Cloud computing is the current IT buzzword of choice, and many organisations are contemplating it. But what happens to Data Protection when you surrender your data to the cloud? Join this introductory course to find out. Our expert speaker, Ibrahim Hasan, will cover the UK Data Protection Act perspective and how to address the legal issues.
Virtual desktops are being widely adopted as a cost-effective way of providing users access to enterprise applications. Performance of these desktops and the scalability of virtual desktop deployments are a key to the success of these IT initiatives.
In this webinar, Jeff Stokes, Senior Content Developer, Microsoft and Bala Vaidhinathan, CTO, eG Innovations will focus on Windows virtual desktops and VDI image creation best practices that you can adopt to get the most of your virtual desktop infrastructure investments. Some topics will include:
- Best practices for building images in persistent and non-persistent virtual desktop deployments
- Tools for building optimized virtual desktop images
- Optimization techniques for Windows 7, 8 and 10 workloads
- Performance impact of changes and how to measure them at the desktop level
Didn't get the chance to attend Dreamforce 2015? There's nothing like it. Listen to Salesforce Marketing Cloud personalities, Joel Book and Heike Young, as they dish on their top ten takeaways for marketers from four packed days of inspiration, imagination, and innovation.
In this 30-minute webcast, industry experts Mike Rothman, President of Securosis Research and Wolfgang Kandek, CTO of Qualys will share their top recommendations for making the most of National Cyber Security Awareness Month. With data breaches in the headlines of nearly every online magazine, it’s never been a better time to maximize cyber security awareness and translate it into pragmatic results for the enterprise.
During this webcast, attendees will learn
* Which tactics have the greatest effect on fostering cyber security awareness throughout the enterprise
* How to foster a risk-aware security culture while still encouraging trust among your employees and partners
* How to bridge the gap between IT security and IT operations (hint: knowing more about your assets is the first step)
Haz tus preguntas técnicas directamente a un Arquitecto de Soluciones en Español y recibe una respuesta en vivo.
Puedes hacer las preguntas en el momento o enviarlas con antelación a email@example.com. En el email por favor incluye tu NOMBRE, EMPRESA, y PUESTO.
Esta primera sesión se dividirá en dos partes: Los primeros 30 minutos se dedicarán a contestar preguntas relacionadas con Big Data Analytics (EMR, Redshift, Kinesis) y la segunda parte de 30 minutos a responder preguntas generales.
Solid state drives used to be a premium product with a premium price, but falling costs combined with improved performance have made them accessible to virtually all types of businesses for all types of applications.The dynamics of data storage have changed, so the overall cost of solid state and flash have become a better price-performance value than spinning disk. And solid state offers big benefits in reliability and manageability, in addition to increased capacity and speed.
Join industry experts from SanDisk and Lenovo to explore how to:
• Improve TCO/TCA
• Improve performance
• Reduce power and cooling costs
• Reduce rack space & cabling
• Improve reliability
Veritas NetBackup appliance è la soluzione efficace e innovativa che semplifica e ottimizza le procedure di backup e recovery.
Una soluzione pratica che garantisce la scalabilità necessaria per adattare il tuo business ad ambienti, fisici, virtuali e cloud. Performance ed efficienza cresceranno insieme ai profitti: i tuoi team potranno dedicarsi ai clienti e alle attività di business, promuovendo al meglio l'innovazione!
Che benefici puoi ottenere con le appliance NetBackup di Veritas?
Scoprilo partecipando al nostro Webcast del 7 ottobre.
In questa sessione di un'ora, coordinata da un Solution Architect, risponderemo alle vostre domande di natura tecnica riguardanti l'utilizzo dei prodotti AWS. In particolare, i primi 30 minuti saranno dedicati al topic "Analisi di Big Data (EMR, Redshift, Kinesis)" e i successivi 30 a domande di qualsiasi tipo.
