Hi [[ session.user.profile.firstName ]]

Application Development

  • The State of IT Resilience 2019 Webinar
    The State of IT Resilience 2019 Webinar
    Jayme Williams, Tencate Recorded: Aug 21 2019 60 mins
    2019 Results are in: 84% weren’t IT resilient enough

    The 2019 IDC State of IT Resilience study found that a whopping 84% of respondents experienced a malicious attack in the past 12 months. Of those organizations who suffered a successful attack, 93%of those attacks resulted in data corruption or loss. Do you know how much a malicious IT attack would cost you?

    Find out how to make your organization IT resilient. Remove the risk of disruption and data loss, which can jeopardize customer loyalty, company reputation, productivity and employee morale. With the average cost of downtime at $250,000 an hour across industries, implementing an IT Resilience strategy is necessary not just to survive, but to go beyond your competitors and thrive.

    Join us to learn more about the 2019 results. Hear Jayme Williams from Tencate discuss how IT resilience is keeping their multi-national advanced-manufacturing operations running 24/7, and the threat of ransomware a non-issue.
  • Ep. 5: Never Alone On Call
    Ep. 5: Never Alone On Call
    Emily Nakashima, Director of Engineering; Ben Hartshorne, Engineer; Alyson van Hardenberg, Engineer Recorded: Aug 21 2019 45 mins
    Switch from deep query to a trace waterfall view and spot outliers with Honeycomb BubbleUp heat-maps - these make debugging effortless and dare we say fun? The Observability that Honeycomb brings literally shifts a Dev team from guessing what the problem may be to knowing exactly how their complex prod is behaving and where in the code the issue lies. Through the experience of all users, dev teams learn faster when they work together and have the same visibility, down to the raw event. We affectionately call it See Prod in Hi-Res.

    In Honeycomb, achieve Team Collaboration through shared charts and boards, and follow the breadcrumbs from your teammates' experiences. With Query History, everyone sees results and can tag according to what’s interesting. It’s organized, intuitive, and easy to follow. Incident response and on-call run much more smoothly when everyone is virtually on-call with you.

    In this webinar, we’ll discuss and show how:

    * Honeycomb's Query History gives rich meaningful context
    * Honeycomb’ers dogfood and learn from each others' compound wisdom
    * Benefits span engineering cycles and use-cases when debugging and maintaining
    * To build a culture of observability and why you should do it now
  • How to Integrate Virtualized Server Environments with NVMe AFAs
    How to Integrate Virtualized Server Environments with NVMe AFAs
    Matt Hebb, Product Marketing, Data Center Systems, Western Digital Recorded: Aug 21 2019 18 mins
    As you likely know, the reason companies deployed virtualization in the beginning was to get more out of their hardware – and make their lives a little easier – it is the very same reason they are deploying it today. As a result, virtualized servers are the defacto standard in today’s data centers. While, it’s true that virtualization lowers IT infrastructure costs and allows enterprises to respond to new business needs quickly, it also creates an additional layer of infrastructure complexity. Complexity that the IT team has to manage across both the ESX and storage array layer.

    We get it – it’s a double-edged sword. Virtualization is meant to lower costs and allow quicker response time, but when the infrastructure becomes complex, the resources required to manage it could increase and offset the savings you were hoping to achieve. Join us for this webinar where we’ll address how IT can more easily manage their virtual environment.

    In this webinar, we’ll introduce you to the IntelliFlash vCenter Plug-in and share how the product offers visibility into storage datastore, offers the ability to self-provision VMs, and provides a consistent snapshot of VM-level performance metrics. In addition to better understanding the IntelliFlash vCenter Plug-in, you will learn:
    >How to simplify your VMware administrative tasks
    >How to take full advantage of All-Flash Arrays to create and deploy denser, faster VMs
  • Simplify Test Data Management for SAP
    Simplify Test Data Management for SAP
    Andreas Günther, Director of TDM Consulting, Anthem Recorded: Aug 21 2019 50 mins
    Finding relevant test data is one of the great pains of testing, and GDPR’s restriction on testing with unmasked production data makes a difficult situation even worse. Once you finally receive (or create) appropriate test data, you still have to inject it into the testing framework and transform it across end-to-end tests.

    The complexities of secure, stateful TDM are further exacerbated in SAP environments, where business processes may cross SAP GUI and SAP Fiori, mainframes, and other packaged apps such as Salesforce— and test data may be scattered across Word files, Excel files, databases, flat files, and SAP systems.

    Join this webinar to learn strategies for simplifying test data management across end-to-end tests that involve SAP. You’ll learn:

    - How to choose the best test data approach (synthetic, masked…) for each task
    - Strategies for managing stateful data across end-to-end tests
    - Options for extracting and masking data from SAP environments such as SAP S/4HANA, SAP NetWeaver, and even SAP BW/4 HANA
  • Automating Operations: Impact of  AI, Machine Learning and Low-Code Development
    Automating Operations: Impact of AI, Machine Learning and Low-Code Development
    Phil Simpson Senior Principal Product Marketing Manager, Red Hat Prakasha Aradhya Director of Product Management, Red Hat Recorded: Aug 21 2019 49 mins
    Business process automation technology is rapidly emerging as a key to success in digital transformation projects. Automation is no longer just a set of business operations workflow items. A collaborative convergence of analytics, artificial intelligence or machine learning (AI/ML), robotic process automation (RPA), low-code development, etc. is changing the marketplace. Businesses are recognizing the value of this unified view in automating operations and decisions to improve the efficiency and agility of business operations—and thereby competitiveness and the bottom line.

    Join us for this session, where we'll explore:

    -Exploiting data analytics to make well informed decisions.
    -Building intelligent, context-sensitive applications.
  • AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    Arun Trivedi Recorded: Aug 21 2019 45 mins
    As AI becomes all-pervasive, more and more companies need to start thinking about how AI can help in their business transformation and optimization journey. According to a Gartner survey, 54% respondents plan to start deployment within the next few years. However, their are multiple barriers, including finding a starting point and fear of the unknown.

