Skip to content
Data Protection Strategies and Secrets

December 10, 2020
11:00am – 5:15pm EST | 8:00am – 2:15pm PST

Data is the engine powering modern business.

It must be shielded from corruption, compromise, or loss at all times, under all circumstances and at all costs. But the overwhelming majority of organizations face data protection challenges, including securing emerging technologies and complying with worldwide data security regulations.

This virtual event spotlights expert insights for ensuring that data is available and secured wherever and whenever a business needs it most—whether in the cloud, across corporate endpoints, or on unmanaged devices—and that its policies align with a fast-changing regulatory environment.

December 10, 2020
11:00am – 5:15pm EST | 8:00am – 2:15pm PST

AGENDA
KEYNOTE 1
Cost-Efficient Data Backup and Recovery Strategies for the Modern Business
Presented by: Mel Beckman, Sr. Contributing Editor, ITPro Today
Surging growth in multi-cloud adoption corresponds with mounting concern over how businesses can guarantee security and control over their applications. Multi-cloud environments not only complicate how organizations implement and govern security, but also how they coordinate responses to breaches and develop plans to put even more effective protocols in place. This session will explore how shared security models operate, the differences between vendors’ respective security controls and the role your organization plays in keeping its applications safe within the multi-cloud environment.
Fireside Chat with Zerto
Presented by: Scott Wotring with Dale Levesque, Director of Product Management at TierPoint, and Gijsbert Janssen van Doorn, Director of Technical Marketing at Zerto
NETWORKING BREAK
Video Spotlight
Sponsored by: Zerto
Sponsored by
Presented by
Mel Beckman
Sr. Contributing Editor, ITPro Today
Dale Levesque
Director Product Management, TierPoint
Gijsbert Janssen van Doorn
Director Technical Marketing, Zerto
KEYNOTE 2
Data Protection 101: Overcoming Software/Hardware Configuration and Operations Challenges
Presented by: Brien Posey, Technology Author & Microsoft MVP
Studies show that effective data protection remains a challenge across the global business landscape. Fewer than a quarter of companies have applied consistent cybersecurity incident response plans across the entire enterprise, even though more than half have experienced recent cybersecurity incidents that dramatically disrupted IT and business operations. The biggest challenge facing organizations: The complexity inherent in configuring and operating data protection software and hardware solutions. This session will address the fundamental data protection complexities businesses face, complete with common-sense suggestions and solutions for simplifying the task ahead.
Fireside Chat with Palo Alto Networks
Presented by: Scott Wotring with Keith Mokris, Sr Product Marketing Manager, Prisma Cloud
NETWORKING BREAK
Video Spotlight
Sponsored by: Palo Alto Networks
Sponsored by
Presented by
Brien Posey
Technology Author & Microsoft MVP
Keith Mokris
Sr Product Marketing Manager, Prisma Cloud
PREMIER SESSION
Data Protection Strategies & Secrets – A Technical Blueprint
Presented by: Ankur Chadda, Principal Product Marketing Manager, and Robert Mechler, Principle Security Strategist, Forcepoint
Running a successful data protection program is not as simple as plug-in, configure and go – it requires careful planning and execution if you are to realize its full potential. In this session, Ankur Chadda is joined by Bob Mechler to discuss a 9-Step Strategy for Success. You will learn:
  • How the move to cloud is making data protection harder
  • How to identify where your critical data is, the channels it flows through and establish an incident response plan
  • How to move from passive data monitoring to implementing policy controls – that don’t impact productivity
  • How a comprehensive understanding of risk can help you shift from a reactive to proactive posture to stop breaches before they happen
Navigating the 2021 Threat Landscape
Presented by: Corey Nachreiner, Chief Technology Officer, WatchGuard Technologies
In this session, Corey Nachreiner, Chief Technology Officer of WatchGuard and longtime information security professional, walks you through four of the most common cyber threats that every organization will face in 2021. The presentation covers:
  • Spear phishing and how automation is helping it evolve
  • How Living off the Land attacks change the game for endpoint security
  • The important of Strong Authentication
  • The latest trends in Ransomware
While it covers the latest threats, the point of this talk is defense. Throughout the session, Nachreiner shares the latest security strategies to defend against these attacks. He will also share a glimpse of his security predictions for 2021. We look forward to you joining us to learn how to keep your digital assets safe in 2021.
Sponsored by
Presented by
Ankur Chadda
Principal Product Marketing Manager
Robert Mechler
Principle Security Strategist, Forcepoint
Corey Nachreine
Chief Technology Officer, WatchGuard Technologies
NETWORKING BREAK
Spotlight Video
Sponsored by: Forcepoint
PREMIER SESSION
Disaster Recovery Reality Check:
Validating Your DR Strategy
Presented by: Bill Hansen, Sr. Product Manager for Cloud Services, StorageCraft
Do you have a Disaster Recovery strategy? Learn more from those on the inside of data protection and disaster recovery. See how you compare to other’s DR capabilities and how to build a solid strategy. We’ll also cover key DRaaS capabilities and a solution to make part of our plan.
5 Tips for a Secure Modern Backup Platform
Presented by: Joshua Stenhouse
In this session you will learn 5 key tips of how to build a secure modern backup platform. Starting with security posture, to taking multiple offline copies, securing access, preventing deletion and finally, doing more than just backup.
Sponsored by
Presented by
Bill Hansen
Sr. Product Manager, Cloud Services, StorageCraft
Joshua Stenhouse
NETWORKING BREAK
Spotlight Video
Sponsored by: WatchGuard Technologies
SPOTLIGHT SESSION
Discover Economic Impact of Disaster
Recovery in the Cloud
Presented by: Dale Levesque, Director of Product Management at TierPoint, and Gijsbert Janssen van Doorn, Director of Technical Marketing at Zerto