Comprenez ce qui s’est passé et rétablissez l’activité rapidement
Au cours des deux premiers webcasts, nous avons vu pourquoi les violations sont inévitables et comment détecter rapidement un menace avancée. Dans ce dernier épisode, nous allons voir comment Advanced Threat Protection peut efficacement résoudre le problème et supprimer les malwares de vos systèmes. Rétablir l’activité, cependant, ne suffit pas : il faut aussi améliorer sa préparation pour l’avenir. Nous y viendrons également
Webcast 1: Advanced Threat: que faire en cas de violation de sécurité inévitable? - https://www.brighttalk.com/webcast/5691/170167
Webcast 2 - Advanced Threat Protection : j’ai subi une violation de sécurité, que s’est-il passé ? - https://www.brighttalk.com/webcast/5691/170173
Featuring Ben Person, Manager, ServiceNow Delivery, Dell Services, this video provides an overview of how the combined capabilities of Dell IT service management and ServiceNow helps you easily align IT with your business objectives. Learn how Dell Services can help ensure seamless service, proactive and responsive interaction and quality delivery.
Joe Weiss, CISM, CRISC, ISA Fellow, IEEE Senior Member, Applied Control Solutions, LLC
ICSs (Industrial Control Systems) make up part of the “Internet of Things” and are used throughout the industrial infrastructures of electric power, water, pipelines, manufacturing, and transportation. ICSs are technically and operationally different than business IT systems. The policies, technologies, testing, and forensics used to secure IT may not be applicable to ICSs. For IT, Cyber security generally means malicious attacks using the Internet and targeting Windows systems. The same is not true for ICSs. There have already been more than 700 actual ICS cyber incidents causing impacts from trivial to significant environmental releases to equipment damage to deaths. However, very few of these incident have been identified as being cyber-related. This webinar will address what is ICS cyber security, why is ICS cyber security different than IT, what has actually been happening with ICS cyber security, and what should be done to help secure these critical systems.
Randy Jessee, Director Product Management & Mike Heberling, Solutions Director Voice | HEAT Software Inc. |
Managing IT services has rarely been as challenging as it is today. Many IT organizations are being called upon to improve service levels while being asked to control costs. In this webinar, you’ll learn about three approaches IT organizations can take to streamline incoming service inquiries to improve productivity, efficiency and agility to handle escalating demands without increasing costs. Join us to learn more about how to:
• Cut the incident backlog
• Increase first call resolution
• Reduce mis-assigned tickets
• Create more self-service opportunities
• Modernize the user experience
• Focus more on business issues and outcomes
Advanced Persistent Threats (APTs) are in every network. They rely on you being overwhelmed by alerts and unable to follow up and respond to attacks - it typically takes days, weeks, sometimes months to resolve a cyberattack (the Ponemon Institute found it takes 32 days, on average, to close out a cyberattack). This is time you don't have. Attend this webinar to see how to change this paradigm and mature your incident response so you can quickly uncover, contain and remediate attacks in your network.
See how other companies have used modern automation technologies to take their Incident Response to the next level:
· Investigating everything – no more prioritization or alerts going unhandled
· Quickly mitigating threats – including large scale cyber events – to close the window of opportunity for attackers
· Applying IR best practices – through codified logic and intelligent decision-making algorithms that take the complexity out of IR
This year over 85% of large organizations were targeted by advanced attackers according to Symantec’s 2015 Internet Security Threat Report. Was your organization one of them?
With targeted attacks on the rise, organizations need to leverage adversary and threat intelligence with advanced security analytics to accurately detect and respond to early indicators of compromise and avoid the risk of experiencing a high impact breach.
In this webinar, Security experts from LogRhythm and Symantec explain common ways networks are targeted and explore best practices for effectively prioritizing and responding to threats that have penetrated the network. They will also discuss how actionable adversary and threat intelligence generated by Symantec DeepSight can be automatically consumed by LogRhythm’s Security Intelligence Platform to correlate external threat data with other high risk events recognized across the IT environment to immediately expose highly concerning activity.
