Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Siemens | Leveraging cognitive technologies to drive RPA innovation
    Siemens | Leveraging cognitive technologies to drive RPA innovation
    Nikolas Barth, Head of Innovation & Digitalization & Andrea Martschink, IT Strategy & Business Development Robotics, Siemens Recorded: Dec 11 2018 90 mins
    Innovation has always been at the heart of Siemens. In addition to being the largest manufacturing company in Europe, the German conglomerate continues to innovate in a startup fashion and has embraced Digital Transformation and has won their CIO Award based on the work they are doing with RPA.

    In this episode of our Blue Prism Café, discover how Siemens has been leveraging Robotic Process Automation as part of this Digital Transformation journey, and how their global RPA service, run jointly by the Shared Services and IT department, has enabled their lines of business in realizing true efficiency and quality gains along end-to-end processes. You will also get insight as and how they are leveraging some of the latest intelligent automation technologies such as IBM Watson, Celonis and MSFT Azure Chatbot Technology with their Blue Prism Digital Workforce.

    Key takeaways will include:
    • How Siemens built their RPA Centre of Excellence to future proof their RPA and Intelligent Automation Growth
    • Real-life scaled examples of automated processes across various lines of businesses
    • An overview of Siemens' use of Cognitive Automation leveraging RPA
    • Achievements and results from their service delivery model

    • Nikolas Barth, Head of Innovation & Digitalization in Siemens Shared Services
    • Andrea Martschink, IT Strategy & Business Development Robotics
  • A View from the IT Practitioner: End User Predictions for 2019
    A View from the IT Practitioner: End User Predictions for 2019
    Michael Flouton - VP Security Strategy, Barracuda; Jez Back, Founder & Principal Erebus Technology Consulting Services Ltd Recorded: Dec 11 2018 55 mins
    2018 saw some great strides in cyber security as well as some major breaches. Will 2019 be the same? As we all try and stay one step ahead of the attackers and look into our crystal ball on what the future holds, Barracuda wanted to see how our customers and channel partners feel about the past, present, and future of cyber security and how their approach has evolved over time.

    We surveyed more than 1,500 IT leaders and security professionals in North America, EMEA, and APJ about their IT security priorities, how those priorities have shifted, and where they’re headed next.

    Join this webinar with Barracuda’s, VP Security Strategy, Michael Flouton and Erebus Technology's Jez Back, Founder & Principal, to find out:

    - What 1500 IT and security professionals in North America, EMEA and APJ believe will be the next big trends in cyber security
    - How their priorities have changed over the last 15 years and where they will focus for the next 15 years
    - Which cyber security trends have impacted their cyber security strategy
    - How to prepare your organisation for these new trends

    Register today to find out what your peers believe will be the key trends in cyber security and advice on how to stay ahead of the attackers in 2019 and beyond.
  • Emerging Cyber Threats for 2019
    Emerging Cyber Threats for 2019
    Steve Durbin, Managing Director, ISF LTD Recorded: Dec 11 2018 47 mins
    Organisations in 2019 will be increasingly faced with a hyper-connected world where the pace and scale of change – particularly in terms of technology – will accelerate substantially. Business leaders need to develop cutting-edge ways to deal with new regulation, advanced technology and distorted information.

    In this webinar, Steve Durbin, Managing Director, ISF will discuss the threats organisations will be facing in 2019 and how business leaders and their security teams can address them. The emerging cyber threats to lookout for include:

    -The increased sophistication of cybercrime and ransomware
    -The impact of legislation
    -The myth of supply chain assurance
    -Smart devices challenge data integrity

    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • People Risk
    People Risk
    Grant Kennedy & Dr Aarti Anhal Recorded: Dec 11 2018 61 mins
    People are the single most important asset in any organisation, yet they can often be the most vulnerable. The opportunities and threats people present to the operations and strategic objectives of their organisations constitute “people risk” – an area of risk often ignored because of the perceived complexities involved in managing it effectively. This webinar will focus on “risk intelligence”, which refers to the way in which an individual’s values, risk competences and behaviours come together to drive their perception of risk, approach to risk-based thinking and decision-making. Th webinar will introduce the diagnostic tools that can be used by organisations to evaluate the “risk intelligence” of staff, whether in the operational 1st Line, the 2nd line’s risk and compliance functions or senior management.
  • How to protect your organisation in a digital world: Panel discussion and launch
    How to protect your organisation in a digital world: Panel discussion and launch
    Carolyn Williams, Director of Corporate Relations Recorded: Dec 10 2018 59 mins
    11 a.m Carolyn Williams, Director of Corporate Relations,
    Institute of Risk Management
    Introduction to the new Certificate and support from the
    WMG Cyber Security Centre at the University of Warwick
    and the University’s Department of Politics and
    International Studies,

    11.10 Panel discussion into: What are senior
    risk managers detecting in their businesses/macro/micro
    environment that underlines the need for digital upskilling.

    Steve Treece, CFIRM,
    Head of Corporate Risk, Corporate Portfolio Office, NHS Digital

    Steve O'Neill,
    Credit Risk Skills & Risk Academy, Barclays

    Stefano Capodagli, IRM Technical Specialist, Strategic Advisor & Group CRO

    11.30 Trudi Mellon, Specialist Consultant – Qualifications
    Projects, Institute of Risk Management

    Syllabus development, key learning outcomes,
    partnership with Warwick University

    11.40 James McCarthy , Student Admissions, Engagement &
    Support Manager,
    Institute of Risk Management

    Questions, advice and guidance on the practicalities of enrolment, studying and exams

    11.50 Questions and answers
  • StorageSwiss Live PodCast - Talking GDPR and CCPA with Aparavi
    StorageSwiss Live PodCast - Talking GDPR and CCPA with Aparavi
    Storage Switzerland and Aparavi Recorded: Dec 7 2018 16 mins
    Join Storage Switzerland and Aparavi for our live PodCast dealing with data privacy regulations like the European Union’s General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA). The regulations potentially force organizations of all sizes to rethink how they protect, retain and remove data.

