by converging the data lifecycle across on-prem and hyperscalar clouds in a single, secure platform.
Okta is the Identity Standard. The Okta Identity Cloud is an independent and neutral platform that securely connects the right people to the right technologies at the right time.
DFW Technology Summit 2020 Break Out Presentation Sponsors
CRITICALSTART is leading the way in Managed Detection and Response. Our mission is simple: protect our customers’ brand while reducing their risk. We do this for organizations of all sizes through our award-winning portfolio, from the delivery of managed security services to security-readiness assessments using our proven framework, the Defendable Network, professional services, and product fulfillment.
ExaGrid provides intelligent hyperconverged storage for backup, a unique Landing Zone, and scale-out architecture. ExaGrid’s landing zone provides for the fastest backups, restores, and instant VM recoveries. Its scale-out architecture includes full appliances in a scale-out system and ensures a fixed-length backup window as data grows, eliminating expensive forklift upgrades.
Zerto helps customers accelerate IT transformation by eliminating the risk and complexity of modernization and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform™, Zerto combines disaster recovery, backup and cloud mobility in a simple, converged platform.
As a global leader in next generation software-defined storage solutions, Talon provides an unparalleled file-sharing experience throughout globe-spanning enterprises. Our software allows these organizations to centralize and consolidate IT storage infrastructure while bringing data closer to their users.
Keyfactor is a leading provider of secure digital identity management solutions that enables organizations to confirm authenticity, and ensure the right things are interacting in the right ways in our connected world.
DataCore software gives IT departments the essential ingredients for digital transformation: dramatic performance improvements, highly available data, and maximum efficiency.
AI-based security is a powerful force multiplier. BlackBerry Cylance focuses the power of artificial intelligence on autonomous security decision making that is designed to stay ahead of attackers—years ahead. Our native AI solutions deliver the threat prevention, detection, and response capabilities security teams need to maximize their own expertise with better insight —and in turn drive better informed strategic security decisions.
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions worldwide. HC3® eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage. The platform is self-healing, automatically correcting infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure solution.
There have been more advancements in machine learning and artificial intelligence in the past 10 years than any time since its inception in the ‘50s. Why is that? It's mainstream adoption has already provided countless consumer benefits oftentimes without our knowledge fundamentally altering, improving, or in some cases eliminating the need for methods and techniques that have gone before it. In this talk will explore the impact is already having on cyber-security and its unique ability to level the playing field against the rapidly evolving threat landscape.
This Time is Dedicated to Networking and Vendor Evaluation
10:00 AM - 11:00 AM
Software-defined storage strategy & enterprise cloud platforms: Working together to increase security, reduce file duplication, and massively improve branch office data management.
Andrew will be speaking about how software-defined storage works alongside enterprise cloud platforms to increase security, reduce file duplication, and massively improve branch office data management.
Datrium delivers the only secure multi-cloud data platform with primary backup disaster recovery and archival data storage and compute capabilities on one software average infrastructure. Deploy to storage or hyper-converged infrastructure (HCI), Datrium’s Automatrix platform makes information available at the speed of business with frictionless portability between public clouds and on-premise data centers. It provides consistent data services across clouds automating resource and mobility orchestration so applications run at peak performance while liberating IT from managing data infrastructure. Datrium accelerates and consolidates heterogeneous workloads, enables instant recovery, and with always-on duplication and encryption maintains speed at scale for protecting enterprise data.
Virtualization Designed to Deliver Simplicity, Availability and Scalability
Join scale Computing to learn how organizations are doing more it with less infrastructure and less complexity using hyper converged infrastructure. Hyper-converged experts will discuss why virtualization doesn't need to be complex, inefficient, or costly when you adopt a modern Innovative architecture. Simplicity, scalability, and high availability of a turn-key at the structure doesn't just lower-cost it freeze up your own it experts work on new projects they haven't had time for in the past.
Identifying and Protecting Your Very Attacked People
What people do business well beyond the bounds of traditional Network premieres and connected and points. Email social media and mobile devices are the new tools of the trade in for cybercriminals the new tools of attack. We've long known that fishing and social engineering are the ways most organizations it compromised. Attackers no it's much easier to find someone who will click and I find a working exploit for a modern operating system or browser. However most organizations have very little idea which of their people receive sophisticated threats, targeted threats, or even large volumes of threats. We call these targets VAPs (very attacked people) and they may not be who you would expect. Using research across thousands of organizations around the world this presentation will focus on how to identify who the very attacked people (VAPs) are within your organization (hint: it’s not your VIPs), why they are targeted, and how they are being attacked. We will then provide meaningful steps a security professional can take to protect their VAPs.