Considering a move to the cloud? Moving your disaster recovery (DR) to the cloud is a good place to start or expand cloud adoption. As the role of the cloud continues to evolve in modern IT, you may be asking what strategy or cloud model should I deploy?

Big benefits like cost savings and ease-of-use are some of the reasons many companies are shifting from on-premises to cloud for their DR, but navigating the right approach while balancing tradeoffs is important.

Join this session with experts Dale Levesque, Director of Product Management at TierPoint, and Gijsbert Janssen van Doorn, Zerto Director of Technical Marketing, to explore the technical and economic benefits of moving DR to the cloud and find the right options and approach.

Sponsored by
Presented by
Mel Beckman
Title Here…
Alex Schneck
Solution Architect,
Zerto
NETWORKING BREAK
Spotlight Video
Sponsored by: Rubrik
SPOTLIGHT SESSION
IAM Security: The New Cloud Perimeter is Broken [Unit 42 Research]
Presented by: Matt Chiodi, Chief Security Officer of Public Cloud at Palo Alto Networks

Historically, defense in depth was mostly performed through network-layer controls. While network security controls remain an important component of cloud security, an additional layer of identity and access management (IAM) governance is now needed as organizations continue to scale their cloud presence. Similar to scanning applications for vulnerabilities, IAM policies across all cloud accounts must be constantly monitored and evaluated to determine the risk impact to the business.

From the latest Cloud Threat Report, Matt Chiodi, Chief Security Officer of Public Cloud at Palo Alto Networks, will present breaking research from the Unit 42 Threat Intelligence team. And how one simple IAM misconfiguration allowed researchers to compromise an entire massively-scaled cloud environment and bypass just about every security control.

Matt will also deep dive into the complex topic of identity security, exploring the methods attackers use to silently perform reconnaissance, common threat actors and tangible steps organizations can take to build a cloud security program based upon IAM best practices.

Sponsored by
Presented by
Matt Chiodi
Chief Security Officer of Public Cloud, Palo Alto Networks
Alex Schneck
Solution Architect,
Zerto
NETWORKING BREAK
Spotlight Video
Sponsored by: StorageCraft
EDITORIAL SESSION
Ensuring Data Protection in a Post-GDPR World
Presented by: Harjit Dhaliwal
The introduction of the EU’s General Data Protection Regulation (GDPR) has redefined how businesses across the globe must gather, store, secure and share data. Organizations that fail to comply face stiff fines, customer defections and reputational damage. With regulations expected to expand in the years ahead, this session will explore GDPR in a nutshell, share best practices for compliance, and spotlight processes for securing data.
Sponsored by
Presented by
Harjit Dhaliwal
Alex Schneck
Solution Architect,
Zerto

Prizes & Interaction

Attend the live conference on December 10th, 2020 and win! The more you participate, the more points you earn! It’s that simple. You’ll earn prize points for each activity you participate in throughout the virtual conference. Points will be calculated at the end of the live event day.
*Giveaways are limited to North American residents only. Winners are limited to one prize per calendar year for Informa Tech sponsored events.

Explorer Giveaway

30 Points

Session Viewed

25 Points

Zone Visits

20 Points

Location Chat Attended

10 Points

Documents Viewed

5 Points

Exchanged vCards

Keynote Sponsors
zerto-Tier-Cards
prismaCard
Premier Sponsors
forcepoint-Cards
watchguard-Cards
rubrik-Cards
Stoaragecraft-Cards
Data Protection Strategies and Secrets

December 10, 2020
11:00am – 5:15pm EST | 8:00am – 2:15pm PST

Natalie Silvanovich
Security Researcher,
Google

Natalie Silvanovich is a security researcher on Google Project Zero. Her current focus is messaging applications and video conferencing. Previously, she worked in mobile security on the Android Security Team at Google and as a team lead of the Security Research Group at BlackBerry, where her work included finding security issues in mobile software and improving the security of mobile platforms. Outside of work, Natalie enjoys applying her hacking and reverse engineering skills to unusual targets and has spoken at several conferences on the subject of Tamagotchi hacking.

[ifso id="2153"]