Enjoy a cup of coffee while catching up with your IT-professional peers and visiting with our vendors, before beginning your day of education and networking.
Ray kicks off The IT Summit Phoenix 2012 with a brief history of the conference, followed by an overview of the topics guests can look forward to learning about throughtout the day.
Brent Stark has worked as a Cisco Certified Premier Partner for telepresence and digital signage. He closely helped Cisco Enterprise clients to facilitate the design and sale of large telepresence projects including Immersive rooms, multipurpose rooms, personal telepresence, and Cisco Telepresence Infrastructure applications. His unique understanding of video networks and the audio/video/network standards required lead to many successful implementations of quality video on a private network. Brent now is expanding on this video background by providing network audio solutions as the Southwest Regional Manager for Biamp Systems. Based in Arizona, Brent oversees all sales and operations throughout Southern California, Southern Nevada, Arizona, Colorado, Wyoming and New Mexico. Brent has extensive experience in designing large scale projects in multiple industries. Brent understands the challenges and opportunities presented as the IT industry now encompasses Audio and Video solutions in the enterprise space.
Now you can future-proof your projects and your business. With the first open, industry-accepted standards for transporting audio and video over the network, AVB bridges the gap between AV and IT technologies.
The new IEEE AVB standards synchronize multiple streams of audio and video, eliminate buffering delays and create resource reservation. And because AVB standards leverage existing Ethernet technology, they will benefit from ever increasing speeds and enhancements backed by major consumer electronics companies, allowing the AV industry to benefit from solutions aimed at the mass market.
For IT Managers, AVB means end-to-end digital networks that are simple to design and easy to manage.
AVB advantages include:
· IEEE standards
· Significantly lower latencies
· Larger channel capacity
· Intelligent switches
· Single network for all media, including non-AVB traffic
Serving as both Chief Information Security Officer and Chief Privacy Officer for the City of Phoenix, Arizona, Randell Smith leads’ the City of Phoenix information security management and information privacy programs by balancing the needs to safeguard the City’s information assets while ensuring that privacy rights and expectations of both citizens and staff are fully respected. Directing the Information Security and Privacy Office (ISPO), he is responsible for establishing and implementing policy guidance, security governance, and regulatory compliance for 15,000 plus employees. Mr. Smith spearheads the City’s Payment Card Industry Data Security Standards (PCI DSS) strategic assessment and remediation for 24 functional Departments processing $200 million plus transactions annually.
Mr. Smith is a retired U.S. Navy Captain, Commanding Officer and Naval Cryptologist with over 30 years of direct, hands-on experience managing, leading, planning, staffing, budgeting, and executing information security programs and projects for the National Security Agency and the U.S. Navy. Prior to retiring from the Navy, Mr. Smith served as the Assistant Chief of Staff for FORCENET and CIO for Commander, Naval Security Group Reserve where he oversaw the development and implementation of network architecture, standards, policies and plans for a 1200 person plus Department of Defense intelligence organization.
Mr. Smith’s professional certifications include Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Project Management Professional (PMP) and Information Technology Infrastructure Library (ITIL V2, V3 and Service Operations). He is a professional member of the International Information Systems Security Certification Consortium, Inc. (ISC)2; Information Systems Security Association (ISSA); Information Systems Audit and Control Association (ISACA); Arizona Security Practitioner’s Forum (AZSPF); Project Management Institute (PMI); and, Naval Cryptologic Veterans Association.
Active in local community organizations, Mr. Smith was appointed by the Mayor of Glendale, AZ to serve as both Commissioner and Chair of the City of Glendale, Arizona Historic Preservation Commission. He voluntarily served in this capacity for five years working closely with the City Council, Planning Commission and the public on historic preservation issues for the City of Glendale.
Mr. Smith earned a Bachelor of Arts (History) from the University of Virginia and a Master of Science in Systems Management from the University of Southern California. He has been awarded the Meritorious Service Medal, the Navy Commendation Medal (three separate occasions) and the Navy Achievement Medal citing exceptional meritorious leadership.
