INTERFACE-Seattle

INTERFACE-Seattle

From December 12, 2024 until December 12, 2024

Aig Seattle - Ionad Co-chruinneachadh Stàite Washington, Washington, na SA

Air a phostadh le Canton Fair Net

[post-d fo dhìon]

https://f2fevents.com/event/sea21/


INTERFACE Seattle | 9 Dùbhlachd, 2021

Còrr is 20 bliadhna de cho-labhairtean adhartach. Tachartasan Foghlaim Coimhearsnachd IT ionadail. INTERFACE Seattle Virtual 2021 / Chì mi thu an ath-bhliadhna. PRÌOMH: 1 CPE: Leasanan ri roinn: Iùl eòlaiche air leigheas ransomwareBrian Miller, Co-stèidheadair agus Àrd-oifigear FusionTek. [1 CPE] Ailtireachd Zero- Trust. [1 CPE] Ailtireachd sgòthan gluasadach air fhàgail - Cleachdaidhean as fheàrr airson cleachdadh sgòthan a dhèanamh tèarainte.

Tha Bun-structar IT an-còmhnaidh ag atharrachadh agus a’ toirt dhùbhlain ùra. Tha e cha mhòr do-dhèanta cumail suas ris na leasachaidhean as ùire, bho ransomware gu na bagairtean tèarainteachd as ùire agus AI chun an fheum a tha a’ sìor fhàs airson leud-bann agus stòradh. Chaidh a’ cho-labhairt seo a dhealbhadh gus cuideachadh. Tha a’ cho-labhairt againn air a dhealbhadh gus cuideachadh.

Lorgaidh tu raon farsaing de thaisbeanaidhean, còmhraidhean panail agus luchd-taisbeanaidh, a 'còmhdach cuspairean leithid Tèarainteachd Fiosrachaidh, Bun-structar Cloud, Ath-bheothachadh Tubaist agus Conaltradh. Còmhdaichidh iad cuideachd na h-innleachdan agus na cleachdaidhean as ùire.

December 9th 20218:30am - 4:30pm.

Seminars Co-labhairt Brìgheil le grunn shlighean agus Q&AChatting agus lìonrachadh le dealbhan Duais aon-air-aon gach uair.

Brian Miller, Co-stèidheadair agus Àrd-oifigear FusionTek.

9:00 - 9'50 AM[1 CPE] Architectures Zero-TrustRubrik presents: Organizations have made significant investments in IT security. They are trying to strengthen their perimeter, endpoint and network protections, as well as application protections. Hackers are able to penetrate these defenses, and target enterprise data including backup data. Ransomware has started to target online backups, encrypting them or deleting. How would you know if your organization had been the victim of an attack? The time required to manually compare each snapshot and sort through millions of documents is a significant amount, and can significantly delay recovery. The entire environment being restored in bulk could result in high data loss, and even weeks of work wasted. We will be discussing how to protect the last line of defence, your backups, in this session. We will go through the anatomy of recovery, best practices and advanced tools, to ensure that you won't have to pay ransom and to recover your data quickly to continue business operations.Information Security.