Skip navigation
Country: U.S.
Register Now

Agenda

Explore. Secure. Transform.

Sunday, April 8

Pre-conference Education

  • Code42 Foundations

    Code42 Foundations begins with fundamental client and end-user information particularly applicable for help desk personnel and administrators new to Code42. Following an examination of the end-user experience, instruction will progress to an administration console review and an analysis of Code42’s global administration configurations, focusing on how to define default backup settings and configure organization settings such as offered destinations and security policies.
    Level: Beginner

Monday, April 9

Pre-conference Education, Registration, Welcome Reception

  • Code42 API Workshop

    Walk through the Code42 API and get script recipes and hands-on guidance for use cases such as custom reports, integration with external monitoring systems, and automated restores. Basic knowledge of the various UNIX/ Linux shell environments (e.g. BIN/ BASH/BOURNE) is recommended.
    Level: Advanced

  • An In-Depth Look at Code42 Security Center

    Code42 Security Center, released with version 6.0 of the Code42 platform, is rapidly expanding to better identify and monitor end-user behavior. In this session we will review Code42 Security Center’s dashboards and monitoring features and examine Code42’s endpoint monitoring data collection and analysis processes.
    Level: Intermediate/Advanced

  • ’18.Xpert: What’s New Since Code42 6.0

    Get up to speed on the latest Code42 product releases! In this session we will discuss and utilize new features introduced since version 6.0. Topics will include Security Center enhancements; agent updates, deployment and customization; and user interface upgrades. This course is recommended for those who have previously completed a Code42 education course or who have a high level of experience with Code42.
    Level: Intermediate

  • Code42 Agent Deployment and Customization

    In this session we will discuss and utilize Code42’s app customization and deployment procedures as well as review enhancements to Code42’s integration with LDAP and Okta.
    Level: Intermediate

  • Code42 Certified Administrator Exam

    New for Evolution18! Attain your Code42 Administrator certification by taking an in-person, proctored exam as part of pre-conference education. Upon successful completion of the two-part exam you will earn a certificate of completion and a badge for your Code42 Community avatar. While there are no exam prerequisites, experience with Code42 administration or Code42 pre-conference education sessions are recommended prior to attempting the exam. Code42 University also offers on-demand, classroom, and virtual instructor-led courses to further help you prepare. For more information on ongoing course offerings, check out university.code42.com.
    Level: Advanced

  • Code42 API Workshop

    Walk through the Code42 API and get script recipes and hands-on guidance for use cases such as custom reports, integration with external monitoring systems, and automated restores. Basic knowledge of the various UNIX/ Linux shell environments (e.g. BIN/ BASH/BOURNE) is recommended.
    Level: Advanced

  • An In-Depth Look at Code42 Security Center

    Code42 Security Center, released with version 6.0 of the Code42 platform, is rapidly expanding to better identify and monitor end-user behavior. In this session we will review Code42 Security Center’s dashboards and monitoring features and examine Code42’s endpoint monitoring data collection and analysis processes.
    Level: Intermediate/Advanced

  • ’18.Xpert: What’s New Since Code42 6.0

    Get up to speed on the latest Code42 product releases! In this session we will discuss and utilize new features introduced since version 6.0. Topics will include Security Center enhancements; agent updates, deployment and customization; and user interface upgrades. This course is recommended for those who have previously completed a Code42 education course or who have a high level of experience with Code42.
    Level: Intermediate

  • Code42 Agent Deployment and Customization

    In this session we will discuss and utilize Code42’s app customization and deployment procedures as well as review enhancements to Code42’s integration with LDAP and Okta.
    Level: Intermediate

  • Welcome Reception

    Join fellow conference goers and the Code42 team to officially kick off Evolution18.

Tuesday, April 10

Opening Keynote, Breakout Sessions, Celebration Event

  • Breakfast

    Get your caffeine fix and grab a bite to prepare your mind for a day of learning, networking, and fun.

  • Evolution18 Expo

    Meet up with complementary solution providers, chat with Code42 product experts and network with industry professionals at the expo.

  • TechXperts Lab

    Spend time in our lab to get your technical questions answered directly from Code42 experts and to play with the latest version and features of Code42.

  • Code42 Store

    Who doesn't want more Code42 swag? Stop by our store to redeem Code42 Cash for the latest goods.

  • Opening Session

    Attend the opening session of Evolution18 to hear Code42 CEO Joe Payne and other leaders speak about the evolution of data security, product innovations, and what's ahead for Code42.

