17th GSE ISP Symposium

23 — 25 September 2024

Hilton Cologne, Germany

days
hours
minutes
seconds

Agenda

Monday, 23 September 2024

get your personalized badge
From 08:00
From 08:00
Please select listing to show.
Registration Opens
Please select listing to show.
10:00 - 10:30
10:00 - 10:30
Please select listing to show.
Coffee Break
Please select listing to show.
10:30 - 10:45
10:30 - 10:45
Please select listing to show.
Please select listing to show.
In today's threat landscape, data resilience is no longer a luxury, but a necessity. Traditional backup and recovery methods are no match for the sophistication and frequency of modern attacks. That's why we need an end-to-end approach that perceives information from multiple sensors, looks across the data estate and guarantees safe recovery of data. By harnessing the power of artificial intelligence, organizations can predict, prevent, and recover from data threats with unprecedented speed and accuracy. Join the IBM team to explore the latest innovations in data protection and discover how to safeguard your most valuable asset against hackers, disasters, and human error. Build durable data resilience with IBM Storage Defender.
10:45 - 11:30
10:45 - 11:30
Please select listing to show.
Please select listing to show.
It’s been 2 years since the last GSE Symposium. This session will provide an update on IBM Defender and the many capabilities brought forward to help with your Cyber-resiliency goals. This will cover key use cases and updates from IBM Storage Protect (agents, servers, Storage Protect Plus, etc), IBM Storage Protect for Cloud, IBM Defender Data Management and Data Protect, and IBM Defender Data Resilience.
11:30 - 12:45
11:30 - 12:45
Please select listing to show.
Please select listing to show.
12:45 - 14:00
12:45 - 14:00
Please select listing to show.
Lunch Break
Please select listing to show.
Introduction and overview of IBM Storage Defender Data Management and Data Protection. Let’s explore the SaaS control plane along with the Data Protect clusters and the breadth and depth of workload protection and recovery.
14:00 - 14:45
14:00 - 14:45
Please select listing to show.
Please select listing to show.
Introduction and overview of IBM Storage Defender Data Resilience capabilities.
14:45 - 15:30
14:45 - 15:30
Please select listing to show.
Please select listing to show.
15:30 - 16:00
15:30 - 16:00
Please select listing to show.
Coffee Break
Please select listing to show.
Today, keeping the balance between rapid innovation and maintaining system resilience is more critical than ever. This presentation explores how dsmISI, GSCC and MAGS enable you to stay prepared and adaptable in a 'fail fast' environment, emphasizing on flexibility and continuous growth.
16:00 - 16:30
16:00 - 16:30
Please select listing to show.
Please select listing to show.
What are we seeing in terms of threats from malware or other “attack vectors”? In this session, we’ll discuss what we are seeing along with some best practice recommendations. We’ll also discuss the technologies available to help with threat detection and mitigation.
16:30 - 17:30
16:30 - 17:30
Please select listing to show.
Please select listing to show.
In this session we want to highlight new solution capabilities with ISP and the areas of value of the Vendor solutions and how you can take advantage of them.
17:30 - 18:00
17:30 - 18:00
Please select listing to show.
Please select listing to show.
18:00 - 19:00
18:00 - 19:00
Please select listing to show.
Break
Please select listing to show.
"Dinner and Drinks". Walk around the exhibition and learn about old and new Storage Protect add-on products. Renew contacts and discuss about your thoughts and ideas.
19:00 - 21:00
19:00 - 21:00
Please select listing to show.
Please select listing to show.

