Northeast IT & Security Leaders Forum

  • This Event Took Place

    April 07 – 09, 2024

Cyber Defense Strategies for Earlier Detection and Faster Response

Delve into the flaws of the traditional cybersecurity landscape and how a modern SOC should focus on outcome-based services without relying on logs or the cost and complexity of a SIEM

Presented by: Hamlet Khodaverian, VP, Americas, LMNTRIX

Wrangling Sensitive Data Sprawl: How to Shrink Your Data Protection Footprint

The footprint of sensitive data — such as PII, payment details and health information — is growing rapidly in many enterprises. Security officers contend by spreading their resources thinner, an impractical strategy in an era of scarce security talent and tight budgets. Join this interactive session to discuss the primary driver of sensitive data growth, the drawbacks of the common mitigation strategies, and an architectural paradigm shift that stops the sprawl of sensitive data while accelerating access to data for your most important innovators.

Presented by: Aaron Jensen, Senior Manager Solution Engineering & Devops Advisor, Delphix

Generative AI and it's Impact

Generative AI is revolutionizing the way we create content, from text and images to music and videos, by learning from vast datasets to produce new, original works. Its impact extends beyond the arts, influencing fields such as healthcare, where it can generate personalized treatment plans, and technology, by driving innovations in automation and user interfaces. However, this rapid advancement also raises ethical and societal concerns, including issues of copyright, privacy, and the potential for misuse in creating deepfakes or spreading misinformation.

Presented by: Tanweer Surve, Executive Director, Cloud Control Management, Wells Fargo

The 5 Dysfunctions of a Team

In this workshop, we discussed the premise of Patrick Lencioni’s book “The Five Dysfunctions of a Team” and the commitments to build a cohesive team. This is a great tool for leaders and managers looking to make their teams more effective. This is the perfect starting place for anyone looking to overcome team dysfunction and realize their potential. Simplicity is the key. Building a healthy team is not complicated, but it takes discipline and focus.

Presented by: Steve Demeritt, Global Head of IT Service & Delivery, Black & Veatch

Securing the Future: Navigating Technological and Cybersecurity Frontiers in the U.S. Northeast

In an era where technology’s rapid evolution reshapes industries, we present a pivotal workshop designed to address the unique challenges and opportunities at the intersection of innovation, security, and regulation. This workshop comprises three critical segments, each tailored to the primary sectors represented at the forum—financial, SLED (State, Local, and Education), and healthcare—focusing specifically on the U.S. Northeast region.

Presented by: Byron Estrada, Head of Global Cyber Threat Intelligence, Air National Guard

Get Proactive About Security and Protection from Emerging Threats

Too often, organizations are just reacting to vulnerabilities. Fortunately, we have tools that help take a proactive stance with solid intel backed by precise real-time data and actions.

In this session, we will discuss the three steps necessary to respond quickly and effectively to critical and high-severity issues.

  • Visibility – Continually search and collect data on issues that could expose your environment to attacks and exploits originating at your endpoints.
  • Control – Provide effective measures directly to your endpoints, enabling you to take immediate control of emerging issues.
  • Remediation – Leverage relevant and actionable insights based on expert threat research team investigations.

When critical, highly exploitable, or zero-day vulnerabilities emerge, every second counts. We help our customers develop, verify, and test the content and actions to keep their environment safe.

Presented by: Nir Yosha, Director, Technical Account Management, Tanium

The Cybersecurity Pie: Protect, Prevent and Predict

Let’s dive into each slices of this pie to identify various different controls and build a comprehensive cybersecurity program with multiple layers of defense.

Presented by: Nish Majmudar, CISO, Mathematica

IPv6 and Its Impact on Cybersecurity, Emerging Technologies, and the Future of Internet

In the era of AI, IoT, blockchain, and many other emerging technologies, it’s a daily nightmare encountered by organizations from both the public and private sectors, struggling to react to the aftermath of the constant cybersecurity breaches and ransomware attacks.

The situation can only get worse in the coming years when the global IPv6 adoption rate will reach 100% running in parallel with IPv4, effectively doubling the overall attack vectors. Thus, we must change our cybersecurity strategy dramatically now to efficiently secure and effectively defend the global network infrastructure by securely deploying the single stack of IPv6 and turning off IPv4 before the time runs out.

It is high time to adopt and enforce a global IPv6-only policy by disabling IPv4 globally.

Presented by: Charles Sun

Balancing AI With The Indispensable Human Element in Cybersecurity

Artificial Intelligence is a pervasive part of our lives today, and cybersecurity teams and adversaries alike have learned to harness the speed and power of machines to strengthen their capabilities. With machine learning becoming one of the most important tools of defense, leaders must balance the overwhelming speed and accuracy advantage of AI with the need for measured and intuitive interactions with a real-world human element.

Join this session to discuss:

  • What these trends mean for the hands-on practitioner
  • What happens when the velocity of innovation outpaces the capabilities of human intellect
  • The evolving role of automation in the effective practice of securing our digital world

Presented by: Michael Leland, Chief Cybersecurity Evangelist, SentinelOne

Cybersecurity for the AI Revolution

User identities, endpoints, applications, and networks have all turned into attack vectors, expanding the attack surface and elevating business risk.

Point security solutions target an area but often fail to integrate well with others. This leads to a false sense of security, leaving security gaps and exposing organizations to cyber risks and costly remediation efforts.

Join us to:

  • Discover key considerations when building an AI-powered Zero Trust security architecture Learn how best-in-class integrated solutions provide superior security and improve operational efficiencies
  • Hear from our customers on how to future-proof your security investments as threats evolve in the face of AI
  • Watch integration demos showcasing real-life scenarios that empower security teams on how to build robust end-to-end protection

Presented by: Gaurav Ranjit, Senior Customer Success Manager, Okta

How the Technology Leader has Become the Business Leader

Technology leaders are now key players in strategic decision-making processes. Their insights are crucial for identifying new business opportunities, assessing risks, and making informed decisions that balance innovation with sustainability. They play a vital role in developing strategies that capitalize on digital transformation, data analytics, and artificial intelligence to drive growth and efficiency.

Presented by: Stephen Framil, Corporate Global Head of Accessibility, Merck

Steering Organizations in the Age of AI

In today’s fast-paced and ever-evolving business landscape, leaders are faced with the daunting task of navigating the complexities of the digital age. As artificial intelligence continues to reshape industries and redefine the nature of work, leaders must embrace a futurist mindset to drive innovation and success. This presentation will empower leaders to embrace the role of futurist leaders and leverage the potential of AI to propel their organizations forward into the future.

Presented by: Dr. Valarian Couch, Director of InfoSec Ops, Planned Parenthood

Digitalization in the Nonprofit Sector

In social profit, there is often a gap between Leadership vision & the perceived capability of Information Technology to enable mission. Learn from internationally renowned Nonprofit Technology visionary Helen Knight as she presents social service case studies of technology transformations that enabled measurable social improvements.

Key takeaways:

  • Learn how to deliver meaningful change even when facing significant technical debt & budget limitations
  • Learn how your technical & leadership skills can make a positive difference in the nonprofit sector today

Presented by: Helen Knight, Vice President, Information Technology, Legal Aid Alberta