The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
Businesses are increasingly becoming more reliant on third parties for critical products and services. The factors are multi-fold : increased customer demand, time criticality, stringent service levels, evolving regulatory landscapes, technological advancements, mergers and acquisitions, diversification of risks, etc. With increasing dependencies on third parties, organizations become susceptible to major service disruptions owing to lack of supplier resilience; thus, running into risks such as loss of revenues, regulatory breaches, service level misses and eventually, loss of customer confidence. Supply Chain Resiliency is the key to sustained business model and must be integrated within the resilience or business continuity framework of organizations.
This session will reflect upon a few key trends, levers, risks, regulatory requirements and overview of building third party business continuity assessment process.
Technological innovation is increasing and expanding at an exponential rate. In response, digital transformation has become an established objective for many enterprises, and the adoption of digital initiatives is now widespread. Docker, Kubernetes and other technologies related to containers are being leveraged to access and deploy systems of engagement. But before you go adding these technologies to your digital transformation road-map, you need to evaluate whether they're the best fit for your needs.
In this webinar you'll discover how to:
• Use containers for digital initiatives
• Maintain the desired application state and manage persistent storage
• Maximize your IT investments by leveraging existing infrastructure
• Automate and integrate your infrastructure
Containers are a solution to the problem of how to get software to run reliably when moved from one computing environment to another. Join us on this webinar to learn how DataCore provides data management and integrity across your infrastructure!
The GDPR compliance date is fastly approaching and many companies will not be compliant. What will this mean for them, what can they do over the remaining time left and what will the impact mean?
Join this panel of world-class experts:
Lance James: Chief Scientist at Flashpoint, internationally renowned Cybersecurity Specialist who has advised Boards and CISO’s at a wide range of government and F-500 organizations. Frequent lecturer and speaker.
Mark Rasch: Chief Legal and Compliance Partner for Digital Risk Management & GDPR. Former Chief Security Evangelist for Verizon Enterprise Solutions, Chief Privacy Officer at SAIC and Led U.S. Department of Justice’s Cyber Crime Unit.
Martyn Hope: Founder of the EU-GDPR Institute.
In this session you will learn:
- What will happen if I'm not Compliant by May 25, 2018
- Where do I Begin to start my compliance effort
- Who should I trust to advise me through my compliance program
If you are a CISO, Board Member, Compliance Officer, Data Privacy Officer or anyone tasked with GDPR , this is a must see discussion of world-class panelists who are experts and have first hand knowledge and expereince.
Is your organization ready for any disaster 2018 may throw at it? Organizations not only face new threats they also encounter decreased tolerance for downtime from users. The good news is there are plenty of new solutions that claim to improve an organization’s ability to recover from a disaster. But which one makes the most sense for your organization? And what about your processes? Recovery technology needs to partner with solid DR processes in order for an organization to see its way through the challenges ahead.
We will cover the latest copy management functionality for Oracle databases and file systems on UNIX and Windows Server as well as improved Dell EMC VMAX storage management and easier to use log files. You can also learn about the latest addition to AppSync supported storage platforms.
Buying a GRC platform isn’t so much about sizing up the options as it is about analyzing your company’s needs. After that, it’s about knowing which questions to ask vendors and how to evaluate their offerings while keeping business processes front and center. In this webinar, we’ll share how to self assess needs and benchmark your GRC maturity. Throughout the hour, we’ll offer buyer’s tips and empower you to buy the GRC platform that’s right for your company.
In this webinar, you will discover:
• How to assess your organization and determine what type of platform is right for you
• What questions to ask when evaluating GRC vendors
• Tips for building a business case for a GRC platform and estimating potential ROI
In our increasingly competitive and digital world, organizations need to evolve to be more competitive. For many, an untapped resource is GRC and its role in increasing efficiency and organizational resiliency. Explore what’s possible in this educational webinar.
This webinar will introduce participants to the BCI Good Practice Guidelines 2018 Edition, which is the leading global guidance for business continuity and resilience professionals since it was first issued in 2001.