Tuesday, 24 September 2024

BACKUP EAGLE® is established globally as timesaving and the most flexible backup monitoring and reporting solution on the market. Covering IBM Storage Protect, IBM Storage Protect Plus, IBM Storage Protect Online Services, IBM defender (Cohesity) and IBM BRMS BACKUP EAGLE® it is ready to protect your backup environment. Our vendor agnostic approach creates a single pane of glass and saves you each day hours spent on monitoring and reporting. Come and experience BACKUP EAGLE® in action in our vendor presentation:
  • Security: Discover the blind spots in your backup environment like missing backups or dangerous retention settings.
  • Monitoring: Cover all monitoring aspects. Backups, restores, archives, backup server health, storage device health.
  • Reporting: See our unmatched reporting functionality create exactly the reports you need. Ready to use templates will get you started and save you hours of work.
  • Provide Services: Join us to see how service providers around the globe use BACKUP EAGLE® to create tenant specific reports in shared and mixed vendor backup environments.
  • Flexibility: Transfer your own know how and monitoring scripts into BACKUP EAGLE® to automate them and share with your team by using reports, custom health checks and ticket creation.
  • Audit and compliance: Solve audit and compliance requirements in minutes by using BACKUP EAGLE® reporting on backups, restores and configurations. Be ready for NIS-2 without any effort.
09:00 - 09:15
09:00 - 09:15
Please select listing to show.
Please select listing to show.
Cyber Resiliency stands for the simple capabilty to recover quickly, cleanly and completely after any form of vicious external attack on your IT. Backup environments are first attack vector of hackers, because they are in the heart of any IT departments strategy to come back quickly after an attack. Recovery Assurance is the practice to ensure that backup requirements are meeting that challenge
09:15 - 09:30
09:15 - 09:30
Please select listing to show.
Please select listing to show.
Using AI in enterprise and small environments. Presenting how we built our own AI integration to quicker find data in logs and give end users better instruction. We will create embeddings in realtime.
09:30 - 09:45
09:30 - 09:45
Please select listing to show.
Please select listing to show.
eXstor is providing a high availability solution to accompany ADSM/TSM/ISP since 19 years. Our product TSMCluster® in the new Version 8.1.3 based on AIX and Linux operating systems, is a robust, scalable and widely used cluster software for Storage Protect (TSM). In spite of its high complexity, TSMCluster® remains easy to operate via new web interface or command line. A set of tools reduces the daily work around TSM/ISP. In 2024 we started with two new tape products: eXstor Library and Media Manager (eLMM), derived from IBM’s TSLM and our Safe Guarded Tape solution. In this presentation we will show some of the new highlights, e.g. cloning a running ISP instance.
09:45 - 10:00
09:45 - 10:00
Please select listing to show.
Please select listing to show.
Storage teams are under pressure to do more with less, but in a world of increasing cyber-threats the stakes have never been higher. Discover how Artificial Intelligence and automation is making recovery confidence reality.
10:00 - 10:15
10:00 - 10:15
Please select listing to show.
Please select listing to show.
Realign your IT with the help of PROFI Managed Services. Create new resources for more flexibility in your day-to-day business. PROFI Managed Services supports you from large to small, with standardized and scalable solutions as well as individually tailored services. From monitoring backups to complete outsourcing.
10:15 - 10:30
10:15 - 10:30
Please select listing to show.
Please select listing to show.
10:30 - 11:00
10:30 - 11:00
Please select listing to show.
Coffee Break
Please select listing to show.
Introduction and overview of IBM Storage Protect in 2024. While Storage Protect has been around for a few years, it continues to evolve and solve the data protection challenges you are facing. Come explore more about the Storage Protect capabilities and updates since the last Symposium.
11:00 - 11:45
11:00 - 11:45
Please select listing to show.
Please select listing to show.
Come to this session and learn how IBM Storage Defender Data Resiliency Service can evolve data protection into data resiliency and closes an important gap in your storage and data protection environment. The session will introduce the major capabilities of the service like governance around data protection, ransomware attack detection, and reliable recovery options.
