The IT Summit was selected as one of the top ten "must-attend" events for CIOs and IT Marketers
– April 2013 CTOsOnTheMove.com
The 2014 Houston conference has concluded. Please see the summary below, and check back later to
review the agenda and other details of our 2015 event.
This year we will be bringing you two conferences in one! ASIS Houston Chapter and The IT Summit under the same roof! Admission is complimentary for both conferences!
Houston Food Bank
The IT Summit is honored to partner with the Houston Food Bank as part of our continued commitment to our local communities. We invite you to join us in helping families in need. All of our guests — delegates and sponsors – are encouraged to contribute to this worthy cause. We will be accepting donations both at the door and online via our virtual food drive. We would appreciate your noting "The IT Summit" in the "Dedication" box. Two cans of food are recommended at the door.
Please join us in supporting the Houston Food Bank with your generous contributions.
Overview
The IT Summit is the executive technology conference series returning to Houston for our second annual event on May 14th, 2014. The purpose of the summit is to provide educational and networking resources for the IT leaders throughout the region. The conference is driven by an Executive Board of regional IT professionals that directs the content of the educational sessions and sponsor participation. The IT Summit is designed to address the real-world opportunities and challenges faced by today’s executives, by facilitating face-to-face interaction and networking among information technology peers.
Join your peers at the conclusion of the conference to enjoy the Executive Reception. The first 150 guests will receive a complimentary glass of beer or wine.
Event Updates and Information
Earn Free CPE Credits at The IT Summit
The IT Summit offers complimentary certificates of attendance for CPE credits. Continuing professional development or continuing professional education is the means by which people maintain their knowledge and skills related to their professional lives. Upon completion and approval of your registration, we will provide you with information on how you can receive free CPE credits at The IT Summit.
.
Agenda
7:30 AM – 4:00 PM
Registration Open – Lobby
7:30 AM – 8:00 AM
Tour Exhibits – Visit our solution providers and learn about the latest technologies.
Join us for morning coffee.
Complimentary for all guests.
Frank Weber Director of Cyber Security
Energy Sector NSS Labs, Inc.
Mark Freed
FMC Technologies
Executive Board
John Christly Chief Information Security Officer/NSU HIPAA Security Officer
Office of Innovation and Information Technology, Nova Southeastern University
Harvey Nusz Board Member / VP & Program Chair
ISSA, South Texas Chapter / ISACA, Greater Houston Chapter
Greg Autry Chairman
ASIS Houston
Paul Scott President
OWASP, Houston Chapter
Michael Miller Director of IT
EMS Global
Luis Oliveira System Analyst
The University of Texas Health Science Center
Jennifer Hohman Director of IT
ConocoPhillips
Ralph Johnson President
Holistic Information Security Practitioners Institute (HISPI)
Ajith Nair Director, Strategic Analysis
MD Anderson Cancer Center
Enjoy a delicious cup of coffee while catching up with your IT-professional peers and visiting with our vendors, before beginning your day of education and networking.
As chief executive officer of Quantum Technology Sciences, Dr. Tinker sets the strategic vision of the company for geophysical security and surveillance applications. Dr. Tinker has been the driving force to shatter the antiquated barriers that defined the limits of geophysical sensing and in so doing establish Quantum’s preeminence in tactical geophysics for security and surveillance.
His career with Quantum spans more than 15 years. During the first eight years, he designed and developed new platforms for nuclear explosion monitoring, and was the Program Manager for the United States National Data Center, the global system that monitors the world for nuclear explosions.
During the last 10 years, Dr. Tinker has positioned the company to focus exclusively on world-class geophysical challenges associated with security and surveillance. This led to the original development of the core technology found in Quantum’s products today
Dr. Mark Tinker will overview state-of-the-art seismic-based surveillance systems and the value they now add in securing perimeters, linear assets, and areas against trespass, damage, loss, and other threats.
Leland is the Vice President of Global Corporate Security for Bank of New York Mellon. He is responsible for all physical protection and investigations of the southwest part of the United States, Mexico, Chile, Argentina, and Brazil (LaTAM).
Leland graduated with a Bachelor’s of Science degree from Sam Houston State University in Criminal Justice and Law Enforcement/Police Science. He received his Master’s in Security Management from the University of Houston-Downtown.
Leland’s certifications include the (Certified Protection Professional (CPP) from ASIS International; the Certified Financial Security Services Professional (CFSSP) from the Institute of Certified Bankers; and the Certified Fraud Specialist (CFS) from the Association of Certified Fraud Specialists.
He is a member or chairman of numerous other security and investigative organizations and has been a member of ASIS since 1987. Leland is a guest speaker for several security and cyber related issues.
