Hi [[ session.user.profile.firstName ]]

Application Development

  • Scaling DevOps Episode 2: Scaling CI Environments
    Scaling DevOps Episode 2: Scaling CI Environments
    Roni Dover, Director of Sales Innovation & Meni Besso, Product Manager Recorded: Aug 15 2019 16 mins
    It can be easy to do cutting edge DevOps for small teams working on small-scale projects. However, different problems start to emerge when scaling DevOps processes and operations to multiple (sometimes distributed) teams, complex deployments, multiple technologies (Kubernetes, instances, and serverless functions), and critical production systems with millions of users being affected by each change.

    In the second episode in the series, we will discuss the specific challenges DevOps engineers and developers face in scaling cloud environments for continuous integration and CI tools such as Jenkins or Teamcity. We will discuss how we view the 'shift left' movement and how it impacts the complexity of developing scalable end-to-end automation for your cloud environments.
  • Building a connected service experience with Salesforce Service Cloud
    Building a connected service experience with Salesforce Service Cloud
    Esther Chen, Product Marketing Manager, MuleSoft & Jimil Patel, Technical Product Marketing Manager, MuleSoft Recorded: Aug 15 2019 38 mins
    Salesforce Service Cloud to systems like ERP, OMS, and databases to give agents a single view of customers and orders. Rather than switching between different systems, agents can instead focus on delivering superior service. Together, MuleSoft and Salesforce increase agent productivity by 25% by automating workflows and service actions and improve customer satisfaction by 35% with personalization throughout the service experience.

    Watch this webinar to:
    * See a live MuleSoft Flow designer demo with Salesforce Service Cloud to create a holistic view of your customer.
    * Learn how customers are transforming their service experience using MuleSoft to synchronize Service Cloud with other systems of record.
    * Get best practices to integrate Service Cloud with ERP, OMS, and third-party systems.
  • Cloud-Native Operations with Kubernetes and CI/CD
    Cloud-Native Operations with Kubernetes and CI/CD
    Paul Czarkowski, Principal Technologist, Pivotal Software Recorded: Aug 15 2019 62 mins
    Operations practices have historically lagged behind development. Agile and Extreme Programming have become common practice for development teams. In the last decade, the DevOps and SRE movements have brought these concepts to operations, borrowing heavily from Lean principles such as Kanban and Value Stream Mapping. So, how does all of this play out if we’re using Kubernetes?

    In this class, Paul Czarkowski, Principal Technologist at Pivotal, will explain how Kubernetes enables a new cloud-native way of operating software. Attend to learn:

    ● what cloud-native operations are;
    ● how to build a cloud-native CI/CD stack; and
    ● how to deploy and upgrade an application from source to production on Kubernetes.

    We look forward to you joining us.
  • The Power of 2: How Automated Threat Hunting & ATT&CK Can Work Together
    The Power of 2: How Automated Threat Hunting & ATT&CK Can Work Together
    Jason Bevis, VP Global Threat Hunting, Cylance; Alex Holden, CISO/Pres, Hold Security, Chip Wagner, Sec Analytics, IBM Recorded: Aug 15 2019 59 mins
    Many organizations are so busy responding to and remediating indents that they don’t have the time, resources or framework for being proactive and searching for these threats. Automation (artificial intelligence or machine learning) can provide actionable intelligence quickly without being a resource drain. Pairing automation with a threat hunting framework like the MITRE ATT&CK can help to build an overarching strategy for addressing this critical area. Join BlackBerry Cylance and (ISC)² on August 15, 2019 at 1:00PM Eastern for a discussion on how to better and more quickly identify malicious behaviors and how a model of continuous improvement can benefit an organization.
  • Case Study: Real-World Applications of Business Process Automation & Management
    Case Study: Real-World Applications of Business Process Automation & Management
    Antonio Valle Gutierrez Global Head of BPM Architecture at BBVA Recorded: Aug 15 2019 28 mins
    Business processes touch every aspect of the way an organization runs. Therefore, business process automation cannot be an isolated environment. BPM can be a compelling part of a larger strategy, where business leaders can create the rules to achieve new innovation and business objectives.

    At BBVA, we have created a new global process automation platform, building on new technological trends, which allows both our business teams and our developers to focus on the needs of our customers. This session will cover:

    • How we integrated business goals into our new BPM platform
    • How we transformed our process developers
    • How we used Red Hat Process Automation Manager to create a new cloud-based BPM platform
    • How we defined KPIs for processes optimization
    • Some of the challenges and lessons we learned over the course of the project
  • Total BS: Using Brain Science to Debunk & Transform the Business of Speaking
    Total BS: Using Brain Science to Debunk & Transform the Business of Speaking
    Alyssa Dver, CCO at American Confidence Institute Recorded: Aug 15 2019 62 mins
    This week Alyssa Dver joins us to discuss total BS; using brain science to debunk and transform the business of speaking.

    Join two of Boston’s best speakers as they candidly discuss why so many speakers fail -- and the real secrets to speaking success. Whether you’re a speaker or an event professional, learn a bit of brain science to give yourself, and your audience real, sustained confidence.

    Innovation Women founder Bobbie Carlton will act as both host and mythslayer while she interviews the refreshingly candid Alyssa Dver. After years as a CMO for several companies, Alyssa founded and now helms the American Confidence Institute and the ERG Leadership Alliance. She speaks professionally 8-10 times every month and has trained over 300,000 people how to use the science of confidence to pitch, coach and be kickass. As both pro speakers and event planners, Bobbie and Alyssa will share real secrets and science so you can have remarkable impact on your audience and your career. Seriously, no BS.
     
