Feedback from Attendees

Upcoming  2014 Events

Sep 4, 2014
Disaster Recovery/Business Continuity - Resilient Infrastructure
Info

Sep 23, 2014
Cloud Computing Strategies - The Next Generation
Info

Oct 2, 2014
Enterprise Risk/Security Management
Info

Oct 22-23, 2014
IT Portfolio Management
Info

Oct 28, 2014
Enterprise Mobility - Application Development Strategies
Info

Nov 6, 2014
IT Leadership Strategies
Info

Nov 19-20, 2014
IT Service Management
Strategies
Info

Dec 4, 2014
Business Intelligence/Analytics/Big Data Strategies
Info

Upcoming  2015 Events

Feb 5, 2015
Enterprise Risk/Security Management
Info

Feb 26, 2015
Infrastructure/Operations Management
Info

March 5, 2015
IT Leadership Strategies
Info

March 18-19, 2015
IT Portfolio Management
Info

April 2, 2015
Cloud Computing Strategies
Info

April 9, 2015
Disaster Recovery/Business Continuity
Info

May 6-7, 2015
IT Service Management
Info

May 20, 2015
Mobile Application Development
Info

June 9, 2015
Business Intelligence/ Analytics/Big Data Strategies
Info

June 25, 2015
Enterprise Risk/Security Management
Info

July 9, 2015
IT Infrastructure/Operations Management
Info

Sep 10, 2015
Disaster Recovery/Business Continuity
Info

Sep 25, 2015
Cloud Computing Strategies
Info

Oct 1, 2015
Enterprise Risk/Security Management
Info

Oct 14, 2015
Mobile Application Development
Info

Oct 21-22, 2015
IT Portfolio Management
Info

Nov 5, 2015
IT Leadership Strategies
Info

Nov 18-19, 2015
IT Service Management
Info

Dec 3, 2015
Business Intelligence/Big Data/Big Data
Info

 

 

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Enterprise Mobility Strategies - Infrastructure & Architecture

Strategies to help solve today's current mobility challenges

May 1, 2014

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Bios

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

A rapid shift has once again presented itself in the industry. With the advances in smartphones and tablet computing, employees are now even more productive than ever before. However, these advancements have also caused headaches for the IT professionals responsible for managing the mobile environment.

How do you support the mobile workforce while dealing with the challenges of secure access, policy management as well as training and support.

What You Will Learn

In this one day conference attendees will learn:

  • How to Leverage Advances in Mobility for Enterprise Transformation

  • Driving Force Behind IT:  Productivity?  ROI?  No, Subversion!

  • Architecture - Cloud and Mobility: How Cloud is Changing the Way Enterprises Need to View Mobility

  • Personas & User Experience – How to Enable and Empower the Right users with the Right Applications, Devices, and Access at the Right Time

  • Mobile Security Threat Landscape: It's Not Your Father's PC

  • The Always On Enterprise – How to Balance Productivity & Security

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Tocatlian

Milutin

9:00am-10:00am

How to Leverage Advances in Mobility for Enterprise Transformation

Paul Tocatlian, Chief Technologist, Magnet Systems
Vladimir Milutin, Director of Strategy and Innovation, Magnet Systems

As with every disruptive innovation that hit the enterprise in the last two decades, mobile technology is changing the way enterprises engage with customers, transact with partners, and empower their employees. This time around, the transformation is occurring even more precipitously with mobile devices becoming the central computing hub for both our personal and professional lives.

Drawing parallels from the past, it is clear that a new class of technology will emerge and help enterprises fuel this transformation. We will discuss the strategies to consider and the components that will affect your decision.

In this session, we will challenge the enterprise mobility status quo and discuss the new approach for the next generation of mobile apps:

  • Mobile-first strategy: do or die
  • Millennials: the instant gratification generation
  • The Perfect BFF
  • The 6 strands of mobile DNA
  • The black hole of mobile nirvana
  • What’s app…






10:00am -10:30am - Refreshment Break

Koeneman

10:30am-11:30am

Driving Force Behind IT:  Productivity?  ROI?  No, Subversion!

