News sponsors and agenda items are added daily. Please check back often for current information and updates.
The IT Summit was selected as one of the top ten “must-attend” events for CIOs and IT Marketers — April 2013 CTOsOnTheMove.com
Overview
The IT Summit is the executive technology conference series returning to Denver for our twelfth annual event on March 29th, 2018. The purpose of the summit is to provide educational and networking resources for the IT leaders in Colorado. The conference is driven by an Executive Board of regional IT professionals that directs the content of the conference. The IT Summit is designed to address the real-world opportunities and challenges faced by today’s executives.
Click Here to contact us if you are interested in joining our Executive Board Click Here to contact us if you are interested in sponsorship opportunities
Scroll to the bottom of this page for directions & parking information
Event Updates and Information
Earn Free CPE Credits at The IT Summit
The IT Summit offers complimentary certificates of attendance for CPE credits. Continuing professional development or continuing professional education is the means by which people maintain their knowledge and skills related to their professional lives. Upon completion and approval of your registration, we will provide you with information on how you can receive free CPE credits at The IT Summit.
Great prize give-aways at The IT Summit
When you attend The IT Summit Technology Conferences you have an opportunity to walk away with some great prizes courtesy of our great sponsors. Check out some of the great prizes being given away at The IT Summit Denver, Spring 2018:
A Aerohive 802.11ac Wave2 access point (courtesy of Aerohive)
A $50 Amazon gift card (courtesy of Scale Computing)
One of two $50 Amazon gift cards (courtesy of TechedIn)
A $100 Amazon gift card (courtesy of RSM)
An Amazon Echo Spot (courtesy of Birch)
An Amazon Echo Spot (courtesy of MeetingOne)
An Apple TV 4K (courtesy of GTRI)
A Holy Stone F181C RC Quadcopter Drone w/HD Camera (courtesy of Datrium)
A JBL by HARMAN Flip 3 Blue Tooth Speaker (courtesy of Harman)
A JBL by HARMAN Flip 3 Blue Tooth Speaker (courtesy of Verizon)
A Kuerig and mugs (courtesy of CenturyLink)
An Ogio Backpack (courtesy of ITC Telecom)
A $100 VISA gift card (courtesy of Barracuda)
The difference between GRC, Security, and Securitay – surviving in the cvber battlefield; BLUF – conventional ‘security’ doesn’t work,,, if it ever did. – Tech Theater II
Technology Leadership in a Business World -How to Build and Measure your Cyber-Security Organization – Tech Theater IV
Bart Waress, Nominated for Oil and Gas CIO of the Year by Global Energy Magazine Vice President of Information Technology
Discovery Natural Resources, LLC
Be sure to stay for our final prize drawings at the conclusion of the conference.
Must be present to win.
Executive Board
Jamie Yancy CTO, Sr. VP
Native American Bank Conference Director
Bart Waress, Nominated for Oil and Gas CIO of the Year by Global Energy Magazine Vice President of Information Technology
Discovery Natural Resources, LLC Conference Chair
Gary Franke Business Development Analyst
The IT Summit
Dan Lissek Director, Information Technology
FCC Services
Robert Belton CIO
196
Frank Daidone CEO
Nurse-Family Partnership
Mark Spencer Former President
ISSA – Information Systems Security Association, Colorado Springs Chapter
Jeff Konishi Director, Information Technology
City of Englewood
Julie Ouska Chief Information Officer / Vice President of Information Technology
Colorado Community College System
Mike Wright Director of Enterprise Architecture Technology Services
City and County of Denver
Andy Atencio Chief Technology Officer
City of Greenwood Village
Patrick Purdy Director of Technology
West Metro Fire Rescue
Henry Ammons Manager of Desktop Engineering & Architecture
Faegre & Benson
Les Berry Director of Enterprise Architecture
Denver International Airport
Danielle Hinz President
NIGP-Rocky Mountain Governmental Purchasing Association
Jim English Director of Networks & Technical Services
Colorado Mountain College
Robin Brown Director of Electronic Security
University of Colorado Denver
Dr. Liz Peralez Professor of Computer Science & Information Technology
Colorado Technical University
Billy Hodge President
ASIS – American Society for Industrial Security, Denver Chapter
Terry Boult El Pomar Professor of Innovation & Security
University of Colorado at Colorado Springs
Howard Pierpont President / Board Member
ACP, ISACA, DERA, FEMA, ARMA
Barry Price Director Information Technology
Shareholder Representative Services
Tom Craig Chief Technology Officer
Rocky Mountain PBS
Clarke Becker Director
State of Colorado
Mohamed Lotfy, Ph.D. Program Coordinator BS in Information Technology College of Computer & Information Sciences
Regis University
Susie Peppers Assistant Director of Information Technology Services
Front Range Community College
James F. Gaulke Chief Information Officer, Vice President Information Security
Simonds Industries
Clint Andrews Director of Information Technology
City of Fort Collins
Dr. Carol Keene Professor of Computer Science
Colorado Technical University, Colorado Springs
Thad Lutgens Information Technology Director
L.P.R. Construction Co.
