Southwest US Summit
Hybrid Summit October 25 - 26, 2022
This hybrid summit's agenda will cover Zero Trust, IAM, Ransomware, Privacy, Fraud, Payments, IoT, Cryptocurrency, End Point Protection, Cloud Security and more.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
Lisa Sotto
Partner
Hunton Andrews Kurth LLP
Jeremy Grant
Managing Director, Technology Business Strategy
Venable LLP
David Pollino
Former CISO
PNC Bank
John Kindervag
Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow
ON2IT Cybersecurity
Ari Redbord
Head of Legal and Government Affairs
TRM Labs
Grant Schneider
Senior Director for Cybersecurity services ( Former U.S. federal CISO)
Venable LLP
Tom Field
SVP of Editorial
ISMG
Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world,...
Shannon Lawson
CISO
City of Phoenix
Lester Godsey
CISO
Maricopa County
Lester Godsey is the Chief Information Security and Privacy Officer for Maricopa County, AZ, the fourth most populous county in the United States. With over twenty-six years of higher education and local government IT experience, Godsey was selected as one...
Ty Howard
Chief Information Security and Privacy Officer
City of Mesa
Ty Howard is the Chief Information Security and Privacy Officer for the City of Mesa. Mr. Howard has worked across various public and private industries and served in different leadership capacities. He is a Certified Project Management Professional (PMP) and...
Frank Boudreaux Jr.
Special Agent in Charge, Phoenix Field Office
U.S. Secret Service
Frank Boudreaux, Jr. is the Secret Service Special Agent in Charge (SAIC) of the Phoenix Field Office and has served a variety of dynamic assignments with Secret Service for over 24 years. Before Phoenix, SAIC Boudreaux held supervisory positions in...
Jordan Camba
Sales Engineer
Anvilogic
As a Sales Engineer with Anvilogic, Jordan brings first-hand experience from the field as a SOC Analyst and Detection Engineer. He spent the last four years helping bring innovative security analytics solutions to the market and paving the way for...
Catherine Kingeter
Director of Product Management
Carbonite and Webroot, OpenText Security Solutions
As Director of Product Management at Carbonite and Webroot, OpenText Security Solutions, Cathy is responsible for the entire email security portfolio including Webroot Advanced Email Encryption powered by Zix. She is a 20+ year veteran in enterprise networking and security,...
Anna Delaney
Director, ISMG Productions
ISMG
Troy Leach
Chief Strategy Officer
Cloud Security Alliance
Troy Leach has spent more than 25 years educating on and advocating for the advancement of responsible technology to improve the quality of living and parity for all. Currently Mr. Leach is the Chief Strategy Officer for the non-profit, Cloud...
Matanda Doss
Executive Director, Cybersecurity and Technology Controls, Commercial Bank
JPMorgan Chase & Co.
Matanda Doss is an Executive Director for the J.P. Morgan Chase, Commercial Banking Cybersecurity and Technology Controls organization. He has 25 years of technology experience, across software development, ecommerce, mobile applications, data security and financial systems. Matanda serves as an...
Dan Wilkins
CISO
State of Arizona
Jeff McCardel
Sales Engineer
Exabeam
19 years ago, Jeff started working in cybersecurity managing a home-grown SIEM before the market had really developed. This led to a variety of roles, from incident response investigator, to security architect, and everything in between. He is now happy...
Mike Storm
Distinguished Engineer
Cisco Security
Mike Storm, Cybersecurity Distinguished Engineer at Cisco and 15-year CCIE Security, focuses on Cybersecurity Solution Architectures and Security Platform Strategy for the Global Cisco Security business. A sought-after Keynote speaker with 30 years in the networking and cybersecurity industry, Storm...
Eric Hyman
Senior Director of Product Marketing
GTT
Eric is responsible for the development and execution of GTT’s product marketing and partner marketing strategies including the creation and implementation of a comprehensive go-to-market framework for secure networking, managed networking, and voice. He supports sales enablement, demand generation and...
Bob Schlotfelt
CISO
LACERA
As a seasoned CISO he has established executive level strategy and framework for the creation open information security team and program. Bob has built a career in the Information Technology and Cyber Security industry. Proven and successful establishing and developing...
Michael Novinson
Managing Ediitor
ISMG
Mike Manrod
CISO
Grand Canyon Education, Inc.
Rashmi Sahay
Vice President, IT & Cyber Risk Leader
Bank of the West/BNP Paribas
Rick McElroy
Principal Security Strategist
VMware
Amelia Paro
Director Of Channel Development
ID Agent
Paro leads Kaseya's channel team, working with MSPs and channel partners around the globe. She is an experienced sales professional with over 10 years of experience in the technology industry in B2B and B2C environments. Her past sales experience includes...
Michael McCormick
Sr. Sales Executive
Entrust
Michael McCormick is a business executive and 30-year veteran in the information security industry. As a business development and sales executive, McCormick has helped build early stage infosec companies and grow these businesses to eventual acquisition by larger organizations such...
Harry Steward
Network Intrusion Forensic Analyst, Phoenix Field Office
U.S. Secret Service
Harry Steward is a Network Intrusion Forensic Analyst (NIFA) with the U.S. Secret Service (USSS) Phoenix Field Office. NIFA Steward started his career with the USSS in September 2021 after retiring from the Glendale (AZ) Police Department with 20 years...
Iain Rose
Solutions Engineer
Snyk
View Agenda
  • 09:45 AM
  • 10:14 AM
Track A
Mike Manrod
Shannon Lawson
Ty Howard
Track A: Cyber Warfare: A New Playbook.  How APT, Conventional Warfare and Disinformation/MDM Constitute a Unified Playbook
Mike Manrod, CISO, Grand Canyon Education, Inc.
Shannon Lawson, CISO, City of Phoenix
Ty Howard, Chief Information Security and Privacy Officer, City of Mesa
  • 09:45 AM
  • 09:59 AM
Track B
Matanda Doss
Track B: IOT
Matanda Doss, Executive Director, Cybersecurity and Technology Controls, Commercial Bank, JPMorgan Chase & Co.
  • 10:20 AM
  • 10:49 AM
Track A
Mike Storm
Track A: Cisco Cybersecurity – What’s Now and What’s Next
Mike Storm, Distinguished Engineer, Cisco Security

