The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.
Join us to learn:
- What is GDPR
- Deep dive into relevant data security articles of the GDPR
- Review how different technology can address some of the GDPR data security requirements
In our live webinar, Storage Switzerland and Maxta will compare the pros and cons of the two hyperconverged deployment models. Those attending learn how to clarify their goals for hyperconvergence and how to decide which architecture is the best fit for their organizations.
Attendees will learn how each deployment model overcomes these challenge:
1. Ease of initial evaluation and testing
2. How to transition to hyperconvergence while having current servers
3. How to avoid hypervisor lock-in
4. How to build a future proof hyperconverged architecture
Big things are happening in software. Agile Software Development and DevOps are delivering innovations at a rate never seen before. Prompting many to ask 'Is this the end of ITIL?'.
There is a perception that DevOps and ITIL cannot play well together. That an you must choose one over the other or risk catastrophic failure. This is simply not true.
Many do not realize that DevOps relieson core concepts and processes of ITIL to be successful. Ignoring this relationship means missing out on service improvements that may be introduced and developed by integrating key areas of the ITIL framework and the collective body of knowlege that is DevOps.
In this webinar we will take a close look at the simple things organizations can do to get most out of a balanced blend of traditional and modern IT practices.
The first half of 2017 was the tipping point for cyber threats in Northern Europe. Organizations had to defend themselves against two cyber attacks involving rapid spreading malware. The latest incident severely disrupted global enterprises, causing significant downtime and impacting their revenue.
Such high-profile, large-scale attacks show us that no organisation is safe from the reach of cyber-criminality. Post-GDPR, responding to these attacks will become all the more critical as breaches will have to be reported to the relevant regulatory body. By understanding your current security posture - internal processes and technology – combined with the external threat landscape – organisations can prepare themselves should a breach occur.
In this webinar, you will learn how to assess your risk profile, evaluate your operational strengths and weaknesses as well as your tactical approach to responding to co-ordinated, targeted attacks.
9 months until the GDPR deadline - are you completely up-to-speed?
Our panel of data protection experts will be discussing the compliance considerations that you need to be assessing for May 2018 along with suggesting next steps from a cyber and general security standpoint.
We'll also be asking YOU at what stage you're at in terms of your preparations via a series of interactive benchmarks as we go through the session to get a sense of where the security community is at in terms of preparations.
GDPR and its May 2018 deadline are now fully the minds of the vast majority of security professionals and with massive fines on the horizon for non-compliance, now is a better time than ever to get to grips with the legislation and ensure that your organisation is secure and compliant.
It’s vital that your business has carried out the relevant preparations for compliance by then to make sure you don’t get whacked with a huge fine of up to £15m or 4% of your organisation’s global annual turnover.
Not only are there potentially huge financial repercussions, but leaving your business open to attack and your customers at risk can cause serious reputational damage.
With the advent of Big Data comes not only new ways to optimise business and marketing processes, but also new concerns over the control and privacy of personal data.
These have given rise to local and regional data protection laws and regulations such as the General Data Protection Regulation (GDPR), a modernisation of data protection laws in the European Union, and the Australian data breach notification law, an amendment to the Privacy Act 1988 (Cth) which introduces a mandatory scheme for eligible organisations and federal agencies to report data breaches.
Data breach notifications give individuals greater control over their personal data and promote transparency over information handling practices, fostering consumer trust in businesses. The law requires businesses to prepare and assess risks to maintain brand confidence even if an incident becomes the next data breach headline.
Join this webinar to learn about:
- New challenges introduced by the Australian mandatory data breach notification law
- Key steps in the journey towards data privacy compliance
- How to monitor insider threats
- How to leverage these regulations to gain trust and ensure great customer experiences
We look forward to your participation in this free webinar.
Join the journey towards being data-focused and customer-centric using Big Data and Data Warehouse technologies.
In this webcast, you will understand what it means to take the journey from a data-focused approach and get faster insight without infrastructure concerns.
