Southwest US Summit
In-Person Summit October 25 - 26, 2022
As co-chairs of iSMG’s Southwest Summit, we are proud to welcome cybersecurity practitioners from across the region to this select event for education and networking. We are happy to be a part of the high caliber speaker lineup and look forward to meeting you at the summit, to share and discuss cybersecurity insights and best practices. The sessions will explore the most recent trends and innovations as well as updates on the most pressing issues, form both the public and private sectors.

ISMG is externally honored to welcome this year’s keynote, Deputy CISO of the State of Arizona and Deputy Director of the Arizona Dept. of Homeland Security, Ryan Murray. We could not think of a better way to kick of the summit!

On behalf of iSMG and the summit’s Advisory Committee, we look forward to seeing you in Phoenix.

Matanda Doss
Executive Director, Cybersecurity and Technology Controls, Commercial Bank, JPMorgan Chase & Co.

Troy Leach
Chief Strategy Officer, Cloud Security Alliance
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
Hyatt Regency Phoenix
Name :
Hyatt Regency Phoenix
Address :
Hyatt Regency Phoenix, North 2nd Street, Phoenix, AZ, USA
Tom Field
SVP of Editorial
ISMG
Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world,...
Shannon Lawson
CISO
City of Phoenix
Mr. Shannon M. Lawson has a diverse background in the cybersecurity discipline and extensive military experience with the information and cryptologic warfare community. Shannon currently serves as the Chief Information Security Officer for the City of Phoenix. He is responsible...
Matanda Doss
Executive Director, Cybersecurity and Technology Controls, Commercial Bank
JPMorgan Chase & Co.
Matanda Doss is an Executive Director for the J.P. Morgan Chase, Commercial Banking Cybersecurity and Technology Controls organization. He has 25 years of technology experience, across software development, ecommerce, mobile applications, data security and financial systems. Matanda serves as an...
Rick McElroy
Principal Security Strategist
VMware
McElroy, principal cybersecurity strategist for VMware, has 24 years of information security experience educating and advising organizations on reducing their risk posture and tackling tough security challenges. His current role takes him all over the world, working with organizations to...
Amelia Paro
Director Of Channel Development
ID Agent
Paro leads Kaseya's channel team, working with MSPs and channel partners around the globe. She is an experienced sales professional with over 10 years of experience in the technology industry in B2B and B2C environments. Her past sales experience includes...
Michael McCormick
Sr. Sales Consultant - Multi-Cloud
Entrust
McCormick is a business executive and 30-year veteran of the information security industry. As a business development and sales executive, he has helped build early-stage information security companies and grow these businesses to eventual acquisition by larger organizations such as...
Harry Steward
Network Intrusion Forensic Analyst, Phoenix Field Office
U.S. Secret Service
Harry Steward is a Network Intrusion Forensic Analyst (NIFA) with the U.S. Secret Service (USSS) Phoenix Field Office. NIFA Steward started his career with the USSS in September 2021 after retiring from the Glendale (AZ) Police Department with 20 years...
Anandh Palanisamy
Senior IT Security Solutions Consultant & Evangelist
ManageEngine
Palanisamy shares his vast knowledge about Active Directory and IT security and helps form a bridge between our prospects and clients and our solutions. In more than 13 years with ManageEngine as an AD and IT security solutions expert, Palanisamy...
Jennifer Pittman-Leeper
Technical Account Manager
Tanium
Jennifer Pittman-Leeper, more commonly known as JPL, has nearly two decades of experience as a strategic thought leader and policy developer for state government. At Tanium, JPL works directly with SLED customers across the country helping establish governance and policies...
Anna Delaney
Director, ISMG Productions
ISMG
Troy Leach
Chief Strategy Officer
Cloud Security Alliance
Troy Leach has spent more than 25 years educating on and advocating for the advancement of responsible technology to improve the quality of living and parity for all. Currently Mr. Leach is the Chief Strategy Officer for the non-profit, Cloud...
Ty Howard
Chief Information Security and Privacy Officer
City of Mesa
Ty Howard is the Chief Information Security and Privacy Officer for the City of Mesa. Mr. Howard has worked across various public and private industries and served in different leadership capacities. He is a Certified Project Management Professional (PMP) and...
Frank Boudreaux Jr.
Special Agent in Charge, Phoenix Field Office
U.S. Secret Service
Frank Boudreaux, Jr. is the Secret Service Special Agent in Charge (SAIC) of the Phoenix Field Office and has served a variety of dynamic assignments with Secret Service for over 24 years. Before Phoenix, SAIC Boudreaux held supervisory positions in...
Jordan Camba
Sales Engineer
Anvilogic
As a sales engineer with Anvilogic, Camba brings firsthand experience from the field as a SOC analyst and detection engineer. He spent the last four years helping bring innovative security analytics solutions to the market and paving the way for...
Cathy Kingeter
Director of Product Management
Opentext Security Solutions
As director of product management at Carbonite and Webroot, OpenText Security Solutions, Kingeter is responsible for the entire email security portfolio, including Webroot Advanced Email Encryption powered by Zix. She has over 20 years of experience in enterprise networking and...
Bob Schlotfelt
CISO
LACERA
Bob has grown a career in the Cyber Security and Information Technology industry. He has risen through the ranks and have successfully built and led teams. He has continually positioned himself as a trusted advisor and leader and has garnered...
David Stevens
Principal Technical Sales Consultant
Entrust
Stevens is responsible for architecting Entrust’s best-in-class security and compliance solutions for worldwide, multi-cloud environments. He is also involved in supporting key customers and channel partners with technical training and partner enablement. Stevens has over 20 years of experience in...
Marianne McGee
Executive Editor
ISMG Corp
Michael Novinson
Managing Ediitor
ISMG
Mike Manrod
CISO
Grand Canyon Education, Inc.
Mike presently serves as the Chief Information Security Officer for Grand Canyon Education, responsible for leading the security team and formulating the vision and strategy for protecting students, staff, and information assets across the enterprise. Previous experiences include serving as...
Dan Wilkins
CISO
State of Arizona - DES
Dan is a 25+ year cyber security veteran including military, private and public sector service, and he is an author with international publications. Leading multiple teams during his life and career, Dan has made observations that led him to develop...
Jeff McCardel
Sales Engineer
Exabeam
McCardel started working in cybersecurity 19 years ago, managing a home-grown SIEM before the market had really developed. This led to a variety of roles, from incident response investigator to security architect and everything in between. He is now happy...
Mike Storm
Distinguished Engineer - CTO
Cisco Systems, Inc.
Storm, a Cybersecurity Distinguished Engineer at Cisco and 15-year CCIE Security, focuses on cybersecurity solution architectures and security platform strategy for the Global Cisco Security business. With 30 years of experience in the networking and cybersecurity industry, Storm frequently speaks,...
Eric Hyman
Sr Director
GTT
Hyman is responsible for the development and execution of GTT’s product marketing and partner marketing strategies, including the creation and implementation of a comprehensive go-to-market framework for secure networking, managed networking and voice. He supports sales enablement, demand generation and...
Iain Rose
Solutions Engineer
Snyk
Steve King
Managing Director, Cybersecurity Marketing Advisory Services
CyberTheory
Steve King has served in senior leadership roles in technology development and deployment for the past 25 years. He is an author, lecturer and serial startup founder, including three successful exits in cybersecurity, and served for six years as the...
Mat Schwartz
Executive Editor
ISMG
View Agenda
The State of Cybersecurity in Arizona: Optimal Strategies for Digital Transformation and Building Strong Partnerships

