The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
Bharath Ram Ramanathan, Principal Technical and Solutions Marketing Manager - HPE StorageRecorded: Mar 22 201960 mins
Data is the lifeblood of business. A company’s data is usually copied at least once, and often multiple times, to meet the needs of various use cases such as clones for test/dev or analytics, backup copies for data protection, archival copies for compliance, instant recovery copies, or, any particular set of data is likely to have spawned one or more copies. Copies are so important that they now consume 60% of total storage capacity for the average enterprise – even more than production data. While these copies are nearly always made for a good reason, in many organizations they have spiralled out of control, creating a copy data sprawl that is tough for IT to get its arms around, let alone manage.
So how do you protect this important asset, grant copies to all who need it, and avoid paying for extra storage capacity – on-premises and in the cloud? HPE Storage’s Recovery Manager Central (RMC) for 3PAR and Nimble Storage platforms delivers a single-pane-of-glass for Copy Data Management and Data Protection for a variety of workloads such as VMware, Oracle, SQL Server, Exchange, SAP HANA and more. In this talk, we will cover how RMC delivers a DataOps experience for 3PAR and Nimble platforms with live demos.
Jessica Gulick, CEO, Katzcy, MBA | PMP | CISSPRecorded: Mar 21 201955 mins
Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?
Guest: Merissa Villalobos & Kristin Parke from NCC Group
Rene Kolga, Sr. Director of Product and Robert Zamani, Director, Solutions Architect, NyotronRecorded: Mar 21 201949 mins
Most security solution buyers assume they’re protected against known malware. Numbers like 99.9% are common in vendors’ marketing materials. Hence, efficacy conversations tend to focus instead on the solution’s performance against the unknown, zero-day threats. However, with between half a million and one million new pieces of commodity malware created every day, how are antivirus solutions keeping up? Where is this database of signatures, hashes, reputation and behavior stored for over a billion of known pieces of malware? Is the 99.9% number an illusion or reality?
In this webinar we will leverage a study of three leading antivirus products against 60,000 pieces of known new and old malware. The results will surprise you...
Does the ILOVEYOU virus from the year 2000 still pose a threat? You’ll have to join this webinar to find out.
Brian McClesky, Systems Engineer-Mirazon, Rebecca Chike, Systems Supervisor-City of CarmelRecorded: Mar 21 201957 mins
Join us to hear the story of City of Carmel and Mirazon. City of Carmel is one of the fastest growing cities in Indiana. Carmel was voted #1 in American's Best Places to Live by Money magazine. CNBC voted Indianapolis/Carmel ”Best Cities to Relocate to in America”. Over the last two decades the city has almost tripled its population and this growth has forced their IT infrastructure to expand rapidly.
Thanks for Mirazon’s recommendations they found the perfect solution that helped them modernize their infrastructure to provide 24/7 data access for Fire and Police department’s critical systems. For nearly a decade, City of Carmel has experienced Zero storage-related downtime. Even through maintenance windows, their VM’s have achieved 100% uptime.
The best part is, they have done with budget-friendly backend disks and allowed Software-defined storage to do all the heavy lifting. They have enjoyed Enterprise level active/active HA functionalities across 2 different buildings, running a VMware stretch cluster with HPE Servers connected via 10Gb and HP MSA backend enclosures.
Learn how City of Carmel has been able to stay running without downtime for almost 10 years and have saved $75,000 by extending their hardware life expectancy thanks to their secret sauce.
In this webcast you will discover how City of Carmel:
• Has experienced 100% uptime for nearly 10 years
• Extended their storage life expectancy by 80% and saved $75k
• Replaced every storage component without doing a forklift and replace
Gil Cattelain, Product Marketing Manager and Joe Leung, Product Marketing Manager, Micro FocusRecorded: Mar 21 201932 mins
Ransomware is a global epidemic that is spreading like wildfire. According to the 2019 CyRiM (Cyber Risk Management) Report, ransomware could cause up to $193B in economic damage. The FBI estimates that ransomware infects more than 100,000 computers a day around the world. And in one example, The City of Akron, Ohio experienced public service interruptions, including disruption to the processing of credit card payments, as result of a ransomware attack.
Organizations can easily neutralize the threat with a holistic 2-step approach by first strengthening protections against intrusions from the start, and by quickly resolving issues with an up-to-the minute copy of data needed to restore systems back to operational status, should the virus manage to get through.
Join this webinar to learn about:
• Ransomware challenges and impact
• Why malware detection alone is not enough
• How to close the gap with holistic endpoint data and device management
Colin Whittaker, with Sam Abadir, Lockpath; Allan Liska, Recorded Future; and Gina Mahin, Lynx TP; David McNeely, CentrifyRecorded: Mar 21 201979 mins
In an age where cybersecurity threats are an everyday fact of life, organizations are looking for solutions that enable them to predict, prepare and react to the shifting landscape of cyber threats, and implementation of adaptive cyber security strategies is becoming inevitable to achieve that goal.
Adaptive cyber security methods allow for the simultaneous defense of multiple attack surfaces against this new wave of advanced cyber attacks targeting businesses and services. The NIST Cybersecurity Framework enables organizations — regardless of size, degree of cybersecurity risk, or cybersecurity sophistication — to apply the principles and best practices of risk management to improving security. Attend this CPE webinar to gain insights on:
- Getting a clear picture of the current health of your organizations' defenses
- Defining your security road map using NIST CSF as a framework
- Conducting gap analysis and executing remediation actions
- Mapping the NIST CSF with security controls and built-in reporting templates that align with the framework.
