Hi [[ session.user.profile.firstName ]]

Cyber Defense Through Fault-Tolerant Security Architecture

Is your security architecture up to date and able to defend against the latest cyber attacks? Every technology vendor will likely tell you that they have the most solid infrastructure, and that their roadmap is the one to follow. You may want to consider a fault-tolerant approach with security, as it can be more comprehensive than selecting one particular vendor for a specific requirement.

Fault-Tolerance means that you assume that a particular solution will fail, but are theoretically protected as another solution can be there if this failure happens.

Join this presentation and learn how fault tolerance can be deployed against breach scenarios and how it helps improve cybersecurity in 2017.
Recorded Nov 23 2016 28 mins
Your place is confirmed,
we'll send you email reminders
Presented by
James Chillingworth, Founder of The Consulting Practice
Presentation preview: Cyber Defense Through Fault-Tolerant Security Architecture

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Back to the Office – Or Not? Next Steps in Pandemic Technology Response Recorded: May 1 2020 62 mins
    Dan Lohrmann | Scott Larsen | Earl Duby | Vinod Brahmapuram
    As the United States enters a new phase in Covid-19 response, how are businesses and governments responding? What lessons have been learned, and what next steps are organizations taking? How can technology and cybersecurity mistakes be avoided?

    Join this webinar for the latest coronavirus playbook roundup and recommendations on how to address the next phase of the outbreak. Learn the scope of the unprecedented challenges organizations are currently facing. Hear from industry leaders on how they are addressing the COVID-19 security and technology challenges.

    By popular demand, this webinar is a follow-up to the immensely successful BrightTALK session held on March 13 at the beginning of this emergency. That webcast (link in Attachments): Coronavirus Actions and Risks for Tech and Security Leaders, was viewed thousands of times, and numerous attendees asked for this update.

    Topics will include:
    - Policy, technology and process steps to take today to protect your workforce and organization.
    - Lessons learned from more staff working from home (telework)?
    - What mistakes can be avoided as staff prepare to go back to offices –and how?

    We will close with a Q/A session with the audience.

    Speakers:
    - Dan Lohrmann, Chief Security Officer & Chief Strategist at Security Mentor Inc.
    - Scott Larsen, CISO of a large healthcare provider
    - Earl Duby, CISO at Lear Corporation
    - Vinod Brahmapuram, CISO at State of Washington Government
  • Data Protection & Privacy During the Coronavirus Pandemic Recorded: Apr 2 2020 61 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    Remote work is quickly becoming the new normal and criminals are taking advantage of this chaotic situation.

    The EU Agency for Cybersecurity's providing guidance for the huge increases in the number of people working remotely, using tele-health it is vital that we also take care of our cyber hygiene.

    Viewers will learn more about:
    - How to use encryption, controlling new storage of regulated data and data sharing in this new situation.
    - Anonymization leaves personal data open to re-identification, which exposes firms to GDPR non-compliance risks.
    - How are the HIPAA rules changing in this situation?
    - GDPR prescribing pseudonymization and how is that work.
    - How is CCPA changing the rules?
    - How to secure wi-fi connections preventing snooping of your traffic and fully updated anti-virus and security software, also on mobile phones.
    - How important files can be backed up remote or locally. In a worst case scenario, staff could fall foul of ransomware for instance.
    - What apps are secure to use in this new era?
    - Should we use MFA, PW managers or local PW management?

    We will also discuss how to use the CERT-EU News Monitor to stay updated on the latest threats and check the following basics.
  • Dealing with PCI DSS Compliance During the COVID-19 Crisis Recorded: Mar 25 2020 61 mins
    Ben Rothke | David Mundhenk | Jeff Hall | Arthur Cooper "Coop"
    The new normal during the current COVID-19 crisis is changing every aspect of the business world. It is also affecting how QSA’s deal with PCI assessment.

    A QSA for the most part has to be on-site for a PCI assessment, how are they do to that when they can’t get to the site?

    On this webinar, The PCI Dream Team will:
    - Provide an overview of the PCI DSS requirements to be on-site
    - Discuss strategies to perform PCI assessments when being on-site is now impossible
    - Answer any specific questions to deal with this predicament
    - Detail work at home issues and concerns
  • Preparing for COVID-19: An Infosec Perspective Recorded: Mar 25 2020 30 mins
    Jeff Schmidt, VP of Cyber at Columbus Collaboratory
    COVID-19 pandemic has not only changed our lives but immediately changed our corporate threat profiles by extending our cyber attack surface and increasing our exposure to all kinds of attacks from authentication to human error. Transitioning to a remote workforce directly and significantly impacts your defensive protections. Practical changes can reduce the risk exposure while also minimize unneeded disruptions and fire drills during this turbulent time. In this webinar, we will discuss important cyber threats to consider and provide actionable advice on how to reduce your risk.
  • Coronavirus Pandemic – Cyber Intelligence Fighting the Virus in Cyberspace Recorded: Mar 23 2020 61 mins
    Alex Holden
    In the midst of the Coronavirus pandemic, our society is struggling to adjust to the necessary and unexpected changes. In the information security space, we are prepared for many things, but dealing with a pandemic crisis leaves many unprepared.

