Register for Dallas 2018



7:15am – 8:40am

8:40am – 9:00am
Registration Opens with a Breakfast Buffet and Networking in the Sponsor Pavilion

Welcome and Opening Remarks

Mary Lou Heastings
Executive Alliance Inc.
Richard Warner 
Television and Radio Host
Summit Moderator

9:00am – 9:30am

Morning Keynote - The Future of Securing our Data
Andy Ulrich
Head of Security, Americas

Predicting the future in information security is difficult and risky, because of the complexity of our infrastructures, and because hackers prefer to be unpredictable. But these two factors – complexity and unpredictability – can actually guide us in how we approach the future of securing our data. Note: unpredictable and complex things may happen in real time during this presentation.

9:30am – 10:00am

Guiding Information Security into the Future


Jeff Schilling

Chief Information Security Officer



Mary Dickerson

CISO & Asst. Vice Chancelor

University of Houston


This interview session with Jeff Schilling, CISO at Epsilon, and Mary Dickerson, CISO at the University of Houston, will focus on key skills needed by leadership to move security organizations forward, what will set CISOs apart in the future, and provide insight into what they are doing to overcome some of the biggest challenges facing the industry.

10:00am – 10:30am

Identity at the Center

Layer 0@0,5x.png

Phil McQuitty

Identity and Data Access Governance Strategist, Office of the CTO

SailPoint Technologies, Gold Sponsor

The expression, "Identity at the center of IT Security", is becoming quite common, but what does this really mean?  In this presentation, we'll discuss the meaning of the expression, how to achieve it, and why it is an essential part of any IT Governance and Administration program.

10:30am – 11:10am

Break and Networking in the Sponsor Pavilion

11:10am – 11:30am

The Breach Anxiety in Information Security

Duaine Styles@0,5x.png

Duaine Styles

Chief Information Security Officer


The unknown in information security is any CISO’s worst nightmare. Despite best efforts, security breaches continue to go undetected.  This interview session, with Duaine Styles, CISO of Torchmark, will shed light on best practices as they move forward to address people, processes and technology to shore up defenses.

11:30am – 11:45am

Autonomous Cyber Defense: AI and the Immune System Approach

darktrace copy@0,5x.png

Andrew Gyenis

Cyber Security Account Executive

Darktrace, Silver Sponsor


From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network - before they turn into a full-blown crisis.

Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.

Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.

11:45am – 12:00pm

Top of Mind

Interactive polling session with executives discussing some of their top issues of the day and how their industry peers respond. 

12:00pm – 12:15pm

Man + Machine is the Winning Combo for Combatting Cyberthreats

Chris-Morales-high-res -Vectra@0,5x.png

Chris Morales

Head of Security Analytics

Vectra Networks, Silver Sponsor

Time is the most important factor in detecting network breaches. To protect key assets from being stolen or damaged, cyber attackers must be detected in real time. To build the fastest and most efficient processes, it makes sense to combine man and machine allowing each to focus on what they do best.

12:15pm – 1:30pm 

Lunch and Networking

1:30pm – 1:50pm 

Recap of the Day So Far

1:50pm – 2:15pm 

What Next?

Interactive polling session with executives discussing where their concerns are as they look at the state of the industry.

2:15pm – 2:30pm

Privilege – The New Cyber Battleground

Ruben Garcia - CyberArk - DFW SUMMIT 2018@0,5x.png

Ruben Garcia

District Manager, N. TOLA Region

CyberArk, Silver Sponsor 


Traditionally, much of the focus of a corporation’s InfoSec efforts have been placed on ensuring that the perimeter is secure. Recent attacks have shown an alarming shift from perimeter-based attacks to ones that originate inside the corporate network using privileged accounts. Forrester estimates 80% of security breaches involved privileged credentials – and the privilege attack surface only continues to grow. Once hackers establish a privileged foothold, they gain unfettered access to elevate privileges and move about the network freely without detection. Understanding this widely used method of attack is essential to developing ways to mitigate the risk.

2:30pm – 3:00pm

Cyber Intelligence – Forward Thinking


Miguel Clarke

Special Agent


With experts predicting an increase in the impact and frequency of cyber threats, Special Agent, Miguel Clarke with the FBI, will provide insight into areas of focus, the challenges he sees, and recommendations on moving forward.

3:00pm – 3:30pm
Afternoon Break
3:30pm – 4:40pm

Breakout Executive Roundtable Discussions with Debriefs

Breakout sessions with your peers on topics determined by attendees during registration, followed by debriefs of table discussions.  

Topic #1:  Security Analytics & Threat Intelligence – Maturing the Environment

As security organizations have more access to technologies that allow them greater insight, analysis, intelligence and forecasting capabilities, the focus now sharpens on how to formally leverage these technologies to show results for the investments made.

Topic #2: Biometric Technologies

There are big implications for security and privacy as this technology emerges, with relevance in user verification, marketing, and personalized advertising, as examples.

Topic #3:  Information Risk Management Programs…Forward Thinking

Cyber security readiness continues to evolve at a rapid pace as changes in the threat landscape forces organizations to be more vigilant than ever before.  In turn, the evaluation and prioritization of risk has taken on more importance to the business in order to make the right decisions. 

Topic #4: Blockchain 

The amazing technology that burst Bitcoin (BTC/BTH) and the newly sustaining Ethereum (ETH/ETC) onto the scene! It is used in financial management services, logistics management, medical records, etc. Can a transaction be securely verified without the identity of the user being captured?

Topic #5: CISOs as the Strongest Link

Relationships and communication with a network of people is key in preparing for a breach.  The CISO often has the best view of their organization’s weaknesses and impacts in case of a breach that allows them to take a leadership role.

Topic #6: GDPR

The regulation will become enforceable on May 25th, 2018

Topic #7: Measuring Security as a Business Value

Quantifying and proving the value of security to your CEO and business units is difficult.

Topic #8: Situational Awareness

Understanding your environment and accurately predicting and responding to potential problems that might occur is what many security leaders are now focused on.

Topic #9: Strategic Vendor Partnerships for the Future

More security organizations have made a commitment to building strategic relationships with vendors in order to leverage their experience and expertise in solving specific challenges.

Topic #10: Forward Thinking Security Organizations

With the introduction of new technologies that allow a business to diversify in ways never contemplated before, security organizations have immense challenges.  In engaging with the business units, security organizations face the dilemma of not only having to understand where the business is headed into the future, but also putting together content that is relevant to help them in their decision making and providing insight into accountability and impacts.

Topic #11: Security Awareness Investment…is it Worth it?

Increased spending on security awareness training for employees is expected to continue at a fast rate in the future.  The question being asked by senior management is often “are our employees getting better at understanding our security posture in protecting our company?”

4:40pm – 4:50pm
Closing Remarks
4:50pm – 6:00pm 

Reception and Networking with Prize Drawings