• slidebg1
    ARIZONA Technology Summit

    Innovations in IT & Security

    Register for the 2018 Summit!
  • slidebg3
    Attend our Conference to Enter our Grand Prize
    All of our attendees can get the chance to win a free trip & other giveaways!



The Arizona Technology Summit will be held at September 12, 2018 at the Phoenix Convention Center in the South Ballroom from 7am-5pm.


As we reach the 10th annual show, the Arizona Technology Summit is the top leading IT & Security conference and exhibit hall in the state. Currently, over a thousand attendees, VIPs, and renowned speakers are brought together to network, advocate, and create opportunities for the IT & Security industry. With technology constantly changing, the need to build partnerships within your career is vital. With this year's focus on "Innovations in IT & Security," companies and guests will benefit learning innovative technology methods, discuss industry topics, and make strong connections with those in your region. Further your career with attending the Arizona Technology Summit today! Attend The Arizona Technology Summit to get the right tools and make vital connections to best prepare your company for the broad spectrum of ever-changing technology trends.



We would like to thank our all of our sponsors for being a part of this year's Arizona Technology Summit. From being a sponsor, you will be recognized for the education and mission your company contributes to our tradeshow, panels, and sessions. Many of our sponsors have been a part of our annual summit for many years and we are proud to support them. See below for all of the sponsors for the Arizona Technology 2018 event.

Gold Sponsors


cStor helps organizations create, strategize, and implement data center, digital transformation, and cybersecurity solutions that address your evolving business needs and demands of today’s enterprise. Our proven capabilities with best-of-breed technologies provide you the peace of mind that we put you on a path to ensure success.


The Oracle Dyn global business unit (GBU) helps companies build and operate a secure, intelligent cloud edge. Dyn’s solutions are backed by one of the world’s most comprehensive internet performance data sets, collecting more than 200 billion internet data points daily across a global network. More than 3,500 customers rely on Oracle Dyn’s edge services, including preeminent digital brands such as Netflix, Twitter, CNBC and LinkedIn.


SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world. SailPoint’s open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments.

Lunch and Learn Sponsors


CenturyLink is the second largest U.S. communications provider to global enterprise customers. With customers in more than 60 countries and an intense focus on the customer experience, CenturyLink strives to be the world’s best networking company by solving customers’ increased demand for reliable and secure connections. The company also serves as its customers’ trusted partner, helping them manage increased network and IT complexity and providing managed network and cyber security solutions that help protect their business.


DataCore's full-featured, Software-defined storage platform, SANsymphony-V10, shaped by the experiences of 10,000+ customers and ten generations of refinements, maximizes the performance, availability and utilization of diverse storage equipment, current and future. The strategic and novel storage virtualization approach, free from hardware manufacturer biases, sensibly balances business objectives against budget constraints.


Key Information Systems, Inc. is a hybrid infrastructure technology company that simplifies complex technology challenges, for the most advanced networking and hybrid cloud solutions. KeyInfo delivers the industry’s best systems by combining advanced technology services with the industry-leading products and resources.


Put simply, we are the company that is 100% focused on delivering secure access solutions for people, devices, things and services. For years, enterprises of every size and industry have been trusting our integrated virtual private network, network access control and mobile security solutions to enable secure access seamlessly in their organizations. Every single day, our global team are innovating our products to ensure that you can dramatically boost your workers' productivity, make a smooth and secure transition to the Cloud and ensure that your networks are protected without a burden on IT.


Trustwave helps businesses fight cybercrime, protect data and reduce security risk. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Trustwave enables businesses to transform the way they manage their information security and compliance programs. More than three million businesses are enrolled in the Trustwave TrustKeeper® cloud platform, through which Trustwave delivers automated, efficient and cost-effective threat, vulnerability and compliance management. Trustwave is headquartered in Chicago, with customers in 96 countries.

Silver Sponsor


VMware, a global leader in cloud infrastructure and digital workspace technology, accelerates digital transformation by enabling unprecedented freedom and flexibility in how our customers build and evolve IT environments. With VMware solutions, organizations are improving business agility by modernizing data centers and integrating public clouds, driving innovation with modern apps, creating exceptional experiences by empowering the digital workspace, and safeguarding customer trust by transforming security.



