Webrecruit IT Professionals

Channel profile:

Monthly Webinars around the evolving world of Technology

Watch free webinars and videos in the Webrecruit IT Channel for the latest news, best practices and analysis from the IT world. From cloud computing to data centres, information security to IT service management, these webinars will be presented by industry experts from leading organisations. Tune in live to participate in polls and ask your questions to the speakers, or watch immediately afterwards on demand.

Subscribers (1,328)
Wi-Fi Optimization: Every Day, Another 4 Million Devices Are Activated. Ready? The mobile enterprise challenges are mounting: enabling users simple and secure access to the network, ensuring applications run smoothly, and building sufficient capacity to handle unpredictable usage and future growth. A superior level of Wi-Fi design is now required—something shown lacking by a recent Gartner report: “By 2015, 80% of newly installed wireless networks will be obsolete because of a lack of proper planning.” A clear indication of the problem is that a typical wireless user is provisioned with less than 5% of the bandwidth of a typical wired user. Wi-Fi Optimization includes designing for: the user, device, application, spectrum and capacity. This session will examine critical design components to ensure predictable performance, even under heavy loads. Read more >
Jul 17 2013
48 mins
Play

Webinars and videos

  • Live and recorded (45)
  • Upcoming (0)
  • Date
  • Rating
  • Views
  • The mobile enterprise challenges are mounting: enabling users simple and secure access to the network, ensuring applications run smoothly, and building sufficient capacity to handle unpredictable usage and future growth. A superior level of Wi-Fi design is now required—something shown lacking by a recent Gartner report: “By 2015, 80% of newly installed wireless networks will be obsolete because of a lack of proper planning.” A clear indication of the problem is that a typical wireless user is provisioned with less than 5% of the bandwidth of a typical wired user. Wi-Fi Optimization includes designing for: the user, device, application, spectrum and capacity. This session will examine critical design components to ensure predictable performance, even under heavy loads.
  • How do you respond when your organisation has been breached and law enforcement is unable to help?

    More and more companies are turning from a reactive response to breaches to a proactive one: preventing a breach before it happens and hacking back. This panel session will feature 4 experts discuss these topics in-depth, from its technical to legal implications.
  • As companies migrate to the virtual datacenter, executives must deal with security, audit, and visibility of their environment which has grown beyond their physical datacenter. Because of this, hesitancy remains and many questions are still being asked. What is a next-gen datacenter? What changes as businesses take steps toward a hybrid datacenter? When they move to a virtualized environment, how does their data remain secured and in their control? Will encrypting data in this environment achieve visibility and control of who is accessing it? Plus despite more knowledge on virtual risks, cloud services are still being purchased without authentication, adopting cloud first and then thinking about security second. So how can organisations win the struggle with authentication in the cloud?

    Join your fellow professionals for this lively and insightful discussion providing a complete vision on virtual risks in a virtual world. Then understand a way to manage risk, maintain compliance, accelerate and protect business from evolving security threats.
  • Social business represents a new transformational opportunity for organizations. After initial forays into external social media, many companies are now discovering the value of applying social approaches, internally as well as externally. Social business can create valued customer experiences, increase workforce productivity and effectiveness and accelerate innovation. But many companies still wrestle with the organisational and cultural challenges posed by these new ways of work.

    Join this webinar to hear the proven results from easily integrating social into your everyday tools to improve your business.

    About the speaker:
    Chris Moore is a Social Business Specialist for IBM Collaboration Solutions. He has 7 years experience and knowledge of Collaboration and Exceptional Web Experience technologies; including IBM Notes, Domino, Sametime, Connections, Docs and Web Experience Suites.
  • Public cloud providers offer better uptime and business continuity than most organisations can achieve on their own, despite well-publicised outages. But failing to plan for an outage, means you are planning to fail. At the center of this argument is the concept of designing for resilience: organisations should not hide from failure, but rather expose themselves to it early and often, in a way that allows them to learn quickly and build the right infrastructure to build reliability in an unreliable world.

    Join Paul Wallace, Director of Product at Riverbed Technology, as he discusses strategies that will help you design for resilience and security, and learn how to:

    * Prepare for unplanned cloud outages
    * Build a globally resilient cloud application
    * Avoid some of the most common mistakes when faced with a cloud outage
  • Synopsis:
    Cyber-risk is one of today’s most high profile business risks. While good cyber-mitigation strategies can reduce this risk, it cannot be eliminated – defences will be breached. The organisation’s ability to respond to and recover from these breaches – its cyber-resilience – is fundamental to its risk management strategy. This session examines cyber risk, the pervasiveness of cyber-incidents and the key steps in building a cyber-resilience strategy.

    About the speaker:
    Alan Calder is chief executive of IT Governance, the single-source provider of books, tools, training and consultancy for IT governance, risk management and compliance.
    He is a leading author on information security and IT governance issues. Alan is the co-author (with Steve Watkins) of the definitive compliance guide, ‘IT Governance: An International Guide to Data Security and ISO27001/ISO27002’.
  • Synopsis:
    The premise behind this talk is to challenge both the technical controls we recommend to developers and also our actual approach to testing.
    We continue to rely on a “pentest” to secure our applications. Why do we think it is acceptable to perform a time-limited test of an application to help ensure security when a determined attacker may spend 10-100 times longer attempting to find a suitable vulnerability? How can we expect developers to listen to security consultants when the consultant has never written a line of code? Why are we still happy with “Testing security out” rather than the more superior “building security in”?
    This talk is sure to challenge the status quo of web security today.

    About the speaker:
    Eoin is international board member and vice chair of OWASP, The Open Web Application Security Project (owasp.org). During his time in OWASP he has lead the OWASP Testing and Security Code Review Guides and also contributed to OWASP SAMM, y and the OWASP Cheat Sheet Series.

    Eoin Keary is the CTO and founder of BCC Risk Advisory Ltd. (www.bccriskadvisory.com) an Irish company who specialise in secure application development, advisory, penetration testing, Mobile & Cloud security and training.

    Eoin has led global security engagements for some of the world’s largest financial services and consumer products companies. He is a well-known technical leader in industry in the area of software security and penetration testing.
  • Is there an opportunity for IT departments to embrace new business models that are more customer centric?

    One of six crowd-sourced questions we posed to the experts at the Unified Communications / Social Business Expo in London.
  • Understand how to create an elastic data center and connect existing networks and application assets to resources in the cloud. AWS will discuss technologies such as VPC and Direct Connect and common use cases from Enterprise customers.
  • In this presentation AWS will talk about some of the transformations that Cloud computing brings to the delivery of IT infrastructure and how enterprises can leverage these changes to create cost efficient, agile and customer focused systems.

Embed in website or blog