Skip navigation
Country: U.S.
Register Now

Agenda

Explore. Secure. Transform.

Sunday, April 8

Pre-conference Education

  • Code42 Foundations

    Code42 Foundations begins with fundamental client and end-user information particularly applicable for help desk personnel and administrators new to Code42. Following an examination of the end-user experience, instruction will progress to an administration console review and an analysis of Code42’s global administration configurations, focusing on how to define default backup settings and configure organization settings such as offered destinations and security policies.
    Level: Beginner

Monday, April 9

Pre-conference Education, Registration, Welcome Reception

  • Code42 API Workshop

    Walk through the Code42 API and get script recipes and hands-on guidance for use cases such as custom reports, integration with external monitoring systems, and automated restores. Basic knowledge of the various UNIX/ Linux shell environments (e.g. BIN/ BASH/BOURNE) is recommended.
    Level: Advanced

  • An In-Depth Look at Code42 Security Center

    Code42 Security Center, released with version 6.0 of the Code42 platform, is rapidly expanding to better identify and monitor end-user behavior. In this session we will review Code42 Security Center’s dashboards and monitoring features and examine Code42’s endpoint monitoring data collection and analysis processes.
    Level: Intermediate/Advanced

  • ’18.Xpert: What’s New Since Code42 6.0

    Get up to speed on the latest Code42 product releases! In this session we will discuss and utilize new features introduced since version 6.0. Topics will include Security Center enhancements; agent updates, deployment and customization; and user interface upgrades. This course is recommended for those who have previously completed a Code42 education course or who have a high level of experience with Code42.
    Level: Intermediate

  • Code42 Agent Deployment and Customization

    In this session we will discuss and utilize Code42’s app customization and deployment procedures as well as review enhancements to Code42’s integration with LDAP and Okta.
    Level: Intermediate

  • Code42 Certified Administrator Exam

    New for Evolution18! Attain your Code42 Administrator certification by taking an in-person, proctored exam as part of pre-conference education. Upon successful completion ofthe two-part exam you will earn a certificate of completion, a badge for your Code42 Community avatar, and an exclusive invitation to the annual certified admin breakfast with Code42 executives at Evolution18. While there are no exam prerequisites, we strongly encourage thorough review of the study guide (to be provided) prior to attempting the exam. Code42 University also offers on-demand, classroom, and virtual instructor-led courses to further help you prepare. For more information on ongoing course offerings, check out university.code42.com.
    Level: Advanced

  • Code42 API Workshop

    Walk through the Code42 API and get script recipes and hands-on guidance for use cases such as custom reports, integration with external monitoring systems, and automated restores. Basic knowledge of the various UNIX/ Linux shell environments (e.g. BIN/ BASH/BOURNE) is recommended.
    Level: Advanced

  • An In-Depth Look at Code42 Security Center

    Code42 Security Center, released with version 6.0 of the Code42 platform, is rapidly expanding to better identify and monitor end-user behavior. In this session we will review Code42 Security Center’s dashboards and monitoring features and examine Code42’s endpoint monitoring data collection and analysis processes.
    Level: Intermediate/Advanced

  • ’18.Xpert: What’s New Since Code42 6.0

    Get up to speed on the latest Code42 product releases! In this session we will discuss and utilize new features introduced since version 6.0. Topics will include Security Center enhancements; agent updates, deployment and customization; and user interface upgrades. This course is recommended for those who have previously completed a Code42 education course or who have a high level of experience with Code42.
    Level: Intermediate

  • Code42 Agent Deployment and Customization

    In this session we will discuss and utilize Code42’s app customization and deployment procedures as well as review enhancements to Code42’s integration with LDAP and Okta.
    Level: Intermediate

  • Welcome Reception

    Join fellow conference goers and the Code42 team to officially kick off Evolution18.

Tuesday, April 10

Opening Keynote, Breakout Sessions, Celebration Event

  • Breakfast

    Get your caffeine fix and grab a bite to prepare your mind for a day of learning, networking, and fun.

