Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • GDPR Introduction
    GDPR Introduction Manish Walia and Munaf Razzak Recorded: Dec 16 2017 55 mins
    The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU). The session is an introduction to what are some of the key regulations that are being introduced.
  • Let's talk about OSSTMM with Pete Herzog from inside out
    Let's talk about OSSTMM with Pete Herzog from inside out Pete Herzog, Managing Director at ISECOM Recorded: Dec 14 2017 60 mins
    In early 2000, the Open Source Security Testing Methodology Manual (OSSTMM) was released with the primary objective of improving how the enterprise conducted security testing. Key sections of this methodology include operational, human, physical, wireless, telecommunication, and data network security testing. Today, OSSTMM is widely regarded as a methodology for penetration testing world-wide, offering a standard approach to conducting security testing. Frank Shirmo of ITPG Secure Compliance, a Cyber Security Boutique in Northern Virginia will be joined by Pete Herzog, the creator of OSSTMM, to answer key questions, and provide clarifications on OSSTMM for CTOs, CISOs, CIOs, Security Engineers and Analysts, and all other stakeholders interested in the topic of security testing.
  • 5 Ways to Eliminate Secondary Storage Forever
    5 Ways to Eliminate Secondary Storage Forever Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Recorded: Dec 14 2017 49 mins
    Today’s storage market is fragmented, with organizations working with multiple vendors for primary storage, backup and DR; it’s common for enterprises to manage six to eight vendors for backup alone. With pressure on IT to go hybrid, consolidate data centers and cut costs, enterprises must find significant opportunities to cut costs and improve their IT operations.

    By reducing IT footprints and eliminating redundancy, ClearSky Data customers realize greater than 50 percent total cost of ownership (TCO) savings. ClearSky Data solves the enterprise storage problem by integrating primary, backup and DR capabilities in one service, dramatically reducing data center footprints, management complexity, and costs.

    Tune in on December 14th and see how you can eliminate secondary storage, simplify your infrastructure and move to the cloud today.
  • 2018 GRC Predictions
    2018 GRC Predictions Tom Garrubba, Santa Fe Group; David Grazer, Tevora; Peter Tessin, Discover Financial Services; Christina Whiting, Tevora Recorded: Dec 14 2017 60 mins
    “It was the best of times, it was the worst of times,” wrote Dickens. 2017 has been a tumultuous year for governance, risk management, and compliance (GRC). 2018 could be just as stormy with cybersecurity, GDPR, and new risks caused by the shift to digital business. In this webinar, our panel of industry experts will recap the year’s highlights and offer their thoughts on what to expect in 2018.

    Discussion topics include:

    • Ramifications of major data breaches in 2017
    • The continuing shift in risk perspective from department to enterprise
    • Navigating third-party risk management on the road ahead
    • The role and influence of the board in 2018
    • GDPR and the trend toward data privacy and security

    Plan now to attend this special webinar on 2017 trends and 2018 predictions for GRC.
  • Part 1: Data Discovery and Classification for the GDPR
    Part 1: Data Discovery and Classification for the GDPR Cheryl Tang - Product Marketing, Imperva .; Mark Pelkoski - Principal SE, Imperva Recorded: Dec 14 2017 28 mins
    This is the first in a series of product demos focused on addressing specific requirements of the General Data Protection Regulation (GDPR). In this demo, we demonstrate how to use our data security portfolio to find and categorize your data for GDPR compliance.

    In this webinar we’ll provide:

    - An overview of General Data Protection Regulation (GDPR)
    - Who does it impact?
    - What are the data protection principles
    - What are the primary data security requirements
    - An insight into Imperva’s data protection portfolio and a demo of its discover and classification capabilities
  • GDPR - Inside a Data Breach
    GDPR - Inside a Data Breach Patrick McGrath, Director of Solutions Marketing, Commvault Recorded: Dec 14 2017 50 mins
    Many headlines for the General Data Protection Regulation (GDPR) mention the eye-watering fines for a data breach, but what happens when you realize you have actually been the victim of one? How hard will it really be to comply with a 72-hour breach notification? In this session, an insider will describe the data breaches, the approaches used to manage these incidents, key lessons learned and considerations for handling data breaches in a world with GDPR expectations.
  • Cyber Security Predictions: What is in store for the EMEA region
    Cyber Security Predictions: What is in store for the EMEA region Jens Monrad, Senior Intelligence Account Analyst, FireEye iSIGHT Intelligence Recorded: Dec 14 2017 37 mins
    2017 was an eventful year in cyberspace, especially in Europe and the surrounding areas. We saw politically motivated industrial espionage attacks, changes in cyber legislation, a constantly adapting criminal ecosystem targeting various industries throughout the region – and that’s not even the half of it.

