Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • webMethods 10.7: Something big is coming—get a sneak peek
    webMethods 10.7: Something big is coming—get a sneak peek
    Subhash Ramachandran, SVP, Product Management, Software AG Recorded: Nov 27 2020 56 mins
    We are excited to announce the launch of webMethods 10.7. In this webinar we will give you a sneak peek into its new capabilities. Please join Subhash Ramachandran, SVP of Product Management, who will present several exciting highlights including:
    - A brand new look for the Integration Server administration and monitoring console
    - AppMesh (leveraging API Gateway & Microgateway) for simplifying service mesh implementations
    - Cross-version support and zero downtime fixes for Universal Messaging
    - B2B and EDI migrations to webMethods.io B2B using Cloud Container
    - Ease of use for Installs and Upgrades

    We will also showcase the evolution of the cloud-based webMethods.io platform including highlights from all of the Integration, B2B and API Management SaaS releases in 2020, including:
    - Multi-cloud & Multi-region availability
    - Multi-persona user experience and smart mapping in webMethods.io Integration
    - Self service trading partner on-boarding in webMethods.io B2B
    - Geo based routing & Zero downtime upgrades for webMethods.io API
    - End-to-end hybrid monitoring across cloud and on-premises
    - New Connectors & Recipes
  • Tech Jam - Deploy New Distance Collaboration and Business Continuity Strategies
    Tech Jam - Deploy New Distance Collaboration and Business Continuity Strategies
    Bob Williamsen Recorded: Nov 26 2020 24 mins
    In this session, we will cover how to move data faster, improve bandwidth utilization and enhance data security, how this new Isilon solution can help Enterprises can implement distance collaboration and business continuity strategies
    Hear about how one of Isilon’s biggest customers was able to improve throughput by 73% and reduce replication time by 42%
    Presenters: Truls Myklebust Product Management, Brocade Storage Networking and Mark Cincotta, Business Development, Dell Technologies Account Team
  • Dynamic IT at the Edge
    Dynamic IT at the Edge
    Matt George, Director Segment Marketing EMEA Recorded: Nov 26 2020 16 mins
    European industrial companies are applying IoT in the context of digitization. Understanding the opportunities this technology offers beyond process optimization and cost savings is crucial for organizations seeking to maximize the value from the IoT data they collect, and to generate innovative business models as a result.
  • Managing secrets sprawl – 3 reasons why you need a root of trust
    Managing secrets sprawl – 3 reasons why you need a root of trust
    John Boero, Sr. Solutions Engineer, HashiCorp and Juan C. Asenjo, Ph.D., CISSP, nCipher Security Recorded: Nov 26 2020 58 mins
    As organizations migrate to the cloud to manage workloads in a more flexible and cost-effective manner, the number of passwords, PINs, keys, tokens, and other secrets used to access application platforms and data is increasing exponentially. Maintaining centralized repositories of secrets enables organizations to apply consistent protection policies that strengthen security and facilitate auditing and compliance.

    This webcast will look at the growing challenge faced when deploying centralized secrets management tools and how to mitigate risks associated with aggregation of sensitive assets. Our speakers will examine how cloud migration, DevOps, and regulatory compliance require a root of trust, and will describe best practices for deploying these solutions.

    Join the webcast and learn:
    • What challenges secrets sprawl represents for organizations
    • How centralized key management ensures consistent policy
    • Why cloud, DevOps, and regulations require a focus approach
    • Where is a root of trust required for high assurance security

    This webinar is for you if you are responsible for:
    1. Managing digital transformation and cloud migration
    2. Overseeing security best practices in your organization
    3. Auditing and ensuring your organizational compliance
  • Using SD-WAN to build a secure digital enterprise | Solve remote work challenges
    Using SD-WAN to build a secure digital enterprise | Solve remote work challenges
    Gemma Allen, Consulting Solutions Architect, Barracuda, Felix Bueltmann, Senior Consulting Engineer, Barracuda Recorded: Nov 26 2020 17 mins
    Using SD-WAN to build a secure digital enterprise: Episode 3

    Remote and mobile users increasingly require access to corporate information and applications. This can create numerous challenges that call for SD-WAN.

    Join us for to hear how the acceleration of remote work brought on by Covid-19 has changed how we should approach networking. See for yourself how you can leverage SD-WAN to solve these challenges, including:

    •How to include your remote workforce when designing your WAN
    •Why using the cloud makes this simple.


    Don’t miss this third webinar in a five-part series on SD-WAN to understand the different deployments and what might work for your organization.

    Save your spot right now.
  • Navigating Through a Pandemic as a CISO, and Beyond
    Navigating Through a Pandemic as a CISO, and Beyond
    Fabrice Bru, RSSI, Administrateur du CESIN, Loïc Guézo, Senior Director, Cybersecurity Strategy, Proofpoint Recorded: Nov 26 2020 28 mins
    Cybercriminals continue to leverage uncertainty and fear to launch malicious campaigns with one aim in mind – to get your people to click. These attacks are targeted at people and require social engineering to succeed. What’s more, the disruption we are all facing today has forced us all to quickly adapt, move to a WFH environment and potentially exposing our users to increased attacks – from phishing to business email compromise attacks.

    While the cybercriminals remain busy in their pursuit of exploiting our employees, the CISOs role has been pushed to new limits. So how must CISOs and their security teams evolve to better protect your organisation this year?

