Announcing Taste of IT 2020 Agenda

September 30, 2020

14th Annual Taste of IT Conference

Wednesday, November 18, 2020

V I R T U A L    E V E N T

Conference Details

Sponsorship Opportunities

Our largest conference and trade show of the year!

400+ Participants, 45+ sponsoring companies, and industry knowledgeable speakers for 30+ educational sessions. 
2020 Tracks include ExecutiveSecurityAnalyticsCloud & Collaboration, and Developers.

Keynote Speakers from Microsoft and Gartner

 
EXECUTIVE TRACK
(Half Day with Roundtable Discussions TBA)
The First 48 Hours - Critical Steps during a Data Breach
Shawn Waldman, Secure Cyber Defense
When a company experiences a data breach, the first 48 hours are critical. If a company’s data or systems have been breached, there a number of time sensitive and highly technical questions that must be addressed. Like other crimes, the first 48 hours are critical for gathering and preserving evidence and identifying suspects.  Shawn Waldman, CEO of Secure Cyber Defense outline nine critical incident response steps to take in the first 48 hours of identifying a breach. He’ll also be sharing case studies to show real world examples of breaches and how they were isolated and removed.
 
The Human Cloud - How AI and the Freelance Economy are Transforming Work
Matt Coatney, HBR Consulting
In the coming years, over half of what we call work will be gone, and much of the workforce will be free agents. The convergence of these two trends - intelligent automation and the “gig” economy - has enormous implications for society. On the surface, inequality and polarization will run rampant. Under the surface, new tools and technologies unlock never-before seen opportunities. The Human Cloud provides a window into this future by exploring the technology behind intelligent automation and the gig economy, and how to better organize, create, and distribute value in this new normal.

 

Preparing for the Future of Virtual/Augmented/Mixed Reality
Paul Mealy, Fusion Alliance
Virtual/Augmented/Mixed reality have long been heralded as the coming fourth wave of technology. Promises of fully-immersive virtual 3d environments where we spend all our waking hours in digital worlds working and playing have tantalized the imagination for years. And yet we find ourselves here in 2020, still wondering when the promises of virtual reality and augmented reality will finally pay off. Come to this discussion on what you should watch, what you can ignore, and how you should prepare your organization for the fourth wave of technology experiences.
 
Shifting Culture through Leadership Agility
Aaron Kopel, Project Brilliant, LLC
Most of us understand that becoming Agile is about culture change... but how do we know when we’re there? And by the way, where are we now? and how do we get there? In this fully interactive session we will explore Leadership Agility and the Competing Values Framework culture model, determine where you are now, where you want to be to make progress in your journey, and leave the session with concrete ideas and experiments to take back to your work place to begin the shift. Join us for a NO PowerPoint, fully interactive experience!

 

The Top 5 Strategies of Highly Successful Project Managers
Bryan Hogan, Afidence
A survey recently published in Harvard Business Review found the average IT project overran its budget by 27%. Furthermore, McKinsey reported that software projects have an average cost overrun of 66%. Bottom line: While most IT projects start with high hopes of success, few manage to live-up to those expectations. In this session, we will review the most common points of failure with agile and waterfall projects, and equip participants with the tools and techniques to overcome them.
 
Update on University of Dayton's projects as a OCRI Regional Programming Center
David Salisbury & Rusty Baldwin, University of Dayton Center for Cybersecurity & Data Intelligence
The University of Dayton views cybersecurity in terms of a socio-technical system. Technical controls implemented by IT professionals are necessary but not sufficient to properly secure information systems - how non-technical personnel carry out their duties and secure their own accounts can have a significant impact on cybersecurity. As such, with funding from ODHE, the UD Center for Cybersecurity & Data Intelligence is working on three main thrusts. First, to help develop means to create a job-ready workforce, we are developing metrics and mechanisms to capture individual performance on tasks in a cyber range. The intent is to allow individuals to create a cyber-portfolio of skills that can be presented to prospective employers to demonstrate achievements. Second, we are working on developing a Security Operations Center simulator that can be used to train individuals in how to identify significant events and communicate these to appropriate parties so that the necessary actions to resolve the events may be completed. We believe this sort of work can be an excellent way to bring novices into cybersecurity and gain experience. Third, moving to the social side of cybersecurity, we are continuing our work developing materials about cybermindfulness, to enhance awareness of cybersecurity issues, build a sense of agency that allows individuals to take ownership of cybersecurity, whether in technical or non-technical jobs, and encourage them to be actively involved in helping secure organizational data and systems, whatever their role.
 

