Hi [[ session.user.profile.firstName ]]

CxO Strategy

  • Her View on Finding Funding
    Her View on Finding Funding Jessica Gulick, CEO of Katzcy & Gail Ball, Managing Partner of Chestnut Street Ventures Recorded: Oct 18 2018 30 mins
    As a woman entrepreneur, you know firsthand how challenging it can be to get venture funding. Finding the right investors and other sources of capital to get your idea off the ground can be difficult. There are ways to get the funding you need to get your business moving! Please join Jessica Gulick, Owner of Katzcy Consulting, and Gail Ball, Managing Partner of Chestnut Street Ventures, as they share how to navigate the funding challenge and match investors to the needs of your growing technology firm. This 30-minute webinar gives you keen insight and tactics to gain capital, increase funding success and launch your business.
  • BI at Exponential Scale with Sub-Second Responses at Bell Canada
    BI at Exponential Scale with Sub-Second Responses at Bell Canada Mark Huang, Director - Data Engineering at Bell Canada and Ajay Anand, VP Products & Marketing - Kyvos Insights Recorded: Oct 18 2018 46 mins
    Like all telecommunication giants, Bell Canada relies on huge volumes of data to make accurate business decisions and deliver better services. They use BI tools such as MicroStrategy and Tableau to build dashboards and reports that provide actionable insights on key KPIs.

    However, as their data began to reach Big Data proportions, they started facing technological challenges delivering growing business reporting demands. They knew they had to bring in some architectural changes to meet their business team’s requirements of interactive slicing and dicing.

    In this session Big Data leadership from Bell Canada will present why they chose OLAP on Hadoop technology to achieve multi-dimensional analytics.

    They will discuss:

    - Why adopting OLAP on Hadoop was mission critical for their business teams
    - How they exponentially increased the volume and time span of the data they could analyze
    - How this new architecture delivers fast performance even with large numbers of concurrent users
  • The Money20/20 Payments Race USA is back
    The Money20/20 Payments Race USA is back Megan Hayes , Denis Trufin, Brittany Cooper, Renee Howard, Max Meilleur, Ali Paterson Recorded: Oct 18 2018 64 mins
    Racing all the way from the Money20/20 headquarters in New York City to Las Vegas, these 5 intrepid contenders will travel with only one payment method each.

    Megan Hayes - #TeamDevices
    Denis Trufin - #TeamCash
    Brittany Cooper - #TeamCard
    Renee Howard - #TeamChecks
    Max Meilleur - #TeamCrypto

    Join this webinar to meet the racers before they embark on the adventure of their lives.

    Moderated by Ali Paterson, Editor in Chief, Fintech Finance
  • How To Get More Customers
    How To Get More Customers Peter Strohkorb Recorded: Oct 17 2018 54 mins
    B2B Sales and Marketing Growth Specialist Peter Strohkorb describes why and how every business now needs to apply push and pull selling techniques in order to win more customers.
    Peter will reveal the Ten Action Items you need to have in place to be successful.
  • Next-Generation Finance: A Review of Global Open Banking Platforms
    Next-Generation Finance: A Review of Global Open Banking Platforms From CA Technologies, API Academy: Mehdi Medjaoui Recorded: Oct 17 2018 21 mins
    In a flat digital world: Simplicity sells, Simplicity Scales, Simplicity saves. This session is part of the API Virtual Summit 2018 on Open Banking Platforms.
  • Closing the Endpoint Security Gap in State and Local Government
    Closing the Endpoint Security Gap in State and Local Government HP Federal & Center for Digital Government Recorded: Oct 16 2018 55 mins
    According to intelligence firm IDC, 70 percent of successful cybersecurity breaches originate on endpoint devices. Endpoints are often easy targets for hackers, due to inconsistent and inadequate security configurations, sharing of user and administrative passwords, and more.

    Cybersecurity breaches have huge consequences for state and local governments – even a breach with less than 10,000 compromised records has an estimated cost of more than $2 million, according to the Ponemon Institute. And the loss of citizen trust is immeasurable.

    Since 2003, October has been recognized as National Cyber Security Awareness Month (NCSAM). Under leadership from the U.S. Department of Homeland Security and the National Cyber Security Alliance, the purpose of NCSAM is to educate government, industry and the public at large about how to be more secure online.

    To add to this critical conversation, this webinar features HP Federal’s Chief Technology Officer Tommy Gardner (at ~14 minute mark), for an engaging and informative discussion on how government leaders can take proactive steps to better protect endpoint devices.

    Key topics in the webinar includes:
    • The specific vulnerabilities of inadequately secured PCs and printers
    • Important steps to improve printer security – including data encryption, user authentication and access control, and more
    • How to better collaborate with procurement to ensure RFPs specify security capabilities for endpoint devices
  • How to Facilitate Knowledge Transfer within SecOps Utilizing SOAR Technology
    How to Facilitate Knowledge Transfer within SecOps Utilizing SOAR Technology Mike Fowler, CISSP, Vice President of Professional Services at DFLabs and John Moran, Senior Product Manager at DFLabs, Recorded: Oct 16 2018 52 mins
    Increased workload coupled with an industry-wide shortage of skilled responders is a common challenge heavily impacting operational performance in Security Operations Centers globally. An integral part of the solution is formulating a methodology to ensure that crucial knowledge is held and transferred between incident responders at all levels and overall retained within the organization.

    By utilizing Security Orchestration, Automation and Response (SOAR) technology, security teams can combine traditional methods of knowledge transfer with more modern techniques and technologies by incorporating machine learning and artificial intelligence capabilities.