    During the PodCast we cover:
    - The aspects of the GDPR and CCPA regulations that should concern IT
    - The challenges the regulations create for current data protection retention applications
    - How organizations need to change policies and products to address the regulations
    - Answers to live audience questions about data privacy, GDPR, and CCPA

    All attendees to the live event receive a free copy of Storage Switzerland’s latest eBook “GDPR IS FOR EVERYONE - Designing a Data Privacy Infrastructure”.
  • Post Perimeter Security 101 - Protecting a border-less world
    Post Perimeter Security 101 - Protecting a border-less world
    Aaron Cockerill, Chief Strategy Officer Recorded: Dec 7 2018 29 mins
    What is currently happening the world of security?

    Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.*

    The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations enforce their endpoints and establish continuous conditional access to data based on risk.

    During this webinar Aaron Cockrill, CSO at Lookout will talk about:

    - What does a post-perimeter world mean to enterprise security?
    - Why mobility changes the enterprise security paradigm?
    - How to protect data when accessed from outside the corporate perimeter?
    - What are the current and emerging threats?

    * Source Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
  • SD-WAN Best-of-Breed vs All-in-One: Which should you choose?
    SD-WAN Best-of-Breed vs All-in-One: Which should you choose?
    Dr. Jim Metzler and Joel Christner Recorded: Dec 6 2018 43 mins
    The WAN has been fundamentally upended by SD-WAN and IT decision makers now have to reconsider what the branch of today and tomorrow looks like. Do you choose a best-of-breed solution or do you settle on a solution that includes SD-WAN and other capabilities?

    Join our webinar to learn the pros and cons of each and which dimensions should power your decision.

    In this webinar, you will learn:

    * The similarities and differences between best-of-breed SD-WAN and all-in-one systems
    * Which challenges and complexities are either presented or remedied by each model
    * How best-of-breed SD-WAN and all-in-one systems affect long-term remote office architecture
    * And most importantly, which provides the most value in different circumstances

    Dr. Jim Metzler is the Founder and Vice President at Ashton, Metzler & Associates. Dr. Metzler has worked in many positions in the networking industry. His current interests include Application Delivery, Software Defined Networking and Network Functions Virtualization.

    Joel Christner is the VP of Marketing at CloudGenix and has two decades of experience in building distributed systems, infrastructure, and application delivery.
  • What’s Your 2019 NVMe Strategy?
    What’s Your 2019 NVMe Strategy?
    Storage Switzerland, Western Digital Recorded: Dec 6 2018 47 mins
    The flash optimized NVMe protocol has been on the market for over a year and the technology is available in several forms. NVMe, both storage and networking (NVMe over Fabrics) is more expensive than the typical SAS based solution and not all applications or environments can take advantage of the performance NVMe promises. At the same time there are workloads like artificial intelligence, machine learning and high velocity analytics that need all the performance that NVMe can offer and some organizations are buying NVMe solutions just for those workloads.

    Most data centers already have too many storage systems to manage, and adding another silo just for extreme performance workloads may make the problem even worse. IT needs a strategy to not only correctly integrate NVMe into the data center but to do so in a way that doesn’t further fragment the architecture. In fact, with the right strategy, IT can use the NVMe system as a point of storage consolidation.

    In this live webinar join experts from Storage Switzerland and Western Digital for an interactive webinar the will help you develop an NVMe strategy that makes the most sense for your organization.
  • Join the Stress-Free Data Protection Revolution!
    Join the Stress-Free Data Protection Revolution!
    Florian Malecki, International Sr. Product Marketing Director Recorded: Dec 6 2018 44 mins
    Midsize businesses are increasingly embracing digital technology to gain a competitive advantage. However, the explosive data growth, coupled with a lean IT staff at most midmarket organizations has placed an immense burden on data protection and storage infrastructure requirements.

    In recent years, a disruptive technology has emerged, creating a brand new category of backup & recovery and storage solutions: converged data protection appliances.
    The concept is very simple: combine backup and recovery software with a scale out storage appliance that can be used as a backup target as well as accommodating most storage requirements.

    Join this webcast to learn about the benefits of converged data protection platforms and what to look for when making your final decision.
  • Solving VMware Backup Challenges with the Cloud
    Solving VMware Backup Challenges with the Cloud
    Seyi Verma, Director of Product Marketing @ Druva Recorded: Dec 5 2018 46 mins
    Managing the backup and restore of virtual machines is an intricate process involving multiple staff and a complex infrastructure. This dependency on these cumbersome, error-prone, multi-tiered systems results in high costs for backup and archival storage, putting your data at a higher risk.

    Organizations today are now looking to the cloud as a viable, cost-effective alternative to protect against the pitfalls and inefficiencies of traditional VMware backup and disaster recovery (DR).

    Join us for this webinar and learn how the cloud can solve your VMware backup challenges, including:

    -Reducing your overall storage footprint and consolidating your data
    -Streamlining management and reducing costs
    -Meeting your RTO and RPO requirements
    -Leveraging enterprise cloud backup for instant disaster recovery

    Seyi Verma is a Director of Product Marketing at Druva. He has over 16 years of experience in product management and marketing, driving initiatives around product launches and strategy for both hardware and software. At Druva, he leads product marketing for Phoenix, the company’s data protection and management solution for physical and virtual infrastructure.
  • Kaspersky Lab’s APT review of 2018: the most active groups, the top targets
    Kaspersky Lab’s APT review of 2018: the most active groups, the top targets
    Vicente Diaz and Costin Raiu, security researchers in Kaspersky Lab’s Global Research and Analysis Team Recorded: Dec 5 2018 54 mins
    Kaspersky Lab experts will present their annual, exclusive review of advanced persistent threat activity across the world in 2018, based on the company’s threat intelligence research throughout the year. These findings provide the foundations for the threat actor predictions published on November 20 and provide an invaluable insight into how APTs are evolving over time.
  • 5 Questions to Ask When Considering Cloud Backup for Enterprise Workloads
    5 Questions to Ask When Considering Cloud Backup for Enterprise Workloads
    Seyi Verma, Director of Product Marketing, Druva Recorded: Dec 5 2018 63 mins
    With data growing faster than ever before, managing data center infrastructure can be costly and complex. In addition to adding resources, hardware and tapes, you need to ensure visibility and control over remote and global sites to avoid data silos, and risks and compliance issues. That’s why the cloud became such a game changer for modern IT environments.

