Loading…
InnoTech Houston has ended

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Tuesday, November 6
 

9:00am CST

Negotiat[Her]: Learn the Secrets to Make More $ in Your Tech Career
As tech women, salary negotiation is an essential skill, but negotiating isn’t always so easy. Imposter syndrome, fear, and unconscious bias are real adversaries that can get in your way to a successful negotiation and earning what you deserve. The good news is that negotiation is a skill that can be learned. Come learn how Founder of Develop[Her], Lauren Hasson, tripled her base salary in less than two years by grounding herself in data and asking critical questions to uncover key leverage points and ultimately learned to negotiate with confidence.

Speakers
avatar for Lauren Hasson

Lauren Hasson

Founder, Founder, DevelopHer + Principal Software Engineer
Lauren Hasson is the Founder of DevelopHer, an award-winning career development platform that has empowered thousands of women in tech to get ahead, stand out, and earn more in their careers. She also works full-time on the frontlines of tech herself. By day, she is an accomplished... Read More →


Tuesday November 6, 2018 9:00am - 9:45am CST
600

9:00am CST

Survival of the Fittest Org Model. Navigating The Future of IT
You’re on the front lines, feeling the hurricane winds of change blow and as the lines of traditional technology and shared services become more blurred in the cloud, it’s survival of the fittest organizational model. What’s the best course of action? Should IT departments persevere as a centralized hub, or should IT experts integrate throughout the business? Join this panel of CIOs discuss and debate the future of the our IT enterprise, and how its evolution might impact your people and process.

Speakers
avatar for Jesse Carillo

Jesse Carillo

SVP & Chief Information Officer, Hines
Jesse Carrillo is responsible for directing all corporate technology, strategy and standards for Hinesworldwide. Jesse joined Hines in 1994 as a consultant to assist in the implementation of the firm'saccounting and property management software. He took over the responsibility for... Read More →
avatar for Ken Piddington

Ken Piddington

CIO, SGR Energy, Inc.
Ken Piddington has been building, transforming, and creating multibillion-dollar growth for high-performing businesses throughout his career.  Leveraging well-honed executive skills across all areas of technology and business operations, he brings a legacy of success in setting a... Read More →
avatar for Todd Renaud

Todd Renaud

Chief Information Officer, Conn's HomePlus
As Chief Information Officer, Todd provides vision, leadership, transformation and direction for Conn's business and technology initiatives that enable company objectives and goals. Todd brings over 25 years of Technology experience across multiple industries to include Finance, Energy... Read More →


Tuesday November 6, 2018 9:00am - 9:50am CST
503

9:00am CST

Compromised User and Host Detection Using Behavioral Analytics
Studies show that over 80% of advanced attacks are attributed to external actors. Once these cyber criminals capture credentials that provide access to corporate networks, they are virtually undetectable by traditional defenses. During this session, we will discuss a variety of attacks utilizing compromised credentials and the benefits of utilizing behavioral analytics, machine learning and network data to identify and stop these attacks.

Speakers
avatar for Michelle Ellis

Michelle Ellis

Security Specialist, Univ/Agency/Other
Michelle Ellis is a Security Specialist for Aruba’s 360 Secure Fabric, and is based in Houston, Texas. A self-proclaimed “Security Nerd”, Michelle has 7 years of IT experience and has represented firms specializing in endpoint detection and response, threat intelligence, forensics... Read More →


Tuesday November 6, 2018 9:00am - 9:50am CST
504

9:00am CST

Level Up Your Incident Response – Building and Testing Response Capabilities for Today’s Reality and Tomorrow’s Threats
The session is geared for anyone that needs to establish an ongoing incident response program as well as those that are looking for ways to improve on their existing capabilities.

Areas covered include:
  • Overview of comprehensive Incident Response Program Development
  • Stepping up your game with tips for going from capable to strong
  • Putting the plan into practice – developing and conducting exercises for battle readiness

Speakers

Tuesday November 6, 2018 9:00am - 9:50am CST
502

9:30am CST

Groove.id - The Future of Passwords is No Password at All
Stolen passwords are to blame in more than eighty percent of data breaches. Groove.id combines strong device authentication, user behavior analytics, and context-based variable friction to eliminate the use of passwords at work. Stop by for a demo and see why Groove.id is hard on attackers and easy for end users.

