• slidebg1
    WELCOME TO THE
    California
    Technology Summit

    LARGEST REGIONAL IT & SECURITY
    CONFERENCE IN ANAHEIM


    Be the first to know about "Innovations in IT & Security"

    Register for the 2018 summit!
  • slidebg3
    WIN THE DREAM VACATION YOU ALWAYS WANTED
    Attend our Conference to Enter our Grand Prize
    All of our attendees can get the chance to win a free trip & other giveaways!

Overview

The California Technology Summit will be held at May 2, 2018 at the Anaheim Convention Center in Ballroom E from 7am-4pm.

 

As we reach the 6th annual show, the California Technology Summit is the top leading IT & Security conference and exhibit hall in the state. Currently, over a thousand attendees, VIPs, and renowned speakers are brought together to network, advocate, and create opportunities for the IT & Security industry. With technology constantly changing, the need to build partnerships within your career is vital. With this year's focus on "Innovations in IT & Security," companies and guests will benefit learning innovative technology methods, discuss top industry topics, and make strong connections with those in your region. Further your career with attending the California Technology Summit today! REGISTER TODAY HERE.

 

Sponsors

We would like to thank our all of our sponsors for being a part of this year's California Technology Summit. From being a sponsor, you will be recognized for the education and mission your company contributes to our tradeshow, panels, and sessions. Many of our sponsors have been a part of our annual summit for many years and we are proud to support them. See below for all of the sponsors for the California Technology 2018 event.

 

2018 Sponsors

cambiumnetworks.com

Cambium Networks makes it possible for service providers; enterprises; governmental and military agencies; oil, gas and utility companies; Internet service providers; and public safety networks to build powerful communications networks, reach users from 200 kilometers across mountain tops down to the last meter to their devices, and intelligently manage their business Wi-Fi infrastructure through end-to-end network visibility and actionable analytics.

darktrace.com

Darktrace is the world's leading AI company for cyber security. Created by mathematicians, the Enterprise Immune System uses machine learning and AI algorithms to detect and respond to cyber-threats across diverse digital environments, including cloud and virtualized networks, IoT and industrial control systems. The technology is self-learning and requires no set-up, identifying threats in real time, including zero-days, insiders and stealthy, silent attackers. Darktrace is headquartered in San Francisco and Cambridge, UK and has over 32 offices worldwide.

datrium.com

Datrium is central to the future of enterprise storage. As flash and disk media progress, they both require large, loggy writes. Also, write amplification in lower-cost SSDs is reduced by an order of magnitude leading to better durability based larger log writes with deduplication and compression inline, like Data Domain. There are many storage companies, but only one Datrium.

exagrid.com

ExaGrid's hyper-converged secondary storage for backup offers an integrated and unique landing zone and its scale-out architecture provides the fastest backup - resulting in the shortest fixed backup window, fastest local restores, offsite tape copies and instant VM recoveries while permanently fixing the backup window length, all with reduced cost.

extremenetworks.com

We made a name for ourselves more than 20 years ago offering the most comprehensive, high-performance network access and switching products. Today, our worldwide customers are leveraging the combined power of Extreme to take their networks to the next level. So, if you still think “hardware” when you hear "Extreme," it's time to think again.

hpe.com

At Hewlett Packard Enterprise, we aim to be the industry's leading provider of hybrid IT, built on the secure, next-generation, software-defined infrastructure that will run customers' data centers today, bridge them to multi-cloud environments tomorrow, and power the emerging intelligent edge that will run campus, branch and Industrial IoT applications for decades to come. All delivered through a world class services capability.

malwarebytes.com

Malwarebytes is the most trusted endpoint security company in the world. Malwarebytes proactively protects people and businesses against malicious threats, including ransomware, that traditional antivirus solutions miss. The company's flagship product uses signature-less technologies to detect and stop a cyberattack before damage occurs.

 

netmotionsoftware.com

NetMotion’s software improves the performance, security and visibility of your mobile workforce. It accelerates, optimizes, secures and monitors all network traffic to mobile devices empowering organizations with uncompromised mobile user and IT management experiences across any network or operating system. Enterprises from around the world depend on us for improved operational efficiency, end-user productivity and clear visibility across all networks - even those outside the firewall. Our customers realize their time-to-value in days not months.

 

www.okta.com

Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security protections. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications.

 

quorum.net

Quorum's hybrid cloud data recovery platform virtually eliminates business downtime while drastically reducing data protection cost and complexity. Effortless to deploy and manage, Quorum's industry-leading Disaster Recovery as-a-Service (DRaaS) technology makes it possible for businesses to achieve instant, cost-effective data protection and resume operations within minutes of a server failure - with a single click.

