Hi {NAME}, The Register: Tech Resources - 18 March 2020 ### Build the next generation of your business in the public cloud We invite you, Reg readers, to ride the second wave of cloud adoption -- the one in which you can finally migrate the applications that run your business to the public cloud. But, if you want to move your SAP, Oracle or similar workloads, how will you do it? Do you lift-and-shift, re-architect, or combine the two? How do you ensure security and compliance? And do you even have a viable business case to do it? Carla Arend, Lead analyst Cloud EMEA, IDC will be talking with Tim Phillips about the tradeoffs you need to make and the suitability of different platforms for different workloads. And Yasser Eissa Vice President, IBM Public Cloud, Europe will be explaining the benefits of open, secure, enterprise-grade public cloud when making the transition. You will hear about: * How first movers are exploiting the next wave of cloud-based business innovation. * How to use your existing investment in cloud, while providing more flexibility to meet your business needs. * How open source software, with built-in security and enterprise-grade infrastructure are changing the potential of public cloud. * How you can avoid vendor lock-in to optimise your workloads on the right cloud model. Join our Regcast to avoid making costly security, compatibility or compliance errors with your business-critical applications. Signup Now ### Practical tips for Office 365 tenant-to-tenant migration You merged. You sold a company. Youâre migrating to a sovereign data centre. Whatever the reason for your Office 365 tenant-to-tenant migration, it can be one of the most important and stressful projects you will ever take on. This isnât something that you can do by trial and error, so how do you pull it off without crashing the business or driving your users up the wall? Mike Weaver of Quadrotech has lived through many of these projects and in our latest RegCast he lets Tim Phillips in on the secrets of a good migration. He will let us in on: * the hidden gremlins that spark migration chaos * the technical and organisational perils that derail your project * three tips that will solve 80% of your migration headaches It will be a session packed with practical help that might just save your job ⦠and your sanity. Signup Now ### Why you need managed detection and response In a recent survey, nine out of 10 organisations that suffered a significant security attack were running up-to-date cybersecurity software. They did what everyone told them to do, and it wasnât enough. Traditional security practices are just not working. Threats are becoming more sophisticated, you are managing too many disconnected products, with too many manual processes. You canât get the skills and the costs of securing your infrastructure are spiralling. Is this you? If so, you need to integrate your disconnected products and management if you want to survive. Managed detection and response (MDR) is the new best practice. It claims to: * Integrate your disconnected products * Optimise automation in threat detection * Improve response time and quality * Make the best use of scarce security skills But is it that easy, and how do you go about implementing MDR securely and manageably? Dave Martin from Open Systems has promised to tell us. Heâs talking to the Regâs Tim Phillips, and he will explain why your organization needs MDR, how to convince the business that it needs it too, and how to implement it. Signup Now ### Tackling the Visibility Gap in Information Security Is your security team blind to the activities in more than half of its IT assets? That was just one of the findings in a new report from 451 Research, based on in-depth interviews with security leaders across 150 large enterprises and focused on the challenges facing their teams. On average, the report found SIEMs were only ingesting logs from 45% of log-producing systems. This report uncovers the most tangible pain points in security operations â from managed service providers to alert fatigue â and the emerging mandate required from people, processes and technology to optimally protect the business from threats. View this study to: * Explore the latest data about the challenges inherent in managing security models * Examine the tools and processes currently used by large enterprise security teams to maintain visibility and improve their IT environmentâs security posture * Understand the impact that visibility (or a lack thereof) can have on both security and business operations Download Now ### Six Best Practices to Improve Visibility and Accelerate Response There are tools for analyzing just about every type of security threat, and for collecting data that adds context to potential threat activity. The problem today is that there are too many tools, too little integration among them, and more noise than a team can analyze and understand â all of which add up to less visibility into threats and less efficient security teams. In a survey of senior security leaders conducted by 451 Research, the inability to integrate security products was named the top challenge in security management. âA failure to integrate drastically reduces visibility across the environment and wastes time and manpower maintaining disparate tools, rather than consolidating insights from multiple sources into a single pane of glass,â 451 Research reported. Automation is supposed to solve the âtoo many toolsâ problem, surfacing the most critical issues by running playbooks and processes against common threats like phishing, and freeing up valuable resources for other tasks. But the reality is that expectations for automation have outpaced its capabilities to drastically reduce human intervention in security monitoring. Download Now ------------------------------------------------------------------------ This email was sent to {EMAIL} You can update your preferences here: or unsubscribe from this list: Situation Publishing Ltd, 14 Gray's Inn Road, London, WC1X 8HN, UK The Register and its contents are Copyright © 2020 Situation Publishing. All rights reserved. Find our Privacy Policy here: