Hi [[ session.user.profile.firstName ]]

CxO Strategy

  • The 6 Critical Technologies You Need for the Post-Pandemic economy
    The 6 Critical Technologies You Need for the Post-Pandemic economy
    Steve Moritz, Chief Digital Officer, System Soft Technologies & Eric Z. Leonard, Microsoft Practice Lead, SST Live 60 mins
    COVID-19 has precipitated an economic crisis that is forcing companies to confront uncertainty like never before:

    - How to align operating costs with a dwindling top line
    - How to support remote and virtual workers who may never return to classic, physical office space, but still must collaborate and perform at high levels
    - How to manage capacity (people, hardware and software) with demand forecasts being so fluid and uncertain

    This webinar will identify six specific technology solutions that every company must consider to address these challenges, spanning e-commerce, digital workplace, robotic process automation, cloud deployment, and security frameworks.

    Tangible examples will be provided on how these critical technologies can be quickly put into practice and implemented in scalable ways to align with an uncertain future.
  • Modern Uses of Thermal Imaging and Computer Vision Technologies
    Modern Uses of Thermal Imaging and Computer Vision Technologies
    Michael Knight, Global CTO, Safety and Security – Industry Edge, Dell Technologies Recorded: May 28 2020 31 mins
    Welcome back to Dell Technologies Innovation Webinar Series. In this conversation we will explore and focus on the “Modern Uses of Thermal Imaging and Computer Vision Technologies”. The next generation of safety and security solutions such as thermal imaging and computer vision are being used in novel ways in today’s world, and we believe this is only the beginning.
  • Best Practices for Business Continuity: Hit the Ground Running
    Best Practices for Business Continuity: Hit the Ground Running
    Adam Dofrman, Christopher Eden Recorded: May 28 2020 53 mins
    Adam returns for a third Town Hall Webinar to provide insight into the post-COVID-19 landscape and how your preparation now can help your brand when it comes to re-opening.

    We'll be looking at key updates and sharing the learning of these past few weeks about Google and GMB, and discuss how businesses can be ready to bounce back from COVID-19.

    We also have time for a live Q&A with our presenter.
  • Endpoint & Network: una visibilità completa in continua evoluzione
    Endpoint & Network: una visibilità completa in continua evoluzione
    Gabriele Zanoni, Solution Architect, EMEA, FireEye Recorded: May 28 2020 64 mins
    FireEye Endpoint & Network: una visibilità completa per architetture in continua evoluzione. Scopri la tecnologia premiata dai test del MITRE.

    Il Webinar “FireEye Endpoint & Network: una visibilità completa per architetture in continua evoluzione” fa parte di una serie di incontri settimanali intitolati: #FireEyeCyberTalks. Si terranno ogni giovedì, dal 21 maggio al 18 giugno, e ti offriranno contenuti stimolanti e approfondimenti da parte dei nostri esperti.

    Avere la possibilità di individuare i movimenti di un aggressore nel minor tempo possibile è la chiave per minimizzare gli impatti di un possibile incidente informatico. Le soluzioni di FireEye Endpoint & Network security integrano nativamente un sistema di condivisione degli Indicatori di Compromissione che permette di massimizzare la visibilità degli attacchi.
    Ad esempio, i Movimenti Laterali spesso compiuti tramite programmi di “Shadow IT” possono essere una delle ragioni a causa delle quali il tempo di identificazione di un attacco - il così detto Dwell Time - risulti particolarmente elevato: FireEye permette di ottenere una piena visibilità di tutte le fasi di un attacco, compresa appunto la fase dei Movimenti Laterali - sicuramente una delle più complesse da identificare. Inoltre, le informazioni di Threat Intelligence, integrate nelle soluzioni FireEye, permettono di capire rapidamente quali sono quegli incidenti a cui è assolutamente necessario dare seguito in tempi brevi. I test del MITRE, condotti simulando una compromissione Nation-State con le Tecniche Tattiche e Procedure (TTP) del gruppo APT29, hanno recentemente assegnato a FireEye il livello di punteggio più alto in termini di identificazione rispetto a tutti i gli atri competitor.
    In questo Webinar vedremo come i sistemi Endpoint e Network di FireEye possano mettere in sicurezza le più diverse architetture e sistemi.

    Prenota il tuo posto oggi #FireEyeCyberTalks
  • Data Virtualization-Fulfilling the Digital Transformation Requirement in Banking
    Data Virtualization-Fulfilling the Digital Transformation Requirement in Banking
    Paul Moxon, SVP Data Architectures & Chief Evangelist, Denodo Recorded: May 28 2020 58 mins
    The financial industry is undergoing a massive digital transformation, and banking institutions are on the road to becoming digital financial technology organizations. This is driven by many factors, some of which include, the need to improve customers experience (CX) through tailored products and services, staying competitive in an ever more competitive market with new challengers, adapting to new delivery channels, and advances in technology.

    Data is at the center of this digital transformation, but caution needs to be taken to ensure customers’ data rights, privacy and security are top priorities, especially with initiatives like Open Banking and shifts to Cloud environments. So how do banks move forward, living up to market expectations and staying competitive while protecting their customers and complying with regulations?

    Banking institutions need to update their legacy systems and implement strategies and services that will transform them into digital financial organizations. They need agile access to information that can be leveraged to make timely business decisions, yet still fulfill the regulatory requirements.

    Banks in the digital transformation era, need a single view of all their data and a way to establish security controls across the entire infrastructure.

    In this webinar, we will discuss how data virtualization can update and modernize data architectures in the digital transformation era. We will present success stories of banking companies who already use data virtualization to differentiate themselves from the competition, optimize processes, and create new business opportunities through more agile data management.
  • Creare una Supply Chain resiliente
    Creare una Supply Chain resiliente
    Luca Piccione, Tradeshift & Julio Cesar Santos, Quyntess Recorded: May 28 2020 38 mins
    Come stabilire un meccanismo di controllo che si adatta alle tue esigenze?

    Molte industrie cambiano molto rapidamente e questi cambiamenti richiedono alle aziende di essere più agili e innovative che mai. La chiave del successo è avere una Supply Chain collaborativa e resiliente - all'interno della tua organizzazione e tra i diversi dipartimenti. Le soluzioni di trasformazione digitale nell'area della supply chain aiutano le aziende ad affrontare ogni giorno nuove sfide.

