Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Claves en la estrategia de gestión datos para protección en puestos de trabajo
    Claves en la estrategia de gestión datos para protección en puestos de trabajo Ivan Abad - Director Técnico Iberia Recorded: Sep 21 2018 23 mins
    Hoy en día, la mayoría de las organizaciones ya tienen una comprensión práctica de cómo gestionar su centro de datos. Sin embargo, a menudo pasan por alto o deciden no enfocarse a los datos que residen en puestos de trabajo o repositorios de información.

    En este webinar, analizaremos cuáles son los impulsores del negocio y los desafíos técnicos asociados a la protección, gestión y control de los datos de usuario, con independencia de la ubicación de los mismos.

    Además te ayudaremos a contestar la pregunta: ¿es suficiente utilizar un servicio de intercambio de archivos en la nube?
  • Data Breaches under GDPR - What you need to know
    Data Breaches under GDPR - What you need to know Marc French, Chief Trust Officer and Data Protection Officer, Mimecast Recorded: Sep 20 2018 22 mins
    Whether you're just starting your compliance journey or feel your house is in order, there's still much to learn and understand about GDPR.

    In this video interview, Mimecast Chief Trust Officer and Data Protection Officer (DPO) Marc French explores issues related to data privacy and breach compliance and how requirements under GDPR impact processes and procedures for organizations across the globe.

    Topics explored include:

    * How aspects of GDPR including data breach notifications and the right to be forgotten actually work

    * The role of the Data Protection Officer under GDPR and their responsibilities

    * What your vendors can do to ease pressures related to organizational GDPR compliance
  • The Next Question: How to Backup Office 365
    The Next Question: How to Backup Office 365 Storage Switzerland, KeepItSafe, Veeam Recorded: Sep 20 2018 63 mins
    The first Office 365 question is, do organizations need to protect their data stored there? The answer is yes, Office 365 data needs protection. Almost every industry expert recommends that organizations take Office 365 protection into their own hands and even Microsoft makes it clear that data is the organization’s responsibility. The problem is those industry experts and Microsoft don’t answer the next question of HOW to backup Office 365 data.

    Register now and learn not only why organizations should back it up but also how they should do it.

    In response to the need for Office 365 protection, vendors have flooded the market with solutions but protecting Office 365 is more than just a “checkbox”. Data in Office 365 has value to the organization, is subject to a variety of compliance regulations, and is the target of cyber-attacks.

    In our webinar Storage Switzerland, Veeam and KeepItSafe compare the various methods for protecting Office 365.
  • Data Protection Solution for Azure Stack
    Data Protection Solution for Azure Stack Parissa Mohamadi - Product Manager - HPE Storage Recorded: Sep 20 2018 21 mins
    As data volumes increase, you look for managing your backup footprints efficiently and cost-effectively within your data centers. There is a move to use public cloud services to take advantage of affordable and flexible data storage, but for many reasons, you may want to keep data on-site. HPE Cloud Bank Storage lowers long-term data retention costs by leveraging cloud-based or on-premises object storage. Come and learn how HPE data protection solutions can protect your data wherever it resides: from on-premises private cloud such as Microsoft Azure Stack to public cloud such as Microsoft Azure.
  • Driving Growth of Sustainable Safety Instrumented Systems
    Driving Growth of Sustainable Safety Instrumented Systems Muthuraman Ramasamy, Industry Director, Frost & Sullivan, Mr. Ian Ramsay-Connell TUV Functional Expert (FSM&SIS) Yokogawa Recorded: Sep 20 2018 58 mins
    Title: Driving Growth of Sustainable Safety Instrumented Systems and Future Proofing Operational Safety

    Subtitle: Plant safety ensures compliance, revenue maximization, and operational cost reduction

    Sustainable Safety Instrumented Systems (SSIS) are a natural evolution of conventional SIS, which allow the key decision makers to optimize their plant’s safety performance without compromising productivity, revenue, and cost. Sustainable SIS incorporates a holistic assessment of operational safety to mitigate and manage risks throughout the lifetime of a plant. It equips all stakeholders to protect businesses from excessive hazard-related downtime. Future growth opportunities will ensure that safety systems in the plant do not become obsolete and help operations run smoothly.

    Frost & Sullivan's Industrial Practice expert, Muthuraman Ramasamy, invites you to join us for the webinar: Driving Growth of Sustainable Safety Instrumented Systems and Future Proofing Operational Safety. Hear about future growth opportunities, followed by a live question-and-answer session.

    Key Takeaways:

    Learn how SSIS can benefit your company
    Understand the challenges using conventional safety instrumented systems
    Identify the need for sustainable safety instrumented systems
    Create lasting value to ensure safety systems are manageable
  • Data Breach: How to Identify the Early Signs
    Data Breach: How to Identify the Early Signs Shiri Margel - Machine Learning Research Manager at Imperva Recorded: Sep 20 2018 40 mins
    With the escalating threat landscape and the exponential growth of data and users, it’s no longer about whether you’ll get breached; it’s about when. The ideal situation would be to detect a data breach at an early stage. The reason why early breach detection is more practical is that often times bad actors are already inside the organization, abusing legitimate permissions to access sensitive data. To quickly detect a potential data breach, we need to be able to identify “early signs” of a breach.

    Join this webinar to learn more about:

    - The challenges of detecting data breaches
    - Why early breach detection is a more practical goal
    - Introducing the data breach kill chain
    - Protecting data in your databases – the importance of defense in depth
  • HPE and Commvault backup: Portuguese Webinar
    HPE and Commvault backup: Portuguese Webinar Junior & Lucas Recorded: Sep 20 2018 68 mins
    launched Nov 30, 2017 - is one of the HPE GreenLake solutions, which are a unique suite of on-premises, consumption-based solutions for customer’s top workloads—big data, backup, database platform, SAP HANA, and edge computing—delivered on demand.
  • Making PKI the foundation of your digital transformation
    Making PKI the foundation of your digital transformation Simon Keates, Business Development Manager, EMEA. Recorded: Sep 20 2018 48 mins
    Chris Ogilvie interviews Simon Keates, Thales eSecurity Business Development Manager, EMEA on one of the hottest security topics in 2018.

