Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Claves de una Gestión de Datos Eficiente con Commvault y Microsoft Azure
    Claves de una Gestión de Datos Eficiente con Commvault y Microsoft Azure Alberto González Ocaña – Commvault & Francisco Javier Castilla Luque - Microsoft Recorded: May 18 2018 42 mins
    ¿Sabes cuantos datos tienes en Cloud? ¿Cómo de rápido crecen? ¿Quién tiene acceso a ellos? ¿Estás preparado para las nuevas regulaciones como GDPR?

    Mover cargas a Cloud requiere de una estrategia integral de protección de datos y de recuperación ante desastres que cubra toda su infraestructura independientemente del origen. Commvault ofrece una plataforma de gestión de datos exhaustiva con automatización y orquestación para acelerar las migraciones a Microsoft Azure y Office 365 mientras realiza todas las tareas de gestión de los datos (backup, recuperación, gestión de políticas, e-discovery, etc.).

    Únete a nuestro webinar y conoce cómo la integración de Commvault con Microsoft Azure y O365 para la protección de datos te permite:
    •Mover, gestionar y usar datos desde una única plataforma independientemente de si estos residen on-premise o en Microsoft Azure.
    •Reducir tiempo, coste y esfuerzo aprovechando la automatización, orquestación y flexibilidad para reducir las tareas administrativas y manuales.
    •Simplificar la gestión de los datos y la recuperación ante desastres
    •Una eficiente integración en O365 para garantizar protección y recuperación granulares, cumplimiento de políticas de archivado y gobierno de información así como búsqueda avanzada de contenidos.
    •Backup consistente de Sharepoint (Base de datos y objetos).
  • Career Conversations w/ Kristin Demoranville; Manager of Global Policy
    Career Conversations w/ Kristin Demoranville; Manager of Global Policy Jessica Guilick Recorded: May 17 2018 61 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Kristin Demoranville is a triple threat in STEM, she holds a BS in Environmental Management, has worked in Information Technology since dial up modems were a thing, and is currently focusing on Manufacturing Security & Global Policy at Sony.
  • Use value-stream thinking to define metrics and Automation to improve processes.
    Use value-stream thinking to define metrics and Automation to improve processes. Troy DuMoulin VP, Research & Development, Pink Elephant & Vincent Geffray Senior Director, Product Marketing, Everbridge Recorded: May 17 2018 58 mins
    Today’s digital businesses face more complex threats than ever before. These range from IT services failures, application latency and outages to performance and security issues, none of which your customers will tolerate. They expect services and applications to be available 24/ 7, wherever they are, and from any device. With these digital offerings increasingly at the core of your business, ensuring good quality service must be your top priority. Therefore solving IT issues as quickly as possible is essential.

    You’ve adopted ITIL and ITSM best practices and your IT teams use lots of point solutions and processes, but are your business users getting the full value of IT? How do you make improvements? Based on what metrics? Are your processes fully integrated? Are the cross-functional teams fully collaborative? How do you measure performance?

    In this webinar, Troy DuMoulin, Vice President of Research and Development at Pink Elephant, and Vincent Geffray, Senior Director of Product marketing at Everbridge will explore:

     How to deliver on four seemingly contradictory objectives: innovation, speed, security, and compliance
     Value-stream thinking vs. framework thinking
     Lean IT and Incident Response Automation to improve end-to-end performance
     Applications for ITSM, DevOps, and agile development
  • How Cyber (measured in dollars) Earns a Spot on the Risk Register
    How Cyber (measured in dollars) Earns a Spot on the Risk Register Jerry Caponera is the VP Cyber Risk Strategy at Nehemiah Security Recorded: May 17 2018 47 mins
    Cyber has yet to be fully integrated into the suite of business functions and monitored risks within most organizations. GRC is the mechanism to align cyber and the business, but it’s current state is not sufficient. Governance hierarchy is ineffective (CISOs reporting to the CIO or COO), Risk leveraging ambiguous risk measurements, and Compliance mistaken as security. Moving forward, Governance must be redefined, making CISOs business leaders, reporting to the Board. Risk should leverage traceable data to measure in a common business language. Compliance should be the baseline for security initiatives, not the end goal. When these initiatives can be achieved, GRC will transform cyber into a business enabler.

    Jerry Caponera is the VP Cyber Risk Strategy at Nehemiah Security where he leads the effort to quantify cyber risk in financial terms. Prior to Nehemiah he founded PivotPoint Risk Analytics which focused on cyber risk quantification through value-at-risk modeling and simulations. Jerry has a broad background in cyber, having worked for incident response, malware analysis, and services companies. He has spoken at a number of conferences worldwide including ISS World MEA in Dubai, InfoSecurity Russia in Moscow, and TM World Forum in Nice, France. He holds an MBA from the University of Massachusetts, an MS in Computer Science from the University of Pennsylvania, and a BS in Electrical Engineering from the University of Buffalo.
  • Facilitating Information Governance for Rapidly Scaling Datasets
    Facilitating Information Governance for Rapidly Scaling Datasets Jacques Sauvé, Director, NetGovern Partner Enablement & Ben Canter, Caringo Global Sales Director Recorded: May 17 2018 47 mins
    No organization wants to lose data or waste precious time searching for it when it is needed. And, we all know the costly ramifications of failing to comply with governmental regulations: HIPAA/HITECH, PCI, Freedom of Information Act, GDPR, and many more. Join Jacques Sauvé, IGP of NetGovern, a leader in Information Governance software, and Ben Canter of Caringo, secure scale-out storage, to learn how compliance with current, large rapidly scaling data sets requires tighter integration between information governance and underlying storage infrastructure.
  • Accudata's White-Hat Files | May 2018 Edition
    Accudata's White-Hat Files | May 2018 Edition Josh Berry, CISSP & OSCP, Principal Consultant for Risk & Compliance Recorded: May 17 2018 16 mins
    Welcome to the White Hat Files – a monthly series where the best white hat hackers give you what you need to know about the threat landscape.

