IT Conferences

IT Trade Shows & Conferences by Country

WITI Summit

Date: 31-May-15 to 02-Jun-15
The Women In Technology International (WITI) Summit, May 31-June 2, is the annual gathering of tech-savvy women, held in the heart of Silicon Valley. Executive women, entrepreneurs, and technology thought leaders from around the world converge to collaborate on innovative solutions to common business challenges; explore new business opportunities that underscore how technology is powering change; and build and expand strong connections in a welcoming networking environment of women committed to helping each other succeed. Use code PARTNER for $100 discount off the prevailing rate of a 3-day pass.

4th Global Mining IT & Communication Summit

Date: 02-Jun-15 to 03-Jun-15
Location: Denver / Colorado / United States
The robust advancement of information and communication technology is driving growth in the mining industry. The 4th Global Mining IT and Communication Summit will focus on introducing the best practices in IT and Communications for the mining industry.

WSO2Con EU 2015

Date: 01-Jun-15 to 03-Jun-15
Location: London / United Kingdom
The 3-day event will include an in-depth, hands-on Tutorials Day, followed by two conference days with insights into WSO2 middleware products and domain-specific solutions. The sessions will provide a comprehensive understanding of reference architectures, use cases, and road maps along with Guest keynotes by industry leaders Customer success stories Panel discussions Special tracks for business strategies and partner business Networking opportunities with like-minded people

DC Metro Cyber Security Summit

Date: 03-Jun-15 to 03-Jun-15
Location: Virginia / United States
Registration is now open for The DC Metro Cyber Security Summit. The Cyber Security Summit, an exclusive conference series sponsored by The Wall Street Journal will take place in the DC Metro area on Wednesday, June 3rd. The event will connect C-Level & Senior Level Executives responsible for protecting their companies’ critical infrastructures with cutting-edge technology providers and renowned information security experts. Wednesday, June 3rd 2015 The Ritz-Carlton Tysons Corner 1700 Tysons Blvd McLean, VA 22102 C-Suite & Senior Level Executives are cordially invited to join us to learn the about the latest emerging threats and cutting edge solutions. Register To Attend: For half-price tickets, use Promo-Code CSSVIPDC15 ...

Smart Social Media Summit

Date: 03-Jun-15 to 04-Jun-15
Location: London / United Kingdom
Semantica Research’s Smart Social Media Summit brings together social media professionals, business executives, academics and other influencers from around the world to discuss how the online social experience in the age of sensors and the Internet of Things will disrupt business, politics, health, AND other areas of International Affairs, paving the way for a fundamental change in the ways businesses and other institutions interact with people. The Smart Social Media Summit is a timely opportunity for policymakers, business leaders, scholars and other decision-makers to gain insight, share ideas, and access high-level resources on this fascinating and urgent topic. The Smart Social Media Summit will provide social business professionals with the unique opportunity to learn and ...

Enterprise Content Management (ECM) training

Date: 02-Jun-15 to 05-Jun-15
The Enterprise Content Management (ECM) training covers the strategies, tools and technologies used to capture, store, manage, preserve and deliver information in support of business processes. It provides you with a framework which enables the management of information assets across an organization, and it ties in relevant components and technologies. This could be Electronic Document Management, Electronic Records Management, Workflow, Business Process Management, Web Content Management, Collaboration and Digital Asset Management.

The Enterprise Mobility Summit

Date: 10-Jun-15 to 10-Jun-15
Location: London / United Kingdom
The Enterprise Mobility Summit is a leading conference that brings together 200+ Senior IT professionals from across all industries. This year’s conference will delve deeper into how and why organisations should integrate their mobility strategy into the overall business strategy. We'll touch on key topics such workplace transformation, tools and techniques to enable mobility, mobilising business functions and applications, as well as maintaining a security risk aware organisation. The programme brings together expert keynotes, real world case studies and interactive panel discussions led by senior IT practitioners who have been tackling mobility in their organisations. Join us to gain insight into the real value of mobilising your business.

Modern SCADA Systems

Date: 09-Jun-15 to 11-Jun-15
“Implementing and improving SCADA systems for enhanced performance, profitability and real time problem solving capabilities” MODERN SCADA SYSTEMS 9 – 11 June 2015, Dubai Overview Energy and power is crucial in fueling the economic growth, so is the power systems and SCADA systems in place that ensure safe, reliable and efficient automated production of electricity and goods. Today’s power and SCADA systems, in response to changing business needs and technological innovation, have added functionalities that aid strategic advancement. Good design & coordination of power protection systems is vital to safety, maintenance, troubleshooting and efficient operation of electrical systems and modern industrial plants; whereas an ...

Business Process Management (BPM) training

Date: 09-Jun-15 to 12-Jun-15
Location: London / United Kingdom
The Business Process Management (BPM) training provides you with a detailed understanding of Business Process Management. The Business Process Management (BPM) training program comprises main elements from the Strategy workshop and the BPM Practitioner and Specialist Certificate programs, in addition to a case study exercise.

Cyber Security for Financial Services Exchange

Date: 14-Jun-15 to 16-Jun-15
This dynamic, three-day event will provide Cyber Security executives with valuable insights to reach their full potential by exploring security leadership strategies, the changing threat landscape, human-friendly technological approaches and more. The sources and types of cyber security attacks are constantly changing, which requires constant vigilance. Spending on security has increased with recent high-profile hacks. Financial services must keep data secure from unauthorized access of identifying information or breaches at all times. Federal, state, and industry regulations mandate consumer protection. Yet the landscape of the types of attacks and the players (nation states, hacktivists) constantly changes. The financial services sector is a lucrative target as a money source and ...