Hi [[ session.user.profile.firstName ]]

Backup + Cloud = Simplified Business Continuity

Every IT application protected by Business Continuity (BC) plans needs to include backup. In any BC plan, backup itself must be protected with at least high a level as the application if is supposed to protect.



Looking at the overall BC plan, restoring the information is always one of the earliest tasks required for recovery, consuming scarce resources to perform a task: logistics, setting up machinery, handling the backup medias etc.

By outsourcing the backup and restore to the right off-site and cloud services the complexity of the BC plan is tremendously reduced.

Stephan Haux is Senior Product Manager for EMEA at Iron Mountain Digital. Haux oversees EMEA activities for determining market requirements, for going to market across Iron Mountain Digitals product and service portfolio. Haux frequently speaks at events, briefs journalists and engages with the analyst community in all parts of the world. Before Haux joined Iron Mountain held various international positions at SAS for example as Team Leader and Product Manager. With more than 20 years experience in IT and Marketing covering areas from ERP, CRM, Business Intelligence and Performance Management Haux is embarked for the ultimate challenge: Designing services to manage the world’s information.
Recorded Jun 24 2010 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Stephan Haux, Senior Product Manager EMEA, Iron Mountain
Presentation preview: Backup + Cloud = Simplified Business Continuity

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • [Earn CPE] Cornerstones to Fortify Your Enterprise Cybersecurity Defense Sep 26 2019 5:00 pm UTC 75 mins
    Panel Moderated by Colin Whittaker, Founder of Informed Risk Decisions.
    The enterprise cybersecurity landscape is dramatically expanding in scale and complexity, and cyberattacks are growing in magnitude and impact as digital transformation increases on a global scale. From phishing scams, to ransomware attacks, to malicious breaches from state actors, the potential threat to your business is huge. According to the Ponemon Institute, the average per breach cost to a company in 2018 was estimated at $3.86 million, an increase of 6.4 percent over the previous year.

    Even though cybersecurity presents a challenge to the enterprise, you are not helpless against the bad actors who seek to cause real and costly damage to your business. A proactive, company-wide, integrated digital security strategy that addresses cybersecurity threats at all levels of your business will provide you with both the offensive and defensive capabilities you need to handle whatever comes your way. Earn 1 CPE credit by attending this educational and interactive panel webinar. Our experts will discuss why fortifying your cybersecurity strategy should be a critical priority and highlight some best practices that you can employ to stay ahead of evolving threats, including how to;

    - Understand the changing cyberattack landscape,
    - Create a company-wide cybersecurity task force,
    - Evaluate your security budget against your threat level,
    - Fortify your cybersecurity defense with systems hardening, adaptive authentication, and endpoint protection.
  • [PANEL] Getting Ready for CCPA Sep 17 2019 5:00 pm UTC 60 mins
    Elena Elkina | Lisa Hawke
    The California Consumer Privacy Act (CCPA) is going into effect on January 1, 2020, making it America’s first-ever state data privacy law. It is also the most far-reaching privacy regulation in the U.S. to date.

    Join this panel of experts for an interactive Q&A session to learn more about what businesses need to do to prepare for CCPA. Attendees will also learn about the CCPA checklist, as well as dive into:
    - GDPR vs. CCPA
    - Which organizations need to plan for CCPA compliance
    - What to do to avoid the risk of fines
    - How to develop a strategy and start implementing tools to achieve compliance
    - More privacy legislation on the horizon

    Speakers:
    - Elena Elkina, Partner, Aleada Consulting
    - Lisa Hawke, VP Security and Compliance, Everlaw
  • [Earn CPE] Preventing Data Breaches with a Scalable Verification Program Sep 10 2019 5:00 pm UTC 75 mins
    Moderated By Colin Whittaker, Informed Risk Decisions. Panelists: Evident ID
    Consumer demand is driving the corporate IT environment. Business demands for IT are changing rapidly — so too are the demands on IAM — resulting in the requirement to adopt emerging technologies (e.g., mobile and cloud computing, data loss prevention, and social media) earlier and more quickly. Scalability is critical for any business that wants to catalyze short- and long-term success. A flexible workflow for identity verification can help organizations of all sizes with limited time, resources, and funding to focus their efforts on initiatives that support positive growth. While your business might be conducting background checks today, it could have different verification needs in the future to ease onboarding friction, prevent data breaches, and demonstrate regulatory compliance.

