Pricing and Registration
TechVision is offering a limited September for our main event on November 12-13. We have separately priced pre-conference tutorials and post-conference workshops available on November 11 and November 14.
We are also offering a full, all-you-can-eat, 4 day immersive package at an attractive early-bird price. This includes access to any tutorial, workshop, conference session and one-on-one Principal Consulting Analyst meetings.
Day 1 – Monday
Education/ Pre-conference Tutorials
The first day of the conference is dedicated to preparing attendees for the topics and technologies we’ll be covering at the main event; our pre-conference tutorials are an educational experience to help enterprise technologists, architects and business leaders better understand the latest emerging technologies and architectural approaches. We’ve designed a series of seminars that are interactive and help the attendees better understand key technology inflection points and more importantly, define their impact on organizations.
These level-sets are abbreviated versions of educational products we routinely deliver for our clients, delivered by world-class Principal Consulting analysts and are a tremendous value.
Days 2, 3 – Tuesday, Wednesday
Main Conference Presentations
Our main conference is an immersive two day event that has a single goal in mind; to help large organizations make informed business and technology decisions. Every session is designed to provide a foundation for the rapidly changing technology and business landscape.
Networking is a key part of our conference; the experts on stage will also have the opportunity to join the event. TechVision experts are also available for one-on-one sessions throughout the conference.
Day 4 – Thursday
The last day of the conference is reserved for taking what you’ve heard over the first three days and learning how to apply it in a way that works in the real world. These half day and one-day sessions let you use our knowledge and experience to supercharge your transformation efforts.
These workshops are abbreviated versions of consulting products we routinely deliver for our clients and are a bargain at this price.
Main Event2 Days
- Tuesday, Wednesday
- All Talks,
- Analyst One-on-ones
Full Access4 Days
- Full Four-day Experience
- All Conference Talks, Panels
- Pre-conference Level-sets
- Post-conference Workshops
- Analyst One-on-ones
Education/ Pre-conference Tutorials
Becoming a Digital Enterprise using Transformative StrategiesLevel Set
- There is much confusion about what “digital transformation” really means. Most organizations don’t have a clear or consistent picture of what it means to their business. That’s because there is a lack of consensus among business leaders and digital stakeholders. As a business strategy there needs to be a shift in thinking about digital – from one of IT command and control to one where digital choices are focused on business outcomes.
- We’re offering a half-day preconference session where we’ll describe ways to get started on transforming to a Digital Enterprise. This level-setting session is designed to foster consensus among business leaders and digital stakeholders to transform through digital strategies. We use recognizable patterns and approaches, that promote agility, integration, flexibility, security, innovation, effectiveness and efficiency. We’ll further describe the framework we designed to help you build a risk-aware and transformative digital strategy that fits your business, its culture, and practices.
Decentralized, Self-Sovereign Identity ServicesLevel-set
- This is a half-day pre-conference tutorial designed to provide you with an understanding of a new identity and access management model that builds on blockchain, verifiable claims and user-centric identity principles. We’ll describe the technology behind this approach, early use cases, vendor and industry offerings, emerging standards, the business case, integration and migration planning issues and timing. This will be a valuable foundation to help enterprise architects, security/IT professionals, innovation leaders and line of business executives define an identity strategy in an increasingly decentralized world.
Zero Trust - Security for a New WorldLevel-set
- The Zero Trust model of information security basically upends the “castle-and-moat” mentality that had organizations focused on defending their perimeters while assuming everything already inside didn’t pose a threat and therefore was cleared for access.
- The castle-and-moat approach isn’t working. In fact, the most egregious data breaches happened because hackers, once they gained access inside corporate firewalls, were able move through internal systems without much resistance.
- Zero Trust Networking focuses on locking down all aspects of communication, inside and outside of traditional firewalls. This pre-conference tutorial will help you to understand what ZTN is, how it works, how it benefits the enterprise and some practical advice as to architecting and building a zero trust foundation. If you want to stop breaches, zero trust is the best way to go.
Identity and Access Management WorkshopWorkshop
- Identity and access management (IAM) is the set of business processes—and the supporting infrastructure service components—that create, maintain, and use digital identities within legal and policy contexts. The IAM infrastructure should be pervasive throughout the organization, supporting both centralized and decentralized administration. Embracing the notion of ‘identity is the new perimeter,’ Zero Trust environments recognize that the most critical facet of security is knowing who (or what) the end users are and what they can do.
- Unfortunately, an IAM infrastructure does not really come pre-assembled from a single vendor. Instead, system architects are forced to build the infrastructure using best-of-breed directory, access management, provisioning, and workflow systems. Selecting the “right” mix of standards, protocols, open source solutions, vendors and products is no small task, especially if your organization is adopting “cloud first” and zero trust strategies. System architects must build a system that will yield as seamless an implementation as possible while meeting the needs of internal and external user communities, whether on-premise, in the cloud or both.
- Our one-day Chrysalis IAM Workshop will help your organization develop a more secure and flexible identity & access management solution and achieve key objectives associated with improved risk management, automation, auditability and cost effectiveness.
Technical Evolution: Monolith to MicroservicesWorkshop
- Microservice architecture is a hot, popular, and emerging architectural approach that promises to help teams overcome traditional application delivery challenges so they can ‘Be Like Netflix’ and rapidly deliver innovative business functions at scale.
- Teams refactoring applications into containers, rebuilding applications to follow Cloud-Native patterns, or modernizing and rationalizing their application portfolio should consider adopting a microservices approach.
- In this full-day workshop, Patrick McClory and Chris Haddad will walk participants through the process of evolving large-scale systems into microservices architectures and includes many real-world examples and exercises.