Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Understanding the 5 Most Common Oversights in a DRaaS Strategy
    Understanding the 5 Most Common Oversights in a DRaaS Strategy
    Storage Switzerland, KeepItSafe, Veeam Recorded: Jan 16 2019 56 mins
    Disaster Recovery as a Service (DRaaS) is potentially one of the best use cases for cloud resources. DR sites owned by the organization are expensive to set up and maintain as well as challenging to get to when a disaster strikes. DRaaS resolves these issues by creating an on-demand DR site where the cloud delivers IT resources as they are needed. IT planners though, may overlook some aspects of DRaaS solutions, especially when using the large public cloud providers.

    In this webinar join Storage Switzerland, Veeam and KeepItSafe where we leverage a panel of backup and recovery veterans to identify common oversights seen in organizations’ DRaaS strategies and how to address them.
  • How Cloud Applications Affect Branch Architectures
    How Cloud Applications Affect Branch Architectures
    Donna Johnson, Cradlepoint, and Lee Doyle, principal analyst at Doyle Research Recorded: Jan 16 2019 44 mins
    Today’s branch networking landscape has been changed by the rise of cloud-based applications, cloud-delivered traffic, and IoT devices. These trends significantly affect how network administrators and IT teams address network uptime and security, deploy IoT devices, and manage their widely distributed endpoints. New needs often require innovative network architectures and solutions.

    Join Lee Doyle, principal analyst at Doyle Research, and Donna Johnson, vice president of product and solution marketing at Cradlepoint, for a live webinar to explore the ramifications of cloud applications and IoT on branch architectures, as well as the role of flexible, cloud-managed edge solutions in meeting the diverse and ever-changing network requirements of today’s enterprises.
  • Destination Hybrid Cloud: Tips & Tricks to a Safer and Faster Cloud Migration
    Destination Hybrid Cloud: Tips & Tricks to a Safer and Faster Cloud Migration
    Mor Cohen-Tal, CTO of Cloud at Turbonomic and Tom Reynolds, Director of Technology Solutions at Razor Technology Recorded: Jan 16 2019 58 mins
    Are you tasked with transforming your data center to meet today’s Cloud Computing needs? If yes, you know a migration is easier said than done. From deciding what cloud is best for your environment to avoiding cloud cost-overruns and performance problems, these are just some of the headaches that IT Leaders are facing today.

    Join Turbonomic CTO of Cloud, Mor Cohen and Razor Technology Director of Technology Solutions, Tom Reynolds on Wednesday, January 16th at 11am EST, as they reveal how an intelligent strategy paired with an AI driven solution can ensure a safer and faster cloud migration.

    Our Executive Panel will Discuss:

    - Managing Lift-and-Shift migrations while avoiding cost over-runs
    - How to continuously optimize your hybrid cloud environment to assure performance & compliance at the lowest cost to the business
    - Save up to 40% on your Cloud Bill
  • NoSQL Replication is Not Backup
    NoSQL Replication is Not Backup
    Kapil Chhabra, Principal Product Manager at Rubrik and Aaron Delp, Director of Technical Solutions at Rubrik Recorded: Jan 16 2019 30 mins
    Native replication in NoSQL databases such as MongoDB, Apache Cassandra, and Datastax, provides high scale and availability. However, does it provide protection of critical data against logical errors and data corruption? Is native replication a good substitute for disaster recovery and other enterprise backup needs? Is your database protected for compliance and governance use-cases?

    Watch this 30 minute webinar to learn about the top fallacies of using only native NoSQL database replication and the consequences of this approach to enterprise backup and recovery.
  • Enhanced Enterprise Readiness for Automation and Reporting
    Enhanced Enterprise Readiness for Automation and Reporting
    Roi Alon, Product Manager, Tufin & Dan Rheault Sr. Product Marketing Manager, Tufin Recorded: Jan 16 2019 52 mins
    Ready for full automation for next generation firewalls (NGFWs)? Eager to achieve a greater understanding of your risk?

    Join the Tufin product team on January 16 to learn how customers using Tufin Orchestration Suite R18-3 GA will master their Network Security Policy Management through increased automation and additional risk reporting.

    Tufin Orchestration Suite R18-3 GA delivers:

    - New workflow support for Cisco and Palo Alto Networks NGFWs
    - Policy-based routing automation for Cisco network devices
    - New reporting options
    - Methods to identify risk for non-zone included IPs for risk flows

    Register now to learn how automation increases your organization’s efficiency and improves risk management processes.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Recorded: Jan 16 2019 82 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Supply Chain & Risk Management (SCRM): Disciplines Joined-at-the-Hip
    Supply Chain & Risk Management (SCRM): Disciplines Joined-at-the-Hip
    Gregory L. Schlegel, CPIM Recorded: Jan 15 2019 60 mins
    Supply chains are becoming ever more complex, particularly with the increase in outsourcing and the advancement of multi-tiered global supply networks. More and more organisations are now faced with direct and continuously evolving operational and legislative risks as a result of global market disruption or malpractice in their supply chains.

    “Supply chain risk management is the implementation of strategies to manage every day and exceptional risks along the supply chain, underpinned by continuous risk assessment with the objective of reducing vulnerability and ensuring continuity.” (Supply Chain Risk Management: An Emerging Discipline”)

    This Supply Chain & Risk Management webinar provides participants with a glimpse of the global supply chain risk landscape. Definitions of risk management and new techniques and tactics to mitigate risk will be discussed, along with profiles of early adopters of Supply Chain Risk Management.

