Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Let's talk about OSSTMM with Pete Herzog from inside out
    Let's talk about OSSTMM with Pete Herzog from inside out Pete Herzog, Managing Director at ISECOM Recorded: Dec 14 2017 60 mins
    In early 2000, the Open Source Security Testing Methodology Manual (OSSTMM) was released with the primary objective of improving how the enterprise conducted security testing. Key sections of this methodology include operational, human, physical, wireless, telecommunication, and data network security testing. Today, OSSTMM is widely regarded as a methodology for penetration testing world-wide, offering a standard approach to conducting security testing. Frank Shirmo of ITPG Secure Compliance, a Cyber Security Boutique in Northern Virginia will be joined by Pete Herzog, the creator of OSSTMM, to answer key questions, and provide clarifications on OSSTMM for CTOs, CISOs, CIOs, Security Engineers and Analysts, and all other stakeholders interested in the topic of security testing.
  • 5 Ways to Eliminate Secondary Storage Forever
    5 Ways to Eliminate Secondary Storage Forever Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Recorded: Dec 14 2017 49 mins
    Today’s storage market is fragmented, with organizations working with multiple vendors for primary storage, backup and DR; it’s common for enterprises to manage six to eight vendors for backup alone. With pressure on IT to go hybrid, consolidate data centers and cut costs, enterprises must find significant opportunities to cut costs and improve their IT operations.

    By reducing IT footprints and eliminating redundancy, ClearSky Data customers realize greater than 50 percent total cost of ownership (TCO) savings. ClearSky Data solves the enterprise storage problem by integrating primary, backup and DR capabilities in one service, dramatically reducing data center footprints, management complexity, and costs.

    Tune in on December 14th and see how you can eliminate secondary storage, simplify your infrastructure and move to the cloud today.
  • 2018 GRC Predictions
    2018 GRC Predictions Tom Garrubba, Santa Fe Group; David Grazer, Tevora; Peter Tessin, Discover Financial Services; Christina Whiting, Tevora Recorded: Dec 14 2017 60 mins
    “It was the best of times, it was the worst of times,” wrote Dickens. 2017 has been a tumultuous year for governance, risk management, and compliance (GRC). 2018 could be just as stormy with cybersecurity, GDPR, and new risks caused by the shift to digital business. In this webinar, our panel of industry experts will recap the year’s highlights and offer their thoughts on what to expect in 2018.

    Discussion topics include:

    • Ramifications of major data breaches in 2017
    • The continuing shift in risk perspective from department to enterprise
    • Navigating third-party risk management on the road ahead
    • The role and influence of the board in 2018
    • GDPR and the trend toward data privacy and security

    Plan now to attend this special webinar on 2017 trends and 2018 predictions for GRC.
  • Part 1: Data Discovery and Classification for the GDPR
    Part 1: Data Discovery and Classification for the GDPR Cheryl Tang - Product Marketing, Imperva .; Mark Pelkoski - Principal SE, Imperva Recorded: Dec 14 2017 28 mins
    This is the first in a series of product demos focused on addressing specific requirements of the General Data Protection Regulation (GDPR). In this demo, we demonstrate how to use our data security portfolio to find and categorize your data for GDPR compliance.

    In this webinar we’ll provide:

    - An overview of General Data Protection Regulation (GDPR)
    - Who does it impact?
    - What are the data protection principles
    - What are the primary data security requirements
    - An insight into Imperva’s data protection portfolio and a demo of its discover and classification capabilities
  • GDPR - Inside a Data Breach
    GDPR - Inside a Data Breach Patrick McGrath, Director of Solutions Marketing, Commvault Recorded: Dec 14 2017 50 mins
    Many headlines for the General Data Protection Regulation (GDPR) mention the eye-watering fines for a data breach, but what happens when you realize you have actually been the victim of one? How hard will it really be to comply with a 72-hour breach notification? In this session, an insider will describe the data breaches, the approaches used to manage these incidents, key lessons learned and considerations for handling data breaches in a world with GDPR expectations.
  • Cyber Security Predictions: What is in store for the EMEA region
    Cyber Security Predictions: What is in store for the EMEA region Jens Monrad, Senior Intelligence Account Analyst, FireEye iSIGHT Intelligence Recorded: Dec 14 2017 40 mins
    2017 was an eventful year in cyberspace, especially in Europe and the surrounding areas. We saw politically motivated industrial espionage attacks, changes in cyber legislation, a constantly adapting criminal ecosystem targeting various industries throughout the region – and that’s not even the half of it.

