Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Dell EMC Data Domain:  What's New for 2018
    Dell EMC Data Domain: What's New for 2018 Anand Rudrabhatla Recorded: Jul 20 2018 36 mins
    Discover the latest from Dell EMC Data Domain, the industry’s #1 protection storage. Hear what's new, expansions to the ecosystem, and the introduction of the DD3300 for small, midsized & ROBO environments. Plus, hear how Data Domain Virtual Edition saved the day for a customer when Hurricane Irma blew into town. Keep your mission critical data safe with Data Domain.
  • Career Conversations w/ Twitter Queens Tracy and Amanda
    Career Conversations w/ Twitter Queens Tracy and Amanda Jessica Gulick, MBA | PMP | CISSP Recorded: Jul 19 2018 59 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guest:
    Amanda Berlin, MCITP
    Tracy Maleeff, Masters in Library and Information Science
  • Three Reasons Why NAS is No Good for AI and Machine Learning
    Three Reasons Why NAS is No Good for AI and Machine Learning Storage Switzerland, WekaIO Recorded: Jul 19 2018 61 mins
    Artificial Intelligence (AI) and Machine Learning (ML) are becoming mainstream initiatives at many organizations. Data is at the heart of AI and ML. Immediate access to large data sets is pivotal to successful ML outcomes. Without data, there is no learning. The goal of AI and ML is to try to simulate human thinking and understanding. AI and ML initiatives cannot however be realized unless the data processing layer has immediate access to, and a constant supply of, data.
  • Applying Data Science to Measure Your True Risk
    Applying Data Science to Measure Your True Risk Michael Roytman, Chief Data Scientist at Kenna Security Recorded: Jul 19 2018 47 mins
    There’s a difference between threat data and threat intelligence, and while the former may give you a better understanding of malicious data sources, IPs, websites, and domains, what it fails to do is give you and your security team the context to remediate a threat. When CVEs are responsible for tens of millions of attacks, simply having threat data won’t cut it.

    When it comes to cybersecurity, knowledge is power. And as cyber criminals gain more sophisticated tactics, protecting yourself requires a more intelligent approach.
  • HPE and Scality: Business Value of Scalable Object Storage, an IDC White Paper
    HPE and Scality: Business Value of Scalable Object Storage, an IDC White Paper Paul Speciale, CPO, Scality; Stephen Bacon, Director Scale-Out Storage, HPE; Special Guest: Amita Potnis, IDC Recorded: Jul 19 2018 48 mins
    Enterprises worldwide are contending with an accelerated pace of digital transformation where reliable and flexible information technology infrastructure can have a significant impact on revenue and profitability. As data volumes grow, so does the complexity and cost of storing and managing the data, with added complications for data governance and compliance. As businesses move toward petabyte-scale data storage, object storage solutions are emerging as superior alternatives for balancing scale, complexity, and costs. IDC interviewed organizations that have moved key workloads to Hewlett Packard Enterprise Scalable Object Storage with Scality RING to understand the impact of the solution on storage costs and business operations. Senior IT leaders and line-of-business executives will come away with perspectives from these companies that have successfully managed the digital transformation challenges.
  • The Evolution of Mobile Threat Actors
    The Evolution of Mobile Threat Actors Michael Flossman, Head of Threat Intelligence, Lookout Recorded: Jul 19 2018 37 mins
    Cybercriminals and nation states are consistently using mobile threat tooling as part of their espionage or financially motivated attacks and campaigns. The Lookout Threat Intelligence team has noticed this increase as we research and protect against these adversaries. These actors are increasingly seeing value from having an offensive mobile capability in their toolkit and we have even seen low sophistication groups break into this space and successfully steal gigabytes of data from compromised devices. As BYOD and the prevalence of mobile devices in corporate environments continue to blur the traditional enterprise perimeter, the ability to understand the risks to mobile endpoints is critical.

    Join Michael Flossman, Head of Threat Intelligence at Lookout, for this informative webinar as he covers the evolution of threat actors on mobile, discusses several recent high-profile cases, and explains why gaining visibility into your mobile endpoints and proactively securing them is key for today’s organizations."
  • Technical insight: protecting your Office 365 or G Suite data with StorageCraft
    Technical insight: protecting your Office 365 or G Suite data with StorageCraft Jaap van Kleef – EMEA System Engineer Recorded: Jul 19 2018 34 mins
    When it comes to working in cloud-based applications, the option of granular recovery isn’t a given. But the opportunity for human error can be: users delete important files, overwrite one another’s documents, and accidentally download viruses. And SaaS vendors may or may not have a recovery solution for you. If they do, there’s no guarantee that it'll be easy, that you’ll get the data in a useful format, or that the recovery will happen quickly or inexpensively.
    Join this webcast and learn how StorageCraft Cloud Backup for Office 365 (and G Suite) provides granular protection for Exchange, calendars and contacts, OneDrive for Business, SharePoint, Public shared folder, etc. And you will avoid the sweat for storage space, software upgrades, or the possibility of an onsite backup server failing.
  • Simplify IT – How to Achieve True IT Resilience
    Simplify IT – How to Achieve True IT Resilience Naveen Chhabra, Forrester’s Senior Analyst Recorded: Jul 18 2018 58 mins
    In this webinar, Forrester’s Senior Analyst, Naveen Chhabra, explores the practices and technologies that have evolved – far beyond old-school backup – to become the tech infrastructure needed to help organizations achieve true IT resilience and giving IT the tools they need so that they can focus on modernization and their cloud strategy.
  • The New Frontier Of Hybrid IT
    The New Frontier Of Hybrid IT Scott Mathewson, Data Center Practice Lead, North America, Softchoice Recorded: Jul 18 2018 52 mins
    The journey to the cloud had just had a major breakthrough.
     