    Attend this Supply Chain & Risk Management webinar and get a brief introduction on how to:
    Identify global supply chain risks
    Assess risks within your supply chain
    Mitigate risks throughout your enterprise with new tools and tactics
    Manage volatility, uncertainty, complexity, ambiguity and risk
    Create a resilient supply chain
  • It doesn’t end with GDPR.
    It doesn’t end with GDPR.
    Sheila FitzPatrick President FitzPatrick & Associates, Patrick McGrath Digital Transformation Leader Commvault Recorded: Jan 15 2019 52 mins
    Companies raced to meet the May 2018 deadline to meet Europe’s General Data Protection Regulation with varying degrees of success, but if they learned anything since it is this: GDPR isn’t a one and done exercise. The GDPR might be the most eye-catching data privacy law on the books because of the outsized potential fine (up to 4% of revenue), but it is simply one of the first and most far-reaching such laws. Many more are emerging around the world and, indeed, in many US states. Some of the regulations overlap, while others conflict, meaning organizations face the ugly reality of having to deal with a patchwork quilt of laws.

    In this webinar we’ll examine:

    - Lessons learned to date
    - The key differences between the new regulations
    - Pain points companies are having (simply shutting off customers in
    the EU is not a sustainable practice)
    - Best approaches moving forward
  • GDPR Compliance
    GDPR Compliance
    Lockpath Recorded: Jan 15 2019 2 mins
    GDPR compliance is a big challenge for organizations doing business with, or in the EU. See how the Keylight Platform is the solution you need for GDPR compliance.
  • Finding Your SecOps Solution: Products For Real-Time Query and Remediation
    Finding Your SecOps Solution: Products For Real-Time Query and Remediation
    Michael Osterman, President at Osterman Research Recorded: Jan 14 2019 48 mins
    Real-time query and response solutions are revolutionizing cyber security by enabling Security and IT Operations teams to work together, speeding up analysis and response times and reducing risk in their organizations. While these SecOps products deliver a wide range of benefits, it can be difficult for your team to prioritize one set of functionality over another in this ever-evolving endpoint security landscape.

    During this live webinar, Michael Osterman, President at Osterman Research, will provide his expert opinion on how to evaluate real-time, next-gen SecOps solutions so that you can find the right one for your organization.

    You will learn:

    - The benefits a strong SecOps strategy can provide
    - What to consider when evaluating real-time SecOps products
    - How to compare SecOps solutions to find the one that is best fit for your team
    - How Cb LiveOps enables teams to better understand current state of endpoints in their environment
  • AMP Up Your Response with SOAR and Cisco’s Security Suite
    AMP Up Your Response with SOAR and Cisco’s Security Suite
    John Moran Sr. Prod. Mngr DFLabs; Jessica Bair Sr. Mngr Adv.Threat Solutions; Michael Auger, Sr Sec. Solutions Cisco Security Recorded: Jan 11 2019 58 mins
    Presented By:
    John Moran, Senior Product Manager, DFLabs
    Michael Auger, Senior Solutions Security Architect, Cisco Security
    Jessica Bair, Senior Manager, Advanced Threat Solutions, Cisco Security

    Learn how DFLabs’ Security Orchestration, Automation and Response solution, IncMan SOAR, integrates and performs seamlessly with Cisco’s security suite, including its latest integration with Cisco AMP for Endpoints.

    As organizations are exposed to more advanced and frequent attacks, speed of detection and response is critical in reducing financial and reputational damage.

    Cisco AMP for Endpoints leverages cloud-based analytics to detect and respond to advanced threats in real-time. Used with Cisco’s security suite, including Threat Grid, Umbrella and Umbrella Investigate, threats can be assessed, and assessments of the network performed; but this consumes valuable analyst time.

    IncMan SOAR allows security teams to automate repeatable tasks, including enriching initial threat indicators, allowing more time to focus on tasks which require human intervention.

    By combining these solutions, security teams can automate and orchestrate the process from initial alert, to containment and remediation, reducing actionable detection and response times from hours to seconds.
  • Fifteen Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
    Fifteen Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
    Storage Switzerland and Igneous Recorded: Jan 11 2019 17 mins
    Join Storage Switzerland and Igneous for another Fifteen Minute Friday: Storage Tips for the Weekend. Most organizations are not satisfied with their ability to backup, recovery and correctly retain unstructured data. The combination of unprecedented growth and increased scrutiny caused by regulations like GDPR and CCPA is pushing organizations to the brink. It's time to stop the madness!

    By joining this short webinar, you’ll learn tips to overcome:
    - The Unstructured Data Backup Challenge
    - The Archive Challenge
    - The Data Privacy / Data Retention Challenge

    Attendees to the webinar will also receive a copy of Storage Switzerland’s latest white paper “How to Evolve from Unstructured Data Protection to Unstructured Data Management.”
  • Taking Charge of GDPR
    Taking Charge of GDPR
    Larry Dietz, General Counsel, TAL Global and Stephen Twynam, Senior Sales Engineer, Citrix Recorded: Jan 9 2019 59 mins
    The EU General Data Protection Regulation (GDPR) deadline was 25 May, 2018. If you think you’re immune from its impact, think again. In a Ponemon study, 65% of businesses are concerned about potential fines and 74% say complying with the GDPR will negatively impact their organisation. Whether you’ve prepared or not, attend this webinar to find out best practices, pitfalls, and how companies like yours can achieve some quick wins in their long-term compliance strategy.

    In this webinar, you will learn:

    •What’s different with the current regulations
    •How secure digital workspaces can help
    •Scenarios organisations may encounter
  • Beyond Data Protection, Enterprise Data Automation and Orchestration
    Beyond Data Protection, Enterprise Data Automation and Orchestration
    Commvault - Gregg Ogden Sr Solutions Manager, Mark Rytwinski Sr Director Product Management, David Porco Sr Product Manager Recorded: Jan 8 2019 30 mins
    Today’s hybrid- or cloud-based enterprises are more complex than ever before – making management of data copies much harder, and more expensive.