1.Introducing the Business Continuity Management (BCM) lifecycle that provides a framework to structure the approach to business continuity.
2. An overview of the six professional practices within the BCM lifecycle
3. A review of key changes between the GPG 2013 and the new GPG 2018 Edition.
4. An overview of the BCI CBCI Certification Course based on the GPG 2018 Edition.
Who is the webinar for?
This webinar is relevant to anyone with a business continuity and resilience related role, which can include, but is not limited to, those working in risk management, information security, physical security, emergency management, facilities management, health and safety, communications and human resources.
With GDPR just months away, there’s no time to lose. But what can you actively do right now to help you prepare? Hosted by Symantec security experts, this ‘90 Days to GDPR’ webinar is packed with essential tips and advice.
Wherever you are in your preparations, this webinar helps you understand your level of readiness and gives you practical, actionable steps ahead of the May deadline.
Don’t leave it to chance – register now.
Before you attend the webinar, if you haven’t already, take IDC’s GDPR Readiness Assessment. It will determine what stage your GDPR planning is at.
Take Assessment >> https://symantecgdpr.idcready.net/?utm=jyWguSFtTX
When GDPR comes into force in May 2018, many more breaches will become public knowledge, creating more work for already over-stretched security professionals. With each new breach, stakeholders will turn to their CISOs and security teams to ask to what degree their own business is at risk and to see evidence of how that risk is calculated. In this session, former Orbitz CISO & co-founder of Kenna Security, Ed Bellis, demonstrates how the utilization of AI is helping security teams to move from a reactive approach to managing vulnerabilities to a predictive, risk-based model that can rapidly scale across millions of assets.
Join Ed as he shows:
- How accurately predicting and reporting on risk measurably improves an organisation’s security posture.
- How to dramatically reduce remediation time by prioritizing the most important fixes, based on real-world dynamic threat intelligence - 24 hours a day, 7 days a week.
- How to align security, IT operations, and compliance with a single view of risk.
Less than 50% of organizations impacted by GDPR are expected to fully comply by the May 2018 enforcement date. Will you be one of them? Whether you run email on-premises, in the cloud or a hybrid of the two, unstructured and distributed email data, which is personal by its very nature, can be difficult to manage. It’s also the number one attack vector with over 90% of cyber-attacks starting in email.
But, with the right approach, it can be a relatively simple area of GDPR risk to mitigate. Join this presentation to learn:
* Critical areas of GDPR risk in email
* How to defend email systems and protect data in the face of spiraling attacks
* Why having the right archive and backup strategy is important
* The importance of a business continuity plan for email
About the Speaker:
Marc French is the Senior Vice President and Chief Trust Officer at Mimecast. He has more than 25 years of technology experience in engineering, operations, product management, and security. Prior to his current role, Marc has held a variety of CISO/senior security roles at EMC/RSA, Iron Mountain, and Dun & Bradstreet.
5 Requirements for True Cloud Based VMware Backup & Disaster Recovery
Join Storage Switzerland and Druva for a live webinar on the critical requirements of a true cloud solution and what the advantages of these solutions are:
1. No hardware, no software, or deployment hassle
2. Improved Business Agility
3. Dynamic DR and Workload Mobility
4. Simplified Management
5. Significantly Lower TCO
Disaster Recovery as a Service (DRaaS) can be a positive and cost-effective solution as part of your Enterprise Resiliency Program. But for all its benefits, it shouldn’t be viewed as a magic wand. DRaaS advantages and limitations should be carefully considered and explored by both the Business and IT to ensure that it aligns with overall strategy and can achieve maximum results.
Join this webinar and learn:
•Integrating DRaaS into business practices and priorities
•Exercise Techniques to ensure your recoverability, and more importantly, your customer’s data
•DRaaS Risk and Compliance
•How to sell the advantages of DRaaS to your leadership
About the Presenters:
Philip Bigge is the Vice President at Ripcord Solutions. Phillip has over 20 years of experience working with Fortune 500 companies building sustainable Business Continuity, Disaster Recovery, and Crisis Management programs. Philip has successfully led these organizations through 40 major disasters. Philip believes every Business Continuity program must be designed to enable the organization to recover, meet customer and regulatory demands, and be maintained at a low run-rate cost.
