The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
Users expectations of IT's ability to return mission critical applications to production are higher than ever. These expectations are leading IT to abandon many of their backup and recovery solutions to try new, unproven solutions that may or may not solve the problem. In either case, the organization wasted its investment in the first solution for the unknown potential of a new solution. User expectations are certain to get higher, so this cycle will likely repeat itself. IT needs a new strategy, one that will meet the current expectations of users and pave the way for true organizational resilience.
End-to-end encryption is important and offers a base level of security but if the EFSS vendor owns your keys then you may not have the protection you might think. In this StorageShort, Storage Switzerland and Ctera discuss the importance of key ownership as part of the encryption process.
With over 13 years of front-line experience dealing with advanced threat actors from around the globe, our Mandiant team know how the bad guys think and can help you win the battle against cyber attackers.
In this webinar, Stuart Davis and David Grout will cover:
- Best practices in regards to Security as a Service
- How organisations can move from an alert-led security to an intelligence-led security
- How FireEye can provide the adequate tools, processes and expertise required to build a next generation security program
With 5G rapidly climbing the hype cycle toward the peak of inflated expectations, many organizations are asking the same question: “Where does 5G stand today, and how long before it can help my business?”
Carriers in the U.S. are not only talking about it, but claiming their trials are ongoing and deployments are coming soon — in many cases, years earlier than had been thought possible. In reality, 5G has a limited, powerful use case today, but can reach its exceptional potential within the next couple years.
At 11am PT / 2pm ET on April 26, 2017, join Cradlepoint’s David Rush and Ken Rehbehn of 451 Research to explore the 5G reality today and how 5G can help people and businesses in 2018 and beyond.
Cradlepoint is the global leader in cloud-based network solutions for connecting people, places, and things over wired and wireless broadband.
Many of us responsible for large scale OLTP systems confront two clashing phenomena:
•Data comes at us at increasingly higher rates (from an expanding number of sources)
•The time required to process and analyze those inputs is rapidly shrinking.
Blame it on the Internet of Things (IoT)!
Instinctively, we respond with two approaches. First, we search for hardware and software that speed up the process.
Then, we try breaking up the problem into smaller parallel efforts.
In this webinar you will learn to:
•Look for choke points that get in the way of executing concurrent transactions
(Hint: they hide where you don’t suspect)
•Recognize the consequences those choke points have on competing workloads
•Apply DataCore™ Parallel I/O technology to solve these barriers
4 steps for more affordable, effective disaster recovery. Disaster Recovery is an expensive proposition. But since the consequences of not being prepared for a disaster are so severe, it is an expense that organizations make. But that's not to say organizations are not always looking for way to do DR better, faster and for less money. In this live webinar join Storage Switzerland and ClearSky to learn how organizations can lower the cost of DR preparation and execution.
The GDPR will apply in all EU member states in May 2018, organizations and businesses that are data owners and/or dealing with data belonging to EU citizens have the responsibility to ensure their processing abides by new data protection law and processors must themselves abide by rules to maintain records of their processing activities. If organizations and businesses are involved in a data breach, they are far more liable under GDPR than they were under the Data Protection Act.
Complying with the new regulations requires operating to high standards of data security and protection. If suffering a data breach that puts the rights and freedoms of individuals at risk, organizations must notify the people affected and the data protection authority (Information Commissioner's Office (ICO) in the UK) within 72 hours of becoming aware of it. Data breaches occur every day - and the EU have just increased the financial liability and consequences of inadequate security.
Hear from Mike Fowler, author of the popular white paper: Automation as a Force Multiplier in Cyber Incident Response. Mike will provide insight into how best to leverage automation to provide incident response and reporting consistency for GDPR.
Steve Ditmore will present IncMan™ – Security Automation and Orchestration features covering:
•Installation and set-up is measured in hours rather than days or weeks without the need for expensive professional services support.