In a time of uncertainty, businesses around the world need a partner with their best interests in mind. The ability to secure all business large and small is critical, and doing so while simplifying the environment, adding value faster than ever, while being extremely easy to use, are critical outcomes for most business customers. This presentation will detail why Cisco should be that partner in Cybersecurity and how Cisco solves these critical and complex security challenges today and in the future.

  • 10:20 AM
  • 10:49 AM
Track B
Track B: Modern Bank Heists: What You Need to Know About the Latest Fraud Trends – and the Fraudsters

It is clear that fraud threats are trending far beyond traditional account takeover. Large banking institutions are no longer the only place where e-criminals can steal money. Any company that uses any type of online banking system (virtually 100% of companies) can be hacked via new routes including payment card fraud and synthetic IDs. With so many emerging angles cybercriminals are taking, how do you ensure you have an omni-channel strategy to cover them all?

Brokerage account takeover, supply chain attacks, destructive attacks and those that seek to manipulate time or time stamps are among the latest threats uncovered in the latest Modern Bank Heists survey conducted by VMware Carbon Black.

  • 10:55 AM
  • 11:09 AM
Track A
Catherine Kingeter
Track A: How to Become Cyber Resilient in Today’s Business World with Email
Catherine Kingeter, Director of Product Management, Carbonite and Webroot, OpenText Security Solutions

OpenText Security Solutions delivers a complete cyber resilience framework, encompassing data security and management. Email is the primary form of business communication worldwide, making it the #1 threat vector for bad actors. Protecting information flowing into and out of the organization is vital for all organizations in today’s virtual world. Come learn why email encryption should be a foundational layer of your data security and compliance strategy.

  • 10:55 AM
  • 11:09 AM
Track B
Amelia Paro
Track B: BullPhish ID: Effortless, Affordable Security Awareness Training
Amelia Paro, Director Of Channel Development, ID Agent

Phishing attempts are more frequent and persuasive than ever before, and the threats are getting more severe each day. However, by implementing security awareness training, your employees can be better prepared to identify and address complex cyber threats by as much as 40%.

