Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Conversation with an Enterprise Architect: Solving IT & Storage Challenges
    Conversation with an Enterprise Architect: Solving IT & Storage Challenges Mike Grandinetti, CMO/CSO at Reduxio Recorded: Mar 22 2018 23 mins
    Want to learn from your peers and have real valuable feedback on IT Management and Goals? Join this peer-to-peer webcast!

    This webcast has been created as a space to hold conversations with IT Infrastructure professionals who share similar concerns and challenges, as well as success stories and a real-world case study from Jorge Barreto, Enterprise Architect at BFL Canada, on how he addressed the following:


    1. Meet IOPS requirements
    2. Spend time in labor-intensive operations such as VM Recovery
    3. Lack of team expertise for complex operations required his personal time in completing tasks

    Join us for live Q&A and discussion with fellow IT professionals!
  • The Front Lines of Cyber Risk: 4 Steps to Protecting Endpoints from Ransomware
    The Front Lines of Cyber Risk: 4 Steps to Protecting Endpoints from Ransomware Lilac Schoenbeck, Vice President, Portfolio Marketing at Carbonite, George Crump, Founder & Lead Analyst, Storage Switzerland Recorded: Mar 22 2018 54 mins
    When it comes to cyber-risk, the most exposed part of any organization is also the least protected; endpoints. Much of the data on laptops and other devices is unique and not stored on storage owned by the organization, but endpoints are often the first casualties of a cyber-attack. Given the new threat organizations need to provide complete protection, which not only includes protection from device failure but also ransomware attacks, device theft and litigation response.

    The challenge for IT is providing this protection without disrupting the user. If the protection solution gets in the way of the user, they will disable it, putting not only their data at risk but leaving the organization open to data loss and cyber-breach.

    In this live webinar, learn the four requirements of complete endpoint data protection:

    1. Truly Transparent Protection (silent deployment, bandwidth optimization, quick cache)
    2. Deployment Flexibility - On-premises, Public Cloud or Private Cloud
    3. Total Encryption - Protect data in-flight and at rest
    4. Beyond Backup Features - Remote wipe, Legal hold
  • The Future of Passwords
    The Future of Passwords Hamza Sirag Recorded: Mar 22 2018 58 mins
    This webinar will provide an overview of the future of passwords. Passwords have become very important, protecting a treasure trove of information. You will get an inside look at the techniques and tactics used conduct password attacks. We will discuss the various countermeasures available, new improvements made to the latest operating systems to prevent successful password attacks, and how the industry is trying to eliminate passwords. We will conclude by discussing ways we can potentially circumvent new countermeasures.

    Hamza Sirag Hamza is currently an Information Security consultant. He has spent the majority of his time immersed in the world of cybersecurity. He has had the opportunity to lead complex penetration tests for a variety of federal and commercial clients. He is the founder of Beltway Hackers, a Northern VA based meetup group focused on offensive cybersecurity. https://www.meetup.com/Beltway-Hackers
  • How to build a ransomware recovery plan that works
    How to build a ransomware recovery plan that works Darren Miller: Manager of engineering test and performance Recorded: Mar 22 2018 41 mins
    How will your organization recover from the next ransomware attack? Join our live webinar to learn how a solid data protection plan can solve your ransomware woes.
  • [Earn 1 CPE]  Enabling Cybersecurity: Ignite Your ERM Program
    [Earn 1 CPE] Enabling Cybersecurity: Ignite Your ERM Program Colin Whittaker with Tim White, Qualys, Alon Yaffe, Barracuda; Cameron Jackson, Riskonnect; and Marc French, Mimecast Recorded: Mar 22 2018 75 mins
    Effective risk management is critical for every organization, especially in the current era of increasingly frequent and complex cyber threats. Organizations with the ability to detect changes across global IT environments in real time can better prevent and respond to malicious acts such as ransomware/malware attacks and configuration tampering.

    Join our panel of InfoSec experts on this CPE accredited webinar to learn how your organization can take command of risk to proactively prioritize and address the risks that matter most, and ignite your risk management program to enable cybersecurity.

    Qualifying participants will earn 1 CPE credit.

    Learning Objectives:

    - Discover how to identify, catalog, and prioritize risks across the enterprise
    - Find out how to quickly measure critical activities and address inherited risk
    - Learn how to gain efficiency and effectiveness of current risk-management approaches
  • How to Cope with GDPR Strict Breach Reporting Rules
    How to Cope with GDPR Strict Breach Reporting Rules Stuart McKenzie, VP, Mandiant Consulting Recorded: Mar 22 2018 38 mins
    Although GDPR is primarily a legal and compliance issue, a data breach is the point of failure that will highlight any deficiencies in an organization’s data protection and larger security posture.

    GDPR Article 33 requires breaches to be reported within 72 hours of discovery. With just 72 hours after breach discovery to report the nature of the breach, number of records and subjects affected, and likely consequences, every hour matters, and visibility across the environment becomes a must.

    With speed of response being critical, you need a trusted partner with the incident response expertise, threat intelligence and purpose-built technology to enable rapid initial notification, and to provide support with subsequent notifications once further data points are identified/obtained.

