Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • 2018 Forecast: Clouds Keep Rolling In
    2018 Forecast: Clouds Keep Rolling In Howard Marks, Deep Storage & Bernie Behn, Avere Systems Recorded: Oct 17 2017 57 mins
    Howard Marks looks ahead at the storage trends rolling into IT Operations in the new year.

    Today’s data center is a much more dynamic environment than ever before leaving IT organizations struggling to compete, and or integrate, with public cloud services with tools and hardware designed for the much more static datacenter of yesteryear. In this webinar long time industry observer Howard Marks will examine five of the trends that IT operators should pay attention to in the coming year.

    Our discussion will focus on the promise, tools and challenges involved in moving to hybrid architectures that bridge private data centers and cloud resources to shift workloads, support data-intensive compute operations, manage unstructured data growth, build affordable archives, and prepare for disaster recovery. These technologies will consider macro-level trends as well as solving operational challenges that come with the growth of cloud.

    Infrastructure architects, systems engineers, storage engineers, data strategists, HPC specialists and other enterprise IT professionals will learn:
    - Current environment and challenges in building hybrid infrastructures that support traditional and object storage
    - Five not-to-be-ignored trends ripe for adoption in 2018
    - How compute and storage can mix in the new cloud-enabled world
  • Cloud Storage 2.0 - Storage for the Big Data and Digital Transformation Era
    Cloud Storage 2.0 - Storage for the Big Data and Digital Transformation Era Jim Donovan, VP Product Management & Customer Operations Recorded: Oct 17 2017 41 mins
    As digitalization and the Internet of Things (IoT) become commonplace, big data has the potential to transform business processes and reshape entire industries. But antiquated and expensive data storage solutions stand in the way.

    A new generation of cloud storage has arrived, bringing breakthrough pricing, performance and simplicity. Cloud Storage 2.0 delivers storage as an inexpensive and plentiful utility, so you no longer have to make difficult decisions about which data to collect, where to store it and how long to retain it. This talk takes a look into how you can cost-effectively store any type of data, for any purpose, for any length of time. Join us to learn about the next great global utility, Cloud Storage 2.0.

    Key takeaways:
    -The next biggest cloud storage trends and technologies that are shaping the industry
    -How to embrace the era of digital transformation and IoT without breaking the bank
    -Best practices for storing, analyzing and utilizing big data
  • Straight Talk on Business Critical Applications in the Cloud
    Straight Talk on Business Critical Applications in the Cloud Jim Hannan, Principal Architect; House of Brick Technologies Recorded: Oct 17 2017 33 mins
    As much as the term Cloud Computing gets tossed around these days you would think everyone’s using it. But do cloud predictions really match real world use? If you aren’t “in the cloud” are you already behind the competition?

    During this presentation, we will discuss the pros and cons of moving applications to the cloud, with a particular focus on business critical applications. We will share our experiences working with clients to determine if their applications are “cloud ready” through a review of availability, costs, and operational impacts. Examples of successful use cases in the public cloud will be explored including emerging technologies, DRaaS, new applications, older applications running on older hardware, and startups.

    You’ll leave with a better understanding of the types of applications that are best suited for the cloud, a list of questions you should be asking when considering moving to the cloud, and a checklist you can use to evaluate your application’s cloud readiness.
  • Deliver agile data management with Commvault HyperScale™ Software
    Deliver agile data management with Commvault HyperScale™ Software Marc Lucas & Roger Lane, Commvault & Bob Pearson, HPE Pointnext Recorded: Oct 17 2017 53 mins
    The EU General Data Protection Regulation (GDPR) is the most important new regulation involving individuals’ information to emerge over the last few decades: it provides the foundation for how multi-national organisations and government agencies must protect sensitive customer information, and also how they can derive value from enterprise data.


    In order to prepare for the May 2018 deadline, organisations must interpret the GDPR requirements, map processes and technology to them to ensure compliance, and quickly identify the correct information to be tightly managed and protected. Information insight is the key to solving these challenges of large volumes of data and high levels of complexity. The risks are high - lost customer confidence, security breaches, fines, sanctions, and potential lawsuits.


    Enterprise IT is being transformed with the maturing of public cloud providers that offer compute, storage and application services with unprecedented elasticity, scale, resiliency and availability, on a consumption based economic model. However, the choice between public cloud and on-premises infrastructure is not a binary one.

    Register to attend our webinar on Tuesday 17th October at 11:00 GMT to discover how HPE Pointnext GDPR Consulting services can provide the expertise and support to de-risk your journey to compliance. Plus learn how Commvault Hyperconverged Architecture can help you to overcome the complexities of GDPR through the consolidation of all roles performed by discrete servers in the traditional data protection architecture into a single software defined stack.
  • 5 Benefits of Scale-out Data Protection
    5 Benefits of Scale-out Data Protection Bob Carapezzi and Phil Wandrei from Commvault Recorded: Oct 16 2017 30 mins
    Are you tired of fork-lift upgrades every time you need to add more capacity or performance to your deduplication appliance? Caught in the expensive cycle of repurchasing software and hardware every time you upgrade your backup and recovery system? If this sounds like your environment, you may be running your backup and recovery on a legacy, scale-up infrastructure.
    Your infrastructure is holding you and your organization back. What you need is a new solution that meets your business challenges today, and creates the foundation for future growth and greater services.
    Learn how applying a scale-out infrastructure can deliver modern data protection and management;
    •Eliminate complexity with simplicity and ease of use
    •Deliver greater flexibility with cloud-like services
    •Increase availability and resiliency
    •Minimize operating expenditures with automation and self-service
    •Optimize capital expenditures by utilizing x86 technology
    Join us as we examine the 5 benefits of scale-out infrastructure for data protection and how it positions your organization for future success.
  • Governance, Risk, and Automation: Part 1
    Governance, Risk, and Automation: Part 1 Peter Tessin, Sr. Manager, Discover Financial Services; Jimmy Heschl, Head of Digital Security, Redbull Recorded: Oct 13 2017 61 mins
    This is the first in a two-part series on governance, risk and automation.

