Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Secure Every Part of Your Business: Data Protection in 2023 Nick Cavalancia, Conversational Geek | Adrian Moir, Technology Strategist & Principal Engineer, Quest Backup is your last line of defence when it comes to ransomware attacks. You need to ensure your systems, applications and data are protected and also... 7 days ago | 47 mins Is AI the Panacea to Doing Threat Detection Right? George Anderson - Secureworks, Nash Borges - Secureworks, Rebecca Wynn - Click Solutions Group and Simon Ratcliffe - Ensono The rise of AI has made its way to threat detection. With AI-enabled threat detection systems predicting new attacks and notifying admins of data brea... 2 months ago | 55 mins Critical Warning! The Missing Link to Hospital Cybersecurity 24By7Security, Inc In today’s day and age, every hospital should have a focused mindset on cybersecurity. Clinical ecosystems within healthcare institutions need to be c... 16 hours ago | 55 mins The Recipe for Ransomware Recovery Andrew Nelson, Principal Architect – Insight, Jason Proctor, Advisory Systems Eng– Dell and Christophe Bertrand, ESG Data protection is a critical component of ransomware protection, detection and recovery. Knowing what needs protecting and for how long is essential ... 2 days ago | 24 mins Data Hub and Data Fabric: Why They Fit Together Noel Yuhanna, Vice President and Principal Analyst at Forrester Research Due to the widely growing data repositories in the cloud and on-premises, organizations are facing unprecedented challenges in data management, data q... February 2, 2023 6:00pm Avid NEXIS disaster recovery and ransomware protection Stephane Cardot, Director Presales EMEA, Quantum; Paul Glasgow, Managing Director, Marquis Is your Avid work-in-progress protected from disaster? Join this session as we demonstrate how to recover business critical work in progress within mi... February 2, 2023 3:00pm Improving Electric Grid Cybersecurity with Cyber-Physical Analysis Shamina Hossain-McKenzie (Sandia National Laboratories) Cyber attacks are rising against critical infrastructure systems and have serious implications for our national security. In addition, many interconne... 2 days ago | 52 mins Race Against Time: What to do when a zero-day attack strikes Jason Spindlow, Systems Engineer Specialist for Cortex Three words are often associated with a zero-day attack – vulnerability, exploit and attack. Given that no software patch exists for a zero-day vul... 6 days ago | 58 mins Securely Replicate PI System Data Across Segmented Networks Dennis Lanahan, Vice President for Commercial Markets, Owl Cyber Defense Many critical infrastructure organizations have a PI system within their OT network to monitor real time asset values and archived/historical data. Th... 5 days ago | 46 mins Best Practices for Securing Federal Data in Hybrid/Multi-Cloud Environments Steve Grewal, CTO, CTG Federal and Steve Foley, Federal Director, Fortanix The Biden Administration’s Executive Order and Mandate(s) emphasize cybersecurity as a national priority and lays out new requirements. Wondering how ... 2 days ago | 30 mins Load more