Wish List (20)

March 2026

Day 2: AV/IT Interoperability

Featuring

Min Leads

250

Open Slots

4

You've completed the installation and everything is running smoothly—until it's not. "Day 2" explores how to mitigate interoperability issues once a new firmware is pushed out or a new device gets added to the AV/IT network. We address whether networked AV should be on its own dedicated network.

+ An update on AV standards and protocols

+ What's new in Dante

+ The security talk

+ Wi-Fi 7

+ What AV folks need to know about IT

+ What IT folks need to know about AV

May 2026

Security Automation: Tips, Tricks, and Tools for Better Security

Featuring

Min Leads

400

Open Slots

6

"As cyber threats grow in speed and complexity, manual processes are no longer enough to keep organizations protected. Security automation has become essential for reducing response times, minimizing human error, and allowing IT teams to focus on higher-value work. From automating repetitive tasks to orchestrating complex incident response, organizations are actively exploring solutions that strengthen security while improving efficiency. This EcoCast provides your company with the opportunity to engage directly with IT buyers and influencers who are seeking actionable insights and proven technologies to advance their automation strategies. By sponsoring, your organization can highlight how its solutions help enterprises accelerate detection and response, streamline operations, and improve overall resilience. Attendees will be evaluating practical tools and real-world best practices that make automation achievable and impactful in everyday security operations. Sponsorship places your brand in front of decision-makers eager to invest in smarter, faster defenses.

Vendor Fit
Ideal sponsors include SOAR providers, SIEM vendors, AI-driven security platforms, managed detection and response providers, and automation tool vendors focused on security operations."

Supercharging IT Summit

Featuring

Min Leads

800

Open Slots

8

"IT organizations are being asked to do more than ever—deliver higher performance, embrace cloud innovation, strengthen security, empower users, and integrate artificial intelligence into daily operations—all while managing tighter budgets and leaner teams. Leaders are seeking solutions that supercharge efficiency, resilience, and agility across every layer of IT, from infrastructure and applications to security and data management. This MegaCast provides your company with the opportunity to connect directly with IT buyers and influencers who are actively evaluating the tools, services, and strategies that will power their organizations into 2026 and beyond. By sponsoring, your organization can demonstrate how it helps enterprises accelerate transformation, reduce complexity, and achieve more with less. Attendees will be exploring proven approaches to automation, AI adoption, cloud optimization, observability, cybersecurity, and data protection. Sponsorship ensures your brand is front and center with decision-makers looking for the next generation of IT innovation.

Vendor Fit
This event is an ideal platform for any provider of IT solutions or services."

June 2026

Remote Production: Live Events & Awards Shows

Featuring

Min Leads

150

Open Slots

4

Remote production is transforming the way live events are produced. In this session, we'll explore how broadcasters are using IP networks and cloud technologies to streamline production, reduce costs, and increase flexibility without sacrificing quality.

Featured Guest: Dan Turk, CTO, NEP Group

Protecting Your Data: A Holistic Approach to Data Security, Data Loss, PII Protection, and More

Featuring

Min Leads

400

Open Slots

6

"Enterprises today face relentless pressure to protect sensitive data from theft, loss, misuse, and regulatory non-compliance. From intellectual property and customer records to personally identifiable information (PII), the risks extend across on-premises systems, cloud services, and distributed workforces. IT leaders are actively searching for integrated strategies that combine strong prevention, rapid detection, and reliable recovery. This EcoCast gives your company the opportunity to connect with an engaged audience of IT buyers and influencers who are evaluating the next generation of tools and services to safeguard critical data assets. By sponsoring, your organization can demonstrate how its solutions deliver holistic protection—combining encryption, access controls, monitoring, backup, and compliance automation into unified approaches. Attendees will be exploring proven methods that reduce exposure, streamline governance, and ensure data remains both secure and accessible. Sponsorship ensures your brand is front and center with decision-makers prioritizing investments in data security.

Vendor Fit
Best suited for data security vendors, data loss prevention (DLP) providers, compliance and privacy specialists, backup and recovery innovators, and cloud security platforms."