10ZiG Technology is a world-market leader in Thin Client & Zero Client endpoint devices for Virtual Desktop Infrastructure. 10ZiG provides leading Intel and AMD based Dual and Quad Core Thin Clients and Zero Clients for VMware Blast Extreme & PCoIP, Citrix (HDX, HDX Premium, HDX 3D Pro), and Microsoft environments, in addition to the widest range of Teradici PCoIP Zero Clients on the market. 10ZiG offers free, no-obligation demo devices, Technical Support teams based in the U.S. and Europe, and provides “The 10ZiG Manager” console with Cloud capabilities completely free with unlimited user licenses supported. Free evaluation devices are available at 10ZiG.com.


Presentation Sponsors


Barkly is advancing endpoint security by combining the strongest, smartest protection with the simplest management. Barkly is the only protection with visibility into all levels of the system, including the CPU and stays up-to-date through it’s continuous machine-learning engine that automatically converts threat intelligence into powerful protection through nightly training on malware and customer-specific goodware. Barkly is formed by an elite team of security and SaaS experts from IBM, Cisco and Intel, and is backed by investors NEA and Sigma Prime.


Cambium Networks makes it possible for service providers; enterprises; governmental and military agencies; oil, gas and utility companies; Internet service providers; and public safety networks to build powerful communications networks, reach users from 200 kilometers across mountain tops down to the last meter to their devices, and intelligently manage their business Wi-Fi infrastructure through end-to-end network visibility and actionable analytics.


Darktrace is the world’s leading AI company for cyber security. Created by mathematicians, the Enterprise Immune System uses machine learning and AI algorithms to detect and respond to cyber-threats across diverse digital environments, including cloud and virtualized networks, IoT and industrial control systems. The technology is self-learning and requires no set-up, identifying threats in real time, including zero-days, insiders and stealthy, silent attackers. Darktrace is headquartered in San Francisco and Cambridge, UK, and has over 30 offices worldwide.



ExaGrid's hyper-converged secondary storage for backup offers an integrated and unique landing zone and its scale-out architecture provides the fastest backup - resulting in the shortest fixed backup window, fastest local restores, offsite tape copies and instant VM recoveries while permanently fixing the backup window length, all with reduced cost.


We made a name for ourselves more than 20 years ago offering the most comprehensive, high-performance network access and switching products. Today, our worldwide customers are leveraging the combined power of Extreme to take their networks to the next level. So, if you still think “hardware” when you hear "Extreme," it's time to think again.


From the start, the Fortinet vision has been to deliver broad, truly integrated, high-performance security across the IT infrastructure. We provide top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric. Our unique security fabric combines Security Processors, an intuitive operating system, and applied threat intelligence to give you proven security, exceptional performance, and better visibility and control--while providing easier administration.


Hewlett Packard Enterprise is a global technology leader focused on developing intelligent solutions that allow customers to capture, analyze and act upon data seamlessly from edge to core to cloud. HPE enables customers to accelerate business outcomes by driving new business models, creating new customer and employee experiences, and increasing operational efficiency today and into the future.




Infoblox delivers Actionable Network Intelligence to enterprise, government, and service provider customers around the world. We are the industry leader in DNS, DHCP, and IP address management, the category known as DDI. We empower thousands of organizations to control and secure their networks from the core—enabling them to increase efficiency and visibility, improve customer service, and meet compliance requirements.



iT1 is a global solution provider established in 2003 and headquartered in Tempe, AZ. Our mission is to enable our clients to achieve their business goals by providing custom engineered technology solutions. iT1’s value-driven services include the design and implementation of customized industry transforming solutions. In partnership with leading manufacturers, we serve over 3,000 active SMB and Enterprise accounts in virtually every industry including healthcare, finance, retail and manufacturing, as well as Federal, state, local and education (SLED) agencies. iT1 aims to help you better serve your customers and set your brand apart in the marketplace.


At Logcalis we want to be a valuable partner for our customers, we want to provide opportunity for our employees, and contribute to our communities. And, like you, we know that the innovative use of information technology (IT) is one of the best strategies to achieve our business objectives.


