Hi [[ session.user.profile.firstName ]]

Data Center Management

  • 5 things you can do with a security policy management solution [APAC]
    5 things you can do with a security policy management solution [APAC] Jeffrey Starr, CMO & Edy Almer, VP Product Sep 26 2017 5:00 am UTC 60 mins
    Today’s enterprises are continuously evolving to support new applications, business transformation initiatives such as cloud and SDN, as well as fend off new and more sophisticated cyber-attacks on a daily basis. But security and network staff are struggling to keep up – which not only impacts business agility, but exposes your enterprise to risk and hampers its ability to address the modern threat landscape.

    Many professionals believe that they need latest and greatest new tools to address these challenges. But what if you already have what you need, up and running in your organization: your security policy management solution?

    Today’s security policy management solutions do a far more than automate traditional change management tasks. In this technical webinar, Edy Almer, VP of Products at AlgoSec highlights 5 key security management challenges facing enterprise organizations today and explains how AlgoSec’s solution can help you manage security, reduce risk and respond to incidents while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.

    This technical webinar focuses on:

    - Managing security policies end-to-end across public and private cloud including --Microsoft Azure, Amazon Web Services AWS, Cisco ACI and VMWare NSX
    - Mapping security vulnerabilities to their applications to assess and prioritize risk
    - Enable SOC engineers to tie cyber-attacks to business processes
    - Migrating Firewall policies between firewall brands
    - Performing a fully automated, zero-touch security policy change
  • 5 things you can do with a security policy management solution [US/UK]
    5 things you can do with a security policy management solution [US/UK] Jeffrey Starr, CMO & Edy Almer, VP Product Sep 26 2017 3:00 pm UTC 60 mins
    Today’s enterprises are continuously evolving to support new applications, business transformation initiatives such as cloud and SDN, as well as fend off new and more sophisticated cyber-attacks on a daily basis. But security and network staff are struggling to keep up – which not only impacts business agility, but exposes your enterprise to risk and hampers its ability to address the modern threat landscape.

    Many professionals believe that they need latest and greatest new tools to address these challenges. But what if you already have what you need, up and running in your organization: your security policy management solution?

    Today’s security policy management solutions do a far more than automate traditional change management tasks. In this technical webinar, Edy Almer, VP of Products at AlgoSec highlights 5 key security management challenges facing enterprise organizations today and explains how AlgoSec’s solution can help you manage security, reduce risk and respond to incidents while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.

    This technical webinar focuses on:

    - Managing security policies end-to-end across public and private cloud including --Microsoft Azure, Amazon Web Services AWS, Cisco ACI and VMWare NSX
    - Mapping security vulnerabilities to their applications to assess and prioritize risk
    - Enable SOC engineers to tie cyber-attacks to business processes
    - Migrating Firewall policies between firewall brands
    - Performing a fully automated, zero-touch security policy change
  • The Blockchain Bubble: Identifying viable  opportunities for blockchain
    The Blockchain Bubble: Identifying viable opportunities for blockchain Joe Pindar, CTO Office Director of Strategy Sep 26 2017 3:00 pm UTC 60 mins
    Blockchain technology is popping up everywhere from the currency market to smart contracts. The growth in the technology is evident from the investments being made, for example, PwC estimated that in the last nine last nine months of 2016, $1.4 billion had been invested globally in blockchain startups. This stems from its potential to enable efficiencies and cost-saving opportunities based on moving to a decentralized approach and away from the current centralized systems. With all the hype around blockchain, companies need to cut through the hype and ask the question - when does blockchain actually make business sense?

    Blockchain is not a silver bullet and cannot solve every problem. There is also the added complexity of managing the security of many distributed nodes can only be justified by gaining business benefits from using blockchain. In this webinar, we will look at a business qualifying approach to blockchain to help you evaluate valid blockchain use cases and identify the security needs surrounding blockchain operations. Join us to learn more on:
    •Securing blockchain from the edge to the core
    •The operational benefits and pitfalls of blockchain technology
    •Our 4 step qualification process for blockchain business opportunities:
    1.Is there an established business process?
    2.Are there more 3 parties involved – i.e. is it a distributed problem?
    3.Is it important that the data being exchanged is trusted and considered to be factually accurate?
    4.Would automation improve the performance of the process?
  • The Next Level of Smarter Endpoint Protection: Going Beyond Anti-Virus Products
    The Next Level of Smarter Endpoint Protection: Going Beyond Anti-Virus Products Jim Waggoner, Sr. Director, Product Management Sep 26 2017 3:00 pm UTC 60 mins
    Antivirus (AV) protection has been the foundation for endpoint security for decades despite its known gaps. To address evolving threats, organizations need an integrated endpoint solution that can fortify their defenses.