    In Part I, we will explore concepts central to IT governance and risk. The presenters will use a conversational style to describe IT governance, how it works, and then go deeper into one central aspect, risk.

    Part II will build on the foundation presented in part one and describe how these issues are managed in an automated solution.
  • TechDemo – Breach Detection and Notification for the GDPR
    TechDemo – Breach Detection and Notification for the GDPR Cheryl Tang, Director Data Security Products, Imperva and Brian McAuliffe, Sales Engineer, Imperva Recorded: Oct 12 2017 39 mins
    This is part 4 of our GDPR demo series. The GDPR, which comes into effect on May 25, 2018, requires organizations report a data breach within 72 hours. In this webinar, we’ll provide an overview of:

    •What the General Data Protection Regulation is
    •What the GDPR breach notification requirements are
    •How Imperva CounterBreach can help detect potential data breaches
  • NIST 800-171 Protect CUI or Risk Losing Federal Business
    NIST 800-171 Protect CUI or Risk Losing Federal Business Kelly Handerhan, CISSP, PMP, CASP, CEH, Cybrary.it SME Recorded: Oct 12 2017 63 mins
    Federal contractors that process, store or transmit what’s called Controlled Unclassified Information have until December to implement new, more stringent security guidelines to protect that information. Chances are your organization already meets some of the requirements, but it’s unlikely that you meet them all. Join us to identify what’s new, what’s not, what you have to do and how to assess the impact.
  • 5 Keys for Next Generation DRaaS
    5 Keys for Next Generation DRaaS Storage Switzerland, Quorum Recorded: Oct 12 2017 60 mins
    DRaaS is entering its second phase. No longer is it good enough to simply be able to recover applications in the cloud. Next generation DRaaS has to be able to backup faster, recover faster, include ransomware protection and be able to offer on-premises DRaaS, all while being very secure.

    In this live webinar we will introduce you to “DRaaS - The Next Generation,” and show you the key elements a DRaaS solution must deliver in order to meet this challenge.
  • Case Study: Transform Threat Investigation With a Stretched Security Team
    Case Study: Transform Threat Investigation With a Stretched Security Team Arabella Hallawell, Sr. Director Advanced Threat Product Marketing + Deb Briggs, CSO, NETSCOUT Recorded: Oct 12 2017 43 mins
    Chief Information Security Officer Reveals How With Arbor Spectrum.

    Attackers continuously have new tools, tactics and practices in their weapons arsenal. Human defenders must shift their strategies to more proactively uncover meaningful threats, and find ways that dramatically accelerate threat investigation.

    Join us to hear:
    - NETSCOUT’s Chief Security Officer discuss how the Arbor Spectrum threat analytics platform was used to help her team take detection and investigation to a new level.
    - In depth examples of how security teams can begin or enhance their detection and investigation of attack campaigns.
  • Understanding Fileless Attacks and How to Stop Them
    Understanding Fileless Attacks and How to Stop Them Zeki Turedi, Senior Systems Engineer, CrowdStrike Recorded: Oct 12 2017 34 mins
    Standard security solutions have continued to improve in their ability to detect and block malware and cyberattacks. This has forced cybercriminals to employ stealthier methods of evading legacy security to achieve success, including launching fileless attacks, where no executable file is written to disk.
    Join CrowdStrike security experts for a webcast, "Understanding Fileless Attacks and How to Stop Them," where you'll learn why so many of today's adversaries are abandoning yesterday's malware and relying on an evolving array of fileless exploits. You'll learn how fileless attacks are conceived and executed and why they are successfully evading the standard security measures employed by most organizations. You'll also receive guidance on the best practices for defending your organization against these stealthy, damaging attacks.

    Join this webcast to learn:
    -How a fileless attack is executed — see how an end-to-end attack unfolds -Why fileless attacks are having so much success evading legacy security solutions
    -How you can protect your organization from being victimized by a fileless attack, including the security technologies and policies that are most effective
  • Hybrid IT in Australia: How to Simplify & Manage Multiple Cloud Environments
    Hybrid IT in Australia: How to Simplify & Manage Multiple Cloud Environments Kelly Morgan, Research VP, Services at 451 Research; Nathan Vandenberg, GM, Data Centre at Dimension Data Recorded: Oct 12 2017 50 mins
    How can your enterprise better manage multiple cloud and non-cloud IT environments to accelerate your digital business? Are you among the 50% of enterprises challenged by the complexity of managing applications and data across hybrid environments?

    Find out what workloads are still on physical IT, where they’re moving to, and why enterprises use migration services to help.

    Join Kelly Morgan, Research Vice President, Services from 451 Research and Nathan Vandenberg, General Manager, Data Centre from Dimension Data on Thursday 12 October 2017, 11:00am – 11:45am, to understand the most common challenges faced when managing multiple IT environments in Australia and how to overcome them.

    We will guide you through the hybrid IT maze and provide you with actionable steps to simplify the complexity of managing multiple enterprise cloud and non-cloud IT environments.

