Q1 2026.
JANUARY

Modern Cloud
Security Architecture
Location: San Francisco
The shift to cloud-first architectures has fundamentally changed security models, moving from perimeter-based defenses to identity-centric, zero-trust approaches. Organizations struggle to implement consistent security policies across multi-cloud environments while maintaining operational efficiency and user productivity.
This roundtable examines cloud-native security architectures that protect modern distributed applications. We’ll discuss secure access service edge (SASE) implementations, cloud security posture management (CSPM) strategies, and approaches to container security at scale. The conversation will cover identity federation across cloud providers, policy-as-code implementations, and strategies for maintaining security visibility in serverless environments.
Key areas include threat detection in cloud workloads, automated incident response in distributed systems, and approaches to managing security across hybrid and multi-cloud deployments.
FEBRUARY

Application Security
and DevSecOps at Scale
Location: Denver
Software supply chain security has become critical as organizations accelerate development velocity through DevOps practices and cloud-native architectures. The challenge lies in implementing security controls that catch vulnerabilities early without slowing deployment pipelines or overwhelming development teams with false positives.
This roundtable focuses on practical DevSecOps implementation strategies including shift-left security practices, automated vulnerability scanning in CI/CD pipelines, and container image security management. We’ll examine software composition analysis (SCA) strategies, dependency management approaches, and techniques for securing infrastructure-as-code deployments.
Discussion areas include runtime application protection, API security testing, and approaches to managing security in microservices architectures.
MARCH

Hybrid Infrastructure
and Edge Computing
Location: Denver
Edge computing deployments are moving from pilot projects to production systems, driven by requirements for ultra-low latency, data sovereignty, and bandwidth optimization. Organizations need strategies for managing distributed infrastructure that spans on-premises data centers, public clouds, and edge locations.
This roundtable examines hybrid infrastructure strategies that support edge computing requirements while maintaining centralized management and security. We’ll discuss edge-to-cloud data orchestration, distributed storage architectures, and approaches to managing compute resources across diverse environments.
Key topics include private cloud implementations, edge security strategies, and high-performance computing workloads that require specialized hardware architectures.
Q2 2026.
APRIL

Data Management
and Modern Storage
Location: New York
Enterprise data architectures are evolving beyond traditional data warehouses to support real-time analytics, AI workloads, and multi-cloud deployments. Organizations need storage strategies that provide performance, scalability, and cost-effectiveness while supportingdiverse data types and access patterns.
This roundtable explores modern data storage architectures including object storage strategies, data lake implementations, and approaches to managing unstructured data at scale. We’ll discuss data tiering strategies, cross-cloud data replication, and techniques for optimizing storage costs without sacrificing performance.
Key areas include backup and recovery strategies for cloud-native applications, data protection in distributed environments, and approaches to managing data lifecycle policies across multiple storage tiers.
MAY

Cloud-Native
App Development
Location: Seattle
Cloud-native development practices have transformed how organizations build and deploy applications, but implementation complexity increases with scale. Organizations need strategies for managing containerized applications, serverless architectures, and microservices that deliver on the promise of improved agility and scalability.
This roundtable examines practical cloud-native development strategies including container orchestration with Kubernetes, serverless architecture patterns, and approaches to managing distributed applications. We’ll discuss service mesh implementations, API gateway strategies, and techniques for maintaining observability in complex microservices environments.
Discussion topics include developer productivity platforms, continuous deployment strategies, and approaches to managing application performance across distributed architectures.
JUNE

Network Security & SASE Implementation
Location: Chicago
Secure Access Service Edge (SASE) represents a fundamental shift innetwork security architecture, converging networking and security functions to support distributed workforces and cloud-first applications. Organizations need practical implementation strategies that provide security without compromising user experience or network performance.
This roundtable focuses on SASE implementation strategies including network architecture design, security service chaining, and approaches to managing distributed network policies. We’ll examine zero trust network access (ZTNA) deployments, secure web gateway implementations, and techniques for maintaining network visibility in hybrid environments.
Key topics include network performance optimization, user experience management in security-first architectures, and approaches to managing network costs in SASE deployments.
Q3 2026.
JULY