    La collaborazione digitale con i fornitori e con i clienti non solo riduce inefficienze e rischi, ma apre anche una prospettiva di immenso valore strategico. Utilizzando una soluzione digitale come Tradeshift e Quyntess, è più facile avere più controllo, agilità e visibilità lungo la catena di approvvigionamento allo stesso modo in cui un'azienda può adattarsi continuamente ai cambiamenti e alle sfide del proprio settore. Tradeshift e Quyntess offrono strumenti personalizzati che completano le soluzioni esistenti e si adattano alla tua attività.

    Partecipa al nostro webinar per scoprire:
    • Perché e in che modo la nostra soluzione offre maggiore visibilità e informazioni sulla catena di fornitura?
    • Come possiamo migliorare la collaborazione con i clienti e i fornitori?
    • Come possiamo aiutarvi in ​​modo proattivo con la vostra strategia di gestione della liquidità?
    • Come possiamo personalizzare il processo della supply chain utilizzando i nostri Apps partner?
  • How to launch a Neobank in 90 days?
    How to launch a Neobank in 90 days?
    Pradyut Vatsa, APAC Sales Lead, Temenos, Kamal Chandramohan, Client Engagement & Solutions Manager, Aspire Systems Recorded: May 28 2020 74 mins
    Neobanks need 3 key elements:

    1.Resilience for performance and robustness
    2.Rapid repsonsiveness to prevailing market forces and fluid customer demands; and
    3.Speed to market

    With the COVID-19 outbreak, launching a neobank might seem as if it got all the more tougher. Well, think again! Aspire Systems and Temenos, the banking software specialist, present a tell-all on how to kick start a neo-bank in 90 days from scratch with a light yet powerful technology stack, in any business storm.

    Covid-19 has brought many pressures to the global economy, and whilst plans for development and growth have not stopped, for many organisations they have slowed whilst they deal with business continuity and managing their long term future. In banking, performance, resilience and the ability to quickly respond to customer needs has never been more in the spotlight. With this in mind, Aspire Systems and Temenos, the banking software specialist, present a tell-all on how to kick start a neo-bank in 90 days from scratch with a light yet powerful technology stack, in any business environment.

    What’s in store for you in this webinar?

    •Understand the necessary roadmap for a Neobank – what tech you need to focus on, week wise, month wise
    •The combination of Temenos Transact on cloud and Temenos Infinity to kick start operations in 90 days
    •Find out what is the most appealing banking solution in the market and why it matters much more in these uncertain times
    •Get a sneak peek into the success story

    Along with this webinar, you’ll also be getting exclusive access to the latest Neobank report powered by Temenos and Aspire Systems.

    Register to tune in on May 28th at 11:30 AM SGT and find out why this is unmissable.
  • Security without Compromise. A new approach to eliminate malware.
    Security without Compromise. A new approach to eliminate malware.
    Mehul Patel, Director, Product Marketing - Menlo Security, Inc. Recorded: May 28 2020 26 mins
    With 50% of all attacks being malware based — and 99% of those being driven by email and web attack vectors — legacy technologies reliant on signatures and known threats aren’t cutting it against today’s relentless and pervasive threats. The security architecture requirements need to change. So how can you achieve 100% malware protection?

    By 2022, Gartner estimates isolation can reduce attacks that compromise end-user systems by 70%*. Because of its efficacy, isolation is becoming a critical capability for secure web gateways as enterprises adopt SaaS services and move to the cloud. In this webinar, we’ll show you why isolation has become so important to modern security. Mehul Patel, Menlo Security’s isolation expert, will explore an effective way to eliminate the threat of malware — both known and unknown — from all Internet and web traffic, including email, web, apps and documents.

    Discover:

    - The three trends impacting your security architecture and how you can offset the risk
    - How your organisation can eliminate the risk of malware, viruses and ransomware
    - Why Menlo Security stands behind its security with a $1M malware protection warranty

    * Source: Gartner Innovation Insight for Remote Browser Isolation, 8 March 2018
  • Delivering Virtual Patient Care in a Post-Pandemic World
    Delivering Virtual Patient Care in a Post-Pandemic World
    Milton Chen, CEO at VSee.com; Michael Chen, MD and CTO of HIE of One; Stephen Sklarew, CEO at Synaptiq Recorded: May 27 2020 63 mins
    Join our Head of Marketing, Portia Roberts for a rockstar panel with Milton Chen, CEO at VSee.com and This American Doc; Michael Chen, MD and CTO of HIE of One; and our CEO Stephen Sklarew to discuss the rapidly changing world of patient care. In this panel, we will discuss:

    Embracing telemedicine: Practical and profitable considerations.
    Tackling the ultimate healthcare data challenge: Accessible and private patient records.
    Leveraging AI to supercharge healthcare technology: What's possible today.

    We are all eager to find solutions and adapt to these uncertain and changing times. We hope this talk will inspire healthcare professionals and solution providers alike. Please come ready with your questions for a live Q&A at the end!
  • Integrating Better Intelligence for Better Security
    Integrating Better Intelligence for Better Security
    James Graham, Sr. PMM, FireEye ; Jeff Guilfoyle, CISSP, Solution Architect, FireEye; Finian Mackin, Sr. PM, Anomali Recorded: May 27 2020 50 mins
    Anomali and FireEye Mandiant Threat Intelligence: Integrating Better Intelligence for Better Security

    As attackers grow more resourceful and effective in their efforts to expose and compromise users and their data, it is becoming more important than ever to integrate effective cyber threat intelligence to drive better detection and apply added context to potential threats. Anomali’s addition of FireEye Mandiant Threat Intelligence to its App Store presents a scalable way to integrate industry-leading threat intelligence into your security systems and program.

    Join experts from FireEye and Anomali for a panel discussion surrounding the value of cyber threat intelligence, the need for increased integration of intelligence to drive better security, and the added value that a combined Anomali-FireEye solution can provide.​

    Register Now!
  • Forecasting Cyber Threats Post Pandemic
    Forecasting Cyber Threats Post Pandemic
    Richard Stiennon, Kurtis Minder, Jessica Gulick Recorded: May 27 2020 45 mins
    The world has changed, and so has your threat landscape. Join us for a discussion on how cyber attacks have pivoted their tactics and targets. From the latest on phishing kits to video threats, our experts will explore how changes in motives and targets is disrupting and increasing our threat landscape. Learn how to reframe your understanding of your threat profile and better defend and respond to these attacks.

