Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Cómo recuperar el control de sus datos móviles Cómo recuperar el control de sus datos móviles David Sanz - EMEA Endpoint & Mobile Competency Lead Feb 24 2017 11:30 am UTC 60 mins
    Los puestos de trabajo y los dispositivos móviles son habitualmente los aspectos más olvidados en la estrategia de gestión de datos empresarial. Sin embargo, la información presente en ordenadores portátiles, de escritorio y dispositivos móviles es uno de los activos de mayor valor para la organización, pese a que potencialmente se encuentra en máximo riesgo. De acuerdo con IDC hay alrededor de 1.300 millones de trabajadores móviles hoy en día, pero tan solo la mitad de las empresas utiliza algún tipo de backup para puestos de trabajo.

    La fuerza de trabajo móvil es cada vez mayor. Dichos usuarios manejan información fuera del dominio tradicional del departamento de TI y emplean soluciones de colaboración no corporativas. El coste potencial y el riesgo asociados al cumplimiento de la normativa y al eDiscovery, la necesidad de proteger el puesto de trabajo y de aportar soluciones de colaboración corporativas están claros y se encuentran en un punto de inflexión crucial.

    Acompáñenos en este webinar, donde analizaremos:
    - Cómo recuperar el control sobre lo que ocurre en los dispositivos móviles de los trabajadores
    - Cómo mitigar los riesgos asociados con los ataques cada vez más frecuentes de ransomware
    - Cómo aumentar la productividad con una plataforma segura para la compartición de archivos
  • [VIDEO] Cyber Security Lessons for the Financial Sector [VIDEO] Cyber Security Lessons for the Financial Sector Josh Downs, Community Manager, BrightTALK & Ian Glover, President, CREST Feb 24 2017 2:00 pm UTC 45 mins
    BrightTALK will be broadcasting its in-depth interview with CREST President Ian Glover and Nettitude MD Rowland Johnson jointly in conversation.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • [VIDEO] The Influence of Machine Learning and AI on Cyber Security [VIDEO] The Influence of Machine Learning and AI on Cyber Security Josh Downs, Community Manager, BrightTALK & Troels Oerting, CISO, Barclays Feb 28 2017 2:00 pm UTC 45 mins
    BrightTALK will be broadcasting its in-depth interview with Troels Oerting, CISO of Barclays and Josh Downs, Community Manager of the BrightTALK Information Security Community.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • Microsoft CEO: Digital Transformation & Changing Landscape in the United States Microsoft CEO: Digital Transformation & Changing Landscape in the United States Satya Nadella, CEO, Microsoft; Curt Kolcun, VP, US Public Sector Feb 28 2017 5:00 pm UTC 15 mins
    Microsoft’s CEO, Satya Nadella sits down with Curt Kolcun, VP US public Sector about digital transformation and the changing landscape in the United States.
  • A View of the World's Largest & Fastest Growing Data Center Spot A View of the World's Largest & Fastest Growing Data Center Spot Kelly Morgan 451 Research and Mark Kidd Iron Mountain Feb 28 2017 6:00 pm UTC 60 mins
    A View of the World's Largest & Fastest Growing Data Center Spot and why you should be there

    The Northern Virginia market, which includes multiple locations in/around Washington DC, continues to be one of the largest and fastest growing datacenter hot spots in the world and top market for cloud providers. While much has been said about the area, please join us to discuss the latest in: what makes the market special, why so many firms want datacenter space there, how the market is evolving, and which locations to consider when thinking about a deployment in the area.

    Please join us for a webinar with Kelly Morgan, Vice President at 451 Research and Mark Kidd, Senior Vice President and General Manager for Iron Mountain Data Centers, for a discussion on the Northern Virginia market and Iron Mountain’s approach to the market.
  • Key Steps to Implement & Maintain PCI DSS Compliance in 2017 Key Steps to Implement & Maintain PCI DSS Compliance in 2017 Dr. Branden Williams; Smrithi Konanur, HPE Security; Kevin Eberman, Mineraltree; Asma Zubair, WhiteHat Security Feb 28 2017 6:00 pm UTC 60 mins
    In today’s digital landscape, it’s much easier for criminals to access sensitive payment card data, not only gaining direct access to a consumer’s available funds, but also their personal identity. With cyber attacks becoming much more advanced, the PCI DSS standard has been forced to adapt to address these new threats.

