Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Business Continuity Management and Resiliency for 2020 and Beyond
    Business Continuity Management and Resiliency for 2020 and Beyond
    Sam Abadir, Lockpath Recorded: Oct 17 2019 48 mins
    Business interruptions can hurt an organization's reputation, decrease revenue and loose customer trust. Business continuity and resiliency plans detail the impact of various disaster scenarios and creates a solution for ensuring critical operations remain open during a crisis.

    In this live webinar, Lockpath’s Sam Abadir will share what business continuity and resiliency management for 2020 and beyond looks like, including:

    • What areas business continuity management and resiliency encompasses

    • How your organization can gain efficiency from proper business continuity and resiliency management

    • Advantages of managing business continuity and resiliency on an Integrated Risk Management or Governance Risk and Compliance platform

    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage business continuity and resiliency in 2020 and beyond by attending this educational webinar. Register now!
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Oct 17 2019 33 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Becoming a Leader: An Inside Look at a Level 4 Threat Hunting Program
    Becoming a Leader: An Inside Look at a Level 4 Threat Hunting Program
    Casey Smith Director of Applied Research & with Brian Baskin Technical Director of Threat Research @ Carbon Black Recorded: Oct 17 2019 60 mins
    What is required to take your threat hunting program to the highest level of maturity? Using Red Canary as a case study, this session will provide a behind-the-scenes look at how to bring together MITRE ATT&CK™, CB Response, and Atomic Red Team to analyze massive amounts of data and quickly detect adversaries. This webinar also features David J. Bianco's threat hunting maturity model.

    Attendees will learn how to:

    - Automate the majority of successful data analysis procedure
    - Map adversary techniques to detection coverage
    - Test, validate, and continuously improve visibility
    - Make threat hunting a repeatable process that drives better security outcomes
  • Live Demo: Foundations of People-Centric Cybersecurity
    Live Demo: Foundations of People-Centric Cybersecurity
    Joel Sierra, Sales Engineer at Proofpoint Recorded: Oct 16 2019 39 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the first phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1.Protect your people from email-based attacks
    2.Gain visibility into who in your organization is getting the most attacks
    3.Solve for user awareness through threat simulation and training
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    K. Eric Gentry, Managing Principal, VTRAC Recorded: Oct 16 2019 79 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the social attacks and the current cybersecurity threat landscape.

    We’ll cover:
    •The most common social engineering attacks
    •New insights on phishing attacks
    •Top threat actors in social attacks

    Our Verizon Threat Research Advisory Center presenters will be:
    •K. Eric Gentry, Managing Principal, VTRAC
    •David Kennedy, Managing Principal, Open Source Intelligence

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
  • What Happens When Your Bank is Hacked?
    What Happens When Your Bank is Hacked?
    David Morris, Lance James, Steven Teppler, and Mark Rasch Recorded: Oct 15 2019 61 mins
    This session will delve into the legal responsibilities of your Bank's liability and your requirements to protect your banking credentials from the unauthorized transfer of funds as a result of a hack.
  • Live Interview with Graeme Payne, former VP and CIO of Equifax
    Live Interview with Graeme Payne, former VP and CIO of Equifax
    David Morris, Graeme Payne and Reid Eastburn Recorded: Oct 14 2019 61 mins
    Tune in for this live interview with Graeme Payne, former VP and CIO for Global Corporate Platforms at Equifax. This session will give you first hand insights into what happened at Equifax, and lessons learned.
  • Understanding Agent vs. Agentless backups to better protect your VM’s with the b
    Understanding Agent vs. Agentless backups to better protect your VM’s with the b
    Jaap Van Kleef, EMEA Technical Manager Recorded: Oct 17 2019 49 mins
    Companies of all size are running heterogeneous environments, with physical and virtual servers. As a result, every so often, IT professionals hesitate between deploying agent-based or agentless backup solutions. There is no right or wrong answer; it all depends on your requirements and objectives.

    Join our StorageCraft expert, Jaap van Kleef, and learn how you can best protect your VMs and physical machines and keep the business running at all times!
  • ¿Cómo migrar copias de seguridad Legacy a la nube con Commvault?
    ¿Cómo migrar copias de seguridad Legacy a la nube con Commvault?
    Jose Luis Garcia, Commvault Recorded: Oct 10 2019 22 mins
    ¡Es hora de apagar su copia de seguridad heredada o legacy! Commvault mueve esos datos antiguos a la nube de forma segura.

