Feedback from Attendees

Upcoming  2017 Events

July 12, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 7, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 19, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 4, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 18, 2017
IT Leadership Strategies
Info
Chicago, IL

Oct. 26, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

Upcoming  2018 Events

Feb. 1, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 20, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Mar. 1, 2018
IT Leadership Strategies
Info
Chicago, IL

Mar. 7, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

April 12, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

May 2, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 15, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

May 31, 2018
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 7, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

June 20-21, 2018
IT PMO/Portfolio Management
Info
Chicago, IL

July 11, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 6, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 18, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 3, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 17, 2018
IT Leadership Strategies
Info
Chicago, IL

Oct. 25, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2018
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 14, 2018
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 29, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 6, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Disaster Recovery Business Continuity Data Protection Strategies

Strategies to enhance your backup/recovery environment

November 19, 2009

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

   

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

With the ever increasing dependencies of your enterprise on the IT infrastructure, it is essential that IT departments have a plan to deal with natural and manmade disasters, as well as threats from outside hackers and malcontent employees.

What You Will Learn

In this one day conference attendees will learn:

  • How to understand, simplify and leverage the different backup and replication techniques
  • How to effectively leverage the complementary technologies in DR and archiving environments
  • How to develop a business case for DR
  • How to do more with less
  • Understanding and acting on the five most important rules for backup and recovery
  • Signs you are headed for a backup disaster
  • How to properly backup data in a VM environment
  • The readiness of online backup for the enterprise

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Benton

9:00am-10:00am

How to Define and Implement a Comprehensive Disaster Recovery/Data Protection Plan

Dick Benton, Principal Consultant, GlassHouse Technologies, Inc.

A comprehensive disaster recovery and data protection plan needs to be your insurance policy against loss of data.  Think of it as business protection. It should be easy to understand for all the different stakeholders including IT and the respective business units.  But how do you know what you should be protecting and to what level?

In this session attendees will learn:

  • How to define your particular data protection requirements
  • Which areas should receive priority over others?
  • What is your acceptable level of risk/loss?
  • How quickly you need to recover?
  • How to understand equate level of downtime with your organizationís financial exposure

10:00am -10:30am - Refreshment Break

Wenk

10:30am-11:30am

How to Map Key Metrics: From Your Key Business Processes to the Supporting IT Infrastructure   

Dennis Wenk, Independent DR/BC Consultant, Industry Thought Leader

While determining a strategy, the disaster recovery and data protection team should reference their organization's business continuity plan which should indicate the key metrics of Recovery Point Objective (RPO) and Recovery Time Objective (RTO) for various business processes (e.g. CRM, Supply Chain, Payroll, etc). The metrics specified for the business processes must then be mapped to the underlying IT systems and infrastructure that support those processes.

 

In this session attendees will learn:

  • How to map RTO and RPO metrics to the IT infrastructure
  • How to best determine the most suitable recovery and data protection strategy for each system.
  • How to understand the trade-offs between desired level of data protection and the cost associated with it
  • How to articulate the results of the process of mapping RTO and RPO to the infrastructure

Peebles

11:30am-12:30pm

How to Understand, Simplify and Leverage the Different Backup and Replication Techniques 

Mike Peebles, Product Marketing Manager, Hewlett-Packard

There many techniques that organizations can use to protect, backup and recover their data and they each have their pros and cons.  How do you determine what techniques and technologies are the best fit for your organization?

In this session attendees will learn detailed information on how to use the following techniques.  Pros and cons will be provided with respect to size or organization, level of protection and uptime required and relative cost.

Areas that will be covered include:

  • Traditional backup (Full vs. Incremental vs. Differential)
  • Disk vs. Tape
  • Replication (Remote and local)
  • Deduplication
  • Continuous Data Protection
  • Encryption

12:30pm - 1:30pm Luncheon

Kluger

1:30pm-2:30pm

Virtual Protection: How to Protect Data and Applications in a Virtual Environment

Dave Kluger, Principal Technology Architect, StorCOM

This session explores and outlines how to apply and manage an effective backup strategy in a virtual server environment that not only effectively protects virtual machines but also the enterprise applications running inside the virtual machine.

In this session you will learn:

  • How to build and deploy an effective backup solution in their virtual environment while achieving
  • How to improve RPO (Recovery Point Objective) and RTO (Recovery Time Objective) of backups
  • How to optimize backup in a virtualized environment
  • How to significantly lower backup windows
  • How to achieve efficient data mobility
  • How to avoid pitfalls

2:30pm - 3:00pm - Refreshment Break

DeVito

Janssen

Shotts

Warner

3:00pm-4:00pm

How to Manage Disaster Recovery & Data Protection in the Internal Cloud

Moderator: 
Michael DeVito, Sr. Business Development Executive, LSI Corporation
Panelists:
Thomas F. Janssen, Director of IT, Business Continuity and Disaster Recovery, Horace Mann Insurance 
Deborah Shotts, IT Disaster Recovery, State of Illinois

Scott Warner, Manager Technical Operations, Hart Schaffner Marx
and other 
professionals from enterprise IT departments with disaster recovery and data protection experiences

In this session attendees will learn from a group of seasoned enterprise IT disaster recovery/data protection professionals as to how they have developed a successful business case that has received managementís approval.

Topics that will be addressed include:

  • How to write up the business case
  • What areas to emphasize
  •   What areas to avoid discussing
  • How to articulate in language that business leaders can understand
  • How to make sure your plan cover current technologies as well as potential new technologies

Wiseman

Pancini

Tibbals

4:00pm-5:00pm

How to Develop a Business Case for DR and Data Protection

Moderator:
David Wiseman, Director Business Development,
Sybase, an SAP Company
Panelists will include:
Jerry Pancini, Manager, Business Intelligence, Stericycle
Tim Tibbals, Director, Enterprise Architecture, Baxter Credit Union
and other professionals from IT/BI departments

In this session attendees will learn from a group of seasoned enterprise IT disaster recovery/data protection professionals as to how they have developed a successful business case that has received managementís approval.

Topics that will be addressed include:

  • How to write up the business case
  • What areas to emphasize
  • What areas to avoid discussing
  • How to articulate in language that business leaders can understand
  •  How to make sure your plan cover current technologies as well as potential new technologies

Conference price: $249 per person.


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)≤, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.