The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
The first step to the cloud, for most organizations, is backup. This use case leverages cloud storage but totally ignores something that cloud providers are better at delivering – cloud compute. Join Storage Switzerland and Zerto as we discuss the best next step for hybrid cloud. Leveraging the cloud to create a next generation disaster recovery site.
Have you made the jump to all-flash storage? Are you planning to? If so this webinar is for you. We will look at what's next after (or before) the jump to all-flash. An all-flash array brings many benefits to the environment, but it also either exposes weaknesses or raises expectations in IT's ability to consistently deliver performance to applications, to protect the data those applications create and to ensure the organization can rapidly recover from almost any disaster.
In the Media and Entertainment industry, organizations that can store and access all digital video at every step in the production process have a significant competitive advantage which can result in new revenue streams. In this webinar, Richie Murray, President and Founder of Bridge Digital (a solutions integrator specializing in helping M&E companies create, distribute and monetize their video assets more efficiently), and Tony Barbagallo, VP of Product for Caringo (a massively scalable storage, delivery and management platform designed specifically for content), will discuss how to leverage secure secondary storage without disruption to existing digital video workflows. Topics covered include:
- Definition of “secure secondary storage” and how current offerings differ from traditional archive solutions
- How secondary storage can help optimize pre-edit, edit and post processes
- How to seamlessly plug secure secondary storage into video workflows
- A demo on optimizing Avid shared storage with Marquis Project Parking through automated transfer to/from the Caringo platform
It’s a fact: Digital Transformation is arguably the number one growth opportunity among today’s IT and business leaders. Organizations that embrace advanced technologies are attracting the best talent, optimizing productivity and creating enduring value for customers and shareholders.
Join us to engage with subject matter experts, network with peers and learn about new innovations that will streamline operational efficiencies and reinvent the way your organization performs with the advanced security you require in the cloud era.
View this webcast to:
• Learn about Microsoft’s vision for Digital Transformation
• Explore innovations that bridge the gap between intelligence and security
• Discuss how to optimize for teams and get the most from your biggest investment: People
Who Should view this webcast:
• Business leaders across Finance, Operations, Communications, Sales and Marketing
• CISOs, and VPs of Information Security
• CIOs and Innovation Officers
• IT Managers
Enterprises are undergoing a revolution in their infrastructure as the application world is being transformed by cloud technologies. Today your applications can be located in the data center, through IaaS, or in a SaaS cloud. Similarly, users are transforming with mobility; no longer are they tied to one location. Enterprises want to solve the problem of connecting users to their applications in a consistent and secure manner.
The overarching issue is the connectivity between these two worlds as we're stuck in two-decades old technology. Enterprises are therefore challenged with the requirement to transform their infrastructure while integrating underlying legacy technologies, and for the user to access their applications while maintaining policy and security framework.
Join our CEO as he discusses how IT infrastructure is being transformed during the era of cloud technologies, and how Enterprises across a number of industries can embrace the network revolution.
When most organizations consider an archiving project their primary goal is to save money. Basically they are looking to move data off of expensive storage valued at a couple dollars per GB to secondary storage valued at pennies a GB. They are counting on the 80/20 rule to save them money, where 80 percent of what an organization stores has not been accessed in the last nine months. Moving that 80% to less expensive storage will save them money. What most organizations that successfully implement a data management strategy actually find that the per GB cost savings is the most trivial part of the equation. In this ChalkTalk video, Storage Switzerland and NTP Software discuss the other more important reasons to archive data.
Our security experts will take you through WAF setup for policy and exceptions, profile review, and plugin rules to get the most of your WAF investment. They will cover 3 core topics of tuning a WAF:
-Alert exception for false positive reduction
-Profile maintenance for accuracy and efficiency (UBA)
-Plugins for Dynamic Applications and Profile Tuning
In this webinar, join Rhonda Ascierto of 451 and Aaron Peterson with RunSmart OS in a presentation on what is next for infrastructure management software. Far beyond just collecting data, monitoring and alarming, the session will address the efficiency and other added benefits automated control can bring when implemented. Case studies will be presented to highlight examples of recapturing underutilized assets and dynamic application provisioning taking advantage of the cloud.