 

ANALYTICS TRACK:
AI: Everyone talks about but what does it really mean?
Andy Lawrence, Google
During this session, you will gain a better understanding of what Artificial Intelligence (AI) really means and why it's important to your business. Join us for an introduction to AI and understand the common challenges and use cases and how you can make it work for you. We will also explore the pre-built APIs that Google Cloud offers to make it easy to get started.
 
Agile Analytics framework based on a large CPG company success story
Jan Wenda, Lingaro
Do you struggle to prove the value of analytics in your company? How do you react fast to ever-changing needs? Do you want 5x improvement of your Analytic solutions' time to market? I will share with you an Agile Analytics framework and a journey I went through. Transparent session on what works and what doesn't. Based on practical examples and real-life examples.
 
The Analytics Executive Briefing: From AI to BI to Bots
Geoff Ables, C5 Insight
Get up to speed quickly with Business Intelligence, Artificial Intelligence, Predictive Modeling, Bots and more.   From bots, to the internet of things, to self-driving cars, businesses will transform more in the next 20 years than any other period in history. And analytics will be behind every decision and every interaction.   But as a leader it can be difficult to separate the marketing hype from the strategic implications. This session delivers a jargon-free overview of the potential of analytics, and case studies on how global leaders are creating cultures of analytics.
 
How to Monetize the Data You Already Own
Tim Benedict, Presidio
Data curation is the active and on-going management of data through its Life cycle of interest and usefulness to transformational and modernization activities.
Data management activities are wide-ranging. They include everything from the ability to make consistent decisions about how to get strategic value from data to the technical deployment and performance of databases. Thus data management requires both technical and non-technical (i.e., ‘business’) skills. Responsibility for managing data must be shared between business and information technology roles, and people in both areas must be able to collaborate to ensure an organization has high quality data that meets its strategic needs.
 
Identifying the quick wins in machine learning
John Dages, Fusion Alliance
Machine learning is a transformative technology that empowers you to unlock predictive insights from complex data. Most enterprises have explored machine learning use cases, but many of these nascent ML programs tend to focus on complex, long-term, and expensive solutions. Many technology leaders have yet to see the promised ROIs of these ML initiatives.   In this presentation, we will explore the quick wins of machine learning. We will examine scenarios that lead to meaningful impact, are straightforward to model, and are ubiquitous across multiple industries.
 
Meet Your New Strategist: How AI and Prescriptive Analytics Can Impact How We Make Decisions
Michael Howard & Paul Kostoff, Nichefire, Inc.
From autonomous vehicles to image recognition, AI and machine learning are among the most intriguing topics in data science. But what happens when AI starts answering your most difficult questions? Or, how can modern data science begin recommending options for our most critical decisions? In this presentation, we introduce you to your new "strategist" and show demos of real-world applications for prescriptive analytics powered by AI.
 
SECURITY TRACK:
2020 Data Breach Trends and Mitigation Controls
Michael Manske, Justin Maynard, and Justin Kallhoff, Ascend Technologies
Highlights from Ascend's 2020 Security Operations Center (SOC) threat events and trends report; breach examples around ransomware, email compromise and phishing; How to prepare for attack vectors, challenges, incident response and mitigating controls; How and why advanced technologies enable quicker detection of and response to incidents; What’s coming: 20201 trends to be prepare for; The security landscape is always changing–why security control selection.
 
CMMC Process Maturity Deep Dive and Example
Thomas Autry, Northrop Grumman
DOD is planning to migrate to the new CMMC framework in order to assess and enhance the cybersecurity posture of the Defense Industrial Base (DIB). The goal of this session is to provide a deep dive with an example for process maturity in the Cybersecurity Maturity Model Certification (CMMC). The practices in the CMMC are relatively straightforward to understand while the process maturity is more of a challenge. The session will also include additional information, updates, references and resources for how to implement, assess, and certify to the regulation.
 