Tech Theater I
March 18, 2020
Keynote Presentation: CIO v. CISO - Comparing Operational Goals with Contrasting Cyber Security Concerns
08:00 AM - 09:00 AM
Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats
Artificial intelligence is something spoken about as something that will in the future secure companies networks. However cyber AI has already been deployed by thousands of companies to detect and fight back against increasingly Advanced fast-moving and stealthy threats. This session will unpack the benefits and challenges of these deployments. By exploring the advantages of different machine learning approaches and talking about potential barriers to adoption this session will arm attendees with the knowledge they need evaluate AI Cyber defense for their own organization.
This Time is Dedicated to Networking and Vendor Evaluation
10:00 AM - 11:00 AM
Incident Response in a World of Complex and Stealthy Threats
Of the many challenges Security leaders face one big issue and often be downplayed budget. Leaders are expected to manage a large and complex volume of stealthy attacks and endpoints while responding quickly and effectively two incidents without exceeding land Capital expenses (CapEx) and operating expense (OpEx) budget. The equation needs to change. Real-time automated endpoint security with orchestrated incident response is the solution for Security leaders caught in The Balancing Act.
Please Attend a Lunch & Learn in Tech Theater I or II
12:00 PM - 01:00 PM
Presenter TBD
01:00 PM - 02:00 PM
This Time is Dedicated to Networking and Vendor Evaluation
02:00 PM - 03:00 PM
VIP Theater
March 18, 2020
Attend the Keynote Presentation in Tech Theater I
08:00 AM - 09:00 AM
CIO Roundtable - The Future of AI in the Ever Changing Enterprise Landscape Continental Breakfast Provided *Must have VIP Badge to Access
09:00 AM - 10:00 AM
This Time is Dedicated to Networking and Vendor Evaluation
10:00 AM - 11:00 AM
Executive Session: Presenter TBD
11:00 AM - 12:00 PM
Southern Style Buffet Lunch for VIP Badge Holders Only
12:00 PM - 01:00 PM
CISO Roundtable Discussion Conducting Annual Security Assessments for Key Offerings/Services
As businesses begin to offer more offerings and services to customers to stay competitive, it's important that the information security (IS) organizations within the businesses get proactively engaged and help properly assess the core client offerings for the services being provided to their customers that may put customer data security or privacy at risk. What's going to be shown and discussed is an approach to properly assess a core solution offering or existing services based on the Capabilities Maturity Model Integration (CMMI) model, as well assess key security domains that will put client data security and privacy at risk.
This Time is Dedicated to Networking and Vendor Evaluation
02:00 PM - 03:00 PM
VIP Theater Closed - Please Attend C-Suite Panel in Tech Theater I
Combining Zerto's IT resilience platform with ExaGrid disc-based backup storage leverages the strengths of each solution to provide Advanced comprehensive and best-in-class real-time data protection of your virtualized environment. Start by using Zerto to non-destructively and continuously replicate to any BC/DR location. then take resilience with long-term retention to the next level by adding ExaGrid backup storage between a hyper-converged scale-out architecture with data deduplication. Exagrid rapidly ingest Zerto backups to form a Zerto elastic journal with long-term retention points retained in duplicated form to me all your compliance driven retention demands and a reduced storage footprint and cost.
This Time is Dedicated to Networking and Vendor Evaluation
10:00 AM - 11:00 AM
Security Blindspots: Strategies for Staying Out of the Headlines and Ahead of the Curve
Security planning and prevention isn't a static process. Protecting your infrastructure and building customer trust is undoubtedly a top priority so your line of defense against cyber threats must employ that same sense of urgency. Join Tom Kline, Keyfactor’s VP of IoT and learn steps you can take now to be prepared with digital certificate management, code signing private key management.
Actions to take to secure devices & data from build through deployment
Employing crypto-agile methodology
Mitigating risk: tackling Quantum and IoT insecurity
Furthering business outcomes with operational efficiency and cost reduction
Zero trust security throws away the idea that we should have a trusted internal Network and an untrusted external network. The adoption of mobile and Cloud means that we can no longer happy Network perimiter-centric view of security instead we need to securely enable access for the various users (employees, partners, contractors, Etc) regardless of their location device or Network. There is no Silver Bullet when it comes to achieving a Zero Trust security architecture but identity and access management is the core technology that organizations should start with on their Zero Trust Journeys. In this session will explore the shifts in the security landscape that led to the creation of zero trust and what the zero trust extended ecosystem framework looks like today and how organizations and utilize Okta as the foundation for a successful zero trust program now and in the future.
DataCore - Speaker Bio and Presentation Synopsis Coming Soon!
01:00 PM - 02:00 PM
This Time is Dedicated to Networking and Vendor Evaluation
02:00 PM - 03:00 PM
Jazz Networks - Presenter Info and Synopsis Coming Soon!