Veronica Sagastegui is an Intelligence Analyst at FrontierMEDEX (a United Healthcare International company). Veronica joined the FrontierMEDEX Security Services team in 2010 after graduating from Rice University with a B.A. in Economics and International Policy. Veronica is responsible for monitoring the political affairs and security issues, in addition to any social and economic developments, in Central and South America. Veronica’s overseas experience — she lived in Venezuela and Mexico for seven years — gives her a unique take on events taking place in Latin America. Veronica has been most recently following the election cycle in South America and monitoring the security, medical and logistical issues associated with the upcoming 2014 FIFA World Cup in Brazil.
The presentation will focus on the corporate and individual risks in Mexico involving a wide range of industries and the mitigation steps that should be taken/considered at a corporate and individual level (for local nationals and expats) to mitigate the risks of operating in high-risk environments such as Mexico. Moreover, many of these protective steps are applicable to operating in many other high-risk oil extraction environments, i.e. Nigeria.
Former CIA Executive Phil Houston is the CEO of QVerity, which is a provider of behavioral analysis and screening services for private and public-sector clients worldwide. Phil is a nationally recognized authority and expert on deception detection, strategic interviewing and elicitation. His 25-year career with the Central Intelligence Agency was highlighted by his service as a senior member of the Office of Security. In that capacity he conducted thousands of interviews and interrogations for the CIA and other federal agencies, both as an investigator and as a polygraph examiner, and he’s credited with developing a detection of deception methodology currently employed throughout both the U.S. intelligence and Federal Law Enforcement communities. The scope of Phil’s work covered criminal activity, personnel security and key national security issues, including both counter-intelligence and counter-terrorism. The fact that many of his interviews were conducted in foreign countries, coupled with six years of residence overseas, has given him unique insight and extensive experience in dealing with foreign cultures, particularly in the Far East. Upon his retirement, Phil was awarded the Career Intelligence Medal.
Phil introduced the detection of deception methodology to the corporate world with the co-founding of Business Intelligence Advisors, where he served as Executive Vice President and worked with the company’s largest clients in the U.S. and abroad. Phil is the co-author of the NY Times Best Selling book Spy The Lie, which details the detection of deception methodology he developed while at CIA. The story of his success in creating a commercial application and market for the detection of deception methodology is also featured in the recently published book, Broker, Trader, Lawyer, Spy by CNBC correspondent Eamon Javers.
Phil holds a B.A. in Political Science degree from East Carolina University in Greenville, N.C.
SPY THE LIE
“SPY THE LIE” is a presentation drawn from the New York Times bestselling book by the same name that is based on a detection of deception methodology developed by Mr. Houston during his tenure at the CIA. The presentation provides the audience with key tips on how to better detection deception and not be fooled by human behavior designed to mislead them. Mr. Houston and his team regularly employ these techniques on behalf of both their corporate and financial clients in a myriad different business applications, including negotiations, “C-suite” level screening, and due diligence. The presentation is both interactive and entertaining, while at the same time enabling participants to significantly enhance their detection of deception skills in a remarkably short period of time
Nicole Labun is an Intelligence Watch Officer at FrontierMEDEX (a United Healthcare International company). Nicole joined FrontierMEDEX’s Houston office in June 2013 and recently graduated from the Monterey Institute of International Studies with a Master of Arts degree in Nonproliferation & Terrorism Studies with a concentration on terrorism in Russia. Nicole serves as the primary support function for the Intelligence department and the company’s Emergency Call Center during off-duty hours, which includes monitoring news sources and alerting clients to emerging world events that may impact travel, handling emergency calls and acting as the main interface with clients. Additionally, Nicole is the analyst for numerous countries in Central & Eastern Europe. . Most recently, Nicole studied developments in Russia and the North Caucasus and assessed the impact they will have on the security situation at the 2014 Winter Olympic Games in Sochi, Russia.
Comprehensive Planning is about research, evaluation, planning, communication, preparation and execution. This course will help security providers establish a formula for success, recognizing that each client has specific challenges and each building possesses its own strengths and weaknesses.
Stuart has developed and led information security programs for multi-billion dollar companies for the past seven years and is currently the Director, IT Security & Compliance for one of the largest publicly-traded energy partnerships. The companies he has been responsible for cover a broad range of industries, including the oil & gas, chemical, financial and automotive industries. Stuart received his MBA from Rice University. He has served as President of the award-winning South Texas Chapter of the Information Systems Security Association, as well as a member of ISACA and InfraGard. His experience includes information security policy development, creating security awareness campaigns, leading incident response teams, and setting information security strategy. He is excited to share his passion for information security and to discuss ways to induce appropriately controlled paranoia in the computer using population.