    Cybercriminals operate on a different level and are ahead of the game taking advantage of the global crisis with many others joining their ranks. We will discuss critical issues facing information security during this crisis.

    We will also review what you need to know, what you need to be concerned about, and the steps to take today to get your organization more secure and prepared to minimize the potential impact the crisis.
  • Coronavirus Actions and Risks for Tech and Security Leaders Recorded: Mar 13 2020 62 mins
    Dan Lohrmann (Security Mentor, Inc.) | Scott Larsen (Inova Health System) | Earl Duby (Lear Corporation)
    How are state and local governments responding to COVID-19? What are private sector companies doing now? From public health actions to directives for staff, what emergency response steps and risks should be considered?

    Join this webinar for the latest coronavirus playbook roundup and recommendations on how to address the outbreak. Learn the scope of the unprecedented challenges organizations are currently facing. Hear from industry leaders on how they are addressing the COVID-19 outbreak.

    Topics will include:
    - Policy, technology and process steps to take today to protect your workforce and organization.
    - How are orgs dealing with more staff working from home (telework)?
    - What mistakes can be avoided –and how?

    We will close with a Q/A session with the audience.

    Speakers:
    - Dan Lohrmann, Chief Security Officer & Chief Strategist at Security Mentor Inc.
    - Scott Larsen, CISO at Inova Health System
    - Earl Duby, CISO at Lear Corporation
  • How to Limit Damage from Cyber Attacks with BCDR & SDS Recorded: Jun 7 2018 21 mins
    Garry Carpenter
    Join us for this 45 minute webinar on 7th June at 10am UK that will ensure that your Business is Seamlessly Up and Running in Minutes. Understand how Ultimate Damage Limitation for Cyber-Attacks is Achieved through Business Continuity within Software-Defined Storage.

    Reasons to attend:

    Severity of cyber-attacks are judged by the length of time critical systems, data and applications are down. The ability to have a Business Continuity and Disaster Recovery enabled infrastructure mitigates the risk, offering zero downtime, zero Recovery Point Objective, and seamless rollback in time to the point before the attack hits.

    Joining the webinar equips you with 3 essential skills for damage limitation:

    Learn how to:

    * Implement multi layered protection that offers
    * Achieve additional resiliency with disaster recovery to the Cloud and 3rd Site
    * Rollback to the point immediately before the attack

    Your host for the meeting, Garry Carpenter has immersed himself in all things business continuity for the past few decades and is one of the leading UK authorities in the field.
  • What’s Next in Storage: Analysts and Experts Share their Predictions Recorded: May 2 2018 43 mins
    Greg McSorley, SNIA Technical Council (non-voting); Rick Kutcipal, President, STA; Don Jeanette of TRENDFOCUS
    You won’t want to miss the opportunity to hear leading data storage experts provide their insights on prominent technologies that are shaping the market. With the exponential rise in demand for high capacity and secured storage systems, it’s critical to understand the key factors influencing adoption and where the highest growth is expected. From SSDs and HDDs to storage interfaces and NAND devices, get the latest information you need to shape key strategic directions and remain competitive.
  • FCIP (Extension): Data Protection and Business Continuity Recorded: Dec 7 2017 59 mins
    Rupin Mohan, Director R&D, SAN Chief Technologist, HPE, Mark Detrick, Director, Extension Principal Architect, Brocade
    Businesses today rely heavily on their data. Disaster may strike anywhere and occurs in many shapes and sizes. Transporting data over significant distance beyond the reach of a threatening event preserves data so organizations can rapidly recover in the event of a site going down.

    This makes deploying a disaster recovery infrastructure between data centers with fast, continuous, and easy replication of mission-critical data to anywhere in the world essential.
    Fibre Channel over IP (FCIP), often referred to as “Extension,” is used to connect SANs across distance using IP networks. FCIP is commonly used for Remote Data Replication (RDR) between Enterprise Storage Arrays and Remote Tape applications, for the purpose of Business Continuance via Disaster Recovery (BC/DR).

