Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Supply Chain Resiliency
    Supply Chain Resiliency Arghajit Adhicary, Global BCM Manager - Unisy Recorded: Feb 24 2018 61 mins
    Businesses are increasingly becoming more reliant on third parties for critical products and services. The factors are multi-fold : increased customer demand, time criticality, stringent service levels, evolving regulatory landscapes, technological advancements, mergers and acquisitions, diversification of risks, etc. With increasing dependencies on third parties, organizations become susceptible to major service disruptions owing to lack of supplier resilience; thus, running into risks such as loss of revenues, regulatory breaches, service level misses and eventually, loss of customer confidence. Supply Chain Resiliency is the key to sustained business model and must be integrated within the resilience or business continuity framework of organizations.

    This session will reflect upon a few key trends, levers, risks, regulatory requirements and overview of building third party business continuity assessment process.
  • Transformation of Business using Containers, Orchestration & Digital Initiatives
    Transformation of Business using Containers, Orchestration & Digital Initiatives Paul Nashawaty, Director of Product Marketing, DataCore Software Recorded: Feb 22 2018 39 mins
    Technological innovation is increasing and expanding at an exponential rate. In response, digital transformation has become an established objective for many enterprises, and the adoption of digital initiatives is now widespread. Docker, Kubernetes and other technologies related to containers are being leveraged to access and deploy systems of engagement. But before you go adding these technologies to your digital transformation road-map, you need to evaluate whether they're the best fit for your needs.

    In this webinar you'll discover how to:
    • Use containers for digital initiatives
    • Maintain the desired application state and manage persistent storage
    • Maximize your IT investments by leveraging existing infrastructure
    • Automate and integrate your infrastructure

    Containers are a solution to the problem of how to get software to run reliably when moved from one computing environment to another. Join us on this webinar to learn how DataCore provides data management and integrity across your infrastructure!
  • GDPR: Brace for Impact or Not?
    GDPR: Brace for Impact or Not? Lance James | Mark Rasch | Martyn Hope | David Morris Recorded: Feb 22 2018 64 mins
    The GDPR compliance date is fastly approaching and many companies will not be compliant. What will this mean for them, what can they do over the remaining time left and what will the impact mean?

    Join this panel of world-class experts:

    Lance James: Chief Scientist at Flashpoint, internationally renowned Cybersecurity Specialist who has advised Boards and CISO’s at a wide range of government and F-500 organizations. Frequent lecturer and speaker.

    Mark Rasch: Chief Legal and Compliance Partner for Digital Risk Management & GDPR. Former Chief Security Evangelist for Verizon Enterprise Solutions, Chief Privacy Officer at SAIC and Led U.S. Department of Justice’s Cyber Crime Unit.

    Martyn Hope: Founder of the EU-GDPR Institute.

    In this session you will learn:
    - What will happen if I'm not Compliant by May 25, 2018
    - Where do I Begin to start my compliance effort
    - Who should I trust to advise me through my compliance program

    If you are a CISO, Board Member, Compliance Officer, Data Privacy Officer or anyone tasked with GDPR , this is a must see discussion of world-class panelists who are experts and have first hand knowledge and expereince.
  • 2018 Disaster Recovery Checklist - 5 Key Areas to Improve
    2018 Disaster Recovery Checklist - 5 Key Areas to Improve Storage Switzerland, Unitrends Recorded: Feb 22 2018 63 mins
    Is your organization ready for any disaster 2018 may throw at it? Organizations not only face new threats they also encounter decreased tolerance for downtime from users. The good news is there are plenty of new solutions that claim to improve an organization’s ability to recover from a disaster. But which one makes the most sense for your organization? And what about your processes? Recovery technology needs to partner with solid DR processes in order for an organization to see its way through the challenges ahead.
  • New in Integrated Copy Management Functionality in AppSync 3.7
    New in Integrated Copy Management Functionality in AppSync 3.7 Parasar Kodati Recorded: Feb 22 2018 43 mins
    We will cover the latest copy management functionality for Oracle databases and file systems on UNIX and Windows Server as well as improved Dell EMC VMAX storage management and easier to use log files. You can also learn about the latest addition to AppSync supported storage platforms.
  • How to Buy a GRC Platform
    How to Buy a GRC Platform Adam Billings - Principal Consultant, Lockpath Recorded: Feb 22 2018 57 mins
    Buying a GRC platform isn’t so much about sizing up the options as it is about analyzing your company’s needs. After that, it’s about knowing which questions to ask vendors and how to evaluate their offerings while keeping business processes front and center. In this webinar, we’ll share how to self assess needs and benchmark your GRC maturity. Throughout the hour, we’ll offer buyer’s tips and empower you to buy the GRC platform that’s right for your company.

    In this webinar, you will discover:

    • How to assess your organization and determine what type of platform is right for you
    • What questions to ask when evaluating GRC vendors
    • Tips for building a business case for a GRC platform and estimating potential ROI

    In our increasingly competitive and digital world, organizations need to evolve to be more competitive. For many, an untapped resource is GRC and its role in increasing efficiency and organizational resiliency. Explore what’s possible in this educational webinar.
  • Introduction to the BCI Good Practice Guidelines 2018 Edition
    Introduction to the BCI Good Practice Guidelines 2018 Edition Marie-Hélène Primeau, CPA, CA, MBCI, ISO 22301 Lead Auditor – Vice President, Premier Continuum Recorded: Feb 22 2018 56 mins
    This webinar will introduce participants to the BCI Good Practice Guidelines 2018 Edition, which is the leading global guidance for business continuity and resilience professionals since it was first issued in 2001.

