SpiceWorld Agenda

Planning for SpiceWorld 2025 is underway! Here are a sample of the inspiring keynotes and tech-rich sessions from our 2024 event.

Want to stay in the know about all things SpiceWorld? Sign up for our newsletter for exclusive updates on early bird tickets and exciting session info.

Interested in speaking at SpiceWorld or any of our other events? Contact us at [email protected]

Our Keynote Speakers

SW24_Keynote_Speakers_Headshot_DouglasRushkoff image

Nov 14 2024

Why we must center human connection amid great technological change

Douglas Rushkoff

World-renowned visionary and futurist named one of the world’s 10 most influential thinkers by MIT, Douglas Rushkoff explores the important role IT professionals play in a society grappling with rapid change.

SW24_Keynote_Speakers_Headshots_TarahWheeler image

Nov 14 2024

The impact of AI on tomorrow's cybersecurity, and what it means for you

Tarah Wheeler

Drawing on her years of experience in cybersecurity with Microsoft, Harvard, and more, Tarah takes you through how AI will be leveraged on both the offensive and defensive sides, illuminating what you need to know and why you need to know it.

Wednesday, November 13
Wednesday, November 13
Registration open - day 1
Duration: 9 hours
Workshop - Mastering PowerShell: From basics to best practices
Duration: 3 hours

Level up your automation game and explore the world of PowerShell during this optional, pre-event workshop designed for IT professionals of all levels. Whether you're just starting out or looking to refine existing skills, our knowledgeable instructors will guide you through the essentials of PowerShell, show you how to optimize your workflows, and equip you with critical security best practices.

Join us for a hands-on experience that will help you streamline your daily operations by harnessing PowerShell's full potential.

Note: Space is limited for this three-hour workshop, which requires pre-registration, at an additional cost.

Break time
Duration: 30 minutes

Take a quick break to re-energize before getting back to the action!

SpiceBuddy bootcamp
Duration: 50 minutes

Want to make the most out of your conference experience? Is it your first time at SpiceWorld? The SpiceBuddies have your back! Chat with this helpful group of friendly SpiceWorld veterans, who are here to help you have a great time.

Whether you came to hear a specific session, meet with vendors, or network with your peers, the SpiceBuddies are available to guide you. Join us to discuss the basics of attending SpiceWorld from the informed perspective of experienced SpiceHeads.

Opening keynote
Duration: 50 minutes

Kick off SpiceWorld 2024 with a warm welcome from the Spiceworks team! We'll get you pumped about what you can look forward to, highlight outstanding members of the Community, and get you oriented so you can start SpiceWorld on the right foot.

How to justify the cybersecurity budget you deserve
Duration: 50 minutes

How much should you invest in cybersecurity? How does our organization's spending compare with others?

Cybersecurity is a technical issue, but ultimately the answers to these questions are business decisions that balance two dimensions: affordability and acceptable risk. In most organizations, this requires choices and tradeoffs.

Aberdeen Strategy & Research analyzed the 2025 Spiceworks State of IT study to provide useful insights into how organizations allocate budgets, including:

• The total amount allocated to IT, as a percentage of annual revenue
• The amount allocated to cybersecurity, as a percentage of annual total IT spend on computing infrastructure (hardware, software, facilities), both in-house and outsourced.
• The amount allocated to cybersecurity, per-user

Join us for a discussion on how to get the cybersecurity budgets you deserve by justifying proposed investments based on outcomes that fall into three high-level categories: enabling upside opportunities, improving operational efficiencies, and managing downside risks.

Be the IT Hero: Simplify and Secure the User Lifecycle
Duration: 20 minutes

Managing user identities and devices across the entire user lifecycle can feel a bit like fighting silent security villains, jumping between multiple systems and IT tools to get the job done. You need to provision accounts, order laptops, configure devices, and make sure people who leave the company don’t take sensitive data with them.

You need one source of truth for employee data that every team can use to manage the entire user lifecycle.

Surviving deskside support
Duration: 50 minutes

User support is always rough, but facing a user at their desk is a whole new ball game.

Learn effective tips and tricks to help your work interactions go more smoothly, keep your users happier, and identify red flags to watch out for while interviewing for deskside support positions!

Flying solo in IT: How to soar smoothly through turbulence with no wingman
Duration: 50 minutes

Do you work in a solo IT shop? Does it feel like you are going to absolutely lose your mind on most days?