    On September 26, Jim Waggoner, Sr. Director, Product Management for FireEye will detail:
    •Why endpoint security products have not provided complete protection
    •Capabilities required for a comprehensive endpoint protection solution
    oAV with threat intelligence
    oDetection and response
    oBehavior and exploit analysis
    oVisibility and automation
    •How the latest FireEye Endpoint Security solution enables you to go from detection to investigation and remediation quickly, all with a single agent

    Attend this webinar as the first step toward a smarter, more adaptive approach to endpoint security.
  • 6WIND & Intel Deliver 50%  Performance Increase for SW-based Security Gateways
    6WIND & Intel Deliver 50% Performance Increase for SW-based Security Gateways Kelly LeBlanc, VP of Marketing for 6WIND Sep 26 2017 3:00 pm UTC 45 mins
    Data centers and managed network operators looking for performance-oriented IPsec applications can now turn to Intel® Xeon® Platinum 8170 processors and 6WIND Turbo IPsec™ network software on commercial-off-the-shelf (COTS) servers.

    In this Webinar, attendees will learn how 6WIND Turbo IPsec performance tests on servers based on Intel® Xeon® Platinum processors demonstrate a 50% increase in processing power for common applications such as multi-site VPNs and backhaul security gateways. This performance benefit also scales in conjunction with the addition of cores. These applications are designed for today’s multi-core processor environments, driving a significant price/performance value proposition over legacy hardware.
  • ANSI/TIA-942-B, The Important Non-Network Changes
    ANSI/TIA-942-B, The Important Non-Network Changes Edward van Leent Sep 26 2017 3:00 pm UTC 60 mins
    The new release of the TIA-942-B has many great improvements. Other webinars have addressed the changes to the network chapters. But what about all the other important chapters? This webinar will address changes made to the Rating (a.k.a. Tier) system as well as other non-network related changes. This webinar will cover the important updates critical to those who design, build, and own/operate data centers.

    The speaker, Edward van Leent, Chairman & CEO of EPI Group of Companies, is a long-standing TIA-942 committee member and active contributor. He is a highly experienced data center veteran with over 30 years of experience and has personally audited and overseen the audits of hundreds of data centers all over the world.
  • Hitting Your Data Protection Sweet Spot
    Hitting Your Data Protection Sweet Spot Storage Switzerland, Carbonite Sep 26 2017 4:00 pm UTC 60 mins
    The data protection process sometimes has objectives that seem to be in opposition to one another. On one side, the organization needs rapid and frequent data captures so that RPOs and RTOs are met. On the other side, there is a need for cost effective long term retention so that the organization is protected from ransomware. Finding the right balance between these extremes is called hitting the data protection sweet spot. In this live webinar, experts from Storage Switzerland and Carbonite will help you get there.
  • Making the Digital Transformation a Reality
    Making the Digital Transformation a Reality Laura DuBois, IDC & Ashvin Naik, Dell EMC Sep 26 2017 4:00 pm UTC 60 mins
    Making Digital transformation real is a tough challenge for most businesses. A successful strategy is to start with a data platform that simplifies data collection, consolidation, protection and preservation which further drives insights, and services at scale. Laura Dubois, Group Vice President of Storage, Servers, and Infrastructure at IDC joins us to discuss why organizations should be prioritizing the data platform as they embark on their digital transformation journey.
    In this webinar you will learn about industry trends that are reshaping how IT is used as a strategic asset extracting the value of your data effectively. You will also learn about how Elastic Cloud Storage (ECS) can build on insights to modernize and build cloud native applications accelerating your move to the third platform and beyond.
  • Cloud Object Storage and the Use of Gateways
    Cloud Object Storage and the Use of Gateways Dan Albright, Cloud Object Storage Program Manager, IBM, Alex McDonald, SNIA Cloud Storage Chair, NetApp Sep 26 2017 5:00 pm UTC 75 mins
    The use of cloud object storage is ramping up sharply, especially in the public cloud, to reduce capital budgets and operating expenses. However, enterprises are challenged with legacy applications that do not support standard protocols to move data to and from the cloud.

