• slidebg1
    WELCOME TO THE
    ARIZONA Technology Summit
    LARGEST REGIONAL IT & SECURITY
    CONFERENCE IN PHOENIX

    Expand the Frontiers of IT & Security

    Register for the 2018 Summit!
  • slidebg3
    WIN THE DREAM VACATION YOU ALWAYS WANTED
    Attend our Conference to Enter our Grand Prize
    All of our attendees can get the chance to win a free trip & other giveaways!

CONTENT FOR 2018 SUMMIT WILL BE UPDATED SOON- SEE BELOW FOR 2017

Overview

The Arizona Technology Summit will be held at September 12, 2018 at the Pheonix Convention Center in the South Ballroom from 7am-5pm.

 

As we reach the 10th annual show, the Arizona Technology Summit is the top leading IT & Security conference and exhibit hall in the state. Currently, over a thousand attendees, VIPs, and renowned speakers are brought together to network, advocate, and create opportunities for the IT & Security industry. With technology constantly changing, the need to build partnerships within your career is vital. With this year's focus on "Expanding the Frontiers of IT & Security," companies and guests will benefit learning innovative technology methods, discuss industry topics, and make strong connections with those in your region. Further your career with attending the Arizona Technology Summit today! Attend The Arizona Technology Summit to get the right tools and make vital connections to best prepare your company for the broad spectrum of ever-changing technology trends.

 

Sponsors

We would like to thank our all of our sponsors for being a part of this year's Arizona Technology Summit. From being a sponsor, you will be recognized for the education and mission your company contributes to our tradeshow, panels, and sessions. Many of our sponsors have been a part of our annual summit for many years and we are proud to support them. See below for all of the sponsors for the Arizona Technology 2018 event.

 

Platinum Sponsor

https://business.vonage.com/

As leaders in cloud technology since 2001, we're using our strengths and business grade acquisitions to bring innovation to business technology. Our recent acquisition of Nexmo, the Vonage API Platform, has expanded our capabilities even further with the addition of CPaaS. Joining voice, messaging and verify API's with UCaaS enables deeper integration of contextual communications for improved customer experiences. Vonage serves single-person companies to enterprises with thousands of employees spread over multiple locations. With 40+ intuitive phone features, it's business innovation that improves productivity and scales as you grow. But the 600,000+ business users who trust Vonage for their phone solutions agree, Vonage Business is so much more.

Gold Sponsors

http://cstor.com/

cStor helps companies strategize, create, and implement data center solutions that address business needs. Now more than ever, innovative clients know that IT can be a highly-impactful enabler of business transformation, cost reduction, and competitive advantage. cStor's proven capabilities with key data center technologies provides clients with a fresh perspective, the ability to collaborate with recognized data center experts, and the confidence that goals will be met.

https://forescout.com/

ForeScout Technologies, Inc. is transforming security through visibility. ForeScout offers Global 2000 enterprises and government organizations the unique ability to see devices, including non-traditional devices, the instant they connect to the network. Equally important, ForeScout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, ForeScout achieves this without requiring software agents or previous device knowledge. The company’s solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows and enable significant cost savings. 

https://purestorage.com/

Pure Storage, the all-flash enterprise storage company, enables broad deployment of flash in the data center. Compared to traditional disk-centric arrays, Pure Storage all-flash enterprise arrays are 10x faster and 10x more space and power efficient at a price point that is less than performance disk per gigabyte stored. 

Breakfast Sponsors

https://logrhythm.com/

LogRhythm, the leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company's patented and award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint forensics, and advanced security analytics

https://www.twns.com/

Trans-West Network Solutions was established in 1981. We are a total network solutions provider offering best in class products and services. Some products include: Mitel, VMWare,Ruckus Wireless,Fortinet,ProCurve, Oaisys, Enterasys, CloudNet Group and much more. Trans-West believes in a consultative approach working to improve our clients Business Process. Services Include: Installation, Maintenance, Network Design, implementation, free consultations and complete review of current products and services.

Reception Sponsors

https://okta.com/

Okta is the foundation for secure connections between people and technology. Our IT products uniquely use identity information to grant people access to applications on any device at any time, while still enforcing strong security protections. Our platform securely connects companies to their customers and partners. Today, thousands of organizations trust Okta to help them fulfill their missions as quickly as possible.

https://ruckuswireless.com

Ruckus Wireless, now part of Brocade, delivers simply better wireless for approximately 70,000 enterprise, service provider, government and small business customers worldwide. The company is focused on technology innovation, partner ecosystems and customer service—yielding the best possible wireless experience for the most challenging indoor and outdoor environments. Its Smart Wi-Fi platform delivers scalable, high-performance Wi-Fi with simplified control and management for on-premise and cloud-based Wi-Fi deployments, along with new services for secure on-boarding, policy management, location services and analytics that enable new business opportunities.

Silver Sponsors

https://10zig.com/

10ZiG Technology provides cutting-edge Thin and Zero Client end point devices for the latest virtual desktop solutions. Our fast and reliable hardware is VMware, Citrix and Microsoft ready and designed to handle all ranges of usage – from task-based to sophisticated CAD/CAM users.

https://meraki.cisco.com/

Founded in 2006, Meraki has grown to become an industry leader in the IT space, with over 140,000 customers and 2 million network devices and counting online around the world. Our comprehensive set of solutions includes wireless, switching, security, communications, EMM, and security cameras, all managed through Meraki’s web-based dashboard interface.

