Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • The DevSecOps Journey: Why It Starts with Agile DevOps & App Security
    The DevSecOps Journey: Why It Starts with Agile DevOps & App Security Jaweed Metz, Principal, Products at Contrast Security Recorded: Sep 18 2018 45 mins
    DevSecOps is best viewed as a journey that enlightened organizations are starting to embark on.

    The major constituent to consider on this journey is ensuring that organizations defenses have been properly configured, implemented and operated–to that end, application security testing is of paramount importance. As businesses strive to rapidly release code in order to satisfy customer demands and gain a competitive advantage,security must work in tandem with Agile DevOps processes.

    Traditionally, security has been an afterthought, or at the very least introduced late into the release process.Hence, security has been viewed as an impediment to high velocity Agile DevOps processes and becoming a primary bottleneck in the software delivery pipeline.This can cause major contention and distrust between development and security teams–but that doesn’t need to be the case.

    Cyber threats are continuous–so shouldn’t development and security practitioners work in tandem in order to deliver and deploy code securely and continuously?The cultural, differences between development and security teams needs to be addressed and a unified approach established in order to integrate security as early as possible.Automated application security addresses these cultural, technical and process issues.

    This webinar will highlight how modern, automated application security tools can help weave security into the code continuously and accurately throughout the SDLC.Automated application security enables the real-time identification and response to new attacks and vulnerabilities that emerge in custom and third party code. Additionally, we will discuss how integrated application security unites developers and security practitioners with the tools they are already using so that they can work even more effectively.
  • How To Prevent and Recover from a Cyber Attack
    How To Prevent and Recover from a Cyber Attack Jeannine Gaudreau, Director of Information Security, Carbonite and Johnathan Ferrick, Sr. Product Manager, Carbonite Recorded: Sep 18 2018 64 mins
    Threats to your backup infrastructure continue to rise – the data that resides there and the applications it has access to are a prime target for a cyber-attack. At Carbonite, we’ve helped over 10,000 customers prevent or recover from cyber attacks in their many forms but even we are not immune to attacks.

    Join our webinar and hear from our own head of cyber security, Jeannine Gaudreau, about tactics we use at Carbonite to prevent and recover from a cyber security event. We will also have a question and answer session where we discuss a few different case studies and how we’ve employed similar tactics to assist our customers.
  • Why Cloud Migrations Fail - Learn the Keys to Cloud Success
    Why Cloud Migrations Fail - Learn the Keys to Cloud Success Storage Switzerland and SoftNAS Recorded: Sep 18 2018 59 mins
    Many cloud migration and cloud first strategies fail to live up to expectations. The problem is organizations spend too much time on micro issues like product selection and not enough time on big picture items like the cloud strategy's foundation. In our live webinar, Storage Switzerland and SoftNAS will discuss the problems these different cloud projects create, and how to create a foundation for your cloud strategy that guarantees success. All registrants receive a copy of Storage Switzerland's latest eBook "Developing a Holistic Cloud Strategy".
  • Ensuring Pop-Up & Mobile Connectivity for Field Workforces
    Ensuring Pop-Up & Mobile Connectivity for Field Workforces Ken Hosac, Vice President of IoT Strategy, Cradlepoint Recorded: Sep 18 2018 59 mins
    The widespread trends of IoT, technology-dependent field workforces, connected vehicles, and temporary retail sites are driving the need for pop-up and mobile network connectivity that is secure, easy to deploy, and can be monitored and managed from a central location.

    Scenarios including insurance companies during disaster response; short-term, seasonal businesses; construction offices; police and fleet vehicles, and one-time events all call for highly available WAN links, as well as remote visibility that doesn’t require on-site IT experts.

    Join Cradlepoint’s Ken Hosac, Vice President of IoT Strategy, for a live webinar to explore how enterprises are leveraging cloud-managed, 4G LTE network solutions to provide secure, always-on connectivity across an array of industries and use cases.

    Hosac has helped drive Cradlepoint’s growth and development through roles in strategic planning, product management, solution strategy and thought leadership. He frequently represents the company at industry conferences and events, and served on the original Advisory Board for the IoT/M2M Evolution Magazine. Hosac has 25 years of experience in marketing, sales, R&D and manufacturing. Prior to joining Cradlepoint, he served as VP of Marketing for Casabyte (later acquired by JDS Uniphase). He also served as VP of Business Development for GoAhead Software (later acquired by Oracle). Hosac earlier spent 10 years at Hewlett Packard with cable modems and head-ends, set-top boxes, and personal computers in a variety of engineering and engineering management roles. He holds a B.S. degree in Electrical Engineering and an M.S. degree in Manufacturing Engineering, both from Stanford University.
  • [Ep.21] Ask the Expert: Ethics in AI
    [Ep.21] Ask the Expert: Ethics in AI Alexey Malanov, Malware Expert, Kaspersky Lab Recorded: Sep 18 2018 49 mins
    This webinar is part of BrightTALK's Ask the Expert series.

    Alexey Malanov joined Kaspersky Lab in 2004, where he began his work as a virus analyst. He has since been appointed Head of Kaspersky's Anti-Malware Team and in 2012, shifted his focus to analyzing technology trends and risks.

    The threat posed by a Strong AI (artificial intelligence where the machine's intellectual capability is functionally equal to a human's) is well-considered in many science fiction films. But the invention of a Strong AI will take many years, so we can afford not to hurry with the study of "laws of robotics."

    However, we are already facing growing concerns. The use of machine learning in various fields has shown that algorithms often make strange, discriminatory and difficult-to-understand decisions. Moreover, it has been clearly demonstrated that a person can cheat algorithms to achieve desired results.