Arizona has long been a leader in leveraging IT and providing digital services, but across the state and country alike, there are new challenges emerging following the pandemic, and with this comes new threats and risk factors. With that being said, it is critical to have continuous discussions on how these evolving cybersecurity risks can be tackled, in spite of the fact that there are numerous advances in the way of digital transformation. In this exclusive session, Ryan Murray, Deputy Director and Deputy State CISO, Arizona Department of Homeland Security, discusses the state of critical infrastructure protection, as well as:

  • Sheds light on how Arizona is engaged in public/private partnerships for information sharing and security
  • Discuss the "cybersecurity poverty line”, and what that means for the cyber industry
  • Assess the most effective strategies for recruiting/retaining cybersecurity staff
  • 08:50 AM
  • 09:39 AM
Track B: Risk Management for a New Era: Maturity Models and Evolution of Security Programs
Bob Schlotfelt, CISO, LACERA
Dan Wilkins, CISO, State of Arizona - DES

Digital transformation has created a wealth of opportunity: remote working, cloud migration, and smart devices. But it has also brought with it vulnerabilities inherent in legacy technology, an enlarged attack surface and increased attention from criminal adversaries who seek to disrupt operations or steal intellectual property. Today's CISOs need to focus on these new vulnerabilities and risks. What are the key factors to consider when building a plan to improve security maturity in this new era?

In this panel Bob Schlotfelt, CISO, LACERA and Dan Wilkins, CISO, State of Arizona - DES will discuss:

  • Developing a road map to cybersecurity maturity
  • Prioritization drivers of organizations at different stages of maturity
  • Explore solutions and their relevance at different stages 
Bob Schlotfelt
Dan Wilkins
  • 09:35 AM
  • 10:14 AM
Track A: Cyber Warfare: A New Playbook. How Cyber, Conventional Warfare and Disinformation/MDM Constitute a Unified Playbook
Mike Manrod, CISO, Grand Canyon Education, Inc.
Ty Howard, Chief Information Security and Privacy Officer, City of Mesa
Steve King, Managing Director, Cybersecurity Marketing Advisory Services, CyberTheory
Matanda Doss, Executive Director, Cybersecurity and Technology Controls, Commercial Bank, JPMorgan Chase & Co.

The nature of warfare is changing. As conventional, cyber and information warfare converge into a highly refined and devastating playbook, we need to rethink many aspects of the way we implement defense tactics. This panel of public and private sector experts will dissect:

  • The evolution of Russian tactics-from the annexation of Crimea to the invasion of Ukraine
  • How the Perception War and MDM are taking center stage in modern conflict and shaping world events
  • Why we need an integrated playbook and how should this shape our defensive strategy
Mike Manrod
Ty Howard
Steve King
Matanda Doss
  • 09:45 AM
  • 10:14 AM
  • 10:20 AM
  • 10:49 AM
Track A
Mike Storm
Track A: Rising Above the Security Poverty Line – The Future of Embedded Global Cybersecurity
Mike Storm, Distinguished Engineer - CTO, Cisco Systems, Inc.

Cisco believes that “Security is a Human Right” and should be something that every human on the planet should have access to and have integrated into every aspect of their digital lives. The impact of the Security Poverty Line has provided an advantage for bad actors to prey on the misinformed, unprotected and unprepared and has had a massive impact on businesses large and small across every industry in the world. Join Mike Storm, Distinguished Engineer for Cisco Security CTO, and a 30-year Industry Veteran, as he highlights the Global Cisco strategy to deliver End-to-End Security, as a default, to every system, and person, on the planet.

Click here to view our sponsor booth for more information, chat with our representative and resources.