The threat landscape is characterized by a growing number of attacks of increasing sophistication and criminal intent. Business professionals must understand that safeguarding corporate data and assets requires more than a multi-layered approach to defend against malicious actors, web-based attacks, and inadequate security awareness. Defending business critical information assets and intellectual property will require innovative leadership, bold decision-making and cultural changes that strike a balance between security, privacy and the bottom-line. Failure is not an option!
Join your IT peers for a complimentary luncheon including assorted sndwiches, salads, and dessert. This is a perfect opportunity to interact with other technology professionals in a relaxed environment.
Chad Kirkpatrick is the managing partner of B2G Solutions LLC, a public sector consulting firm. He was a member of Governor Jan Brewer’s cabinet and served as the Chief Information Officer for the State of Arizona. Chad is recognized as an innovative and entrepreneurial executive, earning finalist in the Arizona Technology Council’s award for public sector “CIO of the Year.” Prior to his state service, Chad was Vice President of Technology for Wells Fargo, and served as Chairman of the Arizona chapter of Americans for Prosperity.
Stephen Welsh has spent 17 years working in the public sector. He has held executive management and policy positions during this tenure, currently serving as CIO for the Arizona Department of Corrections. Mr. Welsh has developed innovative cost saving solutions to the numerous Arizona Counties and to the State of Arizona. Mr. Welsh came from the private sector where he worked on medium capacity microwave systems and numerous aerospace projects. He was the CFO for a successful .com startup.
Stephen Welsh is an active speaker and creative writer; has spoken at the Arizona Governors Conference, InfraGard and is a paid McMillan Author.
Mr. Welsh is past President of Arizona Chief Information Officers (1998-2008). Volunteer for Habitat for Humanity.
1) Overview of each type
2) Economy of Scale
3) Where Desktop Virtualization works better
4) Lessons Learned
Ted joined the Central Arizona Project as Assistant General Manager in February 1999 and is responsible for finance, accounting, risk management, materials management and information technologies. CAP is a special district and the largest wholesale water utility in Arizona.
Ted has been in corporate finance for over 30 years, primarily in the high technology and utility industries.
Ted has earned a B.S. in Physics from Loyola Marymount University, an MBA from UCLA and a DBA from California Coast University and holds ten professional certifications in the areas of accounting, finance, business, government, risk management, fraud prevention and information technology.
Phil joined the Central Arizona Project as an Electronic Technician in November 1996. After several positions within the company Phil is responsible for the information technology department. CAP is a special district and the largest wholesale water utility in Arizona.
Phil has been in the electronics and computer industry for over 25 years, primarily in the wireless and utility industries.
Phil has earned a B.S. in Business from Western International University and holds several professional certifications in the area of information security including CISSP, CISM.
Budgeting for Technology
Nothing changes faster than technology except customer and employee expectations. How does an organization anticipate customer needs and translate expectations into reality without breaking the bank or ending up with an expensive, disorganized mess? IT and Finance officials from Central Arizona Project, Arizona’s largest raw water utility, share their insights into successfully developing and managing technology budgets.
- Technology – It’s more than just hardware and software
- Develop an Enterprise Architecture
- Use Business Strategy to drive technology
- Centralize responsibility for technology
- Establish expertise in Business Analysis and Technology Project Management
- Get the right budget tools
- Follow a consistent budget methodology
- Identify the operating impacts of capital expenditures
- Don’t forget Training and documentation
David Schlesinger has 25 years of experience in information technology and data security management. His book, The Hidden Corporation, is a “business novel” that describes data protection issues in a large corporation and follows a dedicated employee as she uncovers the root causes of improper data exposure and discovers solutions. David is CISSP certified in cybersecurity and is on the Board of Directors of the Phoenix ISSA, a security professional association. He has authored two US Patents for data governance methods that use Metadata classifications to audit and automate user rights and regulatory compliance, and speaks widely at data management and security conferences. David is a Senior Security Architect and currently consults with commercial and government organizations on information protection involving enhanced Metadata, self-aware data architecture, data classification practices, and information regulatory compliance.
