Agenda

 

With more than 40 sessions across multiple tracks, keynote presentations, product roadmap deep-dives and tons of Mimecast experts on-site to tap into - you will gain the knowledge, skills, confidence and connections you require for success.

Sunday, October 27 

9:00 am - 2:00 pm Pre-Registration
9:30 am - 4:30 pm Customer Certification (Separate Registration Required)

Monday, October 28 

9:00 am - 3:00 pm Registration
9:00 am - 1:00 pm Customer Certification
4:00 pm - 5:30 pm Summit Kick-Off/Opening General Session
5:30 pm - 7:00 pm Welcome Reception in Expo Hall
7:30 pm - 9:00 pm Industry Meet Ups

Tuesday, October 29 

7:30 am - 8:30 am Breakfast/Networking in Expo Hall
8:30 am - 10:00 am General Session/Keynotes
10:00 am - 10:30 am Networking Break in Expo Hall
10:30 am - 12:15 pm Breakout Sessions
12:15 pm - 1:45 pm Lunch and Motivational Session
1:45 pm - 2:15 pm Networking Break in Expo Hall
2:15 pm - 3:00 pm Breakout Sessions
3:00 pm - 3:30 pm Networking Break in Expo Hall
3:30 pm - 5:15 pm Breakout Sessions
7:00 pm - 11:00 pm Customer Appreciation Party

Wednesday, October 30 

7:30 am - 8:30 am Breakfast/Networking in Expo Hall
8:30 am - 9:30 am General Session
9:30 am - 10:00 am Networking Break in Expo Hall
10:00 am - 11:45 am Breakout Sessions
12:00 pm - 12:30 pm Closing Remarks and Customer Awards

 

 

Labs & Certification Courses

Our goal is to make you and your team more resilient by enhancing your product knowledge and ensuring you are getting the most out of your Mimecast configurations, which is why we’re offering multiple full and half day certification courses prior to the Cyber Resilience Summit. Space is limited and offered on a first come basis, so make sure to add certification to your registration today.

 

Full-Day (Sunday, October 27th 9:30-4:30)

Half-Day

Half-Day (Sunday, October 27th 12:30-4:30 OR Monday, October 28th 8:30-12:30)

Hands-On Labs

  • Message Center: Effectively search and troubleshoot
    Learn how to optimize your use of Message Center, which allows administrators to search, manage, and report on messages in transit. You’ll get an overview of the various monitoring queues and expert guidance on how to effectively search messages and troubleshoot mail flow issues.
     
  • Mimecast 101: A introduction and guide for new Mimecast customers
    Ideal for new customers and administrators, this session will take you through the basics of Mimecast. You’ll get a tour of the administration console, learn how Mimecast interacts with your environment, and walk away with actionable advice for optimizing your new Mimecast technology. We’ll also provide guidance on getting the most from your Cyber Resilience Summit experience.
     
  • Stationary Masterclass: Building for form, function, or both
    In this interactive session, you’ll get a step-by-step walk through of setting up and optimizing your stationary layout and configuration. Whether building for form, function, or both, this course will ensure you have all the skills to get the most from your stationary setup. Bring your questions and your laptop so you can follow along.
     
  • Continuity and Service Monitor: Keep business flowing, no matter what
    Improve your resilience posture with this session that will demonstrate how you can ensure zero downtime for your mail flow in the event of planned or unplanned downtime. You’ll learn configurations and best practices for Service Monitor, Alerting, and Continuity so you can keep business flowing no matter what.
     
  • Data Leak Prevention with Content Examination
    Protect your employees, customers, and corporate data with Data Leak Prevention using Content Examination. In this session, you’ll learn how to build rules, use threat dictionaries, and assign trigger actions like Secure Messaging. You’ll leave with the skills to better safeguard sensitive organizational data against accidental, or in rare cases, intentional exposure.
     
  • Optimizing Targeted Threat Protection: Attachment and URL Protect Attachment
    Targeted Threat Protection (TTP) provides a set of tools that are critical to protecting end-users. Join this session to learn how to ensure that two key features – Attachment Protect and URL Protect – are optimized, including best practices for configuration, roll-out, and reporting. Bring your laptop and follow along as our technical experts take you through it step-by-step.
     