 

ruckuswireless.com

Ruckus Networks, an ARRIS company, is redefining connectivity around the globe. With our partners, we build secure wired and wireless access networks for organizations that place a premium on connectivity experiences for end-users as well as simplicity and lower-cost-per-connection for IT.

 

scalecomputing.com

Scale Computing is the industry leader in complete hyperconverged solutions with thousands of deployments spanning from the SMB to the distributed enterprise. Driven by patented technologies, HC3 systems install in minutes, can be expanded without downtime, self-heal from failures, and automatically optimize workloads to maximize price-performance.

telesoft-technologies.com

Telesoft Technologies works with global network operators and ISP's providing continuous real time network indicators of compromise to help Cyber Defence and Network Security teams focus their time and resources to protect network assets and brand.

tpx.com

TPx Communications (tpx.com) is the premier national managed services carrier, offering Unified Communications, Managed IT services, continuity and connectivity solutions nationwide, all with guaranteed performance.

Agenda IN PROGRESS

Synopsis:

This session will cover the key characteristics of "great" Wifi, what to consider when evaluating Wifi, some common pitfalls to avoid during planning and design, how to securely on-board mobile devices and finally look toward the future of wifi including 802.11AC Wave 2 and beyond!

Lahm's Bio: Kevin Lahm is a Ruckus veteran with over 6 years as a senior field sales engineer designing and deploying wireless networks ranging from large public venues, school districts, and enterprise. Kevin has been a Network Engineer for over 25 years and has over 18 years of experience in Wireless Technologies.

Synopsis:

Are you tired of fighting fires, spending countless time troubleshooting infrastructure, and having to deal with problems that come out of nowhere? What if artificial intelligence (AI) can watch over your infrastructure and predict and prevent problems before your business can be impacted? If that sounds good to you, then this is a webinar you can’t afford to miss. Learn how HPE InfoSight gets you out of the heat and eliminates disruptions and wasted time through cloud-based predictive analytics and machine learning. We’ll show you how HPE InfoSight is making infrastructure autonomous. Specifically, how it: predicts and prevents issues across the infrastructure stack, makes infrastructure smarter and more reliable, and eliminates the guesswork in managing infrastructure.

Leewood's Bio: COMING SOON...

Synopsis:

During this presentation, you'll learn what to look for in a hyper-converged secondary storage for backup solution to ensure you get the fastest backups for the shortest backup window, fastest restores, instant VM recoveries in seconds to minutes, a fixed length backup window even as data grows, and fast, reliable offsite disaster recovery.

Harlan's Bio: Kevin Harlan, Senior Systems Engineer with ExaGrid, has been providing pre-sales and technical support for customers and strategic partners for over 20 years. Prior to joining ExaGrid, Kevin worked at Quantum as a systems engineer for the company’s Media and Entertainment Division, and he spent several years at DataDirect Networks as a pre-sales engineer focused on data management in life sciences...

Synopsis:

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network - before they turn into a full-blown crisis. Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat. Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources. In this session, learn: 1) How new machine learning and mathematics are automating advanced cyber defense, 2) Why full network visibility allows you to detect and autonomously respond to threats, 3) How smart prioritization and visualization of threats allows for better resource allocation and lower risk, and 4) Real-world examples of unknown threats detected by ‘immune system’ technology.

Rische's Bio: Victoria Rische is a manager at Darktrace, the world’s leading AI company for cyber-defense. She has helped numerous companies, across all industries and sizes, deploy Darktrace’s advanced AI for cyber defense. The technology’s early threat detection, coupled with its autonomous response capabilities, enable companies to take a more proactive approach to cyber security, fighting back against insider threat, ransomware, and low and slow attacks in real time. While she has been with Darktrace, the company was named a Wall Street Journal “Top 25 Company to Watch” and experienced a 3x increase in US customers. Rische is based out of the company’s headquarters in San Francisco, CA.

Synopsis:

This roundtable is for executives with VIP badges ONLY. This year we will discuss the topic of The Balance of Business in Technology & Security hovering around the big question; Are we going too far and not taking into account the business goals?. This session is intended for audience participation so be ready to discuss, receive valuable information, and connect with others for further discussion.

Speaker's Bio: COMING SOON

Synopsis:

There are massive benefits businesses can win with new Unified Communications and Collaboration, extending far beyond simple cost savings that drive many businesses to install them. Often, once deployed, they find realizing ROI on their investments challenging, typically due to lack of adoption. The key is getting individuals and teams to use the capabilities in their daily business processes, which begins with an understanding of what those capabilities are and how they will benefit users and teams. What are these key features and capabilities that can drive productivity and revenue opportunities? How can you ensure your teams are enjoying the benefits? Choosing the right solution is only the beginning – this session will guide you to ROI... what happens after installation to create real business value.

