Hi [[ session.user.profile.firstName ]]

Disaster Recovery

If a disaster were to strike, would you be able to successfully recover your network?

Disaster recovery focuses on the ability of an organization to recover from a technology outage. This can be loss of a single technology or a catastrophic event. Many companies have a need to quickly gain a better understanding of their Disaster Recovery capabilities, future options, and strategies.

Join us as we explore the differences between Emergency Management, Business Continuance, and Disaster Recovery Planning.

You will learn how to prioritize the recovery of your organization's services by understanding all the steps in a successful recovery plan. We will also cover what is required to recover those services including facilities, IT, financial, and resources.

Don't wait until it's too late. Know what to expect in the event of a disaster.

Jeff is effective in both restoring and building organizations through improved long-term process improvement and implementation of solid scalable methodologies. Jeff also specializes in communications and regularly presents at seminars/webinars, industry events, and partner-sponsored events. In addition, Jeff has presented Excipio’s results to a variety of private and public sector audiences, including: senior executive teams, state legislatures, city councils, and federal agencies, boards of directors, and small community forums.”
Recorded Oct 1 2019 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jeff Gilmer
Presentation preview: Disaster Recovery

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Disaster Recovery Recorded: Oct 1 2019 61 mins
    Jeff Gilmer
    If a disaster were to strike, would you be able to successfully recover your network?

    Disaster recovery focuses on the ability of an organization to recover from a technology outage. This can be loss of a single technology or a catastrophic event. Many companies have a need to quickly gain a better understanding of their Disaster Recovery capabilities, future options, and strategies.

    Join us as we explore the differences between Emergency Management, Business Continuance, and Disaster Recovery Planning.

    You will learn how to prioritize the recovery of your organization's services by understanding all the steps in a successful recovery plan. We will also cover what is required to recover those services including facilities, IT, financial, and resources.

    Don't wait until it's too late. Know what to expect in the event of a disaster.

    Jeff is effective in both restoring and building organizations through improved long-term process improvement and implementation of solid scalable methodologies. Jeff also specializes in communications and regularly presents at seminars/webinars, industry events, and partner-sponsored events. In addition, Jeff has presented Excipio’s results to a variety of private and public sector audiences, including: senior executive teams, state legislatures, city councils, and federal agencies, boards of directors, and small community forums.”
  • Cloud Done Right! 9 Critical Elements for Success Recorded: Aug 7 2019 63 mins
    Unisys - Raj Raman, Lakshmi Ashok, Allen McMichael, Lori Pierson, Lisa McLaine, Brenda Celeste
    Enterprises need to modernize their operations to grow and stay competitive. But changes to IT infrastructure can quickly get out of hand. This involves moving workloads from on-premises data centers to public-cloud, private-cloud and hybrid-cloud solutions. The process is challenging and time consuming, leaving many organizations struggling to meet their business initiatives. In this webinar we’ll describe the nine key attributes that enterprises must master to be successful.

    Please join us on July 24th to learn how Unisys CloudForte™ helps our clients accelerate their migration to the cloud, while mitigating their risk and managing their costs.


    Presenters
    •Lisa McLaine - Global Director - Cloud and Infrastructure Services
    •Raj R. Ramen - Chief Technology Officer - Cloud
    •Lori Pierson - Portfolio Head - Global Cloud, Infrastructure and Application Services
    •Lakshmi Ashok - Chief Technology Officer - Homeland Security and Critical Infrastructure
    •Allen McMichael - Head - Global Cloud Managed Service Operations
    •Brenda Celeste - Director - Analyst Relations, North America
  • Elevate - An Omnichannel Banking Solution for Anytime, Anywhere Recorded: Jul 31 2019 3 mins
    Unisys
    Elevate is a fully integrated omnichannel banking ecosystem that enables frictionless customer journeys regardless of touchpoint, anytime, anywhere.
  • Build the Bank Platform of the Future: Omnichannel & the Role of Open Banking Recorded: Jul 17 2019 55 mins
    Maria Allen, VP & Global Head Financial Services, Unisys and Stephen Greer, Senior Analyst, Celent
    New business models are emerging in banking, and these are underpinned by new principles of openness, flexibility and agility. For many, omnichannel is an aspiration, most banks are still in the early days of deployment. What are the keys to success? And what should you prioritize in your digital transformation? Get insights on global industry best practices and learn about the rise of platform banking including:

    -New customer acquisition
    -New products
    -New distributions channels
    -and more….

