Hi [[ session.user.profile.firstName ]]

Business Management

  • How AI and Machine Learning Unlock Unstructured data for Enterprise Automation
    How AI and Machine Learning Unlock Unstructured data for Enterprise Automation
    Manish Rai, VP Product Marketing, Automation Anywhere Recorded: Aug 21 2019 49 mins
    While nowadays robotics process automation (RPA) is a leading technology in enterprise automation, it operates with structured data according to well-defined rules.

    However, 80% of enterprise data is unstructured and many complex business processes involve cognitive decision making.

    Learn how AI and Machine Learning help to automate such processes by leveraging AI to bring structure to unstructured data and machine learning models to make an intelligent decision.
  • 4 Keys to Improving Agent Satisfaction
    4 Keys to Improving Agent Satisfaction
    Chris Hanna (Evolving Management); Gayathri "G3" Krishnamurthy (NICE inContact); Fancy Mills (moderator) Recorded: Aug 21 2019 60 mins
    Customer satisfaction has long been a top priority for the contact center, but in today’s competitive job market, agent satisfaction is a growing concern for leaders. In a traditionally high-stress, high-turnover industry, every leader wants to know the secret to agent happiness. There’s no magic bullet, but based on brand new ICMI research, we’ve identified four keys to improving the employee experience in the contact center. What do the most engaged employees have in common, what are the top drivers of dissatisfaction, and how might this new insight help your team improve morale and performance, all while boosting CSAT? Join us on August 21 for an eye-opening discussion!

    During this webinar, you will learn:

    - What the most satisfied contact center agents have in common

    - What new ICMI research reveals about top drivers of agent dissatisfaction

    - How you can better align your people, processes, strategy, and technology to improve both the employee and customer experience

    Join us for an interactive and informative hour, filled with practical tips, and complete with live audience Q&A.
  • Gaining Complete Visibility of Your Environment with Attack Surface Monitoring
    Gaining Complete Visibility of Your Environment with Attack Surface Monitoring
    Tori Sitcawich, Product Marketing Manager; Jon Hart, Principal Security Researcher Recorded: Aug 21 2019 56 mins
    Join Rapid7 experts for an in-depth look into Attack Surface Monitoring with Rapid7s Project Sonar research and industry reports. Learn how data from these sources can be leveraged in Rapid7s industry-leading vulnerability management solution, InsightVM, to provide complete visibility into your environment.

    During this webinar, youll learn about:

    1. The importance of having complete visibility of both your organizations known and unknown assets
    2. Rapid7s unique research project, Project Sonar, that regularly catalogs the public internet
    3. Industry reports released by Rapid7 based on data from Project Sonar, among other sources
    4. How data from Project Sonar can be leveraged within Rapid7s industry-leading vulnerability management tool, InsightVM
  • The State of IT Resilience 2019 Webinar
    The State of IT Resilience 2019 Webinar
    Jayme Williams, Tencate Recorded: Aug 21 2019 60 mins
    2019 Results are in: 84% weren’t IT resilient enough

    The 2019 IDC State of IT Resilience study found that a whopping 84% of respondents experienced a malicious attack in the past 12 months. Of those organizations who suffered a successful attack, 93%of those attacks resulted in data corruption or loss. Do you know how much a malicious IT attack would cost you?

    Find out how to make your organization IT resilient. Remove the risk of disruption and data loss, which can jeopardize customer loyalty, company reputation, productivity and employee morale. With the average cost of downtime at $250,000 an hour across industries, implementing an IT Resilience strategy is necessary not just to survive, but to go beyond your competitors and thrive.

    Join us to learn more about the 2019 results. Hear Jayme Williams from Tencate discuss how IT resilience is keeping their multi-national advanced-manufacturing operations running 24/7, and the threat of ransomware a non-issue.
  • Tradeshift Buy Deminar
    Tradeshift Buy Deminar
    Charles Kalajian & Patrick Massar Recorded: Aug 21 2019 50 mins
    Striving for system efficiency is a common goal. We want our platforms to perform exactly how we expect and then some. Introducing Tradeshift Buy.

    Tune in for an exclusive demonstration of Tradeshift Buy where you’ll learn how to:

    • Manage your marketplace offerings in a central place, with custom pricing and options for each buyer or marketplace.
    • Aggregate offers from your sellers or marketplace, controlled and managed to the enterprise’s needs
    • Give everyone in your organization the power to buy what they need, for any kind of spend, across any marketplace
    • See and control all spend, with intelligent recommendations for optimizing your cost structure.
    • Connect any number of sellers and buyers, based on your brand and your T&Cs, with full access control
  • How to Integrate Virtualized Server Environments with NVMe AFAs
    How to Integrate Virtualized Server Environments with NVMe AFAs
    Matt Hebb, Product Marketing, Data Center Systems, Western Digital Recorded: Aug 21 2019 18 mins
    As you likely know, the reason companies deployed virtualization in the beginning was to get more out of their hardware – and make their lives a little easier – it is the very same reason they are deploying it today. As a result, virtualized servers are the defacto standard in today’s data centers. While, it’s true that virtualization lowers IT infrastructure costs and allows enterprises to respond to new business needs quickly, it also creates an additional layer of infrastructure complexity. Complexity that the IT team has to manage across both the ESX and storage array layer.

    We get it – it’s a double-edged sword. Virtualization is meant to lower costs and allow quicker response time, but when the infrastructure becomes complex, the resources required to manage it could increase and offset the savings you were hoping to achieve. Join us for this webinar where we’ll address how IT can more easily manage their virtual environment.