    However, PCI compliance is something that any organization can successfully achieve. The requirements of PCI DSS are clear, but it takes work to accomplish compliance across an organization. On this webinar our panel will discuss some best practices, and solutions that provides your business with an easy, cost effective and highly automated way to achieve compliance with PCI DSS in 2017.
  • Getting Started with Hyperconverged Infrastructure Getting Started with Hyperconverged Infrastructure Sushant Rao, Sr. Director Product & Solutions Marketing, DataCore Software Feb 28 2017 7:00 pm UTC 45 mins
    Hyperconverged infrastructure (HCI) is a huge trend in data centers. Analysts predict HCI - along with other Software-defined Storage technologies - will radically change current storage architectures.

    But, is HCI right for you? What use cases make sense for HCI?

    Join us as we will discuss how to get started with HCI. Topics that will be covered in this webinar include:

    - Use cases suitable for HCI
    - Criteria to evaluate HCI products
    - Pros and cons of different vendors’ HCI
    - Avoiding the missteps of early adopters
  • How to Prevent Ransomware Infections How to Prevent Ransomware Infections Brook Chelmo Feb 28 2017 7:00 pm UTC 60 mins
    With the growth of ransomware families by 600% in 2016, there is no slowdown in sight for one of the worst malware variants in history.

    SonicWall’s security researcher and advocate, Brook Chelmo, will talk about the impact of ransomware as well as other advanced persistent threats such as zero-day attacks. SonicWall has the expertise and resources to help you stay ahead of developing threats.

    Learn how to:
    •Stay safe from ransomware and other advanced attacks
    •Practice good security hygiene
    •Use trusted automated tools to protect your network and endpoints
  • [VIDEO] The Rise of the Underground Darknet Criminal Economy [VIDEO] The Rise of the Underground Darknet Criminal Economy Josh Downs, Community Manager, BrightTALK & Rob Wainwright, Director, Europol Mar 1 2017 2:00 pm UTC 45 mins
    BrightTALK will be broadcasting its in-depth interview with Europol Director Rob Wainwright and Josh Downs, Information Security Community Manager at BrightTALK.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • Microsoft CISO: Cybersecurity in Action Microsoft CISO: Cybersecurity in Action Bret Arsenault, Chief Information Security Officer, Microsoft Mar 1 2017 4:00 pm UTC 30 mins
    Cybersecurity continues to be a top priority; leaders must constantly judge how to balance business enablement and cyber protection priorities as they support the digital transformation of their organizations.

    Join Microsoft's CISO, Bret Arsenault, as he discusses examples of this balancing act in action and where Microsoft can help to improve your security posture.
  • Next Generation: VPN vs. Virtual Cloud Network (VCN) Next Generation: VPN vs. Virtual Cloud Network (VCN) Bryan Embrey, Product Marketing Manager, Cradlepoint Mar 1 2017 5:00 pm UTC 60 mins
    There’s no way around it: Setting up and maintaining traditional VPNs for remote access requires extensive time, energy and resources. Configuring, managing, and troubleshooting devices and applications located at the data center in headquarters and in each end device is one of the most complex and laborious aspects of network administration — especially with increased workforce mobility and IoT.

    With a next-generation Virtual Cloud Network (VCN), configuration, management, and security policies are streamlined and handled in the cloud.  This enables rapid deployment, reduces operational expenses and completely integrates with your existing infrastructure.

    At 9am PT / 12pm ET on March 1 2017, join Cradlepoint’s Bryan Embrey to explore how resilient, redundant, secure, and scalable VCNs leverage software-defined networking (SDN) and network function virtualization technologies to reduce complexity, hardware, and IT man-hours.
  • [VIDEO] Cyber Opportunities for the New US Political Administration in 2017 [VIDEO] Cyber Opportunities for the New US Political Administration in 2017 Josh Downs, Community Manager, BrightTALK & Simon Crosby, Co-Founder & CTO, Bromium Mar 2 2017 4:00 pm UTC 45 mins
    BrightTALK will be broadcasting its in-depth interview with Bromium's Co-Founder and CTO Simon Crosby in conversation with Josh Downs, Community Manager, BrightTALK.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • Stroke of genius; The only known way to fully protect against keystroke loggers Stroke of genius; The only known way to fully protect against keystroke loggers Peter Ridgley, President, Verterim inc. CJ Brunet, President, Advanced Cyber Security Mar 2 2017 5:00 pm UTC 60 mins
    According to recent reports, the majority of advanced cyber attacks start with stolen credentials obtained by keyloggers. Join Peter Ridgley, President of Verterim and CJ Brunet, President of Advanced Cyber Security on March 2nd at 12 pm est. for an EndpointLock demonstration and discussion. Learn how this solution is providing encryption at the keystroke level and how this will benefit your RSA Archer controls environment to address PCI, Healthcare, Financial Services and other regulatory requirements.
  • How to Use Cloud Storage to Overcome The 3 Challenges to ACTIVE Data Archiving How to Use Cloud Storage to Overcome The 3 Challenges to ACTIVE Data Archiving Storage Switzerland, Panzura Mar 2 2017 6:00 pm UTC 60 mins
    Join Storage Switzerland and Panzura in a live webinar on March 2nd as we cover why you should really want to aggressively archive data, what the challenges are to an aggressive strategy and, most importantly, how to use cloud storage to overcome them.
  • CTO PoV: Enterprise Networks CTO PoV: Enterprise Networks Khalid Raza, CTO & Co-Founder, Viptela Mar 2 2017 6:00 pm UTC 45 mins
    Rapidly changing enterprise application requirements, the cloud, and mobile computing are placing stress on traditional wide area networks (WANs). Enterprises are being challenged to rethink network architectures to meet present and future business requirements.

