The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
Want to learn from your peers and have real valuable feedback on IT Management and Goals? Join this peer-to-peer webcast!
This webcast has been created as a space to hold conversations with IT Infrastructure professionals who share similar concerns and challenges, as well as success stories and a real-world case study from Jorge Barreto, Enterprise Architect at BFL Canada, on how he addressed the following:
1. Meet IOPS requirements
2. Spend time in labor-intensive operations such as VM Recovery
3. Lack of team expertise for complex operations required his personal time in completing tasks
Join us for live Q&A and discussion with fellow IT professionals!
When it comes to cyber-risk, the most exposed part of any organization is also the least protected; endpoints. Much of the data on laptops and other devices is unique and not stored on storage owned by the organization, but endpoints are often the first casualties of a cyber-attack. Given the new threat organizations need to provide complete protection, which not only includes protection from device failure but also ransomware attacks, device theft and litigation response.
The challenge for IT is providing this protection without disrupting the user. If the protection solution gets in the way of the user, they will disable it, putting not only their data at risk but leaving the organization open to data loss and cyber-breach.
In this live webinar, learn the four requirements of complete endpoint data protection:
1. Truly Transparent Protection (silent deployment, bandwidth optimization, quick cache)
2. Deployment Flexibility - On-premises, Public Cloud or Private Cloud
3. Total Encryption - Protect data in-flight and at rest
4. Beyond Backup Features - Remote wipe, Legal hold
This webinar will provide an overview of the future of passwords. Passwords have become very important, protecting a treasure trove of information. You will get an inside look at the techniques and tactics used conduct password attacks. We will discuss the various countermeasures available, new improvements made to the latest operating systems to prevent successful password attacks, and how the industry is trying to eliminate passwords. We will conclude by discussing ways we can potentially circumvent new countermeasures.
Hamza Sirag Hamza is currently an Information Security consultant. He has spent the majority of his time immersed in the world of cybersecurity. He has had the opportunity to lead complex penetration tests for a variety of federal and commercial clients. He is the founder of Beltway Hackers, a Northern VA based meetup group focused on offensive cybersecurity. https://www.meetup.com/Beltway-Hackers
Effective risk management is critical for every organization, especially in the current era of increasingly frequent and complex cyber threats. Organizations with the ability to detect changes across global IT environments in real time can better prevent and respond to malicious acts such as ransomware/malware attacks and configuration tampering.
Join our panel of InfoSec experts on this CPE accredited webinar to learn how your organization can take command of risk to proactively prioritize and address the risks that matter most, and ignite your risk management program to enable cybersecurity.
Qualifying participants will earn 1 CPE credit.
- Discover how to identify, catalog, and prioritize risks across the enterprise
- Find out how to quickly measure critical activities and address inherited risk
- Learn how to gain efficiency and effectiveness of current risk-management approaches
Although GDPR is primarily a legal and compliance issue, a data breach is the point of failure that will highlight any deficiencies in an organization’s data protection and larger security posture.
GDPR Article 33 requires breaches to be reported within 72 hours of discovery. With just 72 hours after breach discovery to report the nature of the breach, number of records and subjects affected, and likely consequences, every hour matters, and visibility across the environment becomes a must.
With speed of response being critical, you need a trusted partner with the incident response expertise, threat intelligence and purpose-built technology to enable rapid initial notification, and to provide support with subsequent notifications once further data points are identified/obtained.
Join the conversation with Stuart McKenzie, Vice President Mandiant EMEA, to talk about :
· How FireEye can help you meet the GDPR 72-hour breach reporting requirement, should you be breached, and
· How FireEye can help reduce the risk and impact of a breach by securing sensitive and confidential data and improving breach response readiness—before, during, and after a cyber-attack.
Sebbene il GDPR sia soprattutto una questione legale e di compliance, un evento di "data breach" evidenzia la presenza di carenze nel sistema aziendale di protezione dei dati e più in generale nella security posture.
L'articolo 33 del GDPR richiede la notifica delle brecce informatiche entro 72 ore dalla scoperta.