    Our featured experts for this webinar include Richard Stiennon, chief research analyst at IT-Harvest and Kurtis Minder, CEO of GroupSense, GroupSense is a digital risk management company that delivers customer-specific intelligence.
    Here’s What Will Be Discussed:

    1) Threat actors are adapting their tactics and targets
    2) Changes in motives and targets are disrupting and expanding the threat landscape
    3) Understanding your threat profile to create a better cyber defense strategy.
  • Experience Acquia Latinoamérica
    Experience Acquia Latinoamérica
    Leticia Viola, Ecuavisa | Christian Barreto, Liberty Seguros | Dan Katz, Acquia Recorded: May 27 2020 70 mins
    Crear una experiencia digital que ofrezca lo que los clientes quieren ahora comienza con la comprensión de sus necesidades y deseos, y el desarrollo de una estrategia inteligente. Durante este evento virtual, examinaremos las formas más efectivas para que todo suceda.

    Asistentes al evento escucharán a Dan Katz, Gerente Senior, Ingeniería de Soluciones, Acquia, mientras comparte cómo comprometiéndose a la experiencia del cliente impulsará la lealtad del cliente ante una pandemia global. También escuchará a Leticia Viola, Gerente Digital de Ecuavisa, y Christian Barreto, Gerente de Iniciativas de Liberty Seguros cuando compartan cómo el entorno actual está impactando las estrategias digitales en sus empresas. Y finalmente, los presentadores discutirán cómo la crisis está impactando las estrategias digitales, cómo puede saber si su propio enfoque está funcionando y qué oportunidades tendrá 2020.
  • Key Elements for Accelerating Business Processes in a COVID-19 World
    Key Elements for Accelerating Business Processes in a COVID-19 World
    Stephen Boals, SVP Business Development & Alliances Recorded: May 27 2020 24 mins
    The world is currently grappling with what is becoming one of the biggest crises of our time and the nature of work has been changed forever. Organizations are rapidly transforming their operations to overcome obstacles brought forth by the COVID-19 pandemic.

    Join us for an informative webinar on the challenges, necessities and options businesses will need to address as they survive and flourish in a post-COVID-19 business world.

    We will address key lessons learned from this pandemic crisis, common challenges and why organizations are struggling with remote work, unpredictable volumes, worker isolation and overall business flow. He’ll look at several technology solutions, including intelligent screening, capture and RPA tools that can accelerate processes and protect companies in our current and future climates. Examples will include use cases from healthcare, government and mortgage companies from HR onboarding to mobile screening solutions.

    You will learn how to:
    -Adapt to high volume intake and document surges
    -Deploy innovative technology for remote workers to be fully productive
    -Leverage key point solutions, like rapid screening technology, to free up employees for higher-value tasks
  • How Fintechs Can Balance Onboarding and Security Amidst COVID-19
    How Fintechs Can Balance Onboarding and Security Amidst COVID-19
    Claudia Bate, FleishmanHillard Fishburn | Philipp Pointner, Jumio Recorded: May 27 2020 44 mins
    COVID-19 is testing fintech. With the accelerated adoption of digital technologies, the resulting user growth challenges platforms and increases the chances of vulnerabilities in the systems, which has an effect on customer security. What can fintechs do to ensure client onboarding is swift yet safe and effective?
    This webinar will discuss:
    - the measures fintechs can put in place to ensure their systems are effective and customer privacy is not sacrificed.
    - How to balance onboarding and risk monitoring.
    - Advances in AI and Machine learning that underpin identity verification
  • Lieferanten benötigen dringend Liquidität – stellen Sie diese zur Verfügung.
    Lieferanten benötigen dringend Liquidität – stellen Sie diese zur Verfügung.
    Uwe Stroh, Tradeshift Recorded: May 27 2020 28 mins
    Lieferketten sind unter immensem Druck. Geben Sie Ihren Lieferanten die dringend benötigte Liquidität.

    Lieferketten stehen durch die momentane Situation unter immensem Druck.

    Die unsichere Liefersituation, reduzierte Kapazitäten und durch home office veränderte Abläufe, führen zu stark erhöhtem Kommunikation- und Abstimmungsbedarf.

    In turbulenten Zeiten wie diesen ist für Sie und Ihre Lieferanten Liquidität entscheidend - Cash is King.

    Die Frage lautet also
    "Gibt es neue, effektivere Wege Ihre Lieferkette mit Liquidität zu versorgen?"

    Die Antwort ist einfacher als gedacht - und es ist mehr als angeraten sich damit auseinander zu setzen.

    Mit diesem Webinar werden wir Ihnen die Schritte aufzeigen, mit denen Sie sicherstellen, dass...

    1) Ihre Lieferkette belastbar bleibt
    2) Ihre operativen Bereiche die aktuelle Mehrbelastung bewältigen können
    3) die Liquidität Ihrer Lieferanten sichergestellt werden kann, bei gleichzeitiger Verbesserung Ihrer eigenen Working Capital Position.
  • Getting Back to Business: HR Tools to Help You Return to Work Safely
    Getting Back to Business: HR Tools to Help You Return to Work Safely
    Coretha M. Rushing Executive Coach with Merryck & Company, HR consultant & David Thomas, CEO with Evident Recorded: May 27 2020 67 mins
    Human resources professionals are understandably feeling a lot of pressure these days.

    The disappointing reality is that the coronavirus will still exist after the quarantine period officially ends and HR professionals aren't finding a lot of guidance on making important decisions on how to get back to business while also keeping their employees healthy and informed, and their businesses stable.

    In this webcast, HR consultant and executive coach Coretha Rushing will provide answers to the most common questions that HR professionals have around COVID-19 business continuity and recovery. She'll also walk through strategies for daily employee health monitoring and discuss the importance of collecting health data responsibly so as not to violate employee privacy rights. Rushing will also discuss new HR technology innovations that are being introduced to help people get back to work safely.
  • Data and Machine Learning in Financial Fraud Prevention
    Data and Machine Learning in Financial Fraud Prevention
    Kayla Hartman, Data Analyst, Alloy Recorded: May 27 2020 34 mins
    According to Capgemini’s World Payments Report 2017, global digital payments are expected to rise to roughly 726 billion transactions in 2020. The growth of digital financial services offers innumerable opportunities, expanding access to financial services products and allowing for essentially instantaneous feedback loops. With these opportunities, however, also come risks, including fraud. The threat of fraud requires financial services organizations to act proactively to minimize losses due to fraud. Analysis of data surrounding their customers and transactions is an essential effort to ensure the benefits of the digital payments space continue to outweigh the risks.