AI Strategies to Optimize Stock and Supply Chain Operations

Featuring

Min Leads

250

Open Slots

4

"Join our panel to discuss how AI applications transform inventory management and demand forecasting, enabling retailers to reduce stockouts, overstock situations and anticipate future demand spikes, ensuring product availability and efficiency. As an expert, help us teach how to leverage predictive analytics software and AI applications to improve operations.

Target Audience: Supply chain directors, inventory managers, operations managers/directors, logistics and warehouse managers"

July 2026

Securing Identity with Passwordless Authentication

Featuring

Min Leads

400

Open Slots

6

Passwords have long been the weakest link in enterprise security, fueling phishing attacks, credential theft, and user frustration. Organizations are increasingly turning to passwordless authentication methods—such as biometrics, hardware keys, and mobile-based authenticators—to strengthen identity security while improving the user experience. IT buyers and influencers are actively exploring these solutions to align with zero trust strategies, reduce risk, and simplify access management. This EcoCast gives your company the opportunity to showcase its expertise directly to an engaged audience making critical investments in identity security. By sponsoring, your organization can demonstrate how its solutions help enterprises replace passwords with stronger, more convenient authentication methods. Attendees will be evaluating technologies that deliver seamless login experiences, reduce administrative overhead, and protect sensitive systems against evolving threats. Sponsorship ensures your brand is front and center with decision-makers committed to advancing their identity and access management programs.

Vendor Fit
Ideal sponsors include identity and access management vendors, passwordless authentication providers, multi-factor authentication platforms, biometric security companies, and zero trust solution providers.

Securing the Enterprise with Endpoint Protection Platforms

Featuring

Min Leads

400

Open Slots

6

With endpoints serving as the front line for cyberattacks, enterprises need advanced defenses to protect against malware, ransomware, phishing, and other evolving threats. Endpoint protection platforms (EPPs) now go far beyond traditional antivirus—integrating threat intelligence, behavioral analysis, machine learning, and automated response capabilities to safeguard users and data wherever they work. IT buyers and influencers are actively seeking solutions that simplify endpoint security while strengthening resilience across diverse devices and environments. This EcoCast provides your company the opportunity to present directly to decision-makers who are prioritizing endpoint protection as a critical part of their security strategy. By sponsoring, your organization can showcase how its solutions prevent, detect, and respond to endpoint threats with speed and precision. Attendees will be evaluating tools that unify endpoint security, streamline management, and deliver measurable improvements to enterprise protection. Sponsorship ensures your brand is in front of organizations ready to modernize their endpoint defenses.

Vendor Fit
Best suited for endpoint protection platform vendors, EDR/XDR providers, managed detection and response services, and security companies delivering advanced endpoint defense.

August 2026

Cloud Security Fest 2026!

Featuring

Min Leads

800

Open Slots

8

Cloud adoption continues to accelerate, but with it comes new risks—from misconfigurations and compliance gaps to ransomware, identity breaches, and API vulnerabilities. IT leaders are urgently seeking innovative approaches to secure multicloud and hybrid environments without slowing business agility. This MegaCast offers your company the chance to showcase its solutions to an engaged audience of IT buyers and influencers who are actively exploring the next generation of cloud security tools and strategies. By sponsoring, your organization can demonstrate how its technologies and services deliver stronger visibility, governance, and protection across cloud platforms. Attendees will be evaluating proven approaches for identity security, workload protection, compliance automation, and AI-enhanced defenses. Sponsorship ensures your brand is highlighted directly in front of decision-makers who are prioritizing cloud security as a top investment for 2026 and beyond.

Vendor Fit
Best suited for cloud security vendors, identity and access management providers, compliance and governance platforms, workload protection specialists, and managed cloud security service providers.

September 2026

Zero Trust: What Does It Take to Get It Right?

Featuring

Min Leads

400

Open Slots

4

Zero Trust has become a necessity, but many companies struggle to move from concept to execution. Do you have what it takes to get zero trust right and offer practical advice on the steps and technologies needed to build (or refine) an effective Zero Trust strategy?

