CLICK HERE TO REGISTER NOW
Overview
The Rocky Mountain Technology Summit will be held at November 14th, 2018 at the Crowne Plaza Denver Convention Center from 7am-5pm.
The Rocky Mountain Technology Summit is one of the top leading conferences and tradeshows in the state. Each year, over thousand attendees, VIPs, and renowned speakers are brought together to network, advocate, and create opportunities for the IT & Security industry. With technology constantly changing, the need to build partnerships within your career is vital. With this year's focus on "Innovations in IT & Security," companies and guests will benefit learning innovative technology methods, discuss industry topics, and make strong connections with those in your region. Further your career with attending the Rocky Mountain Technology Summit today! Attend The Rocky Mountain Technology Summit to get the right tools and make vital connections to best prepare your company for the broad spectrum of ever-changing technology trends.
Sponsors
We would like to thank our all of our sponsors for being a part of this year's Rocky Mountain Technology Summit. From being a sponsor, you will be recognized for the education and mission your company contributes to our tradeshow, panels, and sessions. Many of our sponsors have been a part of our annual summit for many years and we are proud to support them. See below for all of the sponsors for the Rocky Mountain Technology 2018 event.
Gold Sponsor
Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with our new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system. Check Point protects over 100,000 organizations of all sizes.
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world. SailPoint’s open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments.
Slack is the collaboration hub that brings the right people together with all the right information and tools to get work done. Launched in 2014, Slack is the fastest-growing business application in history. Millions of people around the world use Slack to connect their teams, unify their systems, and drive their business forward. From Fortune 100 companies to corner markets, Slack helps people communicate better.
Lunch & Learn Sponsors
Mist built the first AI-driven wireless platform with the world’s first virtual IT assistant. The Mist Learning Wireless LAN makes Wi-Fi predictable, reliable and measurable by providing unprecedented visibility into the user experience and by replacing time consuming manual IT tasks with proactive automation. In addition, Mist is the first vendor to bring enterprise-grade Wi-Fi, BLE and IoT together to deliver personalized, location-based wireless services without requiring battery-powered beacons. All operations are managed via Mist’s modern cloud architecture for maximum scalability, agility and performance. The Mist team consists of leading experts in wireless, data science and cloud, who are responsible for building the largest and most advanced networks in the world. Founded in 2014, the company is based in Cupertino, CA and funded by top investors, including Lightspeed Venture Partners, Norwest Venture Partners, GV (formerly Google Ventures), and Kleiner Perkins.
Presentation Sponsors
Cambium Networks makes it possible for service providers; enterprises; governmental and military agencies; oil, gas and utility companies; Internet service providers; and public safety networks to build powerful communications networks, reach users from 200 kilometers across mountain tops down to the last meter to their devices, and intelligently manage their business Wi-Fi infrastructure through end-to-end network visibility and actionable analytics.
Darktrace is the world’s leading AI company for cyber defense. With over 7,000 deployments worldwide, the Enterprise Immune System is relied on to detect and fight back against cyber-attacks in real time. The self-learning AI takes one hour to install, works across the cloud, SaaS, corporate networks, IoT and industrial systems, and protects against the full range of cyber-threats and vulnerabilities, from insider threats and ransomware, to stealthy and silent attackers. Darktrace has 800 employees and 33 offices worldwide, with headquarters in San Francisco, and Cambridge, UK. |
DataCore is the authority on real-time data. The company pioneered software-defined storage and is now bringing its technology to hyperconverged and workload optimization. DataCore empowers IT organizations to achieve always-available, high-performance and highly efficient data. Its patented technology eliminates storage bottlenecks with adaptive parallel I/O optimization, enables zero-downtime synchronous mirroring, and provides a true hardware-agnostic architecture — resulting in flexibility, resource efficiencies, and cost savings.
ExaGrid offers the only disk-based backup appliance with data deduplication that leverages a unique architecture optimized for performance, scalability and price. ExaGrid is the only solution that combines compute with capacity and a unique landing zone to permanently shorten backup windows, eliminate expensive forklift upgrades, and achieve fast, reliable restores, tape copy and disaster recovery.