    Alexey addresses some of the looming issues surrounding the AI algorithms that are becoming a part of our daily lives, and will increasingly affect us and our decisions.
  • Keeping Up with Advanced Attackers: Understanding Threats and Adapting Defences
    Keeping Up with Advanced Attackers: Understanding Threats and Adapting Defences Alister Shepherd, Mandiant Director, EMEA Recorded: Sep 18 2018 46 mins
    An organization suffering a breach is no longer a question of "if," but "when" and "how big." Attackers are becoming more sophisticated in exploiting vulnerabilities, acquiring hacking tools on the dark web and leveraging automation, making traditional defense strategies antiquated and obsolete.

    Join Alister Shepherd, our Mandiant Director for EMEA, for insights into:
    - Recent APT intrusion activity from different regional threat actors,
    - Current attack techniques that have been successful during these intrusions,
    - Detections and investigations conducted by Mandiant,
    - Lessons learned for defenders.
  • A Data Breach Prevention, Detection & Response Strategy to Combat Todays Threats
    A Data Breach Prevention, Detection & Response Strategy to Combat Todays Threats Nick Frost, Principal Consultant, ISF LTD Recorded: Sep 18 2018 47 mins
    With the ever-increasing frequency and sophistication of security threats to organisations, business leaders need to have a comprehensive data security strategy to protect themselves. Information security practitioners have to think and plan beyond existing protection capabilities that are aimed at preventing threats only. Today's cyber security strategies need to protect an organisations mission critical assets in a way that is:

    ‒ balanced, providing a mixture of informative, preventative and detective security controls that complement each other
    ‒ comprehensive, providing protection before, during and after threat events materialise into security incidents
    ‒ end-to-end, covering the complete information life cycle.

    This will enable organisations to match the protection provided with the sophistication of threats to such mission critical information assets. This webinar will look at past and present models and share ideas on how organisations can ‘future proof’ their strategies to combat next generation threats.

    In particular in this webinar, Nick Frost, Principal Consultant at the ISF will discuss what actions can be taken to identify your most critical information assets, and how a modern day cyber security model needs to focus on prevention and detection of a data breach, and how to respond to a breach in order to reduce damage to brand and reputation.
  • Kaspersky Technical Talks Series - Introduction to Hybrid Cloud
    Kaspersky Technical Talks Series - Introduction to Hybrid Cloud Mark Olding, Kaspersky Lab Recorded: Sep 18 2018 21 mins
    Proven Protection and Borderless Orchestration for Your Hybrid Cloud - Next generation protection and security, more capable than ever

    Engineered for private and public clouds it enables you to build a perfectly orchestrated and adaptive cybersecurity ecosystem, delivering the seamlessly orchestrated capabilities your multi-cloud workloads require, without compromising resource efficiency.

    Kaspersky Hybrid Cloud Security has been engineered to protect applications and data on your physical, virtual and cloud workloads, ensuring business sustainability and accelerating compliance across your entire multi-cloud environment.

    Join Mark Olding as he navigates the changing face of a Corporate IT environment. Discover how Cloud adoption has changed and how Kaspersky Hybrid Cloud can help safeguard your cloud transition.
  • BraveIT 2018
    BraveIT 2018 Tierpoint - BraveIT Recorded: Sep 13 2018 251 mins
    BraveIT is an interactive, thought leadership event designed for the modern IT professional who is tasked with navigating opportunity and risk in a mission-critical world. The live event is taking place in Chicago on 9/13, we hope you'll join us for the live stream if you are unable to attend in person.

    In this era of accelerating opportunity and risk, IT decision-making evolves constantly. And while the propagation of possibilities fuels innovation and growth, it also makes it increasingly difficult to keep pace; to continuously optimize mission-critical strategies in the face of new threats and persistent change. Although your master plan may be established and stable, you know it can’t be static. Fine tuning it regularly is a required exercise in business optimization, product differentiation, and risk mitigation. That’s why BraveIT is an essential part of your yearly planning cycle. It keeps you current with industry best practices and best-in-class implementations, pressure tests your operating assumptions and enriches your plans for a broad range of potential events and opportunities—all while connecting you with peers and partners who are facing similar challenges.

    As IT professionals face daunting challenges to combat the likes of hackers and shrinking budgets, we recognize your heroics in changing the dialogue from “no” to “how.”

    All times are CDT:
    - 12:30 PM: Opening Remarks
    - 12:45 PM: It's a Brave New BC/DR World
    - 1:25 PM: Workshop: What Organizations Need to Know to Achieve True IT Resilience
    - 2:20 PM: What IT Nightmares Keep You Up at Night? Peer Perspectives on Real-World BC/DR
    - 3:10 PM: Bravery in the Midst of Digital Transformation: Success Stories
    - 4:10 PM: Data Center of the Future
    - 4:40 PM: BraveIT Award presentation

    Visit https://web.tierpoint.com/braveit/2018-agenda for full details.
  • The True Cost of Downtime: How to Map Cost & Risk in a Complete DR Plan
    The True Cost of Downtime: How to Map Cost & Risk in a Complete DR Plan Ray Sullivan, Sr. Product Marketing Manager, Carbonite & Derek Cheek, Manager of Professional Services, Carbonite Recorded: Sep 13 2018 56 mins
    Lost productivity, lost sales, lost reputation, lost customers—in a world that depends on connectivity, unplanned downtime can be devastating. Danger to data can come from anywhere, so it’s critically important to get a full measure of your risks.

