An Array of Chilled Juices, Farm Fresh Scrambled Eggs, Crisp Apple Wood Smoked Bacon Strips and Grilled Sausage Links, Seasoned Breakfast Potatoes, Assorted Muffins and Breakfast Pastries, Preserves and Butter, Coffee, Decaf, and a Variety of Specialty Teas
An innovation culture is a work environment that leaders cultivate in order to nurture creative thinking and its application. Innovation cultures are prized by organizations that compete in markets defined by rapid change; maintaining status quo is insufficient to compete effectively, thus making an innovation culture essential for business success.
Join Ken Piddington as he shares strategies for creating a right-sized culture of innovation for you organization.
What is the Internet of Things (IoT), and should I be afraid? What are the risks associated and best practices with this technology
This talk will cover Disaster Recovery as a Service and how it can help businesses recover their systems more cost effectively. We will discuss how you can leverage partners in your DR processes and the concept of a managed resiliency platform, what that means, and why you should care about it.
The prevalence of DDoS attacks saw dramatic increases over the last few years on a global scale. We’ll take a look at what is occurring in the attack landscape at a local level and how those trends compare to the global picture. Not only is this attack method increasingly hazardous to businesses big and small, they are growing dramatically in frequency. Join us to learn about what your business can do to combat and prepare for these growing menaces. We’ll start with some basics of what these attacks are, what they do and what you need to know to be prepared.
Every business today has a different idea of what an Enterprise Business System is and what it does for your business. Hear from leaders who have recently gone thru or are currently going thru transitions in their ERP system. Strategy decisions, RFP process, vendor selection, project management, and ultimately implementation are all very critical steps in a successful project and you can hear what local companies are doing to ensure success for years to come.
No organization should be surprised by the occurrence of a cyber attack; it is no secret that attackers are routinely targeting organizations connected to the Internet. Attackers are slipping through organizational security controls on a regular basis, as a result organizations need to prepare for the inevitable, which is no longer “if” but “when” and “how bad.” Unfortunately, many organizations are not prepared, surprised and struggle to recover form a cyber attack. If an organization is not prepared, minimizing the impact of a security event is not a predetermined outcome. Effective incident response will ensure that an organization can recover from a cyber attack and minimize its impact.
During a cyber attack events move fast and furious, minute-to-minute is chaotic and preparation is paramount. How an organization response to a cyber incident determines the impact and how an organization recovers.
This talk will explore and examine:
- What occurs during a cyber attack?
- What processes are generally followed?
- What happens once the dust settles after an incident?
- Recovery best practices.
- Preparing for the next event.
Any administrator’s goal should be to automate as much as possible; It enforces standards, does away with time consuming repetitive tasks and frees up time for the ever increasing workload. Learn about the tools and methodology that MetaBank uses to automate IT workflows and leverage efficiency gains to scale.
Experts estimate that by 2020 there will be 50 billion devices connected to the internet. The proliferation of the “Internet of things” – the network of connected objects with the ability to communicate and share data with each other-brings both untold benefits to businesses as well as significant security, privacy, and legal risks. Vulnerabilities in some of these internet-connected devices can be exploited to allow hackers to access and misuse personal information, or even cause harm to the device or the device’s user. In this session, we will give you an overview of the emerging legal issues and trends from the “Internet of things.”
Data growth and the management of data is a big concern for organizations meaning your database is critical to your business remaining competitive. This session will share how to deliver superior performance, operational simplicity, and value with a range of models designed for single instance database to full consolidation and high-availability, you can choose the model that best meets your needs. Dawit Bereket will also discuss the Oracle Database Appliance family, delivering application and database performance simply and affordably.
It has been said that there are 50,000 people graduating with Computer Science degrees in the US each year, but the current need is 125,000. Anyone who had tried to hire a Developer or Network Engineer will likely believe this statistic. This panel will discuss new ways to attract and retain people in these high demand technical positions.
