• slidebg1
    ARIZONA Technology Summit

    Innovations in IT & Security

    Register for the 2018 Summit!
  • slidebg3
    Attend our Conference to Enter our Grand Prize
    All of our attendees can get the chance to win a free trip & other giveaways!



The Arizona Technology Summit will be held at September 12, 2018 at the Pheonix Convention Center in the South Ballroom from 7am-5pm.


As we reach the 10th annual show, the Arizona Technology Summit is the top leading IT & Security conference and exhibit hall in the state. Currently, over a thousand attendees, VIPs, and renowned speakers are brought together to network, advocate, and create opportunities for the IT & Security industry. With technology constantly changing, the need to build partnerships within your career is vital. With this year's focus on "Innovations in IT & Security," companies and guests will benefit learning innovative technology methods, discuss industry topics, and make strong connections with those in your region. Further your career with attending the Arizona Technology Summit today! Attend The Arizona Technology Summit to get the right tools and make vital connections to best prepare your company for the broad spectrum of ever-changing technology trends.



We would like to thank our all of our sponsors for being a part of this year's Arizona Technology Summit. From being a sponsor, you will be recognized for the education and mission your company contributes to our tradeshow, panels, and sessions. Many of our sponsors have been a part of our annual summit for many years and we are proud to support them. See below for all of the sponsors for the Arizona Technology 2018 event.

2018 Gold Sponsors


cStor helps companies strategize, create, and implement data center solutions that address business needs. Now more than ever, innovative clients know that IT can be a highly-impactful enabler of business transformation, cost reduction, and competitive advantage. cStor's proven capabilities with key data center technologies provides clients with a fresh perspective, the ability to collaborate with recognized data center experts, and the confidence that goals will be met.


The Oracle Dyn global business unit (GBU) helps companies build and operate a secure, intelligent cloud edge. Dyn’s solutions are backed by one of the world’s most comprehensive internet performance data sets, collecting more than 200 billion internet data points daily across a global network. More than 3,500 customers rely on Oracle Dyn’s edge services, including preeminent digital brands such as Netflix, Twitter, CNBC and LinkedIn.


SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world. SailPoint’s open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments.

2018 Lunch and Learn


CenturyLink is the second largest U.S. communications provider to global enterprise customers. With customers in more than 60 countries and an intense focus on the customer experience, CenturyLink strives to be the world’s best networking company by solving customers’ increased demand for reliable and secure connections. The company also serves as its customers’ trusted partner, helping them manage increased network and IT complexity and providing managed network and cyber security solutions that help protect their business.


KeyInfo™ delivers the industry’s best systems by combining advanced technology services with the industry-leading products and resources. We focus on serving the needs of our clients in order to deliver bottom-line results and long-term business value.Meeting IT Challenges with Industry-Specific Solutions is something we work hard at every day. We serve a range of industries, and we’ve found that our clients all share an appreciation for systems that run reliably, perform beyond expectations, and contribute to the bottom line. Our technical skills, extensive multi-industry experience, and access to partners’ best-of-breed technology enables us to develop reliable, high performance technology solutions that deliver industry-specific business advantages.


Put simply, we are the company that is 100% focused on delivering secure access solutions for people, devices, things and services. For years, enterprises of every size and industry have been trusting our integrated virtual private network, network access control and mobile security solutions to enable secure access seamlessly in their organizations. Every single day, our global team are innovating our products to ensure that you can dramatically boost your workers' productivity, make a smooth and secure transition to the Cloud and ensure that your networks are protected without a burden on IT.


Trustwave helps businesses fight cybercrime, protect data and reduce security risk. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Trustwave enables businesses to transform the way they manage their information security and compliance programs. More than three million businesses are enrolled in the Trustwave TrustKeeper® cloud platform, through which Trustwave delivers automated, efficient and cost-effective threat, vulnerability and compliance management. Trustwave is headquartered in Chicago, with customers in 96 countries.

2017 Reception Sponsors


Okta is the foundation for secure connections between people and technology. Our IT products uniquely use identity information to grant people access to applications on any device at any time, while still enforcing strong security protections. Our platform securely connects companies to their customers and partners. Today, thousands of organizations trust Okta to help them fulfill their missions as quickly as possible.


Ruckus Wireless, now part of Brocade, delivers simply better wireless for approximately 70,000 enterprise, service provider, government and small business customers worldwide. The company is focused on technology innovation, partner ecosystems and customer service—yielding the best possible wireless experience for the most challenging indoor and outdoor environments. Its Smart Wi-Fi platform delivers scalable, high-performance Wi-Fi with simplified control and management for on-premise and cloud-based Wi-Fi deployments, along with new services for secure on-boarding, policy management, location services and analytics that enable new business opportunities.