    In this webinar, we’ll introduce you to the IntelliFlash vCenter Plug-in and share how the product offers visibility into storage datastore, offers the ability to self-provision VMs, and provides a consistent snapshot of VM-level performance metrics. In addition to better understanding the IntelliFlash vCenter Plug-in, you will learn:
    >How to simplify your VMware administrative tasks
    >How to take full advantage of All-Flash Arrays to create and deploy denser, faster VMs
  • NO’ing Your Way to Being a Successful Leader
    NO’ing Your Way to Being a Successful Leader
    Whitnie Wiley Recorded: Aug 21 2019 42 mins
    As leaders and business owners, there are thousands of different ways we can spend our time. However, not all of them are equally important or will yield the best return on investment. Protecting our time requires being in touch with our values and priorities and then saying “NO” to those distractions that are not in alignment.

    In this webinar, Whitnie will share with you why it’s important to say, “no,” how to say, “no” and when to say, “no.” Once you master saying “no,” you will see how your “yes” gets you want you want.
  • Simplify Test Data Management for SAP
    Simplify Test Data Management for SAP
    Andreas Günther, Director of TDM Consulting, Anthem Recorded: Aug 21 2019 50 mins
    Finding relevant test data is one of the great pains of testing, and GDPR’s restriction on testing with unmasked production data makes a difficult situation even worse. Once you finally receive (or create) appropriate test data, you still have to inject it into the testing framework and transform it across end-to-end tests.

    The complexities of secure, stateful TDM are further exacerbated in SAP environments, where business processes may cross SAP GUI and SAP Fiori, mainframes, and other packaged apps such as Salesforce— and test data may be scattered across Word files, Excel files, databases, flat files, and SAP systems.

    Join this webinar to learn strategies for simplifying test data management across end-to-end tests that involve SAP. You’ll learn:

    - How to choose the best test data approach (synthetic, masked…) for each task
    - Strategies for managing stateful data across end-to-end tests
    - Options for extracting and masking data from SAP environments such as SAP S/4HANA, SAP NetWeaver, and even SAP BW/4 HANA
  • The Real-World Impact of Product Data on User Experience
    The Real-World Impact of Product Data on User Experience
    EIS Director of Delivery Jason Hein and Principal Taxonomist Chantal Schweitzer Recorded: Aug 21 2019 15 mins
    Product content will make or break your digital commerce user experience. But what does that really mean? In this 15-minute session our digital commerce experts use real world examples to:

    -- walk through the basics of content strategy
    -- illustrate how product content can be used to differentiate from competitors (for better or worse)
    -- show how various components of your “Product Rulebook” directly impact the users experience
  • 6 Key Strategies to Boost Engagement in Your Workplace Giving Program
    6 Key Strategies to Boost Engagement in Your Workplace Giving Program
    Nicole Campbell, Principal of Goodness Consulting at Benevity Recorded: Aug 21 2019 58 mins
    How do you get more people excited about your workplace giving and volunteering programs, especially when you have such a diverse workforce? We’ve taken exclusive data from our Fortune 1000 clients and outlined 6 actionable ways to create a compelling program that will make your people feel connected and purpose-driven. In other words, the program they’ve been waiting for!
  • AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    Arun Trivedi Recorded: Aug 21 2019 45 mins
    As AI becomes all-pervasive, more and more companies need to start thinking about how AI can help in their business transformation and optimization journey. According to a Gartner survey, 54% respondents plan to start deployment within the next few years. However, their are multiple barriers, including finding a starting point and fear of the unknown.

    This webinar breaks down AI for the business & IT - what use cases should CIOs and business organizations focus on and how do we get started? What are the possible use cases? How do we even go about thinking about AI in our organization in a structured way?
  • Make Tableau Perform on Massive Scale at the Speed of Light
    Make Tableau Perform on Massive Scale at the Speed of Light
    Ajay Anand - Chief Product Officer, Kyvos Insights | Pareen Patel -Solutions Engineer, Kyvos Insights Recorded: Aug 21 2019 56 mins
    Tableau has disrupted the BI market by delivering brilliant visual analytics across enterprises. The new challenge for Tableau users is to bring this brilliance to the consumption of their massive data with no compromise on performance.

    Kyvos is already helping thousands of Tableau users to interact with their data lakes at the speed of light, both on the cloud and on-premise.

    Attend our webinar to learn how Kyvos supercharges Tableau performance by creating a BI acceleration layer on data lakes and enables instant access to massive data. With this layer in place, Tableau connects to Kyvos, achieving high-performance, irrespective of the size of your data.

    In this webinar, based on a real-life use case, you will learn how our next-generation OLAP technology helps you:

    • Use Tableau to analyze massive data on the cloud and on-premise platforms
    • Get instant responses to Tableau queries even on trillions of rows of data
    • Eliminate extracts and data movement
  • Change Your Mind, Change Your Life
    Change Your Mind, Change Your Life
    Mia Zambarano, Psychotherapist, Lifestyle Coach & Author Recorded: Aug 21 2019 53 mins
    Mia Zambarano joins us to discuss the importance of mindset and the way we think.

    Everyone has bad days, but do you have to simply put up with them? What can you do to dispel those nagging self-doubts and expose your potential? Cognitive behavioral techniques help create positive changes in all aspects of life – including business and personal.

