Browse communities
Browse communities
Presenting a webinar?

IT Governance, Risk and Compliance

Community information
Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
  • As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources, including SSL. To help improve how encryption is used, Qualys created a research project called SSL Labs to address two major problems of the ecosystem: lack of tools and documentation.
  • As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.

    In this webinar, Eric and Dave will discuss:

    • How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
    • How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
    • Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
  • Sutter Health is a not-for-profit health system serving more than 100 communities in Northern California. Each year its 5,000 physicians care for more than 10 million outpatient visits and discharge more than 200,000 in-patients.

    As healthcare systems transition from “fee for service” to “fee for value” reimbursement models, there is an increasing focus to drive down 30-day re-admission rates, particularly for high risk patients. To this end, Sutter Health is piloting Project RED (Re-engineered Discharge) which leverages predictive analytics to identify high-risk patients and then prescribes alternative discharge workflows aimed at lowering the risk of re-admission.

    Join us as Kristen Wilson-Jones, Sutter RD&D CTO, shares how Sutter Health has leveraged MuleSoft’s Anypoint Platform in an orchestrated plecosystem of technologies to power Project RED by enabling real-time patient risk scoring, clinical workflow management and bi-directional integration with Epic.

    Topics covered
    -------------------
    + How Sutter Health is lowering 30-day re-admission rates by re-engineeing clinical workflows
    + The need for connectivity to enable workflow re-design
    + Best practice in moving from an application-centric to a data object-centric connectivity approach
  • Web applications are a favourite target for hackers, so their safety must be a priority. Using an application firewall can enable active protection from known and zero-day threats. Join us to find out how Qualys Web Application Firewall combines scalability and simplicity delivered in the cloud to block attacks fast—without the substantial cost of traditional solutions.
  • Digital Identities have become the new perimeter in the fight against cybercriminals. Businesses need to come together to coordinate an effective defence and real time sharing of internet scale intelligence.

    * Explosive Cybercrime growth comes from criminals leveraging the internet – how can we use that same leverage to our advantage?
    * We can’t trust the endpoint and we can’t trust the user credentials – how do we operate in this new world?
    * How can real time sharing of anonymous Digital Identity behavior provide a new type of protection while offering improvements in end user experience?
  • ...contre les applications Web de manière rapide et rentable

    Les applications Web sont la cible privilégiée des pirates. Leur sécurité doit donc être une priorité. Un firewall applicatif assure une protection active contre les menaces connues et Zero Day. Rejoignez-nous afin de découvrir comment le service de firewall pour applications Web proposé par Qualys associe évolutivité et simplicité via le Cloud pour bloquer rapidement les attaques, sans les coûts importants liés aux solutions classiques.
  • Make sure that you have a full overview of the security posture of all of your IT assets. Join us to find out how Qualys helps you to scan remote complex networks—including everything and everybody from remote workers, point of sales, data centers and IAAS providers. Now you can you get a better picture of potential vulnerabilities—preventing breaches and reducing risk.
  • ...ou vos réseaux IP qui se chevauchent !

    Assurez-vous un aperçu complet de l’état de la sécurité de tous vos actifs IT. Rejoignez-nous pour savoir comment Qualys vous aide à analyser des réseaux distants complexes et notamment tous les intervenants et ressources, qu’il s’agisse de collaborateurs distants, de points de vente, de centres de données ou de fournisseurs IAAS. Vous pouvez désormais obtenir une meilleure image des vulnérabilités potentielles afin de prévenir les failles et de réduire les risques.
  • Earlier this year, Moka5 conducted a survey about how enterprises are currently using cloud-based services and how they would prefer to use them. The results are in and the findings are eye opening. Join Moka5 VP of Marketing Kris Bondi for an overview of the adoption and usage trends as well top-of-mind security concerns for IT decision makers.
  • Organizaciones de todos los sectores están invirtiendo en el Gobierno de Datos para obtener valor de negocio de sus datos y cumplir con las regulaciones de la industria; reducir costos, aumentar ventas e incrementar márgenes de utilidad.
  • Im Privatleben sind Menschen es heutzutage gewohnt Informationen zur Hand zu haben, wann und wo immer sie wollen. Können Unternehmen ihren Mitarbeitern am Arbeitsplatz nicht das gleiche Maß an Selbstbestimmung und Mobilität bieten, werden Nutzer schnell verleitet anderswo nach geeigneten Mitteln zu suchen.

