Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • The Last-Minute Guide to GDPR
    The Last-Minute Guide to GDPR Argin Wong, Data Privacy and Compliance, Box Recorded: May 25 2018 40 mins
    The dawn of GDPR will have a global impact. If you work with European employees, customers or partners, the regulation affects you and failure to comply could result in fines up to 20 million euros, or up to 4% of the company’s total global revenue for the preceding fiscal year, whichever is higher.

    It's not too late to get ready. Sign up for this webinar to learn 3 key steps you need to start now:
    •How to show that you are processing data in accordance to the GDPR
    •How to ensure (and document) the security, confidentiality and availability of data
    •How to support the Right to be Forgotten 
    You'll also learn how Box can help. Our philosophy is to evaluate and meet the highest bar for data privacy, as well as enable organizations to meet data privacy obligations across the globe, so you can rely on Box to get GDPR-ready.
  • GDPR: Deadline Day Special
    GDPR: Deadline Day Special Mark Rasch, Martyn Hope, Ray Ford, David Morris Recorded: May 25 2018 62 mins
    It's GDPR due date. How will enforcement be rolled out when a breach occurs and what are the likely consequences for the breach?

    Join this panel of experts:

    Martyn Hope: Co-Founder of the GDPR Institut
    Mark Rasch: Chief Legal Compliance Partner at DRM Institute, former Chief Security Evangelist at Verizon, former Lead Prosecutor at U.S. DOJ.
    Ray Ford: Founding Associate of GDPR Institut, DPO for Acer(UK) who currently hold some 15million childrens records on behalf of the Scottish Government.

    This session will cover:
    - How GDPR will be enforced.
    - Who is likely to be among the first brought to court?
    -What Should I do Now?
  • GDPR: The Importance of Looking Beyond 25 May, 2018
    GDPR: The Importance of Looking Beyond 25 May, 2018 Robert Arandjelovic, Giampiero Nanni Recorded: May 25 2018 61 mins
    Today is the day that GDPR changes things substantially in protecting customer data, affecting businesses that handle, store or pass data of European Citizens both in and outside of Europe. It’s a huge undertaking with comprehensive and extensive compliance requirements and as it takes effect inevitably there will be stops and starts, legal and logistical challenges and hefty fines for non-compliance.
  • From Insight to Action: Best Practices for the GDPR-Ready Organization
    From Insight to Action: Best Practices for the GDPR-Ready Organization Zachary Bosin, Director, Digital Compliance, Veritas Recorded: May 24 2018 61 mins
    The world’s most expansive data privacy regulation -- the General Data Protection Regulation (GDPR) -- takes effect on May 25, 2018, and organizations of all sizes must be prepared to respond.

    This session will provide powerful insights from recent Veritas research regarding consumer sentiment toward data privacy and the implications for accelerating your compliance journey.  Additionally, we will cover a brief overview of the regulation’s most important tenants and key technology areas that can reinforce your compliance posture, including a helpful new framework for evaluating GDPR Readiness. 
  • Nemertes Conversations: Is Your Data Ready for GDPR?
    Nemertes Conversations: Is Your Data Ready for GDPR? Co-presented by: Julie McCoy, Solutions Engineer, AvePoint; and Irwin Lazar, VP & Service Director, Nemertes Research Recorded: May 24 2018 53 mins
    GDPR requires organizations to identify, classify, and protect personal information, but how do you prepare and protect against a possible breach if you don't know what data you have, where it lives, or how it's classified?

    In this informative webinar we'll discuss:
    • GDPR data classification requirements
    • How to incorporate GDPR data analysis into your breech prevention and reaction plan
    • How to classify and protect information across multiple data stores
    • Solutions for automating classification and information protection

    We look forward to sharing this information with you!
  • GDPR and Email: How To Tackle The Risk In Your Inbox
    GDPR and Email: How To Tackle The Risk In Your Inbox Marc French, Senior Vice President & Chief Trust Officer, Mimecast Recorded: May 24 2018 52 mins
    Less than 50% of organizations impacted by GDPR are expected to fully comply by the May 2018 enforcement date. Will you be one of them? Whether you run email on-premises, in the cloud or a hybrid of the two, unstructured and distributed email data, which is personal by its very nature, can be difficult to manage. It’s also the number one attack vector with over 90% of cyber-attacks starting in email.

    But, with the right approach, it can be a relatively simple area of GDPR risk to mitigate. Join this presentation to learn:

    * Critical areas of GDPR risk in email
    * How to defend email systems and protect data in the face of spiraling attacks
    * Why having the right archive and backup strategy is important
    * The importance of a business continuity plan for email 

    About the Speaker:
    Marc French is the Senior Vice President and Chief Trust Officer at Mimecast. He has more than 25 years of technology experience in engineering, operations, product management, and security. Prior to his current role, Marc has held a variety of CISO/senior security roles at EMC/RSA, Iron Mountain, and Dun & Bradstreet.
  • Making Risk Meaningful
    Making Risk Meaningful Adam Billings, Lockpath Recorded: May 24 2018 44 mins
    How do you make sense of all that risk data your organization collects? Imagine not only analyzing risk data more efficiently but also bringing meaning to risk. It's possible. It takes leadership, alignment, standardization, and a clear risk methodology to discover connections in data. In this webinar, we'll share how to go about making risk meaningful. You'll learn:

