How can your business deliver more with less while transforming your digital environment? How can you implement and manage security without affecting your mobility and flexibility? How can everyone stay operational during periods of transformation or business interruption?
Epic Technology Expo explored these challenging questions and the current trends facing every company: Big data, data analytics, IoT, security architecture, cloud-connected solutions, operational and capital efficiencies. Pulling all this together at the April 25th event, keynote speakers took the stage to address the strategic activities companies can take to offer seamless support for day-to-day operations, business recovery and continuity planning.
Here’s a look at some of the trending stories that led up to this key tech event, and the topics that are hitting the priority lists of ICT experts and leaders across the globe.
Q: Why is digital transformation such a hot topic in the tech & IT world? A: Digital transformation is not technology transformation, it is people transformation. Rather than talking about the trends themselves, the approach should be to identify the exponential changes that technology can bring about to your business.
Get an advance preview from Greg Verdino, digital transformation expert and keynote speaker at the 2018 Epic Technology Expo.
Cybercrime is a business, and cybercriminals need to make their operation as profitable and efficient as possible, so they follow the path of least resistance. Traditionally, cybercrime used to be bank trojans — stealing bank accounts and doing wire transfers. That still happens but it was the main thing 10 to 15 years ago. … Probably the most current are swarm networks, which you can think of as black hat artificial intelligence (AI).
As the Global Security Strategist for cybersecurity software provider and industry leader Fortinet, Derek Manky collaborates with business leaders, government authorities, international security networks, Fortune 500 CSOs and CISOs, plus other stakeholders to create innovative cybersecurity solutions and advance collaborative global threat mitigation efforts.
Learn how you can safeguard your business data against rising cyber threats, and hear from this expert who’s helping lead the charge.
You’ve likely watched a TV show or movie lately where a cybercriminal hacks into a driverless car or breaks into a home via the baby monitor — but this isn’t just the stuff of movies. The pervasiveness of smart ‘things’ poses a serious security threat at home and in the workplace.
Thanks to the Internet of Things (IoT), more devices are being connected to the network than ever before. But your network was designed for computers and mobile devices — not coffee machines and thermostats. And you probably haven’t given much thought to securing your coffee machine or thermostat. But you should.
“When you talk to pretty much any technology professional and many businesspeople, cybersecurity is that one thing that’s really top of mind, whether they’ve been a victim of attacks, or know people who have and are trying to better protect their organizations.”
See highlights from the 2017 Epic Technology Expo, and get a sample of conversations to come at this year’s event.
The stats are in…
According to a recent survey, only 40 per cent of IT leaders expect IT budgets to increase in 2018, compared with 49 per cent of respondents one-year prior. Instead, 44 per cent expect budgets to remain consistent, while 16 per cent are hoping to spend less on IT in 2018 than they did in 2017.
While overall budgets won’t see much growth, 58 per cent intend to increase overall IT staff budgets in 2018, up from 36 per cent in 2017, and only two per cent anticipate a decrease.
So if not from staffing budgets, where will the cuts come from? The survey’s results suggest they’ll be taken from the top.
Pixar almost lost the movie Toy Story 2 because of failed backups. Stress-inducing situations like this can actually still occur. Thankfully for Pixar and movie lovers, an employee had saved a third copy of the film offsite on her home computer, and countless hours of work was rescued.
While most businesses have some form of backup — usually tape, USB or disk drives — there is an easier and more efficient way — true automated offsite backup. And that means following the 3-2-1 rule.
Many people would rather get a root canal than dig into the fundamentals of good cybersecurity practice for their business.
I feel your pain. As a former Silicon Valley startup CEO and serial Chief Information Security Officer for companies like Microsoft, AT&T Wireless and Russell Investments, cybersecurity has been top of mind throughout my entire career.
As leaders of small and medium enterprises, it’s critical that you have information you can use to protect your business, the customer data that is entrusted to you and your company’s reputation.