    Auch die Produktivität spielt hierbei eine entscheidende Rolle. Denn Mitarbeiter sind dann am produktivsten, wenn sie auf Inhalte zugreifen können, wenn sie diese am dringendsten brauchen, unabhängig von Aufenthaltsort und Endgerät.

    Viele Unternehmen sehen sich daher gezwungen, Inhalte schnell mobil zu machen, ohne eine geeignete Strategie dafür entwickelt zu haben. Zum Leidwesen der IT-Teams, die mit meist manuellen Prozessen die Flut an mobilen Daten unter Kontrolle bringen müssen und der Sicherheit der Unternehmensinhalte.

    In diesem Webinar lernen Sie deswegen wie Sie:

    -Ihre Mitarbeiter mit einem mobilen und zugleich sicheren Zugang zu SharePoint-Inhalten ausstatten, jederzeit und von überall.
    -Ihren Endnutzern und externen Partnern eine App zur Verfügung stellen, mit der sie digitale Inhalte teilen können, ohne Risiko für sensible Unternehmensinformationen.
    -Wichtige SharePoint-Informationen in einem vereinfachten User-Interface hervorheben, um Ihre Arbeitsabläufe zu strukturieren.
  • Your adversaries are people: creative, nimble and persistent. They can bypass conventional security deployments almost at will, breaching systems in a wide swatch of industries and geographies.

    Technology alone will not defeat a determined attacker. You need a strategic defense partner that combines the most advanced technology platform with the leading cyber security expertise and the latest global threat intelligence from around the world. FireEye as a Service (FaaS) does exactly this, and allows you to detect, prevent, analyze, and respond to security incidents in minutes rather than months.

    Join FireEye, VP, CTO - Americas Josh Goldfarb, as he explores:

    - The current state of cybersecurity and the new threat landscape
    - The failure of traditional defense models in the face of a new adversary
    - The value of an Adaptive Defense strategy and working with a trusted partner
    - Real-world case studies

    As always, we will save plenty of time for Q&A. Be sure to register now to take part in this critical webinar.
  • Modern software development practices dominated by component-based engineering and short development cycles have largely been a catalyst for rapid advancements in technology. These practices, however, have also resulted in an epidemic of known vulnerabilities baked into third-party software components of IoT applications and devices. These widespread security flaws, many of which are critical in nature, often remain unnoticed or unaddressed throughout the software or device lifecycle, posing significant risks to the people and organizations that rely on them.

    As software continues to permeate the ever-expanding Internet of Things, software vulnerabilities represent a greater and greater threat. IoT devices, like traditional computers, run on software that is susceptible to malicious attacks. As more devices become connected, understanding how to identify and manage security vulnerabilities within widely used third-party software components is critical for all stakeholders, including manufacturers and end-users.

    In this webinar, our diverse panel of security experts will:
    •Propose an expanded definition and understanding of IoT and the stakeholders at risk
    •Present research highlighting the pervasiveness of vulnerabilities in third-party software components of IoT devices
    •Draw some conclusions about the state of software security in IoT today
    •Discuss some simple approaches to addressing these problems
  • Most two-factor authentication credentials offer high levels of security, but reduce usability; others offer limited security but are very easy to use. Risk-based authentication adds dynamic risk analysis to your authentication framework, while helping to maintain a frictionless experience for the user.

