Feedback from Attendees

Upcoming  2015 Events

Oct 21, 2015
IT Leadership Strategies

Info

Oct 28, 2015
Cloud Computing Strategies
Info

Nov 4-5, 2015
IT PMO/Portfolio Management
Info

Nov 19, 2015
Software Defined Networking (SDN)
Info

Dec 3, 2015
Business Intelligence/Big Data/Analytics
Info

Dec 10, 2015
Mobile/Cloud/IoT Security
Info

Upcoming  2016 Events

Feb 4, 2016
Enterprise Risk/Security Management
Info
Dallas, TX

Feb 18, 2016
Enterprise Risk/Security Management
Info
Chicago, IL

Feb 29-Mar 1, 2016
IT PMO/Portfolio Management
Info
Las Vegas, NV

March 10, 2016
IT Leadership Strategies
Info
Chicago, IL

March 17, 2016
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

April 20, 2016
Data Governance Strategies
Info
Chicago, IL

April 26, 2016
Mobile/Cloud/IoT Security
Info
Chicago, IL

May 19, 2016
Digital Workplace Strategies
Info
Chicago, IL

May 25, 2016
Software Defined Networking (SDN)
Chicago, IL
Info

June 2, 2016
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

June 9, 2016
Enterprise Risk/Security Management
Info
Chicago, IL

June 23-24, 2016
IT PMO/Portfolio Management
Info
Chicago, IL

Sep 15, 2016
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sep 22, 2016
Enterprise Risk/Security Management
Info
Dallas, TX

Oct 6 , 2016
Enterprise Risk/Security Management
Info
Chicago, IL

Oct 20, 2016
IT Leadership Strategies
Info
Chicago, IL

Oct 27, 2016
Data Governance Strategies
Info
Chicago, IL

Nov 2-3, 2016
IT PMO/Portfolio Management
Info
Dallas, TX

Nov 17, 2016
Software Defined Networking (SDN)
Chicago, IL
Info

Dec 1, 2016
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec 8, 2016
Mobile/Cloud/IoT Security
Info
Chicago, IL

 

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

e-Mail Archiving

Strategies to help design, implement and manage your e-mail environment and infrastructure to meet the needs of government legislation, and business

October 21, 2010

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Bio   

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

Given the current economic and legislative climate, most organizations will be called on to produce sensitive documents and provide business information that adheres to regulatory and legislative requirements.

What is your IT strategy for finding and protecting relevant e-mails and documents based on business and federal requirements? How to you handle Compliance, e-Discovery, Storage Management and Disaster Recovery?

What You Will Learn

In this one day conference attendees will learn:

  • Understand the business drivers and creating consensus for saving E-mail
  • Work through e-discovery challenges: What is IT's role and how IT can help ease the organization's burden
  • Design and implement a well thought out E-mail archiving project
  • Implement an effective infrastructure to support the E-Mail archiving strategy
  • Work with compliance officers and business executives
  • Avoid pitfalls from the experiences of other enterprise IT departments

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Diamond

9:00am-10:00am

Why or Why Not Archive E-mail Understanding the Business Drivers and Creating Consensus for Saving E-mail

Mark Diamond, President & CEO, Contoural, Inc.

Industry thought leader Mark Diamond will discuss the business drivers around E-mail archiving, including compliance, litigation readiness, end-user needs and storage costs. He will discuss the best approaches to archiving initiatives, including how IT can build a consensus with legal and other groups around retention policy, as well as the pitfalls to avoid. Additionally, he will discuss case studies, and explore the best practices for saving E-mail.

In this session, attendees will learn the following:

  • Understand the real-world business drivers for E-mail archiving
  • How to build a consensus around policy
  • Pitfalls to avoid

10:00am -10:30am - Refreshment Break

Murphy

10:30am-11:30am

e-Discovery: How IT Should Support the Federal Rules that Govern e-Discovery

Barry Murphy, Founding Principal, eDiscovery Journal

Amendments to the Federal Rules of Civil Procedure (FRCP) changed the landscape on how organizations must produce electronic information for use within litigations. A recent survey identified 90% of those responsible for E-mail services feel that their organizations are not fully prepared to meet the revised Federal rules.

E-mail, like many other forms of electronic information, has quickly become a key technology requested by the courts to support litigations. As the volume of electronic information continues to increase, the cost of retaining and producing these materials also increases. Many organizations are not equipped to help navigate through this painful process and do not understand their responsibilities within the e-Discovery process.