    Join us as we explore the findings from the Hybrid IT report, a 451 Research report commissioned by Dimension Data.
  • Take Advantage of Cloud Backup to Kick-Start Your Disaster Recovery
    Take Advantage of Cloud Backup to Kick-Start Your Disaster Recovery Steven Hill, Senior Analyst - Storage Technologies, 451 Research | Seyi Verma, Sr. Product Marketing Manager, Druva Recorded: Oct 11 2017 60 mins
    As organization’s storage needs grow and expand geographies, they find that they do not have a comprehensive plan to rapidly recover from a natural disaster, cyberattack, or equipment failure. To make matters worse, companies that rely on traditional backup and recovery solutions are simply not able to keep up with the increasing data needs of today’s enterprise. These systems are overly complex, costly, and don’t scale well with the business.

    A comprehensive answer to these data growth challenges is merging cloud backup with disaster recovery (DR). A unified solution that is cloud-native provides unlimited scalability, instant availability, long-term retention, and minimizes the impact on the business in case of a disaster. This seamless manageability and visibility of data across a range of locations and applications is crucial for long-term success.

    Join Senior Analyst of Storage Technologies, Steven Hill of 451 Research and Druva’s Senior Product Marketing Manager, Seyi Verma, where they’ll highlight:

    - The growing need for updating and improving disaster recovery and data backup
    - What factors to consider when building a BCDR plan
    - What to beware of when evaluating legacy and hybrid models for backup and DR
    - How cloud‐native backup and DR provides immediate failover to minimize downtime and impact
    - And more!
  • Backup & Recovery: Your Get out of Ransomware Free Card
    Backup & Recovery: Your Get out of Ransomware Free Card Jim Reavis, CEO, CSA | Andrew Nielsen, Chief Trust Officer, Druva Recorded: Oct 11 2017 60 mins
    Ransomware has become a major concern for organizations around the globe. The U.S. Department of Justice reports that an average of 4,000 ransomware attacks occur daily. These ransomware attacks aren’t just targeting laptops and other end-user devices either. Servers are equally at risk of ransomware attacks as well. There’s good news though - your backup data can be the difference between being held hostage and easily recovering from an attack.

    Join security experts, Andrew Nielsen, Chief Trust Officer from Druva and Jim Reavis, CEO of Cloud Security Alliance to learn:

    - The top vulnerabilities exploited for endpoints and servers
    - Proactive strategies to protect data before a malicious attack occurs
    - How to avoid paying the ransom by leveraging your backup data
  • Caringo Swarm Hybrid Cloud for Microsoft Azure
    Caringo Swarm Hybrid Cloud for Microsoft Azure Eric Dey, Product Manager Recorded: Oct 11 2017 50 mins
    Does your storage disaster recovery plan or strategy need a tune-up? Would you like to leverage public cloud to augment your data protection strategy? Caringo Swarm Hybrid Cloud for Microsoft Azure makes it simple for organizations to move data to the Azure cloud securely and quickly. Caringo Product Manager Eric Dey will talk about Caringo's latest product feature and explain how organizations can get data protection and additional benefits by using a hybrid cloud strategy.
  • Cloud Archiving - Amazon Glacier, Microsoft Azure or Something Else?
    Cloud Archiving - Amazon Glacier, Microsoft Azure or Something Else? Storage Switzerland, HubStor Recorded: Oct 11 2017 61 mins
    Join Storage Switzerland and HubStor for our live webinar, “Cloud Archiving - Amazon Glacier, Microsoft Azure or Something Else?” In this webinar you will learn the requirements of archiving in the cloud, how Amazon and Microsoft meet those requirements and what software needs to be added to complete the picture.
  • Disruption of the file storage market:  Extending file storage to the cloud
    Disruption of the file storage market: Extending file storage to the cloud Taneja Group Senior Analysts Jeff Kato & Jeff Byrne with Qumulo Senior Product Manager Justin Mahood Recorded: Oct 11 2017 43 mins
    In over 400 interviews with IT decision makers, the Taneja Group learned that an increasing number of organizations want not just to store files in the cloud, but to easily move those files between the cloud and on-premise.

    In response, the Taneja Group has identified an emerging set of storage products they call “multi-cloud primary storage” that can span multiple environments. One of the vendors at the forefront of this trend is Qumulo, whose “universal-scale storage” product, Qumulo File Fabric (QF2), allows cloud instances and computing nodes on standard hardware to work together to form a single, unified file fabric.

    Join Taneja Group Senior Analysts Jeff Kato and Jeff Byrne as they discusses the research behind the Taneja Group’s Multi-Cloud Primary Storage report. They will be joined by Qumulo employee Justin Mahood, who will describe why the “universal-scale” of QF2 is the best way to store files in the cloud and on-premise.
  • ISM - We have changed
    ISM - We have changed ISM Recorded: Oct 11 2017 1 min
    A video representing the brand change at the ISM.
  • Be Prepared for GDPR! Overview & Best Practices for Compliance
    Be Prepared for GDPR! Overview & Best Practices for Compliance Stéphane Estevez Recorded: Oct 11 2017 37 mins
    General Data Protection Regulation (GDPR) is new legislation intended to strengthen and unify data protection for all individuals within the EU. The regulation affects companies worldwide as it impacts any companies who possess data from customers in the EU.
  • Bringing Order to the Chaos of Compliance Policy Management
    Bringing Order to the Chaos of Compliance Policy Management Sam Abadir, Director of Product Management, LockPath Recorded: Oct 11 2017 44 mins
    Managing policies, procedures and guidelines in a cost effective and compliant way is becoming more and more difficult using office tools like word processors, spreadsheets and email. The process of drafting, approving, updating and creating awareness around these compliance documents as well as the complexity of keeping up with regulatory and contractual compliance requirements using these tools quickly creates chaos. To compound the problem, these office tools make internal audits more time consuming and costly and make regulatory audits and legal challenges difficult to defend.