    PKI offers organisations the flexibility to create security models, however defining, maintaining and securing PKI is a major risk to enterprises. Key theft, weak controls on keys, and impact on business agility as new applications are on-boarded without due care, are some of the challenges faced by enterprises.

    Join Chris and Simon for the first in our series of “coffee break” webcasts when they will discuss:
    a) The current PKI market, the growth in EMEA and the challenges facing organisations
    b) How enterprises are using PKI to enhance their security posture
    c) How Thales eSecurity is integrating with market leading PKI technology partners to offer a holistic solution for the enterprise
  • Kaspersky Technical Talks Series - Threat Intelligence Portal: How to use it
    Kaspersky Technical Talks Series - Threat Intelligence Portal: How to use it Jibril Hassan, Kaspersky Lab Recorded: Sep 20 2018 28 mins
    Threat Intelligence Services from Kaspersky Lab gives you access to the intelligence you need to mitigate against threats, provided by our world-leading team of researchers and analysts.

    Kaspersky Lab’s knowledge, experience and deep intelligence on every aspect of cybersecurity has made it the trusted partner of the world’s premier law enforcement and government agencies, including INTERPOL and leading CERTs. You too can leverage this intelligence in your organisation today.

    Join Jibril Hassan as he introduces the Threat Intelligence Portal and showcases how to optimise this valuable resource to keep your organisation safe from attacks. Gain some valuable insights to help manage your cyber security with confidence.
  • Your Data: Safe, Accessible, and Optimized - All the Time
    Your Data: Safe, Accessible, and Optimized - All the Time Jaap Van Kleef, EMEA Technical Manager Recorded: Sep 20 2018 56 mins
    Growing data volume, rising cost of downtime and data loss, cyber attacks, limited storage capacity, business continuity, and inadequate backup and recovery performance are among the myriad of challenges that IT teams face today.

    Join this webcast with Jaap Van Kleef, EMEA Technical Manager at StorageCraft and learn about best practices for data protection and disaster recovery.
  • Обзор актуальной схемы лицензирования Commvault
    Обзор актуальной схемы лицензирования Commvault Дмитрий Иванюк, эксперт по решениям Commvault Recorded: Sep 20 2018 41 mins
    Новая схема лицензирования это всегда много вопросов!

    Данный вебинар позволит больше узнать о новой схеме лицензирования и понять как можно быстро и легко сформировать спецификацию за несколько минут.
    Все это- благодаря упрощенной схеме лицензирования!

    Актуальность решения Commvault – да!
    Технологичность решения Commvault – да!
    Простота лицензирования решения Commvault – да!

    И конечно же сессия вопросов и ответов!

    Курс предназначен для BDM, менеджеров по продажам, руководителей проектов, руководителей продаж

    Присоединяйтесь и приглашайте коллег!
    Будем рады актуальным и новым слушателям!
  • Commvault Endpoint Data Protection
    Commvault Endpoint Data Protection Philippe Decherat Recorded: Sep 20 2018 28 mins
    Commvault Endpoint Data Protection, inclus dans son offre Commvault Complete Backup&Recovery réduit les risques de perte de données et sécurise les données sur les postes clients.

    Elle permet de protéger, restaurer et partager les informations conservées sur les postes fixes, les postes mobiles, et dans les offres de partage de fichiers de type cloud ; elle permet également d’assurer des fonctionnalités de conformité des données pour les entreprises soumises à ce type de réglementations. Les données sont protégées des erreurs humaines, des problèmes de hardware, les attaques de malware et ramsomware.

    Cette offre est disponible sous forme logicielle ou de Backup-as-a-Service par Commvault.

    Rejoignez-nous lors de ce webinaire pour découvrir les avantages de Commvault Endpoint Data Protection.
  • Obi-WAN: Simplify Your WAN like a Jedi
    Obi-WAN: Simplify Your WAN like a Jedi Justin Ong, Klaus Gheri, Simon Lok Recorded: Sep 19 2018 55 mins
    With the rise in cloud services along with remote and mobile users, Software-Defined WAN technology can act like the Force to help optimize your WAN and troubleshoot issues with as little sysadmin/Jedi intervention needed.

    On this Video Meetup, we’ll be talking about SD-WAN and how it can increase performance for your users while also increasing visibility and control across your network. We’ll be talking with experts from Barracuda Networks as well as an IT pro from the Spiceworks

    What we're discussing:
    - How SD-WAN works with existing MPLS
    - Using SD-WAN to secure traffic going across your wide network
    - Weighing the cost benefit of SD-WAN
  • Verizon Threat Research Advisory Center - 2018 Payment Security Report
    Verizon Threat Research Advisory Center - 2018 Payment Security Report John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Sep 19 2018 76 mins
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Ron Tosto, Senior Manager, Global Payment Security Practice
    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •Josh Costa, Senior Consultant, Investigative Response – Americas
    •Max Shubin, Senior Analyst, Threat Intelligence

    For this month’s theme: ‘Payment Security Report,’ we'll feature Ron Tosto who'll cover the latest thought leadership from Verizon, the 2018 Payment Security Report (PSR). The PSR offers industry research on the global payment security landscape. The report highlights the need for effective data protection and provides details on improving security control effectiveness.

