7:15am – 8:40am

8:40am – 9:00am
Registration Opens with a Breakfast Buffet and Networking in the Sponsor Pavilion

Welcome and Opening Remarks

Mary Lou Heastings
Executive Alliance Inc.
Richard Warner 
Television and Radio Host
Summit Moderator

9:00am – 9:30am

Morning Keynote - The Future of Securing our Data
Andy Ulrich
Head of Security, Americas

Predicting the future in information security is difficult and risky, because of the complexity of our infrastructures, and because hackers prefer to be unpredictable. But these two factors – complexity and unpredictability – can actually guide us in how we approach the future of securing our data. Note: unpredictable and complex things may happen in real time during this presentation.

9:30am – 10:00am

Guiding Information Security into the Future


Mary Dickerson

Chief Information Security Officer

 Asst. Vice Chancelor

University of Houston


This interview session Mary Dickerson, CISO at the University of Houston, will focus on key skills needed by leadership to move security organizations forward, what will set CISOs apart in the future, and provide insight into what she is doing to overcome some of the biggest challenges facing the industry.

10:00am – 10:30am

Identity at the Center

Layer 0@0,5x.png

Phil McQuitty

Identity and Data Access Governance Strategist, Office of the CTO

SailPoint Technologies, Gold Sponsor

The expression, "Identity at the center of IT Security", is becoming quite common, but what does this really mean?  In this presentation, we'll discuss the meaning of the expression, how to achieve it, and why it is an essential part of any IT Governance and Administration program.

10:30am – 11:10am

Break and Networking in the Sponsor Pavilion

11:10am – 11:30am

The Breach Anxiety in Information Security

Duaine Styles@0,5x.png

Duaine Styles

Chief Information Security Officer

The Torchmark Family of Companies


Cecil Pineda

Chief Information Security Officer

DFW International Airport


The unknown in information security is any CISO’s worst nightmare. Despite best efforts, security breaches continue to go undetected.  This interview session, with Duaine Styles, CISO of The Torchmark Family of Companies and Cecil Pineda, CISO of DFW Airport, will shed light on best practices as they move forward to address people, processes and technology to shore up defenses.

11:30am – 11:45am

Privilege – The New Cyber Battleground
Ruben Garcia - CyberArk - DFW SUMMIT 2018@0,5x.png

Ruben Garcia

District Manager, N. TOLA Region

CyberArk, Silver Sponsor 


Traditionally, much of the focus of a corporation’s InfoSec efforts have been placed on ensuring that the perimeter is secure. Recent attacks have shown an alarming shift from perimeter-based attacks to ones that originate inside the corporate network using privileged accounts. Forrester estimates 80% of security breaches involved privileged credentials – and the privilege attack surface only continues to grow. Once hackers establish a privileged foothold, they gain unfettered access to elevate privileges and move about the network freely without detection. Understanding this widely used method of attack is essential to developing ways to mitigate the risk.

11:45am – 12:00pm

Top of Mind

Interactive polling session with executives discussing some of their top issues of the day and how their industry peers respond. 

12:00pm – 12:15pm

Man + Machine is the Winning Combo for Combatting Cyberthreats

Chris-Morales-high-res -Vectra@0,5x.png

Chris Morales

Head of Security Analytics

Vectra Networks, Silver Sponsor

Time is the most important factor in detecting network breaches. To protect key assets from being stolen or damaged, cyber attackers must be detected in real time. To build the fastest and most efficient processes, it makes sense to combine man and machine allowing each to focus on what they do best.

12:15pm – 1:30pm 

Lunch and Networking

1:30pm – 1:50pm 

Recap of the Day So Far

1:50pm – 2:15pm 

What Next?

Interactive polling session with executives discussing where their concerns are as they look at the state of the industry.

2:15pm – 2:30pm

Autonomous Cyber Defense:

AI and the Immune System Approach

Layer 2@0,5x.jpg

Evan Glaser

Cyber Security Account Executive

Darktrace, Silver Sponsor 


From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network - before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.

2:30pm – 3:00pm

Cyber Intelligence – Forward Thinking


Miguel Clarke

Special Agent


With experts predicting an increase in the impact and frequency of cyber threats, Special Agent, Miguel Clarke with the FBI, will provide insight into areas of focus, the challenges he sees, and recommendations on moving forward.

3:00pm – 3:30pm
Afternoon Break
3:30pm – 4:40pm

Breakout Executive Roundtable Discussions with Debriefs

Breakout sessions with your peers on topics determined by attendees during registration, followed by debriefs of table discussions.



Facilitated by:

Corey LeBlanc

Vice President, Chief Technical Officer

Origin Bank


Topic #1:  Security Analytics & Threat Intelligence – Maturing the Environment

As security organizations have more access to technologies that allow them greater insight, analysis, intelligence and forecasting capabilities, the focus now sharpens on how to formally leverage these technologies to show results for the investments made.



Facilitated by:

Joel Lytle

Director of Information Security

Jackson Walker LLP


Topic #2: Biometric Technologies

There are big implications for security and privacy as this technology emerges, with relevance in user verification, marketing, and personalized advertising, as examples.


Layer 2@0,5x.png

Facilitated by:

Ashok Kumar

Director of Information Security



Topic #3:  Information Risk Management Programs…Forward Thinking

Cyber security readiness continues to evolve at a rapid pace as changes in the threat landscape forces organizations to be more vigilant than ever before.  In turn, the evaluation and prioritization of risk has taken on more importance to the business in order to make the right decisions.



Facilitated by:

Paul Horn

Chief Information Security Officer

HD Vest Financial Services


Topic #4: Measuring Security as a Business Value

Quantifying and proving the value of security to your CEO and business units is difficult.


Layer 1@0,5x.jpg

Facilitated by:

Eric Yancy

Formerly with CEC



Topic #5:GDPR
The regulation will become enforceable on May 25th, 2018


4:40pm – 4:50pm
Closing Remarks
4:50pm – 6:00pm 

Reception and Networking with Prize Drawings