2026 Technology Vendor Summit
Thursday, April 9th | Old National Events Plaza - Evansville, IN



















The Technology Vendor Summit is a FREE full day dedicated to connecting technology professionals with the latest solutions, services, and strategies to help them make their businesses better.
20+ Top Tech Solution Providers
Engage directly with leaders and experts from the industry’s most trusted solution providers.
Cutting-Edge IT Trends
Explore the latest trends and solutions that will accelerate your business.
Answers to Your Tech Challenges
Hear from our partners and the Keller Schroeder team during breakout sessions.
Network With 250+ Tech Peers
Connect with like-minded area tech pros and build valuable connections.
Save Your Spot
What is the TVS?
With each Technology Vendor Summit (TVS), Keller Schroeder collaborates with key vendor partners from the industry’s leading technology companies to bring knowledge, networking, and new ideas. The event features the largest gathering of both tech pros and solution providers in the Evansville area.
During the TVS, attendees have the opportunity to connect with like-minded IT employees from a wide range of companies from across Indiana, Kentucky, Illinois, and Tennessee – small start-ups to enterprise-level, global organizations in every industry. Breakout sessions and networking booths allow attendees to learn and ask questions directly from our participating partners and Keller Schroeder’s subject matter experts.
The TVS isn’t all business – you can count on delicious food, swag, fun prizes, and a Happy Hour celebration to close out the event. Several years ago, we also started incorporating a non-technology-oriented keynote speaker. These are nationally recognized speakers sharing their unique perspective on connection, collaboration, and professional development.
In addition, nearly every Keller Schroeder event offers attendees the opportunity to help us give back to our community. The TVS is no exception and will feature a unique way to partner with us to make a positive impact.
Why Should You Attend?
The TVS was developed with Keller Schroeder’s clients in mind. We saw a need for a technology event of this caliber LOCALLY. Tri-State area IT pros must travel over two hours to gain access to this many partners and solutions in a single setting, on a single day.
Did we also mention it’s completely FREE for attendees? This is a no-cost event. Tickets to similar events typically cost between $400 and $1,000.
- Largest Gathering of Technology Providers
- Dozens of Learning Sessions
- No Long Travel Days or Expenses
- NO COST for Attendees
Meet Our 2026 Keynote Speaker
BROUGHT TO YOU BY
TOM KOULOPOULOS
From Hype to Impact: Turning AI Uncertainty into Practical Value
AI is everywhere in the headlines but hard to connect to real business outcomes. In this keynote, Tom reframes the AI narrative not as a job destroying force or a magic “transformation,” but instead as a practical collaborator that removes friction, amplifies human innovation, and helps you create new value faster than your competitors. His message is simple; the power of AI is not in the technology but in what it does to help you create transformational change. Drawing on real world examples, he’ll explore how to: safely experiment with AI using organizational “sandboxes,” apply AI to amplify new value creation, and move beyond the hype to create a strategic AI roadmap.
Attendees will leave with a clearer, grounded view of where to start, how to scale responsibly, and how to turn AI anxiety into a competitive advantage.
Tom Koulopoulos is Chairman and founder of Delphi Group, a 30-year-old Boston-based think tank named one of the fastest growing private companies by Inc. Magazine, and the founding partner of Acrovantage Ventures, which invests in early-stage technology startups. He is also the author of 14 books, an inventor with several patents, an Inc.com columnist, the past Executive Director of the Babson College Center for Business Innovation, the past director of the Dell Innovation Lab, and a professor at Boston University.
Tom’s insights have received wide praise from luminaries such as the late Peter Drucker, the father of modern management; Dee Hock, founder of Visa International; and Tom Peters, who called his writing, “a brilliant vision of where we must take our enterprises to survive and thrive.” His Inc. column is read by over one million people yearly.
Mr. Koulopoulos’ fourteen books include Reimagining Healthcare, Revealing the Invisible, The Gen Z Effect, The Innovation Zone, and Cloud Surfing. His latest book, Gigatrends, looks at the six tech trends that are shaping the future of how we live, work, and play.
Tom’s keynotes blend humor, insight, and a cutting-edge view of the future in a way that’s customized to each audience. According to Tom’s mentor, Peter Drucker, Tom’s writing “makes you question not only the way you run your business but the way you run yourself.”