    John Grim and Josh Costa will then cover two (2) 2018 Data Breach Digest scenarios: one involving an ecommerce breach and the other a Point of Sale (PoS) intrusion. Max Shubin will provide insight to our recent caseload. Finally, Dave Kennedy will complete this month's briefing with:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to payment card related data breaches that you'd like us to cover on the call, please send them to the following email address prior to September 14, 2018:


    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Messaging Security - Schutz Ihrer E-Mail in der Cloud und vor Ort
    Messaging Security - Schutz Ihrer E-Mail in der Cloud und vor Ort Ramin Ghassemi, Hakan Arslanboga Recorded: Sep 19 2018 62 mins
    E-Mail ist die Lebensader Ihres Unternehmens, aber auch eines der häufigsten Einfallstore für zielgerichtete Angriffe. Der Komfort, den Office 365, Gmail und andere cloudbasierte Produktivitätstools bieten, erhöht die Anfälligkeit Ihres Unternehmens. Schützen Sie es mit unserer Messaging Security-Plattform für cloudbasierte und On-Premises-E-Mail selbst vor den komplexesten Bedrohungen.  
  • Targeted Attacks: A Review of Current Trends and Future Developments
    Targeted Attacks: A Review of Current Trends and Future Developments David Emm, Principal Security Researcher, Kaspersky Lab (Global Research & Analysis Team) Recorded: Sep 19 2018 46 mins
    Targeted attacks are now an established part of the threat landscape and in 2017 the headlines were full of news about sophisticated attacks of all kinds. Some were highly-targeted, others affected many businesses and quickly reached epidemic proportions. Often the motive was clear - to gather data, to make money, to cause damage and disruption. But sometimes the lines between these became blurred.

    It's clear that organisations of all kinds need to understand and prepare for cyber-threats affecting their sector. And this must start with an understanding of the current threat landscape and how it's likely to develop.

    This presentation will outline the trends we're seeing and offer some predictions for 2018 and beyond - based on our analysis of attacks in 2017.

    About the presenter:
    David joined Kaspersky Lab in 2004. He is a member of the company's Global Research and Analysis Team and has worked in the anti-malware industry since 1990 in a variety of roles, including that of Senior Technology Consultant at Dr Solomon's Software, and Systems Engineer and Product Manager at McAfee.

    In his current role, David regularly delivers presentations on malware and other IT security threats at industry events, highlighting what organisations and consumers can do to stay safe online. He also provides comment to broadcast and print media on the ever-changing cyber-security and threat landscape. David has a strong interest in malware, ID theft and the human aspects of security, and is a knowledgeable advisor on all aspects of online security.

    David is regularly mentioned in national print press as a cyber-security expert and has a wealth of experience in being filmed for such programmes as Good Morning Britain and BBC News.
  • How to protect against IoT security attacks and next generation cyber crimes
    How to protect against IoT security attacks and next generation cyber crimes Orla Cox, Director Security Response, Symantec Recorded: Sep 19 2018 43 mins
    Cyber criminals and targeted attack groups alike continue to hone existing methods and identify new channels of infection in order to ensure success. On the heels of WannaCry, Worms continue to experience a renaissance, spreading aggressively across corporate networks.

    As vulnerabilities on desktop computers become increasingly rare, attackers need to look to new channels and new platforms for infection, with IoT becoming an increasingly attractive proposition.

    In this webinar you will learn:

    • How cybercriminals are diversifying in order to remain profitable
    • The new methods of threat propagation causing headaches for organizations
    • The next generation of IoT threats
    • Recent targeted attack campaigns
  • The DevSecOps Journey: Why It Starts with Agile DevOps & App Security
    The DevSecOps Journey: Why It Starts with Agile DevOps & App Security Jaweed Metz, Principal, Products at Contrast Security Recorded: Sep 18 2018 45 mins
    DevSecOps is best viewed as a journey that enlightened organizations are starting to embark on.

    The major constituent to consider on this journey is ensuring that organizations defenses have been properly configured, implemented and operated–to that end, application security testing is of paramount importance. As businesses strive to rapidly release code in order to satisfy customer demands and gain a competitive advantage,security must work in tandem with Agile DevOps processes.

    Traditionally, security has been an afterthought, or at the very least introduced late into the release process.Hence, security has been viewed as an impediment to high velocity Agile DevOps processes and becoming a primary bottleneck in the software delivery pipeline.This can cause major contention and distrust between development and security teams–but that doesn’t need to be the case.

    Cyber threats are continuous–so shouldn’t development and security practitioners work in tandem in order to deliver and deploy code securely and continuously?The cultural, differences between development and security teams needs to be addressed and a unified approach established in order to integrate security as early as possible.Automated application security addresses these cultural, technical and process issues.

    This webinar will highlight how modern, automated application security tools can help weave security into the code continuously and accurately throughout the SDLC.Automated application security enables the real-time identification and response to new attacks and vulnerabilities that emerge in custom and third party code. Additionally, we will discuss how integrated application security unites developers and security practitioners with the tools they are already using so that they can work even more effectively.
  • How To Prevent and Recover from a Cyber Attack
    How To Prevent and Recover from a Cyber Attack Jeannine Gaudreau, Director of Information Security, Carbonite and Johnathan Ferrick, Sr. Product Manager, Carbonite Recorded: Sep 18 2018 64 mins
    Threats to your backup infrastructure continue to rise – the data that resides there and the applications it has access to are a prime target for a cyber-attack. At Carbonite, we’ve helped over 10,000 customers prevent or recover from cyber attacks in their many forms but even we are not immune to attacks.