Tom Powers, Director of Program Management at Carbonite, is responsible for product delivery and works closely with engineering and go to market teams on new releases and offerings. Prior to joining Carbonite, Tom was Director of Operations for Client Services at Avaya where he helped ensure successful onboarding and serviceability for customers. He also spent time at IBM working on the M&A team where he helped integrate several acquisitions. Tom has a passion for delivering innovative products that solve challenging customer issues.
By now, you’re probably well into the implementation of policies and governance to ensure your organization is GDPR-compliant. Nevertheless, you may still be questioning whether there is a database, process or function within your department that hasn’t been through the full rigor of your compliancy program.
Join our live webinar as a sanity check against best practice and real-life examples whether:
- All sources of applicable data have been identified and risk-assessed you have created a comprehensive policy framework and guidance
- Functional departments understand their risks and taken the correct steps to mitigate
- Have sufficient transparency in place
- Know which third parties are holding data on your behalf
- Learn the required ongoing governance and testing of your compliance processes
Thinking about implementing object storage in your infrastructure and not sure what hardware you need? With information and tips curated from hundreds of installations, VP of Product Tony Barbagallo and Sr. Consultant John Bell will explain the criteria you should consider as you make your selections and will be available to answer your questions.
Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going away anytime soon. Join us for Anatomy of an Email-Borne Attack where we'll paint the current healthcare threat landscape for attacks and demonstrate an actual live “hack.”
You’ve fulfilled the minimum requirements to comply with PCI DSS. But guess what? You still might be vulnerable to a credit card data breach. As we’ve witnessed with recent high-profile cases, companies that are PCI compliant are not necessarily immune to attacks.
So if compliance isn’t enough to guarantee security, how do companies minimize the risk of a data breach?
Join us for a one-hour webinar led by Paul Calatayud, chief information security officer at SureScripts and information security instructor for the SANS Institute. This free session will explain why compliance doesn’t necessarily mean your organization’s PCI data is secure.
The session will also cover the following areas:
Determining who’s responsible for PCI security
Third-party security practices
How a risk-based security approach augments compliance
Next generation threats are already here: advanced and hard to detect, they can exploit supply chains and legitimate software and hide in your systems for months, causing immense damage. They demand a radically different approach to protection. Join us to discuss these emerging trends and the action security leaders can take to protect their organizations and customers.
David Emm, Principal Security Researcher, Global Research and Analysis Team, Kaspersky Lab will present the main threat predictions for 2018 and their potential business impact; while Alessio Aceti, Head of Enterprise Business at Kaspersky Lab will consider the critical success factors for cybersecurity teams in the rapidly evolving threat landscape.
An expert panel, including Thom Langford, CISO, Publicis Groupe; Gareth Wharton, cyber CEO, Hiscox Insurance; Mike Buck, Head of Delivery, BJSS; Adam Maskatiya, General Manager UK and Ireland, Kaspersky Lab; and Dan Raywood, Contributing Editor, Infosecurity Magazine will debate and answer audience questions on whether there is ever an acceptable level of risk for enterprises facing next generation cyberthreats.
Attendees will come away with an understanding of emerging threats facing their sector, which they can use to develop robust security strategies capable of withstanding such sophisticated attacks.
Most of us want to have better meetings with senior executives. Meetings that feel like conversations, not pitches. Meetings that build deeper relationships. Meetings that uncover more ways in which they can help their customers. Behind closed doors, when I ask what's holding people back, many will tell me things like, "I don't feel comfortable," "I have nothing to offer to them,"" or "I'm not at their level." Selling to Senior level executives can be difficult, and getting a first meeting can be a real challenge. But, in our experience, the most difficult part is not getting the first meeting. It's getting the second one. Or the third one. This webinar explores the ways that you can get to that second and third meeting
Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?
Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!