Muni Chatarpal is Manager of Security at Noble Drilling Services Inc. In this role Muni is responsible for IT Security for Noble Drilling Services, Inc. worldwide operations and has accountability for security in areas of Information technology and SCADA. Prior to joining Noble, Muni worked as an IT Security Governance Advisor for Enbridge US Operations and several consulting companies including International Network Services (INS) and Sogeti USA LLC. Muni earned his M.S. in Computer Engineering from the University of Houston and currently maintain several IT Security related certifications including CISM, CISSP, ECSA, and CEH.
Tim Proffitt (CISSP, GIAC, MCSE, NNCDE, CCNA) is the Director of Technology GRC at Insperity Inc. He has over 23 years’ experience in the technology field, holds over 24 industry certifications, and earned a Master’s Degree from the SANS Institute in Information Security Management. Tim is also a Professor at Lone Star College in the Business and Technology Department and has published several papers covering topics on forensics, incident response, metrics, and compliance.
Enjoy networking with your IT peers over lunch at The IT Summit.
Join your IT peers for a complimentary luncheon including assorted sandwiches, salads, and dessert. This is a perfect opportunity to interact with other technology professionals in a relaxed environment.
Craig is the Vice President & General Manager of the LogLogic business unit for TIBCO Software and is responsible for global field sales & operations as well as product engineering research, development, design and management. This is a position in one of TIBCO’s growing divisions and leverages Craig’s unique combination of sales, product development/management and operations experiences as well as his customer knowledge gained from his roles as an IT Infrastructure executive at a number of large enterprise companies. The role is accountable to: Define & Deliver the LogLogic product roadmap; Drive revenue growth; Accelerate integration with key TIBCO products; Implement nimble, agile development practices; and Identify & lead future acquisitions.
Security and IT Optimization are primary concerns for most organizations seeking to identify threats risk, reduce risk and increase operational efficiency in order to achieve a competitive advantage. Many successful IT departments are turning to Logging as a Service (LaaS) as a solution. LaaS is a model for centrally ingesting and collecting any type of log files coming from any given source or location. Join Craig Hinkley, GM of TIBCO LogLogic who present real-life examples and technology highlighting how today’s organizations are turning to a Logging as a Service model to meet their security needs as well as optimize their IT infrastructure.
Ed brings 20 years of experience to his role leading the product development, engineering and sales engineering teams for ArcMail in North America. He is also an author and speaker.
At ArcMail, our fully-compliant and secure archiving solutions integrate with the latest platforms and technologies. All content types, email attachments, SharePoint, social media and collaboration content are indexed, archived and accessible at a moment’s notice. That’s why ArcMail is recognized in Gartner’s 2013 Magic Quadrant for Enterprise Information Archiving.
Information governance for the changing landscape keeps IT leaders up at night presenting a constant array of challenges. Can you locate that email attachment or other important data from a year ago? Are you prepared for an e-Discovery order? Are you in compliance with regulations related to information retention? We’ll look at all of these questions as well as what it takes to protect your most critical digital assets.
Apple TV gives you access to the best 1080p HD content — including blockbuster movies, hit TV shows, live sports, your music, photos, videos, and more — right on your widescreen TV. You can even play content from your iOS device or Mac on your TV using AirPlay.
Marie Schmidt is a Senior Intelligence Analyst at FrontierMEDEX (a United Healthcare International company). Marie became part of the FrontierMEDEX Security Services team in 2008 after receiving her Master of International Affairs degree from Texas A&M University. Marie is responsible for monitoring political, security, social and economic developments in the sub-Saharan African region, identifying trends and forecasting future behavior to help mitigate safety and security threats faced by travelers and expatriates. Marie has been most recently following developments in the Central African Republic (CAR) in the aftermath of that country’s March 2013 coup and the emergence of religious sectarian violence in late 2013. Marie has also consulted on Nigeria’s radical Islamist sect Boko Haram, as well as on emergency situations in recent years in the Democratic Republic of Congo (DRC), Mozambique, Madagascar and Uganda.
Edward C. Shaw worked as a Special Agent for the FBI for over 24 years. During that time he conducted investigations in the following locations: the U.S. territory of Guam; Houston, Texas; FBI Headquarters in Washington D.C.; and Tokyo Japan. From 1999 to 2004 he was the Assistant Legal Attache at the U.S. Embassy in Tokyo, Japan. In that position he handled various FBI joint investigations with all counterpart law enforcement, investigative, and intelligence agencies in the government of Japan. From 2009 to 2012 he returned to the Tokyo, this time as the Lead Legal Attache at the U.S. Embassy in Tokyo, Japan. During this second assignment he was in charge of all liaison and joint investigations between the FBI and all counterpart law enforcement, investigative, and intelligence agencies in the government of Japan.
During his assignments in Tokyo Edward Shaw also handled multiple investigative assignments with law enforcement, investigative, and intelligence agencies in the governments of Australia, South Korea, and Taiwan. Edward Shaw speaks Japanese, is a member of the California Bar, and is also a member of the Houston chapter of ASIS.
As commercial activity crosses international borders more and more each day, criminals follow that commercial activity all over the world. As a result, ASIS members increasingly find themselves working with law enforcement officials from the U.S. and foreign countries. This presentation details some of the tools used by law enforcement officials around the world while investigating a crime which crosses borders, how these tools affect an investigation, and how ASIS members can effectively work with U.S. and foreign law enforcement officials.
Katherine Brocklehurst has led product management and product marketing in network security for over 15 years. Working with network security technologies ranging from protocols to core encryption to intrusion detection/prevention to XML firewalls for web apps, she’s touched every layer in the ISO model, and now focusing on security configuration management, metrics, and analytics. Katherine works every day as senior product marketing manager at Tripwire to assure enabling technologies protect organizations, and help CISOs and their teams survive and thrive.
Protecting our Critical Infrastructure has been an increasing cyber security concern from our nation’s highest office on down. The US Electric utilities industry has been subject to our North American Electric Reliability Corporation’s (NERC) Critical Infrastructure Protection (CIP) Cyber Security Standards since 2008, and we’re now on NERC CIP version 5.
While major strides have been made by the US Federal Energy Regulatory Commission (FERC) and NERC in these past six years, it’s clear there is much more that must be done, and perhaps with a much higher sense of urgency. We’ll examine the five actual most violated NERC CIP compliance audit findings from NERC’s 2013 report. If we’re lucky, we may have the 2014 report to examine instead!
TFO Ackley, one of the senior members of the Innocent Images Squad of FBI Houston, has been combating child exploitation since 1995. TFO Ackley is a Senior Deputy Investigator with the Harris County Sheriff’s Office, employed by the HCSO since 1992. TFO Ackley has investigated hundreds of cases involving individuals who have utilized the Internet to exploit children. TFO Ackley’s cases have reached all over the world, from Ireland and Great Britain all the way to Australia.
With too few law enforcement officers battling the ever-increasing problem of Possessing, Distributing and Producing Child Pornography, law enforcement must increase the presence with the partnership with the public. And who better to assist than the private industry’s IT professionals.
Speaker will be Task Force Officer (TFO) Russell Ackley, from the Innocent Images Squad of FBI Houston. TFO Ackley is one of the senior members of the Task Force, combating child exploitation since 1995. TFO Ackley is a Senior Deputy Investigator with the Harris County Sheriff’s Office, employed by the HCSO since 1992. TFO Ackley has investigated hundreds of cases involving individuals who have utilized the Internet to exploit children. TFO Ackley’s cases have reached all over the world, from Ireland and Great Britain all the way to Australia. Many of these cases have been initiated by IT professionals who have reported their findings through law enforcement.
Dr. Geoff D. Porter is the founder and president of North Africa Risk Consulting, Inc., a consulting firm specializing in political and security risk in North Africa. North Africa Risk Consulting advises multinational corporations on the political and security contexts in Algeria, Libya, Mauritania, Morocco and Tunisia and their impacts on the investment environments.
In addition to managing North Africa Risk Consulting, Dr. Porter is an Assistant Professor at the Combating Terrorism Center at the United States Military Academy at West Point. His research at West Point focuses on conflict and instability and the extractive industries in North Africa and the Sahara.
Prior to establishing North Africa Risk Consulting, Dr. Porter was the Director for Middle East and Africa at a leading political risk consulting firm. Earlier in his career Dr. Porter was an assistant professor of Middle East and North Africa History at Trinity College in Hartford, CT.
Dr. Porter received a PhD from New York University in Middle Eastern and Islamic Studies, an MA from NYU in Arabic Language, and a BA from the same institution in Islamic Studies. He is fluent in Arabic (including Modern Standard Arabic and North African dialect) and French. His translations from Arabic have appeared in The New York Times Op-Ed page. In addition, he has published regularly in the New York Times and the Daily Star (Lebanon), and has appeared on US and foreign media to provide commentary on events unfolding in North Africa.
