Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Moving VMware from Disaster Recovery to High Availability Moving VMware from Disaster Recovery to High Availability George Crump, Storage Switzerland Feb 21 2017 6:00 pm UTC 60 mins
    VMware's stretch cluster does an excellent job of protecting against a site failure. If your primary data center fails then it is easy to bring up VMs in the second site. But what if you need more? How can you extend VMware's stretch cluster capability from single site protection to multiple sites? What if you want to extend recovery into the cloud? A multi-site and multi-cloud data distribution strategy not only creates more resilient IT operations, it also empowers workload mobility.

    In this live webinar Storage Switzerland and Hedvig will discuss the limitations of VMware stretch cluster, the possibilities of a more highly available approach and how to achieve complete IT resiliency.
  • Key Security Insights: Examining 2016 to predict what's coming in 2017 Key Security Insights: Examining 2016 to predict what's coming in 2017 Ken Dang Feb 21 2017 7:00 pm UTC 60 mins
    Cyber-crimes are alive and well on the global stage. Don’t resist taking the necessary defense measures to stop threats from slipping through the cracks. In this SonicWall Security Annual Threat webcast, we’ll present the most common attacks in 2016 and the ways we expect new threats to affect businesses throughout 2017.

    Some report highlights:
    •Ransomware changes in 2016 and the effects on malicious email and exploit kits
    •The growth and challenges of SSL
    •How Internet of Things devices were exploited and different security steps some organizations are taking in response
    •Developments in Android security
    •Changes in Point of Sale Malware compared to 2015 and useful lessons to be learned
  • Panel Discussion - AI & Machine Learning in Cyber Security Panel Discussion - AI & Machine Learning in Cyber Security Josh Downs, BrightTALK; John Laliberte, FireEye; Natalino Busa, TeraData & Neill Gernon, AI.Dublin and Atrovate Feb 22 2017 11:00 am UTC 60 mins
    A live online panel discussion focused on the debate around AI and machine learning and how they can automate cyber security; catch more threats and malicious attacks and prove a useful weapon against cyber crime.

    Panelists:

    - Josh Downs, Community Manager - Information Security, BrightTALK (moderator)

    - John Laliberte, VP, Endpoint and ICE, FireEye

    - Natalino Busa, Head of Applied Data, TeraData

    - Neil Gernon, MD, Atrovate & Founder, Dublin.AI
  • [Video Interview] RSA 2017 - John Elliott [Video Interview] RSA 2017 - John Elliott Josh Downs, Community Manager, BrightTALK & John Elliott Feb 22 2017 2:00 pm UTC 45 mins
    BrightTALK will be broadcasting its in-depth interview with easyJet Head of Payment Security John Elliott in conversation with BrightTALK Information Security Community Manager.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • Is Your Storage Ready for Disaster? Is Your Storage Ready for Disaster? W. Curtis Preston with StorageSwiss, Lei Yang and Bill Roth with Tintri Feb 22 2017 6:00 pm UTC 60 mins
    The recovery expectations of users and organizations is changing and their tolerance for downtime is lower than ever. IT professionals can no longer rely on the traditional backup and recovery process to meet these new requirements. Primary storage needs to do more, and simple LUN-based replication is not going to get the job done. Instead data centers need to look for primary storage that has advanced replication capabilities and can integrate with multiple hypervisors and existing data protection solutions to create a holistic disaster recovery strategy.
  • Why Built-In Data Protection & Network Security are Key to Threat Intelligence Why Built-In Data Protection & Network Security are Key to Threat Intelligence Stephen Jeffries, Technical Architect, Microsoft Feb 22 2017 7:00 pm UTC 60 mins
    With more than 250 million threats online in any given day, security for your business has never been more critical. These threats can cause loss of data and personal information with increased risk of identity theft. Windows 10 includes built-in protection to help keep you more secure with all new features in the Anniversary update.

    Join this webcast to learn more about the two major new security features that launched with the Anniversary update:

    - Windows Defender Advanced Threat Protection (WDATP) detects, investigates, and responds to advanced malicious attacks on networks by providing a more comprehensive threat intelligence and attack detection
    - Windows Information Protection enables businesses to separate personal and organizational data and helps protect corporate data from accidental data leaks.
  • How far can you trust AI How far can you trust AI Greg Pollock, VP of Product at UpGuard Feb 22 2017 9:00 pm UTC 60 mins
    Machine learning is both cool and valuable, but to apply it effectively requires that we disregard the former in order to be rigorous about the latter. In this session we take a hard look at the qualities that make machine learning fit for purpose for problems in cyber security in order to lay out a global roadmap for how machine learning can solve security problems today. Even more importantly, our bottom-up analysis of machine learning will chart the areas where an excessive faith in automation can become harmful to a business' security posture.