    To be effective, you have to know how to migrate applications to the cloud – or any other platform – without losing your shirt in the process. Solutions that provide advanced capabilities for application and database migration, copy data management and disaster recovery are a must.

    In this webinar, you’ll learn how Commvault Orchestrate provides what you need to automate and orchestrate data copies – whether on-premises or in the cloud:

    Application Migration

    • Orchestrated migration to Cloud

    • Self-service for DBAs or End-users

    • Support for industry-leading applications

    Copy Data Management (CDM)

    • Dev/test support

    • Instant virtual copies of databases and applications

    • Data masking for secure copies

    Disaster Recovery (DR)

    • Automated application/database DR
  • RPA in the insurance industry: lessons learned & best practices
    RPA in the insurance industry: lessons learned & best practices
    Brian Golden, Daniela Caldararu from CUNA | Eric Greenstein from New York Life | Ahson Pai from EXL Recorded: Jan 8 2019 74 mins
    Live webinar with: CUNA Mutual Financial Group & New York Life in partnership with EXL
    Insurance companies have an opportunity to leapfrog generations of technology advancements and are driving end to end transformation impacting customer experience through back-end processes such as claims-processing, underwriting and providing policy quotes. Today, more and more businesses have turned to Robotic Process Automation (RPA) and a Digital Workforce to help streamline their processes in order to remain competitive while being able to delight their customers thanks to fast turnaround times and accurate information.
    In this "Insurance Industry" special episode of our Blue Prism Café, we will be welcoming guests from Credit Union National Association (CUNA) and New York Life Insurance Company for a conversation around "why" and "how" to implement a Digital Workforce, and more importantly what best practices our guests can share to make RPA a long-term and scalable solution for your business, regardless of the industry.
    Key takeaways will include:
    • Specificities of the insurance industry for implementing RPA
    • Real-life examples of implemented processes across various lines of businesses and their results
    • Best practices and lessons learned from launching and scaling a Digital Workforce
    • Brian Golden, Senior Manager Process Automation, CUNA Mutual Financial Group
    • Daniela Caldararu, Director Intelligent Automation and Insight Services, CUNA Mutual Financial Group
    • Eric Greenstein, Head of Strategic Portfolio Management & Process Automation, New York Life
    • Ahson Pai, Global Head of Digital Consulting, EXL
    • Xina Seaton, VP Customer Experience, Blue Prism
    This 1-hour live webinar will include a live-audience Q&A, so make sure to pre-register and join us on the 8th of January. If you cannot make it on the day, a recording will be made available online afterwards.
  • Modernizing your Data Protection Strategy through the Druva and AWS Partnership
    Modernizing your Data Protection Strategy through the Druva and AWS Partnership
    Paul Lyden, EMEA Storage Partner, Segment Leader, AWS and Martin Edwards, EMEA Sales Engineering Director, Druva Recorded: Jan 8 2019 41 mins
    Druva Cloud Platform provides organisations with a single control panel to protect and manage all of their IaaS, PaaS and SaaS environments as well as their server and endpoint data. As an AWS Tier 1 Technology Partner, Druva's unique AWS cloud-native architecture and Data Management-as-a-Service solution means that organisations can leverage a pay-as-you-go service without the need to invest in additional hardware or software.

    Druva aggregates business critical data for scalable backup, archival and disaster recovery, while also unlocking the true value of search and advanced analytics for governance of that data.

    Join presenters from Druva and AWS to learn about Druva’s all-in-storage-SaaS on AWS and the value this partnership can bring to your organisation.

    Don't miss this informative webinar register today!
  • From Coin Mining to Supply Chain Attacks. The Latest Threat Trends Explained.
    From Coin Mining to Supply Chain Attacks. The Latest Threat Trends Explained.
    Orla Cox, Director Development Symantec Recorded: Jan 8 2019 35 mins
    From the sudden spread of WannaCry and Petya/NotPetya, to the swift growth in coin miners, 2017 provided us with another reminder that digital security threats can come from new and unexpected sources.Not only has the sheer volume of threats increased, but the threat landscape has become more diverse, with attackers working harder to discover new avenues of attack and cover their tracks while doing so.

    Join Symantec's leading threat expert, Orla Cox as she shares findings from the 2018 Internet Security Threat Report (ISTR) including insights on:

    - The Coin Mining Gold Rush
    - Shifting Trends in Ransomware
    - Targeted Attacks by the Numbers
    - Infecting the Software Supply Chain
    - The Surge in Mobile Threats

    Register Today
  • Risk Reporting
    Risk Reporting
    Dr Simon Ashby Recorded: Jan 7 2019 66 mins
    Are you looking at implementing a new risk reporting framework or update one that you have already? In this webinar we will explore some of the options that are available. Learn how to get the most from tools such as risk registers, risk and control indicators and risk matrices. Consider the options available when designing reports and identify the limitations of common risk reporting practices.

    Risk reporting is an important output from the risk management process and should be a key input into both strategic and operational decision making. But if the wrong tools are used or reports are poorly designed then reporting can do more harm than good. Are your reporting arrangements adding value to management decision making and promoting intelligent conversations about risk tasking and control or are they little more than a procedural exercise?
  • The Future of Threat Hunting & Incident Response
    The Future of Threat Hunting & Incident Response
    Justin Falck, Senior Product Manager & Gun Akkor, Director of Technical Product Management Recorded: Jan 3 2019 58 mins
    As the pioneer in the endpoint detection and response market, year after year Carbon Black has continued to innovate and deliver mission-critical incident response and threat hunting capabilities to advanced security operations teams worldwide. Join us for a look back at where we’ve been, what we’re doing, and what the future holds for Cb Response and our latest offering on to the Cb Predictive Security Cloud, Cb ThreatHunter.
  • GRC Buyer's Guide
    GRC Buyer's Guide
    Lockpath Recorded: Dec 27 2018 1 min
    Brief ad highlighting the benefits of the guide.
  • Career Conversations w/ Maggie Powell, Exelon
    Career Conversations w/ Maggie Powell, Exelon
    Jessica Gulick, CEO, Katzcy Recorded: Dec 21 2018 42 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Guest: Maggy Powell , MIA, International Economic Policy, Eastern Europe

