Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Our Cyberthreat Landscape: why collaboration is key
    Our Cyberthreat Landscape: why collaboration is key Nahim Fazal and Ramón Vicens Mar 19 2018 3:00 pm UTC 60 mins
    As the ‘public profile’ of cybercrime continues to increase, enterprises are encouraged to look at how they keep their businesses and customers safe by sharing intelligence, best practice and defense measures.

    Join Nahim Fazal, Head of Cyberthreat Intelligence at Blueliv, for a webinar reflecting on the incidents and trends discussed in Blueliv’s annual cyberthreat report, and guidance on how organizations of all sizes can protect themselves in an ever-more sophisticated threat landscape.

    The report combines intelligence gathered through Threat Compass with insight from the Blueliv analyst team, leading to informed assessments about the current state of play and areas which require immediate attention.

    Register today to reserve your spot.

    Blueliv is leading a new wave of proactive, real-time threat monitoring that protects organizations from the outside in, radically reducing attack success rates and improving incident response performance through fresh, actionable intelligence. The in-house team is bolstered by the Blueliv Threat Exchange Network, a global community of thousands of security experts united in the fight against cybercrime.
  • Unpacking the Hype: What do the new privacy laws really mean to your business?
    Unpacking the Hype: What do the new privacy laws really mean to your business? Brian Fletcher, Director, Government Affairs, Symantec, Asia Pacific and Japan Mar 20 2018 2:00 am UTC 60 mins
    With the new Privacy Amendment (Notifiable Data Breaches) Act 2017 now in effect, many Australian businesses and government agencies are starting to take action to ensure their data protection and breach response plans are up to date and comply with the new scheme. However, knowing how to avoid the higher penalties and reputational damage caused by data breaches is a tough challenge for any business.

    Don't miss this opportunity to join Symantec's privacy expert Brian Fletcher, Director, Government Affairs, Symantec, Asia Pacific and Japan to learn more about the new laws and what you can do to ensure your business is not making headlines for all the wrong reasons.

    " Hear about new challenges introduced by the Australian mandatory data breach notification laws and the wide reaching General Data Protection Regulation (GDPR)
    " Learn about key steps in the journey towards privacy compliance and why most Australian businesses have approached privacy wrong
    "Understand how these regulations can enable you to gain trust and enhance customer experiences
  • Commvault Admin Console
    Commvault Admin Console Christian Eymard Mar 20 2018 8:30 am UTC 45 mins
    Découvrez la simplicité et l'efficacité de la nouvelle console d'administration et d'exploitation de la solution Commvault

    Comment gérer la protection de vos machines virtuelles, serveurs de fichiers et application en quelques clics avec Commvault ? Laissez-nous vous montrer la nouvelle interface de Commvault pour les serveurs, applications et machines virtuelles.
    Dans ce Webinaire, vous allez découvrir une interface simple et intuitive pour réaliser vos opérations d’ajout d’environnement à protéger, vos accès aux données pour les restaurer, le suivi des jobs et alertes, les rapports proposés et un tableau de bord qui vous permet en une vue de vous faire une idée sur le bon fonctionnement de votre solution Commvault.

    C’est le moment d’utiliser Commvault Admin Console pour vous simplifier la vie, avec depuis toujours la solution de sauvegarde la plus performance du marché !
    Commvault, simplicité et performance.
  • Overcoming Objections through Creating Certainty
    Overcoming Objections through Creating Certainty Paul Blair Mar 20 2018 11:00 am UTC 60 mins
    I will share my thoughts on how we overcome a lot of objections by creating certainty around our products/services, us and our companies. Increase credibility, position ourselves as the expert or authority figure to gain control of an inquiry so we may find it easier to close. I will also look at how this will have a positive impact upon your prospect.
  • The Rise and Rise of Ransomware: Prepare and Protect
    The Rise and Rise of Ransomware: Prepare and Protect Nick Frost, Principal Consultant, ISF Mar 20 2018 1:00 pm UTC 45 mins
    The expectation from the start of 2017 – that we hadn’t seen the back of ransomware – was justified. 2017 was plagued with global attacks such as Petya, WannaCry, Bad Rabbit and many others. Unfortunately, 2018 could be even worse.

    With ransomware continuously developing new delivery techniques, organisations must learn how to prepare and protect themselves from the threat of ransomware, but how can they do this?

