Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • HPE Recovery Manager Central : Delivering a DataOps experience for Hybrid Cloud
    HPE Recovery Manager Central : Delivering a DataOps experience for Hybrid Cloud
    Bharath Ram Ramanathan, Principal Technical and Solutions Marketing Manager - HPE Storage Recorded: Mar 22 2019 60 mins
    Data is the lifeblood of business. A company’s data is usually copied at least once, and often multiple times, to meet the needs of various use cases such as clones for test/dev or analytics, backup copies for data protection, archival copies for compliance, instant recovery copies, or, any particular set of data is likely to have spawned one or more copies. Copies are so important that they now consume 60% of total storage capacity for the average enterprise – even more than production data. While these copies are nearly always made for a good reason, in many organizations they have spiralled out of control, creating a copy data sprawl that is tough for IT to get its arms around, let alone manage.
    So how do you protect this important asset, grant copies to all who need it, and avoid paying for extra storage capacity – on-premises and in the cloud? HPE Storage’s Recovery Manager Central (RMC) for 3PAR and Nimble Storage platforms delivers a single-pane-of-glass for Copy Data Management and Data Protection for a variety of workloads such as VMware, Oracle, SQL Server, Exchange, SAP HANA and more. In this talk, we will cover how RMC delivers a DataOps experience for 3PAR and Nimble platforms with live demos.
  • Career Conversations w/ Merissa Villalobos & Kristin Parke from NCC Group
    Career Conversations w/ Merissa Villalobos & Kristin Parke from NCC Group
    Jessica Gulick, CEO, Katzcy, MBA | PMP | CISSP Recorded: Mar 21 2019 55 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Guest: Merissa Villalobos & Kristin Parke from NCC Group
  • Can ILOVEYOU Still Infect You?
    Can ILOVEYOU Still Infect You?
    Rene Kolga, Sr. Director of Product and Robert Zamani, Director, Solutions Architect, Nyotron Recorded: Mar 21 2019 49 mins
    Most security solution buyers assume they’re protected against known malware. Numbers like 99.9% are common in vendors’ marketing materials. Hence, efficacy conversations tend to focus instead on the solution’s performance against the unknown, zero-day threats. However, with between half a million and one million new pieces of commodity malware created every day, how are antivirus solutions keeping up? Where is this database of signatures, hashes, reputation and behavior stored for over a billion of known pieces of malware? Is the 99.9% number an illusion or reality?

    In this webinar we will leverage a study of three leading antivirus products against 60,000 pieces of known new and old malware. The results will surprise you...

    Does the ILOVEYOU virus from the year 2000 still pose a threat? You’ll have to join this webinar to find out.
  • Want 100% Storage Uptime for Years? City Of Carmel Will Share How They Did It
    Want 100% Storage Uptime for Years? City Of Carmel Will Share How They Did It
    Brian McClesky, Systems Engineer-Mirazon, Rebecca Chike, Systems Supervisor-City of Carmel Recorded: Mar 21 2019 57 mins
    Join us to hear the story of City of Carmel and Mirazon. City of Carmel is one of the fastest growing cities in Indiana. Carmel was voted #1 in American's Best Places to Live by Money magazine. CNBC voted Indianapolis/Carmel ”Best Cities to Relocate to in America”. Over the last two decades the city has almost tripled its population and this growth has forced their IT infrastructure to expand rapidly.

    Thanks for Mirazon’s recommendations they found the perfect solution that helped them modernize their infrastructure to provide 24/7 data access for Fire and Police department’s critical systems. For nearly a decade, City of Carmel has experienced Zero storage-related downtime. Even through maintenance windows, their VM’s have achieved 100% uptime.

    The best part is, they have done with budget-friendly backend disks and allowed Software-defined storage to do all the heavy lifting. They have enjoyed Enterprise level active/active HA functionalities across 2 different buildings, running a VMware stretch cluster with HPE Servers connected via 10Gb and HP MSA backend enclosures.

    Learn how City of Carmel has been able to stay running without downtime for almost 10 years and have saved $75,000 by extending their hardware life expectancy thanks to their secret sauce.

    In this webcast you will discover how City of Carmel:
    • Has experienced 100% uptime for nearly 10 years
    • Extended their storage life expectancy by 80% and saved $75k
    • Replaced every storage component without doing a forklift and replace
  • Close the gap in your ransomware defense
    Close the gap in your ransomware defense
    Gil Cattelain, Product Marketing Manager and Joe Leung, Product Marketing Manager, Micro Focus Recorded: Mar 21 2019 32 mins
    Ransomware is a global epidemic that is spreading like wildfire. According to the 2019 CyRiM (Cyber Risk Management) Report, ransomware could cause up to $193B in economic damage. The FBI estimates that ransomware infects more than 100,000 computers a day around the world. And in one example, The City of Akron, Ohio experienced public service interruptions, including disruption to the processing of credit card payments, as result of a ransomware attack.

    Organizations can easily neutralize the threat with a holistic 2-step approach by first strengthening protections against intrusions from the start, and by quickly resolving issues with an up-to-the minute copy of data needed to restore systems back to operational status, should the virus manage to get through.

    Join this webinar to learn about:

    • Ransomware challenges and impact
    • Why malware detection alone is not enough
    • How to close the gap with holistic endpoint data and device management
  • [Earn 1 CPE] Implementing a NIST Framework for Adaptive Cybersecurity
    [Earn 1 CPE] Implementing a NIST Framework for Adaptive Cybersecurity
    Colin Whittaker, with Sam Abadir, Lockpath; Allan Liska, Recorded Future; and Gina Mahin, Lynx TP; David McNeely, Centrify Recorded: Mar 21 2019 79 mins
    In an age where cybersecurity threats are an everyday fact of life, organizations are looking for solutions that enable them to predict, prepare and react to the shifting landscape of cyber threats, and implementation of adaptive cyber security strategies is becoming inevitable to achieve that goal.

    Adaptive cyber security methods allow for the simultaneous defense of multiple attack surfaces against this new wave of advanced cyber attacks targeting businesses and services. The NIST Cybersecurity Framework enables organizations — regardless of size, degree of cybersecurity risk, or cybersecurity sophistication — to apply the principles and best practices of risk management to improving security. Attend this CPE webinar to gain insights on:

    - Getting a clear picture of the current health of your organizations' defenses
    - Defining your security road map using NIST CSF as a framework
    - Conducting gap analysis and executing remediation actions
    - Mapping the NIST CSF with security controls and built-in reporting templates that align with the framework.
  • UK supermarkets - the longest cold war?
    UK supermarkets - the longest cold war?
    ISM Fellow - Andrew Grant Recorded: Mar 21 2019 31 mins
    Why you should attend:

    An up to date analysis of the UK supermarket sector - mergers, acquisitions, consolidation, relentless pressure - but why no all-out price war for the past 15 plus years - would Amazon's entry be the final straw?

