Expo2016_Lifted_Entertainment_Photography 60

2017 Expo Agenda

KEY: Speaker Session / Panel / Lunch & Learn / Workshop

Longs Peak Room

  • Marcus Bronson, CTO, Outersafe

    The speaker shares cyber landscape, evolving security threats and changing computing environment. Hear insights about the new strategy of products that address the entire threat defense lifecycle with integrated, open security systems. Preview a sampling of innovations from Raytheon/Forcepoint, Intel Security and Barracuda. Next Generation Enterprise Security Management, Compliance, Data Leak Protection and Firewalls that unify and capture existing security investment across all vendors, simplifying enterprise security. 

  • Eric Pulse, Principal, Eide Bailly

    To protect your organization from cyber threats you must first establish a culture of security.  Today, businesses spend millions of dollars on the latest security technologies and infrastructure to protect themselves from becoming the next organization in the news. However, cybersecurity is more than policies, procedures and technologies. It has to be woven into the fabric of how each person, whether employee or customer, thinks about security of data. It begins with a culture.

  • George Anderson, Product Marketing Director, Webroot

    Crypto ransomware is one of the most virulent threats to businesses today. The unfortunate truth is that no endpoint security vendor can guarantee 100% protection against this threat, but you can implement cybersecurity best practices and mitigation strategies to help keep your business and customers safe.

    Join Webroot, a Colorado-based next-generation endpoint security leader, as we discuss how crypto ransomware works, its evolution, and what steps you can take to stay ahead.  

  • Bill Amirault, Systems Engineer withVeeam, Bob Pothier, Sr. Systems Engineer with ExaGrid, and Nimble

    The Always-On Enterprise™ of today relies heavily on the virtual world. The contained, data-sharing networks of the past are now used in every process and for every function across — and outside — the organization. Standalone applications are no longer siloed. Instead, they are used to connect colleagues, customers and friends, alike. This evolving phenomenon is known as The Internet of Things (IoT). Consider what happens to a business when IoT breaks down. How far-reaching is the impact of that downtime?

    Join Veeam® Nimble Storage and ExaGrid to learn more about enabling Availability for the Always-On Enterprise™. We’ll discuss the growing need for companies to avoid data loss through near-continuous data protection, and how leveraging an Availability solution in your modern data center can help you achieve that.

Pikes Peak Room

  • Jesse Hood, Cyber Security Account Executive, Darktrace

    Fast-evolving threats call for a transition in the nature of cyber security, one that can protect information assets in a world more interconnected than ever. Fundamental advances in mathematics and machine learning developed at the University of Cambridge have allowed us to move away from perimeter-based approaches to security and toward a new model of self-learning cyber defense. With the insight of government intelligence officials and leading mathematicians, the Enterprise Immune System was created. As is known, the human immune system continuously monitors the entirety of an organism, and makes apparent even those anomalies that have not previously been identified. Similarly, this innovation allows organizations to spot even the subtlest deviations in behavior and enables them therefore to mitigate threats before they become a crisis. Rather than rely on signatures or restrictive firewalls, it gains a sense of ‘self’, and can clarify what is abnormal for every user, device and network in an organization. It takes a proactive stance of cyber defense, and utilizes the latest technological advances as a way of getting ahead of the most sophisticated forms of cyber security breaches, including insider threat. 

  • This moderated discussion featuring women who have paved the way in their respective industries and fields of expertise.  These successful women have advanced their careers through determination and commitment, many in male dominated industries. The panel will discuss many topics including gender parity, women empowerment, education, discrimination, and career advancement to name a few.

  • Fortinet

    The Internet of Things, the connected digital world, and always on access provide convenience, analytics, and help us with our everyday tasks.  However, we don’t always realize the data we leak, leave behind, and give up.

    We will take a look at a variety of connected devices, and how people use and store data in their everyday lives. We will then look at real-world examples and research how that data is exploitable.

    The truth is we have no real privacy, and we leave our data everywhere. Attackers using metadata, open source intelligence, and advanced tracking and learn everything about you, track you and steal your identity without you ever knowing. Learn how our data is everywhere and how attackers manipulate the brave new world of the Internet of very Scary Things.

  • Shaun Goldstein, Analyst, Canon Solutions America


    We recognize the distinctiveness of each business environment and have worked with leading software companies to offer a breadth of value-add solutions that focus on individual workflow needs. As a result, Canon and its development partners have created robust software and hardware solutions to address the unique requirements of the general office as well as various vertical markets. Canon Solutions America recognizes that the way we do business is changeling rapidly. Ever more there is a need to access workflow’s and content within the organization from a remote location or on the go. We will talk about transitioning into an automated workflow process, security precautions and concerns and accessing your date from anywhere.

    We will take a look at a variety of connected devices, and how people use and store data in their everyday lives. We will then look at real-world examples and research how that data is exploitable.

    The truth is we have no real privacy, and we leave our data everywhere. Attackers using metadata, open source intelligence, and advanced tracking and learn everything about you, track you and steal your identity without you ever knowing. Learn how our data is everywhere and how attackers manipulate the brave new world of the Internet of very Scary Things.

  • Jill Brito, Marketing Director, Vista Solutions Corporation

    Are you worried about how to keep your data safe in an environment where security breaches seem inevitable? You’re not alone. With attacks becoming more common, more sophisticated, and more devastating, many people are asking ‘how do we protect ourselves’? This talk will introduce a new paradigm for how to approach the topic of cyber security and provide practical insights on how to reduce your risk of a breach taking you out.

Suite 11

  • Greg Bond & Erik Wolf, ORBTR

    Staying up to date with the latest best practices is difficult — not only in the sense of constantly shifting best practices in Search Engine Optimization, social media, and email marketing, but also in your ability to measure how successful your efforts are, when you have reached a point of diminishing returns, and when it’s time to retool or abandon a specific program. Topics to include: Effective Website Management; Generate and Convert More Leads; Improve Marketing Efficiency; Measure Success; Increase ROI.

    Greg Bond and Erik Wolf — from the Colorado marketing software firm ORBTR — will be hosting workshops and offering hands-on help for Denver Biz Tech Expo attendees looking to untangle their digital marketing efforts and develop a stronger understanding of where their best digital opportunities may be.