Join this lively session as we will discuss the ups and down of flying solo, the importance of mental health and taking time for YOU, and how to find the help and tools needed to fly alone though the turbulence... so you you can hit a successful landing in your job.

The New Reality of the AI-Powered Service Desk
Duration: 20 minutes

Discover how Professional Services Automation (PSA) can revolutionize your IT team's efficiency, reduce stress, and expand service offerings. In this session, Travis Brittain, Product Marketing Manager of Autotask PSA, will explore how the rise of generative AI is breaking new ground in enterprise software, and what this means for the future of IT service delivery. Learn how ITSM, combined with AI advancements, will shape the future and align with Autotask’s vision for a more efficient and innovative IT landscape.

From tidepools to boardrooms: Using principles of living systems to build a resilient IT organization
Duration: 50 minutes

With eons of evolution shaping intricate living systems, nature offers a true masterclass in managing complexity, adapting to change, and understanding dependencies. Did you know a remarkable similarity exists between how living systems and businesses operate, sustain themselves, thrive, and avoid collapse?

In this session, you'll explore how organizations parallel living systems, delve into the laws and principles that govern them both, and see how modeling your IT strategy, operations, and decision-making after these concepts can lead to significant competitive advantages by helping you create a more agile, innovative, and resilient IT organization.

Redefining Infrastructure in a Post-VMware World
Duration: 50 minutes

The once-dominant VMware ecosystem is encountering shifts that prompt organizations to explore alternative solutions. In a post-VMware world customers are looking for alternative solutions that not only deliver on performance and efficiency, but also inspire confidence in long-term viability and support.

Normalizing Security Culture: Don't gotta get ready if you stay ready
Duration: 20 minutes

This session with Security Strategist Zoe Lindsey from Blumira will cover actionable strategies for moving security culture from “better not seen or heard” to an integral business function. She will show how security builds reputational trust and why culture helps prevent incidents, as well as planning education that benefits employees both professionally and personally. Learn how to foster a collaborative security mindset to strengthens your organization's defense and keep your team safe!

The raging debate: Single stack or distributed toolsets
Duration: 50 minutes

MSPs often struggle to manage costs and tool integrations while maintaining secure environments for them and their clients. Every choice presents challenges and opportunities.

Join us for a panel discussion on the pros and cons of going with a single-vendor tool stack vs. using a different vendor for each tool, featuring representation from MSPs, IT professionals, and tech vendors. We'll even chat about the anticipated impact of AI on the single stack vs. distributed toolset debate, both from a white and black hat perspective.

Human side of cybersecurity - We all play a role
Duration: 50 minutes

Drawing on years of experience, Marc talks about how the Human behavior significantly shapes the security landscape and what steps can we take to not only mitigate risks but also foster a culture of fun, understanding, and education.

The 2025 State of IT: Data-backed insights on IT jobs, budgets, and emerging tech
Duration: 35 minutes

Explore findings from Spiceworks' 2025 State of IT report, an in-depth annual study—fielded every year since 2013—on emerging tech adoption, IT budgets, the IT job market, and the ever-evolving business landscape.

Join us to gain a deeper, data-backed understanding of relevant industry trends, which technologies your peers believe are worth investing in, and IT career insights—which can inform your personal and business strategies in 2025 and beyond.

SpiceWorld welcome shindig
Duration: 3 hours

Come celebrate in the Expo Hall in the Zlotnick Ballroom!

Connect with this year's sponsors, enjoy delicious light bites, and sip on a curated selection of beer and wine. Don’t miss out on an evening of networking and fun… and opportunities to score some serious swag while working on your Passport to Prizes!

Expo hall open - day 1
Duration: 3 hours
Registration open - day 2
Duration: 6 hours
Expo hall open - day 2
Duration: 8 hours 30 minutes
Breakfast
Duration: 2 hours

Fuel up before your jam-packed day of learning, networking with vendors and peers, and fun!

Keynote: The impact of AI on tomorrow's cybersecurity, and what it means for you
Duration: 50 minutes

Generative AI is changing the cybersecurity game, says cybersecurity CEO Tarah Wheeler. On the offensive side, AI has enabled better tuned, carefully crafted, devastatingly dangerous spear-phishing attacks. On the defensive side, AI can integrate with your SOC tools to give you fewer and more effective notifications (what she calls “less, better, info”).