    When you take control of your mindset and learn to use it in your favor, success follows. As a licensed psychotherapist, Mia can open a window into your thought processes and show you how they impact our realities. She will discuss how to crush our limiting thoughts and build self-belief.
     
    Learn how to:
    - Use the power of your mind for good
    -Crush negative thought processes and behaviors
    -Harness your super powers and control and create the life you want

    About Mia:

    Mia Zambarano is a Licensed Psychotherapist and Lifestyle Coach, specializing in cognitive behavioral work. Mia has worked as a psychotherapist in since 2015; where she specializes in child, adolescent and family therapy. In her coaching practice, Mia focuses on empowering individuals to create positive changes and improve their overall wellness. Mia received her Master’s in social work in 2015 from Boston University and has a Bachelor of Science in psychology from Sacred Heart University.

    Mia’s work involves understanding what contributes to our reality, the interactions between our thoughts, feelings, and actions, and ways to create a better reality for ourselves through better insight and positive thinking.
  • How to Lead the Buyers’ Process in Large Accounts
    How to Lead the Buyers’ Process in Large Accounts
    Barbara Weaver Smith, The Large Account Sales Expert Recorded: Aug 21 2019 42 mins
    Description: Part #8 in the series Your Growth Ecosystem: Don’t Think Small About Your Big Accounts. For CEOs, Presidents, Founders/Owners, Business Development Heads, Sales VPs, and Key Account Managers of companies of any size, with special relevance to those with $10 million to $500 million in annual revenue. The series is a strategic, high-level approach to managing your organization to successfully sell and grow sales to multinational and global corporations.
    Volumes have been written about how to match your sales process to “the buyers’ journey.” Frankly I think most people involved in selecting and influencing big, complex buying decisions in large corporations don’t have any real clue how to do it. Procurement people have a set of procedures and rules, but they still have to satisfy the end users, who may have very different ideas about what criteria are most important. And the relative power of procurement and executive users varies greatly. Smart sellers know how to lead the buyers to the right decision, and how to do that is the subject of this webinar.

    You will learn:

    1. How to locate and connect with the appropriate buyers and influencers.
    2. How to plan with an internal team.
    3. How to plan for the initial meeting..
    4. How to prepare great questions.
    5. What to do when the process stalls.
  • Quantifying Risk in Today’s Computing Infrastructures
    Quantifying Risk in Today’s Computing Infrastructures
    Vincent Rais, Director of Resiliency Services, Uptime Institute and Todd Traver, Vice President, IT Optimization and Strategy Recorded: Aug 21 2019 62 mins
    The complexity of today’s hybrid environments increases risk – what do you need to look for?

    Despite the promised simplicity provided by the cloud and other technologies, the majority of IT loads still run inside enterprise data centers, leading to challenges in managing workloads across the hybrid architectures emerging between these facilities and the cloud. We’ll discuss what we are seeing, along with the challenges, focus areas and important critical success factors necessary to reduce risk and provide resiliency and uninterrupted application availability.
  • Using a Machine Learning Data Catalog to Reboot Data Governance
    Using a Machine Learning Data Catalog to Reboot Data Governance
    Sharon Graves, Enterprise Data, BI Tools Evangelist, GoDaddy; David Loshin, Principal Consultant, Knowledge Integrity, Inc. Recorded: Aug 21 2019 66 mins
    Traditional data governance fails to address how data is consumed and how information gets used. As a result, organizations are failing to effectively share and leverage data assets. To meet the needs of the business and the growing number of data consumers, organizations, like GoDaddy, are rebooting data governance.

    Join industry expert David Loshin and Sharon Graves, business intelligence (BI) tools evangelist at GoDaddy, as they discuss the need to think about data governance with end users in mind and how a machine learning data catalog can help.

    And, learn how Sharon and her team are leveraging the Alation Data Catalog to guide analysis while fostering a self-service environment where everyone is encouraged to leverage data to make decisions.
  • State of ePayables: How best in class organizations improve performance
    State of ePayables: How best in class organizations improve performance
    Bob Cohen, Research Director and VP of Marketing, Ardent Partners and Andy Moir, Senior Product Marketing Manager, Tradeshift Recorded: Aug 21 2019 61 mins
    With advances in technology and moves toward digital transformation, today’s accounts payable departments are more focused than ever on leveraging automation to streamline the AP process, make it more efficient and enable more strategic activities to be carried out. But according to Ardent Partners’ State of ePayables 2019 report, even best-in-class organizations are still left with invoice exceptions, only about half of the suppliers submitting electronic invoices, and low early payment opportunities to improve working capital. Is that the best that we can do? Is your AP department truly digital?

    Join Ardent Partners and Tradeshift for our upcoming webinar where we will:
    • Deep dive into the challenges faced by the AP department and the drivers that shape AP leaders’ priorities on the quest to digitize
    • Present the outcomes you should be looking for in an AP transformation journey and how you should go from electronic to digital
    • Explore what best-in-class organizations do and how you can leverage to take your AP department to the next level
    • Identify quick wins and long-term strategies to improve operations and results going beyond best-in-class
  • Cath Goulding on Digital Transformation
    Cath Goulding on Digital Transformation
    Nominet Cyber Security Recorded: Aug 21 2019 3 mins
    Today, if an organization is unable to keep pace with digital disruption its very existence is at threat. What’s more, unlike many previous business challenges, digital transformation is not a one-off event. Rather, it’s an unfolding process that changes over time as new technologies emerge that lead to new business models and modes of differentiation.