  • 10:20 AM
  • 10:49 AM
Track B
Rick McElroy
Track B: The Industrialization of Cybercrime and Evolution of Cybercrime Syndicates
Rick McElroy, Principal Security Strategist, VMware

Cybercrime is big business. Recent estimates have stated cybercrime will cost the world $10 trillion annually by 2025. To understand modern attacks and begin to disrupt the return on investment for cybercrime, one must understand how cybercrime has become a global business. Join Rick McElroy as we look backward to move forward together.

Click here to view our sponsor booth for more information, chat with our representative and resources.

  • 10:55 AM
  • 11:09 AM
Track A
Cathy Kingeter
Track A: How to Become Cyber Resilient in Today’s Business World with Email Encryption
Cathy Kingeter, Director of Product Management, Opentext Security Solutions

OpenText Security Solutions delivers a complete cyber resilience framework, encompassing data security and management. Email is the primary form of business communication worldwide, making it the number one threat vector for bad actors. Protecting information flowing into and out of the organization is vital for all organizations in today’s virtual world. Come learn why email encryption should be a foundational layer of your data security and compliance strategy.

Click here to view our sponsor booth for more information, chat with our representative and resources.

  • 10:55 AM
  • 11:09 AM
Track B
Amelia Paro
Track B: BullPhish ID: Effortless, Affordable Security Awareness Training
Amelia Paro, Director Of Channel Development, ID Agent

Phishing attempts are more frequent and persuasive than ever before, and the threats are getting more severe each day. But by implementing security awareness training, your employees can be better prepared to identify and address complex cyberthreats by as much as 40%.

In this session, you'll learn how BullPhish ID provides IT administrators dealing with busy, distracted employees an effortless, affordable security awareness training and phishing simulation solution to drastically reduce risks due to human error.
 

Click here to view our sponsor booth for more information, chat with our representative and resources.

Exhibits & Networking Break

Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!

  • 11:10 AM
  • 11:34 AM
  • 11:30 AM
  • 11:59 AM
Track A
Troy Leach
Shannon Lawson
Mike Manrod
Track A: The Future of Ransomware and Evolving Attacks
Troy Leach, Chief Strategy Officer, Cloud Security Alliance
Shannon Lawson, CISO, City of Phoenix
Mike Manrod, CISO, Grand Canyon Education, Inc.

Adaptations are needed to keep pace with the changing ransomware environment. This panel will address what you should be ready for. They will also debate valid and invalid approaches to minimizing risk -from technology, government and other activities that will influence how organizations can to respond to threats. This panel will:

  • Discuss current trends for ransomware attacks 
  • Look at the impact of the changing environment on insurance premiums
  • Debate whether norms or regulations should dictate payments
  • Address critical strategies and aspects to being successful in defending against attacks
  • 11:30 AM
  • 11:59 AM
Track B
Matanda Doss
Track B: Little Device Big Threat! - IoT Attacks, Vulnerabilities and Prolific Risk
Matanda Doss, Executive Director, Cybersecurity and Technology Controls, Commercial Bank, JPMorgan Chase & Co.

The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption. Join us to learn more about where IoT is headed and how you can stay safe while still reaping the benefits of a digital world.  This session will illuminate

  • Biggest threats based on trending attacks  
  • Challenges of IoT security based on common vulnerabilities
  • Vulnerabilities caused by new technologies
  • Strategies for securing huge attack surfaces
  • Regulatory and compliance issues rising from third-party partnerships
  • 12:05 PM
  • 12:34 PM
Track A
Jordan Camba
Track A: Don’t Get Caught in a Compromising Position: Defend & Detect Across Your Threat Landscape
Jordan Camba, Sales Engineer, Anvilogic

Threat detection is at the heart of building foundational security to shift with the evolving threat landscape. In this session, we will demonstrate how to build behavioral attack-pattern scenarios correlating detection use cases across different data domains, which helps to keep up with your threat landscape, and learn how you can easily start to build and implement sequence-based detections in your environment. The right methods, frameworks, and detections are fundamental to understanding your threat landscape and comprehending the correct path. We will show how to cover the steps to defend against some of the various compromises that have been identified across the numerous industries.

Click here to view our sponsor booth for more information, chat with our representative and resources.

  • 12:05 PM
  • 12:34 PM
Track B
Anandh Palanisamy
Track B: AI and Zero Trust, The New Enrichments of SIEM and IAM
Anandh Palanisamy, Senior IT Security Solutions Consultant & Evangelist, ManageEngine

Internal threats in today's era are complex and crucial in the cybersecurity domain. Understanding dynamic and multivariate user behavior is challenging too. Traditional sequential and timeline-based methods cannot easily address the complexity of temporal and relational features of user behaviors. Hence, we need an AI-based report that enables analysts to understand user behavior patterns that result in identification of anomalies. We can strengthen our security further by including access management as the core of zero trust architecture to create a zero trust extended ecosystem.

Click here to view our sponsor booth for more information, chat with our representative and resources.

Lunch & Networking Break
  • 12:35 PM
  • 01:24 PM
Whole of State Cyber Security Strategy
Jennifer Pittman-Leeper, Technical Account Manager, Tanium

Cybersecurity Whole of State is a collaborative effort between State Government, Local Municipalities (Cities/Counties), and Education (K12/Higher Ed) to protect the citizens, individual municipalities, & the state as a whole from cybersecurity threats. Pillars of Whole of State include Information Sharing, Incident Response Planning, Proactive Cyber Protection, Workforce Development, & Policy/Funding. Critical factors of success include governance, strategic plans, execution pans, and continuous validation.


