Feedback from Attendees

Upcoming  2017 Events

July 12, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 7, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 19, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 4, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 18, 2017
IT Leadership Strategies
Info
Chicago, IL

Oct. 26, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

Upcoming  2018 Events

Feb. 1, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 20, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Mar. 1, 2018
IT Leadership Strategies
Info
Chicago, IL

Mar. 7, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

April 12, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

May 2, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 15, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

May 31, 2018
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 7, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

June 20-21, 2018
IT PMO/Portfolio Management
Info
Chicago, IL

July 11, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 6, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 18, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 3, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 17, 2018
IT Leadership Strategies
Info
Chicago, IL

Oct. 25, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2018
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 14, 2018
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 29, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 6, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Application Development Strategies

Designing & Implementing a Business Driven ArchitectureBusiness Intelligence / Performance Management Strategies

May 22, 2008

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

   

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

This one day conference will help attendees with a defining and implementing a business value framework to determine what applications to build, how to build them and what tools and technologies should be considered along the way.

What You Will Learn

In this one day conference attendees will learn:

  • An understanding the role that Application Development plays in IT Governance
  • How to prioritize projects on defined business value to the organization
  • How to work through the top issues that face the Application Development Professional including
  • Application Strategy, Application Development Strategy and Application Development Technology Strategy
  • How to build next generation applications with SOA and Web 2.0 Technologies
  • How to achieve predictability and consistency through software development
  • How to execute a successful application development project and articulate the results to management
  • Strategies for translating business requirements into technical and functional requirements
  • Using Business Process Analysis to identify the major boundaries and business value of your project
  • Strategies for application performance management
  • Strategies for effective application testing
  • How to work through development process management
  • Accurately defining requirements ManagementHow to design an effective BI/PM framework

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Siska

9:00am-10:00am

Trends in Application Development and the Impact on the Business

Juraj Siska, Vice President, Software Business Unit, Laurus Technologies

Companies deploying new applications and software-based systems must now carefully consider how those systems will impact of two often overlooked and seemingly unrelated topics: Protection from cyber-based attacks on corporate IT systems and new laws and regulatory requirements surrounding compliance and privacy.

As cyber-attacks have increased nearly 900% since 2005, changes to the application mix within the enterprise can often impact the overall security strategy. Often new applications inadvertently introduce security risks who not only affect the company’s operations, but may also subject them to unnecessary legal risk due to non-compliance with laws and regulations.

When deploying new applications, IT professionals require systemic approach to the design, development and adaption of new applications, which take threats and vulnerabilities into account

In this session, the audience will learn the following

Common threats and vulnerabilities in the modern IT environment
Impact of regulatory and compliance efforts on application development. In particular

  • Regulatory reporting requirements
  • Audit trail
  • Access request and approval
  • Risk based approach to authorization
  • Continuous monitoring and testing

10:00am -10:30am - Refreshment Break

Deary

10:30am-11:30am

IT Leadership in Application Development – Are You Really Managing to the Right Criteria?

Allen Deary, VP, OPD Services, Sierra Atlantic

One of the main factors in moving forward with a successful application development process is that of leadership. But how do you define leadership in this context? What are the traits of a successful leader? How do you measure success in leadership?

In this session attendees will learn a plan to handle the following:

  • How to determine if you are really managing to the right criteria for success
  • How to train and mentor technical leads
  • The importance of the human factor attitudes towards behavior and strength
  • How to not turn off your best players
  • Development methodologies
  • Staying on target with dates and budget

Zimmerman

11:30am-12:30pm

The Business Value of a Predictable Software Delivery Process

Bob Zimmerman, Vice President Service Delivery, Geneca

The single most important success factor for IT is to deliver business value. Unquestionably, this ability goes hand-in-hand with a predictable delivery process.

Even the most challenging custom solutions can be brought to market predictably, quickly and without risk. This session will help you discover how your business can reap the benefits of predictability when failure is not an option. Topics we will cover:

  • Why some initiatives fail while others are surprisingly successful
  • How to assess the resiliency of your execution team to events beyond their control
  • Why one approach to product and project management can never succeed for all initiatives
  • The five most commonly overlooked planning issues that result in brittle projects
  • How to quickly get the business and IT on the same side of the table

    Get ready for the latest thinking on practices that raise the bar on the reliability of custom software development.

12:30pm - 1:30pm Luncheon

Johnston

1:30pm-2:30pm

Measurements that Matter: Implementing Software Quality in Application Development

Mary Johnston, Director, Business Systems, HSBC

Good decisions rely on accurate information. Without knowing where the greatest risks to critical applications lie, decisions can only be made based on “best guess” analysis. Metrics are needed to analyze and track the quality of IT environments, guiding development and supporting resource allocation.

In this session attendees will learn:

  • The value of implementing an assessment process that includes concrete quality metrics.
  • How to use Technical Quality metrics to improve performance across the software development lifecycle.
  • How executives can use the metrics to better manage their development teams, whether outsourced, internal, or both.
  • How HSBC successfully used these metrics to reduce their application development and production risks.

2:30pm - 3:00pm - Refreshment Break

Sturgeon

3:00pm-4:00pm

Strategies for Achieving User Trust and High Adoption Rates

Victor Sturgeon, Senior Consultant, HALOCK Security Labs

The success of any application development project can be measured by the level of user adoption. Ensuring that success requires more and more focus on ensuring that users trust you and your applications. Protecting user data safeguards not only your organization, but it promotes higher adoptions rates by protecting your users’ most important assets; their private information.

In this session attendees will hear:

  • Common mistakes in application development
  • Why these mistakes are made
  • Attacks and Breaches
  • The cost of securing and not securing your applications
  • Tools for short-term and long-term app security

    Don’t ignore security or underestimate the trust that your users put into your systems.

Ulrich

Mech

Speller

Ghauri

Drucker

4:00pm-5:00pm

How to Best Understand the Application Needs of the Business (panel discussion)

Moderator: Doug Ulrich, Regional Manager, Micro Focus
Panelists: John Mech, Vice President of Applications, Oce North America,
Ken Speller, Associate Director, Clearing Technology, CME Group
Faisal Ghauri, Sr. Manager, Enterprise Wide Applications-ASG, Sara Lee Information Center of Excellence (SLICE),
Steve Drucker, Manager, Global Business Systems, Fellowes, Inc.

In this session attendees will learn from a group of seasoned IT application development leaders.

Topics that will be covered include:

  • How to strengthen relationships with the business to insure applications are meeting the exact business requirements
  • How the applications have helped moved the business forward in terms of increased revenue, decreased costs, increased customer satisfaction
  • How companies have gained competitive advantages
  • Pitfalls to avoid when working with the business

Conference price: $249 per person.


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)˛, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.