    Join this webinar to learn about the benefits of implementing a SOAR solution, such as IncMan SOAR from DFLabs, and see how we can help to ensure that your organization’s knowledge is consistently and accurately retained, used and transferred, while simultaneously contributing to the efficiency and effectiveness of your entire incident response process.

    Key Takeaways:

    - The benefits of using SOAR technology
    - How to overcome the shortage of skilled security operations staff
    - How security orchestration and automation can facilitate knowledge transfer
    - How a SOAR solution can improve your overall security program performance
  • Successful Competitive Data Driven Strategies for the Insurance Industry
    Successful Competitive Data Driven Strategies for the Insurance Industry Jishnu Chatterji – AI&A Solutions Partner, Cognizant and Aaron Machej – MDM specialist, Informatica Recorded: Oct 16 2018 44 mins
    In this webinar Informatica and Cognizant will walk you through a number of use cases specific to the Insurance industry. We will discuss the business issues faced, how they were tackled and the solutions that can set the foundations for an agile approach to delivering customer success, whilst seeing significant ROI.and remaining compliant.

    Topics covered will include:

    • One profile to rule them all – why is it so difficult?
    • Customer 360 Intelligence – exploring the components
    • Learnings and best practices from across the globe
    • Engagement accelerator – increase time to value: Cognizant Insurance 360 Powered by Informatica
    • Business Value Discovery

    In the meantime, here is a brief introduction video to Insurance 360 https://www.youtube.com/watch?v=M5rOXxyOxbU&t=94s
  • ISM Webinar: Why is sales coaching such a misunderstood development tool?
    ISM Webinar: Why is sales coaching such a misunderstood development tool? ISM Champion - Mike Lever Recorded: Oct 16 2018 30 mins
    Key Takeaways:

    More than ever, sales teams are struggling with unqualified leads, missed sales goals, and lost opportunities.

    Increasingly, company and sales leaders are turning to coaching as a solution.

    And, why not? Executive and personal-effectiveness coaching have historically yielded great results.

    What we commonly see are sales managers and leaders who:

    -Don’t have time to coach
    -Aren’t sure what sales coaches are supposed to do
    -Don’t have access to the tools and resources that can help them get the most of coaching
    -Don’t establish a consistent rhythm of coaching conversations
    -Can’t lead a great coaching conversation

    Reasons to Attend:

    This webinar explores the clear link and transferable skills from selling to coaching.

    We will bust some of the myths about coaching and show how you can turn on your coachees (the person you are coaching) internal voice.

    We will share with you our experience of supporting new directors, managers, and supervisors taking a coaching approach by learning to ask not tell.
  • Managing data with confidence
    Managing data with confidence Tim Daunch, Enterprise Technical Consultant & Michael Hetrick, Senior Product Marketing Manager, Tableau Recorded: Oct 16 2018 27 mins
    Tableau Server has many built-in features to promote security, governance, data exploration, and collaboration. Data Server is arguably the most powerful of these tools. Discover how you can confidently manage your data while enabling ad-hoc exploration for the business.

    This webcast will teach you:

    - Tips to manage the proliferation of duplicate data sources
    - How to provide centralized metadata management
    - The key to simplifying how users access data stored in your databases
  • Make Job Seekers Love You: How to Create an Incredible Candidate Experience
    Make Job Seekers Love You: How to Create an Incredible Candidate Experience Judy Madden, Senior Vice President, Head of People at RMS Recorded: Oct 11 2018 54 mins
    Engage candidates more personally. Attract better talent. Fill roles faster.

    It's no secret that talented employees have options. In a recent survey, 55% of workers said that recruiters message them at least weekly, and 73% want this contact. But most workers also say that recruiters are pitching them the wrong roles. How can recruiters do a better job engaging talent from the very first point of contact, so that their communications are relevant, timely, and convincing?

    In this webinar, you'll learn from experts how to create a better experience for candidates so that they will choose to work for your company.

    * Learn best practices for building and maintaining talent relationships
    * Hear advice for creating an employer brand that attracts and retains top talent
    * Preview the first AI-powered Talent Experience that immediately matches talent to their ideal jobs
  • The Accelerate State of DevOps Report
    The Accelerate State of DevOps Report Dr. Nicole Forsgren, CEO, DevOps Research and Assessment (DORA) and Richard Seroter, Sr. Director of Product, Pivotal Recorded: Oct 11 2018 61 mins
    The Accelerate State of DevOps Report is the result of five years of research—with over 30,000 data points—to understand high performance in the context of software development, and the factors that predict it.

    In this webinar, we discuss the key findings in the 2018 report. Join us to learn how:

    - Software delivery performance unlocks several competitive advantages including increased profitability, productivity, market share, customer service, and ability to achieve organization or mission goals.
    - Not just using cloud infrastructure, but implementing cloud as it’s intended to be used, contributes to high performance
    - Outsourcing may save money in the short term, but is much more likely to contribute to low performance
    - Identifying key technological practices can drive high performance across your organization (and evidence that industry vertical doesn’t matter)

    Dr. Nicole Forsgren is Co-founder, CEO and Chief Scientist at DevOps Research and Assessment (DORA) and co-author of the book Accelerate: The Science of Lean Software and DevOps. She is best known for her work measuring the technology process and as the lead investigator on the largest DevOps studies to date. In former lives, she’s been a professor, sysadmin, and performance engineer.