Come to learn more about how this Cybersecurity Whole of State approach is being adopted regionally & nationally. Also, come to find out how you can get involved!

Click here to view our sponsor booth for more information, chat with our representative and resources.

Jennifer Pittman-Leeper
  • 01:20 PM
  • 01:34 PM
  • 01:40 PM
  • 02:09 PM
Track A
Michael McCormick
David Stevens
Track A: Security Resilience in a Multi-Cloud Environment
Michael McCormick, Sr. Sales Consultant - Multi-Cloud, Entrust
David Stevens, Principal Technical Sales Consultant, Entrust

As organizations increasingly migrate more operations from on-premises to hybrid and multi-cloud environments, it becomes a real challenge to retain control as your cloud footprint and complexity grow and consistent security and compliance become unmanageable. Compliance automation and centralized key management across disparate infrastructure can be complex. With the unfettered proliferation of virtual machines and containers, learn how to strengthen your security posture, improve operational efficiency through automation and become more resilient to attacks from bad actors and threats from innocent staff misconfigurations that can lead to unscheduled outages.

Click here to view our sponsor booth for more information, chat with our representative and resources.

  • 01:40 PM
  • 02:09 PM
Track B
Eric Hyman
Track B: SASE Framework: Making the Case for Managed Services
Eric Hyman, Sr Director, GTT

Secure Access Service Edge, or SASE, is an emerging cybersecurity framework that Gartner first named in August 2019. With reports showing 62% of employees want to work remote or hybrid and 92% of businesses are adopting a multi-cloud strategy, the need for a new network and security approach is rising.

SASE adopters are turning to managed service partners to navigate these complex migrations in order to assist with the technology choices, costs, resources and more.

Join this session, "SASE Framework: Making the Case for Managed Services," to learn more from the latest research and discuss the approach a global managed service provider deploys.

Click here to view our sponsor booth for more information, chat with our representative and resources.

  • 02:15 PM
  • 02:29 PM
Track A
Jeff McCardel
Track A: Seize the Breach: Why Breaches Still Occur and How to Mitigate Them
Jeff McCardel, Sales Engineer, Exabeam

Breaches happen, and 2021 was a record-breaking year for them. According to research by the Identity Theft Resource Center, as of September 2021 there were 1,291 breaches publicly reported in 2021, compared to 1,108 breaches in 2020. That's a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a discussion of: 

  • Why SOC and security teams are way too limited by legacy SIEM; 
  • How machine-learning-driven analytics and automation technologies provide unmatched threat detection, investigation and response - or TDIR - capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage; 
  • A simple maturity model based on outcomes and use cases that can vastly improve security operations. 

Click here to view our sponsor booth for more information, chat with our representative and resources.

  • 02:15 PM
  • 02:29 PM
Track B
Iain Rose
Track B: Cloud-Native Application Security: Embracing Developer-First Security for the Cloud Era
Iain Rose, Solutions Engineer, Snyk

Join Iain Rose, Solutions Engineer at Snyk, to learn how Snyk's AppSec and CloudSec platform allows developers to not only build securely but also build at a pace that allows them to stay competitive. This Tech Talk will share how Snyk is differentiated in the market and why our platform is not only trusted by security teams but also loved by developers because it allows security to scale and developers to move faster.

Click here to view our sponsor booth for more information, chat with our representative and resources.

Exhibits & Networking Break

Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!

  • 02:30 PM
  • 02:54 PM
Protections Beyond Cybersecurity - Technical Controls and Organizational Security Policy
Matanda Doss, Executive Director, Cybersecurity and Technology Controls, Commercial Bank, JPMorgan Chase & Co.
Ty Howard, Chief Information Security and Privacy Officer, City of Mesa
Mike Manrod, CISO, Grand Canyon Education, Inc.

Information is your most valuable resource, so implementing effective protections and technical controls that bolster your cybersecurity posture are crucial to the health of your organization. Our experts talk about ways to proactively protect your organization’s data, finances and business processes in this open mic format.  Panelists will provide answers to pressing issues, including:

  • Growing challenges of third-parties and how to compel them to do what you need them to do. 
  • Managing security in a big environments of a thousand-partner landscape
  • Coping with data localization–knowing regulations and identifying data that must comply
  • Keeping pace with changing compliance expectations
Matanda Doss
Ty Howard
Mike Manrod
  • 02:50 PM
  • 03:19 PM
The Evolution of Cyber Enabled Fraud
Frank Boudreaux Jr., Special Agent in Charge, Phoenix Field Office, U.S. Secret Service
Harry Steward, Network Intrusion Forensic Analyst, Phoenix Field Office, U.S. Secret Service

As criminal methods evolve, it is crucial that the awareness and countermeasures of potential victims and law enforcement evolve twice as fast to mitigate these potential threats. Business Email Compromise (BEC) and related email account compromise scams resulted in nearly $2.4 billion in reported losses from victims in 2021, the most of any category disclosed to the Internet Crime Complaint Center (IC3.) in this exclusive session Special Agents from the U.S. Secret Service will discuss:

  • Actual BECs, Romance Scams, and Ransomware outlined by those who worked them.
  • “Best Practices” for the public to be aware of and to mitigate the chance of becoming a victim of one of these crimes.
Frank Boudreaux Jr.
Harry Steward
  • 03:25 PM
  • 03:54 PM
Cocktail Reception
  • 04:00 PM
  • 04:59 PM
Day 2 Agenda

All content from Day 1 will be available on demand from 9 AM - 5 PM EST on Day 2, Wednesday, October 26th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.