Tuesday November 6, 2018 9:30am - 9:45am CST
Room 501

10:00am CST

What Migrating to Office 365 Looks Like in 2019
Moving from Box, Dropbox, and Google Drive to Office 365 isn’t impossible, but ensuring that the migration project is both successful and painless can be tough. Why? Aspects like migration speed, efficiency, and compatibility can raise unexpected challenges throughout the entire project, thereby contributing to the frustration meter.

Tuesday November 6, 2018 10:00am - 10:15am CST
Room 501

10:00am CST

Three Kinds of Value
Building on the Lean definition of “Value”, this presentation defines user value, technical value, and business value. It concludes with a discussion of the interaction between the three, and gives illustrations of how innovation can help align them. 

Speakers
avatar for Jaynee Beach

Jaynee Beach

VP of Application Development and Test, Woodforest National Bank
"Jaynee Beach has been in has been in the IT business since 1981, writing and testing code, analyzing systems, and designing human-computer interfaces. She has worked as a project manager and leader. She holds dual bachelors degrees in Math and Computer Science, and MS and PhD in... Read More →


Tuesday November 6, 2018 10:00am - 10:45am CST
600

10:15am CST

Maximizing Performance in the Digital Era
In today’s cloud-mobile world, digital performance defines business success. Discover how companies are pushing digital boundaries and rethinking what’s possible.  In this session Riverbed will showcase how you can gain a complete view—from end users, to networks, to infrastructure to applications—to help you reach new levels of performance and gain a competitive edge.

Speakers
avatar for Jason Roeber

Jason Roeber

Solution Engineer, Riverbed Technology
Jason Roeber is a seasoned Solution Engineer with over 20 years in the technology industry where he has held roles in both engineering and operations.  As a Solution Engineer at Riverbed, he is responsible for advancing digital performance across a wide spectrum of industries where... Read More →


Tuesday November 6, 2018 10:15am - 11:00am CST
503

10:15am CST

What is AI Without DATA? The New Convergence of Data; the Next Strategic Business Advantage.
DATA is the central asset of your company. The growth of data has accelerated beyond even the opportunistic forecast of a few years ago.  The new definition of convergence is very different from even a decade ago.
The new trends of Big Data, Data Science, Cloud, A I, Mobility and IoT are changing how organizations are using data. It is now a critical business asset.

New business processes will revolve around the data and it will soon become even more intensive through massive streaming data coming from ubiquitous sensors in the Internet of Things. Variety, not volume or velocity will drive the investments.  During this session you will see how the data has become a strategic business advantage and its value will only increase in the next decade.

Speakers
avatar for David Smith

David Smith

-, -
A noted business leader, futurist and technologist with over 30 years of experience, Mr. Smith combines these disciplines to deliver thought-provoking presentations that provide the vision of the future with the down-to-earth judgment of the technology. He is highly regarded as a... Read More →



Tuesday November 6, 2018 10:15am - 11:05am CST
504

10:15am CST

How Quantum Computing Will Impact Your Present Identification Tools and Methods
Quantum computing is a new initiative that will change computing forever.  This talk will present an overview of quantum computing, how it works and how it may be used to bypass current authentication controls, steal your identity, and what you can do about it.

Speakers
DJ

Dr. Jim Keeler

CEO, KP, LLC
Dr. James D. Keeler (Jim) earned a Bachelor of Science in Physics and Mathematics from the University of California at Davis with Highest Honors and a Ph. D. in Theoretical Physics from the University of California at San Diego, with a Post Doctoral Fellowship at Stanford University... Read More →



Tuesday November 6, 2018 10:15am - 11:05am CST
502

10:30am CST

Next level Enterprise Content Integration and Migration to 0365
Are you looking to move your content workloads to O365, but hesitant to leave your existing Enterprise Content Management system behind? What about the impact such a large transition can have on your users and business productivity?

With Enterprise Content Integration, you can fully synchronize and/or migrate your enterprise content into O365 with no disruption to users, IT, or business operations. In this session we will discuss next level content integration and migration strategies.