    · Common methodologies for interpreting risk

    · Status of risk management in your organization

    · Frameworks and strategies for seeing risk in a new light

    · Keys to success in advancing your risk program

    There's no shortage of data collected. What's in short supply is, what does it all mean? Explore what works and what's possible in this educational webinar.
  • Managing Massive Data Growth
    Managing Massive Data Growth Tyna Callahan - Scality, Yannick Guillerm - Scality, and Charles Tierney - HPE Storage Recorded: May 24 2018 43 mins
    Managing Massive Data Growth. It’s true – it is all about you–your data that is. Several different trends have converged to accelerate the creation of valuable data, presenting new challenges to enterprise storage management teams. Many customers along with some analysts suggest object-based storage as a key element in managing the growth of data. What is it that they see in object storage? Join us as we discuss: Recent Trends leading data growth, the benefits of software-defined object storage features to consider, and real-world examples where object solutions are managing data growth issues.
  • Veeam & Quantum help you prepare for GDPR - Backup Best Practices
    Veeam & Quantum help you prepare for GDPR - Backup Best Practices Stephane Estevez, Quantum; Kevin Ridings, Veeam Recorded: May 24 2018 45 mins
    GDPR becomes enforceable on May 25 2018, and affects all companies with customers in the EU. Learn about the new legislation from Stephane Estevez, product manager at Quantum & Kevin Ridings, alliances systems engineer at Veeam. They will explain considerations for GDPR and data backup including retention, security and protection. GDPR will become enforceable in 2018 - Quantum and Veeam's solution for data backups will help ensure you are ready for successful compliance.
  • M-Trends 2018 – Rétroviseurs sur les grands faits 2017 et leurs impacts futurs
    M-Trends 2018 – Rétroviseurs sur les grands faits 2017 et leurs impacts futurs David Grout, Directeur Technique, South EMEA Recorded: May 24 2018 60 mins
    Chaque année, les experts FireEye à travers les équipes Mandiant répondent à une grande variété d'incidents informatiques à travers le monde, ces attaques sont dans la plupart des cas orchestrées par des groupes d’attaquants avancés. Ce retour d’expérience, fruit d’heures d’analyses et d’investigations, est résumé dans le rapport annuel M-Trends qui d’années en années nous donne une visibilité sur le changement et l’évolution de la menace et des techniques utilisées lors des attaques mais aussi sur les progrès et les capacités que les entreprises mettent en place pour y répondre.

    Au cours de ce webinaire, notre Directeur Technique, David Grout, discutera de plusieurs sujets incluant :

    • Les tendances dans le paysage actuel des menaces et ces évolutions
    • Les principaux groupes APT ayant fait parler d’eux en 2017
    • Les risques de récurrence d’attaques
    • Mais aussi de sujets plus ouverts comme la recherche de talents et la complexité de recruter, les architectures ciblées et leurs faiblesses ou encore la préparation possible à travers des exercices de type Red Teaming.
  • GDPR: Cutting Through the Noise
    GDPR: Cutting Through the Noise Alex Jordan, Senior Analyst, ISF LTD Recorded: May 24 2018 47 mins
    Data protection has always been important, but with the GDPR deadline looming and data sharing scandals shaking consumer confidence, securing personal data has never been more vital. The GDPR is leading businesses across the world to evaluate, and in many cases modify their data processing activities in line with upcoming law.

    So what if you’ve left it too late? What are the key steps you can take to work towards GDPR compliance, even after deadline day?

    Join us in this webinar with Alex Jordan, Senior Analyst at the Information Security Forum as he shares:

    -The ISF’s phased approach to GDPR implementation
    -Ways to determine the criticality of data and how to protect it appropriately
    -The urgent actions that a business can take to get GDPR compliance started
    -Common myths surrounding the GDPR, and guidance on cutting through the noise.
  • Commvault pour Office 365 – protégez vos emails, documents et fichiers
    Commvault pour Office 365 – protégez vos emails, documents et fichiers Dominique Renard Recorded: May 24 2018 26 mins
    Microsoft Office 365 est devenu un outil indispensable à votre entreprise ou organisation pour être plus efficace et productif. Cependant, savez-vous que la sécurisation des données conservées dans Office 365 est de votre responsabilité ?
    Commvault vous aide à utiliser efficacement en toute sécurité votre solution Office 365 en proposant la protection, restauration, indexation, recherche utilisateur et légale pour les messages d’Exchange Online, les documents stockés dans Sharepoint Online et les fichiers conservés dans OneDrive.
    Rejoignez-nous lors de ce webinaire pour découvrir les avantages de Commvault Data Platform en environnement Office 365.
  • GDPR: Responding to a Breach
    GDPR: Responding to a Breach Ray Ford, Ian West, Mark Rasch, David Morris Recorded: May 23 2018 83 mins
    When a Breach occurs, what are the best practices to comply with the GDPR's notification requirements. This session will cover:
    Breach Notification rules
    Who, what and when to notify?
  • Overcoming The 4 Data Protection Challenges of Hybrid IT
    Overcoming The 4 Data Protection Challenges of Hybrid IT Storage Switzerland, Micro Focus Recorded: May 23 2018 62 mins
    Data protection is critical to data-driven organizations that are fully dependent on data for operations. The hybrid nature of the environment though makes protecting that much more challenging. Join us as we discuss exactly what Hybrid IT is, what it looks like and why data driven organizations are embracing it. Then we will discuss the data protection challenges that IT must overcome as they create a hybrid infrastructure.
  • Accudata + Forcepoint Security Series | Risk-Adaptive Protection
    Accudata + Forcepoint Security Series | Risk-Adaptive Protection Bharath Vasudevan, Senior Director Recorded: May 23 2018 30 mins
    What comes to mind when you hear “decision making based on calculated behavioral analytics”? It’s a pretty exciting concept–one that’s new to cyber security and one that Forcepoint does very well. Join our webinar to learn how risk-adaptive protection is helping organizations:

    - Continually improve security effectiveness through machine learning and AI
    - Better understand risky behavior
    - Automate policies
    - Dramatically reduce the quantity of alerts
    - Streamline and accelerate investigation of those alerts

    Tune in May 23!
  • Cisco ASA to Firepower Migration: A Simplified Solution
    Cisco ASA to Firepower Migration: A Simplified Solution Joe Schreiber, Technical Director, Business Development, Tufin and Dan Rheault Sr. Product Marketing Manager, Tufin Recorded: May 23 2018 24 mins
    Are you a Cisco ASA customer eager to migrate to Firepower next generation policy?
    You are not alone!
    Join this webinar on May 23 at 11am EDT/4pm BST to learn about a migration solution that leverages policy optimization and automation for the most efficient adoption of Cisco Firepower. The solution is based on Tufin proprietary technology and on a longstanding relationship with Cisco. Tufin policy search and analysis capabilities simplify policy browsing and selection, while an API-to-API integration streamlines the selected policy migration from ASA to Firepower.

    Don’t miss this session presented by Dan Rheault, Product Marketing and Joe Schreiber, Technical Business Development, as they uncover the added value of Tufin automated migration solution:
    •Optimize rule sets prior to migration
    •Align rule sets to Firepower Access Control Groups
    •Ensure the most efficient migration process with automation
  • Cryptocurrencies: Trends and Threats
    Cryptocurrencies: Trends and Threats David Grout, Technical Director for Southern Europe, FireEye Recorded: May 23 2018 49 mins
    Cyber criminals have always been attracted to cryptocurrencies, which provide a certain level of anonymity and can be easily monetised. In recent years, criminals have gone beyond using cryptocurrencies as a payment method for illicit tools and services. Seeing their value and growing popularity, many actors are targeting cryptocurrency operations and exchanges with attacks such as malicious cryptocurrency mining, collection of cryptocurrency wallet credentials and extortion.

    Join your host David Grout, Technical Director for Southern Europe, for a 45-minute webinar to discuss the latest cryptocurrency threats and trends.
  • 12 Practical Steps toward GDPR Compliance
    12 Practical Steps toward GDPR Compliance James R. Slaby, Senior Manager, Product Marketing Recorded: May 22 2018 42 mins
    With the effective date of GDPR only weeks away, many businesses are correctly concerned about their readiness to comply with its stricter standards for protecting the personal data of EU residents. This 30-minute webinar offers practical steps that your business or public-sector organization can take today to improve your GDPR compliance posture, with tips on how to:

    •Understand GDPR terminology and roles
    •Assess your inventory of personal data, its locations and movements
    •Honor your new obligations to users on handling their personal data
    •Deal with heightened regulatory scrutiny on data breaches
    •Reinforce your data storage, backup and security policies and infrastructure to support your GDPR compliance efforts

    The complexity and occasional ambiguity of GDPR regulations can freeze some IT organizations into inaction. But neither your management nor your customers will wait forever for evidence of your progress toward GDPR compliance. Learn how to get out of the starting gate with these pragmatic, actionable tactics.

    About the speaker:

    James R. Slaby works in product marketing at Acronis, where his focus includes security-oriented issues like ransomware and GDPR. Before Acronis, Slaby was an industry analyst covering IT security, cloud computing, and networking at Forrester Research, HfS Research, Yankee Group, and The Info Pro. With over 300 published IT research reports, he has been quoted in The Economist, Wall Street Journal, New York Times, and countless tech publications. Slaby has also held campaign, solutions, vertical and product marketing roles at a variety of tech vendors including Sonus, Acme Packet, Bay Networks and Motorola.
  • GDPR: Protecting Your Data
    GDPR: Protecting Your Data Ulf Mattsson, Martyn Hope, Mark Rasch, David Morris Recorded: May 22 2018 56 mins
    Find out why data protection and encryption is an essential component of preparing for your GDPR readiness process.

    Specifically, we will cover:

    What is considered "Personal Data" and why it needs to be "protected"

    The Legal Aspects of Data Protection under GDPR.

