The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
In this webinar, Lockpath’s Sam Abadir and Community Health System’s Scott Breece will discuss the unique IT landscape of the healthcare industry and the challenges this presents for IT risk management.
Abadir and Breece will discuss common strategies for identifying and managing IT risks including risk assessment methodologies, best practices for assessing business associates and third parties, incident response plans, and available toolsets to support these activities.
The nature of enterprise data is rapidly changing and existing storage infrastructures can’t keep up. Network Attached Storage (NAS) devices were designed for performance and single-site collaboration but file creation and access is different now. Many turn to the cloud to offload data, however, for rapidly scaling data sets, daily transfer rates and bandwidth constraints are an issue. In addition, some sensitive information can’t leave your data center. Komprise and Caringo have partnered to solve these issues by pairing intelligent data management technology with hassle-free, limitless storage.
Attend this webinar to learn how you can slash TCO for rapidly scaling data sets by identifying data to move from NAS. Then securely transferring it based on value to Caringo Swarm scale-out object storage were it is protected without backups and instantly and securely available internally or externally.
Making sure everything in the data center is properly protected is a common struggle that all data centers face. The cloud, cloud backup, seems like an answer to all those struggles. But, how exactly does IT make the conversion from on-premises backup to cloud backup? Join experts from Storage Switzerland, Veeam and KeepItSafe and learn; a method to determine if cloud backup is right for your organization and if it is, how to create a plan to begin the transfer to cloud based data protection operations.
For healthcare providers that receive Medicare and Medicaid reimbursements, managing exclusion risk is critical. Employees, business associates, suppliers, and more who land on state exclusion lists while employed or engaged by a provider can result in severe regulatory penalties. In this educational webinar, Lockpath and Kinney Services will guide you through the world of exclusion risk and point out what you need to know.
Attendees will learn:
* A definition of exclusion risk with real-world examples
* Challenges encountered with managing exclusion risk
* Strategies for implementing a consistent, repeatable review process
* Technology's role in streamlining exclusion risk management
Are you continually reviewing the exclusion status of employees and business entities? If not or reviews are conducted haphazardly, you run the risk of regulatory penalties and a potential crisis in the reimbursement process. Discover what you need to know to managing exclusion risk in this educational webinar.
In this webinar, join Storage Switzerland and Panasas to learn:
- Why HPC workloads are on the rise in the enterprise
- Why common enterprise storage can’t keep up with HPC demands
- Why traditional HPC storage is a poor fit for the enterprise
- A three-step process to designing an enterprise-class HPC storage architecture
While everyone is talking about Cloud based data centers, the real migration is to outer space, where satellites continuously orbit the Earth. How will this work and what are the security implications. The Goddard Space Flight Center's lists 2,271 satellites currently in orbit.
Join this panel of experts as we cover:
•The migration of data centers to satellites
•The benefits, risks, vulnerabilities and threats posed to a satellite based datacenters
Dennis R. Gatens: VP Channel Management & Marketing at Cloud Constellation Corporation
Jeff Snyder: CTO at Cloud Constellation Corporation
For this month's theme of 'Cyber-Espionage and Threat Hunting' we'll here from Chris Novak, Director, Investigative Response on cyber-espionage and threat hunting as seen across the Investigative Response Team caseload. We'll then transition into a Q&A session with Jihana Clemetson, Senior Analyst, Threat Intelligence, and Marcus Cymerman, Senior Analyst, Network Forensics to dig further into our cyber-espionage cases and discuss typical indications of being a victim of cyber-espionage, the components of threat hunting, and the approaches to investigating cyber-espionage incidents.
Following the cyber-espionage insights, we'll cover the following topics:
Mit FireEye Threat Analytics in kürzester Zeit das eigene SIEM realisieren.
Die Erfahrungen mit klassischen SIEM-Lösungen haben immer wieder gezeigt, dass durch deren Implementierung recht schnell große Datenmengen und gleichzeitig viele Alarme erzeugt werden. Damit werden noch lange nicht alle für die Cyber-Sicherheit relevanten Probleme gelöst
Wir zeigen Ihnen, wie Sie schnell zu einer SIEM-Lösung kommen, die einen entscheidenden Mehrwert aus dem Daten-Dschungel bietet um:
•Kostspielige und aufwändige Installation zu vermeiden
•Die hohe Anzahl an Alarmen und der damit verbundene Aufwand zu priorisieren
•Angriffe und Aktivitäten in Ihrem Netzwerk sofort zu erkennen
Ergänzen Sie Ihre bestehende SIEM-Lösung und steigern Sie damit deutlich das Cyber-Security-Niveau Ihrer Organisation.
