The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
NVMe is an industry standard protocol designed specifically for memory-based storage like flash drives. It unleashes flash arrays from the chains of SCSI that hold it back. Register for our live webinar and learn what NVMe and NVMe over Fabrics are, what the advantage of NVMe is over traditional SCSI protocols and how to go beyond the NVMe basics to fully tap into the potential of memory-based storage.
Surveys show that 64% of companies have storage arrays from 3 or more vendors. What does it mean to manage storage infrastructure with so many different products?
In a word, CHAOS!
That’s why a majority of people interested in software-defined storage (SDS) want to simplify management of their storage infrastructure.
Join us for this webinar where we will show how the Lenovo DX8200D Powered by DataCore can bring order to your environment. The DX8200D is the fast path to SDS and it:
• Abstracts away the underlying complexity of storage infrastructure
• Consolidates IT infrastructure and simplifies management through automation and self-adaptive technologies.
Ransomware is just one of the many threats that can impact your business data. With the use of cloud storage and virtualization expanding, and with a +500% in attacks and +600% in new variants, NOW is the time to ensure you have a proactive backup plan. Join Veeam and Quantum to learn how to set up a solid BCDR (business continuity and disaster recovery) and backup strategy to protect your virtual data against any ransomware and cyber security threat, including some lessons learned by our customers.
Data is the lifeblood of today's business. As the volume of generated data continues to grow, so does the number of data breaches. It's more critical than ever for organizations to adopt database audit and protection solutions. But not all solutions are created equal.
What are the key capabilities that IT and security teams should evaluate? Join Terry Ray as he discusses key considerations for selecting a database audit and protection solution.
About the Presenter:
Terry Ray is the Chief Technology Officer for Imperva, Inc., the leading provider of data security solutions. Terry works directly with Imperva’s largest customers to educate on industry best practices, challenges and regulations. He also, operates as an executive sponsor to strategic customers who benefit from a bridge between both company’s executive teams. During his 12 years at Imperva, he has deployed hundreds of data security solutions to meet the requirements of customers and regulators from every industry. Terry is a frequent speaker for RSA, ISSA, OWASP, ISACA, Gartner, IANS and other professional security and audit organizations in the Americas and abroad.
The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.
Join us to learn:
- What is GDPR
- Deep dive into relevant data security articles of the GDPR
- Review how different technology can address some of the GDPR data security requirements
In our live webinar, Storage Switzerland and Maxta will compare the pros and cons of the two hyperconverged deployment models. Those attending learn how to clarify their goals for hyperconvergence and how to decide which architecture is the best fit for their organizations.
Attendees will learn how each deployment model overcomes these challenge:
1. Ease of initial evaluation and testing
2. How to transition to hyperconvergence while having current servers
3. How to avoid hypervisor lock-in
4. How to build a future proof hyperconverged architecture
Big things are happening in software. Agile Software Development and DevOps are delivering innovations at a rate never seen before. Prompting many to ask 'Is this the end of ITIL?'.
There is a perception that DevOps and ITIL cannot play well together. That an you must choose one over the other or risk catastrophic failure. This is simply not true.
Many do not realize that DevOps relieson core concepts and processes of ITIL to be successful. Ignoring this relationship means missing out on service improvements that may be introduced and developed by integrating key areas of the ITIL framework and the collective body of knowlege that is DevOps.
In this webinar we will take a close look at the simple things organizations can do to get most out of a balanced blend of traditional and modern IT practices.
The first half of 2017 was the tipping point for cyber threats in Northern Europe. Organizations had to defend themselves against two cyber attacks involving rapid spreading malware. The latest incident severely disrupted global enterprises, causing significant downtime and impacting their revenue.
Such high-profile, large-scale attacks show us that no organisation is safe from the reach of cyber-criminality. Post-GDPR, responding to these attacks will become all the more critical as breaches will have to be reported to the relevant regulatory body. By understanding your current security posture - internal processes and technology – combined with the external threat landscape – organisations can prepare themselves should a breach occur.