Brianne Bustos Director Of Information Technology
Great Western Oil and Gas Company
Steve Clagg Chief Information Officer
Aurora Public Schools
Mitch Ashley Vice President of Information Technology
CableLabs
Jeff Truax Director of Information Technology
Cool Planet
David Smith Trade Commissioner
Canadian Consulate
Dr. Annie Shebanow Founder
OneKeyCloud, Inc.
Nathalie Rachline Senior Director IT Strategy and Planning
Agrium
Steven Kurutz Systems Engineer
EKS&H;
Jace Enyeart Technology Coordinator
Lakewood High School
Feray Baytok Chief Information Officer
National Conference of State Legislatures
Kyle Winders Director, Technology Services
City and County of Denver
Brett Mueller VP, Information Risk, Global Cyber Security and Fraud
First Data
Yon Lew CISO – CSO – Managing Director
ISRSEC
Jerry Vigil Vice President-Information Technology
Bill Barrett Corporation
Peter A. Smith Chief Information & Facility Officer
El Paso-Teller County , 9-1-1 Authority
R. Shawn Bleam Director, Information Technology Division
Boulder County
Julio Da Silva IT VP
Alterra Mountain Company
Kevin Aoki Information Technology Director
City of Evans
Justin Amerson Senior Information Security Engineer
CenturyLink
Mike Trus Director, Information Security Engineering
Staples
Elizabeth Collins, with University of Colorado, Denver, Ansuchutz Medical Campus Director, Research Information Technology
University of Colorado, Denver, Ansuchutz Medical Campus
Dani Baresel-Pavlik IT DBA Manager
Mercury Payment Systems
Brent Taylor CTO/Cloud Leader
IBM
Eric Negrey Sr. Director of Information Technology
ARCA Biopharma
Jiles McCoy Director of Innovation and Technology
City of Golden
Scott Sampson IT Director of Global Network Communications
Arrow Electronics
Mike Wright Director of Information Technology
CoBank
From Denver International Airport (DEN): Exit airport by taking Pena Blvd. Follow Pena Blvd and then merge onto I-70 West. I-70 West to I-25 South, Exit 210A Colfax Ave, turn left onto Colfax Avenue. Turn left on Kalamath. Kalamath becomes Stout. Proceed underneath the convention center. Hotel will be on right, just past 14th Street.
From Colorado Springs Municipal Airport (COS): Exit airport by taking Drennan Rd/Milton E Proby Pkwy. Turn right onto S Powers Blvd. Turn left at E Fountain Blvd/US 24 (E Fountain Blvd/US 24 turns into Martin Luther King, Jr. Bypass/US-24). Take I-25 North Exit. Follow I-25 North for approximately 71 miles. Take Exit 210B Colfax Avenue, turn right onto Colfax Avenue. Turn left on Kalamath. Kalamath becomes Stout. Proceed underneath the convention center. Hotel will be on right, just past 14th Street.
From Centennial Airport (APA): Exit airport by taking S. Peoria St to E Broncos Pkwy. Turn left at E Broncos Pkwy, which turns back to S Peoria St. Turn left at E Arapahoe Rd to I-25 North. Take Exit 210B Colfax Ave. Turn right on Colfax Ave. Turn left on Kalamath. Kalamath becomes Stout. Proceed underneath the convention center. Hotel will be on right, just past 14th Street.
Parking
Parking at the Embassy Suites is valet only. You can park at the convention center for $12.00 for 8 hours, or take the light rail for $5.20/day pass. See here for fare pricing. You can also park at the following lots:
The IT Summit produces technology conferences for executives from the government, education, and corporate sectors. These conferences are produced by and for senior leaders to promote economic development, education, and the proliferation of information technology. We ensure the highest quality events through extensive CIO input.
Jamie Yancy is VP, IT Manager & Security Officer; Jamie’s professional career might best be described as eclectic. Jamie has worked in the IT industry since 1977 as a communicator for the United States Navy. In 1984 he worked for the Argonne National Laboratory and had a key role the redesign of the USDOE Secure Automated Communications Network (SACNET) Jamie also, participated in the government wide Neutral Particle Beam experiment. He has provided communications support for the National Science Foundation experiments at ANL. Jamie in 1990 and began working with Rockwell International and EG&G; providing management of communications at the Rocky Flats Facility Mr. Yancy was a key member of the Rocky flats Leadership academy. He has also served as The Chief Technology Officer for United Western Bancorp. In addition, he Co-Founded a Denver based DSL provider Broadband Solutions and designed and operated the network for a International long distance provider VDC, Built call centers for Teletech. Networks for Matrix Bancorp, Inc. and Legent Clearing and the list. And recently, co-founded Novitious LLC an IT consulting company. Jamie holds a number of certifications including a Certified Information Security Manager (CISM) and is a member of ISACA, ASIS, and ISSA.
