Neverfail Business Continuity
Business Continuity Made Simple Read More
Business Continuity Made Simple Read More
This past week we saw the emergence of a worm-based ransomware attack in wannacry that showed us how damaging these attacks can be to critical services society relies on. This presentation will cover the recent wannacry attacks and what we have learned from them. In addition, we'll discuss the evolution of ransomware in recent years, focusing on attacks targeted against enterprises and so-called "high-interaction" ransomware attacks. Attendees will also be given a path forward of protecting their institution. A discussion of the renewal of Business Continuity and Disaster Recovery as a result and what this means for fintech going forward. About the Presenter: John Bambenek is Manager of Threat Intelligence Systems at Fidelis Cybersecurity and an incident handler with the Internet Storm Center. He is also a faculty member of the Department of Computer Science at the University of Illinois where he teaches courses in cybersecurity. He has been researching security threats and criminal organizations for 17 years and coordinating with US and foreign law enforcement entities to help bring criminal actors to justice. Read More
Interview in partnership with BrightTALK, The Stack and Cloud Industry Forum ---------- In this interview, Sandra Bell, Head of BC & ISDG Consulting (Europe), Sungard, will share with us how tech innovations impact the moderb BCDR strategies. Topics up for discussion: - Innovations in the cloud and BCDR - Critical things to know when creating a BCDR strategy - Latest trends in disaster recovery - Business continuity and digital transformation - Technology recovery solutions and local resilience strategies - And others About the Speaker: Sandra is a seasoned risk and business continuity professional with over 25 years’ experience of the design and management of strategic, business friendly risk, continuity and security solutions in public and private sectors. Experience ranges from: the management of risk and the protection of data within the UK’s main business process outsourcer to the financial and government sectors; to the protection of the largest part of the UK’s critical national infrastructure. Read More
Ransomware. Politically-motivated hacking. Distributed denial-of-service – and now mega-DDoS attacks targeting the foundations of the Internet, thanks to vulnerabilities in the burgeoning Internet of Things. 2016 has been a landmark year for information security in many ways. What can we expect in 2017? In this webinar, Scott Crawford, Research Director for Information Security with 451 Research, and Rodney Joffe with Neustar will examine these trends and highlight key tactics to better prepare you for what the coming year may bring. We’ll explore: Key factors in today’s security landscape that shape our future defense strategies: •Many attacks are about money today, what will they be about tomorrow? •Without DNS, there’s no Internet as we know it. Recent attacks against DNS have set new records for scale and taken down some of the Internet’s biggest names. What’s your strategy for assuring that DNS doesn’t fail your business? •The hidden agenda of attackers who use these techniques as a means to a more serious end •Tactics for strengthening your resilience, to better prepare you for the coming year – and beyond Has your security strategy responded to these factors – and is it ready to take the hit from what may come next? Join us to learn more about what your organization can do to be better prepared for these too-often hidden aspects of highly visible threats. Read More
The answer is BCDR and Cloud Backup, however what was the question? Besides how to protect preserve and secure your data, applications along with data Infrastructures against various threat risk issues, what are some other common questions? For example how to modernize, rethink, re-architect, use new and old things in new ways, these and other topics, techniques, trends, tools have common theme of BCDR and Cloud Backup. Join us in this discussion exploring your options for protecting data, applications and your data Infrastructures spanning legacy, software-defined virtual and cloud environments. Topics include: - Data Infrastructures exist to support applications and their underlying resource needs - Various cloud storage options to meet different application PACE needs - Do clouds need to be backed-up or protected? - How to leverage clouds for various data protection objectives - When, where, why and how to use different scenarios Read More