[1 CPE] Data Security: Challenge Met Through Immutable Storage

  Presented by Isaac Story, Data Intelligence Sales Specialist • Hitachi Vantara

In a world with increasingly complex attacks being carried out on enterprise data assets, immutable storage is becoming a powerful defense against data breaches and Ransomware. Learn how customers are using this age-old technology that has come of age with more adaptable access options and increasing application integrations.

Isaac Story is a Data Intelligence Specialist with Hitachi Vantara. He has over 23 years of experience in IT infrastructure with a specific focus on advanced and emerging storage technologies including object storage and high-speed parallel file systems.

[1 CPE] Modernizing Your DR Strategy

  Presented by Scott Hetrick, Pre-Sales SE Manager NAM • Quest Software

Creating a DR plan is a must. Understanding where to begin and where you want to be can offer challenges. We must start at the beginning which entails bringing in all stakeholders and understanding the Data. Many times, it’s obvious that there are power failures, server failures, DB failures etc. However, we must understand the value of the data in each department. During this presentation, we’ll focus on how to create a DR plan with the Data being centric. By looking at things from this perspective you’ll better understand the value of the data which will allow you to create a DR plan that incorporates immutability and storage.

[1 CPE] Data Backup Best Practice for SMEs

  Presented by Jane Garrity, Director Channels, North America • Macrium Software

Data is one of the most valuable resources in the world, so doesn’t it make sense to keep such an important asset safe? In the same way that businesses insure physical assets and employees, backup protects data. As life is unpredictable and people can make mistakes, whether a natural disaster, hardware failure, or an employee accidentally infecting your network with a nasty virus, having current backups gives you peace of mind. In this session, we will review the proactive approach to data loss.

We will provide a broad yet critical overview of data protection, which will require us to discuss how data is imperative to business operations. We’ll cover the everyday risks to your business’s data, the consequences of data loss, and the significance of developing a data backup plan. We approach topics like understanding your business needs, analyzing the data backup types and methods, and knowing how to equip your teams for data backup and recovery best practices. As a trustworthy and reliable leader in backup software protection, Macrium Software is delighted and compelled to explore backup that can scale to meet the needs of your business.

[1 CPE] Email Archiving and Security Compliance

  Presented by BlackPoint IT Services

In today’s data-driven world, email has become an indispensable tool for communication and collaboration. However, the sheer volume and sensitivity of email data pose significant challenges for organizations seeking to ensure data integrity, maintain compliance, and safeguard against cyber threats. In this presentation, we will delve into the intricacies of email archiving and security compliance, providing you with a comprehensive understanding of the essential principles and practical strategies for effective email management.

[1 CPE] How to Prepare and Respond to Data-Oriented Cyberattacks in Realtime

  Presented by Jonathan Halstuch, Co-Founder and CTO • RackTop Systems with SD3IT

Today’s cyber threats call for a new approach to data security, placing protections closer to the data. In this session, you’ll develop an understanding of why advanced cyber storage solutions are critical for defending production data from theft and destructive cyberattacks like ransomware. Learn strategies for reducing your organization’s threat window with a data-centric zero-trust architecture and artificial intelligence. Improve security and cyber hygiene while embracing the CISA Zero Trust Maturity Model to ensure your organization’s data is defended during each of the three phases of an attack.

Key takeaways:

  • Stay ahead of insider threats, data theft, ransomware, and extortionware with active defense
  • Improve security and cyber hygiene by aligning with the CISA Zero Trust Maturity Model
  • How to involve stakeholders in a data-centric approach to security

[1 CPE] APEX Platform for Multi-Cloud and Edge

  Presented by Adam Smolka, Sr Director, Product and Solutions Sales Specialist • Dell Technologies

IT organizations everywhere face increasingly complex siloed multi-cloud ecosystems, with pressure to move more quickly and improve efficiency in the face of skills gaps and economic headwinds. The Dell APEX portfolio addresses these challenges through a multi-cloud by-design approach that optimizes public cloud operations and brings the agility of the cloud operating model to any IT environment, offering greater control over applications and data.

Dell APEX Cloud Platforms provide an on-premises private cloud environment with consistent full-stack integration for the most widely deployed cloud ecosystem software including Microsoft Azure, Red Hat OpenShift, and VMware vSphere. They can be configured to connect to the corresponding public cloud implementation of their respective ecosystems. This provides easy access to multiple deployment options with the security, flexibility, efficiency, and control of an on-premises location, freeing IT to focus on their applications and data rather than infrastructure.

[1 CPE] Cybersecurity Trends for 2023

  Presented by Jeff Simpson, Sr Sales Executive, Cybersecurity Solutions • AT&T Alaska

With Cybersecurity compliance mandates increasing, and attacks on vulnerable supply chains and endpoints on the rise, it has never been more important to assess and take proactive measures to secure your network. This presentation pulls together information from many different analysts and digests their views on which Cybersecurity priorities your organization may face this year, along with the top eight cybersecurity trends for 2023, such as Supply Chain Resilience, Security Architecture Modernization and Data-Centric Transformation.

[1 CPE] Dark Web Monitoring: It’s time for an Offensive Strategy!

  Presented by Jeff Simpson, Sr Sales Executive, Cybersecurity Solutions • AT&T Alaska

Many organizations discover a cybersecurity breach many months later, too late for any substantial mitigation. With the average cost of breaches in the US at $9.4M, (without including ransom paid), it is advisable for organizations to take a more offensive stance. What if there was a way to detect compromised corporate credentials well before they were used to cause widespread fraud? Dark Web Monitoring goes where cybercriminals traffic stolen emails, usernames, and passwords, and can alert an organization if personal or corporate user information shows up in the Darknet layers. Learn how using a tool like this can help protect an organization’s employees, consumers, and vendors, as well as its reputation.