Join us July 21st and 22nd for the West Virginia Technology Expo

WV Technology Expo Logo

The West Virginia Technology Expo is a showcase of information technology brought to you by the Mountain State's largest full-service IT company, Advantage Technology. Hosted at the spectacular Charleston Coliseum and Convention Center, attendees can expect unprecedented access to industry insiders, training opportunities and the chance to network with colleagues.

Tickets give you access to all the classes, seminars and workshops along with lunch provided by Arctic Wolf, The Leader in Security Operations.

Below you'll find a list of the classes, seminars and workshops that will be available. We will add details as we get closer to the even, so be sure to check back frequently. As part of admission, you will be able to attend any class.

Vendors from all over the country will be showcasing every facet of information technology in the Elk River Hall. Cloud computing, servers, workstations, networking, cybersecurity, data analytics, telecommunication, and more will be represented. Make sure to plan enough time to visit with each.

In addition to the classes and vendor exhibition, we will have wonderful lunch provided by Arctic Wolf, The Leader in Security Operations.

If you're looking for something to do between classes or after the event, check out all the fantastic things to do in Charleston!

Classes, Seminars and Workshops:

Mobile Manufacturing Technology Demonstration

Live demonstrations of technology tools in action. The equipment will be set up and used in real-time.

Sound mapping - Dosimeters and other devices will be used map the sound in the room. This is the same technique that is used to measure noise in industrial environments to determine what is needed to protect the hearing of employees.

Virtual fire extinguisher - Participants will have the opportunity to use a virtual fire extinguisher simulator.

Heat mapping - Thermal imagining of the room will be used to demonstrate where efficiencies can be made in heating/cooling systems and other areas.

Presented by Dr. John Frazer, WVU Industrial Extension Occupational Health & Safety Manager, Dr. Gopala, WVU Industrial Assessment Center Director and Greg Green, WVU Industrial Extension Safety and Health Specialist

Security in a De-Centralized World: The Cloud, Zero Trust, and You

We no longer live in a time where all assets and employees reside in a single location. In this session, we will discuss the security challenges, advantages, and opportunities presented in this 'new normal'.

Presented by Michael Leggett, Solutions Architect with Avertium. He holds CISSP, SSCP, AWS SAA, Network+, and Security+ certifications and is pursuing a Master's degree in Cybersecurity from Georgia Tech.

Office365 Email Security

The adoption of Office365 across organizations in near 80%. Statistics show that roughly 98% of organizations on Office365 have threats currently residing in their user inboxes. Given that 85% of organizations experienced a phishing attack in 2020 and 1 in 7 organizations experienced an account takeover, it is has never been important than now to protect your email and business. This presentation will help organizations see how to leverage new technologies and tools to secure your email and organization.

Presented by Scott Raba, Solutions Architect with Barracuda Networks

Cybersecurity: Building Out With Strategy

As businesses of dynamic multi-cloud environments, rapid-fire regulations and unforeseen risks, security programs are being impacted like never before. With cyber strategy diligence we can allow security and risk management to function as more as living, breathing business processes than as static programs punctuated by breaches, breakdowns, and sporadic compliance assessments.

To achieve resilience, your cybersecurity strategy will require a mindset shift from reactive to proactive. Instead of focusing on reacting to incidents, the most effective strategies stress the importance of preventing cyber-attacks. That said, any robust cybersecurity strategy also puts you in a better position to respond to an attack. In the event your organization is victimized, a successful strategy can make the difference between a minor incident and a major one. Let’s discuss how we stay ahead in this continuing battle.

Presented by Chris May, Security Solutions Director, Advantage Technology

Basically Business Email Know How

With over 124.5 billion business emails sent each day worldwide, it matters that yours stands out. Communicate clearly, using proper format and style.  This basic, fast-paced class explores what makes a good signature line, clarifies when to forward, how to reply, and inspires better content to ensure you make your mark.

Presented by Jens-Kristian Kiel, the founder and CEO of Made in Germany, an award-winning American brand and content consultancy.

Keys to Successful Collaboration in Healthcare

COVID-19 has been a critical catalyst to change working habits, and a massive accelerant to the digital transformation already reshaping the working world. This is no more evident than in healthcare, where telehealth has grown by orders of magnitude, and healthcare organizations have had to fundamentally change how they provide their essential services and ensure continuity of operations. Mr. Simmons offers his perspectives from a 32-year career in telehealth to provide insights into success factors for telehealth and health collaboration, including patient care, education, patient support services, and administration.