    The technical ways to protect/pseudonymization

    In this Session you will learn from the leading experts:
    - Ulf Mattsson: The father of database Encryption.
    - Martyn Hope: The Co-Founder of the GDPR Institut.
    - Mark Rasch: Former Chief Cybersecurity Evangelist at Verizon and led the DOJ's Cyber Crime Unit.
  • XtremIO X2: An Architectural Deep Dive
    XtremIO X2: An Architectural Deep Dive Rami Katz Recorded: May 22 2018 47 mins
    XtremIO’s metadata-centric architecture is the base for delivering always-on inline data services and consistent performance. XtremIO X2 builds on that architecture delivering more performance, capacity, data services and simplicity. This session will provide deeper dives into many XtremIO X2-specific architectural innovations like Write Boost, multi-dimensional scaling, flexibility of using larger drives, enhanced management simplicity, serviceability and replication.
  • HPE-Veeam advanced integration: Design for the Enterprise!
    HPE-Veeam advanced integration: Design for the Enterprise! Federico Venier - Technical Marketing Engineer Recorded: May 22 2018 72 mins
    Learn how to take advantage of the new HPE + Veeam enterprise-class integration features. We will make a complete technical overview with a special focus on hardware snapshot orchestration with 3PAR and Nimble, ransomware protection, and cost reduction with StoreOnce deduplication.
  • DFLabs IncMan SOAR Platform Overview
    DFLabs IncMan SOAR Platform Overview Mike Fowler, Vice President of Professional Services at DFLabs and John Moran, Senior Product Manager at DFLabs Recorded: May 22 2018 49 mins
    Learn how DFLabs IncMan Security Orchestration, Automation and Response (SOAR) platform can help to automate, orchestrate and measure your security operations and incident response processes and tasks.

    Join this webinar and take a look at the latest version of IncMan SOAR, including a range of new features and integrations, and discover how we can help you to leverage your existing technologies and streamline your workflows.

    Keep your cyber incidents under control by orchestrating the full incident response and investigation lifecycle, automate actions, fuse security intelligence and share knowledge with machine learning:

    - Minimize Incident Resolution Time by 90%
    - Maximize Analyst Efficiency by 80%
    - Increase the Amount of Handled Incidents by 300%
  • The Death of the B2B Salesperson
    The Death of the B2B Salesperson Mike Wilkinson – MD of Advance Recorded: May 22 2018 34 mins
    In this webinar, Mike reflects on Forrester’s forecast that 1 million US B2B salespeople will lose their jobs by the year 2020 and how disruptive technology is changing the game. Do you have the right sales model and skills to adapt? He will discuss what customers are demanding, plus the skills and behaviours required for B2B sales professionals to thrive.
  • RAID vs Object storage: what is best for your data integrity?
    RAID vs Object storage: what is best for your data integrity? Jaap Van Kleef, Kevin Rasdale and Florian Malecki Recorded: May 22 2018 51 mins
    When RAID was proposed in the 1980’s, it was designed to fit within the limits of available technology: flash memory had not yet been invented, and applications were seriously limited in terms of storage performance. Today, traditional RAID concepts are out of touch with modern storage architectures, placing serious limits on performance, efficiency, flexibility and scalability. Modern storage solutions are moving “post-RAID” with advanced data protection and layout strategies, by treating treats files as objects in a data store rather than blocks on disk.

    In this presentation, you will learn about the key differences between RAID and object based storage that offers better performance, more flexibility, greater capacity utilization, and increased data protection without the high price tag.
  • Claves de una Gestión de Datos Eficiente con Commvault y Microsoft Azure
    Claves de una Gestión de Datos Eficiente con Commvault y Microsoft Azure Alberto González Ocaña – Commvault & Francisco Javier Castilla Luque - Microsoft Recorded: May 18 2018 42 mins
    ¿Sabes cuantos datos tienes en Cloud? ¿Cómo de rápido crecen? ¿Quién tiene acceso a ellos? ¿Estás preparado para las nuevas regulaciones como GDPR?

    Mover cargas a Cloud requiere de una estrategia integral de protección de datos y de recuperación ante desastres que cubra toda su infraestructura independientemente del origen. Commvault ofrece una plataforma de gestión de datos exhaustiva con automatización y orquestación para acelerar las migraciones a Microsoft Azure y Office 365 mientras realiza todas las tareas de gestión de los datos (backup, recuperación, gestión de políticas, e-discovery, etc.).

    Únete a nuestro webinar y conoce cómo la integración de Commvault con Microsoft Azure y O365 para la protección de datos te permite:
    •Mover, gestionar y usar datos desde una única plataforma independientemente de si estos residen on-premise o en Microsoft Azure.
    •Reducir tiempo, coste y esfuerzo aprovechando la automatización, orquestación y flexibilidad para reducir las tareas administrativas y manuales.
    •Simplificar la gestión de los datos y la recuperación ante desastres
    •Una eficiente integración en O365 para garantizar protección y recuperación granulares, cumplimiento de políticas de archivado y gobierno de información así como búsqueda avanzada de contenidos.
    •Backup consistente de Sharepoint (Base de datos y objetos).
  • Secrets of Successful Sales. Pillar 3&4: Sales Strategy and Confidence
    Secrets of Successful Sales. Pillar 3&4: Sales Strategy and Confidence Alison Edgar May 29 2018 10:00 am UTC 60 mins
    Over three webinars, Alison will share her Secrets to Successful Sales focusing on her Four Key Pillars of Sales methodology. Alison will teach you the strategies and processes she used to build her own business and become One of the UK’s Top 10 Business Advisers.