Malwarebytes is the most trusted endpoint security company in the world. Malwarebytes proactively protects people and businesses against malicious threats, including ransomware, that traditional antivirus solutions miss. The company's flagship product uses signature-less technologies to detect and stop a cyberattack before damage occurs.


Mist built the first AI-driven wireless platform with the world’s first virtual IT assistant. The Mist Learning Wireless LAN makes Wi-Fi predictable, reliable and measurable by providing unprecedented visibility into the user experience and by replacing time consuming manual IT tasks with proactive automation. All operations are managed via Mist’s modern cloud architecture for maximum scalability, agility and performance.


Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security protections. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications.



Ruckus Networks, an ARRIS company, is redefining connectivity around the globe. With our partners, we build secure wired and wireless access networks for organizations that place a premium on connectivity experiences for end-users as well as simplicity and lower-cost-per-connection for IT.


Scale Computing is the industry leader in complete hyperconverged solutions with thousands of deployments spanning from the SMB to the distributed enterprise. Driven by patented technologies, HC3 systems install in minutes, can be expanded without downtime, self-heal from failures, and automatically optimize workloads to maximize price-performance.


Based in Dallas, Texas, Sentinel IPS began as EcoNet.com, a web development firm founded in 1995. By the early 2000s, the company became a successful network security product reseller and developed its first intrusion prevention system. Sentinel IPS provides 24/7 network management, monitoring and stellar support. Sentinel IPS customers include Fortune 100 firms, government and municipal agencies, financial institutions, and small businesses.


Trans-West Network Solutions has been designing and implementing Enterprise and small business network solutions in Arizona and across the nation since 1981. As a full service provider of voice over IP and data solutions we offer the highest quality of products and unparalleled service. Our reputation for close partnerships, best of class design, installation and implementation set us apart from others. With our 24/7 Network Operation Center, Trans-West is always there for you.



Synopsis: TBA

Reed's Bio: Morgan Reed joins the State of Arizona with nearly 20 years of information technology experience in large enterprises in the private sector. As the State’s Chief Information Officer, he is responsible for driving the State of Arizona’s technology strategy and to transform government services. Specializing in implementing new technologies, improving service delivery and driving change, Morgan brings a diverse background having managed nearly every area of information technology engineering and operations. Prior to joining the State of Arizona, Morgan worked for local companies such as Go Daddy, Intel and Wells Fargo. Most recently he led infrastructure delivery for Expedia, based in the Pacific Northwest. Morgan holds a Bachelors degree in Business Operations from DeVry University, and is pursuing a Masters in Information Systems Management from Keller Graduate School of Management. He and his wife and 3 children call Scottsdale home.


This year is shaping up to be a busy year for cyber security. Before we can defend our networks against these modern attacks, we need to know what to expect. In this talk we’ll discuss the state of security in 2018, including the attacks targeting our data, our users and our devices. We’ll then dive in to the tools and training available to protect our networks against these threats. Takeaways: 1. The top threat trends of 2018 including predictions of what to expect in the second half of the year 2. The top 5 attack methods attackers are using in 2018 3. The technical and procedural controls you can implement to defend against the threat landscape

Laliberte's Bio: Marc Laliberte is a Sr. Security Analyst at WatchGuard Technologies. Marc joined the WatchGuard team in 2012. Specializing in networking security technologies, Marc’s responsibilities include researching and reporting on modern information security trends. With speaking appearances and regular contributions to online IT publications, Marc is a thought leader providing security guidance to all levels of IT personnel.


Actually, they are here. They now represent over 50 percent of internet traffic. But not all bots are bad. There are many good bots, such as chat bots and search engine bots, that we rely on in our day-to-day digital lives. You do need to know the difference and take control of your bot traffic—they cannot be ignored and you cannot just block them all. In this presentation, we will look at the growth of bots, good bots versus bad bots, what to look for in a bot mitigation solution and a few use cases.

Taylor's Bio: Scott Taylor is the Director of Solutions Engineering at Dyn. He has been in the network and application performance space for over 15 years, with the last 4 of those years specializing in DNS and Internet analytics. His customer experience includes working with the top banks, social media companies and ecommerce sites.