    Digitally transforming an enterprise to a point where it is capable of continual innovation is a huge prize, but it also brings with it a range of challenges, particularly when it comes to cyber security. In the digital age, organizations can no longer hide behind the security of their perimeter walls. Instead, they must open up digitally to partners, suppliers, IoT devices and even competitors in order to create the seamless, customer-centric services people increasingly demand.

    We spoke with industry leaders to garner their views on cyber security in the age of digital transformation. In this video Cath Goulding, CISO at Nominet, talks of her experiences and provides her perspective and on the challenges large enterprises face when keeping their organizations secure during digital transformation programs.
  • James Stickland on Digital Transformation
    James Stickland on Digital Transformation
    Nominet Cyber Security Recorded: Aug 21 2019 3 mins
    Today, if an organization is unable to keep pace with digital disruption its very existence is at threat. What’s more, unlike many previous business challenges, digital transformation is not a one-off event. Rather, it’s an unfolding process that changes over time as new technologies emerge that lead to new business models and modes of differentiation.

    Digitally transforming an enterprise to a point where it is capable of continual innovation is a huge prize, but it also brings with it a range of challenges, particularly when it comes to cyber security. In the digital age, organizations can no longer hide behind the security of their perimeter walls. Instead, they must open up digitally to partners, suppliers, IoT devices and even competitors in order to create the seamless, customer-centric services people increasingly demand.

    We spoke with industry leaders to garner their views on cyber security in the age of digital transformation. In this video James Stickland, CEO, at Veridium talks of his experiences and provides his perspective and on the challenges large enterprises face when keeping their organizations secure during digital transformation programs.
  • Charlie McMurdie on Digital Transformation
    Charlie McMurdie on Digital Transformation
    Nominet Cyber Security Recorded: Aug 21 2019 3 mins
    Today, if an organization is unable to keep pace with digital disruption its very existence is at threat. What’s more, unlike many previous business challenges, digital transformation is not a one-off event. Rather, it’s an unfolding process that changes over time as new technologies emerge that lead to new business models and modes of differentiation.

    Digitally transforming an enterprise to a point where it is capable of continual innovation is a huge prize, but it also brings with it a range of challenges, particularly when it comes to cyber security. In the digital age, organizations can no longer hide behind the security of their perimeter walls. Instead, they must open up digitally to partners, suppliers, IoT devices and even competitors in order to create the seamless, customer-centric services people increasingly demand.

    We spoke with industry leaders to garner their views on cyber security in the age of digital transformation. In this video, cyber security expert, Charlie McMurdie, talks of her experiences and provides her perspectives on the challenges large enterprises face when keeping their organizations secure during digital transformation programs.
  • Best Practices in Threat Hunting: Optimizing the Anomalous Activity Search
    Best Practices in Threat Hunting: Optimizing the Anomalous Activity Search
    Brenden Bishop, Data Scientist, the Columbus Collaboratory Recorded: Aug 21 2019 43 mins
    Join us for this webinar that will present an advanced data science approach to detecting anomalous behavior in complex systems like the typical corporate network that your IT Security team is trying to defend. Generalized anomaly detectors, without tuning for a specific use case, almost always result in high false alarm rates that lead to analyst alert fatigue and a detector which is effectively useless. In this session, Brenden Bishop, Data Scientist at the Columbus Collaboratory, will present an open source tool and best practices for building specific, repeatable, and scalable models for hunting your network’s anomalies. Through iteration and collaboration, defenders can hone in on interesting anomalies with increasing efficiency.
  • Part 2 - Moving off of a Legacy System: How to Migrate Successfully
    Part 2 - Moving off of a Legacy System: How to Migrate Successfully
    Chaitanya Yinti, ForgeRock and Steve Giovannetti, Hub City Media Recorded: Aug 21 2019 60 mins
    Based on the state of my organization’s legacy IAM system, what is the best plan for migrating to a more modern platform? What is the best way to execute that plan, while also maintaining the current platform, its availability and integrity of data?

    Join ForgeRock and Hub City Media to learn how to make migrating IAM systems seamless, and the best strategies to consider for deployment.

    •Parallel Deployments vs. Coexistence vs. Rip-and-Replace: Which method makes sense for your organization? What are the pros and cons of each?
    •How to migrate efficiently, successfully and securely
    •Why migrating a wide variety of applications can be a roadblock, and how to overcome it
    •Use Case Spotlight - Successful client journeys

    By registering for this webinar you agree ForgeRock will maintain and process your personal information for communicating with you.
    The following partner(s) of the the above webinar(s) will have access to the list of registrants, including your contact information:
    Hub City Media (https://www.hubcitymedia.com/privacy-policy)
  • The Power of The 4th Quarter – Sales Strategies To Finish Strong
    The Power of The 4th Quarter – Sales Strategies To Finish Strong
    Meridith Elliott Powell, The Connection Expert Recorded: Aug 21 2019 37 mins
    It is fourth quarter what is your plan? Believe it or not, the fourth quarter is the most important business sales quarter of the year. What you do in fourth quarter not only determines your numbers for the year, it has a major impact on your future success as well.
    But fourth quarter is famous for being the quarter you slow down, stop selling, and over-indulge in activities that do anything that keep sales growing.
    Keeping the energy high and the drive going through fourth quarter can be tough! First you’re tired; you have worked hard all year long to meet your sales quotas, excel at your goals and ensure that your bottom lines is healthy and strong. Not to mention the fact that fourth quarter comes with schedule overload: budgeting, holidays, parties and a much needed break from the everyday routine.
    But if you want a strong first quarter – the key is to start now. You need a strategy to keep the momentum going. Join us for this high-energy, power-packed webinar designed to put you ahead of your competition, and drive strong to the finish line.


