Hi [[ session.user.profile.firstName ]]

Finance

  • FireEye Chat | Front and Center: How to Empower. Evolve. Defend.
    FireEye Chat | Front and Center: How to Empower. Evolve. Defend.
    Vasu Jakkal CMO, FireEye; General Earl Matthews VP, Strategy, Mandiant Security Validation; Martin Holste Cloud CTO, FireEye Recorded: Jun 5 2020 28 mins
    Cyber attackers never rest, but neither does FireEye. In our upcoming Virtual Summit on June 9-11, industry professionals will showcase best practices, research and strategies to empower organizations to evolve their cyber security solutions and better defend against attackers.

    In this latest episode of the quarterly talk show FireEye Chat, we dive deeper into two topics from the virtual summit: security effectiveness and cloud security. Watch now to hear from our experts who are front and center from their homes as they tackle these common questions:

    • How secure are you? And can we be sure we’re protected against the evolving threat landscape?
    • Are your cyber security products effective and working the way they should?
    • Do you know how to be secure in the cloud?
    • What should you consider when moving to the cloud?
  • Bitesize CPD webinar: Board assurance and working together
    Bitesize CPD webinar: Board assurance and working together
    Paul Dillon-Robinson, Non-Executive Director, Queen Victoria Hospital NHS FT Recorded: Jun 5 2020 64 mins
    The demands on board members have changed during Covid-19, at the same time as having to work in new ways. In this webinar, Paul Dillon-Robinson looks at what assurance is and how boards can act in pragmatic and proportionate ways, whilst still fulfilling their roles and duties.
    The pandemic has forced people to work differently and this has had an impact on how information is communicated, with shorter board papers and virtual meetings. Are there lessons to be learnt that could impact how boards operate in the future, or were these just short-term fixes?
  • Think like a brand, not like a bank.
    Think like a brand, not like a bank.
    Liz High, VP of Strategy and Insight, Metia Inc. Recorded: Jun 4 2020 43 mins
    Unleash your marketing mindset: Accelerate digital transformation in a time of change

    Join Liz High, VP of Strategy and Insight at Metia for exclusive access to a new study that shows why marketers hold the keys to creating meaningful digital experiences in a post Covid-19 world. The survey of 500 senior financial marketers in the U.S. and Europe reveals compelling evidence that applying marketing discipline can unleash the true potential of your digital transformation investment.

    Liz High, VP of Strategy and Insight, Metia Inc.
    Liz is a passionate, data-driven strategist who has been working at the intersection of insight, design, data, and technology for almost thirty years. She specializes in creating powerful marketing programs, meaningful brands, and world-class customer experiences for a variety of clients, from global enterprises to ambitious startups. Liz has worked for almost every industry but specializes in financial services and technology.

    Increasingly, Liz brings her experience, thought leadership, and proven marketing models to banks and credit unions that are struggling to define what digital transformation should mean for them and their customers. Her approach helps identify the optimal combination of technology, culture, brand storytelling, and marketing execution to deliver meaningful digital banking experiences that drive loyalty and measurable return on investment.
  • Kafka, Pulsar, Mosquitto, Oh My!
    Kafka, Pulsar, Mosquitto, Oh My!
    William McLane, TIBCO thought leader for global data distribution Recorded: Jun 4 2020 34 mins
    You are certainly not in Kansas anymore! With the rise in open source options for data distribution, stream processing, IoT, and messaging, what’s a person to do when choosing the best solution for enterprise communications requirements?

    What use cases best fit prominent open source options like Apache Kafka, and how can communications be facilitated between various cloud platforms?

    The road might not be paved with bricks, but in our ever changing world, a solid communications nervous system is the key to unlocking data for analytics, stream processing, and event driven architectures. Open source is one of the many paths that you can follow, so let this session be your guide on an adventure into open source messaging.
  • How Spend Analytics Complement a Recovery Audit
    How Spend Analytics Complement a Recovery Audit
    Jin Ro, VP Advanced Analytics, PRGX Recorded: Jun 4 2020 56 mins
    Aggregating, cleaning and classifying spend data from multiple decentralized systems can be challenging without the right resources. However, once you have gone through the rigorous process of creating a single source of data truth you can begin to interpret the patterns and anomalies that will visualize your revenue leakage. This webinar will outline how organizations can utilize the combination of recovery audit data to gain improved visibility into their spend. Attendees will learn about the benefits of utilizing your recovery audit data for spend visibility, how to identify leakage points from non-compliance and typical real-time reports you should expect to run.
  • DCOI For Dummies: A candid conversation on the old and new DCOI initiatives
    DCOI For Dummies: A candid conversation on the old and new DCOI initiatives
    Anthony Vicinelly, Technology Director, Nlyte Software Recorded: Jun 4 2020 21 mins
    Join this candid conversation on the NEW Federal DCOI Initiative.

    The new DCOI M19-19 mandate expands on the previous DCOI M19-16 by further improving federal data center initiatives as well as provide a path for Modernization, implementing a Cloud First initiative, and performing Application Rationalization.

    What you will here is:
    - What is new and improved in the new initiative
    - Best practices in implementing a DCOI program
    - How DCIM is the Rosetta Stone in getting your agency on board with the federal mandate
  • Part 2: Moving off of a Legacy System: How to Migrate Successfully (EMEA)
    Part 2: Moving off of a Legacy System: How to Migrate Successfully (EMEA)
    Chaitanya Yinti, Sr. Director PMM & Allan Foster, Chief Evangelist, ForgeRock Recorded: Jun 4 2020 59 mins
    Based on the state of my organization’s legacy IAM system, what is the best plan for migrating to a more modern platform? What is the best way to execute that plan, while also maintaining the current platform, its availability and integrity of data?

    Join ForgeRock to learn how to make migrating IAM systems seamless, and the best strategies to consider for deployment.