    In this webinar, you’ll learn:

    - Simple, proven methods to mapping cost and risk
    - Defining realistic RTO and RPO expectations, identifying ways to simplify your solutions
    - Ensuring that your disaster recovery plan can live up to its promise.
    - Find it easier to plan for any kind of data disaster—and easier to get buy-in on the best solution for your business.
  • Welcome to Next-Gen Vulnerability Management Webinar | Kenna Security
    Welcome to Next-Gen Vulnerability Management Webinar | Kenna Security Jonathan Cran, Head of Research at Kenna Security, and Rik Turner, Principal Analyst at Ovum Recorded: Sep 13 2018 55 mins
    To say that technology advances quickly is an understatement. With that growth has come a rapid increase in the sheer number of vulnerabilities threatening the security and well-being of organizations of every size and industry.

    No one is immune to cyber threats, but when you lack the context required to prioritize what to remediate first, and it's impossible to remediate every single vulnerability, how do you even know where to start?

    It’s time to get ahead of the cyber curve.

    Join Jonathan Cran, Head of Research at Kenna Security, and Rik Turner, Principal Analyst at Ovum, for our next webinar: Welcome to Next-Gen Vulnerability Management on Thursday, September 13 at 8:00am PT. We’ll cover:

    - The pitfalls of traditional remediation approaches in an ever-evolving digital world
    - A comparison of those approaches against a cutting-edge predictive model
    - The role of AI and machine learning in reducing risk
    - How prioritization and prediction can increase your security team’s efficiency and effectiveness

    Welcome to the next generation of vulnerability management. Register now.
  • Commvault V11 Relatórios: Portuguese Webinar
    Commvault V11 Relatórios: Portuguese Webinar Rubens Ferreira Recorded: Sep 13 2018 17 mins
    Nesta demonstração explicamos um pouco sobre as opções de relatórios da solução Commvault e de como criar relatórios customizados
  • Управление данными в эру GDPR
    Управление данными в эру GDPR Евгений Пухов, Технический консультант, Commvault Recorded: Sep 13 2018 64 mins
    Приглашаем принять участие в вебинаре, повсященном вопросу защиты персональных данных в соответсвиии с актом Евросоюза «Общие положения о защите данных» (General Data Protection Regulation, GDPR), вступившем в силу 25 мая 2018 года.

    На вебинаре вы узнаете:
    - основные требования GDPR
    - какие меры необходимо предпринять для защиты персональных данных
    - единая платформа управления данными Commvault как эффективное решение вопроса GDPR
  • What to Expect at #OCR2018
    What to Expect at #OCR2018 Jeff Schweitzer, Asymmetric Solutions Architect, Verizon Recorded: Sep 12 2018 22 mins
    In 2017, Verizon hosted Operation Convergent Response (OCR) at the Guardian Centers in Perry, GA as a way of showcasing various core, new, and emerging communications technologies in live action scenarios. The attendee response was positive and seen as very helpful to the support of their core missions. And in response to overwhelming demand, Verizon will return to the Guardian Centers this year, November 5-8, to host Operation Convergent Response 2018 (#OCR2018) - and we want you to join us!

    This webinar will give you an opportunity to:
    •Learn more about the real-world experiences #OCR2018 will demonstrate to federal, state, and local agencies and organizations.

    •Hear directly from Verizon’s experts as they provide deep-dives into the various scenarios and other event activities, including a solutions showcase and conference as well as a variety of immersive learning experiences.

    •Ask additional questions in the Q&A session.

    #OCR2018 will highlight technology from Verizon and its eco-system of innovative companies at our solutions showcase and within the following immersive, real-world scenarios:

    •Active Shooter
    •Earthquake
    •Helicopter Crash
    •Hurricane
    •Interstate Pile-Up
    •Nuclear Detonation
    •Subway Attack

    Please join this webinar to learn more about #OCR2018 and how technology can help address your organization’s complex challenges so you can achieve better outcomes.

    Verizon would love to see you at this year’s event!
  • Next-Gen All-Flash Arrays: Making the Right Decision for your Enterprise Storage
    Next-Gen All-Flash Arrays: Making the Right Decision for your Enterprise Storage Storage Switzerland, X-IO Storage Recorded: Sep 12 2018 60 mins
    The first generation of all-flash arrays has come and gone. For many organizations, the time is now to consider the "next" all-flash array.

    In our next live webinar, Storage Switzerland and X-IO Storage discuss five things to look for in your next all-flash array. Topics include:

    - Lessons learned from the first generation
    - How to make sure those lessons apply to next-generation all-flash arrays

    Even if you’re considering your first all-flash array, this webinar provides the information you need to make the right decision for your enterprise.
  • Key Management as a Service – Cloud, Compliance & Control
    Key Management as a Service – Cloud, Compliance & Control Garrett Bekker of 451 Research & Imam Sheikh of Equinix Recorded: Sep 12 2018 58 mins
    As enterprises strategize and execute their digital business transformation, security and control are crucial to success. Encryption key management is an effective control and plays a critical role. However, compounding factors like using Software as a Service and deploying multicloud architectures create additional data security challenges. 451 Research Analyst Garret Bekker and Equinix’s Imam Sheikh will discuss how cloud, compliance and total key control impact encryption key management, especially as enterprises embark on digital transformation journeys to drive competitive advantage.
  • Third Party Risk Trends and Predictions
    Third Party Risk Trends and Predictions Moderated by Sam Abadir - Lockpath Recorded: Sep 12 2018 60 mins
    What insights can be gleaned from third-party risk management today? What are the top trends to watch out for in 2020? Get guidance from our panel of thought leaders on the leading edge of third-party risk management. Each panelist will answer a series of questions and share their viewpoints on a variety of topics, including:

    •Top trends in third-party risk management
    •Third-party risk ownership in an organization
    •How privacy is affecting third-party relationships
    •Role of continuous monitoring in business resiliency
    •Top predictions for 2020

    Plan now to attend this exclusive webinar. Or forward to risk management professionals tasked with managing third-party risk.