Learn how to:
- Use Azure public cloud for big data
- Setup a SQL DW, a Hadoop cluster and ask questions against large data sets
- Utilize Microsoft's best in class big data and analytics solutions and how it can power your journey into adopting, analyzing and utilizing big data
As storage technologies continue to evolve in 2017, so do the challenges faced in integrating conventional storage along with new age scalable object storage. Caringo Product Manager Glen Olsen will show how contemporary storage solutions are enhancing traditional storage and protocols so they benefit from modern cost-efficient scalability and data protection.
Learn how to instantly clone and recover very large databases in the data center or in the cloud.
The digital economy is driving massive volumes of information into databases. Database Administrators (DBAs) are now struggling to balance operational needs such as performance and availability with the needs of their development teams who want more database copies and the current copies to be refreshed faster. These challenges also inhibit innovation and make it difficult for DBAs to consider new offerings such as self-service database provisioning, cloud integration and instant database recovery solutions. In this webinar learn how to instantly clone and recover very large databases in the data center or in the cloud.
Join Storage Switzerland and ClearSky Data for our live webinar, “How to Leverage Cloud Storage for Hybrid VMware”, on August 16th at 1 p.m. ET and 10 a.m. PT. In this webinar you will learn how to create a truly hybrid cloud storage infrastructure that improves performance, reduces on-premises storage requirements and better protects the organization from disaster.
From SD-WAN at branches and quick-serve restaurants to SD-Perimeter (SD-P) for the Internet of Things and remote employees, networks today need constant connectivity, mobility, cloud services and software-defined everything. The Elastic Edge of the network requires a secure, next-generation WAN that expands, contracts, and evolves at a moment’s notice.
Join Tyler Peterson and Matt Thueson of Cradlepoint for a live webinar on Aug. 16, 2017, to discuss use cases and success stories for SD-WAN, SD-P, and always-available LTE connectivity.
Attendees will learn about:
+ The characteristics of the Elastic Edge
+ Simpler, more efficient networking at the branch level
+ Virtual Cloud Networks and dark cloud security for IoT
+ Real-word SD-WAN and SD-P success stories
As a valued Tufin customer we invite you to learn how to begin the journey towards automation. We will discuss the challenges of automation and how you can take the first step towards automating firewall administration tasks.
In this webinar, you will learn how to gain immediate productivity benefits from the first phase of firewall change automation, such as;
•Discover and decommission unused and forgotten rules with a streamlined, automated process
•Understand the implications of server decommission and automate the process
•Realize the benefits of automating changes to object groups
Register now to save time and resources, reduce your workload, and quickly tighten your security posture with practical firewall automation.
Learn about a data exposure discovered from within the systems of Texas-based electrical engineering firm Power Quality Engineering (PQE), revealing the sensitive data of clients like Dell, the City of Austin, Oracle, and Texas Instruments, among others.
Left accessible to the wider internet via a port used for rsync server synchronization but configured to allow public access, the breach allowed any interested browser to download sensitive electrical infrastructure data compiled in reports by PQE inspectors examining customer facilities.
Dan O’Sullivan, the analyst who first broke the story, will go through the details of the discovery and the significant impact of this data exposure.
For the original article: https://www.upguard.com/breaches/data-leak-pqe
Enterprises are evolving their vSphere environments from standard DR configurations to high availability (HA) architectures. VMware vSphere Metro Storage Cluster is a key capability in this evolution. Parallel to this, companies are embracing hybrid cloud and AWS in particular. In many cases enterprises treat AWS as a passive DR site. But what if you could evolve AWS to be part of an HA stretch cluster? That’s where software-defined storage (SDS) comes in.
SDS solutions provide the flexibility to run on commodity servers as well as cloud computing instances. Couple that with advanced multi-site replication, per-VM storage policies, deduplication, snapshotting, cloning, and VMware’s recent announcement with AWS, and SDS is now the ideal enabler for automated failover in a hybrid cloud stretched cluster.
In this session we’ll:
- Provide an architecture for software-defined storage running a stretched cluster between a private vSphere cloud and AWS.
- Discuss how this provides seamless failover, HA, DR, and cloud bursting—all at scale.
- Highlight how data efficiency techniques like deduplication, thin provisioning, auto-tiering, and caching optimize hybrid cloud economics.
