Hi [[ session.user.profile.firstName ]]

CxO Strategy

  • Five Secrets to On-Prem Kubernetes for Real World Enterprise IT Needs
    Five Secrets to On-Prem Kubernetes for Real World Enterprise IT Needs
    David Linthicum, John Mao Recorded: Jun 21 2019 56 mins
    This free 1-hour webinar from GigaOm Research brings together experts in Kubernetes on-prem ops success, featuring GigaOm Analyst David Linthicum and special guest John Mao, VP Business Development from Stratoscale.

    You don’t have to read all of the analyst surveys to understand that Kubernetes usage is accelerating in 2019. Indeed, while the growth in the cloud is exceptional, the growth in leveraging Kubernetes on premises is just as impressive.

    However, many enterprises with a need to deploy Kubernetes in their data center are left out in the cold. Tools that focus on Kubernetes on-prem don’t provide the value IT is expecting, and thus their Kubernetes on-prem ops are at risk of failing.

    Enter new tools and approaches that can ensure success. Moreover, enter in new guidance that allows leaders to approach the problem armed with the right knowledge.

    Indeed, five core secrets exist to approach on-prem ops, including, deployment, monitoring, security, upgrading, and of course scaling.

    In this 1-hour webinar, we will explore:

    • Why approaches to Kubernetes success are changing.
    • Emerging best practices and technology.
    • Five secrets of Kubernetes enabling containers orchestration that most enterprises and cloud providers need for success
    •Must-know keys to enabling successful technology
  • On-Ramps to Cloud Roadways: Cloud Data Migration at Scale
    On-Ramps to Cloud Roadways: Cloud Data Migration at Scale
    Andrew Brust, Jagane Sundar Recorded: Jun 20 2019 62 mins
    Cloud adoption is in full swing, no longer dominated by hype and just a few early adopters. In the world of data analytics, migrating data from on-premises distributed storage systems to cloud object storage is the mission. Once the data has landed there, multiple data services can query and analyze it. The payoff can be huge, but the devil’s in the details.

    While the problem of migrating applications to the cloud has largely been solved, migrating data is much less straightforward. Today’s enterprise data volumes can be quite large, resulting in long-running data migration processes. Enterprises can’t just hit pause on their businesses, though. So how can they maintain operational continuity while conducting lengthy migrations?

    To learn more about cloud data migration challenges and solutions, join us for this free 1-hour webinar from GigaOm Research. The webinar features GigaOm analyst Andrew Brust and special guest Jagane Sundar from WANdisco, a leader in cloud data movement and hybrid data lake solutions.

    In this 1-hour webinar, you will discover:

    How to migrate Hadoop clusters at scale
    The realities of cloud data migration management
    The multi-data-engine benefits of cloud data lakes
    Register now to join GigaOm and WANdisco for this free expert webinar.

    Who Should Attend:

    CTOs
    Chief Data Officers
    Cloud Architects
    Data Engineers
    Database Administrators (DBAs)
  • Perfect Partners: DevOps and Hybrid Cloud
    Perfect Partners: DevOps and Hybrid Cloud
    jon Collins, Chris Merz, Ingo Fuchs Recorded: Jun 20 2019 62 mins
    This free 1-hour webinar from GigaOm Research brings together experts in DevOps and Hybrid Cloud, featuring GigaOm Jon Collins and special guests from NetApp, Ingo Fuchs, Chief Technologist, Cloud and DevOps, and Chris Merz, Principal Technologist, DevOps. The discussion will focus on delivering DevOps and the challenges faced when adopting this culture.

    Not only do organizations find it challenging to scale DevOps practices across the business, it’s also hard to keep pace with the fast, real-time needs of application development. As companies face the reality of the pace required for software development, they’re simultaneously challenged to balance quality and security, governance and management, complexity and collaboration, and they require an agile storage strategy to allow them to pivot as needs change.

    Should such organizations just go back to waterfall models and single-server, three-layer architectures? Of course not. The right approach allows them to pick and choose the right infrastructure, whether it be in the cloud, or on-premises, to deliver the right solutions for their business needs - all without affecting their developer experience. In this webinar, we talk to NetApp, itself a large enterprise using both DevOps and hybrid multi-cloud strategy, about lessons learned from helping customers towards this goal.

    In this 1-hour webinar, attendees will discover:

    • The challenges faced by organizations looking to adopt DevOps
    • What this means in terms of symptoms, costs, efficiency and effectiveness impacts
    • Best practices for supporting software development
    •What tools, technologies, and processes enable DevOps to exist, no matter your storage strategy
    •How to choose the right infrastructure for your strategy
  • Strategies for the Data Warehouse in the Enterprise Today
    Strategies for the Data Warehouse in the Enterprise Today
    William McKnight, Paige Roberts Recorded: Jun 20 2019 61 mins
    This free 1-hour webinar from GigaOm Research brings together experts in modern uses of data warehousing. Featuring GigaOm Analyst William McKnight and a special guest from Vertica, Paige Roberts, the presentation will focus on strategies enterprises should be undertaking today for evolving data warehouse ecosystems.

    Despite the allure and utility of other analytic data constructs, enterprises continue to invest the most in, and get tremendous benefit from, great data warehouses. The data warehouse is still the key component of the actionable analytic future. However, the data warehouse of today is used differently, can accomplish new things, and requires different technical and business strategies to get the most out of it, than before.

    In this webinar, McKnight dives into the current state of data warehouse initiatives. He discusses how implementation realities of the last two decades have demonstrated the importance of the data warehouse, and why enterprise leaders must think differently about data warehousing as a whole.

    In this 1-hour webinar, attendees will discover:

    • The state of the data warehouse today and strategies to maximize the return on data warehouse investments of 2019 and beyond.
    • The flavors of the data warehouse and the criteria for ensuring your data warehouse(s) is up to standard
    • Key considerations when building a new data warehouse, evolving an existing data warehouse, or contemplating a re-platforming.
    •The continued relevance of data warehousing today
    •How to know when to put your data warehouse in contain mode
    •Ideas for data platform selection for a data warehouse
  • How FireEye Protects FireEye
    How FireEye Protects FireEye
    Matt Shelton, Director, Technology Risk & Threat Intelligence, FireEye Recorded: Jun 20 2019 60 mins
    FireEye relentlessly protects its customers. But who protects FireEye? Join us for an overview of how FireEye uses its own products and services to protect itself from the same threats faced by customers.

