Recording: Simplify Your Data Protection & Backup Strategy
Enterprises today have never had such a great choice when it comes to their backup strategy. Depending on budget, performance and availability requirements, enterprises are increasingly looking to mix and match different backup technologies and techniques to meet their disaster recovery objectives. But by doing so, are they able to control their costs and reduce the complexity of their backup environment?
According to Gartner:
•By 2013, at least 20% of organisations will have changed their primary backup vendor over cost, complexity and/or capability.
•By 2013, more than 50% of midsize organisations and more than 75% of large enterprises will implement tiered recovery architectures
Join this BrightTALK™ Webcast from Hewlett-Packard as we share tips on how to reduce the complexity of backup environments, the pro’s and con’s of tiered recovery architectures and how to achieve “one touch” disaster recovery for your organisation.
RecordedJun 17 201161 mins
Your place is confirmed, we'll send you email reminders
In today’s business landscape it is important to take a proactive approach to security rather than a reactive approach. Join leading security experts as they discuss the safest ways to protect your organisation in 2019 and beyond.
Join this Q&A panel to learn more about:
- Key organisational benefits to practising proactive security
- Technologies powering security
- Best practices and recommendations for a more secure organization
David Welch, House of Brick | Sherelle Farrington, Fortinet | Curtis Preston, Druva
"Network architectures moving to the cloud, so knowing how to secure them is crucial. Join this live expert panel to discuss all things virtual and cloud networking; from security, network virtualization, and beyond.
- Micro-segmentation and securing your application infrastructure
- Readying today's hybrid and private cloud networks for tomorrow
- SD-WAN, IoT and Edge computing: how they are changing the cloud network landscape"
Colin Whittaker with Todd Boehler, Process Unity; Jason Sabourin, OneTrust; Mark Deluca, Coupa; and Chris Poulin, BitSight
High-Profile Data Breaches have placed a spotlight on the risk of cyber security breaches with vendors and subcontractors, expanding the need to have greater rigor in third party risk management and ongoing risk assessments. Maintaining an effective third-party risk management program doesn't happen overnight. It's a journey that involves continual learning, refinement and evolution.
And as a program matures over time, it results in the management of vendors and other third parties with fewer risks, lower costs, better performance and stronger compliance. Since every company is at a different place in their journey towards better vendor management, it's important to identify steps that you can follow as you mature your program, and to consider your vendor risk ecosystem and the data and services that can have an enormous impact on risk reduction. On this CPE accredited webinar our panel of experts will address some key steps to mature your third-party risk management program, including how to:
- Create a third-party risk-management maturity roadmap.
- Connect with enterprise systems to create a centralized data repository and enable seamless vetting activities across processes
- Incorporate external content sources for a more wholistic view of your vendors plus more sustainable ongoing monitoring
- Strengthen and streamline your third-party risk management efforts.
Johna Till Johnson, CEO and Founder, Nemertes Research
Cloud and Cybersecurity Series [Ep.6]: Next-Generation Cybersecurity: Policy Process and Organization
Resources are finite. So deploying them wisely is what differentiates successful cybersecurity organizations from those that are less successful. Find out how these successful cybersecurity organizations are structured, what policies they have in place, and what strategies they do—and don’t—follow to protect their enterprise organizations.
As in-house security becomes increasingly complex and costly, organizations are in need of a reliable and safe security provider. Join industry experts as they discuss the latest trends in SEaaS, including:
-Why your organisation needs to move towards SEaaS
-The different models of security as a service
- SEaaS solutions and strategies
John Burke, CIO and Principal Research Analyst, Nemertes Research
Cloud and Cybersecurity Series [Ep.5]: Application Security Meets Multicloud
Enterprises are developing and buying applications to run everywhere: across multiple clouds, multiple data centers, desktops, mobile devices, and IoT devices. In a multicloud environment, IT needs to take a multipronged approach to securing applications.
We'll how organizations approach securing their applications for the multicloud, ranging from changes in the development process to the embrace of security technologies including IAMaaS, microservice authentication, and enterprise secure cloud access and policy enforcement (ESCAPE).
This webinar presents data from Nemertes' in-depth research study of 335 organizations in 11 countries across a range of vertical industries.