Schedule of Events
-
7:00 AM - 8:00 AM Event Check-In & Breakfast (Brought to You by Data Link)
-
8:00 AM - 8:15 AM TVS Kick-Off Opening Session
-
8:30 AM - 9:15 AM Partner Breakout Session (Round 1)
-
9:30 AM - 10:15 AM Partner Breakout Session (Round 2)
-
10:15 AM - 10:45 AM TVS Networking Break
-
10:45 AM - 11:30 AM Keller Schroeder Sessions
-
11:30 AM - 12:15 PM TVS Lunch
-
12:15 PM - 1:00 PM Keynote Presentation
-
1:00 PM - 1:30 PM TVS Networking Break
-
1:30 PM - 2:15 PM Partner Breakout Sessions (Round 3)
-
2:30 PM - 3:15 PM Partner Breakout Sessions (Round 4)
-
3:30 PM - 5:30 PM TVS Happy Hour & Closing Session
-
Emerging Cyber Threats and the Security Actions That Matter Most Arctic Wolf
In this session, we'll break down the top emerging threats shaping the 2026 landscape, examine real-world attacker tactics, and translate the Arctic Wolf 2026 Cybersecurity Threat Report's findings into practical, high-impact security actions your organization can implement today. Whether you're responsible for security strategy, IT operations, or risk management, this session will help you cut through the noise and focus on the defenses that matter most in today's aggressive threat landscape.
-
Was the Office Worth the Commute? Cisco
Explore how Cisco Spaces transforms the traditional office experience by bringing office data to life through an integrated ecosystem of collaboration endpoints, Meraki sensors, and third-party sensors. This session will showcase how Cisco Spaces leverages real-time occupancy, environmental telemetry, and rich 3D maps to create smarter, safer, and more productive workplaces.
-
Beyond the Camera: AI for Safer, Smarter Facilities Data Link
"Beyond the Camera" explores how AI is transforming physical security cameras and sensors from passive recording devices into intelligent data collectors that enhance both security and daily operations. During the presentation, Jeff Wooten, President at Data Link, will talk through how AI differs from traditional analytics, highlighting how major manufacturers like Axis, Hanwha, Milestone, and Genetec are embracing this shift, and he will showcase practical applications, from weapon detection and gunshot recognition to people counting, PPE compliance, and the future of AI-driven access control, making the case that these tools deliver measurable ROI well beyond the security department.
-
Infrastructure Solutions Group Update Dell
This breakout session delivers a focused look at the latest updates from Dell across the Data Center Infrastructure landscape, highlighting how evolving market trends are reshaping solution design and customer priorities. Attendees will hear the newest developments in server and storage platforms, including roadmap insights and the growing shift toward disaggregated architectures that enable greater scalability, flexibility, and lifecycle efficiency. The session also explores the broader forces influencing today’s infrastructure decisions: AI driven workload growth, changes across major hypervisors, and the realities of component availability and supply chain volatility which will help provide customers with clear, actionable context for guiding them through modernization initiatives.
-
Unlocking HPE VM Essentials: A Hands-On Deep Dive and Live Demo HPE
Is your current hypervisor strategy driving up costs or limiting your flexibility? As virtualization environments evolve, organizations need solutions that simplify management while keeping future infrastructure options open. Join this session to explore HPE's VM Essentials software, a powerful new approach to modern virtualization management. Through our deep dive and live demo, you'll see how VM Essentials helps streamline operations, improves visibility across environments, and gives your team the flexibility to adapt your virtualization strategy with confidence.
-
Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough? KnowBe4
Cybercriminals have moved beyond spray-and-pray phishing campaigns into the age of AI-powered precision attacks. Using generative AI, they're now creating hyper-personalized scams that mimic your colleagues' writing styles, clone your CEO's voice for vishing attacks, and craft multi-channel campaigns designed to slip past both technical controls and human intuition. In this eye-opening presentation, Erich Kron, Security Awareness Advocate at KnowBe4, strips away the AI hype and exposes the stark reality of how artificial intelligence is transforming social engineering, making your people simultaneously your greatest vulnerability and your most critical defense.
