Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Leading and Building Threat Hunting Teams (Hunter Spotlight)
    Leading and Building Threat Hunting Teams (Hunter Spotlight) Alan Orlikoski, Security Engineer at Square Inc. Recorded: May 23 2017 33 mins
    Our Hunter Spotlight series kicks off with Alan Orlikoski. From his 16+ years of security experience, Alan will share:
    • Organizational strategies that work for both hunters and SOC managers
    • How to create and sustain effective hunting teams
    • Best practices and tools in the field

    About the hunter:
    Alan Orlikoski is a Security Engineer and Incident Responder with over 17 years of experience. He analyzes and tests existing incident response plans, conducts forensic investigations and provides incident response and forensics training. Alan has an extensive computer forensics background and has been a leader in some of the largest incident response and security operations center development programs in the history of the respective companies.
  • A Case Study on Improving SQL Server Performance 20x with Hyperconverged
    A Case Study on Improving SQL Server Performance 20x with Hyperconverged Sushant Rao, Senior Director of Product Marketing Recorded: May 23 2017 49 mins
    How does an organization that is looking to improve their MS SQL Server performance end up with hyperconverged infrastructure? Well, why would they? Hyperconverged is typically used for VDI and lightly loaded remote sites. But a mission-critical application like SQL Server? On Hyperconverged? Who would take that risk?
    In this webinar, hear from Emergency Communications of Southern Oregon (ECSO) that found that not only were they able to improve their SQL Server performance (by 20x!) with hyperconverged, they were also able to improve their availability and reduce costs to boot.
  • Making NFS and S3 Interoperable with Swarm Object Storage
    Making NFS and S3 Interoperable with Swarm Object Storage Glen Olsen, Product Manager Recorded: May 23 2017 53 mins
    While many storage vendors are touting multi-protocol access between file and object worlds, Caringo once again takes it to the next level extending multi-protocol access to metadata. Everything you can do with files in a file-based world you can do with objects through Swarm and SwarmNFS. Join this webinar to see a simple demonstration of the new go-to beyond the file system.
  • Tech Demo - Flexible hybrid cloud application security
    Tech Demo - Flexible hybrid cloud application security Ajay Uggirala – Director of Product Marketing Recorded: May 23 2017 34 mins
    Enterprises are adopting a hybrid infrastructure model to take advantage of rapid deployment of cloud-based services and higher computing power. This change in IT paradigm creates a need for CISO’s and their security teams to have solutions that protect applications wherever they reside as they move between on-premises and the cloud. Imperva offers a flexible, hybrid model to deliver DDoS and application protection augmented by crowd-sourced and curated threat intelligence. This session will show the flexibility of Imperva Application Security that will allow you to secure applications as they move to the cloud while future proofing application security investments.
  • Strategies for Effective 3rd Party Risk Management
    Strategies for Effective 3rd Party Risk Management Scott Roller, Founder of 3WP; Rebecca Herold, Privacy Professor; Sam Kassoumeh, SecurityScorecard. James Christiansen, Optiv. Recorded: May 23 2017 63 mins
    The challenges that organizations face today are increasingly more complex than in the past. The constant change of the global economy, dynamics of business risks and opportunities, and an increased threat of cyber-attacks add complexities we’ve never faced. As organizations rely on more and more third parties to grow and thrive, they’re exposed to higher levels of risk, and regulators are focused on the need for organizations to manage 3rd party risk more effectively.

    Manual processes, silos in contract administration, and technology and resource constraints can all lead to significant errors in the third party supply chain that leads to violation of privacy guidelines and security breaches, which cause substantial fines, penalties, and damage to brand value. On this webinar our panel of experts will discuss the risks and repercussions associated with third party contract management shortcomings, common gaps in third party contract management processes, examples of how new solutions and technologies can help organizations optimize their third party processes, and effective strategies for managing 3rd Party Risk.
  • 2017 Internet Security Threat Report (ISTR): A Review of the Threat Landscape
    2017 Internet Security Threat Report (ISTR): A Review of the Threat Landscape Peter Sparkes, Senior Director, Cyber Security Services, Symantec Recorded: May 23 2017 54 mins
    2016 was a year marked by extraordinary attacks, with cyber attackers conducting multi-million dollar virtual bank heists, attempting to disrupt electoral process, and organising some of the biggest distributed denial of service (DDoS) attacks on record, powered by a botnet of IoT devices.

    Join our Senior Director of Cyber Security Services for Asia Pacific and Japan, Mr Peter Sparkes, in this webinar for an in-depth analysis on the latest cyber threats trends, and find out why:

    • Targeted attacks aimed at politically motivated sabotage and subversion has increased at alarming rates
    • One in 131 emails contained a malicious link or attachment – highest rate in five years
    • Ransomware infections increased by 36 percent, with size of ransoms spiking 266 percent
    • CIOs have lost track of how many cloud apps are used inside their companies – When asked most will say up to 40 when in reality the number nears 1,000

    Be the first to gain insight into the latest cyber threat trends in the Asia Pacific region, and learn about best practices and steps you can take to improve your security posture in 2017.