Chris is a VMware Certified Design Expert (VCDX) and senior solutions architect at Hedvig. Chris has in-depth experience in cloud, virtualization, storage, data center, and software-defined technologies gained from his work across numerous practices including web development, systems administration, and consulting. His advisory expertise helps customers better adopt and adapt to the technologies that best fit for their business requirements.
ITPG Secure Compliance's Cybercast series proudly presents : CMDSP - Mobile Security for the Mobile IT Administrator.
Come join us for a discussion on the advent of the Mobile IT Administrator position, and how CMDSP is helping organizations improve their enterprise mobility management strategy.
ITPG Secure Compliance has invited Mr. Ken Lloyd, CMDSP's Board members and CTO for Mi3 Security, a leader in Mobile Application Risk Intelligence and Mobile Threat Defense. With 18 years focused on creating powerful Mobile and Security solutions for Enterprises, SMB's and Consumers. Recognized as a Subject Matter Expert (SME) in Mobile Security, Security Awareness and IT Security.
Many of the largest and most well known breaches are cases of third party information exposure.
One of the largest leaks of all time was discovered when an RNC vendor, Data Root Analytics, exposed 198 million voter records, including personal details, voter information, and predictively modeled attributes such as race and religion.
Outsourced information work is crucial for organizations to scale and remain competitive, but it should be done with careful forethought to the risks the company faces should that information be compromised.
In this webinar you will learn:
- Why cybersecurity is dead
- How to mitigate cyber risk in a cost effective way
- How vendor risk becomes your risk
- Steps to become cyber resilient
- How to measure success on your path towards cyber resilience
Simplify & Accelerate Security Operations through integration and automation
Join us to hear how Security Orchestration from FireEye can:
UNIFY SECURITY TOOLS
Unify your security assets into a homogeneous platform and remove the operational silos that have bogged down security personnel for years. Improve operational efficiency and streamline processes with automation.
Save time and resources & Improve your overall ROI
ENHANCE SECURITY TEAM CAPABILITY
Give your team an edge on attackers with deployment, design, and pre-built playbooks from our team of experts.
Leverage our real-world, frontline Mandiant investigation experience & get access to class leading content, best practice playbooks and a global services breadth to assist clients anywhere in the world they need support.
INCREASE EFFICIENCY AND PERFORMANCE
Eliminate errors through standardised process and automation while reducing time demands on already stretched SOC teams.
Minimise error prone manual processes while maintaining response and process consistency &
Automate repeatable tasks enabling you to re-allocate staff to higher value tasks such as proactive hunting.
Towards the end of the session we will be delivering a LIVE demo of FireEye Security Orchestrator.
We discussed Human Factors in Cyber Security. The discourse surrounding human performance in cyber security remains a relevant topic; nevertheless, the scientific underpinning remains deficient. Human error is the primary contributing factor that leads to malicious activity in cyber security. Other domains such as aviation, healthcare, and nuclear power have capitalized on human factors to reduce accidents and to identify critical phases of operations; consequently, the cyber security sector trails behind the above-mentioned industries in leveraging human factors.
The aim of this presentation is leveraging organizational culture as a platform to address human factors in cyber security. The continuous integration of technology accompanied by (a) advanced persistent threats, (b) ransomware attacks, (c) data breaches, and (d) cyber-attacks increases and threatens the complexity of cyber security operations.
Included are examples of conceptual processes, models, and frameworks to influence cyber leaders and professionals to mandate the integration of human factors in cyber security.
Dr. Calvin Nobles, Ph.D. is a cyber security subject matter expert (SME), national security leader, researcher, practitioner, and educator with more than 20 years of experience. Culminating a career of military service at the national level in 2017, as a cyber security executive and cyber consultant. He is an adjunct faculty member at the University of Maryland University College and Indian Wesleyan University. Calvin is actively involved in the cyber community, volunteering with multiple professional associations and conducting cyber security research. Calvin is the author of the book, Exploring the Implications of Implementing Technologically Advanced Aircraft in General Aviation.
With today's digital demands, its more important than ever to deliver apps at lightning speed. Azure app hosting allows you to create powerful cloud applications for web and mobile on any platform, for any device.