    Richard Seroter is a Senior Director of Product for Pivotal, a 10-time Microsoft MVP for cloud, an instructor for developer-centric training company Pluralsight, the lead InfoQ.com editor for cloud computing, and author of multiple books on application integration strategies. As a Senior Director of Product at Pivotal, Richard heads up product marketing and helps customers see how to transform the way they build software. Richard maintains a regularly updated blog (seroter.wordpress.com) on topics of architecture and solution design and can be found on Twitter as @rseroter.
  • How Identity Resolution Maximizes the Value of MDM
    How Identity Resolution Maximizes the Value of MDM Lesley Hanly, Sr Director, Product Management, Prash Chandramohan, Director, Product Marketing Recorded: Oct 11 2018 60 mins
    Enterprises seeking growth and competitive advantage turn to master data management (MDM). MDM provides the trusted foundation for delivering successful business outcomes from data-driven insights to mergers and acquisitions, governance and compliance, and customer experience programs.

    When identity resolution is at the heart of an MDM solution, it ensures the anticipated value of your most strategic business initiatives. Identity resolution enables you to search and analyze disparate data sets to find a match and create unique identities from multiple records. But not all identity resolution methodologies are created equal. In this webinar, Informatica experts will examine:
    •The common challenges associated with identity resolution
    •The various approaches to matching identities across applications, and where some methodologies fall short
    •How to evaluate your data matching tactics
    •The algorithms behind the most advanced data matching engine, only from Informatica

    Informatica’s innovative approach to identity resolution allows maximum impact from your MDM investment. Join the experts with more than a decade focused on applying the best techniques to ensure the success of your MDM journey.
  • The BIG Cyber Security Skills Gap
    The BIG Cyber Security Skills Gap Alistair E. Macrae, Systems Engineer, FireEye Recorded: Oct 11 2018 48 mins
    Attackers will continue to be effective through an increase in sophistication, but they will also be successful due to the challenges organisations face in recruiting and retaining skilled cyber professionals.

    During this webinar we will be discussing the benefits and challenges of inhouse vs. outsourcing of cyber security operations and how this has been effected by a cyber-skills shortage within the industry with ‘on-demand’ resource being readily available when needed with real time insight and expertise of cyber breaches.
  • The Wolf: True Alpha
    The Wolf: True Alpha Christian Slater and Jonathan Banks Recorded: Oct 10 2018 21 mins
    Who’s afraid of The Wolf?

    Yes, The Wolf is back, and this time he’s not alone.

    Christian Slater returns as The Wolf with Jonathan Banks (from Breaking Bad) as The Fixer in the HP Studio’s latest film, The Wolf: True Alpha.

    From director Lance Acord comes the third chapter in the thrilling saga of The Wolf—an epic, global hunt about the dangers of cyber threats.

    The bottom line: if your devices aren't protected, you're prey. No matter who you are.

    Learn more about how to keep the Wolf away: http://www8.hp.com/us/en/solutions/business-solutions/printingsolutions/securityoverview.html?jumpid=sc_ucq8stx21w
  • When Biometrics Simply Don't Cut It
    When Biometrics Simply Don't Cut It Ehab Samy, Vice President of Product Management for Plurilock Recorded: Oct 10 2018 61 mins
    Identifying a user through fingerprints, facial recognition or iris scanning is simply not enough for today's digital age. Join us to learn about the shift from point-in-time identification to behavioral biometrics and how it is impacting today's workforce. Ehab Samy, Vice President of Product Management for Plurilock, will explore game-changing practices in continuous authentication and identity management to control access to physical spaces, applications, and government services.
  • Register Now! As IDC shares the perspective on Egypt's ICT Market for 2018
    Register Now! As IDC shares the perspective on Egypt's ICT Market for 2018 Eman El-Rouby Recorded: Oct 10 2018 29 mins
    Understanding Egypt’s ICT Market: Technology Trends, Market Size, & Forecasts for 2019

    Join us for an exclusive webinar as we walk you through IDC’s latest research into the Egyptian ICT market. The session will provide an overview of the recently released IDC Egypt ICT Report 2018, which provides in-depth market sizing data for 2017 and 2018, as well as insights into the market’s primary drivers and challenges, most influential technology trends, and key growth opportunities for the year ahead.
  • Preparing for PSD2 and Open Banking with APIs
    Preparing for PSD2 and Open Banking with APIs From Wipro: Dibyendu Ballav, Mohammed Intisam Alam Recorded: Oct 10 2018 29 mins
    Part of the API Virtual Summit 2018, a webinar by Wipro on Preparing for PSD2 and Open Banking with APIs
  • IR35 and Employment Status: Government Policy and Recent Court Cases
    IR35 and Employment Status: Government Policy and Recent Court Cases Jordan Marshall & Chris Piggott-Mckellar Recorded: Oct 9 2018 60 mins
    The landscape around tax and employment status is rapidly changing, with huge implications for independent professionals and the self-employed. Possible changes to IR35 in the private sector are worrying many, while the government is considering radical changes to the employment status framework following the Taylor Review. While all this is going on, courts are continuing to make new case law with crucial judgements on Uber, the BBC and Pimlico Plumbers.

    IPSE’s policy team will give you the latest update on this far-changing area, and analyse what the implications are for the UK’s 4.8 million self-employed as well as our broader flexible labour market.

    During this webinar we will discuss the following:
    • Proposed changes to IR35 in the private sector – update and implications
    • Government action on employment status – Taylor Review and Employment Status Consultation
    • Recent court cases – Uber, BBC and Pimlico Plumbers

    Jordan Marshall, Policy Development Manager
    Chris Piggott-McKellar, Head of Press and PR
  • ISM Webinar: Why don’t your salespeople do what they need to do?
    ISM Webinar: Why don’t your salespeople do what they need to do? ISM Champion - Mike Lever Recorded: Oct 9 2018 26 mins
    Key Takeaways:

    Are your salespeople not feeling the love from their prospects?

    Struggling to have long and meaningful conversations on the phone? They are not alone.

    In this webinar, we will explore why you and your sales team might be avoiding the things you really need to do.

    We will look at confidence and comfort zones in a selling environment.

