The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
Join Alex McDonald, SNIA Cloud Storage Initiative Chair and a member of the office of the CTO of NetApp and discover how you can effectively deliver Cloud Architectures within your, or any, infrastructure.
Cisco introduces VMDC DCI solution which provides validated design to ensure high availability and performance for applications across Metro and Geo data centers. This solution unlocks Business continuity and stateful workload mobility which is top of mind for both public and private cloud providers to connect multiple data centers to support Business Critical operations.
Android smartphones provide amazing connectivity and convenience but this accessibility and customization but can come at the price of personal security. Mobile security software can provide the safeguards you need for your device and information.
March Madness can stress your network and create opportunities for someone to exploit your vulnerabilities. Being aware of the threats can help prepare for them to keep your network sane and secure.
What You Will Learn:
1. you can achieve a deeper level of security by being aware what is happening on your network.
2. be aware of how you access the games, use secure connections
3. Keeping your applications and firewall up to date can help you keep secure.
ESET security researcher Lysa Myers reports on developments in healthcare IT system security that she observed attending the recent HIMSS conference in Orlando. Find out what is being done to better protect patient data privacy.
IBM InfoSphere Information Server is a market-leading data integration and governance platform. It provides a set of capabilities to build confidence in your data by helping you understand, cleanse, transform and deliver trusted information to critical business initiatives, such as big data, master data management and point-of-impact analytics. Information Server provides comprehensive connectivity to DB2 (including DPF and BLU Acceleration) and it can also push computation to DB2 when appropriate. By using Information Server with DB2, you get its best-of-breed capabilities to integrate DB2 data and manage its metadata as well.
Join us for this DB2 Tech Talk to learn how using these products together can help you deliver trusted information to your business, support big data initiatives, and more.
This 30-minute webinar will discuss how the Sayers Cloud can be an off-premise extension of your existing IT infrastructure. Now in its second year, Sayers Cloud has proven success in helping our customers scale IT services flexibly and cost-effectively, whether for production compute, test/dev or disaster recovery needs.
One of the seemingly endless tasks of today’s IT professional is finding more ways to squeeze costs out of the data center environment. With data growth soaring across all industries, it is not surprising that storage is often at the top of the list for shedding costs. Join Storage Switzerland senior analysts, Eric Slack and Colm Keegan for a webinar on February 26th which details how organizations can reign in their data center storage expenditures while meeting business data retention objectives.
In today’s post-breach world, organizations need technology aligned with new strategies to accelerate and automate incident response and breach investigation workflows to reduce mean time to resolution. In this webcast, we will demonstrate the need for on-demand access to endpoint for the purposes of understanding what happened after the attackers got in, and what — if anything — was taken as a result.
You will learn how together, McAfee and Guidance Software help:
•Reduce time to deploy incident response capabilities
•Streamline the response and investigation process
•Ensure a complete understanding of breach impact
•Manage digital investigations on assets managed by McAfee ePO
This webcast will focus on the results of a study Emulex commissioned from Forrester Consulting that evaluates the range of issues that enterprise IT staffs are facing while managing the performance of their business-critical application and business services. The results of the study, entitled “Improving Incident Response: Building a More Efficient IT Infrastructure,” indicate that a lack of network visibility negatively impacts the ability of IT staff to identify and resolve application performance issues, which leads to substantial business productivity loss.
45% of data breaches reported in 2013 were from the medical and healthcare sector. ESET researcher Lysa Myers looks at information security in the healthcare industry and how we can do better when it comes to protecting the privacy of patient data.
Instant recovery of critical applications is an imperative in a healthcare setting, and is required as part of HIPAA and Joint Commission standards. Join this 15 minute webinar and learn how Quorum can help you improve patient outcomes through an "always on" IT environment.
SAVE TIME, SAVE DOWNTIME. REWIND THE NETWORK. FIND THE ISSUE. FIX IT.
By integrating Splunk ‘s advanced monitoring and alerting and Emulex’s Endace network recording and visualisation solutions at an ‘event’ level, you can complete the detection and investigation cycle quickly. This identifies the root cause of network security and operational issues and contains network security and operations issues more effectively while reducing the impact on users, detect false positives more quickly and better ‘tunes’ detection systems.
