Hi [[ session.user.profile.firstName ]]

Finance

  • Why Browser Isolation is the New 'Sandbox'
    Why Browser Isolation is the New 'Sandbox'
    Lennart van den Ende, VP of Worldwide Sales Engineering - Menlo Security Recorded: Aug 22 2019 51 mins
    Protecting organizations from Web threats has typically been done with a proxy or DNS solution but a new approach has emerged. Isolation defends against today’s sophisticated zero-day exploits using an “air-gapped” browsing approach.

    Identified by Gartner as "one of the single most significant ways to reduce web-based attacks," remote browser isolation has become an important line item in IT budgets around the world.

    But not all Isolation is created equal. With so many offerings how do you weed through the noise?

    Learn:

    - Why remote browser isolation technology adoption is on the rise
    - Key use cases for Isolation that should be evaluated
    - 3 critical requirements when selecting a practical browser isolation solution

    Featuring SC Media and Lennart van den Ende, VP of Worldwide Sales Engineering - Menlo Security
  • Automation for a Continuously Aware Data Center
    Automation for a Continuously Aware Data Center
    Nlyte Recorded: Aug 22 2019 35 mins
    This webinar will show you how Nlyte’s Asset Explorer's discovery application continuously improves asset accuracy in your Nlyte DCIM implementation.

    See how you can:

    - Improve capacity planning and resource utilization
    - Improve and increase SLAs and Support responsiveness by reducing MTTR and RCA
    - Eliminate manual audit efforts improving efficiency and accuracy of workflows
    - Accelerate implementation or expansion of DCIM with auto-discovery and auto-updating of asset data

    We look forward to seeing you there!
  • Investing in Cannabis Tech with OurCrowd and AICA
    Investing in Cannabis Tech with OurCrowd and AICA
    The America Israel Cannabis Association (AICA) Recorded: Aug 22 2019 45 mins
    In this live webinar we will chat with Kfir Kachlon, head of cannabis investments for OurCrowd. OurCrowd is one of the largest VC funds in Israel with over 1B in committed capital
  • How to overcome the challenges of a computer vision project
    How to overcome the challenges of a computer vision project
    Matthew Stainer & Haidar Altaie, SAS UK&I Recorded: Aug 22 2019 46 mins
    From recognizing faces to processing the live action of a football game, computer vision opens many exciting possibilities.

    Find out what it takes to really capitalize on advancements in AI.

    Many Data Scientists tend to get very excited about deep learning. And why not? It has strongly contributed to the further development of game-changing applications like computer vision or Neural Language Processing.

    However, before starting any computer vision endeavours, it pays to zoom in on some basics: Using a repeatable end-to-end process – to guide you through image pre-processing, deep learning and productionising your models - will help ensure your deep learning models are as accurate as possible and take your models out of the lab and drive actual business value.

    Speakers: Matthew Stainer & Haidar Altaie

    Matthew is a Principal Data Scientist at SAS UKI, supporting customers to enhance their businesses decision making. He works across the analytical technologies including data mining and forecasting. His particular areas of interest and expertise is text analysis, identifying the impact of analytical solutions on business processes and communicating the results of analysis to a business audience. He has specific experience in Customer Management solutions, including Complaints Analysis, NPS, Customer Analysis, Optimisation, Decision Management, Recommendation Engines, Campaign Management, Debt Management and Web Analytics.

    Haidar is a Data Scientist at SAS UKI. He joined SAS in September 2018 after graduating from University with a Mathematics and Statistics degree, and is passionate about integrating the analytical skills he’s learned across growing industries to enable customers to solve complex real life issues.
  • Delivering an Effective Cyber Security Exercise: Enhanced Breach Response
    Delivering an Effective Cyber Security Exercise: Enhanced Breach Response
    Daniel Norman, Research Analyst, ISF Recorded: Aug 22 2019 44 mins
    Organisations are constantly under threat with over two-thirds of them experiencing data breaches in 2018. As a result, preparedness and resiliency are paramount to protecting an organisation’s information from cyber attacks.

    Business leaders and their security teams can improve their ability to handle cyber attacks by running cyber security exercises. These exercises should help the organisation identify areas of improvement in people, process and technology, reducing the impact should a real cyber attack occur.

    In this webinar Daniel Norman, Research Analyst, ISF will share how organisations should approach running internal cyber security exercises to support breach identification, prevention and response.
  • Automation for a Continuously Aware Data Center
    Automation for a Continuously Aware Data Center
    Nlyte Recorded: Aug 22 2019 35 mins
    This webinar will show you how Nlyte’s Asset Explorer's discovery application continuously improves asset accuracy in your Nlyte DCIM implementation.

    See how you can:

    - Improve capacity planning and resource utilization
    - Improve and increase SLAs and Support responsiveness by reducing MTTR and RCA
    - Eliminate manual audit efforts improving efficiency and accuracy of workflows
    - Accelerate implementation or expansion of DCIM with auto-discovery and auto-updating of asset data

    We look forward to seeing you there!
  • 5 Steps to Streamline Your Spend Audit Process
    5 Steps to Streamline Your Spend Audit Process
    Bryan McArthur, Customer Success Lead, AppZen Recorded: Aug 21 2019 17 mins
    Discover how AI can transform your spend audit process enabling you to:
    - Save your auditors’ time
    - Make managers’ lives easier
    - Pay employees back faster

    The data gleaned from AI solutions can also give auditors a deeper understanding of spending trends so they can develop more effective policies to improve spend culture over time.