    In this webinar, Matt Shelton, FireEye Director of Technology Risk and Threat Intelligence, will reveal how FireEye:

    •Uses threat intelligence to proactively protect the organization
    •Detects threats using FireEye Network Security products
    •Responds to incidents with FireEye Endpoint Security
    •Leverages Helix as its security operations platform
    •Hunts for known and unknown threats within its environment.
  • Deploying Hyper-Converged Infrastructure (HCI) to Modernize IT
    Deploying Hyper-Converged Infrastructure (HCI) to Modernize IT
    Myank Gupta, Phil Sellers, Ray Lucchesi, Steve Ginsberg Recorded: Jun 20 2019 60 mins
    This free 1-hour webinar from GigaOm Research brings together experts in hyper-converged architecture (HCI) and data center infrastructure and administration to explore how enterprise leaders are using HCI to modernize data center infrastructure and prepare it for public cloud co-existence.

    Featuring, Mayank Gupta, Product Marketing Lead, Core HCI, at Nutanix, the discussion will be moderated by GigaOm Analyst Ray Lucchesi and includes GigaOm analysts, Phil Sellers and Steve Ginsberg. Many data center managers are struggling with infrastructure sprawl, adding servers and storage to address never-ending, application requirements. But for many, this is a symptom rather than a solution. Resource utilization is typically abysmal in most non-virtualized data centers. Modernizing a data center with HCI has the potential to drastically improve utilization, reduce complexity and provide a platform that can better co-exist with public cloud.

    In this 1-hour webinar, the team examines:

    • How employing HCI software-defined infrastructure can modernize the data center
    • How the use of HCI can increase resource utilization and reduce complexity across the data center.
    • How to build HCI in the data center and public cloud to co-exist with and support IT application needs.

    Participants will come away with a better appreciation of how HCI can help modernize the data center while at the same time improving utilization, reducing complexity and bringing about a data center better able to co-exist with public cloud.
  • Top 5 Cloud Security Myths Debunked
    Top 5 Cloud Security Myths Debunked
    Martin Holste, Cloud CTO, FireEye Recorded: Jun 20 2019 55 mins
    Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story.

    Join our webinar, which helps debunk several common myths that jeopardize your fast, secure, migration to the cloud:

    • The cloud is unsafe
    • My organization doesn’t use the cloud
    • My cloud provider will keep me secure
    • The cloud is just someone else’s computer
    • Advanced adversaries aren’t attacking the cloud

    You’ll also learn how to identify a trusted advisor for cloud migration so you can confidently take advantage of cloud advancements.


    Presented by: Martin Holste, Cloud CTO at FireEye
  • Help, my users have been hacked! What happened and how do I respond?
    Help, my users have been hacked! What happened and how do I respond?
    Vinoo Thomas, Product Line Manager, FireEye Recorded: Jun 20 2019 38 mins
    A Breach Investigation Scenario Leveraging FireEye Endpoint Security

    FireEye spends thousands of hours annually investigating the world’s most impactful security breaches - you don’t have to stand alone when this happens to you. In this webinar, we will use a real-life scenario to dive deeper into how breaches are discovered and importantly, what security lessons can be learned.

    Join FireEye’s Vinoo Thomas as we take a closer look at the discovery of credential harvesting and multiple compromised clients from a single compromised endpoint. Learn how investigation can be used to find and contain the impact of a breach in nearly any environment.
  • Unlocking the Hidden Business Benefits of Your Data with Data Virtualization
    Unlocking the Hidden Business Benefits of Your Data with Data Virtualization
    Rick van der Lans, Independent Analyst, R20/Consultancy & Paul Moxon, VP Data Architectures & Chief Evangelist, Denodo Recorded: Jun 20 2019 57 mins
    Digital transformation, the data economy, and becoming more data-driven are the current themes of boardroom discussions. Data is very valuable to organizations and their business users as long as it’s accessible, timely, consistent, trusted, adaptable and actionable, among a list of other things.

    However, most organizations are dealing with data silos. Data is hidden inside databases, data warehouses, excel spreadsheets, and files; and, it’s stored on‐premises and in private and public clouds, often times across the globe. Therefore, it is not only time-consuming but also very costly to locate the required data, extract it from the system, integrate it, and turn it into meaningful, consistent and trusted information.

    -How can you improve data delivery and extract value from your data?
    -How can you make your data available and actionable in real-time?
    -How are other organizations dealing with this data challenge?

    In this webinar, we will explore data virtualization as the solution that fulfills all modern requirements for data delivery by looking at various customer case studies. Our speakers will discuss the challenges that hold organizations back from accessing their data and becoming data-driven. By taking you through real use cases, they will demonstrate how data virtualization has helped multiple organizations address their data challenges and create significant business benefits.
  • A Review of Cyber Resilience -- Past, Present, and Future
    A Review of Cyber Resilience -- Past, Present, and Future
    Rob van der Ende, VP APJ, FireEye Mandiant & Naureen Rasul, Head of Cyber Practice Asia, Marsh Pacific Recorded: Jun 20 2019 45 mins
    Rapidly evolving threats and infiltration techniques have rendered traditional cyber defense strategies insufficient and ineffective. The emerging threat vectors and speed of change amplified by the digital transformation cannot be addressed by traditional means. Globally, laws are also changing to keep pace as cybercrime evolves, knowing no boundaries. Therefore, organizations must be nimble and agile to keep pace with policy changes, especially when expanding across different jurisdictions

    Join us as we discuss three strategic imperatives to strengthen cyber resilience:
    • Understand (know your threats) – Identify organization- and industry-specific cyber threats and regulations calls for robust strategies that include cross-disciplinary considerations.
    • Measure (know yourself) – Quantify the potential financial impact of cyber exposures to compare against the level of risk appetite acceptable to the board. This will determine the amount of investment necessary to mitigate and transfer any residual risk.
    • Manage (know what you can do) – Proactively manage cyber risks by having clear action plans based on your capabilities and capacities to protect against cyber criminals.

    While cyber-attacks are inevitable, proper preparation is the essential element that sets resilient organizations apart from the rest in managing risk, minimizing damage, and recovering quickly from any incidents.
  • The Cyber Skills Gap: A Practitioner’s Perspective
    The Cyber Skills Gap: A Practitioner’s Perspective
    Stanley Parret, Principal Consultant, FireEye Managed Defense Recorded: Jun 19 2019 52 mins
    The shortage of cybersecurity workers is a growing concern for the teams who are directly responsible for protecting the organization against cyber threats. It’s estimated that by 2021, 3.5 million cyber security positions will go unfilled.

