Tech Field Day

The Independent IT Influencer Event

  • Home
    • The Futurum Group
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
      • 2026 Sponsors
      • 2025 Sponsors
      • 2024 Sponsors
      • 2023 Sponsors
      • 2022 Sponsors
    • Sponsor Tech Field Day
    • Best of Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2026 Delegates
      • 2025 Delegates
      • 2024 Delegates
      • 2023 Delegates
      • 2022 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
  • News
    • Coverage
    • Event News
    • Podcast
  • When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures.
You are here: Home / Videos / Veeam Security – Protect and Reduce Risk

Veeam Security – Protect and Reduce Risk



Tech Field Day Extra at RSAC 2026


This video is part of the appearance, “Veeam Presents at Tech Field Day Extra at RSAC 2026“. It was recorded as part of Tech Field Day Extra at RSAC 2026 at 8:00-10:00 on March 23, 2026.


Watch on YouTube
Watch on Vimeo

In this presentation, Michael Cade and Emilee Tellez explain how Veeam has expanded its focus from traditional backup to comprehensive Data Security Posture Management (DSPM). By treating an organization’s data ecosystem like a “social network of data,” Veeam’s Data Command Center provides visibility into data lineage, sovereignty, and access rights across structured and unstructured systems. The speakers use a garage analogy to describe how enterprises tend to accumulate vast amounts of unmanaged data, and they highlight how Veeam helps identify ROT (Redundant, Obsolete, and Trivial) data. This not only reduces storage costs but significantly mitigates risk by shrinking the attack surface, ensuring that “God mode” privileges and exposed S3 buckets are flagged before they can be exploited.

The integration between primary data insights and secondary backup data allows Veeam to offer a more sophisticated secure pillar. Emilee Tellez details how the platform now incorporates inline malware detection, YARA rule processing, and file system activity analysis to identify symptoms of encryption or anomalous behavior. This creates a feedback loop with a broad ecosystem of over 60 security partners, including Microsoft Sentinel, Palo Alto Networks, and CrowdStrike. For example, if a storage array from Pure Storage detects an anomaly, it can trigger an API call to Veeam to automatically flag specific backups as infected, preventing them from being used in a restoration and ensuring that security analysts have a correlated view of the threat across the entire infrastructure.

A major theme of the discussion is the shift from simple recovery speed to recovery confidence. The presenters argue that in a cyber-incident scenario, recovering too quickly can lead to re-infection; instead, Veeam advocates for a staged, clean recovery process. This is supported by automated readiness checks and isolated “Data Labs” where users can perform dry runs of their disaster recovery (DR) plans. These tests validate everything from RPO/RTO compliance to the specific boot order of complex applications, such as ensuring a SQL database is online before its dependent application servers. By mapping these technical events to the MITRE ATT&CK framework, Veeam provides security teams with actionable intelligence and automated playbooks, transforming backup data from a passive insurance policy into a proactive component of the security operations center (SOC).

Personnel: Emilee Tellez, Michael Cade

  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • Mar 23-Mar 24 — Tech Field Day Extra at RSAC 2026
  • Apr 8-Apr 10 — Networking Field Day 40
  • Apr 13-Apr 15 — Tech Field Day Experience at Qlik Connect 2026
  • Apr 29-Apr 30 — Security Field Day 15
  • May 6-May 8 — Mobility Field Day 14
  • May 13-May 14 — AI Field Day 8
  • Jun 2-Jun 3 — Tech Field Day Extra at Cisco Live US 2026
  • Jun 10-Jun 11 — AI Infrastructure Field Day 5

Latest Coverage

  • When All Seems Dark, Look Backward, Forward, and Up
  • VMware VCF 9.0: When All Prop Blades Work, OSS Database Performance Is Optimal
  • Hammerspace: Metadata Will Be Assimilated, and Their Uniqueness Added to AI’s Demands
  • Self-service For the Win!
  • Hammerspace – Multivendor Reality, the SSD Crisis and the power of Legacy Storage

Tech Field Day News

  • The Frontlines of Cybersecurity at Tech Field Day Extra at RSAC 2026
  • Cloud Strategy, The Future of Infrastructure, and Of Course AI at Cloud Field Day 25

Return to top of page

Copyright © 2026 · Genesis Framework · WordPress · Log in