Vulnerabilities exist in all applications—and today’s sophisticated attackers will find them. Every day an exploit remains unpatched, your risk of a data breach increases dramatically. Only a multi-layered approach that fully integrates with your IT defense stands a chance of stopping them, but where to begin?
By registering, you’ll gain valuable insights into:
Which techniques effectively block zero-day attacks.
Why robust endpoint protection plays such a critical component.
How Symantec Endpoint Protection 14’s Memory Exploit Mitigation shuts down vulnerability attacks, even against unknown threats.
BrightTALK caught up with Twistlock's CEO Ben Bernstein for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- Trends in the cyber threat landscape
- What companies can be doing to better improve their security posture
- 2016's biggest breaches (including Yahoo) and why they happened
- Preparations to take in advance of GDPR in May 2018
- Cyber security in the financial sector
- AI & Machine learning and the influence it'll have on the security industry
About the Speaker:
Ben Bernstein co-founded Twistlock, Inc. in 2015, and serves as its Chief Executive Officer. Ben has 14+ years of experience in enterprise security and operating systems. He is a Microsoft veteran with extensive experiences in both software development and product management. Ben is a veteran of the Israeli Intelligence Corps. He has a B.A cum laude in Computer Science from the Technion in Israel and an MBA with a scholarship of excellence from the Interdisciplinary Center in Israel. Ben hates writing about himself in third body.
Want to know what’s new in Symantec’s latest release of IT Management Suite version 8.1? Join us as we discuss the exciting new features such as Windows 10 and Office 365 Patch Management, Mac OS Profile Management, Symantec Endpoint Protection and Compliance integration and many more, all of which have been introduced in this latest launch.
Join our webinar “What’s New in Symantec IT Management Suite 8.1?” to learn about:
• How Symantec IT Management Suite will simplify and help keep Windows 10 and Office 365 up to date
• Dealing with Windows 10 cumulative updates
• Handle large updates in bandwidth constrained environments
• Support for AWS Marketplace, Mac application metering and profile management
• Integration with your existing Symantec Endpoint Protection & Control Compliance Suite
• Enhanced support for Ghost Solution Suite
• Network discovery support via Simple Network Management Protocol v3
• Off-box data migration and much more
We look forward to having you for this live session.
Join Storage Switzerland, Red Hat and leaders from the Docker industry for a round-table discussion on developing the right storage strategies to successfully deploy and manage Docker both in your environment and in the cloud. There are a group of vendors trying to make the storage architectures that support Docker easier to use, more enterprise class and able to provide data persistence. Storage Switzerland will moderate a roundtable discussion on Storage, Docker and how to build enterprise class environments that support legacy applications. We will cover areas like who should be using Docker, can legacy data centers participate, what are the storage challenges with a containerized environment and what are the issues with moving containers from on-premises to the cloud?
Cloud migration and hybrid cloud with no downtime and no disruption:
If business-critical applications with continually changing data are really moving to the cloud, the typical lift and shift approach of copying your data onto an appliance and shipping it back to the cloud vendor to load onto their storage days later, isn’t going to work. Nor will the one-way batch replication solutions that can’t maintain consistency between on-premises and cloud storage. Join us as we discuss how to migrate to the cloud without production downtime and post-migration deploy a true hybrid cloud, elastic data center solution that turns the cloud into a real-time extension of your on-premises environment. These capabilities enable a host of use cases, including using the cloud for offsite disaster recovery with no downtime and no data loss.
Organizations managing data have a competitive advantage over organizations that don't. But most organizations don't have the time or tools available to implement a successful data management strategy. It’s not for a lack of trying. Many organizations fight a losing battle when trying to implement a data management solution. In this webinar Storage Switzerland and Dternity/StrongBox Data Solutions will discuss the three reasons why organizations are losing the data management battle, and provide guidance on how to start winning the battle.
