Event Details

Free Registration is now open for the Greensboro Tech Summit.
Location: Grandover Resort
Hotel Address: 1000 Club Rd, Greensboro, NC 27407
Hotel Telephone: (336) 294-1800

Join your peers by registering now. Gather the key IT knowledge needed to be indispensible. This year's Tech Summit agenda is carefully designed to provide you with the latest IT trends and knowledge needed to make the best possible decisions on behalf of your organization. It will allow you to see the best practices other leading companies have adopted, key IT challenges they are facing, and new solutions that are solving these challenges. The available seating is limited so be sure to sign up as soon as possible to ensure you will have a seat. You are welcome to invite other key people on your team.

Information on Sponsoring This Event



Agenda Summary

9:00am Registration, Signature Refreshments,Networking
9:40amNew Network and Wireless Technologies.
10:05amWhat's New in Backup and Disaster Recovery
10:40amTrends in Mobile App Development
11:05amBYOD Implementation and Management Strategies
11:30amBrunch Served and Peer Networking
12:30pmBest Practices in Cloud Utilization & Security
12:55pmNetwork Security Present and Future More Details
1:20pmRaffle Drawings & Finale.



Date: Grandover Resort on February 28th
Fee:   FREE to Register (Limited Seating so Register Now).



Example Past Participants in Our Nationwide Events

• AECOM
• Aggreko llc
• Ally Financial
• Altegra Health
• Aramark
• Arby's Restaurant Group
• Ashley Furniture
• BB&T
• Best Buy
• Big Lots
• Boeing
• Burrow Global, LLC
• Capital One
• Child Care Network
• ClearResult
• Cox Enterprises
• CVS Health
• Dollar Tree
• Dunkin' Bands
• Encore Capital Group
• Energy Transfer
• Equifax
• Ericsson Inc
• FEMA
• Fiserv
• FUJIFILM
• GameStop
• Goodyear Tire
• HD Supply Facilities
• HealthPort
• Hilton
• Kelly Moore Paint
• Mansfield Oil Company
• Marriott
• MARTA
• McKesson
• Nestle
• National Labor Relations
• Greensboro Southern
• Philip's
• Phoenix Health Care
• Progressive
• Quicken Loans
• Raytheon
• Robert Half
• Santander Consumer
• SBM Offshore USA, Inc.
• SpaceWorks Enterprises
• Stanley Black & Decker
• Starbucks
• SunTrust
• The Container Store
•T he Home Depot
• TransCentra
• TXU Energy
• United Natural Foods, Inc
(and thousands of other leading companies who have attended our many conferences)




Date: Grandover Resort on February 28th
Fee:   FREE to Register (Limited Seating so Register Now).



Event Series Sponsors

Wish to be a sponsor?
 


Detailed Agenda

9:00 – 9:40 am: Registration, Signature Refreshments, Peer Networking On arrival you will be greeted for check-in, vendor area is open along with the main presentation room with refreshments being served on arrival. First speaker is on shortly after. This time is spent networking with your peers and vendors.

10:00 – 10:20 am: New Network and Wireless Technologies. Designing a local area network from scratch is always fun, the wired side of this presentation will cover issues such as the latest Network management tools, design complexity to meet the requirements, PoE or not, just 100GB and choices for going beyond, and redundancy considerations. On the wireless side, although there are many ways to configure and use Wi-Fi, this session will focus on some of the newest tools that best-in-class organizations are applying to achieve the following goals out of their wireless networks:

- Practicing active management.
- Using managed wireless products.
- Prioritizing usage.
- Developing a guest policy carefully
- Building security from the start.
 
10:05 – 10:40 am:What's New in Backup and Disaster Recovery. IT disasters happen every day, in every company. With the right preparation, no one ever hears about them. Without it, these disasters can make the evening news. The first step is to define what your company cannot live without, otherwise known as a Business Impact Analysis (BIA). Once the mission critical applications have been identified, you must then agree upon what is acceptable downtime or the recovery time objective (RTO). The difference between zero downtime and fifteen minutes of downtime is significant from a cost perspective. This session will then cover the new tools available for the actual backup and disaster recovery process including testing.

