G2M Research Multi-Vendor Webinar Series
Our webinar schedule is below. Registration links will be available soon, and you can always contact us directly with questions. We are offering an Enterprise Storage & Technology multivendor series and a Cybersecurity series.
Interested in Sponsoring a webinar? Contact G2M for a prospectus.
Information about prior webinars, including video and a PDF of the webinar slides is available under the Archived Webinars tab.
Last month Joe Sullivan, the former CISO of Uber, was found guilty of not disclosing to government regulators a 2016 breach of customer and driver data. Uber concealed the breach by paying the hackers using bug bounty funds. Bug bounty programs provide a way of paying “white hat” researchers to report security vulnerabilities. But some companies use bounty programs to conceal problems that should have been disclosed under state or federal rules. Bug bounties usually require nondisclosure deals, some of which last forever. This webinar looks at the pressures companies are to keep their business operating with ransomware hacks a prevalent factor impacting them.
2022 saw a fundamental shift and escalation in the cybersecurity landscape. The invasion of the Ukraine, the threats to Taiwan, and the escalation from threat actors has put everyone, no matter how large or small your business, on the front lines. Join leading vendors in the cybersecurity space for a discussion about what new threats are likely to occur in 2023, and new tools that will provide an opportunity to improve your organization’s cybersecurity posture.
How can your business effectively apply conventional storage architectures to AI and ML training? AI/ML training datasets are extremely large, and the speed of training is directly related to the speed of its storage. How can a business maintain training datasets and training models, which require complex data management capability and cloud storage capacity, without dragging down the training process for artificial intelligence and machine learning applications? In this webinar, leading industry experts discuss the best storage and management practices to effectively utilize artificial intelligence and machine learning training datasets.
The rebound from COVID has produced a workforce where remote workers are becoming the norm rather than the exception in the vast number of white-collar industries. With the trend to remote work and the “always-on” workforce comes a proliferation of mobile devices as endpoints in corporate networks. The result is a cybersecurity attack surface that has expanded beyond the typical physical boundaries that kept organizations secure. Our panel of experts on endpoint security and attack surface management will explore best practices on how to secure the remote “always-on” workforce from cybersecurity threats.
CXL promises to change computing through the concept of pooled and tiered memory much the same way that software-defined storage and software-defined networking have changed those two disciplines. Yet, many of the third-party management pieces required to support pooled, tiered, and extended memory do not exist today. How will the industry address these needs, and where will CXL and extended memory make its first impacts? Join a panel of vendors and experts to discuss how to best navigate this landscape.
Willie Sutton was once attributed (incorrectly) to have said that “people rob banks because that is where the money is”. The same is true of cybercriminals, which is why regulatory agencies continue to ratchet up the requirements for resilience in the face of cyber threats. The combination of regulatory frameworks and data protection schemes such as the CBEST, PCI DSS, EU-GDPR and UK-GDPR, NIST 800-53, and others means that the cybersecurity regulatory and compliance workload has increased for most businesses in the financial services (FS) sector. Join our panel of experts as they discuss how to streamline the ever-increasing cybersecurity regulatory and compliance workloads that organizations in the FS sector are facing.
What are the right capabilities to add to next-generation NVMe SSDs - Smart SSDs, networked SSDs, higher-performance SSDs, etc.? The NVMe specification has allowed flash to move beyond simple data storage. Simply increasing capacity though potentially has its own issues - blast radius, storage management, sharing, and more. With all of the capabilities being added to NVMe SSDs, what is the best direction to go? Join us for a robust discussion from industry experts regarding next-gen NVME SSDs and how to manage and maximize NVMe SSD capabilities.
Cybersecurity is no longer just the domain of engineers in the Security Operations Center (SOC) and their bosses in the CISO and CIO shops. Boards of Directors, CEOs, and CFOs all now worry about cybersecurity – from the threat of breaches and data exfiltration to regulatory concerns to the ever-increasing cybersecurity budgets, it is a subject that they are both responsible for and (often) not experts in dealing with. Understanding what insights these executives need to perform their duties and obligations is becoming more critical. Join us for a roundtable discussion on how to best provide the needed cybersecurity data to the C-Suite and Boardroom.
Flash devices such as solid-state drives (SSDs) have increased in size to the point where an individual device can easily support multiple virtual machines. The best way to take advantage of these capabilities is to utilize these latest SSDs as part of a software-defined storage architecture, where resources can be put together and taken apart as workloads demand. Join our industry experts to explore best practices for SSD-based software defined architectures.
By all accounts, the technology world is woefully short of cybersecurity professionals. According to estimates by ISC2, there is a shortage of 2.72 million cybersecurity professionals worldwide. This shortage is expected to get worse over time, and budgets alone cannot solve it. This is why most IT and CISO organizations are prioritizing training and retention of cybersecurity professional, often even above spending on the cybersecurity stack. Join our panel of experts as they discuss how to best find, train, and retain cybersecurity talent.
Extended Detection and Response (xDR) is one of the newest trends in cybersecurity that promises to provide a holistic approach to cybersecurity. Nearly every major cybersecurity vendor has or is promising xDR capabilities in their latest tool suites. As with most new trends, the actual value delivered is often a function of how the tool is utilized in conjunction with other tools and practices in the Security Operations Center (SOC). Join our panel of leading experts on xDR to explore the capabilities of these tools as a part of the larger cybersecurity technology stack.