BrightTALK caught up with Mocana's Bill Diotte for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- The difference between securing IoT networks than tradition enterprise IT networks
- The role of government regulation in IoT security
- The 'mission critical' elements that need protecting in IoT networks
- The threat actors and motives targeting IoT networks
- The role of cyber warfare in global geo-politics
About the Speaker:
William (Bill) Diotte is a technology entrepreneur, CEO and Board Member with over 20 years of experience in working with tech-driven companies from startup stage to Fortune 500. Prior to joining Mocana as Chief Executive, he was the co-founder and CEO of software defined networking pioneer BroadHop Inc., acquired by Cisco. Starting off his career as a manufacturing engineer, he became an executive and managing director with both Gemini and SRI Consulting serving high tech companies in the software and telecom markets. Bill has also served as a Board Member to LiveAction, Inc., and is an investor and advisor to several companies in the software infrastructure and security space.
This is the first in a series of product demos focused on addressing specific requirements of the General Data Protection Regulation (GDPR). In this demo, we demonstrate how to use our data security portfolio to find and categorize your data for GDPR compliance.
In this webinar we’ll provide:
o An overview of General Data Protection Regulation (GDPR)
o Who does it impact?
o What are the data protection principles
o What are the primary data security requirements
o An insight into Imperva’s data protection portfolio and a demo of its discover and classification capabilities
Lenovo and DataCore have collaborated to create a Software-defined Storage (SDS) appliance. This validated, turnkey appliance provides easy scalability and single pane management at a fraction of the cost of legacy systems—without trade-offs in availability, reliability or functionality.
Join this webinar to learn more about the Lenovo Storage DX8200D Powered by DataCore.
The Always-on Enterprise is a data center that faced with even the most severe disaster can return applications to full working order in a matter of minutes. Service level objectives (SLOs) are the means by which IT and the organization communicate how the protection and recovery process will work. The challenge is the status quo SLO won't meet the new "always-on" expectation. You need to protect data more frequently, recover more rapidly and provide better performance in the recovered state.
It is time for IT to re-think SLOs and the solutions to meet them. Join experts from Storage Switzerland, Veeam and NetApp as they review the NEW SLO requirements and how you can meet those requirements while controlling costs.
In healthcare, network administrators and IT teams face a unique array of ongoing challenges. Always-on connectivity is more than just mission-critical; it’s about saving lives. Care services must extend beyond fixed locations and far into the field. Also, healthcare practitioners need access to sensitive patient data anytime, anywhere — and security breaches are unacceptable.
From primary connections at fixed locations to temporary networks, in-vehicle applications and the Internet of Healthcare Things (IoHT), healthcare organizations are looking for purpose-built, cloud-managed solutions that foster HIPAA Compliance and hardware, complexity, man-hours, and costs.
At 9am PT / 12pm ET on April 12, 2017, join Cradlepoint’s Roger Billings to explore the many ways healthcare organizations are joining data, cloud, security, and the evolving IoT with intelligent networking to stay always connected and secure.
Prior to May 2018, global companies operating by any means in the EU are required to be compliant with the new General Data Protection Regulations (GDPR). Non-compliance will result in an expensive alternative compounding the situation with fines, penalties, and legal fees.
Join Rebecca Herold, President, SIMBUS360 and CEO, The Privacy Professor, and Dario Forte, CEO, and Founder of DFLabs an expert on incident response and data breach management.
This session will cover key GDPR compliances and how they impact Incident Response and Data Breach Management, wrapping up with a Question & Answer.
• Understand the 1st steps for personal data protection compliance
• Anonymizing collected data to protect privacy under GDPR requirements
• Learn how to broaden Cybersecurity Plans with Incident Response Platform
• Recommended steps for evaluating requirements for a complete Incident Response management plan
As virtualization evolves, the next generation of private cloud is looming on the horizon. Now is the time to look at how you can reduce the cost of cloud by leveraging Open Source technology, to provide an elastic web-scale environment and develop a new generation of applications.