    Maggy Powell is the Senior Manager, Real Time Systems Security for Exelon. Her teams include security engineering, a security operations center and security compliance focused on real time systems across the enterprise. She is responsible for vulnerability assessment, threat management and incident response for industrial control systems and operational technology as well as compliance fulfillment for applicable CIP cyber security standards.
  • GDPR: What You Need to Know Now
    GDPR: What You Need to Know Now
    Florin Lazurca, Technical Security Strategist, Citrix and Stephen Twynam ,Senior Sales Engineer, Citrix Recorded: Dec 20 2018 55 mins
    In May 2018, the General Data Protection Regulation (GDPR) takes effect. Are you ready? In a recent Ponemon study, 67% of respondents were aware of the GDPR, but only 50% of the organisations had allocated budget and started to prepare for these new regulations. GDPR will impose new rules on businesses, government agencies, and other organisations that offer goods and services to people in the European Union.

    In this webinar you will learn:

    • More about GDPR and how it will impact you
    • How you can work towards GDPR compliance
  • Best Practices for Implementing an Effective Security Awareness Training Program
    Best Practices for Implementing an Effective Security Awareness Training Program
    Michael D. Osterman, Principal Analyst, Osterman Research & Michael Madon, SVP & GM of Security Awareness Programs, Mimecast Recorded: Dec 20 2018 44 mins
    More than 90% of security breaches involve human error. These acts are not always malicious, but often careless and preventable. To change security behavior effectively, employees must know what to do, care enough to improve, and then do what’s right when it matters.
    An effective – and we stress effective – security awareness program is proven to change organizational behavior and lower risk. Join Michael Osterman, President, Osterman Research Inc. and Michael Madon, SVP & GM, Mimecast Security Awareness Products to learn more about the state of the industry and best practices for implementing an effective security awareness training program to change employee behavior and make your company more secure.
    Michael D. Osterman, Principal Analyst, Osterman Research
    Osterman Research was founded by Michael Osterman in 2001. Since that time, the company has become one of the leading analyst firms in the messaging and collaboration space, providing research, analysis, white papers and other services to global technology companies.
    Michael Madon, Senior Vice President & GM of Security Awareness Products, Mimecast
    Michael currently serves as the Senior Vice President and General Manager of Security Awareness Products at Mimecast. Prior to joining Mimecast, he was an early member of RedOwl, a software security company that was acquired by Raytheon. Michael also served on the Board of Directors of TeleCommunication Systems (NASDAQ: TSYS), a world leader in secure and highly reliable wireless communication technology which was acquired by Comtech Telecommunications Corp. in 2016.
  • What is your Security Strategy with Vanishing Perimeter?
    What is your Security Strategy with Vanishing Perimeter?
    Vamsi Ponnekanti, Director, Systems Engineering, Symantec Recorded: Dec 20 2018 60 mins
    Employees are increasingly remote and mobile, and they need access to cloud applications. Traditional concepts of network security are fading away. Organizations are turning to cloud-delivered security services that offer complete, "Direct-to-Net" protection. But not all service providers are the same - and the stakes are high. If you are looking at cloud service solutions to simplify your network security infrastructure while improving performance, be sure you make the right choice.

    Are you Responsible for:
    - Setting security objectives and strategies for your IT department
    - Identifying, controlling and reporting security incidents
    - Developing enterprise wide security programs
    - Driving security or compliance or regulatory initiates

    Then this webinar is for you!

    What will the webinar address?
    - How to plan for security in the move to the cloud?
    - How to protect your users from an evolving threat landscape?
    - How to make sure your data is secured and maintains compliance with legal regulations?
    - How to effectively manage new types of devices and your mobile/remote users?

    Register Now!
  • Beyond the Marriott Breach - What to Expect in 2019
    Beyond the Marriott Breach - What to Expect in 2019
    Speakers: Nir Gaist, CTO/Founder and Robert Zamani, Director of Solutions Architect. Moderator: Rene Kolga, Product Recorded: Dec 19 2018 64 mins
    What will 2019 bring for the security landscape? How many Marriott-like breaches should you expect? What new types of attacks are you likely to see, and what can you do now to prepare for them? Nyotron’s team of security experts will have the answers for you during our December 19th live webinar.

    Making informed predictions first requires thinking back on 2018 with a critical eye. We will review a few of the most significant vulnerabilities and data breaches that made national headlines, from the City of Atlanta to Meltdown and Spectre, to the Marriott debacle and why the healthcare industry appears unable to defend itself. Our panel will also discuss the issues and trends they expect will dominate 2019, including adversarial artificial intelligence (AI) and destructive attacks on ICS.

    We will wrap up with ideas on how you can make an effective case for additional security budget and how to educate yourself about the changing threat landscape (and to get those CPE’s before the year’s end).
  • How to Put an End to Hyperconverged Silos
    How to Put an End to Hyperconverged Silos
    Storage Switzerland, Axellio Inc. Jan 17 2019 6:00 pm UTC 60 mins
    Hyperconverged Infrastructure is supposed to simplify the data center by creating an environment that automatically scales as new applications and workloads are added to it. The problem is that the current generation of HCI solutions can only address specific use cases like virtual desktops or tier 2 applications. First generation HCI solutions don’t have the per node power to accommodate enterprise workloads and tier 1 applications. The organization needs a next generation HCI solution, HCI 2.0, that can address HCI 1.0 shortcomings and fulfill the original promises of HCI; Lower costs, faster innovation, simpler scale, single vendor and unified management. The combination enables HCI 2.0 to handle a variety of storage intensive workloads.
  • [Earn 1 CPE]  Critical Actions to Survive a Data Breach in 2019 and Beyond
    [Earn 1 CPE] Critical Actions to Survive a Data Breach in 2019 and Beyond
    Colin Whittaker, Moderator. Panelists: Stephen Boyer, BitSight; Jon Siegler, LogicGate; and Justin Fier, Darktrace. Jan 17 2019 6:00 pm UTC 75 mins
    With large-scale data breaches continuing to make the headlines in 2018, Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. Cyberattacks that target and infiltrate critical infrastructure are very real and for the United States, it’s not a matter of if, but when.

