Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • GDPR and What It Means for Security Teams
    GDPR and What It Means for Security Teams Cheryl Tang, Director Data Security Products, Imperva Recorded: Aug 17 2017 37 mins
    The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.

    Join us to learn:

    - What is GDPR
    - Deep dive into relevant data security articles of the GDPR
    - Review how different technology can address some of the GDPR data security requirements
  • Showdown: Hardware-Based Hyperconvergence vs. Hyperconvergence Software
    Showdown: Hardware-Based Hyperconvergence vs. Hyperconvergence Software Storage Switzerland, Maxta Recorded: Aug 17 2017 62 mins
    In our live webinar, Storage Switzerland and Maxta will compare the pros and cons of the two hyperconverged deployment models. Those attending learn how to clarify their goals for hyperconvergence and how to decide which architecture is the best fit for their organizations.

    Attendees will learn how each deployment model overcomes these challenge:

    1. Ease of initial evaluation and testing
    2. How to transition to hyperconvergence while having current servers
    3. How to avoid hypervisor lock-in
    4. How to build a future proof hyperconverged architecture
  • Breaking Down Silos - DevOps Meets ITIL
    Breaking Down Silos - DevOps Meets ITIL Greg Pollock, VP of Product at UpGuard Recorded: Aug 17 2017 42 mins
    Big things are happening in software. Agile Software Development and DevOps are delivering innovations at a rate never seen before. Prompting many to ask 'Is this the end of ITIL?'.

    There is a perception that DevOps and ITIL cannot play well together. That an you must choose one over the other or risk catastrophic failure. This is simply not true.

    Many do not realize that DevOps relieson core concepts and processes of ITIL to be successful. Ignoring this relationship means missing out on service improvements that may be introduced and developed by integrating key areas of the ITIL framework and the collective body of knowlege that is DevOps.

    In this webinar we will take a close look at the simple things organizations can do to get most out of a balanced blend of traditional and modern IT practices.
  • T-72 hours; Building Your GDPR Breach Response Plan
    T-72 hours; Building Your GDPR Breach Response Plan FireEye Recorded: Aug 17 2017 49 mins
    The first half of 2017 was the tipping point for cyber threats in Northern Europe. Organizations had to defend themselves against two cyber attacks involving rapid spreading malware. The latest incident severely disrupted global enterprises, causing significant downtime and impacting their revenue.
    Such high-profile, large-scale attacks show us that no organisation is safe from the reach of cyber-criminality. Post-GDPR, responding to these attacks will become all the more critical as breaches will have to be reported to the relevant regulatory body. By understanding your current security posture - internal processes and technology – combined with the external threat landscape – organisations can prepare themselves should a breach occur.

    In this webinar, you will learn how to assess your risk profile, evaluate your operational strengths and weaknesses as well as your tactical approach to responding to co-ordinated, targeted attacks.

    Register your interest here.

    Many thanks,
    The FireEye Team
  • BrightTALK's GDPR Benchmark Special: How Prepared are You for May 2018?
    BrightTALK's GDPR Benchmark Special: How Prepared are You for May 2018? Josh Downs, BrightTALK; Stuart McKenzie, Mandiant; Sian John, Symantec; Nigel Tozer, Commvault & Tim Hickman, White & Case Recorded: Aug 17 2017 63 mins
    9 months until the GDPR deadline - are you completely up-to-speed?

    Our panel of data protection experts will be discussing the compliance considerations that you need to be assessing for May 2018 along with suggesting next steps from a cyber and general security standpoint.

    We'll also be asking YOU at what stage you're at in terms of your preparations via a series of interactive benchmarks as we go through the session to get a sense of where the security community is at in terms of preparations.

    -------------

    GDPR and its May 2018 deadline are now fully the minds of the vast majority of security professionals and with massive fines on the horizon for non-compliance, now is a better time than ever to get to grips with the legislation and ensure that your organisation is secure and compliant.

    It’s vital that your business has carried out the relevant preparations for compliance by then to make sure you don’t get whacked with a huge fine of up to £15m or 4% of your organisation’s global annual turnover.

    Not only are there potentially huge financial repercussions, but leaving your business open to attack and your customers at risk can cause serious reputational damage.
  • Symantec and Deloitte discuss “Trust” and Data Privacy in Australia
    Symantec and Deloitte discuss “Trust” and Data Privacy in Australia Brian Fletcher, Director, Government Affairs, Symantec; Marta Ganko, National Privacy and Data Lead, Risk Advisory, Deloitte Recorded: Aug 17 2017 60 mins
    With the advent of Big Data comes not only new ways to optimise business and marketing processes, but also new concerns over the control and privacy of personal data.

    These have given rise to local and regional data protection laws and regulations such as the General Data Protection Regulation (GDPR), a modernisation of data protection laws in the European Union, and the Australian data breach notification law, an amendment to the Privacy Act 1988 (Cth) which introduces a mandatory scheme for eligible organisations and federal agencies to report data breaches.

    Data breach notifications give individuals greater control over their personal data and promote transparency over information handling practices, fostering consumer trust in businesses. The law requires businesses to prepare and assess risks to maintain brand confidence even if an incident becomes the next data breach headline.

