• slidebg1
    WELCOME TO THE
    Texas Technology Summit
    LARGEST REGIONAL IT & SECURITY
    CONFERENCE IN HOUSTON

    We are "Expanding the Frontiers of IT and Security"

    Stay Tuned for the 2019 Summit!
  • slidebg3
    WIN THE DREAM VACATION YOU ALWAYS WANTED
    Attend our Conference to Enter our Grand Prize
    All of our attendees can get the chance to win a free trip & other giveaways!

Overview

The Texas Technology Summit was held on February 7, 2018 at the Houston NRG Center in Room 300 from 7am-4pm.

 

As we reach the 9th annual show, the Texas Technology Summit is the top leading IT & Security conference and exhibit hall in the state. Currently, over a thousand attendees, VIPs, and renowned speakers are brought together to network, advocate, and create opportunities for the IT & Security industry. With technology constantly changing, the need to build partnerships within your career is vital. With this year's focus on "Expanding the Frontiers of IT & Security," companies and guests will benefit learning innovative technology methods, discuss industry topics, and make strong connections with those in your region. Further your career with attending the Texas Technology Summit today! Attend The Texas Technology Summit to get the right tools and make vital connections to best prepare your company for the broad spectrum of ever-changing technology trends.

 

BELOW IS OUR 2018 TEXAS TECHNOLOGY SUMMIT SHOW:

Sponsors

We would like to thank our all of our sponsors for being a part of this year's Texas Technology Summit. From being a sponsor, you will be recognized for the education and mission your company contributes to our tradeshow, panels, and sessions. Many of our sponsors have been a part of our annual summit for many years and we are proud to support them. See below for all of the sponsors for the Texas Technology 2018 event.

 

Diamond Sponsor

https://broadleafgroup.com/

Accelerate growth with technology. Since 2005, Broadleaf Group has been helping companies design effective technology solutions while maintaining or lowering the overall investment cost. Unlike other technology solution providers, we serve enterprise clients with a full life cycle of IT needs including initial consultation, solution architecture, procurement, configuration, logistics, deployment, and managed services. Taking it one step further, our integration centers handle mass configurations and we offer an exclusive SmartHands program ensuring that 98% of U.S. based clients have access to our team within a 25-mile radius of any zip code in the nation. Broadleaf Group provides technology platforms that deliver business outcomes. We build more than solutions; we build relationships based on trust and predictable deliverables. With a diverse client base, our consultants have widespread industry experience to provide successful outcomes. Relationships with key providers allow us to offer a full range of solutions to simplify the process. With a full scope of service offerings, paired with knowledge and expertise, we understand our clients' needs and deliver optimal solution configurations from an extraordinary group of partners. Our experts work with best-in-class technology partners including Cisco, Aruba, Citrix, Cylance, HP, Palo Alto, Proofpoint, Observe IT and GreenCloud to name a few. Broadleaf Group clients benefit from our people and our processes. We deliver results-focused technology solutions that support your business as a whole. We partner with you and provide results that are agile, scalable and effective - ensuring your business needs are exceeded. Vision becomes strategy; strategy becomes reality.

Gold Sponsors

http://insource.com/

Since our founding in 1992 the mission of Insource has been to "provide our clients with technology excellence that is business driven through a true partnership."; This unique Business/Technology team approach insures that the appropriate technology is applied intelligently, and that it meets our clients' business requirements.

https://dyn.com/

Oracle's Dyn is a pioneer in DNS and a leader in cloud-based infrastructure to connect users with digital content and experiences across a global internet. Dyn's solution is powered by a global network that drives 40 billion traffic optimization decisions daily for more than 3,500 enterprise customers, including preeminent digital brands such as Netflix, Twitter, Linkedin and CNBC. Adding Dyn's best-in-class DNS and email services extend the Oracle cloud computing platform and provides enterprise customers with a one-stop shop for Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS).