In this webinar, you will:
•Understand how packet capture and analysis provides evidence and actionable insight that help you make effective interventions
•Learn how to integrate Splunk and Endace, simplify operations and reduce the time taken to find “packets of interest” by more than 50 percent*
•Hear how finance software company IRESS deployed tighten network monitoring, while also reducing associated operationa expenditures (OPEX)
•Connect with our experts using our interactive Q&A tool
Want to take advantage of the cloud for collaboration but feel you will lose control of your sensitive data? Join us for a joint webinar with Microsoft, Synergy Advisors, and Thales to learn how you can deploy a unique solution that enforces strict security policies on your data assets and achieves persistent information protection. Learn how to:
• Deploy new features and capabilities of Microsoft Rights Management Services (RMS)
• Protect your sensitive files in any format and in any device, including iOS and Android
• Share protected information with anyone, inside and outside your own organization
You will also learn how the unique bring your own key (BYOK) capability enables you to generate and safeguard your own RMS private key within a Thales hardware security module (HSM), ensuring you that Microsoft operators cannot see or leak the keys during import or use.
Disk Backup Appliances have traditionally featured deduplication as the primary selling point. While efficiently storing protected data is critical, the ability to scale your systems to meet rampant data growth – while maintaining backup windows and meeting recovery objectives – separates the innovators from the traditional appliances. Add virtual, and the demands become even greater.
In this webinar, George Crump, Lead Analyst at Storage Switzerland, and Kevin Russell,_VP Systems Engineering of ExaGrid, will lead an interactive discussion about the four changes disk backup appliances need to make to:
- Support the demands of growing virtual server environments
- Meet server backup windows
- Achieve recovery objectives
- Handle ongoing data growth
All pre-registrants will receive an advanced copy of Storage Switzerland’s latest white paper, “Disk Backup Is About More Than Deduplication".
Register for the live event and receive your copy of the report today! By registering, you will not only get the report but you will also have access to over 80 on-demand Storage Swiss webinars without having to re-register ever again.
Workloads continue to increase in data centers, be they virtual or physical. The network infrastructure must respond to these operational demands with ever greater agility. Cisco DFA or Dynamic Fabric Automation is an evolution of the Cisco Data Center and Cloud Networking which enables customers to gain efficiency and increase service velocity. Cisco DFA simplifies fabric management, optimizes the infrastructure, and automates network provisioning with the Cisco Nexus 2000, 5000, 6000, and 7000 Series Switches
With DFA, customers gain unsurpassed operational simplicity thorough superior integration and can scale well beyond 4,000 VLANs and tenants. This session will help you understand how Cisco DFA technology can be deployed incrementally in the evolving data center. Customer use cases will show real-world benefits. A demonstration included will illustrate some of the DFA capabilities in more detail.
Storage in the data center has evolved from islands of server attached storage to shared networked storage. But in both cases storage needed to be specifically designed for the workload it was on. This has lead to storage hardware sprawl.
In this webinar will be an interactive discussion on what hardware sprawl is and how you can stop it.
1. What is causing hardware sprawl?
2. What is the risk of silo'd storage systems?
3. How storage systems need to evolve in order to stop Hardware Sprawl.
Register today for a new Bring Your Own Device (BYOD) webinar and learn how to solve three major BYOD pain points:
•Most people resent having their personal devices managed and controlled by IT departments
•Most IT departments would prefer to manage company-owned applications, not employee-owned hardware
•BYOD users can pose a great risk to corporate data without a management solution
BYOD is a critical component of leading companies’ IT offerings today, giving employees the freedom and satisfaction of working on the devices that they prefer. Organisations implementing BYOD require a means of ensuring corporate control and security of enterprise data and applications, while also meeting employees’ demands for freedom from enterprise constraints on their personal device.
A modern BYOD suite delivers on all of these requirements by securely extending corporate data sources to mobile users’ smartphones and tablets. By offering the ability to control corporate data and applications within a containerised application on the user’s device, a BYOD solution provides IT departments with an enterprise-class, highly secure means of delivering real-time integration between mobile devices and back- end systems.
* On this webcast you can win a pass to the GRC Summit in Boston!