    Join this webinar to learn about:

    - New challenges introduced by the Australian mandatory data breach notification law
    - Key steps in the journey towards data privacy compliance
    - How to monitor insider threats
    - How to leverage these regulations to gain trust and ensure great customer experiences

    We look forward to your participation in this free webinar.
  • Understanding your Big Data: From the Warehouse to the Cloud & Back Again
    Understanding your Big Data: From the Warehouse to the Cloud & Back Again Just Analytics, Andrea Gagliardi La Gala, Solution Architect & Darmadi Komo, Product Marketing Manager, Microsoft Recorded: Aug 16 2017 63 mins
    Join the journey towards being data-focused and customer-centric using Big Data and Data Warehouse technologies.

    In this webcast, you will understand what it means to take the journey from a data-focused approach and get faster insight without infrastructure concerns.

    Learn how to:
    - Use Azure public cloud for big data
    - Setup a SQL DW, a Hadoop cluster and ask questions against large data sets
    - Utilize Microsoft's best in class big data and analytics solutions and how it can power your journey into adopting, analyzing and utilizing big data
  • Benefiting from Scalable Software-Defined Storage without Change
    Benefiting from Scalable Software-Defined Storage without Change Glen Olsen, Product Manager Recorded: Aug 16 2017 46 mins
    As storage technologies continue to evolve in 2017, so do the challenges faced in integrating conventional storage along with new age scalable object storage. Caringo Product Manager Glen Olsen will show how contemporary storage solutions are enhancing traditional storage and protocols so they benefit from modern cost-efficient scalability and data protection.
  • How to Leverage Cloud Storage for Hybrid VMware
    How to Leverage Cloud Storage for Hybrid VMware Storage Switzerland, ClearSky Data Recorded: Aug 16 2017 57 mins
    Join Storage Switzerland and ClearSky Data for our live webinar, “How to Leverage Cloud Storage for Hybrid VMware”, on August 16th at 1 p.m. ET and 10 a.m. PT. In this webinar you will learn how to create a truly hybrid cloud storage infrastructure that improves performance, reduces on-premises storage requirements and better protects the organization from disaster.
  • Taming the Big Database Beast
    Taming the Big Database Beast Henry Baltazar, Research Director at 451 Research. Chandra Reddy, Vp of Marketing at Actifio Recorded: Aug 16 2017 56 mins
    Learn how to instantly clone and recover very large databases in the data center or in the cloud.

    The digital economy is driving massive volumes of information into databases. Database Administrators (DBAs) are now struggling to balance operational needs such as performance and availability with the needs of their development teams who want more database copies and the current copies to be refreshed faster. These challenges also inhibit innovation and make it difficult for DBAs to consider new offerings such as self-service database provisioning, cloud integration and instant database recovery solutions. In this webinar learn how to instantly clone and recover very large databases in the data center or in the cloud.
  • Software-Defined Everything at the Elastic Edge
    Software-Defined Everything at the Elastic Edge Tyler Peterson and Matt Thueson, NetCloud Product Specialists at Cradlepoint Recorded: Aug 16 2017 43 mins
    From SD-WAN at branches and quick-serve restaurants to SD-Perimeter (SD-P) for the Internet of Things and remote employees, networks today need constant connectivity, mobility, cloud services and software-defined everything. The Elastic Edge of the network requires a secure, next-generation WAN that expands, contracts, and evolves at a moment’s notice.

    Join Tyler Peterson and Matt Thueson of Cradlepoint for a live webinar on Aug. 16, 2017, to discuss use cases and success stories for SD-WAN, SD-P, and always-available LTE connectivity.

    Attendees will learn about:

    + The characteristics of the Elastic Edge
    + Simpler, more efficient networking at the branch level
    + Virtual Cloud Networks and dark cloud security for IoT
    + Real-word SD-WAN and SD-P success stories
  • The Automation Journey Starts with Firewall Administration
    The Automation Journey Starts with Firewall Administration Erez Tadmor, Senior Product Manager & Karen Crowley, Sr. Product Marketing Manager, Tufin Recorded: Aug 16 2017 39 mins
    As a valued Tufin customer we invite you to learn how to begin the journey towards automation. We will discuss the challenges of automation and how you can take the first step towards automating firewall administration tasks.

    In this webinar, you will learn how to gain immediate productivity benefits from the first phase of firewall change automation, such as;

    •Discover and decommission unused and forgotten rules with a streamlined, automated process
    •Understand the implications of server decommission and automate the process
    •Realize the benefits of automating changes to object groups

    Register now to save time and resources, reduce your workload, and quickly tighten your security posture with practical firewall automation.
  • Blackout: How Engineering Firm Exposed Critical Infrastructure Data
    Blackout: How Engineering Firm Exposed Critical Infrastructure Data Dan O'Sullivan, UpGuard Analyst Recorded: Aug 15 2017 31 mins
    Learn about a data exposure discovered from within the systems of Texas-based electrical engineering firm Power Quality Engineering (PQE), revealing the sensitive data of clients like Dell, the City of Austin, Oracle, and Texas Instruments, among others.

    Left accessible to the wider internet via a port used for rsync server synchronization but configured to allow public access, the breach allowed any interested browser to download sensitive electrical infrastructure data compiled in reports by PQE inspectors examining customer facilities.

