The Business Case for Investing in Cloud Backup Now
A disaster can strike at any time. A company that does not have a sound contingency in place can be exposed to prolonged downtime, causing loss of revenue and irreversible damage to its reputation. And as companies cope with the growing amount of corporate information being generated every day, they face a daunting truth: without their data, they have no business. That’s why it’s so critical to now have a modern and dependable system in place to safeguard valuable business information. Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as secure, cost-effective and reliable solutions.
A cloud backup, recovery and restore solution takes advantage of your existing infrastructure, so you don’t need to buy or install expensive equipment. Cloud backup software integrates with IT environments to locate and prioritize files for backup, and then securely transmits encrypted copies of those files to offsite data centers. This results in a lower total cost of ownership compared to the purchase and maintenance of complex tape backup systems.
According to International Data Corporation (IDC), the volume of data worldwide is expected to increase 50 times by 2020. However, many organizations are experiencing a high level of data growth today as they struggle to keep up with the rise in data volumes. Businesses today must identify much better approaches to data management, retention, storage, sharing, access and security in order to effectively deal with this growth.
Join us as we discuss how an automated, secure cloud backup solution can remove the burden of managing the complex and error-prone data protection process. During this session we will review the trends and challenges in cloud-based data protection; continuous backup and recovery for various servers, laptops, mobile devices such as tablets and smart phones; and how to mitigate costs and risk.
RecordedMar 22 201248 mins
Your place is confirmed, we'll send you email reminders
Compliance is a fundamental pillar to effective risk management at any company. However, simply complying with laws and regulations without considering the broader threat landscape can result in disaster. Certainly, a balance between compliance and risk is necessary. Ensuring compliance represents an organization's starting point, not the endgame, should be a priority.
In a dynamic threat environment, forward-thinking organizations have concluded that the goal of total protection is elusive and that a risk-based approach to governance and management of cybersecurity is necessary. That is easier said than done, as the way most information security professionals measure risk today fails to quantify threats in terms the business can understand and use. In this CPE accredited webinar, our panel of experts will discuss:
- Aligning risk and compliance metrics and controls across functional domains.
- Benchmarking existing process for managing the risks identified by stakeholders.
- Creating a transparent 'system of record' and collaborative process life-cycle management system.
- Prioritizing control efforts accordingly.
- Aligning compliance investments with compliance risk ratings and business priorities.
Kelley Vick, IT GRC Forum, Dr. Branden Williams, MUFG Union Bank; TrustArc.
The European Union’s new General Data Privacy Regulation (GDPR) came into force on May 25th, and began immediately reshaping the digital universe. According to IDC's 2017 GDPR Readiness Survey, 80% of companies were not prepared, and tech giants have already been sued for violating the terms, while major newspapers have been forced to restrict EU access to their websites for fear of noncompliance. Now two months after deadline, it's clear that large scale enterprises and their employees, are still not sure about what they need to do to comply.
In this CPE accredited webinar, our panel of experts will discuss how to adhere to the GDPR and boost the security and compliance foundations of your organization by managing the data risk.
- Find out what your organization needs to uncover data risks and avoid fines.
- Discover the latest techniques to protect data and remediate breaches.
- Learn how handle data in cloud and ensure only the right people have access.
- Clarify the requirements for your enterprise to become compliant with GDPR.
Colin Whitaker, Informed Risk Decisions; Sooji Seo, RSA; Quin Rodriguez, Riskonnect; Gabriel Gumbs, STEALTHbits.
Data protection laws such as the General Data Protection Regulation (GDPR) are complex, and can impact a broad range of business roles, including legal, audit, HR and finance, not just IT. In achieving GDPR compliance, organizations should focus on getting these roles to work together in ongoing efforts to ensure governance, risk and compliance (GRC) across an organization, and not be distracted by the noise in the marketplace. Through the process of integrating GRC practices real value can be achieved, as long as all stakeholders work with one another and take practical, measured steps toward integration. Join our panel of experts on this CPE accredited webinar to learn how your organization can achieve this.
- Find out how to align risk management with enterprise performance management under the GDPR.