    Key Objectives:

    1.Introducing the Business Continuity Management (BCM) lifecycle that provides a framework to structure the approach to business continuity.
    2. An overview of the six professional practices within the BCM lifecycle
    3. A review of key changes between the GPG 2013 and the new GPG 2018 Edition.
    4. An overview of the BCI CBCI Certification Course based on the GPG 2018 Edition.

    Who is the webinar for?

    This webinar is relevant to anyone with a business continuity and resilience related role, which can include, but is not limited to, those working in risk management, information security, physical security, emergency management, facilities management, health and safety, communications and human resources.
  • The clock is ticking: GDPR: Act now to accelerate your GDPR journey
    The clock is ticking: GDPR: Act now to accelerate your GDPR journey Robert Arandjelovic and Sunil Choudrie, Symantec Recorded: Feb 22 2018 49 mins
    With GDPR just months away, there’s no time to lose. But what can you actively do right now to help you prepare? Hosted by Symantec security experts, this ‘90 Days to GDPR’ webinar is packed with essential tips and advice.

    Wherever you are in your preparations, this webinar helps you understand your level of readiness and gives you practical, actionable steps ahead of the May deadline.

    Don’t leave it to chance – register now.

    Before you attend the webinar, if you haven’t already, take IDC’s GDPR Readiness Assessment. It will determine what stage your GDPR planning is at.

    Take Assessment >> https://symantecgdpr.idcready.net/?utm=jyWguSFtTX
  • GDPR & Cyber Threat Forecasting: How to Predict and Prevent Attacks
    GDPR & Cyber Threat Forecasting: How to Predict and Prevent Attacks Ed Bellis, CTO & Co-founder of Kenna Security Recorded: Feb 22 2018 45 mins
    When GDPR comes into force in May 2018, many more breaches will become public knowledge, creating more work for already over-stretched security professionals. With each new breach, stakeholders will turn to their CISOs and security teams to ask to what degree their own business is at risk and to see evidence of how that risk is calculated. In this session, former Orbitz CISO & co-founder of Kenna Security, Ed Bellis, demonstrates how the utilization of AI is helping security teams to move from a reactive approach to managing vulnerabilities to a predictive, risk-based model that can rapidly scale across millions of assets.

    Join Ed as he shows:
    - How accurately predicting and reporting on risk measurably improves an organisation’s security posture.
    - How to dramatically reduce remediation time by prioritizing the most important fixes, based on real-world dynamic threat intelligence - 24 hours a day, 7 days a week.
    - How to align security, IT operations, and compliance with a single view of risk.
  • GDPR and Email: How To Tackle The Risk In Your Inbox
    GDPR and Email: How To Tackle The Risk In Your Inbox Marc French, Senior Vice President & Chief Trust Officer, Mimecast Recorded: Feb 21 2018 50 mins
    Less than 50% of organizations impacted by GDPR are expected to fully comply by the May 2018 enforcement date. Will you be one of them? Whether you run email on-premises, in the cloud or a hybrid of the two, unstructured and distributed email data, which is personal by its very nature, can be difficult to manage. It’s also the number one attack vector with over 90% of cyber-attacks starting in email.

    But, with the right approach, it can be a relatively simple area of GDPR risk to mitigate. Join this presentation to learn:

    * Critical areas of GDPR risk in email
    * How to defend email systems and protect data in the face of spiraling attacks
    * Why having the right archive and backup strategy is important
    * The importance of a business continuity plan for email

    About the Speaker:
    Marc French is the Senior Vice President and Chief Trust Officer at Mimecast. He has more than 25 years of technology experience in engineering, operations, product management, and security. Prior to his current role, Marc has held a variety of CISO/senior security roles at EMC/RSA, Iron Mountain, and Dun & Bradstreet.
  • The Best VMware Public Cloud Backup & DR Options
    The Best VMware Public Cloud Backup & DR Options Storage Switzerland, Druva Recorded: Feb 21 2018 55 mins
    5 Requirements for True Cloud Based VMware Backup & Disaster Recovery
    Join Storage Switzerland and Druva for a live webinar on the critical requirements of a true cloud solution and what the advantages of these solutions are:

    1. No hardware, no software, or deployment hassle
    2. Improved Business Agility
    3. Dynamic DR and Workload Mobility
    4. Simplified Management
    5. Significantly Lower TCO
  • Integrating DRaaS into your Enterprise Resiliency Program and Business Operation
    Integrating DRaaS into your Enterprise Resiliency Program and Business Operation Tom Powers, Director of Program Management at Carbonite, Philip Bigge is the Vice President at Ripcord Solutions Recorded: Feb 21 2018 62 mins
    Disaster Recovery as a Service (DRaaS) can be a positive and cost-effective solution as part of your Enterprise Resiliency Program. But for all its benefits, it shouldn’t be viewed as a magic wand. DRaaS advantages and limitations should be carefully considered and explored by both the Business and IT to ensure that it aligns with overall strategy and can achieve maximum results.

    Join this webinar and learn:

    •Integrating DRaaS into business practices and priorities
    •Exercise Techniques to ensure your recoverability, and more importantly, your customer’s data
    •DRaaS Risk and Compliance
    •How to sell the advantages of DRaaS to your leadership

    About the Presenters:

    Philip Bigge is the Vice President at Ripcord Solutions. Phillip has over 20 years of experience working with Fortune 500 companies building sustainable Business Continuity, Disaster Recovery, and Crisis Management programs. Philip has successfully led these organizations through 40 major disasters. Philip believes every Business Continuity program must be designed to enable the organization to recover, meet customer and regulatory demands, and be maintained at a low run-rate cost.