    Join us for our webinar on Dec. 14, 11am GMT, as Jens Monrad, Senior Intelligence Account Analyst with FireEye, discusses various aspects about the cyber threat landscape in the EMEA region in 2018, including:

    •Continued political tension in the region
    •Upcoming elections
    •Mixed security maturity
    •The effect of new compliance and data protection laws

    Register today to learn what lies ahead, and stay one step ahead of cyber security threats.
  • Defense Against a Ransomware Attack: Latest Research and Best Practices
    Defense Against a Ransomware Attack: Latest Research and Best Practices Kevin Haley, Director of Security Response, Symantec and Matt Sherman, Malware Outbreak Specialist, Symantec Recorded: Dec 12 2017 61 mins
    On May 12 2017, a new variant of the WannaCry ransomware (Ransom.Wannacry) suddenly appeared, infecting thousands of computers worldwide within a matter of hours.

    It was a new and particularly dangerous form of threat because of its ability to self-propagate and spread itself across an organization’s network and on to other organizations via the Internet.

    The ransomware landscape has shifted dramatically in 2017 and organizations bore the brunt of the damage caused by new, self-propagating threats such as WannaCry and Petya. These outbreaks caused global panic and caught many organizations off-guard, with infections spreading rapidly across corporate networks.

    The impact of these incidents will not go unnoticed on the cyber crime underground and it’s likely that other groups may attempt similar tactics. Because of the nature of these attacks, organizations are particularly at risk. Businesses need to educate themselves about this new avenue of attack and ensure they have defenses in place.

    Symantec experts recommend adopting a multilayered approach to minimize chances of infection. This strategy includes protecting against ransomware in three stages:

    1. Prevent – Preventing infection is by far the best outcome so it pays to pay attention to how infection can be prevented.

    2. Contain – In the event of a payload arriving on a computer, a critical step is to limit the spread of the attack.

    3. Respond – Contact Incident Response experts, back up important data, and never pay the ransom.

    Join us for a discussion about the current state of ransomware and learn the strategies and the technologies for effective protection against ransomware and unknown threats.

    Register Today
  • Shift Left: How testing early and often is best for the business and customer
    Shift Left: How testing early and often is best for the business and customer Nancy Gohring 451 Research and Steve Feloney CA Technologies Recorded: Dec 12 2017 50 mins
    Organizations in most any industry are feeling increasing pressure to move fast. But at what cost? Some have learned the hard way that skipping crucial processes, like testing, damages performance and impacts customer sentiments on your brand. In this case, the fast time to market becomes meaningless.

    Smart businesses are adapting to a shift left strategy. These teams are learning how to incorporate testing early and often in the release cycle, supporting business requirements to move fast while ensuring high-performing products and quality. But getting there isn’t easy. In this webinar, we’ll cover:

    •Testing tools: tool choice is important. Not all tools have been designed to support this new paradigm.
    •Integrations: to be effective, testing tools must integrate easily with the tools and processes modern teams use, including CI/CD and APM products. Further, these tools must be very easy to use, specifically for developers.
    •Organizational models: shifting left requires changes to traditional organizations and culture. We’ll share insight into the successful models we’ve seen.
  • CPE Webinar: Critical Actions to Finalize Your GDPR Compliance Program: Part 1
    CPE Webinar: Critical Actions to Finalize Your GDPR Compliance Program: Part 1 Dr. Branden Williams; Chris Covell, Absolute, Jake Olcott, BitSight, Brian Philbrook, OneTrust, and Marshall Toburen, RSA Recorded: Dec 12 2017 71 mins
    Attendees can earn 1 CPE credit on this session.

    The new EU General Data Protection Regulation (GDPR) rule looms and will take affect in May 2018, but only a third of companies are on track to be compliant by the due date. GDPR is the most significant change in data privacy regulation in more than 20 years. It represents an extraordinary shift in the way businesses will be expected to operate when they gather, process, maintain, and protect customer data. Any organization that retains information of EU citizens must be in compliance or face huge fines of up to 4% of worldwide turnover.

    In this webinar series you will hear from industry experts facing the same challenges you face and find out how they're meeting and surpassing critical implementation check points, and you will learn what actions other organisations are taking preparation for data protection – not only for GDPR, but for long-term data protection.
  • Tech Demo: API Security with Imperva SecureSphere
    Tech Demo: API Security with Imperva SecureSphere Natasha Gupta – Product Marketing Manager and Amir Shladovsky – API Security Expert Recorded: Dec 12 2017 38 mins
    APIs have sped up application delivery by enabling software automation and programmability of services, and has become a mainstay practice for any business with workloads on the cloud. As businesses make their APIs publicly available to increase their touchpoints with customers, this introduces new vulnerabilities that exposes applications to malicious users, unauthorized access, and potential attacks. In this webinar, learn how SecureSphere can help monitor and protect API gateways in your network and walk through a brief demonstration on using SecureSphere to combat API-centric attacks.
  • 10 Must-Answer Questions For Your 2018 Data Center Strategy
    10 Must-Answer Questions For Your 2018 Data Center Strategy Matt Stansberry, Senior Director Content & Publications, Uptime Institute Recorded: Dec 12 2017 60 mins
    Are you adapting your infrastructure strategy to business, geopolitical and technology trends?