    Join storage technology and industry experts as they discuss their experience and deployment knowledge in:

    •Best known methods for deployment with extension architectures, extension in routed topologies, and performance optimization for remote replication
    •Industry best practices: topologies to achieve high-availability goals, advantages in trunking, encryption, etc…
    •Customer examples and use cases of a variety of critical production environments ranging from SMBs to the largest most demanding enterprises and government institutions

    After you watch the webcast, check out our Q&A blog: http://fibrechannel.org/fcip-extension-questions-and-their-answers/
  • Cyber Threats and Disaster Recovery after Hurricane Harvey Recorded: Sep 12 2017 58 mins
    Joseph George (Sungard Availability Services), Mark Weatherford (vArmour), Inigo Merino (Cienaga Systems)
    The devastating impact of Hurricanes Harvey and Irma across Texas and Florida will continue to live long after the waters have receded. How are enterprises, small businesses, government agencies and non-profit organizations prepared for the disruption caused by Harvey and Irma?

    If anything, these hurricanes are a stark reminder that all organizations need to have a disaster preparedness and business continuity plans in place to help with recovery from major natural catastrophes.

    Join this interactive panel as we discuss:
    - The aftermath of Hurricanes Harvey and Irma
    - Impact on cybersecurity and how to avoid falling for a Harvey or Irma cyber scam
    - Need for business continuity and disaster recovery planning
    - Recommendations for crafting the right BCDR strategy and enabling recovery following a disaster

    Speakers:
    - Joseph George, Vice President Product Management at Sungard Availability Services
    - Mark Weatherford, Chief Cybersecurity Strategist at vArmour
    - Inigo Merino, Founder & CEO at Cienaga Systems
  • Cyber Defense Through Fault-Tolerant Security Architecture Recorded: Nov 23 2016 28 mins
    James Chillingworth, Founder of The Consulting Practice
    Is your security architecture up to date and able to defend against the latest cyber attacks? Every technology vendor will likely tell you that they have the most solid infrastructure, and that their roadmap is the one to follow. You may want to consider a fault-tolerant approach with security, as it can be more comprehensive than selecting one particular vendor for a specific requirement.

    Fault-Tolerance means that you assume that a particular solution will fail, but are theoretically protected as another solution can be there if this failure happens.

    Join this presentation and learn how fault tolerance can be deployed against breach scenarios and how it helps improve cybersecurity in 2017.
  • Don't Be the Next Big Headline - Proactive Steps and BCDR Planning Recorded: Nov 18 2016 40 mins
    Brenda Piazza, Director of Cybersecurity Management at CBIZ MHM, LLC
    In light of recent data breaches and the increasing cost of a breach, it is clear why good IT and cybersecurity management is key to your business, especially when it comes to Business Continuity and Disaster Recovery planning. Join this presentation and learn about the human error in breaches, as well as what managers should know about their IT environment. Learn the steps you need to take today to ensure the right BCDR plans are in place before a disaster strikes.
  • Virtualization: The Key to Approachable Disaster Recovery Recorded: Oct 19 2016 58 mins
    Jim Hannan, Principal Architect & Chris Vacanti, Senior Consultant, House of Brick Technologies
    Come prepared to look at disaster recovery planning with a 360 degree view for the enterprise and SMB space, and walk away with technical ideas you can begin to implement immediately. During this presentation, we will discuss disaster recovery planning considerations and partnerships. We will also walk through technical solutions that provide a way to use virtualization and storage strategies for an approachable DR solution.
  • Protect Your Applications and Data with Fault Tolerant Software Recorded: Aug 18 2016 27 mins
    James Chillingworth, Founder (CEO), The Consulting Practice Inc.
    Learn how your organization can achieve better data protection through leveraging fault-tolerant technology. Cybersecurity expert James Chillingworth will review how applying hardware architecture concepts, in addition to other abstractions can form the framework for developing software that becomes more robust, reliable, expandable and secure. By implementing this, organizations can better protect their applications, data, databases, and improve security, operability, code quality and redundancy.
  • Ransomware Realities for Healthcare: Cloud Backup and Security Answers Recorded: Aug 18 2016 49 mins
    Tim Vogel, Co-Founder and CEO, Xtium & Kevin Lancaster, CEO ID Agent
    With the healthcare industry experiencing a dramatic increase in the volume of successful ransomware attacks, it is critical that organizations upgrade their security policies and approach.

    This means understanding the evolving cyberattack landscape and developing effective strategies to protect the integrity of systems, applications, and data. A critical aspect of that strategy is proactively identifying employee email credentials that have been compromised. In our 2016 benchmark study of healthcare firms, Xtium and ID Agent recently found that 65% of firms analyzed have employees with visibly compromised accounts. These findings illustrate the need for ongoing monitoring as well as 100% reliable and responsive business continuity solutions.

    The urgency stems from the fact that stolen health records are worth more than 10 times the value of stolen credit card numbers. The FBI recommends combating these cyber-threats by establishing a solid business continuity plan which includes the regular creation of secure, isolated data backups. 

