2022 Connect IT europe Agenda
Sample Agenda from 2021, Full Agenda to be released Soon
November 16, 2021
Exhibit Hall Opens
Welcome & Opening Remarks
Fred will use this session to talk about the state of the MSP industry, what this means for Kaseya and its different business units.
Product Strategy: The IT Complete Roadmap
Join Chief Customer Marketing Officer Mike Puglia, as he shares the past, present and future of IT Complete, integrations and Kaseya’s product strategy and roadmap to help customers drive efficiency to meet the new challenges of a hybrid world that is here to stay.
The Human Element of Security: How To Become a People Hacker
How to Become a People Hacker. From an early age, locked doors, high fences, and the secrets kept by businesses, buildings and people, fascinated Jenny Radcliffe. She has spent a lifetime learning how to use the “human element” to gain access to the buildings, data and information. This talk is an anecdote-ridden roller coaster of a tale which takes the audience from the mean streets of Liverpool in the 1980’s to the square mile of London’s financial district and beyond. Jenny shares her journey from breaching zoos, offices, theme parks, banks and football matches, to helping respected businesses and organisations protect themselves from the threat of malicious “people hackers.” Expect to takeaway high-ROI insights on reading social cues, protecting against exploitation, lie detection and negotiation techniques, and thinking about social intelligence in an entirely new way.
Phishing: Are You Ready for the NEW Threats?
Business Email compromises are one of the most important issues that effect businesses today. Join Miles as he dives into the facts, the stories and looks at some practical ways to protect yourself, your business and your clients. He will do a deep dive on all things ‘phishing’ related and give you practical tools as well as real life examples of what cyber attackers are currently doing to businesses of all sizes. Join us!
Vulnerability Management-as-a-Service: Increase Security & Profits at the Same Time
Every MSP knows that network vulnerability scanning is a basic and necessary component of any comprehensive IT security service. But surveys confirm that half of MSPs don’t do it – and those who do, cherry pick which clients get scanned based on their size and/or regulatory requirements. The high cost of scanning is given as the primary reason for limiting scans, coupled with the MSPs’ inability to get clients to pay for a scanning service.
In this ground-breaking session RapidFire Tools VP of Products Mark Winter presents a sure-fire go-to-market strategy for MSPs to deliver a profitable portfolio of Vulnerability Management-as-a-Service (V-MaaS) offerings using VulScan. He will show you to Package, Price, Position and Sell your own branded V-MaaS services to every single client, regardless of size or budget.
How MSPs Can Run Successful Post-Pandemic Lunch and Learns
Discover proven strategies for turning your next event into a lead-generation activity without it being smarmy or uncomfortable.
Attend this interactive session to get our playbook for Lunch and Learn Success, hear best practices for landing warm leads from hosting this type of event, and learn how co-hosting events with a JV Partner can help you capture higher quality leads.
How Security Awareness Training Protects Your Clients & Grows Your Revenue
More than 80% of all cyberattacks are phishing attacks. Bullphish ID is our Phishing simulation and Security awareness Platform which would empower your clients to mount a strong defense against cybercrime. It is a simple scalable, affordable tool that allow u to deliver effective security awareness training/ services to customers. To prevent your clients from falling into the phishing traps, we simulate real time attacks and turn them into phishing campaigns. We also have easy to understand, short, visually engaging training videos followed by the quizzes to keep them up to date on the latest attacks and verify the employee’s retention of the material. In this session, we will learn about how these phishing kits and training courses will assist in providing cybersecurity training to employees.
Boost Efficiency Through Automated Documentation
Manual documentation can waste a lot of valuable time and lead to inefficient operations. Moreover, it also results in many human errors, which can undermine the validity of the documentation process. With automated documentation, you can overcome these issues and free up your resources to focus on other critical tasks.
If you want to automate more but aren’t sure where to start, fret not! We’ve got you covered!
With the right tools and a little bit of guidance, you can take advantage of time-saving integrations, automated network documentation and visualization, and minimal coding API automation.
The Evolving Role of the VCIO
The term virtual CIO is commonly used but often misrepresented by MSPs. While many MSPs believe they are a trusted advisor to clients, in many cases their process and results say otherwise.