    In this webinar, Nick Frost, Principal Consultant at the ISF, will explore the latest threats in ransomware and what organisations can do to minimise vulnerabilities to reduce risks of an attack.

    About the presenter:

    Nick is currently the Principal Researcher for the Information Security Forum (ISF) Ltd. He has more than 15 years’ experience designing and implementing a risk-based approach to securing information. He has developed leading solutions for evaluating risk across both internal and supplier environments.
  • Zarządzanie danymi w kontekście RODO przy wykorzystaniu platformy Commvault
    Zarządzanie danymi w kontekście RODO przy wykorzystaniu platformy Commvault Piotr Łukasiewicz, System Engineer Mar 20 2018 1:00 pm UTC 60 mins
    87% ankietowanych dyrektorów działów IT jest przekonanych, że ich obecne zasady i procedury narażą ich na ryzyko po wejściu w życiu RODO
    Największym wyzwaniem związanym z zachowaniem zgodności z RODO jest fakt, że dane osobowe mogą znajdować się w dowolnym miejscu. Pomyśl tylko, ile kopii czyichś danych osobowych może być rozsianych po Twojej organizacji.

    W jaki sposób zagwarantujesz zgodność z RODO we wszystkich źródłach niestrukturyzowanych danych? Laptopy, urządzenia mobilne i inne punkty końcowe? Poczta elektroniczna? Chmury osobiste? Serwery plików i systemy zarządzania treścią z setkami lub tysiącami uprawnionych użytkowników? Kopie dev/test? Aplikacje business intelligence (BI) i analityczne?
    Aby zapewnić zgodność z RODO, najprawdopodobniej trzeba będzie dokonać fundamentalnych zmian w sposobie zbierania i przechowywania danych oraz zarządzania nimi. Będzie to czasochłonne, dlatego ważne jest, aby podjąć odpowiednie działania juz teraz.
  • Build AI and ML in the Cloud and Reduce IoT Solution Costs with Azure IoT Edge
    Build AI and ML in the Cloud and Reduce IoT Solution Costs with Azure IoT Edge Arjmand Samuel, Principal Program Manager , Microsoft; Chipalo Street, Senior Program Manager, Microsoft Mar 20 2018 5:00 pm UTC 75 mins
    In today’s connected world, devices and data can be found far outside traditional data centers or offices, in places like oil wells, hospitals or factory floors. For these businesses, connectivity can be expensive and unreliable and get in the way of implementing effective IoT solutions.

    Azure IoT Edge is a service that allows cloud intelligence to run on your IoT devices locally. With Azure IoT Edge, you can deploy cloud workloads such as Artificial Intelligence, Azure Machine Learning, Azure Stream Analytics, Azure Functions or custom code via containers directly on your IoT device to enable real-time insights.

    Curious to learn more? Join us in this webinar, presented by IoT engineering experts, to learn:

    - Why and when you should use edge computing as important part of your IoT solution
    - How to get started with Azure IoT Edge
    - How to create and deploy containers using IoT Edge portal
    - Securing your edge devices and solution
  • Is Ransomware the New Normal?
    Is Ransomware the New Normal? Ulf Mattsson, Lance James, Barak Engel Mar 20 2018 5:00 pm UTC 60 mins
    Ransomware was the word on everybody’s mind in 2017 with Petya, WannaCry and more. Will this continue into 2018? And if so, how can you ensure your business is protected from the threat of ransomware?
    This session will cover:
    - An overview of how Ransomware works.
    - Can you realistically prevent Ransomware from infiltrating your organization?
    - What can you do to protect yourself from an attack?
  • Capacity Planning and Scaling for Object Storage
    Capacity Planning and Scaling for Object Storage John Bell, Senior Consultant & Tony Barbagallo, VP of Product Mar 20 2018 6:00 pm UTC 60 mins
    One of the many benefits of best-of-breed object storage solutions is the ability to scale on demand and pay as you grow. How do you predict your capacity needs and determine your roadmap for scaling your storage? VP of Product Tony Barbagallo and Sr. Consultant John Bell will provide concrete guidance to help you predict your needs so you can accurately map out and budget for your organization’s data growth.
  • Cómo Scale-Out resuelve los dolores de cabeza del almacenamiento secundario
    Cómo Scale-Out resuelve los dolores de cabeza del almacenamiento secundario Ivan Abad - Director Técnico Iberia Mar 21 2018 8:30 am UTC 45 mins
    Muchos departamentos de TI no se dan cuenta de que más del 70% de sus datos vive en almacenamiento secundario. Pero conocen de primera mano los dolores de cabeza asociados con el enfoque scale-up para lidiar con el crecimiento de ese almacenamiento y la necesidad de migrar a sistemas cada vez más grandes a medida que se expanden los datos.

