Skip navigation
Country: U.S.
Register Now

2017 Agenda

Discover what's new, apply best practices and maximize your data and investment

Monday, May 1

Pre-conference Education

  • Code42 User Lifecycle and Forensic Identification of Insider Threat

    This education session will focus on user lifecycle at a hypothetical organization. We will begin by discussing user on-boarding and designation of organization policies such as roles and permissions. Then, we will focus on Code42's user device refresh experience. The end of the user lifecycle will also be explored, including topics such as user off-boarding, Code42 cold storage and using Code42’s Security Center to identify potential insider threat. All instruction will be followed by hands-on application through an onsite virtual lab environment. Level: Beginner to intermediate

  • Code42 Foundations

    Code42 Foundations will begin with fundamental client and end-user information especially applicable for help desk personnel and administrators new to Code42. Following the end-user experience, instruction will progress to an Administration Console review and an examination of Code42’s global administration configurations, focusing on how to define default backup settings and configure organization settings such as offered destinations and security policies. This session will include a mix of lecture and hands-on lab exercises. Level: Beginner (new Code42 administrators)

  • Code42 6.Xpert

    Take a deep dive into the latest Code42 product release! In this course we will discuss and utilize new features introduced in Code42 platform version 6.0. This session will be of particular interest to those who have previously completed a Code42 education course or who have a high level of experience with Code42. Topics will include organization compliance settings, device bandwidth management, Code42 Security Center and user interface upgrades. Level: Intermediate

Tuesday, May 2

Pre-conference Education, Registration, Welcome Reception

  • Registration

    Visit the registration desk to grab your badge and some goodies or ask any burning questions you have about the conference!

  • Client Customization and Directory Services

    Identity management within Code42 is vital to wide-scale deployment. At the same time, as IT administrators, it’s important to make end users' lives as easy as possible by having software preconfigured to your organization’s specifications. In this education session we will discuss and utilize Code42’s integrations with industry-standard directory services LDAP and SSO as well as cover ways in which admins can preconfigure the Code42 client installer prior to rollout, including co-branding and field pre-population. Level: Intermediate to advanced

  • Code42 User Lifecycle and Forensic Identification of Insider Threat

    This education session will focus on user lifecycle at a hypothetical organization. We will begin by discussing user on-boarding and designation of organization policies such as roles and permissions. Then, we will focus on Code42's user device refresh experience. The end of the user lifecycle will also be explored, including topics such as user off-boarding, Code42 cold storage and using Code42’s Security Center to identify potential insider threat. All instruction will be followed by hands-on application through an onsite virtual lab environment. Level: Beginner to intermediate

  • Code42 API Workshop

    In this education session we will walk through the Code42 API and provide script recipes and hands-on guidance for use cases such as custom reports, integration with external monitoring systems and automated restores. Basic knowledge of the various UNIX/Linux shell environments (e.g. BIN/BASH/BOURNE) is recommended. Level: Advanced

  • Client Customization and Directory Services

    Identity management within Code42 is vital to wide-scale deployment. At the same time, as IT administrators, it’s important to make end users' lives as easy as possible by having software preconfigured to your organization’s specifications. In this education session we will discuss and utilize Code42’s integrations with industry-standard directory services LDAP and SSO as well as cover ways in which admins can preconfigure the Code42 client installer prior to rollout, including co-branding and field pre-population. Level: Intermediate to advanced

  • Code42 6.Xpert

    Take a deep dive into the latest Code42 product release! In this course we will discuss and utilize new features introduced in Code42 platform version 6.0. This session will be of particular interest to those who have previously completed a Code42 education course or who have a high level of experience with Code42. Topics will include organization compliance settings, device bandwidth management, Code42 Security Center and user interface upgrades. Level: Intermediate

  • Evolution17 Welcome Reception

    Join the Code42 team to kick off Evolution17.

Wednesday, May 3

Opening Keynote, Breakout Sessions, Celebration Event

  • Registration

    Visit the registration desk to grab your badge and some goodies or ask any burning questions you have about the conference!

  • Breakfast

    Don't miss the most important meal of the day. Fuel up for a full day of learning, networking and fun.

  • TechXperts Lab

    Stop by any time for intel straight from Code42 experts on your product and deployment-related inquiries, and to play with the latest version of Code42!

  • Evolution17 Expo

    Meet up with complementary solution providers and network with industry peers and professionals at the expo.

  • Code42 Store

    We know you love Code42 swag! Swing by the store to redeem Code42 Cash for t-shirts, drinkware and more.