Fortinet provides top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric. Our unique security fabric combines purpose-built ASICs, an intuitive operating system, and applied threat intelligence to give you proven security, exceptional performance, and better visibility and control--while providing easier administration.
Hewlett Packard Enterprise is a global technology leader focused on developing intelligent solutions that allow customers to capture, analyze and act upon data seamlessly from edge to core to cloud. HPE enables customers to accelerate business outcomes by driving new business models, creating new customer and employee experiences, and increasing operational efficiency today and into the future.
|
|
Ruckus Networks, an ARRIS company, is redefining connectivity around the globe. With our partners, we build secure wired and wireless access networks for organizations that place a premium on connectivity experiences for end-users as well as simplicity and lower-cost-per-connection for IT.
https://www.scalecomputing.com
Scale Computing is the industry leader in complete hyperconverged solutions with thousands of deployments spanning from the SMB to the distributed enterprise. Driven by patented technologies, HC3 systems install in minutes, can be expanded without downtime, self-heal from failures, and automatically optimize workloads to maximize price-performance.
Agenda
Orrick's Bio: Ron Orrick is the VP of Information & Technology at the global non-profit, Compassion International. Although Ron has assumed many titles across his 30+ year career—a technologist, a businessman, a consultant, a Chief Information Officer—today, Ron’s employee badge says “child advocate.” He leads a catalytic team of technologists who enable Compassion’s mission to “release children from poverty in Jesus’ name.” Ron is an innovator, a rebuilder and someone who believes that any process or technology change must be prefaced with culture and people. Ron holds a B.A. in Management and an MBA from the American Military University. His storied career in bridging people and technology for premier brands has spanned healthcare, advertising and online retail. Ron is married and lives Colorado Springs, CO with his wife and 3 of his six children.
Consider the following: - You don’t own any of it but, it is your responsibility to control and secure everything in it - You don’t own any of it, but you critically depend on what’s in it - You don’t maintain any of it, but you trust all of it is properly maintained at all times - You can’t touch any of it, but it’s up to you to completely orchestrate, control and secure what’s in it - You can’t physically walk in anywhere but you (and anyone else on the planet with the right access) can virtually access from everywhere At first blush, a seasoned and experienced network / security director may not fully appreciate the significant differences and challenges his/her staff will experience in trying to fulfill their job duties when their datacenter is in the public cloud. The old strategy of ‘lift and shift’ - creating VM’s of all of your current/existing hardware and ‘shifting’ it to the cloud - will fail. Further evidence of the urgent need for purpose-built tools to secure public cloud infrastructures can be seen in the multiple and repeated data leaks and misconfiguration compromises we have seen in the last year - According to Gartner, “Through 2022, at least 95% of cloud security failures will be the customer’s fault." And in a world which is rapidly becoming completely ‘software defined’ new skills and tools are required. In this session, we will discuss why today’s IT organizations require mature and complete native tools - built in the cloud for the cloud - which provide: - Complete visibility - Configuration management - Identity protection - Secure DevOps - Compliance Automation - Governance Enforcement - Environment Lockdown We will discuss the subtle yet profound differences in operating your datacenter in the public cloud vs operating your own datacenter. We will discuss the ’Shared Responsibility Model’ and what it really means to you and your IT department as you expand the number of workloads you move to the public cloud. And, as your sophistication increases, and you expand your use of PaaS and IaaS, the complexities follow in tandem. We will show how today’s IT organizations require new, purpose-built tools designed and capable of ’speaking the same language’ as the public cloud infrastructures and built to leverage the extensive API’s they provide. We hope you’ll join us!
