West IT & Security Leaders Forum

  • This Event Took Place

    May 19 – 21, 2024

Achieving the Benefits of Converged Endpoint Management

Managing endpoint risk and compliance is more challenging today than ever before. Today’s CISOs have to manage risk from many thousands of globally distributed, heterogeneous assets, while also responding to ever increasing audit scrutiny and regulatory compliance requirements.

Join this session, Achieving the Benefits of Converged Endpoint Management, to learn more about how to:

  • Identify & remediate risks that create the greatest exposure.
  • Assess & measure unknown vulnerabilities.
  • Maximize IT budgets and staffing during economic uncertainty.
  • Enhance existing investment in strategic technology vendors.

Presented by: Jake Turner, Solutions Engineering Vice President, Tanium

Predict, Explain, Retain: Better Data Analysis for Better Security Programs

Getting past the hype of AI and ChatGPT, there are huge benefits to practical (and less sexy) applications of AI that can make the lives of security practitioners better. And despite all the buzzwords and overpromises coming from our industry today, there actually are real and meaningful ways AI tools will help security professionals make better risk decisions, faster and more accurately in order to mitigate risk in tangible ways for the business. In this talk, we’ll show some examples of how AI can help predict risk, cut through complexity when making risk decisions and even help to retain senior staff while keeping them focused on the tasks that matter most.

Presented by: Nathan Wenzler, Chief Security Strategist, Tenable

The Evolution of the Technology Leader to Enterprise Strategist

Technology leaders are now key players in strategic decision-making throughout their organizations. Their insights are crucial for identifying new business opportunities, assessing risks, and making informed decisions that balance innovation with sustainability. They play a vital role in developing strategies that capitalize on digital transformation, data analytics, and artificial intelligence to drive growth and efficiency.

Presented by: Shawna DelHierro, Former CTO, Sportsman Warehouse

How to Build a Five Star Data Protection Program

It’s time to get serious about data protection. With breaches on the rise and sensitive data widely distributed across cloud and mobility, organizations need a solid data protection strategy more than ever. But how should you structure your data protection program to ensure you can deliver game-changing security?

Join this engaging session to learn the best strategy for building a five-star data protection program. You’ll get guidance from industry experts on cutting-edge approaches that not only provide airtight protection, but drastically reduce cost and complexity.

This session will cover:

  1. What the best architecture for data protection is
  2. How to gain complete visibility to all your sensitive data
  3. Strategies to secure top uses cases around data in motion and at rest
  4. Data protection best practices

Presented by: Tom Bryant, Sr. Director, Data Protection, Zscaler