    Join industry experts Unisys’ Maria Allen, and Celent’s Stephen Greer’s webinar at 11am EST on 17 July 2019.



    Our Presenters

    Maria Allen, Unisys
    Maria L. Allen is Vice President and Global Head of Financial Services. In this role, Maria is responsible for building new products and services across all regions, platforms and channels ensuring that solutions and services are delivered in a way that enable our clients to meet their strategic goals and objectives. With more than 30 years' experience in business operations, technology and sales, she has worked both in and with large number of financial institutions across diverse geographies. Maria is an award winning, visionary experienced in the development of high performance products, mission critical and technology-enabled business services for complex and compliance driven industries.

    Stephen Greer, Celent
    Stephen is an expert on retail banking trends, with an emphasis on fintech startups, emerging technology, and digital transformation. He has worked with some of the largest banks in the US and globe to influence digital strategies and identify opportunities in the space. Stephen has been a frequent speaker at large conferences such as CARTES Paris, American Banker’s Retail Banking Conference, and Cumbre Financiera Panama, as well as at industry roundtables and vendor events. He has been quoted in publications such as Forbes, The San Francisco Chronicle, American Banker, Banking Exchange, and others.
  • From Telephone to Telepathy – The Evolution of Digital Support Recorded: Jun 26 2019 61 mins
    Weston Morris, Global Leader for Unisys Digital Workplace Services
    Today’s enterprises need capabilities that go beyond the “Service Desk” and “Desktop Support.” Enterprises need capabilities that:

    •Start with how users devices are provisioned and configured so they are ready to ‘phone home’ when a problem is detected.
    •Include Artificial Intelligence and machine learning as inherent components of the digital workplace ecosystem.
    •Go beyond the visualization of device data to proactive resolution response.
    •Use intelligent analytics to infer how the end-users feel about their service without the hassle of a formal survey.

    Please join us as we profile seven clients’ use of our Digital Support innovations to accelerate digital transformation.
  • Addressing Consumer Safety Concerns with Zero Trust Security Recorded: Jun 24 2019 27 mins
    Christopher Kloes, VP of Security, Unisys
    In this webinar, you’ll learn:

    •The leading security concerns for consumers worldwide
    •The benefits of a Zero Trust security model to protect critical customer information
    •Five steps for implementing Zero Trust
  • How SOC Superheroes Win Recorded: Jun 5 2019 59 mins
    Salvatore Sinno, Global Chief Security Architect, Unisys; Ismael Cervantes, Sales Engineer, LogRhythm
    Today's reality is that a security breach is not a matter of IF, but a matter of WHEN. According to research from Ponemon Institute, the mean time to detect (MTTD) a breach is 197 days, and the mean time to respond (MTTR) is 69 days. When a threat is detected, organizations have a difficult time responding quickly. The security operations center (SOC) contacts the network team, or the endpoint team, or both to figure out where the anomalous endpoint or user is, and then they determine how to contain it - an inefficient process that can consume days or weeks before remediation.

    Rapidly responding to threats require leveraging state of the art innovation that combines advanced security analytics, machine intelligence, Dynamic Isolation, and automation. In this webcast, you will gain insights on how smart CISOs are making incidents non-newsworthy by controlling and neutralizing security events. Learn how to

    Bring multiple essential capabilities together to quickly identify threats and neutralize them before they cause harm not in days or weeks but minutes.
    Employ advanced security analytics and machine intelligence to continuously monitor endpoints, networks and user behaviors for cohesive end-to-end threat visibility.
    Deploy Dynamic Isolation to restrict or block malicious users and devices from communicating over the network.
    See a live demo that will entail a real-life scenario of insider attack with simulated attack, detection, and response in Seconds not hours, days or months.
  • Building a Zero Trust Model in the Cloud with Microsegmentation Recorded: Apr 2 2019 55 mins
    Salvatore Sinno, Chief Security Architect, Unisys; John Kindervag, Chief Technology Officer, Palo Alto Networks
    The historical approach to business security has focused on defending a fixed perimeter. The objective was to keep threats on the outside of the perimeter of a wall around a castle. However, today the reality is that these same boundaries are harder to define and very porous. The assumption that systems and traffic within a data centre can be trusted is flawed because once a single host is compromised, moving within a trusted zone is often easy. While it is often hard to directly attack high-value assets from outside the network, using an indirect attack using systems inside the network is much simpler, although more time-consuming. These same principles are equally applicable to public cloud deployments.