    La alternativa es una arquitectura scale-out que le permite simplemente expandir la capacidad a medida que la necesita. Además de resolver el problema de escalabilidad, este enfoque es más barato, más fiable y ofrece un coste de rendimiento predecible.

    Gartner dice que el 30%1 de los datos ya se ha movido a una infraestructura scale-out, principalmente para almacenamiento primario. Su éxito ahora está impulsando el interés en aplicar los mismos principios al almacenamiento secundario.

    En este webinar examinaremos cómo la infraestructura Scale-Out:
    •Simplifica la gestión del almacenamiento
    •Reduce los costes de infraestructura
    •Mejora la fiabilidad y disponibilidad
    •Dirige el rendimiento
    •Expande el almacenamiento sin fisuras

    1Gartner Magic Quadrant for Distributed File Systems and Object Storgae, October 2017
  • Verizon Threat Research Advisory Center - Protected Health Information
    Verizon Threat Research Advisory Center - Protected Health Information John Grim and David Kennedy, Verizon Enterprise Solutions Mar 21 2018 2:00 pm UTC 90 mins
    Fellow Cybersecurity Practitioner:
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape.
    This month's theme: Protected Health Information
  • A New Way of Predicting Exploitability - Kenna Security with Exploit Prediction
    A New Way of Predicting Exploitability - Kenna Security with Exploit Prediction Ed Bellis, CTO, Co-Founder, Michael Roytman, Chief Data Scientist Mar 21 2018 5:00 pm UTC 60 mins
    Do you think security is overdue for actionable forecasts rather than security dogma? Are you a security leader tired of worrying about the next vulnerability with a logo and a web site? If we can forecast the weather, we can use similar models to foresee which vulnerabilities attackers are likely to weaponize.

    Join Kenna Security's Michael Roytman, Chief Data Scientist and Ed Bellis, CTO, Co-Founder and ex-CISO at Orbitz for a live webinar where they will debut Kenna Security's new Exploit Prediction, the industry's first vulnerability exploit prediction capability, a significant breakthrough for security professionals looking to develop a more mature proactive approach to vulnerability management.

    In this webinar cover:

    "How Kenna Exploit Prediction has delivered 94 percent predictive accuracy
    "How to adopt a proactive approach to contextualize, prioritize and remediate vulnerabilities, based on risk
    "How the Kenna Security Platform with Exploit Predictions can help align security, IT operations, and executive management with a single view of risk
    "A demonstration of the Kenna Security platform with the new Exploit Prediction capabilities
  • State of Cyber-Security Arms Race: Preparing for what's coming in 2018
    State of Cyber-Security Arms Race: Preparing for what's coming in 2018 Ken Dang Mar 21 2018 6:00 pm UTC 60 mins
    Examining 2017 to prepare for what's coming in 2018

    The modern cyber war — against governments, businesses and individuals alike — is comprised of a series of attacks, counterattacks and respective defensive countermeasures. The SonicWall 2018 Cyber Threat Report provides exclusive data that highlights advances by both the security industry and cyber criminals.

    Attend this webinar to gain a better understand the current State of Cyber-Security Arms Race. We’ll share our findings, intelligence, analysis and research to help you improve your security preparations and posture going forward.
  • Is Microsoft Office 365™ Good Enough Protection and Recovery?
    Is Microsoft Office 365™ Good Enough Protection and Recovery? Shane Harris - Director Product Marketing, Mimecast & Glenn Brown - Director Product Management, Mimecast Mar 21 2018 6:00 pm UTC 60 mins
    While every organization needs to keep data protected and accessible for its users, many are unaware of the risky protection and recovery gaps when malicious attacks occur or point-in-time recovery is required. Many organizations are asking themselves, “Is Microsoft O365 good enough protection and recovery?” or “Is my on-premises backup solution enough?” Join this webinar to learn where your biggest risks are and how to mitigate them.

