Hi [[ session.user.profile.firstName ]]

Finance

  • How to master sleep - Get your best night's sleep ever
    How to master sleep - Get your best night's sleep ever
    Nick Elvery - Human Optimisation Expert Recorded: Aug 16 2019 30 mins
    Sleep is an essential component of living an optimised life but good quality sleep alludes so many people these days. In this webinar, Nick will work your through the best practices to get the best night' sleep ever.
  • Is Data Still the New Currency?
    Is Data Still the New Currency?
    Primitive Logic CEO Jill Reber & President Kevin Moos Recorded: Aug 15 2019 36 mins
    Getting your company ready for GDPR, CCPA, and other data privacy laws isn’t about putting a few new processes in place — it’s about rethinking your entire approach to personal data, including how to get value from it. For decades, companies have collected and stored all kinds of personal information “just in case” they ever needed it.

    Today's data privacy regulations require a different approach. You need to be proactive in thinking about how to get value from your data, and you need to understand exactly what your company is doing with personal data and why.

    Join Jill Reber and Kevin Moos of Primitive Logic to learn:
    - How to work with third parties who process personal data on your behalf
    - How preparing for data privacy laws helps you understand your data on a whole new level (and why that’s a good thing)
  • How to Automate and Streamline your Telecom Business with Intelligent Automation
    How to Automate and Streamline your Telecom Business with Intelligent Automation
    Heidi Hattendorf - Global Telecoms Leader at Automation Anywhere Recorded: Aug 15 2019 34 mins
    Gartner estimates that by 2021 over 90% of medium & large enterprises will have adopted Robotics Process Automation (RPA). As a constantly evolving industry, telecom operators cannot miss out.

    Join Heidi Hattendorf, Global Telecom Leader at Automation Anywhere, for this overview of Robotics Process Automation (RPA) & Intelligent Automation for Telecom.

    3 Key takeaways:
    1) Learn why intelligent automation is so effective and how you can apply it quickly to increase productivity and simplify your processes.
    2) Explore Telecom specific use cases, opportunities and ROI
    3) Find out about customer examples and success stories

    Learn why intelligent automation is so effective and how you can apply it quickly to your business to increase productivity and simplify your processes. We will look at how the technology can help you free your employees up from mundane repetitive tasks, allowing you to focus on your business in Telecom whether preparing for 5G, looking at new customer connections, leveraging content or enabling your team to focus on more strategic work with greater business impact.

    The webinar will also highlight the top Use Cases in Telecom with specifics on results achieved, how it can help you across the Enterprise and reference examples.

    This is part of a Series on Intelligent Automation for Telecom. Watch for future sessions on Building a Center of Excellence and a deeper dive on the most popular Use Cases/applications coming soon.
  • Ask the Biometrics Expert: Q&A on the current state of Biometrics
    Ask the Biometrics Expert: Q&A on the current state of Biometrics
    Susana Lopes, Biometrics Product Manager & Niamh Cassidy, Head of Content Recorded: Aug 15 2019 21 mins
    Biometric technology has been gathering traction and is becoming almost ubiquitous across a range of industries and applications. But how does it work, what are the benefits, and what do businesses need to look at when implementing the technology?

    Watch this Q&A with Onfido’s biometrics expert, Susana Lopes, to learn:
    The new trends and tech that are seeing biometrics replace traditional identifiers
    Why a single biometric isn’t a silver bullet, and why multi-factor doesn’t always mean more secure
    The difference between behavioural and biological biometrics, and which will work best for your users
    What should be on your checklist when implementing biometric solutions.
  • Why You Should Have Zero Trust in the Web
    Why You Should Have Zero Trust in the Web
    Menlo Security Recorded: Aug 15 2019 38 mins
    "Trusted” Websites Are Not as Safe as First Thought!

    Today, attackers leverage the web’s ubiquity and users’ trust to infect devices and propagate malware. Website categorization has been compromised. Phishing and spear-phishing attacks drive today’s most significant data breaches, and clicking on apparently legitimate links within phishing emails exposes users to credential theft or malware infections, and possibly ransomware. “Trusted” websites are not as safe as first thought, and the list goes on.

    Whether users are accessing it for business or pleasure, the Internet today is no longer a place that can be trusted.

    Watch this webinar to learn how you can protect your users and lower your odds of a web-borne, companywide cyberattack.

    Discover:

    - Why the internet remains a dangerous place
    - Best practices for lowering the odds of a cyberattack
    - Newer technologies that are solving this problem
  • 5 Lessons learnt from 5 real-world AI Deployments
    5 Lessons learnt from 5 real-world AI Deployments
    Iain Brown, Head of Data Science, SAS UK&I Recorded: Aug 15 2019 46 mins
    Aiming to dispel the AI myth from the AI reality?

    This session provides practical real-world applications of AI solutions detailing the lessons learned and the pitfalls to avoid. You will understand the critical factors that will make your AI strategies successful and see what AI could deliver within your organisation.

    In addition we will discuss, how to make sure AI is ethical by design, and why a governance framework is the crucial first step in ensuring AI is used in the right way.

    Speaker: Iain Brown

    Dr. Iain Brown (Twitter: @IainLJBrown) is the Head of Data Science at SAS UKI and Adjunct Professor of Marketing Analytics at University of Southampton working closely with the Financial Services sector, providing thought leadership on the topics of Risk, AI and Machine Learning.

    During his time at SAS he has been involved in delivering numerous projects, and driving innovation in the fields of AI and the corresponding fields of machine learning, deep learning and natural language understanding.