Merlin Namuth is the Chief Information Security Officer at ReedGroup. Namuth has over 22 years of IT experience with the last 19 years focused in security. His experience in security is comprised of building and running numerous security programs, program management, managing incident response teams, computer forensics, compliance, architecture, and engineering complex security solutions. Namuth serves on the cyber risk advisory board at Pepperdine University where he also guest lectures. Merlin currently serves on the Board of Directors at iEmpathize, a nonprofit organization focused on educating people about human trafficking. He has presented at RSA and other conferences domestically and internationally. He holds the PMP, CISSP, GCFA and GCIH certifications.
Alexandra Gates is a Senior Product Marketing Manager at Aerohive Networks, where she helps define market strategy and vision for the cloud and WLAN products. She is a CWNA with a comprehensive background in wireless technology, including capacity and management planning, RF design, network implementation, and general industry knowledge.
Abstract: Optimizing user mobile experience requires more than high speed Wi-Fi. IT professionals are facing challenges of capacity, flexibility, security, privacy, and visibility as they evaluate complex combinations of WLAN standards, management, and technology like MU-MIMO. This session covers 802.11ac and upcoming WLAN standards (specifically 802.11ax), iBeacons, and building robust wireless networks.
Learning Objectives: current & future Wi-Fi trends, how to prepare for the influx of Wi-Fi devices (capacity, visibility, & control), 802.11ac and 802.11ax deep dive
Scott Magerfleisch is the Director of Information Technology for the City of Thornton, Colorado’s sixth largest city. Scott has spent the last 12 years working within IT inside the public sector and most recently has focused on leadership development and technology innovations within IT.
Dave knew he had a future in computer networks from the first moment he heard a modem singing its sweet song of connection. More than two decades later, he is immersed in the latest deployments of physical, cloud and hybrid networks. His practical experience ranges from local government and educational sectors to small and medium sized business applications. From Linux and Windows servers to hosted cloud solutions and beyond, Dave loves the challenge of blending available options into the best fit for specific customer needs.
We have all heard the news about the need for Cybersecurity, but what about Cybersecurity training and awareness within the organization? Learn how one organization has achieved over 95% annual completion in formal training, and how they use both vendors and internal awareness to beef up their Cybersecurity posture. Discussion will include strategies used to get high level management support, and well as overall employee buy-in and superior diligence in protecting the enterprise.
JP Batra is Principal and CTO of Blue River International, Inc., a management consulting company supporting its clients with strategicinitiatives, cybersecurity and emerging tech solutions. JP is a mindful leader harmonizing teams across organizational divides. He provides business technology consulting, executing on Client Company’s strategy to accelerate business growth. JP works as an interim CIO and as a strategic initiatives leader managing complex, revenue impacting and cybersecurity initiatives.
He has managed C-suite sessions where CIOs exchange ideas in a non-sales environment. JP can be reached at [email protected]
Sam Masiello has been working with email, messaging, and fighting internet pollution for over 25 years. Mr. Masiello currently serves as the CISO at Gates Corporation where he is responsible for the company’s data security, risk, and global compliance compliance initiatives. Prior to Gates, he served as the CISO at TeleTech where he oversaw the protection of employee, consumer, and customer data for all of the organization’s clients, which includes many Fortune 500 companies.
Sam has also been the Chief Security Officer, head of Application Security, and head of Security research at companies such as Groupon, Return Path, and McAfee. He currently serves as Director-at-Large of The Coalition Against Unsolicited Commercial Email (CAUCE), National Advisory Board Member for SecureWorld, and is an Executive Board Member of Colorado Cyber. He has previously served as a member of the Board of Directors for the Messaging, Malware, and Mobile Anti-Abuse Working Group (M3AAWG), the Steering Committee of the Online Trust Alliance (OTA) and a member of the Anti-Phishing Working Group (APWG).
Mike is a veteran leader with deep experience building and operating secure, high performance technical business environment with experience in Retail, Healthcare, Insurance, Entertainment, Manufacturing, and Military Defense.
Enterprises view IAM as a key factor in winning in a digital economy. After all, users in digital economy are diverse, geographically dispersed, and login from multiple devices over different networks, some more secure than others. This is one security initiative that business view a strategic to their growth. A survey of IT decision makers in France, Germany, UK and US identified Security, and Identity and Access Management (IAM) as top two initiatives critical for digital transformation (Ping Identity report 2016).