    Join us for this upcoming webinar, discussing the five questions to ask about cloud data protection for enterprise workloads, and find out how to:
    - Centralise and simplify management of corporate data environments
    - Reduce costs and demands on local resources, and achieve 60% lower TCO
    - Modernise data protection for virtual workloads
    - Meet critical application data recovery speeds, and business continuity SLAs
    - Harnesses the efficiencies and global reach of the public cloud, while delivering unmatched storage flexibility, data durability, and security

    We will conclude with a product Demo, when you can get an in-depth look at product admin consoles and client UIs.
  • Creating a Winning Security Strategy for 2019
    Creating a Winning Security Strategy for 2019
    Israel Barak, Cybereason | Dario Forte, DFLabs Recorded: Dec 5 2018 49 mins
    Cyber attacks on businesses, organizations and critical infrastructure becoming the norm in 2018. Massive breaches are constantly in the news and consumers are demanding stricter data and privacy protections. Cybersecurity has never been more important to organizations, and the investment in security technology has never been greater.

    CISOs are in the spotlight, and are looking to build the best strategy to secure their organizations, customers and users.

    Join top security experts for an interactive Q&A panel discussion on:
    - The key factors CISOs should consider for their cybersecurity strategy
    - The current and future threatscape
    - Platform Security for 2019
    - Technological solutions that make CISOs' lives easier
    - How organizations are coping with the shortage of qualified security workforce
    - How CISOs can better communicate their strategy to the board

    Israel Barak,CSO, Cybereason
    Dario Forte, CEO, DFLabs

    Panel moderated by:
    Amar Singh, Founder & CEO, Cyber Management Alliance
  • Solving Mobile Security: Peer-tested Strategies That Work
    Solving Mobile Security: Peer-tested Strategies That Work
    Brian Duckering, Mobile Security Specialist, Symantec and Brian Jacome, Director of Applications and Controls, RBC Recorded: Dec 5 2018 61 mins
    Businesses of all sizes are wary of the added risk that comes from the use of mobile devices and are struggling to figure out the best strategies to protect their sensitive information.

    Attend this webinar to hear the advice from experienced security professionals who have successfully navigated the path to protect their businesses from mobile threats.

    Hear from Brian Jacome, Director of Applications and Controls from Royal Bank of Canada and learn about his journey and get answers to the following questions and more:

    - Why is it important to secure mobile devices?
    - What is your advice to your peers who are starting their mobile security journey?
    - What are the most important requirements of a mobile security solution?

    By the end of this webinar, you will have gained important advice and perspective from those who have gone before you and are able to sleep better at night.

    Register Today
  • A Walk in The Clouds: The Modern Customer Experience
    A Walk in The Clouds: The Modern Customer Experience
    Jacqueline Touma, Sandy Mathis, Amy Protexter, Razia Richter Recorded: Dec 4 2018 60 mins
    The customer expects fast, personal and engaging experiences, integrated and aligned across touch points in real time.

    The Cloud brings along a paradigm shift in the way customers interact with the businesses and what businesses must be prepared for. Understand what the Modern Customer Experience is and how content and customer analytics are keys to success.

    Organizations need to have the right tools to capture feedback and provide needed content at each point in the life cycle.

    Learn more from our Panel of experts as they share their experiences, best practices, and lessons from leading Companies.
  • Data Protection in 2019 and Beyond
    Data Protection in 2019 and Beyond
    James Nelson, President, Business Continuity Services, Inc. Recorded: Dec 4 2018 55 mins
    Data protection and disaster recovery are changing constantly. Risks and exposures are expanding. Are you keeping up? Are you prepared for the worst-case scenario? Can your data handle the disruptions?

    “Data Protection in 2019 and Beyond,” provides thought, leadership, and guidance for the coming year and beyond. Addressing potential challenges, concerns, and focusing on areas to consider while protecting your organization, topics include:

    -The growing complexity of end-point protection and management
    -How virtualization continues to provide solutions and challenges
    -Changing regulatory and compliance challenges

    No business is immune from disaster. Businesses should assume the worst will happen. That’s why everyone should prepare to reduce the impact that these disasters will have on their technology. Planning ahead may be the difference in your business surviving technology interruptions and data loss.
  • Symantec IT Management Suite 8.5 and Ghost Solution Suite 3.3
    Symantec IT Management Suite 8.5 and Ghost Solution Suite 3.3
    Damon Covey, Sr. Director, Product Management, Symantec Recorded: Dec 4 2018 45 mins
    The releases of Symantec IT Management Suite 8.5 and Ghost Solution Suite 3.3 are here! Please join us for a special webinar on Tuesday, December 4 to learn all about these exciting new solutions.

    We will discuss and demo some of the cool new features in IT Management Suite 8.5 such as time-critical management, endpoint quarantine, and automated vulnerability remediation and in Ghost Solution Suite 3.3, the new web console, smart wizards, and much more!

    Don't miss this great opportunity to get the latest information on IT Management Suite 8.5 and Ghost Solution Suite 3.3!