With the changing technology needs of an MSP’s target market, it’s never been more critical that MSPs not only deliver true high-value vCIO services, but evolve their process to meet the new standards clients demand in 2021.
Cybersecurity risks have accelerated cloud evolution, and greater technology dependence is forcing SMB’s to change their requirements of an MSP relationship. Gary Pica is considered the industry guru on developing an effective vCIO role. This session will change the way you look at customer relationships and set you on the right path to developing this critical role within your business.
The Future of Ransomware
Improving your Security Posture with Next Gen Patch Management
Nobody takes security as seriously as IT professionals, and with attacks having increased 4-fold over the past 18 months, it is sadly not a matter of “IF” but “WHEN” an attack is going to happen.
According to the BeyondTrust Microsoft Vulnerabilities Report, unpatched vulnerabilities are the cause of 1 in 3 breaches, GLOBALLY. And as we know, Threat Actors certainly don’t discriminate.
In this session, we will arm you with some critical information for improving your security posture by leveraging advanced patch management, including:
- Implementing a layered security model around patch management to maximize protection.
- Best Practices for Software Management including control access, threat level prioritization and scanning frequency.
- How and where VSA’s new Software Management functionality fits into the security landscape.
Six Ways to Differentiate Your MSP, Starting Today
The MSP market is a competitive one. With the industry witnessing significant growth, more and more players are entering the market every year. As a result, many MSPs are left with a shrinking client base. Furthermore, modern-day customers have tight budgets and expect more from their MSPs.
Join us for the session to take concrete steps to differentiate yourself in the market. You will learn how to differentiate your MSP as we dive deep into these six areas: people and process, talent, tech stack, client collaboration, client communications, and marketing strategy.
Afternoon Break - Visit Exhibit Hall
Deconstructing the Attackers Playbook – Steps and Tactics Hackers Are Using To Compromise Your Network Based on Real World Scenarios
In 2020 when breaches were discovered, investigators reported attackers had been occupying small business networks for months, and in many cases – years. While no SMB is immune from a cyber-attack and intrusions are inevitable, the average dwell-time (time between the initial intrusion and detection) of 6-months must be improved to reduce the impact. RocketCyber co-founders present SOC-as-a-Service enabling MSPs to identify attacker techniques and tactics evading cyber defenses today.
Secure Identity Access Management 101
Identity Access Management is a critical component for all MSP’s & in house IT teams. In this session we review IAM in 2021 and how we can help stay ahead of the issues we are facing in the marketplace.
The pitfalls of ignoring this space can be very painful, Kaseya has built inhouse our own solution for our customers and we will discuss Passly and how it fits in.
IT Glue Certified Administrator
Our most technical certification program for IT Glue administrators to learn advanced material related to the hierarchy of access control, checklists, flags, and workflows, as well as examine building out advanced flexible assets that you haven’t thought about before.
Following a brief exam, you’ll gain the designation of a Certified Professional – Admin Level 2.
- Manager or Admin access to IT Glue
- 3+ months IT Glue experience
- Completion of the “Getting Started” courses in IT Glue
Come as you are! Rock out day one with our fantastic 90’s Rockshow!
November 17, 2021
Exhibit Hall Opens
Welcome to Day Two
Artificial Intelligence. Most of us experience what we think of artificial intelligence (AI) by interacting with our mobile digital assistants. However, the recent advances in AI are nothing short of staggering. From Google’s computer beating the world’s greatest player of Go to computing neural networks being taught to not only recognise and analyse images but also fathom their context, artificial intelligence is far more advanced than you can imagine. We will reach human-level AI in just a couple of decades, but the huge leaps in this field happening right now will dramatically change not only how we live and work, but how we interact will every level of technology. The race for businesses to incorporate AI and reap the inherent benefits has begun.
The Future of RMM
RMMs have been the backbone of IT management for well over a decade, but a more complex world of mission critical applications, data, and an exploding diversity of devices and services requires a fundamental change it in role of RMMs. In this session, we’ll look at the computing environment two to four years in the future, discuss how endpoint management will dramatically change and how RMMs will transform to adapt to new paradigm.