    This webinar breaks down AI for the business & IT - what use cases should CIOs and business organizations focus on and how do we get started? What are the possible use cases? How do we even go about thinking about AI in our organization in a structured way?
  • Data Pipelines - Get the most out of your data with Kubeflow & machine learning
    Data Pipelines - Get the most out of your data with Kubeflow & machine learning
    Carmine Rimi - Ubuntu Product Manager & Jan Kanty Milczek - Senior Data Scientist at deepsense.ai Recorded: Aug 21 2019 60 mins
    AI is transforming industries with rapid innovation cycles and unprecedented automation capabilities. With the right frameworks, tools, and processes, machine learning with Kubeflow can help you accelerate your AI business objectives. Kubeflow is a Kubernetes-native platform that includes the most popular machine learning tools and frameworks, like Tensorflow and PyTorch, and is available on your workstation or in the cloud. Recent use cases include expert systems, workflow automation, pattern recognition across real-time data sets, customer relationship management with predictive behavior, and many more.
    The models at the core of this revolution require data - data is the fuel that powers accurate models. How do you get the most from data and ensure it meets your requirements?

    This webinar, in partnership with deepsense.ai will cover:

    How to get started with defining AI project requirements and objectives
    How to prioritize analytical projects in your company
    The challenges involved in collecting and storing data and how to avoid them
    How to extract values and eliminate complexities
    What external sources you should use in your data pipeline
  • Change Your Mind, Change Your Life
    Change Your Mind, Change Your Life
    Mia Zambarano, Psychotherapist, Lifestyle Coach & Author Recorded: Aug 21 2019 53 mins
    Mia Zambarano joins us to discuss the importance of mindset and the way we think.

    Everyone has bad days, but do you have to simply put up with them? What can you do to dispel those nagging self-doubts and expose your potential? Cognitive behavioral techniques help create positive changes in all aspects of life – including business and personal.

    When you take control of your mindset and learn to use it in your favor, success follows. As a licensed psychotherapist, Mia can open a window into your thought processes and show you how they impact our realities. She will discuss how to crush our limiting thoughts and build self-belief.
     
    Learn how to:
    - Use the power of your mind for good
    -Crush negative thought processes and behaviors
    -Harness your super powers and control and create the life you want

    About Mia:

    Mia Zambarano is a Licensed Psychotherapist and Lifestyle Coach, specializing in cognitive behavioral work. Mia has worked as a psychotherapist in since 2015; where she specializes in child, adolescent and family therapy. In her coaching practice, Mia focuses on empowering individuals to create positive changes and improve their overall wellness. Mia received her Master’s in social work in 2015 from Boston University and has a Bachelor of Science in psychology from Sacred Heart University.

    Mia’s work involves understanding what contributes to our reality, the interactions between our thoughts, feelings, and actions, and ways to create a better reality for ourselves through better insight and positive thinking.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    John Grim, Senior Manager, PS Advisory Services Recorded: Aug 21 2019 81 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Erika Gifford, Senior Manager, GSS | Security Operations Advisory
    •Hayden Williams, Senior Manager, VTRAC | Investigative Response
    •John Grim, Managing Principal, VTRAC | Innovations and Development
    •David Kennedy, Managing Principal, VTRAC | Open Source Intelligence

    Preparing for and responding to data breaches and cybersecurity incidents is never easy. It takes knowledge of your environment and its unique threats, effective teamwork, and just as importantly, a rigorous Incident Response (IR) Plan. We'll introduce our monthly listeners to the VIPR Report – the Verizon Incident Preparedness and Response Report. We'll provide a high-level overview of our findings across three years of IR Plan assessments and data breach simulations. Insight will include:

    •Observations and recommendations across the six phases of incident response
    •Top takeaways for building a solid IR Plan and capability
    •Breach Simulations Kits and using these resources to run data breach tabletop exercises

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • [Ep.1]: AI Drives Measurable Success in Customer Engagement
    [Ep.1]: AI Drives Measurable Success in Customer Engagement
    Robin Gareiss, President & Founder, Nemertes Research Recorded: Aug 21 2019 60 mins
    Intelligent Customer Engagement Series [Ep.1] AI Drives Measurable Success in Customer Engagement

    Nearly 50% more companies are using or planning to use AI in their customer engagement initiatives.
    Nemertes recently studied how 518 companies are using AI and analytics to improve their customer experiences. This webinar details:
    • how these companies use AI
    • what measurable improvements resulted.
  • Simplify Test Data Management for SAP
    Simplify Test Data Management for SAP
    Andreas Günther, Director of TDM Consulting, Anthem Recorded: Aug 21 2019 50 mins
    Finding relevant test data is one of the great pains of testing, and GDPR’s restriction on testing with unmasked production data makes a difficult situation even worse. Once you finally receive (or create) appropriate test data, you still have to inject it into the testing framework and transform it across end-to-end tests.

    The complexities of secure, stateful TDM are further exacerbated in SAP environments, where business processes may cross SAP GUI and SAP Fiori, mainframes, and other packaged apps such as Salesforce— and test data may be scattered across Word files, Excel files, databases, flat files, and SAP systems.

    Join this webinar to learn strategies for simplifying test data management across end-to-end tests that involve SAP. You’ll learn:

    - How to choose the best test data approach (synthetic, masked…) for each task
    - Strategies for managing stateful data across end-to-end tests
    - Options for extracting and masking data from SAP environments such as SAP S/4HANA, SAP NetWeaver, and even SAP BW/4 HANA
  • Protecting your Portal from File-based Malware
    Protecting your Portal from File-based Malware
    John Stevenson Recorded: Aug 21 2019 32 mins
    About this Webinar:

    The essential everyday business requirement of receiving uploaded content from the internet opens the user to significant risk from attackers, intent on stealing the user’s credentials and/or compromising the endpoint device to gain access to the corporate network.
    Uploaded documents contain malware specifically designed to bypass reverse Web proxies, Firewalls/WAFs, AV and sandboxes. Thankfully there are steps you can take to eliminate the threat.