Threat Detection & Security Operations
Location: Washington DC
Modern threat landscapes require security operations that combine automated detection with human expertise to identify and respond to sophisticated attacks. Organizations need security operations center (SOC) strategies that scale with business growth while maintaining effectiveness against evolving threats.
This roundtable examines advanced threat detection strategies including behavioral analytics, threat hunting methodologies, and approaches to managing security data at scale. We’ll discuss security orchestration and automated response (SOAR) implementations, threat intelligence integration, and techniques for reducing alert fatigue while maintaining detection coverage.
Discussion areas include incident response automation, threat modeling approaches, and strategies for measuring and improving security operations effectiveness.
AUGUST

Desktop Virtualization & End User Computing
Location: Miami
Virtual desktop infrastructure (VDI) and desktop-as-a-service (DaaS) deployments have become critical for supporting distributed workforces while maintaining security and IT control. Organizations need strategies for implementing end user computing solutions that provide excellent user experience while simplifying IT management and reducing costs.
This roundtable explores modern VDI implementation strategies including GPU-accelerated virtual desktops, application layering techniques, and approaches to managing user profiles across diverse device types. We’ll discuss cloud-based desktop services, hybrid VDI architectures, and methods for optimizing storage performance in virtual desktop environments.
Key topics include security strategies for virtual desktops, user experience optimization techniques, and approaches to managing VDI costs while supporting diverse user requirements including power users, remote workers, and BYOD scenarios.
SEPTEMBER

Hyper-Converged
Infrastructure & PC
Location: Boston
Hyper-converged infrastructure has matured from niche technology to mainstream enterprise architecture, enabling organizations to simplify data center operations while maintaining performance and scalability. Organizations need strategies for implementing HCI that support diverse workloads while reducing operational complexity and infrastructure costs.
This roundtable examines HCI implementation strategies including workload consolidation approaches, storage optimization techniques, and methods for managing virtual desktop infrastructure (VDI) at scale. We’ll discuss private cloud architectures built on HCI foundations, disaster recovery strategies for converged systems, and approaches to managing hybrid deployments that span HCI and public cloud resources.
Discussion areas include database virtualization on HCI platforms, backup and recovery strategies for converged infrastructure, and techniques for optimizing performance across diverse application workloads.
Q4 2026.
OCTOBER

Backup, Recovery & Business Continuity
Location: Atlanta
Data protection strategies must evolve to support cloud-native applications, distributed architectures, and increasingly sophisticated ransomware threats. Organizations need comprehensive backup and recovery strategies that provide reliable protection while supporting business agility and cost optimization objectives.
This roundtable examines modern data protection strategies including cloud-native backup approaches, immutable storage implementations, and techniques for protecting against ransomware attacks. We’ll discuss recovery testing strategies, business continuity planning, and approaches to managing data protection costs across hybrid and multi-cloud environments.
Key topics include disaster recovery automation, cross-cloud data replication, and strategies for maintaining compliance with data protection regulations while supporting business operations.
NOVEMBER

Multi-Cloud Mgmt. & Cost Optimization
Location: Las Vegas
Multi-cloud strategies require sophisticated management approaches that optimize costs, maintain security, and provide operational efficiency across diverse cloud platforms. Organizations need practical frameworks for managing complexity while leveraging the best capabilities from multiple cloud providers.
This roundtable explores multi-cloud management strategies including cost optimization across providers, workload placement strategies, and approaches to maintaining consistent security policies. We’ll discuss cloud management platforms, automated resource optimization, and techniques for managing vendor relationships in multi-cloud environments.
Discussion areas include data management across clouds, network connectivity strategies, and approaches to maintaining operational visibility in complex multi-cloud architectures.
DECEMBER