    Join Stanley Parret, Principal Consultant for FireEye Managed Defense, for a look at the unforeseen challenges and consequences of the growing cyber skills gap, especially around protecting against advanced threats. In this webinar, we’ll discuss:

    -The impact of staffing shortages on security practitioners
    -How they’re being required to protect more with less
    -The options available to security teams who need to extend their capacity

    Register now for the webinar
  • How Google’s New Hybrid-Cloud Strategy Advancements Impact Stateful Workloads
    How Google’s New Hybrid-Cloud Strategy Advancements Impact Stateful Workloads
    David Linthicum, Radhesh Menon Recorded: Jun 19 2019 58 mins
    This free 1-hour webinar from GigaOm Research brings together experts in cloud computing, storage, containers, and hybrid cloud to discuss how Google’s recent hybrid-cloud strategy Anthos announcement at Google Next ’19 changes production outlook for your IT and DevOps teams.

    Featuring GigaOm Analyst, David Linthicum and a special guest from Robin.io, Radhesh Menon, this webinar will explore Google's Hybrid-Cloud strategy Cloud’s Anthos announced at Google Next, and how that technology can change your outlook on both development and ability to modernize Stateful applications.

    Storage for stateful containerized applications is a fundamental building block of applications on hybrid clouds, leveraging containers, container orchestration, and other parts of that emerging ecosystem. While the focus for container-based applications has been stateless, the ability to maintain state both within and between containerized applications has been a core requirement that DevOps and IT. Attend this webinar to take the mystery out of running stateful applications in containers and managing using Kubernetes with Google Cloud can enable hybrid- and multi-cloud strategy through its new solution, Anthos.

    In this 1-hour webinar, attendees will:

    • Better understand the state of the technology, and what container native storage solutions bring to modern IT.
    • Understand Google Hybrid and multi-cloud strategy and explore new solutions that have just been announced, that may change the game in how you build, deploy, and operate containers.
    • Learn how to hide complexity, while providing and maintaining richness of capability.
  • Simplifying Security Operations with ONE Platform
    Simplifying Security Operations with ONE Platform
    Ben Forster, Sr. Product Marketing Manager, FireEye Recorded: Jun 19 2019 53 mins
    Managing security operations is a challenge, and the technologies most organizations are using don’t provide the visibility, detection efficacy, or context they need. As their risk profile expands, organizations rely on hiring more analysts and purchasing more tools, often depending on manual processes to find and mitigate threats. The high volume of alert noise strains security teams’ resources and increases the probability they will miss an alert that matters. Organizations need a single solution that centralizes their security management, provides visibility, and allows them to quickly respond to threats with automation.

    In this webinar:
    - Understand the benefits of technology consolidation
    - Learn about what a single platform can do for your people and processes
    - Discover the untapped potential of your security investments
  • Uptime Institute Intelligence: The Critical Update - 2Q 2019
    Uptime Institute Intelligence: The Critical Update - 2Q 2019
    Andy Lawrence - Executive Director of Research, Rhonda Ascierto - VP of Research, Christopher Brown - Chief Technical Officer Recorded: Jun 19 2019 61 mins
    In this quarterly update webinar, Uptime Institute Intelligence and technology executives discuss developments in the field of mission-critical digital infrastructure. Among the topics are recent outages; cloud expenditure; fuel cells and datacenters; the technology “cold war”; and climate change and infrastructure.
  • The “Frontline-First” Approach to Digitization: What It Is and Why It’s Better?
    The “Frontline-First” Approach to Digitization: What It Is and Why It’s Better?
    Stowe Boyd, Kevin O'Donnell Recorded: Jun 19 2019 53 mins
    This free 1-hour webinar from GigaOm Research brings together experts in Digital Transformation, featuring GigaOm Stowe Boyd and a special guest from Nitro, Kevin O’Donnell, Director of Product. The discussion will focus on the “Frontline-First” approach to improving workflow management.

    Too often, enterprise change initiatives focus on technology, infrastructure, and process without considering the people and workflows that are the foundation of a company’s productivity.

    Those working on the frontline — in close contact with customers and a changing competitive marketplace — are best positioned and most likely to push for new ways to save time and increase efficiency so long as management lowers barriers to making improvements.

    In this 1-hour webinar, you will discover:

    • Benefits of empowering both frontline and back office workers with the tools to improve their paper-based workflows
    • Power of user analytics when attempting to drive measurable and lasting change
    • Success stories powering this new ‘Frontline-First’ approach to workflow improvement
  • Creating A Winning Digital Transformation Strategy
    Creating A Winning Digital Transformation Strategy
    Art Langer, David Linthicum, EJ Bodner AI, Artificial Intelligence, Internet of Things, Mobile, 5G, IoT Recorded: Jun 19 2019 58 mins
    This free 1-hour webinar from GigaOm Research brings together experts in Digital Transformation, featuring GigaOm David Linthicum and special guest from Nutanix, Dr. Arthur Langer. The discussion will focus on the stepwise process of understanding where you are in employing digital, where you need to go, and the specifics to drive success the first time.

    “Digital transformation” is certainly the buzzword of 2019, but most don’t know what it is, why it is important and how to do it right. By investing in digital experience transformation enterprises can discover valuable customer behavior insights and execute personalized experiences to engage, delight and retain customers.

    In this Webinar, we’ll take the mystery out of what it takes to create and execute on a digital transformation strategy, including what’s important, and what needs to be avoided. This will be a candid discussion with industry experts. We’ll explore what technology to leverage, best practices, and approaches.

    In this 1-hour webinar, you will discover:

    • Reference technical architecture of digital transformation, from 5G to IoT.
    • Social architecture, or how people are important to this transformation strategy.
    • How to sell digital initiatives to the board of directors, and other stakeholders.
    • Core metrics and continuous integration that keep priorities straight.
  • How To Train Your Email Security Dragon
    How To Train Your Email Security Dragon
    Gareth Fraser-King, Director, Product Marketing EMEA Recorded: Jun 19 2019 38 mins
    The numbers make stark reading. 281 billion emails sent daily to over 2 billion business users. 91% of all cyber-attacks start with an email and it only takes 1 with malicious intent to impact your organisation. With evolving methods used by the adversary, it’s becoming increasingly difficult not to get burned.

    Join Gareth Fraser-King, Director, Product Marketing EMEA, to learn:
    - The state of the cyber landscape, specific to email security.
    - How the attack vector is changing with new tactics, techniques, procedures and what you need to look out for.
    - Why is FireEye better at catching evolving attacks and how this can benefit you.
  • Next Generation Security Operations: Symantec Threat Intelligence
    Next Generation Security Operations: Symantec Threat Intelligence
    Peter Sparkes, Senior Director, Cyber Security Services, Asia Pacific and Japan, Symantec Recorded: Jun 19 2019 37 mins
    Preparing for the threats of tomorrow will require faster, deeper integration of technology, process, intelligence and warriors. However, making so many moving components work seamlessly together can be a challenge.

