Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • The Inside Story of the Petya/ExPetr Ransomware: Learn how to protect your data
    The Inside Story of the Petya/ExPetr Ransomware: Learn how to protect your data Juan Andres Guerrero-Saade, Kaspersky Lab, Matt Suiche, Comae Technologies Jun 29 2017 2:00 pm UTC 120 mins
    On Thursday, 29 June, Kaspersky Lab is teaming up with Comae Technologies to present an emergency webinar for businesses to help them understand and defend against the Petya/ExPetr ransomware. The malware has affected companies in a range of industry sectors across the world, with Ukraine, Russia and number of Western European countries most affected.

    Juan Andres Guerrero-Saade, senior security researcher in Kaspersky Lab’s Global Research and Analysis Team, will be joined by Matt Suiche from Comae Technologies to present the very latest information on the ransomware’s attack vectors, the infection process and how it spreads through company networks. They will provide mitigation guidance and explain the actions organizations need to take to secure their computers and networks against this threat.
  • Untangling ITSM
    Untangling ITSM Phillip Palmer, Chief Evangelist at UpGuard Jun 29 2017 5:00 pm UTC 45 mins
    The Alphabet Soup of International Standards, Best Practice Frameworks, Governance Models and the like can be daunting and confusing at first. Which one is ‘Right’? Which one is the ‘Best’? Which one of these should a business use to improve?

    The good news is that it doesn’t have to be that difficult.

    Phillip Palmer has been educating and advising organisations in best practices for over 15 years. A self-described ‘Service Management Evangelist and Process and Quality Purist’, Phillip has garnered praise and awards for his infectious enthusiasm and practical application of best practice guidance.
  • 4 pitfalls to avoid with DR in hybrid cloud.
    4 pitfalls to avoid with DR in hybrid cloud. Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Jun 29 2017 5:00 pm UTC 60 mins
    Is your disaster recovery (DR) strategy inhibiting your company’s growth? A hybrid DR approach can bring significant benefits but only if you go in with full knowledge and understanding. In this webinar, we’ll outline the four pitfalls that can sink a DR strategy.
  • Red Hat and Microsoft: Partnering to bring Enterprise Customers to the Cloud
    Red Hat and Microsoft: Partnering to bring Enterprise Customers to the Cloud Carl Lehmann - 451 Research Principal Analyst, Margaret Dawson - Red Hat, Jose Miguel Parrella - Microsoft Jun 29 2017 6:00 pm UTC 60 mins
    Join our webinar on the capabilities enabled between Microsoft and Red Hat, and how their IT ecosystems support and complement each other.

    For years Windows and Linux have been rival development and runtime environments used by two distinct development communities – .Net vs. J2EE. At least that’s what we thought. In fact, they are not rivals at all, really. Rather, they are both commonly used by nearly all enterprises to develop and execute the applications they need to run their businesses.

    Today, those applications are being modernized, containerized and redeployed across multiple clouds. Business and IT planners alike are rethinking how to develop new cloud-native applications and the infrastructure needed to deploy them to their best execution venue whether on-premises, in or across private, public or hybrid clouds. They expect the IT vendors and service providers they use to do more than just coexist. They expect partnerships dedicated to customer success – and none more so than among the two leading vendors in each community, Microsoft and Red Hat.

    In this webinar 451 Research Principal Analyst Carl Lehmann, Margaret Dawson, Global Product Marketing Manager at Red Hat
    and Jose Miguel Parrella,Sr Product Marketing Manager for Open Source at Microsoft will address:
    •How to overcome common challenges of application modernization, infrastructure management, and cloud deployment.
    •The partnership, and capabilities enabled therein, between Microsoft and Red Hat.
    •How Microsoft Azure and Red Hat ecosystems support and complement each other.