    On Wednesday 21st August, join Deep Secure’s Head of Content John Stevenson – a 25 year veteran of the cyber security industry - and learn what it takes to stop document-based malware getting in via your portal. You’ll find out:

    •How the typical security stack deals with the advanced threat
    •How to add-in “zero trust security”
    •Tips and tricks for ensuring documents are 100% threat-free

    You’ll also get to see just how easy it is for one of the most common and notorious pieces of malware on the planet can escape detection and walk right through your defences!
  • Formulating an Agile Integration Strategy in the Hybrid Multi-Cloud Era
    Formulating an Agile Integration Strategy in the Hybrid Multi-Cloud Era
    Sameer Parulkar, Senior Product Marketing Manager, Red Hat Sameer Parulkar is a Senior Product Marketing Manager for Red Hat Recorded: Aug 20 2019 57 mins
    The need for competitive advantage has driven organizations towards cloud computing, agile programming, and the move toward DevOps unification; and, it’s forced the modernization of IT architecture using innovative technologies such as containers, microservices, and artificial intelligence.

    But unintended consequences now burden organizations with disaggregated IT infrastructure composed of redundant data centers, multi-clouds, managed services, edge computing, devices, and things. To cope, business and IT leaders must conceptualize new agile means to integrate workloads across highly distributed and disparate hybrid multi-cloud architecture.

    During this webcast we discuss:
    - the fundamental elements of strategic analysis and techniques needed to create new competitive advantage
    - how to identify the essential technologies needed for the modern digital business
    - how next-generation hybrid integration platforms can support strategic and transformative initiatives
    - how some customers have embarked on this journey and their learnings
    - the strategy and practices needed to enable and deploy agile integration in the hybrid multi-cloud era
  • Achieve Development Speed and Code Quality with Behavior Testing
    Achieve Development Speed and Code Quality with Behavior Testing
    Dr. David Brumley Recorded: Aug 20 2019 41 mins
    Join Dr. David Brumley, CEO of ForAllSecure, as he shares a proven method known as behavior testing for achieving both development speed and code quality. In this session, viewers will learn:
    -How to add continuous behavior testing to their shift-left strategy.
    -How behavior testing can help organizations not only develop quickly and securely, but also manage inherited risk from developers’ software supply chain.
    -Real-world use cases on how behavior testing is used to secure Dockerized applications.
  • (ISC)²’s Digital Transformation Journey - Part 2
    (ISC)²’s Digital Transformation Journey - Part 2
    Bruce Beam, (ISC)²; Beth Paredes, (ISC)²; Sommer Hess, (ISC)²; Brandon Dunlap (Moderator) Recorded: Aug 20 2019 58 mins
    (ISC)² recently completed our multi-year Digital End-to-End Transformation (DETE) project, which positions us to deliver a more a seamless and user-friendly experience to all members. In addition to revamping our online presence, we launched a new Learning Management Systems where members can access all the courses developed by our Professional Development Institute. In Part 2 of the (ISC)² Digital End-to-End Transformation (DETE) will examine how (ISC)² executed the plan for the project, following the AGILE Project Management framework and the buy-in and support from other departments and stake holders within the organization. Additionally, there was board governance and oversight to contend with. Join Bruce Beam, CIO; Beth Paredes, Sr. Corporate Member Services Manager; and Sommer Hess, Director PMO, Quality and Training on August 20, 2019 at 1:00PM Eastern for a discussion on these items and the speed bumps that were run into on this project.
  • Security Tool Misconfiguration and Abuse
    Security Tool Misconfiguration and Abuse
    Thomas Richards, Network and Red Team Practice Director Recorded: Aug 20 2019 40 mins
    As any security program matures, it will use tools and techniques to automate processes to improve the security posture of the organization. This includes asset management and discovery, patch management, deploying software, and vulnerability discovery. However, if these tools are improperly configured, they can lead to a total compromise of your network by an attacker. In this talk we will go over a few case studies of abusing these tools while on penetration tests as well as remediation methods to prevent these attacks from occurring.
  • ¡No es Magia, Es DevSecOps!
    ¡No es Magia, Es DevSecOps!
    Ronen Riesenfeld, Sales Engineer Checkmarx Recorded: Aug 20 2019 61 mins
    La seguridad perimetral, el análisis dinámico y otras soluciones de seguridad no estática dan una incorrecta percepción de que las aplicaciones están seguras, percepción que reduce el sentido de urgencia por la implementación holística de la seguridad. Las soluciones de seguridad estática, fortalecen los cimientos de las aplicaciones sin entorpecer los procesos e integrándose de manera orgánica como por arte de magia, facilitando así el desarrollo seguro a alta velocidad

    ¿QUÉ APRENDERÁS EN ESTE WEBINAR?

    Aprenderá que nos motiva a la prevención y su relación con la seguridad en aplicaciones; se explicará que es la seguridad en las Aplicaciones, su importancia y mejores prácticas de la industria.
    Se explicarán las distintas soluciones de seguridad en aplicaciones dentro del ciclo de desarrollo y las tendencias actuales en seguridad en desarrollo de aplicaciones.
    Descubrirá las distintas maneras de integrar la seguridad en aplicaciones dentro del ciclo de desarrollo y las maneras más eficientes de remediar vulnerabilidades.
    Conocerá sobre la administración del Software Expuesto y su integración dentro de DevSecOps
  • Introducing Events and Stream Processing into Nationwide Building Society.
    Introducing Events and Stream Processing into Nationwide Building Society.
    Rob Jackson, Head of Application Architecture at Nationwide Building Society Recorded: Aug 20 2019 49 mins
    Open Banking regulations compel the UK’s largest banks, and building societies to enable their customers to share personal information with other regulated companies securely. As a result companies such as Nationwide Building Society are re-architecting their processes and infrastructure around customer needs to reduce the risk of losing relevance and the ability to innovate.

