• slidebg1
    WELCOME TO THE 10th ANNUAL
    ARIZONA Technology Summit
    LARGEST REGIONAL IT & SECURITY
    CONFERENCE IN PHOENIX

    Innovations in IT & Security

    Register for the 2018 Summit!
  • slidebg3
    WIN THE DREAM VACATION YOU ALWAYS WANTED
    Attend our Conference to Enter our Grand Prize
    All of our attendees can get the chance to win a free trip & other giveaways!

THANKS FOR COMING- SEE YOU IN 2019!

CELEBRATING 10 YEARS

The Arizona Technology Summit will be held at September 12, 2018 at the Phoenix Convention Center in the South Ballroom from 7am-5pm.

 

As we reach the 10th annual show, the Arizona Technology Summit is the top leading IT & Security conference and exhibit hall in the state. Currently, over a thousand attendees, VIPs, and renowned speakers are brought together to network, advocate, and create opportunities for the IT & Security industry. With technology constantly changing, the need to build partnerships within your career is vital. With this year's focus on "Innovations in IT & Security," companies and guests will benefit learning innovative technology methods, discuss industry topics, and make strong connections with those in your region. Further your career with attending the Arizona Technology Summit today! Attend The Arizona Technology Summit to get the right tools and make vital connections to best prepare your company for the broad spectrum of ever-changing technology trends.

 

Sponsors

We would like to thank our all of our sponsors for being a part of this year's Arizona Technology Summit. From being a sponsor, you will be recognized for the education and mission your company contributes to our tradeshow, panels, and sessions. Many of our sponsors have been a part of our annual summit for many years and we are proud to support them. See below for all of the sponsors for the Arizona Technology 2018 event.

Gold Sponsors

http://cstor.com/

cStor helps organizations create, strategize, and implement data center, digital transformation, and cybersecurity solutions that address your evolving business needs and demands of today’s enterprise. Our proven capabilities with best-of-breed technologies provide you the peace of mind that we put you on a path to ensure success.

https://dyn.com/

The Oracle Dyn global business unit (GBU) helps companies build and operate a secure, intelligent cloud edge. Dyn’s solutions are backed by one of the world’s most comprehensive internet performance data sets, collecting more than 200 billion internet data points daily across a global network. More than 3,500 customers rely on Oracle Dyn’s edge services, including preeminent digital brands such as Netflix, Twitter, CNBC and LinkedIn.

https://sailpoint.com/

SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world. SailPoint’s open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments.

Lunch and Learn Sponsors

https://centurylink.com/

CenturyLink is the second largest U.S. communications provider to global enterprise customers. With customers in more than 60 countries and an intense focus on the customer experience, CenturyLink strives to be the world’s best networking company by solving customers’ increased demand for reliable and secure connections. The company also serves as its customers’ trusted partner, helping them manage increased network and IT complexity and providing managed network and cyber security solutions that help protect their business.

https://datacore.com/

DataCore is the authority on real-time data. The company pioneered software-defined storage and is now bringing its technology to hyperconverged and workload optimization. DataCore empowers IT organizations to achieve always-available, high-performance and highly efficient data. Its patented technology eliminates storage bottlenecks with adaptive parallel I/O optimization, enables zero-downtime synchronous mirroring, and provides a true hardware-agnostic architecture — resulting in flexibility, resource efficiencies, and cost savings.

https://keyinfo.com/

Key Information Systems, Inc. is a hybrid infrastructure technology company that simplifies complex technology challenges, for the most advanced networking and hybrid cloud solutions. KeyInfo delivers the industry’s best systems by combining advanced technology services with the industry-leading products and resources.

https://pulsesecure.net/

Put simply, we are the company that is 100% focused on delivering secure access solutions for people, devices, things and services. For years, enterprises of every size and industry have been trusting our integrated virtual private network, network access control and mobile security solutions to enable secure access seamlessly in their organizations. Every single day, our global team are innovating our products to ensure that you can dramatically boost your workers' productivity, make a smooth and secure transition to the Cloud and ensure that your networks are protected without a burden on IT.

https://trustwave.com/

Trustwave helps businesses fight cybercrime, protect data and reduce security risk. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Trustwave enables businesses to transform the way they manage their information security and compliance programs. More than three million businesses are enrolled in the Trustwave TrustKeeper® cloud platform, through which Trustwave delivers automated, efficient and cost-effective threat, vulnerability and compliance management. Trustwave is headquartered in Chicago, with customers in 96 countries.

Silver Sponsors

https://10zig.com/

10ZiG Technology is a world-market leader in Thin Client & Zero Client endpoint devices for Virtual Desktop Infrastructure. 10ZiG provides leading Intel and AMD based Dual and Quad Core Thin Clients and Zero Clients for VMware Blast Extreme & PCoIP, Citrix (HDX, HDX Premium, HDX 3D Pro), and Microsoft environments, in addition to the widest range of Teradici PCoIP Zero Clients on the market. 10ZiG offers free, no-obligation demo devices, Technical Support teams based in the U.S. and Europe, and provides “The 10ZiG Manager” console with Cloud capabilities completely free with unlimited user licenses supported. Free evaluation devices are available at 10ZiG.com.

 

https://secureauth.com/

SecureAuth has over 1,500 customers, 360 employees, and a network of global locations, SecureAuth + Core Security is one of the largest independent cybersecurity technology vendors in the market, protecting more than 150 million identities for companies and entities across financial services, healthcare, retailer, government and other industries.