  • The Latest Advances in Security: A Panel with Security Leaders

    In the world of security there is one thing that is constant: things are always changing. In this session, we will dig into the hot security topics of the moment. Join us as we discuss GDPR, threat intel, forensics, security orchestration, cloud and insider threat with a panel of security leaders.

  • Why Should I Care? Getting Users on Board in an Opt-In Model

    Whether you're a university, research lab, or enterprise, if Code42 is optional for your user base, join this session to hear Code42 experts discuss best practices for user adoption. Learn the tools that are most effective in encouraging your users to opt in to using Code42 to protect their data. This session includes best practices for chargeback models, objection handling and user adoption tools that Code42 has available for you today.

  • The Latest of Code42: A Crash Course on What’s New and What’s Next

    Learn about the newest capabilities added in the latest version of Code42 and get a sneak peek into what we're working on for the rest of the year. Leave prepared to take advantage of these new capabilities.

  • The Threat Landscape is Changing: A Forrester Analysis

    In 2017, Forrester's Stephanie Balaouras, vice president and research director serving security and risk professionals, and team gathered extensive data on cybersecurity beaches and breach vectors. Now they've analyzed that data to give you insight on the most common breaches and the most pernicious threats that 2018 will bring. Attend this session to understand what you should be preparing for right now, and how the wide landscape of security solutions can fit into your security processes.

  • 2018 Workforce Behavior Study: A Look Into Data Storage Habits

    Digital transformation efforts won’t be successful unless IT accounts for the human element: workforce behavior. What’s the relationship between endpoint devices and employee work habits? We dug into the data to find out. In a new research study, Code42 examined data storage behavior across more than 1,200 laptops to learn how users get their work done--what files they create, where they store them, and how they share and interact with their data.

    Attend this session to learn:

    • The results of the research study on user behavior
    • The user workstyles we found consistent across all organizations
    • The types of files users put most at risk of loss, theft or breach

  • The Latest of Code42: A Crash Course on What’s New and What’s Next

    Learn about the newest capabilities added in the latest version of Code42 and get a sneak peek into what we're working on for the rest of the year. Leave prepared to take advantage of these new capabilities.

  • Lunch

    Take a breather from the morning and fill your belly to fuel up for an afternoon full of aha moments.

  • Using the Code42 API to Manage Your Environment

    If you haven't used the Code42 API, you're limiting the possibilities of your deployment. From cleaning up old devices to moving data to other tools, this session will cover a handful of the most useful applications of the Code42 API. Previous knowledge of the Code42 API or some scripting will be helpful as this session will dive right into use cases.

  • Data Privacy in a Globalized World: How Are You Planning for Compliance?

    IT departments are faced with supporting many compliance regimes and data privacy laws. This session will focus on GDPR and what to expect when your risk and compliance team asks you to support their efforts. Understand the business needs and be prepared with best practices to support and demonstrate compliance. From this session, you can expect to learn:

    • How GPDR may affect you
    • Best practices for supporting GDPR compliance
    • Best practices for demonstrating GDPR compliance

  • Files Held for Ransom? Natural Disaster? 5 Best Practices for Data Recovery

    Let's face it, we back up data so that we can recover it in real time. It's basic IT hygiene that never goes away. In this session, you'll learn more about our best practices for keeping your environment tuned for optimal restores, especially in the face of catastrophic events like ransomware. You'll also hear from security expert Michelle Killian and Code42 customer BAYADA Home Health Care about the way that IT and Security teams can work together to detect and respond to infections like rasomware quickly.

  • Why and How to Build an Insider Threat Program

    Jadee Hanson is a security professional who has specialized in securing enterprise data from insider threat. In this session, Jadee will provide a behind-the-scenes look at what it’s really like to run an insider threat program—a program in which you take steps to prevent employees from leaking, exfiltrating and exposing your organization’s information.

  • Building an Effective Third-Party Security Program

    With the ever-increasing reliance on third parties to scale our businesses, provide expertise, and drive efficiencies, having an effective risk-based third-party security practice has never been more important. In this session you’ll learn effective ways to manage third-party security risk and hear real-world stories from Code42's Manager of Security Risk and Compliance Todd Thorsen.

  • Visibility Is the Missing Link in Your Data Investigation Process

    File-level visibility can speed investigations and mitigate the risk of lost or stolen data. In this session, Code42 expert Kyle Hatlestad and Burns & McDonnell CISO Eric Walters discuss the ways that Code42 can fit into already established business processes to help you find threats to your IP and data integrity faster. From departing employees who risk data confidentiality to understanding exposure from lost or stolen devices, this session will cover the ways Code42 can support your organization in these efforts.