•Review steps involved in a mitigating and controlling a data breach.
•Automation of menial enrichment activities, so incident responders can determine/contain and mitigate breaches more efficiently and effectively.
•Enhanced visibility creating a layered approach to information gathering.
•Incident management including response prioritization.
•How incident and notification workflows are automatically assigned to an incident.
The go-to choice for IT pros to secure their data was Windows-based backup. But with all the malware and ransomware designed to attack Windows, many are trusting their backups to a hardened, purpose-built Linux appliance. Are you?
Unitrends increases uptime and confidence in a world in which IT professionals must do more with less. Unitrends leverages high-availability hardware and software engineering, cloud economics, enterprise power with consumer-grade design, and customer-obsessed support to natively provide all-in-one enterprise backup and continuity. The result is a “one throat to choke” set of offerings that allow our customers to focus on their business rather than backup.
Learn more at www.unitrends.com; follow us on Twitter @Unitrends
Automation systems bring a great deal of value. Having the ability to produce better, faster, and more reliable results can go a long way in improving business agility and simplifying day-to-day tasks. Firewall automation also helps tighten security posture and ensure continuous compliance with internal policies and industry regulations.
Tufin presents the recommended steps to start your journey towards firewall automation. Join us for the first webinar of the series, focusing on rule decommissioning, to learn how you can initiate an immediate and substantial impact on your organization.
The first step to the cloud, for most organizations, is backup. This use case leverages cloud storage but totally ignores something that cloud providers are better at delivering – cloud compute. Join Storage Switzerland and Zerto as we discuss the best next step for hybrid cloud. Leveraging the cloud to create a next generation disaster recovery site.
Enterprises are undergoing a revolution in their infrastructure as the application world is being transformed by cloud technologies. Today your applications can be located in the data center, through IaaS, or in a SaaS cloud. Similarly, users are transforming with mobility; no longer are they tied to one location. Enterprises want to solve the problem of connecting users to their applications in a consistent and secure manner.
The overarching issue is the connectivity between these two worlds as we're stuck in two-decades old technology. Enterprises are therefore challenged with the requirement to transform their infrastructure while integrating underlying legacy technologies, and for the user to access their applications while maintaining policy and security framework.
Join our CEO as he discusses how IT infrastructure is being transformed during the era of cloud technologies, and how Enterprises across a number of industries can embrace the network revolution.
Have you made the jump to all-flash storage? Are you planning to? If so this webinar is for you. We will look at what's next after (or before) the jump to all-flash. An all-flash array brings many benefits to the environment, but it also either exposes weaknesses or raises expectations in IT's ability to consistently deliver performance to applications, to protect the data those applications create and to ensure the organization can rapidly recover from almost any disaster.
In the Media and Entertainment industry, organizations that can store and access all digital video at every step in the production process have a significant competitive advantage which can result in new revenue streams. In this webinar, Richie Murray, President and Founder of Bridge Digital (a solutions integrator specializing in helping M&E companies create, distribute and monetize their video assets more efficiently), and Tony Barbagallo, VP of Product for Caringo (a massively scalable storage, delivery and management platform designed specifically for content), will discuss how to leverage secure secondary storage without disruption to existing digital video workflows. Topics covered include:
- Definition of “secure secondary storage” and how current offerings differ from traditional archive solutions
- How secondary storage can help optimize pre-edit, edit and post processes
- How to seamlessly plug secure secondary storage into video workflows
- A demo on optimizing Avid shared storage with Marquis Project Parking through automated transfer to/from the Caringo platform
When most organizations consider an archiving project their primary goal is to save money. Basically they are looking to move data off of expensive storage valued at a couple dollars per GB to secondary storage valued at pennies a GB. They are counting on the 80/20 rule to save them money, where 80 percent of what an organization stores has not been accessed in the last nine months. Moving that 80% to less expensive storage will save them money. What most organizations that successfully implement a data management strategy actually find that the per GB cost savings is the most trivial part of the equation. In this ChalkTalk video, Storage Switzerland and NTP Software discuss the other more important reasons to archive data.