Dave Moore with Cambium Networks will discuss trends in WiFi from a vendor-agnostic standing. What is the state of WiFi today and how did we get here? What can we expect from WiFi tomorrow and the next couple years? We will discuss the possibilities as well as the realistic limitations of WiFi.

Moore's Bio: David Moore is a wireless Veteran with 20+ year experience. Dave previously held management positions at Extreme Networks and Ruckus; at Ruckus he managed the engineers worldwide. The start of his Wireless career was at Motorola supporting the Canopy and PtP solutions you know today as Cambium Networks. Talk about an amazing career coming back full circle! Not only is Dave a Wi-fi guru, he specializes in Hospitality, Stadium, Smart City and Education verticals.


The cyber-threat landscape is changing. In addition to high-speed attacks, today’s most sophisticated threat-actors are playing a longer game – one that is silent and stealthy. Their objective is to disrupt operations, undermine trust, or simply learn trade secrets by going undetected inside networks. Digital environments are changing too. Increasing digitization, the surge of IoT devices, and the cloud mean that network boundaries are more porous than ever. Securing the perimeter simply isn’t possible. To defend against threats that are continually evolving, tomorrow’s cyber security must go beyond looking for yesterday’s attacker – it must find what it doesn’t know to look for. AI technologies have led to the emergence of self-learning, self-defending networks that achieve this – detecting and autonomously responding to in-progress attacks in real time. These cyber immune systems enable the security team to focus on high-value tasks, can counter even machine-speed threats, and work in all environments, including the cloud. In this session, learn about: • Navigating new types of cyber-threats, including weaponized AI • Overcoming the limitations of the legacy approaches to information security • Adopting an ‘immune system’ model for cyber security, powered by machine learning • The power of AI to fight back autonomously against in-progress attacks • Real-world cyber-threats thwarted by machine learning, including IoT hacks and stealthy insider threats

Walson's Bio: Lauren Walson is a Manager at Darktrace, the world’s leading AI company for cyber defense. With a background in solutions software, she specializes in next-gen cyber technology, working alongside executives and security teams to help them defend their business networks. Lauren has helped companies of all sizes and in all industries, including numerous large providers within manufacturing and supply chain, deploy the Enterprise Immune System, the only AI technology capable of detecting and autonomously responding to early-stage cyber-threats. During her time at Darktrace, the company was named to CNBC’s Disruptor 50 in 2018 and experienced a 3x increase in US customers. Lauren attended UCLA and is based out of Darktrace’s headquarters in San Francisco, CA.


Discover how to get better backups using the only hyper-converged secondary storage (HCSS) for backup with data deduplication purpose-built for all leading backup applications. Because data is written at the speed of disk and the most recent backups are stored in their complete undeduplicated form, this solution delivers fast restores, fast VM instant recoveries, and fast offsite tape copies.

Sorensen's Bio: Stephen Sorensen, Senior Systems Engineer at ExaGrid, has been building custom storage and data protection solutions for over 20 years. Prior to joining ExaGrid, Stephen’s leadership and expertise in backup solutions, data management, SAN, storage virtualization, disaster recovery and enterprise architecture helped bolster customer satisfaction and helped educate the sales teams at CommVault, Data General, Nimble Storage, Tegile and NetPro. Stephen holds a Bachelor of Arts degree in Liberal Arts, Economics and Finance from the University of Illinois at Urbana-Champaign.


Configuring, managing, and troubleshooting your network doesn’t need to be complicated. Come see how utilizing a SPB technology can simply your networking life. SPB or Shortest Path Bridging is a standards based Layer 2 fabric that allows for a single point of configuration for the vast majority of your networking tasks. Not only can it micro-segment your network and hide IP addresses from potential threats, it can also allow for automatic configuration for multicast environments and reduce multicast overhead by only forwarding the stream where it is needed. Add to this services that automate the deployment of end points such as IP Phones, Cameras, and Access Points and watch your networking administrative overhead dwindle. Come learn more about SPB today!