11:45 - 12:30
11:45 - 12:30
Please select listing to show.
Please select listing to show.
12:30 - 14:00
12:30 - 14:00
Please select listing to show.
Lunch Break
Please select listing to show.
The Jülich Supercomputing Centre operates a large HPC storage solution based on Storage Scale (GPFS) called "JUelich STorage (JUST)". One of the GPFS file systems is designed for data archiving using IBM Storage Protect for Space Management. In addition, HPC user data is backed up using mmBackup calling the IBM Storage Protect client "dsmc". In the first half of 2024, the 6th generation of "JUST" was installed. One design change was to replace the Power/AIX systems for the Storage Protect servers and clients with x86/Linux nodes. In this talk we will share our experiences, focusing on the migration of the Space Management client from AIX to Linux using the “stubfilemigration” tool.
14:00 - 14:45
14:00 - 14:45
Please select listing to show.
Please select listing to show.
This session will cover options and experiances with offloading ISP and SPP to S3, how to secure access and what are the benefits of modern air gaps. Some use cases and first hand experiences will be shared from real customer scenarios. The following questions will be discussed: What are options to modernize IBM Storage Protect infrastructures and to add a new layer of security by using cloud ressources? Is S3 a replacement for Tape? What is the meaning of Cyber Resilience and what are differences to Desaster Recovery Management? How can a cloud offload be beneficial in case of a ransomware attack? Why is cloud more than just a secure vault? How to develop a continuous DR testing strategy?
14:45 - 15:30
14:45 - 15:30
Please select listing to show.
Please select listing to show.
15:30 - 16:00
15:30 - 16:00
Please select listing to show.
Coffee Break
Please select listing to show.
Introduction and overview of IBM Storage Protect for Cloud. - Come learn about how to protect M365 and other cloud-native workloads.
16:00 - 17:30
16:00 - 17:30
Please select listing to show.
Please select listing to show.
The initiative for the SP Symposium came from the GSE ‘Storage Management’ working group. It is therefore only natural that the WG should also meet at the symposium. During this session, questions from the user community will be discussed and also put to the IBM product managers in order to provide them with direct feedback.
17:30 - 18:00
17:30 - 18:00
Please select listing to show.
Please select listing to show.
In this session I will show several topics, an IBM Storage Protect administrator should know, if he wants to implement new features or change easy definitions. In detail I will talk what's important if you will change the server name. There are many dependencies. How to solve this challenge. I will also talk about the license stumbling when implementing retention sets. We will also show an easy way of certificate handling and using CA certificates.
11:00 - 11:45
11:00 - 11:45
Please select listing to show.
Please select listing to show.
Holger is an expert on Storage Protect and is working for IBM Technology Expert Labs DACH. In this presentation Holger will document the technical background for renewing the Storage Protect server SSL/ TLS certificate which will need to be done by all Storage Protect custmers soon. Holger will share his experience, tips and tricks for automating the distribution of the Storage Protect server certificate to clients using the cert_distribute script provided by IBM Storage Protect development.
11:45 - 12:30
11:45 - 12:30
Please select listing to show.
Please select listing to show.
12:30 - 14:00
12:30 - 14:00
Please select listing to show.
Lunch Break
Please select listing to show.
What are the latest blueprints and recommendations for deploying IBM Storage Protect? Come learn about the latest blueprints, architectures, and strategies for successful deployment of IBM Storage Protect.
14:00 - 14:30
14:00 - 14:30
Please select listing to show.
Please select listing to show.
In this blueprint session for “Cloud”, explore current recommendations for deploying in the cloud, using object storage, and how to deploy the object agent to use IBM Storage Protect as an object store. This session will provide best practices and other rules of thumb for these “cloud” topics.
14:30 - 15:00
14:30 - 15:00
Please select listing to show.
Please select listing to show.
IBM Defender Data Protect is scale-out cluster purpose built for protecting the workloads that are important to you. Come learn about the sizing tools, recommendations, and guidance for how to plan for and deploy Data Protect.