2018 Silver Sponsor


VMware, a global leader in cloud infrastructure and digital workspace technology, accelerates digital transformation by enabling unprecedented freedom and flexibility in how our customers build and evolve IT environments. With VMware solutions, organizations are improving business agility by modernizing data centers and integrating public clouds, driving innovation with modern apps, creating exceptional experiences by empowering the digital workspace, and safeguarding customer trust by transforming security.


2018 Presentation Sponsors


Cambium Networks makes it possible for service providers; enterprises; governmental and military agencies; oil, gas and utility companies; Internet service providers; and public safety networks to build powerful communications networks, reach users from 200 kilometers across mountain tops down to the last meter to their devices, and intelligently manage their business Wi-Fi infrastructure through end-to-end network visibility and actionable analytics.


Darktrace is the world’s leading AI company for cyber security. Created by mathematicians, the Enterprise Immune System uses machine learning and AI algorithms to detect and respond to cyber-threats across diverse digital environments, including cloud and virtualized networks, IoT and industrial control systems. The technology is self-learning and requires no set-up, identifying threats in real time, including zero-days, insiders and stealthy, silent attackers. Darktrace is headquartered in San Francisco and Cambridge, UK, and has over 30 offices worldwide.



ExaGrid's hyper-converged secondary storage for backup offers an integrated and unique landing zone and its scale-out architecture provides the fastest backup - resulting in the shortest fixed backup window, fastest local restores, offsite tape copies and instant VM recoveries while permanently fixing the backup window length, all with reduced cost.


We made a name for ourselves more than 20 years ago offering the most comprehensive, high-performance network access and switching products. Today, our worldwide customers are leveraging the combined power of Extreme to take their networks to the next level. So, if you still think “hardware” when you hear "Extreme," it's time to think again.


Fortinet provides top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric. Our unique security fabric combines purpose-built ASICs, an intuitive operating system, and applied threat intelligence to give you proven security, exceptional performance, and better visibility and control--while providing easier administration.


At Hewlett Packard Enterprise, we aim to be the industry's leading provider of hybrid IT, built on the secure, next-generation, software-defined infrastructure that will run customers' data centers today, bridge them to multi-cloud environments tomorrow, and power the emerging intelligent edge that will run campus, branch and Industrial IoT applications for decades to come. All delivered through a world class services capability.



Infoblox delivers Actionable Network Intelligence to enterprise, government, and service provider customers around the world. We are the industry leader in DNS, DHCP, and IP address management, the category known as DDI. We empower thousands of organizations to control and secure their networks from the core—enabling them to increase efficiency and visibility, improve customer service, and meet compliance requirements.



iT1 is a Global, Full-Service information technology solution provider headquartered in Scottsdale, Arizona with North American regional office locations in Illinois, Washington D.C., Toronto, and the United Kingdom. It was founded in 2003 with the idea of creating a value-added reseller (VAR) that combines business relationships with in-depth product knowledge to provide industry leading IT services and solutions.


At Logcalis we want to be a valuable partner for our customers, we want to provide opportunity for our employees, and contribute to our communities. And, like you, we know that the innovative use of information technology (IT) is one of the best strategies to achieve our business objectives.


Malwarebytes is the most trusted endpoint security company in the world. Malwarebytes proactively protects people and businesses against malicious threats, including ransomware, that traditional antivirus solutions miss. The company's flagship product uses signature-less technologies to detect and stop a cyberattack before damage occurs.


Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security protections. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications.



Ruckus Networks, an ARRIS company, is redefining connectivity around the globe. With our partners, we build secure wired and wireless access networks for organizations that place a premium on connectivity experiences for end-users as well as simplicity and lower-cost-per-connection for IT.


Scale Computing integrates storage, servers, and virtualization software into an all-in-one appliance based system that is scalable, self-healing and as easy to manage as a single server. The result is a data center solution that reduces operational complexity, allows a faster response to business issues, and dramatically reduces costs.


Based in Dallas, Texas, Sentinel IPS began as EcoNet.com, a web development firm founded in 1995. By the early 2000s, the company became a successful network security product reseller and developed its first intrusion prevention system. Sentinel IPS provides 24/7 network management, monitoring and stellar support. Sentinel IPS customers include Fortune 100 firms, government and municipal agencies, financial institutions, and small businesses.


Trans-West Network Solutions has been designing and implementing Enterprise and small business network solutions in Arizona and across the nation since 1981. As a full service provider of voice over IP and data solutions we offer the highest quality of products and unparalleled service. Our reputation for close partnerships, best of class design, installation and implementation set us apart from others. With our 24/7 Network Operation Center, Trans-West is always there for you.