    In this online talk, you will learn why, when facing Open Banking regulation and rapidly increasing transaction volumes, Nationwide decided to take load off their back-end systems through real-time streaming of data changes into Apache Kafka®. You will hear how Nationwide started their journey with Apache Kafka®, beginning with the initial use case of creating a real-time data cache using Change Data Capture, Confluent Platform and Microservices. Rob Jackson, Head of Application Architecture, will also cover how Confluent enabled Nationwide to build the stream processing backbone that is being used to re-engineer the entire banking experience including online banking, payment processing and mortgage applications.
  • Reaching new customers by optimizing your product data
    Reaching new customers by optimizing your product data
    Hamaad Chippa, Director of Industry Consulting and Roland O Ehigiamusoe, Senior Manager, Consumer, Analytics and Cognitive Recorded: Aug 20 2019 32 mins
    Retailers are looking to reach customers in as many channels as possible – stores, e-commerce, mobile applications, and partner marketplaces. As one can imagine, managing these various touchpoints and relationships can be complex, especially ensuring information about products are properly defined. As online shopping grew in popularity, retail organizations stood-up dedicated support teams to manage sales and marketing, separate from the rest of the business. Customers now expect retailer companies to interact with them in a seamless manner, regardless of channel.To guarantee brand continuity, a uniform customer experience, and high customer satisfaction, retailers must diligently manage product data, making sure that products are represented properly across all channels. With better product information and insight, retailers will be to engage with customers in a more personal and meaningful way, driving additional revenue.
  • The Rise of Real-Time Event-Driven Architecture
    The Rise of Real-Time Event-Driven Architecture
    Tim Berglund, Sr. Director Developer Experience, Confluent Recorded: Aug 19 2019 35 mins
    Businesses operate in real-time and the software they use is catching up. Rather than processing data only at the end of the day, enterprises are seeking to react to it continuously as the data arrives.

    This is the emerging world of stream processing. Apache Kafka® was built with the vision to become the central nervous system that makes data available in real-time to all the applications that need to use it.

    This talk explains how companies are using the concepts of events and streams to transform their business to meet the demands of this digital future and how Apache Kafka® serves as a foundation to streaming data applications.
  • The 5 Key AI Takeaways for Today's C-Suite (Presented from the UK)
    The 5 Key AI Takeaways for Today's C-Suite (Presented from the UK)
    John Spooner, H2O.ai and John Howe, H2O.ai Recorded: Aug 19 2019 51 mins
    Due to popular demand, we are presenting this webinar at a UK-friendly time!

    This discussion will explore real-world examples and how to democratize AI in your organization.

    1. Build a Data science culture
    2. Ask the right questions
    3. Connect to the community
    4. Technology considerations
    5. Trust in AI
  • Scaling DevOps Episode 2: Scaling CI Environments
    Scaling DevOps Episode 2: Scaling CI Environments
    Roni Dover, Director of Sales Innovation & Meni Besso, Product Manager Recorded: Aug 15 2019 16 mins
    It can be easy to do cutting edge DevOps for small teams working on small-scale projects. However, different problems start to emerge when scaling DevOps processes and operations to multiple (sometimes distributed) teams, complex deployments, multiple technologies (Kubernetes, instances, and serverless functions), and critical production systems with millions of users being affected by each change.

    In the second episode in the series, we will discuss the specific challenges DevOps engineers and developers face in scaling cloud environments for continuous integration and CI tools such as Jenkins or Teamcity. We will discuss how we view the 'shift left' movement and how it impacts the complexity of developing scalable end-to-end automation for your cloud environments.
  • Case Study: Real-World Applications of Business Process Automation & Management
    Case Study: Real-World Applications of Business Process Automation & Management
    Antonio Valle Gutierrez Global Head of BPM Architecture at BBVA Recorded: Aug 15 2019 28 mins
    Business processes touch every aspect of the way an organization runs. Therefore, business process automation cannot be an isolated environment. BPM can be a compelling part of a larger strategy, where business leaders can create the rules to achieve new innovation and business objectives.

    At BBVA, we have created a new global process automation platform, building on new technological trends, which allows both our business teams and our developers to focus on the needs of our customers. This session will cover:

    • How we integrated business goals into our new BPM platform
    • How we transformed our process developers
    • How we used Red Hat Process Automation Manager to create a new cloud-based BPM platform
    • How we defined KPIs for processes optimization
    • Some of the challenges and lessons we learned over the course of the project
  • The Power of 2: How Automated Threat Hunting & ATT&CK Can Work Together
    The Power of 2: How Automated Threat Hunting & ATT&CK Can Work Together
    Jason Bevis, VP Global Threat Hunting, Cylance; Alex Holden, CISO/Pres, Hold Security, Chip Wagner, Sec Analytics, IBM Recorded: Aug 15 2019 59 mins
    Many organizations are so busy responding to and remediating indents that they don’t have the time, resources or framework for being proactive and searching for these threats. Automation (artificial intelligence or machine learning) can provide actionable intelligence quickly without being a resource drain. Pairing automation with a threat hunting framework like the MITRE ATT&CK can help to build an overarching strategy for addressing this critical area. Join BlackBerry Cylance and (ISC)² on August 15, 2019 at 1:00PM Eastern for a discussion on how to better and more quickly identify malicious behaviors and how a model of continuous improvement can benefit an organization.
  • Cloud-Native Operations with Kubernetes and CI/CD
    Cloud-Native Operations with Kubernetes and CI/CD
    Paul Czarkowski, Principal Technologist, Pivotal Software Recorded: Aug 15 2019 62 mins
    Operations practices have historically lagged behind development. Agile and Extreme Programming have become common practice for development teams. In the last decade, the DevOps and SRE movements have brought these concepts to operations, borrowing heavily from Lean principles such as Kanban and Value Stream Mapping. So, how does all of this play out if we’re using Kubernetes?