    Learn:
    -The benefits and challenges of being a part- or full-time pro speaker
    -How to use brain science to make speaking more fulfilling for you and your audience
    -Expert tips to optimize speaking revenue and/or career opportunities

    About Alyssa

    Alyssa Dver is Co-Founder and Chief Confidence Officer at the American Confidence Institute. Recognized as the world’s Chief Confidence Officer and one of Boston’s Best Speakers, Alyssa helps students and professionals use brain science to inspire confidence in themselves and to anyone they pitch, coach, or care about. Alyssa is the co-founder of the American Confidence Institute which conducts and collects research that is then shared through keynotes, workshops, online and certification programs. Clients include Spotify, Wayfair, Pepsi, The US Air Force, State Street, Staples, The Royal Bank of Canada, plus dozens of other confidence-committed organizations, conferences, and associations. 
  • Top 5 Podcasts: Digital Transformation From Cisco to GE and Beyond with Bill Ruh
    Top 5 Podcasts: Digital Transformation From Cisco to GE and Beyond with Bill Ruh
    Ed Maguire, Principal Partner, Momenta Partners & Bill Ruh, CEO of Digital Business at LendLease Group Recorded: Aug 15 2019 58 mins
    Bill Ruh is CEO of Digital Business at Lendlease Group, a global developer and construction company for high rise and other real estate developments. Previously, he was the Chief Digital Officer for all of GE and CEO of GE Digital. Our conversation explored the nature of digital transformation, the considerations for creating goals and aligning the organization for success. One of the key insights is that transformation for industrial firms draws from best practices of technology companies, and the core principle is that technology companies’ missions are tied to asset optimization and better outcomes. He also shared how large companies need to think of transformation in two speeds – shorter term and longer term, where Speed 1 is the quarter to quarter focus and Speed 2 is the long term “moon shots”. He compares and contrasts the innovation mindset and approaches between startups and established companies, and shares best practices for larger companies to bridge the cultural gaps between their legacy and digital businesses. He also shares his views of the future of the construction and real estate industries enabled by the transformative impact of new technologies, which he is spearheading in his new role at Lendlease.
  • Why your Contact Center needs a Conversational AI Platform
    Why your Contact Center needs a Conversational AI Platform
    Pranav Deshpande, Product Marketing - AI/ML @ Twilio and Ricky Holtz, Sales Engineer Recorded: Aug 15 2019 53 mins
    Conversations powered by AI allow your contact center teams to deliver more of a personal and faster customer experience while improving operational efficiency. So why do 60% of customers try to skip IVRs to get to a human agent as soon as they can?
  • Getting started with Cisco SD-WAN Ansible Pipeline
    Getting started with Cisco SD-WAN Ansible Pipeline
    Stuart Clark, Developer Advocate, Cisco DevNet Recorded: Aug 15 2019 33 mins
    Learn how to apply modern agile methods and tools to the deployment of Cisco SD-WAN topologies. Take a step towards NetDevOps by using Ansible and VIRL to build test environments, create infrastructure-as-code, and automate Day 0, Day 1 and Day 2 configurations.
  • Aceable CPO on Scaling Growth Products from V1
    Aceable CPO on Scaling Growth Products from V1
    Erin Defossé Recorded: Aug 15 2019 71 mins
    When businesses go from startup to growth mode, this presents a number of challenges for sustaining success. From learning new ways of working as a product team to maintaining customer loyalty, there are a number of factors that can maintain (or disrupt) your business' growth. As product managers, what does it take to drive bottom-line results without sacrificing the quality of your product? Aceable CPO Erin Defossé shares the secret to scaling growth products from your V1 or MVP state. He will cover driving alignment across product & marketing on user experience and maintaining focus on your customers' needs.



    About the Speaker: Erin Defossé is the Chief Product Officer at Aceable - responsible for building, maintaining and executing the company’s product strategy and roadmap. Prior to joining Aceable, Erin was the SVP of Product at Bazaarvoice. Prior to his product management career, he was a spacecraft mission design engineer for NASA’s Jet Propulsion Laboratory. In addition, Erin is the Founder of The Magellan International School in Austin and was Co-Founder and CTO of Isochron Data. Erin holds a Masters Degree in Aeronautics & Astronautics from Stanford University - and currently lives in Austin.
  • Expedia fmr. Product Lead on Managing Customer Feedback Loops
    Expedia fmr. Product Lead on Managing Customer Feedback Loops
    Anne Retterer Recorded: Aug 15 2019 23 mins
    There’s no substitute for direct user feedback in order to set the direction for your product development process. With more data available than ever before, how can product managers capture and analyze user input most effectively? Expedia fmr. Product Lead Anne Retterer will cover the top five methods for managing Customer Feedback Loops - with specific applications that product managers can use to guide their next product journey.



    About The Speaker: Anne Retterer is the Founder and CEO of Mindspand - an online community that enables organizations to list course offerings and provide access to services for local customers. Prior to starting Mindspand, Anne managed the product portfolio at Expedia and established an investment fund for tech companies in Chile with Hambrecht & Quest (now JPMorgan Chase & Co.). Anne holds an MBA from UC Davis and currently lives in Seattle.
  • Serverless or Serverfull with Kubernetes
    Serverless or Serverfull with Kubernetes
    Burr Sutter, Director of Developer Experience, Red Hat Recorded: Aug 14 2019 53 mins
    Serverless is a misnomer; your future cloud native applications will consist of both microservces and functions, often wrapped as Linux containers, but in many cases where you the developer ignore the operational aspects of managing that infrastructure. In this session, we will dive into the capabilities of a Function-as-a-Service Platform for Kubernetes/OpenShift. The Microservices evolution was relatively easy, the programming model was nearly identical to the previous generation of Java EE. Today, Functions represent a new programming model for your next generation Java business applications. This will be a demo intensive session.