    Bryan McArthur, Customer Success Lead, AppZen, discusses how to improve expense report culture, save manager time, and gain useful insights into how your employees are spending money.
  • How AI and Machine Learning Unlock Unstructured data for Enterprise Automation
    How AI and Machine Learning Unlock Unstructured data for Enterprise Automation
    Manish Rai, VP Product Marketing, Automation Anywhere Recorded: Aug 21 2019 49 mins
    While nowadays robotics process automation (RPA) is a leading technology in enterprise automation, it operates with structured data according to well-defined rules.

    However, 80% of enterprise data is unstructured and many complex business processes involve cognitive decision making.

    Learn how AI and Machine Learning help to automate such processes by leveraging AI to bring structure to unstructured data and machine learning models to make an intelligent decision.
  • AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    Arun Trivedi Recorded: Aug 21 2019 45 mins
    As AI becomes all-pervasive, more and more companies need to start thinking about how AI can help in their business transformation and optimization journey. According to a Gartner survey, 54% respondents plan to start deployment within the next few years. However, their are multiple barriers, including finding a starting point and fear of the unknown.

    This webinar breaks down AI for the business & IT - what use cases should CIOs and business organizations focus on and how do we get started? What are the possible use cases? How do we even go about thinking about AI in our organization in a structured way?
  • State of ePayables: How best in class organizations improve performance
    State of ePayables: How best in class organizations improve performance
    Bob Cohen, Research Director and VP of Marketing, Ardent Partners and Andy Moir, Senior Product Marketing Manager, Tradeshift Recorded: Aug 21 2019 61 mins
    With advances in technology and moves toward digital transformation, today’s accounts payable departments are more focused than ever on leveraging automation to streamline the AP process, make it more efficient and enable more strategic activities to be carried out. But according to Ardent Partners’ State of ePayables 2019 report, even best-in-class organizations are still left with invoice exceptions, only about half of the suppliers submitting electronic invoices, and low early payment opportunities to improve working capital. Is that the best that we can do? Is your AP department truly digital?

    Join Ardent Partners and Tradeshift for our upcoming webinar where we will:
    • Deep dive into the challenges faced by the AP department and the drivers that shape AP leaders’ priorities on the quest to digitize
    • Present the outcomes you should be looking for in an AP transformation journey and how you should go from electronic to digital
    • Explore what best-in-class organizations do and how you can leverage to take your AP department to the next level
    • Identify quick wins and long-term strategies to improve operations and results going beyond best-in-class
  • DocuSign Click: Reduce your risk by capturing legal acceptance to standard terms
    DocuSign Click: Reduce your risk by capturing legal acceptance to standard terms
    Kelli Feeley, Product Marketing / Julianne Wu, Director, Product Management Recorded: Aug 21 2019 17 mins
    What if you could easily improve user experience by clearly displaying your terms and reduce your risk of non-compliance to legal standards?

    In this webinar, we’ll introduce you to DocuSign Click, one of our newest products that lets you capture customer acceptance of standard agreement “terms” with a single click on websites or mobile apps.

    Kelli Feeley, Product Marketing Lead for Click and Julianne Wu, Director, Product Management for Click, will show you how companies are using Click to:

    - Ensure sufficient evidence when capturing customer consent.
    - Deploy and maintain with speed and ease to free up their IT team’s time.
    - Reduce the risk of non-compliance to legal standards.
  • A guide to biotechnology commercialisation
    A guide to biotechnology commercialisation
    Pete Hotten Recorded: Aug 20 2019 43 mins
    Over the past century, life sciences has exploded with innovation and it continues to promise excellent commercial opportunities for those with scientific and academic research in this area. However, research on its own is not enough for these discoveries and inventions to reach their commercial potential. With over thirty years' experience in the biotechnology sector, expert Pete Hotten provides a framework for commercialisation, what to look out for in market research and how evaluating the competition can help determine next best steps.
  • Manufacturing Intelligence: come tenere i processi sotto controllo
    Manufacturing Intelligence: come tenere i processi sotto controllo
    Alessandro Chimera, Manufacturing Industry Expert, TIBCO Software Inc. Recorded: Aug 20 2019 25 mins
    L'attuale tendenza nella produzione industriale è verso prodotti su misura, in lotti più piccoli e con tempi di consegna ravvicinati. Questo cambiamento può portare a frequenti modifiche della produzione, con conseguente aumento dei tempi di fermo macchina, maggiori costi di produzione, sprechi di prodotto e la necessità di rilavorare prodotti difettosi.
    Partecipa a questo webinar per capire come le soluzioni di Smart Manufacturing di TIBCO possono aiutarti per affrontare al meglio questa nuova sfida
    Gli argomenti trattati saranno:
    Applicazione delle tecniche di advanced analytics & machine learning / AI per ottimizzare complessi processi manifatturieri
    Come con il controllo statistico multivariato di processo è possibile evidenziare deviazioni da un riferimento non rilevabile con il metodo univariato
    Come monitorare in tempo reale l’OEE di fabbrica ed avere una vista a 360 gradi della produzione.
    Casi di studi dei nostri clienti
  • Coaching Tools to Empower Performance
    Coaching Tools to Empower Performance
    Gillian Jones-Williams & Ro Gorell Recorded: Aug 20 2019 58 mins
    How are your coaching skills? Do you feel you genuinely empower people to come up with ideas and improve performance or could your coaching toolbox do with a bit of brushing up?

    If you are an existing coach, this webinar will refresh your skills and introduce you to some new tools. If you are new to coaching you will find this a useful introduction to some of the skills that will help you to get the best from people.