  • Opening Keynote Session

    Attend the Evolution17 opening keynote to hear Code42 CEO Joe Payne, and other leaders, speak about what's next for Code42 and the product innovations ahead.

  • How to Use the Code42 API to Automate Business Workflows

    Code42 does a lot of things out-of-the-box, but ones of its strengths is its flexibility for customization. So how do you approach accomplishing something with the product that isn’t available directly in the admin console? The API. Attend the session to learn:

    • How to use the API Documentation Viewer to know which calls to use, and how to use them
    • Thought process for developing API scripts to accomplish your desired tasks
    • Examples of real customer challenges that have been solved using the API

  • The Latest of Code42: A Crash Course on Version 6.0

    This June, we will launch our next major release—version 6.0. In this session, you’ll get an overview from our VP of Product Management. Attend the session to learn:

    • What you can expect from the upcoming 6.0 release
    • How you can apply new features and functionality
    • The themes we are prioritizing in our product roadmap

  • OneDrive is Not Backup—We Tried

    Tight budgets are putting IT teams under pressure to cut costs. One “easy” way to do this is to use a single technology for multiple business purposes. The latest trend: using sync and share as a backup solution. In this “fireside chat,” a new Code42 customer will discuss their experience testing Code42 against OneDrive in a Proof of Concept (POC). Attend the session to hear:

    • What it was like to test OneDrive as an endpoint backup solution
    • How they influenced management and won approval to purchase Code42
    • Recommendations for other companies who may be facing pressure to replace Code42 with a sync and share solution

  • How to Find Answers to Your Top Reporting Questions

    Looking to take advantage of Code42’s reporting capabilities but don't know where to start? In this session, we'll demonstrate how you can answer some of your top reporting questions by showing you how to pull critical information about your users, organizations, and devices. Attend the session to learn:

    • A few of the most useful reports you can generate within the product
    • How to interpret the data inside your reports
    • Examples of how you can apply the data to inform larger business decisions

  • Lunch

    You're going to need this meal after a morning packed with best practices, demos and tips and tricks. We'll give you a chance to check in on email (no!), network with peers and fuel up for the afternoon.

  • Tips & Tricks for Maintaining a Healthy Code42 Environment

    Whether you’re a new or long-time customer, it’s important your Code42 environment remain in prime condition. In this session, our product experts will give you recommendations on how to optimize your deployment and avoid costly mistakes and help desk tickets. Attend this session to learn:

    • Best practices for proactively protecting your environment
    • How to optimize your backup health
    • Tips on how to upgrade your environment to the latest release
    • How to work with cold storage

  • Managing Mac in a Windows World with Jamf

    Configuring PCs for employees has been a pillar of enterprise IT for years. But, with Mac growing in popularity due to user demand, IT needs a streamlined method to manage Macs as efficiently as PCs. Learn how to leverage Jamf to manage and configure your Macs with the resources and tools your users need—like ​Code42!

  • Using Code42 to Reduce the Legal Hold Burden

    The process of collecting and preserving Electronically Stored Information (ESI) is critical to Legal's eDiscovery process, but can quickly become a burden on your team. In this session, we'll walk through how to use Code42 to carry out legal hold in minutes. Attend the session to:

    • Hear about how to use Code42 for legal hold
    • Get a preview of upcoming legal hold product advancements
    • Get first-hand advice from a customer who has used Code42 to improve their legal hold process

  • A Day in the Life of a File: How the Backup & Restore Process Works

    This is a must-attend session for anyone who has ever wanted to dig into the tech and understand how Code42 works behind the scenes. We’ll walk through the lifecycle of a single file, and detail how Code42 interacts with your data at each step along the way. Attend the session to:

    • Get an in-depth look at the data lifecycle—from first backup to recovery
    • Dig into the specifics of data deduplication, compression and the backup archive
    • Receive answers to your technical questions

  • How to Find Answers to Your Top Reporting Questions

    Looking to take advantage of Code42’s reporting capabilities but don't know where to start? In this session, we'll demonstrate how you can answer some of your top reporting questions by showing you how to pull critical information about your users, organizations, and devices. Attend the session to learn:

    • A few of the most useful reports you can generate within the product
    • How to interpret the data inside your reports
    • Examples of how you can apply the data to inform larger business decisions

  • Why & How to Build an Insider Threat Program

    Jadee Hanson is a security professional who has specialized in securing enterprise data from insider threat. In this session, Jadee will provide a behind-the-scenes look at what it’s really like to run an insider threat program—a program in which you take steps to prevent employees from leaking, exfiltrating and exposing your company’s information. Attend the session for:

    • Insider threat examples, and why you should care
    • Recommendations for how to get buy-in from key stakeholders
    • Lessons learned from someone who has been through it before

  • Understanding Legal Hold: How the Collection & Preservation Process Works

    Consider this scenario: a Boston beer giant has sued a San Francisco brewery for intent to steal trade secrets. What happens next? This session will go into depth on how the IT and Legal teams would use Code42’s legal hold capabilities to collect and preserve data for litigation. Using this example, we will guide you through the technical underpinnings of how Code42 can streamline and bolster your eDiscovery process. Attend the session to learn:

    • How legal hold influences the data lifecycle
    • How IT can improve operational efficiency for the legal hold process
    • What you can expect when your legal team requests data collection

  • Using Code42 & Windows USMT to Migrate User Profile Settings

    Data migrations are always occurring, but with Windows 10 migrations on the rise this year, Code42 customers have one more reason to ensure they’re optimizing their migration workflows. In this session, you’ll learn which settings constitute a user profile, how to back up profile settings, and how to apply them to a new device during migration. Attend the session to:

    • Understand how to configure Code42 and USMT to capture Windows user profiles
    • Get a walkthrough of how to use the self-service migration wizard to migrate data and user profiles
    • See a detailed step-by-step process for an admin-driven restore

  • Simplify Your Move to SaaS with Okta & Code42

    SaaS adoption continues to grow offering benefits from cost savings to speed. There are many considerations when adopting a new SaaS application including how to integrate with your identity management practices. Code42 has partnered with Okta, a leading Identity Management Provider, to help smooth out your path as your organization adopts SaaS. Attend the session to learn:

    • Market trends and considerations for moving to SaaS
    • Okta features & benefits 
    • How Okta and Code42 are partnering to help your organization move to SaaS

  • Best Practices for Managing Bandwidth with Code42

    Code42 can be integrated into your enterprise infrastructure, with both network-level and application-level capabilities to meet your global requirements. In this session, a Code42 customer and Code42 product experts will review best practices and recommendations to ensure that Code42 functions seamlessly alongside the other enterprise applications that compete for bandwidth. Join the session to learn when and how to leverage:

    • Schedule-based bandwidth management at the application level
    • Site-based bandwidth management at the application level
    • Dynamic bandwidth management at the network level, leveraging Quality-of-Service (QoS) policies

  • Best Practices for Performing Data Migrations with Code42

    Whether triggered by hardware end-of-lease, drive failure, OS upgrades or damage, the fact is the average organization replaces 25 to 30 percent of its client devices annually. Each refresh drains IT time and damages user productivity. In this session, a Code42 customer and a Code42 product expert will discuss the challenges of current device refresh strategies and how Code42 can make your process more efficient, secure and reliable. Attend the session to:

    • Learn how a user-driven process secures and optimizes data migration workflows
    • Get a walkthrough of how Code42 can drive efficiency, control and reliability into your device refresh process
    • Get first-hand advice from a customer who has drastically reduced device refresh time

  • A Day in the Life of a File: How the Backup & Restore Process Works

    This is a must-attend session for anyone who has ever wanted to dig into the tech and understand how Code42 works behind the scenes. We’ll walk through the lifecycle of a single file, and detail how Code42 interacts with your data at each step along the way. Attend the session to:

    • Get an in-depth look at the data lifecycle—from first backup to recovery
    • Dig into the specifics of data deduplication, compression and the backup archive
    • Receive answers to your technical questions

  • Evolutionaries Award Ceremony and Networking Reception

    The Code42 Evolutionaries recognize the achievements of Code42 customers—celebrating the unique deployments, successful adopters, best-practice makers and innovative users of Code42.

  • Conference Party

    Brush up on your table tennis skills and get ready for Evolution17’s conference party at SPiN, a ping pong social club merging sport, design and entertainment. There will be food, drink and plenty of music to keep you going, and maybe even a ping pong pro or two to provide a few pointers.

Thursday, May 4

Keynote, Breakout Sessions, Event Wrap-up

  • Registration

    Visit the registration desk to grab your badge and some goodies or ask any burning questions you have about the conference!

  • Breakfast

    Don't miss the most important meal of the day. Fuel up for a full day of learning, networking and fun.

  • Evolution17 Expo

    Meet up with complementary solution providers and network with industry peers and professionals at the expo.

  • TechXperts Lab

    Stop by any time for intel straight from Code42 experts on your product and deployment-related inquiries, and to play with the latest version of Code42!

  • Code42 Store

    We know you love Code42 swag! Swing by the store to redeem Code42 Cash for t-shirts, drinkware and more.