    This is why organizations large and small are turning to automated compliance and policy management to manage their compliance programs. In this webinar, LockPath’s Sam Abadir will discuss the latest trends and challenges in policy management and compliance, and how implementing GRC processes can bring order to all this chaos.
  • APT33: Panoramica FireEye sulle attività cyber iraniane
    APT33: Panoramica FireEye sulle attività cyber iraniane Gabriele Zanoni, Systems Engineer, FireEye Recorded: Oct 11 2017 49 mins
    Le recenti investigazioni condotte da Mandiant, la divisione di Incident Response di FireEye, combinate con le analisi del nostro servizio di Threat Intelligence iSIGHT, hanno fornito una panoramica completa sulle attività di un gruppo di Cyber attaccanti iraniani operante dal 2013.
    Durante il webinar, spiegheremo come questo gruppo di attaccanti sia stato coinvolto in attività di cyber spionaggio al fine di raccogliere informazioni strategiche di intelligence da aziende nel settore dell’aviazione e dell’energia, con il fine ultimo di mettere le informazioni trafugate a disposizione di uno sponsor statale o militare.
    Registrati al webinar per saperne di più!
  • Soyez prêts à vous conformer au RGPD!
    Soyez prêts à vous conformer au RGPD! Stéphane Estevez Recorded: Oct 10 2017 41 mins
    Le Règlement Général sur la Protection des Données (RGPD) est le changement le plus important jamais apporté à la loi sur la protection des données en trois décennies. Il entrera en vigueur le 25 mai 2018 et s’appliquera de la même manière dans les 28 États membres qui connaissent aujourd’hui une forte disparité des régimes de protection des données.
    Le RGPD va renforcer les exigences concernant la gestion des données personnelles : consentement à l’acquisition, rétention, sécurité, stockage et protection. Découvrez le RGPD dans les grandes lignes pour comprendre l’impact de ce nouveau règlement sur votre organisation. Quantum vous dévoilera également les bonnes pratiques à mettre en place en matière de stockage des données pour être conformes au RGPD qui entre en vigueur dès 2018 !
  • Incident Response Planning: 6 Steps to Prepare your Organization
    Incident Response Planning: 6 Steps to Prepare your Organization Jeff Wilder, Director of PCI Services, Kirkpatrick Price; Sam Abadir, Director of Product Management, LockPath Recorded: Oct 9 2017 49 mins
    Data breaches make the headlines daily, and as a result, cyberattacks concern all business owners. Could I be next? And how can I prepare? As technology continues to evolve, so do the ever-present threats associated with these types of risks. You’re likely already taking steps towards protecting your organization from the possibility of a breach or cyberattack, but have you planned what you will do to continue operations and minimize damages in the event that your environment is compromised?

    Join LockPath and KirkpatrickPrice as we discuss incident response best practices. In this 60-minute webinar, attendees will discover the six stages of a best-practice incident response program, lessons learned from high-profile breaches, and how the Keylight Platform can effectively implement this strategy.
  • Microsoft Ignite 2017 Review: Top Trends You Need to Know
    Microsoft Ignite 2017 Review: Top Trends You Need to Know Sushant Rao, Sr. Dir. Product & Solutions Marketing & Augie Gonzalez, Dir. Product Marketing - DataCore Software Recorded: Oct 5 2017 52 mins
    Interested in hearing the top trends we’ve observed at Microsoft’ Ignite 2017?

    We have you covered. Join us as we recap the top trends and highlights of the news and interesting tidbits from Microsoft Ignite. It’s the next best thing to being there! If you were able to attend the event, this is a good chance to compare notes with us.
  • Cultivating Your Strategic and Creative Thinking
    Cultivating Your Strategic and Creative Thinking Dr. Ted Marra Oct 18 2017 2:00 pm UTC 75 mins
    Join our guest, Dr. Ted Marra as he introduces his new strategic leadership course in Global Risk Academy.

    During the webinar we will cover:

    How does a truly strategic organization think? What is strategic thinking versus strategic planning? What are the vital few factors that will determine your organisation’s long-term success or failure and are they on your radar screen?

    Who should attend.

    People with 10 years management experience minimum up to and including C-Level in all disciplines responsible for strategic decisions or large scale operational issues - so they have large budget and many people reporting to them.

    Managers and senior management from all areas of the organisation having responsibility for planning and achievement of key business objectives.

    Why you should attend.

    - Reflect on how you got where you are as an organisation;

    - What factors were critical to your success? What factors were the basis for your success?

    - What held you back – prevented you from being even more successful?
    - What could you have done differently

    Understand what are the most critical factors that will better ensure your organisation is a “winner” in the future (e.g., next 3-5 years).

    Find out which ones you may be missing and what to do about it before it’s too late and you become just an “average or good” organisation when, with a little effort and the right strategic thinking and creativity, you could take the organisation to the next level of performance and move toward “greatness”.

    How to build exceptional stakeholder relationships and why doing this is critical in especially in turbulent times.
  • Parallel Networks Provide Stronger Security at the Elastic Edge
    Parallel Networks Provide Stronger Security at the Elastic Edge Ken Hosac, VP of Business Development, Cradlepoint Oct 18 2017 4:00 pm UTC 60 mins
    Enterprises are seeking ways to reduce the scope and complexity of securing their Network’s Edge. Data breaches can cost companies millions of dollars in reduced revenue, shareholder value, fines, and diminished brand loyalty.