    Register Now
  • Navigating Today’s Global Cyber Regulations – Regional Perspectives
    Navigating Today’s Global Cyber Regulations – Regional Perspectives
    Ron Bushar, VP & Gov. CTO, FireEye, Michael Trevett, Director, FireEye & Heather Sussman, Partner, Ropes & Gray Recorded: Dec 3 2018 59 mins
    As the cyber threat landscape evolves, lawmakers are prompting organizations to protect their networks and handle sensitive information more mindfully with cyber security and breach notification laws that are stricter, carry higher penalties and result in further enforcement.

    Companies are spending more time and resources managing cyber security risks—but where should organizations focus their time, talent and spend? And how does a multinational organization navigate these complex regulatory requirements?

    Join Ron Bushar, VP and CTO of Government Solutions at FireEye, Michael Trevett, Director of Professional Services at FireEye Mandiant, and Heather Sussman, Partner at Ropes & Gray, as they share their security and legal expertise:

    • Executive perspectives on the impact changing security regulations has on how organizations are thinking about cyber security
    • Regional overviews of existing and upcoming regulations in North America, EMEA, and APAC
    • Impact of GDPR on regional business landscapes since its formal release in May
    • Influence of the SEC’s recent interpretive guidance on security risks and incident disclosures
    • Best practices for making cyber security a strategic priority and a competitive advantage

    Also don't miss "Leading with Threat Intelligence – How to Select the Right Security Provider," the first webinar in this two-part series aimed to help you be better prepared for what's to come in 2019. Register Now - https://www.brighttalk.com/webcast/7451/342393
  • Optimising Risk Workshops
    Optimising Risk Workshops
    Dr. Sarah Gordon Recorded: Dec 3 2018 75 mins
  • How to Boost Endpoint Security in 2019
    How to Boost Endpoint Security in 2019
    Holger Schulze, Founder and CEO of Cybersecurity Insiders and Rene Kolga, Sr. Director of Product at Nyotron Recorded: Nov 29 2018 42 mins
    As the security perimeter has moved to the endpoint, protecting these devices has become a real challenge. A recent study conducted by Cybersecurity Insiders and Nyotron finds only 50% of organizations are confident they can stop over 75% of attacks, and 21% estimate they can thwart less than half. Over three quarters of the cybersecurity professionals we polled believe the importance of endpoint security is increasing, so how can they convince their stakeholders to budget for appropriate endpoint defenses in 2019? This live webinar will answer that question.

    In this live data-driven webinar, cybersecurity experts Rene Kolga from Nyotron and Holger Schulze from Cybersecurity Insiders will explore:
    -Why only half of organizations have confidence in their current endpoint security posture
    -What organizations are doing to boost endpoint security
    -What you can do in 2019 to better mitigating the risks
  • Is Your Old-Fashioned Information Management Strategy Holding You Back?
    Is Your Old-Fashioned Information Management Strategy Holding You Back?
    Mark Diamond, Founder, President & CEO of Contoural, Garth Landers, Director of Product Marketing – Cloud Archive, Mimecast Recorded: Nov 29 2018 56 mins
    Compliance regulations are evolving. E-Discovery is getting harder. Your old-fashioned, legacy archive strategy is not enough. Join Mark Diamond from Contoural and Garth Landers from Mimecast as they discuss the changing enterprise archiving landscape and how to rethink information management for a more modern and effective approach.
    Speaker Info:
    Mark Diamond, Founder, President & CEO of Contoural
    Mark Diamond is recognized as an industry thought leader in proactive records and information management, litigation readiness and risk & compliance strategies.  Under his leadership, Contoural has grown to be the largest independent provider of legal and regulatory, litigation readiness, and risk & compliance consulting services. As trusted advisors, he and his company help bridge legal, compliance, security and business needs and policies with effective processes, technology and change management.
    Previously, he was co-founder of Symantec's (Open Vision) Professional Services group; founder and General Manager, Worldwide Professional Services for Legato Systems and Vice President of Worldwide Professional Services at Right Works, a provider of business application software to the B2B marketplace.
    Garth Landers, Director of Product Marketing – Cloud Archive, Mimecast
    Garth Landers is the Director of Product Marketing for the Mimecast Cloud Archive. Prior to joining Mimecast, he was a Research Director/Analyst at Gartner with primary coverage responsibilities for advising clients on archiving management software and related topics such as e-discovery and information governance policies and procedures. In addition, he provided research and advisory services in other areas related to storage, software and services associated with archive and backup/recovery. 
    Previously, Garth held positions at EMC and Mobius Management Systems in product marketing and management in addition to an earlier stint at Gartner as a Research Analyst covering enterprise content management.
  • Need-to-Know Benefits of Having Continuous Data Protection in Your Storage
    Need-to-Know Benefits of Having Continuous Data Protection in Your Storage
    Steve Hunt, Dir. Product Management - DataCore Recorded: Nov 29 2018 46 mins
    IT organizations require a data protection solution that can combat against the ever looming threat of malware or ransomware, and data corruption, which can have a significant effect on day to day operations. When that data protection capability is included in their storage solution, it allows IT organizations to reduce their overall costs, while maximizing their ability to protect all data they are responsible for.

    This is why DataCore Software created Continuous Data Protection (CDP), or the “undo button” for your data. In this webinar we explain and show how DataCore Software’s CDP feature can deliver one-second restore granularity and provides the best Recovery Point Objective (RPO) of any data protection solution.
  • The Future of Work: Growth Opportunities and Trends
    The Future of Work: Growth Opportunities and Trends
    Rob Arnold, Industry Principal, Connected Work, Frost & Sullivan Recorded: Nov 29 2018 43 mins
    Is your workforce built for disruption and a rapidly ever-changing future of work?

    Policies, demographics, technologies, economics, environmental sustainability, and social movements are shifting how people work and how employers are managing their workers. As many jobs face the prospect of automation, workers and employers need to collaborate to create a modern workplace that supports the growing knowledge economy.