    Join Fabrice BRU, CISO, Administrator of ‘Club des Experts de la Sécurité de l’Information et du Numérique’ (CESIN) and Loïc Guézo, Senior Director, Cybersecurity at Proofpoint as they share real life experiences on how this community of CISOs have joined together to update their security programmes to ensure we thrive in this digital-first world, despite the pandemic.
  • Gérer l’impact d’une pandémie sur l’entreprise en qualité de RSSI - Français
    Gérer l’impact d’une pandémie sur l’entreprise en qualité de RSSI - Français
    Fabrice Bru, RSSI, Administrateur du CESIN, Loïc Guézo, Senior Director, Cybersecurity Strategy, Proofpoint Recorded: Nov 26 2020 35 mins
    Les cybercriminels continuent d'exploiter nos craintes et nos incertitudes au moyen de campagnes malveillantes dont l'unique objectif est de nous inciter à cliquer sur des liens dangereux pour notre sécurité.

    Ces attaques visent directement les personnes et recourent à des techniques d'ingénierie sociale. De plus, la situation exceptionnelle que nous vivons aujourd'hui nous oblige à nous adapter rapidement et à adopter massivement le télétravail, une transition qui expose nos utilisateurs à davantage d'attaques, du phishing au piratage de la messagerie en entreprise (BEC, Business Email Compromise).

    Et tandis que les cybercriminels continuent de prendre pour cible nos collaborateurs, le rôle des RSSI évolue de façon inédite. Comment les RSSI et les équipes de sécurité peuvent-ils s'adapter pour mieux protéger l'entreprise en cette année difficile ?

    Fabrice Bru, RSSI, Administrateur du Club des Experts de la Sécurité de l'Information et du Numérique (CESIN), et Loïc Guézo, Senior Director, Cybersecurity Strategy de Proofpoint, font le point avec vous lors d'une intervention Live Talk de 30 minutes.

    Au programme :

    L'impact de la pandémie et l'évolution des campagnes de phishing exploitant le thème du COVID-19
    Partage de l'expérience d'un groupe de RSSI qui ont collaboré pour adapter leurs programmes de sécurité afin de garantir une utilisation sûre et productive de l'environnement numérique, malgré la pandémie
  • Single Sign-On & Password Management – Managing Every Access Point
    Single Sign-On & Password Management – Managing Every Access Point
    Barry McMahon, International Product Marketing Manager, IAM and Seamus McLaughlin, Senior Solutions Consultant, LastPass Recorded: Nov 26 2020 31 mins
    Employees need streamlined, secure and simple access to their work, otherwise lose productivity. But more apps, devices, networks and users entering the workplace makes it increasingly complex for IT to simply manage and protect user access.

    Discuss in this replay of this session to learn how the new LastPass Enterprise provides control and security for every access point in the business. The discussion will include:

    - How SSO and password management work together to manage every access point
    - The LastPass journey to evolve from a password manager to a holistic access solution
    - A product deep dive into the new LastPass Enterprise, now including an SSO portal with over 1,200 integrations

    Speakers:
    Brian McMahon, International Product Marketing Manager, IAM
    Seamus McLaughlin, Senior Solutions Consultant, LastPass
  • Школа правильного Backup’а Commvault – Лекция 7
    Школа правильного Backup’а Commvault – Лекция 7
    Дмитрий Иванюк, эксперт по решениям Commvault Recorded: Nov 26 2020 49 mins
    Приглашаем принять участие в седьмом вебинаре серии «Школы правильного Backup’a Commvault». Тема предстоящей лекции: «Storage policy&plan. Часть 2».
    В программе:
    • Создание политики хранения для аварийного восстановления
    • Процедуры, настройка, отчеты
    • Q&A
  • Technical Thursday : Power Up Your API Automation with Rubrik
    Technical Thursday : Power Up Your API Automation with Rubrik
    Kiat Hiong Soh, Sales Engineering Lead, Rubrik Asia Recorded: Nov 26 2020 28 mins
    Open application programming interfaces (APIs) unlock innovation as businesses transform and grow. IT teams can accelerate adoption of new platforms and interconnect to existing resources to provide services such as: provisioning tools, service portals, configuration management, centralized monitoring and management, test automation, and more. Open APIs have been a part of the Rubrik platform since its inception.
  • Beware of Holiday Phishing Scams - APAC, APJ
    Beware of Holiday Phishing Scams - APAC, APJ
    Andrew Warren-Nicholls, Cyber Security Specialist, APJ Recorded: Nov 26 2020 29 mins
    The holidays can be a threat to businesses and consumers alike. Fake offers and notices flood corporate and personal emails, mobile devices and social sites. Cybercriminals know people are distracted and cloak their intent as legitimate holiday commerce. The time is now to remind your users that extra caution and diligence is needed!

    Join Andrew Warren-Nicholls as he sets out the best practices for better protecting your end users as the holidays approach. In this session, he'll cover:

    - What methods and techniques do scammers use during the holiday season
    - Examples of scams and phishing emails cybercriminals will be deploying this holiday season
    - Steps and resources you can leverage during the holiday season to keep your end users safe

