Overview


Free Registration is now open for the Washington DC Tech Summit 2017.
Location: Willard InterContinental Washington
Hotel Address: 1401 Pennsylvania Ave NW, Washington, DC 20004
Hotel Telephone: (202) 628-9100

Join your peers by registering now. Gather the key IT knowledge needed to be indispensible. This year's Tech Summit agenda is carefully designed to provide you with the latest IT trends and knowledge needed to make the best possible decisions on behalf of your organization. It will allow you to see the best practices other leading companies have adopted, key IT challenges they are facing, and new solutions that are solving these challenges. The available seating is limited so be sure to sign up as soon as possible to ensure you will have a seat. You are welcome to invite other key people on your team.

Information on Sponsoring This Event

Agenda Summary


7:30 am: Registration, Coffee Break/Snacks, Exhibit Area Open, Peer Networking, Product Demos.
8:10 am: The Latest Security Detection and Response Tools.
8:40 am: Cloud Infrastructure Services Trends.
9:10 am: Network Security Present and Future..
9:40 am: What's New in Backup and Disaster Recovery.
10:10 am: New Network and Wireless Technologies.
10:40 am: Coffee/Refreshment Break, Product Demonstrations, Exhibit Area Open.
11:00 am: Best Practices in Cloud Utilization & Security.
11:30 am: BYOD Implementation and Management Strategies.
12:00 pm: Trends in Application and Mobile App Development.
12:30 pm: Lunch
1:30 pm: Latest Mobile Device and Apps Security Tools.
2:00 pm: End of the Main Event, Raffle Drawings, and Finale.

View Detailed Agenda




Date:  April 04, at the Willard InterContinental Washington
Fee:   FREE to Register (Limited Seating so Register Now).



Example Past Participants in Our Events


• 3M
• 7-Eleven
• A.T. Kearney
• Aarons
• AARP
• Abbott Labs
• ABN AMRO
• Accenture
• Acxiom
• Adecco
• ADM
• Adobe
• ADP
• Aflac
• Agilent
• AirTran Airways
• Akzo Nobel
• Alcoa
• Alcon Laboratories
• Allied Group
• American Honda Motor
• AMAn
• American Red Cross
• American Stock Exch.
• AMF Bowling Centers
• Analog Devices
• AOL
• Aon Risk Solutions
• Applebee's
• Aramark
• Arrow Electronics
• Ashland
• Asplundh
• Associated Press
• AstraZeneca
• AT&T
• Audiovox
• Autodesk
• AutoNation
• Avaya
• Avery Dennison
• Avid Technology
• Avon Products
• AXA Equitable
• Bacardi
• BAE Systems
• Baker Furniture
• Bank of America
• Banner Health
• Barclays Capital
• Barnes and Noble
• Barron's
• BASF
• Baxter Healthcare
• Bayer
• Baystate Health
• Bearing Point
• Bechtel
• Behr
• Best Buy
• Best Buy
• BET Networks
• Blockbuster
• BNP Paribas
• BNY Mellon
• Boehringer Ihgelheim
• Boeing
• Booz Allen Hamilton
• BorgWarner
• BCG
• Boston Scientific
• Bristol-Myers Squibb
• Broadcom
• CA Technologies
• Capgemini
• Capital One
• Cardinal Health
• CareMark
• Cargill
• Casio America
• Castrol Industrial
• CB Richard Ellis
• Ceridian
• Charles Schwab
• Cheesecake Factory
• Chevron
• Chick-Fil-A
• Children's Health
• Chili's / On Border
• Chiquita Brands
(and thousands of other leading companies who have attended our many conferences)



Date:  April 04, at the Willard InterContinental Washington
Fee:   FREE to Register (Limited Seating so Register Now).



Key Sponsors

Wish to be a sponsor?