In this session, you'll learn how BullPhish ID provides IT administrators dealing with busy, distracted employees an effortless, affordable security awareness training and phishing simulation solution to drastically reduce risks due to human error.

Exhibits & Networking Break

Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!

  • 11:10 AM
  • 11:29 AM
  • 11:30 AM
  • 11:59 AM
Track A
Troy Leach
Matanda Doss
Shannon Lawson
Mike Manrod
Track A: Ransomware Debate
Troy Leach, Chief Strategy Officer, Cloud Security Alliance
Matanda Doss, Executive Director, Cybersecurity and Technology Controls, Commercial Bank, JPMorgan Chase & Co.
Shannon Lawson, CISO, City of Phoenix
Mike Manrod, CISO, Grand Canyon Education, Inc.
  • 11:30 AM
  • 11:59 AM
Track B
Bob Schlotfelt
Dan Wilkins
Rashmi Sahay
Track B: Risk Management for a New Era: Maturity Models and Evolution of Security Programs
Bob Schlotfelt, CISO, LACERA
Dan Wilkins, CISO, State of Arizona
Rashmi Sahay, Vice President, IT & Cyber Risk Leader, Bank of the West/BNP Paribas
Track A: Don’t Get Caught in a Compromising Position: Defend & Detect Across Your Threat Landscape
Jordan Camba, Sales Engineer, Anvilogic

Threat detection is at the heart of building foundational security to shift with the evolving threat landscape. In this session, we will demonstrate how to build behavioral attack-pattern scenarios correlating detection use cases across different data domains, which helps to keep up with your threat landscape, and learn how you can easily start to build and implement sequence-based detections in your environment. The right methods, frameworks, and detections are fundamental to understanding your threat landscape and comprehending the correct path. We will show how to cover the steps to defend against some of the various compromises that have been identified across the numerous industries.

Jordan Camba
  • 12:05 PM
  • 12:34 PM
Lunch & Networking Break
  • 12:35 PM
  • 01:19 PM
Track A: Data Management Will/Has Become Unmanageable
Troy Leach, Chief Strategy Officer, Cloud Security Alliance
Troy Leach
  • 01:20 PM
  • 01:34 PM
  • 01:40 PM
  • 02:09 PM
Track A
Michael McCormick
Track A: Are You Ready for XDR?
Michael McCormick, Sr. Sales Executive , Entrust

Is XDR a technology or a capability? Is there one reference architecture, or is there a set of capabilities that define Extended Detection and Response? Gaining a better understanding of threat actor activity requires telemetry and analysis from multiple tools combined with advanced analysis capability. XDR promises to increase detection fidelity and reduce containment and response times while automating and orchestrating key security processes. But is your organization ready to adopt XDR? Do you have the necessary components and capability to be truly effective with XDR? Join our discussion to learn what it takes to begin a journey to XDR and assess your readiness.

  • 01:40 PM
  • 02:09 PM
Track B
Eric Hyman
Track B: SASE Framework: Making the Case for Managed Services
Eric Hyman, Senior Director of Product Marketing, GTT

Secure Access Service Edge, or SASE, is an emerging cybersecurity framework that Gartner first coined in August 2019.  With reports showing 62% of employees want to work remote or hybrid and 92% of businesses adopting a multi-cloud strategy, the need for a new network and security approach is rising.  

SASE adopters are turning to managed service partners to navigate these complex migrations in order to assist with the technology choices, costs, resources, and more.  

Join this session, SASE Framework:  Marking the Case for Managed Services, to learn more from the latest research and the approach a global managed service provider deploys.

  • 02:15 PM
  • 02:29 PM
Track A
Jeff McCardel
Track A: Seize the Breach: Why Breaches Still Occur and How to Mitigate Them
Jeff McCardel, Sales Engineer, Exabeam

Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020; that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening.

 Join us for a discussion on:

  • Why SOC and security teams are way too limited by legacy SIEM
  • How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage.
  • A simple maturity model based on outcomes and use cases that can vastly improve Security Operations
  • 02:15 PM
  • 02:29 PM
Track B
Iain Rose
Track B: Cloud-Native Application Security: Embracing Developer-First Security for the Cloud Era
Iain Rose, Solutions Engineer, Snyk

Join Iain Rose, Solutions Engineer at Snyk, to learn how Snyk's AppSec and CloudSec platform allows developers to not only build securely but also build at a pace that allows them to stay competitive. This Tech Talk will share how Snyk is differentiated in the market and why our platform is not only trusted by security teams but also loved by developers because it allows security to scale and developers to move faster.