2017 Agenda

Synopsis: Are you ready for the cloud, better yet is the cloud ready for you? In this keynote we'll examine some best practices in public cloud adoption, from hybrid to sole sourced, companies like PayPal are well down the road, and others knee-deep into the cloud journey and have some thoughts to share to better ready your organization. Areas we'll discuss include cloud adoption decisions from contract negotiation to container deployed apps, some immediate actions you can take to set your business for success by making informed and risk-based decisions. We'll dive into some key architectural elements, design considerations and security controls that should be top of mind with any evaluation of cloud adoption and deployment planning.

Johnson's Bio: Brian Johnson leads Information Security Platforms and Operations teams at PayPal, with tireless focus on maintaining customer trust while ensuring the security of more than $1B USD in transactions processed each day through globally deployed critical payment and corporate applications, data, and systems. Brian builds on over 20 years of experience in enterprise Information Technology across industries including Software, Government, eCommerce, Fintech and Financial Services. Known as an innovative, strategic thinker, Brian has a firm grasp of business-aligned application of technology and a track record of successes through lasting relationships with customers and partners, credibility with executives and boards, and respectful leadership of high performing experts in their craft to solve critical business challenges. He is recognized for his ability to build and lead teams with diverse and deep technical expertise through wonderful successes, along with learnings from some outstanding failures, on portfolios of broadly complex and highly visible initiatives.


Digital transformation is changing the game for today’s business and has become a top initiative for business and IT leaders. Learn why having a digital transformation strategy for your business is crucial in today’s ever-changing voice technology landscape.

Abbott's Bio: A seasoned executive with more than 30 years of experience in the computing, networking, and business communications industries, Todd Abbott is a customer-focused leader with a keen ability to develop go-to-market strategies, sales models, and channel programs and to drive an execution-focused culture. In his role as Mitel’s Executive Vice President of Global Sales, Todd oversees Mitel’s global sales operations, including cloud and enterprise sales and channel programs.


The threat from the internet has changed considerably over the last 15 years. What started as attempts to learn more about the way systems worked has now turned into a business and is done for financial gains. See how a SIEM can help detect, respond to and mitigate these attacks.

Rosas's Bio: COMING SOON...


Managing and extracting value from ever-growing data repositories is a critical success factor for organizations everywhere. But the reality of storage has meant that achieving this goal comes with a high degree of complexity and cost as well as unreliable performance. Fortunately, a new reality of storage has arrived, one that is built around flash instead of disk, and which redefines industry norms around performance, complexity and cost. Imagine buying half the amount of enterprise storage yet getting dramatically more performance coupled with an iPhone-like level of operational simplicity. Pure Storage has delivered this through the industry's most granular and complete data reduction to reduce the amount of storage required, in combination with a unique new storage model called Evergreen Storage. Highlights include: 1) Driving efficiency with deep data reduction for mixed workloads, 2) Upgrading without any disruption or performance degradation, 3) Enabling in-place upgrades with no forklift migrations, 4) Preserving investment with no re-purchasing or increase in out-year maintenance costs.

Ronzio's Bio: Ralph Ronzio serves as the Systems Engineering Leader for the desert mountain territory at Pure Storage, where he leads a team of pre-sales engineers focused on the continued disruption of the storage industry. Previously, Ralph held many technical and leadership positions over his 15+ year career in Technology. Ralph would describe himself as a lover of all things tech and is currently focused on preparing his SE team for the next wave of technology disruption around Artificial intelligence & Machine learning.


Finding your organization at the center of a data heist used to be the burden of enterprise IT, but in today’s data-centric world, no business is safe. IT security incidents have nearly doubled since 2011, according to PricewaterhouseCoopers, and concern among small and midsize businesses has risen alongside this risk. Join us to learn more about Carbonite’s newest additions to their arsenal – EVault & DoubleTake. We’ll also cover best practices for backing your data and how you can take your defenses to the next level with DRaaS.

Seeley's Bio: COMING SOON...


iT1 was established in 2003 with the goal of becoming a leading provider of Information Technology products, services, and solutions. iT1 has reached and surpassed that goal by incorporating a relatively simple strategy that many of our contemporaries have missed. What is this simple strategy, you ask? Come find out.

Herrera's Bio: Wil Herrera is the Vice President of Professional Services for iT1 Source. In his 20+ years of experience he has managed IT departments, worked for manufacturers and now manages a team highly qualified engineers. Wil has certifications that range from Architecture/design to implementation engineer for many of the major Data Center Solutions companies a like Cisco, EMC, HP and VMWARE to name a few.

Schoepfle's Bio: Coming soon...


Security is always top of mind among IT professionals responsible for the security of their organizations. It’s critical that they ask themselves if they are prepared to face the threats. Join the session and find out what to do to implement the right strategies for defense.

