Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Crafting An Analytics-Based InfoSec Strategy
    Crafting An Analytics-Based InfoSec Strategy Johna Till Johnson, CEO and Founder, Nemertes Research Recorded: Jan 17 2018 43 mins
    Analytics--including machine learning and AI--is changing how security professionals approach cybersecurity.

    During this webinar we will:
    • Showcase the battle-tested strategies of the most successful information security organizations
    • Survey the landscape of analytics-based security tools and solutions
    • Walk through how to build a strategy based around current (and future) analytics and automation technologies
    • Spotlight the critical security operational metrics that analytics can help improve

    We look forward to sharing this information with you!
  • The Five Dirty Words of CI
    The Five Dirty Words of CI J. Paul Reed, Consultant, Release Engineering Approaches Recorded: Jan 17 2018 46 mins
    "Blameless postmortems" and "learning from failure" are very en vogue in the technology industry right now. Both fall into that less-discussed category of "CI": Continuous Improvement. But for as much as we all talk about them, in many organizations and teams, the outcome of continuous organizational learning and improvement remains elusive. Why is this?

    In this talk, we'll look at five "dirty words" that are often thrown around during postmortems, retrospectives, and other learning exercises that not only make it difficult for teams to discuss learning, but promote activities and behaviors that are actually counterproductive to continuous improvement. We'll dig into the existing research on why this is and look at different language we can use to facilitate sustainable Continuous Improvement in our work environments.
  • Reducing Environment Drift to 0 with Containers
    Reducing Environment Drift to 0 with Containers Leigh Capili, Infrastructure Engineer, Beatport Recorded: Jan 17 2018 39 mins
    We all know that differences between your development and production environments cause pain. In an ideal state, you’d have 0 drift between your environments. Luckily, modern tooling lets us model our production data centers on our personal machines, so we can iterate more quickly, experiment with failure modes, and deploy with confidence.

    In this talk, we’ll explore how we can use containers on developer laptops to mock out our production infrastructure. When you mock your infrastructure and make it easy to visualize and query what’s happening, you enable people to do wonderful things!
  • Hybrid-AI: Boost Cybersecurity with Human Augmented Machine Learning
    Hybrid-AI: Boost Cybersecurity with Human Augmented Machine Learning Matthew Thurston, Chief Architect - Arctic Wolf Networks Recorded: Jan 17 2018 48 mins
    Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?

    In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.

    We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.

    After attending, you will be able to:

    - Recognize how AI and Machine Learning are typically used in Cyber Security, and what are the gaps
    - Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
    - Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks

    About our guest speaker:

    Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.
  • Trends Shaping the Cloud in 2018
    Trends Shaping the Cloud in 2018 Todd Bernhard, Product Marketing Manager Recorded: Jan 17 2018 25 mins
    2017 marked the 10-year anniversary of Amazon’s AWS, and with it a decade of mainstream awareness of the concept of the public cloud. As we begin the year, the trends that will drive the technology industry through 2018 are becoming apparent. Among these trends is a greater maturity surrounding discussions about cloud computing.

    In this webinar attendees will learn how 2018 will be a year where the importance of robust multi-cloud management capabilities becomes clear. Organizations of all sizes will seek out solutions that transcend any individual public cloud provider while still providing visibility and management of their own on-premises environments.
  • Scaling DevOps from Pockets to Prevalence Across Your Organization
    Scaling DevOps from Pockets to Prevalence Across Your Organization Trigg Bowlin, Technology Director, Fannie Mae; Tricia Burke, VP Product Ops, Diligent Corp; Nicole Forsgren, CEO, Devops R&A Recorded: Jan 17 2018 45 mins
    As more organizations jump on the DevOps bandwagon, the conversation has shifted from “why” to “how.” With customers increasingly demanding a great, consistent experience everywhere, success in isolation is no longer good enough. In this panel, hear from three industry experts who successfully led DevOps transformations within their organizations, and learn how to gain buy in, unify teams and fragmented process, and scale your DevOps practice from a single team to your entire enterprise.
  • Securing K-12 modern learning environments using E-rate funding
    Securing K-12 modern learning environments using E-rate funding David Cumbow, Systems Engineering Manager, and Greg Herbold, Director of the SLED Segment, Palo Alto Networks Recorded: Jan 17 2018 47 mins
    Protecting student and district data, privacy, and safety with their limited IT resources is a tall order for K-12 institutions. This no-cost webinar is for districts and their consultants considering the E-rate program for funding firewall services. Join our education and E-rate experts to learn:

    •About Palo Alto Networks and how we uniquely protect students, data, and networks
    •How your peers have successfully leveraged E-rate funding to create safe learning environments
    •Which Palo Alto Networks products are eligible
    •Where to find E-rate resources

    SPEAKERS:

    David Cumbow is a Systems Engineering Manager with Palo Alto Networks. Prior to coming to Palo Alto Networks, David spent 13 years in the public sector working for the third-largest K-12 school district in Riverside County. Having worked jobs from Database Administration to Virtualization, David found a passion for Networking and Security. With eight years in the security field, David has led many K-12 Districts in California to a better security posture through guidance and peer-to-peer consulting. David holds a Bachelor of Science in Computer Science from California State University.

