Hi [[ session.user.profile.firstName ]]

A Guide to Modern Business Continuity

Disasters can take down your IT environment in a variety of ways, and if you’re not prepared you could lose thousands of dollars or more. Hurricanes, tornadoes, and fires can destroy your ability to work—and so can cyber-attacks. Take one example: if you were locked out of your network due to a security breach, do you know how you would pay your employees?

Join Accudata Systems Solutions Architect Bryan Halda for this 30-minute webinar and learn why you should consider cyber attacks as disasters and how to recover from them.
Recorded Aug 28 2018 27 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bryan Halda, Solutions Architect
Presentation preview: A Guide to Modern Business Continuity

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Weathering the Storm without Breaking the Budget Recorded: Nov 13 2019 36 mins
    Charles Johnson, Cybersecurity Practice Manager
    The best defense against a targeted attack begins with the skills of your IT team, not your IT investment. Those crucial skills should also find support in tested procedures, validated standards, and effective governance. The purpose of an investment in any technology is to support or protect business processes or add value to them. Cybersecurity tooling is no different.

    In this session, learn how to leverage your current IT investment to ensure your entire organization is resilient in the face of a cyberattack, and have confidence you can weather the storm without breaking the budget.
  • Securing the Future with Palo Alto Cortex Recorded: Oct 23 2019 33 mins
    Charles Johnson, Cybersecurity Practice Manager
    Securing the future of your enterprise just got attainable with the launch of Palo Alto Cortex! Join Accudata’s Cybersecurity Practice Manager Charles Johnson as he walks through Palo Alto Cortex. Cortex is the industry’s only open and integrated AI-based continuous security platform that continually evolves to stop the most sophisticated threats.

    Accudata Systems, in partnership with Palo Alto Networks, wants you to experience the future of cybersecurity today, leveraging Cortex Data Lake, Cortex XDR, and Demisto.
  • From Idea to a Product in a Flash: the DevOps Culture Recorded: Sep 11 2019 36 mins
    Sohil Merchant, Senior Practice Manager, Data Center & Cloud; Doyen Blair, Professional Services Manager, Data Center
    Competition is fierce, and every company needs a technological advantage to get ahead. No matter your industry, the user experience is key for your customers. However, meeting that demand is difficult with siloed development methodologies. Instead, adopting a DevOps culture can focus disparate resources on a single goal to move that new idea to production in a flash.

    Attend this session to learn:

    •How to build a successful DevOps culture
    •How a DevOps culture can benefit your business
    •What others have done
    •How to get started
  • Case Study: Real-World Breach Response Recorded: Aug 22 2019 44 mins
    Brian DiPaolo, Chief Technology Officer; Mark Holdsworth, Managed Services Practice Manager
    Accudata’s customer, a large ecommerce services provider, detected malware in an email sent to customers. However, their IT team discovered the malware was just the tip of the iceberg and began to dig deeper. Realizing the scope and magnitude of the breach, Accudata’s security and managed service teams were brought in to mitigate the attack and quickly began the remediation process.

    In this 60-minute presentation, Chief Technology Officer Brian DiPaolo and Managed Services Practice Manager Mark Holdsworth detail the challenges of identifying and eliminating an active attacker in order to bring the business back online.
  • SD-WAN The Accudata Way Recorded: Aug 8 2019 10 mins
    Jason Fackrell, Network and Collaboration Practice Manager
    Accudata Systems' approach to SD-WAN addresses circuit costs, technology, and management while allowing you to maintain access and control. Unlike WAN/internet providers' restrictive and closed solutions, Accudata offers:

    - Flexibility: You choose what you want and what you don't
    - Easy Management: Maintain as much access and control as you want
    - Agility: Don't get locked into a single carrier contract
    - Seamless Deployment: Nationwide smart hands capabilities
    - Reduced Complexity: Zero touch, automated configuration, and cloud managed
    - Visibility: Deep user, application, and WAN performance visibility

    Watch as Practice Manager Jason Fackrell discusses the solution in collaboration with Cisco Meraki.
  • ServiceNow A Day with an Expert: Part Two Recorded: Jul 16 2019 10 mins
    Arnie Erazo
    ServiceNow is not a ticketing system; the Information Technology Service Management (ITSM) module is a true service and support force multiplier, enabling the automation of many tasks every service desk manager encounters on a daily basis. One common concern every organization encounters is leveraging the full capabilities of the ServiceNow platform. Watch as Arnie Erazo, Accudata Solutions Architect and ServiceNow Expert, walks you through the second part of creating a detailed report using the platform.
  • Securing Privilege and Containing Attacks on Endpoints Recorded: Jul 11 2019 30 mins
    Todd Moseley, Endpoint Privilege Manager; Brance Spradlin, Sales Engineer
    Join CyberArk's Endpoint Privilege Manager (EPM) Business Lead Todd Moseley and Sales Engineer Brance Spradlin as they discuss CyberArk's Endpoint Privilege Manager - the endpoint security solution that effectively enables privilege management, credential theft protection, and application control. When all it takes is one email getting through your perimeter defenses, securing your endpoints is more crucial than ever. Learn how CyberArk can help you:

    - Reduce the attack surface and mitigate critical vulnerabilities
    - Contain attackers at the endpoint and limit lateral movement
    - Stay on top of the latest threats
    - Save time, stabilize configurations, and reduce helpdesk tickets
    - Automatically block malicious applications
  • ServiceNow A Day with an Expert Recorded: Jun 6 2019 10 mins
    Arnie Erazo
    ServiceNow is not a ticketing system; the Information Technology Service Management (ITSM) module is a true service and support force multiplier, enabling the automation of many tasks every service desk manager encounters on a daily basis. One common concern every organization encounters is leveraging the full capabilities of the ServiceNow platform. Watch as Arnie Erazo, Accudata Solutions Architect and ServiceNow Expert, walks you through the platform's dashboards and uses.
  • Cisco Enterprise Wireless | Critical Considerations Recorded: Jun 6 2019 16 mins
    Jason Fackrell, Practice Manager, Network
    Digital network technology is transforming the backbone of IT. Join Accudata Practice Manager Jason Fackrell as he discusses Cisco's Enterprise Campus Wireless. Over 15 minutes, Jason will define enterprise wireless, talk through the critical considerations when looking at enterprise wireless, and discuss DNA Spaces.
  • Micro-segmentation is achievable. What's stopping you? Recorded: Mar 20 2019 20 mins
    Joe Onisick, CTO, Xentaurs
    Yes, micro-segmentation (uSeg) is complex and seems expensive. But, the barriers are finally breaking down. True uSeg is now achievable, and we’ll tell you how. In 30 minutes, we’ll define:

    1. The scope of uSeg
    2. uSeg models that really work
    3. Requirements for successful implementation
    4. Why this approach is defining modern cybersecurity strategies

    Join us Wednesday, March 20, at 11 a.m. for our webinar, Micro-segmentation is achievable. What's stopping you?
  • Why IT Pros Want Digital Network Architecture Recorded: Feb 26 2019 16 mins
    Alejandro Rodriguez, Solutions Architect
    Learn the basics of Cisco's Digital Network Architecture (DNA) with Accudata Systems’ resident expert Alejandro Rodriguez. In 15 minutes we'll define Cisco's DNA, identify how your network can benefit, and we'll showcase some use cases to help validate DNA's business impact. Digital network technology is transforming the backbone of IT, so whether you're a CIO or Network Engineer, you will find value in this content.

    Join us February 26 at 11 a.m. for Why IT Pros Want Digital Network Architecture.
  • White-Hat Files | February Edition Recorded: Feb 14 2019 16 mins
    Russell Moore, Security Solutions Architect
    Welcome back to the White-Hat Files, Accudata’s monthly hacker-centric webinar series! For our first White-Hat File of 2019, we are looking into the Marriott breach.

    Join us on February 14 at 11 a.m. as Accudata Security Solutions Architect Russell Moore discusses how Marriott’s security was breached, how to reduce attacker dwell time, and the best practices that can keep your company’s name out of the news.
  • White-Hat Files | 2018 Recap Edition Recorded: Nov 1 2018 24 mins
    Accudata Systems Risk and Compliance Team
    For 2018’s last White-Hat File, we’re focusing on the future. With the new year on the horizon, there’s never been a better time to update and fine-tune your security strategy.

    In this 30-minute webinar, Accudata’s Risk and Compliance Professional Services Manager Ismael Alfaro will focus on how to monitor, implement, and iterate on IT security best practices.
  • Expert Panel: Managing Risk and Compliance in a Secure Cloud Recorded: Oct 26 2018 37 mins
    Bruce Beam (ISC)², Dimitri McKay (Splunk), and Tim Sills (Accudata)
    Securing cloud infrastructure is no simple task, and when lines of business adopt cloud applications for daily administration, the layers of complexity are compounded. In this 45-minute webcam panel, (ISC)², Splunk, and Accudata Systems will tackle some of the toughest questions on managing risk and compliance in the cloud, including:

    - How organizations are fighting cloud sprawl
    - Best practices for securing data in the cloud
    - Cloud data-loss prevention
    - How to apply a risk-based approach to reduce exposure in the cloud

    - Bruce Beam, Director of Infrastructure and Security, (ISC)²
    - Dimitri McKay, Security Architect, Splunk
    - Tim Sills, Senior Risk Consultant, Accudata Systems
  • Residual Cloud Benefits: A New Way To License Recorded: Oct 18 2018 16 mins
    Cindy Burns, Cloud Specialist
    Cloud infrastructure’s residual benefits are significant! Namely, anyone who buys corporate IT knows licensing is a nightmare. Different pricing structures, unclear benefits, and complex licensing server setups are all too common. That’s why F5 is changing the game.