    Gillian Jones-Williams and Ro Gorell, authors of 50 Top Tools for Coaching and How to Create a Coaching Culture will be sharing with you some key concepts and tools from their newly published 4th edition of 50 Top Tools for Coaching and answer all your questions on coaching. Gillian and Ro have over 30 years coaching experience between them and will be helping you to develop a coaching mindset.
  • Revolutionise your consumer banking experience with AI and Machine Learning
    Revolutionise your consumer banking experience with AI and Machine Learning
    Tiffany Carpenter Head of Customer Intelligence Solutions, SAS, UK&I Recorded: Aug 19 2019 42 mins
    During this webinar we will discuss how decisions driven by AI and machine learning lead to real-time NBAs, higher revenues and reduced risk.

    Customers increasingly want different things from banks. Colleagues need the tools to provide new levels of customer experience. Yet, you may have challenges with too much latency, a lack of granular data or manual processes.

    As you adapt to the Open Banking era, you’re looking to drive change at speed, to be able to put the customer at the center of your organisation and make the right decisions, at the right time, to drive the right outcome.

    Why attend?

    Learn how decisions driven by AI and machine learning lead to real-time NBAs, higher revenues and reduced risk

    Understand where to focus your time and investment to identify the customer decisions within the organisation, to quickly prove the value and move that needle to make an impact to the bottom line

    Speaker: Tiffany Carpenter, Head of Customer Intelligence Solutions

    Tiffany heads up SAS Customer Intelligence Solutions in the UK and brings over 20 years of experience in helping organisations transform customer experience across sales, service and marketing operations.

    In her current role at SAS, Tiffany guides organisations on the application of advanced analytics and artificial intelligence to harness customer insights and deliver relevant one-to-one experiences.
  • How to master sleep - Get your best night's sleep ever
    How to master sleep - Get your best night's sleep ever
    Nick Elvery - Human Optimisation Expert Recorded: Aug 16 2019 30 mins
    Sleep is an essential component of living an optimised life but good quality sleep alludes so many people these days. In this webinar, Nick will work your through the best practices to get the best night' sleep ever.
  • Is Data Still the New Currency?
    Is Data Still the New Currency?
    Primitive Logic CEO Jill Reber & President Kevin Moos Recorded: Aug 15 2019 36 mins
    Getting your company ready for GDPR, CCPA, and other data privacy laws isn’t about putting a few new processes in place — it’s about rethinking your entire approach to personal data, including how to get value from it. For decades, companies have collected and stored all kinds of personal information “just in case” they ever needed it.

    Today's data privacy regulations require a different approach. You need to be proactive in thinking about how to get value from your data, and you need to understand exactly what your company is doing with personal data and why.

    Join Jill Reber and Kevin Moos of Primitive Logic to learn:
    - How to work with third parties who process personal data on your behalf
    - How preparing for data privacy laws helps you understand your data on a whole new level (and why that’s a good thing)
  • How to Automate and Streamline your Telecom Business with Intelligent Automation
    How to Automate and Streamline your Telecom Business with Intelligent Automation
    Heidi Hattendorf - Global Telecoms Leader at Automation Anywhere Recorded: Aug 15 2019 34 mins
    Gartner estimates that by 2021 over 90% of medium & large enterprises will have adopted Robotics Process Automation (RPA). As a constantly evolving industry, telecom operators cannot miss out.

    Join Heidi Hattendorf, Global Telecom Leader at Automation Anywhere, for this overview of Robotics Process Automation (RPA) & Intelligent Automation for Telecom.

    3 Key takeaways:
    1) Learn why intelligent automation is so effective and how you can apply it quickly to increase productivity and simplify your processes.
    2) Explore Telecom specific use cases, opportunities and ROI
    3) Find out about customer examples and success stories

    Learn why intelligent automation is so effective and how you can apply it quickly to your business to increase productivity and simplify your processes. We will look at how the technology can help you free your employees up from mundane repetitive tasks, allowing you to focus on your business in Telecom whether preparing for 5G, looking at new customer connections, leveraging content or enabling your team to focus on more strategic work with greater business impact.

    The webinar will also highlight the top Use Cases in Telecom with specifics on results achieved, how it can help you across the Enterprise and reference examples.

    This is part of a Series on Intelligent Automation for Telecom. Watch for future sessions on Building a Center of Excellence and a deeper dive on the most popular Use Cases/applications coming soon.
  • Ask the Biometrics Expert: Q&A on the current state of Biometrics
    Ask the Biometrics Expert: Q&A on the current state of Biometrics
    Susana Lopes, Biometrics Product Manager & Niamh Cassidy, Head of Content Recorded: Aug 15 2019 21 mins
    Biometric technology has been gathering traction and is becoming almost ubiquitous across a range of industries and applications. But how does it work, what are the benefits, and what do businesses need to look at when implementing the technology?

    Watch this Q&A with Onfido’s biometrics expert, Susana Lopes, to learn:
    The new trends and tech that are seeing biometrics replace traditional identifiers
    Why a single biometric isn’t a silver bullet, and why multi-factor doesn’t always mean more secure
    The difference between behavioural and biological biometrics, and which will work best for your users
    What should be on your checklist when implementing biometric solutions.
  • Why You Should Have Zero Trust in the Web
    Why You Should Have Zero Trust in the Web
    Menlo Security Recorded: Aug 15 2019 38 mins
    "Trusted” Websites Are Not as Safe as First Thought!

    Today, attackers leverage the web’s ubiquity and users’ trust to infect devices and propagate malware. Website categorization has been compromised. Phishing and spear-phishing attacks drive today’s most significant data breaches, and clicking on apparently legitimate links within phishing emails exposes users to credential theft or malware infections, and possibly ransomware. “Trusted” websites are not as safe as first thought, and the list goes on.