    PRESENTERS:

    -Phil Marshall, Director, Product Marketing, SecurityScorecard

    -James H. Gellert, Chairman and CEO, RapidRatings

    -Tom Garrubba, Sr. Director, Santa Fe Group / Shared Assessments Program

    -Eric Dieterich, General Manager – Advisors, Privacy Practice Lead, CISA, CRISC, CIPP/US, Focal Point

    MODERATOR :

    Sam Abadir, VP, Industry Solutions, Lockpath
  • Ransomware: Getting ready for the next wave
    Ransomware: Getting ready for the next wave David Gugick, CloudBerry Lab and Andy Klein, Backblaze. Recorded: Sep 12 2018 47 mins
    It has been over a year since the ransomware attack known as Wanna Cry first struck fear into businesses, organizations, and individuals around the globe. While ransomware attacks have leveled off since then, it is only a matter of time before the next wave of ransomware takes advantage of an obscure or newly found vulnerability. One prediction suggests that there will be a ransomware attack on businesses every 14 seconds by the end of 2019. But, ransomware is only effective if regular backups are not kept. Join CloudBerry Lab and Backblaze as they show you how easy it can be to protect your data and your organization from falling victim to the next wave of ransomware.
  • Fraud beyond finance: multi-industrial approach to prevention
    Fraud beyond finance: multi-industrial approach to prevention Tim Ayling, Global Head of Fraud Prevention Solutions, Kaspersky Lab Recorded: Sep 12 2018 30 mins
    When it comes to discussions related to fraud, we think about the finance first. Financial institutions historically have suffered the most being the targets of various criminal schemes, malware, social engineering, money laundering and other fraud vectors.

    However, nowadays we see that organizations across different industries are suffering reputational, financial and other damages caused by fraud. Government agencies, healthcare organizations, retail and e-commerce, loyalty schemes, gaming industry and gambling rooms report cases of account takeover, new account fraud, even money laundering related attacks. Most of them have fraud prevention measures in place to fight or at least to monitor this. But fraud has evolved into a form of organizational crime and attackers offer training and knowledge sharing to help find a way past well-known fraud management solutions.

    At the webinar we are going to cover the most up-to-date threat landscape for different types of businesses and share some real cases of success.
  • Security Awareness Training helps reduce Cyber-Incidents caused by human errors
    Security Awareness Training helps reduce Cyber-Incidents caused by human errors Mark Olding, Kaspersky Lab Recorded: Sep 12 2018 36 mins
    More than 80% of all cyber-incidents are caused by human error. Enterprises lose millions recovering from staff-related incidents – but traditional training programs usually fail to achieve the desired behavioural changes and motivation.

    Understanding what lies behind any learning and teaching process helps to build an effective educational program. Our programs not only deliver knowledge, but – more importantly – change habits and form the new behaviour patterns that are the real goal of awareness training.

    Join us as we reveal how including a robust security awareness strategy will help customers mitigate against incidents and how to foster good policies for greater protection.
  • Kaspersky HuMachine Explained
    Kaspersky HuMachine Explained Lee Rendell, Kaspersky Lab Recorded: Sep 12 2018 22 mins
    We have witnessed many developments during our 20year+ service operating within the cybersecurity business. Today, IT security is a constant process, that requires addressing threats holistically with a comprehensive set of solutions and multi-layered protection technologies, that goes beyond the mere prevention of cybersecurity incidents. Complex attacks need to be detected, threat response is a must, and businesses also need intelligence to predict future attacks. The efficiency of this multidimensional and multifaceted process depends on many factors.

    Our comprehensive portfolio of solutions achieves all this thanks to our unique combination of HuMachine® Intelligence and Adaptive approach, protecting businesses rigorously against next-gen threats and minimizing the damage an incident could cause.

    Join Lee Rendell as he uncovers what HuMachine is and how your organisation can benefit from True Cybersecurity, that not only prevents incidents, but also predicts, detects and responds to them effectively, flexibly and reliably.
  • Eliminate Backups and Simplify DR with Hybrid Cloud Storage
    Eliminate Backups and Simplify DR with Hybrid Cloud Storage George Crump, Storage Switzerland and Darren Miller, ClearSky Recorded: Sep 11 2018 55 mins
    The cloud should be a valuable ally in helping organizations eliminate backup infrastructure and increase their disaster recovery (DR) confidence. The reality is that current cloud backup and DR solutions fall short because they don't fully exploit cloud resources.

    Most cloud backup and DR solutions still require on-premises infrastructure and actually increase costs by requiring multiple data protection copies, both on prem and in the cloud.

