Topics such as succession planning, the information technology security shortage, women in security, protection of digital assets, security of assets, continuation of digital activity and content management, and digital expiration will be discussed, as will digital legacy, digital immortality, and digital resurrection.