    It’s important to begin laying the groundwork now for a more sophisticated and intricate verification program so you can be proactive, not reactive, but what does a scalability strategy look like? In this CPE accredited panel webinar our experts will address how to create identity and credential verification workflows that can scale with your organization as it grows, including how to:

    - Gain a better understanding of the digital identity landscape,
    - Ensure accuracy of both data sources and verification records,
    - Centralize verification of multiple data sources into a unified platform,
    - Evaluate new developments like biometrics, AI, and blockchain, and how they can impact identity and data management,
    - Save money in the long-term by laying the groundwork for adaptable online verification workflows,
    - Adapt and respond to new regulations.
  • [Earn CPE] Automating Your Third-Party Risk Management Program Jul 25 2019 5:00 pm UTC 75 mins
    Colin Whittaker, IRD; with panelists from: BitSight, OneTrust, LogicGate, and ProcessUnity.
    The current state of vendor risk management (VRM) is bleak. More than half of all information security breaches are caused by third-party vendors, and according to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes. Given the growing complexities in accurately collecting and screening third-party data and the need for deeper due diligence, automation is key to a successful risk program. However, many corporations haven’t adopted automation in their third-party risk management programs.

    The lack of automation adoption can be traced to a few core reasons. Disparate systems, out-of-date data, and inconsistent policies can all stifle a company’s ability to modernize their third-party risk management program, and companies often suffer from more than one of these. When applied effectively, automation can not only help prevent these roadblocks; it can also drive the efficiencies procurement and compliance leaders are looking for. Join this CPE accredited panel webinar as our expert panel address some key steps to automating third-party risk management, including how to:

    -Manage an up-to-date vendor master to create one source of truth across the entire corporation,
    -Leverage automation and machine learning to standardize data governance,
    -Drive efficiencies and reduces costs, while ensuring the highest accuracy in your third-party risk management program.
  • [Earn CPE] Executive's Guide to Smarter GRC with Cybersecurity Attack Analytics Jun 27 2019 5:00 pm UTC 75 mins
    Panelists: Sam Abidir, Lockpath; James Rice, Greenlight Technologies; Ilia Sotnikov,Netwrix; and Jason Bonds, Ping Identity.
    Today’s increasing organizational complexity and evolving threat environment have made it more critical than ever for organizations to clearly identify their exposures, measure vulnerability risk, and quickly prioritize remediation efforts. Cyberattacks are often hidden from view under a mountain of alerts generated by security systems, giving attackers time to gain access to systems and seize valuable data.

    To ensure their companies don't end up in the headlines for the wrong reasons, corporate governance, risk management, compliance management and other “lines of defense” functions need to rethink their security strategy and take an approach that looks at behavior and attack patterns. By conecting cybersecurity attack analytics with risk programs and GRC work streams, executives can increase visibility into the overall security risk of the organization which makes the investigation of application security events easy, and enables teams to mitigate and respond to real security threats quickly and decisively.

    Join this CPE panel webinar for insights on achieving smarter GRC with CAA. We will share:

    - Why traditional endpoint security is failing to see and stop attacks.
    - How using attack analytics can stop cyberattacks now and in the future.
    - Efficient ways to analyze events and prevent threats.
    - How to move from looking back to real-time and forward-looking GRC monitoring.
  • Emerging Data Privacy and Security for Cloud Jun 25 2019 5:00 pm UTC 60 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    Personal data privacy will be the most prominent issue affecting how businesses gather, store, process, and disclose data in public cloud. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data.

    The good news is that these data privacy regulations compel businesses to get a handle on personal data — how they get it, where they get it from, which systems process it, where it goes internally and externally, etc. In other words, the new norms of data privacy require proactive data management, which enables organizations to extract real business value from their data, improve the customer experience, streamline internal processes, and better understand their customers.

    Join this interactive webinar to learn more about:
    - The latest trends and strategies for securing sensitive data in cloud and the enterprise
    - How to discover and capture your data inventory
    - What’s needed to prevent a data breach by securing your critical data and protect your reputation
  • [Earn CPE] Enabling GRC with Secure Authentication across the Digital Ecosystem Recorded: Jun 11 2019 76 mins
    Colin Whittaker, IRD; Richard Bird, Ping Identity; Teju Shyamsundar, Okta, Jerrod Chong, Yubico; and Andy Smith, Centrify.
    The days of securing a well-defined perimeter around your organization are gone. The cloud, mobile technologies, the internet of things (IoT) and diverse user groups freely exchange data across digital ecosystems, network and economies. This fluidity, however, means that organizations must secure access at multiple points throughout the organization, or risk letting in intruders seeking to hijack data.