Malacko's Bio: Jason Malacko manages the security practice at Logicalis where he is responsible for security technical architecture and enablement. He is a certified information system security professional (CISSP) who combines two decades of experience in network and systems infrastructure engineering with an extensive background in information security and unified IP networks.


In a world where cybercrime has become commoditized and both large corporations and small businesses find themselves frequently beset by malware, being able to thread security devices together to assemble an overall picture of what’s transpiring on your network will reduce your attack surface and response times while elevating your overall security posture. Key Takeaways: Learn about malware pathways and how to mitigate them, understand what technologies exist to examine the data streams entering and leaving your network, and see how various technologies working in concert can elevate your overall security posture.

Graun's Bio: Jason Graun is a Systems Engineering Manager and a member of the Office of the CTO. He has been with Fortinet since 2011. Jason has supported Fortinet’s largest carrier and MSSP customers as a Consulting Security Engineer. He brings nearly 20years of experience in IT having worked for a large international bank and several startups along the way. Jason’s focus is solving the problem of how to automate security to bridge the gap between cyberattacks and the needs of business drivers.


Zerto - the leader in hypervisor-based replication for Business Continuance/Disaster Recovery. Only Zerto Virtual Replication provides orchestration and automation of the entire recovery process regardless of underlying storage, hypervisor or cloud platform, which greatly reduces infrastructure and management costs. We provide our customers with RPO’s of seconds and RTO’s of minutes for their critical applications that require continuous availability and help to maintain HIPAA, PCI, SOX Compliancy.

Feinglass's Bio: Nearly 17 years in Solution Engineering for Managed Hosting, Data Center, Business Continuity and Disaster Recovery services. Outstanding record of achievement assisting sales staff in meeting and exceeding quota attainment at Comdisco, SunGard and Latisys. 20 years in the IT industry overall, from Help Desk and Network Field Engineer to Systems Administrator, Voice and Data Network Manager, to Sales Support and Solution Engineering. Four plus years as a manager of a Solutions Engineering team for a National provider of Managed Services, Managed Hosting, Cloud and Data Center Services.


This roundtable is for executives with VIP badges ONLY. This year we will discuss the topic of The Balance of Business in Technology & Security hovering around the big question; Are we going too far and not taking into account the business goals?. This session is intended for audience participation so be ready to discuss, receive valuable information, and connect with others for further discussion.

Hennessy's Bio: Joe Hennessy has 21 years in Information Technology, Business Operations and systems integrations development, with 11 of this in senior management. Currently he is the Systems and Technology Director for RideNow Powersports Management Group in Tempe AZ, the largest owner and operator of powersports dealerships in the USA and is considered to be one of the best run operations by industry leaders. Hennessy's latest achievements all revolve around finding ways to reduce operating costs of the I.T. department and all supporting systems while maintaining, and in many cases improving, customer satisfaction.


Disrupting the cyber attack chain is critical for organization’s looking to address external hacking, insider threats and hidden threats. In this session we will discuss cyber attack chain disruption to address the new vulnerability, privilege.

Schmitt's Bio: Global head of Enablement and Sales Engineering for BeyondTrust with nearly 20 years of security, identity and access management experience including RSA and Quest Software.


For hyperconverged infrastructure (or HCI), the importance of efficiency cannot be overstated. A hyperconverged vendor (or Cloud vendor, or converged vendor) is responsible for all of the architectural decisions that his customers would have made for themselves in the past. Learn how Scale Computing has developed an architecture that truly integrates servers, storage, and hypervisor from the bottom up including a uniquely simple, cluster-wide, tiered, hybrid storage pool. Turn your infrastructure to 11 with Scale!

McPhail's Bio: Matt McPhail is an IT, Storage, and Virtualization specialist, having worked as an Infrastructure Architect to build proven solutions for the past fifteen years. He currently serves in a leadership role as the Global Director of Systems Engineering at Scale Computing where his team assists clients with storage, IT, and virtualization needs across the globe.


The rate of change is progressing faster than ever. An information technology lifecycle used to be measured in decades and years. Today is seems like the cycle is changing by the moment. How do we keep up? How do you make the right decisions for your organization while balancing new technologies vs. the efficient life cycle of your existing environment? Cloud Computing offers great promise and yet it also creates confusion and hesitation. In this session, you will hear from AZ-based industry thought leader, Steve Greenberg of TCC, as he provides a new insight into the state of IT. Themes include Rapid Acceleration, Proprietary becoming Commodity, Hardware becoming Software, Storage becoming Flash, and, how to leverage Cloud approaches within your own data center. You will also hear from Chris Murray, IT Director of Arizona Tile about how he has been able to transform his Data Center and the technologies he deployed.