    Greg Herbold is Director of the U.S. State/Local Government and Education (SLED) segment at Palo Alto Networks, where he is responsible for creating solutions and programs to protect our way of life in the digital age by preventing successful cyberattacks. In this capacity, he leads strategy and planning, marketing, solution development, sales programs, channel partner development, contracts, compliance and industry relations for the segment. Greg holds a Master of Arts from Georgetown University and an HP-Stanford Innovation and Entrepreneurship Certificate from the Stanford Graduate School of Business.
  • Quay Enterprise 101: Overview and Demo
    Quay Enterprise 101: Overview and Demo Joseph Schorr, Software Engineer Recorded: Jan 17 2018 43 mins
    Quay is CoreOS's enterprise-ready container and application registry. Quay makes it easy for developers to store, manage and deploy container images, and simplifies your development to production workflow for your software containers.
  • Avoid Meltdown from the Spectre
    Avoid Meltdown from the Spectre Jimmy Graham, Director of Product Management, Qualys Recorded: Jan 17 2018 58 mins
    The recently disclosed Meltdown and Spectre vulnerabilities negatively impact the security of virtually every computer in the world today. These vulnerabilities allow an attacker to gain control of a computer’s processor and steal data located on that computer. Organizations that store data in the cloud are particularly susceptible.

    During this webcast, Jimmy Graham, Director of Product Management for Qualys Threat Protection and Asset Inventory, will showcase solutions that can help you determine the impact of Spectre and Meltdown across your global IT environments.

    By attending this webcast, you will understand how:
    • To quickly and easily visualize Spectre and Meltdown vulnerabilities within your environment
    • To track remediation progress as you patch against Spectre and Meltdown
    • The Qualys Asset Inventory and Threat Protection apps, which will help you automate detection and track remediation progress
    The webcast will include a live Q&A session.
  • Solving the NAS to Object Storage Challenge
    Solving the NAS to Object Storage Challenge Storage Switzerland, Cloudian Recorded: Jan 17 2018 60 mins
    Join Storage Switzerland and Cloudian in this live webinar as we discuss the advantages of object storage over NAS, the problems with converting from NAS to object storage and how to overcome those problems.
  • Successfully Navigating Your Journey to the Cloud
    Successfully Navigating Your Journey to the Cloud Vilas Patil, VP DevOps, Cognizant Jon Spinks, Principal Consultant, Sourced Group Recorded: Jan 17 2018 39 mins
    We’re moving to a cloud-first and cloud-native world, where technology is delivered faster, and with greater agility, than ever before. But many of us still stumble as we look to migrate workloads to the cloud. In this panel, you’ll learn how to modernize without reinventing the wheel, and you’ll see how three organizations have successfully led their organizations to the cloud without sacrificing agility, security, or control.
  • Don't Lose Control Over Your .com
    Don't Lose Control Over Your .com Jonathan Lewis, VP Product Marketing Recorded: Jan 17 2018 30 mins
    Even the most security focused businesses are susceptible to vulnerabilities such as DNS cache poisoning, DNS outages, or DDoS attacks. These can lead to a website or application becoming slow, completely unavailable, or even worse - hijacked. In this 30-minute live webinar, Jonathan Lewis, VP Product Marketing will cover the several, practical ways enterprises can protect themselves from losing control over their domain, and ensuring an excellent user experience for their customers.
  • Zero to Kubernetes in the Cloud
    Zero to Kubernetes in the Cloud Scott Coulton, Sr. Software Engineer, Puppet Recorded: Jan 17 2018 44 mins
    Containers are no longer in the distant future; a lot of businesses are starting to, or are already using, containers in dev/test. In this talk, we will walk through the offerings Puppet has to help you leap from dev/test to a production-from-scratch environment in the cloud. We will run through deploying Puppet Enterprise in AWS with Puppet's ready-made CloudFormation templates that leverage Puppet's AWS AMI for Puppet Enterprise. Then we'll use codedeploy to pull the Puppet Kubernetes module, and deploy our production-ready cluster with our first application in a highly available configuration, using garethr/kubernetes.