Un tempo decisamente limitato per notificare la natura della breccia, il numero di record e soggetti coinvolti e le possibili conseguenze. Ogni ora conta ed è fondamentale disporre di una visibilità del proprio ambiente completa ed approfondita.
In questo scenario, la rapidità di risposta diventa un fattore critico. Per questo è necessario potersi affidare ad un partner che abbia un'elevata competenza nell'incident response, che disponga di soluzioni di threat intelligence di qualità e di tecnologia atta non solo a garantire una prima notifica rapida, ma anche a supportare le notifiche successive sullo stato di avanzamento del processo di risposta e di rimedio all'incidente.
Ne parliamo il 22 marzo con Marco Rottigni, Sr. Product Marketing Manager EMEA, per comprendere come FireEye possa:
"aiutarti a soddisfare il requisito di notifica incidente entro le 72 ore dalla scoperta della breccia
"ridurre il rischio e l'impatto di una potenziale breccia con la messa in sicurezza di dati sensibili e confidenziali, migliorando le capacità di risposta agli incidenti prima, durante e dopo un cyber attack
Les plateformes de sécurité présentent aujourd'hui beaucoup de challenges qui les rendent difficiles à gérer : manque de visibilité, trop volume d'alertes, peu de contextualisation… Le résultat est une perte d'efficacité, et de vitesse dans la prise en compte des incidents de sécurité.
FireEye a conçu une plateforme de gestion des opérations de sécurité avec ces objectifs en tête, plus de visibilité, une meilleure lisibilité et une contextualisation de la menace, le but ultime étant de fournir une plateforme facile à déployer, à administrer et qui répond aux besoins d'aujourd'hui.
Lors de ce webinaire nous couvrirons les points suivants :
Comment HELIX centralise les opérations de sécurité :
- Améliore la visibilité de bout en bout
- Aide à la Priorisation et la contextualisation des alertes
- Accompagne à la prise Prise de décisions et à la levée de doutes
Nous terminerons par une démonstration de la plateforme à travers un Business Case réel et nous laisserons le temps aux différentes questions en live.
Wielu integratorów technologicznych zastanawia się jak rozwinąć swój biznes o dodatkowe usługi. Przedstawimy pomysł na usługi zarządzalne (Managed Services) oparte o rozwiązania chmurowe. Krok po kroku pokażemy jaki jest rynek w Polsce, jakie daje możliwości, jak zbudować swoje portfolio usługowe, ile to kosztuje i czy da się na tym zarobić.
Knapp 70 Prozent der Unternehmen und Institutionen in Deutschland sind in den Jahren 2016 und 2017 Opfer von Cyber-Angriffen geworden. In knapp der Hälfte der Fälle waren die Angreifer erfolgreich und konnten sich Zugang zu IT-Systemen verschaffen, die Funktionsweise von IT-Systemen beeinflussen oder Internet-Auftritte manipulieren.
Aufgrund der hohen Anzahl von Risiken und Lösungen brauchen Unternehmen zunächst Klarheit, welchen Grad an Sicherheit sie erreichen möchten, um Budget und Ressourcen optimal einzusetzen. Wollen Sie lediglich die gesetzlichen Vorgaben einhalten, den Branchenstandard erfüllen oder Sicherheit als Alleinstellungsmerkmal für Ihr Unternehmen definieren?
Wir erläutern Ihnen unseren Ansatz zum Aufbau einer effektiven Sicherheitsarchitektur, die auf die individuellen Bedürfnisse Ihres Unternehmens abgestimmt ist und bieten Entscheidungshilfen zur Festlegung des notwendigen Grads an Sicherheit. Dabei fokussieren wir folgende Themen:
Bewertung der Ausgangssituation (bestehende Sicherheitsarchitektur)
"Bewertung von Sicherheitsprogrammen
"Fazit: Erstellung eines Aktionsplans in Abhängigkeit von Budget und Ressourcen
Zielgruppe: Geschäftsführer, Sicherheitsbeauftragte, IT-Leiter, Datenschutzbeauftragte und Fachabteilungen, die an der Ausarbeitung von nachhaltigen Sicherheitskonzepten beteiligt sind.