    IT managers concerned about their connected-network systems have turned to Parallel Networking to create application-specific networks to protect cardholder data while enabling customer engagement and improving operations.

    Parallel Networking enables organizations with hundreds or thousands of distributed locations to enhance security and PCI Compliance at the Network’s Edge.

    Join Cradlepoint for a webinar to learn about the benefits of Parallel Networking, real customer success examples, and best practices for greater security at the Elastic EdgeSM. 
  • A Storage Strategy to Achieve Better Data Protection, Preservation & Visibility
    A Storage Strategy to Achieve Better Data Protection, Preservation & Visibility Kieran Maloney, Product Marketing Manager, Quantum Oct 18 2017 5:00 pm UTC 45 mins
    Cloud and flash storage are still leading significant changes in today's data storage industry. With the amount of data and number of devices that organizations are experiencing, implementing a strategy that employs “cheap and deep” storage behind high performance flash is a must for 2018.

    Join Kieran Maloney, Product Marketing Manager at Quantum as he discusses how today’s archive solutions complement flash storage by providing low cost, long-term data preservation and protection while maintaining data visibility and access.

    You will learn:

    - How companies deploy storage tiers to optimize performance, data preservation and cost
    - A partner use case with Pure Storage that delivers a comprehensive tiered storage solution for large unstructured data sets
    - Trends and predictions for the flash storage market in 2018
  • Span Private and Public Clouds: Developing a Multi-Cloud Strategy with SDS
    Span Private and Public Clouds: Developing a Multi-Cloud Strategy with SDS Eric Carter, Sr. Director Product Management at Hedvig Oct 18 2017 8:00 pm UTC 45 mins
    How can enterprise IT operate more like AWS? That is the defining technology question of the decade. Hyperscale computing models pioneered by AWS catapulted “cloud” to the top of the IT agenda. This model fuels digital business, creates tectonic shifts in IT spending, and upends legacy IT infrastructure vendors. But should today’s CIOs build or buy their own cloud? The simple answer: both. We live in a multi-cloud world. A hyperscale strategy balances digital services across private and public clouds.

    In this session we'll provide:
    -Lessons learned from building two of the world’s largest distributed systems: Amazon Dynamo and Facebook's Cassandra.
    -How to develop a multi-cloud strategy for modern data centers that accommodates both virtualized and containerized applications.
    -Where software-defined storage fits into this strategy to help data span cloud boundaries and avoid cloud lock-in.
  • Expanding on DataCore’s Vision - Learn What's New at DataCore
    Expanding on DataCore’s Vision - Learn What's New at DataCore Paul Nashawaty, Director of Technical Marketing, DataCore Software Oct 19 2017 6:00 pm UTC 60 mins
    George Teixeira, our CEO, President and Co-Founder once said:

    “DataCore is committed to creating an enduring and dynamic software-driven architecture liberating data and its productivity from static hardware based limitations.”

    We are expanding on our vision with the new capabilities in the next release of DataCore SANsymphony and Hyperconverged Virtual SAN.

    Join us for this webinar and learn about:

    •DataCore Cloud Replication
    •Container Management
    •Data Resiliency
    •Automation & Enhanced API Integration
  • DevOps at Scale: Using AWS & PagerDuty to Improve Growth & Incident Resolution
    DevOps at Scale: Using AWS & PagerDuty to Improve Growth & Incident Resolution Thomas Robinson, Solutions Architect, AWS & Eric Sigler, Head of DevOps, PagerDuty; Christopher Hoey, SRE, Datadog Oct 19 2017 7:00 pm UTC 60 mins
    Meeting the demands of everchanging IT management and security requirements means evolving both how you respond to and resolve incidents. It’s critical for organizations to adopt a scalable DevOps solution that integrates with their current monitoring systems to enable collaboration across development and operations teams, reducing the mean time to resolution.

    PagerDuty works with AWS services like Amazon CloudWatch, to provide rapid incident response with rich, contextual details that allow you to analyze trends and monitor the performance of your applications and AWS environment.
  • Security Operations Center (SOC): Aufbau eines SOC oder SOC als Service
    Security Operations Center (SOC): Aufbau eines SOC oder SOC als Service Patrick Kuttruff Oct 20 2017 8:00 am UTC 60 mins
    Wer sich mit der Frage beschäftigt, wie man ein effektives und effizientes Security Operations Center (SOC) aufbauen sollte, steht vor einer großen Herausforderung, denn neben den Investitionen der physischen Sicherheitsmaßnahmen, Hard- und Software ist besonderes Augenmerk auf die Analysten zu setzen, die hochkonzentriert – einem Mitarbeiter der Flugüberwachung ähnlich – das Geschehen beobachten und auf den „Ernstfall“ eines Angriffs vorbereitet sind.
    Diese Mitarbeiter befinden sich persönlich als auch technisch kontinuierlich im "Alarmzustand", denn jede Anomalie ist für geübte IT-Sicherheitsspezialisten bereits eine potenzielle Cyberbedrohung, die es zu analysieren und abzuwehren gilt. Damit ein SOC wirksam sein kann, bedarf es eines soliden Fundaments aus:
    • Schlanke Prozessabläufe und eindeutig festgelegte und vernünftige Befugnisse der Beteiligten
    • Hocheffiziente und moderne Technologien und Technologiepartnerschaften mit eingespielten Eskalationsstufen
    • Hochmotivierte und vertrauensvolle Mitarbeiter und vertraute Partner, die in Engpässen das eigene SOC Team unterstützen können