    Dan O’Sullivan, the analyst who first broke the story, will go through the details of the discovery and the significant impact of this data exposure.

    For the original article: https://www.upguard.com/breaches/data-leak-pqe
  • Create Hybrid Cloud Stretched Clusters Using VMware, AWS, and SDS
    Create Hybrid Cloud Stretched Clusters Using VMware, AWS, and SDS Chris Kranz, Solutions Architect, Hedvig Recorded: Aug 15 2017 43 mins
    Enterprises are evolving their vSphere environments from standard DR configurations to high availability (HA) architectures. VMware vSphere Metro Storage Cluster is a key capability in this evolution. Parallel to this, companies are embracing hybrid cloud and AWS in particular. In many cases enterprises treat AWS as a passive DR site. But what if you could evolve AWS to be part of an HA stretch cluster? That’s where software-defined storage (SDS) comes in.

    SDS solutions provide the flexibility to run on commodity servers as well as cloud computing instances. Couple that with advanced multi-site replication, per-VM storage policies, deduplication, snapshotting, cloning, and VMware’s recent announcement with AWS, and SDS is now the ideal enabler for automated failover in a hybrid cloud stretched cluster.

    In this session we’ll:
    - Provide an architecture for software-defined storage running a stretched cluster between a private vSphere cloud and AWS.
    - Discuss how this provides seamless failover, HA, DR, and cloud bursting—all at scale.
    - Highlight how data efficiency techniques like deduplication, thin provisioning, auto-tiering, and caching optimize hybrid cloud economics.

    Bio:
    Chris is a VMware Certified Design Expert (VCDX) and senior solutions architect at Hedvig. Chris has in-depth experience in cloud, virtualization, storage, data center, and software-defined technologies gained from his work across numerous practices including web development, systems administration, and consulting. His advisory expertise helps customers better adopt and adapt to the technologies that best fit for their business requirements.
  • Are Your Third Party Vendors Creating Uninvited Cyber Risk?
    Are Your Third Party Vendors Creating Uninvited Cyber Risk? Greg Pollock, VP of Product at UpGuard Recorded: Aug 10 2017 36 mins
    Many of the largest and most well known breaches are cases of third party information exposure.

    One of the largest leaks of all time was discovered when an RNC vendor, Data Root Analytics, exposed 198 million voter records, including personal details, voter information, and predictively modeled attributes such as race and religion.

    Outsourced information work is crucial for organizations to scale and remain competitive, but it should be done with careful forethought to the risks the company faces should that information be compromised.

    In this webinar you will learn:

    - Why cybersecurity is dead
    - How to mitigate cyber risk in a cost effective way
    - How vendor risk becomes your risk
    - Steps to become cyber resilient
    - How to measure success on your path towards cyber resilience
  • CMDSP - Mobile Security for the Mobile IT Administrator
    CMDSP - Mobile Security for the Mobile IT Administrator Ken Lloyd, CMDSP's Board members and CTO for Mi3 Security. Recorded: Aug 10 2017 54 mins
    ITPG Secure Compliance's Cybercast series proudly presents : CMDSP - Mobile Security for the Mobile IT Administrator.

    Come join us for a discussion on the advent of the Mobile IT Administrator position, and how CMDSP is helping organizations improve their enterprise mobility management strategy.

    ITPG Secure Compliance has invited Mr. Ken Lloyd, CMDSP's Board members and CTO for Mi3 Security, a leader in Mobile Application Risk Intelligence and Mobile Threat Defense. With 18 years focused on creating powerful Mobile and Security solutions for Enterprises, SMB's and Consumers. Recognized as a Subject Matter Expert (SME) in Mobile Security, Security Awareness and IT Security.
  • Security Orchestration In Action: Integrate – Automate –Manage
    Security Orchestration In Action: Integrate – Automate –Manage Silvio Pappalardo & Alex Ruhl, FireEye Recorded: Aug 10 2017 53 mins
    Simplify & Accelerate Security Operations through integration and automation

    Join us to hear how Security Orchestration from FireEye can:

    UNIFY SECURITY TOOLS
    Unify your security assets into a homogeneous platform and remove the operational silos that have bogged down security personnel for years. Improve operational efficiency and streamline processes with automation.
    Save time and resources & Improve your overall ROI

    ENHANCE SECURITY TEAM CAPABILITY
    Give your team an edge on attackers with deployment, design, and pre-built playbooks from our team of experts.
    Leverage our real-world, frontline Mandiant investigation experience & get access to class leading content, best practice playbooks and a global services breadth to assist clients anywhere in the world they need support.

    INCREASE EFFICIENCY AND PERFORMANCE
    Eliminate errors through standardised process and automation while reducing time demands on already stretched SOC teams.
    Minimise error prone manual processes while maintaining response and process consistency &
    Automate repeatable tasks enabling you to re-allocate staff to higher value tasks such as proactive hunting.