    Tom Powers, Director of Program Management at Carbonite, is responsible for product delivery and works closely with engineering and go to market teams on new releases and offerings. Prior to joining Carbonite, Tom was Director of Operations for Client Services at Avaya where he helped ensure successful onboarding and serviceability for customers. He also spent time at IBM working on the M&A team where he helped integrate several acquisitions. Tom has a passion for delivering innovative products that solve challenging customer issues.
  • The Last Minute Guide to Help Address GDPR Compliance
    The Last Minute Guide to Help Address GDPR Compliance Saab Bharaj, Principal Consultant, Data Protection and Privacy, Verizon Enterprise Solutions Recorded: Feb 21 2018 39 mins
    By now, you’re probably well into the implementation of policies and governance to ensure your organization is GDPR-compliant. Nevertheless, you may still be questioning whether there is a database, process or function within your department that hasn’t been through the full rigor of your compliancy program.

    Join our live webinar as a sanity check against best practice and real-life examples whether:
    - All sources of applicable data have been identified and risk-assessed you have created a comprehensive policy framework and guidance
    - Functional departments understand their risks and taken the correct steps to mitigate
    - Have sufficient transparency in place
    - Know which third parties are holding data on your behalf
    - Learn the required ongoing governance and testing of your compliance processes
  • Hardware Selection Criteria for Object Storage
    Hardware Selection Criteria for Object Storage John Bell, Senior Consultant & Tony Barbagallo, VP of Product Recorded: Feb 20 2018 40 mins
    Thinking about implementing object storage in your infrastructure and not sure what hardware you need? With information and tips curated from hundreds of installations, VP of Product Tony Barbagallo and Sr. Consultant John Bell will explain the criteria you should consider as you make your selections and will be available to answer your questions.
  • Exclusive Healthcare Webinar: Anatomy of an Email-Borne Attack
    Exclusive Healthcare Webinar: Anatomy of an Email-Borne Attack Bob Adams, Mimecast Cybersecurity Expert; David Hood, Mimecast Director of Product Marketing Recorded: Feb 20 2018 62 mins
    Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going away anytime soon. Join us for Anatomy of an Email-Borne Attack where we'll paint the current healthcare threat landscape for attacks and demonstrate an actual live “hack.”
  • You are PCI compliant, but are you secure?
    You are PCI compliant, but are you secure? Paul Calatayud Recorded: Feb 20 2018 61 mins
    You’ve fulfilled the minimum requirements to comply with PCI DSS. But guess what? You still might be vulnerable to a credit card data breach. As we’ve witnessed with recent high-profile cases, companies that are PCI compliant are not necessarily immune to attacks.

    So if compliance isn’t enough to guarantee security, how do companies minimize the risk of a data breach?
    Join us for a one-hour webinar led by Paul Calatayud, chief information security officer at SureScripts and information security instructor for the SANS Institute. This free session will explain why compliance doesn’t necessarily mean your organization’s PCI data is secure.

    The session will also cover the following areas:

    Determining who’s responsible for PCI security
    Third-party security practices
    How a risk-based security approach augments compliance
  • Kaspersky Lab workshop: where next for businesses facing complex threats?
    Kaspersky Lab workshop: where next for businesses facing complex threats? Kaspersky Lab and guests Recorded: Feb 20 2018 92 mins
    Next generation threats are already here: advanced and hard to detect, they can exploit supply chains and legitimate software and hide in your systems for months, causing immense damage. They demand a radically different approach to protection. Join us to discuss these emerging trends and the action security leaders can take to protect their organizations and customers.

    David Emm, Principal Security Researcher, Global Research and Analysis Team, Kaspersky Lab will present the main threat predictions for 2018 and their potential business impact; while Alessio Aceti, Head of Enterprise Business at Kaspersky Lab will consider the critical success factors for cybersecurity teams in the rapidly evolving threat landscape.

    An expert panel, including Thom Langford, CISO, Publicis Groupe; Gareth Wharton, cyber CEO, Hiscox Insurance; Mike Buck, Head of Delivery, BJSS; Adam Maskatiya, General Manager UK and Ireland, Kaspersky Lab; and Dan Raywood, Contributing Editor, Infosecurity Magazine will debate and answer audience questions on whether there is ever an acceptable level of risk for enterprises facing next generation cyberthreats.

    Attendees will come away with an understanding of emerging threats facing their sector, which they can use to develop robust security strategies capable of withstanding such sophisticated attacks.
  • 3 Tips for Selling to the Senior level Execs
    3 Tips for Selling to the Senior level Execs Tim Robertson Recorded: Feb 20 2018 50 mins
    Most of us want to have better meetings with senior executives. Meetings that feel like conversations, not pitches. Meetings that build deeper relationships. Meetings that uncover more ways in which they can help their customers. Behind closed doors, when I ask what's holding people back, many will tell me things like, "I don't feel comfortable," "I have nothing to offer to them,"" or "I'm not at their level." Selling to Senior level executives can be difficult, and getting a first meeting can be a real challenge. But, in our experience, the most difficult part is not getting the first meeting. It's getting the second one. Or the third one. This webinar explores the ways that you can get to that second and third meeting
  • Commvault V11 Relatórios
    Commvault V11 Relatórios Rubens Ferreira Recorded: Feb 19 2018 17 mins
    Nesta demonstração explicamos um pouco sobre as opções de relatórios da solução Commvault e de como criar relatórios customizados
  • Career Conversations w/ Mary Chaney - Expert in Cybersecurity Law
    Career Conversations w/ Mary Chaney - Expert in Cybersecurity Law Mary Chaney, Expert in Cybersecurity Law and WSC VP Jessica Gulick Recorded: Feb 16 2018 60 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guests: Mary Chaney, Attorney At Law, The Law Offices of Mary N. Chaney, P.L.L.C.
    Threat Intelligence and Forensics Expert, Founder of Horton Technologies, LLC