    Register for the Symantec 2017 Internet Security Threat Report Webinar today.
  • How a Cloud Business Continuity Strategy Can Save Your Business
    How a Cloud Business Continuity Strategy Can Save Your Business Bernard Golden, CEO, Navica and Matt Tyrer, Manager, Solutions Marketing - Americas Commvault Recorded: May 22 2017 42 mins
    Organisations are transitioning more of their data and infrastructure into the cloud. Worldwide, the public cloud market is expected to grow 17.2% this year, topping $208.6 billion, according to recent research.



    While many IT organisations may just assume that their service providers have backup, recovery and business continuity plans taken care of, that isn’t always the case. Couple that with recent poll results that found 36 percent of IT execs said the loss of data in the cloud would be worse than their data centre crashing and the 14 percent who said such a crash would cost them their jobs and it’s clear that there’s work to be done.



    Hear more about why you can’t cede control of your backup and business continuity plans to your cloud provider -- and why doing so could put your data at risk. In this webinar you will also learn:



    · What cloud providers are actually responsible for in terms of backup and recovery

    · How an SLA doesn’t always mean you are protected

    · Why your overall business continuity strategy must embrace the cloud

    · Where the most common issues happen and how to prevent them

    · How to create end-to-end resiliency that supports your employees, partners and customers
  • Cyber attacks – how to identify the real scale of the problem
    Cyber attacks – how to identify the real scale of the problem Jon Mitchell (ClearView Continuity) Recorded: May 19 2017 33 mins
    This session will focus on how this can be handled in a practical way by software, covering:

    a) Understanding the organizational impact and dependencies.
    b) Decision making based on the availability of accurate information.
    c) Assisting ‘recovery’ through effective incident management.
  • 15 Minute Ransomware Survival Guide
    15 Minute Ransomware Survival Guide Storage Switzerland, Commvault Recorded: May 19 2017 51 mins
    Ransomware is a new threat, and new threats require new strategies. Within the first 15 minutes this webinar will provide you key strategies for surviving a ransomware attack. During the event Storage Switzerland and Commvault will cover the three P's of Ransomware survival: Prevention, Preparation and Practice. Join data protection experts with decades of experience protecting organization's digital assets.
  • Ransomware, Social Engineering and Human Error: What Could Go Wrong?
    Ransomware, Social Engineering and Human Error: What Could Go Wrong? Kevin Beaver, Security Consultant at Principle Logic, LLC and Matt Tyrer, Manager, Solutions Marketing at Commvault Recorded: May 19 2017 48 mins
    The most profitable type of malware attack is ransomware, with one security firm explaining that ransomware attacks are up an unbelievable 550 percent this year skyrocketing from 131,000 in 2014-2015 to 718,000 in 2015 and 2016. What does this mean? If you're not backing up your data and planning for the worst you're putting your company at risk -- and ensuring that you'll have to pay a ransom if and when you are attacked.


    In this webinar we will discuss the very real risks that are out there and how backup -- specifically to the cloud -- can help you tell hackers to take a hike.
  • Privacy law, a catalyst for cyber resilience
    Privacy law, a catalyst for cyber resilience Padma Naidoo and Philippa Chappell (ContinuitySA) Recorded: May 19 2017 52 mins
    Privacy laws regulate the collection, storage and use of data by organisations in many countries globally. Following the proclamation of the Protection of Personal Information Act (POPI) Act into law in 2014, so too will these laws become applicable to South African organisations.
    In this digital age, technology plays a pivotal role in shaping the way in which business is done. The objective of this topic is to explore the Cyber Security and Resilience requirements placed on organisations by privacy regulations, and the impact of Cyber Security and Resilience on Business Continuity.
    This webinar will touch on the reliance placed on effective Information Security and Cyber Security solutions to ensure compliance, and explore how a breach or failure of Information Security Controls needs to be managed.
  • Cómo incorporar las nuevas tecnologías en su estrategia de nube híbrida
    Cómo incorporar las nuevas tecnologías en su estrategia de nube híbrida Cesar Funes Principal System Engineer Enterprise – EMEA South Recorded: May 19 2017 46 mins
    Como ya sabe Commvault le ayuda a abordar su estrategia de nube híbrida a través de una plataforma de gestión de datos que es "cloud agnóstica". Para lograr esto, Commvault se asocia con los líderes en tecnología de nube híbrida como Microsoft, Amazon u Openstack, proporcionándole la seguridad de poder hacer frente a su viaje al Datacenter 3.0 con el control total de sus activos de datos, sin importar dónde se produzcan o consuman.

    En un entorno de TI en constante cambio, nuevos y poderosos jugadores están entrando en la lista de socios tecnológicos a considerar. Es el caso de Oracle y Google, que ofrecen cada vez más aplicaciones y servicios en la nube, y Docker, el estándar en contenedor de aplicaciones.