    Towards the end of the session we will be delivering a LIVE demo of FireEye Security Orchestrator.
  • Human Factors in Cyber Security
    Human Factors in Cyber Security Dr. Calvin Nobles Recorded: Aug 10 2017 74 mins
    We discussed Human Factors in Cyber Security. The discourse surrounding human performance in cyber security remains a relevant topic; nevertheless, the scientific underpinning remains deficient. Human error is the primary contributing factor that leads to malicious activity in cyber security. Other domains such as aviation, healthcare, and nuclear power have capitalized on human factors to reduce accidents and to identify critical phases of operations; consequently, the cyber security sector trails behind the above-mentioned industries in leveraging human factors.

    The aim of this presentation is leveraging organizational culture as a platform to address human factors in cyber security. The continuous integration of technology accompanied by (a) advanced persistent threats, (b) ransomware attacks, (c) data breaches, and (d) cyber-attacks increases and threatens the complexity of cyber security operations.

    Included are examples of conceptual processes, models, and frameworks to influence cyber leaders and professionals to mandate the integration of human factors in cyber security.

    Keynote Speaker:
    Dr. Calvin Nobles, Ph.D. is a cyber security subject matter expert (SME), national security leader, researcher, practitioner, and educator with more than 20 years of experience. Culminating a career of military service at the national level in 2017, as a cyber security executive and cyber consultant. He is an adjunct faculty member at the University of Maryland University College and Indian Wesleyan University. Calvin is actively involved in the cyber community, volunteering with multiple professional associations and conducting cyber security research. Calvin is the author of the book, Exploring the Implications of Implementing Technologically Advanced Aircraft in General Aviation.
  • How to Build Better Cloud Applications Using PaaS
    How to Build Better Cloud Applications Using PaaS Thomas Decant, Product Marketing Manager, Cloud & Enterprise, Anirudh Singh Rautela, Azure Cloud AppDev Specialist Recorded: Aug 9 2017 30 mins
    With today's digital demands, its more important than ever to deliver apps at lightning speed. Azure app hosting allows you to create powerful cloud applications for web and mobile on any platform, for any device.

    Join Thomas Decant, Product Marketing Manager in the Cloud and Enterprise team at Microsoft, and Anirudh Singh Rautela, Cloud Application Development Specialist at Microsoft, in this two-part webinar. They will take us through the possibilities and benefits that Azure App Service provides your business and showcase how easy it can be to implement PaaS services.
  • The Unique Challenges of Disaster Recovery in a Hybrid IT World
    The Unique Challenges of Disaster Recovery in a Hybrid IT World Harry Smith, Zerto Technology Evangelist; Dale Levesque, TierPoint Manager of Product Development Recorded: Aug 9 2017 64 mins
    Business disruptions and downtime can cause serious damage to a company's bottom line. And today, with multiple potential sources of disruption — from equipment failure to natural disasters and cyber-attacks — IT leaders are seeking even faster and more resilient disaster recovery (DR) strategies. Identifying risks and developing a DR plan are essential, but just as important is selecting the right vendor for your Disaster Recovery needs, which can be challenging.

    In this live webinar, TierPoint Manager of Product Development, Dale Levesque and Zerto Technology Evangelist, Harry Smith will discuss the keys to effective DR planning and address the added challenges presented by increasingly complex hybrid IT environments.

    Join Dale and Harry as they share use cases and answer key questions about creating an effective DR plan and selecting the best provider for your needs, including:

    • What are the major causes of downtime?
    • How has DR evolved from backup computer centers to cloud computing and advanced data replication technologies?
    • What are the latest DRaaS trends?
    • What are the key considerations when selecting a DR solutions provider?
  • Web Application Testing
    Web Application Testing Ben Pick - Coveros Recorded: Aug 9 2017 124 mins
    We discussed Web Application Testing. Web applications provide a vulnerable window into internal enterprises. These applications often process and use poorly validated input. This presentation discusses methodologies to identify and exploit such vulnerabilities within the applications.

    The target audience for this talk ranges from those with limited prior knowledge of web application testing to those with a moderate understanding.

    Keynote Speaker(s):
    Mr. Ben Pick has 8 years of security and development experience including vulnerability assessments of web and mobile applications, analyzing source code for security risks, and configuring architecture to monitor systems for anomalous activities. For the past few years, Ben has worked to incorporate security into DevOps environments by merging security tools within the software development lifecycle. This includes automating static code analysis and vulnerability tools on development environments which act as supplemental resources for manual tests.
  • Orchestrating Effective IT Risk Management Across the Lines of Defense
    Orchestrating Effective IT Risk Management Across the Lines of Defense Kelley Vick, IT GRC Forum; Cameron Jackson, Riskonnect; Weston Nelson, Moss Adams Advisory Services Recorded: Aug 8 2017 65 mins
    Today’s IT risk environment is more threatened than ever thanks to the growth in sophisticated cyber attacks and security vulnerabilities. Now, complex, hard-to-detect attacks could bring down not just a single institution but also large parts of the internet and the financial markets. Organizations need an intelligent approach when it comes to assessing IT risk and managing compliance.