    In this class, Paul Czarkowski, Principal Technologist at Pivotal, will explain how Kubernetes enables a new cloud-native way of operating software. Attend to learn:

    ● what cloud-native operations are;
    ● how to build a cloud-native CI/CD stack; and
    ● how to deploy and upgrade an application from source to production on Kubernetes.

    We look forward to you joining us.
  • Reimagine Data Governance: Data Governance. Meet Data Security.
    Reimagine Data Governance: Data Governance. Meet Data Security.
    Andy Joss, Head of Solutions & Data Governance, Steve Holyer, Solutions Specialist, Informatica Aug 22 2019 4:30 am UTC 58 mins
    With organizations collecting an ever-increasing volume of data, the risk of a data breach or falling foul of a regulator is also increasing. Data security, privacy and protection is fast becoming a “must have” requirement within many data programs.

    Organizations are starting to realize that there are potentially great synergies in having a much closer understanding of their data from both a governance and security viewpoint. Add in Artificial Intelligence and automation for remediation, together these capabilities are proving to be significant allies in the continuous battle of cyber-security and enabling Data Governance programs.

    This webinar explores how these two worlds can now better understand the role that each has to play, in supporting and protecting their organization.

    As part of the Reimagine Data Governance series of webinars, Informatica will demonstrate how having a closer relationship between the worlds of governance and security can enhance existing data use and data security capabilities. And how you, in taking that holistic approach, can provide governed and protected data to achieve key business outcomes.
  • IAST Stories From the Field
    IAST Stories From the Field
    Michael Haddon IAST Evangelist for North America Aug 22 2019 6:00 am UTC 39 mins
    As DevOps continues along its path of domination, organizations are seeking to make use of application security testing tools that leverage automation and easily scale up.

    With that, we see that Interactive Application Security Testing (IAST) is gaining increasing momentum.

    Join industry-experts Michael Haddon for insights on:
    •Why customers are seeking IAST solutions
    •Common IAST use cases
    •How customers are using IAST successfully
    •The benefits customers gain from using IAST
  • Cloud Native – Everything a Security Professional Needs to Know
    Cloud Native – Everything a Security Professional Needs to Know
    Colin Domoney DevSecOps Consultant & Adam Reyland, Regional Marketing Specialist at Veracode Aug 22 2019 10:00 am UTC 45 mins
    The Cloud Native Computing Foundation is home to literally hundreds of projects enabling developers to embrace every benefit of cloud native development from container deployment and orchestration to monitoring and messaging.

    This webinar gives an overview of the work of the Cloud Native Computing Foundation; highlights a few flagship projects such as Kubernetes and Istio; and explains how these projects are transforming the way developers work. Security practitioners will benefit from insights into how these new technologies and projects can be applied to ensure that cloud native applications are also natively secure by design.
  • Security Symposium - Morning Sessions
    Security Symposium - Morning Sessions
    Red Hat Aug 22 2019 1:00 pm UTC 210 mins
    Join Red Hat senior principal security global technical evangelist and strategist, Lucy Kerner, talking about automating security and compliance for hybrid environments. Followed by Dan Walsh, senior consulting software engineer, sharing container security and container technologies like kubernetes, buildah, and podman. Followed by a short Q&A, join live to submit your questions on August 22.
  • Defense in Depth: Key Learnings for Achieving Detection and Response Everywhere
    Defense in Depth: Key Learnings for Achieving Detection and Response Everywhere
    Gene Stevens, Dave Gold Aug 22 2019 2:00 pm UTC 60 mins
    Join Gene Stevens and Dave Gold, executive leaders from ProtectWise (acquired by Verizon in March 2019) who will discuss the essential components of a robust detection and response strategy. They will talk about the limitations and challenges with the security models that many organizations still have in place today, before opening up the conversation on how to modernize your cyber detection and response to support today's business environment and to transition to a state of advanced threat detection. Gene and Dave will cover the building blocks that make up a holistic and comprehensive detection and response infrastructure and how threat data from multiple sources can be brought together with analytics and machine learning to provide rationalized and actionable intelligence. They will deconstruct an attack and provide guidance on how to identify the exposure points in your systems. Walk away with a much clearer idea on how to improve and reinforce your defenses with proactive threat identification and root cause analysis.
  • Meraki Automation – Multi-Org Management
    Meraki Automation – Multi-Org Management
    Matthew DeNapoli, Developer Advocate, Cisco DevNet Aug 22 2019 3:00 pm UTC 45 mins
    Meraki’s Dashboard is a great and powerful tool for network management and monitoring but it’s limited by the very thing that makes it powerful; it has to be everything to everyone and that granularity can make it overwhelming to use on a day-to-day basis. All enterprises, large and small, have their own way of doing things and this pertains to network management and monitoring as well. In this session, you’ll be introduced to APIs, code, and tools that will allow an organization to build out dynamic interactions with the Meraki platform that aligns with the way that their teams do the business of networking.
  • WebRTC and You
    WebRTC and You
    Adam Bavosa Aug 22 2019 4:00 pm UTC 20 mins
    Have you ever thought about building your own Skype or Google Hangouts video chat? It is necessary in futuristic connected shared experiences. Here’s the easy way to do it!
    Adam will go over: - What WebRTC is - Why it is important for developers - How it works - The necessary code to integrate WebRTC into a video chat app - and finally, write a simple website that uses WebRTC. Audience members need only a basic understanding of front-end web development to be engaged.
    PubNub has been an essential resource for WebRTC app development since its inception. Adam Bavosa has taken it upon himself to learn how to develop thoroughly with PubNub and WebRTC, so he can spread the word, and reduce friction for developers building video chat.
  • Top 5 Podcasts: Helping Industrial IoT Become a Reality with Dr. Richard Soley
    Top 5 Podcasts: Helping Industrial IoT Become a Reality with Dr. Richard Soley
    Ed Maguire, Principal Partner, Momenta Partners & Dr. Richard Soley, Chairman and CEO of the Object Management Group Aug 22 2019 4:00 pm UTC 46 mins
    Richard Soley is Chairman and CEO of the Object Management Group, Executive Director of the Industrial Internet Consortium (IIC) and founding partner of the IoT Solutions World Congress. In this special edition of the Edge Podcast recorded on site in Barcelona, he shares some of the notable developments coming out of the conference.