  • TechXperts Lab

    Spend time in our lab to get your technical questions answered directly from Code42 experts and to play with the latest version and features of Code42.

  • Evolution18 Expo

    Meet up with complementary solution providers, chat with Code42 product experts, and network with industry professionals at the expo.

  • Code42 Store

    Who doesn't want more Code42 swag? Stop by our store to redeem Code42 Cash for the latest goods.

  • Opening Session

    Attend the opening session of Evolution18 to hear Code42 CEO Joe Payne and other leaders speak about the evolution of data security, product innovations, and what's ahead for Code42.

  • The Latest of Code42: A Crash Course on What’s New and What’s Next

    Learn about the newest capabilities added in the latest version of Code42 and get a sneak peek into what we're working on for the rest of the year. Leave prepared to take advantage of these new capabilities.

  • The Latest Advances in Security Operations: A Panel with Security Leaders

    Justifying increases in security budgets can be very difficult, and the difference between what budget is needed and what budget is allocated can expose organizations to some serious threats. But it's possible to build a high-performing, highly-ranked security program despite a relatively small budget. Get some tips on how to achieve an effective program from professionals who have done it.

  • Why Should I Care? Getting Users on Board in an Opt-In Model

    Whether you're a university, research lab, or enterprise, if Code42 is optional for your user base, join this session to hear Code42 experts discuss best practices for user adoption. Learn the tools that are most effective in encouraging your users to opt in to using Code42 to protect their data.

  • The Latest of Code42: A Crash Course on What’s New and What’s Next

    Learn about the newest capabilities added in the latest version of Code42 and get a sneak peek into what we're working on for the rest of the year. Leave prepared to take advantage of these new capabilities.

  • Forrester: The Value of Code42 in Your Security Landscape

    The security landscape is wide and crowded, but how do you know who does what, and where Code42 can help seal the cracks in your threat exposure? Stephanie Balaouras, Vice President and Research Director from Forrester will share her team's most recent research on IT security frameworks, governance, risk and compliance.

  • Partner Session

    Join a Code42 partner and joint customer for a great session on how our technologies align to make your job easier.

  • Lunch

    Take a breather from the morning and fill your belly to fuel up for an afternoon full of aha moments.

  • Using the Code42 API to Manage Your Environment

    If you haven't used the Code42 API, you're limiting the possibilities of your deployment. From cleaning up old devices to moving data to other tools, there are a lot of reasons to use the API. Learn more about use cases and tips for successful use in this session.

  • Spies, Coups, and Trojan Horses: How a Security Leader is Reimagining Digital Forensics

    The best way to anticipate problems is to be at the cutting edge of experiencing evolving threats. This session will explore some of the most extraordinary security breaches in (and out of) recent news with the people who helped solve them.

  • Data Privacy in a Globalized World: How Are You Planning for Compliance?

    From GDPR to data center location laws, doing business between countries is only getting more complicated. Attend this session to learn about global data protection and privacy laws that you should be aware of, and how Code42 can support your compliance requirements.

  • Files Held for Ransom? Natural Disaster? 5 Best Practices for Data Recovery

    Let's face it, we back up data so that we can recover it in real time. It's basic IT hygiene that never goes away. In this session, you'll learn more about our best practices for keeping your environment tuned for optimal restores, especially in the face of catastrophic events like ransomware. You'll also hear from security expert Michelle Killian and Code42 customer BAYADA Home Health Care about the way that IT and Security teams can work together to detect and respond to infections like rasomware quickly.

  • Building an Effective Third-Party Security Program

    With the ever-increasing reliance on third parties to scale our businesses, provide expertise, and drive efficiencies, having an effective risk-based third-party security practice has never been more important. In this session you’ll learn effective ways to manage third-party security risk and hear real-world stories from Code42's Manager of Security Risk and Compliance Todd Thorsen.