Yet, many companies are still straddled with legacy identity and access management products that are bolted together, are error prone and impede business growth Attend this session to understand the difference a cloud based IAM can make for enabling digital transformation, the challenges in introducing IAM in an international organization and challenges in managing IAM related security operations in real time retail environment.
“Identity is the electricity by which we drive the new business age in a disruptive way” – Earl Perkins, Security and Risk Management Team – Gartner
Enjoy a complimentary plated lunch courtesy of The IT Summit.
Jesse Hood is a Senior Cyber Security Account Executive at Darktrace, the world’s leading machine learning company for cyber defense. He has worked extensively with clients across numerous industry verticals, from healthcare to finance, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting and autonomously responding to early-stage cyber-threats. Hood is the Regional Director for Darktrace’s Denver office and is focused on expanding Darktrace’s presence throughout the local market and the regional territories in neighboring states.
The fight is no longer at the perimeter. In the new era of cyber-threats, machines fight machines on the battleground of corporate networks. No human security team can keep pace. From high-speed global ransomware attacks to sophisticated threats that disguise themselves for months on a network before taking action, these attacks call for a change in the way we protect our most critical assets.
Self-learning, self-defending systems are now being deployed to secure complex enterprise networks across all environment types – ranging from physical, virtual, and cloud, through to the IoT and industrial control systems. Known as ‘immune system’ defense, this approach uncovers threats that have already penetrated the network border and then automatically fights back. Unlike legacy approaches that rely on rules or signatures, immune system security learns and responds autonomously, enables the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.
In this session, learn about:
The new age of silent, stealthy attacks that lie low in networks for weeks and months
Why legacy approaches, like rules and signatures, are proving inadequate on their own
How new ‘immune system’ technologies based on advanced mathematics and machine learning are being deployed today
Real-world examples of subtle, unknown threats that routinely bypass traditional controls
Clint Wyckoff is a Technology Evangelist and Senior Solutions Engineer at Datrium. He is an avid technologist and virtualization fanatic with more than a decade of enterprise data center architecture experience. Clint is an energetic and engaging speaker and places a large emphasis on solving the real-world challenges IT professionals face. Additionally, he is a 2x Microsoft Most Valuable Professional (MVP) for Cloud and Datacenter Management, VMware vExpert for 2015, 2016 & 2017 Cisco Champion as well as Co-Founder and Leader of vBrisket. Clint is also an AWS Certified Solutions Architect, Veeam Certified Engineer (VCME) and Microsoft Certified Professional (MCP).
The days of managing the IT Infrastructure are long gone. Administrators demand simplicity and users demand reliable and available applications and services – delivering upon these demands has been a long time challenge for organizations. Open Converged delivers a new breed of simplicity, reliability and performance by combining compute, primary and secondary storage and cloud backup into a single framework.
Daniel Erlenbusch, is the Director of IT at PENRAD Imaging in Colorado Springs, CO. He has been with PENRAD for over 17 years. He is also the HIPAA Security Officer for PENRAD. Before that, he taught Elementary Education for 8 years in Colorado Springs, CO. He is very passionate about technology and loved to teach children how to make webpages.
I will be showing people one way they can use Microsoft OneNote to keep their IT team organized. I will demonstrate, how to build a digital notebook to keep you and your team projects organized and easily sharable and searchable.
COO ISRSEC International, Ltd. CISO ISRSEC (North America) FS2S full spectrum full scope security -unconventional cyber warfare/cyber defense/cyberwar/cyber security. Cyber and physical ops TTPs. Intel (all-source), “Big Data and Big Data Security” . CyOps – PsyOps – SciOps trinity.
PARA Security/Defence – PROACTIVE ACTIVE REACTIVE ADAPTIVE (TM)
C-level/board level presentation. CNI, national, international, multi-national issues, solutions, full teams (12 – 125 or more selected cyber security-umbrella security personnel)
In security. cyber security. cyberwar, cyber warfare, cyber defense,,, etc … amateurs study technology/tech, professionals ‘study people’. 1) It’s not the weapon, it’s the person using it,,,, pr 1a) “You arm the man, not man the weapon” 2) People think that ‘their reality’ is reality,,, and this gives so much ‘room’ to act. 3) In modern cyber security/defense, it’s people -process -operations in that order and in that priority with tech being the tools layer of operations. 4) For a lot of businesses, from a security PoV, the cloud is like a gigantic basket holding many many smaller baskets,, with all their eggs in it.
5) Surviving ‘collateral damage’ – Skeletor and Nitro Zeus and CCaprica level attacks and exploit campaigns,,,, and not a thing many businesses are willing to do about it ,, given IT and ops momentum and current ‘thought leadership’ .