To keep pace with today’s media and digital asset management workflows, you need a cost-effective secondary tier of storage (active archive) that provides instant accessibility and unrelenting data protection—while scaling to store petabytes of unstructured data and billions of files. Caringo Senior Consultant John Bell and Engineer Jose Juan Gonzalez will explain how object storage (using NoSQL, unstructured methods of search like Elasticsearch, and advanced metadata and content management capabilities) can be used to build this active archive and will illustrate use with a live demo of how Caringo Swarm integrates with leading industry tools such as the CatDV media asset management (MAM).
Identity risk impacts multiple business functions within an organization. Vendor risk, business continuity, compliance, and more all strive to reduce risk exposure with limited regard to the holistic picture. This session discussed how to shape this breadth of exposure and provide guidance and strategy to Identity Risk Management.
GDPR is an EU regulation that comes into effect on the 25th of May 2018.
GDPR is designed to uphold the rights of the individual in terms of how their personal data is handled, stored and secured.
It also places greater responsibility on businesses to observe data security and related processes and practices.
Kaspersky Lab solutions help companies process personal data by offering effective measures to reduce the risks of a data breach, prevent security incidents and enhance visibility of the monitored infrastructure.
During the webinar, we’ll look at the following topics:
•What GDPR is - and isn’t - when it comes to cybersecurity.
•How cybersecurity fits into GDPR-aligned processes.
•The endpoint: a good starting point for the cybersecurity aspect of a data protection strategy.
•The role of storage and the impact of storage security.
•Guarding the bottlenecks: perimeter defenses to reduce the risks of human influence.
•Why data in the cloud requires special security.
•Forewarned is forearmed: the importance of cybersecurity essentials training.
•Understanding the risks: get more from your Data Protection Impact Assessments.
•Kaspersky Lab’s GDPR readiness.
The Equifax data breach, Cambridge Analytics and GDPR are all recent examples of the risks which today’s organisations face around the personal information they store. Come for a journey as we explore how Micro Focus can help you discover, secure, pseudonymize and control personally identifiable information within your organisation using the SCM suite. Learn how Structured Data Manager can target structured data, ControlPoint can target unstructured data, and Content Manager can secure both.
Today’s data centers are expected to deploy, manage, and report on different tiers of business applications, databases, virtual workloads, home directories, and file sharing simultaneously.
HPE 3PAR StoreServ is highly efficient, flash-optimized storage engineered for the true convergence of block, file, and object access to help consolidate diverse workloads efficiently.
This session provides an overview HPE 3PAR File Persona and core file data services.
It’s not everyday you get the inside story on how a group of cybersecurity researchers stumbled upon an APT, an advanced persistent threat, when they were examining the intelligence data from their security kit.
It appeared harmless and boring but of advanced attributes. But Fleming Shi and Jonathan Tanner suspected something was amiss.
Facilitated by Amar Singh, practising CISO, on this exclusive webinar as he unpicks what Fleming and Jonathan did next. Their curiosity got the better of them and they set about tinkering to discover the true intentions of this benign malware.
Your company is embracing big data, analytics and IoT, and your infrastructure can’t keep up. How can recent breakthroughs in data storage help you gain a competitive advantage?
In this session, you’ll discover a new storage architecture that makes it possible to store more and spend less while accelerating your path to innovation. Learn how this novel approach solves the age-old problems of performance, availability, scalability AND affordability, in a simply better way.
About the speaker:
Brian Carmody is Chief Technology Officer at INFINIDAT, where he leads the research and emerging tech group. Prior to joining INFINIDAT, he worked on the XIV storage system at IBM. A 15-year tech veteran, his experience also includes system engineering roles at MTV Networks and Novus Consulting Group.
Artificial Intelligence (AI) is quickly gaining recognition as a viable method to increase successful problem solving, advance research in areas that exceed human capabilities and are automating menial processes to increase efficiency and productivity in expediential time. In the future, your interface with a human doctor may be limited, as AI gains more prominence in the medical industry diagnosing patients and determining levels of care. AI is being used to develop humanoids for companionship and is providing additional conveniences that are starting to alarm some organizations. There is a sense that the pace of AI is growing so fast that it may be impacting areas that are not getting the attention required to address various risks. Cybersecurity issues continue to arise regarding the integration of AI in computer systems, network and software platforms and the growing advances in IoT devices. As various industries invest in AI technology, CIOs, CISOs, researchers and manufacturers need to be working together to ensure cybersecurity and other safeguards are being considered in the design phase before allowing AI technology into the computing environment.
