11:30 am - 01:30 pm
ILTA Roadshow: Microsoft Road Map for 2016 Server Platforms
Microsoft's 2016 server platforms have begun their release cycle, with Skype for Business 2015, Exchange 2016 and SharePoint 2016 already released. System Center Configuration Manager 2016 was released in a preliminary capacity in late 2015, while the remainder of the System Center 2016 suite and Windows Server 2016 are expected to release throughout 2016. We'll...
12:00 pm - 01:00 pm
Exchange On-Premises vs. Exchange Online – A Law Firm Bakeoff
The cloud has been a hot topic for a few years and most firms are working to understand if/when infrastructure-as-a-service (IaaS), software-as-a-service (SaaS) and platform-as-a-service (PaaS) solutions will fit into their technology plans. Recently, directory-as-a-service, identity-as-a-service and others have further expanded the cloud service landscape. In this webinar, we will focus on arguably the most...
12:00 pm - 01:00 pm
Best of ILTACON 2016
Join Kraft Kennedy as we present highlights from the following ILTACON 2016 Presentations: Exchange 2016 Why and How to Upgrade Windows 10 Deployment Best Practices Passwords 2.0: Modern Windows Authentication with Advance Threat Analytics and Conditional MFA Project Modeling: LPM vs PM – Differences, Applications and Templates Seclore: The Power of Enterprise Digital Rights Management - Automated...
12:00 pm - 01:00 pm
Using Backup and Disaster Recovery Technology to Protect Yourself from Ransomware? You’re Falling Behind!
BDR technology has evolved. There has been an evolution in what defines a true disaster. No longer are fires, floods and tornadoes the only threat to your business. Last year alone, $325 million was netted from Ransomware attacks worldwide, and that number is growing. In this session, we’ll review the changes and new threats to...
02:00 pm - 03:00 pm
Webinar: Build the Foundation for a Secure Enterprise: Critical Controls, ISO27001 and More
In today's organizations, clients and firm leadership alike demand the security of critical client and firm data. We will look at the leading frameworks employed to prevent, detect and respond to security incidents. We will discuss how these approaches can be used to build the foundation of a successful information security program, measure the success...