    Whether users are accessing it for business or pleasure, the Internet today is no longer a place that can be trusted.

    Watch this webinar to learn how you can protect your users and lower your odds of a web-borne, companywide cyberattack.

    Discover:

    - Why the internet remains a dangerous place
    - Best practices for lowering the odds of a cyberattack
    - Newer technologies that are solving this problem
  • 5 Lessons learnt from 5 real-world AI Deployments
    5 Lessons learnt from 5 real-world AI Deployments
    Iain Brown, Head of Data Science, SAS UK&I Recorded: Aug 15 2019 46 mins
    Aiming to dispel the AI myth from the AI reality.

    This session provides practical real-world applications of AI solutions detailing the lessons learned and the pitfalls to avoid. You will understand the critical factors that will make your AI strategies successful and see what AI could deliver within your organisation.

    In addition we will discuss how to make sure AI is ethical by design, and why a governance framework is the crucial first step in ensuring AI is used in the right way.

    Speaker: Iain Brown

    Dr. Iain Brown (Twitter: @IainLJBrown) is the Head of Data Science at SAS UKI and Adjunct Professor of Marketing Analytics at University of Southampton working closely with the Financial Services sector, providing thought leadership on the topics of Risk, AI and Machine Learning.

    During his time at SAS he has been involved in delivering numerous projects, and driving innovation in the fields of AI and the corresponding fields of machine learning, deep learning and natural language understanding.

    As an experienced public speaker, he has presented at a number of internationally renowned conferences and conventions and has papers published in the European Journal of Operational Research, International Journal of Forecasting and the Journal of Expert Systems with Applications on the aforementioned areas of expertise
  • Combat Phishing: How to Turn Links Into Read Only
    Combat Phishing: How to Turn Links Into Read Only
    Jonathan Lee, Sr. Product Manager - Menlo Security Recorded: Aug 14 2019 53 mins
    99% of security breaches are initiated through email and webmail attacks. Thus, proving prevention obviously fails, and detection and response are far from guaranteed. So why try the same old failed security approaches?

    It’s time to try something that’s transforming email security—isolation. Isolation doesn’t block threats—it eliminates.

    In this webcast, attendees will learn:
    -How to combat users who are re-offenders when it comes to clicking unsafe email links and attachments
    -Need an additional layer other than a sandbox waiting for patient zero
    -The ease of deploying isolation without interfering with user experience in 10 minutes

    Save your seat to see how Isolation can help you eliminate malware and improve productivity of your employees.
  • Achieving Big Business Value from Big Data Initiatives
    Achieving Big Business Value from Big Data Initiatives
    Rick Karl, Vice President of Value Engineering, Zaloni Recorded: Aug 13 2019 34 mins
    ROI.
    Risk reduction.
    Cost savings.

    Ask 3 different people what their idea of business value means and you’ll often get three different answers. When you’re trying to implement an enterprise-wide data hub, it’s often necessary to show value early and often but how can that be easily done when there are multiple stakeholders?

    To justify the investment, it’s critical to show how your new data hub will meet the goals of IT, Finance, and any other departments involved in the initiative. By accurately measuring value, your project will be poised to cut costs, generate revenue, and radically transform the business.

    Join Rick Karl, Zaloni’s VP of Value Engineering, as he shows what’s needed when trying to highlight the value an enterprise data hub can provide to an organization.

    Topics include:
    - Challenges in demonstrating business value for complex data initiatives
    - How to perform a business value assessment for modern data efforts
    - Making the business case that aligns IT and Finance objectives
  • Evaluating Portfolios in Volatile Times
    Evaluating Portfolios in Volatile Times
    Robert J. Horrocks, PhD, CIO, David Dali, Portfolio Strategist, and Andy Rothman, Investment Strategist Recorded: Aug 13 2019 63 mins
    Global investors continue to feel the repercussions of U.S–China trade tensions, and now China's currency "devaluation" and protests in Hong Kong have further rattled markets. Amid the turmoil, we believe Asia's economic fundamentals make the region resilient and are optimistic about Asian equities over a full market cycle.

    Please join an exclusive webcast with industry experts from Matthews Asia for an interactive discussion on:

    - The state of China's central bank and monetary policy

    - The implications of China's currency "devaluation"

    - What the Hong Kong protests mean for Asia's economy

    - What investors can do to help mitigate volatility
  • AI for Identity Verification: Going Beyond the Buzzwords
    AI for Identity Verification: Going Beyond the Buzzwords
    Parker Crockford – Director of Policy & Strategic Accounts, Onfido | Mohan Mahadevan – VP of Research, Onfido Recorded: Aug 13 2019 55 mins
    The way we verify our identities is changing. With traditional enterprises evolving and taking their operations fully digital, and newer all-digital businesses are growing exponentially, it makes sense that identity verification and KYC move online too. But in a remote setting, it’s hard for businesses to scale up their user onboarding without also increasing risk. Now, many are turning to AI-based solutions to meet that need.

    From hybrid to augmented, machine learning to deep learning, there are lots of new approaches to identity verification out there. But how can businesses tell the difference between buzzword and true black box, and what are the benefits of each?

    In this discussion, we’ll decode the various different applications of AI to the identity verification problem. We’ll also discuss how to use these new technologies to increase efficiencies at scale and provide exceptional customer experiences.