    Please join Charley Chell, Sr. Director, Security Solutions at CA Technologies to learn how you can enhance the value of two-factor authentication and strengthen the security posture of your organization with risk-based authentication.
  • The Identity and Access Market (IAM) is undergoing exciting changes. Increased cloud adoption, cyber-threats and the speedy adoption of mobile computing is affecting how enterprises approach access security and authentication.

    Getting insight into these trends can help you prepare your organization for better and more effective Identity and Access policies during the coming year.

    Join us on for a webinar on “IAM and Authentication Trends in 2015”, on March 24, 2015, where you can hear all about Identity and Access trends and developments from an industry expert.
  • IRM is leading the debate on risk culture. Drawing upon the wealth of practical experience and expert knowledge across the institute, we have developed guidance for organisations wanting a greater understanding of their own risk culture and practical tools that can be applied to drive change.

    As seen in the business press every day, embedding risk management into an organisation to the extent that it reliably makes a difference is a difficult task. To achieve this, boards must keep how to manage risks high on their agenda, and to continue asking themselves, whether they have the right culture, people and processes.

    What do we mean by risk culture?

    Risk culture is a term describing the values, beliefs, knowledge, attitudes and understanding about risk shared by a group of people with a common purpose, in particular the employees of an organisation. This applies to all organisations from private companies, public bodies, governments to not-for-profits.

    What does a good risk culture look like?

    An effective risk culture is one that enables and rewards individuals and groups for taking the right risks in an informed manner.
  • With attacks on the rise and constantly changing, it’s more important than ever to respond fast. Find out how Qualys Vulnerability Management gives you a new approach to continuously secure your IT infrastructure with immediate, global visibility against evolving threats.
  • The recent (well within last few years) usage of Agile project management approach to deliver business driven requirements faster has presented a few issues to IT Service Management and in particular the integration with ITIL processes. Agile practitioners say of their methodology that it is lean, adaptive, delivering fast and relevant results for the customer through rapid development. In direct contrast, the ITIL practitioner will seek security, availability and stability of a Service through the control and management of change and risk to the live (production) environment. This webinar looks to introduce some of the issues and perhaps suggest some ways to overcome them.
  • A lack of manpower and a dearth of resources are often major obstacles for organizations striving to achieve and maintain HIPAA and/or PCI compliance. Compliance guidelines are complex and difficult to decipher, even for the most experienced IT professionals. Recent headlines regarding unprecedented security and compliance breaches are causing companies to examine compliance-as-a-service (CaaS) solutions offered by cloud providers. But with the myriad of options available, it’s difficult for companies to discern which CaaS best fits their needs.

    Join Johan Hybinette, HOSTING Chief Information Security Officer (CISO), as he discusses the benefits and risks associated with CaaS. Drawing upon his 20+ years’ of experience in information security and compliance, Johan will also offer tips for selecting the right CaaS for your business. Bring your questions and leave with the information you need to confidently invest in a CaaS solution.
  • Security and Scalability in the Hybrid Cloud: How to get one without losing the other

    Traditionally, you had to design for a focus on scalability or security in the cloud, but not both. Now with services that connect virtual and real computers together, you can achieve cloud scale while satisfying the most stringent security requirements. Join Rackspace’s Matt Shover and Joseph Palumbo Thursday, March 19th to learn:

    •Top reasons why people choose the cloud
    •Top reason why people think the cloud isn’t the best fit for them
    •What is scaling?
    •How do you scale?
    •How does the hybrid cloud help scale your application?
    •How does the hybrid cloud help secure your application?
    •So how do you build a hybrid environment?


    About the Speakers

    Matt Shover:
    Matt Shover is the manager of RackConnect Operations at Rackspace, where he leads a passionate team of Rackers that work to seamlessly connect Rackspace's Dedicated and Cloud offerings -- turning customer challenges into awesome outcomes. He holds an MBA in finance from California State University, Hayward and has been a Racker for over eight years.