In this webinar, you will learn how to assess your risk profile, evaluate your operational strengths and weaknesses as well as your tactical approach to responding to co-ordinated, targeted attacks.
9 months until the GDPR deadline - are you completely up-to-speed?
Our panel of data protection experts will be discussing the compliance considerations that you need to be assessing for May 2018 along with suggesting next steps from a cyber and general security standpoint.
We'll also be asking YOU at what stage you're at in terms of your preparations via a series of interactive benchmarks as we go through the session to get a sense of where the security community is at in terms of preparations.
GDPR and its May 2018 deadline are now fully the minds of the vast majority of security professionals and with massive fines on the horizon for non-compliance, now is a better time than ever to get to grips with the legislation and ensure that your organisation is secure and compliant.
It’s vital that your business has carried out the relevant preparations for compliance by then to make sure you don’t get whacked with a huge fine of up to £15m or 4% of your organisation’s global annual turnover.
Not only are there potentially huge financial repercussions, but leaving your business open to attack and your customers at risk can cause serious reputational damage.
With the advent of Big Data comes not only new ways to optimise business and marketing processes, but also new concerns over the control and privacy of personal data.
These have given rise to local and regional data protection laws and regulations such as the General Data Protection Regulation (GDPR), a modernisation of data protection laws in the European Union, and the Australian data breach notification law, an amendment to the Privacy Act 1988 (Cth) which introduces a mandatory scheme for eligible organisations and federal agencies to report data breaches.
Data breach notifications give individuals greater control over their personal data and promote transparency over information handling practices, fostering consumer trust in businesses. The law requires businesses to prepare and assess risks to maintain brand confidence even if an incident becomes the next data breach headline.
Join this webinar to learn about:
- New challenges introduced by the Australian mandatory data breach notification law
- Key steps in the journey towards data privacy compliance
- How to monitor insider threats
- How to leverage these regulations to gain trust and ensure great customer experiences
We look forward to your participation in this free webinar.
Join the journey towards being data-focused and customer-centric using Big Data and Data Warehouse technologies.
In this webcast, you will understand what it means to take the journey from a data-focused approach and get faster insight without infrastructure concerns.
Learn how to:
- Use Azure public cloud for big data
- Setup a SQL DW, a Hadoop cluster and ask questions against large data sets
- Utilize Microsoft's best in class big data and analytics solutions and how it can power your journey into adopting, analyzing and utilizing big data
As storage technologies continue to evolve in 2017, so do the challenges faced in integrating conventional storage along with new age scalable object storage. Caringo Product Manager Glen Olsen will show how contemporary storage solutions are enhancing traditional storage and protocols so they benefit from modern cost-efficient scalability and data protection.
Learn how to instantly clone and recover very large databases in the data center or in the cloud.
The digital economy is driving massive volumes of information into databases. Database Administrators (DBAs) are now struggling to balance operational needs such as performance and availability with the needs of their development teams who want more database copies and the current copies to be refreshed faster. These challenges also inhibit innovation and make it difficult for DBAs to consider new offerings such as self-service database provisioning, cloud integration and instant database recovery solutions. In this webinar learn how to instantly clone and recover very large databases in the data center or in the cloud.
Join Storage Switzerland and ClearSky Data for our live webinar, “How to Leverage Cloud Storage for Hybrid VMware”, on August 16th at 1 p.m. ET and 10 a.m. PT. In this webinar you will learn how to create a truly hybrid cloud storage infrastructure that improves performance, reduces on-premises storage requirements and better protects the organization from disaster.
From SD-WAN at branches and quick-serve restaurants to SD-Perimeter (SD-P) for the Internet of Things and remote employees, networks today need constant connectivity, mobility, cloud services and software-defined everything. The Elastic Edge of the network requires a secure, next-generation WAN that expands, contracts, and evolves at a moment’s notice.
Join Tyler Peterson and Matt Thueson of Cradlepoint for a live webinar on Aug. 16, 2017, to discuss use cases and success stories for SD-WAN, SD-P, and always-available LTE connectivity.