    Join us for our webinar on Dec. 14, 11am GMT, as Jens Monrad, Senior Intelligence Account Analyst with FireEye, discusses various aspects about the cyber threat landscape in the EMEA region in 2018, including:

    •Continued political tension in the region
    •Upcoming elections
    •Mixed security maturity
    •The effect of new compliance and data protection laws

    Register today to learn what lies ahead, and stay one step ahead of cyber security threats.
  • Defense Against a Ransomware Attack: Latest Research and Best Practices
    Defense Against a Ransomware Attack: Latest Research and Best Practices Kevin Haley, Director of Security Response, Symantec and Matt Sherman, Malware Outbreak Specialist, Symantec Recorded: Dec 12 2017 61 mins
    On May 12 2017, a new variant of the WannaCry ransomware (Ransom.Wannacry) suddenly appeared, infecting thousands of computers worldwide within a matter of hours.

    It was a new and particularly dangerous form of threat because of its ability to self-propagate and spread itself across an organization’s network and on to other organizations via the Internet.

    The ransomware landscape has shifted dramatically in 2017 and organizations bore the brunt of the damage caused by new, self-propagating threats such as WannaCry and Petya. These outbreaks caused global panic and caught many organizations off-guard, with infections spreading rapidly across corporate networks.

    The impact of these incidents will not go unnoticed on the cyber crime underground and it’s likely that other groups may attempt similar tactics. Because of the nature of these attacks, organizations are particularly at risk. Businesses need to educate themselves about this new avenue of attack and ensure they have defenses in place.

    Symantec experts recommend adopting a multilayered approach to minimize chances of infection. This strategy includes protecting against ransomware in three stages:

    1. Prevent – Preventing infection is by far the best outcome so it pays to pay attention to how infection can be prevented.

    2. Contain – In the event of a payload arriving on a computer, a critical step is to limit the spread of the attack.

    3. Respond – Contact Incident Response experts, back up important data, and never pay the ransom.

    Join us for a discussion about the current state of ransomware and learn the strategies and the technologies for effective protection against ransomware and unknown threats.

    Register Today
  • CPE Webinar: Critical Actions to Finalize Your GDPR Compliance Program: Part 1
    CPE Webinar: Critical Actions to Finalize Your GDPR Compliance Program: Part 1 Dr. Branden Williams; Chris Covell, Absolute, Jake Olcott, BitSight, Brian Philbrook, OneTrust, and Marshall Toburen, RSA Recorded: Dec 12 2017 71 mins
    Attendees can earn 1 CPE credit on this session.

    The new EU General Data Protection Regulation (GDPR) rule looms and will take affect in May 2018, but only a third of companies are on track to be compliant by the due date. GDPR is the most significant change in data privacy regulation in more than 20 years. It represents an extraordinary shift in the way businesses will be expected to operate when they gather, process, maintain, and protect customer data. Any organization that retains information of EU citizens must be in compliance or face huge fines of up to 4% of worldwide turnover.

    In this webinar series you will hear from industry experts facing the same challenges you face and find out how they're meeting and surpassing critical implementation check points, and you will learn what actions other organisations are taking preparation for data protection – not only for GDPR, but for long-term data protection.
  • Tech Demo: API Security with Imperva SecureSphere
    Tech Demo: API Security with Imperva SecureSphere Natasha Gupta – Product Marketing Manager and Amir Shladovsky – API Security Expert Recorded: Dec 12 2017 38 mins
    APIs have sped up application delivery by enabling software automation and programmability of services, and has become a mainstay practice for any business with workloads on the cloud. As businesses make their APIs publicly available to increase their touchpoints with customers, this introduces new vulnerabilities that exposes applications to malicious users, unauthorized access, and potential attacks. In this webinar, learn how SecureSphere can help monitor and protect API gateways in your network and walk through a brief demonstration on using SecureSphere to combat API-centric attacks.
  • Shift Left: How testing early and often is best for the business and customer
    Shift Left: How testing early and often is best for the business and customer Nancy Gohring 451 Research and Steve Feloney CA Technologies Recorded: Dec 12 2017 50 mins
    Organizations in most any industry are feeling increasing pressure to move fast. But at what cost? Some have learned the hard way that skipping crucial processes, like testing, damages performance and impacts customer sentiments on your brand. In this case, the fast time to market becomes meaningless.

    Smart businesses are adapting to a shift left strategy. These teams are learning how to incorporate testing early and often in the release cycle, supporting business requirements to move fast while ensuring high-performing products and quality. But getting there isn’t easy. In this webinar, we’ll cover:

    •Testing tools: tool choice is important. Not all tools have been designed to support this new paradigm.
    •Integrations: to be effective, testing tools must integrate easily with the tools and processes modern teams use, including CI/CD and APM products. Further, these tools must be very easy to use, specifically for developers.
    •Organizational models: shifting left requires changes to traditional organizations and culture. We’ll share insight into the successful models we’ve seen.
  • 10 Must-Answer Questions For Your 2018 Data Center Strategy
    10 Must-Answer Questions For Your 2018 Data Center Strategy Matt Stansberry, Senior Director Content & Publications, Uptime Institute Recorded: Dec 12 2017 60 mins
    Are you adapting your infrastructure strategy to business, geopolitical and technology trends?