-
Zero Trust Data Resilience: Architecting Ransomware-Survivable Backup Environments Object First
Zero Trust has reshaped enterprise security across identity, networks, and endpoints. But one of the most privileged and operationally critical systems in the enterprise—backup infrastructure—has often been left behind. Backup platforms have broad read/write access across production environments and are routinely targeted during ransomware attacks. If the backup control plane is compromised, immutability alone may not be enough. This session explores Zero Trust Data Resilience (ZTDR), a pragmatic framework that extends Zero Trust principles to enterprise backup and recovery architecture. Building on the CISA Zero Trust Maturity Model and industry research, we’ll examine how segmentation, least privilege access, immutable storage, resilience zones, and operational simplicity combine to create true breach survivability.
-
The Print Security Paradox Tricerat
Most organizations invest heavily in securing their networks, email systems, and endpoints, but there's a critical vulnerability many security strategies overlook: print infrastructure. Long treated as a simple IT utility, modern print management has quietly evolved into a powerful entry point for attackers. Recent disclosures uncovered 83 critical vulnerabilities in a major print management provider, exposing systemic weaknesses in convenience-first, cloud-based printing solutions. These flaws open the door to unauthenticated remote code execution, cross-tenant data exposure, and lateral movement across networks, particularly dangerous for organizations in healthcare, finance, government and other regulated industries. In this session, we'll challenge the long-held assumption that serverless or cloud-hosted print is inherently safer. You'll learn how attackers exploit print infrastructure, why traditional approaches leave organizations exposed, and what these newly discovered vulnerabilities reveal about the risks hiding in plain sight. Most importantly, we'll explore how Hybrid Print Architecture (HPA) offers a smarter path forward, helping organizations regain data sovereignty, eliminate hidden backdoors, and keep sensitive documents exactly where they belong: under control. If print security isn't part of your cybersecurity strategy yet, it should be. Join us to discover why the next major breach could start at the printer.
-
Security Alphabet Soup: You’ve Heard the 3 Letter Acronyms, but What Do They Do & What Does It Mean for You? Cisco
In this engaging session, we demystify the complex world of security acronyms that often leave IT professionals puzzled. Join us as we break down key security terms such as SSE, STNA, SWG, CASB, DLB, and FWaaS, explaining what they mean and how they fit into your environment
-
Predict, Prevent, and Respond: Smarter Distributed IT Operations Eaton
As IT infrastructure continues to move beyond the traditional data center, organizations face new challenges in monitoring, securing, and managing distributed environments at scale. This session explores how centralized visibility, intelligent alarms, and automated responses are crucial. Attendees will learn how a modern approach to distributed IT management can reduce downtime, improve resiliency, and simplify operations without adding complexity or headcount. Real world use cases will illustrate how organizations are moving from reactive monitoring to proactive, data driven operations.
-
SESSION DETAILS COMING SOON! HP
-
Designing Custom Agents in Copilot Studio Microsoft
During this session, you'll get a practical end-to-end view of how organizations can design, build, deploy, and govern AI agents using Microsoft Copilot Studio. We will also be discussing how to move from early AI concepts to production-ready assistants that are securely grounded in enterprise data and integrated across Microsoft and third-party systems.
-
Regaining Control of Storage Costs in a Volatile Market NetApp
Storage teams are facing rising prices, supply constraints, and architectures that assume all data belongs on premium storage. This session explores how modern storage designs help organizations regain control by aligning performance, capacity, and cost over time by using hybrid architectures, data tiering, and flexible consumption models to reduce risk and avoid over‑provisioning.
-
How to Navigate the Reduction in SSL/TLS Certificates Sectigo
Frequent reductions in SSL/TLS certificate lifespans are creating major operational strain. Shorter validity means more renewals, more manual work, and a much higher chance of outages that disrupt customer access, revenue, and trust. Many organizations are now managing thousands of certificates without clear visibility or automation, making errors almost inevitable. This session explains what’s changing in the SSL/TLS ecosystem, why validity periods keep shrinking, and the impact this has on security and compliance. You’ll learn how Sectigo helps organizations eliminate risk through automated discovery, renewal, and deployment across every environment—removing manual steps and preventing outages before they happen. Attendees will leave with a clear roadmap to stay compliant, reduce workload, and maintain strong digital trust despite the accelerating pace of certificate lifecycle changes.