ISM Fellow - Andrew GrantRecorded: Mar 21 201931 mins
Why you should attend:
An up to date analysis of the UK supermarket sector - mergers, acquisitions, consolidation, relentless pressure - but why no all-out price war for the past 15 plus years - would Amazon's entry be the final straw?
What you will learn
•Unmissable for anyone selling into the UK supermarkets
•Get yourself fully up to date with the latest changes that could impact your business
•Delivered by an acknowledged industry expert
David Bloxham - SoftwareONE; Kaz Traverso - SoftwareONE; Paul Manaton - RiverMeadowRecorded: Mar 21 201926 mins
With support for SQL Server 2008 and 2008 R2 ending on 9th July, 2019 and Windows Server January 2020, what are your upgrade options?
End of support means the end of security updates, which can cause security and compliance issues and put applications and business at risk so it’s important to create an upgrade transition plan.
SoftwareONE and migration acceleration specialists, RiverMeadow, will discuss the key considerations to ensure a successful transition including:
•What are the available options: on-premise upgrades, migrate to cloud or do nothing?
•Best practice methodologies
•Cloud tooling options for migration acceleration
•Cloud migration framework for success
Organisations have options. Each is worth exploring and you may use multiple options to move workloads from SQL Server, depending on the workload.
This webinar will primarily focus on cloud migration.
L’offre Commvault est l’offre de sauvegarde/restauration la plus complète du marché. Elle permet de répondre à l’ensemble des besoins actuels et futurs autour de la protection des données :
•Sauvegarde & restauration complètes – tous fichiers, applications, VM, Cloud ;
•Archivage fichiers et VM ;
•Chiffrement, déduplication, compression ;
•Protection des postes clients ;
•Protection et archivage des boites aux lettres (on premise ou cloud) et autres applications cloud ;
•Plan de secours – Failover/Failback/conversion ;
•Gestion des snapshots hardware ;
•Réplication et synchronisation en temps réel des VMs (LiveSync) ;
•Reporting opérationnel complet ;
Planning and managing for hardened, secure assets is a key requirement for managing IT Risk and is mandated by many compliance sources such as PCI, NIST, FISMA and HIPAA – yet many organizations are not fully assessing their IT hosts and applications for secure configuration. In this live webinar, Lockpath’s Sam Abadir will share what configuration compliance management for 2020 and beyond looks like, including:
•What configuration compliance management encompasses
•Who should care about secure configuration management
•Why organizations are not doing this today and how this impacts the business beyond IT
Discover the future for configuration compliance management by attending this educational webinar. Register now!
Joe Schreiber, Technical Director, Business Development, Tufin & Karen Crowley, Sr. Product Marketing Manager, TufinRecorded: Mar 20 201946 mins
Join automation expert Joe Schreiber on March 20th as he shares his experiences automating himself out of a job (in a good way), and discusses where to start and how to avoid risk.
Joe will present his five steps and answer questions from the audience on how to:
Collaborate with the rest of your team on automation
Organize your multi-vendor toolbox and use APIs to ensure success
Empower your teams to write reusable, value-driven code
Leverage modern applications in containers, microservices, and serverless environments
Got questions? Send them to Joe ahead of time to be included in the discussion.
Andy Lawrence, Executive Director of Research, Uptime Institute IntelligenceRecorded: Mar 20 201953 mins
Smart energy is a trending concept in a field crowded with competing and complementary terms, technologies, and approaches – but has the business case yet been made? Andy Lawrence will share his views on where this technology segment is headed.
Seyi Verma, Director of Product Marketing, DruvaRecorded: Mar 20 201950 mins
It's no secret that managing the backup and restore of your virtual machines on-premises and in the cloud is unnecessarily complex. Managing multiple vendors and disparate solutions not only increases your costs and degrades visibility, but it also puts your organisation's critical data at risk.
Luckily, there's a better way with an all-in-one, cloud-native solution.
Join our webinar and learn how Druva can solve your VMware data protection challenges, including:
- Reducing your overall storage footprint by consolidating your data
- Streamlining data management and protection, reducing costs by up to 60%
- Meeting your RTO and RPO requirements for better business continuity
- Leveraging enterprise cloud backup for instant disaster recovery
Nick Scholz, Robin Redgrave and Devadas Kovilakath, Micro FocusRecorded: Mar 20 201948 mins
As companies undergo digital transformations—with a laser focus on simplifying operations and boosting productivity—users are being asked to get more done faster and with fewer resources.
In this climate, it’s not surprising that employees independently turn to cloud file sharing services they may already be using at home to help them sync and share their files and get their work done.
But these consumer-grade services lack the security, control, and management features that many organizations need to protect themselves from data loss, breaches, and business continuity failures, so many IT leaders are stuck: how do they enable productivity and ease the sharing of critical files without compromising their security and compliance needs?
Join Nick Scholz, Robin Redgrave and Devadas Kovilakath to see what experts are saying about what to look for in an EFSS solution, and how to figure out which one fits your needs.
• What features help users adopt
• The state of the EFSS landscape
• The benefits and shortfalls of Cloud vs. On Premises solutions
• How to maximize security AND collaboration
• And more!