    Join our webinar and hear from our own head of cyber security, Jeannine Gaudreau, about tactics we use at Carbonite to prevent and recover from a cyber security event. We will also have a question and answer session where we discuss a few different case studies and how we’ve employed similar tactics to assist our customers.
  • Why Cloud Migrations Fail - Learn the Keys to Cloud Success
    Why Cloud Migrations Fail - Learn the Keys to Cloud Success Storage Switzerland and SoftNAS Recorded: Sep 18 2018 59 mins
    Many cloud migration and cloud first strategies fail to live up to expectations. The problem is organizations spend too much time on micro issues like product selection and not enough time on big picture items like the cloud strategy's foundation. In our live webinar, Storage Switzerland and SoftNAS will discuss the problems these different cloud projects create, and how to create a foundation for your cloud strategy that guarantees success. All registrants receive a copy of Storage Switzerland's latest eBook "Developing a Holistic Cloud Strategy".
  • Ensuring Pop-Up & Mobile Connectivity for Field Workforces
    Ensuring Pop-Up & Mobile Connectivity for Field Workforces Ken Hosac, Vice President of IoT Strategy, Cradlepoint Recorded: Sep 18 2018 59 mins
    The widespread trends of IoT, technology-dependent field workforces, connected vehicles, and temporary retail sites are driving the need for pop-up and mobile network connectivity that is secure, easy to deploy, and can be monitored and managed from a central location.

    Scenarios including insurance companies during disaster response; short-term, seasonal businesses; construction offices; police and fleet vehicles, and one-time events all call for highly available WAN links, as well as remote visibility that doesn’t require on-site IT experts.

    Join Cradlepoint’s Ken Hosac, Vice President of IoT Strategy, for a live webinar to explore how enterprises are leveraging cloud-managed, 4G LTE network solutions to provide secure, always-on connectivity across an array of industries and use cases.

    Hosac has helped drive Cradlepoint’s growth and development through roles in strategic planning, product management, solution strategy and thought leadership. He frequently represents the company at industry conferences and events, and served on the original Advisory Board for the IoT/M2M Evolution Magazine. Hosac has 25 years of experience in marketing, sales, R&D and manufacturing. Prior to joining Cradlepoint, he served as VP of Marketing for Casabyte (later acquired by JDS Uniphase). He also served as VP of Business Development for GoAhead Software (later acquired by Oracle). Hosac earlier spent 10 years at Hewlett Packard with cable modems and head-ends, set-top boxes, and personal computers in a variety of engineering and engineering management roles. He holds a B.S. degree in Electrical Engineering and an M.S. degree in Manufacturing Engineering, both from Stanford University.
  • Keeping Up with Advanced Attackers: Understanding Threats and Adapting Defences
    Keeping Up with Advanced Attackers: Understanding Threats and Adapting Defences Alister Shepherd, Mandiant Director, EMEA Recorded: Sep 18 2018 42 mins
    An organization suffering a breach is no longer a question of "if," but "when" and "how big." Attackers are becoming more sophisticated in exploiting vulnerabilities, acquiring hacking tools on the dark web and leveraging automation, making traditional defense strategies antiquated and obsolete.

    Join Alister Shepherd, our Mandiant Director for EMEA, for insights into:
    - Recent APT intrusion activity from different regional threat actors,
    - Current attack techniques that have been successful during these intrusions,
    - Detections and investigations conducted by Mandiant,
    - Lessons learned for defenders.
  • [Ep.21] Ask the Expert: Ethics in AI
    [Ep.21] Ask the Expert: Ethics in AI Alexey Malanov, Malware Expert, Kaspersky Lab Recorded: Sep 18 2018 49 mins
    This webinar is part of BrightTALK's Ask the Expert series.

    Alexey Malanov joined Kaspersky Lab in 2004, where he began his work as a virus analyst. He has since been appointed Head of Kaspersky's Anti-Malware Team and in 2012, shifted his focus to analyzing technology trends and risks.

    The threat posed by a Strong AI (artificial intelligence where the machine's intellectual capability is functionally equal to a human's) is well-considered in many science fiction films. But the invention of a Strong AI will take many years, so we can afford not to hurry with the study of "laws of robotics."

    However, we are already facing growing concerns. The use of machine learning in various fields has shown that algorithms often make strange, discriminatory and difficult-to-understand decisions. Moreover, it has been clearly demonstrated that a person can cheat algorithms to achieve desired results.

    Alexey addresses some of the looming issues surrounding the AI algorithms that are becoming a part of our daily lives, and will increasingly affect us and our decisions.
  • A Data Breach Prevention, Detection & Response Strategy to Combat Todays Threats
    A Data Breach Prevention, Detection & Response Strategy to Combat Todays Threats Nick Frost, Principal Consultant, ISF LTD Recorded: Sep 18 2018 47 mins
    With the ever-increasing frequency and sophistication of security threats to organisations, business leaders need to have a comprehensive data security strategy to protect themselves. Information security practitioners have to think and plan beyond existing protection capabilities that are aimed at preventing threats only. Today's cyber security strategies need to protect an organisations mission critical assets in a way that is:

    ‒ balanced, providing a mixture of informative, preventative and detective security controls that complement each other
    ‒ comprehensive, providing protection before, during and after threat events materialise into security incidents
    ‒ end-to-end, covering the complete information life cycle.

    This will enable organisations to match the protection provided with the sophistication of threats to such mission critical information assets. This webinar will look at past and present models and share ideas on how organisations can ‘future proof’ their strategies to combat next generation threats.