    En este webinar, revisaremos cómo Commvault incorpora estas tecnologías disruptivas a nuestra estrategia de gestión de datos "cloud-agnostic". La replicación de datos, la transformación de formatos de VM o la protección de datos móviles en estos entornos, todo ello en conformidad con la regulación GDPR de la UE, le da la libertad de decidir cuáles son sus proveedores presentes y futuros, para que usted (y no su software de protección de datos) decida su estrategia en la nube híbrida.
  • Tendances et chiffres sur les fuites d’information et les attaques Cyber en EMEA
    Tendances et chiffres sur les fuites d’information et les attaques Cyber en EMEA David Grout, Director, Southern Europe Systems Engineering, FireEye Recorded: May 19 2017 48 mins
    Rejoignez-nous pour un webinaire en live avec David Grout, Directeur Technique Europe du Sud, qui explorera les tendances qui définissent le paysage actuel des menaces en se basant sur les investigations des équipes Mandiant en 2016.
     
    Inscrivez-vous aujourd’hui pour découvrir :
     
    •Les nouvelles tendances d’hameçonnage
    •Les changements en termes de volume et de méthodologie
    •Les apports de la cyber veille et de l’intelligence sur les attaques émergentes
    •Les approches défensives pour mieux se protéger
    •Comment la GDPR impacte les sociétés en EMEA
    •Comment l’Europe se situe par rapport à l’Amérique du Nord et à l’Asie
     
    Inscrivez-vous!
  • Managing stakeholder communication during a cyber crisis
    Managing stakeholder communication during a cyber crisis Caroline Sapriel (CS&A International) Recorded: May 19 2017 62 mins
    Cyber crime has been around for as long as we’ve been connected to the Internet, but in recent times, the criminals behind it are excelling in their creativity and ingenuity with consequences that are more damaging than ever before. Furthermore, the organisations that invest in cyber crime preparedness seem to forever be one step behind as they only get to guess what might be coming.

    The price tags of these data thefts, DDoS attacks, ransoms to unblock operating systems, etc. are going through the roof. Therefore, when faced with a cyber crisis, it is critical to demonstrate strong leadership and communicate effectively with all stakeholders to avoid spiralling down to a reputation meltdown.
  • Ransomware Data Protection Strategy for Healthcare Organizations
    Ransomware Data Protection Strategy for Healthcare Organizations Natalie Eicher, Cliff Kittle, Jim Shook, and Scott Bedke Recorded: May 18 2017 65 mins
    Attend this webcast to learn more about how to better equip your healthcare organization in the fight against Ransomware and Cybersecurity threats. Some of the discussion points will include: The Current Cybersecurity Threat to Healthcare and Dell Technologies' Unique Approach to Security Transformation, Isolated Recovery Strategy.
  • 5 Ways Backup Kills Ransomware Threats
    5 Ways Backup Kills Ransomware Threats Mark Jordan, Vice President of Technology Unitrends Recorded: May 18 2017 51 mins
    Backup vendors know if ALL your data is not protected, there is a good chance ransomware will hit you and you will most likely lose data. But, what should scare you more is less than half of ransomware victims fully recover their data, even with backup. What can you do to make sure you are not on the wrong side of a statistic?

    Join our webinar to learn how to remove fear by assuring recovery. We'll cover:

    - The trends in Ransomware
    - 5 steps to protecting your data
    - How Unitrends ensures instant recovery from an attack

    About the presenter:

    Mark Jordan is VP of Technology at Unitrends and is responsible for building Unitrends’ advocacy program. Mark joined Unitrends in 2002 and has spent over 25 years in the information technology industry. At Unitrends, Mark has been manager of Unitrends presales, director of support services and was product manager of the first generation Unitrends data protection appliance. Follow Mark on Twitter @MarkCJordan.
  • Dark Web AI is bringing Dark Web Intelligence to your desktop
    Dark Web AI is bringing Dark Web Intelligence to your desktop Ross Everett and Larry Lafferty Recorded: May 18 2017 60 mins
    Come join a discussion with two industry leaders in the converging worlds of Dark Web Scanning and Artificial Intelligence. Learn how Intelligent agents can work from your desktop to scan the dark web for your stolen data.
  • Data Encryption for the Cloud-First Era
    Data Encryption for the Cloud-First Era Doug Cahill, Senior Analyst, at Enterprise Strategy Group, Inc. Recorded: May 18 2017 58 mins
    The broad adoption of cloud applications has resulted in more and more data assets leaving the corporate perimeter and being stored in the cloud. However, many organizations need to retool their cybersecurity processes, skills, and technology to be ready for the Cloud First Era. This webinar will explore how bring your own key (BYOK) and Key Management as a Service (KMaaS) offers flexible enterprise-class data encryption capabilities to secure cloud-resident data and meet and maintain compliance with industry regulations.

    About the presenter:

    Doug Cahill is a senior analyst covering cybersecurity at Enterprise Strategy Group drawing upon more than 25 years of industry experience across a broad range of cloud, host, and network-based products and markets.

