[1 CPE] Can Attackers Take Down Your Identity Provider?

  Presented by Sarah Cecchetti, Director of Product Management • Semperis

What would happen if an attacker came after your Active Directory, Okta, Ping, or Entra? Do you think that’s going to get easier or harder for the attacker if your company is AI-enabled? Do you have the right protections to keep them out? Do you know what to do if they get in and take down everyone’s ability to log in? Find out how the world’s top companies are securing their identity infrastructure in the age of AI. Make sure you have plans in place to recover quickly and be the hero if the worst happens.

[1 CPE] Data Resilience in the Age of Attack: Protect What Matters

  Presented by Landra Pierce, Product Strategy Technologist • Veeam

Cyberattacks are no longer a distant threat; they are a reality every IT team must be prepared for. When an attack occurs, your data becomes both the primary target and the key to recovery. Many organizations still rely on backup strategies that are designed for hardware failures or accidental deletions, rather than today’s threats, like ransomware, insider risk, and automated attacks. This disconnect creates vulnerabilities, especially when backups become an overlooked entry point in your security strategy. In this session, we will address these challenges to help you better protect your organization.

This session is ideal for IT professionals who want greater confidence in safeguarding their data and peace of mind. We will examine the most common oversights that leave organizations, including those in government, education, healthcare, and other sectors, exposed to cyberthreats. You’ll discover how teams are advancing beyond basic backup to adopt a cyber-ready approach, including topics like immutability, threat awareness, rapid recovery, and intelligent automation.

Our focus will be practical and grounded in real-world scenarios, and what truly works when pressure is high and time is limited. Because when every minute counts and trust is at stake, data resilience means more than surviving an attack. It’s about protecting what matters most and emerging even stronger.

[1 CPE] Beyond Backups: Building a Cloud Disaster Recovery Strategy that Works

  Presented by Seth Eliot, Principal Resilience Architect • Arpio

You’ve backed up your data. You’ve secured your application code and infrastructure as code. You’ve documented runbooks. But when Google accidentally deleted a customer’s entire cloud environment for a week, or when Change Healthcare’s partners refused connectivity for 90 days after a breach, backups alone weren’t enough. The real objective is to recover quickly and completely—data, infrastructure, networking, configuration, and security principles—all together.

In this talk, you’ll learn the requirements for fast, reliable recovery, including cross-region and cross-account isolation, complete workload recovery, and testability. We’ll walk through the design decisions you need to make and how you can implement them using cloud native tools. All while applying best practices to reduce toil and test your DR strategy safely and frequently.

[1 CPE] Achieving Ransomware Resilience and Disaster Recovery in a Multi-Cloud World

  Presented by Mike Dusche, DR & Cyber Resilience Specialist • HPE

Discover how to achieve an always-on 24/7 business, ensuring that customers and stakeholders can expect uninterrupted access to their data and applications. Learn how to solve for Ransomware Resilience, Disaster Recovery, and Multi-Cloud mobility for virtualized environments, with continuous data protection (CDP) for any app, any cloud, and any threat. With the right solutions in place, your organization can seamlessly protect critical data and applications, mitigate the risk of ransomware attacks, and maintain business continuity.

Explore strategies for achieving ransomware resilience, automated disaster recovery planning and testing, and flexible hybrid-cloud capabilities that allow you to move applications and scale capacity on demand. By integrating comprehensive data protection measures, you can ensure compliance with regulatory mandates and provide robust resilience against evolving cyber threats. This approach empowers your IT team to focus on strategic initiatives by reducing the burden of manual recovery processes and ensuring rapid restoration of operations.

[1 CPE] Anatomy of a Ransomware Attack: Prepare, Respond, Recover

  Presented by Torry Williams, Lead Solutions Architect • 11:11 Systems

Recovery plans are no longer optional—they’re inevitable. In today’s evolving threat landscape, every business will be tested. Whether it’s traditional disasters driven by nature or human error, or modern-day crises fueled by cyberattacks and ransomware, the stakes are higher than ever.

How do you ensure your organization is prepared not just to survive, but to recover with confidence? In this session, we’ll cover:

  • The key stages of a cyberattack and what they mean for your business
  • Best practices to reduce your exposure and minimize impact
  • Essential tools and strategies to recover quickly if compromised
  • What a real-world recovery looks like—and how to be ready for it

[1 CPE] Crisis to Confidence: Enhance Your Incident Response & Recovery with Data Protection

  Presented by Zach Wood, Solutions Architect • Druva

In today’s threat landscape, resilience isn’t just about bouncing back—it’s about bouncing forward. Join us for a dynamic session that redefines how organizations approach data protection, recovery, and cyber resilience.