    As an experienced public speaker, he has presented at a number of internationally renowned conferences and conventions and has papers published in the European Journal of Operational Research, International Journal of Forecasting and the Journal of Expert Systems with Applications on the aforementioned areas of expertise
  • Combat Phishing: How to Turn Links Into Read Only
    Combat Phishing: How to Turn Links Into Read Only
    Jonathan Lee, Sr. Product Manager - Menlo Security Recorded: Aug 14 2019 53 mins
    99% of security breaches are initiated through email and webmail attacks. Thus, proving prevention obviously fails, and detection and response are far from guaranteed. So why try the same old failed security approaches?

    It’s time to try something that’s transforming email security—isolation. Isolation doesn’t block threats—it eliminates.

    In this webcast, attendees will learn:
    -How to combat users who are re-offenders when it comes to clicking unsafe email links and attachments
    -Need an additional layer other than a sandbox waiting for patient zero
    -The ease of deploying isolation without interfering with user experience in 10 minutes

    Save your seat to see how Isolation can help you eliminate malware and improve productivity of your employees.
  • Evaluating Portfolios in Volatile Times
    Evaluating Portfolios in Volatile Times
    Robert J. Horrocks, PhD, CIO, David Dali, Portfolio Strategist, and Andy Rothman, Investment Strategist Recorded: Aug 13 2019 63 mins
    Global investors continue to feel the repercussions of U.S–China trade tensions, and now China's currency "devaluation" and protests in Hong Kong have further rattled markets. Amid the turmoil, we believe Asia's economic fundamentals make the region resilient and are optimistic about Asian equities over a full market cycle.

    Please join an exclusive webcast with industry experts from Matthews Asia for an interactive discussion on:

    - The state of China's central bank and monetary policy

    - The implications of China's currency "devaluation"

    - What the Hong Kong protests mean for Asia's economy

    - What investors can do to help mitigate volatility
  • Achieving Big Business Value from Big Data Initiatives
    Achieving Big Business Value from Big Data Initiatives
    Rick Karl, Vice President of Value Engineering, Zaloni Recorded: Aug 13 2019 34 mins
    ROI.
    Risk reduction.
    Cost savings.

    Ask 3 different people what their idea of business value means and you’ll often get three different answers. When you’re trying to implement an enterprise-wide data hub, it’s often necessary to show value early and often but how can that be easily done when there are multiple stakeholders?

    To justify the investment, it’s critical to show how your new data hub will meet the goals of IT, Finance, and any other departments involved in the initiative. By accurately measuring value, your project will be poised to cut costs, generate revenue, and radically transform the business.

    Join Rick Karl, Zaloni’s VP of Value Engineering, as he shows what’s needed when trying to highlight the value an enterprise data hub can provide to an organization.

    Topics include:
    - Challenges in demonstrating business value for complex data initiatives
    - How to perform a business value assessment for modern data efforts
    - Making the business case that aligns IT and Finance objectives
  • AI for Identity Verification: Going Beyond the Buzzwords
    AI for Identity Verification: Going Beyond the Buzzwords
    Parker Crockford – Director of Policy & Strategic Accounts, Onfido | Mohan Mahadevan – VP of Research, Onfido Recorded: Aug 13 2019 55 mins
    The way we verify our identities is changing. With traditional enterprises evolving and taking their operations fully digital, and newer all-digital businesses are growing exponentially, it makes sense that identity verification and KYC move online too. But in a remote setting, it’s hard for businesses to scale up their user onboarding without also increasing risk. Now, many are turning to AI-based solutions to meet that need.

    From hybrid to augmented, machine learning to deep learning, there are lots of new approaches to identity verification out there. But how can businesses tell the difference between buzzword and true black box, and what are the benefits of each?

    In this discussion, we’ll decode the various different applications of AI to the identity verification problem. We’ll also discuss how to use these new technologies to increase efficiencies at scale and provide exceptional customer experiences.

    Join this expert panel webinar to hear a dynamic panel discussion on:
    -The challenges of traditional methods of identity verification, and why enterprises are turning to AI
    -The different ways AI can be applied for more efficient identity verification
    -The benefits of a hybrid human-AI approach
    -A new identity reality: How will we be able to use our identities in future
  • Transforming Mortgage Lending with Robotic Process Automation (RPA)
    Transforming Mortgage Lending with Robotic Process Automation (RPA)
    Ken Mertzel – Global Industry Leader, Financial Services at Automation Anywhere Recorded: Aug 13 2019 41 mins
    Over 25% of Financial Services business processes are likely to be automated in the next few years. Robotic Process Automation (RPA) is a critical tool to help your organization automate manual repetitive activities, access unstructured data, and quickly deliver error-free results.

    Join us live as Automation Anywhere, the leading provider of RPA and cognitive intelligence solutions, offers insights on how Financial Services companies and Mortgage Lenders have successfully implemented RPA.
    During this session, we will discuss:

    •Robotic Process Automation trends in the Financial Services industry
    •RPA Use Case Examples in Mortgage Banking
    •Three Steps to Successful RPA Implementation
  • SkyStem: Overview of the SEC's Whistleblower Program
    SkyStem: Overview of the SEC's Whistleblower Program
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Aug 8 2019 57 mins
    [Live Recording] Join us for an overview of the SEC's Whistleblower Program. Learn about how the program is set up, the extent of damages awarded to date, and the resulting benefits the program has produced for our society at large.

    Please note: CPE credit not available for this playback
  • How Organizations Use Next Generation Technology Asset Management For Compliance
    How Organizations Use Next Generation Technology Asset Management For Compliance
    Nlyte Recorded: Aug 8 2019 25 mins
    Businesses need to manage large numbers of network-connected devices, but the Excel method no longer cuts it - regardless of how good your formulas and macros are. Today, there are many stakeholders (HR, finance, legal, etc.) who constantly require recent information - especially on desktops, to complete their jobs.