    ¿Sigue pagando mantenimiento en los sistemas de respaldo antiguos solo porque no está seguro de qué hacer con ese conjunto de datos de respaldo y archivado que aún deben mantenerse para cumplir con los requisitos de cumplimiento o retención? ¿Qué pasaría si pudiera migrar esas copias de seguridad y archivos directamente a la nube mientras conserva los metadatos importantes, como las fechas y horas de retención originales?

    Únase a Commvault para aprender cómo mover las copias de seguridad y los archivos de los sistemas heredados o legacy, y almacenar ese conjunto de datos y cargas de trabajo directamente en el almacenamiento en la nube.

    Nuestros expertos en la materia técnica explicarán cómo la plataforma Commvault puede capturar automáticamente copias de seguridad y archivos legacy para la migración a la nube. Aprenda cómo mover copias de seguridad a la nube desde cualquiera de estos sistemas:

    Veritas NetBackup
    Veritas BackupExec
    IBM Spectrum Protect, anteriormente llamado Tivoli Storage Manager (TSM)
    Dell EMC NetWorker
    Dell EMC Avamar
    Administrador de protección de datos de Microsoft (DPM)
    Microfocus Data Protector, anteriormente HP Data Protector
    No necesita mantener ese antiguo sistema funcionando en la esquina "por si acaso". Aprenda cómo optimizar su carga de trabajo de TI, proporcionar una mejor disponibilidad de datos e incluir sus copias de seguridad legacy en la búsqueda empresarial.
  • Настраиваем файловую архивацию или как экономить место на файловых серверах
    Настраиваем файловую архивацию или как экономить место на файловых серверах
    Дмитрий Иванюк, эксперт по решениям Commvault Recorded: Oct 10 2019 50 mins
    Уважаемые коллеги!

    Приглашаем Вас и Ваших коллег принять участие в вебинаре «Настраиваем файловую архивацию или как экономить место на файловых серверах».

    Дата: 10 октября
    Время проведения: 11.00-12.00
    Тренер: Дмитрий Иванюк, эксперт по решениям Commvault.

    Курс предназначен для технических специалистов, но будет интересен и менеджерам по продукту.

    В процессе вебинара мы расскажем:
    •Что такое архивация
    •Настройка архивации в Commvault
    •Запуск заданий
    •Работа со stub
    •Реакция пользователей
    •Q&A

    Не упустите возможность узнать больше!
  • 7 Steps to Automating Threat Detection and Analysis
    7 Steps to Automating Threat Detection and Analysis
    Josh Rickard, Security Research Engineer, Swimlane and Nick Tausek, Security Research Engineer, Swimlane Recorded: Oct 8 2019 45 mins
    There are numerous cybersecurity tools available to help organizations detect threats. But, this volume creates a number of challenges, including siloed and disparate systems. While these tools are intended to improve the organization’s security posture, many of them require sophisticated staff with complex training to leverage them effectively. Sometimes, even with training, systems generate so many alerts the highly-skilled staff is unable to analyze and respond to real threats in a timely manner. This is not sustainable for even the largest security operations center (SOC). A holistic, automated approach to threat detection and analysis is necessary.


    In this webinar, Swimlane’s Josh Rickard will provide seven steps to automate threat detection and analysis that can be used in any-sized SOC. This process enables analysts to stop focusing on detection and focus instead on a proactive SOC model, improving the security posture of the organization and dramatically reducing threat risk. You will learn how to:

    - Monitor everything within your security stack;
    - Build a system that can automatically detect every form of attack;
    - Improve your ability to detect attacks and avoid false positives;
    - Detect security threats in real time;
    - And more!
  • Key Considerations for Your Future Email Security Solution
    Key Considerations for Your Future Email Security Solution
    Cheryl Tang, Product Marketing Director Recorded: Oct 8 2019 50 mins
    The Broadcom acquisition of Symantec’s Enterprise Security Business creates uncertainty for your email security strategy. Unsettled by the acquisition, many Symantec email security customers are reevaluating their email security solution. As you evaluate your options, you may be wondering what critical capabilities your next email security solution must have. One thing is certain. With today’s threat actors continually refining their tactics, you need an email security solution that can keep pace with today’s rapidly changing threat landscape. But what else do you need to defend against the No. 1 threat vector?

    Join Proofpoint for an educational webinar to learn:

    - What the threat landscape looks like today
    - What key capabilities you should look for to future proof your email security
    - How Proofpoint we’ve helped customers with their email security
  • Implementing and Leveraging Multi-cloud and Second Generation Cloud Strategies
    Implementing and Leveraging Multi-cloud and Second Generation Cloud Strategies
    Storage Switzerland, Wasabi Recorded: Oct 8 2019 19 mins
    Many businesses are eager to initiate a cloud migration strategy and take advantage of the economic benefits that clouds offer. However, concerns regarding vendor lock-in, proprietary technology, and hidden costs have served as a deterrent for a large number of IT managers. The answer for a growing number of businesses is a multi-cloud strategy where they can create a cloud solution that is tailored to their specific needs. Giving enterprises the ability to choose the computer, storage, and SaaS services that best fits their business requirements and budget puts them in the driver's seat and gives them full control.