An organization’s data is constantly under attack. Whether it’s through ransomware attacks, cyber-threats or employee misguidedness, all expose organizational data and put it at risk. Encryption and access control are the keys to securing data and cyber resiliency, but most storage systems throughout the infrastructure (primary, secondary and protection storage) treat security as an afterthought reducing flexibility and increasing complexity. In this live webinar we will discuss the three reasons why storage security is failing.
As organizations rely on third parties to grow and thrive, they’re exposed to major cybersecurity risks. Mitigating this risk means confronting the potential security vulnerabilities that are present in your third party network, but traditional vendor risk management (VRM) methods are no match for modern threats. According to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes.
Join our panel of experts on this CPE accredited webinar to learn how your organization can create a VRM program that’s ready and able to stand up to today's third party threat landscape.
- Find out why traditional vendor risk management programs don’t work
- Learn how to perform quantifiable vendor security analyses
- Discover how to build a scalable VRM program
Nearly 1.5 million dollars. That’s how much an average data breach in the cloud costs enterprises, according to the Global IT Security Risks Survey 2018.
Second only to targeted attacks, breaches affecting IaaS are among the most costly faced by businesses today. But what can be done about this? Apparently, investing more in protection is only part of the solution, as businesses are already allocating a greater share of their IT budgets to security…
During the webinar, Maxim Frolov, VP Global Sales, Kaspersky Lab, will present key findings from the company’s latest report On the Money: Growing IT Security Budgets to Protect Digital Transformation Initiatives. Maxim, along with special guest Jim Reavis, Co-founder and CEO, Cloud Security Alliance, will discuss the potential damage and the main risks associated with cloud breaches, as well as what businesses can do to protect themselves.
Webinar attendees will get the latest insights on the dynamics of corporate security incidents and IT security budgets. They will learn what financial, organizational and technological decisions should be made to protect businesses from the threat of cloud infrastructure breaches.
This session will cover the growing trend to bring full-fledged computing closer to users, creating a distributed computing function to deliver critical business services. Key discussion points include the need for mission critical resiliency at the edge and how the industry is responding to this need with new hybrid resiliency strategies.
Finding and prioritizing application vulnerabilities is an extremely time-consuming, manual process, and it’s one that is rarely undertaken comprehensively. It’s not that application security teams don’t know where risk lies—they do. Many simply lack the time, resources, or context to address those which pose the greatest risk.
The result? Oftentimes, the wrong vulnerabilities are fixed while the more dangerous ones are left unaddressed, forcing your team into reaction mode after the damage is already done.
Join us for our next webinar: “Stop Playing Catch-Up on Risk: How To Prioritize Application Vulnerabilities,” powered by the Kenna Application Risk Module.
In this webinar, you’ll learn:
- The challenges in identifying vulnerabilities at the application layer
- The requirements to better manage application risk
- What application security teams can do to improve their risk posture
- How the Kenna Application Risk Module can help you proactively manage your application risk
Enable security and DevOps teams, developers, and executives to team up to proactively remediate application risk. Join us and see the Kenna Security Application Risk Module in action to learn how you can take a risk-based approach to application security.
Disaster Recovery plans have always been hard to create and maintain in part because it is difficult to meet the service levels that those plans promise. With recent trends like GDPR and ransomware threats, it is even more difficult for DR plans to live up to expectations.
Join Storage Switzerland’s Founder and Lead Analyst, George Crump, and Commvault’s Director of Product Management, Deepak Verma and learn:
1. What new trends and threats promise to break your current DR process
2. How to simplify creation and maintenance of your DR plan
3. How to meet the service levels that your DR plan commits you to
Today’s cybersecurity attacks are spreading faster, evolving quicker and targeting every organization regardless of size. Challenged with limited security resources, the most exposed part of many organizations is usually the least protected; endpoints.
Join Carbonite + Barkly in an upcoming webinar to learn:
- Common infection and exploitation techniques used in today’s attacks
- Strategies for proactively protecting your endpoints from ransomware and other malware
- Which endpoint protection and data backup capabilities are the most important for complete endpoint protection
Should your organisation be archiving it's Social Media presence? What about SMS/MMS messages? The way we communicate is evolving and so too are the policies and guidelines around what needs to be securely archived within an organisation. Join us and learn how Micro Focus is helping organisations capture data from various sources into one unified secure location.