Guests: Mary Chaney, Attorney At Law, The Law Offices of Mary N. Chaney, P.L.L.C.
Threat Intelligence and Forensics Expert, Founder of Horton Technologies, LLC
Hosted by Jessica Gulick, VP of the Women's Society of Cyberjutsu
About the Speaker:
Mary N. Chaney, Esq., CISSP, has 20+ years of experience within the fields of Law, Information Security, Privacy and Risk Management. She graduated from Xavier University in Cincinnati, Ohio with her B.S.B.A in Information Systems and received her J.D. degree from Thurgood Marshall School of Law. She spent several years practicing law in Washington, DC focusing primarily on anti-trust and intellectual property rights infringement cases. She then transitioned to serve by becoming a Special Agent for the FBI where she investigated cybercrime as their Information Systems Security Officer.
Ms. Chaney obtained her Certified Information Systems Security Professional (CISSP) certification in 2008. She has held senior level information security roles with Comcast, Johnson & Johnson and GE Capital. As an adjunct professor with the University of Cincinnati, she assisted with the establishment of their Cybersecurity Certificate program.
Currently, Ms. Chaney practices cyber security law for her own firm, The Law Offices of Mary N. Chaney, P.L.L.C. where she specializes in helping the CIO, CISO and General Counsel understand each other to legally protect the enterprise from cyber security risk.
In the space of storing, managing and protecting data, different approaches for handling information are used. The advent of cloud has brought in compelling benefits, but the amount of data that organizations continue to store is growing exponentially, resulting in mostly unrelated solutions that have lead to the rise of Hybrid IT. On the Data Protection side, Businesses increasingly demand 100% uptime with no data loss, or what IDC refers to as the "new race to zero" – 0 RPO and 0 RTO. Such scenarios are still unrealistic for all but the most expensive and demanding applications that can afford fully redundant systems.
IT organizations are improving the performance of their storage stacks and gradually driving down their RPO and RTO. Unfortunately, in most cases, this requires a complex strategy of interrelated components, which are often vendor and platform-specific, leaving IT to manually manage multiple systems and increasing the overall complexity of their environments.
Join this session to learn about:
- The latest advances in converging your storage and backup stack and how this can radically change the way you manage data
- The current challenges of copy data management and how to address them
- A dive into a TCO study depicting the savings achieved through this architectural change
- Why snapshots are obsolete and you to achieve near-instant data recovery
- A look into additional use cases of copy data for DevOps team
The technology advances presented in this session were recently recognized by Frost & Sullivan with the award for Technology Innovation for Data Storage and Management.
Join us for a 360 view from our Industry Expert, Jacob Cherian, VP of Product Strategy at Reduxio and previously Dell Inventor of the Year, as well as a Fireside chat with a Keith Worthington, IT Manager at LineMaster of the technology being presented.
Join Storage Switzerland and Micro Focus for an interactive live webinar where we will discuss the key disruptors in the market that could impact your data protection plan and what you need to consider to avoid them.
Understand the key 5 trends and their implications on your data center:
●The Shift to Hybrid IT
●Ransomware and other Cyber Threats
●The Proliferation of Mission Critical Applications
●Cloud Storage and Cloud Applications
●The Rise of Remote Office Computing (ROBO)
You have multiple physical data centers, all presenting hardware, software, networking and management challenges. You’re making several copies of your data, and the petabytes are adding up. You need to tune into this webinar. We’ll share the two fastest ways forward on consolidation.
Modern businesses are being transformed into digital businesses. To do so, IT is being re-imagined to span hybrid infrastructures; including multiple data centers, co-location facilities and cloud service providers. This hybrid approach has many benefits including cost savings, but can increase the overall difficulty in supporting such environments to deliver a predictable level of IT services. We’ll discuss one methodology designed to assess your current risk profile and spot vulnerabilities.
Every cybersecurity organisation is challenged with enabling the fast pace and nuances of their business strategy. Security measures must quickly keep up and be an enabler while continuing to mitigate the risks of a breach occurring.