    In particular in this webinar, Nick Frost, Principal Consultant at the ISF will discuss what actions can be taken to identify your most critical information assets, and how a modern day cyber security model needs to focus on prevention and detection of a data breach, and how to respond to a breach in order to reduce damage to brand and reputation.
  • Symantec CASB - Cloud Access Security Broker (CASB) - CLOUD SECURITY
    Symantec CASB - Cloud Access Security Broker (CASB) - CLOUD SECURITY Martin Krömer, Regional Director CEEUR Cloud Security, Symantec (Deutschland) GmbH Sep 24 2018 12:00 pm UTC 75 mins
    Nutzen Sie Cloud-Anwendungen und -Services auf sichere Weise, während Ihr Unternehmen dabei sicher, geschützt und richtlinienkonform bleibt.
    Erhalten Sie Einblick in die Schatten-IT, Kontrolle über Ihre Daten in Cloud-Anwendungen sowie Schutz vor Bedrohungen, die auf Cloud-Benutzerkonten abzielen – mit der Lösung, die Forrester als "Leader" im Bereich Cloud Security Gateways bezeichnet.
  • Leveraging the Power of the Cloud to Protect VMware Data
    Leveraging the Power of the Cloud to Protect VMware Data Steven Hill Senior Research Analyst, 451 Research Sep 24 2018 2:00 pm UTC 60 mins
    Please join us for this interactive webinar with a special guest speaker Steven Hill, Senior Analyst at 451 Research, where we discuss:
    - Virtualization and cloud adoption trends, usage and business drivers
    Data protection and instant disaster recovery for VMware workloads on-premises and in the cloud
    - How a unified data protection solution can help decrease costs, by reducing both hardware and complexity
    - Other benefits of direct integration with vSphere & VMC (VMware Cloud on AWS)
  • Managed Defense – Schützt auch vor gut getarnten Hackeraktivitäten
    Managed Defense – Schützt auch vor gut getarnten Hackeraktivitäten Florian Siebert, Senior Systems Engineer, Global Services & Intelligence Sep 25 2018 8:00 am UTC 60 mins
    FireEye Managed Defense greift auf langjährige Erfahrung aus unseren Mandiant Incident Response Einsätzen zurück: wir nutzen die Daten und Erkenntnisse aus der Abwehr realer Angriffe, um Bedrohungen schneller zu erkennen und abzuwehren. Dadurch können wir Ihnen einen unternehmensweiten Überblick von Bedrohungen in Ihrem Netzwerk in Echtzeit geben und die Fähigkeit Ihres bestehendes CERT, Security Operation Center oder Sicherheitsteams ergänzen oder erweitern.
  • Neuer OneXafe: nächste Generation für konvergierten Speicher und Datensicherung
    Neuer OneXafe: nächste Generation für konvergierten Speicher und Datensicherung Ivonne Ehle, DACH Sales Engineer - SCME, Certified Trainer Sep 25 2018 9:00 am UTC 60 mins
    Das Wachstum virtualisierter Anwendungen, immer kleinere Backup-Fenster und ein explosionsartiges Datenwachstum haben die Anforderungen an die Datensicherheit und die Speicherinfrastruktur enorm belastet. Backup- und sekundäre Speicherinfrastrukturen kommen oft von mehreren Anbietern, was die Kosten erheblich steigert, betriebliche Ineffizienzen erhöht und zu Datensilos führt, wodurch die zentrale Verwaltung immer komplexer wird.

    Registrieren Sie sich für unseren Webcast und erfahren Sie, wie Sie mit der neuen konvergenten Datenplattform StorageCraft OneXafe Ihre Daten in heterogenen Umgebungen besser schützen und verwalten
  • How to create the self belief and self confidence to sell brilliantly
    How to create the self belief and self confidence to sell brilliantly Leigh Ashton Sep 25 2018 10:00 am UTC 30 mins
    Key Takeaways:

    This webinar is for you if you struggle with sales or specific sales activities and will open the door to understanding how you get in your own way of sales success...and how to develop a winning sales mindset that attracts success!

    Reasons to Attend:

    -Discover how your thoughts impact on your sales results
    -Learn how to identify your inner barriers...and how to eliminate them
    -Create your personal way of generating consistently great sales

    Many people feel uncomfortable selling. Part of it is to do with rejection – people saying “no” to you.

    Another part of it is to do with ethics – we don't want to be seen to be taking people's money!

    However, selling is not what it used to be.

    You can only succeed – in the long term - if you give value and help customers.
  • 7 cybersecurity improvements resulting from an EDR project
    7 cybersecurity improvements resulting from an EDR project Oleg Glebov, Senior Product Marketing Manager, Kaspersky Lab Sep 25 2018 2:00 pm UTC 75 mins
    EDR technology has been an unceasing topic of conversation over the past 3 or 4 years. Meanwhile, we at Kaspersky Lab have become aware, in our interactions with enterprise organizations, of serious levels of overall dissatisfaction with the outcomes of investment in EDR. Let's try now to understand the main reasons for this, while looking at typical use cases and key enterprise scenarios. The webinar will cover:
    •Drivers of EDR implementation
    •EDR vs Next Generation EPP vs Advanced EPP
    •Key benefits and advantages
    •Use cases of EDR functionality: Integrated Endpoint Protection, Augmentation of the Incident Response process, Automation of the anti-APT solution reaction phase
    •EDR project business justification
  • Increase Performance with KPIs for Security Operations and Incident Response
    Increase Performance with KPIs for Security Operations and Incident Response John Moran, Senior Product Manager at DFLabs,and Mike Fowler, CISSP, Vice President of Professional Services at DFLabs Sep 25 2018 3:00 pm UTC 51 mins
    Security operations KPIs vary from organization to organization. To be effective, it is crucial that KPIs are selected based on the SMART criteria.

    KPIs provide the critical information required to make fact-based decisions. However, tracking too many KPIs can become a burden to analysts.

    Join our new webinar to discover the best practices for Key Performance Indicators (KPIs) for Security Operations and Incident Response.

    Key takeaways:
    - Why are KPIs important?
    - How to choose the best KPIs?
    - How many KPIs are appropriate to measure?
  • Migrating Data from SAN, NAS or Tape to Object Storage
    Migrating Data from SAN, NAS or Tape to Object Storage John Bell, Sr. Consultant and Eric Dey, Director of Product Management Sep 25 2018 6:00 pm UTC 60 mins
    Get behind-the-scenes’ insight into how to migrate data from SAN, NAS or tape to an Object-Based Storage solution. John Bell, Sr. Consultant, and Eric Dey, Director of Product Management, will share their experience from hundreds of successful object storage implementations. They will explain the ins and outs of the data migration process and share best practices to help you move from a limited traditional storage approach to the new, cost-effective, limitless storage paradigm of object storage.
  • How to Avoid Disasters via Software-Defined Storage Replication & Site Recovery
    How to Avoid Disasters via Software-Defined Storage Replication & Site Recovery Augie Gonzalez, Director of Product Marketing, DataCore Software Sep 25 2018 6:00 pm UTC 60 mins
    Shifting weather patterns across the globe force us to re-evaluate data protection practices in locations we once thought immune from hurricanes, flooding and other natural disasters.