- Learn how to work with stakeholders to effectively integrate compliance activities, and gain transparency, efficiency and agility for process operations.
- Discover how to identify and manage the digital risks that matter, and which risk functions need to transform.
Rebecca Herold. Panel: Jake Olcott, BitSight; Todd Boehler, ProcessUnity; Matt Kunkel, LogicGate; Scott Schneider, CyberGRX.
As organizations rely on third parties to grow and thrive, they’re exposed to major cybersecurity risks. Mitigating this risk means confronting the potential security vulnerabilities that are present in your third party network, but traditional vendor risk management (VRM) methods are no match for modern threats. According to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes.
Join our panel of experts on this CPE accredited webinar to learn how your organization can create a VRM program that’s ready and able to stand up to today's third party threat landscape.
• Find out how to gain executive leadership buy-in for your VRM program.
• Learn how to perform quantifiable vendor security analyses.
• Discover how to leverage Automation to Scale your VRM program.
Small businesses face great threats from cyber attackers every day, and do so with a fraction of the resources that mid-sized companies and large corporations have at their disposal. A small business’s network, its customer data, and its intellectual property is just as critical to its operation as a firm 100 times its size, but it lacks the skills, the processes and the technology to keep pace with ever-present cyber threats and defend itself. Join us for this session where Dark3 experts will outline how small businesses can protect themselves effectively by taking advantage of the confluence of cloud-based technologies, scalable automation and enterprise-grade cybersecurity expertise.
Colin Whitaker, Moderator. Nick Hayes, Forrester; Viktor Culjak, ACL; Cameron Jackson, Riskonnect; James Maude, Avecto.
In today’s world, implementing an effective GRC program is critical for every organization striving to secure the enterprise in an era of increasingly frequent and complex cyber threats. However, getting budget approval, organization buy-in and executing on a successful implementation can be daunting tasks to take on.
Join our panel of experts on this CPE accredited webinar to discover some of the best practices for GRC Implementation and Enterprise Security in 2018.
Qualifying participants will earn 1 CPE credit.
•Find out how to influence the correct stakeholders to successfully implement GRC at your organization.
•Learn basic security fundamentals to reduce the attack surface and secure the lines of defense.
•Discover strategies to mitigate threats and manage Reputational Risk.
Co-presented by: Julie McCoy, Solutions Engineer, AvePoint; and Irwin Lazar, VP & Service Director, Nemertes Research
GDPR requires organizations to identify, classify, and protect personal information, but how do you prepare and protect against a possible breach if you don't know what data you have, where it lives, or how it's classified?
In this informative webinar we'll discuss:
• GDPR data classification requirements
• How to incorporate GDPR data analysis into your breech prevention and reaction plan
• How to classify and protect information across multiple data stores
• Solutions for automating classification and information protection
We look forward to sharing this information with you!
Data protection has always been important, but with the GDPR deadline looming and data sharing scandals shaking consumer confidence, securing personal data has never been more vital. The GDPR is leading businesses across the world to evaluate, and in many cases modify their data processing activities in line with upcoming law.
So what if you’ve left it too late? What are the key steps you can take to work towards GDPR compliance, even after deadline day?
Join us in this webinar with Alex Jordan, Senior Analyst at the Information Security Forum as he shares:
-The ISF’s phased approach to GDPR implementation
-Ways to determine the criticality of data and how to protect it appropriately
-The urgent actions that a business can take to get GDPR compliance started
-Common myths surrounding the GDPR, and guidance on cutting through the noise.
The General Data Protection Regulation (GDPR) goes into effect on May 25, 2018. While GDPR is a regulation enacted by the European Union, if your company has global operations or reaches a worldwide audience, your company is also likely subject to GDPR. This session will help you build your GDPR preparation checklist based on the key elements of a GDPR compliance program for companies based outside the EU, explain GDPR provisions most relevant to the use of security solutions, and discuss questions you should be asking your security team and service providers to understand the features available within your solutions to help you comply with GDPR.
The General Data Protection Regulation (GDPR) is a key legislation going into effect in May that it will affect all organizations that handle, store or pass through data of EU citizens.