  • Optimizing Targeted Threat Protection: Impersonation Protect and Internal Email Protect
    Mimecast’s 2019 State of Email Security report showed that both impersonation attacks and threats that originate from inside the organization are on the rise. Targeted Threat Protection is here to help. Join this session to get a step-by-step walk through of how to optimize two key defenses – Impersonation Protect and Internal Email Protect. You’ll learn best practices for configuration, roll-out, and reporting. Bring your laptop and your questions, and get ready to learn.
     
  • Empowering employees with end-user applications
    Happy end-users? It is possible. Learn how to empower them in this session focused on configuring and optimizing end-user applications using Application Settings. You’ll learn how to ensure you’re taking full advantage of all the best features from Mimecast for Outlook, Mimecast Mobile, and the Personal Portal.
     

Education Tracks

More than 40 high-value breakouts led by Mimecast experts, customers, and industry thought leaders to help you enhance the skills you need for ongoing success.

Your Mimecast: Roadmap, Innovations, and Services

Learn where we’ve been investing and what lies ahead. From deep dive product roadmap discussions to sessions on how we can make the Mimecast community even stronger.

Learn More

Advanced Security

We’ll also cover persistent challenges like combatting human error, addressing multi-vector attacks, and making threat intelligence both consumable and actionable.

Learn More

Archiving, Data Protection, and Compliance

Explore the challenges of archiving and data management through a variety of lenses. You’ll learn how to optimize existing technologies and make data migration easy, and get best-practices from industry experts, peers and Mimecast product experts.

Learn More

Optimizing IT and Your Security Ecosystem

Designed to give you strategies for optimizing your security posture today: building a sustainable security platform, making everything work together, and getting the most from your investments.

Learn More

Training Labs

Go deep on how to get the most out of your Mimecast technology with hands-on training from Mimecast experts. These sessions are designed to help you ensure protections are optimized and make every day a little easier.

Learn More

Tips and Tricks

Learn fast in these 20-minute speed sessions. We’ll cover some of the top support tickets from the Mimecast community, talk through best practices, and discuss high interest areas like APIs.

Learn More

 

Breakout Sessions

Your Mimecast: Innovation, Roadmaps and Services

What’s the future of the Mimecast solution suite? What new features and functionality can you look forward to you in your product? And how can you get the most out of the Mimecast resources available to you? Join sessions in this track to learn where we’ve been investing and what lies ahead. From deep dive product roadmaps and discussions with product experts to sessions on how we can make the Mimecast community even stronger, you’ll have an opportunity to share feedback, learn how to optimize your investment, and collaborate on the future we’re building together.  
 

  • Roadmap: Building Cloud Archive for business, legal, compliance, and beyond
    Archiving has transformed from infrastructure used to store aging content cheaply to a platform-based approach for serving multiple stakeholders, from end-users to compliance, legal, and IT teams. Managing and preserving information securely and productively has never been more complex. Join this session to see how we’re evolving Cloud Archive to help you address these challenges now and long into the future. You’ll hear about new enhancements, what you can expect in the short term, and our vision for 2020 and beyond.
     
  • Roadmap: Mimecast Email Security – Protecting you today and tomorrow
    Mimecast is proud to help you make email safer for business today, but what about tomorrow? Protecting the top vector for cyberattacks isn’t a one and done – it requires constant vigilance and continuous evolution. Join this session to learn how the Email Security roadmap continues to evolve, with a focus on efficacy, innovation, customer experience, and insights. Our product experts will share information you can use to optimize protections today and give you a preview of 2020 and beyond.
     
  • Roadmap: Mimecast Web Security – Protecting employees no matter where they click or where they work
    We all know email is used in 90%+ of attacks, but what about its partner in crime – the web? From general browsing and personal webmail to social media, this vector can be challenging to protect. Join this session to learn how you can safeguard both email and web with a single cloud service that combines threat intelligence and security services behind one unified console. You’ll have an opportunity to learn more about Mimecast Web security, see what’s around the corner, and hear our longer-term vision for this solution.
     
  • After onboarding: Continuing your journey with Mimecast professional services
    Getting your technology up and running is critical, but it’s just the first step in your Mimecast journey. Your needs will inevitably evolve, as will the threat landscape and Mimecast’s strategies for keeping you as safe as possible. Join this session to learn how Mimecast’s professional services organization can help you keep protections optimized, maximize the value of your security technologies, and build a long-term plan for the future.  
     