    What you will learn

    •Unmissable for anyone selling into the UK supermarkets
    •Get yourself fully up to date with the latest changes that could impact your business
    •Delivered by an acknowledged industry expert
  • Part 2 SQL & Win Server End of Support : Migration Options and Cloud Migration
    Part 2 SQL & Win Server End of Support : Migration Options and Cloud Migration
    David Bloxham - SoftwareONE; Kaz Traverso - SoftwareONE; Paul Manaton - RiverMeadow Recorded: Mar 21 2019 26 mins
    With support for SQL Server 2008 and 2008 R2 ending on 9th July, 2019 and Windows Server January 2020, what are your upgrade options?

    End of support means the end of security updates, which can cause security and compliance issues and put applications and business at risk so it’s important to create an upgrade transition plan.

    SoftwareONE and migration acceleration specialists, RiverMeadow, will discuss the key considerations to ensure a successful transition including:

    •What are the available options: on-premise upgrades, migrate to cloud or do nothing?
    •Best practice methodologies
    •Cloud tooling options for migration acceleration
    •Cloud migration framework for success

    Organisations have options. Each is worth exploring and you may use multiple options to move workloads from SQL Server, depending on the workload.

    This webinar will primarily focus on cloud migration.
  • Commvault Complete Backup & Recovery
    Commvault Complete Backup & Recovery
    Bruno Gauthier Recorded: Mar 21 2019 49 mins
    L’offre Commvault est l’offre de sauvegarde/restauration la plus complète du marché. Elle permet de répondre à l’ensemble des besoins actuels et futurs autour de la protection des données :
    •Sauvegarde & restauration complètes – tous fichiers, applications, VM, Cloud ;
    •Archivage fichiers et VM ;
    •Chiffrement, déduplication, compression ;
    •Protection des postes clients ;
    •Protection et archivage des boites aux lettres (on premise ou cloud) et autres applications cloud ;
    •Plan de secours – Failover/Failback/conversion ;
    •Gestion des snapshots hardware ;
    •Réplication et synchronisation en temps réel des VMs (LiveSync) ;
    •Reporting opérationnel complet ;
  • Expert Q&A 5 Steps to Implementing Security Automation
    Expert Q&A 5 Steps to Implementing Security Automation
    Joe Schreiber, Technical Director, Business Development, Tufin & Karen Crowley, Sr. Product Marketing Manager, Tufin Recorded: Mar 20 2019 46 mins
    Join automation expert Joe Schreiber on March 20th as he shares his experiences automating himself out of a job (in a good way), and discusses where to start and how to avoid risk.

    Joe will present his five steps and answer questions from the audience on how to:

    Collaborate with the rest of your team on automation
    Organize your multi-vendor toolbox and use APIs to ensure success
    Empower your teams to write reusable, value-driven code
    Leverage modern applications in containers, microservices, and serverless environments
    Got questions? Send them to Joe ahead of time to be included in the discussion.
  • Configuration Compliance Management for 2020 and Beyond
    Configuration Compliance Management for 2020 and Beyond
    Sam Abadir, Lockpath Recorded: Mar 20 2019 40 mins
    Planning and managing for hardened, secure assets is a key requirement for managing IT Risk and is mandated by many compliance sources such as PCI, NIST, FISMA and HIPAA – yet many organizations are not fully assessing their IT hosts and applications for secure configuration. In this live webinar, Lockpath’s Sam Abadir will share what configuration compliance management for 2020 and beyond looks like, including:

    •What configuration compliance management encompasses
    •Who should care about secure configuration management
    •Why organizations are not doing this today and how this impacts the business beyond IT


    Discover the future for configuration compliance management by attending this educational webinar. Register now!
  • Smart Energy in the Data Center
    Smart Energy in the Data Center
    Andy Lawrence, Executive Director of Research, Uptime Institute Intelligence Recorded: Mar 20 2019 53 mins
    Smart energy is a trending concept in a field crowded with competing and complementary terms, technologies, and approaches – but has the business case yet been made? Andy Lawrence will share his views on where this technology segment is headed.
  • Protect Your Hybrid Workloads on VMware
    Protect Your Hybrid Workloads on VMware
    Seyi Verma, Director of Product Marketing, Druva Recorded: Mar 20 2019 50 mins
    It's no secret that managing the backup and restore of your virtual machines on-premises and in the cloud is unnecessarily complex. Managing multiple vendors and disparate solutions not only increases your costs and degrades visibility, but it also puts your organisation's critical data at risk.

    Luckily, there's a better way with an all-in-one, cloud-native solution.

    Join our webinar and learn how Druva can solve your VMware data protection challenges, including:
    - Reducing your overall storage footprint by consolidating your data
    - Streamlining data management and protection, reducing costs by up to 60%
    - Meeting your RTO and RPO requirements for better business continuity
    - Leveraging enterprise cloud backup for instant disaster recovery
  • Safe, Secure, Convenient: The 30-Minute Enterprise File Sharing Buyer’s Guide
    Safe, Secure, Convenient: The 30-Minute Enterprise File Sharing Buyer’s Guide
    Nick Scholz, Robin Redgrave and Devadas Kovilakath, Micro Focus Recorded: Mar 20 2019 48 mins
    As companies undergo digital transformations—with a laser focus on simplifying operations and boosting productivity—users are being asked to get more done faster and with fewer resources.

    In this climate, it’s not surprising that employees independently turn to cloud file sharing services they may already be using at home to help them sync and share their files and get their work done.

    But these consumer-grade services lack the security, control, and management features that many organizations need to protect themselves from data loss, breaches, and business continuity failures, so many IT leaders are stuck: how do they enable productivity and ease the sharing of critical files without compromising their security and compliance needs?

    Join Nick Scholz, Robin Redgrave and Devadas Kovilakath to see what experts are saying about what to look for in an EFSS solution, and how to figure out which one fits your needs.