  • Tips and Tricks for New Code42 Customers

    If you've become a Code42 customer in the last year or so, don't miss this session. Our systems engineering and customer champion teams will share their top system tricks and even some #lifehacks we love for troubleshooting the most common problems customers experience. From custom installers to file excludes and environment security, you're sure to walk away with actionable insights.

  • OneDrive and Google Drive Aren’t Backup: Here’s Why

    When there is confusion over IT functionality from line of business leaders, and IT leadership who are looking to cut costs, it can be hard to make a business case for a new technology solution. Attend this session to hear from a Code42 customer that tested Code42 against Google Drive in a proof of concept (POC). They'll cover how they influenced management and won approval to purchase Code42, and we'll give you the latest research on end-user adoption of cloud collaboration tools such as OneDrive, Google Drive, Dropbox and Box.

  • Futurist Discussion with Security Leaders

    As security tools evolve and the threat landscape changes, security professionals are challenged to reframe their perspectives. Attend this conversation with industry-leading security experts to learn about how they are planning for the future. Get your questions ready!

  • Using the Code42 API to Manage Your Environment

    If you haven't used the Code42 API, you're limiting the possibilities of your deployment. From cleaning up old devices to moving data to other tools, this session will cover a handful of the most useful applications of the Code42 API. Previous knowledge of the Code42 API or some scripting will be helpful as this session will dive right into use cases.

  • 2018 Workforce Behavior Study: A Look Into Data Storage Habits

    Digital transformation efforts won’t be successful unless IT accounts for the human element: workforce behavior. What’s the relationship between endpoint devices and employee work habits? We dug into the data to find out. In a new research study, Code42 examined data storage behavior across more than 1,200 laptops to learn how users get their work done--what files they create, where they store them, and how they share and interact with their data.

    Attend this session to learn:

    • The results of the research study on user behavior
    • The user workstyles we found consistent across all organizations
    • The types of files users put most at risk of loss, theft or breach

  • Using Endpoint Data Preservation Policies in Legal Disputes

    In this session, Code42 Principal Systems Engineer Charles Weatherhead will discuss why preserve-in-place legal holds are more proactive than traditional methods, and demonstrate how files are handled throughout the collection and preservation process. He'll also interview Chris Sitter, head of global eDiscovery, digital forensics, and incident response technology for Juniper Networks, on legal hold defensibility, the ROI of using a tool like Code42 and steps for implementing technology as part of your data preservation processes. You'll walk away with a practical overview of how corporations can use technology to preserve data and the questions that you need to ask of your organization.

  • Evolutionaries Award Ceremony and Networking Reception

    The Code42 Evolutionaries recognize the achievements of Code42 customers—celebrating the unique deployments, successful adopters, best-practice makers and innovative users of Code42.

  • Conference Party

    Cap off the first day of Evolution18 conference sessions at the Exploratorium museum, a public learning laboratory exploring the world through science, art, and human perception. The ultimate in science museums, this is a can’t miss venue that will inspire curiosity.

Wednesday, April 11

Guest Keynote, Breakout Sessions, Event Wrap-up

  • Evolution18 Expo

    Meet up with complementary solution providers, chat with Code42 product experts and network with industry professionals at the expo.

  • TechXperts Lab

    Spend time in our lab to get your technical questions answered directly from Code42 experts and to play with the latest version and features of Code42.

  • Code42 Store

    Who doesn't want more Code42 swag? Stop by our store to redeem Code42 Cash for the latest goods.

  • Breakfast

    Get your caffeine fix and grab a bite to prepare your mind for a day of learning, networking, and fun.

  • How Code42’s Backup, Restore, Threat Alerting and Security Processes Work

    If you've ever wanted to dig into the tech and understand how Code42 actually works, you won't want to miss this session. We'll cover the lifecycle of a file from backups and restores, to preserving files for legal holds and investigating a security incident; including de-duplication, encryption, backup settings, versioning, cold storage, forensic search, legal matters, and more.

  • Security Workshop 101

    Ever wonder where to start the endpoint security journey or how Code42's security tools could be useful to your IT and security teams? Code42's professional services team has created a personalized workshop to answer those questions. In this session, they'll share some of the essential starting points and their tips for combating the most common scenarios they have seen. You'll leave with an understanding of how to leverage data to identify usage patterns that point to security threats.