Taylor's Bio: Joel Taylor has been in the IT industry for over 20 years and has been fortunate enough to have worked in several different integrated systems fields including: networking (wired & wireless), IP telephony, PBX/ACD, access control, video distribution, nurse call, and surveillance. Over the last decade, Joel has worked as a Network Systems Engineer with a focus in wireless technologies. He holds several manufacturer certifications and completed the industry standard CWNA certification last year. In his free time, he volunteers at his local church, coaches club level soccer, and plays in a soccer league myself.


With the growth of IoT and Cloud, the attack surface that enterprises must protect is expanding dramatically. Unique regulatory requirements by industry vertical are also placing extra pressure on Security Officers and their teams. How can CISOs effectively respond? First and foremost, taking an architectural approach, one that includes network segmentation, will create the best chance of solving Enterprise security holistically and for the long term. Key capabilities must include visibility of all security elements and the communications these systems and devices generate and, even more importantly, automation of operations and response. With the current cybersecurity skills gap that many enterprises experience today, the ability to quickly and effectively audit, recommend and automatically fix the entire network security architecture is critical. Going beyond NGFW, 3rd generation cybersecurity technology addresses these new demands. Takeaways: • Technology evolution and innovation are exponentially expanding the attack surface. • To keep up, enterprises must take an architectural approach to network security that includes visibility and automation. • With limited resources, the ability to quickly and effectively audit, recommend and repair network security is crucial. • Threat intelligence, shared in real-time, between 3rd party products are required to meet the continuously changing landscape.

Graun's Bio: Jason Graun is a Solutions Engineering Manager and a member of the Office of the CTO. He has been with Fortinet since 2011. Jason has supported Fortinet’s largest carrier and MSSP customers as a Consulting Security Engineer. He brings nearly 20years of experience in IT having worked for a large international bank and several startups along the way. Jason’s focus is solving the problem of how to automate security to bridge the gap between cyberattacks and the needs of business drivers.


This roundtable is for executives with VIP badges ONLY. This session is intended for audience participation so be ready to discuss, receive valuable information, and connect with others for further discussion.

Speaker's Bio: COMING SOON


Disrupting the cyber attack chain is critical for organization’s looking to address external hacking, insider threats and hidden threats. In this session we will discuss cyber attack chain disruption to address the new vulnerability, privilege.

Speaker's Bio: Global head of Enablement and Sales Engineering for BeyondTrust with nearly 20 years of security, identity and access management experience including RSA and Quest Software.


Intelligent Storage–predictive, cloud-ready, and timeless–is not limited to the product experience, but applies to your overall customer experience with HPE products, services, and individuals. Supported by the predictive self-healing and artificial intelligence of HPE InfoSight, and the cloud-ready features and future-ready promise across all HPE products. With Intelligent Storage from HPE, you can: o Move data where it needs to be with seamless cloud mobility. o Anticipate challenges to guarantee 99.9999% availability. o Learn and adapt to predict and prevent 86% of problems across the infrastructure. o Optimize to extract actionable insights for all types of data regardless of location. o Self-adjust in real time, lowering OPEX by 79%. o Provide an experience that gets better over time.

Speaker's Bio: TBA


Brent’s presentation will cover the many lessons he’s learned in 20 years of computer intrusion investigations, and his “heretical” position that cyber security is easy. Explore today's latest threats and learn how companies like Axiom Cyber Solutions can accomplish a higher level of security.

Watkin's Bio: Brent Watkins, founder of Globalsec Partners LLC, is a recently retired Special Agent of the Federal Bureau of Investigation. He has over 20 years of diverse experience investigating computer intrusions and international terrorism cases with the FBI. He’s also a qualified forensic examiner and Special Agent Bomb Technician. Brent was a member of one of the first FBI squads (1996) specifically dedicated to the investigation of computer intrusions, and has investigated numerous high profile cyber cases. He’s been stationed in Los Angeles, Washington DC, Knoxville, and Las Vegas. He’s had ten overseas deployments over his FBI career. Prior to the FBI he was a military officer with the United States Air Force. His academic background is in chemistry and electrical engineering, and he holds an MBA. He’s now partnered with Axiom Cyber Solutions to lead business development.


Hear about some of the current tools, methods, and motivations of malicious actors. In tandem, what are some effective responses that won’t leave your organization buying the proverbial $1,000 safe to protect a $100 bill.