    To manage the increasingly diverse digital landscape, IT and security managers need to move beyond usernames and passwords, and expand their use of multi-factor authentication (MFA) to help provide secure and convenient access to the critical data and systems users need. On this webinar our panel of experts will address how secure authentication can help enable GRC across the digital ecosystem, and they will share tips on:

    - Securing access at all points across applications, devices, users and environments.
    - Sharing insights across security systems to strengthen security.
    - Collecting and analyzing information to stop attacks.
    - How MFA can transform secure access—to any application, from any device, anywhere, at any time.
    - Strengthening identity assurance with privileged users.
  • Ask the AppSec Expert: How to Secure the Applications you Build, Buy & Manage Recorded: Jun 6 2019 13 mins
    Paul Farrington, Veracode | Yotam Gutman, Cybersecurity Marketing Community
    Tomorrow's businesses need a simpler and more scalable way to increase the resiliency of global application infrastructure, without slowing innovation, today.

    Join this interactive 1-2-1 discussion where EMEA Chief Technology Officer, Paul Farrington (CISSP, MBCS) will share how leading businesses are;

    - Improving the level of security awareness and addressing the skills deficit
    - Enabling developers to fix flaws and prevent new ones
    - Prioritising and triaging the most exploitable flaws
    - Automating application security
    - Providing software development leaders with really useful security metrics
    - Incentivising secure development as part of their culture

    This session will show you how architects and developers are making smarter choices in designing secure software. You will also learn how to report success, and investment justification, to the board whilst setting realistic expectations throughout the software development lifecycle and not just at the destination.
  • Livestream Video - Proactive Data Privacy and Security Recorded: Jun 6 2019 45 mins
    Steve Wright, Bank of England | Bill Mew, The Crisis Team | Ilias Chantzos, Symantec | Allan Boardman, ISACA
    How can enterprises shift from a reactive approach to privacy and data security to being proactive and closer to privacy-and-security-by-design? Join this panel of experts to get the answer to all of your privacy, security and compliance questions.

    Viewers can learn more about:
    - Effect of GDPR: One year later
    - How are enterprises instituting changes to achieve and maintain compliance
    - Challenges to achieving compliance in an IoT world
    - How to bake privacy and security into your processes
    - Best practices for data protection and privacy from the ground up

    Panellists
    Bill Mew, CEO,The Crisis Team
    Steve Wright, CISO & GDPR Advisor, Bank of England
    Ilias Chantzos, Senior Director, Government Affairs, Symantec

    Moderated by Allan Boardman, CGEIT Certification Committee Member, ISACA
  • Livestream Video - Application Security in a DevOps World Recorded: Jun 6 2019 37 mins
    Keith Batterham, DevSecOps Evangelist | Moshe Lerner, Checkmarx | Paul Farrington, Veracode | Yotam Gutman
    With today's enterprises leveraging around 1000 applications and multiple clouds, application security is becoming a key area of focus. Application security testing is being integrated into the DevOps process early on, while automation, speed and coverage and becoming critical to the success of DevSecOps programs.

    Join this interactive panel of industry experts to learn more about:
    - Why application security is critical
    - Key principles for building application security into DevOps
    - Best practices for leveraging automation
    - Speed vs Security: Where do you draw the line?
    - Recommendations for improving security in 2019

    Panellists
    Paul Farrington, EMEA CTO, Veracode
    Keith Batterham, CTO - CISO - DevSecOps Evangelist
    Moshe Lerner, SVP Product Strategy & Corporate Development, Checkmarx

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Ask the Data Management Expert: Security and Compliance in the Cloud Recorded: Jun 6 2019 10 mins
    Nicolas Groh, Field CTO EMEA, Rubrik
    Join this interactive 1-2-1 discussion where Field Chief Technology Officer, Nicolas Groh will share;

    - Challenges businesses are facing today with regards to security and compliance in the cloud
    - Improvements that can be made today to ransomware prevention, detection, and recovery
    - Long-term security and compliance strategies
    - Quantifiable outcomes businesses can expect to see with a unified system of records

    Moderated by Paige Bidgood, EMEA Community Lead - IT Security & GRC, BrightTALK
  • Ask the Data Security Expert: How to Protect your Business in the Cloud Recorded: Jun 5 2019 16 mins
    Carl Leonard, Forcepoint | Raef Meeuwisse, ISACA Expert Speaker
    Cloud security is a key challenge for today's data-driven businesses.

