Welcome to the IEEE Key Management Summit 2008
This domain, KeyManagementSummit.com, originally was created to promote the 2008 Key Management Summit that was held in Baltimore, Maryland.
The domain's registration eventually expired. In 2013 the domain was bought and used as a platform to blog about Management Strategies. The newest owners of the domain are showing content from both of the previous iterations to demonstrate that when a domain registration changes owners, the focus of the site often deviates from the previous iteration. Sometime the fit is reasonable, sometimes the content is a stretch, and other times the original purpose of the site has nothing to do with any of the other iterations. In this example the 2013 Blog iteration at least remains within the business field of "management", although it had nothing to do with a summit. We have seen some site's which have changed ownership that are so disparate from the site's url, you have to wonder why the site was bought.
What are your thoughts?
2018 First Iteration of the Domain

PRESS RELEASE
NetApp Presents on Securing Encrypted Data at the IEEE Key Management Summit
Sunnyvale, Calif. September 16, 2008 - NetApp (NASDAQ: NTAP) technical experts will present on key management implications as they apply to file encryption at the IEEE Key Management Summit (KMS) in Baltimore, Maryland on September 23-24, 2008. KMS 2008 is colocated with the IEEE Mass Storage and Systems Technologies conference (MSST).
The IEEE Key Management Summit brings together top companies that develop cryptographic key management for storage devices and the customers that rely on key management to secure their encrypted data. This summit aims to provide clarity to key management by showing how existing products and standards organizations address the problem of interoperability and security.
Session: "Key Management in a Global File Encryption Environment"
Enterprises often have very large geographically distributed namespaces. This presentation will explore challenges in key storage, organization, and distribution as they apply to data protection, retention, and archiving of data held in these repositories.
Speakers: Ravi Kavuri, senior technical director, NetApp
Subhash Sankuratripati, security architect, NetApp
Gaurav Agarwal, key management engineer, NetApp
WHEN & WHERE
Date: Tuesday, September 23, 2008
Time: 4:00 p.m., Eastern Time
Where: Sheraton Inner Harbor
300 South Charles Street
Baltimore, MD 21201
Chair: Matt Ball, M.V. Ball Technical Consulting, Inc.
The IEEE Key Management Summit brings together the top companies that develop cryptographic key management for storage devices with the standards organizations that make interoperability possible and the customers that rely on key management to secure their encrypted data.
With recent legislation, such as California's SB 1386 or Sarbanes-Oxley, companies now have to publicly disclose when they lose unencrypted personal data. To meet this new need for encryption, many companies have developed solutions that encrypt data on hard disks and tape cartridges. The problem is that these data storage vendors need a solution for managing the cryptographic keys that protect the encrypted data.
This summit aims to provide clarity to the key management by showing how existing products and standards organizations address the problem of interoperability and security.
KMS 2008 is co-located with the IEEE Mass Storage and Systems Technologies conference (MSST) in Baltimore, Maryland on September 23-24, 2008.
Deadline for submitting speaking proposals is May 30th, 2008.
KMS 2008 was co-located with the IEEE Mass Storage and Systems Technologies conference (MSST) in Baltimore, Maryland on September 23-24, 2008.
The Key Management Summit focuses more on the technical issues of key management, and is more suitable to those with a technical background.
Prime candidates include:
- Chief Technical Officers (CTO)
- Chief Security Officers (CSO)
- Technical Advisors
- Security Consultants
- Security Engineers
- Standards Developers
+++
Tuesday Schedule
8:00 am - 9:00 Breakfast and Registration
- Welcome from the chair
- (Proposal) NIST key management standards
- (Proposal) NSA
- (Proposal) Key Management using IEEE P1619.3
- (Proposal) Key Management using OASIS EKMI's SKSML
- (Proposal) Key Management using IETF KEYPROV
- RSA Security - Key Management using ANS X9
5:00 pm - 7:00 pm Dinner
7:00 pm - 10:00 pm Social hour
+++
Lodging and Travel
KMS 2008 will be held at the Sheraton Inner Harbor hotel Baltimore, Maryland, USA
Please see the MSST 2008 site for the latest information on booking hotel rooms and registration.
Rooms will cost $219 per night at the group rate, which is a significant discount from the normal rate.
