skip to Main Content

7:00 AM : Registration Opens, Networking Breakfast

8:30 AM : PDS Connect Kickoff!

Dr. Asif Naseem and John Miller
Join us as we kickoff PDS Connect 2019 and hear some exciting updates from President & CEO, Dr. Asif Naseem and EVP & General Manager, John Miller.

9:20 AM – 10:10 AM : Opening Keynote – Erik Qualman

Erik Qualman
Digital Leaders are Made – Not Born. In this keynote Eric will talk about what it take to be a leader in the digital age.

Are you Attracting and Retaining the Right Next Generation Workforce? [ Lenovo ]

Attracting and retaining the next generation of workforce is hard! Learn how through innovative technology and workspace transformation you are able to lighten your load! Explore what works, what is needed, and how to overcome traditional thinking within your corporate enterprise. Changes in the workplace with Millennials and Ziennials are inspiring changes that will transform the future while giving companies the competitive edge to succeed in the new world of an emerging workplace environment. Don’t miss this energetic presentation. This session is sure to encourage you and help you learn from others about their own march toward change. Please attend. You will be glad you did!

Speakers: Chris Fellers

Compromised User and Host Detection Using Behavioral Analytics [ Aruba ]

Studies show that over 80% of advanced attacks are attributed to external actors. Once these cyber criminals capture credentials that provide access to corporate networks, they are virtually undetectable by traditional defenses. During this session, we will discuss a variety of attacks utilizing compromised credentials and the benefits of utilizing behavioral analytics, machine learning and network data to identify and stop these attacks.

Speakers: Cliff Hieronymus

Ensuring Your Data Is Protected in A Complex Environment [ Dell EMC ]

The IT industry is changing at a rapid pace! The need to protect unstructured data, data in containers, cloud native applications, multi-cloud environments and traditional workloads means that businesses require protection solutions that respond quickly and dynamically to their rapidly evolving IT environments. No matter the next new IT trend, the bottom line is: data needs to be protected no matter what it is and where it lives. Attend this session to learn how Dell EMC is engineering cutting-edge and industry-leading technology and solutions to meet these ever-evolving data protection needs.

Speakers: Andrew LeGally

Evading Death by Silver Bullet [ Micro Focus ]

Many organizations are lured by the siren call of quick fixes to their security woes with many “silver bullet” point solutions that only address a near term challenge or a fraction of the requirements necessary to deliver truly effective security . Critical needs, such as breach defense, data security and privacy, and secure DevOps, demand a more holistic approach that necessitates several security techniques and areas of expertise working together in concert to provide truly comprehensive protection.

This session provides attendees with insights into how capabilities have been leveraged in concert from across a spectrum of security technologies, combining disciplines from identity and access management, data security (including encryption), application security (including vulnerability scanning and application testing), security operations (including threat detection and operations inspection), as well as machine learning and analytics, to address the complex challenges presented in marshaling an effective defense against breaches and preparations necessary to quickly respond and mitigate the potential damage caused by an attack. More, by taking a more holistic approach to the security framework, it can also enable organizations to “shift left” with security in their modern DevOps processes, facilitating faster integration and delivery of secure applications and services with confidence.

Attendees will leave this session knowing how to avoid the lure of a silver bullet by learning the benefits of taking a holistic approach to security that allows organizations to not only reduce their risk and better protect their assets, but also securely empower their businesses to take advantage of all that the promise of digital transformation has to offer.

Speakers: Nick Nikols

Storage Cost Secrets – Achieving Strategic Success [ Infinidat ]

Data is a strategic enabler for digital transformation while the cost of data storage varies significantly between technologies and consumption models. Enterprise data is growing at a CAGR of 50% while IT budgets are growing modestly or remain flat. Transform Economically, not just Digitally, by learning a pragmatic approach for calculating storage costs that will enable your company’s strategy for success.

Speakers: Neville Yates

Challenge: Keeping your Documents Safe Through Capture and Distribution [ Canon ]

Explore how essential business document capture, storage and distribution workflows and Canon document/check scanning solutions can help you to meet your document challenges.

Speakers: Mardy Fried

Evading Death by Silver Bullet [ Micro Focus ]

Many organizations are lured by the siren call of quick fixes to their security woes with many “silver bullet” point solutions that only address a near term challenge or a fraction of the requirements necessary to deliver truly effective security . Critical needs, such as breach defense, data security and privacy, and secure DevOps, demand a more holistic approach that necessitates several security techniques and areas of expertise working together in concert to provide truly comprehensive protection.