    You will learn:

    1. Why fourth quarter is the key to success in sales
    2.Proven strategies that keep clients engaged, an business moving through fourth quarter
    3.Epic ideas to position yourself for more closed sales first quarter
    4.Secrets to getting clients to put you at the top of their holiday list
    5.Your personal plan of action
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    John Grim, Senior Manager, PS Advisory Services Recorded: Aug 21 2019 81 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Erika Gifford, Senior Manager, GSS | Security Operations Advisory
    •Hayden Williams, Senior Manager, VTRAC | Investigative Response
    •John Grim, Managing Principal, VTRAC | Innovations and Development
    •David Kennedy, Managing Principal, VTRAC | Open Source Intelligence

    Preparing for and responding to data breaches and cybersecurity incidents is never easy. It takes knowledge of your environment and its unique threats, effective teamwork, and just as importantly, a rigorous Incident Response (IR) Plan. We'll introduce our monthly listeners to the VIPR Report – the Verizon Incident Preparedness and Response Report. We'll provide a high-level overview of our findings across three years of IR Plan assessments and data breach simulations. Insight will include:

    •Observations and recommendations across the six phases of incident response
    •Top takeaways for building a solid IR Plan and capability
    •Breach Simulations Kits and using these resources to run data breach tabletop exercises

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • NTT 2019 Digital Means Business Benchmarking Report
    NTT 2019 Digital Means Business Benchmarking Report
    Wayne Speechly -VP: Advanced Competencies – NTT Ltd. Recorded: Aug 21 2019 60 mins
    Key highlights from the NTT 2019 Digital Means Business Benchmarking Report which provides insights and analysis from surveying more than 1,150 executives across five regions, 15 countries, and 11 industry verticals.

    Digital is starting to gain meaningful traction in organizations. They’re focusing internally to see quick wins but are still grappling with prioritization and organization-wide execution of digital transformation.
  • AI & Machine Learning in Real Life
    AI & Machine Learning in Real Life
    Salil Amonkar, Global Head AI for Manufacturing & Retail, Pluto7 Aug 21 2019 9:00 pm UTC 45 mins
    In this session we will cover key take away and lessons learnt from practical deployment of Ai and ML solutions in actual enterprise settings. Participants can use these learning to incorporate in their own organizations to ensure success of Ai and ML initiatives.

    Join BrightTALK's LinkedIn Group for BI & Analytics!
    - http://bit.ly/BrightTALKBI
  • Reimagine Data Governance: Data Governance. Meet Data Security.
    Reimagine Data Governance: Data Governance. Meet Data Security.
    Andy Joss, Head of Solutions & Data Governance, Steve Holyer, Solutions Specialist, Informatica Aug 22 2019 4:30 am UTC 58 mins
    With organizations collecting an ever-increasing volume of data, the risk of a data breach or falling foul of a regulator is also increasing. Data security, privacy and protection is fast becoming a “must have” requirement within many data programs.

    Organizations are starting to realize that there are potentially great synergies in having a much closer understanding of their data from both a governance and security viewpoint. Add in Artificial Intelligence and automation for remediation, together these capabilities are proving to be significant allies in the continuous battle of cyber-security and enabling Data Governance programs.

    This webinar explores how these two worlds can now better understand the role that each has to play, in supporting and protecting their organization.

    As part of the Reimagine Data Governance series of webinars, Informatica will demonstrate how having a closer relationship between the worlds of governance and security can enhance existing data use and data security capabilities. And how you, in taking that holistic approach, can provide governed and protected data to achieve key business outcomes.
  • Learn How To Align Your Security with Business Outcomes
    Learn How To Align Your Security with Business Outcomes
    Jeff Pollard, VP & Principal Analyst, Forrester Research and Girish Bhat, Director, Product Marketing, Splunk Inc. Aug 22 2019 5:00 am UTC 54 mins
    Security is now becoming a top priority for businesses worldwide, driven by the challenges posed by digital disruption and the continuously expanding threat landscape. Well architected security is regarded as a strategic advantage and security executives are adopting risk and operational driven metrics to communicate and gain mindshare with corporate boards.

    However, aligning security with business outcomes while handling corporate velocity, key innovations, the skills shortage and budgets is still a work in progress. There has been a dearth of guidance on tools and techniques to develop strategies to align security with corporate and business goals.

    Join this thought leadership Splunk webinar, featuring Forrester, to hear from guest speaker Jeff Pollard, VP and Principal Analyst at Forrester Research and Splunk’s Girish Bhat to understand:

    •How to talk to your board about security
    •How aligning security has helped businesses
    •Forrester’s CISO Strategic Canvas
    •How to apply lessons learned to your own organization
  • DFLabs and SEMNet: Strengthening Security Operations with SOAR
    DFLabs and SEMNet: Strengthening Security Operations with SOAR
    Andrea Fumagalli, VP of Engineering at DFLabs and John Chai, Solution Engineer at SEMNet Aug 22 2019 7:00 am UTC 60 mins
    In the race to keep up with the increasing number and sophistication of cyberattacks, organizations need to have the capability to not only try to prevent attacks, but to also respond to them when they should occur, before they turn into more damaging security breaches.

    With security operations teams experiencing a number of common challenges and pain points, including a lack of skilled cyber security professionals, a growing volume of security alerts being received, as well as a lack of integration of existing tools in the security tool stack to name a few, organizations are recognizing the need for security orchestration and automation and response (SOAR) technology to help to overcome them.