    Prior to joining ESG, Doug held executive leadership positions at security firms Threat Stack and Bit9 where he launched market leading products and forged strategic partnerships. Over the course of his career, Doug has also served in product management, marketing, and business development roles for cybersecurity, storage management, networking, and database vendors, and started his career in IT as a business analyst. 
  • Five steps to data protection success
    Five steps to data protection success Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Recorded: May 18 2017 50 mins
    Feeling tethered to storage vendors whose boxes just can’t cut it? Innovation in hybrid cloud, primary storage, backup, and disaster recovery means enterprises should be able to free themselves – and transform how they consume storage and access data.

    Join this live, interactive webinar to discuss:
    - Ways to break the chains of traditional storage – and gain better performance and scalability – while minimizing on-prem investments
    - What Partners Healthcare and other enterprises do to better manage costly, complex data, while taking advantage of hybrid cloud to extend their infrastructure
    - The death of the traditional data center – and why it’s an opportunity for enterprises
    - How to get on-demand primary storage with offsite backup and DR as a single service.
  • Optimizing Flash Storage for SQL Databases
    Optimizing Flash Storage for SQL Databases Storage Switzerland, Tegile Recorded: May 18 2017 58 mins
    Is your flash system up to the challenge? Attend this webinar and learn how you can optimize your SQL Server performance. Hear how the pros pinpoint performance bottlenecks and leverage the latest advancements in storage technology to decrease access latency and IO wait times. By the end of the webinar you’ll have the tools and information you need to recommend the best approach for your SQL Server environment.
  • Real-time Threat Hunting - 451 Research Trends & Security Analytics
    Real-time Threat Hunting - 451 Research Trends & Security Analytics Jason Stamper, Analyst, 451 Research and Eric Tran-le, CMO, Logtrust Recorded: May 18 2017 58 mins
    Every day, organizations are impacted by cyber-attacks. Misleading indicators, complex security incidents, and evolving intruder patterns require new threat intelligence and analytics. With millions of data to analyze, every second counts - augment your security tools with real-time threat hunting capabilities and new research insights.

    Join experts Jason Stamper, Analyst for 451 Research, and Eric Tran-le, CMO for Logtrust, as they affirm how essential real-time threat hunting is for cybersecurity teams, and share new insights and tools for combatting attacks.

    • Learn new trends in machine data analytics from 451 Research
    • Pinpoint cybersecurity attacks and unusual behavior
    • Visualize an attack graph
    • Detect intruder paths and potential vulnerabilities
    • Leverage a single source of truth
  • Been hacked by cyber terrorists? What’s your Plan B?
    Been hacked by cyber terrorists? What’s your Plan B? Braam Pretorius (ContinuitySA) Recorded: May 18 2017 28 mins
    In today’s global village everyone is connected. The internet has brought billions of people together, allowing sharing of data, communication and commerce at a scale never imagined before. The value of the internet is clear for everyone to see. Unfortunately, the same internet also allows for cyber hackers and attackers to fight a new war, Cyber terrorism, theft of data and extortion. The attackers hide in plain sight. Working from homes or offices. Sometimes alone, often in syndicates. Even state sponsored cyber terrorism is on the increase.

    Large cyber security companies such as firewall providers and anti-virus vendors are spending millions of US dollars in a constant battle to stay ahead of the cyber threat. Unfortunately, these measures are not always successful in preventing cyber-attacks from occurring as can be seen from recent attack against Primera Blue Cross.

    The company, a health insurer based in Washington State, said up to 11 million customers could have been affected by a cyber attack last year. Hackers gained access to its computers on 5 May 2016 and the breach was not discovered until 29 Jan 2017. The breach probably exposed members' names, dates of birth, Social Security numbers, mailing and email addresses, phone numbers and bank account information. The company is currently working with the FBI and a cyber security firm to investigate.

    So, given that no matter what you do to protect yourself against the cyber threat, you will probably be attacked or have already been attacked. You therefore need a plan B to allow your business to continue with crucial day-to-day activities after the event.
  • GDPR & The Rise of Email-Based Cybercrime
    GDPR & The Rise of Email-Based Cybercrime Achmad Chadran, Mimecast Archiving Specialist & Enza Iannopollo, Forrester Research Analyst Recorded: May 18 2017 53 mins
    Implementation of the EU General Data Protection Regulation Act (GDPR) is fast approaching. The GDPR’s tough privacy rules and financial penalties are big enough challenges for organizations like yours. But rising email-borne threats like ransomware make compliance even more difficult.
     
    This webinar explores:
    - Steps to minimize GDPR risk even in the face of spiraling email-borne attacks
    - How the GDPR’s Data Breach Notification requirement changes everything
    - Why it’s vital to secure a budget for GDPR compliance and third-party assessment

    About the presenters:

    Achmad Chadran, Mimecast Archiving Specialist:

    Achmad Chadran is an archiving product marketing manager at Mimecast. Prior to joining Mimecast, Achmad held marketing and product management positions at the Intronis MSP Solutions arm of Barracuda Networks, Dell’s Large Enterprise Business Unit, and Siemens. He has a bachelor’s degree from the University of Virginia and a master’s degree from Ohio University.