    Presenter Info:

    Shane Harris - Director Product Marketing, Mimecast

    Shane Harris has had varied experience spanning 20 years across IT, Product Management, Sales, Engineering and Research Analyst roles in the areas information management, eDiscovery, archive and compliance. Prior to Mimecast , Shane was the lead analyst for the Enterprise Information Archiving Magic Quadrant at Gartner and has held executive leadership positions at kCura, Commvault and Johns Hopkins. In these roles, he has held countless customer conversations across all verticals and was a frequent speaker, presenter and thought-leader at industry events.

    Glenn Brown - Director Product Management, Mimecast

    Glenn joined Mimecast in 2007 and is responsible for Mimecast’s archiving, compliance and data resilience products group. He is tasked with defining and bringing the product roadmap from vision to reality and is a passionate advocate of cloud technology enabling strong data resilience strategies.
  • Wie zukunftsSICHER ist Ihr Unternehmen?
    Wie zukunftsSICHER ist Ihr Unternehmen? Jochen Rummel, Regional Director D/A/CH Mar 22 2018 9:00 am UTC 60 mins
    Knapp 70 Prozent der Unternehmen und Institutionen in Deutschland sind in den Jahren 2016 und 2017 Opfer von Cyber-Angriffen geworden. In knapp der Hälfte der Fälle waren die Angreifer erfolgreich und konnten sich Zugang zu IT-Systemen verschaffen, die Funktionsweise von IT-Systemen beeinflussen oder Internet-Auftritte manipulieren.
    Aufgrund der hohen Anzahl von Risiken und Lösungen brauchen Unternehmen zunächst Klarheit, welchen Grad an Sicherheit sie erreichen möchten, um Budget und Ressourcen optimal einzusetzen. Wollen Sie lediglich die gesetzlichen Vorgaben einhalten, den Branchenstandard erfüllen oder Sicherheit als Alleinstellungsmerkmal für Ihr Unternehmen definieren?
    Wir erläutern Ihnen unseren Ansatz zum Aufbau einer effektiven Sicherheitsarchitektur, die auf die individuellen Bedürfnisse Ihres Unternehmens abgestimmt ist und bieten Entscheidungshilfen zur Festlegung des notwendigen Grads an Sicherheit. Dabei fokussieren wir folgende Themen:
    Bewertung der Ausgangssituation (bestehende Sicherheitsarchitektur)
    "Bewertung von Sicherheitsprogrammen
    "Fazit: Erstellung eines Aktionsplans in Abhängigkeit von Budget und Ressourcen

    Zielgruppe: Geschäftsführer, Sicherheitsbeauftragte, IT-Leiter, Datenschutzbeauftragte und Fachabteilungen, die an der Ausarbeitung von nachhaltigen Sicherheitskonzepten beteiligt sind.
  • Jak zostać Service Providerem i zacząć zarabiać pieniądze
    Jak zostać Service Providerem i zacząć zarabiać pieniądze Marek Ścibior, Piotr Łukasiewicz Mar 22 2018 10:00 am UTC 105 mins
    Wielu integratorów technologicznych zastanawia się jak rozwinąć swój biznes o dodatkowe usługi. Przedstawimy pomysł na usługi zarządzalne (Managed Services) oparte o rozwiązania chmurowe. Krok po kroku pokażemy jaki jest rynek w Polsce, jakie daje możliwości, jak zbudować swoje portfolio usługowe, ile to kosztuje i czy da się na tym zarobić.
  • Security Operation Platform: Une nouvelle réponse avec FireEye Helix
    Security Operation Platform: Une nouvelle réponse avec FireEye Helix Jerome Delaville, System Engineer, FireEye France Mar 22 2018 1:00 pm UTC 45 mins
    Les plateformes de sécurité présentent aujourd'hui beaucoup de challenges qui les rendent difficiles à gérer : manque de visibilité, trop volume d'alertes, peu de contextualisation… Le résultat est une perte d'efficacité, et de vitesse dans la prise en compte des incidents de sécurité.
    FireEye a conçu une plateforme de gestion des opérations de sécurité avec ces objectifs en tête, plus de visibilité, une meilleure lisibilité et une contextualisation de la menace, le but ultime étant de fournir une plateforme facile à déployer, à administrer et qui répond aux besoins d'aujourd'hui.