    Staying safe is no longer just about deflecting attackers. It’s about staying ahead of attackers who are already inside the organization, and banks are doing this through structured lines of defense that enhance security capabilities, involve IT risk managers in operations, and expand internal audits mandate so they can cover business disruption. On this webinar presentation we will address some ways how organizations can as a part of an Integrated Risk Management initiative orchestrate effective IT risk management across the lines of defense.
  • Ransomware - Beyond the Basics
    Ransomware - Beyond the Basics Jess Stanford, Product Manager Cybereason & Tom Powers, Director Program Management, Carbonite Recorded: Aug 8 2017 57 mins
    Join our Cybereason, Carbonite joint webinar to learn the current and future state of ransomware as well as tactics and technologies for advanced cyber threat detection and prevention.

    In this webinar you will learn:

    - Why ransomware is so pervasive and prevalent.
    - How you can futureproof your cyber threat prevention approach.

    About the presenters:

    Jessica Stanford, Director of Product Marketing at Cybereason, will be discussing the evolving methods cyber criminals are using along with advanced methods for detection.

    Tom Powers, Director of Product Management at Carbonite, will be looking at a real-world ransomware recovery scenario, examining lessons learned, and exposing vulnerabilities in the strategies and backup/recovery technologies used.
  • How to Choose Your Next Database Audit Solution
    How to Choose Your Next Database Audit Solution Terry Ray, Chief Technology Officer at Imperva Aug 22 2017 4:00 pm UTC 60 mins
    Data is the lifeblood of today's business. As the volume of generated data continues to grow, so does the number of data breaches. It's more critical than ever for organizations to adopt database audit and protection solutions. But not all solutions are created equal.

    What are the key capabilities that IT and security teams should evaluate? Join Terry Ray as he discusses key considerations for selecting a database audit and protection solution.

    About the Presenter:

    Terry Ray is the Chief Technology Officer for Imperva, Inc., the leading provider of data security solutions. Terry works directly with Imperva’s largest customers to educate on industry best practices, challenges and regulations. He also, operates as an executive sponsor to strategic customers who benefit from a bridge between both company’s executive teams. During his 12 years at Imperva, he has deployed hundreds of data security solutions to meet the requirements of customers and regulators from every industry. Terry is a frequent speaker for RSA, ISSA, OWASP, ISACA, Gartner, IANS and other professional security and audit organizations in the Americas and abroad.
  • Ransomware attacks continue... do you have a backup plan?
    Ransomware attacks continue... do you have a backup plan? Ronn Martin, Solution Architect - Veeam and Terry Grulke, Principal Technical Advisor - Quantum Aug 22 2017 5:30 pm UTC 45 mins
    Ransomware is just one of the many threats that can impact your business data. With the use of cloud storage and virtualization expanding, and with a +500% in attacks and +600% in new variants, NOW is the time to ensure you have a proactive backup plan. Join Veeam and Quantum to learn how to set up a solid BCDR (business continuity and disaster recovery) and backup strategy to protect your virtual data against any ransomware and cyber security threat, including some lessons learned by our customers.
  • Bring Order to Chaotic Storage Management with Software-defined Storage
    Bring Order to Chaotic Storage Management with Software-defined Storage Sushant Rao Senior Director WW Product Marketing DataCore Software & Bill Hansen Sr. Product Manager & Product Planner Lenovo Aug 22 2017 6:00 pm UTC 60 mins
    Surveys show that 64% of companies have storage arrays from 3 or more vendors. What does it mean to manage storage infrastructure with so many different products?

    In a word, CHAOS!

    That’s why a majority of people interested in software-defined storage (SDS) want to simplify management of their storage infrastructure.

    Join us for this webinar where we will show how the Lenovo DX8200D Powered by DataCore can bring order to your environment. The DX8200D is the fast path to SDS and it:
    • Abstracts away the underlying complexity of storage infrastructure
    • Consolidates IT infrastructure and simplifies management through automation and self-adaptive technologies.
  • NVMe, NVMe over Fabrics and Beyond - Everything You Need to Know
    NVMe, NVMe over Fabrics and Beyond - Everything You Need to Know Storage Switzerland, Kaminario Aug 23 2017 5:00 pm UTC 60 mins
    NVMe is an industry standard protocol designed specifically for memory-based storage like flash drives. It unleashes flash arrays from the chains of SCSI that hold it back. Register for our live webinar and learn what NVMe and NVMe over Fabrics are, what the advantage of NVMe is over traditional SCSI protocols and how to go beyond the NVMe basics to fully tap into the potential of memory-based storage.
  • Using Reference Architectures to Fully Integrate Your Next-Gen Apps
    Using Reference Architectures to Fully Integrate Your Next-Gen Apps Pradeep Menon, Data Solution Architect & Karthik Rajasekharan, Azure Product Marketing Director Aug 23 2017 11:00 pm UTC 39 mins
    Intelligent application technology allows you to build apps with powerful algorithms, across platforms, with just a few lines of code. The answer lies in your application's architecture.

