Developing a 360 Data Management Strategy for Your Business

  Presented by World Wide Technology & Veritas

Exponential data growth, rising storage costs, complex cloud migrations, and stringent regulations are forcing organizations to find efficient and economical ways to take control of and manage their growing data environment.

Join this session to learn how a global financial institution and a large data analytics company were both able to successfully implement an end-to-end data management strategy, which encompassed the following:

  • Data Protection: ensure data copies are kept for redundancy to prevent data loss.
  • Compliance Readiness: proper retention and timely destruction of data as regulatory requirements dictate.
  • Data Visibility: understanding what data you have, where it is, and how it’s used.
  • Data/Workload Portability: movement and migration of applications and data among various on-prem and cloud locations.
  • Business Continuity: recovery and resilience that is needed when massive outages or disasters occur.
  • Storage Optimization: automating the storage of data across resources to optimize cost and performance.

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Shifting from ITSM to ESM as a Way to Enable and Transform the Enterprise

  Presented by ServiceNow

As a member of IT, have you found yourself doubting your relationship with the rest of the organization as you’re perceived as a cost center rather an equal part stakeholder with a common goal? Do you find yourself struggling to collaborate with the rest of the organization as the tech debt in your organization has created seemingly insurmountable silo’s? If you feel any of this describes your work environment and how IT may be perceived, please join the discussion in how the concepts of IT Service Management need to shift to a more inclusive Enterprise Service Management strategy. Ultimately, driving more effective technology purchasing, collaboration across the enterprise and re-branding of IT as an organizational enabler.

Choosing the Right Cloud Environment: Public, Private, or Hybrid

  Presented by Atmosera

In pursuit of enhanced connectivity, scalability, and efficiency, cloud migration is hastening across all industry sectors. In order to unlock the cloud’s benefits, these environments—public, private, and hybrid–must be explicitly architected and engineered to suit the respective applications they will host, while also meeting security and compliance requirements. How do businesses determine their ideal cloud environment and optimize it post-migration?

In this presentation, we will review and compare:

  • The physical and virtual components of public, private, and hybrid cloud environments
  • The business considerations that differentiate each environment, including storage space, workloads, compliance, internal staff, and other business requirements
  • The relationship between organizations, cloud providers, and MSPs
  • The best practices organizations should consider keeping their cloud environment secure, compliant, and optimized post-migration

The Monsters We Build: Apps from Pieces and Parts

  Presented by F5 Networks

The way we build applications today differs greatly from how they were built just a few years ago. The rise of architectural approaches to development like microservices, function-as-a-service, and injectable components have simplified some aspects of application development but has made our applications into lumbering Frankenstein’s monsters in other ways. Learn how to properly map out your monster’s anatomy and identify hidden, critical weaknesses in delivery, security, and operability…before they come after you with torches.

Virtualizing Production Databases: SQL Server

  Presented by IVOXY Consulting

How do you know if your SQL Server VM’s are as fast as they could be? When a SQL VM is “slow”, is it the database or the way the VM is built? What should we do differently when we build a virtual SQL server? If you’ve asked – or been asked – questions like these, allow us to share our 12 years’ experience in designing virtual infrastructure for mission-critical applications & databases.

Presentation topics include:

  • What makes a virtual database server different than a physical one
  • Properly sizing a SQL VM: Bigger is not better
  • Tuning a VM for transactional performance
  • Configuring storage queues
  • The metrics that matter, what they mean & how to spot bottlenecks
  • How to leverage virtualization for a better backup & DR strategy

A New Era for Data Protection: Converged DR and Backup

  Presented by Zerto

In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!

  • The cost and business impact of downtime and data loss can be immense
  • Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters
  • Having a plan and process in place will help you mitigate the impact of an outage on your business

In this presentation we will address the challenges, needs, strategies, and solutions.

Building the SNOC: How to Integrate SecOps and NetOps

  Presented by ExtraHop

As the IT environment becomes more complex and distributed, it is more important than ever that Security Operations and Network Operations teams work together. This presentation explains the opportunities for optimizing budgets, cross-training staff, accelerating threat response, and improving end-user experience that come with integrated security and network operations. Attendees will also learn practical steps they can take toward building an integrated Security and Network Operations Center (SNOC).

The Current Malware Threat Landscape & Best Practices for Remediation

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.