    Enza Iannopollo, Forrester Research Analyst

    Enza is an analyst on the Security & Risk team and a Certified Information Privacy Professional (CIPP/E). Her research focuses on the impact of internet regulations and data privacy issues on digital business models, as well as the technologies that underpin them. Her research coverage includes data protection, privacy in the context of cloud computing, analytics, and the internet of things. Enza also helps Security & Risk Professionals build and execute data and privacy protection strategies in line with the requirements of the business technology (BT) agenda.
  • Balancing resiliency, risk and regulations with consumer choice and convenience
    Balancing resiliency, risk and regulations with consumer choice and convenience Karin Beaty (IBM) Recorded: May 18 2017 46 mins
    Cyber threats. Compliance. Ease of use. These are among the growing challenges to resiliency for all organizations, but they often are at odds with another. Clients and their customers are driving a need for ease of use, customization and empowerment, which can result in a more complex, at-risk infrastructure. How can organizations manage risk and compliance - maintaining expected transparency, accountability and interconnectedness amongst all of this complexity?

    Join our discussion on the impacts of increased regulatory supervision and the effects of standards, using industry examples - and learn key strategies you can use today to manage resiliency across all levels of the enterprise to protect your business in the age of digitization and IT modernization.
  • APT32: New Cyber Espionage Group
    APT32: New Cyber Espionage Group Nick Carr, Sr. Manager Incident Response, Mandiant, a FireEye Company May 24 2017 3:00 pm UTC 60 mins
    Learn more about APT32 (OceanLotus Group), a Southeast Asian cyber espionage group threatening multi-national companies operating in Vietnam. After long-term monitoring and response of their activities, FireEye has given this threat actor the newest APT designation.

    Join Nick Carr, Sr. Manager of Incident Response, as he shares how Mandiant, iSIGHT Intelligence and FireEye as a Service teams reveal:

    • Who is part of APT32, where they are based, whom they target and how they operate
    • Advice on how to defend against, hunt for and respond to APT32
    • How your organization can improve your ability to detect, prevent and remediate APT32 attacks
  • Building Next-Generation WANs to Support People, Places & Things
    Building Next-Generation WANs to Support People, Places & Things Lee Doyle of Doyle Research and Todd Krautkremer of Cradlepoint May 24 2017 4:00 pm UTC 60 mins
    Digital transformation is driving the increased deployment of cloud-based applications, a mobile workforce, and IoT. A new WAN architecture is required to support this digital transformation and deliver reliable, secure connectivity to people, places, and things.

    In a live webinar on May 24, 2017, Lee Doyle of Doyle Research and Todd Krautkremer of Cradlepoint will discuss the technologies enabling the next-generation WAN, including SD-WAN, Software-Defined Perimeter (SD-P), and LTE.
  • Conducive Environments for Successful Threat Hunting (Hunter Spotlight)
    Conducive Environments for Successful Threat Hunting (Hunter Spotlight) Jason Smith, Security Operations Investigator Manager at Cisco May 24 2017 6:00 pm UTC 30 mins
    Veteran threat hunter Jason Smith will detail:
    • How to structure your Security Operations Center (SOC) and network to help uncover hidden threats
    • Best practices to make hunting data accessible and fluid
    • Essential tools and tips from Jason's hunting experiences

    About the hunter:
    Jason Smith has a background in physics and has built everything from particle
    accelerators to explosive neutralizing robots used by the military. He has worked in multiple US Department of Defense SOCs and has worked with the largest security vendors to operationalize security in the world's largest
    organizations. Jason co-wrote Applied Network Security Monitoring and maintains the open source project FlowBAT, a graphical flow data analysis tool. Jason currently works remotely for Cisco from his home in Nashville, TN.
  • Tick, Tock: Just 1 Year to GDPR Enforcement – How to be technology ready
    Tick, Tock: Just 1 Year to GDPR Enforcement – How to be technology ready Derek Brink, VP, Research Fellow, Information Technology May 25 2017 3:00 pm UTC 60 mins
    Just one year remains before enforcement of the EU General Data Protection Regulation (GDPR) goes into effect. It’s arguably the most important privacy regulation in a generation. But it’s time to move beyond mere awareness and understanding of what GDPR is, and start making decisions about how you’re going to address it.

    In this webinar, join Derek Brink, vice president and research fellow for Aberdeen Group, and Neil Cooper, Regional Sales Manager, UK&I, for Thales eSecurity, as they share the following helpful insights:

    • Short synopsis of the timeline and key provisions of GDPR
    • Quantify the business risk of GDPR, in terms of both the likelihood and the business impact of non-compliance
    • Summarise the six fundamental strategies for safeguarding sensitive data
    • Identify the three most important capabilities for addressing GDPR requirements
  • Ever dream of eliminating your backup licenses?
    Ever dream of eliminating your backup licenses? Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance May 25 2017 5:00 pm UTC 60 mins
    Have you been thinking that managing your storage footprint has gotten a little…out of control?
    Maybe you’re running as fast as you can to keep up with the growth of costly, complex data, backing it up and planning for any potential outage, but your traditional data center just can’t get you where you need to go.