    Join Pradeep Menon, Microsoft Data Solution Architect, and Karthik Rajasekharan, Microsoft Azure Product Marketing Director to learn:

    - The different reference architectures and how to integrate these services into your applications immediately.
    - A hands-on approach to implementing Cognitive Services on Azure
    - About the next generation of application development and deployment
  • Strategies for CISSP® Exam
    Strategies for CISSP® Exam Sam Meisenberg, Head of CISSP Training at CyberVista Aug 24 2017 5:00 pm UTC 60 mins
    Are you considering taking the CISSP exam? The CISSP is considered the industry-leading certification in cybersecurity, but the exam is certainly no cake walk. Strategies for CISSP Exam webinar dissects the structure of the CISSP exam. Hosted by (ISC)2 Approved training provider CyberVista, we will explain the 8 Domains that comprise the test while also providing valuable strategies for test day.
  • Endpoint Backup is not Enough - You Need an End-user Data Strategy
    Endpoint Backup is not Enough - You Need an End-user Data Strategy Storage Switzerland, Druva Aug 24 2017 5:00 pm UTC 60 mins
    More data outside of the data center is staying on endpoints and in the cloud than ever before. That means the risks to that data are also at an all time high. Plus regulations encompassing end-user data are also increasing, challenging IT to manage data when they have less control than ever. IT needs more than an endpoint protection plan, it needs an end-user data strategy.

    In this webinar, learn how to evolve from an endpoint data protection plan to a comprehensive end-user data strategy.
  • Keeping Subversion In Sync Across Global Data Centers: Case Study with MaxLinear
    Keeping Subversion In Sync Across Global Data Centers: Case Study with MaxLinear Russ Hil, Account & Renewals Manager Americas at WANdisco, Owen Ofiesh, Software Configuration Manager at MaxLinear Aug 24 2017 6:00 pm UTC 60 mins
    Join us to learn how MaxLinear relies on WANdisco to improve productivity with Subversion Multisite delivering results such as:

    - A 24/7 continuous integration environment with zero Subversion downtime
    - Improved administrative efficiencies with Access Control
    - Elimination of the effects of network failures and the dependency on legacy backup procedures
    - Overcoming the challenges with Subversion mirrors

    About the Presenters:

    Russ Hill, Account & Renewals Manager Americas at WANdisco. Russ Hill works with our existing SCM install base as an account manager and renewals specialist. He works closely with the WANdisco Professional Services team on all SCM service opportunities in North America and is currently responsible for all new SCM opportunities within the Americas.

    Owen Ofiesh Software Configuration Manager at MaxLinear. Owen Ofiesh is the Software Configuration Manager for MaxLinear, a global chip design firm. With over 15 years experience in configuration management, he has a strong background in many of the most common SCM tools and platforms. Owen has worked with WANdisco Subversion MultiSite for over six years and has a great understanding of how it compares and contrasts with other SCM tools.
  • The Next Frontier for Cloud Security
    The Next Frontier for Cloud Security Mr Rehan Jalil, Senior Vice President, Engineering, Symantec Aug 29 2017 5:00 am UTC 60 mins
    Welcome to the Cloud Generation – where critical data, applications and infrastructure are shifting to the cloud for increased operational efficiency.

    Employees today are accessing everything from everywhere, sensitive data is constantly on the move, and critical workloads are running on a cloud server, somewhere in the world. How do you manage and contain the huge increase in vulnerabilities caused by moving beyond traditional IT controls?

    In our upcoming ‘The Next Frontier for Cloud Security’ webinar, we discuss how to:

    • Govern access to data, apps, and systems that may reside in the cloud
    • Secure information no matter where it sits or goes
    • Protect against advanced threats in this new environment
    • Minimise risk and ensure compliance as workloads move to the cloud

    Join our webinar and discover how Symantec’s Integrated Cyber Defense Platform protects your users, information, and workloads in the Cloud Generation.
  • Six foresights for the SDN – ensuring security, connectivity, and compliance
    Six foresights for the SDN – ensuring security, connectivity, and compliance Amnon Even Zohar Director of Cloud Product Management, Tufin & Dan Rheault, Sr. Product Marketing Manager, Tufin Aug 29 2017 3:00 pm UTC 45 mins
    Despite the rampant adoption of cloud computing, some companies are hesitant to move entirely to the public cloud. Instead, they rely on the higher degree of control of the SDN in the private cloud, or utilize a hybrid approach. While the private cloud offers more control and manageability, ensuring that applications are deployed successfully, securely, and within the parameters of compliance can pose challenges without proper visibility and the foresight for auditability.

    Organizations that are using a SDN need to employ best practices at the start to ensure that they are successful in the future.

    Please join members of Tufin cloud team for an informal product-agnostic discussion on how network security policy management (NSPM) solutions can ingrain best practices in deploying and managing applications in the SDN, ensure connectivity, and enforce security. Topics for discussion include how to:
    •Build a zero-trust policy in the private cloud
    •Ensure compliance across all access changes
    •Design and deploy network segmentation efficiently
    •Deploy business applications with access continuity
    •Ingrain preparedness for audits
  • A Tactical Guide to Reducing Your Data Breach Risk
    A Tactical Guide to Reducing Your Data Breach Risk Dr. Branden Williams, Union Bank, Farshad Ghazi, Yo Delmar, MetricStream, Rapid7, and Billy Sokol, MarkLogic Aug 29 2017 5:00 pm UTC 75 mins
    Over 90% of the world’s data has been generated in the last few years. Accompanying this rapid growth in data comes exponential risks, as witnessed by the spike in cyber attacks of which no organization seems immune. The financial rewards gained by the perpetuators of cyber attacks is blatant, and this is driving continued attacks on companies containing massive amounts of consumer data. For these companies securing data is only half the battle. The risks can be greater when data is transmitted externally, hence it is critical that organizations know where sensitive data is going, how it is being transmitted, and how it is being handled and stored.