The three elements of a successful sales culture you never realised, three hiring and recruiting strategies for A players you never implemented, and your biggest blind spot that prevented you from ever getting results.
First part of our 'Breach Response Preparedness Series', a 3-part series on state-of-the-art incident investigation techniques and breach response strategies.
Mandiant responds to hundreds of breaches on a yearly basis, across all industries and geographies, thereby gaining insights into the different threat actor groups and their TTPs. This also provides us with valuable insights into the how and why of the failing defences of the organisations we support in time of crisis.
Join your host Jeroen Herlaar, Mandiant Regional Director, for a 25-minute webinar to share our thoughts on what we experience on a daily basis while responding to the breaches that matter.
Una vez que tenemos claros los beneficios que requerimos de una tecnología, es importante definir el mejor camino para alcanzarlos. Hablaremos aquí de dicha ruta, tanto para Nube Híbrida como para DRaaS.
We all think we know the cost of a wrong hire in sales. Many of us have paid the heavy price, but we often do we overlook the person whose job it is to hire the best and get the best out of them, the Sales Manager. If you think hiring the wrong salesperson is expensive, you can multiply that cost by 5-10x when you hire the wrong sales manager.
* Does your manager try to manage the numbers?
* Is your manager focused on being a supervisor?
* Do they treat recruitment as a chore and an interruption to their real job?
* Are they taking too long or failing to manage turnover?
* Are they managing from an ivory tower?
* Do they confused training with coaching and why does this matter?
* Do they rescue & accidentally create a culture of upward delegation & learned helplessness?
* Do they believe the excuses they hear?
* Are they more concerned with being liked than being effective?
* Are they inconsistent or lack clarity?
* Do they do what was done to them?
* Are they blaming their salespeople instead of taking responsibility for fixing the problems you need them to fix?
* Are they focused on the helping the wrong people?
* Are they worried about playing favourites?
If you answered “yes’ to any of these questions YOU have a problem.
A webinar for owners, CEOs and sales managers who are brave enough to look into the abyss. Not for softies!
Second part of our 'Breach Response Preparedness Series’, a 3-part series on state-of-the-art incident investigation techniques and breach response strategies.
Statistics (from M-Trends 2018) show that the median dwell time (time between initial intrusion, and detection) for EMEA organisations in 2017 was 175 days. A 175 days roaming free inside the victim’s infrastructure; a large portion of which likely would have been with administrator privileges, thereby having the keys to the kingdom. To be able to respond to such breaches effectively and efficiently, Mandiant applies a structured approach, relying on its scalable technology platform, and threat intelligence collected over the last 14 years.
Join your host Jeroen Herlaar, Mandiant Regional Director, for a 25-minute webinar to discuss the Mandiant incident response approach, and why it matters to your organisation if you are confronted with a serious compromise.
Transforming IT for Mission Critical Business Workloads will articulate the business considerations as customers prepare to transform IT for the digital economy. Covered is Modernizing the Data Center for a digital economy, data management from Edge to Core and Multi-Cloud deployment models. Data from connected things, people, and devices can enhance customer experiences, grow market share, and create competitive advantage.
Business interruptions can upset customers, cost sales, and put companies in a bad light. That's where business continuity management (BCM) comes in. A BCM plan details the impact of various disaster scenarios and formalizes steps for ensuring critical operations remain open during a crisis. In this live webinar, Lockpath's Sam Abadir will share a roadmap to smarter business continuity management.
* The role of business continuity management on operations
* How to identify risks that could potentially lead to disruptions
* Strategies for modeling the business impact of various disasters
* Importance of mapping plans to risk, controls, processes, and vendors
Learn how to better prepare your recovery plans by attending this webinar on smarter business continuity management. Register now!
Sophisticated, targeted attacks can take weeks, months, or longer to discover and resolve. Security teams need tools that quickly uncover the source and scope of an attack to reduce time-to-resolution, mitigate ongoing risk, detect attacker breakout, and further fortify the network.
During the Webinar, You will Have Hands-On Control of the Adlumin Platform and Learn:
•Why User & Entity Behavior Analytics (UEBA) is the key to determining whether you have an intruder in your network today.
