Hi [[ session.user.profile.firstName ]]
Sort by:
    • Sustainable fire suppression solution for data centres - 10am CET, April 3rd Sustainable fire suppression solution for data centres - 10am CET, April 3rd Bart Goeman, 3M Electronics Markets Materials Division Recorded: Apr 3 2012 11:00 am UTC 48 mins
    • 3M has developed, introduced and commercialized an unprecedented sustainable halocarbon clean extinguishing agent whereby researchers have struck a balance of not only being effective in fire extinguishing but also demonstrating superior environmental properties in combination with a low toxicity and reduced space and weight requirements. It should also possess sufficient chemical/thermal stability during handling and in end use.. This halocarbon belongs to the fluoroketone class. The chemical formula of CF3CF2C(O)C(CF3)2 is identified in the new ISO 14520 standard by the ASHRAE nomenclature FK-5-1-12.
      Commercially known as 3MTM Novec™ 1230 Fire Protection Fluid and manufactured by 3M Company, this novel clean extinguishing agent has been shown to combine the performance and environmental attributes sought by industries that demand the high level of performance previously provided by halon until its phase-out. Compared to inert gas and water mist, systems using Novec 1230 fluid are much compacter and as such require much less space (and weight concerns).
      What is unprecedented is this fluoromaterial's environmental properties that are on the order of naturally occurring compounds. Novec 1230 fluid has a surprisingly short atmospheric lifetime and yet has exhibited the stability necessary for use as a clean extinguishing agent.
      Novec 1230 fluid was introduced in 2002 as a halon replacement alternative to HFCs and now has a history of use globally for the protection of special hazards / high value assets, especially in occupied spaces resulting in greenhouse gas emission reduction in industries where environmental objectives stress the use of sustainable technologies.

      Read more >
    • If there are so many vulnerabilities, why isn't the world on fire? If there are so many vulnerabilities, why isn't the world on fire? Dan Raywood, Editor of IT Security Guru Recorded: Jul 30 2014 2:00 pm UTC 39 mins
    • Join the first www.itsecurityguru.org webinar on: "If there are so many vulnerabilities, why isn't the world on fire?"

      In this inaugural webcast from IT Security Guru, editor Dan Raywood will be joined by some of information security's biggest names to discuss if there are so many flaws in hardware, software and open source projects, why is the world not at a standstill? Recently flaws have been revealed to be present in the US military's missile system (http://itsecurityguru.org/top-ten-stories/pentagon-reports-concerns-flaws-missile-defences/), and as well as a monthly patch for the most used browser (http://www.netmarketshare.com/browser-market-share.aspx?qprid=2&qpcustomd=0) and the open source communication protocol used by thousands of websites, so why is the world not on fire with this in mind?

      For this webcast, we will be joined by industrial controls and cyber risk researcher Lewis Henderson, who brings 15 years of experience of enterprise and Government-level advanced technical security solution knowledge. Lewis has published a series of Management Guides, geared towards promoting Cyber Risk to the C suite.

      Also speaking is Conrad Constantine, formerly of AlienVault and the man who caught the RSA breach. Over the past year Conrad has been coding full time on a project after spending 15 years on the front lines of defence work in telecom, medical and media corporations.
      Finally we also welcome Cris Thomas, technical manager at Tenable and a former member of the hacker collective L0pht. Chris was known as Spacerogue and his work included creating the Hacker News Network and The Whacked Mac Archives, which was the largest and the most popular Macintosh security website.

      Join us at 3pm on Wednesday 30th July for a lively and humorous debate on the state of security when it comes to insecure applications and platforms, and help you realise both how to manage with vulnerabilities and fix what our speakers deem to be the most critical flaws first.

      Read more >
    • Kindle Fire in the Workplace - New Enterprise Features! Kindle Fire in the Workplace - New Enterprise Features! Kaushik Srinivas, Product Manager at Fiberlink Recorded: Oct 10 2013 6:50 pm UTC 53 mins
    • Kindle Fire is not just for reading your favorite novel anymore!

      Kindle Fire devices, like the new Kindle Fire HD and HDX are making inroads in the workplace with employees accessing email and sensitive data through corporate networks. Including Kindle Fire products in your BYOD program can reap significant productivity benefits for businesses, schools, healthcare and all types of organizations, but security is key.

      View this webinar to learn about:

      - New Kindle Fire devices and Amazon's Fire OS 3.0 "Mojito" and how they advance productivity in the enterprise
      - How schools can deliver powerful educational content on Kindle Fire devices while protecting student privacy
      - How to use MaaS360 to secure Amazon's Fire OS 3.0 "Mojito" for Kindle Fire HD and HDX tablets in BYOD programs

      MaaS360 integration with Kindle Fire provides the controls for IT to confidently embrace Kindle Fire tablets knowing that sensitive data and network access can be secured easily and reliably. Enterprise features available on the Kindle Fire HD and HDX include device encryption, native VPN client, single sign-on, and certificate-based enrollment.

      Kaushik Srinivas, Product Manager at Fiberlink, presents new Kindle Fire product advances and show you how you can quickly and easily incorporate these powerful devices in your BYOD and education programs.