Morning Break - Visit Exhibit Hall
Staying Ahead of the Changing Attack Landscape With Zero Trust
The way in which users operate in the complex IT world today is paving the way for zero-trust. In order to protect against the evolving threat landscape, we must change both IT and user behavior. To adapt, organizations are operating within the framework that no user, network or device can be trusted by default until proven otherwise. Join ThreatLocker CEO, Danny Jenkins, as he discusses the state of cybersecurity in 2021 and how to protect against ransomware with a zero trust architecture.
Not a Matter of IF, But When - An MSP’s Guide To Recovering From A Cyber Attack
Cyber threats are evolving and nobody is safe without a solid disaster recovery strategy and plan. Since the pandemic, cybercrime has increased by over 400% and cyber criminals have their sights set on MSPs. Not only have threat actors turned up the frequency, but the attacks themselves are more effective. Whether it is an end user clicking a phishing link, a zero-day attack or stolen credentials - are you prepared to respond and overcome?
Join Naj Raza, General Manager of Unitrends MSP, as he presents immediate steps you can take to protect your business and clients when dealing with today’s threat landscape. We will cover the following:
- Cyber Threat Prevention Best Practices
- The Necessity of an Incident Response Plan
- How to Test and Certify your Recovery Posture
- MSP Success Stories & More!
Three Tricks to Optomize Ticket Resoultion and Boost Productivity
Your service desk can mean the difference between success or failure. It plays a critical role in the level of service your customers receive and the degree to which those services are delivered. Look at it as the heart of your IT operation.
Join us for a thought-provoking session on how you can improve your customers’ service desk experience and drive efficiency. This session will review 3 steps to optimize your service desk processes:
- Evaluate which area of your service desk to enhance to drive maximum business impact
- Assess which business processes to automate to minimize ticket resolution time
- Tips on how to service more clients with the same amount of resources
Tips for Consultative Selling
A candid and somewhat comedic dialogue about how to effectively communicate value to customers. Every interaction is a sales opportunity, establishing you either as a trusted expert or an unfortunate burden to the business goals. We’ll lay out some simple, common-sense tactics - with real world examples - for leveraging your QBR’s and other interactions to build confidence in your role advising the technology needs of any business. This is a fun, light-hearted session, but nonetheless powerful as a reminder of how we can leverage basic aspects of human nature to win more business.
Crucial Technologies and Best Practices for Efficient Security Operations
Faced with ever-more sophisticated attacks, new regulatory requirements and an increased attack surface due to remote working, businesses need to adopt new security tools and capabilities. However, managed service providers and enterprises struggle to identify the right configuration from the myriad of technologies, vendors, and architectural options available.
To avoid alert fatigue, missed or late detections, and runaway costs, it is important to consider your organization’s profile, security use cases and best practices before adopting new tools.
Join this session, to get valuable information around these key topics:
- Why it’s important to set your security architecture on a best-practice foundation
- How to select the technologies, services and delivery options that make the most sense for your organization’s profile
- How to combine and consolidate different technologies for efficient and more automated security operations
- How Bitdefender GravityZone helps organizations and MSPs upgrade and consolidate security capabilities, catching more threats earlier, and reducing manual investigation efforts and costs
Unified BCDR Why Backup Is No Longer Enough
Data is the lifeblood of business but now lives in more places than ever before, is time-consuming to manage, and is under daily attack from cybercriminals and clumsy employees.
To address these challenges, you need a solution that can address all workloads, adds immutability safeguards against cybercrime and human error, injects automation and artificial intelligence to simplify complex system, and empowers your team to work on more important projects that moves your business forward.
- What is Unified BCDR
- How organizations can benefit from automation
- How cyberthreats have evolved and how to keep ahead
Protective DNS – How the NSA’s Recommendations Affect Businesses
DNS has worked as the address book of the internet, but it wasn’t designed with today’s security and privacy needs in mind. Standard DNS lacks privacy and needed security features, meaning it’s time for it to adapt to our new world. But adding encryption adds complication to the process. To further tangle the knot of DNS, the NSA recommends privacy and security improvements while also recommending that some encrypted DNS resolvers should be disable and blocked.