Our security experts will take you through WAF setup for policy and exceptions, profile review, and plugin rules to get the most of your WAF investment. They will cover 3 core topics of tuning a WAF:
-Alert exception for false positive reduction
-Profile maintenance for accuracy and efficiency (UBA)
-Plugins for Dynamic Applications and Profile Tuning
In this webinar, join Rhonda Ascierto of 451 and Aaron Peterson with RunSmart OS in a presentation on what is next for infrastructure management software. Far beyond just collecting data, monitoring and alarming, the session will address the efficiency and other added benefits automated control can bring when implemented. Case studies will be presented to highlight examples of recapturing underutilized assets and dynamic application provisioning taking advantage of the cloud.
Vulnerabilities exist in all applications—and today’s sophisticated attackers will find them. Every day an exploit remains unpatched, your risk of a data breach increases dramatically. Only a multi-layered approach that fully integrates with your IT defense stands a chance of stopping them, but where to begin?
By registering, you’ll gain valuable insights into:
Which techniques effectively block zero-day attacks.
Why robust endpoint protection plays such a critical component.
How Symantec Endpoint Protection 14’s Memory Exploit Mitigation shuts down vulnerability attacks, even against unknown threats.
BrightTALK caught up with Twistlock's CEO Ben Bernstein for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- Trends in the cyber threat landscape
- What companies can be doing to better improve their security posture
- 2016's biggest breaches (including Yahoo) and why they happened
- Preparations to take in advance of GDPR in May 2018
- Cyber security in the financial sector
- AI & Machine learning and the influence it'll have on the security industry
About the Speaker:
Ben Bernstein co-founded Twistlock, Inc. in 2015, and serves as its Chief Executive Officer. Ben has 14+ years of experience in enterprise security and operating systems. He is a Microsoft veteran with extensive experiences in both software development and product management. Ben is a veteran of the Israeli Intelligence Corps. He has a B.A cum laude in Computer Science from the Technion in Israel and an MBA with a scholarship of excellence from the Interdisciplinary Center in Israel. Ben hates writing about himself in third body.
Want to know what’s new in Symantec’s latest release of IT Management Suite version 8.1? Join us as we discuss the exciting new features such as Windows 10 and Office 365 Patch Management, Mac OS Profile Management, Symantec Endpoint Protection and Compliance integration and many more, all of which have been introduced in this latest launch.
Join our webinar “What’s New in Symantec IT Management Suite 8.1?” to learn about:
• How Symantec IT Management Suite will simplify and help keep Windows 10 and Office 365 up to date
• Dealing with Windows 10 cumulative updates
• Handle large updates in bandwidth constrained environments
• Support for AWS Marketplace, Mac application metering and profile management
• Integration with your existing Symantec Endpoint Protection & Control Compliance Suite
• Enhanced support for Ghost Solution Suite
• Network discovery support via Simple Network Management Protocol v3
• Off-box data migration and much more
We look forward to having you for this live session.
Join Storage Switzerland, Red Hat and leaders from the Docker industry for a round-table discussion on developing the right storage strategies to successfully deploy and manage Docker both in your environment and in the cloud. There are a group of vendors trying to make the storage architectures that support Docker easier to use, more enterprise class and able to provide data persistence. Storage Switzerland will moderate a roundtable discussion on Storage, Docker and how to build enterprise class environments that support legacy applications. We will cover areas like who should be using Docker, can legacy data centers participate, what are the storage challenges with a containerized environment and what are the issues with moving containers from on-premises to the cloud?