-
Navigating the Current Threat Landscape SentinelOne
In this strategic session, we will break down the top 5 cyber threat actors and nation-state adversaries targeting organizations today, and demonstrate how to defend against them at machine speed using SentinelOne's autonomous AI. Because no single software can secure an entire network, we will also tackle the "tool sprawl" dilemma that plagues modern IT teams. You will learn how Keller Schroeder's elite SOC team creates a holistic, "Better Together" defense-in-depth strategy—integrating S1's endpoint telemetry with your firewalls and broader security stack to eliminate alert fatigue, connect the dots, and stop breaches before they impact your business.
-
The End of Paper UnDesked
Despite billions spent on digital transformation, the most critical work in many organizations still runs on paper. Clipboards. Binders. Handwritten logs. Processes that live in someone’s head. The result? Delays, compliance risks, missed steps, and zero operational visibility. It’s time for that to end. In this session, discover how UnDesked is helping organizations eliminate paper and turn everyday frontline work into real-time operational intelligence. See how routine form entries can instantly trigger automated workflows, assigning tasks, notifying teams, escalating safety issues, and launching multi-step processes without manual coordination. Learn how companies are capturing tribal knowledge before it walks out the door and transforming disconnected frontline activities into measurable, scalable operations. Purpose-built for deskless teams in manufacturing, logistics, healthcare, construction, and field services, UnDesked provides a mobile-first, frictionless digital workplace that meets frontline workers where they are—on the floor, in the field, or on the move. If your organization still relies on paper to run critical processes, you’re operating with blind spots.
-
Next-Gen Microsoft 365 Data Resilience Capabilities with Veeam Data Cloud Veeam
Veeam Data Cloud ensures the data resilience your organization demands to keep business running, unified under one intuitive SaaS platform. Veeam Data Cloud represents a significant advancement in enterprise data protection by providing secure, scalable Backup as a Service (BaaS) solutions for Microsoft 365 and Azure environments. Leveraging cloud-native architectures, Veeam Data Cloud enables organizations to safeguard critical data against threats such as ransomware, data loss, and compliance failures. This technical discussion will explore the core functionalities of Veeam Data Cloud, including its seamless integration with cloud platforms, robust security measures, and advanced recovery capabilities.
-
To Be or Not To Be; VMware by Broadcom? Hybrid Cloud Data Center Solutions
As organizations reassess their virtualization strategy following Broadcom’s acquisition of VMware, IT leaders must evaluate cost, licensing changes, support models, and long-term roadmap implications. This session explores key vSphere considerations within the Software-Defined Data Center (SDDC), including operational impact, financial modeling, risk management, and strategic alternatives. Attendees will gain clarity on whether to stay the course with VMware or explore viable platforms such as HPE Morpheus VM Essentials, Microsoft Hyper-V, and hybrid-cloud architectures.
-
Why You Need an AI Strategy and What It Should Include Applications Solutions
Choosing to ignore AI is not a strategy. Whether you are starting to experiment with AI, have already implemented it, or are still on the fence, you need a plan. Organizations large to small have realized they need to take an intentional stance, including Vincennes University. At this session, learn how the executive in charge of academics and technology led the University to a proactive position in its AI-readiness -- in academics, operations, and administration. After his interview with Interim Provost Jaci Lederman, Rob Wilson will open the floor to questions related to your own AI strategy.
-
Working Genius: Unlocking Performance Beyond the Technology Human Resources
You can automate workflows, scale globally, and optimize performance. Still, projects sometimes stall. People get burned out. Teamwork can fall apart. Why does this happen? Because performance is not just about technology; it is about people. Join Keller Schroeder's Cori Deputy for this session to learn how the Working Genius model helps teams understand how people are naturally wired to work and how that insight can strengthen collaboration, communication, and execution. You’ll leave with a clearer understanding of the model and how it can support a healthier, more effective company culture.
-
AI Analytics using Copilot Studio: Lessons Learned and Guardrails That Matter Data Strategy
In this session, we’ll show how to use Copilot Studio to build an AI-powered analytics experience that answers real business questions using your data. We’ll walk through what we built, where it worked well, and the drawbacks we hit: like inconsistent answers, data access complexity, and the effort required to make outputs trustworthy. You’ll leave with practical guardrails for success, including data quality and definitions, permissions and security, evaluation/testing, and monitoring, so your Copilot delivers reliable insights at scale.
