Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • A Proactive Prevention Strategy to Reduce Risk
    A Proactive Prevention Strategy to Reduce Risk
    Andrew Homer, VP Business Development Recorded: Jan 17 2020 40 mins
    Despite the increased security investments and proliferation of new infosec tools, the damage caused by cyber breaches continues to worsen. Meanwhile, the adversary plays by their own rules and evade detection by studying a static environment. They’ve had the luxury to decide when, where and how to attack, while organizations continue to remain in a reactionary defensive state.

    This session looks at the most common methods used to bypass detection. It will also discuss how to combat against the adversary advantage with simple proactive approaches to prevention. Finally, it presents recommendations to reduce risk, including a look at innovative technologies with Moving Target Defense to prevent advanced threats fileless attacks and zero days.
  • The 2019 Dell Commercial Client Solutions Lineup
    The 2019 Dell Commercial Client Solutions Lineup
    Cameron Goedde - Client Solutions Field Marketing | Dell EMC Recorded: Jan 17 2020 42 mins
    Smarter & faster experiences are the driver behind Dell’s 2019 Client Solutions lineup. We have the broadest portfolio to meet all needs. From highly configurable fixed solutions – our OptiPlex desktops and AIOs and our Wyse Thin clients. To the smallest, lightest mobile solutions including Latitude and the XPS to specialty systems – our powerful Precision workstations, including towers, racks and mobile workstations and finally our Rugged devices. We also have a full portfolio of displays and accessories to help build your entire ecosystem.

    Presented by: Cameron Goedde - Client Solutions Field Marketing, Dell EMC
  • Ransomware Hostage Rescue Manual
    Ransomware Hostage Rescue Manual
    Erich Kron, David Littman Recorded: Jan 16 2020 55 mins
    It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks.

    So, how can your organization avoid getting held hostage? Join us and Erich Kron CISSP, Security Awareness Advocate at KnowBe4 we look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and provide tips on what to do when you are hit with ransomware.
  • F5 ACI ServiceCenter – Bring L4-L7 to ACI through programmability
    F5 ACI ServiceCenter – Bring L4-L7 to ACI through programmability
    Payal Singh, Solutions Architect, F5 Networks, and Ahmed Dessouki, Sr. Manager, Product Management, Cisco Recorded: Jan 16 2020 60 mins
    Learn how to manage the F5 BIG-IP in your ACI + BIG-IP deployment by leveraging F5’s automation toolchain and ACI’s programmable App Center framework.

    This simple and native integration aims to solve important real world use cases:
    1) Deep infrastructure visibility into the ACI and F5 deployment, and
    2) Network as well as application management on BIG-IP.
    Each use case can be automated due to the SDN capabilities provided by Cisco APIC.

    Join us to understand how you can leverage APIs to achieve end-to-end network automation workflows and learn how different personas within your organization can benefit from these features and functionalities.
  • Hybrid Multi-cloud Infrastructure for Modern App Delivery
    Hybrid Multi-cloud Infrastructure for Modern App Delivery
    Dave Potter, Senior Solutions Architect at Citrix, and Robin Manke-Cassidy, Director of Networking and Security Product Marke Recorded: Jan 16 2020 57 mins
    IT transformation, cloud, and new application development methods are changing the face of application delivery infrastructure. These new infrastructures require flexibility, security, and operational efficiency to uncover the true value to the business.

    We will discuss the changes driving infrastructure architects to evaluate the application delivery networking and provide a clear strategy on successfully migrating your business to a modern app delivery for hybrid multi-cloud and Cloud Native environments.
  • How to Shorten Recovery Times with Cyber Protection for Manufacturing IT Systems
    How to Shorten Recovery Times with Cyber Protection for Manufacturing IT Systems
    James Slaby, Ryan Davis Recorded: Jan 16 2020 63 mins
    Learn how manufacturers can leverage cyber protection to tackle downtime.

    The manufacturing industry suffers punishing downtime costs: $260K/hour, according to industry research. Worse, it faces an army of cybercriminals trying to exploit its vulnerabilities for profit. Aging process control systems and antiquated data protection regimens further add to manufacturing tech staffs’ worries.

    Learn how to effectively defend against new malware menaces like ransomware and cryptojacking, and deliver quick recovery even for your process control servers that cannot easily be patched or upgraded. Review our insightful, complimentary webinar: “Cyber protection for the manufacturing industry”.

    For even more information about how Acronis Cyber Backup can fit into your manufacturing IT needs, visit our resource page https://www.acronis.com/en-us/s/lp/business/manufacturing-backup/
  • Security Policy Automation for Your SDN Fabric with Tufin R19-3 GA
    Security Policy Automation for Your SDN Fabric with Tufin R19-3 GA
    Hadas Lahav, Roi Alon Product Management & Sigalit Kaidar, Product Marketing, Tufin Recorded: Jan 16 2020 46 mins
    Enterprises are adopting SDN in order to align network operations and network security with the needs of the business. As networks become too complex to manage securely and effectively, many of them seek a central solution that offers visibility, compliance and automation within the SDN fabric and beyond – across the hybrid network.