    This presentation will a) explore the common misperceptions and security holes that can lead to ransomware vulnerability, b) discuss the study results and the measurable ongoing threat represented by compromised email accounts, c) compare the various alternatives for responding to cyberattacks, d) explain the pros and cons of cloud-based security and backup strategies, and e) provide real-world case study examples of how recent ransomware attacks have been quickly and successfully resolved.
  • Redefinition of Business Continuity Strategies using Cloud Native Enterprise Arc Recorded: Aug 18 2016 49 mins
    Frank Stienhans, CTO at Ocean9
    Both production and non-production landscapes are massively effected by the rewritten laws of physics in the cloud.

    One opportunity of Cloud Native Enterprise Architectures is to redefine the approaches to Business Continuity and Disaster Recovery.

    Using SAP workloads on AWS as example we will show how and why enterprises run different than before and how Disaster Recovery needs accelerate all in migrations to the cloud.
  • Monitor with Discipline – Protect Your Data Protocol Recorded: Aug 18 2016 36 mins
    Kong Yang, Head Geek of Virtualization & Cloud Practice, SolarWinds
    Data is the new currency. It is the gold waiting to be mined, the oil waiting to be refined, and the resource waiting to be taken for ransom or stolen for its intellectual property. Wait, that last piece didn’t rhyme. And that lack of rhythm and rhyme is why data recovery is evolving from naturally occurring events i.e. system failures and natural disasters to unleashed beasts such as social-engineered phishing attacks and schemes designed to take your data hostage.
    In this session, we’ll discuss how to monitor with discipline in order to protect your data protocol with effective and efficient process management.
    · What is monitoring with discipline?
    · How do I optimize my backup and recovery process?
    · How can I extend my current data recovery protocol to encompass ransomware protection?
  • Aligning IT Disaster Recovery with Business Requirements Recorded: Aug 17 2016 42 mins
    Dustin Mackie, Managing Consultant at Avalution Consulting
    Although most organizations have been performing elements of IT disaster recovery for years to decades, it’s still common for organizations to struggle to ensure alignment between IT capabilities and business application recovery needs. Even if IT exercises run flawlessly and meet planned recovery capabilities, there often remains gaps between the business requests and IT committed capabilities. This can inhibit organizations from having effective (yet reasonable) strategies in place that meet all stakeholder expectations.

    This presentation will explore potential methods organizations can execute to help all groups in the disaster recovery process understand each other’s intent, priorities, dependencies, needs, and considerations, as well as the impacts of system downtime. These methods seek to truly synchronize business continuity and IT disaster recovery by enabling ongoing discussion, understanding and insight, continued coordination, and communication. Taking such measures will ensure an effective IT disaster recovery program that meets the expectations of all stakeholders.
  • Data Protection in the Era of Hyperconvergence Recorded: Aug 17 2016 61 mins
    Jim Whalen, Taneja Group; Patrick Rogers, Cohesity; Jesse St Laurent, SimpliVity; Joe Noonan, Unitrends; Rick Vanover, Veeam
    Hyperconvergence is a rapidly growing and evolving force in the IT infrastructure space. Emerging from the factory pre-configured racking programs of the big IT equipment suppliers, it quickly morphed into a variety of VM-centric architectures where compute, storage and networking (and more) are all integrated below the hypervisor and provide a unified platform to run virtual workloads on. The questions surrounding Data Protection are many: Is a DP mechanism even needed in a distributed cluster architecture that hyperconverged platforms typically drive? What’s the role of traditional backup software and appliances? Is physical server backup still important? What’s the optimum solution for backing up a hyperconverged platform? Is there an optimum solution?

    In this presentation, some of today’s leading vendors will give their take on what the intersection of Hyperconvergence and Data Protection means for the end user.

    PANELISTS:
    * Cohesity - Patrick Rogers, VP Marketing & Product Management
    * SimpliVity - Jesse St Laurent, VP of Product Strategy
    * Unitrends - Joe Noonan, Director, Software Product Management
    * Veeam - Rick Vanover, Director of Technical Product Marketing
  • Database Backup and Recovery Best Practices Recorded: Aug 10 2016 31 mins
    Manjot Singh, Data & Infrastructure Architect at Percona
    In the case of a failure, do you know how long it will take to restore your database? Do you know how old the backup will be? In this presentation, we will cover the basics of best practices for backup, restoration and business continuity. Don’t put your company on the line due to bad data retention and backup policies.
Tactical solutions to help with your BCDR strategy
With the unexpected nature of natural disasters, global pandemics and other disruptive events, preparation is key when it comes to disaster recovery and business continuity processes. Join this channel for live and recorded presentations featuring thought leaders in the field discussing current topics that will help you with tactical solutions to all your BC/DR issues.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cyber Defense Through Fault-Tolerant Security Architecture
  • Live at: Nov 23 2016 6:00 pm
  • Presented by: James Chillingworth, Founder of The Consulting Practice
  • From:
Your email has been sent.
or close