    Joseph Palumbo:
    As a founding member and architect of both the Rackspace Cloud’s Managed Operations service level and Launch Team, Joseph has spends half his time teaching customers about the cloud and the other half learning from his customers what the cloud can do. When he’s not writing blog posts, recording podcasts or making videos, he can be found discussing innovation with other Rackers and wishing paper documents had a built-in search function.
  • Data breaches are a widespread problem with over 1.1 billion records compromised in the last 10 years. According to the Verizon 2014 Data Breach Investigations Report, the vast majority of breaches occurred against small to mid-sized companies.

    As a result many retailers are focused on bolstering payment security and reducing fraud by implementing solutions such us EMV, End-to-end encryption (E2EE), and Tokenization. These solutions can work in tandem to protect merchants, and enable them to exceed regulatory requirements by securing card data across all payment environments.

    In this session our experts will present and define the three technologies, address the drivers that are leading the United States to implement EMV, and explain the complementary role of Tokenization with respect to EMV and End-to-end encryption.
  • Data is the lifeblood of organisations. As volumes of information continue to spiral, data security is becoming an ever increasing concern and all organisations need to strive to improve their efforts to ensure that all sensitive data is stored and communicated securely.

    This webinar will feature new research in a Bloor Research report by Fran Howarth, which looks at the data security concerns facing organisations today and the mitigating actions that are being put in place to reduce risk and drive more effective security policies.

    Fran will be joined by Boldon James CEO, Martin Sugden, who will demonstrate how Data Classification solutions should be at the heart of any data centric security approach to minimise the risks associated with data loss, increase user awareness and improve the effectiveness of other security solutions such as DLP.

    Attendees will learn how:
    • Data Security concerns can be mitigated through taking a data-centric view of security, rather than focusing on the perimeter.
    • Implementing effective data governance across the information lifecycle is vital to reduce data loss risk.
    • Data classification is now being seen as a foundational tool for data security and information governance.
    • Classification Metadata can drive other security and data management tools— such as DLP, encryption, rights management and data governance
    • Involving users in security can improve security effectiveness
    • Security policies and tools need to be extended to all systems and devices, including mobile devices.
  • The Internet of Things (IoT) has now become a mainstream term but much of the attention is focused on the latest gadgets rather than its potential in super-charging efficiencies of every industry sector. Whether it's using connected devices to monitor the health of a patient or an elderly relative in their homes, GE"s smart jet engines that transmit terabytes of data on its condition in-flight or ensuring miners' safety and productivity with integrated communications, tracking and real-time analytics; Internet of Things can have a monumental impact on global economy, with the forecast of over $14 trillion in the next two decades, according to latest research by Accenture.

    But what does this all mean for IT professionals? Beyond the trade show gadgets, IoT initiatives require immense support from all IT functions. Collecting, storing and alayzing immense amounts of data, which can be easily accessed in the cloud at any time and securely shared across connected devices is no easy feat. Moreso, a standardized set of guiding principles is essential for governance and proper implementation of every supported initiative.

    Join this expert panel session, featuring some of the leading industry minds, as they share unique perspectives and vision into into the future of IoT and join the conversation in an interactive Q&A session at the end of the presentation.

    Panelists include:
    - James Hogan, Managing Partner, Vista Ventures
    - Mac Devine, Vice President SDN Cloud Services and CTO, IBM Cloud Services Division
    - Stephen Mellor, CTO, Industrial Internet Consortium
    - Jeff Smith, CTO & EVP, Numerex
    - Darin Andersen, CEO, CyberUnited
  • This On-Demand webcast features our researchers who developed the Underground Hacker Markets report for Dell SecureWorks. In it, they revisit the hacker underground, identifying changes from 2013 and highlighting notable trends. Viewers will learn valuable tips on how to protect customer data and security advice from the Dell SecureWorks Count Threat Unit (CTU) researchers.
  • Vous souhaitez en finir avec l’information dispersée à travers des centaines de répertoires partagés, espaces personnels, et disques durs locaux ?

    Vous êtes à la recherche d’une plateforme collaborative tout-en-un ?