Join Thomas Decant, Product Marketing Manager in the Cloud and Enterprise team at Microsoft, and Anirudh Singh Rautela, Cloud Application Development Specialist at Microsoft, in this two-part webinar. They will take us through the possibilities and benefits that Azure App Service provides your business and showcase how easy it can be to implement PaaS services.
Business disruptions and downtime can cause serious damage to a company's bottom line. And today, with multiple potential sources of disruption — from equipment failure to natural disasters and cyber-attacks — IT leaders are seeking even faster and more resilient disaster recovery (DR) strategies. Identifying risks and developing a DR plan are essential, but just as important is selecting the right vendor for your Disaster Recovery needs, which can be challenging.
In this live webinar, TierPoint Manager of Product Development, Dale Levesque and Zerto Technology Evangelist, Harry Smith will discuss the keys to effective DR planning and address the added challenges presented by increasingly complex hybrid IT environments.
Join Dale and Harry as they share use cases and answer key questions about creating an effective DR plan and selecting the best provider for your needs, including:
• What are the major causes of downtime?
• How has DR evolved from backup computer centers to cloud computing and advanced data replication technologies?
• What are the latest DRaaS trends?
• What are the key considerations when selecting a DR solutions provider?
We discussed Web Application Testing. Web applications provide a vulnerable window into internal enterprises. These applications often process and use poorly validated input. This presentation discusses methodologies to identify and exploit such vulnerabilities within the applications.
The target audience for this talk ranges from those with limited prior knowledge of web application testing to those with a moderate understanding.
Mr. Ben Pick has 8 years of security and development experience including vulnerability assessments of web and mobile applications, analyzing source code for security risks, and configuring architecture to monitor systems for anomalous activities. For the past few years, Ben has worked to incorporate security into DevOps environments by merging security tools within the software development lifecycle. This includes automating static code analysis and vulnerability tools on development environments which act as supplemental resources for manual tests.
Today’s IT risk environment is more threatened than ever thanks to the growth in sophisticated cyber attacks and security vulnerabilities. Now, complex, hard-to-detect attacks could bring down not just a single institution but also large parts of the internet and the financial markets. Organizations need an intelligent approach when it comes to assessing IT risk and managing compliance.
Staying safe is no longer just about deflecting attackers. It’s about staying ahead of attackers who are already inside the organization, and banks are doing this through structured lines of defense that enhance security capabilities, involve IT risk managers in operations, and expand internal audits mandate so they can cover business disruption. On this webinar presentation we will address some ways how organizations can as a part of an Integrated Risk Management initiative orchestrate effective IT risk management across the lines of defense.
Join our Cybereason, Carbonite joint webinar to learn the current and future state of ransomware as well as tactics and technologies for advanced cyber threat detection and prevention.
In this webinar you will learn:
- Why ransomware is so pervasive and prevalent.
- How you can futureproof your cyber threat prevention approach.
About the presenters:
Jessica Stanford, Director of Product Marketing at Cybereason, will be discussing the evolving methods cyber criminals are using along with advanced methods for detection.
Tom Powers, Director of Product Management at Carbonite, will be looking at a real-world ransomware recovery scenario, examining lessons learned, and exposing vulnerabilities in the strategies and backup/recovery technologies used.
Data is the lifeblood of today's business. As the volume of generated data continues to grow, so does the number of data breaches. It's more critical than ever for organizations to adopt database audit and protection solutions. But not all solutions are created equal.
What are the key capabilities that IT and security teams should evaluate? Join Terry Ray as he discusses key considerations for selecting a database audit and protection solution.
About the Presenter:
Terry Ray is the Chief Technology Officer for Imperva, Inc., the leading provider of data security solutions. Terry works directly with Imperva’s largest customers to educate on industry best practices, challenges and regulations. He also, operates as an executive sponsor to strategic customers who benefit from a bridge between both company’s executive teams. During his 12 years at Imperva, he has deployed hundreds of data security solutions to meet the requirements of customers and regulators from every industry. Terry is a frequent speaker for RSA, ISSA, OWASP, ISACA, Gartner, IANS and other professional security and audit organizations in the Americas and abroad.