    With VMware software now available on the global AWS Cloud, there is now a single, consistent, pervasive connectivity and a secure platform for apps and data. Whether that is in the Datacenter or in the AWS Cloud. This gives you the power to move existing applications seamlessly to the cloud and back as needed.
     
    You’ll understand how you can quickly get workloads on the cloud without having to re-engineer your applications. Keep applying the skills you've developed on the VMware platform, backed by the large array of services in the AWS platform. This allows you to be agile, reduce capital costs and increase availability for innovations.
     
    In this webinar, we will show you: 
    - How, as a VMware customer, you can go into the cloud without retraining, reconfiguring your apps, refactoring and more
    - What it will mean to have immediate access to the AWS platform and services and how it'll accelerate innovation
    - Immediate value Business Cases related to increased agility, disaster recovery, and stretch networking for high availability.
     
    Presenter Info:
     
    Scott Mathewson, Data Center Practice Lead, North America, Softchoice
    As Practice Lead for Softchoice North America, Scott has over 25 years of Datacenter experience with EMC, VMWare and Cisco, he is responsible for defining Softchoice assessments and services offerings for VM ware and SDN. Scott works with customers to develop solid solutions as it relates to SDS, SDN, Cloud, management and automation solutions.
  • NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM ED
    NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM ED Ulf Mattsson, Dick Morrell, Juanita Koilpillai Recorded: Jul 18 2018 60 mins
    NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM EDT

    Financial Services and GDPR: The next 60 days….

    In response to GDPR and Privacy Shield changes, entities in the Financial Services Industries have taken initial steps to identify gaps and modify their public facing privacy policies. This session will focus on what these heavily regulated industries will have to do in the next 60 days to establish and maintain a legally defensible position with respect to privacy and security of personal data not only to comply with regulation but to be poised to do business in the 21st Century.
  • Faster, Smarter, Simpler - The New Requirements in Storage Networking
    Faster, Smarter, Simpler - The New Requirements in Storage Networking Storage Switzerland, Cisco Recorded: Jul 18 2018 62 mins
    IT professionals need a faster, smarter and simpler storage architecture. Organizations drive this need by deploying more diverse and demanding applications and services. Data is the very lifeblood of an increasing number of organizations. The consumers of this data need rapid and consistent access to it. The storage network is the circulatory system that drives that data throughout the organization. Like the human circulatory system, the storage network is the key to the organization realizing the full benefits of the data-driven era.

    Join George Crump, Founder and Lead Analyst of Storage Switzerland and Paresh Gupta, Technical Marketing Engineer at Cisco as they discuss the new requirements for storage networking so it can deliver a faster, smarter and more straightforward experience for IT.
  • Flexible Cyber Threat Intelligence at the Network’s Edge
    Flexible Cyber Threat Intelligence at the Network’s Edge Ken Hosac, VP of IoT Strategy, Cradlepoint Recorded: Jul 18 2018 58 mins
    Network security needs are changing right before our eyes. Digital transformation is shifting workloads to the cloud, increasing mobile workforces, and expanding IoT footprints — and network on-ramps.

    From branch locations to in-vehicle networks and IoT devices, cyberattacks become more advanced by the day. Today’s diverse network architectures and security needs make scalable solutions and flexible cyber threat intelligence essential. Many organizations want the cost savings and efficiencies of the cloud without having to sacrifice the level of security to which they’re accustomed.

    Join Cradlepoint's Ken Hosac, VP of IoT Strategy, for this live webinar to explore the blending of legacy and next-generation measures to keep enterprise networks secure.

    Hosac has helped drive Cradlepoint’s growth and development through roles in strategic planning, product management, solution strategy and thought leadership. He frequently represents the company at industry conferences and events, and served on the original Advisory Board for the IoT/M2M Evolution Magazine. Hosac has 25 years of experience in marketing, sales, R&D and manufacturing. Prior to joining Cradlepoint, he served as VP of Marketing for Casabyte (later acquired by JDS Uniphase). He also served as VP of Business Development for GoAhead Software (later acquired by Oracle). Hosac earlier spent 10 years at Hewlett Packard with cable modems and head-ends, set-top boxes, and personal computers in a variety of engineering and engineering management roles. He holds a B.S. degree in Electrical Engineering and an M.S. degree in Manufacturing Engineering, both from Stanford University.
  • Verizon Threat Research Advisory Center - Insider and Privilege Misuse
    Verizon Threat Research Advisory Center - Insider and Privilege Misuse David Kennedy and John Rudolph, Verizon Global Security Recorded: Jul 18 2018 79 mins
    Leverage Threat Intelligence where it matters most.