    The Zero Trust architecture is the foundation of the future of public cloud security. The ability to authenticate and secure communication without relying on the location of the endpoints or the security of the network means that organizations can adopt the cloud paradigm and embrace its benefits of cost and flexibility while maintaining control of their data and compliance in virtual environments.

    In this webcast, John Kindervag, the creator of the Zero Trust Model, and Unisys experts will introduce concepts associated with the Zero Trust model in the cloud and show how Unisys Stealth® and Palo Alto Networks provide a unified platform to enhance system survivability and reduce the impact of potential threats.

    By the end of this session, attendees will

    1. Understand how Palo Alto Networks and Stealth enable the Zero Trust model within the cloud.

    2. Understand Palo Alto Networks and Stealth Zero Trust segmentation platform.

    3. Understand how this solution can accelerate cloud adoption.

    4. Understand methods and metrics by which the next generation of CISO's can define and deliver success in the public cloud.
  • Playing Moneyball in Cybersecurity Recorded: Mar 25 2019 40 mins
    Matt Soderlund, Cybersecurity Leader, Unisys
    When giants like Equifax, Facebook, and Google are getting breached on a larger scale than ever before, setting security priorities based on headlines and gut instinct doesnt cut it. Finally, your board of directors understands the need to pay close attention to cybersecurity. Youre now being asked to demonstrate the business impact of your security investments, and you need objective, data-validated priorities to obtain budget approval. Find out how Unisys TrustCheck lets you play cybersecurity Moneyball.
  • Imagine an End to Identity Fraud Recorded: Mar 4 2019 4 mins
    Unisys
    Identification that relies on what an individual knows or has―such as passwords, PINs and documents―won’t stop identity fraud. Even biometric markers can be spoofed. As fraudsters become more sophisticated, stronger security with multi-modal biometric identification is required. See how Stealth(identity) can help put an end to identity fraud.

    Learn more about Stealth(identity)™: unisys.com/sid
  • The Future of Open Banking Recorded: Feb 6 2019 2 mins
    Eric Crabtree, Financial Services Executive, Unisys
    Learn about the key aspects of open banking - regulations, open APIs, and relevance.
  • Why Security Matters: Global Insights to the 2018 Unisys Security Index Survey Recorded: Jan 16 2019 44 mins
    Tom Patterson, Chief Trust Officer, Unisys
    Despite spending billions of dollars every year on security, companies and governments – as well as the products and services they use – often lose sight of their ultimate goal: protecting the user. Please join this webinar to hear Tom Patterson, the Chief Trust Officer for Unisys, share results and realities from the only recurring snapshot of consumer security concerns conducted globally. This year’s global Unisys Security Index survey brings to light key areas of consumer concern that are vital to understand, if society and the security sector are to be successful in achieving their goals.

    Major findings affecting government services, entire business sectors and fast evolving technologies are all illuminated through the lens of the user, as opposed to the more typical providers. Learn what’s most important to the consumer in each region of the world, and across key demographic categories. This clarity of vision, brought by thousands of statistically significant consumers from around the world, is a voice that needs to be heard.

