Search for tag: "cyberattack"

Designing a Data Protection Solution for Cyber Resilience with a Demonstration - 05242022

To quickly view the demo portion, please click on the upper left hand button within the video (three lines) and click the Demo Chapter, you can quickly jump there. When creating a Cyber…

From  2700070HPT 2700070HPT

DS8K Safeguarded Copy with CSM and GDPS LCP Demo - 05192022

To quickly view the demo portion, please click on the upper left hand button within the video (three lines) and click the Demo Chapter, you can quickly jump there. Protecting your data has…

From  2700070HPT 2700070HPT

Financial Crime Fighters of the 21st centuryThe Fintech Gatekeeper: Valentino Cremona (Co-Founder Amdax) 

New gatekeepers are on the rise, digital currencies are rising in popularity. What is your perspective on the future of AML? How are you innovating in this strict and compliant world of AML?

From  060000DX19 060000DX19

Financial Crime Fighters of the 21st century : Marcus Schulz Global head of change management FC Compliance

In this episode, he will shed a light on his view on the future of compliance and the key focus areas that go hand in hand. But also, how to spread the love for data!

From  060000DX19 060000DX19

Fighting a Cyberattack - IBM Security QRadar XDR Connect (Video 2)

One video in a series of 9 short videos packaged as a Smart Paper on a boutique webpage. See how IBM Security can help.

From  CorpMkt-EiC-JY

Introduction for Maxwell Keyte Interview

A short introduction by Maxwell Keyte, who will invite you to order the book and watch the video.

From  060000DX19 060000DX19

Interview of Marc Elsberg

Interview video with Maxwell Keyte & Dirk Schuite, who interviewed the author of Black Out, Marc Elsberg

From  060000DX19 060000DX19

Ciberresiliencia Cada segundo cuenta

La ciberresiliencia es la capacidad de una organización para mantener sus objetivos principales y su integridad durante un ciberataque y después de él.

From  550004MX5G 550004MX5G

Every Second Counts: Rapid Recovery for Package Delivery

Business disruption due to a cyberattack can have a devastating impact on an organization. For instance, cyber outage at a package delivery company can disrupt operations across its supply chain,…

From  270006HDJ4 270006HDJ4

Five Key Technologies for Recovery from Ransomware and Other Cyberattacks

When it comes to cyberattacks, every second counts. The robustness of your data protection and recovery strategy can determine the survival of your business. Join this session to understand the…

From  310001BB3W 310001BB3W

MITRE ATT&CK Support for Resilient

This video is a demonstration of how you can use Resilient functions to retrieve tactic and technique information from the MITRE ATT&CK(tm) Matrix for Enterprise knowledge base, based on id or…

From  3100004906 3100004906