    Join Peter Sparkes, Symantec’s Senior Director of Cyber Security Services for Asia Pacific and Japan, in this webinar as he discusses the OODA Loop Strategy:

    - Observe: Expanding detection and extending coverage across the ecosystem
    - Orientate: Utilising threat intelligence with planning, process and playbooks
    - Decide: Empowering the analyst and the impact on business
    - Act: Proactive defense through managed endpoints detection and response and orchestration

    Register now to watch the webinar.
  • Top Security Considerations in Moving to the Cloud
    Top Security Considerations in Moving to the Cloud
    Sherif El-Nabawi, Vice President, Systems Engineering, Asia Pacific and Japan, Symantec Recorded: Jun 19 2019 30 mins
    By 2020, organisations in Asia Pacific are expected to utilise an average of 5 cloud solutions. But with 51% of these organisations storing sensitive data on public clouds and 45% feeling that the public clouds’ security features are sufficient, organisations urgently need to factor in more security considerations when moving to the cloud.

    In this webinar, Sherif El Nabawi, Vice President of Systems Engineering at Symantec Asia Pacific and Japan, discusses the top security considerations in moving to the cloud, including:

    - The risks and issues created by cloud migration
    - Symantec’s Direct to Net Secure Access Services
    - IaaS and SaaS adoption challenges and solutions
    - Why every organisation needs to establish a Cloud Center of Excellence

    Register now to watch the webinar.
  • Symantec Web Isolation
    Symantec Web Isolation
    Dan Amiga, Vice President, Web Isolation, Symantec Recorded: Jun 19 2019 39 mins
    With 90% of cyber attacks coming through web and email, the need for Web Isolation has never been greater. But is it possible to have an air gap on all fronts without negatively affecting the user experience?

    Join us in this webinar as Don Amiga, Vice President of Web Isolation at Symantec, reveals the ins and outs of Web Isolation, including:

    - Why organisations today need military grade air gaps
    - The architecture behind Web Isolation
    - Live demo and use cases and how to implement Web Isolation for each
    - How Symantec Web Isolation offers superior integration and protection

    Register now to watch the webinar.
  • Symantec Emerging Technologies: We Invest So You Don't Have To
    Symantec Emerging Technologies: We Invest So You Don't Have To
    John Cunningham, Vice President, Emerging Technologies, Asia Pacific, Symantec Recorded: Jun 19 2019 24 mins
    Staying current with the latest digital technologies can be a costly endeavour to both implement and secure, yet organisations cannot afford to fall behind. How can an organisation keep up with the ever-changing digital business landscape?

    Join John Cunningham, Vice President of Emerging Technologies, Asia Pacific at Symantec, in this webinar as he discusses:

    - The challenges organisations face trying to keep up with the digital landscape
    - How Symantec’s investments in emerging technologies can aid organisations
    - Symantec’s acquisition of Luminate to help organisations achieve Zero Trust
    - The enhancement of Symantec’s web isolation capabilities with Fireglass

    Register now to watch the webinar.
  • Green Demon Denied
    Green Demon Denied
    Shashwath Hegde, Solutions Architect, APAC Recorded: Jun 19 2019 25 mins
    Managed Detection and Response (MDR) services should spot prevention failures and respond quickly. Good MDR services spot Red Teams and Pen Testers who are tasked with defeating preventative controls. A great MDR service knows when real, malicious threat actors are hiding their footprints amongst Red Team activity. In this war story, we discuss how Managed Defense, FireEye's MDR service, deals with such situations.
  • Zero Trust: Integrated Cyber Defense & ISTR Observations
    Zero Trust: Integrated Cyber Defense & ISTR Observations
    Nick Savvides, Chief Technology Officer, Asia Pacific, Symantec Recorded: Jun 19 2019 43 mins
    With the internet and the cloud being a critical part of most organisations today, the walled network is soon becoming a thing of the past. When your network is essentially the internet, the only secure mindset is Zero Trust.

    Join us in this webinar as Nick Savvides, Symantec’s Chief Technology Officer for Asia Pacific and Japan, discusses:

    - The evolution from Open Security to Zero Trust
    - Key learnings from the Internet Security Threat Report (ISTR) Vol. 24
    - The guiding principles and practical applications of Zero Trust
    - Symantec’s vision of Zero Trust

    Register now to watch the webinar.
  • Keynote Address: Symantec Outlook & Vision
    Keynote Address: Symantec Outlook & Vision
    Kevin Reardon, Vice President, Worldwide Strategy and Consulting, Symantec Recorded: Jun 19 2019 33 mins
    Even as technological advances make it easier for organisations to undertake a digital transformation, the challenges of cloud migration, privacy legislation and advanced adversaries still remain.

    Join Kevin Reardon, Vice President of Worldwide Strategy and Consulting at Symantec, in this webinar as he discusses Symantec’s outlook and vision for 2020 and beyond, including:

    - Challenges securing the digital transformation
    - Symantec’s Integrated Cyber Defense approach
    - How an integrated platform can help simplify and resolve digital transformation challenges
    - What your next steps should be

    Register now to watch the webinar.
  • Unstructured Data Management: A New Way of Fighting Data
    Unstructured Data Management: A New Way of Fighting Data
    Enrico Signoretti, Krishna Subramanian Recorded: Jun 18 2019 62 mins
    The fight against data growth and consolidation was lost a long time ago. Several factors contribute to the increasing amount of data we store in storage systems such as users desire to keep everything they create, organizational policies, new types of rich documents, new applications, and demanding regulations are just some of the culprits.

    Many organizations try to eliminate storage silos and consolidate them in large repositories while applying conservative policies to save capacity. It’s time to take a different approach and think about managing data correctly to get the most out of it. Unstructured data, if not correctly managed, could become a huge pain point from both finance and technical perspectives. It is time to think differently and transform this challenge into an opportunity. Let us show you how to get more efficiency and value out of your data!

    Join this free 1-hour webinar from GigaOm Research that is bringing together experts in data storage and cloud computing, featuring GigaOm Enrico Signoretti and special guest from Komprise, Krishna Subramanian.

