Hi [[ session.user.profile.firstName ]]

Application Management

  • Why Visibility is Key to GDPR
    Why Visibility is Key to GDPR Adrian Rowley, EMEA Technical Director at Gigamon Recorded: Aug 17 2017 40 mins
    The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.

    Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.

    In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:

    - Eliminate monitoring blind spots
    - Vastly improve the accuracy and precision of data risk detection
    - Help organisations meet the GDPR challenge

    About the Presenter

    Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
  • 5G in Asia Pacific, Forecast to 2022
    5G in Asia Pacific, Forecast to 2022 Quah Mei Lee, Industry Principal - Telecoms & Payments Strategy, Digital Transformation Practice, Frost Sullivan Recorded: Aug 17 2017 17 mins
    5G is on its way. It may be closer to 2019-2020 for some but for others, it may be 2023-2025 before it materializes. In all the countries that are frontrunners of 5G in Asia-Pacific, 5G is benefiting from local government support coupled with local demand or at least the potential for demand for 5G services. The demand may be incentive or market driven.

    The market for 5G is expected to have reached $4.50 billion by 2022 with 280.4 million 5G subscriptions. The implementation timeline for MNOs will vary from country to country, albeit not as widely as it was with 3G or 4G. Frost and Sullivan expects that government support for 5G in populous countries such as China and India and new business models that will emerge out of the trials by MNOs at the upcoming Olympics will support high service revenue growth at CAGR of 315.1% from 2019 to 2022.

    5G will trigger a quicker transition to distributed, cloud native networks that leverage on NFV, SDN, and MEC to reduce cost to serve and improve on efficiency and profitability for MNOs. Further, with 5G offering latency below 1ms and larger bandwidths, mobile networks can gain an edge over fibre networks and regain competitiveness.
    If you have any client that has an interest in gaining an in depth understanding of 5G developments in Asia Pacific, this study will help address questions such as:
    •How will 5G impact industry?
    •What are the market challenges and opportunities?
    •What are the key drivers for growth?
    •How big will the market be for 5G by 2022?
  • Not Your Grandmothers Network: What SDN Really Means
    Not Your Grandmothers Network: What SDN Really Means Eric Hanselman, Chief Analyst, 451 Research Recorded: Aug 16 2017 46 mins
    We’ve been working through the impacts of software-defined networking for a number of years. The technologies that have reached the market today have matured considerably from the early implementations and there are tremendous opportunities that SDN has created. What were once model T’s are now a lot faster and a bit more furious.

    Those changes have also opened some gaps in understanding and management that can create operational issues and security concerns. SD-WAN’s are seeing a lot of deployment and the orchestration possibilities of virtual networks in software-defined infrastructures (SDI) are powerful.

    This session will dig into the implications of all of this new performance and look at ways to ensure that your network doesn’t wind up in the ditch. There’s a lot of good work to be done, but it’s important to understand how to master all of that power.
  • 6 Key Tech Disruptions and Our Point of View
    6 Key Tech Disruptions and Our Point of View Chris Hsu Recorded: Aug 16 2017 63 mins
    HPE Software EVP & GM Chris Hsu hosts: 6 Key Tech Disruptions and Our Point of View

    As part of the planned Software spin-off and merger with Micro Focus, HPE’s Software organization is undergoing a major transformation to shape the combined company as uniquely positioned to help customers on challenges across a hybridized environment.

    And hybrid is much more than a buzzword. In today’s reality, not only do businesses have to deal with the rapidly changing technologies and multiple deployment models, but they also have to deal with the pressure of reducing their run costs and to constantly innovate.

    During this transformation, we have interviewed thousands of customers, conducting deep market research, allowing us to gain unprecedented market insights. Join this webcast and learn about the new waves of tech disruptors, and how, our combined, software pure-play company is going to shape the industry.

    “When you prepare for a global merger of this scale, it gives each company an unprecedented opportunity to look at all of their processes and take steps to optimize. We have had the luxury of stepping back and asking how do we transform our IT platform to support our strategy for tomorrow? Few of us ever get this opportunity.”
  • Learn What's New in Sencha Test 2.2 Early Access
    Learn What's New in Sencha Test 2.2 Early Access Subu Baskaran, Sr. Product Manager at Sencha Recorded: Aug 16 2017 57 mins
    Learn about the exciting new features in Sencha Test 2.2 early access release, including simplified test creation, defect management, and results storage. We have also addressed one of the biggest challenges that test automation engineers face at the time of product evaluation – how to build good tests using stable locators.