 

https://www.darktrace.com/

Darktrace is the world’s leading machine learning company for cyber security. Created by mathematicians from the University of Cambridge, the Enterprise Immune System uses AI algorithms to automatically detect and take action against cyber-threats within all types of networks, including physical, cloud and virtualized networks, as well as IoT and industrial control systems. A self-configuring platform, Darktrace requires no prior set-up, identifying advanced threats in real time, including zero-days, insiders and stealthy, silent attackers. Headquartered in San Francisco and Cambridge, UK, Darktrace has 24 offices worldwide.

https://phoenixnap.com/

PhoenixNAP is a leading provider of progressive Infrastructure-as-a-Service solutions spanning bare metal servers, backup & DR, cloud, hardware leasing and colocation options. Our state-of-the-art data centers are inter-connected and worldwide. We empower businesses with industry-leading SLAs, 100% network uptime and 24/7 staff to assist. It’s global IT services made easy!

https://www.vmware.com

VMware, a global leader in cloud infrastructure and digital workspace technology, accelerates digital transformation by enabling unprecedented freedom and flexibility in how our customers build and evolve IT environments. With VMware solutions, organizations are improving business agility by modernizing data centers and integrating public clouds, driving innovation with modern apps, creating exceptional experiences by empowering the digital workspace, and safeguarding customer trust by transforming security.

Presentation Sponsors

https://www.carbonite.com

Carbonite provides data protection solutions for businesses and the IT professionals who serve them. Our product suite provides a full complement of backup, disaster recovery and high availability solutions for any size business in any location around the world, all supported by a state-of-the-art global infrastructure.

https://www.citrix.com/

At Citrix, we measure the value of technology by how it benefits people. It's about what they need to do and what they need to achieve. This vision inspires us to build mobile workspace solutions that give people new ways to work better with seamless and secure access to the apps, files and services they need on any device, wherever they go.

 

https://www.comodo.com/

Comodo, a company that has been built upon the very foundation of trust, believing that every single digital transaction must have a built-in layer of trust and security. Thousands of companies and organizations rely on Comodo's technology to authenticate, validate and secure their most precious asset information and to combat constant malware threats and cyberattacks that are creating havoc on a global scale.

https://www.datacore.com/

DataCore's full-featured, Software-defined storage platform, SANsymphony-V10, shaped by the experiences of 10,000+ customers and ten generations of refinements, maximizes the performance, availability and utilization of diverse storage equipment, current and future. The strategic and novel storage virtualization approach, free from hardware manufacturer biases, sensibly balances business objectives against budget constraints.

http://dcimpro360.com

At DCIMPro360 we like to say that, “DCIM is an endeavor not a product.” We are committed to helping you summit your initiative one peak at a time… With 15 plus years of know-how in the industry and a consultative approach to problem solving, DCIMPro360 has the expertise to help you through any DCIM project.

https://www.exabeam.com/

The Exabeam Security Intelligence Platform provides organizations of all sizes with end-to-end detection, analytics, and response capabilities from a single platform. Exabeam SIP provides unlimited log management at a predictable, cost effective price, leverages UEBA for accurate threat detection, and provides automated security orchestration and playbooks for efficient incident response.

 

http://www.exagrid.com/

ExaGrid offers the only disk-based backup appliance with data deduplication that leverages a unique architecture optimized for performance, scalability and price. ExaGrid is the only solution that combines compute with capacity and a unique landing zone to permanently shorten backup windows, eliminate expensive forklift upgrades, and achieve fast, reliable restores, tape copy and disaster recovery.

https://www.fortinet.com/

Fortinet provides top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric. Our unique security fabric combines purpose-built ASICs, an intuitive operating system, and applied threat intelligence to give you proven security, exceptional performance, and better visibility and control--while providing easier administration.

http://it1.com

iT1 is a Global, Full-Service information technology solution provider headquartered in Scottsdale, Arizona with North American regional office locations in Illinois, Washington D.C., Toronto, and the United Kingdom. It was founded in 2003 with the idea of creating a value-added reseller (VAR) that combines business relationships with in-depth product knowledge to provide industry leading IT services and solutions.

https://www.keyinfo.com

Key Information Systems Inc. is dedicated to being the leading provider of information technology solutions in the Western United States by providing best-of-breed solutions and excellent customer service. We will continue to grow by solving complex technical and business challenges for our clients while providing opportunities for the enrichment of our KeyInfo team.

 

http://www.us.logicalis.com/

At Logcalis we want to be a valuable partner for our customers, we want to provide opportunity for our employees, and contribute to our communities. And, like you, we know that the innovative use of information technology (IT) is one of the best strategies to achieve our business objectives.

http://www.netapp.com

Since our beginning in 1992, NetApp have been delivering technology and product firsts with one goal in mind: the success of our customers. We continually push the boundaries of what’s possible to provide efficient and flexible IT, so our customers’ budgets can go further and business can go faster. We have repeatedly set the industry standard with game-changing innovations that have the power to transform business.

https://nimblestorage.com/

Nimble Storage thinks enterprises shouldn't have to compromise on performance, capacity, ease of use, and price. So they developed the first storage architecture designed from the ground up to seamlessly integrate SSDs with high-capacity disks, all to give you unparalleled performance and capacity efficiency, easier backup/DR, and stress-free operations.

http://pivot3.com/

Pivot3 improves the simplicity and economics of the enterprise datacenter with industry-leading hyperconverged infrastructure technology. By combining storage, compute, and networking on commodity hardware, Pivot3’s software-defined platforms let IT run multiple, mixed application workloads on a single infrastructure while guaranteeing performance to the applications that matter most.