    Not only will we run through the process — in theory, we will deploy the cluster live in real time. So you will not only have the tools to deploy a production-ready cluster, you will have had the experience of seeing it done in the real world.
  • The Changing Role of Operations
    The Changing Role of Operations Michael Stahnke, Director of Engineering, Puppet Recorded: Jan 17 2018 44 mins
    Today, ops is expected to build and design delivery pipelines, have continuous statistic collection as a part of their monitoring services, and complement the development process with continuous integration and delivery practices, all while still maintaining critical back-office applications that most wouldn’t wish upon their enemies. What separates the operations teams that lead from the ones who react, and how can you prepare for what’s next?

    In this talk, we’ll consider a reactive team mired in fire-fighting and incapable of making headway, then watch as change that betters the team’s output and perception throughout the organization is slowly introduced. With a focus on procedural and cultural improvements, we’ll cover root-cause analysis efforts, bringing pain forward, experimentation, shifting left on quality, and selling automation and DevOps practices to management.
  • How To Simplify Your Datacenter Environment in a Multi Cloud World
    How To Simplify Your Datacenter Environment in a Multi Cloud World Vinu Thomas, Raphael Meyerowitz, Mike Berthiaume Recorded: Jan 17 2018 55 mins
    Presidio is radically simplifying customers datacenter environments with Nutanix. Come hear from Vinu Thomas, Presidio CTO, Raphael Meyerowitz, AVP of Datacenter Solutions, and Mike Berthiaume with Nutanix on how we are making it easier to manage, upgrade and deploy multi-cloud solutions.
  • Maximize your Data Availability & Resilience
    Maximize your Data Availability & Resilience Sanjay Agrawal, Director–Platform & Solutions, Hitachi Vantara; Sujith Vijayan, Manager Storage Solutions, Hitachi Vantara Recorded: Jan 17 2018 40 mins
    Enterprises are moving towards 24x7 Business and Applications are demanding highest uptime and data availability. Loss of data is not only impacting business but also resulting in major customer dissatisfaction. CIOs are looking for technology options and architecture designs that helps them deliver desired SLAs to their business.

    Join us for a Live BrightTalk Webinar to discover how you can maximize your data availability and resilience to meet the demands of the digital age.

    You will hear expert insights on how to meet your day-to-day challenges that will help you:

    •Meet expanded business requirements.
    •Capitalize on data for new opportunities.
    •Balance bimodal realities with hyperscale digital demands.
    •Deliver on SLA, RPO, RTO and ROI goals.
    •Protect all of the data all of the time.
  • Security Management in the Cloud
    Security Management in the Cloud Presenter: Greg Singh, Technical Director-APAC, Skybox Security | Moderator: Clayton Jones, Managing Director, APAC, (ISC)2 Recorded: Jan 17 2018 60 mins
    As organizations migrate workloads to cloud computing, they benefit from flexibility and agility, but network security operations grow increasingly difficult.

    Gaining visibility into cloud environments, extending existing security operations and workflows, ensuring compliance, and managing shared responsibility create new challenges for security professionals. Add to this the complexity of hybrid and multi-cloud environments — and the loss of control within those environments — and it’s no wonder security leaders are scratching their heads over how to best secure their organization’s journey to the cloud.

    This session will look at approaches to addressing the many challenges around cloud security management and best practices for translating on-prem security controls and processes into hybrid and multi-cloud environments.

    Join Skybox Security and (ISC)² on Jan 17, 2018 (Wed) at 14:00 Singapore time to learn more about security management in the cloud.
  • The [SMART] & Modern Highly-Efficient Data Center
    The [SMART] & Modern Highly-Efficient Data Center Stewart Dale, Sr. Application Engineer, Intel Data Center Management Solutions, and Dr. Rene Meyer, AMAX Recorded: Jan 16 2018 53 mins
    AMAX's [SMART]DC Data Center Manager is the premier out-of-band DCIM solution for the modern heterogeneous data centers, to optimize efficiency and manageability while reducing operational costs and resource underutilization.