    The IoT Solutions World Congress is differentiated from other events through the focus on end users and case studies, showcasing test bed work shepherded by the IIC. In our conversation, Richard Soley shares stories and examples of notable work underway, the potential for productivity gains across industries, and the view that manufacturing represents the industry with the most to gain from connecting assets and advanced analytics. Additionally he discusses the launch of the IIC’s new Resource Hub. Finally he shares a fascinating story about standards that connected the design of Space Shuttle booster with the Ancient Romans.
  • The 5 Must-Do’s When Implementing Cloud-Native Security in Red Hat OpenShift
    The 5 Must-Do’s When Implementing Cloud-Native Security in Red Hat OpenShift
    Jorge Salamero Sanz, Director of Technical Marketing Aug 22 2019 5:00 pm UTC 45 mins
    Security is one of the biggest challenges in the day 2 operations journey for the cloud-native stack. New paradigms like containers, microservices and hybrid cloud workloads disrupt the way enterprises implement security processes.

    In this webinar, Sysdig shares the five (5) most important steps for securing applications and implementing DevSecOps processes in the OpenShift container platform. You will learn how to:

    --Orchestrate Red Hat OpenShift platform security features
    --Integrate vulnerability management across your CI/CD pipeline and software supply chain
    --Manage regulatory compliance, audit, and risk
    --Detect and respond to security incidents performing forensics
    --Maintain visibility into containerized apps to provide reliable operations

    You will walk away with a bunch of ideas for how to set up guardrails for your DevOps team and enable your organization to move more applications into the OpenShift platform with confidence and success.

    Who Should Attend:
    --Those who have completed OpenShift 101
    --Cloud-native Enterprise / Security / System Architects
    --DevOps & Site Reliability Engineers (SRE)
    --Security Analysts, Compliance Managers, and Incident Responders
  • Conversational AI: Go beyond chatbots with intelligent customer and employee exp
    Conversational AI: Go beyond chatbots with intelligent customer and employee exp
    Kevin Fredrick, Managing Partner, OneReach.ai and Vishnu Samevedula, Senior Solution Engineer, ISV Partnerships Aug 22 2019 5:00 pm UTC 44 mins
    In this webinar we’ll attempt to go around the chatbot hype. With conversational AI, your customers and employees get the answers they need fast. It’s more than simple “if-then” logic; it incorporates natural language to make human-to-machine conversations more like human-to-human ones. The result? Increased customer engagement, continued trust and reliability in your business, and the ability to free up your best thinkers and doers to become more productive than ever before.

    Watch this live webinar to learn how to:
    - Automatically parse data, intent, and tasks from customer interactions using the power of Anypoint Platform combined with no-code/low-code conversational AI solutions from OneReach.ai
    - Build task-specific, channel-agnostic experiences by integrating data from systems and channels like Slack, SMS, Voice, WhatsApp, and Facebook Messenger.
    - Retool your team for operational efficiency by automating the known, handing off the unknown, and more.
  • Making Microservices Smarter with Istio, Envoy and Pivotal Service Mesh
    Making Microservices Smarter with Istio, Envoy and Pivotal Service Mesh
    Brian McClain, Assoc. Principal Product Marketing Manager & Tyler Britten, Sr. Principal Technologist, Pivotal Aug 22 2019 5:00 pm UTC 60 mins
    As the popularity of microservices continues to rise, so does the need for an efficient means of intercommunication. Features such as service discovery, client-side load balancing, and circuit breakers become invaluable tools as the complexity of your landscape grows. Thus, the rising popularity of the service mesh as means of delivering those capabilities.

    While this technology space is still young, Istio and Envoy have already become the tools that many use to solve these problems. The Pivotal Application Service (PAS) integration with these solutions introduced weighted routing and guaranteed service identity—and now we’re bringing these features to Pivotal Container Service (PKS) via the new Pivotal Service Mesh.