    Join Storage Switzerland and Wasabi where we will discuss the challenges with the soup-to-nuts clouds and how a best-of-breed multi-cloud solution is a better strategy for most organizations.

    Register Today - All registrants receive a copy of Storage Switzerland’s latest eBook “What is a Second-Generation Cloud Strategy?”
  • Telefónica Global | inside telecoms - how a digital leader excels with RPA
    Telefónica Global | inside telecoms - how a digital leader excels with RPA
    Donna Edwards, Global Customer Reference Programs Director, Blue Prism Recorded: Oct 8 2019 53 mins
    As one of the world’s largest telecommunications companies, Telefónica sets the standard in pioneering deeper and broader digital transformation - across an industry that must constantly innovate, to meet ever-changing, customer needs. A key element of this agile, forward-thinking company’s strategy is connected-RPA, which is being deployed globally across a number of business units, to help optimize the customer experience - while generating greater operational efficiencies, productivity boosts and reduced back office costs too.

    The Telefónica team will discuss how they deliver a global program of automation and digitalization - reaching a scale like few others - optimizing critical business processes across the group that include; ‘trouble ticketing analysis’ and ‘resolution and deactivation of old tariffs’. They’ll also discuss how they’re adding greater intelligence to automation to solve more complex problems – and how they are industrializing their activities to tackle a wider range of opportunities and meet highly ambitious goals.

    In this webinar you’ll find out:

    • How to create a global CoE that best manages large-scale, sustainable, digital worker deployments
    • How to boost connected-RPA’s value by integrating intelligent technologies which include; OCR, NLP, virtual agents and machine learning algorithms
    • Real-life examples of use-cases of improved customer experience and back office efficiencies
    • Lessons learned - what worked and what didn’t – along Telefónica’s connected-RPA journey

    Speakers:
    • Flavio Reis, Global Head of Process Digitalization,Telefónica
    • Francisco Javier Jiménez de la Vega, Global Digital Transformation Manager, Telefónica
    • Donna Edwards, Global Customer Reference Programs Director, Blue Prism
  • The 2019 Dell Commercial Client Solutions Lineup
    The 2019 Dell Commercial Client Solutions Lineup
    Cameron Goedde - Client Solutions Field Marketing | Dell EMC Recorded: Oct 4 2019 42 mins
    Smarter & faster experiences are the driver behind Dell’s 2019 Client Solutions lineup. We have the broadest portfolio to meet all needs. From highly configurable fixed solutions – our OptiPlex desktops and AIOs and our Wyse Thin clients. To the smallest, lightest mobile solutions including Latitude and the XPS to specialty systems – our powerful Precision workstations, including towers, racks and mobile workstations and finally our Rugged devices. We also have a full portfolio of displays and accessories to help build your entire ecosystem.

    Presented by: Cameron Goedde - Client Solutions Field Marketing, Dell EMC
  • [Earn 1 CPE]  CCPA 101: What is It, and How Will It Impact Your Organization?
    [Earn 1 CPE] CCPA 101: What is It, and How Will It Impact Your Organization?
    Speakers: Jannie Wentzel, Risk Management Professional; and Kerwyn Velasco, Product Manager - Riskonnect Recorded: Oct 3 2019 73 mins
    The California Consumer Privacy Act goes into effect January 1, 2020. If you are a for-profit company operating in the state of California, you need to have the right processes in place to support CCPA privacy requirements – or face stiff penalties. Are you ready?

    Attend this CPE accredited webinar to understand what is required by the CCPA, what you need to do now to prepare, how it relates to the rest of your compliance program, and what other privacy laws are on the horizon.

    You’ll learn:

    - What types of companies are affected by CCPA
    - How CCPA compares to GDPR
    - How technology can help you comply with privacy laws
  • Live Demo: Security Awareness Training
    Live Demo: Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Oct 3 2019 28 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Testing Visibility to Develop an Innovative Threat Hunting Program
    Testing Visibility to Develop an Innovative Threat Hunting Program
    Joe Moles VP, Customer Sec Ops & Adam Mathis Security Practitioner @ Red Canary, Jimmy Astle Threat Researcher @ Carbon Black Recorded: Oct 3 2019 63 mins
    Do you have the visibility you need to hunt for adversary techniques? Increasing the quality and quantity of data analysis requires a robust set of tools, techniques, and practices. Learn how to use the MITRE ATT&CK™ framework, CB Response, and Atomic Red Team to hunt for adversary techniques and build functional tests to understand visibility.