  • 09:00 AM
  • 04:59 PM

As co-chairs of iSMG’s Southwest Summit, we are proud to welcome cybersecurity practitioners from across the region to this select event for education and networking. We are happy to be a part of the high caliber speaker lineup and look forward to meeting you at the summit, to share and discuss cybersecurity insights and best practices. The sessions will explore the most recent trends and innovations as well as updates on the most pressing issues, form both the public and private sectors.

ISMG is externally honored to welcome this year’s keynote, Deputy CISO of the State of Arizona and Deputy Director of the Arizona Dept. of Homeland Security, Ryan Murray. We could not think of a better way to kick of the summit!

On behalf of iSMG and the summit’s Advisory Committee, we look forward to seeing you in Phoenix.

Matanda Doss
Executive Director, Cybersecurity and Technology Controls, Commercial Bank, JPMorgan Chase & Co.

Troy Leach
Chief Strategy Officer, Cloud Security Alliance
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

Hyatt Regency Phoenix
Name :
Hyatt Regency Phoenix
Address :
Hyatt Regency Phoenix, North 2nd Street, Phoenix, AZ, USA

Tom Field
SVP of Editorial
ISMG
Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world,...
Shannon Lawson
CISO
City of Phoenix
Mr. Shannon M. Lawson has a diverse background in the cybersecurity discipline and extensive military experience with the information and cryptologic warfare community. Shannon currently serves as the Chief Information Security Officer for the City of Phoenix. He is responsible...
Matanda Doss
Executive Director, Cybersecurity and Technology Controls, Commercial Bank
JPMorgan Chase & Co.
Matanda Doss is an Executive Director for the J.P. Morgan Chase, Commercial Banking Cybersecurity and Technology Controls organization. He has 25 years of technology experience, across software development, ecommerce, mobile applications, data security and financial systems. Matanda serves as an...
Rick McElroy
Principal Security Strategist
VMware
McElroy, principal cybersecurity strategist for VMware, has 24 years of information security experience educating and advising organizations on reducing their risk posture and tackling tough security challenges. His current role takes him all over the world, working with organizations to...
Amelia Paro
Director Of Channel Development
ID Agent
Paro leads Kaseya's channel team, working with MSPs and channel partners around the globe. She is an experienced sales professional with over 10 years of experience in the technology industry in B2B and B2C environments. Her past sales experience includes...
Michael McCormick
Sr. Sales Consultant - Multi-Cloud
Entrust
McCormick is a business executive and 30-year veteran of the information security industry. As a business development and sales executive, he has helped build early-stage information security companies and grow these businesses to eventual acquisition by larger organizations such as...
Harry Steward
Network Intrusion Forensic Analyst, Phoenix Field Office
U.S. Secret Service
Harry Steward is a Network Intrusion Forensic Analyst (NIFA) with the U.S. Secret Service (USSS) Phoenix Field Office. NIFA Steward started his career with the USSS in September 2021 after retiring from the Glendale (AZ) Police Department with 20 years...
Anandh Palanisamy
Senior IT Security Solutions Consultant & Evangelist
ManageEngine
Palanisamy shares his vast knowledge about Active Directory and IT security and helps form a bridge between our prospects and clients and our solutions. In more than 13 years with ManageEngine as an AD and IT security solutions expert, Palanisamy...
Jennifer Pittman-Leeper
Technical Account Manager
Tanium
Jennifer Pittman-Leeper, more commonly known as JPL, has nearly two decades of experience as a strategic thought leader and policy developer for state government. At Tanium, JPL works directly with SLED customers across the country helping establish governance and policies...
Anna Delaney
Director, ISMG Productions
ISMG
Troy Leach
Chief Strategy Officer
Cloud Security Alliance
Troy Leach has spent more than 25 years educating on and advocating for the advancement of responsible technology to improve the quality of living and parity for all. Currently Mr. Leach is the Chief Strategy Officer for the non-profit, Cloud...
Ty Howard
Chief Information Security and Privacy Officer
City of Mesa
Ty Howard is the Chief Information Security and Privacy Officer for the City of Mesa. Mr. Howard has worked across various public and private industries and served in different leadership capacities. He is a Certified Project Management Professional (PMP) and...
Frank Boudreaux Jr.
Special Agent in Charge, Phoenix Field Office
U.S. Secret Service
Frank Boudreaux, Jr. is the Secret Service Special Agent in Charge (SAIC) of the Phoenix Field Office and has served a variety of dynamic assignments with Secret Service for over 24 years. Before Phoenix, SAIC Boudreaux held supervisory positions in...
Jordan Camba
Sales Engineer
Anvilogic
As a sales engineer with Anvilogic, Camba brings firsthand experience from the field as a SOC analyst and detection engineer. He spent the last four years helping bring innovative security analytics solutions to the market and paving the way for...
Cathy Kingeter
Director of Product Management
Opentext Security Solutions
As director of product management at Carbonite and Webroot, OpenText Security Solutions, Kingeter is responsible for the entire email security portfolio, including Webroot Advanced Email Encryption powered by Zix. She has over 20 years of experience in enterprise networking and...
Bob Schlotfelt
CISO
LACERA
Bob has grown a career in the Cyber Security and Information Technology industry. He has risen through the ranks and have successfully built and led teams. He has continually positioned himself as a trusted advisor and leader and has garnered...
David Stevens
Principal Technical Sales Consultant
Entrust
Stevens is responsible for architecting Entrust’s best-in-class security and compliance solutions for worldwide, multi-cloud environments. He is also involved in supporting key customers and channel partners with technical training and partner enablement. Stevens has over 20 years of experience in...
Marianne McGee
Executive Editor
ISMG Corp
Michael Novinson
Managing Ediitor
ISMG
Mike Manrod
CISO
Grand Canyon Education, Inc.
Mike presently serves as the Chief Information Security Officer for Grand Canyon Education, responsible for leading the security team and formulating the vision and strategy for protecting students, staff, and information assets across the enterprise. Previous experiences include serving as...
Dan Wilkins
CISO
State of Arizona - DES
Dan is a 25+ year cyber security veteran including military, private and public sector service, and he is an author with international publications. Leading multiple teams during his life and career, Dan has made observations that led him to develop...
Jeff McCardel
Sales Engineer
Exabeam
McCardel started working in cybersecurity 19 years ago, managing a home-grown SIEM before the market had really developed. This led to a variety of roles, from incident response investigator to security architect and everything in between. He is now happy...
Mike Storm
Distinguished Engineer - CTO
Cisco Systems, Inc.
Storm, a Cybersecurity Distinguished Engineer at Cisco and 15-year CCIE Security, focuses on cybersecurity solution architectures and security platform strategy for the Global Cisco Security business. With 30 years of experience in the networking and cybersecurity industry, Storm frequently speaks,...
Eric Hyman
Sr Director
GTT
Hyman is responsible for the development and execution of GTT’s product marketing and partner marketing strategies, including the creation and implementation of a comprehensive go-to-market framework for secure networking, managed networking and voice. He supports sales enablement, demand generation and...
Iain Rose
Solutions Engineer
Snyk
Steve King
Managing Director, Cybersecurity Marketing Advisory Services
CyberTheory
Steve King has served in senior leadership roles in technology development and deployment for the past 25 years. He is an author, lecturer and serial startup founder, including three successful exits in cybersecurity, and served for six years as the...
Mat Schwartz
Executive Editor
ISMG