    Referencing real-world case studies, Nlyte will highlight a new generation of IT Asset Management including:

    - Creating a "single source of truth" on all connected devices, for all departments
    - Automating software auditing to create a business-wide, dynamic baseline of data
    - Gathering GDPR, HIPAA, SOX-related info
    - Tightening security by spotlighting rogue devices and more

    We look forward to seeing you there.
  • AI: The Next Wave of Productivity in Connected Industry
    AI: The Next Wave of Productivity in Connected Industry
    Ed Maguire, Principal Partner, Momenta Partners Recorded: Aug 8 2019 55 mins
    This special webinar presentation focuses on Artificial Intelligence and how it is changing the nature of Connected Industry.

    Artificial Intelligence and Machine Learning technologies are increasing productivity and accelerating the evolution of next generation solutions in the industrial IoT. In our webinar we will explore the "state of the union" around AI - the investment climate and key developments in research and business applications. We discuss some of the key considerations, risks and opportunities as AI technologies have become integrated into more parts of the economy. We also feature two innovative firms that are applying AI transform their businesses - Senseye and RevTwo.


    We will take a look at:

    - How and where AI is accelerating the ability to create value from IoT data
    - Key trends in AI Investment and research
    - Focus on companies that are successfully leveraging AI technologies in their Connected Industry offerings
    - Where you can benefit from growing use of AI in your business
  • What is your (Computer) Vision of AI?
    What is your (Computer) Vision of AI?
    Federica Citterio, Data Scientist, SAS Global Technology Practice Recorded: Aug 8 2019 32 mins
    While some still associate Artificial Intelligence with robots taking over the world, we are surrounded by far more realistic and beneficial examples of AI in our everyday life.

    Find out how applications of computer vision reinforce the interplay between man and machine.

    About the Webinar:

    In the last few years, the field of machine learning has made tremendous progress around computer vision. Convolutional neural networks can achieve reasonable performance on difficult visual recognition tasks – matching or even exceeding human performance in some domains.

    In this session we will explore successful use cases for computer Vision including various industries and aspects of everyday life. We want to uncover the value of moving your AI projects out of the lab and into the business.

    Speaker: Federica Citterio

    Federica is a Data Scientist at SAS, working across EMEA on the latest SAS technologies involving Artificial Intelligence. She is excited about combining business and data science to help companies make better decisions, grounded in trusted data and assisted by analytics

    Federica holds a master’s degree in applied mathematics from University of Milan, majoring in Statistics, Probability and Numerical Analysis.
  • Reverse the Curse of Non-Compliant Spend
    Reverse the Curse of Non-Compliant Spend
    Ryan Birdsall Recorded: Aug 7 2019 31 mins
    Making sure your business expenses comply with policy, negotiated contracts, and spend regulations is no small feat. It’s hard to get people to read the T&E policy, much less follow it.

    And regulatory compliance? If you’re auditing only a fraction of your expenses and invoices, how the heck do you keep your company out of hot water and off of the front page of the newspaper?

    Join Ryan Birdsall, Customer Success Manager, AppZen, as he discusses how to enforce compliance and stay out of regulatory hot water.
  • How to achieve GRC Maturity using ServiceNow? (Part-2)
    How to achieve GRC Maturity using ServiceNow? (Part-2)
    Clara Abraham, GRC Consultant; Swetha Shankar, ServiceNow Specialist; Kaviarasan S, ServiceNow Evangelist. Recorded: Aug 7 2019 50 mins
    In this part-2 of the GRC webinar, we are going to cover the stage 2 in achieving GRC maturity – ‘Improve Visibility and Performance’. In the previous session, we have covered how to get on-board in ServiceNow GRC from a manual processes. This session would cover step-by-step process on the following areas:

    Key takeaways:

    Introduction to stage 2: Repeatable (Improve Visibility and Performance)

    - Expand GRC/IRM to 2-3 use cases
    - Adoption expansion to process and control/risk owners
    - Monitoring on a point- in-time basis
    - Visibility through Dashboards & PA.
    - Start top-down. Leverag the Profiling engine

    Demo on ServiceNow GRC to cover the following:

    - Scoping for GRC using profiles
    - Controls management - Control Attestation and Control Indicators
    - Enterprise risk management - Risk assessments, Upstream and downstream risks and Risk Indicators
    - Dashboards to monitor controls and risks
  • 4 Ways to Monetize Data
    4 Ways to Monetize Data
    Frost & Sullivan, Chandos Quill, SVP/General Manager, ALC, Trey Stephens, Consultant, Acxiom Recorded: Aug 7 2019 55 mins
    More companies are building data-driven strategies to fuel growth in the upcoming data economy. Though in its nascent stages, data monetization has a considerable effect on many industry verticals. Currently, over 2.5 quintillion bytes of data is created every single day with a utilization rate of less than 0.5%, and companies need to address the stagnant pools of data underneath to pave the path to digital transformation.

    Join Frost & Sullivan's experts along with Chandos Quill, SVP/General Manager at ALC, and Trey Stephens, Consultant, Acxiom, in the webinar, 4 Ways to Monetize Data. The webinar will focus on the key implications of data monetization to a company’s operating models and business functions. It will look at growth opportunities and the future perspective of how data monetization will evolve and disrupt traditional industries like Automotive and Healthcare.