    You’ll learn:
    • What features help users adopt
    • The state of the EFSS landscape
    • The benefits and shortfalls of Cloud vs. On Premises solutions
    • How to maximize security AND collaboration
    • And more!
  • How to Build a Simple and Profitable Business Through CSP Indirect
    How to Build a Simple and Profitable Business Through CSP Indirect
    Paul O'Connor, Global Lead CSP Indirect Program; Clare Richards, Partner Business Manager; Kathy Jones, SPLA Business Manager Recorded: Mar 20 2019 23 mins
    If you are a Microsoft partner that falls into one of the following categories and you are unsure what benefits the new Microsoft CSP Indirect program brings to you, we recommend joining this webinar:

    •System Integrator (SI) Partners – these partners will now be able to offer software and support to customers that they were not able to access in the past providing the partner with new sources of revenue and a differentiated value proposition.

    •Hosters/SPLAs – the CSP Indirect program allows these partners to forego their existing infrastructures, which may not be viable long-term, and work through SoftwareONE and Microsoft to help end-customers.

    •ISVs – providing help with scale and reach; working with SoftwareONE’s CSP Indirect team can help them get to market faster and at a greater scale ensuring faster returns for ISV startup stakeholders.

    Finding new business in your customer base this year may seem daunting. Building a new practice may be a costly venture that won’t return value to the business for years. However, delivering long-term customer value is paramount and critical to growing your business.

    SoftwareONE is a certified member of the CSP Indirect program and it’s an exciting time for those in the Microsoft ecosystem, benefiting partners and end customers alike.

    Find out more about the new opportunities available to you and specifics about SoftwareONE’s additional value and services delivered through our unique CSP Indirect program called ONEClub.
  • ICS threats in H2 2018: deep dive into attack statistics and security weaknesses
    ICS threats in H2 2018: deep dive into attack statistics and security weaknesses
    Kirill Kruglov, senior security researcher at Kaspersky Lab ICS CERT Recorded: Mar 20 2019 61 mins
    The webinar will be helpful for those who wish to know more about current ICS cyberthreats.

    The webinar’s speaker Kirill Kruglov, senior security researcher at Kaspersky Lab ICS CERT, will talk about major threats relevant to industrial control systems that Kaspersky Lab ICS CERT identified in H2 2018. In addition to discussing general statistics on malicious attacks that were detected and prevented by Kaspersky Lab products on industrial computers globally, he will offer a deeper dive into the attacks we saw, TTPs used by attackers, and root cause analysis of major security weaknesses we discovered. In addition, Kirill will discuss the methodology used to collect and analyze the data, which will help the webinar participants to better understand what these figures mean.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Recorded: Mar 20 2019 85 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the Verizon Insider Threat Report and the current cybersecurity threat landscape.

    We'll cover:
    •The time it takes to discover a breach after the first action
    •5 insider threat types identified by our caseload
    •Top 3 insider threat motivations
    •Top industries suffering sensitive data breaches

    Our Verizon Threat Research Advisory Center presenters will be:
    •John Grim, Senior Manager, Investigative Response - America
    •Domingo Jesus Alvarez-Fernandez, Senior Dark Web Hunter, Threat Intelligence
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Webinar: Un Piano Applicabile Per Segmentare la Tua Rete
    Webinar: Un Piano Applicabile Per Segmentare la Tua Rete
    Flavio Di Cosmo, Pre-Sales Engineer SEEMEA Recorded: Mar 20 2019 28 mins
    Una rete segmentata rende operativa le policy di sicurezza, consente uno stato di compliance continua con il minimo sforzo e offre opzioni di mitigazione per gli attacchi informatici. Ma la segmentazione della rete non è un compito facile!

    Unisciti agli esperti di Tufin il 20 Marzo 14:30 mentre condividono consigli utili per la segmentazione della rete, tra cui:

    •Insidie da evitare durante la creazione di una strategia di
    segmentazione
    •Framework per la segmentazione
    •Linee guida per l'applicazione e il mantenimento di una rete
    segmentata
  • 2019 Global Threat Report: Adversary Tradecraft and The Importance of Speed
    2019 Global Threat Report: Adversary Tradecraft and The Importance of Speed
    Adam Meyers: VP of Intelligence; Jennifer Ayers: VP of OverWatch and Security Response Recorded: Mar 20 2019 65 mins
    The 2019 CrowdStrike® Global Threat Report offers one the industry’s most comprehensive reports on today’s top cyber threats. The report combines CrowdStrike’s comprehensive global observations with real-world case studies. delivering deep insights on modern adversaries, and their tactics, techniques, and procedures (TTPs).

    Join us for a webcast featuring CrowdStrike VP of Intelligence Adam Meyers and VP of Falcon OverWatch™ Jennifer Ayers as they explore the global trends and observations revealed in the report. They will also offer actionable recommendations you can use to ensure your organization is ready to anticipate and defend against the most dangerous threats of tomorrow.

    Join this webcast to learn:

    - The most favored TTPs observed throughout 2018 as seen through the lense of MITRE ATT&CK™framework

    - Updates on global “breakout” time statistics, including observations on which adversaries showed the fastest tradecraft in 2018

    - How nation-state adversaries continue to target dissidents, regional adversaries and foreign powers to collect intelligence for decision-makers

    - How cybercriminals combine advanced, targeted attack techniques with ransomware to achieve massive financial payoffs via “Big Game Hunting”

    - How the eCrime ecosystem continues to evolve and mature, showing increased collaborations between highly sophisticated criminal actors
  • Séminaire en ligne: Plan d'action pour la segmentation de votre réseau
    Séminaire en ligne: Plan d'action pour la segmentation de votre réseau
    Nicolas Liard, Pre Sales Engineer France, Benelux Recorded: Mar 20 2019 49 mins
    Un réseau segmenté opérationnalise votre politique de sécurité, permet un état de conformité continue avec un minimum d'effort et fournit des options d'atténuation des cyberattaques. Mais la segmentation du réseau n’est pas une tâche facile !

    Rejoignez les experts de Tufin pour partager des conseils pratiques sur la segmentation du réseau, notamment:

    • Les pièges à éviter lors de la création d’une stratégie de segmentation
    • Cadre de segmentation
    • Lignes directrices pour appliquer et maintenir un réseau segmenté
  • How to Create an Infrastructure-less Backup Strategy
    How to Create an Infrastructure-less Backup Strategy
    Storage Switzerland, Actifio Recorded: Mar 19 2019 56 mins
    Designing architectures to backup primary storage as well as provide rapid recoveries is a challenging task that most IT professionals need to face. It is even more challenging in the face of a rapidly growing data set, increasing demand for shorter recovery times and new threats like ransomware. The cost for IT to design, implement, maintain and upgrade these infrastructures can consume a big part of the IT budget. Additionally, the time required for each of these steps is something that most IT teams simply don’t have.