- New tools available to detect and trigger DR activation as needed.
- Automated damage assessment and notification tools.
- Latest backup tools/methodologies/costs and speed of recovery for each.
- Reconstitution challenges and solutions.

10:40 – 11:05 am: Trends in Application and Mobile App Development. Organizations are under pressure to develop and deliver sophisticated cross-platform web applications faster. This session will discuss the latest development platforms including cloud development platforms and open source frameworks. How to create more visually compelling models to drive usage and ease of use will also be discussed.
On developing mobile apps this session will cover how to develop with your audience in mind, how to learn from competitors and like-applications, and key considerations in the user experience and achieving collaboration in both the coding and user experience to build up valuable social value points within your apps.

11:05 – 11:30 am: BYOD Implementation and Management Strategies. There's little doubt that bring-your-own-device (BYOD) adoption has profoundly changed the enterprise. By 2017, one-half of organizations will no longer provide devices to their employees, according to industry research. This is another banner year where personal devices are expected to make a bigger leap forward than ever and with the line between personal and business blurring, BYOD technology needs to be able to adapt with the changes ahead.

- Keep usage policies updated.
- Secure the end points.
- Track impact and set device ceilings.
- Plan security around the data/content/holes.

11:30– 12:30 pm: Brunch Served and Peer Networking.

12:30 – 12:55 pm: Best Practices in Cloud Utilization & Security. The goal of any organization is to use IT at its most effective level. For an IT manager cloud sizing doesn’t have one correct answer, since every environment is truly unique in its demands. A few considerations and best practices. A Cloud migration project can be a relatively simple exercise, where applications are migrated "as is", to gain benefits such as elastic capacity and utility pricing, but without making any changes to the application architecture, software development methods or business processes. However, there is no business transformation as part of this move. If the expectation is broader strategic capabilities as a result of a move to the Cloud, it is important to develop a true Cloud migration plan to include core tactics such as: Shift to DevOps, Cloud Containers, Hybrid Clouds

On the security side, there are different considerations and vulnerabilities specific to each cloud model such as Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). This session will discuss DLAs, security architecture drawings, specialized protections for the perimeter, firewall secretion, function segregation, and vulnerability analysis.

12:55 – 1:20 pm: Network Security Present and Future Any computer within your network that is connected to the Internet, directly or indirectly, is a potential risk for an attack from viruses or external attackers. Before you invest in the latest expensive technology, it’s important to plan properly. This will help you make the most of your budget without compromising the level of protection. Many companies have spent considerable resources protecting their perimeter networks but have allowed their internal infrastructure to remain extremely vulnerable.

You should also be sure to take sufficient steps to harden your core operating systems and major applications from common attacks and employee theft/misuse of data which is the single largest point of vulnerability in most companies. This session will cover items such as Encrypting your data, Using digital certificates to sign all of your sites, Implementing DLP and auditing, Implementing a removable media policy, Securing websites against MITM and malware infections, Best spam filters to use on email servers, Using a comprehensive endpoint security solution, Network-based security hardware and software, Maintaining security patches, and of course Educating your users.

1:20 pm: End of the Main Event, Raffle Drawings, Vendor Networking and Finale.This concludes our speaker sessions, but we encourage to you network and discuss the days topic and reach out to any of our vendors and/or speakers for any addtional information. Thank you for your time and particpation in our event





Date: Grandover Resort on February 28th
Fee:   FREE to Register (Limited Seating so Register Now).





"It was a well-organized event. Good topics & presentations and useful information."
- Adil Khan, IT Manager

"Attended and I enjoyed the summit. Learned about services/technologies we could utilize at our company"
- Ahmed Mohamed, Software Support Manager

"Overall the event was good. There were good vendors that highlighted risks in the area and how their product could help minimize that risk. The location was nice and giveaways are always a bonus."
- Beth Gavish, Information Security Officer

"The room setup was good, so was the food. Send me the next date please."
- Bill Sandberg, CEO

"I liked the pace the best."
- Bob Meecham, Sr Systems Engineer

"The agenda did have interesting topics for me...I would like to see more of these locally."
- Bob Brown, Information Security Manager

" I enjoyed it a lot. I look forward to next year."
- Carter Vath, Dir. Tech Support

"The speakers were generally very clear and concise, and presented their cases well."
- Chas Vinal , Manager of Business Intelligence

"Keep up the good work."
- Damon Poremski, Network Administrator

"I liked the various suppliers and the presentations."
- Deborah Hayek, Sr. Manager IT

"Each vendor had a 30-45 min opportunity to explain their market position or product."
- Douglas Peat, Dir Infrastructure

"I enjoyed meeting other IT people in the area and hearing the latest offerings from various vendors."
- Elvis Huff, MIS Systems Officer

"I liked the topics"
- Emilio Castro, IT Executive

"I really liked the presentations."
- Felix Malave, IT Manager

"I liked the content and location was convenient."
- Gabriel Flores, Network Manager

"I liked the variety of presentations"
- Greg Fleck, Manager Advanced Technology

"I enjoyed the networking"
- John Barry, President IT

"I attended and enjoyed the vendor presentations the best."
- John Ball, Director, Information Technology

"The presenters and presentations were all excellent – I appreciated the breaks that allowed us to talk with the vendors at the tables that presented and to speak with the vendors that were only tabling."
- Josette Dzencelowcz, Senior Software Engin. Mgr.

"I attended and appreciated that there wa a large turnout."
- Justin Redifer, Product Development Engineer

"I liked the ability to see new technology and applications."
- Marcia Trajano, Sr.Manager - Technology

"I liked the networking the best. I think this years was the best I have been to. Keep up the good work."
- Mark Ridings, Desktop Supervisor

"I enjoyed the demonstration of newer interests in the security field."
- Michael Barlow, Tactical IT Manager

"I liked the choice of speaker topics."
- Otis Curry, IS DIrector

"I like the laid back atmosphere and hands-off approach by the vendors"
- Peter Sanchez, IT Manager

"Seeing the new stuff from Google was quite exciting."
- Rob Marlowe, CFO

"I liked the vendor presentations."
- Rodney Ingram, Technology Mgr

"There was a lot of good information"
- Roy Kurowski, Commercial Technology Manager

"The Informational and Training are what I liked best."
- Ryan Heard, IT Manager

"I liked the accessibility to the sponsors and vendors, with updated and timely sessions."
- Sid Moore, Director IT

"Yes, I enjoyed the event"
- Steven McWilliams, Director of IT Services

"I liked the networking opportunity."
- Teresa Moore, Faculty_ Business &

"I enjoy news about what exciting things are happening in our area. Keeping the discussions on topic which you do a great job."
- Terry Durham, IS Technology

"Your event had a lot of great insights"
- Travis Gilbert, Director

"I liked the networking the best."
- Trenae Floyd, IT Coordinator

"What I liked best was learning about the new vendors and cutting edge technology"
- William Nash, IT Administration

"There were not a large amount of Vendors in attendance. This gave us more exposure and one on one time with the attendeees."
- Collin McDaniel, Tradeshow Manager, Howard Industries

"The speakers/presenters were good. The catering was excellent."
- William Schaefer, Operations Management

"The vendor booths were great; speakers were also very good."
- Vicky Hutchings, IT Manager

"I attended and enjoyed the “networking” the best. "
- Brian Bogdan, Director, Information Systems

"I liked the networking portions of the event."
- Luke Hardwick, Technical Recruiter

"Good presenters..A lot of information. Greatt venue too!"
- Juan Butler, Sr Programmer

"I like the ability to gain a good understanding of the security issues facing us today, and get all of that information in a single day."
- Dell Rhue, Owner

"I pretty much stopped doing these types of events because of poor attendee quality and volume but this totally changed my mind. I'm going to send out an internal email to my peers recommending they do your events."
- Tim Solomon, Commercial Accounts Manager, Barracuda Networks

"The speakers were good"
- Reggie Lee, Enterprise Networking Sales

"Met some great people and potential partnerships."
- Tamer Yacoub, Sr. Product Manager

"There were a number of good speakers from the different companies!"
- Benjamin Grady, Management Information System Coordinator