    Join the conversation with Stuart McKenzie, Vice President Mandiant EMEA, to talk about :
    · How FireEye can help you meet the GDPR 72-hour breach reporting requirement, should you be breached, and
    · How FireEye can help reduce the risk and impact of a breach by securing sensitive and confidential data and improving breach response readiness—before, during, and after a cyber-attack.
  • GDPR: durante e dopo le 72 ore
    GDPR: durante e dopo le 72 ore Marco Rottigni, Senior Manager, Product Marketing, FireEye Recorded: Mar 22 2018 61 mins
    Sebbene il GDPR sia soprattutto una questione legale e di compliance, un evento di "data breach" evidenzia la presenza di carenze nel sistema aziendale di protezione dei dati e più in generale nella security posture.
    L'articolo 33 del GDPR richiede la notifica delle brecce informatiche entro 72 ore dalla scoperta.
    Un tempo decisamente limitato per notificare la natura della breccia, il numero di record e soggetti coinvolti e le possibili conseguenze. Ogni ora conta ed è fondamentale disporre di una visibilità del proprio ambiente completa ed approfondita.
    In questo scenario, la rapidità di risposta diventa un fattore critico. Per questo è necessario potersi affidare ad un partner che abbia un'elevata competenza nell'incident response, che disponga di soluzioni di threat intelligence di qualità e di tecnologia atta non solo a garantire una prima notifica rapida, ma anche a supportare le notifiche successive sullo stato di avanzamento del processo di risposta e di rimedio all'incidente.

    Ne parliamo il 22 marzo con Marco Rottigni, Sr. Product Marketing Manager EMEA, per comprendere come FireEye possa:
    "aiutarti a soddisfare il requisito di notifica incidente entro le 72 ore dalla scoperta della breccia
    "ridurre il rischio e l'impatto di una potenziale breccia con la messa in sicurezza di dati sensibili e confidenziali, migliorando le capacità di risposta agli incidenti prima, durante e dopo un cyber attack
  • Security Operation Platform: Une nouvelle réponse avec FireEye Helix
    Security Operation Platform: Une nouvelle réponse avec FireEye Helix Jerome Delaville, System Engineer, FireEye France Recorded: Mar 22 2018 41 mins
    Les plateformes de sécurité présentent aujourd'hui beaucoup de challenges qui les rendent difficiles à gérer : manque de visibilité, trop volume d'alertes, peu de contextualisation… Le résultat est une perte d'efficacité, et de vitesse dans la prise en compte des incidents de sécurité.
    FireEye a conçu une plateforme de gestion des opérations de sécurité avec ces objectifs en tête, plus de visibilité, une meilleure lisibilité et une contextualisation de la menace, le but ultime étant de fournir une plateforme facile à déployer, à administrer et qui répond aux besoins d'aujourd'hui.

    Lors de ce webinaire nous couvrirons les points suivants :
    Comment HELIX centralise les opérations de sécurité :
    - Améliore la visibilité de bout en bout
    - Aide à la Priorisation et la contextualisation des alertes
    - Accompagne à la prise Prise de décisions et à la levée de doutes

    Nous terminerons par une démonstration de la plateforme à travers un Business Case réel et nous laisserons le temps aux différentes questions en live.
  • Jak zostać Service Providerem i zacząć zarabiać pieniądze
    Jak zostać Service Providerem i zacząć zarabiać pieniądze Marek Ścibior, Piotr Łukasiewicz Recorded: Mar 22 2018 58 mins
    Wielu integratorów technologicznych zastanawia się jak rozwinąć swój biznes o dodatkowe usługi. Przedstawimy pomysł na usługi zarządzalne (Managed Services) oparte o rozwiązania chmurowe. Krok po kroku pokażemy jaki jest rynek w Polsce, jakie daje możliwości, jak zbudować swoje portfolio usługowe, ile to kosztuje i czy da się na tym zarobić.
  • Wie zukunftsSICHER ist Ihr Unternehmen?
    Wie zukunftsSICHER ist Ihr Unternehmen? Jochen Rummel, Regional Director D/A/CH Recorded: Mar 22 2018 43 mins
    Knapp 70 Prozent der Unternehmen und Institutionen in Deutschland sind in den Jahren 2016 und 2017 Opfer von Cyber-Angriffen geworden. In knapp der Hälfte der Fälle waren die Angreifer erfolgreich und konnten sich Zugang zu IT-Systemen verschaffen, die Funktionsweise von IT-Systemen beeinflussen oder Internet-Auftritte manipulieren.
    Aufgrund der hohen Anzahl von Risiken und Lösungen brauchen Unternehmen zunächst Klarheit, welchen Grad an Sicherheit sie erreichen möchten, um Budget und Ressourcen optimal einzusetzen. Wollen Sie lediglich die gesetzlichen Vorgaben einhalten, den Branchenstandard erfüllen oder Sicherheit als Alleinstellungsmerkmal für Ihr Unternehmen definieren?
    Wir erläutern Ihnen unseren Ansatz zum Aufbau einer effektiven Sicherheitsarchitektur, die auf die individuellen Bedürfnisse Ihres Unternehmens abgestimmt ist und bieten Entscheidungshilfen zur Festlegung des notwendigen Grads an Sicherheit. Dabei fokussieren wir folgende Themen:
    Bewertung der Ausgangssituation (bestehende Sicherheitsarchitektur)
    "Bewertung von Sicherheitsprogrammen
    "Fazit: Erstellung eines Aktionsplans in Abhängigkeit von Budget und Ressourcen

    Zielgruppe: Geschäftsführer, Sicherheitsbeauftragte, IT-Leiter, Datenschutzbeauftragte und Fachabteilungen, die an der Ausarbeitung von nachhaltigen Sicherheitskonzepten beteiligt sind.
  • Is Microsoft Office 365™ Good Enough Protection and Recovery?
    Is Microsoft Office 365™ Good Enough Protection and Recovery? Shane Harris - Director Product Marketing, Mimecast & Glenn Brown - Director Product Management, Mimecast Recorded: Mar 21 2018 23 mins
    While every organization needs to keep data protected and accessible for its users, many are unaware of the risky protection and recovery gaps when malicious attacks occur or point-in-time recovery is required. Many organizations are asking themselves, “Is Microsoft O365 good enough protection and recovery?” or “Is my on-premises backup solution enough?” Join this webinar to learn where your biggest risks are and how to mitigate them.

