Welcome to the BrightTALK Summit series. Our summits are a collection of topical webcasts run over the course of one or two days focused on a variety of relevant and timely subjects that matter most to you. They are free to attend. Choose all or specific summit webcasts to attend live or on demand.
Live & upcoming summits
Far from the emerging technologies of 2011 and 2012 Cloud and Virtualization have arrived, allowing the modern IT team to become nimble and efficient at utilizing computing and infrastructure resources to enable their bu..
There is little debate that cloud is becoming main stream, driving agility and a competitive advantage. But adopting and realizing the optimal benefits for your organization can be overwhelming. Join your peers in lear..
Cyber-attacks are increasing at an exceptional rate – From DDOS attacks by “Hacktivists” groups to individual phishing attacks and state-sponsored cyber-espionage, the threat landscape has never been so fierce. As ..
Threat and risk management is vital for a sound business strategy. Join thought leaders at this summit as they share best practices in managing threats, risk and vulnerabilities that come along with major IT trends in 20..
Applications have become paramount in increasing business productivity. They allow us to access a wide range of information from different devices, taking advantage of advanced functionalities such as cloud or mobile ser..
Software assurance and software security skills are in demand in industry and government these days. However, consistent models for the competencies needed in these areas are just now being developed. This summit will ..
Cloud computing and virtualization technologies have the potential to create an efficient, scalable and robust IT infrastructure, but only when they are implemented correctly. This isn’t as simple as it seems and the s..
As mobile devices are becoming more and more sophisticated in an era of increased Bring Your Own Device acceptance, securing endpoints is becoming one of the hottest challenges in information security. Vulnerabilities in..