    Vous êtes certainement déjà familier avec Microsoft SharePoint, mais êtes-vous sur de connaître l’étendue de son périmètre fonctionnel ?

    Car si SharePoint reste une excellente plate-forme intranet, de portail web, de collaboration et de partage documentaire, SharePoint va bien au-delà de ces fonctions avec le réseau social (RSE), les outils de développement, et la gestion documentaire (de type GED).

    Participez à notre webinar pour mieux comprendre la richesse de la plateforme et ses bénéfices : une collaboration unifiée et des gains de productivité à chaque niveau de l’entreprise (utilisateurs métiers, DSI, direction).

    Nous aborderons également les modèles de déploiement de SharePoint (100 % cloud, hybride ou on-premises) ainsi que les limites et bénéfices de chaque configuration.

    Dans un second temps, nous nous pencherons sur les questions de déploiement de SharePoint et nous découvrirons comment AvePoint, avec sa solution de migration pour SharePoint 2013 & Office 365, vous permet d’accélérer la mise en place de votre plateforme.

    Nous ferons un tour d’horizon des problèmes les plus communément rencontrés pendant les projets de migration, et nous verrons en 3 points comment AvePoint vous permet notamment de les adresser :

    • Optimisation des ressources dédiées à la migration en automatisant la suppression du contenu obsolète

    • Réduction de la perturbation des activités pendant le processus de migration grâce à une planification personnalisée.

    • Maintien de l’ensemble du contenu, des permissions et des métadonnées jugés pertinents par vos équipes.
  • Wie Sie in drei Schritten ein klares IT-Configuration Management aufsetzen

    Als Verantwortlicher für IT-Security sind Sie konstant mit möglichen Angriffszenarien und deren Abwehr beschäftigt. Ein Großteil der Angriffe sind nur deshalb erfolgreich, weil Komponenten in Ihrem Netzwerk unzureichend konfiguriert sind.
    Die Herausforderung ist, genau diese Maschinen zu identifizieren und sicher zu stellen, dass sie korrekt konfiguriert werden und dies auch bleiben.
    Lernen Sie in unserm Webcast wie Qualys Policy Compliance Ihr IT-Configuration-Management verbessern kann und damit Ihre Basis-Security stärkt und das Ganze voll automatisiert.
    Erfahren Sie:
    • Etablieren und Umsetzung von Security Configurations
    • Automatisierung und Durchführung von regelmäßigen Configuration Assessments
    • Priorisierung und Umsetzung von Remedation Workflows
  • Preparing your organization for the inevitable cyber attack could be the difference between serious business disruption and minor inconvenience. This webinar will focus on what organizations need to consider in advance of an attack to ensure that risks are mitigated. Dow Jones’ own Head of Cyber Content and Data, Rob Sloan, will be joined by two specialists who will share their experience and expertise.
  • Le débat sur l’explosion – voire la prolifération des données – est un sujet pour toutes les entreprises, quelle que soit leur taille. C’est aussi une problématique qui semble sans fin pour tous les services informatiques : quelles solutions apporter à l’augmentation exponentielle de l’information ?
    Il faut mesurer le risque induit par une mauvaise protection pouvant occasionner des violations de données : risque financier bien sûr, impact sur la réputation, mais aussi et surtout, risque juridique. Les entreprises ont en effet soumises à des temps et des termes de conservation de données. Découvrez comment Symantec peut vous aider à mettre en place une bonne gouvernance de l’information dans votre entreprise. Au programme :
    -Qu’est-ce que la gouvernance de l’information?
    -Mettre en place une politique adaptée à votre entreprise
    -Cas concrets : comment répondre aux problématiques business relatifs à la conservation et la gestion des données
  • Many organizations still use spreadsheets and emails for business critical processes related to Governance, Risk, and Compliance (GRC) management. These more “manual” processes become burdensome as infrastructure scales out or new compliance and policy requirements emerge. Without a traceable and efficient way to perform, track, and report GRC assessment results, organizations face the possibility of failing audits, costly fines, and reputation damage.