    Presenter Info:

    Shane Harris - Director Product Marketing, Mimecast

    Shane Harris has had varied experience spanning 20 years across IT, Product Management, Sales, Engineering and Research Analyst roles in the areas information management, eDiscovery, archive and compliance. Prior to Mimecast , Shane was the lead analyst for the Enterprise Information Archiving Magic Quadrant at Gartner and has held executive leadership positions at kCura, Commvault and Johns Hopkins. In these roles, he has held countless customer conversations across all verticals and was a frequent speaker, presenter and thought-leader at industry events.

    Glenn Brown - Director Product Management, Mimecast

    Glenn joined Mimecast in 2007 and is responsible for Mimecast’s archiving, compliance and data resilience products group. He is tasked with defining and bringing the product roadmap from vision to reality and is a passionate advocate of cloud technology enabling strong data resilience strategies.
  • State of Cyber-Security Arms Race: Preparing for what's coming in 2018
    State of Cyber-Security Arms Race: Preparing for what's coming in 2018 Ken Dang Recorded: Mar 21 2018 61 mins
    Examining 2017 to prepare for what's coming in 2018

    The modern cyber war — against governments, businesses and individuals alike — is comprised of a series of attacks, counterattacks and respective defensive countermeasures. The SonicWall 2018 Cyber Threat Report provides exclusive data that highlights advances by both the security industry and cyber criminals.

    Attend this webinar to gain a better understand the current State of Cyber-Security Arms Race. We’ll share our findings, intelligence, analysis and research to help you improve your security preparations and posture going forward.
  • A New Way of Predicting Exploitability - Kenna Security with Exploit Prediction
    A New Way of Predicting Exploitability - Kenna Security with Exploit Prediction Ed Bellis, CTO, Co-Founder, Michael Roytman, Chief Data Scientist Recorded: Mar 21 2018 41 mins
    Do you think security is overdue for actionable forecasts rather than security dogma? Are you a security leader tired of worrying about the next vulnerability with a logo and a web site? If we can forecast the weather, we can use similar models to foresee which vulnerabilities attackers are likely to weaponize.

    Join Kenna Security's Michael Roytman, Chief Data Scientist and Ed Bellis, CTO, Co-Founder and ex-CISO at Orbitz for a live webinar where they will debut Kenna Security's new Exploit Prediction, the industry's first vulnerability exploit prediction capability, a significant breakthrough for security professionals looking to develop a more mature proactive approach to vulnerability management.

    In this webinar cover:

    "How Kenna Exploit Prediction has delivered 94 percent predictive accuracy
    "How to adopt a proactive approach to contextualize, prioritize and remediate vulnerabilities, based on risk
    "How the Kenna Security Platform with Exploit Predictions can help align security, IT operations, and executive management with a single view of risk
    "A demonstration of the Kenna Security platform with the new Exploit Prediction capabilities
  • Verizon Threat Research Advisory Center - Protected Health Information
    Verizon Threat Research Advisory Center - Protected Health Information John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Mar 21 2018 77 mins
    Fellow Cybersecurity Practitioner:
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape.
    This month's theme: Protected Health Information
  • Capacity Planning and Scaling for Object Storage
    Capacity Planning and Scaling for Object Storage John Bell, Senior Consultant & Tony Barbagallo, VP of Product Recorded: Mar 20 2018 44 mins
    One of the many benefits of best-of-breed object storage solutions is the ability to scale on demand and pay as you grow. How do you predict your capacity needs and determine your roadmap for scaling your storage? VP of Product Tony Barbagallo and Sr. Consultant John Bell will provide concrete guidance to help you predict your needs so you can accurately map out and budget for your organization’s data growth.
  • Build AI and ML in the Cloud and Reduce IoT Solution Costs with Azure IoT Edge
    Build AI and ML in the Cloud and Reduce IoT Solution Costs with Azure IoT Edge Arjmand Samuel, Principal Program Manager , Microsoft; Chipalo Street, Senior Program Manager, Microsoft Recorded: Mar 20 2018 53 mins
    In today’s connected world, devices and data can be found far outside traditional data centers or offices, in places like oil wells, hospitals or factory floors. For these businesses, connectivity can be expensive and unreliable and get in the way of implementing effective IoT solutions.

    Azure IoT Edge is a service that allows cloud intelligence to run on your IoT devices locally. With Azure IoT Edge, you can deploy cloud workloads such as Artificial Intelligence, Azure Machine Learning, Azure Stream Analytics, Azure Functions or custom code via containers directly on your IoT device to enable real-time insights.

    Curious to learn more? Join us in this webinar, presented by IoT engineering experts, to learn:

    - Why and when you should use edge computing as important part of your IoT solution
    - How to get started with Azure IoT Edge
    - How to create and deploy containers using IoT Edge portal
    - Securing your edge devices and solution
  • Is Ransomware the New Normal?
    Is Ransomware the New Normal? Ulf Mattsson, Lance James, Barak Engel, David Morris Recorded: Mar 20 2018 62 mins
    Ransomware was the word on everybody’s mind in 2017 with Petya, WannaCry and more. Will this continue into 2018? And if so, how can you ensure your business is protected from the threat of ransomware?
    This session will cover:
    - An overview of how Ransomware works.
    - Can you realistically prevent Ransomware from infiltrating your organization?
    - What can you do to protect yourself from an attack?
  • Zarządzanie danymi w kontekście RODO przy wykorzystaniu platformy Commvault
    Zarządzanie danymi w kontekście RODO przy wykorzystaniu platformy Commvault Piotr Łukasiewicz, System Engineer Recorded: Mar 20 2018 64 mins
    87% ankietowanych dyrektorów działów IT jest przekonanych, że ich obecne zasady i procedury narażą ich na ryzyko po wejściu w życiu RODO
    Największym wyzwaniem związanym z zachowaniem zgodności z RODO jest fakt, że dane osobowe mogą znajdować się w dowolnym miejscu. Pomyśl tylko, ile kopii czyichś danych osobowych może być rozsianych po Twojej organizacji.

