Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • How to “Future Proof” Data Protection for Organizational Resilience
    How to “Future Proof” Data Protection for Organizational Resilience Storage Switzerland, Carbonite Recorded: Apr 27 2017 61 mins
    Users expectations of IT's ability to return mission critical applications to production are higher than ever. These expectations are leading IT to abandon many of their backup and recovery solutions to try new, unproven solutions that may or may not solve the problem. In either case, the organization wasted its investment in the first solution for the unknown potential of a new solution. User expectations are certain to get higher, so this cycle will likely repeat itself. IT needs a new strategy, one that will meet the current expectations of users and pave the way for true organizational resilience.
  • Will Enterprise File Sync and Share Encryption Really Protect You?
    Will Enterprise File Sync and Share Encryption Really Protect You? George Crump, Storage Switzerland Recorded: Apr 27 2017 3 mins
    End-to-end encryption is important and offers a base level of security but if the EFSS vendor owns your keys then you may not have the protection you might think. In this StorageShort, Storage Switzerland and Ctera discuss the importance of key ownership as part of the encryption process.
  • From Incident Response to a Continuous Monitoring & Active Threat Hunting
    From Incident Response to a Continuous Monitoring & Active Threat Hunting Stuart Davis, Director, Mandiant & David Grout, Systems Engineering Director, FireEye Recorded: Apr 27 2017 49 mins
    With over 13 years of front-line experience dealing with advanced threat actors from around the globe, our Mandiant team know how the bad guys think and can help you win the battle against cyber attackers.


    In this webinar, Stuart Davis and David Grout will cover:
    - Best practices in regards to Security as a Service
    - How organisations can move from an alert-led security to an intelligence-led security
    - How FireEye can provide the adequate tools, processes and expertise required to build a next generation security program
  • 5G Today vs. 5G Tomorrow: How it Affects Your Enterprise
    5G Today vs. 5G Tomorrow: How it Affects Your Enterprise David Rush, Cradlepoint; Ken Rehbehn, 451 Research Recorded: Apr 26 2017 59 mins
    With 5G rapidly climbing the hype cycle toward the peak of inflated expectations, many organizations are asking the same question: “Where does 5G stand today, and how long before it can help my business?”

    Carriers in the U.S. are not only talking about it, but claiming their trials are ongoing and deployments are coming soon — in many cases, years earlier than had been thought possible. In reality, 5G has a limited, powerful use case today, but can reach its exceptional potential within the next couple years.

    At 11am PT / 2pm ET on April 26, 2017, join Cradlepoint’s David Rush and Ken Rehbehn of 451 Research to explore the 5G reality today and how 5G can help people and businesses in 2018 and beyond.

    Cradlepoint is the global leader in cloud-based network solutions for connecting people, places, and things over wired and wireless broadband.
  • Parallel Computing meets Parallel I/O
    Parallel Computing meets Parallel I/O Augie Gonzalez, Director Product Marketing, DataCore Software Recorded: Apr 26 2017 29 mins
    Many of us responsible for large scale OLTP systems confront two clashing phenomena:
    •Data comes at us at increasingly higher rates (from an expanding number of sources)
    •The time required to process and analyze those inputs is rapidly shrinking.

    Blame it on the Internet of Things (IoT)!

    Instinctively, we respond with two approaches. First, we search for hardware and software that speed up the process.
    Then, we try breaking up the problem into smaller parallel efforts.

    In this webinar you will learn to:
    •Look for choke points that get in the way of executing concurrent transactions
    (Hint: they hide where you don’t suspect)
    •Recognize the consequences those choke points have on competing workloads
    •Apply DataCore™ Parallel I/O technology to solve these barriers
  • How to Cut Disaster Recovery Expenses - Improve Recovery Times
    How to Cut Disaster Recovery Expenses - Improve Recovery Times Storage Switzerland, ClearSky Recorded: Apr 26 2017 61 mins
    4 steps for more affordable, effective disaster recovery. Disaster Recovery is an expensive proposition. But since the consequences of not being prepared for a disaster are so severe, it is an expense that organizations make. But that's not to say organizations are not always looking for way to do DR better, faster and for less money. In this live webinar join Storage Switzerland and ClearSky to learn how organizations can lower the cost of DR preparation and execution.
  • Best key practices for GDPR and utilizing IncMan™ Incident Response platform
    Best key practices for GDPR and utilizing IncMan™ Incident Response platform Mike Fowler, Vice President, Professional Services and Steve Ditmore, Senior Sales Engineer for DFLabs Recorded: Apr 26 2017 34 mins
    The GDPR will apply in all EU member states in May 2018, organizations and businesses that are data owners and/or dealing with data belonging to EU citizens have the responsibility to ensure their processing abides by new data protection law and processors must themselves abide by rules to maintain records of their processing activities. If organizations and businesses are involved in a data breach, they are far more liable under GDPR than they were under the Data Protection Act.

    Complying with the new regulations requires operating to high standards of data security and protection. If suffering a data breach that puts the rights and freedoms of individuals at risk, organizations must notify the people affected and the data protection authority (Information Commissioner's Office (ICO) in the UK) within 72 hours of becoming aware of it. Data breaches occur every day - and the EU have just increased the financial liability and consequences of inadequate security.