    In this 1-hour webinar, you will discover:

    • The reality beyond data growth and what to expect from the future
    • Why data storage consolidation failed
    • Why cloud isn’t a solution if not managed correctly
    • How to preserve and improve the user experience while changing how your infrastructure works
    • How to understand the value of stored data to take advantage of it
    • How data management is evolving and what you should expect in 12-to-18 months.
  • Is browser isolation the new ‘sandbox’ for security?
    Is browser isolation the new ‘sandbox’ for security?
    Brett Raybould, Solutions Architect, Menlo Security Jun 25 2019 9:00 am UTC 45 mins
    Protecting organisations from web threats has typically been done with a proxy or DNS solution, but a new approach has emerged.

    Isolation defends against today’s sophisticated zero-day exploits using an “air-gapped” browsing approach.

    Identified by Gartner as “one of the single most significant ways to reduce web-based attacks,” remote browser isolation has become an important line item in IT budgets around the world. But not all Isolation is created equal. With so many offerings how do you weed through the noise?

    Join us and Menlo Security to learn:
    - Why remote browser isolation technology adoption is on the rise
    - Key use cases for Isolation that should be evaluated
    - 3 critical requirements when selecting a practical browser isolation solution
  • Expertise On-Demand - Flexibler Zugang zu Expertenwissen
    Expertise On-Demand - Flexibler Zugang zu Expertenwissen
    Stefan Munz, Account Manager, FireEye Jun 25 2019 9:00 am UTC 60 mins
    Die Anforderungen für eine handlungsfähige Cyber-Defense Organisation sind anspruchsvoll. Heute braucht man einen Malware-Reverese Engineer, morgen einen Threat Hunter, übermorgen einen Intelligence Analyst und nächste Woche einen Incident Response Consultant. Das Expertenwissen muss "von jetzt auf gleich" verfügbar sein, jedoch hat man im Durchschnitt nicht das Budget für alle 4 Arbeitsstellen.
    Für Unternehmen und Organisationen stellt sich dann die Frage: wie kann man das gesamte Expertenwissen intelligent vereinen?
    Erfahren Sie in unserem Webinar, wie FireEye mit unterschiedlichsten Experten und Services als verlängerter Werkbank Ihrer Cyber-Defense Organisation agiert und welche weiteren Vorteile sich hierbei für Sie ergeben:

    · Kompletter Zugriff auf die vollständige FireEye Cyber Intelligence Services
    · Ad-Hoc Verfügbarkeit von Expertise und Erfahrung unseres Teams
    · Regelmäßige Cyber Threat Briefings
    · Einfacher Zugang zu Services wie Red Teaming, Table Top Exercises oder Purple Teaming
    · Incident Response Retainer mit globalen SLAs
  • Automating AI in the Data-Driven Enterprise Webinar
    Automating AI in the Data-Driven Enterprise Webinar
    Andrew Brust, Kurt Muehmel Jun 25 2019 2:00 pm UTC 60 mins
    Artificial intelligence (AI) and machine learning (ML) are exciting, growing in adoption and more applicable to business contexts than ever before. The problem is, a lot of AI/ML work to date has relied upon rare and expensive data scientists. These practitioners take data sets, then experiment with different frameworks, algorithms and parameter values to create the best predictive models possible. This bespoke approach can be fascinating, but it just won’t scale sufficiently to bring AI and ML into the Enterprise mainstream.

    Why perpetuate an AI process that is so manual when heuristics – and even ML itself – can help automate data cleansing, algorithm selection and parameter tuning? Yes, AI automation can help organizations without data scientists do AI and ML. But beyond that, even orgs with strong data science teams can use AI automation to remove tedium from, and increase accuracy in, their work. It’s win-win, even if it removes some of AI’s mystique.

    Want to learn more about automating AI, and making it actionable and accessible to all your data workers? Join us for this free 1-hour webinar from GigaOm Research. The webinar features GigaOm analyst Andrew Brust with Kurt Muehmel, VP of Sales Engineering at Dataiku, a leader in AI for the Enterprise.

    In this 1-hour webinar, you will discover:

    Why bespoke AI work is fast becoming unsustainable
    The science and power behind automated machine learning (AutoML)
    How to leverage AI automation while combating bias, drift and other AI/ML pitfalls
    Register now to join GigaOm Research and Dataiku for this free expert webinar.
  • How to Successfully Evaluate SOAR Solutions
    How to Successfully Evaluate SOAR Solutions
    John Moran, Senior Product Manager, DFLabs and Heather Hixon, Senior Solutions Architecht, DFLabs Jun 25 2019 3:00 pm UTC 60 mins
    Assessing solutions to meet your organization’s specific requirements and use cases

    When investing in a new tool or technology it is important that it fully meets the requirements of the organization, including all of the crucial “must have” aspects, as well as a number of ”would likes” that could also be beneficial.

    With the growing maturity of the SOAR market and an increasing number of vendors in the space now claiming to offer a SOAR solution, evaluating a number of solutions from different vendors can be a daunting and long process if not carried out methodically with clear objectives goals in mind.

    During this webinar we will discuss what a full SOAR solution should entail, common security operations problems that a SOAR solution can help to solve, as well as define a set of criteria that we believe should be taken into consideration when assessing a SOAR solution and vendor.

    Our aim is to cover as many angles and best practices to help provide the information you need to make an informed decision based on your individual organization requirements. DFLabs believes it has one of the most open and industry leading SOAR solutions available in the SOAR market today, which is flexible to adapt to any use case, including those outside the traditional security operations space, but above all we are committed to making sure all potential customers achieve the best possible solution to solving their critical security problems.

    Key Takeaways:
    - The core capabilities and functions of a full SOAR solution
    - SOAR vs. Orchestration and Automation
    - Defining the problems to be solved
    - Criteria for evaluating a SOAR solution
    - Criteria for evaluating a SOAR vendor
  • Unlocking the Value in Conversational Data
    Unlocking the Value in Conversational Data
    Tim Bartz and Yelena Kasianova Jun 25 2019 3:30 pm UTC 45 mins
    Data is widely recognized as one of the most valuable assets a company owns. Conversational data is, without doubt, the most valuable. The challenge is to understand what this data means and what effective actions to take as a result. Recognizing new or unexpected trends while staying in tune with customer behavior and sentiment is a competitive advantage, and key in building successful customer relationships, maintaining loyalty and increasing repeat business.

    Join Tim Bartz, EMEA Presales Consultant at Artificial Solutions as he demos Teneo's data capabilities.

    -

    Introducing Teneo Developers, a new comprehensive resource to allow enterprise developers and partners fast access to experience the power of Teneo. Visit www.teneo.ai to get started for free.
  • How Healthy Is Your OT Environment
    How Healthy Is Your OT Environment
    Ben Abigadol & Michael Rothschild Jun 25 2019 4:00 pm UTC 75 mins
    With an expanding attack surface and new attack vectors, what you thought was once secured in your industrial or critical infrastructure environment may indeed have new threats that you were unaware of.

