Feedback from Attendees

Upcoming  2017 Events

July 12, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 7, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 19, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 4, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 18, 2017
IT Leadership Strategies
Info
Chicago, IL

Oct. 26, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

Upcoming  2018 Events

Feb. 1, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 20, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Mar. 1, 2018
IT Leadership Strategies
Info
Chicago, IL

Mar. 7, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

April 12, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

May 2, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 15, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

May 31, 2018
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 7, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

June 20-21, 2018
IT PMO/Portfolio Management
Info
Chicago, IL

July 11, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 6, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 18, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 3, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 17, 2018
IT Leadership Strategies
Info
Chicago, IL

Oct. 25, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2018
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 14, 2018
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 29, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 6, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

e-Mail Archiving

Handling Compliance, e-Discovery, Storage Management and Disaster Recovery

March 6, 2008

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

   

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

Given the current economic and legislative climate, most organizations will be called on to produce sensitive documents and provide business information that adheres to regulatory and legislative requirements.
What is your IT strategy for finding and protecting relevant e-mails and documents based on business and federal requirements? How to you handle Compliance, E-discovery, Storage Management and Disaster Recovery?

What You Will Learn

In this one day conference attendees will learn:

  • You will be provided with an understanding of 'How to Handle the E-Mail Management Crisis,' of the following areas and strategies and of tactics to create a framework to protect, store and retrieve critical data on a timely basis, such as:
  • How to manage the problem of E-Mail disaster recovery
  • How to manage complex E-Mail and retention policies
  • How to understand the different interest groups and their perspectives on E-Mail archiving
  • What is the appropriate length of record retention
  • How to comply with E-Discovery requests
  • How to control exchange and notes data growth
  • How to design the right infrastructure to meet compliance regulations
  • How to manage efficiencies in your E-Mail stores in Exchange and Notes
  • How to handle the challenge of explosive PST file growth
  • How to handle uptime of wireless devices
  • Reducing legal risks and storage costs
  • Shrinking the backup time window
  • How to increase user productivity
  • Pitfalls to avoidHow to design an effective BI/PM framework
  • How to make insightful decisions about significant changes in the business and markets
  • How to develop and implement an effective BI Competency Center
  • How to transform coarse data into actionable intelligence
  • How to leverage BI to drive the decisions necessary for the recovery
  • How to calculate baseline metrics for business intelligence
  • How other IT organizations are helping to make business decisions for the extended enterprise
  • How to make processes more agile with BI

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Diamond

9:00am-10:00am

Why or Why Not Archive E-mail – Understanding the Business Drivers and Creating Consensus for Saving E-mail

Mark Diamond, President & CEO, Contoural, Inc.

Industry thought leader Mark Diamond will discuss the business drivers around e-mail archiving, including compliance, litigation readiness, end-user needs and storage costs. He will discuss the best approaches to archiving initiatives, including how IT can build a consensus with legal and other groups around retention policy, as well as the pitfalls to avoid. Additionally, he will discuss case studies, and explore the best practices for saving e-mail.

In this session, attendees will learn the following:

  • Understand the real-world business drivers for e-mail archiving
  • How to build a consensus around policy
  • Best practices for e-mail archiving project management
  • Pitfalls to avoid

10:00am -10:30am - Refreshment Break

Markham

10:30am-11:30am

How to Effectively Design/Refine Your e-Mail Archiving and Information Management Strategy

Matt Markham, Director Compliance Solutions Services, AXS-One

In this current climate the importance of e-Mail Archiving cannot be overstated. The potential for litigation, business loss and reputation risk can be seen by many as the main drivers.
But how do you design an effective strategy that is right for your company?

In this information session attendees will be provided with clear guidance of designing:

  • Retention period for employees in your organization
  • What should our retainment procedures be?
  • What actions should we take if e-mails are destroyed or lost?
  • How do we justify to management the time and resources allocated? What is the ROI?

 

11:30am-12:30pm

e-Discovery: How IT Should Support the New Federal Rules that Govern e-Discovery

Jay Friedman, IT Risk Manager, Large Global Financial Services Company

In December 2006, amendments to the Federal Rules of Civil Procedure (FRCP) changed the landscape on how organizations must produce electronic information for use within litigations. A recent survey identified 90% of those responsible for email services feel that their organizations are not fully prepared to meet the revised Federal rules.

E-mail, like many other forms of electronic information, has quickly become a key technology requested by the courts to support litigations. As the volume of electronic information continues to increase, the cost of retaining and producing these materials also increases. Many organizations are not equipped to help navigate through this painful process and do not understand their responsibilities within the e-Discovery process.

In this session, attendees will learn the following:

  • What are the New Federal Rules of Civil Procedure?
  • What are the consequences if the FRCP are not followed?
  • What steps your IT groups should follow to help support the e-Discovery process?
  • When could computer forensic processes be used within the e-Discovery process?

12:30pm - 1:30pm Luncheon

Fahey

1:30pm-2:30pm

How to Modify the IT Infrastructure to Best Support Information Management & e-Mail Archiving

Michael Fahey, Director, Archiving Solutions, Americas, Hitachi Data Systems

Due to current compliance legislation and legal discovery requirements, IT departments need to be able to manage e-mail archiving so needed information can be located immediately.

In this session attendees will learn:

  • What factors to consider when designing the e-mail archiving infrastructure
  • How to have an e-Mail archiving system that adheres to HIPAA, SEC Rule 17a-4, Sarbanes Oxley and other Regulations
  • How to classify your enterprise architecture and e-Mail infrastructure
  • How to address architecture and address scalability concerns
  • How to improve communication and collaboration through e-mail archiving
  • Information lifecycle management and Data Lifecycle Management (ILM/DLM)
  • How to work through the myriad of issues created by PST Files
  • How to support the secure storage of large archives
  • How to discover, import and block the use of PST files

2:30pm - 3:00pm - Refreshment Break

D'arcy

3:00pm-4:00pm

Before Disaster Hits: The Convergence of DR & e-Mail Archiving

Paul D'Arcy, VP Marketing, MessageOne

In addition to regulatory and business needs your organization must be prepared for natural and physical disasters and the effect it will have on email communication. Should this be part of your company’s DR/BC plan, email management plan or both?

In this session attendees will learn:

  • How to minimize e-mail outages
  • How to shorten the duration of e-mail outages
  • The costs to the enterprise if they do not have a plan
  • Steps to take when the worst happens

Cleary

Cleary

Cleary

Gates

4:00pm-5:00pm

Getting on the Same Page: How IT Departments Should Work with Compliance Officers and Business Executives

Moderator: Mark Samuelson, Consultant, Optimus Solutions
Panelists: Steve Sullivan, Director, IT & Information Security Officer, Central DuPage Hospital,
Patrick J. Cunningham, CRM, Director of Records Management, Motorola Information Protection Services, Motorola, Inc.,
Russ Gates, Dupage Consulting, LLC

Now more than ever IT has to work more closely with other business executives and compliance officers. But how do you accomplish this? How do you best understand what is being asked of you by the other business units and by the legal department? How much information is ‘too much’? How do you articulate what you are providing the executives in terms they can understand?

In this panel discussion attendees will learn from the experiences of several enterprises that will help answer these questions and more.


Conference price: $249 per person.


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)˛, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.