Skip navigation https://evolution.code42.com/wp-content/themes/conferencewp
Country: U.S. U.K.
Register Now

Agenda

Discover what's new, apply best practices and maximize your data and investment

Monday, May 1

Pre-conference Education

  • Code42 6.Xpert

    Take a deep dive into the latest Code42 product release! In this course we will discuss and utilize new features introduced in Code42 platform version 6.0. This session will be of particular interest to those who have previously completed a Code42 education course or who have a high level of experience with Code42. Topics will include organization compliance settings, device bandwidth management, Code42 Security Center and user interface upgrades. Level: Intermediate

  • Code42 Foundations

    Code42 Foundations will begin with fundamental client and end-user information especially applicable for help desk personnel and administrators new to Code42. Following the end-user experience, instruction will progress to an Administration Console review and an examination of Code42’s global administration configurations, focusing on how to define default backup settings and configure organization settings such as offered destinations and security policies. This session will include a mix of lecture and hands-on lab exercises. Level: Beginner (new Code42 administrators)

  • Code42 User Lifecycle and Forensic Identification of Insider Threat

    This education session will focus on user lifecycle at a hypothetical organization. We will begin by discussing user on-boarding and designation of organization policies such as roles and permissions. Then, we will focus on Code42's user device refresh experience. The end of the user lifecycle will also be explored, including topics such as user off-boarding, Code42 cold storage and using Code42’s Security Center to identify potential insider threat. All instruction will be followed by hands-on application through an onsite virtual lab environment. Level: Beginner to intermediate

Tuesday, May 2

Pre-conference Education, Registration, Welcome Reception

  • Registration

    Visit the registration desk to grab your badge and some goodies or ask any burning questions you have about the conference! On Thursday morning, stop by registration to drop off your luggage and we'll store it for you until your departure.

  • Code42 6.Xpert

    Take a deep dive into the latest Code42 product release! In this course we will discuss and utilize new features introduced in Code42 platform version 6.0. This session will be of particular interest to those who have previously completed a Code42 education course or who have a high level of experience with Code42. Topics will include organization compliance settings, device bandwidth management, Code42 Security Center and user interface upgrades. Level: Intermediate

  • Client Customization and Directory Services

    Identity management within Code42 is vital to wide-scale deployment. At the same time, as IT administrators, it’s important to make end users' lives as easy as possible by having software preconfigured to your organization’s specifications. In this education session we will discuss and utilize Code42’s integrations with industry-standard directory services LDAP and SSO as well as cover ways in which admins can preconfigure the Code42 client installer prior to rollout, including co-branding and field pre-population. Level: Intermediate to advanced

  • Code42 API Workshop

    In this education session we will walk through the Code42 API and provide script recipes and hands-on guidance for use cases such as custom reports, integration with external monitoring systems and automated restores. Basic knowledge of the various UNIX/Linux shell environments (e.g. BIN/BASH/BOURNE) is recommended. Level: Advanced

  • Code42 User Lifecycle and Forensic Identification of Insider Threat

    This education session will focus on user lifecycle at a hypothetical organization. We will begin by discussing user on-boarding and designation of organization policies such as roles and permissions. Then, we will focus on Code42's user device refresh experience. The end of the user lifecycle will also be explored, including topics such as user off-boarding, Code42 cold storage and using Code42’s Security Center to identify potential insider threat. All instruction will be followed by hands-on application through an onsite virtual lab environment. Level: Beginner to intermediate

  • Code42 User Lifecycle and Forensic Identification of Insider Threat

    This education session will focus on user lifecycle at a hypothetical organization. We will begin by discussing user on-boarding and designation of organization policies such as roles and permissions. Then, we will focus on Code42's user device refresh experience. The end of the user lifecycle will also be explored, including topics such as user off-boarding, Code42 cold storage and using Code42’s Security Center to identify potential insider threat. All instruction will be followed by hands-on application through an onsite virtual lab environment. Level: Beginner to intermediate

  • Code42 API Workshop

    In this education session we will walk through the Code42 API and provide script recipes and hands-on guidance for use cases such as custom reports, integration with external monitoring systems and automated restores. Basic knowledge of the various UNIX/Linux shell environments (e.g. BIN/BASH/BOURNE) is recommended. Level: Advanced

  • Code42 6.Xpert

    Take a deep dive into the latest Code42 product release! In this course we will discuss and utilize new features introduced in Code42 platform version 6.0. This session will be of particular interest to those who have previously completed a Code42 education course or who have a high level of experience with Code42. Topics will include organization compliance settings, device bandwidth management, Code42 Security Center and user interface upgrades. Level: Intermediate

  • Client Customization and Directory Services

    Identity management within Code42 is vital to wide-scale deployment. At the same time, as IT administrators, it’s important to make end users' lives as easy as possible by having software preconfigured to your organization’s specifications. In this education session we will discuss and utilize Code42’s integrations with industry-standard directory services LDAP and SSO as well as cover ways in which admins can preconfigure the Code42 client installer prior to rollout, including co-branding and field pre-population. Level: Intermediate to advanced

  • Evolution17 Welcome Reception

    Join the Code42 team to kick off Evolution17.

