saas.clumio.com
Open in
urlscan Pro
104.17.72.206
Public Scan
Submitted URL: http://go.clumio.com/NjY2LUpGVS03NjgAAAGDLZp58zqQNrlFgNtrXIf4ZkEu5qldh6nju48QFdZRHpp52MgW0chGDvGuxepn1zFrh2rge9I=
Effective URL: https://saas.clumio.com/preparing-for-increased-cyberthreats.html?utm_source=clumio&utm_medium=email&mkt_tok=NjY2LUpGVS0...
Submission: On March 16 via manual from US — Scanned from DE
Effective URL: https://saas.clumio.com/preparing-for-increased-cyberthreats.html?utm_source=clumio&utm_medium=email&mkt_tok=NjY2LUpGVS0...
Submission: On March 16 via manual from US — Scanned from DE
Form analysis
3 forms found in the DOM<form class="mktoForm mktoHasWidth mktoLayoutAbove" id="mktoForm_2280" novalidate="novalidate" style="font-family: inherit; font-size: 13px; color: rgb(51, 51, 51); width: 210px;" __bizdiag="-1626225667" __biza="WJ__">
<style type="text/css"></style>
<div class="mktoTemplateBox"><span style="font-size: 16px; font-weight: bold; color: white;"> Welcome back, Andrii Sudak<br><br><span style="font-size: 20px; color: white;">Coffee Talk: Former NSA Officer’s Advice on Preparing for Increased
Cyberthreats</span><br><br><span class="mktoButtonWrap mktoNative"><button type="submit" class="mktoButton">Register</button></span><br><br><a class="mktoNotYou">Not you?</a></span></div><input type="hidden" name="formid"
class="mktoField mktoFieldDescriptor" value="2280"><input type="hidden" name="lpId" class="mktoField mktoFieldDescriptor" value="5057"><input type="hidden" name="subId" class="mktoField mktoFieldDescriptor" value="173"><input type="hidden"
name="munchkinId" class="mktoField mktoFieldDescriptor" value="666-JFU-768"><input type="hidden" name="lpurl" class="mktoField mktoFieldDescriptor"
value="//saas.clumio.com/preparing-for-increased-cyberthreats.html?cr={creative}&kw={keyword}"><input type="hidden" name="followupLpId" class="mktoField mktoFieldDescriptor" value="5059"><input type="hidden" name="cr"
class="mktoField mktoFieldDescriptor" value=""><input type="hidden" name="kw" class="mktoField mktoFieldDescriptor" value=""><input type="hidden" name="q" class="mktoField mktoFieldDescriptor" value="">
</form>
POST /index.php/leadCapture/save3
<form class="mktoForm mktoNoJS" action="/index.php/leadCapture/save3" method="post">
<div class="mktoFormRow">
<div class="mktoFormCol">
<label class="mktoLabel" for="FirstName"> First Name: </label>
<input type="text" class="mktoField mktoTextField" name="FirstName" id="FirstName">
</div>
</div>
<div class="mktoFormRow">
<div class="mktoFormCol">
<label class="mktoLabel" for="LastName"> Last Name: </label>
<input type="text" class="mktoField mktoTextField" name="LastName" id="LastName">
</div>
</div>
<div class="mktoFormRow">
<div class="mktoFormCol">
<label class="mktoLabel" for="Company"> Company Name: </label>
<input type="text" class="mktoField mktoTextField" name="Company" id="Company">
</div>
</div>
<div class="mktoFormRow">
<div class="mktoFormCol">
<label class="mktoLabel" for="Email"> Email Address: </label>
<input type="text" class="mktoField mktoTextField" name="Email" id="Email">
</div>
</div>
<div class="mktoFormRow">
<div class="mktoFormCol">
<label class="mktoLabel" for="Country"> Country: </label>
<input type="text" class="mktoField mktoTextField" name="Country" id="Country">
</div>
</div>
<div class="mktoFormRow">
<div class="mktoFormCol">
<label class="mktoLabel" for="State"> State: </label>
<input type="text" class="mktoField mktoTextField" name="State" id="State">
</div>
</div>
<div class="mktoFormRow">
<div class="mktoFormCol">
<label class="mktoLabel" for="Phone"> Phone Number: </label>
<input type="text" class="mktoField mktoTextField" name="Phone" id="Phone">
</div>
</div>
<div class="mktoFormRow">
<div class="mktoFormCol">
<label class="mktoLabel" for="utm_source__c"> UTM Source: </label>
<input type="text" class="mktoField mktoTextField" name="utm_source__c" id="utm_source__c">
</div>
</div>
<div class="mktoFormRow">
<div class="mktoFormCol">
<label class="mktoLabel" for="Lead_Source_Third_Party__c"> Lead Source - Third Party: </label>
<input type="text" class="mktoField mktoTextField" name="Lead_Source_Third_Party__c" id="Lead_Source_Third_Party__c">
</div>
</div>
<div class="mktoFormRow">
<div class="mktoFormCol">
<label class="mktoLabel" for="utm_medium__c"> UTM Medium: </label>
<input type="text" class="mktoField mktoTextField" name="utm_medium__c" id="utm_medium__c">
</div>
</div>
<div class="mktoFormRow">
<div class="mktoFormCol">
<label class="mktoLabel" for="utm_campaign__c"> UTM Campaign: </label>
<input type="text" class="mktoField mktoTextField" name="utm_campaign__c" id="utm_campaign__c">