    •Parallel Deployments vs. Coexistence vs. Rip-and-Replace: Which method makes sense for your organization? What are the pros and cons of each?
    •How to migrate efficiently, successfully and securely
    •Why migrating a wide variety of applications can be a roadblock, and how to overcome it
    •Use Case Spotlight - Successful client journeys
  • The Sales superpowers to increase engagement using the right tech
    The Sales superpowers to increase engagement using the right tech
    Chris Trapp, Head of Sales, Kurtosys Systems & Jim Goundry, Head of Sales, IHS Markit Recorded: Jun 4 2020 54 mins
    Technology innovation continues to change sales organizations at a rapid pace, effectively gifting your reps and managers with superpowers.
    For asset managers – utilising the right sales and, content automation is critical. In our up and coming webinar, we will be discussing the problems asset managers face and how to overcome those problems.

    1. The urgency to streamline processes, cut costs and create brand differentiation.
    2. Making strategic investments in sales enablement and content automation technology.
    3. Create efficiencies, scale sales and marketing processes.
    4. Reduce risks and increase AUM.
    5. Discover new ways of keeping your products and investment ideas "top of mind".
    6. Finding a new and innovative approach to providing clients with important data and timely updates.

    Attend the webinar to learn about the technology that will help increase your sales and customer engagement.
  • Mandiant Security Validation: verifica la tua sicurezza, niente presupposti
    Mandiant Security Validation: verifica la tua sicurezza, niente presupposti
    Gabriele Zanoni, Solutions Architect, EMEA, FireEye Recorded: Jun 4 2020 59 mins
    Mandiant Security Validation: verifica la tua sicurezza, niente presupposti, solo evidenze. NEW Report Security Effectiveness.

    Il Webinar “Mandiant Security Validation: verifica la tua sicurezza, niente presupposti, solo evidenze” fa parte di una serie di incontri settimanali intitolati: #FireEyeCyberTalks. Si terranno ogni giovedì, dal 21 maggio al 18 giugno, e ti offriranno contenuti stimolanti e approfondimenti da parte dei nostri esperti.

    Mandiant Security Validation è una tecnologia di “Security Instrumentation” che fornisce evidenze per verificare gli investimenti effettuati in Security.
    La security è spesso basata su presupposti come:
    •si ritiene che le tecnologie funzionino come descritte in fase di acquisizione;
    •si ritiene che i prodotti siano installati, configurati e mantenuti nel tempo in modo corretto;
    •si ritiene che le persone o i partner gestiscano allarmi e processi come stabilito;
    •si ritiene che i cambiamenti nell’infrastruttura e nella security siano compresi, comunicati e implementati in modo corretto.
    Come nel settore della availabilty si fanno test per verificare backup e restore, così Mandiant Security Validation mette alla prova i sistemi di sicurezza (SIEM, FW,Proxy, Endpoint, Email, DLP, Cloud etc..) e ne suggerisce l’eventuale remediation.
    Questa tecnologia permette di dimostrare la bontà degli investimenti fatti in sicurezza e di massimizzare il risultato degli investimenti.
    Il risultato è di estremo interesse per i SOC Manager, i CISO e per il Board.
    Inoltre, in anteprima, forniremo i risultati del Report “Mandiant Security Effectiveness Report 2020”. Scopri come continuare a migliorare i tuoi processi e la tua tecnologia; stai al passo con lo scenario delle minacce cyber in costante evoluzione.

    Prenota il tuo posto oggi #FireEyeCyberTalks
  • Découvrez comment la RPA peut améliorer la productivité dans Salesforce
    Découvrez comment la RPA peut améliorer la productivité dans Salesforce
    Cyril Millin, Pre-Sales Manager South Europe Recorded: Jun 4 2020 28 mins
    Apprenez, lors de ce webinaire, comment améliorer l’expérience client et donner de l’agilité à Salesforce grâce à Automation Anywhere.
  • Insider Progress | Why data is crucial to really knowing your workforce
    Insider Progress | Why data is crucial to really knowing your workforce
    Insurance Insider Recorded: Jun 4 2020 61 mins
    As an industry, the (re)insurance community knows the power of good data and the influence it can have on the success of a business. But to what extent does this mindset extend to diversity and inclusion?

    The London insurance market is striving towards creating a more diverse and inclusive workforce, but how do we chart the progress of this work? Every HR team will collect data on the make-up of its employee base, but how granular should this data collection go, and what should we do with the data once we have it?

    Join us on Thursday, 4th June for this Insider Progress webinar, in which we will discuss the Lloyd’s data collection toolkit, the latest UK gender pay gap results for insurance and how data insights can help shape and evolve the wider culture.

    Discussion points include:
    - The why, what and how of effective employee data collection, using the Lloyd’s toolkit as a guide
    - The practicalities and challenges of collecting more granular data on any given workforce
    - How to effectively and interpret patterns of aggregated data to influence D&I strategies
    - The results of the insurance industry’s gender pay gap data and where the market goes from here

    Speakers include:
    - Charlie Thomas, Content Director, Insurance Insider (Chair)
    - Louisa Blain, Director, People Advisory Services, EY
    - Marc McKenna-Coles, Global Diversity & Inclusion Manager, Lloyd’s
    - Kishan Mangat, Associate, DWF
  • Comment Boomi aide les entreprises à accélérer leur modernisation ERP ?
    Comment Boomi aide les entreprises à accélérer leur modernisation ERP ?
    Alexandre Pilz, Group IT Manager Vernicolor; Alexandre Martin, AE Boomi; Bruno Labidoire, Pre Sale Manager Boomi Recorded: Jun 4 2020 56 mins
    Dates : Jeudi 4 Juin
    Horaire : 11h à 11h45
    Selon une étude Coleman Parkes*, les entreprises européennes s’attaquent au « dilemme de l’innovation dans l’ERP » et repensent leurs anciens ERP en orientant davantage leurs investissements vers la modernisation et l’innovation.

    Cette étude pointe ce nouveau dilemme technologique qui place les entreprises européennes et françaises face à un choix cornélien : renforcer leurs investissements dans ce que certaines considèrent encore comme un processus coûteux et complexe de modernisation de leur ERP ou bien se laisser distancer par des concurrents moins réticents à prendre des risques.

    Aussi, le principal défi auquel sont confrontées la majorité des entreprises en EMEA, y compris la France, est d’abord le manque de technologies d’intégration capables de capturer des données provenant des équipements ou sources existantes, suivi du coût lié à la maintenance de multiples technologies d’intégration ou encore de la pénurie de compétences adéquates en matière d’intégration.