Malacko's Bio: Jason Malacko manages the security practice at Logicalis where he is responsible for security technical architecture and enablement. He is a certified information systems security professional (CISSP) who combines two decades of experience in network and systems infrastructure engineering with an extensive background in unified IP networks and information security.


The global shift to cloud-first, mobile-first, bi-modal IT is fundamentally changing the security landscape. Traditional perimeter and network-centric approaches lack the agility needed to support business needs and fail to prevent attacks such as phishing and social engineering, which are the cause of most data breaches. Meanwhile, users are more mobile, and enterprises are extending their applications and data access beyond employees and contractors to partners. Join Zscaler and Okta to learn how leading enterprises are rethinking security, using identity as the new security perimeter for enforcing user-centric security policies and zero-trust model access.

Speaker's Bio: TBA


The presentation will focus on a step by step programmatic approach to Hunting Intruders in your environment, with an emphasis on the use of data analytics as a tool for both targeting and detection. During the session, Bruce will also provide practical recommendations on the use of the tools, techniques, and processes. At a high level, the presentation will include the following topics. 1. Establishing an Intruder Hunting program and integrating the program into your ISMS. 2. Asset Evaluation and Risk Assessment requirements of the IH Program. 3. Defining and narrowing the “Huntscape” 4. Tools and Techniques for stealth monitoring 5. Data Analytics for Targeting and Detection 6. Deriving Threat Intelligence from analytics, and the use of TI in Hunting 7. Identifying and Reporting on Intrusions and attempted Intrusions 8. Evicting Intruders and Remediation processes

Roton's Bio: Bruce Roton has over 41 years of experience in Network and Security services and has held positions as a Security Consultant, Security/Network Systems Engineer, Federal Account Executive, Regional Marketing Director, Director of Customer Support and senior programmer (both applications and OS). He has also presented training seminars globally on networking and security. In his current role at Level 3 (as in previous roles at Verizon/Cybertrust), he is engaged in the sales and operations of security services, as well as the research and development of advanced Threat Intelligence systems. Bruce’s Specialties include Information security, privacy management, threat mitigation infrastructure design, and risk management. He is also a frequent public speaker at seminars and security events throughout the United States.


The threat from ransomware continues to grow with new variants that operate in stealth, seeking out critical files and encrypting at a lower rate to prevent detection and increase the likelihood the ransom will be paid. Ransomware and other crypo attacks have caused, at a conservative estimate, some hundreds of millions of dollars. One critical defense of these types of attacks is to have backups, and to follow the 3-2-1 rule of backups (3 copies, 2 media types, 1 off-site) to ensure an air gap and data integrity. Data security does not stop at the network perimeter, it follows it all the way through its lifecycle.

Weise's Bio: Clayton Weise is the Director of Cloud Services for Key Information Systems, where he is responsible for designing, architecting and implementing cloud solutions; managing production workloads; and employing cloud resources in disaster recovery, clustering and hybrid (cloud and on-premises) infrastructure solutions.

Puckett's Bio: Harley has 30+ years experience in Storage and Data Protection, regularly presenting at client briefings and conferences. He spent 6 ½ years as an Executive Storage Software Consultant and manager of the Client Workshop Program in the Tucson Executive Briefing Center. In addition to leading development Harley still consults on Data Protection to many IBM clients.


The transition from legacy data centers to hybrid environments brings an array of usability, visibility and protection challenges as users connect to applications and resources across network, cloud and SaaS domains. With accelerated demands to support a mobile workforce and consumerization of IT, “trust but verify” controls are crucial to mitigate malware, data privacy, breach and IoT threats. How can anytime, anywhere access be seamless and while ensuring consistent policy and protection capabilities. Whether your business is fully cloud invested or going on a per app and business case, this session will explore: • How, why and impact of siloed, work-around secure access mechanisms • Defining identity, device, security state and information relationships • Key components of protected connections, appropriate access, and availability • Considerations to gain intelligence, unify policies and orchestrate workflows • A reference platform for on-premise and multi-cloud Secure Access

Hebler's Bio: Jim Hebler, Pulse Secure’s Director of Cyber-Security Solutions Strategies, has an objective to empower customers, partners and prospects to understand the issues, overcome challenges and realize opportunities of Secure Access and the application of Pulse Secure’s solution portfolio. Jim has over 20 years’ experience in IT security, managed services and marketing have worked for HP, CSC, and SunGard prior to joining Pulse Secure in 2015. He offers thought-provoking, insightful, pragmatic security technology application and process insights from numerous engagements across financial services, healthcare, energy, manufacturing, and defense industries. Jim is CISSP-trained and earned a BS degree at Central Michigan University.


