Webinars

Webinars

  • Back to Basics: Fintech Cybersecurity 101

    With an unprecedented growth in the past few years of companies and applications around the fintech, crypto, insurtech, regtech, proptech spaces, users are now more exposed than ever to having their assets, identities and digital personas to become targets of a new breed of sophisticated global criminals. While the fast pace of innovation around all these digital platforms rejects or openly avoids any notion of centralized regulation, the urge to take new services and solutions to the digital users may be posing a threat to the overall sustainability and credibility of alternate ways of conducting online purchases and financial transactions. Instead of subjecting innovative companies to a closed set of regulations, companies may opt for a set of industry best practices which will allow a self-regulated approach to what is safe for consumers and for an ever-growing digital environment. This presentation will cover the following points to understand how digital services companies can collaborate on cybersecurity best-practices: The incredible growth in fintech and digital services in the world The competing approaches to a safe identity management in the market The state of cyber-crime in 2021 Six basic cybersecurity domains for digital platforms A roadmap for adoption and implementation Read More

  • Compression, Deduplication and Encryption conundrums in Cloud

    Cloud storage footprint is in exabytes and exponentially growing and companies pay billions of dollars to store and retrieve data. In this talk, we will cover some of the space and time optimizations, which have historically been applied to on-premise file storage, and how they would be applied to objects stored in Cloud Deduplication and compression are techniques that have been traditionally used to reduce the amount of storage used by applications. Data encryption is table stakes for any remote storage offering and today, we have client-side and server-side encryption support by Cloud providers. Combining compression, encryption, and deduplication for object stores in Cloud is challenging due to the nature of overwrites and versioning, but the right strategy can save millions for an organization. We will cover some strategies for employing these techniques depending on whether an organization prefers client side or server side encryption, and discuss online and offline deduplication of objects. Companies such as Box, and Netflix, employ a subset of these techniques to reduce their cloud footprint and provide agility in their cloud operations. Read More

  • Data Centers Optimization in Rapid Growing Digital Economy & A Virtualized World

    As our lives and businesses become increasingly digital, demand generated as a result of this digital transformation and virtualization will reveal the importance of Data Centers in the effectiveness and functionality of our world now more than ever. By dramatically increasing density and scale of workloads in Data Centers we subsequently increase the significances of potential physical infrastructure failures. The success of every business is ultimately built on the physical foundation of Data Center Infrastructure, whether that infrastructure is on-premise, off- premise, or hybrid. Optimization of a Data Center should not by any means compromise physical & logical security, data availability, operational scalability, agility, innovation and technology economics among other possible risk. Proactive look at the Data Center Optimization opportunities, Data Center managers can better enable the organizations they serve to succeed in an increasingly tech-centric world while they continue to pursue the opportunities offered by virtualization, the cloud, and software-defined IT infrastructure. Read More

  • From legacy to zero trust: the crossroads of today’s FinTech

    New technologies, new ways of handling funds and new ways how consumers are interacting with money. Financial institutions are at a crossroads of what direction to take. Crypto currencies, mobile devices, cloud and an increasingly difficult to manage supply chain is forcing a lot of complexity onto the foundations that FinTech has based its successes on. The solid foundation of what is now considered legacy IT has proven its worth but at the same time the status quo is becoming harder to support, manage and secure against today's ever growing threats. Cyber criminals find new and inventive ways of compromising systems, hijacking data and extorting its owners. So where does that leave us in trying to secure the financial world? This talk will go over a number of topics and challenges that FinTech is dealing with from the perspective of an ethical hacker's view and experience of breaking into FinTech companies for the last decade. What works and what doesn't and what the future might bring. Read More

  • Distributed Cloud Computing: Next Frontier of Hybrid Cloud Landscape

    In this webinar, we take a deep dive and discuss some of the fundamental aspects of distributed cloud computing, in detail. You’ll learn: • Mechanics of distributed cloud computing • Benefits and opportunities of distributed cloud • Challenges and open questions related to distributed cloud model • Considerations for the technology leaders from the standpoint of strategy, architecture and best practices of distributed cloud computing Read More

  • Distributed Cloud Computing: Next Frontier of Hybrid Cloud Landscape

    In this webinar, we take a deep dive and discuss some of the fundamental aspects of distributed cloud computing, in detail. You’ll learn: • Mechanics of distributed cloud computing • Benefits and opportunities of distributed cloud • Challenges and open questions related to distributed cloud model • Considerations for the technology leaders from the standpoint of strategy, architecture and best practices of distributed cloud computing Read More

  • Why Software Asset Management can be a great ally to Security!

    Software Asset Management is the noble calling of counting software usage versus entitlements and hopefully being compliant at the end of the equation. I and some other SAM aficionados think that a great SAM department or person should also be a provider of data, insight and advice to security. SAM give advice on security you ask? No, that is not our forte. However, in order to correctly license the wide range of software most organisations deploy our job is to know, what software or cloud services are consumed by who, when and under which specific circumstances. That knowledge and insight of patterns, over time along side the actual rights and costs of the software is of use, as I will demonstrate. By the end of the talk, my aim is for you to reach out to your SAM department to find out if they too can provide additional information of value to improve the defences of your organisations assets. Read More

  • Optimizing Data Center Infrastructure

    Data is fundamental to make informed and verified business decisions. Business data comes in a wide variety of formats, and data in all its forms is highly valuable to owners and to enterprises. Building and managing a modern data center requires awareness of new trends and technologies as data center infrastructure gets more and more complex. Data storage complexity is a key factor and largely determines the data center operational efficiency, data availability, and the response time. Layered structure and modular implementation would significantly increase the data center performance, meanwhile non supervised machine learning may contribute to embedding logical optimization techniques to store, reconfigure and reorganize the classified information. Read More

  • Surviving the perfect storm in 2022

    2021 provided the perfect cyber storm for many small businesses – be it: a hit to your finances through downtime costs, brand damaged caused by a breach, an insider going rogue with your data, a breach courtesy of a supplier. You need to be prepared for it all. Join Graham Chee, BCyber's Managing Director and Co-Founder as he takes you through the practical ways your business can prepare for and survive the next perfect cyber storm. Read More