 

https://vmware.com/

VMware, a global leader in cloud infrastructure and digital workspace technology, accelerates digital transformation by enabling unprecedented freedom and flexibility in how our customers build and evolve IT environments. With VMware solutions, organizations are improving business agility by modernizing data centers and integrating public clouds, driving innovation with modern apps, creating exceptional experiences by empowering the digital workspace, and safeguarding customer trust by transforming security.

 

Presentation Sponsors

https://barkly.com/

Barkly is advancing endpoint security by combining the strongest, smartest protection with the simplest management. Barkly is the only protection with visibility into all levels of the system, including the CPU and stays up-to-date through it’s continuous machine-learning engine that automatically converts threat intelligence into powerful protection through nightly training on malware and customer-specific goodware. Barkly is formed by an elite team of security and SaaS experts from IBM, Cisco and Intel, and is backed by investors NEA and Sigma Prime.

https://cambiumnetworks.com/

Cambium Networks makes it possible for service providers; enterprises; governmental and military agencies; oil, gas and utility companies; Internet service providers; and public safety networks to build powerful communications networks, reach users from 200 kilometers across mountain tops down to the last meter to their devices, and intelligently manage their business Wi-Fi infrastructure through end-to-end network visibility and actionable analytics.

https://darktrace.com/

Darktrace is the world’s leading AI company for cyber security. Created by mathematicians, the Enterprise Immune System uses machine learning and AI algorithms to detect and respond to cyber-threats across diverse digital environments, including cloud and virtualized networks, IoT and industrial control systems. The technology is self-learning and requires no set-up, identifying threats in real time, including zero-days, insiders and stealthy, silent attackers. Darktrace is headquartered in San Francisco and Cambridge, UK, and has over 30 offices worldwide.

 

http://exagrid.com/

ExaGrid's hyper-converged secondary storage for backup offers an integrated and unique landing zone and its scale-out architecture provides the fastest backup - resulting in the shortest fixed backup window, fastest local restores, offsite tape copies and instant VM recoveries while permanently fixing the backup window length, all with reduced cost.

https://extremenetworks.com/

We made a name for ourselves more than 20 years ago offering the most comprehensive, high-performance network access and switching products. Today, our worldwide customers are leveraging the combined power of Extreme to take their networks to the next level. So, if you still think “hardware” when you hear "Extreme," it's time to think again.

https://fortinet.com/

From the start, the Fortinet vision has been to deliver broad, truly integrated, high-performance security across the IT infrastructure. We provide top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric. Our unique security fabric combines Security Processors, an intuitive operating system, and applied threat intelligence to give you proven security, exceptional performance, and better visibility and control--while providing easier administration.

https://hpe.com/

Hewlett Packard Enterprise is a global technology leader focused on developing intelligent solutions that allow customers to capture, analyze and act upon data seamlessly from edge to core to cloud. HPE enables customers to accelerate business outcomes by driving new business models, creating new customer and employee experiences, and increasing operational efficiency today and into the future.

 

 

https://infoblox.com/

Infoblox delivers critical network services that protect Domain Name System (DNS) infrastructure, automate private, public, and hybrid clouds, and increase the reliability of enterprise and service provider networks around the world. As the industry leader in DNS, DHCP, and IP address management—the category known as DDI—Infoblox provides technology that reduces the risk and complexity of networking, lowers operational expense, and increases network and application uptime. Our patented Infoblox Grid™ ensures availability and disaster recovery and provides authoritative data, and our Secure DNS solutions defend internal and external DNS against a wider range of threats than any other product.

 

https://it1.com/

iT1 is a global solution provider established in 2003 and headquartered in Tempe, AZ. Our mission is to enable our clients to achieve their business goals by providing custom engineered technology solutions. iT1’s value-driven services include the design and implementation of customized industry transforming solutions. In partnership with leading manufacturers, we serve over 3,000 active SMB and Enterprise accounts in virtually every industry including healthcare, finance, retail and manufacturing, as well as Federal, state, local and education (SLED) agencies. iT1 aims to help you better serve your customers and set your brand apart in the marketplace.

http://us.logicalis.com/

At Logcalis we want to be a valuable partner for our customers, we want to provide opportunity for our employees, and contribute to our communities. And, like you, we know that the innovative use of information technology (IT) is one of the best strategies to achieve our business objectives.

https://malwarebytes.com/

Malwarebytes is the most trusted endpoint security company in the world. Malwarebytes proactively protects people and businesses against malicious threats, including ransomware, that traditional antivirus solutions miss. The company's flagship product uses signature-less technologies to detect and stop a cyberattack before damage occurs.

https://mist.com/

Mist built the first AI-driven wireless platform with the world’s first virtual IT assistant. The Mist Learning Wireless LAN makes Wi-Fi predictable, reliable and measurable by providing unprecedented visibility into the user experience and by replacing time consuming manual IT tasks with proactive automation. All operations are managed via Mist’s modern cloud architecture for maximum scalability, agility and performance.

http://okta.com

Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security protections. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications.