    Participants will learn how Microsoft and Red Hat build upon each other’s strengths in container-based, cloud-native application development, infrastructure deployment and operations to better serve their mutual customers through joint business practices, technology support, and ecosystem.
  • Systemhärtung: Schutz Ihrer Systeme auch wenn Patch Management keine Option ist!
    Systemhärtung: Schutz Ihrer Systeme auch wenn Patch Management keine Option ist! Olaf Mischkovsky; Alexander Peters Jul 4 2017 12:00 pm UTC 60 mins
    Wie der jüngste WannaCry Cyber Angriff gezeigt hat sind nicht gepatchte Systeme ein beliebtes Einfalltor für Schadcode unterschiedlichster Art und ein aktives Patch Management ist unbestritten eine der kritischsten Maßnahmen zum Schutz ihrer IT-Landschaft und sollte somit auf keinen Fall vernachlässigt werden.

    Allerdings gibt es in der Praxis in unterschiedlichsten Umgebungen (Produktion, Embedded Systeme, ältere oder statische Applikationsumgebungen um nur einige wenige zu nennen) valide und vielfältige Gründe warum Systeme nicht auf dem aktuellen Stand gehalten werden können.
    An dieser Stelle gibt es auch immer wieder Schwachstellen für die keine oder zumindest zum Zeitpunkt des Bekanntwerdens noch keine Updates zur Verfügung stehen und wir möchten in diesem Webcast aufzeigen wie mit Hilfe einer aktiven Systemhärtung Ihre System trotzdem geschützt werden können.

    Des Weiteren werden wir Ihn aufzeigen wie mit Hilfe einer solchen Lösung auch aktuelle und gepatchte Systeme auf einen höheres Schutzniveau gebracht werden können.
  • Intelligente Endpunktsicherheit: mehr als nur Vorbeugung
    Intelligente Endpunktsicherheit: mehr als nur Vorbeugung Ruediger Weyrauch, Director, Central Europe System Engineering bei FireEye Jul 5 2017 12:00 pm UTC 45 mins
    Moderne Lösungen für die Endpunktsicherheit erfüllen zwar die Aufgaben, für die sie entwickelt wurden, bieten jedoch keine lückenlose Sicherheit.
    Umfassender Endpunktschutz erfordert vorbeugende Maßnahmen, Virenschutz, Tools zur Bedrohungserkennung und -abwehr am Endpunkt und weitere Funktionen.
    Selbst wenn ein Unternehmen dazu mehrere Punktlösungen einsetzt, werden dadurch höchstwahrscheinlich nicht alle Sicherheitslücken geschlossen.
    Manche Anbieter werben mit „Endpunktsicherheit der nächsten Generation“. Doch was genau meinen sie damit?

    Ruediger Weyrauch, Director, Central Europe System Engineering bei FireEye, erläutert in einem Webinar, worauf Sie achten sollten, damit Ihre Endpunktsicherheitslösung der nächsten Generation Ihre Endpunkte lückenlos schützt.

    Die Themen:
    - Der aktuelle Stand der Endpunktsicherheit und die damit verbundenen Herausforderungen
    - Die Vorteile von Lösungen für die Angriffserkennung und -abwehr an Endpunkten (EDR)
    - Die Vorteile von Bedrohungsdaten und ihre Rolle bei der EDR
    - Warum ein Endpunkt-Agent die folgenden Merkmale aufweisen sollte:
    •Mehrere Engines für die Bedrohungserkennung und -abwehr
    •Integrierte Prozessabläufe von der Erkennung über die Untersuchung bis hin zur Abwehr
    •Skalierbarkeit, mehrere verfügbare Formfaktoren, Unterstützung für verschiedene Betriebssysteme
  • Power of The Proxy
    Power of The Proxy Timothy Chiu, Senior Director, Product Marketing Jul 6 2017 5:00 am UTC 30 mins
    The reality & one of the biggest challenges for IT today is that there’s a complex user definition – there are now many options for connectivity via multiple types of devices, and the truth is, there is a lack of security for many of these new devices both on premise and in the cloud.

    The traditional security perimeter that your IT team used to be able to define surrounding cloud security is now dissolving. So if you are adopting more cloud services, putting more employees in remote or distributed offices, or are concerned about the increasing number of cyber threats you are reading about in the headlines, join us for this session to better understand what it means to be a proxy, why that’s so important today, and how that plays against what our competitors are saying about us.