Cloud migration and hybrid cloud with no downtime and no disruption:
If business-critical applications with continually changing data are really moving to the cloud, the typical lift and shift approach of copying your data onto an appliance and shipping it back to the cloud vendor to load onto their storage days later, isn’t going to work. Nor will the one-way batch replication solutions that can’t maintain consistency between on-premises and cloud storage. Join us as we discuss how to migrate to the cloud without production downtime and post-migration deploy a true hybrid cloud, elastic data center solution that turns the cloud into a real-time extension of your on-premises environment. These capabilities enable a host of use cases, including using the cloud for offsite disaster recovery with no downtime and no data loss.
Organizations managing data have a competitive advantage over organizations that don't. But most organizations don't have the time or tools available to implement a successful data management strategy. It’s not for a lack of trying. Many organizations fight a losing battle when trying to implement a data management solution. In this webinar Storage Switzerland and Dternity/StrongBox Data Solutions will discuss the three reasons why organizations are losing the data management battle, and provide guidance on how to start winning the battle.
BrightTALK caught up with Mocana's Bill Diotte for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- The difference between securing IoT networks than tradition enterprise IT networks
- The role of government regulation in IoT security
- The 'mission critical' elements that need protecting in IoT networks
- The threat actors and motives targeting IoT networks
- The role of cyber warfare in global geo-politics
About the Speaker:
William (Bill) Diotte is a technology entrepreneur, CEO and Board Member with over 20 years of experience in working with tech-driven companies from startup stage to Fortune 500. Prior to joining Mocana as Chief Executive, he was the co-founder and CEO of software defined networking pioneer BroadHop Inc., acquired by Cisco. Starting off his career as a manufacturing engineer, he became an executive and managing director with both Gemini and SRI Consulting serving high tech companies in the software and telecom markets. Bill has also served as a Board Member to LiveAction, Inc., and is an investor and advisor to several companies in the software infrastructure and security space.
This is the first in a series of product demos focused on addressing specific requirements of the General Data Protection Regulation (GDPR). In this demo, we demonstrate how to use our data security portfolio to find and categorize your data for GDPR compliance.
In this webinar we’ll provide:
o An overview of General Data Protection Regulation (GDPR)
o Who does it impact?
o What are the data protection principles
o What are the primary data security requirements
o An insight into Imperva’s data protection portfolio and a demo of its discover and classification capabilities
Lenovo and DataCore have collaborated to create a Software-defined Storage (SDS) appliance. This validated, turnkey appliance provides easy scalability and single pane management at a fraction of the cost of legacy systems—without trade-offs in availability, reliability or functionality.
Join this webinar to learn more about the Lenovo Storage DX8200D Powered by DataCore.
We think differently. We innovate through software and challenge the IT status quo.
We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.
DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.
Join this webinar to meet DataCore, learn about what we do and how we can help your business.
Many of our customers sought out Cylance because it is highly effective in preventing ransomware attacks. We have learned firsthand how ransomware is affecting organizations of all sizes, and across all industries. In this live demonstration, Brian Robison, Senior Director, Technical Marketing at Cylance® will show how ransomware works. He will launch several attacks on unprotected machines to deliver a real-world view into how ransomware compromises systems, and how Cylance prevents ransomware attacks.
Brian will provide a live demonstration of CylancePROTECT® blocking attacks, and will discuss:
•Different ransomware types
•Delivery methods, including drive-by downloads and fileless malware
•Why launching attacks is cheap and easy with ransomware-as-a service
•How Cylance prevents both file-level and disk-level encryption
Cyberkriminelle entwickeln ihre Taktiken, Techniken und Prozesse stets weiter und sind dabei häufig schneller als die Sicherheitsteams. Die Angreifer sind bestens organisiert und ihre Methoden werden von Jahr zu Jahr raffinierter – 2016 war da keine Ausnahme.
In diesem Live-Webinar stellt Sven Schriewer, Director, FireEye, die Beobachtungen und Schlussfolgerungen der Experten von Mandiant aus der Untersuchung einiger der schwerwiegendsten Cyberangriffe und Sicherheitsverletzungen des vergangenen Jahres vor.
