Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Join our webinar to learn how you can reduce 70% of your infrastructure costs
    Join our webinar to learn how you can reduce 70% of your infrastructure costs
    adam Dagnall, James Clark Recorded: Aug 16 2019 29 mins
    Register here to join our free webinar!

    By using Splunk SmartStore you can easily decouple the compute and storage layers, so you can independently scale those resources to best serve workload demands. With SmartStore, Splunk Indexers retain data only in hot buckets that contain newly indexed data. Older data resides in the warm buckets and is stored within the scalable and highly cost-effective Cloudian cluster. SmartStore manages where data is stored, moving data among indexers and the external Cloudian storage based on data age, priority and users’ access patterns. As of today, clients can immediately achieve a 70% saving on Splunk Infrastructure.
  • From Skeptics to Champions: Selling the Value of Security Awareness Training
    From Skeptics to Champions: Selling the Value of Security Awareness Training
    Dale Zabriskie, Security Awareness Training Evangelist & Joe Krock, Cyber Training and Awareness Leader Recorded: Aug 15 2019 106 mins
    The value of security awareness training may be obvious to you and other cybersecurity professionals. But in order to launch a new or more comprehensive training program, you’ll need to convince management—and your end users. To make your case for security awareness training, speaking the language of your customer is key.

    Expect tough questions: What’s wrong with what we’re doing now? What measurable goals can the security awareness training program achieve? How does the program justify the cost? Users may have concerns the value of simulated phishing tests and whether training will interfere with their work.

    Taking the time to win over doubters and skeptics can reduce obstacles—and even turn them into future champions for your security awareness training program. In this webinar, you’ll learn about:

    - Best practices for selling the value of security awareness training internally
    - Preparing a business case for your training program
    - Engaging employees through creative programming, recognition, and incentives
  • Meet The CEO: HYCU, Inc’s Simon Taylor
    Meet The CEO: HYCU, Inc’s Simon Taylor
    Storage Switzerland, HYCU Recorded: Aug 15 2019 30 mins
    Backup and Recovery is as old as the data center itself, but organizations still struggle with the process. IT professionals have tried many solutions to solve their data protection solutions, and the market is full of options, but none seem to address the core issues. Launched only two years ago, HYCU, Inc took a different approach by building backup solutions custom-built for each environment they protect.

    Join HYCU, Inc’s CEO, Simon Taylor as he sits down with Storage Switzerland Lead Analyst, George Crump to discuss HYCU’s unique approach to the fiercely competitive backup market.
  • Vendor Risk Management for 2020 and Beyond
    Vendor Risk Management for 2020 and Beyond
    Sam Abadir, Lockpath Recorded: Aug 15 2019 48 mins
    Vendors are essential to your company's success; most organizations can’t operate without them. However, vendors require a different approach to risk management.

    Outsourcing your activities does not mean you outsourced managing the risk of those activities. The public, the regulators and the courts still hold you responsible. Without a considered approach to third-party risk management, the risk management of vendors and suppliers can easily get out of your control.

    In this live webinar, Lockpath’s Sam Abadir will share what vendor risk management for 2020 and beyond looks like, including:

    • What vendor risk management encompasses

    • How your organization can gain efficiency from proper vendor risk management

    • Advantages of managing vendors on an Integrated Risk Management or Governance Risk and Compliance platform

    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage vendor risk in 2020 and beyond by attending this educational webinar. Register now!
  • Cyber Security Brief: Tube data collected, Baltimore ransomware & BlueKeep
    Cyber Security Brief: Tube data collected, Baltimore ransomware & BlueKeep
    Cyber Security Brief podcast Recorded: Aug 15 2019 21 mins
    On this week’s Cyber Security Brief podcast, Candid Wueest and Dick O’Brien discuss Transport for London’s plans to start collecting data about the customers using its Wi-Fi, and what that might mean for people’s privacy. Also, the ongoing repercussions of the ransomware attack that hit the U.S. city of Baltimore, including revelations about the use of the EternalBlue tool by the attackers, plus an update on activity surrounding the BlueKeep RDP vulnerability that was patched by Microsoft a few weeks ago. Also this week, the teen who appeared in court in Australia charged with hacking Apple, and the latest Bitcoin scams doing the rounds online.
  • Strengthen Endpoint Security with Real-time Visibility and Remediation
    Strengthen Endpoint Security with Real-time Visibility and Remediation
    Rob Barker, Product Manager, Symantec Recorded: Aug 15 2019 46 mins
    In today’s world of increasing threats, there is a greater need to reduce the latency in data collection and act quickly based on that data. Join us on August 15 for a special webinar focused on our new real-time visibility and remediation capabilities to help protect and secure endpoints.

    In this webinar, we will discuss and demonstrate how Symantec endpoint management provides:

    Real-time management
    • gain deep visibility into your organization’s endpoints and software
    • make better-informed decisions
    • take faster actions such as identifying vulnerabilities and quickly deploying the appropriate patches and updates

    Integration with Symantec Endpoint Protection (SEP)
    • quarantine endpoints that fail a compliance scan to prevent the spread of infection
    • monitor the health of the SEP agent and quickly remediate if needed

    Don’t miss this great opportunity to learn how Symantec endpoint management solutions can strengthen endpoint security and maximize user productivity.