    Khalid Raza, CTO and Co-Founder at Viptela, will discuss why current WAN infrastructures are not designed to support new enterprise traffic patterns, and how emerging approaches can help organizations adapt to these changes.

    In this webinar, we will cover:

    - Key applications molding enterprise network requirements
    - Impact on current WAN architectures & shift in present and future business needs
    - How enterprise network teams and service providers can adapt the traditional WAN to support new traffic patterns
  • Access control for Subversion and Git Access control for Subversion and Git Doug Robinson Mar 2 2017 6:00 pm UTC 60 mins
    Enterprise development teams are frequently working with multiple types of SCM repositories, such as Git and Subversion. Git does a solid job handling source code; Subversion does a solid job handling binary artifacts and is likely where many older projects' full histories reside. Managing both Subversion and Git repositories together is quite a challenge. Join us to learn how to make it easy.
  • Going Beyond with Arcserve UDP Hardware Snapshots Going Beyond with Arcserve UDP Hardware Snapshots Gary Sussman, Kervin Myrtil Mar 2 2017 7:00 pm UTC 60 mins
    Software-based snapshots for VMware & Hyper-V host servers can significantly burden virtual machine performance. The solution, utilize Arcserve UDP hardware storage snapshot copies for high-performance backup without sacrificing virtual machine performance.
  • Disaster Recovery Best Practices: From Cyberattacks to Natural Disasters Disaster Recovery Best Practices: From Cyberattacks to Natural Disasters Dave Deibert, President SMB TechFest, CIO IT Innovators, President IAMCP (SoCal), VP SMB Technology Network Mar 2 2017 7:00 pm UTC 60 mins
    Technology and preparation go hand-in-hand for disaster recovery and business continuity.

    What happens to your business if a natural disaster strikes?

    Will your business be able to survive a fire, or a security breach? It's time to learn the nuances of disaster recovery and why you as a business owner should take simple steps to ensure your operation will be okay when the unexpected happens. Get ready to learn through several case studies of businesses that have both survived and closed their doors due to natural disasters.

    Join this webcast to:

    - Learn how Innovation and Technology theory is being used to mitigate business disruption
    - Find out how businesses are protecting themselves
    - Discover why businesses embrace technology and what you can do to get started
    - Review case studies on several organizations that have thrived after adopting disaster recovery solutions
  • Operational Excellence: The Key to Safeguarding Your IT Infrastructure Operational Excellence: The Key to Safeguarding Your IT Infrastructure Dan Thompson Senior Research Analyst 451 Research and Kelly Sullivan, VP Global Data Center Operations at CenturyLink Mar 2 2017 7:00 pm UTC 60 mins
    Data center uptime is more critical than ever as more and more business processes are digitized. Having a sound foundation starts with having a solid and reliable data center in which to deploy your IT infrastructure. The data shows that how a data center is run and managed is the single biggest contributor to uptime. Join 451 Research Senior Analyst, Dan Thompson, and Kelly Sullivan, VP Global Data Center Operations at CenturyLink for a dialog on how operational excellence is put into practice and has become a core of the organizational culture at CenturyLink. Hear real-world experience and insight derived from managing a global fleet of 57 data centers and how the Uptime Institute Management and Operations Stamp of Approval program helped them raise their game through a regiment of continual improvement.
  • Cloud-Enabled: The Future of Endpoint Security Cloud-Enabled: The Future of Endpoint Security Jackie Castelli CrowdStrike, Sr. Product Manager Mar 3 2017 4:00 pm UTC 60 mins
    As the cost and complexity of deploying and maintaining on-premises security continues to rise, many endpoint security providers have embraced the cloud as the ideal way to deliver their solutions. Yet, incorporating cloud services into legacy architectures limits their ability to fully engage the tremendous power the cloud offers.