Join Commvault’s Senior Systems Engineer, Chris Dyer, as he discusses:
• The key design and implementation considerations for OpenStack private cloud environments
• How to ensure you have an effective protection and recovery strategy of OpenStack instances
• The impact of choices around storage and compute architecture of the OpenStack Cloud
• Best practices for effective management of both traditional and next generation workloads
Fusion® 2.10, the new major release from WANdisco, adds support for seamless data replication at petabyte scale from Network File Systems for NetApp devices to any mix of on-premises and cloud environments. NetApp devices are now able to continue processing normal operations while WANdisco Fusion® allows data to replicate in phases with guaranteed consistency and no disruption to target environments, including those of cloud storage providers. This new capability supports hybrid cloud use cases for on-demand burst-out processing for data analytics and offsite disaster recovery with no downtime and no data loss.
Today’s IT professional is stuck in the middle of a file sharing tug of war. One side has the end users who want the improved productivity that mobility and collaboration promises. The other side consists of corporate governance that wants to eliminate data breaches and improve data protection. In this live webinar, join experts from Storage Switzerland, CTERA and IBM as we discuss the "5 Must-Haves" so IT can make both sides of the issue happy while at the same time making its job easier.
BrightTALK caught up with Fidelis Cybersecurity's John Bambenek for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- The future of Cyber warfare
- The tasks for the US political administration on an information security level
- The Yahoo breach and who was to blame
- GDPR and the steps that companies need to take to prepare for the legislation
- A vision of the threatscape; new actors, motives and techniques
- AI and machine learning and the role it has to play in the cyber security industry
About the Speaker:
John Bambenek is Manager of Threat Intelligence Systems at Fidelis Cybersecurity and an incident handler with the Internet Storm Center. He is also a faculty member of the Department of Computer Science at the University of Illinois where he teaches courses in cybersecurity. He has been researching security threats and criminal organizations for 17 years and coordinating with US and foreign law enforcement entities to help bring criminal actors to justice.
All applications have vulnerabilities and attackers are incented to find them. Once the vulnerability has been discovered, the longer it remains unpatched, the greater the risk of a breach, potential loss of information, and damage to reputation.
Join us to learn what can be done to block exploit attacks on day zero:
• What behaviors and techniques are used to block attacks
• Why exploit prevention plays a critical part in endpoint protection
• How Memory Exploit Mitigation works
Then see Memory Exploit Mitigation in action with a demo Symantec Endpoint Protection.
Automation systems bring a great deal of value. Having the ability to produce better, faster, and more reliable results can go a long way in improving business agility and simplifying day-to-day tasks. Firewall automation also helps tighten security posture and ensure continuous compliance with internal policies and industry regulations.
Tufin presents the recommended steps to start your journey towards firewall automation. Join us for the first webinar of the series, focusing on rule decommissioning, to learn how you can initiate an immediate and substantial impact on your organization.
The GDPR will apply in all EU member states in May 2018, organizations and businesses that are data owners and/or dealing with data belonging to EU citizens have the responsibility to ensure their processing abides by new data protection law and processors must themselves abide by rules to maintain records of their processing activities. If organizations and businesses are involved in a data breach, they are far more liable under GDPR than they were under the Data Protection Act.
Complying with the new regulations requires operating to high standards of data security and protection. If suffering a data breach that puts the rights and freedoms of individuals at risk, organizations must notify the people affected and the data protection authority (Information Commissioner's Office (ICO) in the UK) within 72 hours of becoming aware of it. Data breaches occur every day - and the EU have just increased the financial liability and consequences of inadequate security.
Hear from Mike Fowler, author of the popular white paper: Automation as a Force Multiplier in Cyber Incident Response. Mike will provide insight into how best to leverage automation to provide incident response and reporting consistency for GDPR.