    As a result, many organizations are looking for ways to move to an infrastructure-less architecture where most of the physical hardware is in the cloud as well as the software intelligence. The goal is to move data protection from a very unpredictable CAPEX cost to a normalized OPEX cost. There are an increasing number of cloud solutions that claim an infrastructure-less solution but many of these solutions force the organization to give up many of the capabilities they’ve come to count on or force them into long-term cloud relationships.

    Attendees to the webinar will learn the challenges of maintaining an on-premises infrastructure, why current cloud solutions fall short and what IT really needs from an infrastructure-less solution.
  • The Email Security Goal: ONE Single Solution
    The Email Security Goal: ONE Single Solution
    Ken Bagnall, Vice President, Email Security, FireEye, moderated by Christopher Porter, Chief Intelligence Strategist, FireEye Recorded: Mar 19 2019 50 mins
    FireEye research recently indicated that an average of 14 thousand malicious emails per month were being missed by most email security solutions. Email is the number one threat vector and with impersonation and credential phishing or URL-based attacks on the rise your email security solution must keep up with the evolving threat landscape. In this webinar:

    -Get a brief overview on the latest email threat trends
    -Learn about the must haves for email security solutions and the benefits of having one provider
    -Find out about additional email security capabilities that can help you have an adaptable solution
    -Hear about a use case where FireEye helped detect and block impersonation techniques that the incumbent solution missed
  • How to Leverage the Cloud to Consolidate IT Infrastructure
    How to Leverage the Cloud to Consolidate IT Infrastructure
    Adam Sharp, CIO, International, TBWA | Andy Hardy, VP, EMEA, Nasuni Recorded: Mar 19 2019 35 mins
    Learn from the International CIO of one of the top 10 ad agencies in the world how consolidating infrastructure has become key to streamlining costs, enhancing productivity, and increasing cash flow.

    With operations spanning 295 offices and 11,000 employees, TBWA’s IT staff faced increasing demands to bring storage and data protection costs under control without reducing flexibility or security. Join Adam Sharp, CIO International for TBWA, The Disruption® Company, and Adweek’s 2018 Global Agency of the Year, as he discusses why his team opted for a “disruptive” cloud strategy of its own and what the results to date have been:

    - How the business strategy drove TBWA to the cloud
    - What key decisions enabled them to reduce costs and meet capacity requirements at the same time
    - How they went about a worldwide roll-out of their cloud storage strategy
    - Why multi-cloud capability is important
  • What do you get when you cross a CEO and a CISO’s strategy
    What do you get when you cross a CEO and a CISO’s strategy
    Mark Chaplin, Principal, ISF Recorded: Mar 19 2019 45 mins
    While the board ‘get cyber’, questions remain around embedding cyber risk management into business strategy execution. For many CISOs, strategy alignment represents the best opportunity to engage with the board and ensure a business-driven approach to managing cyber risk.

    So how should business leaders develop, update and execute business strategy with so many cyber-related implications? How can organisations meet their business goals, against a backdrop of increasing cybersecurity costs, greater regulatory scrutiny and increased frequency and magnitude of data breaches?

    In this webinar, Mark Chaplin, Principal, ISF will discuss the significance of aligning security strategy with business strategy. Mark will draw on executive engagement, exploring the essential factors for success and highlighting the pitfalls to avoid.
  • Die Ergebnisse des Symantec Internet Threat Security Report (ISTR), Volume 24
    Die Ergebnisse des Symantec Internet Threat Security Report (ISTR), Volume 24
    Candid Wüest (Sr. Threat Researcher at Symantec); Thomas Hemker (CISSP, CISM, CISA) Recorded: Mar 19 2019 63 mins
    Symantec Internet Security Threat Report: Cyber-Kriminelle stehlen Millionen mit Hilfe von Formjacking; setzen auf destruktive Malware und bereiten sich auf Cyber-Kriegsführung vor –
    eine ernstzunehmende Bedrohung für Unternehmen und Verbraucher


    Dieser aktuelle Symantec Threat Report zeigt eine steigende Zahl ambitionierter, zerstörerischer und heimtückischer Angriffe auf Unternehmen:

    •Fast jede zehnte Angriffsgruppe, die gezielte Attacken verübt, setzt destruktive Malware ein und stoppt so Unternehmensabläufe. Diese Zahl stieg im Vergleich zu 2017 um 25%
    •Cyber-Kriminelle optimieren bewährte Taktiken, darunter Spear-Phishing, Hijacking legitimer Tools und bösartige E-Mail-Anhänge. Living of the Land (LotL)- und Supply Chain-Angriffe sind weiterhin eine signifikante Bedrohung. Der Einsatz bösartiger Powershell-Skripte stieg im vergangenen Jahr um 1.000%
    •Infektionen mit Ransomware stiegen in Unternehmen um zwölf Prozent

    •Cloud-Ressourcen sind immer häufiger leichte Ziele für digitale Diebe: Mehr als 70 Millionen Datensätze aus schlecht konfigurierten S3 Public Cloud-Speicher-Buckets wurden gestohlen oder abgezapft

    •Eine zunehmende Anzahl an Angreifern kompromittiert operative Systeme und industrielle Kontrollsysteme (Industrial Control Systems, ICS), um sich möglicherweise auf Cyber-Kriegsführung vorzubereiten
  • Webinar: Das Reifegradmodell für die Verwaltung von Sicherheitsrichtlinien
    Webinar: Das Reifegradmodell für die Verwaltung von Sicherheitsrichtlinien
    Marco Miska, Technical Account Manager EMEA Mar 26 2019 9:00 am UTC 60 mins
    Ihre Teams haben Schwierigkeiten, mit der Häufigkeit von Netzwerksicherheitsanfragen Schritt zu halten, während sie gleichzeitig versuchen die Agilitätsinitiativen Ihres Unternehmens zu unterstützen und die Sicherheit zu wahren.

    Sie kennen die Vorteile der Automatisierung, fragen sich aber wahrscheinlich: "Wo fangen wir an?"