    Ce webinaire vous permettra d'explorer :
    • Les tendances de la modernisation de l’ERP
    • Les initiatives technologiques et raisons de moderniser l'environnement ERP comme une priorité, et un avantage pour les entreprises (notamment SAP/S4Hana, Microsoft Dynamics, Best of Breed SaaS comme Netsuite ou IFS)
    • La valeur de la plateforme IpaaS Boomi dans la modernisation du SI et la gestion de vos données
    • Retour d’Expérience Clients : Vernicolor : stratégie d’urbanisation du SI
    • Q&A

    Et vous sera présenté par :
    Alexandre Pilz, Group IT Manager Vernicolor
    Alexandre Martin, Account Executive Boomi, France
    Bruno Labidoire, Pre Sale Manager, Boomi Southern Region

    Vous pourrez participer au talk en posant vos questions en direct et obtenir l’ebook de cette étude « The ERP Innovator’s Dilemma » (Le dilemme de l’innovateur ERP).

    Inscrirez-vous dès maintenant pour obtenir votre place.
    L’équipe Boomi France
  • Gefährliche Fehleinschätzung der eigenen Sicherheit
    Gefährliche Fehleinschätzung der eigenen Sicherheit
    Christian Husemeyer, Solutions Architect EMEA, FireEye Recorded: Jun 4 2020 59 mins
    53% aller Angriffe bleiben unbemerkt!

    FireEye hat für mehr als 100 Unternehmen aus 11 Branchen überprüft, welches Sicherheitsniveau diese durch ihre aktuell implementierten Prozesse und Sicherheits-Produkte erreicht haben. Die mit Hilfe der Mandiant Security Validation Lösung (vormals Verodin) ermittelten Ergebnissen waren erschreckend:
    -Von mehreren tausend durchgeführten Angriffen sind nur 33% geblockt worden
    -Weitere 14% wurden erkannt, aber nicht geblockt
    -Bedeutet: In 53% der Fälle wären Angreifer erfolgreich und unerkannt eingedrungen!
    -Von all diesen Angriffen haben nur 9% einen Alarm in SIEM oder SOAR generiert
    Diese Ergebnisse zeigen deutlich, dass sich ein Großteil aller Unternehmen vermutlich in falscher Sicherheit wiegt, da die über Jahre oder Jahrzente aufgebauten Sicherheits-Technologien und -Prozesse
    nur unzureichenden Schutz gegen Angriffe auf ihre wichtigsten Daten und Ressourcen bieten, als bisher vermutet oder erhofft.

    Dieses Webinar gibt Ihnen Einblick, wie sie ihre technischen und organisatorischen Sicherheitsmechanismen unter absolut realistischen Bedingungen prüfen und optimieren können.
  • DCOI For Dummies: A candid conversation on the old and new DCOI initiatives
    DCOI For Dummies: A candid conversation on the old and new DCOI initiatives
    Anthony Vicinelly, Technology Director, Nlyte Software Recorded: Jun 4 2020 21 mins
    Join this candid conversation on the NEW Federal DCOI Initiative.

    The new DCOI M19-19 mandate expands on the previous DCOI M19-16 by further improving federal data center initiatives as well as provide a path for Modernization, implementing a Cloud First initiative, and performing Application Rationalization.

    What you will here is:
    - What is new and improved in the new initiative
    - Best practices in implementing a DCOI program
    - How DCIM is the Rosetta Stone in getting your agency on board with the federal mandate
  • Worldline e-Payments Challenge 2020 [Option 1]
    Worldline e-Payments Challenge 2020 [Option 1]
    Anne-Céline Muller (Worldline), Michael Petiot (Worldline), Adélaïde Hervagault (BeMyApp), Christophe Remillet (Onevisage) Recorded: Jun 4 2020 45 mins
    Welcome to Worldline e-Payments Challenge webinar ! FinTech from all around Europe are competing to get a chance to take part in the next edition of the e-Payments Challenge in September. Thanks to this webinar you will be able to learn and discover more about this thrilling 3-days co-innovation journey which would allow you to work hand in hand with Worldline customers and experts. You will get the chance to have all key stages presented to you, from the application day to the pitching session. You want to know what’s in it for you ? Then take part in the webinar and learn about all the opportunities and advantages that the e-Payments Challenge could bring to you!
  • The Power Insurance Market at a Time of Disruption
    The Power Insurance Market at a Time of Disruption
    Glenn Preece, Ben Chang, Soo Mei Tan, Julian Ling and Marcus Davies Recorded: Jun 4 2020 63 mins
    The global insurance market continues to undergo considerable change. Tightening capacity, the fallout from COVID-19, reduced investment returns, and sustained losses in the power and downstream energy sector are all influencing market behaviors.

    The power sector is one of the most impacted by these changes, and in these turbulent times, it is critical to stay abreast of the likely impacts. We are therefore hosting a webcast in which we will discuss market conditions and review:

    - The trends of international insurers/reinsurers' capacity & rates.
    - Results seen in the first half of 2020.
    - Insurance market behaviors and international insurers' attitudes towards different forms of power generation.
    - The impacts on insurers from tightening reinsurance market conditions.
    - COVID-19 restrictions and what to expect.
    - Suggested strategies for minimizing the impacts of market changes.

    Please join power specialists from Marsh and Guy Carpenter on June 4 as we walk you through market conditions, as well as our expectations for the power industry for the remainder of 2020 and beyond.
  • Strategies for Improving Cash Flow and Strengthening Accounts Receivable (AR)
    Strategies for Improving Cash Flow and Strengthening Accounts Receivable (AR)
    Eduardo Lopez, Paystand Recorded: Jun 3 2020 32 mins
    Companies are working hard to navigate the business challenges COVID-19 has created. Revenue targets are being reassessed, work environments are changing, and finance teams are looking for ways to operate faster, leaner, and more efficiently to address both short and long-term sustainability.

    During these times, it's critical for businesses to focus on expediting payment collection and managing cash flow more effectively. This is a key business success factor at any time, but it’s especially important during an economic crisis.

