Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Protect against phishing threats in a post-perimeter world
    Protect against phishing threats in a post-perimeter world
    Aaron Cockerill, Chief Strategy Officer, Lookout Recorded: Jan 27 2020 51 mins
    As phishing attacks evolve, organisations must protect corporate data in the cloud. Register for this exclusive webinar now to learn:

    - The latest tactics attackers are using to exfiltrate enterprise data
    - Why phishing is more problematic and successful on mobile
    - How to identify if an employee device has been phished
    - How to remain compliant by reducing cyber risk from mobile endpoints
  • Work at Full Speed with Dell Client Solutions & Windows 10
    Work at Full Speed with Dell Client Solutions & Windows 10
    Grant Duke - NA Commercial Lead | Microsoft and Rob Furrow - Field Marketing Manager | Dell Technologies Recorded: Jan 24 2020 40 mins
    The way we work and the anticipated experience from our end users is rapidly changing. Dell has solutions in market today to address these challenges, and a plan for what the future hold.
    In this webinar we will explore the best in class productivity solutions from Microsoft and Dell. We will review how Dell PC’s work best with Windows 10 Pro and Office 365 to deliver client solutions that IT trusts and end users love.


    Presented by:
    Robert Furrow | Dell
    Robert has over 13 Years with Dell as a Sales Leader, Trainer, Customer & Product Consultant. Currently, Rob is a field marketing manager helping support our Commercial and Medium Business sales teams.

    Grant Duke | Microsoft Corporation
    Grant has nearly 20 years of experience in mobile computing with Microsoft and other technology leaders. In his current role with Microsoft he leads Commercial Sales with Dell North America by aligning the combined strategies of Dell’s Workforce Transformation and the Microsoft Modern Workplace.
  • Resiliency in the Face of the 21st Century Disaster
    Resiliency in the Face of the 21st Century Disaster
    Joseph George, Vice President, Global Recovery Services, Sungard AS Recorded: Jan 24 2020 58 mins
    A cyber-disaster is one of the important and pressing problems organisations face today, impacting key systems and information. For many organisations, the cost and time required to recover operations can be as problematic as the breach itself. Having a proven plan to get running again is critical.

    Using the NIST model, Sungard AS experts discuss optimising the “respond” and “recover” stages of managing a breach, helping attendees ensure they are positioned to respond.
  • Il predatore: la mia conversazione di 2 settimane con un gruppo ransomware
    Il predatore: la mia conversazione di 2 settimane con un gruppo ransomware
    Antonio Cancellara, Sales Engineer, SonicWall Recorded: Jan 24 2020 60 mins
    Venite ad ascoltare l’esperto di sicurezza Antonio Cancellara di SonicWall, che vi farà conoscere il lato umano di un moderno gruppo ransomware, i suoi consigli su come impedire ad esso di infiltrarsi nella vostra organizzazione, crittografare gli endpoint e diffondersi ad altre unità e segmenti della rete.
  • Career Conversations with Olanike Akanbi-Ayomide
    Career Conversations with Olanike Akanbi-Ayomide
    Jessica Gulick, WSC VP Recorded: Jan 24 2020 51 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Host: Jessica Gulick, VP WSC

    Guest: Olanike Akanbi-Ayomide
    Olanike, founder of Mosaic Consulting, is an Equity, Diversity, and Inclusion (EDI) expert with experience integrating EDI into all aspects of workplace management and leadership. She is also the VP of Business Strategy, Operations and Engagement for the technology/cyber division of a Bank of America

    With nearly 20 years of organizational development experience in the non-profit and corporate sectors, Olanike founded Mosaic Consulting (www.mosaic4equity.com) to offer EDI training, coaching, and consulting to individuals and institutions seeking transformation. She partners with clients to achieve greater workplace equity via diversity and inclusion strategies that actually work!

    In her role as the VP of Business Strategy, Operations and Engagement of a cyber security organization, she leads organizational strategy including diversity and inclusion, workforce management, and designs and governs a change management program with enterprise-wide impact.

    She is obsessed with building equity in the world via diversity and inclusion (EvDI TM), starting with the workplace! She's also slightly obsessed with playing competitive tennis and has been known to play on up to 3 competitive leagues or ladders in the same season.
  • [Earn CPE] Cornerstones to Fortify Your Enterprise Cybersecurity Defense
    [Earn CPE] Cornerstones to Fortify Your Enterprise Cybersecurity Defense
    Panelists: Dr. Anton Chuvakin, Google Cloud; with Sumedh Thakar, Qualys; Roger Grimes, KnowBe4; and Vivian Tero, Illumio. Recorded: Jan 23 2020 77 mins
    The enterprise cybersecurity landscape is dramatically expanding in scale and complexity, and cyberattacks are growing in magnitude and impact as digital transformation increases on a global scale. From phishing scams, to ransomware attacks, to malicious breaches from state actors, the potential threat to your business is huge. According to the Ponemon Institute, the average per breach cost to a company in 2018 was estimated at $3.86 million, an increase of 6.4 percent over the previous year.