    Lors de ce webinaire nous couvrirons les points suivants :
    Comment HELIX centralise les opérations de sécurité :
    - Améliore la visibilité de bout en bout
    - Aide à la Priorisation et la contextualisation des alertes
    - Accompagne à la prise Prise de décisions et à la levée de doutes

    Nous terminerons par une démonstration de la plateforme à travers un Business Case réel et nous laisserons le temps aux différentes questions en live.
  • GDPR: durante e dopo le 72 ore
    GDPR: durante e dopo le 72 ore Marco Rottigni, Senior Manager, Product Marketing, FireEye Mar 22 2018 1:30 pm UTC 60 mins
    Sebbene il GDPR sia soprattutto una questione legale e di compliance, un evento di "data breach" evidenzia la presenza di carenze nel sistema aziendale di protezione dei dati e più in generale nella security posture.
    L'articolo 33 del GDPR richiede la notifica delle brecce informatiche entro 72 ore dalla scoperta.
    Un tempo decisamente limitato per notificare la natura della breccia, il numero di record e soggetti coinvolti e le possibili conseguenze. Ogni ora conta ed è fondamentale disporre di una visibilità del proprio ambiente completa ed approfondita.
    In questo scenario, la rapidità di risposta diventa un fattore critico. Per questo è necessario potersi affidare ad un partner che abbia un'elevata competenza nell'incident response, che disponga di soluzioni di threat intelligence di qualità e di tecnologia atta non solo a garantire una prima notifica rapida, ma anche a supportare le notifiche successive sullo stato di avanzamento del processo di risposta e di rimedio all'incidente.

    Ne parliamo il 22 marzo con Marco Rottigni, Sr. Product Marketing Manager EMEA, per comprendere come FireEye possa:
    "aiutarti a soddisfare il requisito di notifica incidente entro le 72 ore dalla scoperta della breccia
    "ridurre il rischio e l'impatto di una potenziale breccia con la messa in sicurezza di dati sensibili e confidenziali, migliorando le capacità di risposta agli incidenti prima, durante e dopo un cyber attack
  • How to Cope with GDPR Strict Breach Reporting Rules
    How to Cope with GDPR Strict Breach Reporting Rules Stuart McKenzie, VP, Mandiant Consulting Mar 22 2018 2:00 pm UTC 45 mins
    Although GDPR is primarily a legal and compliance issue, a data breach is the point of failure that will highlight any deficiencies in an organization’s data protection and larger security posture.

    GDPR Article 33 requires breaches to be reported within 72 hours of discovery. With just 72 hours after breach discovery to report the nature of the breach, number of records and subjects affected, and likely consequences, every hour matters, and visibility across the environment becomes a must.

    With speed of response being critical, you need a trusted partner with the incident response expertise, threat intelligence and purpose-built technology to enable rapid initial notification, and to provide support with subsequent notifications once further data points are identified/obtained.

    Join the conversation with Stuart McKenzie, Vice President Mandiant EMEA, to talk about :
    · How FireEye can help you meet the GDPR 72-hour breach reporting requirement, should you be breached, and
    · How FireEye can help reduce the risk and impact of a breach by securing sensitive and confidential data and improving breach response readiness—before, during, and after a cyber-attack.
  • The Future of Passwords
    The Future of Passwords Hamza Sirag Mar 22 2018 5:00 pm UTC 75 mins
    This webinar will provide an overview of the future of passwords. Passwords have become very important, protecting a treasure trove of information. You will get an inside look at the techniques and tactics used conduct password attacks. We will discuss the various countermeasures available, new improvements made to the latest operating systems to prevent successful password attacks, and how the industry is trying to eliminate passwords. We will conclude by discussing ways we can potentially circumvent new countermeasures.

