The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
Nikolas Barth, Head of Innovation & Digitalization & Andrea Martschink, IT Strategy & Business Development Robotics, SiemensRecorded: Dec 11 201890 mins
Innovation has always been at the heart of Siemens. In addition to being the largest manufacturing company in Europe, the German conglomerate continues to innovate in a startup fashion and has embraced Digital Transformation and has won their CIO Award based on the work they are doing with RPA.
In this episode of our Blue Prism Café, discover how Siemens has been leveraging Robotic Process Automation as part of this Digital Transformation journey, and how their global RPA service, run jointly by the Shared Services and IT department, has enabled their lines of business in realizing true efficiency and quality gains along end-to-end processes. You will also get insight as and how they are leveraging some of the latest intelligent automation technologies such as IBM Watson, Celonis and MSFT Azure Chatbot Technology with their Blue Prism Digital Workforce.
Key takeaways will include:
• How Siemens built their RPA Centre of Excellence to future proof their RPA and Intelligent Automation Growth
• Real-life scaled examples of automated processes across various lines of businesses
• An overview of Siemens' use of Cognitive Automation leveraging RPA
• Achievements and results from their service delivery model
• Nikolas Barth, Head of Innovation & Digitalization in Siemens Shared Services
• Andrea Martschink, IT Strategy & Business Development Robotics
Michael Flouton - VP Security Strategy, Barracuda; Jez Back, Founder & Principal Erebus Technology Consulting Services LtdRecorded: Dec 11 201855 mins
2018 saw some great strides in cyber security as well as some major breaches. Will 2019 be the same? As we all try and stay one step ahead of the attackers and look into our crystal ball on what the future holds, Barracuda wanted to see how our customers and channel partners feel about the past, present, and future of cyber security and how their approach has evolved over time.
We surveyed more than 1,500 IT leaders and security professionals in North America, EMEA, and APJ about their IT security priorities, how those priorities have shifted, and where they’re headed next.
Join this webinar with Barracuda’s, VP Security Strategy, Michael Flouton and Erebus Technology's Jez Back, Founder & Principal, to find out:
- What 1500 IT and security professionals in North America, EMEA and APJ believe will be the next big trends in cyber security
- How their priorities have changed over the last 15 years and where they will focus for the next 15 years
- Which cyber security trends have impacted their cyber security strategy
- How to prepare your organisation for these new trends
Register today to find out what your peers believe will be the key trends in cyber security and advice on how to stay ahead of the attackers in 2019 and beyond.
Steve Durbin, Managing Director, ISF LTDRecorded: Dec 11 201847 mins
Organisations in 2019 will be increasingly faced with a hyper-connected world where the pace and scale of change – particularly in terms of technology – will accelerate substantially. Business leaders need to develop cutting-edge ways to deal with new regulation, advanced technology and distorted information.
In this webinar, Steve Durbin, Managing Director, ISF will discuss the threats organisations will be facing in 2019 and how business leaders and their security teams can address them. The emerging cyber threats to lookout for include:
-The increased sophistication of cybercrime and ransomware
-The impact of legislation
-The myth of supply chain assurance
-Smart devices challenge data integrity
About the presenter
Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
Grant Kennedy & Dr Aarti AnhalRecorded: Dec 11 201861 mins
People are the single most important asset in any organisation, yet they can often be the most vulnerable. The opportunities and threats people present to the operations and strategic objectives of their organisations constitute “people risk” – an area of risk often ignored because of the perceived complexities involved in managing it effectively. This webinar will focus on “risk intelligence”, which refers to the way in which an individual’s values, risk competences and behaviours come together to drive their perception of risk, approach to risk-based thinking and decision-making. Th webinar will introduce the diagnostic tools that can be used by organisations to evaluate the “risk intelligence” of staff, whether in the operational 1st Line, the 2nd line’s risk and compliance functions or senior management.
Carolyn Williams, Director of Corporate RelationsRecorded: Dec 10 201859 mins
11 a.m Carolyn Williams, Director of Corporate Relations,
Institute of Risk Management
Introduction to the new Certificate and support from the
WMG Cyber Security Centre at the University of Warwick
and the University’s Department of Politics and
11.10 Panel discussion into: What are senior
risk managers detecting in their businesses/macro/micro
environment that underlines the need for digital upskilling.
Steve Treece, CFIRM,
Head of Corporate Risk, Corporate Portfolio Office, NHS Digital
Credit Risk Skills & Risk Academy, Barclays
Stefano Capodagli, IRM Technical Specialist, Strategic Advisor & Group CRO
11.30 Trudi Mellon, Specialist Consultant – Qualifications
Projects, Institute of Risk Management
Syllabus development, key learning outcomes,
partnership with Warwick University
11.40 James McCarthy , Student Admissions, Engagement &
Institute of Risk Management
Questions, advice and guidance on the practicalities of enrolment, studying and exams
Storage Switzerland and AparaviRecorded: Dec 7 201816 mins
Join Storage Switzerland and Aparavi for our live PodCast dealing with data privacy regulations like the European Union’s General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA). The regulations potentially force organizations of all sizes to rethink how they protect, retain and remove data.