As a special thank you to all of our guests at The IT Summit, our sponsors have arranged for a prize drawing for you, our valued supporters. The prizes are different at every conference, but in the past have included items such as iPods, golf clubs, sporting event tickets, and eReaders.
Daniel Slaton is an attorney and consultant who practices in the area of homeland security law and regulation, particularly the Chemical Facility Anti-Terrorism Standards (CFATS), the Maritime Transportation Security Act (MTSA), the Transportation Worker Identification Credential (TWIC), rail and highway transportation security, as well as related public policy issues. He has advised on CFATS, MTSA/TWIC, Department of Transportation, Transportation Security Administration, and other regulatory compliance matters for members of industry.
Prior to joining Roberts Law Group, Mr. Slaton served as a judicial intern for the Honorable Jeff Bohm, United States Bankruptcy Judge, Southern District of Texas. Mr. Slaton is a member of the Texas Bar. He received a Bachelor of Arts from the University of Texas at Austin and is a graduate of the University of Houston Law Center, where he published work and served as a Senior Articles Editor for the Houston Business and Tax Law Journal.
As security regulations continue to evolve, the chemical/petrochemical industry is faced with new challenges and areas of focus. These include, among others, preparing for, resourcing, and managing ongoing compliance with the Chemical Facility Anti-Terrorism Standards (CFATS), the forthcoming Transportation Worker Identification Credential (TWIC) reader rule as well as potential updates to the Maritime Transportation Security Act (MTSA) regulations. Understanding the various nuances and complexities of these rules – and knowing what to expect from future rulemakings – is essential to ensuring the development and implementation of sound security strategies that minimize the compliance burden and make sense for each organization.
Join your peers at the end of the conference to enjoy our Executive Reception.
This presentation describes a methodology and benefits for transforming paper-based risk management tools into a living real-time risk and incident management environment.
ACP (The Association of Contingency Planners) is the premier organization for business continuity professionals providing a powerful networking and learning environment for its members. Known for its progressive programs, workshops and symposiums, the organization has become a unifying force in defining and leading the continuously evolving fields of business continuity, disaster recovery, and emergency response (the “profession”). The Organization is strategically aligned with business partners such as DRI International, and BC Management, as well as our corporate sponsors. With a strong presence in North America, ACP has 42 chapters and over 2,300 members. We welcome all individuals, regardless of experience or certification, with an interest in the Profession.
People want to work anywhere; on any device, and IT needs to enable them — without drowning in complexity or compromising on security, performance, reliability or cost. Aerohive’s mission is to Simpli-Fi these enterprise access networks with a cloud-enabled, self-organizing, service-aware, identity-based infrastructure that includes innovative Wi-Fi, VPN, branch routing and switching solutions.
AITP is the community of IT knowledge focused on empowering the IT profession by evolving its members to their full potential as a professional.
It is our goal, our purpose to provide a community network for the IT business professionals to reach their true potential by providing education programs for advancing technology and business skills, leadership development opportunities, networking, peer mentoring and knowledge sharing, and online resources.
Ambit Software is an IT consulting firm that has been in operation for more than 14 years. It helps mid and large sized enterprises derive measurable business outcomes through the efficient use and adoption of information technology. It works in the space of CRM, ERP, Mobility, Cloud Computing, Business Intelligence, Project Management, Product Engineering and Technology Services.
Ambit is a Saleslogix certified business partner and offers end to end services for this leading mid-market CRM product, leveraging its global implementation methodology, speedy roll-outs, dependable operation services and high quality deliverables.
Ambit has a global delivery network that spans across USA, India and Middle East and with access to a diverse pool of specialized talent and employee strength, it has partnered with over 250 customers in successfully executing IT projects. Our customers include The World Bank, US Congress, CCH Wolters Kluwers, HP Financial Services, Saint Gobain, Wells fargo Bank, Sharp Electronics, Innovative Interfaces, Multi Commodity Exchange, Tata Capital, Dubai World Trade Centre, Dubai National Insurance, Arab Media Group, Maybury Retail, Logfret, Alfa Laval, etc.
AMX hardware and software solutions simplify the way people interact with technology. With the increasing number of technologies and operating platforms at work and home, AMX solves the complexity of managing this technology with reliable, consistent and scalable systems. Our award-winning products span control and automation, system-wide switching and audio/video signal distribution, as well as digital signage and technology management. They are implemented worldwide in conference rooms, homes, classrooms, network operation / command centers, hotels, entertainment venues and broadcast facilities, among others.