    Join this interactive 1-2-1 discussion where Principal Security Analyst, Carl Leonard will share insights on;

    - What are the top cyber threats and trends to look out for in 2019?
    - Why are businesses continuing to suffer data breaches?
    - How are businesses securing themselves as they embrace digital transformation?
    - What is secure SD-WAN? Why is it increasingly important to businesses with distributed office locations?
    - What are the most important security solutions for businesses wishing to safely adopt cloud services?

    Moderated by Raef Meeuwisse, ISACA Expert Speaker and co-author of "How to Hack a Human: Cybersecurity for the Mind"
  • Livestream Video - Protecting Against Phishing, Ransomware & Social Engineering Recorded: Jun 5 2019 47 mins
    Raef Meeuwisse| Carl Leonard, Forcepoint | John Scott, Bank of England | Adenike Cosgrove, Proofpoint | Richard Agnew, Code42
    External and internal threats continue to pose a challenge for security professionals worldwide. How are businesses preparing against attacks like phishing, ransomware, and social engineering?

    Join security experts from the industry to learn more about:
    - The most prevailing cyber threats businesses face in 2019
    - Lessons from cyber attacks and strategies for protecting against them
    - Solutions for faster breach detection and response
    - Why network visibility is key
    - Recommendations for improving enterprise security

    Panellists
    Richard Agnew, VP EMEA, Code42
    Carl Leonard, Principal Security Analyst, Forcepoint
    John Scott, Head of Security Education, Bank of England
    Adenike Cosgrove, Cybersecurity Strategist, Proofpoint

    Moderated by Raef Meeuwisse, ISACA Expert Speaker and co-author of "How to Hack a Human: Cybersecurity for the Mind"
  • Livestream Video - CISO Challenges and How to Solve Them Recorded: Jun 5 2019 43 mins
    Darren Thomson, Symantec | David Boda, Camelot Group | George Patsis, Obrela Security Industries | Martin Mackay, Proofpoint
    Today's CISO faces a myriad of challenges when it comes to securing the enterprise. From budgetary concerns and vendor confusion to dealing with the chronic lack of cyber talent, to addressing the disappearing security perimeter, CISOs are looking for ways to automate security operations and leverage AI to do more with existing teams and fewer tools.

    Join security experts across the industry for an interactive discussion on:
    - What keeps CISOs up at night
    - Strategies for breach prevention
    - Strategies for making the most of AI technology and human talent
    - Coping with analyst fatigue
    - Threats on the horizon
    - Recommendations for strengthening security

    Panellists
    David Boda, CISO, Camelot Group
    Darren Thomson, CTO - EMEA, Symantec
    George Patsis, CEO, Obrela Security Industries
    Martin Mackay, Senior Vice President - EMEA, Proofpoint

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Ask the Cyber Expert: How to Manage Cyber Exposure, Risks and Compliance Recorded: Jun 5 2019 13 mins
    George Patsis, Obrela Security Industries | Yotam Gutman, Cybersecurity Marketing Community
    Join this interactive 1-2-1 discussion where information security expert, George Patsis will share how to;

    - Align cybersecurity function with organisational and business strategy
    - Meet regulatory and compliance requirements
    - Deal with breaches in an ever-changing technology landscape
    - Create valuable reports

    During this session, you will learn how to identify, predict and prevent cyber threats, in real time.

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Live Interview: Importance of Building a People Centric Cybersecurity Strategy Recorded: Jun 5 2019 16 mins
    Martin Mackay, Senior Vice President, EMEA
    More than 99% of all targeted cyberattacks rely on users to activate them. It is evident that people need to be at the centre when building a robust cybersecurity strategy in the era of highly sophisticated attacks.

    Join our EVP, EMEA, Martin MacKay at this live interview as he discusses key findings from the threat landscape and gives some practical tips on how CISOs can build a truly people-centric security strategy.