    Register for our webinar ‘Power of The Proxy’ today!
  • Data Governance, Compliance and Preservation Guidelines
    Data Governance, Compliance and Preservation Guidelines Raphael Barini, Technical Solutions Professional, Microsoft Corporation Jul 7 2017 6:00 pm UTC 60 mins
    Are you compliant with data preservation requirements? Ensure that you're saving information according to your needs. Office 365 U.S. Government is designed for the unique needs of U.S. government organizations. It provides all the features and capabilities of Office 365 services in a segmented cloud community that enables organizations to meet U.S. compliance and security standards.
  • Definitive Incident Resolution Lifecycle for Modern Ops
    Definitive Incident Resolution Lifecycle for Modern Ops Dave Cliffe, Group Product Manager & Sean Higgins, Product Manager Jul 11 2017 8:00 am UTC 45 mins
    The stakes of managing complex infrastructure continue to increase alongside the ever-increasing costs of outages. And while many IT Operations teams are investing in monitoring and ITSM tools to detect issues, they are often forced to react to high volumes of event data without context and without any consistent, well-defined processes. This leads to costly operational inefficiencies, employee burnout, and extended customer downtime.

    Join us as we share newly PagerDuty product capabilities specifically designed for modern IT Operations teams. These capabilities take the chaos out of the incident resolution lifecycle — from assess, to resolve, to learn. Learn from the collective wisdom of thousands of the best IT operations teams how to make the unpredictable predictable, so you can spend more time on innovation.

    You’ll discover how to:

    •Optimize your ITSM toolsets by integrating people, data, and processes
    •Maximize cross-functional transparency and consistency
    •Prioritize incidents with well-defined rules
    •Automate troubleshooting and remediation
    •Ensure continuous learning and improvements across your team
  • Introduction to Being an Incident Commander
    Introduction to Being an Incident Commander Eric Sigler - Head of DevOps @ PagerDuty Jul 12 2017 4:00 pm UTC 60 mins
    During a major customer-impacting incident, every minute counts. The team must work together seamlessly and quickly to a successful resolution — and that’s done best with an Incident Commander driving coordination.

    An Incident Commander is tasked with being the decision maker, delegating tasks and listening to input from subject matter experts in order to bring the incident to resolution. This is a critical role and there are essential best practices you must follow to get it right.

    Join us to learn:
    •What is an Incident Commander?
    •The role and responsibilities of an Incident Commander
    •Incident call procedures and terminology
    •Incident commander skills for success
  • Peacefully Protected: Stopping Cyber Breaches with Defense-in-depth
    Peacefully Protected: Stopping Cyber Breaches with Defense-in-depth Larry Walsh, CEO and Chief Analyst at 2112 Group Jul 12 2017 6:00 pm UTC 60 mins
    WannaCry may be behind us, but you still have to be mindful of new ransomware threats just over the horizon. That means taking steps today to ensure your data is protected from devastating disruptions tomorrow.

    This webinar will feature defense-in-depth strategies that can help keep your business safe from cyber breaches. You’ll also learn why cloud-based backup services are a central presence in any strong cybercrime defense plan.

    Join us, and find peace in a multilayered approach to data defense.

    About the presenter:

    Larry Walsh is one of the most recognizable figures in the IT channel and security communities, and is considered one of the more forward-thinking leaders in the industry. A seasoned journalist, analyst, author, and industry commentator, Walsh is also the founder of Channelnomics, which is a leading provider of IT channel news and analysis. A specialist in the development and execution of channel programs, disruptive sales models, and growth strategies for companies of all sizes, from start-ups to Fortune 500 organizations, Walsh has worked with a roster of diverse technology players, including Ingram Micro, Intel Security, SAP, and Verizon.
  • A Head-to-Head Comparison of the Top-rated Products in HCI & SDS
    A Head-to-Head Comparison of the Top-rated Products in HCI & SDS Alfons Michels - Senior Product Marketing Manager, Sushant Rao - Senior Director, Product Marketing Jul 12 2017 6:00 pm UTC 60 mins
    When you are trying to consolidate, simplify and automate your IT infrastructure, both Hyper-converged Infrastructure (HCI) and Software-defined Storage (SDS) promise to deliver the results you expect. For this reason, analysts predict HCI and SDS to grow rapidly compared to legacy architectures.

