Agenda

Reception
Sunday, April 28th
Hide Agenda
5:30–7:30PM
eMerge Welcome Reception
Day One
Monday, April 29th
Hide Agenda
9:00-9:50AM
eMerge Americas Opening Keynote
9:50-10:10AM
Seating
10:10-12:30AM
Opening Keynote & General Session


CyxteraCon Ballroom
12:30-2:00PM
CyxteraCon Lunch
2:00-2:30PM

Lessons Learned: Platform Selection in the Hybrid IT Era

Customer Panel
Moderated by Helen Donnelly, SVP, Data Center Services Marketing—Cyxtera

IT leaders share how they choose the best fit platform – enterprise data center, colocation, or cloud - to support their mission critical operations, DevOps and more

Panelists:
Jeff Poole, Director, Platform Engineering—Vivint Smart Home
Tony Frasco, Dir., IT, Cloud & Platform Engineering (Pending)—Exelon

CyxteraCon BallroomDatacenters

It’s a passwordless world, and you are just living in it

Nicole Ibarra, Sales Engineer—Cyxtera

More than 81% of data breaches occur as a result of stolen, weak or compromised credentials. As such, identity proofing and user authentication has continuously challenged organizations to adopt technologies that better establish trust in the identities and actions of those interacting with enterprise applications. In this session, authentication expert Nicole Ibarra discusses the newest forms of user authentication as we move into a world without credentials.

Breakout 1Cyber Security

Using offense-forged technology in defensive use cases

Dave Aitel, Chief Security Technical Officer—Cyxtera

INNUENDO is Cyxtera’s programmable endpoint fabric based on industry-leading offense technology to bring a powerful set of automation and security capabilities to bear for the modern enterprise. INNUENDO has many sophisticated features desired in an offense-focused tool such as stealth, a covert communications channel stack, an automated tool chain, extensibillity, and so on, that are all highly desirable in defensive use cases, particularly when the defender may be contesting with an intrusive adversary for control of an endpoint’s resources. Come learn about INNUENDO and how it can bring a unique set of capabilities to your cyber security arsenal.

Breakout 2Threat Mgmt & Analytics

How to Remove Complexity as a Threat to Security

Expert Panel
Moderated by Leo Taddeo, CISO—Cyxtera

In a world with infinite threats targeting your organization, have you ever considered that complexity in selecting and implementing security solutions, as a threat itself? In this session, industry experts discuss the mounting complexity security professionals face today, offer actionable insight for removing unnecessary complexity that threatens your ability to build a cyber-resilient business.

Panelists:
Robert Esposito—Optiv
Chris Smith, VP, Security Solutions—CenturyLink
Ed Cabrera—Trend Micro

Breakout 3Cyber Security

Exec 1:1s

Cyxtera Meeting Room
2:30-3:00PM

The Fraud Landscape in 2019 & Beyond

Expert Panel
Moderated by Leo Taddeo, CISO—Cyxtera

Cyxtera’s CISO, Leo Taddeo is joined by the Secret Service and the FBI to discuss the most notorious attacks of the last year, provide their prognostications on how fraud will evolve in 2019, and discuss what organizations need to do to safeguard customer accounts from the onslaught.

Panelists:
Greg Naranjo—Secret Service
Jason Mana—FBI
Jon Brickey—Mastercard

CyxteraCon BallroomCyber Security

Security at the Speed of DevOps

Fireside Chat
Holland Barry, SVP On Demand Services—Cyxtera
Scott Ward, Solutions Architect—AWS

Developers and site reliability engineers understand the frustration caused by switching between different on-premise and cloud environments and waiting for connection approvals. Yet, with increasing pressure for speed, agility and security, how are these teams supposed to keep up? In this session, we explore the limitations of traditional network connectivity solutions, which can be compounded by the move to the cloud.
Topics of discussion will include:

  • Way to improve DevOps day-to-day operations productivity and developer experience for complex multi-account public cloud environments
  • Addressing common DevOps security challenges using the zero-trust model
  • Opportunities to reduce security complexity and improve the user experience while saving money and resources.
Breakout 1Cyber Security

Using the Power of Brainspace Analytics to Delve Into Russian Information Operations on Twitter

Dawn-Marie Vaughan, VP Integrated Operations, Cybersecurity & Threat Analytics—Cyxtera

Social media bots and Russian trolls are being used to engage in a worldwide propaganda campaign to manipulate public sentiment on contentious issues. As part of a social media influence research project, learn how Brainspace was used to analyze several large datasets of tweets to gain valuable insight into Twitter-based information operations.

Breakout 2Threat Mgmt & Analytics

Data Center Operations: Innovation and Best Practice

Ben Stewart, SVP, Engineering—Cyxtera & President—AFCOM, Miami-Dade Chapter

Learn how the latest advancements in automation and machine learning can improve efficiency, sustainability and productivity.

Breakout 3Datacenters

Exec 1:1s

Cyxtera Meeting Room
3:00-3:30PM

Proven Strategies for Global Scale, Resiliency and Connectivity

Customer Panel
Moderated by Helen Donnelly SVP, Data Center Services Marketing—Cyxtera

IT execs share how they've designed their data centers to support rapid growth, 24x7 availability and global connectivity

Panelists:
Brian Bosley, Assoc. Dir., DC Ops—Wayfair
Bob Perriera, Dir., Global IT Infrastructure & Cloud Strategy—Marvell Semiconductor
Scott Wallace, Dir., Global Solutions Architecture—Digital Realty

CyxteraCon BallroomDatacenters

The Democratization of Artificial Intelligence

Alejandro Correa, VP of Data Scientists—Cyxtera

We are living the beginning of the democratization of AI. This means that there are a number of tools that are putting AI capabilities in the hands of non-experts. In this session, Cyxtera’s lead data scientist discusses how to implement AI to fight cyber attacks and prevent electronic fraud – before adversaries put them to use for malicious purposes.

Breakout 1Threat Mgmt & Analytics

Digital Transformation, Risk and Disruption

Fireside Chat
Dee Millard, Anti-Fraud Solutions Consultant—Cyxtera
Joaquin Saldana, VP Fraud RIsk Analyst—City National Bank

According to Nielsen, US adults spend 11 hours a day interacting with digital media, and your business needs to follow those eyeballs. However, expanding your internet presence increases the potential for risk exposure. How can your institution balance the need to digitally transform with ensuring a secure customer experience? Dee Millard, one of Cyxtera’s Fraud Prevention Consultants, sits down with industry experts to discuss:

  • Leveraging security to drive new online and mobile banking revenue
  • How to stop threats targeting digital footprint vulnerabilities
  • Staying ahead of technological disruption in the financial industry
Breakout 2Cyber Security

Accelerating the Journey to Zero Trust

Expert Discussion
Moderated by Jason Garbis, VP of Product Management—Cyxtera

In this panel discussion, you’ll hear from security practitioners who have experienced Zero Trust first-hand. They’ll share their ideas, lessons learned, and recommendations. By attending this session, you’ll learn about how Zero Trust has benefited real-world organizations, and get ideas for how your organization can get started on its own journey to Zero Trust.

Panelists:
Aaron Palermo—Optiv
Jason Lau—Corelogic
Josh Kurz—Weight Watchers

Breakout 3Cyber Security

Exec 1:1s

Cyxtera Meeting Room
3:30-4:00PM
CyxteraCon Coffee Break/Exhibit Floor
4:00-4:30PM

The Cyber Mission: to Protect National Prosperity and National Security

Brigadier General Gregory J. Touhill (ret.), CISSP, CISM.—Cyxtera Federal Group

The mission of cyber professionals is to ensure that the cyber environment is safe and secure. Information technology (IT) is at the heart of today’s modern society. In this presentation, retired Air Force Brigadier General Greg Touhill, the US government’s first Chief Information Security Officer and current President of the Cyxtera Federal Group, will discuss the mission and ethos of today’s cyber professional and why the cyber professional is one of the key roles in today’s modern society. In an engaging and provocative presentation General Touhill will discuss topics including the cyber threat environment, cyber workforce development, emerging technologies, and the future of cyber professionals. 