    Hear from Mike Fowler, author of the popular white paper: Automation as a Force Multiplier in Cyber Incident Response. Mike will provide insight into how best to leverage automation to provide incident response and reporting consistency for GDPR.

    Steve Ditmore will present IncMan™ – Security Automation and Orchestration features covering:

    •Installation and set-up is measured in hours rather than days or weeks without the need for expensive professional services support.
    •Review steps involved in a mitigating and controlling a data breach.
    •Automation of menial enrichment activities, so incident responders can determine/contain and mitigate breaches more efficiently and effectively.
    •Enhanced visibility creating a layered approach to information gathering.
    •Incident management including response prioritization.
    •How incident and notification workflows are automatically assigned to an incident.
  • Could Your Use of Windows Backup be Opening the Door to Hackers?
    Could Your Use of Windows Backup be Opening the Door to Hackers? Joe Noonan, VP of Product Marketing, Unitrends Recorded: Apr 25 2017 48 mins
    The go-to choice for IT pros to secure their data was Windows-based backup. But with all the malware and ransomware designed to attack Windows, many are trusting their backups to a hardened, purpose-built Linux appliance. Are you?

    Unitrends increases uptime and confidence in a world in which IT professionals must do more with less. Unitrends leverages high-availability hardware and software engineering, cloud economics, enterprise power with consumer-grade design, and customer-obsessed support to natively provide all-in-one enterprise backup and continuity. The result is a “one throat to choke” set of offerings that allow our customers to focus on their business rather than backup.

    Learn more at www.unitrends.com; follow us on Twitter @Unitrends
  • Walk this way - First steps towards firewall automation
    Walk this way - First steps towards firewall automation Erez Tadmor, Senior Product Manager, Tufin & Joe Schreiber, Technical Director, Business Development, Tufin Recorded: Apr 25 2017 61 mins
    Automation systems bring a great deal of value. Having the ability to produce better, faster, and more reliable results can go a long way in improving business agility and simplifying day-to-day tasks. Firewall automation also helps tighten security posture and ensure continuous compliance with internal policies and industry regulations.

    Tufin presents the recommended steps to start your journey towards firewall automation. Join us for the first webinar of the series, focusing on rule decommissioning, to learn how you can initiate an immediate and substantial impact on your organization.
  • The Next Best Steps for Hybrid Cloud
    The Next Best Steps for Hybrid Cloud Storage Switzerland and Zerto Recorded: Apr 21 2017 7 mins
    The first step to the cloud, for most organizations, is backup. This use case leverages cloud storage but totally ignores something that cloud providers are better at delivering – cloud compute. Join Storage Switzerland and Zerto as we discuss the best next step for hybrid cloud. Leveraging the cloud to create a next generation disaster recovery site.
  • CEO PoV: Take Control of your Cloud Application Experience
    CEO PoV: Take Control of your Cloud Application Experience Praveen Akkiraju, CEO, Viptela Recorded: Apr 20 2017 39 mins
    Enterprises are undergoing a revolution in their infrastructure as the application world is being transformed by cloud technologies. Today your applications can be located in the data center, through IaaS, or in a SaaS cloud. Similarly, users are transforming with mobility; no longer are they tied to one location. Enterprises want to solve the problem of connecting users to their applications in a consistent and secure manner.

    The overarching issue is the connectivity between these two worlds as we're stuck in two-decades old technology. Enterprises are therefore challenged with the requirement to transform their infrastructure while integrating underlying legacy technologies, and for the user to access their applications while maintaining policy and security framework.

    Join our CEO as he discusses how IT infrastructure is being transformed during the era of cloud technologies, and how Enterprises across a number of industries can embrace the network revolution.
  • You Bought All-Flash, Now What?
    You Bought All-Flash, Now What? Storage Switzerland & HPE Recorded: Apr 20 2017 58 mins
    Have you made the jump to all-flash storage? Are you planning to? If so this webinar is for you. We will look at what's next after (or before) the jump to all-flash. An all-flash array brings many benefits to the environment, but it also either exposes weaknesses or raises expectations in IT's ability to consistently deliver performance to applications, to protect the data those applications create and to ensure the organization can rapidly recover from almost any disaster.
  • Secure Secondary Storage for Digital Video Workflows
    Secure Secondary Storage for Digital Video Workflows Tony Barbagallo, Caringo VP of Product l Richie Murray, Bridge Digital President & Founder Recorded: Apr 20 2017 44 mins
    In the Media and Entertainment industry, organizations that can store and access all digital video at every step in the production process have a significant competitive advantage which can result in new revenue streams. In this webinar, Richie Murray, President and Founder of Bridge Digital (a solutions integrator specializing in helping M&E companies create, distribute and monetize their video assets more efficiently), and Tony Barbagallo, VP of Product for Caringo (a massively scalable storage, delivery and management platform designed specifically for content), will discuss how to leverage secure secondary storage without disruption to existing digital video workflows. Topics covered include:

    - Definition of “secure secondary storage” and how current offerings differ from traditional archive solutions
    - How secondary storage can help optimize pre-edit, edit and post processes
    - How to seamlessly plug secure secondary storage into video workflows
    - A demo on optimizing Avid shared storage with Marquis Project Parking through automated transfer to/from the Caringo platform
  • Can Archive Save You More Than Money?
    Can Archive Save You More Than Money? Storage Switzerland and NTP Recorded: Apr 20 2017 13 mins
    When most organizations consider an archiving project their primary goal is to save money. Basically they are looking to move data off of expensive storage valued at a couple dollars per GB to secondary storage valued at pennies a GB. They are counting on the 80/20 rule to save them money, where 80 percent of what an organization stores has not been accessed in the last nine months. Moving that 80% to less expensive storage will save them money. What most organizations that successfully implement a data management strategy actually find that the per GB cost savings is the most trivial part of the equation. In this ChalkTalk video, Storage Switzerland and NTP Software discuss the other more important reasons to archive data.
  • Get the Most Out of Your WAF - Tune for Security and Performance
    Get the Most Out of Your WAF - Tune for Security and Performance Michael Malone, Sales Engineer Recorded: Apr 20 2017 38 mins
    Our security experts will take you through WAF setup for policy and exceptions, profile review, and plugin rules to get the most of your WAF investment. They will cover 3 core topics of tuning a WAF:
    -Alert exception for false positive reduction
    -Profile maintenance for accuracy and efficiency (UBA)
    -Plugins for Dynamic Applications and Profile Tuning
  • Transforming Data Center Performance through Automated Infrastructure Control
    Transforming Data Center Performance through Automated Infrastructure Control Rhonda Ascierto, 451 Research - Aaron Peterson, RunSmart OS Recorded: Apr 20 2017 48 mins
    In this webinar, join Rhonda Ascierto of 451 and Aaron Peterson with RunSmart OS in a presentation on what is next for infrastructure management software. Far beyond just collecting data, monitoring and alarming, the session will address the efficiency and other added benefits automated control can bring when implemented. Case studies will be presented to highlight examples of recapturing underutilized assets and dynamic application provisioning taking advantage of the cloud.
  • Zero-Day Attacks and What To Do About It
    Zero-Day Attacks and What To Do About It Chris Candaffio System Engineer, Symantec and Q&A with Robert Arandjelovic & Gavin Fulton Recorded: Apr 20 2017 35 mins
    Vulnerabilities exist in all applications—and today’s sophisticated attackers will find them. Every day an exploit remains unpatched, your risk of a data breach increases dramatically. Only a multi-layered approach that fully integrates with your IT defense stands a chance of stopping them, but where to begin?

    By registering, you’ll gain valuable insights into:

    Which techniques effectively block zero-day attacks.
    Why robust endpoint protection plays such a critical component.
    How Symantec Endpoint Protection 14’s Memory Exploit Mitigation shuts down vulnerability attacks, even against unknown threats.
  • BrightTALK at RSA 2017: Ben Bernstein on Cyber Attack Trends for 2017
    BrightTALK at RSA 2017: Ben Bernstein on Cyber Attack Trends for 2017 Josh Downs, BrightTALK & Ben Bernstein, CEO, Twistlock Recorded: Apr 20 2017 10 mins
    BrightTALK caught up with Twistlock's CEO Ben Bernstein for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:
    - Trends in the cyber threat landscape
    - What companies can be doing to better improve their security posture
    - 2016's biggest breaches (including Yahoo) and why they happened
    - Preparations to take in advance of GDPR in May 2018
    - Cyber security in the financial sector
    - AI & Machine learning and the influence it'll have on the security industry

    About the Speaker:
    Ben Bernstein co-founded Twistlock, Inc. in 2015, and serves as its Chief Executive Officer. Ben has 14+ years of experience in enterprise security and operating systems. He is a Microsoft veteran with extensive experiences in both software development and product management. Ben is a veteran of the Israeli Intelligence Corps. He has a B.A cum laude in Computer Science from the Technion in Israel and an MBA with a scholarship of excellence from the Interdisciplinary Center in Israel. Ben hates writing about himself in third body.
  • What’s New in Symantec IT Management Suite 8.1?
    What’s New in Symantec IT Management Suite 8.1? Damon Covey, Director of Product Management, Symantec Recorded: Apr 20 2017 58 mins
    Want to know what’s new in Symantec’s latest release of IT Management Suite version 8.1? Join us as we discuss the exciting new features such as Windows 10 and Office 365 Patch Management, Mac OS Profile Management, Symantec Endpoint Protection and Compliance integration and many more, all of which have been introduced in this latest launch.

    Join our webinar “What’s New in Symantec IT Management Suite 8.1?” to learn about:
    • How Symantec IT Management Suite will simplify and help keep Windows 10 and Office 365 up to date
    • Dealing with Windows 10 cumulative updates
    • Handle large updates in bandwidth constrained environments
    • Support for AWS Marketplace, Mac application metering and profile management
    • Integration with your existing Symantec Endpoint Protection & Control Compliance Suite
    • Enhanced support for Ghost Solution Suite
    • Network discovery support via Simple Network Management Protocol v3
    • Off-box data migration and much more