    W jaki sposób zagwarantujesz zgodność z RODO we wszystkich źródłach niestrukturyzowanych danych? Laptopy, urządzenia mobilne i inne punkty końcowe? Poczta elektroniczna? Chmury osobiste? Serwery plików i systemy zarządzania treścią z setkami lub tysiącami uprawnionych użytkowników? Kopie dev/test? Aplikacje business intelligence (BI) i analityczne?
    Aby zapewnić zgodność z RODO, najprawdopodobniej trzeba będzie dokonać fundamentalnych zmian w sposobie zbierania i przechowywania danych oraz zarządzania nimi. Będzie to czasochłonne, dlatego ważne jest, aby podjąć odpowiednie działania juz teraz.
  • The Rise and Rise of Ransomware: Prepare and Protect
    The Rise and Rise of Ransomware: Prepare and Protect Nick Frost, Principal Consultant, ISF Recorded: Mar 20 2018 49 mins
    The expectation from the start of 2017 – that we hadn’t seen the back of ransomware – was justified. 2017 was plagued with global attacks such as Petya, WannaCry, Bad Rabbit and many others. Unfortunately, 2018 could be even worse.

    With ransomware continuously developing new delivery techniques, organisations must learn how to prepare and protect themselves from the threat of ransomware, but how can they do this?

    In this webinar, Nick Frost, Principal Consultant at the ISF, will explore the latest threats in ransomware and what organisations can do to minimise vulnerabilities to reduce risks of an attack.

    About the presenter:

    Nick is currently the Principal Researcher for the Information Security Forum (ISF) Ltd. He has more than 15 years’ experience designing and implementing a risk-based approach to securing information. He has developed leading solutions for evaluating risk across both internal and supplier environments.
  • Innovation in GRC 360 Contextual Awareness: Lockpath Keylight Ambassador
    Innovation in GRC 360 Contextual Awareness: Lockpath Keylight Ambassador Michael Rasmussen - GRC 20/20, Sam Abadir - Lockpath Recorded: Mar 20 2018 28 mins
    Join the GRC Pundit, Michael Rasmussen and LockPath’s Sam Abadir for a 60-minute webinar as we review the capabilities of the LockPath Keylight Ambassador, winner of the 2015 GRC 2020 Award for Technology Innovation in Enterprise GRC Integration.

    Organizations need to move beyond the concept of a GRC platform and focus on an integrated view of GRC data and systems through a GRC architecture that is a cohesive part of the broader business fabric of the organization. This is what GRC 20/20 refers to as 360° GRC contextual awareness. Where risk and compliance is monitored and understood in the course of business operations, changing risks and regulations, and interactions. Delivery of GRC contextual awareness requires that GRC be a central nervous system to capture signals found in processes, data, and transactions as well as changing risks and regulations for interpretation, analysis, and holistic awareness of risk in the context of business. LockPath Keylight Ambassador is a GRC solution that offers a hybrid agent architecture that enables organizations to collect distributed GRC related data from applications installed across the organization and in the cloud. Keylight’s Ambassador innovation and advancement of GRC technology is its ability to securely and automatically transmit on premise data to the cloud from business systems and information security tools.
  • Overcoming Objections through Creating Certainty
    Overcoming Objections through Creating Certainty Paul Blair Recorded: Mar 20 2018 24 mins
    I will share my thoughts on how we overcome a lot of objections by creating certainty around our products/services, us and our companies. Increase credibility, position ourselves as the expert or authority figure to gain control of an inquiry so we may find it easier to close. I will also look at how this will have a positive impact upon your prospect.
  • Commvault Admin Console
    Commvault Admin Console Christian Eymard Recorded: Mar 20 2018 33 mins
    Découvrez la simplicité et l'efficacité de la nouvelle console d'administration et d'exploitation de la solution Commvault

    Comment gérer la protection de vos machines virtuelles, serveurs de fichiers et application en quelques clics avec Commvault ? Laissez-nous vous montrer la nouvelle interface de Commvault pour les serveurs, applications et machines virtuelles.
    Dans ce Webinaire, vous allez découvrir une interface simple et intuitive pour réaliser vos opérations d’ajout d’environnement à protéger, vos accès aux données pour les restaurer, le suivi des jobs et alertes, les rapports proposés et un tableau de bord qui vous permet en une vue de vous faire une idée sur le bon fonctionnement de votre solution Commvault.

    C’est le moment d’utiliser Commvault Admin Console pour vous simplifier la vie, avec depuis toujours la solution de sauvegarde la plus performance du marché !
    Commvault, simplicité et performance.
  • Unpacking the Hype: What do the new privacy laws really mean to your business?
    Unpacking the Hype: What do the new privacy laws really mean to your business? Brian Fletcher, Director, Government Affairs, Symantec, Asia Pacific and Japan Recorded: Mar 20 2018 60 mins
    With the new Privacy Amendment (Notifiable Data Breaches) Act 2017 now in effect, many Australian businesses and government agencies are starting to take action to ensure their data protection and breach response plans are up to date and comply with the new scheme. However, knowing how to avoid the higher penalties and reputational damage caused by data breaches is a tough challenge for any business.

    Don't miss this opportunity to join Symantec's privacy expert Brian Fletcher, Director, Government Affairs, Symantec, Asia Pacific and Japan to learn more about the new laws and what you can do to ensure your business is not making headlines for all the wrong reasons.