    Attend this webinar to see a live demonstration and learn what’s new in Sencha Test 2.2 Early Access, including how to:

    - Write application (end-to-end) tests for applications built using the ExtReact framework
    - Select and use unique locators by using the DOM Tree directly from Sencha Studio
    - Create and use Page Objects to build robust tests for web applications
    - Visualize tests using a tree view and focus on the test under construction
  • Find What's Broken Fast With Splunk ITSI and Event Analytics
    Find What's Broken Fast With Splunk ITSI and Event Analytics Priya Balakrishnan, Director, Solutions Marketing at Splunk; Alok Bhide, Director, Product Management at Splunk Recorded: Aug 16 2017 62 mins
    The problem with data centers is that they generate a lot of events – from low-level disk warnings to critical network issues to service-level failures. While you can create manual rules to filter out some of the noise, this often isn’t enough. How do you navigate this flood of events and prioritize the ones that truly matter? How do you relate these critical events to the same core issue, and ensure everyone has the same understanding of the impacted service, relative priority and likely root cause?

    Watch this webinar to learn how you can use Splunk IT Service Intelligence and machine learning to:

    - Monitor real-time data and be alerted when an anomaly occurs
    - Automatically correlate data to generate highly qualified information, so you can take fast action
    - Enable users to investigate with context, priority and importance, so they are empowered to take actions faster
  • Considerations in Data Center Transformation
    Considerations in Data Center Transformation Tom Parker, Solutions Product Manager, Lenovo and Robert Campbell, Senior Global Technical Alliance Manager, VMWare Recorded: Aug 16 2017 43 mins
    VMware's Software Defined Data Center is about data center transformation. Join Lenovo and VMware for a discussion about hybrid cloud, storage, and other things to consider in your data center transformation. Consider a hyperconverged design based on VMware VSAN, or work with traditional storage. Find the right path for your enterprise, so your team can focus less on keeping the lights on and more on data governance and enterprise business unit needs.

    In this webinar, Lenovo and VMware will discuss validated and tested designs working with the most recent VMware software releases and Lenovo’s ThinkSystem servers and infrastructure based on Intel® Xeon® Scalable processors. Join us to see how Lenovo and VMware enable you to transform your IT by building a high performing, serviceable, and secure future-designed data center.
  • [Talk] op 10 Barriers to DevOps - and how to overcome them
    [Talk] op 10 Barriers to DevOps - and how to overcome them Shashi Kiran, CMO, Quali Recorded: Aug 15 2017 52 mins
    his presentation will share key insights from a survey Quali conducted of 2045 professionals to gauge the state of DevOps and Cloud adoption. It reviews the top 10 barriers to DevOps adoption as well as best practices that can help overcome these barriers. This is an informative session for DevOps and Cloud architects, application owners, technologists as well as IT infrastructure professionals that are responsible for planning and deployment of DevOps tools and processes.
  • Learn How to Operationalize IoT Apps on Pivotal Cloud Foundry
    Learn How to Operationalize IoT Apps on Pivotal Cloud Foundry Chris Rawles, Data Scientist and Jeff Kelly, Pivotal Recorded: Aug 15 2017 42 mins
    The Internet of Things (IoT) holds promise for both consumers and enterprises alike. To succeed, any IoT project must concern itself with how to ingest machine and sensor data, how to build actionable models, and how to react to the output of models in real-time.

    Join Pivotal Data Scientist Chris Rawles, as he illustrates how to build and operationalize an IoT application running on Pivotal Cloud Foundry that scores and reacts to streaming data in real-time. In this webinar, you will learn how to:

    - Collect streaming IoT data
    - Build and train machine learning models in real-time
    - Score streaming data in real-time in an application

    We look forward to having you join us.

    The Pivotal Team
  • Meetup: Architecting for operational sustainability with Kubernetes
    Meetup: Architecting for operational sustainability with Kubernetes Ranga Rajagopalan Recorded: Aug 15 2017 55 mins
    Container Networking and Application Services meet up with Avi Networks CTO, Ranga Rajagopalan and guest speaker Craig McLuckie from Heptio.
  • Going Farther in ServiceNow Jakarta: The Time for NextGen Digital Transformation
    Going Farther in ServiceNow Jakarta: The Time for NextGen Digital Transformation Ross Rexer, Liz Alexander, Meghan Lockwood Recorded: Aug 15 2017 47 mins
    With ServiceNow launching their new Platform upgrade, you might be in the midst of deciding whether or not this upgrade will lure you in (if you don’t have the Portal yet, you might want to think about that!).

    But more than just a binary, “should I or shouldn’t I upgrade” decision, ServiceNow’s major releases are an opportunity for companies to take a strategic look at their ServiceNow strategy.

    This webinar will talk you through:
    - Upgrades and major releases to help you think BIG
    - What you should strategically consider about Jakarta (including the quick wins)
    - Hidden pockets of value in your ServiceNow Roadmap
  • Tutorial 1: Deploying production-ready container apps
    Tutorial 1: Deploying production-ready container apps Ranga Rajagopalan Recorded: Aug 15 2017 40 mins
    App teams are excited about using microservices architectures and containers. Running a few containers in a development environment with a few open source tools is very different from running large clusters with thousands of containers supporting production applications. In this three-part tutorial, Avi Networks CTO, Ranga Rajagopalan explains step-by-step with examples, the services needed and practical considerations in deploying production-ready, container-based applications.