    Enterprises have developed strategies specific to the public cloud for Data Protection, Archive, Application development, DevOps, Big Data Analytics and Cognitive Artificial Intelligence. However, these same organizations have legacy applications and infrastructure that are not cloud friendly.

    Object storage is a secure, simple, scalable, and cost-effective means of managing the explosive growth of unstructured data enterprises generate every day. Gateways enable SMB and NFS data transfers to be converted to Amazon’s S3 protocol while optimizing data with deduplication and providing QoS efficiency on the data path to the cloud.

    This webcast will highlight the market trends toward the adoption of object storage and the use of gateways to execute a cloud strategy, the benefits of object storage when gateways are deployed, and the use cases that are best suited to leverage this solution.

    Join this webcast to learn:
    •The benefits of object storage when gateways are deployed
    •Primary use cases for using object storage and gateways in private, public or hybrid cloud
    •How gateways can help achieve the goals of your cloud strategy without
    retooling your on-premise infrastructure and applications
  • Improve application response times with Software-defined Storage?
    Improve application response times with Software-defined Storage? Sushant Rao,Sr. Director of Product Marketing, DataCore & Bill Hansen, Sr. Product Manager & Product Planner, Lenovo Sep 26 2017 6:00 pm UTC 45 mins
    Surveys show that 61% of companies have experienced slow applications after server virtualization, with 77% pointing to I/O problems as the culprit. Companies are desperately trying to improve their I/O performance to speed-up applications and increase VM density.

    The most common performance measurement is IOPS, but is this the best metric?

    IOPS depends on a number of variables, including the type of workload being simulated, read/write percentages, sequent/random percentages and block size. Most importantly, IOPS doesn’t indicate the response time.

    In this webinar, we’ll discuss better ways to measure response times as I/O increases. These metrics will help you understand why some storage products can claim high number of IOPS but still perform poorly when they are used for critical applications in production.

    We will also show how a software-defined storage appliance (the Lenovo DX8200D Powered by DataCore) can speed up your applications.
  • HPC Comes of Age: Handling Large Data Sets with Object Storage
    HPC Comes of Age: Handling Large Data Sets with Object Storage Glen Olsen, Product Manager Sep 26 2017 6:00 pm UTC 60 mins
    High-Performance Computing (HPC) has come of age, and object storage is a key enabler as we have access to larger and larger data sets. Join Caringo Product Manager Glen Olsen to learn how object storage can be used to manage massive pools of data and how Caringo's multi-protocol ingest capabilities, elimination of storage silos and advanced search capabilities are enabling organizations in the 21st century.
  • [Panel] Protecting Data in the Age of Ransomware
    [Panel] Protecting Data in the Age of Ransomware Josh Downs, BrightTALK; David Cook, Eversheds Sutherland; Jonathan Wright, Commvault & Jason Kent, AsTech Consulting Sep 27 2017 12:00 pm UTC 60 mins
    - Protecting Data in the Age of Ransomware -

    2017 was a bumper year for Ransomware; with WannaCry & notPetya grabbing headlines around the world and instilling fear in the hearts of security professionals around the globe.

    With GDPR regulations on the horizon and potentially huge fines for badly protected and breached data, security professionals need to improve their defensive stature and ensure that their organisation's data is fully protected from end to end.

    This roundtable discussion will discuss how to best protect your data so if it falls into the wrong hands, you won't end up on the front of the worlds' papers!