Greenberg's Bio: Steve Greenberg is the founder of Thin Client Computing LLC, a leading Virtual Data Center consulting group based in Scottsdale, AZ (since 1997). Mr. Greenberg is an internationally recognized expert, industry speaker and pioneer in advanced Virtualization solutions and Business Transformation. Reference Clients include American Express, Cox Communications, Mayo Clinic, ASU and Scottsdale Community College.


The term 'Threat Intelligence' is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network's defenses at the perimeter and allows administrators to gain more visibility on the inside.

Gruenloh's Bio: Ted has worked with web and network security technologies for more than 15 years. He began his career in technology as a full-stack engineer in web development and design. As Director of Operations, Ted guides the overall development of Sentinel IPS, the CINS Active Threat Intelligence System, and all other supporting technologies. You may also find him presenting at a trade show or information security conference, spreading the word about shared threat intelligence.


How does your enterprise fit into the "big picture" of cyber security? What role does hacktivism, cyber crime, cyber espionage, and cyber war play in your threat profile? In this lecture, Dr. Kenneth Geers will explore all of these concepts and more. He will share his experience and insight from over 20 years in the U.S. Government, at NSA (on offense), NCIS (defense), and NATO (special teams). Further, Dr. Geers will analyze over a billion network security incidents detected by Comodo over the past year, from every country on Planet Earth, and discuss strategic trends in the cyber security landscape. Finally, Kenneth will field your questions on topics ranging from Alan Turing to Edward Snowden, the Cuckoo’s Egg to Stuxnet, and Washington to Beijing.

Geers's Bio: Kenneth Geers (PhD, CISSP) is a Comodo Senior Research Scientist based in Toronto, Canada. Dr. Geers is also a NATO Cooperative Cyber Defence Centre of Excellence (CCD COE) Ambassador, a Non-Resident Senior Fellow at Atlantic Council, an Affiliate with the Digital Society Institute-Berlin, a member of the Transatlantic Cyber Forum, and a Visiting Professor at Taras Shevchenko National University of Kyiv in Ukraine. Kenneth spent 20 years in the U.S. Government, with time in the U.S. Army, at NSA, NCIS, and NATO. He is the author “Strategic Cyber Security”, Editor of “Cyber War in Perspective: Russian Aggression against Ukraine”, Editor of “The Virtual Battlefield: Perspectives on Cyber Warfare”, Technical Expert to the “Tallinn Manual”, and author of many articles and chapters on cyber security. Follow him on Twitter: @KennethGeers.


Learn about how different methods of deduplication affect the performance of your backups and restores. As the data center continues to evolve leading backup software is bringing innovative features to virtualized environments. Certain architectures can help take advantage of these features without penalizing you with rehydration for deduplicated data. We will review how different methods can affect all aspects of your backup environment and explore which architectures can bring the best of both worlds.

Jung's Bio: Kyle Jung, Senior Systems Engineer at ExaGrid, has been providing technical support and training for almost 20 years. Prior to joining ExaGrid, Kyle worked at Intel as a technical marketing engineer and at EVault where he held a variety of roles including professional services trainer, training manager and sales engineer. Kyle holds a degree in computer science from California Polytechnic State University-San Luis Obispo

Synopsis: Digital transformation is all about creating new possibilities for your business. IT MUST shift its security capabilities in today’s high-speed, mobile-centric, digitally-enabled world. Solid security is not an option, it’s an essential, non-negotiable core capability. Yet, the reality of security architecture and security technology is that they are only as effective as the human-led system design, and the culture we develop in both IT AND the business.

Smith's Bio: Heman’s mission with VMware’s Advisory Services is helping clients clearly determine strategic focus, and then execute on their new Digital Transformation vision and goals. He works with customers to bring clarity and definition to their ideal IT model, and their execution strategies. He specializes in the challenges and changes needed in IT organizations and operations in today’s high-speed, digital business world. Heman has over 30 years of experience in business, IT and technology. Prior to joining VMware he was CEO of CayenneTech, a consulting firm for companies launching a CMDB initiative. Before leaving to found CayenneTech, Heman was the Director of Global IT and Data Center Operations for Altiris, leading a strategic initiative to adopt ITIL processes, and consolidate 17 corporate IT facilities into 4 global data centers. Heman has also led IT applications development teams, CRM initiatives and eServices programs for both Altiris, and Legato Systems. He owned his own reseller company from 1986 to 1996.


We’re at a moment of incredible acceleration and transformation in business. What can we do to meet the needs of business, regardless of size, with more features and functionality than traditional systems – with more flexibility and efficiency, while making the experience for the customer better than ever?

