Business Continuity / Disaster Recovery

Community information
The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
  • “Following on from David’s article in this quarters Continuity Magazine entitled “The Parry and Riposte of Procurement and BCM” Page 31. David expands on his words “ This article is meant to provoke thought and although I could, I won’t offer a potential process” In this webinar David offers practical methods to deliver resilient supply chains based on his experiences as a Head of Procurement and a Corporate Business Continuity Manager for a FTSE 100 UK based company. David is the author of Continuity Shop’s course on supply chain risk and continuity and was the UK Principal Expert attending the finalisation of the ISO 22318 technical specification on Supply Chain Continuity Management in Japan this year.

    Both Business Continuity professionals and procurement professionals would benefit from this webinar, so why not invite your procurement teams to listen in too?
  • Today a proactive approach is needed to ensure the ability to adapt to unexpected risks ever more quickly and cost-effectively, to bounce back…resilience.

    Resilience is the capability of an organization to deal with incidents that cannot be predicted and to adapt to changes over which we have no control. This presentation will explore the relationship between business continuity management and resilience and some of the ways to build a more resilient organization.
  • Hybrid IT is fast becoming the new normal across organizations in Asia-Pacific. With the increasing utilization of data centers and cloud services across the Asia Pacific region, companies have gradually updated or upgraded their existing IT systems, giving rise to the Hybrid IT environment. Besides helping enterprises to drive digital disruption, the latest Hybrid IT environment is also enhancing the customer experience and encouraging business model innovation. As a result, there is greater acceleration in the adoption of a multi-vendor multi-cloud environment or Hybrid IT.Together with the Cloud, Hybrid IT is enabling the accelerated adoption of new technologies such as Big Data, the Internet of Things and Connected Industries. 

    Mayank Kapoor, Industry Principal, ICT - Data Center and Cloud Computing, Frost & Sullivan, Asia Pacific discusses these and key insights on how these new technologies are driving industry transformation not just across the ICT industry but also the Manufacturing, Automotive and Healthcare industries.
  • Just as any organization can face risks and threats and have vulnerabilities; the same is true with members of supply chains. Individual suppliers can be at risk through a variety of events, such as fires, floods, technology failures and power outages.

    This webinar discusses risks to supply chains and will provide guidance on identifying those risks and defining strategies for mitigating them.
  • The webinar will highlight the advantages of local emergency management (EM) agencies supporting business continuity (BC) programs. The webinar will cover the importance of BC, the placement of BC as a sub-set of EM, provide an overview of the PS Prep program, and most importantly, explain why local emergency management is the most appropriate organization to provide risk awareness as well as offer first level technical support for BC programs to local businesses. My presentation will conclude by offering a road-map for local emergency managers to follow in order to prepare themselves to take on the enhanced responsibility of providing this service.
  • The biggest challenge facing many data centers today? Capacity. How to optimize what you have today. And when you need to expand, how to expand your capacity smarter.

    Learn from the experts about how Data Center Infrastructure Management (DCIM) and Prefabricated Modular Data Centers are driving best practices in how capacity is managed and optimized:

    - lower costs
    - improved efficiencies and performance
    - better IT services delivered to the business
    - accurate long-range planning

    Don;t miss out on our LIVE customer roundtable and your chance to pose questions to expert speakers from Commscope, VIRTUS and University of Montana. These enterprises are putting best practices to work today in the only place that counts – the real world.
  • Any data breach is costly and disruptive, but for pharmaceutical businesses, medical device companies, and others in the life sciences field, the need to protect and manage sensitive data (PHI, PII, and IP) make these challenges even more complex. The real world costs of compromised data can be staggering, not just in fines, but in employment and business reputation loss as well.

    Join FDA IT compliance expert Angela Bazigos, Chief Compliance Officer of Morf Media, and Performance Works on this deep-dive to learn how life sciences companies are managing their sensitive data in an environment of increasing risk and regulation. You’ll discover how to protect and manage this data to meet compliance regulations and significantly decrease the risk of data exposure, including that of highly-regulated HIPAA data.

    Register for this webinar to learn about the:
    * Increasing risk to PII, PHI, and IP data in an age of breaches and growing data dispersion
    * Changing regulatory landscape that adds greater complexity to corporate workflow
    * Best practices to monitor and respond to compliance and legal requirements for dispersed sensitive data, including mobile technologies and cloud services
    * Proactive approach to compliance to help your business avoid data risks and better address compliance and legal requirements

    Speaker Bios:
    Angela Bazigos, is the Chief Compliance Officer of Morf Media. She has 40 years of experience in Life Sciences spanning GLP, GCP, GMP, Medical Devices & 21 CFR 11 and has a patent aimed at speeding up Software Compliance.