    Hosted by Jessica Gulick, VP of the Women's Society of Cyberjutsu

    About the Speaker:
    Mary N. Chaney, Esq., CISSP, has 20+ years of experience within the fields of Law, Information Security, Privacy and Risk Management. She graduated from Xavier University in Cincinnati, Ohio with her B.S.B.A in Information Systems and received her J.D. degree from Thurgood Marshall School of Law. She spent several years practicing law in Washington, DC focusing primarily on anti-trust and intellectual property rights infringement cases. She then transitioned to serve by becoming a Special Agent for the FBI where she investigated cybercrime as their Information Systems Security Officer.
    Ms. Chaney obtained her Certified Information Systems Security Professional (CISSP) certification in 2008. She has held senior level information security roles with Comcast, Johnson & Johnson and GE Capital. As an adjunct professor with the University of Cincinnati, she assisted with the establishment of their Cybersecurity Certificate program.
    Currently, Ms. Chaney practices cyber security law for her own firm, The Law Offices of Mary N. Chaney, P.L.L.C. where she specializes in helping the CIO, CISO and General Counsel understand each other to legally protect the enterprise from cyber security risk.
  • The Road to Simplicity: Converging Primary and Secondary Storage
    The Road to Simplicity: Converging Primary and Secondary Storage Jacob Cherian, VP of Product Strategy, Reduxio, Mike Grandinetti, CMO, Reduxio, Keith Worthington, IT Manager, LineMaster, Recorded: Feb 15 2018 45 mins
    In the space of storing, managing and protecting data, different approaches for handling information are used. The advent of cloud has brought in compelling benefits, but the amount of data that organizations continue to store is growing exponentially, resulting in mostly unrelated solutions that have lead to the rise of Hybrid IT. On the Data Protection side, Businesses increasingly demand 100% uptime with no data loss, or what IDC refers to as the "new race to zero" – 0 RPO and 0 RTO. Such scenarios are still unrealistic for all but the most expensive and demanding applications that can afford fully redundant systems.

    IT organizations are improving the performance of their storage stacks and gradually driving down their RPO and RTO. Unfortunately, in most cases, this requires a complex strategy of interrelated components, which are often vendor and platform-specific, leaving IT to manually manage multiple systems and increasing the overall complexity of their environments.

    Join this session to learn about:

    - The latest advances in converging your storage and backup stack and how this can radically change the way you manage data
    - The current challenges of copy data management and how to address them
    - A dive into a TCO study depicting the savings achieved through this architectural change
    - Why snapshots are obsolete and you to achieve near-instant data recovery
    - A look into additional use cases of copy data for DevOps team

    The technology advances presented in this session were recently recognized by Frost & Sullivan with the award for Technology Innovation for Data Storage and Management.

    Join us for a 360 view from our Industry Expert, Jacob Cherian, VP of Product Strategy at Reduxio and previously Dell Inventor of the Year, as well as a Fireside chat with a Keith Worthington, IT Manager at LineMaster of the technology being presented.
  • 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
    5 Key Trends That Could Challenge Your Data Protection Plan in 2018 Storage Switzerland, Micro Focus Recorded: Feb 15 2018 60 mins
    Join Storage Switzerland and Micro Focus for an interactive live webinar where we will discuss the key disruptors in the market that could impact your data protection plan and what you need to consider to avoid them.

    Understand the key 5 trends and their implications on your data center:
    ●The Shift to Hybrid IT
    ●Ransomware and other Cyber Threats
    ●The Proliferation of Mission Critical Applications
    ●Cloud Storage and Cloud Applications
    ●The Rise of Remote Office Computing (ROBO)
  • The 2 fastest ways to move forward on data center consolidation
    The 2 fastest ways to move forward on data center consolidation Marc Keating: Director of technology and alliance strategy; Darren Miller: Manager of engineering test and performance Recorded: Feb 15 2018 60 mins
    You have multiple physical data centers, all presenting hardware, software, networking and management challenges. You’re making several copies of your data, and the petabytes are adding up. You need to tune into this webinar. We’ll share the two fastest ways forward on consolidation.
  • Creating Modern Business Foundations upon Hybrid IT Infrastructures
    Creating Modern Business Foundations upon Hybrid IT Infrastructures Todd Traver, Vice President, IT Optimization and Strategy, Uptime Institute Recorded: Feb 15 2018 50 mins
    Modern businesses are being transformed into digital businesses. To do so, IT is being re-imagined to span hybrid infrastructures; including multiple data centers, co-location facilities and cloud service providers. This hybrid approach has many benefits including cost savings, but can increase the overall difficulty in supporting such environments to deliver a predictable level of IT services. We’ll discuss one methodology designed to assess your current risk profile and spot vulnerabilities.
  • The 5 Essentials of Every Next-Gen SOC
    The 5 Essentials of Every Next-Gen SOC Peter Sparkes, Senior Director, Cyber Security Services, Symantec Feb 27 2018 5:00 am UTC 60 mins
    Every cybersecurity organisation is challenged with enabling the fast pace and nuances of their business strategy. Security measures must quickly keep up and be an enabler while continuing to mitigate the risks of a breach occurring.

    New technology adoption and expanded attack surfaces, evasive cyber threats, and limited budget and staffing resources make this challenging – there’s a lot to stay on top of.

    How does your Security Operations Center (SOC) keep up?

    Join us to learn how to scale and extend the capabilities of your SOC.