Examining 2017 to prepare for what's coming in 2018
The modern cyber war — against governments, businesses and individuals alike — is comprised of a series of attacks, counterattacks and respective defensive countermeasures. The SonicWall 2018 Cyber Threat Report provides exclusive data that highlights advances by both the security industry and cyber criminals.
Attend this webinar to gain a better understand the current State of Cyber-Security Arms Race. We’ll share our findings, intelligence, analysis and research to help you improve your security preparations and posture going forward.
While every organization needs to keep data protected and accessible for its users, many are unaware of the risky protection and recovery gaps when malicious attacks occur or point-in-time recovery is required. Many organizations are asking themselves, “Is Microsoft O365 good enough protection and recovery?” or “Is my on-premises backup solution enough?” Join this webinar to learn where your biggest risks are and how to mitigate them.
Shane Harris - Director Product Marketing, Mimecast
Shane Harris has had varied experience spanning 20 years across IT, Product Management, Sales, Engineering and Research Analyst roles in the areas information management, eDiscovery, archive and compliance. Prior to Mimecast , Shane was the lead analyst for the Enterprise Information Archiving Magic Quadrant at Gartner and has held executive leadership positions at kCura, Commvault and Johns Hopkins. In these roles, he has held countless customer conversations across all verticals and was a frequent speaker, presenter and thought-leader at industry events.
Glenn Brown - Director Product Management, Mimecast
Glenn joined Mimecast in 2007 and is responsible for Mimecast’s archiving, compliance and data resilience products group. He is tasked with defining and bringing the product roadmap from vision to reality and is a passionate advocate of cloud technology enabling strong data resilience strategies.
Do you think security is overdue for actionable forecasts rather than security dogma? Are you a security leader tired of worrying about the next vulnerability with a logo and a web site? If we can forecast the weather, we can use similar models to foresee which vulnerabilities attackers are likely to weaponize.
Join Kenna Security's Michael Roytman, Chief Data Scientist and Ed Bellis, CTO, Co-Founder and ex-CISO at Orbitz for a live webinar where they will debut Kenna Security's new Exploit Prediction, the industry's first vulnerability exploit prediction capability, a significant breakthrough for security professionals looking to develop a more mature proactive approach to vulnerability management.
In this webinar cover:
"How Kenna Exploit Prediction has delivered 94 percent predictive accuracy
"How to adopt a proactive approach to contextualize, prioritize and remediate vulnerabilities, based on risk
"How the Kenna Security Platform with Exploit Predictions can help align security, IT operations, and executive management with a single view of risk
"A demonstration of the Kenna Security platform with the new Exploit Prediction capabilities
Fellow Cybersecurity Practitioner:
Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape.
This month's theme: Protected Health Information
One of the many benefits of best-of-breed object storage solutions is the ability to scale on demand and pay as you grow. How do you predict your capacity needs and determine your roadmap for scaling your storage? VP of Product Tony Barbagallo and Sr. Consultant John Bell will provide concrete guidance to help you predict your needs so you can accurately map out and budget for your organization’s data growth.
Ransomware was the word on everybody’s mind in 2017 with Petya, WannaCry and more. Will this continue into 2018? And if so, how can you ensure your business is protected from the threat of ransomware?
This session will cover:
- An overview of how Ransomware works.
- Can you realistically prevent Ransomware from infiltrating your organization?
- What can you do to protect yourself from an attack?
In today’s connected world, devices and data can be found far outside traditional data centers or offices, in places like oil wells, hospitals or factory floors. For these businesses, connectivity can be expensive and unreliable and get in the way of implementing effective IoT solutions.
Azure IoT Edge is a service that allows cloud intelligence to run on your IoT devices locally. With Azure IoT Edge, you can deploy cloud workloads such as Artificial Intelligence, Azure Machine Learning, Azure Stream Analytics, Azure Functions or custom code via containers directly on your IoT device to enable real-time insights.