    CrowdStrike Falcon recognized the value of cloud-delivery from the beginning, developing architecture built from the ground up to take full advantage of the cloud. CrowdStrike’s cloud-powered endpoint security not only ensures rapid deployment and infinite scalability, it increases your security posture by enabling real-time advanced threat protection across even the largest, distributed enterprises.

    In this CrowdCast, Jackie Castelli, Sr. Product Manager will discuss:

    • The advantages of endpoint protection purpose-built for the cloud – why it allows you to take full advantage of the cloud’s power

    • The common concerns organizations face when evaluating cloud-based endpoint security - can privacy and control be assured?

    • Real-world examples demonstrating the unique advantages offered by CrowdStrike Falcon’s innovative cloud-powered platform


    About the Speaker:

    Jackie Castelli
    CrowdStrike, Sr. Product Manager

    Jackie Castelli, CISSP, has over 20 years of experience in the cybersecurity industry. She has gained practical security experience in her roles as a security architect and data center manager. As a senior product marketing manager for CrowdStrike, she is responsible for educating the market about Falcon Host, CrowdStrike’s next-generation endpoint protection. Prior to CrowdStrike, Jackie worked in technical roles in pre-sales, IT and support. Jackie frequently speaks on cyber security topics at executive briefings and industry events.
  • Microsoft Platform Security: Detecting Threats & Preventing Breaches Microsoft Platform Security: Detecting Threats & Preventing Breaches Paul Edlund, Technical Solutions Professional, Microsoft Mar 3 2017 4:00 pm UTC 30 mins
    We built security into Microsoft products and services from the start. That’s how we deliver a comprehensive, agile platform to better protect your endpoints, move faster to detect cybersecurity threats, and respond to security breaches across the smallest and largest of organizations.

    Join this session to learn more about:
    - Preventing identity compromise
    - Securing apps and data
    - Expanding device controls
    - Safeguarding your cloud infrastructure
  • [VIDEO] The Crucial Steps to Prepare for GDPR in 2018 [VIDEO] The Crucial Steps to Prepare for GDPR in 2018 Josh Downs, Community Manager, BrightTALK & John Elliott, Payments & Privacy Expert Mar 7 2017 2:00 pm UTC 45 mins
    BrightTALK will be broadcasting its in-depth interview with easyJet Head of Payment Security John Elliott in conversation with BrightTALK Information Security Community Manager.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • Why Storage Vendors Are Feeling The Squeeze Why Storage Vendors Are Feeling The Squeeze Peter McCallum & Gavin McLaughlin Mar 7 2017 3:00 pm UTC 30 mins
    The storage industry is going through a welcome change. With the increased commoditization of storage hardware, coupled with the increased pricing competitiveness of public cloud services, many storage buyers are now realizing the flexibility and new options available to them. This webcast with Peter McCallum, VP Datacenter Solution Architecture, joined by Gavin McLaughlin, a 30 year veteran of the storage industry, discusses the change in the industry and provides recommendations on how storage buyers can take advantage of this new world.
  • The State of National Security & The Evolving IT Threatscape The State of National Security & The Evolving IT Threatscape Iveta Topalova, WW Public Sector Architect Manager Mar 7 2017 4:00 pm UTC 30 mins
    National security agencies face significant challenges today. From new and unknown threats, to operating tempo and budget challenges, having the right technology in place is key to ensuring security in an increasingly evolving threatscape.

    In this webcast, we begin with the end in mind: the need for the optimization of data insights through analytics, the alignment of platforms and devices for enhanced security and readiness, and the enablement of command and operations within an agile, data-driven national security ecosystem.

    Join this discussion to:
    - Discuss current trends that are presenting significant challenges to protecting US citizens from terrorism and crime
    - See how advancements in technology are empowering national security and federal law enforcement agencies to meet these challenges
    - Learn how agencies are implementing a digital transformation strategy to enhance how they better protect citizens
  • Scality | Quantum Webinar Scality | Quantum Webinar Phillip Tribble - Scality & Greg Holick - Quantum Mar 7 2017 6:00 pm UTC 60 mins
    Organizations face complexities when it comes to using and managing archived storage on tape or in the cloud. Common struggles include balancing growth, costs, capacity, and data retrieval. One particularly effective way to address these challenges is to tier data from existing storage devices to object storage solutions like the Scality RING.