    We’ll review topics such as:

    - Automated security event analysis

    - Human security event analysis and prioritisation

    - Threat visibility across key on-premise and cloud control points

    - Consumption of technical and strategic threat intelligence

    - Proactive threat hunting and incident response

    Register Today
  • Sind sie richtig abgesichert?
    Sind sie richtig abgesichert? Kai Kudlek, CISSP, CISA, CISM Senior Systems Engineer Feb 27 2018 9:00 am UTC 60 mins
    Auf der Wunschliste für tägliche Aufgaben steht Hunting bei Sicherheitsanalysten, SOC Mitarbeitern und Administratoren häufig ganz oben. Die fehlenden Möglichkeiten, Aufgaben sinnvoll und effizient zu priorisieren und dabei die Sicht aufs Ganze zu behalten sorgt aber oft dafür, dass dieser Wunsch selten erfüllt wird und stattdessen die tägliche Routine in der Analyse von false positive Alarmen und Alarmen mit geringer Kritikalität liegt.

    FireEye Helix stellt eingehende Alarme in Kontext dar, bewertet diese und bietet Ihnen so die Möglichkeit, schnell zu priorisieren und bei den wenigen, entscheidenden Fällen in der gleichen Oberfläche mit dem Hunting zu beginnen.

    Dieses Webinar gibt einen kurzen Überblick über die Möglichkeiten der FireEye Helix Plattform gefolgt von einer leicht verständlichen Hunting-Demonstration.
  • GDPR’s Dirty Little Secret and How Object Storage Enables Compliance
    GDPR’s Dirty Little Secret and How Object Storage Enables Compliance Glen Olsen, Product Manager, and Alex Oldfield, Solutions Architect Feb 27 2018 10:30 am UTC 60 mins
    The dirty little secret? The General Data Protection Regulation (GDPR) does not just affect companies in the EU, it affects companies around the world that collect or process data concerning EU residents. Caringo Product Manager Glen Olsen and Solutions Architect Alex Oldfield explain the challenges organisations face and how Caringo Swarm Object Storage provides a cost-effective solution to help meet the requirements as well as how Data Protection Officers can use Swarm to monitor and enable GDPR compliance.
  • Bezpieczeństwo i łatwy dostęp do firmowych danych dla pracowników mobilnych
    Bezpieczeństwo i łatwy dostęp do firmowych danych dla pracowników mobilnych Piotr Łukasiewicz, System Engineer Feb 27 2018 1:00 pm UTC 30 mins
    W jaki sposób można zapewnić pracownikom dostęp do chronionej treści, którą mogą przeszukiwać, synchronizować i udostępniać bez obniżania poziomu bezpieczeństwa?
    Jak skutecznie zabezpieczyć służbowe komputery oraz urządzenia mobilne nie ograniczając jednocześnie właściwym osobom dostępu do kluczowych informacji?
    Jak łatwo obronić się przed rozprzestrzeniającymi się infekcjami ransomware?
    Jak poradzić sobie z tworzeniem zaszyfrowanych kopii zapasowych dla wielu użytkowników w rekordowo krótkim czasie?
    W trakcie trwania webinarium zaprezentowana zostanie technologia Commvault Edge, która umożliwia szybkie i elastyczne wdrożenie rozwiązania w zakresie ochrony danych dla tysięcy użytkowników zarządzanych z poziomu jednej konsoli. Rozwiązanie oferuje kopie zapasowe dla laptopów i desktopów, webowe i mobilne aplikacje dla bezpiecznego dostępu, synchronizację i udostępnianie plików, zoptymalizowaną deduplikację i harmonogramy.
  • Increasing the Effectiveness of Incident Management
    Increasing the Effectiveness of Incident Management John Moran, Senior Product Manager at DFLabs,and Mike Fowler, CISSP, Vice President of Professional Services at DFLabs Feb 27 2018 4:00 pm UTC 60 mins
    Incidents are fast-paced, dynamic events, forcing responders in to stressful and unfamiliar situations. Ineffective or delayed response to an incident can potentially lead to millions of dollars in lost revenue and damages. Even seasoned response teams require structure and leadership to respond effectively to an incident.

    This webinar offers a deeper look into the Incident Management System (IMS) and explains how when combined with a properly designed and implemented incident response process, the IMS can help organizations achieve a more effective and efficient incident management process, translating directly to a decrease in financial loss and reputational damage from incidents.

    Key Takeaways:

    - One of the core requirements of an IMS is that it must remain both flexible and scalable.
    - The first and most crucial step in implementing an IMS is integrating it into current organization processes and procedures.
    - Incorporating an IMS can elevate incident management to a level which is simply not possible with a more ad hoc system.
    - Utilizing an IMS for every incident large and small alike, will ensure that stakeholders remain proficient and in control of the process.

    Join us on this webinar as we try to answer the common questions surrounding how to increase the effectiveness of incident management, including the best set up of an Incident Management System, its structure and roles, when it should be used, as well as how an organization should go about implementation.
  • All-in-One Enterprise-Class Mobile Networking
    All-in-One Enterprise-Class Mobile Networking Cradlepoint's Todd Krautkremer, CMO, and Jake Smith, Product Manager for Network Security Services Feb 27 2018 5:00 pm UTC 60 mins
    Bringing the benefits of Software-Defined WAN To LTE mobile networks for first responders, transit operators and other fleet-based organizations, Cradlepoint announced this week its all-inclusive solution services for mobile networking. This is the third major product announcement from Cradlepoint under its new NetCloud Solution Packages services model.

