2017 Hot Topics

2017 Hot Topics

Where is your organization going? What are the biggest challenges facing our industry today? These "hot topics" are a snapshot of just that. We have aggregated feedback from industry trends, our advisors and past attendees, to be the guiding force behind what will become the 2017 NY Tech Summit Agenda.

The impact of technology extends well beyond just the hands of the IT department. From cyber-crime to compliance, to vendor management and training, the level of awareness within the entire organization needs to accelerate. The effects and risk of technology are everywhere.

  • Compliance
    • Navigating through HIPAA regulations requires all employees to be educated on the can's and cannot's.
    • Payment Card Industry Data Security Standard compliance (PCI DSS) rules and regulations for processing payments via credit cards.
    • Do you have the right people on staff that can understand regulations so that your company is not in violation of these regulations?
  • Storing information in sites such as Dropbox is a big mistake! Don't underestimate the regulations.
  • Enterprise Document Management: You cannot guard what you cannot classify, identify, quantify, categorize and store properly. We all need to understand the implications of striking a balance between security and access.
  • Replace the "they will pick it up" approach with formalized training programs
  • Proactive strategies for vendor management and how to "herd the cats."
  • How to ensure your vendors are secure (3rd party risks assessments)
  • Performance-based contracts ensure vendors deliver better results by establishing performance metrics
  • Contract management; from creation to enforcement
  • Cyber-crime is the logical next step for organized crime. Stan Stahl said it best, "Like Tony Soprano, there are bosses, but instead of sending out their goons, these guys have their geeks." It is projected that by 2019 cyber-crime will cost the U.S. $2 Trillion. Organizations have to understand, everyone is a target and no one is too small or insignificant are you prepared?
  • Ransomware
    • Traditional "put up a wall" defenses are not sufficient
    • Incident response teams and plans are a must
    • Trickle-down effects on BC/DR plans
    • Ransomware is not going away; it's only getting more lucrative for the bad guys

The "cloud" is no longer a fleeting trend or an elusive buzzword. The concept is here to stay, so now what? What's the right balance for your organization and how do you make sure it's secure?

  • Local, cloud, hybrid... what's the right mix?
  • How to manage your internet bandwidth through the growth of cloud applications
  • Cyber security is a key barrier for organizations moving to the cloud. According to the Cloud Security Spotlight Report, 90% of organizations are very or moderately concerned about public cloud security.
  • How to properly respond to a compliance breach
  • Building an incident response team
  • Assessing support options
  • The effects on storage and data retention
  • Understanding your current utilization (sanctioned and rouge) and your true costs.
  • Monetizing the soft costs in ROI
  • Making it all work together... apps, mobile, etc.
  • Embracing consumer-friendly apps to make the job easier
  • Mitigating email as a file store

In the ever-evolving world of IT, how do we truly navigate it all? New regulations and policies, constantly shifting business conditions, and uncontrollable outside forces can seem like insurmountable feats for any organization. One thing remains true - we're all trying to optimize our businesses and work smarter, not harder.

  • Cybersecurity spans industry lines, and has quickly become the new buzzword in information security.
    • Regulation, with respect to information security (GLBA, HIPAA, PCI, etc.) and/or risk management tactics
    • Incident response, as it relates to breach protocols, notification requirements, best practices and legal guidelines.
    • How to ensure your vendors are secure
  • Functional data analysis models and practices: Many organizations struggle to adequately analyze the data they already possess yet are still focusing on the elusive "big data" dream.
  • Have you tested incident response plans for weakness/failure points?
  • Copper/SIP alternatives for voice services
  • Devices on wireless systems
    • Density, bandwidth, security and compliance implications
    • Managing the growing number of wireless devices within the corporate workplace
    • Meeting the security needs of the mobile workforce
    • Data protection for mobile
  • How can you understand what your users/customers are experiencing in a remote location without physically being there?
  • What's new and interesting in business continuity and disaster recovery? How often are stringent tests done? How comprehensive are they?
  • Regulation is constantly developing and changing the ways we do business. Information security and privacy concerns drive the continuous adoption of new guidelines.
    • PCI DSS, GLBA, and HIPAA
  • What to do as Multiprotocol Label Switching (MPLS) is dying
    • What are your options with MPLS as carriers stop investing?
    • The evolution of broadband has allowed for voice traffic to be traversed over these links
    • Copper/SIP alternatives for voice services

Transformational leadership is defined as a concerted approach that effects change in individuals and social systems. In its ideal form, it creates valuable and positive changes with the end goal of developing followers into leaders. IT can be the catalyst for transformational leadership within your organization.

  • Quality, retention and culture are all inexorably linked to effective and stable staffing models; team members must be engaged and valued, not just paid well or treated as commodities.
  • Adapting organizational culture to meet the needs of the workforce
  • Successful project management is a true collaboration between business units. ALL stakeholders must be involved from the start to ensure success. Too often disconnects develop between expectations and realities because projects are not managed properly.
  • Building relationships between business units and management team members is essential
  • Staffing:
    • The do's and don'ts of finding loyal and professional employees
    • Planning for the talent gap
  • Demand management - Managing the "Hey can ya" moments when IT professionals are stopped in the hallway by users/customers that need help. Are you accounting for these types of requests in your organization?
  • Lessons learned in a data breach
  • How to comply with your regulatory requirements: HIPAA, PCI, FERPA, etc.
  • Performance-based contracts ensure vendors deliver better results by establishing contract performance metrics
  • IT Project Management: As organizations adapt more technical solutions for day-to-day operations, the IT team needs to take on the role of project manager as well.
    • Mitigating technical project management pain points
  • Quantifying the value of IT throughout the organization
  • Education and training are integral to successful user adoption, but tailoring that training to the role of the end user is pivotal
  • Costs, budget and ROI - justifying the spend and setting priorities
  • Striking the balance between security and usability
  • Aligning and optimizing resources for growth
  • Winning the prioritization game

Our Presenting Sponsors




It’s a little different perspective than I’ve gotten from other tradeshows, other organizations, other groups. That’s the part that has made it more interesting.

- MJ
Voice Team Leader