  • OneDrive and Google Drive Aren’t Backup: Here’s Why

    When there's confusion over IT functionality from Line of Business Leaders and IT leadership who are looking to cut costs, it can be hard to make a business case for protecting data and ensuring that it's recoverable. Attend this session to hear from a Code42 customer that tested Code42 against Google Drive in a Proof of Concept (POC). They'll cover how they influenced management and won approval to purchase Code42, and we'll give you the latest analysis from Gartner.

  • Tips and Tricks for New Code42 Customers

    If you've become a Code42 customer in the last year or so, don't miss this session. Our systems engineering and customer champion teams will share their top system tricks, and even some #lifehacks we love for troubleshooting the most common problems customers experience.

  • Insider Threats Are Real, and IT Teams Are Finding Them…FAST

    Whether your organization goes through mergers and acquisitions or if you've ever had issues with employees taking or deleting data in their off-boarding process, you know that losing IP can be catastrophic. In this session, we'll discuss best practices for identifying risky behavior, and share examples of how data security has already protected Code42 customer IP.

  • Data Security in the Era of the Cloud: Futurist Discussion with Security Leaders

    As the borders between physical devices and the cloud continue to blur, security professionals are challenged to reframe their perspectives. Attend this session to hear how industry leaders are planning for future threats today.

  • Using the Code42 API to Manage Your Environment

    If you haven't used the Code42 API, you're limiting the possibilities of your deployment. From cleaning up old devices to moving data to other tools, there are a lot of reasons to use the API. Learn more about use cases and tips for successful use in this session.

  • DLP Is Dying. How to Use Code42 to Bridge the Data Loss Gap

    With stalled installations, mountains of false positives, and prevention policies that are too restrictive for normal users, both Gartner and Forrester have predicted the decline of formalized data loss protection software. But what's next? Where is the security product landscape moving? Code42 market and product experts will talk about the ways proactive alerting and remote locking actions can support business productivity while still leaving you in control.

  • Using Endpoint Data Preservation Policies in Legal Disputes

    This session will discuss why preserve-in-place legal holds are more proactive than traditional methods, and demonstrate how files are handled throughout the collection and preservation process. You'll walk away with a better understanding of how to use Code42 to support the defensibility of your company's legal hold procedures.

  • Evolutionaries Award Ceremony and Networking Reception

    The Code42 Evolutionaries recognize the achievements of Code42 customers—celebrating the unique deployments, successful adopters, best-practice makers and innovative users of Code42.

  • Conference Party

    Cap off the first day of Evolution18 conference sessions at the Exploratorium museum, a public learning laboratory exploring the world through science, art, and human perception. The ultimate in science museums, this is a can’t miss venue that will inspire curiosity.

Wednesday, April 11

Guest Keynote, Breakout Sessions, Event Wrap-up

  • Evolution18 Expo

    Meet up with complementary solution providers, chat with Code42 product experts, and network with industry professionals at the expo.

  • TechXperts Lab

    Spend time in our lab to get your technical questions answered directly from Code42 experts and to play with the latest version and features of Code42.

  • Code42 Store

    Who doesn't want more Code42 swag? Stop by our store to redeem Code42 Cash for the latest goods.

  • Breakfast

    Get your caffeine fix and grab a bite to prepare your mind for a day of learning, networking, and fun.

  • How the Backup, Restore, Threat Alerting, and Security Processes Work

    If you've ever wanted to dig into the tech and understand how Code42 actually works, you won't want to miss this session. We'll cover the lifecycle of a file from backups and restores, to preserving files for legal holds and investigating a security incident; including de-duplication, encryption, backup settings, versioning, cold storage, forensic search, legal matters, and more.

  • Security Workshop 101

    Ever wonder where to start the endpoint security journey or how Code42's security tools could be useful to you Security and IT teams? Code42's professional services team has created a personalized workshop that has been used by many customers to answer those questions. In this session, they'll share some of the essential starting points and their tips for combating the most common issues they have seen.