    Tufin provides superior visibility and automation for the leading SDN platforms, and Tufin Orchestration Suite R19-3 GA complements essential capabilities. Join the webinar to learn about the highlights of this release, including:
    •Complete support for VMware NSX-T to ease the adoption and migration from NSX-V
    •Superior visibility and path analysis for Cisco ACI – within and beyond the fabric
    •Enhancements to zero-touch automation across vendors and platforms
  • How to become a CISO and not go insane under the pressure
    How to become a CISO and not go insane under the pressure
    Jane Frankland (CISO Advisor), Daniel Wahlen (Indeed), Andrey Evdokimov (Kaspersky) Recorded: Jan 16 2020 62 mins
    Most IT security leaders (70%) say that an emphasis on risk management has been a key change to their role, followed by the belief that business acumen now matters more than depth of technical expertise. This means that CISOs need to develop new skills, while keeping up with complex IT architecture and a growing threat landscape.

    Kaspersky brings together cybersecurity and HR professionals to discuss what expertise is required for modern CISOs and those who would like to enter this industry, as well as the main HR challenges and further career paths.

    The panelists will include Jane Frankland (CISO Advisor, Author, Keynote Speaker), Daniel Wahlen (Senior Evangelist & Senior Marketing Manager, Indeed), Andrey Evdokimov (Head of Information Security, Kaspersky). The panel discussion will be moderated by Alena Reva (Head of Human Resources, Kaspersky North America & Europe).
  • Cloud Backup Case Study: How the Uni. of Leicester Overcame Backup Challenges
    Cloud Backup Case Study: How the Uni. of Leicester Overcame Backup Challenges
    Mark Penny - Systems Specialist of Leicester University Recorded: Jan 16 2020 35 mins
    Join us to hear how the University of Leicester designed a new backup architecture increasing data availability and reducing complexity whilst significantly saving in storage space and reducing cost using on-premises object storage as a backup target.
  • Zaawansowana ochrona stacji roboczych
    Zaawansowana ochrona stacji roboczych
    Jerzy Janowski, Senior Presales, Commvault Recorded: Jan 16 2020 64 mins
    Backup stacji roboczych najczęściej kojarzy się z prostym kopiowaniem dokumentów na wydzielony dysk sieciowy. Bez możliwości deduplikacji, szyfrowania, zaawansowanych uprawnień do danych, dostępu z urządzeń mobilnych czy współdzielenia dokumentów pomiędzy użytkownikami. Rozwiązanie oferowane przez Commvault przeczy tej koncepcji, jako jedyny produkt na rynku – oferuje kompleksowe podejście do backupu laptopów czy desktopów wraz z zaawansowanymi funkcjami. Prezentacja ta ma na celu pokazać jakie możliwości w tym obszarze posiada platforma Commvault.
  • Exploring Citrix Workspace - Episode 1: SSO
    Exploring Citrix Workspace - Episode 1: SSO
    Jiun Hong, Product Marketing @ Citrix Recorded: Jan 15 2020 4 mins
    In order to better understand all that Citrix Workspace has to offer, we’ve designed a series of short mini-webinar segments that each highlights a key element of Citrix Workspace.

    Watch the entire video series to learn how Citrix Workspace:

    *Simplifies the IT workload and mitigates security risks that stem from poor user password hygiene

    *Provides unified access to files stored across multiple locations, and simplifies sharing, feedback, approvals and co-authoring within your business

    *Empowers IT to apply polices to devices and apps without sacrificing the mobility the workforce needs to remain productive

    *Enables IT control of virtual machines, applications, licensing, and security, while providing anywhere access for any device

    *Uses intelligence to boost productivity by removing busywork with a virtual assistant that automates repetitive tasks and simplifies workflows
  • Steganography + Malware - a Match Made in Hacker Heaven
    Steganography + Malware - a Match Made in Hacker Heaven
    Ira Winkler, Security Evangelist Recorded: Jan 15 2020 46 mins
    Steganography has been used for centuries to hide a secret message in an otherwise harmless container. Its latest iteration is a malware delivery vehicle.

    In this webinar we will review how malware developers use steganography for their devious purposes. Traditionally, steganography was leveraged for covert communication (e.g., exfiltration of sensitive data from an organization in the way that bypasses DLP and other security controls). More recently, it has become a carrier for malware. For example, in the latest attack targeting a Nyotron customer, that our endpoint prevention and response (EPR) solution detected and blocked, the Ursnif banking trojan attempted to use steganography to insert a malicious Powershell script into the organization.

    Join us for a brief overview of steganography, its use in the physical and digital worlds, followed by a step by step walkthrough and demo of a recent attack leveraging steganography.

    Presenter:
    Ira Winkler is recognized as one of the world's experts in Internet security, information warfare, information-related crime investigation, and industrial espionage. Mr. Winkler began his career at the National Security Agency (NSA), where he performed cryptoanalysis and was responsible for systems design and implementing security for intelligence collection and analysis systems.
    Ira Winkler is the author of multiple cybersecurity books.
  • Blue Prism RPA Platform Demo | Intelligent Automation & Digital Exchange Skills
    Blue Prism RPA Platform Demo | Intelligent Automation & Digital Exchange Skills
    Daniel Welcel, Solution Engineer and Lisa Hackbarth, Global Marketing Recorded: Jan 15 2020 40 mins
    Join us for a 45-minute, interactive live demo. We’ll show you how Blue Prism’s connected-RPA platform works and answer your questions live.

    With the advent of Robotic Process Automation (RPA), today, humans and Digital Workers are working side by side.

    But how does it actually work?

    If you’re ready to see Blue Prism’s Intelligent Automation in action, join us for our next 45-minute demo where we’ll showcase the simplicity and security of the leading RPA platform on the market.