    Offsite data replication combined with advanced site recovery methods should top your list.

    In this webcast and live demo, you’ll learn about:
    • Software-defined storage services that continuously replicate data, containers and virtual machine images over long distances
    • Differences between secondary sites you own or rent vs. virtual destinations in public Clouds
    • Techniques that help you test and fine tune recovery measures without disrupting production workloads
    • Transferring responsibilities to the remote site
    • Rapid restoration of normal operations at the primary facilities when conditions permit

    Attend live for a chance to win a $200 Amazon gift card!*

    *Gift card will be sent within 10 days of the webinar date. Void where prohibited.
  • Manage Oracle e-Biz Suite Cost & Growth with Micro Focus Structured Data Manager
    Manage Oracle e-Biz Suite Cost & Growth with Micro Focus Structured Data Manager Eric Popiel and Luis M Burgos, Micro Focus Sep 25 2018 6:30 pm UTC 60 mins
    Organizations that use Oracle e-Business Suite often find that they have waited too long to implement archiving and data management strategies for their application databases. This reactive approach can be much more costly and difficult to implement when your business begins to experience issues. With the right data management strategy in your Oracle environment, you gain benefits in a range of areas, including application performance, long-term compliance, manageability, and infrastructure costs.

    Micro Focus Structured Data Manager software, with its ‘ready-to-run’ modules, for Oracle e-Business Suite, manages production and related non-production databases that support the Oracle e-Business Suite environment. This allows you to gain the right data management strategy to make sure that your business can remain responsive, while keeping costs under control and meeting data retention and compliance requirements.

    Structured Data Manager helps you:
    ● Archive and manage your Oracle e-Business Suite database and reduce its size
    ● Discover and mask/encrypt sensitive data for GDPR & CCPA compliance and test data management
    ● Manage the lifecycle of your data and comply to privacy laws

    Join this live webcast to understand how your organization can enhance your Oracle e-Busi­ness Suite environment with Micro Focus Structured Data Manager.
  • IT Security’s Offering to Cloud: Enable DevOps with Automated Security
    IT Security’s Offering to Cloud: Enable DevOps with Automated Security Colby Dyess, Director Cloud Marketing & Dan Rheault, Sr. Product Marketing Manager, Tufin Sep 26 2018 3:00 pm UTC 60 mins
    DevOps teams often operate outside the purview of IT security, but security is still necessary in the cloud. IT security can ensure that DevOps teams retain their agility and maintain strong security using automation. By integrating security through automation, the security watchdog now becomes the trusted advisor, helping DevOps enable the business.

    Join this webinar on September 26 to hear Tufin experts Colby Dyess and Dan Rheault discuss how information security operations teams integrate security into a dynamic delivery process. We will cover how to:
    •Find commonalities between information security and cloud teams
    •Gain visibility into cloud security
    •Assess risk within the cloud by leveraging a policy-driven approach
    •Enforce security in CI/CD without impeding application delivery
    Register now to learn how automation enables organizations to align cloud and DevOps with security policies.
  • Live Hacking Using Russia’s Favorite TTPs
    Live Hacking Using Russia’s Favorite TTPs Guy Meoded, Senior Security Researcher at Nyotron and Rene Kolga, Sr. Director of Product Sep 26 2018 4:00 pm UTC 60 mins
    Earlier this year Department of Homeland Security’s US-CERT issued Technical Alert TA18-074A called ‘Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors’. This alert provided information on Russian government actions targeting U.S. Government entities as well as organizations in the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors. It also contained indicators of compromise (IOCs) and technical details on the tactics, techniques, and procedures (TTPs) Russian government cyber actors use to compromise their victims’ networks.

    In this webinar we will go over those TTPs and put them to use. Specifically, we will demonstrate how easy it is to leverage Server Message Block (SMB) protocol authentication session to obtain user’s credential hash and then crack it in real-time revealing the actual password. We will show multiple ways of using this approach and attempt to reproduce Russia’s success in our environment. No product pitches, just good old live hacking!

    About speakers:
    Guy Meoded is a Senior Security Researcher at Nyotron. Prior to Nyotron, Guy was a Trojan Analyst at RSA.

    Rene Kolga, CISSP, is a Sr. Director of Product and Marketing at Nyotron. Rene has over 20 years of industry experience, including expertise in endpoint protection, insider threat, encryption and vulnerability management. Rene run Product teams at multiple Silicon Valley startups as well as Fortune 500 companies, including Symantec, Citrix, Altiris and ThinAir. Earlier in his career, Rene managed Customer Success and QA teams. Rene earned his Computer Science degree from Tallinn University of Technology. He also received an MBA from University of Utah.
  • Using the Cloud to Fix Backup's Blind Spot - Endpoint Data Protection
    Using the Cloud to Fix Backup's Blind Spot - Endpoint Data Protection Storage Switzerland and Infrascale Sep 26 2018 5:00 pm UTC 60 mins
    Many data centers unwittingly have a blind spot in their backup strategy, endpoints like laptops and other devices are left exposed. Most organizations have no formal endpoint data protection strategy even though studies indicate that over 60% of data on endpoints is unique to that device. In most cases, there is no centralized data protection strategy for endpoints.

    IT is counting on users to protect their data, but the reality is that the organization needs a centralized endpoint data protection strategy that fixes backup's blind spot.