    Tom will use this year’s results, juxtaposed with over a decade of survey history and informed by global events and leaders from both government and industry, to provide a cogent report on the state of global security from the perspective that matters most—the user.
  • ¿Por qué importa la seguridad? Perspectivas de Latinoamérica de Unisys Security Recorded: Nov 14 2018 62 mins
    Leonardo Carissimi, Security Solutions Director, Unisys Latin America
    Unisys Security Index es una importante encuesta regular de las preocupaciones de seguridad llevada a cabo en todo el mundo. Lanzada a nivel mundial desde 2007, proporciona una medida regular y estadísticamente sólida de las preocupaciones que tienen los consumidores de 13 países con respecto a los principales aspectos de la seguridad, incluyendo seguridad nacional, financiera, personal y ciber seguridad.
    Únase a este webinar para escuchar a Leonardo Carissimi, director de Ciberseguridad para Unisys América Latina, compartir los resultados y realidades de la encuesta sobre de las preocupaciones de seguridad de los consumidores en Argentina, Colombia y México.
    Leonardo usará los resultados de este año, yuxtapuestos con más de una década de historial de encuestas realizadas para proporcionar un informe convincente sobre el estado de la seguridad desde la perspectiva que más importa: la del usuario.
  • Por que a segurança importa? Perspectivas globais e locais do Unisys Security Recorded: Nov 14 2018 63 mins
    Leonardo Carissimi, Security Solutions Director, Unisys Latin America
    Unisys Security Index é uma importante pesquisa sobre preocupações de segurança realizadas em todo o mundo. Lançado globalmente em 2007, fornece uma medida regular e estatisticamente sólida das preocupações que os consumidores em 13 países têm sobre os principais aspectos da segurança, incluindo segurança nacional, financeira, pessoal e cibernética.
    Participe deste webinar para ouvir Leonardo Carissimi, diretor de Segurança Cibernética da Unisys América Latina, compartilhar os resultados e fatos da pesquisa sobre as preocupações de segurança dos consumidores do Brasil.
    Leonardo usará os resultados deste ano, justapostos com mais de uma década de histórico de pesquisas para fornecer um relatório convincente sobre o estado de segurança da perspectiva que mais importa: o usuário.
  • FBI Warning: Cyber Attacks on ATMs - Are you prepared? Recorded: Nov 7 2018 46 mins
    Joan McGowan, Senior Analyst at Celent and Steve Migliore, Head, Cybersecurity at Unisys
    A recent warning issued to banks by the FBI reads like the script for a Hollywood movie: cybercriminals are plotting a sophisticated, global “ATM cash-out” using cloned credit cards to fraudulently withdraw millions of dollars in just a few hours. A few days later, reports of a $13.5 million heist of 25 ATMs across the globe confirmed the reality that ATMs are a prime target for hackers.

    Are you prepared for when an ATM breach occurs, or more importantly, when a hacker gains access to your network and confidential customer information through your ATM networks?

    Join Unisys and Celent for this very critical, time sensitive topic that will help you understand this increasing threat and how to respond.

    In this webinar we will cover:

    •How global trends, such as open banking, will increase these threats
    •How ATM security fits in your end to end security and risk posture
    •We will be discussing Unisys Stealth®, which is a flexible software suite that leverages microsegmentation to secure critical assets
    •And so much more!
  • Operationalizing Zero Trust Model with Adaptive Security Recorded: Nov 7 2018 59 mins
    Salvatore Sinno, Chief Security Architect, Unisys; Franco Negri, Senior Solution Architect, LogRhythm
    The historical approach to network security was one built on strong perimeter defenses and a well-understood concept of resource and infrastructure allocation. Todays reality is completely different. With amorphous perimeters, ubiquitous use of connected devices, cloud adoption and availability of powerful exploitation tools to adversaries in play, a security breach is not a matter of if, but a matter of when. It is imperative that organizations shift their security mindset from incident response to continuous response, where systems are assumed to be compromised and requires continuous monitoring and remediation.

    Organizations can achieve such capabilities by developing an Adaptive Security Architecture, which aims to contain active threats and to neutralize potential attack vectors. In this webcast, Unisys and LogRhythm experts will introduce concepts associated with adaptive security and shows how Unisys Stealth® and LogRhythm (LR) provide a unified platform to enhance system survivability and reduce the impact of potential threats.

    By attending this session, you will be able to

    1. Understand the need to shift mindset from incident response to continuous response.

    2. Develop a comprehensive understanding of Adaptive Security Architecture concepts including Preventive, Detective, Retrospective and Predictive capabilities.

    3. Understand how integrated software-defined microsegmentation and SIEM capabilities enable the cohesive orchestration and management of people, processes, and technology into a unified Threat Lifecycle Management (TLM) framework necessary for the early detection and mitigation of advanced cyber threats.

    4. See a live demonstration of Unisys Stealth and LogRhythm integration that enables detection, alerting and immediate response to suspicious network activity.
  • Software-Defined Microsegmentation for Regulatory Compliance Recorded: Aug 2 2018 60 mins
    Bill Parkinson & Jack Koons, Unisys
    Network segmentation is one of the must-have strategies to limit the scope, cost and complexity of compliance. The challenge in segmenting a network with static controls such as firewalls, VLANs, etc is the complexity of management and change. Access Control Lists (ACLs) and firewall rules can easily run into thousands of rules that have to be manually reconfigured every time there is a new application to be rolled out, or changes are introduced in regulations. The result is increased cost and complexity - the very challenge that you were trying to solve.

