Hi [[ session.user.profile.firstName ]]
Sort by:
    • Breach Readiness:  Next Generation of Incident Preparedness Breach Readiness: Next Generation of Incident Preparedness Russell Teague, Managing Director, Mandiant, a FireEye Company Recorded: Jun 7 2016 6:00 pm UTC 56 mins
    • Are you ready to handle a security breach? Russell Teague, Managing Director, Mandiant, a FireEye Company, will discuss the Next Generation of Incident Preparedness. Mandiant is the world leader in Incident Response Management; no other company is involved in more of today's largest breaches. Russell will discuss what companies need to do to be breach ready, and how being proactive in your incident preparedness is essential and could save you from devastating cost.

      Incident preparedness is more than having an incident response plan, it's more than having skilled personnel on staff. Come join us in an eye-opening discussion on key elements that every company should consider. Major security breaches have become part of everyone's daily news feed, from the front page of the newspaper to the top of every security blog, you can’t miss the steady flood of new breaches impacting the world today. In today’s every changing world of business and technology, breaches are inevitable, you must be prepared before they happen. Learn how to become prepared from the industry leader in breach management and ultimately control your cost in post breach recovery.

      Register now for this compelling discussion on Next Generation Incident Preparedness.

      Read more >
    • BCI webinar: Organizational preparedness for active shooter incidents BCI webinar: Organizational preparedness for active shooter incidents Suzanne Blake & Stephen Austin (Witt O'Brien's) Recorded: Mar 17 2015 2:00 pm UTC 60 mins
    • This webinar will delve into organizational preparedness, response, recovery, and business continuity considerations for active shooter incidents, including:

      -Training and education before an incident occurs, so that individuals are empowered to make choices as to how they will react when confronted with an active shooter incident, as well as how to best coordinate with law enforcement and other pertinent stakeholders on preparedness measures for an active shooter incident.
      -The importance of emergency notification, and having the tools and procedures in place so that they work seamlessly in emergencies like active shooter incidents that require immediate attention.
      -The crisis management efforts required in the aftermath of an active shooter incident and associated challenges, including public information and outreach, deploying mental health and counseling resources, planning and conducting memorial services, and facilitating the resiliency of the organization and its people.
      -Balancing the response and emotional aftermath of an active shooter incident with business continuity priorities and continuing essential functions and critical operations, including the challenges associated with dedicating the multitude of resources required to manage such an incident.

      Read more >
    • Ask the Analyst: Breach Planning and Preparedness Ask the Analyst: Breach Planning and Preparedness Eric Ogren, 451 Analyst; Brian Hussey, Trustwave SpiderLabs Global Director Recorded: Jan 27 2016 4:00 pm UTC 60 mins
    • It is always a good idea to be prepared. A quick and efficient response to an attack on your network can save an untold amount of time, money and staff hours. Even more, in today’s risk environment you need to know what tools to have in place to flag potential indicators of a compromise, have a response team on the ready and have a digital evidence trail for legal protection.
      Join us for an interactive discussion with guest speaker, 451 Research Senior Analyst, Eric Ogren and Trustwave SpiderLabs Global Director of Incident Response and Digital Forensics, Brian Hussey, to learn more about what you should do before, during and after a breach. Help drive the conversation by submitting a question for Eric and Brian in advance so we can tackle your biggest security concerns such as:
      • What is the likelihood of getting breached?
      • Best practices around building an IR plan
      • If you’ve been breached, what is the first thing you should do?

      Read more >
    • Improve Your Disaster Recovery Preparedness Improve Your Disaster Recovery Preparedness Chris Horne, Principal Virtualization Consultant at IT Weapons and David Styczynski, Channel Systems Engineer at VMware. Recorded: Mar 21 2012 3:00 pm UTC 57 mins
    • Do you worry about the business impact of data loss if disaster strikes? Does your DR plan depend on complicated, error-prone run books and manual processes? Do you refrain from testing your DR plan because it's expensive and difficult? If you've answered yes to these questions, then you're not prepared, and your business may be at risk.

