601  |  In Person Training  |  Update  |  Scheduled

Lunch + Learn - Cloud Migration Strategies That Really Work

Tuesday, August 20, 2019 11:30am - 1:00pm

Download to calendar

Whether you believe (as many IT analysts do) that the end of the traditional datacenter is near or you are simply investigating ways to keep your organization modern, cloud computing has likely caught your attention. What applications work well in the cloud, and when will it be time to move there? Which cloud do you pick, and what is the first step? This presentation will help you begin thinking through your options as you consider cloud migration.

Lunch + Learn Programs: Lunch is included as part of the registration fee for the Lunch + Learn programs. Food will be served at 11:30am, and the CPE program will begin at 12:00pm. Lunch + Learn programs will be held the third Tuesday, every other month (unless otherwise noted), and are sponsored by the Members in Industry Committee.

SIMULCAST: Can't make it in person? Join us via simulcast.


  • Taking stock and selecting targets for migration
  • Planning the steps of migration and getting ready for moving day


Designed For

OSCPA members and other accounting staff, specifically those who work in business or industry.

Your Price: $35.00

This is your base price and does not reflect any additional session fees, optional add-ons, or guest registrations.

Members log in and save $10.00 on this event. Not a member? join today.


Bob Simpson

Bob Simpson, CISSP, GCIA, GCIH, GPEN, is the creator of GhostSentry, an access control and compliance firewall and CIO for Finley & Cook, PLLC, a private accounting firm where he has served for 11 years. Before that, Simpson was Security Architect for the Oklahoma Department of Human Services. He is a member of the SANS Advisory board and InfraGard.

Simpson is passionate about spreading the knowledge and skills necessary to face today's security landscape with confidence. He has spoken at DEF CON Wall of Sheep, BSides, the Oklahoma Cyber Terrorism Summit, Information Warfare Summit and at dozens of regional events. He has a background in large complex infrastructure such as telecom service providers but has dedicated the past 15 years to information security.

Register for this course