    Even though cybersecurity presents a challenge to the enterprise, you are not helpless against the bad actors who seek to cause real and costly damage to your business. A proactive, company-wide, integrated digital security strategy that addresses cybersecurity threats at all levels of your business will provide you with both the offensive and defensive capabilities you need to handle whatever comes your way. Earn 1 CPE credit by attending this educational and interactive panel webinar. Our experts will discuss why fortifying your cybersecurity strategy should be a critical priority and highlight some best practices that you can employ to stay ahead of evolving threats, including how to;

    - Understand the changing cyberattack landscape,
    - Create a company-wide cybersecurity task force,
    - Evaluate your security budget against your threat level,
    - Fortify your cybersecurity defense with systems hardening, adaptive authentication, and endpoint protection.
  • Designing Storage Infrastructures for AI Workloads
    Designing Storage Infrastructures for AI Workloads
    Storage Switzerland and Panasas Recorded: Jan 23 2020 43 mins
    Artificial Intelligence (AI) and Machine Learning (ML) workloads are fundamentally different from any other workload. These workloads deal in data sets measured in dozens of petabytes of capacity, and large percentages of it can go from dormant to active at any moment. The high storage requirement and highly active data set make using all-flash arrays or even large flash caches impractical.

    IT planners need to rethink their designs to create infrastructures that are highly parallel and leverage high capacity hard disk drives to strike the right balance of performance and capacity. These infrastructures also need metadata efficiency, since AI and ML workloads are metadata heavy.

    Join us to learn:
    * Why all organizations need to prepare for AI and ML
    * The challenges of AI/ML at scale
    * Why current storage infrastructures can’t meet the AI/ML at scale challenge
    * Requirements of an At-Scale AI/ML Storage Infrastructure
  • Enhance & Extend Spectrum Protect
    Enhance & Extend Spectrum Protect
    Greg Tevis, Cobalt Iron VP of Strategy and Tony Owens, Arrow Electronics Solutions Architect Recorded: Jan 23 2020 40 mins
    Spectrum Protect is a mature, scalable enterprise backup software on the market today. It provides reliable backup for more applications and platforms than any other product. However, with the massive scalability and long list of enterprise features comes significant complexity. Spectrum Protect requires a high degree of education and expertise simply to manage the day to day operations.

    Increasingly, Spectrum Protect invested customers want to take advantage of modern data protection techniques such as SaaS, multi-cloud, multi-tenant, orchestration, deep cyber security, automation, and analytics to name a few. All of this is now available to Spectrum Protect customers without a painful rip and replace process through Cobalt Iron’s Compass product.

    Attendees will learn
    •How to modernize the data protection estate
    •How analytics and automation can reduce management time by 80-90%
    •How to leverage existing Spectrum Protect licensing investments
    •How backup can become a first class citizen in the enterprise through orchestration and self-service
    •How SaaS and automation can reduce CapEx up to 50%

    Join our discussion to learn how to enhance and extend Spectrum Protect to deliver more value and modernize your data protection.
  • Why SD-WAN Will Play an Even Bigger Role in Enterprise Network Security
    Why SD-WAN Will Play an Even Bigger Role in Enterprise Network Security
    Sean Kaine, Apcela VP of Marketing and Sales, and Kunal Thakkar, Head of Engineering Recorded: Jan 23 2020 30 mins
    SD-WAN has quickly moved from a nice-to-have to an enterprise roadmap imperative. Join us we explore why and how SD-WAN will play an even more expansive role in the enterprise network security architecture over the next 3 years.
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training
    Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Jan 23 2020 38 mins
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Osterman Research: Why you need a third-party backup for Office 365
    Osterman Research: Why you need a third-party backup for Office 365
    Michael Osterman of Osterman Research; W. Curtis Preston Chief Technologist, Druva Recorded: Jan 23 2020 37 mins
    Do you think Office 365 is enough to protect your business data? Would you bet your career on it? Hear from industry expert, Michael Osterman of Osterman Research on how to step up your data protection game.

    Join us for this live webinar and learn how to:

    •Protect against ransomware, accidental deletion, or corruption
    •Better align and respond faster to compliance and legal inquiries
    •More efficiently manage departing employee and long-term archiving of data
  • Mindhunter: Dos semanas de charla con una célula de ransomware
    Mindhunter: Dos semanas de charla con una célula de ransomware
    Alex Vázquez, Sales Engineer, SonicWall Iberia Recorded: Jan 23 2020 61 mins
    Únase a Alex Vázquez, experto en seguridad de SonicWall, que le presentará el lado humano de una célula moderna de ransomware y sus consejos para evitar que se infiltren en su organización, cifren sus endpoints y se propaguen a otras unidades y segmentos de su red.
  • Blue Prism RPA Platform Demo | Intelligent Automation & Digital Exchange Skills
    Blue Prism RPA Platform Demo | Intelligent Automation & Digital Exchange Skills
    Daniel Welcel, Solution Engineer and Lisa Hackbarth, Global Marketing Recorded: Jan 23 2020 39 mins
    Join us for a 45-minute, interactive live demo. We’ll show you how Blue Prism’s connected-RPA platform works and answer your questions live.

    With the advent of Robotic Process Automation (RPA), today, humans and Digital Workers are working side by side.

    But how does it actually work?

    If you’re ready to see Blue Prism’s Intelligent Automation in action, join us for our next 45-minute demo where we’ll showcase the simplicity and security of the leading RPA platform on the market.

