IT Contingency Planning for H1N1 Pandemic

Phil Schacter, Vice President and Research Director
Buron Group analysts consider the potential impact of an H1N1 pandemic on the IT organization, and identify steps that can be taken to support the organization by leveraging collaboration tools, data center automation, and an exoanded program of remote access by employees and partners. Issues related to how an organization manages identity, and secures endpoints and remote access will also be consodered.
Nov 6 2009
33 mins
IT Contingency Planning for H1N1 Pandemic
IT H1N1 Planning
Join us for this summit:
More from this community:

IT Security

Webinars and videos

  • Live and recorded (4525)
  • Upcoming (153)
  • Date
  • Rating
  • Views
  • Modulo Director of Technical Services John Ambra walks Risk Manager users through the latest version 8.4, and answers user questions at the end.
  • McAfee is unique among secure web gateway solution providers with its hybrid delivery model, which provides the flexibility to deploy a web gateway on-premises, in the cloud, or in combination. In this session, McAfee will discuss details of the hybrid web protection deployment model and the various elements that comprise it, along with provide guidance on to choose the deployment scenario that best addresses your organization’s specific business needs.
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Once upon a time, a knowledge worker accessed proprietary
    documents on a company-owned desktop computer within the corporate
    firewall. Today's work environment is dramatically different - sensitive
    data and proprietary documents are increasingly produced and accessed
    outside the firewall, on employee-owned devices. Virtual collaboration is
    growing, and the cloud is redefining security paradigms even further. Yet,
    some things remain the same. Intellectual property must be protected,
    regulations must be complied with, and individual identities,
    authentication and privileges must be dynamically managed. This panel will
    look at how changing use cases and scenarios are changing the threat
    landscape for corporate IP, and how leading vendors are rising to the
    occasion to help enterprises meet these challenges. It will also discuss
    best practices in developing and executing a forward-looking IP protection
    strategy.
  • Once upon a time, a knowledge worker accessed proprietary
    documents on a company-owned desktop computer within the corporate
    firewall. Today's work environment is dramatically different - sensitive
    data and proprietary documents are increasingly produced and accessed
    outside the firewall, on employee-owned devices. Virtual collaboration is
    growing, and the cloud is redefining security paradigms even further. Yet,
    some things remain the same. Intellectual property must be protected,
    regulations must be complied with, and individual identities,
    authentication and privileges must be dynamically managed. This panel will
    look at how changing use cases and scenarios are changing the threat
    landscape for corporate IP, and how leading vendors are rising to the
    occasion to help enterprises meet these challenges. It will also discuss
    best practices in developing and executing a forward-looking IP protection
    strategy.
  • Trend Micro sponsored an extensive security survey of businesses in North America and Europe. Conducted by Cyber-Edge Group, LLC, a premier research and marketing firm, the survey examines the current and planned deployment countermeasures for establishing effective cyber defenses. This webinar will reveal the significant findings from the survey and accompanying report and is intended to provide IT security decision makers with a better understanding of how their perceptions, concerns, priorities – and most importantly – current defensive postures stack up against those of other IT security professionals and organizations. Key highlights from the report include:
    • One in four security professionals doubt whether their organization has invested adequately in cyber threat defenses.
    • Over 60% of respondents were affected by a successful cyber-attack in 2013, but less than 40% expect to fall victim again in 2014.
    • Mobile devices (smartphones and tablets) are perceived as IT security’s “weakest link”, followed by laptops and social media applications.
    • One in four organizations lack the tools necessary to properly investigate the root cause and material impact of network security breaches.

    Join Mark Bouchard, Vice President with Cyber-Edge Group and Jon Clay, Director of Global Threat Research with Trend Micro, for this webinar to learn more about the state of cyber threat defenses among today’s businesses and gain a better understanding of what you can do to improve your defenses going forward.
  • Channel
  • Channel profile
Up Down
  • Cloud Security Questions & Strategies Recorded: May 25 2010 61 mins
    Dan Blum of Burton Group will moderate a panel on the most pressing issues in cloud security with:

    Andy Ellis, CSO, Akamai
    Lee Badger, Computer Scientist, NIST
    Adrian Seccombe, Open Group Jericho Forum
  • Building a SOA Governance Program Recorded: Mar 3 2010 45 mins
    Effective governance is a critical element in fostering a successful service oriented architecture (SOA) initiative. SOA governance directs the SOA initiative and helps ensure that it delivers value to the business. Unfortunately, numerous interviews with Burton Group clients reveal that many organizations don’t know which aspects of the SOA initiative to govern or how best to govern them. This session presents a framework for developing a SOA governance program.
  • Server Virtualization: Maturity Brings Complexity Recorded: Jan 21 2010 51 mins
    Server virtualization has matured to the level of enterprise production deployment resulting in increased complexity as it is integration into the enterprise data center environment. Mission critical workloads are being deployed in virtual environments in order to gain the flexibility and cost savings that server virtualization affords, however, these workloads demand enterprise level management and tight security controls that have heretofore not been required of virtual environments. In this presentation, Burton Group’s Data Center Strategies Service Director Richard Jones will walk through the trends and issues facing server virtualization as it finds its way into the production data center.
  • Leverage Data from Disparate Silos for Config and Change Mgmt. Recorded: Jan 14 2010 49 mins
    Successful Configuration and Change Management requires data from multiple sources. In addition to the configuration data that typically lives in the CMDB, to get a complete picture you must often pull together supplemental information about software applications. Information about software applications comes from diverse IT groups such as Operations, Security, Finance, Data Management, Help Desk, Project Management, and Enterprise Architecture. Each of these groups typically maintains a silo of their own information about software applications, which information could be quite valuable for Configuration and Change Management processes. You can’t force these groups to get rid of their own silos of information about software, so how can Configuration and Change Management processes use their data effectively? This presentation explains a case study in federating and harmonizing data about software applications from multiple silos.
  • Electronic Discovery: What's the Impact? Recorded: Dec 10 2009 45 mins
    Although it's been more than two years since the Supreme Court modified the Federal Rules of Civil Procedure (FRCP)--which greatly elevated the status of electronically stored information for court cases--most organizations are still struggling to get their arms around the critical elements of eDiscovery. Many security and compliance teams have spent their careers justifiably focused on protecting information’s confidentiality; ensuring data availability and discoverability is a whole new game. This talk will review the major snags and snarls caused by eDiscovery and present both a maturity model and industry trends around the impact of electronic discovery.
  • Enabling Mobility without Compromising Security Recorded: Dec 8 2009 47 mins
    Today’s workforce is increasingly on the move and enterprises must meet the demands for secure access to information systems to support new business models. No longer can the enterprise dictate what device the employee will use for access – devices may be enterprise owned but enterprises must also support employee-owned and even or public access devices. The mobile workforce also includes non-employees that perform valuable services for the organization, and need limited access to protected systems.

    This talk will address:

    • Use cases for mobile workers
    • Technical solutions that may assist in managing the risk to the enterprise
    • Deployment considerations that enterprises should take into account
  • IT Contingency Planning for H1N1 Pandemic Recorded: Nov 6 2009 33 mins
    Buron Group analysts consider the potential impact of an H1N1 pandemic on the IT organization, and identify steps that can be taken to support the organization by leveraging collaboration tools, data center automation, and an exoanded program of remote access by employees and partners. Issues related to how an organization manages identity, and secures endpoints and remote access will also be consodered.
  • Productivity Suites 2009 Recorded: Oct 13 2009 23 mins
    After years of quiet, the productivity suite market is going through a rebirth, bolstered by new competitors (e.g., Google, IBM, ThinkFree, and Zoho), more price points (from free to several hundred dollars per user), more delivery models (e.g., software, SaaS, and software/SaaS), and a broader vision of functionality (content sharing and collaboration). In this TeleBriefing, Research Director Guy Creese rates vendor capabilities as well as their strategy and vision, delivering a market quadrant that will help enterprises understand their productivity suite options.
  • State of the Union for DLP Recorded: Oct 6 2009 41 mins
    This webcast will cover drivers and customer needs, the Data Leakage Prevention (DLP) market, we will define DLP, address segmentation, and highlight some interesting relationships.

    In this presentation we will also include the following information about the study:
    Methodology
    Inclusion criteria
    Evaluation criteria
    The categories
    The results
    Next steps
  • Burton Group Trends for 2010 Recorded: Sep 22 2009 26 mins
    Burton Group has identified IT trends that will ultimately affect enterprise IT practices and strategy. The trends also bring business and technology stakeholders closer together, especially where pure economics drive enterprise IT decisions. IT professionals find themselves at a critical junction in the decade beginning in 2010.
  • Vendor Management in the Clouds - Ideas for Any Economic Climate Recorded: Sep 9 2009 57 mins
    Join CIO Executive strategist Jack Santos as he discusses vendor management strategies with licensing expert Ania Levy of Levy Legette.

    An expense strategy that works regardless of economic climate (good or bad) coupled with a growth in cloud-based IT makes supplier relationship skills a core competency for IT departments. Meanwhile, software vendors continue to make the licensing process unnecessarily complex, and both parties lack the lessons of experience to police and administer agreements.
    Ms. Levy’s extensive experience with vendor negotiation, contract review, and software licensing will enable her to share with us her insights into the world of vendor and contract management.
  • 2010 Planning Guide: Data Management Strategies Recorded: Aug 26 2009 40 mins
    Enterprises continue to consider ways to cut their IT costs by externalizing their IT functions, through software as a service (SaaS), cloud computing, and outsourcing. However, these strategies alone will not fulfill an enterprise’s compliance and profitability mandates. Enterprises are facing demands for regulatory transparency and for economic profitability. To meet these demands, enterprises will need to obtain better information from their existing information systems. An effective strategy for returning to economic growth and for satisfying regulatory requirements in 2010 must include data governance and competent data management.
  • VMworld 2009: Early Analysis, Cool Trends, and Hot Startups Recorded: Aug 25 2009 21 mins
    In this brief webcast, senior analyst Chris Wolf highlights his expectations for the VMworld keynotes, along with his thoughts on where best to spend time in the Solutions Exchange and in the conference sessions.
  • Catalyst Conference Video Now Available! Recorded: Aug 17 2009 3 mins
    Another Good Idea for Bad Times: Video!