    About the Speaker:
    A lifelong developer advocate, community organizer, and technology evangelist, Burr Sutter is a featured speaker at technology events around the globe—from Bangalore to Brussels and Berlin to Beijing (and most parts in between). A Java Champion since 2005, Burr founded the DevNexus conference—now the second largest Java event in the U.S.—with the aim of making access to the world’s leading developers affordable to the developer community.
  • Bridging the Gap between Data Management and DevOps
    Bridging the Gap between Data Management and DevOps
    Adam Bowen - Delphix, Robert Reeves - Datical, John Pocknell - Quest Software Recorded: Aug 14 2019 64 mins
    DevOps continues to transform the way companies build and deploy applications through agile methodologies, better communication and collaboration, faster feedback loops and greater automation. However, even the best DevOps initiatives can fall victim to data bottlenecks, from challenges provisioning data quickly and easily, to synchronizing application and database changes and, in some cases, a serious lack of cooperation between developers and database administrators. The speed and flexibility requirements of DevOps and modern applications can be difficult to achieve in the world of data management with rigid schemas, manual processes and data silos providing obstacles.



    To educate IT decision makers and practitioners about the key technologies and strategies for bridging the gap between data management and DevOps, Database Trends and Applications is hosting a special roundtable webinar.
  • SIEM Modernization: Build a Situationally Aware Organization with Apache Kafka®
    SIEM Modernization: Build a Situationally Aware Organization with Apache Kafka®
    Jeffrey Needham, Confluent Recorded: Aug 14 2019 36 mins
    Of all security breaches, 85% are conducted with compromised credentials, often at the administration level or higher. A lot of IT groups think “security” means authentication, authorization and encryption (AAE), but these are often tick-boxes that rarely stop breaches. The internal threat surfaces of data streams or disk drives in a raidset in a data center are not the threat surface of interest.

    Cyber or Threat organizations must conduct internal investigations of IT, subcontractors and supply chains without implicating the innocent. Therefore, they are organizationally air-gapped from IT. Some surveys indicate up to 10% of IT is under investigation at any given time.

    Deploying a signal processing platform, such as Confluent Platform, allows organizations to evaluate data as soon as it becomes available enabling them to assess and mitigate risk before it arises. In Cyber or Threat Intelligence, events can be considered signals, and when analysts are hunting for threat actors, these don't appear as a single needle in a haystack, but as a series of needles. In this paradigm, streams of signals aggregate into signatures. This session shows how various sub-systems in Apache Kafka can be used to aggregate, integrate and attribute these signals into signatures of interest.

    Watch now to learn:
    -The current threat landscape
    -The difference between Security and Threat Intelligence
    -The value of Confluent Platform as an ideal complement to hardware endpoint detection systems and batch-based SIEM warehouses
  • How to Make a Recipe with H2O Driverless AI
    How to Make a Recipe with H2O Driverless AI
    Michelle Tanco, H2O.ai Recorded: Aug 14 2019 60 mins
    *** Please be aware that the content presented in this webinar will be technical and "code heavy." ***

    H2O Driverless AI employs the techniques of expert data scientists in an easy to use application that helps scale your data science efforts. Driverless AI empowers data scientists to work on projects faster using automation and state-of-the-art computing power from GPUs to accomplish tasks in minutes that used to take months.

    We're excited to add the ability for users, partners and customers to extend the platform with Bring-Your-Own-Recipe. Domain experts and advanced data scientists can now write their own recipes (Python snippets) and seamlessly extend Driverless AI with their favorite tools from the rich ecosystem of open-source data science and machine learning libraries. In this webinar we'll demonstrate how make a recipe with Driverless AI.

    Michelle's bio:
    Michelle is a Customer Solutions Engineer & Data Scientist for H2O.ai. Prior to H2O she worked as a Senior Data Science Consultant for Teradata, focused on leading analytics projects to solve cross-industry business problems.

    Her background is in pure math and computer science and she is passionate about applying these skills to answer real world questions. When not coding or thinking of analytics, Michelle can be found hanging out with her dog or playing ukulele.
  • Open Source Testing – The Good, The Bad, The Ugly
    Open Source Testing – The Good, The Bad, The Ugly
    Elise Carmichael, Enterprise Evangelist, Tricentis Recorded: Aug 14 2019 33 mins
    At some point we all commit to automating some of the riskiest use cases because, let’s be honest, something bad happened in production. But how do you proceed? Do you standardize your projects and teams on a single framework or framework style such as BDD? Do you let each team do what they think is best? How will you maintain this new behemoth that you’re about to create? Learn how to answer these and other critical “getting started” questions — as well as track the KPIs vital for demonstrating the ROI on your automation investment.
  • Front Matter: Next Level Front End Deployment on OpenShift
    Front Matter: Next Level Front End Deployment on OpenShift
    Lance Ball, Principal Software Engineer, Red Hat Recorded: Aug 14 2019 36 mins
    Applications aren’t just the back end anymore. Sure, your team may be great at building microservices, utilizing message queues, handling transactions, and utilizing CI/CD. But there is almost always a web based front end between the user and the server doing plenty of work of its own, whether that's in React, Angular or just plain HTML/CSS/JavaScript. In the brave new world of Kubernetes and containerized deployments, how does the front end best fit into the mix? Are you used to just copying your files up to the web server and forgetting about it? Well, that’s not going to cut it these days.. In this session, I will show you tips, tricks, and best practices for building and deploying your front-end applications on Red Hat’s OpenShift 4 Kubernetes platform.