New technology adoption and expanded attack surfaces, evasive cyber threats, and limited budget and staffing resources make this challenging – there’s a lot to stay on top of.
How does your Security Operations Center (SOC) keep up?
Join us to learn how to scale and extend the capabilities of your SOC.
We’ll review topics such as:
- Automated security event analysis
- Human security event analysis and prioritisation
- Threat visibility across key on-premise and cloud control points
- Consumption of technical and strategic threat intelligence
Auf der Wunschliste für tägliche Aufgaben steht Hunting bei Sicherheitsanalysten, SOC Mitarbeitern und Administratoren häufig ganz oben. Die fehlenden Möglichkeiten, Aufgaben sinnvoll und effizient zu priorisieren und dabei die Sicht aufs Ganze zu behalten sorgt aber oft dafür, dass dieser Wunsch selten erfüllt wird und stattdessen die tägliche Routine in der Analyse von false positive Alarmen und Alarmen mit geringer Kritikalität liegt.
FireEye Helix stellt eingehende Alarme in Kontext dar, bewertet diese und bietet Ihnen so die Möglichkeit, schnell zu priorisieren und bei den wenigen, entscheidenden Fällen in der gleichen Oberfläche mit dem Hunting zu beginnen.
Dieses Webinar gibt einen kurzen Überblick über die Möglichkeiten der FireEye Helix Plattform gefolgt von einer leicht verständlichen Hunting-Demonstration.
The dirty little secret? The General Data Protection Regulation (GDPR) does not just affect companies in the EU, it affects companies around the world that collect or process data concerning EU residents. Caringo Product Manager Glen Olsen and Solutions Architect Alex Oldfield explain the challenges organisations face and how Caringo Swarm Object Storage provides a cost-effective solution to help meet the requirements as well as how Data Protection Officers can use Swarm to monitor and enable GDPR compliance.
W jaki sposób można zapewnić pracownikom dostęp do chronionej treści, którą mogą przeszukiwać, synchronizować i udostępniać bez obniżania poziomu bezpieczeństwa?
Jak skutecznie zabezpieczyć służbowe komputery oraz urządzenia mobilne nie ograniczając jednocześnie właściwym osobom dostępu do kluczowych informacji?
Jak łatwo obronić się przed rozprzestrzeniającymi się infekcjami ransomware?
Jak poradzić sobie z tworzeniem zaszyfrowanych kopii zapasowych dla wielu użytkowników w rekordowo krótkim czasie?
W trakcie trwania webinarium zaprezentowana zostanie technologia Commvault Edge, która umożliwia szybkie i elastyczne wdrożenie rozwiązania w zakresie ochrony danych dla tysięcy użytkowników zarządzanych z poziomu jednej konsoli. Rozwiązanie oferuje kopie zapasowe dla laptopów i desktopów, webowe i mobilne aplikacje dla bezpiecznego dostępu, synchronizację i udostępnianie plików, zoptymalizowaną deduplikację i harmonogramy.
Incidents are fast-paced, dynamic events, forcing responders in to stressful and unfamiliar situations. Ineffective or delayed response to an incident can potentially lead to millions of dollars in lost revenue and damages. Even seasoned response teams require structure and leadership to respond effectively to an incident.
This webinar offers a deeper look into the Incident Management System (IMS) and explains how when combined with a properly designed and implemented incident response process, the IMS can help organizations achieve a more effective and efficient incident management process, translating directly to a decrease in financial loss and reputational damage from incidents.
- One of the core requirements of an IMS is that it must remain both flexible and scalable.
- The first and most crucial step in implementing an IMS is integrating it into current organization processes and procedures.
- Incorporating an IMS can elevate incident management to a level which is simply not possible with a more ad hoc system.
- Utilizing an IMS for every incident large and small alike, will ensure that stakeholders remain proficient and in control of the process.
Join us on this webinar as we try to answer the common questions surrounding how to increase the effectiveness of incident management, including the best set up of an Incident Management System, its structure and roles, when it should be used, as well as how an organization should go about implementation.
