Northeast IT & Security Leaders 2022 Forum Agenda

As businesses adopt more flexible, hybrid workplaces, one thing is becoming clear: digital employee experience matters now more than ever. But although 90% of C-level execs agree DEX has become more important since the pandemic — and 67% of IT leaders say it’s a critical priority — only 7% of employees are completely satisfied with their digital experiences.

So why is there a divide?

We’ll take an inside look our recent report, The Future of the Digital Workplace, to uncover:

  • The priority DEX is given within different organizations across the globe
  • Divides among C-level, IT leaders, and employees about digital employee experience
  • The impact DEX can have on productivity and business outcomes
  • How and where technology can play a key role in improving DEX

Speaker: David Wilkins, CMO, Lakeside Software

Presented by: Lakeside Software

Threat actors, Red-Teams, and Ransomware have been abusing Active Directory for years. In fact, attackers have compromised or leveraged AD in 100% of the successful ransomware attacks over the last 3 years. This discussion will discuss new technologies to help you visualize the risk in your AD and add a layer of security around this very important part of enterprise infrastructure. 

Speaker: Tom Atkins, Area Vice President, Attivo

Presented by: Attivo Networks

Attivo Networks

Two decades of digital transformation and cloud migration have been slowly eroding the traditional network perimeter and with the past two years of transition to more remote work, the walls have come tumbling down. Privileged credentials from access tools (like VPN and RDP) that have been left on endpoints are a valuable target for attack. SAAS applications and Cloud access further expand the proliferation of potentially exposed identities.  Once an attacker establishes initial access it becomes trivial for lateral attack movement to take control over critical systems or the entire network. The network perimeter is obsolete. Identity is the new perimeter. Organizations must discover, mitigate and protect their identity risks.

Speaker: Wade Lance, Field Chief Technology Officer, Illusive

Presented by: Illusive


Three forces are colliding to create a perfect cyberstorm: An escalated threat level, a cybersecurity talent shortage and the growing complexity that comes with managing a multitude of security solutions. This storm is driving change, forcing us to break down silos between endpoint, workload, network and identity. It’s driving the need to leverage existing tooling rather than bolting on more. And it is reshaping the focus of managed security services away from “busy work” and toward “expert work.” This session will explore a case study of a new type of MDR service from Open Systems. A new approach that offers shelter from the storm.

Speaker: Mike Meltz, Senior Sales Executive, Open Systems

Presented by: Open Systems

Following the success of Isaac Sacolick’s first book, Driving Digital, in this keynote, Isaac will share stories and insights from his new book publishing this summer, Digital Trailblazer:
Essential Lessons to Jumpstart Transformation and Accelerate Your Technology Leadership. Your business needs more transformation leaders – what Isaac calls Digital Trailblazers—who can lead teams, evolve sustainable ways of working, develop technologies as competitive differentiators, and deliver business outcomes. This keynote highlights who are Digital Trailblazers, how to empower them, and what practices they will need to drive digital transformation.

Speaker: Isaac Sacolick, Bestselling Author, Top Social CIO/CDO, Digital Transformation Influencer, Star CIO

In 2021 we’ve seen major changes in the way that cyber-attacks, including ransomware, unfold. While the concerns and challenges are real, there is a framework to assist in enhancing your cyber-resiliency. Join this session to learn about:

  • Recent trends for protecting your organization from malicious attacks
  • Best practices to put your data in a better position mitigate and remediate against ransomware
  • Lessons learned from actual ransomware attacks
  • And more!

Presented by: Veeam


In most markets, there is an abundance of open IT jobs with fewer people able to fill them – and the positions are getting more expensive. Working remotely is the norm, but not optimal (usually). There is less off-shoring and more resources are focused locally or within the same hemisphere.

Additionally, we are still not recruiting enough woman and minorities into the rank and file, especially senior IT roles, and we’re losing talent to major tech hubs.

Join us at the roundtable with your peers as we dive into solutions to tackle the following challenges:

  • How do you scale staff / team without losing them to major tech hubs?
  • How do you create more diversity – not only among race and gender – but diversity of thought – Old vs New Thinking?
  • How do we mentor universities to implement actionable steps for supplying more IT talent?


Helen Knight, Transformation Consultant, Helen Knight Consulting

Diane Huff,  SVP Technology, Triangle Services

Dmitriy Sokolovskiy, CISO, Avid Technologies

Becky Frieden, Senior Director, Enterprise Applications and Decision Support Systems, New York Institute of Technology

Suresh Martha, Associate Director, BI Analytics & Reporting, EMD Serono

Zero Trust has got to be one of the most talked about themes in cyber security.  While the term means different things to different people, there are two things that can be agreed on:  it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started?

Regardless of the sophistication of ransomware, the end goal is always the same:  get in through a vulnerability and move laterally through your network.  Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports 
  • Leveraging tools you already have in place without adding layers of complexity

While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.