    Our panel of experts discuss the questions you must have the answers for along with trends that will impact your organization in the coming year.

    How will you adapt your strategic plan to climate change? What are the implications of new regulatory enforcement? How will your staff adapt to changing infrastructure deployment models? Will new workloads overwhelm your infrastructure plans? Change is here, so learn to adapt.
  • Technology Trends Impacting Network Security in 2018
    Technology Trends Impacting Network Security in 2018 Reuven Harrison, Tufin CTO and Joe Schreiber, Tufin Technical Director Recorded: Dec 12 2017 38 mins
    As enterprise networks continue to grow more complex and change before our eyes, and as security threats continue to grow in frequency and sophistication, organizations need to understand the technology trends that will be most prominent in 2018.
    Traditional IT security leaders and cloud architects alike will learn about ways to reduce risk and improve business agility in the coming year. We will discuss:
    •Our predictions for the trends we expect to see in 2018
    •What technology shifts we predict to influence network security
    •How the role of network security policy will affect these trends
  • Threat Hunting: A Proactive Approach to Cybersecurity
    Threat Hunting: A Proactive Approach to Cybersecurity Karl Vogel, Worldwide Solution Architect Recorded: Dec 12 2017 59 mins
    Traditional network security products often only kick in when a threat strikes, allowing you to react quickly and effectively to breaches. But every second that is spent identifying and reacting to a breach is another second that the attacker can make off with sensitive data.

    But why react when you can act? With Symantec Security Analytics, your IT security team will be able to proactively search for hidden threats and potential gaps across your network, endpoint and servers, to identify and remove advance threats before they can launch an attack.

    Key benefits of Symantec Security Analytics:
    • Expose the source and scope of an attack with unrivalled data enrichment and threat intelligence
    • Uncover hidden threats in encrypted traffic when deployed with Symantec SSL Visibility
    • Reduce time to resolution with sophisticated anomaly detection and advanced network forensics

    Empower your network with truly proactive defence. Sign up for our webinar today to learn how Symantec Security Analytics can help you take down threats before they strike.
  • Unprotected Files on a Public Cloud Server: Live Panel on the NSA Data Leak
    Unprotected Files on a Public Cloud Server: Live Panel on the NSA Data Leak Chris Vickery, George Crump, David Linthicum, Charles Goldberg, Mark Carlson Recorded: Dec 8 2017 59 mins
    Public, private and hybrid cloud are nothing new, but protecting sensitive data stored on these servers is still of the utmost concern. The NSA is no exception.

    It recently became publicized that the contents of a highly sensitive hard drive belonging to the NSA (National Security Agency) were compromised. The virtual disk containing the sensitive data came from an Army Intelligence project and was left on a public AWS (Amazon Web Services) storage server, not password-protected.

    This is one of at least 5 other leaks of NSA-related data in recent years. Not to mention the significant number of breaches and hacks we’ve experienced lately, including Yahoo!, Equifax, WannaCry, Petya, and more.

    The culprit in this case? Unprotected storage buckets. They have played a part in multiple other recent exposures, and concern is on the rise. When it comes to storing data on public cloud servers like AWS, Azure, Google Cloud, Rackspace and more, what are the key responsibilities of Storage Architects and Engineers, CIOs and CTOs to avoid these types data leaks?

    Tune in with Chris Vickery, Director of Cyber Risk Research at UpGuard and the one who discovered the leak, along with George Crump, Chief Steward, Storage Switzerland, David Linthicum, Cloud Computing Visionary, Author & Speaker, Charles Goldberg, Sr. Director of Product Marketing, Thales e-Security, and Mark Carlson, Co-Chair, SNIA Technical Council & Cloud Storage Initiative, for a live panel discussion on this ever-important topics.
  • The State of Play of FirstNet
    The State of Play of FirstNet Bill Schrier, Senior Advisor, First Responder Network Authority (FirstNet) Recorded: Dec 8 2017 24 mins
    What's the status of FirstNet's state opt-in benefits and how does the network help support public safety? Also, what are the benefits of connecting first responders to IoT and Smart Cities? These are the question that Bill Schrier will answer on this LIVE PODCAST by NMG Media.
  • Are EMEA organizations behind the curve, developing their Cloud Backup Strategy?
    Are EMEA organizations behind the curve, developing their Cloud Backup Strategy? Phil Maynard, Sr. Director, Technical Sales EMEA; Alex Hilton, CEO, Cloud Industry Forum Recorded: Dec 8 2017 45 mins
    Many organizations within EMEA are beginning to host more of their business-critical applications and data in the Cloud. However, many of these organizations are not fully aware of the risks, so are not fully protecting their Cloud-based applications or data. In addition, the majority of organizations still rely on traditional on-prem focussed Backup solutions, many of which do not enable the cloud to be used efficiently, or cost effectively.

