• slidebg1
    Technology Summit


    Be the first to know about "Innovations in IT & Security"

    Register for the 2018 summit!
  • slidebg3
    Attend our Conference to Enter our Grand Prize
    All of our attendees can get the chance to win a free trip & other giveaways!


THANKS FOR COMING! The California Technology Summit was held on May 2, 2018 at the Anaheim Convention Center in Ballroom E from 7am-4pm.


As we reach the 6th annual show, the California Technology Summit is the top leading IT & Security conference and exhibit hall in the state. Currently, over a thousand attendees, VIPs, and renowned speakers are brought together to network, advocate, and create opportunities for the IT & Security industry. With technology constantly changing, the need to build partnerships within your career is vital. With this year's focus on "Innovations in IT & Security," companies and guests will benefit learning innovative technology methods, discuss top industry topics, and make strong connections with those in your region. Further your career with attending the California Technology Summit today! REGISTER TODAY HERE.



We would like to thank our all of our sponsors for being a part of this year's California Technology Summit. From being a sponsor, you will be recognized for the education and mission your company contributes to our tradeshow, panels, and sessions. Many of our sponsors have been a part of our annual summit for many years and we are proud to support them. See below for all of the sponsors for the California Technology 2018 event.


2018 Sponsors


Cambium Networks makes it possible for service providers; enterprises; governmental and military agencies; oil, gas and utility companies; Internet service providers; and public safety networks to build powerful communications networks, reach users from 200 kilometers across mountain tops down to the last meter to their devices, and intelligently manage their business Wi-Fi infrastructure through end-to-end network visibility and actionable analytics.


Darktrace is the world's leading AI company for cyber security. Created by mathematicians, the Enterprise Immune System uses machine learning and AI algorithms to detect and respond to cyber-threats across diverse digital environments, including cloud and virtualized networks, IoT and industrial control systems. The technology is self-learning and requires no set-up, identifying threats in real time, including zero-days, insiders and stealthy, silent attackers. Darktrace is headquartered in San Francisco and Cambridge, UK and has over 32 offices worldwide.


Datrium is central to the future of enterprise storage. As flash and disk media progress, they both require large, loggy writes. Also, write amplification in lower-cost SSDs is reduced by an order of magnitude leading to better durability based larger log writes with deduplication and compression inline, like Data Domain. There are many storage companies, but only one Datrium.


ExaGrid's hyper-converged secondary storage for backup offers an integrated and unique landing zone and its scale-out architecture provides the fastest backup - resulting in the shortest fixed backup window, fastest local restores, offsite tape copies and instant VM recoveries while permanently fixing the backup window length, all with reduced cost.


We made a name for ourselves more than 20 years ago offering the most comprehensive, high-performance network access and switching products. Today, our worldwide customers are leveraging the combined power of Extreme to take their networks to the next level. So, if you still think “hardware” when you hear "Extreme," it's time to think again.


At Hewlett Packard Enterprise, we aim to be the industry's leading provider of hybrid IT, built on the secure, next-generation, software-defined infrastructure that will run customers' data centers today, bridge them to multi-cloud environments tomorrow, and power the emerging intelligent edge that will run campus, branch and Industrial IoT applications for decades to come. All delivered through a world class services capability.


Malwarebytes is the most trusted endpoint security company in the world. Malwarebytes proactively protects people and businesses against malicious threats, including ransomware, that traditional antivirus solutions miss. The company's flagship product uses signature-less technologies to detect and stop a cyberattack before damage occurs.



NetMotion’s software improves the performance, security and visibility of your mobile workforce. It accelerates, optimizes, secures and monitors all network traffic to mobile devices empowering organizations with uncompromised mobile user and IT management experiences across any network or operating system. Enterprises from around the world depend on us for improved operational efficiency, end-user productivity and clear visibility across all networks - even those outside the firewall. Our customers realize their time-to-value in days not months.



Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security protections. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications.



Quorum's hybrid cloud data recovery platform virtually eliminates business downtime while drastically reducing data protection cost and complexity. Effortless to deploy and manage, Quorum's industry-leading Disaster Recovery as-a-Service (DRaaS) technology makes it possible for businesses to achieve instant, cost-effective data protection and resume operations within minutes of a server failure - with a single click.



Ruckus Networks, an ARRIS company, is redefining connectivity around the globe. With our partners, we build secure wired and wireless access networks for organizations that place a premium on connectivity experiences for end-users as well as simplicity and lower-cost-per-connection for IT.