15:00 - 15:30
15:00 - 15:30
Please select listing to show.
Please select listing to show.
15:30 - 16:00
15:30 - 16:00
Please select listing to show.
Coffee Break
Please select listing to show.
This session introduces a prototype facilitating consistent and immutable safeguarded copies in an environment with IBM Storage Protect servers running on IBM Storage Scale. This allows fast recovery of Storage Protect server instances after a cyber attack leveraging the scalable snapshot restore function of IBM Storage Scale.
16:00 - 16:45
16:00 - 16:45
Please select listing to show.
Please select listing to show.
This session introduces a prototype facilitating consistent and immutable safeguarded copies in an environment with IBM Storage Protect servers running on IBM Storage Scale. This allows fast recovery of Storage Protect server instances after a cyber attack leveraging the scalable snapshot restore function of IBM Storage Scale.
16:45 - 17:30
16:45 - 17:30
Please select listing to show.
Please select listing to show.
Come to this interactive session with the IBM Defender product team (product management, development, executives) where the agenda is YOU. It’s open mic where you can ask questions and the product team will answer.
17:30 - 18:00
17:30 - 18:00
Please select listing to show.
Please select listing to show.
In this session, we’ll explore the IBM Storage Protect storage rule based replication. 1. What are the best practices for server-to-server replication? 2. What and how to avoid pitfalls or problems?
11:00 - 11:45
11:00 - 11:45
Please select listing to show.
Please select listing to show.
IBM Storage Scale (and ESS) are often used with IBM Storage Protect. This session will explore the typical use cases of using IBM Storage Scale (or ESS) as storage for IBM Storage Protect and how to protect IBM Storage Scale filesystems. This will also explore new use cases such as how to use immutable snapshots to protect to the IBM Storage Protect server database. And it will dive into how to protect IBM Storage Scale filesystems by backing up to IBM Storage Protect.
11:45 - 12:30
11:45 - 12:30
Please select listing to show.
Please select listing to show.
12:30 - 14:00
12:30 - 14:00
Please select listing to show.
Lunch Break
Please select listing to show.
Come learn about initiates underway for IBM Storage Protect to leverage ansible to automate tasks and activities to simplify your day to day operations. Also learn more about how IBM envisions the ansible ecosystem in support of IBM Storage Protect.
14:00 - 14:30
14:00 - 14:30
Please select listing to show.
Please select listing to show.
Data originates from many places: bare-metal, VM’s, containers, or combinations of these compute/hosting sources. How is storage changing to keep up with the storage and protection needs of your data. This session provide some perspective and insight from IBM’s view of storage with some deeper dives on IBM Flash and how anomaly detection is being added into the primary storage systems along with the evolution and use of Safeguarded copy. Additionally, learn about IBM Diamondback, the latest generation of IBM tape library. And also some forward-looking discussion how Software Defined Storage is currently or may be coming in the storage arena.
14:30 - 15:00
14:30 - 15:00
Please select listing to show.
Please select listing to show.
A legal and technical background on the requirements for NIS-2, SOX, TISAX and PCI DSS. Have you ever faced the challenge of providing documents for audit and compliance trials? Were you spending days on searching and scripting? In this session we will give you an overview about our experience on what kind of reports and documents you need to pass audit trials easily. You will also get an overview about the technical backgrounds on building these documents based on IBM Storage Protect, Storage Protect Plus, Storage Protect Plus Online Services, IBM BRMS and Cohesity.
15:00 - 15:30
15:00 - 15:30
Please select listing to show.
Please select listing to show.
15:30 - 16:00
15:30 - 16:00
Please select listing to show.
Coffee Break
Please select listing to show.
18:00 - 18:45
18:00 - 18:45
Please select listing to show.
Break
Please select listing to show.
Meeting Point with city guides: Lobby Hilton Cologne at 18:45 Journey through history: Walking tour in the old town from 18:45 - 20:00 Dinner, drinks & networking in a unique and informal atmosphere: Restaurant "Dom im Stapelhaus" from 20:00 - 22:00
18:45 - 22:00
18:45 - 22:00
Please select listing to show.
Please select listing to show.

