Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Privacy in the Time of COVID
    Privacy in the Time of COVID
    Chenxi Wang | Vishwanath Raman | Michelle Dennedy | Tom Pendergast Recorded: May 22 2020 58 mins
    In the fight against COVID-19, countries are taking urgent actions to address the crisis. Some are turning to tech to find solutions for containing the spread of the virus. Digital contact tracing, in particular, is gaining a lot of traction. For example, Apple and Google recently announced a rare collaboration to jointly facilitate contact tracing within their mobile platforms for public health monitoring applications.
    So, what does this mean for privacy? 
    While some efforts are being made to preserve user privacy, like not tracking user location or collecting other identifying information, digital contact tracing can still reveal more user information than necessary.

    Join this panel of security and privacy experts lead by Chenxi Wang to learn more about the different implications associated with digital contact tracing, how it is being used around the world, and the long-term effects of COVID-rushed decisions.

    Speakers:
    - Chenxi Wang, Founder & General Partner of Rain Capital
    - Vishwanath Raman, Lead, Privacy Technologies, Oasis Labs
    - Michelle Dennedy, CEO Drumwave
    - Tom Pendergast, Chief Learning Officer, MediaPRO
  • What’s New in Tufin Orchestration Suite R20-1
    What’s New in Tufin Orchestration Suite R20-1
    Robin Ostler, Sales Engineer, Tufin Recorded: May 22 2020 28 mins
    Looking for the fastest, easiest way to block suspicious traffic? Search and modify specific service throughout the rule base? Or maybe implement rule changes using IPv6 addresses? All of these changes (and more!) can now be managed with the new capabilities in Tufin Orchestration Suite (TOS) R20-1.

    Join us for a short and super informative webinar, on May 22nd at 12pm BST to learn how you can use Tufin’s newest security automation features to:

    *Respond quickly to suspicious network activity by blocking a high-risk service (Remember WannaCry TCP 445…?)
    *Manage changes that include IPv6 (and IPv4) addresses for fast implementation
    *Control and automate changes in NGFW (Palo Alto Networks Panorama and Cisco Firepower) based on accurate traffic/usage analysis

    Save your seat. Register today!

    If you're unable to attend the live webinar, sign up here and we’ll send you the recording.
  • Seminarium internetowe: Co nowego w pakiecie Tufin Orchestration Suite R20-1
    Seminarium internetowe: Co nowego w pakiecie Tufin Orchestration Suite R20-1
    Slawek Slowiński, Regional Sales Manager - Tufin Recorded: May 22 2020 31 mins
    Szukasz najszybszego i najłatwiejszego sposobu na zablokowanie podejrzanego ruchu? Wyszukaj i zmodyfikuj konkretną usługę w całej bazie reguł? A może wdrożyć zmiany reguł przy użyciu adresów IPv6? Wszystkimi tymi zmianami (i nie tylko!) Można teraz zarządzać dzięki nowym możliwościom pakietu Tufin Orchestration Suite (TOS) R20-1.

    Dołącz do nas na krótkie i bardzo merytoryczne webinarium, 22 maja o godzinie 10.00 (CEST), aby dowiedzieć się, jak korzystać z najnowszych funkcji automatyzacji bezpieczeństwa Tufin w celu:

    *Szybkiego reagowania na podejrzane działania sieci, blokując usługę wysokiego ryzyka (pamiętasz WannaCry TCP 445…?)
    *Zarządzania zmianami obejmującymi adresy IPv6 (i IPv4) w celu szybkiej implementacji
    *Kontrolowania i automatyzacji zmiany w NGFW (Palo Alto Networks Panorama i Cisco Firepower) w oparciu o dokładną analizę ruchu / użytkowania

    Potwierdź swoje miejsce. Zarejestruj się dziś!

    Jeśli nie możesz wziąć udziału w webinarium na żywo, zarejestruj się tutaj, a my prześlemy Ci nagranie.
  • Best practices for verification to support reduced certificate lifetimes
    Best practices for verification to support reduced certificate lifetimes
    Dathan Demone, Director Verification Services, Entrust Datacard Recorded: May 22 2020 35 mins
    Join us for our "Road to 398" webinar that discusses upcoming certificate lifetime reductions.

    During this 30-minute webinar, our verification expert will share tips, tools, and best practices for verification processes that support reduced TLS/SSL certificate lifetimes and maintain compliance.

    • Updates on CA/B Forum requirements for verification around shorter certificate lifetimes
    • Tools for renewing certificates in bulk with fewer touch points
    • Methodologies for streamlining certificate verification
    • Insights and best practices from some of our other customers
  • How to effectively secure your remote workforce - Asia Pacific
    How to effectively secure your remote workforce - Asia Pacific
    Jenn Markey, Product Marketing, Entrust Datacard Recorded: May 22 2020 24 mins
    2020 has introduced many new normals, working from home being one of them. This also increases the threat landscape for IT. Employees are connecting to company resources in a different way, many using their own devices. Then there are the added distractions that come with working from home. Attendees will learn authentication best practices to:

    - Keep corporate assets secure
    - Protect and verify worker identities
    - Help remote employees stay productive
    - Reduce the administrative burden on IT

    Jenn Markey leads product marketing for Entrust Datacard’s authentication business segment. She is responsible to help build the company’s authentication market profile, customer footprint, and strategic business value. Over the duration of Jenn’s career, she has held senior marketing, product management, and business development positions with several dynamic technology companies across the software (including SaaS), security, video production, telecom, and semiconductor industries. Jenn resides in Ottawa, where she is also a practicing yoga teacher.
  • Review of Cyberattacks Leveraging the COVID-19 Pandemic
    Review of Cyberattacks Leveraging the COVID-19 Pandemic
    Ira Winkler, Security Evangelist Recorded: May 21 2020 60 mins
    Never let a crisis go to waste. That’s the attitude of most attackers being played out in cyberspace in the past few months. In this webinar we are going to review the types of attacks that specifically leverage the coronavirus pandemic. From phishing to BEC, from ransomware to state-sponsored disinformation campaigns and more. Whether you are in healthcare or in tax and accounting, no one seems to be safe.

    Awareness is the first step in preparing your organization for the possible impact and making plans to bolster your defenses.

    Speaker:
    Ira Winkler is one of the world’s most influential security professionals and a repeat speaker at the RSA Conference. He has designed and implemented security awareness programs at organizations around the world. Ira began his career at the National Security Agency as an Intelligence and Computer Systems Analyst.
  • Data Exfiltration via DNS and How to Combat It
    Data Exfiltration via DNS and How to Combat It
    Kirk Appelman, VP & GM North America + Bob Smiley, Senior Systems Engineer Recorded: May 21 2020 44 mins
    Support and management of the Domain Name System (DNS) is absolutely critical for keeping IT services running, but the protocol itself has become a prime target for cybercriminals. Organizations in all verticals have been widely impacted by DNS-based attacks, and are realizing conventional security systems alone (such as next-gen firewalls, intrusion prevention systems or data loss prevention) are not adequate to protect data confidentiality and ensure service continuity.