    Our first White Hat File comes from Josh Berry, who holds OSCP, CISSP, and GIAC certifications.
    In this 15-minute webinar, he’ll give you the rundown on Accudata’s most-seen vulnerabilities, as well as best practices you can use to defeat attackers looking to dissect and destroy your business.

    Join us for our next edition in June! Register here: https://www.brighttalk.com/webcast/16347/322209?utm_source=Accudata+Systems&utm_medium=brighttalk&utm_campaign=322209
  • Verizon Risk Report - Streamline Security with Actionable Insights
    Verizon Risk Report - Streamline Security with Actionable Insights Katie Crammer, Director, Verizon Global Security Solutions Recorded: May 17 2018 39 mins
    Please join Katie Crammer, Director of Global Security Solutions as she provides an in-depth conversation about a new powerful tool to help enterprises quantify cyber risk and ROI.

    Enterprises routinely struggle to correlate security-related costs with cyber risks and have difficulty determining their security ROI and measuring their security posture. The Verizon Risk Report provides a comprehensive, automated, 360-degree security risk posture assessment, updated daily. The report provides a security score by measuring outside security posture against peers, evaluates control effectiveness, exposes gaps, weaknesses and associated risks, yielding actionable recommendations for mitigating real and likely risks.
  • 2018 Global Encryption Trends:  The Effects of Multi-Cloud Use and Compliance
    2018 Global Encryption Trends: The Effects of Multi-Cloud Use and Compliance Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute and John Grimm, Sr. Director of Security Strategy, Thales eSecurity Recorded: May 17 2018 61 mins
    In today’s environment data protection is more critical than ever and businesses are responding. This 13th edition of the Global Encryption Trends Study, conducted by the Ponemon Institute and sponsored by Thales eSecurity, reveals how increased cloud use and accelerated compliance initiatives are driving adoption of new encryption strategies. Join Dr. Larry Ponemon and John Grimm to learn about some of the top findings in this year’s Global Encryption Trends Study, including:

    • Growth in encryption and Hardware Security Module (HSM) usage
    • The importance of performance, scalability and consistent policy enforcement across enterprise and cloud use cases for encryption solutions
    • Trends in encryption deployment across multiple vertical markets and geographies that are useful for benchmarking
  • Introducing Zerto Virtual Replication 6.0 - Solve for Multi-Cloud
    Introducing Zerto Virtual Replication 6.0 - Solve for Multi-Cloud Robert Strechay - Senior VP Product, Zerto Recorded: May 17 2018 47 mins
    With the introduction of Zerto Virtual Replication 6.0, enterprises can now fully experience the true benefits that cloud technology has long promised.

    Listen in as Senior Vice President of Product, Rob Strechay reveals Zerto’s Game-changing technology so you can be ready to solve for cloud with a single solution.
  • Selecting the Right Data Science Approach for Your Operations
    Selecting the Right Data Science Approach for Your Operations Lilia Gutnik, Product Manager, PagerDuty Recorded: May 16 2018 16 mins
    Organizations want to modernize their IT Operations with the promise of data science and machine learning. The potential results from harnessing data is awesome: automate repetitive tasks, focus on innovation instead of maintenance, and profit from actionable insights that grows the business.

    However,  many teams struggle with the challenge of applying data science to their operations in a way that is suited to their business, their resources, and their goals.

    In this webinar, we’ll answer key questions such as:

    • Which operations challenges can be improved with Data Science?
    • How can data science help your business?
    • How do you evaluate what data science is right for you?
  • Overcoming the Five Distributed Data Protection Challenges
    Overcoming the Five Distributed Data Protection Challenges Storage Switzerland, Druva Recorded: May 16 2018 60 mins
    One of the biggest challenges facing IT today is how to effectively protect data distributed between offices and across clouds. Companies with remote and branch locations, and newly merged organizations are all at risk of losing their critical data or ending up with multiple disparate solutions, that are not integrated. This can leave them with data silos, lack of visibility and control over data, and creating risks and compliance issues.
  • How a Cybersecurity Executive Deals with Application Risk
    How a Cybersecurity Executive Deals with Application Risk Joe Silva, Vice President of Cybersecurity for TransUnion Recorded: May 16 2018 33 mins
    Join Kenna Security for a discussion on how cybersecurity executives can benefit from taking a risk-based approach to application security – from aligning your teams around common goals to reduce the most risk, to metrics-based reporting to the board. Joe Silva, Vice President of Cybersecurity for TransUnion will provide real-world examples to explain how to overcome the unique challenges to application security to help you gain control over your application risk posture.