    Key Takeaways:
    • Learn which office technologies are supplanting the massive installed base of legacy equipment in the workplace.
    • Discover the devices and applications that will support the workplace of the future.
    • Understand the role that collaboration and wearable technologies play in making workers happier and more satisfied.
  • Solving the Biggest Headache in Data Center Consolidation
    Solving the Biggest Headache in Data Center Consolidation
    Coan Dillahunty, Nasuni Senior Product Manager and former Data Center Manager for TBWA Recorded: Nov 29 2018 38 mins
    Shifting file services to the cloud as part of a data center consolidation can reduce cost, footprint, and increase your future flexibility. But getting it right so that you don’t compromise end user satisfaction or application performance is a real challenge, especially across multiple data centers and apps.

    Join this live webinar to learn how to approach multi data center consolidation with the least amount of pain and without sacrificing application performance and end-user satisfaction.
  • Facing Forward: Cyber Security in 2019 and Beyond
    Facing Forward: Cyber Security in 2019 and Beyond
    Christopher Porter, Chief Intelligence Strategist, FireEye Dec 11 2018 9:00 pm UTC 60 mins
    As the door closes on 2018, we walk away armed with knowledge about what’s to come in 2019 and beyond. We know attackers will attack and defenders will be tasked with stopping them, but there is a lot more we can do to be prepared for upcoming threats and ensure we’re innovating faster than bad actors.

    Join Christopher Porter, Chief Intelligence Strategist at FireEye, as he shares his thoughts about cyber security in 2019. During the webinar, Christopher will touch on various topics discussed in our Facing Forward: Cyber Security in 2019 and Beyond report, which was developed based on insights from our senior leaders, FireEye iSIGHT Intelligence, Mandiant incident responders, and FireEye Labs. Tune in to learn about:

    •Threats to the aviation industry, including cyber espionage and cybercrime
    •What to expect from established and emerging nation states
    •How threat actors are changing their tactics to stay ahead of defenders

    Register today to learn what lies ahead and stay one step ahead of cyber security threats.
  • Defending Against Today's Sophisticated Attacks on Healthcare Organisations
    Defending Against Today's Sophisticated Attacks on Healthcare Organisations
    Axel Wirth, Distinguished Healthcare Architect Dec 12 2018 3:00 am UTC 67 mins
    In the eyes of cyber criminals, there are few targets more lucrative than healthcare organisations due to the comprehensive nature of the information held by them, and the high value of health data on the black market. And, it is not just about protecting information – cybersecurity incidents in healthcare can also impact hospitals' ability to deliver care, or could result in harm to patients should critical systems get taken down by a malicious actor.

    Join us in our upcoming 'Defending Against Today's Sophisticated Attacks on Healthcare Organisations' webinar as we discuss the specific cybersecurity challenges pertaining to the healthcare industry, including:

    • The latest threat trends and incidents
    • The challenges of securing healthcare ecosystems
    • Effective cybersecurity strategies
  • Kaspersky Technical Talks Series - KATA / EDR Part 3
    Kaspersky Technical Talks Series - KATA / EDR Part 3
    Jibril Hassan, Executive Pre-Sales Manager | Kaspersky Lab Dec 12 2018 11:00 am UTC 42 mins
    A unified security solution for a new era of digital transformation.

    Join our technical team as they provide a deeper dive into the Kaspersky Anti-Targeted Attack (KATA) and Kaspersky Endpoint Detection and Response (EDR) platforms.

    Learn how:
    - it delivers complete visibility across the distributed enterprise environment, together with global threat statistics and reputations, providing contextualised, actionable Intelligence.
    - multi-dimensional advanced detection combines machine learning with advanced detection capabilities using static, behavioural, cloud reputation, sandboxing and pattern based detection engines, together with a Targeted Attack Analyser.
    - automated prevention of and response to advanced threats
    Verdicts are automatically shared via the platform with a whole spectrum of products, including email, web, endpoint and storage protection. As a result, instant action can be taken when an incident emerges.

    This session is highly recommended for technical roles and continues our series of technical talks. If you missed a previous one please check it out on our On-Demand Service.
  • Underground Cyber Threats: Social Engineering. From Staff to C-suite.
    Underground Cyber Threats: Social Engineering. From Staff to C-suite.
    Anthony St Clair and Farzad Seihoun Dec 12 2018 2:00 pm UTC 45 mins
    This webinar will provide insight into what Verizon anticipates will be the most prolific cyber threats for 2019. Members of the Verizon Threat Research Advisory Team offer their outlook on social engineering trends for the next twelve months, summarizing thousands of man-hours spent in customer investigations, along with our dark web research, threat libraries, and identified cyber anomalies drawn from our vast IP network. We will explain how Verizon addresses these types of threats on behalf of our customers, and our top recommendations for ways that organizations can take proactive steps on their own to secure their network.
  • Harnessing Artificial Intelligence & Emerging Technologies for Data Security
    Harnessing Artificial Intelligence & Emerging Technologies for Data Security
    Paul Mazzucco, Chief Security Officer | TierPoint Dec 12 2018 5:00 pm UTC 60 mins
    TierPoint's Paul Mazzucco will discuss the double-edged sword of artificial intelligence, which is aiding the efforts of hackers and protectors alike. Join us as we explore the world of the Darknet, how bad actors are using machine learning and AI to create better attack vectors, and how IT professionals are also using these tools to defend their vital infrastructure. Powered by behavioral modeling, these technologies are the next frontiers in attack mitigation.
  • How to Easily Migrate Data Without Downtime
    How to Easily Migrate Data Without Downtime
    Alfons Michels, Sr. Product Marketing Manager & Alex Best, Dir. Technical Business Development - DataCore Software Dec 12 2018 6:00 pm UTC 60 mins
    Are you forced to replace your hardware? Are you thinking about different deployment models for your IT infrastructure, e.g. hyperconvergence?