Exhibits & Networking Break

Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!

  • 02:30 PM
  • 02:49 PM
How to Strike the Right Balance Between Technical Controls and Organizational Security Policy
Matanda Doss, Executive Director, Cybersecurity and Technology Controls, Commercial Bank, JPMorgan Chase & Co.
Ty Howard, Chief Information Security and Privacy Officer, City of Mesa
Mike Manrod, CISO, Grand Canyon Education, Inc.
Matanda Doss
Ty Howard
Mike Manrod
  • 02:50 PM
  • 03:19 PM
The Evolution of Cyber Enabled Fraud
Frank Boudreaux Jr., Special Agent in Charge, Phoenix Field Office, U.S. Secret Service
Harry Steward, Network Intrusion Forensic Analyst, Phoenix Field Office, U.S. Secret Service

As criminal methods evolve, it is crucial that the awareness and countermeasures of potential victims and law enforcement evolve twice as fast to mitigate these potential threats. Business Email Compromise (BEC) and related email account compromise scams resulted in nearly $2.4 billion in reported losses from victims in 2021, the most of any category disclosed to the Internet Crime Complaint Center (IC3.) in this exclusive session Special Agents from the U.S. Secret Service will discuss:

  • Actual BECs, Romance Scams, and Ransomware outlined by those who worked them.
  • “Best Practices” for the public to be aware of and to mitigate the chance of becoming a victim of one of these crimes.
Frank Boudreaux Jr.
Harry Steward
  • 03:25 PM
  • 03:54 PM
Cocktail Reception
  • 04:00 PM
  • 04:59 PM
Day 2 Agenda

All content from Day 1 will be available on demand from 9 AM - 5 PM EST on Day 2, Wednesday, October 26th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.

  • 09:00 AM
  • 04:59 PM

This hybrid summit's agenda will cover Zero Trust, IAM, Ransomware, Privacy, Fraud, Payments, IoT, Cryptocurrency, End Point Protection, Cloud Security and more.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

Lisa Sotto
Partner
Hunton Andrews Kurth LLP
Jeremy Grant
Managing Director, Technology Business Strategy
Venable LLP
David Pollino
Former CISO
PNC Bank
John Kindervag
Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow
ON2IT Cybersecurity
Ari Redbord
Head of Legal and Government Affairs
TRM Labs
Grant Schneider
Senior Director for Cybersecurity services ( Former U.S. federal CISO)
Venable LLP