    Just in case you missed some Catalyst sessions or need to make sense of your less-than-legible notes, we've made all the sessions available with video, audio and slides. Presentations are available for streaming download. We'll explore the e-commerce web page and explain your options in purchasing Catalyst Conference sessions.
  • Internal Cloud Hardware Infrastructure as a Service Recorded: Jul 28 2009 28 mins
    Burton Group will showcase its early work on internal cloud hardware infrastructure as a service (HIaaS) reference architecture on Wednesday July 29th at Catalyst North America. In this webcast, senior analyst Chris Wolf provides additional details on the top-level HIaaS reference architecture, and highlights key architectural elements such as the virtual data center, cloud OS, virtual and physical infrastructure, external cloud connector, internal cloud management, and enterprise management.
    Details of Burton Group’s internal cloud reference architecture - the result of extensive vendor and customer collaboration.
    A special focus on the growing list of management pitfalls, troubleshooting complexity, future management trends, and practical advice on what can be done today to effectively manage the virtual infrastructure.
    Dissection of vendor hype and an emphasis on architecture and steps to take now to optimize virtual infrastructure operations and management.
  • The Methodology for Overcoming Data Silos (MODS) Recorded: Jun 24 2009 24 mins
    In modern enterprises, data silos are hampering vital work at all levels of the organization. Data silos inhibit the flow of information to the businesspeople who carry out the enterprise’s mission.

    Methodology for Overcoming Data Silos (MODS) projects are data management projects that are ideal for today’s IT environment: inexpensive, low-risk projects that deliver compelling results for the business.
  • The Potential Impact of Oracle & Sun on Identity Management Recorded: Jun 23 2009 58 mins
    The April 20th announcement that Oracle is acquiring Sun Microsystems sent huge shockwaves through the IT marketplace. This is particular true of the identity management (IdM) market in which there is significant overlap between the two vendors’ offerings. Customers are concerned about their IdM investments and are eager to learn what the combined product roadmap has in store. Many Sun/Oracle customers must make product selection decisions during the quiet period for the acquisition – they can’t stop their businesses until the product roadmap is released. In this BrightTalk presentation, Burton Group Sr. Analyst Lori Rowland and Vice President and Research Director Bob Blakley will discuss the potential impact of the acquisition on IdM customers and advise organizations on steps they should take today to ensure the best possible outcome.
  • ITIL Service Management Practices: Third Time's the Charm Recorded: Jun 11 2009 26 mins
    The Information Technology Infrastructure Library (ITIL) version 3 moves this set of best practices from alignment with the business process to integration with business functions at all levels. In this presetation, Burton Group Network and Telecom Strategies Service Director Michael Disabato will discuss the difference between version 2 and version 3, how this affects current ITIL implementations, and the impact on an organization.
  • 5 Things You Should Do Before Moving E-mail to the Cloud Recorded: Jun 5 2009 48 mins
    Enterprise SaaS e-mail is an early sign of change coming to IT organizations that enable the challenges of deploying to cloud based platforms. Now is the time for enterprises to examine their e-mail needs and what they are presently spending on e-mail and identify the constraints of moving to SaaS offerings. As part of any evaluation, enterprises need to allocate time for both technical and vendor due diligence covering identity management, security, risk management, networking, and application development requirements that meet the business’s technical needs. This webcase outlines Burton Group proposed approach to assist enterprises in avoiding roadblocks and understand a hybrid or fully hosted email environment.
  • Catalyst Preview - Laying SOA to Rest Recorded: Jun 3 2009 11 mins
    Many service oriented architecture (SOA) initiatives have stalled or failed. And prospects for SOA look bleak in 2009. Most organizations have cut funding for their SOA initiatives. Except in rare situations, SOA has failed to deliver its promised benefits. It's time to face reality: the term "SOA" now carries too much baggage. It's time to declare that SOA is dead and move on to the more practical matter of bringing up its offspring. SOA's untimely demise is tragic, but, fortunately, many aspects of SOA live on-particularly in the form of services. Services provide the fundamental building blocks that enable software as a service (SaaS), cloud computing, and business process management (BPM). This Catalyst track will examine the myths and misconceptions that derailed SOA efforts, provide guidance for salvaging value, and supply actionable direction for future efforts.

    Face it. Your SOA initiative has failed. So where do you go from here?
IT Analysts and Consulting
Burton Group provides in-depth, IT research and advisory services to executives and technologists at Global 2000 organizations. Focused on strategic business technologies and the unique needs of enterprise organizations, Burton Group provides clients company-wide access to its world-renowned analysts and a suite of powerful, intuitive research and decision support tools unmatched in the industry. www.burtongroup.com
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: IT Contingency Planning for H1N1 Pandemic
  • Live at: Nov 6 2009 7:00 pm
  • Presented by: Phil Schacter, Vice President and Research Director
  • From:
Your email has been sent.
or close
You must be logged in to email this