Truth in IT Presents January 2019 Webinars on Data Management and Cybersecurity

By Megha Shah - Last Updated on February 28, 2019
Truth in IT Webinars on Data Management and Cybersecurity

The year of 2018 was a rough year for many IT teams and cybersecurity experts and analysts around the world. The burdening task of ensuring compliance with GDPR regulations was just one major piece of the puzzle. Several companies also endured cybersecurity attacks on their databases, risking the trust and loyalty of millions of customers.

There were so many data breaches, including the Saks Fifth Avenue and Lord and Taylor breaches in which 5 million customer data records were compromised. The Sacramento Bee breach saw nearly 20 million data records compromised while the Panera Bread data incident had 37 million records breached. The overly publicized Facebook data breach, the Equifax data breach, the Yahoo! data breach, and the Uber data breach all came as quite the shock with millions of users’ data exposed. These are only the more controversial ones and the actual number of hacks and attempted hacks counts in the double digits.

These attacks will only increase as time goes on which is one reason your company will want to be on guard against such attacks. Not only do you need state-of-the-art IT infrastructure and an IT team comprised of highly skilled and qualified professionals, but you also need internal systems and methods that help to make sure your data and networks are impenetrable.

 

In light of this, Truth in IT is hosting two webcasts to help you and your team discover some tips you need to understand when threats are lurking around the corner and how to prevent and combat attacks or breaches of company or customer data.

The first webcast will be held on January 24, 2019, at 1 PM ET. The topic of the webcast is “6 Ways to Hack Two-Factor Authentication.”  This webcast will be hosted by Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist and a security expert with over 30 years of experience and expertise in general computer security, identity management, PKI, Windows computer security, host security, cloud security, honeypots, APT, and defending against hackers.

This webcast will focus on the 6 most common kinds of hacks, how to defend your company’s two-factor authentication solution, and how to build a human firewall for a blended defense strategy.

The second webcast will be held on January 31, 2019, at 1 PM ET. The topic for this webcast is “Myth Busted: Backups Are All I Need for Archiving.” This webcast will discuss several critical topics including:

  • Why data backups are not enough for combatting modern-day cyberthreats
  • The various applications of an unstructured big data archive
  • The benefits of file level secondary storage over image level secondary storage
  • Why dynamic indexing and search is better than legacy static indexing of fixed fields
  • How Aparavi automates policy-driven data management on a large scale.

Apart from the plethora of information and actionable tips and tricks of the trade from industry experts, 10 lucky attendees in both webcast events will have a chance to win $100 Amazon Gift cards each for participating.

To register for the webcast events, click here.

Megha Shah | A dreamer, traveler, aspiring entrepreneur and a bookworm beyond repair, Megha Shah is extremely fond of writing and has been doing so since she was a child. Apart from being a part-time writer, Megha is currently in college, pursuing B. Com. (Hons). Megha is an ardent follower of ‘Hardship, Hustle and Heart’ and firmly believes in the power of hard work and destiny!

Megha Shah | A dreamer, traveler, aspiring entrepreneur and a bookworm beyond repair, Megha Shah is extremely fond of writing and has been doing so since she wa...

Related Posts