    Keeping your company secure is as much about detecting and responding to attacks as they occur as it is about preventing attacks before they happen. On this webinar our panel of experts will discuss THE critical actions organisations should consider to prepare for and survive any subsequent breach that may happen, and attendees will learn how to:

    - Implement security analytics for incident detection and response.
    - Quickly determine the extent of a compromise once a breach is detected, and understand the steps necessary to contain the affected systems.
    - Leverage AI to autonomously respond to emerging threats before they can do serious damage.
    - Understand key information that needs to be communicated to various stakeholders in the event of a breach.
    - Apply a “standard of due care” in order to prove compliance to regulatory agencies.
  • Virtualization and Storage Networking Best Practices
    Virtualization and Storage Networking Best Practices
    Cody Hosterman, Pure Storage; Jason Massae, VMware; J Metz, Cisco Jan 17 2019 6:00 pm UTC 75 mins
    With all the different storage arrays and connectivity protocols available today, knowing the best practices can help improve operational efficiency and ensure resilient operations. VMware’s storage global service has reported many of the common service calls they receive. In this webcast, we will share those insights and lessons learned by discussing:
    - Common mistakes when setting up storage arrays
    - Why iSCSI is the number one storage configuration problem
    - Configuring adapters for iSCSI or iSER
    - How to verify your PSP matches your array requirements
    - NFS best practices
    - How to maximize the value of your array and virtualization
    - Troubleshooting recommendations
  • A CISO, CIO, and Compliance Officer Grab Coffee
    A CISO, CIO, and Compliance Officer Grab Coffee
    Paul Chapman, Chief Information Officer | Joel De La Garza, Chief Information Security Officer | Crispen Maung, VP Compliance Jan 21 2019 10:00 pm UTC 47 mins
    What are the best ways to keep your cloud stack secure, your business compliant, and your users safe? Getting straight (and useful) answers to these simple questions isn't always easy.

    Watch a candid discussion with Box CIO Paul Chapman and his counterparts in Security and Compliance as they reveal how they work together every day to tackle the complex security and compliance challenges every global business faces today. They'll share best practices, pitfalls to avoid, and answer your hardest questions.

    This isn't your typical webinar. No slides. No pitches. No filters. Just a candid discussion with the guys who are safeguarding the data for over 80,000 businesses — including 67% of the Fortune 500 — as they share best practices and insights.

    Here's what they'll discuss:
    -How to get executives and users to care about security and compliance
    -Top of mind security or compliance issues (and tackling them)
    -The toughest challenges they faced
  • How GameStop Leverages the Cloud to Meet SLAs
    How GameStop Leverages the Cloud to Meet SLAs
    Jon Gery International IT Manager, GameStop and Seyi Verma Product Marketing Director, Druva Jan 22 2019 10:00 am UTC 52 mins
    GameStop, a global Fortune 500 company (NYSE: GME), needed an efficient cloud backup and recovery solution to meet business continuity requirements across its 7,200 retail stores in 14 different countries. The company had a myriad of virtualized environments with over 250TB of data but its on-premises backup infrastructure and procedures were so complex and inefficient, that GameStop was unable to meet business continuity SLAs.

    GameStop turned to Druva, and secured its data in enterprise server workloads and virtual environments through Druva Phoenix. Register for this webinar with special guest speaker Jon Gery, International IT Manager at GameStop, to hear how the company was able to:

    Unify global data protection requirements within a single system
    Increase the backup footprint of virtual machines by 20%
    Easily achieve their business continuity SLAs
    Reduce backup and recovery operating expenses by 70%
    Don't miss this informative webinar — Register today!
  • Post Perimeter Security 101 - Protecting a border-less world
    Post Perimeter Security 101 - Protecting a border-less world
    Aaron Cockerill, Chief Strategy Officer Jan 22 2019 11:00 am UTC 29 mins
    What is currently happening the world of security?

    Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.*

    The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations enforce their endpoints and establish continuous conditional access to data based on risk.

    During this webinar Aaron Cockrill, CSO at Lookout will talk about:

    - What does a post-perimeter world mean to enterprise security?
    - Why mobility changes the enterprise security paradigm?
    - How to protect data when accessed from outside the corporate perimeter?
    - What are the current and emerging threats?

    * Source Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
  • Digital Trust in the Age of Normalized Data Breaches
    Digital Trust in the Age of Normalized Data Breaches
    Jason Reed, Senior Industry Analyst, CyberSecurity, Frost & Sullivan Jan 22 2019 4:00 pm UTC 60 mins
    In a time when major data breaches have become a routine feature of the news cycle, digital consumer trust is an intangible and highly consequential metric for any organization conducting business online.

    With a focus on 10 major global markets, this session will show the results of groundbreaking research that quantifies this difficult-to-measure concept and outlines the business implications of building or losing trust.