    Join this expert panel webinar to hear a dynamic panel discussion on:
    -The challenges of traditional methods of identity verification, and why enterprises are turning to AI
    -The different ways AI can be applied for more efficient identity verification
    -The benefits of a hybrid human-AI approach
    -A new identity reality: How will we be able to use our identities in future
  • Ultra AI - Building Corporate Intelligence Agency (CIA) - Part 1
    Ultra AI - Building Corporate Intelligence Agency (CIA) - Part 1
    Thomas B. Cross Aug 27 2019 3:00 pm UTC 45 mins
    Business Espionage & Sabotage Seminar on Building a Corporate Intelligence Agency (CIA)
    "Competitors have this time prevented us from knowing enough about them; but we have not prevented them from knowing far too much about us.”
    Critical analysis on building an ultra artificial intelligence and quantum computing for business intelligence gathering, internal and external threat assessment, competitive intelligence, customer assessment and actions and more.
  • Building an evolving culture of continuous improvement
    Building an evolving culture of continuous improvement
    Andrea Goodkind, Wazoku Aug 28 2019 9:00 am UTC 38 mins
    Businesses today must be set up to change, but, more importantly create change as a constant capability inside it’s organisation.

    In this webinar, you will learn:

    - The importance of building a culture of EveryDay innovation where employees are engaged, and recognised and rewarded for their contributions.
    - How Waitrose has engaged senior leadership by demonstrating how small changes add up and are tied to the overall strategic vision.
    - How organisations can start in one area and use the lessons learned to build an organisation-wide capability.
  • How Isolation Helps SOC Analysts Threat Hunt
    How Isolation Helps SOC Analysts Threat Hunt
    Patrick Darrow, Product Management Team - Menlo Security Aug 28 2019 9:30 am UTC 29 mins
    Security Operations Centers are a crucial aspect of ensuring data security. However, managing a Security Operations Center (SOC) can be burdensome for any IT team. The job continues to be complicated, and companies face a challenge to obtain talent that can help. Vendors are claiming to make the time to hunt more productive, typically by applying some level of intelligence to the alerts process. Does this work?

    Identified by Gartner as "one of the single most significant ways to reduce web-based attacks," remote browser isolation has become a significant line item in IT budgets around the world and now can help SOC teams replay attacks like never before, providing them with the insight and evidence of a breach.

    Listen to this webinar to:

    - Understand how things are done today with detection-based solutions
    - Where SOC analysts spend time during the process of Threat Hunting
    - How Isolation remove threats and can replay a real-world attack for forensic purposes

    To see how Isolation helps SOC analysts threat hunt, register now.
  • Career Development – Nudge your way to a mentor network
    Career Development – Nudge your way to a mentor network
    Darryl Howes MSc Aug 28 2019 11:00 am UTC 50 mins
    Success takes teamwork. No one can do it all on their own and interacting with new people is important. We never know who we might meet and the effect they may have on our professional life and career.

    Nurturing key relationships that can facilitate career and personal development is what all successful people do. And they build this network continually and consistently.

    How can you build a network of mentors, advisors and contacts and what’s the best way to go about doing this? Business psychologist Darryl Howes MSc will provide practical tips and advice, with insight drawn from social science and a 30-year career in financial services.

    Darryl Howes MSc
    Darryl helps professionals develop networking and career management strategies. He holds a First Class Honours undergraduate degree and a Masters in Organisational Psychology from the University of Surrey, UK. A visiting lecturer and speaker for City University, the University of Surrey Careers Service and Aston Business School, he has also worked extensively with organisations such as The Institute of Leadership and Management and The Institute of Directors. He has written for a range of publications including People Management (CIPD), Financial Management (CIMA) and the ILM publication, ‘Edge’.

    A past National Executive Committee member of The Division of Occupational Psychology of the British Psychological Society, Darryl was nominated for the 2016 CIPD/People Management Power List for Learning & Development professionals, naming the top 20 bloggers, tweeters and all-round social media powerhouses. In 2017/2018, he was selected as a Personal Mentor under Her Majesty Queen Elizabeth’s QYL initiative, one of only 60 worldwide.
  • Maximize ROI through AR/AP Process Modernization
    Maximize ROI through AR/AP Process Modernization
    Medha Patel, CPA, Paro Aug 28 2019 3:00 pm UTC 60 mins
    What costly mistakes are businesses making that they don’t know about within the AR/AP process? Through our experience with our clients, here’s what we’ve noticed, and here’s how we were able to monumentally transform their business.

    In this webinar you'll learn:
    -The most succesful techniques to deal with slow or delinquent payments
    -How to effectively identify, prevent, and mitigate fraud
    -What internal controls will keep your AP process on-track and keep partners happy

    If you are looking to make an positive impact on your finance department and procedures, this webinar is a great place to start!
  • A Closer Look at Isolation: Hype or Next Gen Security?
    A Closer Look at Isolation: Hype or Next Gen Security?
    Kowsik Guruswamy, CTO - Menlo Security & John Pescatore, Director of Emerging Technologies - SANS Institute Aug 28 2019 5:00 pm UTC 55 mins
    This webinar looks at Isolation from different viewpoints. Learn from a Menlo Security customer, along with John Pescatore, Director of Emerging Technologies at SANS Institute, and Kowsik Guruswamy, Menlo Security CTO, as they explore why organizations around the globe are looking at isolation as the means to protect their users from the ever-present web and email dangers.

