2021 Connect IT europe Agenda
Customize Your Agenda
November 16, 2021
Exhibit Hall Opens
Welcome & Opening Remarks
Fred will use this session to talk about the state of the MSP industry, what this means for Kaseya and its different business units.
Product Strategy: The IT Complete Roadmap
Morning Break - Visit Exhibit Hall
Guest Mainstage Presentation
Business Email Compromise 101
Business Email compromises are one of the most important issues that effect businesses today. Join Miles as he dives into the facts, the stories and looks at some practical ways to protect yourself, your business and your clients. He will do a deep dive on all things ‘phishing’ related and give you practical tools as well as real life examples of what cyber attackers are currently doing to businesses of all sizes. Join us!
Vulnerability Management-as-a-Service: Increase Security & Profits at the Same Time
Every MSP knows that network vulnerability scanning is a basic and necessary component of any comprehensive IT security service. But surveys confirm that half of MSPs don’t do it – and those who do, cherry pick which clients get scanned based on their size and/or regulatory requirements. The high cost of scanning is given as the primary reason for limiting scans, coupled with the MSPs’ inability to get clients to pay for a scanning service.
In this ground-breaking session RapidFire Tools VP of Products Mark Winter presents a sure-fire go-to-market strategy for MSPs to deliver a profitable portfolio of Vulnerability Management-as-a-Service (V-MaaS) offerings using VulScan. He will show you to Package, Price, Position and Sell your own branded V-MaaS services to every single client, regardless of size or budget.
Powered Services Pro 101: Supercharge MRR Growth
Employee Security Training
More than 80% of all cyberattacks are phishing attacks. Bullphish ID is our Phishing simulation and Security awareness Platform which would empower your clients to mount a strong defense against cybercrime. It is a simple scalable, affordable tool that allow u to deliver effective security awareness training/ services to customers. To prevent your clients from falling into the phishing traps, we simulate real time attacks and turn them into phishing campaigns. We also have easy to understand, short, visually engaging training videos followed by the quizzes to keep them up to date on the latest attacks and verify the employee’s retention of the material. In this session, we will learn about how these phishing kits and training courses will assist in providing cybersecurity training to employees.
Boost Efficiency Through Automated Documentation
The Evolving Role of the VCIO
The term virtual CIO is commonly used but often misrepresented by MSPs. While many MSPs believe they are a trusted advisor to clients, in many cases their process and results say otherwise.
With the changing technology needs of an MSP’s target market, it’s never been more critical that MSPs not only deliver true high-value vCIO services, but evolve their process to meet the new standards clients demand in 2021.
Cybersecurity risks have accelerated cloud evolution, and greater technology dependence is forcing SMB’s to change their requirements of an MSP relationship. Gary Pica is considered the industry guru on developing an effective vCIO role. This session will change the way you look at customer relationships and set you on the right path to developing this critical role within your business.
The Future of Ransomware
Protecting Against Ransomware With Next Gen Patch Management
Six Ways to Differentiate Your MSP, Starting Today
The MSP market is a competitive one. With the industry witnessing significant growth, more and more players are entering the market every year. As a result, many MSPs are left with a shrinking client base. Furthermore, modern-day customers have tight budgets and expect more from their MSPs.
Join us for the session to take concrete steps to differentiate yourself in the market. You will learn how to differentiate your MSP as we dive deep into these six areas: people and process, talent, tech stack, client collaboration, client communications, and marketing strategy.
Afternoon Break - Visit Exhibit Hall
Deconstructing the Attackers Playbook – Steps and Tactics Hackers Are Using To Compromise Your Network Based on Real World Scenarios
Secure Identity Access Management 101
Mark Copeman Session
Day One Recap
November 17, 2021
Exhibit Hall Opens
Welcome to Day Two
The Human Element of Security: How To Become a People Hacker
How to Become a People Hacker. From an early age, locked doors, high fences, and the secrets kept by businesses, buildings and people, fascinated Jenny Radcliffe. She has spent a lifetime learning how to use the “human element” to gain access to the buildings, data and information. This talk is an anecdote-ridden roller coaster of a tale which takes the audience from the mean streets of Liverpool in the 1980’s to the square mile of London’s financial district and beyond. Jenny shares her journey from breaching zoos, offices, theme parks, banks and football matches, to helping respected businesses and organisations protect themselves from the threat of malicious “people hackers.” Expect to takeaway high-ROI insights on reading social cues, protecting against exploitation, lie detection and negotiation techniques, and thinking about social intelligence in an entirely new way.
The Future of RMM
Morning Break - Visit Exhibit Hall
Not a Matter of IF, But When - An MSP’s Guide To Recovering From A Cyber Attack
Cyber threats are evolving and nobody is safe without a solid disaster recovery strategy and plan. Since the pandemic, cybercrime has increased by over 400% and cyber criminals have their sights set on MSPs. Not only have threat actors turned up the frequency, but the attacks themselves are more effective. Whether it is an end user clicking a phishing link, a zero-day attack or stolen credentials - are you prepared to respond and overcome?
Join Naj Raza, General Manager of Unitrends MSP, as he presents immediate steps you can take to protect your business and clients when dealing with today’s threat landscape. We will cover the following:
- Cyber Threat Prevention Best Practices
- The Necessity of an Incident Response Plan
- How to Test and Certify your Recovery Posture
- MSP Success Stories & More!
Sup up Your Service Desk by Streamlining Your Technicians’ Workflow
A service desk is the frontline for support and the heart of a streamlined and productive IT operation. Handling service desk in isolation can impact your productivity and profitability.
This session will discuss the following topics to help streamline your technicians' workflow to meet the growing demands of users:
- Streamlined ticketing, billing, and more all-in-one tool
- Modern and lightweight user interface
- Workflow integrations between leading IT Glue, VSA, ID Agent, Graphus, Compliance Manager and more
Tips for Consultative Selling
Unified BCDR Why Backup Is No Longer Enough
Data is the lifeblood of business but now lives in more places than ever before, is time-consuming to manage, and is under daily attack from cybercriminals and clumsy employees.
To address these challenges, you need a solution that can address all workloads, adds immutability safeguards against cybercrime and human error, injects automation and artificial intelligence to simplify complex system, and empowers your team to work on more important projects that moves your business forward.
- What is Unified BCDR
- How organizations can benefit from automation
- How cyberthreats have evolved and how to keep ahead
Security Essentials 1
Mastering the MSP Cybersecurity Sales Conversation
Security-as-a-Service is a major revenue opportunity for MSPs. As the global landscape continues to change, your clients are facing an increasingly complex environment with cyber-attacks and increasing compliance demands.
Join TruMethods President, Gary Pica to learn key tactics for building a successful cybersecurity practice.
During this session you will learn:
- How to adapt your sales messaging for the changing security landscape
- How to package and price your offering
- How to decide what to include in your service offering and what to sell separately
- Keys to selling the value of your security offering
Every MSP needs to address these new security requirements. If you want to build a security practice that increases recurring revenue sales and profitability, tune in for this session.