Costantino's Bio: Michael Costantino serves as the Regional VP of Sales, leading Vonage Business’ sales teams in the Southwest, including Arizona and Texas. Michael is responsible for leading his teams to educate businesses on the value of moving their business communications to the cloud. In his role, Michael provides consultation on how businesses can improve their workforce mobility and productivity with the latest IT solutions.


Hyper converged is one of the leading new data center architectures. How are vendors empowering the IT and end-users by correlating more information to simplify the application experience? From provisioning to trouble shooting to scaling – what does the future look like.

Croxford's Bio: Zach Croxford is a Senior Systems Engineer at Tintri where he educates customers and prospects on the benefits of enterprise cloud storage, automation/orchestration, and predictive analytics. Zach brings over 20 years of experience in IT having worked for consulting firms, large financial institutions, and an Arizona based general contractor.


When applications slow down, you’ve hit the app-data gap. Faster storage alone isn’t enough, because 54% of issues aren’t directly caused by storage. Attend our session to find out how to close the app-data gap. The Nimble Storage Predictive Cloud Platform leverages flash storage and the power of predictive analytics to deliver fast and reliable access to data. This approach closes the app-data gap and radically simplifies operations. InfoSightTM Predictive Analytics predict and prevent issues to help deliver greater than 99.9999% measured availability. Utilize a single multicloud architecture to flexibly deploy workloads on flash arrays, converged infrastructure, and the public cloud.

Sliney's Bio: Patrick Sliney is a Storage Architect for Nimble Storage. Sliney has over 19 years of storage and system integration experience, beginning in encryption and networking with the United States Air Force, then moving to primary storage and data protection. Today, Sliney's expertise focuses on designing highly efficient enterprise data storage management architectures, optimizing around performance, cost and capacity. This includes deep data analytics that run the full stack of storage, hypervisor, and application. His specialty is in understanding what drives the client’s business, and designing an efficient solution that includes the appropriate levels of application latency, reliability and data protection in order to build a foundation for highly efficient data centers and private cloud architectures. He can be followed @pjsliney


Explore the many parallels between Game of Thrones and modern cybersecurity and use them to teach valuable lessons for today’s security practitioners. From the White Walkers to the Wall, Orion will explain security via everyone’s favorite Westerossian characters. Parts of this presentation have also been featured in a series Orion wrote for Dark Reading.

Cassetto's Bio: Orion Cassetto, Sr. Product Marketing Manager at Exabeam, has nearly a decade of experience marketing cybersecurity products. Prior to Exabeam, Orion worked for other notable security vendors including Imperva, Incapsula, Distil Networks, and Armorize Technologies. He is a security enthusiast and frequent speaker at conferences and tradeshows, with recent speaking engagements including SXSW interactive and Joomla World Conference.


The lure behind backing up directly to the cloud is simple: cost effective, pay as you go and grow, intuitive dashboard and controls, and no hardware. All of these eye catching pro’s could lead you to forget the most important con when relying solely on backing up to the cloud….RECOVERY. This webinar will show you how to make the right cloud backup decision based on real life scenarios.

Snook's Bio: A lifelong learner and passionate IT problem solver, Jason grew up along the ‘not-so-sunny’ coast of Oregon and proud to be a native Oregonian. After chasing dreams in the Air Force he found a passion for technology and problem solving that lead him from coast to coast. 20 years later he’s happy to call Oregon home once again. Jason’s desire to excel in Information Technology began as a young system administrator working towards replacing IBM mainframes with the new and very ‘reliable’ Windows systems. 15 years later he found himself with a background that started in Systems ...led him towards Network Engineering …then onto Security …and finally back to Systems. He has had the joy of leading and guiding an IT Department and working with customers as a solution provider. He’s proud to say his background in Information Technology is broad and he’s always looking for the next technical challenge. Jason resides in Eugene Oregon and is the ‘cool dad’ of two busy-bodied young boys. He spends free time teaching boys to be boys, riding and racing mountain bikes, and organizing bike events that bring the everyday riders together.


This discussion will incorporate why go, where is the struggle, lessons learned, and what to rethink after going into the cloud. This roundtable is for executives with VIP badges ONLY. Brian Johnson will introduce and begin discussion on the above topics. This session is intended for audience participation so be ready to discuss, receive valuable information, and connect with others for further discussion.

Johnson's Bio: Brian Johnson leads Information Security Platforms and Operations teams at PayPal, with tireless focus on maintaining customer trust while ensuring the security of more than $1B USD in transactions processed each day through globally deployed critical payment and corporate applications, data, and systems. Brian builds on over 20 years of experience in enterprise Information Technology across industries including Software, Government, eCommerce, Fintech and Financial Services. Known as an innovative, strategic thinker, Brian has a firm grasp of business-aligned application of technology and a track record of successes through lasting relationships with customers and partners, credibility with executives and boards, and respectful leadership of high performing experts in their craft to solve critical business challenges. He is recognized for his ability to build and lead teams with diverse and deep technical expertise through wonderful successes, along with learnings from some outstanding failures, on portfolios of broadly complex and highly visible initiatives.


