The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
Symantec Control & Compliance Suite – Automatisieren Sie Compliance-Abläufe, schaffen Sie Transparenz und sparen Sie wertvolle Zeit
Symantec Control Compliance Suite liefert geschäftsrelevante Sicherheits- und Risikoinformationen, mit denen Sie Prioritäten für die Bereiche Sicherheit, IT-Betrieb und Compliance effektiv abstimmen können. Bewertungen erfolgen fortlaufend und automatisiert. Sie erhalten damit eine Gesamtübersicht über Sicherheitskontrollen und Sicherheitslücken. Auf diese Weise sind Sie in der Lage, das Rechenzentrum zu härten, die Behebung von Sicherheitsvorfällen zu priorisieren, sicher auf ein Software-Defined Data Center umzustellen sowie kontinuierliche Bewertungen für die Cyber-Sicherheit und die fortlaufende Überwachung zu unterstützen
While hyperconvergence aims to make the datacenter more efficient, hyperconvergence can also be confusing at times, due to the numerous forms of HCI, the different approaches, and the varying levels of efficiency that can be gained.
In this exclusive educational event, we’ll cover what hyperconvergence really is, how it works from install to administration, and how it can help your company. We’ll take questions from you, our audience, on this registration form and answer those questions during the live event.
Join hyperconvergence expert Steve Hunt and moderator and vExpert, David Davis to get all your HCI questions answered on this live event!
Business interruptions can upset customers, cost sales, and put companies in a bad light. That's where business continuity management (BCM) comes in. A BCM plan details the impact of various disaster scenarios and formalizes steps for ensuring critical operations remain open during a crisis. In this live webinar, Lockpath's Sam Abadir will share a roadmap to smarter business continuity management.
* The role of business continuity management on operations
* How to identify risks that could potentially lead to disruptions
* Strategies for modeling the business impact of various disasters
* Importance of mapping plans to risk, controls, processes, and vendors
Learn how to better prepare your recovery plans by attending this webinar on smarter business continuity management. Register now!
Welcome to the NMG Media podcast series where we help bridge the communication gap between carriers and suppliers in the ICT sector. Today, we are joined by a leader in the cybersecurity sector, Jacqui McNamara, Head of Cyber Security Services at Telstra. Jacqui is a also former intelligence officer with the ADF and served for many years in different commands, including the G6 and Special Operations. We also welcome Mayukh Gon, a serial entrepreneur and the founder of PerfectCloud, a unified Cyber security company that focuses on Privacy and Security.
After your organization has identified an event, how do they identify and record the actual playbook response? In this session, you will see an incident response program intended to reflect the defined example playbooks for common information security based incidents, as well as related or dependent processes that support other GRC processes.
Kaspersky Lab experts will present their review of advanced persistent threat activity in the second quarter of 2018. They will chart the latest campaigns, tools and techniques deployed by established threat actors, the reawakening of previously quiet groups, and how Asia remained the epicenter of APT activity during Q2, 2018.
Second part of our 'Breach Response Preparedness Series’, a 3-part series on state-of-the-art incident investigation techniques and breach response strategies.
Statistics (from M-Trends 2018) show that the median dwell time (time between initial intrusion, and detection) for EMEA organisations in 2017 was 175 days. A 175 days roaming free inside the victim’s infrastructure; a large portion of which likely would have been with administrator privileges, thereby having the keys to the kingdom. To be able to respond to such breaches effectively and efficiently, Mandiant applies a structured approach, relying on its scalable technology platform, and threat intelligence collected over the last 14 years.
Join your host Jeroen Herlaar, Mandiant Regional Director, for a 25-minute webinar to discuss the Mandiant incident response approach, and why it matters to your organisation if you are confronted with a serious compromise.
We all think we know the cost of a wrong hire in sales. Many of us have paid the heavy price, but we often do we overlook the person whose job it is to hire the best and get the best out of them, the Sales Manager. If you think hiring the wrong salesperson is expensive, you can multiply that cost by 5-10x when you hire the wrong sales manager.