    Besuchen Sie die Experten von Tufin am 26. März um 10.00 Uhr, um nützliche Tipps für den Einstieg in die Zero-Touch-Automatisierung zu erhalten:

    • Warum aktuelle Ansätze nicht funktionieren
    • Wie können begrenzte Ressourcenherausforderungen überwunden werden?
    • Die Schritte, die Sie unternehmen müssen, um das ultimative Ziel zu erreichen: Zero-Touch-Automatisierung
  • Otwórz. Kliknij. Daj się zhakować
    Otwórz. Kliknij. Daj się zhakować
    Marcin Kacprzak, Senior Sales Engineer & Damian Hoffman, Senior Sales Engineer Mar 26 2019 10:00 am UTC 45 mins
    Kliknąć, czy nie? Każdego dnia użytkownicy poczty elektronicznej zadają sobie podobne pytanie. Wg najnowszych statystyk 1 na 101 wszystkich wiadomości email zawiera złośliwą treść, która może prowadzić do infekcji zarówno pojedynczego komputera, jak i całej organizacji.

    Podczas naszego webinarium dowiesz się jak wykrywać i blokować podejrzane wiadomości email oraz poznasz szczegóły efektywnej strategii ochrony poczty elektronicznej przed takimi atakami jak:
    ·Spear phishing
    ·Impersonation
    ·W2 Scam
  • ISM Webinar: Lack of Pipeline - The number 1 reason you are not hitting Quota
    ISM Webinar: Lack of Pipeline - The number 1 reason you are not hitting Quota
    ISM Fellow, Steve Burton Mar 26 2019 11:00 am UTC 30 mins
    Let’s face it… selling isn't easy. Sometimes it seems easier to lure a ravenous lion with a lettuce leaf than hit your monthly sales target. Even the best, most seasoned salespeople will feel pressurized from time to time and result in them not hitting the target. It’s this pressure that spawns excuses – excuses that detract attention away from a salesperson’s performance (or lack of it).

    I hate hearing excuses; it feels like people are trying to blame others rather than accepting their own failings. But what are the top excuses you’ll hear from a salesperson?
  • 5 Critical Enterprise Cloud Backup Capabilities
    5 Critical Enterprise Cloud Backup Capabilities
    Storage Switzerland, Carbonite Mar 26 2019 5:00 pm UTC 60 mins
    The cloud seems like a logical destination for backup data. It is by definition off-site, and the organization no longer needs to worry about allocating valuable floor space to secondary data storage. The problem is that most cloud backup solutions fall short of delivering enterprise class data protection.

    Most cloud backup solutions are too complicated to set up and upgrade, don't provide complete platform support, don't provide flexible recovery options, can't meet the enterprises RTO/RPO requirements and don't provide a class of support that enables organizations to lower their operational expense.

    In this live webinar Storage Switzerland and Carbonite discuss the five critical capabilities that enterprises, looking to move to cloud backup, need to make sure their solution has.

    Join us for this live event to learn:

    1. Why switch to the cloud for enterprise backup?
    2. The five critical capabilities enterprises MUST have in cloud backup solutions. What they are and why enterprises need them.
    3. Why and where most solutions miss the mark
    4. How Carbonite Server delivers the five critical capabilities
  • Modernize Data Protection With Flash + Cloud
    Modernize Data Protection With Flash + Cloud
    Marco Bal, Principal Systems Engineer - Benelux & Nordics Mar 27 2019 1:00 pm UTC 45 mins
    While it is still widely used, Disk to Disk to Tape (2D2T) architectures have long been optimized for backup performance, with little regard for the true goal – recover data when and where it’s needed- within business Service Level Agreements (SLA’s).

    Tapes may relieve compliance concerns, but they lock data away, stranding any value residing in that data.

    Learn how data protection is about much more than just backup and how Pure Storage with the industry’s first Flash-to-Flash-to- Cloud (F2F2C) Object Engine solution taps the power of flash and cloud to modernize data protection. With Object Engine organizations can deploy a cloud-native solution with scale-out rapid recovery on premises, benefit from cloud economics and reuse data with cloud apps such as analytics and test/dev.

    During this technical webcast you will find out how Object Engine can help your organization to rapidly restore mission critical data exactly where it’s needed – and within an SLA.
  • Parsing out threat intelligence sources with Kaspersky CyberTrace
    Parsing out threat intelligence sources with Kaspersky CyberTrace
    Ilya Markelov, CyberTrace Product Manager and Artem Karasev, Senior Product Marketing Manager Mar 27 2019 2:00 pm UTC 60 mins
    Our webinar is dedicated to the recent release of CyberTrace, our threat intelligence fusion and analysis tool. During the event, you will learn how to:
    • Define key criteria when choosing threat intelligence sources
    • Determine if the specific feed is relevant for your organization
    • Overcome the challenges of integrating threat intelligence feeds with SIEM:
    - SIEM systems are unable to digest millions of threat indicators
    - Integrating threat intelligence feeds with SIEM is time-consuming and resource-hungry
    - Before matching observables against threat intelligence feeds, SIEM or TIP must expose the obfuscation techniques used by threats to hide malicious activities in logs - but it doesn’t usually do this, resulting in reduced feeds efficiency
    • Reduce false positive rates through whitelisting and filtering of the feeds
    • Effectively leverage threat intelligence if you don’t have SIEM
    • Distill and prioritize sweeping amounts of security alerts and identify alerts that should be escalated to IR teams using Kaspersky Threat Data Feeds and their context.
  • Complete Your Cloud Transformation - Store Your Data in The Cloud
    Complete Your Cloud Transformation - Store Your Data in The Cloud
    Storage Switzerland, HubStor, Osterman Research Mar 27 2019 5:00 pm UTC 60 mins
    (and live to tell about it)

    Organizations are moving to the cloud but according to a recent Osterman Research study, only 14% of companies have completed that transformation. The study clearly identifies data storage as an area where IT can easily accelerate their cloud transformation journey. Potentially more so than any other component, intelligently moving data to the cloud has the opportunity to significantly lower on-premises storage costs without the threat of impacting day to day operations.

    Join Storage Switzerland, HubStor and Osterman Research for our live webinar where we’ll discuss the results of the Osterman Research study, what it means for IT, and how IT can take advantage of that research to leverage the cloud to alleviate data management and data protection concerns.