 

https://quorum.net/

Quorum's hybrid cloud data recovery platform virtually eliminates business downtime while drastically reducing data protection cost and complexity. Effortless to deploy and manage, Quorum's industry-leading Disaster Recovery as-a-Service (DRaaS) technology makes it possible for businesses to achieve instant, cost-effective data protection and resume operations within minutes of a server failure - with a single click.

https://risksense.com/

RiskSense is the pioneer and market leader in pro-active cyber risk management. The company enables enterprises and governments to reveal cyber risk, quickly orchestrate remediation, and monitor the results. This is done by unifying and contextualizing internal security intelligence, external threat data, and business criticality across a growing attack surface.

https://www.scalecomputing.com

Scale Computing integrates storage, servers, and virtualization software into an all-in-one appliance based system that is scalable, self-healing and as easy to manage as a single server. The result is a data center solution that reduces operational complexity, allows a faster response to business issues, and dramatically reduces costs.

https://sentinelips.com/

Based in Dallas, Texas, Sentinel IPS began as EcoNet.com, a web development firm founded in 1995. By the early 2000s, the company became a successful network security product reseller and developed its first intrusion prevention system. Sentinel IPS provides 24/7 network management, monitoring and stellar support. Sentinel IPS customers include Fortune 100 firms, government and municipal agencies, financial institutions, and small businesses.

 

https://www.tintri.com/

Tintri VM-aware storage (VAS) is the simplest for virtualized applications and cloud. Organizations including Toyota, United Healthcare, NASA and 7 of the Fortune 15 trust their virtualized applications to Tintri. With VAS they manage only virtual machines, in a fraction of the footprint and at far lower cost than conventional storage.

http://www.zerto.com/

Zerto is committed to keeping enterprise and cloud IT running 24/7 by providing innovative, simple, reliable and scalable business continuity software solutions. Through the Zerto Cloud Continuity Platform, organizations can seamlessly move and protect virtualized workloads between public, private and hybrid clouds. The company's flagship product, Zerto Virtual Replication, has become the standard for protection, recovery and migration of applications in cloud and virtualized data centers, and won numerous awards, including Best of Show at VMworld 2011, Best of VMworld Europe 2014, as well as 2011, 2012 and 2013 Product of the Year Awards for its innovative hypervisor-based replication approach.

2017 Agenda

Synopsis: Are you ready for the cloud, better yet is the cloud ready for you? In this keynote we'll examine some best practices in public cloud adoption, from hybrid to sole sourced, companies like PayPal are well down the road, and others knee-deep into the cloud journey and have some thoughts to share to better ready your organization. Areas we'll discuss include cloud adoption decisions from contract negotiation to container deployed apps, some immediate actions you can take to set your business for success by making informed and risk-based decisions. We'll dive into some key architectural elements, design considerations and security controls that should be top of mind with any evaluation of cloud adoption and deployment planning.

Johnson's Bio: Brian Johnson leads Information Security Platforms and Operations teams at PayPal, with tireless focus on maintaining customer trust while ensuring the security of more than $1B USD in transactions processed each day through globally deployed critical payment and corporate applications, data, and systems. Brian builds on over 20 years of experience in enterprise Information Technology across industries including Software, Government, eCommerce, Fintech and Financial Services. Known as an innovative, strategic thinker, Brian has a firm grasp of business-aligned application of technology and a track record of successes through lasting relationships with customers and partners, credibility with executives and boards, and respectful leadership of high performing experts in their craft to solve critical business challenges. He is recognized for his ability to build and lead teams with diverse and deep technical expertise through wonderful successes, along with learnings from some outstanding failures, on portfolios of broadly complex and highly visible initiatives.

Synopsis:

Digital transformation is changing the game for today’s business and has become a top initiative for business and IT leaders. Learn why having a digital transformation strategy for your business is crucial in today’s ever-changing voice technology landscape.

Abbott's Bio: A seasoned executive with more than 30 years of experience in the computing, networking, and business communications industries, Todd Abbott is a customer-focused leader with a keen ability to develop go-to-market strategies, sales models, and channel programs and to drive an execution-focused culture. In his role as Mitel’s Executive Vice President of Global Sales, Todd oversees Mitel’s global sales operations, including cloud and enterprise sales and channel programs.

Synopsis:

The threat from the internet has changed considerably over the last 15 years. What started as attempts to learn more about the way systems worked has now turned into a business and is done for financial gains. See how a SIEM can help detect, respond to and mitigate these attacks.

Rosas's Bio: COMING SOON...