    Key Takeaways:

    • Do perceptions of customers in the business community align with consumer reality?
    • What makes (or breaks) consumer digital confidence in organizations?
    • Find out the regional variations in the degree of trust consumers have in online services—and the impacts on consumer behavior.
  • The Game-Changing Impact of Gigabit-Class LTE on Enterprise Networking
    The Game-Changing Impact of Gigabit-Class LTE on Enterprise Networking
    Donna Johnson, Vice President of Product and Solution Marketing, Cradlepoint Jan 22 2019 5:00 pm UTC 60 mins
    With the arrival of Gigabit-Class LTE network solutions for enterprises and public safety agencies, the era of wireless WAN is here — and enterprise networking will never be the same. Utilizing Elastic Wideband technology, Cradlepoint’s new cloud-managed routers featuring built-in Gigabit-Class LTE modems provide the speeds, reliability, and flexibility necessary to drastically improve existing use cases, and to enable new ones that have never been possible in branch or vehicle settings.

    With game-changing Gigabit-Class LTE, which leverages technologies that are foundational pieces of 5G, wireless now meets or exceeds other broadband networks, but with the added value of mobility, immediate deployment, and standardized billing on a single nationwide carrier.

    Join Donna Johnson, vice president of product and solution marketing at Cradlepoint, for a live webinar to explore how the world’s first Gigabit-Class LTE solutions for enterprise networking can revolutionize wireless WAN and put organizations on the Pathway to 5G.
  • Tech Tuesday: Using the Swarm Object Storage Content Portal UI
    Tech Tuesday: Using the Swarm Object Storage Content Portal UI
    John Bell, Sr. Consultant & Brian Guetzlaff, Engineering Manager Jan 22 2019 7:00 pm UTC 60 mins
    In this webinar, John Bell and Brian Guetzlaff will explore the advanced capabilities of Caringo Swarm’s Content Management API, including managing user access, usage and content (using collections and metadata). They will provide a live demonstration and show you how to use the Swarm Object Storage Content Portal User Interface (UI). Attendees will also have the opportunity to ask questions throughout the webinar.
  • Are your Data Management Tools and Processes Scalable for a Multi-cloud World?
    Are your Data Management Tools and Processes Scalable for a Multi-cloud World?
    Tony Liau, Veritas & Matt Sirbu, Softchoice Jan 22 2019 8:00 pm UTC 75 mins
    Digital transformation is causing infrastructure to evolve faster than ever and managing data must be the top priority for any modern enterprise. Most organizations are working towards transforming their IT infrastructure and its associated capabilities, but traditional environments are being disrupted by cloud, virtualization, open source and hyper converged infrastructure. The need for holistic modern data management remains as crucial as ever to navigate this complexity and leverage information for strategic advantage.

    Join us on this webinar as Tony Liau, Director, Product & Solutions Marketing at Veritas Technologies and Matt Sirbu, Director of Data Management & Data Center Infrastructure at Softchoice discuss how the most important barrier to adopting hybrid IT is to have an intuitive data management solution.

    Attendees of this webinar will learn how you navigate through these IT obstacles to build an agile solution that extends across on-prem and off-prem architectures.

    About the speakers:

    Tony brings over 15 years of enterprise experience to Veritas, taking innovative data management solutions to market. In his current role as Director and Head of Product & Solutions Marketing for Data Protection and management, he leads product launch, go-to-market and global campaign strategy. Before joining Veritas, Tony held senior roles at other data protection and security companies such as Barracuda Networks, Symantec and Cisco.

    Matt Sirbu has spent over two decades in Information Management; focusing on Data Center Optimization, Protection, Availability and Data Intelligence solutions. Having covered most market segments across North America, he has demonstrated an ability to enter new industries, learn their unique requirements, and develop comprehensive strategic direction with exceptional results. He joined Softchoice in July of 2015, coming from Dell where he was the Director of Storage Strategy for North America.
  • The Software-Defined Data Center: A Foundation for Digital Transformation
    The Software-Defined Data Center: A Foundation for Digital Transformation
    David Hines, Vice President of Architecture and Engineering - TierPoint Jan 22 2019 9:00 pm UTC 60 mins
    As reported in Forbes last year, 73% of companies are planning to move to a fully software-defined data center within two years.

    A software-defined data center is based on a virtualized environment of compute, storage, networking and security in conjunction with policy-based management and automation. The evolution from a traditional data center architecture to one that is software-defined can take months if not years but can yield immense benefits for the business.

    Join us for a discussion on the progress toward the fully software-defined data center, including benefits of infrastructure as code and overcoming challenges associated with traditional workflows.
  • Uno sguardo al futuro: la Cyber Security nel 2019 e oltre
    Uno sguardo al futuro: la Cyber Security nel 2019 e oltre
    Marco Riboli, VP Southern Europe di FireEye Jan 23 2019 1:30 pm UTC 45 mins
    Il 2018 sta volgendo al termine e, come di consueto, ecco il nostro aggiornamento sull’evoluzione del mondo della cyber security nel 2019 e oltre. Sappiamo che gli attaccanti attaccheranno e che i difensori faranno di tutto per fermarli. Dobbiamo però essere pronti ad affrontare le minacce imminenti, oltre a restare un passo avanti rispetto agli attaccanti, se non addirittura precederli.

