Skip to content
Data Protection Strategies and Secrets

December 10, 2020
11:00am – 5:15pm EST | 8:00am – 2:15pm PST

Data is the engine powering modern business.

It must be shielded from corruption, compromise, or loss at all times, under all circumstances and at all costs. But the overwhelming majority of organizations face data protection challenges, including securing emerging technologies and complying with worldwide data security regulations.

This virtual event spotlights expert insights for ensuring that data is available and secured wherever and whenever a business needs it most—whether in the cloud, across corporate endpoints, or on unmanaged devices—and that its policies align with a fast-changing regulatory environment.

December 10, 2020
11:00am – 5:15pm EST | 8:00am – 2:15pm PST

AGENDA
KEYNOTE 1
Cost-Efficient Data Backup and Recovery Strategies for the Modern Business
Presented by: Mel Beckman, Sr. Contributing Editor, ITPro Today
Surging growth in multi-cloud adoption corresponds with mounting concern over how businesses can guarantee security and control over their applications. Multi-cloud environments not only complicate how organizations implement and govern security, but also how they coordinate responses to breaches and develop plans to put even more effective protocols in place. This session will explore how shared security models operate, the differences between vendors’ respective security controls and the role your organization plays in keeping its applications safe within the multi-cloud environment.
Fireside Chat with Zerto
Presented by: Scott Wotring with Dale Levesque, Director of Product Management at TierPoint, and Gijsbert Janssen van Doorn, Director of Technical Marketing at Zerto
NETWORKING BREAK
Video Spotlight
Sponsored by: Zerto
Sponsored by
Presented by
Mel Beckman
Sr. Contributing Editor, ITPro Today
Dale Levesque
Director Product Management, TierPoint
Gijsbert Janssen van Doorn
Director Technical Marketing, Zerto
KEYNOTE 2
Data Protection 101: Overcoming Software/Hardware Configuration and Operations Challenges
Presented by: Brien Posey, Technology Author & Microsoft MVP
Studies show that effective data protection remains a challenge across the global business landscape. Fewer than a quarter of companies have applied consistent cybersecurity incident response plans across the entire enterprise, even though more than half have experienced recent cybersecurity incidents that dramatically disrupted IT and business operations. The biggest challenge facing organizations: The complexity inherent in configuring and operating data protection software and hardware solutions. This session will address the fundamental data protection complexities businesses face, complete with common-sense suggestions and solutions for simplifying the task ahead.
Fireside Chat with Palo Alto Networks
Presented by: Scott Wotring with Keith Mokris, Sr Product Marketing Manager, Prisma Cloud
NETWORKING BREAK
Video Spotlight
Sponsored by: Palo Alto Networks
Sponsored by
Presented by
Brien Posey
Technology Author & Microsoft MVP
Keith Mokris
Sr Product Marketing Manager, Prisma Cloud
PREMIER SESSION
Data Protection Strategies & Secrets – A Technical Blueprint
Presented by: Ankur Chadda, Principal Product Marketing Manager, and Robert Mechler, Principle Security Strategist, Forcepoint
Running a successful data protection program is not as simple as plug-in, configure and go – it requires careful planning and execution if you are to realize its full potential. In this session, Ankur Chadda is joined by Bob Mechler to discuss a 9-Step Strategy for Success. You will learn:
  • How the move to cloud is making data protection harder
  • How to identify where your critical data is, the channels it flows through and establish an incident response plan
  • How to move from passive data monitoring to implementing policy controls – that don’t impact productivity
  • How a comprehensive understanding of risk can help you shift from a reactive to proactive posture to stop breaches before they happen
Navigating the 2021 Threat Landscape
Presented by: Corey Nachreiner, Chief Technology Officer, WatchGuard Technologies
In this session, Corey Nachreiner, Chief Technology Officer of WatchGuard and longtime information security professional, walks you through four of the most common cyber threats that every organization will face in 2021. The presentation covers:
  • Spear phishing and how automation is helping it evolve
  • How Living off the Land attacks change the game for endpoint security
  • The important of Strong Authentication
  • The latest trends in Ransomware
While it covers the latest threats, the point of this talk is defense. Throughout the session, Nachreiner shares the latest security strategies to defend against these attacks. He will also share a glimpse of his security predictions for 2021. We look forward to you joining us to learn how to keep your digital assets safe in 2021.
Sponsored by
Presented by
Ankur Chadda
Principal Product Marketing Manager
Robert Mechler
Principle Security Strategist, Forcepoint
Corey Nachreine
Chief Technology Officer, WatchGuard Technologies
NETWORKING BREAK
Spotlight Video
Sponsored by: Forcepoint
PREMIER SESSION
Disaster Recovery Reality Check:
Validating Your DR Strategy
Presented by: Bill Hansen, Sr. Product Manager for Cloud Services, StorageCraft
Do you have a Disaster Recovery strategy? Learn more from those on the inside of data protection and disaster recovery. See how you compare to other’s DR capabilities and how to build a solid strategy. We’ll also cover key DRaaS capabilities and a solution to make part of our plan.
5 Tips for a Secure Modern Backup Platform
Presented by: Joshua Stenhouse
In this session you will learn 5 key tips of how to build a secure modern backup platform. Starting with security posture, to taking multiple offline copies, securing access, preventing deletion and finally, doing more than just backup.
Sponsored by
Presented by
Bill Hansen
Sr. Product Manager, Cloud Services, StorageCraft
Joshua Stenhouse
NETWORKING BREAK
Spotlight Video
Sponsored by: WatchGuard Technologies
SPOTLIGHT SESSION
Discover Economic Impact of Disaster
Recovery in the Cloud
Presented by: Dale Levesque, Director of Product Management at TierPoint, and Gijsbert Janssen van Doorn, Director of Technical Marketing at Zerto