    About the Speaker:
    Lance is a principal software engineer at Red Hat, leading the Node.js engineering efforts within Red Hat Middleware. He is an active open source contributor, an author of several NPM modules, and a core committer for the Node.js project. In addition to Node.js, you'll find his contributions in many other well-known open source projects, including: Wildfly Swarm, Vert.x, and Torquebox.
  • End-to-End Vulnerability and Risk Management Across the Enterprise
    End-to-End Vulnerability and Risk Management Across the Enterprise
    Brian McGraw, Global Head of Advisory Services, CyberProof, a UST Company; John Steven, CTO, ZeroNorth Recorded: Aug 14 2019 44 mins
    Digital transformation is redefining organizations in all industries into software-centric businesses. Assessing, planning and implementing vulnerability management across your organization is therefore crucial. In this webinar, CyberProof, a UST Global company, and ZeroNorth will share details on the companies’ integrated solution and discuss how customers are benefitting from end-to-end vulnerability & risk management across the enterprise.
  • Extend Existing Investments in Microservices to Leverage AI & Machine Learning
    Extend Existing Investments in Microservices to Leverage AI & Machine Learning
    Joe Dickman, SVP Technology Strategy, Vizuri Recorded: Aug 14 2019 49 mins
    Join us for this webinar as we learn about microservices, using AI to our benefit, machine learning and more.

    About the speaker:
    As the founder and head of Vizuri, Joe is responsible for its overall strategic direction. Through a hands-on approach, he offers customers more than thirty years of experience as a technical architect, developer, and business leader. Joe specializes in helping executives to solve complex business problems by mapping their business processes and adopting new technologies when appropriate. He proudly works with visionary leaders in multiple industries to help them understand how to improve their business agility. Through this experience, he has become a prominent speaker on open-source technologies, and he has helped to shape industry practices in business rules.
  • Learn how to massively scale your multiplayer game
    Learn how to massively scale your multiplayer game
    Madhukar Kumar, VP Technical & Product Marketing, Redis Labs, Alissa McAloon, News Editor & Associate Publisher, Gamasutra Recorded: Aug 14 2019 38 mins
    Tackling distributed computations and rapidly building accurate and readable leaderboards into multiplayer games is critical for game developers in this space, and it’s a process that can benefit from expert insight into the specific data structures (like sorted sets and hashes) and resources that are incredibly proficient at delivering vital scoring and ranking functionality.

    When it comes to massively scaling multiplayer games, there are unique sets of obstacles to address on that front, and Redis Labs - an open source, in-memory data structure store - is hosting a free webinar to help developers overcome those barriers in their own multiplayer projects.

    User experience is the heart of the game industry. Creating unique and dynamic experiences is crucial for companies to drive both customer acquisition and retention.

    Join this free webinar to learn how to use Redis’ easy to use tools in order to:

    - Accelerate analysis across a variety of data sets and data types
    - Attain consistency and durability of high-speed transactions
    - Auto-scale with multiple cloud providers
    - Keep costs down with a significantly-reduced deployment footprint
  • Achieving Security Outcomes in a Cloud-Native World
    Achieving Security Outcomes in a Cloud-Native World
    Steve White, Field CISO, Pivotal Software & Dave Meurer, Senior Technical Alliances Manager, Synopsys Recorded: Aug 14 2019 60 mins
    Modern enterprises are moving to hybrid cloud solutions, containers, microservices, and functions for their core applications. At the same time, technology teams are implementing agile and DevOps models for software development, deployment, and operations. These changes provide the business with measurable benefits in terms of agility and execution, but they also create the need for a shift in traditional approaches to cyber security. To respond, security leaders need to adopt a cloud-native model for security. In this webinar, we’ll examine how solutions from Pivotal and Synopsys enable this move, allowing security teams to achieve their target outcomes while acting as a key enabler, helping the business with their application transformation efforts.
  • ITM Master Class June 2019
    ITM Master Class June 2019
    Jason Poole Recorded: Aug 14 2019 69 mins
    Join us as we take a look at Citrix Intelligent Traffic Management (ITM) technologies and how they can help your business.

    Citrix ITM delivers visibility into internet conditions and can act upon the anomalies it discovers with granular traffic steering to help you ensure your sites are available and your content finds its way to the user in the most efficient and cost-effective manner possible.
  • OKAY_Microservices Data Patterns:  Event Sourcing with Kafka and Eclipse Vert.x
    OKAY_Microservices Data Patterns: Event Sourcing with Kafka and Eclipse Vert.x
    Don Schenck, Digital Evangelist, Red Hat Recorded: Aug 14 2019 40 mins
    Join us for this webinar as we learn about microservices, data patterns and more.

    About the speaker:
    A developer who has seen it all, Don is a former Microsoft MVP, author of “Transitioning to .NET Core on Linux” by O’Reilly Media, and currently a Digital Evangelist at Red Hat with a focus on Microservices and Serverless computing. Prior to Red Hat, Don was a Developer Advocate at Rackspace where he was immersed in cloud technology. He enjoys cooking, adrenaline, and studying human behavior, and loathes the designated hitter rule with every fiber of his being. Don's overarching belief is this: "A program is not a communication between a developer and a machine; it's a communication between a developer and the next developer."
  • ITM Master Class May 2019
    ITM Master Class May 2019
    Jason Poole Recorded: Aug 14 2019 63 mins
    Join us as we take a look at Citrix Intelligent Traffic Management (ITM) technologies and how they can help your business.

    Citrix ITM delivers visibility into internet conditions and can act upon the anomalies it discovers with granular traffic steering to help you ensure your sites are available and your content finds its way to the user in the most efficient and cost-effective manner possible.
  • Why IT Needs Real BI
    Why IT Needs Real BI
    Howard Dresner, CRO Dresner Advisory Services ; Gaurav Rewari, CEO Numerify Recorded: Aug 14 2019 57 mins
    IT produces large quantities of data across people, processes, and projects. The value of this extensive data, however, is often not exploited to its full potential.

    “Business analytics has become imperative for IT organizations as they seek to improve business alignment, adopt agile principles, and accelerate innovation,” says Howard Dresner, the father of modern BI and founder and chief research officer at Dresner Advisory services. “Deeper analysis of IT people, process, and project data is central to driving change and achieving these goals, and we’re seeing IT leaders rapidly increase adoption of the analytics practices that have been common to the rest of the business for years.”