    All pre-registrants will receive our exclusive eBook, “Understanding the Difference Between Data Protection and Data Management.” Sign up now and get your copy today.
  • 2019 Internet Security Threat Report (ISTR): The New Threat Landscape
    2019 Internet Security Threat Report (ISTR): The New Threat Landscape
    Nick Savvides, Chief Technology Officer, APAC, Symantec Mar 28 2019 5:00 am UTC 60 mins
    As ransomware shows early signs of decline, new forms of attack emerge to take its place. Stealthy techniques allow attackers to fly under the radar, placing enterprises at increasing risk.

    Join us as we discuss these trends and more:

    • Formjacking was the breakthrough threat of 2018, as cryptojacking and ransomware show signs of decline. However enterprises continue to face the problem of targeted ransomware.

    • Living off the land and supply chain attacks are now a staple of the new threat landscape.

    • Cloud users facing challenges on multiple fronts through data leaks from cloud storage and low-level chip vulnerabilities.

    • Targeted attack groups show increasing interest in operational targets; greater number of groups adopting destructive malware.

    Please join us. Register today.
  • Backup i archiwizacja Office 365 w praktyce
    Backup i archiwizacja Office 365 w praktyce
    Grzegorz Szostak, Presales Commvault, S4E Mar 28 2019 9:00 am UTC 75 mins
    Kompleskowa ochrona danych w chmurze ? Czy jest ona potrzebna oraz możliwa? Zapraszamy serdecznie na webinar poświęcony ochronie danych przechowywanych w ramach usługi Microsoft Office 365.
  • Lessons from a decade on the frontlines of cyber security | EMEA Spotlight
    Lessons from a decade on the frontlines of cyber security | EMEA Spotlight
    Stuart McKenzie, EMEA VP, FireEye Mandiant & Alister Shepherd, META Director Consulting Mar 28 2019 11:00 am UTC 45 mins
    Explore the latest developments behind today’s attacker techniques, behaviors, and motivations sourced from this year’s M-Trends 2019 Report, our annual publication based on FireEye Mandiant’s frontline investigations of the most interesting and impactful cyber attacks in 2018.

    This year will mark the 10th anniversary of M-Trends, giving us the perfect opportunity to a decade’s worth of cyber security developments.

    Join us for this webinar, as FireEye Mandiant experts discuss highlights and case studies from this year’s edition, including:

    • Evolving attack trends in today’s threat landscape
    • New advanced persistent threat (APT) groups that emerged in 2018
    • Regional case studies of real-world compromises
    • Best practices lessons learned from the front lines of incident response
  • The Cost of Ransomware on Business
    The Cost of Ransomware on Business
    Eric O’Neill, Cybersecurity expert Mar 28 2019 3:00 pm UTC 64 mins
    The world’s fastest growing threat to user data – ransomware – is the notorious malware strain that locks computer files using encryption and demands an online payment to restore access. In fact, close to $600 billion, or nearly one percent of global GDP, is lost to cybercrime each year.

    Despite how wily and sophisticated ransomware developers are becoming, you can apply proven methods and technologies to fend off their attacks, keep your business up and running, and remain compliant with industry and other regulations.

    Join ex-FBI operative and cybercrime expert, Eric O’Neill, to learn how ransomware became the world’s single largest security incident and what you can do to prevent these attacks, including:

    •How the most virulent ransomware strains operate
    •The most popular attack vectors used by ransomware
    •How ransomware became such a fast-growing threat
    •What steps you can take to defend against and recover from ransomware attacks
    •Why security and law enforcement experts advise against paying the ransom

    With a practical, proactive approach, you can fend off attacks and keep your data safe. Find out how so you don’t fall victim.
  • Webinar: Un plan aplicable para segmentar su red
    Webinar: Un plan aplicable para segmentar su red
    Alberto Maestre, Pre-Sales Engineer SEEMEA Mar 28 2019 3:00 pm UTC 60 mins
    Una red segmentada hace que las políticas de seguridad sean eficientes, permite un estado de cumplimiento continuo con el mínimo esfuerzo y ofrece opciones de mitigación para los ataques cibernéticos. ¡Pero la segmentación de la red no es una tarea fácil!

    Únase a los expertos de Tufin el 10.00am, 28 de marzo mientras comparte consejos útiles para la segmentación de la red, que incluyen:


    - Los errores que deben evitarse al crear una estrategia de segmentación
    - Framework para la segmentación.
    - Directrices para la aplicación y mantenimiento de una red segmentada.
  • Third-Party Risk Management Trends & Predictions
    Third-Party Risk Management Trends & Predictions
    Shawn Malone, Linda Tuck Chapman, Kelly White, Shane Deay Mar 28 2019 4:00 pm UTC 60 mins
    Managing vendors, third parties and business associates is one of the most challenging aspects of business. In this exclusive webinar, our panel of industry experts will share their perspectives of the current third-party risk management landscape and where it's headed. As an attendee you’ll learn the latest trends in third-party risk and top predictions in 2020. Discover the future of third-party risk management in this can't miss webinar.
  • Chat with Pat: Exploring the future of connected-RPA & Award Finalists
    Chat with Pat: Exploring the future of connected-RPA & Award Finalists
    Pat Geary, Chief Evangelist, Blue Prism | Matt Juden-Bloomfield, Head of RPA, Blue Prism Mar 28 2019 4:00 pm UTC 75 mins
    On March 28th, Matt Juden-Bloomfield, Head of RPA at Blue Prism, will be hosting our next webinar, where we’ll be announcing the customer winners of our prestigious Excellence in Enterprise RPA Awards. You’ll also have the chance to talk to Pat Geary, Chief Evangelist at Blue Prism, about the future of RPA.

    * A new generation of RPA trailblazers

    The Excellence in Enterprise RPA Awards is our annual celebration of RPA success, helping us to recognise the innovation and dedication of our growing customer base.

    We’ll be announcing the finalists of our customer awards and telling you how these RPA success stories have helped to drive the digital transformation and business efficiency of our leading RPA customers.

    * RPA: what's next?

    RPA has come a long way in the 17 years since Blue Prism first brought the innovation and efficiency of the Digital Workforce to the global market. And who better to talk about the future path of connected-RPA than Pat Geary, Chief Evangelist at Blue Prism, who coined the term and invented the industry back in 2012?

    Pat will be giving his key insights into the history and future direction of RPA, and will be answering your questions on the next stage of evolution when it comes to automation, digital transformation and the world of connected digital solutions.