During the PodCast we cover:
- The aspects of the GDPR and CCPA regulations that should concern IT
- The challenges the regulations create for current data protection retention applications
- How organizations need to change policies and products to address the regulations
- Answers to live audience questions about data privacy, GDPR, and CCPA
All attendees to the live event receive a free copy of Storage Switzerland’s latest eBook “GDPR IS FOR EVERYONE - Designing a Data Privacy Infrastructure”.
Aaron Cockerill, Chief Strategy OfficerRecorded: Dec 7 201829 mins
What is currently happening the world of security?
Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.*
The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations enforce their endpoints and establish continuous conditional access to data based on risk.
During this webinar Aaron Cockrill, CSO at Lookout will talk about:
- What does a post-perimeter world mean to enterprise security?
- Why mobility changes the enterprise security paradigm?
- How to protect data when accessed from outside the corporate perimeter?
- What are the current and emerging threats?
* Source Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
Dr. Jim Metzler and Joel ChristnerRecorded: Dec 6 201843 mins
The WAN has been fundamentally upended by SD-WAN and IT decision makers now have to reconsider what the branch of today and tomorrow looks like. Do you choose a best-of-breed solution or do you settle on a solution that includes SD-WAN and other capabilities?
Join our webinar to learn the pros and cons of each and which dimensions should power your decision.
In this webinar, you will learn:
* The similarities and differences between best-of-breed SD-WAN and all-in-one systems
* Which challenges and complexities are either presented or remedied by each model
* How best-of-breed SD-WAN and all-in-one systems affect long-term remote office architecture
* And most importantly, which provides the most value in different circumstances
Dr. Jim Metzler is the Founder and Vice President at Ashton, Metzler & Associates. Dr. Metzler has worked in many positions in the networking industry. His current interests include Application Delivery, Software Defined Networking and Network Functions Virtualization.
Joel Christner is the VP of Marketing at CloudGenix and has two decades of experience in building distributed systems, infrastructure, and application delivery.
Storage Switzerland, Western DigitalRecorded: Dec 6 201847 mins
The flash optimized NVMe protocol has been on the market for over a year and the technology is available in several forms. NVMe, both storage and networking (NVMe over Fabrics) is more expensive than the typical SAS based solution and not all applications or environments can take advantage of the performance NVMe promises. At the same time there are workloads like artificial intelligence, machine learning and high velocity analytics that need all the performance that NVMe can offer and some organizations are buying NVMe solutions just for those workloads.
Most data centers already have too many storage systems to manage, and adding another silo just for extreme performance workloads may make the problem even worse. IT needs a strategy to not only correctly integrate NVMe into the data center but to do so in a way that doesn’t further fragment the architecture. In fact, with the right strategy, IT can use the NVMe system as a point of storage consolidation.
In this live webinar join experts from Storage Switzerland and Western Digital for an interactive webinar the will help you develop an NVMe strategy that makes the most sense for your organization.
Florian Malecki, International Sr. Product Marketing DirectorRecorded: Dec 6 201844 mins
Midsize businesses are increasingly embracing digital technology to gain a competitive advantage. However, the explosive data growth, coupled with a lean IT staff at most midmarket organizations has placed an immense burden on data protection and storage infrastructure requirements.
In recent years, a disruptive technology has emerged, creating a brand new category of backup & recovery and storage solutions: converged data protection appliances.
The concept is very simple: combine backup and recovery software with a scale out storage appliance that can be used as a backup target as well as accommodating most storage requirements.
Join this webcast to learn about the benefits of converged data protection platforms and what to look for when making your final decision.
Seyi Verma, Director of Product Marketing @ DruvaRecorded: Dec 5 201846 mins
Managing the backup and restore of virtual machines is an intricate process involving multiple staff and a complex infrastructure. This dependency on these cumbersome, error-prone, multi-tiered systems results in high costs for backup and archival storage, putting your data at a higher risk.
Organizations today are now looking to the cloud as a viable, cost-effective alternative to protect against the pitfalls and inefficiencies of traditional VMware backup and disaster recovery (DR).
Join us for this webinar and learn how the cloud can solve your VMware backup challenges, including:
-Reducing your overall storage footprint and consolidating your data
-Streamlining management and reducing costs
-Meeting your RTO and RPO requirements
-Leveraging enterprise cloud backup for instant disaster recovery
Seyi Verma is a Director of Product Marketing at Druva. He has over 16 years of experience in product management and marketing, driving initiatives around product launches and strategy for both hardware and software. At Druva, he leads product marketing for Phoenix, the company’s data protection and management solution for physical and virtual infrastructure.