    Join EfficientIP for a webinar on how to better secure your DNS and combat data exfiltration. During the session you will:

    ---Discover techniques hackers use to perform DNS attacks
    ---See a demo on data exfiltration & how to mitigate it
    ---Learn how actionable data from DNS analytics strengthens the network security ecosystem
  • Migrating to the Cloud with Container Storage and VTL
    Migrating to the Cloud with Container Storage and VTL
    Todd Brooks, CEO, & Mark Delsman, VP of Engineering at FalconStor Software Recorded: May 21 2020 37 mins
    Compliance, Regulatory, Legal Discovery, and Privacy mandates have changed the storage landscape. “Do not retain” has become “retain forever,” creating a new challenge for enterprises and scalable storage capabilities. With the average hardware lifespan being five to seven years and software lifespans being three to five years, how do businesses maintain access to critical retention information assets once systems and software are past their end-of-life date while data still has 90+ years of mandated retention life left? This mandated retention tsunami is like nothing the world has seen before and its growth is compounding, as new regulations continue to expand to include new information assets.

    This is where FalconStor’s Virtual Tape Library (VTL) and new Virtual Container Storage (VCS) technologies come in. This session will explain how, by leveraging these technologies, there is a new portable, survivable and robust future-proof format to safely archive information to meet the long-term retention mandates while obviating the hardware and software issues. And, how migrating to the Cloud can deliver unlimited storage and archival capacity at very affordable price points.
  • The Critical Role of IoT in COVID-19 Recovery
    The Critical Role of IoT in COVID-19 Recovery
    Cradlepoint's Ken Hosac, VP of IoT Strategy & Business Development Recorded: May 21 2020 63 mins
    Millions of Americans are heading back to work to businesses, but concerns about safety haven’t entirely gone away. To ease the transition, businesses are putting in place systems to keep employees and customers healthy and confident — systems in which IoT will play a critical role. A variety of IoT “things” are available for the workplace, such as cameras and sensors that detect body temperature, patient monitoring devices that can be remotely accessed, kiosks for ordering and consulting without face-to-face interaction, and cameras that can detect crowd density or if people are wearing facemasks.

    Join us for this webinar on May 21st to learn about:

    — How IoT can help employees get back to work with fewer risks
    — What technologies are available to help businesses adapt to a new normal
    — How Cradlepoint’s solutions serve as the connectivity and building blocks to deploy IoT applications
  • Unlock More Revenue From Existing Content with GrayMeta
    Unlock More Revenue From Existing Content with GrayMeta
    Backblaze and GrayMeta Recorded: May 21 2020 39 mins
    How can you monetize content quicker by discovering information hidden inside your media files? Attend this webinar to learn how to:

    • Use machine learning and AI to extract metadata from content scattered across SAN, NAS, and cloud storage
    • Uncover actionable insights from words, sounds, faces, and logos detected in video and other assets
    • Build time-saving workflows that identify, move, and transform content automatically
    • Make your content monetization workflow more efficient to shorten time to revenue
  • Avid-Certified Storage Management, Analytics, Visualization, Archiving and DR
    Avid-Certified Storage Management, Analytics, Visualization, Archiving and DR
    Simon Fearn, Product Manager, Marquis Broadcast Recorded: May 21 2020 22 mins
    Project Parking uses advanced low-level analytics to enable significant simplification of Avid shared storage operations. These include analyzing and managing media and workspaces, archive and transfer of projects, restore and merge projects or bins.

    The Project Parking and Wasabi solution enables film production, post and broadcast companies to export projects to the cloud for short and long term archive, for backup or to make way for incoming productions on valuable ISIS or NEXIS storage space. Most importantly, it makes it easy to move complete Avid projects, together with all the bins, sequences and media files to Wasabi cloud storage.
  • Modernizing to Protect State, Local & Education from Ransomware and Disasters
    Modernizing to Protect State, Local & Education from Ransomware and Disasters
    Brett Foy, Global Vice President, Sales Engineering at Datrium Recorded: May 21 2020 28 mins
    The IT organizations that make up state, local government, and educational institutions have unique requirements and regulations that traditional commercial organizations aren't hampered by. From unique IT budgeting to strict compliance, "SLED" organizations are constantly forced to maximize every IT resource in their complex IT environments.

    Join us to learn what you need to do to modernize your IT infrastructure to gain greater efficiency, agility, and performance while maximizing your IT investment.
  • Data Protection Solutions: Preventing Ransomware
    Data Protection Solutions: Preventing Ransomware
    Chris Evans, Architecting IT; Michael Cade, Veeam; Guy Bartram VMWare; Neil Stobart, Cloudian Recorded: May 21 2020 73 mins
    Ransomware has been identified by the World Economic Forum as one of the top 5 economic risks, a risk level comparable to global warming. Join this panel session to learn how new technology from Cloudian, Veeam and VMware provides a hardened solution to keep your data safe - whether that be in on-premise data centre or as a Managed Services Provider providing Ransomware Protection as a Service to Enterprise Customers.

    Chair: Chris M Evans, Architecting IT.

    Panelist 1: Neil Stobart, VP Global Systems Engineering - Cloudian
    Panelist 2: Michael Cade, Senior Global Technologist, Veaam Software
    Panelist 3: Guy Bartram, Global Product Marketing, VMware
  • Power Your Workforce Transformation through Unified Workspace
    Power Your Workforce Transformation through Unified Workspace
    David Fritz - Product Marketing | Dell Technologies Recorded: May 21 2020 38 mins
    Transform your business with Dell Technologies Unified Workspace. Dell Technologies Unified Workspace revolutionizes the way IT handles deployment, security, management and support. Our integrated solution was designed with intelligence and automation to empower you with visibility across the entire endpoint environment, and eliminate non-value add work. We'll help you reduce run-the-business tasks and provide ready-to-work experiences for end users. Join us for an exciting look at how you can modernize your business for smarter and faster workspace experiences.
  • Setting Up Your Knowledge Workers for Productivity At Home
    Setting Up Your Knowledge Workers for Productivity At Home
    Anne Blanchard, Senior Manager, Product Marketing and Coan Dillahunty, Senior Product Manager @ Nasuni Recorded: May 21 2020 33 mins
    Today’s business climate is requiring every enterprise to re-evaluate their Business Continuity Plan (BCP) and remote work support. Files are at the center of everything employees do, and to support work-from-home flexibility, the need for fast, effective file sharing has never been greater. Knowledge workers must be productive, even as they work from hundreds or thousands of different locations. Learn how cloud-based file services from Nasuni combined with Azure, AWS, or Google cloud storage delivers instant unlimited scale at a much lower price while keeping workers connected. In this webinar, you’ll hear best practices on how to scale work-from-home file infrastructure, extend fast access to corporate file shares from any location, and simplify remote file access for IT.