At ArcMail, our fully-compliant and secure archiving solutions integrate with the latest platforms and technologies. All content types, email attachments, SharePoint, social media and collaboration content are indexed, archived and accessible at a moment’s notice. That’s why ArcMail is recognized in Gartner’s 2013 Magic Quadrant for Enterprise Information Archiving.
ARMA International is a not-for-profit professional association and the authority on managing records and information – paper and electronic.
The association was established in 1955. Its approximately 11,000 members include records managers, archivists, corporate librarians, imaging specialists, legal professionals, IT managers,consultants, and educators, all of whom work in a wide variety of industries, including government, legal, healthcare, financial services, and petroleum in the United States, Canada, and 30-plus other countries.
Originally, ARMA was the acronym for the Association of Records Managers and Administrators. Over the past several years, however, we have seen a broadening of the profession as records management has become a recognized and integral part of information management which is key to doing business. To reflect the changing environment and this “expansion” of the profession, about four years ago the association’s Board of Directors decided to discontinue using ARMA as an acronym and adopted “ARMA International” as a general descriptor of the association.
ARMA International publishes Information Management (IM) magazine, the only professional journal specifically for professionals who manage records and information on a daily basis. The award-winning IM journal is published bi-monthly and features top-drawer articles on the hottest topics in records and information management today, as well as marketplace news and analysis.
The association also develops and publishes standards and guidelines related to records management. It was a key contributor to the international records management standard, ISO-15489.
The ARMA Houston Chapter, with a membership of over 450 persons, is the largest of the 170 chapters worldwide.
ASIS International (ASIS) Houston Chapter, is the Houston, Texas chapter of ASIS International, the preeminent organization for security professionals, with more than 37,000 members worldwide. Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals.
Barracuda Networks, Inc. offers industry-leading solutions designed to solve mainstream IT problems – efficiently and cost effectively – while maintaining a level of customer support and satisfaction second to none. Barracuda Networks products span three distinct markets, including: 1) content security, 2) networking and application delivery, as well as 3) data storage, protection and disaster recovery.
While Barracuda Networks maintains a strong heritage in email and web security appliances, their award-winning portfolio includes more than a dozen purpose-built solutions that support literally every aspect of the network – providing organizations of all sizes with true end-to-end protection that can be deployed in hardware, virtual, cloud and mixed form factors.
CitiBank, Coca-Cola, Delta Dental, FedEx, Harvard University, IBM, L’Oreal, Liberty Tax Service, Mythbusters and Spokane Public Schools are amongst the more than 150,000 organizations worldwide confidently protecting their users, applications and data with Barracuda Networks’ solutions. The company is privately held with its international headquarters and manufacturing facility based in Campbell, California. Barracuda Networks has offices in eight international locations and distributors in more than 80 countries worldwide.
Founded on January 7, 1991, by Mel Hall and Jim Campbell, Bass Computers began as a 2 person company operating in a 100 square foot office. With the loyalty of our customers and the dedication of our team, Bass Computers has greatly expanded throughout the past two decades. Twenty-two years later, our 80+ employees now perform many services in a 56,000 square foot facility.
Bass Computers focuses on providing a positive experience for all of our customers. Our well-trained sales staff and highly-skilled technical team ensure that customers receive the products and support they need and deserve.
And while our commitment to customer satisfaction has remained constant over the years, many other things have changed at Bass Computers. In addition to distribution of computer components, we now offer many other quality products and services.
Code42 is the creator of CrashPlan, CrashPlan PRO, CrashPlan PROe and SharePlan —award-winning onsite, offsite and cloud data protection and management solutions for home, business and enterprise.
Comcast was founded in 1963 as a single-system cable operation of 1,200 subscribers. Since then we’ve grown to be the nation’s leading provider of entertainment, information and communications products and services with 24.4 million cable customers, 14.7 million high-speed Internet customers and 6.1 million digital voice customers in 39 states and the District of Columbia.
Copy is the easiest way to store, protect and share your amazing things online. Copy also lets you sync files between your computers and access everything from anywhere via the Web, your smart phone, or your tablet. You can start using Copy immediately through the Web at Copy.com and by installing the free software on your computer(s). Copy is also available as a free app in the Apple App Store for iOS devices and on Google Play for Android devices.
Our Core Business is the design, installation, and service of sound, video, and lighting systems
Ford AV has been a Commercial Contractor since 1973.
Your installation is our only priority; Ford AV does not sell home hi-fi, satellite or cable TV systems, musical instruments, or operate an internet box sales center Technical Excellence: From the initial design to the final testing and system commissioning, Ford AV engineers have the formal education, training, and experience to provide the most reliable and technically advanced A/V systems
The Engineering team of 35 have degrees in electrical, mechanical, acoustics, computer science, physics, lighting and theater; Ford AV’s engineering staff includes two Registered Professional Engineers.