    Episode 1:
    In this episode, Ranga will cover the concept of a Service Mesh for an OpenShift - Kubernetes cluster along with the following:
    Need for an ingress controller and an intra-cluster traffic manager
    How to deploy a service mesh in a kubernetes cluster
    Real-life examples of a service mesh deployment
    Best practices and lessons learned from production deployments

    Register for the upcoming episodes in this tutorial series for on-demand access to the videos.
    Episode 2: https://attendee.gotowebinar.com/register/7441307064554961155
    Episode 3: https://attendee.gotowebinar.com/register/6587591261168317699


    About Ranga Rajagopalan:
    Over the last 15 years, prior to co-founding Avi Networks, Ranga has been an architect and developer of several high-performance distributed operating systems as well as networking and storage data center products. Before his current role as CTO, he was the Senior Director at Cisco’s Data Center business unit, responsible for platform software on the Nexus 7000 product line. Joining Cisco through the acquisition of Andiamo where he was one of the lead architects for the SAN-OS operating system, Ranga began his career at SGI as an IRIX kernel engineer for the Origin series of ccNUMA servers.
  • How a Lean IT Shop Detects Threats while Delivering Reliable IT Services
    How a Lean IT Shop Detects Threats while Delivering Reliable IT Services Gregg Daly, Principal Engineer, Children's Discovery Museum of San Jose Recorded: Aug 15 2017 41 mins
    Most organizations continue to struggle when balancing tradeoffs between enabling IT services -- at low cost and low overhead -- versus staying ahead of modern threats.

    Children’s Discovery Museum of San Jose (CDM) needed to deliver quality educational experiences, while protecting their messaging platform from spear phishing attempts and emerging ransomware mutations -- in a highly scrutinized, budget-restricted environment.

    Watch this webinar to learn how CDM is using Splunk software to realize the benefits of a sound data strategy resulting in faster, better analytics-driven decisions. CDM has been able to address security, manageability and a variety of operational IT challenges.

    In this session, learn how CDM prepares for persistent and emerging malware threats, such as ransomware, via an adaptive approach, and by applying techniques such as:

    - Identifying, classifying and automatically blocking statistically-identified threats
    - Using primary network data as a key data source within their messaging system
    - Leveraging active data pipelines and autonomous, active counter-measures
    - Testing for relevance to stay ahead of evolving attack methods
  • Four people you need to know in data and analytics
    Four people you need to know in data and analytics Glen Rabie, CEO, Yellowfin Recorded: Aug 15 2017 3 mins
    Business intelligence isn’t always exactly what you’d expect. These four thought leaders in data and analytics might surprise you.
  • Cloud Changed the Network Edge
    Cloud Changed the Network Edge Michael Beesley and Dan Backman Recorded: Aug 14 2017 15 mins
    Michael Beesley, CTO of Skyport, joined by the head of technical marketing, Dan Backman, discuss the challenges cloud has put on your network edge.
  • Achieving True Cloud-First Digital Agility
    Achieving True Cloud-First Digital Agility Metavine Recorded: Aug 14 2017 3 mins
    Metavine powers your business to be ready for the future and achieve true cloud-first digital agility today. Learn more at www.metavine.com.
  • Hybrid Cloud Considerations for Big Data and Analytics
    Hybrid Cloud Considerations for Big Data and Analytics Cloud Standards Customer Council Recorded: Aug 11 2017 61 mins
    Today, the majority of big data and analytics use cases are built on hybrid cloud infrastructure. A hybrid cloud is a combination of on-premises and local cloud resources integrated with one or more dedicated cloud(s) and one or more public cloud(s). Hybrid cloud computing has matured to support data security and privacy requirements as well as increased scalability and computational power needed for big data and analytics solutions.

    This webinar summarizes what hybrid cloud is, explains why it is important in the context of big data and analytics, and discusses implementation considerations unique to hybrid cloud computing.
  • Securing India's Aadhaar Numbers as per UIDAI's Mandates
    Securing India's Aadhaar Numbers as per UIDAI's Mandates Nanda Mohan Shenoy, CAIIB, CISA - Bestfit Business Solutions and Prasun Srivastava - Solution Expert, IDP, Enterprise & Cyber Recorded: Aug 11 2017 60 mins
    The India's Unique Identification numbers (UIDs), also named "Aadhaar numbers" contain Personally Identifiable Information (PII), the Unique Identification Authority of India (UIDAI) has mandated that the private cryptographic keys used to digitally sign and authenticate the UIDs must be stored in a Hardware Security Module (HSM).