    Specific focus on Asia-Pacific Region
  • ESG: What is Demanded by Investors vs. What is Required by Law
    ESG: What is Demanded by Investors vs. What is Required by Law
    Kelli Rogge, Sam Abadir, and Matt Kelly Recorded: Nov 25 2020 56 mins
    Between racial equality, the #metoo movement, and climate change - Environmental, Social, and Governance (ESG) will be a big focus for business in the next few years. Unfortunately, regulatory guidance is unclear, and many organizations struggle to understand what is demanded by their investors ... vs. what is actually required by law. Join this session to learn the state of ESG, and how to build a framework for your business.
  • Rapid Agility – Lessons From the Front Line
    Rapid Agility – Lessons From the Front Line
    James Petter, VP Intl - Pure Storage | Mark Moerdyk, CTO, Beazley | Martin Veitch, Editorial Director, IDG Connect Recorded: Nov 25 2020 37 mins
    During the Coronavirus crisis, many organisations have faced a litany of challenges that have significantly disrupted their operations and necessitated new ways of working. The businesses best placed to overcome these challenges are those that have processes in place that allow them to act at speed. This webcast discusses how businesses can instil the ability to act at speed, address opportunities, and hurdle obstacles when dealing with unexpected disruptions like COVID-19.
  • Secure your license to operate with ARIS Risk & Compliance Management
    Secure your license to operate with ARIS Risk & Compliance Management
    Elke Bastian, ARIS Product Marketing & Georg Wilhelm, ARIS Product Management, both of Software AG Recorded: Nov 25 2020 53 mins
    Business is complex, and regulations are tough. Too much risk is bad for business, and too
    much governance is bad for business. You simply can’t achieve proper governance, risk
    management and compliance unless you use smart technologies and processes to manage
    complexity … easily and efficiently. Protect your business from the potentially devastating
    risks of noncompliance while reducing your costs in a very big way.
    Ensure compliance with tough data protection guidelines, like the GDPR, and roll out new policies and guidelines with confirmation management workflow to make sure everybody has read and understood.

    Join this webinar to learn how ARIS Risk & Compliance Management can help you to secure your license to operate.
  • Aufzeichnung: Backup & Recovery für das Cloud-Zeitalter
    Aufzeichnung: Backup & Recovery für das Cloud-Zeitalter
    Dietmar Simon, Senior Solution Architect DACH, Druva GmbH Recorded: Nov 25 2020 69 mins
    Cloud Computing hat herkömmliche Methoden der Datensicherung in Frage gestellt. So stellen Cloud-basierte und virtualisierte IT-Infrastrukturen traditionelle Tools vor Anforderungen, die sie oft nicht erfüllen können. Auch erweist sich der Kosten- und Verwaltungsaufwand einer On-Premises-Lösung häufig im Vergleich als zu hoch.

    Cloud-native Backup-Lösungen überwinden diese Probleme durch ihre Architektur und ihr flexibles Nutzungsmodell. Mit Cloud-basiertem Backup & Recovery können Unternehmen die Kosten für ihre Datensicherung senken, ihre Möglichkeiten erweitern und ihren Administrationsaufwand senken. Zugleich sorgen sie dafür, dass im K-Fall ihre Absicherung durch modernste Methoden und Cloud-Technologien erfolgen kann.
  • Comment fermer votre coffre-fort à double tour: Hashicorp + nCipher
    Comment fermer votre coffre-fort à double tour: Hashicorp + nCipher
    Gauthier DONIKIAN, Solutions Engineer, Hashicorp and Jerome Beclin, Sales Engineer, nCipher Security Recorded: Nov 25 2020 44 mins
    Au fur et à mesure que les organisations migrent vers le cloud, le nombre de mots de passe, PIN, clés, jetons et autres secrets utilisés pour accéder aux plates-formes applications et aux données augmente de façon exponentielle. La gestion centralisée de répertoires de secrets permet aux organisations d'appliquer des politiques de protection cohérentes qui renforcent la sécurité et facilitent l'audit et la conformité.

    Ce Webinar présentera le défi croissant rencontré lors du déploiement d'outils de gestion centralisée des secrets et les solutions pour atténuer les risques associés à l'agrégation d'actifs sensibles. Nous examinerons le besoin d'une racine de confiance pour la migration vers le cloud, les DevOps et la conformité réglementaire et nous décrirons les meilleures pratiques pour déployer ces solutions.

    Rejoignez ce Webinar et découvrez:

    • Quels défis représente la multiplication des secrets pour les organisations
    • Comment la gestion centralisée des clés garantit une politique de sécurité cohérente
    • Pourquoi le cloud, les DevOps et les réglementations nécessitent une approche ciblée
    • Où une racine de confiance est-elle nécessaire pour garantir une sécurité élevée

    Ce webinaire est pour vous si vous êtes responsable de:

    • La gestion de la transformation numérique et de la migration vers le cloud
    • La mise en place des meilleures pratiques de sécurité dans votre organisation
    • Auditer et assurer la conformité de votre organisation
  • The Benefits Of StorageCraft OneXafe Scale-Out NAS Storage
    The Benefits Of StorageCraft OneXafe Scale-Out NAS Storage
    Karl Thomson, Sr. Sales Engineer Recorded: Nov 25 2020 28 mins
    Whilst we are going through some unusually turbulent times, businesses are increasingly embracing digital technology to stay afloat and gain competitive advantage. However, the explosive data growth we are facing, coupled with budget limitations due to the uncertainty, makes it very challenging for IT teams to upgrade their expensive primary storage solutions.

    StorageCraft has the solution for you: OneXafe scale-out object based storage!

    Tuned into this recorded webcast to learn more!
  • The Four Pillars of Cloud-Native Security Journey for 2021
    The Four Pillars of Cloud-Native Security Journey for 2021
    Ben Grissinger, Cloud Security Sales Engineer, Tufin; Chintan Patnaik, Pre-Sales Engineer, India, Tufin Recorded: Nov 25 2020 39 mins
    Embark on the journey of cloud-native security with Tufin SecureCloud. From gaining visibility of the complex and disparate networks to ensuring agility without compromising security, the new cloud-native security strategy needs to encompass them all. Our SecureCloud expert, Ben Grissinger will walk you through a process of leveraging the right tools to get a successful deployment.