Asplund's Bio: Through the acquisition of Dome9 Security, Grant Asplund has returned to Evangelize for Check Point Software Technologies. Grant was the first Check Point Evangelist in 1998. Grant has more than 30 years of experience in sales, marketing, business development and management in enterprise software with the last 20 years focused within security. Grant was Principal Evangelist for Dome9 when Check Point made the acquisition. Grant has held worldwide evangelist roles at Check Point Software Technologies and more recently Blue Coat Systems, Inc. where he was Director of Evangelism. Grant has also held the Head of Market Development and Sales for Altor Networks, and was Vice President, Enterprise Sales for NeuStar. Additionally, he was President and CEO of MetaInfo before successfully selling the company to NeuStar. Grant brings his unique story-telling style mixed with high energy and passion, representing Dome9 at public events and conferences worldwide. Grant has also been a featured speaker and panelist at numerous industry trade shows, conferences and several radio blogs which include RSAC, Next100 CIO’s and BlogTalkRadio.
Cricket Liu is a world-renowned DNS expert and author of DNS and BIND. Cricket will lead an interactive discussion about current topics from DDoS attacks, cache poisoning, and malware threats. He’ll also examine the different methods to effectively address these threats.
Liu's Bio: Cricket Liu is one of the world’s leading experts on DNS and serves as the liaison between Infoblox and the DNS community. He is a prolific speaker and author, having written many books, including “DNS and BIND,” one of the most widely used references in the field.
Starting your Zero Trust initiative with a focus on identities and devices of the users with centralized identity and contextual access management for modern server access can dramatically improve both security and usability. A pragmatic view to what works and why.
Laine's Bio: Sami Laine is Director of Product Marketing for Security at Okta. Over the years at CyberSource, RSA and CloudPassage, Sami has helped many of the world's largest enterprises and financial institutions fight fraud, malware, threats and breaches and now at Okta helps companies embrace identity as the new security perimeter.
Experience the transformative effects of data with intelligent storage. Gaining intelligence from your data requires intelligent storage – the ability to be optimized, available and always ready to create economic value. Join us to learn how HPE Storage solutions deliver intelligence that leverages AI and predictive analytics to predict and prevent problems. Explore options for a multi-cloud, future-proof environment with easy mobility between on-premises and the public cloud. Dig into new HPE Storage solutions that offer an experience that gets better through innovation in technology and a flexible business model.
Welch's Bio: Jennifer Welch currently serves as a Chief Technologist of the Americas Storage Division at HP. Jenn is responsible for delivery of the technical and business aspects of HP’s Enterprise Storage Sales strategies, including 3PAR, Software Defined Storage and Back Up, with specific focus on competitive analysis and differentiation. She originally joined HP in 2008 during the LeftHand Networks acquisition, but has held numerous technical positions across the storage industry. Prior to HP Jenn worked for Dell Computers, Agilysys, and EMC specializing in storage pre-sales. Jenn has worked at HP as a Storage Architect, Unified Storage Evangelist, 3PAR Business Development Manager and regional Chief Technologist for South Central.
This roundtable is for attendees for executives with VIP badges ONLY. The Moderator will introduce and begin discussion on the topic. This session is intended for audience participation so be ready to discuss, receive valuable information, and connect with others for further discussion.
Lowder's Bio: Wade Lowder directs teams of technical, professional and management staff in the successful fulfillment of IT service delivery commitments both onsite and in the Cloud, Oversees the execution of enterprise technology standards, governance processes and performance metrics to ensure IT delivers value to the enterprise, Directs risk evaluation and compliance management processes, Drives infrastructure planning, engineering and deployment and the overall cloud strategy for the company, and Oversees the formulation of IT policies, procedures, and performance management processes and measures.
The years of breaches have transformed the landscape of what we must do to secure not only our identities but our data. Come learn how goverernance at the center of your security posture can help.
Lee's Bio: 14 years typing letters and numbers into a computer screen and waiting for the magic to happen. Most of that time the magic was helping enterprises figure out how to manage all the accounts and access they have in a reasonable manner, by yelling at software created by a number of companies. Frustrated with that process I decided to work for one of the companies that actually made the software so I could yell at actual people that made the software. Now I help outside vendors integrate into that software, so they can spend their time yelling at me. Life is such a vicious circle. Additionally, I host a podcast where we discuss topics in security and identity, and the meaning of life. Not fond of the term Identity Guru, but Identity Jedi has a nice ring to it.