    In addition to HSMs, the UIDAI has also mandated the use of tokenization – replacing sensitive data with a token that can be securely stored, processed and transmitted as of August 2017.

    Join this live webinar to know more about how to easily conform to the mandate:
    •What is UIDAI's requirements?
    •Why HSM and tokenization?
    •How to ensure Aadhaar numbers are protected?
    •What makes Gemalto's SafeNet Luna HSM and KeySecure unique?
    •How to meet UIDAI's compliance mandates?
  • How Disney & Pixar Use OpenShift to Accelerate Platform & Service Delivery
    How Disney & Pixar Use OpenShift to Accelerate Platform & Service Delivery Dale Bewley, Pixar, Leonard Arul, Walt Disney Studios, Thomas Haynes, Disney; Charles Sochin, Pixar Recorded: Aug 10 2017 43 mins
    Providing platforms and services at Disney Studios and Pixar is both exciting and demanding. OpenShift offered a technology mix that assisted the technology teams to deliver an on demand, container platform that exposed developers to up-to-date content, pipeline automation, storage, and deployment patterns for microservices and tiered applications. During this talk we will hear from both the Disney and Pixar teams to find out how they are offering an automated experience for developers and IT services.
  • Increase your Application Security Efficacy across Networks
    Increase your Application Security Efficacy across Networks Speakers: Kurt Roemer, Chief Security Strategist, Citrix & Asha Kalyur, Director, Product Marketing, Citrix NetScaler Recorded: Aug 10 2017 58 mins
    Cybersecurity is all about managing and reducing your business risks. Increasing your application and network security efficacy mitigates these business risks. In the new world of hybrid cloud and SaaS apps, the security perimeter no longer exists. How do you protect your hybrid cloud deployments against cybersecurity attacks? Join our live webinar and learn:

    •Strategies to increase your security efficacy
    •If you are adopting hybrid cloud, how do you maintain your security efficacy?
    •How do you get started today?
  • Black Duck Hub 4.0: Ready for the Enterprise
    Black Duck Hub 4.0: Ready for the Enterprise Pat Durante, Senior Director Education Services; John Beaudoin, Senior Instructional Designer Recorded: Aug 10 2017 58 mins
    Join our upcoming Black Duck Customer Webinar exploring the new functionalities in Hub 4.0. Learn how the Hub is delivering additional value to enterprise customers who want to run the Hub at scale and within their existing IT infrastructure. We’ll demo new features including an improved user experience, more comprehensive reporting, security and license risk management and recent updates to our Hub integrations.

    Explore These Hub 4.0 UX Advancements:
    Executive Dashboard
    Report Database
    Enterprise Improvements
    Security Risk Management
    License Compliance Management
    Cloud Platform and Docker Inspector Integrations
  • NTT DATA’s Intelligent QA Approach
    NTT DATA’s Intelligent QA Approach Nikhil Joshi - VP QAT Practice, Katsutoshi Imai - QAT Global R&D Lead Recorded: Aug 10 2017 36 mins
    Join this informative webinar to see how we achieve superior test acceleration using NTT DATA's ML/AI based Intelligent QA solution. Our Software Test Acceleration Toolkit forays into Intelligent Automation space with its in-house built analysis driven testing engine, helping organizations improve their testing quality by taking better decisions.
  • Security Orchestration In Action: Integrate – Automate –Manage
    Security Orchestration In Action: Integrate – Automate –Manage Silvio Pappalardo & Alex Ruhl, FireEye Recorded: Aug 10 2017 53 mins
    Simplify & Accelerate Security Operations through integration and automation

    Join us to hear how Security Orchestration from FireEye can:

    UNIFY SECURITY TOOLS
    Unify your security assets into a homogeneous platform and remove the operational silos that have bogged down security personnel for years. Improve operational efficiency and streamline processes with automation.
    Save time and resources & Improve your overall ROI

    ENHANCE SECURITY TEAM CAPABILITY
    Give your team an edge on attackers with deployment, design, and pre-built playbooks from our team of experts.
    Leverage our real-world, frontline Mandiant investigation experience & get access to class leading content, best practice playbooks and a global services breadth to assist clients anywhere in the world they need support.

    INCREASE EFFICIENCY AND PERFORMANCE
    Eliminate errors through standardised process and automation while reducing time demands on already stretched SOC teams.
    Minimise error prone manual processes while maintaining response and process consistency &
    Automate repeatable tasks enabling you to re-allocate staff to higher value tasks such as proactive hunting.