    That problem and its solution are the ideas behind our 45-minute, live, interactive webinar.
  • Let the countdown begin: What does the GDPR mean for US companies?
    Let the countdown begin: What does the GDPR mean for US companies? Stephen Bailey, Head of Privacy at NCC Group, Terry Blake, SureCloud EVP – North America, and Nick Rafferty, SureCloud COO. May 25 2017 5:00 pm UTC 60 mins
    Exactly one year from the date of this webinar, the General Data Protection Regulation will take effect in the European Union. The GDPR applies to any organization that stores, processes or transfers the personal data of residents within the EU. It includes organizations located in and outside the EU. Non-compliance can result in fines of more than $20 million or 4% of worldwide revenues, whichever is greater. A recent survey found an alarming percentage of US-based companies are planning to reduce their presence in Europe or exit the European Union altogether rather than deal with the GDPR. Instead of tossing up their hands over the GDPR and going home, strategic US companies can follow the defined steps and adopt software solutions that can bring certainty to these uncertain times. In fact, they see another company’s exit from the EU as a potential opportunity to gain share. The good news is that you’re not too late in getting started to meet the GDPR deadline. But as the countdown begins, urgency escalates. The time to act is now.

    In this webinar, you will learn:
    What the GDPR means for you
    How to get started on your journey to compliance
    How the SureCloud GDPR Applications Suite can help you gain and demonstrate compliance and continuously improve your performance

    Agenda includes plenty of time to address your questions.
  • Recovering your data from a Ransomware Attack
    Recovering your data from a Ransomware Attack Sushant Rao, Senior Director, Product Marketing May 25 2017 6:00 pm UTC 45 mins
    When you are hit by a ransomware attack, such as the recent WannaCrypt worm, you don’t have many options. You can pay the ransom, in the hopes that your data will be unencrypted. Or, you can wipe your systems clean, and then recover the data. But, backups are typically done on a daily basis. Depending on when the attack hit, the amount of data that you will lose could be in the hours. Fortunately, there is a better option.

    Continuous Data Protection (CDP) captures every write operation from an application and store it in a second location. This means that you can go back to the last data that was written before the ransomware attacked occurred. This ensure that data loss, if any, is minimal. Join this webinar to learn more about CDP and why it’s your safety net when ransomware hits.
  • Hunting From Network to Endpoint (Hunter Spotlight)
    Hunting From Network to Endpoint (Hunter Spotlight) Ryan Nolette, Hunter and security technologist at Sqrrl May 25 2017 6:00 pm UTC 30 mins
    Ryan Nolette, Sqrrl's hunter and security technologist, will break down:
    • Determining what endpoints to investigate in a hunt
    • Pivoting from network to endpoint investigations
    • Essential tools and best practices for endpoint hunting

    About the hunter:
    Ryan is Sqrrl's primary security technologist and expert. He has previously held a variety of roles including threat research, incident response consulting, and every level of security operations. With over a decade in the infosec field, Ryan has been on the product and operations side of companies such as Carbon Black, Crossbeam Systems, SecureWorks and Fidelity. Ryan has been an active speaker and writer on threat hunting and endpoint security.
  • Tech Demo - Pseudonymization and Data Masking for the GDPR
    Tech Demo - Pseudonymization and Data Masking for the GDPR Cheryl Tang - Director of Product Marketing, and Steve Pomroy - Chief Technologist, Camouflage May 25 2017 6:00 pm UTC 45 mins
    This is the second in a series of product demos focused on addressing specific requirements of the General Data Protection Regulation (GDPR). In this webinar, we’ll look at how to use Imperva Camouflage Data Masking that can address pseudeomnymization requirements of the GDPR.

    We’ll provide an overview of:

    o What the General Data Protection Regulation (GDPR) is
    o What is pseudonymization and the benefits of pseudonymizing data
    o How data masking can help organizations comply with GDPR by pseudonymizing data classification capabilities

    Hope you can join us!
  • SEP 14 Webinar Series: Easy Ways to Improve Your Security Posture
    SEP 14 Webinar Series: Easy Ways to Improve Your Security Posture Kirk Gibbons, System Engineer, Symantec May 30 2017 5:00 am UTC 30 mins
    Effective communication between the network and the endpoint is critical to quickly identifying advanced threats and preventing the spread of infection. The more automated the process the less damage an attack can do.

    Join use to learn what tight integration between Symantec Endpoint Protection and Secure Web Gateway looks like. You will discover:

    •Why tighter integration between the network and endpoint improves security posture
    •How new REST APIs help orchestrate a rapid response at the endpoint
    •What the future plans are for new APIs, integrations, and global threat intelligence

    Lastly, watch a demo that showcases how easy it is to integrate Symantec Endpoint Protection and Secure Web Gateway and what orchestrated response looks like.

    We look forward to welcoming you in our webinar.