CyxteraCon BallroomCyxtera Federal Group

How to Improve Remote Access without Compromising Data Center Security

Jim Anthony, VP, Sales Engineering, Cybersecurity—Cyxtera

Hear how organizations are simplifying remote access for data center admins and 3rd-party contractors while enforcing zero-trust network security

Breakout 1Datacenters

Can you trust your eyes? Context as the basis for “Zero Trust” systems

Jason Garbis, VP of Product Management—Cyxtera

In a digital world, you can’t trust everything you see. While the digital transformation has created countless benefits for enterprises, it has also made it possible to easily disguise reality, increasing the difficulty and complexity of security. In this session, Cyxtera VP of Products and Co-Chair of the CSA Software Defined Perimeter Working Group discusses shortcomings with current authentication and authorization protocols, requirements for a consistent and effective security model, and portrays a way forward with a dynamic, context-based security solution.

Breakout 2Cyber Security

The Business Case for Colo vs Public Cloud

Expert Panel
Moderated by Holland Barry, SVP On Demand Services—Cyxtera

Hear real-world examples of how OpEx consumption models and lower TCO justified on-demand colocation of connectivity, HCI, and bare metal as a viable alternative to public cloud.

Panelists:
Russell Cozart, Sr. Dir, Prod. Mgmt—CXD, Cyxtera
David Niemeyer, VP, DevOps—Brainspace
Dennis Berlack, CFO—Wave Computing (Pending)

Breakout 3Datacenters

Exec 1:1s

Cyxtera Meeting Room
4:30-5:00PM

Be Afraid. Be Very Afraid. War Stories From The Field.

Chris Day, Chief Cybersecurity Officer—Cyxtera

Come join us discuss real-world stories from our time performing on the offense and defensive side of the industry. Hear insights and thoughts about the future of cyber security in the emerging era of DevSecOps, Internet of Things and 5G and what it means for the modern enterprise.

CyxteraCon BallroomThreat Mgmt & Analytics

Bridging Legacy Applications with Modern Security

Jim Anthony, VP, Sales Engineering, Cybersecurity Service & Delivery: Pre-Sales—Cyxtera

In 2019, financial institutions still rely on legacy applications to deliver core banking services to both B2B and B2C customers. While highly valuable to customers, these applications are not built to resist today’s cyber-attacks because they expose highly sensitive data across networks with significantly less protection than available today. In this session, Cyxtera’s expert will address how legacy applications can be protected using a Zero Trust security model.

Attendees will learn about:

  • Real-life examples on how legacy applications are at risk
  • How to protect existing solutions without a platform overhaul or refactoring code
  • Tactics to reduce operational complexity and scope of audits while simplifying security management
  • MFA, different spins since we are adding the public sector to the mix
Breakout 1Cyber Security

AFCOM Chapter Meeting

Breakout 2Datacenters

Ask the Product Team—CXD/DCS

Q&A
Moderated by Chip Freund, Sr Mgr, Product Marketing—Cyxtera

Q&A with Cyxtera Leadership about global expansion plans, product roadmap, service operations and more

Panelists:
Mitch Fonseca, VP, Product & Data Center Strategy
Jason Lochhead, SVP, R&D
Russell Cozart, Sr. Dir., Prod Mgmt - CXD
Jeff Nord, SVP, Software Operations

Breakout 3Datacenters

Exec 1:1s

Cyxtera Meeting Room
5:00-6:00PM
CyxteraCon Coffee Break/Exhibit Floor
7:00-9:30PM
CyxteraCon After Party

Learn More

Day Two
Tuesday, April 30th
Hide Agenda
9:00-9:50AM
eMerge Americas Opening Keynote
9:50-10:15AM
CyxteraCon Coffee Break
10:15-12:00PM