Insider threats can wreck your network, your business, and your company's reputation. But stopping malicious or simply incompetent insiders from doing damage isn't just an exercise in analyzing where the damage came from. This forensic investigation may become part of a criminal investigation, and therefore requires careful, step-by-step analysis and traceability. You must identify and attribute the actions taken but the insider while confirming to legal requirements, privacy concerns, and the requirements of a chain of evidence. Join Ryan Lai, EVP of Professional Services at Nisos, as he discusses the wide-ranging complexities of an insider threat investigation.
Ted Vojnovich, Lenovo; Fred Bower, Lenovo; Tim Lustig, Mellanox
Software defined storage, or SDS, is growing in popularity in both cloud and enterprise accounts. But what makes it different from traditional storage arrays? Does it really save money? Is it more complicated to support? Is it more scalable or higher-performing? And does it have different networking requirements than traditional storage appliances?
Watch this SNIA webcast to learn:
•How software-defined storage differs from integrated storage appliances
•Whether SDS supports block, file, object, or all three types of storage access
•Potential issues or pitfalls with deploying SDS
•How SDS affects storage networking
•Scale-up vs. scale-out vs. hyperconverged vs. cloud
MuckAI Girish, Appnomic and Muck.AI | Rohini Kasturi, Pulse Secure
AI and ML are playing an outsize role in myriad fields. However, in cybersecurity, it hasn’t had the same share as in several other areas, despite high potential and a growing need. The security companies have been focused more on the core problems and industry experts generally tend to believe that AI will make further foray into various aspects of the security ecosystem. In this webinar, we will discuss the role of AI in different realms of security products and services, such as identity & access management, malware detection and incident response & forensic analysis.
- How should enterprises look at leveraging AI to improve their security posture
- Which areas are more likely to see higher adoption of AI and where vendors should place their bets
- What challenges have to be overcome for broader adoption of AI
MuckAI Girish, Chief Business Officer, Appnomic and CEO, Muck.AI
Rohini Kasturi, Chief Development Officer, Pulse Secure
Machine learning platforms are one of the fastest growing services of the public cloud. ML, an approach and set of technologies that use Artificial Intelligence (AI) concepts, is directly related to pattern recognition and computational learning. Early adopters of AI have now rolled out cloud-based services that are bringing AI to the masses.
How are AI, deep learning, machine learning, big data, and cloud related? Can machine learning algorithms enable the use of an individual’s comprehensive biological information to predict or diagnose diseases, and to find or develop the best therapy for that individual? How is Quantum Computing in the Cloud related to the use of AI and Cybersecurity?
Join this webinar to learn more about:
- Machine Learning, Data Discovery and Cloud
- Cloud-Based ML Applications and ML services from AWS and Google Cloud
- How to Automate Machine Learning
Join BrightTALK's LinkedIn Group for IT Security Insights: http://bit.ly/2IsbauU
This session will take a practical approach to IT risk management and discuss multi cloud, Verizon Data Breach Investigations Report (DBIR) and how Enterprises are losing ground in the fight against persistent cyber-attacks. We simply cannot catch the bad guys until it is too late. This picture is not improving. Verizon reports concluded that less than 14% of breaches are detected by internal monitoring tools.
We will review the JP Morgan Chase data breach were hackers were in the bank’s network for months undetected. Network configuration errors are inevitable, even at the largest banks as Capital One that recently had a data breach where a hacker gained access to 100 million credit card applications and accounts.
Viewers will also learn about:
- Macro trends in Cloud security and Micro trends in Cloud security
- Risks from Quantum Computing and when we should move to alternate forms of encryption
- Review “Kill Chains” from Lockhead Martin in relation to APT and DDoS Attacks
- Risk Management methods from ISACA and other organizations
Speaker: Ulf Mattsson, Head of Innovation, TokenEx
Join BrightTALK's LinkedIn Group for IT Security Insights: http://bit.ly/2IsbauU
Artificial Intelligence, machine learning, and deep learning are the raves in network security. It's perceived as the only practical approach to staying ahead of today's cyberthreats.