Steve Ditmore will present IncMan™ – Security Automation and Orchestration features covering:
•Installation and set-up is measured in hours rather than days or weeks without the need for expensive professional services support.
•Review steps involved in a mitigating and controlling a data breach.
•Automation of menial enrichment activities, so incident responders can determine/contain and mitigate breaches more efficiently and effectively.
•Enhanced visibility creating a layered approach to information gathering.
•Incident management including response prioritization.
•How incident and notification workflows are automatically assigned to an incident.
4 steps for more affordable, effective disaster recovery. Disaster Recovery is an expensive proposition. But since the consequences of not being prepared for a disaster are so severe, it is an expense that organizations make. But that's not to say organizations are not always looking for way to do DR better, faster and for less money. In this live webinar join Storage Switzerland and ClearSky to learn how organizations can lower the cost of DR preparation and execution.
With 5G rapidly climbing the hype cycle toward the peak of inflated expectations, many organizations are asking the same question: “Where does 5G stand today, and how long before it can help my business?”
Carriers in the U.S. are not only talking about it, but claiming their trials are ongoing and deployments are coming soon — in many cases, years earlier than had been thought possible. In reality, 5G has a limited, powerful use case today, but can reach its exceptional potential within the next couple years.
At 11am PT / 2pm ET on April 26, 2017, join Cradlepoint’s David Rush and Ken Rehbehn of 451 Research to explore the 5G reality today and how 5G can help people and businesses in 2018 and beyond.
Cradlepoint is the global leader in cloud-based network solutions for connecting people, places, and things over wired and wireless broadband.
Many of us responsible for large scale OLTP systems confront two clashing phenomena:
•Data comes at us at increasingly higher rates (from an expanding number of sources)
•The time required to process and analyze those inputs is rapidly shrinking.
Blame it on the Internet of Things (IoT)!
Instinctively, we respond with two approaches. First, we search for hardware and software that speed up the process.
Then, we try breaking up the problem into smaller parallel efforts.
In this webinar you will learn to:
•Look for choke points that get in the way of executing concurrent transactions
(Hint: they hide where you don’t suspect)
•Recognize the consequences those choke points have on competing workloads
•Apply DataCore™ Parallel I/O technology to solve these barriers
With over 13 years of front-line experience dealing with advanced threat actors from around the globe, our Mandiant team know how the bad guys think and can help you win the battle against cyber attackers.
In this webinar, Stuart Davis and David Grout will cover:
- Best practices in regards to Security as a Service
- How organisations can move from an alert-led security to an intelligence-led security
- How FireEye can provide the adequate tools, processes and expertise required to build a next generation security program
Users expectations of IT's ability to return mission critical applications to production are higher than ever. These expectations are leading IT to abandon many of their backup and recovery solutions to try new, unproven solutions that may or may not solve the problem. In either case, the organization wasted its investment in the first solution for the unknown potential of a new solution. User expectations are certain to get higher, so this cycle will likely repeat itself. IT needs a new strategy, one that will meet the current expectations of users and pave the way for true organizational resilience.
We think differently. We innovate through software and challenge the IT status quo.
We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.
DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.
Join this webinar to meet DataCore, learn about what we do and how we can help your business.
What could you do with a new evolution of data center management, advanced security and minimal overhead?
Microsoft’s Operations Management Suite (OMS) represents the evolution of data center management, with cloud-inspired capabilities for log analytics, automation, disaster recovery, and security. With OMS, you can now deliver advanced security and management capabilities without a significant amount of overhead and without needing lengthy technical or security training.
During this webcast, we'll demonstrate how this can work effectively for government agencies. You don’t need to be a security expert to leverage these capabilities. In fact, you can be up and running in a couple of hours.