Anderson's Bio: Trey Anderson is a Technology Evangelist for TPx’s UCaaS Line of Business. Tasked with being a catalyst that ignites growth within UCx's suite of communication and collaboration solutions for businesses, he brings into his role nearly 2 decades of industry experience. Trey travels across the country preaching the 3 legs of the Unified Communications stool and how that Support, Access, and LAN Management must all three be addressed for a UC solutions to be effective and PROFITABLE. As an accomplished Motivational Speaker and previous Agency Founder and Owner, Trey brings an unrivaled passion and enthusiasm to the UC space that fosters the adoption and integration of UCaaS by MSPs, MSC’s, and other industry organizations. Previous to joining the TPx Team, Trey co-founded and owned his own Telecommunications Agency for 12 years and was a highly decorated sales and management professional at Cbeyond and MCI Communications. He graduated from the University of Oklahoma with a Bachelor of Science degree.

Synopsis:

Scale Computing’s HC3 is the IT virtualization infrastructure platform that is changing the way IT runs from the ground up. Combining servers, storage, hypervisor, and backup/DR, HC3 is helping IT administrators transform their infrastructures to be more scalable, more highly available, and more affordable. Simplicity is the not-so-secret ingredient in HC3 delivering savings over traditional infrastructure solutions and the hyperconverged competition. HC3 and the HyperCore architecture were designed to provide highly available, scalable compute and storage services while maintaining operational simplicity through highly intelligent software automation and architecture simplification. HyperCore puts intelligence and automation in the software layer and was designed to take advantage of low cost, easily replaceable and upgradable “commodity” hardware components including the virtualization capabilities built into modern CPU architectures.

Ruiz's Bio: John Ruiz is an IT specialist, having worked in multiple industries ranging from Banking to Manufacturing to Education. John has served in many roles in the IT industry range from Network Engineer to the VP of IT. John has been building secure stable infrastructures for over 15+ years.He currently serves in a role as a Systems Engineer at Scale Computing where he assists customers with designing converged infrastructures using Scale Computing’s HC3 Hyper-Converged solution across the entire West Coast.

Synopsis:

Dave Moore with Cambium Networks will discuss trends in WiFi from a vendor-agnostic standing. What is the state of WiFi today and how did we get here? What can we expect from WiFi tomorrow and the next couple years? We will discuss the possibilities as well as the realistic limitations of WiFi.

Moore's Bio: Wireless Veteran with 20+ year experience. Dave previously held management positions at Extreme Networks and Ruckus; at Ruckus he managed the engineers worldwide. The start of his Wireless career was at Motorola supporting the Canopy and PtP solutions you know today as Cambium Networks. Talk about an amazing career coming back full circle! Not only is Dave a Wi-fi guru, he specializes in Hospitality, Stadium, Smart City and Education verticals.

Synopsis:

COMING SOON

Speaker's Bio: COMING SOON

Synopsis:

Your network and the quantity of data it carries is increasing everyday. Whilst this is a growing issue in a medium sized enterprise, at a national scale running a network that joins IoT, CNI, finance and media across mobile consumers this can mean the difference between having visibility of threats and network behavior, or being blind. This session will introduce some of the techniques that can be used at the very large network scale for agile, low latency threat hunting and incident response, including combining flow information generated from firewalls, intrusion prevention systems, gateways, routers and dedicated flow exporters with selective session record and an eco-system of threat intelligence.

Patton's Bio: Steve Patton has over 20 years of experience in networking and associated technologies, having spent several years in senior level roles with industry leaders such as Intel and Dialogic. Steve has spoken all across the world and is highly sought after for his knowledge in the areas of IP flow monitoring, data visualisation, analytics and cyber security. His background expands senior sales, engineering, training, and a number of marketing positions.

Synopsis:

Global shift to cloud-first, mobile-first bi-modal IT is fundamentally changing the security landscape. Traditional perimeter- and network-centric approaches fail to mitigate against attacks like phishing and social engineering causing majority of data breaches. Meanwhile, enterprises are extending their applications and data access beyond employees and contractors to partners, customers and APIs to create new value chains. Learn how leading enterprises secure these new ecosystems by rethinking the use of identity as the new security perimeter.

Speaker's Bio: Jeremiah is a Solutions Architect / Sales Engineer for Okta. He has over a decade of experience in IT Security from both the corporate side and most recently in pre-sales capacity for Okta. Jeremiah's past experience includes IT Security Consulting, Lead Systems Administrator and Professional Services Lead. Because of his multi faceted experience he brings a wealth of knowledge in IT Security both on the customer side and as technical sales person. He is here today to talk about how Okta and its various products can make accessing all of your software entitlements easier and more secure both from the perspective of an IT Admin and more importantly as an end users. You can find him on his social media, @Jeremiah Kear.