    " Hear about new challenges introduced by the Australian mandatory data breach notification laws and the wide reaching General Data Protection Regulation (GDPR)
    " Learn about key steps in the journey towards privacy compliance and why most Australian businesses have approached privacy wrong
    "Understand how these regulations can enable you to gain trust and enhance customer experiences
  • Our Cyberthreat Landscape: why collaboration is key
    Our Cyberthreat Landscape: why collaboration is key Nahim Fazal and Ramón Vicens Recorded: Mar 19 2018 58 mins
    As the ‘public profile’ of cybercrime continues to increase, enterprises are encouraged to look at how they keep their businesses and customers safe by sharing intelligence, best practice and defense measures.

    Join Nahim Fazal, Head of Cyberthreat Intelligence at Blueliv, for a webinar reflecting on the incidents and trends discussed in Blueliv’s annual cyberthreat report, and guidance on how organizations of all sizes can protect themselves in an ever-more sophisticated threat landscape.

    The report combines intelligence gathered through Threat Compass with insight from the Blueliv analyst team, leading to informed assessments about the current state of play and areas which require immediate attention.

    Register today to reserve your spot.

    Blueliv is leading a new wave of proactive, real-time threat monitoring that protects organizations from the outside in, radically reducing attack success rates and improving incident response performance through fresh, actionable intelligence. The in-house team is bolstered by the Blueliv Threat Exchange Network, a global community of thousands of security experts united in the fight against cybercrime.
  • How to make your IT team cost efficient and productive
    How to make your IT team cost efficient and productive Michael Johnson, Director of Global IT Infrastructure and Desktop at CPP Recorded: Mar 15 2018 3 mins
    Michael Johnson describes how his team has always been a cost center for the company and he managed to transform it into a productive, revenue generating team.

    In this video, he talks about the challenges he faced and how the Reduxio system helped him resolving those challenges.

    He has over 25 years experience in business and information systems project management with the focus on the implementation of technology-based products, systems, and services on time within budget.
  • Proactive Data Defence for Digital Transformation
    Proactive Data Defence for Digital Transformation Ian Greenwood, Regional Sales Manager UK&I Mar 23 2018 10:00 am UTC 60 mins
    Digital transformation is business enhancing and fraught with danger. With services moving online and into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking place in an increasingly precarious environment, more and more your corporate attack surface is being exposed.

    With data breaches at an all-time high and incidents of identity theft risen by 57% in a year, consumers are questioning the security of their personal data held by organisations. The rise of cloud and the Internet of Things, has forced companies to take control of their data – regardless of where it resides and in addition, reputational damage caused by public breach is firmly on the agenda of the board.

    This webinar will consider:

    • Key security considerations for a digital transformation strategy

    • Why a proactive data defence strategy is crucial

    • The benefits of maximising the level of control over data irrespective of where it is created, store or shared.
  • Redefining Enterprise Security in an Era of Digital Transformation
    Redefining Enterprise Security in an Era of Digital Transformation Kaspersky Lab and guests Mar 27 2018 12:45 pm UTC 75 mins
    In the digital world, effective information security is now a key business success factor. As attackers find new ways to attack digital assets, the ability of the organization to maintain continuity, and the security of the information circulating in it, may be called into question. New attack methods and threat vectors require fundamentally new approaches to corporate protection.

    As part of the World Cyber Security Congress in London on March 27, Kaspersky Lab will be conducting a seminar exploring ways to solve the problem of protection in the digital world, where the risks are so high, and where the only sure defense lies a comprehensive security approach.

    Join us there to:

    • Find out about the threats organizations like yours are currently facing

    • Learn how to build reliable protection in the era of digital transformation

    • See how leading-edge global corporation has built its security on proven technologies

    • Put your questions to our experts

    During the seminar, our Principal Security Researcher in the Global Research and Analysis Team David Emm will talk about contemporary threats in ‘The Top Cyber-threats Facing Your Digital Business’.

    Next, in ‘Cybersecurity as Part of Your Digital Transformation Strategy’, Adam Maskatiya, General Manager, Kaspersky Lab UK & Ireland will outline how to build a cybersecurity system able to respond to highly complex threats.

    The seminar will end in conversation - CTO one of our customer talks about their success story in fighting today’s cyberthreats.
  • Effortlessly Scale Microsoft Storage Spaces to PBs with Award-Winning FileFly
    Effortlessly Scale Microsoft Storage Spaces to PBs with Award-Winning FileFly Glen Olsen, Product Manager, and Adrian Herrera, VP of Marketing Mar 27 2018 4:00 pm UTC 60 mins
    Storage Spaces brings advanced storage management technology into the heart of Microsoft Windows Server. You can now scale locally attached storage at a lower cost than traditional SAN or NAS arrays. By combining Storage Spaces with award-winning Caringo FileFly, you can now scale from TBs to 100s of PBs at a fraction of the cost. FileFly will also protect all of that data, further decreasing costs by reducing your reliance on backup.

    Product Manager Glen Olsen and VP of Marketing Adrian "AJ" Herrera present strategies, a live demo and use cases for re-architecting your storage by combining a secure tier of storage that is easy to expand and manage, and that has continuous data protection built in.
  • Cloud Data Security: Securing Amazon RDS
    Cloud Data Security: Securing Amazon RDS Kedar Dhuru – Principal Product Manager, Data Security and Pathik Shah – Sales Engineering Mar 27 2018 5:30 pm UTC 60 mins
    Take steps to secure your cloud-deployed databases. Join this live demonstration of how to secure RDS with SecureSphere DAM.
  • Thales nShield non+ to nShield XC Migration
    Thales nShield non+ to nShield XC Migration Marc Class, Sales Engineer, Thales Australia Mar 28 2018 12:00 am UTC 60 mins
    The new Thales nShield XC is set to replace the Thales nShield Solo and nShield Connect non-plus hardware security modules in the next few months. With a whole host of new features and capabilities, the XC will outperform the non-plus by an order of magnitude – and this webinar will help you understand the new model and the recommended migration plan, so you can get ready to make the switch.