Join us to discover how you can move forward in such a complicated landscape. With Webroot® DNS Protection, you’ll gain the tools of a security service that analyzes DNS queries and takes action to mitigate threats. It also leverages existing DNS protocol and architecture while satisfying regulatory rules.
Too Busy To Be Stressed. How To Avoid Being Overwhelmed as an IT Business Owner
Since the start of the COVID-19 pandemic, IT businesses have been key workers who have kept their client’s businesses running.
But that effort comes at a cost. IT business owners everywhere are feeling tired, stressed yet too busy to work out how to help themselves cope.
In this open and honest talk, Richard Tubb, author of “The IT Business Owner’s Survival Guide”, will share practical tips and techniques to help MSP owners to manage their time, their energy and their task list.
You will come away from this session feeling positive about how to reduce your stress, run a successful MSP business and avoid being overwhelmed by the challenges put in front of you.
Sup up Your Service Desk by Streamlining Your Technicians’ Workflow
A service desk is the frontline for support and the heart of a streamlined and productive IT operation. Handling service desk in isolation can impact your productivity and profitability.
During this session, we will share tips on how to service more clients with the same amount of resources with seamless workflow integrations. In particular, we will discuss the workflow integration between your IT Documentation, RMM, and PSA.
Mastering the MSP Cybersecurity Sales Conversation
Security-as-a-Service is a major revenue opportunity for MSPs. As the global landscape continues to change, your clients are facing an increasingly complex environment with cyber-attacks and increasing compliance demands.
Join TruMethods President, Gary Pica to learn key tactics for building a successful cybersecurity practice.
During this session you will learn:
- How to adapt your sales messaging for the changing security landscape
- How to package and price your offering
- How to decide what to include in your service offering and what to sell separately
- Keys to selling the value of your security offering
Every MSP needs to address these new security requirements. If you want to build a security practice that increases recurring revenue sales and profitability, tune in for this session.
Afternoon Break - Visit Exhibit Hall
Latest in Phishing Provention
This session is about the problem of phishing and how Graphus addresses it. Specifically the shortcomings with the legacy solutions, how they are ineffective in preventing against sophisticated phishing attacks. Discussion on the layered security approach by Graphus, how the TrustGraph, EmployeeShield and Phish911 layers of Graphus provides a comprehensive solution. Also a live demo of the Graphus product.
Flexibility (& Profitability!) With One BCDR Program To Rule Them All
Unitrends (a Kaseya company) is a channel-first company. We have been working with Value Added Resellers (VARs) since 1989, and Managed Service Providers (MSPs) since 2017 and we’re always looking for ways to make it easier to work with us. (fun fact: given our optional integration with Kaseya VSA, you may also know us by Kaseya Unified Backup)
- If you manage IT services on behalf of your customers and would like to include Unitrends as a part of your managed offerings, we’ve got you covered with Unitrends MSP. In this offering, you’re both the contracting party and the owner of our products. You’re responsible for supporting your customers from a Unitrends product/service perspective.
- If you’re a reseller, you control the sales cycle and the sales relationship with their customer, but they own the product and our US-based 24x7 customer support team works directly with them from a Unitrends product perspective. But never fear, Unitrends sales, marketing and solution engineers are just one call away.
- Love other Kaseya products in the IT Complete stack? We do too! This is why our partner program gives you the opportunity to transact (and earn!) on those products as well, in either a resale or MSP capacity.
As a Unitrends partner, you will be able to transact in any way that makes sense for your business, which may mean you want to transact in multiple ways. You do you. You’ll be able to manage all customers in one place and work with one Unitrends account manager.
Knowledge is power. Join us to learn more.
Learn How To Turn Cold Leads Into Warm Leads With a Podcast
If you’ve been wanting to launch a podcast but are not sure where to start, this is the session for you. Learn how a podcast can help you expand your community and warm up cold leads through engaging spoken content. We’ll share our Quick Start Podcast Roadmap with tech tips and communication templates and tools to help you go from podcast ideation to launch and promotion in just 30 days.