Bringing the benefits of Software-Defined WAN To LTE mobile networks for first responders, transit operators and other fleet-based organizations, Cradlepoint announced this week its all-inclusive solution services for mobile networking. This is the third major product announcement from Cradlepoint under its new NetCloud Solution Packages services model.
First responders, transit operators, utility crews, and insurance disaster teams - as well as many other organizations that depend on distributed field forces and fleets to deliver products, provide services, and get work done - need reliable and secure mobile networks with always-on 4G LTE connectivity including seamless communication through the new FirstNet emergency service. They need their people and passengers to access mission-critical applications and the Internet from anywhere, and to keep data flowing from onboard telemetry, sensors, surveillance cameras, and other devices. However, managing and securing these roving communications hubs has become a challenge for IT teams, since traditional mobile solutions fall short in providing the enterprise-class visibility, security, and control capabilities of fixed branch networks.
Join Cradlepoint's Todd Krautkremer, CMO, and Jake Smith, product manager for network security services, for a live webinar on Tuesday, Feb. 27, at 9am PT. They will discuss mobile networking challenges and opportunities and introduce a new NetCloud Solution Package for mobility that includes the COR IBR1700, NetCloud services - including NetCloud Manager and NetCloud Perimeter- and comprehensive 24x7 support.
Replacing multiple standalone "boxes" with an all-in-one mobile networking solution, the IBR1700 is designed for installations within a wide range of vehicles, including police, fire, ambulance, and other first responder vehicles; tractor-trailers; school and metro transit buses; light-rail and commuter trains; river and coastal ships; and mobile command trailers.
Mobile has become the primary espionage target. Everyday employee behaviors can jeopardize your data, systems, and compliance policies.
With over 120M mobile devices using our endpoint security products, Lookout has unparalleled global insight into the full spectrum of mobile risks, threats, and vulnerabilities.
Register to today's webinar to learn about:
- The threat landscape
- The evolution of mobile threats
- How does that impact your organization?
- How other other organizations are doing?
- The impact of a breach post GDPR
- How to protect your enterprise data?
BCI partner Everbridge presents the webinar "How to avoid sending false alarms"
The ballistic missile False Alarm alert that occurred in Hawaii recently has underscored the critical role that these systems play in keeping the public informed. To help you understand the risks, we have organized a team of experts who will host a webinar today outlining best practices to help you avoid this type of incident.
The incident had lead many organisations to ask:
•Could a false alarm happen to us?
•What precautions should I take?
Kaspersky Lab will present an exclusive overview of the top cyber-threats targeting financial services, based on the company’s threat intelligence research. The findings are especially relevant as the industry goes through a period of profound change
Businesses lose productivity, revenue and resources during unplanned outages. To prevent unexpected downtime, many organizations are searching for solutions that can provide business continuity without breaking their budgets.
What if you were able to achieve both goals while utilizing your existing commodity hardware? How would this benefit your customers and improve productivity?
Join this webinar and we will show you:
- How to keep 2 active copies of your data, even if your disks are from different vendors
- An economical way to deploy existing x86 servers for business continuity
- Ways to keep your hosts and applications running, even if you lose one of your SANs
- How to cluster your preexisting Hypervisors using local disks for high availability
In this live webinar, join Storage Switzerland and Cloudian as we describe three ways cloud storage and on-premises storage can complement each other.
Learn how the new world of multi-cloud storage coupled with scalable on-premises storage can:
Achieve limitless scalability and seamless capacity expansion
Enable unified data management across clouds and on-prem
Consolidate object and file data to a single storage environment
Reduce costs and eliminate complexity
Приглашаем вас на вебинар, посвященный современным тенденциям в сфере защиты бизнес-критичных приложений на платформе SAP/SAP HANA.