    In this webinar, Kayla Hartman will discuss the various ways data is used in fraud prevention. As a Data Analyst at Alloy, a fintech company that provides identity verification APIs for clients’ KYC (know your customer) and AML (anti-money laundering), she has firsthand experience in enhancing fraud prevention efforts through data analysis. She will dive into the ways the use of data is currently advantageous to fraud prevention, as well as the challenges that are presented in this quickly changing space.
  • Tausend mal kollaboriert – tausend mal ist nichts passiert
    Tausend mal kollaboriert – tausend mal ist nichts passiert
    Marc Müller, Territory Account Manager & Max Bode, Senior Sales Engineer Recorded: May 27 2020 40 mins
    Tausend mal kollaboriert – tausend mal ist nichts passiert
    Phishing-Mails in aufregenden Zeiten

    Während der frühen Tage der Corona-Krise mussten wir uns alle an neue Situationen anpassen. Schulen wurden geschlossen und viele Firmen haben Ihre Mitarbeiter ins Homeoffice geschickt. In dieser Zeit wurden Videokonferenzplattformen und Collaboration-Lösungen zu einem vertrauten Wegbegleiter. Doch dieses Vertrauen wird auch ausgenutzt.

    Bereits Ende März wurden fast 2000 Webdomains neureigistriert, die in direktem Zusammenhang zu Collaboration-Lösungen stehen. Einige davon weisen bereits „bösartige Charakteristiken“ auf und wurden zum Versand von Phishing-Emails genutzt.

    Haben wir in den vergangenen Wochen darauf geachtet, wer der wirkliche Absender der „Einladung“ zur Videokonferenz mit Kollegen, Mitschülern, Freunden oder Familie war?
    Phishing-Emails sind und bleiben das Haupteinfallstor für Angreifer.

    Erfahren Sie mehr, wie FireEye Email Security helfen kann, daß es bei der tausendundersten Mail nicht doch „Zoom“ macht.
  • Predicting Customer Behavior with Amazon SageMaker Studio
    Predicting Customer Behavior with Amazon SageMaker Studio
    Eric Miller, Senior Director, Customer Solution Architecture, Onica, a Rackspace Company Recorded: May 26 2020 34 mins
    The power of machine learning allows us to produce actionable insights with our data and streamline decision making, but it can be challenging to manage ML development workflow due to a lack of advanced ML tooling. Learn how you can leverage Amazon SageMaker Studio, a fully integrated development environment for ML in AWS, to easily and quickly build machine learning models under a convenient and intuitive single pane of glass. We’ll explore the Amazon SageMaker Studio service and discuss how the integrated visual interface manages workflow in order to build, train, and deploy machine learning models at scale.

    What we’ll cover:
    - An introduction to Amazon SageMaker Studio
    - Core features such as SageMaker Studio Notebooks, Autopilot and Experiments
    - How to enable and create your own Amazon SageMaker experiments
    - How to engineer features, tune models and obtain data for analysis
  • Growth Strategy - Growing Your Business Post Lockdown
    Growth Strategy - Growing Your Business Post Lockdown
    John Courtney, non-executive, board advisor and entrepreneur Recorded: May 26 2020 41 mins
    In the third webinar of our COVID-19 series, non-executive, board advisor and serial entrepreneur John Courtney will look to how businesses can grow once the global lockdown has eased.

    With many businesses focussed on firefighting the problems created by the pandemic in the present, it can be easy to overlook the need to consider the future.
    Join John at 5pm on 26th May for his webinar ‘Growth Strategy - growing the business post lockdown’ to understand how to address market gaps left by the economic downturn and understand newly emerging customer needs.

    John will also explore how to communicate with stakeholders and generate custom in a what will be a vastly different business world.
  • 5 Reasons Why Consumer Models Don't Work for B2B Subscription Commerce
    5 Reasons Why Consumer Models Don't Work for B2B Subscription Commerce
    Emmanuel Bertolin, SVP and General Manager of Provider Services, AppDirect and Laura Stevenson, Senior Director, AppDirect Recorded: May 26 2020 50 mins
    Today, chances are good that you’re part of the consumer subscription economy. Maybe you have an Amazon Prime account, stream Hulu, or listen to your favorite songs on Spotify. But selling, implementing, and managing recurring B2B digital products is entirely different than selling simple subscriptions to consumers.

    In this webinar, Emanuel "Bert" Bertolin, AppDirect's Senior Vice President and General Manager of Provider Services, will give an overview of B2B subscription commerce. He will also detail five key reasons why a consumer subscription playbook won't work for businesses. Specifically, he'll cover how B2B subscriptions are:

    - More complex and multi-dimensional
    - Need more sales assistance
    - Often include the channel
    - Require seamless integration
    - Must accommodate a range of payment options

    Attendees will come away with a better understanding of how to adapt to these differences and succeed in the new world of B2B subscription commerce.
  • Managing Digital Adoption: Banking & Payments in a Contactless World
    Managing Digital Adoption: Banking & Payments in a Contactless World
    Dr. Louise Beaumont | Simon Cureton, Funding Options | Matt Phillips, Diebold Nixdorf | Ioannis Mallios, Profile Software Recorded: May 26 2020 61 mins
    A discussion on open banking, the accelerating need for mobile and contactless payments, and how the ecosystem is being disrupted by COVID-19.
  • BROKING ON THE MOVE – YOUR  FUTURE HAS BEEN ACCELERATED. NOW WHAT?
    BROKING ON THE MOVE – YOUR FUTURE HAS BEEN ACCELERATED. NOW WHAT?
    Matthew Grant, Partner Instech London; Chris Carney, Verticalised Consulting; Nick Haldane, Novidea UK; Keith Bucknall, SRG Recorded: May 26 2020 46 mins
    Whether it is online banking, Amazon delivery or in the last couple of months, ease of setting up digital calls, everyone is expecting immediate, on-demand service in everything they do. Insurance brokers are now being expected to provide a similar, high-quality rapid response to inquiries.

    We believe recent events have become the catalyst that will bring the change that our industry has needed for years: to give brokers the ability to service their clients seamlessly from anywhere, at any time.