Paul O'Connor, Global Lead CSP Indirect Program; Clare Richards, Partner Business Manager; Kathy Jones, SPLA Business ManagerRecorded: Mar 20 201923 mins
If you are a Microsoft partner that falls into one of the following categories and you are unsure what benefits the new Microsoft CSP Indirect program brings to you, we recommend joining this webinar:
•System Integrator (SI) Partners – these partners will now be able to offer software and support to customers that they were not able to access in the past providing the partner with new sources of revenue and a differentiated value proposition.
•Hosters/SPLAs – the CSP Indirect program allows these partners to forego their existing infrastructures, which may not be viable long-term, and work through SoftwareONE and Microsoft to help end-customers.
•ISVs – providing help with scale and reach; working with SoftwareONE’s CSP Indirect team can help them get to market faster and at a greater scale ensuring faster returns for ISV startup stakeholders.
Finding new business in your customer base this year may seem daunting. Building a new practice may be a costly venture that won’t return value to the business for years. However, delivering long-term customer value is paramount and critical to growing your business.
SoftwareONE is a certified member of the CSP Indirect program and it’s an exciting time for those in the Microsoft ecosystem, benefiting partners and end customers alike.
Find out more about the new opportunities available to you and specifics about SoftwareONE’s additional value and services delivered through our unique CSP Indirect program called ONEClub.
Kirill Kruglov, senior security researcher at Kaspersky Lab ICS CERTRecorded: Mar 20 201961 mins
The webinar will be helpful for those who wish to know more about current ICS cyberthreats.
The webinar’s speaker Kirill Kruglov, senior security researcher at Kaspersky Lab ICS CERT, will talk about major threats relevant to industrial control systems that Kaspersky Lab ICS CERT identified in H2 2018. In addition to discussing general statistics on malicious attacks that were detected and prevented by Kaspersky Lab products on industrial computers globally, he will offer a deeper dive into the attacks we saw, TTPs used by attackers, and root cause analysis of major security weaknesses we discovered. In addition, Kirill will discuss the methodology used to collect and analyze the data, which will help the webinar participants to better understand what these figures mean.
John Grim, David KennedyRecorded: Mar 20 201985 mins
Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the Verizon Insider Threat Report and the current cybersecurity threat landscape.
•The time it takes to discover a breach after the first action
•5 insider threat types identified by our caseload
•Top 3 insider threat motivations
•Top industries suffering sensitive data breaches
Our Verizon Threat Research Advisory Center presenters will be:
•John Grim, Senior Manager, Investigative Response - America
•Domingo Jesus Alvarez-Fernandez, Senior Dark Web Hunter, Threat Intelligence
•David Kennedy, Managing Principal, Open Source Intelligence
Flavio Di Cosmo, Pre-Sales Engineer SEEMEARecorded: Mar 20 201928 mins
Una rete segmentata rende operativa le policy di sicurezza, consente uno stato di compliance continua con il minimo sforzo e offre opzioni di mitigazione per gli attacchi informatici. Ma la segmentazione della rete non è un compito facile!
Unisciti agli esperti di Tufin il 20 Marzo 14:30 mentre condividono consigli utili per la segmentazione della rete, tra cui:
•Insidie da evitare durante la creazione di una strategia di
•Framework per la segmentazione
•Linee guida per l'applicazione e il mantenimento di una rete
Adam Meyers: VP of Intelligence; Jennifer Ayers: VP of OverWatch and Security ResponseRecorded: Mar 20 201965 mins
The 2019 CrowdStrike® Global Threat Report offers one the industry’s most comprehensive reports on today’s top cyber threats. The report combines CrowdStrike’s comprehensive global observations with real-world case studies. delivering deep insights on modern adversaries, and their tactics, techniques, and procedures (TTPs).
Join us for a webcast featuring CrowdStrike VP of Intelligence Adam Meyers and VP of Falcon OverWatch™ Jennifer Ayers as they explore the global trends and observations revealed in the report. They will also offer actionable recommendations you can use to ensure your organization is ready to anticipate and defend against the most dangerous threats of tomorrow.
Join this webcast to learn:
- The most favored TTPs observed throughout 2018 as seen through the lense of MITRE ATT&CK™framework
- Updates on global “breakout” time statistics, including observations on which adversaries showed the fastest tradecraft in 2018
- How nation-state adversaries continue to target dissidents, regional adversaries and foreign powers to collect intelligence for decision-makers
- How cybercriminals combine advanced, targeted attack techniques with ransomware to achieve massive financial payoffs via “Big Game Hunting”
- How the eCrime ecosystem continues to evolve and mature, showing increased collaborations between highly sophisticated criminal actors
Nicolas Liard, Pre Sales Engineer France, BeneluxRecorded: Mar 20 201949 mins
Un réseau segmenté opérationnalise votre politique de sécurité, permet un état de conformité continue avec un minimum d'effort et fournit des options d'atténuation des cyberattaques. Mais la segmentation du réseau n’est pas une tâche facile !