    In this foundational look at what it takes to implement Blue Prism connected-RPA, you will:
    • Experience the integral role that the human worker plays in our evolving workforce
    • Take a tour of the Blue Prism Process and Object Studio where you’ll teach your Digital Workers what to do and how to do it
    • Learn how to incorporate our pre-built, out-of-the-box processes without the need for coding, and get your Digital Workforce up and running quickly
    • See examples of processes that Digital Workers can help to automate
    • Learn how to manage your Digital Workers to achieve maximum productivity using the included Control Room, Work Queues, and Scheduler
    • Get a detailed look at Blue Prism’s security, access control, and audit log features that reduce automation audit risk

    Ready to unleash the human potential at your organization by freeing up your team to do the valuable, skilled work they were hired to do? Register to view the demo to take the next step on your digital transformation journey and get ready to see what’s possible.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Dave Kennedy, Managing Principal, Open Source Intelligence Recorded: Jan 15 2020 78 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This webinar will cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
  • Maximizing your Microsoft Office 365 investment with Commvault
    Maximizing your Microsoft Office 365 investment with Commvault
    David Moyer, Commvault and Kalyani Kallakuri, Metallic Recorded: Jan 14 2020 17 mins
    Learn how Commvault provides you with complete Microsoft Office 365 protection – not just Exchange Online, but also SharePoint Online and OneDrive, presenting you with a comprehensive, scalable, and directly integrated solution, so you can get the most out of your Microsoft Office 365 investment.
  • Email Fraud Defense
    Email Fraud Defense
    Alex Fryback, Product Manager & Tanner Luxner, Product Marketing Manager of Proofpoint Recorded: Jan 14 2020 39 mins
    Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses. best practice Email Fraud Defense requires a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

    Discover how to:

    • Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People
    • Monitor all inbound impostor threats from your domains and those of third parties
    • Accurately distinguish between legitimate emails and fraudulent emails

    About Proofpoint

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • New Strategies to Optimize Your Storage Economics and Data Placement
    New Strategies to Optimize Your Storage Economics and Data Placement
    Grant Jacobson, Director, Technology Alliances, Cloudian + Kris Meier, Vice President of Product Management, InfiniteIO Recorded: Jan 14 2020 41 mins
    Data is a business asset only if it’s free to flow where your users and applications need it. But with enterprise data volume growing at 50% annually, traditional storage just can’t keep up, especially with huge scale and performance limitations as file counts and storage capacity growth needs accelerate. It’s time to update and modernize your storage infrastructure and take advantage of new technologies that will help you optimize your storage economics and data placement.

    Join InfiniteIO and Cloudian on Tuesday, August 14th, at 10am Pacific for a live webcast and conversation to learn about the advantages of metadata-driven solution that:

    • Delivers cloud economics with accelerated primary storage performance - without any changes or disruption to existing users, applications or back-end storage

    • Simplifies data placement and management across primary, secondary and cloud storage

    • Provides technical and operational efficiencies to achieve cloud economics

    • Cost-effectively scales with your growth

    • Provides unified visibility and control of your data, wherever it is, including public cloud


    Register today to hold your spot. Bring your most vexing data storage questions to ask us!
  • Security Begins Here: Insight from Carmina Lees
    Security Begins Here: Insight from Carmina Lees
    Carmina Lees - MD Financial Services, Accenture Recorded: Jan 14 2020 7 mins
    Carmina Lees, MD of Financial Services at Accenture, considers how organizations globally being affected by the race to transform digitally are closing the cyber gap. Discussing how best to balance the benefits of the cloud, Carmina talks around the importance of improving cyber confidence, keeping up with the pace of change and influencing at every level of the organization, highlighting the pressures endured by CISOs on a daily basis.
  • Kaspersky’s APT review of 2019: Threat Landscape Evolution
    Kaspersky’s APT review of 2019: Threat Landscape Evolution
    Vicente Diaz and Costin Raiu, security researchers, Kaspersky Global Research and Analysis Team Recorded: Jan 13 2020 80 mins
    Kaspersky leading researchers will present their annual analysis of the most significant changes of APT threat landscape of 2019. During the webinar, Costin Raiu and Vicente Diaz will tell the audience about events and transformation that happened with the concluding year and provide their expert analysis and insights.
  • Key considerations for SaaS security and performance
    Key considerations for SaaS security and performance
    Akhilesh Dhawan, Matt Brooks, Robin Manke-Cassidy, & Wesley Shepherd Recorded: Jan 13 2020 70 mins
    Companies are turning to Software as a Service (SaaS) to ease their cloud transformation and increase agility. According to a Bettercloud survey, 73% of all companies say that nearly all of their apps will be SaaS by 2020. SaaS offers speed to market, great functionality, and lower IT operating costs. However, it can also create IT security and app performance headaches.
    Join us as two Citrix experts in the fields of networking and IT provide industry perspective and their experiences on:
    -How hackers use different techniques to exploit weaknesses in your SaaS, web, and other applications
    -How Citrix can reduce SaaS and web security threats with an integrated solution
    -Key factors that influence SaaS and web app performance
    -How Citrix can improve application performance for more than 4,000 SaaS apps, including O365
    -Why a Citrix-differentiated security approach with a people-centric focus extends the digital perimeter
  • FireEye's Perspective on Iranian Attacks and Practical Mitigations
    FireEye's Perspective on Iranian Attacks and Practical Mitigations
    Benjamin Read, Senior Manager, Cyber Espionage Analysis, FireEye Recorded: Jan 13 2020 50 mins
    FireEye's Perspective on Iranian Attacks and Practical Mitigations
    Make Better-Informed Decisions and Protect Your Organization

    The recent tension between Iran and the U.S. has increased the likelihood of Iranian action against U.S. and Gulf entities. While the exact nature, timing, and targets of any response from Iran is uncertain, FireEye Threat Intelligence analysts assess with moderate confidence that it will include a cyber component.