Security is always top of mind among IT professionals responsible for the security of their organizations. It’s critical that they ask themselves if they are prepared to face the threats. Join the session and find out what to do to implement the right strategies for defense.

Speaker's Bio: Jason Malacko manages the security practice at Logicalis where he is responsible for security technical architecture and enablement. He is a certified information system security professional (CISSP) who combines two decades of experience in network and systems infrastructure engineering with an extensive background in information security and unified IP networks.


This discussion will incorporate why go, where is the struggle, lessons learned, and what to rethink after going into the cloud. This roundtable is for executives with VIP badges ONLY. This session is intended for audience participation so be ready to discuss, receive valuable information, and connect with others for further discussion.

Speaker's Bio: TBA


Join us to hear about the industry’s premier business continuity and disaster recovery product, designed to help you maximize your business’ ability to use and protect the most critical asset in your data center – the applications and data.

Speaker's Bio: Nearly 17 years in Solution Engineering for Managed Hosting, Data Center, Business Continuity and Disaster Recovery services. Outstanding record of achievement assisting sales staff in meeting and exceeding quota attainment at Comdisco, SunGard and Latisys. 20 years in the IT industry overall, from Help Desk and Network Field Engineer to Systems Administrator, Voice and Data Network Manager, to Sales Support and Solution Engineering. Four plus years as a manager of a Solutions Engineering team for a National provider of Managed Services, Managed Hosting, Cloud and Data Center Services.


Review of current and future Wi-Fi performance capabilities beyond the marketing hype. Learn about the actual causes of wireless instability, management of IoT devices and how to optimize performance through thoughtful design. Overall network impact of 802.11ax, improved high-density performance, AI integration and how to take advantage of these innovations.

McCaigue's Bio: As a former educator business owner/consultant, Ryan has provided leadership, management and consulting services to technology companies including Internet Service Providers, IT Managed Services and organizations both public and private. He has provided network design, deployment and managed services for wired and wireless networks around the globe. Ryan has played major roles in the Design, Construction, and Management of 16 large-scale municipal networks. Each network consisting of thousands of network elements designed to meet the needs of Public Safety and Public Access. Ryan had 16 years working in higher education culminating as Dean of the Network and Communication Management for National University. He taught CCNA, CCENT, classes as a member of the Cisco Networking Academy for Chandler Gilbert Community College and corporations like Verizon Wireless. Ryan is a Certified Wireless Network Administrator (CWNA) and he has a Bachelor’s degree in Telecommunications Management and a Master’s Degree from Northern Arizona University. Ryan has been with Ruckus Networks for four years and was with a Ruckus Partner for 6 years prior. He has designed, deployed and/or integrated hundreds of Ruckus Wireless Network solutions.


Edge solutions are transforming the reach and purpose of cloud computing for IOT by processing data at the edge of the network where information is generated. Utilizing this model, you can dramatically improve performance and latency, while taking advantage of real-time changes, making it ideal for applications at the edge. Customized to meet edge needs, HCI platforms are scalable, easy to use and offer extreme high availability.

Ruiz's Bio: John Ruiz is an IT specialist, having worked in multiple industries ranging from Banking to Manufacturing to Education. John has served in many roles in the IT industry range from Network Engineer to the VP of IT. John has been building secure stable infrastructures for over 15+ years.He currently serves in a role as a Systems Engineer at Scale Computing where he assists customers with designing converged infrastructures using Scale Computing’s HC3 Hyper-Converged solution across the entire West Coast.


Learning Objectives: The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.

