Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Use Multi-Availability Zone Kubernetes for Disaster Recovery Ferran Castell High availability is paramount on any production platform, therefore clusters must be designed to sustain failure at different levels. Stateless appli... 1 day ago | 57 mins The CIO-CISO Balancing Act in the Cloud Guy Raz, Principal Systems Engineer at ExtraHop and Melinda Marks, Senior Cloud Security Research Analyst at ESG Digital transformation and cloud migration projects are fundamental to enterprise growth. While both the Offices of the CIO and CISO play a crucial ro... 23 hours ago | 40 mins DMARC: Protecting Your Domain in A Galaxy Far, Far Away Dave Leannah, Scott VanAuker, Bob Adams and Dirk Jan Koekkoek DMARC: Protecting Your Domain in A Galaxy Far, Far Away. Dave Leannah, VP of IT at The Bradley Corporation and Scott VanAuker, Security Architect at ... 2 weeks ago | 67 mins Vous accompagner dans la gestion de la cybersécurité de vos clients HangLong Soukaseum, Account Executive - Dell Technologies & Olivier Martinez EMEA Training Manager A l’ère de la transformation digitale, la sécurité et la protection des données est un enjeu majeur pour les entreprises dans leurs perspectives d’évo... 3 weeks ago | 26 mins Wir begleiten Sie bei der Verwaltung der Cybersicherheit von Endkunden Resul Altinkilic, Account Executives Dell Technologies & Kay Dresselhaus Training Manager McAfee Im Zeitalter der digitalen Transformation ist Sicherheit und Datenschutz ein wichtiges Thema für Unternehmen in ihren Entwicklungs - und Innovationspe... 3 weeks ago | 21 mins Cybersecurity in the C-Suite Diana Kelley, SecurityCurve | Richard Meeus, Akamai | John Jacobs, Fortinet | Mike Davis, ExactlyIT C-Level executives are increasingly being targeted by cyber criminals: according to an IBM survey, “64% of CFOs, CHROs and CMOs feel the least engaged... August 30, 2022 4:00pm Executive Protection at Home is the Major Gap in Cybersecurity Dr. Chris Pierson There is no longer any difference between personal and corporate protection when it comes to members of the executive team and board. High-level indiv... 3 months ago | 51 mins Applying Chain of Trust Principles to Data Protection Ed Soo Hoo - Lenovo DCG Field C Suite Innovation and Transformation Exec and Greg Tevis - Cobalt Iron VP of Global Strategy Join us for a virtual Lenovo Data Center Customer Briefing An unsettling trend is underway as attackers are now targeting backups, the very systems t... 4 weeks ago | 43 mins Data Protection for Kubernetes: Identifying a Kube-native Approach Chris Milsted With cloud-native applications, the architecture is completely different to previous monolithic patterns, and hence a new data protection approach is ... September 22, 2022 3:00pm Why the Midrange Storage Buyer is now in the Driver’s Seat Andrew Buss, Research Director at IDC and Tom Christenson, Global Technology Advisor & Executive Analyst at Hitachi Vantara. Your business is becoming truly digital. Your operations are getting increasingly complex. And your data is growing exponentially. In other words, y... 4 weeks ago | 43 mins Load more