View Agenda
The State of Cybersecurity in Arizona: Optimal Strategies for Digital Transformation and Building Strong Partnerships

Arizona has long been a leader in leveraging IT and providing digital services, but across the state and country alike, there are new challenges emerging following the pandemic, and with this comes new threats and risk factors. With that being said, it is critical to have continuous discussions on how these evolving cybersecurity risks can be tackled, in spite of the fact that there are numerous advances in the way of digital transformation. In this exclusive session, Ryan Murray, Deputy Director and Deputy State CISO, Arizona Department of Homeland Security, discusses the state of critical infrastructure protection, as well as:

  • Sheds light on how Arizona is engaged in public/private partnerships for information sharing and security
  • Discuss the "cybersecurity poverty line”, and what that means for the cyber industry
  • Assess the most effective strategies for recruiting/retaining cybersecurity staff
  • 08:50 AM
  • 09:39 AM
Track B: Risk Management for a New Era: Maturity Models and Evolution of Security Programs
Bob Schlotfelt, CISO, LACERA
Dan Wilkins, CISO, State of Arizona - DES

Digital transformation has created a wealth of opportunity: remote working, cloud migration, and smart devices. But it has also brought with it vulnerabilities inherent in legacy technology, an enlarged attack surface and increased attention from criminal adversaries who seek to disrupt operations or steal intellectual property. Today's CISOs need to focus on these new vulnerabilities and risks. What are the key factors to consider when building a plan to improve security maturity in this new era?

In this panel Bob Schlotfelt, CISO, LACERA and Dan Wilkins, CISO, State of Arizona - DES will discuss:

  • Developing a road map to cybersecurity maturity
  • Prioritization drivers of organizations at different stages of maturity
  • Explore solutions and their relevance at different stages 
Bob Schlotfelt
Dan Wilkins
  • 09:35 AM
  • 10:14 AM
Track A: Cyber Warfare: A New Playbook. How Cyber, Conventional Warfare and Disinformation/MDM Constitute a Unified Playbook
Mike Manrod, CISO, Grand Canyon Education, Inc.
Ty Howard, Chief Information Security and Privacy Officer, City of Mesa
Steve King, Managing Director, Cybersecurity Marketing Advisory Services, CyberTheory
Matanda Doss, Executive Director, Cybersecurity and Technology Controls, Commercial Bank, JPMorgan Chase & Co.

The nature of warfare is changing. As conventional, cyber and information warfare converge into a highly refined and devastating playbook, we need to rethink many aspects of the way we implement defense tactics. This panel of public and private sector experts will dissect:

  • The evolution of Russian tactics-from the annexation of Crimea to the invasion of Ukraine
  • How the Perception War and MDM are taking center stage in modern conflict and shaping world events
  • Why we need an integrated playbook and how should this shape our defensive strategy
Mike Manrod
Ty Howard
Steve King
Matanda Doss
  • 09:45 AM
  • 10:14 AM
  • 10:20 AM
  • 10:49 AM
Track A
Mike Storm
Track A: Rising Above the Security Poverty Line – The Future of Embedded Global Cybersecurity
Mike Storm, Distinguished Engineer - CTO, Cisco Systems, Inc.

Cisco believes that “Security is a Human Right” and should be something that every human on the planet should have access to and have integrated into every aspect of their digital lives. The impact of the Security Poverty Line has provided an advantage for bad actors to prey on the misinformed, unprotected and unprepared and has had a massive impact on businesses large and small across every industry in the world. Join Mike Storm, Distinguished Engineer for Cisco Security CTO, and a 30-year Industry Veteran, as he highlights the Global Cisco strategy to deliver End-to-End Security, as a default, to every system, and person, on the planet.

Click here to view our sponsor booth for more information, chat with our representative and resources.