 

https://ruckuswireless.com/

Ruckus Networks, an ARRIS company, is redefining connectivity around the globe. With our partners, we build secure wired and wireless access networks for organizations that place a premium on connectivity experiences for end-users as well as simplicity and lower-cost-per-connection for IT.

https://scalecomputing.com

Scale Computing is the industry leader in complete hyperconverged solutions with thousands of deployments spanning from the SMB to the distributed enterprise. Driven by patented technologies, HC3 systems install in minutes, can be expanded without downtime, self-heal from failures, and automatically optimize workloads to maximize price-performance.

https://sentinelips.com/

Based in Dallas, Texas, Sentinel IPS began as EcoNet.com, a web development firm founded in 1995. By the early 2000s, the company became a successful network security product reseller and developed its first intrusion prevention system. Sentinel IPS provides 24/7 network management, monitoring and stellar support. Sentinel IPS customers include Fortune 100 firms, government and municipal agencies, financial institutions, and small businesses.

https://pacificoffice.com/

Pacific Office Automation has been designing and implementing Enterprise and small business network solutions in Arizona and across the nation since 1981. As a full service provider of voice over IP and data solutions we offer the highest quality of products and unparalleled service. Our reputation for close partnerships, best of class design, installation and implementation set us apart from others. With our 24/7 Network Operation Center, Trans-West is always there for you.

 

Agenda

Synopsis: Gather before the opening keynote for a welcome introduction about the 10th Annual Arizona Technology Summit.
Synopsis: As the state’s CIO, Morgan Reed is driving the statewide technology strategy. Mr. Reed will provide valuable insight on the accomplishments the state has achieved to date focusing on a cloud-first policy and modernizing government. He will also share his plans to position Arizona as a technology leader for the future.

Reed's Bio: Morgan Reed joined the State of Arizona in 2015 after two decades of technology experience at large enterprises in the private sector. As the State’s Chief Information Officer, he is responsible for driving the State of Arizona’s technology strategy and to enable transformation of government services with a more citizen-centric approach. During his tenure, the state has adopted a cloud-first strategy and has successfully migrated nearly 60% of servers in the state datacenter to public cloud, including the the multi-agency mainframe. Arizona is also halfway through transitioning over 100 agencies to a cloud-based email system, and have also made significant cyber security enhancements to be one of the best-protected state governments in the nation. Prior to joining the State of Arizona, Morgan led global infrastructure delivery teams at Godaddy and Expedia, and also worked in at large IT organizations as part of Intel and Wells Fargo. He and his three children and two dogs call Scottsdale home.

Synopsis:

This year is shaping up to be a busy year for cyber security. Before we can defend our networks against these modern attacks, we need to know what to expect. In this talk we’ll discuss the state of security in 2018, including the attacks targeting our data, our users and our devices. We’ll then dive in to the tools and training available to protect our networks against these threats. Takeaways: 1. The top threat trends of 2018 including predictions of what to expect in the second half of the year 2. The top 5 attack methods attackers are using in 2018 3. The technical and procedural controls you can implement to defend against the threat landscape

Laliberte's Bio: Marc Laliberte is a Sr. Security Analyst at WatchGuard Technologies. Marc joined the WatchGuard team in 2012. Specializing in networking security technologies, Marc’s responsibilities include researching and reporting on modern information security trends. With speaking appearances and regular contributions to online IT publications, Marc is a thought leader providing security guidance to all levels of IT personnel.

Synopsis:

Receive complimentary coffee and espresso at our Exhibit Hall.

Synopsis:

Actually, they are here. They now represent over 50 percent of internet traffic. But not all bots are bad. There are many good bots, such as chat bots and search engine bots, that we rely on in our day-to-day digital lives. You do need to know the difference and take control of your bot traffic—they cannot be ignored and you cannot just block them all. In this presentation, we will look at the growth of bots, good bots versus bad bots, what to look for in a bot mitigation solution and a few use cases.

Taylor's Bio: Scott Taylor is the Director of Solutions Engineering at Dyn. He has been in the network and application performance space for over 15 years, with the last 4 of those years specializing in DNS and Internet analytics. His customer experience includes working with the top banks, social media companies and ecommerce sites.

Synopsis:

Dave Moore with Cambium Networks will discuss trends in WiFi from a vendor-agnostic standing. What is the state of WiFi today and how did we get here? What can we expect from WiFi tomorrow and the next couple years? We will discuss the possibilities as well as the realistic limitations of WiFi.

Moore's Bio: David Moore is a wireless Veteran with 20+ year experience. Dave previously held management positions at Extreme Networks and Ruckus; at Ruckus he managed the engineers worldwide. The start of his Wireless career was at Motorola supporting the Canopy and PtP solutions you know today as Cambium Networks. Talk about an amazing career coming back full circle! Not only is Dave a Wi-fi guru, he specializes in Hospitality, Stadium, Smart City and Education verticals.

Synopsis:

With the growth of IoT and Cloud, the attack surface that enterprises must protect is expanding dramatically. Unique regulatory requirements by industry vertical are also placing extra pressure on Security Officers and their teams. How can CISOs effectively respond? First and foremost, taking an architectural approach, one that includes network segmentation, will create the best chance of solving Enterprise security holistically and for the long term. Key capabilities must include visibility of all security elements and the communications these systems and devices generate and, even more importantly, automation of operations and response. With the current cybersecurity skills gap that many enterprises experience today, the ability to quickly and effectively audit, recommend and automatically fix the entire network security architecture is critical. Going beyond NGFW, 3rd generation cybersecurity technology addresses these new demands. Takeaways: • Technology evolution and innovation are exponentially expanding the attack surface. • To keep up, enterprises must take an architectural approach to network security that includes visibility and automation. • With limited resources, the ability to quickly and effectively audit, recommend and repair network security is crucial. • Threat intelligence, shared in real-time, between 3rd party products are required to meet the continuously changing landscape.