    You will also get an introduction to the ABCD of you, your Awareness, Bias, Comfort zone and Decision-making.

    This is a must if you and your salespeople need to know more about what makes you tick

    Discover how you might go about improving your personal performance.

    Reasons to Attend:

    To be effective, they must understand the game has changed and their approach needs to change too - discover that:

    -Self-service has redefined sales
    -Prospects need a trusted advisor
    -Meaningful conversations are key to closing
    -Close the distinction between sales and marketing

    You need to adopt it sooner than you think, as the self-service world is not going away - and your competitors know this too.
  • Consent: Building a Trusted Brand in a World of New Customer Expectations
    Consent: Building a Trusted Brand in a World of New Customer Expectations Gerry Murray, Research Director, IDC Marketing and Sales Technology Recorded: Oct 4 2018 56 mins
    IDC Content Marketing Best Practices Series

    Did you know 85% of Marketers now rate customer loyalty and customer advocacy as one of their most important Key Performance Indicators (KPIs)?

    The era of customer experience is upon us. With ever rising customer expectations, and increasing compliance regulations around the world, IDC believes that winning in this new environment requires content marketers to think differently about their role in the customer relationship.

    Consent is one of the first steps in customer experience. Learn how to create various value exchanges through content marketing that will keep readers engaged and move them from prospect to loyal customer.

    Join IDC Custom Solutions and Gerry Murray for a 45-minute webcast outlining how customer expectations are changing, and how marketers can successfully adapt. Gerry will review the Hierarchy of Customer Expectations and mentor marketing, and offer best practices on how marketers and organizations can move beyond standard messaging, to add personalized value at every touchpoint in this new era of consent.

    He will focus on best practices for creating, distributing and measuring engaging marketing content. Included in the presentation will be tactical advice on how to optimize your marketing content by focusing on design, delivery and promotion, and subsequent awareness, effectiveness and usage measurement. A Q&A session with the audience will follow the presentation.

    This webcast the answer the following questions:
    • What is the customer hierarchy and why does it matter?
    • What do I need to do with my marketing content? Where should I focus?
    • How can I improve experience for customers and leads in my role?
    • What are the best practices for leveraging marketing content to increase consent and customer experience?
    • What are the best practices for developing and measuring content?
  • Improving compliance and governance through automation
    Improving compliance and governance through automation Puneet Kukreja, Deloitte Partner, Cyber Risk Advisory | Paul McPhee, Symantec Strategic Sales Manager, Emerging Technologies Recorded: Oct 4 2018 59 mins
    Businesses and Individuals, need to have clear visibility of the strength and application of their security controls, to protect their systems.

    Governance over the controls is as important as implementing the controls in the first place and understanding what the important controls are and how they need to be measured is vital. The ability to measure the application and effectiveness of cyber controls in a streamlined and automated way to allow effective decision making and remediation of issues is key to ensuring they are providing the protection required.

    Australian businesses face several Cyber Governance & Compliance challenges:

    - Compliance Validation: Concerns over verifying technology compliance

    - Cyber Threat: Concerns over detection of advanced cyber threats causing a data breach

    - Privacy or Regulatory: Concerns over PII, PCI, MAS regulation, Mandatory data breach and data privacy

    - Security Visibility: Concerns over inefficient reporting of security posture or security controls

    - Establish Controls: Architect, design, implement and operationalise new security controls

    Deloitte and Symantec are hosting a live webinar to discuss cyber governance and compliance challenges in Australia.

    Join this webinar for insights into cyber operations, business reporting and strategies for navigating the current landscape.
  • ISM Webinar: Why Your Customer Sales Journey is Broken
    ISM Webinar: Why Your Customer Sales Journey is Broken ISM Champion - Nevil Tynemouth Recorded: Oct 2 2018 31 mins
    Key Takeaways:

    Let’s face it: There are many fragile – and oftentimes broken – moments in the customer journey.

    Departmental handoffs and changes in the channel, for instance, add complexity and threaten to derail purchases and sometimes harm loyalty.

    So how can you bridge those gaps and deliver the seamless experience your customers really want?

    Reasons to Attend:

    While the customer journey is fraught with troublesome grey areas, don’t fret. Focus on the following areas instead:


    This is based on our work on the psychology of consumer behaviour.

    The real customer journey, challenges you to see things from your clients and customers perspectives.

    We look at the emotional drivers and associations your consumers and potential consumers have.

    We will introduce you to the green line and what you need to do to put your customers in a positive emotional state and how this benefits your business.
  • Smart Cities:  The Investment Timeline and Project Dependencies
    Smart Cities: The Investment Timeline and Project Dependencies Ruthbea Yesner, Vice President, IDC Government Insights and Smart Cities Recorded: Sep 28 2018 23 mins
    This webcast will look at the use cases that are currently being funded in Smart Cities and Communities globally. These funded projects will be analyzed in the context of when they will be implemented, why are the factors pushing investment, and how much spending is project through 2022. The concept of Use Case Horizon Mapping will be introduced which places uses in investment horizons, and also shows how they are being prioritized given cost and complexity of implementations.
  • FireEye Global Threat Response – How we Protect the World
    FireEye Global Threat Response – How we Protect the World Tim Wellsmore, Director, Government Security Programs, Mandiant International, a FireEye Company Oct 22 2018 2:00 am UTC 75 mins
    Most approaches to the global cyber security problem are usually focused locally inside separate organisations, who struggle to look out across the global landscape and effectively respond. National responses from government capabilities can be challenged by capacity and jurisdiction to truly understand the global threat environment, and to effectively respond. This presentation will highlight how FireEye utilises its various capabilities and threat focused teams from all parts of the business to build a cohesive global detection and response capability for the biggest global threats.