    In this webinar you’ll:

    ● Find out who’s shortlisted in the customer awards at the Excellence in Enterprise RPA Awards
    ● Hear more on those customer success stories and the added value of connected-RPA
    ● Hear from Pat Geary, Blue Prism’s Chief Evangelist, about the future path of the Blue Prism product and the world of automation
    ● Take part in a live-audience Q&A with Pat Geary and Matt Juden-Bloomfield, Head of RPA, Blue Prism.

    If you have a burning RPA-related question to ask, make sure to pre-register and join us on March 28th for this webinar. If you can’t make it on the day, you can easily watch a recording of the session from our webinar page, after the event.
  • Evading Extinction: Migrating Legacy Archives
    Evading Extinction: Migrating Legacy Archives
    James Gibson, Ortana and Janet Lafleur, Backblaze Mar 28 2019 5:00 pm UTC 45 mins
    Is your content stuck on a dying archive platform? You may see the signs coming: the vendor increases support charges, product enhancements slow down and marketing ceases. Once the rumors start, it won’t be long before the vendor announces end-of-life plans. If decades of your content are archived in a closed-format, proprietary platform you’ll need to migrate immediately, before it’s too late.

    Join this webinar with experts from Ortana and Backblaze and learn how to:
    - Migrate even the largest libraries in short timescales, with zero down time
    - Preserve valuable editorial metadata during the migration process
    - Use AI based image detection and speech to text to augment metadata
    - Choose the right mix of formats and storage for your new, everlasting archive
  • Welcome to the Future of Your Digital Archive
    Welcome to the Future of Your Digital Archive
    Brian Campanotti, CEO cloudfirst.io former CTO Front Porch Digital + David Phillips, M&E SA, Cloudian former NBC architect Mar 28 2019 5:00 pm UTC 60 mins
    Legacy Content Management Systems (CMS) such as DIVA (DIVArchive) have become cumbersome and costly archive targets.

    Join Cloudian, CloudFirst, and Ergonomic Group on March 28th @ 10am PST to learn how to create the foundation for a future-proof archive solution.

    Speakers will be:

    - Brian Campanotti, CEO at cloudfirst-io and former CTO at Front Porch Digital, founders of DIVArchive
    - David Phillips, M&E Solutions Architect at Cloudian and former architect at NBC

    The joint solution of cloudfirst-io and Cloudian Hyperstore enables easy migration from Diva to a modern object storage platform that:

    - Addresses limitations of legacy systems by providing exabyte-scalability
    - Increases accessibility and search-ability in an economical manner
    - Overcomes the lock-in created by proprietary DIVA formatting
    - Avoids future disruptive and tedious migrations
  • Rebroadcast: Financial Cyberthreats in 2018
    Rebroadcast: Financial Cyberthreats in 2018
    Dmitry Bestuzhev, Security researcher, Kaspersky Lab Apr 2 2019 1:00 am UTC 47 mins
    Kaspersky Lab will present an exclusive overview of the top cyber-threats targeting financial services, based on the company’s threat intelligence research in 2018.

    The report on financial cyberthreats in 2018 is available here https://securelist.com/financial-cyberthreats-in-2018/89788/
  • Dive Head First into the Endpoint (Without Hitting Your Head)
    Dive Head First into the Endpoint (Without Hitting Your Head)
    John Moran, Senior Product Manager, DFLabs and Chris Berninger, Technical Alliances Engineer, Carbon Black Apr 2 2019 4:00 pm UTC 60 mins
    Dive Head First into the Endpoint (Without Hitting Your Head): A DFLabs and Carbon Black Use Case

    The time it takes attackers to progress from initial infection to establishing multiple beachheads and beginning data exfiltration is often measured in minutes. Responding effectively under these adverse conditions requires complete network visibility, actionable intelligence and intelligent automation to augment human analysts.

    Carbon Black has long been recognized as the industry leader in endpoint detection and response, providing unmatched visibility into all endpoint activity. By incorporating actionable intelligence into their suite of tools, Carbon Black allows enterprises to respond effectively to both known and unknown threats. Carbon Black Defense brings Carbon Black’s extensive Endpoint Detection and Response (EDR) experience together with their cutting-edge next-generation antivirus technology to provide protection against even the most advanced threats.

    However, when a network event, such as a Web Application Firewall (WAF) or Intrusion Detection System (IDS) alert is the impetus for an alert, correlating endpoint data and identifying and containing the threat is largely a manual process. This allows attackers enough time to begin wreaking havoc on the network.

    In this webinar we will explore DFLabs’ Security Orchestration, Automation and Response (SOAR) solution, IncMan SOAR, and Carbon Black Defense, to show how these industry-leading solutions can work seamlessly together to automatically pivot from the network into the endpoint, automatically identifying and containing unknown threats to immediately reduce the risk to the enterprise.

    Learn how:
    - Carbon Black’s suite of products can improve your security infrastructure
    - IncMan SOAR’s automation and orchestration capabilities can increase the efficiency and effectiveness of your security program
    - Carbon Black and DFLabs together can reduce incident detection and response times
  • InnovationX2 – Doubling down to overcome cloud complexities
    InnovationX2 – Doubling down to overcome cloud complexities
    Toby Owen, CTO and Don Barlow, COO Apr 3 2019 3:00 pm UTC 60 mins
    The recent merger of Hostway and HOSTING didn’t just multiply our office space and workforce. More importantly, it’s allowed us to meld our most valuable offerings and the expertise of each company to provide a healthy list of unmatched products and services.

    This is a particularly critical time for IT organizations as they come to grips with the fact that the “easy migration” to public cloud preached a few years ago is not so simple. And “One-size-fits-all” is a risky and costly approach to take when you’re trying to control IT spend, maintain compliance, and stay secure—all while bringing real value to the entire business.

    During this 45-minute webinar, two Hostway|HOSTING technology experts will share our most exciting combined services, including:

    Monitoring Insights: Offering an unmatched, game-changing single view of your infrastructure, operating systems, and applications.

    Guidance Level Agreements (GLAs): Uniquely going ten steps further than standard SLAs to offer a regular cadence of actionable recommendations that guarantee positive outcomes.

    Critical Availability Services: Offering the BEST availability guarantee in the industry.

