Sample IT Event Transcripts

NOREX produces Executive Summaries / transcripts for all IT conference Roundtable 55 event discussions. To download examples from the below both live and virtual IT conferences, click on any title.

Thinking of joining one of our information technology discussions? We offer a robust IT events calendar all year and for those interested in joining or non-vendor membership, we also provide a complementary guest pass so you can see first hand how our IT conferences benefit not just the employee but the their organization as a whole.

Downloadable IT Transcripts

 

Cybersecurity Frameworks (MP001)
This Member Presentation describes a cybersecurity framework as an essential tool that helps organizations to better manage, improve, and maintain their cybersecurity systems.

Data Governance (NV2561)
Executive buy-in; challenges; KPIs; defining data governance; organizational support; data retention; involving business units; how to get started; starting with change management; tools; MS Purview; defining roles and responsibilities; and initial steps to establish data governance.

Disaster Recovery / Business Continuity (NV2551)
Homegrown system vs purchased software / service for DR planning; maintaining a dynamic DR plan; use of the Cloud in DR / BC strategies; documenting system recovery; cybersecurity considerations; Dell Cyber Vault and Veeam; Halcyon and Morphisec; climate change and DR planning; and Nutanix AHV vs VMware.

Document Management (NV2550)
SharePoint alternatives; OneDrive; MS Power Apps; ChatGPT and Copilot; Cloud options; sending files externally; integrating an
in-house ChatGPT; end user documentation; Azure DevOps; incorporating updates into multiple documents; monitoring document access; tracking document changes; and long-term file preservation.

Enterprise Architecture (NV2549)
The role of EA; usage of TOGAF; multiple requests from the enterprise; involving business stakeholders; EA services; architects needed; EA investment; organizational development; staffing models; support tools; Cloud considerations; and project architecture.

Help Desk / Service Desk (NV2559)
Trends; self-service tools; staff burnout; workload management; metrics; SLAs; password change procedures; SharePoint usage: and integrating with CMDB.

IT Asset Management (NV2553)
Assets that should be tracked: tracking by dollar amount; office supply vs IT asset; assets not normally tracked; issues with asset recovery from terminated employees; tracking tools; equipment return documentation; creating an asset database; asset auditing; CMDB integration; cleaning up data; asset management software; Jira usage; Lansweeper usage; Cloud vs on-prem; and HP warranty issues.

Mergers & Acquisitions (NV2554)
Due diligence considerations; early IT involvement; day-one integration; standard initial assessment questions; third-party for M&A workload; cybersecurity vetting and risk assessments; standardizing infrastructure; timelines; and website domains.

Microsoft Teams Room (NV2548)
Teams Rooms usage and licensing; MTR pricing; transitioning from other platforms; Webex to Teams Rooms; Teams on Windows vs Android; domain vs no-domain join; remote hardware support; general MTR support; hardware recommendations; security considerations; room scheduling; Microsoft Places usage; and reading room hardware.

Mobile Device Security (NV2544)
The role Mobile Device Management plays in enhancing security; managing security for mobile applications; using Intune for the MDM and MAM solution; balancing security with user experience; threat detection and response for mobile devices; BYOD vs company-owned devices in an organization; handling security of phones; the level of support offered for BYOD devices; and the lifecycle of mobile devices.

Network Management (NV2555)
Starting a network; managing a network in house vs outsourcing; tools used to monitor server resources; tools to narrow network issues; AI or machine learning for monitoring and troubleshooting; managing connectivity and security in hybrid network environments; and established endpoint protection / device management.

Patch Management (NS264)
Staffing the patching team; best practices for a monthly patching cycle; patching different operating systems; automation and use of Intune vs other tools; remediation; controlled patching; the IOT / OT divide; and metrics and reporting.

Privileged Access Management (NV2552)
Systems that require privileged access; risks associated with PAM implementation; challenges with managing privileged access; the right PAM solution to strengthen security posture; replacing BeyondTrust; logging / reporting requirements to meet regulatory standards; training for users and administrators; and evaluating and improving the PAM system.

Project & Portfolio Management (NV2533)
What constitutes a project: project prioritization; implementing stage gates; organizational visibility; communication tools; transitioning to a program management approach; PPM tools; reporting capability; managing “human capital”; time tracking; budgeting; and using project contractors.

Value of an Incident Response Plan (MP002)
This Member Presentation was given by an IT Project Manager with over 39 years of experience in IT positions, including Developer, Applications Manager, Project Manager, Consultant, and IT Director. He discusses lessons learned as his org recovers from a RansomHub threat actor attack.