{"id":507216,"date":"2024-01-16T10:06:21","date_gmt":"2024-01-16T15:06:21","guid":{"rendered":"https:\/\/www.commvault.com\/?page_id=507216"},"modified":"2024-10-03T13:07:27","modified_gmt":"2024-10-03T17:07:27","slug":"the-collaborative","status":"publish","type":"page","link":"https:\/\/www.commvault.com\/the-collaborative","title":{"rendered":"The Collaborative"},"content":{"rendered":"
\n\t
\n\t\t\n\t\t\n\t\t\t\t\t
\n\t\t\t\t\"\"\t\t\t<\/div>\n\t\t\n\t\t

\n\t\t\tThought Leadership Hub\t\t<\/h1>\n\n\t\t

\n\t\t\tBringing Cyber Resilience to life. \t\t<\/p>\n\n\t\t

\n\t\t\t\n\n
\n\n\t\n\t\t\n\n\t\t\t\t\t\t\t\n\t\t\t\t\tNewsletter subscription\t\t\t\t<\/span>\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/svg>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\n\n
\n\n\t\n\t\t\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/svg>\n\n\t\t\t\t\n\t\t\t\t\tCyber Recovery Readiness report\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\t\t\t\t
\n\t\t\t\"\"\t\t<\/div>\n\t\t\t\t
\n\t\t\t\"\"\t\t<\/div>\n\t<\/div>\n\n\n
\n\t
\n\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\tThe state of cyber resilience\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t

\n\t\t\t\t\tHow IT and Security leaders are battling the threat of ransomware.\t\t\t\t<\/h2>\n\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t
\n\t\t
\n\t\t\t\n
\n\t\n\t\n\t
\n\n\t\t\t\t\t\t

\n\t\t\t\t\t41% \t\t\t\t<\/h3>\n\t\t\t\n\t\t

\n\t\t\tmature organizations recover from a breach 41% faster than those with fewer maturity markers.

Source: 2024 Cyber Recovery Readiness Report<\/a>\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\n

\n\t\n\t\n\t
\n\n\t\t\t\t\t\t

\n\t\t\t\t\t20% \t\t\t\t<\/h3>\n\t\t\t\n\t\t

\n\t\t\tof organizations that haven’t been breached, 20% fail to test their recovery plans.

Source: 
2024 Cyber Recovery Readiness Report<\/a>\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\n\t\t<\/div>\n\t\t

\n\t\t\t
\n\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\tIf your cloud instance was accidentally deleted, how confident are you in being able to recover?\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t100%\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t54%\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t75%\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t14%\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t50%\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t9%\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tWe’re in trouble!\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t23%\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t207 Votes <\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n
\n\t
\n\t\t
\n\t\t\t\n\t\t\t
\n\t\t\t\t
\n\t\t\t\t\n\n\n
\n\t
\n\t\n
\n\t\n\n
\n\t\n\t
\n\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\tCyber Resilience Strategy \t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\tUnveiling the Secrets of Cyber Resilience\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t

\n\t\t\t\t\tOur expert panel discusses the importance of cyber readiness through recovery testing and risk management. \t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t

\n\t\t\t\t\n\n
\n\n\t\n\t\t\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/svg>\n\n\t\t\t\t\n\t\t\t\t\tWatch now\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\n\n
\n\n\t\n\t\t\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/svg>\n\n\t\t\t\t\n\t\t\t\t\tRead More\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n\n<\/div>\n\n
\n\t\"\"<\/div>\n\n\t<\/div>\n<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n
\n\t
\n\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t
\n\t\t\t\n\n
\n\t\n\t
\n\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\tA Commvault Podcast\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\tDealing with Ransomware at a Global Level\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t

\n\t\t\t\t\tThomas Bryant sits down with Taylor Grossman, Deputy Director for Digital Security at the Institute for Security and Technology. Taylor discusses the significant challenges and evolving landscape of ransomware threats, emphasizing their transformation into a national security concern.\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n\n\n\t\t\t\t\t\t\t

\n\t\t\t\t\t

Subscribe On<\/h3>\n\n\t\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/svg>\n\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n
\n\t
\n\t\t
\n\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t

Dive deeper into cyber resilience<\/h3>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\n
\n\n\t\n\t\t\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/svg>\n\n\t\t\t\t\n\t\t\t\t\tView all\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\n\t\n\t\t
\n\t\t
\n\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t
\n
\n \t\t\t\t\t\t\t\n\t\t\t\t\t\"\"\t\t\t\t<\/a>\n\t\t\t\t\t <\/div>\n
\n
\n

Blog<\/h3>\n\t\t\t

\n Unveiling the 2024 Cyber Recovery Readiness Report <\/h4>\n

\n <\/p>\n <\/div>\n

\n \n\n
\n\n\t\n\t\t\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/svg>\n\n\t\t\t\t\n\t\t\t\t\tRead blog\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n <\/div>\n <\/div>\n<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t
\n
\n \t\t\t\t\t\t\t\n\t\t\t\t\t\"\"\t\t\t\t<\/a>\n\t\t\t\t\t <\/div>\n
\n
\n

ANALYSIS<\/h3>\n\t\t\t

\n 7 Emerging Trends in Cyber Resilience <\/h4>\n

\n <\/p>\n <\/div>\n

\n \n\n
\n\n\t\n\t\t\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/svg>\n\n\t\t\t\t\n\t\t\t\t\tRead now\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n <\/div>\n <\/div>\n<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t
\n
\n \t\t\t\t\t\t\t\n\t\t\t\t\t\"\"\t\t\t\t<\/a>\n\t\t\t\t\t <\/div>\n
\n
\n

BLOG<\/h3>\n\t\t\t

\n Cyber Resilience: Balancing Security & Transparency <\/h4>\n

\n <\/p>\n <\/div>\n

\n \n\n
\n\n\t\n\t\t\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/svg>\n\n\t\t\t\t\n\t\t\t\t\tRead blog\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n <\/div>\n <\/div>\n<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t
\n
\n \t\t\t\t\t\t\t\n\t\t\t\t\t\"\"\t\t\t\t<\/a>\n\t\t\t\t\t <\/div>\n
\n
\n

Blog<\/h3>\n\t\t\t

\n Exploring the Potential of AI in the Enterprise <\/h4>\n

\n <\/p>\n <\/div>\n

\n \n\n
\n\n\t\n\t\t\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/svg>\n\n\t\t\t\t\n\t\t\t\t\tRead the blog\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n <\/div>\n <\/div>\n<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t