      True business resilience requires investment, and monetary cost is only a portion of this investment. Developing the right disaster recovery strategy for your organization takes time and planning. Join IT Weapons and VMware for this webcast to see strategies and solutions that will improve the disaster recovery preparedness for your business.

      Attend this webcast to learn:
      •The 3 key phases to providing robust Disaster Recovery services
      •How automating processes with VMware Site Recovery Manager 5 can simplify management and ensure fast and reliable recovery
      •How IT Weapons Data Protection Services can help your organization

      Read more >
    • Disaster Preparedness for Small Business Owners Disaster Preparedness for Small Business Owners Oz Hill and Jim Satterfield, Firestorm Recorded: May 23 2012 6:00 pm UTC 60 mins
    • This webinar topic isn't meant to scare you. It's not meant to make you feel guilty either. But, it is meant to help you--by forcing you to think about your important business assets and a recovery plan.

      Disaster is an ugly word. It's not something that you think about everyday. It's something you read about or hear about in the news that affects someone else. But you should think about it--and you should be concerned if you don't have a contingency plan for business-as-usual operations after a catastrophic event.

      Especially in the past couple of years, Americans have been exposed to increasing national disasters, including floods, tornados, hurricanes and wildfires. And that doesn't begin to speak to fires, break-ins and robberies, etc.

      The question is "could your business survive any of these types of events"?

      Recent University of Texas research suggests that only 6% of companies could survive a catastrophic data loss, and that 43% would never re-open, and of those that do re-open--51% would be forced to close within 2 years. Plus, Gartner Research estimates that only 35% of America's small/medium businesses have a comprehensive disaster recovery plan in place.

      We thought this would be a good time to introduce your small business to some very nice and very knowledgeable guys from a company called Firestorm. Founded in 2005, Firestorm is working hard to protect and to serve small businesses, like yours! During this webinar, Firestorm will provide you with tools and information you'll need to begin preparing your business--should any type of disaster strike in your area.

      The best way that you can help your business today is to be prepared for whatever tomorrow may bring. This is your chance to learn how you can protect all of your company's assets--and an opportunity to ask our panel of experts about your individual concerns.

      Read more >
    • Recognise your Threats, Regulate your Risks Recognise your Threats, Regulate your Risks Vipul Kumra,Consulting Engineer, FireEye India,Shantanu Mahajan, Consulting Engineer, FireEye India Upcoming: Jul 26 2016 5:30 am UTC 60 mins
    • Cyberattacks against Banking and Financial Institutions have evolved from annoying pop-ups and machine crashes to denial-of-business events. CxO resignations and losses/damages running into crores of Rupees have heightened the awareness around cyber security, and shifted it from an IT problem to a business priority risk.
      Recently, Asia has been a hotspot for such cyberattacks, with many high-profile attacks being the subject of headlines across the region, including the most recent Bangladesh Bank breach.
      In its latest annexure to banks titled “Cyber Security Framework in Banks”, RBI has outlined a number of proactive measures that Banks in India need to take to ensure a robust cyber security/resilience framework, and to ensure adequate cyber security preparedness on a continuous basis.

      Here are just a few requirements:
      -Board approved cyber security policy
      -Continuous surveillance
      -Cyber crisis management plan
      -Cyber resilience framework
      -Cyber security awareness among stakeholders / top management / board
      FireEye invites all banks and financial institutions to join this exclusive webinar where the speakers will review the RBI guidelines and suggest ideas to bolster your response strategy and limit the consequences of a breach.

      Date: 26th July, Tuesday
      Time: 11:00 am
      Duration: 40 mins. With Q&A
      Vipul Kumra, Consulting Engineer, FireEye India
      Shantanu Mahajan, Consulting Engineer, FireEye India

      Read more >
    • Supporting the Warfighter: Recruitment, Retention, Readiness Supporting the Warfighter: Recruitment, Retention, Readiness Defense One Live | Underwritten by: Monster Government Solutions Recorded: Feb 23 2016 4:00 pm UTC 66 mins
    • Maintaining a fully manned and dynamic workforce is a key component of military readiness. While much of the force readiness conversation is focused on the warfighters themselves, equally important is developing and sustaining the talent that provides the military with the infrastructure to accomplish its missions.