    Our panel of experts discuss the questions you must have the answers for along with trends that will impact your organization in the coming year.

    How will you adapt your strategic plan to climate change? What are the implications of new regulatory enforcement? How will your staff adapt to changing infrastructure deployment models? Will new workloads overwhelm your infrastructure plans? Change is here, so learn to adapt.
  • Technology Trends Impacting Network Security in 2018
    Technology Trends Impacting Network Security in 2018 Reuven Harrison, Tufin CTO and Joe Schreiber, Tufin Technical Director Recorded: Dec 12 2017 38 mins
    As enterprise networks continue to grow more complex and change before our eyes, and as security threats continue to grow in frequency and sophistication, organizations need to understand the technology trends that will be most prominent in 2018.
    Traditional IT security leaders and cloud architects alike will learn about ways to reduce risk and improve business agility in the coming year. We will discuss:
    •Our predictions for the trends we expect to see in 2018
    •What technology shifts we predict to influence network security
    •How the role of network security policy will affect these trends
  • Threat Hunting: A Proactive Approach to Cybersecurity
    Threat Hunting: A Proactive Approach to Cybersecurity Karl Vogel, Worldwide Solution Architect Recorded: Dec 12 2017 59 mins
    Traditional network security products often only kick in when a threat strikes, allowing you to react quickly and effectively to breaches. But every second that is spent identifying and reacting to a breach is another second that the attacker can make off with sensitive data.

    But why react when you can act? With Symantec Security Analytics, your IT security team will be able to proactively search for hidden threats and potential gaps across your network, endpoint and servers, to identify and remove advance threats before they can launch an attack.

    Key benefits of Symantec Security Analytics:
    • Expose the source and scope of an attack with unrivalled data enrichment and threat intelligence
    • Uncover hidden threats in encrypted traffic when deployed with Symantec SSL Visibility
    • Reduce time to resolution with sophisticated anomaly detection and advanced network forensics

    Empower your network with truly proactive defence. Sign up for our webinar today to learn how Symantec Security Analytics can help you take down threats before they strike.
  • Unprotected Files on a Public Cloud Server: Live Panel on the NSA Data Leak
    Unprotected Files on a Public Cloud Server: Live Panel on the NSA Data Leak Chris Vickery, George Crump, David Linthicum, Charles Goldberg, Mark Carlson Recorded: Dec 8 2017 59 mins
    Public, private and hybrid cloud are nothing new, but protecting sensitive data stored on these servers is still of the utmost concern. The NSA is no exception.

    It recently became publicized that the contents of a highly sensitive hard drive belonging to the NSA (National Security Agency) were compromised. The virtual disk containing the sensitive data came from an Army Intelligence project and was left on a public AWS (Amazon Web Services) storage server, not password-protected.

    This is one of at least 5 other leaks of NSA-related data in recent years. Not to mention the significant number of breaches and hacks we’ve experienced lately, including Yahoo!, Equifax, WannaCry, Petya, and more.

    The culprit in this case? Unprotected storage buckets. They have played a part in multiple other recent exposures, and concern is on the rise. When it comes to storing data on public cloud servers like AWS, Azure, Google Cloud, Rackspace and more, what are the key responsibilities of Storage Architects and Engineers, CIOs and CTOs to avoid these types data leaks?

    Tune in with Chris Vickery, Director of Cyber Risk Research at UpGuard and the one who discovered the leak, along with George Crump, Chief Steward, Storage Switzerland, David Linthicum, Cloud Computing Visionary, Author & Speaker, Charles Goldberg, Sr. Director of Product Marketing, Thales e-Security, and Mark Carlson, Co-Chair, SNIA Technical Council & Cloud Storage Initiative, for a live panel discussion on this ever-important topics.
  • The State of Play of FirstNet
    The State of Play of FirstNet Bill Schrier, Senior Advisor, First Responder Network Authority (FirstNet) Recorded: Dec 8 2017 24 mins
    What's the status of FirstNet's state opt-in benefits and how does the network help support public safety? Also, what are the benefits of connecting first responders to IoT and Smart Cities? These are the question that Bill Schrier will answer on this LIVE PODCAST by NMG Media.
  • Are EMEA organizations behind the curve, developing their Cloud Backup Strategy?
    Are EMEA organizations behind the curve, developing their Cloud Backup Strategy? Phil Maynard, Sr. Director, Technical Sales EMEA; Alex Hilton, CEO, Cloud Industry Forum Recorded: Dec 8 2017 45 mins
    Many organizations within EMEA are beginning to host more of their business-critical applications and data in the Cloud. However, many of these organizations are not fully aware of the risks, so are not fully protecting their Cloud-based applications or data. In addition, the majority of organizations still rely on traditional on-prem focussed Backup solutions, many of which do not enable the cloud to be used efficiently, or cost effectively.