This session provides attendees with insights into how capabilities have been leveraged in concert from across a spectrum of security technologies, combining disciplines from identity and access management, data security (including encryption), application security (including vulnerability scanning and application testing), security operations (including threat detection and operations inspection), as well as machine learning and analytics, to address the complex challenges presented in marshaling an effective defense against breaches and preparations necessary to quickly respond and mitigate the potential damage caused by an attack. More, by taking a more holistic approach to the security framework, it can also enable organizations to “shift left” with security in their modern DevOps processes, facilitating faster integration and delivery of secure applications and services with confidence.

Attendees will leave this session knowing how to avoid the lure of a silver bullet by learning the benefits of taking a holistic approach to security that allows organizations to not only reduce their risk and better protect their assets, but also securely empower their businesses to take advantage of all that the promise of digital transformation has to offer.

Speakers: Nick Nikols

Leveraging Next Generation Technologies to Pay for your Next Generation Hosting Strategy [ Dell EMC ]

The confluence of forces driving digital change in business is straining IT teams to respond with faster solutions, greater uptime and lower costs at a time when broad scale cloud can seem easier and more cost effective. Learn how to use your existing IT spend with Dell EMC to create a steady pivot to next generation datacenter benefits while reducing costs compared to your traditional acquisitions. In this session we will discuss areas of cost savings that customers can leverage across the Dell EMC portfolio to create offset funding. This approach will help reduce the cost of changing to a fully software defined datacenter that supports broad scale cloud and build business flexibility for running any workload anywhere its needed.

Speakers: Max Babler

Machine Learning and Why Data is Driving the Future of Security [ Check Point Software ]

Learn how Check Point can help you become pro-active with your security and report data spills before molehills become mountains or small leaks become fountains. Come listen about machine learning and how the future of security is data driven.

Speakers: Kierk Sanderlin

Upgrade your Link to the Digital World in the Education Sector [ Cherry Americas ]

As we move towards a more digitized, technological, ever-connected globalized world, Cherry, a leading manufacturer of computer input devices, has an important role to fulfill the needs in the education industry. Are your institutions adequately equipped? From computer labs to faculty administration to bookstores, learn how to better bridge the gap to the digital world across the campus.

Speakers: Henry Quintero

12:00 PM – 1:15 PM : Lunch & Partner Showcase

Come grab a bite and after lunch, stroll the partner showcase.

"KISS" Simplify your Data Center Operations Today! [ Nutanix ]

Join our session at PDS Connect 2019 to learn how Nutanix can simplify your data center operations today! Nutanix solutions are built on the industry’s most popular hyperconverged infrastructure (HCI) technology—a complete, 100% software-defined stack that integrates compute, virtualization, storage, networking, and security to power any application, at any scale. Our robust software and cloud services unify IT operations and bring frictionless application mobility across different cloud environments. The growing demands of enterprise applications and the fast pace of modern business threaten to put legacy IT design — with separate storage, storage networks and servers — at risk of failure. The silos created by traditional datacenter infrastructure often present barriers to change and progress, adding complexity to every step from ordering to deployment to management.

Speakers: Bill Bauling

Accessing, securing, and managing your Cloud Apps is a nightmare! [ Thales Group/Gemalto ]

Enterprises looking to scale the deployment of cloud and web apps across the organization encounter hurdles to efficiently managing online identities and access security, while ensuring user convenience and regulatory compliance. Learn how SafeNet Trusted Access helps customers face these challenges. When you attend this session you will learn:

– Mitigating risk by providing another layer of security
– Use of Smart SSO
– 10+ authentication methods
– Securing access through granular policy settings

Speakers: Kyle Ward

Buzz Word Soup: SDDC, Agile, Hybrid [ HPE ]

We will discuss how to leverage the technologies behind these buzz words to respond to business requirements quickly and cost-effectively. We will discuss Software-Defined Intelligence, leveraging API integrations, utilizing AI in the management of infrastructure and how pulling these together will enable an IT organization to drive innovation and value for the business.

Speakers: Drew Parker

Juggling IT Operations – How to reduce complexity and focus on business objectives [ PDS ]

Join Greg Fliearman and Eric Winburn from PDS as they talk about how to juggle both proactive and reactive elements of IT Operations in a way that enables you as an IT leader to minimize risk, improve service quality and simplify your IT Operations. In today’s business world we are asked to juggle an increasing number of demands, everything from changing business requirements, shifting consumer demands to global competition. We will cover ways to simplifying the number of demands that you and your IT Team have to juggle when it comes to IT Operations, allowing you to put more time, energy and focus on the things that matter most to your business stakeholders.

