Dec 08, 2015Register
Sponsored by IBM
The 2015 Cost of Data Breach Study: Impact of Business Continuity Management is an annual special report that analyzes the positive impact a business continuity management (BCM) program can have on the financial and reputational consequences of a data breach.
Dec 09, 2015Register
Sponsored by IBM
It’s well known that in today’s digital market, consumers share their experiences and beliefs through social media, and brands know that their success relies on their ability to capture and analyze what’s being said across multiple channels.
Dec 15, 2015Register
Sponsored by CDW
In an era increasingly focused on software-defined infrastructure, software defined networking (SDN) is having a tremendous impact on the way IT, network and datacenter staff think about connectivity both wired and wireless.
Feb 10, 2016Register
Sponsored by SurfWatch
The Dark Web is where cybercriminals are actively targeting, trading, and selling sensitive corporate and personal information. However these underground cybercriminal markets -- where company trade secrets, social security numbers, credit cards, bank accounts, medical records, malware for sale, hackers for hire, and more are all readily available -- are also rich sources of intelligence that you can use to mitigate critical risks.
Mar 01, 2016Register
Sponsored by Pomeroy
The cloud is revolutionizing how organizations work because IT leaders understand that legacy technology infrastructure and IT processes can't withstand tomorrow's competitive challenges.
Organizations are modernizing their data centers in order to provision IT services faster, strengthen security, and reduce costs. However, businesses are facing new demands from end users, including access to data and applications 24/7, no patience for downtime or data loss, and exponential data growth at 30-50% per year. This opens an availability gap between always-on user requirements and IT’s ability to effectively deliver availability.
Sponsored by Veeam
Microsoft SQL Server includes a high availability option called AlwaysOn Availability Groups (AGs). In this session we will see how AGs are implemented using a Windows Server Failover Cluster and SQL Server 2014 with the Pure Storage FlashArray.
Sponsored by Pure Storage
Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise.
Sponsored by CyberArk