Grilled Pork Loin with Dijon Cream Sauce, Grilled Chicken with Sundried Tomato Cream Sauce, Pasta Salad, Mixed Garden Greens with various dressings, Chef’s Choice of Starch, Seasonal Fresh Vegetables, Bakery Fresh Breads and Rolls, Chef’s Exquisite Dessert Display, Coffee, Decaf, and Iced Tea with Lemon
To survive as corporate IT managers, we must get through the next three months, on plan, on budget, with no surprises. Thriving is a different story. Every day the game changes because somebody, somewhere, is inventing the next new thing. As technology managers we must make a choice: survive then die, or adapt and thrive. People are by nature clever and adaptive but our desire for order and control can shut down any human ingenuity. Is there a way to have it both ways at the same time? Steve offers a three dimensional model for surviving, collaborating, and thriving in an era when technology changes come from every direction.
CHR Solutions creates proprietary software that runs the billing and back office applications for telephone carriers as a service. This software runs in an all Microsoft Environment including: Hyper V virtualization, Windows Server, Microsoft SQL server, and is a very database intensive. Our server / storage architecture was not meeting our needs or our client’s expectations. To be successful we need to: speed up application response time, accelerate our database queries, and rethink our AD domain structure all while staying within our budget. This session will discuss how we did it.
After catching a crypto locker 3 times in the course of a year it was clear we needed to find another solution for our antivirus. Over the course of a few months we looked at a number of products and found one product that was truly “golden”. Cylance – the next generation virus and malware detection and prevention solution. During this breakout we’ll review the hardship we endured and the solution that “silenced our end points” and gave us piece of mind knowing we were covered.
While business intelligence and data analytics has gotten a lot of attention to date, less emphasis has been placed building systematic processes around analytics. Often fundamental questions are overlooked: How do we know we’re measuring the right things? Are our dashboards really driving effective decisions? Is our measurement system responsive and agile? IT departments have a strategic role to play in addressing these issues. In this session we will explore ways to develop, deploy, and systematically improve data-driven performance management systems.
In this session, you will learn how modern ransomware works and its Achilles Heel that stops it dead in it's tracks every time. The cherry on top in this session is the dark web section. The dark web is a very interesting and dark place. Learn how it works and why its used by ransomware.
As cloud implementations have become more popular and as the platforms have become more mature, many companies are implementing data storage and applications on them. Traditional security mechanism and processes don’t necessarily just transfer over and there are new things to think about, especially if you are in a highly regulated industry. This panel will discuss how to approach this security paradigm shift from a technical and operational perspective.
The Sanford Health Security leadership team will share their successes and challenges growing and maturing their security program balancing enhancements to processes, staffing, and adopting new technologies.
Agile methods and complementary practices have greatly transformed the software development experience. Scrum, XP, Pair Programming & TDD are a few of the approaches the IT software development teams at Daktronics have incorporated into their SDLC. During this session you'll hear about how these approaches have evolved the way Daktronics IT designs, develops and delivers software solutions for our corporate user community, while simultaneously fostering a team-centric culture holding true to the values of the Agile Manifesto.
Blockchain, or distributed ledgers have been described as the most revolutionary thing since the internet. But it’s not new technology, how can this be so revolutionary? If it is, what should we looking for? How can it be leveraged? What should we be looking for and what is currently happening in this space
With more and more applications moving to a hosted solution and migration to cloud services, managing vendor relationships is becoming a required competency in IT. Relationship management, outsourcing, contracts, service levels, due diligence, 3rd party oversite and risk management are the new skills of the IT manager.
Can a simple act of kindness completely change your life? The story shared by author and speaker V.J. Smith is living proof that it can. V.J. sent a letter to Wal-Mart headquarters extolling the customer service virtues of a kind cashier named Marty. That letter spawned a lasting friendship that changed both their lives. In time, Marty detailed his simple philosophies about relationships, exceeding expectations and identifying the source of true happiness. It is a remarkable and unforgettable story leaving audience members to evaluate how they can improve their personal and working relationships, setting higher standards on taking care of customers and giving deeper thought on what is truly important in life.
Enjoy this complimentary cocktail reception featuring an open bar, hors d’oeuvres and conversation. Make this an important element of your attendance to the Summit. The ability to network and collaborate with your peers in an open and no-hype environment will prove to provide long lasting value to your key business initiatives moving forward.
Event VenueDirections & Information Below
SIOUX FALLS CONVENTION CENTER
1101 N West Ave • Sioux Falls, SD 57104 • ph. 605-367-4100