Key themes to be covered include:
•Emerging attack motives and strategies
•Maximizing prevention, detection, and incident response
•Corroborating external threat intelligence with behavioral changes on the network
•Prioritizing threats to prevent attack propagation
George J. Anderson, Product Marketing Director at Webroot Inc.
Web security is back on the IT Security agenda in a big way. With breaches caused by web usage at an all-time high security professionals are realizing that relying solely on endpoint security to protect their users is downright negligent.
This presentation explores why with this reappraisal is happening and why so many companies are opting for SaaS cloud-based Secure Web Gateway solutions. It also looks at how Webroot, using its BrightCloud Threat Intelligence platform, have completely updated their existing cloud-based web security service to provide a new logical first line of security defense for web users.
1.Why web security should be the primary user security defense layer?
2.The advantages of cloud-based web security over traditional on-premise solutions.
3.The benefits your organization will see as a result of cloud-based web security.
TJ Alldridge, Product Marketing Manager, HP TippingPoint
Advanced threats and targeted attacks are wreaking havoc in our networks and desktop machines. High-profile attacks seem to make headlines every few weeks. While no security solution is 100% effective, join us to discuss best practices that could bring your security effectiveness closer to that goal.
Kevin Peterson, Director of Security & Network Transformation, Zscaler & Mark Stafford, Senior Cyber Consultant, BT Security
Cyber security is now a topic of discussion at the majority of board meetings, according to a recent NYSE/Veracode survey*. It is no longer just an IT issue, a policy or compliance issue – it is a corporate risk issue. Forrester Inc., states that CEOs are now mainly held responsible for data breaches – a shift from it solely being the responsibility of the CISO. According to them, any lapses will cost executives their job**. The stakes are very high and getting it wrong has significant consequences, including:
- Brand damage due to customer loss
- Loss of competitive advantage due to corporate espionage
- High cost of responding to a breach
How prepared is your organization to handle a security breach and discuss this in the boardroom?
This webcast will address cyber security priorities being discussed at the boardroom level, including:
- Managing security risk in today’s digital world
- Securely leveraging key technologies such as cloud, mobile and analytics
- Addressing security gaps across the ecosystem of customers and suppliers
- Effectively engaging at the boardroom level, reviewing key metrics and aligning strategy with business priorities
*NYSE/Veracode 2015 Survey: Cybersecurity in the Boardroom
**Forrester Inc., Report: Security Leaders, Earn Your Seat At The Table
Managing cyber risk isn’t just about protecting your own house. As we’ve learned from Target and other major breaches, organizations must also be diligent in overseeing risks to vendors, business associates, and other third parties that have access to sensitive data or provide important services. For credit unions, regulatory pressure and cost concerns can make this a daunting task.
Fortunately, there are several cost-effective, proactive measures organizations immediately take to mitigate third party cyber risk. Join Jacob Olcott, VP of Business Development at BitSight Technologies as he discusses ways to get started on a vendor risk management program. Viewers will learn:
Five steps you can take immediately to mitigate third party cyber risk
The types of businesses in your supply chain that may pose risks
How BitSight Security Ratings streamline the process of vendor risk management
Jeanne Morain, Business Technology Specialist; Alex Ryales - IOT Strategist Avnet
The Internet of Things is an ideal concept for the digital connected world that we live in. Many technology organizations disagree because of the security risks. What are the top security risks? How do you address them before it becomes an epidemic? Join Jeanne Morain with special guests Alex Ryals & TBD to learn more about the best practices when planning your IOT strategy.
Jonathan Smith, Application Security Specialist, WhiteHat Security
This presentation will demonstrate the value of manual business logic assessments and provide an example of a vulnerability that scanners cannot find because the problem isn’t in the code or framework.
We will provide a real life instance of a business logic flaw at a major high-end clothing retailer. The flaw allowed malicious users to purchase negative amounts of expensive merchandise, and credit thousands of dollars to their accounts.
