MegaCast By ActualTech Media Complete Data Protection: Security, Training, Backup, and More

Featuring

  • Veeam
  • Pure Storage
  • Rubrik
  • Hewlett Packard Enterprise
  • Recovery Point
  • Zerto
  • Zscaler
  • Cohesity

About This MegaCast

Protecting organizational data requires a comprehensive approach that integrates robust security measures, effective employee training, reliable backup strategies, and more.

This MegaCast will explore how to create a holistic data protection framework to safeguard critical assets from internal and external threats. As an attendee, you will learn about the latest tools and techniques for securing sensitive information, strategies for educating employees to recognize and prevent cyber risks, and best practices for ensuring business continuity through effective backup and recovery plans.

The discussion will also cover emerging challenges and how to prepare for future threats. Join us to discover how to build a resilient and secure data environment that supports business goals.

  1. Trevor Pott

    Guest Speaker Trevor Pott Solutions Architect

  2. Rick Vanover

    Featuring Rick Vanover Veeam Product Strategy, Office of the CTO Veeam

  3. Jason Walker

    Featuring Jason Walker Technical Strategy Director, Cyber Resilience Pure Storage

  4. Justin Ruiz

    Featuring Justin Ruiz Senior Product Marketing Manager Rubrik

  5. Marc Kravitz

    Featuring Marc Kravitz Solution Business Manager, North America Data Services & Storage Hewlett Packard Enterprise

  6. Jeff Judy

    Featuring Jeff Judy Chief Cloud Architect Recovery Point

  7. Bryan Fisher

    Featuring Bryan Fisher Cloud Architect Zerto

  8. Steve Grossenbacher

    Featuring Steve Grossenbacher Senior Director, Product Marketing Zscaler

  9. Chris Hoff

    Featuring Chris Hoff Senior Product Marketing Manager Cohesity

  10. Brad Vincent

    Featuring Brad Vincent Senior Product Marketing Manager Cohesity

What You'll Learn

  1. Gain insights into building a comprehensive data protection strategy
  2. Discover tools and techniques for securing sensitive information
  3. Explore effective backup and recovery solutions to ensure continuity