Graun's Bio: Jason Graun is a Solutions Engineering Manager and a member of the Office of the CTO. He has been with Fortinet since 2011. Jason has supported Fortinet’s largest carrier and MSSP customers as a Consulting Security Engineer. He brings nearly 20years of experience in IT having worked for a large international bank and several startups along the way. Jason’s focus is solving the problem of how to automate security to bridge the gap between cyberattacks and the needs of business drivers.

Synopsis:

Configuring, managing, and troubleshooting your network doesn’t need to be complicated. Come see how utilizing a SPB technology can simply your networking life. SPB or Shortest Path Bridging is a standards based Layer 2 fabric that allows for a single point of configuration for the vast majority of your networking tasks. Not only can it micro-segment your network and hide IP addresses from potential threats, it can also allow for automatic configuration for multicast environments and reduce multicast overhead by only forwarding the stream where it is needed. Add to this services that automate the deployment of end points such as IP Phones, Cameras, and Access Points and watch your networking administrative overhead dwindle. Come learn more about SPB today!

Taylor's Bio: Joel Taylor has been in the IT industry for over 20 years and has been fortunate enough to have worked in several different integrated systems fields including: networking (wired & wireless), IP telephony, PBX/ACD, access control, video distribution, nurse call, and surveillance. Over the last decade, Joel has worked as a Network Systems Engineer with a focus in wireless technologies. He holds several manufacturer certifications and completed the industry standard CWNA certification last year. In his free time, he volunteers at his local church, coaches club level soccer, and plays in a soccer league myself.

Synopsis:

The cyber-threat landscape is changing. In addition to high-speed attacks, today’s most sophisticated threat-actors are playing a longer game – one that is silent and stealthy. Their objective is to disrupt operations, undermine trust, or simply learn trade secrets by going undetected inside networks. Digital environments are changing too. Increasing digitization, the surge of IoT devices, and the cloud mean that network boundaries are more porous than ever. Securing the perimeter simply isn’t possible. To defend against threats that are continually evolving, tomorrow’s cyber security must go beyond looking for yesterday’s attacker – it must find what it doesn’t know to look for. AI technologies have led to the emergence of self-learning, self-defending networks that achieve this – detecting and autonomously responding to in-progress attacks in real time. These cyber immune systems enable the security team to focus on high-value tasks, can counter even machine-speed threats, and work in all environments, including the cloud. In this session, learn about: • Navigating new types of cyber-threats, including weaponized AI • Overcoming the limitations of the legacy approaches to information security • Adopting an ‘immune system’ model for cyber security, powered by machine learning • The power of AI to fight back autonomously against in-progress attacks • Real-world cyber-threats thwarted by machine learning, including IoT hacks and stealthy insider threats

Walson's Bio: Lauren Walson is a Manager at Darktrace, the world’s leading AI company for cyber defense. With a background in solutions software, she specializes in next-gen cyber technology, working alongside executives and security teams to help them defend their business networks. Lauren has helped companies of all sizes and in all industries, including numerous large providers within manufacturing and supply chain, deploy the Enterprise Immune System, the only AI technology capable of detecting and autonomously responding to early-stage cyber-threats. During her time at Darktrace, the company was named to CNBC’s Disruptor 50 in 2018 and experienced a 3x increase in US customers. Lauren attended UCLA and is based out of Darktrace’s headquarters in San Francisco, CA.

Synopsis:

Discover how to get better backups using the only hyper-converged secondary storage (HCSS) for backup with data deduplication purpose-built for all leading backup applications. Because data is written at the speed of disk and the most recent backups are stored in their complete undeduplicated form, this solution delivers fast restores, fast VM instant recoveries, and fast offsite tape copies.

Sorensen's Bio: Stephen Sorensen, Senior Systems Engineer at ExaGrid, has been building custom storage and data protection solutions for over 20 years. Prior to joining ExaGrid, Stephen’s leadership and expertise in backup solutions, data management, SAN, storage virtualization, disaster recovery and enterprise architecture helped bolster customer satisfaction and helped educate the sales teams at CommVault, Data General, Nimble Storage, Tegile and NetPro. Stephen holds a Bachelor of Arts degree in Liberal Arts, Economics and Finance from the University of Illinois at Urbana-Champaign.

Synopsis:

This roundtable is for executives with VIP badges ONLY. This year, we will discuss the topic of The Natural Evolution of Technology. IT and IS is rapidly changing as we see IOT, non IT/IS purchasing, As a Service, Cloud, and Plug and Play taking over. How do we need to evolve as we continue to show value to the business? This session is intended for audience participation so be ready to discuss, receive valuable information, and connect with others for further discussion.

Hennesy's Bio: 33 years in the Powersports Industry, 26 of those focusing on Information Technology, Business Operations, systems integrations and development, 17 in senior management. Currently the Systems and Technology Director for RideNow Powersports Management Group in Chandler AZ. Latest achievements - Dealer Management System (DMS/ERP-EVO) upgrade across all locations in 3 months. - ETL (Extract Transform Load) project between DMS and support systems. - Re-branding I.T. - Hay the world is changing. - Battling thru Level3 ANS (Adaptive Network Control) Deployment. Continued refinement to I.T. services stack. Finding ways to reduce operating costs of the I.T. department and all supporting systems while maintaining, and in many cases improving, customer satisfaction.

Synopsis:

The plan of attack and cyber threat landscape is a real and present challenge and danger for every organization. The evolution of cyber threats grows in both sophistication and complexity of nefarious intentions of bad actors around the globe and within our own communities. Community anchor institutions like state and local government, libraries, health care, schools, and universities face growing challenges to architecting, recruiting talent and managing proactive efforts to protect these community anchor institutions. Security operations includes threat detection, notification, real-time management, and remediation efforts. Bringing many elements of globally recognized best practice associated with the ISAC model in service of protecting community anchor institutions, a SuperSOC was born at Arizona State University.