    If you want to hit target? Or better yet, exceed target? Maybe even grow a business? Then you need to tune into these webinars with Alison Edgar, The Entrepreneur’s Godmother.

    Webinar 3: Pillar 3&4: Sales Strategy and Confidence

    This webinar is split into two sections, strategy and confidence. Everyone needs a sales strategy, if you don’t know where you’re going, how are you supposed to know where to start? I’m going to the strategy that helped me become One of the UK’s Top 10 Business Advisers and got me to where I am today.
  • Top 5 ways to leverage the cloud
    Top 5 ways to leverage the cloud Derek Adair, Cloud Architect May 29 2018 10:00 am UTC 45 mins
    Do you want to know how to get the most from the cloud?

    We've gathered our top 5 use-cases for the cloud to build a resilient foundation for your IT infrastructure.

    - Decommission a DR site
    - Lift and Shift from On-Prem to Cloud
    - Plus, three other real-world cases
  • GDPR compliance on mobile devices, how secure is your organization?
    GDPR compliance on mobile devices, how secure is your organization? Aaron Cockerill, Chief Strategy Officer, Lookout May 29 2018 11:00 am UTC 60 mins
    Since 25 May, the General Data Protection Regulation (GDPR) is now officially enforceable. By now, most of the companies dealing with data should have taken the necessary steps to comply with the regulation and stay out of trouble. And this is all good but, have you thought about how your employees are using their mobile phones or devices to access your company data? How do you protect your organization from an employee's phone being hacked? The risk of GDPR fines & brand reputation damage has made the security of personal data on mobile an urgent priority for CISOs, and executive boards.

    By popular demand, we're replaying this webinar hosted by Aaron Cockerill, Chief Strategy Officer at Lookout and his guest, Kabir Barday, CEO at OneTrust.

    On the agenda:
    - Why mobile is a problem for GDPR compliance
    - Understanding the threats & risks to GDPR compliance from mobile
    - Finding & stopping mobile threats to GDPR compliance

    Did you know?

    84% of security & IT executives say personal data accessed on employee mobile devices could put their company at risk for GDPR noncompliance.

    31% of enterprise employees that have a title of Vice President or higher say their mobile devices have been hacked or compromised.

    63% of enterprise employees say they access their organization's customer, partner, data and employee data while on their mobile device.
  • Improving Your Employee Retention With Real-Time Ops Data
    Improving Your Employee Retention With Real-Time Ops Data Ophir Ronen, PagerDuty, Stephen O’Grady, RedMonk, and Mary Moore-Simmons, SendGrid May 29 2018 5:00 pm UTC 60 mins
    Employee attrition is a challenge that every organization, regardless of industry, faces. People change jobs and move companies for many different reasons. This got us thinking—is on-call health a factor that can significantly affect employee attrition rates? If the health factors of on-call pain are bad enough, could it cause your employees to leave your company prematurely?

    Join us for our upcoming webinar, where we’ll address these questions and share results from a global survey of IT managers and practitioners on employee attrition.

    We’ll also show you how to tackle employee dissatisfaction with real-time operations health data so you can effectively build and retain teams responsible for your digital transformation. You’ll gain insight into the most impactful operations health indicators as they relate to average employee tenure length across your organization, including:

    • Notifications that interrupt work and life.
    • Notifications that wake up responders at night.
    • Notifications that interrupt weekends.
    • Notifications that interrupt consecutive weekend days
  • Fighting Ransomware with Active Protection
    Fighting Ransomware with Active Protection James R. Slaby, Senior Manager, Product Marketing May 29 2018 6:00 pm UTC 45 mins
    Ransomware, the notorious malware strain that locks computer files with encryption and demands an online payment to restore access to them, is world’s fastest growing threat to user data. Ransomware gangsters raked in $5B in extortion fees last year, and are predicted to loot nearly $12B from businesses and consumers by 2019.

    This 30-minute session provides a pragmatic look at the ransomware menace, including:

    •How the most virulent ransomware strains operate
    •The most popular attack vectors used by ransomware
    •How ransomware became such a fast-growing threat
    •What steps you can take to defend against and recover from ransomware attacks
    •Why security and law enforcement experts advise against paying the ransom

    Ransomware developers have become increasingly wily, sophisticated and effective, but you can apply proven methods and technologies to fend off their attacks, keep your business up and running, and maintain your compliance with regulatory regimes like GDPR. Don’t become another ransomware statistic: join this webinar for practical steps you can take to protect your organization from ransomware today.
  • From Disaster to Recovery: Preparing Your IT for the Unexpected
    From Disaster to Recovery: Preparing Your IT for the Unexpected Alfons Michels, Sr. Product Marketing Manager - DataCore Software May 30 2018 5:00 pm UTC 45 mins
    Did you know that 22% of data center outages are caused by human error? Or that 10% are caused by weather incidents?

    The impact of an unexpected outage for just a few hours or even days could be catastrophic to your business.

    How would you like to minimize or even eliminate these business interruptions, and more?