    Join Phil Maynard, Sr. Director EMEA, Technical Sales at Barracuda and Alex Hilton, CEO at Cloud Industry Forum to discuss:

    - Findings from Barracuda research on how companies are using Backup and Cloud in EMEA
    - What’s preventing companies from moving their backups to the Cloud
    - Why moving to Office 365 could break your data protection and IT security strategy
    - Real life examples of how organisations have adopted a hybrid on-prem and Cloud Backup Strategy
  • 2018 WAN Transformation Trends & Predictions
    2018 WAN Transformation Trends & Predictions Todd Krautkremer, CMO, Cradlepoint Recorded: Dec 7 2017 47 mins
    There is a transformation happening in enterprise networking. Today's leading IT organizations are enabling digital and WAN transformation to connect more people, places, and things than ever before.

    New cloud-delivered, software-defined technologies are enabling this transformation, and 2018 promises more transformation than enterprise networking has seen in 20 years.

    Join Cradlepoint CMO Todd Krautkremer for a live webinar on Dec. 7, 2017, at 9 am PT to learn more about trends and predictions for 2018 and how technologies like Gigabit LTE, 5G, and SDx will impact the network in 2018 and beyond.
  • All-Flash in 2018 - What You Need to Know
    All-Flash in 2018 - What You Need to Know Storage Switzerland, Tegile Systems Recorded: Dec 7 2017 57 mins
    The All-Flash era is well upon us, and most data centers consider an all-flash product storage tier both realistic and practical. But the flash industry continues to march on. New technologies like NVMe and ultra high-density flash modules promise to continue all-flashes march to data center dominance. Join us for this live webinar and we will help you design your plan for 2018.
  • Top Tips and Tricks to Rock your Isilon World
    Top Tips and Tricks to Rock your Isilon World Rash Vyas and Scott Owens Recorded: Dec 7 2017 27 mins
    Join Dell EMC technical Isilon experts to learn our top tips and tricks for getting the most out of your Isilon implementation. Based on working with customers around the world, our Isilon technical experts will share insights and best practices across configuration, operation and management of Isilon environments. The webinar also includes an ‘Ask-The-Expert’ segment.
  • FCIP (Extension): Data Protection and Business Continuity
    FCIP (Extension): Data Protection and Business Continuity Rupin Mohan, Director R&D, SAN Chief Technologist, HPE, Mark Detrick, Director, Extension Principal Architect, Brocade Recorded: Dec 7 2017 59 mins
    Businesses today rely heavily on their data. Disaster may strike anywhere and occurs in many shapes and sizes. Transporting data over significant distance beyond the reach of a threatening event preserves data so organizations can rapidly recover in the event of a site going down.

    This makes deploying a disaster recovery infrastructure between data centers with fast, continuous, and easy replication of mission-critical data to anywhere in the world essential.
    Fibre Channel over IP (FCIP), often referred to as “Extension,” is used to connect SANs across distance using IP networks. FCIP is commonly used for Remote Data Replication (RDR) between Enterprise Storage Arrays and Remote Tape applications, for the purpose of Business Continuance via Disaster Recovery (BC/DR).

    Join storage technology and industry experts as they discuss their experience and deployment knowledge in:

    •Best known methods for deployment with extension architectures, extension in routed topologies, and performance optimization for remote replication
    •Industry best practices: topologies to achieve high-availability goals, advantages in trunking, encryption, etc…
    •Customer examples and use cases of a variety of critical production environments ranging from SMBs to the largest most demanding enterprises and government institutions
  • Veteran vs. Rookie - Who is Best Able to Meet The Enterprise Backup Challenge?
    Veteran vs. Rookie - Who is Best Able to Meet The Enterprise Backup Challenge? Storage Switzerland, Unitrends Recorded: Dec 7 2017 61 mins
    New vendors are appearing in the market “solve” all your backup problems. But are these “rookies” really up to the challenge or are they making the situation worse?

    Join us for our live webinar, “Veteran vs. Rookie - Who is Best Able to Meet The Enterprise Backup Challenge.”