Rejoignez les experts de Tufin pour partager des conseils pratiques sur la segmentation du réseau, notamment:
• Les pièges à éviter lors de la création d’une stratégie de segmentation
• Cadre de segmentation
• Lignes directrices pour appliquer et maintenir un réseau segmenté
Storage Switzerland, ActifioRecorded: Mar 19 201956 mins
Designing architectures to backup primary storage as well as provide rapid recoveries is a challenging task that most IT professionals need to face. It is even more challenging in the face of a rapidly growing data set, increasing demand for shorter recovery times and new threats like ransomware. The cost for IT to design, implement, maintain and upgrade these infrastructures can consume a big part of the IT budget. Additionally, the time required for each of these steps is something that most IT teams simply don’t have.
As a result, many organizations are looking for ways to move to an infrastructure-less architecture where most of the physical hardware is in the cloud as well as the software intelligence. The goal is to move data protection from a very unpredictable CAPEX cost to a normalized OPEX cost. There are an increasing number of cloud solutions that claim an infrastructure-less solution but many of these solutions force the organization to give up many of the capabilities they’ve come to count on or force them into long-term cloud relationships.
Attendees to the webinar will learn the challenges of maintaining an on-premises infrastructure, why current cloud solutions fall short and what IT really needs from an infrastructure-less solution.
Adam Sharp, CIO, International, TBWA | Andy Hardy, VP, EMEA, NasuniRecorded: Mar 19 201935 mins
Learn from the International CIO of one of the top 10 ad agencies in the world how consolidating infrastructure has become key to streamlining costs, enhancing productivity, and increasing cash flow.
With operations spanning 295 offices and 11,000 employees, TBWA’s IT staff faced increasing demands to bring storage and data protection costs under control without reducing flexibility or security. Join Adam Sharp, CIO International for TBWA, The Disruption® Company, and Adweek’s 2018 Global Agency of the Year, as he discusses why his team opted for a “disruptive” cloud strategy of its own and what the results to date have been:
- How the business strategy drove TBWA to the cloud
- What key decisions enabled them to reduce costs and meet capacity requirements at the same time
- How they went about a worldwide roll-out of their cloud storage strategy
- Why multi-cloud capability is important
Ken Bagnall, Vice President, Email Security, FireEye, moderated by Christopher Porter, Chief Intelligence Strategist, FireEyeRecorded: Mar 19 201950 mins
FireEye research recently indicated that an average of 14 thousand malicious emails per month were being missed by most email security solutions. Email is the number one threat vector and with impersonation and credential phishing or URL-based attacks on the rise your email security solution must keep up with the evolving threat landscape. In this webinar:
-Get a brief overview on the latest email threat trends
-Learn about the must haves for email security solutions and the benefits of having one provider
-Find out about additional email security capabilities that can help you have an adaptable solution
-Hear about a use case where FireEye helped detect and block impersonation techniques that the incumbent solution missed
Mark Chaplin, Principal, ISFRecorded: Mar 19 201945 mins
While the board ‘get cyber’, questions remain around embedding cyber risk management into business strategy execution. For many CISOs, strategy alignment represents the best opportunity to engage with the board and ensure a business-driven approach to managing cyber risk.
So how should business leaders develop, update and execute business strategy with so many cyber-related implications? How can organisations meet their business goals, against a backdrop of increasing cybersecurity costs, greater regulatory scrutiny and increased frequency and magnitude of data breaches?
In this webinar, Mark Chaplin, Principal, ISF will discuss the significance of aligning security strategy with business strategy. Mark will draw on executive engagement, exploring the essential factors for success and highlighting the pitfalls to avoid.
Candid Wüest (Sr. Threat Researcher at Symantec); Thomas Hemker (CISSP, CISM, CISA)Recorded: Mar 19 201963 mins
Symantec Internet Security Threat Report: Cyber-Kriminelle stehlen Millionen mit Hilfe von Formjacking; setzen auf destruktive Malware und bereiten sich auf Cyber-Kriegsführung vor –
eine ernstzunehmende Bedrohung für Unternehmen und Verbraucher
Dieser aktuelle Symantec Threat Report zeigt eine steigende Zahl ambitionierter, zerstörerischer und heimtückischer Angriffe auf Unternehmen:
•Fast jede zehnte Angriffsgruppe, die gezielte Attacken verübt, setzt destruktive Malware ein und stoppt so Unternehmensabläufe. Diese Zahl stieg im Vergleich zu 2017 um 25%
•Cyber-Kriminelle optimieren bewährte Taktiken, darunter Spear-Phishing, Hijacking legitimer Tools und bösartige E-Mail-Anhänge. Living of the Land (LotL)- und Supply Chain-Angriffe sind weiterhin eine signifikante Bedrohung. Der Einsatz bösartiger Powershell-Skripte stieg im vergangenen Jahr um 1.000%
•Infektionen mit Ransomware stiegen in Unternehmen um zwölf Prozent
•Cloud-Ressourcen sind immer häufiger leichte Ziele für digitale Diebe: Mehr als 70 Millionen Datensätze aus schlecht konfigurierten S3 Public Cloud-Speicher-Buckets wurden gestohlen oder abgezapft
•Eine zunehmende Anzahl an Angreifern kompromittiert operative Systeme und industrielle Kontrollsysteme (Industrial Control Systems, ICS), um sich möglicherweise auf Cyber-Kriegsführung vorzubereiten
Marco Miska, Technical Account Manager EMEAMar 26 20199:00 amUTC60 mins
Ihre Teams haben Schwierigkeiten, mit der Häufigkeit von Netzwerksicherheitsanfragen Schritt zu halten, während sie gleichzeitig versuchen die Agilitätsinitiativen Ihres Unternehmens zu unterstützen und die Sicherheit zu wahren.