    Topics for discussion:

    - Why ransomware should still be top of your list of concerns in 2018

    - Methods to protect your organisation's sensitive data

    - Steps to take if your organisation does suffer a damaging breach
  • Are you Ready for DFARS?
    Are you Ready for DFARS? Eric Avigdor, Director of Product Management at Gemalto Sep 27 2017 3:00 pm UTC 60 mins
    With the deadline for DFARS (Defense Federal Acquisition Regulation Supplement) quickly approaching, many business are scrambling to meeting compliance requirements. An important part of DFARS addresses the need for strong, two-factor authentication, as well as physical access controls to organizational information systems, equipment, and the respective operating environments to authorized individuals.
    Are you prepared? If you’re like many other government contractors and subcontractors, a little advice may be needed to navigate the waters of physical and user access controls.
    Gemalto’s Identity and Protection expert, Eric Avigdor, will be present and informative look at DFARS and what options are available to ensure compliance. What Eric will discuss:
    •Overview of DFARS mandate
    •Use cases – our experience from the field
    •Comprehensive solutions that meet the multi-factor authentication and physical access controls required by the DFARS mandate
    •Mapping solutions to the needs of your department
  • Virtualizing Media Broadcast: TV Transformed
    Virtualizing Media Broadcast: TV Transformed Steve Smith, Limor Schafman Sep 27 2017 3:00 pm UTC 75 mins
    Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.

    Speakers:
    Steve Smith, CTO, Cloud, Imagine Communications
    Stephen Smith is the CTO, Cloud, for Imagine Communications, where he leads the transformation of solutions to support media and entertainment markets in a future defined by IP, software, virtualization and cloud. Previously, Smith was the Executive Director of Media Systems at Starz Entertainment in Colorado, where he was responsible for the technology, implementation and operation of their Media Asset Management and Content Processing platforms. With 20+ years in the industry, Stephen has extensive experience in architecting, deploying, owning and operating complex media processing, origination and distributions systems.

    Host: Limor Schafman, Content Development Director, TIA
  • Power-up Your Cloud with Insanely Fast Storage
    Power-up Your Cloud with Insanely Fast Storage Boyan Ivanov, CEO, StorPool Storage Sep 27 2017 3:00 pm UTC 45 mins
    Building or running a cloud?
    Attend this webinar to explore the great impact which an outstanding storage solution can have on your entire public or private cloud. Intel and StorPool have created a production tested solution, which you can use to build faster, safer and more efficient clouds.

    Join us to learn how:
    •an outstanding storage solution can improve your entire cloud;
    •reduce costs and eliminate vendor lock-in by using software-defined infrastructure on standard hardware;
    •solve IOPS or latency issues of your applications;
    •get a storage solution capable of delivering 450,000+ IOPS and 0.25 ms latency at less than $40,000;
    •boost your business' margins and agility.
  • Protect Your Data Privacy with Data-Centric Security
    Protect Your Data Privacy with Data-Centric Security Stuart McIrvine Vice President, Mainframe Security Product Management Sep 27 2017 5:00 pm UTC 60 mins
    Data privacy isn’t an easy task, you need to ensure the security of sensitive information while complying with a variety of regulations. But data privacy never ends and the laws are constantly changing. The answer? A data-centric security strategy covers all corporate data, so you can connect everyone to everything while staying in complete control. The challenge? Knowing where all your mainframe data is located, how it’s being used, who has access to it, and whether it’s compliant with industry regulations.
    Join Stuart McIrvine, Vice President of Mainframe Security Product Management to cover the foundation of building data-centric security strategies that cover all corporate data, simplify regulatory compliance, and outline how to leverage security as a competitive advantage, from mobile to mainframe.
  • How the GDPR Impacts Your Enterprise Mobility Management Practices
    How the GDPR Impacts Your Enterprise Mobility Management Practices Magnus Mjøsund, Apperian Product Manager & Chris Marsh, 451 Research Director, Workforce Productivity & Compliance Sep 28 2017 2:00 pm UTC 60 mins
    The European Union’s General Data Protection Regulation (GDPR) that goes into effect on 25 May 2018 expands the meaning of personal data, mandates when such data can be collected, and enforces full transparency and consent from the user. Organizations of all types processing data from EU residents must evaluate and likely make changes to their enterprise mobility management practices in order to adhere to the new law or face severe penalties.

    Join this webinar to understand what GDPR means for infrastructure and operations professionals that are responsible for mobile and endpoint strategy to make sure your organization is compliant from day one.