Jarocki's Bio: An experienced change agent and visionary in information security and governance, risk management, technology and audit. Has a diverse background that spans U.S. intelligence, civilian government and public/private sectors – financial services, healthcare, pharmaceuticals and security/technology both domestically and internationally - South America, Asia-Pacific and Europe. Expertise includes multi-discipline IT security, risk management, governance, audit and technology. Work experiences have covered hardware, software and networking applied research, implementation and management; architecture - security, risk management and compliance/privacy architect, designer, and get-the-job done implementer; internal & external/regulator audit/risk assessments, support/liaison and management; technology consulting and development of business systems, domestic/global data and voice networks, and complex technology and business support infrastructures.

Synopsis:

The global shift to cloud-first, mobile-first, bi-modal IT is fundamentally changing the security landscape. Traditional perimeter and network-centric approaches lack the agility needed to support business needs and fail to prevent attacks such as phishing and social engineering, which are the cause of most data breaches. Meanwhile, users are more mobile, and enterprises are extending their applications and data access beyond employees and contractors to partners. Join Zscaler and Okta to learn how leading enterprises are rethinking security, using identity as the new security perimeter for enforcing user-centric security policies and zero-trust model access.

Shyamsundar's Bio: Teju Shyamsundar is a Senior Product Marketing Mgr at Okta, leading our Adaptive Authentication products. Prior to Okta, she worked at Microsoft and implemented enterprise mobility technologies across a large set of enterprise customers in various industries. Teju now works on driving the value of Okta's adaptive MFA and adaptive SSO capabilities across customers and partners. Teju holds a BS degree in Computer & Information Technology from Purdue University.

Adams's Bio: Barb Adams is a Senior Systems Engineer at GoDaddy. Barb has been on the team supporting Active Directory, internal identity and access management for the past 8 years. She performed the GoDaddy Okta design and deployment in March, 2015. Barb is a MCITP Enterprise Administrator and Okta Certified Professional.

Synopsis:

Brent’s presentation will cover the many lessons he’s learned in 20 years of computer intrusion investigations, and his “heretical” position that cyber security is easy. Explore today's latest threats and learn how companies like Axiom Cyber Solutions can accomplish a higher level of security.

Watkin's Bio: Brent Watkins, founder of Globalsec Partners LLC, is a recently retired Special Agent of the Federal Bureau of Investigation. He has over 20 years of diverse experience investigating computer intrusions and international terrorism cases with the FBI. He’s also a qualified forensic examiner and Special Agent Bomb Technician. Brent was a member of one of the first FBI squads (1996) specifically dedicated to the investigation of computer intrusions, and has investigated numerous high profile cyber cases. He’s been stationed in Los Angeles, Washington DC, Knoxville, and Las Vegas. He’s had ten overseas deployments over his FBI career. Prior to the FBI he was a military officer with the United States Air Force. His academic background is in chemistry and electrical engineering, and he holds an MBA. He’s now partnered with Axiom Cyber Solutions to lead business development.

Synopsis:

Hear about some of the current tools, methods, and motivations of malicious actors. In tandem, what are some effective responses that won’t leave your organization buying the proverbial $1,000 safe to protect a $100 bill.

Malacko's Bio: Jason Malacko manages the security practice at Logicalis where he is responsible for security technical architecture and enablement. He is a certified information systems security professional (CISSP) who combines two decades of experience in network and systems infrastructure engineering with an extensive background in unified IP networks and information security.

Synopsis:

New ransomware, VPNFilter attacks, compromised routers, and increases of zero-day attacks are all indicators that cybercriminals are redirecting their energy to more potentially dangerous attacks KEY TAKEAWAYS: • Find out why the FBI is involved with VPNFilter attacks. • Why Backdoor attacks have gone up 442%? • How GDPR regulations increase the theft risk of Personal Identifiable Information (PII)? • That cryptominers are moving on to Android and MAC but Windows systems still need to be vigilant.

Janssen's Bio: COMING SOON

Synopsis:

Intelligent Storage–predictive, cloud-ready, and timeless–is not limited to the product experience, but applies to your overall customer experience with HPE products, services, and individuals. Supported by the predictive self-healing and artificial intelligence of HPE InfoSight, and the cloud-ready features and future-ready promise across all HPE products. With Intelligent Storage from HPE, you can: o Move data where it needs to be with seamless cloud mobility. o Anticipate challenges to guarantee 99.9999% availability. o Learn and adapt to predict and prevent 86% of problems across the infrastructure. o Optimize to extract actionable insights for all types of data regardless of location. o Self-adjust in real time, lowering OPEX by 79%. o Provide an experience that gets better over time.

Synopsis:

Strategic Alignment or IT Governance is becoming ever more necessary in today’s fast paced world of technology deployment. Technology is no longer just being acquired by the IT organization; business units on their own are procuring technology; yet when it comes to integrating their “simple” cloud solution, where do they come? IT organizations, along with their business constituents must develop techniques, methods, and governance vehicles to ensure strategic alignment regarding the effective deployment of information technology assets.