The hotel management has informed us that a major convention for Superman fans is taking place concurrently with our event. As a result, you can expect to see some vibrant displays celebrating the Man of Steel throughout the venue. Don't be surprised if you find yourself engaged in conversation with enthusiastic Superman aficionados during your stay. In fact, you might even discover some great deals on superhero merchandise while you're here! Interestingly, there seems to be a cool connection between our security interests and the world of superheroes - after all, some of the most secure locations are often protected by caped crusaders! A quick note on the weather: it's been a bit chilly lately, so you might notice many convention-goers sporting Superman sweatshirts or hoodies. It's quite a sight to see the hotel lobby filled with a sea of red and blue! We hope you enjoy the unique atmosphere this convention brings to our summit. Who knows, you might even pick up some crime-fighting tips along the way!
~~~~~~~~~~~~~~~~~~~~~~~
2013 Second Iteration of the Domain

Testimonial
"Key Management Summit consistently delivers meaningful workshops to companies, and didn’t disappoint with leadership trainings."
-Cameron A. Caple
STRATEGIES
Management Strategies – Tips for a Well Managed Company
by Admin • April 12, 2013

The most important thing in the overall management of the organization is to clearly understand what management is all about. If the leadership of the organization only administers the official work processes and keep up maintaining a record, that is nothing but a clerical job only or you can say to a large extent that it is a job an admin officer. Contrary to this, what an ideal management expert (not necessarily in academics, he can be professionally experienced manager) thinks of organizational management is totally different.
An organization is an entity that works in the pursuit of some goals, specified by relevant stakeholders, primarily management. Hence, the concept of organizational management becomes pretty clearer to us and we can define it as a process of defining and specifying shared objectives and developing a plan of action to achieve those ones. This is the simplest possible definition of organizational management. Having said that, now we move towards how to manage an organization to achieve its objectives in a coherent manner?
Remember, organizational goals are specified by one or a limited number of individuals, but their achievement requires involvement of the whole system, resources and human beings. Hence, an effective management strategy would be the one, which helps the organization build up a comprehensive plan of action to achieve its goals by utilizing the available resources in the best possible manner.
There are two very important ideas about achievement of the goals, particularly the organizational goals. The first one is acquiring the latest, trendy and up-to-date resources necessary to execute the plan of actions and carrying out the jobs. However, the second one, which is overruled and overlooked most of the time, is, to utilize the already available resources within the organization and its system. This is comparatively cheaper but quicker and more efficient way of organizational development and management.
In short, always bear in mind that the management of the company is nothing but the management of its resources, infrastructure and people. The concept of effective management revolves around financial and people management and those individual, CEOs, leaders and organizations that are the best in managing these two, will lead the market undoubtedly. In order to become a successful organizational manager, you need to find out the best of the talent for your system as well as train the existing staff members.
The idea of a successful organization is not restricted to the one that announces profits at the end of a financial year. Indeed, the organizations that keep their relevant stakeholders satisfied (not happy) are the ones that are ideally best companies in every respect. Managing financial, capital, infrastructure and human resources in alignment with the shared goals is indeed the key to success in short, medium and long-term.
~~~~~~~~~~~~~~~~~~~~~~~
METHODOLOGIES
Change Management Methodologies – The 7 Key Steps in How to Manage Change Successfully
by Admin • April 9, 2013

Change management methodologies are all about process and people – ultimately it’s all about people and processes that work for people.
So, to be blunt – of all the current change management methods, theories and ideas, knowing how to create a step change initiative that addresses this and that actually delivers the benefits – is the only thing in town that really matters…
What are the practical approaches to implementing change that deliver results and reap the benefits?
So, in order to be able to do this, it needs to:
- Be holistic and take a wide perspective.
- Focus you on addressing issues and aspects that otherwise get overlooked.
- [Most importantly] address the people impacts and issues arising as a direct and indirect result of your change initiative.
In considering any step change initiative – in any organisation, in any sector and any location, we need to be asking and seeking answers to these simple questions:
- How am I going to manage all this so that it happens and I succeed?
- How’s it going to be different when I’ve made the change?
- Why am I doing this – how’s it going to benefit me?
- How will I know it’s benefited me?
- Who’s it going to affect and how will they react?
- What can I do to get them “on side”?
- What steps do I have to take to make the changes and get the benefit?
- What are the risks and issues that I’ll have to face?
It is interesting to see that the concept of an emotional journey through a recognisable path of reactions and responses has been recognised and factored in to all modern models of how to manage change. So clearly, taking into account the psychological impacts of change and management of the transitions is key to successfully managing a step change.