    Towards the end of the session we will be delivering a LIVE demo of FireEye Security Orchestrator.
  • SAP Indirect Usage risk is real: Five-step plan to minimize exposure
    SAP Indirect Usage risk is real: Five-step plan to minimize exposure Joachim Paulini, Brian Skiba, Florian Timm Ascherl Aug 17 2017 2:00 pm UTC 45 mins
    SAP Indirect Usage costs are no longer just theory. A milestone judgement in the UK courts has confirmed SAP’s right to charge customers for Indirect Usage. But what is Indirect Usage? How big is the risk of unbudgeted costs? And what can you do about it? SAP licensing experts from Snow Software will explore the recent legal ruling and what it means for SAP customers around the world, providing insight and a simple five-step plan on how to optimize SAP access and licensing before it’s too late.
  • Keeping up with High Speed MIgration in the Data Center
    Keeping up with High Speed MIgration in the Data Center Anthony Haupt, CommScope, Data Center Solutions Architect Aug 17 2017 3:00 pm UTC 90 mins
    The volume of data streaming into the data center has been growing exponentially for decades. Bandwidth requirements are expected to continue growing 25 percent to 35 percent per year. At the same time, lower latency requirements continue to escalate. As a result, the design of services and applications—and how they are delivered—is rapidly evolving.

    Instead of a single dedicated server, information requests coming into the data center are now fulfilled by multiple servers cooperating in parallelThe traditional three-tier network is quickly being replaced by spine-and-leaf networks. As a result, the physical infrastructure must be able to support higher link speeds and greater fiber density while enabling quick and easy migration to new more demanding applications.

    This webinar will address:

    Solutions, support & decisions
    40G or 25G lanes?
    Preterminated vs field-terminated cables
    Modulation schemes
    Duplex or Parallel transmissions
    Singlemode, multimode or wideband multimode fiber?



    Attendees with earn one BICSI Continuing Education Credit for attending.
  • Intro to Anypoint Design Center - Flow Designer
    Intro to Anypoint Design Center - Flow Designer Ahyoung An, Sr. Manager, Product Marketing, MuleSoft; Dan Diephouse, Director of Product Management, MuleSoft Aug 17 2017 4:00 pm UTC 60 mins
    The new Anypoint Design Center includes a web-based, graphical designer suitable for users who are new to integration and need a simplified way to accomplish projects quickly and easily.

    Join this session to learn:

    - What it is and how to get started
    - How to accelerate onramp and development by leveraging crowdsourced assets
    - How to accomplish various use cases such as gaining a 360-degree view of customers
  • Automated Security for Jenkins
    Automated Security for Jenkins Matthew Barker, Solutions Architect, Twistlock Aug 17 2017 5:00 pm UTC 30 mins
    CI/CD tools like Jenkins enable development teams to deliver software faster. To prevent containers with either high-risk vulnerabilities or compliance violations making it to production, it’s important to integrate automated compliance and vulnerability monitoring that can check, alert on and fail builds. By detecting and remediating security risks early, you reduce overall risk, minimize costly rework, and reduce the effort of downstream security checks.

    Join Twistlock Solution Architect Matthew Barker to see how Twistlock integrates directly into Jenkins to improve your risk and compliance posture without slowing down development.
  • GDPR and What It Means for Security Teams
    GDPR and What It Means for Security Teams Cheryl Tang, Director Data Security Products, Imperva Aug 17 2017 6:00 pm UTC 60 mins
    The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.

    Join us to learn:

    - What is GDPR
    - Deep dive into relevant data security articles of the GDPR
    - Review how different technology can address some of the GDPR data security requirements
  • 6 Reasons Why Dev Should Own Security
    6 Reasons Why Dev Should Own Security Geva Solomonovich, Snyk and John Morello, Twistlock Aug 18 2017 5:00 pm UTC 30 mins
    Open source, containers and microservices, and a myriad of DevOps tools reduce the time and friction to deploy code. Oftentimes, security becomes a limiting factor in bringing new innovations to market.

    To build secure applications without slowing development cycles requires a new approach to security: Shift-Left Security. This means moving security to left in the development process and into the purview of developers by integrating it into existing workflows.

    Join us for this to learn:
    - 6 reasons development should own security
    - Best practices to employing Shift-Left security
    - How to deploy secure apps at DevOps speed
  • Challenges in Building Connected Communities
    Challenges in Building Connected Communities Kate Garman, Jascha Franklin-Hodge, Peter Marx, Limor Schafman Aug 21 2017 3:00 pm UTC 75 mins
    Creating a seamless connected environment that supports smart community citizen services, streamlines operations, supports economic development is already a challenge for community officials. There are many different needs and directions to begin the conversion to an “intelligent” environment. Communities are also planning and building not just for current needs, but also for future connectivity infrastructure that will be used by autonomous vehicles, smart buildings, connected homes, AR/VR, eRetail, eHealthcare, smartgrid and more.