Defense against the Virtual Dark Arts
Chris Kuhl, Dayton Children’s Hospital
Targeted Cyberattacks against virtualized environments will become more mainstream as businesses and critical infrastructure grow more reliant on hypervisors. Today's malware can detect and respond differently in virtual environments than non-virtual environments. These Tactics, Techniques and Procedures (TTP) can range from staying dormant to exploiting a vulnerability in the virtual machines and taking over the host machine.
 
IOT SECURITY AND RISK - UNDERSTANDING AND COMMUNICATING THE SECURITY IMPLICATION OF THE INTERNET OF THINGS (IOT)
Deral Heiland, Rapid7
With such a large number of IoT devices connected to our personal and corporate networks and expected to continue to expand at an alarming rate, a strategic and focused effort is crucial to successfully secure today’s IoT-driven world. To help us understand and resolve these issues while embracing these new emerging technologies we will be discussing building a sound understanding of IoT, along with methods for communication, developing policies and building processes around IoT security management.
 
We've Got Your Six: Strategies for Data Protection Across Platforms
Amanda Sutherland, Chip Niemiller, and Craig Ottaviani, Dell Technologies
COVID has changed the way we interact with our employees, colleagues, and customers. The quick adjustment to a work from home dynamic has accelerated adoption of the hybrid cloud for business-critical applications. Data now lives on multiple platforms across the infrastructure causing complexity from traditional data protection to ensure security against outsider attacks. Implementing one data protection solution across an infrastructure will: decrease instances of lost data, offer simple management, and provide an integrated platform for providing business continuity.
 
Why Cybersecurity Is Not an Arms Race
Marc W. Abel, Wakefield Cybersecurity
Cybersecurity is popularly regarded as an arms race, where the wit and intellect of the bad guys are pitted against the watchfulness and teamwork of the good guys. Unfortunately, this mistaken view tips the balance in favor of China, Iran, North Korea, and Russia. The knowledge exists for the U.S. to win right now, but the information security industry doesn’t like the idea. Neither does the rest of the computing industry, for that matter. The status quo guarantees a permanent stream of new sales to “keep up” with the bad guys. Are we ready to let those sales lag in exchange for real security?
 
CLOUD & COLLABORATION TRACK:
Accelerating to the Cloud with Automation
Sean McShay, The Kroger Company
How to move from your datacenter to leveraging the cloud that brings business value and is safe. The key for our transformation has been automation and secure patterns to drive speed and innovation.
 
A Dayton Roadmap: Fiber Expansion, Smart City and other applications for Economic Development
John Putnam & Ellen Miller, Cincinnati Bell
This session will explore how a fiber infrastructure can be used to drive Economic Development. We’ll also explore Public Wi-Fi, the foundation of a smart city. More than just the provision of high speed internet, an intelligent Wi-Fi network can provide a platform for communication, branding, placemaking, and public engagement. Cities and economic development practitioners can use the data from the Intelligent Wi-Fi network to study the impact of events, provide information for business attraction and retention, and drive decision making.
 
How to Prepare for the Future of Multi-Cloud
AJ Kuftic, Expedient
The reality of adopting and preparing for multi-cloud initiatives is far more complex than a simple “lift and shift”. Aligning cloud vision between different lines of business all play a part in facilitating successful multi-cloud initiatives. This presentation covers: Hybrid vs. multi-cloud design considerations; Discovering your cloud-native journey; How to manage executive/leadership buy-in; Technology: rehost, re-platform, or re-architect.
 
Is Good Enough good enough? Obtaining Governance and Operational Excellence in Azure
Andrea Waugh Metzger, Microsoft
You have detailed tools and models for your on-prem infrastructure for governance, operations, security, etc. Do you have those practices outlined for your cloud platform(s)? How do you create cloud governance and operational models that are "good enough" without compromising security or more? We'll talk about how to start with an MVP (Minimally Viable Product) to create a cloud foundation – regardless of cloud platform. Then, we'll showcase some of the tools and capabilities built into Azure to help you get started without compromising what's important to your organization.
 