Attendees will learn about:
+ The characteristics of the Elastic Edge
+ Simpler, more efficient networking at the branch level
+ Virtual Cloud Networks and dark cloud security for IoT
+ Real-word SD-WAN and SD-P success stories
As a valued Tufin customer we invite you to learn how to begin the journey towards automation. We will discuss the challenges of automation and how you can take the first step towards automating firewall administration tasks.
In this webinar, you will learn how to gain immediate productivity benefits from the first phase of firewall change automation, such as;
•Discover and decommission unused and forgotten rules with a streamlined, automated process
•Understand the implications of server decommission and automate the process
•Realize the benefits of automating changes to object groups
Register now to save time and resources, reduce your workload, and quickly tighten your security posture with practical firewall automation.
Learn about a data exposure discovered from within the systems of Texas-based electrical engineering firm Power Quality Engineering (PQE), revealing the sensitive data of clients like Dell, the City of Austin, Oracle, and Texas Instruments, among others.
Left accessible to the wider internet via a port used for rsync server synchronization but configured to allow public access, the breach allowed any interested browser to download sensitive electrical infrastructure data compiled in reports by PQE inspectors examining customer facilities.
Dan O’Sullivan, the analyst who first broke the story, will go through the details of the discovery and the significant impact of this data exposure.
For the original article: https://www.upguard.com/breaches/data-leak-pqe
Enterprises are evolving their vSphere environments from standard DR configurations to high availability (HA) architectures. VMware vSphere Metro Storage Cluster is a key capability in this evolution. Parallel to this, companies are embracing hybrid cloud and AWS in particular. In many cases enterprises treat AWS as a passive DR site. But what if you could evolve AWS to be part of an HA stretch cluster? That’s where software-defined storage (SDS) comes in.
SDS solutions provide the flexibility to run on commodity servers as well as cloud computing instances. Couple that with advanced multi-site replication, per-VM storage policies, deduplication, snapshotting, cloning, and VMware’s recent announcement with AWS, and SDS is now the ideal enabler for automated failover in a hybrid cloud stretched cluster.
In this session we’ll:
- Provide an architecture for software-defined storage running a stretched cluster between a private vSphere cloud and AWS.
- Discuss how this provides seamless failover, HA, DR, and cloud bursting—all at scale.
- Highlight how data efficiency techniques like deduplication, thin provisioning, auto-tiering, and caching optimize hybrid cloud economics.
Chris is a VMware Certified Design Expert (VCDX) and senior solutions architect at Hedvig. Chris has in-depth experience in cloud, virtualization, storage, data center, and software-defined technologies gained from his work across numerous practices including web development, systems administration, and consulting. His advisory expertise helps customers better adopt and adapt to the technologies that best fit for their business requirements.
Many of the largest and most well known breaches are cases of third party information exposure.
One of the largest leaks of all time was discovered when an RNC vendor, Data Root Analytics, exposed 198 million voter records, including personal details, voter information, and predictively modeled attributes such as race and religion.
Outsourced information work is crucial for organizations to scale and remain competitive, but it should be done with careful forethought to the risks the company faces should that information be compromised.
In this webinar you will learn:
- Why cybersecurity is dead
- How to mitigate cyber risk in a cost effective way
- How vendor risk becomes your risk
- Steps to become cyber resilient
- How to measure success on your path towards cyber resilience
ITPG Secure Compliance's Cybercast series proudly presents : CMDSP - Mobile Security for the Mobile IT Administrator.
Come join us for a discussion on the advent of the Mobile IT Administrator position, and how CMDSP is helping organizations improve their enterprise mobility management strategy.
ITPG Secure Compliance has invited Mr. Ken Lloyd, CMDSP's Board members and CTO for Mi3 Security, a leader in Mobile Application Risk Intelligence and Mobile Threat Defense. With 18 years focused on creating powerful Mobile and Security solutions for Enterprises, SMB's and Consumers. Recognized as a Subject Matter Expert (SME) in Mobile Security, Security Awareness and IT Security.