    Joe encounters the same challenges that plague you – application security testing data with limited coverage of the application attack surface or riddled with false positives; manual application analysis that simply can’t scale; and security teams that know there is risk, but simply don’t have the time, expertise, or context to find and remediate the relatively small percentage that are high-risk. He also understands what it’s like to have a security team that must convince developers to deviate from their primary responsibility to remediate the vulnerabilities.
  • Verizon Threat Research Advisory Center - Monthly Intel Briefing
    Verizon Threat Research Advisory Center - Monthly Intel Briefing John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: May 16 2018 73 mins
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Mobile Security Index 2018 Highlights

    Our Verizon Threat Research Advisory Center presenters will be:

    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •John Pernini, Security Consultant, Investigative Response – Americas
    •Roy Porter, Senior Analyst, Threat Intelligence

    This month we'll be covering mobile device security threats by featuring the Verizon Mobile Security Index (MSI) 2018. Mobile devices are an appealing target—there are more of them, they have access to more data, and they are critical to business operations. The MSI includes recommendations that can help strengthen your organization's mobile device security, to include security measures for your network, devices, applications, and people.

    For this month's MIB, we'll highlight findings within the MSI and provide insight and recommendations from our investigations and threat intelligence to help you improve your mobile device security and response posture.

    Following the MSI highlights, we'll cover the following topics:

    •Current Intelligence
    •Latest Malware Trends
    •Attacks and Threat Indicators
    •Significant Vulnerabilities

    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • M-Trends 2018 Aktuelle Trends bei Sicherheitsverletzungen und Cyberangriffen
    M-Trends 2018 Aktuelle Trends bei Sicherheitsverletzungen und Cyberangriffen Ruediger Weyrauch, Director, Central Europe System Engineering Recorded: May 16 2018 59 mins
    Sicherheitsexperten in aller Welt stehen auch 2018 vor zahlreichen Herausforderungen. Viele Unwägbarkeiten, aber auch Chancen begleiten uns. Ein großes Thema dabei ist, dass es keine international verbindlichen Regeln für Operationen im Cyberspace gibt.
    In diesem Live-Webinar stellt Rüdiger Weyrauch, Director Central & Eastern European System Engineering, die neuesten Trends vor, die unsere aktuelle Bedrohungslandschaft definieren. Die Erkenntnisse und Schlussfolgerungen basieren auf Untersuchungen von Mandiant zu den einflussreichsten Cyber-Angriffen im vergangenen Jahr.

    Unsere Themen im Einzelnen:
    -Neue Advanced Persistent Threat (APT) Gruppen, die 2017 aufgetaucht sind
    -Der Anstieg von Cyber-Angriffen durch Bedrohungsakteure aus dem Iran
    -Ein detaillierter Einblick auf die Risiken durch das Remote Desktop Protokoll (RDP)
    -Incident Response Untersuchungen resultierend aus Sarbanes-Oxley (SOC) Audits
    -Die wachsende Lücke zwischen Cyber-Sicherheitsanforderungen und Fachkräften

    Melden Sie sich jetzt an. Wir freuen uns auf Sie!
  • Solving Exabyte-Scale Search (and Beyond!) with Object Storage & Elasticsearch
    Solving Exabyte-Scale Search (and Beyond!) with Object Storage & Elasticsearch John Bell, Senior Consultant & Jamshid Afshar, Engineer Recorded: May 15 2018 43 mins
    Elasticsearch is a distributed, RESTful search and analytics engine that can be used with object storage to enhance searchability with metadata, enabling you to search billions of files ad hoc with "Google-like" search capabilities, without the rigid structure of relational databases and file systems. Caringo Senior Consultant John Bell and Caringo Engineer Jamshid Afshar take an in-depth look at best practices for using Elasticsearch with object storage and demonstrate use of Elasticsearch with Caringo Swarm Object Storage in this webinar.
  • Three Reasons Why Object Storage is the Best Defense against Ransomware Attacks
    Three Reasons Why Object Storage is the Best Defense against Ransomware Attacks Storage Switzerland, Cloudian Recorded: May 15 2018 63 mins
    In this live webinar, Storage Switzerland and Cloudian will discuss the three key reasons why object storage is a perfect defense against ransomware:
    * Immutability is built in - Data can’t be encrypted
    * Replication is built in - Data can be automatically sent off-site
    * Data Management is built in - Data can be archived from primary storage, limiting exposure
  • AI & Cyber Security: The Self-Defending Digital Business
    AI & Cyber Security: The Self-Defending Digital Business Nick Patience of 451 Research, Justin Fier of Darktrace and Michael Sherwood of City of Las Vegas Recorded: May 15 2018 31 mins
    We are today witnessing a new era of cyber defense, powered by artificial intelligence. AI is now relied on not only to identify sophisticated cyber-threats, but to autonomously respond to them as well, without the need for human intervention.

    In this webinar, Nick Patience, Research VP at 451 Research, and Justin Fier, Director of Cyber Intelligence & Analytics at Darktrace, will discuss how Enterprise Immune System technology is helping to build self-defending networks, powered by machine learning and AI algorithms that iteratively learn a sense of ‘self’ for your organization. They’ll examine how this self-learning system is today uncovering some of the most hard-to-find attacks, from IoT hacks and insider threats, through to ransomware and stealthy attackers lurking in your systems.

    Special guest presenter Michael Sherwood, CIO of the City of Las Vegas, will wrap up with a case study on how he implemented Darktrace across the city’s corporate network and smart city initiatives, and how he uses the technology to autonomously respond against fast-moving threats in real time.
  • How to protect VMs or Datastores
    How to protect VMs or Datastores Reduxio Systems Recorded: May 15 2018 2 mins
    A quick guide on how to protect virtual machines or a datastore using Quiescence policy in the Reduxio StorApp for VMWare vSphere v2.0.
  • M-Trends 2018: un report per capire l’evoluzione degli attacchi cyber
    M-Trends 2018: un report per capire l’evoluzione degli attacchi cyber Marco Rottigni, Sr Product Marketing Manager, EMEA Recorded: May 15 2018 48 mins
    Ogni anno i consulenti di Mandiant, una società FireEye, rispondono ad un gran numero di
    attacchi informatici sferrati da gruppi di hacker provenienti da tutto il mondo.
    Questi episodi sono sintetizzati nel rapporto annuale M-Trends, che analizza i cambiamenti nel panorama delle minacce informatiche.