    This hands-on technical session will demonstrate how to:

    - Hunt for frequently used ATT&CK techniques with CB Response
    - Measure and improve visibility with Atomic Red Team tests
    - Turn new intelligence into hunting criteria
    - Investigate data that can support a judgment call on whether activity is malicious or benign
  • 2019 Human Factor: Today's Cyber Attacks Target People - How to Keep Them Safe
    2019 Human Factor: Today's Cyber Attacks Target People - How to Keep Them Safe
    Patrick Wheeler, Director of Threat Intelligence, Proofpoint Recorded: Oct 2 2019 52 mins
    More than 99% of attacks we see in cybersecurity require some form of human interaction to succeed. The "Human Factor" of curiosity and trust that leads well-intentioned people to install malware, transfer money or hand over sensitive data is simply more reliable and lucrative to cyber criminals than expensive and quickly patched automated exploits. So how can you better protect yourself, your organization, and your end users from attacks that rely more on social engineering than system vulnerabilities?

    Join our Director of Threat Intelligence, Patrick Wheeler, as we examine the key findings of Proofpoint's 2019 Human Factor Report. We'll take a close look at how threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that trick even savvy users.

    In this session we'll share:

    - Trends in volume and types of attacks, providing useful insights for both defenders and organizations
    - Refined techniques and new platforms used by attackers
    - The latest targets that make up an expanding attack including as Office 365 and other cloud accounts, as well as the schemes to which users are most likely to respond
    - The evolution of business email compromise and impostor threats
    - Best practices for layered defenses and user training when, in fact, end users represent the last line of defense against these threats

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • NAS vs Object - Can NAS Make a Comeback?
    NAS vs Object - Can NAS Make a Comeback?
    Storage Switzerland, Qumulo Recorded: Oct 2 2019 58 mins
    For over a decade Network Attached Storage (NAS) was the go to file storage device for organizations needing to store large amounts of unstructured data. But unstructured data is changing. While large file use cases are still prevalent, small file use cases are becoming more dominant. Workloads like artificial intelligence, analytics and IoT are typically driven by millions, if not billions of small files.

    Object Storage is often hailed as the heir apparent but is it? Can file systems be redesigned to continue to support traditional NAS workloads while also supporting modern, small file and high velocity workloads? Join Storage Switzerland and Qumulo for our live webinar, “NAS vs. Object — Can NAS Make a Comeback,” to learn the state of unstructured data storage and if NAS file systems can provide a superior alternative to object storage.

    Join us on our live event to learn
    •. Why traditional NAS solutions fall short
    •. Why object storage systems haven't replaced NAS
    • How to bridge the gap by modernizing NAS file systems
    •. Live Q&A with file system and NAS experts
  • Misurare e migliorare l’efficacia degli investimenti cyber con FireEye/Verodin.
    Misurare e migliorare l’efficacia degli investimenti cyber con FireEye/Verodin.
    Marco Riboli, Vice President, Southern Europe, FireEye e Gabriele Zanoni, Systems Engineer, Italia, FireEye Recorded: Oct 2 2019 43 mins
    Verodin ha sviluppato una tecnologia di “Security Instrumentation” per valutare l’efficacia dei sistemi di sicurezza. Con Verodin, FireEye estende la propria capacità di aiutare i clienti ad adottare un approccio proattivo nell’identificazione e nella mitigazione dei rischi dovuti ad errate configurazioni, ad inefficienze nei prodotti o processi di sicurezza in azienda.
    Verodin mette alla prova i sistemi di security come SIEM, FW,Proxy, Endpoint, Email, DLP, Cloud etc… e suggerisce le attività di Remediation; rimuove i presupposti e permette di valutare oggettivamente l’esposizione agli attacchi, grazie al monitoraggio ed al test dei prodotti e dei processi di sicurezza.

    Registrati al webinar e scopri come FireEye grazie alle nuove funzionalità Verodin:
    •Valuta la priorità sugli investimenti Security in relazione all’esposizione alle minacce.
    •Fornisce uno strumento per massimizzare gli investimenti già fatti con indicazioni su come ottimizzare i prodotti sia On-Premise sia in Cloud.
    •Fornisce Allarmi su cambiamenti non tracciati o non voluti che potrebbero comportare un aumento del rischio di attacchi sia On-Premise sia in Cloud.
    •Estende il perimetro ai sistemi Scada e ICS, verificando le comunicazioni fra le reti OT ed IT e dando prova delle effettive restrizioni.
    •Permette di verificare le Golden Image aziendali e gli Endpoint rispetto ad attacchi distruttivi come quelli Ransomware.
    •Permette di verificare la bontà dei sistemi DLP e di effettuare test automatizzati e replicabili di Data Exfiltration.