Simplify & Accelerate Security Operations through integration and automation
Join us to hear how Security Orchestration from FireEye can:
UNIFY SECURITY TOOLS
Unify your security assets into a homogeneous platform and remove the operational silos that have bogged down security personnel for years. Improve operational efficiency and streamline processes with automation.
Save time and resources & Improve your overall ROI
ENHANCE SECURITY TEAM CAPABILITY
Give your team an edge on attackers with deployment, design, and pre-built playbooks from our team of experts.
Leverage our real-world, frontline Mandiant investigation experience & get access to class leading content, best practice playbooks and a global services breadth to assist clients anywhere in the world they need support.
INCREASE EFFICIENCY AND PERFORMANCE
Eliminate errors through standardised process and automation while reducing time demands on already stretched SOC teams.
Minimise error prone manual processes while maintaining response and process consistency &
Automate repeatable tasks enabling you to re-allocate staff to higher value tasks such as proactive hunting.
Towards the end of the session we will be delivering a LIVE demo of FireEye Security Orchestrator.
We discussed Human Factors in Cyber Security. The discourse surrounding human performance in cyber security remains a relevant topic; nevertheless, the scientific underpinning remains deficient. Human error is the primary contributing factor that leads to malicious activity in cyber security. Other domains such as aviation, healthcare, and nuclear power have capitalized on human factors to reduce accidents and to identify critical phases of operations; consequently, the cyber security sector trails behind the above-mentioned industries in leveraging human factors.
The aim of this presentation is leveraging organizational culture as a platform to address human factors in cyber security. The continuous integration of technology accompanied by (a) advanced persistent threats, (b) ransomware attacks, (c) data breaches, and (d) cyber-attacks increases and threatens the complexity of cyber security operations.
Included are examples of conceptual processes, models, and frameworks to influence cyber leaders and professionals to mandate the integration of human factors in cyber security.
Dr. Calvin Nobles, Ph.D. is a cyber security subject matter expert (SME), national security leader, researcher, practitioner, and educator with more than 20 years of experience. Culminating a career of military service at the national level in 2017, as a cyber security executive and cyber consultant. He is an adjunct faculty member at the University of Maryland University College and Indian Wesleyan University. Calvin is actively involved in the cyber community, volunteering with multiple professional associations and conducting cyber security research. Calvin is the author of the book, Exploring the Implications of Implementing Technologically Advanced Aircraft in General Aviation.
With today's digital demands, its more important than ever to deliver apps at lightning speed. Azure app hosting allows you to create powerful cloud applications for web and mobile on any platform, for any device.
Join Thomas Decant, Product Marketing Manager in the Cloud and Enterprise team at Microsoft, and Anirudh Singh Rautela, Cloud Application Development Specialist at Microsoft, in this two-part webinar. They will take us through the possibilities and benefits that Azure App Service provides your business and showcase how easy it can be to implement PaaS services.
Intelligent application technology allows you to build apps with powerful algorithms, across platforms, with just a few lines of code. The answer lies in your application's architecture.
Join Pradeep Menon, Microsoft Data Solution Architect, and Karthik Rajasekharan, Microsoft Azure Product Marketing Director to learn:
- The different reference architectures and how to integrate these services into your applications immediately.
- A hands-on approach to implementing Cognitive Services on Azure
- About the next generation of application development and deployment
Are you considering taking the CISSP exam? The CISSP is considered the industry-leading certification in cybersecurity, but the exam is certainly no cake walk. Strategies for CISSP Exam webinar dissects the structure of the CISSP exam. Hosted by (ISC)2 Approved training provider CyberVista, we will explain the 8 Domains that comprise the test while also providing valuable strategies for test day.
More data outside of the data center is staying on endpoints and in the cloud than ever before. That means the risks to that data are also at an all time high. Plus regulations encompassing end-user data are also increasing, challenging IT to manage data when they have less control than ever. IT needs more than an endpoint protection plan, it needs an end-user data strategy.
In this webinar, learn how to evolve from an endpoint data protection plan to a comprehensive end-user data strategy.