    Join us on Wednesday March 28th March @ 11am AEDT for a briefing on:

    • New Features of the XC

    • Recommended migration steps from non-plus to XC

    • End of Support timelines

    We will have lots of time for Q&A at this session.

    We look forward to talking to you then.
  • Preparing and Protecting Your Network from an Automated Zero-Day Attack
    Preparing and Protecting Your Network from an Automated Zero-Day Attack Joe Schreiber, Technical Director, Business Development, Tufin and Dan Rheault Sr. Product Marketing Manager, Tufin Mar 28 2018 3:00 pm UTC 45 mins
    Attackers have embraced automation to launch attacks and expand their reach within your network. But ill-intentioned individuals aren’t alone in having automation in their toolkit. It’s time to fight automation with automation.

    How quickly you can respond to a zero-day attack largely depends on how proactively you secure your network. When attackers engineer malware to automatically detect vulnerabilities on your network, the way to prevent damage is to employ automation so you can react quickly and ensure its integrity.

    Join Tufin experts Dan Rheault and Joe Schreiber, also an established SOC professional, for an educational webinar that will discuss best practices to:

    •Secure the network through effective segmentation
    •Contain risk from zero-day attacks
    •Leverage automation to respond to security incidents
  • Kenna Platform Demo - A Better Way to Report on Risk
    Kenna Platform Demo - A Better Way to Report on Risk Security Engineer, Brian Orr, Security Consultant, Gabe Howden Mar 28 2018 5:00 pm UTC 60 mins
    Are you implementing Qualys, Rapid7, Nessus, or another network scanner and still struggling to prioritize your most critical vulnerabilities? Are you searching for a simple, single view of your organization's exposure to risk that you can share across security and IT ops teams and up to the CISO and the Board of Directors?

    Join Security Engineer, Brian Orr and Security Consultant, Gabe Howden as they take you through the Kenna Security Platform and our risk-based approach so you can learn how to take control and reduce your risk.

    The demo will cover:

    - How Kenna Security's algorithm works to correlate scan data with real-world exploit intelligence
    - The Kenna Security Risk Meter and tips for customizing dashboards and reporting for any IT environment
    - Best practices for viewing, tracking, and reporting on your risk posture across all levels of your organization
  • Complete Data Protection: Don't Forget Your Physical Systems & IaaS
    Complete Data Protection: Don't Forget Your Physical Systems & IaaS Jason Buffington, Principle Analyst, Formerly with Enterprise Strategy Group Mar 28 2018 5:00 pm UTC 60 mins
    The cost savings offered by cloud solutions and IaaS can bring budget serenity—the benefits of eliminating backup servers, storage, software licenses and portable media can really add up.

    But cloud computing presents its own challenges. You need to know exactly how far a provider is willing—and able—to go to meet SLAs. Also, what guarantees are made for uptime and data retention? What sort of restitution is offered for service disruptions? In the cloud, these answers are rarely as simple as they are with in-house solutions and processes.

    Join us for a discussion about building a complete data protection strategy—leveraging both on-premise infrastructure and cloud services—for the right balance of price and performance.

    To achieve this, there is no one size fits all set of technologies to meet stricter RTO’s and RPO’s. Business priorities and objectives must be matched to fail-over and replication options to achieve truly modern, cost-effective and resilient data protection solutions. Join us for a complimentary webinar where we discuss 6 action steps to shift your focus from traditional IT disaster recovery to total business resiliency.
  • NAS Refresh? - 5 Reasons to Consider the Cloud
    NAS Refresh? - 5 Reasons to Consider the Cloud Storage Switzerland, ClearSky Data Mar 29 2018 3:00 pm UTC 60 mins
    Storage refreshes are something that every data center goes through. However, the most painful are NAS refreshes. It is not just the painful migration of data from the old NAS to the new NAS but also the tedious process of making sure security and access controls are set correctly. Additionally, each refresh gets more difficult, because unstructured data keeps growing. It is time to get off the NAS treadmill and consider the cloud for NAS services.

    Cloud for NAS services is now a reality thanks to new hybrid cloud models. Users can benefit from improved performance thanks to local flash performance and organizations benefit from cost effective cloud storage and breaks the endless storage refresh cycle.
  • All-Flash Relationships: Love ‘Em or Leave ‘Em?
    All-Flash Relationships: Love ‘Em or Leave ‘Em? Alex Best, Dir. Technical Business Development & Alfons Michels, Senior Product Marketing Manager - DataCore Software Mar 29 2018 3:00 pm UTC 45 mins
    Flash storage technologies will continue to be a front-runner in 2018 for storage vendors and consumers, however why is it that only 2% of data centers have gone all flash? What are the challenges that storage providers and data center infrastructure managers are still facing with flash, despite it's importance in the marketplace?

    In the age of digital transformation, IT Infrastructure must embrace new technologies and software-defined storage systems, while still maintaining server and data center performance.

