News and Events

Events

Upcoming Events

Event Logo

Infosecurity Europe

Date: June 2-4, 2015
Location: Olympia, London, UK
Booth: #F226


Infosecurity is Europe’s leading free-to-attend information security conference and exhibition, serving as a focal point for the industry and providing a showcase for the latest technology, service solutions and educational programs. The theme for Infosecurity Europe 2015 this year is: Intelligent security: Protect. Detect. Respond. Recover.
Presentation: The Software Defined Perimeter: Creating an Invisible Infrastructure - Technology Showcase - 14.00-14.25 Thursday June 4.

Event Logo

Web Conference at Penn State

Date: June 22-23, 2015
Location: State College, Pennsylvania USA


Session:
Title: Designing for Web Accessibility, Ken Nakata
Date: Tuesday, June 23, 2015
Time: 3:45pm - 4:35pm

For more information go to: Web Conference at Penn State

Event Logo

SharePoint Saturday London 2015

Date: July 11, 2015
Location: Imperial College, London, United Kingdom
Gold Sponsor


SharePoint administrators, end users, architects, developers, and other professionals that work with SharePoint Technologies will meet for the 1st SharePoint Saturday London event.

Session - Advanced enterprise content management and classification in SharePoint on-premises and Office 365
Speaker - Chris McNulty MVP, CTO, Cryptzone | Level: 200 | Track: IT Pro, End-User

Event Logo

SPTechCon Boston

Location: Boston, Massachusetts USA

Date: August 24-27, 2015


Event Logo

European SharePoint Conference 2015

Date: November 9-12, 2015
Location: Stockholmsmässan, Stockholm, Sweden


Attend ESPC 2015 for a comprehensive breakdown of the latest innovations in SharePoint and Office 365 technologies including the inside scoop on SharePoint 2016 and Office 365 Next Gen Portals, as well as practical, actionable advice on how to leverage SharePoint 2013.


Conference Sessions with Chris McNulty, MVP, CTO at Cryptzone


SharePoint 2013/Office 365 Admin MasterClass (ITPRO Level 400)
Monday November 9: Pre-Conference Tutorial

Cloudbreaking – Business Intelligence Engineering for SharePoint 2013 and Office 365 (Level 300)
Tuesday November 11 - 15:15

Double Up! – Migrating to SharePoint on Azure and Office 365 (Level 300)
Wednesday November 11 - 15:15

Upcoming Webinars

EMEA Webinar: Protect Your Network From Privileged User Attacks

Thu May 28 2015 10:00 AM EST

Cyber defenses fall apart the moment an attacker penetrates the outer perimeter whether the attacker is connecting to a high-level work environment or gaining access to mission-critical underlying infrastructure via a privileged user’s account. Traditional cyber protection models are clearly failing. If you think that better credential management is the answer, Think Again.


In order to meet this challenge, many organizations need to adopt a Zero Trust approach that involves implementing a user-centric, role-based architecture that enforces strict access controls and minimal privileges without preventing employees from using a variety of devices and work practices.

During this webinar you'll learn:

  • How to apply a Zero Trust Strategy
  • How to make non-authorized network resources invisible to cyber criminals
  • Solutions to protect your business

Register To Attend The Webinar


Americas Webinar: Protect Your Network From Privileged User Attacks

Thu May 28 2015 1:00 PM EST

Cyber defenses fall apart the moment an attacker penetrates the outer perimeter whether the attacker is connecting to a high-level work environment or gaining access to mission-critical underlying infrastructure via a privileged user’s account. Traditional cyber protection models are clearly failing. If you think that better credential management is the answer, Think Again.


In order to meet this challenge, many organizations need to adopt a Zero Trust approach that involves implementing a user-centric, role-based architecture that enforces strict access controls and minimal privileges without preventing employees from using a variety of devices and work practices.

During this webinar you'll learn:

  • How to apply a Zero Trust Strategy
  • How to make non-authorized network resources invisible to cyber criminals
  • Solutions to protect your business

Register To Attend The Webinar