    In This Webinar Will Dive Into:

    - The shortcomings of today’s reactive security philosophy
    - Why the web continues to present a risk to businesses
    - The benefits of embracing Isolation
    - How organizations should rethink their security strategy moving forward
  • Double Dragon: APT41, a Dual Espionage and Cyber Crime Operation
    Double Dragon: APT41, a Dual Espionage and Cyber Crime Operation
    Jacqueline O'Leary,Principal Analyst; Raymond Leong, Principal Threat Analyst; Dan Perez, Principal Threat Analyst Aug 29 2019 3:00 pm UTC 60 mins
    Defending the frontlines of cybersecurity is a never-ending battle, with new advanced persistent threat (APT) groups lurking to steal data, compromise infrastructure, and interfere with victim business operations. FireEye’s newly named threat group, APT41 is no exception. Their aggressive and consistent mode of operation, and highly sophisticated tactics, distinguishes them from other adversaries making them a double threat to contend with.

    APT41 uniquely balances espionage activity concurrently with financially motivated activity driven by personal gain. Since 2012 FireEye has observed APT41 conduct in a wide range of operations including data theft, innovative supply-chain attacks, and the use of unique tools and targeting techniques.

    Join this webinar to hear FireEye Threat Intelligence experts, Jacqueline O’Leary, Raymond Leong and Dan Perez, provide:

    •Insights into attribution and shared tactics between espionage and financially motivated operations
    •Supply chain compromises attributed to APT41 activity
    •Unique malware capabilities and techniques
    •Details on connections to identified personas
  • Venture Industrialist: Investment Strategies for Connected Industry
    Venture Industrialist: Investment Strategies for Connected Industry
    Ken Forster, Managing Director, Momenta Partners & Momenta Ventures Aug 29 2019 4:00 pm UTC 60 mins
    The digital transformation of industry is creating significant opportunity with millions of devices connected to the internet for the purpose of collecting data, tracking usage, monitoring functionality, automating and optimizing systems and processes. While traditional venture capital has shied away from industrial applications and hardware, there’s been a rise of a new class of ventures investors: the venture industrialist. In this webinar, Momenta Ventures will share their insights and practitioner's perspective on investing in Connected Industry, understanding the market, trends and risks. This webinar is for ANYONE seeking insights on investing in Connected Industry.

    - What is Connected Industry?
    - How do Connected Industry investments differ from traditional venture investments?
    - Momenta’s Connected Industry investment themes
    - Momenta’s investment criteria
    - Q&A; ask our practitioners your burning questions
  • SkyStem: Overview of the SEC's Whistleblower Program
    SkyStem: Overview of the SEC's Whistleblower Program
    Nancy Wu, Sales and Customer Support, SkyStem Aug 29 2019 6:00 pm UTC 57 mins
    [Live Recording] Join us for an overview of the SEC's Whistleblower Program. Learn about how the program is set up, the extent of damages awarded to date, and the resulting benefits the program has produced for our society at large.

    Please note: CPE credit not available for this playback
  • Security for Azure with Trend Micro and SoftwareONE
    Security for Azure with Trend Micro and SoftwareONE
    Gavin Evans, Trend Micro and Doug Vincent-Townend, SoftwareONE Sep 2 2019 8:00 am UTC 21 mins
    Cloud, by its nature, can provide enhanced security because of the shared security model.

    In the case of Azure, security responsibility is shared between Microsoft and the customer.

    For IaaS, Microsoft is responsible for physical security, portions of host infrastructure and network controls. However, substantial responsibility for protecting Azure IaaS infrastructure falls on the customer.

    How do you make sure your data is secure as it enters the cloud?

    Join SoftwareONE and Trend Micro as we discuss the following:

    •The shared responsibilities across the customer and cloud provider
    •The shifting and transforming landscape and its impact on maintaining compliance
    •The growing requirements for speed and automation
    •Stopping advanced threats and protecting vulnerabilities
    •Putting in place security and compliance controls above and beyond the responsibility of the cloud provider

    We will also discuss SoftwareONE’s managed security service which enables organisations to stop malicious activities, and improve security effectiveness for Azure workloads.

    While adoption of Azure drives higher levels of innovation and competitive advantage, a secure Azure environment is essential for protection against threats or data breaches and to ensure compliance with data privacy and industry regulations.

    Find out how SoftwareONE and Trend Micro can help you achieve this.
  • How to Turn Your Phishing Links Into Read Only
    How to Turn Your Phishing Links Into Read Only
    Jonathan Lee, Sr. Product Manager - Menlo Security Sep 3 2019 9:00 am UTC 53 mins
    99% of security breaches are initiated through email and webmail attacks. Thus, proving prevention obviously fails, and detection and response are far from guaranteed. So why try the same old failed security approaches?

    It’s time to try something that’s transforming email security—isolation. Isolation doesn’t block threats—it eliminates.

    In this webcast, attendees will learn:

    -How to combat users who are re-offenders when it comes to clicking unsafe email links and attachments
    -Need an additional layer other than a sandbox waiting for patient zero
    -The ease of deploying isolation without interfering with user experience in 10 minutes

    Save your seat to see how Isolation can help you eliminate malware and improve productivity of your employees.
  • How to Build Trust & Secure Online Connections
    How to Build Trust & Secure Online Connections
    Head of Fraud at Onfido, Michael Van Gestel & Global Partnership Manager at iovation, Gavin Barker Sep 3 2019 3:00 pm UTC 43 mins
    Onfido and iovation have teamed up to examine how companies in the Demand Economy balance detecting and eliminating fraudulent account activity, provide safe and seamless authentication/authorization experiences, and maintain compliance in digital environments across any industry. You will hear from world-renowned fraud expert and Onfido Head of Fraud, Michael Van Gestel, who will dive into current fraud techniques and challenges in a digital world. Many government agencies count on Michael’s expertise and training - including global airports and Interpol - to detect the most innovative and clever forms of fraud.