    Join us on October 18 for a 15-minute webinar led by F5’s Cindy Burns to learn why licensing isn’t what it used to be!
  • Why Accudata Relies on Citrix Cloud Recorded: Oct 16 2018 24 mins
    Vid Sista, Director of Technology Solutions
    Accudata Systems isn’t just a Citrix Platinum Partner—we rely on Citrix Cloud internally to provide the agility and depth of service we need to compete in today’s business landscape. Join Accudata’s director of technology, Vid Sista, for a 30-minute webinar on October 16 at 11 a.m. CST to learn how Accudata uses Citrix Cloud to:

    •Protect sensitive data outside our corporate network.
    •Leverage Citrix’s Virtual Apps and Desktop environments to reduce resource needs.
    •Provide a consistent experience for all Accudata team members, regardless of location.
  • [Webcam Panel] Perspectives on the Digital Transformation Recorded: Sep 19 2018 47 mins
    Patrick Vardeman, CEO; Rick Snyder, Sr. VP; Anoj Willy, CEO; Vid Sista, Director of Technology Solutions
    Join moderator Patrick Vardeman, CEO of Accudata Systems, for a dynamic digital-first webcam panel discussion with Rick Snyder, Senior Vice President of Cisco’s Partner America’s Organization; Anoj Willy, CEO of Xentaurs, a leading Digital Transformation Systems Integrator; and Vid Sista, Director of Technology Solutions at Accudata Systems.

    They’ll cover it all—from what to consider in your DevOps strategy to hybrid cloud solutions and industry-leading technologies to build an effective data intelligence program. The digital business is far more complex than ever imagined, and we’ll do our part to help you understand where your investment can have the greatest payoff.
  • Accudata's White-Hat Files | September 2018 Edition Recorded: Sep 13 2018 15 mins
    John Sharp, Senior Consultant
    September’s White-Hat File comes from licensed attorney and Risk and Compliance Senior Consultant John Sharp.

    In this 15-minute webinar, you’ll learn how cybersecurity compliance regulations aren’t the catchall you need to make sure your network is secure—as well as the most common pitfalls organizations face when trying to stay compliant.
  • Secure Web Apps from Attacks with Advanced WAF Recorded: Sep 11 2018 15 mins
    Byron McNaught, F5 Product Marketing
    Organizations use an average of 765 web applications. Based on research from F5 Labs, these web apps were the initial target in 53% of data breaches. Bad actors commonly target web apps to steal credentials or use previously stolen credentials to gain widespread access to user accounts. Often these attacks leverage automation and/or bots for the heavy lifting.

    Learn how F5 and Accudata can help secure your web apps from attack with the new capabilities in F5's Advanced Web Application Firewall (WAF):

    - Detect and mitigate automated attacks and bots that target web and mobile apps.
    - Secure credentials from theft and protect apps from credential abuse.
    - Protect against sophisticated application Denial of Service (DoS) attacks.
  • Why ServiceNow Makes IT the Hero Recorded: Sep 6 2018 13 mins
    Vid Sista, Director of Technology Solutions
    Imagine a world where IT swoops in and saves the day. ServiceNow is making that a reality while obliterating the notion that IT is a cost center. In fact, we'll prove it in this webinar. ServiceNow is a catalyst for the digital transformation of your business, giving your entire organization, IT included, the ability to move faster, drive efficiency, improve end-user experience, and outpace the competition.

    In this 15-minute presentation, we’ll dive into the business case for ServiceNow and how it drives digital transformation in your own organization.
Secure. Modernize. Grow.
Accudata Systems is a leader in IT consulting and systems integration. For more than 35 years, we have helped strengthen organizations by solving their toughest IT challenges with a commitment to partnership, flexibility, and guaranteed results. The vastness of our expertise, paired with our proven methodology, enables a true partnership as we help our clients secure, modernize, and grow.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: A Guide to Modern Business Continuity
  • Live at: Aug 28 2018 4:00 pm
  • Presented by: Bryan Halda, Solutions Architect
  • From:
Your email has been sent.
or close