Scale Computing is the industry leader in complete hyperconverged solutions with thousands of deployments spanning from the SMB to the distributed enterprise. Driven by patented technologies, HC3 systems install in minutes, can be expanded without downtime, self-heal from failures, and automatically optimize workloads to maximize price-performance.


Swimlane is a leader in security automation and orchestration (SAO). Our platform empowers organizations to manage, respond to and neutralize cyber threats with the adaptability and speed necessary to combat today’s rapidly evolving cyber threats. Swimlane maximizes the incident response capabilities of overburdened and understaffed security operations.


Telesoft Technologies works with global network operators and ISP's providing continuous real time network indicators of compromise to help Cyber Defence and Network Security teams focus their time and resources to protect network assets and brand.


TPx Communications (tpx.com) is the premier national managed services carrier, offering Unified Communications, Managed IT services, continuity and connectivity solutions nationwide, all with guaranteed performance.


Synopsis: In the County of Orange, information technology was generally managed in a decentralized fashion. As the Chief Information Security Officer, Jacob Margolis has been tasked with implementing enterprise-level strategies that safeguard the County’s information assets across multiple departments/agencies. Over the last two years as CISO, Mr. Margolis has overseen the development and implementation of multiple countywide cybersecurity initiatives. This includes the establishment of a County Cybersecurity Framework; interactive online Cybersecurity Awareness Training; a robust and tested Cyber Incident Response Process and Plan; adoption of next-generation AI technologies, and the execution of a robust governance Risk & Compliance (GRC) platform.

Margolis's Bio: Prior to joining the County, Mr. Margolis was the Information Assurance Manager for the California National Guard and California Military Department, where he oversaw the development and management of the California National Guard’s Cybersecurity program. During his service with the California National Guard, his assignments included Emergency Communications Plans Officer, Network Operations Manager and Systems Engineer for the Network Operations & Security Center. Mr. Margolis Certified Information Systems Security Professional (CISSP), earned a BS degree in Computer Applications and Networks and holds a Master’s Degree in Information Systems and Technology Management. Mr. Margolis has been a Commissioned Officer in the United States Army Reserve. He was deployed to New Orleans, LA, as part of the humanitarian relief efforts in the wake of Hurricane Katrina in 2005, and served two combat tours Afghanistan. The first deployment was in 2007 as an embedded trainer with the Afghan National Security Forces and the second was in 2013 as the Chief Communications Officer for a Coalition Joint Task Force charged with the turnover of military operations in Uruzgan Province to Afghan National Security Forces.


This session will cover the key characteristics of "great" Wifi, what to consider when evaluating Wifi, some common pitfalls to avoid during planning and design, how to securely on-board mobile devices and finally look toward the future of wifi including 802.11AC Wave 2 and beyond!

Lahm's Bio: Kevin Lahm is a Ruckus veteran with over 6 years as a senior field sales engineer designing and deploying wireless networks ranging from large public venues, school districts, and enterprise. Kevin has been a Network Engineer for over 25 years and has over 18 years of experience in Wireless Technologies.


From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network - before they turn into a full-blown crisis. Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat. Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources. In this session, learn: 1) How new machine learning and mathematics are automating advanced cyber defense, 2) Why full network visibility allows you to detect and autonomously respond to threats, 3) How smart prioritization and visualization of threats allows for better resource allocation and lower risk, and 4) Real-world examples of unknown threats detected by ‘immune system’ technology.

Rische's Bio: Victoria Rische is a manager at Darktrace, the world’s leading AI company for cyber-defense. She has helped numerous companies, across all industries and sizes, deploy Darktrace’s advanced AI for cyber defense. The technology’s early threat detection, coupled with its autonomous response capabilities, enable companies to take a more proactive approach to cyber security, fighting back against insider threat, ransomware, and low and slow attacks in real time. While she has been with Darktrace, the company was named a Wall Street Journal “Top 25 Company to Watch” and experienced a 3x increase in US customers. Rische is based out of the company’s headquarters in San Francisco, CA.


Are you tired of fighting fires, spending countless time troubleshooting infrastructure, and having to deal with problems that come out of nowhere? What if artificial intelligence (AI) can watch over your infrastructure and predict and prevent problems before your business can be impacted? If that sounds good to you, then this is a webinar you can’t afford to miss. Learn how HPE InfoSight gets you out of the heat and eliminates disruptions and wasted time through cloud-based predictive analytics and machine learning. We’ll show you how HPE InfoSight is making infrastructure autonomous. Specifically, how it: predicts and prevents issues across the infrastructure stack, makes infrastructure smarter and more reliable, and eliminates the guesswork in managing infrastructure.