    Register today!
  • Attacchi cyber in EMEA: i nuovi trend
    Attacchi cyber in EMEA: i nuovi trend Gabriele Zanoni, Systems Engineer di FireEye May 30 2017 9:30 am UTC 45 mins
    Partecipa al webinar con Gabriele Zanoni, Systems Engineer di FireEye, per scoprire come si sta evolvendo il panorama delle minacce sulla base dei dati sui cyber attacchi dello scorso anno, rilevati dalle investigazioni di Mandiant.

    Il webinar affronterà temi quali:

    •I nuovi trend negli attacchi di phishing usati per compromettere le aziende
    •I cambiamenti nella telemetria e nella metodologia degli attacchi
    •Le analisi di intelligence sulle minacce emergenti
    •Le nuove strategie di difesa per proteggere al meglio le aziende
    •L’impatto del GDPR sul business
    •Confronto fra trend europei, americani e asiatici
  • Advanced Security & Cloud Capabilities: The Evolution of Data Center Management
    Advanced Security & Cloud Capabilities: The Evolution of Data Center Management Alex Shteynberg, Mike Korgan & Jon Huber Jun 1 2017 8:00 pm UTC 60 mins
    What could you do with a new evolution of data center management, advanced security and minimal overhead?

    Microsoft’s Operations Management Suite (OMS) represents the evolution of data center management, with cloud-inspired capabilities for log analytics, automation, disaster recovery, and security. With OMS, you can now deliver advanced security and management capabilities without a significant amount of overhead and without needing lengthy technical or security training.

    During this webcast, we'll demonstrate how this can work effectively for government agencies. You don’t need to be a security expert to leverage these capabilities. In fact, you can be up and running in a couple of hours.

    Join this webcast to:

    - Learn about Microsoft’s approach to holistic security and how our capabilities apply specifically to government agencies
    - View a demo and see how this applies to your own environment
    - Find out how to quickly configure your environment and test it out
  • BCI Salary Benchmarking Report
    BCI Salary Benchmarking Report Patrick Alcantara DBCI (The BCI) Jun 5 2017 1:00 pm UTC 60 mins
    How much is my work worth? Am I getting paid enough? These are questions professionals often struggle with. The answers to the questions are nonetheless important as it determines job satisfaction and future career prospects. While there are salary reports available for many industries, there is a gap in data in the business continuity and resilience fields. The Business Continuity Institute has responded to this by conducting a comprehensive salary survey of business continuity and resilience roles, linking it with other factors such as educational attainment, work/supervisory experience and gender. Join Patrick Alcantara DBCI (BCI Research & Insight Lead) as he shares the results of the recently concluded BCI Salary Benchmarking Survey.
  • Between a ROC and a Hard Place with PCI?
    Between a ROC and a Hard Place with PCI? Jennifer Pesci-Anderson, Jeff Avery Jun 6 2017 4:00 pm UTC 60 mins
    Learn how to conquer and manage the PCI process. Businesses are challenged with attempting to continuously monitor their PCI environment, responding when something changes and managing all the information to gather evidence and generate the report on compliance (ROC) or attestation on compliance (AOC). Verterim is providing a 3 part, educational PCI series to address some of these business challenges and provide our tips on how you can take advantage of technology you may already have in house. The first 30 minute BrightTalk will look at the PCI process at a higher level and provide a view into a standard RSA Archer use case to help solve the problem. Join our GRC practitioners, Jennifer Pesci-Anderson, National Practice Lead and Jeff Avery, Engineer on May 11 from 12-12:30 to see how you can address your PCI business challenges.
  • Meet DataCore: Data Infrastructure for Next-Generation Data Centers
    Meet DataCore: Data Infrastructure for Next-Generation Data Centers Gabriela Markette, Senior Marketing Manager Jun 6 2017 6:00 pm UTC 45 mins
    We think differently. We innovate through software and challenge the IT status quo.

    We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.

    DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.

    Join this webinar to meet DataCore, learn about what we do and how we can help your business.
  • [Live Video Panel] Fighting Ransomware: Lessons from WannaCry
    [Live Video Panel] Fighting Ransomware: Lessons from WannaCry Josh Downs, BrightTALK & Panelists TBC Jun 8 2017 12:00 pm UTC 60 mins
    - BrightTALK at Infosecurity Europe 2017 -

    One month on from the WannaCry attacks, we'll be discussing their influence on the cyber security industry; whether it was a success for the cyber criminals and what organisations could've done to be better protected.

    Fighting Ransomware was a top priority on security professionals' minds in 2016 and that will only continue into 2017. Tune into this live panel to get insights and takeaways to protect your business from the threat of ransomware.
  • The Resurgence of APT10
    The Resurgence of APT10 Stuart Davis, Director, Mandiant & David Grout, Systems Engineering Director, FireEye Jun 8 2017 1:00 pm UTC 45 mins
    FireEye has tracked APT10, a Chinese cyber espionage group, since 2009. APT10, also known as MenuPass Group, have historically targeted the United States, Europe, and Japan with a specific focus on construction, engineering, aerospace, telecom, and government.
    In June 2016, FireEye first reported that APT10 expanded their operations with a new suite of tools and techniques to target their adversaries.