    You will learn:

    - Keys to ensuring provider and consumer safety and how to create a trusted digital business
    - Ways to make the internet a safer and more trustworthy place to do business
    - How to build trusted and secure online connections for your members/clients
    - Steps you can take to protect your business and your members/clients
  • Real world examples of Artificial Intelligence in Insurance
    Real world examples of Artificial Intelligence in Insurance
    Georgios Kapetanvasileiou, Lead Data Scientist, SAS, UK&I Sep 4 2019 3:00 pm UTC 60 mins
    Cutting through the hype of Machine Learning and AI, we will take you through a practical application of how Machine Learning was effectively used in the insurance industry. Learn how organisations are deriving actionable insight from AI applications and the business value they deliver today. This will further clarify the role of human ML expertise in the development process, both now and in future machine learning and analytics process modernisation
  • How to Deliver Employee Health and Wellness Experiences That Matter
    How to Deliver Employee Health and Wellness Experiences That Matter
    Rohan Muralee, MMB, Asia Sales Leader & Samuel Tan, MMB Health Consulting Leader Sep 5 2019 6:00 am UTC 45 mins
    Do you want to:

    •Boost workforce productivity and engagement?
    •Combat rising costs of health and well-being programs?
    •Predict and forecast health risks to design smarter intervention plans?
    •Learn best practices from experts about what they are proactively implementing for several industries across Asia?

    Join our leading experts as they:
    •Reveal the top drivers of medical claims in Asia.
    •Highlight key health risk factors.
    •Share insights and best practices into how insurers (and employers) are responding with data analytics and innovative health plans.
    •Conduct a ‘live’ demo that helps accurately predict risk areas and pinpoint potential interventions.
  • SkyStem: Back to Basics with Reconciliations
    SkyStem: Back to Basics with Reconciliations
    Nancy Wu, Sales and Customer Support, SkyStem Sep 5 2019 6:00 pm UTC 59 mins
    [Live Recording] It's time to show some love for the workhorse of the financial close process -- balance sheet account reconciliations! Join us in this webinar, where we share best practices on how to think about the reconciliation work each month, when best to do reconciliations, how they should be prepared, and some common pitfalls to avoid.

    Please note: CPE credit not available for this playback.
  • How to Stay One Step Ahead of Phishing Attacks
    How to Stay One Step Ahead of Phishing Attacks
    Menlo Security Sep 5 2019 6:00 pm UTC 55 mins
    How Are You Staying Ahead?

    Phishing is a serious business. It is the most common targeted method of cyber attacks, and the main perpetrators for phishing attacks are organized crime syndicates and state-affiliated actors.* Despite multiple security defense layers and many hours and dollars spent on end-user training, phishing continues to create headaches for security administrators.

    In This Webinar You Will Learn:

    - New phishing prevention techniques
    - How to stop ransomware, malware, and drive-by-exploits enabled by email phishing
    - Updated security research findings
    - Real-life case studies for using isolation techniques to prevent phishing attacks
  • Part 1 SQL End of Support Readiness: What to Know and How to Prepare
    Part 1 SQL End of Support Readiness: What to Know and How to Prepare
    Kaz Traverso, Solutions Specialist; David Bloxham, Marketing Manager Sep 10 2019 8:00 am UTC 20 mins
    Make sure you are fully informed about the upcoming end-of-support for Microsoft SQL Server 2008 and 2008 R2 – and ensure your organisation is ready.

    Once SQL Server 2008 reaches its end of support deadline on 9th July 2019, security updates will no longer be released for it, leaving systems open to outside threats, and the risk of non-compliancy with industry requirements such as GDPR.

    In part 1 of our 4-part series to help with your readiness Solution Specialist from SoftwareONE, Kaz Traverso, and Marketing Manager, David Bloxham, will discuss the essential pieces of information to help with your strategy planning, including:

    •What is ‘End of Support’ and what does it mean
    •What are the timelines and other upcoming End of Support products
    •Security risks and impact on ISO and GDPR compliance
    •Operational constraints
    •How to understand your risk – discovery tools and assessment
    •What are your options – stay on-prem or move to Azure or hybrid approach?

    Within the webinar series in part 2 we discuss the cloud migration options and process in more detail, part 3 looks at licensing and commercial options and in part 4 we share best practice governance for hybrid environments for cloud management and cost control.
  • Practical data privacy lessons for Financial Services
    Practical data privacy lessons for Financial Services
    Featuring AWS & Privitar Sep 10 2019 3:00 pm UTC 60 mins
    Finance leaders are fast realizing that their current approach to protecting their data isn’t working – for them or for their customers.

    As well as the obvious financial and legal penalties, financial institutions are facing a trust crisis. Every new data breach erodes consumer confidence in the industry itself. It’s time for data leaders in financial services to take back control; to build a new narrative around their respect for customer data.

    Register for our webinar to get a deeper understanding of how leading financial services organizations go about protecting their customers’ data – while encouraging innovation with data

    - Learn how to overcome barriers to the full use of data in the age of data privacy

    - Understand how to transform data use in your own organization

    - Discover how to build a best in class business case for safer, better data use
  • Maximizing Profits by Connecting CRM, ERP and Project Management Systems
    Maximizing Profits by Connecting CRM, ERP and Project Management Systems
    Jeffrey Gregorec Executive Vice President & General Manager at TimeLinx Software Sep 10 2019 4:00 pm UTC 45 mins
    Connecting the Dots Between CRM, ERP and Project and Service Management Systems to Maximize Profits, Increase Efficiencies and Offer the Best User Experience. Join us for on September 10th, 2019 to listen to industry expert Jeffrey Gregorec weigh in how project and service management companies are taking advantage of the explosive growth across their industries leveraging integrations across their CRM, ERP and PSM platforms.
  • Hourly Worker Retention: The Key Driver Companies Overlook
    Hourly Worker Retention: The Key Driver Companies Overlook
    Frank Pereira, managing partner at Coleman Consulting Group & Steve O'Brian, VP of marketing at Shiftboard Sep 10 2019 5:00 pm UTC 33 mins
    In today’s tight labor market, organizations with hourly workers are experiencing unprecedented challenges sourcing enough labor to operate their businesses. To ensure a healthy talent pool, they are focusing on strategies to improve worker retention.