Considering a move to the cloud? Moving your disaster recovery (DR) to the cloud is a good place to start or expand cloud adoption. As the role of the cloud continues to evolve in modern IT, you may be asking what strategy or cloud model should I deploy?

Big benefits like cost savings and ease-of-use are some of the reasons many companies are shifting from on-premises to cloud for their DR, but navigating the right approach while balancing tradeoffs is important.

Join this session with experts Dale Levesque, Director of Product Management at TierPoint, and Gijsbert Janssen van Doorn, Zerto Director of Technical Marketing, to explore the technical and economic benefits of moving DR to the cloud and find the right options and approach.

Sponsored by
Presented by
Mel Beckman
Title Here…
Alex Schneck
Solution Architect,
Zerto
NETWORKING BREAK
Spotlight Video
Sponsored by: Rubrik
SPOTLIGHT SESSION
IAM Security: The New Cloud Perimeter is Broken [Unit 42 Research]
Presented by: Matt Chiodi, Chief Security Officer of Public Cloud at Palo Alto Networks

Historically, defense in depth was mostly performed through network-layer controls. While network security controls remain an important component of cloud security, an additional layer of identity and access management (IAM) governance is now needed as organizations continue to scale their cloud presence. Similar to scanning applications for vulnerabilities, IAM policies across all cloud accounts must be constantly monitored and evaluated to determine the risk impact to the business.

From the latest Cloud Threat Report, Matt Chiodi, Chief Security Officer of Public Cloud at Palo Alto Networks, will present breaking research from the Unit 42 Threat Intelligence team. And how one simple IAM misconfiguration allowed researchers to compromise an entire massively-scaled cloud environment and bypass just about every security control.

Matt will also deep dive into the complex topic of identity security, exploring the methods attackers use to silently perform reconnaissance, common threat actors and tangible steps organizations can take to build a cloud security program based upon IAM best practices.

Sponsored by
Presented by
Matt Chiodi
Chief Security Officer of Public Cloud, Palo Alto Networks
Alex Schneck
Solution Architect,
Zerto
NETWORKING BREAK
Spotlight Video
Sponsored by: StorageCraft
EDITORIAL SESSION
Ensuring Data Protection in a Post-GDPR World
Presented by: Harjit Dhaliwal
The introduction of the EU’s General Data Protection Regulation (GDPR) has redefined how businesses across the globe must gather, store, secure and share data. Organizations that fail to comply face stiff fines, customer defections and reputational damage. With regulations expected to expand in the years ahead, this session will explore GDPR in a nutshell, share best practices for compliance, and spotlight processes for securing data.
Sponsored by
Presented by
Harjit Dhaliwal
Alex Schneck
Solution Architect,
Zerto

Prizes & Interaction

Attend the live conference on December 10th, 2020 and win! The more you participate, the more points you earn! It’s that simple. You’ll earn prize points for each activity you participate in throughout the virtual conference. Points will be calculated at the end of the live event day.
*Giveaways are limited to North American residents only. Winners are limited to one prize per calendar year for Informa Tech sponsored events.