Sie kennen die Vorteile der Automatisierung, fragen sich aber wahrscheinlich: "Wo fangen wir an?"
Besuchen Sie die Experten von Tufin am 26. März um 10.00 Uhr, um nützliche Tipps für den Einstieg in die Zero-Touch-Automatisierung zu erhalten:
• Warum aktuelle Ansätze nicht funktionieren
• Wie können begrenzte Ressourcenherausforderungen überwunden werden?
• Die Schritte, die Sie unternehmen müssen, um das ultimative Ziel zu erreichen: Zero-Touch-Automatisierung
Marcin Kacprzak, Senior Sales Engineer & Damian Hoffman, Senior Sales EngineerMar 26 201910:00 amUTC45 mins
Kliknąć, czy nie? Każdego dnia użytkownicy poczty elektronicznej zadają sobie podobne pytanie. Wg najnowszych statystyk 1 na 101 wszystkich wiadomości email zawiera złośliwą treść, która może prowadzić do infekcji zarówno pojedynczego komputera, jak i całej organizacji.
Podczas naszego webinarium dowiesz się jak wykrywać i blokować podejrzane wiadomości email oraz poznasz szczegóły efektywnej strategii ochrony poczty elektronicznej przed takimi atakami jak:
Storage Switzerland, CarboniteMar 26 20195:00 pmUTC60 mins
The cloud seems like a logical destination for backup data. It is by definition off-site, and the organization no longer needs to worry about allocating valuable floor space to secondary data storage. The problem is that most cloud backup solutions fall short of delivering enterprise class data protection.
Most cloud backup solutions are too complicated to set up and upgrade, don't provide complete platform support, don't provide flexible recovery options, can't meet the enterprises RTO/RPO requirements and don't provide a class of support that enables organizations to lower their operational expense.
In this live webinar Storage Switzerland and Carbonite discuss the five critical capabilities that enterprises, looking to move to cloud backup, need to make sure their solution has.
Join us for this live event to learn:
1. Why switch to the cloud for enterprise backup?
2. The five critical capabilities enterprises MUST have in cloud backup solutions. What they are and why enterprises need them.
3. Why and where most solutions miss the mark
4. How Carbonite Server delivers the five critical capabilities
Marco Bal, Principal Systems Engineer - Benelux & NordicsMar 27 20191:00 pmUTC45 mins
While it is still widely used, Disk to Disk to Tape (2D2T) architectures have long been optimized for backup performance, with little regard for the true goal – recover data when and where it’s needed- within business Service Level Agreements (SLA’s).
Tapes may relieve compliance concerns, but they lock data away, stranding any value residing in that data.
Learn how data protection is about much more than just backup and how Pure Storage with the industry’s first Flash-to-Flash-to- Cloud (F2F2C) Object Engine solution taps the power of flash and cloud to modernize data protection. With Object Engine organizations can deploy a cloud-native solution with scale-out rapid recovery on premises, benefit from cloud economics and reuse data with cloud apps such as analytics and test/dev.
During this technical webcast you will find out how Object Engine can help your organization to rapidly restore mission critical data exactly where it’s needed – and within an SLA.
Ilya Markelov, CyberTrace Product Manager and Artem Karasev, Senior Product Marketing ManagerMar 27 20192:00 pmUTC60 mins
Our webinar is dedicated to the recent release of CyberTrace, our threat intelligence fusion and analysis tool. During the event, you will learn how to:
• Define key criteria when choosing threat intelligence sources
• Determine if the specific feed is relevant for your organization
• Overcome the challenges of integrating threat intelligence feeds with SIEM:
- SIEM systems are unable to digest millions of threat indicators
- Integrating threat intelligence feeds with SIEM is time-consuming and resource-hungry
- Before matching observables against threat intelligence feeds, SIEM or TIP must expose the obfuscation techniques used by threats to hide malicious activities in logs - but it doesn’t usually do this, resulting in reduced feeds efficiency
• Reduce false positive rates through whitelisting and filtering of the feeds
• Effectively leverage threat intelligence if you don’t have SIEM
• Distill and prioritize sweeping amounts of security alerts and identify alerts that should be escalated to IR teams using Kaspersky Threat Data Feeds and their context.
Storage Switzerland, HubStor, Osterman ResearchMar 27 20195:00 pmUTC60 mins
(and live to tell about it)
Organizations are moving to the cloud but according to a recent Osterman Research study, only 14% of companies have completed that transformation. The study clearly identifies data storage as an area where IT can easily accelerate their cloud transformation journey. Potentially more so than any other component, intelligently moving data to the cloud has the opportunity to significantly lower on-premises storage costs without the threat of impacting day to day operations.
Join Storage Switzerland, HubStor and Osterman Research for our live webinar where we’ll discuss the results of the Osterman Research study, what it means for IT, and how IT can take advantage of that research to leverage the cloud to alleviate data management and data protection concerns.
All pre-registrants will receive our exclusive eBook, “Understanding the Difference Between Data Protection and Data Management.” Sign up now and get your copy today.