    This webinar will cover:

    •The Next Generation of Data Centers: High Efficiency Meets Scalability
    •Streamline Heterogeneous Data Center Management with [SMART]DC
    •Incorporate GPU platforms Seamlessly as Your Data Center Upgrades
    •Achieve up to 30% in Power Savings for Your Infrastructure
    •Minimize Operational Disruptions and Protect Hardware Investment
    •How You Can Start Today
  • Forecasting 2018: An insider’s look to the future of IoT — a webinar
    Forecasting 2018: An insider’s look to the future of IoT — a webinar Aeris Communications Recorded: Jan 16 2018 64 mins
    With IoT still experiencing growing pains, predicting its future can be guesswork at best. Join us for this January 16 webinar where IoT subject matter experts peer into the crystal ball and expand on some of their IoT visions for the near future.

    Moderated by Christina Richards, VP, Global Marketing, Aeris, this webinar will present viewpoints, discuss upcoming IoT directions, innovations, and challenges, and enable audience participation via a Q&A session. All is possible at this future-leaning webinar. Here are a few tidbits.

    “SIM providers are going away. It’s just a matter of when.”
    —Drew Johnson, VP Engineering & Operations, Aeris

    “Automotive transformation via the IoT will become mainstream.”
    —Michelle Avary, VP, Automotive Strategy, Aeris

    “With more than a billion people in India alone, many below the poverty line, IoT will lead the charge for securing basic needs, such as clean water, healthcare, and education.”
    —Dr. Rishi Mohan Bhatnagar, President, Aeris India

    “Security will have to up its game as IoT delivers huge volumes of data.”
    —Syed “Z” Hosain, Chief Technology Officer, Aeris

    My prediction: This will be the only IoT futuristic view you will need to attend this year!

    Sign up now for this futuristic view into the future of IoT.
  • How to Drive Value from IT Transformation
    How to Drive Value from IT Transformation Richard McKinney - US Dept Transportation. David Egts - Red Hat. Harold Tuck, San Diego County Technology Office. Recorded: Jan 16 2018 65 mins
    Pressure to deliver faster, better and more economical services is driving IT modernization across state and local government. But a recent survey from the Center for Digital Government indicates that CIOs are approaching modernization with a growing emphasis on value -- respondents said “budget, cost control and fiscal management” dominate their attention, discussions and strategic planning activities. So how do government leaders approach modernization in an environment where value and fiscal responsibility are paramount?

    This hour-long, panel-style webinar will:
    • Uncover additional CDG survey findings on technology, planning and procurement priorities
    • Offer best practices around modernizing legacy systems, consolidating IT environments, strengthening data and analytics capabilities, adopting cloud services, and improving security and risk management
    • Discuss how commercially supported open source technologies can drive better performance at lower cost
  • From 10% to 100% Cloud in 3 Years: How (ISC)² is Doing it & Putting Security 1st
    From 10% to 100% Cloud in 3 Years: How (ISC)² is Doing it & Putting Security 1st Wesley Simpson, MSM, COO, (ISC)² Recorded: Jan 16 2018 49 mins
    (ISC)² COO Wesley Simpson, shares the association’s experience as (ISC)² transitions to a 100% cloud-based services model. This interactive discussion explores how (ISC)² decided to go all in with cloud, why the cloud was the best option, how the team ensured its cloud strategy mapped to operational needs, and how security is front and center throughout the entire process. Learn how we are doing it and share your cloud migration experiences. This discussion is for anyone thinking about moving to the cloud, already making the transition or even those who completed a cloud migration but still looking for best practices to apply.
  • The Breadth and Reach of the OpenShift Marketplace
    The Breadth and Reach of the OpenShift Marketplace Brian Gracely Director of Product Strategy, Red Hat Recorded: Jan 16 2018 18 mins
    From its early days as a Platform-as-a-Service (PaaS) to the current evolution as the industry's leading enterprise-ready Kubernetes platform, Red Hat OpenShift has quickly evolved to enable containers, cloud-native applications and open hybrid cloud deployments for companies around the world.

    In this webcast, learn how OpenShift is helping developers and operators deploy a broad range applications across multiple cloud environments.
  • A Guide for Enabling Windows Automation Using PowerShell
    A Guide for Enabling Windows Automation Using PowerShell Phil Ekins, Principal Architect at House of Brick Technologies Recorded: Jan 16 2018 45 mins
    In this presentation we will walk through a number of automation case studies. We will discuss the business problem addressed, how automation solved that problem, and the potential ROI experienced as a result.

    The examples featured will offer insights into how automation tooling played a large role in solving the client's core business issues, with a specific focus on Windows and PowerShell technologies.