    Durante il webinar, Marco Rottigni, Sr Product Marketing Manager, EMEA interverrà sui seguenti temi:

    -L'evoluzione del panorama attuale delle minacce
    -L'insorgenza di gruppi APT sempre più sofisticati e pericolosi
    -Quali organizzazioni hanno più probabilità di essere colpite dai pirati informatici
    -La carenza di personale qualificato e quanto questa influisca sulla sicurezza delle aziende
    -La correlazione tra sistemi di sicurezza deboli ed una maggiore esposizione al rischio
    -Le migliori prassi del Red Team per una protezione più efficace
  • Secrets of Successful Sales. Pillar 2: Sales Process
    Secrets of Successful Sales. Pillar 2: Sales Process Alison Edgar Recorded: May 15 2018 48 mins
    Over three webinars, Alison will share her Secrets to Successful Sales focusing on her Four Key Pillars of Sales methodology. Alison will teach you the strategies and processes she used to build her own business and become One of the UK’s Top 10 Business Advisers.

    If you want to hit target? Or better yet, exceed target? Maybe even grow a business? Then you need to tune into these webinars with Alison Edgar, The Entrepreneur’s Godmother.

    Webinar 2: Pillar 2: Sales Process

    Like anything else, sales is a process. Following the process helps to maintain quality and prevents you from making the old age mistake of ‘selling too soon’. You will never sell to everyone, even Apple haven’t figure out how to do that, but if you know the sales process you will certainly sell to a lot more. I genuinely believe when delivered correctly, sales and customer service are exactly the same thing. That’s why, my sales process shows you how providing great customer service can help you seal the deal.
  • Embrace IT Resilience - ZertoCON 2018 Sneak Peek
    Embrace IT Resilience - ZertoCON 2018 Sneak Peek Ryan Seigel, Product Marketing, Zerto Recorded: May 14 2018 31 mins
    Gone is the era of the simple daily backup. As Bob Dylan once famously quipped, “the times they are a-changing.” Increasingly complex datacenters and a waning tolerance for downtime means one thing – it’s time to adopt an IT Resilience Platform to simplify end-to-end data protection regardless of your infrastructure or cloud strategy.

    Find out at ZertoCON whether the future of backup is backup, you will not want to miss exciting game-changing technology and announcements at this year’s ZertoCON conference! Learn more: zerto.com/zertocon/
  • 2018 Verizon DBIR and Federal Agencies: A Cyber Security Panel Discussion
    2018 Verizon DBIR and Federal Agencies: A Cyber Security Panel Discussion Craig Bowman, Vice President - Advanced Solutions, Verizon Recorded: May 10 2018 60 mins
    The 2018 Verizon Data Breach Investigations Report (DBIR), now in its eleventh year, is an industry benchmark for information on cybersecurity threats. This year we looked at over 53K security incidents and 2,216 confirmed breaches. But what does it really mean for federal agencies?

    Join our panel of federal cyber security experts for a look at some of the key findings of the 2018 report:
    • Cybercrime can come in any shape or size, and not always in the form you’d expect.
    • State affiliated actors are prevalent threat actors against the public sector.
    • The average time gap between the first click on a phishing campaign and the first report to security? Longer than you think.
    • Ransomware was the top variety of malicious software in 2017.
    • The overwhelming majority of incidents fell into one of nine attack patterns — knowing these can help you mitigate the risks of a breach.

    Our panel:
    • Chris Gagne- ASAIC, Criminal Investigative Division, Cyber Forensics and Technology Unit, United States Secret Service
    • Matthew Noyes - Cyber Policy and Strategy Director, United States Secret Service
    • Bernard Wilson - Program Manager - Network Intrusion Responder (NITRO), United States Secret Service
    • Jeff Wagner- Associate Chief information Officer, U.S. Office of Personnel Management (OPM).
    • Marc Spitler- DBIR Author/Analyst, Verizon
    • Craig Bowman (moderator)- Vice President, Advanced Solutions Division, Verizon
  • Malware Prevention: Why Zero Risk Doesn't Exist & How You Can Prepare
    Malware Prevention: Why Zero Risk Doesn't Exist & How You Can Prepare Mike Grandinetti, CSO/CMO at Reduxio Recorded: May 9 2018 55 mins
    During the last few months, ransomware has been a real, dangerous and costly threat to governmental institutions. The example of the city of Atlanta is one of the most dramatic examples not only on both staff and internal working environment but also on the day-to-day life of all citizens. So what can be done to ensure business continuity? What are the keys to avoiding downtime and critical data loss? Whom do they concern?

    Malware-as-a-service has become a real industry and let’s face it, zero risk doesn’t exist. It's no longer a matter of if your organization will be attacked, but when and its origin. The point is to not only get your IT department ready in case of a malware disaster but also to incorporate the entire company into keeping the door shut against any elements threatening the integrity of your data ecosystem.