-
From Confusion to Confidence: A Practical CMMC Readiness Roadmap Information Security
The phased rollout of CMMC (Cybersecurity Maturity Model Certification) version 2.0 began November 10, 2025 and requirements will continue ratcheting up annually until full implementation on November 10, 2028. In this session, you will learn more about the CMMC requirements, who it applies to, and how to prepare for your CMMC audit. After this session with Keller Schroeder's compliance experts, you'll be able to explain what CMMC is, identify whether they are likely impacted, understand the differences between Level 1, Level 2, and Level 3 at a high level (including what drives the requirement), and know what it means to be “audit-ready,” including evidence, the SSP (System Security Plan), scope boundaries, and POA&Ms (Plans of Action and Milestones).
-
Practical AI with AP Edge Intelligent Document Processing: One Use Case, Endless Possibilities Applications Solutions
We explore how organizations can intentionally and responsibly apply AI to real business processes, starting with a familiar example: invoice processing within Accounts Payable. Rather than beginning with technology, we take a business‑first, framework‑driven approach to determine how and where AI delivers the most value, ensuring it augments human judgment rather than replacing it. We then walk through one AI use case with AP Edge to illustrate how intelligent automation can reduce manual effort, improve accuracy, and manage risk. The takeaway is not just this solution, but a repeatable, scalable method for identifying and deploying AI opportunities across the organization.
-
Infrastructure-as-Code That Pays Off: Security Policy Rollouts and Cost Savings Infrastructure & Data Strategy
In this session, we’ll show how infrastructure-as-code with Terraform streamlines the rollout of security policies across environments with consistency and control. We’ll walk through a real implementation, highlighting the approach, the governance model, and how automation reduced rework, speed up deployments, and improved repeatability. You’ll leave with practical patterns and lessons learned, plus a clear view of the cost savings realized through faster implementation and lower ongoing maintenance effort.
-
Kari's Connection & Ray's Direction - A Blueprint for E911 Compliance Network Solutions
E911 compliance is critical for modern communications environments. In this session, we'll walk through the requirements, challenges, and implementation strategies for E911 across Cisco on-prem, Webex Calling, and Microsoft Teams voice solutions, highlighting real-world approaches to ensuring accurate emergency call routing and location reporting.
-
Emerging Cyber Threats and the Security Actions That Matter Most Arctic Wolf
In this session, we'll break down the top emerging threats shaping the 2026 landscape, examine real-world attacker tactics, and translate the Arctic Wolf 2026 Cybersecurity Threat Report's findings into practical, high-impact security actions your organization can implement today. Whether you're responsible for security strategy, IT operations, or risk management, this session will help you cut through the noise and focus on the defenses that matter most in today's aggressive threat landscape.
-
How to Fail at IT Cisco
In this interactive session, explore the common pitfalls organizations encounter when attempting to manage their complex infrastructure by leveraging partner services alongside Cisco’s comprehensive platform. We will dive into how failures often arise from underutilizing the full power of Cisco’s integrated solutions across collaboration, enterprise networking, visibility/observability, data center, cloud AI, and security suites.
-
Beyond Backup: Proving Your Recovery Readiness with HPE & Veeam HPE
Many organizations assume their data protection strategy is resilient, yet few have validated how quickly they can restore critical systems and resume operations after a disruption. In this session, discover how HPE and Veeam help organizations assess their recovery readiness, identify hidden risks, and gain confidence in their ability to bounce back from cyber incidents, outages, or disasters. Know your resilience. Know your recovery. Know where you stand.
-
Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough? KnowBe4
Cybercriminals have moved beyond spray-and-pray phishing campaigns into the age of AI-powered precision attacks. Using generative AI, they're now creating hyper-personalized scams that mimic your colleagues' writing styles, clone your CEO's voice for vishing attacks, and craft multi-channel campaigns designed to slip past both technical controls and human intuition. In this eye-opening presentation, Erich Kron, Security Awareness Advocate at KnowBe4, strips away the AI hype and exposes the stark reality of how artificial intelligence is transforming social engineering, making your people simultaneously your greatest vulnerability and your most critical defense.