* Does your manager try to manage the numbers?
* Is your manager focused on being a supervisor?
* Do they treat recruitment as a chore and an interruption to their real job?
* Are they taking too long or failing to manage turnover?
* Are they managing from an ivory tower?
* Do they confused training with coaching and why does this matter?
* Do they rescue & accidentally create a culture of upward delegation & learned helplessness?
* Do they believe the excuses they hear?
* Are they more concerned with being liked than being effective?
* Are they inconsistent or lack clarity?
* Do they do what was done to them?
* Are they blaming their salespeople instead of taking responsibility for fixing the problems you need them to fix?
* Are they focused on the helping the wrong people?
* Are they worried about playing favourites?
If you answered “yes’ to any of these questions YOU have a problem.
A webinar for owners, CEOs and sales managers who are brave enough to look into the abyss. Not for softies!
This video provides an overview of Imperva solutions for database compliance and security. Imperva Data Activity Monitoring (DAM) and Database Firewall solutions help organizations meet data compliance requirements for SOX, GDPR, HIPAA, PCI and many more, and protect enterprise data from both internal and external threats.
Una vez que tenemos claros los beneficios que requerimos de una tecnología, es importante definir el mejor camino para alcanzarlos. Hablaremos aquí de dicha ruta, tanto para Nube Híbrida como para DRaaS.
Lack of control over privileged access to systems and data presents a significant risk to almost every organization. What is required to protect privileged accounts? Are you in control? Do you have an effective Privileged Access Management (PAM) program? This session discussed how to assess the current state of your PAM program, develop a road map to meet your desired target state, and select the right PAM solution to help you gain better control over privileged access.
First part of our 'Breach Response Preparedness Series', a 3-part series on state-of-the-art incident investigation techniques and breach response strategies.
Mandiant responds to hundreds of breaches on a yearly basis, across all industries and geographies, thereby gaining insights into the different threat actor groups and their TTPs. This also provides us with valuable insights into the how and why of the failing defences of the organisations we support in time of crisis.
Join your host Jeroen Herlaar, Mandiant Regional Director, for a 25-minute webinar to share our thoughts on what we experience on a daily basis while responding to the breaches that matter.
Should your organisation be archiving it's Social Media presence? What about SMS/MMS messages? The way we communicate is evolving and so too are the policies and guidelines around what needs to be securely archived within an organisation. Join us and learn how Micro Focus is helping organisations capture data from various sources into one unified secure location.
If you were to pose this question to your storage vendor or VMware support today, you would be likely to receive the answer: “No. vSphere does not support this.”
Nevertheless, with the VMware certified, universal vSphere APIs for Storage Awareness (VASA) provider from DataCore you can easily achieve that with full VMware support and without VVol certified hardware today. Use of local discs alone or in combination with other storage arrays as part of the Virtual Volumes datastore would even be sufficient.
Join our brief webinar and Q&A to learn how to make this happen.
Discover in our expanded live demo:
O How to setup such a solution in real life
O How to implement auto-tiering across different arrays
To develop a strong BCDR strategy, you start with the facts. A business impact analysis is, at its heart, a fact-finding mission. In the event of downtime, what would happen to your company? Do the BIA right and you’ll come to a deeper, more realistic understanding of your company’s current state of operations—and pave the way for creating a recovery strategy that actually works. Do it wrong and you’ll overwhelm your participants, alienate your IT department, confuse your senior management team, and - worst of all - devise recovery strategies, solutions and plans that won’t recover your business.
Join our webinar, where we will discuss 10 ways to avoid making your BIA a disaster. Attendees will walk away with practical advice and strategies like:
-How to validate your BIA approach with senior management
-How to build the right questionnaires to get to the right information
-Who to involve in the BIA process and why
Disaster Recovery plans have always been hard to create and maintain in part because it is difficult to meet the service levels that those plans promise. With recent trends like GDPR and ransomware threats, it is even more difficult for DR plans to live up to expectations.