    Cybersecurity expert, John Bambenek and Reduxio Director of Customer Support, Eli Lopez will cover real-life solutions and industry tips and tricks to optimize your entire IT ecosystem against the rise of malware-as-a-service.

    Who Should Register?
    - System Admins & System Engineers who struggle to identify all incoming ransomware threats and keep their IT ecosystem clean and sterile
    - Server Admins & Storage Admins who want to improve their disaster recovery management and disaster prevention management
    - Infrastructure & Enterprise Architects who want to learn more about technical solutions for ransomware recovery processes and/or techniques

    By attending, you'll learn:
    - The latest ransomware trends and the reason behind attacking precise data points
    - Why malware-as-a-service is a matter for all IT stakeholders and users
    - An intertwined set of technologies to prepare an IT ecosystem for disaster recovery
  • Moving to an Active Defense - how far can you go?
    Moving to an Active Defense - how far can you go? Andy Robinson, Mark Rasch, Dave Morris Recorded: May 9 2018 75 mins
    This session will delve into the concept of Active Defense in Depth, what is it, and what are its implications - legally, operationally, tactically and strategically.

    Join the following presenters:

    Andy Robinson: Principal at TIBAT, Board of Directors at George Washington University, Center for Cyber and Homeland Security, Research Advisory Board at George Washington University
    Mark Rasch: Chief Legal and Compliance Partner at DRM Institute, former Chief Security Evangelist at Verizon, former Lead Prosecutor at U.S. DOJ. Cyber Crime Unit.
  • [ARABIC] Understanding today's cyber attack trends in the MEA region
    [ARABIC] Understanding today's cyber attack trends in the MEA region Yazan A. Hammoudah, Manager, Systems Engineering, Middle East & Africa Recorded: May 9 2018 47 mins
    WEBINAR DELIVERED IN ARABIC

    FireEye announced the release of its annual M-Trends report which found that in 2017 attackers were present in EMEA organisations' networks a median of 175 days before being detected. This is an increase of almost 40 percent from the same measurement the year before which stood at 106 days.
    The report is based on information gathered during investigations conducted by FireEye's security analysts in 2017 and uncovers emerging trends and tactics that threat actors used to compromise organisations.
    For more information, join us in the upcoming webinar.
  • RAID vs Object storage: what is best for your data integrity?
    RAID vs Object storage: what is best for your data integrity? Jaap Van Kleef, Kevin Rasdale and Florian Malecki May 22 2018 9:00 am UTC 60 mins
    When RAID was proposed in the 1980’s, it was designed to fit within the limits of available technology: flash memory had not yet been invented, and applications were seriously limited in terms of storage performance. Today, traditional RAID concepts are out of touch with modern storage architectures, placing serious limits on performance, efficiency, flexibility and scalability. Modern storage solutions are moving “post-RAID” with advanced data protection and layout strategies, by treating treats files as objects in a data store rather than blocks on disk.

    In this presentation, you will learn about the key differences between RAID and object based storage that offers better performance, more flexibility, greater capacity utilization, and increased data protection without the high price tag.
  • The Death of the B2B Salesperson
    The Death of the B2B Salesperson Mike Wilkinson – MD of Advance May 22 2018 10:00 am UTC 60 mins
    In this webinar, Mike reflects on Forrester’s forecast that 1 million US B2B salespeople will lose their jobs by the year 2020 and how disruptive technology is changing the game. Do you have the right sales model and skills to adapt? He will discuss what customers are demanding, plus the skills and behaviours required for B2B sales professionals to thrive.
  • DFLabs IncMan SOAR Platform Overview
    DFLabs IncMan SOAR Platform Overview Mike Fowler, Vice President of Professional Services at DFLabs and John Moran, Senior Product Manager at DFLabs May 22 2018 3:00 pm UTC 45 mins
    Learn how DFLabs IncMan Security Orchestration, Automation and Response (SOAR) platform can help to automate, orchestrate and measure your security operations and incident response processes and tasks.

    Join this webinar and take a look at the latest version of IncMan SOAR, including a range of new features and integrations, and discover how we can help you to leverage your existing technologies and streamline your workflows.

    Keep your cyber incidents under control by orchestrating the full incident response and investigation lifecycle, automate actions, fuse security intelligence and share knowledge with machine learning:

    - Minimize Incident Resolution Time by 90%
    - Maximize Analyst Efficiency by 80%
    - Increase the Amount of Handled Incidents by 300%
  • HPE-Veeam advanced integration: Design for the Enterprise!
    HPE-Veeam advanced integration: Design for the Enterprise! Federico Venier - Technical Marketing Engineer May 22 2018 3:00 pm UTC 75 mins
    Learn how to take advantage of the new HPE + Veeam enterprise-class integration features. We will make a complete technical overview with a special focus on hardware snapshot orchestration with 3PAR and Nimble, ransomware protection, and cost reduction with StoreOnce deduplication.
  • XtremIO X2: An Architectural Deep Dive
    XtremIO X2: An Architectural Deep Dive Rami Katz May 22 2018 4:00 pm UTC 60 mins
    XtremIO’s metadata-centric architecture is the base for delivering always-on inline data services and consistent performance. XtremIO X2 builds on that architecture delivering more performance, capacity, data services and simplicity. This session will provide deeper dives into many XtremIO X2-specific architectural innovations like Write Boost, multi-dimensional scaling, flexibility of using larger drives, enhanced management simplicity, serviceability and replication.
  • GDPR: Protecting Your Data
    GDPR: Protecting Your Data Ulf Mattsson, Martyn Hope, Mark Rasch, David Morris May 22 2018 5:00 pm UTC 90 mins
    Find out why data protection and encryption is an essential component of preparing for your GDPR readiness process.

