Conferences that solve current IT challenges

Disaster Recovery / Business Continuity - Data Protection

Strategies to help protect and recover your organization's most critical data

November 29, 2012

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Bios

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

With the ever increasing dependencies of your enterprise on the IT infrastructure, it is essential that IT departments have a plan to deal with natural and manmade disasters, as well as threats from outside hackers and malcontent employees.

What You Will Learn

In this one day conference attendees will learn:

  • Strategy: How to Refine Your DR/BC Data Protection Plan For Disruptive Technologies

  • How to Map Key Metrics: From Your Key Business Processes to the Supporting IT Infrastructure

  • How to Understand, Simplify and Leverage the Different Backup and Replication Techniques

  • Virtual Protection: How to Protect Data and Applications in a Virtual Environment

  • How to Manage Disaster Recovery & Data Protection in the Internal Cloud

  • Panel Discussion: How to Build the Business Case to Drive Your Plan Forward

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Irwin

9:00am-10:00am

Strategy: How to Refine Your DR/BC Data Protection Plan For Disruptive Technologies

Paul Irwin, Technical Partner Manager, VMware

A comprehensive disaster recovery and data protection plan needs to be your insurance policy against loss of data. How should your plan change in the era of Big Data, Mobility (BYOD), Cloud and other disruptive technologies?

What strategies should you take? What other groups should be involved? Who are the other stakeholders that are affected by disruptive technologies?

In this session attendees will learn:

  • How to ready your plan for disruptive technologies
  • How to modify your plan
  • How to define your particular data protection requirements
  • Which areas should receive priority over others?
  • What is your acceptable level of risk/loss?
  • How quickly you need to recover?
  • How to understand equate level of downtime with your organizationís financial exposure

10:00am -10:30am - Refreshment Break

Palla

10:30am-11:30am

How to Map Key Metrics: From Your Key Business Processes to the Supporting IT Infrastructure

Kiran Palla, Sr. Manager, IT Risk & Cost Optimization, GITO, DeVry Inc.

While determining a strategy, the disaster recovery and data protection team should reference their organization's business continuity plan which should indicate the key metrics of Recovery Point Objective (RPO) and Recovery Time Objective (RTO) for various business processes (e.g. CRM, Supply Chain, Payroll, etc.). The metrics specified for the business processes must then be mapped to the underlying IT systems and infrastructure that support those processes.

In this session attendees will learn:

  • How to map RTO and RPO metrics to the IT infrastructure
  • How to best determine the most suitable recovery and data protection strategy for each system
  • How to understand the trade-offs between desired level of data protection and the cost associated with it
  • How to articulate the results of the process of mapping RTO and RPO to the infrastructure

Salins 

11:30am-12:30pm

How to Understand, Simplify and Leverage the Different Backup and Replication Techniques

Mike Salins, Solution Architect, Actifio

There many techniques that organizations can use to protect, backup and recover their data and they each have their pros and cons. How do you determine what techniques and technologies are the best fit for your organization?
In this session attendees will learn detailed information on how to use the following techniques. Pros and cons will be provided with respect to size or organization, level of protection and uptime required and relative cost.

Areas that will be covered include:  

  • Traditional backup (Full vs. Incremental vs. Differential)
  • Disk vs. Tape
  • Replication (Remote and local)
  • Deduplication
  • Continuous Data Protection
  • Encryption

12:30pm - 1:30pm Luncheon

Russell

1:30pm-2:30pm

Virtual Protection: How to Protect Data and Applications in a Virtual Environment

Kevin Russell, Director, Systems Engineering, NA, ExaGrid Systems

This session explores and outlines how to apply and manage an effective backup strategy in a virtual server environment that not only effectively protects virtual machines but also the enterprise applications running inside the virtual machine.

In this session you will learn:

  • How to build and deploy an effective backup solution in their virtual environment while achieving
  • How to improve RPO (Recovery Point Objective) and RTO (Recovery Time Objective) of backups
  • How to optimize backup in a virtualized environment
  • How to significantly lower backup windows
  • How to achieve efficient data mobility
  • How to avoid pitfalls

2:30pm - 3:00pm - Refreshment Break

Timmerman

3:00pm-4:00pm

Cloud Planning: How to Manage Disaster Recovery & Data Protection in the Hybrid Cloud

Paul Timmerman, Vice President of Solution Strategy, AdvizeX Technologies

While many organizations are moving towards building next-generation hybrid cloud architectures, not many are prepared to protect their data in these new environments. How do you prepare for it and what questions should you be asking as it relates to data protection?
In this session attendees will learn best practices and questions you should ask your cloud provider.

Areas that will be covered include:

  • How to securely manage data in an hybrid cloud environment
  • How to make sure your processes meet the requirements of the business for your production applications
  • How hybrid cloud computing architectures impact your DR plans
  • What type of cloud approach is best for your organization when factoring in disaster recovery and data protection?
  • What are the disaster recovery plans of the cloud provider?

Goetz

Troyer

Sherman

Roseman

Burr

Schmidt

4:00pm-5:00pm

Panel Discussion:  How to Build the Business Case to Drive Your Plan Forward

Moderator:
Dan Goetz, Service Delivery Engineer, UbiStor, Inc.
Speakers will include:
Kurt Troyer, Director, Corporate IT Infrastructure, Illinois Tool Works
Brian Sherman, Global Platform Services, Technical SME, Zurich Insurance Group
Jeff Roseman, Director IT, Accretive Solutions
Frank Burr, CIO/CSO,  Catholic Charities of the Archdiocese of Chicago
Nick Schmidt, Senior Manager, Information Systems, CDW
and other professionals from IT departments sharing experiences and lessons learned

In this session attendees will learn from a group of seasoned enterprise IT disaster recovery/data protection professionals as to how they have developed a successful business case that has received managementís approval.

Topics that will be addressed include:

  • How to write up the business case
  • What areas to emphasize
  • What areas to avoid discussing
  • How to articulate in language that business leaders can understand
  • How to make sure your plan covers current technologies as well as potential new technologies

Conference Price: $259.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)≤, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.