    Watch this complimentary on-demand webinar, as Ben Read, Sr. Manager, Cyber Espionage Analysis provides:
    •An overview of FireEye’s perspective on the current threat landscape from Iran
    •Tactics recently employed by Iranian groups like APT33, APT34 and others
    •Recommended mitigations to protect your organization from these groups
  • Talks Demo
    Talks Demo
    Chrissy Recorded: Jan 13 2020 29 mins
  • Financial cyberthreats in 2020
    Financial cyberthreats in 2020
    Yury Namestnikov, Head of Global Research & Analysis Team, Russia; Dmitry Bestuzhev, Head of Research, Latin America Recorded: Jan 10 2020 69 mins
    Kaspersky will present an exclusive overview of the top cyberthreats targeting financial institutions and share the company’s predictions for this area in 2020.

    During the webinar, attendees will learn about key events that have happened in 2019 – including:
    •large-scale anti-fraud bypass, digital fingerprints markets
    •multi-factor authentication (MFA) and biometric challenges
    •ATM and PoS malware
    We will also cover the latest techniques and tactics used by targeted attack groups who are specializing in stealing money from financial institutions. In the final part, we will do an educated guess and present our cybersecurity predictions about cyberthreats to financial institutions for 2020.

    The Cyberthreats to financial institutions 2020: Overview and predictions report is available here:
    https://securelist.com/financial-predictions-2020/95388/
  • Top 3 Questions to Ask Before Investing in Your Next SAN Infrastructure
    Top 3 Questions to Ask Before Investing in Your Next SAN Infrastructure
    Art Scrimo, Product Manager, Cisco Data Center, and Paresh Gupta, Technical Marketing Engineer, Cisco Data Center Recorded: Jan 9 2020 56 mins
    Modern enterprise applications are exerting a tremendous pressure on your SAN infrastructure. Keeping up with the trends, customers are looking to invest in higher performing storage and storage networking. Combining the economic viability of All Flash Arrays and the technological advancements with NVMe over FC, there has never been a more compelling opportunity to upgrade your SAN infrastructure that offers investment protection with Support for 64G Fibre Channel Performance.

    It is well understood that maximizing ROI on flash investments requires higher network speeds, typically 32Gbps or even 64Gbps. But before you make that decision, have you considered these key questions:

    - Do you really need to “RIPlace” your existing infrastructure?
    - Is it GDPR compliant?
    - Is it 64Gb ready?
    - Does it support NVMe?
    - Does it provide integrated SAN analytics for diagnostics and troubleshooting?

    The new innovations from Cisco not only provide investment protection, but also enable you to unlock innovative SAN analytics, which are built into the hardware. Learn how the integrated analytics and automation capabilities are going to change the way you design SAN for your growing business needs. Discover how these solutions maximize the performance of your existing SAN as we reveal:

    - New hardware and software capabilities
    - Enhanced analytics for FC and NVMe
    - Use cases and best practices

    Join us and get your questions answered during the live webinar. Find out how you can build an efficient storage infrastructure of the future – now.
  • Hacking Your Organization: 7 Steps Bad Guys Use to Take Control of Your Network
    Hacking Your Organization: 7 Steps Bad Guys Use to Take Control of Your Network
    Roger Grimes, David Littman Recorded: Jan 9 2020 60 mins
    The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? Well, hackers are crafty. And the best way to beat them is to understand the way they work.

    In this webinar Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the "Cyber Kill Chain" in detail to show you how a single email slip up can lead to the total takeover of your network.

    Roger will show you:

    - How detailed data is harvested using public databases and surprising techniques
    - Tricks used to craft a compelling social engineering attack that your users WILL click
    - Cunning ways hackers deliver malicious code to take control of an endpoint
    - Taking over your domain controller and subsequently your entire network

    But not all hope is lost. Roger will also share actionable strategies you can put in place now to greatly reduce your risk. Find out how to protect your organization before it's too late.
  • Ransomware insights in 2019: What we learned and how to foresee threats coming
    Ransomware insights in 2019: What we learned and how to foresee threats coming
    Fedor Sinitsyn and Orkhan Mamedov, Kaspersky Advanced Threats Research and Detection Team Jan 19 2020 8:45 pm UTC 58 mins
    Ransomware, or malicious cryptors, are among the most active types of malware in 2019: This year, they’ve been paralyzing the infrastructure of cities, commercial and public entities. Fedor Sinitsyn and Orkhan Mamedov, Kaspersky Advanced Threats Research and Detection Team will summarize their experience and share insights on what we learned this year, and what is coming up on the threat landscape.