    First responders, transit operators, utility crews, and insurance disaster teams - as well as many other organizations that depend on distributed field forces and fleets to deliver products, provide services, and get work done - need reliable and secure mobile networks with always-on 4G LTE connectivity including seamless communication through the new FirstNet emergency service. They need their people and passengers to access mission-critical applications and the Internet from anywhere, and to keep data flowing from onboard telemetry, sensors, surveillance cameras, and other devices. However, managing and securing these roving communications hubs has become a challenge for IT teams, since traditional mobile solutions fall short in providing the enterprise-class visibility, security, and control capabilities of fixed branch networks.

    Join Cradlepoint's Todd Krautkremer, CMO, and Jake Smith, product manager for network security services, for a live webinar on Tuesday, Feb. 27, at 9am PT. They will discuss mobile networking challenges and opportunities and introduce a new NetCloud Solution Package for mobility that includes the COR IBR1700, NetCloud services - including NetCloud Manager and NetCloud Perimeter- and comprehensive 24x7 support.

    Replacing multiple standalone "boxes" with an all-in-one mobile networking solution, the IBR1700 is designed for installations within a wide range of vehicles, including police, fire, ambulance, and other first responder vehicles; tractor-trailers; school and metro transit buses; light-rail and commuter trains; river and coastal ships; and mobile command trailers.
  • What are the full spectrum of mobile risks in 2018?
    What are the full spectrum of mobile risks in 2018? Burak Agca - System Engineer Feb 28 2018 10:00 am UTC 60 mins
    Mobile has become the primary espionage target. Everyday employee behaviors can jeopardize your data, systems, and compliance policies.

    With over 120M mobile devices using our endpoint security products, Lookout has unparalleled global insight into the full spectrum of mobile risks, threats, and vulnerabilities.

    Register to today's webinar to learn about:
    - The threat landscape
    - The evolution of mobile threats
    - How does that impact your organization?
    - How other other organizations are doing?
    - The impact of a breach post GDPR
    - How to protect your enterprise data?

    Live Q&A session at the end.
  • HOW TO AVOID SENDING FALSE ALARMS
    HOW TO AVOID SENDING FALSE ALARMS Neil Hedley Smith Feb 28 2018 12:00 pm UTC 45 mins
    BCI partner Everbridge presents the webinar "How to avoid sending false alarms"

    The ballistic missile False Alarm alert that occurred in Hawaii recently has underscored the critical role that these systems play in keeping the public informed. To help you understand the risks, we have organized a team of experts who will host a webinar today outlining best practices to help you avoid this type of incident.
    The incident had lead many organisations to ask:
    •Could a false alarm happen to us?
    •What precautions should I take?
  • Financial Cyberthreats in 2017
    Financial Cyberthreats in 2017 Dmitry Bestuzhev, Security researcher, Kaspersky Lab Feb 28 2018 2:00 pm UTC 90 mins
    Kaspersky Lab will present an exclusive overview of the top cyber-threats targeting financial services, based on the company’s threat intelligence research. The findings are especially relevant as the industry goes through a period of profound change
  • How To Avoid Downtime While Using 100% Commodity Hardware
    How To Avoid Downtime While Using 100% Commodity Hardware Sander Puerto, Sr. Technical Account Manager DataCore Software Feb 28 2018 5:30 pm UTC 45 mins
    Businesses lose productivity, revenue and resources during unplanned outages. To prevent unexpected downtime, many organizations are searching for solutions that can provide business continuity without breaking their budgets.

    What if you were able to achieve both goals while utilizing your existing commodity hardware? How would this benefit your customers and improve productivity?

    Join this webinar and we will show you:
    - How to keep 2 active copies of your data, even if your disks are from different vendors
    - An economical way to deploy existing x86 servers for business continuity
    - Ways to keep your hosts and applications running, even if you lose one of your SANs
    - How to cluster your preexisting Hypervisors using local disks for high availability
  • Cloud Storage vs. On-Premises Storage
    Cloud Storage vs. On-Premises Storage Storage Switzerland, Cloudian Feb 28 2018 6:00 pm UTC 60 mins
    In this live webinar, join Storage Switzerland and Cloudian as we describe three ways cloud storage and on-premises storage can complement each other.

    Learn how the new world of multi-cloud storage coupled with scalable on-premises storage can:

    Achieve limitless scalability and seamless capacity expansion
    Enable unified data management across clouds and on-prem
    Consolidate object and file data to a single storage environment
    Reduce costs and eliminate complexity
  • Эффективное резервное копирование для сред SAP/SAP HANA
    Эффективное резервное копирование для сред SAP/SAP HANA Борис Ещенко, технический консультант Commvault Mar 1 2018 6:45 am UTC 75 mins
    Уважаемые коллеги,
    Приглашаем вас на вебинар, посвященный современным тенденциям в сфере защиты бизнес-критичных приложений на платформе SAP/SAP HANA.
    В рамках вебинара вы узнаете о преимуществах ПО Commvault для SAP HANA:
    - cверхскоростное восстановление многотерабайтных сред SAP HANA
    - передовая технология моментальных снимков
    - расширенные возможности дедупликации и
    сжатия
    Будучи давним и надежным партнером SAP, компания Commvault предоставляет сертифицированное решение
    для защиты данных SAP HANA, которое тесно интегрируется с решениями SAP и обеспечивает универсальную
    защиту.
  • Building a national crisis management system: One Voice and the Norwegian Govt.
    Building a national crisis management system: One Voice and the Norwegian Govt. Andrew Carvell, One Voice, Yngve Mo, One Voice, and Gianluca Riglietti, BCI Mar 1 2018 10:00 am UTC 45 mins
    Join BCI partner One Voice to hear how in collaboration with the Norwegian Government, they created the world’s first integrated national incident and crisis management system, using the industry leading software, CIM. Representatives from the London and Norwegian offices will explain how a variety of software modules are used to help coordinate the response to major events from the top to the bottom of the government structure.
  • How to secure the Windows OS in 2018
    How to secure the Windows OS in 2018 Sami Laiho Mar 1 2018 6:00 pm UTC 60 mins
    At the end of 2017 there were more than a million new malware samples found for Windows per day. The old ways of protecting computers are not powerful enough anymore. Join to learn how one of the leading security experts in the world, Sami Laiho, explains how to protect your endpoints proactively. You’ll learn tips & tricks on how to implement hard disk encryption, Whitelisting and Principle of Least Privilege.