    This will be an interactive session, so please feel free to bring your business problems and questions to share during the session.
  • Data Driven Security: Improve Your Security Posture To Defeat Your Adversary
    Data Driven Security: Improve Your Security Posture To Defeat Your Adversary Jamie Brummell, EMEA Systems Engineer, Palo Alto Networks and Paul Davies, EMEA Senior Alliances SE, Splunk Jan 18 2018 10:00 am UTC 45 mins
    Today’s complex, multi-faceted infosec challenges can cause IT and security teams to spend unnecessary cycles trying to perform the fundamentals – basic hygiene, assessing posture, and validating security “readiness”. With most organizations getting attacked weekly, ensuring these functions are efficient and effective is more important than ever.

    In this session you’ll learn how end-to-end security visibility is a critical first step to improving your security posture. By combining endpoint, network, user activity, and threat intelligence you can be truly data-driven and:

    - Identify malicious activity and gain key context to help prevent similar threats
    - Apply methods to help improve accuracy and further mitigate risk
    - Automate context gathering and response actions to accelerate investigations, and to more effectively contain and prevent threats

    Join us and get the inside view into the latest technological advancements powering today’s cybersecurity solutions.
  • Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security
    Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester Jan 18 2018 12:00 pm UTC 60 mins
    Three major trends define the Cloud Generation chaos that organizations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).

    On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organizations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for Organizations who face a severe shortage of skilled IT security personnel.
    Attend this webinar and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.
    In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:
    -Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security
    -Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
    -Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
    -Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.

    Register now
  • How to Simplify and Secure Enterprise Clouds with Winmagic and Nutanix
    How to Simplify and Secure Enterprise Clouds with Winmagic and Nutanix Aaron McIntosh, Senior Marketing Manager, WinMagic | Amanda Martinez, Alliances, Nutanix | James LaPalme, VP of BD, WinMagic Jan 18 2018 4:00 pm UTC 45 mins
    The future lies in turnkey cloud solutions like hyper-convergence, which is set to displace traditional server and storage models.

    WinMagic’s SecureDoc product suite, coupled with Nutanix, provides customers greater control and certainty over their data security through intelligent enterprise-controlled, cloud-agnostic key management & VM-level encryption.

    Join us as we unravel some of the most critical considerations for establishing a high performance IT infrastructure that is not only flexible, fluid, and affordable, but provides the consistent security and simplicity needed across your entire environment.

    In this webinar you will learn:
     
    Simplicity: Discover how to converge your entire datacenter stack into one solution, reducing silos, and simplifying your operations
    Scalability: Learn how you can flexibly and securely scale out to support dynamic workloads and evolving business needs of any size
    Manageability: Reduce the complexity of managing traditional infrastructure and security across a disparate array of platforms. Gain simplicity in meeting Compliance audits
  • Meet the new PowerEdge XR2 Rugged Server - proven hardware in any condition
    Meet the new PowerEdge XR2 Rugged Server - proven hardware in any condition Tracy Troyer - VP, Product Group & Jared Wilson- Enterprise Product Mgr - both of Dell EMC OEM Solutions Jan 18 2018 4:00 pm UTC 60 mins
    Rugged, ready and right along with you. Built from the ground up for harsh environments, the rackable compact size and certifications in shock, vibe, dust, humidity, EMI and maritime mean the XR2 is agile. The de-branding and customization capabilities mean it’s versatile. So whoever you are and wherever you go, you can take rugged with you. Join us to learn how the Dell EMC OEM XR2 server powered by Intel Xeon SP processors gives you anytime, anywhere access to the data and insights you depend on to make work happen.
  • 2018 UC Trend Watch
    2018 UC Trend Watch Dave Murphy, IR Jan 18 2018 4:00 pm UTC 60 mins
    2017 has been a big year in UC, the increased impacts of AI, Microsoft's announcement Teams, Avaya exiting Chapter 11 and Cisco's continued march toward the cloud, just to name a few.
    What will 2018 have in store? Join this webinar to get the lowdown on predictions for 2018 so you can stay ahead of the game.
  • 6 Trends Shaping DevOps Adoption in 2018 & Beyond
    6 Trends Shaping DevOps Adoption in 2018 & Beyond Robert Stroud, Principal Analyst, Forrester Research Jan 18 2018 4:00 pm UTC 45 mins
    One constant in all our lives is change. Digital disruption is rampant to support our business, as disruptive technologies are driving innovative business models across every industry. Innovation at speed mandates that IT organizations not only accelerate release velocity, but do so with greater quality, security and availability. For many, the transition to DevOps starts small, often with a single team delivering new innovation — typically writing the DevOps tool chain as well as the application.