    Join this webinar with Flash gurus Alex Best and Alfons Michels to learn the essential steps to take to ensure the perfect coupling of Flash. Sign up to discover:
    • 3 reasons why only 2% of data centres have gone All Flash
    • Ideal coupling scenarios where All Flash can help vs Challenging environments for Flash
    • 2 essential steps to take before you invest more
  • How to Improve the Performance of VMware Horizon 7 with Predictive Flash Storage
    How to Improve the Performance of VMware Horizon 7 with Predictive Flash Storage Bharath Ram-Virtualization Storage Engineer, HPE & Bhumik Patel - Director of Technical Alliances, VMware Mar 29 2018 4:00 pm UTC 75 mins
    Virtualized Desktop Infrastructure (VDI) has been beneficial for large organizations who can manage the complexity and capital expense of a high-performance infrastructure. Today, however, many organizations of all sizes have distributed workforces running a mixture of desktop and mobile (BYOD) devices that would also benefit from centralized management of a virtualized end user computing environment.
    This session demonstrates how a Predictive Flash data infrastructure, including HPE InfoSight Cross-Stack Analytics, delivers the benefits of VMware Horizon 7 including lower TCO, increased agility, and data security, and how it’s not just for large enterprises. The webinar also includes a talk from a VMware Technical team member covering what’s new in the latest version of Horizon including enhancements for NVIDIA GRID vGPU.
  • Reg Watch: NERC CIP-013-1 - Cyber Risk in the Supply Chain
    Reg Watch: NERC CIP-013-1 - Cyber Risk in the Supply Chain Patrick Miller - Archer Energy Solutions; Tony Rock - Lockpath Mar 29 2018 4:00 pm UTC 60 mins
    Managing cyber risk in the supply chain is a requirement for protecting our critical infrastructure. As a result, the North American Electric Reliability Corporation (NERC) has introduced reliability standard CIP-013-1 to help Utilities and their vendors understand and mitigate these risks. In this webinar presented by Archer Energy Solutions and Lockpath, we'll explore strategies and best practices for managing supply chain risk and how you can prepare for when CIP-013-1 is enacted. As a webinar attendee, you'll learn:

    · Potential impact CIP-013-1 will have on both utilities and their vendors
    · Risk program maturity requirements for advanced cybersecurity
    · Strategies for managing supply chain risk holistically
    · Steps to take now to strengthen your supply chain cyber security

    Whether you are a utility provider or provide for utilities, discover what you should know and do about NERC CIP-013-1 and supply chain cyber risk in this webinar.

    Register now.
  • GDPR and you! Perfect together....?
    GDPR and you! Perfect together....? Joshua Marpet. Red Lion, COO/Founder Mar 29 2018 5:00 pm UTC 75 mins
    GDPR is a huge topic, with issues ranging from "What does it mean to my business processes?" to "Do I have to care about it?" And that's besides the technical bits! Together, let's explore what it means for a sample company. We'll discuss data, geography, and business processes. You'll learn about some of the pitfalls, and some of the opportunities inherent in GDPR. And maybe we can make it work for you, instead of causing a headache. Want to find out? Just show up.

    Joshua Marpet is an accomplished speaker, long time information and physical security practitioner, as well as a start up CEO and serial entrepreneur.
    He has presented on topics ranging from Facial Recognition to National Security, to audiences from government agencies, law enforcement, Fortune 5 companies, and many others. His research encompasses Digital Forensics, business security maturity, and how not to start an information security business!

    Joshua has been in the hot seat, at all levels of IT and Infosec. From the Federal Reserve, to law enforcement, to being an entrepreneur, Josh has been there. Let's talk.
  • 3 Steps to Elevate Security for Workloads Across Hybrid Environments
    3 Steps to Elevate Security for Workloads Across Hybrid Environments Scott Woodgate, Dir. of Product Marketing, Microsoft; Sarah Fender, Principal Program Manager, Microsoft  Mar 29 2018 5:00 pm UTC 60 mins
    Microsoft Azure Security Center makes it easier than ever to protect your Azure virtual machines and virtual networks, enabling you to move to the cloud with confidence. In addition to helping you protect your Azure resources, Security Center also protects servers and VMs running on-premises and in other cloud platforms like AWS and GCP.

    Azure has uniquely built-in security management that helps improve your productivity with native intelligence systems, like machine learning based recommendations and threat information sourced from the Microsoft Intelligent Security Graph.

    In this webinar, learn how to:

    - Use Security Center to set up security policies
    - Quickly find and fix security vulnerabilities
    - Detect and respond to threats across your entire IT infrastructure
  • Procurement: Part 1: Successful Telephone Negotiations
    Procurement: Part 1: Successful Telephone Negotiations Sue Preston Apr 3 2018 11:00 am UTC 60 mins
    This webinar aims to provide participants with a 'foolproof' plan for all telephone Negotiations. Many Negotiations are held over the phone today when buyers can 'catch us out' if we are not fully prepared. Attend this webinar to ensure you are driving better outcomes from any telephone negotiations.

    Learning outcomes

    By the end of this webinar participants will have:
    - Explored the advantages of telephone negotiations
    - Explored the disadvantages of telephone negotiations
    - Created a 'foolproof' preparation document
    - Committed to applying the learning to their real-world telephone negotiations
  • [Arabic] How FireEye Helix can deliver advanced capabilities to your org
    [Arabic] How FireEye Helix can deliver advanced capabilities to your org Yazan Hammoudah, SE Manager, MEA, FireEye Apr 3 2018 11:00 am UTC 60 mins

    Most organizations have invested lots of money and resources into various security tools. The end result is an array of point products from different vendors that often don't work well together. FireEye Helix can help unify these existing investments while providing customers the ability to analyze and respond to alerts through a single centralized platform.
    With Helix, you get FireEye's top of the line MVX detection capabilities paired with industry leading iSight intelligence. The result is high fidelity, contextual alerts, and the ability to shift from detection to remediation immediately-both on the network and on the endpoint. You will be able to resolve attacks quickly and effectively and minimize any impact. At the end, you will see a demo of how Helix identifies and responds to an alert.
  • Why XtremIO X2 is the best platform for your virtual workloads
    Why XtremIO X2 is the best platform for your virtual workloads Itzik Reich Apr 3 2018 3:00 pm UTC 75 mins
    In this webinar you’re going to hear all about Dell EMC XtremIO X2 and how it integrates with VMware and Hyper-V. This is your chance to learn about X2 starting from it’s core architecture to integration with the virtualized eco-system.
  • KPIs for Security Operations and Incident Response
    KPIs for Security Operations and Incident Response John Moran, Senior Product Manager at DFLabs,and Mike Fowler, CISSP, Vice President of Professional Services at DFLabs Apr 3 2018 3:00 pm UTC 60 mins
    Security operations KPIs vary from organization to organization. To be effective, it is crucial that KPIs are selected based on the SMART criteria.