Join this webcast to:
- Learn about Microsoft’s approach to holistic security and how our capabilities apply specifically to government agencies
- View a demo and see how this applies to your own environment
- Find out how to quickly configure your environment and test it out
Many of our customers sought out Cylance because it is highly effective in preventing ransomware attacks. We have learned firsthand how ransomware is affecting organizations of all sizes, and across all industries. In this live demonstration, Brian Robison, Senior Director, Technical Marketing at Cylance® will show how ransomware works. He will launch several attacks on unprotected machines to deliver a real-world view into how ransomware compromises systems, and how Cylance prevents ransomware attacks.
Brian will provide a live demonstration of CylancePROTECT® blocking attacks, and will discuss:
•Different ransomware types
•Delivery methods, including drive-by downloads and fileless malware
•Why launching attacks is cheap and easy with ransomware-as-a service
•How Cylance prevents both file-level and disk-level encryption
Cyberkriminelle entwickeln ihre Taktiken, Techniken und Prozesse stets weiter und sind dabei häufig schneller als die Sicherheitsteams. Die Angreifer sind bestens organisiert und ihre Methoden werden von Jahr zu Jahr raffinierter – 2016 war da keine Ausnahme.
In diesem Live-Webinar stellt Sven Schriewer, Director, FireEye, die Beobachtungen und Schlussfolgerungen der Experten von Mandiant aus der Untersuchung einiger der schwerwiegendsten Cyberangriffe und Sicherheitsverletzungen des vergangenen Jahres vor.
Melden Sie sich noch heute an, um sich über die folgenden Themen zu informieren:
•Neue Trends bei Phishing-Angriffen auf Unternehmen
•Neue Entwicklungen in der Angriffstelemetrie und -methodologie
•Datengestützter Überblick über neue Bedrohungen weltweit
•Moderne Abwehrstrategien zum besseren Schutz von Unternehmen und Institutionen
•Auswirkungen der Datenschutz-Grundverordnung auf Unternehmen in EMEA
•Trends in EMEA, Nordamerika und APAC im Vergleich
Neben den Untersuchungsergebnissen in der Regionen EMEA mit Schwerpunkt auf Deutschland, Österreich und Schweiz, enthalten Sie in diesem Webinar auch Informationen wie Sie eine proaktive Strategie zur Stärkung Ihrer Sicherheitsinfrastruktur entwickeln.
Choosing the right cloud provider, that meets your requirements at the right price can be a daunting task. We’ve seen too many make the wrong choices. In this webinar, we will guide you through the things to think about when executing a cloud strategy and how to avoid the pitfalls. Is there a better way to do things? We think so.
Some things you'll learn in this webinar:
Not all clouds are created equal. How to choose the best cloud(s) for your companies needs
How to estimate your bandwidth
How to avoid sticker shock and leverage the best value
As any business unfortunate enough to have suffered a data breach can attest, in a crisis situation, being organised enough to provide a detailed notification to affected customers (or indeed regulators) is a difficult task on its own. When combined with required incident response processes – identifying the cause, closing the vulnerability, all while determining the extent of the damage, it becomes all the more difficult. Furthermore, GDPR means data breaches will need to be reported within 72 hours – how will you manage the fallout?
In this webinar we discuss the risks, challenges and answers surrounding response-readiness and the importance of having a critical communications strategy in place.
Stuart McKenzie | VP, Mandiant Consulting
Dan Wire | Sr. Director, Marcom
Learn how to conquer and manage the PCI process. Businesses are challenged with attempting to continuously monitor their PCI environment, responding when something changes and managing all the information to gather evidence and generate the report on compliance (ROC) or attestation on compliance (AOC). Verterim is providing a 3 part, educational PCI series to address some of these business challenges and provide our tips on how you can take advantage of technology you may already have in house. The first 30 minute BrightTalk will look at the PCI process at a higher level and provide a view into a standard RSA Archer use case to help solve the problem. Join our GRC practitioners, Jennifer Pesci-Anderson, National Practice Lead and Jeff Avery, Engineer on May 11 from 12-12:30 to see how you can address your PCI business challenges.