    In this live webinar join Storage Switzerland and ClearSky to learn why current solutions aren't doing enough to eliminate backups or simplify DR and how a complete, hybrid cloud storage service can meet these goals without compromising performance.
  • Transformacion en la proteccion de datos para Flashstack: Spanish Webinar
    Transformacion en la proteccion de datos para Flashstack: Spanish Webinar Ramon Garcia Recorded: Sep 11 2018 49 mins
    Las plataformas de TI tradicionales basadas en silos construidas sobre componentes separados de hardware y software limitan el éxito del departamento de TI y del negocio. Estos crean complejidades que impiden a las organizaciones usar sus datos de manera efectiva. Es por eso que muchas organizaciones de TI recurren a FlashStack ™, una solución de Cisco y Pure Storage que junto con la protección de datos de Commvault cambian la forma en que se implementan los servicios de TI y logran capacidades de gestión de datos optimizadas, transformadoras y protegidas
  • How to Simplify Your Migration to Windows 10
    How to Simplify Your Migration to Windows 10 W. Curtis Preston, Chief Technical Architect, Druva Recorded: Sep 11 2018 39 mins
    Migrating to a new OS, like Windows 10, or performing upgrades can be time-consuming and complicated. Discover how to streamline OS migration, and maintain business productivity, by leveraging endpoint data protection with Druva inSync.
  • Политика хранения – консоль администратора – стоит ли отказаться от JAVA?
    Политика хранения – консоль администратора – стоит ли отказаться от JAVA? Дмитрий Иванюк, эксперт по решениям Commvault Recorded: Sep 11 2018 45 mins
    Приглашаем принять участие в техническом вебинаре «Политика хранения - консоль администратора –стоит ли отказаться от JAVA?»

    - Что же такое Plan?
    - Что же такое Storage target и Storage pool?
    - Использование Админ консоли для конфигурации Commvault Complete Backup & Recovery?
    - Какие основные решения доступны на данный момент?
    - Стоит ли использовать административную консоль в задаче конфигурации?

    Ответы на эти и многие другие вопросы Вы сможете получить посетив наш вебинар

    Присоединяйстесь и приглашайте коллег. Будет интересно!
    Курс предназначен для product manager, архитекторов, инженеров, администраторов
    Будем рады актуальным и новым слушателям!
  • How to protect against IoT security attacks and next generation cyber crimes
    How to protect against IoT security attacks and next generation cyber crimes Orla Cox, Director Security Response, Symantec Sep 19 2018 11:00 am UTC 45 mins
    Cyber criminals and targeted attack groups alike continue to hone existing methods and identify new channels of infection in order to ensure success. On the heels of WannaCry, Worms continue to experience a renaissance, spreading aggressively across corporate networks.

    As vulnerabilities on desktop computers become increasingly rare, attackers need to look to new channels and new platforms for infection, with IoT becoming an increasingly attractive proposition.

    In this webinar you will learn:

    • How cybercriminals are diversifying in order to remain profitable
    • The new methods of threat propagation causing headaches for organizations
    • The next generation of IoT threats
    • Recent targeted attack campaigns
  • Messaging Security - Schutz Ihrer E-Mail in der Cloud und vor Ort
    Messaging Security - Schutz Ihrer E-Mail in der Cloud und vor Ort Ramin Ghassemi, Hakan Arslanboga Sep 19 2018 12:00 pm UTC 75 mins
    E-Mail ist die Lebensader Ihres Unternehmens, aber auch eines der häufigsten Einfallstore für zielgerichtete Angriffe. Der Komfort, den Office 365, Gmail und andere cloudbasierte Produktivitätstools bieten, erhöht die Anfälligkeit Ihres Unternehmens. Schützen Sie es mit unserer Messaging Security-Plattform für cloudbasierte und On-Premises-E-Mail selbst vor den komplexesten Bedrohungen.  
  • Targeted Attacks: A Review of Current Trends and Future Developments
    Targeted Attacks: A Review of Current Trends and Future Developments David Emm, Principal Security Researcher, Kaspersky Lab (Global Research & Analysis Team) Sep 19 2018 12:00 pm UTC 60 mins
    Targeted attacks are now an established part of the threat landscape and in 2017 the headlines were full of news about sophisticated attacks of all kinds. Some were highly-targeted, others affected many businesses and quickly reached epidemic proportions. Often the motive was clear - to gather data, to make money, to cause damage and disruption. But sometimes the lines between these became blurred.

    It's clear that organisations of all kinds need to understand and prepare for cyber-threats affecting their sector. And this must start with an understanding of the current threat landscape and how it's likely to develop.

    This presentation will outline the trends we're seeing and offer some predictions for 2018 and beyond - based on our analysis of attacks in 2017.

    About the presenter:
    David joined Kaspersky Lab in 2004. He is a member of the company's Global Research and Analysis Team and has worked in the anti-malware industry since 1990 in a variety of roles, including that of Senior Technology Consultant at Dr Solomon's Software, and Systems Engineer and Product Manager at McAfee.

    In his current role, David regularly delivers presentations on malware and other IT security threats at industry events, highlighting what organisations and consumers can do to stay safe online. He also provides comment to broadcast and print media on the ever-changing cyber-security and threat landscape. David has a strong interest in malware, ID theft and the human aspects of security, and is a knowledgeable advisor on all aspects of online security.

    David is regularly mentioned in national print press as a cyber-security expert and has a wealth of experience in being filmed for such programmes as Good Morning Britain and BBC News.
  • Verizon Threat Research Advisory Center - 2018 Payment Security Report
    Verizon Threat Research Advisory Center - 2018 Payment Security Report John Grim and David Kennedy, Verizon Enterprise Solutions Sep 19 2018 2:00 pm UTC 90 mins
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Ron Tosto, Senior Manager, Global Payment Security Practice
    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •Josh Costa, Senior Consultant, Investigative Response – Americas
    •Max Shubin, Senior Analyst, Threat Intelligence

    For this month’s theme: ‘Payment Security Report,’ we'll feature Ron Tosto who'll cover the latest thought leadership from Verizon, the 2018 Payment Security Report (PSR). The PSR offers industry research on the global payment security landscape. The report highlights the need for effective data protection and provides details on improving security control effectiveness.