    Register Today
  • New Strategies to Optimize Your Storage Economics and Data Placement
    New Strategies to Optimize Your Storage Economics and Data Placement
    Grant Jacobson, Director, Technology Alliances, Cloudian + Kris Meier, Vice President of Product Management, InfiniteIO Recorded: Aug 14 2019 42 mins
    Data is a business asset only if it’s free to flow where your users and applications need it. But with enterprise data volume growing at 50% annually, traditional storage just can’t keep up, especially with huge scale and performance limitations as file counts and storage capacity growth needs accelerate. It’s time to update and modernize your storage infrastructure and take advantage of new technologies that will help you optimize your storage economics and data placement.

    Join InfiniteIO and Cloudian on Tuesday, August 14th, at 10am Pacific for a live webcast and conversation to learn about the advantages of metadata-driven solution that:

    • Delivers cloud economics with accelerated primary storage performance - without any changes or disruption to existing users, applications or back-end storage

    • Simplifies data placement and management across primary, secondary and cloud storage

    • Provides technical and operational efficiencies to achieve cloud economics

    • Cost-effectively scales with your growth

    • Provides unified visibility and control of your data, wherever it is, including public cloud


    Register today to hold your spot. Bring your most vexing data storage questions to ask us!
  • The evolution and future of supply chain attacks
    The evolution and future of supply chain attacks
    Alexander Liskin, Boris Larin, security researchers at Kaspersky Lab Recorded: Aug 14 2019 69 mins
    On August 14, 2019, Kaspersky security researchers will present an overview of the current state of supply chain attacks using technical analysis from the most significant cases, as well as outlining future attack forecasts.

    The webinar will cover the following areas:

    •How to recognize supply chain attacks
    •An overview and technical details of the most prevalent supply chain attack cases:
    -ShadowPad: carried out via popular server management software
    -CCleaner infection: backdoor attack affecting millions of users
    -Operation ShadowHammer: hijacking software updates of a tech giant
    •Supply chain attack techniques from the point of view of security professionals and cybercriminals
    •A history of other significant attack cases
    •The future of supply chain attacks and defense forecasts

    The webinar will be followed by a Q&A session, where participants can pose questions to Kaspersky researchers.
  • Distinguishing Common Practices from Best Practices in Vulnerability Management
    Distinguishing Common Practices from Best Practices in Vulnerability Management
    Ed Bellis, CTO and Co-Founder of Kenna Security; Ben Edwards Ph.D., of the Cyentia Institute Recorded: Aug 13 2019 57 mins
    Ask ten different security professionals how to do vulnerability management, and you’ll likely get ten different answers. But if you ask several hundred, you start to see a trend: some organizations stand out from all the others. They’re not just closing vulns, they’re lowering risk. These are the top performers in vulnerability management. So what is it, exactly, that they do differently?

    In the fourth volume of our “Prioritization to Prediction” research, Kenna Security and our research partner, the Cyentia Institute, provide the answers. Join Cyentia’s Ben Edwards Ph.D., and Kenna’s Ed Bellis for this insightful webinar where they’ll share the key contributing factors of top performing vulnerability management teams drawn from analyzing real-world data from hundreds of organizations.
  • Uniper | Achieving digital transformation using RPA
    Uniper | Achieving digital transformation using RPA
    Nancy Sachdeva, RPA CoE Lead, Uniper, Hamza Muhammed, AI & RPA Expert, Uniper Recorded: Aug 13 2019 49 mins
    Uniper is a leading international energy company with operations in more than 40 countries and around 12,000 employees. Uniper’s business is to provide a reliable supply of energy and related services. Its main operations include power generation in Europe and Russia and global energy trading, including a diversified gas portfolio. Uniper’s headquarters are in Düsseldorf, Germany.

    Uniper, is on its way to becoming a truly digital enterprise with Blue Prism’s connected-RPA. With RPA, the company is driving transformation of its processes and culture to deliver better outcomes.

    Achieving a top 5 position in ROM Excellence for a Blue Prism award, the Uniper team will discuss how Business Areas, IT and CoE collaborate to achieve seamless integration between digital colleagues and human colleagues. Also highlighted, will be how processes are assessed, re-designed and implemented across various parts of organization, and how a strong, internal training program ensures that Uniper’s workforce is ready to sustain its digital future.

    In this webinar you’ll find out:
    • How RPA was set up, functions and remains sustainable
    • How the governance structure was built
    • Real-life examples of use-cases that have transformed the employee and customer experience
    • How Uniper builds tomorrow’s RPA talent
    • Lessons learned - what worked and what didn’t – along the Uniper’s RPA journey

    PLEASE NOTE : the live viewers had the opportunity to view an exclusive live demo but this is not available in the recorded version.

    Speakers:
    • Nancy Sachdeva, RPA CoE Lead, Uniper
    • Hamza Muhammed, AI & RPA Expert, Uniper
    • Dogan Dersüneli, RPA Expert, Uniper
    • Xina Seaton, VP Customer Experience, Blue Prism
  • Evolving Data Protection to a Hybrid Cloud Model
    Evolving Data Protection to a Hybrid Cloud Model
    Jason Walker, Technology Evangelist, Pure Storage Recorded: Aug 13 2019 35 mins
    Modernise your current legacy protection for rapid recovery and data reuse, seamlessly between private and public clouds for your customers.

    Learn how to benefit from the economies of cloud by leveraging AWS as the destination archive tier, all while maintaining that single namespace and global deduplication pool.

    Key technical lessons:

    - Modernise your legacy protection without the pain of a forklift solution.

    - Meet the emerging expectations of data availability and reusability by taking advantage of the cloud as an archive tier.

    - Move away from the cold, static tape tier to the more reliable, durable cloud tier.
  • Getting more from Azure Part 2: Backup and Storage
    Getting more from Azure Part 2: Backup and Storage
    John Noakes and James Wilson Recorded: Aug 13 2019 20 mins
    Microsoft Azure – which offers an open, flexible, enterprise-grade cloud computing platform is helping our clients do just that; helping them increase agility, do more and control costs with IaaS and PaaS.