                             





Detailed Agenda

7:30 – 8:10 am: Registration, Coffee Break/Snacks, Exhibit Area Open, Peer Networking, Product Demonstrations

8:10 – 8:40: The Latest Security Detection and Response Tools. Cyber security incidents are increasing in both scope and scale every day. Our defensive mechanisms have been outpaced by the scope and scale of malicious cyber activities. Cybercriminals are agile and, as long as organizations predictably follow best practice in their security strategies, cybercriminals will remain a step ahead. This session will cover key capabilities needed for a modern threat detection & incident response program such as:

- Asset Discovery - creating an inventory of running instances
- Vulnerability Assessment - conducting scans to assess exposure to attack, and prioritize risks
- Change Management - detect changes in your environment and insecure network access control configurations
- Access Log Monitoring - Monitor access logs of hosted content and data directed at your instance
- Cloud Monitoring and Alerting - Monitor the Cloud service for abnormal behavior
- Windows Event Monitoring - Analyze system level behavior to detect advanced threats

8:40 – 9:10 am: Cloud Infrastructure Services Trends. At its full potential, cloud computing can accelerate business innovation and transformation. The adoption of cloud computing is best characterized as a journey that occurs over time and in stages. IDC research proposes five stages of cloud maturity: Ad Hoc, Opportunistic, Repeatable, Managed, and Optimized. Most organizations have passed through the first few stages and are now focused on management and optimization. This session will cover the latest developments and trends such as:

- Portability among cloud services for redundancy and recovery.
- Encryption and security issues between various providers.
- Tracking and staying ahead of policy and environment changes.
- Best practices in scalability and efficient optimization.

9:10 – 9:40 am: Network Security Present and Future. Any computer within your network that is connected to the Internet, directly or indirectly, is a potential risk for an attack from viruses or external attackers. Before you invest in the latest expensive technology, it’s important to plan properly. This will help you make the most of your budget without compromising the level of protection. Many companies have spent considerable resources protecting their perimeter networks but have allowed their internal infrastructure to remain extremely vulnerable.

You should also be sure to take sufficient steps to harden your core operating systems and major applications from common attacks and employee theft/misuse of data which is the single largest point of vulnerability in most companies. This session will cover items such as Encrypting your data, Using digital certificates to sign all of your sites, Implementing DLP and auditing, Implementing a removable media policy, Securing websites against MITM and malware infections, Best spam filters to use on email servers, Using a comprehensive endpoint security solution, Network-based security hardware and software, Maintaining security patches, and of course Educating your users.

9:40 – 10:10 am: What's New in Backup and Disaster Recovery. IT disasters happen every day, in every company. With the right preparation, no one ever hears about them. Without it, these disasters can make the evening news. The first step is to define what your company cannot live without, otherwise known as a Business Impact Analysis (BIA). Once the mission critical applications have been identified, you must then agree upon what is acceptable downtime or the recovery time objective (RTO). The difference between zero downtime and fifteen minutes of downtime is significant from a cost perspective. This session will then cover the new tools available for the actual backup and disaster recovery process including testing.

- New tools available to detect and trigger DR activation as needed.
- Automated damage assessment and notification tools.
- Latest backup tools/methodologies/costs and speed of recovery for each.
- Reconstitution challenges and solutions.

10:10 – 10:40 am: New Network and Wireless Technologies. Designing a local area network from scratch is always fun, the wired side of this presentation will cover issues such as the latest Network management tools, design complexity to meet the requirements, PoE or not, just 100GB and choices for going beyond, and redundancy considerations. On the wireless side, although there are many ways to configure and use Wi-Fi, this session will focus on some of the newest tools that best-in-class organizations are applying to achieve the following goals out of their wireless networks:

- Practicing active management.
- Using managed wireless products.
- Prioritizing usage.
- Developing a guest policy carefully
- Building security from the start.

10:40 – 11:00 am: Coffee/Refreshment Break, Product Demonstrations, Exhibit Area Open

11:00 – 11:30 am: Best Practices in Cloud Utilization & Security. The goal of any organization is to use IT at its most effective level. For an IT manager cloud sizing doesn’t have one correct answer, since every environment is truly unique in its demands. A few considerations and best practices. A Cloud migration project can be a relatively simple exercise, where applications are migrated "as is", to gain benefits such as elastic capacity and utility pricing, but without making any changes to the application architecture, software development methods or business processes. However, there is no business transformation as part of this move. If the expectation is broader strategic capabilities as a result of a move to the Cloud, it is important to develop a true Cloud migration plan to include core tactics such as:

- Shift to DevOps
- Cloud Containers
- Hybrid Clouds

On the security side, there are different considerations and vulnerabilities specific to each cloud model such as Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). This session will discuss DLAs, security architecture drawings, specialized protections for the perimeter, firewall secretion, function segregation, and vulnerability analysis.