    Well, any change to your IT infrastructure is a major challenge, and typically requires complex data migrations, resulting in service downtime, overtime and more money to spend - but are the results worth it?

    Before you start your next project, think about an alternative approach to rip-and replace, like software-defined storage. You may ask yourself, why should that help me? And there are many good reasons, but an essential one are the unrivaled chained migration options.

    If you're wondering what these benefits can mean to you, just join our brief webinar, which also includes a live demo and audience Q&A so you can see how simple it is to bring software-defined storage into your IT environment and leverage chained migration. Among others, you'll be able to discover:
    • How to integrate software-defined storage into your environment
    • How to migrate data between totally different types of storage
    • How to change towards hyperconverged during regular business operations
  • End of Support Doesn’t Mean End of your Data
    End of Support Doesn’t Mean End of your Data
    David Beeler, Senior Product Manager @ Carbonite & Megha Chopra, Product Marketing Manager for Modern Data @ Microsoft Dec 12 2018 7:00 pm UTC 30 mins
    When you hear “end of support” on one of your core products, that often is met with fear for IT professionals. With Azure & Carbonite transforming your on-premise SQL 2008 server to the cloud, it can provide security, flexibility, and saving for your company.

    Join our exclusive webcast for an overview on what this end of life means for your data, how Microsoft Azure could put your business on the fast track for success and how Carbonite’s solutions can simply migrate your data into your new environment.

    Here are some great benefits on taking your business into Azure:
    •Immediately rehost workloads in the cloud
    •Rehost in Azure SQL Database Managed Instance for a “version-free” platform
    •Three years of FREE extended security updates at no additional charge over standard VM pricing
    •Existing licenses can use Azure Hybrid benefit for big savings

    Sign up today for this 30-minute webcast by Microsoft and Carbonite and learn why an end of life doesn’t mean the end of your business. Start your planning now because July 9, 2019 will be here before you know it.
  • Cybersecurity Trends for 2019
    Cybersecurity Trends for 2019
    Jonathan Cran, Head of Research and Jeff Aboud, Director of Product Marketing, Kenna Security Dec 12 2018 9:00 pm UTC 60 mins
    Every year the cyber threat landscape is different than the year before as new technologies replace the old and new means of digital disruption replace those that came before.

    2018 was anything but quiet with an uptick in cyber activity from major geopolitical actors, and vulnerabilities and techniques weaponized faster than ever. Despite fewer reported breaches in 2018, the cyber landscape continued to evolve rapidly.

    Join us for our next webinar: A Retrospective on Cybersecurity in 2018 and Trends to Watch in 2019; Kenna Security’s Jonathan Cran, Head of Research, and Jeff Aboud, Director of Product Marketing will dissect key data points to chart a path for how we must approach security challenges in 2019, as well as:

    - Major threat trends in 2018
    - Cybersecurity hype and lessons learned
    - Predictions for the next wave of cybersecurity challenges in 2019

    Take control of cyberthreats in 2019. Register now.
  • Symantec's Security Predictions: 2019 and Beyond
    Symantec's Security Predictions: 2019 and Beyond
    Dr. Hugh Thompson, Chief Technology Officer, Symantec | Nick Savvides, CTO APAC, Symantec Dec 13 2018 3:00 am UTC 45 mins
    The threat landscape is ever changing. New threats are rapidly evolving with increasing sophistication, leveraging new and advanced technology. With the new year being just around the corner, how can we be prepared for the shifting threat landscape?

    Join Dr. Hugh Thompson, Symantec Chief Technology Officer in our webinar, as he shares his thoughts on Security Predictions in 2019 and beyond. Based on insights gathered from our intelligence, he will touch on new trends that will likely take the limelight in the coming year.

    Learn more about:

    - How Artificial Intelligence (AI) will be leveraged in cyber security
    - How growing 5G deployment and adoption will catalyze new attacks
    - Where attacks will be targeted at

    Attend our webinar. Learn what to expect and be prepared in your security posture for 2019.

    Register Now »
  • Increase your Office 365 email security and data protection
    Increase your Office 365 email security and data protection
    Janet O’Sullivan and Florian Malecki Dec 13 2018 10:00 am UTC 60 mins
    Over 60% of businesses have moved their email to Office 365. Whilst this makes great business sense, security and data integrity have to be key priorities. So how secure is office 365 and do the native security solutions offered by Microsoft go far enough to protect your emails and data?

    Attend live webcast with our experts from The Email Laundry and StorageCraft and learn about:

    - The threats being posed to your emails in particular from Malware-less attacks such as CEO fraud and Impersonation attacks.

    - Why (and how) The Email Laundry is more successful at stopping these attacks than Microsoft ATP

    - The risks to losing data from either accidental or malicious deletions

    - How StorageCraft can ensure your peace of mind by always giving you immediate access to your data
  • Security perils of the cloud journey – and how to avoid them
    Security perils of the cloud journey – and how to avoid them
    Oleg Gorobets, senior global product marketing manager at Kaspersky Lab Dec 13 2018 2:00 pm UTC 60 mins
    The cloud offers significant benefits for business, including flexibility and efficiency, but cloud migration has its challenges when it comes to security. Juggling multiple virtualized environments, keeping track of disparate security policies and dealing with containerization issues can turn your cloud journey into a nightmare. Join us to find out more about these potential complications – and how you can avoid them.
  • Achieving Real-Time Operations: Latest Integrations for Process Automation
    Achieving Real-Time Operations: Latest Integrations for Process Automation
    Andrew Marshall, PagerDuty; Sean Higgins, PagerDuty; Monte Montoya, Cprime Dec 13 2018 5:00 pm UTC 25 mins
    Over 3,000 Atlassian users count on PagerDuty’s 300+ integrations to power their end-to-end real-time digital operations—and we’re excited to launch a comprehensive set of integrations for the Atlassian suite, which allows Atlassian users to add PagerDuty’s real-time digital operations capabilities to their everyday work.