    Marco Riboli, VP Southern Europe di FireEye, offrirà una panoramica sulla sicurezza del mondo cyber nel 2019. In questo webinar, Marco affronterà diversi punti trattati nel report ‘Facing Forward: Cyber Security in 2019 and Beyond’, frutto dell’esperienza e delle conoscenze dei nostri senior leader, degli analisti di FireEye iSIGHT Intelligence, degli esperti di Incident Response di Mandiant, e dei Labs di FireEye. Partecipa per saperne di più su:

    •Minacce nel settore dell’aviazione, compreso lo spionaggio informatico e il cybercrime
    •Come le grandi nazioni e i paesi emergenti affronteranno i rischi cyber
    •Come gli attaccanti stanno modificando le loro tattiche per essere sempre un passo avanti rispetto alle strategie di difesa

    Registrati subito per scoprire cosa ci riserva il futuro della cyber security.
  • Data Center Outage Trends, Causes and Costs
    Data Center Outage Trends, Causes and Costs
    Andy Lawrence, Executive Director of Research; Chris Brown, CTO; Todd Traver, VP IT Optimization & Strategy Jan 23 2019 5:00 pm UTC 60 mins
    Members of Uptime Institute’s executive team discuss the newest findings about data center outages, including trends in causes and types, along with strategies for reducing the number and impact of outages.
  • Commvault Activate
    Commvault Activate
    Philippe Decherat Jan 24 2019 8:30 am UTC 45 mins
    Analyse des données :
    Depuis les sauvegardes et les données de production
    Content Indexing :
    Détection de type de données (RGPD)
    Recherche conformité : eDiscovery, legal hold
    Gestion des données sensibles
  • AI in Financial Services, it's all about the data
    AI in Financial Services, it's all about the data
    Patrick Smith, Pure Storage Jan 24 2019 10:00 am UTC 45 mins
    The increasingly competitive climate within Financial Services means that enhancing business outcomes by leveraging AI is essential. Data has never been more important to business success and a key aspect to optimising its value is in conjunction with AI.

    In this session we will discuss the areas in which Financial Services are looking to leverage their data together with AI and some of the considerations for successful implementation of an AI infrastructure that accelerates time to value for these projects.
  • Show and Tell: Blue Prism Digital Exchange and v6.4
    Show and Tell: Blue Prism Digital Exchange and v6.4
    Richard Pauly, Head of DX | Bart Peluso, Head of Product Marketing | Chieng Moua, Solutions Engineering Manager Jan 24 2019 4:00 pm UTC 60 mins
    Following the launch of the Blue Prism Digital Exchange, come and join us for our inaugural Pulse Online Webinar to see the platform in action, as well as a demo of the new features of Blue Prism's v6.4.

    -= What is the Blue Prism Digital Exchange? =-
    The Digital Exchange (DX) is a “shop window” for finding & consuming pre-built AI, cognitive & disruptive technologies. The DX gives global enterprise customers direct access to technologies from Blue Prism and its technology partners as downloadable connectors, reusable Visual Business Objects (VBOs) or via referrals to the partner via an easy-to-use storefront. Thanks to a robust ecosystem of partners, Blue Prism customers can instantly execute their choice of AI, Machine Learning, Analytics, OCR & more through open API’s.

    -= What's new in v6.4? =-
    * Integrated ‘Skills’ (Toolbar) in the product
    * Simple drag & drop functionality.
    * New Web API Services (‘API Configurator’) facilitates easier integration of APIs.
    * Simplifies web services within a process flow.

    -= Speakers =-
    * Richard Pauly, Global Head of the Digital Exchange, Blue Prism
    * Chieng Moua, Solutions Engineering Manager, Blue Prism
    * Bart Peluso, Global Head of Product Marketing, Blue Prism

    Our panel of Blue Prism experts will be taking questions from the audience during the webinar, so make sure to join us for the live webinar.

    Pulse Online is Blue Prism’s product and technology focused webinar series. Every last Thursday of the month, get hands-on demos, tactical insight and best practices for taking your Digital Workforce to the next level.
  • Data Center Transformation with HPE Microsoft Storage Solutions
    Data Center Transformation with HPE Microsoft Storage Solutions
    Mike Harding, Product Manager - Microsoft Storage Solutions, HPE Jan 24 2019 4:00 pm UTC 60 mins
    Learn how leading companies are improving application performance, reducing IT cost and simplifying their IT administration with Microsoft solutions from HPE. This free webinar introduces HPE Microsoft Storage Solutions that are ensuring business-critical performance and availability for Microsoft SQL Server, Exchange, SharePoint, Windows cloud and Azure Stack infrastructure. Customer case studies and solution offering details will show how to get enhanced SQL Server performance, Higher-density and scale Exchange environments, and simplified administration across your Windows environment with free plug-ins and automation tools.
  • Hybrid multi-cloud infrastructure for modern app delivery
    Hybrid multi-cloud infrastructure for modern app delivery
    Dave Potter, Senior Solutions Architect at Citrix, and Robin Manke-Cassidy, Director of Networking and Security Product Marke Jan 24 2019 5:00 pm UTC 58 mins
    IT transformation, cloud, and new application development methods are changing the face of application delivery infrastructure. These new infrastructures require flexibility, security, and operational efficiency to uncover the true value to the business. We will discuss the changes driving infrastructure architects to evaluate the application delivery networking and provide a clear strategy on successfully migrating your business to a modern app delivery for hybrid multi-cloud and Cloud Native environments.
  • The Hybrid Cloud Metadata Problem and How to Fix It
    The Hybrid Cloud Metadata Problem and How to Fix It
    Storage Switzerland, Infinite IO Jan 24 2019 6:00 pm UTC 60 mins
    Most organization’s use of public cloud storage resources is the hybrid use case. A hybrid cloud strategy enables organizations to leverage the location and resources that make the most sense for the given workload. A hybrid cloud strategy though requires a free-flow of information between on-premises and cloud storage. The problem is that most of the information exchange is metadata, not actual data and most cloud solutions don’t specifically address metadata acceleration.