    We look forward to having you for this live session.
  • Live From DockerCon 2017: Storage Strategies for Docker - Panel Discussion
    Live From DockerCon 2017: Storage Strategies for Docker - Panel Discussion George Crump, Storage Swiss, Steve Watt, Chief Architect, Red Hat + Panelists Recorded: Apr 19 2017 62 mins
    Join Storage Switzerland, Red Hat and leaders from the Docker industry for a round-table discussion on developing the right storage strategies to successfully deploy and manage Docker both in your environment and in the cloud. There are a group of vendors trying to make the storage architectures that support Docker easier to use, more enterprise class and able to provide data persistence. Storage Switzerland will moderate a roundtable discussion on Storage, Docker and how to build enterprise class environments that support legacy applications. We will cover areas like who should be using Docker, can legacy data centers participate, what are the storage challenges with a containerized environment and what are the issues with moving containers from on-premises to the cloud?
  • Cloud migration & hybrid cloud with no downtime and no disruption
    Cloud migration & hybrid cloud with no downtime and no disruption Paul Scott-Murphy, WANdisco VP Product Management Big Data/Cloud and James Curtis, 451 Research Senior Analyst Recorded: Apr 13 2017 46 mins
    Cloud migration and hybrid cloud with no downtime and no disruption:
    If business-critical applications with continually changing data are really moving to the cloud, the typical lift and shift approach of copying your data onto an appliance and shipping it back to the cloud vendor to load onto their storage days later, isn’t going to work. Nor will the one-way batch replication solutions that can’t maintain consistency between on-premises and cloud storage. Join us as we discuss how to migrate to the cloud without production downtime and post-migration deploy a true hybrid cloud, elastic data center solution that turns the cloud into a real-time extension of your on-premises environment. These capabilities enable a host of use cases, including using the cloud for offsite disaster recovery with no downtime and no data loss.
  • 3 Reasons You Are Losing the Data Management Battle and How To Start Winning
    3 Reasons You Are Losing the Data Management Battle and How To Start Winning Storage Switzerland and Dternity/StrongBox Data Solutions Recorded: Apr 13 2017 61 mins
    Organizations managing data have a competitive advantage over organizations that don't. But most organizations don't have the time or tools available to implement a successful data management strategy. It’s not for a lack of trying. Many organizations fight a losing battle when trying to implement a data management solution. In this webinar Storage Switzerland and Dternity/StrongBox Data Solutions will discuss the three reasons why organizations are losing the data management battle, and provide guidance on how to start winning the battle.
  • BrightTALK at RSA 2017: Bill Diotte on Securing IoT Networks
    BrightTALK at RSA 2017: Bill Diotte on Securing IoT Networks Josh Downs, Community Manager, BrightTALK & Bill Diotte, CEO, Morcana Recorded: Apr 13 2017 8 mins
    BrightTALK caught up with Mocana's Bill Diotte for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:
    - The difference between securing IoT networks than tradition enterprise IT networks
    - The role of government regulation in IoT security
    - The 'mission critical' elements that need protecting in IoT networks
    - The threat actors and motives targeting IoT networks
    - The role of cyber warfare in global geo-politics

    About the Speaker:
    William (Bill) Diotte is a technology entrepreneur, CEO and Board Member with over 20 years of experience in working with tech-driven companies from startup stage to Fortune 500. Prior to joining Mocana as Chief Executive, he was the co-founder and CEO of software defined networking pioneer BroadHop Inc., acquired by Cisco. Starting off his career as a manufacturing engineer, he became an executive and managing director with both Gemini and SRI Consulting serving high tech companies in the software and telecom markets. Bill has also served as a Board Member to LiveAction, Inc., and is an investor and advisor to several companies in the software infrastructure and security space.
  • Tech Demo - Data Discovery and Classification for the GDPR
    Tech Demo - Data Discovery and Classification for the GDPR Cheryl Tang - Prod. Mktg.; Mark Pelkoski - Principal SE Recorded: Apr 12 2017 28 mins
    This is the first in a series of product demos focused on addressing specific requirements of the General Data Protection Regulation (GDPR). In this demo, we demonstrate how to use our data security portfolio to find and categorize your data for GDPR compliance.

    In this webinar we’ll provide:

    o An overview of General Data Protection Regulation (GDPR)
    o Who does it impact?
    o What are the data protection principles
    o What are the primary data security requirements
    o An insight into Imperva’s data protection portfolio and a demo of its discover and classification capabilities

    Hope you can join us!
  • Introducing the Lenovo Storage DX8200D Powered by DataCore
    Introducing the Lenovo Storage DX8200D Powered by DataCore Carlos Carreras, SVP of Worldwide Business Development, DataCore Software &Patrick Oliveri, DCG North America Storage Produc Recorded: Apr 12 2017 47 mins
    Lenovo and DataCore have collaborated to create a Software-defined Storage (SDS) appliance. This validated, turnkey appliance provides easy scalability and single pane management at a fraction of the cost of legacy systems—without trade-offs in availability, reliability or functionality.