Curious to learn more? Join us in this webinar, presented by IoT engineering experts, to learn:
- Why and when you should use edge computing as important part of your IoT solution
- How to get started with Azure IoT Edge
- How to create and deploy containers using IoT Edge portal
- Securing your edge devices and solution
87% ankietowanych dyrektorów działów IT jest przekonanych, że ich obecne zasady i procedury narażą ich na ryzyko po wejściu w życiu RODO
Największym wyzwaniem związanym z zachowaniem zgodności z RODO jest fakt, że dane osobowe mogą znajdować się w dowolnym miejscu. Pomyśl tylko, ile kopii czyichś danych osobowych może być rozsianych po Twojej organizacji.
W jaki sposób zagwarantujesz zgodność z RODO we wszystkich źródłach niestrukturyzowanych danych? Laptopy, urządzenia mobilne i inne punkty końcowe? Poczta elektroniczna? Chmury osobiste? Serwery plików i systemy zarządzania treścią z setkami lub tysiącami uprawnionych użytkowników? Kopie dev/test? Aplikacje business intelligence (BI) i analityczne?
Aby zapewnić zgodność z RODO, najprawdopodobniej trzeba będzie dokonać fundamentalnych zmian w sposobie zbierania i przechowywania danych oraz zarządzania nimi. Będzie to czasochłonne, dlatego ważne jest, aby podjąć odpowiednie działania juz teraz.
The expectation from the start of 2017 – that we hadn’t seen the back of ransomware – was justified. 2017 was plagued with global attacks such as Petya, WannaCry, Bad Rabbit and many others. Unfortunately, 2018 could be even worse.
With ransomware continuously developing new delivery techniques, organisations must learn how to prepare and protect themselves from the threat of ransomware, but how can they do this?
In this webinar, Nick Frost, Principal Consultant at the ISF, will explore the latest threats in ransomware and what organisations can do to minimise vulnerabilities to reduce risks of an attack.
About the presenter:
Nick is currently the Principal Researcher for the Information Security Forum (ISF) Ltd. He has more than 15 years’ experience designing and implementing a risk-based approach to securing information. He has developed leading solutions for evaluating risk across both internal and supplier environments.
Join the GRC Pundit, Michael Rasmussen and LockPath’s Sam Abadir for a 60-minute webinar as we review the capabilities of the LockPath Keylight Ambassador, winner of the 2015 GRC 2020 Award for Technology Innovation in Enterprise GRC Integration.
Organizations need to move beyond the concept of a GRC platform and focus on an integrated view of GRC data and systems through a GRC architecture that is a cohesive part of the broader business fabric of the organization. This is what GRC 20/20 refers to as 360° GRC contextual awareness. Where risk and compliance is monitored and understood in the course of business operations, changing risks and regulations, and interactions. Delivery of GRC contextual awareness requires that GRC be a central nervous system to capture signals found in processes, data, and transactions as well as changing risks and regulations for interpretation, analysis, and holistic awareness of risk in the context of business. LockPath Keylight Ambassador is a GRC solution that offers a hybrid agent architecture that enables organizations to collect distributed GRC related data from applications installed across the organization and in the cloud. Keylight’s Ambassador innovation and advancement of GRC technology is its ability to securely and automatically transmit on premise data to the cloud from business systems and information security tools.
I will share my thoughts on how we overcome a lot of objections by creating certainty around our products/services, us and our companies. Increase credibility, position ourselves as the expert or authority figure to gain control of an inquiry so we may find it easier to close. I will also look at how this will have a positive impact upon your prospect.
Découvrez la simplicité et l'efficacité de la nouvelle console d'administration et d'exploitation de la solution Commvault
Comment gérer la protection de vos machines virtuelles, serveurs de fichiers et application en quelques clics avec Commvault ? Laissez-nous vous montrer la nouvelle interface de Commvault pour les serveurs, applications et machines virtuelles.
Dans ce Webinaire, vous allez découvrir une interface simple et intuitive pour réaliser vos opérations d’ajout d’environnement à protéger, vos accès aux données pour les restaurer, le suivi des jobs et alertes, les rapports proposés et un tableau de bord qui vous permet en une vue de vous faire une idée sur le bon fonctionnement de votre solution Commvault.