  • Let's get real: Introducing Phishing 2.0 from Mimecast Awareness Training
    Phish testing is great in theory, but it often falls short of the mark. Why? It’s watered down, template-driven, and let’s face it…easy to spot. So how do you expose employees to the real thing without the risk? Join this session to learn about Phishing 2.0 from Mimecast Awareness Training. You’ll see for yourself how you can “de-fang” actual attacks, send them to their intended recipients, track how they respond, and educate them on where they went wrong. All reward, no risk. Now that’s ph_ing awesome.
     

|top|

 

Advanced Security Sessions

Defending against cyber threats requires an ever-vigilant security posture, so optimizing the tools and resources at your disposal is essential. Join these sessions to learn the latest strategies for protecting against sophisticated attacks, hear best practices from third-party experts and peers, and get a comprehensive view of Mimecast’s extended solution suite. We’ll also cover persistent challenges like combatting human error, addressing multi-vector attacks, and making threat intelligence both consumable and actionable.
 

  • Actionable Threat Intelligence: Defeating data overload to drive smarter, faster decision-making
    Threat intelligence data can be a powerful tool in your cybersecurity arsenal. The problem is there’s so darn much of it. How do you make it meaningful? Find out in this session. We’ll discuss the different types of threat intelligence, how they can (and cannot) help you, and strategies for maximizing their value. You’ll also learn more about Mimecast Threat intelligence, designed to be contextual, easily consumed, and actionable.  
     
  • The call is coming from inside the house: How to detect and remediate internal threats
    Most cybersecurity strategies focus on attacks trying to infiltrate an organization’s systems, but what about threats that start from the inside? Difficult to detect and particularly dangerous because employees’ defenses are lowered, they represent a risk that too often goes unaddressed. Join this session to learn how you can detect insider threats and even “rewind the clock” with Mimecast’s advanced remediation capabilities. You’ll leave with actionable strategies for keeping internal email – which represents two-thirds of most organizations’ mail flow – secure.
     
  • From the Threat Intelligence Frontier: How the Mimecast S.A.F.E. score quantifies employee risk
    When it comes to security risk, not all employees are created equal, but how do you know where critical (and limited) resources are needed most? Join this session to learn about the new Mimecast S.A.F.E score – a personalized risk assessment for every employee and your organization as a whole. You’ll hear how real-world threat data, combined with Mimecast-driven insights around “connectedness”, attack vectors, and roles, can help you predict – and proactively protect – your most vulnerable end-users.
     
  • It wasn’t me! How to tackle the misuse of your brand online
    It’s not easy to build a strong brand; but unfortunately, it’s far too simple to do serious and lasting damage to one. How do you identify when and where your brand is being exploited? And how do you stop it? Join this session to learn how Mimecast has joined forces with DMARC Analyzer and Segasec to shine a light into the dark corners of the infinite web and help you proactively protect one of your most important assets – your brand. 
     
  • Microsoft Office 365 and Mimecast: Reaping the benefits of cloud without increasing risk
    Remember when Microsoft Exchange on-premises was the default option? Great email solution, a lot of gaps from a security and resilience standpoint. As migrations to Office 365 continue to grow, the hosting method may have changed, but the security challenges remain. Join this session for a deep-dive into how to reap the benefits of cloud without increasing your cybersecurity risk. We’ll discuss the limitations that exist with Office 365 alone and how Mimecast can help you stay one step ahead.
     
  • The Mimecast Security Black Box: An in-depth look at the technology, people, and processes that protect your organization
    Because of Mimecast’s cloud infrastructure, many of the analytic techniques and investigative processes we use to protect your organization are behind the scenes. In this session, we’ll pull back the curtain to give you a close-up view of the most current technologies in use, the different threat intelligence sources we use, and how we determine what new analytic techniques to adopt. You’ll also learn about the roles and responsibilities of the security experts whose sole focus is to keep you safe every day. 

|top|

 

Archiving, Data Protection, and Compliance

How do you navigate an environment where data volumes continue to grow at the same time that regulatory and compliance requirements are becoming more complex? Join sessions in the Archiving, Data Protection, and Compliance track to explore the challenges of archiving and data management through a variety of lenses – from IT and legal to end-user and industry. You’ll learn how to optimize existing technologies and make data migration easy, get best-practices from industry experts, have an opportunity to network with peers and Mimecast product experts, and more. 
 