    In this foundational look at what it takes to implement Blue Prism connected-RPA, you will:
    • Experience the integral role that the human worker plays in our evolving workforce
    • Take a tour of the Blue Prism Process and Object Studio where you’ll teach your Digital Workers what to do and how to do it
    • Learn how to incorporate our pre-built, out-of-the-box processes without the need for coding, and get your Digital Workforce up and running quickly
    • See examples of processes that Digital Workers can help to automate
    • Learn how to manage your Digital Workers to achieve maximum productivity using the included Control Room, Work Queues, and Scheduler
    • Get a detailed look at Blue Prism’s security, access control, and audit log features that reduce automation audit risk

    Ready to unleash the human potential at your organization by freeing up your team to do the valuable, skilled work they were hired to do? Register to view the demo to take the next step on your digital transformation journey and get ready to see what’s possible.
  • Mindhunter: My Two-week Conversation with a Ransomware Cell
    Mindhunter: My Two-week Conversation with a Ransomware Cell
    John Aarsen, SE - Benelux and Nordics, SonicWall Recorded: Jan 23 2020 59 mins
    Join SonicWall security expert John Aarsen as he gives you an inside look into the human-side of a modern ransomware cell, their advice on how to stop them from infiltrating your organization, encrypting your endpoints, and spreading to other drives and segments of your network.
  • Mindhunter : Mon dialogue de 2 semaines avec une cellule de rançongiciel
    Mindhunter : Mon dialogue de 2 semaines avec une cellule de rançongiciel
    Stéphane Julhes, Security Presales Engineer France, SonicWall Recorded: Jan 23 2020 62 mins
    Rejoignez Stéphane Julhes, expert en sécurité de SonicWall, qui vous dévoilera le côté humain d’une cellule de rançongiciel moderne, et qui vous fera part de ses conseils pour les empêcher d’infiltrer votre organisation, de chiffrer vos terminaux, et de se propager à d’autres lecteurs et segments de votre réseau.
  • Задай вопрос эксперту
    Задай вопрос эксперту
    Дмитрий Иванюк, эксперт по решениям Commvault Recorded: Jan 23 2020 54 mins
    Уважаемые коллеги!

    Приглашаем Вас и Ваших коллег принять участие в новом формате вебинара: "Задай вопрос эксперту".

    Дата: 23 января
    Время: 11:00 (МСК)
    Спикер: технический эксперт - Дмитрий Иванюк
    Язык вебинара: русский.

    Данный вебинар включает следующее:
    - возможность задать свой вопрос по программному продукту Commvault,
    - полный интерактив,
    - демонстрация сценариев,
    - детальные ответы на ваши вопросы.
  • Blue Prism RPA Platform Demo | Intelligent Automation & Digital Exchange Skills
    Blue Prism RPA Platform Demo | Intelligent Automation & Digital Exchange Skills
    Daniel Welcel, Solution Engineer and Lisa Hackbarth, Global Marketing Recorded: Jan 23 2020 39 mins
    Join us for a 45-minute, interactive live demo. We’ll show you how Blue Prism’s connected-RPA platform works and answer your questions live.

    With the advent of Robotic Process Automation (RPA), today, humans and Digital Workers are working side by side.

    But how does it actually work?

    If you’re ready to see Blue Prism’s Intelligent Automation in action, join us for our next 45-minute demo where we’ll showcase the simplicity and security of the leading RPA platform on the market.

    In this foundational look at what it takes to implement Blue Prism connected-RPA, you will:
    • Experience the integral role that the human worker plays in our evolving workforce
    • Take a tour of the Blue Prism Process and Object Studio where you’ll teach your Digital Workers what to do and how to do it
    • Learn how to incorporate our pre-built, out-of-the-box processes without the need for coding, and get your Digital Workforce up and running quickly
    • See examples of processes that Digital Workers can help to automate
    • Learn how to manage your Digital Workers to achieve maximum productivity using the included Control Room, Work Queues, and Scheduler
    • Get a detailed look at Blue Prism’s security, access control, and audit log features that reduce automation audit risk

    Ready to unleash the human potential at your organization by freeing up your team to do the valuable, skilled work they were hired to do? Register to view the demo to take the next step on your digital transformation journey and get ready to see what’s possible.
  • Exploring Citrix Workspace - Episode 2: Content Collaboration
    Exploring Citrix Workspace - Episode 2: Content Collaboration
    Nathan Mote, Product Marketing @ Citrix Recorded: Jan 22 2020 11 mins
    In order to better understand all that Citrix Workspace has to offer, we’ve designed a series of short mini-webinar segments that each highlights a key element of Citrix Workspace.

    Watch the entire video series to learn how Citrix Workspace:

    *Simplifies the IT workload and mitigates security risks that stem from poor user password hygiene

    *Provides unified access to files stored across multiple locations, and simplifies sharing, feedback, approvals and co-authoring within your business

    *Empowers IT to apply polices to devices and apps without sacrificing the mobility the workforce needs to remain productive

    *Enables IT control of virtual machines, applications, licensing, and security, while providing anywhere access for any device

    *Uses intelligence to boost productivity by removing busywork with a virtual assistant that automates repetitive tasks and simplifies workflows
  • 2020 Predictions for Cloud Computing
    2020 Predictions for Cloud Computing
    Dave McKenney, Director, Product Management - TierPoint and Abhijit Sunil, Analyst - Forrester Recorded: Jan 22 2020 43 mins
    Forrester’s recently released report Predictions 2020: Cloud Computing, outlines five predictions that will shape the cloud landscape in the coming year.

    According to the report, enterprises are just now starting to use cloud to modernize core business apps and processes; to date, they've been using cloud primarily to build new apps and rehost infrastructure. In our view, this movement is well underway and in 2020, drivers like security, cloud-native innovations and new alliances among key hyperscale players will reshape how providers deliver solutions to help enterprises digitally transform.