C’est le moment d’utiliser Commvault Admin Console pour vous simplifier la vie, avec depuis toujours la solution de sauvegarde la plus performance du marché !
Commvault, simplicité et performance.
With the new Privacy Amendment (Notifiable Data Breaches) Act 2017 now in effect, many Australian businesses and government agencies are starting to take action to ensure their data protection and breach response plans are up to date and comply with the new scheme. However, knowing how to avoid the higher penalties and reputational damage caused by data breaches is a tough challenge for any business.
Don't miss this opportunity to join Symantec's privacy expert Brian Fletcher, Director, Government Affairs, Symantec, Asia Pacific and Japan to learn more about the new laws and what you can do to ensure your business is not making headlines for all the wrong reasons.
" Hear about new challenges introduced by the Australian mandatory data breach notification laws and the wide reaching General Data Protection Regulation (GDPR)
" Learn about key steps in the journey towards privacy compliance and why most Australian businesses have approached privacy wrong
"Understand how these regulations can enable you to gain trust and enhance customer experiences
As the ‘public profile’ of cybercrime continues to increase, enterprises are encouraged to look at how they keep their businesses and customers safe by sharing intelligence, best practice and defense measures.
Join Nahim Fazal, Head of Cyberthreat Intelligence at Blueliv, for a webinar reflecting on the incidents and trends discussed in Blueliv’s annual cyberthreat report, and guidance on how organizations of all sizes can protect themselves in an ever-more sophisticated threat landscape.
The report combines intelligence gathered through Threat Compass with insight from the Blueliv analyst team, leading to informed assessments about the current state of play and areas which require immediate attention.
Register today to reserve your spot.
Blueliv is leading a new wave of proactive, real-time threat monitoring that protects organizations from the outside in, radically reducing attack success rates and improving incident response performance through fresh, actionable intelligence. The in-house team is bolstered by the Blueliv Threat Exchange Network, a global community of thousands of security experts united in the fight against cybercrime.
Digital transformation is business enhancing and fraught with danger. With services moving online and into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking place in an increasingly precarious environment, more and more your corporate attack surface is being exposed.
With data breaches at an all-time high and incidents of identity theft risen by 57% in a year, consumers are questioning the security of their personal data held by organisations. The rise of cloud and the Internet of Things, has forced companies to take control of their data – regardless of where it resides and in addition, reputational damage caused by public breach is firmly on the agenda of the board.
This webinar will consider:
• Key security considerations for a digital transformation strategy
• Why a proactive data defence strategy is crucial
• The benefits of maximising the level of control over data irrespective of where it is created, store or shared.
In the digital world, effective information security is now a key business success factor. As attackers find new ways to attack digital assets, the ability of the organization to maintain continuity, and the security of the information circulating in it, may be called into question. New attack methods and threat vectors require fundamentally new approaches to corporate protection.
As part of the World Cyber Security Congress in London on March 27, Kaspersky Lab will be conducting a seminar exploring ways to solve the problem of protection in the digital world, where the risks are so high, and where the only sure defense lies a comprehensive security approach.
Join us there to:
• Find out about the threats organizations like yours are currently facing
• Learn how to build reliable protection in the era of digital transformation
• See how leading-edge global corporation has built its security on proven technologies
• Put your questions to our experts
During the seminar, our Principal Security Researcher in the Global Research and Analysis Team David Emm will talk about contemporary threats in ‘The Top Cyber-threats Facing Your Digital Business’.
Next, in ‘Cybersecurity as Part of Your Digital Transformation Strategy’, Adam Maskatiya, General Manager, Kaspersky Lab UK & Ireland will outline how to build a cybersecurity system able to respond to highly complex threats.
The seminar will end in conversation - CTO one of our customer talks about their success story in fighting today’s cyberthreats.
Storage Spaces brings advanced storage management technology into the heart of Microsoft Windows Server. You can now scale locally attached storage at a lower cost than traditional SAN or NAS arrays. By combining Storage Spaces with award-winning Caringo FileFly, you can now scale from TBs to 100s of PBs at a fraction of the cost. FileFly will also protect all of that data, further decreasing costs by reducing your reliance on backup.