Dave Moore with Cambium Networks will discuss trends in WiFi from a vendor-agnostic standing. What is the state of WiFi today and how did we get here? What can we expect from WiFi tomorrow and the next couple years? We will discuss the possibilities as well as the realistic limitations of WiFi.
Moore's Bio: David Moore is a wireless Veteran with 20+ year experience. Dave previously held management positions at Extreme Networks and Ruckus; at Ruckus he managed the engineers worldwide. The start of his Wireless career was at Motorola supporting the Canopy and PtP solutions you know today as Cambium Networks. Talk about an amazing career coming back full circle! Not only is Dave a Wi-fi guru, he specializes in Hospitality, Stadium, Smart City and Education verticals.
Edge solutions are transforming the reach and purpose of cloud computing for IOT by processing data at the edge of the network where information is generated. Utilizing this model, you can dramatically improve performance and latency, while taking advantage of real-time changes, making it ideal for applications at the edge. Customized to meet edge needs, HCI platforms are scalable, easy to use and offer extreme high availability.
Ruiz's Bio: John Ruiz is an IT specialist, having worked in multiple industries ranging from Banking to Manufacturing to Education. John has served in many roles in the IT industry range from Network Engineer to the VP of IT. John has been building secure stable infrastructures for over 15+ years.He currently serves in a role as a Systems Engineer at Scale Computing where he assists customers with designing converged infrastructures using Scale Computing’s HC3 Hyper-Converged solution across the entire West Coast.
Synopsis: Artificial Intelligence (AI), Machine Learning (ML), Blockchain, IoT and other emerging tech are becoming mainstream. They are no longer outliers of hypes that would go away. Emerging technologies are already disrupting existing business models, and providing competitive advantages to early adopters. The combination of these is leaving no room for late comers as catching up is hard. A conventional approach of "wait and see" is a losing proposition. Business and technology leaders need to remain current with these technologies introducing them to their company's ecosystem to maximize gains and keep their own skills relevant. Attend this session to gain more clarity how emerging tech is reshaping the business & technology landscape. By attending the session you will also get perspectives on how to introduce emerging tech into you company's environment so as to not adversely impact current business models or work environment.
Hellbusch's Bio: Mark A. Hellbusch has over 20 years of experience advising organizations in the design and implementation of cybersecurity and data privacy programs and technology. Mark is passionate about partnering with organizations in providing strategic and tactical solutions that address not only today’s, but tomorrow’s evolving threat landscape and global regulatory environment. Mark focuses on bringing together cybersecurity and technology solutions that allow for organizations to exceed current security-based programs, while developing a long-term path of success. Mark’s started his security and privacy career as a system engineer implementing solutions for a global based company. Since then, Mark has held positions of influence from the Board, C-level, and advisory board member to influence proactive change in a time where the digital age has embedded its self into business operations. The biggest challenge organizations face today is understanding the threat landscape and proactive solutions that address security.
APIs are the building blocks of interoperability on the web and are a key component of scalable and successful technology companies. As externally-consumable APIs expose more information and functionality, ensuring privacy and security of customer data is an increasingly risky proposition. In this session, we’ll talk about some of Slack’s learnings around building Developer APIs and best practices for keeping your APIs safe.
Chen's Bio:Steven Chen is an Engineering Manager on the Slack Developer Platform. His team is responsible for maintaining the quality, consistency, and security of Slack’s external developer APIs. He previously served as Director of Engineering at LOYAL3, an online brokerage startup, and knows first-hand the importance of keeping customer data safe.
Weeks's Bio: John Weeks joined Mist after two decades in Information Technology roles in two Fortune 50 companies. He has two plus decades in IT, with hands on experience in nearly every IT discipline and a decade in IT leadership. Mist Systems has created and continues to enhance the world’s first and only AI based Wireless LAN solution. Please come and learn more about the journey; both how and why Mist is delivering game changing technology solutions.
Are you challenged by managing and protecting ever-increasing amounts of data and how to do so at less cost? Deploying an effective backup storage solution requires deduplication but how you implement it will have a major impact on the cost and performance of your backup environment for the next three to five years. During this presentation, you'll learn what to look for in a hyper-converged secondary storage for backup solution to ensure you make the right choice to get the fastest backups for the shortest backup window, fastest restores, instant VM recoveries in seconds to minutes, a fixed length backup window even as data grows, and fast, reliable offsite disaster recovery.
