Feedback from Attendees

Upcoming  2013 Events

Oct 8-9, 2013
IT Portfolio Management
Info

Oct 24, 2013
Enterprise Risk/Security Management
Info

Nov 7, 2013
IT Leadership Strategies
Info

Nov 12, 2013
Enterprise Mobility Strategies
Info

Nov 21, 2013
Disaster Recovery/Business Continuity - Data Protection
Info

Dec 5, 2013
BI/Analytics
Info

Upcoming  2014 Events

Feb 5, 2014
Enterprise Risk/Security Management
Info

Feb 26, 2014
IT Infrastructure/Operations Management
Info

Mar 6, 2014
IT Leadership Strategies
Info

Mar 19-20, 2014
IT Portfolio Management
Info

April 3, 2014
Cloud Computing Strategies - The Next Generation
Info

April 24, 2014
Disaster Recovery/Business Continuity - Resilient Infrastructure
Info

May 1, 2014
Enterprise Mobility Strategies - Infrastructure and Architecture
Info

May 22, 2014
Business Intelligence/Analytics/Big Data Strategies
Info

June 5, 2014
Mobile Application Development Strategies
Info

June 19, 2014
Enterprise Risk/Security Management
Info

July 10, 2014
IT Infrastructure & Operations Management
Info

Sep 10, 2014
Disaster Recovery/Business Continuity - Resilient Infrastructure
Info

Sep 23, 2014
Cloud Computing Strategies - The Next Generation
Info

Oct 8-9, 2014
IT Portfolio Management
Info

Oct 15, 2014
Enterprise Risk/Security Management
Info

Oct 22, 2014
Enterprise Mobility Strategies
Info

Nov 6, 2014
IT Leadership Strategies
Info

Nov 20, 2014
Disaster Recovery/Business Continuity - Data Protection
Info

Dec 4, 2014
Business Intelligence/Analytics/Big Data Strategies
Info

 

 

(Click here to add any of our upcoming events to your calendar)

 

 

Conferences that solve current IT challenges

Disaster Recovery / Business Continuity - Data Protection

Strategies to help protect and recover your organization's most critical data

November 21, 2013

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Register

Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois

Overview

With the ever increasing dependencies of your enterprise on the IT infrastructure, it is essential that IT departments have a plan to deal with natural and manmade disasters, as well as threats from outside hackers and malcontent employees.

What You Will Learn

In this one day conference attendees will learn:

  • Strategy: How to Refine Your DR/BC Data Protection Plan For Disruptive Technologies

  • How to Map Key Metrics: From Your Key Business Processes to the Supporting IT Infrastructure

  • Covering Your Apps: Protecting and Prioritizing Your Mission Critical Applications in a Disaster

  • Data Management: How to Build a Better Framework to Ensure Efficient Backup and Recovery

  • Cloud Planning: How to Manage Disaster Recovery & Data Protection in the Hybrid Cloud

  • Panel Discussion: How to Build the Business Case to Drive Your Plan Forward

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

 

 

9:00am-10:00am

Strategy: How to Refine Your DR/BC Data Protection Plan For Disruptive Technologies

 

A comprehensive disaster recovery and data protection plan needs to be your insurance policy against loss of data. How should your plan change in the era of Big Data, Mobility (BYOD), Cloud and other disruptive technologies?

What strategies should you take? What other groups should be involved? Who are the other stakeholders that are affected by disruptive technologies?

In this session attendees will learn:

  • How to ready your plan for disruptive technologies
  • How to modify your plan
  • How to define your particular data protection requirements
  • Which areas should receive priority over others?
  • What is your acceptable level of risk/loss?
  • How quickly you need to recover?
  • How to understand equate level of downtime with your organizationís financial exposure




10:00am -10:30am - Refreshment Break

 

 

10:30am-11:30am

How to Map Key Metrics: From Your Key Business Processes to the Supporting IT Infrastructure

 

While determining a strategy, the disaster recovery and data protection team should reference their organization's business continuity plan which should indicate the key metrics of Recovery Point Objective (RPO) and Recovery Time Objective (RTO) for various business processes (e.g. CRM, Supply Chain, Payroll, etc.). The metrics specified for the business processes must then be mapped to the underlying IT systems and infrastructure that support those processes.

In this session attendees will learn:

  • How to map RTO and RPO metrics to the IT infrastructure
  • How to best determine the most suitable recovery and data protection strategy for each system
  • How to understand the trade-offs between desired level of data protection and the cost associated with it
  • How to articulate the results of the process of mapping RTO and RPO to the infrastructure





 

 

11:30am-12:30pm

Covering Your Apps: Protecting and Prioritizing Your Mission Critical Applications in a Disaster

 

A typical organization has thousands of Windows applications, each with many single points of failure (SPOF). This presentation will address options for application availability, along with how to prioritize your applications for recovery following a disaster. To evaluate the right solution, organizations need to identify their mission critical applications, analyze the business impact of downtime, and set specific recovery time objectives. Next, they need to balance cost v. availability to design disaster recovery architectures that are appropriate for each application tier. Using real world failure statistics, this presentation will address best practices for application availability and disaster recovery. 




12:30pm - 1:30pm Luncheon

 

 

1:30pm-2:30pm

Data Management: How to Build a Better Framework to Ensure Efficient Backup and Recovery

 

Backup and Recovery are essential to organizationís well-being, however, how do you ensure that you are leveraging the techniques to the optimal abilities?

In this session, attendees will learn how to structure and build a better data management framework for managing backup and recovery efforts.




2:30pm - 3:00pm - Refreshment Break

 

 

3:00pm-4:00pm

Cloud Planning: How to Manage Disaster Recovery & Data Protection in the Hybrid Cloud

 

While many organizations are moving towards building next-generation hybrid cloud architectures, not many are prepared to protect their data in these new environments. How do you prepare for it and what questions should you be asking as it relates to data protection?
In this session attendees will learn best practices and questions you should ask your cloud provider.

Areas that will be covered include:

  • How to securely manage data in an hybrid cloud environment
  • How to make sure your processes meet the requirements of the business for your production applications
  • How hybrid cloud computing architectures impact your DR plans
  • What type of cloud approach is best for your organization when factoring in disaster recovery and data protection?
  • What are the disaster recovery plans of the cloud provider?




 

 

4:00pm-5:00pm

Panel Discussion: How to Build the Business Case to Drive Your Plan Forward

Panelists will include professionals from IT departments

In this session attendees will learn from a group of seasoned enterprise IT disaster recovery/data protection professionals as to how they have developed a successful business case that has received managementís approval.

Topics that will be addressed include:

  • How to write up the business case
  • What areas to emphasize
  • What areas to avoid discussing
  • How to articulate in language that business leaders can understand
  • How to make sure your plan covers current technologies as well as potential new technologies





Conference Price: $269.00 per person


Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)≤, Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.