    About Ben Grissinger
    Over the past several years, Ben has designed and delivered automation solutions for everything containers as both a customer and vendor. Now at Tufin, Ben collaborates with the IT security industry’s brightest minds and thought leaders to create a secure cloud and containerized environment at the speed and scale required for the fast-moving enterprises.
  • Industry 4.0: Radical Digitisation
    Industry 4.0: Radical Digitisation
    Toby Redshaw | Simon Parry | John Crawford Recorded: Nov 25 2020 38 mins
    The pandemic has shone a spotlight on how digital can be a truly transformative investment. Enabling companies to not only boost productivity, but also engage and communicate with their employees, customers and stakeholders in a way that they didn't think possible.

    In this session, we’ll discuss the technologies that forward-thinking business are prioritising and already investing in, such as:
    • Artificial Intelligence and Machine Learning
    • Automation and Robotics
    • Core network technologies and 5G

    Attendees to this webinar will hear about:
    • The importance of maintaining the human touch in organisations by finding the right balance when allocating tasks between automation, AI, and humans
    • Why 5G can be such a game-changer. How it can be used to create private wireless networks that provide secure, high-bandwidth, low-latency connections, enabling exciting new solutions like driverless vehicles such as robots and automated forklifts and near-real-time tracking of manufacturing lines. The range of solutions is huge from tracking to safety, predictive maintenance to digital twins.
    • How to leverage these technologies whilst ensuring that human choices shape the workplace and that we are not drawn into an algorithm-driven structure

    Speakers:
    Toby Redshaw, Senior Vice President – 5G Solutions & Enterprise Innovation, Verizon Business
    Simon Parry, CTO, Nokia Enterprise UK, Nokia
    John Crawford, General Manager, Enterprise Innovation and 5G solutions, Verizon Business
  • Beyond Wires: 5 Wireless WAN Strategies for APAC Businesses
    Beyond Wires: 5 Wireless WAN Strategies for APAC Businesses
    Daniel Polomka, APAC Channel Sales Lead at Cradlepoint and Foad Fadaghi, Managing Director and Principal Analyst at Telsyte Recorded: Nov 25 2020 31 mins
    Cloud services, IoT devices, and greater mobility are pushing businesses beyond the boundaries imposed by wired networks. Each of these are driving demand for higher availability, increased network capacity, and better operational flexibility. Wireless WANs, based on the capabilities of 4G LTE and more powerful 5G technology, should become an essential part of a company’s digital transformation.

    Learn about the business challenges and needs that Wireless WANs address, hear research-based insight into wireless connectivity in the Australian market, and discover some of the innovation that wireless network infrastructure can enable.
    This webinar will cover:
    • The evolution of WAN
    • Australian market analysis – New Telsyte research
    • 5 strategies for Wireless WANs
    • Analyst industry trends and forecast
  • APIを収益化する3つのステップ 3 Easy Ways to Monetize your APIs
    APIを収益化する3つのステップ 3 Easy Ways to Monetize your APIs
    スリー・ナガラジャン、ソリューション・アーキテクト(アジア)&パヴァン・プラハード、ソフトウェア・エー・ジー Recorded: Nov 25 2020 54 mins
    APIを収益化するための3つの手法をご紹介します。

    1.APIをパッケージ化し、パートナーと開発者が収益を共有する方法
    2.API消費量に応じて従量課金する方法
    3.APIとトランザクションによる段階型パッケージを作成する方法
  • IoT, Hybrid Cloud & the Broadening of Enterprise Security
    IoT, Hybrid Cloud & the Broadening of Enterprise Security
    Jon Ferguson, Director of Product Management for Public Key Infrastructure (PKI) and Internet of Things (IoT) Recorded: Nov 25 2020 54 mins
    In a recent report, ABI Research forecasts that IoT connections will exceed 28 billion by 2026, as adoption increases enterprises are adapting to support a wide range of on premise and cloud based services to keep pace. As the number of tools and the network boundaries become blurred, the attack surface is expanded. With more data out the door, and corporate infrastructures running remotely, organizations become more vulnerable and at high risk of cybersecurity attacks. Current centralized security architectures aren’t enough, and it’s critical for organizations to understand and embrace a new reality.

    In this webinar, we’ll discuss:
    1. The market trends and drivers of IoT security
    2. Understanding the connection between Hybrid Cloud models and IoT
    3. How organizations need to plan and design to support the move to this environment
    4. The need for a specialized integrated IoT security solution
  • El futuro en la Emisión de Tarjetas Instantáneas
    El futuro en la Emisión de Tarjetas Instantáneas
    Agustin Guzman , Sales Director - Instant Issuance Entrust Recorded: Nov 24 2020 51 mins
    Los consumidores aman que todo sea instantáneo. Respuestas instantáneas a cualquier pregunta. Acceso instantáneo a cualquier canción. Y cuando se trata de tarjetas de débito o crédito, quieren el poder de compra inmediato. Ellos quieren entrar a su sucursal y salir con su tarjeta en la mano. Únase a nuestros expertos de Entrust para esta mesa redonda virtual y conozca como poder transitar en las oportunidades únicas que tienen los Bancos e Instituciones Financieras ahora mismo, mientras obtiene una ventaja competitiva sobre otras Empresas, solamente con Emitir una tarjeta de manera instantánea.