Leewood's Bio: COMING SOON...


During this presentation, you'll learn what to look for in a hyper-converged secondary storage for backup solution to ensure you get the fastest backups for the shortest backup window, fastest restores, instant VM recoveries in seconds to minutes, a fixed length backup window even as data grows, and fast, reliable offsite disaster recovery.

Harlan's Bio: Kevin Harlan, Senior Systems Engineer with ExaGrid, has been providing pre-sales and technical support for customers and strategic partners for over 20 years. Prior to joining ExaGrid, Kevin worked at Quantum as a systems engineer for the company’s Media and Entertainment Division, and he spent several years at DataDirect Networks as a pre-sales engineer focused on data management in life sciences...


This roundtable is for executives with VIP badges ONLY. This year we will discuss the topic of The Balance of Business in Technology & Security hovering around the big question; Are we going too far and not taking into account the business goals?. This session is intended for audience participation so be ready to discuss, receive valuable information, and connect with others for further discussion.


Scale Computing’s HC3 is the IT virtualization infrastructure platform that is changing the way IT runs from the ground up. Combining servers, storage, hypervisor, and backup/DR, HC3 is helping IT administrators transform their infrastructures to be more scalable, more highly available, and more affordable. Simplicity is the not-so-secret ingredient in HC3 delivering savings over traditional infrastructure solutions and the hyperconverged competition. HC3 and the HyperCore architecture were designed to provide highly available, scalable compute and storage services while maintaining operational simplicity through highly intelligent software automation and architecture simplification. HyperCore puts intelligence and automation in the software layer and was designed to take advantage of low cost, easily replaceable and upgradable “commodity” hardware components including the virtualization capabilities built into modern CPU architectures.

Ruiz's Bio: John Ruiz is an IT specialist, having worked in multiple industries ranging from Banking to Manufacturing to Education. John has served in many roles in the IT industry range from Network Engineer to the VP of IT. John has been building secure stable infrastructures for over 15+ years.He currently serves in a role as a Systems Engineer at Scale Computing where he assists customers with designing converged infrastructures using Scale Computing’s HC3 Hyper-Converged solution across the entire West Coast.


There are massive benefits businesses can win with new Unified Communications and Collaboration, extending far beyond simple cost savings that drive many businesses to install them. Often, once deployed, they find realizing ROI on their investments challenging, typically due to lack of adoption. The key is getting individuals and teams to use the capabilities in their daily business processes, which begins with an understanding of what those capabilities are and how they will benefit users and teams. What are these key features and capabilities that can drive productivity and revenue opportunities? How can you ensure your teams are enjoying the benefits? Choosing the right solution is only the beginning – this session will guide you to ROI... what happens after installation to create real business value.

Anderson's Bio: Trey Anderson is a Technology Evangelist for TPx’s UCaaS Line of Business. Tasked with being a catalyst that ignites growth within UCx's suite of communication and collaboration solutions for businesses, he brings into his role nearly 2 decades of industry experience. Trey travels across the country preaching the 3 legs of the Unified Communications stool and how that Support, Access, and LAN Management must all three be addressed for a UC solutions to be effective and PROFITABLE. As an accomplished Motivational Speaker and previous Agency Founder and Owner, Trey brings an unrivaled passion and enthusiasm to the UC space that fosters the adoption and integration of UCaaS by MSPs, MSC’s, and other industry organizations. Previous to joining the TPx Team, Trey co-founded and owned his own Telecommunications Agency for 12 years and was a highly decorated sales and management professional at Cbeyond and MCI Communications. He graduated from the University of Oklahoma with a Bachelor of Science degree.


The security world is still trying figure out how to deal with the overwhelming number of security alerts and data deluge most SOCs are faced with and then turn them into intelligence that is useful and actionable. Throwing more people and tech at the problem has proven to be ineffective and costly. In this talk I walk through methods (that you can actually employ) to turn the tide in your favor and create a security team that proactively deals with threats.

Grigg's Bio: John Grigg has 12 years of diverse experience within the Navy, the Intelligence Community, and in the corporate cyber security world with focuses on building and maturing SOCs, SIEM/IDS/IPS engineering, malware analysis, and cyber operations.


Dave Moore with Cambium Networks will discuss trends in WiFi from a vendor-agnostic standing. What is the state of WiFi today and how did we get here? What can we expect from WiFi tomorrow and the next couple years? We will discuss the possibilities as well as the realistic limitations of WiFi.