    Database Services: Not many companies in our space also offer full data lifecycle management capabilities. A service not to be understated, Gartner Analysts have found that nearly 90% of businesses have little or no analytics expertise in house.
  • Designing a Storage Consolidation Strategy for Today, the Future and the Cloud
    Designing a Storage Consolidation Strategy for Today, the Future and the Cloud
    Storage Switzerland and StorONE Apr 3 2019 3:00 pm UTC 60 mins
    Most storage consolidation strategies fail because they attempt to consolidate to a single piece of storage hardware. To successfully consolidate storage, IT professionals need to look at consolidation strategies that worked. Server consolidation was VMware’s first use case. It was successful because instead of consolidating hardware, VMware consolidated the environment under a single hypervisor (ESXi) and console (vCenter) but still provided organizations with hardware flexibility. A successful storage consolidation strategy needs to follow a similar formula by providing a single software solution that controls a variety of storage hardware, but that software also has to extract maximum performance and value from each hardware platform on which it sits.

    Join Storage Switzerland and StorOne in which we discuss how to design a storage consolidation strategy for today, the future and the cloud.

    In this webinar learn:

    - The problems with a fragmented approach to storage
    - Why storage fragmentation promises to get worse because of AI, ML, and the Cloud
    - Why consolidating to a single storage system won’t work
    - Why hyperconverged architectures fall short
    - Why Software Defined Storage falls short
    - Why the organization needs a Storage Hypervisor
  • How Montebello Uses Video Surveillance+Analytics to Save Costs & Increase Safety
    How Montebello Uses Video Surveillance+Analytics to Save Costs & Increase Safety
    David Tsuen, IT Manager for the City of Montebello Apr 3 2019 5:00 pm UTC 60 mins
    With over 8 million passengers annually, ensuring safety is a paramount requirement for Montebello Bus Lines. Mobile video surveillance with real time monitoring was a long-sought goal, but presented significant challenges.

    Join this webinar on Apr 3rd @ 10am PST to learn from David Tsuen, IT Manager for the City of Montebello how they met this challenge with a solution that provided:

    - Real time on-bus video monitoring
    - Video and operational data recording
    - Data analytics framework

    Learn how technologies such as object storage and enriched metadata provided real-world solutions for Montebello to ensure public safety while staying within budget.
  • Part 3 SQL & Win Server End of Support : Licensing and Commercial Options
    Part 3 SQL & Win Server End of Support : Licensing and Commercial Options
    Simon Matthews, Microsoft Licensing Consultant - SoftwareONE Apr 4 2019 9:00 am UTC 45 mins
    As part of any technology migration or upgrade it is highly recommended to also consider the licensing and commercial options with the technical planning.

    SQL & Windows Server can be one of the most challenging products to upgrade or migrate due to the mission critical data that is typically being processed on the machines – and SQL’s licensing rules only adds further complexity!

    Simon Matthews, an experienced Microsoft licensing consultant from SoftwareONE, will help you navigate the key licensing and commercial considerations, including:

    •New licensing rules since SQL 2008 and overarching changes such as ‘Passive’ and ‘Licence Mobility’
    •The role and importance of Software Assurance
    •Licensing for staying on-premise
    •Licensing for cloud migrations

    After this session you will have greater clarity on how to plan your migration and upgrade strategies.
  • Threat Horizon 2021
    Threat Horizon 2021
    Steve Durbin, Managing Director, ISF LTD Apr 4 2019 12:00 pm UTC 45 mins
    Driven by demands for increased speed, automation and efficiency, organisations are about to face a period of significant technological upheaval. Digitisation promises much, and development of the next generation of technologies will bring significant benefits to business and society. To survive in the digital world organisations will have to adapt. To thrive, they will need to evolve. Exploiting digital interconnectivity, competing in the digital arena while understanding the implications of a digital cold war will all become business as usual challenges for industry over the coming months and years.

    In this webinar, Steve Durbin, Managing Director, ISF will identify the key changes to the digital landscape over the next two years, focusing on emerging threats and means of mitigating their impact.
  • Panel Discussion: 3 Game-Changing Innovation Models in Financial Services Today
    Panel Discussion: 3 Game-Changing Innovation Models in Financial Services Today
    Pat Patel, Money20/20 | Drew Graham, Standard Chartered Bank | Megan Caywood, Starling Bank Apr 4 2019 1:00 pm UTC 60 mins
    Innovation has quickly become an overused and distorted word. At Money20/20 Europe expect to cut through the hype, explore what measurements we can use to benchmark innovation and get to the heart of sustainable and commercial step change. A key question which has moved back up the C-Level agenda of established; banks, tech companies and payments companies is:

    "How can incumbents deliver meaningful game-changing innovation?"

    There are three options available for incumbents, and at Money20/20 Europe we’ll be developing deeper into each one:

    1. Can organisations transform their cultures to execute true innovation internally within their organisations? (cultural transformation)

    2. Perhaps tech transformation is the way forward, partnering or acquisitions to do so?

    3. Or do they need to achieve business model transformation by building something entirely new outside of the organisation?


    These options are being heavily debated in boardrooms throughout Europe, with a number of high profile banks recently announcing plans to build brand new subsidiaries. Some of the traditional banks, payments and tech companies are pursuing a few or all of the options while others are sitting on the fence. Which is most effective and why? What are the dynamics at play that determine success for different types of companies? Hear from the leading companies in our industry as they share their incisive insight on the successes but also the failures and the lessons learned.

    Panellists
    Drew Graham, Director, Fintech Strategy & Engagement, Standard Chartered Bank
    Megan Caywood, Chief Platform Officer, Starling Bank,

    Hosted by Pat Patel, Content Director - Europe + Asia, Money20/20
  • Take Control of the Cloud Chaos
    Take Control of the Cloud Chaos
    Gerry Grealish, Senior Director, Product Marketing, Symantec Apr 4 2019 1:00 pm UTC 40 mins
    Securing Web Access & Protecting Data with Cloud-Delivered Enterprise Security

    Increased cloud adoption, mobile device use, and the dramatic growth in the number of remote and home workers is putting pressure on existing security infrastructures.

    In this environment, enterprise security teams are wrestling with questions like:

    - How can I consistently enforce policies governing the use of the web and cloud?
    - How can I effectively protect my users from web-based threats?
    - How can I secure my sensitive data and comply with legal regulations?

    Enterprises are turning to a comprehensive cloud-delivered security solution to tackle these challenges.

    Join us to learn how Symantec’s Cloud Security Services can be leveraged to protect users, data and devices, addressing the challenges of the cloud generation.