    Join this webinar to learn more about the Lenovo Storage DX8200D Powered by DataCore.
  • [Video Interview] Tarah Wheeler on the Ethics of Hacking Back and AI in Security
    [Video Interview] Tarah Wheeler on the Ethics of Hacking Back and AI in Security Josh Downs, BrightTALK & Tarah Wheeler, Principal Security Advocate, Symantec May 2 2017 1:00 pm UTC 30 mins
    - BrightTALK at CRESTCON & IISP Congress -

    BrightTALK caught up with Symantec's Tarah Wheeler for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The ethics of 'hacking back'

    - AI & Machine learning and the influence it'll have on security

    - Cyber security in the financial sector

    - Cyber warfare and the new tactics coming through

    - Vulnerabilities in the IoT and what we can do about them

    Enjoy!
  • Meet DataCore: Data Infrastructure for Next-Generation Data Centers
    Meet DataCore: Data Infrastructure for Next-Generation Data Centers Haluk Ulubay, Senior Director of Marketing, DataCore Software May 2 2017 6:00 pm UTC 45 mins
    We think differently. We innovate through software and challenge the IT status quo.

    We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.

    DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.

    Join this webinar to meet DataCore, learn about what we do and how we can help your business.
  • [Video Interview] Andrew Gould on Early Cyber Prevention Techniques
    [Video Interview] Andrew Gould on Early Cyber Prevention Techniques Josh Downs, BrightTALK & Andrew Gould, Head of the MET's Falcon Cybercrime Unit May 3 2017 1:00 pm UTC 30 mins
    - BrightTALK at CRESTCON & IISP Congress -

    BrightTALK caught up with The MET's Andrew Gould for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The rise of Ransomware and what we can be doing to protect ourselves

    - The steps that businesses should be taking to prepare for GDPR

    - Financial cyber security and what the banks can be doing better to defend against malicious hackers

    - Cyber security relations and the future of law enforcement post-Brexit
  • [Video Interview] Piers Wilson and the IISP Industry Survey
    [Video Interview] Piers Wilson and the IISP Industry Survey Josh Downs, BrightTALK & Piers Wilson, Director, IISP May 4 2017 1:00 pm UTC 30 mins
    - BrightTALK at CRESTCON & IISP Congress -

    BrightTALK caught up with The IISP's Piers Wison for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The findings of the IISP Industry Survey

    - AI & machine learning in the security sphere

    - The steps cyber professionals need to take to prepare for GDPR

    - What banks can be doing to remain as protected as possible from cyber criminals

    - The growth of IoT networks and their subsequent vulnerabilities

    - What to look for when assembling a security team

    - How to get the most out of your security budget

    -
  • How Cylance Prevents Ransomware Attacks
    How Cylance Prevents Ransomware Attacks Brian Robison, Senior Director, Technical Marketing at Cylance® May 4 2017 6:00 pm UTC 60 mins
    Many of our customers sought out Cylance because it is highly effective in preventing ransomware attacks. We have learned firsthand how ransomware is affecting organizations of all sizes, and across all industries. In this live demonstration, Brian Robison, Senior Director, Technical Marketing at Cylance® will show how ransomware works. He will launch several attacks on unprotected machines to deliver a real-world view into how ransomware compromises systems, and how Cylance prevents ransomware attacks.

    Brian will provide a live demonstration of CylancePROTECT® blocking attacks, and will discuss:

    •Different ransomware types
    •Delivery methods, including drive-by downloads and fileless malware
    •Why launching attacks is cheap and easy with ransomware-as-a service
    •How Cylance prevents both file-level and disk-level encryption
  • Aktuelle Trends bei Sicherheitsverletzungen und Cyberangriffen in D/A/CH
    Aktuelle Trends bei Sicherheitsverletzungen und Cyberangriffen in D/A/CH Sven Schriewer, Director, FireEye May 10 2017 12:00 pm UTC 45 mins
    Cyberkriminelle entwickeln ihre Taktiken, Techniken und Prozesse stets weiter und sind dabei häufig schneller als die Sicherheitsteams. Die Angreifer sind bestens organisiert und ihre Methoden werden von Jahr zu Jahr raffinierter – 2016 war da keine Ausnahme.

    In diesem Live-Webinar stellt Sven Schriewer, Director, FireEye, die Beobachtungen und Schlussfolgerungen der Experten von Mandiant aus der Untersuchung einiger der schwerwiegendsten Cyberangriffe und Sicherheitsverletzungen des vergangenen Jahres vor.

    Melden Sie sich noch heute an, um sich über die folgenden Themen zu informieren:
    •Neue Trends bei Phishing-Angriffen auf Unternehmen
    •Neue Entwicklungen in der Angriffstelemetrie und -methodologie
    •Datengestützter Überblick über neue Bedrohungen weltweit
    •Moderne Abwehrstrategien zum besseren Schutz von Unternehmen und Institutionen
    •Auswirkungen der Datenschutz-Grundverordnung auf Unternehmen in EMEA
    •Trends in EMEA, Nordamerika und APAC im Vergleich
    Neben den Untersuchungsergebnissen in der Regionen EMEA mit Schwerpunkt auf Deutschland, Österreich und Schweiz, enthalten Sie in diesem Webinar auch Informationen wie Sie eine proaktive Strategie zur Stärkung Ihrer Sicherheitsinfrastruktur entwickeln.
  • Top Five Mistakes Companies Make when Executing a Cloud Strategy
    Top Five Mistakes Companies Make when Executing a Cloud Strategy Tab Schadt, CEO at DoubleHorn May 10 2017 7:00 pm UTC 30 mins
    Choosing the right cloud provider, that meets your requirements at the right price can be a daunting task. We’ve seen too many make the wrong choices. In this webinar, we will guide you through the things to think about when executing a cloud strategy and how to avoid the pitfalls. Is there a better way to do things? We think so.