    Join us for our webinar on "15 Strategies for Improving Cash Flow and Strengthening Accounts Receivable (AR)". You'll learn how to gain control over delayed payments and leave with actionable tips on short and long-term cash flow solutions for your business.
  • Unleashing the Push-Button Automation in Turbulent Times (Recorded)
    Unleashing the Push-Button Automation in Turbulent Times (Recorded)
    Joel Garnatz, former Director Global Presales & Maureen Fleming, VP Intelligent Process Automation Research & Advisory Srvs Recorded: Jun 3 2020 34 mins
    Unleashing the Push-Button Automation in Turbulent Times with Kryon Process Discovery 

    Automation is a key enabler of digital transformation. Technologies like cloud, advances in networking technology, and AI and ML are pushing automation to new levels. 

    In this webinar, you’ll learn more about:
    - The latest insights on RPA
    - Process Discovery and how it can speed up your automation program
    - How businesses have adopted it
    - Where Process Discovery is needed most
  • Accelerating Innovation in Insurance
    Accelerating Innovation in Insurance
    Tym Lawrence, Director, Solutions Consultants at TIBCO Software Recorded: Jun 3 2020 42 mins
    The Insurance industry is facing major disruptions from trends including expectations of more personalised and engaging services, the rise of virtual platforms and insurtech competitors and the use of machine learning / AI. As IDC wrote, "Insurers that fail to act on the trends driving demand for insurance worldwide will eventually lose to more agile, flexible competitors who are adapting to the new world."

    In this presentation, you’ll learn how insurance companies can leverage new technologies to adapt to changing business drivers while still protecting their combined ratio. In 45 minutes, we will show you how insurers can develop a data fabric to unify siloed information and then use this to confidently predict outcomes and optimize their business. It will include a number of case studies and a sneak peek at the dynamic pricing accelerator that provides a freely available fast-start for AI-based pricing for insurance companies.
  • The role of biometrics and KYC in seamless onboarding
    The role of biometrics and KYC in seamless onboarding
    Susana Lopes, Senior Product Manager at Onfido Recorded: Jun 3 2020 23 mins
    What does effective onboarding look like? It’s a balancing act. With user friction, identity proofing and effective KYC all fighting for attention. In this webinar, Susana Lopes, Senior Product Manager at Onfido, considers how best to assess these competing factors in creating an ideal user onboarding flow, and how biometrics can help to mitigate traditional tensions.

    She will be discussing:

    - The evolution of account opening in the modern age and how user experiences have changed
    - The principles of proportional risk, and how they can help you ask for more at the right moments
    - How biometrics can help increase security and confidence in identity proofing
  • Résultats du rapport Mandiant 2020 sur l'efficacité de la sécurité
    Résultats du rapport Mandiant 2020 sur l'efficacité de la sécurité
    David Grout, CTO, EMEA, FireEye Recorded: Jun 3 2020 52 mins
    Résultats du rapport Mandiant 2020 sur l'efficacité de la sécurité : une plongée dans la réalité

    Participez à notre webinaire pour comprendre pourquoi la plupart des attaques testées continuent d’infiltrer les environnements d'entreprise sans être détectées et pourquoi la validation de la sécurité est si critique.
    Les résultats du Rapport sont préoccupants : les contrôles de sécurité ne fonctionnent pas comme prévu.
    Le constat qui en ressort et ce à travers des milliers de tests effectués par des experts de l'équipe Mandiant Security Validation (anciennement Verodin) est que pour 53% des environnements testés, les attaques ont réussi à contourner les contrôles en place. C'est pourquoi la validation continue de la sécurité devient aujourd’hui une tâche critique pour une protection efficace des environnements IT et OT.

    Rejoignez David Grout, CTO, EMEA, FireEye, pour notre prochain webinaire afin de découvrir les fondements de la validation de la sécurité et d’acquérir des connaissances pour répondre à des questions telles que :

    - Ai-je confiance dans l'efficacité de mes contrôles de sécurité ?
    - Puis-je évaluer rapidement la pertinence des informations sur les menaces ou l'exposition à la dernière attaque ?
    - Suis-je capable d'arrêter la perte de données et de protéger l'intégrité des données sur mon réseau ?
    - Comment simplifier et standardiser mon architecture de sécurité ?
    - Ai-je les bonnes éléments quantifiables pour communiquer les chiffres clés aux dirigeants de mon entreprise ?

    S’inscrire maintenant!
  • Introducing NHS finance to chairs, non-executives & lay members
    Introducing NHS finance to chairs, non-executives & lay members
    Paul Dillon-Robinson, Non-Executive Director, Queen Victoria Hospital NHS FT Recorded: Jun 3 2020 92 mins
    During this webinar, Paul will discuss in detail the following topics:
    • Role of a NED / Lay member in an NHS organisation : particularly the non-executive nature, role on sub-committees and what “not” to do.
    • NHS finance – how the NHS is funded (from Parliament down) and how funds work their way down to organisations; including the main contractual arrangements.
    • An introduction to the terminology.
    • Governance models in the NHS.
  • How to Identify your Personal Brand (part one)
    How to Identify your Personal Brand (part one)
    Julie Smith, executive coach Recorded: Jun 3 2020 39 mins
    What type of person do you imagine saying ‘I’m currently working on my personal brand?' For many people, it’s an unflattering image that comes to mind, usually of someone similar to the most annoying contestants on The Apprentice.

    I’m with you on this, such people have me ready to run in the opposite direction. The thing is, you have a personal brand whether you realise it or not. People are making judgments about you all the time based on your: work, behaviours, communication style, appearance etc. It matters because it’s a key factor in:
    •whether opportunities and clients come your way,
    •whether people want to help you on projects and
    •whether people buy into what you are trying to achieve.

    So, identifying your brand and raising its visibility, are vital.

    This 30 minute webinar will explore the first step in this journey – How to Identify your Personal Brand.

    For step two, join Part 2: Raising your visibility, next week.
  • Security Intelligence & Operations Consulting (SIOC) Team Services
    Security Intelligence & Operations Consulting (SIOC) Team Services
    Atheel Haddad, Global Principal Consultant, Micro Focus Recorded: Jun 3 2020 65 mins
    Обзор консалтинговых услуг Micro Focus SIOC по построению новых SOC и оценке зрелости существующих.
  • Unleashing the Push-Button Automation in Turbulent Times (Recorded)
    Unleashing the Push-Button Automation in Turbulent Times (Recorded)
    Joel Garnatz, former Director Global Presales & Maureen Fleming, VP Intelligent Process Automation Research & Advisory Srvs Recorded: Jun 3 2020 34 mins
    Unleashing the Push-Button Automation in Turbulent Times with Kryon Process Discovery 

    Automation is a key enabler of digital transformation. Technologies like cloud, advances in networking technology, and AI and ML are pushing automation to new levels. 