Product Manager Glen Olsen and VP of Marketing Adrian "AJ" Herrera present strategies, a live demo and use cases for re-architecting your storage by combining a secure tier of storage that is easy to expand and manage, and that has continuous data protection built in.
The new Thales nShield XC is set to replace the Thales nShield Solo and nShield Connect non-plus hardware security modules in the next few months. With a whole host of new features and capabilities, the XC will outperform the non-plus by an order of magnitude – and this webinar will help you understand the new model and the recommended migration plan, so you can get ready to make the switch.
Join us on Wednesday March 28th March @ 11am AEDT for a briefing on:
• New Features of the XC
• Recommended migration steps from non-plus to XC
• End of Support timelines
We will have lots of time for Q&A at this session.
Attackers have embraced automation to launch attacks and expand their reach within your network. But ill-intentioned individuals aren’t alone in having automation in their toolkit. It’s time to fight automation with automation.
How quickly you can respond to a zero-day attack largely depends on how proactively you secure your network. When attackers engineer malware to automatically detect vulnerabilities on your network, the way to prevent damage is to employ automation so you can react quickly and ensure its integrity.
Join Tufin experts Dan Rheault and Joe Schreiber, also an established SOC professional, for an educational webinar that will discuss best practices to:
•Secure the network through effective segmentation
•Contain risk from zero-day attacks
•Leverage automation to respond to security incidents
The cost savings offered by cloud solutions and IaaS can bring budget serenity—the benefits of eliminating backup servers, storage, software licenses and portable media can really add up.
But cloud computing presents its own challenges. You need to know exactly how far a provider is willing—and able—to go to meet SLAs. Also, what guarantees are made for uptime and data retention? What sort of restitution is offered for service disruptions? In the cloud, these answers are rarely as simple as they are with in-house solutions and processes.
Join us for a discussion about building a complete data protection strategy—leveraging both on-premise infrastructure and cloud services—for the right balance of price and performance.
To achieve this, there is no one size fits all set of technologies to meet stricter RTO’s and RPO’s. Business priorities and objectives must be matched to fail-over and replication options to achieve truly modern, cost-effective and resilient data protection solutions. Join us for a complimentary webinar where we discuss 6 action steps to shift your focus from traditional IT disaster recovery to total business resiliency.
Are you implementing Qualys, Rapid7, Nessus, or another network scanner and still struggling to prioritize your most critical vulnerabilities? Are you searching for a simple, single view of your organization's exposure to risk that you can share across security and IT ops teams and up to the CISO and the Board of Directors?
Join Security Engineer, Brian Orr and Security Consultant, Gabe Howden as they take you through the Kenna Security Platform and our risk-based approach so you can learn how to take control and reduce your risk.
The demo will cover:
- How Kenna Security's algorithm works to correlate scan data with real-world exploit intelligence
- The Kenna Security Risk Meter and tips for customizing dashboards and reporting for any IT environment
- Best practices for viewing, tracking, and reporting on your risk posture across all levels of your organization
Flash storage technologies will continue to be a front-runner in 2018 for storage vendors and consumers, however why is it that only 2% of data centers have gone all flash? What are the challenges that storage providers and data center infrastructure managers are still facing with flash, despite it's importance in the marketplace?
In the age of digital transformation, IT Infrastructure must embrace new technologies and software-defined storage systems, while still maintaining server and data center performance.
Join this webinar with Flash gurus Alex Best and Alfons Michels to learn the essential steps to take to ensure the perfect coupling of Flash. Sign up to discover:
• 3 reasons why only 2% of data centres have gone All Flash
• Ideal coupling scenarios where All Flash can help vs Challenging environments for Flash
• 2 essential steps to take before you invest more
Storage refreshes are something that every data center goes through. However, the most painful are NAS refreshes. It is not just the painful migration of data from the old NAS to the new NAS but also the tedious process of making sure security and access controls are set correctly. Additionally, each refresh gets more difficult, because unstructured data keeps growing. It is time to get off the NAS treadmill and consider the cloud for NAS services.