    Some things you'll learn in this webinar:
    Not all clouds are created equal. How to choose the best cloud(s) for your companies needs
    How to estimate your bandwidth
    How to avoid sticker shock and leverage the best value
  • GDPR – be prepared, be response-ready
    GDPR – be prepared, be response-ready Stuart McKenzie, VP, Mandiant Consulting & Dan Wire, Sr. Director, Marcom May 11 2017 3:00 pm UTC 45 mins
    As any business unfortunate enough to have suffered a data breach can attest, in a crisis situation, being organised enough to provide a detailed notification to affected customers (or indeed regulators) is a difficult task on its own. When combined with required incident response processes – identifying the cause, closing the vulnerability, all while determining the extent of the damage, it becomes all the more difficult. Furthermore, GDPR means data breaches will need to be reported within 72 hours – how will you manage the fallout?
    In this webinar we discuss the risks, challenges and answers surrounding response-readiness and the importance of having a critical communications strategy in place.

    Presented by:
    Stuart McKenzie | VP, Mandiant Consulting
    Dan Wire | Sr. Director, Marcom
  • Between a ROC and a Hard Place with PCI?
    Between a ROC and a Hard Place with PCI? Jennifer Pesci-Anderson, Jeff Avery May 11 2017 4:00 pm UTC 30 mins
    Learn how to conquer and manage the PCI process. Businesses are challenged with attempting to continuously monitor their PCI environment, responding when something changes and managing all the information to gather evidence and generate the report on compliance (ROC) or attestation on compliance (AOC). Verterim is providing a 3 part, educational PCI series to address some of these business challenges and provide our tips on how you can take advantage of technology you may already have in house. The first 30 minute BrightTalk will look at the PCI process at a higher level and provide a view into a standard RSA Archer use case to help solve the problem. Join our GRC practitioners, Jennifer Pesci-Anderson, National Practice Lead and Jeff Avery, Engineer on May 11 from 12-12:30 to see how you can address your PCI business challenges.
  • Resiliency orchestration in the hybrid era
    Resiliency orchestration in the hybrid era Karpagam Venkataraman (IBM) May 15 2017 1:00 pm UTC 60 mins
    Are you confident in your IT recovery program? In today’s hybrid IT environment, interconnected, mission-critical applications run across diverse platforms and geographies. The manual disaster recovery process traditionally followed, requires huge time, resource and efforts to scale up DR management for all critical IT assets. This leads to critical IT resources being excluded from DR programs. As per a recent survey, IBM found that 78% of enterprises face unacceptable risk for core enterprise IT resources.

    With growing threat of cyber breaches, assured resiliency to support business objectives requires a new approach, including constant, intelligent monitoring and proactive action to achieve DR SLAs.

    In this webinar you will learn how resiliency orchestration is transforming resiliency, explore the complexity of hybrid environments and the roadblocks behind DR and business continuity, and understand the benefits of Resiliency Orchestration and how it can enhance confidence in your cyber resilience program
  • The GDPR’s impact on your business and preparing for compliance
    The GDPR’s impact on your business and preparing for compliance Alan Calder (IT Governance May 15 2017 2:30 pm UTC 60 mins
    The EU General Data Protection Regulation (GDPR) comes into effect on 25 May 2018, and will significantly reshape the data protection landscape for organisations that collect and process the data of European residents. Therefore businesses will need to take responsibility for the way they collect and process personal data and will have to take immediate action to align their business systems with the requirements of the GDPR.

    This webinar session will cover:

    •An overview of the General Data Protection Regulation (GDPR).
    •The impact GDPR creates on businesses and the transition timelines.
    •The first steps in preparing for GDPR compliance.
    •The technical and organisational measures your business will need to adopt to comply with the Regulation.
    •Key recommendations and best-practices to achieve and manage GDPR compliance.
  • Securing FinTech: Threat-based testing along the kill chain
    Securing FinTech: Threat-based testing along the kill chain Peter Wood May 16 2017 10:00 am UTC 45 mins
    Threat-based testing, accurately simulating criminal attacks, is a critical approach in securing FinTech. Attackers constantly evolve their attack methods and strategies in response to changing technologies, making it essential that security tests match the threat landscape.
  • Cyber crisis management: Building organisational readiness to respond & recover
    Cyber crisis management: Building organisational readiness to respond & recover Roberta Ramsden-Knowles, Director and Charlotte Thompson, Senior Manager, Regester Larkin by Deloitte May 16 2017 11:00 am UTC 60 mins
    This session will focus on how organisations can build senior executive level readiness to respond and recover from sophisticated cyber incidents. It will provide an overview of the threat landscape and consider the differences cyber crises present for senior executives. Participants will learn about some of the challenges faced when responding to a cyber incident and how to overcome them by building readiness in people, structures, processes and plans.
  • Cyber security and the insider threat
    Cyber security and the insider threat Sonny Sehgal (Transputec) and Adam Blake (ThreatSpike Labs) May 16 2017 2:30 pm UTC 60 mins
    The greatest threat to the corporate security perimeter now comes not from the outside, but the inside. Social engineering threats such as phishing, malware and ransomware target the weakest link, the human factor. This webinar will expose the techniques of the hackers and offer advice on how these can be combatted to make your business more resilient in the face of the cyber threat.
  • Lessons & Impact of New York's Cybersecurity Regulations
    Lessons & Impact of New York's Cybersecurity Regulations Elias Okwara, Team Lead, Integrations & Content at UpGuard May 16 2017 8:00 pm UTC 45 mins
    The coming into effect of New York's cybersecurity compliance requirements for banks, insurance companies and their third party service providers on March 1, 2017 marked a major development in the cyber risk regulatory environment. While the impact of these rules is far from certain, the lessons in managing risk are universal. UpGuard's Elias Okwara, CIPP/E, CIPP/US, will discuss practical steps for compliance and the implications amid rapidly changing cyber threats.

