Welcome to the BrightTALK Summit series. Our summits are a collection of topical webcasts run over the course of one or two days focused on a variety of relevant and timely subjects that matter most to you. They are free to attend. Choose all or specific summit webcasts to attend live or on demand.
Live & upcoming summits
Far from the emerging technologies of 2011 and 2012 Cloud and Virtualization have arrived, allowing the modern IT team to become nimble and efficient at utilizing computing and infrastructure resources to enable their bu..
Today's accepted wisdom is that there are only two types of organizations, those that have been breached and know it and those that have been breached and don't. With this new vision comes the realization that building p..
Threat and risk management is vital for a sound business strategy. Join thought leaders at this summit as they share best practices in managing threats, risk and vulnerabilities that come along with major IT trends in 20..
The ubiquity of mobile devices in the work place is putting the onus on security professionals to not simply think about BYOD and mobile, but to integrate both as keystone parts of their IT security strategies. No matter..
Applications have become paramount in increasing business productivity. They allow us to access a wide range of information from different devices, taking advantage of advanced functionalities such as cloud or mobile ser..
Advanced threats have entered the pantheon of security risk every IT team needs to be prepared for. The volume and velocity of data coupled with the proliferation of devices and the internet of things has create a hercul..
As mobile devices are becoming more and more sophisticated in an era of increased Bring Your Own Device acceptance, securing endpoints is becoming one of the hottest challenges in information security. Vulnerabilities in..
To understand data security is to understand your business, from where sensitive information is stored to how business critical information is accessed and used. To effectively protect this multi-faceted environment IT s..