    Whether you’ve already migrated some of your workloads or you’re considering migrating to Azure, this webinar shares best practice for operating, managing and securing most commonly used Backup and Storage workloads in Azure.
  • Previewing the Storage Developer Conference EMEA in 2020
    Previewing the Storage Developer Conference EMEA in 2020
    Alex McDonald, Vice-Chair SNIA EMEA, and Office of the CTO, NetApp; Paul Talbut, General Manager, SNIA EMEA Recorded: Aug 13 2019 29 mins
    The SNIA EMEA Storage Developer Conference (SDC) will return to Tel Aviv in early February 2020.

    SDC EMEA is organised by SNIA, the non-profit industry association responsible for data storage standards and education, and the conference is designed to provide an open and independent platform for technical education and knowledge sharing amongst the local storage development community.

    SDC is built by developers – for developers.

    This session will offer a preview of what is planned for the 2020 agenda ahead of the call for presentations and will also give potential sponsors the information they need to be able to budget for their participation in the event. If you have attended previously as a delegate, this is a great opportunity to learn more about how you can raise your profile as a speaker or get your company involved as a sponsor. There will be time allocated during the webcast to ask questions about the options available. Companies who have significant storage development teams will learn why this conference is valuable to the local technical community and why they should be directly engaged.
  • Beyond Data Protection, Enterprise Data Automation and Orchestration
    Beyond Data Protection, Enterprise Data Automation and Orchestration
    Commvault - Gregg Ogden Sr Solutions Manager, Mark Rytwinski Sr Director Product Management, David Porco Sr Product Manager Recorded: Aug 13 2019 29 mins
    Today’s hybrid- or cloud-based enterprises are more complex than ever before – making management of data copies much harder, and more expensive.

    To be effective, you have to know how to migrate applications to the cloud – or any other platform – without losing your shirt in the process. Solutions that provide advanced capabilities for application and database migration, copy data management and disaster recovery are a must.

    In this webinar, you’ll learn how Commvault Orchestrate provides what you need to automate and orchestrate data copies – whether on-premises or in the cloud:

    Application Migration

    • Orchestrated migration to Cloud

    • Self-service for DBAs or End-users

    • Support for industry-leading applications

    Copy Data Management (CDM)

    • Dev/test support

    • Instant virtual copies of databases and applications

    • Data masking for secure copies

    Disaster Recovery (DR)

    • Automated application/database DR
  • Cyber Security Brief: BlueKeep bug, ransomware “recovery” &  GozNym network
    Cyber Security Brief: BlueKeep bug, ransomware “recovery” & GozNym network
    Cyber Security Brief podcast Recorded: Aug 13 2019 21 mins
    In this week’s Cyber Security Brief podcast, we discuss the government employee who was charged with using his work IT systems to mine cryptocurrency, how Google is scanning your emails to collect information about your purchases, and the proof of concept exploits that have been created for the BlueKeep bug. We also chat about ransomware “recovery” services that are just paying the ransom, the dismantling of the GozNym network, and how Intel CPUs have been impacted by new MDS side-channel attacks.
  • Symantec Emerging Technologies: We Invest So You Don't Have To
    Symantec Emerging Technologies: We Invest So You Don't Have To
    John Cunningham, Vice President, Emerging Technologies, Asia Pacific, Symantec Recorded: Aug 13 2019 24 mins
    Staying current with the latest digital technologies can be a costly endeavour to both implement and secure, yet organisations cannot afford to fall behind. How can an organisation keep up with the ever-changing digital business landscape?

    Join John Cunningham, Vice President of Emerging Technologies, Asia Pacific at Symantec, in this webinar as he discusses:

    - The challenges organisations face trying to keep up with the digital landscape
    - How Symantec’s investments in emerging technologies can aid organisations
    - Symantec’s acquisition of Luminate to help organisations achieve Zero Trust
    - The enhancement of Symantec’s web isolation capabilities with Fireglass

    Register now to watch the webinar.
  • Meet The CEO: MemVerge’s Charles Fan
    Meet The CEO: MemVerge’s Charles Fan
    Storage Switzerland, MemVerge Recorded: Aug 12 2019 30 mins
    Workloads like artificial intelligence (AI), machine learning (ML), big data analytics, the Internet of Things (IoT) and data warehousing need storage memory-levels of performance. Charles Fan, CEO of MemVerge, has a vision for making this possible without disrupting the application programming model or the storage software. Join us as Fan discusses his company’s invention of “Memory-Converged Infrastructure (MCI).”

    Attend for additional discussion, including learning:

    The problems inherent in using dedicated clusters to serve these specific applications.

    Why it is so challenging for enterprises to enable modern workloads to run at memory speed with technologies like Intel’s Optane App Direct Mode.

    How to unlock the raw performance potential of Intel 3D XPoint Persistent Memory with the efficiencies of pooled storage – and without changing any code.
  • We want to save YOU 70% of your infrastructure costs.
    We want to save YOU 70% of your infrastructure costs.
    Adam Dagnall, James Clark Recorded: Aug 9 2019 25 mins
    The growth of machine and unstructured data is breaking the distributed scale-out mode that combines compute and storage in the same devices and limits your flexibility to choose the ideal resources for each. This drives up costs and makes it more difficult to accommodate growing data storage and analytics demands.