    In this Live Chat, Matthew Grant of InsTech London, Nick Haldane of Novidea, Keith Bucknall of SRG, and Chris Carney of Verticalised Consulting will discuss:

    - How brokers are using a client-centric data strategy to grow their business
    - An example of how SRG is already implementing the future of broking
    - How the work Novidea is doing with its broking clients fits with Lloyd's Blueprint One
    - How cloud-based platforms are reshaping our industry
    - The competitive advantages of broking on the move

    Join us for our live chat to understand how a data-first platform can help you become a broker of the future today.
  • Виртуализация Данных: Введение
    Виртуализация Данных: Введение
    Алексей Сидоров, Главный Евангелист и Директор по управлению данными, Denodo Recorded: May 26 2020 59 mins
    В нашу эпоху головокружительных достижений в области искусственного интеллекта, облачных вычислений и передовой аналитики, как ни странно, многие организации по-прежнему полагаются на архитектуры данных, построенные в прошлом веке.
    Однако, ситуация быстро меняется с ростом применения виртуализации данных в реальном времени для обеспечения безопасного, логического доступа к информации. Данный подход позволяет отказаться от физической трансформации и перемещения данных в хранилище, прежде чем они могут быть использованы бизнесом.

    Посетите этот новый вебинар на русском языке, чтобы узнать:
    - Что такое виртуализация данных?
    - Чем данный подход отличается от других корпоративных технологий интеграции данных, таких как ETL
    - Почему крупнейшие организации используют виртуализацию в масштабах всего предприятия

    Узнайте больше о проблемах интеграции данных, решаемых с помощью виртуализации и вариантах применения этой динамично развивающейся технологии.
  • How do you gain cyber assurance?
    How do you gain cyber assurance?
    Katherine Demidecka, Strategic Mandiant Consultant, FireEye Recorded: May 26 2020 41 mins
    This webinar will discuss how an organisation can gain assurance that it is prepared to defend against and respond to a cyber incident. The following key topics will be covered:

    •Securing your environment proportionate to the risk
    •Readiness to identify and respond to an attacker's presence quickly
    •Testing your defences and response plans through simulated attacks
  • Have no Fear, Security Automation is Here
    Have no Fear, Security Automation is Here
    Sydney Coffaro, InsightConnect Product Specialist May 28 2020 9:00 pm UTC 25 mins
    Security automation is a hot topic today, as security teams are looking to effectively leverage technology to make their security operations run more smoothly. With automation all the rage, comments like “we should be automating more” are becoming an ongoing theme. Dedicating time and resources to implement automation is often viewed as a huge level of effort, but adding automation to your most time-intensive security processes doesn’t have to be an intimidating undertaking. Did you know that with a small investment, you can realize tremendous ROI and value from automation, faster than ever before?

    In this demo of InsightConnect, you will learn about:
    1. Overview of automation workflow building blocks
    2. Real use cases teams struggle with today, including phishing, SIEM investigation and response, patching, and more
    3. How you can integrate security automation and orchestration into your existing SecOps programs
    4. How automation will improve efficiency across the processes and tools you’re executing manually today
  • New normal for Wealth Managers: Engaging customers and communicating effectively
    New normal for Wealth Managers: Engaging customers and communicating effectively
    Jaime Bolivar | Begoña Rubio | Javier Carrallo | TechRules May 29 2020 8:00 am UTC 60 mins
    This webinar will cover the following areas:
    Digital Wealth Management and customer centric solutions
    Artificial Intelligence: emerging new combinations of science and human based advisory models
    How to cover regulation with technology easily
    Client expectations, no static info anymore, personalizing experiences
    Empower partners to achieve goals

    Presented by:
    Jaime Bolivar, Managing Director TechRules | Bergoña Rubio, International Partners & Marketing Director, TechRules | Javier Carrallo, Sales Development Manager, TechRules
  • Operation Efficiency vs Regulatory Precision – Are the Two Mutually Exclusive?
    Operation Efficiency vs Regulatory Precision – Are the Two Mutually Exclusive?
    Sarah Peaston, Director, Regulatory Governance Consulting Limited May 29 2020 10:00 am UTC 60 mins
    Post trade execution operations’ processing flows have experienced a technology evolution over the past two decades and have been significantly streamlined, often to the lowest common denominator. When we consider this against the often highly intricate regulatory processing requirements, what do we find?

    During this session we will consider:
    − Operational processing efficiencies
    − Regulatory precision requirements
    − Whether the two strategies crossover and easily co-exist
    or
    − Whether operational efficiency and regulatory precision are mutually exclusive?
  • Continuous Audit - Achieve More Through Analytics
    Continuous Audit - Achieve More Through Analytics
    Greg Jordan (Nationwide), Pat Shanahan (Nationwide), Emigdio Zambada (Nationwide), and Brian Sampsel (Covail) May 29 2020 1:00 pm UTC 60 mins
    In honor of International Internal Audit Awareness Month (May 2020), come hear from Greg Jordan, Nationwide's Senior Vice President and Chief Audit Executive, Pat Shanahan, AVP Information Technology Audit Office, Internal Audit and Emigdio Zambada, Nationwide's IA Data Analytics Director, discuss how their department expanded the use of data & analytics by building a continuous auditing program in the cloud. Partnering with Covail, they leveraged advanced analytics like AI and have provided education and resources to all of their auditors to enhance their data analytics skill set.
  • Regulatory Reporting and Credit Risk Management on the Buy-Side
    Regulatory Reporting and Credit Risk Management on the Buy-Side
    Elena Kozhemyakina, Fintech4Funds | Igor Tesinsky, intelliBONDS | Parag Samarth, Magic Finserv May 29 2020 3:00 pm UTC 60 mins
    Regulatory Reporting and Credit Risk Management on the Buy-Side: How FinTech Can Assist with Upcoming Challenges

    Over the past 3-4 years the avalanche of new Regulations has exceeded all our expectations and created a new challenging environment for market participants. EMIR, MIFIDII, the upcoming SFTR and other Regulations all require both buy and sell side clients to report to regulators in a timely manner. Banks and other larger institutions have faced these challenges by dramatically increasing their Compliance, Operations and IT departments and introducing a lot of manual work arounds while they were developing internal technical solutions that allowed them to automate the processes and meet new criteria. Buy-Side clients, especially the small to medium sized ones, have never had the luxury of expanding their compliance personnel nor did they have budgets to develop solutions internally. Order Management Systems Providers were not able to respond from their side on time and those of them that were not CLOUD based had to spend months developing new upgraded versions. However, each upgrade of the systems needs to be integrated separately into the environments of individual clients. As a result, smaller clients are suffering at the expense of larger buy-side clients who bring the larger contracts and cash flows to the Providers.
  • How Will Drupal 9 Enable My Site For The Future?
    How Will Drupal 9 Enable My Site For The Future?
    Dries Buytaert, Angie Byron, Gábor Hojtsy, Tim Lehnen Jun 1 2020 2:00 pm UTC 63 mins
    June 3rd, 2020 marks the launch date of the highly-anticipated release of Drupal 9 within the Drupal community.