-
Architecting Absolute Immutability: Designing Backup Infrastructure That Survives Ransomware Object First
Ransomware operators no longer just encrypt production systems, they systematically target backup infrastructure first. Modern attacks follow a predictable kill chain: initial compromise, privilege escalation, reconnaissance, backup discovery, deletion or retention manipulation, and then encryption. If attackers can modify, delete, or reset backup storage using stolen credentials, root access, or exposed APIs, “immutability” becomes conditional, and conditional immutability fails under pressure. This session introduces the architectural principle of Absolute Immutability: a design model where even the most privileged administrator or compromised account cannot alter protected backup data. We will examine how ransomware actors exploit management planes, API calls (including object lock manipulation), root-level access, and factory reset paths to neutralize traditional immutable storage implementations. Attendees will learn how to analyze backup systems through an attacker’s lens, understand dwell-phase behavior and reconnaissance patterns, and identify architectural weaknesses before they are exploited. We will define the technical requirements for survivable backup design, including management/data plane separation, restricted API surfaces, elimination of root override paths, and storage-level enforcement beyond credential-based controls. The session concludes with a layered security model and reference architecture that demonstrates how Absolute Immutability can be implemented in practice, transforming immutability from a feature into a resilient architectural property. If your backups can be deleted with the right credentials, they are not your last line of defense.
-
Endpoint Reimagined: Precision Defense with Cortex XDR Palo Alto
Experience the world’s most effective AI-driven endpoint security. Join us to see how Cortex XDR delivers a prevention-first approach across all major OSs, proven by 100% prevention and zero false positives in industry tests. See Cortex XDR in action as we do a live demo to show how you can slash TCO and drive AI-led SOC transformation.
-
Navigating the SQL Server Maturity Curve: Where Is Your Bank on the Risk-to-Resilience Spectrum? The Sero Group
Description: In banking, SQL Server environments support critical systems, customer data, and regulatory reporting. Yet many institutions still manage these platforms reactively, creating unnecessary risks like outages, security gaps, and compliance challenges. This session introduces the SQL Server Maturity Curve, a framework that helps banks evaluate how effectively their database environments are managed and how they can progress to proactive, strategic management. Attendees will learn the four stages of SQL Server maturity (Reactive, Managed, Optimized, and Strategic) and how each stage affects reliability, governance, and operational resilience. The session will also highlight the financial and regulatory implications of database maturity, including the hidden costs of downtime, the importance of audit readiness, and the role of strong database governance in meeting FFIEC and GLBA expectations. You will leave with a clear understanding of their institution’s maturity level as well as practical guidance for building a roadmap toward more reliable, secure, and business-aligned SQL Server operations.
-
Introducing Hybrid Print Architecture Tricerat
In today's digital age, protecting systems and data is paramount. Organizations commonly harden their network perimeters, secure email communications, and deploy sophisticated endpoint protection. However, a massive strategic blind spot still exists: print infrastructure. Traditionally treated as a mere IT utility, print management has quietly evolved into a primary attack vector for lateral movement and data exfiltration. This transformation has given rise to the print security paradox, where convenience-first solutions often compromise security. Tricerat’s ScrewDrivers platform is built on the philosophy that security is a product of intentional architecture. Unlike convenience-first tools, ScrewDrivers utilizes a fortified Hybrid Print Architecture (HPA) to protect organizations from vulnerabilities. By leveraging a fortified HPA, organizations can mitigate the vulnerabilities associated with convenience-first print solutions and enhance their overall security posture. Transitioning to a fortified HPA is not just a strategic move; it is a necessity in today's threat landscape.
-
Security Alphabet Soup: You’ve Heard the 3 Letter Acronyms, but What Do They Do & What Does It Mean for You? Cisco
In this engaging session, we demystify the complex world of security acronyms that often leave IT professionals puzzled. Join us as we break down key security terms such as SSE, STNA, SWG, CASB, DLB, and FWaaS, explaining what they mean and how they fit into your environment
-
DETAILS COMING SOON! Kalleo
-
Designing Custom Agents in Copilot Studio Microsoft
During this session, you'll get a practical end-to-end view of how organizations can design, build, deploy, and govern AI agents using Microsoft Copilot Studio. We will also be discussing how to move from early AI concepts to production-ready assistants that are securely grounded in enterprise data and integrated across Microsoft and third-party systems.