Enterprise IoT devices are projected to more than triple in the next five years. This presentation will share key findings from ForeScout’s IoT Enterprise Risk Report, show how some of the enterprise IoT devices can hacked and explain what security professionals need to understand about their vulnerabilities.

Underwood's Bio: Pete Underwood has been in the Information Technology field for over 20 years, working in both the commercial and public sector. For the past seven years, Pete’s focus has been on IT Security, with a specialization in access controls. He has designed and deployed large scale access control initiatives for several Fortune 500 companies and public sector agencies. Pete spent the first 16 years of his career on the customer side, primarily in the healthcare industry. Prior to joining the ForeScout team in October of 2016, Pete held solution consultant and sales engineering positions at Juniper Networks and Kudelski Security.


Today’s organizations need to innovate and be more agile than ever before, and it’s up to IT to provide a portfolio of cloud like services to meet these new business demands. That is a complex and costly proposition to IT - all the while supporting the traditional data center - leaving executives to question: Why can’t our virtualization team alone provision and deploy resources as needed? What would I need to roll out my own service portal – safely? What is DevOps and are there business advantages to DevOps adoption? Attend our session to learn the answers and how NetApp SolidFire’s all-flash storage can enable your cloud services.

Ballin's Bio: COMING SOON...


Join us for a discussion that might scare you a bit. We’ll discuss the greatest threat to our corporate data and users…mobility. But we all know that being mobile is no longer an option so…what do we do as IT professionals to have both?

Tokeshi's Bio: Roy A. Tokeshi or "rat" became fascinated with technology beginning with his family's first Pong game and continued with programming his "Big Trak" electronic vehicle. His college years included a long and deeply tragic love triangle with his IBM PCjr and Fortran. He began working with a Citrix partner in the '90s converting NT 3.51 based Citrix WinFrame to MetaFrame and continued working with the nascent cloud or application service provider (ASP) industry. Since then he has fallen for cloud infrastructure, IoT, node.js, and Kali Linux on the Raspberry Pi 3 and Chromebooks. You can find him in Phoenix getting beaten in chess by his six kids..


Learning Objectives: 1) Identify the most logical path to DCIM implementation through the DCIM Maturation Model, 2) Learn about the elements of a successful DCIM strategy and game plan, 3) Accurately assess DCIM offerings and vendor solutions through objective measurements, questions and metrics that are in alignment with your requirements, and 4) Analyze successful DCIM methodologies to help avoid common pitfalls and mistakes in current and new DCIM implementation.

James's Bio: Chris is an innovative consultant with a 25 plus year track record in Data Center Technologies consulting on new builds, upgrades and retrofits. Chris has helped numerous Fortune 1000 companies as well as SMBs, Post and Broadcast organizations to navigate the complex design and decision-making process regarding best DCIM (Data Center Infrastructure Management) practices.


Patch and read your logs: a two-step method to limit organization exposure to threats of all kinds. To avoid exposure and improve security posture, organizations must put efforts to find the vulnerabilities, understand the attack susceptibility, patch quickly, and read logs to see if anyone has tried to exploit them.

Quist's Bio: COMING SOON...


Hyper-converged infrastructure has a spotlight shining brightly on it. Expectations are high, but what about the performance? Has the performance been able to keep up with the expectations? Come to the Pivot3 session and learn what hyper-converged is supposed to do.

Atwood's Bio: Kyle Atwood is a Storage Architect at HP. Specializing in designing, and deploying SAN in existing or new IT environments. Based in Phoenix Arizona, Mr. Atwood takes control over the processes, and deployments in the South West corner of the USA. Prior to HP/LHN Mr. Atwood, was the SE for strategic alliances at Asigra. oversaw and managed the communication between alliances and Asigra world wide. In this capacity, he is able to align hardware and software alliances to provide the desired outcome. Making business solutions that are profitable by all who are involved. Prior to Asigra, Mr. Atwood was the Storage Product Manager for MPC corp. In that capacity, Mr. Atwood was responsible for the development, planning, launch, and management of all data storage related items. Having successfully launched many products, Mr. Atwood was also responsible, then, for the education and presentation of the products to Account Executives, C level management, and end user alike. Presentation and education have been a focus point in his career. Continuously finding that the S in SE should be Sales, Mr. Atwood know how to make technology sales to any level. Technical System/Sales Engineering is his passion and specialty.