    Anne Blanchard: Anne has extensive experience in storage and cloud-delivered solutions. She has spent more than 20 years working with storage customers and cloud solution buyers, and has helped customers in nearly every phase of cloud adoption. Anne joined Nasuni in 2016 to assist with application and industry specific solutions and now focuses on helping companies take a cloud platform approach to file infrastructure.

    Coan Dillahunty: Coan is a Senior Product Management for Nasuni, specializing in Nasuni Web Access and the Nasuni Management Console. Prior to joining Nasuni in 2018, Coan was a Nasuni Administrator for a large Nasuni customer, where he helped manage an environment deployed at more than 100 locations to provide access to more than 4 PB of data.
  • Managing Endpoints and Remote Users During a Crisis: User Virtual Round-table
    Managing Endpoints and Remote Users During a Crisis: User Virtual Round-table
    Daniel Wolff Recorded: May 21 2020 31 mins
    Attend this virtual round-table where you’ll hear IT leaders discuss best practices on these topics and more:

    -What are the unique challenges in dealing with new remote workers?
    -Are you seeing new or different types of security threats?
    -Best practices for ensuring compliance?
    -Are you deploying more tools?
    -What is the impact on your budgets?
  • Intelligent Data Management: Reduce Storage Costs with Igneous and Wasabi
    Intelligent Data Management: Reduce Storage Costs with Igneous and Wasabi
    Andy Ferris, Product Manager, Igneous Recorded: May 21 2020 23 mins
    Static datacenter footprints, missed SLA’s and the failure of legacy solutions are all challenges facing organizations today. With the growth of unstructured data projected to keep growing exponentially enterprises are increasingly turning to cloud storage for additional data protection capacity.

    Do you have a defined cloud strategy, do you have a view into what challenges you may face or the cost implications around moving to the cloud? What if you could accurately predict your cloud SLAs and operating costs with absolute certainty?

    IT teams looking to reduce costs and simplify their cloud strategy need look no further than the pairing of Igneous, the SaaS data management company for file intensive environments and Wasabi, the hot cloud storage company. Igneous enables the movement of unstructured data from any primary NAS system to Wasabi storage at a predictable and cost-effective price point. Wasabi provides an affordable cloud storage pricing model with no egress fees or API requests, unlike other cloud storage providers.

    This webinar will outline how Igneous’ highly parallelized system architecture and Wasabi’s high-performance, one-size-fits-all object storage services can provide the highest performing and predictable solution for replacing on-premises NAS backup with igneous and Wasabi.
  • Negotiating With Hackers
    Negotiating With Hackers
    24by7Security, Inc Recorded: May 21 2020 57 mins
    Every cybersecurity team's nightmare... Getting hacked or infected with malware that grinds all company duties to a halt. You hope that this will never happen to you, but what if it did? The rise of ransomware has been driven by businesses’ growing dependence on technology and data, as well as the development of anonymous digital currencies that allow criminals to move funds without being traced. So what should a company do if they are hacked?

    Take this opportunity to live the experience of a real ransomware negotiation, and learn the behind the scenes story of what goes on when a company is in reactive mode. In this webinar, audience members will learn all of the leading indicators of compromise and how to negotiate ransom with hackers. Join Sanjay Deo, Breach Coach at 24By7Security and Andrea Richard, Moderator at 24By7Security who will provide a first hand description of what it is like to be in the hot seat negotiating with hackers and provide remedies to avoid these situations in the first place.

    CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
  • Webinar: Ask the Experts: The scope and significance of NIST 800-53
    Webinar: Ask the Experts: The scope and significance of NIST 800-53
    Victoria Yan Pilliteri, Cybersecurity Engineer at NIST & Greg McDermott, AVP, Federal Sales at Tufin Recorded: May 21 2020 51 mins
    Join us on Thursday, May 21st at 11:30am (EDT) for an exciting and super informative webinar with expert guest, Victoria Yan Pilliteri, Cybersecurity Engineer at NIST, joined by Greg McDermott, AVP, Federal Operations at Tufin. 

    Together, these experts will deep dive into the guidelines, best practices, NIST plans for additional resources to support implementers, and the benefits of NIST 800-53 adoption to help public and commercial organizations improve their security posture.
  • Navigating MAZE: Analysis of a Rising Ransomware Threat
    Navigating MAZE: Analysis of a Rising Ransomware Threat
    Kimberly Goody, Sr. Manager, Mandiant Threat Intelligence & Jeremy Kennelly, Manager, Mandiant Threat Intelligence Recorded: May 21 2020 58 mins
    The MAZE family of ransomware has been actively distributed by threat actors since at least May 2019. Starting in November 2019, Mandiant Threat Intelligence observed MAZE operators begin to combine traditional ransomware attacks with corresponding data theft and extortion demands. Today, the actors behind the MAZE operation now maintain a public-facing website where they post data stolen from victims who refuse to pay their extortion fee.

    Join Mandiant Threat Intelligence for a deep dive into the MAZE ransomware operation, including details shared by impacted organizations, and insight into the tactics, techniques and procedures used throughout these prolific and damaging attacks.

    In this exclusive webinar, attendees will learn about:
    •Common intrusion vectors across MAZE ransomware incidents
    •Actors’ reliance upon open-source and commercially available attack tools
    •Data exfiltration techniques present across most MAZE ransomware incidents
  • Upping the APT hunting game: learn the best YARA practices from Kaspersky
    Upping the APT hunting game: learn the best YARA practices from Kaspersky
    Costin Raiu, security researcher in Kaspersky’s Global Research and Analysis Team Recorded: May 21 2020 76 mins
    Have you ever wondered how Kaspersky discovered some of the world’s most famous APT attacks? Now, the answer is within your reach. Watch the latest recorded webinar by Costin Raiu, director of Kaspersky’s Global Research and Analysis Team (GReAT), who will be sharing best practices on the use of YARA, an essential tool for APT hunters that can assist with the discovery of new malware samples, exploits and zero-days, speed up incident response, and increase your defenses by deploying custom rules inside your organization.

    If you ever wanted to master YARA and achieve a new level of knowledge in APT detection, mitigation and response, now is your chance.

    This brief webinar is based on Kaspersky’s exclusive training on YARA rules, which has already helped improve the APT detection strategies of many cybersecurity teams from leading businesses across the world. During the webinar, you will learn how to write test and improve effective YARA rules. You will also get a glimpse of some of our internal tools and learn how to maximize your knowledge for building effective APT detection strategies with YARA.

    This practical webinar is useful for security researchers and incident response personnel, malware analysts, security engineers, network security analysts, APT researchers and IT security staff. The content is suitable for both beginners and seasoned YARA users.

    During this webinar, you will learn about:

    •YARA syntax
    •Tips & tricks for creating fast and effective rules
    •Using YARA-generators
    •Testing YARA rules for false positives
    •Hunting new undetected samples
    •Using external modules within YARA for effective hunting
    •Anomaly search
    •Real-life examples

    Don’t miss this opportunity to learn about APT threat detection from Kaspersky’s Global Research and Analysis Team.