    John Grim and Josh Costa will then cover two (2) 2018 Data Breach Digest scenarios: one involving an ecommerce breach and the other a Point of Sale (PoS) intrusion. Max Shubin will provide insight to our recent caseload. Finally, Dave Kennedy will complete this month's briefing with:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to payment card related data breaches that you'd like us to cover on the call, please send them to the following email address prior to September 14, 2018:

    Intel.Briefing@verizon.com

    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Commvault Endpoint Data Protection
    Commvault Endpoint Data Protection Philippe Decherat Sep 20 2018 7:30 am UTC 45 mins
    Commvault Endpoint Data Protection, inclus dans son offre Commvault Complete Backup&Recovery réduit les risques de perte de données et sécurise les données sur les postes clients.

    Elle permet de protéger, restaurer et partager les informations conservées sur les postes fixes, les postes mobiles, et dans les offres de partage de fichiers de type cloud ; elle permet également d’assurer des fonctionnalités de conformité des données pour les entreprises soumises à ce type de réglementations. Les données sont protégées des erreurs humaines, des problèmes de hardware, les attaques de malware et ramsomware.

    Cette offre est disponible sous forme logicielle ou de Backup-as-a-Service par Commvault.

    Rejoignez-nous lors de ce webinaire pour découvrir les avantages de Commvault Endpoint Data Protection.
  • Обзор актуальной схемы лицензирования Commvault
    Обзор актуальной схемы лицензирования Commvault Дмитрий Иванюк, эксперт по решениям Commvault Sep 20 2018 8:00 am UTC 75 mins
    Новая схема лицензирования это всегда много вопросов!

    Данный вебинар позволит больше узнать о новой схеме лицензирования и понять как можно быстро и легко сформировать спецификацию за несколько минут.
    Все это- благодаря упрощенной схеме лицензирования!

    Актуальность решения Commvault – да!
    Технологичность решения Commvault – да!
    Простота лицензирования решения Commvault – да!

    И конечно же сессия вопросов и ответов!

    Курс предназначен для BDM, менеджеров по продажам, руководителей проектов, руководителей продаж

    Присоединяйтесь и приглашайте коллег!
    Будем рады актуальным и новым слушателям!
  • Your Data: Safe, Accessible, and Optimized - All the Time
    Your Data: Safe, Accessible, and Optimized - All the Time Jaap Van Kleef, EMEA Technical Manager Sep 20 2018 9:00 am UTC 60 mins
    Growing data volume, rising cost of downtime and data loss, cyber attacks, limited storage capacity, business continuity, and inadequate backup and recovery performance are among the myriad of challenges that IT teams face today.

    Join this webcast with Jaap Van Kleef, EMEA Technical Manager at StorageCraft and learn about best practices for data protection and disaster recovery.
  • Kaspersky Technical Talks Series - Threat Intelligence Portal: How to use it
    Kaspersky Technical Talks Series - Threat Intelligence Portal: How to use it Jibril Hassan, Kaspersky Lab Sep 20 2018 10:00 am UTC 75 mins
    Threat Intelligence Services from Kaspersky Lab gives you access to the intelligence you need to mitigate against threats, provided by our world-leading team of researchers and analysts.

    Kaspersky Lab’s knowledge, experience and deep intelligence on every aspect of cybersecurity has made it the trusted partner of the world’s premier law enforcement and government agencies, including INTERPOL and leading CERTs. You too can leverage this intelligence in your organisation today.

    Join Jibril Hassan as he introduces the Threat Intelligence Portal and showcases how to optimise this valuable resource to keep your organisation safe from attacks. Gain some valuable insights to help manage your cyber security with confidence.
  • Claves en la estrategia de gestión datos para protección en puestos de trabajo
    Claves en la estrategia de gestión datos para protección en puestos de trabajo Ivan Abad - Director Técnico Iberia Sep 20 2018 10:30 am UTC 30 mins
    Hoy en día, la mayoría de las organizaciones ya tienen una comprensión práctica de cómo gestionar su centro de datos. Sin embargo, a menudo pasan por alto o deciden no enfocarse a los datos que residen en puestos de trabajo o repositorios de información.

    En este webinar, analizaremos cuáles son los impulsores del negocio y los desafíos técnicos asociados a la protección, gestión y control de los datos de usuario, con independencia de la ubicación de los mismos.

    Además te ayudaremos a contestar la pregunta: ¿es suficiente utilizar un servicio de intercambio de archivos en la nube?
  • Making PKI the foundation of your digital transformation
    Making PKI the foundation of your digital transformation Simon Keates, Business Development Manager, EMEA. Sep 20 2018 11:00 am UTC 45 mins
    Chris Ogilvie interviews Simon Keates, Thales eSecurity Business Development Manager, EMEA on one of the hottest security topics in 2018.

    PKI offers organisations the flexibility to create security models, however defining, maintaining and securing PKI is a major risk to enterprises. Key theft, weak controls on keys, and impact on business agility as new applications are on-boarded without due care, are some of the challenges faced by enterprises.