    Specifically, we will cover:

    What is considered "Personal Data" and why it needs to be "protected"

    The Legal Aspects of Data Protection under GDPR.

    The technical ways to protect/pseudonymization

    In this Session you will learn from the leading experts:
    - Ulf Mattsson: The father of database Encryption.
    - Martyn Hope: The Co-Founder of the GDPR Institut.
    - Mark Rasch: Former Chief Cybersecurity Evangelist at Verizon and led the DOJ's Cyber Crime Unit.
  • 12 Practical Steps toward GDPR Compliance
    12 Practical Steps toward GDPR Compliance James R. Slaby, Senior Manager, Product Marketing May 22 2018 6:00 pm UTC 45 mins
    With the effective date of GDPR only weeks away, many businesses are correctly concerned about their readiness to comply with its stricter standards for protecting the personal data of EU residents. This 30-minute webinar offers practical steps that your business or public-sector organization can take today to improve your GDPR compliance posture, with tips on how to:

    •Understand GDPR terminology and roles
    •Assess your inventory of personal data, its locations and movements
    •Honor your new obligations to users on handling their personal data
    •Deal with heightened regulatory scrutiny on data breaches
    •Reinforce your data storage, backup and security policies and infrastructure to support your GDPR compliance efforts


    The complexity and occasional ambiguity of GDPR regulations can freeze some IT organizations into inaction. But neither your management nor your customers will wait forever for evidence of your progress toward GDPR compliance. Learn how to get out of the starting gate with these pragmatic, actionable tactics.


    About the speaker:

    James R. Slaby works in product marketing at Acronis, where his focus includes security-oriented issues like ransomware and GDPR. Before Acronis, Slaby was an industry analyst covering IT security, cloud computing, and networking at Forrester Research, HfS Research, Yankee Group, and The Info Pro. With over 300 published IT research reports, he has been quoted in The Economist, Wall Street Journal, New York Times, and countless tech publications. Slaby has also held campaign, solutions, vertical and product marketing roles at a variety of tech vendors including Sonus, Acme Packet, Bay Networks and Motorola.
  • Cryptocurrencies: Trends and Threats
    Cryptocurrencies: Trends and Threats David Grout, Technical Director for Southern Europe, FireEye May 23 2018 11:00 am UTC 45 mins
    Cyber criminals have always been attracted to cryptocurrencies, which provide a certain level of anonymity and can be easily monetised. In recent years, criminals have gone beyond using cryptocurrencies as a payment method for illicit tools and services. Seeing their value and growing popularity, many actors are targeting cryptocurrency operations and exchanges with attacks such as malicious cryptocurrency mining, collection of cryptocurrency wallet credentials and extortion.

    Join your host David Grout, Technical Director for Southern Europe, for a 45-minute webinar to discuss the latest cryptocurrency threats and trends.
  • Cisco ASA to Firepower Migration: A Simplified Solution
    Cisco ASA to Firepower Migration: A Simplified Solution Joe Schreiber, Technical Director, Business Development, Tufin and Dan Rheault Sr. Product Marketing Manager, Tufin May 23 2018 3:00 pm UTC 45 mins
    Are you a Cisco ASA customer eager to migrate to Firepower next generation policy?
    You are not alone!
    Join this webinar on May 23 at 11am EDT/4pm BST to learn about a migration solution that leverages policy optimization and automation for the most efficient adoption of Cisco Firepower. The solution is based on Tufin proprietary technology and on a longstanding relationship with Cisco. Tufin policy search and analysis capabilities simplify policy browsing and selection, while an API-to-API integration streamlines the selected policy migration from ASA to Firepower.

    Don’t miss this session presented by Dan Rheault, Product Marketing and Joe Schreiber, Technical Business Development, as they uncover the added value of Tufin automated migration solution:
    •Optimize rule sets prior to migration
    •Align rule sets to Firepower Access Control Groups
    •Ensure the most efficient migration process with automation
  • Accudata + Forcepoint Security Series | Risk-Adaptive Protection
    Accudata + Forcepoint Security Series | Risk-Adaptive Protection Bharath Vasudevan, Senior Director May 23 2018 4:00 pm UTC 30 mins
    What comes to mind when you hear “decision making based on calculated behavioral analytics”? It’s a pretty exciting concept–one that’s new to cyber security and one that Forcepoint does very well. Join our webinar to learn how risk-adaptive protection is helping organizations:

    - Continually improve security effectiveness through machine learning and AI
    - Better understand risky behavior
    - Automate policies
    - Dramatically reduce the quantity of alerts
    - Streamline and accelerate investigation of those alerts

