INTERFACE-Seattle

INTERFACE-Seattle

From December 12, 2024 until December 12, 2024

By Seattle - Washington State Convention Center, Washington, Feriene Steaten

Pleatst troch Canton Fair Net

[e-post beskerme]

https://f2fevents.com/event/sea21/

Kategoryen: IT en technology, Kompjûter en gadgets

Tags: kompjûter, Gadgets

Hits: 7052


INTERFACE Seattle | 9 desimber 2021

Mear dan 20 jier fan nijsgjirrige konferinsjes. Lokale IT Community Educational Events. INTERFACE Seattle Virtual 2021 / Oant takom jier. KEYNOTE:1 CPE: Lessen om te dielen: in hantlieding fan in ekspert foar ransomware-sanearringBrian Miller, mei-oprjochter en haadbestjoerder fan FusionTek. [1 CPE] Zero-Trust Architectures. [1 CPE] Wolkenarsjitektuer nei links ferskowe - Bêste praktiken foar it befeiligjen fan wolk-ynset.

IT-ynfrastruktuer feroaret altyd en bringt nije útdagings. It is hast ûnmooglik om op 'e hichte te bliuwen fan 'e lêste ûntjouwings, fan ransomware oant de lêste feiligensbedrigingen en AI oant it tanimmende ferlet fan bânbreedte en opslach. Dizze konferinsje is ûntwurpen om te helpen. Us konferinsje is ûntworpen om te helpen.

Jo sille in breed oanbod fan presintaasjes, panieldiskusjes en eksposanten fine, oer ûnderwerpen lykas ynformaasjefeiligens, Ynfrastruktuerwolk, Disaster Recovery en Communications. Se sille ek de lêste ynnovaasjes en praktiken dekke.

December 9th 20218:30am - 4:30pm.

Firtuele konferinsjeSeminars mei meardere spoaren en Q&AChatting en netwurkjen mei ien-op-ienPrize-tekeningen elk oere.

Brian Miller, mei-oprjochter en Chief Executive Officer fan FusionTek.

9:00 - 9'50 AM[1 CPE] Architectures Zero-TrustRubrik presents: Organizations have made significant investments in IT security. They are trying to strengthen their perimeter, endpoint and network protections, as well as application protections. Hackers are able to penetrate these defenses, and target enterprise data including backup data. Ransomware has started to target online backups, encrypting them or deleting. How would you know if your organization had been the victim of an attack? The time required to manually compare each snapshot and sort through millions of documents is a significant amount, and can significantly delay recovery. The entire environment being restored in bulk could result in high data loss, and even weeks of work wasted. We will be discussing how to protect the last line of defence, your backups, in this session. We will go through the anatomy of recovery, best practices and advanced tools, to ensure that you won't have to pay ransom and to recover your data quickly to continue business operations.Information Security.