One field that has recently seen a massive influx of technology is healthcare, and in particular medical imaging. T5oday, the technologies being applied to medical imaging (and healthcare more generally) include artificial intelligence, GPGPU computing, petabyte-scale storage, and latest-generation networking technologies. Given the size of imaging databases, the storage architecture can have the largest impact on overall performance. This webinar will explore the various storage architectures and data management tools necessary to keep up with the growth in high-resolution imagery for medical and biological studies.
While data privacy (in all of its different flavors) and cybersecurity best practices are complementary to each other, they are clearly not the same. Each of these areas has distinct goals, frameworks, and practices which do not necessarily overlap; for instance, your organization could be completely impregnable to data breaches and be non-compliant with data privacy regulations (or vice-versa). Explore the important differences between these two disciplines, and the keys to making it all work together in this webinar.
The increases in performance that Non-Volatile Memory Express (NVMe™) solid-state drives (SSDs) and NVMe over Fabric (NVMe-oF) offers over SCSI-based storage and storage networking protocols are well known. However, the adoption of NVMe-oF is still in its early days. Join industry storage networking experts as they discuss their view on the best applications and approaches for NVMe-oF based storage solutions.
Security ratings are measurements of an organization’s security posture and highlight vulnerabilities that put the organization at risk of breach. Once a company has its score, for better or worse, what next? How reliable is the information? Can my score impact my insurance premium and/or ability to get insurance? What measures can I take to reduce my risk in the most cost-efficient way possible? What is the value in having a third-party risk management program? Join industry experts to look at security ratings and TPRM programs to learn how companies can leverage them for the greatest ROI.
The number of tools available to accelerate workloads in both the cloud and in on-premises datacenters has never been larger than it is now. Today, the tools available include GPUs, SSDs with data-steering and computational capabilities, “smart-NICS” that can manage complex data routing capabilities, and CXL-enabled pooled/tiered/extended memory architectures that improve scale and performance. Our panel of experts will explore these various technologies, and how to best utilize them in next-generation datacenter architectures.
Attack surface management (ASM) is a relatively new concept for the continuous discovery, monitoring, and remediation of an organization’s cybersecurity vulnerabilities to external threats. Yet while the majority of vendors agree on the concept of ASM, the implementations of ASM differ widely from one company to another. Join our experts as they discuss what features are necessary to have an effective ASM product, and why they are important.
How can you effectively monitor the security of your data, especially if you are using cloud storage resources for all or part of your data storage? While cloud data storage providers are themselves secure, companies are effectively on their own when it comes to securing data on their platforms. What is the best way to do this? What tools do the cloud providers available? What third-party tools can you utilize on their platforms? And how do you recover from ransomware attacks? In this webinar, leading experts showcase tools, approaches, and evolving opportunities to protect your data.
The cloud literally opens up a number of opportunities for companies to rapidly scale up and scale down compute resources, network bandwidth, and storage capacity. However, securing the cloud is a very different matter than securing on-premises datacenters, and the fact that Amazon, Microsoft, or Google are running the virtual datacenter is not in itself a guarantee of security. Join our panel of cloud cybersecurity experts in exploring the emerging trends in securing cloud resource and workloads as we discuss best practices for resilient cloud cybersecurity architectures.
The Open Compute Project Foundation (OCP) was initiated in 2011 to apply the benefits of open source and open collaboration to hardware, with the goal of bringing the benefits of “cloud-scale” computing to all datacenter operators. OCP has produced a number of novel approaches to enable compute-at-scale for on-premises datacenters. Please join us and our panel to discuss some of the latest developments announced at the 2023 OCP Summit, and how these capabilities can be utilized in your datacenter architecture
Security Information and Event Management (SIEM) platforms are certainly not for everyone. In most cases, SIEMs tend to be utilized by large companies that can support A SIEM’s need for data, the staff expertise required, and the complexity of setting it up and operating it. However, for organizations with the right use case(s) and the abilities to support them, SIEMs can provide critical strategic value. Join some of the leading experts in the industry as they discuss situations where a SIEM can provide great value to an organization.
Which is better for HPC storage: local storage, large arrays, data lakes, or clustered file systems? HPC systems can have hundreds or thousands of nodes, and often contain tens of thousands of GPGPUs. While InfiniBand is still the leading fabric for HPC, Ethernet is also gaining more interest as an option. In this webinar, leading enterprise storage experts provide an analysis of each of these options, as well as exploring whether it is worthwhile for your organization to integrate HPC storage with the rest of your enterprise storage.
As with anything in cybersecurity, what today’s threats and trends are today is not necessarily predictive of what they will be tomorrow. Join our panel of leading cybersecurity vendors as they discuss what they see coming to the forefront in cybersecurity threats, trends, and innovative products for 2024, and their impacts on managing your organization’s cybersecurity posture and resilience.
A look back at the year and predictions for 2024. Where do we go from here? What is/was hot and what is/was not? Relax and enjoy a look back, and a look forward, with our panel of leading enterprise storage experts
Interested in attending our webinars? Register by clicking on the dates of interest. Interested in Sponsoring a webinar? Contact G2M for a prospectus.
Information about prior webinars, including video and a PDF of the webinar slides is available under the Archived Webinars tab.