    Modulo’s solutions for GRC help automate processes, which improve the efficiency and traceability of GRC activities. Modulo’s Risk Manager™ software automates GRC tasks based on both proven processes aligned with international standards and on your own established methodologies.

    In this session, learn how to:
    • Align processes to the “plan, do, check, act” methodology
    • Replicate and improve internal processes using an easily configurable workflow tools
    • Build and send user-friendly, traceable surveys
    • View assessment results in detailed and high-level dashboards and reports
    • Leverage audit log to monitor the history of assessment participation and issue remediation
  • Like many large universities, the University of New Brunswick (UNB) found itself increasingly targeted by a vast array of Internet threats. Originally designed to give large numbers of users broad access to data of all kinds, university IT systems like UNB’s are easy targets for cyber criminals.

    Join David Shipley from UNB for this live, interactive webinar, as he describes the ambitious process that he and his colleagues undertook to implement a proactive, intelligence-based cyber security strategy that gives them real-time visibility into attacks in progress, along with actionable insights to respond quickly and effectively.

    In less than an hour, David will tell you:
    • Why simply reinforcing perimeter defenses was not the right approach for UNB
    • How they were able to gain better security visibility and intelligence—and use it effectively
    • Which solutions combined to dramatically improve UNB’s cyber security without greatly increasing resource demands
    • And more…

    Don’t miss this opportunity to learn from an accomplished peer, and to discover how you too can create and implement an effective, intelligence-based security strategy for your organization.
  • Despite years of headlines, and countless examples, many organizations are still under the impression that DDoS attacks are a problem for somebody else (i.e. their ISP), or that it’s a problem that can be defended using an existing on-premise security solution, such as their firewall or IPS. In a risk obsessed world, these organizations are ignoring the very real likelihood of becoming a target for DDoS attacks, along with the severe operational and business consequences of falling victim to an attack.

    It’s time to debunk some misconceptions about DDoS.

    Attend this webinar to learn:

    - Why a single layer of DDoS protection isn’t enough
    - How the impact of a DDoS attack is significantly more costly than protection options
    - The correlation between DDoS attacks and advanced threats revealed in our latest research and how both are used during multiple phases of an advanced threat campaign.
  • The proliferation of data on mobile devices has created huge headaches for CIOs as they attempt to protect data, stay in compliance and move workloads to the cloud. How IT approaches data protection for mobile devices can support or hinder these high level efforts. Endpoint backup, traditionally viewed as a functional requirement below the radar of CIOs, is evolving to offer not just data backup and restore, but also a modern way to address costly data governance challenges such as compliance and eDiscovery. This webcast will cover real-world case studies of Fortune 1000 companies leveraging endpoint backup solutions to gain significant business advantages including cost control, compliance and embracing the cloud.
  • ESET security researcher Lysa Myers discusses developments in healthcare IT system security that you may see at the HIMSS conference in Chicago next week. Find out what is being done to better protect patient data privacy and more.
  • Sans cesse en évolution, les menaces sont de plus en plus difficiles à contrer, sauf lorsque l'on a la pleine visibilité sur les potentielles failles de son infrastructure. Découvrez comment Qualys vous donne ce pouvoir.
  • Constantly evolving threats can be more difficult to counter—unless you have full visibility into potential vulnerabilities of your infrastructure. Built on the leading cloud security and compliance platform, Qualys gives you immediate, global visibility of IT vulnerabilities. Join this webcast to learn more.
  • GitLab provides streamlined social coding and collaboration for Git development teams. But under the hood it's a powerful enterprise Git management platform. In this webinar we'll present best practices for managing permissions and users with LDAP and Active Directory, working with large binary files, code reviews and workflows, and clustering and replication. From security to performance and disaster recovery planning, this webinar will guide you to a rock-solid GitLab deployment.
  • Join Cyveillance and Centripetal Networks as we explore the challenges in closing the breach detection gap, managing large dynamic sets of threat intelligence, and how to operationalize threat intelligence in a perimeter defense strategy. Additionally, we will demonstrate how leveraging threat intelligence in the security stack is providing large enterprises with real-time active network defense.
  • Join Ntirety, a division of HOSTING and the leading data services organization in the country, in this discussion of the impact that database administration can have on individuals, organizations and — most importantly — bottom line revenue. This interactive webinar will cover:
    •DBA Burnout and Retention
    •The DBA’s Role in Major Platform Shifts and Regulatory Compliance
    •The Accidental DBA Due to Staff and Skills Shortages
    •The “Half a DBA” Problem -- When You Don’t Need a Full-time DBA
    •The IT Budget Crunch
    •Q & A
  • Recently cyber attacks against Industrial Control Systems (ICS) used by
    utilities and other Critical Infrastructure organizations have hit the
    newlines worldwide. Stuxnet is the best known cyber attack against an
    industrial installation, but it's not the only one.