Join Storage Switzerland’s Founder and Lead Analyst, George Crump, and Commvault’s Director of Product Management, Deepak Verma and learn:
1. What new trends and threats promise to break your current DR process
2. How to simplify creation and maintenance of your DR plan
3. How to meet the service levels that your DR plan commits you to
Believe it or not, it has been a year since WannaCry crippled organizations around the world, and since that time ransomware attacks have only accelerated. The ransomware "industry" is now a $5 billion market and is projected to grow to over $11 billion by 2019. Backup alone is not enough, ransomware is the new disaster, and it can impact any organization regardless of size or location. Are you ready for what is coming next? Attend our live webinar as experts from Storage Switzerland and Infrascale help you create a Ransomware Preparedness Checklist.
Today’s cybersecurity attacks are spreading faster, evolving quicker and targeting every organization regardless of size. Challenged with limited security resources, the most exposed part of many organizations is usually the least protected; endpoints.
Join Carbonite + Barkly in an upcoming webinar to learn:
- Common infection and exploitation techniques used in today’s attacks
- Strategies for proactively protecting your endpoints from ransomware and other malware
- Which endpoint protection and data backup capabilities are the most important for complete endpoint protection
You’ve just hired James Bond on to your sales team and you have high hopes for his performance. Assuming you really did hire James Bond and not Mr Bean in a Tux, what can you do to ensure disappointment?
Why! Fail to do a proper onboarding process! Delude yourself into thinking you hired an adult, a professional, someone who can be depended on to hit the ground running. “John is a big boy and doesn’t want me crowding him. I’ll let him get on with it.”
This is called management by abdication and is one of the cardinal sins of sales management.
Onboarding is the lost element of successful recruitment. The best sales managers have a 120 day onboarding plan for new hires. Why 120 days? Because that is the probation period a new hire is typically putting you (their manager, the job they actually bought, the company and the other people on the team) on in case they believe they have made a bad choice of career move.
You’ve invested time and money in attracting them, selecting them, offering them, legal & HR costs, managing their notice period, paying them, training them and you risk blowing your winnings because you’re too busy, too stupid or too lazy to finish the job you started!
Onboarding is not about giving them an Ops & Employee Manual to read, giving them some product training and provisioning them with passwords, a laptop and a phone. Those are the tiniest part of a good onboarding process. Onboarding should set up a new hire for success. It should be structured and confirm that you have made the right hire. It should tell you quickly if you haven’t so you can hire slow and fire fast.
A reliable onboarding process needs to cover 3 things:
* What do they need to know?
* By when do they need to know it?
* Where can they find it?
Third and final part of our 'Breach Response Preparedness Series', a 3-part series on state-of-the-art incident investigation techniques and breach response strategies.
Recovering from a large-scale incident is not an easy task. When compromised by an Advanced Persistent Threat, one must plan the efforts ahead of time to succeed in fully remediating and eradicating the attacker from the environment.
During this webinar, we will discuss:
- How to best remediate from such an event;
- The different stages of the preparation, when it is the best time to remediate, and how to classify actions;
- Examples of real investigations and remediation efforts to illustrate common complications like remediating too early, remediating partially and working with third party IT providers
Join your host Manfred Erjak, Professional Services Consultant, for a 25-minute webinar to discuss the latest incident remediation trends.
Join this webinar with experts from SolarWinds and Storage Switzerland as they discuss how IT can have the best of both worlds: a mixed storage system environment that targets the specific requirements of their various workloads, while also expertly managing that environment using its resources efficiently and optimally.
When it comes to High-Performance Computing (HPC), the volume of data that comprises data sets can easily over-burden primary storage. When that happens, performance and speed are compromised and research and business objectives are at risk. As data sets continue to grow, more and more HPC organizations are turning to object storage technology to build active archives. Learn how adding cost-effective object storage into your storage infrastructure can reduce storage TCO, provide continuous data protection, and give you the power of metadata so you can quickly retrieve data when you need it.
