Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • 8 Security Lessons from 8bit Games 8 Security Lessons from 8bit Games Gavin Millard, EMEA Technical Director Tenable Network Security, Adrian Davis, Managing Director (ISC)² EMEA; Oct 3 2016 11:00 am UTC 60 mins
    What can Space Invaders teach us about attack path analysis? Mario about defending your users that are the weakest link? Even Pac Man about focusing on the right goals? Join Gavin Millard, EMEA Technical Director, who will explore the lessons to be learned from the games many of us played years ago that are still valid in the reduction of security risks within all of our infrastructures. Key takeaways from the webinar include:

    How to game the system to get a high score in security.
    How to gain insight into the attack path used by hackers to gain access to your data.
    What cheats can be used to reduce the risk of data loss.
  • Cyber Crime – Why Are You a Target Cyber Crime – Why Are You a Target Richard Cassidy, UK Cyber Security Evangelist Oct 4 2016 2:00 pm UTC 60 mins
    According to cyber security experts, the frequency and severity of cyber attacks are on the rise, causing alarm to businesses and customers across a variety of industries. Taking a proactive, strategic approach to evaluating your cyber security strategy is critical, it starts with understanding who your organisations adversaries are and what the impact would be on your business if you were the victim of a cyber attack.

    Register for this impactful webinar presented by Richard Cassidy, UK Cyber Security Evangelist at Alert Logic as he examines the latest methods and exploits used by cyber criminals providing an overview of the most current ways they target businesses. You’ll get an insight on how the most sophisticated attackers choose their targets, what they are looking for, and how they extract valuable data.

    In this webinar, we will take a look at:
    • The ever-changing threat landscape, and how it affects your business
    • Tactics, techniques and procedures (TTPs) used by cyber criminal actors
    • Strategies and tools for mitigating the risk of cyber attack
    • Insight into Real-life case studies
  • ¿Trabaja su software de backup para usted, o usted para su software de backup? ¿Trabaja su software de backup para usted, o usted para su software de backup? Cesar Funes - Commvault Technical Partner Enablement Manager Oct 5 2016 10:30 am UTC 60 mins
    Conformarse vs Orquestar.
    Las soluciones de IT que selecciona deberían ayudarle a dar el mejor soporte posible a su negocio. Pero hay algunas que heredamos, o que seleccionamos con una visión parcial de nuestros sistemas, y que acaban frenando nuestra capacidad de dar valor a nuestra empresa como Departamento de IT.

    Las soluciones de protección de datos suelen encontrarse en este segundo caso. El hecho de que sus fabricantes, como Veritas, Veeam o IBM, no invierten lo suficiente en innovación para convertirlas en auténticas herramientas de gestión de datos empresariales, o de que están pensadas sólo para cubrir una parte de los sistemas, trae como consecuencia que Usted, que las tiene integradas en sus plataformas, sufra algunos o todos estos problemas:

    • Gastos de administración y operación excesivos
    • Inversión en plataformas de soporte de protección de datos costosas y propietarias
    • Riesgos financieros asociadas a la incapacidad de cumplir SLAs y dar valor a su negocio
    • Limitación en la libertad para elegir cuáles serán los sistemas de producción que mejor soporten su negocio, simplemente porque no tendrá cómo protegerlos.

    Es hora de liberarse de esta carga, y apostar por el líder al que el mercado aclama como un socio tecnológico innovador que le devuelve el control sobre sus decisiones de IT. Si va a renovar su actual software de protección de datos, es hora de decidirse por el mejor.

    Únase a nosotros en este webinar y descubra cómo Commvault le garantiza que su software de copia de seguridad no le limitará la capacidad de elegir proveedores de sistemas de producción, y reducirá sus riesgos financieros de cara a la Dirección de su empresa disminuyendo la complejidad de su infraestructura y aumentando su productividad.
  • Educational Institutions:Accurate visibility of all software & hardware assets Educational Institutions:Accurate visibility of all software & hardware assets David Foxen, SAM Evangelist at Snow Software Oct 5 2016 1:00 pm UTC 45 mins
    With a strong track record in Education, find out how Snow Software provides a consolidated view of all licenses, enabling staff to use just one interface to manage multiple software vendors, device types and locations across all platforms.
  • Cyber Readiness: Going Beyond “Awareness” and Building a Culture of Security Cyber Readiness: Going Beyond “Awareness” and Building a Culture of Security Kelley Bray, Employee Trust and CustomerONE at Symantec Oct 5 2016 5:00 pm UTC 60 mins
    Building a strong culture of security is the key to ensuring that your users care enough about the security of your company to protect it. Every day, in every interaction, we want our users to do the right thing when it comes to security.