    Acompáñenos para conocer información vital:
    ¿Cómo puedes ofrecer de manera segura, tarjetas con imagenes de alta calidad, elegidas por los consumidores?, que seguramente serán sus tarjetas preferidas.
    ¿Cómo puedes asegurar una gratificación instantánea para tus consumidores, dándoles una tarjeta permanente, activa y que tiene la funcionalidad Contacless?
    ¿Cómo puede la Solución de Emisión Instantánea de Entrust darle valor a tus sucursales para cubrir las necesidades de los consumidores, logrando estar por delante de las complejas necesidades de los Sistemas de Pago.
  • Network Automation 102: Automate Your Network
    Network Automation 102: Automate Your Network
    Glenn Gray, Sr. Solutions Architect Recorded: Nov 24 2020 39 mins
    Webinar talks about
    - Automate networks with low-code platform
    - Design simple and complex automation workflows
    - Automate across multi-vendor and hybrid infrastructure
    - Benefits of network automation
  • Can VMware Shops Easily Adopt Multiple Public Clouds? Let’s Discuss.
    Can VMware Shops Easily Adopt Multiple Public Clouds? Let’s Discuss.
    Duan van der Westhuizen, SVP of Product & Marketing, Faction Recorded: Nov 24 2020 50 mins
    VMware Cloud on AWS was the first cloud-based offering for VMware customers looking to seamlessly adopt public clouds, but it is no longer the only option. Offers like Azure VMware Services, Google Cloud VMware Engine, and Oracle Cloud VMware Cloud Solution have expanded the reach from the on-premises datacenter to a global multi-cloud network of providers and regions. Is your organization ready to embrace this new scope in cloud environments and capabilities?

    In this webinar, we help you understand the considerations you should take note of before diving in head first:

    ● Data Gravity and its effect on your future flexibility and cloud optionality
    ● Cloud lock-in and what it means to your business
    ● VMware as the central platform that enables true private, hybrid, and multi-cloud
    ● How your business can get a competitive edge by using more than one cloud at a time
    ● Driving a 10x savings in data costs while using the best tools from your cloud of choice
    ● How does this all work? The fundamentals of multi-cloud networking
  • Dry Run#2 - Testing to Quality Engineering – A Transformation driven by Agile
    Dry Run#2 - Testing to Quality Engineering – A Transformation driven by Agile
    Manu Rajsathyarajan, QE Practitioner, Richard Telleria, MD - Australia & NZ, Jagadeesh Balakrishnan, Director - Lean Nov 30 2020 4:00 am UTC 60 mins
    How the traditional Software Testing process, methodologies, approach, and techniques that are used to ensure quality at the end of the SDLC life cycle have transformed into ‘Quality Engineering’, an engineering discipline that drives the development of quality products. The transformation that was driven by Agile adoption which demands greater flexibility, speed, and collaboration. Also, explore how the methodologies like BDD transformed test automation to enable In-Sprint functional testing automated, compared to how it was leveraged just for Regression testing traditionally.
    • Key Takeaways:
    - Demystify Quality Engineering Vs Testing
    - Best practices to implement QE in Agile
    - Advantages of BDD approach in Agile QE
    - Introduce UST’s Agile QE tools & capabilities
  • Continuous Assurance for the AWS Well-Architected Framework [ISRAEL EVENT]
    Continuous Assurance for the AWS Well-Architected Framework [ISRAEL EVENT]
    Rob Melka - Senior Solutions Architect at AWS, Ori Tabachnik - CRO at CloudZone, Avi Aharon - VP Cloud at Continuity Software Nov 30 2020 9:00 am UTC 42 mins
    Join us to learn all about the AWS Well-Architected Framework’s five pillars, including why it’s important for your business, how it helps build best-of-breed infrastructure for applications, and how it provides a method for the maintenance of optimal infrastructure.

    This session will help you ensure your new apps are built in line with AWS design principles and best practices, and show you how you can continuously and automatically be sure you're adhering to AWS Well-Architected Framework to reach better business outcomes.

    Topics of discussion will include:

    - Challenges to building and maintaining robust infrastructure
    - Removing threats to Well-Architected adherence
    - How the solution works in a joint customer case study

    The session's guest speakers are:

    - Rob Melka, Senior Solutions Architect at AWS
    - Ori Tabachnik, CRO at CloudZone
    - Avi Aharon, VP Cloud at Continuity Software
  • MINDHUNTER #3: Storms Ahead: The Dark Side of the Rush to the Cloud
    MINDHUNTER #3: Storms Ahead: The Dark Side of the Rush to the Cloud
    John Aarsen, SE - Benelux and Nordics, SonicWall Nov 30 2020 10:00 am UTC 60 mins
    Join SonicWall Cybersecurity expert John Aarsen as he explores the biggest threats to cloud environments — and why new ways of looking at cybersecurity, such as “Shift Left,” are required for safe and productive cloud use.
  • Communications Mining: Enabling Intelligent Automation in Capital Markets
    Communications Mining: Enabling Intelligent Automation in Capital Markets
    Stephen Mackintosh, Reinfer & Jerry Wallis, Blue Prism & Rushabh Shah, Deutsche Bank Nov 30 2020 2:00 pm UTC 60 mins
    In this Blue Prism webinar, we invite Deutsche Bank and Re:infer to explore how technology trends are shaping Capital Markets for a new digital future.

    Technology has been a foundational component for growth in Capital Markets. In 2020 and the years ahead, digitisation, advanced analytics and automation offer huge potential for value creation.

    The term ‘HyperAutomation’ is increasingly used to paint this vision of the future. It describes the need for rapid discovery and automation of processes, clients journeys and knowledge worker activity. To enable this vision, the capital markets need digital ecosystems of complementary technologies, citizen developers and intelligent infrastructures.

    Learn how communications mining and robotic process automation are enabling a new value story in capital markets innovation.
  • Financial cyberthreats in 2021
    Financial cyberthreats in 2021
    Security researchers from Kaspersky, Austrian Energy CERT, Banco C6 S.A. and Cetelem Nov 30 2020 2:00 pm UTC 60 mins
    As we near the end of 2020, a challenging year that has turned many things upside down, it is clear that one thing remains unchanged: financial threats are still key security concerns among both individual users and organizations.
    As cybercriminals continually evolve and invest in developing new tools, as well as reinventing themselves and their tactics, techniques and procedures, we should ask what can be learnt from the experiences we faced in 2020 and what financial threats are to come in 2021.
    In this talk, Dmitry Bestuzhev, head of Kaspersky’s Global Research and Analysis Team (GReAT) in Latin America, and Ivan Kwiatkowski, senior security researcher for Kaspersky’s GReAT team in Europe, will present their thoughts through an exclusive overview of the top cyberthreats targeting financial institutions in 2020 and share the company’s predictions for 2021.