    Join Chris and Simon for the first in our series of “coffee break” webcasts when they will discuss:
    a) The current PKI market, the growth in EMEA and the challenges facing organisations
    b) How enterprises are using PKI to enhance their security posture
    c) How Thales eSecurity is integrating with market leading PKI technology partners to offer a holistic solution for the enterprise
  • New Era of Data Protection for Hyper-V Environments
    New Era of Data Protection for Hyper-V Environments Seyi Verma, Director of Product Marketing, Druva Sep 20 2018 12:00 pm UTC 45 mins
    Please join us for this live interactive webinar, where we will discuss:
    - A cloud-native solution that helps organizations dramatically reduce complexity, while slashing costs by up to 60%
    - How to streamline data protection for Microsoft Hyper-V environments
    - How to ensure availability, workload mobility, recoverability, and long-term data archiving
    - Achieving centralized data management with a one unified pane of glass
  • HPE and Commvault backup: Portuguese Webinar
    HPE and Commvault backup: Portuguese Webinar Junior & Lucas Sep 20 2018 1:00 pm UTC 68 mins
    launched Nov 30, 2017 - is one of the HPE GreenLake solutions, which are a unique suite of on-premises, consumption-based solutions for customer’s top workloads—big data, backup, database platform, SAP HANA, and edge computing—delivered on demand.
  • Data Protection Solution for Azure Stack
    Data Protection Solution for Azure Stack Parissa Mohamadi - Product Manager - HPE Storage Sep 20 2018 3:00 pm UTC 75 mins
    As data volumes increase, you look for managing your backup footprints efficiently and cost-effectively within your data centers. There is a move to use public cloud services to take advantage of affordable and flexible data storage, but for many reasons, you may want to keep data on-site. HPE Cloud Bank Storage lowers long-term data retention costs by leveraging cloud-based or on-premises object storage. Come and learn how HPE data protection solutions can protect your data wherever it resides: from on-premises private cloud such as Microsoft Azure Stack to public cloud such as Microsoft Azure.
  • Driving Growth of Sustainable Safety Instrumented Systems
    Driving Growth of Sustainable Safety Instrumented Systems Muthuraman Ramasamy, Industry Director, Frost & Sullivan, Mr. Ian Ramsay-Connell TUV Functional Expert (FSM&SIS) Yokogawa Sep 20 2018 3:00 pm UTC 60 mins
    Title: Driving Growth of Sustainable Safety Instrumented Systems and Future Proofing Operational Safety

    Subtitle: Plant safety ensures compliance, revenue maximization, and operational cost reduction

    Sustainable Safety Instrumented Systems (SSIS) are a natural evolution of conventional SIS, which allow the key decision makers to optimize their plant’s safety performance without compromising productivity, revenue, and cost. Sustainable SIS incorporates a holistic assessment of operational safety to mitigate and manage risks throughout the lifetime of a plant. It equips all stakeholders to protect businesses from excessive hazard-related downtime. Future growth opportunities will ensure that safety systems in the plant do not become obsolete and help operations run smoothly.

    Frost & Sullivan's Industrial Practice expert, Muthuraman Ramasamy, invites you to join us for the webinar: Driving Growth of Sustainable Safety Instrumented Systems and Future Proofing Operational Safety. Hear about future growth opportunities, followed by a live question-and-answer session.

    Key Takeaways:

    Learn how SSIS can benefit your company
    Understand the challenges using conventional safety instrumented systems
    Identify the need for sustainable safety instrumented systems
    Create lasting value to ensure safety systems are manageable
  • Data Breach: How to Identify the Early Signs
    Data Breach: How to Identify the Early Signs Shiri Margel - Machine Learning Research Manager at Imperva Sep 20 2018 3:00 pm UTC 60 mins
    With the escalating threat landscape and the exponential growth of data and users, it’s no longer about whether you’ll get breached; it’s about when. The ideal situation would be to detect a data breach at an early stage. The reason why early breach detection is more practical is that often times bad actors are already inside the organization, abusing legitimate permissions to access sensitive data. To quickly detect a potential data breach, we need to be able to identify “early signs” of a breach.

    Join this webinar to learn more about:

    - The challenges of detecting data breaches
    - Why early breach detection is a more practical goal
    - Introducing the data breach kill chain
    - Protecting data in your databases – the importance of defense in depth
  • The Next Question: How to Backup Office 365
    The Next Question: How to Backup Office 365 Storage Switzerland, KeepItSafe, Veeam Sep 20 2018 5:00 pm UTC 60 mins
    The first Office 365 question is, do organizations need to protect their data stored there? The answer is yes, Office 365 data needs protection. Almost every industry expert recommends that organizations take Office 365 protection into their own hands and even Microsoft makes it clear that data is the organization’s responsibility. The problem is those industry experts and Microsoft don’t answer the next question of HOW to backup Office 365 data.

    Register now and learn not only why organizations should back it up but also how they should do it.

    In response to the need for Office 365 protection, vendors have flooded the market with solutions but protecting Office 365 is more than just a “checkbox”. Data in Office 365 has value to the organization, is subject to a variety of compliance regulations, and is the target of cyber-attacks.

    In our webinar Storage Switzerland, Veeam and KeepItSafe compare the various methods for protecting Office 365.
  • Data Breaches under GDPR - What you need to know
    Data Breaches under GDPR - What you need to know Marc French, Chief Trust Officer and Data Protection Officer, Mimecast Sep 20 2018 7:00 pm UTC 60 mins
    Whether you're just starting your compliance journey or feel your house is in order, there's still much to learn and understand about GDPR.

    In this video interview, Mimecast Chief Trust Officer and Data Protection Officer (DPO) Marc French explores issues related to data privacy and breach compliance and how requirements under GDPR impact processes and procedures for organizations across the globe.