AppGate Workshop

Breakout 1Cyber Security
10:15-11:00AM

Welcome & Awards Ceremony

Channel Partners

Breakout 3Channel Partners

Exec 1:1s

Cyxtera Meeting Room
10:45AM
Exec 1:1s
Breakout 2
11:00-11:30AM

AppGate Enablement

Channel Partners

Breakout 3Channel Partners
11:30-12:00PM

Monetizing Hybrid IT and HCI trends in 2019

Channel Partners

Breakout 3Channel Partners
12:00-12:30PM
Lunch/Exhibit Floor
12:30-2:00PM

AppGate Workshop

Breakout 1Cyber Security
2:00PM
CyxteraCon End
5:30–7:30PM
eMerge Welcome Reception
9:00-9:50AM
eMerge Americas Opening Keynote
9:50-10:10AM
Seating
10:10-12:30PM
Opening Keynote & General Session
12:30-2:00PM
CyxteraCon Lunch
2:00-2:30PM

Customer Panel
Moderated by Helen Donnelly, SVP, Data Center Services Marketing—Cyxtera

IT leaders share how they choose the best fit platform – enterprise data center, colocation, or cloud - to support their mission critical operations, DevOps and more

Panelists:
Jeff Poole, Director, Platform Engineering—Vivint Smart Home
Tony Frasco, Dir., IT, Cloud & Platform Engineering (Pending)—Exelon

CyxteraCon Ballroom
Datacenters

breakout-room-1cybersecurity

Nicole Ibarra, Sales Engineer—Cyxtera

More than 81% of data breaches occur as a result of stolen, weak or compromised credentials. As such, identity proofing and user authentication has continuously challenged organizations to adopt technologies that better establish trust in the identities and actions of those interacting with enterprise applications. In this session, authentication expert Nicole Ibarra discusses the newest forms of user authentication as we move into a world without credentials.

Breakout 1
Cyber Security

breakout-room-2threatmgmt-analytics

Dave Aitel, Chief Security Technical Officer—Cyxtera

INNUENDO is Cyxtera’s programmable endpoint fabric based on industry-leading offense technology to bring a powerful set of automation and security capabilities to bear for the modern enterprise. INNUENDO has many sophisticated features desired in an offense-focused tool such as stealth, a covert communications channel stack, an automated tool chain, extensibillity, and so on, that are all highly desirable in defensive use cases, particularly when the defender may be contesting with an intrusive adversary for control of an endpoint’s resources. Come learn about INNUENDO and how it can bring a unique set of capabilities to your cyber security arsenal.

Breakout 2
Threat Mgmt & Analytics

breakout-room-3cybersecurity

Expert Panel
Moderated by Leo Taddeo, CISO

In a world with infinite threats targeting your organization, have you ever considered that complexity in selecting and implementing security solutions, as a threat itself? In this session, industry experts discuss the mounting complexity security professionals face today, offer actionable insight for removing unnecessary complexity that threatens your ability to build a cyber-resilient business.

Panelists:
Robert Esposito—Optiv
Chris Smith, VP, Security Solutions—CenturyLink
Ed Cabrera—Trend Micro

Breakout 3
Cyber Security

Executive 1:1s
2:30-3:00PM
ballroomcybersecurity

Expert Panel
Moderated by Leo Taddeo, CISO

Cyxtera’s CISO, Leo Taddeo is joined by the Secret Service and the FBI to discuss the most notorious attacks of the last year, provide their prognostications on how fraud will evolve in 2019, and discuss what organizations need to do to safeguard customer accounts from the onslaught.

Panelists:
Greg Naranjo—Secret Service
Jason Mana—FBI
Jon Brickey—Mastercard

CyxteraCon Ballroom
Cyber Security

breakout-room-1cybersecurity

Fireside Chat
Holland Barry, SVP On Demand Services—Cyxtera
Scott Ward, Solutions Architect—AWS

Developers and site reliability engineers understand the frustration caused by switching between different on-premise and cloud environments and waiting for connection approvals. Yet, with increasing pressure for speed, agility and security, how are these teams supposed to keep up? In this session, we explore the limitations of traditional network connectivity solutions, which can be compounded by the move to the cloud.
Topics of discussion will include:

  • Way to improve DevOps day-to-day operations productivity and developer experience for complex multi-account public cloud environments
  • Addressing common DevOps security challenges using the zero-trust model
  • Opportunities to reduce security complexity and improve the user experience while saving money and resources.