    Please join Splunk and Cloudian for an informative webinar to learn how SmartStore and HyperStore can:

    Independently scale compute and storage resources
    Reduce storage costs by up to 70%
    Simplify indexer updates (new cluster can inherit data from the original)
    Directly integrate with public cloud
    Attain built-in data protection

    Cloudian is Part of the Splunk Technology Alliance Program

    By using Splunk SmartStore it let’s you decouple the compute and storage layers, so you can independently scale those resources to best serve workload demands. With SmartStore, Splunk Indexers retain data only in hot buckets that contain newly indexed data. Older data resides in the warm buckets and is stored within the scalable and highly cost-effective Cloudian cluster. SmartStore manages where data is stored, moving data among indexers and the external Cloudian storage based on data age, priority and users’ access patterns. As of today, clients can immediately achieve a 70% saving on Splunk Infrastructure.
  • Securing the Multi-Cloud in the Age of Threats
    Securing the Multi-Cloud in the Age of Threats
    Raj Mallempati (CloudKnox Security) | Chris Schueler (Trustwave) | Tim Choi (Proofpoint) | Nathan Wenzler (Moss Adams) Recorded: Aug 8 2019 55 mins
    How are organizations handling security for their multiple clouds and applications? Join cloud and security leaders in an interactive discussion to learn about:
    - Multi-cloud reality
    - Addressing your cyber risk
    - Managing vulnerabilities, detecting breaches and responding to incidents
    - Automating security tasks across multiple clouds and applications
    - Recommendations for improving enterprise cloud security

    Speakers:
    - Raj Mallempati, COO, CloudKnox Security
    - Chris Schueler, Senior Vice President of Managed Security Services, Trustwave
    - Tim Choi, VP, Product Marketing, Proofpoint
    - Nathan Wenzler, Senior Director of Cybersecurity, Moss Adams
  • Webisode 4: Proofpoint Demo - Enterprise Information Archiving
    Webisode 4: Proofpoint Demo - Enterprise Information Archiving
    Tom Mahoney, Senior Archiving Sales Specialist; Jason Colvin, Senior Systems Engineer Recorded: Aug 8 2019 29 mins
    Developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content.

    Join us for the last of four webisodes to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance
  • Seven Steps to Effective Reputational Due Diligence
    Seven Steps to Effective Reputational Due Diligence
    John Arvanitis, Kroll; Tony Rock, Lockpath Recorded: Aug 8 2019 64 mins
    In today’s environment of evolving regulatory regimes and societal norms, more attention than ever is paid to how and with whom companies do business. As a result, effective reputational risk management is increasingly important for today’s compliance and ethics professionals. This webcast, “Seven Steps to Effective Reputational Due Diligence” discusses what organizations can do to protect and preserve its most important asset – its reputation.

    Topics covered include:

    • Creating a culture of compliance and accountability
    • Instituting and updating the code of conduct
    • Establishing a risk assessment methodology
    • Building a framework of communication and training related to reputation management
    • Crafting a third-party management strategy
    • Improving the Investigation and Reporting process
    • Instilling an Environment of Continuous Improvement
  • Global Sports Brand Builds a Fault-Tolerant Disaster Recovery Strategy Using Com
    Global Sports Brand Builds a Fault-Tolerant Disaster Recovery Strategy Using Com
    Jeanna James, Commvault and Henry Axelrod, AWS Recorded: Aug 8 2019 58 mins
    A global sports brand needed to migrate data from legacy backup products used across its enterprise to consolidate its data centers. The company had more than 2,000 servers and multiple petabytes of data to protect.

    Join the webinar to hear how the global sports brand adopted an environment that is:

    fault tolerant
    highly redundant
    protected across geographic regions using Commvault Complete™ Backup and Recovery combined with Amazon Web Services (AWS) storage services.
  • How to Empower the Modern Workforce to Collaborate with Microsoft Teams
    How to Empower the Modern Workforce to Collaborate with Microsoft Teams
    Pat Finlayson, Go-to-Market Manager, Insight and Bradley Howe, Territory Channel Manager, Microsoft Recorded: Aug 8 2019 33 mins
    Combining chat, instant communication, file storage and meeting scheduling into one unified platform, Microsoft Teams™ empowers today’s modern workforce to collaborate, strategise and innovate like never before.

    Watch the webinar to hear from Insight and Microsoft experts as they discuss how you can create a shared workspace with Microsoft Teams.
  • Security Begins Here: Insight from Shan Lee
    Security Begins Here: Insight from Shan Lee
    Nominet Cyber Security Recorded: Aug 8 2019 5 mins
    Nominet’s Security Begins Here series captures thoughts and opinions from some of the most influential and vibrant voices in the cyber security industry. We explore the issues organizations are exposed to every day at every level: from digital transformation, to cloud security and cyber confidence. Our series experts draw from first-hand experience to explain how they have dealt with today’s cyber challenges, with advice on how others can better manage security risks.

    Shan Lee is CISO and DPO at TransferWise, a financial company for people who travel, live and work internationally. In this video he discusses his views on security culture in the workplace, as well as the challenges companies face in the fast-evolving wold of cloud security and cyber confidence.

    #SecurityBeginsHere
  • Digital Transformation: Perspectives from Industry Leaders
    Digital Transformation: Perspectives from Industry Leaders
    Nominet Cyber Security Recorded: Aug 8 2019 3 mins
    Today, if an organization is unable to keep pace with digital disruption its very existence is at threat. What’s more, unlike many previous business challenges, digital transformation is not a one-off event. Rather, it’s an unfolding process that changes over time as new technologies emerge that lead to new business models and modes of differentiation.