    This talk from Rob Stroud, Principal Analyst at Forrester, will explore what’s required to meet the enterprise demand of DevOps in 2018 and beyond — including how will organizations adapt, and what approaches and actions your team and organization need to take to facilitate a smooth, and swift, transformation.
  • Beyond RSpec: Innovative Strategies for Confident CI
    Beyond RSpec: Innovative Strategies for Confident CI Kevin Paulisse, Site Reliability Engineer, GitHub Jan 18 2018 5:00 pm UTC 45 mins
    Continuous Integration (CI) testing provides instant feedback as you develop Puppet code. While it’s great that your rspec-puppet and beaker tests pass using fixtures and stubs, you can get a false sense of security from unanticipated edge cases, unrealistic assumptions, or the lack of complete coverage. You may be tempted to address these limitations by writing even more tests, but that would only exacerbate your frustration. Instead, you could use some alternate techniques to make your CI pipeline predict real-world behavior more accurately, and thereby gain confidence in your test results.

    In this session, we will explore some less traditional yet more powerful techniques for automated testing of Puppet code, and will explore how GitHub scaled these strategies to test hundreds of unique combinations while keeping build times reasonable. You will leave this session with fresh ideas to improve your CI pipeline, which will lead to confident and reliable deployments.
  • Playing Through the Pain: Strategies for Working in the Real World
    Playing Through the Pain: Strategies for Working in the Real World Richard Thieme, Author and Professional Speaker Jan 18 2018 5:00 pm UTC 60 mins
    After 25 years of speaking and writing about the impacts of technologies on “the human in the machine,” Richard Thieme documented the traumatic consequences for security and intelligence professionals of swimming in dark and turbulent waters that challenged our abilities, our ethos, and sometimes our very identity. Who we thought we were came up against what we had to do and the friction threw off sparks.

    This webinar goes beyond those stories to explore in particular how what dominant cultures call “minorities” manage their unique challenges. Thieme has uncharacteristically lived as “a minority” in five different ways and the dynamics and resultant strategies he had learned port seamlessly to the experience of others. There’s more to it than “playing through the pain” - there’s real gold in discovering our capacities for the resilience, power, and self-transcendence intrinsic to the human condition.

    Beginning with the “real facts” of the matter, Thieme draws on his experience to suggest ways to make this game a long distance run, not a sprint, and not lose our selves along the way.
  • How to Monitor Performance in the Digital Enterprise
    How to Monitor Performance in the Digital Enterprise John Rakowski, Sr. Director of Technology Strategy, AppDynamics Jan 18 2018 5:00 pm UTC 45 mins
    The average enterprise uses 10 or more monitoring products to assess enterprise performance and service availability.

    But, it’s 2018 - and it’s essential to take a strategic application and business-centric approach to performance monitoring. Although it’s tempting to put performance monitoring as an afterthought or in response to a new project, it needs to be part of a holistic approach to ITSM processes.

    In this webinar, attendees will learn:
    - The state of play in regards to monitoring in the enterprise
    - How Application Performance Monitoring (APM) tools improve ITSM processes
    - Key APM capabilities and how they apply to Service Transition and Operation
  • The Future of Authentication in a Hyper Connected World
    The Future of Authentication in a Hyper Connected World Angel Grant, Dir, Identity, Fraud & Risk Mgmt., RSA; Clare Nelson; John Carnes, Anthem; Brandon Dunlap (moderator) Jan 18 2018 5:00 pm UTC 75 mins
    With the ever increasing number of devices and applications that individuals use and access on a daily basis, the authentication of individuals has become paramount for organizations. It needs to be done faster, seamlessly and have less impact on the user. What can organizations do to meet this challenge? Are behavioral analytics an answer? What role does identity assurance play? What about multi-factor authentication? Biometrics? Join RSA and (ISC)2 on January 18, 2018 at 1:00PM Eastern for a discussion on where ID/Access management and authentication is going and how these future advancements can impact your organization.
  • The Dr. Seuss Guide to Code Craftsmanship
    The Dr. Seuss Guide to Code Craftsmanship Emily Freeman, Application Engineer, Kickbox Jan 18 2018 6:00 pm UTC 45 mins
    When you think of Dr. Seuss, writing code probably isn’t the first thing that comes to mind. But if you dig deeper, you’ll notice there’s a gem hidden in all his children’s rhymes. You see, Dr. Seuss would have made an excellent engineer. Because great code isn’t about choosing the perfect method name or building out 95% test coverage. All that is great, but it doesn’t make great code. YOU DO.

