Hi [[ session.user.profile.firstName ]]

Preparing for the 2012 Release of ISO 22301

ISO 22301 is currently working its way through the last step before its anticipated release as an international standard later this year. But what makes this new international standard valuable to organizations of all types and sizes? What makes it different? And, what might it mean for preparedne
ISO 22301 is currently working its way through the last step before its anticipated release as an international standard later this year. But what makes this new international standard valuable to organizations of all types and sizes? What makes it different? And, what might it mean for preparedness in years to come? Brian Zawada (MBCI) is a member of the US mirror committee to Technical Comment 223, the group charged with developing 22301 (as well as more than ten other societal security-related standards). Brian will share his perspectives on ISO 22031 and how he sees organizations using its content in the near future to improve preparedness and better coordinate with business partners, customers and suppliers. Brian will also address a number of the more common questions being posed via social media.
Recorded Mar 22 2012
46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Brian Zawada (MBCI, MBCP), Director of Consulting, Avalution Consulting
Presentation preview: Preparing for the 2012 Release of ISO 22301
Recommended for you:
  • Date
  • Rating
  • Views
  • Symantec 2016 Internet Security Threat Report (APJ) Symantec 2016 Internet Security Threat Report (APJ) Peter Sparkes, Senior Director, Cyber Security Services – Asia Pacific & Japan Recorded: May 26 2016 55 mins
    It’s an unfortunate truth: cyber crime has become part of our daily lives. Even though mega-breaches no longer surprise us, it’s still essential to be vigilant and protect your organization.

    Attend this much-anticipated webinar for an analysis on the 2016 cyber threats from the newly released Symantec Internet Security Threat Report.

    Get the latest research on cyber threats including:

    • Why zero-day vulnerabilities are becoming commodities
    • How ransomware is expanding to new targets such as smartphones, Mac and Linux systems
    • Why 78% of all legitimate websites are putting your end users at risk

    Register now for the latest analysis of APJ cyber threats and specific steps you can take to improve your security posture in 2016.
  • Website Security Threat Report 2016 – Key insights and recommendations Website Security Threat Report 2016 – Key insights and recommendations Jeff Barto – Symantec Trust Strategist Recorded: May 26 2016 58 mins
    Presenting the key insights of Symantec's Website Security Threat Report 2016 - Our annual report on the latest cybercrime trends and developments. Join this webinar to learn:

    · Why today’s web threats and data breaches are bigger and more aggressive than ever before
    · How the industry is responding to new vectors of attack
    · The future big topics for website security
    · Best practice tips and recommendations
  • Ransomware: Dark Money and Emerging Threats Ransomware: Dark Money and Emerging Threats Michael Aguilar, Business Product Technical Lead, ESET North America Recorded: May 25 2016 55 mins
    You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
    Join an ESET business product technical lead to learn:
    •How ransomware has evolved and spread
    •Why mobile phones and Apple OS X are increasingly vulnerable
    •Best practices for avoiding and dealing with ransomware
    •Why to implement backup and recovery solutions now
  • Cloud Storage: The 5 Reasons IT Can Do it Better Cloud Storage: The 5 Reasons IT Can Do it Better George Crump, Storage Switzerland Recorded: May 25 2016 61 mins
    In this live webinar, learn the five reasons why a private cloud storage system may be more cost effective and deliver a higher quality of service than public cloud storage providers.

    In this webinar you will learn:

    1. What Public Cloud Storage Architectures Look Like
    2. Why Public Providers Chose These Architectures
    3. The Problem With Traditional Data Center File Solutions
    4. Bringing Cloud Lessons to Traditional IT
    5. The Five Reasons IT can Do it Better
  • Enterprise Data Center Selection Criteria for Business in Southeast Asia Enterprise Data Center Selection Criteria for Business in Southeast Asia Kelly Morgan - 451 Research, Dalton Yap - Telin Recorded: May 25 2016 44 mins
    More than 20% of MNCs we surveyed currently have plans to expand into the SE Asia region, and are now considering their options to use third-party colocation/cloud exclusively, or in combination with on-premise IT deployments.

    Much of the current market activity is being driven by MNCs needing to build out their DC presence to serve as gateways to and from mainland China, and other high-growth markets in the region. Over a third of MNCs plan to increase their usage of colocation providers for their future IT deployments and are actively considering data center locations in established preferred locations of Singapore, Hong Kong or Tokyo - driven by factors such as regulations, geographical location, and the skills of the local workforce.

    So what are the key selection criteria, and how do certain locations compare?

    Singapore continues to be poised for solid growth, with an active supply pipeline, demand from local and international companies, and high-quality facilities. But do other factors, such as power supply costs, choice of bandwidth or the availability of carrier neutral space make it as an attractive location for datacenter investment as Hong Kong or Tokyo? Should MNCs look at Malaysia or Indonesia as possible areas for expansion as well, which could potentially offer lower-cost options for firms, as well as a way to target the local market in each country?

    This session will answer all the key questions such as:
    •Do Multinationals prefer to Own or Rent Datacenters in South-East Asia?
    •Why Do Organizations Need More Datacenter Space?
    •When Will They Need More Datacenter Space?
    •How Much Datacenter Space Will They Need?
    •What is Driving Datacenter Location Selection?
    •What Would Organizations Likely Do if They Needed More
    Datacenter Space/Power Capacity in SE Asia?
  • PCI DSS: Preventing Costly Cases of Non Compliance PCI DSS: Preventing Costly Cases of Non Compliance Mathieu Gorge, VigiTrust; Terence Spies, HPE Security – Data Security; Derek Brink, Aberdeen Group; Dan Fritsche, Coalfire Recorded: May 24 2016 62 mins
    There is a substantial cost associated with reaching and maintaining PCI DSS compliance requirements, but the cost of non-compliance is often much greater. While the initial cost of the technology, staff and other resources necessary to implement satisfactory controls has its price tag, it is vital that all organizations affected by the PCI standard consider both the short and long-term costs of non-compliance as well as the benefits to meeting the requirements.

