Hi [[ session.user.profile.firstName ]]
Sort by:
    • Next-Generation Mission Critical IT: Modernizing Your Environment
      Next-Generation Mission Critical IT: Modernizing Your Environment Sajid Khan, Mission Critical Segment Manager, Intel Daniel Sullivan, Technical Solution Manager, IBM Recorded: Dec 18 2012 6:00 pm UTC 61 mins
    • Keeping the most important workloads up and running smoothly, 24/7 can keep IT managers up at night. Additionally, the need to rapidly analyze the ever-increasing amounts of data being generated in connected world is major imperative. Increasingly, these challenges need to be met in a tight budgetary environment.

      You’re faced with a strategic choice: Continue to try to meet these growing demands with legacy infrastructure, or migrate your mission-critical deployments to an open-standards-based environment built upon Intel® Xeon® processor-based solutions solution stacks.


      Join our panel of experts to learn a proven approach to modernization. Topics include:
      · Trends and market data related to mission-critical application modernization and a perspective on the updated solution stack

      · Strategic options to address the current software-, hardware-, and business-related challenges in your mission-critical environment

      · Practical steps for your mission-critical migration projects, including which workloads to transition first, and ways to divide the project into manageable pieces

      · Lessons learned in modernizing mission-critical environments, based on a rich history of innovation and global experience from IBM and Intel


      Bring your most pressing mission-critical questions and challenges and ask the experts. This webinar will be live.

      Read more >
    • Securing Critical Systems in the Age of IoT
      Securing Critical Systems in the Age of IoT Aaron Turner, IANS IoT Research Faculty & Dimitri Vlachos, VP Marketing, Pwnie Express Upcoming: Jun 22 2017 7:00 pm UTC 60 mins
    • Smart stadiums, connected healthcare, personalized retail experiences are just a few industries where the Internet of Things (IoT) is fundamentally changing the boundaries of cyber and physical security. Once separate, isolated business critical systems are now connected. Medical devices monitoring patient health during operations sit side by side with guest wifi networks. HVAC and coach communication systems run in the same environment as the interactive fan experience, all critical to today’s stadium experience. Retail point of sale (POS) systems are connected to inventory management robots in grocery stores.

      Join this webinar and learn more about:

      - How security programs must adapt to an IoT connected world
      - Why isolation is no longer a practical solution for protecting critical systems
      - Cybersecurity risks stemming from the IoT

      This talk will explore and discuss how security programs must adapt to an IoT connected world where isolation is no longer a practical solution for protecting critical systems and their customers. As the IoT is integrated into nearly every aspect of a modern business, cyber-related risks elevate from a primary focus on data, to that of physical facilities integrity and business availability.

      Read more >
    • Auditing Neglected Critical Infrastructure
      Auditing Neglected Critical Infrastructure Ian Whiting - CEO Titania Group Recorded: Jan 18 2017 2:00 pm UTC 33 mins
    • Key network infrastructure devices are overlooked yet they provide critical functionality. Exploiting web application weaknesses and service buffer overflows is exciting, but the housekeeping of network infrastructure is not. Issues in network infrastructure devices can lead to network wide problems that would cause system admininstration nightmares. This presentation provides a review of key security devices, often side-lined when looking at security. It covers the value of these devices to "Blue Teams", issues "Red Teams" can highlight, desired outcomes and auditing practices.

      Read more >
    • Grid Cyber Lockdown: Ransomware in Critical Infrastructure
      Grid Cyber Lockdown: Ransomware in Critical Infrastructure - Recorded: Aug 25 2016 2:00 am UTC 59 mins
    • Hear from your industry peers and other security experts on this very important topic of Ransomware in Critical Infrastructure:
      - A brief history of ransomware and its current state in terms of technology and methods utilized by attackers.
      - A roundtable discussion on security and compliance risks associated with ransomware at different points of integrated IT-OT infrastructure.
      - Best practices and technologies for protecting your organization against ransomware.

      Panelists
      Billy Glenn, Pacific Gas & Electric, Principal Security Solution Architect
      Gavin Worden, Sempra Energy Utilities, Manager, Information Security Operations Center
      Christopher Ellefsen, BKK Group, Senior Network Engineer
      Bryan Lee, Palo Alto Networks - Unit 42, Threat Intelligence Researcher
      Jack Whitsitt, EnergySec, Senior Security Strategist
      Del Rodillas, Palo Alto Networks, Solution Lead for ICS/SCADA Security

      Read more >
    • Grid Cyber Lockdown: Ransomware in Critical Infrastructure
      Grid Cyber Lockdown: Ransomware in Critical Infrastructure - Recorded: Aug 25 2016 9:00 am UTC 60 mins
    • Hear from your industry peers and other security experts on this very important topic of Ransomware in Critical Infrastructure:
      - A brief history of ransomware and its current state in terms of technology and methods utilized by attackers.
      - A roundtable discussion on security and compliance risks associated with ransomware at different points of integrated IT-OT infrastructure.
      - Best practices and technologies for protecting your organization against ransomware.

      Panelists
      Billy Glenn, Pacific Gas & Electric, Principal Security Solution Architect
      Gavin Worden, Sempra Energy Utilities, Manager, Information Security Operations Center
      Christopher Ellefsen, BKK Group, Senior Network Engineer
      Bryan Lee, Palo Alto Networks - Unit 42, Threat Intelligence Researcher
      Jack Whitsitt, EnergySec, Senior Security Strategist
      Del Rodillas, Palo Alto Networks, Solution Lead for ICS/SCADA Security

      Read more >
    • Zero Downtime for Your Mission-Critical Applications
      Zero Downtime for Your Mission-Critical Applications Raj Meel Recorded: Apr 28 2016 2:00 pm UTC 55 mins
    • Did you know that 31 percent of downtime comes from hardware problems and 13 percent comes from human error? How would you like to minimize or even eliminate these business interruptions?
      This webinar discusses what you can do to approach zero downtime for your mission-critical applications. You’ll learn:
      •How you can maximize hardware uptime by implementing high availability, geo-clustering, live patching and easy rollback
      •How to minimize human error by automating asset management and patch application
      •How T-Systems International is using SUSE open source infrastructure to keep its mission-critical systems up and running

      Read more >