And this can only be consistently achieved by addressing all of the key factors that will make it possible. In my view the programme management based model addresses all of these critical areas by focusing on a holistic approach that takes full account of these people issues.
The programme processes of establishing a blueprint of the changed organisation, with clearly defined benefits of change, and thorough attention to the stakeholder mapping and analysis will facilitate the creation of detailed communication strategy that addresses key stakeholder concerns.
Here are the key components of a programme-based approach to leading a step change – as they naturally arise from the answers to the original basic questions that any step change initiative needs to address:
(1) Programme organisation structure – “How am I going to manage [or lead!] all this so that it happens and I succeed?”
(2) Blueprint – “Why am I doing this – how’s it going to be different?”
(3) Benefit profile & management – “How will I know it’s benefited me?”
(4) Stakeholder map – “Who’s it going to affect and how will they react?”
(5) Communications strategy – “What can I do to get them ‘on side’?”
(6) Programme plan and project portfolio – “What steps do I have to take to make the changes and get the benefit of this change?”
(7) Risk log and risk management – “What could go wrong – what are the risks and issues I’ll have to face?”
~~~~~~~~~~~~~~~~~~~~~~~
PLANNING
Organizational Management – Organizational Planning
by Admin • April 7, 2013

In this installment of our guide to organizational management we look at organizational planning…
There is no substitute for proper planning within an organization. The initial plan will generally be a broad organization-wide plan that sets out high-level goals. These can then be made more specific to address different levels of the organization in order to provide clear expectations for each department and employee.
The top management layer of a company must assess the current status of the entity, as well as where the company needs to be. It needs to look at things such as what level of growth, programs, and work will be required to achieve the desired status, and should set out a realistic time frame for doing so, whether it is six months, one or five years, or some other time measurement.
Each division within an organization (e.g. sales, finance, human resources, etc.) is then looked at separately and split into sub-divisions if appropriate (e.g. international sales, payroll, recruitment, etc.). Clear goals are set for each, based on past performance, natural growth, external trends, and comparisons with other, similar organizations. For example, Increase sales by 15%, Reduce 4th quarter costs, Improve employee retention, etc.
After goals have been decided on, the tasks that need to be done to achieve those goals are set, along with the order in which theyll be carried out, and a schedule for when they need to be started on and completed by. Departments, teams or people are then assigned the tasks and made responsible for their completion, dates are set for review, and performance management procedures and put in place.
Done thoroughly, this should result in each member of an organization essentially having a to-do list that represents their needed contributions (directly and indirectly) to the organizations objectives. The goal being to make sure everyone has enough responsibility to challenge them, without so much work that they’ll feel overwhelmed and become demoralized. Its not a guarantee of success, but it reduces the odds of failure.

~~~~~~~~~~~~~~~~~~~~~~~
Management Training News
+++++
+++++
-
Trainers' Training Regarding Management of Forestry and Wilflife Organized in ... - AllAfrica.com
Trainers' Training Regarding Management of Forestry and Wilflife Organized in ...AllAfrica.comAlso speaking on the occasion, Mr. Abraha Gebremeskel, Head of Human Resource Development and Training in the Agriculture Ministry, equally stressed the importance of the training, and called on the trainees to translate the knowledge they acquire into ... […] - Project Management Academy® Launches Weekend Virtual PMP Training Course - PR Web (press release)
Project Management Academy® Launches Weekend Virtual PMP Training CoursePR Web (press release)Project Management Academy® has launched a weekend version of their PMP® training course in virtual instructor format. Allowing those who cannot attend a four-day course to complete the necessary contact hours over two consecutive weekends. […] - Training workshop on lab management organised in Nashik college - Times of India
Training workshop on lab management organised in Nashik collegeTimes of IndiaNASHIK: Guru Gobind Singh Polytechnic successfully completed the MSBTE sponsored five-day training programme on laboratory management training and effective conduction of experiments in laboratory, which were organized by the electrical ... […]
More Background On KeyManagementSummit.com
KeyManagementSummit.com is a fascinating example of how a domain name can evolve across multiple purposes while maintaining a loose thematic connection to its original identity. Initially developed to promote a highly technical cybersecurity conference, the domain later transformed into a platform for publishing business and organizational management content. Today, it stands as a case study in digital lifecycle management, domain repurposing, and the shifting nature of web-based authority.