As a special thank you to all of our guests at The IT Summit, our sponsors have arranged for a prize drawing for you, our valued supporters. The prizes are different at every conference, but in the past have included items such as iPods, golf clubs, sporting event tickets, and eReaders.
A10 Networks was founded in 2004 with a mission to provide innovative networking and security solutions. A10 Networks makes high-performance products that help organizations of all sizes accelerate, optimize and secure their applications. A10 Networks is a venture-funded, privately held, Silicon Valley-based technology company, with offices in the United States, United Kingdom, France, The Netherlands, Japan, China, Korea and Taiwan.
Aerohive Networks reduces the cost and complexity of today’s networks with cloud-enabled Wi-Fi and routing solutions for medium and large enterprise headquarters, branch offices and teleworkers. Aerohive’s award-winning cooperative control Wi-Fi architecture, public or private cloud-enabled network management, routing and VPN solutions eliminate costly controllers and single points of failure. This gives its customers mission critical reliability with granular security and policy enforcement and the ability to start small and expand without limitations.
The love of sound is Biamp‘s reason for being, and has been since our founding 35 years ago. We’ve grown to be an acknowledged international leader in professional installed audio electronics. Our staff still shares a passion for sound that resonates through every product and every decision the company makes.
You can sense our dedication to sound when you call for support and Biamp’s own technicians answer — in-house. You touch it when you use our intuitive software to configure new systems. You can hear our passion for great sound grow louder with every breakthrough design Biamp launches.
Most people have never seen Biamp products, but they’ve probably heard them work wonders — in airports, arenas, courtrooms, Houses of Worship, theaters, universities, corporations, and conference centers. Around the world, around the clock, Biamp equipment is delivering, managing and enhancing the sound.
For the love of sound, we never stop experimenting, tinkering and making the impossible actually practical. Because ultimately, when the lights dim and the speakers come on, it’s not about the system. It’s all about the sound.
Over the last decade Bridgeline has developed 6dm, our proprietary delivery and development methodology. Rapid and iterative, 6dm strives to maximize the potential of your project while meeting your requirements and budget.
In today’s knowledge economy, Bridgeline does more than simply throw sophisticated technology at its customers, it provides real solutions through inspired planning and execution throughout the entire constituency chain.
More organizations trust Imperva to protect their business applications and databases than any other vendor. Only Imperva delivers innovative technology to give full audit accountability and separation of duties to meet regulatory compliance. The award-winning Imperva SecureSphere is the only solution that delivers full activity monitoring from the database to the accountable application user.
The goals and objectives of the Phoenix ISSA Chapter are to:
Offer products and services that deliver value to members (website, newsletter)
Enhance its members’ professional growth
Maintain the ability to provide expert and high-quality speakers at chapter meeting
Support the enhancement of the credence and legitimacy of the information security profession
Support ISSA’s objective to establish itself as the leadership voice of the profession
Encourage local information security professionals to attend chapter meetings and join ISSA
Encourage existing members to spread the word about ISSA
Develop correspondence to recruit new members and sustain existing members
Conduct membership drives
Continually identify ways to improve the Phoenix ISSA Chapter initiatives
Support ISSA’s endorsement of the CISSP
Establish relationships with similar associations in Phoenix
Conduct annual survey to identify the ongoing interests and needs of the members and the industry
Make effective use of funds through budgeting
Provide the foundation for an ongoing chapter for many years to come…
Kelly IT Resources®specializes in connecting companies around the world with information technology professionals.
We are a part of Kelly Services®, a US-based Fortune 500 company and a global industry leader in workforce solutions. Our network of international branch locations allows us to provide consistent, quality service to our employees and clients worldwide.