    On this webinar our panel of experts will discuss some of the best practices organizations can consider to reduce the risk of suffering from a data breach, and to proactively prepare for any subsequent breach that could happen.
  • From Buildings to Bots: Using Cloud & Machine Learning to Transform the Future
    From Buildings to Bots: Using Cloud & Machine Learning to Transform the Future Powerup Cloud, Microsoft & UEM Aug 30 2017 11:00 pm UTC 43 mins
    Our buildings, our cars, our devices now talk. They tell us what ails them, when they need servicing. From bots to virtual agents, through the power of machine learning, they have their own nervous system.

    Join this webcast with UEM Edgenta and Powerup Cloud to learn how to gain new insights from data and these devices. Leverage the power of machine learning to digitally transform the future of these technologies.
  • What does the future hold for business continuity professionals?  (BCI/PwC BCM F
    What does the future hold for business continuity professionals? (BCI/PwC BCM F Patrick Alcantara DBCI Sep 5 2017 1:00 pm UTC 45 mins
    With an increasing volume of conversation taking place around the concept of ‘organizational resilience’, business continuity management professionals are taking advantage of this to expand their own remit and improve their career opportunities. What does the future hold of business continuity management professionals? How does this impact new entrants to the industry? This webinar will discuss the outcome of a survey carried out by the BCI, in collaboration with PwC, as well as a breakout session held at the 2016 BCI World Conference.
  • Developing Risk Appetite Statements
    Developing Risk Appetite Statements Ian Beale Sep 6 2017 10:00 am UTC 75 mins
    In today's increasingly global work environment, more employees than ever before are making material decisions on behalf of the organization, and these decisions don't always adequately account for risks to the enterprise.

    This webinar will provide an overview of how to define your organisation’s level of ‘risk appetite’, helping you to determine the most relevant approach for drafting your organization’s risk appetite statements, assess stakeholders’ preferred risk-taking posture and write impactful risk appetite statements.
  • In-Vehicle Network Solutions Overview
    In-Vehicle Network Solutions Overview Todd Kelly, VP Solutions Engineering, Cradlepoint Sep 6 2017 4:00 pm UTC 60 mins
    As the digital transformation in IT continues to create the need for an Elastic EdgeSM, traditional tethers to the central office have all but vanished. Physical boundaries continue to decrease in importance, and organizations of all types require constant and dependable in-vehicle connectivity to keep up with changing business imperatives.

    Dependable mobile connectivity keeps vehicles on the road longer, helps enterprises better manage their fleets, and allows businesses and organizations to better serve their customers. Forward thinking IT and fleet managers in nearly every industry are implementing in-vehicle networks at a fraction of the cost and with less complexity. By taking advantage of cloud-managed, software-defined solutions, IT teams are evolving enterprise networks to reach improved productivity, reduce costs, and create operational efficiencies.

    Join Cradlepoint for a live webinar on Wednesday, September 6, 2017, at 9 am PT / 12 pm ET to learn how networks on the move are staying always connected and protected.

    Attendees will learn how:

    •Reliable 4G LTE network solutions keep fleets connected

    •To cut costs & create operational efficiencies

    •Cloud management and software-defined technologies enables always-on networks

    •To choose the best solution for networks on the move
  • Building Organisational Resilience Regardless of the Size of Your Business
    Building Organisational Resilience Regardless of the Size of Your Business Jerry Marshall FBCI Sep 7 2017 10:00 am UTC 45 mins
    In 2012 RBS suffered a major disruptive IT event impacting customers over a 17 day period. In response to this event RBS reassessed its Resilience Strategy. This session will take you through the banks resilience strategy and how we use it to manage our resilience risk exposure, what we rely upon to support our business and our customers and how we identify and manage the threats we face.
  • Better Protect Your Web Apps by Knowing How They Will Be Attacked
    Better Protect Your Web Apps by Knowing How They Will Be Attacked Paul Fletcher, Alert Logic Cybersecurity Evangelist; Brian Anderson, TierPoint Director, Security Product Management Sep 7 2017 6:00 pm UTC 60 mins
    Join our “Web App Security” presentation, which provides the audience with a global perspective of the current state of web application vulnerabilities. Attendees will:
    • gain a better understanding of how reconnaissance is used by attackers to discover and pinpoint systems to compromise,
    • learn about attack methodologies and how vulnerable web apps can be leveraged for attackers to gain privileged access, and
    • hear remediation strategies to help protect their web apps from being attacked.