Providing services and features to website visitors often requires deploying many third party service providers for analytics, marketing, payment processing, and data management. Managing risk from these third parties is vitally important in a landscape filled with new threats and regulations. The nature of these relationships requires that information be shared, and risk accrues whenever sensitive information is shared with or processed by third parties.
During this webcast our panel will specifically address the practical 'how to's' around managing website data to reduce corporate risk, and we'll look at some cost effective third party due diligence solutions.
Come hear how Box is partnering with disruptive companies to streamline workflow in patient safety, care coordination and the delivery of patient lab results. Hear from three different Box customers/partners who have innovative use cases around storing protected health information (PHI) and other patient-related data in the cloud.
Missy Krasner, Managing Director, Healthcare & Life Sciences, Box - Moderator
Box currently supports over 200 thousand businesses and is a leading provider of HIPAA-compliant cloud storage and content collaboration. Box serves hospitals, integrated delivery networks (IDNs), health insurance plans, and pharmaceutical and medical device companies. An open platform, Box has integrated with over 800 apps on its One Cloud Platform and has started integrating with various healthcare software applications.
Matt Williamson, CEO and Co-Founder, Accesa Labs
Accesa Labs provides better and more affordable access to medical lab testing through an e-commerce platform that offers lab testing through six laboratory companies. Patients can research, order and pay for medical lab tests directly online. All e-requisitions and lab results are delivered directly to the patient in a secure manner using Box.
Mayank Thanawala, VP of Engineering, HealthLoop
HealthLoop, a cloud-based patient engagement platform, offers automated follow up care for patients between doctor visits. Healthloop is working with Box to share patient data with their health plan partners for better analysis around patient outcomes.
Daniel Bishop, Co-Founder & Chief Innovation Officer, Qualaris
Qualaris Healthcare Solutions, a leader in patient safety software and mobility, is working with Box to streamline hospital patient safety audits and reporting, allowing teams to securely share reports and implementation tasks across their organization.
Backup and archiving in the age of the cloud, where we'll discuss the fundamental challenges and the emerging capabilities that are taking customers down the path of new approaches to data backup and data retention in their on-premise and/or off-premise cloud infrastructures.
The panel will consist of leading thinkers from four vendors that represent the leading innovations for private and public cloud information protection and retention.
Today’s Service Providers have unique technology business needs.
The technology in your data center can position you to address these needs and help you stay nimble and competitive.
Join us on March 12, to hear from today’s leading technology providers who understand the unique needs of an MSP. Hear from a speaker panel of experts who understand the MSP space and how technology can help you stay relevant and a step ahead of the competition.
Experts from global IT companies IBM and Insight will talk about:
· How technology can help MSP’s compete, grow and differentiate
· The resources, programs and sourcing options to make leading technology more accessible
· The latest technology solutions that address the unique IT needs of Managed Service Providers
Internal auditors play a vital role in their organisation’s strategies and daily activities. Your department’s audit plan should be a well-balanced examination that covers regulatory requirements and aligns key risk areas within the organisation.
Join Protiviti's Mark Harrison & Adam Christou, as they help internal audit professionals identify hot topics & emerging trends in 2014 to better execute the department’s strategic focus on risk throughout the year.
To address insider security threats, many organizations deploy data loss prevention (DLP) solutions. Often, the scope of the process and policies are overwhelming to accommodate every scenario. Administrators quickly find it impossible to accurately identify every type of sensitive document, as well as predict the behavior of every type of user. As a result, some businesses deploy their DLP systems in “watch-mode”, where they monitor for behavior, but don’t realize the true benefits of actually preventing data loss.
McAfee DLP leverages TITUS Classification metadata to set active DLP policy and improve policy inforcement. Join TITUS and McAfee for a discussion about:
•Why it is crucial to include users as the first line of defense
•How DLP, NDLP, and ESM leverage TITUS
•And the role of TITUS Classification in the DLP architecture
Why You Should Attend:
• See how vulnerability reporting is presented for the interests of compliance, IT, and CEO.
• Understand new assessment precision and remediation prioritization tools.
• Learn how key vulnerability management solution providers are expanding vulnerability assessments to include more than just network endpoints.