    As with any major release of a new version of Drupal, this prompts many questions. "What will change from Drupal 8 to Drupal 9?", "What experience can I expect with Drupal 9?" and "How do I prepare my site today?" Whether you are on Drupal 6, Drupal 7 or Drupal 8, we have answers for you.

    Watch Dries Buytaert, the Founder of Drupal and Acquia’s Co-Founder & CTO, alongside Drupal experts Angela Byron & Gábor Hojtsy as they share insights on how to prepare for the release of Drupal 9, followed by an audience Q&A session moderated by Tim Lehnen, Drupal Association’s CTO.

    In this session, you’ll learn:
    - What to expect from Drupal 9
    - How you can prepare your site, whether you’re on Drupal 8 or previous versions of Drupal
    - The resources and tools available to make the upgrade as seamless as possible
    - What you can expect from the Drupal 9 experience and the benefits of upgrading
  • Why You Should Have Zero Trust in the Web
    Why You Should Have Zero Trust in the Web
    Menlo Security Jun 2 2020 2:00 am UTC 38 mins
    "Trusted” Websites Are Not as Safe as First Thought!

    Today, attackers leverage the web’s ubiquity and users’ trust to infect devices and propagate malware. Website categorization has been compromised. Phishing and spear-phishing attacks drive today’s most significant data breaches, and clicking on apparently legitimate links within phishing emails exposes users to credential theft or malware infections, and possibly ransomware. “Trusted” websites are not as safe as first thought, and the list goes on.

    Whether users are accessing it for business or pleasure, the Internet today is no longer a place that can be trusted.

    Watch this webinar to learn how you can protect your users and lower your odds of a web-borne, companywide cyberattack.

    Discover:

    - Why the internet remains a dangerous place
    - Best practices for lowering the odds of a cyberattack
    - Newer technologies that are solving this problem
  • Ada Apa dengan Virtualisasi Data? Mengenal Lebih dekat. (Bahasa Indonesia)
    Ada Apa dengan Virtualisasi Data? Mengenal Lebih dekat. (Bahasa Indonesia)
    Jimmy Rekso, Head of Data and Technology Dept - Berca and Alex Hoehl, Senior Director – Denodo Jun 2 2020 3:00 am UTC 60 mins
    Virtualisasi Data atau Data Virtualization berevolusi menjadi data fabric enterprise yang real-time dan agile. Virtualisasi Data terbukti berkembang melebihi apa yang dijanjikan dan menjadi salah satu enterprise big data fabric yang paling penting saat ini.

    Dalam sesi yang anda ikuti, anda akan belajar mengenai:
    *Apa sebenarnya Virtualisasi Data?
    *Bagaimana membedakannya dengan teknologi data integrasi yang lain?
    *Mengapa Virtualisasi Data mampu Mendapatkan penanaman skala besar di dalam beberapa organisasi terbesar?
  • How to maintain cyber hygiene - from root cause to solution
    How to maintain cyber hygiene - from root cause to solution
    David Grout, CTO, EMEA, FireEye Jun 2 2020 9:00 am UTC 45 mins
    In today's ever-changing threat landscape, it is more important than ever to use a cyber hygiene routine to help prevent hackers, intelligent malware, and advanced viruses from accessing and corrupting your company's data.

    How do validate that your cyber strategy is as watertight as it could be. In this webinar you will learn about FireEye Mandiant solutions to efficiently help you maintain an on-going process to combat configuration drift, effective control, rationalisation and optimisation.
  • What's Next for NOTIFIER?  CONNECT. PROTECT. INSPIRE.
    What's Next for NOTIFIER? CONNECT. PROTECT. INSPIRE.
    Tom Leightley Jun 2 2020 9:00 am UTC 90 mins
    INSPIRE, the Next Generation of Connected Fire Safety Systems. This webinar provides a short introduction to the latest product development from NOTIFIER by Honeywell.
    INSPIRE is a ground breaking new Connected Fire Alarm Control platform designed around years of customer feedback and integrated with Honeywell's powerful cloud based connectivity tools.
  • 10 Ways To Accelerate Your Sales Funnel
    10 Ways To Accelerate Your Sales Funnel
    Sales Funnel Advisory Specialist Peter Strohkorb Jun 2 2020 11:00 pm UTC 52 mins
    If you are in Sales then you have a Sales Funnel. Just how effective is it? How can it be streamlined and accelerated for growth?
    In this webinar, Sales Funnel Specialist Peter Strohkorb will present and explain the 10 ways you can streamline and accelerate your Sales Funnel.
    Peter will leave time for your Q&A and he will make you an unbelievable and complimentary offer at the end of the webinar.
    HIGHLY RECOMMENDED
    Register now, or miss out.
  • 2020 Threat Report
    2020 Threat Report
    Wade Woolwine, Prin. Threat Intelligence Researcher; Kwan Lin, Prin. Data Scientist; Tod Beardsley, Research Director Jun 3 2020 1:00 am UTC 54 mins
    At Rapid7, we’re obsessed with giving our customers, prospects, and the industry as a whole the knowledge, tools, and telemetry to achieve positive outcomes within their security programs.

    In our latest threat telemetry data analysis we look at how internet-exposed systems and valid accounts are being targeted by attackers and provide recommendations to mitigate and remediate these threats.

    We also cover how to measure and improve how external attackers see your organization with respect to what systems and services are available on the internet, discuss the importance of account security through multi-factor authentication, password complexity requirements and more.