    In addition, threat researchers Anchises Moraes from Banco C6 S.A., Olaf Schwarz from Austrian Energy CERT and George Dragusin from Cetelem will join the discussion and tap into Kaspersky’s financial threat predictions for 2021, presenting different angles and his view on what the future will bring.
    During the webinar, attendees will learn about key events that happened in 2020, as well as the latest techniques and tactics used by targeted attack groups who specialize in stealing money from financial institutions.
  • Continuous Assurance for the AWS Well-Architected Framework [US EVENT]
    Continuous Assurance for the AWS Well-Architected Framework [US EVENT]
    Rob Melka - Senior Solutions Architect at AWS, Ori Tabachnik - CRO at CloudZone, Avi Aharon - VP Cloud at Continuity Software Nov 30 2020 4:00 pm UTC 42 mins
    Join us to learn all about the AWS Well-Architected Framework’s five pillars, including why it’s important for your business, how it helps build best-of-breed infrastructure for applications, and how it provides a method for the maintenance of optimal infrastructure.

    This session will help you ensure your new apps are built in line with AWS design principles and best practices, and show you how you can continuously and automatically be sure you're adhering to AWS Well-Architected Framework to reach better business outcomes.

    Topics of discussion will include:

    - Challenges to building and maintaining robust infrastructure
    - Removing threats to Well-Architected adherence
    - How the solution works in a joint customer case study

    The session's guest speakers are:

    - Rob Melka, Senior Solutions Architect at AWS
    - Ori Tabachnik, CRO at CloudZone
    - Avi Aharon, VP Cloud at Continuity Software
  • Rubrik For Oracle (Bahasa Indonesia)
    Rubrik For Oracle (Bahasa Indonesia)
    Hanindya Permatasari, Enterprise Solution Architect Dec 1 2020 2:30 am UTC 45 mins
    Rubrik’s Automated Oracle Data Protection orchestrates the backup, archival, replication, and migration of your Oracle Databases. Automate database discovery and protect Oracle environments with a single SLA policy engine. Restore entire databases with near-zero RTOs or recover down to a single tablespace. Spin up database clones without storage penalty to validate backups or to accelerate test/dev.
  • Driving Real Behaviour Change: Build a Security Awareness Program that Works
    Driving Real Behaviour Change: Build a Security Awareness Program that Works
    Paul Down, Director & Matt Cooke, Cybersecurity Specialist, Proofpoint EMEA Dec 1 2020 10:00 am UTC 36 mins
    When it comes to modern Cybersecurity – ultimately your users are your last line of defence. So you need to arm them with both knowledge and practice to mould dynamic, alert guardians of both your organisation and your data. The key to your success is engaging, entertaining - and crucially - topical security awareness training.

    So where to start, or how to renew your program? Are you one of the 80% of organisations who allocate two hours or less per year for security awareness, how useful do you judge this small amount of user training to effect behaviour change?

    Join our Security Awareness Training experts as we review valuable strategies on how to create and sustain an impactful cybersecurity awareness education program. Plus we delve deep into thought-leadership on the following questions:

    - How do I ensure my users embrace the training? Who are the key influencers internally?
    - What is the minimum – and maximum – levels of training shown to have been successful?
    - How do I motivate and reward my last line defenders?
    - What reporting and measures are the most pertinent to the IT team and alternatively to the C-suite?
  • Operationalize Threat Intelligence with Mandiant Security Validation
    Operationalize Threat Intelligence with Mandiant Security Validation
    Alexis Bourbion, Sales, Mandiant Threat Intelligence & David Grout, Director Southern Europe Sales Engineering Dec 1 2020 10:00 am UTC 60 mins
    A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lack the investigative skills to conduct searches. This limitation exacerbates their struggle to justify the high-cost of cyber defenses and organizations often rely on assumptions to guide decisions and justify decisions.

    This session reveals the actual state of cyber security based on real world data around cyber security controls across enterprise networks, from email, endpoint, network and the cloud. It also explains how security validation can validate, consolidate, recoup and maximize the value from existing investments.
  • How to Manage Cloud Data at Scale: A Commvault Tech Demo
    How to Manage Cloud Data at Scale: A Commvault Tech Demo
    Penny Gralewski and Ryan O'Connor Dec 1 2020 11:00 am UTC 25 mins
    Complex and high-volume cloud environments need data protection that scales. Meet business demands for data and security with a modern, proactive cloud data management platform. Take the burden off of IT with automation and orchestration, while still maintaining granularity and control.



    See a tech demo that answers your cloud data management questions:



    How to manage public cloud data, including Microsoft Azure, Amazon AWS, and Google Cloud Platform workloads?
    Where to find time and cost savings in cloud deployments?
    When can a single view of cloud data improve availability and compliance?
    What steps are involved in scaling from backup and archive to managing virtual machines?
    How to create cloud data management reports for compliance and recovery readiness?
  • Meet the Cloud Architects Episode 1: Excelling with AWS
    Meet the Cloud Architects Episode 1: Excelling with AWS
    Girish Chanchlani Partner Solutions Architect AWS, David Gildea VP of Product Druva, Tony McGarry Senior Principal Engineer Dec 1 2020 2:00 pm UTC 25 mins
    Meet the Cloud Architects
    Episode 1: Excelling with AWS well-architected framework
    Join Druva and AWS technical experts for the launch of our new webinar series, ‘Meet the cloud architect’. Each episode the panel will be sharing their real-world experience and key learnings of building and scaling on the AWS cloud platform and how they used the AWS Well-Architected Framework.