Ransomware is just one of the many threats that can impact your business data. With the use of cloud storage and virtualization expanding, and with a +500% in attacks and +600% in new variants, NOW is the time to ensure you have a proactive backup plan. Join Veeam and Quantum to learn how to set up a solid BCDR (business continuity and disaster recovery) and backup strategy to protect your virtual data against any ransomware and cyber security threat, including some lessons learned by our customers.
Surveys show that 64% of companies have storage arrays from 3 or more vendors. What does it mean to manage storage infrastructure with so many different products?
In a word, CHAOS!
That’s why a majority of people interested in software-defined storage (SDS) want to simplify management of their storage infrastructure.
Join us for this webinar where we will show how the Lenovo DX8200D Powered by DataCore can bring order to your environment. The DX8200D is the fast path to SDS and it:
• Abstracts away the underlying complexity of storage infrastructure
• Consolidates IT infrastructure and simplifies management through automation and self-adaptive technologies.
NVMe is an industry standard protocol designed specifically for memory-based storage like flash drives. It unleashes flash arrays from the chains of SCSI that hold it back. Register for our live webinar and learn what NVMe and NVMe over Fabrics are, what the advantage of NVMe is over traditional SCSI protocols and how to go beyond the NVMe basics to fully tap into the potential of memory-based storage.
Intelligent application technology allows you to build apps with powerful algorithms, across platforms, with just a few lines of code. The answer lies in your application's architecture.
Join Pradeep Menon, Microsoft Data Solution Architect, and Karthik Rajasekharan, Microsoft Azure Product Marketing Director to learn:
- The different reference architectures and how to integrate these services into your applications immediately.
- A hands-on approach to implementing Cognitive Services on Azure
- About the next generation of application development and deployment
Are you considering taking the CISSP exam? The CISSP is considered the industry-leading certification in cybersecurity, but the exam is certainly no cake walk. Strategies for CISSP Exam webinar dissects the structure of the CISSP exam. Hosted by (ISC)2 Approved training provider CyberVista, we will explain the 8 Domains that comprise the test while also providing valuable strategies for test day.
More data outside of the data center is staying on endpoints and in the cloud than ever before. That means the risks to that data are also at an all time high. Plus regulations encompassing end-user data are also increasing, challenging IT to manage data when they have less control than ever. IT needs more than an endpoint protection plan, it needs an end-user data strategy.
In this webinar, learn how to evolve from an endpoint data protection plan to a comprehensive end-user data strategy.
Join us to learn how MaxLinear relies on WANdisco to improve productivity with Subversion Multisite delivering results such as:
- A 24/7 continuous integration environment with zero Subversion downtime
- Improved administrative efficiencies with Access Control
- Elimination of the effects of network failures and the dependency on legacy backup procedures
- Overcoming the challenges with Subversion mirrors
About the Presenters:
Russ Hill, Account & Renewals Manager Americas at WANdisco. Russ Hill works with our existing SCM install base as an account manager and renewals specialist. He works closely with the WANdisco Professional Services team on all SCM service opportunities in North America and is currently responsible for all new SCM opportunities within the Americas.
Owen Ofiesh Software Configuration Manager at MaxLinear. Owen Ofiesh is the Software Configuration Manager for MaxLinear, a global chip design firm. With over 15 years experience in configuration management, he has a strong background in many of the most common SCM tools and platforms. Owen has worked with WANdisco Subversion MultiSite for over six years and has a great understanding of how it compares and contrasts with other SCM tools.
Welcome to the Cloud Generation – where critical data, applications and infrastructure are shifting to the cloud for increased operational efficiency.
Employees today are accessing everything from everywhere, sensitive data is constantly on the move, and critical workloads are running on a cloud server, somewhere in the world. How do you manage and contain the huge increase in vulnerabilities caused by moving beyond traditional IT controls?
In our upcoming ‘The Next Frontier for Cloud Security’ webinar, we discuss how to:
• Govern access to data, apps, and systems that may reside in the cloud
• Secure information no matter where it sits or goes
• Protect against advanced threats in this new environment
• Minimise risk and ensure compliance as workloads move to the cloud
Join our webinar and discover how Symantec’s Integrated Cyber Defense Platform protects your users, information, and workloads in the Cloud Generation.