Either way, you can’t ignore it—you have to understand and leverage it today. Drawing on her years of experience in cybersecurity with Microsoft, Harvard, and more, Tarah takes you through both the offensive and defensive sides, illuminating what you need to know and why you need to know it.

Women in IT fireside chat
Duration: 50 minutes

In today’s rapidly evolving tech and business landscape, encouraging and supporting women in IT has never been more crucial.

Join us for an engaging open dialogue where we’ll explore the unique challenges faced by women in the field and share practical strategies to address them. This session is open to everyone who believes in creating a more inclusive and diverse tech industry.

Tales from a breach
Duration: 50 minutes

No one wants to get hacked, but at least every dark cloud has a silver lining. The lessons learned from a breach can be valuable teaching tools to help everyone in IT prevent future disasters.

This session will explore how to spot the early signs of a breach, how to use backups to understand a threat actor's intentions, why Zero Trust actually works, reasons to check your firewall configurations at the door, and other key lessons learned from a security breach.

Network Automation: Fact or crap?
Duration: 50 minutes

Most tech marketers believe network automation can do anything from “fix performance problems before they even start” to “do all your laundry” and “stop the polar ice caps from melting.” But is it really the golden child or just another over-hyped tech marketing buzzword?

Join us for a no-holds-barred panel discussion that cuts through the nonsense and gets real about network automation. We’ll be joined by two networking experts from Auvik and an IT pro from the Spiceworks Community.

The real reasons small and mid-size businesses are turning to password managers...or should be!
Duration: 20 minutes

Think a password manager is just about remembering logins? Think again. Today’s SMBs are adopting password managers not only to lock down security but to equally boost productivity and collaboration. Join LastPass to explore how password managers streamline the future of work, empower your team, all while protecting your business from cyberattacks. Let’s rethink password management together and turn it into your SMB’s most loved app!

Uncovering the hidden costs of SaaS: Strategies to combat SaaS sprawl and protect your IT budget
Duration: 20 minutes

The rapid adoption of SaaS applications has revolutionized business operations, but it has also introduced hidden challenges. Unchecked SaaS sprawl leads to security risks, inefficiencies, and significant financial waste, with up to 25% of SaaS licenses going unused. Many IT teams struggle with visibility and control over their SaaS environments, resulting in escalating costs and operational complexity. Join Josys in exploring how to effectively manage SaaS sprawl and protect your bottom line.

Learn the basics of Git and GitHub workflows
Duration: 50 minutes

Learn about the essentials of setting up and configuring Git for efficient version control. You'll learn how to install and use the posh-git module, a versatile Git integration for PowerShell.

This session will illustrate concepts such as repositories, commits, and pull requests—and show how they all fit together. We'll also discuss the process of forking a repository and cloning it to your local machine. These essential skills will enable you to contribute to projects and collaborate effectively with others.

How safe is your SaaS data? Things business leaders & IT admins should know
Duration: 20 minutes

As businesses increasingly rely on SaaS platforms for critical operations, the risks of cloud-based breaches and data loss are rising. This session will cover essential insights for business leaders and IT admins, highlighting the shared responsibility model of SaaS platforms like Microsoft and Google. We will discuss the limitations of native data retention policies, the growing threat of ransomware in the cloud, and the need for external backup solutions to ensure data security, compliance, and proper incident response.

Unlocking the Power of AI for small and mid-sized organizations
Duration: 50 minutes

Dive into how artificial intelligence can empower small and mid-sized organizations along their growth journey. Through real-world examples and insights into customer readiness, we address common challenges and demonstrate how Dell's solutions empower SMBs to harness the full potential of AI. From Microsoft Copilot+ PCs to an AI-ready datacenter to the cloud, maximize your potential and learn how to securely integrate AI for all your organization’s needs.

RAGTIME - How to make robots do the boring stuff
Duration: 50 minutes

Joey will cover a variety of solutions (both DIY and 3rd party) for exploiting recent advances in AI to handle lower-tier support requests that should help increase overall IT efficiency by freeing your folks from the ballast of basic questions. This session may include a surprise guest appearance from Ziff Davis' Technology Media Divisional CTO, Josh Schulz.

Yes, the SMB needs to deal with cybersecurity
Duration: 50 minutes

It doesn't matter how small your business is—you must take cybersecurity compliance seriously. Even if you run a tight ship, it doesn't mean that your vendors and customers do. This session will provide real-world examples and lessons that apply to your business and help keep it safe.