The benefits of DevOps transformation are significant and well-understood, with over 70% of organizations having already implemented or planning to implement DevOps within the next 12 months according to Forrester. But it’s not a change that happens overnight. After empowering tens of thousands of operations teams to effectively manage their services in production, we’ve distilled what we’ve learned from them into a few best practices that have been foundational to driving change and transforming to be more agile.
In this session, we’ll go over a few topics:
- Common operational challenges across the organizational spectrum
- The top best practices that organizations use to empower distributed teams
- How to enable both central and distributed teams to gain comprehensive visibility, take action on issues fast, and be more productive
- A couple of case studies of real organizations who have achieved successes in the journey toward DevOps transformation, and how they’re getting there
Cyber breaches are inevitable because attackers constantly change their tools, techniques and procedures (TTPs). Everyone is affected in different ways, whether from compromised systems or supply chains to the financial implications of non-compliance and breach notification.
Join us for a live video panel on trending topics in cyber security:
-Breach notification sources, dwell time and industries mostly likely to be compromised and retargeted by attackers
-Importance of understanding cyber attackers and their motives
-Red teaming to improve security effectiveness
-Cyber security skills gap
-Direct and indirect costs of a breach
-Requirements, processes and policies to handle the GDPR
Leverage Threat Intelligence where it matters most.
Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.
This month's theme: Insider and Privilege Misuse
Our Verizon Threat Research Advisory Center presenters will be:
• John Rudolph, Principal Consultant, Identity and Access Management
• Steve Atnip, Senior Analyst, Threat Intelligence
• David Kennedy, Managing Principal, Open Source Intelligence
• Laurance Dine, Managing Principal, Investigative Response – EMEA
For this month's theme of 'Insider and Privilege Misuse' we'll feature John Rudolph, Principal Consultant, Identity and Access Management who'll discuss insider threat motivations, common denominators, and countermeasures, to include the Zero Trust approach. We'll then touch base on the IR Pulse and trends in our caseload, followed by:
Network security needs are changing right before our eyes. Digital transformation is shifting workloads to the cloud, increasing mobile workforces, and expanding IoT footprints — and network on-ramps.
From branch locations to in-vehicle networks and IoT devices, cyberattacks become more advanced by the day. Today’s diverse network architectures and security needs make scalable solutions and flexible cyber threat intelligence essential. Many organizations want the cost savings and efficiencies of the cloud without having to sacrifice the level of security to which they’re accustomed.
Join Cradlepoint's Ken Hosac, VP of IoT Strategy, for this live webinar to explore the blending of legacy and next-generation measures to keep enterprise networks secure.
Hosac has helped drive Cradlepoint’s growth and development through roles in strategic planning, product management, solution strategy and thought leadership. He frequently represents the company at industry conferences and events, and served on the original Advisory Board for the IoT/M2M Evolution Magazine. Hosac has 25 years of experience in marketing, sales, R&D and manufacturing. Prior to joining Cradlepoint, he served as VP of Marketing for Casabyte (later acquired by JDS Uniphase). He also served as VP of Business Development for GoAhead Software (later acquired by Oracle). Hosac earlier spent 10 years at Hewlett Packard with cable modems and head-ends, set-top boxes, and personal computers in a variety of engineering and engineering management roles. He holds a B.S. degree in Electrical Engineering and an M.S. degree in Manufacturing Engineering, both from Stanford University.
NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM EDT
Financial Services and GDPR: The next 60 days….
In response to GDPR and Privacy Shield changes, entities in the Financial Services Industries have taken initial steps to identify gaps and modify their public facing privacy policies. This session will focus on what these heavily regulated industries will have to do in the next 60 days to establish and maintain a legally defensible position with respect to privacy and security of personal data not only to comply with regulation but to be poised to do business in the 21st Century.