    In this webinar, you’ll learn more about:
    - The latest insights on RPA
    - Process Discovery and how it can speed up your automation program
    - How businesses have adopted it
    - Where Process Discovery is needed most
  • The Analytics and AI Approach to the Customer Experience
    The Analytics and AI Approach to the Customer Experience
    Melanie Turek VP of Research and Fellow, Connected Work, Frost & Sullivan Jun 9 2020 1:00 am UTC 35 mins
    With the rise of mobile and social technologies, customers are more knowledgeable and empowered than ever before. Their ability to access and share information gives them enormous control—and they know it.

    As a result, they expect data-driven, personalized interactions at every stage of the customer experience. Frost & Sullivan research shows that one of the clearest trends in customer engagement is the shift from traditional to digital interactions. Buyers like self-service, automated channels because they want easy access to information, on their time line, from anywhere. At the same time, agents want to discard the routine tasks that lower job satisfaction and lead to boredom and churn.

    AI and ML help companies leverage real-time and historical information to deliver a contextual, relevant and highly personal customer experience while improving agent morale. This webinar will show you how.
  • An Intelligence Driven Approach to Security Validation
    An Intelligence Driven Approach to Security Validation
    Shashwath Hegde, Solutions Architect, APAC Jun 9 2020 2:00 am UTC 60 mins
    A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lack the investigative skills to conduct searches. This continues to be a growing problem in the cyber security industry as organizations struggle to justify the high-cost of their defences.
    We make significant investments to justify our methods of stopping evil. However, we rarely spend time in measuring our methods or investments. Instead, we rely on assumptions to guide our decisions and justify our judgements. In this session, we will explore real world data and dive deep into the performance of cybersecurity controls across enterprise networks; from email, endpoint, network to cloud-based controls and examine some alarming results. As organizations continue to struggle to justify the high-cost of their defences, Security Validation provides a solution to validate, consolidate, recoup and maximize the value from existing investments.
  • Data and Machine Learning in Financial Fraud Prevention
    Data and Machine Learning in Financial Fraud Prevention
    Kayla Hartman, Data Analyst, Alloy Jun 9 2020 3:00 am UTC 34 mins
    According to Capgemini’s World Payments Report 2017, global digital payments are expected to rise to roughly 726 billion transactions in 2020. The growth of digital financial services offers innumerable opportunities, expanding access to financial services products and allowing for essentially instantaneous feedback loops. With these opportunities, however, also come risks, including fraud. The threat of fraud requires financial services organizations to act proactively to minimize losses due to fraud. Analysis of data surrounding their customers and transactions is an essential effort to ensure the benefits of the digital payments space continue to outweigh the risks.

    In this webinar, Kayla Hartman will discuss the various ways data is used in fraud prevention. As a Data Analyst at Alloy, a fintech company that provides identity verification APIs for clients’ KYC (know your customer) and AML (anti-money laundering), she has firsthand experience in enhancing fraud prevention efforts through data analysis. She will dive into the ways the use of data is currently advantageous to fraud prevention, as well as the challenges that are presented in this quickly changing space.
  • Managing Digital Adoption: Banking & Payments in a Contactless World
    Managing Digital Adoption: Banking & Payments in a Contactless World
    Dr. Louise Beaumont | Simon Cureton, Funding Options | Matt Phillips, Diebold Nixdorf | Ioannis Mallios, Profile Software Jun 9 2020 4:00 am UTC 60 mins
    A discussion on open banking, the accelerating need for mobile and contactless payments, and how the ecosystem is being disrupted by COVID-19.
  • Banking & Payments Trends in APAC
    Banking & Payments Trends in APAC
    Johnny Ang, Yingyu Wang & Siobhan Hartnoll Jun 9 2020 6:00 am UTC 60 mins
    The simplicity of contactless payments is driving fintech adoption by consumers in APAC. The necessity of reducing contact with others - driven by coronavirus - is bolstering adoption as well. But, the challenge in streamlined access is security and fraud, especially with an increasingly digital society. Join this panel to hear about news in the banking & payments ecosystem, including:
    - How the payments industry is adapting to a COVID-19 World
    - New ways to detect & reduce fraud and eliminate chargebacks
    - How trade sanctions may affect banking regulations

    Speakers:
    Johnny Ang, Regional Senior Director, Business Development, Value Added Services, APAC, Wirecard (Moderator)
    Yingyu Wang, Managing Director, Taylor Vinters Via LLC
    Siobhan Hartnoll, Head of APAC Business Development, Featurespace
  • Мониторинг компонентов Micro Focus ArcSight
    Мониторинг компонентов Micro Focus ArcSight
    Иван Лопатин, Технический эксперт, ДиалогНаука Jun 9 2020 8:00 am UTC 60 mins
    SIEM является критичной системой в SOC и требуется обеспечивать постоянный контроль за ArcSight ESM и его компонентами. Необходимо проводить регулярный анализ журналов событий системы на наличие критических ошибок или отклонений, чтобы оперативно выявлять проблемы и возможные инциденты.
    В докладе будут рассмотрены следующие задачи:
    • Анализ состояния БД
    • Анализ корректности работы контента
    • Анализ работы ОС
    • Анализ правильности настройки SIEM
    • Анализ критичных ошибок в журналах событий
  • Beyond Covid-19: Reshape your Business Strategy with Conversational AI
    Beyond Covid-19: Reshape your Business Strategy with Conversational AI
    Chris Tew & Alexander Hoffmann Jun 9 2020 8:00 am UTC 60 mins
    The world has fundamentally changed since the start of 2020 as businesses frantically work to adapt to the new normality driven by COVID-19. Where the growing cost of contact centre operations was once king, scalability and continuity of service will be the new master!

    One of the ways in which companies are increasingly building this continuity, resilience and scalability is to embrace conversational AI to help reshape their strategy for business operations, people and assets.