Melden Sie sich noch heute an, um sich über die folgenden Themen zu informieren:
•Neue Trends bei Phishing-Angriffen auf Unternehmen
•Neue Entwicklungen in der Angriffstelemetrie und -methodologie
•Datengestützter Überblick über neue Bedrohungen weltweit
•Moderne Abwehrstrategien zum besseren Schutz von Unternehmen und Institutionen
•Auswirkungen der Datenschutz-Grundverordnung auf Unternehmen in EMEA
•Trends in EMEA, Nordamerika und APAC im Vergleich
Neben den Untersuchungsergebnissen in der Regionen EMEA mit Schwerpunkt auf Deutschland, Österreich und Schweiz, enthalten Sie in diesem Webinar auch Informationen wie Sie eine proaktive Strategie zur Stärkung Ihrer Sicherheitsinfrastruktur entwickeln.
Choosing the right cloud provider, that meets your requirements at the right price can be a daunting task. We’ve seen too many make the wrong choices. In this webinar, we will guide you through the things to think about when executing a cloud strategy and how to avoid the pitfalls. Is there a better way to do things? We think so.
Some things you'll learn in this webinar:
Not all clouds are created equal. How to choose the best cloud(s) for your companies needs
How to estimate your bandwidth
How to avoid sticker shock and leverage the best value
As any business unfortunate enough to have suffered a data breach can attest, in a crisis situation, being organised enough to provide a detailed notification to affected customers (or indeed regulators) is a difficult task on its own. When combined with required incident response processes – identifying the cause, closing the vulnerability, all while determining the extent of the damage, it becomes all the more difficult. Furthermore, GDPR means data breaches will need to be reported within 72 hours – how will you manage the fallout?
In this webinar we discuss the risks, challenges and answers surrounding response-readiness and the importance of having a critical communications strategy in place.
Stuart McKenzie | VP, Mandiant Consulting
Dan Wire | Sr. Director, Marcom
Learn how to conquer and manage the PCI process. Businesses are challenged with attempting to continuously monitor their PCI environment, responding when something changes and managing all the information to gather evidence and generate the report on compliance (ROC) or attestation on compliance (AOC). Verterim is providing a 3 part, educational PCI series to address some of these business challenges and provide our tips on how you can take advantage of technology you may already have in house. The first 30 minute BrightTalk will look at the PCI process at a higher level and provide a view into a standard RSA Archer use case to help solve the problem. Join our GRC practitioners, Jennifer Pesci-Anderson, National Practice Lead and Jeff Avery, Engineer on May 11 from 12-12:30 to see how you can address your PCI business challenges.
Are you confident in your IT recovery program? In today’s hybrid IT environment, interconnected, mission-critical applications run across diverse platforms and geographies. The manual disaster recovery process traditionally followed, requires huge time, resource and efforts to scale up DR management for all critical IT assets. This leads to critical IT resources being excluded from DR programs. As per a recent survey, IBM found that 78% of enterprises face unacceptable risk for core enterprise IT resources.
With growing threat of cyber breaches, assured resiliency to support business objectives requires a new approach, including constant, intelligent monitoring and proactive action to achieve DR SLAs.
In this webinar you will learn how resiliency orchestration is transforming resiliency, explore the complexity of hybrid environments and the roadblocks behind DR and business continuity, and understand the benefits of Resiliency Orchestration and how it can enhance confidence in your cyber resilience program
The EU General Data Protection Regulation (GDPR) comes into effect on 25 May 2018, and will significantly reshape the data protection landscape for organisations that collect and process the data of European residents. Therefore businesses will need to take responsibility for the way they collect and process personal data and will have to take immediate action to align their business systems with the requirements of the GDPR.
This webinar session will cover:
•An overview of the General Data Protection Regulation (GDPR).
•The impact GDPR creates on businesses and the transition timelines.