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Insider and Privilege Misuse

    Our Verizon Threat Research Advisory Center presenters will be:

    • John Rudolph, Principal Consultant, Identity and Access Management
    • Steve Atnip, Senior Analyst, Threat Intelligence
    • David Kennedy, Managing Principal, Open Source Intelligence
    • Laurance Dine, Managing Principal, Investigative Response – EMEA

    For this month's theme of 'Insider and Privilege Misuse' we'll feature John Rudolph, Principal Consultant, Identity and Access Management who'll discuss insider threat motivations, common denominators, and countermeasures, to include the Zero Trust approach. We'll then touch base on the IR Pulse and trends in our caseload, followed by:

    • Current Intelligence
    • Attacks & Threat Indicators
    • Latest Malware Trends
    • Significant Vulnerabilities
  • [VIDEO PANEL] Cyber Security in Europe: An Executive Perspective
    [VIDEO PANEL] Cyber Security in Europe: An Executive Perspective Kevin Taylor, EMEA VP; Stuart McKenzie, EMEA Mandiant VP; Simon Moor, NEUR VP; Richard Weaver, Data Privacy Officer Recorded: Jul 18 2018 38 mins
    Cyber breaches are inevitable because attackers constantly change their tools, techniques and procedures (TTPs). Everyone is affected in different ways, whether from compromised systems or supply chains to the financial implications of non-compliance and breach notification.

    Join us for a live video panel on trending topics in cyber security:
    -Breach notification sources, dwell time and industries mostly likely to be compromised and retargeted by attackers
    -Importance of understanding cyber attackers and their motives
    -Red teaming to improve security effectiveness
    -Cyber security skills gap
    -Direct and indirect costs of a breach
    -Requirements, processes and policies to handle the GDPR
  • The Future of Backup Isn't Bakup
    The Future of Backup Isn't Bakup Steve Blow Recorded: Jul 17 2018 34 mins
    Old school backup is out! Zerto is changing the way companies do traditional backup with Continuous Data Protection. Learn more!
  • Best Practices in Driving DevOps Transformation
    Best Practices in Driving DevOps Transformation Paul Rechsteiner, Principal Product Manager, Incident Response Recorded: Jul 17 2018 21 mins
    The benefits of DevOps transformation are significant and well-understood, with over 70% of organizations having already implemented or planning to implement DevOps within the next 12 months according to Forrester. But it’s not a change that happens overnight. After empowering tens of thousands of operations teams to effectively manage their services in production, we’ve distilled what we’ve learned from them into a few best practices that have been foundational to driving change and transforming to be more agile.

    In this session, we’ll go over a few topics:

    - Common operational challenges across the organizational spectrum
    - The top best practices that organizations use to empower distributed teams
    - How to enable both central and distributed teams to gain comprehensive visibility, take action on issues fast, and be more productive
    - A couple of case studies of real organizations who have achieved successes in the journey toward DevOps transformation, and how they’re getting there
  • Modernizing Healthcare IT with Software-Defined Storage
    Modernizing Healthcare IT with Software-Defined Storage Scott Lowe, CEO at ActualTech Media & Dave Brown, Sr. Solutions Architect at DataCore Software Recorded: Jul 17 2018 25 mins
    Join us in this presentation as we discuss how today’s leading healthcare organizations are using software-defined storage to tackle the top challenges in Healthcare IT by delivering uninterrupted data access, massive architectural scale-out, and game-changing application performance.
  • Tech Tuesday: Object Storage for High-Performance Computing
    Tech Tuesday: Object Storage for High-Performance Computing John Bell, Senior Consultant & Pat Ray, Integration Engineering Lead Recorded: Jul 17 2018 43 mins
    When it comes to High-Performance Computing (HPC), the volume of data that comprises data sets can easily over-burden primary storage. When that happens, performance and speed are compromised and research and business objectives are at risk. As data sets continue to grow, more and more HPC organizations are turning to object storage technology to build active archives. Learn how adding cost-effective object storage into your storage infrastructure can reduce storage TCO, provide continuous data protection, and give you the power of metadata so you can quickly retrieve data when you need it.
  • Three Steps to Multi-Vendor Storage Excellence
    Three Steps to Multi-Vendor Storage Excellence Storage Switzerland, SolarWinds Recorded: Jul 17 2018 61 mins
    Join this webinar with experts from SolarWinds and Storage Switzerland as they discuss how IT can have the best of both worlds: a mixed storage system environment that targets the specific requirements of their various workloads, while also expertly managing that environment using its resources efficiently and optimally.

    Key Webinar Takeaways:

    * The Pros and Cons of a Mixed Storage Vendor Data Center
    * The Value of a Global Storage Dashboard (detect performance and capacity problems across storage systems, deliver and end-to-end / application to storage view, free up wasted disk capacity, reduce time to resolution with visibility to the IT issue source and what it impacts, and adequately place workloads for their required performance)
    * The Requirements of a Global Storage Dashboard (works across multiple storage vendors, provides end-to-end views, does not replace but compliments vendor tools)
  • Vendor Risk Management Panel Discussion
    Vendor Risk Management Panel Discussion Hosted by Sam Abadir, VP of Industry Solutions Recorded: Jul 17 2018 48 mins
    Vendor risk management programs are under intense pressure due to the growing reliance on third parties and the increased regulatory focus on privacy and cybersecurity. Our expert panel discussed the current challenges and opportunities with managing third parties. They brought a regulated industry perspective and shared how users can get more from Keylight.
  • Customer Interview - CNO Financial - Improvements with Keylight
    Customer Interview - CNO Financial - Improvements with Keylight Shelly Hogan - CNO Financial, Sam Abadir - Lockpath Recorded: Jul 17 2018 3 mins
    Hear how CNO Financial has benefited from implementing the Keylight GRC Platform for their Compliance and Policy Management program.
  • Incident Remediation: Could this have been prevented?
    Incident Remediation: Could this have been prevented? Manfred Erjak, Consultant, Professional Services Recorded: Jul 17 2018 31 mins
    Third and final part of our 'Breach Response Preparedness Series', a 3-part series on state-of-the-art incident investigation techniques and breach response strategies.