    Our goal of episode one is to provide pro tips to help simplify your journey when building large scale global SaaS applications on AWS. It will help you bridge the gap between theory and practice, by identifying pain points before they materialize.

    Don’t miss out on these powerful tips! Register now to join Druva product experts and this episode’s special guest, Girish Chanchlani from AWS, in our inaugural Meet the Cloud Architect Series.
  • Realising the Modern Workplace
    Realising the Modern Workplace
    Jon Littlefair, Modern Workplace Consulting Lead, Telstra Purple, Jakob Ejlsted, VP People & Culture, Strategy & Insights, BP Dec 1 2020 3:15 pm UTC 45 mins
    Working life has fundamentally changed.

    In this session, we look at:
    - How to build a flexible, collaborative and secure working environment
    - The strategies to transition to hybrid virtual/physical environments
  • Alfabet Portfolio Playbook: Managing Innovation for Business Success
    Alfabet Portfolio Playbook: Managing Innovation for Business Success
    David Ferre, Director, Alfabet Product Management, Software AG Dec 1 2020 4:00 pm UTC 45 mins
    Organizations have to be innovative to stay ahead of their competitors and survive the digital business revolution. Innovation is a two-way process. Business strategy and ideas can lead to innovative, potentially patentable business models, products and services. Technology innovations open up new opportunities to, e.g., offer a special customer experience, as well as sleek, self-learning operating models. In this portfolio playbook we will show how EA and portfolio management can support the bidirectional innovation process to facilitate identification of innovations, assessment of their business and technology impact, and manage an innovation roadmap.
  • Road to 398 Pt-1 Complying with Reduced TLS/SSL Certificate Lifetimes
    Road to 398 Pt-1 Complying with Reduced TLS/SSL Certificate Lifetimes
    Chris Bailey, Vice President of Trust Services, Mark Giannotti, Manager, Technical Sales Consulting, Entrust Dec 1 2020 4:00 pm UTC 60 mins
    Reduced certificate lifetimes to 398 days took effect on Sept. 1, 2020. Watch our webinar as our TLS/SSL experts share some tips to avoid unexpected certificate lapses and simplify certificate management.

    Topics will cover:
    • The details of the new CA/B Forum baseline requirements
    • The potential impact of shorter certificate lifetimes
    • How to use the Ansible Module to automate certificate deployment at scale
    • Other tools that can help simplify certificate lifetime management
  • Network Automation 103 - Orchestrate Your Infrastructure
    Network Automation 103 - Orchestrate Your Infrastructure
    Glenn Gray, Sr. Solutions Architect Dec 1 2020 4:00 pm UTC 35 mins
    A truly intuitive network is one that can operate with minimal human intervention from start to finish. Learn how you can orchestrate your network infrastructure and operations in a multi-vendor ecosystem with AppViewX.
  • Empower your first responders with vulnerability response
    Empower your first responders with vulnerability response
    Mike Plavin, senior technical product marketing manager for ServiceNow Security Operations Dec 1 2020 4:00 pm UTC 39 mins
    Vulnerabilities don’t often get the same amount of notice as phishing attacks or advanced persistent threats, but when a critical vulnerability is exploited, your organization could suffer major damage to your business and reputation.

    Join our webinar on improving your vulnerability response. Mike Plavin, senior technical product marketing manager, will share real-world examples of how our customers have used the capabilities of the Now Platform® to address their biggest vulnerability concerns. You’ll walk away with greater insights on:

    -The power and value of risk-based vulnerability response
    -How our customers use automated vulnerability response to reduce triage times
    -The powerful reporting our customers use to drive efficiency
    -How the ServiceNow® Vulnerability Response flow works
  • Everything Financial Services Needs to Know About Social Selling, Part 2
    Everything Financial Services Needs to Know About Social Selling, Part 2
    Anthony Sicoli, Pershing's Head of Corporate Communications / Ben Cathers, Global Principal Solutions Consultant at Hootsuite Dec 1 2020 5:00 pm UTC 58 mins
    About this Webinar Series
    According to research by Hootsuite and Forrester, 78% of financial advisors are already taking advantage of social media to drive sales revenue. Why? Because it works:

    - Social sellers outperform peers who don’t use social by 72%
    - Teams that leverage social media see a 21 % increase in pipeline velocity
    - There is 33% less churn from customers acquired via social selling

    Part 2 - Scaling Your Social Selling Program
    In this webinar Pershing's Head of Corporate Communications, Anthony Sicoli, will walk us through the steps necessary to go from social novices, to experts, to superstars, as well as the learnings and challenges they faced when evolving their own social selling program.

    Social selling in financial services is not a one-off project. When done right, it is a multi-stage, multi-year journey. Join this webinar to learn more.

    What You'll Learn
    - How social selling can support advisors to increase customer lifetime value and deal size

    - The people, processes, and technologies that are key to successful (and compliant) social selling programs

    - How to build a multi-stage roadmap, regardless of where you are in your social selling journey
  • Innovate and Transform your Business with IT Services
    Innovate and Transform your Business with IT Services
    Forrester Guests: Glenn O'Donnell & Abhijit Sunil. Host: Arthur Reindl, VP of Pre-Sales at Dell Technologies Services Dec 1 2020 5:00 pm UTC 48 mins
    Innovation is a top priority for C-level executives, yet IT teams are often hindered by cultural resistance, and are too consumed with day-to-day activities to focus on high-level innovation. Business transformation is a complex task, and your IT organization needs bandwidth, skills, processes, and tools to facilitate results.