IT professionals need a faster, smarter and simpler storage architecture. Organizations drive this need by deploying more diverse and demanding applications and services. Data is the very lifeblood of an increasing number of organizations. The consumers of this data need rapid and consistent access to it. The storage network is the circulatory system that drives that data throughout the organization. Like the human circulatory system, the storage network is the key to the organization realizing the full benefits of the data-driven era. Join experts from Storage Switzerland and Cisco as they discuss the new requirements for storage networking so it can deliver a faster, smarter and more straightforward experience for IT.
The journey to the cloud had just had a major breakthrough.
With VMware software now available on the global AWS Cloud, there is now a single, consistent, pervasive connectivity and a secure platform for apps and data. Whether that is in the Datacenter or in the AWS Cloud. This gives you the power to move existing applications seamlessly to the cloud and back as needed.
You’ll understand how you can quickly get workloads on the cloud without having to re-engineer your applications. Keep applying the skills you've developed on the VMware platform, backed by the large array of services in the AWS platform. This allows you to be agile, reduce capital costs and increase availability for innovations.
In this webinar, we will show you:
- How, as a VMware customer, you can go into the cloud without retraining, reconfiguring your apps, refactoring and more
- What it will mean to have immediate access to the AWS platform and services and how it'll accelerate innovation
- Immediate value Business Cases related to increased agility, disaster recovery, and stretch networking for high availability.
Scott Mathewson, Data Center Practice Lead, North America, Softchoice
As Practice Lead for Softchoice North America, Scott has over 25 years of Datacenter experience with EMC, VMWare and Cisco, he is responsible for defining Softchoice assessments and services offerings for VM ware and SDN. Scott works with customers to develop solid solutions as it relates to SDS, SDN, Cloud, management and automation solutions.
When it comes to working in cloud-based applications, the option of granular recovery isn’t a given. But the opportunity for human error can be: users delete important files, overwrite one another’s documents, and accidentally download viruses. And SaaS vendors may or may not have a recovery solution for you. If they do, there’s no guarantee that it'll be easy, that you’ll get the data in a useful format, or that the recovery will happen quickly or inexpensively.
Join this webcast and learn how StorageCraft Cloud Backup for Office 365 (and G Suite) provides granular protection for Exchange, calendars and contacts, OneDrive for Business, SharePoint, Public shared folder, etc. And you will avoid the sweat for storage space, software upgrades, or the possibility of an onsite backup server failing.
Enterprises worldwide are contending with an accelerated pace of digital transformation where reliable and flexible information technology infrastructure can have a significant impact on revenue and profitability. As data volumes grow, so does the complexity and cost of storing and managing the data, with added complications for data governance and compliance. As businesses move toward petabyte-scale data storage, object storage solutions are emerging as superior alternatives for balancing scale, complexity, and costs. IDC interviewed organizations that have moved key workloads to Hewlett Packard Enterprise Scalable Object Storage with Scality RING to understand the impact of the solution on storage costs and business operations. Senior IT leaders and line-of-business executives will come away with perspectives from these companies that have successfully managed the digital transformation challenges.
Cybercriminals and nation states are consistently using mobile threat tooling as part of their espionage or financially motivated attacks and campaigns. The Lookout Threat Intelligence team has noticed this increase as we research and protect against these adversaries. These actors are increasingly seeing value from having an offensive mobile capability in their toolkit and we have even seen low sophistication groups break into this space and successfully steal gigabytes of data from compromised devices. As BYOD and the prevalence of mobile devices in corporate environments continue to blur the traditional enterprise perimeter, the ability to understand the risks to mobile endpoints is critical.
Join Michael Flossman, Head of Threat Intelligence at Lookout, for this informative webinar as he covers the evolution of threat actors on mobile, discusses several recent high-profile cases, and explains why gaining visibility into your mobile endpoints and proactively securing them is key for today’s organizations."
Artificial Intelligence (AI) and Machine Learning (ML) are becoming mainstream initiatives at many organizations. Data is at the heart of AI and ML. Immediate access to large data sets is pivotal to successful ML outcomes. Without data, there is no learning. The goal of AI and ML is to try to simulate human thinking and understanding. AI and ML initiatives cannot however be realized unless the data processing layer has immediate access to, and a constant supply of, data.