Stuart McKenzie, EMEA VP, FireEye Mandiant & Alister Shepherd, META Director ConsultingMar 28 201911:00 amUTC45 mins
Explore the latest developments behind today’s attacker techniques, behaviors, and motivations sourced from this year’s M-Trends 2019 Report, our annual publication based on FireEye Mandiant’s frontline investigations of the most interesting and impactful cyber attacks in 2018.
This year will mark the 10th anniversary of M-Trends, giving us the perfect opportunity to a decade’s worth of cyber security developments.
Join us for this webinar, as FireEye Mandiant experts discuss highlights and case studies from this year’s edition, including:
• Evolving attack trends in today’s threat landscape
• New advanced persistent threat (APT) groups that emerged in 2018
• Regional case studies of real-world compromises
• Best practices lessons learned from the front lines of incident response
Eric O’Neill, Cybersecurity expertMar 28 20193:00 pmUTC64 mins
The world’s fastest growing threat to user data – ransomware – is the notorious malware strain that locks computer files using encryption and demands an online payment to restore access. In fact, close to $600 billion, or nearly one percent of global GDP, is lost to cybercrime each year.
Despite how wily and sophisticated ransomware developers are becoming, you can apply proven methods and technologies to fend off their attacks, keep your business up and running, and remain compliant with industry and other regulations.
Join ex-FBI operative and cybercrime expert, Eric O’Neill, to learn how ransomware became the world’s single largest security incident and what you can do to prevent these attacks, including:
•How the most virulent ransomware strains operate
•The most popular attack vectors used by ransomware
•How ransomware became such a fast-growing threat
•What steps you can take to defend against and recover from ransomware attacks
•Why security and law enforcement experts advise against paying the ransom
With a practical, proactive approach, you can fend off attacks and keep your data safe. Find out how so you don’t fall victim.
Alberto Maestre, Pre-Sales Engineer SEEMEAMar 28 20193:00 pmUTC60 mins
Una red segmentada hace que las políticas de seguridad sean eficientes, permite un estado de cumplimiento continuo con el mínimo esfuerzo y ofrece opciones de mitigación para los ataques cibernéticos. ¡Pero la segmentación de la red no es una tarea fácil!
Únase a los expertos de Tufin el 10.00am, 28 de marzo mientras comparte consejos útiles para la segmentación de la red, que incluyen:
- Los errores que deben evitarse al crear una estrategia de segmentación
- Framework para la segmentación.
- Directrices para la aplicación y mantenimiento de una red segmentada.
Shawn Malone, Linda Tuck Chapman, Kelly White, Shane DeayMar 28 20194:00 pmUTC60 mins
Managing vendors, third parties and business associates is one of the most challenging aspects of business. In this exclusive webinar, our panel of industry experts will share their perspectives of the current third-party risk management landscape and where it's headed. As an attendee you’ll learn the latest trends in third-party risk and top predictions in 2020. Discover the future of third-party risk management in this can't miss webinar.
Pat Geary, Chief Evangelist, Blue Prism | Matt Juden-Bloomfield, Head of RPA, Blue PrismMar 28 20194:00 pmUTC75 mins
On March 28th, Matt Juden-Bloomfield, Head of RPA at Blue Prism, will be hosting our next webinar, where we’ll be announcing the customer winners of our prestigious Excellence in Enterprise RPA Awards. You’ll also have the chance to talk to Pat Geary, Chief Evangelist at Blue Prism, about the future of RPA.
* A new generation of RPA trailblazers
The Excellence in Enterprise RPA Awards is our annual celebration of RPA success, helping us to recognise the innovation and dedication of our growing customer base.
We’ll be announcing the finalists of our customer awards and telling you how these RPA success stories have helped to drive the digital transformation and business efficiency of our leading RPA customers.
* RPA: what's next?
RPA has come a long way in the 17 years since Blue Prism first brought the innovation and efficiency of the Digital Workforce to the global market. And who better to talk about the future path of connected-RPA than Pat Geary, Chief Evangelist at Blue Prism, who coined the term and invented the industry back in 2012?
Pat will be giving his key insights into the history and future direction of RPA, and will be answering your questions on the next stage of evolution when it comes to automation, digital transformation and the world of connected digital solutions.
In this webinar you’ll:
● Find out who’s shortlisted in the customer awards at the Excellence in Enterprise RPA Awards
● Hear more on those customer success stories and the added value of connected-RPA
● Hear from Pat Geary, Blue Prism’s Chief Evangelist, about the future path of the Blue Prism product and the world of automation
● Take part in a live-audience Q&A with Pat Geary and Matt Juden-Bloomfield, Head of RPA, Blue Prism.
If you have a burning RPA-related question to ask, make sure to pre-register and join us on March 28th for this webinar. If you can’t make it on the day, you can easily watch a recording of the session from our webinar page, after the event.
James Gibson, Ortana and Janet Lafleur, BackblazeMar 28 20195:00 pmUTC45 mins
Is your content stuck on a dying archive platform? You may see the signs coming: the vendor increases support charges, product enhancements slow down and marketing ceases. Once the rumors start, it won’t be long before the vendor announces end-of-life plans. If decades of your content are archived in a closed-format, proprietary platform you’ll need to migrate immediately, before it’s too late.