    Recovering from a large-scale incident is not an easy task. When compromised by an Advanced Persistent Threat, one must plan the efforts ahead of time to succeed in fully remediating and eradicating the attacker from the environment.

    During this webinar, we will discuss:
    - How to best remediate from such an event;
    - The different stages of the preparation, when it is the best time to remediate, and how to classify actions;
    - Examples of real investigations and remediation efforts to illustrate common complications like remediating too early, remediating partially and working with third party IT providers

    Join your host Manfred Erjak, Professional Services Consultant, for a 25-minute webinar to discuss the latest incident remediation trends.
  • Onboarding: How to Turn an A-Player into a B-player in Under 4 Weeks
    Onboarding: How to Turn an A-Player into a B-player in Under 4 Weeks Marcus Cauchi, ISM Fellow Recorded: Jul 17 2018 49 mins
    You’ve just hired James Bond on to your sales team and you have high hopes for his performance. Assuming you really did hire James Bond and not Mr Bean in a Tux, what can you do to ensure disappointment?

    Why! Fail to do a proper onboarding process! Delude yourself into thinking you hired an adult, a professional, someone who can be depended on to hit the ground running. “John is a big boy and doesn’t want me crowding him. I’ll let him get on with it.”

    This is called management by abdication and is one of the cardinal sins of sales management.

    Onboarding is the lost element of successful recruitment. The best sales managers have a 120 day onboarding plan for new hires. Why 120 days? Because that is the probation period a new hire is typically putting you (their manager, the job they actually bought, the company and the other people on the team) on in case they believe they have made a bad choice of career move.

    You’ve invested time and money in attracting them, selecting them, offering them, legal & HR costs, managing their notice period, paying them, training them and you risk blowing your winnings because you’re too busy, too stupid or too lazy to finish the job you started!

    Onboarding is not about giving them an Ops & Employee Manual to read, giving them some product training and provisioning them with passwords, a laptop and a phone. Those are the tiniest part of a good onboarding process. Onboarding should set up a new hire for success. It should be structured and confirm that you have made the right hire. It should tell you quickly if you haven’t so you can hire slow and fire fast.

    A reliable onboarding process needs to cover 3 things:

    * What do they need to know?
    * By when do they need to know it?
    * Where can they find it?
  • Symantec Control & Compliance Suite – Automatisieren Sie Compliance-Abläufe
    Symantec Control & Compliance Suite – Automatisieren Sie Compliance-Abläufe Armin Schneider ; Olaf Mischkovsky Recorded: Jul 13 2018 52 mins
    Symantec Control & Compliance Suite – Automatisieren Sie Compliance-Abläufe, schaffen Sie Transparenz und sparen Sie wertvolle Zeit

    Symantec Control Compliance Suite liefert geschäftsrelevante Sicherheits- und Risikoinformationen, mit denen Sie Prioritäten für die Bereiche Sicherheit, IT-Betrieb und Compliance effektiv abstimmen können. Bewertungen erfolgen fortlaufend und automatisiert. Sie erhalten damit eine Gesamtübersicht über Sicherheitskontrollen und Sicherheitslücken. Auf diese Weise sind Sie in der Lage, das Rechenzentrum zu härten, die Behebung von Sicherheitsvorfällen zu priorisieren, sicher auf ein Software-Defined Data Center umzustellen sowie kontinuierliche Bewertungen für die Cyber-Sicherheit und die fortlaufende Überwachung zu unterstützen
  • How to Build a Powerful Partner Sales Channel & The 13 Mistakes to Avoid
    How to Build a Powerful Partner Sales Channel & The 13 Mistakes to Avoid Marcus Cauchi, ISM Fellow Jul 24 2018 10:00 am UTC 60 mins
    Are setting up a new channel or trying to revitalise an old or underperforming sales channel?

    Have you invested time and money recruiting partners but feel disappointed they aren’t producing or have fallen silent?

    Do partners bring you requests for duck-shoot demos that result in sales cycles that seem never to close?

    Channel Partner Sales Managers have one of the toughest jobs in sales or sales management. They have to:

    * Lead and manage without power
    * Carry large targets and are responsible for key accounts
    * Recruit partners who produce predictably & consistently
    * Get the best out of partners
    * Create and maintain engagement across partner organisations (sales, technical & management)
    * Help partners make good money and stay committed & loyal

    If you want to gain marketshare and expand quickly, identifying and selecting the right Channel Partner Sales Managers can be the key. Providing them with the correct tools and resources is essential.

    Join us on 10th July for a webinar introducing a radical new approach to channel sales development.

    Ideal for:

    * Startup businesses looking to build a channel from scratch
    * Established business experiencing erratic or disappointing channel performance
    * Companies looking to launch new products and services
    * Companies launching into new markets
    * Direct sales organisations looking to reduce their sales costs & headcount without a loss of earnings or quality
  • The Three Reasons Cloud Backup is Broken and How to Fix It
    The Three Reasons Cloud Backup is Broken and How to Fix It Storage Switzerland, Microsoft Azure Jul 24 2018 1:00 pm UTC 60 mins
    The cloud was supposed to be the answer to IT’s backup dilemma; instead, it in some ways has made the situation worse.