Breakout 1
Cyber Security

breakout-room-2threatmgmt-analytics

Dawn-Marie Vaughan, VP Integrated Operations, Cybersecurity & Threat Analytics—Cyxtera

Social media bots and Russian trolls are being used to engage in a worldwide propaganda campaign to manipulate public sentiment on contentious issues. As part of a social media influence research project, learn how Brainspace was used to analyze several large datasets of tweets to gain valuable insight into Twitter-based information operations.

Breakout 2
Threat Mgmt & Analytics

Ben Stewart, SVP, Engineering—Cyxtera & President—AFCOM, Miami-Dade Chapter

Learn how the latest advancements in automation and machine learning can improve efficiency, sustainability and productivity.

Breakout 3
Datacenters

Executive 1:1s
3:00-3:30PM

Customer Panel
Moderated by Helen Donnelly

IT execs share how they've designed their data centers to support rapid growth, 24x7 availability and global connectivity

Panelists:
Brian Bosley, Assoc. Dir., DC Ops—Wayfair
Bob Perriera, Dir., Global IT Infrastructure & Cloud Strategy—Marvell Semiconductor
Scott Wallace, Dir., Global Solutions Architecture—Digital Realty

CyxteraCon Ballroom
Datacenters

breakout-room-1threatmgmt-analytics

Alejandro Correa, VP of Data Scientists—Cyxtera

We are living the beginning of the democratization of AI. This means that there are a number of tools that are putting AI capabilities in the hands of non-experts. In this session, Cyxtera’s lead data scientist discusses how to implement AI to fight cyber attacks and prevent electronic fraud – before adversaries put them to use for malicious purposes.

Breakout 1
Threat Mgmt & Analytics

breakout-room-2cybersecurity

Fireside Chat
Dee Millard, Anti-Fraud Solutions Consultant—Cyxtera
Joaquin Saldana, VP Fraud RIsk Analyst—City National Bank

According to Nielsen, US adults spend 11 hours a day interacting with digital media, and your business needs to follow those eyeballs. However, expanding your internet presence increases the potential for risk exposure. How can your institution balance the need to digitally transform with ensuring a secure customer experience? Dee Millard, one of Cyxtera’s Fraud Prevention Consultants, sits down with industry experts to discuss:

  • Leveraging security to drive new online and mobile banking revenue
  • How to stop threats targeting digital footprint vulnerabilities
  • Staying ahead of technological disruption in the financial industry

Breakout 2
Cyber Security

breakout-room-3cybersecurity

Expert Discussion
Moderated by Jason Garbis, VP of Product Management—Cyxtera

In this panel discussion, you’ll hear from security practitioners who have experienced Zero Trust first-hand. They’ll share their ideas, lessons learned, and recommendations. By attending this session, you’ll learn about how Zero Trust has benefited real-world organizations, and get ideas for how your organization can get started on its own journey to Zero Trust.

Panelists:
Aaron Palermo—Optiv
Jason Lau—Corelogic
Josh Kurz—Weight Watchers

Breakout 3
Cyber Security

Executive 1:1s
3:30-4:00PM
CyxteraCon Coffee Break/Exhibit Floor
4:00-4:30PM
ballroomcfg

Brigadier General Gregory J. Touhill (ret.), CISSP, CISM.—Cyxtera Federal Group

The mission of cyber professionals is to ensure that the cyber environment is safe and secure. Information technology (IT) is at the heart of today’s modern society. In this presentation, retired Air Force Brigadier General Greg Touhill, the US government’s first Chief Information Security Officer and current President of the Cyxtera Federal Group, will discuss the mission and ethos of today’s cyber professional and why the cyber professional is one of the key roles in today’s modern society. In an engaging and provocative presentation General Touhill will discuss topics including the cyber threat environment, cyber workforce development, emerging technologies, and the future of cyber professionals. 

CyxteraCon Ballroom
Cyxtera Federal Group

Jim Anthony, VP, Sales Engineering, Cybersecurity—Cyxtera

Hear how organizations are simplifying remote access for data center admins and 3rd-party contractors while enforcing zero-trust network security

Breakout 1
Datacenters

breakout-room-2cybersecurity

Jason Garbis, VP of Product Management—Cyxtera

In a digital world, you can’t trust everything you see. While the digital transformation has created countless benefits for enterprises, it has also made it possible to easily disguise reality, increasing the difficulty and complexity of security. In this session, Cyxtera VP of Products and Co-Chair of the CSA Software Defined Perimeter Working Group discusses shortcomings with current authentication and authorization protocols, requirements for a consistent and effective security model, and portrays a way forward with a dynamic, context-based security solution.