Ford AV engineers have multiple years of “hands-on” experience and industry certifications.
We stand at the birth of a new generation of businesses, economies, technologies – even democracies. The rapid change in the fabric of the global village is increasingly catapulting us toward greater extremes and uncertainties. At the same time, the quest for growth comes increasingly from less secure, more challenging, and unfamiliar environments. It means that, even in our volatile world, mobility and productivity are an economic imperative.
At FrontierMEDEX, we believe that conquering the new frontiers of the 21st century requires a new, 21st century vision – a world where people, organizations and governments can think, travel and work beyond boundaries.
The Holistic Information Security Practitioner (HISP) Institute (HISPI) is an independent certification organization consisting of volunteers that are true information security practitioners, such as Chief Information Security Officers (CISOs), Information Security Officers (ISOs), Information Security Managers, Directors of Information Security, Security Analysts, Security Engineers and Technology Risk Managers from major corporations and organizations.
The HISPI certification approach prides itself on ensuring that an educational foundation provided by information security training is the corner stone of the HISP certification and the Institute as a whole.
Don’t stop at IT security certification alone. IT certification is important but full security training for a business’s IT Security team is what will make you stand out from the competition. The security certification available through HISPI will show your commitment to the process.
IEEE is the world’s largest professional association dedicated to advancing technological innovation and excellence for the benefit of humanity. IEEE and its members inspire a global community through IEEE’s highly cited publications, conferences, technology standards, and professional and educational activities.
iJET is an intelligence-driven provider of operational risk management solutions, working with more than 500 multinational corporations and government organizations. Capitalizing on our proprietary technology and network of security, intelligence, and geopolitical experts, we deliver a full array of customized intelligence, preparedness and response solutions. Our solutions enable organizations to protect their assets and proactively prevent and mitigate threats and risk that can impact operational performance.
For over three decades, the International Legal Technology Association has led the way in sharing knowledge and experience for those faced with challenges in their firms and legal departments. Through delivery of educational content and peer-networking opportunities, we provide members information resources in order to make technology work for the legal profession. Connect and participate today!
InfraGard is a Federal Bureau of Investigation (FBI) program that began in the Cleveland Field Office in 1996. It was a local effort to gain support from the information technology industry and academia for the FBI’s investigative efforts in the cyber arena. The program expanded to other FBI Field Offices, and in 1998 the FBI assigned national program responsibility for InfraGard to the former National Infrastructure Protection Center (NIPC) and to the Cyber Division in 2003. InfraGard and the FBI have developed a relationship of trust and credibility in the exchange of information concerning various terrorism, intelligence, criminal, and security matters.
Insource Technology Corporation is committed to providing their clients with technology excellence that is business driven through a true partnership. This unique Business/Technology team approach insures that the appropriate technology is applied intelligently, and that it meets their clients’ business requirements: The goal is to deliver results that always reflect the realities of your business.
Insource Technology Corporation provides services across many industries including: Energy and Chemicals, Real Estate, Healthcare, Education, Insurance and Financial Services, and Manufacturing. Insource Technology Corporation is headquartered in Houston and currently serves clients throughout the country and abroad.
The International Association of Microsoft Channel Partners (IAMCP) represents Microsoft´s best of breed partners from around the globe. Formed in 1994, IAMCP provides Microsoft Partners a voice into Microsoft programs, to the IT community at large, as well as a vehicle to facilitate mutual growth and business development among partners. The non-profit organization is operated by an annually elected board of directors, and is funded through membership fees and sponsor grants.
With more than 86,000 constituents in more than 160 countries, ISACA® (www.isaca.org) is a leading global provider of knowledge, certifications, community, advocacy and education on information systems assurance and security, enterprise governance of IT, and IT-related risk and compliance. Founded in 1969, ISACA sponsors international conferences, publishes the ISACA® Journal, and develops international information systems auditing and control standards. It also administers the globally respected Certified Information Systems Auditor™ (CISA®), Certified Information Security Manager® (CISM®) and Certified in the Governance of Enterprise IT® (CGEIT®) designations.
ISACA developed and continually updates the COBIT®, Val IT™ and Risk IT frameworks, which help IT professionals and enterprise leaders fulfill their IT governance responsibilities and deliver value to the business.
The Greater Houston chapter was founded in 1969 and in 2009 has approximately 1000 members. The Houston chapter membership includes a wide range of IS audit and control professionals working for all types of business as well as local and national governments. These professionals hold a variety of positions including: CEO, CIO, IS Director, IS Manager, IS Audit professionals, and IS Security professionals, just to name a few.