    Join Storage Switzerland’s Founder and Lead Analyst, George Crump and Microsoft Azure's Principal Group Program Manager of Azure Backup for a roundtable discussion on what’s gone wrong with cloud backup and how to fix it. In this webinar we’ll cover the three problems with cloud backup.
  • Your Secure Hybrid Cloud Simplified. Too good to be true?
    Your Secure Hybrid Cloud Simplified. Too good to be true? Henry Baltazar of 451 Research & Clint Wyckoff of Datrium Jul 24 2018 5:00 pm UTC 60 mins
    Gone are the days that IT was focused on configuring, managing or troubleshooting infrastructure. The lines between "Clouds" are continuing to become blurred more and more. IT now demands simplicity; the business demands that all applications run fast and perform reliably. In this session, our experts will discuss the evolution of the datacenter focuses on a few core tenants: Simple. Scalable. Reliable. Secure.
  • Webinar: An Actionable Plan for Segmenting Your Network
    Webinar: An Actionable Plan for Segmenting Your Network Erez Tadmor,Sr. Product Manager, Tufin & Dan Rheault, Sr. Product Marketing Manager, Tufin Jul 25 2018 3:00 pm UTC 60 mins
    A segmented network operationalizes your network security policy, enables a demonstrable state of continuous compliance, and provides mitigation options for cyberattacks.

    Our advice: organizations must go back to the basics to accomplish this crucial project.

    This webinar will cover actionable tips for network segmentation based on the experience of over 2,000 organizations. We will share:
    •Common pitfalls to avoid
    •How to start segmenting your network today
    •Tips for applicable enforcement
    •Q&A from the attendees
  • Data Center Operational Excellence: Staffing & Training
    Data Center Operational Excellence: Staffing & Training Matt Stansberry, Vice President - North America, Uptime Institute Jul 25 2018 4:00 pm UTC 60 mins
    How do you ensure your staffing plan meets your business's performance and risk requirements? Do you have an appropriate training program to drive a culture of continuous improvement? How can you evaluate and enhance your training program to ensure continuity of expertise, and retain key employees?
  • Whiteboard Webinar: Dealing with the Multi-Storage Vendor Data Center
    Whiteboard Webinar: Dealing with the Multi-Storage Vendor Data Center George Crump, Storage Switzerland Jul 25 2018 4:00 pm UTC 15 mins
    Join Storage Switzerland’s Lead Analyst, George Crump for a Whiteboard Webinar as he discusses a key challenge facing data centers today, the multi-vendor storage infrastructure. Most data centers today have multiple storage systems from multiple vendors each with their own feature set and user interface. Storage sprawl is rampant. The vendor community offers IT three potential solutions to address the storage sprawl problem:

    - Replace all the storage hardware with a single consolidated storage system
    - Keep the hardware variety but consolidate the software by replacing each hardware vendor's software with a software-defined storage solution
    - Keep using multiple storage solutions and live with the problem
  • Targeted Defense: The Future of Defending Applications in Production
    Targeted Defense: The Future of Defending Applications in Production Mahesh Babu, General manager, Runtime Protection, at Contrast Security Jul 25 2018 5:00 pm UTC 60 mins
    Raise your hand if this is you:

    - Our development teams have a massive security backlog and can’t fix everything in code
    - We need to protect legacy applications with no build pipeline or no dev team support them
    - Struts 2 made us realize we need better production controls and faster zero-day response
    - Our SOC has alert fatigue and has no visibility or context regarding production applications
    - RASP is interesting technology – we are curious to see how we would use it

    At Contrast Security, we have been hearing this from our customers and have been hard at work to solve these problems. We are proud to announce the release of the Contrast Targeted Defense Platform, the next generation of runtime protection.

    Join Mahesh Babu (General Manager, Runtime Protection) to learn more about Contrast’s new Targeted Defense Platform and its new capabilities that include, but are not limited to:

    - Intelligent, multi-technique detection
    - Advanced attack response that goes beyond monitoring and blocking
    - Language agnostic protection
    - Simple deployment
  • Managing Hybrid Clouds like a Pro
    Managing Hybrid Clouds like a Pro Dan Waymire, Senior Manager of Unified Cloud at Hosting Jul 25 2018 5:00 pm UTC 60 mins
    Join Hosting’s Dan Waymire, SR. Manager of Unified Cloud, to see first-hand how Hosting can help your organization monitor assets in any environment, all within a single pane of glass.

    Enterprises today are aware of the risks of taking an exclusively public cloud approach. Companies need a holistic cloud strategy spanning deployments in:

    • Private Cloud
    • On-premise
    • Public Cloud

    As IT professionals distribute workloads across various clouds, it is more critical now than ever to manage the performance, availability, and cost of your IT assets.

    In this webinar, you will learn how you can effectively manage all of your environments, as Dan demonstrates the true value of adopting a single-platform monitoring tool.
  • GDPR is Here: Get the Need-to-Know Info from Security Experts
    GDPR is Here: Get the Need-to-Know Info from Security Experts Tom Reynolds,Director of Technology Solutions at Razor Technology & Kevin Hyde, Managing Director at Layer 8 Security Jul 26 2018 3:00 pm UTC 60 mins
    Discover how GDPR applies to you and what steps you should take now to address GDPR concerns.