    Key Takeaways:

    • Jump innovation roadblocks by tapping into new categories of data within an organization.
    • Explore the various monetization routes to identify the best possible fit to strategically monetize data assets.
    • Interact with industry experts to understand the current advancements in data monetization.
  • Engaging employees through idea management
    Engaging employees through idea management
    Andrea Goodkind, Head of Marketing Recorded: Aug 7 2019 47 mins
    Tune into this webinar to learn how Shared Services Connected Ltd (SSCL) engaged over 67% of their global workforce by implementing an integrated and strategic innovation scheme.

    Learn how implementing an idea management platform enabled SSCL to:
    - Engage over 67% of their global workforce
    - Generate over 400 ideas
    - Achieve 400% ROI

    By adapting their company culture to focus on people-led improvements and innovation
    the organisation reduced cost and delivered wide value for their business and their customers.
  • UNDERSTANDING THE IMPACT OF SALES & MARKETING MISALIGNMENT
    UNDERSTANDING THE IMPACT OF SALES & MARKETING MISALIGNMENT
    Sam Momani, CEO of Global Technology Sales Solutions & Peter Strohkorb, CEO of Peter Strohkorb Consulting Dec 5 2019 10:00 pm UTC 60 mins
    Marketing serves two customers. The external customer and the internal customer or sales organization. Alignment with the internal customer is just as important to revenue success. Research has shown that revenues are positively impacted when marketing improves their alignment with sales.

    Join industry leaders to weigh into this highly contested area that affects revenue growth in what will likely be a heated exchange of insights focusing on determining the effects of marketing and sales misalignment.
  • How Isolation Helps SOC Analysts Threat Hunt
    How Isolation Helps SOC Analysts Threat Hunt
    Patrick Darrow, Product Management Team - Menlo Security Recorded: Aug 6 2019 29 mins
    Security Operations Centers are a crucial aspect of ensuring data security. On the other hand, managing a Security Operations Center (SOC) can be burdensome for any IT team. The job continues to be complicated, and companies face a challenge to obtain talent that can help. Vendors are claiming to make the time to hunt more productive, typically by applying some level of intelligence to the alerts process. However, does this work?

    Identified by Gartner as "one of the single most significant ways to reduce web-based attacks," remote browser isolation has become a significant line item in IT budgets around the world and now can help SOC teams replay attacks like never before, providing them with the insight and evidence of a breach.

    Listen to this webinar to:

    - Understand how things are done today with detection-based solutions
    - Where SOC analysts spend time during the process of Threat Hunting
    - How Isolation remove threats and can replay a real-world attack for forensic purposes

    To see how Isolation helps SOC analysts threat hunt, save your seat now.
  • Automate SharePoint-Spotfire Data Connection & Present Dashboards Easily
    Automate SharePoint-Spotfire Data Connection & Present Dashboards Easily
    Botond Kopacz, product owner, Enterprise Analytics, EPAM Systems Recorded: Aug 6 2019 21 mins
    Watch this webinar and learn more about EPAM's accelerators, which are plugins for the TIBCO Spotfire platform. You will be introduced to EPAM's SharePoint Connector and EPAM Excel Export through live product demos and use cases.

    EPAM SharePoint Connector for TIBCO Spotfire Software enables SharePoint data to be embedded within analytics, automates data import, ensures regular data refresh and solves integration challenges, which would be otherwise very costly to automate.

    The EPAM Excel Export, Spotfire extension allows users to convert every Spotfire visual into Excel charts, export data tables, and manage them into .xlsx files without any third party's applications required on premises.

    Watch this webinar for detailed product introductions and contact us at EnterpriseAnalytics@EPAM.com for more information, or to schedule a free consultation.
  • CCPA: How Startups and SMBs Can Prepare Without Panicking
    CCPA: How Startups and SMBs Can Prepare Without Panicking
    Jill Reber, CEO, Primitive Logic; Kevin Moos, President, Primitive Logic; David Jarzabek, Attorney, Royse Law Recorded: Aug 6 2019 58 mins
    The California Consumer Privacy Act (CCPA) impacts companies of all sizes, including startups and SMBs. CCPA will expand the privacy obligations of all organizations far beyond those required by current state privacy legislation (CalOPPA, etc.), and all organizations who gather and process personal data of California residents must be prepared. Fortunately, the right strategies can make this process easier than you may have thought.

    Join Primitive Logic and Royse Law to learn
    - Why CCPA readiness doesn’t have to “break the bank”
    - How to develop a cost-effective plan to get ready for CCPA
    - How to prepare for private right of action under CCPA and potential amendments
    - How data privacy is becoming part of standard M&A due diligence practices
  • An Artificial Intelligence Framework to Combat Human Trafficking
    An Artificial Intelligence Framework to Combat Human Trafficking
    Tom Sabo, Principal Pre-Sales Solutions Architect, SAS Recorded: Aug 5 2019 57 mins
    About the webinar:

    Human trafficking is a global epidemic. The scale, complexity and border-less nature of the abuse can stymie law enforcement, victim support programs and prevention efforts. Data from agencies and organizations focused on human trafficking is vital to these efforts.

    However, the amount, variety and unstructured nature of the data can hinder timely, effective responses by organizations with notoriously limited resources.

    What if we could use the power of AI to fight for the powerless?

    Join SAS public sector expert and text analytics practitioner Tom Sabo as he describes an AI framework for countering international human trafficking.

    Learn about:

    Applying text-based machine learning and rule-based text extraction to generate training for modeling efforts

    Enabling investigators, stakeholders and analysts to tap all the relevant data to inform better decisions

    How to extend the AI framework as new techniques and information become available
  • AA Ireland Transforms Itself and Insures Predictable Success
    AA Ireland Transforms Itself and Insures Predictable Success
    Chief Analytics Officer Colm Carey and Senior Quantitative Analyst Nina Jensen - AA Ireland Recorded: Aug 1 2019 3 mins
    Chief Analytics Officer Colm Carey and Senior Quantitative Analyst Nina Jensen on the advantages of putting analytics in the hands of every business user.