    Sami Laiho is one of the world’s leading professionals in the Windows OS and Security. Sami has been working with and teaching OS troubleshooting, management, and security for more than 15 years. Sami’s session was evaluated as the best session in TechEd North America, Europe and Australia in 2014, and Nordic Infrastructure Conference in 2016 and 2017. At Ignite 2017 Sami was evaluated as the Best External Speaker! Sami is also an author at PluralSight and the newly appointed conference chair at the TechMentor conference.
  • Combating Insider Threats-Protecting Privileged Accounts and Access Credentials
    Combating Insider Threats-Protecting Privileged Accounts and Access Credentials Juan Asenjo, Sr. Partner Integration Manager, Thales eSecurity, Kevin Jermyn, Sr. Technical Advisor, CyberArk Mar 1 2018 6:00 pm UTC 60 mins
    The digital transformation is driving massive turmoil. Organizations are having to face how they protect their data or be breached-again. Results of the recent 2018 Data Threat Report indicate continuing concern for insider attacks, with 51% of respondents citing privileged users as being the main threat.
    Providing the proverbial “keys to the kingdom” that allow access to sensitive organizational resources, privileged accounts are top target for internal and external attacks.

    As organizations increasingly use privileged accounts in a changing business environment, protecting the credentials, isolating and controlling sessions, and continuously monitoring operations is critical. This webcast will examine a typical use case in a healthcare environment, and illustrate how to protect privilege account credentials, passwords, and keys with applicability across industries.

    Attend this webinar to learn how to:
    • Deploy solution across organization without impacting operation
    • Provide added security layer to privileged account management
    • Protect and manage the critical cryptographic keys automatically
    • Facilitate auditing and compliance with data security regulations
    • Comply with FIPS 140-2 and Common Criteria security standards
  • Introduction to the BCI Good Practice Guidelines 2018 Edition, Asia
    Introduction to the BCI Good Practice Guidelines 2018 Edition, Asia Mohan Menon, AFBCI, CBCI Consulting Director, Resilient Business Solutions Sdn. Bhd. Chair, Malaysian Forum of the Business Mar 5 2018 6:00 am UTC 60 mins
    This webinar will introduce participants to the BCI Good Practice Guidelines 2018 Edition, which is the leading global guidance for business continuity and resilience professionals since it was first issued in 2001. Key Objectives: 1.Introducing the Business Continuity Management (BCM) lifecycle that provides a framework to structure the approach to business continuity. 2. An overview of the six professional practices within the BCM lifecycle 3. A review of key changes between the GPG 2013 and the new GPG 2018 Edition. 4. An overview of the BCI CBCI Certification Course based on the GPG 2018 Edition. Who is the webinar for? This webinar is relevant to anyone with a business continuity and resilience related role, which can include, but is not limited to, those working in risk management, information security, physical security, emergency management, facilities management, health and safety, communications and human resources.
  • The Rise of Nation State Attacks and what you can do about it
    The Rise of Nation State Attacks and what you can do about it Ulf Mattsson, David Morris Mar 5 2018 5:00 pm UTC 60 mins
    Emulated Nation-State Pen Testing, what is it and how is it different than other Pen Tests.
  • Securing the Cloud Generation: Who’s Using My Cloud
    Securing the Cloud Generation: Who’s Using My Cloud John Cunningham, VP - Cloud Security APAC, Symantec Mar 6 2018 5:00 am UTC 60 mins
    Do you know who’s using your cloud?

    Organisations around the world are embracing cloud solutions like Office 365 at a breakneck pace, but online collaborative platforms can leave an unprepared organisation vulnerable to cyber-attacks. Who is accessing your cloud applications? Are they truly authorised users, and are they conducting illegitimate activities?

    Without sufficient visibility, detection and protection, it can be easy for a cyber-criminal, or rogue employee to slip through the cracks – and when they do, your sensitive data won’t be their only target. Cyber-criminals have been known to load partial payloads for ransomware attacks, access email accounts for targeted phishing campaigns, host malware on SharePoint, and more.

    On 6 March 2018, Symantec will be hosting the ‘Securing the Cloud Generation: Who’s Using My Cloud’ webinar. Join our speaker and panel of experts as they discuss:

    •The state of today’s cloud security landscape
    •How to detect unauthorised access or risky user activity
    •How to protect your cloud from cyber threats

    Sign up for the webinar now, and gain critical insights on cyber security in the era of cloud applications and services.
  • What to say in LinkedIn messages to your ideal potential customers
    What to say in LinkedIn messages to your ideal potential customers Tom Mallens, MD of SI Media Ltd Mar 6 2018 11:00 am UTC 60 mins
    One of the challenges that people face when using LinkedIn for business, is knowing what to say to their connections and ideal potential clients.
    We will share with you some of the proven messages that we and our clients use on LinkedIn, so that you will know what to say to your ideal potential clients in order to generate more leads, appointments and sales for your business.
  • Part 1: March of the Bots: How to Deal with the Onslaught
    Part 1: March of the Bots: How to Deal with the Onslaught Dvir Shapira, Dir. Prod mgmt, Imperva; Robert Hamilton, Dir, prod mktg, Imperva; Brandon Dunlap (Moderator) Mar 7 2018 6:00 pm UTC 60 mins
    Bots. They generate over half of the internet traffic and over half of the bots are malicious (or of questionable value). Bots can make your systems vulnerable to scraping bots, account takeover bots, impersonators, spammers and hackers.