Vicente Diaz and Costin Raiu, security researchers in Kaspersky Lab’s Global Research and Analysis TeamRecorded: Dec 5 201854 mins
Kaspersky Lab experts will present their annual, exclusive review of advanced persistent threat activity across the world in 2018, based on the company’s threat intelligence research throughout the year. These findings provide the foundations for the threat actor predictions published on November 20 and provide an invaluable insight into how APTs are evolving over time.
Seyi Verma, Director of Product Marketing, DruvaRecorded: Dec 5 201863 mins
With data growing faster than ever before, managing data center infrastructure can be costly and complex. In addition to adding resources, hardware and tapes, you need to ensure visibility and control over remote and global sites to avoid data silos, and risks and compliance issues. That’s why the cloud became such a game changer for modern IT environments.
Join us for this upcoming webinar, discussing the five questions to ask about cloud data protection for enterprise workloads, and find out how to:
- Centralise and simplify management of corporate data environments
- Reduce costs and demands on local resources, and achieve 60% lower TCO
- Modernise data protection for virtual workloads
- Meet critical application data recovery speeds, and business continuity SLAs
- Harnesses the efficiencies and global reach of the public cloud, while delivering unmatched storage flexibility, data durability, and security
We will conclude with a product Demo, when you can get an in-depth look at product admin consoles and client UIs.
Israel Barak, Cybereason | Dario Forte, DFLabsRecorded: Dec 5 201849 mins
Cyber attacks on businesses, organizations and critical infrastructure becoming the norm in 2018. Massive breaches are constantly in the news and consumers are demanding stricter data and privacy protections. Cybersecurity has never been more important to organizations, and the investment in security technology has never been greater.
CISOs are in the spotlight, and are looking to build the best strategy to secure their organizations, customers and users.
Join top security experts for an interactive Q&A panel discussion on:
- The key factors CISOs should consider for their cybersecurity strategy
- The current and future threatscape
- Platform Security for 2019
- Technological solutions that make CISOs' lives easier
- How organizations are coping with the shortage of qualified security workforce
- How CISOs can better communicate their strategy to the board
Israel Barak,CSO, Cybereason
Dario Forte, CEO, DFLabs
Brian Duckering, Mobile Security Specialist, Symantec and Brian Jacome, Director of Applications and Controls, RBCRecorded: Dec 5 201861 mins
Businesses of all sizes are wary of the added risk that comes from the use of mobile devices and are struggling to figure out the best strategies to protect their sensitive information.
Attend this webinar to hear the advice from experienced security professionals who have successfully navigated the path to protect their businesses from mobile threats.
Hear from Brian Jacome, Director of Applications and Controls from Royal Bank of Canada and learn about his journey and get answers to the following questions and more:
- Why is it important to secure mobile devices?
- What is your advice to your peers who are starting their mobile security journey?
- What are the most important requirements of a mobile security solution?
By the end of this webinar, you will have gained important advice and perspective from those who have gone before you and are able to sleep better at night.
Jacqueline Touma, Sandy Mathis, Amy Protexter, Razia RichterRecorded: Dec 4 201860 mins
The customer expects fast, personal and engaging experiences, integrated and aligned across touch points in real time.
The Cloud brings along a paradigm shift in the way customers interact with the businesses and what businesses must be prepared for. Understand what the Modern Customer Experience is and how content and customer analytics are keys to success.
Organizations need to have the right tools to capture feedback and provide needed content at each point in the life cycle.
Learn more from our Panel of experts as they share their experiences, best practices, and lessons from leading Companies.
James Nelson, President, Business Continuity Services, Inc.Recorded: Dec 4 201855 mins
Data protection and disaster recovery are changing constantly. Risks and exposures are expanding. Are you keeping up? Are you prepared for the worst-case scenario? Can your data handle the disruptions?
“Data Protection in 2019 and Beyond,” provides thought, leadership, and guidance for the coming year and beyond. Addressing potential challenges, concerns, and focusing on areas to consider while protecting your organization, topics include:
-The growing complexity of end-point protection and management
-How virtualization continues to provide solutions and challenges
-Changing regulatory and compliance challenges
No business is immune from disaster. Businesses should assume the worst will happen. That’s why everyone should prepare to reduce the impact that these disasters will have on their technology. Planning ahead may be the difference in your business surviving technology interruptions and data loss.
Damon Covey, Sr. Director, Product Management, SymantecRecorded: Dec 4 201845 mins
The releases of Symantec IT Management Suite 8.5 and Ghost Solution Suite 3.3 are here! Please join us for a special webinar on Tuesday, December 4 to learn all about these exciting new solutions.
We will discuss and demo some of the cool new features in IT Management Suite 8.5 such as time-critical management, endpoint quarantine, and automated vulnerability remediation and in Ghost Solution Suite 3.3, the new web console, smart wizards, and much more!