    Join Phil Maynard, Sr. Director EMEA, Technical Sales at Barracuda and Alex Hilton, CEO at Cloud Industry Forum to discuss:

    - Findings from Barracuda research on how companies are using Backup and Cloud in EMEA
    - What’s preventing companies from moving their backups to the Cloud
    - Why moving to Office 365 could break your data protection and IT security strategy
    - Real life examples of how organisations have adopted a hybrid on-prem and Cloud Backup Strategy
  • 2018 WAN Transformation Trends & Predictions
    2018 WAN Transformation Trends & Predictions Todd Krautkremer, CMO, Cradlepoint Recorded: Dec 7 2017 47 mins
    There is a transformation happening in enterprise networking. Today's leading IT organizations are enabling digital and WAN transformation to connect more people, places, and things than ever before.

    New cloud-delivered, software-defined technologies are enabling this transformation, and 2018 promises more transformation than enterprise networking has seen in 20 years.

    Join Cradlepoint CMO Todd Krautkremer for a live webinar on Dec. 7, 2017, at 9 am PT to learn more about trends and predictions for 2018 and how technologies like Gigabit LTE, 5G, and SDx will impact the network in 2018 and beyond.
  • All-Flash in 2018 - What You Need to Know
    All-Flash in 2018 - What You Need to Know Storage Switzerland, Tegile Systems Recorded: Dec 7 2017 57 mins
    The All-Flash era is well upon us, and most data centers consider an all-flash product storage tier both realistic and practical. But the flash industry continues to march on. New technologies like NVMe and ultra high-density flash modules promise to continue all-flashes march to data center dominance. Join us for this live webinar and we will help you design your plan for 2018.
  • Top Tips and Tricks to Rock your Isilon World
    Top Tips and Tricks to Rock your Isilon World Rash Vyas and Scott Owens Recorded: Dec 7 2017 27 mins
    Join Dell EMC technical Isilon experts to learn our top tips and tricks for getting the most out of your Isilon implementation. Based on working with customers around the world, our Isilon technical experts will share insights and best practices across configuration, operation and management of Isilon environments. The webinar also includes an ‘Ask-The-Expert’ segment.
  • FCIP (Extension): Data Protection and Business Continuity
    FCIP (Extension): Data Protection and Business Continuity Rupin Mohan, Director R&D, SAN Chief Technologist, HPE, Mark Detrick, Director, Extension Principal Architect, Brocade Recorded: Dec 7 2017 59 mins
    Businesses today rely heavily on their data. Disaster may strike anywhere and occurs in many shapes and sizes. Transporting data over significant distance beyond the reach of a threatening event preserves data so organizations can rapidly recover in the event of a site going down.

    This makes deploying a disaster recovery infrastructure between data centers with fast, continuous, and easy replication of mission-critical data to anywhere in the world essential.
    Fibre Channel over IP (FCIP), often referred to as “Extension,” is used to connect SANs across distance using IP networks. FCIP is commonly used for Remote Data Replication (RDR) between Enterprise Storage Arrays and Remote Tape applications, for the purpose of Business Continuance via Disaster Recovery (BC/DR).

    Join storage technology and industry experts as they discuss their experience and deployment knowledge in:

    •Best known methods for deployment with extension architectures, extension in routed topologies, and performance optimization for remote replication
    •Industry best practices: topologies to achieve high-availability goals, advantages in trunking, encryption, etc…
    •Customer examples and use cases of a variety of critical production environments ranging from SMBs to the largest most demanding enterprises and government institutions
  • Veteran vs. Rookie - Who is Best Able to Meet The Enterprise Backup Challenge?
    Veteran vs. Rookie - Who is Best Able to Meet The Enterprise Backup Challenge? Storage Switzerland, Unitrends Recorded: Dec 7 2017 61 mins
    New vendors are appearing in the market “solve” all your backup problems. But are these “rookies” really up to the challenge or are they making the situation worse?

    Join us for our live webinar, “Veteran vs. Rookie - Who is Best Able to Meet The Enterprise Backup Challenge.”

    Learn who can solve the 5 key data protection challenges
    1. Protecting legacy applications
    2. Protecting cloud applications
    3. Rapid data growth
    4. Rapid recovery expectations
    5. Lack of recovery confidence
  • Exploring the Use Cases for Dell EMC VPLEX
    Exploring the Use Cases for Dell EMC VPLEX Sharon Yen Recorded: Dec 7 2017 41 mins
    This webinar will highlight the current use cases for VPLEX which include data mobility for technology refresh, availability within the data center and across distance, data center consolidation and relocation. In addition, we’ll touch on Storage Monitoring and Reporting for VPLEX which is included with every VPLEX system.