Feedback from Attendees

Upcoming  2017 Events

July 12, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 7, 2017
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 19, 2017
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 4, 2017
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 18, 2017
IT Leadership Strategies
Info
Chicago, IL

Oct. 26, 2017
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2017
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 15, 2017
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 30, 2017
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 7, 2017
Data Breaches: Preparing and Responding
Info
Chicago, IL

Upcoming  2018 Events

Feb. 1, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Feb. 20, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Mar. 1, 2018
IT Leadership Strategies
Info
Chicago, IL

Mar. 7, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

April 12, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

May 2, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

May 15, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

May 31, 2018
Enterprise Risk/Security Management
Info
Minneapolis, MN

June 7, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

June 20-21, 2018
IT PMO/Portfolio Management
Info
Chicago, IL

July 11, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Sept. 6, 2018
IT Infrastructure/Operations Management (Data Center)
Info
Chicago, IL

Sept. 18, 2018
Enterprise Risk/Security Management
Info
Dallas, TX

Oct. 3, 2018
Enterprise Risk/Security Management
Info
Chicago, IL

Oct. 17, 2018
IT Leadership Strategies
Info
Chicago, IL

Oct. 25, 2018
Enterprise Architecture Strategies
Info
Chicago, IL

Nov. 1-2, 2018
IT PMO/Portfolio Management
Info
Dallas, TX

Nov. 14, 2018
DR/BC - Resilient Infrastructure
Info
Chicago, IL

Nov. 29, 2018
Business Intelligence/Big Data/Analytics
Info
Chicago, IL

Dec. 6, 2018
Data Breaches: Preparing and Responding
Info
Chicago, IL

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Disaster Recovery / Business Continuity / Data Protection Strategies

 

November 17, 2011

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Register

Bios

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

With the ever increasing dependencies of your enterprise on the IT infrastructure, it is essential that IT departments have a plan to deal with natural and manmade disasters, as well as threats from outside hackers and malcontent employees.

What You Will Learn

In this one day conference attendees will learn:

  • How to understand, simplify and leverage the different backup and replication techniques

  • How to effectively leverage the complementary technologies in DR and archiving environments

  • How to develop a business case for DR

  • How to do more with less

  • Understanding and acting on the five most important rules for backup and recovery

  • Signs you are headed for a backup disaster

  • How to properly backup data in a VM environment

  • How to properly backup data in a cloud environment

  • The readiness of online backup for the enterprise

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Borders

9:00am-10:00am

Establishing an Effective Continuity Risk Management Program at Kraft Foods

Leslie Borders, Manager, Business Continuity and Disaster Recovery, Kraft Foods

Organizations are constantly having to manage their risk and exposure. While risk has many different definitions, it usually refers to the fact that in virtually any activity or scenario there is the potential for something to go wrong. The probability of anything happening becomes the risk associated with that specific activity.

In this session Leslie Borders will share with you how she led the charge in creating a world class Continuity Risk Management program.

Topics that will be covered include how to:

  • Effectively and efficiently establish an effective continuity program
  • Integrate enterprise risk management and continuities programs
  • Think like business leaders
  • Effectively communicate with executives
  • Work with other enterprise units
  • How to evaluate the success of your program

10:00am -10:30am - Refreshment Break

Pressman

10:30am-11:30am

How to Map Key Metrics: From Your Key Business Processes to the Supporting IT Infrastructure

Jack Pressman, Managing Principal & CTO, CDGI

While determining a strategy, the disaster recovery and data protection team should reference their organization's business continuity plan which should indicate the key metrics of Recovery Point Objective (RPO) and Recovery Time Objective (RTO) for various business processes (e.g. CRM, Supply Chain, Payroll, etc). The metrics specified for the business processes must then be mapped to the underlying IT systems and infrastructure that support those processes.

In this session attendees will learn:

  • How to map RTO and RPO metrics to the IT infrastructure
  • How to best determine the most suitable recovery and data protection strategy for each system
  • How to understand the trade-offs between desired level of data protection and the cost associated with it
  • How to articulate the results of the process of mapping RTO and RPO to the infrastructure

Langley

11:30am-12:30pm

How to Understand, Simplify and Leverage the Different Backup and Replication Techniques

David Langley, Senior Solutions Architect, Integrated Data Storage

There many techniques that organizations can use to protect, backup and recover their data and they each have their pros and cons. How do you determine what techniques and technologies are the best fit for your organization?
In this session attendees will learn detailed information on how to use the following techniques. Pros and cons will be provided with respect to size or organization, level of protection and uptime required and relative cost.

Areas that will be covered include: 

  • Traditional backup (Full vs. Incremental vs. Differential)
  • Disk vs. Tape
  • Replication (Remote and local)
  • Deduplication
  • Continuous Data Protection
  • Encryption

12:30pm - 1:30pm Luncheon

Rodriquez

1:30pm-2:30pm

Virtual Protection: How to Protect Data and Applications in a Virtual Environment

Nicholas Rodriquez, Pre-Sales Engineer, Integrated Data Storage; Former Director of Information Technology, PayFlex Systems USA, Inc.

This session explores and outlines how to apply and manage an effective backup strategy in a virtual server environment that not only effectively protects virtual machines but also the enterprise applications running inside the virtual machine.

In this session you will learn:

  • How to build and deploy an effective backup solution in their virtual environment while achieving
  • How to improve RPO (Recovery Point Objective) and RTO (Recovery Time Objective) of backups
  • How to optimize backup in a virtualized environment
  • How to significantly lower backup windows
  • How to achieve efficient data mobility
  • How to avoid pitfalls

2:30pm - 3:00pm - Refreshment Break

Kluger

3:00pm-4:00pm

How to Manage Disaster Recovery & Data Protection in the Internal Cloud

Dave Kluger, Principal Technology Architect, StorCOM

While many organizations are moving towards building next-generation internal cloud architectures, not many are prepared to protect their data in these new environments. How do you prepare for it and what questions should you be asking as it relates to data protection?
In this session attendees will learn best practices and questions you should ask your cloud provider.

Areas that will be covered include:

  • How to securely manage data in an internal cloud environment
  • How to make sure your processes meet the requirements of the business for your production applications
  • How internal cloud computing architectures impact your DR plans
  • What type of cloud approach is best for your organization when factoring in disaster recovery and data protection?
  • What are the disaster recovery plans of the cloud provider?

Sumar

Kocinski

Semenek

Bynsdorp

4:00pm-5:00pm

How to Develop a Business Case for DR and Data Protection

Moderator:
Annur Sumar, Vice President-IT, Duff & Phelps

Speakers will include:
Steven C. Olson, CISSP, Manager, Technology Security & Compliance, and Data Center Operations
Elmhurst Memorial Healthcare
John F. Semenek, Jr., CISSP, ECSA, CEH, CCNA, MCTS, Senior Solution Designer, MillerCoors
Joe Kocinski, Data Center Services Manager, Ace Hardware Corporation
Jackie Bynsdorp, IT Operations Project Manager, VW Credit
Paul Johnson, Global Head of Disaster Recovery & Data Centers, MF Global and other professionals from IT departments

In this session attendees will learn from a group of seasoned enterprise IT disaster recovery/data protection professionals as to how they have developed a successful business case that has received managementís approval.

Topics that will be addressed include:

  • How to write up the business case
  • What areas to emphasize
  • What areas to avoid discussing
  • How to articulate in language that business leaders can understand
  • How to make sure your plan cover current technologies as well as potential new technologies

Conference Price: $249.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)≤, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.