    AA Ireland specializes in home, motor, and travel insurance and provides emergency rescue for people in their homes and on the road, attending to over 140,000 car break downs every year, 80% of which are fixed on-the-spot.
  • Coaching Tools to Empower Performance
    Coaching Tools to Empower Performance
    Gillian Jones-Williams & Ro Gorell Aug 20 2019 11:00 am UTC 58 mins
    How are your coaching skills? Do you feel you genuinely empower people to come up with ideas and improve performance or could your coaching toolbox do with a bit of brushing up?

    If you are an existing coach, this webinar will refresh your skills and introduce you to some new tools. If you are new to coaching you will find this a useful introduction to some of the skills that will help you to get the best from people.

    Gillian Jones-Williams and Ro Gorell, authors of 50 Top Tools for Coaching and How to Create a Coaching Culture will be sharing with you some key concepts and tools from their newly published 4th edition of 50 Top Tools for Coaching and answer all your questions on coaching. Gillian and Ro have over 30 years coaching experience between them and will be helping you to develop a coaching mindset.
  • Manufacturing Intelligence: come tenere i processi sotto controllo
    Manufacturing Intelligence: come tenere i processi sotto controllo
    Alessandro Chimera, Manufacturing Industry Expert, TIBCO Software Inc. Aug 20 2019 12:00 pm UTC 25 mins
    L'attuale tendenza nella produzione industriale è verso prodotti su misura, in lotti più piccoli e con tempi di consegna ravvicinati. Questo cambiamento può portare a frequenti modifiche della produzione, con conseguente aumento dei tempi di fermo macchina, maggiori costi di produzione, sprechi di prodotto e la necessità di rilavorare prodotti difettosi.
    Partecipa a questo webinar per capire come le soluzioni di Smart Manufacturing di TIBCO possono aiutarti per affrontare al meglio questa nuova sfida
    Gli argomenti trattati saranno:
    Applicazione delle tecniche di advanced analytics & machine learning / AI per ottimizzare complessi processi manifatturieri
    Come con il controllo statistico multivariato di processo è possibile evidenziare deviazioni da un riferimento non rilevabile con il metodo univariato
    Come monitorare in tempo reale l’OEE di fabbrica ed avere una vista a 360 gradi della produzione.
    Casi di studi dei nostri clienti
  • Learn How Dirty Data can increase Profitability at Banks
    Learn How Dirty Data can increase Profitability at Banks
    Anand Subramaniam, Principal Architect AI & ML Practice, Aspire Systems Aug 20 2019 1:30 pm UTC 60 mins
    Figuring out how dirty data can be converted into useful insights can be a pain. Information about your customers can be easily retrieved if you have correct and actionable data that can be worked on. AI can only do wonders if this is the case. Banks that segment their customers’ data using AI have increased their revenue up to 30%. But let’s take a step back and think – when was the last time you checked for data accuracy. Or how sure are you that the data you’ve entered into your AI algorithm is correct? To predict what your banking customers are looking for, you need to have the data cleaned and all set for AI initiatives to succeed.

    In this webinar, you will learn

    • How to get the data cleaned up?
    • How to use them to get better insights?
    • How to use insights to improve your ROI?


    Speaker - Anand Subramaniam, the Head of AI Practice at Aspire Systems

    Join us on a August 20, Tuesday for an hour, discussing vital topics that can place you ahead in your data transformation journey.
  • A guide to biotechnology commercialisation
    A guide to biotechnology commercialisation
    Pete Hotten Aug 20 2019 3:00 pm UTC 60 mins
    Over the past century, life sciences has exploded with innovation and it continues to promise excellent commercial opportunities for those with scientific and academic research in this area. However, research on its own is not enough for these discoveries and inventions to reach their commercial potential. With over thirty years' experience in the biotechnology sector, expert Pete Hotten provides a framework for commercialisation, what to look out for in market research and how evaluating the competition can help determine next best steps.
  • DocuSign Click: Reduce your risk by capturing legal acceptance to standard terms
    DocuSign Click: Reduce your risk by capturing legal acceptance to standard terms
    Kelli Feeley, Product Marketing / Julianne Wu, Director, Product Management Aug 21 2019 9:00 am UTC 17 mins
    What if you could easily improve user experience by clearly displaying your terms and reduce your risk of non-compliance to legal standards?

    In this webinar, we’ll introduce you to DocuSign Click, one of our newest products that lets you capture customer acceptance of standard agreement “terms” with a single click on websites or mobile apps.

    Kelli Feeley, Product Marketing Lead for Click and Julianne Wu, Director, Product Management for Click, will show you how companies are using Click to:

    - Ensure sufficient evidence when capturing customer consent.
    - Deploy and maintain with speed and ease to free up their IT team’s time.
    - Reduce the risk of non-compliance to legal standards.
  • State of ePayables: How best in class organizations improve performance
    State of ePayables: How best in class organizations improve performance
    Bob Cohen, Research Director and VP of Marketing, Ardent Partners and Andy Moir, Senior Product Marketing Manager, Tradeshift Aug 21 2019 3:30 pm UTC 60 mins
    With advances in technology and moves toward digital transformation, today’s accounts payable departments are more focused than ever on leveraging automation to streamline the AP process, make it more efficient and enable more strategic activities to be carried out. But according to Ardent Partners’ State of ePayables 2019 report, even best-in-class organizations are still left with invoice exceptions, only about half of the suppliers submitting electronic invoices, and low early payment opportunities to improve working capital. Is that the best that we can do? Is your AP department truly digital?