    The Wisdom of Crowds IT Analytics Market Study, published by Dresner Advisory Services, can help you understand where your peers see the value of using IT Business Analytics. Join Howard Dresner, Numerify CEO Gaurav Rewari, and report author Chris von Samson to learn about the following topics:

    -Key takeaways for IT leaders from the “IT Analytics Market Study” conducted by Dresner Advisory Services
    -How your peers are using Metrics across Plan, Build, and Run processes to make informed decisions
    - How Business Intelligence can enable you to adopt advanced analytics like Machine Learning and Artificial Intelligence (AI)
    - How Fortune 500 customers use Numerify’s AI powered IT business analytics to drive better outcomes today
  • The 5 Key AI Takeaways for Today's C-Suite (Presented from the UK)
    The 5 Key AI Takeaways for Today's C-Suite (Presented from the UK)
    John Spooner, H2O.ai and John Howe, H2O.ai Aug 19 2019 10:00 am UTC 60 mins
    Due to popular demand, we are presenting this webinar at a UK-friendly time!

    This discussion will explore real-world examples and how to democratize AI in your organization.

    1. Build a Data science culture
    2. Ask the right questions
    3. Connect to the community
    4. Technology considerations
    5. Trust in AI
  • Reaching new customers by optimizing your product data
    Reaching new customers by optimizing your product data
    Hamaad Chippa, Director of Industry Consulting and Roland O Ehigiamusoe, Senior Manager, Consumer, Analytics and Cognitive Aug 20 2019 4:30 am UTC 32 mins
    Retailers are looking to reach customers in as many channels as possible – stores, e-commerce, mobile applications, and partner marketplaces. As one can imagine, managing these various touchpoints and relationships can be complex, especially ensuring information about products are properly defined. As online shopping grew in popularity, retail organizations stood-up dedicated support teams to manage sales and marketing, separate from the rest of the business. Customers now expect retailer companies to interact with them in a seamless manner, regardless of channel.To guarantee brand continuity, a uniform customer experience, and high customer satisfaction, retailers must diligently manage product data, making sure that products are represented properly across all channels. With better product information and insight, retailers will be to engage with customers in a more personal and meaningful way, driving additional revenue.
  • Introducing Events and Stream Processing into Nationwide Building Society.
    Introducing Events and Stream Processing into Nationwide Building Society.
    Rob Jackson, Head of Application Architecture at Nationwide Building Society Aug 20 2019 2:00 pm UTC 49 mins
    Open Banking regulations compel the UK’s largest banks, and building societies to enable their customers to share personal information with other regulated companies securely. As a result companies such as Nationwide Building Society are re-architecting their processes and infrastructure around customer needs to reduce the risk of losing relevance and the ability to innovate.

    In this online talk, you will learn why, when facing Open Banking regulation and rapidly increasing transaction volumes, Nationwide decided to take load off their back-end systems through real-time streaming of data changes into Apache Kafka®. You will hear how Nationwide started their journey with Apache Kafka®, beginning with the initial use case of creating a real-time data cache using Change Data Capture, Confluent Platform and Microservices. Rob Jackson, Head of Application Architecture, will also cover how Confluent enabled Nationwide to build the stream processing backbone that is being used to re-engineer the entire banking experience including online banking, payment processing and mortgage applications.
  • ¡No es Magia, Es DevSecOps!
    ¡No es Magia, Es DevSecOps!
    Ronen Riesenfeld, Sales Engineer Checkmarx Aug 20 2019 3:00 pm UTC 60 mins
    La seguridad perimetral, el análisis dinámico y otras soluciones de seguridad no estática dan una incorrecta percepción de que las aplicaciones están seguras, percepción que reduce el sentido de urgencia por la implementación holística de la seguridad. Las soluciones de seguridad estática, fortalecen los cimientos de las aplicaciones sin entorpecer los procesos e integrándose de manera orgánica como por arte de magia, facilitando así el desarrollo seguro a alta velocidad

    ¿QUÉ APRENDERÁS EN ESTE WEBINAR?

    Aprenderá que nos motiva a la prevención y su relación con la seguridad en aplicaciones; se explicará que es la seguridad en las Aplicaciones, su importancia y mejores prácticas de la industria.
    Se explicarán las distintas soluciones de seguridad en aplicaciones dentro del ciclo de desarrollo y las tendencias actuales en seguridad en desarrollo de aplicaciones.
    Descubrirá las distintas maneras de integrar la seguridad en aplicaciones dentro del ciclo de desarrollo y las maneras más eficientes de remediar vulnerabilidades.
    Conocerá sobre la administración del Software Expuesto y su integración dentro de DevSecOps
  • Achieve Development Speed and Code Quality with Behavior Testing
    Achieve Development Speed and Code Quality with Behavior Testing
    Dr. David Brumley Aug 20 2019 5:00 pm UTC 41 mins
    Join Dr. David Brumley, CEO of ForAllSecure, as he shares a proven method known as behavior testing for achieving both development speed and code quality. In this session, viewers will learn:
    -How to add continuous behavior testing to their shift-left strategy.
    -How behavior testing can help organizations not only develop quickly and securely, but also manage inherited risk from developers’ software supply chain.
    -Real-world use cases on how behavior testing is used to secure Dockerized applications.
  • Security Tool Misconfiguration and Abuse
    Security Tool Misconfiguration and Abuse
    Thomas Richards, Network and Red Team Practice Director Aug 20 2019 5:00 pm UTC 40 mins
    As any security program matures, it will use tools and techniques to automate processes to improve the security posture of the organization. This includes asset management and discovery, patch management, deploying software, and vulnerability discovery. However, if these tools are improperly configured, they can lead to a total compromise of your network by an attacker. In this talk we will go over a few case studies of abusing these tools while on penetration tests as well as remediation methods to prevent these attacks from occurring.
  • (ISC)²’s Digital Transformation Journey - Part 2
    (ISC)²’s Digital Transformation Journey - Part 2
    Bruce Beam, (ISC)²; Beth Paredes, (ISC)²; Sommer Hess, (ISC)²; Brandon Dunlap (Moderator) Aug 20 2019 5:00 pm UTC 60 mins
    (ISC)² recently completed our multi-year Digital End-to-End Transformation (DETE) project, which positions us to deliver a more a seamless and user-friendly experience to all members. In addition to revamping our online presence, we launched a new Learning Management Systems where members can access all the courses developed by our Professional Development Institute. In Part 2 of the (ISC)² Digital End-to-End Transformation (DETE) will examine how (ISC)² executed the plan for the project, following the AGILE Project Management framework and the buy-in and support from other departments and stake holders within the organization. Additionally, there was board governance and oversight to contend with. Join Bruce Beam, CIO; Beth Paredes, Sr. Corporate Member Services Manager; and Sommer Hess, Director PMO, Quality and Training on August 20, 2019 at 1:00PM Eastern for a discussion on these items and the speed bumps that were run into on this project.
  • Formulating an Agile Integration Strategy in the Hybrid Multi-Cloud Era
    Formulating an Agile Integration Strategy in the Hybrid Multi-Cloud Era
    Sameer Parulkar, Senior Product Marketing Manager, Red Hat Sameer Parulkar is a Senior Product Marketing Manager for Red Hat Aug 20 2019 6:00 pm UTC 57 mins
    The need for competitive advantage has driven organizations towards cloud computing, agile programming, and the move toward DevOps unification; and, it’s forced the modernization of IT architecture using innovative technologies such as containers, microservices, and artificial intelligence.