Presented by: Illumio


The Digital Transformation Challenge: More Applications, Frequent Deployments, Greater Quality.

Digital transformation in most enterprises is about improving customer and employee experiences, becoming data-driven organizations, creating differentiating capabilities with emerging technologies, and enabling operational efficiencies with automation. The goal is to evolve products, services, operations, and experiences to compete in a digitally-enabled ecosystem where there is potential disruption from startups, market entrants, health, financial, regulatory, and other factors.

Speaker: Chris Young, Director of Technical Services | Host Connectivity, Micro Focus

Presented by: Micro Focus

Understanding the risk that the business endpoints have to face in the modern threat landscape. Prepare, not to panic about the known and unknown real time vulnerabilities.  Recommending a practical approach in securing endpoints through the layered approach strategy.

Key takeaways:

  1. Understand the modern attack trends
  2. Big picture of changing attack surface
  3. Predict and protect your endpoints from attacks
  4. Strategic approach to protect your network endpoints
  5. Getting the threat actor’s perspective of your network endpoints

Speaker: Romanus Prabhu Raymond, Global Head – Technical Support, Unified Endpoint Management and Security, ManageEngine

Presented by: ManageEngine

By 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains (Gartner) which are only becoming increasingly complex due to the changes in how modern software is built. These trends, together with new federal regulations, require organizations to take action to ensure the security and integrity of their software. But this is easier said than done. 

In this session, we’ll explore the software supply chain as an attack vector – by identifying risks and mitigation strategies throughout the software development processes and environment. Join us to learn how you can meet new requirements and protect your software from these attacks.

Speaker: Mic McCully, Field Strategist, Snyk

Presented by: Snyk

Your business is in danger. Be innovative or become irrelevant. This talk will be a fun look at common problems with modern businesses, how to avoid them, and how to thrive.

  • Metaphors to live by
  • Overcoming layer 8 and layer 9 problems (people alignment)
  • Pulling the sled in the same direction (goal alignment)
  • Taking inventory (as-is & to-be of processes, and the gaps between them)
  • Meteor detection, deflection, and mining (conventional and not so conventional (yet sensible) ideas about retooling)
  • New habitats (re-imagining worlds and the enterprises that will thrive there)

Speaker: Mike Bachman, Global Architect & Principal Technologist – Boomi Office of the CTO, Boomi

Presented by: Boomi

You’re a hard-working leader responsible for protecting and improving the backbone of your organization.  It’s a never-ending job that takes energy, vigilance, constant improvement and keeping up with all the latest industry trends.   

But as you’re giving your best to your organization who’s looking out for you?  What about your own personal development? Who can you trust to have no agenda other than your own success? 

This session will be unlike any others in the conference. Using an interactive, fireside chat format you’ll hear about how one tech leader took his life and career to the next level by partnering with both an agent and a coach.  He’ll tell you about his challenges, what the engagements were like, and the results that he got.

A lively Q&A session will follow, and you can see firsthand if getting a personal champion should be your next career move.

Speaker: Robert Field, VP Global Digital Solutions, Precipart

Rick Diana, Talent Agent, Trinitas Talent Management

Pete Cafarchio, Executive Coach, Coach Pete

  • Why API Security is on every CISO’s mind
  • Typical API Security Challenges
  • Best Practices for Tackling API Security
  • The Journey to Building API Security

Speaker: Les Correia, Enterprise Cybersecurity & Risk (ECR) – Global Head of Application Security, Estee Lauder

New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization.  

Join this session and unpack some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.  

This presentation will discuss: 

  • Recent ransomware threat trends, including double extortion and RDP attacks 
  • How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office   
  • Real-world examples of ransomware detected by Darktrace AI – including a zero-day and an attack initiated on Christmas Day

Presented by: Darktrace

With Incident Response as the new normal, ensuring that our systems and processes support that effort and threat hunting are working as expected. We will discuss why and how to establish a Continuous Security Validation (CSV) program within your organization. Specifically, how such a program evolves beyond Breach and Attack Simulation (BAS) and provides teams a continuous feedback loop to understand their posture and identify gaps as they arise.

Speaker: Joseph Mastromarino, Sales Engineer, AtackIQ

Presented by: AttackIQ

Building a compelling business case for digital transformation is a challenge faced by many technology leaders. It becomes even more complicated when the change beneficiaries are not the funders, and the choice to invest in technology feels like it is taking services from our most vulnerable citizens. Helen Knight, an award-winning leader of non-profit digital transformations will share how she modernized emergency shelters and food banks, and how she uses technology to optimize services for people struggling with poverty. Helen will also share ways technology leaders can use their skills to help people today, and invite you to help solve the challenges ahead.

Speaker: Helen Knight, Transformation Consultant, Helen Knight Consulting

Interested in speaking?
Please submit a request below.