    Learn who can solve the 5 key data protection challenges
    1. Protecting legacy applications
    2. Protecting cloud applications
    3. Rapid data growth
    4. Rapid recovery expectations
    5. Lack of recovery confidence
  • [ARABIC] 2017 - How FireEye can help MEA organisations to protect against APTs
    [ARABIC] 2017 - How FireEye can help MEA organisations to protect against APTs Yazan Hammoudah, Director of System Engineers, Middle East and Africa Dec 19 2017 11:00 am UTC 45 mins
    From cyber criminals who seek personal financial information and intellectual property to state-sponsored cyberattacks designed to steal data and compromise infrastructure, today’s advanced persistent threats (APTs) can sidestep cyber security efforts and cause serious damage to your organisation. 2017 is already one of the most prolific years in terms of APT activity. Indeed, since the beginning of the year, there have been several examples of major cyberattacks across EMEA and more specifically in the Middle East. How can FireEye help your organisations protect against these persistent threats?

    Join this live webinar in Arabic as we will discuss the following topics:
    - FireEye Adaptive Defense
    - Technology
    - Intelligence
    - Expertise

    https://www.fireeye.com/
  • APT34 - New Targeted Attack in the Middle East
    APT34 - New Targeted Attack in the Middle East STUART DAVIS | DIRECTOR EUROPE, MIDDLE EAST & AFRICA; DAN CABAN | PRINCIPAL CONSULTANT, MIDDLE EAST & AFRICA Dec 19 2017 1:30 pm UTC 60 mins
    Recent investigations by FireEye’s Mandiant incident response consultants combined with FireEye iSIGHT Threat Intelligence analysis have given us a more complete picture of a suspected Iranian threat group, that we believe has been operating since at least 2014.

    APT34 are involved in long-term cyber espionage operations largely focused on the Middle East. This threat group has conducted broad targeting across a variety of industries, including financial, government, energy, chemical, and telecommunications.

    Join us in a live webinar as we discuss this threat group whom we assess to be working on behalf of the Iranian Government, with a mission that would benefit nation-state geopolitical and economic needs. APT34 uses a mix of public and non-public tools, often conducting spear phishing operations using compromised accounts from trusted third parties, sometimes coupled with social engineering tactics.

    Register today to gain deeper insights into this threat group!
  • How to Approach a Cyber Security Review with Your Eyes Wide Open
    How to Approach a Cyber Security Review with Your Eyes Wide Open Matthew Rogers, Security Director at Freudenberg IT Dec 19 2017 4:00 pm UTC 15 mins
    Cybersecurity disasters dominated the news in 2017. WannaCry alone bashed hundreds of thousands of targets. Now is the time for CIOs and CSOs to scrutinize multiple components of their security because, let’s face it, attackers are busy working up new creative ways to hijack your data in 2018.

    Attend this webinar to learn what it takes to build an in-depth defense. This straightforward presentation will cover:

    • Security KPIs with risky validation processes (far more common than you think)

    • A checklist of security points that need tight inspection (and where to drill down)

    • New security services that streamline the process
  • Object Storage for Digital Video
    Object Storage for Digital Video Adrian Herrera, VP of Marketing & John Bell, Senior Consultant Dec 19 2017 7:00 pm UTC 60 mins
    From security footage and training videos to films and user-generated content, digital video is now integral to every business. As resolutions and workflows rapidly evolve, so do storage, access and preservation requirements. In this webinar, we will discuss how to satisfy these rapidly evolving requirements focusing on:

    - Challenges of increasing resolutions, delivery and long-term preservation
    - The difference between NAS, cloud and object storage solutions
    RAID, replication and erasure coding pros and cons
    - How to integrate object storage into workflows (security, production and content delivery)
  • Seeing is Believing: Carbonite Availability in Action
    Seeing is Believing: Carbonite Availability in Action Tim LaPlante, Director of Product Management, Carbonite and Becky Hjellming, Sr. Product Manager, Carbonite Dec 20 2017 4:00 pm UTC 60 mins
    This webinar will provide attendees with a hands-on overview of the Carbonite Availability solution including new features and a demo of the setup, testing and failover process. Attendees will walk away with:

    - An overview of the technology behind the Carbonite Availability solution
    - Highlights on new features and upcoming enhancements on the product roadmap
    - A hands-on, step-by-step walkthrough of configuration and failover testing and more
  • The True Cost of Downtime: How to Map Cost & Risk in a Complete DR Plan
    The True Cost of Downtime: How to Map Cost & Risk in a Complete DR Plan Ray Sullivan, Sr. Product Marketing Manager, Carbonite & Derek Cheek, Manager of Professional Services, Carbonite Dec 21 2017 6:00 pm UTC 60 mins
    Lost productivity, lost sales, lost reputation, lost customers—in a world that depends on connectivity, unplanned downtime can be devastating. Danger to data can come from anywhere, so it’s critically important to get a full measure of your risks.

