Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How Strong Is Your Last Line of Defense? Thomas Reichardt, Sales Backup & Recovery Solutions and Ulrich Wallscheid, Data Protector Product Manager, OpenText There’s no shortage of risks to your organization’s data integrity. That’s why you need to sort the backup and recovery approaches that help from thos... 5 days ago | 45 mins How to Keep Sensitive Data Safe and Compliant Nick Hogg, Director of Technical Training at Fortra Keeping data secure is a constant exercise of fighting cyber threats that change daily and maintaining a strong training program for employees to stay... June 1, 2023 9:00am Recovery from a Data Emergency Geoff Rennie, Pre-Sales System Engineer & Partner Business Manager, OpenText If you’ve had an “event,” or one is on your horizon, your number-one concern is how to get back to normal operations. Doing so takes robust protection... 1 week ago | 43 mins Demonstrating the Value of Cybersecurity: Lessons from a Global CSO Roland Cloutier - Global CSO, Dan MacKenzie - Sr Product Marketing Mgr at ExtraHop, Sanitra Desai - Consultant at Forrester As economic uncertainty persists, CISOs are under mounting pressure to demonstrate the value and impact of their cybersecurity programs and security t... 1 week ago | 50 mins What´s new in Data Protector 11.03 and Data Protector for Cloud Workloads 5.2 Geoff Rennie, Pre-Sales System Engineer and Partner Business Manager & Troy Drewry, Data Protector Product Manager, OpenText These days, your workers need access to data from anywhere at any time. But providing easy access while complying with security regulations is difficu... 2 months ago | 55 mins Tech and Talent - Challenges Operationalizing Effective Security Teams Binary Defense - David Kennedy, Co-Founder and Chief Hacking Officer and ExtraHop - Rafal Los, Head of Services GTM The days when CISOs would build out large Security Operations teams with giant screens mounted on large walls of a busy SOC seem to be waning. Two op... 1 month ago | 60 mins M365 data loss vs. data protection: Where do you fall? Cristophe Bertrand, ESG | Dave Russell, Veeam | Drew Schlussel, Wasabi Want to hear something spooky? Your organization may be at risk of losing access to critical Microsoft 365 data. For many organizations, Microsoft 365... 5 months ago | 40 mins ExtraHop Co-Founder & COO Raja Mukeri on Safeguarding Government Operations ExtraHop Co-Founder & COO Raja Mukeri In this exclusive interview from CrowdStrike Government Summit 2023, hear from ExtraHop Co-Founder and COO Raja Mukerji on how government agencies can... 3 weeks ago | 3 mins Protecting Privacy: How To Achieve Effective Data Privacy With ISO 27701 Moderator: Toby Cane, Speaker: Sam Peters Data privacy is no longer a nice to have; it's an essential requirement for any business looking to build a strong foundation for growth. As an organ... 3 months ago | 56 mins The Science of Cybersecurity: Best Practices in the New Normal Theresa Lanowitz, Director, AT&T Cybersecurity and Phil Quade CISO, Fortinet As organizations adapted quickly to large-scale WFH policies, CISOs and cybersecurity leaders must work in parallel to address new and heightened cybe... 2 months ago | 59 mins Load more