  • Guest Keynote: Jad Abumrad

    Jad Abumrad is the host and creator of Radiolab (radiolab.org), a public radio program broadcast on 524 stations across the nation and downloaded more than 9 million times a month as a podcast. Most days, Radiolab is the 2nd most popular podcast, just behind This American Life.

  • Best Practices and Procedures for Performing Silent Installs

    Are you planning to extend your Code42 deployment to additional users? In this session, we'll cover options for performing silent installs, as well as offer tips and considerations for a successful deployment. Attend the session to learn:

    • How and why companies choose to deploy with custom installers
    • Troubleshooting tips and rollout best practices
    • Specifics on deploying with Jamf Pro and Windows SCCM

  • Intro to the Code42 API: What it is & Why it Matters

    The Code42 API is a powerful resource that can be used to create custom reports, perform automated actions and integrate with your existing technology. In this session, you will be presented with an API overview as well as real examples of data gathering and manipulation. Attend the session to learn:

    • What the API is, and how it functions
    • How to execute API calls using a web browser
    • How to gather deployment information using cURL

    *This session will cover the basics of the Code42 API and is not recommended for those who have already attended API courses.*

  • A Deep-Dive Into Code42 Cloud Security Architectures

    This session is recommended for organizations who are evolving their cloud strategy. When you purchased Code42, you selected the cloud architecture that best met your business requirements. So which cloud architecture is best for your current and upcoming objectives? This session will provide you with a technical overview of Code42’s cloud architectures. Attend the session to learn:

    • A technical explanation of Code42’s cloud architecture, and how each works
    • Considerations for determining the right architecture for your organization
    • Recent and upcoming Code42 cloud advancements

  • Using Code42 to Protect Against Data Loss, Leak & Theft

    Your business is built on data. In fact, intellectual property makes up as much as 80% of your company’s value. So what happens when your users put that data at risk? In this session, you’ll receive a walkthrough of how Code42 helps you avoid accidental and intentional data leaks. Attend the session to:

    • See how Code42’s endpoint monitoring can be applied to insider threat scenarios
    • Receive a preview of new functionality available in our upcoming 6.0 release
    • Hear our vision for addressing additional customer challenges

  • Lunch

    You're going to need this meal after a morning packed with best practices, demos and tips and tricks. We'll give you a chance to check in on email (no!), network with peers and fuel up for the afternoon.

  • Tips & Tricks for Maintaining a Healthy Code42 Environment

    Whether you’re a new or long-time customer, it’s important your Code42 environment remain in prime condition. In this session, our product experts will give you recommendations on how to optimize your deployment and avoid costly mistakes and help desk tickets. Attend this session to learn:

    • Best practices for proactively protecting your environment
    • How to optimize your backup health
    • Tips on how to upgrade your environment to the latest release
    • How to work with cold storage

  • How to Use the Code42 API to Automate Business Workflows

    Code42 does a lot of things out-of-the-box, but ones of its strengths is its flexibility for customization. So how do you approach accomplishing something with the product that isn’t available directly in the admin console? The API. Attend the session to learn:

    • How to use the API Documentation Viewer to know which calls to use, and how to use them
    • Thought process for developing API scripts to accomplish your desired tasks
    • Examples of real customer challenges that have been solved using the API

  • Using Code42 & Windows USMT to Migrate User Profile Settings

    Data migrations are always occurring, but with Windows 10 migrations on the rise this year, Code42 customers have one more reason to ensure they’re optimizing their migration workflows. In this session, you’ll learn which settings constitute a user profile, how to back up profile settings, and how to apply them to a new device during migration. Attend the session to:

    • Understand how to configure Code42 and USMT to capture Windows user profiles
    • Get a walkthrough of how to use the self-service migration wizard to migrate data and user profiles
    • See a detailed step-by-step process for an admin-driven restore

  • Cracking the Case with Code42: How to Perform Data Forensics

    The secret is out: your company’s biggest idea hit the public eye before its official launch date, and your executive team wants answers. Fast. All employee data is now considered a crime scene, and you are being asked to help find who is responsible for trade secrets landing on WikiLeaks. During this session, Code42 will help you crack the case by demonstrating:

    • How to manage and monitor suspicious employee data
    • Who had possession of sensitive information
    • When data left your company and where it went

  • Closing Keynote: Brian Krebs

    Brian Krebs is best known for his coverage of profit-seeking cybercriminals. He worked as a reporter for The Washington Post from 1995 to 2009, authoring more than 1,300 blog posts for the Security Fix blog, as well as hundreds of stories for washingtonpost.com and The Washington Post newspaper, including eight front-page stories in the dead-tree edition and a Post Magazine cover piece on botnet operators.