    This is especially important as PCI DSS evolves and increase in complexity as the standard moves towards becoming a federal regulation. The costs of non-compliance can far exceed the cost of systems to bring a company into compliance, as demonstrated by so many high profile data breaches. Join this executive panel as we discuss ways to prevent costly cases of non compliance with PCI DSS.
  • How secure is your Office 365 deployment? How secure is your Office 365 deployment? Teresa Law, Sr. Product Marketing Manager, Symantec & Sunil Choudrie, Solutions Marketing Manager, Symantec Recorded: May 24 2016 60 mins
    Are you concerned about securing your users and data in cloud based collaboration applications like Office 365? You’re not alone. Over 35% of Microsoft Exchange installed base is now on Office 365. Many of these enterprises are actively seeking to extend the same level of security and consistent policies they have in place for existing on-premise and cloud applications, to Office 365.

    Join us for this webcast where we tackle the challenge of securing Office 365 head on and show you how your organization can take Office 365 security to a new level.

    Agenda:

    • Shield Email From Phishing, Sophisticated Malware and Spam
    • Neutralize Advanced Threats and Targeted Attacks
    • Safeguard Your Sensitive Data
    •Control Access with Strong Authentication
  • Dell SonicWALL’s ‘Secure Mobile Access’ Raises the Bar! Dell SonicWALL’s ‘Secure Mobile Access’ Raises the Bar! Steven Sanderson – WW SMA Product Marketing Manager Mark Hewett – WW SMA Product Manager Recorded: May 24 2016 30 mins
    See how it’s possible to give end-users fast, simple access to enterprise applications, data and resources – without compromising your security.

    In this live webinar, you’ll hear from two Dell Security solution experts on how you can manage the proliferation of devices in your workplace.

    During the interactive session, you’ll see how to:
    • Ensure only authorized users and approved devices are granted access to your business network
    • Quickly and easily provision secure mobile access and role-based privileges
    • Keep company data secure in-flight and at rest on devices
  • 4G Failover — Preventive Care for Your Healthcare Network 4G Failover — Preventive Care for Your Healthcare Network Ed Walton and Roger Billings of Cradlepoint Recorded: May 24 2016 45 mins
    For healthcare campuses and offices, the consequences of just a few minutes of downtime ripple across the entire organization’s operations. The proliferation of cloud applications also means suspended connectivity can cause catastrophic problems, and patients’ health and safety could be put at risk.

    While short outages are common, longer service disruptions can be catastrophic, paralyzing operations for hours. Grave as the immediate impacts of service outages are, your organization can continue to feel the consequences long after the connection has been repaired, due to damaged patient or partner loyalty, loss of trust, and diminished faith in the IT department as a whole.

    No healthcare organization wants to face these scenarios. Join us for a live webinar on Tuesday, May 24th, at 9 am PDT/12 pm EDT, because the question isn’t if your wired connectivity will go down, but what to do, or have in place, when it does go down.

    Attendees will learn about:

    + The consequences of network downtime for healthcare
    + The options for business continuity
    + How software-defined LTE connectivity is enabling the healthcare industry
    + Key considerations for choosing a wireless failover solution
  • Como garantir os SLAs de disponibilidade dos seus ambientes NAS e Big Data Como garantir os SLAs de disponibilidade dos seus ambientes NAS e Big Data Luis Feitor - Commvault Senior Systems Engineer Recorded: May 24 2016 40 mins
    Os dados não estruturados das empresas são cada vez mais um ativo imprescindível para os serviços e processos de negócio. No entanto, o seu crescimento exponencial faz com que as tecnologias tradicionais de proteção deste tipo de dados sejam não só ineficientes, como ainda incapazes de responder às necessidades de disponibilidade em ambientes empresariais.

    Neste webinar, iremos ver três áreas de inovação da Commvault que permitem responder às necessidades de proteção de dados não estruturados:

    -Na primeira parte, iremos mostrar as novidades da tecnologia IntelliSnap, que permite a integração com novos fabricantes de Storage e a gestão de réplicas de volumes; falaremos ainda da nova tecnologia de captura de blocos, que amplia o conceito de proteção contínua e consistente, a qualquer tipo de sistema de ficheiros e de base de dados, para dispor de um número ilimitado de pontos de recuperação de acesso nativo.

    -Na segunda parte, veremos como a nova versão do software da Commvault expande as suas capacidades a ambientes de Big Data. De acordo com a Gartner, mais de três quartos das empresas têm iniciativas de Big Data, e portanto a necessidade de gerir a disponibilidade destes dados é um desafio que se deve resolver a curto prazo.

    -Por último, iremos mostrar como as soluções NAS hiperescaláveis exigem tecnologias inovadoras para poder garantir a proteção e acesso aos dados que armazenam.

    Junte-se a nós para ficar a saber como a Plataforma de Gestão de Dados da Commvault lhe permite cumprir os seus SLA de disponibilidade de dados não estruturados, independentemente da tecnologia que escolha para armazenar e gerir estes ativos do seu negócio.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Preparing for the 2012 Release of ISO 22301
  • Live at: Mar 22 2012 5:00 pm
  • Presented by: Brian Zawada (MBCI, MBCP), Director of Consulting, Avalution Consulting
  • From:
Your email has been sent.
or close
You must be logged in to email this