    But unintended consequences now burden organizations with disaggregated IT infrastructure composed of redundant data centers, multi-clouds, managed services, edge computing, devices, and things. To cope, business and IT leaders must conceptualize new agile means to integrate workloads across highly distributed and disparate hybrid multi-cloud architecture.

    During this webcast we discuss:
    - the fundamental elements of strategic analysis and techniques needed to create new competitive advantage
    - how to identify the essential technologies needed for the modern digital business
    - how next-generation hybrid integration platforms can support strategic and transformative initiatives
    - how some customers have embarked on this journey and their learnings
    - the strategy and practices needed to enable and deploy agile integration in the hybrid multi-cloud era
  • Protecting your Portal from File-based Malware
    Protecting your Portal from File-based Malware
    John Stevenson Aug 21 2019 10:00 am UTC 45 mins
    About this Webinar:

    The essential everyday business requirement of receiving uploaded content from the internet opens the user to significant risk from attackers, intent on stealing the user’s credentials and/or compromising the endpoint device to gain access to the corporate network.
    Uploaded documents contain malware specifically designed to bypass reverse Web proxies, Firewalls/WAFs, AV and sandboxes. Thankfully there are steps you can take to eliminate the threat.

    On Wednesday 21st August, join Deep Secure’s Head of Content John Stevenson – a 25 year veteran of the cyber security industry - and learn what it takes to stop document-based malware getting in via your portal. You’ll find out:

    •How the typical security stack deals with the advanced threat
    •How to add-in “zero trust security”
    •Tips and tricks for ensuring documents are 100% threat-free

    You’ll also get to see just how easy it is for one of the most common and notorious pieces of malware on the planet can escape detection and walk right through your defences!
  • Simplify Test Data Management for SAP
    Simplify Test Data Management for SAP
    Andreas Günther, Director of TDM Consulting, Anthem Aug 21 2019 11:00 am UTC 50 mins
    Finding relevant test data is one of the great pains of testing, and GDPR’s restriction on testing with unmasked production data makes a difficult situation even worse. Once you finally receive (or create) appropriate test data, you still have to inject it into the testing framework and transform it across end-to-end tests.

    The complexities of secure, stateful TDM are further exacerbated in SAP environments, where business processes may cross SAP GUI and SAP Fiori, mainframes, and other packaged apps such as Salesforce— and test data may be scattered across Word files, Excel files, databases, flat files, and SAP systems.

    Join this webinar to learn strategies for simplifying test data management across end-to-end tests that involve SAP. You’ll learn:

    - How to choose the best test data approach (synthetic, masked…) for each task
    - Strategies for managing stateful data across end-to-end tests
    - Options for extracting and masking data from SAP environments such as SAP S/4HANA, SAP NetWeaver, and even SAP BW/4 HANA
  • [Ep.1]: AI Drives Measurable Success in Customer Engagement
    [Ep.1]: AI Drives Measurable Success in Customer Engagement
    Robin Gareiss, President & Founder, Nemertes Research Aug 21 2019 12:00 pm UTC 60 mins
    Intelligent Customer Engagement Series [Ep.1] AI Drives Measurable Success in Customer Engagement

    Nearly 50% more companies are using or planning to use AI in their customer engagement initiatives.
    Nemertes recently studied how 518 companies are using AI and analytics to improve their customer experiences. This webinar details:
    • how these companies use AI
    • what measurable improvements resulted.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    John Grim, Senior Manager, PS Advisory Services Aug 21 2019 2:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Erika Gifford, Senior Manager, GSS | Security Operations Advisory
    •Hayden Williams, Senior Manager, VTRAC | Investigative Response
    •John Grim, Managing Principal, VTRAC | Innovations and Development
    •David Kennedy, Managing Principal, VTRAC | Open Source Intelligence

    Preparing for and responding to data breaches and cybersecurity incidents is never easy. It takes knowledge of your environment and its unique threats, effective teamwork, and just as importantly, a rigorous Incident Response (IR) Plan. We'll introduce our monthly listeners to the VIPR Report – the Verizon Incident Preparedness and Response Report. We'll provide a high-level overview of our findings across three years of IR Plan assessments and data breach simulations. Insight will include:

    •Observations and recommendations across the six phases of incident response
    •Top takeaways for building a solid IR Plan and capability
    •Breach Simulations Kits and using these resources to run data breach tabletop exercises

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Change Your Mind, Change Your Life
    Change Your Mind, Change Your Life
    Mia Zambarano, Psychotherapist, Lifestyle Coach & Author Aug 21 2019 4:00 pm UTC 60 mins
    Mia Zambarano joins us to discuss the importance of mindset and the way we think.