    In this webinar we will discuss:

    - Symantec’s Employee Trust Program

    - How we go beyond basic security awareness training to continuously cultivate our security culture.
  • Multi-Cloud Management - How to effectively manage multiple cloud environments Multi-Cloud Management - How to effectively manage multiple cloud environments Brent Brightwell, SVP Strategy, DoubleHorn Oct 5 2016 5:00 pm UTC 30 mins
    The digitization of businesses and the way that IT supports the needs of these businesses has changed significantly over time. Today, different IT workloads can be deployed on different types of cloud services, depending upon the business requirements. As a result, many IT departments are moving their infrastructure to the cloud and multi-cloud virtual environments. A multi-cloud management platform allows enterprises to manage workloads and applications across all cloud deployment models, including public, private, and hybrid. Using the right platform for this workload enables enterprises to drive favorable business results. The multi-cloud approach facilitates transition to the IT-as-a-Service (ITaaS) model, where IT departments act as service brokers and support organizations in optimizing their IT infrastructure consumption. In this webinar, we'll discuss the key features of a multi-cloud management platform and also discuss the benefits, challenges, and opportunities in the existing market.
  • Cloud Security and Manageability on a Personal Level Cloud Security and Manageability on a Personal Level Microsoft Oct 5 2016 8:00 pm UTC 60 mins
    Help your employees take personal responsibility for IT security!

    From biometrics to multi-factor authentication, how do you help your employees be protected at a personal level?

    We’ll explore how you can go beyond mere password strength to help prevent your employees' identities and your business from being compromised. Join this webcast to learn how cloud services and operating systems are designed with security in mind, while preserving natural, friendly user interactions.

    This webcast is part of our Digital security in the modern world webcast series. Sign up for this session, or the entire series today!
  • Understanding the Impact of GDPR on the Public Sector Understanding the Impact of GDPR on the Public Sector Andrew Joss – Head of Industry Consulting, EMEA Oct 6 2016 1:00 pm UTC 60 mins
    From May 2018, the new EU General Data Privacy Regulation (GDPR) will require all Public Sector organisations to more effectively understand how they manage data on their citizens, contractors and staff. Citizens will have significantly more rights and powers on how their data is used and consumed, with large fines available for any breaches of the regulation.

    Join this webinar to understand:

    - What GDPR is and what it means to Public Sector bodies
    - The potential impact of Brexit
    - The range of data challenges and opportunities the new regulation will create
    - What data capabilities agencies will need to consider
    - Learn what best practice approaches commercial organisations are already taking to ensure timely compliance
  • Managing Apple Devices in a Windows World Managing Apple Devices in a Windows World Steve Brasen - Research Director, Enterprise Management Associates | Tim Williams, Director, Product Marketing HEAT Software Oct 6 2016 3:00 pm UTC 60 mins
    As Windows support requirements continue to dominate the focus of enterprise endpoint management efforts, an increasing number of Apple device users are becoming frustrated with being treated as second-class citizens. At the heart of the problem are Windows-centric practices and solutions that do not comprehensively translate to supporting Mac and iOS platforms. However, adoption of Apple management point solutions that operate independent of existing Windows administration platforms only add to management complexity and fail to achieve service reliability and cost-effectiveness.
    Join Steve Brasen, EMA Research Director from analyst firm, Enterprise Management Associates, and Tim Williams, Director Product Marketing at HEAT Software for a one-hour presentation identifying the optimal practices and solutions that will enable comprehensive management of Apple devices side-by-side with Windows endpoints.
    Key topics of discussion include:
    •What is the current state of Apple device adoption and use in the enterprise?
    •What specific Apple requirements are not being serviced by traditional Windows-targeted management solutions?
    •Which methods should be employed to maintain consistent user experiences across different endpoint architectures?
    •What effect has increased workforce mobility had on emerging Apple support requirements?
    •How can enterprise security requirements be maintained across disparate software and hardware ecosystems?
  • Overcome Outdated Processes and Automate IT Risk & Compliance Overcome Outdated Processes and Automate IT Risk & Compliance Nick Hayes, Analyst at Forrester, Josh Hankins, Information Security Solutions Manager at 84.51° Oct 6 2016 6:00 pm UTC 60 mins
    Companies across a wide gamut of industries and regions all strive to effectively manage risk and compliance, but too few actually achieve it. As IT, business, and regulatory environments grow increasingly complex, risk and compliance pros must move past outdated processes and legacy systems to innovate and find ways to achieve higher degrees of efficiency and oversight.