    In diesem Seminar zum Thema SOC, wird der SOC grundlegend erläutert und diese Grundsäulen eines schlanken SOC beschrieben. Außerdem gibt das Webinar einen Ausblick darauf, was auf die Unternehmen zukommt und welche Herausforderungen die einzelnen (n>1) Phasen begleiten und welche Services man outsourcen kann.
  • The Cost of Building a Threat Hunting Team in Your SOC
    The Cost of Building a Threat Hunting Team in Your SOC Stuart Davis, Director, Mandiant Oct 24 2017 9:00 am UTC 45 mins
    At this point your SOC is effectively covering SIEM, IDP, Vulnerability Management and a number of other areas.
    However, the next phase of maturity is to build the APT Threat Hunting capability.

    Join us for a short webinar to discuss the costs of building a hunting team versus buying it.
  • The 3 Pillars of Social Selling. Part 1: Becoming The Brand & Selling You
    The 3 Pillars of Social Selling. Part 1: Becoming The Brand & Selling You Daniel Disney Oct 24 2017 10:00 am UTC 60 mins
    This 3 part webinar series will give show you the 3 key pillars to achieving social success in sales. Learn how to create the ultimate profile, build a winning personal brand, create great and consistent content and build a winning strategy. The final session will be packed with the best industry tips and tricks to make social work for you.

    Part 1 - Becoming The Brand & Selling YOU

    You're not just selling your product anymore, you're selling YOU. More and more of your prospects are looking at your social media profiles and this will influence buying decisions. Find out the best personal branding tips and how to build a profile that will generate opportunities, not scare them away.
  • Best Practices for Enterprise Cyber Intelligence Operations
    Best Practices for Enterprise Cyber Intelligence Operations Igors Konovalovs, Strategic Account Manager, GSI Sales Oct 24 2017 11:00 am UTC 45 mins
    Identifying effective threat intelligence is not easy. Learn what it means to have timely, relevant and actionable threat intelligence and how it can help you respond to threats quickly and decisively.

    This webinar explains:

    · Why do organisations require Cyber threat intelligence?
    o To aid technical and business decision making
    o To identify and manage risks
    o To efficiently deploy capital against the threats that matter to enterprise

    · The key requirements for establishing a cyber threat intelligence function
    · Basic cyber threat intelligence workflows
    · Resource and training requirements to support a Cyber Threat intelligence function
  • The Security Paradigm: "From the Cloud, To the Cloud, In the Cloud"
    The Security Paradigm: "From the Cloud, To the Cloud, In the Cloud" David Grout, Director, Southern Europe Systems Engineering, FireEye Oct 24 2017 2:00 pm UTC 45 mins
    Cloud adoption is a reality today, every company is moving applications and businesses in the cloud to get more flexibility, agility and to potentially reduce their costs.

    Security operations need to enable this transformation and help the business to activate capabilities in the cloud infrastructure. Risks exist and cannot be ignored if companies want to provide a sustainable and secure environment for themselves and their customers.

    During this webinar, we will describe the main risks associated with cloud adoption and cover how to mitigate those risks.  
  • Top 2017 Cyberattacks & How to Avoid Them in 2018
    Top 2017 Cyberattacks & How to Avoid Them in 2018 Christofer Sears, Sr. Solutions Engineer, CISM, Tufin & Dan Rheault, Sr. Product Marketing Manager, Tufin Oct 24 2017 3:00 pm UTC 45 mins
    2017 has been another year of endless headlines featuring words like "breached," "hacked," and "cyberattack" – many of which were avoidable. Enforcing security policy across the legacy physical network is already challenging, and the addition of virtualized networks including the SDN and public cloud introduce new risks to organizations.

    Join this webinar to learn how to avoid the headlines by making security policy continuously enforceable. Having served in network security roles at Wells Fargo, General Dynamics, St. Jude Medical, and the Army National Guard, Tufin's Senior Solutions Engineer, Christofer Sears, CISM, will share his insight garnered throughout 10 years of experience.

    Key topics include how to:

    • Develop and deploy an enforceable security policy
    • Mitigate the inherent risk of DevOps’ CI/CD agility
    • Contain malware outbreaks like WannaCry
    • Effectively design implementation
    • Create time for proactive security projects
  • Protect your Data! Stop Wasting Budget and Resources on Legacy Backup
    Protect your Data! Stop Wasting Budget and Resources on Legacy Backup Glen Olsen, Product Manager Oct 24 2017 6:00 pm UTC 60 mins
    Still running expensive legacy backups? Caringo Product Manager Glen Olsen explains how modern storage technology incorporates advanced data protection allowing businesses to reclaim wasted backup budget and resources.
  • Endpoint Security: No longer taking a back seat!
    Endpoint Security: No longer taking a back seat! Remon Verkerk, Systems Engineer, FireEye Oct 25 2017 10:00 am UTC 45 mins
    Endpoint security has long been an obvious necessity, but mostly proved a resource heavy burden with limited value. The threat landscape has changed and so have the attack vectors. Endpoints are a popular and often easy in to customer networks. This ideal stepping stone needs proper protection and NGAV is no longer sufficient. Privacy laws and regulations demand answers quickly when things go south and data breaches occur. The endpoint is usually a good starting point to provider answers to questions like:

    - Is there command and control activity?
    - Did lateral movement occur?
    - What other systems were accessed?
    - Et cetera…

    This webinar explains how FireEye Endpoint Security (HX) helps our customer to protect their endpoints, and enable you to go from alert to fix in a matter of minutes. Visibility, speed and cost efficiency are the key components in this solution.