</div>
</div>
<div class="mktoFormRow">
<div class="mktoFormCol">
<label class="mktoLabel" for="utm_content__c"> UTM Content: </label>
<input type="text" class="mktoField mktoTextField" name="utm_content__c" id="utm_content__c">
</div>
</div>
<div class="mktoFormRow">
<div class="mktoFormCol">
<label class="mktoLabel" for="utm_term__c"> UTM Term: </label>
<input type="text" class="mktoField mktoTextField" name="utm_term__c" id="utm_term__c">
</div>
</div>
<div class="mktoFormRow">
<div class="mktoFormCol">
<label class="mktoLabel" for="GCLID__c"> GCLID: </label>
<input type="text" class="mktoField mktoTextField" name="GCLID__c" id="GCLID__c">
</div>
</div>
<span style="display:none;"><input type="text" name="_marketo_comments" value=""></span>
<span class="mktoButtonWrap"><button type="submit" class="mktoButton">Submit</button></span>
<input type="hidden" name="lpId" value="5057">
<input type="hidden" name="subId" value="173">
<input type="hidden" name="lpurl" value="//saas.clumio.com/preparing-for-increased-cyberthreats.html?cr={creative}&kw={keyword}">
<input type="hidden" name="formid" value="2280">
<input type="hidden" name="formVid" value="2280">
<input type="hidden" name="ret" value="//saas.clumio.com/preparing-for-increased-cyberthreats-ty.html">
<input type="hidden" name="munchkinId" value="666-JFU-768">
<input type="hidden" name="kw" value="">
<input type="hidden" name="cr" value="">
<input type="hidden" name="searchstr" value="">
<input type="hidden" name="_mkt_disp" value="return">
<input type="hidden" name="_mkt_trk" value="">
</form>
<form class="mktoForm mktoHasWidth mktoLayoutAbove" novalidate="novalidate" style="font-family: inherit; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"
__bizdiag="946627219" __biza="WJ__"></form>
Text Content
* Products * Clumio Protect * Clumio Discover * Solutions * AWS Backup and Recovery * Data Protection for Amazon S3 * Clumio Protect for Microsoft 365 * Ransomware * SQL Server on Amazon EC2 * VMware Cloud on AWS * Support * Resources * Customer Stories * White Papers * Data Sheets * Videos * Webinars * Podcasts * Articles * Solution Briefs * Tech Briefs * Company * About Us * Careers * Blog * Innovation * Newsroom * Events * Contact * Partners * AWS * VMware * Contact * Start for Free * Products Product Overview Secure, scalable data protection as a service that simplifies AWS backup. Learn More Pricing Clumio Protect Air-gap backups to protect Amazon EC2, EBS, and RDS data from ransomware and other disasters. Clumio Discover Cloud backup optimization engine with enhanced reporting and deeper visibility into AWS. * Solutions Solutions Overview Overcome challenges in AWS backup with Clumio. Learn More AWS Backup and Recovery Simple, secure, fast and comprehensive backup & recovery for AWS. Data Protection for Amazon S3 Optimize and secure your business-critical data in S3 Clumio Protect for Microsoft 365 Secure cloud backup for Microsoft 365 Exchange, OneDrive and SharePoint. Ransomware Stay ahead of ransomware with secure, air-gapped and immutable backups. SQL Server on Amazon EC2 Add speed and security to your AWS RDS and SQL database backups. VMware Cloud on AWS Modern and secure backup and recovery solution for VMware Cloud on AWS. * Support * Resources * Customer Stories * White Papers * Data Sheets * Videos * Webinars * Podcasts * Articles * Solution Briefs * Tech Briefs Best Practices to Protect your Organization Against Ransomware Threats How organizations can increase their resilience to being ransomed, and secure their data in the cloud. Learn more * Company * About Us * Careers * Blog * Innovation * Newsroom * Events * Contact * Partners * AWS * VMware * Contact * Start for Free Coffee Talk: Former NSA Officer’s Advice on Preparing for Increased Cyberthreats Tuesday, March 22, 2022 1pm ET / 10am PT Ransomware attacks have exposed serious vulnerabilities in business operations across all market sectors. But the recent escalation of political tensions has heightened awareness of what’s at stake when core services are crippled by cyberattacks. REGISTER NOW Welcome back, Andrii Sudak Coffee Talk: Former NSA Officer’s Advice on Preparing for Increased Cyberthreats Register Not you? First Name: Last Name: Company Name: Email Address: Country: State: Phone Number: UTM Source: Lead Source - Third Party: UTM Medium: UTM Campaign: UTM Content: UTM Term: GCLID: Submit Join a panel of experts featuring Rachel Wilson, Former Head of Counterterrorism Operations, National Security Agency (NSA) and current Director of Cybersecurity, Morgan Stanley Wealth Management and Clarke Rodgers, Enterprise Security Strategist with Amazon