    Join Storage Switzerland and Infrascale for a live webinar to learn how to create an endpoint data protection strategy that leverages the cloud to fix the backup blind spot. The webinar also includes a live demo of the solution, so you can see how efficiently IT can protect endpoints without disrupting end users.
  • Dell EMC Data Protection: Innovate without Compromise with the DP4400
    Dell EMC Data Protection: Innovate without Compromise with the DP4400 Adam Brittin, North American Product Line Manager, Data Protection Sep 26 2018 6:00 pm UTC 60 mins
    Transform your data protection strategy with the Dell EMC DP4400. Learn how Dell EMC Data Protection enables you have backups that are simple to manage, powerful no matter the data, along with tools that can provide lower storage consumption and a peace of mind to your data protection environment.
  • The Future Data Center - Live from Hitachi Next!
    The Future Data Center - Live from Hitachi Next! Storage Switzerland and Hitachi Sep 26 2018 7:00 pm UTC 60 mins
    What comes after Data Center Modernization? The future data center is smart. But what is a smart data center, how do you create a smart data center and why would you want to? We'll answer all of these questions on our live webinar roundtable discussion LIVE from Hitachi NEXT2018. Join us as we talk about solutions that can answer questions like:

    •What are the largest cost drivers in my data center?
    •How can IT accelerate my time to market?
    •How do I optimize costs like power and cooling?
    •How can I proactively identify inherent threats and issues?
  • Nouveauté OneXafe: nouvelle génération d'appliances de sauvegarde convergées
    Nouveauté OneXafe: nouvelle génération d'appliances de sauvegarde convergées Florian Malecki, International Sr. Product Marketing Director Sep 27 2018 8:00 am UTC 60 mins
    L'explosion des applications virtualisées, la réduction des fenêtres de sauvegarde et la croissance impressionnante du volume de données ont placé un immense fardeau sur les besoins en matière d'infrastructure de stockage et de protection des données. La situation se complique d’autant plus en raison des environnements de protection des données fragmentés actuels et des besoins de sauvegarde de données physiques et virtuelles, sur site et hors site, qui doivent tous satisfaire des niveaux de service différents (SLA). L'infrastructure de sauvegarde et de stockage secondaire est souvent fournie par plusieurs prestataires. Résultat : une augmentation des coûts d'acquisition et des inefficacités opérationnelles. L'agrégation de tous ces produits entraîne de silos de données difficiles à gérer de façon centralisée. Une vue incomplète du flux de protection des données peut conduire à une hausse des coûts d'exploitation, une perte des données et une incapacité à respecter les SLA ainsi que les réglementations et exigences de conformité propres au secteur.

    Rejoignez StorageCraft pour un webcast exclusif afin de découvrir les avantages de la nouvelle plateforme OneXafe converged storage and data.
  • Firewall Regelwerke ausmisten mit Tufin
    Firewall Regelwerke ausmisten mit Tufin Joachim Nossek , Presales Engineer, Tufin & Thorsten Geissel Senior Systems Engineer DACH,Tufin Sep 27 2018 9:00 am UTC 60 mins
    Ist Ihr Firewall Regelwerk schwerer zu lesen als die Assembler Code?

    Tufin kann Ihnen helfen ein bestehendes Firewall Regelwerk aufzuräumen und von nicht mehr benötigten Regeln und Objekten zu befreien.

    Wir zeigen Ihnen exklusiv welche Werkzeuge Ihnen helfen Transparenz und Compliance sicherzustellen.

    Treffen Sie unseren Systems Engineer Thorsten Geissel in einer Online-Sitzung um mehr über die Best Practices bezüglich der Bereinigung von Firewall Regelwerken zu erfahren:

    •Automatische Entfernung von doppelten oder verdeckten Regeln
    •Effektives Entfernen von Servern, die nicht mehr im Einsatz sind

    Melden Sie sich heute noch an und tragen den Termin in Ihren Kalender ein!
  • New OneXafe: next generation converged storage and data protection
    New OneXafe: next generation converged storage and data protection Florian Malecki, International Sr. Product Marketing Director Sep 27 2018 9:15 am UTC 60 mins
    The growth of virtualised applications, diminishing backup windows, and explosive data growth have collectively placed an immense burden on data protection and storage infrastructure requirements. This complexity continues to be exacerbated by today’s fragmented data protection environments and the need to backup physical and virtual, on-premises and off-premises data, all with different service level agreements (SLAs). Backup and secondary storage infrastructure often comes from multiple vendors which significantly increase costs, add operational inefficiencies, and create data silos, making it difficult to manage centrally. An incomplete view of data protection workflow can lead to rising operational costs, data loss, and the inability to meet SLAs and specific industry regulations and compliance requirements.

    Join our webcast and learn how the new StorageCraft OneXafe converged data platform can help you with better protecting and managing your data in heterogeneous environments.
  • Top 5 Office 365 Backup Concerns - Best Practices for Protecting Your Data
    Top 5 Office 365 Backup Concerns - Best Practices for Protecting Your Data Sarah Beaudoin, Product Marketing Manager, Druva Sep 27 2018 1:00 pm UTC 60 mins
    As organizations continue to migrate to Office 365 for their email, productivity and collaboration tools, they’re quickly realizing that Office 365’s native capabilities do not provide the essential data protection capabilities they need.

    Join us for a technical webinar on Tuesday, August 21st at 3PM SGT/ 5PM AEST and learn best practices for safeguarding your Office 365 data, including:
    - Gaps within OneDrive, Exchange Online and SharePoint Online that lead to increased risk of data loss
    - How a third party backup solution can automate data protection and ensure data recoverability from user error, malicious behavior or malware
    - How to build a data management strategy for the future that leverages the cloud and improves alignment with organizational policies and SLAs
  • Tus datos estan seguros ante un ataque de Ransonware? Spanish Webinar
    Tus datos estan seguros ante un ataque de Ransonware? Spanish Webinar Jose Luis Vera Sep 27 2018 3:00 pm UTC 43 mins
    ¿Está preparado para recuperarse de un ataque de Ransomware? ¿Está optimizado su entorno de datos para que la recuperación sea lo más rápida e indolora posible?