    After this webinar, you will have good understanding of the capabilities on countering attacks on your endpoints, and how Fireeye’s Endpoint Security can be of added value to your organisation.

    Keywords/tags: protection, prevention, detection, hunting, exploit prevention, AV
  • Simplify Threat Response Through Integration & Automation
    Simplify Threat Response Through Integration & Automation Anthony Leigh, Systems Engineer, FireEye Oct 25 2017 1:00 pm UTC 45 mins
    FireEye Security Orchestrator helps you improve response times, reduce risk exposure, and maintain process consistency across your security program. It unifies disparate technologies and incident handling processes into a single console that codifies experiences from the frontlines to deliver real-time guided responses.

    In this technical session we hear from an orchestration expert on best practices to simplify and automate security tools and processes. We will look at real-life examples of providing teams with greater control of incident response process for improved efficiency, thus saving time & resources and increasing efficiency and performance. We will also look at orchestration services with incident response playbooks, plug-in development, automation and workflow deployment.
  • Customer Insight: Future-Proof your Colocation Data Center
    Customer Insight: Future-Proof your Colocation Data Center Rhonda Ascierto, Research Director at 451 Research; Greg Jones, VP Strategy - Cloud & SP segment, Schneider Electric Oct 25 2017 3:00 pm UTC 60 mins
    Against the ever-changing and complex hybrid IT landscape, 451 Research surveyed more than 450 colocation customers globally – to understand the changing facets driving colocation demand and how colocation providers can be positioned for success today, and in the future. This research shows that the role of the colocation provider has never been more important – but the threats and challenges will intensify, and the opportunities will be uneven. Led by 451 Research’s Rhonda Ascierto, Research Director – Data Centers, and hosted by Greg Jones, VP Strategy – Cloud & Service Provider segment, Schneider Electric, this webinar will reveal the findings of this research along with actionable guidance colocation providers can use to plan for the future.
  • Extend On-premise Deployments to Azure HDInsight in Real-time
    Extend On-premise Deployments to Azure HDInsight in Real-time Paul Scott-Murphy, VP of Product Management, WANdisco, Pranav Rastogi, Program Manager, Microsoft Oct 25 2017 5:00 pm UTC 60 mins
    Join us to learn how you can achieve continuous replication at scale between multiple Big Data and Cloud environments with guaranteed data consistency and continuous availability.

    Pranav Rastogi, Microsoft Program Manager, and Paul Scott-Murphy, WANdisco VP of Product Marketing, will discuss how Microsoft customers can achieve a truly hybrid architecture for on-demand data analytics and offsite disaster recovery via a single-click installation from the Azure marketplace.

    During this webinar you will also learn:

    - How to meet stringent data availability and compliance requirements whilst seamlessly moving production data at petabyte scale from on-premises Big Data deployments to MS Azure.
    - How to save money and achieve greater ROI with no need for dedicated hardware or storage systems.
    - How to enable data to span HDFS, object storage, and other systems.
    - How to select subsets of content for replication with fine-grained control over where data resides.
    - How to recover from intermittent network or system failures automatically.
    Register now to learn how to get the most value from your data while also meeting strict service level agreements.
  • CPE Webinar: A Data Security Survival Guide in an Interconnected World
    CPE Webinar: A Data Security Survival Guide in an Interconnected World Rebecca Herold, The Privacy Professor; M P. Suby, Frost & Sullivan; Deral Heiland, Rapid7; Bharath Vasudevan, ForcePoint Oct 25 2017 5:00 pm UTC 75 mins
    Attendees can earn 1 CPE credit on this session.

    As the number of internet-connected devices skyrockets into the billions, a data security strategy is an increasingly important part of any organization’s ability to manage and protect critical information. Enterprises are migrating to the cloud in droves, however, protecting data in the cloud remains a challenge as employees push to access cloud apps from any device, anywhere. In the last year alone, 1 in 3 organizations were hacked more than 5 times, and with the increased number of attacks the financial cost of security incidents is also rising.

    In many cases, breaches are caused by a combination of benevolent insiders, targeted attacks, and malicious insiders. For example, targeted attacks are often enabled inadvertently by well-meaning insiders who fail to comply with data or security policies, which can lead to a data breach. In this webinar, our panel will discuss major trends impacting cyber security – from the rising frequency of attacks and types of threats that organizations should be concerned about the most, and they will adress the risks, priorities, and capabilities that are top of mind for enterprises as they migrate to the cloud.
  • 2017- Une année déjà active pour les groupes APT
    2017- Une année déjà active pour les groupes APT David Grout, Director, Southern Europe Systems Engineering, FireEye Oct 26 2017 12:00 pm UTC 45 mins
    2017 est d’ores et déjà une des années les plus prolifiques en ce qui concerne l’activité des groupes APT. On a en effet depuis le début de l’année plusieurs exemples d’attaques majeures, d’extorsions ou de tentatives d’influences relayées dans la presse.

    Prenons une pause et regardons plus attentivement les TTPs de ces groupes, les techniques Outils et procédures qu’ils utilisent.

    Pendant 45mn nous regarderons dans le détails leurs motivations, leurs approches et nous en définirons les moyens possibles à mettre en place pour limiter voire éviter leur attaques.

    Nous couvrirons plusieurs domaines incluant les groupes sponsorisés par des états avec des volontés de prises d’avantages économiques voir de destructions de l’adversaire comme APT32 ou 33. Nous étudierons aussi les groupe jouant d’influence géopolitique et de fake news comme APT28 ou 29 et nous finirons sur le cyber espionnage (APT10) et les cybers criminels spécialisés dans l’extorsions de fond.
  • The Emerging Impact of Application-Centric Backup and Data Management
    The Emerging Impact of Application-Centric Backup and Data Management Steve Ricketts, Senior Analyst & Consultant, Taneja Group Oct 26 2017 3:00 pm UTC 60 mins
    Join us for a fast-paced and informative 60-minute roundtable as we discuss the latest technology disruptor to traditional backup: Application-Centric Data Management.

    Developers, QA staff, database administrators and cloud service owners are demanding timely access to data and the ability to get copies without IT involvement. Thus, self-service and app-centric data management is now offered by leading data protection and storage vendors. Hear from three top vendors in this space as we unpack and explore how new capabilities, such as REST APIs, policy-based automation, role-based access control and cloud support combine to enable a simple, compliant and flexible self-service data management experience.

    Vendors TBA
  • Making Your Move: Become a Virtual Expert on Virtual Servers
    Making Your Move: Become a Virtual Expert on Virtual Servers Chadd Schwartz, Global Offering Manager for Migration Solutions, DXC Technology & Derek Cheek, Solutions Advisory, Carbonite Oct 26 2017 4:00 pm UTC 60 mins
    Many companies take advantage of virtual servers for the dual benefits of cost effectiveness and scalability. But when the time comes to move data to a virtual server—or between virtual environments—a lack of preparation can mean extra costs, or worse, lost data.

    This webinar will cover best practices around managing data in a virtual environment, and offer key watchouts for those who are newer to virtual servers. We’ll also offer pro tips and expert advice for data migration involving virtual environments, with ways to keep the operation as simple as possible and avoid common pitfalls. And we’ll even show you how you can automate most of the process.

    Join us and become a virtual expert on virtual environments and migrations.
  • What to Consider When Transitioning to SD-WAN
    What to Consider When Transitioning to SD-WAN David Klebanov, Director of Technical Marketing, Viptela Oct 26 2017 5:00 pm UTC 45 mins
    When considering a transition to SD-WAN, there are several important capabilities needed to suit an enterprise-grade network infrastructure. This webinar will cover critical SD-WAN features and how they translate to common deployment scenarios in different industries.

    These features include:
    - Overlay capability over MPLS, Broadband and LTE
    - Unified and centralized management of the infrastructure
    - Network segmentation with per-segment topologies
    - Predictable Application SLA with centralized policies and real-time traffic steering
    - Mature routing capabilities with BGP, OSPF, VRRP, and IGMP
    - Robust zero-trust WAN security
  • Social Engineering: Still a threat?
    Social Engineering: Still a threat? Tarrell "Mac" McCrory, CISSP, CEH Oct 26 2017 5:00 pm UTC 60 mins
    When you hear the term Social Engineering, the first thing that pops into your mind will invariably be phishing emails. However, there are many aspects of social engineering that are, more often than not, completely overlooked. Identity impersonation, physical penetration, and various other means can just as easily be employed to breach company after company. While the ability to detect malware and other types of breaches get better by the day, these types of attacks are rarely discovered quickly, if at all. Enterprise level security accounts for many of these, but rarely all. Join the indepth discussion of how Social Engineering can be dangerous for an organization and what can be done about.

    Previously, Mr. McCrory was one of the founding employees of PhishMe, Inc. where he developed and ran many social engineering engagements as a Managed Services Consultant, teaching management of various Fortune 500 and Global 100 comapnies how to deal with phishing and on occassion, various other forms of social engineering attacks.

    Mr. McCrory is also currently working on his first book and working as an independent consultant.
  • Data storage trends to watch for in 2018.
    Data storage trends to watch for in 2018. Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Oct 26 2017 5:00 pm UTC 60 mins
    A year ago, we predicted 2017 would bring difficult, messy hybrid cloud transformation, that “hybrid cloud” would become synonymous with “multi-cloud,” and that IoT and machine data would raise new questions related to security and data access.

    Our crystal ball was crystal clear last year, and we’re breaking it out again to look forward to 2018.

    In this webcast, we’ll cover the data storage trends most likely to make news in the New Year, including cloud vendors with on-prem-like strategies, security and the ransomware challenge, consolidation of secondary storage players and the comeback of captive cloud.
  • Reach IT Zen: How to Align Your Business Priorities and Data Protection Strategy
    Reach IT Zen: How to Align Your Business Priorities and Data Protection Strategy Lilac Shoenbeck, Director of Product Marketing at Carbonite Oct 26 2017 6:00 pm UTC 60 mins
    Cyber threats and natural disasters are increasing in frequency and severity. RTO’s and RPO’s are becoming more strict and difficult to achieve as the volume of business critical data grows. Having traditional backup alone is no longer an adequate data protection strategy. IT professionals must put a range of recoverability options in place that aligns costs and technology with application and data criticality. Join us for a complimentary webinar where we will discuss why and how a hybrid approach to data protection can help you reach IT Zen.

    In this webinar, attendees will walk away with actionable advice on:

    - Understanding risks and downtime
    - Protection mechanisms and media (backup, replication, onsite/cloud)
    - Choosing the right technology for broad support of business critical and legacy systems/data

    View our webinar and ensure your BCDR strategy aligns with the needs of your business.