    Join us to discover:

    • Useful and simple measures to use that can help you keep the lights on
    • How to quickly recover when the worst-case scenario occurs
    • How to achieve zero downtime and high availability
  • Automate Storage Provisioning with VMware vRealize Orchestrator, Ansible, & Chef
    Automate Storage Provisioning with VMware vRealize Orchestrator, Ansible, & Chef Chris Snell - HPE Storage Technical Marketing & Srik Venkata - HPE Storage Product Management May 31 2018 3:00 pm UTC 75 mins
    Learn how to use the new HPE 3PAR plugin for vRealize Orchestrator (vRO), Ansible, and Chef. Learn the benefits of automating HPE Storage within your companies Private Cloud and DevOps initiatives. This session will be covering Use Cases, and Demos, for the plugins for HPE 3PAR.
  • Part 1: Dell EMC Data Protection Software: What's New for 2018
    Part 1: Dell EMC Data Protection Software: What's New for 2018 Michele Nguyen May 31 2018 4:00 pm UTC 60 mins
    Dell EMC is modernizing and simplifying the Data Protection Software portfolio. In this webinar, learn about the latest innovations with our software including Avamar, NetWorker, DD Boost for Enterprise Applications, Data Protection Advisor, CloudBoost, and Data Protection Search. Highlights include enhancements to the software portfolio, modernized management, VMware protection, Hyper-V, cloud-based backup, DBA empowerment and performance.
  • Risk Mitigation: Making Office 365 Safer for Business
    Risk Mitigation: Making Office 365 Safer for Business J. Peter Bruzzese, Microsoft MVP, Mimecast May 31 2018 6:00 pm UTC 60 mins
    A move to the Microsoft Office 365™ cloud is going to reduce administrative overhead and provide end-users with modern communication and collaboration tools.  However, there are several areas that require further attention (security, archive and continuity) if you want a risk-free move to Office 365.  In this lively session by Microsoft MVP J. Peter Bruzzese, you will hear a non-FUD focused discussion of those gaps and how to close them.

    Presenter Info:
    J. Peter Bruzzese is a six-time-awarded Microsoft MVP (currently for Office Servers and Services, previously for Exchange/Office 365). He is a technical speaker and author with more than a dozen books sold internationally. He's the co-founder of ClipTraining, the creator of ConversationalGeek.com, instructor on Exchange/Office 365 video content for Pluralsight, and a consultant for Mimecast and others.
  • Defending the Cloud
    Defending the Cloud Rob Shapland (First Base Technologies) | Alex Hilton (CIF) | Patrick Grillo (Fortinet) | Paul Dignan (F5 Networks) Jun 5 2018 9:30 am UTC 60 mins
    This panel of cloud and security experts will discuss the different ways enterprises are securing their cloud environments.

    Join top cloud and security experts for this interactive Q&A discussion on:
    - The top cloud trends in 2018
    - Encryption, key management and beyond
    - Biggest threats to the cloud
    - How to better safeguard data and privacy

    - Rob Shapland, Principal Cyber Security Consultant, First Base Technologies
    - Alex Hilton, Chief Executive, Cloud Industry Forum
    - Patrick Grillo, Senior Director Solutions Marketing, Fortinet
    - Paul Dignan, F5 Networks

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
  • State of Network Security: New Research from ESG’s Jon Oltsik
    State of Network Security: New Research from ESG’s Jon Oltsik Jon Oltsik, Senior Principal Analyst, ESG and Karen Crowley, Senior Product Marketing Manager,Tufin Jun 5 2018 3:00 pm UTC 60 mins
    State of Network Security: New Research from ESG and the Implications for IT

    The Enterprise Security Group (ESG) recently ran a research survey on the state of network security. The survey, commissioned by Tufin, presents compelling results that require network security teams to plan ahead, such as: 86% of IT decision makers responded that automating network security operations is critical or very important for their organization, and yet 65% of them are still using manual processes to implement or modify network security controls.

    Join ESG’s Senior Principal Analyst Jon Oltsik and Tufin’s Senior Product Marketing Manager Karen Crowley as they review the research and share insights into securing today’s hybrid networks.

    Topics will include:
    •Primary Drivers that have increased the complexity of security operations
    •How Cloud services and SDN are impacting organizations
    •The move to DevOps and microservices and their impact
  • [Earn 1 CPE] Best Practices for GRC Implementation & Enterprise Security
    [Earn 1 CPE] Best Practices for GRC Implementation & Enterprise Security Colin Whitaker, Moderator. Renee Murphy, Forrester; Viktor Culjak, ACL; Cameron Jackson, Riskonnect; Paul Davies, Avecto. Jun 5 2018 5:00 pm UTC 75 mins
    In today’s world, implementing an effective GRC program is critical for every organization striving to secure the enterprise in an era of increasingly frequent and complex cyber threats. However, getting budget approval, organization buy-in and executing on a successful implementation can be daunting tasks to take on.

    Join our panel of experts on this CPE accredited webinar to discover some of the best practices for GRC Implementation and Enterprise Security in 2018.

    Qualifying participants will earn 1 CPE credit.