Despite the rampant adoption of cloud computing, some companies are hesitant to move entirely to the public cloud. Instead, they rely on the higher degree of control of the SDN in the private cloud, or utilize a hybrid approach. While the private cloud offers more control and manageability, ensuring that applications are deployed successfully, securely, and within the parameters of compliance can pose challenges without proper visibility and the foresight for auditability.
Organizations that are using a SDN need to employ best practices at the start to ensure that they are successful in the future.
Please join members of Tufin cloud team for an informal product-agnostic discussion on how network security policy management (NSPM) solutions can ingrain best practices in deploying and managing applications in the SDN, ensure connectivity, and enforce security. Topics for discussion include how to:
•Build a zero-trust policy in the private cloud
•Ensure compliance across all access changes
•Design and deploy network segmentation efficiently
•Deploy business applications with access continuity
•Ingrain preparedness for audits
Over 90% of the world’s data has been generated in the last few years. Accompanying this rapid growth in data comes exponential risks, as witnessed by the spike in cyber attacks of which no organization seems immune. The financial rewards gained by the perpetuators of cyber attacks is blatant, and this is driving continued attacks on companies containing massive amounts of consumer data. For these companies securing data is only half the battle. The risks can be greater when data is transmitted externally, hence it is critical that organizations know where sensitive data is going, how it is being transmitted, and how it is being handled and stored.
On this webinar our panel of experts will discuss some of the best practices organizations can consider to reduce the risk of suffering from a data breach, and to proactively prepare for any subsequent breach that could happen.
Our buildings, our cars, our devices now talk. They tell us what ails them, when they need servicing. From bots to virtual agents, through the power of machine learning, they have their own nervous system.
Join this webcast with UEM Edgenta and Powerup Cloud to learn how to gain new insights from data and these devices. Leverage the power of machine learning to digitally transform the future of these technologies.
With an increasing volume of conversation taking place around the concept of ‘organizational resilience’, business continuity management professionals are taking advantage of this to expand their own remit and improve their career opportunities. What does the future hold of business continuity management professionals? How does this impact new entrants to the industry? This webinar will discuss the outcome of a survey carried out by the BCI, in collaboration with PwC, as well as a breakout session held at the 2016 BCI World Conference.
In today's increasingly global work environment, more employees than ever before are making material decisions on behalf of the organization, and these decisions don't always adequately account for risks to the enterprise.
This webinar will provide an overview of how to define your organisation’s level of ‘risk appetite’, helping you to determine the most relevant approach for drafting your organization’s risk appetite statements, assess stakeholders’ preferred risk-taking posture and write impactful risk appetite statements.
As the digital transformation in IT continues to create the need for an Elastic EdgeSM, traditional tethers to the central office have all but vanished. Physical boundaries continue to decrease in importance, and organizations of all types require constant and dependable in-vehicle connectivity to keep up with changing business imperatives.
Dependable mobile connectivity keeps vehicles on the road longer, helps enterprises better manage their fleets, and allows businesses and organizations to better serve their customers. Forward thinking IT and fleet managers in nearly every industry are implementing in-vehicle networks at a fraction of the cost and with less complexity. By taking advantage of cloud-managed, software-defined solutions, IT teams are evolving enterprise networks to reach improved productivity, reduce costs, and create operational efficiencies.
Join Cradlepoint for a live webinar on Wednesday, September 6, 2017, at 9 am PT / 12 pm ET to learn how networks on the move are staying always connected and protected.
In 2012 RBS suffered a major disruptive IT event impacting customers over a 17 day period. In response to this event RBS reassessed its Resilience Strategy. This session will take you through the banks resilience strategy and how we use it to manage our resilience risk exposure, what we rely upon to support our business and our customers and how we identify and manage the threats we face.