  • Ask the Archive experts: An interactive roundtable
    What does the future of information management look like?  Join us in this interactive session featuring Mimecast experts across product management, product marketing, engineering, and support. Our staff has a combined experience of 100 years in the archiving space. Bring your burning questions on retention requirements, supervision, data classification, data migration, content type support, and other hot topics. We’ll discuss, brainstorm, and collaborate on strategies for today and what we think is around the corner. 
     
  • Information Governance: Best practices for bridging people, processes, and technology
    What are the latest best practices for systematically managing information based on regulatory, legal, and business requirements? Kevin Barnicle, Senior Director of Information Governance at Epiq, will join product experts from Mimecast Cloud Archive to share industry-proven strategies. You’ll leave with actionable advice on gaining greater insights, improving decision-making, and streamlining your information governance process. 
     
  • Protecting your data – Is Microsoft Office 365 good enough? 
    The risks posed by ransomware attacks and accidental deletions of critical information aren’t going away, and the simple truth is that relying solely on Microsoft O365™ for backup and recovery is a risky bet. In fact, according to Gartner, “Those evaluating Office 365 should consider investing in third-party tools for faster, more-flexible recovery options, as well as reputation damage control after a malicious attack.” Join this session to make sure your organization is prepared. You’ll learn about the gaps that exist in Office 365 and how Mimecast can solve the disconnect on your data protection and compliance strategy.  
     
  • Time to play offense with your e-discovery action plan
    Responding to e-discovery events is often reactive and time-pressured. Learn how an integrated archive and e-discovery solution can help IT and legal teams get proactive, while also saving time, reducing costs, and mitigating risk. You’ll get a close-up look at features in Cloud Archive that can deliver immediate ROI, such as Case Review, self-service control over legal holds, case management, and data export. The session will provide actionable advice for reducing costly settlements, decreasing reliance on outsourcing, and making better, faster decisions.

|top|

 

Optimizing IT and Your Security Eco-System

Optimizing your security strategy is a delicate balance between available resources and the best interests of the business. Building a sustainable security platform, making everything work together, and getting the most from your investments is no easy task – but it’s essential. Explore how to address these challenges and more in this track designed to give you strategies for optimizing your security posture today while also building a strong foundation for the future. 
 

  • The Mimecast data layer:  Rising above the noise to extract actionable insights
    Data data everywhere and not a drop to drink. That’s how the modern-day information tsunami can sometimes feel, and Mimecast is no exception. So over the past months, we’ve been exploring a critical question – how can our customers get the greatest possible value from the massive volumes of data Mimecast generates, analyzes, and stores? Join this session to learn about new capabilities designed to use data as a springboard for taking our service to the next level and provide actionable insights to our community of customers, partners, and colleagues.
     
  • Resilience together: How customers are using third-party integrations and APIs to boost cyber resilience 
    There’s no question that your security solutions work better when they work well together. Join this session to hear a panel of Mimecast customers and partners share how they’re using Mimecast APIs to integrate with other systems, including SIEM and response tools. You’ll get best practices, lessons learned, and practical advice on incorporating the Mimecast data into your larger security eco-system to uncover better insights, make more informed decisions, and take a proactive approach to protecting your business.
     
  • Why an integrated security environment is no longer a choice
    Complex cybersecurity challenges require complex technology ecosystems, right? It doesn’t have to be that way. With research showing that the average company owns 80 applications from 40 vendors but uses less than 20% of the features, finding a way to make it all work together is clearly critical. Join this session to discover how you can do just that. You’ll learn how an integrated, extensible architecture can increase response times, reduce risk, and decrease your administrative burden. Don't you just feel better already?

|top|

 

Mimecast Training Labs

Ready to go deep on how to get the most out of your Mimecast technology? Join Mimecast’s technical training experts for sessions designed to help you ensure protections are optimized and make every day a little easier. Bring your own device to follow along and leave with actions you can take immediately to get more value from your Mimecast solutions.
 

  • Continuity and Service Monitor: Keep business flowing, no matter what
    Improve your resilience posture with this session that will demonstrate how you can ensure zero downtime for your mail flow in the event of planned or unplanned downtime. You’ll learn configurations and best practices for Service Monitor, Alerting, and Continuity so you can keep business flowing no matter what. 
     