Synopsis:

Managing and extracting value from ever-growing data repositories is a critical success factor for organizations everywhere. But the reality of storage has meant that achieving this goal comes with a high degree of complexity and cost as well as unreliable performance. Fortunately, a new reality of storage has arrived, one that is built around flash instead of disk, and which redefines industry norms around performance, complexity and cost. Imagine buying half the amount of enterprise storage yet getting dramatically more performance coupled with an iPhone-like level of operational simplicity. Pure Storage has delivered this through the industry's most granular and complete data reduction to reduce the amount of storage required, in combination with a unique new storage model called Evergreen Storage. Highlights include: 1) Driving efficiency with deep data reduction for mixed workloads, 2) Upgrading without any disruption or performance degradation, 3) Enabling in-place upgrades with no forklift migrations, 4) Preserving investment with no re-purchasing or increase in out-year maintenance costs.

Ronzio's Bio: Ralph Ronzio serves as the Systems Engineering Leader for the desert mountain territory at Pure Storage, where he leads a team of pre-sales engineers focused on the continued disruption of the storage industry. Previously, Ralph held many technical and leadership positions over his 15+ year career in Technology. Ralph would describe himself as a lover of all things tech and is currently focused on preparing his SE team for the next wave of technology disruption around Artificial intelligence & Machine learning.

Synopsis:

Finding your organization at the center of a data heist used to be the burden of enterprise IT, but in today’s data-centric world, no business is safe. IT security incidents have nearly doubled since 2011, according to PricewaterhouseCoopers, and concern among small and midsize businesses has risen alongside this risk. Join us to learn more about Carbonite’s newest additions to their arsenal – EVault & DoubleTake. We’ll also cover best practices for backing your data and how you can take your defenses to the next level with DRaaS.

Seeley's Bio: COMING SOON...

Synopsis:

iT1 was established in 2003 with the goal of becoming a leading provider of Information Technology products, services, and solutions. iT1 has reached and surpassed that goal by incorporating a relatively simple strategy that many of our contemporaries have missed. What is this simple strategy, you ask? Come find out.

Herrera's Bio: Wil Herrera is the Vice President of Professional Services for iT1 Source. In his 20+ years of experience he has managed IT departments, worked for manufacturers and now manages a team highly qualified engineers. Wil has certifications that range from Architecture/design to implementation engineer for many of the major Data Center Solutions companies a like Cisco, EMC, HP and VMWARE to name a few.

Schoepfle's Bio: Coming soon...

Synopsis:

Security is always top of mind among IT professionals responsible for the security of their organizations. It’s critical that they ask themselves if they are prepared to face the threats. Join the session and find out what to do to implement the right strategies for defense.

Malacko's Bio: Jason Malacko manages the security practice at Logicalis where he is responsible for security technical architecture and enablement. He is a certified information system security professional (CISSP) who combines two decades of experience in network and systems infrastructure engineering with an extensive background in information security and unified IP networks.

Synopsis:

In a world where cybercrime has become commoditized and both large corporations and small businesses find themselves frequently beset by malware, being able to thread security devices together to assemble an overall picture of what’s transpiring on your network will reduce your attack surface and response times while elevating your overall security posture. Key Takeaways: Learn about malware pathways and how to mitigate them, understand what technologies exist to examine the data streams entering and leaving your network, and see how various technologies working in concert can elevate your overall security posture.

Graun's Bio: Jason Graun is a Systems Engineering Manager and a member of the Office of the CTO. He has been with Fortinet since 2011. Jason has supported Fortinet’s largest carrier and MSSP customers as a Consulting Security Engineer. He brings nearly 20years of experience in IT having worked for a large international bank and several startups along the way. Jason’s focus is solving the problem of how to automate security to bridge the gap between cyberattacks and the needs of business drivers.

Synopsis:

Zerto - the leader in hypervisor-based replication for Business Continuance/Disaster Recovery. Only Zerto Virtual Replication provides orchestration and automation of the entire recovery process regardless of underlying storage, hypervisor or cloud platform, which greatly reduces infrastructure and management costs. We provide our customers with RPO’s of seconds and RTO’s of minutes for their critical applications that require continuous availability and help to maintain HIPAA, PCI, SOX Compliancy.

Feinglass's Bio: Nearly 17 years in Solution Engineering for Managed Hosting, Data Center, Business Continuity and Disaster Recovery services. Outstanding record of achievement assisting sales staff in meeting and exceeding quota attainment at Comdisco, SunGard and Latisys. 20 years in the IT industry overall, from Help Desk and Network Field Engineer to Systems Administrator, Voice and Data Network Manager, to Sales Support and Solution Engineering. Four plus years as a manager of a Solutions Engineering team for a National provider of Managed Services, Managed Hosting, Cloud and Data Center Services.

Synopsis:

This roundtable is for executives with VIP badges ONLY. This year we will discuss the topic of The Balance of Business in Technology & Security hovering around the big question; Are we going too far and not taking into account the business goals?. This session is intended for audience participation so be ready to discuss, receive valuable information, and connect with others for further discussion.

Hennessy's Bio: Joe Hennessy has 21 years in Information Technology, Business Operations and systems integrations development, with 11 of this in senior management. Currently he is the Systems and Technology Director for RideNow Powersports Management Group in Tempe AZ, the largest owner and operator of powersports dealerships in the USA and is considered to be one of the best run operations by industry leaders. Hennessy's latest achievements all revolve around finding ways to reduce operating costs of the I.T. department and all supporting systems while maintaining, and in many cases improving, customer satisfaction.