-
Building for Cyber Resiliency Data Practice NetApp
Cyber threats are no longer a question of if, but when—and traditional security approaches alone are not enough. In this breakout session, we explore how organizations can build a cyber‑resilient data practice that assumes breach, minimizes impact, and enables rapid, confident recovery. Attendees will learn how NetApp approaches cyber resilience as a data‑centric discipline, integrating protection, detection, recovery, and governance directly into the data infrastructure. We’ll examine common customer challenges such as ransomware, extended downtime, and operational complexity, and why fragmented tools and delayed detection often fail when it matters most. The session highlights NetApp’s vision for cyber resilience, including immutable data, early threat detection, clean recovery, and integration with the broader security ecosystem. Through real‑world scenarios, we’ll show how organizations can move beyond backups and perimeter defenses to establish confidence in their data—so they can respond decisively and keep the business moving forward.
-
Industry-Leading CLM for Automation, Governance, and Scalability Sectigo
As machine identities grow across cloud, mobile, DevOps, and zero‑trust environments, most enterprises struggle with certificate sprawl, limited visibility, and manual processes that lead to outages and compliance gaps. The pain point: teams are overwhelmed by thousands of certificates from multiple CAs, scattered across different systems, with no centralized control. This session explores how Sectigo’s CLM platform solves this challenge with automated discovery, issuance, renewal, and policy enforcement at enterprise scale. You’ll learn how unified visibility, deep integrations, and zero‑touch automation eliminate outages, reduce operational overhead, and support long‑term governance. Sectigo’s CLM gives organizations the automation and scalability needed to secure every identity, streamline audits, and future‑proof their PKI strategy.
-
Navigating the Current Threat Landscape SentinelOne
In this strategic session, we will break down the top 5 cyber threat actors and nation-state adversaries targeting organizations today, and demonstrate how to defend against them at machine speed using SentinelOne's autonomous AI. Because no single software can secure an entire network, we will also tackle the "tool sprawl" dilemma that plagues modern IT teams. You will learn how Keller Schroeder's elite SOC team creates a holistic, "Better Together" defense-in-depth strategy, integrating S1's endpoint telemetry with your firewalls and broader security stack to eliminate alert fatigue, connect the dots, and stop breaches before they impact your business.
-
The End of Paper UnDesked
Despite billions spent on digital transformation, the most critical work in many organizations still runs on paper. Clipboards. Binders. Handwritten logs. Processes that live in someone’s head. The result? Delays, compliance risks, missed steps, and zero operational visibility. It’s time for that to end. In this session, discover how UnDesked is helping organizations eliminate paper and turn everyday frontline work into real-time operational intelligence. See how routine form entries can instantly trigger automated workflows, assigning tasks, notifying teams, escalating safety issues, and launching multi-step processes without manual coordination. Learn how companies are capturing tribal knowledge before it walks out the door and transforming disconnected frontline activities into measurable, scalable operations. Purpose-built for deskless teams in manufacturing, logistics, healthcare, construction, and field services, UnDesked provides a mobile-first, frictionless digital workplace that meets frontline workers where they are—on the floor, in the field, or on the move. If your organization still relies on paper to run critical processes, you’re operating with blind spots. Join us to see how leading organizations are replacing clipboards with connected, automated frontline operations.
-
Next-Gen Microsoft 365 Data Resilience Capabilities with Veeam Data Cloud Veeam
Veeam Data Cloud ensures the data resilience your organization demands to keep business running, unified under one intuitive SaaS platform. Veeam Data Cloud represents a significant advancement in enterprise data protection by providing secure, scalable Backup as a Service (BaaS) solutions for Microsoft 365 and Azure environments. Leveraging cloud-native architectures, Veeam Data Cloud enables organizations to safeguard critical data against threats such as ransomware, data loss, and compliance failures. This technical discussion will explore the core functionalities of Veeam Data Cloud, including its seamless integration with cloud platforms, robust security measures, and advanced recovery capabilities.
2026 Partner Sponsors
TITLE PARTNER
KEYNOTE PARTNERS
TECHNOLOGY PARTNER
PLATINUM
GOLD
BREAKFAST SPONSOR
HAPPY HOUR SPONSORS
Directions, Travel, & Other Info
Venue
Old National Events Plaza
715 Locust Street
Evansville, IN 47708
Parking
Parking is free and located at the corner of Locust and 9th Streets. The main parking lot offers 1100 spaces adjacent to the venue with ADA accessible parking located along 9th Street. A few ADA accessible parking spots are located along Locust Street.
Tips for Parking from Old National Events Plaza
Nearby Lodging & Travel
Event App Platform
Access to our 2026 TVS app will be provided to event pre-registrants prior to and to attendees at the event.