Top 10 tips for improving IT security and reducing costs
Duration: 20 minutes

Ransomware attacks are increasing at a near exponential velocity. To not just survive the onslaught, but to get ahead you need to use all the tools in your IT kit to the fullest. The industry is not properly leveraging the power of their endpoint management and security solutions to combat ransomware.

Join Kaseya to learn tips and tricks for fighting ransomware, improving security, and reducing costs simultaneously. We’ll cover both software-based and process-based tips for hardening, securing, and protecting your data, network, and users from attack.

Lunch & expo
Duration: 1 hour 30 minutes

Grab some delicious grub, check out sponsors’ booths, and make new friends.

Secure adoption of generative AI technologies
Duration: 50 minutes

The world is adopting generative AI technologies at a rapid pace and realizing benefits in real time. But does AI present a new cyber threat to a company’s most prized information assets? The answer is both yes and no. Data governance is not a new concept, but breakthroughs in natural language processing and large language models (LLMs) require a new approach to effective data governance.

Attend this session to understand the emerging security risks from using generative AI technologies, as well as techniques for reducing the risk of data spillage, which can have real regulatory compliance impacts.

Patch & secure at warp speed with PDQ Connect
Duration: 20 minutes

We've got game-changing news for you: PDQ Connect can now find and remediate your vulnerabilities in one click!

Designed to streamline your vulnerability scanning and remediation process, PDQ Connect is an instant power-up! It enables you to quickly detect, prioritize, and patch vulnerabilities across your network, ensuring your systems are always up to date and secure. With its automated patching and remote access, PDQ Connect simplifies the remediation process, reducing manual effort and improving security.

User satisfaction = Admin relaxation: IT's secret formula
Duration: 50 minutes

Daily struggles with technology cost money and a lot of patience. Unnoticed by IT teams, a buildup of small issues keeps end users from working efficiently. What if you could predict and prevent tech problems before they surface? We'll show you how Digital Employee Experience combined with Unified Endpoint Management can drastically improve user experience as well as simplify troubleshooting processes - all while reducing traditional help desk tickets. Looking to transform the way your IT operates? This is the session for you!

Bridging the gap: Installing and configuring SSH for PowerShell connectivity
Duration: 50 minutes

Unlock the potential of cross-platform connectivity by installing and configuring SSH for PowerShell, tools that allow you to establish secure and standardized connections across diverse technology stacks that allow you to execute commands, transfer files, and manage remote systems efficiently and securely.

Join us to learn the prerequisites and considerations for a successful installation, explore how PowerShell SSH cmdlets streamline administrative tasks, and delve into the advantages of key-based authentication for SSH. By the end of this session, you’ll be equipped with the knowledge and practical insights needed to elevate your remote administration capabilities.

Beyond the license: Excel Micro’s humanized approach to email security
Duration: 20 minutes

For over two decades, Excel Micro has guided organizations in selecting and managing email security solutions. Our session will cover the evolving cyber threat landscape, stressing that modern threats like phishing and ransomware require more than just a security license—they need expert partnership. Excel Micro offers tailored, flexible strategies that go beyond “check-the-box” solutions, providing choice, adaptability, and the human touch to software distribution.

Exploiting your neurodivergence at work for fun and profit!
Duration: 50 minutes

Like a double-edged sword, Being a neurodivergent individual can be incredibly valuable in the tech field; However, it can also be a challenge when an environment doesn't match your work style.

Join us for a panel on mental health and neurodiversity, where we'll discuss tips and tricks for taking advantage of your "NeuroSpicy" superpower and how to handle it when it becomes your arch-nemesis.

Deploying and provisioning Windows 11... the easy way!
Duration: 50 minutes

Whether you're upgrading or buying new, provisioning and managing your Windows 11 devices might seem like a daunting task, at first. But making the switch can set a strong foundation for cloud-centric Windows management going forward.

This session will cover new Windows 11 capabilities, useful tools (both free and paid), and best practices that can make your life easier when provisioning Windows 11. We'll go through your options step-by-step and evaluate the pros and cons and tradeoffs of each choice along the way.

Simplify the complexity: Mastering Apple device compliance
Duration: 20 minutes

Learn how to easily deploy and maintain compliance benchmarks for CIS, NIST, DISA, CMMC, and HIPAA across your Apple devices, integrating seamlessly with your existing MDM. Discover a straightforward approach to auditing, enhancing, and achieving full compliance.

