The IT Summit

October 6, 2010

Email Archiving Best Practices

Filed under: Email, IT Strategy — admin @ 10:46 pm

Email Archiving Best Practices

August 18, 2010

Vendor Success Strategies for Events – Step 1

Filed under: Marketing, Trade Show Best Practice — admin @ 11:49 pm

Wes Sherman, 15 year trade show veteran tells how to be successful at trade shows.

July 21, 2010

Drive Huge Revenues Through Events, and We’ll Show YOU How

Filed under: Marketing, Trade Show Best Practice — admin @ 3:54 pm

Trade shows are an extremely valuable marketing tool. Learn how to maximize results of trade shows from a trade show veteran.

June 30, 2010

College, Interrupted

Filed under: Education, IT Career, IT Strategy, IT Training — admin @ 4:43 pm

A serious discussion about the value and sequencing of a college education is long overdue.
by Rick Bauer
As the class of 2010 graduates into the deepest economic downturn since the Great Depression, the prospects for employment are bleaker than in anytime I can remember. For high school graduates under 25 and not in college, the average […]

April 6, 2010

Defenders of the Realm

Filed under: Security — admin @ 12:42 pm

Steven Porter, CIO
Touchstone Behavioral Health
There are only two types of connected organizations: those who are currently remediating a security breach, and those who are actively under attack. The “script-kiddies” have grown up, and skills honed penetrating networks 10 years ago are now being used to harvest confidential data streams for financial gain. Buffer-overflows, remote code […]

April 5, 2010

Reformatting IT Strategy and Moving Beyond Tech for Tech Sake

Filed under: Cloud Computing, IT Strategy — admin @ 3:26 pm

Ty Howard, CIO
“Clouds of Change”
In the mist of one of the greatest economic crisis faced since the Great Depression, and the collapse of businesses and financial industries that once stood firmly rooted in the past and tradition, IT moved quietly and further into the shadows of the back office.  In attempt to save money and […]

What is a Security Integrator?

Filed under: Security — admin @ 1:36 pm

Rueben Orr, CPP
“What is in a name? That which we call a rose by any other name would smell as sweet.” – Shakespeare

I continue to be amused when I meet new people in the security industry who refer to themselves as Security Integrators.  I don’t know why people feel the need to give themselves […]