    You may have brushed aside the flurry of emails in your inbox announcing privacy policy updates, but if your business isn’t following suit, you may run into trouble. The General Data Protection Regulation (GDPR) has been in effect for almost two months now, but the impact it has on businesses and the specifics on ensuring compliance still remain a little foggy to business leaders and their teams.

    According to SAS, a leader in business analytics and intelligence, less than half of organizations fully understand the impact of GDPR and how their business can effectively address this new regulation.

    Join security experts from Razor Technology and Layer 8 Security on Thursday, July 26th at 11am EST for a live webinar to discover how GDPR applies to you and what steps you should take now to address GDPR concerns. We’ll discuss:
    -The big impact GDPR has on IT teams and their businesses
    -The company practices that may trigger GDPR enforcement
    -The five post-GDPR actions you need to take to build better infrastructure
  • How to Design a Compliant and GDPR Ready Collaboration System
    How to Design a Compliant and GDPR Ready Collaboration System Storage Switzerland, Cloudian, SME Jul 26 2018 3:30 pm UTC 60 mins
    IT needs to regain control over shared data, but not at the expense of the user’s ability to collaborate both internally and externally. Cloud-based file-sync and share solutions can now be replaced with internal solutions that are more secure, provide greater insight, and are less expensive.

    Join Storage Switzerland, Cloudian and Storage Made Easy (SME) for our live roundtable discussion to learn:

    - The risks associated with cloud-based file sync and share
    - Why GDPR and data compliance has forever changed file collaboration
    - The advantages of on-premises file collaboration
    - The challenges of on-premises file collaboration
    - How to get it all: Cost-effective, compliant, easy to use file collaboration
  • Discovering a Competitive Advantage with ISO 27001 Certification
    Discovering a Competitive Advantage with ISO 27001 Certification Jason Eubanks - Lockpath Jul 26 2018 4:00 pm UTC 60 mins
    Organizations with mature, enterprise-wide information security risk management programs enjoy a competitive advantage, thanks to ISO 27001 certification that signifies an international standard for safeguarding information. In this webinar, Lockpath's Jason Eubanks, a governance, risk management, and compliance (GRC) consultant and former ISO auditor, will share the business case for earning ISO 27001 certification and the critical role of a GRC platform in implementing a successful information security management system (ISMS).

    You'll learn:

    • Challenges and pitfalls with ISO 27001 certification
    • Tips on establishing and maturing an ISMS
    • Strategies for preparing and passing ISO audits
    • Technology's role in earning and maintaining certification

    Learn how ISO 27001 can give you a competitive advantage and strategies for earning certification. Register now to attend this educational webinar.
  • VMAX and Oracle: Blazing performance and data reduction efficiencies
    VMAX and Oracle: Blazing performance and data reduction efficiencies Yaron Dar Jul 26 2018 4:00 pm UTC 60 mins
    This webinar will focus on achieving peak performance for Oracle workloads with VMAX. You will learn about the latest data reduction capabilities and best practices for BC/DR/HA.
  • The All-Flash Fix - How to Create a Hybrid Storage Architecture
    The All-Flash Fix - How to Create a Hybrid Storage Architecture Storage Switzerland, Western Digital Jul 26 2018 5:00 pm UTC 60 mins
    Join experts from Storage Switzerland and Western Digital as we discuss the All-Flash Fix, How to Create a Hybrid Storage Architecture.

    In this webinar, you'll learn how to create an architecture that meets the need to deliver high performance, protect the organization from disaster and meet the organization's long-term data retention and privacy needs.
  • Making Cybersecurity Matter to Business -  A conversation with Pete Herzog
    Making Cybersecurity Matter to Business - A conversation with Pete Herzog Pete Herzog, Managing Director at ISECOM Jul 26 2018 5:00 pm UTC 75 mins
    In early 2000, the Open Source Security Testing Methodology Manual (OSSTMM) was released with the primary objective of improving how the enterprise conducted security testing. Key sections of this methodology include operational, human, physical, wireless, telecommunication, and data network security testing. Today, OSSTMM is widely regarded as a methodology for penetration testing world-wide, offering a standard approach to conducting security testing.

    Frank Shirmo of ITPG Secure Compliance, a Cyber Security Boutique in Northern Virginia will be joined by Pete Herzog, the creator of OSSTMM, to answer key questions, and provide clarifications on OSSTMM for CTOs, CISOs, CIOs, Security Engineers and Analysts, and all other stakeholders interested in the topic of security testing.
  • [Earn 1 CPE] Post-GDPR: Key Steps to GRC Integration
    [Earn 1 CPE] Post-GDPR: Key Steps to GRC Integration Moderator: Colin Whitaker. Panel: Sooji Seo, RSA; Quin Rodriguez, Riskonnect; Gabriel Gumbs, STEALTHbits; Tim Hill, Centrify Jul 26 2018 5:00 pm UTC 75 mins
    Data protection laws such as the General Data Protection Regulation (GDPR) are complex, and can impact a broad range of business roles, including legal, audit, HR and finance, not just IT. In achieving GDPR compliance, organizations should focus on getting these roles to work together in ongoing efforts to ensure governance, risk and compliance (GRC) across an organization, and not be distracted by the noise in the marketplace. Through the process of integrating GRC practices real value can be achieved, as long as all stakeholders work with one another and take practical, measured steps toward integration. Join our panel of experts on this CPE accredited webinar to learn how your organization can achieve this.