    Digitally transforming an enterprise to a point where it is capable of continual innovation is a huge prize, but it also brings with it a range of challenges, particularly when it comes to cyber security. In the digital age, organizations can no longer hide behind the security of their perimeter walls. Instead, they must open up digitally to partners, suppliers, IoT devices and even competitors in order to create the seamless, customer-centric services people increasingly demand.

    We spoke with industry leaders to garner their views on cyber security in the age of digital transformation.
  • Withstanding the world’s no. 1 attack vector
    Withstanding the world’s no. 1 attack vector
    Oleg Gorobets, senior global product marketing manager at Kaspersky Aug 19 2019 2:00 pm UTC 75 mins
    Email offers cybercriminals an multitude of potential attack scenarios. Join our webinar to find out what to expect, and how to protect your business against the world’s no. 1 attack vector.
  • Top Security Considerations in Moving to the Cloud
    Top Security Considerations in Moving to the Cloud
    Sherif El-Nabawi, Vice President, Systems Engineering, Asia Pacific and Japan, Symantec Aug 20 2019 5:00 am UTC 30 mins
    By 2020, organisations in Asia Pacific are expected to utilise an average of 5 cloud solutions. But with 51% of these organisations storing sensitive data on public clouds and 45% feeling that the public clouds’ security features are sufficient, organisations urgently need to factor in more security considerations when moving to the cloud.

    In this webinar, Sherif El Nabawi, Vice President of Systems Engineering at Symantec Asia Pacific and Japan, discusses the top security considerations in moving to the cloud, including:

    - The risks and issues created by cloud migration
    - Symantec’s Direct to Net Secure Access Services
    - IaaS and SaaS adoption challenges and solutions
    - Why every organisation needs to establish a Cloud Center of Excellence

    Register now to watch the webinar.
  • Cyber Security Brief: Waterbug, “Smart” TVs, and BEC Scam Hits Canadian City
    Cyber Security Brief: Waterbug, “Smart” TVs, and BEC Scam Hits Canadian City
    Cyber Security Brief podcast Aug 20 2019 8:00 am UTC 24 mins
    In this week’s Cyber Security Brief podcast, we discuss the drama that ensued when Samsung tweeted about scanning their smart TVs for malware, a city in Canada lost CA$500,000 to a BEC scam, and three universities in the U.S. revealed in the same week that they were hit by data breaches. Also, we discuss new research just published by Symantec into the Waterbug/Turla group, and two different Android threats that were in the news this week.
  • Data Quality in Banking:Turning Regulatory Compliance into Business Value
    Data Quality in Banking:Turning Regulatory Compliance into Business Value
    David Burk, Financial Services Expert & Steve Shissler, Syncsort Aug 20 2019 9:00 am UTC 53 mins
    Regulatory compliance – and avoiding the stringent fines for noncompliance – is a top concern for banks around the world. Yet, the fast pace of change, and the complexity of regulations, make adhering to these mandates harder than ever. The prerequisite to comply with all these regulations is high-quality, trusted data to ensure effective governance and reporting. By adopting robust data quality practices, not only does your bank benefit by staying compliant, it also reaps the rewards of better business decisions, higher operational efficiency, better customer service and more.

    Join us with Financial Services expert David Burk for a discussion on:
    • The background for regulatory reporting and key financial regulations
    • Understanding how data quality helps institutions succeed with regulatory reporting compliance
    • How regulatory reporting improves data for other business decisions
    • How financial institutions leverage Trillium DQ to deliver quality data
  • Getting more from Azure Part 3: SQL Database
    Getting more from Azure Part 3: SQL Database
    John Noakes and James Wilson Aug 20 2019 10:00 am UTC 18 mins
    Microsoft Azure – which offers an open, flexible, enterprise-grade cloud computing platform is helping our clients do just that; helping them increase agility, do more and control costs with IaaS and PaaS.

    Whether you’ve already migrated some of your workloads or you’re considering migrating to Azure, this webinar shares best practice for operating, managing and securing SQL Database through the Azure platform.
  • Explore the Benefits EDR tools and Services
    Explore the Benefits EDR tools and Services
    Jon Oltsik, Sr. Analyst, ESG and Bob Shaker, Adam Glick and Steve Meckl from Symantec Aug 20 2019 2:00 pm UTC 58 mins
    Plagued by sophisticated threats, increasing workloads, and an ever-expanding attack surface, security teams are turning to Endpoint Detection & Response (EDR) tools and Managed Endpoint Detection and Response (MEDR) services.

    Join ESG and Symantec as we discuss how organizations are using solutions to improve their threat detection and response efforts.

    We'll cover:

    - Trends impacting threat detection efforts

    - How organizations are using EDR and MEDR solutions

    - The benefits of using an MEDR service
  • Tackling the Top 5 Incident Response Challenges with SOAR
    Tackling the Top 5 Incident Response Challenges with SOAR
    John Moran, Senior Product Manager, DFLabs Aug 20 2019 3:00 pm UTC 60 mins
    Incident response can feel like a constant battle, especially for those analysts who are on the front lines of the organization’s response, struggling every day to protect its resources and minimize risk from any potential security events.

    While there are some inherent challenges in incident response which will exist no matter the circumstances, it is the responsibility of security managers and executives to reduce or remove impediments to the incident response process as much as possible. Incident response will never be a frictionless process, however, there are many things we can do to minimize the impediments and provide analysts with the needed resources in order to be successful.

    Year after year, security analysts express the same challenges, across all verticals. Even though we have made many important strides in the past several years, it is clear that our current approach is not adequate to completely solve the most pressing challenges we are facing.