  • NIST 800-171, DFARS, FISMA: How Can Code42 Help?

    New federal grant requirements coming in 2018 will require data retention for 7 years. And beyond just retention, visibility is essential. How can you tell if your UCI research data is leaving the university? Join Code42 education experts to discuss these regulations.

  • OneDrive and Google Drive Aren’t Backup: Here’s Why

    When there's confusion over IT functionality from Line of Business Leaders and IT leadership who are looking to cut costs, it can be hard to make a business case for protecting data and ensuring that it's recoverable. Attend this session to hear from a Code42 customer that tested Code42 against Google Drive in a Proof of Concept (POC). They'll cover how they influenced management and won approval to purchase Code42, and we'll give you the latest analysis from Gartner.

  • Code42 Device Migrations: USMT and Other Best Practices to Minimize Downtime

    Device migrations can drain IT time and put data at risk. In this session, Code42 product experts and IT professionals from Code42 customer MacDonald-Miller will discuss the challenges of current device refresh strategies and how Code42 can make your process more efficient, secure and reliable. They'll also cover how Code42's integration with USMT can help you minimize business user downtime. You'll walk away having seen a step-by-step tutorial for transferring both data and profile settings.

  • Deploying Code42 with STYLE

    Ever had questions about deploying, branding, and version upgrades? The process has been significantly upgraded with Code42 version 6.5, so sending out a new client to users is better than ever. This session will focus on deployment, but touch on upgrades as well. Attend this session to understand how to use the functionality, especially in conjunction with SCCM and jamf.

  • Files Held for Ransom? Natural Disaster? 5 Best Practices for Data Recovery

    Let's face it, we back up data so that we can recover it in real time. It's basic IT hygiene that never goes away. In this session, you'll learn more about our best practices for keeping your environment tuned for optimal restores, especially in the face of catastrophic events like ransomware. You'll also hear from security expert Michelle Killian and Code42 customer BAYADA Home Health Care about the way that IT and Security teams can work together to detect and respond to infections like rasomware quickly.

  • Why and How to Build an Insider Threat Program

    Jadee Hanson is a security professional who has specialized in securing enterprise data from insider threat. In this session, Jadee will provide a behind-the-scenes look at what it’s really like to run an insider threat program—a program in which you take steps to prevent employees from leaking, exfiltrating and exposing your organization’s information.

  • Visibility Matters: A Security Game Changer

    Be the first to get an exclusive look at the newest Code42 feature to be announced at Evolution18!

  • Running the Business vs. Building the Business: A CIO’s Guide to Demonstrating Business Value

    The IT organization of the future is already beginning to shift its focus from digital transformation to exploring the potential of AI. But IT teams still need to keep the lights on and support users today. Join Code42 CIO Jeremy Bauer for a discussion about how to balance future growth with day-to-day operations. Jeremy will also share his methodology for demonstrating business value to justify time and investment in innovative technologies.

  • Tips and Tricks for New Code42 Customers

    If you've become a Code42 customer in the last year or so, don't miss this session. Our systems engineering and customer champion teams will share their top system tricks, and even some #lifehacks we love for troubleshooting the most common problems customers experience.

  • Code42 and Your SIEM: Find the Value in Your Data

    Take your investigation and analysis to the next level with Code42 and your SIEM! Join this session as we discuss why and how our customers are leveraging Code42 as a data-source for their SIEM tools. We'll cover our certified Code42 App for Splunk and how to leverage that data for alerts, reports, visualizations and investigations, as well as take a look under the hood at the Code42 REST API, so you can start bringing Code42 information into tools you use today.

  • Lunch

    Take a breather from the morning and fill your belly to fuel up for an afternoon full of aha moments.

  • Closing Session

    Join us as we wrap up Evolution18 with our guest keynote speaker, Theresa Payton, and a grand send-off from Joe Payne. You won't want to miss the announcement of Evolution19!