    Join us for a webinar to discuss these predictions with featured speaker, Forrester Analyst, Abhijit Sunil and TierPoint Director of Product Management, Dave McKenney. In this session you’ll learn more about:
     What’s next in the cloud technology landscape, including public cloud
    insights
     The increasing importance of security in cloud management
     How organizations are rethinking their data and edge strategies
     The growth of hyperconverged infrastructure across new use cases
  • Strategies to Consider Now that Windows Server 2008 is No Longer Supported
    Strategies to Consider Now that Windows Server 2008 is No Longer Supported
    Mark Allbritten, Dell Technologies Datacenter Solution Principal Recorded: Jan 22 2020 52 mins
    The time is now. Microsoft Windows Server 2008 is no longer supported as of January 14, 2020. If you haven’t already migrated, and you are looking to fast track your upgrade to the new servers and software that you need, watch this webinar. You’ll hear how Dell Technologies Services can help you to map out a plan, integrate new technology into your existing environment, deploy it in record time and provide flexible support. We’ll share:

    * How Dell Technologies can help plan your cloud or on-premise migration, upgrade and re-platform as well as consolidate and archive
    * How we can provide full-service installation, configuration, and end-to-end project management
    * Why Dell Technologies Services is the partner of choice for organizations around the world
  • The Effects of Ransomware Don’t End with the Ransom for Healthcare Organizations
    The Effects of Ransomware Don’t End with the Ransom for Healthcare Organizations
    James McQuiggan, John Riggi Recorded: Jan 22 2020 60 mins
    Ransomware is back with a vengeance, impacting healthcare organizations like yours around the globe. While it appeared ransomware cases might be decreasing for a brief time, these incidents rose dramatically over the past year. This increase in malicious activity has serious business ramifications — from increasing downtime to causing revenue loss. Ransomware attacks also can impact an organization's' ability to treat patients.

    In this webinar, the American Hospital Association’s Senior Advisor for Cybersecurity and Risk will share an overview of cybersecurity. KnowBe4’s James McQuiggan will cover some of the emerging trends in ransomware. You’ll learn about the recent highly targeted attack vectors and what you can do to prepare before an attack.

    Attendees Will Learn:
    - The new ways offenders are using ransomware to take control of your network.
    - Best practices for defending against and recovering from ransomware attacks.
    - How to detect potentially threatening phishing and social engineering emails.
    - Actionable steps to take if your organization does become a victim.
    - How to create a “human firewall.”
  • How to build a profitable MSP Business Model for Backup and Storage-as-a-Service
    How to build a profitable MSP Business Model for Backup and Storage-as-a-Service
    Jon Brooks - Director of EMEA MSP Sales Recorded: Jan 22 2020 31 mins
    Learn more about how Cloudian Object Storage for vCloud Director enables VMware cloud providers to deploy and manage an S3-compliant storage environment that is fully interoperable with the broad industry ecosystem of S3- compatible applications.
  • [Earn CPE] Critical Steps to Manage CCPA Compliance and Risk in 2020
    [Earn CPE] Critical Steps to Manage CCPA Compliance and Risk in 2020
    Panelists: K Royal, TrustArc; Ilia Sotnikov, Netwrix, Dr. Else van der Berg, Datawallet; and Harold Byun, Baffle. Recorded: Jan 22 2020 77 mins
    The California Consumer Privacy Act of 2018 (CCPA) is arguably the most expansive privacy law in U.S. history and will become enforceable in just a matter of months. The CCPA introduces new privacy rights for consumers and will force companies that conduct business in the State of California to implement structural changes to their privacy programs.

    The new rights given to California consumers are similar to the rights provided in the European Union’s General Data Protection Regulation (GDPR). The CCPA also subjects non-compliant businesses to expensive fines, class-action lawsuits, and injunctions.

    On this webinar, we will examine the impact of the CCPA, answer your burning questions, uncover the CCPA’s nuances, and address its ambiguities and challenges. We will also include strategies for creating compliance programs in the midst of the unknowns, and a strategic action plan for businesses to become compliant.

    Learning objectives are to gain insights on:

    - Understanding the nuances, ambiguities and challenges of the CCPA;
    - Creating compliance programs in the midst of the unknowns;
    - Developing a strategic action plan to become CCPA compliant;
    - How to avoid expensive fines, class-action lawsuits, and injunctions;
    - Getting ahead of the curve and enabling your business with alternate data sharing and privacy preserving techniques.
  • Secrets to Recovering from Ransomware and Disasters with VMware Cloud on AWS
    Secrets to Recovering from Ransomware and Disasters with VMware Cloud on AWS
    Sazzala Reddy, Co-Founder & CTO at Datrium, and Jason Crandall, Staff Cloud Solution Engineer at VMware Recorded: Jan 21 2020 58 mins
    DR has never been more important with the rampant rise in ransomware attacks. Learn what you can do to make sure you’re prepared for a ransomware attack, or if disaster strikes.

    Watch this webinar to learn:
    - Secrets to recovering instantly from a ransomware attack
    - The most common types of DR events and growing threats
    - The most important capabilities in a DR solution according to IT leaders
    - How to save 10x with an on-demand model using the public cloud
    - Why public cloud DR was impossible before VMware Cloud on AWS
  • Escape Your Legacy Backup Provider - Three Steps to a Better Backup Renewal
    Escape Your Legacy Backup Provider - Three Steps to a Better Backup Renewal
    Mike Palmer Chief Product Officer, Druva and Prasanna Malaiyandi Director, Product Architecture, Druva Recorded: Jan 21 2020 30 mins
    More than 60% of companies sign their storage backup renewal contracts between October 1 and March 31. Before you sign your next contract, evaluate the costs and services you’re receiving. You’re likely to achieve a complete, simple and cost-effective solution with a move to cloud data protection.

    Join this webinar with Druva Chief Product Officer, Mike Palmer, who breaks down the backup contract renewals process and pricing, and compares the pros and cons of legacy on-premises solutions versus SaaS-based data protection.

