Feedback from Attendees

Upcoming  2017 Events

July 12, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 7, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 19, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 4, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 18, 2017
IT Leadership Strategies
Info
Chicago, IL

Oct. 26, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

Upcoming  2018 Events

Feb. 1, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 20, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Mar. 1, 2018
IT Leadership Strategies
Info
Chicago, IL

Mar. 7, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

April 12, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

May 2, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 15, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

May 31, 2018
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 7, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

June 20-21, 2018
IT PMO/Portfolio Management
Info
Chicago, IL

July 11, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 6, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 18, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 3, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 17, 2018
IT Leadership Strategies
Info
Chicago, IL

Oct. 25, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2018
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 14, 2018
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 29, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 6, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Disaster Recovery Business Continuity Data Protection Strategies

Strategies to help protect and recover your organization's most critical data

November 18, 2010

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Bio

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

Backup and Recovery has always been imperative and has taken on an even heightened importance in a tough economy. Access to records, customer data, and competitor information has become even more crucial for companies to survive and move forward in a tough economy.

What You Will Learn

In this one day conference attendees will learn:

  • How to understand, simplify and leverage the different backup and replication techniques
  • How to effectively leverage the complementary technologies in DR and archiving environments
  • How to develop a business case for DR
  • How to do more with less
  • Understanding and acting on the five most important rules for backup and recovery
  • Signs you are headed for a backup disaster
  • How to properly backup data in a VM environment
  • The readiness of online backup for the enterprise

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Gill

9:00am-10:00am

How to Define and Implement a Comprehensive Disaster Recovery/Data Protection Plan

Scott A. Gill, Solutions Architect Manager, Agilysys

 A comprehensive disaster recovery and data protection plan needs to be your insurance policy against loss of data. Think of it as business protection. It should be easy to understand for all the different stakeholders including IT and the respective business units. But how do you know what you should be protecting and to what level?

In this session attendees will learn:

  • How to define your particular data protection requirements
  • Which areas should receive priority over others?
  • What is your acceptable level of risk/loss?
  • How quickly you need to recover?
  • How to understand equate level of downtime with your organizationís financial exposure

10:00am -10:30am - Refreshment Break

 

Susina

10:30am-11:30am

How to Map Key Metrics: From Your Key Business Processes to the Supporting IT Infrastructure

Steve Susina, Director of Marketing, Laurus Technologies

While determining a strategy, the disaster recovery and data protection team should reference their organization's business continuity plan which should indicate the key metrics of Recovery Point Objective (RPO) and Recovery Time Objective (RTO) for various business processes (e.g. CRM, Supply Chain, Payroll, etc). The metrics specified for the business processes must then be mapped to the underlying IT systems and infrastructure that support those processes.

In this session attendees will learn:

  • How to map RTO and RPO metrics to the IT infrastructure
  • How to best determine the most suitable recovery and data protection strategy for each system.
  • How to understand the trade-offs between desired level of data protection and the cost associated with it
  • How to articulate the results of the process of mapping RTO and RPO to the infrastructure

 

Giden

11:30am-12:30pm

How to Understand, Simplify and Leverage the Different Backup and Replication Techniques

Ken Giden, Specialist Solutions Consultant, Hitachi Data Systems

There many techniques that organizations can use to protect, backup and recover their data and they each have their pros and cons. How do you determine what techniques and technologies are the best fit for your organization?
In this session attendees will learn detailed information on how to use the following techniques. Pros and cons will be provided with respect to size or organization, level of protection and uptime required and relative cost.

Areas that will be covered include:

  • Traditional backup (Full vs. Incremental vs. Differential)
  • Disk vs. Tape
  • Replication (Remote and local)
  • Deduplication
  • Continuous Data Protection
  • Encryption

12:30pm - 1:30pm Luncheon

 

Kluger

1:30pm-2:30pm

Virtual Protection: How to Protect Data and Applications in a Virtual Environment

David Kluger, Principal Technology Architect, StorCOM

This session explores and outlines how to apply and manage an effective backup strategy in a virtual server environment that not only effectively protects virtual machines but also the enterprise applications running inside the virtual machine.

In this session you will learn:

  • How to build and deploy an effective backup solution in their virtual environment while achieving
  • How to improve RPO (Recovery Point Objective) and RTO (Recovery Time Objective) of backups
  • How to optimize backup in a virtualized environment
  • How to significantly lower backup windows
  • How to achieve efficient data mobility
  • How to avoid pitfalls

2:30pm - 3:00pm - Refreshment Break

Vallenki

3:00pm-4:00pm

How to Manage Disaster Recovery & Data Protection in the Internal Cloud

Rajesh Vellanki, Program Manager for Private/Enterprise Cloud, Rackspace

While many organizations are moving towards building next-generation internal cloud architectures, not many are prepared to protect their data in these new environments. How do you prepare for it and what questions should you be asking as it relates to data protection?
In this session attendees will learn best practices and questions you should ask your cloud provider.

Areas that will be covered include:

  • How to securely manage data in an internal cloud environment.
  • How to make sure your processes meet the requirements of the business for your production applications.
  • How internal cloud computing architectures impact your DR plans.
  • What type of cloud approach is best for your organization when factoring in disaster recovery and data protection?
  • What are the disaster recovery plans of the cloud provider?

 

Ruch

Gabriel

Risner

Sumar

VonderHeide

Wethers

4:00pm-5:00pm

How to Develop a Business Case for DR and Data Protection

Moderator: J. Todd Ruch, Channel Manager, i365
Panelists will include:
Michael Gabriel, Director-Data Protection Practices, Integralis; former CISO,
Career Education Corporation
Lucy Risner, MBCP, PMP, CPCU, Zurich North America Business Continuity
Annur Sumar, Infrastructure Architect, Duff & Phelps
Daniel M. Vonder Heide, Director, Information Technology Services, Loyola University Chicago
Hasan B. Wethers, CBCP, CORS, Business Continuity Program Manager, Sidley Austin
and other professionals from IT departments sharing experiences and lessons learned

In this session attendees will learn from a group of seasoned enterprise IT disaster recovery/data protection professionals as to how they have developed a successful business case that has received managementís approval.

Topics that will be addressed include:

  • How to write up the business case
  • What areas to emphasize
  • What areas to avoid discussing
  • How to articulate in language that business leaders can understand
  • How to make sure your plan cover current technologies as well as potential new technologies

Conference price: $249 per person.


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)≤, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.