    Hamza Sirag Hamza is currently an Information Security consultant. He has spent the majority of his time immersed in the world of cybersecurity. He has had the opportunity to lead complex penetration tests for a variety of federal and commercial clients. He is the founder of Beltway Hackers, a Northern VA based meetup group focused on offensive cybersecurity. https://www.meetup.com/Beltway-Hackers
  • How to build a ransomware recovery plan that works
    How to build a ransomware recovery plan that works Darren Miller: Manager of engineering test and performance Mar 22 2018 5:00 pm UTC 60 mins
    How will your organization recover from the next ransomware attack? Join our live webinar to learn how a solid data protection plan can solve your ransomware woes.
  • [Earn 1 CPE]  Enabling Cybersecurity: Ignite Your ERM Program
    [Earn 1 CPE] Enabling Cybersecurity: Ignite Your ERM Program Colin Whittaker with Tim White, Qualys, Alon Yaffe, Barracuda; Cameron Jackson, Riskonnect; and Marc French, Mimecast Mar 22 2018 5:00 pm UTC 75 mins
    Effective risk management is critical for every organization, especially in the current era of increasingly frequent and complex cyber threats. Organizations with the ability to detect changes across global IT environments in real time can better prevent and respond to malicious acts such as ransomware/malware attacks and configuration tampering.

    Join our panel of InfoSec experts on this CPE accredited webinar to learn how your organization can take command of risk to proactively prioritize and address the risks that matter most, and ignite your risk management program to enable cybersecurity.

    Qualifying participants will earn 1 CPE credit.

    Learning Objectives:

    - Discover how to identify, catalog, and prioritize risks across the enterprise
    - Find out how to quickly measure critical activities and address inherited risk
    - Learn how to gain efficiency and effectiveness of current risk-management approaches
  • The Front Lines of Cyber Risk: 4 Steps to Protecting Endpoints from Ransomware
    The Front Lines of Cyber Risk: 4 Steps to Protecting Endpoints from Ransomware Lilac Schoenbeck, Vice President, Portfolio Marketing at Carbonite, George Crump, Founder & Lead Analyst, Storage Switzerland Mar 22 2018 6:00 pm UTC 60 mins
    When it comes to cyber-risk, the most exposed part of any organization is also the least protected; endpoints. Much of the data on laptops and other devices is unique and not stored on storage owned by the organization, but endpoints are often the first casualties of a cyber-attack. Given the new threat organizations need to provide complete protection, which not only includes protection from device failure but also ransomware attacks, device theft and litigation response.

    The challenge for IT is providing this protection without disrupting the user. If the protection solution gets in the way of the user, they will disable it, putting not only their data at risk but leaving the organization open to data loss and cyber-breach.

    In this live webinar, learn the four requirements of complete endpoint data protection:

    1. Truly Transparent Protection (silent deployment, bandwidth optimization, quick cache)
    2. Deployment Flexibility - On-premises, Public Cloud or Private Cloud
    3. Total Encryption - Protect data in-flight and at rest
    4. Beyond Backup Features - Remote wipe, Legal hold
  • Conversation with an Enterprise Architect: Solving IT & Storage Challenges
    Conversation with an Enterprise Architect: Solving IT & Storage Challenges Mike Grandinetti, CMO/CSO at Reduxio Mar 22 2018 7:00 pm UTC 30 mins
    Want to learn from your peers and have real valuable feedback on IT Management and Goals? Join this peer-to-peer webcast!

    This webcast has been created as a space to hold conversations with IT Infrastructure professionals who share similar concerns and challenges, as well as success stories and a real-world case study from George Barreto, Enterprise Architect at BFL Canada, on how he addressed the following:


    1. Meet IOPS requirements
    2. Spend time in labor-intensive operations such as VM Recovery
    3. Lack of team expertise for complex operations required his personal time in completing tasks

    Join us for live Q&A and discussion with fellow IT professionals!
  • Proactive Data Defence for Digital Transformation
    Proactive Data Defence for Digital Transformation Ian Greenwood, Regional Sales Manager UK&I Mar 23 2018 10:00 am UTC 60 mins
    Digital transformation is business enhancing and fraught with danger. With services moving online and into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking place in an increasingly precarious environment, more and more your corporate attack surface is being exposed.

    With data breaches at an all-time high and incidents of identity theft risen by 57% in a year, consumers are questioning the security of their personal data held by organisations. The rise of cloud and the Internet of Things, has forced companies to take control of their data – regardless of where it resides and in addition, reputational damage caused by public breach is firmly on the agenda of the board.

    This webinar will consider:

    • Key security considerations for a digital transformation strategy

    • Why a proactive data defence strategy is crucial

    • The benefits of maximising the level of control over data irrespective of where it is created, store or shared.