    Join Ardent Partners and Tradeshift for our upcoming webinar where we will:
    • Deep dive into the challenges faced by the AP department and the drivers that shape AP leaders’ priorities on the quest to digitize
    • Present the outcomes you should be looking for in an AP transformation journey and how you should go from electronic to digital
    • Explore what best-in-class organizations do and how you can leverage to take your AP department to the next level
    • Identify quick wins and long-term strategies to improve operations and results going beyond best-in-class
  • AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    Arun Trivedi Aug 21 2019 4:00 pm UTC 45 mins
    As AI becomes all-pervasive, more and more companies need to start thinking about how AI can help in their business transformation and optimization journey. According to a Gartner survey, 54% respondents plan to start deployment within the next few years. However, their are multiple barriers, including finding a starting point and fear of the unknown.

    This webinar breaks down AI for the business & IT - what use cases should CIOs and business organizations focus on and how do we get started? What are the possible use cases? How do we even go about thinking about AI in our organization in a structured way?
  • Tradeshift Buy Deminar
    Tradeshift Buy Deminar
    Charles Kalajian & Patrick Massar Aug 21 2019 5:00 pm UTC 60 mins
    Striving for system efficiency is a common goal. We want our platforms to perform exactly how we expect and then some. Introducing Tradeshift Buy.

    Tune in for an exclusive demonstration of Tradeshift Buy where you’ll learn how to:

    • Manage your marketplace offerings in a central place, with custom pricing and options for each buyer or marketplace.
    • Aggregate offers from your sellers or marketplace, controlled and managed to the enterprise’s needs
    • Give everyone in your organization the power to buy what they need, for any kind of spend, across any marketplace
    • See and control all spend, with intelligent recommendations for optimizing your cost structure.
    • Connect any number of sellers and buyers, based on your brand and your T&Cs, with full access control
  • 5 Steps to Streamline Your Spend Audit Process
    5 Steps to Streamline Your Spend Audit Process
    Bryan McArthur Aug 21 2019 6:00 pm UTC 60 mins
    Discover how AI can transform your spend audit process enabling you to:
    - Save your auditors’ time
    - Make managers’ lives easier
    - Pay employees back faster

    The data gleaned from AI solutions can also give auditors a deeper understanding of spending trends so they can develop more effective policies to improve spend culture over time.

    Bryan McArthur, Customer Success Lead, AppZen, discusses how to improve expense report
    culture, save manager time, and gain useful insights into how your employees are spending money.
  • How AI and Machine Learning Unlock Unstructured data for Enterprise Automation
    How AI and Machine Learning Unlock Unstructured data for Enterprise Automation
    Manish Rai, VP Product Marketing, Automation Anywhere Aug 21 2019 6:00 pm UTC 60 mins
    While nowadays robotics process automation (RPA) is a leading technology in enterprise automation, it operates with structured data according to well-defined rules.

    However, 80% of enterprise data is unstructured and many complex business processes involve cognitive decision making.

    Learn how AI and Machine Learning help to automate such processes by leveraging AI to bring structure to unstructured data and machine learning models to make an intelligent decision.
  • Automation for a Continuously Aware Data Center
    Automation for a Continuously Aware Data Center
    Nlyte Aug 22 2019 8:00 am UTC 45 mins
    This webinar will show you how Nlyte’s Asset Explorer's discovery application continuously improves asset accuracy in your Nlyte DCIM implementation.

    See how you can:

    - Improve capacity planning and resource utilization
    - Improve and increase SLAs and Support responsiveness by reducing MTTR and RCA
    - Eliminate manual audit efforts improving efficiency and accuracy of workflows
    - Accelerate implementation or expansion of DCIM with auto-discovery and auto-updating of asset data

    We look forward to seeing you there!
  • Delivering an Effective Cyber Security Exercise: Enhanced Breach Response
    Delivering an Effective Cyber Security Exercise: Enhanced Breach Response
    Daniel Norman, Research Analyst, ISF Aug 22 2019 12:00 pm UTC 44 mins
    Organisations are constantly under threat with over two-thirds of them experiencing data breaches in 2018. As a result, preparedness and resiliency are paramount to protecting an organisation’s information from cyber attacks.

    Business leaders and their security teams can improve their ability to handle cyber attacks by running cyber security exercises. These exercises should help the organisation identify areas of improvement in people, process and technology, reducing the impact should a real cyber attack occur.

    In this webinar Daniel Norman, Research Analyst, ISF will share how organisations should approach running internal cyber security exercises to support breach identification, prevention and response.
  • How to overcome the challenges of a computer vision project
    How to overcome the challenges of a computer vision project
    Matthew Stainer & Haidar Altaie, SAS UK&I Aug 22 2019 1:00 pm UTC 60 mins
    From recognizing faces to processing the live action of a football game, computer vision opens many exciting possibilities.

    Find out what it takes to really capitalize on advancements in AI.

    Many Data Scientists tend to get very excited about deep learning. And why not? It has strongly contributed to the further development of game-changing applications like computer vision or Neural Language Processing.

    However, before starting any computer vision endeavours, it pays to zoom in on some basics: Using a repeatable end-to-end process – to guide you through image pre-processing, deep learning and productionising your models - will help ensure your deep learning models are as accurate as possible and take your models out of the lab and drive actual business value.

    Speakers: Matthew Stainer & Haidar Altaie

    Matthew is a Principal Data Scientist at SAS UKI, supporting customers to enhance their businesses decision making. He works across the analytical technologies including data mining and forecasting. His particular areas of interest and expertise is text analysis, identifying the impact of analytical solutions on business processes and communicating the results of analysis to a business audience. He has specific experience in Customer Management solutions, including Complaints Analysis, NPS, Customer Analysis, Optimisation, Decision Management, Recommendation Engines, Campaign Management, Debt Management and Web Analytics.