    About the presenter:

    Greg has previously managed products and product teams for gaming and education startups with a focus on meaningful, measurable engagement loops. His games have been ranked in the top ten by traffic on Facebook, the top ten by revenue on the App Store, and as the Editor's Choice in the App Stores of over 70 countries.
  • How to Gate, Watch and Guard your Sensitive Data Everywhere How to Gate, Watch and Guard your Sensitive Data Everywhere Sunil Choudrie Feb 23 2017 11:00 am UTC 60 mins
    The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.

    So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.

    We will explain how Symantec technology addresses this approach and how you will benefit from:

    •Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.

    •Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.

    •Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.
  • Protecting Your Data with Effective Incident Response, Monitoring & Threat Intel Protecting Your Data with Effective Incident Response, Monitoring & Threat Intel Stuart Davis, Director, Mandiant & David Grout, Systems Engineering Director, FireEye Feb 23 2017 11:30 am UTC 45 mins
    Protecting against data loss is a key focus of any organisation’s information security program. However it is not always that easy to put long term initiatives in place with consistent monitoring and response effectiveness to mitigate against advanced attacks where intellectual property may be the target.

    In this webinar Stuart and David will explain how effective incident response, long term monitoring and threat intelligence can help deal with data protection against advanced persistent threats (APTs) in this modern age of cyber warfare.
  • [Video Interview] RSA 2017 - Raj Samani, Intel Security [Video Interview] RSA 2017 - Raj Samani, Intel Security Josh Downs, Community Manager, BrightTALK & Raj Samani, EMEA CTO, Intel Security Feb 23 2017 2:00 pm UTC 45 mins
    BrightTALK will be broadcasting an in-depth interview with Raj Samani, CTO EMEA, Intel Security and Josh Downs, Community Manager at BrightTALK.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • IoT Risk Becomes Real IoT Risk Becomes Real Chris Rodriguez, Senior Industry Analyst Network Security + Tom Bienkowski, Directror Product Mkt, Arbor Networks Feb 23 2017 5:00 pm UTC 60 mins
    Vulnerable IoT devices are plentiful and ripe for abuse by threat actors.
    But what exactly is the value of these devices to DDoS attackers?
  • Solving Issues with Microsoft Windows File Server Bloat Solving Issues with Microsoft Windows File Server Bloat Tony Barbagallo, VP of Product Feb 23 2017 6:00 pm UTC 60 mins
    Organizations no longer need to waste budget by expanding or upgrading Windows Storage Servers or waste resources evaluating what data is or isn’t useful. They can now maintain their existing servers and seamlessly add intelligent data transfer to a limitless tier of scale-out secondary storage at a quarter of the cost. In addition, primary storage is optimized, disk I/O is reduced and storage silos are consolidated. Join Caringo VP of Product Tony Barbagallo as he introduces the new FileFly Secondary Storage Platform--a complete hardware, software, and services solution that is ideal for remote office consolidation, enabling collaboration and significantly simplifying data protection.
  • DRaaS Best Practices - 5 Critical Recovery Steps DRaaS Best Practices - 5 Critical Recovery Steps George Crump, Storage Switzerland Feb 23 2017 6:00 pm UTC 60 mins
    Disaster Recovery as a Service (DRaaS) offers organizations one of the most viable recovery options available to them in recent years. The ability to have an on-demand recovery site that is pre-seeded with your data should dramatically lower costs and improve recovery times, even in the worst of disasters. But IT professionals can't take for granted that DRaaS providers will continue to cover data protection basics while also providing a seamless recovery experience. In this webinar, join Storage Switzerland Lead Analyst George Crump and Carbonite Senior Solutions Engineer Jason Earley as they provide you with the 5 Critical Recovery Steps for using DRaaS.
  • Making your Data Come Together with IoT Intelligence Making your Data Come Together with IoT Intelligence Joshua Davis, MTC Cloud Solutions Architect Feb 23 2017 7:00 pm UTC 60 mins
    The Internet of Things (IoT) starts with your things—the things that matter most to your business. IoT is about making your data come together in new ways. Tap into how data works for your business with IoT dashboards. Uncover actionable intelligence and modernize how you do business. See how IoT is revolutionizing businesses with field service organizations and driving business and digital transformation.

