08:30 am - 11:00 am
Spring Breakfast Round-Table
Enjoy bagels and coffee as we discuss data privacy, disaster recovery, file sharing and the topics you bring to the table. With our experts and your peers, this round-table promises to be informative and fun. Attendees can also look forward to exciting door prizes! REQUEST YOUR INVITATION
11:30 am - 01:30 pm
Atlanta Roadshow: Microsoft Road Map for 2016 Server Platforms
Microsoft's 2016 server platforms have begun their release cycle, with Skype for Business 2015, Exchange 2016 and SharePoint 2016 already released. System Center Configuration Manager 2016 was released in a preliminary capacity in late 2015, while the remainder of the System Center 2016 suite and Windows Server 2016 are expected to release throughout 2016. We'll...
11:30 am - 01:30 pm
Houston Roadshow: Microsoft Road Map for 2016 Server Platforms
Microsoft's 2016 server platforms have begun their release cycle, with Skype for Business 2015, Exchange 2016 and SharePoint 2016 already released. System Center Configuration Manager 2016 was released in a preliminary capacity in late 2015, while the remainder of the System Center 2016 suite and Windows Server 2016 are expected to release throughout 2016. We'll...
11:30 am - 01:30 pm
Dallas Roadshow: Microsoft Road Map for 2016 Server Platforms
Microsoft's 2016 server platforms have begun their release cycle, with Skype for Business 2015, Exchange 2016 and SharePoint 2016 already released. System Center Configuration Manager 2016 was released in a preliminary capacity in late 2015, while the remainder of the System Center 2016 suite and Windows Server 2016 are expected to release throughout 2016. We'll...
12:00 pm - 01:00 pm
Build the Foundation for a Secure Enterprise: Critical Controls, ISO27001 and Other Approaches
Description: In today's organizations, clients and firm leadership alike demand the security of critical client and firm data. We will look at the leading frameworks employed to prevent, detect and respond to security incidents. We'll discuss how these approaches can be used to build the foundation of a successful information security program, measure the success...