Summer's Bio: Kelly Summers is currently a Senior Vice President and Chief Information Officer of the Maricopa Integrated Health System. Mr. Summers has more than 20 years of transformational IT leadership experience and a track record of producing innovative technology solutions and capabilities. As CIO, Summers leads the definition, creation, and execution of MIHS’ information technology strategies ensuring alignment to the clinical and business strategies of MIHS. In addition to IT responsibilities, Mr. Summers also provides executive leadership to the Clinical Engineering/Bio-Med functions. His passion is to drive the effectiveness of MIHS’ technology portfolio towards industry leading solutions improving the quality, predictability, and efficiency of patient care. Before joining MIHS, Summers was Vice President, Information Technology and CIO for Medicis, a leading publically traded specialty pharmaceutical company. Prior to that, he was a senior IT executive for St. Jude Medical, a multi-national, multi-billion dollar medical device company where he was initially the Vice President and CIO of their largest division (> $3billion in annual revenue) and ultimately was a corporate Vice President responsible for global IT shared services across the enterprise. Summers began his career in software development with Goodyear Aerospace where he was part of a USAF highly classified program developing high altitude, electronic intelligence (ELINT) and reconnaissance mission planning software applications. Mr. Summers possess undergraduate degrees in Business Administration and Computer Information Systems and is recognized by the College of Healthcare Information Management Executives (CHIME) as a certified healthcare CIO (CHCIO).

Synopsis:

The presentation will focus on a step by step programmatic approach to Hunting Intruders in your environment, with an emphasis on the use of data analytics as a tool for both targeting and detection. During the session, Bruce will also provide practical recommendations on the use of the tools, techniques, and processes. At a high level, the presentation will include the following topics. 1. Establishing an Intruder Hunting program and integrating the program into your ISMS. 2. Asset Evaluation and Risk Assessment requirements of the IH Program. 3. Defining and narrowing the “Huntscape” 4. Tools and Techniques for stealth monitoring 5. Data Analytics for Targeting and Detection 6. Deriving Threat Intelligence from analytics, and the use of TI in Hunting 7. Identifying and Reporting on Intrusions and attempted Intrusions 8. Evicting Intruders and Remediation processes

Roton's Bio: Bruce Roton has over 41 years of experience in Network and Security services and has held positions as a Security Consultant, Security/Network Systems Engineer, Federal Account Executive, Regional Marketing Director, Director of Customer Support and senior programmer (both applications and OS). He has also presented training seminars globally on networking and security. In his current role at Level 3 (as in previous roles at Verizon/Cybertrust), he is engaged in the sales and operations of security services, as well as the research and development of advanced Threat Intelligence systems. Bruce’s Specialties include Information security, privacy management, threat mitigation infrastructure design, and risk management. He is also a frequent public speaker at seminars and security events throughout the United States.

Synopsis:

The threat from ransomware continues to grow with new variants that operate in stealth, seeking out critical files and encrypting at a lower rate to prevent detection and increase the likelihood the ransom will be paid. Ransomware and other crypo attacks have caused, at a conservative estimate, some hundreds of millions of dollars. One critical defense of these types of attacks is to have backups, and to follow the 3-2-1 rule of backups (3 copies, 2 media types, 1 off-site) to ensure an air gap and data integrity. Data security does not stop at the network perimeter, it follows it all the way through its lifecycle.

Weise's Bio: Clayton Weise is the Director of Cloud Services for Key Information Systems, where he is responsible for designing, architecting and implementing cloud solutions; managing production workloads; and employing cloud resources in disaster recovery, clustering and hybrid (cloud and on-premises) infrastructure solutions.

Puckett's Bio: Harley has 30+ years experience in Storage and Data Protection, regularly presenting at client briefings and conferences. He spent 6 ½ years as an Executive Storage Software Consultant and manager of the Client Workshop Program in the Tucson Executive Briefing Center. In addition to leading development Harley still consults on Data Protection to many IBM clients.

McKinney's Bio:Jason comes to Panzura from CloudGenera, which he co-founded and was the CRO handling SasS strategy, sales execution, and marketing for OEM’s, SI’s, Distributor’s, and VAR MSP’s. Jason has held leadership roles at Openwave, Phoenix Technologies, and VMWare driving the CIO Strategy for IT Transformation and Virtualization with large logos and System Integrators and Outsourcers like HPES, Dell Perot Systems, ACS Xerox, and Accenture.

Synopsis:

The transition from legacy data centers to hybrid environments brings an array of usability, visibility and protection challenges as users connect to applications and resources across network, cloud and SaaS domains. With accelerated demands to support a mobile workforce and consumerization of IT, “trust but verify” controls are crucial to mitigate malware, data privacy, breach and IoT threats. How can anytime, anywhere access be seamless and while ensuring consistent policy and protection capabilities. Whether your business is fully cloud invested or going on a per app and business case, this session will explore: • How, why and impact of siloed, work-around secure access mechanisms • Defining identity, device, security state and information relationships • Key components of protected connections, appropriate access, and availability • Considerations to gain intelligence, unify policies and orchestrate workflows • A reference platform for on-premise and multi-cloud Secure Access

Hebler's Bio: Jim Hebler, Pulse Secure’s Director of Cyber-Security Solutions Strategies, has an objective to empower customers, partners and prospects to understand the issues, overcome challenges and realize opportunities of Secure Access and the application of Pulse Secure’s solution portfolio. Jim has over 20 years’ experience in IT security, managed services and marketing have worked for HP, CSC, and SunGard prior to joining Pulse Secure in 2015. He offers thought-provoking, insightful, pragmatic security technology application and process insights from numerous engagements across financial services, healthcare, energy, manufacturing, and defense industries. Jim is CISSP-trained and earned a BS degree at Central Michigan University.