    Incident response analysts typically possess a high drive and passion for their chosen career. Not being given the proper tools to perform a job can be demoralizing and cause the types of analysts you really want on your team to look elsewhere for career satisfaction. With competition for skilled analysts as strong as ever, this is a real concern.

    In order to overcome these challenges, organizations today are increasingly turning to the capabilities of Security Orchestration, Automation and Response (SOAR) technology to help.

    Join this webinar to learn more in-depth about these top 5 incident response challenges and how a SOAR solution can be utilized to successfully resolve them:

    - Shortage of staffing and skills
    - Lack of budget for tools and technology
    - Poorly defined processes and owners
    - Organizational silos between IR and other groups or between data sources and tasks
    - Lack of integration with our other security and monitoring tools
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Aug 20 2019 4:00 pm UTC 45 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a live demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Achieving Business Continuity in the Age of Ransomware
    Achieving Business Continuity in the Age of Ransomware
    David Shaw, Chief Science Officer at Nasuni | Anne Blanchard, Senior Director of Product Marketing at Nasuni Aug 20 2019 5:00 pm UTC 13 mins
    On May 7, 2019, the city of Baltimore was hit by a ransomware attack - code named “RobinHood.” Hackers used remote encryption to lock down the city’s file servers and demanded payment of 13 bitcoin in exchange for keys to release them. The city immediately notified the FBI and took systems offline to keep the attack from spreading, but not before it impacted over 10,000 computers and multiple city departments. The cost? An estimated $4.6M in data recovery costs alone. All told, the cost to restore data, the cost of new systems that would prevent an immediate new attack, and the lost revenue totaled over $18M.

    Scenarios like this are causing many companies to reexamine their plans for disaster recovery in order to ensure business continuity, not just in the face of equipment, software, or network failures, but also in the event of a ransomware attack.

    Anne Blanchard, Senior Director of Product Marketing sat down with David Shaw, Chief Science Officer at Nasuni, to discuss the Baltimore incident, tips on how to avoid a ransomware attack, and how to dramatically decrease business downtime and cost following an attack.
  • 2019년 클라우드 보안 위협 보고서: 최신 클라우드 보안 동향 파악
    2019년 클라우드 보안 위협 보고서: 최신 클라우드 보안 동향 파악
    김봉환 상무 , 시만텍코리아 SE 본부 Aug 21 2019 5:00 am UTC 60 mins
    현재 클라우드 보안이 현실에 올바르게 대응하고 있다고 생각하십니까?

    시만텍은 클라우드 보안 환경에 대한 인식과 관련하여 전 세계 보안 의사 결정자를 대상으로 설문 조사를 실시하고, 그 결과를 시만텍이 모니터링한 경험적 데이터 소스와 비교했습니다.

    클라우드 보안 전문가들이 함께하는 웹 세미나에 참여하십시오. 김봉환, 시만텍 수석 시스템 엔지니어링 관리자가 아래와 같은 내용을 논의합니다.

    • 2019년 클라우드 보안 위협 보고서의 주요 내용
    • 보안 위협 관련 실제 사례와 클라우드 보안에 대한 인식이 갈수록 진화하는 클라우드 보안 위협에 적절하게 대응하는지 여부
    • 제로 트러스트 보안 아키텍처를 통해 갈수록 확장되는 공격 범위에 대응하고 베스트 프랙티스 구현을 지원하는 방법
  • Webinar: How to Build a Change Workflow to Increase Control
    Webinar: How to Build a Change Workflow to Increase Control
    Maya Malevich Director of Product Marketing, Tufin & Ruth Gomel Director Product Design, Tufin Aug 21 2019 6:00 am UTC 58 mins
    “The only thing that is constant is change.” However, change can also be risky.

    Network security changes may lead to broken connectivity, exposure to cyberattacks, or even compliance violations that may result in an audit failure. How do you control and document changes to firewall access?

    Join this session to learn best practices for building a change workflow to:
    • Ensure all changes are documented and audit-ready
    • Enforce a security policy check within every change to improve control
    • Increase efficiency and eliminate errors through automation

    Register now to gain insight into what an effective workflow looks like and how you can streamline the change process you currently use.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    John Grim, Senior Manager, PS Advisory Services Aug 21 2019 2:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Erika Gifford, Senior Manager, GSS | Security Operations Advisory
    •Hayden Williams, Senior Manager, VTRAC | Investigative Response
    •John Grim, Managing Principal, VTRAC | Innovations and Development
    •David Kennedy, Managing Principal, VTRAC | Open Source Intelligence

    Preparing for and responding to data breaches and cybersecurity incidents is never easy. It takes knowledge of your environment and its unique threats, effective teamwork, and just as importantly, a rigorous Incident Response (IR) Plan. We'll introduce our monthly listeners to the VIPR Report – the Verizon Incident Preparedness and Response Report. We'll provide a high-level overview of our findings across three years of IR Plan assessments and data breach simulations. Insight will include:

    •Observations and recommendations across the six phases of incident response
    •Top takeaways for building a solid IR Plan and capability
    •Breach Simulations Kits and using these resources to run data breach tabletop exercises

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Quantifying Risk in Today’s Computing Infrastructures
    Quantifying Risk in Today’s Computing Infrastructures
    Vincent Rais, Director of Resiliency Services, Uptime Institute and Todd Traver, Vice President, IT Optimization and Strategy Aug 21 2019 4:00 pm UTC 60 mins
    The complexity of today’s hybrid environments increases risk – what do you need to look for?