    This webcast will discuss such questions as:
    > What issues are city officials prioritizing for resolution through smart community applications?
    > How are communities planning for and deploying small cell infrastructure?
    > Which departments are involved in communications infrastructure?
    > How can suppliers navigate the multiple departments involved in decision making?
    > What business models are cities negotiating with their technology product partners?
    > What are some of the lessons learned from cities that you can translate into your own business offering?

    Speakers:
    Jascha Franklin-Hodge, CIO, Boston, MA
    Kate Garman,Smart City Coordinator, Seattle, WA
    Peter Marx, currently in the position of VP, GE Digital and former CTO, City of Los Angeles
  • How to Stay Ahead of Today's Ransomware Realities
    How to Stay Ahead of Today's Ransomware Realities Ken Westin, Security Specialist, Splunk Aug 22 2017 3:00 pm UTC 75 mins
    The recent ransomware outbreaks have destabilized business operations around the world.

    The most recent ransomware scare came from what appeared to be a new variant of the Petya ransomware. Leveraging exploits and techniques similar to WannaCry, along with other advanced techniques, to cause damage by sabotaging systems, this latest attack clearly demonstrates how damaging malware can and likely will continue to be to organizations.

    How can you proactively prepare for such threats?

    Watch this webinar to learn how to apply a broader analytics-driven approach to do the fundamentals better, and minimize the risk that your organization will be affected.

    This session will include live demonstrations, and will cover best practices in the following areas:

    • Security fundamentals – the importance of consistent blocking/tackling and security hygiene
    • Posture assessment – establishing end-to-end visibility of potential ransomware activity
    • Investigation, hunting and remediation – IR techniques to verify alerts and hypotheses, and prioritize based on risk
    • Threat intelligence – identifying C2, file hashes and other ransomware IoCs
    • Automation and orchestration – integrating a layered security architecture to drive to faster decisions
    • Leveraging machine learning to detect ransomware patterns and adapt threat models for the latest mutations
  • Analytics Nightmares and How You Can Prevent Them
    Analytics Nightmares and How You Can Prevent Them Meta S. Brown, Author, Data Mining for Dummies and President, A4A Brown, Inc. Aug 22 2017 3:00 pm UTC 60 mins
    Analytics risks can keep you up at night. What if…
    · We make a big investment and don’t break even?
    · Management doesn’t trust the results?
    · Analysts cross data privacy boundaries?

    What a dilemma! You see the perils, yet you want the rewards that analytics can bring. The appropriate process enables you to dramatically reduce risks and maximize returns on your data and analytics investment.

    In this presentation, you will learn:
    · What causes most analytics failures
    · How you can diminish risk and maximize returns through strong analytics process
    · Why you (yes, you!) have a pivotal opportunity to establish high standards for analytics process right now
  • Managing Complexity in the World of Predictive
    Managing Complexity in the World of Predictive Dr. Megan Sheehan and Vandan Nayak, HPE Aug 22 2017 3:00 pm UTC 45 mins
    If you haven’t already, we recommend you listen to the first webinar in this series, the 9-minute overview by our SVP and GM Raffi Margaliot as he introduces the three core disruptions facing application delivery teams today.

    Software development teams are under pressure to release faster while maintaining the same level of quality—or ideally increasing it. This has significantly increased application lifecycle complexity to the point of chaos. Join us, as we discuss how application development teams can leverage HPE’s ALM Octane, an integrated lifecycle management solution, along with advanced analytics to mitigate the risks in application delivery and optimize their resource investments. Learn how to scale Agile and DevOps processes with data driven insights and prescriptive guidance.
  • How to Choose Your Next Database Audit Solution
    How to Choose Your Next Database Audit Solution Terry Ray, Chief Technology Officer at Imperva Aug 22 2017 4:00 pm UTC 60 mins
    Data is the lifeblood of today's business. As the volume of generated data continues to grow, so does the number of data breaches. It's more critical than ever for organizations to adopt database audit and protection solutions. But not all solutions are created equal.

    What are the key capabilities that IT and security teams should evaluate? Join Terry Ray as he discusses key considerations for selecting a database audit and protection solution.

    About the Presenter:

    Terry Ray is the Chief Technology Officer for Imperva, Inc., the leading provider of data security solutions. Terry works directly with Imperva’s largest customers to educate on industry best practices, challenges and regulations. He also, operates as an executive sponsor to strategic customers who benefit from a bridge between both company’s executive teams. During his 12 years at Imperva, he has deployed hundreds of data security solutions to meet the requirements of customers and regulators from every industry. Terry is a frequent speaker for RSA, ISSA, OWASP, ISACA, Gartner, IANS and other professional security and audit organizations in the Americas and abroad.
  • The 5 Keys to Successful Predictive Business Analytics
    The 5 Keys to Successful Predictive Business Analytics Lawrence Maisel, President, DecisionVu Group, Inc. Aug 22 2017 5:00 pm UTC 45 mins
    Today businesses of varying sizes, products and services, and industries are actively applying Predictive Business Analytics in seeking to improve greater customer engagement and resulting increased revenues and profits. Often these businesses are looking to their finance group to guide, if not lead, these efforts to successful outcomes.