    Register to learn:
    •Market forces impacting data backup strategies and IT budgets
    •Key questions to evaluate if your existing renewal contract is costing you more than modernizing
    •Three steps to better backup, whether you’re six months or 1 month out from renewal

    Who should attend:
    IT leaders in charge of budget and strategy
    CTO, CIO, VP of IT, IT Managers, IT Directors
  • Virtual Workshop: Best Practices for Data Protection for the Cloud Era
    Virtual Workshop: Best Practices for Data Protection for the Cloud Era
    Anwesa Chatterjee - Sr. Director, Product Marketing, Druva and Max Lindauer Sales Engineer, Cloud Solutions, Druva Jan 28 2020 10:00 am UTC 33 mins
    Do you want to be great at legacy data protection or do you want to follow best practices for modern data protection for the cloud era?

    Find a more efficient way. Druva offers a 100% SaaS data protection solution that requires 0% infrastructure and offers infinite scalability, complete autonomy, and global accessibility. Plus, Druva data protection solution can deliver up to 50% cost savings while reducing complexity, and eliminate the need for hardware, software or skilled resources.

    Join this virtual workshop with our solutions expert to learn how you can:

    • Manage and protect your data and enterprise workloads with Druva’s differentiated cloud-first approach

    •Reduce TCO for your organization, with a flexible consumption-based pricing

    •Eliminate complexity with an automated, single-click disaster recovery across cloud, hybrid and on-premises workloads

    • Reduce business impact in case of ransomware attacks
  • Building an Effective Security Awareness Program
    Building an Effective Security Awareness Program
    Dale Zabriskie CISSP, CCSK, Security Awareness Training Evangelist Jan 28 2020 10:00 am UTC 57 mins
    Implementing and sustaining a successful security awareness program can be a daunting task. Without formal policies and frameworks, many organizations are shooting in the dark when it comes to determining how often to phish and train while managing stakeholder expectations. So what can you do to help your end users better protect themselves?

    Join our webinar as we examine what it means to have and how to build an effective security awareness program. In this session, we'll discuss:

    - Proven best practices for increasing the effectiveness of cybersecurity education
    - How to build a culture of security within your organization
    - Actionable guidance on executing security awareness & training initiatives that deliver measurable results
  • Cyber Security: orizzonti e prospettive per il 2020 e oltre
    Cyber Security: orizzonti e prospettive per il 2020 e oltre
    Marco Riboli, VP Southern Europe & BeLux di FireEye Jan 28 2020 1:30 pm UTC 45 mins
    In questo nuovo anno, sappiamo che cosa gli attori del crimine informatico hanno in serbo per noi e quali saranno le minacce e le tendenze nel 2020 e oltre. Di fronte ad attaccanti sempre più ingegnosi e sofisticati, la protezione delle organizzazioni richiede una buona preparazione.
    Martedì 28 gennaio alle 14:30, Marco Riboli, Vice President Southern Europe & Belux di FireEye, farà il punto sulla cyber security nel 2020. Durante questo webinar, si concentrerà su alcuni argomenti emersi nel nostro Report "The Road Ahead: Cyber Security in 2020 and Beyond". Partecipa per saperne di più su:
    •Le motivazioni geopolitiche degli attaccanti;
    •La destabilizzazione del business attraverso estorsioni e riscatti;
    •L'adozione del Cloud e i suoi impatti;
    •L'accelerazione delle strategie degli Stati.

    Registrati subito per scoprire cosa ci attende nel 2020 e come possiamo proteggerci.
  • Understanding How to Drive Real-Time Operations Excellence
    Understanding How to Drive Real-Time Operations Excellence
    Rachel Obstler, VP of Product PagerDuty; Kirk Pedersen, Senior IT Manager IBM Jan 28 2020 5:00 pm UTC 40 mins
    It’s not news that the world has gone digital, requiring you to interact with your customers 24×7.

    What may be news is that to be successful, you need to be able to operate in a truly real-time fashion, empowering the individuals and teams that own and operate digital services to better serve customers. The benefits of being effective at real-time work are tangible, with mature companies resolving incidents 2 hours faster on average than less mature peers.

    PagerDuty has been in the business of real-time work for almost a decade, and we’ve developed a maturity model that complements DevOps benchmarks and research such as the DORA State of DevOps report. The model uniquely focuses on real operational practices implemented by best-in-class organizations, including key criteria for success across the domains of culture, knowledge sharing, customer orientation, and technology.

    Join us to learn about the model and how it can be used to help organizations optimize their real-time operations. You’ll learn:

    - What excellence in real-time operations looks like
    - How to determine your team’s maturity in real-time operations work
    - How to implement best practices in incident response and other operations processes
    - What benefits you can expect to see as you grow in operational maturity, based on key findings from our survey of over 600 IT and development professionals
  • Blue Prism RPA Platform Demo | The Building Blocks of Automation
    Blue Prism RPA Platform Demo | The Building Blocks of Automation
    Daniel Welcel, Solution Engineer and Lisa Hackbarth, Global Marketing Jan 28 2020 5:00 pm UTC 60 mins
    Join us for a 45-minute, interactive live demo. We’ll show you how Blue Prism’s connected-RPA platform works and answer your questions live.

    With the advent of Robotic Process Automation (RPA), today, humans and Digital Workers are working side by side.

    But how does it actually work?

    If you’re ready to see Blue Prism’s Intelligent Automation in action, join us for our next 45-minute demo where we’ll showcase the simplicity and security of the leading RPA platform on the market.

