TechGenix MS Exchange CON 2016 Reg banner
  ONLINE CONFERENCE October 26, 2017

Registration is now open for MS Exchange CON 2017, the annual online gathering of IT Strategists, Domain Experts, and Microsoft MVPs discussing the latest strategies, new technologies and proven solutions to manage, enhance and support Microsoft Exchange Server, Office 365 and Hybrid environments.


This complimentary online event is hosted by and TechGenix, as a cost-effective, convenient opportunity for busy IT Professionals to learn about the latest challenges, issues and solutions from leading experts and vendors who serve the global MS Exchange Community. This year's conference kicks off with a keynote address by J. Peter Bruzzese on Thursday, October 26, 2017 at 10AM EDT | 7AM PDT | 3PM BST.


Immediately following the conference Keynote address, you will be able to choose from multiple breakout focus sessions featuring experts addressing topics of keen interest to the Exchange Community for 2017. All focus sessions will be scheduled to run consecutively, allowing you to attend all sessions, or selectively choose only those you wish to attend.
Participation is free but is limited to the first 1000 registrants, so sign up here to reserve your spot today!

J Peter Bruzzese
Keynote Presentation by J. Peter Bruzzese:

Looking at MS Exchange Defense from a Value Perspective 


Join J. Peter Bruzzese's Keynote Presentation for an in-depth look at the value of defense for MS Exchange. As a bonus, J. Peter will also review recent MS Exchange updates with his unique insights. J. Peter is a Microsoft Office Servers and Services MVP. A Co-founder of both ClipTraining and Conversational Geek, he is also an internationally published technical author, speaker and journalist. 

Marcelo Delima_HPE
How to Secure Email Communications and Improve Compliance

The consequences of compliance violations are becoming more severe. GDPR, HIPPA, state laws and other privacy legislation are increasing the cost of data breaches and making the protection of personal data an issue of the highest importance. Email encryption is a key part of tool set required to protect sensitive personal data and comply with legislation. Learn about the challenges of complying with legislation and what characteristics an email encryption solution must have to provide the best possible protection for your most valuable data. Join Marcello Delima, Global Marketing Manager at Micro Focus and Michael Osterman, President of Osterman Research for this insightful look at email compliance.

Chris Taylor Trend Micro
Is that 4:45p Email from the CEO Real?                       Protecting Against Email Fraud
Business Email Compromise (BEC) scams have caused organizations to lose an average of USD $130,000 overnight. Targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments, BEC swindles have caused at least $5 billion in total losses around the world. BEC schemes are known for relying purely on social engineering techniques (no malicious attachments or URLs), making them very hard to detect. Join Trend Micro's Chris Taylor to learn the common tactics of BEC fraud, best practices for your company, and the latest artificial intelligence techniques to identify fraudulent emails.
Greg Smith and Justin Harris
Digital Transformations: Merging, Moving, or Modernizing Microsoft Exchange


IT Pros faces some of their greatest challenges during a merger or an acquisition, a move to the cloud, or an in-house data transformation project. A major challenge is the complex task of consolidating data silos while at the same time maintaining “business as usual.” Join Exchange MVP Justin Harris and Greg Smith, MCNE, CNI and Director of Professional Services for Netmail for this in-depth hybrid environment discussion geared for IT pros. They'll review best practices for planning, moving, and managing data transformation projects. They'll also provide tips on how to eliminate downtime and provide uninterrupted access to data during a data transformation project; and cover some need-to-know data consolidation strategies.