Although NTP reflection/amplification attacks have been observed in the wild for many years, recent high-profile attacks have drawn more attention to them. In this webinar, a member of the Arbor Security Engineering and Response Team (ASERT) will conduct a deep dive into some recent NTP attacks. Network-scalable best practices for detection, classification, trace-back and mitigation of high-impact attacks, ranging from the tens of Mbps up to more than 300 Gbps in size, will be addressed.
Is your organisation over or under spending on ICT Service Continuity (traditionally IT disaster recovery) solutions? Does your IT function know what the actual business requirements for recovery are? The implementation of an ICT Service Continuity Management framework within the organisation can help you understand the business requirements for recovery better, and in turn ensure that your ICT Service Continuity strategy is tailored made to your organisation’s needs. Join us for this webinar to gain insights into the ISO27031 standard for ICT Service Continuity Management, how it aligns with BCM standards and good practice guidelines, and how your organisation can benefit financially from good corporate governance for a traditionally technical discipline.
Case studies: Alastair will be presenting the first part of this webinar, with the focus on the subject of supply chain resilience. A well-known incident and the response of two similar companies and their differing strategies.
Secondly James Halpin will present a specific example of BC resilience, with regards to an existing client of PlanB and how their BC programme has mitigated the potential risk of financial impact, during in a recent incident.
During Business Continuity Awareness Week, the BCI will be publishing a report that ties in with the theme of the week - 'counting the cost'. The report focuses on the cost of common threats to an organisation: IT and telecommunications outage, data breach and cyber attacks, and adverse weather conditions. As a meta-analysis of available literature, it draws upon various reports and cost estimates. In a time where cutting budgets is the norm, and BC-related expenses are often one of the first to go, it is important to be reminded of the cost of being caught flat-footed in an incident. The false economy created by cutting down on business continuity may create bigger problems that may impact on organisational resilience and viability. This webinar is a presentation of the findings of the report by its author - Patrick Alcantara.
In today’s interconnected world, communication, whether it is electronic, verbal or written, has the power to create opportunities for an organisation or to be a serious threat and cause unrecoverable harm.
This impact is heightened in a crisis and your organisation needs to proactively prepare for these events and have a well-oiled approach and plan. In this webinar we will look at local and international examples of communications (good and bad) and the affect it has on the organisations share price and then we will offer some tips on steps you can take to be fully prepared to get your message out successfully.
Are you ready for what's ahead? Resilience in action requires constant evolution; scanning the horizon for lessons learned to enhance your existing approach to business resilience. How do you take your program to the next level and implement a more business centric approach to mitigate business continuity risk? Join us as we identify key areas for increased business continuity focus based on IBM's own experiences building and deploying their program worldwide. What risk strategies do you need to improve? Do you have new types of risks resulting from strategic initiatives? Are you moving into new markets? Globalising? Consolidating operations? Changing workforce demographics? How do you drive C-suite engagement? This webinar will provide insights and share specific examples of actions we all can take to evolve our business continuity programs to the next level.
How concerned is your organisation about adverse weather? Recent polar vortexes and flooding across the North America and Europe have highlighted once again that Mother Nature can cause significant disruption and let us not forget the utter devastation that typhoon Haiyan caused the Philippines in November 2013. Understanding the risk and impact to your organisation before an incident occurs is critical to your resiliency. Join us for this webinar to participate in live polling, discuss industry research and understand how we can all benefit from adopting best practice principles to mitigate the risk.
Cybercriminals often try to circumvent intrusion prevention systems by obfuscating advanced attacks using complex algorithms designed to evade detection. A tightly integrated intrusion prevention system with sophisticated anti-evasion capabilities with full stack inspection of inbound and outbound application traffic is required to defeat these threats.
Register for this webinar with NSS Labs, the trusted authority in independent product testing, and Dell™ to learn about the requirements for an effective intrusion prevention system. Their findings are based on the NSS Labs 2013 Intrusion Prevention System (IPS) Security Value Map, which maps vendors based on security effectiveness and value (cost per protected Mbps) of tested product configurations. In addition, Dell will summarize key results from the Dell SonicWALL™ SuperMassive™ E10800 IPS Product Analysis Report.