    In this foundational look at what it takes to implement Blue Prism connected-RPA, you will:
    • Experience the integral role that the human worker plays in our evolving workforce
    • Take a tour of the Blue Prism Process and Object Studio where you’ll teach your Digital Workers what to do and how to do it
    • Learn how to incorporate our pre-built, out-of-the-box processes without the need for coding, and get your Digital Workforce up and running quickly
    • See examples of processes that Digital Workers can help to automate
    • Learn how to manage your Digital Workers to achieve maximum productivity using the included Control Room, Work Queues, and Scheduler
    • Get a detailed look at Blue Prism’s security, access control, and audit log features that reduce automation audit risk

    Ready to unleash the human potential at your organization by freeing up your team to do the valuable, skilled work they were hired to do? Register to view the demo to take the next step on your digital transformation journey and get ready to see what’s possible.
  • 2020 Cyber Threat Landscape – A 20/20 Look into Cybersecurity Predictions
    2020 Cyber Threat Landscape – A 20/20 Look into Cybersecurity Predictions
    Chris Dawson, Threat Intelligence Publications Lead Jan 28 2020 6:00 pm UTC 60 mins
    Every year, Proofpoint’s threat research team examines trends from the prior year and predicts changes in the threat landscape for the year to come. For 2020, some of the top concerns include a significant evolution in impostor attacks and increasingly sophisticated attacks on cloud applications.

    Join us for a deep dive into the biggest trends that we’re predicting for the next 12 months, and how you can prepare and protect your most valuable assets: your people and your data.

    You’ll learn:

    - Predictions for the 2020 cyber threat landscape
    - Key actions you can take to prepare your organization
    - Top resources to help support your security efforts

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Exploring Citrix Workspace - Episode 3: Endpoint Management
    Exploring Citrix Workspace - Episode 3: Endpoint Management
    Josh Thompson, Product Marketing @ Citrix Jan 29 2020 7:00 pm UTC 14 mins
    In order to better understand all that Citrix Workspace has to offer, we’ve designed a series of short mini-webinar segments that each highlights a key element of Citrix Workspace.

    Watch the entire video series to learn how Citrix Workspace:

    *Simplifies the IT workload and mitigates security risks that stem from poor user password hygiene

    *Provides unified access to files stored across multiple locations, and simplifies sharing, feedback, approvals and co-authoring within your business

    *Empowers IT to apply polices to devices and apps without sacrificing the mobility the workforce needs to remain productive

    *Enables IT control of virtual machines, applications, licensing, and security, while providing anywhere access for any device

    *Uses intelligence to boost productivity by removing busywork with a virtual assistant that automates repetitive tasks and simplifies workflows
  • Cybersecurity Challenges and Solutions for State & Local Governments
    Cybersecurity Challenges and Solutions for State & Local Governments
    Michael Osterman, Osterman Research Jan 29 2020 8:00 pm UTC 45 mins
    The public sector is under attack. Ransomware and other malware besiege government agencies, municipalities, law enforcement and utilities nationwide every day.

    In this webinar, based on the research performed by Osterman Research, we will address the following:
    -Types of threats targeting state & local organizations
    -Why is this industry so attractive to malicious actors
    -What attack trends to expect next
    -How can state & local organizations avoid being the next victim

    Michael Osterman, CEO and Founder of Osterman Research, will host this interactive session. He will present the findings of his firm’s latest research, provide his expert advice on how to become more proactive in identifying and thwarting threats, and answer your questions.
  • A Day in the life of - A Cyber Exercise Planner
    A Day in the life of - A Cyber Exercise Planner
    Connie Blaney Jan 30 2020 1:00 am UTC 60 mins
    Have you ever wanted to know what is involved in a particular Cybersecurity role? If yes then join us at the WSC for a conversation with a Cyber Exercise Planner.

    Host: Connie Blaney

    Guest: Jennifer Pence

    Jennifer is a Cyber Exercise Planner with the Global Information Security Cyber Resilience Exercise & Test Program at Bank of America. She has worked in cyber and physical security for the last 13 years, including program management, quality assurance, exercise planning, and various administrative roles. Jennifer lives in the DC Metro Area and loves rowing, politics, history, and watching the Capitals win hockey games.
  • Security Policy Automation for Your SDN Fabric with Tufin R19-3 GA
    Security Policy Automation for Your SDN Fabric with Tufin R19-3 GA
    Hadas Lahav, Roi Alon Product Management & Sigalit Kaidar, Product Marketing, Tufin Jan 30 2020 5:00 am UTC 45 mins
    Enterprises are adopting SDN in order to align network operations and network security with the needs of the business. As networks become too complex to manage securely and effectively, many of them seek a central solution that offers visibility, compliance and automation within the SDN fabric and beyond – across the hybrid network.

    Tufin provides superior visibility and automation for the leading SDN platforms, and Tufin Orchestration Suite R19-3 GA complements essential capabilities. Join the webinar to learn about the highlights of this release, including:
    •Complete support for VMware NSX-T to ease the adoption and migration from NSX-V
    •Superior visibility and path analysis for Cisco ACI – within and beyond the fabric
    •Enhancements to zero-touch automation across vendors and platforms
  • Les 5 préjugés sur la protection de donnée dans le cloud
    Les 5 préjugés sur la protection de donnée dans le cloud
    Thomas Been - Chief Marketing Officer Druva - Arnaud Lempereur - ISV Partner Manager France Amazon Web Services Jan 30 2020 10:00 am UTC 44 mins
    Joignez ce webinar pour tout comprendre sur la technologie Druva, une technologie disruptive construite sur la plateforme AWS qui révolutionne le monde de la protection de donnée dans le cloud.

    Thomas Been, Chief Marketing Officer, Druva en collaboration avec Arnaud Lempereur, ISV Partner Manager, France, Amazon Web Services (AWS) et Lemon Curl discuteront et répondront sur les préjugés que vous pouvez avoir sur la protection de donnée dans le cloud.