    Key Takeaways:
    - A clear understanding of why lack of metadata management breaks hybrid cloud
    - Why most cloud solutions don’t solve the metadata problem
    - How to finally fix the hybrid cloud meta problem and create the ideal hybrid cloud infrastructure
  • Backblaze Hard Drive Stats for 2018
    Backblaze Hard Drive Stats for 2018
    Andrew Klein, Backblaze Jan 24 2019 6:00 pm UTC 60 mins
    At the end of 2018 Backblaze had over 750 petabytes of data storage on over 100,000 hard drives. We’ll examine the quarterly, yearly and lifetime failure rates for the hard drive models in service in our data centers. We’ll get our first look at the new 14 TB drives we started using in Q4 and get updates on the 8, 10, and 12 TB drives currently in service. In addition, we will:

    •Take a look at the SMART stats we are collecting and what they are telling us.
    •Compare the failure rates of consumer hard drives versus enterprise hard drives
    •Compare the failure rates of helium-filled versus air-filled hard-drives

    Join us.
  • Защита gmail & gdrive
    Защита gmail & gdrive
    Дмитрий Иванюк, эксперт по решениям Commvault Jan 29 2019 8:00 am UTC 90 mins
    Приглашаем Вас и ваших коллег принять участие в техническом вебинаре "Защита gmail & gdrive"
    В ходе вебинара вы сможете узнать:
    - принципы работы Commvault Complete Backup & recovery
    - методы защиты облачных решений от Google
    - задать вопросы техническому консультанту Commvault
  • Live Interview Panel: Addressing the Cyber Threats on the Horizon
    Live Interview Panel: Addressing the Cyber Threats on the Horizon
    Mille Gandelsman, Yoram Salinger, Guy Dagan, Elad Schulman, Kenneth Schneider Jan 29 2019 8:30 am UTC 60 mins
    Cyber threats continue to rise as organizations are embarking on their digital transformation journeys. The continued rise in cyber attacks is a key concern for CISOs in their efforts to protect the enterprise from financially motivated cyber criminals, as well as insider threats.

    Join security experts as they discuss:
    - New on the threat landscape
    - Notable cyber attack methods and strategies and how to protect against them
    - Areas for improvement
    - Solutions for network visibility, breach detection and response
    - Recommendations for improving security and steps to take today

    Elad Schulman, CEO, Segasec
    Yoram Salinger, CEO, Perception Point
    Mille Gandelsman, CTO and co-founder, Indegy
    Guy Dagan, Cofounder and Partner, Consienta
    Kenneth Schneider, VP Fellow, Symantec
  • Zukunftsprognosen: Cybersicherheit im Jahr 2019 und darüber hinaus
    Zukunftsprognosen: Cybersicherheit im Jahr 2019 und darüber hinaus
    Mike Hart, VP of Sales, Central Europe Jan 29 2019 10:00 am UTC 45 mins
    In der Cybersicherheitsbranche sind wir häufig so beschäftigt, dass der Jahreswechsel fast unbemerkt bleibt. Dies gibt Anlass, über die Entwicklungen und Erfahrungen aus den vergangenen zwölf Monate zu reflektieren und Strategien zur Bewältigung von Herausforderungen zu entwickeln.

    In der IT-Sicherheits-Branche ist es zudem wichtig, neue und potenzielle Trends zu erkennen, die in Zukunft eine Rolle spielen könnten. Mike Hart, VP Central Europe bei FireEye, gibt Einblick zur Cybersicherheit im Jahr 2019.

    Erfahren Sie mehr über:

    - Bedrohungen für die Luftfahrtindustrie, einschließlich Cyberspionage und Cyberkriminalität.
    - Was Sie von Angreifern aus etablierten und aufstrebenden Schwellenländern erwarten können.
    - Wie Bedrohungsakteure ihre Taktiken ändern, um ihrem Gegenüber immer einen Schritt voraus zu sein.

    In diesem Webinar erfahren Sie, wie Sie Cybersicherheitsbedrohungen immer einen Schritt voraus sein können.
  • ISM Webinar: Could personalised technology give you that extra 10%?
    ISM Webinar: Could personalised technology give you that extra 10%?
    Iain Sinnott – Sales and Marketing director – VanillaIP Jan 29 2019 11:00 am UTC 30 mins
    Key Takeaways:

    Technology is constantly evolving, and businesses are becoming more and more dependent on technology to run their businesses efficiently.

    Technology is transforming businesses and disrupting entire industries. One of those industries that has been heavily affected is sales.

    From prospecting to closing, today’s mobile, social, big data, and cloud technologies are revamping the sales process in ways that would have been unthinkable only a few decades ago.

    As a result, many sales organizations are embracing new technologies to drive productivity, profitability, and competitive advantage to revamp the sales process.

    With that in mind, here’s a look at some of the technological tools organizations are using to streamline the selling process:

    -Big Data
    -Social Platforms
    -Sales Force Automation Systems
    -Cloud-based CRM Technology
    -Mobile technology

    Reasons to Attend:

    -Why individuals need to be involved in the choice of business productivity tools
    -The different benefits different users derive
    -Why learning to work with salespeople is the best way for buyers to avoid white elephants

    Technology is constantly reinventing and improving, and the world is being constantly reinvented around it.
  • Live Interview Panel: IoT Cyber Attacks and Proactive Security
    Live Interview Panel: IoT Cyber Attacks and Proactive Security
    Moshe Shlisel, Hal Lonas, Itai Tevet, Guy Dagan Jan 29 2019 11:00 am UTC 60 mins
    The Internet of Things is set to reach 50 billion connected devices by 2020, according to a recent Cisco report, making them an attractive target for cyber criminals who can easily use them get inside networks of organizations worldwide. Once in, attackers can easily take over and control IP-enabled devices to extract data or implant malicious code.

    Join IoT and security experts to learn more about:
    - Unique challenges of securing IoT systems
    - IoT and AI: Threats, attack trends and recommendations for basic cyber hygiene
    - Proactive security strategies to stave off the threat of IoT cyber attacks

    Hal Lonas, CTO, Webroot
    Itai Tevet, CEO, Intezer
    Moshe Shlisel, CEO and Co-Founder, GuardKnox
    Guy Dagan, Cofounder and Partner, Consienta