    In this webcast, Unisys cybersecurity experts will introduce you to a new software-defined network microsegmentation that enables dynamic perimeters to isolate the critical assets without the cost and complexity of static controls. This approach reduces attack surface while also reducing audit scope, cost and management complexity. Microsegmentation is not segmentation. Segmentation is done for network optimization and performance, and should not be confused or conflated with security. Microsegmentation is a security concept first and foremost. Unisys experts will elaborate on microsegmentation concepts with particular emphasis on its use in support of compliance issues. They will then take you through illustrative examples of isolating and securing systems in the context of HIPAA, HITECH and PCI-DSS regulations.

    Attendees of this session will:

    * Gain understanding of key challenges in achieving and maintaining compliance

    * Know the different types of network segmentation and their role - primary, secondary and microsegmentation, etc.

    * Gain ccomprehensive understanding of software-defined network microsegmentation and how it can save you cost, effort and the frustration that static controls introduce

    * Apply software-defined network microsegmentation to HIPAA, HITECH and PCI-DSS regulations using illustrative examples
  • Digital Trust in a Perimeter Less World Recorded: Apr 10 2018 62 mins
    Jack Koons, Global Director for Unisys Stealth, and Mark Alba, Vice President of Product Marketing
    Protecting assets critical to an organizations continued operations, without impeding productivity, is a boardroom balancing act. Traditional approaches to security attempt this balance using fixed security perimeters bolted onto existing IT infrastructure. This approach relies on an outdated model that assigns trust to the device, and not to the user. This approach fails in a perimeter less world where cloud, mobility and purpose-built devices are fluid and dynamic, while the identity of the user is unchanging

    You need a new, preemptive approach to security that creates a perimeter less network that is resilient and survivable. This approach requires you to identify assets critical to your continued operations and making them accessible to only protected communities of trusted users. It requires risk management through the implementation of policies and controls that are translatable across organizational silos each with competing tactical objectives. Finally, the new approach must scale to support dynamic and transformative IT needs, regardless the size of the organization.

    By the end of the session, attendees will:

    - Understand the failures of the bolt-on security approach.

    - Learn key characteristics of a survivable network

    - Key steps to building resilience and survivability with microsegmentation, without dismantling the existing network investments

    - Get an overview of the tools required to align threat response with business objectives.

    - A live demo of Stealth Microsegmentation.
  • Building Zero Trust Model with Microsegmentation in the Cloud Recorded: Feb 9 2018 63 mins
    Salvatore Sinno & Jonathan Payne
    The historical approach to business security has focused on defending a fixed perimeter. The objective was to keep threats on the outside of the perimeter like a wall around a castle. However, today the reality is that these same boundaries are harder to define and very porous.

    The assumption that systems and traffic within a data center can be trusted if flawed because once a single host is compromised, moving within a trusted zone is often easy. While it is often hard to directly attack high-value assets from outside the network, using an indirect attack using systems inside the network is much simpler, although more time-consuming.

    The Zero Trust architecture is an ideal solution for the cloud where it is not possible to trust the network. The ability to authenticate and secure communication without relying on the location of the endpoints or the security of the network means that our clients can adopt the cloud paradigm and embrace its benefits of cost and flexibility while maintaining control of their data and compliance in virtual environments.

    By the end of this session, attendees will

    - Understand how the zero-trust model embeds security within the cloud

    - Examine the fundamental benefits and tenants of the zero-trust model in the cloud (security persistence, security ubiquity and scalability).

    - Understand how this new paradigm accelerates the cloud adoption.

    - Learn how software-defined microsegmentation delivers zero-trust in the cloud
Securing Your Tomorrow
Unisys is a global information technology company that specializes in providing industry-focused solutions integrated with leading-edge security to clients in the government, financial services and commercial markets. Unisys offerings include security solutions, advanced data analytics, cloud and infrastructure services, application services and application and server software.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Disaster Recovery
  • Live at: Oct 1 2019 5:00 pm
  • Presented by: Jeff Gilmer
  • From:
Your email has been sent.
or close