Cloud for NAS services is now a reality thanks to new hybrid cloud models. Users can benefit from improved performance thanks to local flash performance and organizations benefit from cost effective cloud storage and breaks the endless storage refresh cycle.
Virtualized Desktop Infrastructure (VDI) has been beneficial for large organizations who can manage the complexity and capital expense of a high-performance infrastructure. Today, however, many organizations of all sizes have distributed workforces running a mixture of desktop and mobile (BYOD) devices that would also benefit from centralized management of a virtualized end user computing environment.
This session demonstrates how a Predictive Flash data infrastructure, including HPE InfoSight Cross-Stack Analytics, delivers the benefits of VMware Horizon 7 including lower TCO, increased agility, and data security, and how it’s not just for large enterprises. The webinar also includes a talk from a VMware Technical team member covering what’s new in the latest version of Horizon including enhancements for NVIDIA GRID vGPU.
Managing cyber risk in the supply chain is a requirement for protecting our critical infrastructure. As a result, the North American Electric Reliability Corporation (NERC) has introduced reliability standard CIP-013-1 to help Utilities and their vendors understand and mitigate these risks. In this webinar presented by Archer Energy Solutions and Lockpath, we'll explore strategies and best practices for managing supply chain risk and how you can prepare for when CIP-013-1 is enacted. As a webinar attendee, you'll learn:
· Potential impact CIP-013-1 will have on both utilities and their vendors
· Risk program maturity requirements for advanced cybersecurity
· Strategies for managing supply chain risk holistically
· Steps to take now to strengthen your supply chain cyber security
Whether you are a utility provider or provide for utilities, discover what you should know and do about NERC CIP-013-1 and supply chain cyber risk in this webinar.
Microsoft Azure Security Center makes it easier than ever to protect your Azure virtual machines and virtual networks, enabling you to move to the cloud with confidence. In addition to helping you protect your Azure resources, Security Center also protects servers and VMs running on-premises and in other cloud platforms like AWS and GCP.
Azure has uniquely built-in security management that helps improve your productivity with native intelligence systems, like machine learning based recommendations and threat information sourced from the Microsoft Intelligent Security Graph.
In this webinar, learn how to:
- Use Security Center to set up security policies
- Quickly find and fix security vulnerabilities
- Detect and respond to threats across your entire IT infrastructure
GDPR is a huge topic, with issues ranging from "What does it mean to my business processes?" to "Do I have to care about it?" And that's besides the technical bits! Together, let's explore what it means for a sample company. We'll discuss data, geography, and business processes. You'll learn about some of the pitfalls, and some of the opportunities inherent in GDPR. And maybe we can make it work for you, instead of causing a headache. Want to find out? Just show up.
Joshua Marpet is an accomplished speaker, long time information and physical security practitioner, as well as a start up CEO and serial entrepreneur.
He has presented on topics ranging from Facial Recognition to National Security, to audiences from government agencies, law enforcement, Fortune 5 companies, and many others. His research encompasses Digital Forensics, business security maturity, and how not to start an information security business!
Joshua has been in the hot seat, at all levels of IT and Infosec. From the Federal Reserve, to law enforcement, to being an entrepreneur, Josh has been there. Let's talk.
Most organizations have invested lots of money and resources into various security tools. The end result is an array of point products from different vendors that often don't work well together. FireEye Helix can help unify these existing investments while providing customers the ability to analyze and respond to alerts through a single centralized platform.
With Helix, you get FireEye's top of the line MVX detection capabilities paired with industry leading iSight intelligence. The result is high fidelity, contextual alerts, and the ability to shift from detection to remediation immediately-both on the network and on the endpoint. You will be able to resolve attacks quickly and effectively and minimize any impact. At the end, you will see a demo of how Helix identifies and responds to an alert.
This webinar aims to provide participants with a 'foolproof' plan for all telephone Negotiations. Many Negotiations are held over the phone today when buyers can 'catch us out' if we are not fully prepared. Attend this webinar to ensure you are driving better outcomes from any telephone negotiations.