    This webinar shares the highlights from a recent commissioned study conducted by Forrester Consulting on behalf of Dell Technologies that evaluated the impact of IT staffing models and skills needed when deploying and supporting new technology.

    Watch the replay to hear from guest speaker, Forrester Analyst, Abhijit Sunil, and Arthur Reindl, VP of Presales and Strategy at Dell Technologies Services. Together, we’ll review data and insights that will enable you to:

    * Benchmark your IT team’s ability to be agile, and focused on innovation
    * Understand the key benefits organizations are realizing by leveraging IT service providers
    * Hear examples where outsourced IT services has helped to drive digital transformation.
  • Securing Your Expanded Remote Workforce
    Securing Your Expanded Remote Workforce
    Steve Piper, CISSP, Founder & CEO, CyberEdge Group Dec 1 2020 6:00 pm UTC 60 mins
    The COVID-19 pandemic has caused dramatic increases in remote workforces and BYOD policy adoptions, making it more challenging than ever to secure company applications and data. Now that organizations have increased their remote access capacities, it’s now time to explore ways to help secure these remote managed and unmanaged devices to help mitigate the elevated risks of ransomware, data breaches, and other cyberattacks. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he:

    - Recaps key findings from a recent COVID-19 impact study
    - Examines the challenges facing today’s IT security teams
    - Suggests ways to invest more in your human firewalls
    - Explores current and emerging security technologies
  • Remote access workflows and where do we go from here?
    Remote access workflows and where do we go from here?
    Jason Blum:GPL Technologies, Paul Austin & Jack Liu:Teradici, Karen Gondoly & Robert Ewanouski - Leostream Dec 1 2020 6:00 pm UTC 56 mins
    Panel discussion with GPL Technologies, Teradici, and Leostream on high performance remote access workflows with a focus on media and entertainment.
  • Sheltered Harbor, Data Vaulting and PowerProtect Cyber Recovery
    Sheltered Harbor, Data Vaulting and PowerProtect Cyber Recovery
    Dell Technologies and Sheltered Harbor Dec 1 2020 6:00 pm UTC
    The sophistication of cyber criminals threatens businesses in every industry and every geography. But nowhere are the risks more evident than in the U.S. financial sector, where a successful attack on a brokerage, bank, credit union or other institution could undermine consumer confidence and threaten the entire U.S. financial system.

    What can be done to counter these threats? How can financial institutions improve their operational resilience while protecting critical data from cyber attack?

    Join us to learn how Raymond James, Sheltered Harbor and Dell Technologies have partnered to fight back against cybercrime while helping to preserve consumer confidence in the U.S. financial system.

    In our webcast, you will learn:
    • How Sheltered Harbor achieves its mission of addressing and countering cyber risk in the U.S. financial system.
    • Raymond James’ approach to cyber threats, and why it decided to become a Sheltered Harbor participant.
    • A study of why and how Raymond James partnered with Dell Technologies to successfully implement its data vault in compliance with Sheltered Harbor requirements; and
    • Dell Technologies’ role as a technology Solution Provider with Sheltered Harbor.

    Please join our special guests:
    Carlos Recalde—President and COO, Sheltered Harbor
    Jim Shook—Director of the Cybersecurity and Compliance Practice, Dell Technologies
    and our moderator Peter Gerr—Consultant, Solutions Product Marketing, Dell Technologies.

    *This session will be recorded
  • How to: data scrambling
    How to: data scrambling
    Alex Gounares, CEO, Polyverse Dec 1 2020 6:00 pm UTC 2 mins
    Learn how you can do data scrambling with Polyverse in this short demo
  • ActualTech Media Virtual Summit: Architecting the Pillars of IT in 2021
    ActualTech Media Virtual Summit: Architecting the Pillars of IT in 2021
    Ben Stiles, Technical Director of Strategic Accounts at Faction Dec 1 2020 6:00 pm UTC 30 mins
    Multi-Cloud is THE pillar of IT in 2021, and Faction is here to show that it isn’t just theory anymore. We will take you through our in-depth validation and testing, real world architectures, and lessons from the trenches that will change your point of view on how this could change your business in 2021 and beyond.

    Watch the replay of our session from this event.
  • Backup Microsoft Office 365 without Breaking the Bank
    Backup Microsoft Office 365 without Breaking the Bank
    Dustin Albertson, Senior Cloud Solutions Architect, Veeam | David Boland, Director of Product Marketing, Wasabi Dec 1 2020 7:00 pm UTC 40 mins
    Relying on Microsoft’s native backup capabilities in Office 365 is a risky strategy. Of over 1,000 IT Pros surveyed, 81% experienced data loss in Office 365 – from simple user error to major data security threats. The good news is that by implementing Veeam and Wasabi together you can have a simple and affordable solution that won’t break the bank, but keeps your data secure.

    What you will learn:
    - Why you need to make Office365 Backup a priority for your organization.
    - Why Veeam is the right backup solution for O365.
    - Why Wasabi is the right storage for your Veeam Backups to make the solution simple and affordable for your business.
  • Combating Cybercrooks - Lessons from a former Black Hat
    Combating Cybercrooks - Lessons from a former Black Hat
    Eric Haseltine, PhD Dec 1 2020 7:00 pm UTC 55 mins
    No technology system is perfect with human behavior often presenting the biggest security risk. Given these challenges, how can your organization turn the tables on cybercriminals and gain the upper hand?

    In this entertaining and informative talk, former Director of R&D at the NSA and Associate Director on National Intelligence, Eric Haseltine, shares seven ways that you’ve probably never heard of to foil cybercrooks and make the human side of your organization more secure.