Join us to explore:
•NSS Labs Intrusion Prevention System testing methodology
•Security effectiveness, performance, and total cost of ownership
•Dell SonicWALL SuperMassive E10800 IPS Product Analysis Report results
*On this webcast we're giving away a non-transferable guest pass to the IQPC 2nd Annual Cyber Security for Oil and Gas Summit, being held in Houston, Texas between June 16 - 18, 2014.
In December 2013, US retailer Target suffered a high profile data breach at the hands of a cybercriminal group, who infected its point-of-sale (PoS) terminals with malware to steal the details of around 110 million customers. Marcus Group's systems were also compromised recently and crooks made off with customer card details, while several other merchants are reported to be preparing to go public with their own breaches.
Data breaches are nothing new and have been around for quite some time; however, we are seeing a significant increase in incidents and 2013 was the worst year in terms of data breaches recorded to date. According to the Online Trust Alliance over 740 million records were exposed in 2013, and they determined that 89% of all breach incidents were avoidable had basic security controls and best practices been enforced. Join us as we discuss some key lessons learned from the recent breaches and:
- Discuss how malware aimed at retailers is evolving on a daily basis
- Analyze the tools and methodology employed hackers to bypass security
- Address steps retailers and banking institutions should take to secure their networks
- Provide procedural and technical steps for securing third party code
- Discuss how to develop an effective Data Incident (DIP) Plan, including a communication strategy
When last did you sit with your Finance team and look at your short term insurance and consider how implementing a Business Continuity programme in your organization could actually create tangible and intangible cost savings? Do you understand whether your business interruption insurance is really adequate should a crisis occur? What is an indemnity period and does it fit my organizations business model and objectives? Join us in this webinar to answer these and other questions related to the relationship between Business Continuity and Insurance.
One of the most damaging assumptions made today, is that common communication modes will operate in a consistent fashion anywhere in the World. By not having a complete understanding of the pitfalls, nuances and even legislation in certain markets, can lead to the failure of your notification/alerting strategy, which may have a severe impact on the success of your Business Continuity plan. This webinar will provide an insight into some of the challenges that organisations face and how they can dramatically improve the results of a successful Critical Communications strategy.
Supply chains are often the heart and soul of an organization. If the supply chain is undisturbed, the business can function normally. If it is disrupted, the consequences could be disastrous. If you are serious about protecting your supply chains, one of the best strategies is to analyze the BCM plans of your principal supply chain partners. In this webinar we'll briefly examine the following:
- How BCM factors into supply chains
- The importance of identifying risks to your supply chains
- What you need from your suppliers on their BCM activities
- How to obtain supplier BCM plans
- How to audit supplier BCM plans
Assuming your environment has implemented a business resiliency (BR) strategy and plan that includes business continuance (BC) and disaster recovery (DR), how are you managing those? Are the tasks and activities involved with support BR, BC and DR integrated as part of your normal processes, procedures, best practices, or are they after the fact or done when needed? One of the ways to reduce the cost of BR, BC and DR is too remove complexity which can be tied back to various processes and activities that range from maintaining and making updates to plans as well as testing. For example if you are practicing BC and BR functionalities as part of the every-day course of doing business you may already be removing costs. On the other hand, if you are spending time and money preparing to pass quarterly or annual audits and BC, BR and DR readiness, you may be incurring additional costs. This webinar looks at streamlining your BC, BC and DR management including making sure you have proper coverage of applications, data, systems and settings.
•Everything is not the same in the data center or information factory
•Are you using one approach to protect all systems, applications, data and tools
•Have you revisited how BC, BR and DR are part of your every-day processes
•Where, when, how and who should be focused on BC, DR, and BR management
•What data protection management tools are available to help provide insight and awareness
•Do you know who well your applications are protected, to what level and cost?
Still using a file server to share documents? What about that FTP? Emailing large attachments which get stuck in your inbox? The move to cloud computing allows businesses to access information , applications and content from anywhere, anytime on any device. As individuals have demanded the need to have the same ease of use in their enterprise grade applications as in consumer applications, the move to cloud has accelerated product adoption, lowered costs and increased productivity. Learn about various companies who moved to the cloud with Box, best practices and how to easily share without on-premise technology.
With confidential data under attack on many fronts, it is time to look at how encryption can protect data access and what your business could be doing to employ encryption, from servers to endpoints to removable media.