    In this webinar, we’ll explore why a service mesh matters and how Pivotal Service Mesh works, and we’ll give you a sneak peak into its future.
  • Gigamon Part #2 - Unleash the Power of True Application Visibility
    Gigamon Part #2 - Unleash the Power of True Application Visibility
    John Gudmundson, Senior Product Marketing Manager, Brandon Dunlap (Moderator) Aug 22 2019 5:00 pm UTC 60 mins
    You know that metadata helps you separate signal from noise, reduce time-to-threat-detection and improve overall security efficacy. But did you know that application metadata helps you monitor user experience, troubleshoot problematic apps, understand “Shadow IT” usage and improve security posture within your organization? Join Gigamon and (ISC)² on August 22, 2019 at 1:00 PM Eastern as we discuss the growing need for application-aware network operations and how Gigamon Application Metadata Intelligence provides the deep application visibility needed to rapidly pinpoint performance bottlenecks and potential network security risks. You’ll see how next-gen network packet brokers enhance metadata with intelligence and insights from traffic flows and discover how to understand the performance and control of hundreds of critical apps.
  • Scaling DevOps Episode 3: Scaling Environment Complexity and Orchestration
    Scaling DevOps Episode 3: Scaling Environment Complexity and Orchestration
    Roni Dover, Director of Sales Innovation & Alex Azrah, Senior Engineer Aug 22 2019 5:30 pm UTC 17 mins
    DevOps cloud environments are becoming more complex and heterogeneous in the technologies and infrastructure types they include. As environments are shifting left to provide early integration with production architectures, they can include a combination of VMs, Kubernetes instances, serverless functions, and PaaS services and also the orchestration to set everything up, import data and artifacts and glue everything together. In this episode, we will discuss the challenges of automation complex environments end-to-end and as always bring up some principles that can help us manage that complexity.
  • What's New in H2O Driverless AI
    What's New in H2O Driverless AI
    Arno Candel, CTO at H2O.ai Aug 22 2019 6:00 pm UTC 60 mins
    H2O Driverless AI employs the techniques of expert data scientists in an easy to use platform that helps scale your data science efforts. Driverless AI empowers data scientists to work on projects faster using automation and state-of-the-art computing power from GPUs to accomplish tasks in minutes that used to take months. In this webinar we'll highlight what's new in Driverless AI.

    Arno's bio:
    Arno Candel is the Chief Technology Officer at H2O.ai. He is the main committer of H2O-3 and Driverless AI and has been designing and implementing high-performance machine-learning algorithms since 2012. Previously, he spent a decade in supercomputing at ETH and SLAC and collaborated with CERN on next-generation particle accelerators.

    Arno holds a PhD and Masters summa cum laude in Physics from ETH Zurich, Switzerland. He was named “2014 Big Data All-Star” by Fortune Magazine and featured by ETH GLOBE in 2015. Follow him on Twitter: @ArnoCandel.
  • Forrester Research: Why agile integration is critical to digital transformation
    Forrester Research: Why agile integration is critical to digital transformation
    Jeffrey S. Hammond, Vice President, Principal Analyst, Forrester Research Aug 23 2019 3:00 pm UTC 32 mins
    Jeffrey S. Hammond, Vice President, Principal Analyst, Forrester Research discusses the importance of agile integration in digital transformation initiatives. Recorded during Red Hat's Microservices, Containers, API's an Integration Day on May 21, 2019 in Chicago, IL.

    About the speaker:
    Jeffrey helps CIOs and digital leaders succeed by working with them to improve their software delivery capability and by helping them assess the relevance of emerging software technologies. As a 25-plus-year software industry veteran, he's helped clients improve their development shop culture, apply Agile and continuous delivery best practices, and build successful developer ecosystems.
  • Migrating to AWS and Cloud-native architecture Through App Connectivity
    Migrating to AWS and Cloud-native architecture Through App Connectivity
    Philip Griffiths Aug 27 2019 7:00 am UTC 30 mins
    Modern businesses are migrating towards cloud-first architectures, containerized microservices, and DevOps cultures in order to be innovative and rapidly bring new applications to market.
    But there’s a problem: Traditional networking technologies weren’t designed to support today’s complex application development environments. They are inflexible, complicated to manage and open enterprises to a host of new security challenges. The webinar will be delivered by NetFoundry, an Advanced Technology partner for AWS, as well as utilise customer challenges and use cases.

    Join this webinar to learn on:

    The ‘3rd option’ for connecting to AWS; private network benefits without private network hardware and wires
    How application connectivity (or ‘AppWANs’) increase your businesses agility and efficiency
    The benefits of app connectivity being integrated into your favourite tools like AWS CloudEndure and CloudFormation
    The role of Zero Trust in securing the world of application development
    The benefits of automating networking within CI/CD pipelines and workflows
    How Connectivity-as-Code based solutions can reshape your DevOps strategy

    If you are responsible for the development and deployment of applications, infrastructure or migrations, you won’t want to miss this educational webinar.

    Live online Aug 27 09:00 am European Summer, 10:00 am Finnish Summer
  • Unlocking Business Opportunities with the right Hybrid Cloud Platform
    Unlocking Business Opportunities with the right Hybrid Cloud Platform
    Brian Gracely, Director Product Strategy, OpenShift, Red Hat Aug 27 2019 3:00 pm UTC 55 mins
    Successful companies are measuring success from "idea to execution" in weeks and months. Getting there means navigating nearly unlimited technical choices, for both application and operations teams. Learn how leading companies are making the right choices for their Hybrid Cloud, to drive new market opportunities and greater business success.

    Brian Gracely (@bgracely) is Director of Product Strategy at Red Hat, focused on OpenShift. He brings 20+ years of experience in Strategy, Product Management, Systems Engineering, Marketing and M&A. He is recognized as an industry thought-leader in Cloud Computing and DevOps, as well as being co-host of the award-winning podcast, The Cloudcast (@thecloudcastnet) and weekly Kubernetes podcast @PodCTL.
  • 10 Tips for Achieving Cultural Change in DevOps
    10 Tips for Achieving Cultural Change in DevOps
    Jeffrey Martin (Director of Product, WhiteSource) Aug 27 2019 3:00 pm UTC 60 mins
    DevOps success depends on three things: people, processes and tools. While tools and processes can be easy enough to address, the people part of the equation can be more difficult to tackle. Changing the culture of an organization can be akin to turning a cruise ship midstream. This webinar offers 10 tips to help employees let go of traditional ways of working and embrace DevOps.
  • OpenShift roadmap: what the next year means to you, to us, and the industry
    OpenShift roadmap: what the next year means to you, to us, and the industry
    Mike Barret, Rob Szumski, Marc Curry, Brian "Redbeard" Harrington and Tushar Katari - Red Hat Aug 27 2019 3:30 pm UTC 55 mins
    Come to this session to see what it OpenShift means to you. What are the technology enhancements in 2019 and into 2020 that will change the way we think about compute, development, and how we best use these technologies on-premise and in public clouds. In a first look, we'll demonstrate new features and explain where we're taking Red Hat OpenShift and why. Don't miss this session!

