This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Earlier this month, the NFPA jointly presented an informational webinar with the Saudi Arabian High Commission for Industrial Security (HCIS) on new license renewal requirements that went into effect last month.
This blog post was co-authored by Paul Carley, Senior Product Marketing Manager, Citrix Virtual Apps and Desktops. Last month, Paul Carley … The post The top 10 FAQs from our Citrix Virtual Apps and Desktops webinar first appeared on Citrix Blogs.
11, 2025, the Security Industry Association (SIA) Standards Committee hosted a webinar on the state of security industry standards. Read more highlights from the State of Industry Standards webinar and watch the video here.
In my spare time, I co-author practices in IT supplier management (SIAM) and a digital ITSM (VeriSM), speak at conferences and webinars, facilitate discussions in organizations on technology and enjoy waling the UK with my wife and dog. Links: Email. Linkedin.
This blog post was co-authored by Paul Carley, Senior Product Marketing Manager, Citrix Virtual Apps and Desktops. Last month, Paul Carley … The post The top 10 FAQs from our Citrix Virtual Apps and Desktops webinar first appeared on Citrix Blogs.
I authored this blog post about our experience with hurricanes and how best to respond. We will also host a webinar specific to Hurricane Fiona. As you explore how to respond, I want to make sure you have these resources at your fingertips: CDP has launched this disaster profile , updated with new information as available.
Part of it is making an appropriate investment, but part of it is also recognizing that we were capturing a lot of information before, but we were using only a fraction of it,” explained Rob Galbraith, author of The End of Insurance As We Know It during our recent webinar titled 2021 Commercial lines Underwriting Priorities and Trends. “
VMware Technology Alliance Program & Pure Storage: Powering Modern Data Experiences, Together by Pure Storage Blog This blog on the partnership between VMware and Pure Storage was co-authored by both Sifiso Ngwenya and Elizabeth Bagnas. Are you ready to experience the power of VMware and Pure working together?
White Paper, 7 pages Perfecting Cyber Resilience: The CISO Blueprint for Success Read the Report Written By: Roger Boss A Team Sport Learn how IT and security teams can join forces to minimize cyber vulnerabilities and avoid attacks.
In a Pure webinar last year, “ How the Right Storage Can Improve SIEM Operations ,” the panelists talked about the particular storage needs of SIEM systems. They make storage administration and scaling storage capacity easier and more cost-effective. Visibility Relies on Storage Capabilities We agree with IDC.
Webinar Details : Tuesday, January 30th 2024 Time : 1:00 - 2:00 pm Register today! Join us for a concise webinar where we'll share actionable insights to enhance your cybersecurity resilience: Employee Training: Educate staff on identifying and mitigating common cybersecurity risks.
We provide market-leading coverage and a diverse content offering that includes industry alerts, feature articles, contributed guest posts, webinars, research and infographics. What is something we might not know about your company – or something new you are doing in security?
Our Coffee Break series featured talks on the Impact of DevSecOps and conversations with experts like former Black Hat Hector “Sabu” Monsegur to explore the current cybersecurity landscape and his recommendations for building a resilient architecture.
All of this creates an environment where fires can start, so it’s critical for building owners, construction companies, and authorities having jurisdiction to ensure proper safety plans and procedures are in place for any project.” pic.twitter.com/XP3zHcjsOP — Charlotte Fire Dept.
In addition to immutability and air gapping, this includes protections like multi-factor authentication, role-based access control, principles of least privilege, and dual-authorization to prevent potential bad actors from compromising data internally. Watch the dedicated webinar to learn more. Zerto Virtual Manager Appliance 6.
In addition, we offer free webinars as well as in-person training through our Snap One Partner Stores. The views and opinions expressed in guest posts and/or profiles are those of the authors or sources and do not necessarily reflect the official policy or position of the Security Industry Association.
The views and opinions expressed in guest posts and/or profiles are those of the authors or sources and do not necessarily reflect the official policy or position of the Security Industry Association. What is something we might not know about your company – or something new you are doing in security?
Kanguru and Cigent Launch Self-Encrypting, Secure SSD Storage The Kanguru Defender SED300 Secure SSDs, powered by Cigent, have advanced security capabilities built into the firmware to ensure only authorized users and processes have access to data. 2 2280 NVMe and external USB storage, and are available in 512GB, 1TB, and 2TB capacities.
Beyond this, he authored his own guide on safe involuntary termination strategies. He has presented on multiple SIA webinars and delivered expert presentations during two of SIA’s Vertical Insights Symposium Series events. Ahrens is an active member of SIA’s Public Safety Working Group and AI, Drones and Robotics Working Group.
We continue to combat these challenges head on with monthly webinars, regular online content and new features. The views and opinions expressed in guest posts and/or profiles are those of the authors or sources and do not necessarily reflect the official policy or position of the Security Industry Association.
Of course, the opportunity to share our story and solution through SIA sponsored webinars, events, articles and other mediums allows us to leverage the strength and credibility of the SIA organization overall. We participate in SIA webinars and virtual events. How does your organization engage with SIA?
This blog post was co-authored by Allen Furmanski, Principal Product Marketing Manager for Citrix DaaS. There has been no shortage of updates in the world of Citrix DaaS and Citrix Virtual Apps and Desktops. At the end of March, … The post What’s new and next with Citrix Virtual Apps and Desktops: Q&A first appeared on Citrix Blogs.