    This presentation will outline how we tactically respond within our internal capability teams, and across our customer base of 67 countries and how we keep the media, our customers and our government partners informed on the latest information. How we scale quickly to respond to WannaCry or NotPetya to ensure our Community Protection mandate is relentless maintained is an impressive story. This presentation will highlight how our FireEye technology arm and FireEye's subsidiary companies of Mandiant and iSight work seamlessly together in a global cyber threat event to bring our best against the world's most advanced cyber threat actors.
  • What Executives Should Know about Cyber AI
    What Executives Should Know about Cyber AI Claudio Scarabello Director Product, APAC FireEye Inc Oct 22 2018 6:00 am UTC 60 mins
    Artificial intelligence (AI) is a transformative technology that provides organizations with better cyber defense tools but also helps adversaries improve methods of attack. Organizations need to understand how AI will impact cyber security before they rely on it for their defenses.
    Watch this webinar as we discuss:
    • How AI tools can be used for offensive and defensive purposes in the cyber domain
    • Changing geopolitical landscape as threat actors develop and implement AI capabilities
    • Enhancement of a businesses’ defensive capabilities through AI technology
    • How FireEye uses machine learning to bolster its internal defenses and tools
  • Your breach readiness master plan: take the sting out of a cyber attack
    Your breach readiness master plan: take the sting out of a cyber attack Judith Moore, Director & Partner, FleishmanHillard Fishburn; Mark Deem, Partner, Cooley; Mike Trevett, UKI Director, Mandiant Oct 22 2018 10:00 am UTC 60 mins
    With numerous market-leading companies making negative data breach headlines this year, and attackers constantly evolving their techniques, tactics and procedures, it seems there’s no longer a case of ‘if’ an organisation will be breached, but instead ‘when’.

    “Do you know how your team will respond to and remediate a cyber-attack?”, is an increasingly pertinent question that all C-suite leaders should be able to answer—and more importantly, have a role in finding that answer to ensure their organisation’s cyber-security posture and incident response (IR) plan is built for success.

    Join and contribute to the conversation as Judith Moore, Director & Partner, Corporate and Crisis at FleishmanHillard Fishburn, Mark Deem, Partner at Cooley LLP and Mike Trevett, UKI Director at Mandiant discuss:

    •How to identify security maturity improvement areas before, during and after a breach
    •Why constantly-evolving threats require organisations to periodically revisit their crisis communication plans
    •What actions organisations should take to ensure they can effectively protect their reputation in the event of a breach
    •Which key strategic communication tactics should be considered when reporting a breach
  • Cyber Security in Today's IoT World
    Cyber Security in Today's IoT World Parnian Najafi Borazjani, Senior Analyst, FireEye Oct 22 2018 11:00 am UTC 45 mins
    IoT devices have become a mainstream part of our lives. IoT devices are no longer just consumer devices, rather they are interwoven in different parts of corporations.

    The August 2016 Mirai botnet attack has shown that security in IoT is required to have overall security. The lack of security in IoT devices not only affects users, but also affects the society in a larger scale. Manufactures of these devices need to follow a set of guidelines to ensure secure developments and deployments.
    Moreover, device consumers such as corporations should be aware of their attack surface.

    Join us for a live webinar as we address the top security and privacy issues in IoT devices, the threats that are targeting them and recommendations for possible solutions.
  • Automating Vulnerability Management & Incident Response: What’s Possible Today?
    Automating Vulnerability Management & Incident Response: What’s Possible Today? Justin Buchanan, Solutions Manager & Eric Sun, Senior Solutions Manger, Rapid7 Oct 22 2018 8:00 pm UTC 45 mins
    In this webcast, Justin Buchanan and Eric Sun will walk you through specific ways you can apply automation, both in vulnerability management and threat detection and response. If you’re on the fence between investing in more staff, automation technology, or managed services, we’ll provide you with what to consider to be ready for current and future threats.
  • How to Elevate Security as a Boardroom Priority
    How to Elevate Security as a Boardroom Priority Simon Moor, Director, Northern Europe, FireEye; Duncan Brown, Associate VP, European Infrastructure & Security, IDC EMEA Oct 23 2018 10:00 am UTC 60 mins
    Despite the continued focus on security and cyber-risk, most organisations demonstrate poor alignment between the business and security in the consideration of risk. This disconnect can start right at the beginning of a business process, where security is often not involved early enough (or at all) in strategic projects. Boardroom visibility of security threats is often weak, while the nature of security threats means that a continuous reassessment of risk is required, but rarely occurs.

    This webinar explores the gap between security and business risk, and examines the opportunities for alignment in Digital Trust, as a prerequisite for digital transformation.
  • Security in the Cloud: Identity Management, Access Control and Authentication
    Security in the Cloud: Identity Management, Access Control and Authentication Emma Bickerstaffe, Senior Research Analyst and Benoit Heynderickx, Principal Analyst, ISF LTD Oct 23 2018 12:00 pm UTC 45 mins
    Organisations increasingly rely on cloud services, motivated by the benefits of scalability, accessibility, flexibility, business efficiencies and reduced IT costs. However, there are several security implications that organisations need to address, including the challenge of verifying identity and managing access to cloud services.

    Cloud services bring added complexity to identity and access management, exacerbated by the distribution of data across a myriad of applications accessed by users from multiple devices and locations. Failure to adequately implement user authentication and access control in the cloud can be exploited by attackers to gain access to users’ credentials, manipulate systems and compromise data.