Don't miss this great opportunity to get the latest information on IT Management Suite 8.5 and Ghost Solution Suite 3.3!
Ron Bushar, VP & Gov. CTO, FireEye, Michael Trevett, Director, FireEye & Heather Sussman, Partner, Ropes & GrayRecorded: Dec 3 201859 mins
As the cyber threat landscape evolves, lawmakers are prompting organizations to protect their networks and handle sensitive information more mindfully with cyber security and breach notification laws that are stricter, carry higher penalties and result in further enforcement.
Companies are spending more time and resources managing cyber security risks—but where should organizations focus their time, talent and spend? And how does a multinational organization navigate these complex regulatory requirements?
Join Ron Bushar, VP and CTO of Government Solutions at FireEye, Michael Trevett, Director of Professional Services at FireEye Mandiant, and Heather Sussman, Partner at Ropes & Gray, as they share their security and legal expertise:
• Executive perspectives on the impact changing security regulations has on how organizations are thinking about cyber security
• Regional overviews of existing and upcoming regulations in North America, EMEA, and APAC
• Impact of GDPR on regional business landscapes since its formal release in May
• Influence of the SEC’s recent interpretive guidance on security risks and incident disclosures
• Best practices for making cyber security a strategic priority and a competitive advantage
Also don't miss "Leading with Threat Intelligence – How to Select the Right Security Provider," the first webinar in this two-part series aimed to help you be better prepared for what's to come in 2019. Register Now - https://www.brighttalk.com/webcast/7451/342393
Holger Schulze, Founder and CEO of Cybersecurity Insiders and Rene Kolga, Sr. Director of Product at NyotronRecorded: Nov 29 201842 mins
As the security perimeter has moved to the endpoint, protecting these devices has become a real challenge. A recent study conducted by Cybersecurity Insiders and Nyotron finds only 50% of organizations are confident they can stop over 75% of attacks, and 21% estimate they can thwart less than half. Over three quarters of the cybersecurity professionals we polled believe the importance of endpoint security is increasing, so how can they convince their stakeholders to budget for appropriate endpoint defenses in 2019? This live webinar will answer that question.
In this live data-driven webinar, cybersecurity experts Rene Kolga from Nyotron and Holger Schulze from Cybersecurity Insiders will explore:
-Why only half of organizations have confidence in their current endpoint security posture
-What organizations are doing to boost endpoint security
-What you can do in 2019 to better mitigating the risks
Mark Diamond, Founder, President & CEO of Contoural, Garth Landers, Director of Product Marketing – Cloud Archive, MimecastRecorded: Nov 29 201856 mins
Compliance regulations are evolving. E-Discovery is getting harder. Your old-fashioned, legacy archive strategy is not enough. Join Mark Diamond from Contoural and Garth Landers from Mimecast as they discuss the changing enterprise archiving landscape and how to rethink information management for a more modern and effective approach.
Mark Diamond, Founder, President & CEO of Contoural
Mark Diamond is recognized as an industry thought leader in proactive records and information management, litigation readiness and risk & compliance strategies. Under his leadership, Contoural has grown to be the largest independent provider of legal and regulatory, litigation readiness, and risk & compliance consulting services. As trusted advisors, he and his company help bridge legal, compliance, security and business needs and policies with effective processes, technology and change management.
Previously, he was co-founder of Symantec's (Open Vision) Professional Services group; founder and General Manager, Worldwide Professional Services for Legato Systems and Vice President of Worldwide Professional Services at Right Works, a provider of business application software to the B2B marketplace.
Garth Landers, Director of Product Marketing – Cloud Archive, Mimecast
Garth Landers is the Director of Product Marketing for the Mimecast Cloud Archive. Prior to joining Mimecast, he was a Research Director/Analyst at Gartner with primary coverage responsibilities for advising clients on archiving management software and related topics such as e-discovery and information governance policies and procedures. In addition, he provided research and advisory services in other areas related to storage, software and services associated with archive and backup/recovery.
Previously, Garth held positions at EMC and Mobius Management Systems in product marketing and management in addition to an earlier stint at Gartner as a Research Analyst covering enterprise content management.
Steve Hunt, Dir. Product Management - DataCoreRecorded: Nov 29 201846 mins
IT organizations require a data protection solution that can combat against the ever looming threat of malware or ransomware, and data corruption, which can have a significant effect on day to day operations. When that data protection capability is included in their storage solution, it allows IT organizations to reduce their overall costs, while maximizing their ability to protect all data they are responsible for.
This is why DataCore Software created Continuous Data Protection (CDP), or the “undo button” for your data. In this webinar we explain and show how DataCore Software’s CDP feature can deliver one-second restore granularity and provides the best Recovery Point Objective (RPO) of any data protection solution.
Rob Arnold, Industry Principal, Connected Work, Frost & SullivanRecorded: Nov 29 201843 mins
Is your workforce built for disruption and a rapidly ever-changing future of work?