Beverage Sponsor

http://netapp.com

NetApp is the data authority for hybrid cloud. We provide a full range of hybrid cloud data services that simplify management of applications and data across cloud and on-premises environments to accelerate digital transformation. Together with our partners, we empower global organizations to unleash the full potential of their data to expand customer touchpoints, foster greater innovation and optimize their operations.

Lunch Sponsors

https://presidio.com/

Presidio is a leading IT solutions provider assisting clients in harnessing technology innovation and simplifying IT complexity to digitally transform their businesses and drive return on IT investment. Our Digital Infrastructure, Cloud and Security solutions enable our clients to take advantage of new digital revenue streams, Omni channel customer experience models, and the rich data insights generated by those interactions.

https://reduxio.com/

There has been no fundamental innovation in data management and protection for primary storage for the last two decades. Reduxio is redefining data management and protection with the world's first unified primary and secondary storage platform. Based on the patented TimeOS storage operating system, Reduxio provides breakthrough storage efficiency and performance, and the unique ability to recover data to any second, far exceeding anything available on the market today.

Silver Sponsors

https://myfuturecom.com

Future Com, Ltd. has been a leader in the network foundation, performance, and security space since its inception in 1991. A privately held company, Future Com is an integrator of top industry partners, selling customized solutions to suit any of today’s network needs. Future Com offers hardware, appliances, software, support, and consulting services to top enterprises, small and medium businesses, and healthcare, government and educational entities throughout the US.

https://phoenixnap.com/

PhoenixNAP is a leading provider of progressive Infrastructure-as-a-Service solutions spanning bare metal servers, backup & DR, cloud, hardware leasing and colocation options. Our state-of-the-art data centers are inter-connected and worldwide. We empower businesses with industry-leading SLAs, 100% network uptime and 24/7 staff to assist. It’s global IT services made easy!

 

http://uniquedigital.com

Unique Digital is a global data integrator and service provider. For over three decades, we have delivered a variety of customized infrastructure solutions and services. By partnering with leading edge technologies, we assist in consolidating and streamlining the rapid growth of data in your environment.

Presentation Sponsors

https://cambiumnetworks.com

Cambium Networks makes it possible for service providers; enterprises; governmental and military agencies; oil, gas and utility companies; Internet service providers; and public safety networks to build powerful communications networks, reach users from 200 kilometers across mountain tops down to the last meter to their devices, and intelligently manage their business Wi-Fi infrastructure through end-to-end network visibility and actionable analytics.

https://commvault.com

Commvault's data protection and information management solutions provide mid- and enterprise-level organizations worldwide with a significantly better way to get value from their data Commvault can help companies protect, access and use all of their data, anywhere and anytime, turning data into a powerful strategic asset.

 

https://darktrace.com

Darktrace is the world's leading AI company for cyber security. Created by mathematicians, the Enterprise Immune System uses machine learning and AI algorithms to detect and respond to cyber-threats across diverse digital environments, including cloud and virtualized networks, IoT and industrial control systems. The technology is self-learning and requires no set-up, identifying threats in real time, including zero-days, insiders and stealthy, silent attackers. Darktrace is headquartered in San Francisco and Cambridge, UK and has over 32 offices worldwide.

http://exagrid.com

ExaGrid's hyper-converged secondary storage for backup offers an integrated and unique landing zone and its scale-out architecture provides the fastest backup - resulting in the shortest fixed backup window, fastest local restores, offsite tape copies and instant VM recoveries while permanently fixing the backup window length, all with reduced cost.

https://hpe.com

At Hewlett Packard Enterprise, we aim to be the industry's leading provider of hybrid IT, built on the secure, next-generation, software-defined infrastructure that will run customers' data centers today, bridge them to multi-cloud environments tomorrow, and power the emerging intelligent edge that will run campus, branch and Industrial IoT applications for decades to come. All delivered through a world class services capability.

https://malwarebytes.com/

Malwarebytes is the most trusted endpoint security company in the world. Malwarebytes proactively protects people and businesses against malicious threats, including ransomware, that traditional antivirus solutions miss. The company's flagship product uses signature-less technologies to detect and stop a cyberattack before damage occurs.

