Welcome to the BrightTALK Summit series. Our summits are a collection of topical webcasts run over the course of one or two days focused on a variety of relevant and timely subjects that matter most to you. They are free to attend. Choose all or specific summit webcasts to attend live or on demand.
Live & upcoming summits
Far from the emerging technologies of 2011 and 2012 Cloud and Virtualization have arrived, allowing the modern IT team to become nimble and efficient at utilizing computing and infrastructure resources to enable their bu..
Today's accepted wisdom is that there are only two types of organizations, those that have been breached and know it and those that have been breached and don't. With this new vision comes the realization that building p..
Cloud computing and virtualization technologies have the potential to create an efficient, scalable and robust IT infrastructure, but only when they are implemented correctly. This isn’t as simple as it seems and the s..
As mobile devices are becoming more and more sophisticated in an era of increased Bring Your Own Device acceptance, securing endpoints is becoming one of the hottest challenges in information security. Vulnerabilities in..
In the haze between satisfying compliance requirements and securing one's IT systems, organizations usually focus on compliance over security. However, compliance does not result in security. From data breaches to hacks,..
To understand data security is to understand your business, from where sensitive information is stored to how business critical information is accessed and used. To effectively protect this multi-faceted environment IT s..