Policies, demographics, technologies, economics, environmental sustainability, and social movements are shifting how people work and how employers are managing their workers. As many jobs face the prospect of automation, workers and employers need to collaborate to create a modern workplace that supports the growing knowledge economy.
• Learn which office technologies are supplanting the massive installed base of legacy equipment in the workplace.
• Discover the devices and applications that will support the workplace of the future.
• Understand the role that collaboration and wearable technologies play in making workers happier and more satisfied.
Coan Dillahunty, Nasuni Senior Product Manager and former Data Center Manager for TBWARecorded: Nov 29 201838 mins
Shifting file services to the cloud as part of a data center consolidation can reduce cost, footprint, and increase your future flexibility. But getting it right so that you don’t compromise end user satisfaction or application performance is a real challenge, especially across multiple data centers and apps.
Join this live webinar to learn how to approach multi data center consolidation with the least amount of pain and without sacrificing application performance and end-user satisfaction.
Christopher Porter, Chief Intelligence Strategist, FireEyeDec 11 20189:00 pmUTC60 mins
As the door closes on 2018, we walk away armed with knowledge about what’s to come in 2019 and beyond. We know attackers will attack and defenders will be tasked with stopping them, but there is a lot more we can do to be prepared for upcoming threats and ensure we’re innovating faster than bad actors.
Join Christopher Porter, Chief Intelligence Strategist at FireEye, as he shares his thoughts about cyber security in 2019. During the webinar, Christopher will touch on various topics discussed in our Facing Forward: Cyber Security in 2019 and Beyond report, which was developed based on insights from our senior leaders, FireEye iSIGHT Intelligence, Mandiant incident responders, and FireEye Labs. Tune in to learn about:
•Threats to the aviation industry, including cyber espionage and cybercrime
•What to expect from established and emerging nation states
•How threat actors are changing their tactics to stay ahead of defenders
Register today to learn what lies ahead and stay one step ahead of cyber security threats.
Axel Wirth, Distinguished Healthcare ArchitectDec 12 20183:00 amUTC67 mins
In the eyes of cyber criminals, there are few targets more lucrative than healthcare organisations due to the comprehensive nature of the information held by them, and the high value of health data on the black market. And, it is not just about protecting information – cybersecurity incidents in healthcare can also impact hospitals' ability to deliver care, or could result in harm to patients should critical systems get taken down by a malicious actor.
Join us in our upcoming 'Defending Against Today's Sophisticated Attacks on Healthcare Organisations' webinar as we discuss the specific cybersecurity challenges pertaining to the healthcare industry, including:
• The latest threat trends and incidents
• The challenges of securing healthcare ecosystems
• Effective cybersecurity strategies
A unified security solution for a new era of digital transformation.
Join our technical team as they provide a deeper dive into the Kaspersky Anti-Targeted Attack (KATA) and Kaspersky Endpoint Detection and Response (EDR) platforms.
- it delivers complete visibility across the distributed enterprise environment, together with global threat statistics and reputations, providing contextualised, actionable Intelligence.
- multi-dimensional advanced detection combines machine learning with advanced detection capabilities using static, behavioural, cloud reputation, sandboxing and pattern based detection engines, together with a Targeted Attack Analyser.
- automated prevention of and response to advanced threats
Verdicts are automatically shared via the platform with a whole spectrum of products, including email, web, endpoint and storage protection. As a result, instant action can be taken when an incident emerges.
This session is highly recommended for technical roles and continues our series of technical talks. If you missed a previous one please check it out on our On-Demand Service.
Anthony St Clair and Farzad SeihounDec 12 20182:00 pmUTC45 mins
This webinar will provide insight into what Verizon anticipates will be the most prolific cyber threats for 2019. Members of the Verizon Threat Research Advisory Team offer their outlook on social engineering trends for the next twelve months, summarizing thousands of man-hours spent in customer investigations, along with our dark web research, threat libraries, and identified cyber anomalies drawn from our vast IP network. We will explain how Verizon addresses these types of threats on behalf of our customers, and our top recommendations for ways that organizations can take proactive steps on their own to secure their network.
Paul Mazzucco, Chief Security Officer | TierPointDec 12 20185:00 pmUTC60 mins
TierPoint's Paul Mazzucco will discuss the double-edged sword of artificial intelligence, which is aiding the efforts of hackers and protectors alike. Join us as we explore the world of the Darknet, how bad actors are using machine learning and AI to create better attack vectors, and how IT professionals are also using these tools to defend their vital infrastructure. Powered by behavioral modeling, these technologies are the next frontiers in attack mitigation.
Alfons Michels, Sr. Product Marketing Manager & Alex Best, Dir. Technical Business Development - DataCore SoftwareDec 12 20186:00 pmUTC60 mins
Are you forced to replace your hardware? Are you thinking about different deployment models for your IT infrastructure, e.g. hyperconvergence?