    In this webinar, PagerDuty product manager Sean Higgins And CPrime’s Monte Montoya will show you how PagerDuty’s new Atlassian integrations help teams automate processes throughout the DevOps lifecycle, save time, and take full advantage of Jira Software, Jira Service Desk, Bitbucket, Statuspage, and other Atlassian tools.
  • 2019 Risk Trends and Predictions
    2019 Risk Trends and Predictions
    Jake Olcott, BitSight; Michael Marriot, Digital Shadows; Jannie Wentzel, Focal Point Data Risk; Sam Abadir, Lockpath Dec 13 2018 5:00 pm UTC 60 mins
    What a year 2018 has been, from indictments and data breaches to an increasing regulatory landscape and a greater focus on integrated risk management. What were the major risk trends in 2018 and what predictions can we make for 2019? In this can’t miss webinar, our panel of industry experts will recap 2018 and offer their views on what to expect in 2019 and beyond.

    As an attendee, you’ll learn:

    • The shift to a more integrated risk management
    • The growing emphasis on supply chain cybersecurity
    • The rise in data privacy and its impact on information security

    Plan now to attend this special webinar on 2018 highlights and trends and predictions for 2019.
  • The Future of Backup Isn't Backup
    The Future of Backup Isn't Backup
    Steve Blow Dec 13 2018 6:00 pm UTC 34 mins
    Old school backup is out! Today’s digital consumers demand an always-on level of service that backups simply cannot provide. Learn how continuous data protection is changing the way companies think about backup.

    Listen in as Steve Blow, Technology Evangelist, explains Zerto’s vision for the future of backup and learn how continuous journal-based protection is disrupting legacy backup. The recently announced Zerto IT Resilience Platform™ converges backup, disaster recovery, and cloud mobility solutions into a single, simple, scalable platform.
  • Simple and cost effective Disaster Recovery to VMware Cloud on AWS with Dell EMC
    Simple and cost effective Disaster Recovery to VMware Cloud on AWS with Dell EMC
    Sai Gopalan, VMware with Wen Yu, AWS and Zach Wunderle, Dell EMC Dec 13 2018 6:00 pm UTC 60 mins
    Dell EMC, VMware and Amazon Web Services (AWS) make it easier to protect virtualized workloads in the cloud. This webinar will discuss the latest challenges in protecting and managing VMware workloads, how to easily expand VMware environments to the cloud, what to do when a disaster event occurs, and show a demo of the latest features of data protection for VMware Cloud on AWS.
  • It’s OK to be Selfish: Getting the Best of CTI Sharing Without the Hassle
    It’s OK to be Selfish: Getting the Best of CTI Sharing Without the Hassle
    George Johnson, Vice President of Cyber Solutions, NC4 and Sean Franklin, Strategic Advisor, NC4 Dec 13 2018 7:00 pm UTC 45 mins
    We get it: sharing information about cyber threats is cumbersome, and all the barriers to sharing just make it sound exhausting. Your first responsibility is to protect your organization, but what if you could do that and share intelligence at the same time without additional work?

    NC4® is a leader in providing sharing communities the tools they need to be successful, and we’ve learned a thing or two over the years. In this presentation, we’ll talk about the barriers to information sharing and the lessons we’ve learned in overcoming them. When it comes to information sharing, see how you can be selfish and altruistic at the same time without breaking a sweat.
  • 5 DŮVODŮ PROČ: Commvault appliance znamená snadné a jednoduché nasazení
    5 DŮVODŮ PROČ: Commvault appliance znamená snadné a jednoduché nasazení
    Presentátor: Miroslav Dvořák, Commvault system engineer Dec 14 2018 9:00 am UTC 30 mins
    Vážení zákazníci a obchodní partneři,

    prosím přijměte pozvání na další ze série bezplatných webinářů společnosti Commvault, tentokrát na téma: “5 DŮVODŮ PROČ Commvault appliance znamená snadné a jednoduché nasazení”.

    V dnešním dynamicky se měnícím byznys prostředím společností stále více a více volají po komplexním, spolehlivém a rychle implementovatelném řešení pro ochranu dat svých lokalit. Tato prezentace se zaměřuje na 5 důvodů proč Commvault appliance je nejlepší a nejrychlejší cesta k zajištění lepší připravenosti obnovy dat a to od datových center až k regionálním pobočkám.
  • Consumption Based Data Management Providing Peace of Mind
    Consumption Based Data Management Providing Peace of Mind
    Storage Switzerland, Veeam, HPE Dec 17 2018 6:00 pm UTC 60 mins
    Consumption based IT is a curated set of IT solutions that focus on business outcomes. As the name implies it is purchased on a pay-as-you-go model. The goal of consumption based IT is to simplify establishing IT infrastructure that incorporates both the on-premises data center and the cloud to support a wide variety of workloads including traditional transactional databases, big data analytics, containers and many others.

    A key aspect of consumption based IT is how the data created by these workloads will be protected. In fact, the right consumption based IT solution should curate end-to-end backup directly into the solution.

    In our live webinar join Storage Switzerland, Veeam, and HPE to learn about consumption based IT, what to look for in a consumption based solution, how data protection can protect the solution and how data protection can be offered as a consumption based solution protecting both legacy and new architectures.
  • Passwords: The Keys to your (Online) Kingdom
    Passwords: The Keys to your (Online) Kingdom
    David Emm, Principle Security Researcher and Prof. Steven Furnell, Professor of Information Security, University of Plymouth Dec 18 2018 11:00 am UTC 75 mins
    24/7 connectivity is fast becoming an integral part of everyday life. Most of us now routinely bank, shop and socialise online, and the Internet is the life-blood of business.

    Yet too many of us fail to secure our online identities adequately. This presentation will examine why this is important, what we should do to secure our online accounts and how criminals exploit our lack of security.