The site’s history intersects with enterprise cybersecurity, standards development, and later, general business education—making it uniquely positioned at the crossroads of technology and management thought leadership. Understanding KeyManagementSummit.com requires examining both its original role in the cybersecurity ecosystem and its later incarnation as a content-driven blog.
Origins: The IEEE Key Management Summit 2008
The original purpose of KeyManagementSummit.com was to serve as the promotional and informational hub for the IEEE Key Management Summit held in 2008. This event was part of a broader ecosystem of technical conferences organized under the umbrella of the IEEE, one of the most influential professional organizations in engineering and technology.
The summit was co-located with the IEEE Mass Storage Systems and Technologies Conference (MSST), a well-established conference focused on storage technologies, data infrastructure, and enterprise systems. This pairing underscores the importance of key management within the broader context of data storage and protection.
The 2008 summit took place in Baltimore, specifically at the Sheraton Inner Harbor Hotel. The choice of venue reflected the conference’s professional and enterprise-focused audience, as Baltimore has long been a hub for government, defense, and technology-related events.
Purpose and Technical Focus of the Summit
At its core, the IEEE Key Management Summit addressed one of the most critical challenges in cybersecurity: how to securely manage cryptographic keys across distributed systems.
As organizations increasingly adopted encryption technologies in the early 2000s, a new problem emerged—managing the keys used to encrypt and decrypt sensitive data. Without effective key management, even the strongest encryption systems could fail.
The summit brought together:
- Security engineers
- Standards developers
- Enterprise IT leaders
- Cryptography experts
- Vendors of storage and encryption technologies
The goal was to create a collaborative environment where stakeholders could discuss interoperability, security standards, and implementation challenges.
Key topics included:
- Encryption key lifecycle management
- Secure key storage and distribution
- Regulatory compliance requirements
- Integration of key management systems across vendors
- Standardization efforts from organizations like NIST and IETF
These discussions were especially relevant in the context of increasing regulatory pressure. Laws such as California’s data breach notification requirements and the Sarbanes-Oxley Act forced companies to rethink how they handled sensitive data.
Industry Participation and Notable Contributors
One of the defining features of the summit was its strong industry participation. Companies deeply involved in data storage and security contributed expertise and real-world case studies.
A notable example is NetApp, which presented on key management challenges in global file encryption environments. Their session explored issues such as:
- Managing keys across geographically distributed data systems
- Ensuring secure archival and retention processes
- Handling large-scale enterprise storage infrastructures
Speakers from NetApp included technical directors and security architects, reflecting the highly specialized nature of the event.
The summit also featured discussions around emerging standards such as:
- IEEE P1619.3
- OASIS EKMI (Enterprise Key Management Infrastructure)
- IETF KEYPROV
These standards were instrumental in shaping how modern encryption systems handle interoperability and security.
Audience and Professional Relevance
The IEEE Key Management Summit was not a general-interest conference. It was explicitly designed for a technically sophisticated audience.
Typical attendees included:
- Chief Technology Officers (CTOs)
- Chief Security Officers (CSOs)
- Security consultants and engineers
- Standards organization representatives
- Enterprise architects
This focus on high-level professionals contributed to the summit’s reputation as a serious, technically rigorous event. It was less about marketing and more about solving real-world engineering problems.
Event Experience and Cultural Context
While the summit was highly technical, it also reflected the cultural and social aspects of professional conferences.
Attendees participated in:
- Networking sessions
- Social hours
- Collaborative discussions
- Industry dinners
Interestingly, the event coincided with a large fan convention, creating a unique atmosphere where cybersecurity professionals shared space with pop culture enthusiasts. This juxtaposition highlights the diversity of events hosted at major conference venues and adds a human dimension to an otherwise technical gathering.
Domain Expiration and Transition
Following the conclusion of the 2008 summit, the website gradually became inactive. Like many event-specific domains, KeyManagementSummit.com was not maintained long-term once the conference ended.
Eventually, the domain registration expired.
This moment marked a turning point in the site’s history. Rather than disappearing entirely, the domain was acquired by new owners in 2013, initiating its second phase of life.
Second Iteration: Management Strategies Blog
In its new incarnation, KeyManagementSummit.com shifted focus from cybersecurity to general business management.