    In this webinar you will learn:

    - What do the New York Department of Financial Services (DFS) cybersecurity regulations mean for financial institutions
    - Practical steps for compliance
    - Implications of the regulation amid rapidly changing cyber threats
  • Supply chain cyber resilience – getting the balance right
    Supply chain cyber resilience – getting the balance right Matt Thomas and Lee Glendon (Ultima Risk Management) May 17 2017 8:00 am UTC 60 mins
    Today’s digitised value chains have a very high dependency on third parties. This exposure is not lost on potential attackers, who will invest resources in researching, identifying and selecting targets among value chain partners. It would be an uneven contest were firms not to take steps to understand these vulnerabilities and ‘value at risk’ themselves. This webinar will set out clear steps that can be taken to understand potential vulnerabilities among third parties and will introduce a lifecycle approach to support robust third party risk management from the start of the relationship through to exit.
  • Cyber Resilience - Can your organization deliver after a cyber event crisis?
    Cyber Resilience - Can your organization deliver after a cyber event crisis? Al de Brito, ContinuitySA May 17 2017 9:30 am UTC 60 mins
    Take your mark. Get set… and go. What do you do if your organization is faced with a crisis, do you have the necessary steps and procedures to recover from a cyber attack?

    91% of APT (Advanced Persistent Threats) begin with spear phishing emails. Cyber criminals increasingly target employees within an organization who have administrative rights and access to critical systems. Successfully phishing these individuals could give them the ‘key’ to breaching security in further attacks.

    This webinar will cover five domains to assist the organization to maintain a framework with the ability to deliver the outcomes consistently at all times. These domains focus on preventative, detective and reactive controls within the organization, and form part of the process of having the ability to recover in the event of a crisis.

    These five domains will follow the process of identifying, protecting, detecting, responding and recovering, giving a holistic view of the full cycle of infrastructure resilience.
  • Cyber contingency planning: Going beyond traditional BC planning
    Cyber contingency planning: Going beyond traditional BC planning Charlotte Thompson, Senior Manager, and Charles Barlow, Manager, Regester Larkin by Deloitte May 17 2017 11:00 am UTC 60 mins
    Business continuity planning has long helped organisations prepare for, respond to and recover from all types of disruption. Sophisticated and enduring cyber incidents, however, can challenge the planning assumptions many organisations rely on, including recovery time and recovery point objectives. This session will look at how organisations can go beyond traditional business continuity planning to enhance cyber incident readiness.
  • Cyber resiliency in the hybrid era: best practices, benefits & tools for success
    Cyber resiliency in the hybrid era: best practices, benefits & tools for success Joe Starzyk (IBM) May 17 2017 1:00 pm UTC 60 mins
    There is a growing demand for organizations to extend their operations out of a secure, controlled domain into an unpredictable ecosystem, for reasons such as cost reduction, increases in productivity, profitability requirements and regulatory pressures, to name a few. This expansion into hybrid environments exposes businesses into unforeseen risks, requiring a more formidable capability relative to the resiliency measures that need to be in place. A strong cyber resiliency framework that includes a combination of security, business continuity and a resilient control system can help to mitigate disruptions of critical business functions and enable confidence across the entire enterprise in the event of a cyber breach.

    In this webinar, you will learn tactical approaches for implementing cyber resilience, including evolving industry practices for enhanced cyber resiliency, benefits to be realized beyond mitigation of threats and risk reduction, and technological advancements that support successful cyber resiliency.
  • Interpreting the GDPR's Article 32 in the most appropriate way for YOUR business
    Interpreting the GDPR's Article 32 in the most appropriate way for YOUR business Nick Burrows (Daisy Group) May 18 2017 9:30 am UTC 60 mins
    With its 25th May 2018 deadline, the General Data Protection Regulations have become the stuff that marketing dreams are made of, but the delivery of appropriate levels of confidentiality, integrity and availability for affected data does not have to mean vast amounts of investment in cutting edge technology and expensive consultancy engagements. In this session we will have a closer look at what the end results of Article 32 (Security of Processing) actually need to look like and address some of the terminology used so that delegates properly understand what the regulation demands from them and their businesses. In the context of business continuity, we will further look into how current strategies match up to GDPR and what can be done to optimise them for May 2018 and beyond.
  • Cyber resilience: How the culture of your organisation can improve resilience
    Cyber resilience: How the culture of your organisation can improve resilience Lyn Webb, Senior Manager, Regester Larkin by Deloitte May 18 2017 11:00 am UTC 60 mins
    The first defence against cyber attacks is often to impose technical barriers, but how can an organisation’s culture help mitigate the cyber risk? This session will look at the cultural aspects of security, measuring cyber security culture and suggest how behaviour can make us more resilient.
  • [Video Panel] Fighting Ransomware & Responding if the Worst Happens
    [Video Panel] Fighting Ransomware & Responding if the Worst Happens Josh Downs, BrightTALK; Adrian Taylor, FireEye; Ian Whiting, Titania & others TBC May 18 2017 12:00 pm UTC 60 mins
    Ransomware was one of the biggest threats facing businesses in 2016 and that trend is expected to continue as we press further into 2017.