Moore's Bio: Wireless Veteran with 20+ year experience. Dave previously held management positions at Extreme Networks and Ruckus; at Ruckus he managed the engineers worldwide. The start of his Wireless career was at Motorola supporting the Canopy and PtP solutions you know today as Cambium Networks. Talk about an amazing career coming back full circle! Not only is Dave a Wi-fi guru, he specializes in Hospitality, Stadium, Smart City and Education verticals.


This session will explore the threat landscape and help the mid-size enterprise set spending priorities on the innumerable choices available to the organization to combat the legions of black hats. If you determine the weight of the risks that are most likely to crawl into your industry and into your I.T. organization, you are almost certain to make the right decisions on where to focus your security dollar. We will use an extensive mind map to define the threat landscape and potential solutions in four buckets: • Threats • Consequences • Mitigation • Monitoring This will be an interactive session as we dive into each of these four areas and share our ideas and experience. Starting with a survey of common security threats, we will examine the consequences of failing to either recognize the threat or allot sufficient resources to successfully mitigate. And what about mitigation techniques? How do we identify threats that may reside within our network, be it on premise or in the cloud? We’ll look at data discovery, vulnerability assessments, audits, network controls, personnel controls, and even physical security. The focus will be on prevention rather than remediation. We should be putting the locks on the doors now rather than waiting until the inevitable burglar finds the unsecured space. What tools are available to prevent widespread outbreaks of malware and other nefarious agents? We will delve into the world of continuous security monitoring and try to find a solution at a reasonable price. Do we do it ourselves? How much does that cost? What outsourcing solutions might assume the burden of continuous monitoring? Which acronym will provide the ultimate solution? MSSP, MDR, CISSP?


Your network and the quantity of data it carries is increasing everyday. Whilst this is a growing issue in a medium sized enterprise, at a national scale running a network that joins IoT, CNI, finance and media across mobile consumers this can mean the difference between having visibility of threats and network behavior, or being blind. This session will introduce some of the techniques that can be used at the very large network scale for agile, low latency threat hunting and incident response, including combining flow information generated from firewalls, intrusion prevention systems, gateways, routers and dedicated flow exporters with selective session record and an eco-system of threat intelligence.

Patton's Bio: Steve Patton has over 20 years of experience in networking and associated technologies, having spent several years in senior level roles with industry leaders such as Intel and Dialogic. Steve has spoken all across the world and is highly sought after for his knowledge in the areas of IP flow monitoring, data visualisation, analytics and cyber security. His background expands senior sales, engineering, training, and a number of marketing positions.


The global shift to cloud-first, mobile-first, bi-modal IT is fundamentally changing the security landscape. Traditional perimeter and network-centric approaches lack the agility needed to support business needs and fail to prevent attacks such as phishing and social engineering, which are the cause of most data breaches. Meanwhile, users are more mobile, and enterprises are extending their applications and data access beyond employees and contractors to partners. Join Zscaler and Okta to learn how leading enterprises are rethinking security, using identity as the new security perimeter for enforcing user-centric security policies and zero-trust model access.

Speaker's Bio: Jeremiah is a Solutions Architect / Sales Engineer for Okta. He has over a decade of experience in IT Security from both the corporate side and most recently in pre-sales capacity for Okta. Jeremiah's past experience includes IT Security Consulting, Lead Systems Administrator and Professional Services Lead. Because of his multi faceted experience he brings a wealth of knowledge in IT Security both on the customer side and as technical sales person. He is here today to talk about how Okta and its various products can make accessing all of your software entitlements easier and more secure both from the perspective of an IT Admin and more importantly as an end users. You can find him on his social media, @Jeremiah Kear.


In an industry that’s already defined and continually renewed by innovation, Extreme Network’s Automated Campus is one of the most significant advances in campus networking and even for networking IT overall. For the first time, all of the essential technologies, products, procedures, services, and support are gathered together and integrated under a single, comprehensive envelope that is already yielding notably improved performance, security, and reliability for mission-critical networks across even the largest organizational settings – campuses and beyond. Automated Campus significantly reduces the time required to implement and manage an enterprise network as well as the time required to isolate and resolve issues. With multiple layers of embedded security and full edge-automation it significantly improves IT personnel’s ability to streamline operations.


This roundtable is for attendees for executives with VIP badges ONLY. During this lunch event we will discuss and debate how IT security focusing on access approval and access review. This session is intended for audience participation so be ready to discuss, receive valuable information, and connect with others for further discussion.