Join this panel of Governance, Risk, Compliance and Security experts for an interactive Q&A as they discuss the importance of being GDPR-compliant:
- What GDPR means for cyber security
- GDPR requirements around data collection and governance, exposure and breach disclosure
- Evaluating your cyber risk
- Recommendations for achieving compliance post-deadline day
- Other regulation on the horizon
May 25th 2018 is the deadline day for achieving General Data Protection Regulation (GDPR) compliance. It is also only the beginning of GDPR.
Discover what GDPR means for your organization, how it affects US businesses and why it's important to be GDPR compliant.
Join this interactive Q&A panel discussion with industry experts to learn more about:
- The intersection of GDPR, privacy and cybersecurity
- How GDPR affects data governance, breach disclosures and overall data protection
- Recommendations for improving your organization's cyber resilience
- Brian Rutledge, Principal Security Engineer at Spanning
- Kalani Enos, IT Security Manager, FARO Technologies
- Heather Stratford, CEO of Stronger.tech
Kristy Gouldsmith, Sr. Data Protection GDPR Consultant & Managing Director of Sapphire Consulting Group
The General Data Protection Regulation (GDPR) comes into force on May 25th, 2018. The GDPR changes the way that consent is sought and managed and it sets a high standard for consent. Consent means offering people genuine choice and control over how you use their data. When consent is used properly, it helps you build trust and enhance your reputation.
The changes from the GDPR reflect a more dynamic idea of consent: consent as an organic, ongoing and actively managed choice, and not simply a one-off compliance box to tick and file away. This webinar will help you to decide when to rely on consent for processing and when to look at alternatives. It explains what counts as valid consent, and how to obtain and manage consent in a way that complies with the GDPR.
About the Speaker:
Kristy Gouldsmith, CIPP/E, LLB, LLM, PGCE, BA, is a senior data protection GDPR consultant and the managing director of Sapphire Consulting Group, a leading UK data protection consultancy. Sapphire Consulting Group provide GDPR services such as audits, policies, data sharing agreements and training. Kristy is also the Data Protection Officer for a number of organisations including a multi-national software-as- a-service company, a large London-based serviced-office company and several firms of solicitors.
In this webinar, Dr. Jones Lukose will tell us about the impact of the GDPR on the International Criminal Court. Compliance is a major issue, and in this session, you will learn about the obligations, challenges, processes and the future for the International Criminal Court using the Micro Focus solutions Content Manager, ControlPoint and IDOL.
Rebecca Herold, Moderator; John McLeod, AlienVault; Mark McGlenn, Absolute; Brian Philbrook, OneTrust; Jake Olcott, BitSight.
The GDPR is the most significant change in data privacy regulation in more than 20 years. It comes into force on 25 May 2018 and will impact all businesses that process personal data or businesses that process personal data of EU citizens even if they are not in the EU. Obligations for compliance will affect both controller and processors and regulators will get increased enforcement powers and the right to impose fines of up to 4% of global turnover for both data breaches and infringements of the law.
Attend this CPE accredited educational webinar with our panel of experts to learn what you need to know about the GDPR and how to remain compliant.
- Learn how to prepare for GDPR implementation
- Identify the real life challenges of compliance
- Learn about prioritizing plans and actions to effectively prepare for data protection
- Discover some of the benefits, approaches, and tools to comply with the GDPR
Brought to you by the Vivit Automation & Cloud Builders Special Interest (SIG) Group.
Attend this webinar to receive a live demonstration of public cloud service brokering, aggregation and governance using the Micro Focus Hybrid Cloud Management solution. HCM allows IT to easily aggregate public cloud resources into an end-user catalog, while providing governance and analytics to ensure business unit consumption is visible and within budget. In addition, learn how improved control of public cloud spending can help you start building a strong business case for cloud management.
Cloud Aggregation & Brokering
- Cloud service aggregation to quickly aggregate hybrid cloud services and publish offerings in catalog
- Self-service web portal access to catalog services for end users to consume services
Hybrid Cloud Governance
- Get visibility into IT cloud costs with show-back reporting for LOBs/organizations
- Policy-based budget quota management to proactively track cloud costs and notify on quota overages
Jeff Carpenter (Crossmatch) | Chris Pierson (Binary Sun Cyber) | Alex Horan (Onapsis) | Elena Elkina (Aleada)
The General Data Protection Regulation (GDPR) is a European Union law, but it's going to impact businesses beyond the EU. Basically, any business that collects and processes personal data of EU individuals will need to achieve GDPR compliance by deadline day, May 25th, 2018.