    Tune in as our research team provides you with the insight needed to help you prioritize these threats and safeguard your employees and business.
  • Advanced Analytics and Machine Learning with Data Virtualization
    Advanced Analytics and Machine Learning with Data Virtualization
    Alexey Sidorov - Chief Evangelist Middle East Jun 3 2020 7:00 am UTC 75 mins
    Advanced data science techniques, like machine learning, have proven an extremely useful tool to derive valuable insights from existing data. Platforms like Spark, and complex libraries for R, Python and Scala put advanced techniques at the fingertips of the data scientists. However, these data scientists spent most of their time looking for the right data and massaging it into a usable format. Data virtualization offers a new alternative to address these issues in a more efficient and agile way.
    Attend this webinar and learn:

    • How data virtualization can accelerate data acquisition and massaging, providing the data scientist with a powerful tool to complement their practice
    • How popular tools from the data science ecosystem: Spark, Python, Zeppelin, Jupyter, etc. integrate with Denodo
    • How you can use the Denodo Platform with large data volumes in an efficient way
    • About the success of one of our clients has had as a result of seasoning the Machine Learning and Blockchain Landscape with data virtualization
  • A Single Customer View Starts with a CDP: Meet AgilOne
    A Single Customer View Starts with a CDP: Meet AgilOne
    Omer Artun Founder and CEO, AgilOne Chief Science Officer, Acquia Jun 3 2020 10:00 am UTC 57 mins
    Marketers have it easy, right? Flush with piles of customer data, it should be simple to know exactly who your prospects and customers are, target them with the perfect message, and grow your revenue from the data you own.

    But it's not.

    There is more data than ever before, but marketers struggle to know the most basic details of their customers:
    -96% of marketers are challenged in building a comprehensive, single view of the customers
    -40% of marketers are unable to personalize because of the inability to link data across disparate technologies

    It doesn’t have to be this hard.

    Watch Acquia’s AgilOne webinar to learn how you can use machine learning to unlock siloed data and gain a single view of your customers.
  • Résultats du rapport Mandiant 2020 sur l'efficacité de la sécurité
    Résultats du rapport Mandiant 2020 sur l'efficacité de la sécurité
    David Grout, CTO, EMEA, FireEye Jun 3 2020 12:30 pm UTC 60 mins
    Résultats du rapport Mandiant 2020 sur l'efficacité de la sécurité : une plongée dans la réalité

    Participez à notre webinaire pour comprendre pourquoi la plupart des attaques testées continuent d’infiltrer les environnements d'entreprise sans être détectées et pourquoi la validation de la sécurité est si critique.
    Les résultats du Rapport sont préoccupants : les contrôles de sécurité ne fonctionnent pas comme prévu.
    Le constat qui en ressort et ce à travers des milliers de tests effectués par des experts de l'équipe Mandiant Security Validation (anciennement Verodin) est que pour 53% des environnements testés, les attaques ont réussi à contourner les contrôles en place. C'est pourquoi la validation continue de la sécurité devient aujourd’hui une tâche critique pour une protection efficace des environnements IT et OT.

    Rejoignez David Grout, CTO, EMEA, FireEye, pour notre prochain webinaire afin de découvrir les fondements de la validation de la sécurité et d’acquérir des connaissances pour répondre à des questions telles que :

    - Ai-je confiance dans l'efficacité de mes contrôles de sécurité ?
    - Puis-je évaluer rapidement la pertinence des informations sur les menaces ou l'exposition à la dernière attaque ?
    - Suis-je capable d'arrêter la perte de données et de protéger l'intégrité des données sur mon réseau ?
    - Comment simplifier et standardiser mon architecture de sécurité ?
    - Ai-je les bonnes éléments quantifiables pour communiquer les chiffres clés aux dirigeants de mon entreprise ?

    S’inscrire maintenant!
  • Resiliencia de Ciberseguridad OT en Edificios
    Resiliencia de Ciberseguridad OT en Edificios
    Ruben Moreno Diaz; Carlos Ivan Conde Martin Jun 3 2020 1:00 pm UTC 60 mins
    Históricamente los sistemas OT (Operational Technology) se han mantenido separados o aislados, considerando esta “desconexión” como una buena medida de seguridad, sin embargo esta opción ha dejado de ser viable en nuestro mundo conectado y la falta de visibilidad y monitorización de este tipo de entornos tiene el efecto contrario desde el punto de vista de ciberseguridad.
    Únete a nuestro próximo webinar para aprender con nuestros expertos en ciberseguridad OT cómo mejorar la estrategia organizativa, evitar potenciales brechas de seguridad y desarrollar una mentalidad de mejora continua de ciberseguridad.
  • [SANS Webinar] A Closer Look at Isolation: Hype or Next Gen Security?
    [SANS Webinar] A Closer Look at Isolation: Hype or Next Gen Security?
    Kowsik Guruswamy, CTO - Menlo Security & John Pescatore, Director of Emerging Technologies - SANS Institute Jun 3 2020 2:00 pm UTC 55 mins
    Hear insights from a Menlo Security customer, along with John Pescatore, Director of Emerging Technologies at SANS Institute, and Kowsik Guruswamy, Menlo Security CTO, as they explore why organizations around the globe are looking at isolation as the means to protect their users from the ever-present web and email dangers.

    In this webinar, we will dive Into:

    - The shortcomings of today’s reactive security philosophy
    - Why the web continues to present a risk to businesses
    - The benefits of embracing Isolation
    - How organizations should rethink their security strategy moving forward

    Register now to discover the world of Isolation from different viewpoints.
  • Strategies for Improving Cash Flow and Strengthening Accounts Receivable (AR)
    Strategies for Improving Cash Flow and Strengthening Accounts Receivable (AR)
    Eduardo Lopez, Paystand Jun 3 2020 5:00 pm UTC 30 mins
    Companies are working hard to navigate the business challenges COVID-19 has created. Revenue targets are being reassessed, work environments are changing, and finance teams are looking for ways to operate faster, leaner, and more efficiently to address both short and long-term sustainability.

    During these times, it's critical for businesses to focus on expediting payment collection and managing cash flow more effectively. This is a key business success factor at any time, but it’s especially important during an economic crisis.