Synopsis:

Disrupting the cyber attack chain is critical for organization’s looking to address external hacking, insider threats and hidden threats. In this session we will discuss cyber attack chain disruption to address the new vulnerability, privilege.

Schmitt's Bio: Global head of Enablement and Sales Engineering for BeyondTrust with nearly 20 years of security, identity and access management experience including RSA and Quest Software.

Synopsis:

For hyperconverged infrastructure (or HCI), the importance of efficiency cannot be overstated. A hyperconverged vendor (or Cloud vendor, or converged vendor) is responsible for all of the architectural decisions that his customers would have made for themselves in the past. Learn how Scale Computing has developed an architecture that truly integrates servers, storage, and hypervisor from the bottom up including a uniquely simple, cluster-wide, tiered, hybrid storage pool. Turn your infrastructure to 11 with Scale!

McPhail's Bio: Matt McPhail is an IT, Storage, and Virtualization specialist, having worked as an Infrastructure Architect to build proven solutions for the past fifteen years. He currently serves in a leadership role as the Global Director of Systems Engineering at Scale Computing where his team assists clients with storage, IT, and virtualization needs across the globe.

Synopsis:

The rate of change is progressing faster than ever. An information technology lifecycle used to be measured in decades and years. Today is seems like the cycle is changing by the moment. How do we keep up? How do you make the right decisions for your organization while balancing new technologies vs. the efficient life cycle of your existing environment? Cloud Computing offers great promise and yet it also creates confusion and hesitation. In this session, you will hear from AZ-based industry thought leader, Steve Greenberg of TCC, as he provides a new insight into the state of IT. Themes include Rapid Acceleration, Proprietary becoming Commodity, Hardware becoming Software, Storage becoming Flash, and, how to leverage Cloud approaches within your own data center. You will also hear from Chris Murray, IT Director of Arizona Tile about how he has been able to transform his Data Center and the technologies he deployed.

Greenberg's Bio: Steve Greenberg is the founder of Thin Client Computing LLC, a leading Virtual Data Center consulting group based in Scottsdale, AZ (since 1997). Mr. Greenberg is an internationally recognized expert, industry speaker and pioneer in advanced Virtualization solutions and Business Transformation. Reference Clients include American Express, Cox Communications, Mayo Clinic, ASU and Scottsdale Community College.

Synopsis:

The term 'Threat Intelligence' is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network's defenses at the perimeter and allows administrators to gain more visibility on the inside.

Gruenloh's Bio: Ted has worked with web and network security technologies for more than 15 years. He began his career in technology as a full-stack engineer in web development and design. As Director of Operations, Ted guides the overall development of Sentinel IPS, the CINS Active Threat Intelligence System, and all other supporting technologies. You may also find him presenting at a trade show or information security conference, spreading the word about shared threat intelligence.

Synopsis:

How does your enterprise fit into the "big picture" of cyber security? What role does hacktivism, cyber crime, cyber espionage, and cyber war play in your threat profile? In this lecture, Dr. Kenneth Geers will explore all of these concepts and more. He will share his experience and insight from over 20 years in the U.S. Government, at NSA (on offense), NCIS (defense), and NATO (special teams). Further, Dr. Geers will analyze over a billion network security incidents detected by Comodo over the past year, from every country on Planet Earth, and discuss strategic trends in the cyber security landscape. Finally, Kenneth will field your questions on topics ranging from Alan Turing to Edward Snowden, the Cuckoo’s Egg to Stuxnet, and Washington to Beijing.

Geers's Bio: Kenneth Geers (PhD, CISSP) is a Comodo Senior Research Scientist based in Toronto, Canada. Dr. Geers is also a NATO Cooperative Cyber Defence Centre of Excellence (CCD COE) Ambassador, a Non-Resident Senior Fellow at Atlantic Council, an Affiliate with the Digital Society Institute-Berlin, a member of the Transatlantic Cyber Forum, and a Visiting Professor at Taras Shevchenko National University of Kyiv in Ukraine. Kenneth spent 20 years in the U.S. Government, with time in the U.S. Army, at NSA, NCIS, and NATO. He is the author “Strategic Cyber Security”, Editor of “Cyber War in Perspective: Russian Aggression against Ukraine”, Editor of “The Virtual Battlefield: Perspectives on Cyber Warfare”, Technical Expert to the “Tallinn Manual”, and author of many articles and chapters on cyber security. Follow him on Twitter: @KennethGeers.

Synopsis:

Learn about how different methods of deduplication affect the performance of your backups and restores. As the data center continues to evolve leading backup software is bringing innovative features to virtualized environments. Certain architectures can help take advantage of these features without penalizing you with rehydration for deduplicated data. We will review how different methods can affect all aspects of your backup environment and explore which architectures can bring the best of both worlds.

Jung's Bio: Kyle Jung, Senior Systems Engineer at ExaGrid, has been providing technical support and training for almost 20 years. Prior to joining ExaGrid, Kyle worked at Intel as a technical marketing engineer and at EVault where he held a variety of roles including professional services trainer, training manager and sales engineer. Kyle holds a degree in computer science from California Polytechnic State University-San Luis Obispo

Synopsis: Digital transformation is all about creating new possibilities for your business. IT MUST shift its security capabilities in today’s high-speed, mobile-centric, digitally-enabled world. Solid security is not an option, it’s an essential, non-negotiable core capability. Yet, the reality of security architecture and security technology is that they are only as effective as the human-led system design, and the culture we develop in both IT AND the business.