Well, any change to your IT infrastructure is a major challenge, and typically requires complex data migrations, resulting in service downtime, overtime and more money to spend - but are the results worth it?
Before you start your next project, think about an alternative approach to rip-and replace, like software-defined storage. You may ask yourself, why should that help me? And there are many good reasons, but an essential one are the unrivaled chained migration options.
If you're wondering what these benefits can mean to you, just join our brief webinar, which also includes a live demo and audience Q&A so you can see how simple it is to bring software-defined storage into your IT environment and leverage chained migration. Among others, you'll be able to discover:
• How to integrate software-defined storage into your environment
• How to migrate data between totally different types of storage
• How to change towards hyperconverged during regular business operations
David Beeler, Senior Product Manager @ Carbonite & Megha Chopra, Product Marketing Manager for Modern Data @ MicrosoftDec 12 20187:00 pmUTC30 mins
When you hear “end of support” on one of your core products, that often is met with fear for IT professionals. With Azure & Carbonite transforming your on-premise SQL 2008 server to the cloud, it can provide security, flexibility, and saving for your company.
Join our exclusive webcast for an overview on what this end of life means for your data, how Microsoft Azure could put your business on the fast track for success and how Carbonite’s solutions can simply migrate your data into your new environment.
Here are some great benefits on taking your business into Azure:
•Immediately rehost workloads in the cloud
•Rehost in Azure SQL Database Managed Instance for a “version-free” platform
•Three years of FREE extended security updates at no additional charge over standard VM pricing
•Existing licenses can use Azure Hybrid benefit for big savings
Sign up today for this 30-minute webcast by Microsoft and Carbonite and learn why an end of life doesn’t mean the end of your business. Start your planning now because July 9, 2019 will be here before you know it.
Jonathan Cran, Head of Research and Jeff Aboud, Director of Product Marketing, Kenna SecurityDec 12 20189:00 pmUTC60 mins
Every year the cyber threat landscape is different than the year before as new technologies replace the old and new means of digital disruption replace those that came before.
2018 was anything but quiet with an uptick in cyber activity from major geopolitical actors, and vulnerabilities and techniques weaponized faster than ever. Despite fewer reported breaches in 2018, the cyber landscape continued to evolve rapidly.
Join us for our next webinar: A Retrospective on Cybersecurity in 2018 and Trends to Watch in 2019; Kenna Security’s Jonathan Cran, Head of Research, and Jeff Aboud, Director of Product Marketing will dissect key data points to chart a path for how we must approach security challenges in 2019, as well as:
- Major threat trends in 2018
- Cybersecurity hype and lessons learned
- Predictions for the next wave of cybersecurity challenges in 2019
Take control of cyberthreats in 2019. Register now.
Dr. Hugh Thompson, Chief Technology Officer, Symantec | Nick Savvides, CTO APAC, SymantecDec 13 20183:00 amUTC45 mins
The threat landscape is ever changing. New threats are rapidly evolving with increasing sophistication, leveraging new and advanced technology. With the new year being just around the corner, how can we be prepared for the shifting threat landscape?
Join Dr. Hugh Thompson, Symantec Chief Technology Officer in our webinar, as he shares his thoughts on Security Predictions in 2019 and beyond. Based on insights gathered from our intelligence, he will touch on new trends that will likely take the limelight in the coming year.
Learn more about:
- How Artificial Intelligence (AI) will be leveraged in cyber security
- How growing 5G deployment and adoption will catalyze new attacks
- Where attacks will be targeted at
Attend our webinar. Learn what to expect and be prepared in your security posture for 2019.
Janet O’Sullivan and Florian MaleckiDec 13 201810:00 amUTC60 mins
Over 60% of businesses have moved their email to Office 365. Whilst this makes great business sense, security and data integrity have to be key priorities. So how secure is office 365 and do the native security solutions offered by Microsoft go far enough to protect your emails and data?
Attend live webcast with our experts from The Email Laundry and StorageCraft and learn about:
- The threats being posed to your emails in particular from Malware-less attacks such as CEO fraud and Impersonation attacks.
- Why (and how) The Email Laundry is more successful at stopping these attacks than Microsoft ATP
- The risks to losing data from either accidental or malicious deletions
- How StorageCraft can ensure your peace of mind by always giving you immediate access to your data
Oleg Gorobets, senior global product marketing manager at Kaspersky LabDec 13 20182:00 pmUTC60 mins
The cloud offers significant benefits for business, including flexibility and efficiency, but cloud migration has its challenges when it comes to security. Juggling multiple virtualized environments, keeping track of disparate security policies and dealing with containerization issues can turn your cloud journey into a nightmare. Join us to find out more about these potential complications – and how you can avoid them.