Synopsis:

Security is always top of mind among IT professionals responsible for the security of their organizations. It’s critical that they ask themselves if they are prepared to face the threats. Join the session and find out what to do to implement the right strategies for defense.

Synopsis:

61% of companies have experienced slow applications after server virtualization, with 77% pointing to I/O problems as the culprit. With software-defined storage, companies have an opportunity to consolidate and reduce the complexity of their infrastructure. But, this will only happen if their applications get the I/O performance they need. In this session, you will see how to get industry leading I/O response times and the best price/performance to reduce and simplify your infrastructure

Synopsis:

This luncheon roundtable is for executives with VIP badges ONLY. We will discuss the topic of Security Regulations and Innovations: Can They Co-Exist? GDPR, Net Neutrality, Data Breach Requirements, Access Control, and even security AI’s are disrupters. How do you innovate despite all this? This session is intended for audience participation so be ready to discuss, receive valuable information, and connect with others for further discussion.

Wilson's Bio: Christopher D. Wilson MSL, Ed.D. (c), serves as the Program Chair for the School of Health Services Administration within the College of Health Services for the University of Phoenix (UOPX) Southwest and Midwest Regions. Prior to his work as Program Chair, he served as the Chair for the UOPX Oregon Campus overseeing faculty and academic outcomes for four colleges and six academic programs. He also teaches graduate courses in leadership, organizational dynamics, innovation, ethics, and philosophy. He spent 15 years in the Army National Guard working in Aviation Logistics for an Army Air Ambulance Unit and over 20 years working in various levels of management. He came to the University of Phoenix from the Oregon State Hospital, a secure forensic psychiatric facility, as the Director of Education and Development overseeing psych-social, nursing, and medical education. He also worked for the Oregon State Medicaid office within the Oregon Health Authority, managing the administrative budget and tracking of legislation and policy. He currently serves as the Vice President of Membership for AzHimss and on the Vice President of Membership for AHE/ACHE. He also represents the University of Phoenix on the Westmarc Education committee. Chris holds a Master’s of Science in Leadership from Grand Canyon University’s School of Business. He is currently a Doctorate of Education candidate at Grand Canyon University.

Synopsis:

Admiral Nelson's innovative use of identity in his strategy at the Battle of Trafalgar provides the foundation for identity to play the key role in any security strategy. This presentation takes its cues from the events of October 21, 1805. At the Battle of Trafalgar, British Admiral Horatio Nelson introduced a new identity-based stratagem for naval warfare that enabled his entire fleet—every ship, every sailor—to act instantly and independently in the pursuit of victory. The British Navy won a decisive victory, and naval warfare would never be the same. (Along with the retelling of this narrative, historical maps of the battle will be used to illustrate the tactics used.)

Kiser's Bio: Mike Kiser is insecure. He has been this way since birth, despite holding a panoply of industry positions over the past 20 years—from Security Strategist to Security Analyst to Security Architect—that might imply otherwise. In spite of this, he has designed, directed, and advised on large-scale security deployments for a global clientele. He is currently in a long-term relationship with fine haberdashery, is a chronic chronoptimist (look it up), and delights in needlessly convoluted verbiage. He has been a speaker on topics ranging from identity governance to security analytics, network security, and various related privacy issues, and is the co-host of a podcast illuminating all things identity. He warmly embraces the notion that security is more of a state of mind than a destination.

Synopsis:

Review of current and future Wi-Fi performance capabilities beyond the marketing hype. Learn about the actual causes of wireless instability, management of IoT devices and how to optimize performance through thoughtful design. Overall network impact of 802.11ax, improved high-density performance, AI integration and how to take advantage of these innovations.

McCaigue's Bio: As a former educator business owner/consultant, Ryan has provided leadership, management and consulting services to technology companies including Internet Service Providers, IT Managed Services and organizations both public and private. He has provided network design, deployment and managed services for wired and wireless networks around the globe. Ryan has played major roles in the Design, Construction, and Management of 16 large-scale municipal networks. Each network consisting of thousands of network elements designed to meet the needs of Public Safety and Public Access. Ryan had 16 years working in higher education culminating as Dean of the Network and Communication Management for National University. He taught CCNA, CCENT, classes as a member of the Cisco Networking Academy for Chandler Gilbert Community College and corporations like Verizon Wireless. Ryan is a Certified Wireless Network Administrator (CWNA) and he has a Bachelor’s degree in Telecommunications Management and a Master’s Degree from Northern Arizona University. Ryan has been with Ruckus Networks for four years and was with a Ruckus Partner for 6 years prior. He has designed, deployed and/or integrated hundreds of Ruckus Wireless Network solutions.

Synopsis:

Wireless is more critical than ever. But it is also harder than ever to manage. The amount of devices and applications are growing exponentially, as is the expectation for wireless networks that are predictable and reliable. AI is the answer. Through automation and insight you can lower Wi-FI OPEX, maximize visibility into the user experience, and deliver amazing new location services that help drive business value. Join Mist when we walk through how to use AI to build the new wireless network. Topics covered include: • Key requirements for an AI-driven WLAN platform • Specific use cases for AI in wireless, such as event correlation, predictions, and location • Real world examples across various industries • Live demo of the Mist Learning WLAN in action

Sawyer's Bio: Gene Sawyer is the Director, Sales Engineering at Mist Systems where he leads a team of accomplished Sales Engineers as well as working directly with customers and partners leveraging technology to drive mission critical business requirements. Gene has been working in the IT industry for over 25 years and has extensive experience with large solution design and deployments across numerous verticals such as retail, hospitality, healthcare, manufacturing and education. Before joining the Mist Systems team, Gene spent over 13 years at Cisco Systems in Systems Engineering and leadership roles including Director, Systems Engineering in the Cisco Meraki business unit focused on Cisco’s Global Enterprise Segment. Prior to Cisco, Gene worked at Airespace, Trapeze Networks and Extreme Networks. Gene is also a Certified Wireless Network Expert (CWNE) and Certified Information Systems Security Professional (CISSP).