Smith's Bio: Heman’s mission with VMware’s Advisory Services is helping clients clearly determine strategic focus, and then execute on their new Digital Transformation vision and goals. He works with customers to bring clarity and definition to their ideal IT model, and their execution strategies. He specializes in the challenges and changes needed in IT organizations and operations in today’s high-speed, digital business world. Heman has over 30 years of experience in business, IT and technology. Prior to joining VMware he was CEO of CayenneTech, a consulting firm for companies launching a CMDB initiative. Before leaving to found CayenneTech, Heman was the Director of Global IT and Data Center Operations for Altiris, leading a strategic initiative to adopt ITIL processes, and consolidate 17 corporate IT facilities into 4 global data centers. Heman has also led IT applications development teams, CRM initiatives and eServices programs for both Altiris, and Legato Systems. He owned his own reseller company from 1986 to 1996.

Synopsis:

We’re at a moment of incredible acceleration and transformation in business. What can we do to meet the needs of business, regardless of size, with more features and functionality than traditional systems – with more flexibility and efficiency, while making the experience for the customer better than ever?

Costantino's Bio: Michael Costantino serves as the Regional VP of Sales, leading Vonage Business’ sales teams in the Southwest, including Arizona and Texas. Michael is responsible for leading his teams to educate businesses on the value of moving their business communications to the cloud. In his role, Michael provides consultation on how businesses can improve their workforce mobility and productivity with the latest IT solutions.

Synopsis:

Hyper converged is one of the leading new data center architectures. How are vendors empowering the IT and end-users by correlating more information to simplify the application experience? From provisioning to trouble shooting to scaling – what does the future look like.

Croxford's Bio: Zach Croxford is a Senior Systems Engineer at Tintri where he educates customers and prospects on the benefits of enterprise cloud storage, automation/orchestration, and predictive analytics. Zach brings over 20 years of experience in IT having worked for consulting firms, large financial institutions, and an Arizona based general contractor.

Synopsis:

When applications slow down, you’ve hit the app-data gap. Faster storage alone isn’t enough, because 54% of issues aren’t directly caused by storage. Attend our session to find out how to close the app-data gap. The Nimble Storage Predictive Cloud Platform leverages flash storage and the power of predictive analytics to deliver fast and reliable access to data. This approach closes the app-data gap and radically simplifies operations. InfoSightTM Predictive Analytics predict and prevent issues to help deliver greater than 99.9999% measured availability. Utilize a single multicloud architecture to flexibly deploy workloads on flash arrays, converged infrastructure, and the public cloud.

Sliney's Bio: Patrick Sliney is a Storage Architect for Nimble Storage. Sliney has over 19 years of storage and system integration experience, beginning in encryption and networking with the United States Air Force, then moving to primary storage and data protection. Today, Sliney's expertise focuses on designing highly efficient enterprise data storage management architectures, optimizing around performance, cost and capacity. This includes deep data analytics that run the full stack of storage, hypervisor, and application. His specialty is in understanding what drives the client’s business, and designing an efficient solution that includes the appropriate levels of application latency, reliability and data protection in order to build a foundation for highly efficient data centers and private cloud architectures. He can be followed @pjsliney

Synopsis:

Explore the many parallels between Game of Thrones and modern cybersecurity and use them to teach valuable lessons for today’s security practitioners. From the White Walkers to the Wall, Orion will explain security via everyone’s favorite Westerossian characters. Parts of this presentation have also been featured in a series Orion wrote for Dark Reading.

Cassetto's Bio: Orion Cassetto, Sr. Product Marketing Manager at Exabeam, has nearly a decade of experience marketing cybersecurity products. Prior to Exabeam, Orion worked for other notable security vendors including Imperva, Incapsula, Distil Networks, and Armorize Technologies. He is a security enthusiast and frequent speaker at conferences and tradeshows, with recent speaking engagements including SXSW interactive and Joomla World Conference.

Synopsis:

The lure behind backing up directly to the cloud is simple: cost effective, pay as you go and grow, intuitive dashboard and controls, and no hardware. All of these eye catching pro’s could lead you to forget the most important con when relying solely on backing up to the cloud….RECOVERY. This webinar will show you how to make the right cloud backup decision based on real life scenarios.

Snook's Bio: A lifelong learner and passionate IT problem solver, Jason grew up along the ‘not-so-sunny’ coast of Oregon and proud to be a native Oregonian. After chasing dreams in the Air Force he found a passion for technology and problem solving that lead him from coast to coast. 20 years later he’s happy to call Oregon home once again. Jason’s desire to excel in Information Technology began as a young system administrator working towards replacing IBM mainframes with the new and very ‘reliable’ Windows systems. 15 years later he found himself with a background that started in Systems ...led him towards Network Engineering …then onto Security …and finally back to Systems. He has had the joy of leading and guiding an IT Department and working with customers as a solution provider. He’s proud to say his background in Information Technology is broad and he’s always looking for the next technical challenge. Jason resides in Eugene Oregon and is the ‘cool dad’ of two busy-bodied young boys. He spends free time teaching boys to be boys, riding and racing mountain bikes, and organizing bike events that bring the everyday riders together.