 

https://scalecomputing.com

Scale Computing integrates storage, servers, and virtualization software into an all-in-one appliance based system that is scalable, self-healing and as easy to manage as a single server. The result is a data center solution that reduces operational complexity, allows a faster response to business issues, and dramatically reduces costs.

http://securedatasolutions.net/

Secure Data Solutions provides comprehensive results giving our clients confidence in their security strategy and eco-system to focus on their core business. Using fundamental and leading edge security technologies, Secure Data Solutions provides expertise and visibility in all aspects of Network and Cyber-Security. Through our discovery process, we align technical and financial requirements to create a holistic reference architecture specific to each client.

https://tpx.com/

TPx Communications is a new kind of managed services provider -- the premier national managed services carrier. Formed from the merger of TelePacific and DSCI, TPx is redefining the way enterprises grow, compete and communicate. TPx's Unified Communications, Managed IT services, continuity and connectivity solutions all work together to 'reach a higher state of connectedness' - with customers, employees, clients, suppliers, locations, applications and more.

http://zerto.com/

Zerto is committed to keeping enterprise and cloud IT running 24/7 by providing innovative, simple, reliable and scalable business continuity software solutions. Through the Zerto Cloud Continuity Platform, organizations can seamlessly move and protect virtualized workloads between public, private and hybrid clouds. The company's flagship product, Zerto Virtual Replication, has become the standard for protection, recovery and migration of applications in cloud and virtualized data centers, and won numerous awards, including Best of Show at VMworld 2011, Best of VMworld Europe 2014, as well as 2011, 2012 and 2013 Product of the Year Awards for its innovative hypervisor-based replication approach.

Agenda

Synopsis: This presentation is not for the faint of heart: the IT struggle is real. How do you determine which technologies to adopt? Are you leveraging the cloud and should you? How can you protect everything? IT changes are frenetically happening across every industry; how will you keep up? Your technology decisions today dictate your companies agility and future competitiveness. Come hear a few stories and learn what you should and shouldn’t be doing to ensure success.

Schreiner's Bio: Unusual blend of Global, Fortune 500 and tech startup experience both as a technology customer and provider. Advising CIOs and business leaders for nearly 20 years, my knowledge culminates as an senior trusted advisor, empathic and focused on strategic customer outcomes. Paying it forward by mentoring future CIOs, current IT managers and IT professionals. Helping others see the bigger picture, understand ROI (especially time) and differentiate themselves by growing both professionally as well as personally.

Synopsis:

Learn why collaborative digital workplaces require a level of security not implemented by many organizations. Securing identities, data, source code, and other intellectual property is much more difficult because mobile, cloud, and IoT have radically changed the security perimeter.

Garside's Bio: After 20 years in the industry, John understands a wide range of tech products and their interactions in all its environments. His engineering background and evangelic communications style makes it easy to understand the complexities of how technology is evolving.

Synopsis:

As customer, partner and employee interactions move increasingly to digital channels, the availability and performance of websites and applications is critical. Join an Oracle Dyn expert as he unlocks the secrets of modern DNS for improving digital performance and resilience. The session will provide a high-level overview of DNS, a review of redundant DNS configurations, and an explanation of how this layer of your infrastructure has everything to do with resilience. From DDoS to DNS amplification and reflection attacks, it’s all covered including strategies to mitigate, opportunities to architect infrastructure resiliency, and tips for improving digital performance.

Sterling's Bio: Al Sterling is a Senior Sales Engineer at Oracle + Dyn. He has been in the commercial software space for over 30 years across a vast variety of technologies and platforms. His customer experience includes fortune 500 companies looking to strengthen architectures and build redundancy.