Target Audience: IT security managers/architects, CISOs, infrastructure managers, risk managers

Exploring the Intersection of Data, Storage, and Artificial Intelligence

Featuring

Min Leads

200

Open Slots

6

The relationship between data, storage, and artificial intelligence is quickly becoming one of the most important areas for IT leaders to understand. From ensuring high-performance access to massive datasets, to enabling AI-driven automation and analytics, organizations are rethinking how storage and data strategies work hand-in-hand with emerging AI initiatives. This Expert Series event from ActualTech Media gives your company the opportunity to reach an engaged audience of IT buyers and influencers who are actively exploring this critical intersection. An expert speaker provided by ActualTech Media will deliver the content, covering practical approaches for managing, securing, and optimizing data and storage infrastructures to support AI-driven innovation. As a sponsor, your role is simple: provide a single slide and a brief message. We'll manage the rest, ensuring your brand is recognized by decision-makers investing in next-generation data and AI solutions.

Vendor Fit
Best for storage providers, data management vendors, and AI infrastructure companies seeking visibility with IT decision-makers.

Elevating Retail Shopping Experience With AI-Powered Visual Search

Featuring

Min Leads

250

Open Slots

4

Shopper expectations for seamless product discovery are rapidly evolving. Help us explore how AI-driven visual search and image recognition enhance user experience, product findability and engagement in the shopping journey by allowing customers to upload photos.

Target Audience: Ecomnmerce managers, digital merchandising, UX /UI designers and product managers

Best Practices Series: Implementing Advanced Threat Detection

Featuring

Min Leads

400

Open Slots

6

Cyberattacks are becoming more sophisticated, faster, and harder to detect using traditional defenses. Enterprises need advanced detection capabilities that leverage automation, analytics, and threat intelligence to identify suspicious activity before it escalates into full-blown incidents. IT buyers and influencers are actively evaluating tools and strategies that strengthen detection across networks, endpoints, cloud services, and identities. This EcoCast provides your company with the opportunity to showcase its expertise to an engaged audience of decision-makers who are making critical investments in advanced security solutions. By sponsoring, your organization can highlight how its technologies improve visibility, shorten response times, and reduce risk. Attendees will be exploring proven approaches that integrate SIEM, XDR, AI-powered analytics, and automation into cohesive detection strategies. Sponsorship ensures your brand is positioned in front of IT professionals committed to elevating their security capabilities.

Vendor Fit
Ideal sponsors include SIEM and XDR vendors, threat intelligence providers, MDR and SOC service providers, and AI-driven security analytics platforms.

October 2026

Turning Your Log and Incident Data into Real-time Security Insights

Featuring

Min Leads

400

Open Slots

6

Security teams are drowning in logs and incident data, yet many still struggle to transform that raw information into actionable intelligence. With threats evolving rapidly, organizations need tools that provide real-time visibility, automated correlation, and meaningful insights to accelerate detection and response. IT buyers and influencers are actively seeking solutions that help them cut through the noise, improve efficiency, and strengthen their defenses. This EcoCast provides your company with the opportunity to showcase its expertise to a highly engaged audience looking for technologies that maximize the value of their security data. By sponsoring, your organization can demonstrate how its solutions deliver real-time analytics, streamline investigations, and provide actionable intelligence that reduces risk. Attendees will be exploring strategies and tools that integrate SIEM, XDR, threat intelligence, and automation to achieve smarter, faster security operations. Sponsorship ensures your brand is positioned directly in front of decision-makers making critical investments.

Vendor Fit
Best suited for SIEM and XDR providers, security analytics platforms, threat intelligence vendors, and automation tool providers focused on real-time detection and response.

Hypersonalization at Scale, Delivering Immersive Experiences

Featuring

Min Leads

150

Open Slots

4

Moving beyond basic personalization, this panel will explore the art and science of hyper-personalization at scale. Discover how marketers can leverage AI, real-time data and advanced analytics to deliver individualized immersive experiences across every customer touchpoint. Our panel will explore strategies for dynamic content optimization, personalized product recommendations and tailored customer journeys that drive engagement, loyalty and conversions. Industry leaders will discuss overcoming technical challenges and achieving meaningful personalization that resonates with individual consumers.