Kelly's Bio: Raymond Kelly has a solid career history in IT leadership. He has a consistent track record of staying on or under budget in addition to meeting service delivery objectives. Kelly best demonstrates the ability to direct enterprise-wide infrastructure projects, optimizing business operations, elevating efficiency, and improving quality while simultaneously reducing cost. Able to function in both strategic and hands on roles, Kelly is successful at motivating and retaining staff.


As long as cybercriminals can make a profit, businesses and their data will always be a target. The past year saw the greatest breach in Internet history with WannaCry, but that may have been a drop in the bucket. Learn some of the biggest misconceptions about the threat landscape; see how attacks are being delivered; and why your company may be at risk—without you even knowing it.

Torgersen's Bio: Dana is a veteran product marketer who cut his teeth in network and data center security while at Secure Computing, McAfee, Palo Alto Networks, and security startup Illumio. He heads up Product Marketing for Malwarebytes, encouraging individuals and businesses to protect their endpoints against malware and exploit-based threats.


Gone are the days that IT staff want to configure, manage and troubleshoot their infrastructure. IT administrators demand simplicity; all that matters is that applications run simply, reliably and fast. Hyperconverged Infrastructure (“HCI”) took a first step towards enabling this new computing paradigm, which according to Gartner will reach $10 Billion in sales by 2021. The next step is Open Converged Infrastructure (“OCI”), which provides a powerful, cost-effective yet simple approach to increasing system/application performance under increased workloads. This new breed of convergence is: Simplier than Hyperconverged without vendor lock-ins, faster than all flash arrays, and no backup silos.

Austin's Bio: Jeff Austin is a Senior Systems Engineers who is passionate about developing solutions for customers to simplify infrastructures and enhance responsiveness while increasing data availability. Jeff has an extensive background in IT for over 20+ years. He has worked as a Sr. Systems Administrator for a Fortune 250 company and was responsible for data management, protection, and Business Continuity. He has also worked at a leading SAN vendor, and most recently, at the market leading Hyperconverged (HCI) vendor. As the datacenter and cloud continues to evolve, Jeff joined Datrium to simplify the journey for customers to the hybrid cloud. You can follow Jeff Austin on twitter @jefferydaustin. Jeff Austin holds a B.A. in Information Systems from Cal State University of Fullerton.


Today’s fast-paced business demands that applications and data are highly available. Systems are required to be resilient to all types of outages. Achieving High Availability (HA) for your IT environment can be costly, complicated and can rely heavily on adding to your server infrastructure. It’s time to reinvent how we build HA into our infrastructure. In this webinar, you will learn how Quorum HA Anywhere can help protect systems of all kinds, located anywhere, from downtime. We will show how to build an HA solution that can reside anywhere, on-prem, offsite, or in the cloud. Quorum HA Anywhere will change the way you think about highly available infrastructure designs.

Snook's Bio: Jason Snook is a lifelong learner and passionate IT problem solver from ‘not-so-sunny’ Oregon. He is the dad of two busy bodied young boys. He spends his free time with his sons, riding and racing mountain bikes, and organizing bike events that bring the everyday riders together. Jason holds the following active certifications: CISSP, Security+, CCNP, CCNA, VCP, and MCSA.


Discussions, sessions, exhibits, networking, connecting. After a long day of learning and hearing let’s all come together and get the event highlights. Let’s discuss what we learned, debate, get clarification from the Governing Body on questions that weren't answered, and leave with a charge/purpose/ideas to take into your work.


In the current digital landscape, only 17% of enterprises have visibility into what's happening on their mobile devices. Data is now the baseline for enterprise decision making, but how is that information obtained, and what tools are needed to analyze it? As businesses continue to ride the wave of mobile transformation, monitoring each and every mobile moment to save costs and produce heightened ROI is essential. Companies who’ve gone mobile are dealing with extensive amounts of trouble tickets, device downtime and abandonment, and the ever-growing threat of a security incident via mobile breach. Join us to discuss: · Highlighting the challenges enterprises are facing when it comes to mobile data visualization · Turning vital information into business insights · Solving problems to ensure your organization makes smarter decisions

Bailey's Bio: John Bailey brings over 20 years of experience in the networking and security industry. John and his systems engineering team engage with end user customers on everything from software evaluations to installation, configuration, and training on all NetMotion products worldwide.

Cash Bar: One (1) Complimentary Drink Voucher to the first 200 attendees available at the Registration Counters. Vouchers will be available after 1:45 pm.


Governing Body Members