Wednesday, 25 September 2024

Protecting data is a team sport. While much of the focus on the IBM team at the Symposium is IBM Defender, it is good to take few moments and explore “adjacent” technologies that are used. These sessions will discuss SIEM and SOAR and other important technologies that help to keep our data safe.
09:00 - 09:45
09:00 - 09:45
Please select listing to show.
Please select listing to show.
In this session we will look at how containerized application architecture challenges our traditional backup and recovery mindset and how IBM Fusion Backup & Restore can orchestrate backup and recovery of complex application solutions such as IBM Cloud Paks, IBM watsonx, IBM Db2, IBM Maximo as well as providing the necessary tools to protect other complex application solutions.
09:45 - 10:30
09:45 - 10:30
Please select listing to show.
Please select listing to show.
Kubernetes and Kubernetes distributions such as IBM Red Hat OpenShift promise a framework for stateless applications which can be deployed from automated pipelines - all you need to do is declare your desired application state and the system takes care of the rest. What is there to “protect”? In reality it is not that simple, especially with complex software stacks which have not only stateful data but also stateful “metadata”. In this session we will examine some of the challenges in application resiliency and application protection in terms of high availability, disaster recovery, and traditional backup and restore.
09:00 - 09:45
09:00 - 09:45
Please select listing to show.
Please select listing to show.
Many technologies (emerging or approaching maturity) are driving more data and new kinds of data. Things like AI, ML, LLM’s, quantum computing all have data needs and in terms of access, storage, and creation of data. This session will explore what the product team is seeing driving data and the cyber-resilience implications of those bits and bytes.
09:45 - 10:30
09:45 - 10:30
Please select listing to show.
Please select listing to show.
10:30 - 11:00
10:30 - 11:00
Please select listing to show.
Coffee Break
Please select listing to show.
Agentless backup or self-protecting backup can easily protect its data using the S3 object agent. This session will explore uses cases about how to leverage Storage Protect as a central data repository supporting: IBM Defender Data Protect, IBM Storage Protect for Cloud, and other self-protecting workloads. This will include recommendations on how to manage availability using Storage Protect replication for the S3 object based data.
11:00 - 11:30
11:00 - 11:30
Please select listing to show.
Please select listing to show.
This is an interactive session lead by IBM user experience design. In this session, we’ll learn together about what a cyber-resilience session is and some of the preferences you may have for what it does or can provide.
11:30 - 12:00
11:30 - 12:00
Please select listing to show.
Please select listing to show.
This is an interactive session lead by IBM user experience design. In this session, we’ll learn together about the shape of modern organizations and who the decision makers are for data and cyber-resilience. What are some of the challenges facing the stakeholders trying to manage all their data.
12:00 - 12:30
12:00 - 12:30
Please select listing to show.
Please select listing to show.
12:30 - 14:00
12:30 - 14:00
Please select listing to show.
Lunch Break
Please select listing to show.
What is being considered for the next couple quarters. This will discuss the areas of focus and priorities across IBM Defender being considered for delivery in the short-term. What do we foresee delivering in the next 1 to 2 quarters and how do we view priorities and candidate items for delivery in the next 6 months after that. Candidate items will be discussed, the “what” and “why” we think these are appropriate additions to IBM Defender, and other insight into what may be coming.
14:00 - 14:45
14:00 - 14:45
Please select listing to show.
Please select listing to show.
What is the strategic view of what IBM is trying to accomplish with IBM Defender? This session will discuss the multi-year strategic goals for IBM Defender and provide insight into how we see the landscape of cyber-resilience evolving to respond to the threats facing your data.
14:45 - 15:30
14:45 - 15:30
Please select listing to show.
Please select listing to show.
15:30 - 16:00
15:30 - 16:00
Please select listing to show.
Please select listing to show.
16:00 - 16:15
16:00 - 16:15
Please select listing to show.
Please select listing to show.