  • NIST 800-171, DFARS, FISMA and More: How Can Code42 Help?

    New federal grant requirements coming in 2018 will require data retention for 7 years. And beyond just retention, visibility is essential. How can you tell if your CUI research data is leaving the university? Join Code42 EDU experts to discuss these regulations. You'll learn to build FOIA request responses into your data management strategy and how to use Code42 tools to investigate compliance issues. Leave with a better understanding of how Code42 supports compliance strategies at Higher Ed institutions.

  • OneDrive and Google Drive Aren’t Backup: Here’s Why

    When there is confusion over IT functionality from line of business leaders, and IT leadership who are looking to cut costs, it can be hard to make a business case for a new technology solution. Attend this session to hear from a Code42 customer that tested Code42 against Google Drive in a proof of concept (POC). They'll cover how they influenced management and won approval to purchase Code42, and we'll give you the latest research on end-user adoption of cloud collaboration tools such as OneDrive, Google Drive, Dropbox and Box.

  • Spies, Coups and Trojan Horses: How a Security Leader is Reimagining Digital Forensics

    Breaches happen! This session will explore some of the ways companies react to these situations and use forensic technologies to support investigating what happened. Attend this session to get an in-depth look a some fascinating case studies delivered by President and Security Expert at GRA Quantum, Thomas Boyden.

  • Deploying Code42 with STYLE

    Ever had questions about deploying, branding, and version upgrades? The process has been significantly upgraded with Code42 version 6.5, so sending out a new client to users is better than ever. This session will focus on deployment, but touch on upgrades as well. Attend this session to understand how to use the functionality, especially in conjunction with SCCM and jamf.

  • Files Held for Ransom? Natural Disaster? 5 Best Practices for Data Recovery

    Let's face it, we back up data so that we can recover it in real time. It's basic IT hygiene that never goes away. In this session, you'll learn more about our best practices for keeping your environment tuned for optimal restores, especially in the face of catastrophic events like ransomware. You'll also hear from security expert Michelle Killian and Code42 customer BAYADA Home Health Care about the way that IT and Security teams can work together to detect and respond to infections like rasomware quickly.

  • Code42 Device Migrations: Best Practices to Minimize Downtime

    Device migrations can drain IT time and put data at risk. In this session, Code42 customer MacDonald-Miller and Code42 experts on implementation and product use will discuss the challenges of current device refresh strategies and how Code42 can make your process more efficient, secure and reliable. Specifically, they will highlight how self-service migrations and data restores can help you minimize business user downtime. You'll walk away with an understanding of how to empower your users to migrate their own data, and MacDonald-Miller will also give you a few tips on how to shift user expectations and get them to embrace self-service IT programs.

  • Visibility Matters: Be the First to Explore a Security Game Changer

    Be the first to get an exclusive look at the newest Code42 feature to be announced at Evolution18!

  • Build Your Organization and Your Personal Brand by Leveraging Digital Transformation

    It's been a week of learning about IT and security trends, understanding the way your peers are using Code42, and networking. But what are you going to bring back to your organization? And how is this conference going to make a difference in the way you help to drive business growth? Code42's Senior Vice President of Research and Development Rob Juncker has been growing businesses (instead of just keeping the lights on) for 20 years, and he has coached and managed hundreds of technical employees. In this session, Rob will summarize how you can take what you've learned about digital transformation during this conference and bring that thought leadership back to your organization while building your personal brand.

  • Tips and Tricks for New Code42 Customers

    If you've become a Code42 customer in the last year or so, don't miss this session. Our systems engineering and customer champion teams will share their top system tricks and even some #lifehacks we love for troubleshooting the most common problems customers experience. From custom installers to file excludes and environment security, you're sure to walk away with actionable insights.

  • Code42 and Your SIEM: Find the Value in Your Data

    Take your investigation and analysis to the next level with Code42 and your SIEM! Join this session as we discuss why and how our customers are leveraging Code42 as a data-source for their SIEM tools. We'll cover our certified Code42 App for Splunk and how to leverage that data for alerts, reports, visualizations and investigations, as well as take a look under the hood at the Code42 REST API, so you can start bringing Code42 information into tools you use today.

  • Lunch

    Take a breather from the morning and fill your belly to fuel up for an afternoon full of aha moments.

  • Closing Session

    Join us as we wrap up Evolution18 with our guest keynote speaker, Theresa Payton, and a grand send-off from Joe Payne. You won't want to miss the announcement of Evolution19!