    Il risultato è di estremo interesse per i SOC Manager, i CISO e il Board.

    Registrati al webinar ORA!
  • Да  се справим с най-напредналите заплахи  чрез технологиите на FireEye
    Да се справим с най-напредналите заплахи чрез технологиите на FireEye
    Zlatomir Milanov, System Engineer, Computer 2000 Recorded: Oct 1 2019 60 mins
    Все някога може да се случи някой от вашата организация по невнимание да стане брънка във веригата от събития, водещи до кибератака. Някой може да отвори злонамерен имейл, 90% от кибератаките започват с ЕДИН ИМЕЙЛ! Заплахите могат да влизат и през крайните точки и да се движат през Вашата мрежа, повишавайки неправомерно правата на потребителите, провеждайки разузнаване и крадейки данни.

    Само технологията сама по себе си не е достатъчна за борба с киберзаплахите. FireEye използват уникален иновационен цикъл, който комбинира технологии с доказано световно качество, безпрецедентна техническа и разследваща експертиза, придобити директно от „фронтовата линия“, включително услуги от световен клас, както и информация за новите заплахи, която никой друг не успява да събере!

    Екосистемата FireEye съчетава пълен набор от възможности за откриване, защита и разследване чрез Network, Endpoint, and Email Security Solutions!
    Присъединете се към този уебинар, по време на който системният инженер от КОМПЮТЪР 2000 България Златомир Миланов ще разкаже и демонстрира как заплахите в дадена организация могат да бъдат открити с помощта на технологията FireEye за мрежи, крайни точки и електронна поща, показвайки сценарии за атаки от различни гледни точки, както и как разузнаването допълва технологията.
  • Quantifying Mobile Risk in the Enterprise
    Quantifying Mobile Risk in the Enterprise
    Phil Hochmuth, Program Vice President, Enterprise Mobility at IDC Recorded: Oct 1 2019 21 mins
    Protect your organization from threats targeting your corporate data. In today's webinar, our guest speaker Phil Hochmuth, Program Vice President, Enterprise Mobility at IDC will discuss:
    - How organizations are preparing for digital transformation
    - What are the security priorities for CISOs through 2020
    - What platforms and technologies are seen as high risk for the next 5 years
    - What are the key mobile threats that organizations are seeing
    - How are organizations addressing these threats
  • Настраиваем Commvault с помощью Command Center
    Настраиваем Commvault с помощью Command Center
    Дмитрий Иванюк, эксперт по решениям Commvault Recorded: Oct 1 2019 58 mins
    Уважаемые коллеги!

    Приглашаем Вас и Ваших коллег принять участие в вебинаре «Настраиваем Commvault с помощью Command Center».

    Дата: 26 сентября
    Время проведения: 11.00-12.00
    Тренер: Дмитрий Иванюк, эксперт по решениям Commvault.

    Курс предназначен для менеджеров по продукту, архитекторов, инженеров, администраторов.

    В процессе вебинара мы рассмотрим:

    ∙ Технический обзор архитектурных особенностей
    ∙ Технические возможности процедур поиска и устранения неисправностей
    ∙ Установка и настройка
    ∙ Q&A

    Присоединяйтесь, будет интересно!
  • Quantifying Mobile Risk in the Enterprise
    Quantifying Mobile Risk in the Enterprise
    Phil Hochmuth, Program Vice President, Enterprise Mobility at IDC Recorded: Sep 30 2019 21 mins
    Protect your organization from threats targeting your corporate data. In today's webinar, our guest speaker Phil Hochmuth, Program Vice President, Enterprise Mobility at IDC will discuss:
    - How organizations are preparing for digital transformation
    - What are the security priorities for CISOs through 2020
    - What platforms and technologies are seen as high risk for the next 5 years
    - What are the key mobile threats that organizations are seeing
    - How are organizations addressing these threats
  • The 2019 Dell Commercial Client Solutions Lineup
    The 2019 Dell Commercial Client Solutions Lineup
    Cameron Goedde - Client Solutions Field Marketing | Dell EMC Oct 18 2019 3:30 pm UTC 42 mins
    Smarter & faster experiences are the driver behind Dell’s 2019 Client Solutions lineup. We have the broadest portfolio to meet all needs. From highly configurable fixed solutions – our OptiPlex desktops and AIOs and our Wyse Thin clients. To the smallest, lightest mobile solutions including Latitude and the XPS to specialty systems – our powerful Precision workstations, including towers, racks and mobile workstations and finally our Rugged devices. We also have a full portfolio of displays and accessories to help build your entire ecosystem.