From its beginning, Level 3 Communications was founded on the principles of the Silicon Economicssm cycle: create a global telecommunications network with the scale to reduce unit costs, stimulate demand with these lower costs, support that demand by scaling even more. Level 3 created a network that serves as a foundation for the communications services of the 21st century by providing, among other things, information transmission over a fiber optic network and media delivery over a content delivery network. And we’ve grown to support the end-to-end communications services that businesses and carriers rely on.
Today’s IT networks are a complex mix of interdependent devices co-mingled with application databases, business applications and various sources of identity information. The ever-increasing volume of information generated by these data sources combined with increases in service level agreements and reductions in operational staff has resulted in one of the biggest challenges in information technology today — effective and proactive network management. Without network availability and performance, business will suffer. Automated tools are required to manage the volume of network issues and critical events that occur each day, ensuring maximum network and application availability for mission critical functions.
That’s where LogMatrix comes in. Our network management software solution is an extensible monitoring and event correlation framework that enables users to implement their IT operational practices and policies. The core component, NerveCenter, helps deliver end-to-end network management by providing visibility across networks, systems and applications, collecting and correlating data, identifying issues and determining root cause.
Memeo C1 (subscription cloud sync solution) is a controlled and secure way to access business data across computers, mobile devices and the web. The robust online admin console provides IT Admin instant visibility and control over important company data with a comprehensive set of analytics, controls and security tools. Just like Dropbox, the Memeo C1 desktop and mobile applications are easy for employees to install and use–but without compromising control or security.
Meru Networks provides a virtualized wireless LAN solution that optimizes the enterprise network to deliver the performance, reliability, and operational simplicity of a wired network, with the advantages of mobility.
Meru’s innovative approach to wireless networking uses virtualization technology to create an intelligent and self-monitoring wireless network. With Meru, enterprises can become all wireless, smoothly migrating their business-critical applications from wired to wireless networks.
Nimble Storage was founded by a team of industry veterans who developed groundbreaking primary storage and deduplication architectures at several market-leading storage companies. Their experience has given Nimble a unique perspective to solving the industry’s most pressing storage issues: reining in storage complexity, reducing costs, and implementing affordable backup and recovery.
The Nimble approach is based on the concept of converged storage, backup, and disaster recovery. It replaces an enterprise’s expensive high-RPM drives with a hybrid architecture that combines high-performance flash memory with low-cost, high-density SATA drives. And by deploying a second Nimble array in an off-site location, enterprises of any size can now obtain a complete, cost-effective data protection solution incorporating WAN-efficient primary-to-primary replication.
The North Scottsdale Chamber of Commerce sets the standard for excellence in member service, community collaboration, business growth, and achieving a high quality of life in the North Scottsdale area.
Arizona is now the fastest growing state in the nation and Scottsdale one of the fastest growing cities. We are proud and excited to bring the community a new kind of chamber that not only seeks participation by our member businesses, but also from our local community.
The North Scottsdale Chamber of Commerce offers memberships to individuals and businesses. We are committed to the goal that as our member businesses grow and prosper, our community also will thrive.
Recycle Your Media is a green company that specializes in data destruction services and recycling. We work with many companies who are frustrated with high off-site storage, shredding and recycling fees, mad because dealing with end-of-life equipment takes them away from their main business, upset that the old equipment gets in the way and is wasting space, under pressure because they don’t have the time or man power to handle the disposal of all these products and disappointed with the fact that most of these products end up in landfills…
Software as a Service (SaaS) has become mainstream IT. Applications like Salesforce.com, ADP, Concur, Google Apps, Success Factors, Rearden Commerce and others are slashing the cost and complexity of IT and proving to be mission critical systems. According to Forrester, Think Strategies, Gartner and others, enterprise-wide adoption of SaaS has reached a tipping point, recently accelerated by the current economic downturn. Today, over 60% of enterprises have multiple SaaS apps, and that number is growing.