    During this webcast, guest speakers Nick Hayes, Analyst at Forrester, and Josh Hankins, Information Security Solutions Manager at 84.51° will cover how you can:

    · Move up the maturity curve through better program coordination and technology integration.
    · Establish the right metrics to build the business case and showcase continual progress.
    · Bolster future success by prioritizing business agility and data mastery as top strategic objectives.

    This Webcast will have a Live Q&A
  • The CISO as a Transformational Role in Risk Management The CISO as a Transformational Role in Risk Management Michael Rasmussen- GRC 20/20 Oct 6 2016 6:00 pm UTC 60 mins
    Mike Rasmussen of GRC 20/20 explores the ever changing role of the CISO in a modern organization.

    This presentation offers a prescription for managing information security risk as it permeates business operations, processes, transactions, and relationships in the digital world.
  • Intelligent eDiscovery & Data Documentation for Legal Professionals Intelligent eDiscovery & Data Documentation for Legal Professionals Craig Delle Donne, Microsoft Oct 6 2016 8:00 pm UTC 60 mins
    Build intelligence into your eDiscovery processes!

    Did you know the median litigation budget in the US is $1.2M (2015 - Norton Rose Fulbright) and that over 40% of large companies have one or more lawsuits with $20M+ at issue? With data being created at exponential rates, reviewing necessary documentation can and will become one of the biggest challenges legal teams face. It’s time to build intelligence into your discovery processes. Microsoft Office 365 Advanced eDiscovery may be the answer for you.

    Join this webcast to learn:
    •How Microsoft Office 365 Advanced eDiscovery can help you analyze data within Office 365, streamline document reviews and make decisions for efficient eDiscovery
    •How this solution differs from traditional eDiscovery software
    •Why there's no better time than today to start thinking about this topic

    File sharing, collaboration on documents and the influx of data in the cloud will pose new challenges and opportunities. Save your seat in this session to learn more!
  • Resource Management In A Busy World: Delivering Results, Extending PPM Maturity Resource Management In A Busy World: Delivering Results, Extending PPM Maturity Eric Kissel, Services Architect for CA PPM, CA Technologies Lars Matzerath, Head of Sales, itdesign GmbH Adam Frary, Services Oct 7 2016 3:00 pm UTC 60 mins
    Resource Management is a relatively straight forward concept with significant benefits. However, some organizations choose to postpone those benefits and focus on other aspects of PPM. How can we extend organizational maturity for PPM with high value outcomes from Resource Management?

    Please join Erich Kissel, CA Services Architect for PPM, and Lars Matzerath, Head of Sales from itdesign GmbH for an insightful discussion on Resource Management on Friday, Oct.7th.

    CA Services will provide tips for getting started and for expanding into new Resource Management use cases. Our partner, itdesign, will share some insights of two powerful packaged work products
    for CA PPM: itd Assignment Editor and itd Allocation Editor which enhance project and resource managers’ visibility and editing options of resources.