    IIs vous apporteront une réponse simple, claire et précise pour vous permettre d’aborder sereinement une transition de protection de donnée cloud avec un partenaire de proximité et de confiance.
  • Kaspersky’s Advanced Targeted Threat Predictions For 2020
    Kaspersky’s Advanced Targeted Threat Predictions For 2020
    Vicente Diaz, David Emm and Costin Raiu, security researchers, Kaspersky Global Research and Analysis Team Jan 30 2020 12:00 pm UTC 106 mins
    Kaspersky’s leading APT researchers will present their prognoses on what we should expect to see in 2020. The webinar will delve into the major trends of threat actors’ tactics, overall technical developments and other game-changers affecting the global threat landscape.
    During the session, Vicente Diaz< David Emm and Costin Raiu will highlight the key evolutions to keep an eye on and outline what they mean for the security industry and international cyberspace.
  • How to Communicate Risk & Security Program Value to Executives
    How to Communicate Risk & Security Program Value to Executives
    Sam Abadir, CISM, Lockpath Jan 30 2020 5:00 pm UTC 60 mins
    Many departments struggle with building a business case to create an effective, ethics-based risk management program. Plenty of executives today still think of risk management as a defensive, overhead activity or activities that are performed to satisfy legislative or regulatory requirements and deserve minimal attention.

    In this webinar, Lockpath’s Sam Abadir will help attendees understand the different value propositions business executives need to know to understand and support risk management projects across the organization.

    Attendees will learn how to:
    •Articulate their current and future risk management goals
    •Understand their risk management value proposition
    •Define business case benefits and communicate value to business executives
    •Define tools and resources needed to achieve goals
    •Understand an approach for their GRC or IRM program
  • 2020 IT Industry Predictions on SaaSification, Cloud Migration & DR Strategies
    2020 IT Industry Predictions on SaaSification, Cloud Migration & DR Strategies
    Sazzala Reddy, CTO and Co-Founder at Datrium Jan 30 2020 5:00 pm UTC 45 mins
    As we kick off 2020, we see significant changes in the IT industry – but businesses will still operate with the same goals they had 100 years ago: grow the top line, reduce cost and risk, and move quickly. So what needs to change?

    As technology evolves, the way we address issues and threats like ransomware must change too. Modern problems require modern solutions, such as using SaaS applications and moving data to the cloud, to name a couple. Join Sazzala Reddy, Datrium CTO and Co-Founder, to hear his 2020 predictions for businesses and IT professionals to consider, including why:

    - Mainstream enterprises will finally embrace DR in the cloud
    - SaaS products in the public cloud are an unstoppable trend
    - Companies have a multicloud strategy, and they want to make their applications cloud agnostic
    - Business continuity and disaster recovery strategies have to evolve
  • How Object Storage Can Help You in the Roaring 20s! Brews & Bytes, episode 1
    How Object Storage Can Help You in the Roaring 20s! Brews & Bytes, episode 1
    VP Marketing Adrian "AJ" Herrera hosts CEO Tony Barbagallo and VP Sales Ben Canter Jan 30 2020 9:00 pm UTC 45 mins
    As we head into the second decade of the millenia, the evolution of technology is accelerating and object storage is a foundational component. In the inaugural episode of our Brews & Bytes series, we’ll talk about where storage is headed in the coming decade and how you and your organization can prepare for the roaring 20s!

    Our VP Marketing Adrian “AJ” Herrera hosts a discussion with CEO Tony Barbagallo and VP of Sales Ben Canter in our premiere episode of Brews & Bytes.
  • The 2019 Dell Commercial Client Solutions Lineup
    The 2019 Dell Commercial Client Solutions Lineup
    Cameron Goedde - Client Solutions Field Marketing | Dell EMC Jan 31 2020 4:00 pm UTC 42 mins
    Smarter & faster experiences are the driver behind Dell’s 2019 Client Solutions lineup. We have the broadest portfolio to meet all needs. From highly configurable fixed solutions – our OptiPlex desktops and AIOs and our Wyse Thin clients. To the smallest, lightest mobile solutions including Latitude and the XPS to specialty systems – our powerful Precision workstations, including towers, racks and mobile workstations and finally our Rugged devices. We also have a full portfolio of displays and accessories to help build your entire ecosystem.

    Presented by: Cameron Goedde - Client Solutions Field Marketing, Dell EMC
  • Protect against phishing threats in a post-perimeter world
    Protect against phishing threats in a post-perimeter world
    Aaron Cockerill, Chief Strategy Officer, Lookout Feb 3 2020 11:00 pm UTC 51 mins
    As phishing attacks evolve, organisations must protect corporate data in the cloud. Register for this exclusive webinar now to learn:

    - The latest tactics attackers are using to exfiltrate enterprise data
    - Why phishing is more problematic and successful on mobile
    - How to identify if an employee device has been phished
    - How to remain compliant by reducing cyber risk from mobile endpoints
  • Email Security: Why Now Is The Time To Review Your Strategy
    Email Security: Why Now Is The Time To Review Your Strategy
    Adenike Cosgrove Cybersecurity Strategy, International and Matt Cooke, Cybersecurity Strategist Feb 4 2020 10:00 am UTC 57 mins
    Nearly 100% of attacks require a human to click. Cybercriminals target people, largely via email, rather than systems and infrastructure. Security teams are spending over half of their time responding to phishing attacks. It’s never been more critical to have an effective and accurate email gateway that can identify and stop these attacks and provide the right forensics and visibility into who your most attacked people are.

    Legacy solutions cannot provide this visibility and are behind the curve in stopped advanced email threats.