Andrew Marshall, PagerDuty; Sean Higgins, PagerDuty; Monte Montoya, CprimeDec 13 20185:00 pmUTC25 mins
Over 3,000 Atlassian users count on PagerDuty’s 300+ integrations to power their end-to-end real-time digital operations—and we’re excited to launch a comprehensive set of integrations for the Atlassian suite, which allows Atlassian users to add PagerDuty’s real-time digital operations capabilities to their everyday work.
In this webinar, PagerDuty product manager Sean Higgins And CPrime’s Monte Montoya will show you how PagerDuty’s new Atlassian integrations help teams automate processes throughout the DevOps lifecycle, save time, and take full advantage of Jira Software, Jira Service Desk, Bitbucket, Statuspage, and other Atlassian tools.
Jake Olcott, BitSight; Michael Marriot, Digital Shadows; Jannie Wentzel, Focal Point Data Risk; Sam Abadir, LockpathDec 13 20185:00 pmUTC60 mins
What a year 2018 has been, from indictments and data breaches to an increasing regulatory landscape and a greater focus on integrated risk management. What were the major risk trends in 2018 and what predictions can we make for 2019? In this can’t miss webinar, our panel of industry experts will recap 2018 and offer their views on what to expect in 2019 and beyond.
As an attendee, you’ll learn:
• The shift to a more integrated risk management
• The growing emphasis on supply chain cybersecurity
• The rise in data privacy and its impact on information security
Plan now to attend this special webinar on 2018 highlights and trends and predictions for 2019.
Old school backup is out! Today’s digital consumers demand an always-on level of service that backups simply cannot provide. Learn how continuous data protection is changing the way companies think about backup.
Listen in as Steve Blow, Technology Evangelist, explains Zerto’s vision for the future of backup and learn how continuous journal-based protection is disrupting legacy backup. The recently announced Zerto IT Resilience Platform™ converges backup, disaster recovery, and cloud mobility solutions into a single, simple, scalable platform.
Sai Gopalan, VMware with Wen Yu, AWS and Zach Wunderle, Dell EMCDec 13 20186:00 pmUTC60 mins
Dell EMC, VMware and Amazon Web Services (AWS) make it easier to protect virtualized workloads in the cloud. This webinar will discuss the latest challenges in protecting and managing VMware workloads, how to easily expand VMware environments to the cloud, what to do when a disaster event occurs, and show a demo of the latest features of data protection for VMware Cloud on AWS.
George Johnson, Vice President of Cyber Solutions, NC4 and Sean Franklin, Strategic Advisor, NC4Dec 13 20187:00 pmUTC45 mins
We get it: sharing information about cyber threats is cumbersome, and all the barriers to sharing just make it sound exhausting. Your first responsibility is to protect your organization, but what if you could do that and share intelligence at the same time without additional work?
NC4® is a leader in providing sharing communities the tools they need to be successful, and we’ve learned a thing or two over the years. In this presentation, we’ll talk about the barriers to information sharing and the lessons we’ve learned in overcoming them. When it comes to information sharing, see how you can be selfish and altruistic at the same time without breaking a sweat.
Presentátor: Miroslav Dvořák, Commvault system engineerDec 14 20189:00 amUTC30 mins
Vážení zákazníci a obchodní partneři,
prosím přijměte pozvání na další ze série bezplatných webinářů společnosti Commvault, tentokrát na téma: “5 DŮVODŮ PROČ Commvault appliance znamená snadné a jednoduché nasazení”.
V dnešním dynamicky se měnícím byznys prostředím společností stále více a více volají po komplexním, spolehlivém a rychle implementovatelném řešení pro ochranu dat svých lokalit. Tato prezentace se zaměřuje na 5 důvodů proč Commvault appliance je nejlepší a nejrychlejší cesta k zajištění lepší připravenosti obnovy dat a to od datových center až k regionálním pobočkám.
Storage Switzerland, Veeam, HPEDec 17 20186:00 pmUTC60 mins
Consumption based IT is a curated set of IT solutions that focus on business outcomes. As the name implies it is purchased on a pay-as-you-go model. The goal of consumption based IT is to simplify establishing IT infrastructure that incorporates both the on-premises data center and the cloud to support a wide variety of workloads including traditional transactional databases, big data analytics, containers and many others.
A key aspect of consumption based IT is how the data created by these workloads will be protected. In fact, the right consumption based IT solution should curate end-to-end backup directly into the solution.
In our live webinar join Storage Switzerland, Veeam, and HPE to learn about consumption based IT, what to look for in a consumption based solution, how data protection can protect the solution and how data protection can be offered as a consumption based solution protecting both legacy and new architectures.
David Emm, Principle Security Researcher and Prof. Steven Furnell, Professor of Information Security, University of PlymouthDec 18 201811:00 amUTC75 mins
24/7 connectivity is fast becoming an integral part of everyday life. Most of us now routinely bank, shop and socialise online, and the Internet is the life-blood of business.