    It is now time to reimagine the future and start planning decisively.

    In this thought-provoking webinar, Artificial Solutions’ VP Chris Tew and AI specialist Alexander Hoffmann will present how companies around the world are leveraging Conversational AI in innovative ways and putting themselves in pole position to strategically benefit from the technology in delivering resilient, efficient and agile customer service. The speakers will also showcase a live solution.

    This webinar will arm you with all the information you need to understand the ‘Why’, ‘How’ and ‘What’ you need to do to successfully implement Conversational AI in your organization.
  • Virtual Cyber Attack Simulation
    Virtual Cyber Attack Simulation
    Michael Trevett, UKI Mandiant Director, FireEye with external panellists Mark Deem, Partner, Cooley LLP Jun 9 2020 9:00 am UTC 90 mins
    Did you know that 90% of successful cyber-attacks rely on human error by any one member of staff?
    It is common to assume that cyber security is the sole responsibility of your IT or security team. However, in many cases all it takes is one click on an email or a visit to a website which has been successfully attacked for you to cause a security breach in your organisation.
    So how do you know what to look out for and how do you mitigate the risks of a breach when it does occur?
    Join the FireEye Mandiant Consultants along with external panel of experts in our Cyber Attack Simulation as we experience a successful breach first hand;
    •See the impact of the attack on an organization
    •the level of resource needed to resolve an attack, and
    •the overall potential impact an attack might have on your business
  • Security Validation - what is it and how can it improve security effectiveness?
    Security Validation - what is it and how can it improve security effectiveness?
    Mike Batten - VP Sales Engineering EMEA, FireEye Jun 9 2020 9:00 am UTC 60 mins
    In order to stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:

    -Who are the attackers that target my industry and what techniques do they use?
    -Which alerts matter most and how do I respond?
    -Are my tools, controls, processes working as expected?
    -Where should I focus improvement efforts?

    Join Mike Batten, VP Sales Engineering EMEA, for our upcoming webinar to:

    -Learn how cyber threat intelligence can inform which attackers target your industry and understand the techniques they employ
    -Find out how continuous validation can pinpoint where you have gaps so you can target improvements where they are needed
    -Understand how validation technology powered by relevant intelligence can generate proof of effectiveness and reduce risk
    -View the results of a recent security effectiveness report, spanning the production environments of multiple industries and enterprises

    Register Now!
  • Measure, improve & optimize your cybersecurity with Mandiant Security Validation
    Measure, improve & optimize your cybersecurity with Mandiant Security Validation
    Lluis Coma, EMEA Consulting Sales Engineer, FireEye Jun 9 2020 11:00 am UTC 60 mins
    Mandiant Security Validation allows you to accurately assess a company's security posture. We help our clients take a proactive approach to identifying and mitigating risks due to incorrect configurations, inefficiencies in products, and / or established security processes.

    Register for the webinar and find out how Mandiant Security Validation enables you to:

    • Evaluate your security posture in order to prioritize investments;
    • Optimize the configuration of your technologies to maximize the return on investment;
    • Compare your security with market standards such as MITRE ATT&CK Framework and others;
    • Test the correct operation of your DLP-type tools;
    • Measure the security of your security processes in the CLOUD;
    • Validate the correct operation of your Endpoint tools;
    • Confirm network segmentation in IT / OT / SCADA environments.

    The results can be extremely interesting for managers of SOCs, CISOs and for the Board of Directors.
  • The modern Identity Fabric
    The modern Identity Fabric
    Hanns Nolan and Olivier Naveau Jun 9 2020 12:00 pm UTC 60 mins
    This Talk is discussing how to transform your IT landscape to sustain new business requirements and how an innovative Digital Identity Fabric will support your transformation efforts.
  • Take Control of Your Cloud Environments
    Take Control of Your Cloud Environments
    Martin Holste, Cloud CTO; Lisun Kung, Sr. Director; Joshua Bass, Sr. Manager; Matthew McWhirt, Mandiant Director Jun 9 2020 3:00 pm UTC 60 mins
    Complex cloud environments are a reality for many enterprises and organizations, and managing them is a requirement. But it can be done. Learn firsthand how FireEye delivers world-class capabilities to prevent, detect, and respond to security threats in and from the cloud.

    This Virtual Summit session covers:
    -Ways to gain greater visibility across hybrid, public, private, and multi-cloud environments
    -Expectations of the shared responsibility model
    -Pitfalls when approaching a move to the cloud
    -Best practices based on real-world use cases

    Register Now!
  • Reinventing Recovery Audit for Today’s Retail Environment
    Reinventing Recovery Audit for Today’s Retail Environment
    Mark Kilgore, Global Client Development, PRGX / Amy Andrade, Regional VP, PRGX Jun 9 2020 3:00 pm UTC 60 mins
    Helping retailers prevent errors in an increasingly complex industry.

    Recovery Audit has historically been a reliable stopgap for retailers to ensure any leakage is eventually captured. But in today’s retail environment, it is even more critical to ensure processes and systems are correct upfront. This webinar will outline how retailers will benefit from an industry transformation to move from a contingency fee-oriented recovery audit to a prepayment and error prevention solution. The webinar will also outline the value of error prevention and typical error prevention strategies before examining the preventive audit approach and solution.
  • How To Create World Class Customer Service - Lessons from Aileen Allkins
    How To Create World Class Customer Service - Lessons from Aileen Allkins
    Aileen Allkins, Recent Microsoft Global Vice President, Customer Service & Support Jun 9 2020 3:00 pm UTC 60 mins
    Delivery of great service to earn customer loyalty is the goal of all Customer Service and Support (CSS) leaders. For years we have known that satisfied employees will mean higher customer satisfaction. So, how can we empower our workforce so they are highly satisfied and thus, highly engaged?

    Our front-line teams, who represent our brand and often have more touchpoints with our customers than anyone else, have an incredibly tough job. They deal with unhappy customers, see the flaws in our products and services, and are often under-equipped in terms of tools and training to deliver the level of service we aspire to achieve.