    The following topics will be covered during the webinar:
    - Overview of active ransomware families and groups in 2019
    - The main vectors of cryptor distribution
    - Detailed analysis of the most popular and advanced cryptor families
    - Targeted attacks on organizations
    - Use of legitimate software by cryptors
    - How to avoid becoming a victim (using products to protect an organization's infrastructure)
    - What to do if an organization becomes a victim of a cryptor
  • Mindhunter: Mein zweiwöchiges Gespräch mit einer Ransomware-Zelle
    Mindhunter: Mein zweiwöchiges Gespräch mit einer Ransomware-Zelle
    Fabian Freundt, Sr. Sales Engineer, ALPS, SonicWall Jan 21 2020 8:30 am UTC 60 mins
    Lassen Sie sich vom SonicWall Security Experten Fabian Freundt einen Einblick in die menschliche Seite einer modernen Ransomware-Zelle vermitteln. Sie erhalten Ratschläge, wie Sie Hacker vom Eindringen in Ihre Organisation, von der Verschlüsselung Ihrer Endpunkte und von der Verbreitung auf andere Laufwerke und Segmente Ihres Netzwerks abhalten können.
  • Cyberthreats on META horizon: Top Threats of 2019 and Predictions for 2020
    Cyberthreats on META horizon: Top Threats of 2019 and Predictions for 2020
    Kaspersky's Dr. Amin Hasbini, Head of Global Research & Analysis Team for META and Maher Yamout, Senior Security Researcher Jan 21 2020 10:00 am UTC 54 mins
    During the webinar Dr. Amin Hasbini, Head of Global Research & Analysis Team for META at Kaspersky, and Maher Yamout, Senior Security Researcher at kaspersky, will talk about the evolving threat landscape in the Middle East, Turkey and Africa. The webinar will explore some of the key trends in terms of tools, techniques and processes likely to be used by such groups against government organizations, enterprises, critical infrastructure, society at large, and more – and consider what that means for organizations, the security community and international cyberspace. In addition to that, the web meeting will be focused on the outlook for the 2020 and new challenges that cybersecurity industry will possibly face on the edge of a new decade.

    Speakers:

    Dr. Amin Hasbini
    Head of Global Research & Analysis Team for META, Kaspersky

    Maher Yamout
    Senior Security Researcher, Kaspersky
  • Enterprise Information Archiving
    Enterprise Information Archiving
    Terry McMahon, Sr, Systems Engineer & Jacob Wild, Sr. Archiving Specialist Jan 21 2020 10:00 am UTC 48 mins
    Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content. So what is the best way for you to develop and implement a new secure approach to your data archiving challenges?

    Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with industry rules and regulations
    - Improve visibility into your archived data
  • Escape Your Legacy Backup Provider - Three Steps to a Better Backup Renewal
    Escape Your Legacy Backup Provider - Three Steps to a Better Backup Renewal
    Mike Palmer Chief Product Officer, Druva and Prasanna Malaiyandi Director, Product Architecture, Druva Jan 21 2020 10:30 am UTC 30 mins
    More than 60% of companies sign their storage backup renewal contracts between October 1 and March 31. Before you sign your next contract, evaluate the costs and services you’re receiving. You’re likely to achieve a complete, simple and cost-effective solution with a move to cloud data protection.

    Join this webinar with Druva Chief Product Officer, Mike Palmer, who breaks down the backup contract renewals process and pricing, and compares the pros and cons of legacy on-premises solutions versus SaaS-based data protection.

    Register to learn:
    •Market forces impacting data backup strategies and IT budgets
    •Key questions to evaluate if your existing renewal contract is costing you more than modernizing
    •Three steps to better backup, whether you’re six months or 1 month out from renewal

    Who should attend:
    IT leaders in charge of budget and strategy
    CTO, CIO, VP of IT, IT Managers, IT Directors
  • Secrets to Recovering from Ransomware and Disasters with VMware Cloud on AWS
    Secrets to Recovering from Ransomware and Disasters with VMware Cloud on AWS
    Sazzala Reddy, Co-Founder & CTO at Datrium, and Jason Crandall, Staff Cloud Solution Engineer at VMware Jan 21 2020 5:00 pm UTC 58 mins
    DR has never been more important with the rampant rise in ransomware attacks. Learn what you can do to make sure you’re prepared for a ransomware attack, or if disaster strikes.

    Watch this webinar to learn:
    - Secrets to recovering instantly from a ransomware attack
    - The most common types of DR events and growing threats
    - The most important capabilities in a DR solution according to IT leaders
    - How to save 10x with an on-demand model using the public cloud
    - Why public cloud DR was impossible before VMware Cloud on AWS
  • [Earn CPE] Critical Steps to Manage CCPA Compliance and Risk in 2020
    [Earn CPE] Critical Steps to Manage CCPA Compliance and Risk in 2020
    Panelists: K Royal, TrustArc; Ilia Sotnikov, Netwrix, Dr. Else van der Berg, Datawallet; and Harold Byun, Baffle. Jan 22 2020 12:00 am UTC 77 mins
    The California Consumer Privacy Act of 2018 (CCPA) is arguably the most expansive privacy law in U.S. history and will become enforceable in just a matter of months. The CCPA introduces new privacy rights for consumers and will force companies that conduct business in the State of California to implement structural changes to their privacy programs.

    The new rights given to California consumers are similar to the rights provided in the European Union’s General Data Protection Regulation (GDPR). The CCPA also subjects non-compliant businesses to expensive fines, class-action lawsuits, and injunctions.

    On this webinar, we will examine the impact of the CCPA, answer your burning questions, uncover the CCPA’s nuances, and address its ambiguities and challenges. We will also include strategies for creating compliance programs in the midst of the unknowns, and a strategic action plan for businesses to become compliant.