    Partnering with DFLabs, SEMNet is able to offer its award-winning SOAR solution, IncMan SOAR to customers throughout Asia pacific, providing them with the localized knowledge, guidance and support needed to enable them to successfully implement efficient and effective security operations and incident response programs.

    During this webinar you will learn:

    - What is Security Orchestration, Automation and Response (SOAR) technology?
    - Why there is a growing need for SOAR solutions?
    - The problems SOAR technology can help you solve
    - How it helps to improve security operations and incident response programs
    - How DFLabs and SEMNet partner together to make this possible

    Plus, you will get to see IncMan SOAR live in action, discover some of its use cases and ask any questions you may have.

    Together, DFLabs and SEMNet can ensure security operations teams have the right SOAR solution in place, with standardized processes and workflows to detect, respond to and remediate security incidents in the fastest possible time frame, before significantly impacting your organization.

    Please note: Your registration information will be shared with SEMNet who may contact you in follow-up to your registration and/or attendance of this webinar.
  • Automation for a Continuously Aware Data Center
    Automation for a Continuously Aware Data Center
    Nlyte Aug 22 2019 8:00 am UTC 45 mins
    This webinar will show you how Nlyte’s Asset Explorer's discovery application continuously improves asset accuracy in your Nlyte DCIM implementation.

    See how you can:

    - Improve capacity planning and resource utilization
    - Improve and increase SLAs and Support responsiveness by reducing MTTR and RCA
    - Eliminate manual audit efforts improving efficiency and accuracy of workflows
    - Accelerate implementation or expansion of DCIM with auto-discovery and auto-updating of asset data

    We look forward to seeing you there!
  • Delivering an Effective Cyber Security Exercise: Enhanced Breach Response
    Delivering an Effective Cyber Security Exercise: Enhanced Breach Response
    Daniel Norman, Research Analyst, ISF Aug 22 2019 12:00 pm UTC 44 mins
    Organisations are constantly under threat with over two-thirds of them experiencing data breaches in 2018. As a result, preparedness and resiliency are paramount to protecting an organisation’s information from cyber attacks.

    Business leaders and their security teams can improve their ability to handle cyber attacks by running cyber security exercises. These exercises should help the organisation identify areas of improvement in people, process and technology, reducing the impact should a real cyber attack occur.

    In this webinar Daniel Norman, Research Analyst, ISF will share how organisations should approach running internal cyber security exercises to support breach identification, prevention and response.
  • How to overcome the challenges of a computer vision project
    How to overcome the challenges of a computer vision project
    Matthew Stainer & Haidar Altaie, SAS UK&I Aug 22 2019 1:00 pm UTC 60 mins
    From recognizing faces to processing the live action of a football game, computer vision opens many exciting possibilities.

    Find out what it takes to really capitalize on advancements in AI.

    Many Data Scientists tend to get very excited about deep learning. And why not? It has strongly contributed to the further development of game-changing applications like computer vision or Neural Language Processing.

    However, before starting any computer vision endeavours, it pays to zoom in on some basics: Using a repeatable end-to-end process – to guide you through image pre-processing, deep learning and productionising your models - will help ensure your deep learning models are as accurate as possible and take your models out of the lab and drive actual business value.

    Speakers: Matthew Stainer & Haidar Altaie

    Matthew is a Principal Data Scientist at SAS UKI, supporting customers to enhance their businesses decision making. He works across the analytical technologies including data mining and forecasting. His particular areas of interest and expertise is text analysis, identifying the impact of analytical solutions on business processes and communicating the results of analysis to a business audience. He has specific experience in Customer Management solutions, including Complaints Analysis, NPS, Customer Analysis, Optimisation, Decision Management, Recommendation Engines, Campaign Management, Debt Management and Web Analytics.

    Haidar is a Data Scientist at SAS UKI. He joined SAS in September 2018 after graduating from University with a Mathematics and Statistics degree, and is passionate about integrating the analytical skills he’s learned across growing industries to enable customers to solve complex real life issues.
  • Core Banking System Offloading with DataStax Enterprise
    Core Banking System Offloading with DataStax Enterprise
    Maciej Stępień, CEO at Braintri, & Nicolas Soum, DataStax Aug 22 2019 1:00 pm UTC 39 mins
    Load from electronic banking puts strain on your core systems. In this webinar we discuss how to capture data changes in mainframe-based core banking system and replicate them to DataStax Enterprise (DSE) in real time using automatically generated C++ code. Electronic channels are redirected to DSE using existing legacy APIs. The presentation will discuss solution design, innovative approach to automatic code generation and lessons learned from the platform implementation.
  • Payments & Retail: the impact of friendly fraud
    Payments & Retail: the impact of friendly fraud
    BRC & The Chargeback Company Aug 22 2019 1:00 pm UTC 60 mins
    This webinar will explore how retailers can manage payment disputes and stop revenue loss with key trend analysis and case study examples.
  • [Panel] The New Era of Proactive Problem & Incident Management in the Enterprise
    [Panel] The New Era of Proactive Problem & Incident Management in the Enterprise
    Elisabeth Thomas, Mohan Kompella, Christoph Goldenstern, Beverly Weed-Schertzer Aug 22 2019 3:00 pm UTC 60 mins
    As AI-enabled tools continue to make a mark on IT operations, the face of proactive problem and incident management in the enterprise is starting to change.