    In this webinar, Senior Research Analyst Dr Emma Bickerstaffe and Principal Analyst Benoit Heynderickx will discuss identity management, access control and user authentication in the cloud environment, and consider how organisations can effectively tackle this security concern.
  • How to apply a templated approach to Release Management?
    How to apply a templated approach to Release Management? Sridhar Prabhakar, Sr. Software Engineering Consultant Oct 23 2018 5:00 pm UTC 60 mins
    In part-4 of the DevOps webinar series, we are discussing the topic ‘Release Management and Continuous Integration’. Release management is almost always the overarching concern in any organization. DevOps plays an important role in enabling a robust release process that is both quicker and mindful of quality. In this episode of the webinar series, we take a deep dive into release management and suggest ways to apply a templated approach to the release management process.

    This 40-min webinar session will cover following key takeaways:
    • Overview of Release Management, Version Management, Backward compatibility, and Branching Strategy
    • Deep dive into Continuous Integration, Continuous Testing, Continuous release processes
    • Deterministic approach to templatize Release Management policies
    • Post Release aspects such as Archival Strategy, Cleanup, Upgrade planning and scheduling, etc.
    • Use cases to demonstrate the template approach
  • Predictive Modelling with Feature Engineering for your Business
    Predictive Modelling with Feature Engineering for your Business Pat Roche, CTO & Fen Wei, Lead Data Scientist Oct 23 2018 5:00 pm UTC 60 mins
    Learn how to drive business value with Machine Learning using Feature Engineering including feature extraction and feature selection to generate insights that resonate with business users. The complete process of Feature Engineering will be discussed from data wrangling through cleaning, exploring, modelling, validating, analyzing, and visualization. Specific business use cases will be presented to clearly convey how to apply Machine Learning and Feature Engineering to create accurate and interpretable predictive models.

    · CTO – Understand risk-averse Cloud based Machine Learning
    · CIO - Support business operations with automated Feature Engineering
    · Analytics Directors/Managers – Implement predictive analytics solutions fast
    · Line-of-Business Managers – Identify business needs ripe for Machine Learning
    · Data Scientists – Learn how TenPoint7 has implemented Feature Engineering.

    · What is Feature Engineering and how to apply it to business use cases
    · Ability to identify areas in your business where Feature Engineering can shine
    · How to greatly reduce the time and cost to implement Machine Learning solutions that include data scientists, data engineers, ML platform, and the application all in a single subscription.
  • [Panel] Bank Strategies to Exploit Data and Platforms in the Open API Economy
    [Panel] Bank Strategies to Exploit Data and Platforms in the Open API Economy Dan Houseman - KPMG, Polina Eystifeeva - Deutsche Bank, Christine Leong - Accenture and Eli Rosner, Finastra Oct 24 2018 12:45 am UTC 60 mins
    Financial institutions are readying themselves for the open banking revolution but what is the potential power of platforms and how can banks manoeuvre these new channels and data sources for innovation?

    Cloud and API technologies offer an immense opportunity to create a reliable, scalable global platform for the financial community - data privacy, security, and operational transparency are dealt with.

    * Are shared infrastructure, consistent APIs and on-demand scaling the key to rapid global adoption of financial services at a reduced cost?
    * Can the community afford to wait for a giant infrastructure to take a lead?
    * Can Quantum computing become affordable only as a shared infrastructure under cloud?

    Dan Houseman, Head of KPMG’s Australian Payments Advisory practice
    Eli Rosner, Chief Product and Technology Officer, Finastra
    Polina Evstifeeva, Head of Regulatory Strategy - Chief Digital Office, Global Transaction Banking, Deutsche Bank
    Christine Leong, MD Security, Accenture
  • Use In-Sprint Test Automation to Continuously Test at the Speed of Agile
    Use In-Sprint Test Automation to Continuously Test at the Speed of Agile Alex Martins, CA Technologies Oct 24 2018 8:00 am UTC 62 mins
    What's keeping you from testing continuously within sprints?

    As your organization adopts test-driven, agile development methods, you’ll want to automate testing even more so you’re not lagging behind the development sprint.

    Join this web seminar to learn how to use in-sprint test automation related practices around requirements engineering, test design automation and test case optimization to help you test at the speed of agile – thus, allowing you to:

    - Shift testing all the way to the left—to your business requirements design phase
    - Automatically generate test automation scripts for both open source and commercial frameworks
    - Achieve maximum coverage with the smallest set of test cases, directly from clearly modeled requirements
  • Autopsy of a real ICT case – TRITON
    Autopsy of a real ICT case – TRITON David Grout, Director Technical, South EMEA, FireEye Oct 24 2018 9:00 am UTC 45 mins
    Mandiant responded to an incident in 2017 at a critical infrastructure organisation where an attacker deployed malware designed to manipulate industrial safety systems. The targeted systems provided emergency shutdown capability for industrial processes. This malware, called TRITON, is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers.

    Join David Grout, our Technical Director for South EMEA, for a live session and get insights into the technical framework details and the potential outcomes.
  • Take Control of Your Email and Files in the Cloud
    Take Control of Your Email and Files in the Cloud Rob McDonald, VP of Product Management, Virtru Oct 24 2018 11:00 am UTC 45 mins
    Do you trust cloud vendors to protect your information and privacy 100% of the time? Are you taking proper steps to limit your risks around data loss and resulting GDPR penalties and damage to your brand? And as your employees create and share data in undefined cloud environments, how do you overcome shortcomings of legacy and native controls that don’t give you clear visibility over where your data resides and who can access it?

    Enterprises of all sizes have struggled to adapt to this new normal, but fortunately there’s still hope for your data and privacy.

    Join us to learn how a data-centric approach to encryption gives you persistent protection and control over where your data travels, who has access, and for how long, so you can empower your employees and truly embrace the golden age of the cloud.