    As more and more cheap malware becomes available to cyber criminals the sheer amount of ransomware attacks is on the rise.

    However, cyber defences are beginning to catch up.

    This expert video panel will be discussing the ransomware landscape, what you can do to better protect your business from the threat and steps to take should the worst happen.

    Panelists:

    - Josh Downs, BrightTALK (moderator)

    - Adrian Taylor, Field CTO, FireEye

    - Ian Whiting, CEO, Titania

    - other panelists TBC
  • Balancing resiliency, risk and regulations with consumer choice and convenience
    Balancing resiliency, risk and regulations with consumer choice and convenience Karin Beaty (IBM) May 18 2017 2:30 pm UTC 60 mins
    Cyber threats. Compliance. Ease of use. These are among the growing challenges to resiliency for all organizations, but they often are at odds with another. Clients and their customers are driving a need for ease of use, customization and empowerment, which can result in a more complex, at-risk infrastructure. How can organizations manage risk and compliance - maintaining expected transparency, accountability and interconnectedness amongst all of this complexity?

    Join our discussion on the impacts of increased regulatory supervision and the effects of standards, using industry examples - and learn key strategies you can use today to manage resiliency across all levels of the enterprise to protect your business in the age of digitization and IT modernization.
  • GDPR & The Rise of Email-Based Cybercrime
    GDPR & The Rise of Email-Based Cybercrime Achmad Chadran, Mimecast Archiving Specialist & Enza Iannopollo, Forrester Research Analyst May 18 2017 3:00 pm UTC 60 mins
    Implementation of the EU General Data Protection Regulation Act (GDPR) is fast approaching. The GDPR’s tough privacy rules and financial penalties are big enough challenges for organizations like yours. But rising email-borne threats like ransomware make compliance even more difficult.
     
    This webinar explores:
    - Steps to minimize GDPR risk even in the face of spiraling email-borne attacks
    - How the GDPR’s Data Breach Notification requirement changes everything
    - Why it’s vital to secure a budget for GDPR compliance and third-party assessment

    About the presenters:

    Achmad Chadran, Mimecast Archiving Specialist:

    Achmad Chadran is an archiving product marketing manager at Mimecast. Prior to joining Mimecast, Achmad held marketing and product management positions at the Intronis MSP Solutions arm of Barracuda Networks, Dell’s Large Enterprise Business Unit, and Siemens. He has a bachelor’s degree from the University of Virginia and a master’s degree from Ohio University.

    Enza Iannopollo, Forrester Research Analyst

    Enza is an analyst on the Security & Risk team and a Certified Information Privacy Professional (CIPP/E). Her research focuses on the impact of internet regulations and data privacy issues on digital business models, as well as the technologies that underpin them. Her research coverage includes data protection, privacy in the context of cloud computing, analytics, and the internet of things. Enza also helps Security & Risk Professionals build and execute data and privacy protection strategies in line with the requirements of the business technology (BT) agenda.
  • Been hacked by cyber terrorists? What’s your Plan B?
    Been hacked by cyber terrorists? What’s your Plan B? Braam Pretorius (ContinuitySA) May 18 2017 4:00 pm UTC 60 mins
    In today’s global village everyone is connected. The internet has brought billions of people together, allowing sharing of data, communication and commerce at a scale never imagined before. The value of the internet is clear for everyone to see. Unfortunately, the same internet also allows for cyber hackers and attackers to fight a new war, Cyber terrorism, theft of data and extortion. The attackers hide in plain sight. Working from homes or offices. Sometimes alone, often in syndicates. Even state sponsored cyber terrorism is on the increase.

    Large cyber security companies such as firewall providers and anti-virus vendors are spending millions of US dollars in a constant battle to stay ahead of the cyber threat. Unfortunately, these measures are not always successful in preventing cyber-attacks from occurring as can be seen from recent attack against Primera Blue Cross.

    The company, a health insurer based in Washington State, said up to 11 million customers could have been affected by a cyber attack last year. Hackers gained access to its computers on 5 May 2016 and the breach was not discovered until 29 Jan 2017. The breach probably exposed members' names, dates of birth, Social Security numbers, mailing and email addresses, phone numbers and bank account information. The company is currently working with the FBI and a cyber security firm to investigate.

    So, given that no matter what you do to protect yourself against the cyber threat, you will probably be attacked or have already been attacked. You therefore need a plan B to allow your business to continue with crucial day-to-day activities after the event.