    This talk will focus on common pitfalls along the development lifecycle and distill Dr. Seuss’s excellent advice into concise steps developers can take before they write a single line of code.
  • Secrets Revealed: Effective Protection Against Ransomware
    Secrets Revealed: Effective Protection Against Ransomware Naveen Palavalli, Director, Product & GTM Strategy, Symantec and Jonathan Korba, System Engineer, Symantec Jan 18 2018 6:00 pm UTC 60 mins
    Since WannaCry and Petya took the world by storm in May of 2017, defending laptops, desktops, and IT assets from ransomware has become critically important for enterprises.

    This webinar looks look at the newly released advanced capabilities of Symantec Endpoint Protection 14.1 that help protect against ransomware attacks and the strategies and the technologies that Symantec customers have deployed technology for effective protection against ransomware and unknown threats.

    Join us to discover how you can:

    · Block ransomware via latest enhancements into behavior monitoring, machine learning and intrusion prevention

    · Gain enhanced visibility into suspicious activity across your endpoint estate

    · Optimizing endpoint security across different environment needs such as high risk employee groups, low bandwidth environments, etc

    In addition we’ll also show you SEP 14.1 in action, with a demo that showcases how unknown threats don’t stand a chance.

    Register Today
  • You Put Your Data Where?  Protecting Your Data in the Hybrid Cloud.
    You Put Your Data Where? Protecting Your Data in the Hybrid Cloud. NetApp Cloud Data Services 1901 Group BriteSky Jan 18 2018 6:00 pm UTC 60 mins
    You put your data where? Protecting your data in the hybrid cloud.

    We’ve heard it before: “I can’t use the cloud because my data won’t be secure or compliant!” You might feel the same. Many companies struggle with this challenge, yet even government agencies with the strictest data privacy requirements use the cloud.

    In today’s rapidly changing world, how can you tell which clouds and cloud types are right for your organization’s needs, now and in the future? Wouldn’t it be great to use a public cloud for more workloads, even those with sensitive data and compliance requirements?

    In our webcast, "You Put Your Data Where? Protecting Your Data in the Hybrid Cloud," we will share how public organizations with strict data privacy regulations leverage and deploy hybrid cloud to meet their business needs. NetApp’s partner 1901 Group will speak about a government law enforcement agency that has deployed hybrid cloud to gain better access to compute capabilities while keeping legal data under lock and key. Additionally, BriteSky, a Canada-based service provider, will discuss how they help customers use cloud resources and still maintain sovereignty over their corporate data.

    Whether you’re a public or private company, government agency, U.S.-based or multinational organization, this informative webcast will help you put your data where it's accessible to cloud infrastructures yet fully protected. Join us to learn how NetApp and our partners help people like you meet data compliance and data sovereignty requirements and deploy cloud architectures to suit your business needs.

    Register today.
  • All-Flash For Databases: 5 Reasons Why Current Systems Are Off Target
    All-Flash For Databases: 5 Reasons Why Current Systems Are Off Target Storage Switzerland, Vexata Jan 18 2018 6:00 pm UTC 60 mins
    In this live webinar join Storage Switzerland’s founder and lead analyst George Crump and Vexata’s VP of Products and Solutions Rick Walsworth as they explain how all-flash systems have fallen short and how IT can realize the full potential of flash-based storage without the compromises. Learn 5 areas where all-flash arrays miss the database performance mark.
  • The Advantages of Open Source for Enterprise
    The Advantages of Open Source for Enterprise Ben Bromhead, CTO and Co-Founder, Instaclustr Jan 18 2018 6:30 pm UTC 45 mins
    This webinar series will focus on a few of the key benefits of open source software for enterprise.

    Adoption of open source software (OSS) at the enterprise level has flourished, as more businesses discover the considerable advantages that open source solutions hold over their proprietary counterparts, and as the enterprise mentality around open source continues to shift.

    You will discover:
    - How to make smart use of open source software
    - Why Cassandra is a smart business decision
    - How to ensure your applications run smoothly on Cassandra
    - Why open source is the new norm
    - How to leverage the power of the open source community
  • Machine Learning and Microsegmentation
    Machine Learning and Microsegmentation John O'Neil, Edgewise Chief Data Scientist Jan 18 2018 7:00 pm UTC 45 mins
    “Make the trust zones smaller” is the rallying cry behind microsegmentation projects. Break up the network into smaller pieces and put firewalls in between those pieces to ensure attackers can’t get from one part of the network to the next. But making microsegmentation projects work relies on a great deal of knowledge of the network and attack pathways. And it’s an incredibly heavy lift–configuring and deploying a microsegmentation solution takes an immense amount of time and resources. Machine learning can significantly reduce the hurdles by learning the network’s intended state and defining the attack pathways that need to be secured, automating the microsegmentation process.