    Presented by: Cameron Goedde - Client Solutions Field Marketing, Dell EMC
  • Die Cloud ist sicher, Ihre Konfiguration ist es möglicherweise nicht!
    Die Cloud ist sicher, Ihre Konfiguration ist es möglicherweise nicht!
    Maximilian Bode, Sales Engineer, FIreEye Oct 22 2019 9:00 am UTC 45 mins
    Wussten Sie, dass Angreifer die eDiscovery-Funktionen von Office 365 verwenden, um nach vertraulichen Daten zu suchen? FireEye nutzt Regeln, die z.B. speziell auf die Verwendung von eDiscovery und den Export von eDiscovery abzielen, welche in einem regulären Büroalltag im Allgemeinen selten sind.

    Nehmen Sie an diesem Webinar teil, um mehr über FireEye‘s Security Maßnahmen in O365 zu erfahren. FireEye’s Sales Engineer Maximilian Bode teilt:

    Einblicke in Microsoft Azure Events
    - Azure Audit und Azure AD
    - MS Exchange und Office365

    Schaffen Sie Transparenz: Durch Erkennung von Anomalien in Logs kann der Diebstahl von Anmeldeinformationen identifiziert werden. Wir zeigen Ihnen, wie Sie verdächtige Ereignisse und kritische Konfigurationen durch die Verwendung von Regeln erkennen.
  • Part 1: Why State and Local Governments are Prime Targets for Ransomware
    Part 1: Why State and Local Governments are Prime Targets for Ransomware
    David Morris, Roy E. Hadley Jr., Reid Eastburn and Skeet Spillane Oct 22 2019 5:00 pm UTC 60 mins
    This session will cover why State and Local Governments have headed the list of Ransomware Attacks. Part 1 will delve into why is this the case and Part 2 will address what can be done to prevent these attacks.
  • Start saving money with Cloudian for VMware vCloud Director
    Start saving money with Cloudian for VMware vCloud Director
    Ulrich Slothuus, Anders Agren Oct 25 2019 9:30 am UTC 30 mins
    In this 30-minute webinar, you can learn how Cloudian object storage and VMware vCloud Director enables VMware cloud providers and their tenant users to deploy, manage and consume S3-compatible storage within their services environment.

    For cloud providers, this opens the door to new service revenue streams with use cases like data protection, big data, healthcare, media archives, video surveillance, and more. For their tenant customers, it delivers a best-in-class object storage service that is fully integrated and delivered through their preferred cloud management platform.

    Benefits include:
    Proven interoperability with the S3 API
    Native integration with vCloud Director
    vCD virtual appliance deployment model
    Limitlessly scalable storage within a single namespace
    Self-service storage management for customers
  • Part 2: What can State and Local Governments do to Prevent Ransomware?
    Part 2: What can State and Local Governments do to Prevent Ransomware?
    David Morris, Reid Eastburn and Skeet Spillane Oct 29 2019 5:00 pm UTC 60 mins
    This session will be a short recap of Session 1 and will then go into detail as to what State and Local Governments can do to prevent Ransomware Attacks.
  • The Future of Work and Working with Nancy Giordano
    The Future of Work and Working with Nancy Giordano
    Nancy Giordano, Strategic Futurist Corporate Strategist TEDx Austin Curator Oct 29 2019 5:00 pm UTC 50 mins
    Whether we have more jobs or less is a debate only time will settle, but there is no doubt 100% of jobs will be re-skilled. HOW we work and WHY is currently being recalibrated. Society overall will take a radical shift as we head into what has been described as the Fourth Industrial Revolution.

    In this session, Nancy will talk through how new tools will shape new behaviors and drive new expectations, which old practices to manage risk are actually now putting us at risk, and how we will measure that we’re doing it right.