    Despite the promised simplicity provided by the cloud and other technologies, the majority of IT loads still run inside enterprise data centers, leading to challenges in managing workloads across the hybrid architectures emerging between these facilities and the cloud. We’ll discuss what we are seeing, along with the challenges, focus areas and important critical success factors necessary to reduce risk and provide resiliency and uninterrupted application availability.
  • Webisode 6: Proofpoint Demo - Advanced People-Centric Cybersecurity
    Webisode 6: Proofpoint Demo - Advanced People-Centric Cybersecurity
    Joel Sierra, Security Sales Engineer, Proofpoint Aug 21 2019 5:00 pm UTC 38 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1. Gain deeper visibility into attacks and respond when things go wrong
    2. Solve for unified data protection
    3. Defend against email fraud and social media fraud
  • DFLabs and SEMNet: Strengthening Security Operations with SOAR
    DFLabs and SEMNet: Strengthening Security Operations with SOAR
    Andrea Fumagalli, VP of Engineering at DFLabs and John Chai, Solution Engineer at SEMNet Aug 22 2019 7:00 am UTC 60 mins
    In the race to keep up with the increasing number and sophistication of cyberattacks, organizations need to have the capability to not only try to prevent attacks, but to also respond to them when they should occur, before they turn into more damaging security breaches.

    With security operations teams experiencing a number of common challenges and pain points, including a lack of skilled cyber security professionals, a growing volume of security alerts being received, as well as a lack of integration of existing tools in the security tool stack to name a few, organizations are recognizing the need for security orchestration and automation and response (SOAR) technology to help to overcome them.

    Partnering with DFLabs, SEMNet is able to offer its award-winning SOAR solution, IncMan SOAR to customers throughout Asia pacific, providing them with the localized knowledge, guidance and support needed to enable them to successfully implement efficient and effective security operations and incident response programs.

    During this webinar you will learn:

    - What is Security Orchestration, Automation and Response (SOAR) technology?
    - Why there is a growing need for SOAR solutions?
    - The problems SOAR technology can help you solve
    - How it helps to improve security operations and incident response programs
    - How DFLabs and SEMNet partner together to make this possible

    Plus, you will get to see IncMan SOAR live in action, discover some of its use cases and ask any questions you may have.

    Together, DFLabs and SEMNet can ensure security operations teams have the right SOAR solution in place, with standardized processes and workflows to detect, respond to and remediate security incidents in the fastest possible time frame, before significantly impacting your organization.

    Please note: Your registration information will be shared with SEMNet who may contact you in follow-up to your registration and/or attendance of this webinar.
  • Что нового и интересного предлагает нам Command Center
    Что нового и интересного предлагает нам Command Center
    Дмитрий Иванюк, эксперт по решениям Commvault Aug 22 2019 8:00 am UTC 60 mins
    Уважаемые коллеги!

    Приглашаем Вас и ваших коллег принять участие в техническом вебинаре " Что нового и интересного предлагает нам Command Center "
    Дата: 22 августа 2019 года
    Время: 11:00
    Спикер: технический эксперт - Дмитрий Иванюк
    Язык вебинара: русский.

    В ходе вебинара вы сможете узнать:

    - Чем отличается от Java Gui
    -Возможности Commvand Center
    -Трудности выбора
    -Q&A

    Будем рады видеть Вас и Ваших коллег в числе слушателей!
  • Cyber Security Brief: Bug bounties, bad passwords, and Radiohead
    Cyber Security Brief: Bug bounties, bad passwords, and Radiohead
    Cyber Security Brief podcast Aug 22 2019 8:00 am UTC 21 mins
    On this week’s Cyber Security Brief podcast, it's episode 50! We discuss the EU’s bug bounty program, bad password security practice, and why “secure” websites are becomingly increasingly untrustworthy. We also chat about the start-up that hacked its own customers’ cryptocurrency wallets – in order to safeguard their funds, a further update on the RDP vulnerability we’ve discussed previously, and how the Spanish soccer league La Liga was misusing its mobile app. Finally, the story of how Radiohead called the bluff of a ransomware criminal.
  • Delivering an Effective Cyber Security Exercise: Enhanced Breach Response
    Delivering an Effective Cyber Security Exercise: Enhanced Breach Response
    Daniel Norman, Research Analyst, ISF Aug 22 2019 12:00 pm UTC 44 mins
    Organisations are constantly under threat with over two-thirds of them experiencing data breaches in 2018. As a result, preparedness and resiliency are paramount to protecting an organisation’s information from cyber attacks.

    Business leaders and their security teams can improve their ability to handle cyber attacks by running cyber security exercises. These exercises should help the organisation identify areas of improvement in people, process and technology, reducing the impact should a real cyber attack occur.

    In this webinar Daniel Norman, Research Analyst, ISF will share how organisations should approach running internal cyber security exercises to support breach identification, prevention and response.
  • How to Leverage NIST CSF
    How to Leverage NIST CSF
    Sam Abadir, Lockpath Aug 22 2019 4:00 pm UTC 60 mins
    Many organizations have difficulty leveraging information in their cybersecurity and business operations to make the right risk decisions, establish the right risk priorities and appropriately allocate budget to best achieve their risk management goals.

    Many believe that NIST CSF is another standalone methodology instead of a tool designed to help your organization understand and build a roadmap to achieve the right level of cybersecurity. Successful NIST CSF programs help integrate, message and prioritize cybersecurity efforts not only within IT but across the entire business.