    Join our experts whom have hands on experience with this group to learn:

    •Who is a part of APT10, whom they target and how they operate
    •How to defend against, hunt for and respond to APT10
    •How your organisation can improve its ability to detect, prevent and remediate APT10 attacks
  • Data Storage for the Internet of Things - Edge, Node and/or Center?
    Data Storage for the Internet of Things - Edge, Node and/or Center? Mike Matchett, Sr. Analyst & Consultant, Taneja Group Jun 13 2017 3:00 pm UTC 60 mins
    This exciting panel will explore the kinds of storage that IoT solutions demand. We’ll talk about what’s different about data storage for IoT compared to existing enterprise applications, what capabilities are required to support massive, distributed IoT networks, and how and why existing storage solutions may or may not be the best IoT application storage. We'll plan on getting into unique IoT data protection concerns, real-time data pipelines, machine learning, data accessibility, distributed processing, and of course, what’s actually practical for the IoT already emerging in today’s data center.
  • Hand to Hand Combat with an Advanced Attacker
    Hand to Hand Combat with an Advanced Attacker Zeki Tured, Senior Systems Engineer, CrowdStrike, John Titmus, Technical Director, CrowdStrike Jun 14 2017 9:00 am UTC 60 mins
    Learn new attack techniques that have been uncovered by CrowdStrike’s threat hunting and incident response teams including: initial attack vectors, persistence, lateral movement and data exfiltration techniques. See new techniques for dealing with malware, ransomware, spearphishing, exploits and malware-free intrusions. Leave knowing how to identify and stop advanced threat activity in your environment.

    Learning Outcomes:

    - How nation-state threats are crafted and how their Tactics, Techniques, and Procedures (TTPs) help identify them from more routine advanced attacks
    - Who are the most notable adversaries in 2017 and the key European security themes based on the latest intelligence compiled across CrowdStrike’s global intelligence gathering operation
    - What are the indicators of attack and how you can apply them to defeat the adversary?
  • The Need for Cloud DDoS Mitigation
    The Need for Cloud DDoS Mitigation Tom Bienkowski, Directror Product Mkt, Arbor Networks Jun 14 2017 3:00 pm UTC 60 mins
    When it comes to DDoS attacks, you have to be prepared for the big, the bad and the ugly. The three categories of DDoS attacks are:
    1.Volumetric – packet floods that block your traffic pipes by oversaturating links with malicious traffic
    2. TCP State Exhaustion— overloading the state table of stateful devices like FireWalls and IPSs so no intended connections can be processed
    3. Application-layer Attack vectors – slow and stealthy attacks that are difficult to detect but they exhaust the functions and features of your assets
    Let's discuss what protection your infrastructure needs to withstand all three types.
  • PCI Continuous Controls; Set It and Forget It
    PCI Continuous Controls; Set It and Forget It Jennifer Pesci-Anderson, Peter Ridgley, George Waller Jun 14 2017 4:00 pm UTC 60 mins
    With mounting HIPAA regulations and PCI requirements, learn why securing your access credentials should be your number 1 priority this year and solutions that can take the guess work out of the authentication process.
  • Dealing with Skills Gap in Cyber Security
    Dealing with Skills Gap in Cyber Security Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific & Japan Jun 15 2017 5:00 am UTC 60 mins
    As cyber threats in the business world evolve, so do the skill requirements on Cyber Security specialists. In 2017, 55% of enterprises required at least three months to fill open Cyber Security positions and 37% reported that less than 1 in 4 candidates have the qualifications they need (1). Building and maintaining a capable Cyber Security team today is a challenge.

    A fundamental shortage of Cyber Security professionals, coupled with high attrition rates, can lead to organisations failing to acquire or retain the expertise necessary to respond to an ever-evolving threat landscape.

    To better help you prepare against this situation, we have arranged for a webinar session, where we will explore the skills gap in the different stages of a Cyber Security programme, and provide recommendations on how to:

    •Create and operationalise a robust cyber security team
    •Build and upskill existing talent
    •Address the skills gap in different stages of your Cyber Security programme
    •Source skilled security professionals differently

    (1) Source: ISACA’s State of Cyber Security 2017: Current Trends in Workforce Development
  • 6 Hidden Security Risks for Industrial Environments
    6 Hidden Security Risks for Industrial Environments Rob Caldwell, ICS Manager, FireEye Jun 15 2017 1:00 pm UTC 45 mins
    Industrial enterprises – like electric utilities, petroleum companies, and manufacturing organisations – invest heavily in industrial control systems (ICS) to operate industrial processes efficiently, reliably, and safely. Without technology operating the plant floor, business halts or worse.

    Join our webcast to discuss six key plant floor weaknesses that adversaries exploit to undermine plant operations. Subversive and difficult to detect, explore the implications and a step-by-step checklist for mitigating these risks firsthand with our experts.