Sample Our Research
Cutter Consortium Summit: Unlike Any Other IT Conference.
The Cutter Consortium Summit is packed with opportunities for one-to-one interaction with speakers and colleagues from around the world, as well as time to deliberate on the issues as a group. There is no better opportunity to interact with the experts in IT. These experts include the presenters and panelists -- internationally known consultants and corporate IT professionals -- and the delegates -- experienced, forward thinking business and IT professionals. Below are samples from these experts in podcast format:
NOTE: Listening to these podcasts requires the use of a digital audio player or computer with audio-playing software that is capable of playing MP3 files.
The 2009 IT Landscape
Introduction by Tom DeMarco
(MP3 recording, 5:21 minutes, 630kb)
The 5 Essential Habits of Appropriately Paranoid Business Technology Strategists
Keynote by Steve Andriole
(MP3 recording, 97 minutes, 9 MB)
There are five things that everyone better do over the next 12-18 months: 1) rethink and (re-) develop your overall business technology strategies; 2) redesign and redeploy your computing and communications architectures; 3) rethink and re-implement your technology delivery strategies; 4) re-organize your technology organizations with special attention to business technology skills gaps; 5) identify and implement meaningful and measurable technology performance metrics. These five areas define the decisions that must be made as the business technology field fundamentally changes from the world we understood just five years ago. Is there some urgency here? Absolutely, because the nature of the changes we've been tracking is so profound that a misstep here could cost a great deal of time, effort and money.
Information Security: Zeroing In on a Moving Target
Keynote by Mark Seiden
(MP3 recording, 1 hour, 20 minutes, 9 MB)
Crime and fraud on the Internet, once pitched mainly toward individuals, now represent significant and increasing risk to organizations with a digital presence. The risk is aggravated by such factors as personal use of corporate computers, loss of laptops, insecure wireless networks, indefinite retention of personal information, poorly thought-out backup and archiving measures, and offshoring. Add to this the current pressure to cut budgets and we’ve got a perfect storm. In this keynote session, Cutter Fellow Mark Seiden, a high-profile security expert — well-known for his pursuit of Kevin Mitnick and revealing the vulnerabilities in airport security systems — will provide you with tales of the latest security holes, scams, and threats and advice on how to prevent getting caught in the traps.