Synopsis:

Are you tired of fighting fires, spending countless time troubleshooting infrastructure, and having to deal with problems that come out of nowhere? What if artificial intelligence (AI) can watch over your infrastructure and predict and prevent problems before your business can be impacted? If that sounds good to you, then this is a webinar you can’t afford to miss. Learn how HPE InfoSight gets you out of the heat and eliminates disruptions and wasted time through cloud-based predictive analytics and machine learning. We’ll show you how HPE InfoSight is making infrastructure autonomous. Specifically, how it predicts and prevents issues across the infrastructure stack, makes infrastructure smarter and more reliable, and eliminates the guesswork in managing infrastructure.

Thornton's Bio: Results-oriented, high-energy, hands-on professional, with an impressive engineering/sales record of accomplishments in the technology industry. Over 13 years of successful experience within a management engineering role, designing and implementing large scale projects, from inception to successful completion, while making/executing sound strategic decisions to ensure success. Proven ability to interface with engineers, sales and customers alike to ensure product solutions meet customer requirements. Technical focus on Networking LAN/WAN/WLAN/VOICE, Virtual Server technology and VDI to include Citrix, VMWare and Quest(now Dell). Ability to manage multiple projects and tasks at any given moment. Experience in the public as well as the private sectors.

Synopsis:

IT infrastructure is not only a significant investment in hardware and software, but it can come with hefty cost in training, management, and maintenance. Traditional IT infrastructure is a mix of different vendor solutions adding more complexity and cost than necessary. Find out how a simpler approach to infrastructure can streamline operations and lower infrastructure costs in a very real and dramatic way.

Seal's Bio: Coming soon...

Synopsis:

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network - before they turn into a full-blown crisis. Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat. Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.

Glaser's Bio: Coming soon...

Synopsis:

This roundtable is for attendees for executives with VIP badges ONLY. Companies are using various titles for their IT Leaders. Some larger companies have split this role. During this breakfast event, we will discuss and debate what these different titles imply; if one is more operational and another more strategic; what the use of the title may tell us about the companies and/or corporations that use them; and finally what impact if any would/should this have on the structure of the IT organization. This session is intended for audience participation so be ready to discuss, receive valuable information, and connect with others for further discussion.

Krueger's Bio: Paul Krueger was the CIO for Stewart & Stevenson (S&S). He has been a CIO for over 15 years supporting mid-market and large multi-billion dollar manufacturing companies or divisions. Prior to S&S, Paul was CIO of Drilling & Production at GE Oil & Gas; Vetco International; and ABB Oil & Gas. Earlier in his career he also held senior IT management positions at Honeywell (AlliedSignal) and TRW. Paul has a Master's Degree in Information Systems from DePaul University and a Bachelor's Degree in Business Administration from the University of Iowa.

Carter's Bio: Steven is an accomplished global energy technology and business leader who leverages his deep energy background and broad business experience to create new insights and improved business performance through technology. He is a change-agent who possesses a wide range of strategic, leadership and transformational experiences, including leading global multi-cultural organizations, developing two internet businesses and founding his own successful business. Steven also led one of the world’s largest IT crisis responses.

Synopsis:

As a security practitioner, how does it feel today? To me, it’s not a pretty picture. In fact, attackers have unlimited resources and unlimited number of tries to conduct the attacks. They only need one to succeed for it to be a win for the bad guys. We, as the good guys, have limited resources, time, and people, plus we need to know ALL of the ways in to protect our infrastructure and data. It’s clearly not a very fair equation. Cisco takes our best of breed products and integrates them into an architecture to share threat intelligence, event information, context and policy... they fit and work together in an architecture that can see a threat once and block it everywhere – to get out in front of attacks and close the security effectiveness gap.

Gasdia's Bio: Lloyd Gasdia has been in the IT industry for 15+ years and has been with Cisco since 2005 serving in multiple capacities. Currently, Lloyd is the regional cybersecurity lead responsible for leading awareness and adoption of Cisco’s threat centric architecture. Lloyd is dedicated to helping enterprises secure their infrastructure, protect data and intellectual property, and meeting risk and compliance objectives. Cisco is a leading provider of network and security solutions, with an unmatched defense in depth security architecture spanning multiple attack vectors.