Chris Koeneman, Vice President, Bluesocket Business Group of ADTRAN

We’ve all heard about BYOD but BYOD follows a long history in enterprise IT in which employees always seem to find a way around IT policies.  Understand the motivations and likely actions of your end users and you will be better equipped to handle trends like BYOD, including the security and scale challenges.

In this session attendees will learn:

  • Background on BYOD
  • How subversion has shaped enterprise IT
  • BYOD and MDM
  • BYOD as a scale problem for Wi-Fi
  • How virtualization helps
  • Example






Strong

11:30am-12:30pm

Architecture - Cloud and Mobility: How Cloud is Changing the Way Enterprises Need to View Mobility

Abby Hassel Strong, Senior Product Marketing Manager, Aerohive Networks

Rapid advances in mobile cloud computing are bringing sweeping changes to the way mobile computing and communication services are delivered around the globe. More than an incremental change, mobile cloud computing is expected to radically alter users' working and life styles.. IDC predicts cloud
services spending by companies to reach nearly $108 billion by 2017, up from $47 billion in 2013.

In this session attendees will learn:

  • Current State of Cloud and Mobility Intersections
  • Intersections of Cloud and Mobility on the Horizon
  • How to Design the Architecture
  • Bringing Mobility and Cloud Together
  • How to Work Through Challenges at the Intersection of Cloud & Mobility






12:30pm - 1:30pm Luncheon

Taylor 

1:30pm-2:30pm

Personas & User Experience – How to Enable and Empower the Right users with the Right Applications, Devices, and Access at the Right Time

Traci Taylor, Product Manager – End User Enablement Persona & Community Services, CompuCom

In this session you will learn how a Persona based approach to End User Computing can be used to identify efficiencies while improving user experience

  • Capturing the Voice of the Customer to understand the real business need and challenges
  • The end user does not care about the bits-n-bites but enablement!
  • Operational Analytics and Performance measures and tools to drive value and improvements
  • Consider where the app will be used and who will be using it
  • How to follow standard UI conventions
  • How to design based on the needs of the intended users
  • How to test, test and test





2:30pm - 3:00pm - Refreshment Break

Richter

3:00pm-4:00pm

Mobile Security Threat Landscape: It's Not Your Father's PC

Clark Richter, Director of BD, Lacoon Mobile Security

This interactive session will cover overall trends in the mobile security world and new challenges created by BYOD. What are the risks and threats? Attack vectors for Android and IOS and details on recent specific attacks and vulnerabilities like Heartbleed. Who are these "bad guys" and what are they after. Illustrating how the mobile threat landscape is different than the PC era. Discussion of the technologies available to address mobile security and demonstrations of attacks and "malware" on devices.





Koeneman

Rushing

Rustagi

Parekh

4:00pm-5:00pm

The Always On Enterprise – How to Make Sure Your Mobile Strategy Delivers Stellar Results

Moderator:
Chris Koeneman, Vice President, Bluesocket Business Group of ADTRAN
Panelists:
Richard Rushing, Chief Information Security Officer, Information Protection Services, Motorola Mobility
Purnesh Rustagi, Senior Manager Business Systems, IT, TTX Company
Varun Parekh, Director, Sales Technology & Operations, Bankers Life & Casualty
and other
professionals from IT departments sharing experiences and lessons learned

In this session, attendees will learn how IT practitioners are rethinking policies and practices to better adhere with today’s environment and deliver the results demanded by the enterprise. Panelists will provide attendees with suggestions for increasing productivity while managing security demands.

Topics that will be covered include:

  • BYOD
  • Managing Needs and Demands of Business
  • Balancing Security
  • How to Manage Expectations in the Always-On World
  • How to Use Metrics to Show the Success of the Mobile Strategy

Conference Price: $279.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.