The cloud is the new data & analytics platform. Cloud offers a diversity of choice, but that amounts to increased complexity. Data & analytics leaders must address various gaps while pursuing their D&A cloud modernization journey. However, to minimize cloud complexities, data and analytics leaders must update early data engineering practices to lay the right foundation for how data & analytics applications are built, managed and operated in the cloud. They must establish a strong cloud data management strategy and approach that can minimize human effort, delays and operational costs. Join this complementary data & analytics webinar to explore the state of the data & analytics platforms, and the transition to cloud and its implications.
- Identify gaps in operations, skills and tech as you pursue your cloud modernization journey
- Prepare for key data & analytics challenges for transitioning to cloud
- Explore benefits of operating successfully in the cloud or in multiple clouds
Return to this web page to watch this webinar. Contact us at gartnerwebinars@gartner.com with questions about viewing this webinar.
Hosted by
Robert Thanaraj
Director Analyst
Summary
Boost your team’s productivity and create a premium product offering through our FREE 40-min webinar on Tableau. Data analytics enables teams to make better decisions and help analyze customer trends and satisfaction, which can result in new and enhanced products and services.
Join this webinar delivered by our certified instructor and get step-by-step guidance to using data visualization for better product offering and decision making. Learners will also gain foundational knowledge on setting up analytics as service architecture and utilizing the Tableau blueprint for navigation, deployment, and rollout.
- Analytics as Service to Create Premium Product Offering
- Setting up Analytics as Service Architecture
- Enterprise-Grade Security
- Tableau Blueprint for Navigate, Deployment, and Rollout
- Q&A with Speaker
Speakers
Deepak Lakhotia
Deepak is MCT, MCSE & Power BI Specialist. Provided BI solutions, proof of concept on a few BI capabilities working with various clients on-site and off-site. The major part of the responsibility included creating ETL solutions and reports using Power BI for user groups at different levels of an organization. Create Power BI dashboards to track major KPIs and performance of various readiness events like ICA Bootcamp, Microsoft Ready, Airlifts, etc.
Create Power BI dashboards for surveys, live shows, Azure Readiness TV, OLT consumption, webinars, etc. In the launch of Azure Readiness TV. Create an overall readiness dashboard to track the technical readiness of the various user role groups, regions, etc. Deepak is not only an SME in the Power BI area, but also employs all modern social and content-sharing methods of staying current so that he can truly help his clients realize ROI on their training investment. He is a pleasure to work with, and helpful beyond expectations. Skillful and down-to-earth with a great understanding of the client’s needs and a master’s knowledge at his fingertips.
The Security Awareness Public Service Announcement (PSA) Contest invites high school and college students to help promote good digital citizenship! Students can win cash prizes, gain experience, and earn recognition by creating PSA videos promoting a specific cybersecurity or privacy topic that educates the general public about using the internet safely, securely, and effectively.
Students can submit short (30 seconds), creative, and informative videos about explaining a cybersecurity or privacy problem and specific actions people can take to protect themselves online and safeguard their devices and personal data. Possible topics include (but are not limited to):
- Privacy
- Scams
- Ransomware
- Cyberbullying
- Malware
- Social engineering
- Phishing
- Vishing
- Cloud Security
- Physical security
Eligibility
- Open to any/all high school students or equivalent (including GED), college students, and adult learners across the U.S.
- Must be U.S. citizens/permanent residents.
- Students must be from the same school for group submissions.
- Multiple submissions are allowed from the same school, but there must be no overlap in membership across submissions.
- While there is no limit to team size, please note that the prize monies will be distributed evenly across all members.
Rules
- A link to the video entry must be provided. This video entry must be available/accessible till the winners are announced.
- Videos must be generic (do not reference any specific school, applications, tools, websites, or vendors).
- Teams can only submit one video entry.
- Students must be from the same school for group submissions.
- Multiple submissions are allowed from the same school, but there must be no overlap in membership across submissions.
Notes
- There is no entry fee to participate.
- Entries will be accepted through 12 PM ET on Friday, October 7, 2022.
- View the website for more submission guidelines.
Summary
Learn to secure information about the security weaknesses in your environment and help your team learn to remediate or mitigate the issues before they can be exploited. Gain a better understanding of your IT infrastructure, security flaws, and overall risk to reduce the likelihood of a cybercriminal securing unauthorized access to your organization’s data.
