If You’re Not Compliant, You’re Behind – 7 Steps to GDPR Compliance
The GDPR deadline is May 25th – and companies that don’t have a solution will face stiff fines. Businesses need to understand the different categories of data, how data is stored, how it moves throughout an organization, and what technical measures they need to take to ensure they are compliant.
In this 30-minute webinar, GDPR-certified expert Paul Kendall will explain:
- 7 critical steps to achieve compliance
- What data companies need to protect
- How to protect data that lives inside the EU and how to access that data outside the EU
- How data breaches and response times can severely impact GDPR fine activity
RecordedMay 25 201847 mins
Your place is confirmed, we'll send you email reminders
Learn the basics of Cisco's Digital Network Architecture (DNA) with Accudata Systems’ resident expert Alejandro Rodriguez. In 15 minutes we'll define Cisco's DNA, identify how your network can benefit, and we'll showcase some use cases to help validate DNA's business impact. Digital network technology is transforming the backbone of IT, so whether you're a CIO or Network Engineer, you will find value in this content.
Join us February 26 at 11 a.m. for Why IT Pros Want Digital Network Architecture.
Welcome back to the White-Hat Files, Accudata’s monthly hacker-centric webinar series! For our first White-Hat File of 2019, we are looking into the Marriott breach.
Join us on February 14 at 11 a.m. as Accudata Security Solutions Architect Russell Moore discusses how Marriott’s security was breached, how to reduce attacker dwell time, and the best practices that can keep your company’s name out of the news.
Bruce Beam (ISC)², Dimitri McKay (Splunk), and Tim Sills (Accudata)
Securing cloud infrastructure is no simple task, and when lines of business adopt cloud applications for daily administration, the layers of complexity are compounded. In this 45-minute webcam panel, (ISC)², Splunk, and Accudata Systems will tackle some of the toughest questions on managing risk and compliance in the cloud, including:
- How organizations are fighting cloud sprawl
- Best practices for securing data in the cloud
- Cloud data-loss prevention
- How to apply a risk-based approach to reduce exposure in the cloud
- Bruce Beam, Director of Infrastructure and Security, (ISC)²
- Dimitri McKay, Security Architect, Splunk
- Tim Sills, Senior Risk Consultant, Accudata Systems
Cloud infrastructure’s residual benefits are significant! Namely, anyone who buys corporate IT knows licensing is a nightmare. Different pricing structures, unclear benefits, and complex licensing server setups are all too common. That’s why F5 is changing the game.
Join us on October 18 for a 15-minute webinar led by F5’s Cindy Burns to learn why licensing isn’t what it used to be!
Accudata Systems isn’t just a Citrix Platinum Partner—we rely on Citrix Cloud internally to provide the agility and depth of service we need to compete in today’s business landscape. Join Accudata’s director of technology, Vid Sista, for a 30-minute webinar on October 16 at 11 a.m. CST to learn how Accudata uses Citrix Cloud to:
•Protect sensitive data outside our corporate network.
•Leverage Citrix’s Virtual Apps and Desktop environments to reduce resource needs.
•Provide a consistent experience for all Accudata team members, regardless of location.
Patrick Vardeman, CEO; Rick Snyder, Sr. VP; Anoj Willy, CEO; Vid Sista, Director of Technology Solutions
Join moderator Patrick Vardeman, CEO of Accudata Systems, for a dynamic digital-first webcam panel discussion with Rick Snyder, Senior Vice President of Cisco’s Partner America’s Organization; Anoj Willy, CEO of Xentaurs, a leading Digital Transformation Systems Integrator; and Vid Sista, Director of Technology Solutions at Accudata Systems.
They’ll cover it all—from what to consider in your DevOps strategy to hybrid cloud solutions and industry-leading technologies to build an effective data intelligence program. The digital business is far more complex than ever imagined, and we’ll do our part to help you understand where your investment can have the greatest payoff.
September’s White-Hat File comes from licensed attorney and Risk and Compliance Senior Consultant John Sharp.
In this 15-minute webinar, you’ll learn how cybersecurity compliance regulations aren’t the catchall you need to make sure your network is secure—as well as the most common pitfalls organizations face when trying to stay compliant.
Organizations use an average of 765 web applications. Based on research from F5 Labs, these web apps were the initial target in 53% of data breaches. Bad actors commonly target web apps to steal credentials or use previously stolen credentials to gain widespread access to user accounts. Often these attacks leverage automation and/or bots for the heavy lifting.
Learn how F5 and Accudata can help secure your web apps from attack with the new capabilities in F5's Advanced Web Application Firewall (WAF):
- Detect and mitigate automated attacks and bots that target web and mobile apps.
- Secure credentials from theft and protect apps from credential abuse.
- Protect against sophisticated application Denial of Service (DoS) attacks.
Imagine a world where IT swoops in and saves the day. ServiceNow is making that a reality while obliterating the notion that IT is a cost center. In fact, we'll prove it in this webinar. ServiceNow is a catalyst for the digital transformation of your business, giving your entire organization, IT included, the ability to move faster, drive efficiency, improve end-user experience, and outpace the competition.