    Únase a este Webinar GRATUITO para escuchar de boca de los expertos de Commvault en Ransomware discutir un enfoque prescriptivo de cómo su organización debe estar preparada si un ataque de ransomware masivo consigue atravesar su seguridad
  • Ransomware Attacks: Do You Have a Backup Plan?
    Ransomware Attacks: Do You Have a Backup Plan? Ronn Martin, Solution Architect - Veeam and Terry Grulke, Principal Technical Advisor - Quantum Sep 27 2018 4:00 pm UTC 45 mins
    Ransomware is just one of the many threats that can impact your business data. With the use of cloud storage and virtualization expanding, and with a +500% in attacks and +600% in new variants, NOW is the time to ensure you have a proactive backup plan.

    Join Veeam and Quantum to learn how to set up a solid BCDR (business continuity and disaster recovery) and backup strategy to protect your virtual data against any ransomware and cyber security threat, including some lessons learned by our customers.
  • [Earn 1 CPE] Compliance vs Risk: Aligning Priorities & Prioritizing Threats
    [Earn 1 CPE] Compliance vs Risk: Aligning Priorities & Prioritizing Threats Colin Whittaker, Moderator. Stephen Boyer, CTO at BitSight; Marc French, SVP at Mimecast; Scott Petry, CEO at Authentic8. Sep 27 2018 5:00 pm UTC 75 mins
    Compliance is a fundamental pillar to effective risk management at any company. However, simply complying with laws and regulations without considering the broader threat landscape can result in disaster. Certainly, a balance between compliance and risk is necessary. Ensuring compliance represents an organization's starting point, not the endgame, should be a priority.

    In a dynamic threat environment, forward-thinking organizations have concluded that the goal of total protection is elusive and that a risk-based approach to governance and management of cybersecurity is necessary. That is easier said than done, as the way most information security professionals measure risk today fails to quantify threats in terms the business can understand and use. In this CPE accredited webinar, our panel of experts will discuss:

    - Aligning risk and compliance metrics and controls across functional domains.
    - Benchmarking existing process for managing the risks identified by stakeholders.
    - Creating a transparent 'system of record' and collaborative process life-cycle management system.
    - Prioritizing control efforts accordingly.
    - Aligning compliance investments with compliance risk ratings and business priorities.
  • Overcoming the Storage Roadblock to Data Center Modernization
    Overcoming the Storage Roadblock to Data Center Modernization Storage Switzerland and Datera Sep 27 2018 5:00 pm UTC 60 mins
    Organizations have tried a variety of solutions to regain control of their data storage infrastructure. They’ve invested in monolithic storage systems, software defined storage (SDS) and hyper-converged systems. While each approach may have brought some value, each failed in its primary task: consolidating storage resources. Each of these consolidation efforts is unable to consistently guarantee performance, scale capacity and drive down storage costs.

    As a result, most organizations end up buying workload specific solutions for both legacy and modern applications. Most data centers today have a mixture of multiple all-flash storage systems, hyper-converged environments and high capacity data archives. They also have storage software for each use case. IT ends up dealing with a data management nightmare, which limits organizational efficiency and productivity.

    Don’t give up! Join Storage Switzerland and Datera to learn how monolithic, software defined and hyper-converged architectures have let IT down and why the problem gets worse as data centers modernize. Attendees will learn how storage solutions need to change in order to eliminate primary storage silos while guaranteeing specific application performance, scaling to meet capacity demands and lower storage TCO.
  • Cracking the Human Factor problem: Sims, games & data
    Cracking the Human Factor problem: Sims, games & data Bora Aytun Co-founder, CEO, MAVI Interactive Sep 27 2018 5:00 pm UTC 105 mins
    Data-driven integration between Phishing Sims and game-based information security awareness training.

    In this webinar you will learn:
    •Why Phishing Sims didn’t turn out to be the silver bullet to bring down the Human Factor problem in Information Security.
    •Root cause analysis: Why people fail, and how cognitive neuroscience of learning can affect much-needed behavior change.
    •The behavior modification cycle: The process, and why accurate skills assessment is essential.

    You will also see a quick demo of the integrated solution: “Keepnet Labs” and "Info-Sentinel" training mini-games. Q/A Session to follow.

    Mr. Aytun is a 30-year veteran of building technology-based solutions, including B2B product development for the TV broadcast industry, TV and video production, software product development, and in the last decade, game development for training and education. He has been serving the corporate and government training space as the CEO of MAVI Interactive since 2008. MAVI's key contribution to the training industry is making immersive skill development products accessible by all, removing the prohibitive cost barriers.

    MAVI's approach is to develop award winning immersive training systems with modular data structures that can reliably deliver engaging skill development scenarios as well as data-driven performance evaluation. All their solutions are based on Natural Learning Principles, designed to “train the brain” and affect behavior change.

    MAVI's latest integration between Phishing Simulations (Keepnet Labs) and information security behavior modification mini games (multiple-award-winning "Info-Sentinel" series) completes the behavior modification cycle, essential for reducing the Human Factor issues with information security.”
  • Career Conversations w/ Sandra Larson of Looking Glass
    Career Conversations w/ Sandra Larson of Looking Glass Jessica Gulick, MBA | PMP | CISSP Sep 27 2018 11:00 pm UTC 60 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guest: Sandra Larson, M.S. Applied Intelligence

    Hosted by Jessica Gulick, MBA | PMP | CISSP

    About the Speaker:

    Sandra Larson is a Senior Director of Intelligence for LookingGlass Cyber Solutions, a cybersecurity company specializing in physical, cyber, and brand risks for small business, global enterprises and government agencies. Sandra has been with LookingGlass for almost ten years, and manages the client relationships for LookingGlass’ clientele in the food and agribusiness, pharmaceutical, retail, and technology industries. Previously, Sandra received her Master of Science in Applied Intelligence from Mercyhurst University.