Join us to learn how MaxLinear relies on WANdisco to improve productivity with Subversion Multisite delivering results such as:
- A 24/7 continuous integration environment with zero Subversion downtime
- Improved administrative efficiencies with Access Control
- Elimination of the effects of network failures and the dependency on legacy backup procedures
- Overcoming the challenges with Subversion mirrors
About the Presenters:
Russ Hill, Account & Renewals Manager Americas at WANdisco. Russ Hill works with our existing SCM install base as an account manager and renewals specialist. He works closely with the WANdisco Professional Services team on all SCM service opportunities in North America and is currently responsible for all new SCM opportunities within the Americas.
Owen Ofiesh Software Configuration Manager at MaxLinear. Owen Ofiesh is the Software Configuration Manager for MaxLinear, a global chip design firm. With over 15 years experience in configuration management, he has a strong background in many of the most common SCM tools and platforms. Owen has worked with WANdisco Subversion MultiSite for over six years and has a great understanding of how it compares and contrasts with other SCM tools.
Welcome to the Cloud Generation – where critical data, applications and infrastructure are shifting to the cloud for increased operational efficiency.
Employees today are accessing everything from everywhere, sensitive data is constantly on the move, and critical workloads are running on a cloud server, somewhere in the world. How do you manage and contain the huge increase in vulnerabilities caused by moving beyond traditional IT controls?
In our upcoming ‘The Next Frontier for Cloud Security’ webinar, we discuss how to:
• Govern access to data, apps, and systems that may reside in the cloud
• Secure information no matter where it sits or goes
• Protect against advanced threats in this new environment
• Minimise risk and ensure compliance as workloads move to the cloud
Join our webinar and discover how Symantec’s Integrated Cyber Defense Platform protects your users, information, and workloads in the Cloud Generation.
Despite the rampant adoption of cloud computing, some companies are hesitant to move entirely to the public cloud. Instead, they rely on the higher degree of control of the SDN in the private cloud, or utilize a hybrid approach. While the private cloud offers more control and manageability, ensuring that applications are deployed successfully, securely, and within the parameters of compliance can pose challenges without proper visibility and the foresight for auditability.
Organizations that are using a SDN need to employ best practices at the start to ensure that they are successful in the future.
Please join members of Tufin cloud team for an informal product-agnostic discussion on how network security policy management (NSPM) solutions can ingrain best practices in deploying and managing applications in the SDN, ensure connectivity, and enforce security. Topics for discussion include how to:
•Build a zero-trust policy in the private cloud
•Ensure compliance across all access changes
•Design and deploy network segmentation efficiently
•Deploy business applications with access continuity
•Ingrain preparedness for audits
Over 90% of the world’s data has been generated in the last few years. Accompanying this rapid growth in data comes exponential risks, as witnessed by the spike in cyber attacks of which no organization seems immune. The financial rewards gained by the perpetuators of cyber attacks is blatant, and this is driving continued attacks on companies containing massive amounts of consumer data. For these companies securing data is only half the battle. The risks can be greater when data is transmitted externally, hence it is critical that organizations know where sensitive data is going, how it is being transmitted, and how it is being handled and stored.
On this webinar our panel of experts will discuss some of the best practices organizations can consider to reduce the risk of suffering from a data breach, and to proactively prepare for any subsequent breach that could happen.
Our buildings, our cars, our devices now talk. They tell us what ails them, when they need servicing. From bots to virtual agents, through the power of machine learning, they have their own nervous system.
Join this webcast with UEM Edgenta and Powerup Cloud to learn how to gain new insights from data and these devices. Leverage the power of machine learning to digitally transform the future of these technologies.
Yes, there might be an impending flash storage shortage. But your data center doesn’t have to be—shouldn’t be—all flash all the time. Strategic flash usage makes the most sense for enterprise data centers, whether there’s a shortage or not. In this webinar, we’ll walk through how to evaluate the best ways your storage systems can store and manage data throughout its lifecycle.