Join this webinar with experts from Ortana and Backblaze and learn how to:
- Migrate even the largest libraries in short timescales, with zero down time
- Preserve valuable editorial metadata during the migration process
- Use AI based image detection and speech to text to augment metadata
- Choose the right mix of formats and storage for your new, everlasting archive
Brian Campanotti, CEO cloudfirst.io former CTO Front Porch Digital + David Phillips, M&E SA, Cloudian former NBC architectMar 28 20195:00 pmUTC60 mins
Legacy Content Storage Management systems (CSM) such as DIVArchive and others have become cumbersome and costly archive targets.
Join Cloudian, Cloudfirst, and Ergonomic Group on March 28th @ 10am PST to learn how to create the foundation for a future-proof archive solution.
Speakers will be:
- Brian Campanotti, CEO at Cloudfirst.io and former CTO at Front Porch Digital creators of DIVArchive
- David Phillips, M&E Solutions Architect at Cloudian and former architect at NBC
The joint solution of Cloudfirst.io Rapid Migrate and Cloudian Hyperstore enables easy migration from any legacy archive platform to a modern object storage platform that:
- Addresses limitations of legacy systems by providing exabyte-scalability
- Increases accessibility and search-ability in an economical manner
- Overcomes the lock-in created by proprietary legacy archive systems
- Avoids future disruptive and tedious migrations
- Sustain your existing production operations in a seamless fashion during migration
John Moran, Senior Product Manager, DFLabs and Chris Berninger, Technical Alliances Engineer, Carbon BlackApr 2 20194:00 pmUTC60 mins
Dive Head First into the Endpoint (Without Hitting Your Head): A DFLabs and Carbon Black Use Case
The time it takes attackers to progress from initial infection to establishing multiple beachheads and beginning data exfiltration is often measured in minutes. Responding effectively under these adverse conditions requires complete network visibility, actionable intelligence and intelligent automation to augment human analysts.
Carbon Black has long been recognized as the industry leader in endpoint detection and response, providing unmatched visibility into all endpoint activity. By incorporating actionable intelligence into their suite of tools, Carbon Black allows enterprises to respond effectively to both known and unknown threats. Carbon Black Defense brings Carbon Black’s extensive Endpoint Detection and Response (EDR) experience together with their cutting-edge next-generation antivirus technology to provide protection against even the most advanced threats.
However, when a network event, such as a Web Application Firewall (WAF) or Intrusion Detection System (IDS) alert is the impetus for an alert, correlating endpoint data and identifying and containing the threat is largely a manual process. This allows attackers enough time to begin wreaking havoc on the network.
In this webinar we will explore DFLabs’ Security Orchestration, Automation and Response (SOAR) solution, IncMan SOAR, and Carbon Black Defense, to show how these industry-leading solutions can work seamlessly together to automatically pivot from the network into the endpoint, automatically identifying and containing unknown threats to immediately reduce the risk to the enterprise.
- Carbon Black’s suite of products can improve your security infrastructure
- IncMan SOAR’s automation and orchestration capabilities can increase the efficiency and effectiveness of your security program
- Carbon Black and DFLabs together can reduce incident detection and response times
Storage Switzerland and StorONEApr 3 20193:00 pmUTC60 mins
Most storage consolidation strategies fail because they attempt to consolidate to a single piece of storage hardware. To successfully consolidate storage, IT professionals need to look at consolidation strategies that worked. Server consolidation was VMware’s first use case. It was successful because instead of consolidating hardware, VMware consolidated the environment under a single hypervisor (ESXi) and console (vCenter) but still provided organizations with hardware flexibility. A successful storage consolidation strategy needs to follow a similar formula by providing a single software solution that controls a variety of storage hardware, but that software also has to extract maximum performance and value from each hardware platform on which it sits.
Join Storage Switzerland and StorOne in which we discuss how to design a storage consolidation strategy for today, the future and the cloud.
In this webinar learn:
- The problems with a fragmented approach to storage
- Why storage fragmentation promises to get worse because of AI, ML, and the Cloud
- Why consolidating to a single storage system won’t work
- Why hyperconverged architectures fall short
- Why Software Defined Storage falls short
- Why the organization needs a Storage Hypervisor
Toby Owen, CTO and Don Barlow, COOApr 3 20193:00 pmUTC60 mins
The recent merger of Hostway and HOSTING didn’t just multiply our office space and workforce. More importantly, it’s allowed us to meld our most valuable offerings and the expertise of each company to provide a healthy list of unmatched products and services.
This is a particularly critical time for IT organizations as they come to grips with the fact that the “easy migration” to public cloud preached a few years ago is not so simple. And “One-size-fits-all” is a risky and costly approach to take when you’re trying to control IT spend, maintain compliance, and stay secure—all while bringing real value to the entire business.
During this 45-minute webinar, two Hostway|HOSTING technology experts will share our most exciting combined services, including:
Monitoring Insights: Offering an unmatched, game-changing single view of your infrastructure, operating systems, and applications.
Guidance Level Agreements (GLAs): Uniquely going ten steps further than standard SLAs to offer a regular cadence of actionable recommendations that guarantee positive outcomes.
Critical Availability Services: Offering the BEST availability guarantee in the industry.
Database Services: Not many companies in our space also offer full data lifecycle management capabilities. A service not to be understated, Gartner Analysts have found that nearly 90% of businesses have little or no analytics expertise in house.