    Learning objectives are to gain insights on:

    - Understanding the nuances, ambiguities and challenges of the CCPA;
    - Creating compliance programs in the midst of the unknowns;
    - Developing a strategic action plan to become CCPA compliant;
    - How to avoid expensive fines, class-action lawsuits, and injunctions;
    - Getting ahead of the curve and enabling your business with alternate data sharing and privacy preserving techniques.
  • How to build a profitable MSP Business Model for Backup and Storage-as-a-Service
    How to build a profitable MSP Business Model for Backup and Storage-as-a-Service
    Jon Brooks - Director of EMEA MSP Sales Jan 22 2020 10:00 am UTC 31 mins
    Learn more about how Cloudian Object Storage for vCloud Director enables VMware cloud providers to deploy and manage an S3-compliant storage environment that is fully interoperable with the broad industry ecosystem of S3- compatible applications.
  • 4 Keys to a Successful Access Security Strategy
    4 Keys to a Successful Access Security Strategy
    Akhilesh Dhawan – Director PMM Secure Digital Perimeter Jan 22 2020 2:00 pm UTC 48 mins
    In this webinar, we will cover Citrix Access Control service that helps consolidate VPN, single sign-on and granular security controls for SaaS, web and virtual applications, as well as web filtering and web isolation controls for the Internet.

    Point products are expensive to maintain and result in poor end user experience. Moreover with the shortage of security skill sets, these technologies are not being used to their full potential and with best practices, leading to gaps in security and increased risk.

    Using Citrix Access Control you can:

    1. Reduce TCO of your security products
    2. Improve retention of your security talent
    3. Provide granular and consistent security policies across all access use cases
    4. Improve the end user experience and increase employee productivity
  • 2020 Predictions for Cloud Computing
    2020 Predictions for Cloud Computing
    Dave McKenney, Director, Product Management - TierPoint and Abhijit Sunil, Analyst - Forrester Jan 22 2020 6:00 pm UTC 60 mins
    Forrester’s recently released report Predictions 2020: Cloud Computing, outlines five predictions that will shape the cloud landscape in the coming year.

    According to the report, enterprises are just now starting to use cloud to modernize core business apps and processes; to date, they've been using cloud primarily to build new apps and rehost infrastructure. In our view, this movement is well underway and in 2020, drivers like security, cloud-native innovations and new alliances among key hyperscale players will reshape how providers deliver solutions to help enterprises digitally transform.

    Join us for a webinar to discuss these predictions with featured speaker, Forrester Analyst, Abhijit Sunil and TierPoint Director of Product Management, Dave McKenney. In this session you’ll learn more about:
     What’s next in the cloud technology landscape, including public cloud
    insights
     The increasing importance of security in cloud management
     How organizations are rethinking their data and edge strategies
     The growth of hyperconverged infrastructure across new use cases
  • Strategies to Consider as Windows Server 2008 Approaches End of Support (EOS)
    Strategies to Consider as Windows Server 2008 Approaches End of Support (EOS)
    Mark Allbritten, Dell Technologies Datacenter Solution Principal Jan 22 2020 6:00 pm UTC 60 mins
    The time is now. Microsoft Windows Server 2008 will no longer be supported as of January 14, 2020. If you haven’t already migrated, and you are looking to fast track your upgrade to the new servers and software that you need, join our next webinar on 22 January. You’ll hear how Dell Technologies Services can help you to map out a plan, integrate new technology into your existing environment, deploy it in record time and provide flexible support. We’ll share:

    * How Dell Technologies can help plan your cloud or on-premise migration, upgrade and re-platform as well as consolidate and archive
    * How we can provide full-service installation, configuration, and end-to-end project management
    * Why Dell Technologies Services is the partner of choice for organizations around the world
  • Exploring Citrix Workspace - Episode 2: Content Collaboration
    Exploring Citrix Workspace - Episode 2: Content Collaboration
    Nathan Mote, Product Marketing @ Citrix Jan 22 2020 7:00 pm UTC 11 mins
    In order to better understand all that Citrix Workspace has to offer, we’ve designed a series of short mini-webinar segments that each highlights a key element of Citrix Workspace.

    Watch the entire video series to learn how Citrix Workspace:

    *Simplifies the IT workload and mitigates security risks that stem from poor user password hygiene

    *Provides unified access to files stored across multiple locations, and simplifies sharing, feedback, approvals and co-authoring within your business

    *Empowers IT to apply polices to devices and apps without sacrificing the mobility the workforce needs to remain productive

    *Enables IT control of virtual machines, applications, licensing, and security, while providing anywhere access for any device

    *Uses intelligence to boost productivity by removing busywork with a virtual assistant that automates repetitive tasks and simplifies workflows
  • Blue Prism RPA Platform Demo | Intelligent Automation & Digital Exchange Skills
    Blue Prism RPA Platform Demo | Intelligent Automation & Digital Exchange Skills
    Daniel Welcel, Solution Engineer and Lisa Hackbarth, Global Marketing Jan 23 2020 3:00 am UTC 39 mins
    Join us for a 45-minute, interactive live demo. We’ll show you how Blue Prism’s connected-RPA platform works and answer your questions live.

    With the advent of Robotic Process Automation (RPA), today, humans and Digital Workers are working side by side.

    But how does it actually work?

    If you’re ready to see Blue Prism’s Intelligent Automation in action, join us for our next 45-minute demo where we’ll showcase the simplicity and security of the leading RPA platform on the market.