Speakers: Greg Fliearman, Eric Winburn

Megatrends in Healthcare 2019 [ HP, Inc. ]

Join and listen as Dr. Jeffrey Goldstein, MD, MS describes the latest trends this year in Healthcare. His perspective is based on his unique, highly diverse and distinguished career as a physician and a healthcare consultant to many of the top national and international IT organizations. These organizations include HP, Inc, IBM-Watson Health, Optum Health and Allscripts and Truven.

Speakers: Dr. Jeffrey Goldstein, MD, MS

Is your O365 Data at Risk? [ Veeam ]

Statistics show three out of four organizations are not adequately protecting their Office 365 data. They struggle with internal and external security threats, data deletion scenarios and retention policy gaps. There are roughly 160 million Office 365 users. This means there are 120 million unprotected users, and the number grows by 3 million every month! Veeam® Backup for Microsoft Office 365 is ideally suited to address this opportunity. Veeam Backup for Microsoft Office 365 sales grew 549% last year, and millions of organizations depend upon it to protect their most critical assets. Let’s review how we can help you protect your data!

Speakers: Troy Dunavan

It is a Mobile World! Mobile Operating System Transition [ Honeywell ]

Empowering employees, delivering customer experience, maintaining productivity, streamlining mobile devices, and keeping pace in an ever-changing industry are common business goals. The move to Android is on, Microsoft already stopped supporting Windows® Embedded CE 6.0. and 6.5 will be next. This means devices running these operating systems will not be protected against security threats. Businesses need a future proof and cost- effective mobile platform to achieve these goals, but many fall short when they are put to the test. High-performing businesses need mobile technology solutions that will simplify and elevate performance – with a long life span. In addition to a mobile technology that will elevate performance, business leaders seek an operating platform that will excel under the demands placed upon it. These goals are most certainly achievable through the deployment of the right platform. One that simplifies deployments, strengthen performance, and be a cost-effective, future-proof way for businesses to deploy mobile solutions.

Speakers: John Smith

Learning in three dimensions with HP Virtual Reality Solutions [ HP, Inc. ]

HP’s leading VR Evangelist, Dan Schneider, will speak about commercial VR emphasizing key verticals, Education, Training and Simulation, Product Visualization, Location Based Entertainment, and Healthcare. Dan has a passion for helping find great VR Solutions for every use case. Bring your immersive vision and ideas to collaborate with Dan on possible emerging technology solutions.

Speakers: Dan Schneider

Security Panel Discussion Moderated by Tamara Korbel PDS Director, IT Security and IAM [ PDS ]

Join us for this insightful session and hear some of the area’s finest security experts discuss the most compelling topics of today. The panel will consist of some of our customers, Manufacturer Partners, and of course PDS experts. Check back soon to see the Panel Members!

Moderator: Tamara Korbel
Panelist: Asaf Lerner

Think Differently! IT as a Service – HPE GreenLake [ HPE ]

IDC states that by 2020 40% of IT Enterprise Infrastructure spending will be on improved “as a service” models. Does your organization struggle with overprovisioning of assets and capacity planning? Is your organization looking at ways to elevate your datacenter services experience and move to an Opex model? Attend this session to hear how Hewlett Packard Enterprise is uniquely positioned to offer your IT organization an elevated consumption and services experience via your valued partner Paragon Development Systems.

Speakers: Sam Gironda

"KISS" Simplify your Data Center Operations Today! [ Nutanix ]

Join our session at PDS Connect 2019 to learn how Nutanix can simplify your data center operations today! Nutanix solutions are built on the industry’s most popular hyperconverged infrastructure (HCI) technology—a complete, 100% software-defined stack that integrates compute, virtualization, storage, networking, and security to power any application, at any scale. Our robust software and cloud services unify IT operations and bring frictionless application mobility across different cloud environments. The growing demands of enterprise applications and the fast pace of modern business threaten to put legacy IT design — with separate storage, storage networks and servers — at risk of failure. The silos created by traditional datacenter infrastructure often present barriers to change and progress, adding complexity to every step from ordering to deployment to management.