    Aileen Allkins, recent Microsoft Global Corporate Vice President and a 30-year CSS veteran will share how to develop a thriving, loyal, and engaged CS workforce with an emphasis on the connection between a company’s mission, its culture, people and customers. This webinar will offer insights on:

    • How to design a pathway to achieve differentiation through your
    front-line teams
    • Creating a highly engaged and satisfied workforce even in difficult
    circumstances
    • Setting this to work across medium to large-scale Customer Service
    and Support organizations


    Our Presenter: Aileen Allkins
    Over the course of her 30-year career, Aileen Allkins has been transforming the CSS experience of some of the world’s best-known technology companies. She was most recently the Corporate Vice President of Global CSS at Microsoft, leading a diverse and international team of over 25,000 service professionals to provide world-class support for millions of customers. At Microsoft, Aileen was responsible for leading the CSS organization to achieve numerous industry awards. She has a genuine passion for people and is a strong advocate for front-line teams. Aileen is a fan of KT. During her tenure at Microsoft and Hewlett Packard, she has deployed Kepner-Tregoe tools and practices across both organizations
  • How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness
    How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness
    Chris Key, Sr. VP Mandiant Security Validation featuring Josh Zelonis, Principal Analyst, Forrester Jun 9 2020 4:00 pm UTC 60 mins
    Proactive Security Operations: How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness

    With economic uncertainty and an evolving threat landscape, organizations must prove their effectiveness across various operational functions, especially cyber security. While they usually focus on detection and response capabilities, they need to do more to develop proactive security operations.

    Join this webinar on Tuesday, June 9 at 9 a.m. PT/ 12 p.m. ET as FireEye Sr. VP of Mandiant Security Validation, Chris Key and featured speaker, Forrester Principal Analyst, John Zelonis highlight the:

    -MITRE ATT&CK knowledge base and how it can be used to help test your security posture and prove effectiveness
    -Importance of relevant threat intelligence for your organization and how its application can help pinpoint failure points
    -Impact of environmental drift on your security posture and how to plan for it
    -Evidence continuous validation delivers to prove effectiveness, reduce costs and optimize your security infrastructure

    Register Now>>
  • Tips for Securing Your Cloud Environments
    Tips for Securing Your Cloud Environments
    Chris Romano, Mandiant Senior Consultant and Greg Blaum, Mandiant Principal Consultant Jun 9 2020 5:00 pm UTC 60 mins
    For the last several years, organizations around the world have been moving applications and services to the cloud at an increasing pace. Despite this investment, many organizations fail to fully understand the security controls they have at their disposal and fail to effectively harden their cloud environments against attack. As a result, FireEye Mandiant experts have observed a significant rise in cloud-related breaches driven by both targeted and opportunistic threat actors over the past several years.

    In this session, Mandiant consultants Greg Blaum and Chris Romano share lessons learned from real-world incident response experiences, identify some common pitfalls and provide best practices for organizations to harden their cloud environments and reduce the risk of compromise. They also discuss the pitfalls and best practices presented in M-Trends 2020.
  • Rethink Cyber Defense Strategies Starting with Threats
    Rethink Cyber Defense Strategies Starting with Threats
    Peter Watts, former Director for Cybersecurity Policy, National Security Council Jun 9 2020 6:00 pm UTC 60 mins
    Many organizations define cyber defense strategies based on fears or fines: decisions makers are often influenced by the latest news headline or the next audit.
    Today, threat intelligence content levels have evolved to reach new readers or enable innovative use cases. Consequently, threat intelligence can inform how you optimize cyber strategies, from essential high-quality detection to alert investigation and the reduction of enterprise threat surfaces.
    In this session, Peter Watts, threat intelligence veteran and former Director for Cybersecurity Policy, National Security Council lays out:

    • A modern definition of threat intelligence with important milestones
    • How to recognize and develop critical success factors for producing or consuming threat intelligence
    • The impact of actionable threat intelligence on security risk leaders and their organizations
    • Future use cases that may reshape how we think about cyber defense and business value
  • Catalytic live group demo
    Catalytic live group demo
    Nasir Feerasta Jun 9 2020 7:00 pm UTC 45 mins
    We’ll give a quick tour of the Catalytic platform and then dive into different use cases, using a “cooking show” format where you’ll learn how to build the smart workflow and also see it running in action. Bring your automation questions!
  • Proactive Solutions to Stop Modern Ransomware in its Tracks
    Proactive Solutions to Stop Modern Ransomware in its Tracks
    Nader Zaveri, Incident Response Mgr; Matt Bromiley, Principal Consultant; Kimberly Goody, Threat Intelligence Sr. Mgr. Jun 9 2020 7:00 pm UTC 60 mins
    Ransomware is one of the most active and profound cyber threats facing organizations today. Years after Wannacry attacks shuttered businesses across the globe, stealthy ransomware infections continuously dominate headlines and board discussions. Attackers have developed advanced techniques that now require organizations to apply a holistic security risk mitigation strategy from the C-suite to practitioners.

    This webinar brings together Mandiant incident response, threat intelligence and managed detection and response experts to discuss strategic and tactical solutions that will help your organization:

    • Learn modern ransomware trends and attacker behaviors observed on the frontlines
    • Realize why proactive assessment is critical when preparing for and preventing ransomware
    • Understand how threat intelligence, hunting, and response provides the decision support and detection needed to outmaneuver ransomware actors
    • Implement effective mitigation strategies to stop ransomware attackers in their tracks

    Register today to join Nader Zaveri – Incident Response Manager, Matt Bromiley – Managed Defense Principal Consultant, and Kimberly Goody – Threat Intelligence Senior Manager, as they provide expert insights on modern-day ransomware attacks and how best to mitigate them.
  • Considerations for Evolving to Intelligence-Led Security
    Considerations for Evolving to Intelligence-Led Security
    Gina Hill, Principle Consultant, Mandiant & Duke McDonald, Consultant, Mandiant Jun 9 2020 8:00 pm UTC 60 mins
    An intelligence-led security posture and program recognizes that cyber threat intelligence has the potential to help keep organizations ahead of adversaries. The challenge is how to effectively and repeatedly make proper use of the intelligence that organizations collect and consume. Ultimately, organizations need to be able to understand the return on their threat intelligence investments.

    Mandiant Threat Intelligence experts Gina Hill and Duke McDonald present an in-depth explanation of what it means to be intelligence-led, how organizations should seek to increase intelligence maturity and capability, and how to get started on this journey.