    Everyone has bad days, but do you have to simply put up with them? What can you do to dispel those nagging self-doubts and expose your potential? Cognitive behavioral techniques help create positive changes in all aspects of life – including business and personal.

    When you take control of your mindset and learn to use it in your favor, success follows. As a licensed psychotherapist, Mia can open a window into your thought processes and show you how they impact our realities. She will discuss how to crush our limiting thoughts and build self-belief.
     
    Learn how to:
    - Use the power of your mind for good
    -Crush negative thought processes and behaviors
    -Harness your super powers and control and create the life you want

    About Mia:

    Mia Zambarano is a Licensed Psychotherapist and Lifestyle Coach, specializing in cognitive behavioral work. Mia has worked as a psychotherapist in since 2015; where she specializes in child, adolescent and family therapy. In her coaching practice, Mia focuses on empowering individuals to create positive changes and improve their overall wellness. Mia received her Master’s in social work in 2015 from Boston University and has a Bachelor of Science in psychology from Sacred Heart University.

    Mia’s work involves understanding what contributes to our reality, the interactions between our thoughts, feelings, and actions, and ways to create a better reality for ourselves through better insight and positive thinking.
  • AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    Arun Trivedi Aug 21 2019 4:00 pm UTC 45 mins
    As AI becomes all-pervasive, more and more companies need to start thinking about how AI can help in their business transformation and optimization journey. According to a Gartner survey, 54% respondents plan to start deployment within the next few years. However, their are multiple barriers, including finding a starting point and fear of the unknown.

    This webinar breaks down AI for the business & IT - what use cases should CIOs and business organizations focus on and how do we get started? What are the possible use cases? How do we even go about thinking about AI in our organization in a structured way?
  • Data Pipelines - Get the most out of your data with Kubeflow & machine learning
    Data Pipelines - Get the most out of your data with Kubeflow & machine learning
    Carmine Rimi - Ubuntu Product Manager & Jan Kanty Milczek - Senior Data Scientist at deepsense.ai Aug 21 2019 4:00 pm UTC 60 mins
    AI is transforming industries with rapid innovation cycles and unprecedented automation capabilities. With the right frameworks, tools, and processes, machine learning with Kubeflow can help you accelerate your AI business objectives. Kubeflow is a Kubernetes-native platform that includes the most popular machine learning tools and frameworks, like Tensorflow and PyTorch, and is available on your workstation or in the cloud. Recent use cases include expert systems, workflow automation, pattern recognition across real-time data sets, customer relationship management with predictive behavior, and many more.
    The models at the core of this revolution require data - data is the fuel that powers accurate models. How do you get the most from data and ensure it meets your requirements?

    This webinar, in partnership with deepsense.ai will cover:

    How to get started with defining AI project requirements and objectives
    How to prioritize analytical projects in your company
    The challenges involved in collecting and storing data and how to avoid them
    How to extract values and eliminate complexities
    What external sources you should use in your data pipeline
  • How to Integrate Virtualized Server Environments with NVMe AFAs
    How to Integrate Virtualized Server Environments with NVMe AFAs
    Matt Hebb, Product Marketing, Data Center Systems, Western Digital Aug 21 2019 5:00 pm UTC 18 mins
    As you likely know, the reason companies deployed virtualization in the beginning was to get more out of their hardware – and make their lives a little easier – it is the very same reason they are deploying it today. As a result, virtualized servers are the defacto standard in today’s data centers. While, it’s true that virtualization lowers IT infrastructure costs and allows enterprises to respond to new business needs quickly, it also creates an additional layer of infrastructure complexity. Complexity that the IT team has to manage across both the ESX and storage array layer.

    We get it – it’s a double-edged sword. Virtualization is meant to lower costs and allow quicker response time, but when the infrastructure becomes complex, the resources required to manage it could increase and offset the savings you were hoping to achieve. Join us for this webinar where we’ll address how IT can more easily manage their virtual environment.

    In this webinar, we’ll introduce you to the IntelliFlash vCenter Plug-in and share how the product offers visibility into storage datastore, offers the ability to self-provision VMs, and provides a consistent snapshot of VM-level performance metrics. In addition to better understanding the IntelliFlash vCenter Plug-in, you will learn:
    >How to simplify your VMware administrative tasks
    >How to take full advantage of All-Flash Arrays to create and deploy denser, faster VMs
  • Ep. 5: Never Alone On Call
    Ep. 5: Never Alone On Call
    Emily Nakashima, Director of Engineering; Ben Hartshorne, Engineer; Alyson van Hardenberg, Engineer Aug 21 2019 5:00 pm UTC 60 mins
    Switch from deep query to a trace waterfall view and spot outliers with Honeycomb BubbleUp heat-maps - these make debugging effortless and dare we say fun? The Observability that Honeycomb brings literally shifts a Dev team from guessing what the problem may be to knowing exactly how their complex prod is behaving and where in the code the issue lies. Through the experience of all users, dev teams learn faster when they work together and have the same visibility, down to the raw event. We affectionately call it See Prod in Hi-Res.

    In Honeycomb, achieve Team Collaboration through shared charts and boards, and follow the breadcrumbs from your teammates' experiences. With Query History, everyone sees results and can tag according to what’s interesting. It’s organized, intuitive, and easy to follow. Incident response and on-call run much more smoothly when everyone is virtually on-call with you.