Synopsis:

One of the goals of this summit is to make strong connections with those in your region. Making strong connections is not only imperative for humans, it also applies to the diverse set of systems that power your network and security infrastructure. Connecting your infrastructure is important because it makes your operations more efficient, ensures your organization is agile, enhances visibility across your network, enables your team to find and fix issues rapidly, and plays an essential role in maintaining a strong security posture in the face of ever changing threats. Most organizations have multiple products, from multiple vendors to address their broad spectrum of needs. The lack of integration and inability to share events and data causes silos of technology that result in inefficiency, lack of agility, limited visibility, and a poor security posture. During this session, learn about Infoblox’s approach to addressing these challenges. Our approach allows your organization to automate simple tasks, easily share data and intelligence with other parts of the infrastructure, and create a highly-interconnected network for virtualized environments, public clouds, private clouds, or traditional on-premise infrastructures. See how this approach helps security teams better detect, effectively prioritize, and rapidly remediate threats, which improves the efficacy and ROI of the existing security infrastructure.

Nagpal's Bio: Prakash Nagpal is vice president of Product Marketing at Infoblox, where he is responsible for bringing Infoblox products and solutions to market. He has spent over two decades in various leadership roles in technology including product marketing, product management and engineering in networking, security and cloud-based services. Most recently he was responsible for launching a security intelligence platform, targeted at global enterprises and governments, designed to identify and resolve threats faster. Prakash has an MBA from Cornell University, a Masters in Computer Science and a Bachelor of Science in Electrical Engineering.

Synopsis:

Learning Objectives: The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.

Gruenloh's Bio: Ted has worked with web and network security technologies for more than 15 years. He began his career in technology as a full-stack engineer in web development and design. As Chief Operating Officer, Ted guides the overall development of Sentinel IPS, the CINS Active Threat Intelligence System, and all other supporting technologies. You may also find him presenting at a trade show or information security conference, spreading the word about shared threat intelligence. One of Sentinel’s first employees, Ted is not afraid to get his hands dirty supporting Sentinel customers or lending a hand in Sentinel software development. Ted received his Bachelor of Business Administration from the University of Iowa (Go Hawks!) and his Master of Education (Secondary Mathematics) from the University of North Texas. He resides in the DFW area with his wife and two sons, which keep him busy on seemingly every ball field, basketball court, and Boy Scout campground in the North Texas area. He can also be found swinging a hammer for Habitat for Humanity or riding his beloved bicycle for Team in Training.

Synopsis:

Edge solutions are transforming the reach and purpose of cloud computing for IOT by processing data at the edge of the network where information is generated. Utilizing this model, you can dramatically improve performance and latency, while taking advantage of real-time changes, making it ideal for applications at the edge. Customized to meet edge needs, HCI platforms are scalable, easy to use and offer extreme high availability.

Ruiz's Bio: John Ruiz is an IT specialist, having worked in multiple industries ranging from Banking to Manufacturing to Education. John has served in many roles in the IT industry range from Network Engineer to the VP of IT. John has been building secure stable infrastructures for over 15+ years.He currently serves in a role as a Systems Engineer at Scale Computing where he assists customers with designing converged infrastructures using Scale Computing’s HC3 Hyper-Converged solution across the entire West Coast.

Cash Bar: One (1) Complimentary Drink Voucher to the first 200 attendees available at the Registration Counters. Vouchers will be available after 1:00 pm.

Synopsis:

Join us for the end of day panel discussion on the Future Forward Strategies Around Recruiting, Retention, and Mentoring. We will have a Business Leader, IT Leader, Sr. Recruiter, and Academic Leader discuss this. With today’s fast paced technology landscape and economy, finding the right people is becoming increasingly more difficult. The panel will discuss the current situation and strategies to find the right tech talent.

Bickford's Bio: As HIMS Applications Director for Banner Health, Jason Bickford leads change and issues management, applications support, and HIMS Operations and Coding related projects for one of the largest nonprofit hospital systems in the country. In addition, he is responsible for providing technical solutions, implementation planning, and a strong IT vision for an ever changing EMR landscape for 23 Hospitals located within seven states.

Synopsis:

Are you focusing on the right things to protect your company in 2018? Today’s attacks are spreading faster, evolving quicker, and evading even the most widely used security solutions. 54% of organizations suffered a successful attack in 2017 costing $301 per employee (Ponemon Institute) . Challenged with limited resources and bandwidth, the most exposed part of many organizations is usually the least protected; endpoints. In this presentation you will learn about the latest threats targeting your organization and strategies to close your protection gap.

Parker's Bio: Mike Parker has over a decade of experience working with cybersecurity and technology companies with a focus on supporting customers and evangelizing new technologies. At Barkly - the company re-inventing endpoint protection with the strongest protection, smartest technology and simplest management - Mike leads Customer Success and Sales Engineering. Mike works closely with the Threat Research team and has spoken about security programs and the threat landscape at SANS, IANS, and other industry organizations. Mike holds degrees from Boston College and MIT.

Exhibitors

Governing Body Members