    Ken Rosen, Co-Founder of Performance Works
    Ron Weismann, CMO of Performance Works
  • The Cloud provider market is crowded and offerings vary greatly from provider to provider. How do you ensure that a Cloud product meets the particular needs of your business? Assistant General Counsel Dennis Garcia discusses how one goes about choosing a Cloud provider and provides tips and tricks as to how to approach the move to the Cloud within your organization to ensure a successful transition.
  • Like virtualization before it, container technology will evolve from a DevOps initiative to an enterprise requirement. Docker is leading that evolution as it promises to bring greater efficiency to the data center than we ever thought possible with the virtual machine construct. However, companies implementing Docker in production will realize that persistent data storage is not easy. As a result, the development of Docker to an enterprise class solution drives new requirements on the storage infrastructure:

    1. Hyper-Scalability
    2. Advanced but Flexible Data Services
    3. Multiple Access Methods
    4. A Software Foundation

    Join Storage Switzerland and Hedvig for our live webinar and learn:

    1. What are Docker Containers and Microservices?
    2. Why Does Docker Require a New Storage Paradigm?
    3. What are the Requirements of a Docker Storage Infrastructure?
  • This webinar underlines the fundamental importance of the one of the most important phases in the BCM lifecycle – the BIA.

    Other - subsequent - phases such as selecting one or more business continuity strategies or the formulation of a BC plan, exhibit a much smaller space of choices than the BIA, which is primarily an information gathering stage, charged with understanding the business.

    Critically important information needs to be unearthed and, ideally, not one important aspect must be omitted or forgotten. This is the reason why ISO TC 292 (formerly 223), after developing ISO 22301 and ISO 22313, has embarked on developing a standard on the BIA: ISO 22317. It is being presented in another contribution at this conference.

    This webinar also focuses on a visualization and presentation method newly applied to the BIA process - in order to better understand a company’s processes, resources and their interdependencies.
  • Up until the past year or two, High-Performance Compute (HPC) environments and the enterprise data center have been separate domains. But now the data-intensive demands of analytics, migrations to cloud infrastructures and ever growing numbers of users looking to store large quantities of data are making the enterprise data center demand high-performance and scalability previously common only in HPC and Web provider environments. Not only are companies implementing HPC specific jobs like Big Data Analytics and geographic data distribution but virtualized and database environments are being challenged to increase density to support more users at lower operational costs. Should the traditional data center look at HPC storage solutions to meet these demands?

    Join Storage Switzerland and Data Direct Networks (DDN) to learn five reasons HPC storage is ideal for enterprises. In this webinar we will compare the needs of the enterprise data center to the capabilities of HPC storage to see if HPC is the ideal fit for the enterprise.
  • Pandemics occur every twenty to forty years. This webinar will provide attendees with an understanding of the threat and associated issues that are synonymous with pandemics. It will take account of both the business and human aspects of this threat while not just considering businesses in isolation but as part of a greater supply chain.

    The session will include:

    •Definition of what a pandemic is and why it is so dangerous
    •Brief history of pandemics
    •Review what contagions are currently on the radar which could develop into a pandemic
    •Overview of SARS and the resulting economic tsunami that it caused (cost the global economy an estimated $50 billion)
    •Preparation within our critical national infrastructures
    •Potential social effects and the knock-on impact on businesses
    •Considering mitigation and contingency options
    •Human Resource Management issues arising
  • Join Cloud and security expert Jerry Wertelecky, as he explains how to secure your network in an SDN framework. He will explore the new risks and challenges for SDN technology.
  • We live in a world where cyber attacks are no longer a question of if, but when. This sessions starts with a discussion around how attackers have evolved their techniques using Advanced Evasion methodologies bypassing traditional security layers such as Network-based Firewalls and signature-based Intrusion Detection. The rise of targeted Advanced Persistent Threats (APTs) has finally enabled companies to understand that traditional security solutions are no longer enough. During the session, we will cover the rise of Advanced Threat Protection solutions, where they fit in the Network, and how companies should use correlation and integration of Endpoints, Networks, Incident Response and Simulation to protect against APTs. Finally, we will discuss how you can successfully utilise Big Data Analytics to go beyond simply using a log correlation solution and proactively get ahead of attacks (or BANG) before they occur.
  • In advance of October's Executive Women's Forum, Security Researcher Lysa Myers will look at the evolving landscape for women in IT, risk management, information security and other privacy industries.
  • Inadequate security and dedicated cyber attackers have led enterprise data breaches to increase at an alarming pace. Staggering numbers of affected customers - and financial losses - are sending shock waves through the business world, and creating a sense of urgency around identifying solutions. Finding a way to ward off cyber intruders has become a critical challenge.