    Join us for this exciting webinar which will cover:
    a.The changing security environment given recent attacks – and the increasing need to address industrial security threats
    b.The potential complexity in securing your environment given the new reality
    c.Take the OT HealthCheck by Indegy. What it is. How it works. And what you get.
    d.Learn where your vulnerabilities may be and what you should consider to address them
    e.Beyond the HealthCheck. How to take the next step.
  • Leveraging Desktop-as-a-Service Platforms to Simplify Multicloud
    Leveraging Desktop-as-a-Service Platforms to Simplify Multicloud
    David Linthicum, Casten Puls, Simon Gibson Jun 25 2019 4:00 pm UTC 58 mins
    Led by GigaOm Analyst David Linthicum, and co-presented with Simon Gibson and special guest, Carsten Puls, Senior Director, Frame at Nutanix, this free 1-hour GigaOm Research webinar focuses on the value of desktop-as-a-service platforms to simplify multicloud and remove complexities. As the world of IT, including cloud, becomes more complex, private and public clouds are increasingly expected to replace traditional computing and eventually make things easier. However, for most enterprises, the cloud is now an additive to existing traditional systems, and that adds complexity and reduces business value.

    Interfaces, or ways that the users interact with the infrastructure is key to removing this complexity. This is the approach where user interfaces are virtualized, in short, complexly abstracted from the complexity of the underlying environment including clouds. A world where IT is more simplistic, thus more productive to the business. So where to start? Begin by addressing complexity head-on. In this
    1-hour webinar, you will discover:

    • The concept of desktop-as-a-service including how it works, what it is, and where to get it.
    • How things have become complex, and how to measure complexity for your enterprise.
    • How to understand the business value of dealing with complexity.
    • Steps toward mapping out a course of action.
  • 10 Questions on ServiceNow with Acorio's Experts
    10 Questions on ServiceNow with Acorio's Experts
    John Huckle, John Beasley, Josh Scott, Dale Meyer-Curley, Scott Lindsay, John McCormick, and Meghan Lockwood Jun 25 2019 5:00 pm UTC 60 mins
    This panel discussion will feature leading experts from various departments inside Acorio, bringing tactical experience and strategic vision to help you guide your ServiceNow journey today. Learn from Acorio’s hundreds and hundreds of successful go-live’s – and pick the experts’ brains about their experiences in the ServiceNow trenches.
  • Securing and Monitoring Microservices Application in Kubernetes -Do’s and Don’ts
    Securing and Monitoring Microservices Application in Kubernetes -Do’s and Don’ts
    Althaf Ali, DevOps Solution Architect Jun 25 2019 5:00 pm UTC 60 mins
    Aspire is conducting this webinar on the topic “Securing and Monitoring Microservices Application in Kubernetes - Do’s and Don’ts”. This webinar is aimed at helping organizations understand the best practices for End to End Kubernetes implementation for increased scalability and modularity. This session will provide insights into how Security and Monitoring can be done from a CI/CD perspective.

    Key Takeaways:

    · Key elements of Security in Kubernetes CI and CD
    · Factors to be considered for ensuring Security for an End to End Kubernetes Implementation
    · Ways to Monitor Kubernetes Infrastructure and Applications
    · Demo of Kubernetes monitoring using ELK
  • Industrial Data 4.0: Observations from the Frontlines
    Industrial Data 4.0: Observations from the Frontlines
    Stephan Zoder, Informatica Sr Dir Industry Consulting and Malik Azeez, Paradigm Technology Dir of PIM Jun 25 2019 6:00 pm UTC 52 mins
    In far too many manufacturing organizations, data is treated as overhead instead of a strategic advantage. In this webinar, Informatica and Paradigm Technology will explore the convergence of Operational and Information Technology and how data management plays an integral part in realizing key benefits from business-transformational projects. In order to support an Industry 4.0 world, a Data 4.0 precursor is a must-have requirement.
  • DevOps 2020: Strategies to Increase DevOps Performance Across the Enterprise
    DevOps 2020: Strategies to Increase DevOps Performance Across the Enterprise
    Jon Collins, Baruch Sadogursky Jun 25 2019 6:00 pm UTC 59 mins
    This free 1-hour webinar from GigaOm Research brings together experts in DevOps, featuring GigaOm analyst Jon Collins and a special guest from JFrog, Baruch Sadogursky, Head of Developer Relations, discussing how to set a pragmatic strategy for scaling DevOps that enables your organization to increase efficiency and productivity, without hampering delivery. Explore how to bring under management the assets — code and binaries — used in the development pipeline, building a competency that delivers and distributes right to the edge.

    If you’ve embraced DevOps as a way of delivering better software, faster and cheaper into deployment and management, you may be looking to move from a single success story to broader use, or perhaps you are ready to take its principles to a whole new area of development and operations, such as sensor-based IoT. In each case, the challenge has become clear: how to can the enterprise align different development groups without becoming prescriptive or stifling innovation?

    In this 1-hour webinar, you will discover:

    - What challenges enterprises face as they look to scale their use of DevOps across the business and out to the edge
    - What stages to work through to ensure that decision-makers balance the needs of efficiency and productivity with standardization and governance
    - Where do tools and technologies help support at each stage, and how do roles, responsibilities, and processes evolve along the way?
    - Where can you start delivering higher levels of efficiency without impacting productivity or creating new overheads?

    So, if you are looking to broaden your use of DevOps and want to know where to start, or if you are already on the journey and dealing with the challenges, attend this webinar and bring your questions with you.
  • The financial impact of a cyber-attack
    The financial impact of a cyber-attack
    James Martin, Crime and Security Advisor, BRC & Giles Taylor, Head of Data & Cyber Security, Data Services, Lloyds Bank Jun 26 2019 1:00 pm UTC 60 mins
    In a world of increasing digitalisation, where homes, businesses and wider infrastructure are more connected than ever, the impact associated with cyber-attacks is growing.

    Cyber threat to business should be taken seriously, The BRC Crime Survey 2019 reported that between 1st April 2017 to 31st March 2018 the combined cost of spending on crime prevention and losses from crime to the industry was £1.9 billion, and although retailers are spending 17% more on cybersecurity than last year, nearly 80% of the retailers surveyed have seen an increase in the number of attacks and/or breaches.

    BRC and Lloyds are coming together to support BRC members to understand and manage their financial exposure to potential cyber-attacks.