    Attendees’ requirements:
    Technical level: medium
    Prerequisites: knowledge of basic programming languages
    Software to install: YARA 3.11.0 or newer (if any)
  • Cloud Disaster Recovery: New Trends, Top Questions
    Cloud Disaster Recovery: New Trends, Top Questions
    Chris Williams, World Wide Technology and Penny Gralewski, C Recorded: May 21 2020 57 mins
    Cloud disaster recovery is top of mind for many organizations. With changing times come new advancements for disaster recovery using cloud storage from Amazon Web Services (AWS), Microsoft Azure, or other cloud environments.

    Learn the answers to your top questions about cloud disaster recovery.

    What is the best method for cloud disaster recovery? It would be nice if there was a one size fits all answer. Your cloud disaster recovery strategy should be based on what works for your organization. Should you recover in the cloud, from the cloud, across cloud regions? Learn options for flexible cloud disaster recovery, including ways to recover across hypervisors or clouds.

    What is the first step in a cloud disaster recovery plan? First, consider the breadth and depth of the business and identify what is most important. We’ll discuss places to start your cloud disaster recovery plan, the role of testing and real-world examples. We’ll also look at how automation can cover work when your full response team isn’t available.

    Why is cloud flexibility important for disaster recovery? Business needs change over time. Cloud disaster recovery can give you more flexibility to always be ready when disaster strikes. We’ll look at recovery across different cloud scenarios, including Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.

    Cloud disaster recovery can offer you flexibility; after all, your disaster recovery plan can’t be set in stone.

    In this webinar, you’ll learn:

    • What disaster recovery means, and how to evaluate that for your organization.

    • Real-world examples and specific approaches to cloud disaster recovery based on typical enterprise workloads like virtual machines, databases, SaaS and PaaS.

    • How a cloud-centric approach to disaster recovery can dispel many of the typical pain points.

    • Why partners are a great option to help build and maintain your disaster recovery plan.
  • Gestire la cybersecurity durante il lockdown: lo scenario delle minacce
    Gestire la cybersecurity durante il lockdown: lo scenario delle minacce
    Gabriele Zanoni, EMEA Solutions Architect, FireEye Recorded: May 21 2020 58 mins
    Il Webinar “Gestire la cybersecurity durante il lockdown: lo scenario delle minacce nel contesto del COVID-19” fa parte di una serie di incontri settimanali intitolati: #FireEyeCyberTalks. Si terranno ogni giovedì, dal 21 maggio al 18 giugno, e ti offriranno contenuti stimolanti e approfondimenti da parte dei nostri esperti.

    Gabriele Zanoni ci parlerà del New Normal: cosa vuol dire oggi lavorare direttamente sul campo. A supporto fornirà esempi e trend di mercato.
    Quali sono le sfide che oggi stiamo affrontando lavorando da casa, da un punto di vista sia individuale sia aziendale. Come possiamo relazionarci meglio con i nostri team e unire gli sforzi per lottare contro le sfide informatiche. Dobbiamo alzare il livello di attenzione al rischio, dobbiamo adattarci alle nuove minacce emergenti?
    Durante questo webinar, Gabriele Zanoni condividerà quali sono le sfide attuali dovute ai continui attacchi phishing, come ottenere una prospettiva generale sullo stato della sicurezza cyber della propria organizzazione, anche lavorando da casa, cosa cercare in modo specifico e, infine, come gestire gli incidenti una volta che rilevati.

    Prenota il tuo posto oggi #FireEyeCyberTalks
  • The CISO’s Take on Protecting Privileged Access in Robotic Process Automation
    The CISO’s Take on Protecting Privileged Access in Robotic Process Automation
    Laura Robinson, Principal Analyst for Robinson Insight Recorded: May 21 2020 33 mins
    There is a rapid adoption of Robotic Process Automation (RPA). What could go wrong with a fleet of robots that have high levels of access across multiple sensitive business processes? In this webinar, we will present both key findings and recommendations from industry-leading CISOs involved in the latest CyberArk CISO View research report on securing RPA. Hear how cyber attackers and insiders can attempt to exploit privileged access in RPA systems.

    Join us to learn:

    The unique perspective from 12 leading security executives on this new technology and related security implications
    Practical recommendations to scale RPA workflows securely
    How security teams can add tremendous value to the organization’s RPA strategy…and much more!
  • Entwickler & Umgebungen sichern – ohne dass die Produktivität eingeschränkt wird
    Entwickler & Umgebungen sichern – ohne dass die Produktivität eingeschränkt wird
    Jan-Patrick Vöhrs, Sales Engineer, CyberArk and Roland Wolters, Technical Marketing Manager, RedHat Recorded: May 21 2020 48 mins
    DevOps-Prozesse und Cloud-Umgebungen haben Entwickler - im Rahmen der digitalen Transformation - zu den einflussreichsten IT-Anwendern der Organisation gemacht.

    Daher haben Angreifer begonnen, Entwickler gezielt zu attackieren.

    Um das Risiko zu mindern und die Entwickler und deren Umgebungen zu sichern, wird ein umfassender Ansatz zur Sicherung der DevOps-Umgebungen benötigt, der weder den Nutzer noch die Produktivität beeinträchtigt.

    Lernen Sie, wie Sie DevOps-Umgebung sichern und gleichzeitig Risiken aus dem Diebstahl und Mißbrauch von Privilegien verhindern können.
  • Best Practices for Securing Your Remote Workers
    Best Practices for Securing Your Remote Workers
    David Richardson, VP Product Management, Lookout & Chris Hazelton Director, Security Solutions, Lookout May 26 2020 12:00 am UTC 53 mins
    As organisations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive.

    However, allowing employees to work productively from any device and any location can open organisations up to cyber risk.

    Join this webinar to learn:

    - The most critical considerations for allowing personal devices to access corporate resources
    - What rights should be granted for devices accessing corporate data
    - How to control specific operating systems from gaining unauthorised access
    - What guidance to give users to remain productive and secure while working remotely
  • Security Awareness Training – Your best line of defence
    Security Awareness Training – Your best line of defence
    Andrew Warren-Nicholls, Cyber Security Specialist, APJ May 26 2020 1:00 am UTC 39 mins
    Cybercriminals are continually refining their approaches to social engineering with well-crafted lures and schemes that regularly trick even your most savvy users. Proofpoint research shows that 99% of attacks rely on your users taking some form of action, be it clicking a link, entering their credentials or even running their code.
    So how can you better protect yourself, your organisation, and your end users?
    Join us as we walk you through how we’re taking Proofpoint’s expertise in the email security space and applying it to our Security Awareness Training solutions to lower your people-centric risk. With this webinar you’ll get a better understanding of:
    • How to measure your susceptibility to attack through the number 1 threat vector, email.
    • How to deliver a customised security awareness program to drive new behaviours and help your people be an effective last line of defence
    • How to enable your employees to quickly report suspicious email messages with one tap
    • How you can automate your security response to suspicious email reports, saving precious time and stopping attacks with closed-loop email analysis and response (CLEAR)
  • Deutsch: Security Awareness Training, die beste Verteidigung gegen Cyberangriffe
    Deutsch: Security Awareness Training, die beste Verteidigung gegen Cyberangriffe
    Henning Hanke, Cybersecurity Specialist, Deutschland, Österreich und Schweiz May 26 2020 8:00 am UTC 48 mins
    Cyberkriminelle arbeiten ständig an der Verbesserung ihrer Social-Engineering-Methoden und nutzen ausgefeilte Köder und Tricks, auf die häufig selbst die erfahrensten Anwender hereinfallen. Wie Untersuchungen von Proofpoint zeigen, hängen 99 % aller Angriffe davon ab, dass der Anwender in irgendeiner Form aktiv wird. Ohne die Interaktion des Anwenders kann der Angriff – aus Sicht des Kriminellen – nicht erfolgreich sein. Der Anwender wird beispielsweise zum Klicken auf einen Link aufgefordert, dazu, Anmeldedaten auf einer gefälschten Login-Seite einzugeben oder ein Makro (und damit Schadcode) auszuführen, wenn er beispielsweise eine befallene Datei öffnet.
    Wie können Sie also sich selbst, Ihr Unternehmen und Ihre Endnutzer besser schützen?

    In unserem Webinar zeigen wir, wie wir die Proofpoint-Expertise im E-Mail-Sicherheitsbereich für unsere Security Awareness-Training-Lösungen praktisch anwenden, um das Sicherheitsrisiko durch Cyberangriffe, die sich gegen Mitarbeiter richten, zu minimieren. Im Webinar gehen wir auf folgende Themen ein:

    - Sie erfahren, wie Sie messen können, wie anfällig Ihre Mitarbeiter für Angriffe über den wichtigsten Bedrohungsvektor – die E-Mail – sind.
    - Sie erhalten Tipps aus der Praxis dahingehend, welche Kriterien Schulungsmaßnahmen zur Steigerung des Sicherheitsbewusstseins erfüllen müssen, so dass sie neue Verhaltensweisen fördern und aus Ihren Mitarbeitern eine effektive letzte Verteidigungslinie machen.
    - Sie erhalten Informationen darüber, wie Ihre Mitarbeiter verdächtige E-Mails mit nur einem Klick melden können.
    - Automatisierung Ihrer Reaktion bei gemeldeten verdächtigen E-Mails mithilfe von Closed-Loop Email Analysis and Response (CLEAR), sodass Sie wertvolle Zeit sparen und Angriffe rechtzeitig abwehren können

    Proofpoint, Inc. (NASDAQ:PFPT) ist ein führendes Cybersicherheitsunternehmen. Im Fokus steht für Proofpoint dabei der Schutz der Mitarbeiter.

    Deutsch
  • Best Practices for Securing Your Remote Workers
    Best Practices for Securing Your Remote Workers
    David Richardson, VP Product Management, Lookout & Chris Hazelton Director, Security Solutions, Lookout May 26 2020 9:00 am UTC 53 mins
    As organisations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive.

    However, allowing employees to work productively from any device and any location can open organisations up to cyber risk.

    Join this webinar to learn:

    - The most critical considerations for allowing personal devices to access corporate resources
    - What rights should be granted for devices accessing corporate data
    - How to control specific operating systems from gaining unauthorised access
    - What guidance to give users to remain productive and secure while working remotely
  • How do you gain cyber assurance?
    How do you gain cyber assurance?
    Katherine Demidecka, Strategic Mandiant Consultant, FireEye May 26 2020 9:00 am UTC 45 mins
    This webinar will discuss how an organisation can gain assurance that it is prepared to defend against and respond to a cyber incident. The following key topics will be covered:

    •Securing your environment proportionate to the risk
    •Readiness to identify and respond to an attacker's presence quickly
    •Testing your defences and response plans through simulated attacks
  • Security Awareness Training –Your best line of defence
    Security Awareness Training –Your best line of defence
    Paul Down, Director & Matt Cooke, Cyber Security Specialist May 26 2020 9:00 am UTC 31 mins
    How susceptible are your users to email attack?
    Join our experts to discover new highly-crafted lures and tricks used by cyber criminals in 2020.
    Learn how to strengthen your last line of cyber defence : your people

    Cybercriminals are continually refining their approaches to social engineering with well-crafted lures and schemes that trick even your most savvy users. Proofpoint research shows that 99% of attacks rely on your users taking some form of action, be it clicking a link, entering their credentials or even running their code.

    So how can you better protect yourself, your organisation, and your end users?

    With this webinar you’ll get a better understanding of:

    • How to measure your susceptibility to attack through the number 1 threat vector, email.
    • How to deliver a customised security awareness program to drive new behaviours and help your people be an effective last line of defence
    • How to enable your employees to quickly report suspicious email messages with one tap
    • How you can automate your security response to suspicious email reports, saving precious time and stopping attacks with closed-loop email analysis and response (CLEAR)

    Join us to review 2020 best practice in security awareness training

    ABOUT PROOFPOINT
    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • SOAR Explained: Benefits, Unique Capabilities, SOAR vs SIEM, KPIs and More
    SOAR Explained: Benefits, Unique Capabilities, SOAR vs SIEM, KPIs and More
    Andrea Fumagalli, VP of Engineering, DFLabs May 26 2020 9:00 am UTC 75 mins
    Security Orchestration, Automation, and Response (SOAR) has grown exponentially in recent years, both in popularity and demand. An increasing number of enterprises, SOCs, and MSSPs have looked for new and innovative solutions to address several pervasive problems, and SOAR quickly became a popular security solution among businesses and organizations.

    In this webinar, we’ll focus on the core functions of Security Orchestration, Automation and Response (SOAR) technology, its unique capabilities, and the most common challenges that SOAR helps resolve. We’ll also discuss the key benefits that SOAR as a solution offers to enterprises and MSSPs, the difference between SIEM and SOAR, and how they work together, as well as revealing the most important KPIs for security operations and incident response programs.

    Key Takeaways:
    - What is SOAR?
    - Unique capabilities of SOAR
    - The marriage between SIEM and SOAR
    - Core functions & capabilities of a DFLabs IncMan SOAR solution
    - TRIAGE
    - Open Integration Framework
    - Probationary role and chain of custody
    - Reporting and KPI
    - Key benefits of SOAR for enterprises and MSSPs
  • Hedvig 101—why the time is now for software-defined storage
    Hedvig 101—why the time is now for software-defined storage
    Christopher D. Hill, Commvault May 26 2020 10:00 am UTC 43 mins
    With the acquisition of Hedvig, Commvault is now more than just backup - we can now help you consolidate your backup and archive storage infrastructure and help your organization prepare for the shift to the world of containerization, multi-cloud and object storage.



    Register today for this 30-minute demonstration of the Hedvig solution.

    We’ll show how Hedvig can help enable modern, cloud-enabled storage strategies that offer elasticity and near-infinite scale—all while reducing costs.
  • Formation de sensibilisation à la sécurité /dernière ligne de défense / Français
    Formation de sensibilisation à la sécurité /dernière ligne de défense / Français
    Quentin Habert, Expert en cybersécurité, France & région SEMEA, Proofpoint May 26 2020 12:00 pm UTC 34 mins
    Les cybercriminels peaufinent continuellement leurs techniques d'ingénierie sociale au moyen de leurres et de stratagèmes élaborés avec soin, qui piègent même les utilisateurs les plus avisés.

    D'après les études menées par Proofpoint, 99 % des attaques requièrent une action quelconque de la part de vos utilisateurs : cliquer sur un lien, saisir leurs identifiants ou encore exécuter le code.
    Comment mieux vous protéger vous-même, votre entreprise et vos utilisateurs ?

    Rejoignez-nous pour découvrir comment nous appliquons l'expertise de Proofpoint dans le domaine de la sécurité de la messagerie électronique à nos solutions de formation et de sensibilisation à la sécurité informatique pour réduire les risques associés à vos utilisateurs.

    Dans ce webinaire, vous découvrirez comment :
    • évaluer votre vulnérabilité aux attaques via le principal vecteur de menaces, les emails ;
    • proposer un programme de sensibilisation à la sécurité informatique personnalisé pour encourager de nouveaux comportements et transformer vos utilisateurs en dernière ligne de défense robuste ;
    • encourager vos collaborateurs à signaler rapidement tout email suspect en un clic ;
    • automatiser vos mesures de réponse aux incidents de sécurité suite aux signalements d'emails suspects, afin de gagner un temps précieux et de bloquer les attaques grâce à la solution Closed-Loop Email Analysis and Response (CLEAR).


    Proofpoint, Inc. (NASDAQ:PFPT) est une entreprise leader dans le domaine de la cybersécurité qui protège les ressources les plus importantes et les plus à risques des entreprises : leurs collaborateurs. Les grandes entreprises de toutes tailles, y compris plus de la moitié des entreprises de l’index Fortune 100, font confiance à Proofpoint pour diminuer leurs risques les plus critiques en matière de sécurité et de conformité via les emails, le cloud, les réseaux sociaux et le Web.

    Présenté en Français.
  • Endpoint Protection - Protection across a dramatic increase in remote workers
    Endpoint Protection - Protection across a dramatic increase in remote workers
    Scott Robertson - Sales Engineer May 26 2020 12:00 pm UTC 50 mins
    Endpoint Backup has often been assumed too complicated to implement & manage. Organisations have therefore decide not to protect laptop data and expect users to use shared storage only. This no longer meets the demands of the modern day, remote, workforce and puts organisational data at risk! Add to that now the worldwide directive with almost all users working from home, this puts organisations without Endpoint protection at an even higher risk. This webinar is designed to show how simple protecting Endpoint devices can be and highlights the added advantages such as Self Service Restore, Sharing, Encryption, DLP, Remote Wipe and more.
  • BP/BrightKnight Webinar - Use cases in Customer Service using SAP
    BP/BrightKnight Webinar - Use cases in Customer Service using SAP
    John Bailey, Blue Prism; Arvid Aendenboom, BrightKnight & Fred Versyck, BrightKnight May 26 2020 1:00 pm UTC 60 mins
    SAP is a powerful software suite, used extensively in many corporations of all sizes across the globe. BrightKnight have come across many business processes executed in SAP. Many of them have a tremendous potential for automation with Blue Prism. During this webinar we will focus on two of them.
    Focus will be on how we went about the automation journey and on the benefits realized with these processes. Furthermore, we will also share a quick word on how we tackled this from technical standpoint.

    Both use cases focus on Customer Service in the utilities sector, specifically customer data quality. SAP relies on verified and correct customer data to work as intended; this is where automation comes in. A significant amount of manual work was spent on simple checks to verify how a client contract should be handled. Now all this preparation is done by a Blue Prism robot and the manual work focuses on handling the actual contract.
    In another use case, the aftercare of a mass migration of data is being done. It wasn’t technically feasible to couple incoming clients with existing clients and therefore RPA came into the picture. Due to the implementation of this Blue Prism robot, business could take the correct decisions in handling the rest of the cases.
  • Modern Data Experience for Financial Services [SPANISH]
    Modern Data Experience for Financial Services [SPANISH]
    Douglas Wallace, Leo Higuera and Ernesto Piñeros May 26 2020 2:00 pm UTC 60 mins
    Pure Storage, líder en almacenamiento Tier1, estará exponiendo como su plataforma de datos Todo-Flash trae una experiencia moderna para los usuarios y clientes del sector financiero. Nuestros especialistas estarán presentando como acelerar aplicaciones de negocios de como SAP y Bases de Datos, implementar una infraestructura con alta seguridad, protección de data y disponibilidad para Contendedores, Virtualización de Escritorios e Servidores.
  • Integrating Cloud Storage Into Post-Production and Content Creation Workflows
    Integrating Cloud Storage Into Post-Production and Content Creation Workflows
    Jim McKenna, Facilis Technology, Workflow Storage & Management May 26 2020 4:00 pm UTC 30 mins
    High-performance shared storage networks are the backbone of production and post-production facilities. The ability to share media assets effectively across multiple edit suites and artists can make all the difference when it comes to making a delivery date or meeting budget.

    Facilis is a leading international supplier of premium shared storage solutions for collaborative media production across all content creation workflows. The company, which utilizes an optimized shared file system for editorial performance, is now incorporating Wasabi hot cloud storage into its HUB Shared Storage system to offload expensive tier 1 storage to lower cost cloud storage when assets are no longer needed in the immediate editorial process. Wasabi also delivers an external content repository that can be accessed from anywhere and enable artists to continue work remotely when necessary.

    This webinar will show how Facilis HUB users can leverage Wasabi hot cloud storage to better manage overall storage costs, protect against local disasters with an off-site replicated store of data, and provide external access to media files for remote workers.
  • New Cloud Services Opportunities w/ S3 Object Storage and VMware Cloud Director
    New Cloud Services Opportunities w/ S3 Object Storage and VMware Cloud Director
    Benjamin Wold is Sr. Solution Engineer at VMware // Grant Jacobson is Director of Technology Alliances at Cloudian May 26 2020 5:00 pm UTC 55 mins
    Learn about new high-value Cloud services opportunities with Cloudian S3 Object Storage, now integrated with VMware Cloud Director. New storage-based services include: S3 Storage-as-a-Service, Backup and Archive-as-a-Service, Ransomware Protection-as-a-Service, among others.

    Topics include:

    • Object Storage and VMware Cloud Director Integration
    • As-a-Service offerings and use cases
    • Technical demos
    • The economics of object storage
    • Key market trends

    Speakers:
    Benjamin Wold, Senior Solution Engineer, VMware Cloud Provider Program
    Grant Jacobson, Director of Solutions, Cloudian

    Benjamin Wold is Sr. Solution Engineer at VMware. He has 20 years of experience as a storage Solution Architect specializing in VMware integrations. He is a contributor to published book, “Ideal Platforms for Optimizing IT Workloads”.

    Grant Jacobson is Director of Technology Alliances at Cloudian, based in San Mateo, California. With a career spanning enterprise software, data storage, compute and networking, he currently manages partnerships, solution development and joint marketing with VMware and other enterprise alliances. He holds Bachelors and Masters degrees from the University of Texas.
  • Tanzu Service Mesh 0-60 in 60 minutes
    Tanzu Service Mesh 0-60 in 60 minutes
    Niran Even-Chen, Field Principal SE; Oren Penso, Lead Solution Engineer, Kubernetes May 26 2020 5:00 pm UTC 60 mins
    Tanzu Service Mesh, is it a network solution or an application platform? Maybe it’s a security solution? Actually, It's all of the above.
    In this session, we will explore the possibilities with this platform VMware is building. And as it goes with us, we will have demos!
  • CDW StudioCloud: From Render Origin Story to Powering Remote Artists
    CDW StudioCloud: From Render Origin Story to Powering Remote Artists
    Joe D’Amato, Senior M&E Solution Architect, CDW; Kris Kostiuk, Global Director, Business Development – M&E, CDW May 26 2020 5:00 pm UTC 45 mins
    Render more business value.

    Designed specifically for the media & entertainment industry, StudioCloud takes the burden of technology off your hands to let you focus on creating great work. With over 100,000 render cores and seven data centers across North America, we offer a completely secure, fully managed and infinitely scalable solution for studios of any size. Plus we are TPN/MPAA-audited for production security peace of mind.

    Flexible rental terms allow StudioCloud users to quickly scale up the render, storage, and artist workstation capacity they need and stay within the term length allocated to their projects. Leverage a hybrid of rental, rent-to-own, reserved capacity and straight ownership paired with StudioCloud co-location to bring all of your software and technology infrastructure together under one managed solution without altering your production pipeline.

    Select the location you want to render, connect to our animation/VFX render purpose built data centres via dark fibre and light up render capacity with the look, feel and security of being on your premises. If access to talent and tax credits means you need to shift locations, just scale up capacity and remote artists at a new StudioCloud site. If your nodes are idle, you can sub-lease them via our StudioCloud Exchange.

    Leverage StudioCloud for greater performance and flexibility while rendering more business value for your studio.
  • How LTE and 5G Can Help Financial Businesses Stay Operational During COVID-19
    How LTE and 5G Can Help Financial Businesses Stay Operational During COVID-19
    Cradlepoint's Dee Dee Pare, Senior Product Marketing Manager May 26 2020 6:00 pm UTC 60 mins
    To adapt from the impacts of COVID-19, many financial organizations are limiting access to appointment only and having employees work from home. This is increasing the financial industry’s reliance on online tools and alternate ways to reach customers. Cellular wireless can play a role in helping organizations deliver secure, reliable network access and Wi-Fi and enabling an agile response to customer service and business operations challenges.

    Join Cradlepoint’s Dee Dee Pare’, Senior Product Marketing Manager, and Aaron Maben, Corporate Security Solutions Engineer, to learn how Cradlepoint’s LTE-enabled networking solutions can help financial industries to:

    — Securely access and send information, such as client data and other transaction or trade data, without interruptions or downtime.

    — Access redundant connectivity for ATMs and self-serve kiosks for 24x7 uptime.

    — Isolate networks for projects needing rapid installation and IoT that can be quickly re-deployed as needed.

    — Use online tools and applications so employees can assist customers from anywhere.

    — Set up devices such as thermal temperature readers in lobbies.
  • Bringing HPC Expertise to Cloud Computing
    Bringing HPC Expertise to Cloud Computing
    Earl Joseph, CEO, Hyperion Research & Alex Norton, Principal Technology Analyst and Data Analysis Manager May 26 2020 7:00 pm UTC 60 mins
    High performance computing (HPC) users reported that within the next year and a half, ~20% of their AI workloads will be running in the cloud. A third of the respondents indicated that access to specialty hardware or software was a major driving force in their decision. In this session, the Hyperion Research team will share their findings on AI and HPC in the Cloud, along with information about Dell Technologies' opportunities. Register today to learn more.
  • Linfox CX: automate customer onboarding with Hybrid Integration
    Linfox CX: automate customer onboarding with Hybrid Integration
    Alok Rao, Linfox May 27 2020 12:00 am UTC 75 mins
    Need to reduce customer on-boarding costs?

    Join this webinar and hear how Linfox identified the need for more integrated processes to enhance their customer on-boarding process to reduce time and cost whilst ensuring service delivery agreements were kept.

    Organisations Success Starts With An Integrated Customer Experience.

    Assisting organisations to transform your customers experiences is our primary mission, and at the heart of delivering this mission is our core integration technology.

    webMethods Hybrid Integration - the technology platform upon which Linfox can run a world class supply chain, supported many objectives to run more efficient processes.

    • Customer order visibility - increase customer satisfaction
    • Reduce on-boarding time - Shorter time to revenue
    • Reduce on-boarding costs - Increase in new customer wins
    • Reduce IT costs – streamlining IT infrastructure by automating processes
    • Simplify mapping specifications - reduced time for change requests from hours to minutes

    It's the experience you create for your customers that entrench your brand in their personal identity.
  • The Power of Prevention - How to Defeat APT29 MITRE ATT&CK
    The Power of Prevention - How to Defeat APT29 MITRE ATT&CK
    Tom Pace | Robert Collins | Jason Duerden, BlackBerry Spark | Brett Callaughan, AttackIQ May 27 2020 1:00 am UTC 60 mins
    Modern problems require modern solutions.

    Attackers primarily targeted endpoints in 70% of successful breaches. Enterprises today face an increasingly chaotic environment where cyberthreats are ever-more sophisticated and pervasive. At the same time, enterprise endpoints and the amount of data shared at the edge are growing exponentially. Together, cybersecurity threats and endpoint chaos are putting organizations at risk while cutting into employee productivity and increasing IT costs.
    Join industry leaders as they discuss how to leverage true artificial intelligence, machine learning and automation to provide improved cyber threat prevention and remediation, all while offering visibility to help you manage all endpoints with the highest level of security.

    Presented by:
    - Tom Pace, VP Global Enterprise Solutions, BlackBerry Cylance
    - Jason Duerden, Managing Director, BlackBerry Spark, Australia & New Zealand
    - Rob Collins, Technical Director, Australia and New Zealand, BlackBerry Cylance
    - Brett Callaughan, Senior Engineer, APAC, AttackIQ

    Speaker bios:

    Tom Pace is the VP of Global Enterprise Solutions at BlackBerry. In this role, Tom ensures best-in class services delivery as well as technical expertise throughout the entire service offering life cycle.