    Haidar is a Data Scientist at SAS UKI. He joined SAS in September 2018 after graduating from University with a Mathematics and Statistics degree, and is passionate about integrating the analytical skills he’s learned across growing industries to enable customers to solve complex real life issues.
  • Automation for a Continuously Aware Data Center
    Automation for a Continuously Aware Data Center
    Nlyte Aug 22 2019 4:00 pm UTC 45 mins
    This webinar will show you how Nlyte’s Asset Explorer's discovery application continuously improves asset accuracy in your Nlyte DCIM implementation.

    See how you can:

    - Improve capacity planning and resource utilization
    - Improve and increase SLAs and Support responsiveness by reducing MTTR and RCA
    - Eliminate manual audit efforts improving efficiency and accuracy of workflows
    - Accelerate implementation or expansion of DCIM with auto-discovery and auto-updating of asset data

    We look forward to seeing you there!
  • Why Browser Isolation is the New 'Sandbox'
    Why Browser Isolation is the New 'Sandbox'
    Lennart van den Ende, VP of Worldwide Sales Engineering - Menlo Security Aug 22 2019 5:00 pm UTC 51 mins
    Protecting organizations from Web threats has typically been done with a proxy or DNS solution but a new approach has emerged. Isolation defends against today’s sophisticated zero-day exploits using an “air-gapped” browsing approach.

    Identified by Gartner as "one of the single most significant ways to reduce web-based attacks," remote browser isolation has become an important line item in IT budgets around the world.

    But not all Isolation is created equal. With so many offerings how do you weed through the noise?

    Learn:

    - Why remote browser isolation technology adoption is on the rise
    - Key use cases for Isolation that should be evaluated
    - 3 critical requirements when selecting a practical browser isolation solution

    Featuring SC Media and Lennart van den Ende, VP of Worldwide Sales Engineering - Menlo Security
  • Building an evolving culture of continuous improvement
    Building an evolving culture of continuous improvement
    Andrea Goodkind, Wazoku Aug 28 2019 9:00 am UTC 38 mins
    Businesses today must be set up to change, but, more importantly create change as a constant capability inside it’s organisation.

    In this webinar, you will learn:

    - The importance of building a culture of EveryDay innovation where employees are engaged, and recognised and rewarded for their contributions.
    - How Waitrose has engaged senior leadership by demonstrating how small changes add up and are tied to the overall strategic vision.
    - How organisations can start in one area and use the lessons learned to build an organisation-wide capability.
  • How Isolation Helps SOC Analysts Threat Hunt
    How Isolation Helps SOC Analysts Threat Hunt
    Patrick Darrow, Product Management Team - Menlo Security Aug 28 2019 9:30 am UTC 29 mins
    Security Operations Centers are a crucial aspect of ensuring data security. However, managing a Security Operations Center (SOC) can be burdensome for any IT team. The job continues to be complicated, and companies face a challenge to obtain talent that can help. Vendors are claiming to make the time to hunt more productive, typically by applying some level of intelligence to the alerts process. Does this work?

    Identified by Gartner as "one of the single most significant ways to reduce web-based attacks," remote browser isolation has become a significant line item in IT budgets around the world and now can help SOC teams replay attacks like never before, providing them with the insight and evidence of a breach.

    Listen to this webinar to:

    - Understand how things are done today with detection-based solutions
    - Where SOC analysts spend time during the process of Threat Hunting
    - How Isolation remove threats and can replay a real-world attack for forensic purposes

    To see how Isolation helps SOC analysts threat hunt, register now.
  • Career Development – Nudge your way to a mentor network
    Career Development – Nudge your way to a mentor network
    Darryl Howes MSc Aug 28 2019 11:00 am UTC 50 mins
    Success takes teamwork. No one can do it all on their own and interacting with new people is important. We never know who we might meet and the effect they may have on our professional life and career.

    Nurturing key relationships that can facilitate career and personal development is what all successful people do. And they build this network continually and consistently.

    How can you build a network of mentors, advisors and contacts and what’s the best way to go about doing this? Business psychologist Darryl Howes MSc will provide practical tips and advice, with insight drawn from social science and a 30-year career in financial services.

    Darryl Howes MSc
    Darryl helps professionals develop networking and career management strategies. He holds a First Class Honours undergraduate degree and a Masters in Organisational Psychology from the University of Surrey, UK. A visiting lecturer and speaker for City University, the University of Surrey Careers Service and Aston Business School, he has also worked extensively with organisations such as The Institute of Leadership and Management and The Institute of Directors. He has written for a range of publications including People Management (CIPD), Financial Management (CIMA) and the ILM publication, ‘Edge’.

    A past National Executive Committee member of The Division of Occupational Psychology of the British Psychological Society, Darryl was nominated for the 2016 CIPD/People Management Power List for Learning & Development professionals, naming the top 20 bloggers, tweeters and all-round social media powerhouses. In 2017/2018, he was selected as a Personal Mentor under Her Majesty Queen Elizabeth’s QYL initiative, one of only 60 worldwide.
  • Maximize ROI through AR/AP Process Modernization
    Maximize ROI through AR/AP Process Modernization
    Medha Patel, CPA, Paro Aug 28 2019 3:00 pm UTC 60 mins
    What costly mistakes are businesses making that they don’t know about within the AR/AP process? Through our experience with our clients, here’s what we’ve noticed, and here’s how we were able to monumentally transform their business.