Explorer Giveaway

30 Points

Session Viewed

25 Points

Zone Visits

20 Points

Location Chat Attended

10 Points

Documents Viewed

5 Points

Exchanged vCards

Keynote Sponsors
zerto-Tier-Cards
prismaCard
Premier Sponsors
forcepoint-Cards
watchguard-Cards
rubrik-Cards
Stoaragecraft-Cards
Data Protection Strategies and Secrets

December 10, 2020
11:00am – 5:15pm EST | 8:00am – 2:15pm PST

Natalie Silvanovich
Security Researcher,
Google

Natalie Silvanovich is a security researcher on Google Project Zero. Her current focus is messaging applications and video conferencing. Previously, she worked in mobile security on the Android Security Team at Google and as a team lead of the Security Research Group at BlackBerry, where her work included finding security issues in mobile software and improving the security of mobile platforms. Outside of work, Natalie enjoys applying her hacking and reverse engineering skills to unusual targets and has spoken at several conferences on the subject of Tamagotchi hacking.

[ifso id="2153"]

Mel Beckman
Sr. Contributing Editor, ITPro Today

Mel Beckman is a senior contributing technical editor for ITPro Today. He has built two regional Internet service providers and is currently president of Beckman Software Engineering, a technical consultancy specializing in large-scale, high-bandwidth networks. His past clients include Apple Computer, the City and County of Santa Barbara, DuPont Displays, IBM, Loral Federal Systems, United Airlines, the US Department of Agriculture, and the US Department of Energy. Mel has presented seminars on computer programming and network technology throughout the United States, Europe, and Asia.

Dale Levesque
Director Product Management, TierPoint

Dale Levesque is responsible for the development of various cloud and managed services, including storage, backup, and DRaaS, for TierPoint. Prior to TierPoint, Dale served in a number of strategic technology roles, including the deployment of international fixed broadband wireless infrastructure and management of global software development teams in the enterprise virtualization space. Mr. Levesque also served in the United States Navy, supporting Operation Desert Storm.

Gijsbert Janssen van Doorn
Director Technical Marketing, Zerto

Gijsbert Janssen van Doorn is the Director of Technical Marketing at Zerto with a focus on helping customers understand and adopt IT Resilience. Before taking on the role as the Director of Technical Marketing, Gijsbert spent 4 years between being a Technology Evangelist and working in the field for Zerto’s Systems Engineering department. Prior to Zerto, Gijsbert was a Sales Engineer at Nexenta Systems supporting the sales of Software Defined Storage. Gijsbert has over 15 years of experience in IT and has been involved in designing and implementing large IT infrastructures at both enterprises and large cloud service providers.

Brien Posey
Technology Author & Microsoft MVP

As an international best-selling technology author and 18-time Microsoft MVP, Brien Posey has written or contributed to dozens of books, and created numerous video training courses on a variety of IT and space-related topics. Brien has published more than 7,000 technical articles and whitepapers for various websites and periodicals. He has received Microsoft’s MVP award numerous times for his work in Windows Server, IIS, Exchange Server, File Systems / Storage, Cloud and Datacenter Management, and Windows and Devices for IT. Brien was previously CIO for a national chain of hospitals and healthcare facilities, and served as lead network engineer for the U.S. Department of Defense at Fort Knox. In addition to his ongoing work in IT, Posey is training as a commercial astronaut candidate in preparation to study polar mesospheric clouds from space.

Keith Mokris
Sr Product Marketing Manager, Prisma Cloud

Keith Mokris leads product marketing for Prisma Cloud at Palo Alto Networks where he is focused on helping enterprises secure their cloud native applications. Previously, he led product marketing at Twistlock and NowSecure, a mobile application security testing startup. In his free time, he is a landscape and street photographer.