Watch a cyber-attack unfold live to show you how your vendors can unwittingly leave the door open to your network and understand how to prevent these by managing, controlling and auditing all vendor access This webcast will offer best practice recommendations on how to secure vendor access to your organization. Hear top tips on how to protect your company and customer data, infrastructure and assets from cyber-attacks by securing vendor access while improving productivity.
This webinar will offer best practice recommendations on how to secure vendor access to your organisation. Hear top tips to protect your company and customer data, infrastructure and assets from cyber-attacks by securing vendor access whilst improving productivity.
Sunil Choudrie and Laurence Pitt – Security Solution Specialists
Understand what happened, and get back on track fast
Identifying and neutering a breach is only half of the work that needs to be done – now the business needs to know what systems were impacted, clean up the damage and get things back to normal. Advanced threat technology has visibility from the cloud into network and onto endpoints. This means unparalleled visibility into not only what happened, but also what was affected and how best to clean up after a breach. A complex attack will not be simple, and it will have spread fast, but being able to understand the route taken into the network makes it simpler, and faster, to deploy a security response, and use what has been learned to ensure better preparation for the future.
Missed the first 2 webcasts?
Webcast 1: If a breach is inevitable, what should I do? How best to prevent attack, and keep bad stuff out - https://www.brighttalk.com/webcast/5691/170123
Webcast 2 - I’ve been breached, what happened? What happens when bad stuff gets in, how to react fast - https://www.brighttalk.com/webcast/5691/170133
We live in a world where technological change is rapid. There is a race against time to be faster and better than the competition. Businesses will need to change as a result of technology disruption or risk becoming irrelevant to their customers. It is during these times of tumultuous change and uncertainty when the unexpected - new attack opportunities and tools - are presented to cybercriminals to steal, harm or destroy the digital assets of organisations in an unprecedented way and scale.
In this presentation, Rik will identify the top disruptive technologies to government and business today and examine the impact of such innovations on the cybersecurity of corporate networks. He will also provide recommendations to assist organisations to prepare for the unexpected threats and challenges that will arise from technology disruption in the future.
Many security vendors claim to have access to the security intelligence and analytical capabilities needed to identify the trace elements of malware activity before cyber-attacks take place.
They claim the ability to identify threats and data breaches at the earliest possible stage. Even accepting that the average time to detect a breach has halved over the last eighteen months, a discovery and remediation timeline that is still close to 200 days is by any standards far too long.
This presentation looks at what can be done to improve things and what businesses should be demanding from there security service providers.
Patrick Grillo, Senior Director, Security Solutions, Fortinet
Advanced Threat Protection is built on the principle of Prevention, Detection and Mitigation. However, if the different technologies within each of these areas operate independently, there will be gaps between the different elements, gaps that can and will be exploited during an attack.
This session will focus the concept of bringing together all of the elements of Advanced Threat Protection to form a holistic, collaborative solution that encompasses all of the network.
Barry Fisher, Sr. Product Marketing Manager OpenDNS, now part of Cisco
Next-generation firewalls and sandboxes stop attacks at various steps, but they only react to malicious communications and code after attacks have launched.
There’s another way—observing where attacks are ‘staged’.
We’re going to demonstrate how we can visualize Internet infrastructures for visibility into where attacks will emerge. Then, we’ll know where advanced malware will be downloaded and where compromised systems will callback—before attacks launch.
In this live session, you’ll learn:
7 steps of an attack and how you can use this data to get ahead of new security events.
3 ways to uncover malicious activity by looking at domain names, IP addresses, and autonomous system numbers (ASNs).
How to apply this intelligence to your current defenses.
Every day, your organization is creating more data that is critical to the operational success of your company. Making sure that you have a proper backup solution to recover data is not only important, it’s vital to the long term success of your business.
Even though users are creating more mission critical data than we have ever seen in the past, that doesn’t mean your backup solution has to be expensive. In this webinar we cover a wide range of options about how you can effectively backup your content without breaking the bank.
The solutions we will cover will take into account being highly fault-tolerant, mindful of high performance, and assurance that your data will be available when you need it.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.