Synopsis:

Explaining the technology and features to look for in an SD-Wan solution. During the seminar we will talk about why SD-Wan is taking over the market and how to evaluate which SD-Wan solution best fits your requirements.

Cushing's Bio: Larry Cushing has been in the technology industry for over 25 years. He starred in the industry as a Microsoft and Cisco certified consultant responsible for engineering complex system migrations. During his career he has held technology management positions for several international and fortune 500 companies. In 2007, he founded a successful managed services company in New England providing a full set of services including virtual CIO. In 2014, he sold the company to DSCI, a division of TelePacific. Today, he travels coast to coast as the Chief Technology Evangelist for TelePacific talking at conferences and seminars about the evolution of technology.

Synopsis:

Are you challenged by managing and protecting ever-increasing amounts of data and how to do so at less cost? Deploying an effective backup storage solution requires deduplication but how you implement it will have a major impact on the cost and performance of your backup environment for the next three to five years. During this presentation, you'll learn what to look for in a hyper-converged secondary storage for backup solution to ensure you make the right choice to get the fastest backups for the shortest backup window, fastest restores, instant VM recoveries in seconds to minutes, a fixed length backup window even as data grows, and fast, reliable offsite disaster recovery.

Ossege's Bio: Tony Ossege, Senior Systems Engineer at ExaGrid, is a seasoned professional with over 20 years of experience in the Information Technology Industry. He specializes in Executive-level presentation and communication skills focusing on Data Center, Cloud Services and Disaster Recovery. His areas of focus include Disk Storage, Flash Storage, Cloud Storage, Storage Networking, Enterprise Tape Solutions, Disaster Recovery Planning, Backup and Recovery Software, Server Technologies, along with Project Management and Problem Resolution. Tony currently supports a team of Territory Managers covering the South Central Region that include Public Sector, Commercial and Enterprise accounts. His previous employers include Storage Technology Corp, Sun Microsystem and Oracle.

Synopsis:

This presentation will describe the current and futures technology changes that are transforming our traditional infrastructure and how our security strategy and tools must adapt. The technologies that will be highlighted are SDN, SD-WAN, Cloud Applications.

Harcourt's Bio: Todd Harcourt is VP of Engineering at Secure Data Solutions. A data infrastructure and data security industry veteran with 30 years of experience, he started his career in the U.S. Navy Advanced Data Systems and Data Communication programs. Todd helped lead in the success of Wellfleet Communications, Bay Networks, and the initial public offerings of Foundry Networks and A10 Networks. Most recently Todd held the position of Systems Engineering Manager, and Consultant for LightCyber, the leader in breach detection and behavioral analytics.

Schreiner's Bio: Helping colleagues weigh the benefits and risks of adopting new technology to simplify their enterprise architecture, mitigate risks and accelerate results. Passionate, platinum-status, keynote speaker on current technology trends including mobility, big data, IoT, cloud and security. Unusual blend of Global, Fortune 500 and tech startup experience both as a technology customer and provider. Advising CIOs and business leaders for nearly 20 years, my knowledge culminates as an senior trusted advisor, empathic and focused on strategic customer outcomes. Paying it forward by mentoring future CIOs, current IT managers and IT professionals. Helping others see the bigger picture, understand ROI (especially time) and differentiate themselves by growing both professionally as well as personally. Still learning every day and trying to strike the perfect the balance between rock-n-roll and geek while helping raise two of the coolest nerds you’ll ever meet.

Synopsis: The Future of Communication. Communication Technology Accelerating Better Business Outcomes

Learn from the 2 leaders in the security industry, joining forces to bring you knowledge on how to revolutionize network security and defend your brand.

Spadachene's Bio: Chris Spadachene is an experienced cyber security advocate with over 15 years of experience advising clients on game-changing technologies that can deliver significant value. Chris explains how combining network, cloud and endpoint security with advanced threat protection will safely enable all applications and provide peace of mind.