    From assigning and aligning resources to projects, evaluating and normalizing demand, to gaining a better understanding of available skills, it’s time to fulfill your resource management aspirations!
  • Running Your Mission Critical Line of Business Applications Running Your Mission Critical Line of Business Applications Ross LoForte, Technology Architect, Microsoft; Jimmy May, SQL Server Solutions Architect, SanDisk Oct 7 2016 4:00 pm UTC 60 mins
    In a recent Gartner survey, more than 85% of enterprise respondents indicated that data growth, performance and availability was their largest challenge.

    Join this session to learn how SQL Server can help you run your mission critical line of business applications including:

    - Enterprise performance
    - IT Security and compliance
    - Scalability
    - High availability and disaster recovery
  • The role of Threat Intelligence Feeds in the Battle Against Evolving Cybercrime The role of Threat Intelligence Feeds in the Battle Against Evolving Cybercrime Nahim Fazal, Head of Cybersecurity Development at ‎Blueliv Oct 11 2016 2:00 am UTC 45 mins
    Today, advanced cyber threats form part of the risk landscape we encounter every day in our increasingly digital lives. Cybercrime is known for its complex, chameleon characteristics – it’s a highly lucrative industry with fast-paced innovation at its core. The evolution of cybercriminal techniques enables it to thrive, and we need to sprint to keep up. Organizations must respond with security solutions nimble enough to compete with the bad guys. Sounds like a job for MRTI, and we think we’ve got just the ticket.

    This webinar intends to be an educational piece for any Security team in need of having a better understanding of the value provided by Threat Intelligence feed in order to complement traditional security real estate. This is not intended for those who already have a strong expertise and understanding of the fundamentals of threat intelligence delivered via a feed.
  • Privacy vs. Security Privacy vs. Security Steve Durbin, Managing Director, ISF Ltd Oct 11 2016 1:00 pm UTC 45 mins
    In May 2018 the EU’s General Data Protection Regulation (GDPR) will take effect. The GDPR upholds the protection of personal data and increases the accountability of organisations processing any personal details belonging to EU citizens- with severe penalties for those who do not comply.

    In this webinar Steve Durbin, Managing Director at the ISF, discusses why it is important for the security and data privacy teams to work together to run risk assessments on their most critical information assets and to develop checklists, policies and procedures that can be implemented internally and with third party suppliers. Only by taking this approach will organisations be able to remain agile, maintain customer confidence and demonstrate that they are ‘GDPR ready.’
  • Understanding the Risks from DDoS Attacks Understanding the Risks from DDoS Attacks Rohit Kinra, Director - Product Technology, Verisign Oct 11 2016 3:00 pm UTC 45 mins
    Recent DDoS attacks trends indicate that DDoS attacks are becoming more sophisticated and persistent. What do these DDoS trends mean for your organization, especially during the upcoming holiday season?
    Join Rohit Kinra, Director, Product Technology, Verisign, as he discusses the behavioral shifts observed by Verisign in recent DDoS attacks and what should concern you. Rohit will also share recommendations on how your organization can prepare and defend against DDoS attacks.
  • Database as a Service: What should you consider before migrating to the cloud? Database as a Service: What should you consider before migrating to the cloud? Matt Aslett - 451 Research Director, Data Platforms and Analytics Oct 11 2016 3:00 pm UTC 45 mins
    Database-as-a-service offers multiple potential benefits, including lower database licensing and infrastructure costs, faster time to application development, and reduced administration overheads. These benefits are most likely to be experienced by database administrators and architects, although senior decision-makers and business users also stand to gain from having on-demand access to database services, rather than waiting for databases to be configured and deployed on dedicated physical or virtual server infrastructure.

    While 451 Research anticipates growing adoption of database-as-a-service (DBaaS), adoption is currently nascent compared with other cloud services, as enterprises look to make the most of their investments in on-premises database deployments, and also to identify the most appropriate workloads for transition or migration to DBaaS. This webinar explores the factors shaping those adoption trends, including the potential benefits and challenges to DBaaS adoption, the economics of the cloud as they relate to database workloads, and adoption lifecycles.