  • 10:20 AM
  • 10:49 AM
Track B
Rick McElroy
Track B: The Industrialization of Cybercrime and Evolution of Cybercrime Syndicates
Rick McElroy, Principal Security Strategist, VMware

Cybercrime is big business. Recent estimates have stated cybercrime will cost the world $10 trillion annually by 2025. To understand modern attacks and begin to disrupt the return on investment for cybercrime, one must understand how cybercrime has become a global business. Join Rick McElroy as we look backward to move forward together.

Click here to view our sponsor booth for more information, chat with our representative and resources.

  • 10:55 AM
  • 11:09 AM
Track A
Cathy Kingeter
Track A: How to Become Cyber Resilient in Today’s Business World with Email Encryption
Cathy Kingeter, Director of Product Management, Opentext Security Solutions

OpenText Security Solutions delivers a complete cyber resilience framework, encompassing data security and management. Email is the primary form of business communication worldwide, making it the number one threat vector for bad actors. Protecting information flowing into and out of the organization is vital for all organizations in today’s virtual world. Come learn why email encryption should be a foundational layer of your data security and compliance strategy.

Click here to view our sponsor booth for more information, chat with our representative and resources.

  • 10:55 AM
  • 11:09 AM
Track B
Amelia Paro
Track B: BullPhish ID: Effortless, Affordable Security Awareness Training
Amelia Paro, Director Of Channel Development, ID Agent

Phishing attempts are more frequent and persuasive than ever before, and the threats are getting more severe each day. But by implementing security awareness training, your employees can be better prepared to identify and address complex cyberthreats by as much as 40%.

In this session, you'll learn how BullPhish ID provides IT administrators dealing with busy, distracted employees an effortless, affordable security awareness training and phishing simulation solution to drastically reduce risks due to human error.
 

Click here to view our sponsor booth for more information, chat with our representative and resources.

Exhibits & Networking Break

Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!

  • 11:10 AM
  • 11:34 AM
  • 11:30 AM
  • 11:59 AM
Track A
Troy Leach
Shannon Lawson
Mike Manrod
Track A: The Future of Ransomware and Evolving Attacks
Troy Leach, Chief Strategy Officer, Cloud Security Alliance
Shannon Lawson, CISO, City of Phoenix
Mike Manrod, CISO, Grand Canyon Education, Inc.

Adaptations are needed to keep pace with the changing ransomware environment. This panel will address what you should be ready for. They will also debate valid and invalid approaches to minimizing risk -from technology, government and other activities that will influence how organizations can to respond to threats. This panel will:

  • Discuss current trends for ransomware attacks 
  • Look at the impact of the changing environment on insurance premiums
  • Debate whether norms or regulations should dictate payments
  • Address critical strategies and aspects to being successful in defending against attacks
  • 11:30 AM
  • 11:59 AM
Track B
Matanda Doss
Track B: Little Device Big Threat! - IoT Attacks, Vulnerabilities and Prolific Risk
Matanda Doss, Executive Director, Cybersecurity and Technology Controls, Commercial Bank, JPMorgan Chase & Co.

The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption. Join us to learn more about where IoT is headed and how you can stay safe while still reaping the benefits of a digital world.  This session will illuminate

  • Biggest threats based on trending attacks  
  • Challenges of IoT security based on common vulnerabilities
  • Vulnerabilities caused by new technologies
  • Strategies for securing huge attack surfaces
  • Regulatory and compliance issues rising from third-party partnerships
  • 12:05 PM
  • 12:34 PM
Track A
Jordan Camba
Track A: Don’t Get Caught in a Compromising Position: Defend & Detect Across Your Threat Landscape
Jordan Camba, Sales Engineer, Anvilogic

Threat detection is at the heart of building foundational security to shift with the evolving threat landscape. In this session, we will demonstrate how to build behavioral attack-pattern scenarios correlating detection use cases across different data domains, which helps to keep up with your threat landscape, and learn how you can easily start to build and implement sequence-based detections in your environment. The right methods, frameworks, and detections are fundamental to understanding your threat landscape and comprehending the correct path. We will show how to cover the steps to defend against some of the various compromises that have been identified across the numerous industries.

Click here to view our sponsor booth for more information, chat with our representative and resources.

  • 12:05 PM
  • 12:34 PM
Track B
Anandh Palanisamy
Track B: AI and Zero Trust, The New Enrichments of SIEM and IAM
Anandh Palanisamy, Senior IT Security Solutions Consultant & Evangelist, ManageEngine

Internal threats in today's era are complex and crucial in the cybersecurity domain. Understanding dynamic and multivariate user behavior is challenging too. Traditional sequential and timeline-based methods cannot easily address the complexity of temporal and relational features of user behaviors. Hence, we need an AI-based report that enables analysts to understand user behavior patterns that result in identification of anomalies. We can strengthen our security further by including access management as the core of zero trust architecture to create a zero trust extended ecosystem.

Click here to view our sponsor booth for more information, chat with our representative and resources.

Lunch & Networking Break
  • 12:35 PM
  • 01:24 PM
Whole of State Cyber Security Strategy
Jennifer Pittman-Leeper, Technical Account Manager, Tanium

Cybersecurity Whole of State is a collaborative effort between State Government, Local Municipalities (Cities/Counties), and Education (K12/Higher Ed) to protect the citizens, individual municipalities, & the state as a whole from cybersecurity threats. Pillars of Whole of State include Information Sharing, Incident Response Planning, Proactive Cyber Protection, Workforce Development, & Policy/Funding. Critical factors of success include governance, strategic plans, execution pans, and continuous validation.


Come to learn more about how this Cybersecurity Whole of State approach is being adopted regionally & nationally. Also, come to find out how you can get involved!