Tuesday November 6, 2018 10:30am - 10:45am CST
Room 501

11:00am CST

Groove.id - The Future of Passwords is No Password at All
Stolen passwords are to blame in more than eighty percent of data breaches. Groove.id combines strong device authentication, user behavior analytics, and context-based variable friction to eliminate the use of passwords at work. Stop by for a demo and see why Groove.id is hard on attackers and easy for end users.

Tuesday November 6, 2018 11:00am - 11:15am CST
Room 501

11:15am CST

CIO Expert Panel: Modernizing Data Management
In 2018, CIOs are being challenged more than ever to achieve digital success and leverage emerging technologies to create new capabilities which drive new growth and differentiation. CIOs need to modernize their data management strategies and architectures to leverage emerging technologies such as Machine Learning, AI, IoT, Blockchain, Big Data and Cloud. Data is at the heart of all these changes. Data ingestion, data integration, architectures, data management, data governance and data virtualization all need to be part of the enterprise data strategy. Join us to gain insight as leading CIOs share their vision and experiences in meeting their modernizing data management challenges in 2018.

Speakers
avatar for Kerry Bray

Kerry Bray

VP and CIO, Reservoir Group ( a Madison Industries Company)
Previously Kerry has held positions as the Computer Operations Manager for Title Data Inc, a title plant privately owned by the largest Title Companies in the US, as well as the Regional IT Infrastructure Manager Americas for EagleBurgmann, a German manufacturing company with 190... Read More →
avatar for Ken Piddington

Ken Piddington

CIO, SGR Energy, Inc.
Ken Piddington has been building, transforming, and creating multibillion-dollar growth for high-performing businesses throughout his career.  Leveraging well-honed executive skills across all areas of technology and business operations, he brings a legacy of success in setting a... Read More →
avatar for George Trujillo

George Trujillo

Principal Data Strategist, DataStax
George Trujillo is a technology leader, recognized international speaker and author in the big data, cloud and data management space. George has held positions as a VP of Big Data, Managing Director of Big Data, Director of Big Data Global Enablement, Master Principal Big Data Specialist... Read More →



Tuesday November 6, 2018 11:15am - 12:05pm CST
503

11:15am CST

IT Service Management and Burned Cookies
Learn the right way to implement tools like ServiceNow, Cherwell, and BMC Remedy with the analogy of owning a chain of bakeries. Learn how to align IT stakeholders and extend the Service Catalog beyond IT. See a sample Service Catalog and what that looks like from the consumer and supplier side. Lastly, learn why the Configuration Management database is key to a high Return on Investment (ROI).

Speakers
avatar for Phillip Seawright

Phillip Seawright

Technology Strategy Consultant, TriCorp Technologies
Phillip Seawright is a technology strategy expert in IT Business Relationship Management, Program Management Governance, Agile Software Delivery, and ITIL and IT Service Management. He has 15 years of experience working in Silicon Valley where he provided strategic technology advisory... Read More →


Tuesday November 6, 2018 11:15am - 12:05pm CST
504

11:15am CST

Are you Prepared for the 5th Generation of Cyber Attacks
In the last 25 years, attacks and security protection have advanced rapidly. Today, the velocity of attack evolution is far outpacing the level of security that businesses have deployed. This is a problem. The level of security deployed by businesses cannot be behind the level of attacks coming at them. Today’s attacks are the most advanced and impactful we’ve ever seen and yet the security deployed by most businesses is generationally behind and incapable of protecting against these attacks. To properly protect a business’ IT operations today requires a new, holistic approach to assessing and designing their security toward an integrated and unified security infrastructure that prevent attacks in real time. This presentation will discuss what Check Point calls the 5th Generation of cyber attacks and how organizations can align themselves to prevent – not just detect – cyber attacks.

Speakers
JB

John Bloomer

Security Engineering Manager, Check Point Technologies


Tuesday November 6, 2018 11:15am - 12:05pm CST
502

11:30am CST

Women in Tech Roundtable & Luncheon
 A opportunity for powerful networking and peer based discussions over lunch.  Each table contains a different topic and moderator for in depth conversations in a solutions based setting.  