Westnedge's Bio: Brian Westnedge leads channels for Email Fraud Defense (EFD), Proofpoint’s newest and fastest growing product that protects employees, partners, and customers from spoofing attacks. He has 15 years of experience in email authentication and security and can be found on Twitter @bwestnedge commenting on email, security and other topics.

Synopsis:

We are the last line of defense in a defense in depth strategy. Data should be protected every second. Data should ever be lost. We drive RPO and RTO to zero. Restoring remote backups takes seconds and minutes not hours and days. We eliminate storage snapshots which chew up 30-40% of your organization's storage capacity. It is no longer data where; it is Data When; it's about time.

Bienko's Bio: 20+ years in Information Technology – Data Center/Security as; customer, field support, and business enabler.

Synopsis:

Information Security is not just about technology; technology must be operated in well-designed processes, and those processes must be managed by people with the appropriate skills. This is just one of several security dimensions this presentation will explore.

Wilhite's Bio: David Wilhite (CISSP, GSNA, GCCC) is a Senior Security Solutions Consultant for Presidio. He previously served as Deputy CISO for the State of South Carolina, managing the state’s information security policy, compliance, and operations, in the newly formed Division of Information Security. He also has extensive experience in incident response and forensics, application development, system integration, networking, and process improvement.

Synopsis:

This roundtable is for attendees for executives with VIP badges ONLY. During this lunch event we will discuss and debate how IT security systems and processes are expanding and changing as companies move all or some of their applications and/or systems to the cloud; and what role if any IT needs to play in providing security for the companies internal and external IOT devices. This session is intended for audience participation so be ready to discuss, receive valuable information, and connect with others for further discussion.

Krueger's Bio: Paul Krueger was the CIO for Stewart & Stevenson (S&S). He has been a CIO for over 15 years supporting mid-market and large multi-billion dollar manufacturing companies or divisions. Prior to S&S, Paul was CIO of Drilling & Production at GE Oil & Gas; Vetco International; and ABB Oil & Gas. Earlier in his career he also held senior IT management positions at Honeywell (AlliedSignal) and TRW. Paul has a Master's Degree in Information Systems from DePaul University and a Bachelor's Degree in Business Administration from the University of Iowa.

Carter's Bio: Steven Carter is an accomplished global energy technology and business leader who leverages his deep energy background and broad business experience to create new insights and improved business performance through technology. He is a change-agent who possesses a wide range of strategic, leadership and transformational experiences, including leading global multi-cultural organizations, developing two internet businesses and founding his own successful business. Steven also led one of the world’s largest IT crisis responses.

Synopsis:

Up until now WiFi has focused on achieving higher speeds or PHY rates. Now the focus is on improved efficiency capacity, higher capacity, and reduced congestion. Simply put, 802.11ax is designed to improve the way WiFi works. Future networks will face an ever increasing demand to efficiently move more data from a very diverse range of devices whose bandwidth requirements range from extremely low to blinding fast. An increasing number of competing networks will generate massive amounts of interference, and with only a limited number of channels available, the 802.11 protocol as we know it today will be hopelessly overwhelmed. 802.11ax is designed to meet the needs by delivering higher capacity, reducing congestion, increasing battery life, and extending range. If you are interested in learning how 802.11ax will improve the way WiFi works, come to our presentation and learn about the next generation of WiFi.

Black's Bio: David Black joined Insource Technology Corporation in 1995 and serves as the company’s President and CEO. He began his career in 1973 with Texas Instruments as a design engineer of semiconductors and Winchester disk drives. In 1985, David joined Compaq Computer Corporation as Vice President of Engineering and was responsible for development of Compaq’s desktop and portable PC’s. He also served as Vice President and General Manager of one of Compaq’s three Worldwide Divisions.