Join our “Web App Security” presentation, which provides the audience with a global perspective of the current state of web application vulnerabilities. Attendees will:
• gain a better understanding of how reconnaissance is used by attackers to discover and pinpoint systems to compromise,
• learn about attack methodologies and how vulnerable web apps can be leveraged for attackers to gain privileged access, and
• hear remediation strategies to help protect their web apps from being attacked.
Paul Fletcher has over 20 years of experience in information technology and security. Prior to joining Alert Logic, Fletcher advised executive level leadership in the energy, retail, and financial sectors regarding emerging security threats and mitigation strategies. Additionally, he has worked with Fortune 50 organizations, the Department of Defense, and critical infrastructure organizations to implement risk management plans and security solution designs. His other specialties include network security, customer data integrity, application security, forensics investigation, threat intelligence, and incident response. Fletcher holds a Master of Arts and Bachelor of Science degree and is a Certified Information Systems Security Professional (CISSP).
General Data Protection Regulation (GDPR) is new legislation intended to strengthen and unify data protection for all individuals within the EU. The regulation affects companies worldwide as it impacts any companies who possess data from customers in the EU.
The new legislation comes down to management of personal data: consent, retention, security and protection. Learn the basics about GDPR, how it affects your company and best practices for data storage to successfully comply with GDPR as it becomes enforceable in 2018.
Disaster Recovery as a Service (DRaaS) solutions have vaulted to the top of the considerations list for organizations looking to improve their ability to recover from major disasters like hurricanes and floods. But DRaaS solutions are not just for recovery anymore. These solutions can help organizations protect from ransomware, modernize infrastructure, and recover from minor disasters as well. Of course the solution must also provide peace of mind that when disaster strikes, the plan will not only work -- it will also be easy to initiate.
Вебинар для заказчиков посвященный решению Commvault по контролю и защите данных от вирусов-вымогателей. В рамках вебинара вы узнаете:
• Какие инструменты информационной безопасности есть на
вооружении у Commvault
• Каким образом Commvault распознает вирусные угрозы
• Как защитить инфраструктуру резервного копирования
• Инструменты мониторинга компонентов ИТ среды от Commvault
‘What are salaries in business continuity and resilience like?’
This is doubtless one of the most frequently asked questions by new entrants to the business continuity and resilience fields. Patrick Alcantara DBCI, author of the 2017 CI Salary Benchmarking Report, will answer this question and more during this webinar. This webinar will feature the results of a survey of more than 1,100 professionals worldwide.
In this webinar, we will examine the key elements necessary to protect sensitive data. The focus will be on comprehensive security aspects that enterprises need to consider going forward. The webinar will expand on how the General Data Protection Regulation (GDPR) is just the beginning; a set of best practices that every organization should adhere to, not just in the EU but globally, to use security as an enabler for a safe digital future.
Topics discussed will include the expanded ecosystem of users, devices, applications, and things that must coexist in a trusted environment, as enterprises transform operations to depend on an all-digital infrastructure.
Join the webinar to learn:
• Why GDPR is only the beginning - cutting through the noise
• How digital business is driving new approaches to data security
• What are the best practices for improving data hygiene
The BCI Horizon Scan has become a vital resource to those working in the fields of business continuity, risk or resilience, and as such it is getting a greater number of respondents from a wider range of countries and industries. The 2017 Horizon Scan Report showed that once again it was cyber attack that was the number one threat, with data breaches remaining in second place and network outages third. Adverse weather moved up three places to enter the top five along with security incident.
We live in a world of uncertainty. The BCI Horizon Scan Report 2017 provides clear confirmation that organisations are being disrupted and there are a range of threats that are of great concern.
Cyber-attack is the top concern and while considerable effort goes into reducing cyber threat, an actual attack is not a security issue.
This presentation will help you understand the difference between Business Continuity and Information Security and their role before and after an attack.
This webinar will enter the current “BIA Controversy” with a description of what works….and what doesn’t.
I learned in 1991 what makes a BIA “not work” when my team and I had to deal with a BIA report that had covered all sites of a global firm.. Key characteristics: it took over 2 years to complete and had cost nearly half a million dollars, did not provide a basis for building a plan, and much of the information was out of date. So I made a few common-sense process changes that made all the difference in going forward to complete useful plans in a reasonable time-frame.