Tuesday November 6, 2018 11:30am - 1:30pm CST
Cafe

1:00pm CST

What Migrating to Office 365 Looks Like in 2019
Moving from Box, Dropbox, and Google Drive to Office 365 isn’t impossible, but ensuring that the migration project is both successful and painless can be tough. Why? Aspects like migration speed, efficiency, and compatibility can raise unexpected challenges throughout the entire project, thereby contributing to the frustration meter.

Tuesday November 6, 2018 1:00pm - 1:15pm CST
Room 501

1:00pm CST

Automating Automation - The Future of Intelligent Automation in the Enterprise
Effective business leaders continually seek to improve cost, quality and customer experience for their products and services. They want things to be automated so they’re fast, efficient and effective. While automation is not new, technological advancements in artificial intelligence, natural language processing and generation, computer vision, predictive analytics, intent engines, robotics and other technologies are coming together and rapidly evolving to help business leaders achieve their goals.
In this session you’ll meet some of today’s virtual, cognitive and robotic agents and review frameworks to help you identify the right intelligent automation technologies to improve your business. We’ll review some real-life use cases and deployments, discuss the state of the art of intelligent automation and look to future possibilities in our world of work.

Speakers
avatar for Doug Reeder

Doug Reeder

Senior Director of Innovation, NTT Data Services
Doug Reeder is a Senior Director of Innovation in the Office of the CTO at NTT DATA Services. In this role he manages a portfolio of innovation accelerators and helps clients define and achieve their business objectives, develop innovative new capabilities and competencies, and implement... Read More →


Tuesday November 6, 2018 1:00pm - 2:00pm CST
504

1:00pm CST

Data Protection Storage: Optimizing Data Protection for Hybrid IT
As Hybrid IT—the blending of traditional and cloud services—becomes the new reality, you are
faced with new opportunities for organizational efficiencies. In the context of data protection,
you can deploy high performance, robust local secondary storage together with public or
private cloud storage. The local storage allows you to rapidly complete backups and execute
restores to maintain user productivity. The cloud storage offers scalability and lower costs for
long term retention and archiving of your backup data.

Wherever you run your workloads, a hybrid backup infrastructure ensures that performance
and cost is aligned with the value of the backup data. You need an end-to-end solution that
integrates local and cloud storage and enables a single point of management.

Tuesday November 6, 2018 1:00pm - 2:00pm CST
Room 503

1:00pm CST

Digital Extortion - Ransomware and Tools of Choice
Digital extortion is one of the most lucrative ways cybercriminals can profit in today’s threat landscape. Many have fallen victim to this particular scheme and been bilked of their money — from ordinary users to big enterprises.

Everyone is a potential target, which is why being informed about what digital extortion is, how it’s carried out and how to protect against it is critical. This is especially relevant in 2018, where we predict that digital extortion efforts will involve other methods besides the tried and tested ransomware attack.

Tuesday November 6, 2018 1:00pm - 2:00pm CST
502

1:30pm CST

Next level Enterprise Content Integration and Migration to 0365
Are you looking to move your content workloads to O365, but hesitant to leave your existing Enterprise Content Management system behind? What about the impact such a large transition can have on your users and business productivity?

With Enterprise Content Integration, you can fully synchronize and/or migrate your enterprise content into O365 with no disruption to users, IT, or business operations. In this session we will discuss next level content integration and migration strategies.

Tuesday November 6, 2018 1:30pm - 1:45pm CST
Room 501

2:00pm CST

Innovation: Want to deliver value? Successful Strategies and Roadmaps
Speakers
avatar for Reenie Askew

Reenie Askew

Deputy CIO, City of Houston
Reenie Askew is a key driver of transformational change, instrumental in leading business and technology activities in large change implementations. Facilitating projects with diverse teams, technologies, and business requirements, her ability to see a vision through to fruition... Read More →
MD

Myra Davis

Sr. Vice President/CIO, Information Services, Texas Children's Hospital
With over twenty seven years in the information technology field, Myra Davis is the Sr. Vice President/Chief Information Officer at Texas Children's Hospital.  Currently as the Sr.VP/CIO of Information Services, Myra has the responsibility to enhance the operation and services of... Read More →
avatar for Lisa Kent