The various steps used by Artificial Intelligence is not so different than a physician’s approach to treating a patient. You must first understand the patient (or device), monitor and assess that all organs (or components) are behaving as intended, and proactively treat (or remediate) viruses and other harm.
In this session, Dr. May Wang will explore:
- The latest advancements in AI for IoT security using healthcare as an example
- The top security threats to healthcare organizations and how to address them.
Dr. Umesh Rao Hodeghatta, Chief Data Scientist, NU-Sigma Analytics Labs
With the increasingly connected world revolving around the revolution of internet and new technologies like mobiles, smartphones, and tablets, and with the wide usage of wireless technologies, the information security risks have increased. Both individuals and organizations are under regular attacks for commercial or non-commercial gains. The objectives of such attacks may be to take revenge, malign the reputation of a competitor organization, understand the strategies and sensitive information about the competitor, simply have fun of exploiting the vulnerabilities. Hence, the need to protect information assets and ensure information security receives adequate attention.
In this session, Dr. Umesh Rao Hodeghatta will discuss:
- How AI and Machine Learning can be applied in detecting, predicting and preventing cyber security / information security vulnerabilities
- The benefits of using Machine Learning and AI
- Tools available to perform the same.
John Bambenek, VP of Security Research and Intelligence at ThreatSTOP, Inc.
The chief problem with cybersecurity is that most of our tools and workforce is geared to waiting for adverse events, detecting those events (sometimes months after the fact), investigating the breach that has already occurred, and then cleaning up. This slow and reactive process ensures breaches happen and security staff us overwhelmed under the noise.
This talk will focus on automation and machine learning techniques that can proactively identify threats seen in the wild based on the latest academic research. This techniques allow organizations to identify suspect infrastructure before it is used to attack them. The key to making this work is infusing machine learning with knowledge of how actual attacks work and the threat landscape. Machine learning without intelligence is merely gussied up mensa math exercises.
It isn't enough to know what the attacker will use to attack, however. Armed with this knowledge, organizations now need to safely automatically block these attacks before they occur so breaches never happen to begin with. The goal of automation must be to stop attacks before they are launched, not merely speeding up incident response. Several case studies will be discussed showing how this all can work together in the real world.
- How to use machine learning and why it is essential to use strong intelligence to create models
- Techniques to use automation to block attacks before they are launched against a victim organization
- Cost-effective and safe ways to whitelist and blacklist infrastructure to insure against false positives
Time and talent are key factors in preventing a data breach. Join Vectra, the leader in AI powered Network Detection & Response (NDR) to explore how enterprises are evolving their security capabilities to become more agile, efficient, and dramatically reduce attacker dwell time through the application of AI.
Join this session to learn:
- How should we balance defensive controls against a need to build detection and response capabilities?
- How is cloud adoption impacting security architectures?
- What roles should automation play within security operations?
Pierre Mouallem, Lenovo; John Kim, Mellanox; J Metz, Cisco; Steve Vanderlinden, Lenovo
What does it mean to be protected and safe? You need the right people and the right technology. This presentation is going to go into the broad introduction of security principles in general. This will include some of the main aspects of security, including defining the terms that you must know, if you hope to have a good grasp of what makes something secure or not. We’ll be talking about the scope of security, including threats, vulnerabilities, and attacks – and what that means in real storage terms. In this live webcast we will cover:
•Protecting the data (Keeping “the bad” out)
•Threat landscape, Bad actors/hackers
•Attack vectors, attack surfaces, vulnerabilities
•Physical security issues
•Layers of protection (encryption – last line of defense)
•Remediation after a breach/incident
Diana Kelley, Microsoft | Michelle Drolet, Towerwall | Peter Dougherty, MantisNet
As the average monetary cost of a malware attack continues to increase and currently costs an organization an average of $2.4 million, it is essential to be up to date on detection and prevention best practices. Join leading industry experts as they discuss the biggest security threats and how to detect and prevent them:
-New on the threat landscape
-How to deploy automated threat detection
-Breach prevention best practices
Diana Kelley, Cybersecurity Field CTO, Microsoft (moderator)
Michelle Drolet, CEO, Towerwall
Peter Dougherty, CISSP, CEO, MantisNet
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.