Bodell's Bio: Scott Bodell, a Senior Systems Engineer with ExaGrid, has been training and providing pre-sales and technical briefings for customers and strategic partners for over 14 years. Prior to joining ExaGrid in 2016, Tony worked at Workfront and Eversync, specializing on data centers and cloud services. Scott holds a degree from the Weber State University.
This roundtable is for attendees for executives with VIP badges ONLY. The Moderator will introduce and begin discussion on the topic. This session is intended for audience participation so be ready to discuss, receive valuable information, and connect with others for further discussion.
Gaietto's Bio: JT has nearly 20 years of experience providing enterprise information security and risk management services to a variety of organizations, with a particular emphasis on the financial services industry. He has a proven track record of collaborating with senior leadership and Boards of Directors to improve productivity and business alignment while maintaining security and regulatory compliance. JT’s vast expertise includes the development of security strategies based on organizational risk, oversight of security operations, incident response, third-party risk management, disaster recovery, building and leading high-performing Information Security teams, and customer and government due diligence oversight. His experience includes numerous compliance verticals, such as PCI-DSS, Sarbanes-Oxley, HIPAA, GLBA, FISMA, PIPEDA, New York State Department of Financial Services Data Security and GDPR.
Review of current and future Wi-Fi performance capabilities beyond the marketing hype. Learn about the actual causes of wireless instability, management of IoT devices and how to optimize performance through thoughtful design. Overall network impact of 802.11ax, improved high-density performance, AI integration and how to take advantage of these innovations.
McCaigue's Bio: As a former educator business owner/consultant, Ryan has provided leadership, management and consulting services to technology companies including Internet Service Providers, IT Managed Services and organizations both public and private. o He has provided network design, deployment and managed services for wired and wireless networks around the globe. Ryan has played major roles in the Design, Construction, and Management of 16 large-scale municipal networks. Each network consisting of thousands of network elements designed to meet the needs of Public Safety and Public Access. o Ryan had 16 years working in higher education culminating as Dean of the Network and Communication Management for National University. He taught CCNA, CCENT, classes as a member of the Cisco Networking Academy for Chandler Gilbert Community College and corporations like Verizon Wireless. Ryan is a Certified Wireless Network Administrator (CWNA) and he has a Bachelor’s degree in Telecommunications Management and a Master’s Degree from Northern Arizona University. o Ryan has been with Ruckus Networks for four years and was with a Ruckus Partner for 6 years prior. He has designed, deployed and/or integrated hundreds of Ruckus Wireless Network solutions.
From the start, the Fortinet vision has been to deliver broad, truly integrated, high-performance security across the IT infrastructure. We provide top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric. Our unique security fabric combines Security Processors, an intuitive operating system, and applied threat intelligence to give you proven security, exceptional performance, and better visibility and control--while providing easier administration. Our flagship enterprise firewall platform, FortiGate, is available in a wide range of sizes and form factors to fit any environment and provides a broad array of next-generation security and networking functions.
Graun's Bio: Jason Graun is a Solutions Engineering Manager and a member of the Office of the CTO. He has been with Fortinet since 2011. Jason has supported Fortinet’s largest carrier and MSSP customers as a Consulting Security Engineer. He brings nearly 20years of experience in IT having worked for a large international bank and several startups along the way. Jason’s focus is solving the problem of how to automate security to bridge the gap between cyberattacks and the needs of business drivers.
61% of companies have experienced slow applications after server virtualization, with 77% pointing to I/O problems as the culprit. With software-defined storage, companies have an opportunity to consolidate and reduce the complexity of their infrastructure. But, this will only happen if their applications get the I/O performance they need. In this session, you will see how to get industry leading I/O response times and the best price/performance to reduce and simplify your infrastructure.