The site began publishing articles on topics such as:
- Organizational planning
- Change management methodologies
- Leadership strategies
- Resource optimization
While this content was unrelated to cryptographic key management, it retained a thematic connection to the concept of “management.”
The blog positioned itself as a resource for:
- Business leaders
- Managers and executives
- Entrepreneurs
- Organizational consultants
This pivot reflects a common practice in domain reuse: leveraging an existing name that still holds semantic relevance, even if the original purpose has changed.
Content Structure and Editorial Style
The blog iteration of KeyManagementSummit.com adopted a straightforward, educational tone. Articles were typically structured as:
- Explanatory essays
- Step-by-step guides
- Conceptual overviews
Key recurring themes included:
Organizational Management
Articles emphasized the importance of aligning resources, people, and processes to achieve organizational goals. The site highlighted the idea that effective management is not just administrative but strategic.
Change Management
The blog explored methodologies for implementing organizational change, focusing on:
- Stakeholder engagement
- Risk management
- Communication strategies
- Measuring outcomes
Planning and Execution
Content stressed the value of detailed planning, goal-setting, and performance tracking. This aligns with traditional management theory and best practices.
Audience Shift and Accessibility
The transition from a technical conference site to a general management blog significantly broadened the audience.
Where the original site catered to highly specialized professionals, the blog targeted a wider demographic, including:
- Small business owners
- Mid-level managers
- Students of business administration
This shift made the site more accessible but also less distinctive in terms of niche expertise.
SEO, Domain Strategy, and Digital Reuse
From a digital marketing perspective, KeyManagementSummit.com illustrates several important concepts:
Domain Authority and Branding
Even after its original purpose ended, the domain retained value due to:
- Its professional-sounding name
- Its association with a technical conference
- Potential residual backlinks
This made it attractive for repurposing.
Keyword Relevance
The term “management” in the domain name allowed for a relatively smooth transition into business content, even though the original context was cybersecurity.
Content Realignment
The new owners used the domain to publish content that aligned with broader search trends in management and leadership, potentially improving visibility and traffic.
Historical Significance in Cybersecurity
Although the site no longer focuses on cybersecurity, its origins remain significant.
The IEEE Key Management Summit represents an important moment in the evolution of data security practices. During the late 2000s:
- Encryption adoption was accelerating
- Regulatory requirements were increasing
- Standards were still evolving
The summit contributed to shaping industry approaches to key management, which remains a critical component of modern cybersecurity.
Relationship to Broader Industry Trends
The story of KeyManagementSummit.com reflects several broader trends:
Growth of Encryption Technologies
As organizations handle more data, encryption has become essential. Key management remains a cornerstone of secure systems.
Importance of Standards
Collaboration between organizations like IEEE, NIST, and industry players is crucial for interoperability and security.
Domain Lifecycle and Repurposing
The transition from conference site to blog illustrates how domains can be reused and rebranded, often in ways that diverge significantly from their original purpose.
Press, Media, and Industry Coverage
While the site itself does not function as a media outlet, its original event received attention from industry press releases and corporate communications.
Companies used the summit as a platform to:
- Showcase innovations
- Share research findings
- Engage with potential clients and partners
This highlights the role of conferences as both knowledge-sharing forums and marketing opportunities.
Strengths and Limitations of the Website
Strengths
- Unique domain history
- Connection to a respected organization (IEEE)
- Broad appeal in its blog iteration
- Educational content
Limitations
- Lack of continuity between original and current content
- Limited brand recognition in its current form
- Competition from more authoritative management resources
Cultural and Social Significance
KeyManagementSummit.com serves as more than just a website—it is a reflection of how digital assets evolve over time.
It demonstrates:
- The impermanence of online content
- The adaptability of domain names
- The blending of technical and business disciplines
For historians of the internet, it provides a small but meaningful example of how web properties can transition across industries and audiences.
KeyManagementSummit.com is a multifaceted digital artifact that encapsulates the evolution of both technology and online content strategy. From its origins as a hub for a highly specialized cybersecurity conference to its later role as a general management blog, the site illustrates the dynamic nature of the web.
Its story highlights the importance of:
- Cybersecurity and key management in the digital age
- The role of professional organizations like IEEE in advancing technology
- The strategic reuse of domain names in digital marketing
Ultimately, KeyManagementSummit.com stands as a reminder that websites are not static entities. They are shaped by ownership, purpose, and the ever-changing demands of the digital landscape.