    About the speaker:
    Nancy Giordano is a strategic futurist with a passion for helping organizations and leaders transform to meet the escalating expectations ahead. Recognized as one of the world’s top female futurists, she's spent her career driving important conversations on the future of tech, business, and society.
  • Live Demo: Ramping Up People-Centric Cybersecurity
    Live Demo: Ramping Up People-Centric Cybersecurity
    Joel Sierra, Sales Engineer at Proofpoint Oct 30 2019 5:00 pm UTC 45 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the second phase of this maturity model, and see for yourself how the tools work. We'll discuss how to:

    1. Identify and remediate account compromise attacks
    2. Solve for data loss through email
    3. Make your users more resilient against attacks through awareness training
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Oct 31 2019 4:00 pm UTC 45 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • [Earn CPE] Key Steps to Mature Your Third-Party Risk Management Program
    [Earn CPE] Key Steps to Mature Your Third-Party Risk Management Program
    Colin Whittaker with Todd Boehler, Process Unity; Jason Sabourin, OneTrust; Mark Deluca, Coupa; and Chris Poulin, BitSight Oct 31 2019 5:00 pm UTC 75 mins
    High-Profile Data Breaches have placed a spotlight on the risk of cyber security breaches with vendors and subcontractors, expanding the need to have greater rigor in third party risk management and ongoing risk assessments. Maintaining an effective third-party risk management program doesn't happen overnight. It's a journey that involves continual learning, refinement and evolution.

    And as a program matures over time, it results in the management of vendors and other third parties with fewer risks, lower costs, better performance and stronger compliance. Since every company is at a different place in their journey towards better vendor management, it's important to identify steps that you can follow as you mature your program, and to consider your vendor risk ecosystem and the data and services that can have an enormous impact on risk reduction. On this CPE accredited webinar our panel of experts will address some key steps to mature your third-party risk management program, including how to:

    - Create a third-party risk-management maturity roadmap.
    - Connect with enterprise systems to create a centralized data repository and enable seamless vetting activities across processes
    - Incorporate external content sources for a more wholistic view of your vendors plus more sustainable ongoing monitoring
    - Strengthen and streamline your third-party risk management efforts.
  • Understanding Fibre Channel Scaling
    Understanding Fibre Channel Scaling
    Mark Rogov, Dell EMC; Brandon Hoff, Broadcom; J Metz, Cisco Nov 6 2019 6:00 pm UTC 75 mins
    One of Fibre Channel’s greatest strengths is its ability to scale to thousands and thousands of nodes, while providing predictable performance. So, when we say that Fibre Channel has unmatched scalability, what does that actually mean? And how does it work?

    We often hear about “designed from the ground up,” but in this case it’s actually true. From each individual link, to the overall domain architecture, each step along the way is intended to be approached in a scalable fashion.

    In this webinar, we’ll be breaking down the pieces of the puzzle that help give Fibre Channel its robustness when you’re working at fabrics even greater than 10,000 nodes. We’ll be talking about:

    •What a deterministic storage network is
    •Fabric management principles
    •Negotiated credit transfers (buffer-to-buffer credits)
    •Network Engineering/Design Principles
    •Oversubscription and Fan-In Ratios
    •Topologies that help scale
    •Domains and Fabric limits
    •Consistency of performance at scale

    Along the way, we’ll be talking about some of the ways that Fibre Channel differs from other popular storage networks as they approach large-scale environments, and how it handles issues that arise in such cases.

    Please join us on November 6th at 10:00 am PT/1:00 pm ET for another educational webinar on Fibre Channel!
  • Operational Risk Management for 2020 and Beyond
    Operational Risk Management for 2020 and Beyond
    Sam Abadir Nov 6 2019 5:00 pm UTC 60 mins
    Operational risks have been constantly increasing due to immature processes, unmanaged third parties and more. With the growing number of complex products and services, this issue is intensified, and traditional operational risk management can't keep up.

    In this live webinar, Lockpath’s Sam Abadir will share what operational risk management for 2020 and beyond looks like, including:

    • What areas operational risk management encompasses

    • How your organization can gain efficiency from proper operational risk management

    • Advantages of managing operations on an Integrated Risk Management or Governance Risk and Compliance platform

    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage operational risk in 2020 and beyond by attending this educational webinar. Register now!
  • We want to save YOU 70% of your infrastructure costs.
    We want to save YOU 70% of your infrastructure costs.
    Björn Kjellin Hård, Ulrich Slothuus Nov 8 2019 10:30 am UTC 30 mins
    The growth of machine and unstructured data is breaking the distributed scale-out mode that combines compute and storage in the same devices and limits your flexibility to choose the ideal resources for each. This drives up costs and makes it more difficult to accommodate growing data storage and analytics demands.