Mindset first, tools second: Building a resilient cybersecurity program
Duration: 50 minutes

In today's evolving threat landscape, SMBs are increasingly targeted by sophisticated cyberattacks, often exploiting human vulnerabilities. This session helps IT leaders and practitioners shift from reactive to proactive with an intelligence-driven cybersecurity mindset. You'll learn how social engineering attacks unfold, understand criminal tendencies, and gain practical steps to build a threat intelligence mindset, strengthening your organization's defenses against evolving threats.

Beyond the AI hype: Practical and realistic ways businesses are deploying AI today
Duration: 50 minutes

The claims for what generative AI can do continue to push the limits of believability and businesses are adding AI bots to every conceivable interface and product. In this session, Aberdeen Strategy & Research will cut through the hype by offering real-world insights to help set the record straight.

We'll share recent findings from our studies that reveal where businesses and IT departments are actually investing money and resources in AI. We'll also discuss which use cases are worth pursuing and which ones you might want to hold off on.

Taking the next step: Becoming an IT leader
Duration: 50 minutes

Moving into management can be a daunting but rewarding career change. However, it also requires understanding the human side of things, which IT professionals (admittedly) aren't known to excel at.

This session will explore the journey into IT leadership, how to achieve it, and steps to take to become an effective leader. We'll focus on developing soft skills, having difficult conversations, the concept of servant leadership, and why all of this is cool.

Refurbished vs. remanufactured: Clearing up misconceptions and revealing the benefits
Duration: 50 minutes

Ever wondered about the difference between refurbished and remanufactured solutions, off-lease gear, demo equipment, and used products? Join us as we explore the facts, clear up misconceptions, and discuss benefits of using remanufactured compute solutions to optimize your infrastructure and budget.

You'll learn about cost savings, rigorous remanufacturing processes, order configuration flexibility, support options, integration and applications, and upgrade options that keep the OEM warranties intact. We’ll also showcase real-world examples of how small businesses and large enterprises are leveraging remanufactured solutions to enhance operations and achieve fiscal responsibility.

Reducing cyber risk with a human-centric approach in the age of AI
Duration: 50 minutes

Understanding and addressing human behavior is crucial for
effectively mitigating cyber risks. The Golden Circle Methodology, which outlines the importance of starting with the "why" to foster a sense of ownership and commitment among participants, can help to drive sustainable risk management practices.

Join us for a practical security session featuring a case study that highlights a successful integration of the Golden Circle methodology and cyber risk remediation. We’ll also explore tips for evolving cybersecurity practices in a dynamic environment, including a discussion on the human influence on AI and the need for responsible use and oversight.

Keynote: Why we must center human connection amid great technological change
Duration: 50 minutes

A world-renowned visionary and futurist named one of the world’s 10 most influential thinkers by MIT, Douglas Rushkoff has written over a dozen bestselling books about technology and how it has fundamentally changed our world for the better (and sometimes for the worse).

He has spent three decades thinking and writing about emerging technologies like AI, giving him an unparalleled perspective on how to use these new tools to unleash our full human potential. In his SpiceWorld keynote, Ruskoff will discuss the implications of recent computing advancements and the important role we, as IT professionals, can play in a society grappling with rapid change by setting the agenda for how and why emerging technologies are used by everyone else.

Raffles, prizes, and final hurrahs
Duration: 30 minutes

As the conference concludes, we'll gather one last time to connect with friends, reflect on our time together, and review what we've learned. And what SpiceWorld would be complete without slinging awesome raffle prizes and sweet swag?

Remember, to be eligible for the raffle, you must have completed and turned in your Passport to Prizes. Also, you must be present during the session to win!

SpiceWorld after party - Sponsored by baramundi
Duration: 3 hours

Level Up Your Night by joining us for the after party at Central Machine Works
Sponsored by baramundi!

Experience an unforgettable evening

- Live Music: Dance to DJ tunes and a live band.
- Signature Cocktails: Enjoy expertly crafted drinks.
- Swag: Score awesome branded gear and surprises.

A night to celebrate with your favorite SpiceHeads, new and old!

**SpiceWorld badge required for entry**

The first bus pick-up is at 6:15 PM

Recent Comments
    Archives
    Categories
    • No categories