    In this webinar you'll learn:
    -The most succesful techniques to deal with slow or delinquent payments
    -How to effectively identify, prevent, and mitigate fraud
    -What internal controls will keep your AP process on-track and keep partners happy

    If you are looking to make an positive impact on your finance department and procedures, this webinar is a great place to start!
  • A Closer Look at Isolation: Hype or Next Gen Security?
    A Closer Look at Isolation: Hype or Next Gen Security?
    Kowsik Guruswamy, CTO - Menlo Security & John Pescatore, Director of Emerging Technologies - SANS Institute Aug 28 2019 5:00 pm UTC 55 mins
    This webinar looks at Isolation from different viewpoints. Learn from a Menlo Security customer, along with John Pescatore, Director of Emerging Technologies at SANS Institute, and Kowsik Guruswamy, Menlo Security CTO, as they explore why organizations around the globe are looking at isolation as the means to protect their users from the ever-present web and email dangers.

    In This Webinar Will Dive Into:

    - The shortcomings of today’s reactive security philosophy
    - Why the web continues to present a risk to businesses
    - The benefits of embracing Isolation
    - How organizations should rethink their security strategy moving forward
  • Venture Industrialist: Investment Strategies for Connected Industry
    Venture Industrialist: Investment Strategies for Connected Industry
    Ben Steven, Associate Partner, Momenta Partners Aug 29 2019 4:00 pm UTC 60 mins
    The digital transformation of industry is creating significant opportunity with millions of devices connected to the internet for the purpose of collecting data, tracking usage, monitoring functionality, automating and optimizing systems and processes. While traditional venture capital has shied away from industrial applications and hardware, there’s been a rise of a new class of ventures investors: the venture industrialist. In this webinar, Momenta Ventures will share their insights and practitioner's perspective on investing in Connected Industry, understanding the market, trends and risks. This webinar is for ANYONE seeking insights on investing in Connected Industry.

    - What is Connected Industry?
    - How do Connected Industry investments differ from traditional venture investments?
    - Momenta’s Connected Industry investment themes
    - Momenta’s investment criteria
    - Q&A; ask our practitioners your burning questions
  • Security for Azure with Trend Micro and SoftwareONE
    Security for Azure with Trend Micro and SoftwareONE
    Gavin Evans, Trend Micro and Doug Vincent-Townend, SoftwareONE Sep 2 2019 8:00 am UTC 21 mins
    Cloud, by its nature, can provide enhanced security because of the shared security model.

    In the case of Azure, security responsibility is shared between Microsoft and the customer.

    For IaaS, Microsoft is responsible for physical security, portions of host infrastructure and network controls. However, substantial responsibility for protecting Azure IaaS infrastructure falls on the customer.

    How do you make sure your data is secure as it enters the cloud?

    Join SoftwareONE and Trend Micro as we discuss the following:

    •The shared responsibilities across the customer and cloud provider
    •The shifting and transforming landscape and its impact on maintaining compliance
    •The growing requirements for speed and automation
    •Stopping advanced threats and protecting vulnerabilities
    •Putting in place security and compliance controls above and beyond the responsibility of the cloud provider

    We will also discuss SoftwareONE’s managed security service which enables organisations to stop malicious activities, and improve security effectiveness for Azure workloads.

    While adoption of Azure drives higher levels of innovation and competitive advantage, a secure Azure environment is essential for protection against threats or data breaches and to ensure compliance with data privacy and industry regulations.

    Find out how SoftwareONE and Trend Micro can help you achieve this.
  • How to Turn Your Phishing Links Into Read Only
    How to Turn Your Phishing Links Into Read Only
    Jonathan Lee, Sr. Product Manager - Menlo Security Sep 3 2019 9:00 am UTC 53 mins
    99% of security breaches are initiated through email and webmail attacks. Thus, proving prevention obviously fails, and detection and response are far from guaranteed. So why try the same old failed security approaches?

    It’s time to try something that’s transforming email security—isolation. Isolation doesn’t block threats—it eliminates.

    In this webcast, attendees will learn:

    -How to combat users who are re-offenders when it comes to clicking unsafe email links and attachments
    -Need an additional layer other than a sandbox waiting for patient zero
    -The ease of deploying isolation without interfering with user experience in 10 minutes

    Save your seat to see how Isolation can help you eliminate malware and improve productivity of your employees.
  • Real world examples of Artificial Intelligence in Insurance
    Real world examples of Artificial Intelligence in Insurance
    Georgios Kapetanvasileiou, Lead Data Scientist, SAS, UK&I Sep 4 2019 3:00 pm UTC 60 mins
    Cutting through the hype of Machine Learning and AI, we will take you through a practical application of how Machine Learning was effectively used in the insurance industry. Learn how organisations are deriving actionable insight from AI applications and the business value they deliver today. This will further clarify the role of human ML expertise in the development process, both now and in future machine learning and analytics process modernisation
  • How to Deliver Employee Health and Wellness Experiences That Matter
    How to Deliver Employee Health and Wellness Experiences That Matter
    Rohan Muralee, MMB, Asia Sales Leader & Samuel Tan, MMB Health Consulting Leader Sep 5 2019 6:00 am UTC 45 mins
    Do you want to:

    •Boost workforce productivity and engagement?
    •Combat rising costs of health and well-being programs?
    •Predict and forecast health risks to design smarter intervention plans?
    •Learn best practices from experts about what they are proactively implementing for several industries across Asia?

    Join our leading experts as they:
    •Reveal the top drivers of medical claims in Asia.
    •Highlight key health risk factors.
    •Share insights and best practices into how insurers (and employers) are responding with data analytics and innovative health plans.
    •Conduct a ‘live’ demo that helps accurately predict risk areas and pinpoint potential interventions.