    In this webinar, you’ll learn:

    - Simple, proven methods to mapping cost and risk
    - Defining realistic RTO and RPO expectations, identifying ways to simplify your solutions
    - Ensuring that your disaster recovery plan can live up to its promise.
    - Find it easier to plan for any kind of data disaster—and easier to get buy-in on the best solution for your business.
  • Part 2: Pseudonymization and Data Masking for GDPR
    Part 2: Pseudonymization and Data Masking for GDPR Cheryl Tang, Director of Product Marketing, Imperva and Steve Pomroy, Chief Technologist, Camouflage Dec 21 2017 6:00 pm UTC 45 mins
    This is the second in a series of product demos focused on addressing specific requirements of the General Data Protection Regulation (GDPR). In this webinar, we’ll look at how to use Imperva Camouflage Data Masking that can address pseudeomnymization requirements of the GDPR.

    We’ll provide an overview of:

    - What the General Data Protection Regulation (GDPR) is
    - What is pseudonymization and the benefits of pseudonymizing data
    - How data masking can help organizations comply with GDPR by pseudonymizing data classification capabilities
  • Part 3: Addressing Data Across Borders for the GDPR
    Part 3: Addressing Data Across Borders for the GDPR Cheryl Tang, Director of Product Marketing and Sumit Bahl, Sr. Technical Product Manager Jan 4 2018 6:00 pm UTC 45 mins
    One of the key requirements of GDPR relates to cross-border data transfers. Our security experts demonstrate how SecureSphere can help address this regulation with monitoring and access control of personal data.
  • 7 Ways to Build Rapport in Sales and Connect with People
    7 Ways to Build Rapport in Sales and Connect with People Tim Robertson Jan 9 2018 11:00 am UTC 60 mins
    Consider this: a CBS News / New York Times poll asked, “What percent of people in general are trustworthy?” The answer: 30%. Pretty sceptical we all are, right? Not necessarily. At the same time, the CBS News / New York Times poll asked a similar group the same question, but with a slight difference. “What percent of people that you know are trustworthy?” The answer: 70%. That’s a huge difference. Goes to show you: when people get to know you and people get to like you, people begin to trust you. This webinar outlines the 7 ways to build trust with your clients
  • The Business Benefits of GDPR Readiness
    The Business Benefits of GDPR Readiness Nigel Tozer, Director of Solutions Marketing Jan 11 2018 2:00 pm UTC 60 mins
    As you alter your business practices and processes to account for the General Data Protection Regulation (GDPR), which goes into effect May 25, 2018, it’s likely that your organization will be thinking of the risk of fines and the cost of compliance. However, the very same tools that can help to manage the data challenges of GDPR can also help you to gain insight and real business value from your data. In addition, putting the focus on better managing your data means you have the opportunity to reduce costs and improve efficiency, while also boosting productivity.
  • Part 4: Breach Detection and Notification for the GDPR
    Part 4: Breach Detection and Notification for the GDPR Cheryl Tang, Director Data Security Products, Imperva and Brian McAuliffe, Sales Engineer, Imperva Jan 11 2018 7:00 pm UTC 45 mins
    The GDPR, which comes into effect on May 25, 2018, requires organizations report a data breach within 72 hours. In this webinar, we’ll provide an overview of:

    • What the General Data Protection Regulation is
    • What the GDPR breach notification requirements are
    • How Imperva CounterBreach can help detect potential data breaches
  • Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security
    Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester Jan 18 2018 12:00 pm UTC 60 mins
    Three major trends define the Cloud Generation chaos that organizations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).

    On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organizations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for Organizations who face a severe shortage of skilled IT security personnel.
    Attend this webinar and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.
    In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:
    -Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security
    -Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
    -Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
    -Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.

    Register now
  • Choosing Your Enterprise Storage For Cloud Native Era
    Choosing Your Enterprise Storage For Cloud Native Era Bala Chandrasekaran Jan 18 2018 5:00 pm UTC 75 mins
    Are you thinking about new year resolutions for your IT organization/infrastructure? Join us to discuss emerging trends in enterprise storage and learn some insights that can help you with your next infrastructure investment.
  • All-Flash For Databases: 5 Reasons Why Current Systems Are Off Target
    All-Flash For Databases: 5 Reasons Why Current Systems Are Off Target Storage Switzerland, Vexata Jan 18 2018 6:00 pm UTC 60 mins
    In this live webinar join Storage Switzerland’s founder and lead analyst George Crump and Vexata’s VP of Products and Solutions Rick Walsworth as they explain how all-flash systems have fallen short and how IT can realize the full potential of flash-based storage without the compromises. Learn 5 areas where all-flash arrays miss the database performance mark.
  • Commvault HyperScale : les 5 avantages de la protection des données avec une arc
    Commvault HyperScale : les 5 avantages de la protection des données avec une arc Christophe Multeau Jan 23 2018 8:30 am UTC 45 mins
    Vous en avez assez des mises à jours compliquées de votre infrastructure de sauvegarde et de vos Appliances de déduplication ? Avez-vous l’impression d’êtes pris dans un cycle sans fin d’achats de logiciels et de matériels àchaque fois que vous devez ajouter de la capacité ou augmenter les performances de votre système de protection des données ?

