Conferences that solve current IT challenges

Disaster Recovery / Business Continuity - Data Protection

Strategies to help protect and recover your organization's most critical data

November 21, 2013

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Register

Bios

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

With the ever increasing dependencies of your enterprise on the IT infrastructure, it is essential that IT departments have a plan to deal with natural and manmade disasters, as well as threats from outside hackers and malcontent employees.

What You Will Learn

In this one day conference attendees will learn:

  • Strategy: How to Refine Your DR/BC Data Protection Plan For Disruptive Technologies

  • How to Map Key Metrics: From Your Key Business Processes to the Supporting IT Infrastructure

  • Covering Your Apps: Protecting and Prioritizing Your Mission Critical Applications in a Disaster

  • Data Management: How to Build a Better Framework to Ensure Efficient Backup and Recovery

  • Cloud Planning: How to Manage Disaster Recovery & Data Protection in the Hybrid Cloud

  • Panel Discussion: How to Build the Business Case to Drive Your Plan Forward

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

 

 

9:00am-10:00am

Strategy: How to Refine Your DR/BC Data Protection Plan For Disruptive Technologies

Tim Throop, Senior Solutions Engineer, Data Center Operations, Windstream

A comprehensive disaster recovery and data protection plan needs to be your insurance policy against loss of data. How should your plan change in the era of Big Data, Mobility (BYOD), Cloud and other disruptive technologies?

What strategies should you take? What other groups should be involved? Who are the other stakeholders that are affected by disruptive technologies?

In this session attendees will learn:

  • How to ready your plan for disruptive technologies
  • How to modify your plan
  • How to define your particular data protection requirements
  • Which areas should receive priority over others?
  • What is your acceptable level of risk/loss?
  • How quickly you need to recover?
  • How to understand equate level of downtime with your organizationís financial exposure




10:00am -10:30am - Refreshment Break

Ensenbach

10:30am-11:30am

How to Map Key Metrics: From Your Key Business Processes to the Supporting IT Infrastructure

Greg Ensenbach, System Engineer, Unitrends

While determining a strategy, the disaster recovery and data protection team should reference their organization's business continuity plan which should indicate the key metrics of Recovery Point Objective (RPO) and Recovery Time Objective (RTO) for various business processes (e.g. CRM, Supply Chain, Payroll, etc.). The metrics specified for the business processes must then be mapped to the underlying IT systems and infrastructure that support those processes.

In this session attendees will learn:

  • How to map RTO and RPO metrics to the IT infrastructure
  • How to best determine the most suitable recovery and data protection strategy for each system
  • How to understand the trade-offs between desired level of data protection and the cost associated with it
  • How to articulate the results of the process of mapping RTO and RPO to the infrastructure





 

 

11:30am-12:30pm

Covering Your Apps: Protecting and Prioritizing Your Mission Critical Applications in a Disaster

Jeremiah Mason, Sr. Product Advisor, Dell Software

A typical organization has thousands of Windows applications, each with many single points of failure (SPOF). This presentation will address options for application availability, along with how to prioritize your applications for recovery following a disaster. To evaluate the right solution, organizations need to identify their mission critical applications, analyze the business impact of downtime, and set specific recovery time objectives. Next, they need to balance cost v. availability to design disaster recovery architectures that are appropriate for each application tier. Using real world failure statistics, this presentation will address best practices for application availability and disaster recovery. 




12:30pm - 1:30pm Luncheon

Goetz

1:30pm-2:30pm

Data Management: How to Build a Better Framework to Ensure Efficient Backup and Recovery

Dan Goetz, Service Delivery Manager, UbiStor

Backup and Recovery are essential to organizationís well-being, however, how do you ensure that you are leveraging the techniques to the optimal abilities?

In this session, attendees will learn how to structure and build a better data management framework for managing backup and recovery efforts.




2:30pm - 3:00pm - Refreshment Break

Lang

3:00pm-4:00pm

Cloud Planning: How to Manage Disaster Recovery & Data Protection in the Hybrid Cloud

Larry Lang, Chief Executive Officer, Quorum

While many organizations are moving towards building next-generation hybrid cloud architectures, not many are prepared to protect their data in these new environments. How do you prepare for it and what questions should you be asking as it relates to data protection?
In this session attendees will learn best practices and questions you should ask your cloud provider.

Areas that will be covered include:

  • How to securely manage data in an hybrid cloud environment
  • How to make sure your processes meet the requirements of the business for your production applications
  • How hybrid cloud computing architectures impact your DR plans
  • What type of cloud approach is best for your organization when factoring in disaster recovery and data protection?
  • What are the disaster recovery plans of the cloud provider?




Warja

Tompkins

4:00pm-5:00pm

Panel Discussion: How to Build the Business Case to Drive Your Plan Forward

Panelists:
Scott Tompkins, Director, Information Security, Williams Lea
Art McNamera, IT Specialist, Specialty Foods Group
Bob Warja, Business Continuity Risk & Telecommunications Manager, Marquette Bank
Frank Gogola, IT Data Center and Operations Manager, Mayer Brown LLP
and other professionals from IT departments

In this session attendees will learn from a group of seasoned enterprise IT disaster recovery/data protection professionals as to how they have developed a successful business case that has received managementís approval.

Topics that will be addressed include:

  • How to write up the business case
  • What areas to emphasize
  • What areas to avoid discussing
  • How to articulate in language that business leaders can understand
  • How to make sure your plan covers current technologies as well as potential new technologies





Conference Price: $269.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)≤, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.