Tom Field
SVP of Editorial
ISMG
Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world,...
Shannon Lawson
CISO
City of Phoenix
Lester Godsey
CISO
Maricopa County
Lester Godsey is the Chief Information Security and Privacy Officer for Maricopa County, AZ, the fourth most populous county in the United States. With over twenty-six years of higher education and local government IT experience, Godsey was selected as one...
Ty Howard
Chief Information Security and Privacy Officer
City of Mesa
Ty Howard is the Chief Information Security and Privacy Officer for the City of Mesa. Mr. Howard has worked across various public and private industries and served in different leadership capacities. He is a Certified Project Management Professional (PMP) and...
Frank Boudreaux Jr.
Special Agent in Charge, Phoenix Field Office
U.S. Secret Service
Frank Boudreaux, Jr. is the Secret Service Special Agent in Charge (SAIC) of the Phoenix Field Office and has served a variety of dynamic assignments with Secret Service for over 24 years. Before Phoenix, SAIC Boudreaux held supervisory positions in...
Jordan Camba
Sales Engineer
Anvilogic
As a Sales Engineer with Anvilogic, Jordan brings first-hand experience from the field as a SOC Analyst and Detection Engineer. He spent the last four years helping bring innovative security analytics solutions to the market and paving the way for...
Catherine Kingeter
Director of Product Management
Carbonite and Webroot, OpenText Security Solutions
As Director of Product Management at Carbonite and Webroot, OpenText Security Solutions, Cathy is responsible for the entire email security portfolio including Webroot Advanced Email Encryption powered by Zix. She is a 20+ year veteran in enterprise networking and security,...
Anna Delaney
Director, ISMG Productions
ISMG
Troy Leach
Chief Strategy Officer
Cloud Security Alliance
Troy Leach has spent more than 25 years educating on and advocating for the advancement of responsible technology to improve the quality of living and parity for all. Currently Mr. Leach is the Chief Strategy Officer for the non-profit, Cloud...
Matanda Doss
Executive Director, Cybersecurity and Technology Controls, Commercial Bank
JPMorgan Chase & Co.
Matanda Doss is an Executive Director for the J.P. Morgan Chase, Commercial Banking Cybersecurity and Technology Controls organization. He has 25 years of technology experience, across software development, ecommerce, mobile applications, data security and financial systems. Matanda serves as an...
Dan Wilkins
CISO
State of Arizona
Jeff McCardel
Sales Engineer
Exabeam
19 years ago, Jeff started working in cybersecurity managing a home-grown SIEM before the market had really developed. This led to a variety of roles, from incident response investigator, to security architect, and everything in between. He is now happy...
Mike Storm
Distinguished Engineer
Cisco Security
Mike Storm, Cybersecurity Distinguished Engineer at Cisco and 15-year CCIE Security, focuses on Cybersecurity Solution Architectures and Security Platform Strategy for the Global Cisco Security business. A sought-after Keynote speaker with 30 years in the networking and cybersecurity industry, Storm...
Eric Hyman
Senior Director of Product Marketing
GTT
Eric is responsible for the development and execution of GTT’s product marketing and partner marketing strategies including the creation and implementation of a comprehensive go-to-market framework for secure networking, managed networking, and voice. He supports sales enablement, demand generation and...
Bob Schlotfelt
CISO
LACERA
As a seasoned CISO he has established executive level strategy and framework for the creation open information security team and program. Bob has built a career in the Information Technology and Cyber Security industry. Proven and successful establishing and developing...
Michael Novinson
Managing Ediitor
ISMG
Mike Manrod
CISO
Grand Canyon Education, Inc.
Rashmi Sahay
Vice President, IT & Cyber Risk Leader
Bank of the West/BNP Paribas
Rick McElroy
Principal Security Strategist
VMware
Amelia Paro
Director Of Channel Development
ID Agent
Paro leads Kaseya's channel team, working with MSPs and channel partners around the globe. She is an experienced sales professional with over 10 years of experience in the technology industry in B2B and B2C environments. Her past sales experience includes...
Michael McCormick
Sr. Sales Executive
Entrust
Michael McCormick is a business executive and 30-year veteran in the information security industry. As a business development and sales executive, McCormick has helped build early stage infosec companies and grow these businesses to eventual acquisition by larger organizations such...
Harry Steward
Network Intrusion Forensic Analyst, Phoenix Field Office
U.S. Secret Service
Harry Steward is a Network Intrusion Forensic Analyst (NIFA) with the U.S. Secret Service (USSS) Phoenix Field Office. NIFA Steward started his career with the USSS in September 2021 after retiring from the Glendale (AZ) Police Department with 20 years...
Iain Rose
Solutions Engineer
Snyk

View Agenda
  • 09:45 AM
  • 10:14 AM
Track A
Mike Manrod
Shannon Lawson
Ty Howard
Track A: Cyber Warfare: A New Playbook.  How APT, Conventional Warfare and Disinformation/MDM Constitute a Unified Playbook
Mike Manrod, CISO, Grand Canyon Education, Inc.
Shannon Lawson, CISO, City of Phoenix
Ty Howard, Chief Information Security and Privacy Officer, City of Mesa
  • 09:45 AM
  • 09:59 AM
Track B
Matanda Doss
Track B: IOT
Matanda Doss, Executive Director, Cybersecurity and Technology Controls, Commercial Bank, JPMorgan Chase & Co.
  • 10:20 AM
  • 10:49 AM
Track A
Mike Storm
Track A: Cisco Cybersecurity – What’s Now and What’s Next
Mike Storm, Distinguished Engineer, Cisco Security

In a time of uncertainty, businesses around the world need a partner with their best interests in mind. The ability to secure all business large and small is critical, and doing so while simplifying the environment, adding value faster than ever, while being extremely easy to use, are critical outcomes for most business customers. This presentation will detail why Cisco should be that partner in Cybersecurity and how Cisco solves these critical and complex security challenges today and in the future.