Matthew Mandich is Vice President Commercial Strategy & Sales with Info-Tech, where he develops sales strategy and commercial teams across Info-Tech.
Matthew has with extensive experience in assisting organizations take new approaches to managing the IT organization with a focus on data driven performance management. He brings over 10 years of IT experience across research, management consulting and advisory.
Prior to joining Info-Tech, Matthew was worked in Canada’s Operations & Logistics group at BMW Group focusing on analytics and forecasting. Matthew brings value as a business solution architect where his unique blend of consulting and operating experience helps build pragmatic solutions to complex IT problems.
Matthew holds an Honors Distinction HBA from the Richard Ivey School of Business at the University of Western Ontario with a focus on financial & economics.
IT can often feel like an unwinnable game, with limited resources, changing priorities, multiple stakeholders and increased demands. Too often, IT leaders must make decisions with insufficient information and without knowing the true effect on the business.
Info-Tech’s framework removes the guesswork from what makes the business happy and predicts the impact of key decisions before they happen.
Info-Tech will walk you through the 3 real drivers of business satisfaction, and help IT leaders navigate a world in which:
• Only 28% of Business Leaders are satisfied with the performance of IT
• 67% of CIOs are not aligned with executives on the role of IT
Jeff Willinger is the Vice President of Digital Inspiration at Rightpoint and Microsoft MVP. He is an internationally recognized online influencer, analyst, and expert on all things web collaboration, enterprise social networking, and enterprise IT strategy and is one of the top SharePoint, Office 365 personalities and in the world. He specializes in advising clients on creating the digital workplace and enterprise software strategies, collaborative intranets and portals, mobile and increasing employee engagement and involvement. With experience spanning more than two decades, he is an internationally recognized speaker and expert in all CMS solutions, video and is a technology and business evangelist with deep expertise in user experience, information architecture, enterprise content management, and web 2.0 technology strategy. A character with character, he is the President and Founder of the Social Media Club of Chicago, and serves as Executive Vice President for Business Marketing Association in Denver and Chicago.
Organizations with a modern workplace strategy in place are seeing vast improvements in: employee productivity (78%), increased revenue (70%) and new approaches to drive innovation (78%). Find out how to speed up business cycles and increase productivity to drive competitive advantage.
A successful digital workplace integrates social, mobile, analytics and cloud in an intelligent context that is tailored to the role and responsibilities of employees. The outcome focuses on driving the maximum increase in employee efficiency, performance and innovation. But what does the future look like?
Join me in this interactive session to find out what it takes to make the leap into the future of Collaboration
Session Highlights Include:
· Benefits of a digital workplace
· Growth powered by a high-performance workplace
· Digital Workplace Trends and what does digital transformation look like
Aaron joined GTRI in 2017, after 6 years at Zayo leading Cloud Solutions Architecture & Product Development. He is a problem solver that excels at aligning business needs with technology solutions. Over the last decade, he has designed and implemented solutions for companies ranging from Fortune 10 to Startup and across industries from Financial Services to Retail to Healthcare to Software to Content Providers. His areas of specialization include: Public & Hybrid Cloud, Virtualization, Storage, Disaster Recovery & Data Center Architecture. Aaron holds two degrees from Yale University, B.S., Mechanical Engineering & B.S., Economics.
In his work as CISO and vice president of client strategy at GTRI, Aaron Simmons oversees the company’s strategic, cross-industry relationships with corporate and government leadership teams and acts as a service liaison to GTRI account management. He also lends his expertise to managing and expanding the company’s existing security practice.
Aaron joined GTRI after nearly three decades of exemplary performance in the highest levels of corporate security and strategy, including time at Gates Corporation, where he held positions as CISO and global director of infrastructure and security, and Time Warner Telecom, where he was the senior security engineer. Additional prior positions include VP of IT at Schryver Medical, as well as solutions and networking engineer roles at Qwest Communications, Sabre and American Airlines. In addition, he is a Certified Information Systems Security Professional (CISSP #371120).
This presentation will provide practical and actionable advice on securing AWS cloud infrastructure . AWS Cloud shared security model means that AWS as a Cloud Service Provider (CSP) will provide physical security and security of the systems that support their Infrastructure as a Service (IaaS) offering. However, the customer bares much of the responsibility of configuring their access security, the virtual networking, cloud connectivity, protocol filters, their virtual servers, and storage. This presentation will review the best practices for configuring AWS security.
Scott Morley is a Principle Application Architect at OneNeck IT Solutions, he is responsible for providing guidance and advisory services surrounding Dynamics AX and Azure in the areas of architecture, performance engineering, application integration and leveraging the hybrid cloud. Scott has over 20 years of IT and business experience in software development, security and enterprise application implementation. Scott has an extensive technical background in the Microsoft Stack and exceptional knowledge of MES systems. Prior to joining OneNeck, Scott was a technical manager on multiple ERP implementations and developed and managed an AX infrastructure team.