Presented by Scott C. Simmons, M.S. Eng., Healthcare Lead, Poly Americas and Fellow of the American Telemedicine Association. He holds a B.S. in Biomedical Engineering from Tulane University and a M.S. in Industrial Engineering from the University of Houston.

The Simplicity of Virus Generation of Implementation

Although you do not need to understand computer programming to be efficient in cybersecurity, it is important to observe how quickly viruses can be generated via Windows Tools such as Notepad.  Thus, this course will allow anyone who is comfortable using a Windows Operating System and Notepad.  Please note, the viruses we will create in the class will not be harmful, and the demonstration is to advise how users at any knowledge level can generate viruses with Notepad in the Windows Operating System.

Presented by Dr. Adam Beatty, Cybersecurity Undergraduate Director and Associate Professor at the University of Charleston, Author of Multiple Cybersecurity and Information Technology Publications, CompTIA A+, CompTIA Network+, Microsoft Certified Professional, Apple Certified Macintosh Technician, and Technology System Specialist.

Small Business Security

Cybersecurity breaches impacting multinational corporations have become increasingly common in today’s digital age. These breaches can have significant consequences for large corporations, such as fines, lawsuits and devastating damages to brands. Unfortunately for small businesses the reality is one cybersecurity breach could be insurmountable leading to closure with an impact far greater than that of a large corporation. Entrepreneurs and small businesses alike must take steps to protect digital assets if they wish to remain in business.  This session will provide strategies for small businesses as well as discuss open source tools that can be used to secure organizations with limited resources.

Presented by Dr. Kevin Harris, University of Charleston Graduate Cybersecurity Program Director.

Evaluating Your School’s Physical Security Strategy

Learn about the ways school districts and universities are modernizing their physical security and creating safer campuses for students and staff.

Presented by Christian Skuce, Verkada Certified Engineer

Introduction to Hybrid Cloud Security

Learn how a hybrid-cloud platform makes it easy to scale physical security, giving you smarter security and safer buildings.

Presented by Christian Skuce, Verkada Certified Engineer

Why you need to convert your data into garbage

What's is the single greatest reason for a hacker to get into your network? The answer is “Data”. Data is the most valuable asset for any organization. When a hacker breaks into your network centric cybersecurity, access to the data is available. The only way the hacker will be deterred will be if the data obtained is of no use.

In this session, Graham will give an overview of why this problem is to be solved today and not something that can be done in future. For all organizations data protection should be an ongoing process rather than a fix.

Presented by Graham Grigg is a product specialist with Galaxkey.

Vendors:

Arctic Wolf Networks
HPE Aruba
AVAYA
Avertium
Barracuda
ByteSpeed
DellEMC
Eaton
Eaton
Fortinet
Galaxkey
Hanwha Group
Method1
Mitel
Poly
SI-Legacy
SonicWall
University of Charleston
VMware
Verkada
Viewsonic
Virsec
WVU Industrial Extension

About the Charleston Coliseum & Convention Center

The Charleston Coliseum & Convention Center is the preeminent entertainment venue in West Virginia. The coliseum offers broad adaptability with over 13,000 seats and 30,500 square feet of event space. The attached convention center is comprised of a Grand Hall and adjoining West Halls, providing over 60,000 square feet of Class A flexible exhibition space and over 50,000 square feet of premium, unobstructed exhibit area and is utilized for exhibitions, banquets, corporate meetings, and celebrations on a grand scale.

Take a look back at the 2019 West Virginia Technology Expo:

Lunch
Lunch
Lunch
Lunch

About Advantage Technology

For over 20 years, Advantage Technology has been providing IT services and solutions. With West Virginia offices is Charleston and Bridgeport and a Maryland office in Williamsport, we service companies in West Virginia, Maryland, Kentucky, Virginia, Pennsylvania, Ohio and throughout the Mid-Atlantic region along with clients in Canada.

Because we have over 80 technicians, we can specialize in emerging areas of information technology and have dedicated resources to specific disciplines, rather than merely being computer generalists. Our focus and innovation enable us to support over 800 companies and continue to expand into cutting edge areas of information technology.