Are you confident in your IT recovery program? In today’s hybrid IT environment, interconnected, mission-critical applications run across diverse platforms and geographies. The manual disaster recovery process traditionally followed, requires huge time, resource and efforts to scale up DR management for all critical IT assets. This leads to critical IT resources being excluded from DR programs. As per a recent survey, IBM found that 78% of enterprises face unacceptable risk for core enterprise IT resources.
With growing threat of cyber breaches, assured resiliency to support business objectives requires a new approach, including constant, intelligent monitoring and proactive action to achieve DR SLAs.
In this webinar you will learn how resiliency orchestration is transforming resiliency, explore the complexity of hybrid environments and the roadblocks behind DR and business continuity, and understand the benefits of Resiliency Orchestration and how it can enhance confidence in your cyber resilience program
The EU General Data Protection Regulation (GDPR) comes into effect on 25 May 2018, and will significantly reshape the data protection landscape for organisations that collect and process the data of European residents. Therefore businesses will need to take responsibility for the way they collect and process personal data and will have to take immediate action to align their business systems with the requirements of the GDPR.
This webinar session will cover:
•An overview of the General Data Protection Regulation (GDPR).
•The impact GDPR creates on businesses and the transition timelines.
•The first steps in preparing for GDPR compliance.
•The technical and organisational measures your business will need to adopt to comply with the Regulation.
•Key recommendations and best-practices to achieve and manage GDPR compliance.
Threat-based testing, accurately simulating criminal attacks, is a critical approach in securing FinTech. Attackers constantly evolve their attack methods and strategies in response to changing technologies, making it essential that security tests match the threat landscape.
This session will focus on how organisations can build senior executive level readiness to respond and recover from sophisticated cyber incidents. It will provide an overview of the threat landscape and consider the differences cyber crises present for senior executives. Participants will learn about some of the challenges faced when responding to a cyber incident and how to overcome them by building readiness in people, structures, processes and plans.
The greatest threat to the corporate security perimeter now comes not from the outside, but the inside. Social engineering threats such as phishing, malware and ransomware target the weakest link, the human factor. This webinar will expose the techniques of the hackers and offer advice on how these can be combatted to make your business more resilient in the face of the cyber threat.
The coming into effect of New York's cybersecurity compliance requirements for banks, insurance companies and their third party service providers on March 1, 2017 marked a major development in the cyber risk regulatory environment. While the impact of these rules is far from certain, the lessons in managing risk are universal. UpGuard's Elias Okwara, CIPP/E, CIPP/US, will discuss practical steps for compliance and the implications amid rapidly changing cyber threats.
In this webinar you will learn:
- What do the New York Department of Financial Services (DFS) cybersecurity regulations mean for financial institutions
- Practical steps for compliance
- Implications of the regulation amid rapidly changing cyber threats
Today’s digitised value chains have a very high dependency on third parties. This exposure is not lost on potential attackers, who will invest resources in researching, identifying and selecting targets among value chain partners. It would be an uneven contest were firms not to take steps to understand these vulnerabilities and ‘value at risk’ themselves. This webinar will set out clear steps that can be taken to understand potential vulnerabilities among third parties and will introduce a lifecycle approach to support robust third party risk management from the start of the relationship through to exit.
Take your mark. Get set… and go. What do you do if your organization is faced with a crisis, do you have the necessary steps and procedures to recover from a cyber attack?
91% of APT (Advanced Persistent Threats) begin with spear phishing emails. Cyber criminals increasingly target employees within an organization who have administrative rights and access to critical systems. Successfully phishing these individuals could give them the ‘key’ to breaching security in further attacks.
This webinar will cover five domains to assist the organization to maintain a framework with the ability to deliver the outcomes consistently at all times. These domains focus on preventative, detective and reactive controls within the organization, and form part of the process of having the ability to recover in the event of a crisis.
These five domains will follow the process of identifying, protecting, detecting, responding and recovering, giving a holistic view of the full cycle of infrastructure resilience.