Southeast IT & Security Leaders Forum

  • This Event Took Place

    March 10 – 12, 2024

Cyber Defense Strategies for Earlier Detection and Faster Response

Delve into the flaws of the traditional cybersecurity landscape and how a modern SOC should focus on outcome-based services without relying on logs or the cost and complexity of a SIEM

Presented by: Hamlet Khodaverian, VP, Americas, LMNTRIX

Wrangling Sensitive Data Sprawl: How to Shrink Your Data Protection Footprint

The footprint of sensitive data — such as PII, payment details and health information — is growing rapidly in many enterprises. Security officers contend by spreading their resources thinner, an impractical strategy in an era of scarce security talent and tight budgets. Join this interactive session to discuss the primary driver of sensitive data growth, the drawbacks of the common mitigation strategies, and an architectural paradigm shift that stops the sprawl of sensitive data while accelerating access to data for your most important innovators.

Presented by: Aaron Jensen, Senior Manager Solution Engineering & Devops Advisor, Delphix

Designing and Implementing a 3rd Party Risk Management Program

From vendor selection and due diligence to ongoing monitoring and compliance, this session equips business leaders with practical insights and tools to proactively address and mitigate risks associated with external partnerships, ensuring a secure and resilient operational ecosystem

Presented by: Keith Deininger, VP Enterprise Technology, Truist

Using Realistic Attack Scenarios and Simulations to Validate, Measure, & Optimize Security Controls

Breach and Attack Simulation (BAS) validates cybersecurity controls by safely conducting threat activities, tactics, techniques, and procedures in production environments. BAS provides security teams the ability to test security architecture, people, and processes for continuous assessment of cyber resilience.

This session will demonstrate the core capabilities of a breach and attack simulation platform so you can see a comprehensive and scalable solution for security leaders, regardless of your security posture maturity, to drive your continuous threat exposure management program and support both the technical and business requirements of scoping, discovery, prioritization, validation, and mobilization.

Presented by: Jessica LaBouve, Sales Engineer, Cymulate

The Role of ERP in Security and AI

The ERP is the backbone of most organizations. Software packages from large vendors such as Oracle and SAP are essential for back-end business operations. But how do they fit into emerging technology strategies such as Cloud, AI/ML, Security, and other competitive growth initiatives? Come to this session to learn about the intersection of ERP and emerging technology and ways to find the right allocation of resources between operations and innovation.

Presented by: Eric Helmer, Chief Technology Officer, Rimini Street

Achieving the Benefits of Converged Endpoint Management

Managing endpoint risk and compliance is more challenging today than ever before. Today’s CISOs have to manage risk from many thousands of globally distributed, heterogeneous assets, while also responding to ever increasing audit scrutiny and regulatory compliance requirements.

Join this session, Achieving the Benefits of Converged Endpoint Management, to learn more about how to:

  • Identify & remediate risks that create the greatest exposure.
  • Assess & measure unknown vulnerabilities.
  • Maximize IT budgets and staffing during economic uncertainty.
  • Enhance existing investment in strategic technology vendors.

Presented by: Tim Heichel, Director of Technical Account Management, Tanium

Risk Management in the Era of AI

This session provides a comprehensive exploration of the challenges and opportunities that arise with the integration of Artificial Intelligence (AI) in various industries. We’ll examine the intricacies of managing risks associated with AI technologies, highlighting the potential pitfalls and benefits they bring. By examining real-world examples and case studies, we’ll shed light on the complexities and ethical considerations involved in harnessing AI’s power while mitigating potential risks.

Presented by: Ed Moore, AVP of IT Security – IAM, Carnival Corporation

Unlocking Potential: How Increasing Women's Participation in IT Leads to Better Performing Teams

This session explores the importance of women’s participation in the field of Information Technology (IT) and its positive impact on team performance. The session aims to shed light on the challenges faced by women in the IT industry, identify strategies to increase their participation and discuss the resulting benefits for teams and organizations.

Presented by: Helen Knight, Vice President, Information Technology, Legal Aid Alberta