    About the presenter:

    Rob McDonald is the VP of Product Management for Virtru and has been with the company since late 2013. Prior to Virtru Rob was listed by Beckers Review as 2013 and 2014 Top 100 Healthcare CIOs to Know through his work as a CIO for several Acute Care facilities and denovo Healthcare development teams. Rob has also consulted with corporations to help them assess their current information security position and develop a plan to not only mitigate the discovered technical shortcomings but more critically to raise security awareness amongst their employees. Rob holds BS from the University of Texas at Dallas in computer science and is a perpetual student of technology, information security, and privacy practices.
  • Executive Panel | Financial Services: Cyber Threats on the Horizon
    Executive Panel | Financial Services: Cyber Threats on the Horizon Kevin Taylor, EMEA VP; Sandra Joyce, VP, Global Intel Operations; Stuart McKenzie, EMEA Mandiant VP; Simon Moor, NEUR VP Oct 24 2018 2:00 pm UTC 25 mins
    Cyber threats plague the financial services industry:
    • Advanced persistent threat (APT) actors seek to support economic reforms and reach state goals
    • Financial threat actors seek financial gain through the direct theft of funds or the sale of stolen information
    • Disruptive threat actors and hacktivists seek to gain publicity, divert banks' attentions, or demonstrate a political motive

    Any one of these threats would increase activity in an industry, but the presence of all three likely accounts for the large number of intrusions in financial services organizations.

    Join us for a live video panel and get executive insights for critical topics relevant to the financial services industry, including the:
    • Nature of threats, as well as their motivations and tactics, techniques and procedures (TTPs)
    • Ripple effect consequences of geopolitics
    • Cost of a breach and importance of risk awareness in the boardroom
    • Need to keep GDPR a high priority
  • Gain W(5) API Visibility
    Gain W(5) API Visibility Bryan Whitmarsh, Sr. Director, Product Management for CA Technologies Agile Operations Business Unit Oct 24 2018 4:00 pm UTC 105 mins
    One of the significant issues in the API lifecycle is the lack of visibility to help answer the five Ws. Today, most users have some visibility into a few of the Ws, but when it comes to answering them all, you either have to gather information from many different systems and correlate it, or you have blind spots. In this session we will show you how a unified solution from CA Technologies (Runscope + APIM + APM) provides the critical information needed to answer “What is happening with my APIs”, “When is it happening”, “Who is being impacted”, “Why is it happening” and “Where is the problem”.
  • The IoT Buyer Speaks: IDC's 2018 Global IoT Decision Maker Survey
    The IoT Buyer Speaks: IDC's 2018 Global IoT Decision Maker Survey Carrie MacGillivray and Stacy Cook, IDC's IoT Ecosystem and Trends Research Practice Oct 24 2018 4:00 pm UTC 60 mins
    IDC's Carrie MacGillivray and Stacy Crook offer the first glimpse at the rich data gathered from IDC's Global Internet of Things (IoT) Decision Maker Survey, 2018/19. This is IDC's largest IoT survey to date with almost 5,000 respondents from 25 countries. It takes a deep dive into the issues facing organizations as they look to deploy IoT with regards to choosing the right vendor, how they are making sure their deployment is secure, and how they are using analytics. The survey also provides insight into how organizations are actually monetizing their IoT investments. This year's survey is guaranteed to highlight new trends and strategies that are emerging in IoT as we enter 2019.
  • Getting Started with AWS IoT Demo
    Getting Started with AWS IoT Demo Tolga Tarhan, CTO at Onica Oct 24 2018 6:00 pm UTC 60 mins
    Learn how AWS can accelerate your IoT strategy by allowing for rapid IoT prototyping in less than 6 weeks. By leveraging AWS' connectivity, storage, application, and analytics capabilities, you can build IoT-enabled apps quickly and at a fraction of the cost. We'll cover serverless IoT architecture as well as do a live demo on how to connect & configure devices on AWS IoT Core.

    What we’ll cover:
    * Device connectivity & security
    * Ingesting data with AWS IoT
    * Reacting to IoT data in real-time
    * Storing data in Amazon DynamoDB and Amazon S3
    * Building a simple RESTful API to consume the stored data
    * Analytics: Batch processing, analytics at the edge device with AWS Greengrass
    * IoTanium by Onica for quick hardware/software prototyping
    * Customer success: automation and remote management with AWS IoT
  • The 7 Most Common Mistakes in Sales & Marketing Alignment
    The 7 Most Common Mistakes in Sales & Marketing Alignment Peter Strohkorb Oct 24 2018 8:00 pm UTC 49 mins
    We have been talking about Sales & Marketing Alignment for for a long time, yet we STILL see THE SAME SEVEN MISTAKES being made.
    This webcast describes all 7 mistakes and offers a solution to each.
    Highly informative and engaging. RECOMMENDED !
  • CDN Market Perspective
    CDN Market Perspective Ghassan Abdo and Melissa Fremeijer, IDC's Worldwide Telecommunications Team Oct 25 2018 3:00 pm UTC 60 mins
    Content delivery networks (CDNs) carry a substantial portion of the world's internet traffic and are an essential component in handling the demands created by the massive amount of Web content, live high-definition (HD) video, flash sales, and large downloads on the Internet today. CDN technology also provides significant commercial benefits to enterprises that increasingly rely on cloud performance, availability, security, and analytics to create value with their end users.