    Impreva will share data gathered from their security research team about the most recent bot trends, how bot traffic is changing, where it’s coming from, and the top actions you should be taking to mitigate the effects of bad bots on your websites. Join us for Part 1 of a 3 Part Security Briefings series and understand how commercial services take a multi-layer approach to bot mitigation and management and whether one of these services may be appropriate for you.
  • Women in Tech Leadership: Building your Brand & Becoming a Better Leader
    Women in Tech Leadership: Building your Brand & Becoming a Better Leader Jeanne Morain, Emerald de Leeuw, Jill Donahue & Andrea Short Mar 8 2018 4:00 pm UTC 60 mins
    2017 was a historic year for women and feminists around the world. With the #metoo and #knowno campaigns, gender gaps and disparities were brought to light in ways they hadn't been before.

    Now it's a new year and with it comes new challenges for women in hi-tech careers: whether it be navigating your career through these times, finding or becoming a mentor, building your personal and professional brand as a leader, dealing with office politics or maintaining work-life balance, the challenges and opportunities for women in the workplace are endless.

    Join this expert panel with moderator Jeanne Morain and panelists Emerald de Leeuw, Executive Director, EuroComply Data Protection Technology, Jill Donahue, Sr. Director of Marketing, PC Connection, and Andrea Short, Director, Supplier Marketing at Tech Data.

    They will share personal stories and experiences, tips and best practices, problems and solutions around these and other topics for women in tech leadership.
  • Roadmap to Smarter Compliance & Policy Management
    Roadmap to Smarter Compliance & Policy Management Sam Abadir - VP of Industry Solutions, Lockpath Mar 8 2018 5:00 pm UTC 60 mins
    In our uncertain regulatory climate, complying with regulations and managing policies demand that organizations be adaptable. For firms that are still using office tools like word processors, spreadsheets and emails, the challenge to adapt is even greater. In this live webinar, Lockpath’s Sam Abadir will share a roadmap to smarter compliance and policy management.

    Attendees will learn:

    • What compliance and policy management encompasses
    • Communication strategies for working with cross-functional teams
    • How organizations are bringing automation to manual processes
    • Low-hanging fruit for quick wins and ideas for sustained growth

    The road ahead is uncertain and demands that organizations adapt. Why stop there? Keep going to reach a better place with your compliance and policy management program. Explore what you need to know in this educational webinar.
  • Recently discovered sophisticated cyberthreats – are you ready?
    Recently discovered sophisticated cyberthreats – are you ready? TBD Mar 13 2018 1:30 pm UTC 60 mins
    Didn’t make it to the Security Analyst Summit to catch the latest intelligence on advanced cyber threats? Join our jargon-free kick-off session to find out what some of the most sophisticated threat actors are up to: their tools, techniques and targets, and how to spot and combat them and keep your business safe.

    Want to know more about cybersecurity in healthcare? Join our next webinar: https://www.brighttalk.com/webcast/15591/307103?utm_source=Kaspersky+Lab&utm_medium=brighttalk&utm_campaign=307103
  • IT security vulnerabilities in healthcare. How to avoid losing patient records?
    IT security vulnerabilities in healthcare. How to avoid losing patient records? Denis Makrushin, Security researcher, Kaspersky Lab Mar 13 2018 3:00 pm UTC 60 mins
    Personal health information is private and precious. Medical organizations and healthcare professionals hold this data in trust – but is that trust justified? Yuri Namestnikov and Denis Makrushin, security researchers at Kaspersky Lab, have analyzed public sources and uncovered a number of vulnerabilities in healthcare organizations that threaten data. Join the webinar to learn how to secure your business perimeter.

    Want to know more about underground financial threats? Join our next webinar:
    https://www.brighttalk.com/webcast/15591/307105?utm_source=Kaspersky+Lab&utm_medium=brighttalk&utm_campaign=307105
  • Migrate to Azure with Windows Containers
    Migrate to Azure with Windows Containers Cesar de la Torre, Sr. Program Manager, .NET team, Microsoft Mar 13 2018 5:00 pm UTC 105 mins
    Join us for a webinar on how to approach the modernization of your existing.NET Framework web or service-oriented applications. App modernization, commonly referred to as “lift and shift”, is the action of moving a workload to a newer or more modern environment without altering the application's code and basic architecture.

    We’ll examine how to move your existing .NET Framework server-applications directly to Azure by modernizing specific areas, without re-architecting or recoding entire applications.

    We’ll also highlight the benefits of moving your apps to the cloud and partially modernizing apps by using a specific set of new technologies and approaches, like Windows Containers and orchestrators in Azure.

    At the end of the hour, you’ll see:

    - An intro to the cloud migration maturity levels (Cloud-Infrastructure Ready, Cloud-DevOps Ready and Cloud-Optimized)
    - How to containerize existing .NET Framework apps with Windows Containers (e.g., -
    - Monolithic WebForms and ASP.NET MVC web apps)
    - Deploying and running your containerized app into an Azure VM
    - Deploying and running your containerized app into Orchestrators in Azure (Kubernetes and Service Fabric)
    - DevOps and CI/CD pipelines in VSTS deploying to the same environments in Azure
    - Demos for each scenario