Webinars

Webinars

  • How Princeton U Addresses Risk and Compliance Through Proactive Measures

    Addressing security, risk and compliance in higher education is like securing a small city. How can the security office stay on top of both emerging technologies and compliance needs in an environment of decentralization, openness and academic freedom? Meeting the needs of the community and adding value in advance makes all the difference in the world. In this webinar, viewers will learn: • Princeton’s “zero to 60” moment in establishing security culture; • How a weekly gathering to assess new technologies has increased security and reduced risk to the university; • The origin, current framework, and future of this successful program. Read More

  • ESG: A Landscape of Change

    The world around us is changing rapidly. Change is coming from all directions, and it's not just about the climate. Multiple trends and megatrends are converging: from changing core technologies to shifting values of society, demographics, and even the geopolitical landscape. In this short presentation, Chris Marshall, Head of Investment Strategy at Dragon Investment Managers, looks at Asset allocation considerations in this new global regime. Why is this so important? Previous asset allocations are based on investment return expectations in a world that runs on fossil fuels. In the world we’re moving toward, do these still hold? Read More

  • Pragmatic Risk-Based Cyber Security

    Our cyber enemies are sophisticated and strategic with clear objectives and lots of resources. To counter their attacks, we need a pragmatic approach to threat and risk analysis to feed our cyber security ecosystem and focus on protecting our most important assets. This session aims to answer these questions: • How can we make cyber security decisions based on threats and risks if we’re not risk experts? • How can we determine who wants to access our information assets and why? • How do we discover what our valuable information assets are, and where they are located? • How do we prioritise our defences, ensuring that our resources are focused to the best effect? Read More

  • The Next-generation, Simple, Smart, And Reliable “Low Carbon” Data Center

    1) New Challenges for Data Center: Cloud, AI, 5G and etc drive the rapid development of DC; TTM, O&M, high Cost, reliability become the challenges 2) Nest-Generation DC: Simple, Green, Smart, and Reliable 3) +AI, Huawei Builds Next-Generation Smart Data Centers 4) iPower Predictive Maintenance, Ensuring Facility Safety, iCooling@AI: Reduces System-level Energy Efficiency Management PUE by 8%-15% 5) Simple Design, Green construction: Modular, Prefabricated, On-demand Construction, And Flexible Expansion From Component-Level To Solution-Level To DC-Level Read More

  • The Need for a New Cloud Operating Model

    Today's businesses have embraced cloud computing, migrating workloads, adopting SaaS applications, implementing DevOps initiatives and facilitating hybrid work. Cloud growth is expected to continue as businesses turn from pandemic survival mode to a more holistic approach. According Gartner, global spending on cloud services is predicted to reach more than $482 billion in 2022, up from $313 billion in 2020. How can organizations shift from a jumble of cloud applications to a methodology that takes advantage of cloud's full potential. Our panel of experts explores the next iteration of cloud and the steps IT and business leaders must take to achieve true business differentiation through cloud computing by enabling new services, products and business models. Join us to learn: --How to identify areas of cloud opportunity and create a holistic plan --How cloud integration can advance corporate initiatives like sustainability and diversity --Why business executives are crucial to cloud success --The benefits of launching a cloud center of expertise --How to start with a pilot program and grow Read More

  • How to Ensure Operational Governance for Microsoft 365

    Microsoft 365 is revolutionising the way companies across the globe are communicating and collaborating. But how can you prevent content sprawl, and ensure the right permissions and privacy settings are in place when most admin controls are out of your hands? Join this interactive session and learn practical strategies for: - Microsoft 365 provisioning - Establishing operational governance - Ensuring information lifecycle management Read More

  • Designed, Not Assembled: the critical role of end-to-end systems in hybrid-cloud

    According to IDC* the majority (over 80%) of enterprises in Asia/Pacific are operating in a hybrid and/or multi-cloud environment, with a mix of private and public infrastructures. Half of these organizations require workloads and data interoperability between the different types of cloud. Most of the interoperability happens with private cloud, which aligns with the preference for a public cloud stack on private cloud infrastructure solutions (local cloud as a service) for ease of management and workload portability. End-to-end infrastructure systems that are purposefully designed to seamlessly support this interoperability are critical for enterprise success. What are the implications for the APAC enterprise when it comes to making decisions about future-proofing your data infrastructure? And, what decisions do you need to make today to ensure an agile, scalable and flexible future for your organisation? Join SoftIron + and Servers Australia in this webinar to: - Discover the driving forces that are shaping hybrid-cloud infrastructure developments in APAC - Learn more about the critical role of platforms optimised for open-source software in software-defined storage strategy. - Hear from Australian cloud service provider, Servers Australia and how they are enabling new service delivery opportunities by consolidating multiple services using SoftIron’s HyperDrive scalable and flexible architecture. - Servers Australia are a locally grown and operated hosting provider located on the NSW Central Coast. Founded in 2006, their original mission was to combat the lack of quality in the local web hosting market and solve the many challenges of businesses around IaaS and DRaaS. Fast forward 14 years later, their business has grown substantially but their focus still remains on our customers, offering hosting solutions that solve real business challenges. *2020 Cloud Pulse 2020 Survey. Read More

  • Hybrid Cloud and Its Associated Risks

    As businesses are developing rapidly, many cloud consumers find that a single public/private cloud or traditional on-premises data center no longer meets service requirements. Hybrid clouds, especially, are gaining more traction as cloud customers increasingly understand that using public clouds or private clouds alone poses certain limitations. Hybrid cloud is often the starting point for organizations to get started on the cloud journey. However, hybrid clouds pose different risks and thus introduce a different set of challenges to security. This presentation will: - Provide the overview of hybrid cloud. - Demonstrate risks of using the hybrid cloud. - Threats and vulnerabilities. - Hybrid cloud use cases. Read More

  • Emerging Trend: Will Cloud Providers Also Become Managed Service Providers?

    We are typically accustomed to buying cloud subscriptions from a cloud service provider (CSP) and managed services from a managed services provider (MSP). With the increased offerings from CSPs, these lines are now increasingly blurring. Which cloud services still need managed services? Cloud service providers like AWS are now starting to provide their own managed services. With so many options available to customers what should they focus on? What is hype? What is reality? Where do we go from here? Read More

  • Identity as the Foundation for Access

    Data and resource accessibility has come a long way. From private networks to enabling connectivity across the internet to outsourcing them in the cloud. One thing that hasn’t changed is the need to track who is using our resources and viewing our data. The concept of identity has remained one of the cornerstones of security. The ability to identify and control access to cloud-hosted offerings has increased the need for tight security measures that are only effective if we understand “who, what and where”. In this session we’ll • Outline typical cloud-hosted capabilities; • Identify their user groups and roles; • Look at identity components that are applicable to cloud services; and • Introduce the concept of outsourcing Identity Management as a Service (IDaaS). Read More