David Tsuen, IT Manager for the City of MontebelloApr 3 20195:00 pmUTC60 mins
With over 8 million passengers annually, ensuring safety is a paramount requirement for Montebello Bus Lines. Mobile video surveillance with real time monitoring was a long-sought goal, but presented significant challenges.
Join this webinar on Apr 3rd @ 10am PST to learn from David Tsuen, IT Manager for the City of Montebello how they met this challenge with a solution that provided:
- Real time on-bus video monitoring
- Video and operational data recording
- Data analytics framework
Learn how technologies such as object storage and enriched metadata provided real-world solutions for Montebello to ensure public safety while staying within budget.
Simon Matthews, Microsoft Licensing Consultant - SoftwareONEApr 4 20199:00 amUTC45 mins
As part of any technology migration or upgrade it is highly recommended to also consider the licensing and commercial options with the technical planning.
SQL & Windows Server can be one of the most challenging products to upgrade or migrate due to the mission critical data that is typically being processed on the machines – and SQL’s licensing rules only adds further complexity!
Simon Matthews, an experienced Microsoft licensing consultant from SoftwareONE, will help you navigate the key licensing and commercial considerations, including:
•New licensing rules since SQL 2008 and overarching changes such as ‘Passive’ and ‘Licence Mobility’
•The role and importance of Software Assurance
•Licensing for staying on-premise
•Licensing for cloud migrations
After this session you will have greater clarity on how to plan your migration and upgrade strategies.
Steve Durbin, Managing Director, ISF LTDApr 4 201912:00 pmUTC45 mins
Driven by demands for increased speed, automation and efficiency, organisations are about to face a period of significant technological upheaval. Digitisation promises much, and development of the next generation of technologies will bring significant benefits to business and society. To survive in the digital world organisations will have to adapt. To thrive, they will need to evolve. Exploiting digital interconnectivity, competing in the digital arena while understanding the implications of a digital cold war will all become business as usual challenges for industry over the coming months and years.
In this webinar, Steve Durbin, Managing Director, ISF will identify the key changes to the digital landscape over the next two years, focusing on emerging threats and means of mitigating their impact.
Securing Web Access & Protecting Data with Cloud-Delivered Enterprise Security
Increased cloud adoption, mobile device use, and the dramatic growth in the number of remote and home workers is putting pressure on existing security infrastructures.
In this environment, enterprise security teams are wrestling with questions like:
- How can I consistently enforce policies governing the use of the web and cloud?
- How can I effectively protect my users from web-based threats?
- How can I secure my sensitive data and comply with legal regulations?
Enterprises are turning to a comprehensive cloud-delivered security solution to tackle these challenges.
Join us to learn how Symantec’s Cloud Security Services can be leveraged to protect users, data and devices, addressing the challenges of the cloud generation.
Pat Patel, Money20/20 | Drew Graham, Standard Chartered Bank | Megan Caywood, Starling BankApr 4 20191:00 pmUTC60 mins
Innovation has quickly become an overused and distorted word. At Money20/20 Europe expect to cut through the hype, explore what measurements we can use to benchmark innovation and get to the heart of sustainable and commercial step change. A key question which has moved back up the C-Level agenda of established; banks, tech companies and payments companies is:
"How can incumbents deliver meaningful game-changing innovation?"
There are three options available for incumbents, and at Money20/20 Europe we’ll be developing deeper into each one:
1. Can organisations transform their cultures to execute true innovation internally within their organisations? (cultural transformation)
2. Perhaps tech transformation is the way forward, partnering or acquisitions to do so?
3. Or do they need to achieve business model transformation by building something entirely new outside of the organisation?
These options are being heavily debated in boardrooms throughout Europe, with a number of high profile banks recently announcing plans to build brand new subsidiaries. Some of the traditional banks, payments and tech companies are pursuing a few or all of the options while others are sitting on the fence. Which is most effective and why? What are the dynamics at play that determine success for different types of companies? Hear from the leading companies in our industry as they share their incisive insight on the successes but also the failures and the lessons learned.
Drew Graham, Director, Fintech Strategy & Engagement, Standard Chartered Bank
Megan Caywood, Chief Platform Officer, Starling Bank,
Hosted by Pat Patel, Content Director - Europe + Asia, Money20/20
Jim Bloomfield & Sarah Clapperton - Director, Bloojam Consulting LtdApr 9 201910:00 amUTC30 mins
Reasons to Attend:
The Acuity® for Strategic Sales model has been designed by Business Psychologists to enable organisations to develop high performing salespeople and to recruit new sales talent.
By reviewing credible research from 30 years of scientific studies into sales behaviours, the Acuity® for Strategic Sales model identifies the 9 key sales capabilities that determine success. Aimed at Sales Directors and Sales Managers this webinar will share with you how you can measure these sales capabilities in your team to drive sales performance.
Environmental drivers that require a change in sales behaviours
What to look for in your sales teams:
•Personal Drive- Describes why an individual enjoys sales activities and whether they will seek to perform at a consistently high level.
•Sales Focus- Describes what the individual does to understand the client and the relevant economic and industry drivers, to use this knowledge to provide insight and solve customer problems, and to seize opportunities to create momentum in the sale.
•Interpersonal Insight- Describes how the individual interacts with the customer, through appreciating the perspective of the other party, modifying their behaviour in a way that is appropriate to the situation and developing relationships and connections internally and externally.