    Steven Furnell is a the Associate Dean and IT Security Professor at the University of Plymouth. His research interests spans multiple areas including: Cyber Security / IT Security, including user authentication, biometrics, cyber crime, intrusion detection and response, security management and culture, usable security; Internet Technologies and Applications; Mobility.
    A published author, Steven will share his insights we can all individually make it harder for Cyber Criminals to access your passwords.

    David Emm is a Principle Research Analyst at Kaspersky Lab and regularly delivers presentations on malware and other IT security threats at industry events, highlighting what organisations and consumers can do to stay safe online. He also provides comment to broadcast and print media on the ever-changing cyber-security and threat landscape. David has a strong interest in malware, ID theft and the human aspects of security, and is a knowledgeable adviser on all aspects of online security.
  • DFLabs’ New Open Integration Framework and Customer Community Portal
    DFLabs’ New Open Integration Framework and Customer Community Portal
    John Moran, Senior Product Manager, DFLabs and Heather Hixon, Senior Solutions Architect, DFLabs Dec 18 2018 3:00 pm UTC 41 mins
    DFLabs’ innovative Open Integration Framework is designed to enable security teams to customize and easily add new automated integrations between their existing security tools and our IncMan SOAR platform, enabling SOCs and MSSPs to add unique incident response actions without the need for complex coding. The new framework is part of DFLabs’ commitment to delivering a more open, community-oriented solution to automation and orchestration, which also includes a new Community Portal.

    The Community Portal serves as a hub for customers, where they can get the latest information and support from DFLabs and interact with other like-minded customers. Moreover, this Community Portal aims to provide a cooperation ecosystem for companies and organizations, where they can share integrations of security tools and IncMan SOAR. This approach will enable our customers to tackle specific use cases by uploading or downloading integration files from the Portal to IncMan SOAR.

    Join this webinar to learn more about these two new exciting features, as well as DFLabs’ other latest developments and enhancements to IncMan SOAR v4.5 including:

    - Open Integration Framework
    - Community Portal
    - Enhanced REST API
    - Automated event triage (START Triage)
    - New bidirectional integrations
    - Improvements to existing integrations
    - And more...
  • Top 2018 Cyberattacks and How to Avoid Them in 2019
    Top 2018 Cyberattacks and How to Avoid Them in 2019
    Joe Schreiber, Technical Director, Business Development, Tufin Dec 18 2018 4:00 pm UTC 60 mins
    Breached. Hacked. Cyberattack. These are all words that dominated headlines in 2018.

    While we all know that the attacks that prompted these headlines were largely avoidable in hindsight, we also know that enforcing security policy across the legacy physical network is challenging. Furthermore, the Cloud First Policy and the adoption of containers introduce new risks to organizations and raise new security concerns that need to be anticipated.

    Join us on December 18 for a webinar with Joe Schreiber, Technical Director of Business Development, to learn from the mistakes of others in 2018 and how to avoid making them – and the headlines – in 2019. We’ll draw from his 20+ years of experience including security operations and incident response.

    Key topics include how to:
    •Develop and deploy an enforceable security policy
    •Clear time for proactive security initiatives
    •Mitigate the inherent risk of DevOps’ CI/CD agility
    •Contain malware outbreaks
    •Anticipate security risks of containers
  • Why Hybrid Cloud Storage is Winning in Multi-Site Environments
    Why Hybrid Cloud Storage is Winning in Multi-Site Environments
    Tom Rose, Vice President of Technical Solutions at Nasuni Dec 18 2018 6:00 pm UTC 60 mins
    Two competing trends are helping Hybrid Cloud file storage emerge as a dominant architecture for IT: Globalization and Data Center Consolidation. How does IT manage to power users and applications at the edge in a competitive global environment while consolidating expensive data center resources? Tune in to learn:

    - Why hybrid cloud solutions for applications and users are leading the way in file storage
    - How to leverage hybrid cloud storage to reduce data center footprint
    - How IT leaders are incorporating a cloud first strategy for file storage in 2019
  • The TCO of VM Backup: Understanding the True Cost of Virtual Machine Backup
    The TCO of VM Backup: Understanding the True Cost of Virtual Machine Backup
    Edwin Yuen, Sr. Analyst, Enterprise Strategy Group, Inc. Dec 18 2018 7:00 pm UTC 60 mins
    It’s increasingly difficult to make apples-to-apples comparisons among VM backup products, because functionality, deployment options, and pricing models vary widely. So, SMBs must look beyond list price and understand the total cost of ownership when making a purchase.

    In this webinar, attendees will learn about:

    • Common VM backup pricing models
    • Hidden licensing, hardware, and cloud costs
    • How our per-protected pricing models benefit SMBs
    • Carbonite’s VM Edition and hardware as a service deployment option
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Dec 19 2018 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address prior to December 14, 2018:


    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Top Cybersecurity Trends for 2019
    Top Cybersecurity Trends for 2019
    Terry Ray, CTO, Imperva and Kim Lambert, Sr. Product Marketing Manager, Imperva Dec 19 2018 6:00 pm UTC 60 mins
    Equipped with Imperva’s own research, interactions with our customers, and a wealth of crowdsourced data analyzed from installations around the world, we’ve looked ahead to the future of Internet security and have come up with three key overriding trends that we see taking center stage in 2019. Join Terry Ray, CTO of Imperva, as he provides insight into cybersecurity trends for 2019, including:

    -Increasing focus on compliance due to expanding data breaches
    -The business benefits of moving to the cloud
    -Using AI and machine learning to bridge staffing and skills gaps

    About the presenter:
    Terry Ray has global responsibility for Imperva’s technology strategy. He was the first U.S.-based Imperva employee and has been with the company for 14 years. He works with organizations around the world to help them discover and protect sensitive data, minimize risk for regulatory governance, set data security strategy and implement best practices.