Feedback from Attendees

Upcoming  2017 Events

July 12, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 7, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 19, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 4, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 18, 2017
IT Leadership Strategies
Info
Chicago, IL

Oct. 26, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

Upcoming  2018 Events

Feb. 1, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 20, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Mar. 1, 2018
IT Leadership Strategies
Info
Chicago, IL

Mar. 7, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

April 12, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

May 2, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 15, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

May 31, 2018
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 7, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

June 20-21, 2018
IT PMO/Portfolio Management
Info
Chicago, IL

July 11, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 6, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 18, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 3, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 17, 2018
IT Leadership Strategies
Info
Chicago, IL

Oct. 25, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2018
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 14, 2018
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 29, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 6, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Disaster Recovery & Data Protection Strategies

 

November 20, 2008

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

   

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

With the ever increasing dependencies of your enterprise on the IT infrastructure, it is essential that IT departments have a plan to deal with natural and manmade disasters, as well as threats from outside hackers and malcontent employees.

What You Will Learn

In this one day conference attendees will learn:

  • How to Design a Data Protection and Recovery Strategy that Meets Regulatory Requirements
  • How to Determine if Your Current Data Protection and Recovery Strategies are Meeting the Needs of Your Organization
  • How to Leverage Data Management Disciplines to Design a Robust Data Protection and Recovery
  • Framework for Your Specific Organization
  • How to Determine which Data Protection and Recovery Technologies are the Best Fit for Your Organization
  • How Enterprises are Implementing Effective Data Protection and Recovery Strategies
  • How to Get Buy-In for Your Data Protection and Recovery Infrastructure (panel discussion)

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

 

Williams

9:00am-10:00am

How to Define and Implement a Comprehensive Disaster Recovery/Data Protection Plan

Clayton Williams, Jr., Director, Technology Audit, OfficeMax

A comprehensive disaster recovery and data protection plan needs to be your insurance policy against loss of data. Think of it as business protection. It should be easy to understand for all the different stakeholders including IT and the respective business units. But how do you know what you should be protecting and to what level?

In this session attendees will learn:

  • How to define your particular data protection requirements
  • Which areas should receive priority over others?
  • What is your acceptable level of risk/loss?
  • How quickly you need to recover?
  • How to understand equate level of downtime with your organization’s financial exposure

10:00am -10:30am - Refreshment Break

 

Bieschke

10:30am-11:30am

How to Understand, Simplify and Leverage the Different Backup and Replication Techniques

Brian Bieschke, Service Delivery Engineer, UbiStor

There many techniques that organizations can use to protect, backup and recover their data and they each have their pros and cons. How do you determine what techniques and technologies are the best fit for your organization?

In this session attendees will learn detailed information on how to use the following techniques. Pros and cons will be provided with respect to size or organization, level of protection and uptime required and relative cost.

Areas that will be covered include:

  • Traditional backup (Full vs. Incremental vs. Differential)
  • Disk vs. Tape
  • Replication (Remote and local)
  • Deduplication
  • Continuous Data Protection
  • Encryption

 

Cuff

11:30am-12:30pm

How to Effectively Leverage the Complementary Technologies in DR and Archiving Environments

Jim Cuff, Vice President, Strategy, Iron Mountain Digital

The needs for application and data recoverability, application continuity, credible archive practices, and discovery readiness are more urgent than ever. While different technology solutions may be deployed to handle these needs, it is important to understand how these approaches may complement each other.

In this session attendees will learn:

  • How backup and mailbox management solutions work together to reduce backup volume & RTO.
  • The advantages of having email continuity as a “side effect” of your email archive
  • Characteristics of “content addressable storage” and how those affect backup (and access)
  • How file system archiving can help with backup set size, recovery, and server migration

12:30pm - 1:30pm Luncheon

 

Schauver

1:30pm-2:30pm

How to Map Key Metrics: From Your Key Business Processes to the Supporting IT Infrastructure

Dan Schauver, Solutions Architect, Laurus Technologies

While determining a strategy, the disaster recovery and data protection team should reference their organization's business continuity plan which should indicate the key metrics of Recovery Point Objective (RPO) and Recovery Time Objective (RTO) for various business processes (e.g. CRM, Supply Chain, Payroll, etc). The metrics specified for the business processes must then be mapped to the underlying IT systems and infrastructure that support those processes.

In this session attendees will learn:

  • How to map RTO and RPO metrics to the IT infrastructure
  • How to best determine the most suitable recovery and data protection strategy for each system.
  • How to understand the trade-offs between desired level of data protection and the cost associated with it
  • How to articulate the results of the process of mapping RTO an RPO to the infrastructure

2:30pm - 3:00pm - Refreshment Break

 

 

3:00pm-4:00pm

Audience Discussion - DR Experiences

 

In this session attendees will learn from each other about topics such as:

  • Strategies attendees have used in protecting data and preventing disaster in a virtualized environment
  • What is the biggest lesson attendees have learned in living through a DR emergency and what changes were made to the plan afterward?
  • How have attendees chosen DR priorities?
  • Other attendee suggested topics
  • "Challenges of the week"- Attendees will address questions to the rest of the audience, for possible solution, on current DR challenges.

 

Susina

Moore

Anderson

 

Karmik 

4:00pm-5:00pm

How to Develop a Business Case for DR and Data Protection

Moderator: Steve Susina, Director of Marketing, Laurus Technologies
Panelists: Donald Moore, Disaster Recovery, PepsiAmericas,
Darrin Anderson, Project Leader, Metavante
Rick Karmik, IT Systems, Disaster Recovery Analyst, DeVry, Inc.

In this session attendees will learn from a group of seasoned enterprise IT disaster recovery/data protection professionals as to how they have developed a successful business case that has received management’s approval.

Topics that will be addressed include:

  • How to write up the business case
  • What areas to emphasize
  • What areas to avoid discussing
  • How to articulate in language that business leaders can understand

Conference price: $249 per person.


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)˛, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.