    Tune in May 23!
  • GDPR: Responding to a Breach
    GDPR: Responding to a Breach Ray Ford, Ian West, Mark Rasch, David Morris May 23 2018 5:00 pm UTC 90 mins
    When a Breach occurs, what are the best practices to comply with the GDPR's notification requirements. This session will cover:
    Breach Notification rules
    Who, what and when to notify?
  • Overcoming The 4 Data Protection Challenges of Hybrid IT
    Overcoming The 4 Data Protection Challenges of Hybrid IT Storage Switzerland, Micro Focus May 23 2018 5:00 pm UTC 60 mins
    Data protection is critical to data-driven organizations that are fully dependent on data for operations. The hybrid nature of the environment though makes protecting that much more challenging. Join us as we discuss exactly what Hybrid IT is, what it looks like and why data driven organizations are embracing it. Then we will discuss the data protection challenges that IT must overcome as they create a hybrid infrastructure.
  • Commvault pour Office 365 – protégez vos emails, documents et fichiers
    Commvault pour Office 365 – protégez vos emails, documents et fichiers Dominique Renard May 24 2018 7:30 am UTC 45 mins
    Microsoft Office 365 est devenu un outil indispensable à votre entreprise ou organisation pour être plus efficace et productif. Cependant, savez-vous que la sécurisation des données conservées dans Office 365 est de votre responsabilité ?
    Commvault vous aide à utiliser efficacement en toute sécurité votre solution Office 365 en proposant la protection, restauration, indexation, recherche utilisateur et légale pour les messages d’Exchange Online, les documents stockés dans Sharepoint Online et les fichiers conservés dans OneDrive.
    Rejoignez-nous lors de ce webinaire pour découvrir les avantages de Commvault Data Platform en environnement Office 365.
  • M-Trends 2018 – Rétroviseurs sur les grands faits 2017 et leurs impacts futurs
    M-Trends 2018 – Rétroviseurs sur les grands faits 2017 et leurs impacts futurs David Grout, Directeur Technique, South EMEA May 24 2018 12:00 pm UTC 60 mins
    Chaque année, les experts FireEye à travers les équipes Mandiant répondent à une grande variété d'incidents informatiques à travers le monde, ces attaques sont dans la plupart des cas orchestrées par des groupes d’attaquants avancés. Ce retour d’expérience, fruit d’heures d’analyses et d’investigations, est résumé dans le rapport annuel M-Trends qui d’années en années nous donne une visibilité sur le changement et l’évolution de la menace et des techniques utilisées lors des attaques mais aussi sur les progrès et les capacités que les entreprises mettent en place pour y répondre.

    Au cours de ce webinaire, notre Directeur Technique, David Grout, discutera de plusieurs sujets incluant :

    • Les tendances dans le paysage actuel des menaces et ces évolutions
    • Les principaux groupes APT ayant fait parler d’eux en 2017
    • Les risques de récurrence d’attaques
    • Mais aussi de sujets plus ouverts comme la recherche de talents et la complexité de recruter, les architectures ciblées et leurs faiblesses ou encore la préparation possible à travers des exercices de type Red Teaming.
  • GDPR: Cutting Through the Noise
    GDPR: Cutting Through the Noise Alex Jordan, Senior Analyst, ISF LTD May 24 2018 12:00 pm UTC 45 mins
    Data protection has always been important, but with the GDPR deadline looming and data sharing scandals shaking consumer confidence, securing personal data has never been more vital. The GDPR is leading businesses across the world to evaluate, and in many cases modify their data processing activities in line with upcoming law.

    So what if you’ve left it too late? What are the key steps you can take to work towards GDPR compliance, even after deadline day?

    Join us in this webinar with Alex Jordan, Senior Analyst at the Information Security Forum as he shares:

    -The ISF’s phased approach to GDPR implementation
    -Ways to determine the criticality of data and how to protect it appropriately
    -The urgent actions that a business can take to get GDPR compliance started
    -Common myths surrounding the GDPR, and guidance on cutting through the noise.
  • Veeam & Quantum help you prepare for GDPR - Backup Best Practices
    Veeam & Quantum help you prepare for GDPR - Backup Best Practices Stephane Estevez, Quantum; Pierre-Francois Guglielmi, Veeam May 24 2018 1:00 pm UTC 60 mins
    GDPR becomes enforceable on May 25 2018, and affects all companies with customers in the EU. Learn about the new legislation from Stephane Estevez, product manager at Quantum & Pierre-Francois Guglielmi, alliances systems engineer at Veeam. They will explain considerations for GDPR and data backup including retention, security and protection. GDPR will become enforceable in 2018 - Quantum and Veeam's solution for data backups will help ensure you are ready for successful compliance.
  • Managing Massive Data Growth
    Managing Massive Data Growth Tyna Callahan - Scality, Yannick Guillerm - Scality, and Charles Tierney - HPE Storage May 24 2018 3:00 pm UTC 75 mins
    Managing Massive Data Growth. It’s true – it is all about you–your data that is. Several different trends have converged to accelerate the creation of valuable data, presenting new challenges to enterprise storage management teams. Many customers along with some analysts suggest object-based storage as a key element in managing the growth of data. What is it that they see in object storage? Join us as we discuss: Recent Trends leading data growth, the benefits of software-defined object storage features to consider, and real-world examples where object solutions are managing data growth issues.
  • GDPR and Email: How To Tackle The Risk In Your Inbox
    GDPR and Email: How To Tackle The Risk In Your Inbox Marc French, Senior Vice President & Chief Trust Officer, Mimecast May 24 2018 4:00 pm UTC 60 mins
    Less than 50% of organizations impacted by GDPR are expected to fully comply by the May 2018 enforcement date. Will you be one of them? Whether you run email on-premises, in the cloud or a hybrid of the two, unstructured and distributed email data, which is personal by its very nature, can be difficult to manage. It’s also the number one attack vector with over 90% of cyber-attacks starting in email.