    But, with all the vendors and products in the HCI and SDS areas, how do you pick the “right” ones to evaluate? Too often, you have to rely on one-sided information from the vendors themselves.

    Join us as we evaluate the top products in the HCI and SDS categories using analysis from an unbiased, independent organization. In this webinar, we will cover the:
    - Criteria to evaluate these products
    - Pros and cons of different vendors’ products
  • Ready for the cloud? Prepare your network.
    Ready for the cloud? Prepare your network. Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Jul 13 2017 5:00 pm UTC 60 mins
    Is your network secure? Cloud-ready? As fast as it can be? Before you push “the next big thing” as part of your digital transformation, make sure you have a strong network foundation. Learn more in this webinar.
  • Where is the All-Flash Data Center?
    Where is the All-Flash Data Center? Storage Switzerland, Tegile Systems Jul 13 2017 5:00 pm UTC 60 mins
    Find it With Multi-tiered Flash!
    The all-flash data center was to solve all our problems. We’ve had all-flash arrays for ½ a decade. Where are the all-flash data centers? The problem is that performance and cost have been opposing forces in data storage systems for decades, especially in the initial all-flash era. Recent advancements in flash technology are finally breaking this tension and are enabling a new class of applications while driving costs down dramatically.
  • State of encrypted traffic – there’s a gap in your cyber-defense
    State of encrypted traffic – there’s a gap in your cyber-defense Ken Dang Jul 18 2017 6:00 pm UTC 60 mins
    Hackers have expanded their craft to use SSL traffic as a means to obfuscate their attacks and rasomware download. Using Transport Layer Security (TLS) or Secure Sockets Layer (SSL) encryption, attackers now cipher malicious payloads and command and control communication to evade your cyber defense.

    Attend this live webcast to:
    •Have an understanding of how adversaries are using encryption against us.
    •Be aware of the common attacks that leverage SSL/TLS traffic to evade detection
    •Be prepare for the key challenges when inspecting SSL Traffic
  • 5 Best Practices for Governing Your Content in the Cloud
    5 Best Practices for Governing Your Content in the Cloud Paul Falor, CIO & VP of Strategic Alliances, North Highland Company & Josh Rosenberg, Sr. PMM, Information Governance, Box Jul 19 2017 6:00 pm UTC 60 mins
    The way we work as an organization is no longer changing.  It has already changed.  People access content from all kinds of devices, across different locations.  Business content is being created and viewed both inside and outside of your organization.  But how do you effectively protect the way it's shared and managed while meeting your compliance needs?  Especially as every business is under increasing scrutiny in the face of new regulations, like GDPR, and constantly evolving security threats. 
     
    Join Paul Falor, Chief Information Officer & Head of Strategic Alliances, North Highland and Josh Rosenberg, Sr. PMM Information Governance, Box to see how your organization can effectively govern content while keeping its people productive.  
     
