Modernizing your service offerings requires moving beyond manual processes to a model of automated data security. In this session, Joe Mount of Ziperase demystifies the technical requirements of certified data erasure. We will simplify the complexities of sanitizing “problem” devices—including M-series MacBooks, NVMe drives, and network switches—while highlighting how to build compliant, software-driven workflows. Discover […]
Read MoreThe assumption that physical destruction is the only path to data security often leads to unnecessary value loss and false confidence. This session explores a risk-based approach to IT asset disposition, comparing data erasure and physical destruction, examining the consequences of over-destruction, and introducing Targeted Physical Destruction as a precision alternative. The takeaway is clear: […]
Read MoreLocation: Pacific Jewel Ballroom C As the boundaries between secure shredding, records storage, and IT asset disposition (ITAD) continue to converge, organizations have new opportunities to expand services, strengthen compliance, and better support the full data lifecycle. This session explores how companies can strategically leverage capabilities across all three sectors to build integrated, defensible destruction […]
Read MoreLocation: Pacific Jewel Ballroom B How to employ a digital data destruction strategy that meets customer needs and enables best case asset remarketing.
Read MoreLocation: Pacific Jewel Ballroom A The market is shifting. Clients increasingly expect providers to handle more than just paper destruction—they want secure, transparent, and environmentally responsible disposition of electronic assets. This session outlines how shredding companies can successfully expand into ITAD by leveraging existing customer relationships while building the operational and technical capabilities needed for […]
Read MoreLocation: Pacific Jewel Ballroom A Many providers see compliance as paperwork. Smart providers see it as a sales weapon. This session will be a light, engaging guide to understanding the key regulations without the usual complexity. Get the essentials quickly; learn to become fluent in the rules and regulations that govern data destruction and learn […]
Read MoreLocation: Pacific Jewel Ballroom B As artificial intelligence transforms business operations at unprecedented speed, it simultaneously creates the most sophisticated cyber threats we’ve ever faced. This presentation exposes the dark side of the AI revolution through real-world case studies, including the $25 million deepfake heist in Hong Kong and the legal implications of AI chatbot […]
Read More