  • Data Leak Prevention with Content Examination
    Protect your employees, customers, and corporate data with Data Leak Prevention using Content Examination. In this session, you’ll learn how to build rules, use threat dictionaries, and assign trigger actions like Secure Messaging. You’ll leave with the skills to better safeguard sensitive organizational data against accidental, or in rare cases, intentional exposure.
     
  • Empowering employees with end-user applications
    Happy end-users? It is possible. Learn how to empower them in this session focused on configuring and optimizing end-user applications using Application Settings. You’ll learn how to ensure you’re taking full advantage of all the best features from Mimecast for Outlook, Mimecast Mobile, and the Personal Portal.
     
  • Message Center: Effectively search and troubleshoot
    Learn how to optimize your use of Message Center, which allows administrators to search, manage, and report on messages in transit. You’ll get an overview of the various monitoring queues and expert guidance on how to effectively search messages and troubleshoot mail flow issues. 
     
  • Mimecast 101: A introduction and guide for new Mimecast customers
    Ideal for new customers and administrators, this session will take you through the basics of Mimecast. You’ll get a tour of the administration console, learn how Mimecast interacts with your environment, and walk away with actionable advice for optimizing your new Mimecast technology. We’ll also provide guidance on getting the most from your Cyber Resilience Summit experience.
     
  • Optimizing Targeted Threat Protection: Attachment and URL Protect Attachment
    Targeted Threat Protection (TTP) provides a set of tools that are critical to protecting end-users. Join this session to learn how to ensure that two key features – Attachment Protect and URL Protect –  are optimized, including best practices for configuration, roll-out, and reporting. Bring your laptop and follow along as our technical experts take you through it step-by-step. 
     
  • Optimizing Targeted Threat Protection: Impersonation Protect and Internal Email Protect
    Mimecast’s 2019 State of Email Security report showed that both impersonation attacks and threats that originate from inside the organization are on the rise. Targeted Threat Protection is here to help. Join this session to get a step-by-step walk through of how to optimize two key defenses – Impersonation Protect and Internal Email Protect. You’ll learn best practices for configuration, roll-out, and reporting. Bring your laptop and your questions, and get ready to learn.
     
  • Stationary Masterclass: Building for form, function, or both
    In this interactive session, you’ll get a step-by-step walk through of setting up and optimizing your stationary layout and configuration. Whether building for form, function, or both, this course will ensure you have all the skills to get the most from your stationary setup. Bring your questions and your laptop so you can follow along.

|top|

 

Tips & Tricks

Learn fast in these 20-minute speed sessions held in the Mimecast Pavilion. We’ll cover some of the top support tickets from the Mimecast community and talk through best practices for navigating them, discuss high interest areas like APIs, and talk about challenges like user adoption, and more. Invest a little time, learn a lot, and have some fun along the way.
 

  • APIs: Understanding what they are and how to use them 
    Mimecast has been building out its API and Alliances program, and many of you are asking "Where do I start?" Join this session to hear how other customers are leveraging Mimecast's APIs to enhance their security postures and enrich the data being sent to and received from other third parties.  
     
  • Preparing for the zombie apocalypse: Can you keep email flowing no matter what?
    When security technology "just works", business continuity is easy to overlook or de-prioritize. Don't find yourself in a situation where email is down and your plan is that you have no plan. In this fast-paced, 20-minute session, we'll share our business continuity checklist and best-practice tips for making sure you're fully prepared when the zombie hoard arrives or (more likely) when someone cuts through the cables in the street.
     
  • Where did my email go?
    Bounced messages, rejected messages, and held messages all add to the volume of questions you need to answer and tickets you need to resolve. Join this session to learn about the redesigned Message Tracking experience and get tips on how to navigate it as quickly and efficiently as possible.  
     
  • Why won't they use it? Strategies for increasing end-user adoption
    We know how difficult it can be to introduce changes to end users, whether it's migrating from legacy technologies or introducing new capabilities. Hear how your peers are managing change in this session that will feature success stories and lessons learned from Mimecast customers. You'll get inspiration, learn from their mistakes, and learn proven strategies for increasing end-user adoption.  

|top|