There’s a difference between threat data and threat intelligence, and while the former may give you a better understanding of malicious data sources, IPs, websites, and domains, what it fails to do is give you and your security team the context to remediate a threat. When CVEs are responsible for tens of millions of attacks, simply having threat data won’t cut it.
When it comes to cybersecurity, knowledge is power. And as cyber criminals gain more sophisticated tactics, protecting yourself requires a more intelligent approach.
Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?
Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!
Amanda Berlin, MCITP
Tracy Maleeff, Masters in Library and Information Science
Discover the latest from Dell EMC Data Domain, the industry’s #1 protection storage. Hear what's new, expansions to the ecosystem, and the introduction of the DD3300 for small, midsized & ROBO environments. Plus, hear how Data Domain Virtual Edition saved the day for a customer when Hurricane Irma blew into town. Keep your mission critical data safe with Data Domain.
Are setting up a new channel or trying to revitalise an old or underperforming sales channel?
Have you invested time and money recruiting partners but feel disappointed they aren’t producing or have fallen silent?
Do partners bring you requests for duck-shoot demos that result in sales cycles that seem never to close?
Channel Partner Sales Managers have one of the toughest jobs in sales or sales management. They have to:
* Lead and manage without power
* Carry large targets and are responsible for key accounts
* Recruit partners who produce predictably & consistently
* Get the best out of partners
* Create and maintain engagement across partner organisations (sales, technical & management)
* Help partners make good money and stay committed & loyal
If you want to gain marketshare and expand quickly, identifying and selecting the right Channel Partner Sales Managers can be the key. Providing them with the correct tools and resources is essential.
Join us on 10th July for a webinar introducing a radical new approach to channel sales development.
* Startup businesses looking to build a channel from scratch
* Established business experiencing erratic or disappointing channel performance
* Companies looking to launch new products and services
* Companies launching into new markets
* Direct sales organisations looking to reduce their sales costs & headcount without a loss of earnings or quality
The cloud was supposed to be the answer to IT’s backup dilemma; instead, it in some ways has made the situation worse. In this live webinar join Storage Switzerland and Microsoft Azure for a roundtable discussion on what’s gone wrong with cloud backup and how to fix it. In this webinar we’ll cover the three problems with cloud backup.
Gone are the days that IT was focused on configuring, managing or troubleshooting infrastructure. The lines between "Clouds" are continuing to become blurred more and more. IT now demands simplicity; the business demands that all applications run fast and perform reliably. In this session, our experts will discuss the evolution of the datacenter focuses on a few core tenants: Simple. Scalable. Reliable. Secure.
Join us for a live webinar in which we examine the reasons why storage costs so much and how to drive down the cost of storage. Pre-register before May 1st and receive an exclusive copy of our latest white paper “How to Improve Your Storage ROIQ?” which will provide a step-by-step guide to improving storage performance and capacity while reducing storage spend.
How do you ensure your staffing plan meets your business's performance and risk requirements? Do you have an appropriate training program to drive a culture of continuous improvement? How can you evaluate and enhance your training program to ensure continuity of expertise, and retain key employees?
- Our development teams have a massive security backlog and can’t fix everything in code
- We need to protect legacy applications with no build pipeline or no dev team support them
- Struts 2 made us realize we need better production controls and faster zero-day response
- Our SOC has alert fatigue and has no visibility or context regarding production applications
- RASP is interesting technology – we are curious to see how we would use it
At Contrast Security, we have been hearing this from our customers and have been hard at work to solve these problems. We are proud to announce the release of the Contrast Targeted Defense Platform, the next generation of runtime protection.
Join Mahesh Babu (General Manager, Runtime Protection) to learn more about Contrast’s new Targeted Defense Platform and its new capabilities that include, but are not limited to:
- Intelligent, multi-technique detection
- Advanced attack response that goes beyond monitoring and blocking
- Language agnostic protection
- Simple deployment