Tomorrow is the 2017 Austin Tech Summit here in Austin. Texas starting at 9:40am at the Westin downtown. Free Registration is still open for the Austin Tech Summit 2017, click here to register The available seating is limited so be sure to sign up as soon as possible to ensure you will have a seat. Below is the physical address and the detailed agenda for the Austin Tech Summit 2017.
Location:The Westin Hotel
Hotel Address: 310 E 5th St, Austin, TX 78701
Hotel Telephone: (512) 391-2333
Per Austin Tech Summit’s site this year’s Tech Summit agenda is carefully designed to provide you with the latest IT trends and knowledge needed to make the best possible decisions on behalf of your organization. It will allow you to see the best practices other leading companies have adopted, key IT challenges they are facing, and new solutions that are solving these challenges.
9:40 – 10:00 am: Registration, Signature Refreshments, Peer Networking, On arrival you will be greeted for check-in, vendor area is open along with the main presentation room with refreshments being served on arrival. First speaker is on shortly after. This time is spent networking with your peers and vendors.
10:00 – 10:20 am: New Network and Wireless Technologies. Designing a local area network from scratch is always fun, the wired side of this presentation will cover issues such as the latest Network management tools, design complexity to meet the requirements, PoE or not, just 100GB and choices for going beyond, and redundancy considerations. On the wireless side, although there are many ways to conﬁgure and use Wi-Fi, this session will focus on some of the newest tools that best-in-class organizations are applying to achieve the following goals out of their wireless networks.
- Practicing active management
- Using managed wireless products
- Prioritizing usage
- Building security from the start.Developing a guest policy carefully
10:20 – 10:40 am: What’s New in Backup and Disaster Recovery.IT disasters happen every day, in every company. With the right preparation, no one ever hears about them. Without it, these disasters can make the evening news. The first step is to define what your company cannot live without, otherwise known as a Business Impact Analysis (BIA). Once the mission critical applications have been identified, you must then agree upon what is acceptable downtime or the recovery time objective (RTO). The difference between zero downtime and fifteen minutes of downtime is significant from a cost perspective. This session will then cover the new tools available for the actual backup and disaster recovery process including testing.
- New tools available to detect and trigger DR activation as needed.
- Automated damage assessment and notification tools.
- Latest backup tools/methodologies/costs and speed of recovery for each.
- Reconstitution challenges and solutions.
10:40 – 11:00 am: Understanding Revolutionary Emerging Storage Technologies. Founded in 2010, Tegile Systems is a privately held enterprise storage vendor headquartered in Silicon Valley, California. Tegile makes all-flash and hybrid storage arrays that help organizations eliminate storage silos, simplify storage management, and reduce costs by consolidating all of their workloads onto a single flash platform.
11:00am – 12:00 pm: Brunch Served and Peer Networking.
12:00 – 12:20 pm: BYOD Implementation and Management Strategies. There’s little doubt that bring-your-own-device (BYOD) adoption has profoundly changed the enterprise. By 2017, one-half of organizations will no longer provide devices to their employees, according to industry research. This is another banner year where personal devices are expected to make a bigger leap forward than ever and with the line between personal and business blurring, BYOD technology needs to be able to adapt with the changes ahead.
- Keep usage policies updated.
- Secure the end points.
- Track impact and set device ceilings.
- Plan security around the data/content/holes.
12:20 – 12:40 am: Network Security Present and Future. Any computer within your network that is connected to the Internet, directly or indirectly, is a potential risk for an attack from viruses or external attackers. Before you invest in the latest expensive technology, it’s important to plan properly. This will help you make the most of your budget without compromising the level of protection. Many companies have spent considerable resources protecting their perimeter networks but have allowed their internal infrastructure to remain extremely vulnerable.
You should also be sure to take sufficient steps to harden your core operating systems and major applications from common attacks and employee theft/misuse of data which is the single largest point of vulnerability in most companies. This session will cover items such as Encrypting your data, Using digital certificates to sign all of your sites, Implementing DLP and auditing, Implementing a removable media policy, Securing websites against MITM and malware infections, Best spam filters to use on email servers, Using a comprehensive endpoint security solution, Network-based security hardware and software, Maintaining security patches, and of course Educating your users.
12:40 – 1:00 pm: Best Practices in Cloud Utilization & Security. The goal of any organization is to use IT at its most effective level. For an IT manager cloud sizing doesn’t have one correct answer, since every environment is truly unique in its demands. A few considerations and best practices. A Cloud migration project can be a relatively simple exercise, where applications are migrated “as is”, to gain benefits such as elastic capacity and utility pricing, but without making any changes to the application architecture, software development methods or business processes. However, there is no business transformation as part of this move. If the expectation is broader strategic capabilities as a result of a move to the Cloud, it is important to develop a true Cloud migration plan to include core tactics such as:
- Shift to DevOps
- Cloud Containers
- Hybrid Clouds
On the security side, there are different considerations and vulnerabilities specific to each cloud model such as Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). This session will discuss DLAs, security architecture drawings, specialized protections for the perimeter, firewall secretion, function segregation, and vulnerability analysis.
1:00 End of the Main Event, Raffle Drawings, Vendor Networking and Finale.This concludes our speaker sessions, but we encourage to you network and discuss the days topic and reach out to any of our vendors and/or speakers for any addtional information. Thank you for your time and particpation in our event
Source: Austin Tech Summit 2017,Westin