    Join this webcast to:
    - Learn why your business needs an IoT strategy
    - Understand how to connect and scale your IoT with efficiency
    - Analyze and act on untapped data
    - Integrate IoT with your business processes
    - Drive efficiency and scale in field services using IoT
  • Cómo recuperar el control de sus datos móviles Cómo recuperar el control de sus datos móviles David Sanz - EMEA Endpoint & Mobile Competency Lead Feb 24 2017 11:30 am UTC 60 mins
    Los puestos de trabajo y los dispositivos móviles son habitualmente los aspectos más olvidados en la estrategia de gestión de datos empresarial. Sin embargo, la información presente en ordenadores portátiles, de escritorio y dispositivos móviles es uno de los activos de mayor valor para la organización, pese a que potencialmente se encuentra en máximo riesgo. De acuerdo con IDC hay alrededor de 1.300 millones de trabajadores móviles hoy en día, pero tan solo la mitad de las empresas utiliza algún tipo de backup para puestos de trabajo.

    La fuerza de trabajo móvil es cada vez mayor. Dichos usuarios manejan información fuera del dominio tradicional del departamento de TI y emplean soluciones de colaboración no corporativas. El coste potencial y el riesgo asociados al cumplimiento de la normativa y al eDiscovery, la necesidad de proteger el puesto de trabajo y de aportar soluciones de colaboración corporativas están claros y se encuentran en un punto de inflexión crucial.

    Acompáñenos en este webinar, donde analizaremos:
    - Cómo recuperar el control sobre lo que ocurre en los dispositivos móviles de los trabajadores
    - Cómo mitigar los riesgos asociados con los ataques cada vez más frecuentes de ransomware
    - Cómo aumentar la productividad con una plataforma segura para la compartición de archivos
  • [Video Interview] RSA 2017 - Ian Glover & Rowland Johnson [Video Interview] RSA 2017 - Ian Glover & Rowland Johnson Josh Downs, Community Manager, BrightTALK; Ian Glover, President, CREST & Rowland Johnson, MD, Nettitude Feb 24 2017 2:00 pm UTC 45 mins
    BrightTALK will be broadcasting its in-depth interview with CREST President Ian Glover and Nettitude MD Rowland Johnson jointly in conversation.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • [Video Interview] RSA 2017 - Troels Oerting, CISO, Barclays [Video Interview] RSA 2017 - Troels Oerting, CISO, Barclays Josh Downs, Community Manager, BrightTALK & Troels Oerting, CISO, Barclays Feb 28 2017 2:00 pm UTC 45 mins
    BrightTALK will be broadcasting its in-depth interview with Troels Oerting, CISO of Barclays and Josh Downs, Community Manager of the BrightTALK Information Security Community.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • Microsoft CEO: Digital Transformation & Changing Landscape in the United States Microsoft CEO: Digital Transformation & Changing Landscape in the United States Satya Nadella, CEO, Microsoft; Curt Kolcun, VP, US Public Sector Feb 28 2017 5:00 pm UTC 15 mins
    Microsoft’s CEO, Satya Nadella sits down with Curt Kolcun, VP US public Sector about digital transformation and the changing landscape in the United States.
  • A View of the World's Largest & Fastest Growing Data Center Hotspots A View of the World's Largest & Fastest Growing Data Center Hotspots Kelly Morgan 451 Research and Mark Kidd Iron Mountain Feb 28 2017 6:00 pm UTC 60 mins
    A View of the Northern Virginia Datacenter Market with 451 Research and Iron Mountain

    The Northern Virginia market, which includes multiple locations in/around Washington DC, continues to be one of the largest and fastest growing datacenter hot spots in the world and top market for cloud providers. While much has been said about the area, please join us to discuss the latest in: what makes the market special, why so many firms want datacenter space there, how the market is evolving, and which locations to consider when thinking about a deployment in the area.