В рамках вебинара вы узнаете о преимуществах ПО Commvault для SAP HANA:
- cверхскоростное восстановление многотерабайтных сред SAP HANA
- передовая технология моментальных снимков
- расширенные возможности дедупликации и
Будучи давним и надежным партнером SAP, компания Commvault предоставляет сертифицированное решение
для защиты данных SAP HANA, которое тесно интегрируется с решениями SAP и обеспечивает универсальную
Join BCI partner One Voice to hear how in collaboration with the Norwegian Government, they created the world’s first integrated national incident and crisis management system, using the industry leading software, CIM. Representatives from the London and Norwegian offices will explain how a variety of software modules are used to help coordinate the response to major events from the top to the bottom of the government structure.
At the end of 2017 there were more than a million new malware samples found for Windows per day. The old ways of protecting computers are not powerful enough anymore. Join to learn how one of the leading security experts in the world, Sami Laiho, explains how to protect your endpoints proactively. You’ll learn tips & tricks on how to implement hard disk encryption, Whitelisting and Principle of Least Privilege.
Sami Laiho is one of the world’s leading professionals in the Windows OS and Security. Sami has been working with and teaching OS troubleshooting, management, and security for more than 15 years. Sami’s session was evaluated as the best session in TechEd North America, Europe and Australia in 2014, and Nordic Infrastructure Conference in 2016 and 2017. At Ignite 2017 Sami was evaluated as the Best External Speaker! Sami is also an author at PluralSight and the newly appointed conference chair at the TechMentor conference.
The digital transformation is driving massive turmoil. Organizations are having to face how they protect their data or be breached-again. Results of the recent 2018 Data Threat Report indicate continuing concern for insider attacks, with 51% of respondents citing privileged users as being the main threat.
Providing the proverbial “keys to the kingdom” that allow access to sensitive organizational resources, privileged accounts are top target for internal and external attacks.
As organizations increasingly use privileged accounts in a changing business environment, protecting the credentials, isolating and controlling sessions, and continuously monitoring operations is critical. This webcast will examine a typical use case in a healthcare environment, and illustrate how to protect privilege account credentials, passwords, and keys with applicability across industries.
Attend this webinar to learn how to:
• Deploy solution across organization without impacting operation
• Provide added security layer to privileged account management
• Protect and manage the critical cryptographic keys automatically
• Facilitate auditing and compliance with data security regulations
• Comply with FIPS 140-2 and Common Criteria security standards
This webinar will introduce participants to the BCI Good Practice Guidelines 2018 Edition, which is the leading global guidance for business continuity and resilience professionals since it was first issued in 2001. Key Objectives: 1.Introducing the Business Continuity Management (BCM) lifecycle that provides a framework to structure the approach to business continuity. 2. An overview of the six professional practices within the BCM lifecycle 3. A review of key changes between the GPG 2013 and the new GPG 2018 Edition. 4. An overview of the BCI CBCI Certification Course based on the GPG 2018 Edition. Who is the webinar for? This webinar is relevant to anyone with a business continuity and resilience related role, which can include, but is not limited to, those working in risk management, information security, physical security, emergency management, facilities management, health and safety, communications and human resources.
Organisations around the world are embracing cloud solutions like Office 365 at a breakneck pace, but online collaborative platforms can leave an unprepared organisation vulnerable to cyber-attacks. Who is accessing your cloud applications? Are they truly authorised users, and are they conducting illegitimate activities?
Without sufficient visibility, detection and protection, it can be easy for a cyber-criminal, or rogue employee to slip through the cracks – and when they do, your sensitive data won’t be their only target. Cyber-criminals have been known to load partial payloads for ransomware attacks, access email accounts for targeted phishing campaigns, host malware on SharePoint, and more.
On 6 March 2018, Symantec will be hosting the ‘Securing the Cloud Generation: Who’s Using My Cloud’ webinar. Join our speaker and panel of experts as they discuss:
•The state of today’s cloud security landscape
•How to detect unauthorised access or risky user activity
•How to protect your cloud from cyber threats
Sign up for the webinar now, and gain critical insights on cyber security in the era of cloud applications and services.
One of the challenges that people face when using LinkedIn for business, is knowing what to say to their connections and ideal potential clients.
We will share with you some of the proven messages that we and our clients use on LinkedIn, so that you will know what to say to your ideal potential clients in order to generate more leads, appointments and sales for your business.