    In this foundational look at what it takes to implement Blue Prism connected-RPA, you will:
    • Experience the integral role that the human worker plays in our evolving workforce
    • Take a tour of the Blue Prism Process and Object Studio where you’ll teach your Digital Workers what to do and how to do it
    • Learn how to incorporate our pre-built, out-of-the-box processes without the need for coding, and get your Digital Workforce up and running quickly
    • See examples of processes that Digital Workers can help to automate
    • Learn how to manage your Digital Workers to achieve maximum productivity using the included Control Room, Work Queues, and Scheduler
    • Get a detailed look at Blue Prism’s security, access control, and audit log features that reduce automation audit risk

    Ready to unleash the human potential at your organization by freeing up your team to do the valuable, skilled work they were hired to do? Register to view the demo to take the next step on your digital transformation journey and get ready to see what’s possible.
  • Задай вопрос эксперту
    Задай вопрос эксперту
    Дмитрий Иванюк, эксперт по решениям Commvault Jan 23 2020 8:00 am UTC 60 mins
    Уважаемые коллеги!

    Приглашаем Вас и Ваших коллег принять участие в новом формате вебинара: "Задай вопрос эксперту".

    Дата: 23 января
    Время: 11:00 (МСК)
    Спикер: технический эксперт - Дмитрий Иванюк
    Язык вебинара: русский.

    Данный вебинар включает следующее:
    - возможность задать свой вопрос по программному продукту Commvault,
    - полный интерактив,
    - демонстрация сценариев,
    - детальные ответы на ваши вопросы.
  • Mindhunter : Mon dialogue de 2 semaines avec une cellule de rançongiciel
    Mindhunter : Mon dialogue de 2 semaines avec une cellule de rançongiciel
    Stéphane Julhes, Security Presales Engineer France, SonicWall Jan 23 2020 9:00 am UTC 60 mins
    Rejoignez Stéphane Julhes, expert en sécurité de SonicWall, qui vous dévoilera le côté humain d’une cellule de rançongiciel moderne, et qui vous fera part de ses conseils pour les empêcher d’infiltrer votre organisation, de chiffrer vos terminaux, et de se propager à d’autres lecteurs et segments de votre réseau.
  • Mindhunter: My Two-week Conversation with a Ransomware Cell
    Mindhunter: My Two-week Conversation with a Ransomware Cell
    John Aarsen, SE - Benelux and Nordics, SonicWall Jan 23 2020 10:00 am UTC 60 mins
    Join SonicWall security expert John Aarsen as he gives you an inside look into the human-side of a modern ransomware cell, their advice on how to stop them from infiltrating your organization, encrypting your endpoints, and spreading to other drives and segments of your network.
  • Blue Prism RPA Platform Demo | Intelligent Automation & Digital Exchange Skills
    Blue Prism RPA Platform Demo | Intelligent Automation & Digital Exchange Skills
    Daniel Welcel, Solution Engineer and Lisa Hackbarth, Global Marketing Jan 23 2020 11:00 am UTC 39 mins
    Join us for a 45-minute, interactive live demo. We’ll show you how Blue Prism’s connected-RPA platform works and answer your questions live.

    With the advent of Robotic Process Automation (RPA), today, humans and Digital Workers are working side by side.

    But how does it actually work?

    If you’re ready to see Blue Prism’s Intelligent Automation in action, join us for our next 45-minute demo where we’ll showcase the simplicity and security of the leading RPA platform on the market.

    In this foundational look at what it takes to implement Blue Prism connected-RPA, you will:
    • Experience the integral role that the human worker plays in our evolving workforce
    • Take a tour of the Blue Prism Process and Object Studio where you’ll teach your Digital Workers what to do and how to do it
    • Learn how to incorporate our pre-built, out-of-the-box processes without the need for coding, and get your Digital Workforce up and running quickly
    • See examples of processes that Digital Workers can help to automate
    • Learn how to manage your Digital Workers to achieve maximum productivity using the included Control Room, Work Queues, and Scheduler
    • Get a detailed look at Blue Prism’s security, access control, and audit log features that reduce automation audit risk

    Ready to unleash the human potential at your organization by freeing up your team to do the valuable, skilled work they were hired to do? Register to view the demo to take the next step on your digital transformation journey and get ready to see what’s possible.
  • Mindhunter: Dos semanas de charla con una célula de ransomware
    Mindhunter: Dos semanas de charla con una célula de ransomware
    Alex Vázquez, Sales Engineer, SonicWall Iberia Jan 23 2020 11:00 am UTC 60 mins
    Únase a Alex Vázquez, experto en seguridad de SonicWall, que le presentará el lado humano de una célula moderna de ransomware y sus consejos para evitar que se infiltren en su organización, cifren sus endpoints y se propaguen a otras unidades y segmentos de su red.
  • Osterman Research: Why you need a third-party backup for Office 365
    Osterman Research: Why you need a third-party backup for Office 365
    Michael Osterman of Osterman Research; W. Curtis Preston Chief Technologist, Druva Jan 23 2020 11:15 am UTC 37 mins
    Do you think Office 365 is enough to protect your business data? Would you bet your career on it? Hear from industry expert, Michael Osterman of Osterman Research on how to step up your data protection game.