It’s hard to dispute the benefits that come with Cloud adoption, when implemented wisely. The challenge comes from selecting the right workloads to move at the right time. Trying to do this across multiple clouds only adds to the confusion. Join us for a quick discussion on the benefits and pitfalls of multi-cloud and how to create an adoption strategy.
JP Batra is Principal and CTO of Blue River International, Inc., a management consulting company supporting its clients with strategicinitiatives, cybersecurity and emerging tech solutions. JP is a mindful leader harmonizing teams across organizational divides. He provides business technology consulting, executing on Client Company’s strategy to accelerate business growth. JP works as an interim CIO and as a strategic initiatives leader managing complex, revenue impacting and cybersecurity initiatives.
He has managed C-suite sessions where CIOs exchange ideas in a non-sales environment. JP can be reached at [email protected]
Mike is a veteran leader with deep experience building and operating secure, high performance technical business environment with experience in Retail, Healthcare, Insurance, Entertainment, Manufacturing, and Military Defense.
Consider headlines like these:
Digital Disruption could threaten 40% jobs – Productivity Commission, Australia (The world today, June 14, 2016
Automation and Anxiety – Will smarter machines cause mass unemployment? The Economist, June 25th, 2016
The US retail apocalypse is killing jobs, and it’s left ‘the economy vulnerable to an adverse shock’ – Business Insider, Nov 15 2017
What do these news have in common? The uncertainty in the market caused by innovation and disruption. Existing business models are challenged from unexpected competitors. With unstable business position, employees working for such a company themselves face uncertainty. How can one protect themselves in such a disruptive market? Actually, what can employees do to face the disruption challenge head on, be prepared and thrive in this uncertain market? Come attend this session to learn how markets are getting disrupted, and what one can do to improve their success rate in such a market.
The opportunity to present to Executive management the current state of the security organization is critical in the support and backing you can anticipate receiving. Today’s executives do not want to hear either “all is well” or “all is lost” but they need to be presented with the facts and given concrete evidence to make the appropriate decisions in order to have continuous improvements to the structure, financial support, and effectiveness of the program. Failure of the security leadership to present the evidence, in a manner in which the executive leadership can understand, can push a program into failure. So how do you frame up the program to non-technical leadership? What resonates with the corner suite? How does the security organization not drop into ‘scaring’ the companies leadership into action but still communicate urgency and concern?
People want to work anywhere; on any device, and IT needs to enable them — without drowning in complexity or compromising on security, performance, reliability or cost. Aerohive’s mission is to Simpli-Fi these enterprise access networks with a cloud-enabled, self-organizing, service-aware, identity-based infrastructure that includes innovative Wi-Fi, VPN, branch routing and switching solutions.
Axis provides IP-based network video solutions including network cameras (IP cameras) and video encoders for security surveillance and remote monitoring.
Barracuda Networks, Inc. offers industry-leading solutions designed to solve mainstream IT problems – efficiently and cost effectively – while maintaining a level of customer support and satisfaction second to none. Barracuda Networks products span three distinct markets, including: 1) content security, 2) networking and application delivery, as well as 3) data storage, protection and disaster recovery.
While Barracuda Networks maintains a strong heritage in email and web security appliances, their award-winning portfolio includes more than a dozen purpose-built solutions that support literally every aspect of the network – providing organizations of all sizes with true end-to-end protection that can be deployed in hardware, virtual, cloud and mixed form factors.
CitiBank, Coca-Cola, Delta Dental, FedEx, Harvard University, IBM, L’Oreal, Liberty Tax Service, Mythbusters and Spokane Public Schools are amongst the more than 150,000 organizations worldwide confidently protecting their users, applications and data with Barracuda Networks’ solutions. The company is privately held with its international headquarters and manufacturing facility based in Campbell, California. Barracuda Networks has offices in eight international locations and distributors in more than 80 countries worldwide.
Birch delivers leading technology services in customizable voice, internet and cloud bundles for small, mid-size and enterprise businesses.
Global Affairs Canada has identified the following 2017-18 priorities for advancing the government’s progressive and inclusive agenda, including increased commitment to openness and transparency, especially in evaluation and reporting. These priorities will be advanced through strategic bilateral and multilateral engagement, including public diplomacy and advocacy in preparation for Canada’s presidency of the G7 in 2018, and in collaboration with a diversity of partners in Canada and abroad.