Lisa Kent

Chief Information Officer, City of Houston
Lisa Kent is the Chief Information Officer for the City of Houston.  Houston, with 2.2 million residents, is the fourth most populous city in the United States, trailing only New York, Los Angeles and Chicago. The city is the largest in the South and the Southwest, and spans 655... Read More →
avatar for Hanna M. Lukosavich

Hanna M. Lukosavich

Senior Director, Alvarez and Marsal
Hanna Lukosavich global CIO with diverse industry experience. She combines technology expertise with strong business acumen to develop and implement transformational IT solutions that support corporate strategy, automate business processes, and reduce costs. Hanna is recognized as... Read More →


Tuesday November 6, 2018 2:00pm - 3:15pm CST
Room 600

2:15pm CST

More Security Through Stealth Networking and Hyper-Segmentation
Imagine being able to have secure isolated zones for financial transactions, customer records, video surveillance, physical security, R&D groups, executives, IoT devices, and kiosks…

Today, network segmentation is generally done with complicated architectures using VLANs, VRFs, and ACLs. Creating end-to-end segments can involve costly and tedious switch-by-switch configurations across the network – including configuring the Network Core which becomes very risky.

With Hyper-Segmentation, only the network end-points are configured and the end-to-end control plane takes care of everything else. In fact, by just plugging a device into the network a segment can be automatically configured through-out the network. Because of this ease of configuration, creating hundreds or thousands of unique virtual networks finally becomes practical. Once Hyper-Segments are created, if a segment is breached, attack surfaces and vulnerabilities are isolated or even eliminated.

Come join us to hear more!

Speakers
avatar for William Condra

William Condra

Sr. Systems Engineer, Houston & Southeast Texas, Extreme Networks
As a Systems Engineer for Extreme Networks, William supports enterprise customers in the Greater Houston Area.  William has extensive pre-sales design and consulting experience, designing small, medium, and large enterprise networks.  With many years in the IT industry, William... Read More →
avatar for Jim Jenkins

Jim Jenkins

Account Manager, Houston & Southeast Texas, Extreme Networks
Managing the Extreme Networks South Texas territory since 2008, Jim has been in the networking market space since 1986.  The region has enjoyed solid success and growth, especially in the areas of Enterprise accounts, along with a broad range of governmental and commercial end users... Read More →


Tuesday November 6, 2018 2:15pm - 3:00pm CST
504

2:15pm CST

The Current State of Cyber Threats
Every day seems to reveal another computer breach resulting in the loss of data and proprietary information. In fact, no company can afford not to take Cyber Security seriously as this is no longer an IT issue but is an issue for executive management. Knowing where these threats are heading is an important first step towards a more secure environment.

Speakers
avatar for James M.T. Morrison

James M.T. Morrison

Computer Scientist, Federal Bureau of Investigation - Houston Division
James Morrison is a Computer Scientist with the Federal Bureau of Investigation assigned to the Houston Division. He serves as a local technical expert to the Special Agents and Task Force Officers assigned to the Houston Area Cyber Crimes Task Force. He assists in computer intrusion... Read More →


Tuesday November 6, 2018 2:15pm - 3:00pm CST
502

2:15pm CST

Agile Planning: 5 Steps to Agile Transformation Planning for Success
Many are or will be implementing Agile in some form or other. For some, they are on their second, third, or even fourth attempt to really integrate and leverage Agile. Where Agile implementations fail is rarely with developers or other project staff. Executives and other Senior Leaders are often the cause of failure or excess friction due to their hope that Agile will simply be faster and cheaper without having to change the organization culture... In this presentation we focus on the 5 Steps to planning a successful Agile transformation that you can take back and apply all at once or one by one over time.


Tuesday November 6, 2018 2:15pm - 3:15pm CST
503

3:15pm CST

Happy 45-Minute Reception & Prizes
Network and mingle with all conference attendees and speakers while enjoy a beverage, last change at demos and prize drawings for the Passport of Prizes.  This reception is sponsored by Aruba Networks.

Tuesday November 6, 2018 3:15pm - 4:00pm CST
Exhibit Hall