Yet too many of us fail to secure our online identities adequately. This presentation will examine why this is important, what we should do to secure our online accounts and how criminals exploit our lack of security.
Steven Furnell is a the Associate Dean and IT Security Professor at the University of Plymouth. His research interests spans multiple areas including: Cyber Security / IT Security, including user authentication, biometrics, cyber crime, intrusion detection and response, security management and culture, usable security; Internet Technologies and Applications; Mobility.
A published author, Steven will share his insights we can all individually make it harder for Cyber Criminals to access your passwords.
David Emm is a Principle Research Analyst at Kaspersky Lab and regularly delivers presentations on malware and other IT security threats at industry events, highlighting what organisations and consumers can do to stay safe online. He also provides comment to broadcast and print media on the ever-changing cyber-security and threat landscape. David has a strong interest in malware, ID theft and the human aspects of security, and is a knowledgeable adviser on all aspects of online security.
John Moran, Senior Product Manager, DFLabs and Heather Hixon, Senior Solutions Architect, DFLabsDec 18 20183:00 pmUTC41 mins
DFLabs’ innovative Open Integration Framework is designed to enable security teams to customize and easily add new automated integrations between their existing security tools and our IncMan SOAR platform, enabling SOCs and MSSPs to add unique incident response actions without the need for complex coding. The new framework is part of DFLabs’ commitment to delivering a more open, community-oriented solution to automation and orchestration, which also includes a new Community Portal.
The Community Portal serves as a hub for customers, where they can get the latest information and support from DFLabs and interact with other like-minded customers. Moreover, this Community Portal aims to provide a cooperation ecosystem for companies and organizations, where they can share integrations of security tools and IncMan SOAR. This approach will enable our customers to tackle specific use cases by uploading or downloading integration files from the Portal to IncMan SOAR.
Join this webinar to learn more about these two new exciting features, as well as DFLabs’ other latest developments and enhancements to IncMan SOAR v4.5 including:
- Open Integration Framework
- Community Portal
- Enhanced REST API
- Automated event triage (START Triage)
- New bidirectional integrations
- Improvements to existing integrations
- And more...
Joe Schreiber, Technical Director, Business Development, TufinDec 18 20184:00 pmUTC60 mins
Breached. Hacked. Cyberattack. These are all words that dominated headlines in 2018.
While we all know that the attacks that prompted these headlines were largely avoidable in hindsight, we also know that enforcing security policy across the legacy physical network is challenging. Furthermore, the Cloud First Policy and the adoption of containers introduce new risks to organizations and raise new security concerns that need to be anticipated.
Join us on December 18 for a webinar with Joe Schreiber, Technical Director of Business Development, to learn from the mistakes of others in 2018 and how to avoid making them – and the headlines – in 2019. We’ll draw from his 20+ years of experience including security operations and incident response.
Key topics include how to:
•Develop and deploy an enforceable security policy
•Clear time for proactive security initiatives
•Mitigate the inherent risk of DevOps’ CI/CD agility
•Contain malware outbreaks
•Anticipate security risks of containers
Tom Rose, Vice President of Technical Solutions at NasuniDec 18 20186:00 pmUTC60 mins
Two competing trends are helping Hybrid Cloud file storage emerge as a dominant architecture for IT: Globalization and Data Center Consolidation. How does IT manage to power users and applications at the edge in a competitive global environment while consolidating expensive data center resources? Tune in to learn:
- Why hybrid cloud solutions for applications and users are leading the way in file storage
- How to leverage hybrid cloud storage to reduce data center footprint
- How IT leaders are incorporating a cloud first strategy for file storage in 2019
It’s increasingly difficult to make apples-to-apples comparisons among VM backup products, because functionality, deployment options, and pricing models vary widely. So, SMBs must look beyond list price and understand the total cost of ownership when making a purchase.
In this webinar, attendees will learn about:
• Common VM backup pricing models
• Hidden licensing, hardware, and cloud costs
• How our per-protected pricing models benefit SMBs
• Carbonite’s VM Edition and hardware as a service deployment option
Terry Ray, CTO, Imperva and Kim Lambert, Sr. Product Marketing Manager, ImpervaDec 19 20186:00 pmUTC60 mins
Equipped with Imperva’s own research, interactions with our customers, and a wealth of crowdsourced data analyzed from installations around the world, we’ve looked ahead to the future of Internet security and have come up with three key overriding trends that we see taking center stage in 2019. Join Terry Ray, CTO of Imperva, as he provides insight into cybersecurity trends for 2019, including:
-Increasing focus on compliance due to expanding data breaches
-The business benefits of moving to the cloud
-Using AI and machine learning to bridge staffing and skills gaps
About the presenter:
Terry Ray has global responsibility for Imperva’s technology strategy. He was the first U.S.-based Imperva employee and has been with the company for 14 years. He works with organizations around the world to help them discover and protect sensitive data, minimize risk for regulatory governance, set data security strategy and implement best practices.