      Read more >
    • CVSS Under Fire: How to Solve The Prioritization Problem CVSS Under Fire: How to Solve The Prioritization Problem Michael Roytman, Chief Data Scientist at Kenna Recorded: Aug 26 2015 3:45 pm UTC 43 mins
    • In the landscape of vulnerability management, you know that effective prioritization of vulnerabilities is the difference between "playing the numbers game" and truly being an InfoSec rock star. But too often, our primary resource--the CVSS--is relied on too heavily, with disastrous consequences.

      Michael Roytman, Chief Data Scientist at Kenna, will explain what IT security professionals miss by placing too much trust in CVSS when it comes to prioritization efforts. He will also explain what information should absolutely be taken into consideration in order to focus on vulnerabilities posing the greatest risk. Topics covered include:

      - Why CVSS sometimes gets it wrong
      - Specific examples of serious exploits being given low scores
      - What IT security professionals should do to supplement CVSS
      - How the proper use of threat intelligence can accelerate your vuln management program

      Read more >
    • Move beyond the fire-fighting with predictive service operations Move beyond the fire-fighting with predictive service operations Gerben Verstraete, HP Software Recorded: Feb 20 2014 6:00 pm UTC 41 mins
    • Many IT Operations teams are trying to cope with the increasing complexity of their environment but are struggling to move beyond the perpetual “fire-fighting” mode of operation. Transforming IT Operations from reactive to predictive is a challenging journey. But staying on track is much easier when you can follow a well-travelled path.

      HP Software Professional Services has been at the epicenter of the IT Operations environment and learned the best ways to transform service management across the organization. We’ll share our Business Service Management (BSM) maturity model and how it can help you evolve your IT operations from reactive to predictive management. In this session you will find out:

      • What the BSM maturity model is
      • How to tell where you are and w hat new capabilities you need in order to increase your maturity
      • How you can use a maturity-based approach to manage business services

      Read more >
    • Security Beyond the (Fire)wall Security Beyond the (Fire)wall Lead Security Specialist,Barclays,(ISC)2 Apps Security Advisory Board; Partner, Field Fisher Waterhouse; EMEA CTO, Intralinks Recorded: Jun 19 2013 2:00 pm UTC 61 mins
    • Only 22% of data breaches are as a result of an external attack on corporate servers . In the vast majority of cases, breaches involve the inadvertent mishandling of information by insiders or third party partners. For example: a confidential document is accidentally sent to the wrong person, an employee drops files into a consumer-grade file sharing solution to access them on holiday, or an organisation terminates a relationship with a partner or supplier after having shared proprietary information with them.

      Enabling your staff to work remotely, on a multitude of devices, and on unsecured networks is essential for many 21st century businesses. However, such a model also has very specific risks, particularly for financial services, life sciences and other IP-intensive industries.

      This webcast addresses the technological challenges of maintaining full control of your most sensitive information - even once it goes beyond the firewall - while maintaining the freedom and flexibility necessary to allow your staff and other stakeholders to work as efficiently as possible.

      Speakers include:
      Stewart Room, Partner, Field Fisher Waterhouse
      Nick Harwood, Lead Security Specialist, Barclays
      Bola Rotibi, Founding Member, (ISC)2 Application Security Advisory Board
      Richard Anstey, EMEA CTO, Intralinks

      Read more >
    • Microsoft Azure for Disaster Recovery in Education Microsoft Azure for Disaster Recovery in Education Sheela Varadhan, Microsoft; Chris Irwin, SADA Systems Recorded: Jan 18 2016 4:50 pm UTC 49 mins
    • Fires. Storms. Floods. Attacks. When you think of disasters, you may think of the headlines in the news and the pictures of communities recovering from misfortune. But think for a moment of how much your school depends on its technology and how much smoother the return to normalcy could be after a disaster if you had the peace of mind that your school's data was protected, backed-up and recoverable. That's one less worry.

      Join us for Microsoft Azure for Disaster Recovery in Education to learn how to have a strong disaster recovery solution in place in case the worst-case scenario happens. Learn how Microsoft Azure can help you eliminate the need for investment in expensive backup datacenter or hosting-based disaster recovery solutions.

      This session will cover how you can:
      •Lower traditional cost of operating: roughly 50% cost reduction over most on-premises disaster recovery
      •Gain peace of mind: Reliable, offsite, & potentially geo-replicated backup storage
      •Benefit from increased uptime: 99.9% availability guaranteed Fast, automatic, testable backups

      Plus, learn more about how a disaster recovery plan and assessment by SADA Systems, a Microsoft U.S. Education Cloud Productivity Partner of the Year ensures that your organization is prepared for the unexpected before it’s too late.

      Read more >
    • BCI webinar: Design in Resilience at the start, don't rely on Testing at the end BCI webinar: Design in Resilience at the start, don't rely on Testing at the end Dr. Peter Newport MBCI & Tony Perry (IBM) Recorded: Mar 19 2015 11:00 am UTC 57 mins
    • Regular and representative testing is the only sure-fire way of confirming that you have the capability, people, and processes in place to respond to unplanned events - whether they be positive, such as a sudden increase in demand for your products, or negative, such as a fire in your Head Office. However, at IBM we believe that Resilience should be designed in from the start; not just in IT systems but across the entire seven layer model of all Enterprises - from the Business Strategy, through the Organisational structure, within the Applications that support Business processes, through infrastructure and into the underlying building fabric of office and data centres.
      Dr Martin Jowett and Dr Peter Newport MCBI will outline the important aspects all Enterprises should be adopting to prepare themselves for today's modern Business demands as the need to be 'always on' becomes a reality.

      Read more >