    Vous devriez utiliser une infrastructure robuste et évolutive pour sauvegarder et restaurer vos données !

    Participez au webinaire Commvault sur les 5 avantages de la protection des données avec une architecture évolutive « Scale-Out », et découvrez comment Commvault avec ses offres HyperScale Software et HyperScale Appliance vous permettra de répondre à vos exigences de protection des données et d’évolutivité pour votre organisation.

    Ce Webinaire vous présentera comment une architecture de sauvegarde « Scale-Out » peut :
    -Eliminer la complexité des évolutions de la plateforme ;
    -Proposer une flexibilité de type cloud ;
    -Augmenter la disponibilité et la robustesse de la solution ;
    -Limiter les tâches d’administration par automatisation et libre-service ;
    -Optimiser les investissements avec une architecture basée sur des serveurs standardisés et du stockage cloud.
  • 4 Things to Do When Clients Pressure You for Lower Fees
    4 Things to Do When Clients Pressure You for Lower Fees Tim Robertson Jan 23 2018 11:00 am UTC 60 mins
    "Your fees are too high; can you do it for less?" In the highly competitive marketplace we hear dreaded phrases like this all of the time. The easy thing to do is to offer a discount, but that cuts into your profit margins and sets a precedent for the future. You don’t want to become a victim of discounting gone wrong. So what do you do when clients push back on your fees? This webinar runs through the 4 things you can do when clients put pressure on you to lower your fees
  • Secure information sharing across agency boundaries
    Secure information sharing across agency boundaries Chris Tonjes, CIO, DC Office of the Attorney General & Sonny Hashmi, Managing Director, Global Public Sector, Box Jan 25 2018 4:00 pm UTC 60 mins
    Government agencies must collaborate to solve complex problems in healthcare, Human Services, Law Enforcement and Emergency Management. However, many of the legacy systems agencies use to coordinate and manage information are not easily extensible outside the agency boundary, requiring either expensive customized portal based solutions, or insecure data exchange via emails and DVDs.

    Box allows agencies to securely work together across agency boundaries, while maintaining the security and compliance that government agencies need. leveraging box, agencies can quickly form inter-agency working groups, collaborate on mission sensitive data, and ensure that all stakeholders remain informed of programs and initiatives, without sacrificing security.

    Join us on this webinar to learn how government agencies are designing modern solutions using cloud technologies to securely share sensitive information between agencies and non-governmental stakeholders. Whether working with citizens and private sector health providers in health and human services, or coordinating across jurisdictions in law enforcement, or collaborating across Federal, State and Local government boundaries in emergency management, agencies are implementing new ways to share relevant information in real time, without compromising the security and privacy of sensitive data. Hear from government CIOs on how they have approached these challenges.
  • Risk Mitigation: Making Office 365 Safer for Business
    Risk Mitigation: Making Office 365 Safer for Business J. Peter Bruzzese, Microsoft MVP, Mimecast Jan 25 2018 4:00 pm UTC 75 mins
    A move to the Microsoft Office 365™ cloud is going to reduce administrative overhead and provide end-users with modern communication and collaboration tools.  However, there are several areas that require further attention (security, archive and continuity) if you want a risk-free move to Office 365.  In this lively session by Microsoft MVP J. Peter Bruzzese, you will hear a non-FUD focused discussion of those gaps and how to close them.

    Presenter Info:
    J. Peter Bruzzese is a six-time-awarded Microsoft MVP (currently for Office Servers and Services, previously for Exchange/Office 365). He is a technical speaker and author with more than a dozen books sold internationally. He's the co-founder of ClipTraining, the creator of ConversationalGeek.com, instructor on Exchange/Office 365 video content for Pluralsight, and a consultant for Mimecast and others.
  • How technology enables Enterprise Content Management for Mergers & Acquisitions
    How technology enables Enterprise Content Management for Mergers & Acquisitions Brian Aungst, Alfred Green and Eric Popiel, Information Management Team Jan 25 2018 8:00 pm UTC 60 mins
    During mergers and acquisitions information governance is paramount and brings unique challenges related to data privacy, maintaining security, reducing risk and the life cycle management of data across organizations.

    Pharmaceutical and Healthcare organizations are using enterprise content management solutions to maintain mandatory levels of compliance while achieving efficient and effective integration of their strategic objectives during a merger or acquisition.

    Join this Micro Focus webinar to learn how organizations like yours, are using technology to help facilitate the content integration process.