    Learning Objectives

    - Find out how to align risk management with enterprise performance management under the GDPR.
    - Learn how to work with stakeholders to effectively integrate compliance activities, and gain transparency, efficiency and agility for process operations.
    - Discover how to identify and manage the digital risks that matter, and which risk functions need to transform.
  • Keys to Achieving Secure Multitenancy: Isolation, Encryption & Disaster Recovery
    Keys to Achieving Secure Multitenancy: Isolation, Encryption & Disaster Recovery David Hines, TierPoint - Vice President of Architecture and Engineering Jul 26 2018 6:00 pm UTC 60 mins
    Multitenancy in cloud is nothing new. Providers and organizations have long leveraged this model to manage costs and complexity as well as enable access to the latest releases and technology. Within a multitenant environment, resources are shared with all the other users of the cloud which leads to concerns about control and confidentiality of data and workloads. In a recent study, over two thirds of IT professionals say security is their most significant concern in adopting an enterprise cloud computing strategy.

    In this live webinar, TierPoint Vice President of Architecture and Engineering, David Hines will address some key considerations for tackling security concerns in a multitenant environment including:
    • Ensuring each layer of the environment is designed with strong isolation properties
    • Leveraging encryption to create logical isolation from other tenants and data protection
    • Understanding how the environment is protected from outages or high-volume usage

    Register Today!
  • The Total Economic Impact of the INFINIDAT InfiniBox - A Forrester TEI Study
    The Total Economic Impact of the INFINIDAT InfiniBox - A Forrester TEI Study Bob Cormier, VP & PRINCIPAL CONSULTANT, FORRESTER CONSULTING Jul 26 2018 7:00 pm UTC 30 mins
    As organizations continue their digital transformation to capitalize on the benefits of big data, many have already discovered that the key to success lies in selecting the right infrastructure solution that also enables economic transformation. INFINIDAT’s InfiniBox, based on a software-defined storage architecture, delivers the performance, availability, and continuous data protection at an exceptional value necessary to support both goals.

    In April 2018, INFINIDAT commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study to illustrate the economic benefits of implementing the InfiniBox for high performance, high capacity use cases including virtualization, analytics, cloud services and backup. Forrester uncovered some remarkable results and shares them with you in this comprehensive presentation.

    The study revealed the following business benefits:

    • Payback in less than six months
    • A 125% Return on Investment (ROI)
    • An investment with a very positive Net Present Value (NPV) of $10.2M
    • A total benefit of $18.4 million over three years
    • Downtime cost savings of over $1.1 million
  • The role of threat intelligence in an effective security operation
    The role of threat intelligence in an effective security operation Oleg Glebov, Threat Management and Defense Solution Leader, Alexander Liskin, Heuristic Detection Group Manager Kaspersky Lab Jul 31 2018 10:00 am UTC 60 mins
    Experts predict a busy year for cybersecurity threats… a rise in general and accidental malware infections, an increased risk of targeted ransomware attacks and new types of malware and malicious tools all lie ahead.

    Threat intelligence is a key component of any effective security operation. Without exceptional, coordinated threat intelligence, cyber threats simply can’t be reliably identified or stopped.

    Kaspersky Lab is hosting a webinar on the key role of threat intelligence in an effective security operation. The webinar will be presented by Oleg Glebov, solution leader for our Threat Management and Defense portfolio and Alexander Liskin, Kaspersky Lab anti-malware research expert.

    The webinar is aimed at anyone with a professional interest in cybersecurity and threat intelligence, in particular IT security officers, incident response specialists and SOC analysts.

    The webinar will cover the following topics:
    • the current threat landscape – and the methods cybercriminals use to evade detection;
    • the critical role threat data feeds play in protecting you from attack;
    • the increasing importance of proven, established sandboxing – and the capabilities of Kaspersky Lab’s Cloud Sandbox;
    • APT and Financial Threat Intelligence Reporting;
    • how our experts use Threat Lookup for incident investigation;
    • Kaspersky’s Threat Intelligence Services – and how we can help build a comprehensive Incident Response (IR) framework with our Threat Intelligence Portal and Cloud Sandbox.
  • ПОСТРОЕНИЕ АРХИВА ДАННЫХ НА БАЗЕ ПО COMMVAULT
    ПОСТРОЕНИЕ АРХИВА ДАННЫХ НА БАЗЕ ПО COMMVAULT Дмитрий Иванюк, Технический эксперт, MONT Jul 31 2018 11:00 am UTC 60 mins
    Уважаемые коллеги и партнеры,

    Приглашаем принять участие в вебинаре, посвященному обзору решения Commvault по архивам данных.

    Решение по архивации данных от Commvault это:
    • эффективное, удобное, надежное и безопасное хранение данных, соответствующее корпоративным политикам
    • единый, последовательный и масштабируемый подход к архивации данных
    •легкий перенос заархивированных данных в публичные или частные облака
    • удобное управление данными из единой консоли для применения корпоративных политик архивирования
    • гибкость и масштабируемость, позволяющая адаптироваться к меняющимся потребностям бизнеса

    Присоединяйтесь к вебинару 7 июня, чтобы узнать подробнее.
    Время проведения: 11.00-11.30 МСК
    Регистрация откроется за 15 минут до начала
  • Minimieren Sie den Impact einer Cyber-Attacke durch 24x7 Monitoring
    Minimieren Sie den Impact einer Cyber-Attacke durch 24x7 Monitoring Nicole Groke (Enterprise Account Manager) & Lars Kroll (Cyber Security Strategist) Jul 31 2018 12:00 pm UTC 75 mins
    Symantec Managed Security Services – Minimieren Sie den Impact einer Cyber-Attacke durch 24x7 Monitoring unserer Experten, die kontinuierlich die Bedrohungslage analysieren.