Synopsis:

This roundtable is for attendees for executives with VIP badges ONLY. During this lunch event we will discuss and debate how IT security systems and processes are expanding and changing as companies move all or some of their applications and/or systems to the cloud; and what role if any IT needs to play in providing security for the companies internal and external IOT devices. This session is intended for audience participation so be ready to discuss, receive valuable information, and connect with others for further discussion.

Speaker's Bio: COMING SOON...

Synopsis:

Gone are the days that IT staff want to configure, manage and troubleshoot their infrastructure. IT administrators demand simplicity; all that matters is that applications run simply, reliably and fast. Hyperconverged Infrastructure (“HCI”) took a first step towards enabling this new computing paradigm, which according to Gartner will reach $10 Billion in sales by 2021. The next step is Open Converged Infrastructure (“OCI”), which provides a powerful, cost-effective yet simple approach to increasing system/application performance under increased workloads. This new breed of convergence is: Simplier than Hyperconverged without vendor lock-ins, faster than all flash arrays, and no backup silos.

Austin's Bio: Jeff Austin is a Senior Systems Engineers who is passionate about developing solutions for customers to simplify infrastructures and enhance responsiveness while increasing data availability. Jeff has an extensive background in IT for over 20+ years. He has worked as a Sr. Systems Administrator for a Fortune 250 company and was responsible for data management, protection, and Business Continuity. He has also worked at a leading SAN vendor, and most recently, at the market leading Hyperconverged (HCI) vendor. As the datacenter and cloud continues to evolve, Jeff joined Datrium to simplify the journey for customers to the hybrid cloud. You can follow Jeff Austin on twitter @jefferydaustin. Jeff Austin holds a B.A. in Information Systems from Cal State University of Fullerton.

Synopsis:

Today’s fast-paced business demands that applications and data are highly available. Systems are required to be resilient to all types of outages. Achieving High Availability (HA) for your IT environment can be costly, complicated and can rely heavily on adding to your server infrastructure. It’s time to reinvent how we build HA into our infrastructure. In this webinar, you will learn how Quorum HA Anywhere can help protect systems of all kinds, located anywhere, from downtime. We will show how to build an HA solution that can reside anywhere, on-prem, offsite, or in the cloud. Quorum HA Anywhere will change the way you think about highly available infrastructure designs.

Snook's Bio: Jason Snook is a lifelong learner and passionate IT problem solver from ‘not-so-sunny’ Oregon. He is the dad of two busy bodied young boys. He spends his free time with his sons, riding and racing mountain bikes, and organizing bike events that bring the everyday riders together. Jason holds the following active certifications: CISSP, Security+, CCNP, CCNA, VCP, and MCSA.

Synopsis:

As long as cybercriminals can make a profit, businesses and their data will always be a target. The past year saw the greatest breach in Internet history with WannaCry, but that may have been a drop in the bucket. Learn some of the biggest misconceptions about the threat landscape; see how attacks are being delivered; and why your company may be at risk—without you even knowing it.

Torgersen's Bio: Dana is a veteran product marketer who cut his teeth in network and data center security while at Secure Computing, McAfee, Palo Alto Networks, and security startup Illumio. He heads up Product Marketing for Malwarebytes, encouraging individuals and businesses to protect their endpoints against malware and exploit-based threats.

Synopsis:

Discussions, sessions, exhibits, networking, connecting. After a long day of learning and hearing let’s all come together and get the event highlights. Let’s discuss what we learned, debate, get clarification from the Governing Body on questions that weren't answered, and leave with a charge/purpose/ideas to take into your work.

Moderators's Bio: COMING SOON...

Speaker's Bio: COMING SOON

Speaker's Bio: COMING SOON

Speaker's Bio: COMING SOON

Speaker's Bio: COMING SOON

Synopsis:

In the current digital landscape, only 17% of enterprises have visibility into what's happening on their mobile devices. Data is now the baseline for enterprise decision making, but how is that information obtained, and what tools are needed to analyze it? As businesses continue to ride the wave of mobile transformation, monitoring each and every mobile moment to save costs and produce heightened ROI is essential. Companies who’ve gone mobile are dealing with extensive amounts of trouble tickets, device downtime and abandonment, and the ever-growing threat of a security incident via mobile breach. Join us to discuss: · Highlighting the challenges enterprises are facing when it comes to mobile data visualization · Turning vital information into business insights · Solving problems to ensure your organization makes smarter decisions

Bailey's Bio: John Bailey brings over 20 years of experience in the networking and security industry. John and his systems engineering team engage with end user customers on everything from software evaluations to installation, configuration, and training on all NetMotion products worldwide.

Cash Bar: One (1) Complimentary Drink Voucher to the first 200 attendees available at the Registration Counters. Vouchers will be available after 1:45 pm.

Exhibitors

Governing Body Members