  • 10:20 AM
  • 10:49 AM
Track B
Track B: Modern Bank Heists: What You Need to Know About the Latest Fraud Trends – and the Fraudsters

It is clear that fraud threats are trending far beyond traditional account takeover. Large banking institutions are no longer the only place where e-criminals can steal money. Any company that uses any type of online banking system (virtually 100% of companies) can be hacked via new routes including payment card fraud and synthetic IDs. With so many emerging angles cybercriminals are taking, how do you ensure you have an omni-channel strategy to cover them all?

Brokerage account takeover, supply chain attacks, destructive attacks and those that seek to manipulate time or time stamps are among the latest threats uncovered in the latest Modern Bank Heists survey conducted by VMware Carbon Black.

  • 10:55 AM
  • 11:09 AM
Track A
Catherine Kingeter
Track A: How to Become Cyber Resilient in Today’s Business World with Email
Catherine Kingeter, Director of Product Management, Carbonite and Webroot, OpenText Security Solutions

OpenText Security Solutions delivers a complete cyber resilience framework, encompassing data security and management. Email is the primary form of business communication worldwide, making it the #1 threat vector for bad actors. Protecting information flowing into and out of the organization is vital for all organizations in today’s virtual world. Come learn why email encryption should be a foundational layer of your data security and compliance strategy.

  • 10:55 AM
  • 11:09 AM
Track B
Amelia Paro
Track B: BullPhish ID: Effortless, Affordable Security Awareness Training
Amelia Paro, Director Of Channel Development, ID Agent

Phishing attempts are more frequent and persuasive than ever before, and the threats are getting more severe each day. However, by implementing security awareness training, your employees can be better prepared to identify and address complex cyber threats by as much as 40%.

In this session, you'll learn how BullPhish ID provides IT administrators dealing with busy, distracted employees an effortless, affordable security awareness training and phishing simulation solution to drastically reduce risks due to human error.

Exhibits & Networking Break

Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!

  • 11:10 AM
  • 11:29 AM
  • 11:30 AM
  • 11:59 AM
Track A
Troy Leach
Matanda Doss
Shannon Lawson
Mike Manrod
Track A: Ransomware Debate
Troy Leach, Chief Strategy Officer, Cloud Security Alliance
Matanda Doss, Executive Director, Cybersecurity and Technology Controls, Commercial Bank, JPMorgan Chase & Co.
Shannon Lawson, CISO, City of Phoenix
Mike Manrod, CISO, Grand Canyon Education, Inc.
  • 11:30 AM
  • 11:59 AM
Track B
Bob Schlotfelt
Dan Wilkins
Rashmi Sahay
Track B: Risk Management for a New Era: Maturity Models and Evolution of Security Programs
Bob Schlotfelt, CISO, LACERA
Dan Wilkins, CISO, State of Arizona
Rashmi Sahay, Vice President, IT & Cyber Risk Leader, Bank of the West/BNP Paribas
Track A: Don’t Get Caught in a Compromising Position: Defend & Detect Across Your Threat Landscape
Jordan Camba, Sales Engineer, Anvilogic

Threat detection is at the heart of building foundational security to shift with the evolving threat landscape. In this session, we will demonstrate how to build behavioral attack-pattern scenarios correlating detection use cases across different data domains, which helps to keep up with your threat landscape, and learn how you can easily start to build and implement sequence-based detections in your environment. The right methods, frameworks, and detections are fundamental to understanding your threat landscape and comprehending the correct path. We will show how to cover the steps to defend against some of the various compromises that have been identified across the numerous industries.