By the end of this webinar participants will have:
- Explored the advantages of telephone negotiations
- Explored the disadvantages of telephone negotiations
- Created a 'foolproof' preparation document
- Committed to applying the learning to their real-world telephone negotiations
In this webinar you’re going to hear all about Dell EMC XtremIO X2 and how it integrates with VMware and Hyper-V. This is your chance to learn about X2 starting from it’s core architecture to integration with the virtualized eco-system.
Hyperconverged Infrastructures (HCI) offer management simplicity and provisioning agility to data centers undergoing digital transformation. When applications need more compute or storage resources, IT can "simply add a node” to an existing HCI cluster. But as the HCI environment scales out, complexity increases and network resources become a significant architectural consideration, often with significant unexpected costs that can blow your HCI budget.
As we are becoming GDPR compliant we will not be able to share any leads from the webinar. But we encourage our partners to include a link to their website and/or registration form on the webinar page to acquire viewers’ contact details.
The webinar takes participants through a journey from 'reacting to responding' to unreasonable Buyer demands and participants will start to build a toolkit to help maintain control of the outcome of any Negotiation
By the end of this webinar event participants will have:
- Understood the motivation behind buyer demands.
- Developed strategies to ‘respond’ rather than ‘react’
- Created a toolkit to respond to and counter aggressive buyer behaviour
- Commitment to application of new tactics
The DFLabs IncMan Security Automation and Orchestration platform automates and orchestrates security operations and incident response tasks including threat qualification, triage and escalation; hunting and investigation; and containment. DFLabs IncMan uses machine learning and automated rapid response runbook capabilities as a force multiplier that has enabled security teams to reduce average incident resolution times by up to 90% and increase incident handling by 300%.
Join this webinar and get the unique opportunity to take a look and learn more about at the new version of IncMan Security Orchestration, Automation and Response (SOAR) platform for enterprise SOC and managed security services providers (MSSP) that reduces the time and complexity associated with responding to, containing and eliminating cyber security threats.
The new version of the IncMan SOAR platform uses granular risk factors and operates case management to create customized R3 Rapid Response Runbooks that orchestrates workflows for SOCs and CSIRTs. Among multiple key enhancements, IncMan R3 Rapid Response Runbooks can now automate workflows based on more granular risk factors and operate case management for remediating incidents.
The new version of DFLabs’ IncMan is available immediately on AWS, CentOS and RedHat7 from DFLabs and its channel partners.
Le RGPD entre en vigueur en 2018 et impacte toutes les sociétés qui ont des clients au sein de l'Union Européenne. Pour bien vous préparer, assistez à ce webinaire présenté par Stéphane Estevez, Product Marketing Manager chez Quantum; et Pierre-Francois Guglielmi, Systems Engineer chez Veeam.
Ils expliqueront les incidences du RGPD en matière de sauvegarde, notamment pour la rétention, la sécurité et la protection de vos données. Découvrez comment les solutions de sauvegarde Quantum & Veeam peuvent vous aider à vous conformer à ce nouveau règlement européen.
Join this panel of security and privacy experts as they share their expectations from one the biggest security conference in the world, RSA Conference 2018 in San Francisco.
Tune in for an interactive Q&A panel to learn more about:
- What can we expect to learn during RSAC week?
- Biggest trends shaping cyber security in 2018
- How to better secure our data in the age of attacks
From the sudden spread of WannaCry and Petya/NotPetya, to the swift growth in coin miners, 2017 provided us with another reminder that digital security threats can come from new and unexpected sources. Not only has the sheer volume of threats increased, but the threat landscape has become more diverse, with attackers working harder to discover new avenues of attack and cover their tracks while doing so.
Join Symantec's leading threat expert, Peter Sparkes as he shares findings from the 2018 Internet Security Threat Report (ISTR) including insights on:
- The Coin Mining Gold Rush
- Shifting Trends in Ransomware
- Targeted Attacks by the Numbers
- Infecting the Software Supply Chain
- The Surge in Mobile Threats