    Our webinar topic will address:

    •Preparing for the first 100 days
    •Understanding the Data – structured vs. unstructured
    •Regulatory requirements – Data Privacy
  • Critical Actions to Finalize Your GDPR Compliance Program: Part 2
    Critical Actions to Finalize Your GDPR Compliance Program: Part 2 Moderated by Dr. Branden Williams, with panelists from Imperva, Workday, ASG Technologies and TrustArc. Jan 30 2018 6:00 pm UTC 75 mins
    The new EU General Data Protection Regulation (GDPR) rule looms and will take affect in May 2018, but only a third of companies are on track to be compliant by the due date. GDPR is the most significant change in data privacy regulation in more than 20 years. It represents an extraordinary shift in the way businesses will be expected to operate when they gather, process, maintain, and protect customer data. Any organization that retains information of EU citizens must be in compliance or face huge fines of up to 4% of worldwide turnover.

    In this webinar series you will hear from industry experts facing the same challenges you face and find out how they're meeting and surpassing critical implementation check points, and you will learn what actions other organisations are taking preparation for data protection – not only for GDPR, but for long-term data protection.
  • Developing an App for your Business – A beginner’s guide
    Developing an App for your Business – A beginner’s guide Richard Messitt Feb 6 2018 11:00 am UTC 60 mins
    Mobile Apps have the ability to generate serious growth for your business. If you’re like most business owners you already have a few ideas of ways you could impress your customers or modernise your business processes with a mobile app. The question is, how do you progress your idea into reality? Richard Messitt, Co-Founder of App Development firm ZUDU is on hand to show you how to take the right steps and avoid the pitfalls and make your idea a reality!
  • OCC Bulletin: Risk Management Principles
    OCC Bulletin: Risk Management Principles Sam Abadir - Lockpath Feb 8 2018 5:00 pm UTC 60 mins
    Introducing new products and services or modifying existing ones is the lifeblood of any bank. That said, a recent OCC Bulletin conveys a related urgency. Products and services should not just follow plans and strategies but also utilize sound risk management principles. In this webinar, we’ll dive into those principles and the implications of the bulletin.

    As an attendee, you’ll learn:
    • Overview and ramifications of OCC Bulletin 2017-43
    • Risk management principles applicable to bank products and services
    • Key themes and trends related to banking innovation and customer preferences
    • Challenges banks face in addressing key themes/trends
    • How GRC technology supports a bank’s integrated risk management program

    2018 will be a banner year for banks to introduce new or updated products and services. How well you manage risk, be it strategic, reputational, credit, liquidity, operational, or compliance, will greatly determine the degree of success. Learn to manage bank risk in this webinar.

    Register now.
  • Creating Modern Business Foundations upon Hybrid IT Infrastructures
    Creating Modern Business Foundations upon Hybrid IT Infrastructures Todd Traver, Vice President, IT Optimization and Strategy, Uptime Institute Feb 15 2018 6:00 pm UTC 60 mins
    Modern businesses are being transformed into digital businesses. To do so, IT is being re-imagined to span hybrid infrastructures; including multiple data centers, co-location facilities and cloud service providers. This hybrid approach has many benefits including cost savings, but can increase the overall difficulty in supporting such environments to deliver a predictable level of IT services. We’ll discuss one methodology designed to assess your current risk profile and spot vulnerabilities.
  • 3 Tips for Selling to the Senior level Execs
    3 Tips for Selling to the Senior level Execs Tim Robertson Feb 20 2018 11:00 am UTC 60 mins
    Most of us want to have better meetings with senior executives. Meetings that feel like conversations, not pitches. Meetings that build deeper relationships. Meetings that uncover more ways in which they can help their customers. Behind closed doors, when I ask what's holding people back, many will tell me things like, "I don't feel comfortable," "I have nothing to offer to them,"" or "I'm not at their level." Selling to Senior level executives can be difficult, and getting a first meeting can be a real challenge. But, in our experience, the most difficult part is not getting the first meeting. It's getting the second one. Or the third one. This webinar explores the ways that you can get to that second and third meeting
  • Kaspersky Lab workshop: where next for businesses facing complex threats?
    Kaspersky Lab workshop: where next for businesses facing complex threats? Kaspersky Lab and guests Feb 20 2018 1:30 pm UTC 120 mins
    Next generation threats are already here: advanced and hard to detect, they can exploit supply chains and legitimate software and hide in your systems for months, causing immense damage. They demand a radically different approach to protection. Join us to discuss these emerging trends and the action security leaders can take to protect their organizations and customers.

    David Emm, Principal Security Researcher, Global Research and Analysis Team, Kaspersky Lab will present the main threat predictions for 2018 and their potential business impact; while Alessio Aceti, Head of Enterprise Business at Kaspersky Lab will consider the critical success factors for cybersecurity teams in the rapidly evolving threat landscape.

    An expert panel of senior security leaders, including Adam Maskatiya, General Manager for UK and Ireland, Kaspersky Lab, will debate and answer audience questions on whether there is ever an acceptable level of risk for enterprises facing next generation cyberthreats.

    Attendees will come away with an understanding of emerging threats facing their sector, which they can use to develop robust security strategies capable of withstanding such sophisticated attacks.