In this 15-minute presentation, we’ll dive into the business case for ServiceNow and how it drives digital transformation in your own organization.
Disasters can take down your IT environment in a variety of ways, and if you’re not prepared you could lose thousands of dollars or more. Hurricanes, tornadoes, and fires can destroy your ability to work—and so can cyber-attacks. Take one example: if you were locked out of your network due to a security breach, do you know how you would pay your employees?
Join Accudata Systems Solutions Architect Bryan Halda for this 30-minute webinar and learn why you should consider cyber attacks as disasters and how to recover from them.
Our fourth White-Hat File is once again from Anton Abaya, CISA, PCI QSA, Senior Consultant in Accudata’s Risk and Compliance practice.
In the July edition, Anton talked about his expertise with physical social engineering. In this 15-minute webinar, he’ll describe the most effective ways he uses online phishing techniques to break into corporate networks—and how you can ensure these remote attacks don’t work on your employees.
To register for the September edition of the White-Hat Files, copy and paste this link: https://www.brighttalk.com/webcast/16347/333750?utm_source=Accudata+Systems&utm_medium=brighttalk&utm_campaign=333750
Cybersecurity solutions often sacrifice speed for performance, which is why Forcepoint takes a different approach. Their software-first network security platform is a fundamentally different architecture from any other vendor.
Learn why organizations that need unparalleled management and scalability select Forcepoint more than any other solution. Join us for our webinar on August 15 at 11:00 am CST.
Thanh Nguyen, Data Center & Cloud Practice Manager
As the use of hybrid cloud increases, so does the struggle for enterprises to balance the opportunities against the challenges.
Join Accudata Systems and F5 for a 15-minute webinar that will teach you how to Drive Out the Complexity of Hybrid Cloud and deliver any app, anywhere, with confidence.
•Simpler operations: Reduce complexity across hybrid and multi-cloud environments
•Faster deployments: Scale deployments with increased agility
•Safer security: Reduce risk with a consistent policy to maintain compliance and control
•Consistent application services: Deploy any application, anywhere, with consistent application services and security with F5
The best way to secure your organization from today’s most complex threats is integration. It’s key to building a security infrastructure that deters seasoned attackers. Yet, it can be a challenging, time-consuming initiative to take disparate technologies and build an interoperable, world-class cyber security program.
Join Accudata Systems Security Practice Manager Alex Vasquez on August 7 in our 30-minute webinar, Why Integration Matters: How to Strengthen Your Security Posture. He’ll address complicated IT challenges and security automation strategies, and you’ll learn about the following:
•Integrating vendors into one environment
•Preventing unauthorized access to VPN services with multifactor authentication
•Optimizing your security strategy with automated support workflows
Mike Bledsoe, Advisory Solutions Consultant at ServiceNow
Configuration Management Database (CMDB) conjures thoughts of Excel (manual entry—blah); it’s so cumbersome. But what if you could make it easier—automated, cloud based—and proactively eliminate service outages?
Join our 15-minute webinar with ServiceNow Advisory Solutions Consultant Mike Bledsoe as he discusses common-use cases that prove the value in effective CMDB with ServiceNow’s Discovery solution. We’ve already started seeing how this is changing IT departments’ lives—there’s a reason why ServiceNow is Forbes’ #1 most innovative organization in the nation.
Our third White-Hat File comes from Anton Abaya, CISA, PCI QSA, Senior Consultant in Accudata’s Risk and Compliance practice.
In this 15-minute webinar, he’ll describe the most effective ways he’s used social engineering and phishing techniques to crack into companies, as well as the best practices you can implement to ensure these attacks don’t work on your business.
Register for the August edition of the White-Hat Files here: https://www.brighttalk.com/webcast/16347/330367
Welcome to the White-Hat Files – a monthly series where the best white hat hackers give you what you need to know about the threat landscape.
Our second White-Hat File comes from Ismael Alfaro, Professional Services Manager.
In this 15-minute webinar, he’ll give you the rundown on Accudata’s most-seen vulnerabilities, as well as best practices you can use to defeat attackers looking to dissect and destroy your business.
Register for our July edition of the White-Hat Files: https://www.brighttalk.com/webcast/16347/329042?utm_source=Accudata+Systems&utm_medium=brighttalk&utm_campaign=329042
Adding automation to your IT environment is one of the best ways to fight cloud sprawl and help eliminate service outages. In this 15-minute webinar, Accudata’s Director of Technology Solutions Vid Sista will explain:
How automation solutions enable you to proactively identify service issues
Why cloud sprawl is a major threat to IT security – and how you can stop it
What businesses can do to automate their IT services lifecycle
Accudata Systems is a leader in IT consulting and systems integration. For more than 35 years, we have helped strengthen organizations by solving their toughest IT challenges with a commitment to partnership, flexibility, and guaranteed results. The vastness of our expertise, paired with our proven methodology, enables a true partnership as we help our clients secure, modernize, and grow.
If You’re Not Compliant, You’re Behind – 7 Steps to GDPR CompliancePaul Kendall, CGEIT, CISSP, GDPR Advisory Services Principal, at Accudata Systems[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]47 mins