11:30 – 12:00 pm: BYOD Implementation and Management Strategies. There's little doubt that bring-your-own-device (BYOD) adoption has profoundly changed the enterprise. By 2017, one-half of organizations will no longer provide devices to their employees, according to industry research. This is another banner year where personal devices are expected to make a bigger leap forward than ever and with the line between personal and business blurring, BYOD technology needs to be able to adapt with the changes ahead.

- Keep usage policies updated.
- Secure the end points.
- Track impact and set device ceilings.
- Plan security around the data/content/holes.

12:00 – 12:30 pm: Trends in Application and Mobile App Development. Organizations are under pressure to develop and deliver sophisticated cross-platform web applications faster. This session will discuss the latest development platforms including cloud development platforms and open source frameworks. How to create more visually compelling models to drive usage and ease of use will also be discussed.
On developing mobile apps this session will cover how to develop with your audience in mind, how to learn from competitors and like-applications, and key considerations in the user experience and achieving collaboration in both the coding and user experience to build up valuable social value points within your apps.

12:30 – 1:30 pm: Hot lunch served Exhibits Open with Speaker.

1:30 – 2:00 PM Latest Mobile Device and Apps Security Tools. Enterprise mobility is constantly changing, and the recent rise of trends like BYOD are broadening the idea of what it means to be a mobile-savvy organization. With an ever-increasing percentage of the workforce having grown up with the Web and cell phones, more workers feel entitled to greater freedom in selecting their business computing devices, and smartphones are their devices of choice. IT must have an agnostic approach to smartphone platforms to support multiple platforms for their users, as well as provide contingency for access continuity. Smartphones operate in two worlds: they can connect to the corporate network over wireless, or bypass the network entirely using mobile cellular connections. That means they might download malware from the Web over 4G, and then disseminate it to the network over the corporate Wi-Fi network. Among many topics this session will cover:

- Sealing data leakage and device loss.
- Detection and stopping of malware infections.
- Best solutions for device bandwidth overconsumption.

2:00 pm: End of Event, Raffle Prize Drawings for a Tablet, Gift Cards and other great items!




Date:  April 04, at the Willard InterContinental Washington
Fee:   FREE to Register (Limited Seating so Register Now).



"Thank you for sending the final list. The event went just as planned and we were very happy with the turnout. Thank you so much for all the help! Look forward to more of these events."
- Katrina Grenon, IBM

"The staff and facilitators are wonderful!"
- Shirley Weis, Mayo Clinic

"I like your service very much. "
- Thomas Berner, E.V.P., First Capital

"This is great, thanks!"
  - Philip King, Dir, American Hotel Register

"I found the presentations very interesting."
  - Celine Rasborn, Director, Fujitsu

"This is terrific. Content curation along these lines is a great help."
  - Rich Kylberg, VP, Arrow

"This really helps focus our attention. Thanks!"
  - Joseph Brownlee, GM, Rotary

"I think you provide excellent value for the cost."
- Olaf Rove, TCI

"Talking to peers and sharing best practices -- it's very powerful. Even at my level of experience, I still learn new things."
- Michael Frankel, Sr.V.P., LexisNexis Group

"If people just pick their heads up and look into other companies, there's a lot that you can adopt."
- Dennis Deering, VP, Diebold, Inc.

"I find it very invigorating to learn from others and adapt ideas from others, rather than always assuming our way is the best way. Sometimes others have better ideas than we do."
- Larry Quinlan, Deloitte

"When you can get a glimpse of what is going on in the market, even a tiny glimmer of what can happen, you'll be able to jump on a new trend and get ahead of your competition."
- Kerry Desberg, Owens Corning

"There are some good ideas and questions included here."
- Michael Kowalski, IAB Solutions

"Networking is extremely valuable. You have to approach your career as a learning opportunity and networking in the first place has allowed me to learn."
- Herman Nell, VP, Petco

"The network of relationships between people, whether the old fashioned kind or via new modern social networks, is absolutely critical to operate with speed across geographies and business silos."
- Polly Pearson, VP, EMC Corporation

"I think networking outside your industry is critical to keep the flow of new ideas coming into your mind, and your organization."
- Jim McComb, SVP, Bank of America

"Networking is a lifeline to being successful and to helping your group achieve your goals. You have to have a fresh perspective."
- Eric Thomas, Novell