    In this live webinar, Lockpath’s Sam Abadir will share what implementing a NIST CSF solution entails, including:

    • Framework support
    • Budget expectations vs. reality
    • Correctly assessing an organization’s needs to implement NIST CSF
    • Proper management and management skills
    • Prioritizing cybersecurity within an organization

    Find out what you need to know to implement a NIST CSF solution by attending this educational webinar. Register now!
  • How Gigabit Performance and Predictable Pricing are Disrupting the Wireless WAN
    How Gigabit Performance and Predictable Pricing are Disrupting the Wireless WAN
    Johna Till Johnson, Nemertes; Donna Johnson, Cradlepoint Aug 22 2019 4:00 pm UTC 45 mins
    Technology professionals tend to think of wireless WAN services as a tradeoff: Convenience at the expense of cost and performance.

    No more. 5G speeds range from 1 to 10 Gbit/s (depending on configuration), and carriers are moving towards flat-rate pricing models that encourage the use of 5G services. Coupled with technologies like SD-WAN, 5G will enable companies to deploy wireless in novel, game-changing ways.

    Tune into this webinar with Johna Till Johnson of Nemertes and Donna Johnson of Cradlepoint to find out how, and learn what it will take to put WWAN to work in your environment.

    About Nemertes — Nemertes is a global research-based advisory and consulting firm that analyzes the business value of emerging technologies. Since 2002, we have provided strategic recommendations based on data-driven operational and business metrics to help organizations deliver successful technology transformation to employees and customers. Simply put: Nemertes’ better data helps clients make better decisions.
  • How to Design an Adaptable, Flexible and Compliant Social Selling Program
    How to Design an Adaptable, Flexible and Compliant Social Selling Program
    Roman Tobe, Product Marketing Manager Proofpoint & Jeremy Goldstein, Sr. Solutions Consultant Hootsuite Aug 22 2019 5:00 pm UTC 60 mins
    Social media presents a big opportunity to develop relationships with clients and prospects. But the myriad regulations around it can be hard to interpret. It’s easy for advisers to wind up non-compliant or feel stifled and avoid the channel altogether.

    If you’re like your peers, you may wonder how to create a great experience for clients and advisers while staying compliant. Adding to the challenge, regulations are evolving as regulators and firms continue to observe the nuances of social. So the question is how do you design a social selling program that’s compliant, flexible and adaptable?

    Join Hootsuite and Proofpoint as our experts share:

    - How top firms balance compliance with their adviser experience
    - What experts believe is in store for social selling and compliance in the future
    - How Hootsuite and Proofpoint provide a solution that enables advisers and protects firms
  • Breach Detection and Response:Establishing Incident Response Processes and Plans
    Breach Detection and Response:Establishing Incident Response Processes and Plans
    Josh Rickard, Security Research Engineer, Rebekah Wilke, SOAR Advocate, at Swimlane Aug 22 2019 5:00 pm UTC 45 mins
    Many organizations lack adequate personnel, processes, procedures and technologies to detect breaches in real time. They have an even harder time responding promptly and accurately.

    In this webcast, Swimlane Research Engineer Josh Rickard and SOAR Advocate Rebekah Wilke will discuss the importance of establishing sufficient incident response processes and clear guidelines surrounding incident response plans.

    The two security orchestration, automation and response (SOAR) experts will outline how formulating, implementing and maintaining an up-to-date, robust breach detection and incident response plan will:

    - Reduce mean time to detection (MTTD) and mean time to resolution (MTTR).
    - Ease analyst burnout, enabling retention.
    - Allow analysts the opportunity to focus on anomalous behavior that could have a larger impact on the business.
    - Expedite disaster recovery for reduced security risk.
  • Case Study: Real-World Breach Response
    Case Study: Real-World Breach Response
    Brian DiPaolo, Chief Technology Officer; Mark Holdsworth, Managed Services Practice Manager Aug 22 2019 7:00 pm UTC 60 mins
    Accudata’s customer, a large ecommerce services provider, detected malware in an email sent to customers. However, their IT team discovered the malware was just the tip of the iceberg and began to dig deeper. Realizing the scope and magnitude of the breach, Accudata’s security and managed service teams were brought in to mitigate the attack and quickly began the remediation process.

    In this 60-minute presentation, Chief Technology Officer Brian DiPaolo and Managed Services Practice Manager Mark Holdsworth detail the challenges of identifying and eliminating an active attacker in order to bring the business back online.
  • Join our webinar to learn how you can reduce 70% of your infrastructure costs
    Join our webinar to learn how you can reduce 70% of your infrastructure costs
    Adam Dagnall, James Clark Aug 23 2019 10:00 am UTC 60 mins
    By using Splunk SmartStore it let’s you decouple the compute and storage layers, so you can independently scale those resources to best serve workload demands. With SmartStore, Splunk Indexers retain data only in hot buckets that contain newly indexed data. Older data resides in the warm buckets and is stored within the scalable and highly cost-effective Cloudian cluster. SmartStore manages where data is stored, moving data among indexers and the external Cloudian storage based on data age, priority and users’ access patterns. As of today, clients can immediately achieve a 70% saving on Splunk Infrastructure.

    Cloudian is Part of the Splunk Technology Alliance Program
  • Cyber Security Brief: Twitterbots, ransomware retirements, and email mishaps
    Cyber Security Brief: Twitterbots, ransomware retirements, and email mishaps
    Cyber Security Brief podcast Aug 27 2019 8:00 am UTC 19 mins
    On this week’s Cyber Security Brief podcast, we chat about our report looking into the Internet Research Agency's disinformation campaign targeting the 2016 US presidential election. We also talk about the apparent retirement of the operators behind GandCrab, and red faces in both the New Zealand government and the Dutch Data Protection Authority.