    But what if cyber attacks were not the biggest threat to industrial
    networks and systems? Although malware is still a major point of
    interest, the sword of Damocles for critical industrial networks is
    represented by system misuse performed by disgruntled employees,
    contractors and vendors, as well as unintentional mistakes,
    network and system misconfiguration; all this could lead to the
    divergence or failure of critical processes.

    In this talk we will reshape the concept of ICS cyber security and will present our vision for a comprehensive approach to cyber security for ICS.
  • This webinar is for AWS consultants and architects. It will describe how CertiVox M-Pin lets you lift and shift your customers’ applications to the cloud while implementing security best practices and keeping their user credentials safe from compromise. Deliver valuable integration services to federate M-Pin with their cloud or on-premises applications. Enable M-Pin two-factor authentication to help satisfy security compliance and regulatory requirements.
  • Software defined architectures are all the buzz, helping to start conversations about transforming customer data centers from cost centers into competitive advantages. But in today’s economy, no business can afford to stand still. And a business is only as agile as its IT organization allows. An agile data center and IT department can:

    •Protect the infrastructure and easily recover if faults are found or predicted
    •Control access to data while meeting compliance and regulatory requirements
    •Deliver services quickly, resiliently, and cost-effectively

    Join us on at 10am GMT on 16th April 2015 and learn how Symantec’s view of the “Agile Data Center” covers delivering the right resources in the right way to the users. Whilst bringing a broader view on how you can introduce critical solutions and new revenues around disruptive customer events.
  • Ingesting raw data into Hadoop is easy, but extracting business value leveraging exploration tools is not. Hadoop is a file system without a data model, data quality, or data governance, making it difficult to find, understand and govern data.

    In this webinar, Tony Baer, Principal Analyst of Ovum Research, will address the gaps and offer best practices in the end-to-end process of discovering, wrangling, and governing data in a data lake. Tony Baer will be followed by Oliver Claude who will explain how Waterline Data Inventory automates the discovery of technical, business, and compliance metadata, and provides a solution to find, understand, and govern data.