    In a recent article written by Ray Tong, he cited a CFO magazine survey that:
    • Over 70% of respondents said that they plan to substantially increase the use of data analytics to support decision making and improve business partnering;
    • 68% of respondents, the majority of who were finance executives, said that they plan to improve their data analytic skills in the coming year.

    Consequently, it is essential that the financial professional understands what it is going to take for them to succeed.

    This webinar discusses the five (5) keys to applying Predictive Business Analytics in your organization. It provides attendees with specific and practical insights to guide their approaches to develop and deploy an effective process that improves managerial decision making across many core performance and financial areas.

    What you will learn:

    • What are the key steps to success with practical examples
    • What steps to avoid
    • How to ensure and gain organizational impact

    Larry Maisel a recognized author and thought leader in Business Analytics, with experience assisting companies to improve operating performance and business results. An accomplished business professional, with over 20+ years of experience, with proven leadership skills, expertise to drive bottom-line profits and implementing business systems.
  • Watch the Cloud: Monitoring Your Migration
    Watch the Cloud: Monitoring Your Migration Mike Langdon, Product Manager Aug 22 2017 6:00 pm UTC 30 mins
    Migrating your infrastructure from on-premises to the cloud requires extensive monitoring to ensure your IT operations don't suffer along the way. For many organizations, garnering this insight can be difficult -- if not impossible. Join Blue Medora's Mike Langdon to learn key best practices to monitor your infrastructure during migration, helping you simplify the process and ensure optimal performance from migration to decommissioning.
  • Back to School: Cloud Economy and Lessons from AirBnB, Uber and the Gig Economy
    Back to School: Cloud Economy and Lessons from AirBnB, Uber and the Gig Economy Todd Bernhard, CloudCheckr Product Marketing Manager Aug 22 2017 6:00 pm UTC 60 mins
    The Cloud Economy represents a drastic change in how enterprises perform computing. But it's not totally unprecedented. Simultaneously with the advent of the Cloud First mentality is the Gig Economy.

    People don't have to buy, lease or rent cars. They can use an Uber or Lyft. They don't automatically reserve a hotel on a trip. They can use AirBnB. What lessons can we learn from the Gig Economy that apply to the Cloud Economy? What pitfalls can we avoid?

    During this webinar we will discuss:
    - Financial savings promised by the new economic model
    - New challenges presented
    - How to mitigate against such challenges
  • The Millennial Banking Technology Framework
    The Millennial Banking Technology Framework Mythili Madhav, BFS Delivery Manager & Vishwas Anand, Head of Thought Leadership Aug 23 2017 9:30 am UTC 15 mins
    In an open banking ecosystem, 92% of millennials are going to choose a bank for its digital services. Banks need to have a robust framework they can go by to develop new business models, services and data for radical transformation of millennial engagement. In this webinar you will realize:
    •The needs and MOTs of millennials in the digital age for a customer-centric approach
    •How the Millennial Banking Framework can be used by banks to transform millennial interactions
    •Value delivered through Aspire’s Millennial Banking Offering
    •Millennial engagement success stories
  • Moving towards XaaS: Could the Public versus Private Cloud debate be over?
    Moving towards XaaS: Could the Public versus Private Cloud debate be over? Rory Duncan, Research Director at 451 Research; Dan Havens, SVP, WorldWide Sales at Ormuco Aug 23 2017 1:00 pm UTC 60 mins
    The cloud promises to enable organisations to be more flexible, agile and responsive to the needs of their business and the demands of customer and partners. As physical infrastructure has become invisible to end-users, the role of service providers and channel partners has changed. Faced with public and private options, many firms are taking a XaaS approach, embracing the best of both private and public worlds - implementing hybrid architectures to deliver on-demand access to compute resources, capacity, and services, while also providing greater levels of control, security, and visibility of data and applications. In this webinar, Rory Duncan, Research Director with 451 Research will outline the opportunities for Service Providers and channel partners delivering cloud services, examining topics such as support, managed services, data protection and data sovereignty for facilitating cloud consumption.
  • What is an Identity Provider (IdP) and Do You Need One?
    What is an Identity Provider (IdP) and Do You Need One? Stephen Allen, Authentication Expert at Gemalto Aug 23 2017 3:00 pm UTC 60 mins
    The explosion of cloud-based applications in the enterprise is making IT and security professionals rethink their cloud identity management strategy. By default, every cloud user creates an average of 17 cloud identities. But catering to 17 different user stores per employee or partner is simply not scalable from an administration perspective. And as if IT’s time is not precious enough, password resets account for 20% of helpdesk tickets. This adds to the compliance and security risks associated with cloud-based applications, which by default require only weak static passwords and offer no central point of management across disparate cloud-based services.