Gentile's Bio: David Gentile has 10 years of experience helping CIO's and IT Directors in the North Central region (IL, IA, IN, MI, MN, OH, WI), USA virtualize their storage environments across any storage brand sub system to end storage lock-in, massively improve storage performance, promote high availability and deliver a true storage hypervisor.
The roles of IT & Security are changing rapidly. In order to stay align in business, IT Departments must adapt to embrace this change. How do we do that? Come join our panel discussion to learn more about this topic.
Coldiron's Bio: Mr. Coldiron was selected as the Chief Information Officer for the City of Fort Collins, CO in 2010. His responsibilities in this role include the coordination and collaboration of all elements of the city’s technology portfolio, technology strategic direction, ensuring the effective delivery of technology services to internal operations, citizens and the business community, while driving toward more sustainable and efficient outcomes. Dan has also served as an Application Services Director, as well as a GIS Manager during his tenure in local government, which covers more than 30 years in the information technology field. He has been directly responsible for ERP, Client Services, Data Management, Network and Communications, eGovernment, Application Development, as well as GIS and other various teams within the local government technology portfolio. Currently, Dan is engaged in a project to establish the City as a broadband provider to Fort Collins. Under Dan’s direction, the IT Department at the City of Fort Collins has engaged in many significant projects with sizeable technology investments. Recent highlights include: SmartGrid and a city-wide mesh network projects supporting Utility Services, large bus rapid transit project, and a regionally shared computer-aided dispatch and records management system for which Fort Collins is the primary partner. The City of Fort Collins has landed on a variety of top 10 lists as a place to live, work, do business, retire, bicycle, drive safely, and even as one of the ten best vacation cities for beer lovers. The IT Department has become the highest rated internal service within the City organization and the City has placed in the top 10 of in the annual Digital Cities Survey multiple times over the past several years. Annual and random Internal customer surveys consistently achieve approval ratings in the 80-90% range for a variety of measures.
Gaietto's Bio: JT Gaietto has nearly 20 years of experience providing enterprise information security and risk management services to a variety of organizations, with a particular emphasis on the financial services industry. He has a proven track record of collaborating with senior leadership and Boards of Directors to improve productivity and business alignment while maintaining security and regulatory compliance. JT’s vast expertise includes the development of security strategies based on organizational risk, oversight of security operations, incident response, third-party risk management, disaster recovery, building and leading high-performing Information Security teams, and customer and government due diligence oversight. His experience includes numerous compliance verticals, such as PCI-DSS, Sarbanes-Oxley, HIPAA, GLBA, FISMA, PIPEDA, New York State Department of Financial Services Data Security and GDPR.
Hellbusch's Bio: Mark A. Hellbusch has over 20 years of experience advising organizations in the design and implementation of cybersecurity and data privacy programs and technology. Mark is passionate about partnering with organizations in providing strategic and tactical solutions that address not only today’s, but tomorrow’s evolving threat landscape and global regulatory environment. Mark focuses on bringing together cybersecurity and technology solutions that allow for organizations to exceed current security-based programs, while developing a long-term path of success. Mark’s started his security and privacy career as a system engineer implementing solutions for a global based company. Since then, Mark has held positions of influence from the Board, C-level, and advisory board member to influence proactive change in a time where the digital age has embedded its self into business operations. The biggest challenge organizations face today is understanding the threat landscape and proactive solutions that address security.
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network - before they turn into a full-blown crisis. Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat. Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources. In this session, learn: • How new machine learning and mathematics are automating advanced cyber defense • Why full network visibility allows you to detect and autonomously respond to threats • How smart prioritization and visualization of threats allows for better resource allocation and lower risk • Real-world examples of unknown threats detected by ‘immune system’ technology
Hood's Bio: Jesse Hood is a Regional Director at Darktrace, the world’s leading machine learning company for cyber defense. He has worked extensively with clients across numerous industry verticals, from finance to pharmaceuticals, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting and autonomously responding to early-stage cyber-threats. Hood graduated with a bachelor’s degree from Western State Colorado University and is based out of Darktrace’s Denver, CO location.
Cash Bar: One (1) Complimentary Drink Voucher to the first 200 attendees available at the Registration Counters. Vouchers will be available after 1:45 pm.