Web Services, along with Michael Pepin CISSP, Sr. Security Architect and Glenn Mulvaney, VP of Cloud Operations & Security at Clumio, as they discuss the new realities for data security and how best to prepare for ever-evolving threats. PRESENTERS: Rachel Wilson Director of Cybersecurity, Morgan Stanley Wealth Management; Former Head of Counterterrorism Operations, National Security Agency (NSA) Clarke Rodgers Enterprise Security Strategist, Amazon Web Services Rachel Wilson spent the first 15 years of her career at the National Security Agency (NSA). Over the course of her NSA career, she held several key senior executive level leadership positions. Between 2008 and 2010, she ran NSA’s counterterrorism operations and led a global enterprise in detecting and disrupting terrorist plotting against the United States and its allies. Between 2010 and 2012, Rachel served as NSA’s Chief of Operations in the UK working out of the US Embassy in London. In this role, she worked with UK intelligence services to counter terrorist and cyber threats to the 2012 Olympics. Returning to the US in 2012, Rachel spent nearly five years leading NSA’s cyber exploitation operations within NSA’s Tailored Access Operations. In this capacity, she led the planning and execution of thousands of cyber exploitation operations against a wide array of foreign intelligence, military, and cyber targets and served as the committing official for many of NSA’s highest risk and most important intelligence-gathering activities. In April of 2017, Rachel became the first Head of Cybersecurity for Morgan Stanley Wealth Management and Investment Technology. Rachel Wilson is a Managing Director and Head of Cybersecurity for Morgan Stanley Wealth Management. She is responsible for protecting the cybersecurity of Wealth Management, Investment Management and Prime Brokerage systems and the integrity and confidentiality of Firm and client data. Clarke is an Enterprise Security Strategist with Amazon Web Services. In this role, Clarke works with enterprise security, risk, and compliance focused executives on how AWS can strengthen their security posture and to help understand the security capabilities/possibilities of the cloud. Prior to AWS, Clarke was a CISO for the North American operations of a multinational insurance/reinsurance company where he took a strategic division all-in to AWS for security reasons, to include achieving SOC2/Type2 attestation. Clarke's 20+ year career in IT operations and security focused roles helps him align with the needs of today's enterprise customers during their cloud transformation journeys. Clarke attended the University of North Carolina and served as a United States Marine. Michael Pepin, CISSP Sr. Security Architect Clumio Glenn Mulvaney VP of Cloud Operations & Security, Clumio Michael has more than 15 years of experience in Information Security at the US Department of Defense and more recently in commercial cyber defense, building tools and analyzing anomalies and patterns. He has also handled distribution of Cyber Threat Intelligence (CTIs) in real-time multi-sensor defense situations. Glenn is an experienced technology leader with a 20-year history in Silicon Valley start-ups. Prior to joining Clumio, Glenn was Vice President of Operations at Inscape Data, Inc. and Skyhigh Networks, Inc. (acquired by McAfee, Inc., in January 2018) as Vice President of Operations. Glenn is passionate about information security through DevSecOps practices, and enjoys building a security-aware organizational culture. Glenn also serves as an investor and advisor to RSA America LLC. 50 attendees will receive Blue Bottle Coffee and a Clumio camping mug! Must use a valid business email address and be a resident of the United States to be eligible. JOIN FOR A CHANCE TO WIN AN IPAD OR A CLUMIO MUG! One lucky attendee will receive a 9th generation iPad 10.2, and 50 attendees will receive a Clumio mug and bag of premium coffee! Must use a valid business email address and be a resident of the United States to be eligible. Register Now Start for Free Contact Us Products * Overview * Clumio Protect * Clumio Discover * Pricing * Support Solutions * Overview * AWS Backup and Recovery * Data Protection for Amazon S3 * Ransomware * Databases * Protect for M365 * VMware Cloud on AWS Resources * Customer Stories * White Papers * Data Sheets * Videos * Webinars * Podcasts * Articles * Solution Briefs * Tech Briefs Company * About Us * Careers * Blog * Innovation * Newsroom * Events * Contact * Legal Partners * AWS * VMware © Copyright 2022 Clumio, Inc. All Rights Reserved. Read Privacy Policy and Terms of Use. * * * * *