    In this webinar, we’ll discuss and show how:

    * Honeycomb's Query History gives rich meaningful context
    * Honeycomb’ers dogfood and learn from each others' compound wisdom
    * Benefits span engineering cycles and use-cases when debugging and maintaining
    * To build a culture of observability and why you should do it now
  • Simplify Test Data Management for SAP
    Simplify Test Data Management for SAP
    Andreas Günther, Director of TDM Consulting, Anthem Aug 21 2019 5:00 pm UTC 50 mins
    Finding relevant test data is one of the great pains of testing, and GDPR’s restriction on testing with unmasked production data makes a difficult situation even worse. Once you finally receive (or create) appropriate test data, you still have to inject it into the testing framework and transform it across end-to-end tests.

    The complexities of secure, stateful TDM are further exacerbated in SAP environments, where business processes may cross SAP GUI and SAP Fiori, mainframes, and other packaged apps such as Salesforce— and test data may be scattered across Word files, Excel files, databases, flat files, and SAP systems.

    Join this webinar to learn strategies for simplifying test data management across end-to-end tests that involve SAP. You’ll learn:

    - How to choose the best test data approach (synthetic, masked…) for each task
    - Strategies for managing stateful data across end-to-end tests
    - Options for extracting and masking data from SAP environments such as SAP S/4HANA, SAP NetWeaver, and even SAP BW/4 HANA
  • Kubernetes, Helm & Network Security - Best Practices at Scale
    Kubernetes, Helm & Network Security - Best Practices at Scale
    Brandon Jozsa, Sr. Solutions Architect with Tigera Aug 21 2019 5:00 pm UTC 75 mins
    What's all this buzz about Helm v3 you ask? Helm users have been asking for changes, and the development team has answered by rearchitecting Helm in version 3.

    Learn how to operate Kubernetes and Helm at scale while maintaining network security and compliance with Brandon Jozsa, Sr. Solutions Architect with Tigera.This technical session will cover a wide range of improvements to Helm that address operability, scalability, and security concerns that users had with prior versions of Helm. During the session, we'll help users create a library that will improve scalability, security, and overall workflow complete with example code. 
  • Automating Operations: Impact of  AI, Machine Learning and Low-Code Development
    Automating Operations: Impact of AI, Machine Learning and Low-Code Development
    Phil Simpson Senior Principal Product Marketing Manager, Red Hat Prakasha Aradhya Director of Product Management, Red Hat Aug 21 2019 5:00 pm UTC 49 mins
    Business process automation technology is rapidly emerging as a key to success in digital transformation projects. Automation is no longer just a set of business operations workflow items. A collaborative convergence of analytics, artificial intelligence or machine learning (AI/ML), robotic process automation (RPA), low-code development, etc. is changing the marketplace. Businesses are recognizing the value of this unified view in automating operations and decisions to improve the efficiency and agility of business operations—and thereby competitiveness and the bottom line.

    Join us for this session, where we'll explore:

    -Exploiting data analytics to make well informed decisions.
    -Building intelligent, context-sensitive applications.
  • Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Brandon Cooper, Sales Support Engineer Aug 21 2019 5:00 pm UTC 30 mins
    Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

Sign up to test drive CMD+CTRL!
  • Reimagine Data Governance: Data Governance. Meet Data Security.
    Reimagine Data Governance: Data Governance. Meet Data Security.
    Andy Joss, Head of Solutions & Data Governance, Steve Holyer, Solutions Specialist, Informatica Aug 22 2019 4:30 am UTC 58 mins
    With organizations collecting an ever-increasing volume of data, the risk of a data breach or falling foul of a regulator is also increasing. Data security, privacy and protection is fast becoming a “must have” requirement within many data programs.

    Organizations are starting to realize that there are potentially great synergies in having a much closer understanding of their data from both a governance and security viewpoint. Add in Artificial Intelligence and automation for remediation, together these capabilities are proving to be significant allies in the continuous battle of cyber-security and enabling Data Governance programs.

    This webinar explores how these two worlds can now better understand the role that each has to play, in supporting and protecting their organization.

    As part of the Reimagine Data Governance series of webinars, Informatica will demonstrate how having a closer relationship between the worlds of governance and security can enhance existing data use and data security capabilities. And how you, in taking that holistic approach, can provide governed and protected data to achieve key business outcomes.
  • IAST Stories From the Field
    IAST Stories From the Field
    Michael Haddon IAST Evangelist for North America Aug 22 2019 6:00 am UTC 39 mins
    As DevOps continues along its path of domination, organizations are seeking to make use of application security testing tools that leverage automation and easily scale up.

    With that, we see that Interactive Application Security Testing (IAST) is gaining increasing momentum.

    Join industry-experts Michael Haddon for insights on:
    •Why customers are seeking IAST solutions
    •Common IAST use cases
    •How customers are using IAST successfully
    •The benefits customers gain from using IAST
  • Cloud Native – Everything a Security Professional Needs to Know
    Cloud Native – Everything a Security Professional Needs to Know
    Colin Domoney DevSecOps Consultant & Adam Reyland, Regional Marketing Specialist at Veracode Aug 22 2019 10:00 am UTC 45 mins
    The Cloud Native Computing Foundation is home to literally hundreds of projects enabling developers to embrace every benefit of cloud native development from container deployment and orchestration to monitoring and messaging.

    This webinar gives an overview of the work of the Cloud Native Computing Foundation; highlights a few flagship projects such as Kubernetes and Istio; and explains how these projects are transforming the way developers work. Security practitioners will benefit from insights into how these new technologies and projects can be applied to ensure that cloud native applications are also natively secure by design.
  • Security Symposium - Morning Sessions
    Security Symposium - Morning Sessions
    Red Hat Aug 22 2019 1:00 pm UTC 210 mins
    Join Red Hat senior principal security global technical evangelist and strategist, Lucy Kerner, talking about automating security and compliance for hybrid environments. Followed by Dan Walsh, senior consulting software engineer, sharing container security and container technologies like kubernetes, buildah, and podman. Followed by a short Q&A, join live to submit your questions on August 22.