Jordan Camba
  • 12:05 PM
  • 12:34 PM
Lunch & Networking Break
  • 12:35 PM
  • 01:19 PM
Track A: Data Management Will/Has Become Unmanageable
Troy Leach, Chief Strategy Officer, Cloud Security Alliance
Troy Leach
  • 01:20 PM
  • 01:34 PM
  • 01:40 PM
  • 02:09 PM
Track A
Michael McCormick
Track A: Are You Ready for XDR?
Michael McCormick, Sr. Sales Executive , Entrust

Is XDR a technology or a capability? Is there one reference architecture, or is there a set of capabilities that define Extended Detection and Response? Gaining a better understanding of threat actor activity requires telemetry and analysis from multiple tools combined with advanced analysis capability. XDR promises to increase detection fidelity and reduce containment and response times while automating and orchestrating key security processes. But is your organization ready to adopt XDR? Do you have the necessary components and capability to be truly effective with XDR? Join our discussion to learn what it takes to begin a journey to XDR and assess your readiness.

  • 01:40 PM
  • 02:09 PM
Track B
Eric Hyman
Track B: SASE Framework: Making the Case for Managed Services
Eric Hyman, Senior Director of Product Marketing, GTT

Secure Access Service Edge, or SASE, is an emerging cybersecurity framework that Gartner first coined in August 2019.  With reports showing 62% of employees want to work remote or hybrid and 92% of businesses adopting a multi-cloud strategy, the need for a new network and security approach is rising.  

SASE adopters are turning to managed service partners to navigate these complex migrations in order to assist with the technology choices, costs, resources, and more.  

Join this session, SASE Framework:  Marking the Case for Managed Services, to learn more from the latest research and the approach a global managed service provider deploys.

  • 02:15 PM
  • 02:29 PM
Track A
Jeff McCardel
Track A: Seize the Breach: Why Breaches Still Occur and How to Mitigate Them
Jeff McCardel, Sales Engineer, Exabeam

Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020; that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening.

 Join us for a discussion on:

  • Why SOC and security teams are way too limited by legacy SIEM
  • How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage.
  • A simple maturity model based on outcomes and use cases that can vastly improve Security Operations
  • 02:15 PM
  • 02:29 PM
Track B
Iain Rose
Track B: Cloud-Native Application Security: Embracing Developer-First Security for the Cloud Era
Iain Rose, Solutions Engineer, Snyk

Join Iain Rose, Solutions Engineer at Snyk, to learn how Snyk's AppSec and CloudSec platform allows developers to not only build securely but also build at a pace that allows them to stay competitive. This Tech Talk will share how Snyk is differentiated in the market and why our platform is not only trusted by security teams but also loved by developers because it allows security to scale and developers to move faster.

Exhibits & Networking Break

Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!

  • 02:30 PM
  • 02:49 PM
How to Strike the Right Balance Between Technical Controls and Organizational Security Policy
Matanda Doss, Executive Director, Cybersecurity and Technology Controls, Commercial Bank, JPMorgan Chase & Co.
Ty Howard, Chief Information Security and Privacy Officer, City of Mesa
Mike Manrod, CISO, Grand Canyon Education, Inc.
Matanda Doss
Ty Howard
Mike Manrod
  • 02:50 PM
  • 03:19 PM
The Evolution of Cyber Enabled Fraud
Frank Boudreaux Jr., Special Agent in Charge, Phoenix Field Office, U.S. Secret Service
Harry Steward, Network Intrusion Forensic Analyst, Phoenix Field Office, U.S. Secret Service

As criminal methods evolve, it is crucial that the awareness and countermeasures of potential victims and law enforcement evolve twice as fast to mitigate these potential threats. Business Email Compromise (BEC) and related email account compromise scams resulted in nearly $2.4 billion in reported losses from victims in 2021, the most of any category disclosed to the Internet Crime Complaint Center (IC3.) in this exclusive session Special Agents from the U.S. Secret Service will discuss:

  • Actual BECs, Romance Scams, and Ransomware outlined by those who worked them.
  • “Best Practices” for the public to be aware of and to mitigate the chance of becoming a victim of one of these crimes.
Frank Boudreaux Jr.
Harry Steward
  • 03:25 PM
  • 03:54 PM
Cocktail Reception
  • 04:00 PM
  • 04:59 PM
Day 2 Agenda

All content from Day 1 will be available on demand from 9 AM - 5 PM EST on Day 2, Wednesday, October 26th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.

  • 09:00 AM
  • 04:59 PM

Speaker Interviews

October 25 - 26, 2022

Southwest US Summit