    Presenters:
    Mike Barret, Director of Product Management, Red Hat
    Rob Szumski, Product Manager, Red Hat
    Marc Curry, Senior Principal OpenShift Product Manager, Container Infrastructure, Red Hat
    Brian "Redbeard" Harrington, Principal Product Manager, Red Hat
    Tushar Katari, OpenShift Product Manager, Red Hat
  • Kickstarting appdev on OpenShift in 5 minutes
    Kickstarting appdev on OpenShift in 5 minutes
    Andre Lee Rubinger, Software Engineering Manager, Red Hat Aug 27 2019 4:30 pm UTC 55 mins
    This session explains how Red Hat fixed cloud application creation. We'll introduce a simple, yet comprehensive, way to build and deploy new applications on Red Hat OpenShift Container Platform in under 5 minutes. We'll demystify common appdev tasks on Red Hat OpenShift Container Platform by uncovering the basics tenants. Join this session to:

    - Create a new modern, front-end application, built with NPM/Yarn and served as static files.
    - Provision a new database or messaging system.
    - Share authentication information between application code and connected services.

    Come ready to dig under the covers and start to learn the cloud development concepts behind our simplified getting started flows.
  • Why Everything You Knew about Monitoring is Wrong in the Cloud-Native World
    Why Everything You Knew about Monitoring is Wrong in the Cloud-Native World
    Daniella Pontes, Senior Manager of Product Marketing at InfluxData, Jason Bloomberg, President of Intellyx Aug 27 2019 5:00 pm UTC 60 mins
    Kubernetes is more than a container orchestration platform. It’s a harbinger of a new paradigm for IT we’re calling cloud-native computing.

    The cloud-native world recognizes that containers and microservices are inherently ephemeral, and that the massive scalability and performance we expect from applications and services depends upon that ephemerality.

    Monitoring such radically dynamic environments is nothing like IT monitoring used to be. Statelessness, real-time behavior, and abstractions that drive configurations, security, and integration are core to cloud-native computing. These all require a fundamentally different approach to monitoring in order to provide the visibility and control that organizations require to keep this new infrastructure paradigm working at full bore.

    Join Daniella Pontes, Senior Manager of Product Marketing at InfluxData and Jason Bloomberg, president of industry analyst firm Intellyx, for a provocative discussion of the new cloud-native computing paradigm and the monitoring challenges organizations face.

    Attendees of this webinar will:

    -Gain a broad understanding of what it means to be cloud-native

    -Understand the particular monitoring challenges cloud-native infrastructures present

    -Learn how InfluxData’s cloud-native TICK Stack centered on its InfluxDB purpose-built time-series database was built from the ground up to resolve the monitoring challenges organizations face as they move to cloud-native infrastructure.
  • Optimizing DevOps Initiatives: The View from Both Sides of the DevOps Divide
    Optimizing DevOps Initiatives: The View from Both Sides of the DevOps Divide
    Dennis Drogseth, VP of Research, EMA and Mark Levy, Product Marketing Director, Micro Focus Aug 27 2019 5:00 pm UTC 60 mins
    What separates successful DevOps initiatives from unsuccessful ones? The answer to this and many other questions will be examined in this new research webinar presented by leading IT analyst firm Enterprise Management Associates (EMA).

    Join us as Dennis Drogseth, VP of Research at EMA provides observations and recommendations for successful DevOps implementations. Dennis will draw from a recent EMA survey of 400 global respondents spanning development, operations, IT service management (ITSM) teams and executive IT.

    This webinar will address DevOps initiatives from many perspectives. Topics covered will include pipeline activities, stakeholders, technological impacts including analytics and automation, roadblocks in terms of both tools and teams, organizational perspectives, best practices, and more.
  • Building a world-class sales organization
    Building a world-class sales organization
    Dell for Entrepreneurs Aug 27 2019 5:00 pm UTC 60 mins
    The quality of your sales force has a direct, accumulating, impact on your business as you grow – and building it from the ground up is the way you turn your business into a world-class sales organization. But it's not just about how many clients you're speaking to or closing, but how many clients feel like your sales team partners with them as true advisors.

    Join this VB Live event to learn the essential strategies and key best practices for small and mid-sized companies to not just keep up with your competition but pull ahead.

    Register for free now!

    Attend this webinar and learn:
    * How to effectively hire and train a top sales force
    * What the smartest sales quotas look like, and how to set them
    * How to create and implement business management systems
    * What motivates sales teams, and how to take advantage
    * What an effective sales culture looks like and how to build one

    Speakers:
    * Burt Powers, Senior Director of Dell Small Business Sales
    * Stewart Rogers, Analyst At Large, VentureBeat
  • Transforming Employee Experience with Intelligence
    Transforming Employee Experience with Intelligence
    Jane Foreman, Citrix and Laura Kaminski, Citrix Aug 27 2019 6:00 pm UTC 34 mins
    With app and data sprawl at an all-time high, the way we work has never been more convoluted. The complexity that most modern workers experience, demands advances in technology to group and filter workflows—enabling increased productivity without switching apps and devices.

    Citrix recently unveiled new Citrix Workspace intelligence features, incorporating feedback from customers, to address the core challenges in today’s evolving workspace. Watch this webinar to discover how Citrix Workspace is organizing work for employees and enhancing their productivity by:
    •Eliminating frequent switches across apps to increase focus
    •Delivering one universal search across your entire workspace
    •Prioritizing notification feeds and using machine learning to automate tasks