    Speaker Information:
    Paul Fletcher has over 20 years of experience in information technology and security. Prior to joining Alert Logic, Fletcher advised executive level leadership in the energy, retail, and financial sectors regarding emerging security threats and mitigation strategies. Additionally, he has worked with Fortune 50 organizations, the Department of Defense, and critical infrastructure organizations to implement risk management plans and security solution designs. His other specialties include network security, customer data integrity, application security, forensics investigation, threat intelligence, and incident response. Fletcher holds a Master of Arts and Bachelor of Science degree and is a Certified Information Systems Security Professional (CISSP).
  • DRaaS - It’s Not Just For Disasters Anymore
    DRaaS - It’s Not Just For Disasters Anymore Storage Switzerland, Infrascale Sep 12 2017 5:00 pm UTC 60 mins
    Disaster Recovery as a Service (DRaaS) solutions have vaulted to the top of the considerations list for organizations looking to improve their ability to recover from major disasters like hurricanes and floods. But DRaaS solutions are not just for recovery anymore. These solutions can help organizations protect from ransomware, modernize infrastructure, and recover from minor disasters as well. Of course the solution must also provide peace of mind that when disaster strikes, the plan will not only work -- it will also be easy to initiate.
  • Be Prepared for GDPR! Overview & Best Practices for Compliance
    Be Prepared for GDPR! Overview & Best Practices for Compliance Stephane Estevez, Product Marketing Manager- Quantum Sep 12 2017 5:00 pm UTC 45 mins
    General Data Protection Regulation (GDPR) is new legislation intended to strengthen and unify data protection for all individuals within the EU. The regulation affects companies worldwide as it impacts any companies who possess data from customers in the EU.

    The new legislation comes down to management of personal data: consent, retention, security and protection. Learn the basics about GDPR, how it affects your company and best practices for data storage to successfully comply with GDPR as it becomes enforceable in 2018.
  • Как защититься от атак вирусов-вымогателей
    Как защититься от атак вирусов-вымогателей Евгений Пухов, Технический консультант Commvault Sep 14 2017 7:00 am UTC 120 mins
    Вебинар для заказчиков посвященный решению Commvault по контролю и защите данных от вирусов-вымогателей. В рамках вебинара вы узнаете:
    • Как справиться с растущими рисками с сфере ИТ
    • Как предотвратить кражу информации
    • Как уберечься от вредоносного ПО и атак вирусов-вымогателей
    • Как защитить данные независимо от того, где они находятся
  • How much is my work worth? (BCI Salary Benchmarking Report 2017)
    How much is my work worth? (BCI Salary Benchmarking Report 2017) Patrick Alcantara DBCI Sep 14 2017 1:00 pm UTC 45 mins
    ‘What are salaries in business continuity and resilience like?’

    This is doubtless one of the most frequently asked questions by new entrants to the business continuity and resilience fields. Patrick Alcantara DBCI, author of the 2017 CI Salary Benchmarking Report, will answer this question and more during this webinar. This webinar will feature the results of a survey of more than 1,100 professionals worldwide.
  • Beyond GDPR: Best Practices for Data Protection
    Beyond GDPR: Best Practices for Data Protection Aaron Davis, Senior Product Marketing Manager, PKI and Juan Asenjo Senior Partner Marketing Manager, Thales e-Security Sep 14 2017 3:00 pm UTC 60 mins
    In this webinar, we will examine the key elements necessary to protect sensitive data. The focus will be on comprehensive security aspects that enterprises need to consider going forward. The webinar will expand on how the General Data Protection Regulation (GDPR) is just the beginning; a set of best practices that every organization should adhere to, not just in the EU but globally, to use security as an enabler for a safe digital future.
    Topics discussed will include the expanded ecosystem of users, devices, applications, and things that must coexist in a trusted environment, as enterprises transform operations to depend on an all-digital infrastructure.

    Join the webinar to learn:

    • Why GDPR is only the beginning - cutting through the noise
    • How digital business is driving new approaches to data security
    • What are the best practices for improving data hygiene
  • BCI Horizon Scan Report 2017
    BCI Horizon Scan Report 2017 Gianluca Riglietti CBCI Sep 18 2017 10:00 am UTC 45 mins
    The BCI Horizon Scan has become a vital resource to those working in the fields of business continuity, risk or resilience, and as such it is getting a greater number of respondents from a wider range of countries and industries. The 2017 Horizon Scan Report showed that once again it was cyber attack that was the number one threat, with data breaches remaining in second place and network outages third. Adverse weather moved up three places to enter the top five along with security incident.
  • Cyber Security Risk Management & Business Continuity
    Cyber Security Risk Management & Business Continuity Jeff Primus MBCI Sep 18 2017 1:00 pm UTC 45 mins
    The classical life cycle for a comprehensive Business Continuity implementation encompasses during its early stages the Business Impact Analysis (BIA) and the Risk Analysis (RA). There are various methods to integrate the RA in the BC context but many of these approaches deals with very high level orientation, hence leaving an important gap for an adequate Cyber Security oriented RA. During this webinar, we will discover how to apply some cyber security RA techniques that can be mapped to a higher level RA in the context of BC life cycle.
  • Why is cyber-attack not a security issue?
    Why is cyber-attack not a security issue? Saul Midler FBCI Sep 19 2017 10:00 am UTC 45 mins
    We live in a world of uncertainty. The BCI Horizon Scan Report 2017 provides clear confirmation that organisations are being disrupted and there are a range of threats that are of great concern.
    Cyber-attack is the top concern and while considerable effort goes into reducing cyber threat, an actual attack is not a security issue.
    This presentation will help you understand the difference between Business Continuity and Information Security and their role before and after an attack.