    This webinar will discuss the evolution of the cyber threat and will help prepare retailers on the steps they can take not only to prepare but how to both respond and recover financially and operationally from an attack.
  • Building a Sustainable Cloud Strategy in Multi-Cloud Environments
    Building a Sustainable Cloud Strategy in Multi-Cloud Environments
    David Linthicum, Enrico Signoretti, Jim Donovan, Nathan Goulding Jun 26 2019 2:00 pm UTC 57 mins
    Data is now created and consumed from more sources than ever, and with IoT and Edge computing this is even more so. The challenge is no longer how to make cloud computing central to the IT strategy, but is now about avoiding lock-ins, and keeping costs at bay while giving access to an increasing number of applications, devices and users — all dispersed across the globe on different clouds and networks.

    As the great migration to cloud is fully underway, organizations are now moving from cloud-first strategies to multi-cloud, and they seek solutions allowing access and the ability to process data quickly at reasonable costs, no matter where data is created or consumed.

    The goals are to build a tailored cloud made of best-of-breed “Cloud 2.0” solutions while removing any form of lock-in, and to outperform in terms of performance and cost what is currently available from established market vendors. But how can you build a new cloud model such as this one? There’s a host of disruptive Cloud 2.0 companies that provide Alternative Cloud Strategies built on Best-of-Breed Solutions, including Wasabi and Packet, our featured guests in this webinar.

    Moderated by GigaOm analyst David Linthicum and co-presented with Enrico Signoretti and special guests, SVP of Product at Wasabi Jim Donovan and SVP of Engineering at Packet, Nathan Goulding. In this one-hour GigaOm webinar we’ll be discussing how to overcome the limits and lock-ins imposed by traditional approaches, and how to lay the next-gen infrastructure for today’s and tomorrow’s applications and data. We will look specifically at cloud strategies and how to execute them.
  • IP Strategy: Tackling Open Source Software
    IP Strategy: Tackling Open Source Software
    Martin Callinan, Source Code Control Jun 26 2019 3:00 pm UTC 60 mins
    In this webinar, we'll dive into the latest developments in managing Open Source Software as part of your IP strategy. The webinar will review recent changes in the world of Open Source Software, including highlights of the 2019 Open Source Security and Risk Survey. There will be an assessment of the changing dynamic, using the example of Soundview. The webinar will cover advice on how to manage Openchain, which is on track to be a ISO Standard within 12 months. Additionally, this webinar will investigate the new PCI software lifecycle with an example of how to manage this on an ongoing basis – the process and the tools.
  • What’s Best for Analytics & Data Science: Cloud, On-Premises or Hybrid?
    What’s Best for Analytics & Data Science: Cloud, On-Premises or Hybrid?
    Andrew Brust, Mathias Golombek, Helena Schwenk Jun 26 2019 4:00 pm UTC 61 mins
    The cloud will inevitably be a component of your customers’ and prospects’ data strategies, not to mention your own. But how does this impact analytics and data science? That question is especially important since the journey to the cloud has many stops, and most companies won’t move all their data to the cloud immediately.

    It’s a heterogeneous, hybrid world out there: some data must stay on-premises, while some data is born in the cloud and should stay there. Other data allows discretion around migration and can be left in place. But when it comes to both analytics and data science, the work should encompass all data. Yet, how is that achieved with a single platform, when data isn’t centralized?

    The good news is solutions and architectures exist to achieve this mission. To learn more about applying analytics and harnessing data science across all data in the cloud, on-premises or otherwise, plan to attend this free 1-hour webinar from GigaOm Research. The Webinar features GigaOm Analyst Andrew Brust and special guests, Mathias Golombek, CTO, and Helena Schwenk, AR and Market Insights Manager from Exasol, a leader in in-memory analytic databases.

    In this 1-hour webinar, we will explore:

    - Why the cloud together with analytics and data science are such a good match
    - What hybrid cloud is, what its practical implications are, and how to make it work
    - Considerations for cloud analytics performance and scale
    - Using the cloud for AI and data science
  • 3 ways to navigate your way to Business Transformation enabled by digital
    3 ways to navigate your way to Business Transformation enabled by digital
    Arun Trivedi Jun 26 2019 4:00 pm UTC 45 mins
    Digital Transformation is dead! As you plan your journey, one of the first steps is to think about what needs to be done, why and how. The webinar presents 3 ways to navigate your way without losing track of your goal(s).

    Each path has its own set of focus areas. Irrespective of he approach you take, their are 6 dimensions of transformation that you must plan around to be successful.
  • Redefining Endpoint Security - How to Better Secure the Endpoint
    Redefining Endpoint Security - How to Better Secure the Endpoint
    Joakim Lialias,Symantec / Sundeep Vijeswarapu, PayPal / Fernando Montenegro, 451 Research Jun 27 2019 5:00 am UTC 56 mins
    Symantec Unites Superior Protection, Automation and Artificial Intelligence in its most Advanced Endpoint Security Solutions.

    As attackers become more sophisticated, advanced protection and hardening are necessary for added layers of security.

    Join our webinar for first-hand insights on the newest cloud-delivered endpoint security solutions and hear from Joakim Liallias, Symantec and special guest speakers Sundeep Vijeswarapu from PayPal and top industry analyst Fernando Montenegro, 451 Research as they discuss:

    • How to gain a better understanding about the trends that are driving the need for a more comprehensive endpoint security approach.

    • How PayPal is using Symantec Endpoint Security to protect their endpoints.

    • How Symantec is redefining endpoint security with its new complete cloud-delivered endpoint defense:

    - Introducing never seen before innovation to deliver best-in-class prevention

    - Hardening Detection and Response to help customers achieve superior threat prevention,

    - Quicker identification of attackers and more tightly integrated technology and human expertise lead to better response and faster remediation

    - Security professionals and IT teams are strapped for time – streamlined management and automation will reduce significant burden

    Don't miss this great opportunity to get the latest information on taking steps towards simplifying Endpoint Security for your organization

    Register Today
  • Next Gen Technologies Enabling Connected Manufacturing
    Next Gen Technologies Enabling Connected Manufacturing
    Greg Moore, Dell Technologies | Harry Forbes, ARC Advisory Group | Spencer Doyle, Industrial Platform, Noodle AI Jun 27 2019 6:00 am UTC 37 mins
    In Industry 4.0 companies are embarking on the transformative journey. The desire to gain new business insights from data, the availability of affordable IoT infrastructure, move to the edge, AI and the advent of 5G are driving strong demand.