    Attend this webinar if you are:
    --A big data architect who wants to inventory all data assets at the field level automatically while providing secure self-service to business users
    --A data engineer or data scientist who wants to accelerate data prep by finding and understanding the best suited and most trusted data
    --A Chief Data Officer or data steward who wants to be able to audit data lineage, protect sensitive data, and identify compliance issues
  • If your organization is reliant on a rapidly aging version of SQL Server, you need to join SQL Server experts Michael McCracken from HOSTING and Rodney Landrum, a Microsoft SQL Server MVP, from Ntirety for this in-depth discussion of the hows, whys and whats of upgrading from Microsoft SQL Server 200X to SQL Server 2014. The interactive webinar will cover:
    •The benefits of upgrading
    •Considerations to understand
    •How to smooth the transition
    •Q & A
  • Risk management is an increasingly important
    business driver and stakeholders have become
    much more concerned about risk. Risk may be a
    driver of strategic decisions, it may be a cause of
    uncertainty in the organisation or it may simply be
    embedded in the activities of the organisation. An
    enterprise-wide approach to risk management
    enables an organisation to consider the potential
    impact of all types of risks on all processes,
    activities, stakeholders, products and services.
    Implementing a comprehensive approach will
    result in an organisation benefiting from what is
    often referred to as the ‘upside of risk’.
    The global financial crisis in 2008 demonstrated
    the importance of adequate risk management.
    Since that time, new risk management standards
    have been published, including the international
    standard, ISO 31000 ‘Risk management –
    Principles and guidelines’. This guide draws
    together these developments to provide a
    structured approach to implementing enterprise
    risk management (ERM)
  • Generally, risks associated with continuity planning, from physical to cyber-security, are part of an ever-evolving threat to our systems and technologies. Continuity planning is simply the good business practice of ensuring the execution of essential functions through all circumstances, and it is a fundamental responsibility of public institutions and private entities responsible to their stakeholders. What are some of the risks associated with continuity planning? Why is managing risk important for continuity? What are some of the methods used to mitigate risks in continuity planning?

    The COOP presentation will provide an understanding of Continuity and Continuity of Operations, explain the importance of a viable Continuity capability, and emphasize the need for a viable Continuity capability in all organizations, to demonstrate some of the linkages between continuity programs and:

    • Risk Management
    • Physical Security
    • Emergency Management
    • Cyber Security/ Information Technology

    Join us on April 21 as NCP’s senior continuity practitioner shares resilient continuity programs and outreach efforts. Hear from Eric Kretz, NCP, as he talks about Information Integration: Leveraging Risk, Physical and Cyber Security and Continuity Planning.
  • Jayme Williams, Senior Systems Engineer at TenCate is protecting eight environments across the US and Canada – and each site has different storage. All sites require disaster recovery and backup across the application set. Having one solution would be ideal, but not possible – until they came across Zerto.
    Zerto Virtual Replication is storage agnostic and made it easy to integrate a new site into their disaster recovery plan. Their original business continuity and disaster recovery (BC/DR) plan, affectionately named the “Hit by the bus” book due to its volume, has been greatly simplified and the service levels they are seeing are outstanding – single digit seconds for their recovery point objectives (RPO).

    Finally, they are incorporating public cloud into their IT plans by backing up their applications from their DR site to AWS. With one solution, they can achieve their BC/DR and backup SLA, while reducing costs and introducing public cloud into their IT strategy at a pace that supports changing business requirements.

    With Zerto Virtual Replication:
    •Manage all sites in one pane of glass with one tool for replication and automation of failover, failback and testing processes as well as backup
    •Increase efficiencies with the ability to track and manage consumption across the hybrid cloud
    •Hardware agnostic solution does not require a change in the infrastructure reducing costs
    •Consistency in the BC/DR solution dramatically reduces operational costs
    •Replicates between different types of storage and versions of VMware vSphere making it easy to add new sites to the process
    •Point-in-time recovery enables failover to a previous point to recover from any issue – logical corruption, datacenter outage, etc.
    •Leveraging a public cloud strategy with backups stored in Amazon
  • It is no secret that we live in a 24/7 world that demands information be always available, always accurate and always secure. In order to meet these demands a comprehensive risk management program must be in place. At the forefront of these efforts are the preventive measures that try to reduce the probability of a disruptive incident occurring. But as has been all too often the case, these protective actions may not be enough. Whether it be the force of nature, the actions of terrorists, the fragility of infrastructures or so many other disruptive events will and do happen.

    Left with the reality that we must prepare for interruptions to occur, the job of the Business Continuity Professional is to minimize the resulting impacts. Creating environments that will provide connectivity, processing and data integrating, more and more organizations are looking toward the clouds. Whether it be to ensure that data can be shared or looking for full automated recovery cloud computing has a possible answer. This presentation will discuss what the cloud is, how it can make organizations more resilient and some of the issues pertaining to its usage.