    We'll discuss:
    - Today's most notorious cyber threats and trends.
    - How the attackers are changing tactics to target specific people in your organisation and how to protect against these threats.
    - CISO's role in changing company culture towards security risks and awareness and some tips on changing user behaviour to reduce risk.
  • Ask the Cloud Security Expert: How to Protect your Critical Data in the Cloud Recorded: Jun 4 2019 19 mins
    Dave Barnett, Forcepoint EMEA | Alex Hilton, Cloud Industry Forum
    Effectively protecting critical data in the cloud is a key challenge for today's data-driven businesses.

    Join this interactive 1-2-1 discussion where Cloud Access Security Broker (CASB), Dave Barnett will share insights on;

    - Why and how today organisations are protecting data in the cloud.
    - What are the main risks inherent in the adoption of cloud services?
    - Where the key challenges are in protecting data in the Cloud?
    - What to look for when selecting cloud security for your organisation

    Moderated by Alex Hilton, Chief Executive, Cloud Industry Forum
  • Ask the Data Protection Expert: How to Protect your Data Journey Recorded: Jun 4 2019 15 mins
    Patrick Grillo, Fortinet | Yotam Gutman, Cybersecurity Marketing Community
    Join this interactive 1-2-1 discussion where network security and IP networking solutions expert, Patrick Grillo will share how to deal with security challenges as networks evolve including cloud-based resources and SD-WAN.

    Key themes to be explored include;

    - Why security should never be treated as an afterthought
    - The impact of new technologies/techniques on existing security infrastructure/practice
    - How to develop/maintain a consistent security practice beyond technology
    - How to get C-suite commitment and build the right organizational structure

    This session showcases the need for security continuity by connecting a number of disparate concepts, for example how the Cloud services and SD-WAN are related.

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Livestream Video - Securing the IoT in the Age of Threats Recorded: Jun 4 2019 43 mins
    Wallace Sann, Forescout | Nigel Stanley, TÜV Rheinland Group | Andrew Hollister, LogRhythm | Jason Soroko, Sectigo
    The ever-growing Internet of Things continues to pose security and privacy threats. How are businesses managing the risks associated with IoT devices on their networks? What are the best strategies for achieving basic security and cyber hygiene?

    Join this interactive panel with IoT and security experts to learn more about:
    - Impact of IoT on enterprise security
    - How to assess the IoT risk
    - Most common IoT vulnerabilities and how to address them
    - Recommendations for improving IoT security

    Panellists
    Jason Soroko, CTO of IoT, Sectigo
    Andrew Hollister, Chief Architect & Product Manager, LogRhythm
    Wallace Sann, VP Global Systems Engineering, Forescout Technologies
    Nigel Stanley, CTO - Global OT & Industrial Cyber Security CoE, TÜV Rheinland Group

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Livestream Video - Multi-Cloud Security and Compliance Recorded: Jun 4 2019 46 mins
    John Meakin, GSK | Patrick Grillo, Fortinet | Dave Barnett, Forcepoint EMEA | James Hughes, Rubrik
    The cloud strategy of today's enterprise spans across multiple clouds and hundreds of applications. Point security solutions no longer work, so enterprises are turning toward a more orchestrated approach to achieving security and compliance in the cloud.

    Join cloud and security leaders in an interactive discussion to learn about:
    - Key security and compliance challenges associated with a multi-cloud strategy
    - Recommendations for managing and automating security across multiple clouds and applications
    - The future of cloud
    - Improving enterprise security in an ever-changing threat landscape

    Panellists
    James Hughes, Field CTO, Rubrik
    Dave Barnett, Head of CASB, Forcepoint EMEA
    Patrick Grillo, Senior Director - Security Solutions, Fortinet
    John Meakin, Group Chief Information Security Officer, GlaxoSmithKline (GSK)

    Moderated by Alex Hilton, Chief Executive, Cloud Industry Forum
trends, developments, and technology
Increasing expectations for good governance, effective risk management and complex demands for legislative and regulatory compliance are presenting a growing challenge for organizations of all sizes. Tune in to live and recorded presentations by respected luminaries in the fields of governance, risk and compliance. Their thought leadership will provide you with practical advice on how to implement successful GRC strategies and processes for your organization.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Backup + Cloud = Simplified Business Continuity
  • Live at: Jun 24 2010 1:00 pm
  • Presented by: Stephan Haux, Senior Product Manager EMEA, Iron Mountain
  • From:
Your email has been sent.
or close