    Join us for our webinar on "15 Strategies for Improving Cash Flow and Strengthening Accounts Receivable (AR)". You'll learn how to gain control over delayed payments and leave with actionable tips on short and long-term cash flow solutions for your business.
  • Secure Internet: First and Only Security Cloud Built on an Isolation Core™
    Secure Internet: First and Only Security Cloud Built on an Isolation Core™
    James Locus, Sr. Product Marketing Manager - Menlo Security Jun 4 2020 2:00 am UTC 15 mins
    Cloud transformation is happening, and users need secure and reliable access to SaaS platforms, web apps, and rich-media websites—wherever business takes them. The Secure Internet product suite with an Isolation Core™ provides protection for web-based threats to deliver secure web access without impacting performance or changing the native web browsing experience.
  • System Sensor Detection from Morley-IAS
    System Sensor Detection from Morley-IAS
    Mark Piert Jun 4 2020 9:00 am UTC 90 mins
    System Sensor is the world’s largest manufacturer of intelligent and conventional detection devices for commercial fire & security applications, with 20 million devices shipped annually across the world.
    Here in the UK, the benefits of System Sensor's portfolio for advanced detection are not widely known; Find out about System Sensors's fast, reliable, intelligent detection from ASD, Beams, Wireless and Addressable devices to a comprehensive range of Conventional devices.
  • Gefährliche Fehleinschätzung der eigenen Sicherheit
    Gefährliche Fehleinschätzung der eigenen Sicherheit
    Christian Husemeyer, Solutions Architect EMEA, FireEye Jun 4 2020 9:00 am UTC 60 mins
    Gefährliche Fehleinschätzung der eigenen Sicherheit
    53% aller Angriffe bleiben unbemerkt!

    FireEye hat für mehr als 100 Unternehmen aus 11 Branchen überprüft, welches Sicherheitsniveau diese durch ihre aktuell implementierten Prozesse und Sicherheits-Produkte erreicht haben. Die mit Hilfe der Mandiant Security Validation Lösung (vormals Verodin) ermittelten Ergebnissen waren erschreckend:
    -Von mehreren tausend durchgeführten Angriffen sind nur 33% geblockt worden
    -Weitere 14% wurden erkannt, aber nicht geblockt
    -Bedeutet: In 53% der Fälle wären Angreifer erfolgreich und unerkannt eingedrungen!
    -Von all diesen Angriffen haben nur 9% einen Alarm in SIEM oder SOAR generiert
    Diese Ergebnisse zeigen deutlich, dass sich ein Großteil aller Unternehmen vermutlich in falscher Sicherheit wiegt, da die über Jahre oder Jahrzente aufgebauten Sicherheits-Technologien und -Prozesse
    nur unzureichenden Schutz gegen Angriffe auf ihre wichtigsten Daten und Ressourcen bieten, als bisher vermutet oder erhofft.

    Dieses Webinar gibt Ihnen Einblick, wie sie ihre technischen und organisatorischen Sicherheitsmechanismen unter absolut realistischen Bedingungen prüfen und optimieren können.
  • Comply Stay Alive
    Comply Stay Alive
    Stuart Brown Jun 4 2020 12:00 pm UTC 90 mins
    ‘Comply, Stay Alive!’ An eye-opening CPD which focuses on a real life fatal fire incident in a care home. Explore what went wrong and gain knowledge of how the latest standards and fire technology is being implemented to prevent similar tragedies.

    Comply, Stay Alive! is accredited by CPD UK and CIBSE.
  • Mandiant Security Validation: verifica la tua sicurezza, niente presupposti
    Mandiant Security Validation: verifica la tua sicurezza, niente presupposti
    Gabriele Zanoni, Solution Architect, EMEA, FireEye Jun 4 2020 12:30 pm UTC 60 mins
    Mandiant Security Validation: verifica la tua sicurezza, niente presupposti, solo evidenze. NEW Report Security Effectiveness.

    Il Webinar “Mandiant Security Validation: verifica la tua sicurezza, niente presupposti, solo evidenze” fa parte di una serie di incontri settimanali intitolati: #FireEyeCyberTalks. Si terranno ogni giovedì, dal 21 maggio al 18 giugno, e ti offriranno contenuti stimolanti e approfondimenti da parte dei nostri esperti.

    Mandiant Security Validation è una tecnologia di “Security Instrumentation” che fornisce evidenze per verificare gli investimenti effettuati in Security.
    La security è spesso basata su presupposti come:
    •si ritiene che le tecnologie funzionino come descritte in fase di acquisizione;
    •si ritiene che i prodotti siano installati, configurati e mantenuti nel tempo in modo corretto;
    •si ritiene che le persone o i partner gestiscano allarmi e processi come stabilito;
    •si ritiene che i cambiamenti nell’infrastruttura e nella security siano compresi, comunicati e implementati in modo corretto.
    Come nel settore della availabilty si fanno test per verificare backup e restore, così Mandiant Security Validation mette alla prova i sistemi disicurezza (SIEM, FW,Proxy, Endpoint, Email, DLP, Cloud etc..) e ne suggerisce l’eventuale remediation.
    Questa tecnologia permette di dimostrare la bontà degli investimenti fatti in sicurezza e di massimizzare il risultato degli investimenti.
    Il risultato è di estremo interesse per i SOC Manager, i CISO e per il Board.
    Inoltre, in anteprima, forniremo i risultati del Report “Mandiant Security Effectiveness Report 2020”. Scopri come continuare a migliorare i tuoi processi e la tua tecnologia; stai al passo con lo scenario delle minacce cyber in costante evoluzione.

    Prenota il tuo posto oggi #FireEyeCyberTalks
  • How signNow is Helping Businesses in a Distributed World
    How signNow is Helping Businesses in a Distributed World
    Cory McCullough, AppDirect and Scott Owen, signNow and Christian Parkourana, signNow Jun 4 2020 3:00 pm UTC 30 mins
    Join AppDirect and signNow to hear how they are helping businesses succeed amid the current COVID-19 environment. Learn firsthand how your customers can increase productivity, maximize ROI, and save money by adding signNow to your marketplace. signNow will also touch on their digital strategy, and how they support and enable partners to be successful in selling their solutions.
  • Build a Best In Class  Data Lake
    Build a Best In Class Data Lake
    Lucio Daza, Scott Gay Jun 4 2020 6:00 pm UTC 36 mins
    We have identified the best practices for building a best-in-class data lake. In this webinar, we will explore, advantages of cloud data lakes; Major challenges when building a data lake on the cloud; What a modern data architecture looks like and how to best implement it; How different industries leverage these best practices in real-world scenarios