Click here to view our sponsor booth for more information, chat with our representative and resources.

Jennifer Pittman-Leeper
  • 01:20 PM
  • 01:34 PM
  • 01:40 PM
  • 02:09 PM
Track A
Michael McCormick
David Stevens
Track A: Security Resilience in a Multi-Cloud Environment
Michael McCormick, Sr. Sales Consultant - Multi-Cloud, Entrust
David Stevens, Principal Technical Sales Consultant, Entrust

As organizations increasingly migrate more operations from on-premises to hybrid and multi-cloud environments, it becomes a real challenge to retain control as your cloud footprint and complexity grow and consistent security and compliance become unmanageable. Compliance automation and centralized key management across disparate infrastructure can be complex. With the unfettered proliferation of virtual machines and containers, learn how to strengthen your security posture, improve operational efficiency through automation and become more resilient to attacks from bad actors and threats from innocent staff misconfigurations that can lead to unscheduled outages.

Click here to view our sponsor booth for more information, chat with our representative and resources.

  • 01:40 PM
  • 02:09 PM
Track B
Eric Hyman
Track B: SASE Framework: Making the Case for Managed Services
Eric Hyman, Sr Director, GTT

Secure Access Service Edge, or SASE, is an emerging cybersecurity framework that Gartner first named in August 2019. With reports showing 62% of employees want to work remote or hybrid and 92% of businesses are adopting a multi-cloud strategy, the need for a new network and security approach is rising.

SASE adopters are turning to managed service partners to navigate these complex migrations in order to assist with the technology choices, costs, resources and more.

Join this session, "SASE Framework: Making the Case for Managed Services," to learn more from the latest research and discuss the approach a global managed service provider deploys.

Click here to view our sponsor booth for more information, chat with our representative and resources.

  • 02:15 PM
  • 02:29 PM
Track A
Jeff McCardel
Track A: Seize the Breach: Why Breaches Still Occur and How to Mitigate Them
Jeff McCardel, Sales Engineer, Exabeam

Breaches happen, and 2021 was a record-breaking year for them. According to research by the Identity Theft Resource Center, as of September 2021 there were 1,291 breaches publicly reported in 2021, compared to 1,108 breaches in 2020. That's a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a discussion of: 

  • Why SOC and security teams are way too limited by legacy SIEM; 
  • How machine-learning-driven analytics and automation technologies provide unmatched threat detection, investigation and response - or TDIR - capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage; 
  • A simple maturity model based on outcomes and use cases that can vastly improve security operations. 

Click here to view our sponsor booth for more information, chat with our representative and resources.

  • 02:15 PM
  • 02:29 PM
Track B
Iain Rose
Track B: Cloud-Native Application Security: Embracing Developer-First Security for the Cloud Era
Iain Rose, Solutions Engineer, Snyk

Join Iain Rose, Solutions Engineer at Snyk, to learn how Snyk's AppSec and CloudSec platform allows developers to not only build securely but also build at a pace that allows them to stay competitive. This Tech Talk will share how Snyk is differentiated in the market and why our platform is not only trusted by security teams but also loved by developers because it allows security to scale and developers to move faster.

Click here to view our sponsor booth for more information, chat with our representative and resources.

Exhibits & Networking Break

Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!

  • 02:30 PM
  • 02:54 PM
Protections Beyond Cybersecurity - Technical Controls and Organizational Security Policy
Matanda Doss, Executive Director, Cybersecurity and Technology Controls, Commercial Bank, JPMorgan Chase & Co.
Ty Howard, Chief Information Security and Privacy Officer, City of Mesa
Mike Manrod, CISO, Grand Canyon Education, Inc.

Information is your most valuable resource, so implementing effective protections and technical controls that bolster your cybersecurity posture are crucial to the health of your organization. Our experts talk about ways to proactively protect your organization’s data, finances and business processes in this open mic format.  Panelists will provide answers to pressing issues, including:

  • Growing challenges of third-parties and how to compel them to do what you need them to do. 
  • Managing security in a big environments of a thousand-partner landscape
  • Coping with data localization–knowing regulations and identifying data that must comply
  • Keeping pace with changing compliance expectations
Matanda Doss
Ty Howard
Mike Manrod
  • 02:50 PM
  • 03:19 PM
The Evolution of Cyber Enabled Fraud
Frank Boudreaux Jr., Special Agent in Charge, Phoenix Field Office, U.S. Secret Service
Harry Steward, Network Intrusion Forensic Analyst, Phoenix Field Office, U.S. Secret Service

As criminal methods evolve, it is crucial that the awareness and countermeasures of potential victims and law enforcement evolve twice as fast to mitigate these potential threats. Business Email Compromise (BEC) and related email account compromise scams resulted in nearly $2.4 billion in reported losses from victims in 2021, the most of any category disclosed to the Internet Crime Complaint Center (IC3.) in this exclusive session Special Agents from the U.S. Secret Service will discuss:

  • Actual BECs, Romance Scams, and Ransomware outlined by those who worked them.
  • “Best Practices” for the public to be aware of and to mitigate the chance of becoming a victim of one of these crimes.
Frank Boudreaux Jr.
Harry Steward
  • 03:25 PM
  • 03:54 PM
Cocktail Reception
  • 04:00 PM
  • 04:59 PM
Day 2 Agenda

All content from Day 1 will be available on demand from 9 AM - 5 PM EST on Day 2, Wednesday, October 26th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.

  • 09:00 AM
  • 04:59 PM

Speaker Interviews

October 25 - 26, 2022

Southwest US Summit