Bots. They generate over half of the internet traffic and over half of the bots are malicious (or of questionable value). Bots can make your systems vulnerable to scraping bots, account takeover bots, impersonators, spammers and hackers.
Impreva will share data gathered from their security research team about the most recent bot trends, how bot traffic is changing, where it’s coming from, and the top actions you should be taking to mitigate the effects of bad bots on your websites. Join us for Part 1 of a 3 Part Security Briefings series and understand how commercial services take a multi-layer approach to bot mitigation and management and whether one of these services may be appropriate for you.
2017 was a historic year for women and feminists around the world. With the #metoo and #knowno campaigns, gender gaps and disparities were brought to light in ways they hadn't been before.
Now it's a new year and with it comes new challenges for women in hi-tech careers: whether it be navigating your career through these times, finding or becoming a mentor, building your personal and professional brand as a leader, dealing with office politics or maintaining work-life balance, the challenges and opportunities for women in the workplace are endless.
Join this expert panel with moderator Jeanne Morain and panelists Emerald de Leeuw, Executive Director, EuroComply Data Protection Technology, Jill Donahue, Sr. Director of Marketing, PC Connection, and Andrea Short, Director, Supplier Marketing at Tech Data.
They will share personal stories and experiences, tips and best practices, problems and solutions around these and other topics for women in tech leadership.
In our uncertain regulatory climate, complying with regulations and managing policies demand that organizations be adaptable. For firms that are still using office tools like word processors, spreadsheets and emails, the challenge to adapt is even greater. In this live webinar, Lockpath’s Sam Abadir will share a roadmap to smarter compliance and policy management.
Attendees will learn:
• What compliance and policy management encompasses
• Communication strategies for working with cross-functional teams
• How organizations are bringing automation to manual processes
• Low-hanging fruit for quick wins and ideas for sustained growth
The road ahead is uncertain and demands that organizations adapt. Why stop there? Keep going to reach a better place with your compliance and policy management program. Explore what you need to know in this educational webinar.
Didn’t make it to the Security Analyst Summit to catch the latest intelligence on advanced cyber threats? Join our jargon-free kick-off session to find out what some of the most sophisticated threat actors are up to: their tools, techniques and targets, and how to spot and combat them and keep your business safe.
Want to know more about cybersecurity in healthcare? Join our next webinar: https://www.brighttalk.com/webcast/15591/307103?utm_source=Kaspersky+Lab&utm_medium=brighttalk&utm_campaign=307103
Personal health information is private and precious. Medical organizations and healthcare professionals hold this data in trust – but is that trust justified? Yuri Namestnikov and Denis Makrushin, security researchers at Kaspersky Lab, have analyzed public sources and uncovered a number of vulnerabilities in healthcare organizations that threaten data. Join the webinar to learn how to secure your business perimeter.
Want to know more about underground financial threats? Join our next webinar:
Join us for a webinar on how to approach the modernization of your existing.NET Framework web or service-oriented applications. App modernization, commonly referred to as “lift and shift”, is the action of moving a workload to a newer or more modern environment without altering the application's code and basic architecture.
We’ll examine how to move your existing .NET Framework server-applications directly to Azure by modernizing specific areas, without re-architecting or recoding entire applications.
We’ll also highlight the benefits of moving your apps to the cloud and partially modernizing apps by using a specific set of new technologies and approaches, like Windows Containers and orchestrators in Azure.
At the end of the hour, you’ll see:
- An intro to the cloud migration maturity levels (Cloud-Infrastructure Ready, Cloud-DevOps Ready and Cloud-Optimized)
- How to containerize existing .NET Framework apps with Windows Containers (e.g., -
- Monolithic WebForms and ASP.NET MVC web apps)
- Deploying and running your containerized app into an Azure VM
- Deploying and running your containerized app into Orchestrators in Azure (Kubernetes and Service Fabric)
- DevOps and CI/CD pipelines in VSTS deploying to the same environments in Azure
- Demos for each scenario