•The first steps in preparing for GDPR compliance.
•The technical and organisational measures your business will need to adopt to comply with the Regulation.
•Key recommendations and best-practices to achieve and manage GDPR compliance.
Threat-based testing, accurately simulating criminal attacks, is a critical approach in securing FinTech. Attackers constantly evolve their attack methods and strategies in response to changing technologies, making it essential that security tests match the threat landscape.
This session will focus on how organisations can build senior executive level readiness to respond and recover from sophisticated cyber incidents. It will provide an overview of the threat landscape and consider the differences cyber crises present for senior executives. Participants will learn about some of the challenges faced when responding to a cyber incident and how to overcome them by building readiness in people, structures, processes and plans.
The greatest threat to the corporate security perimeter now comes not from the outside, but the inside. Social engineering threats such as phishing, malware and ransomware target the weakest link, the human factor. This webinar will expose the techniques of the hackers and offer advice on how these can be combatted to make your business more resilient in the face of the cyber threat.
The coming into effect of New York's cybersecurity compliance requirements for banks, insurance companies and their third party service providers on March 1, 2017 marked a major development in the cyber risk regulatory environment. While the impact of these rules is far from certain, the lessons in managing risk are universal. UpGuard's Elias Okwara, CIPP/E, CIPP/US, will discuss practical steps for compliance and the implications amid rapidly changing cyber threats.
In this webinar you will learn:
- What do the New York Department of Financial Services (DFS) cybersecurity regulations mean for financial institutions
- Practical steps for compliance
- Implications of the regulation amid rapidly changing cyber threats
Today’s digitised value chains have a very high dependency on third parties. This exposure is not lost on potential attackers, who will invest resources in researching, identifying and selecting targets among value chain partners. It would be an uneven contest were firms not to take steps to understand these vulnerabilities and ‘value at risk’ themselves. This webinar will set out clear steps that can be taken to understand potential vulnerabilities among third parties and will introduce a lifecycle approach to support robust third party risk management from the start of the relationship through to exit.
Take your mark. Get set… and go. What do you do if your organization is faced with a crisis, do you have the necessary steps and procedures to recover from a cyber attack?
91% of APT (Advanced Persistent Threats) begin with spear phishing emails. Cyber criminals increasingly target employees within an organization who have administrative rights and access to critical systems. Successfully phishing these individuals could give them the ‘key’ to breaching security in further attacks.
This webinar will cover five domains to assist the organization to maintain a framework with the ability to deliver the outcomes consistently at all times. These domains focus on preventative, detective and reactive controls within the organization, and form part of the process of having the ability to recover in the event of a crisis.
These five domains will follow the process of identifying, protecting, detecting, responding and recovering, giving a holistic view of the full cycle of infrastructure resilience.
Business continuity planning has long helped organisations prepare for, respond to and recover from all types of disruption. Sophisticated and enduring cyber incidents, however, can challenge the planning assumptions many organisations rely on, including recovery time and recovery point objectives. This session will look at how organisations can go beyond traditional business continuity planning to enhance cyber incident readiness.
There is a growing demand for organizations to extend their operations out of a secure, controlled domain into an unpredictable ecosystem, for reasons such as cost reduction, increases in productivity, profitability requirements and regulatory pressures, to name a few. This expansion into hybrid environments exposes businesses into unforeseen risks, requiring a more formidable capability relative to the resiliency measures that need to be in place. A strong cyber resiliency framework that includes a combination of security, business continuity and a resilient control system can help to mitigate disruptions of critical business functions and enable confidence across the entire enterprise in the event of a cyber breach.
In this webinar, you will learn tactical approaches for implementing cyber resilience, including evolving industry practices for enhanced cyber resiliency, benefits to be realized beyond mitigation of threats and risk reduction, and technological advancements that support successful cyber resiliency.