    Robert Collins is responsible for leading the Pre-Sales Systems Engineering team in Australia and New Zealand.  With 15 years in the Cyber Security Industry Rob has a wealth of knowledge and experience. 

    As Managing Director for BlackBerry’s Spark Division, Jason Duerden is responsible for building and executing the business in Australia and New Zealand (ANZ). In this region, he drives strategy, operations and growth of BlackBerry’s next-generation platform, BlackBerry Spark.

    Brett Callaughan, Senior Sales Engineer for AttackIQ, is responsible for enabling the company’s partners and customers across Asia Pacific to fully leverage the AttackIQ Platform.
  • Keep Connected Series Episode 2: Keep Contact Centres Connected
    Keep Connected Series Episode 2: Keep Contact Centres Connected
    Craig Palmer, John Greenwood, Nick Simms and Cary Cusumano. May 27 2020 3:00 am UTC 49 mins
    Welcome to ‘Keep Contact Centres Connected’.

    The ‘Keep Connected’ series was created to help businesses achieve continuity – and even discover better ways of working – in today’s increasingly uncertain landscape. In the second instalment, our panellists will be discussing how to keep contact centres connected and in touch with customers.

    In light of recent events, contact centres have been facing new pressures and have been all the more crucial to how organisations reach their audience. At the same time, contact centre teams are adapting to working from home and new processes.

    In this webinar, our online panellists will be talking you through the steps to take when your contact centre is adapting to change. They’ll be discussing fundamental considerations around whether your environment is set up to allow home workers to take payments, as well as practical challenges, for example, if your employees have the right equipment at home to enable them to do their jobs.

    They’ll also be exploring how to use social channels and automation to improve response times, and looking at the customer experience as a whole.

    Join us, as our panellists explore the key considerations in keeping contact centres connected in unusual times.

    Moderator:
    Craig Palmer – Director of Contact Centre Solutions, Verizon EMEA.

    Panellists:
    John Greenwood – Director of Thought Leadership, Compliance3 Limited.
    Nick Simms – Operational Resilience Director, Cornwood Consulting.
    Cary Cusumano – Customer Experience Designer, Verizon.
  • Schützen Sie Ihr Unternehmen vor DDoS-Angriffen
    Schützen Sie Ihr Unternehmen vor DDoS-Angriffen
    Walo Weber, Sales Engineering Manager May 27 2020 8:00 am UTC 60 mins
    2019 wurde der größte jemals aufgezeichnete DDoS-Angriff verzeichnet. In diesem Webinar lernen Sie die verschiedenen Arten von DDoS-Angriffen kennen, auf welche Branchen und Regionen abgezielt wird und warum Beharrlichkeit zur neuen Norm wird.

    Nehmen Sie an diesem Webinar teil um sicherzustellen, dass Sie bereit sind mit den Arten von DDoS-Angriffen umzugehen, die wir 2019 erlebt haben.
  • Weg mit isolierten Prozessen und Silos – hin zur operativen Exzellenz!
    Weg mit isolierten Prozessen und Silos – hin zur operativen Exzellenz!
    Elke Bastian, ARIS Product Marketing and Tom Thaler, ARIS Product Management, Software AG May 27 2020 8:00 am UTC 75 mins
    Gibt es Optimierungsbedarf für die Zusammenarbeit zwischen den Abteilungen in Ihrem Unternehmen? Sind die Verantwortlichen für die zentralen Unternehmensprozesse bekannt? Sollte die Effizienz des operativen Betriebs verbessert werden? Dann ist unser Webinar zum Thema Prozessmanagement genau das Richtige für Sie! Mithilfe von Prozessmanagement schaffen Sie Transparenz und etablieren Standardabläufe für die Ausführung Ihrer Aufgaben. Das Webinar ist konzipiert für Führungskräfte und Teams, die Silodenken hinter sich lassen wollen indem sie Prozesse beseitigen, Betriebsabläufe rationalisieren und ein zentrales Repository als „Single Source of Truth“ aufbauen. Unsere Experten zeigen Ihnen, wie Sie dank Prozessmanagement Ihre Prozesse ganz einfach optimieren und straffen und gleichzeitig die Kosten senken. Sie erfahren, wie Sie Prozesse mit einem Prozess-Repository als „Single Source of Truth“ schneller anpassen und skalieren und sich auf die Einführung neuer Prozesse vorbereiten. Lassen Sie sich von unseren Experten beraten, wie Sie Qualitätsstandards anheben, Audits und Zertifizierungen unterstützen und alle Maßnahmen im Rahmen von Compliance bei der Einhaltung von Gesetzen und Regeln verbessern.
  • The Beginning of the End of Ransomware
    The Beginning of the End of Ransomware
    Chris Evans, Architecting IT; Michael Cade, Veeam; Guy Bartram VMWare; Neil Stobart, Cloudian May 27 2020 9:00 am UTC 73 mins
    Ransomware has been identified by the World Economic Forum as one of the top 5 economic risks, a risk level comparable to global warming. Join this panel session to learn how new technology from Cloudian, Veeam and VMware provides a hardened solution to keep your data safe - whether that be in on-premise data centre or as a Managed Services Provider providing Ransomware Protection as a Service to Enterprise Customers.

    Chair: Chris M Evans, Architecting IT.

    Panelist 1: Neil Stobart, VP Global Systems Engineering - Cloudian
    Panelist 2: Michael Cade, Senior Global Technologist, Veaam Software
    Panelist 3: Guy Bartram, Global Product Marketing, VMware
  • Tausend mal kollaboriert – tausend mal ist nichts passiert
    Tausend mal kollaboriert – tausend mal ist nichts passiert
    Marc Müller, Territory Account Manager May 27 2020 9:00 am UTC 60 mins
    Tausend mal kollaboriert – tausend mal ist nichts passiert
    Phishing-Mails in aufregenden Zeiten

    Während der frühen Tage der Corona-Krise mussten wir uns alle an neue Situationen anpassen. Schulen wurden geschlossen und viele Firmen haben Ihre Mitarbeiter ins Homeoffice geschickt. In dieser Zeit wurden Videokonferenzplattformen und Collaboration-Lösungen zu einem vertrauten Wegbegleiter. Doch dieses Vertrauen wird auch ausgenutzt.

    Bereits Ende März wurden fast 2000 Webdomains neureigistriert, die in direktem Zusammenhang zu Collaboration-Lösungen stehen. Einige davon weisen bereits „bösartige Charakteristiken“ auf und wurden zum Versand von Phishing-Emails genutzt.

    Haben wir in den vergangenen Wochen darauf geachtet, wer der wirkliche Absender der „Einladung“ zur Videokonferenz mit Kollegen, Mitschülern, Freunden oder Familie war?
    Phishing-Emails sind und bleiben das Haupteinfallstor für Angreifer.

    Erfahren Sie mehr, wie FireEye Email Security helfen kann, daß es bei der tausendundersten Mail nicht doch „Zoom“ macht.