    KPIs provide the critical information required to make fact-based decisions. However, tracking too many KPIs can become a burden to analysts.

    Join our new webinar to discover the best practices for Key Performance Indicators (KPIs) for Security Operations and Incident Response.

    Key takeaways:
    - Why are KPIs important?
    - How to choose the best KPIs?
    - How many KPIs are appropriate to measure?
  • How Software-Defined Networking Can Simplify Scale-Out HCI
    How Software-Defined Networking Can Simplify Scale-Out HCI Storage Switzerland, Big Switch Networks Apr 4 2018 5:00 pm UTC 60 mins
    Hyperconverged Infrastructures (HCI) offer management simplicity and provisioning agility to data centers undergoing digital transformation. When applications need more compute or storage resources, IT can "simply add a node” to an existing HCI cluster. But as the HCI environment scales out, complexity increases and network resources become a significant architectural consideration, often with significant unexpected costs that can blow your HCI budget.
  • Writing Effective Scenarios
    Writing Effective Scenarios Robert Pratten Apr 10 2018 10:00 am UTC 30 mins
    As we are becoming GDPR compliant we will not be able to share any leads from the webinar. But we encourage our partners to include a link to their website and/or registration form on the webinar page to acquire viewers’ contact details.
  • Procurement Part 2: Reducing Buyer Opening Demands
    Procurement Part 2: Reducing Buyer Opening Demands Sue Preston Apr 10 2018 11:00 am UTC 60 mins
    The webinar takes participants through a journey from 'reacting to responding' to unreasonable Buyer demands and participants will start to build a toolkit to help maintain control of the outcome of any Negotiation

    Learning outcomes

    By the end of this webinar event participants will have:

    - Understood the motivation behind buyer demands.
    - Developed strategies to ‘respond’ rather than ‘react’
    - Created a toolkit to respond to and counter aggressive buyer behaviour
    - Commitment to application of new tactics
  • New Features of DFLabs' IncMan SOAR Platform - Product Overview Webinar
    New Features of DFLabs' IncMan SOAR Platform - Product Overview Webinar Steven Ditmore Senior Sales Engineer at DFLabs, and John Moran, Senior Product Manager at DFLabs, Apr 10 2018 3:00 pm UTC 45 mins
    The DFLabs IncMan Security Automation and Orchestration platform automates and orchestrates security operations and incident response tasks including threat qualification, triage and escalation; hunting and investigation; and containment. DFLabs IncMan uses machine learning and automated rapid response runbook capabilities as a force multiplier that has enabled security teams to reduce average incident resolution times by up to 90% and increase incident handling by 300%.

    Join this webinar and get the unique opportunity to take a look and learn more about at the new version of IncMan Security Orchestration, Automation and Response (SOAR) platform for enterprise SOC and managed security services providers (MSSP) that reduces the time and complexity associated with responding to, containing and eliminating cyber security threats.

    The new version of the IncMan SOAR platform uses granular risk factors and operates case management to create customized R3 Rapid Response Runbooks that orchestrates workflows for SOCs and CSIRTs. Among multiple key enhancements, IncMan R3 Rapid Response Runbooks can now automate workflows based on more granular risk factors and operate case management for remediating incidents.

    The new version of DFLabs’ IncMan is available immediately on AWS, CentOS and RedHat7 from DFLabs and its channel partners.
  • Le RGPD arrive, Quantum & Veeam vous aident à vous préparer
    Le RGPD arrive, Quantum & Veeam vous aident à vous préparer Stéphane Estevez, Quantum, & Pierre-Francois Guglielmi, Veeam Apr 10 2018 3:00 pm UTC 60 mins
    Le RGPD entre en vigueur en 2018 et impacte toutes les sociétés qui ont des clients au sein de l'Union Européenne. Pour bien vous préparer, assistez à ce webinaire présenté par Stéphane Estevez, Product Marketing Manager chez Quantum; et Pierre-Francois Guglielmi, Systems Engineer chez Veeam.

    Ils expliqueront les incidences du RGPD en matière de sauvegarde, notamment pour la rétention, la sécurité et la protection de vos données. Découvrez comment les solutions de sauvegarde Quantum & Veeam peuvent vous aider à vous conformer à ce nouveau règlement européen.
  • [Webcam Panel] What to Expect at RSAC 2018
    [Webcam Panel] What to Expect at RSAC 2018 Panelists TBA Apr 11 2018 5:00 pm UTC 60 mins
    Join this panel of security and privacy experts as they share their expectations from one the biggest security conference in the world, RSA Conference 2018 in San Francisco.

    Tune in for an interactive Q&A panel to learn more about:
    - What can we expect to learn during RSAC week?
    - Biggest trends shaping cyber security in 2018
    - How to better secure our data in the age of attacks
  • From Coin Mining to Supply Chain Attacks. The Latest Threat Trends Explained.
    From Coin Mining to Supply Chain Attacks. The Latest Threat Trends Explained. Peter Sparkes, Senior Director, Cyber Security Services, Symantec Apr 12 2018 5:00 am UTC 60 mins
    From the sudden spread of WannaCry and Petya/NotPetya, to the swift growth in coin miners, 2017 provided us with another reminder that digital security threats can come from new and unexpected sources. Not only has the sheer volume of threats increased, but the threat landscape has become more diverse, with attackers working harder to discover new avenues of attack and cover their tracks while doing so.

    Join Symantec's leading threat expert, Peter Sparkes as he shares findings from the 2018 Internet Security Threat Report (ISTR) including insights on:

    - The Coin Mining Gold Rush
    - Shifting Trends in Ransomware
    - Targeted Attacks by the Numbers
    - Infecting the Software Supply Chain
    - The Surge in Mobile Threats

    Register Today