•How UEBA and Adlumin’s SIEM technology are advancing cybersecurity
•Why you need the Adlumin Platform to help you visualize privilege in Active Directory
Robert Johnston, CEO & Co-Founder, Tim Stacey, Ph.D., Director of Data Science, and Col.(Ret) Tim Evans, SVP & Co-Founder of Adlumin Inc. Rob Johnston was the incident responder for the Democratic National Committee (DNC) investigation in 2016 and started U.S. Cyber Commands first Cyber Protection Team (CPT).
You’ve just hired James Bond on to your sales team and you have high hopes for his performance. Assuming you really did hire James Bond and not Mr Bean in a Tux, what can you do to ensure disappointment?
Why! Fail to do a proper onboarding process! Delude yourself into thinking you hired an adult, a professional, someone who can be depended on to hit the ground running. “John is a big boy and doesn’t want me crowding him. I’ll let him get on with it.”
This is called management by abdication and is one of the cardinal sins of sales management.
Onboarding is the lost element of successful recruitment. The best sales managers have a 120 day onboarding plan for new hires. Why 120 days? Because that is the probation period a new hire is typically putting you (their manager, the job they actually bought, the company and the other people on the team) on in case they believe they have made a bad choice of career move.
You’ve invested time and money in attracting them, selecting them, offering them, legal & HR costs, managing their notice period, paying them, training them and you risk blowing your winnings because you’re too busy, too stupid or too lazy to finish the job you started!
Onboarding is not about giving them an Ops & Employee Manual to read, giving them some product training and provisioning them with passwords, a laptop and a phone. Those are the tiniest part of a good onboarding process. Onboarding should set up a new hire for success. It should be structured and confirm that you have made the right hire. It should tell you quickly if you haven’t so you can hire slow and fire fast.
A reliable onboarding process needs to cover 3 things:
* What do they need to know?
* By when do they need to know it?
* Where can they find it?
Third and final part of our 'Breach Response Preparedness Series', a 3-part series on state-of-the-art incident investigation techniques and breach response strategies.
Recovering from a large-scale incident is not an easy task. When compromised by an Advanced Persistent Threat, one must plan the efforts ahead of time to succeed in fully remediating and eradicating the attacker from the environment.
During this webinar, we will discuss:
- How to best remediate from such an event;
- The different stages of the preparation, when it is the best time to remediate, and how to classify actions;
- Examples of real investigations and remediation efforts to illustrate common complications like remediating too early, remediating partially and working with third party IT providers
Join your host Manfred Erjak, Professional Services Consultant, for a 25-minute webinar to discuss the latest incident remediation trends.
When it comes to High-Performance Computing (HPC), the volume of data that comprises data sets can easily over-burden primary storage. When that happens, performance and speed are compromised and research and business objectives are at risk. As data sets continue to grow, more and more HPC organizations are turning to object storage technology to build active archives. Learn how adding cost-effective object storage into your storage infrastructure can reduce storage TCO, provide continuous data protection, and give you the power of metadata so you can quickly retrieve data when you need it.
Network security needs are changing right before our eyes. Digital transformation is shifting workloads to the cloud, increasing mobile workforces, and expanding IoT footprints — and network on-ramps.
From branch locations to in-vehicle networks and IoT devices, cyberattacks become more advanced by the day. Today’s diverse network architectures and security needs make scalable solutions and flexible cyber threat intelligence essential. Many organizations want the cost savings and efficiencies of the cloud without having to sacrifice the level of security to which they’re accustomed.
Join Cradlepoint's Ken Hosac, VP of IoT Strategy, for this live webinar to explore the blending of legacy and next-generation measures to keep enterprise networks secure.
Hosac has helped drive Cradlepoint’s growth and development through roles in strategic planning, product management, solution strategy and thought leadership. He frequently represents the company at industry conferences and events, and served on the original Advisory Board for the IoT/M2M Evolution Magazine. Hosac has 25 years of experience in marketing, sales, R&D and manufacturing. Prior to joining Cradlepoint, he served as VP of Marketing for Casabyte (later acquired by JDS Uniphase). He also served as VP of Business Development for GoAhead Software (later acquired by Oracle). Hosac earlier spent 10 years at Hewlett Packard with cable modems and head-ends, set-top boxes, and personal computers in a variety of engineering and engineering management roles. He holds a B.S. degree in Electrical Engineering and an M.S. degree in Manufacturing Engineering, both from Stanford University.