What are the privacy & security requirements for being GDPR compliant? -
- Why we should think beyond GDPR when it comes to improving data security?
- Are you compliant / ready when GDPR goes into effect next month?
- What are some last-minute items to complete before the GDPR deadline?
Join top experts for this interactive Q&A roundtable, streamed LIVE during RSAC week, as they discuss the implication of GDPR on managing digital identity, customer data, privacy and cyber security.
- Dr. Christopher Pierson, CEO, Binary Sun Cyber Risk Advisors
- Jeff Carpenter, CISSP, CCSP, Crossmatch
- Alex Horan, Director of Product Management, Onapsis
- Elena Elkina, Partner, Aleada Consulting
This is a CPE credit session in partnership with ITSPmagazine and (ISC)².
Colin Whittaker with Tim White, Qualys, Alon Yaffe, Barracuda; Cameron Jackson, Riskonnect; and Marc French, Mimecast
Effective risk management is critical for every organization, especially in the current era of increasingly frequent and complex cyber threats. Organizations with the ability to detect changes across global IT environments in real time can better prevent and respond to malicious acts such as ransomware/malware attacks and configuration tampering.
Join our panel of InfoSec experts on this CPE accredited webinar to learn how your organization can take command of risk to proactively prioritize and address the risks that matter most, and ignite your risk management program to enable cybersecurity.
Qualifying participants will earn 1 CPE credit.
- Discover how to identify, catalog, and prioritize risks across the enterprise
- Find out how to quickly measure critical activities and address inherited risk
- Learn how to gain efficiency and effectiveness of current risk-management approaches
Lance James | Mark Rasch | Martyn Hope | David Morris
The GDPR compliance date is fastly approaching and many companies will not be compliant. What will this mean for them, what can they do over the remaining time left and what will the impact mean?
Join this panel of world-class experts:
Lance James: Chief Scientist at Flashpoint, internationally renowned Cybersecurity Specialist who has advised Boards and CISO’s at a wide range of government and F-500 organizations. Frequent lecturer and speaker.
Mark Rasch: Chief Legal and Compliance Partner for Digital Risk Management & GDPR. Former Chief Security Evangelist for Verizon Enterprise Solutions, Chief Privacy Officer at SAIC and Led U.S. Department of Justice’s Cyber Crime Unit.
Martyn Hope: Founder of the EU-GDPR Institute.
In this session you will learn:
- What will happen if I'm not Compliant by May 25, 2018
- Where do I Begin to start my compliance effort
- Who should I trust to advise me through my compliance program
If you are a CISO, Board Member, Compliance Officer, Data Privacy Officer or anyone tasked with GDPR , this is a must see discussion of world-class panelists who are experts and have first hand knowledge and expereince.
In order to properly control privacy data under GDPR, you need a plan for both classifying and understanding where that info is kept. Regulation-specific standards are often insufficient, and trying to apply multiple standards is difficult and confusing to employees. In this webcast. Greg Forest from Contoural will discuss how to create a single comprehensive yet workable data security classification standard that both ensures compliance and is intuitive and easier for employees to follow. Topics include:
• An overview of key data classification frameworks including HIPAA, ISO, FIPS and others, their strengths and their weaknesses
• Key attributes that should go into your standard including privacy, confidentiality, IP and other types of sensitive information
• How to create a hybrid standard
• Sampling your standard with content, and using this to drive adjustments and fine tuning
• How to integrate data classification with record retention
Increasing expectations for good governance, effective risk management and complex demands for legislative and regulatory compliance are presenting a growing challenge for organizations of all sizes. Tune in to live and recorded presentations by respected luminaries in the fields of governance, risk and compliance. Their thought leadership will provide you with practical advice on how to implement successful GRC strategies and processes for your organization.