Wednesday, May 3

Opening Keynote, Breakout Sessions, Celebration Event

  • Registration

    Visit the registration desk to grab your badge and some goodies or ask any burning questions you have about the conference! On Thursday morning, stop by registration to drop off your luggage and we'll store it for you until your departure.

  • Breakfast

    Don't miss the most important meal of the day. Fuel up for a full day of learning, networking and fun.

  • Code42 Store

    We know you love Code42 swag! Swing by the store to redeem Code42 Cash for t-shirts, drinkware and more.

  • Opening Keynote Session

    Attend the Evolution17 opening keynote to hear Code42 CEO Joe Payne, and other leaders, speak about what's next for Code42 and the product innovations ahead.

  • TechXperts Lab

    Stop by any time for intel straight from Code42 experts on your product and deployment-related inquiries, and to play with the latest version of Code42!

  • Evolution17 Expo

    Meet up with complementary solution providers and network with industry peers and professionals at the expo.

  • The Latest of Code42: A Crash Course on Version 6.0

    Learn about the newest capabilities added in version 6.0, and leave with a better understanding of where and how to optimize your deployment.

  • What You Need to Know About Code42’s Bandwidth Management Functionality

    In version 5.4, Code42 introduced the ability to set data transfer limits based on location from within the admin console. Attend this session to learn how the new bandwidth management functionality works, and what it means for your deployment.

  • Using the Code42 API to Automate 2 Business Workflows

    If you have a basic understanding of the Code42 API and are ready to apply that knowledge to your own environment, you'll want to attend this session. We'll dive into two specific ways you can use API scripts to accomplish your business objectives.

  • How to Answer Your Top 4 Reporting Questions

    Looking to take advantage of the Reporting web app but don't know where to start? In this session, we'll demonstrate how to pull the data needed to answer four of your most common reporting questions, and discuss how that data can be applied to assist other business processes.

  • Lunch

    You're going to need this meal after a morning packed with best practices, demos and tips and tricks. We'll give you a chance to check in on email (no!), network with peers and fuel up for the afternoon.

  • A Day in the Life of a File: How The Backup & Restore Process Works

    If you've ever wanted to dig into the tech and understand how Code42 actually works, you won't want to miss this session. We'll cover the backup and restore process from beginning to end--including de-duplication, compression, encryption, backup settings, versioning and cold storage.

  • Using Code42 to Reduce the Legal Hold Burden

    The process of collecting and preserving Electronically Stored Information (ESI) is critical to Legal's e-Discovery process--and a burden on your team. In this session, we'll walk through how to use Code42 to perform a preserve-in-place legal hold in minutes. We'll also discuss how customers are using Code42 to protect data during litigation and integrate with e-Discovery software.

  • Tips & Tricks for Maintaining A Healthy Code42 Environment

    Wish you knew how to avoid costly mistakes and help desk tickets? Attend this session to learn best practices for optimizing the health of your environment, as well as tips to troubleshoot the most common problems customers experience.

  • Sponsor Session 1

    Hear how a Code42 technology partner is solving data protection and security challenges faced by organizations like yours.

  • Defending Legal Hold: How the Collection & Preservation Process Works

    If your legal team has questions about how Code42 handles data, you'll want to attend this session. We'll discuss why preserve-in-place legal holds are more proactive than traditional methods, and demonstrate how files are handled throughout the collection and preservation process. You'll walk away with a better understanding of how Code42 supports the defensibility of your company's legal hold procedures.

  • Using Code42 & Windows USMT to Migrate User Profile Settings

    User profiles are what give devices a personalized feel, but when lost in the migration process, productivity suffers. What if you could give users a brand new device without losing their backgrounds and shortcuts? Attend the session to learn what settings constitute a user profile, how to back up profile settings, as well as how to apply them to a new device during migration. You'll walk away having seen a step-by-step tutorial for transferring both data and profile settings.

  • How to Answer Your Top 4 Reporting Questions

    Looking to take advantage of the Reporting web app but don't know where to start? In this session, we'll demonstrate how to pull the data needed to answer four of your most common reporting questions, and discuss how that data can be applied to assist other business processes.

  • Understanding Intellectual Property Leak–And Why Your Business Should Care

    IT and Security pros have gone to great lengths to protect corporate data. But when it comes to protecting against data leak, most time and money is spent on protecting regulated data--not the data that's most unique to your business: your Intellectual Property. In this session, we'll discuss the latest information on both accidental and malicious insider threats and demonstrate why IP protection deserves greater business attention.

  • How to Implement Site-based Bandwidth Management

    This is a must-attend session for any customer whose users are distributed across multiple sites or geographies. We'll explain how you can configure Code42 to dynamically adjust data transfer limits based on device network.

  • Best Practices for Performing Data Migrations with Code42

    Data migrations are a constant IT project, but with Windows 10 plans in the works, Code42 customers have one more reason to ensure their optimizing their migration workflows. Join the session to hear best practices for performing device replacements, and real-life experiences from customers.