    From making IT staff roles’ easier to encouraging self-service, there is a broad range of AI-powered solutions on offer. Join leading ITSM experts as they debate the complexities, functionalities, benefits and considerations of next-generation cloud and hybrid problem and incident management tools.

    Moderator: Elisabeth Thomas, Launch Product Marketing
    Panellists: Christoph Goldenstern - VP, Kepner Tregoe; Mohan Kompella - VP, BIgPanda and Beverly Weed-Shertzer - ITSM Author
  • Top 5 Podcasts: Helping Industrial IoT Become a Reality with Dr. Richard Soley
    Top 5 Podcasts: Helping Industrial IoT Become a Reality with Dr. Richard Soley
    Ed Maguire, Principal Partner, Momenta Partners & Dr. Richard Soley, Chairman and CEO of the Object Management Group Aug 22 2019 4:00 pm UTC 46 mins
    Richard Soley is Chairman and CEO of the Object Management Group, Executive Director of the Industrial Internet Consortium (IIC) and founding partner of the IoT Solutions World Congress. In this special edition of the Edge Podcast recorded on site in Barcelona, he shares some of the notable developments coming out of the conference.

    The IoT Solutions World Congress is differentiated from other events through the focus on end users and case studies, showcasing test bed work shepherded by the IIC. In our conversation, Richard Soley shares stories and examples of notable work underway, the potential for productivity gains across industries, and the view that manufacturing represents the industry with the most to gain from connecting assets and advanced analytics. Additionally he discusses the launch of the IIC’s new Resource Hub. Finally he shares a fascinating story about standards that connected the design of Space Shuttle booster with the Ancient Romans.
  • Be the CEO of Your Sales Career
    Be the CEO of Your Sales Career
    Scott Ingram, The Sales Success Stories Expert Aug 22 2019 4:00 pm UTC 45 mins
    Whether you're looking to get started in sales, or are already established and want to plan the next steps of your sales career path this, is for you! In this webinar Scott Ingram, founder of Sales Success Media, will talk with David Weiss, Sales Executive at ADP and author of “Your Definitive Sales Career Guide,” about how to start, grow and manage your sales career journey.

    You will learn:

    1.    The best way to get a strong start in the sales profession
    2.    Intentionally advancing into better opportunities and bigger earnings
    3.    How to develop relationships with mentors
    4.    What it will take to get to the next level
  • Automation for a Continuously Aware Data Center
    Automation for a Continuously Aware Data Center
    Nlyte Aug 22 2019 4:00 pm UTC 45 mins
    This webinar will show you how Nlyte’s Asset Explorer's discovery application continuously improves asset accuracy in your Nlyte DCIM implementation.

    See how you can:

    - Improve capacity planning and resource utilization
    - Improve and increase SLAs and Support responsiveness by reducing MTTR and RCA
    - Eliminate manual audit efforts improving efficiency and accuracy of workflows
    - Accelerate implementation or expansion of DCIM with auto-discovery and auto-updating of asset data

    We look forward to seeing you there!
  • The Path to Enterprise AI: Tales from the Field
    The Path to Enterprise AI: Tales from the Field
    Larry Orimoloye, Sales Engineer, Dataiku Aug 22 2019 5:00 pm UTC 33 mins
    Enterprise AI is a target state where every business process is AI-augmented and every employee is an AI beneficiary. But is that really attainable? And, if so, what is the path to get there? In this talk, Larry Orimoloye, Sales Engineer at Dataiku, will share learnings from the field, describing how companies of different sizes and across different sectors have begun this journey. Some are farther along than others, and by making the right decisions now and avoiding stumbling blocks, you can supercharge your quest to this AI-fueled future.

    Larry Orimoloye is an applied statistician with strong expertise in driving ROI from all analytics investment. He possesses a solid grasp and understanding of analytics life cycle (end-to-end process). Larry has acted as strategic adviser and domain expert to wide range of clients including Apple, EE(T-Mobile/Orange), Sky, ExxonMobil, FedEx among others.
  • Why Browser Isolation is the New 'Sandbox'
    Why Browser Isolation is the New 'Sandbox'
    Lennart van den Ende, VP of Worldwide Sales Engineering - Menlo Security Aug 22 2019 5:00 pm UTC 51 mins
    Protecting organizations from Web threats has typically been done with a proxy or DNS solution but a new approach has emerged. Isolation defends against today’s sophisticated zero-day exploits using an “air-gapped” browsing approach.

    Identified by Gartner as "one of the single most significant ways to reduce web-based attacks," remote browser isolation has become an important line item in IT budgets around the world.

    But not all Isolation is created equal. With so many offerings how do you weed through the noise?

    Learn:

    - Why remote browser isolation technology adoption is on the rise
    - Key use cases for Isolation that should be evaluated
    - 3 critical requirements when selecting a practical browser isolation solution

    Featuring SC Media and Lennart van den Ende, VP of Worldwide Sales Engineering - Menlo Security
  • Control Your Digital Transformation with IT4IT Value Streams
    Control Your Digital Transformation with IT4IT Value Streams
    Lars Rossen, Micro Focus Fellow, Ph.D. MBA and Travis Greene, Director of Product Marketing, Micro Focus Aug 22 2019 5:00 pm UTC 60 mins
    Digital transformation can be a costly failure without proper controls. How can we learn from others who have succeeded in the journey to avoid repeating mistakes?

    The IT4IT™ Reference Architecture is a vendor-neutral standard maintained by The Open Group that provides a comprehensive framework for delivering value to the business.