CenturyLink is the third largest telecommunications company in the United States and is recognized as a leader in the network services market by technology industry analyst firms. The Company is a global leader in cloud infrastructure and hosted IT solutions for enterprise customers. CenturyLink provides data, voice and managed services in local, national and select international markets through its high-quality advanced fiber optic network and multiple data centers for businesses and consumers. The company also offers advanced entertainment services under the CenturyLink® Prism™ TV and DIRECTV brands. Headquartered in Monroe, La., CenturyLink is an S&P 500 company and is included among the Fortune 500 list of America’s largest corporations.
Darktrace is the world’s leading machine learning company for cyber security, having developed AI algorithms that mimic the human immune system to defend enterprise networks of all types and sizes. Created by mathematicians from the University of Cambridge, Darktrace’s Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IOT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal’ for all devices and users, updating its understanding as the environment changes.
By applying its unique, unsupervised machine learning, Darktrace has identified 30,000 previously unknown threats in over 2,000 networks, including zero-days, insider threats and subtle, stealthy attacks. The company has experienced 600% year-on-year revenue growth. With 370 employees in 23 offices and dual headquarters in San Francisco and Cambridge UK, Darktrace was named ‘Best Security Company of the Year 2016,’ ‘Bloomberg Innovator,’ and ‘GSN Homeland Security’ award winner. The company’s valuation is $.5 billion and its investors include KKR, Softbank, Summit, Invoke Capital, and Samsung.
Like our leadership, Datrium is a balance of people who come from virtualization and storage backgrounds. Our product reflects this. Our founders include (sometimes double-counting):
2 VMware Principal Engineers
1 EMC Fellow
2 EMC VPs
1 Data Domain Founder
2 Data Domain CTOs
1 Initial Architect, NetApp SnapVault
It’s obvious why VMware matters. Through their work in the ESX hypervisor, fault tolerant clustering and many other projects, Boris and Ganesh have had a central view of the evolution of the vSphere ecosystem and the associated storage bottlenecks.
Data Domain produced the most widely deployed log-structured file system in history and the most widely deployed inline compressed / deduped file system. These are unorthodox storage foundations historically, but as it turns out they are central to the future of enterprise storage. As flash and disk media progress, they both require large, loggy writes. Also, write amplification in lower-cost SSDs is reduced by an order of magnitude leading to better durability based larger log writes with deduplication and compression inline, like Data Domain.
There are many storage companies, but only one Datrium.
ESET is a pioneer in the antivirus industry with its award-winning NOD32 technology celebrating its 25th anniversary in 2012. ESET advanced security solutions are trusted by businesses and consumers around the world for protection against today’s most sophisticated cyber attacks. On a daily basis, we protect millions of users across all types of environments – be it computers, laptops, mobile devices or servers. ESET Endpoint Security and ESET Endpoint Antivirus, in addition to ESET NOD32 Antivirus, ESET Smart Security and ESET Cyber Security (solution for Mac), are trusted by millions of users globally and are among the most highly recommended security solutions in the world.
The International Standardization Organization (ISO) provides requirements, specifications and guidelines that are used consistently to ensure materials, products, processes and services are fit for their purpose. We proudly hold an ISO 9001:2008 quality certification, which reflects our tireless commitment to continual process improvement.
We participate in a continuing certification process. This certification process encompasses an annual internal and external audit of our quality management system (QMS) by an accredited ISO Registrar. Our process includes quarterly management reviews, as well as customer satisfaction survey reviews. During management reviews, we ensure the continuing suitability, adequacy and effectiveness of the ISO 9001:2008 QMS requirements. These reviews include the assessment of opportunities for improvement. They also set new policies and objectives as appropriate. During customer survey reviews, management identifies actions to correct any problems or potential problems resulting from survey scores and feedback.
HARMAN designs and engineers connected products and solutions for consumers, automakers, and enterprises worldwide, including audio, visual and infotainment systems; enterprise automation solutions; and software services. With leading brands including AKG®, Harman Kardon®, Infinity®, JBL®, Lexicon® , Mark Levinson® and Revel®, HARMAN is admired by audiophiles, musicians and the entertainment venues where they perform around the world.
International Institute of Business Analysis (IIBA) is the independent non-profit professional association for the growing field of business analysis. Our goal is to create greater awareness of the BA profession by defining what is business analysis and working towards recognition of the value of the business analyst role. IIBA® can help your business do business better, to gain a competitive advantage in the marketplace and enable your organization to succeed.
Info-Tech Research Group is the world’s fastest growing information technology research and advisory company, proudly serving over 30,000 IT professionals.
We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.
ITC Telecom Technology, LLC is a national company with deployments in all 50 states and 11 countries around the globe, since 1996. Our highly focused and experienced team is “big enough to serve, but small enough to care,” and we approach each customer as a partnership opportunity.
Jack Henry Banking® serves more than 1,300 banks with leading-edge technology, in-house and outsourced alternatives, unmatched service, and integrity-based relationships. Visit www.jackhenrybanking.com.