The South Texas Chapter of the Information Systems Security Association (ISSA) is a non-profit organization of information security professionals and practitioners.
South Texas ISSA provides education forums, publications and peer interaction opportunities which enhance the knowledge, skill and professional growth of its members. This Chapter is affiliated with the international ISSA organization, conforms to its professional and organizational guidelines, and supports the ISSA Code of Ethics. We encourage our members to pursue and maintain formal security certifications in their chosen fields and offer training opportunities to help members meet requirements for continuing education.
McCann Investigations is a fully licensed Private Investigations firm with offices in Texas (TX License C15690), New York (NY License 11000120404) and New Jersey (NJ License 5271). McCann Investigations provides expansive computer forensics and private investigations for law firms. McCann Investigators have provided expert testimony in hundreds of cases across Texas.
McCann Investigations is a one source solution for comprehensive case management. All McCann Private Investigators are licensed in the various states in which they serve and have extensive experience in the field. McCann Investigations was founded by Jack McCann over 25 years ago in New York, New York, and has provided private investigative services to law firms, public companies, private companies, government agencies and individuals.
McCann Investigations begins each case with an in depth client assessment of the project parameters and objectives. Based on these objectives, McCann Investigations will prepare a cost effective proposal that will meet the client’s goals and time schedule. McCann Investigations will provide detailed reporting based upon client’s objectives.
Your technology needs made easy.
The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.
PernixData is passionate about building a world-class team and the culture essential to becoming a dominant force at the nexus of virtualization and storage. Solving challenging problems and building great products that make a difference is their mission.
Solid Border: Offering Straightforward Network Security Solutions you can manage yourself.
TIBCO Software Inc. (NASDAQ: TIBX) is a global leader in infrastructure and business intelligence software. Whether it’s optimizing inventory, cross-selling products, or averting crisis before it happens, TIBCO uniquely delivers the Two-Second Advantage® – the ability to capture the right information at the right time and act on it preemptively for a competitive advantage. With a broad mix of innovative products and services, TIBCO is the strategic technology partner trusted by businesses around the world.
What defines TimeLinx Software? The absolute focus on the markets we serve. The commitment to delivering world-class software and innovative technologies. The infrastructure and experience to support emerging businesses, regional corporations, and global enterprises. The dedication to delivering first-rate customer service and satisfaction. The strength, vision, and viability to be a long-term business partner. And, the commitment to place our customers at the center of everything we do.
Designed for the unique needs of key service industries, TimeLinx Software provides the end-to-end, industry-leading solutions and the expertise you need to increase operational efficiency and drive competitive advantage. With years of experience in delivering innovative solutions to our customers, TimeLinx Software is a strong, stable partner that you can rely on now and in the future.
TimeLinx solutions are designed to be cost effective while at the same time are extremely powerful, flexible, and scalable. Moreover, our solutions are designed to grow as your business grows, enabling customers who started small to continue using TimeLinx Software solutions, even as they’ve grown to be large scale enterprises.
Founded in 1927, the University of Houston is the leading public research university in the vibrant international City of Houston. Each year, we educate more than 40,750 students in more than 300 undergraduate and graduate academic programs, on campus and online. UH awards more than 8,000 degrees annually, with more than 224,000 alumni.
Headquartered in Austin, Texas and founded in 2007, VDIworks is a leading provider of Virtual Desktop enablement and management software. Our solution is built on 10 years of pioneering work in the fields of centralized computing and virtualization. Our innovation has been recognized with 6 awarded and over 12 pending patents thus far. We offer the ultimate flexibility and preserves customer choice by giving customers the ability to deploy the right solution for the right user type, utilize any back-end hardware, end-point user access device or virtualization technology for desktop virtualization.
One of the industry’s most reputable benchmarks of segment leadership, Computer Reseller News (CRN) has included VDIworks in their Top 100 Virtualization Vendors for several consecutive years and again most recently in the top 50 in 2013.
Yorktel is a leading global provider of video managed services for large enterprise and federal government customers. Founded in 1985 and headquartered in New Jersey, with offices across the U.S. and in the U.K., Yorktel enables customers to successfully integrate video into their operations – from video conferencing to streaming, video event production to digital signage. Yorktel designs, integrates, and manages enterprise-wide video communications solutions.
A Leader in Email Data Protection
ZixCorp offers industry-leading email encryption, a unique email DLP solution and an innovative email BYOD solution to meet your company’s data protection and compliance needs. ZixCorp is trusted by the nation’s most influential institutions in healthcare, finance and government for easy to use secure email solutions.