    Join us for this webcast with Lars Rossen, Micro Focus Fellow and co-inventor of the IT4IT standard, as he takes you on a fast-paced tour of the nine value streams that tie together the essential functions of IT.

    Learn how each value stream delivers a measurable improvement to controlling and delivering digital services, by connecting enterprise DevOps and hybrid IT management with built-in security and end-to-end insight.
  • Q3 U.S. Truckload Market Forecast
    Q3 U.S. Truckload Market Forecast
    Chris Pickett and Nick Shroeger Aug 22 2019 5:00 pm UTC 42 mins
    Join us for another quarterly market update, where we'll discuss where we stand in the market today, our adjusted forecast and best tips for managing high-volume seasonal surges.
  • Scaling DevOps Episode 3: Scaling Environment Complexity and Orchestration
    Scaling DevOps Episode 3: Scaling Environment Complexity and Orchestration
    Roni Dover, Director of Sales Innovation & Alex Azrah, Senior Engineer Aug 22 2019 5:30 pm UTC 17 mins
    DevOps cloud environments are becoming more complex and heterogeneous in the technologies and infrastructure types they include. As environments are shifting left to provide early integration with production architectures, they can include a combination of VMs, Kubernetes instances, serverless functions, and PaaS services and also the orchestration to set everything up, import data and artifacts and glue everything together. In this episode, we will discuss the challenges of automation complex environments end-to-end and as always bring up some principles that can help us manage that complexity.
  • What's New in H2O Driverless AI
    What's New in H2O Driverless AI
    Arno Candel, CTO at H2O.ai Aug 22 2019 6:00 pm UTC 60 mins
    H2O Driverless AI employs the techniques of expert data scientists in an easy to use platform that helps scale your data science efforts. Driverless AI empowers data scientists to work on projects faster using automation and state-of-the-art computing power from GPUs to accomplish tasks in minutes that used to take months. In this webinar we'll highlight what's new in Driverless AI.

    Arno's bio:
    Arno Candel is the Chief Technology Officer at H2O.ai. He is the main committer of H2O-3 and Driverless AI and has been designing and implementing high-performance machine-learning algorithms since 2012. Previously, he spent a decade in supercomputing at ETH and SLAC and collaborated with CERN on next-generation particle accelerators.

    Arno holds a PhD and Masters summa cum laude in Physics from ETH Zurich, Switzerland. He was named “2014 Big Data All-Star” by Fortune Magazine and featured by ETH GLOBE in 2015. Follow him on Twitter: @ArnoCandel.
  • Case Study: Real-World Breach Response
    Case Study: Real-World Breach Response
    Brian DiPaolo, Chief Technology Officer; Mark Holdsworth, Managed Services Practice Manager Aug 22 2019 7:00 pm UTC 60 mins
    Accudata’s customer, a large ecommerce services provider, detected malware in an email sent to customers. However, their IT team discovered the malware was just the tip of the iceberg and began to dig deeper. Realizing the scope and magnitude of the breach, Accudata’s security and managed service teams were brought in to mitigate the attack and quickly began the remediation process.

    In this 60-minute presentation, Chief Technology Officer Brian DiPaolo and Managed Services Practice Manager Mark Holdsworth detail the challenges of identifying and eliminating an active attacker in order to bring the business back online.
  • Positioning Your Company for Sales Success
    Positioning Your Company for Sales Success
    Liz Heiman, Chief Strategy Officer Aug 22 2019 7:00 pm UTC 45 mins
    Understanding how to position your company for sales success is critical. In this program, you will understand how to improve sales and marketing alignment with a clearly defined market position and value prop. You will know how positioning yourself with the right buying influences is key to sales acceleration.
  • Join our webinar to learn how you can reduce 70% of your infrastructure costs
    Join our webinar to learn how you can reduce 70% of your infrastructure costs
    Adam Dagnall, James Clark Aug 23 2019 10:00 am UTC 60 mins
    By using Splunk SmartStore it let’s you decouple the compute and storage layers, so you can independently scale those resources to best serve workload demands. With SmartStore, Splunk Indexers retain data only in hot buckets that contain newly indexed data. Older data resides in the warm buckets and is stored within the scalable and highly cost-effective Cloudian cluster. SmartStore manages where data is stored, moving data among indexers and the external Cloudian storage based on data age, priority and users’ access patterns. As of today, clients can immediately achieve a 70% saving on Splunk Infrastructure.

    Cloudian is Part of the Splunk Technology Alliance Program
  • Uncovering Data Governance Maturity models
    Uncovering Data Governance Maturity models
    George Firican, Nicola Askham Aug 23 2019 3:15 pm UTC 45 mins
    Are you planning to start a data governance program or have started one and want to know how to evolve it? A data governance maturity model might provide you with solutions. Join this session to gain an understanding into what maturity models are and how they can be used, while understanding their shortcomings and benefits
  • From Campaign to Culture: Why Doing Good Looks Different
    From Campaign to Culture: Why Doing Good Looks Different
    Brianne V.L., Success Marketing Specialist; Anusha S., VP of Client Success; Nicole C., Principal of Goodness Consulting Aug 23 2019 4:15 pm UTC 35 mins
    We’ve seen a big trend this year with leading CSR programs shifting their approach to doing good by putting their people at the center—and they’re driving more employee engagement and social impact as a result. Learn how these companies are maximizing their impact by leveraging three key ingredients: responsiveness, democratization and inclusivity.