  • Sponsor Session 2

    Hear how a Code42 technology partner is solving data protection and security challenges faced by organizations like yours.

  • A Day in the Life of a File: How the Backup & Restore Process Works

    If you've ever wanted to dig into the tech and understand how Code42 actually works, you won't want to miss this session. We'll cover the backup and restore process from beginning to end--including de-duplication, compression, encryption, backup settings, versioning and cold storage.

  • Evolutionaries Award Ceremony and Networking Reception

    The Code42 Evolutionaries recognize the achievements of Code42 customers—celebrating the unique deployments, successful adopters, best-practice makers and innovative users of Code42.

  • Conference Party

    Brush up on your table tennis skills and get ready for Evolution17’s conference party at SPiN, a ping pong social club merging sport, design and entertainment. There will be food, drink and plenty of music to keep you going, and maybe even a ping pong pro or two to provide a few pointers.

Thursday, May 4

Keynote, Breakout Sessions, Event Wrap-up

  • Registration

    Visit the registration desk to grab your badge and some goodies or ask any burning questions you have about the conference! On Thursday morning, stop by registration to drop off your luggage and we'll store it for you until your departure.

  • Breakfast

    Don't miss the most important meal of the day. Fuel up for a full day of learning, networking and fun.

  • Guest Keynote: Jad Abumrad

    Jad Abumrad is the host and creator of Radiolab (radiolab.org), a public radio program broadcast on 524 stations across the nation and downloaded more than 9 million times a month as a podcast. Most days, Radiolab is the 2nd most popular podcast, just behind This American Life.

  • Evolution17 Expo

    Meet up with complementary solution providers and network with industry peers and professionals at the expo.

  • TechXperts Lab

    Stop by any time for intel straight from Code42 experts on your product and deployment-related inquiries, and to play with the latest version of Code42!

  • Code42 Store

    We know you love Code42 swag! Swing by the store to redeem Code42 Cash for t-shirts, drinkware and more.

  • A Deep-dive into Code42 Cloud Security Architectures

    Has your cloud strategy changed since you purchased Code42? If you're interested in exploring the benefits and considerations associated with each cloud deployment model, attend this session for a tutorial on how each architecture works. Plus, walk away with an understanding of how you can switch cloud architectures--now or in the future.

  • How to Use Endpoint Monitoring to Identify IP Loss & Theft

    The perfect session for any company experiencing mergers, acquisitions or routine employee off-boarding. Attend this session to understand how Code42 Security Tools can be applied to your M&A and employee off-boarding workflows. We'll also cover best practices for identifying risky behavior, and share examples of how endpoint monitoring has already protected Code42 customer IP.

  • Best Practices and Procedures for Performing Silent Installs

    Are you planning to extend your Code42 deployment to additional users? Consider a silent install process to minimize end-user and IT burden. In this session, we'll cover several strategies for performing silent installs, as well as best practices for a successful deployment.

  • Intro to the Code42 API: What It Is & Why It Matters

    If you haven't explored the Code42 API, you're limiting the possibilities of your deployment. Attend this session to gain a basic understanding of the Cod42 API, including its calls and capabilities.

  • Lunch

    You're going to need this meal after a morning packed with best practices, demos and tips and tricks. We'll give you a chance to check in on email (no!), network with peers and fuel up for the afternoon.

  • Using the Code42 API to Automate 2 Business Workflows

    If you have a basic understanding of the Code42 API and are ready to apply that knowledge to your own environment, you'll want to attend this session. We'll dive into two specific ways you can use API scripts to accomplish your business objectives.

  • Tips & Tricks for Maintaining A Healthy Code42 Environment

    Wish you knew how to avoid costly mistakes and help desk tickets? Attend this session to learn best practices for optimizing the health of your environment, as well as tips to troubleshoot the most common problems customers experience.

  • What Your Security Team Would Like to Know About Endpoint Monitoring

    Interested in Code42 Security Tools but worried you don't have all the details you need to make the case? Attend this session to understand the tech behind endpoint monitoring, and learn how to start the conversation with your Security team.

  • Using Code42 & Windows USMT to Migrate User Profile Settings

    User profiles are what give devices a personalized feel, but when lost in the migration process, productivity suffers. What if you could give users a brand new device without losing their backgrounds and shortcuts? Attend the session to learn what settings constitute a user profile, how to back up profile settings, as well as how to apply them to a new device during migration. You'll walk away having seen a step-by-step tutorial for transferring both data and profile settings.

  • Closing Keynote: Brian Krebs

    Brian Krebs is best known for his coverage of profit-seeking cybercriminals. He worked as a reporter for The Washington Post from 1995 to 2009, authoring more than 1,300 blog posts for the Security Fix blog, as well as hundreds of stories for washingtonpost.com and The Washington Post newspaper, including eight front-page stories in the dead-tree edition and a Post Magazine cover piece on botnet operators.