Data Protection

[RECORDED WEBINAR – ASIA PACIFIC] Build the Last Line of Defense Against Cyber Attacks

David Edborg By David Edborg Portfolio Manager, Business Resiliency August 5, 2016

Webinar Name: Build the Last Line of Defense Against Cyber Attacks
Date and Time: View Recording Here >>
Duration: 45 Minutes

The very nature of security attacks and the methodologies to detect and prevent those attacks are shifting equally as fast as businesses are today. Customers must now analyze and protect both traditional and cloud native applications on any infrastructure both on or off-premises. Join us to critically analyze these new paradigms and gain practical advice for enabling and securing the rapidly evolving IT landscape.

What Do You Learn

  • Benefits of an Isolated Recovery Solution – how Isolated Recovery protects your organization from attacks focused on cyber destruction or having data held hostage for the purpose of extortion or blackmail.
  • Key factors in determining which data should be protected using Isolated Recovery. What to look for when deciding on a partner to assist in building your Isolated Recovery Solution. What combination of skills, expertise, and technology will deliver the results you need.
  • Where to begin. See how others are implementing Isolated Recovery Solutions close the gap and get moving on a protection model appropriate for their business.

View Recording Here >>

 

David Edborg

About David Edborg


Portfolio Manager, Business Resiliency

David originally joined EMC (now Dell EMC) in 2005 and is currently the Portfolio Manager for Dell EMC Business Resiliency Services. Over his career at Dell EMC, David has served as a Global Practice Manager for Availability Technologies, as an Availability Services Solutions Principal, and as the Chief Architect for EMC’s Continuous Availability Services Line.

David has over thirty years in the computer security and disaster recovery industries. Out of college David worked as an IBM Assembler coder and wrote operating system mods for ACF2/VM; the first ever security product for IBM’s Virtual Machine OS. He has worked with other vendors and partners in the DR industry, including supporting recoveries from the 9/11 event. David has also worked in the packaged software industry as Director of Development and Support for a computer security product.

Read More

Share this Story
Join the Conversation

Our Team becomes stronger with every person who adds to the conversation. So please join the conversation. Comment on our posts and share!

Leave a Reply

Your email address will not be published. Required fields are marked *