Speakers: Bill Bauling

Another Security Questionnaire? Save time by automating vendor risk assessments [ Process Bolt ]

Are you tired of manually filling out risk assessment spreadsheets? Are you spending time answering the same questions over and over again for your clients? Do you have a vendor risk management program in place? Is your vendor management program spreadsheet questionnaire based? There is a better way!. During this session, you will learn how you can:

1) Improve the efficiency of inbound security questionnaires:
– Store inbound assessments in a centralized knowledge base to auto-fill
– Track and measure inbound assessment completion questionnaires
– Automate the inbound excel, word, online assessments from your clients

2) Automate assessments of your vendors:
– Eliminate spreadsheets for your vendor risk assessments
– Customize questionnaires for clients
– Incorporate risk ratings, track responses and remediate issues
– Verify that vendor policies cover key compliance criteria Learn how companies of all sizes are streamlining their outbound and inbound vendor risk assessments with a state of the art platform

Speakers: George Hadjiyanis

Attackers Prey on Uncertainty [ Varonis ]

It takes a lot of visibility and context to detect and respond to sophisticated threats. Attackers usually target data, where enterprises have the least visibility and most uncertainty. In this session, we’ll explore new, sophisticated threats from inside and out, demonstrate how easy it is for adversaries to bypass traditional controls, and present a methodology to better protect data at scale, improve threat detection, and reduce uncertainty.

Speakers: Chris Hoesly

Digital Transformation, cloud as a tool, not a destination [ PDS ]

As businesses look for transformation to better service customers, drive new business and grow revenue, cloud should not be looked at as a destination, but rather a tool to help drive business outcomes. In this session we will explore how cloud can be a part of a transformation strategy and we will also go in depth into a few use cases around leveraging cloud.

Speaker: James Keating

Trends Affecting Point-of-Care Computing [ Caspa Healthcare ]

Learn ways to improve asset utilization, while reducing costs and IT workload. Caspa Healthcare will help you learn ways you can keep your focus on patient engagement. We will review trends and directions in the fast-growing Telemedicine market.

Speaker: Erica Kinser

Closing the door… [ Fortinet ]

Learning and understanding the what and how an attack occurs, and what is needed to prevent an attack. Spend some time with us to help position your organization be more prepared.

Speaker: Andy Crocker

Don’t Become the Next (Data Breach) Victim! [ Cascade Asset Management ]

You may be surprised how many IT devices you retire never get wiped or sanitized, exposing your sensitive data to the secondary market and dark web. Learn more about these risks and how can you and your ITAD partner can put pro-active controls in place to prevent this from ever happening to you.

Speaker: TJ Barelmann

Owning the Network: Risk Management for Critical Infrastructure [ Arista ]

Over the past five years we have seen a significant change in the threat landscape- with nation-state threat actors targeting a variety of globally networked systems. Networking infrastructure has also evolved from monolithic and proprietary operating systems to developing on top of Linux and other open source components.

The result of this confluence is that we are seeing an increase in the number of vulnerabilities and exploits affecting network elements, yet most organizations have not changed their patching and mitigation processes – often upgrading every few years at best.

This session will explore the current threats, vulnerabilities, and describe architectural changes and deployment models that can reduce enterprise risk and provide actionable strategies to protect your organization’s network.

Speakers: Douglas Gourlay

Thriving in a Hybrid Multi-Cloud World [ NetApp ]

Join NetApp as you learn how to leverage public cloud to your greatest advantage while embracing cloud design principles to optimize on-premise workloads. You will learn ways to reduce the complexity of cloud adoption while avoiding vendor and cloud provider lock-in.

Speaker: Troy Wilson

Session To Be Announced!

Coming soon! Stay tuned for more details about an additional 4:15–5:00pm session.

5:00 PM – 7:30 PM : Connect Reception & Partner Showcase

Come One, Come All! Join us Thursday evening for a Big Top experience with fantastic food, drinks, games, entertainment and prizes. Network with peers, PDSers, and partners as you stroll the midway and experience exhibits showcasing the latest and greatest technologies and solutions!

8:00 PM – 10:00 PM : An Evening of Laughs and Entertainment with Paul Reiser

Paul Reiser
This year we’re thrilled to have comedian, actor, television writer, author, and musician Paul Reiser join us at PDS CONNECT to provide an evening of laughs and entertainment after our full day of technology, inspiration, education, and networking. Join us Thursday evening in the Northern Lights Theater at Potawatomi to unwind, connect with peers, and enjoy a stand-up performance you won’t forget.