Ankur Chadda
Principal Product Marketing Manager, Forcepoint

Ankur serves as Principal Product Marketing Manager for Forcepoint. He brings over 20 years of experience in the technology industry and leads the product marketing efforts for data protection solutions leveraging his UEBA startup experience where he helped global enterprises implement behavior analytics. Ankur also led the discussions on security solutions with industry luminaries, CISOs and CIOs from Fortune 500 companies and government agencies as the head interviewer-publisher of the book: Borderless Behavior Analytics. Prior to that, he was at a network performance testing and measurement company as a member of the product marketing team for their application and security solutions portfolio.

Bob Mechler
Principle Security Strategist, Forcepoint

Bob Mechler is Forcepoint’s Principal Security Strategist, and previously served as Vice President – Strategy, Risk and Programs for Verizon. In this capacity, he was responsible for delivery of information security strategies that protected sensitive data for over 140M customers and $120B in financial transactions. During this time, Bob also served as Chair of the Customer Authentication Steering Committee. Bob holds a Master’s degree in Information Systems Management from Stevens Institute of Technology as well as a Bachelor of Science degree in Computer Science from the University of Delaware.

Corey Nachreiner
Chief Technology Officer, WatchGuard

Recognized as a thought leader in IT security, Nachreiner spearheads WatchGuard’s technology vision and direction. Previously, he was the director of strategy and research at WatchGuard. Nachreiner has operated at the frontline of cyber security for 16 years, and for nearly a decade has been evaluating and making accurate predictions about information security trends. As an authority on network security and internationally quoted commentator, Nachreiner’s expertise and ability to dissect complex security topics make him a sought-after speaker at forums such as Gartner, Infosec and RSA. He is also a regular contributor to leading publications including CNET, Dark Reading, eWeek, Help Net Security, Information Week and Infosecurity, and delivers WatchGuard’s “Daily Security Byte” video on Facebook.

Bill Hansen
Senior Product Manager of Cloud Services, StorageCraft

Andy is a motivated technical Bill Hansen is a senior product manager for cloud services at StorageCraft, and has more than 18 years in the data storage industry. Prior to StorageCraft, Bill had a leading product management role in Lenovo’s Data Center group, before that at EMC in the Consumer and Small Business product division, and also previously at Iomega Corp. He held a role in design engineering at Iomega working on the Zip and Rev technologies. He holds a B.S. in electrical engineering from Utah State University and a Master’s in Business Administration from the Eccles school of Business at the University of Utah.

Joshua Stenhouse
Sales Engineer, Rubrik

Joshua Stenhouse is a Principle Solutions Architect at Rubrik, Zerto evangelist, and PowerShell blogger (virtuallysober.com), with over a decade of experience in designing, implementing, and advising on data protection solutions for virtual environments. Leveraging his knowledge of PowerShell, REST APIs, data-center innovation, and cloud, Joshua helps individuals improve their skills and organizations transform IT with the latest and greatest in technology and automation.

Orin Thomas
Cloud and Datacenter Expert

Orin Thomas has written more than 3 dozen books for Microsoft Press on topics including Windows Server, Windows Client, Azure, Office 365, System Center, Exchange Server, Security, and SQL Server. He has authored Azure Architecture courses at Pluralsight, has authored multiple Microsoft Official Curriculum and EdX courses on a variety of IT Pro topics, speaks at conferences around the world, and is completing a Doctorate of Information Technology on cloud computing security and compliance at Charles Sturt University. You can follow him on twitter at twitter.com/orinthomas

Matt Chiodi
CSO Public Cloud, Palo Alto Networks

Matt has spent the last eight years of his career focused exclusively on public cloud security working for some of the most well-respected companies in the Fortune 500. Prior to joining Palo Alto Networks by way of the RedLock acquisition, Matt was the Global Head of Cloud Security at Cognizant Technology Solutions, with more than 260,000 associates worldwide.

Harjit Dhaliwal

Harjit Dhaliwal is an experienced Senior System Administrator specializing in Windows-based technologies with a demonstrated history of working in the higher education industry. He is skilled in Windows Servers, Windows 10, System Center Suite (SCCM, SCOM), Microsoft Intune, Office 365, patch management, virtualization, security, desktop imaging (OSD), application packaging, print server management, technology training, PowerShell, and VMware (vSphere and Horizon View).