    Join Stephen Allen, Gemalto Product Manager for Authentication and Access Management, and learn how deploying an Identity Provider enables:

    •Cloud Single Sign-On for easy access to cloud apps
    •Regulatory compliance with standards such as PCI DSS
    •Reduced identity lifecycle overheads
    •Centralized management of cloud access policies
    •Increased security with step-up authentication
  • Using Predictive Analytics to Empower Customer Experience
    Using Predictive Analytics to Empower Customer Experience Patrick Rice, CEO, Lumidatum Aug 23 2017 3:00 pm UTC 45 mins
    Predictive analytics & artificial intelligence are transforming the way all companies connect with customers. The customer experience is on the verge of being completely redefined with A.I.

    In this talk, you will learn what it takes for a business to deliver this new 21st-century customer conversation. Patrick will cover:

    - Collecting & Managing CX data - What I learned analyzing 3 billion records at Amazon
    - We have the data, now what? AI & the Future of Customer Experience
    - How to use Predictive Analytics to find the right customer on the right channel
    - 3 ways to drive ROI for your business by applying AI to improve the Customer Experience

    Patrick is CEO of Lumidatum which helps CMOs apply artificial intelligence to the customer experience in order to grow revenue. He has been in the data and analytics space for over a decade including running a machine learning and advanced analytics team at Amazon.
  • Demo: Introduction to CoreOS Tectonic
    Demo: Introduction to CoreOS Tectonic Scott Summer, Solutions Engineer Aug 23 2017 4:00 pm UTC 60 mins
    CoreOS Tectonic is an enterprise-ready Kubernetes platform that provides automated operations, enables portability across private and public cloud providers, and is always upstream open source Kubernetes.
  • 5 Ways to Improve Your Agile/DevOps Automation Strategy
    5 Ways to Improve Your Agile/DevOps Automation Strategy Joshua Eastman, Test Automation Architect Aug 23 2017 5:00 pm UTC 60 mins
    Test automation has become a must, especially in agile and DevOps projects with their goals of continuous integration and fast deployment. QA teams face many challenges today with testing including emerging technologies, digital maturity, and fast-paced delivery expectations.

    In this session, attendees will learn about:
    1.Key challenges in today’s testing landscape that impact automation testing
    2.Ways to set expectations for automation that accelerate buy-in and support
    3.Considerations for prioritizing types of testing and technologies for automation
    4.Understanding who should be included in planning for automation
  • Hunting Criminals with Hybrid Analytics, Semi-supervised Learning, & Feedback
    Hunting Criminals with Hybrid Analytics, Semi-supervised Learning, & Feedback David Talby, CTO, Atigeo Aug 23 2017 5:00 pm UTC 60 mins
    Fraud detection is a classic adversarial analytics challenge: As soon as an automated system successfully learns to stop one scheme, fraudsters move on to attack another way. Each scheme requires looking for different signals (i.e. features) to catch; is relatively rare (one in millions for finance or e-commerce); and may take months to investigate a single case (in healthcare or tax, for example) – making quality training data scarce.

    This talk will cover a code walk-through, the key lessons learned while building such real-world software systems over the past few years. We'll look for fraud signals in public email datasets, using IPython and popular open-source libraries (scikit-learn, statsmodel, nltk, etc.) for data science and Apache Spark as the compute engine for scalable parallel processing.

    David will iteratively build a machine-learned hybrid model – combining features from different data sources and algorithmic approaches, to catch diverse aspects of suspect behavior:

    - Natural language processing: finding keywords in relevant context within unstructured text
    - Statistical NLP: sentiment analysis via supervised machine learning
    - Time series analysis: understanding daily/weekly cycles and changes in habitual behavior
    - Graph analysis: finding actions outside the usual or expected network of people
    - Heuristic rules: finding suspect actions based on past schemes or external datasets
    - Topic modeling: highlighting use of keywords outside an expected context
    - Anomaly detection: Fully unsupervised ranking of unusual behavior

    Apache Spark is used to run these models at scale – in batch mode for model training and with Spark Streaming for production use. We’ll discuss the data model, computation, and feedback workflows, as well as some tools and libraries built on top of the open-source components to enable faster experimentation, optimization, and productization of the models.
  • Data scientists: Can't live with them, can't live without them.
    Data scientists: Can't live with them, can't live without them. Wyatt Benno, CEO, DataHero Aug 24 2017 3:00 pm UTC 45 mins
    There has been a flood of publicity around big data, data processing, and the role of predictive analytics in businesses of the future.
    As business operators how do we get access to these valuable business insights, even when there is not a data analyst around to walk us through their results?

    - Should your software emulate a data scientist?
    - Learn about the power of data visualizations.
    - Learn about creating value from disperse data sets.