    Learn about:
    ·  Key considerations for a cloud-first data governance strategy
    ·  Leveraging the big 3 of Information Governance (Retention, Defensible Discovery, and Security Classification) to reduce business risk
    ·  How to use SaaS technology to empower your users while effectively governing their content
  • Multi-cloud is the new normal and hybrid cloud is inevitable.
    Multi-cloud is the new normal and hybrid cloud is inevitable. Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Jul 20 2017 5:00 pm UTC 60 mins
    As you’re developing your cloud strategy, two trends have risen to the top of enterprise data access and management. 1) Multi-cloud is the new normal because no one wants to be locked into one vendor and 2) hybrid cloud transformation is tough, messy and entirely necessary. In this webinar, we’ll discuss these trends are well as others you should be thinking about for cloud transformation.
  • The Showdown for Data Preservation: Iron Mountain vs. The Cloud
    The Showdown for Data Preservation: Iron Mountain vs. The Cloud Storage Switzerland, CloudLanes Jul 26 2017 5:00 pm UTC 60 mins
    Join Storage Switzerland and CloudLanes for our live webinar as we compare Iron Mountain to the cloud and provide ways to solve the gaps in public cloud storage's ability to be a viable data preservation service. Pre-register today and receive our new eBook "Using the Cloud for Long Term Data Preservation" in advance of the webinar.
  • The traditional data center is dead: How to win with hybrid DR
    The traditional data center is dead: How to win with hybrid DR Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Jul 27 2017 5:00 pm UTC 60 mins
    Today, with hybrid cloud, collocation sites and managed service options, you can build a robust disaster recovery environment without physically building data centers. Saving money and time. In this webinar you’ll hear best practices to leverage new technologies for an optimal hybrid DR solution.
  • NIST 800-171 Protect CUI or Risk Losing Federal Business
    NIST 800-171 Protect CUI or Risk Losing Federal Business Charles Russell Jul 31 2017 5:00 pm UTC 60 mins
    Federal contractors that process, store or transmit what’s called Controlled Unclassified Information have until December to implement new, more stringent security guidelines to protect that information. Chances are your organization already meets some of the requirements, but it’s unlikely that you meet them all. Join us to identify what’s new, what’s not, what you have to do and how to assess the impact.
  • Utilizing ISO31000 to Map Risk Across the Enterprise
    Utilizing ISO31000 to Map Risk Across the Enterprise Informed Risk Decisions, Riskonnect Aug 8 2017 5:00 pm UTC 60 mins
    The global financial crisis in 2008 demonstrated the importance of adequate risk management. Since that time, new risk management standards have been published, including the international standard, ISO 31000 ‘Risk management – Principles and guidelines’.

    The ISO 31000 Risk Management Standard provides guidance for the framework of risk management applicable for organizations of any size. ISO 31000 defines a risk management framework as a 'set of components that provide the foundations and organizational arrangements for designing, implementing, monitoring, reviewing and continually improving risk management throughout the organization. On this webinar our panel of experts will discuss ISO 31000 and how your organization can utilize the standard to implementing a structured approach to enterprise risk management, and map risk across the organization.

    Key Points to be discussed:

    - The principles and processes of risk management
    - The requirements of ISO 31000
    - Practical guidance on designing a suitable framework
    - Practical advice on implementing enterprise risk management
  • A Tactical Guide to Reducing Your Data Breach Risk
    A Tactical Guide to Reducing Your Data Breach Risk HPE Security - Data Security, MetricStream Aug 29 2017 5:00 pm UTC 60 mins
    Over 90% of the world’s data has been generated in the last few years. Accompanying this rapid growth in data comes exponential risks, as witnessed by the spike in cyber attacks of which no organization seems immune. The financial rewards gained by the perpetuators of cyber attacks is blatant, and this is driving continued attacks on companies containing massive amounts of consumer data. For these companies securing data is only half the battle. The risks can be greater when data is transmitted externally, hence it is critical that organizations know where sensitive data is going, how it is being transmitted, and how it is being handled and stored.

    On this webinar our panel of experts will discuss some of the best practices organizations can consider to reduce the risk of suffering from a data breach, and to proactively prepare for any subsequent breach that could happen.
  • A Data Security Survival Guide in an Interconnected World
    A Data Security Survival Guide in an Interconnected World Moderated by Dr Branden Williams with HPE Security - Data Security and Panelists Oct 25 2017 5:00 pm UTC 60 mins
    As the number of internet-connected devices skyrockets into the billions, a data security strategy is an increasingly important part of any organization’s ability to manage and protect critical information. Enterprises are migrating to the cloud in droves, however, protecting data in the cloud remains a challenge as employees push to access cloud apps from any device, anywhere. In the last year alone, 1 in 3 organizations were hacked more than 5 times, and with the increased number of attacks the financial cost of security incidents is also rising.

    In many cases, breaches are caused by a combination of benevolent insiders, targeted attacks, and malicious insiders. For example, targeted attacks are often enabled inadvertently by well-meaning insiders who fail to comply with data or security policies, which can lead to a data breach. In this webinar, our panel will discuss major trends impacting cyber security – from the rising frequency of attacks and types of threats that organizations should be concerned about the most, and they will adress the risks, priorities, and capabilities that are top of mind for enterprises as they migrate to the cloud.