Description
Where is your data? Do you have it controlled and backed up? If all your data is in the Cloud, how do you verify that the backup recovery is rapid? If your data is in various silos from your application providers, how do you ensure you have the protection and disposal approaches needed? This session will help you understand and guide your IT team and providers to take the right actions to protect your business. Backup considerations, including Cloud, backup appliance, disaster recovery, and business continuity approaches, are included. If you are from the "trust but verify" school of thought, this session will help you ask the right questions.
Presenters - Thomas G. Stephens Jr
Designed For
Business professionals who want to ensure that appropriate backups are in place in their organization
Objectives
- Distinguish the differences in the top five methods for backup
- Detect common backup deficiencies
- Categorize backup priorities, including RPO and RTO
- Create an implementation plan for your business
Highlights
- List the significant backup approaches Identify areas of critical weakness or threats in your backup and recovery systems
- List all critical and non-critical applications and establish their order of recovery
- Differentiate between backup solutions based on their features and benefits
Advanced Prep
None
Register Now
Leaders
CALCPE Panel
No Biography Available