    Based on research involving enterprises currently deploying database workloads in the cloud, the webinar will:

    • Highlight the trends driving enterprises to move database workloads to the cloud
    • Identify the challenges causing enterprises to be hesitant about migrating database workloads to the cloud
    • Identify the use-cases that are prime candidates for migrating database workloads to the cloud
    • Highlight the critical success factors for database migration to the cloud
  • The Current State of Emerging Tech [Emerging Tech Virtual Summit] The Current State of Emerging Tech [Emerging Tech Virtual Summit] Steve Clayton, Chief Storyteller, Microsoft Oct 11 2016 4:00 pm UTC 30 mins
    Moving into the future, increases in our technological capabilities will be powered by technology out of our sight. Harry Shum, Executive Vice President of Microsoft’s Technology and Research, calls this the “invisible revolution.” This revolution has become possible because of emerging technologies that didn’t exist a decade ago, like cloud computing, internet of things (IoT) and artificial intelligence.

    Join our special event dedicated to how these emerging technologies are changing the world. You’ll hear leading researchers discuss and explore:
    •What’s possible with artificial intelligence and machine learning.
    •How IoT is being used to make farms more productive and feed more people around the world.
    •Human-computer interaction and the next wave of user interfaces controlled by voice,
    gaze or gesture.
    •How data storage is becoming cheaper and energy-efficient by putting data centers under water.

    These powerful technologies are changing the world, and they can have a transformational impact on your business—the products you make, the way you operate and how you engage with your customers.

    Join this session for an emerging tech “state of the union.” You’ll hear about the latest trends and get insight on how you go about discovering the next great innovation.
  • Your Credentials Are Compromised, So Now What? Your Credentials Are Compromised, So Now What? Lee Godby, Director of Business Development and Andreas Zindel, Director of Technical Business Development at Centrify Oct 11 2016 5:00 pm UTC 45 mins
    Today, more and more security breaches are being reported - Home Depot, Target, Sony, Anthem, and Office of Personnel Management (OPM) to name a few. There are numerous attack vectors, but the most prevalent vector is compromised credentials. So how can corporations or entities protect themselves from these types of attacks, while ensuring the privacy of employees and customers? In this discussion, understand how to empower your employees through multi-factor authentication (MFA), while significantly reducing the chances of having a “Strategic Corporal” bring down your operation.
  • 20 Months to a New Global Data Privacy Law – What You Need To Do 20 Months to a New Global Data Privacy Law – What You Need To Do Nigel Hawthorn of Skyhigh Oct 11 2016 5:00 pm UTC 60 mins
    The GDPR Covers Anyone with Data on European Residents

    In May 2018, a new data privacy law comes into effect and any organisation with data on the 500+ million citizens of the European Union (EU) has to comply. Fines can be up to 4% of revenue, mandatory data loss notification to regulators and users comes into force, and class action lawsuits will land on the desk of anyone unfortunate enough to lose data. As with any data loss incident, these costs may be dwarfed by the loss of brand image and customers choosing not to do business with you again.

    Unmanaged cloud could be your weakest link, so what do you need to do?

    Join us for this webinar where the author of “GDPR – An Action Guide for IT” will speak and you will learn:

    · The top ten points of the new regulation
    · Which departments in your organisation need to be part of the GDPR-Readiness Team
    · What you need to do today, what you can leave until tomorrow
    · Policies for collecting, processing, transferring and deleting data
    · 25 questions to ask yourselves to ensure you are ready
  • Demystifying the NIST Cybersecurity Framework (CSF): CSF 101 Demystifying the NIST Cybersecurity Framework (CSF): CSF 101 Ken Durbin, Unified Security Strategist, Symantec, Adam Sedgewick, Senior Information Technology Policy Advisor, NIST Oct 11 2016 5:00 pm UTC 60 mins
    The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) was originally focused on the Critical Infrastructure Sectors but is quickly being adopted by organizations of all types and sectors. Should you consider adopting the CSF? This webinar will provide you with a solid understanding of the CSF to help you decide if it’s right for you. We’ve invited Adam Sedgewick, Senior Information Technology Policy Advisor, National Institute of Standards and Technology, to join us on this informative webinar.

    Topics covered will include:

    -A brief history of the CSF and its development
    -The goals and outcomes it was designed to address
    -The three main components of the CSF: Core, Profile & Tiers
    -Its use in both Regulated and Non-Regulated