    In this IDC Web conference, Ghassan Abdo and Melissa Fremeijer will provide an overview of the current CDN market and discuss several trends that will impact the CDN services market for the foreseeable future.
  • Cloud Modernization with Data Virtualization - A Case Study by TransAlta
    Cloud Modernization with Data Virtualization - A Case Study by TransAlta Paul Moxon, VP Data Architecture and Chief Evangelist, Denodo and Alejandro Ocando, System Analyst , TransAlta Oct 25 2018 7:00 pm UTC 60 mins
    TransAlta is an electric power generator company headquartered in Calgary, Alberta. TransAlta developed a Energy Trading and Risk Management System (ETRM) for hourly energy pricing, but business users needed the ETRM data to be blended with many other sources of data in near real-time. At the same time TransAlta's IT department wanted to move their entire data layer to the cloud for flexibility, agility and lower TCO. Data virtualization technology played a central role in TransAlta's real-time data integration, while helping them move to the cloud with zero down-time. Attend this webinar to learn:

    * Who is TransAlta and why data driven insight is critical for their energy trading system
    * Why Data Virtualization played a critical role in TransAlta's cloud modernization effort
    * How Data Virtualization offers a faster and better data integration over legacy systems
  • GDPR 101: Monitoring & Maintaining Compliance After the Deadline
    GDPR 101: Monitoring & Maintaining Compliance After the Deadline Dr. Branden Williams, Union Bank; Janalyn Schreiber, TrustArc; Eugene Tyrrell, Online; Chris DePippo, DXC; Tim White, Qualys Oct 26 2018 3:00 pm UTC 77 mins
    Achieving and maintaining GDPR compliance is a complex and expensive initiative for companies of all sizes, across all geographies and industries, and tech giants have already been sued for violating the terms, while major newspapers have been forced to restrict EU access to their websites for fear of noncompliance.

    In June 2018, Dimensional Research on behalf of TrustArc surveyed 600 legal, information technology and privacy professionals, and found that 20% of companies surveyed believe they now are GDPR compliant, while 53% are in the implementation phase and 27% have not yet started their implementation. Now three months after deadline, it's clear that there is a lot work yet to be done in order for all companies to achieve full GDPR compliance.

    In this CPE accredited webinar, our panel of experts will discuss the main issues and attendees will learn:

    - The latest techniques to protect data and remediate breaches.
    - How GDPR can support your corporate values and drive business value for customers and partners.
    - What your organization needs to uncover data risks and avoid fines.
    - How technology can enable continuous monitoring, maintenance, and demonstration of GDPR compliance, in an ongoing and efficient manner.
  • Ask The Expert: Connected Corporate Banking in APAC
    Ask The Expert: Connected Corporate Banking in APAC Patty Hines - Celent and Tim Tyler - Finastra Oct 30 2018 9:00 am UTC 60 mins
    APAC corporate banking revenue pools are substantial for the connected corporate banks that can seize the opportunity. This interview with Patty Hines, senior analyst from Celent, will delve into the technology and fintech priorities of corporate banks in the region, strategic considerations based on corporate treasury research and the definition of connected corporate banking in through the lens of APAC transaction banking and lending trends. Oliver Wyman forecasts accelerated growth in APAC: 6% CAGR from 2017 to 2022. Following a deep analysis of the leading APAC banks. Those that want to succeed are investing in connected corporate banking technology to deliver comprehensive, tailored, and joined up solutions.

    Tim Tyler, Master Solution Architect - Corporate and Retail Banking, Finastra
    Patty Hines, Senior Analyst, Corporate Banking, Celent
  • Implementing a governance framework
    Implementing a governance framework Kevin Taylor, Sales Consultant & Michael Hetrick, Senior Product marketing Manager, Tableau Oct 30 2018 9:00 am UTC 45 mins
    When exploring self-service analytics at enterprise scale, governance is likely one of your top considerations. Combining people, process, and technology, the Tableau Governance Framework creates accountability and enables access to secure and trusted data and for all skill levels in your organization.

    In this webcast you'll learn:

    - The benefits of when the business and IT strike a balance between agility and control of data
    - Considerations when designing your own data governance processes
    - Features of Tableau Server that are critical to implementing a successful governance strategy
  • Using Threat Intelligence Effectively in Security Automation and Orchestration
    Using Threat Intelligence Effectively in Security Automation and Orchestration John Moran Sr. Prod. Mngr DFLabs; Jessica Bair Sr. Mngr Adv.Threat Solutions; Michael Auger, Sr Sec. Solutions Cisco Security Oct 30 2018 3:00 pm UTC 60 mins
    Using Threat Intelligence Effectively in Security Automation and Orchestration: A DFLabs and Cisco Use Case.

    Actionable intelligence is critical to responding efficiently and effectively to a potential security incident. Inaccurate or incomplete intelligence can lead to threats dwelling on the network, resulting in increased financial losses and irreparable damage to reputation. Once a threat has been discovered, decisive action must be taken to contain the threat.

    Cisco’s suite of detection, intelligence and response products, including Email Security Appliance, Threat Grid, Umbrella and Umbrella Investigate; offer security practitioners an unparalleled suite of tools, to address all phases of the incident response lifecycle.

    Combining the vast capabilities of Cisco’s suite of security products, with the orchestration and automation power of DFLabs’ IncMan SOAR platform, allows organizations to respond to potential security incidents, with unmatched speed and accuracy.

    Key Takeaways:

    · How Cisco’s suite of security products can improve your security infrastructure
    · How IncMan SOAR’s automation and orchestration capabilities can increase the efficiency and effectiveness of your security program
    · How Cisco security products combined with IncMan SOAR from DFLabs can automatically respond to threats

    Presented by:
    John Moran, Senior Product Manager, DFLabs
    Jessica Bair, Senior Manager, Advanced Threat Solutions, Cisco Security
    Michael Auger, Senior Security Solutions Architect, Cisco Security

    Your registration information will be shared with DFLabs’ solution partner Cisco Security, who may contact you in follow-up to your registration and/or attendance of this webinar.