    Join us to gain insights into:
    How the email threat landscape has changed with attackers evading legacy approaches;
    How leaders like Proofpoint have innovated to keep up;
    Our recommendations on the steps you must take to protect your people from email-based targeted attacks.
  • Cybersécurité 2020 : horizons et perspectives d'une nouvelle décennie
    Cybersécurité 2020 : horizons et perspectives d'une nouvelle décennie
    David Grout, CTO EMEA à FireEye Feb 4 2020 1:30 pm UTC 45 mins
    À l'aube de cette nouvelle décennie, nous avons déjà une bonne idée de ce que les acteurs de la cybercriminalité nous réservent. Face à des attaquants de plus en plus ingénieux et professionnalisés, la protection des organisations passe par une bonne préparation.

    Le 4 février à 14h30 (heure de Paris), retrouvez David Grout, CTO EMEA à FireEye, dans une session dédiée aux prédictions cybersécurité 2020. Au cours de ce webinaire, David s'attardera sur certains points abordés dans notre rapport ‘ Cybersécurité 2020 : horizons et perspectives d'une nouvelle décennie ‘. Suivez notre session afin d’en apprendre plus sur :



    •Les motivations géopolitiques des attaquants;
    •La déstabilisation d’entreprise via l’extorsion et les rançons;
    •L’adoption du Cloud et ses impacts;
    •L’accélération des stratégies étatiques. 


    Inscrivez-vous et découvrez-en plus sur les prédictions 2020 afin d’adapter votre stratégie sécurité.
  • Kaspersky’s APT review of 2019: Threat Landscape Evolution
    Kaspersky’s APT review of 2019: Threat Landscape Evolution
    Vicente Diaz and Costin Raiu, security researchers, Kaspersky Global Research and Analysis Team Feb 4 2020 4:00 pm UTC 80 mins
    Kaspersky leading researchers present their annual analysis of the most significant changes of APT threat landscape of 2019. During the webinar, Costin Raiu and Vicente Diaz will tell the audience about events and transformation that happened with the concluding year and provide their expert analysis and insights.
  • HybridOps and the State of Digital Transformation
    HybridOps and the State of Digital Transformation
    PagerDuty & IDG Feb 4 2020 5:00 pm UTC 38 mins
    CIOs leading digital transformation initiatives often find themselves juggling multiple tools, processes, and teams. A ‘HybridOps’ approach can help IT leaders knit together multiple operating models and empower teams to work the way the want to, which together will help to improve the speed and efficiency of digital operations and facilitate automation at scale. Join our panel of experts as they discuss digital operations innovation, the need to break down silos, and the best path forward for CIOs and their teams.
  • Protecting Your People and Data - Featuring Forrester's Zero Trust Framework
    Protecting Your People and Data - Featuring Forrester's Zero Trust Framework
    Ryan Kalember, EVP of Cybersecurity Strategy - Proofpoint & Chase Cunningham, Principal Analyst Feb 5 2020 6:00 pm UTC 60 mins
    There's lots of noise in the cybersecurity industry around zero-trust, but Forrester Research pioneered the original and most effective framework. It’s never been more important to understand how zero-trust principles apply to your environment, with people becoming the new perimeter, and protecting them and the data they access becoming the new imperative.

    In our upcoming webinar, we will take a closer look at the original Zero Trust Approach as defined by Forrester Research and applied in practice by leading security teams. The webinar will cover:

    - An overview of the Zero Trust approach
    - Concrete first steps for getting started
    - Guidelines on how to evaluate your standing within the maturity model
    - How Zero Trust reinforces people-centric security

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • All About Ransomware
    All About Ransomware
    Diana Salazar, Product Marketing Manager; Robert Rivera, IT Feb 5 2020 6:00 pm UTC 45 mins
    Learn the latest in best practices and common mistakes data centers make. With data production only increasing, so will the ransomware attacks.
  • Exploring Citrix Workspace - Episode 4: Virtual Apps & Desktops
    Exploring Citrix Workspace - Episode 4: Virtual Apps & Desktops
    Nitin Sharma, Product Marketing @ Citrix Feb 5 2020 7:00 pm UTC 13 mins
    In order to better understand all that Citrix Workspace has to offer, we’ve designed a series of short mini-webinar segments that each highlights a key element of Citrix Workspace.

    Watch the entire video series to learn how Citrix Workspace:

    *Simplifies the IT workload and mitigates security risks that stem from poor user password hygiene

    *Provides unified access to files stored across multiple locations, and simplifies sharing, feedback, approvals and co-authoring within your business

    *Empowers IT to apply polices to devices and apps without sacrificing the mobility the workforce needs to remain productive

    *Enables IT control of virtual machines, applications, licensing, and security, while providing anywhere access for any device

    *Uses intelligence to boost productivity by removing busywork with a virtual assistant that automates repetitive tasks and simplifies workflows
  • Réduire les problèmes de Wi-Fi dans les environnements surpeuplés
    Réduire les problèmes de Wi-Fi dans les environnements surpeuplés
    Stéphane Julhes, Security Presales Engineer France, SonicWall Feb 6 2020 9:00 am UTC 60 mins
    Rejoignez-nous pour découvrir comment réduire les problèmes de radio fréquence Wi-Fi (RF) et faciliter l’intégration des clients dans votre environnement. La puissante gestion du Wi-Fi basée sur le cloud de SonicWall est à même de répondre aux problèmes en question et à d’autres.
    Apprenez à :
    •Captiver les clients via un portail captif
    •Contrôler la bande passante en matière de trafic
    •Améliorer les performances grâce aux nouvelles caractéristiques de RF
    Améliorer la sécurité du sans-fil