      The future force will require expertise in technology, acquisition management, exacting test and evaluation, sustainment of weapon systems and other highly skilled applications to support wartime operations, emergency preparedness and humanitarian missions.

      In a time of tightening budgets: How do DOD critical skills gaps affect mission support functions? What is shaping force readiness?

      Join us as we discuss manpower and talent required to support the warfighter and their influence on shaping force readiness.

      Read more >
    • Effective crisis communication techniques to avoid a reputation train wreck Effective crisis communication techniques to avoid a reputation train wreck Caroline Sapriel (CS&A International) Recorded: May 20 2016 9:30 am UTC 61 mins
    • There are crises and then there are reputation train wrecks. In the former, your organisation is thrown into a period of chaos that may last days, weeks or months. Stakes and costs are high, but by quickly demonstrating ownership, integrity, genuine stakeholder concern and swift action, your chance of recovering and even enhancing your organisation’s reputation is strong. Think Johnson and Johnson’s Tylenol crisis.

      In the latter on the other hand, slow response, lack of responsibility, blame and insensitivity to stakeholders’ perceptions will quickly propel your organisation into a reputation train wreck that may damage and possibly destroy it forever. Think BP, Volkswagen and FIFA.

      Indeed bad management and communication can turn a crisis into a reputation train wreck and only principled-based organisations with effective crisis leadership and preparedness can weather the storm and even emerge from it stronger. In this webinar, you will:

      - Gain some fundamental best practice insight on how prepare for crises and prevent a reputation train wreck
      - Learn real-world response strategies to protect your credibility and retain stakeholder trust even in the most adverse circumstances

      Read more >
    • Are SMBs Prepared for Disaster? Are SMBs Prepared for Disaster? Susie Spencer, Sr. Product Marketing Manager, Symantec Recorded: May 18 2011 5:00 pm UTC 41 mins
    • According to Symantec’s 2011 SMB Disaster Preparedness Survey report, the findings show that though SMBs are at risk, they are still not making disaster preparedness a priority until they experience a disaster or data loss. Half of the respondents do not have a plan in place, even though 65 percent of respondents live in regions susceptible to natural disasters.

      The data also reveals that the cost of not being prepared is high, putting an SMB at risk of going out of business. The median cost of downtime for an SMB is $12,500 per day.

      According to the survey, downtime not only costs SMBs several thousands of dollars, it also causes their customers to leave. Fifty-four percent of SMB customer respondents reported they have switched SMB vendors due to unreliable computing systems.

      Symantec’s Monica Girolami will discuss the findings from the Symantec 2011 SMB Disaster Preparedness Survey report, and share tips for small businesses to follow when pulling together a disaster preparedness plan.

      Read more >
    • Pulse on Advanced Threats: Findings from Arbor Networks' WISR Report Pulse on Advanced Threats: Findings from Arbor Networks' WISR Report Paul Bowen, Principal Security Technologist + Arabella Hallawell, Senior Director of Product Marketing, Arbor Networks Recorded: Feb 11 2016 4:00 pm UTC 43 mins
    • A discussion on the current state of advanced threat protection and incident response preparedness that will include both highlights from Arbor's Worldwide Infrastructure Security Report (WISR) as well as original research by Arbor's Security Engineering & Response Team (ASERT). The WISR is a global survey of security professionals, highlighting the key trends in the threat landscape along with the strategies network operators adopt to address and mitigate them. We’ll also provide a deep understanding of two attack campaigns discovered by ASERT. One multi-stage attack campaign was focused on government organizations and a second was focused on financial services organizations.

      This session will cover:

      • The primary challenges facing security teams with emphasis on the balance between technology, people and process.

      • Insight into attack campaigns happening on the broader Internet and an understanding of why it is critical to connect that activity to conversations on internal networks.

      • How businesses are adapting and changing their threat detection and incident response to reduce risk posture

      Read more >