Hi [[ session.user.profile.firstName ]]

Business Continuity and Disaster Recovery

  • Date
  • Rating
  • Views
  • Cyber Defense Through Fault-Tolerant Security Architecture Cyber Defense Through Fault-Tolerant Security Architecture James Chillingworth, Founder of The Consulting Practice Recorded: Nov 23 2016 28 mins
    Is your security architecture up to date and able to defend against the latest cyber attacks? Every technology vendor will likely tell you that they have the most solid infrastructure, and that their roadmap is the one to follow. You may want to consider a fault-tolerant approach with security, as it can be more comprehensive than selecting one particular vendor for a specific requirement.

    Fault-Tolerance means that you assume that a particular solution will fail, but are theoretically protected as another solution can be there if this failure happens.

    Join this presentation and learn how fault tolerance can be deployed against breach scenarios and how it helps improve cybersecurity in 2017.
  • Don't Be the Next Big Headline - Proactive Steps and BCDR Planning Don't Be the Next Big Headline - Proactive Steps and BCDR Planning Brenda Piazza, Director of Cybersecurity Management at CBIZ MHM, LLC Recorded: Nov 18 2016 40 mins
    In light of recent data breaches and the increasing cost of a breach, it is clear why good IT and cybersecurity management is key to your business, especially when it comes to Business Continuity and Disaster Recovery planning. Join this presentation and learn about the human error in breaches, as well as what managers should know about their IT environment. Learn the steps you need to take today to ensure the right BCDR plans are in place before a disaster strikes.
  • Virtualization: The Key to Approachable Disaster Recovery Virtualization: The Key to Approachable Disaster Recovery Jim Hannan, Principal Architect & Chris Vacanti, Senior Consultant, House of Brick Technologies Recorded: Oct 19 2016 58 mins
    Come prepared to look at disaster recovery planning with a 360 degree view for the enterprise and SMB space, and walk away with technical ideas you can begin to implement immediately. During this presentation, we will discuss disaster recovery planning considerations and partnerships. We will also walk through technical solutions that provide a way to use virtualization and storage strategies for an approachable DR solution.
  • Protect Your Applications and Data with Fault Tolerant Software Protect Your Applications and Data with Fault Tolerant Software James Chillingworth, Founder (CEO), The Consulting Practice Inc. Recorded: Aug 18 2016 27 mins
    Learn how your organization can achieve better data protection through leveraging fault-tolerant technology. Cybersecurity expert James Chillingworth will review how applying hardware architecture concepts, in addition to other abstractions can form the framework for developing software that becomes more robust, reliable, expandable and secure. By implementing this, organizations can better protect their applications, data, databases, and improve security, operability, code quality and redundancy.
  • Ransomware Realities for Healthcare: Cloud Backup and Security Answers Ransomware Realities for Healthcare: Cloud Backup and Security Answers Tim Vogel, Co-Founder and CEO, Xtium & Kevin Lancaster, CEO ID Agent Recorded: Aug 18 2016 49 mins
    With the healthcare industry experiencing a dramatic increase in the volume of successful ransomware attacks, it is critical that organizations upgrade their security policies and approach.

    This means understanding the evolving cyberattack landscape and developing effective strategies to protect the integrity of systems, applications, and data. A critical aspect of that strategy is proactively identifying employee email credentials that have been compromised. In our 2016 benchmark study of healthcare firms, Xtium and ID Agent recently found that 65% of firms analyzed have employees with visibly compromised accounts. These findings illustrate the need for ongoing monitoring as well as 100% reliable and responsive business continuity solutions.

    The urgency stems from the fact that stolen health records are worth more than 10 times the value of stolen credit card numbers. The FBI recommends combating these cyber-threats by establishing a solid business continuity plan which includes the regular creation of secure, isolated data backups. 

    This presentation will a) explore the common misperceptions and security holes that can lead to ransomware vulnerability, b) discuss the study results and the measurable ongoing threat represented by compromised email accounts, c) compare the various alternatives for responding to cyberattacks, d) explain the pros and cons of cloud-based security and backup strategies, and e) provide real-world case study examples of how recent ransomware attacks have been quickly and successfully resolved.
  • Redefinition of Business Continuity Strategies using Cloud Native Enterprise Arc Redefinition of Business Continuity Strategies using Cloud Native Enterprise Arc Frank Stienhans, CTO at Ocean9 Recorded: Aug 18 2016 49 mins
    Both production and non-production landscapes are massively effected by the rewritten laws of physics in the cloud.