Synopsis:

This discussion will incorporate why go, where is the struggle, lessons learned, and what to rethink after going into the cloud. This roundtable is for executives with VIP badges ONLY. Brian Johnson will introduce and begin discussion on the above topics. This session is intended for audience participation so be ready to discuss, receive valuable information, and connect with others for further discussion.

Johnson's Bio: Brian Johnson leads Information Security Platforms and Operations teams at PayPal, with tireless focus on maintaining customer trust while ensuring the security of more than $1B USD in transactions processed each day through globally deployed critical payment and corporate applications, data, and systems. Brian builds on over 20 years of experience in enterprise Information Technology across industries including Software, Government, eCommerce, Fintech and Financial Services. Known as an innovative, strategic thinker, Brian has a firm grasp of business-aligned application of technology and a track record of successes through lasting relationships with customers and partners, credibility with executives and boards, and respectful leadership of high performing experts in their craft to solve critical business challenges. He is recognized for his ability to build and lead teams with diverse and deep technical expertise through wonderful successes, along with learnings from some outstanding failures, on portfolios of broadly complex and highly visible initiatives.

Synopsis:

Enterprise IoT devices are projected to more than triple in the next five years. This presentation will share key findings from ForeScout’s IoT Enterprise Risk Report, show how some of the enterprise IoT devices can hacked and explain what security professionals need to understand about their vulnerabilities.

Underwood's Bio: Pete Underwood has been in the Information Technology field for over 20 years, working in both the commercial and public sector. For the past seven years, Pete’s focus has been on IT Security, with a specialization in access controls. He has designed and deployed large scale access control initiatives for several Fortune 500 companies and public sector agencies. Pete spent the first 16 years of his career on the customer side, primarily in the healthcare industry. Prior to joining the ForeScout team in October of 2016, Pete held solution consultant and sales engineering positions at Juniper Networks and Kudelski Security.

Synopsis:

Today’s organizations need to innovate and be more agile than ever before, and it’s up to IT to provide a portfolio of cloud like services to meet these new business demands. That is a complex and costly proposition to IT - all the while supporting the traditional data center - leaving executives to question: Why can’t our virtualization team alone provision and deploy resources as needed? What would I need to roll out my own service portal – safely? What is DevOps and are there business advantages to DevOps adoption? Attend our session to learn the answers and how NetApp SolidFire’s all-flash storage can enable your cloud services.

Ballin's Bio: COMING SOON...

Synopsis:

Join us for a discussion that might scare you a bit. We’ll discuss the greatest threat to our corporate data and users…mobility. But we all know that being mobile is no longer an option so…what do we do as IT professionals to have both?

Tokeshi's Bio: Roy A. Tokeshi or "rat" became fascinated with technology beginning with his family's first Pong game and continued with programming his "Big Trak" electronic vehicle. His college years included a long and deeply tragic love triangle with his IBM PCjr and Fortran. He began working with a Citrix partner in the '90s converting NT 3.51 based Citrix WinFrame to MetaFrame and continued working with the nascent cloud or application service provider (ASP) industry. Since then he has fallen for cloud infrastructure, IoT, node.js, and Kali Linux on the Raspberry Pi 3 and Chromebooks. You can find him in Phoenix getting beaten in chess by his six kids..

Synopsis:

Learning Objectives: 1) Identify the most logical path to DCIM implementation through the DCIM Maturation Model, 2) Learn about the elements of a successful DCIM strategy and game plan, 3) Accurately assess DCIM offerings and vendor solutions through objective measurements, questions and metrics that are in alignment with your requirements, and 4) Analyze successful DCIM methodologies to help avoid common pitfalls and mistakes in current and new DCIM implementation.

James's Bio: Chris is an innovative consultant with a 25 plus year track record in Data Center Technologies consulting on new builds, upgrades and retrofits. Chris has helped numerous Fortune 1000 companies as well as SMBs, Post and Broadcast organizations to navigate the complex design and decision-making process regarding best DCIM (Data Center Infrastructure Management) practices.

Synopsis:

Patch and read your logs: a two-step method to limit organization exposure to threats of all kinds. To avoid exposure and improve security posture, organizations must put efforts to find the vulnerabilities, understand the attack susceptibility, patch quickly, and read logs to see if anyone has tried to exploit them.

Quist's Bio: COMING SOON...

Synopsis:

Hyper-converged infrastructure has a spotlight shining brightly on it. Expectations are high, but what about the performance? Has the performance been able to keep up with the expectations? Come to the Pivot3 session and learn what hyper-converged is supposed to do.

Atwood's Bio: Kyle Atwood is a Storage Architect at HP. Specializing in designing, and deploying SAN in existing or new IT environments. Based in Phoenix Arizona, Mr. Atwood takes control over the processes, and deployments in the South West corner of the USA. Prior to HP/LHN Mr. Atwood, was the SE for strategic alliances at Asigra. oversaw and managed the communication between alliances and Asigra world wide. In this capacity, he is able to align hardware and software alliances to provide the desired outcome. Making business solutions that are profitable by all who are involved. Prior to Asigra, Mr. Atwood was the Storage Product Manager for MPC corp. In that capacity, Mr. Atwood was responsible for the development, planning, launch, and management of all data storage related items. Having successfully launched many products, Mr. Atwood was also responsible, then, for the education and presentation of the products to Account Executives, C level management, and end user alike. Presentation and education have been a focus point in his career. Continuously finding that the S in SE should be Sales, Mr. Atwood know how to make technology sales to any level. Technical System/Sales Engineering is his passion and specialty.