Discussions, sessions, exhibits, networking, connecting. After a long day of learning and hearing let’s all come together and get the event highlights. Let’s discuss what we learned, debate, get clarification from the Governing Body on questions that weren't answered, and leave with a charge/purpose/ideas to take into your work.

Mapp's Bio: Mr. Mapp has more than 40 years of experience in the areas of information technology systems, applications, infrastructure support, customer support and consulting services. During that time he has held senior executive-level positions with companies such as IBM, InfoSpan and American Express as well as the position of Chief Information Officer for Honeywell and Advanced Micro Devices (AMD). In addition, Mr. Mapp served as CEO and President of the World Congress on Information Technology, a forum that is held every two years under the direction of the World Information Technology Services Alliance. He currently operates his own consulting company, Quality Service Solutions, providing various business and information technology services and assisting companies with their IT strategy. Fred has extensive experience developing and defining IT objectives and strategic plans and in the implementation of technology to support business requirements. He also has a strong background in outsourcing, data center efficiency, project and process management, six sigma and quality deployment. Fred has written white papers and articles on topics such as data center build versus by, the need of collaboration between business functions and cloud computing.


EXABYTE SCALE. FAST. SECURE. 12 NINES OF AVAILABILITY. Unstructured data is exploding at an exponential rate and is the lifeblood of every organization. In this discussion, we’ll explore how to store and share that data, at enormous scale, in a highly-secure, astonishingly reliable architecture using the Panzura scale-out file platform in conjunction with IBM’s Cloud Object Storage architecture. We’ll further explore accomplishing those objectives in a private cloud model with lightning-fast local accessibility. Come learn from the teams who have been the boots on the ground developing and implementing these solutions – and what’s coming next!

Morin's Bio: Lief Morin is KeyInfo’s founder and chief executive. His role is to ensure KeyInfo retains its technological leadership and remains focused on client satisfaction. Lief founded KeyInfo™ in 1999 and leads by example, helping KeyInfo receive recognition and numerous awards for their work as a leading value added reseller, managed services provider, and technology integrator. In 2004, Lief was recognized by the San Fernando Valley Business Journal’s “40 Under 40” list. Lief resides in Southern California and enjoys photography and martial arts.

Weise's Bio: Clayton Weise is the Director of Cloud Services at Key Information Systems, where he is responsible for designing, architecting, and implementing cloud solutions, managing production workloads, and using cloud resources in disaster recovery, clustering and hybrid (cloud and on-premise) infrastructure solutions.

Polf's Bio: Michele is a Global Cloud Solution Architect with IBM Cloud Object Storage. She has over 20 years of experience with systems architecture and implementation of global storage solutions for Fortune 100 customers. She has been with IBM Cloud Object Storage and previously Cleversafe for over 3 years providing cloud solutions for IBM COS’s largest and most strategic clients.

Harr's Bio: With more than two decades of industry experience, Harr joins the company after holding positions as vice president and general manager at Hewlett-Packard Enterprise (HPE), vice president at VMWare as well as a go-to-market leader and CEO of multiple start-ups, including cloud storage pioneer Nirvanix which he founded, Preventsys which was acquired by McAfee and storage networking leader Sanera which was acquired by McDATA/Brocade. While at HPE, Harr scaled the Americas cloud business 19X leveraging key GTM partners and generated over $1.5B in revenue in five years. He has extensive startup and Fortune 500 vendor experience across cloud, storage, security and networking. Harr received his MBA from the University of Maryland and a BA from Tulane University in Political Economy and Russian. He has four kids and lives with his wife and family in Los Gatos, CA.



Thomsen's Bio: With less than 10% of companies, globally, fully hosted in the cloud (UCaaS), the potential for the industry is unlimited, and I want to be part of that growth. Attitude determines altitude and I have the expertise and drive to change a company’s revenue growth, almost immediately. With me, a company can expect an instant offense and uptick in energy. Highlights of my career: Promoted six times in six years at iCore to increasingly challenging positions with an increase in earnings every year, Developed and promoted 30+ individuals to management/NAKA positions during my time at iCore; groomed one from an entry-level representative to a director in three years, Established offices in New York and Philadelphia for iCore, recruited and hired staff, and grew sales from zero to $10 million in less than 12 months, Turned around an under-performing team in Baltimore and, in three weeks, increased the average sales per representative from $12,500 to $132,000, and played a critical role in positioning iCore for a $92 million sale. My energy and enthusiasm enable me to outwork and outperform both internal and external competition and my product knowledge and sales skills have helped me become an elite sales professional.

Cash Bar: One (1) Complimentary Drink Voucher to the first 200 attendees available at the Registration Counters. Vouchers will be available after 1:00 pm.

2018 Exhibitors

Governing Body Members