Fictional AI minds like SkyNet in The Terminator and WOPR smart machines in WarGames captured our imaginations in 1980s. Fast forward to the 21st century and now advanced machine learning (ML) and artificial intelligence (AI) have become a critical component of the cybersecurity landscape.
Machines learn complex patterns and understand subtle interactions from oceans of diverse security telemetry data yet cybersecurity is not the first industry to use ML or AI to accelerate innovation and change the way it works.
In our upcoming ‘Combatting Advanced Cybersecurity Threats with Artificial Intelligence and Machine Learning’ webinar, we discuss how:
•ML and AI is changing the cyber security industry and why it is important for the future of cybersecurity
•Big Data and Predictive Models equals Smarter Protection
•Symantec uses advanced machine learning – via endpoints and the cloud – to analyse file attributes, behaviors and relationships
With an increasing volume of conversation taking place around the concept of ‘organizational resilience’, business continuity management professionals are taking advantage of this to expand their own remit and improve their career opportunities. What does the future hold of business continuity management professionals? How does this impact new entrants to the industry? This webinar will discuss the outcome of a survey carried out by the BCI, in collaboration with PwC, as well as a breakout session held at the 2016 BCI World Conference.
We think differently. We innovate through software and challenge the IT status quo.
We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.
DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.
Join this webinar to meet DataCore, learn about what we do and how we can help your business.
In today's increasingly global work environment, more employees than ever before are making material decisions on behalf of the organization, and these decisions don't always adequately account for risks to the enterprise.
This webinar will provide an overview of how to define your organisation’s level of ‘risk appetite’, helping you to determine the most relevant approach for drafting your organization’s risk appetite statements, assess stakeholders’ preferred risk-taking posture and write impactful risk appetite statements.
As the digital transformation in IT continues to create the need for an Elastic EdgeSM, traditional tethers to the central office have all but vanished. Physical boundaries continue to decrease in importance, and organizations of all types require constant and dependable in-vehicle connectivity to keep up with changing business imperatives.
Dependable mobile connectivity keeps vehicles on the road longer, helps enterprises better manage their fleets, and allows businesses and organizations to better serve their customers. Forward thinking IT and fleet managers in nearly every industry are implementing in-vehicle networks at a fraction of the cost and with less complexity. By taking advantage of cloud-managed, software-defined solutions, IT teams are evolving enterprise networks to reach improved productivity, reduce costs, and create operational efficiencies.
Join Cradlepoint for a live webinar on Wednesday, September 6, 2017, at 9 am PT / 12 pm ET to learn how networks on the move are staying always connected and protected.
Four Best Practices to eliminate Security Analyst Alert Fatigue
Join us in this webinar to learn industry best practices to improve your security analyst’s effectiveness by eliminating Alert Fatigue.
By 2019, ISACA predicts a shortage of 2 million cyber security professionals. This scarcity of skilled labor and a security alert false positive rate of over 52% means that your security team is overstretched and overwhelmed.
Security Analysts are subjected to such a volume and frequency of alerts that
they become desensitized to the information they are meant to analyze, resulting in critical alerts being disregarded or missed.
When responding to tens of thousands of security alarms a month, how can you reliably distinguish what's important from what's just a noise in the background?
Join us in this webinar and learn how you can help your overwhelmed cyber response team to "SOAR" above the noise when responding to incidents. Mike Fowler will present proven best practices to reduce and avoid alert fatigue:
● What is “Alert/Alarm Fatigue” and why should you care?
● What is the impact of alert fatigue on Security Operations and Incident Response?
● How you can cultivate a state of continuous alertness by applying the SOC Analyst Sanity Saver
● How to reinforce the front line
● How to leverage automation capabilities to act as a Force Multiplier through Incident Automation and Orchestration
Our webinar presenter, Mike Fowler (CISSP, EnCE), is the Vice President of Professional Services at DFLabs and has over two decades of experience in incident response and forensic investigations.
In 2012 RBS suffered a major disruptive IT event impacting customers over a 17 day period. In response to this event RBS reassessed its Resilience Strategy. This session will take you through the banks resilience strategy and how we use it to manage our resilience risk exposure, what we rely upon to support our business and our customers and how we identify and manage the threats we face.