    Lernen Sie Symantec Managed SIEM (Managed SOC) + Incident Response Services kennen und diskutieren Sie mit unseren Experten über Ihre jahrelangen und ggf. kostenintensiven SIEM-Ansätze.
  • Time to Change: A Modern, Scale-Out Approach to Backup and Recovery
    Time to Change: A Modern, Scale-Out Approach to Backup and Recovery Phil Wandrei, Director Solutions Marketing and Shawn Smucker, Director Office of CTO, Commvault Jul 31 2018 12:00 pm UTC 60 mins
    You need a modern solution that will scale easily, is cost effective and is simple to operate. You own Commvault and we understand it is not your only option.
    Commvault now delivers the power and simplicity of its data protection software on a scale-out infrastructure to provide greater scale, performance, and availability. Join us as we discuss how you can extend the benefits of our software through Commvault HyperScale™ Technology.  
    In this webinar, you will learn how to: 
    · Maximize your current investment in Commvault software with a scale-out infrastructure
    · Increase availability, flexibility, and resiliency to meet current and future business needs
    · Deliver predictable performance and greater scale; eliminating disruptive upgrades
    · Choose your hardware platform; either appliance or software with a reference design
    · See how Commvault software has evolved to make backup/recovery operations simpler
    Now is the time to modernize backup/recovery and unlock the benefits of a scale-out infrastructure. Register today and learn how Commvault software can take you to the next level of data protection. 
  • How to "Future Proof" Data Protection for Organizational Resilience
    How to "Future Proof" Data Protection for Organizational Resilience W. Curtis Preston, Sr. Analyst, @ Storage Switzerland & Lilac Shoenbeck, VP Product Marketing @ Carbonite Jul 31 2018 3:00 pm UTC 60 mins
    Expectations of IT’s ability to return mission-critical applications to production are higher than ever. The data protection process shouldn’t always be playing catch up to the recovery of production data. We’ll be outlining three fundamental steps to ensuring that IT has all the elements needed to evolve the data protection process. Hear from thought leaders in the industry and learn how you can develop a future-proof protection strategy that suits your business needs.

    Presenter: George Crump, Storage Switzerland
  • Close the Gaps: Managing, Prioritizing, and Addressing Cyber Risk in Enterprises
    Close the Gaps: Managing, Prioritizing, and Addressing Cyber Risk in Enterprises Jon Oltsik, Sr Principal Analyst at ESG & Karim Toubba, CEO of Kenna Security Jul 31 2018 6:00 pm UTC 45 mins
    Cyber risk management is no easy task. Why? Because while security teams may know about these vulnerabilities, they often lack the right amount of context to determine which vulnerabilities pose the greatest risk to the organization. Without this, the security team can’t appropriately prioritize which vulnerabilities should be remediated first.

    Join Kenna Security for our next webinar - “Close the Gaps: Managing, Prioritizing, and Addressing Cyber Risk in Enterprise Organizations,” with Jon Oltsik, senior principal analyst at ESG and Karim Toubba, CEO of Kenna Security.

    In this webinar, we’ll cover:

    - Findings from the July 2017 ESG Research Report, Cybersecurity Analytics and Operations in Transition
    - The challenges facing leadership teams in traditional methods of vulnerability management
    - Why more security data doesn’t always lead to better decisions
    - How the Kenna Security Platform can enable you take a risk-based approach to vulnerability management and help teams work cross-functionally to prioritize and mitigate cyber risk

    Discover the next wave of risk-based reporting and gain operational efficiency to maximize return on your risk mitigation efforts.
  • Why do Orgs Need a Cyber Resilience for Email Strategy?
    Why do Orgs Need a Cyber Resilience for Email Strategy? Matthew Gardiner, Director of Product Marketing – Security Portfolio, Mimecast Jul 31 2018 6:00 pm UTC 60 mins
    If you find yourself to be among the 44% of organizations who currently have no plans to adopt a cyber resilience strategy, your business is at risk. Threat protection should be part of your approach, but it’s simply not enough. You need to consider every stage of an attack.
     
    This means having:
    -          The right security services in place before an attack happens
    -          A durability plan to keep email and business operations running during an attack or failure
    -          The ability to recover data and other corporate IP after an incident or attack occurs
     
    Join this webinar for an overview of the ways in which organizations can proactively mitigate security threats, ensure continuity during attacks, and provide rapid recovery in the case of downtime or data hostage scenarios.
     
    Presenter Info:

    Matthew Gardiner is a Director of Product Marketing at Mimecast and is currently focused on email security, phishing, malware, and cloud security. With more than 15 years focused in security, Matthew’s expertise in various roles includes threat detection & response, network monitoring, SIEM, endpoint threat detection, threat intelligence, identity & access management, Web access management, identity federation, cloud security, and IT compliance at RSA, Netegrity, and CA Technologies. Previously he was President and a member of the board of trustees of the security industry non-profit, the Kantara Initiative. Matthew has a BS in Electrical Engineering from the University of Pennsylvania and an SM in Management from MIT's Sloan School of Management.