Synopsis:

Ransomware is now one of the biggest threats to your data. Nobody wants to be in a position of being locked out of all of your data and facing the prospect of having to pay a ransom or accept the impact of data loss and downtime by restoring from backups. In this session you will learn how to configure your environment with Zerto to ensure you can recover the data from seconds before it was encrypted, minimizing the impact to the business by re-winding to a point in time before the ransomware infection existed. Zerto Virtual Replication (ZVR) integrates at the hypervisor level and causes no performance impact to the protected virtual machines. ZVR replicates without snapshots or agents, allowing for better performance and flexibility DR strategy in your vSphere environment. The virtual awareness understands the needs of resilience capabilities such as HA/DRS/VMotion/Storage VMotion/Storage DRS, etc. and continues replicating consistent data across the application virtual machine groupings.

Kuchar's Bio: Greg Kuchar is an Information Technology Professional with twenty+ years of experience in consulting, business development and solution architecture. He thrives when presented with new challenges and ambiguous circumstances that require difficult decisions. Greg has worked very hard to develop exceptional presentation skills and possess the aptitude to position Data Center, Cloud Services and Solutions in many client vertical environments.

Synopsis:

As long as cybercriminals can make a profit, businesses and their data will always be a target. The past year saw the greatest breach in Internet history with WannaCry, but that may have been a drop in the bucket. Learn some of the biggest misconceptions about the threat landscape; see how attacks are being delivered; and why your company may be at risk—without you even knowing it.

Spencer's Bio: Simone Spencer is the Director of Global Product Marketing at Malwarebytes with over 20 years’ experience driving strategic growth and product visibility for US high technology IT companies including Intel, Symantec, McAfee, and Hewlett-Packard. She delivers a truly global perspective as a result of having worked in USA, Germany, UK, Australia, Japan, China, and Singapore. Simone has successfully launched over 25 new and over 150 updates of products/services. She is a trusted advisor for endpoint security, cloud-based SaaS, systems management, virtualization, storage, hardware, services, networking, and compliance.

Synopsis:

Discussions, sessions, exhibits, networking, connecting. After a long day of learning and hearing let’s all come together and get the event highlights. Let’s discuss what we learned, debate, get clarification from the Governing Body on questions that weren't answered, and leave with a charge/purpose/ideas to take into your work.

Longsworth's Bio: Jerry Longsworth is responsible for developing and executing Compugen’s U.S. GTM Strategy centered on IT Strategy & Transformation, Intrinsically Safe Hazardous Area Communications, Next Generation Cyber Security, Encrypted EaaS (Endpoints as a Service), Sustainability / Environmental Waste Reduction, Technology Lifecycle / Service Desk / Managed Services and Cloud Computing / Data Management.

Oberlaender's Bio: Michael Oberlaender has a broad, global, diversified background in various industries and markets, 27 years of IT including 17+ years full time security experience, and a strong focus on IT & security strategy. Michael is a globally recognized thought leader, book author (“C(I)SO – And Now What?”), publisher, and has written numerous articles for security magazines, and also has been frequent speaker, panelist and moderator at security conferences. He holds a master of science (physics) from the University of Heidelberg, Germany. Michael is dual citizen (US&EU) and multi-lingual. He is member of (ISC)², ISACA, ISSA, and InfraGard (FBI).

Synopsis:

Dave Moore with Cambium Networks will discuss trends in WiFi. What is the state of WiFi today and how did we get here? What can we expect from WiFi tomorrow and the next couple years? We will discuss the possibilities as well as the realistic limitations of WiFi.

Moore's Bio: Dave Moore is an experienced and self-motivated engineering manager in the telecommunications industry. Dave has worked with a broad range of customers to include carriers, enterprise, education, health, and hospitality customers providing pre and post sales engineering support as well as training. Extensive product evaluation and new systems piloting experience.

Cash Bar: One (1) Complimentary Drink Voucher to the first 200 attendees available at the Registration Counters. Vouchers will be available after 1:45 pm.

Exhibitors

Governing Body Members