    Please join Splunk and Cloudian for an informative webinar to learn how SmartStore and HyperStore can:

    Independently scale compute and storage resources
    Reduce storage costs by up to 70%
    Simplify indexer updates (new cluster can inherit data from the original)
    Directly integrate with public cloud
    Attain built-in data protection

    Cloudian is Part of the Splunk Technology Alliance Program

    By using Splunk SmartStore it let’s you decouple the compute and storage layers, so you can independently scale those resources to best serve workload demands. With SmartStore, Splunk Indexers retain data only in hot buckets that contain newly indexed data. Older data resides in the warm buckets and is stored within the scalable and highly cost-effective Cloudian cluster. SmartStore manages where data is stored, moving data among indexers and the external Cloudian storage based on data age, priority and users’ access patterns. As of today, clients can immediately achieve a 70% saving on Splunk Infrastructure.
  • Live Demo: Advanced People-Centric Cybersecurity
    Live Demo: Advanced People-Centric Cybersecurity
    Joel Sierra, Sales Engineer at Proofpoint Nov 12 2019 6:00 pm UTC 45 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1. Gain deeper visibility into attacks and respond when things go wrong
    2. Solve for unified data protection
    3. Defend against email fraud and social media fraud
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Nov 14 2019 5:00 pm UTC 45 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Adam Harrison, Cryptocurrency Nov 20 2019 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Adam Harrison, Principal Consultant, PS Advisory Services
    •David Kennedy, Managing Principal, Open Source Intelligence

    This month's theme: Cryptocurrency

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Dec 5 2019 5:00 pm UTC 45 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • [Earn CPE] Critical Steps to Manage CCPA Compliance and Risk in 2020
    [Earn CPE] Critical Steps to Manage CCPA Compliance and Risk in 2020
    Panelists: K Royal, TrustArc; Ilia Sotnikov, Netwrix, and a speaker from LogicGate. Dec 17 2019 6:00 pm UTC 75 mins
    The California Consumer Privacy Act of 2018 (CCPA) is arguably the most expansive privacy law in U.S. history and will become enforceable in just a matter of months. The CCPA introduces new privacy rights for consumers and will force companies that conduct business in the State of California to implement structural changes to their privacy programs.

    The new rights given to California consumers are similar to the rights provided in the European Union’s General Data Protection Regulation (GDPR). The CCPA also subjects non-compliant businesses to expensive fines, class-action lawsuits, and injunctions.

    On this webinar, we will examine the impact of the CCPA, answer your burning questions, uncover the CCPA’s nuances, and address its ambiguities and challenges. We will also include strategies for creating compliance programs in the midst of the unknowns, and a strategic action plan for businesses to become compliant.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Eric K. Gentry, Principal Consultant, PS Advisory Services Dec 18 2019 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Eric K. Gentry, Principal Consultant, PS Advisory Services
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Dec 19 2019 5:00 pm UTC 45 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Live Interview with Reid Eastburn
    Live Interview with Reid Eastburn
    David Morris and Reid Eastburn Dec 25 2019 5:00 pm UTC 90 mins
    Tune in for this live interview with Reid Eastburn
  • Proactive Threat Hunting
    Proactive Threat Hunting
    David Morris, Zac Blenden, Mark Rasch Dec 27 2019 6:00 pm UTC 75 mins
    This session will feature a live demonstration of Threat Hunting by a cyber threat hunter. In this session, you will see what a Threat Hunter actually does and how it is done.
  • [Earn CPE] Cornerstones to Fortify Your Enterprise Cybersecurity Defense
    [Earn CPE] Cornerstones to Fortify Your Enterprise Cybersecurity Defense
    Moderated by Colin Whittaker, Founder of Informed Risk Decisions Jan 23 2020 6:00 pm UTC 75 mins
    The enterprise cybersecurity landscape is dramatically expanding in scale and complexity, and cyberattacks are growing in magnitude and impact as digital transformation increases on a global scale. From phishing scams, to ransomware attacks, to malicious breaches from state actors, the potential threat to your business is huge. According to the Ponemon Institute, the average per breach cost to a company in 2018 was estimated at $3.86 million, an increase of 6.4 percent over the previous year.

    Even though cybersecurity presents a challenge to the enterprise, you are not helpless against the bad actors who seek to cause real and costly damage to your business. A proactive, company-wide, integrated digital security strategy that addresses cybersecurity threats at all levels of your business will provide you with both the offensive and defensive capabilities you need to handle whatever comes your way. Earn 1 CPE credit by attending this educational and interactive panel webinar. Our experts will discuss why fortifying your cybersecurity strategy should be a critical priority and highlight some best practices that you can employ to stay ahead of evolving threats, including how to;

    - Understand the changing cyberattack landscape,
    - Create a company-wide cybersecurity task force,
    - Evaluate your security budget against your threat level,
    - Fortify your cybersecurity defense with systems hardening, adaptive authentication, and endpoint protection.