    Please join us for a webinar with Kelly Morgan, Vice President at 451 Research and Mark Kidd, Senior Vice President and General Manager for Iron Mountain Data Centers, for a discussion on the Northern Virginia market and Iron Mountain’s approach to the market.
  • Key Steps to Implement & Maintain PCI DSS Compliance in 2017 Key Steps to Implement & Maintain PCI DSS Compliance in 2017 Dr. Branden Williams; Smrithi Konanur, HPE Security; Kevin Eberman, Mineraltree; Asma Zubair, WhiteHat Security Feb 28 2017 6:00 pm UTC 60 mins
    In today’s digital landscape, it’s much easier for criminals to access sensitive payment card data, not only gaining direct access to a consumer’s available funds, but also their personal identity. With cyber attacks becoming much more advanced, the PCI DSS standard has been forced to adapt to address these new threats.

    However, PCI compliance is something that any organization can successfully achieve. The requirements of PCI DSS are clear, but it takes work to accomplish compliance across an organization. On this webinar our panel will discuss some best practices, and solutions that provides your business with an easy, cost effective and highly automated way to achieve compliance with PCI DSS in 2017.
  • Getting Started with Hyperconverged Infrastructure Getting Started with Hyperconverged Infrastructure Sushant Rao, Sr. Director Product & Solutions Marketing, DataCore Software Feb 28 2017 7:00 pm UTC 45 mins
    Hyperconverged infrastructure (HCI) is a huge trend in data centers. Analysts predict HCI - along with other Software-defined Storage technologies - will radically change current storage architectures.

    But, is HCI right for you? What use cases make sense for HCI?

    Join us as we will discuss how to get started with HCI. Topics that will be covered in this webinar include:

    - Use cases suitable for HCI
    - Criteria to evaluate HCI products
    - Pros and cons of different vendors’ HCI
    - Avoiding the missteps of early adopters
  • How to Prevent Ransomware Infections How to Prevent Ransomware Infections Brook Chelmo Feb 28 2017 7:00 pm UTC 60 mins
    With the growth of ransomware families by 600% in 2016, there is no slowdown in sight for one of the worst malware variants in history.

    SonicWall’s security researcher and advocate, Brook Chelmo, will talk about the impact of ransomware as well as other advanced persistent threats such as zero-day attacks. SonicWall has the expertise and resources to help you stay ahead of developing threats.

    Learn how to:
    •Stay safe from ransomware and other advanced attacks
    •Practice good security hygiene
    •Use trusted automated tools to protect your network and endpoints
  • [Video Interview] RSA 2017 - Rob Wainwright, Director, Europol [Video Interview] RSA 2017 - Rob Wainwright, Director, Europol Josh Downs, Community Manager, BrightTALK & Rob Wainwright, Director, Europol Mar 1 2017 2:00 pm UTC 45 mins
    BrightTALK will be broadcasting its in-depth interview with Europol Director Rob Wainwright and Josh Downs, Information Security Community Manager at BrightTALK.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • Microsoft CISO: Cybersecurity in Action Microsoft CISO: Cybersecurity in Action Bret Arsenault, Chief Information Security Officer, Microsoft Mar 1 2017 4:00 pm UTC 30 mins
    Cybersecurity continues to be a top priority; leaders must constantly judge how to balance business enablement and cyber protection priorities as they support the digital transformation of their organizations.

    Join Microsoft's CISO, Bret Arsenault, as he discusses examples of this balancing act in action and where Microsoft can help to improve your security posture.
  • Next Generation: VPN vs. Virtual Cloud Network (VCN) Next Generation: VPN vs. Virtual Cloud Network (VCN) Bryan Embrey, Product Marketing Manager, Cradlepoint Mar 1 2017 5:00 pm UTC 60 mins
    There’s no way around it: Setting up and maintaining traditional VPNs for remote access requires extensive time, energy and resources. Configuring, managing, and troubleshooting devices and applications located at the data center in headquarters and in each end device is one of the most complex and laborious aspects of network administration — especially with increased workforce mobility and IoT.

    With a next-generation Virtual Cloud Network (VCN), configuration, management, and security policies are streamlined and handled in the cloud.  This enables rapid deployment, reduces operational expenses and completely integrates with your existing infrastructure.

    At 9am PT / 12pm ET on March 1 2017, join Cradlepoint’s Bryan Embrey to explore how resilient, redundant, secure, and scalable VCNs leverage software-defined networking (SDN) and network function virtualization technologies to reduce complexity, hardware, and IT man-hours.