Journey to the Cloud - Where to start and where to end up
Brant Comstock, Google
The customer focus on digital transformation centers on the need to balance between flexibility, security, cost, and speed. Public cloud is increasingly integral to that business imperative, spanning choices ranging from hybrid cloud to“all-in” single cloud and even multicloud optimizations. Cloud could change everything - or it can just simply reduce cost and make things a bit faster. Ultimately, the journey you go on to get to the cloud will be shaped by how ambitious your objectives are. We will walk thru the life cycle of the cloud journey - infrastructure to future state analytics.
 
Microsoft Teams’ Direct Routing Opens Door to UCaaS and CPaaS
Nick Enger & Louie Hollmeyer, Advanced Technology Consulting (ATC)
As more IT leaders pick Microsoft Teams as their collaboration application, they are quickly running into challenges implementing a complementary, robust voice solution. Until now, third-party telephony solutions for Teams have been clunky and often complex. Recently, Microsoft opened the ‘Voice’ portion of the Teams app, allowing UCaaS providers to integrate directly with the Teams’ platform. This move by Microsoft completely changes the paradigm and sets a new bar for voice integration with Teams. Learn about Microsoft Teams for voice and how cloud-to-cloud integration changes the landscape.
 
DEVELOPERS TRACK:
Application Modernization with Google Anthos
Andy Lawrence & Brant Comstock, Google
Enterprises don’t just want to just move their applications from point A to point B, they want to modernize their applications with cloudnative technologies and techniques, wherever those applications may be. Most enterprises work with multiple clouds, each with their own proprietary management approach which creates a strain on precious talent and adds cost. Anthos is the first modern application modernization platform that provides a consistent development and operations experience across different environments - multiple clouds, on-prem & edge.
 
Automate your workflow with the GitLab CICD pipeline
Rebecca Servaites, University of Dayton Research Institute (UDRI)
This session will explore the benefits of Continuous Integration/Continuous Deployment (CICD) using the GitLab CICD pipeline and how you can easily integrate it into a project. Tired of code reviews, excessive labor, and code inconsistencies? CICD may be for you!! UDRI/ACT3 will describe and demonstrate, on a small Python project, how the GitLab pipeline can help deliver software to a production environment with speed, safety, and reliability.
 
Building a Data Lakehouse in Azure at Kroger Scale
Anderson Muse & Brandon Bird, The Kroger Company
The team explores the challenge in front of Kroger, managing and democratizing data assets and analytics capabilities at massive scale in a time of transformational change in the industry. Leveraging modern techniques like DevOps with native services provided in Azure, the team designed and implemented a platform to enable data consumers and producers of varying skillsets across the enterprise. The current needs were clear but the foundation was established with the future in mind – expansive ML and AI capabilities that will change the way we ask and answer questions.
 
How Poor Usability is Costing You Money and Clients
Jerritte Couture, Edge Webware
Jerritte Couture of Edge Webware will be discussing Human Factors Psychology as it relates to the usability of web and mobile interfaces. He will explain why it is crucial to understand the overlap between human cognition and human-computer interaction when designing interfaces. + After attending this presentation, you will have a better understanding of why it is vital to correct usability issues with your interfaces and why the appropriate solutions are backed by scientific research.

 

Quick and Beautiful Apps in Angular
Rodney Kendall, Smart Data
This presentation will take the audience through all the necessary steps from installing Angular all the way through the creation of a remarkably stylish new app. We will talk about the commandline interface (CLI), along with the merits of the material interface design, services, and the use of public APIs to make useful and great looking apps quickly and easily.
 
Robotic Process Automation - Creating a Center of Excellence around RPA for your business
Will Fothergill, RoundTower
By 2024, Organizations will lower operational costs by 30% by combining hyper-automation technologies with redesigned operational processes” (Source: Gartner). A well-defined RPA center of excellence consisting of business analysis and software developers will help you reach this target faster. This presentation will outline the roles and responsibilities, ROI framework, process evaluation techniques, and business metrics needed to quickly define and ramp-up an RPA Center of Excellence. This presentation is the first step in a new automation partnership between IT and core business processes.

 

 

© Technology First 2020. All rights reserved.