Breakout 2
Cyber Security

Expert Panel
Moderated by Holland Barry, SVP On Demand Services—Cyxtera

Hear real-world examples of how OpEx consumption models and lower TCO justified on-demand colocation of connectivity, HCI, and bare metal as a viable alternative to public cloud.

Panelists:
Russell Cozart, Sr. Dir, Prod. Mgmt—CXD, Cyxtera
David Niemeyer, VP, DevOps—Brainspace
Dennis Berlack, CFO—Wave Computing (Pending)

Breakout 3
Datacenters

Executive 1:1s
4:30-5:00PM
ballroomthreatmgmt-analytics

Chris Day, Chief Cybersecurity Officer—Cyxtera

Come join us discuss real-world stories from our time performing on the offense and defensive side of the industry. Hear insights and thoughts about the future of cyber security in the emerging era of DevSecOps, Internet of Things and 5G and what it means for the modern enterprise.

CyxteraCon Ballroom
Threat Mgmt & Analytics

breakout-room-1cybersecurity

Jim Anthony, VP, Sales Engineering, Cybersecurity Service & Delivery: Pre-Sales—Cyxtera

In 2019, financial institutions still rely on legacy applications to deliver core banking services to both B2B and B2C customers. While highly valuable to customers, these applications are not built to resist today’s cyber-attacks because they expose highly sensitive data across networks with significantly less protection than available today. In this session, Cyxtera’s expert will address how legacy applications can be protected using a Zero Trust security model.

Attendees will learn about:

  • Real-life examples on how legacy applications are at risk
  • How to protect existing solutions without a platform overhaul or refactoring code
  • Tactics to reduce operational complexity and scope of audits while simplifying security management
  • MFA, different spins since we are adding the public sector to the mix

Breakout 1
Cyber Security

Breakout 2
Datacenters

Q&A
Moderated by Chip Freund, Sr Mgr, Product Marketing—Cyxtera

Q&A with Cyxtera Leadership about global expansion plans, product roadmap, service operations and more

Panelists:
Mitch Fonseca, VP, Product & Data Center Strategy
Jason Lochhead, SVP, R&D
Russell Cozart, Sr. Dir., Prod Mgmt - CXD
Jeff Nord, SVP, Software Operations

Breakout 3
Datacenters

Executive 1:1s
5:00-6:00PM
CyxteraCon Coffee Break/Exhibit Floor
7:00-9:30PM
CyxteraCon Party
9:00-9:50AM
eMerge Americas Opening Keynote
9:50-10:15AM
CyxteraCon Coffee Break
10:15-12:00PM
AppGate Workshop
breakout-room-1cybersecurity
Executive 1:1s @10:45
breakout-room-2
Channel Partner - Welcome & Awards Ceremony @10:15
breakout-room-3channelpartners
Channel Partner - AppGate Enablement @11:00
breakout-room-3channelpartners
Channel Partner - Monetizing Hybrid IT and HCI trends in 2019 @11:30
breakout-room-3channelpartners
Executive 1:1s
12:00-12:30PM
Lunch/Exhibit Floor
12:30-2:00PM
AppGate Workshop
breakout-room-1cybersecurity
2:00PM
CyxteraCon End
Time Block
Time
Room

Track
Icon

Speaker Name, Title, Sector

Quick summary

agenda-label-venue
agenda-label-track

Event
eMerge
CyxteraCon
Room
breakout-room-1
Breakout 1
CyxteraCon Ballroom
Ballroom
breakout-room-2
Breakout 2
meeting-room
Meeting Room
breakout-room-3
Breakout 3
Tracks and Icons
Data Center
threatmgmt-analytics
Threat Mgmt & Analytics
cybersecurity
Cybersecurity
channelpartners
Channel Partners
cfg
Federal Group
sponsored
Sponsored Content