    Hear from a panel of experts how manufacturers are transforming and how industrial solution builders can keep them ready for the era of new industrial revolution.

    Topics of discussion will include:

    · trends happening in a connected manufacturing world

    · move to the edge, the role of IoT, AI, 5G and other emerging technologies

    · ways to help your customers drive digital transformation

    · the next generation OEM solutions that we modify, configure, test and optimize to fit your unique needs so that you and your customers can maintain a competitive “edge.”
  • Can your Board Survive the Future?
    Can your Board Survive the Future?
    Vicky Reddington. Board Effectiveness Advisor. Jun 27 2019 3:00 pm UTC 60 mins
    The pace of change is increasing at an exponential rate which will change the face of business. It is the responsibility of the board to ensure survival. Boards are effective only if they are diverse in thought, collaborative and accountable. They must be aligned in purpose and set the tone from the top. Find out the steps you need to take to futureproof your board.

    Who should attend:
    Board members who recognise the need to thrive in today’s challenging business climate.

    What are the benefits:
    Turn talented individuals into an exceptional board, equipped to keep ahead of the speed of change.

    What is the opportunity:
    To redefine your board’s collaboration and effectiveness.

    Who is the speaker:
    Vicky Reddington has 20 years experience at the forefront of change within the IT industry, she has a reputation of driving change and delivering results.

    Vicky believes in getting people to work together to deliver extraordinary results, VS wasting their energy in different and sometimes opposing directions, often causing silos, and to the long term detriment of the business.

    A board that wants to thrive in today’s fast paced world, needs an operating system and she is delighted to say she has cracked the code on the installation guide, and is ready to share. Helping you build a motivated, aligned and agile organisation.
  • The Intelligent Edge: The Next Frontier of IoT Innovation
    The Intelligent Edge: The Next Frontier of IoT Innovation
    Ed Maguire, Momenta Partners Jun 27 2019 4:00 pm UTC 57 mins
    Edge, mobile edge, and fog computing have emerged, offering a panacea to the pain points of IoT data. Companies such as Intel, SAP, Ericsson and Dell Technologies are creating their own solutions. Edge computing has the potential to impact the data infrastructure of the IoT, but what are the benefits and risks of moving away from the cloud? Edge computing comes with a suite of considerations that need to be carefully considered prior to adoption that we'll explore in turn.

    This webinar will cover:

    - The current state of fog and intelligent edge computing
    - What are the benefits/risks of moving away from the cloud?
    - What does this mean for cloud computing, data infrastructure and data analytics?
    - What are the best use cases of edge computing and what are its limitations?
    - Forecasts on future applications
  • [Earn CPE] Executive's Guide to Smarter GRC with Cybersecurity Attack Analytics
    [Earn CPE] Executive's Guide to Smarter GRC with Cybersecurity Attack Analytics
    Panelists: Sam Abidir, Lockpath; James Rice, Greenlight Technologies; Ilia Sotnikov,Netwrix; and Jason Bonds, Ping Identity. Jun 27 2019 5:00 pm UTC 75 mins
    Today’s increasing organizational complexity and evolving threat environment have made it more critical than ever for organizations to clearly identify their exposures, measure vulnerability risk, and quickly prioritize remediation efforts. Cyberattacks are often hidden from view under a mountain of alerts generated by security systems, giving attackers time to gain access to systems and seize valuable data.

    To ensure their companies don't end up in the headlines for the wrong reasons, corporate governance, risk management, compliance management and other “lines of defense” functions need to rethink their security strategy and take an approach that looks at behavior and attack patterns. By conecting cybersecurity attack analytics with risk programs and GRC work streams, executives can increase visibility into the overall security risk of the organization which makes the investigation of application security events easy, and enables teams to mitigate and respond to real security threats quickly and decisively.

    Join this CPE panel webinar for insights on achieving smarter GRC with CAA. We will share:

    - Why traditional endpoint security is failing to see and stop attacks.
    - How using attack analytics can stop cyberattacks now and in the future.
    - Efficient ways to analyze events and prevent threats.
    - How to move from looking back to real-time and forward-looking GRC monitoring.
  • Building a Strong Office of the CDO
    Building a Strong Office of the CDO
    Juan Tello, CDO, Deloitte Consulting LLP and Juan Riojas, CDO, Informatica Jun 27 2019 5:00 pm UTC 46 mins
    Data is no longer an advantage; everyone has it. But how you harness data to power your business can give your organization the competitive edge. The Chief Data Officer is a critical enabler among the leadership team, providing the executive ownership needed to enhance decision making, improve operational efficiency, and empower innovation.
  • SkyStem: Back to Basics with Reconciliations
    SkyStem: Back to Basics with Reconciliations
    Nancy Wu, Sales and Customer Support, SkyStem Jun 27 2019 6:00 pm UTC 59 mins
    [Live Recording] It's time to show some love for the workhorse of the financial close process -- balance sheet account reconciliations! Join us in this webinar, where we share best practices on how to think about the reconciliation work each month, when best to do reconciliations, how they should be prepared, and some common pitfalls to avoid.

    Please note: CPE credit not available for this playback.
  • How to Secure Your First Non-Executive Role
    How to Secure Your First Non-Executive Role
    Jonathan Rennison, In Touch executive coach Jul 2 2019 8:00 am UTC 60 mins
    Hosted by In Touch coach, experienced non-executive and trustee, Jonathan Rennison, this informative and engaging webinar will cover the fundamentals of preparing yourself to secure the first role of your portfolio career.

    Throughout the 45 minute session, Jonathan will outline the knowledge and skillset needed to become a successful non-executive, covering topics such as building your network, harnessing the power of your online presence and how to impress at interview. Drawing on his professional and coaching experience Jonathan will provide a comprehensive toolkit for a successful transition into the next stage of your career.

    Jonathan is an experienced charity trustee, non-executive director, psychologist and coach. His clients include King’s College London, the Natural History Museum, University of Northampton, Business Link Japan and a range of leaders in national charities and small to medium sized businesses across the UK.
  • SkyStem: Seducing the Auditors with Internal Controls
    SkyStem: Seducing the Auditors with Internal Controls
    Nancy Wu, Sales and Customer Support, SkyStem Jul 2 2019 6:00 pm UTC 57 mins
    With the auditors approaching (or maybe they just never left), the accounting team needs to put its best foot (and documentation) forward in order to avoid a long and drawn out affair with the auditors. Join us in this webinar, where we share the best ways to build and maintain your internal controls infrastructure to impress your auditors and make the year-end audit as quick and painless as can be.

    Please note: CPE credit not available for this playback.