Target Audience: Customer experience leaders, CRM specialists, PMOs, automation specialists

Protecting and Optimizing Team Collaboration Software: Keeping Slack, Teams, Google and Other Users and Data Safe

Featuring

Min Leads

200

Open Slots

6

Collaboration platforms like Slack, Microsoft Teams, and Google Workspace have become essential to business productivity—but they also present new avenues for cyberattacks, data loss, and compliance risks. IT leaders are under pressure to secure these tools without slowing down communication or user experience. This Expert Series event gives your company the opportunity to connect with an engaged audience of IT buyers and influencers who are actively seeking solutions for protecting and optimizing their collaboration environments. An expert speaker provided by ActualTech Media will deliver the session, sharing best practices for safeguarding users, data, and integrations while ensuring reliable performance. As a sponsor, your participation is simple: provide one slide and a short message. We'll take care of the rest, ensuring your brand is recognized by decision-makers focused on securing collaboration platforms.

Vendor Fit
Best for security vendors, SaaS protection providers, and compliance-focused companies supporting collaboration platforms.

Transforming Backup and Disaster Recovery with AI and Emerging Techniques

Featuring

Min Leads

400

Open Slots

6

Traditional backup and disaster recovery strategies are no longer enough to protect against today's evolving threats and complex IT environments. Organizations now demand solutions that incorporate artificial intelligence, automation, immutability, and other advanced techniques to ensure data resilience and business continuity. IT buyers and influencers are actively exploring tools that reduce recovery times, improve detection of anomalies, and strengthen protection against ransomware and outages. This EcoCast gives your company the opportunity to present directly to decision-makers who are evaluating the next generation of backup and disaster recovery solutions. By sponsoring, your organization can showcase how its technologies harness AI and emerging innovations to deliver smarter protection and faster recovery. Attendees will be seeking practical, proven approaches to simplify management, strengthen resilience, and safeguard critical systems. Sponsorship ensures your brand is visible to enterprises prioritizing modern data protection strategies.

Vendor Fit
Ideal sponsors include backup and recovery providers, AI-driven data protection vendors, cloud storage innovators, disaster recovery as a service (DRaaS) providers, and cybersecurity firms focused on resilience.

AV/IT Manager Higher Ed Classroom AV Roundtable

Featuring

Min Leads

250

Open Slots

4

AV Technology invites six AV/IT technology managers from various colleges and universities to discuss classroom AV challenges and successes.

+ What new classroom tech have they installed that is making a difference?

+ What new tech are they planning for next year?

+ The enrolment cliff. Real or not?

+ Best practices for instructor training?

+ AI, AR, VR, AND XR

It is not a requirement, but sponsors can suggest an AV/IT manager from a specific university.

This panel will be end-users only.

November 2026

Building a Robust Security Awareness Program

Featuring

Min Leads

400

Open Slots

6

Human error remains one of the leading causes of security incidents, making employee awareness a critical layer of defense. From phishing attacks and credential theft to insider threats, organizations need structured programs that educate users, change behaviors, and reinforce security best practices. IT buyers and influencers are actively seeking solutions that combine engaging training, continuous reinforcement, and measurable outcomes to reduce risk. This EcoCast provides your company with the opportunity to showcase its expertise to decision-makers who are prioritizing security awareness as part of their overall defense strategy. By sponsoring, your organization can highlight how its solutions improve user resilience, strengthen compliance, and create a security-first culture. Attendees will be evaluating practical tools and services that help enterprises reduce vulnerability, improve reporting, and drive lasting behavioral change. Sponsorship ensures your brand is positioned directly in front of organizations investing in awareness and training.

Vendor Fit
Ideal sponsors include security awareness training vendors, phishing simulation platforms, compliance training providers, and managed security service providers focused on user education.

December 2026

Higher Ed UC&C: Beyond the Classroom

Featuring

Min Leads

250

Open Slots

4

Some colleges and universities have a larger footprint than many corporate enterprises but have unique needs for unified communications and collaboration.

Offices and meeting spaces for administration and instructors must be equipped for collaboration across campus and accommodating hybrid workers. Public spaces are often used for ad hoc lessons and study with engaging video walls, and wayfinding has become a staple on many campuses.

+ Critical UC systems link virtually every communications device

+ The higher-ed meeting space

+ Mobile device for emergency alerts throughout every space within the campus.

+ Mitigating security vulnerabilities

+ Deploy, manage, and monitor