    There is a need to create value around company data. One way to do this is to ensure that the workforce knows and understands the threats that are out there and the measures that are in place to protect against them. Data security is not one size fits all, nor is a data security communication plan. Finding the ideal fit for any company may take trial and error, but an educated and mindful workforce will serve to support the mission of IT security teams tasked with keeping confidential information secure. Join this educational panel webinar to hear experts discuss how to realize data security potential across an enterprise.
  • SymantecVeritas, azienda Leader nella protezione e tracciabilità delle informazioni e VmWare, azienda leader nella virtualizzazione, ti spiegano COME le piccole/medie aziende possano abbracciare la virtualizzazione delle infrastrutture mettendo al sicuro i propri dati ed ottimizzando la propria gestione delle operations.
  • One of the critical success factors for any BCM programme is competent people to undertake all the BC roles that the programme requires. This webinar will explain how to plan a campaign of training and awareness to ensure that everyone who has a role in the programme knows what their role is and has the appropriate knowledge and skills to undertake their role.
  • Backup, unless you are focused on it, is hard. Enterprises of all sizes are looking to outsource the problem child to someone that can babysit it. MSPs are in an excellent position to not only assist organizations but grow their businesses. But selecting a cloud backup solution on which to standardize on is a critical process for MSP decision makers. There are unique business and technology considerations to understand before selecting a product. In this webinar Storage Switzerland and Asigra will walk MSP executives through those decisions.

    1.The Importance of Selecting a Comprehensive Product to Lower TCO
    2.The Importance of Starting Fast, both as a business and technically
    3.The Importance of Adding Value, to achieve Trusted Advisor status

    The live event is on September 16th at 1 pm ET and 10 AM PT. It will be available on-demand to registrants anytime after that. Pre-register today and receive Storage Switzerland’s latest white paper “Technical Considerations for adding a Cloud Backup Service to your MSP Portfolio” and our product analysis on Asigra’s latest product “Asigra Converged Data Protection Appliance for Managed Service Providers”.
  • Let’s face it; embracing new storage technologies, capabilities, and upgrading to new hardware often results in added complexity and costs. The reality is that when IT equipment, platforms, and applications do not integrate with one another, the resulting “sprawl” of storage islands and silos on disparate systems can be costly, risky, disruptive, and time-consuming. But it does not have to be that way.
  • Autrefois, éviter les infiltrations était facile.

    Nous devons devenir plus résilients, en commençant par identifier et protéger les données sensibles pour que les attaquants ne puissent pas les supprimer ni y accéder. Ensuite, nous devons mobiliser une intelligence avancée pour accélérer la détection des violations et la mise en œuvre de contre-mesures.

    Participez à la session de notre série de webcasts. Découvrez comment, grâce aux technologies ATP, votre entreprise pourra réagir rapidement en cas de violation

    Inscrivez-vous ici

    Webcast 2 - Advanced Threat Protection : j’ai subi une violation de sécurité, que s’est-il passé ? - https://www.brighttalk.com/webcast/5691/170173

    Webcast 3 - Advanced Threat Protection : reconstituer le cheminement d’une attaque et en tirer les leçons -
    https://www.brighttalk.com/webcast/5691/170175
  • How best to prevent attack, and keep bad stuff out

    But this is no longer the case. Firstly, the business perimeter is dissolving under pressure from mobile adoption and cloud-services. Secondly, threats continually evolve and there has been a five-fold increase in highly advanced and stealthy targeted attacks since 2011. Business has to recognize that it’s no longer possible to keep everything out – the posture has to change, business must become cyber-resilient to attack and make use of advanced intelligence in order to react faster when a breach does occur. Remediating the breach, and at the same time protecting valuable data on the inside; ensuring attackers cannot remove or access it.

    Join our Advanced Threat Protection (ATP) webcast series and over the three webcasts hear from Symantec about how using ATP technologies can help to reduce this noise, and ensure that business is ready to react fast if, or when, a breach occurs.

    Webcast 2 - I’ve been breached, what happened? What happens when bad stuff gets in, how to react fast -
    https://www.brighttalk.com/webcast/5691/170133

    Webcast 3 - Piecing back the jigsaw, what can I learn? Understanding what happened, and getting back on track fast-
    https://www.brighttalk.com/webcast/5691/170143
  • Tenere lontani i “pericoli” era semplice, in passato.

    Ora non è più così. In primo luogo, perché il perimetro aziendale non esiste quasi più da quando ci sono i dispositivi mobili e il cloud. E in secondo luogo, perché le minacce sono in continua evoluzione e dal 2011 gli attacchi mirati di tipo avanzato e in modalità stealth sono aumentati di ben cinque volte.

    Partecipa al primo Webcast di una serie in tre parti. Scopri in che modo le tecnologie ATP possono aiutare la tua azienda a reagire rapidamente se e quando si verifica una violazione.