    Topics explored include:

    * How aspects of GDPR including data breach notifications and the right to be forgotten actually work

    * The role of the Data Protection Officer under GDPR and their responsibilities

    * What your vendors can do to ease pressures related to organizational GDPR compliance
  • Career Conversations w/ Sandra Larson of Looking Glass
    Career Conversations w/ Sandra Larson of Looking Glass Jessica Gulick, MBA | PMP | CISSP Sep 20 2018 11:00 pm UTC 60 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guest: Sandra Larson, M.S. Applied Intelligence

    Hosted by Jessica Gulick, MBA | PMP | CISSP

    About the Speaker:

    Sandra Larson is a Senior Director of Intelligence for LookingGlass Cyber Solutions, a cybersecurity company specializing in physical, cyber, and brand risks for small business, global enterprises and government agencies. Sandra has been with LookingGlass for almost ten years, and manages the client relationships for LookingGlass’ clientele in the food and agribusiness, pharmaceutical, retail, and technology industries. Previously, Sandra received her Master of Science in Applied Intelligence from Mercyhurst University.
  • Symantec CASB - Cloud Access Security Broker (CASB) - CLOUD SECURITY
    Symantec CASB - Cloud Access Security Broker (CASB) - CLOUD SECURITY Martin Krömer, Regional Director CEEUR Cloud Security, Symantec (Deutschland) GmbH Sep 24 2018 12:00 pm UTC 75 mins
    Nutzen Sie Cloud-Anwendungen und -Services auf sichere Weise, während Ihr Unternehmen dabei sicher, geschützt und richtlinienkonform bleibt.
    Erhalten Sie Einblick in die Schatten-IT, Kontrolle über Ihre Daten in Cloud-Anwendungen sowie Schutz vor Bedrohungen, die auf Cloud-Benutzerkonten abzielen – mit der Lösung, die Forrester als "Leader" im Bereich Cloud Security Gateways bezeichnet.
  • Leveraging the Power of the Cloud to Protect VMware Data
    Leveraging the Power of the Cloud to Protect VMware Data Steven Hill Senior Research Analyst, 451 Research Sep 24 2018 2:00 pm UTC 60 mins
    Please join us for this interactive webinar with a special guest speaker Steven Hill, Senior Analyst at 451 Research, where we discuss:
    - Virtualization and cloud adoption trends, usage and business drivers
    Data protection and instant disaster recovery for VMware workloads on-premises and in the cloud
    - How a unified data protection solution can help decrease costs, by reducing both hardware and complexity
    - Other benefits of direct integration with vSphere & VMC (VMware Cloud on AWS)
  • Managed Defense – Schützt auch vor gut getarnten Hackeraktivitäten
    Managed Defense – Schützt auch vor gut getarnten Hackeraktivitäten Florian Siebert, Senior Systems Engineer, Global Services & Intelligence Sep 25 2018 8:00 am UTC 60 mins
    FireEye Managed Defense greift auf langjährige Erfahrung aus unseren Mandiant Incident Response Einsätzen zurück: wir nutzen die Daten und Erkenntnisse aus der Abwehr realer Angriffe, um Bedrohungen schneller zu erkennen und abzuwehren. Dadurch können wir Ihnen einen unternehmensweiten Überblick von Bedrohungen in Ihrem Netzwerk in Echtzeit geben und die Fähigkeit Ihres bestehendes CERT, Security Operation Center oder Sicherheitsteams ergänzen oder erweitern.
  • Neuer OneXafe: nächste Generation für konvergierten Speicher und Datensicherung
    Neuer OneXafe: nächste Generation für konvergierten Speicher und Datensicherung Ivonne Ehle, DACH Sales Engineer - SCME, Certified Trainer Sep 25 2018 9:00 am UTC 60 mins
    Das Wachstum virtualisierter Anwendungen, immer kleinere Backup-Fenster und ein explosionsartiges Datenwachstum haben die Anforderungen an die Datensicherheit und die Speicherinfrastruktur enorm belastet. Backup- und sekundäre Speicherinfrastrukturen kommen oft von mehreren Anbietern, was die Kosten erheblich steigert, betriebliche Ineffizienzen erhöht und zu Datensilos führt, wodurch die zentrale Verwaltung immer komplexer wird.

    Registrieren Sie sich für unseren Webcast und erfahren Sie, wie Sie mit der neuen konvergenten Datenplattform StorageCraft OneXafe Ihre Daten in heterogenen Umgebungen besser schützen und verwalten
  • How to create the self belief and self confidence to sell brilliantly
    How to create the self belief and self confidence to sell brilliantly Leigh Ashton Sep 25 2018 10:00 am UTC 30 mins
    Key Takeaways:

    This webinar is for you if you struggle with sales or specific sales activities and will open the door to understanding how you get in your own way of sales success...and how to develop a winning sales mindset that attracts success!

    Reasons to Attend:

    -Discover how your thoughts impact on your sales results
    -Learn how to identify your inner barriers...and how to eliminate them
    -Create your personal way of generating consistently great sales

    Many people feel uncomfortable selling. Part of it is to do with rejection – people saying “no” to you.

    Another part of it is to do with ethics – we don't want to be seen to be taking people's money!

    However, selling is not what it used to be.

    You can only succeed – in the long term - if you give value and help customers.
  • 7 cybersecurity improvements resulting from an EDR project
    7 cybersecurity improvements resulting from an EDR project Oleg Glebov, Senior Product Marketing Manager, Kaspersky Lab Sep 25 2018 2:00 pm UTC 75 mins
    EDR technology has been an unceasing topic of conversation over the past 3 or 4 years. Meanwhile, we at Kaspersky Lab have become aware, in our interactions with enterprise organizations, of serious levels of overall dissatisfaction with the outcomes of investment in EDR. Let's try now to understand the main reasons for this, while looking at typical use cases and key enterprise scenarios. The webinar will cover:
    •Drivers of EDR implementation
    •EDR vs Next Generation EPP vs Advanced EPP
    •Key benefits and advantages
    •Use cases of EDR functionality: Integrated Endpoint Protection, Augmentation of the Incident Response process, Automation of the anti-APT solution reaction phase
    •EDR project business justification