Join our free 40-minute live webinar: “Best Practices to Cybersecurity Vulnerability Assessment and Solutions Implementation” and provide your teams with the skills to proactively defend your organization’s security stance. This CompTIA-certified instructor-led immersive live webinar will help you understand the importance of threat data and intelligence. Your team will also learn to perform vulnerability management activities, implement controls to mitigate attacks and software vulnerabilities, and much more. The webinar also helps professionals demonstrate their knowledge of common vulnerability assessment tools and keeps them abreast with emerging technologies.
NetCom Learning, a Gold-level training partner with CompTIA, has a comprehensive portfolio of certifications that meet your organization’s learning goals. All of our CompTIA courses are designed to hone the hands-on skills of IT professionals and validate them as experts in their field.
- Importance of threat data and intelligence
- Introduction to vulnerability management activities
- Common vulnerability assessment tools
- Implementation of security measures
- Q&A
Summary
Accelerate your business with Microsoft Azure IoT
NetCom Learning brings to you a 2-hour masterclass where your team can get every doubt sorted while learning about the Microsoft Azure IoT Developer (AZ-220) certification. Help them obtain the knowledge to set up the IoT solution infrastructure; provision and manage devices; implement IoT Edge; process and manage data; monitor, troubleshoot, and optimize IoT solutions; and implement security.
Through this instructor-led master class, your teams will understand the fundamentals of Microsoft Azure IoT, the popular IoT devices in the market, what the right IoT solution for your business is, and more.. As a Microsoft Gold Learning Partner, we are also sponsoring the Microsoft Official Curriculum (MOC) materials for our masterclass learners to help them prepare for the certification.
.
- Introduction to Microsoft Azure IoT
- What are the popular IoT devices in the market?
- What is Microsoft Azure IIoT?
- Microsoft Azure Role in IIoT
- Microsoft Azure Services
- What is Azure IoT Hub, Azure IoT Central, & IoT Edge?
- What is the right IIoT solution for your business?
- Live Demo
- Q&A with the Speaker
Speakers
Brent Dawson
Brent is Microsoft Certified Trainer with 20+ years of experience in the technology industry. Brent is also a Microsoft Dynamics Architect who specializes in Information Security Architecture, Azure DevOps, CISSP,SQL Server Administration and Architecture and Enterprise Architecture. He has delivered comprehensive Microsoft Infrastructure and Security trainings giving his students the tools they need to build, maintain, and secure their Microsoft network infrastructure. His experience as a solution and infrastructure architect, has contributed solutions for architecting Microsoft based solutions in Azure, Dynamics 365 and SQL Server. 365 Finance and Operations. Brent has been chosen by Microsoft to create and present seminars related to the different features present in Dynamics 365 Finance and Operations.
What is WOPR?
WOPR Summit is a hacker con. A “Hacker” what? Yup, just that. While we celebrate technology and its oddities, we love and recognize the construct that hacking is a state of mind: looking at a system and seeing the abnormalities within it. Not just computer systems, but also societal. Hacking is as close to art as you can get without picking up a paintbrush.
What kind of content are we looking for?
We absolutely welcome the technical oddities within our CFP, but we also welcome anything else that can be twisted, skewed, made to not function normally, or just /dev/random.
Please, don’t hesitate and submit to our CFP. Come one, come all, we’ll see you this fall!
Thank you for your interest in submitting content for WOPR Summit 0x1!
Details about this year’s CFP
Content Types
Panels: The CFC is open for panels to be conducted in-person. Panel ideas must be submitted with 2-3 sample questions and known panelists listed.
Standard Talk: This is a 55 minute talk.
Short Talk: This is a 25 minute talk.
Lighting Talk: This is a 15 minute talk.
Be sure to include a detailed outline of your submission in the ‘Description’ field.
Not including detailed information in the description will severely impact our ability to rate your submission and could out-right disqualify your submission.
Calling all Students!
Students, if you’re thinking of submitting a poster or similar short talk, and you’ll be 15 or less minutes, select the “Lightning Talks” option and let us know how much time you want (it doesn’t need to be the full 15).
Got questions?
If you have any questions please email us at cfp@woprsummit.org, or post your question in the #wopr-summit-0x01 channel in our Discord server.
Good luck!
You can enter proposals until 11.59pm ET October 7, 2022.
When it comes to larger or more complex organizations, managing cyber security risks requires a more intensive approach than implementing basic security protection.
Embedding risk-based security controls, managing the security of supply chains, and carrying out regular audits are some of the many measures an organization may need to take to manage and reduce risk.