    Learning Objectives

    - Discover what it takes to successfully implement GRC at your organization by:
    - Unifying controls for IT risk and compliance.
    - Enabling IT governance by establishing accountability.
    - Aligning technology and processes for efficiency and consistency.
    - Learn how do you measure the cost and ROI of an implementation, so that you can present the case to management.
    - Identify the maturity and design of your GRC program, and plan on an appropriate GRC implementation given your current state.
  • Protecting Against Ransomware
    Protecting Against Ransomware Nick Frost (Principal Consultant, ISF) | Raja Mukerji (ExtraHop) | Patrick Grillo (Fortinet) | Rob McGovern (LogRhythm) Jun 6 2018 9:30 am UTC 60 mins
    What are the lessons learned from the biggest ransomware attacks to date (Wannacry, NotPetya)? How are organizations preparing against the next big attack?

    Join top security experts for this interactive Q&A discussion on:
    - Trends in ransomware attacks
    - Backups, patches and other ways to protect your data
    - How to bolster your organization's security culture
    - Other threats on the horizon

    - Nick Frost, Principal Consultant, Information Security Forum (ISF)
    - Raja Mukerji, Co-Founder and President, ExtraHop
    - Patrick Grillo, Senior Director Solutions Marketing, Fortinet
    - Rob McGovern, Technical Product Manager, LogRhythm

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
  • Data Breaches, Identity & Security
    Data Breaches, Identity & Security Amar Singh (Cyber Management Alliance) | Barry Scott (Centrify) | Jun 6 2018 12:00 pm UTC 60 mins
    Data breaches are on the rise, affecting millions of people around the world. With personal information exposed to cyber criminals and up for sale, the impact of a breach can continue to haunt its victims for months, and even years to come.

    Join top security experts for this interactive Q&A panel as they discuss:
    - The current (broken) state of security and the role identity plays in cyber-attacks
    - Zero trust framework: Guiding principles and paradigms
    - The massive rethink underway that redefines security to follow identity
    - What you can do today to adopt a Zero Trust model and reduce risk through the power of next-gen access
    - Recommendations for prevention of data breaches

    - Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
    - Barry Scott, CTO – EMEA, Centrify

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
  • Security Concerns Surrounding a Smart City
    Security Concerns Surrounding a Smart City Dan Evans, Itron, Inc., Juanita Koilpillai, Waverley Labs, Dick Morell, Falanx Cyber , David Morris Jun 6 2018 5:00 pm UTC 90 mins
    Join this panel discussion to understand the mass adoption of IoT & Smart City technologies and the underlying security concerns for these infrastructures.

    This session will cover:
    - What is a Smart City?
    - What are the Security concerns surrounding a Smart City?

    Moderator: David Morris
    Panelists: Dan Evans, Director, Smart Cities - Itron, Inc.
    Juanita Koilpillai, Chief Technology Advisor - Digital Risk Management Institute
    Dick Morell, Managing Director and Group CTO - Falanx Group / Falanx Cyber Defense
  • Protecting Data to the End: How Endpoint Backup Completes Your Data Protection
    Protecting Data to the End: How Endpoint Backup Completes Your Data Protection Edwin Yuen Sr. Analyst, Cloud Systems Management, Enterprise Strategy Group, Ray Sullivan, Sr. Product Marketing, Carbonite Jun 6 2018 6:00 pm UTC 45 mins
    As workforces become increasingly mobile, protecting data on laptops, tablets and endpoints of all kinds has become a unique and evolving challenge for IT departments. In many cases, traditional backup solutions are no longer sufficient to protect the data that companies depend on for continued success.

    This presentation will take the form of a fluid discussion around the important data protection issues facing today’s IT environments—paying special attention to the benefits of true endpoint protection. We’ll also be covering virus protection and related issues.
  • Scientific Data Explosion: Adapting IT Infrastructure So Research Can Thrive
    Scientific Data Explosion: Adapting IT Infrastructure So Research Can Thrive Adam Kraut, BioTeam - Scott Jeschonek, Avere Systems - Tim Carroll, Microsoft Azure Jun 6 2018 7:00 pm UTC 60 mins
    The advancements in scientific computing and healthcare are coming fast—from next generation sequencing onto precision medicine, “big data” and artificial intelligence. We’re embarking on a massive convergence of clinical analysis and information systems, and many are not prepared. With these advancements in technologies, comes higher demand for both compute and storage to degrees difficult to comprehend. An NCBI published study predicts that up to 40 exabytes of storage capacity will be needed by 2025 just to support the growth of sequenced human genomes.
    Adapting to this exciting shift in science will require changes in the way we think about IT infrastructure. In this webinar, BioTeam’s Adam Kraut will discuss…

    •How science changes faster than IT infrastructure, and what we can do to keep pace.
    •Converged infrastructures and their impact on research productivity.
    •How machine learning and microservices are changing the way we architect Cloud solutions.

    In addition, you’ll hear how companies are already supporting HPC workloads in hybrid cloud environments to increase analytic throughput efficiently. These workloads supply adaptability to changing research needs, integration into existing resources, and scalability to support growing demand for both compute and storage capacity.
    ПОСТРОЕНИЕ АРХИВА ДАННЫХ НА БАЗЕ ПО COMMVAULT Дмитрий Иванюк, Технический эксперт, MONT Jun 7 2018 7:45 am UTC 75 mins
    Уважаемые коллеги и партнеры,

    Приглашаем принять участие в вебинаре, посвященному обзору решения Commvault по архивам данных.