    We will review the most important sections of the law related to enterprise mobility from an administration and end user perspective as well as the implications for BYOD programs. EMM should be leveraged to meet GDPR requirements and you will learn how a mobile application management solution like Apperian supports privacy and mitigates risk by managing corporate data while leaving personal data untouched.
  • How To: Configuration Management for Macs in the Enterprise
    How To: Configuration Management for Macs in the Enterprise Nick Thompson, Product Manager, Jamf Sep 28 2017 3:00 pm UTC 30 mins
    Configuring PCs for employees has been a pillar of enterprise IT for years. But, with Mac growing in popularity due to user demand, IT needs a streamlined method to manage Mac as efficiently as PC.
    In our webinar, How To: Configuration Management for Macs in the Enterprise, we’ll explain how organizations can best prepare Macs for employees while aligning with PC security requirements.

    You’ll learn:

    •New ways to deploy Macs
    •What configurations are available for macOS
    •How to meet security standards for Mac

    Presenter Info:
    Nick Thompson is on the product team at Jamf, an Apple device management solution for IT professionals. Nick is passionate about technology in the enterprise and closely follows the enterprise mobility management industry. He previously worked at Apple helping companies implement Mac and iOS deployments.
  • Fibre Optic Cleaning Can Prevent SAN Downtime
    Fibre Optic Cleaning Can Prevent SAN Downtime John Ford & Scott Ramsay Sep 28 2017 4:00 pm UTC 60 mins
    Both Dell EMC and our customers consume considerable time and effort to replace optics/SFPs in our switches, directors and storage arrays. This expense in time, effort and product is frequently unnecessary. The Fibre Cable Cleaning initiative creates an opportunity to identify and to simplify these situations, avoiding Service Request creation and reducing remediation time through customer education and self-service.
  • The Increasing Risk of DDoS Attacks – Are You Adequately Prepared?
    The Increasing Risk of DDoS Attacks – Are You Adequately Prepared? Tom Bienkowski Director of DDoS Product Marketing Arbor Networks + John Pearson Founder and Chief Strategist IP Networks Inc. Sep 28 2017 4:00 pm UTC 60 mins
    The data is crystal clear. DDoS attacks are dramatically increasing in size, frequency and complexity. Unfortunately, many organizations have been severely impacted by DDoS attacks simply because they either assumed they would never be the target or they thought they had adequate protection in place. Join IP Networks and Arbor Networks - the industry leader in DDoS attack protection products and services to learn:

    -The latest trends in DDoS attacks
    -The importance of proper network visibility for anomaly & DDoS attack detection.
    -Best practices in DDoS attack defense; including an intelligent combination of in-cloud and on-premises attack protection solutions - which offers the most comprehensive form of protection.
  • Risk-Cloud-Crypto
    Risk-Cloud-Crypto Donald Parker, CISSP, CCSK, ITIL, MCSE Sep 28 2017 5:00 pm UTC 60 mins
    The three emerging pillars of cybersecurity include Risk Management, Cloud Security, and Cryptography. Cybersecurity can't be implemented efficiently without risk management. The cloud is taking over and here to stay. Cryptography is the clue that holds it all together.

    Donald Parker, CISSP, CCSK, ITIL, MCSE

    As a Sergeant in the US Army, cybersecurity instructor, inventor, author, and consultant to the Federal Government, Donald Parker has dedicated his entire career of over 23 years to the Information Technology industry with a special focus on Information Security. Mr. Parker has taught CISSP and other cybersecurity classes all over the United States and abroad, including Holland, Germany, and Guam. He holds a US patent for a physical computer security device that he believes will provide the greatest defense to one of the greatest threats on the Internet, Bot Networks. He has also developed a mechanical cryptographic cipher. Donald has authored a book on passing the CISSP exam and has published an audio version of the book online with over a million downloads. He has helped federal agencies and fortune 100 corporations comply with the ever-evolving cybersecurity landscape. As an independent consultant and small business owner for the past 10 years, he successfully completed more than a dozen short to midterm contracts. The knowledge gained from more than 25 different public and private sector environments has afforded him a birds-eye view of this exciting new field. Many of Mr. Parker’s customers and students refer to him as a one-man band in the since that; he can identify the laws, regulations, requirements and policies that an organization must comply with and actually implement the security controls necessary to demonstrate compliance. Donald has developed a STEM program to teach kids and young adults cyber security basics and prepare them for capture the flag competitions.
  • Azure, AWS move toward the edge: have they gone far enough?
    Azure, AWS move toward the edge: have they gone far enough? Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Sep 28 2017 5:00 pm UTC 60 mins
    While Amazon and other cloud vendors shouldn't predicate their businesses on huge data centers in the middle of nowhere, most IoT applications that require instantaneous response and user interactivity shouldn't be in the cloud, either. With AWS' recent announcement of Greengrass, and Microsoft allowing customers to run its Azure cloud technology directly on their own infrastructure, more organizations are making a move to the edge. So, what does this mean for your business? During this webinar, we'll discuss the future of the edge and how your organization can best leverage it.
  • Standing in the Gap: Ransomware and the Role of the MSP
    Standing in the Gap: Ransomware and the Role of the MSP Garrett Gross, Director of Field Enablement, AlienVault Sep 28 2017 5:00 pm UTC 60 mins
    Ransomware continues to be one of the most intrusive and pervasive threats today. With organizations of every size and vertical being a potential target, the opportunity exists for traditional MSPs to offer security-as-a-service to help customers protect, detect and respond to such threats.