    Join Steve O'Brian, VP of marketing at Shiftboard, and Frank Pereira, managing partner of Coleman Consulting Group, as they discuss research-based insights and best practices derived from their extensive experience working with industry-leading organizations on one commonly overlooked factor that most impacts employee turnover: the work schedule.

    In this webinar you will learn:

    · Drivers of hourly worker turnover
    · The impact of work schedules on job satisfaction
    · Factors of the work schedules that matter most to hourly workers
    · What employers can do to improve retention
  • SkyStem: Perfecting the Close Checklist
    SkyStem: Perfecting the Close Checklist
    Nancy Wu, Sales and Customer Support, SkyStem Sep 10 2019 6:00 pm UTC 55 mins
    [Live Recording] It's time to spruce up the close checklist! Join us in this webinar where we will revisit best practices as well as practical tips to help improve the financial close process. Whether you have a close checklist, a close calendar, or even if you are still forming a close process, these practices will surely help your period-end close.

    Please note: CPE credit not available for this playback
  • Why You Should Have Zero Trust in the Web
    Why You Should Have Zero Trust in the Web
    Menlo Security Sep 11 2019 3:00 am UTC 38 mins
    "Trusted” Websites Are Not as Safe as First Thought!

    Today, attackers leverage the web’s ubiquity and users’ trust to infect devices and propagate malware. Website categorization has been compromised. Phishing and spear-phishing attacks drive today’s most significant data breaches, and clicking on apparently legitimate links within phishing emails exposes users to credential theft or malware infections, and possibly ransomware. “Trusted” websites are not as safe as first thought, and the list goes on.

    Whether users are accessing it for business or pleasure, the Internet today is no longer a place that can be trusted.

    Watch this webinar to learn how you can protect your users and lower your odds of a web-borne, companywide cyberattack.

    Discover:

    - Why the internet remains a dangerous place
    - Best practices for lowering the odds of a cyberattack
    - Newer technologies that are solving this problem
  • The ROI of Implementing DocuSign: Featuring Findings from the Forrester TEI Stud
    The ROI of Implementing DocuSign: Featuring Findings from the Forrester TEI Stud
    Reggie Lau, Forrester Principal TEI Consultant Sep 11 2019 8:30 am UTC 37 mins
    E-signature can accelerate and simplify the way you do business, but how can organisations quantify these benefits in monetary terms?

    This question is answered in the commissioned Total Economic Impact™ (TEI) study. Conducted by Forrester Consulting, the study determines the potential ROI enterprises may realise with DocuSign, from increased staff productivity to cost avoidance.

    Join guest speaker Reggie Lau, Forrester Principal TEI Consultant, as we provide you with a framework to evaluate the financial impact of DocuSign covering benefits, costs, risk, and flexibility.

    Camelot’s CRM Functional Consultant Leigh Soper will also join us, providing customer insights into the economic impact the UK National Lottery operators have experienced since deploying DocuSign in 2013.

    This webinar is an abridged version of the Forrester TEI of DocuSign study, The Total Economic Impact™ Of DocuSign UK.

    With DocuSign, companies can experience benefits such as:

    • 3-year return of £174,355 from improved internal processes
    • NIGO rates falling from 30 percent to 5 percent
    • Savings of £6.62 per agreement in operational costs

    Join our live webinar and discover the type of ROI your organisation can achieve with DocuSign.
  • Tradeshift Go Deminar
    Tradeshift Go Deminar
    Bob Chewey & Prem Vadlamudi Sep 11 2019 5:00 pm UTC 60 mins
    With Tradeshift Go you can enable the mobile workforce for next-generation expense payment and management:

    • Limit physical p-cards and corporate credit cards to reduce liability exposure
    • Extend use of virtual cards to manage spend where you have no control today
    • Give your users a world-class native mobile experience they will actually love
    • Extend to workers outside the organization who need access to buying or payment
    • Empower people to get work done, but keep the control and transparency

    With Tradeshift Go you can combine the flexibility of corporate cards with the control of pre-approval workflow.
  • The importance of accessibility in the digital age
    The importance of accessibility in the digital age
    See Wah Cheng (Senior Product Manager), Charlotte Sferruzza (Product Design Lead) and Sergio Moura (Senior Software Engineer) Sep 12 2019 1:00 pm UTC 28 mins
    Accessibility is often the last thing to be considered in the digital development process. In the physical world, accessibility is entrenched into planning, development and execution - so why isn’t it in the digital world?

    In this webinar See Wah Cheng (Senior Product Manager), Charlotte Sferruzza (Product Design Lead) and Sergio Moura (Senior Software Engineer) talk through their experiences in integrating accessibility at the heart of our product development process.

    Register now to learn:

    - What is accessibility, and how does it impact us all
    - The business impact of ignoring it
    - Why accessibility is more important than ever in a maturing digital world
    - How we’ve assessed our own product and workflow to embed accessibility at their heart - and what you can learn from our experience