    Решение по архивации данных от Commvault это:
    • эффективное, удобное, надежное и безопасное хранение данных, соответствующее корпоративным политикам
    • единый, последовательный и масштабируемый подход к архивации данных
    •легкий перенос заархивированных данных в публичные или частные облака
    • удобное управление данными из единой консоли для применения корпоративных политик архивирования
    • гибкость и масштабируемость, позволяющая адаптироваться к меняющимся потребностям бизнеса

    Присоединяйтесь к вебинару 7 июня, чтобы узнать подробнее.
    Время проведения: 11.00-11.30 МСК
    Регистрация откроется за 15 минут до начала
  • How to Limit Damage from Cyber Attacks with BCDR & SDS
    How to Limit Damage from Cyber Attacks with BCDR & SDS Garry Carpenter Jun 7 2018 9:00 am UTC 45 mins
    Join us for this 45 minute webinar on 7th June at 10am UK that will ensure that your Business is Seamlessly Up and Running in Minutes. Understand how Ultimate Damage Limitation for Cyber-Attacks is Achieved through Business Continuity within Software-Defined Storage.

    Reasons to attend:

    Severity of cyber-attacks are judged by the length of time critical systems, data and applications are down. The ability to have a Business Continuity and Disaster Recovery enabled infrastructure mitigates the risk, offering zero downtime, zero Recovery Point Objective, and seamless rollback in time to the point before the attack hits.

    Joining the webinar equips you with 3 essential skills for damage limitation:

    Learn how to:

    * Implement multi layered protection that offers
    * Achieve additional resiliency with disaster recovery to the Cloud and 3rd Site
    * Rollback to the point immediately before the attack

    Your host for the meeting, Garry Carpenter has immersed himself in all things business continuity for the past few decades and is one of the leading UK authorities in the field.
  • Threats and Cyber Resilience
    Threats and Cyber Resilience Amar Singh (Cyber Management Alliance) | George Patsis (Obrela Security) Jun 7 2018 12:00 pm UTC 60 mins
    How are CISOs staying on top of the latest cyber threats? Where should enterprises be investing their cybersecurity budgets? Join top security experts to get the answer to these questions and more.

    Learn what the experts think when it comes to:
    - The biggest trends from the 2018 threatscape
    - CISO insights on improving enterprise security
    - Cyber risk and cyber insurance
    - Building a strong security culture in your organization.

    - Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
    - George Patsis, CEO, Obrela Security Industries

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
  • Dell EMC PowerMax: A deep dive into the all new NVMe-based All-Flash platform
    Dell EMC PowerMax: A deep dive into the all new NVMe-based All-Flash platform Vince Westin Jun 7 2018 4:00 pm UTC 60 mins
    Learn all about the new PowerMax array - the world's fastest! PowerMax builds on the core proven enterprise features of VMAX while also delivering unprecedented levels performance via NVMe technology and automated data placement for maximum performance with a built-in machine learning engine. You'll also learn about new software features such as enhanced data reduction including deduplication.
  • 5G Connectivity & Security: Critical for the Growth of IoT
    5G Connectivity & Security: Critical for the Growth of IoT Roger Billings, Global Solutions Architect, Cradlepoint Jun 7 2018 4:00 pm UTC 60 mins
    5G isn’t just a trendy buzzword. For enterprises and organizations everywhere, 5G has vast potential to expand what’s possible — especially for IoT.

    With IoT deployments popping up everywhere and 5G rollouts right around the corner, organizations can take advantage of new opportunities ranging from very high-density IoT to augmented reality and real-time video to provide new services and gain competitive advantages. Many use cases that already are thriving with 4G LTE are poised for even greater performance, reliability, and cost-efficiency once 5G arrives.

    Join Cradlepoint’s Roger Billings, Global Solutions Architect, for a live webinar on June 7, 2018, at 9 am PT. You’ll explore the opportunities, challenges, and solutions surrounding 5G and IoT connectivity, security, and management.
  • Application Security Testing for an Agile & DevOps World
    Application Security Testing for an Agile & DevOps World Omer Winker, Principal, Products at Contrast Security Jun 7 2018 5:00 pm UTC 60 mins
    Security teams have a hard time keeping pace with software development in Agile / DevOps environments, and the result of rapidly rolling out software is increased risk. With the majority of cybersecurity attacks focused on applications, automatically detecting vulnerabilities and protecting your applications from attack is critical to your business.

    It’s easy to get tangled into the numerous approaches and technologies in application security testing, let alone selecting one that’s right for Agile and DevOps. As a result, it becomes challenging to even start developing an application security testing strategy for your business.

    In this presentation, you will learn:

    - SAST, DAST And IAST approaches used in Application Security Testing
    - Strengths and weaknesses of each approach
    - Best practices in securing your software code
    - How to start developing a winning application security testing strategy

    Remember, applications are the primary target for cyber criminals, so don’t let your most prized customer and corporate assets be exposed to potential attacks!