Every type of M&E organization is feeling the pressures of dealing with customers and viewers expecting “free storage” and “immediate access.” In this webinar, VP of Marketing Adrian Herrera and Caringo Sales Engineer Alex Oldfield will discuss the hardware, operational and workflow efficiencies that market-hardened object storage solutions like Caringo Swarm deliver to M&E organizations at every step in the production process. Learn how to transform storage from a cost center to a competitive advantage, reduce data center footprint, retain your customers and offer them new services.
When a crisis takes place many businesses are still using manual processes as part of their response plan. In order to mitigate the risks involved there are a few simple steps that you can take to automate the process end to end and improve your overall success.
This webinar will cover the following:
-Roles and responsibilities
-Incident assessment teams
-Action plan and status
Self-protecting storage IS the future. Imagine: leveraging a hybrid storage approach that eliminates secondary infrastructure, backups and DR, corresponding software licenses, management of all those disparate systems, and the endless data copying. But you need to be prepared. Join us as we discuss topics including network preparedness, managing expectations and understanding required resources.
Unexpected IT service disruptions cost business organizations over $80,000 per hour of downtime. Fast and agile response is critical to mitigate risks caused by IT outages. 80% of the organizations that fail to employ reliable disaster recovery solutions as part of an effective contingency planning strategy go into liquidation within 18 months of the disaster.
Join Bill Santos, President at HOSTING, and Wayne Shaw, Cloud Architect at HOSTING, as they cover the following:
- Application downtime culprits - why your company might consider DR
- HOSTING's DR approach - what services are available to prevent data loss
- A fail-over demo - how your data can be recovered in minutes in the event of a disaster, attack, or IT error
Join our “Web App Security” presentation, which provides the audience with a global perspective of the current state of web application vulnerabilities. Attendees will:
• gain a better understanding of how reconnaissance is used by attackers to discover and pinpoint systems to compromise,
• learn about attack methodologies and how vulnerable web apps can be leveraged for attackers to gain privileged access, and
• hear remediation strategies to help protect their web apps from being attacked.
Paul Fletcher has over 20 years of experience in information technology and security. Prior to joining Alert Logic, Fletcher advised executive level leadership in the energy, retail, and financial sectors regarding emerging security threats and mitigation strategies. Additionally, he has worked with Fortune 50 organizations, the Department of Defense, and critical infrastructure organizations to implement risk management plans and security solution designs. His other specialties include network security, customer data integrity, application security, forensics investigation, threat intelligence, and incident response. Fletcher holds a Master of Arts and Bachelor of Science degree and is a Certified Information Systems Security Professional (CISSP).
Disaster Recovery as a Service (DRaaS) solutions have vaulted to the top of the considerations list for organizations looking to improve their ability to recover from major disasters like hurricanes and floods. But DRaaS solutions are not just for recovery anymore. These solutions can help organizations protect from ransomware, modernize infrastructure, and recover from minor disasters as well. Of course the solution must also provide peace of mind that when disaster strikes, the plan will not only work -- it will also be easy to initiate.
General Data Protection Regulation (GDPR) is new legislation intended to strengthen and unify data protection for all individuals within the EU. The regulation affects companies worldwide as it impacts any companies who possess data from customers in the EU.
The new legislation comes down to management of personal data: consent, retention, security and protection. Learn the basics about GDPR, how it affects your company and best practices for data storage to successfully comply with GDPR as it becomes enforceable in 2018.
Recent investigations by FireEye’s Mandiant incident response consultants combined with FireEye iSIGHT Threat Intelligence analysis have given us a more complete picture of a suspected Iranian threat group, that we believe has been operating since at least 2013.
Join us in a live webinar as we discuss this threat group whom we asses to be involved in a long-term, resource intensive cyber espionage operation motivated by the prospect of collecting strategic intelligence, including information related to the aviation and energy industries, which would ultimately benefit a nation-state or military sponsor.
Register today to gain deeper insights into this threat group!