    Join us for this live webinar and learn how to:

    •Protect against ransomware, accidental deletion, or corruption
    •Better align and respond faster to compliance and legal inquiries
    •More efficiently manage departing employee and long-term archiving of data
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training
    Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training
    Sean Walker, Enterprise Account Executive Jan 23 2020 5:00 pm UTC 45 mins
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Why SD-WAN Will Play an Even Bigger Role in Enterprise Network Security
    Why SD-WAN Will Play an Even Bigger Role in Enterprise Network Security
    Mark Casey, CEO and Founder of Apcela, Sean Kaine, Apcela VP of Marketing and Sales, and Kunal Thakkar, Head of Engineering Jan 23 2020 5:00 pm UTC 60 mins
    SD-WAN has quickly moved from a nice-to-have to an enterprise roadmap imperative. Join us we explore why and how SD-WAN will play an even more expansive role in the enterprise network security architecture over the next 3 years.
  • Enhance & Extend Spectrum Protect
    Enhance & Extend Spectrum Protect
    Greg Tevis, Cobalt Iron VP of Strategy and Tony Owens, Arrow Electronics Solutions Architect Jan 23 2020 5:00 pm UTC 45 mins
    Spectrum Protect is a mature, scalable enterprise backup software on the market today. It provides reliable backup for more applications and platforms than any other product. However, with the massive scalability and long list of enterprise features comes significant complexity. Spectrum Protect requires a high degree of education and expertise simply to manage the day to day operations.

    Increasingly, Spectrum Protect invested customers want to take advantage of modern data protection techniques such as SaaS, multi-cloud, multi-tenant, orchestration, deep cyber security, automation, and analytics to name a few. All of this is now available to Spectrum Protect customers without a painful rip and replace process through Cobalt Iron’s Compass product.

    Attendees will learn
    •How to modernize the data protection estate
    •How analytics and automation can reduce management time by 80-90%
    •How to leverage existing Spectrum Protect licensing investments
    •How backup can become a first class citizen in the enterprise through orchestration and self-service
    •How SaaS and automation can reduce CapEx up to 50%

    Join our discussion to learn how to enhance and extend Spectrum Protect to deliver more value and modernize your data protection.
  • [Earn CPE] Cornerstones to Fortify Your Enterprise Cybersecurity Defense
    [Earn CPE] Cornerstones to Fortify Your Enterprise Cybersecurity Defense
    Panelists: Dr. Anton Chuvakin, Google Cloud; with Sumedh Thakar, Qualys; Roger Grimes, KnowBe4; and Vivian Tero, Illumio. Jan 23 2020 6:00 pm UTC 75 mins
    The enterprise cybersecurity landscape is dramatically expanding in scale and complexity, and cyberattacks are growing in magnitude and impact as digital transformation increases on a global scale. From phishing scams, to ransomware attacks, to malicious breaches from state actors, the potential threat to your business is huge. According to the Ponemon Institute, the average per breach cost to a company in 2018 was estimated at $3.86 million, an increase of 6.4 percent over the previous year.

    Even though cybersecurity presents a challenge to the enterprise, you are not helpless against the bad actors who seek to cause real and costly damage to your business. A proactive, company-wide, integrated digital security strategy that addresses cybersecurity threats at all levels of your business will provide you with both the offensive and defensive capabilities you need to handle whatever comes your way. Earn 1 CPE credit by attending this educational and interactive panel webinar. Our experts will discuss why fortifying your cybersecurity strategy should be a critical priority and highlight some best practices that you can employ to stay ahead of evolving threats, including how to;

    - Understand the changing cyberattack landscape,
    - Create a company-wide cybersecurity task force,
    - Evaluate your security budget against your threat level,
    - Fortify your cybersecurity defense with systems hardening, adaptive authentication, and endpoint protection.
  • Designing Storage Infrastructures for AI Workloads
    Designing Storage Infrastructures for AI Workloads
    Storage Switzerland and Panasas Jan 23 2020 6:00 pm UTC 60 mins
    Artificial Intelligence (AI) and Machine Learning (ML) workloads are fundamentally different from any other workload. These workloads deal in data sets measured in dozens of petabytes of capacity, and large percentages of it can go from dormant to active at any moment. The high storage requirement and highly active data set make using all-flash arrays or even large flash caches impractical.

    IT planners need to rethink their designs to create infrastructures that are highly parallel and leverage high capacity hard disk drives to strike the right balance of performance and capacity. These infrastructures also need metadata efficiency, since AI and ML workloads are metadata heavy.

    Join us to learn:
    * Why all organizations need to prepare for AI and ML
    * The challenges of AI/ML at scale
    * Why current storage infrastructures can’t meet the AI/ML at scale challenge
    * Requirements of an At-Scale AI/ML Storage Infrastructure
  • Career Conversations with Olanike Akanbi-Ayomide
    Career Conversations with Olanike Akanbi-Ayomide
    Jessica Gulick, WSC VP Jan 24 2020 12:00 am UTC 60 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Host: Jessica Gulick, VP WSC

    Guest: Olanike Akanbi-Ayomide
    Olanike, founder of Mosaic Consulting, is an Equity, Diversity, and Inclusion (EDI) expert with experience integrating EDI into all aspects of workplace management and leadership. She is also the VP of Business Strategy, Operations and Engagement for the technology/ cyber division of a global financial firm.

    With nearly 20 years of organizational development experience in the non-profit and corporate sectors, Olanike founded Mosaic Consulting (www.mosaic4equity.com) to offer EDI training, coaching, and consulting to individuals and institutions seeking transformation. She partners with clients to achieve greater workplace equity via diversity and inclusion strategies that actually work!

    In her role as the VP of Business Strategy, Operations and Engagement of a cyber security organization, she leads organizational strategy including diversity and inclusion, workforce management, and designs and governs a change management program with enterprise-wide impact.

    She is obsessed with building equity in the world via diversity and inclusion (EvDI TM), starting with the workplace! She's also slightly obsessed with playing competitive tennis and has been known to play on up to 3 competitive leagues or ladders in the same season.