Author: Tech Field Day. Author: Rubrik. Author: ActualTech Media. Description: In this first part of a five-part webinar series, Rubrik shares an overview of five critical best practices you need to consider in 2021 as you evolve your data protection strategy. The Best Rubrik Tutorials on YouTube.
One highlight was a session on mastering the art of influencing without authority from Kelly DeLeo, director of service and solutions at Axis Communications, and Colin DePree, sales strategy at Salto Systems. What is influence? “No How do we cultivate our power? How do we cultivate our power?
This database represents the first up-to-date published resource with a collation of emission factors for a broad variety of species to the best knowledge of the authors. The findings from this study were presented through FPRF 2022 webinar series on May 18, 2022. The webinar recording is available on-demand here.
A long-term funding and capacity building framework is still needed to support First Nations and local authorities in meeting the new EDMA requirements. and virtual (website and social, webinars, public surveys, etc.), that facilitate sustained, continuous engagement and collaboration. The team at CCEM can help.
Common Challenges with Identifying Your Critical Business Functions In a recent webinar of ours, 36% of attendees reported that the biggest roadblock that they’ve faced with their DORA program has been siloed information across teams and departments. The solution here is to realign across teams to adopt a view that is business-function first.
We are doing this though a series of outlets, including our newly launched blog on our website, a new CEU course entitled “Protecting People and Property: Fortifying Building Safety with Ballistic, Blast, Storm Impact & Forced Entry Solutions,” partnerships with industry publications, white papers, webinars and more.
Operational Resilience Regulations issued by the UK Financial Conduct Authority and the Prudential Regulatory Authority , effective March 31, 2022, set requirements for financial and investment firms to maintain a level of service to clients in the event of an incident.
I plan to leverage SIA platforms such as networking events, speaking opportunities and webinars to further expand awareness of SecureBI, and I hope to supplement SIA educational offerings with new and valuable content.
Be sure to register for the launch webinar on Thursday, March 30th to learn more about the latest release from the PagerDuty Operations Cloud. The new architecture now allows job authors to develop automated jobs that incorporate multiple environments.
Today SIA provides new information that clarifies recent reports about the authorized use of government grant funds to replace equipment covered by Section 889 and potential use of federal grant funds for this purpose (i. Grant program announcements and related webinars, training, etc.
The other event is that Castellan have launched their new single business continuity software package, and so I have been listening to a number of webinars which talk about the software and operational resilience. I watched the Castellan webinars, “Why all the fuss about operational resilience”, here.
The other event is that Castellan have launched their new single business continuity software package, and so I have been listening to a number of webinars which talk about the software and operational resilience. I watched the Castellan webinars, “Why all the fuss about operational resilience”, here.
As such , there is an increased focus on financial institutions protecting their critical business services against disruption, so it is a logical next step for the supervisory authorities to place the burden on operational resilience on key third parties that support the financial system. . Defining a Critical ICT. Enforcement of the DORA.
Author and business resilience expert Michele Turner talks with us about a framework you can use in your personal life. Michele Turner is an Amazon bestselling author as well as the global senior director – deputy chief continuity and resilience officer at Expedia Group. That being said, how prepared are you for personal disasters?
Author and business resilience expert Michele Turner talks with us about a framework you can use in your personal life. Michele Turner is an Amazon bestselling author as well as the global senior director – deputy chief continuity and resilience officer at Expedia Group. That being said, how prepared are you for personal disasters?
This week Vanessa talks cybersecurity with Mark Sangster, vice president of industry security strategies at eSentire and the author of “No Safe Harbor: The Inside Truth About Cybercrime and How to Protect Your Business.” He is also the author of “No Safe Harbor: The Inside Truth About Cybercrime and How to Protect Your Business.”
This week Vanessa talks cybersecurity with Mark Sangster, vice president of industry security strategies at eSentire and the author of “No Safe Harbor: The Inside Truth About Cybercrime and How to Protect Your Business.” He is also the author of “No Safe Harbor: The Inside Truth About Cybercrime and How to Protect Your Business.”
Are you looking at laws and authorities that your program may be required to follow? Do you have clear lines of authority and succession defined? Disaster Recovery Journal: Register for DRJ’s weekly (Wednesday) webinar series: [link] Register for DRJ Spring 2023: Solutions for a Resilient Tomorrow: [link].
Are you looking at laws and authorities that your program may be required to follow? Do you have clear lines of authority and succession defined? Disaster Recovery Journal: Register for DRJ’s weekly (Wednesday) webinar series: [link] Register for DRJ Spring 2023: Solutions for a Resilient Tomorrow: [link].
Do you have clear lines of authority and succession defined? Disaster Recovery Journal : Register for DRJ’s weekly (Wednesday) webinar series Register for DRJ Fall 2023: Focus on Resiliency Asfalis Advisors : Apply to be a guest on the podcast Download the 5 Step Crisis Strategy Connect with the podcast! Track your implementation.
and co-authored “Adaptive Business Continuity: A New Approach.” and co-authored “Adaptive Business Continuity: A New Approach.” Mark Armour, the senior director of IT governance, risk and compliance at Brink’s Inc., is leading the revolution to change how business continuity is practiced and perceived.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content