    Edgewise’s Chief Data Scientist John O’Neil will deep-dive into the role of machine learning in microsegmentation and demonstrate how a machine learning driven solution could reduce the time and energy needed to deploy microsegmentation from months to hours.
  • Panel: Closing the Culture & Skills Gap for DevOps
    Panel: Closing the Culture & Skills Gap for DevOps Petersen Allen, SysAd / Engineer, Salesforce; Tom Clark, Head of Common Platform, ITV; Tom Wolstencroft, VP, New York Life Jan 18 2018 7:00 pm UTC 45 mins
    DevOps is all about improving the way organizations work in order to deliver better software faster. It starts with people. In this panel, you’ll hear how three IT leaders led cultural change within their organizations and put a strategy in place to attract, develop and retain the talent they needed for success with DevOps.
  • A Simple Plan for a Motivated & Engaged Development Team
    A Simple Plan for a Motivated & Engaged Development Team Rick Tywoniak, Sr. Director, Cisco Jan 18 2018 8:00 pm UTC 45 mins
    Every manager wants to lead a team that is engaged and motivated, but not every manager knows how to create the environment that a happy dev team needs. Developers are lifelong self-learners, easily frustrated when stuck in a role with no opportunity to learn new technologies and broaden their skill set. Leveraging automation and tools within a DevOps culture is one way to help free up time for us to focus on work that is more interesting and also allow us to continue to build our skill set.

    In this session, Rick Tywoniak will share his own experience as a developer and now a team leader, providing insight into how you can help your manager better understand what you need in order to stay motivated, engaged and happy.
  • DDoS Attack: How Attackers Circumvent CDNs to Attack Origin Systems
    DDoS Attack: How Attackers Circumvent CDNs to Attack Origin Systems Andy Shoemaker, Founder, NimbusDDOS & Kim Lambert, Sr. Product Marketing Manager, Imperva Incapsula Jan 18 2018 9:00 pm UTC 60 mins
    Do you feel safe from DDoS attacks because you use a content delivery network (CDN)? Join Andy Shoemaker, founder of DDoS testing company NimbusDDOS, to uncover the limitations of this strategy. In this webinar he’ll perform a live DDoS attack to show how attackers bypass CDN defenses to directly target an organization’s critical resources.

    In this webinar you will:
    · Learn about the benefits and pitfalls of using CDNs as a DDoS protection strategy
    · Watch a live DDoS attack from the attacker's perspective
    · Participate in a live Q&A with DDoS experts
  • The Shift to Digital Business
    The Shift to Digital Business Mike Wittig, VP of Infrastructure Engineering, Nike Jan 18 2018 9:00 pm UTC 45 mins
    Digital transformation requires transformational leaders. In this session, Mike Wittig, VP of Infrastructure Engineering at Nike, shares first-hand how his team evolved its business models, its organizational culture and its practices to be like a software company and transform the way it engages its customers.
  • Dell Precision: Обновленная линейка графических станций
    Dell Precision: Обновленная линейка графических станций Евгений Горшков Jan 22 2018 8:00 am UTC 60 mins
    Вебинар посвящен обновленной линейке графических станций Dell Precision на базе процессоров Intel Xeon – основному инструменту креативного сотрудника (инженеры, дизайнеры и т.д.). Будут рассмотрены особенности линейки, ее состав и развитие. Отдельное внимание будет уделено как правильно позиционировать модели линейки исходя из задач заказчика. Вебинар предназначен для специалистов по продукту, инженеров предпродажной подготовки и отчасти менеджеров по продажам.

    Вебинар проводится при поддержке компании Intel
  • [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations
    [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations Palo Alto Networks Cybersecurity Experts Jan 22 2018 6:00 pm UTC 60 mins
    Join to hear Palo Alto Networks cybersecurity predictions for 2018 and get recommendations on how to mitigate against them to achieve a more resilient posture in the new year. Experts will dive into predictions on the threat landscape, cloud security, cyber hygiene, endpoint protection, IoT, machine learning and more.

    Here’s a sampling of some of the predictions our cybersecurity experts will review:

    •Ransomware Prevention more important than ever
    •The Internet of Things blurs the line between personal and corporate security
    •The era of Software Supply-Chain attacks has begun
    •The Cloud will accelerate channel partner migration to next-generation security innovators
    •Advances in Machine Learning will improve both patient care and cybersecurity
    •Cyber hygiene for financial institutions found non-compliant with SWIFT mandatory security controls