With its 25th May 2018 deadline, the General Data Protection Regulations have become the stuff that marketing dreams are made of, but the delivery of appropriate levels of confidentiality, integrity and availability for affected data does not have to mean vast amounts of investment in cutting edge technology and expensive consultancy engagements. In this session we will have a closer look at what the end results of Article 32 (Security of Processing) actually need to look like and address some of the terminology used so that delegates properly understand what the regulation demands from them and their businesses. In the context of business continuity, we will further look into how current strategies match up to GDPR and what can be done to optimise them for May 2018 and beyond.
The first defence against cyber attacks is often to impose technical barriers, but how can an organisation’s culture help mitigate the cyber risk? This session will look at the cultural aspects of security, measuring cyber security culture and suggest how behaviour can make us more resilient.
Cyber threats. Compliance. Ease of use. These are among the growing challenges to resiliency for all organizations, but they often are at odds with another. Clients and their customers are driving a need for ease of use, customization and empowerment, which can result in a more complex, at-risk infrastructure. How can organizations manage risk and compliance - maintaining expected transparency, accountability and interconnectedness amongst all of this complexity?
Join our discussion on the impacts of increased regulatory supervision and the effects of standards, using industry examples - and learn key strategies you can use today to manage resiliency across all levels of the enterprise to protect your business in the age of digitization and IT modernization.
Implementation of the EU General Data Protection Regulation Act (GDPR) is fast approaching. The GDPR’s tough privacy rules and financial penalties are big enough challenges for organizations like yours. But rising email-borne threats like ransomware make compliance even more difficult.
This webinar explores:
- Steps to minimize GDPR risk even in the face of spiraling email-borne attacks
- How the GDPR’s Data Breach Notification requirement changes everything
- Why it’s vital to secure a budget for GDPR compliance and third-party assessment
About the presenters:
Achmad Chadran, Mimecast Archiving Specialist:
Achmad Chadran is an archiving product marketing manager at Mimecast. Prior to joining Mimecast, Achmad held marketing and product management positions at the Intronis MSP Solutions arm of Barracuda Networks, Dell’s Large Enterprise Business Unit, and Siemens. He has a bachelor’s degree from the University of Virginia and a master’s degree from Ohio University.
Enza Iannopollo, Forrester Research Analyst
Enza is an analyst on the Security & Risk team and a Certified Information Privacy Professional (CIPP/E). Her research focuses on the impact of internet regulations and data privacy issues on digital business models, as well as the technologies that underpin them. Her research coverage includes data protection, privacy in the context of cloud computing, analytics, and the internet of things. Enza also helps Security & Risk Professionals build and execute data and privacy protection strategies in line with the requirements of the business technology (BT) agenda.
In today’s global village everyone is connected. The internet has brought billions of people together, allowing sharing of data, communication and commerce at a scale never imagined before. The value of the internet is clear for everyone to see. Unfortunately, the same internet also allows for cyber hackers and attackers to fight a new war, Cyber terrorism, theft of data and extortion. The attackers hide in plain sight. Working from homes or offices. Sometimes alone, often in syndicates. Even state sponsored cyber terrorism is on the increase.
Large cyber security companies such as firewall providers and anti-virus vendors are spending millions of US dollars in a constant battle to stay ahead of the cyber threat. Unfortunately, these measures are not always successful in preventing cyber-attacks from occurring as can be seen from recent attack against Primera Blue Cross.
The company, a health insurer based in Washington State, said up to 11 million customers could have been affected by a cyber attack last year. Hackers gained access to its computers on 5 May 2016 and the breach was not discovered until 29 Jan 2017. The breach probably exposed members' names, dates of birth, Social Security numbers, mailing and email addresses, phone numbers and bank account information. The company is currently working with the FBI and a cyber security firm to investigate.
So, given that no matter what you do to protect yourself against the cyber threat, you will probably be attacked or have already been attacked. You therefore need a plan B to allow your business to continue with crucial day-to-day activities after the event.