Join us on this 45-minute webinar to find out more about:
- The third stage of your cyber-defense-in-depth strategy and what it means for your company;
- ISO 27001 and its role in demonstrating security best practices;
- Policies and procedures to ensure and demonstrate compliance with any regulations and standards;
- Supply chain security management;
- Audits and certification to standards; and
- Practical advice and solutions to implement a cyber-defense-in-depth strategy.
About the Speaker
Alan Calder, Founder and Executive Chairman of IT Governance and CEO of GRC International Group
Registration Deadline: October 1st
Held in-person at The Drexel University Science Center and virtually via Zoom on
October 21, 2022, 9:00am-12pm
With Your Attendance, You Will Have The Opportunity To:
Meet Potential Employers
- Your future at your fingertips. Representatives from the employers listed below will be present to meet you and discuss opportunities available at their companies. Be sure to bring copies of your resume. Interviews for internship and entry-level positions will be conducted on site.
Join Thought-Provoking Workshops
- Strategies in job selection
- Tips on how to break barriers for women in tech and foster inclusivity
- Keys to a thriving career
- Developing the leader within
- How to evaluate companies for inclusivity and fit
- Evaluating job opportunities
Keynote: Hear From Technologist & Social Entrepreneur
Jumoke K. Dada

Jumoke Dada is best described as a technologist and social entrepreneur whose sweet spot lies at the intersection of innovation, entrepreneurship, goodwill, and girl power!
Dada holds a Bachelor of Science in Computer and Information Sciences from Temple University. She is a certified Scrum Master with a successful career in corporate IT. As the principal of Signature RED, she provides technology and strategy consulting services to companies and creates tools for women interested in careers in technology.
Dada founded the Tech Women’s Network – an online platform and community for women with technical skills. She has hosted several educational events, including Building iOS Mobile Apps, Techies Who Brunch and HUE Tech Summit. She is a contributing writer for ForbesWomen, where she covers diversity in tech.
Summary
Solve complex business problems with time-tested combinations of Azure products and services and prepare your business for the future. Increase efficiency and productivity with our Microsoft instructor-led session and help your teams learn the latest techniques to enhance your organization’s security and mobility.
Partaking in this power-packed webinar will also help your team obtain a comprehensive understanding of the fundamentals for designing migrations to Microsoft Azure. This FREE webinar will also help them learn several interesting concepts of Azure, such as determining an efficient migration strategy, defining a data transfer strategy, exploring data availability, and much more.
- Determining a Migration Strategy
- Exploring Data Availability and Resiliency in Microsoft Azure
- Determining a Data Transfer Strategy
- Migrating to Azure
- Q&A with the speaker
Speakers
Brent Dawson
Brent is Microsoft Certified Trainer with 20+ years of experience in the technology industry. Brent is also a Microsoft Dynamics Architect who specializes in Information Security Architecture, Azure DevOps, CISSP,SQL Server Administration and Architecture and Enterprise Architecture. He has delivered comprehensive Microsoft Infrastructure and Security trainings giving his students the tools they need to build, maintain, and secure their Microsoft network infrastructure. His experience as a solution and infrastructure architect, has contributed solutions for architecting Microsoft based solutions in Azure, Dynamics 365 and SQL Server. 365 Finance and Operations. Brent has been chosen by Microsoft to create and present seminars related to the different features present in Dynamics 365 Finance and Operations.
Summary
The worldwide information security market is growing rapidly. This is due in large part to organizations stepping up their defenses against cyber threats — and a rise in such threats, including within their own companies. Companies increasingly recognize the need for a dedicated leader to oversee their cybersecurity efforts, and the CCISO is often responsible for managing all aspects of cyber risk management.
Join our FREE 40-minute live webinar: “Getting started with 5 fundamental domains of cybersecurity governance”. This immersive live webinar will be conducted by an EC-Council certified instructor who will highlight concepts such as governance and risk management, audit management, vendor management, planning, finance, and more. You will also learn about vulnerabilities, threats, security frameworks, models, standards, best practices, and more. Learn about the various aspects of cyber risk management while understanding the crucial role played by the CCISO.
NetCom Learning, an accredited training partner of EC-Council, has a comprehensive range of courses and certifications that help learners achieve their training goals in alignment with their organization’s requirements.
- Introduction to governance and risk management
- Learn about information security control and audit management
- Understanding planning, finance, and vendor management
- Q&A