Discover why traditional backup is no longer enough and how modern, SaaS-native strategies can eliminate blind spots, reduce risk, and give you a real competitive edge. We’ll explore the forces reshaping security and IT teams, expose the gaps legacy tools leave behind, and walk through real-world use cases that show how leading organizations are transforming reactive recovery into proactive resilience.

Whether you’re navigating ransomware threats, managing sprawling SaaS ecosystems, or trying to do more with less, this session will equip you with a practical path to greater confidence and control.

Zach Wood is a seasoned Solutions Architect with over 25 years of experience in data protection, encompassing roles as both a customer and sales engineer. For the past four years, he has been an integral part of Druva, a leader in cloud data protection and management solutions, where he leverages his extensive expertise to assist organizations in safeguarding their critical data assets.

[1 CPE] Fortifying Data Resilience: When Backups Become Back Doors to Cyberthreats

  Presented by Rick Vanover, Vice President of Product Strategy • Veeam

Ransomware threats don’t discriminate. And as the industry’s leading provider of data resilience solutions, we’ve seen it all. Public sector organizations are just as likely to be targeted as those in the private sector, and the stakes can be even higher. Veeam’s latest Ransomware Trends Report exposes critical vulnerabilities and highlights why relying solely on backups is no longer enough to ensure resilience. In this session, Veeam’s VP of Product Strategy, Rick Vanover, will unpack the most common oversights that leave organizations — government, education, healthcare, and beyond — exposed to cyber threats, especially when backups become an overlooked back door in your security strategy.

Drawing from real-world incidents and hard-earned lessons, Rick will share what he wishes every IT professional knew before facing a ransomware or security breach event. You’ll leave with actionable insights, practical guidance, and research-backed recommendations to help you strengthen your data resilience. Whether you’re securing sensitive public sector data or safeguarding private enterprise information, this session will equip you to prepare for tomorrow’s threats today.

[1 CPE] Legacy to Modern: Data Migration & Integration for Business Continuity

  Presented by Rami Ramireddy, Chief Executive Officer • ESS

As organizations evolve, aging systems can become a barrier to agility, security, and scalability. This session explores how to transition from legacy platforms to modern ERP environments while maintaining business continuity and disaster recovery readiness. We’ll discuss best practices for data migration, internal system integration, and secure API exposure to external partners—all without referencing specific products or services.

Attendees will gain insights into:

  • Planning and executing data migration with minimal disruption
  • Designing resilient architectures for business continuity
  • Strategies for disaster recovery in hybrid environments
  • Connecting internal systems and exposing data securely via APIs

[1 CPE] Achieving Ransomware Resilience and Disaster Recovery in a Multi-Cloud World

  Presented by Ken Smallwood, Systems Engineer • HPE Zerto Software

Discover how to achieve an always-on 24/7 business, ensuring that customers and stakeholders can expect uninterrupted access to their data and applications. Learn how to solve for Ransomware Resilience, Disaster Recovery, and Multi-Cloud mobility for virtualized environments, with continuous data protection (CDP) for any app, any cloud, and any threat. With the right solutions in place, your organization can seamlessly protect critical data and applications, mitigate the risk of ransomware attacks, and maintain business continuity.

Explore strategies for achieving ransomware resilience, automated disaster recovery planning and testing, and flexible hybrid-cloud capabilities that allow you to move applications and scale capacity on demand. By integrating comprehensive data protection measures, you can ensure compliance with regulatory mandates and provide robust resilience against evolving cyber threats. This approach empowers your IT team to focus on strategic initiatives by reducing the burden of manual recovery processes and ensuring rapid restoration of operations.

[1 CPE] Active Directory: Ransomware, Risk, Review, Recovery

  Presented by Rob Ingenthron, Sr Solution Engineer • Semperis

Cyberattackers are adept at finding ways through your defenses and into identity systems like Active Directory. Many organizations use Active Directory as the primary identity service, and Active Directory is typically tied into almost everything, including Entra ID. From there, they can move laterally, escalate privileges, access sensitive resources, and inject malware or ransomware. Implementing a layered defense that includes identity threat detection and response (ITDR) is key to protecting your operational resilience.

Join Rob Ingenthron, Sr Solution Engineer, to learn:

  • How layered defense has changed over time
  • Why ITDR is now an essential part of a robust layered defense strategy
  • The continuing importance of hygiene and auditing for Active Directory
  • How a layered defense can help you combat attacks that are designed to bypass traditional methods of defense
  • Which best practices lead to a strong layered defense