    One opportunity of Cloud Native Enterprise Architectures is to redefine the approaches to Business Continuity and Disaster Recovery.

    Using SAP workloads on AWS as example we will show how and why enterprises run different than before and how Disaster Recovery needs accelerate all in migrations to the cloud.
  • Monitor with Discipline – Protect Your Data Protocol Monitor with Discipline – Protect Your Data Protocol Kong Yang, Head Geek of Virtualization & Cloud Practice, SolarWinds Recorded: Aug 18 2016 36 mins
    Data is the new currency. It is the gold waiting to be mined, the oil waiting to be refined, and the resource waiting to be taken for ransom or stolen for its intellectual property. Wait, that last piece didn’t rhyme. And that lack of rhythm and rhyme is why data recovery is evolving from naturally occurring events i.e. system failures and natural disasters to unleashed beasts such as social-engineered phishing attacks and schemes designed to take your data hostage.
    In this session, we’ll discuss how to monitor with discipline in order to protect your data protocol with effective and efficient process management.
    · What is monitoring with discipline?
    · How do I optimize my backup and recovery process?
    · How can I extend my current data recovery protocol to encompass ransomware protection?
  • Aligning IT Disaster Recovery with Business Requirements Aligning IT Disaster Recovery with Business Requirements Dustin Mackie, Managing Consultant at Avalution Consulting Recorded: Aug 17 2016 42 mins
    Although most organizations have been performing elements of IT disaster recovery for years to decades, it’s still common for organizations to struggle to ensure alignment between IT capabilities and business application recovery needs. Even if IT exercises run flawlessly and meet planned recovery capabilities, there often remains gaps between the business requests and IT committed capabilities. This can inhibit organizations from having effective (yet reasonable) strategies in place that meet all stakeholder expectations.

    This presentation will explore potential methods organizations can execute to help all groups in the disaster recovery process understand each other’s intent, priorities, dependencies, needs, and considerations, as well as the impacts of system downtime. These methods seek to truly synchronize business continuity and IT disaster recovery by enabling ongoing discussion, understanding and insight, continued coordination, and communication. Taking such measures will ensure an effective IT disaster recovery program that meets the expectations of all stakeholders.
  • Data Protection in the Era of Hyperconvergence Data Protection in the Era of Hyperconvergence Jim Whalen, Taneja Group; Patrick Rogers, Cohesity; Jesse St Laurent, SimpliVity; Joe Noonan, Unitrends; Rick Vanover, Veeam Recorded: Aug 17 2016 61 mins
    Hyperconvergence is a rapidly growing and evolving force in the IT infrastructure space. Emerging from the factory pre-configured racking programs of the big IT equipment suppliers, it quickly morphed into a variety of VM-centric architectures where compute, storage and networking (and more) are all integrated below the hypervisor and provide a unified platform to run virtual workloads on. The questions surrounding Data Protection are many: Is a DP mechanism even needed in a distributed cluster architecture that hyperconverged platforms typically drive? What’s the role of traditional backup software and appliances? Is physical server backup still important? What’s the optimum solution for backing up a hyperconverged platform? Is there an optimum solution?

    In this presentation, some of today’s leading vendors will give their take on what the intersection of Hyperconvergence and Data Protection means for the end user.

    PANELISTS:
    * Cohesity - Patrick Rogers, VP Marketing & Product Management
    * SimpliVity - Jesse St Laurent, VP of Product Strategy
    * Unitrends - Joe Noonan, Director, Software Product Management
    * Veeam - Rick Vanover, Director of Technical Product Marketing
  • Database Backup and Recovery Best Practices Database Backup and Recovery Best Practices Manjot Singh, Data & Infrastructure Architect at Percona Recorded: Aug 10 2016 31 mins
    In the case of a failure, do you know how long it will take to restore your database? Do you know how old the backup will be? In this presentation, we will cover the basics of best practices for backup, restoration and business continuity. Don’t put your company on the line due to bad data retention and backup policies.