20

Sep

2018

Data Connectors – Atlanta

Author: Event Admin

Date of Event: September 20, 2018 Where:InterContinental Buckhead Atlanta 3315 Peachtree Road NE Atlanta, Georgia 30326 United States Time:8:00AM – 5:00PM

The Atlanta Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more.

Technology Integration Group will be presenting from 4:15AM-4:45AM during Session Eleven.

Topic: VMware on AWS and Shared-Security in the Cloud

Session Summary: VMware Cloud on AWS is an integrated cloud offering jointly developed by AWS and VMware delivering a highly scalable, secure and innovative service that allows organizations to seamlessly migrate and extend their on-premises VMware vSphere-based environments to the AWS Cloud running on next-generation Amazon Elastic Compute Cloud (Amazon EC2) bare metal infrastructure. This session will look at the benefits of this cloud offering, as well as, the joint-security responsibilities of AWS and the customer.

Chad Martin, Director (VSS Practice - East) Technology Integration Group 1750 Corporate Drive, Suite 730 Norcross, Georgia 30093 Chad.Martin@tig.com 678-462-1158 (mobile)

Presentation Info:

Chad Martin, Director (VSS- Virtualization, Server, Storage and Cloud)

Chad Martin has 20 years of overall professional IT experience within the Health Care, Governmental (DoD), Educational and Commercial industries. He has proven leadership abilities and outstanding organizational skills, as well as, an excellent record of exceeding all performance goals. Chad is a dedicated, highly accomplished and motivated Solutions Architect with proven track record of rapport-building, resourceful problem-solving and communication skills. Strong emphasis on integration and security of production systems and networks.

By holding multiple certifications across various technical disciplines, Chad is able to effectively integrate, design, market and deliver the latest technologies and service techniques. These technologies range from VDI (Virtual Desktop Infrastructures), HCI (Hyper-Converged Infrastructure) traditional storage solutions and CSPs (Cloud Service Providers). With his breadth of technology exposure and overall experience Martin plays an integral part in both Pre- and Post-Sale customer engagements.

Comments (0)
Number of views (1866)

13

Sep

2018

Data Connectors – San Francisco

Author: Event Admin

Date of Event: September 13, 2018 Where: InterContinental Mark Hopkins San Francisco 999 California Street San Francisco, 94108 Time:8:00AM – 5:00PM

The San Francisco Bay Area Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.

Technology Integration Group will be presenting from 10:15AM-10:45AM during Session Three.

Comments (0)
Number of views (1556)

30

Jul

2018

FLGISA Annual Summer Conference 2018

Author: Event Admin

Date of Event: July 30 – August 2, 2018
Where: Boca Raton Resort & Club
501 E Camino Real
Boca Raton, FL 33432
Time: All Day Event

The Florida Local Government Information Systems Association invites you to join us for 2018 Annual Conference at the Boca Raton Resort & Club on July 30-August 2, 2018. The conference is open to all local government employees and technology professionals that want to learn more about technology.

“Are You Ready to Make IT Happen” is the theme this year and the event committee has been working to develop a dynamic conference agenda with exciting speakers that will provide quality education for everyone. Not only will you be exposed to an exciting lineup of educational sessions and speakers; there will be plenty of opportunities to network with your peers.

Comments (0)
Number of views (1864)

11

Jul

2018

GAMEIS Conference 2018

Author: Event Admin

Date of Event: July 11 – July 13, 2018
Where: Savannah Convention Center
1 International Dr
Savannah, GA 31421
Time:All Day Event

The Georgia Association for the Management of Educational Information Systems (GAMEIS) is the only education-based state-wide IT-oriented organization of its kind in Georgia. As the use of technology in Georgia’s public school systems has grown, so have the organization’s membership and its role. Today, attendees from school systems around the State, of varying sizes and levels of complexity, regularly attend our annual conference.

The membership of GAMEIS is made up of Information Technology professionals and Instructional Technology professionals from school districts and private schools throughout Georgia and beyond. These attendees look to GAMEIS to provide a source of information regarding emerging issues in the arena of information technology. They also see GAMEIS as a forum for the exchange of ideas and solutions among their peers around the State.

Comments (0)
Number of views (2955)

26

Jun

2018

Security On-Demand Webinar & Lunch and Learn

Author: Event Admin

Date of Event: June 26, 2018
Where: TIG Corporate Headquarters
10240 Flanders Court
San Diego, CA 92121
Time:11:00am – 1:00pm PST

ARE YOU IN FRONT OF DAILY SECURITY BREACHES TO PROTECT YOUR COMPANY'S DATA? ATTEND THIS WEBINAR TO GET VALUBLE INSIGHT ON CURRENT VULNERABILITIES.

Technology Integration Group (TIG), in partnership with Security On-Demand, is hosting an educational session for IT professionals to learn more about protecting your organizations data.

In this presentation, Edward Snowden's former manager, Steven Bay, will share his experience from that event and discuss lessons learned about defending data and strengthening cyber security. Steven will be joined by Perry Jurancich, Cybersecurity Solutions Architect at TIG.

WHAT YOU WILL LEARN

  • Indicators of a malicious insider -- Edward Snowden as use case
  • Types of prevention controls you can implement
  • Key security policies and procedures for enforcement 
  • Technologies you can deploy to prevent data exfiltration
Comments (0)
Number of views (1179)
RSS
12345