Since 1999, MeetingOne has been a top solution provider of integrated audio & web conferencing, eLearning platforms, webinar event facilitation & meeting consulting services. As a strategic partner of Adobe since 2005, MeetingOne has become a global Gold Solutions partner of Adobe Connect uniquely offing all services. MeetingOne strives to bring its clients quality products and services that optimize previous investments by integrating with existing popular platforms and software’s. MeetingOne is headquartered in Denver, Colorado with international locations in France and Belgium.
OneNeck IT Solutions LLC delivers hybrid IT solutions, including cloud and hosting solutions, managed services, enterprise application management, advanced IT services, hardware and top-tier data centers in Arizona, Colorado, Iowa, Minnesota, New Jersey, Oregon and Wisconsin. OneNeck’s team of technology professionals manage secure, world-class, hybrid IT infrastructures and applications for businesses around the country.
Through thought leadership and innovative engineering, OneNeck helps customers reduce costs, improve service levels, increase revenues and gain local-to-global competitive advantage. OneNeck customers span multiple industries including healthcare, manufacturing, financial services, retail and government. They choose OneNeck because the tenured and experienced team leverages ITIL based practices to manage mission-critical data centers, cloud and customer infrastructure 24/7. In addition, OneNeck has successfully completed Type 2 SSAE 16 (SOC 1) examination, PCI Data Security Standard validation, ISO 27001 certification and HIPAA and HITECH examination. This helps assure customers that their data is secure, available and meets their compliance requirements.
OneNeck is a wholly owned subsidiary of Telephone and Data Systems, Inc. [NYSE: TDS] whose businesses also include U.S. Cellular and TDS Telecom. OneNeck employs nearly 550 people throughout the United States. Visit oneneck.com.
Outersafe provides a comprehensive approach to security for the SMB and Enterprise market. Our Security as a Service offerings allow for true perimeter to endpoint security with solutions for any organization and SIEM compliancy solutions with Intel Security. We partner with many companies such as Intel, Raytheon/Forcepoint, Cisco and Microsoft to allow for an ecosystem of partners to achieve a best of breed ability. We take into consideration the company’s needs, security goals, configuration and take an agnostic approach when recommending solutions.
We are certified on all our systems we consult on and implement. We are first to market with many solutions such as the Next Generation Firewall technologies that offer a layer2 wiretap implementation which allows for a plug and play install and to help stop attacks that other devices cannot.
Our services are most beneficial for companies that:
• have interest in complimenting in house expertise with Security as a Service.
• understand the increase in cyber security threats requires an end to end strategy.
• interest in end to end security for regulatory/reporting concerns such as HIPAA, FDA, DOD, SEC, SOX and other compliancy demands.
• look for a comprehensive solution that can get you closer zero Malware.
RSM US LLP is a leading provider of audit, tax and consulting services focused on the middle market. We guide our clients through business challenges by understanding their needs and bringing together the right team to address them. With 8,000 professionals and associates in 80 cities nationwide and access to more than 37,500 people in 110 countries through our membership in RSM International, we can meet your needs wherever in the world you do business.
Scale Computing integrates storage, servers, and virtualization software into an all-in-one appliance-based system that is scalable, self-healing, and as easy to manage as a single server. Using industry standard components, the HC3 appliances install in under an hour, and can be expanded and upgraded with no downtime. High availability insulates the user from any disk or server failure and a unified management capability driven by the patented HyperCore Software™, efficiently integrates all functionality. The result is a data center solution that reduces operational complexity, allows a faster response to business issues, and dramatically reduces costs.
When we opened our doors in December 2003, we built our brand on a foundation of industry knowledge, strong leadership, and a background in driver development, storage consultation, and developer toolkits. Today, StorageCraft Technology Corporation is a global company with excellent revenue growth, talented employees, a mature line of award-winning business continuity products, and a worldwide network of successful channel partners and resellers. We operate from our corporate headquarters in Draper, Utah, and international offices in Ireland, Japan, and Australia.
StorageCraft is committed to the channel distribution model because it allows our award-winning backup and disaster recovery software to be integrated into larger solutions, and because it allows our MSP (managed service provider) and VAR (value-added reseller) partners to provide better customer experience for end users. Everything we do—from snapshot to the cloud and back again—is designed to make fast, reliable, and complete recovery a reality for our channel partners and their customers.
We make it easier and quicker for you to Search, Save and Connect with the technology products, services and vendors you need. We connect technology users with technology providers, by offering filtered searching and information gathering that is not driven by advertisement.
How can asphalt help save the environment? How can a scalpel in one state help save a patient in another? How can a sensor the size of a nickel help stop food poisoning? At Verizon, we have one mission: to give humans the ability to do more in this world.