    But, just how bad is the ransomware threat? It's worse than you may think and organizations are not doing enough to combat it.

    Hear from industry expert Nick Cavalancia and Garrett Gross, Director of Field Enablement, from AlienVault as they discuss:

    - The current state of the ransomware threat
    - Common ransomware scenarios, responses, and outcomes
    - The opportunity that exists for MSPs to stand in the gap
  • Everything You Wanted to Know About Storage - Cyan: Storage Management
    Everything You Wanted to Know About Storage - Cyan: Storage Management Richelle Ahlvers, Broadcom, Mark Rogov, Dell EMC, Alex McDonald, NetApp, J Metz, Cisco Sep 28 2017 5:00 pm UTC 75 mins
    Storage can be something of a “black box,” a monolithic entity that is at once mysterious and scary. That’s why we created “The Everything You Wanted To Know About Storage But Were Too Proud to Ask” webcast series. So far, we’ve explored various and sundry aspects of storage, focusing on “the naming of the parts.” Our goal has been to break down some of the components of storage and explain how they fit into the greater whole.

    This time, however, we’re going to open up Pandora’s Box and peer inside the world of storage management, uncovering some of the key technologies that are used to manage devices, storage traffic, and storage architectures. In particular, we’ll be discussing:

    •Storage networking management protocols
    •SMI-S – The bread-and-butter of vendor-neutral storage management
    •SNIA Swordfish – The new storage management solution gaining widespread momentum
    •Software-Defined Storage – the catch-all term for storage that includes architectures and management

    There’s so much to say on each of these subjects we could do a full webcast on any one of them, but for a quick overview of many of the technologies that affect storage in one place, we think you will find your time has been well spent.

    Join us on September 28th, 2017, for our continuation of the “Too Proud To Ask” series with Cyan, the Storage Management Pod.
  • Automating Critical Security Controls for Threat Remediation and Compliance
    Automating Critical Security Controls for Threat Remediation and Compliance John Pescatore and Tim White Sep 28 2017 5:00 pm UTC 60 mins
    Trends like the increased use of cloud computing by businesses and their vendors introduce new complexities in reducing risk and assessing security across the supply chain. Demonstrating continuous risk reduction and compliance with internal policies and external regulations, fixing violations and configuration drift, centrally managing exceptions, and documenting progress are all common challenges.

    The Center for Internet Security’s (CIS) Critical Security Controls (CSCs) were selected and prioritized by leading security experts to stop today’s most common and serious cyber threats. By implementing these controls, organizations can improve their security posture and reduce the risk of threats to critical assets, data, and network infrastructure.

    In this webcast, SANS Senior Analyst John Pescatore and Tim White, Director of Product Management for Qualys Policy Compliance (PC), will discuss how you can achieve continuous security and compliance, and leverage Qualys solutions to address all 20 CSCs.

    The presentation will encompass:

    • An overview of the CIS Critical Security Controls, including ongoing updates
    • Success patterns organizations have demonstrated for using the controls to their advantage
    • How an automation can reduce the staffing load to determine whether controls are in place and effective
    • How to prioritize remediation efforts
    • Real-world examples of recent attacks that leveraged misconfigured systems

    This webcast will include a demo and Q&A session with the speakers.