Gruenloh's Bio: Ted has worked with web and network security technologies for more than 15 years. He began his career in technology as a full-stack engineer in web development and design. As Chief Operating Officer, Ted guides the overall development of Sentinel IPS, the CINS Active Threat Intelligence System, and all other supporting technologies. You may also find him presenting at a trade show or information security conference, spreading the word about shared threat intelligence. One of Sentinel’s first employees, Ted is not afraid to get his hands dirty supporting Sentinel customers or lending a hand in Sentinel software development. Ted received his Bachelor of Business Administration from the University of Iowa (Go Hawks!) and his Master of Education (Secondary Mathematics) from the University of North Texas. He resides in the DFW area with his wife and two sons, which keep him busy on seemingly every ball field, basketball court, and Boy Scout campground in the North Texas area. He can also be found swinging a hammer for Habitat for Humanity or riding his beloved bicycle for Team in Training.


One of the goals of this summit is to make strong connections with those in your region. Making strong connections is not only imperative for humans, it also applies to the diverse set of systems that power your network and security infrastructure. Connecting your infrastructure is important because it makes your operations more efficient, ensures your organization is agile, enhances visibility across your network, enables your team to find and fix issues rapidly, and plays an essential role in maintaining a strong security posture in the face of ever changing threats. Most organizations have multiple products, from multiple vendors to address their broad spectrum of needs. The lack of integration and inability to share events and data causes silos of technology that result in inefficiency, lack of agility, limited visibility, and a poor security posture. During this session, learn about Infoblox’s approach to addressing these challenges. Our approach allows your organization to automate simple tasks, easily share data and intelligence with other parts of the infrastructure, and create a highly-interconnected network for virtualized environments, public clouds, private clouds, or traditional on-premise infrastructures. See how this approach helps security teams better detect, effectively prioritize, and rapidly remediate threats, which improves the efficacy and ROI of the existing security infrastructure.

Nagpal's Bio: Prakash Nagpal is vice president of Product Marketing at Infoblox, where he is responsible for bringing Infoblox products and solutions to market. He has spent over two decades in various leadership roles in technology including product marketing, product management and engineering in networking, security and cloud-based services. Most recently he was responsible for launching a security intelligence platform, targeted at global enterprises and governments, designed to identify and resolve threats faster. Prakash has an MBA from Cornell University, a Masters in Computer Science and a Bachelor of Science in Electrical Engineering.


Wireless is more critical than ever. But it is also harder than ever to manage. The amount of devices and applications are growing exponentially, as is the expectation for wireless networks that are predictable and reliable. AI is the answer. Through automation and insight you can lower Wi-FI OPEX, maximize visibility into the user experience, and deliver amazing new location services that help drive business value. Join Mist when we walk through how to use AI to build the new wireless network. Topics covered include: • Key requirements for an AI-driven WLAN platform • Specific use cases for AI in wireless, such as event correlation, predictions, and location • Real world examples across various industries • Live demo of the Mist Learning WLAN in action

Sawyer's Bio: TBA


Discussions, sessions, exhibits, networking, connecting. After a long day of learning and hearing let’s all come together and get the event highlights. Let’s discuss what we learned, debate, get clarification from the Governing Body on questions that weren't answered, and leave with a charge/purpose/ideas to take into your work.

Speaker's Bio: COMING SOON


Are you focusing on the right things to protect your company in 2018? Today’s attacks are spreading faster, evolving quicker, and evading even the most widely used security solutions. 54% of organizations suffered a successful attack in 2017 costing $301 per employee (Ponemon Institute) . Challenged with limited resources and bandwidth, the most exposed part of many organizations is usually the least protected; endpoints. In this presentation you will learn about the latest threats targeting your organization and strategies to close your protection gap.

Parker's Bio: Mike Parker has over a decade of experience working with cybersecurity and technology companies with a focus on supporting customers and evangelizing new technologies. At Barkly - the company re-inventing endpoint protection with the strongest protection, smartest technology and simplest management - Mike leads Customer Success and Sales Engineering. Mike works closely with the Threat Research team and has spoken about security programs and the threat landscape at SANS, IANS, and other industry organizations. Mike holds degrees from Boston College and MIT.

Cash Bar: One (1) Complimentary Drink Voucher to the first 200 attendees available at the Registration Counters. Vouchers will be available after 1:00 pm.


Governing Body Members