    But, with the right approach, it can be a relatively simple area of GDPR risk to mitigate. Join this presentation to learn:

    * Critical areas of GDPR risk in email
    * How to defend email systems and protect data in the face of spiraling attacks
    * Why having the right archive and backup strategy is important
    * The importance of a business continuity plan for email 

    About the Speaker:
    Marc French is the Senior Vice President and Chief Trust Officer at Mimecast. He has more than 25 years of technology experience in engineering, operations, product management, and security. Prior to his current role, Marc has held a variety of CISO/senior security roles at EMC/RSA, Iron Mountain, and Dun & Bradstreet.
  • Making Risk Meaningful
    Making Risk Meaningful Adam Billings, Lockpath May 24 2018 4:00 pm UTC 60 mins
    How do you make sense of all that risk data your organization collects? Imagine not only analyzing risk data more efficiently but also bringing meaning to risk. It's possible. It takes leadership, alignment, standardization, and a clear risk methodology to discover connections in data. In this webinar, we'll share how to go about making risk meaningful. You'll learn:

    · Common methodologies for interpreting risk

    · Status of risk management in your organization

    · Frameworks and strategies for seeing risk in a new light

    · Keys to success in advancing your risk program

    There's no shortage of data collected. What's in short supply is, what does it all mean? Explore what works and what's possible in this educational webinar.
  • From Insight to Action: Best Practices for the GDPR-Ready Organization
    From Insight to Action: Best Practices for the GDPR-Ready Organization Zachary Bosin, Director, Digital Compliance, Veritas May 24 2018 8:00 pm UTC 60 mins
    The world’s most expansive data privacy regulation -- the General Data Protection Regulation (GDPR) -- takes effect on May 25, 2018, and organizations of all sizes must be prepared to respond.

    This session will provide powerful insights from recent Veritas research regarding consumer sentiment toward data privacy and the implications for accelerating your compliance journey.  Additionally, we will cover a brief overview of the regulation’s most important tenants and key technology areas that can reinforce your compliance posture, including a helpful new framework for evaluating GDPR Readiness. 
  • GDPR: The Importance of Looking Beyond 25 May, 2018
    GDPR: The Importance of Looking Beyond 25 May, 2018 Robert Arandjelovic, Giampiero Nanni May 25 2018 2:00 pm UTC 60 mins
    Today is the day that GDPR changes things substantially in protecting customer data, affecting businesses that handle, store or pass data of European Citizens both in and outside of Europe. It’s a huge undertaking with comprehensive and extensive compliance requirements and as it takes effect inevitably there will be stops and starts, legal and logistical challenges and hefty fines for non-compliance.
  • GDPR: Deadline Day Special
    GDPR: Deadline Day Special Mark Rasch, Martyn Hope, Ray Ford, David Morris May 25 2018 5:00 pm UTC 60 mins
    It's GDPR due date. How will enforcement be rolled out when a breach occurs and what are the likely consequences for the breach?

    Join this panel of experts:

    Martyn Hope: Co-Founder of the GDPR Institut
    Mark Rasch: Chief Legal Compliance Partner at DRM Institute, former Chief Security Evangelist at Verizon, former Lead Prosecutor at U.S. DOJ.
    Ray Ford: Founding Associate of GDPR Institut, DPO for Acer(UK) who currently hold some 15million childrens records on behalf of the Scottish Government.


    This session will cover:
    - How GDPR will be enforced.
    - Who is likely to be among the first brought to court?
    -What Should I do Now?
  • The Last-Minute Guide to GDPR
    The Last-Minute Guide to GDPR Argin Wong, Data Privacy and Compliance, Box May 25 2018 8:00 pm UTC 60 mins
    The dawn of GDPR will have a global impact. If you work with European employees, customers or partners, the regulation affects you and failure to comply could result in fines up to 20 million euros, or up to 4% of the company’s total global revenue for the preceding fiscal year, whichever is higher.

    It's not too late to get ready. Sign up for this webinar to learn 3 key steps you need to start now:
     
    •How to show that you are processing data in accordance to the GDPR
    •How to ensure (and document) the security, confidentiality and availability of data
    •How to support the Right to be Forgotten 
     
    You'll also learn how Box can help. Our philosophy is to evaluate and meet the highest bar for data privacy, as well as enable organizations to meet data privacy obligations across the globe, so you can rely on Box to get GDPR-ready.
  • Secrets of Successful Sales. Pillar 3&4: Sales Strategy and Confidence
    Secrets of Successful Sales. Pillar 3&4: Sales Strategy and Confidence Alison Edgar May 29 2018 10:00 am UTC 60 mins
    Over three webinars, Alison will share her Secrets to Successful Sales focusing on her Four Key Pillars of Sales methodology. Alison will teach you the strategies and processes she used to build her own business and become One of the UK’s Top 10 Business Advisers.

    If you want to hit target? Or better yet, exceed target? Maybe even grow a business? Then you need to tune into these webinars with Alison Edgar, The Entrepreneur’s Godmother.

    Webinar 3: Pillar 3&4: Sales Strategy and Confidence

    This webinar is split into two sections, strategy and confidence. Everyone needs a sales strategy, if you don’t know where you’re going, how are you supposed to know where to start? I’m going to the strategy that helped me become One of the UK’s Top 10 Business Advisers and got me to where I am today.
  • Top 5 ways to leverage the cloud
    Top 5 ways to leverage the cloud Derek Adair, Cloud Architect May 29 2018 10:00 am UTC 45 mins
    Do you want to know how to get the most from the cloud?

    We've gathered our top 5 use-cases for the cloud to build a resilient foundation for your IT infrastructure.

    - Decommission a DR site
    - Lift and Shift from On-Prem to Cloud
    - Plus, three other real-world cases