In this session, attendees will learn the following:

  • What are the New Federal Rules of Civil Procedure?
  • What are the consequences if the FRCP is not followed?
  • What steps your IT groups should follow to help support the e-Discovery process?
  • When could computer forensic processes be used within the e-Discovery process?

Susina

11:30am-12:30pm

Moving the Project Forward: How to Navigate Around Internal Challenges

Steve Susina, Director of Marketing, Laurus Technologies, Inc.

Once you have made the decision to move forward with E-mail archiving you need a well thought out plan to handle some of the challenges you may encounter.

In this session attendees will learn:

  • How to develop a committee
  • How to speak in terms that other departments can understand
  • The need for balance between litigation readiness, compliance, and efficiency
  • How to gather requirements
  • How to navigate around internal and economic challenges

12:30pm - 1:30pm Luncheon

Burton

1:30pm-2:30pm

E-mail Archives Do You Need to Change, Merge or Move?

Walt Burton, Director of Client Services, Bishop Technologies

A decade ago, organizations were only just waking up to the concept of E-mail archiving. Now millions of corporate E-mail users worldwide rely on archiving to provide extended mailbox services. Likewise thousands of organizations use archiving to meet regulatory, legislative, and internal research in potential litigation needs. These facts illustrate 3 major changes in E-mail-based business communications that have occurred over the last 10 years:

1. E-mail is no longer just a carrier mechanism for transient messages. The content itself has become of increasing value, and users expect to get immediate, long term access to this data with no limits on the amount of storage available.
2. E-mails constitute a business record that should be securely retained and be discoverable for many years. For some industries retention periods can be for in excess of 70 years.
3. The volume and importance of data stored in E-mail has grown beyond expectation to become one of the largest, most valuable business intelligence repositories that an organization owns.

In this session, attendees will learn the following:

  • Pre-Migration Planning Define key business and technical objectives, assign key personnel to migrate project, Hold archive migration workshops, Review Source & Target Environments, Discuss migration requirements, Review migration requirements
  • Proof of Concept Agree on a POC objective to discover optimum operating guidlines, Test a migration strategy with a small data set and review for migration fulfillment, Optimize migration with tuning guidelines
  • Migrate Finalize and document migration plans, Commence migration, Project training and hand-off and closure requirements
  • Validate Compare and assess the current environment and define validation criteria for the new environment. Testing of a migration is essential to understand the completion acceptance and what the criteria of acceptance should be
  • One time versus Continual undertand the impact of a migration and the timing of the change.
  • Determing the long term needs of a migration and how this may need to be viewed as a short-term objective, or a long-term ongoing migration strategy for future ingestion needs

2:30pm - 3:00pm - Refreshment Break

Thompson

3:00pm-4:00pm

IT Infrastructure and Compliance: Solid Techniques for a Defensible and Compliant Infrastructure Strategy

Jason Thompson, Senior Compliance Consultant, GlassHouse Tecnologies

Due to current compliance legislation and legal discovery requirements, IT departments need to
be able to manage E-mail archiving so needed information can be located immediately.

In this session attendees will learn:

  • What factors to consider when designing the E-mail archiving infrastructure
  • How to have an E-mail archiving system that adheres to HIPAA, SEC Rule 17a-4, Sarbanes Oxley and other Regulations
  • How to classify your enterprise architecture and E-mail infrastructure
  • How to address architecture and address scalability concerns
  • How to improve communication and collaboration through E-mail archiving
  • Information lifecycle management and Data Lifecycle Management (ILM/DLM)
  • How to work through the myriad of issues created by PST Files
  • How to support the secure storage of large archives
  • How to discover, import and block the use of PST files

Cleary

Cleary

Drabenstadt

Greenberg

4:00pm-5:00pm

How to Gain Agreement Between Legal and IT on the Right Retention Policy

Moderator:
R. Anthony Seyboth, Director, LiveOffice
Panelists will include:
Dana C. Moore, Records & Information Compliance Manager, Foley & Lardner LLP
Teresa Drabenstadt, Director, Ethics & Compliance Programs, CUNA Mutual
Brian Greenberg, President & CEO, General System Dynamics

Many organizations struggle with defining and implementing the right retention policy. Legal must determine the length of retention policy to best protect the organization. IT must then design the infrastructure to best support what Legal requires. This can present the organization with challenges that need to be worked out ahead of archiving implementation.

In this session attendees will learn from a diverse panel on the following:

  • How to balance the needs of different stakeholders in the project
  • How to create a consensus within an organization
  • How to develop the right E-mail retention policy for your organization

Conference price: $249 per person.


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC), Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.