SummIT Agenda Recap & Presentations
March 7, 2017
12:00 pm - 1:30 pmNetworking Lunch sponsored by Trend Micro
1:30 pm - 1:45 pmWelcome and Opening Remarks
Jill Billhorn, Vice President, Medium Large East, CDW
Abbie Lundberg, President, Lundberg Media; former Editor in Chief, CIO
Christine Holloway, Vice President of Networking, Digital Workspace & Security Solutions , CDW
1:45 pm - 2:30 pmThe Growing Cyber Security Threat
Robert S. Mueller III, Partner, WilmerHale, Former Director, FBI
Cyber risk is a business risk. We have arrived at a point where there are two types of companies – those that have been hacked and those that will be. Mr. Mueller’s remarks will focus on the evolution of the cyber threat, cyber crime, and how companies can respond. He will draw on lessons from the FBI’s post-9/11 transformation to talk about how company leadership might think about making changes to address the threat.
2:30 pm - 3:15 pmThe Power of Effective Security
Martin Roesch, Vice President and Chief Architect, Cisco Security Business Group
In the digital era, security professionals are in constant pursuit of an effective security posture. At the same time, attackers demonstrate a level of sophistication and innovation that challenges the business’s ability to cope. Moreover, the general demands being placed on today’s IT infrastructure weren’t imagined when the infrastructure was built, which is why too much complexity is one of the biggest challenges facing CSOs, CISOs and IT executives. Simply trying to create a stronger security posture by layering on point products isn’t working – and is instead adding mountains of complexity while organizations aren’t any more secure. To thrive in the digital economy, organizations need a different approach that can increase security capability, while at the same time, decrease complexity. In today’s environment, progressing towards effective security requires a simplified, innovative approach. Join us for this session where we’ll discuss how to improve security effectiveness through an architectural approach to protect -- and grow -- your business.  View the Presentation.
3:15 pm - 3:45 pmNetworking Break
3:45 pm - 4:30 pmBreakout Sessions
Leveraging Artificial Intelligence for Good
Stuart McClure, CEO, Cylance
Join us for this session to learn what artificial intelligence really is, how it applies to today’s cybersecurity and -- more importantly – how it’s used for the betterment of mankind as a whole. View the Presentation.
Is Identity Management the Key to Successful Customer Experience OR Is Customer Experience the Key to Successful Identity Management?
Mark Settle, CIO, Okta
Identity and context determine the information access companies give to empower their work force, manage suppliers, collaborate with partners and establish long term relationships with paying customers. But in a multi-device world that is ‘always on’, IT’s ability to manage the identities of various information consumers -- and provide appropriate access to corporate systems -- is becoming complex, if not borderline impossible. Finding an appropriate balance between security safeguards and ease of access is nonetheless critical to the success of every large enterprise. Join us as we discuss effective solutions that deliver subtle and convenient ways of enlisting information consumers to maintain the accuracy, integrity and resiliency of their identities in their digitally transformed world.  View the Presentation.
Live from the Front Lines: IoT Hacking, Ransomware and Exploits
James Lyne, Global Head of Security Research, Sophos
Join us for this session as we explore the feasibility of managing risk while we hack IoT devices, deconstruct ransomware fails and wins, and bypass security controls. You’ll participate in a security assessment of IoT devices, find bugs, and exploit them to gain insight into the common risks that your organization is facing. And you’ll get an understanding of debugging and reversing, while getting practical tips on managing risk.
Making Architectural Decisions to Disrupt the Economics of Cyber Attacks
Michael Viscuso, CTO, SVP Products, Carbon Black
Shifting the balance of power can make it significantly more difficult and costly for an attacker to target your organization, and can dramatically reduce your risk. To understand why and how cybercrime is so profitable, join us for this session to understand the economics of cybercrime and hear our presenter’s experiences hacking for the NSA and CIA. You’ll learn about architectural changes your organization can make today to disrupt the economic benefits to cybercriminals. Following the session you’ll be equipped to: 1) make millions of dollars as a cyber criminal or 2) save your company millions of dollars by preventing cybercrime. View the Presentation.
4:30 pm - 5:00 pmNetworking Break
5:00 pm - 6:30 pmNetworking Reception in IT Showcase
6:30 pm Evening Event at the DC Spy Museum sponsored by Proofpoint

March 8, 2017
8:00 am - 8:45 amNetworking Breakfast sponsored by Intel Security
8:45 am - 9:00 amWelcome
Abbie Lundberg, President, Lundberg Media; former Editor in Chief, CIO
9:00 am - 9:45 amMoving Your Board from Compliance-Based Decisions to Risk-Based Decisions
Kevin Mandia, CEO and Board Director, FireEye
Now, more than ever, today’s CEOs and boards need to better understand risk so that they can identify and own the risk tolerance of the organization. In the event of a major security breach, does your CEO and board know what data and which applications matter? Which customers and employees matter? Do they understand the critical standards legislation and regulations that apply? Join us for this session as we discuss why and how it’s critical for CEOs and boards to own answers to these questions and more.  View the Presentation.

9:45 am - 10:30 amLessons Learned from 4,000 Security Assessments
Sadik Al-Abdulla, Director of Security Solutions, CDW
If you were given the opportunity to break in to 4,000 networks and study the experience, you’d uncover countless insights for better risk management. So that’s just what CDW did. What did they find? More importantly, what did they learn? And how does this knowledge impact how organizations can better understand their risks? With these 4,000 security assessments, CDW uncovered the common mistakes organizations make, how intruders escalate their attacks to gain control of your most sensitive information, and what you can do differently to deter them. All of this can help organizations move beyond just prevention, and understand how to design a modern framework with an adaptive lifecycle. Join us as CDW shares its findings -- and offers concrete, tactical and strategic guidance on how to better manage risk into the future. View the Presentation.
10:30 am - 10:45 amNetworking Break
10:45 am - 11:30 amManaging Security and Risk in an Increasingly Connected World: A Fireside Chat
Mike Waters, Director of Enterprise Information Security, Booz Allen Hamilton Information Services
Sadik Al-Abdulla, Director of Security Solutions, CDW
Abbie Lundberg, President, Lundberg Media; former Editor in Chief, CIO
The digital economy is built on connections that enable unprecedented new opportunities. But all these new connections -- with trading partners, in platform-based business ecosystems or through connected devices and the internet of things -- create new areas of vulnerability that must be protected. The bad news: the stakes are higher, and the threats are more immediate. The good news: proven techniques to address these vulnerabilities exist today. In this fireside chat, we'll explore the most common mistakes security professionals make and how to fix them; why and how to make security part of everyone's job; smart approaches to risk management; the security staffing crisis, and more.

11:30 am - 11:45 amWrap Up Remarks and Prize Drawings
Abbie Lundberg, President, Lundberg Media; former Editor in Chief, CIO
11:45 am - 1:00 pmNetworking Lunch with Hosted Discussion Tables sponsored by Fortinet
1:00 pm Departures