    Join this session to learn:
    • The definition, characteristics and caveats of an intelligence-led security approach
    • Things to consider when assessing and evolving intelligence maturity
    • The importance of frameworks when assessing, measuring and executing on your strategy

    Register Now
  • Ransomware Trends with A Focus on MAZE
    Ransomware Trends with A Focus on MAZE
    Steve Ledzian VP, CTO - APAC, FireEye Jun 10 2020 2:30 am UTC 60 mins
    Ransomware threat actors are upping their game along with their ransom demands, which are climbing into millions of dollars. Large organizations with significant security controls in place are still falling prey to the attackers' tactics. This session examines how ransomware has evolved, and more importantly, what you can do about it. Come learn how to can gain some control your next ransomware experience.
  • Cyber Threat Intelligence as a Business Enabler
    Cyber Threat Intelligence as a Business Enabler
    Jens Monrad, Head of Mandiant Threat Intelligence, EMEA Jun 10 2020 7:00 am UTC 60 mins
    Join Jens Monrad, Head of Mandiant Threat Intelligence – EMEA, for ‘Cyber Threat Intelligence as a Business Enabler’.
    This session will cover how accurate and relevant Cyber Threat Intelligence can help organisations make smarter decisions around cyber defence, alert & event prioritisation. Jens will also discuss how cyber threat intelligence enables businesses to make decisions based upon the cyber threat landscape and their risk appetite.
  • Нагрузочное тестирование бэкенда мобильной платформы с учетом эффектов сети
    Нагрузочное тестирование бэкенда мобильной платформы с учетом эффектов сети
    Валерий Куваев, Технический специалист Micro Focus в России Jun 10 2020 8:00 am UTC 75 mins
    Нагрузка на онлайн доступ возросла и с ней выявляются новые узкие места производительности. LoadRunner позволяет протестировать мобильные сервисы не только с учетом реалистичного распределения сценариев взаимодействия, но и с учетом характеристик сетевого доступа, потерь пакетов, сетевой задержки, ширины канала и подобное. При этом сетевой паттерн можно записать в необходимой геолокации с помощью мобильного приложения и воспроизвести на группе виртуальных пользователей в момент теста. В рамках презентации и демонстрации мы рассмотрим возможности LoadRunner подробнее.
  • Réussir sa transformation digitale avec une Plate-forme HIP : les Mousquetaires
    Réussir sa transformation digitale avec une Plate-forme HIP : les Mousquetaires
    Sébastien Braud, lead architecte projet ADN STIME; Vincent Rontani, GM Solace; Mike Payole, AE Boomi Jun 10 2020 8:30 am UTC 60 mins
    Le Cloud, L’internet des Objets, la Mobilité ou l’Intelligence Artificielle sont autant de disruptions qui ont modifié durablement les codes de l’entreprise.
    En adoptant ces technologies, les entreprises se « digitalisent » et les impacts sociaux, culturels et techniques sont nombreux. Chacun apporte son lot de challenges.
    Moteur de cette transformation, les Systèmes d’Information doivent être repensée en profondeur pour répondre aux nouvelles exigences de modèles économiques « Data Centric ». En effet, il faut être capables d’appréhender les flux de données et les évènements exponentiels, tout cela dans un contexte de volumes inédits.

    Ce webinaire vous permettra d'explorer les caractéristiques indispensables aux fondations digitales de nouvelles génération au travers de plusieurs thèmes centraux :
    • Event Brokers, iPaaS, API Gateway : Quels sont les pilliers d’une “HiP” ?
    • On Prem ? Cloud First ? Hybride ? Multicloud ? Multizone ? vers des SI toujours plus distribués
    • « L’Entreprise 4.0 » ou comment l’entreprise devient «Temps Réel » et « Event Driven »
    • Scalabilité, Flexibilité et Ouverture pour répondre aux challenges présents et préparer l’avenir.
    • Q&A

    Et vous sera présenté par :
    - Sébastien Braud, lead architecte projet ADN Groupement Les Mousquetaires
    - Vincent Rontani, General Manager France Solace
    - Mike Payole, Account Executive Boomi France

    Vous pourrez participer au talk en posant vos questions en direct.

    Inscrirez-vous dès maintenant pour obtenir votre place.
    L’équipe Boomi France
  • TIBER-EU - How Mandiant Engagements Enhance Your Cyber Resilience
    TIBER-EU - How Mandiant Engagements Enhance Your Cyber Resilience
    Angelo Perniola, Senior Consultant & Jay Christiansen, Principal Consultant Jun 10 2020 11:00 am UTC 60 mins
    The Framework for Threat Intelligence-based Ethical Red Teaming (TIBER-EU) enables European and national authorities to work with financial infrastructures and institutions to put in place a programme to test and improve their resilience against sophisticated cyber-attacks. Among the core objectives of TIBER-EU are improving the protection, detection and response capabilities of entities, enhancing the resilience of the financial sector; and providing assurance to the authorities about the cyber resilience capabilities of the entities under their responsibility.

    Join FireEye Mandiant Senior Consultant Angelo Perniola and Principal Consultant Jay Christiansen to:

    -Understand how the TIBER scheme aims to improve Financial Service organisations resilience to advanced persistent threats by conducting Red Team Operations leveraging cyber threat intelligence and targeted attack scenarios that focus on high value targets and assets.
    -Gain insight into how FireEye Mandiant leverages its world-leading Threat Intelligence and Incident Response capabilities to understand attackers and their modus operandi in order to identify the most relevant attack scenarios in line with threats such as ransomware, SWIFT frauds and Customer PII leaks.
    -See how the Mandiant Red Team uses the compiled intel, in the form of a Targeted Threat Intelligence Report, to create attack plans and risk management trackers for the engagement, as well as how they carry out the stealthy TIBER cyber-attacks using tools and techniques mapped against MITRE ATT&CK framework and each APT’s specific capabilities
    -Understand how all the pieces fit together to create and end-to-end test and what deliverables can be expected from Mandiant in terms of root cause analysis of issues, strategic recommendations, technical findings and analysis, as well as follow on opportunities for collaboration with the client tech teams in the Purple Team and Security Validation follow-ons.