Synopsis:

Discussions, sessions, exhibits, networking, connecting. After a long day of learning and hearing let’s all come together and get the event highlights. Let’s discuss what we learned, debate, get clarification from the Governing Body on questions that weren't answered, and leave with a charge/purpose/ideas to take into your work.

Mapp's Bio: Mr. Mapp has more than 40 years of experience in the areas of information technology systems, applications, infrastructure support, customer support and consulting services. During that time he has held senior executive-level positions with companies such as IBM, InfoSpan and American Express as well as the position of Chief Information Officer for Honeywell and Advanced Micro Devices (AMD). In addition, Mr. Mapp served as CEO and President of the World Congress on Information Technology, a forum that is held every two years under the direction of the World Information Technology Services Alliance. He currently operates his own consulting company, Quality Service Solutions, providing various business and information technology services and assisting companies with their IT strategy. Fred has extensive experience developing and defining IT objectives and strategic plans and in the implementation of technology to support business requirements. He also has a strong background in outsourcing, data center efficiency, project and process management, six sigma and quality deployment. Fred has written white papers and articles on topics such as data center build versus by, the need of collaboration between business functions and cloud computing.

Synopsis:

EXABYTE SCALE. FAST. SECURE. 12 NINES OF AVAILABILITY. Unstructured data is exploding at an exponential rate and is the lifeblood of every organization. In this discussion, we’ll explore how to store and share that data, at enormous scale, in a highly-secure, astonishingly reliable architecture using the Panzura scale-out file platform in conjunction with IBM’s Cloud Object Storage architecture. We’ll further explore accomplishing those objectives in a private cloud model with lightning-fast local accessibility. Come learn from the teams who have been the boots on the ground developing and implementing these solutions – and what’s coming next!

Morin's Bio: Lief Morin is KeyInfo’s founder and chief executive. His role is to ensure KeyInfo retains its technological leadership and remains focused on client satisfaction. Lief founded KeyInfo™ in 1999 and leads by example, helping KeyInfo receive recognition and numerous awards for their work as a leading value added reseller, managed services provider, and technology integrator. In 2004, Lief was recognized by the San Fernando Valley Business Journal’s “40 Under 40” list. Lief resides in Southern California and enjoys photography and martial arts.

Weise's Bio: Clayton Weise is the Director of Cloud Services at Key Information Systems, where he is responsible for designing, architecting, and implementing cloud solutions, managing production workloads, and using cloud resources in disaster recovery, clustering and hybrid (cloud and on-premise) infrastructure solutions.

Polf's Bio: Michele is a Global Cloud Solution Architect with IBM Cloud Object Storage. She has over 20 years of experience with systems architecture and implementation of global storage solutions for Fortune 100 customers. She has been with IBM Cloud Object Storage and previously Cleversafe for over 3 years providing cloud solutions for IBM COS’s largest and most strategic clients.

Harr's Bio: With more than two decades of industry experience, Harr joins the company after holding positions as vice president and general manager at Hewlett-Packard Enterprise (HPE), vice president at VMWare as well as a go-to-market leader and CEO of multiple start-ups, including cloud storage pioneer Nirvanix which he founded, Preventsys which was acquired by McAfee and storage networking leader Sanera which was acquired by McDATA/Brocade. While at HPE, Harr scaled the Americas cloud business 19X leveraging key GTM partners and generated over $1.5B in revenue in five years. He has extensive startup and Fortune 500 vendor experience across cloud, storage, security and networking. Harr received his MBA from the University of Maryland and a BA from Tulane University in Political Economy and Russian. He has four kids and lives with his wife and family in Los Gatos, CA.

Synopsis:

COMING SOON...

Thomsen's Bio: With less than 10% of companies, globally, fully hosted in the cloud (UCaaS), the potential for the industry is unlimited, and I want to be part of that growth. Attitude determines altitude and I have the expertise and drive to change a company’s revenue growth, almost immediately. With me, a company can expect an instant offense and uptick in energy. Highlights of my career: Promoted six times in six years at iCore to increasingly challenging positions with an increase in earnings every year, Developed and promoted 30+ individuals to management/NAKA positions during my time at iCore; groomed one from an entry-level representative to a director in three years, Established offices in New York and Philadelphia for iCore, recruited and hired staff, and grew sales from zero to $10 million in less than 12 months, Turned around an under-performing team in Baltimore and, in three weeks, increased the average sales per representative from $12,500 to $132,000, and played a critical role in positioning iCore for a $92 million sale. My energy and enthusiasm enable me to outwork and outperform both internal and external competition and my product knowledge and sales skills have helped me become an elite sales professional.

Cash Bar: One (1) Complimentary Drink Voucher to the first 200 attendees available at the Registration Counters. Vouchers will be available after 1:00 pm.

Exhibitors

Governing Body Members