Hi [[ session.user.profile.firstName ]]

CxO Strategy

  • O que está por vir para o Brasil do ponto de vista econômico e político?
    O que está por vir para o Brasil do ponto de vista econômico e político? Apresentador: Ricardo Sennes Sócio, Prospectiva, Renato Pasquini Diretor de Pesquisa Frost & Sullivan Recorded: Oct 19 2017 84 mins
    O Brasil está passando por um momento de profunda transformação com diferentes reformas sendo discutidas no Congresso e políticas públicas sendo debatidas para aumentar a competitividade do país.

    Qual é a estrutura econômica e política na crise brasileira atual? Quais variáveis vão determinar as tendências futuras?

    Nesse webinar iremos discutir:
    O cenário político e econômico atual do Brasil
    A crescente fragmentação do sistema político
    Perspectivas para o Brasil para 2017 e 2018 focando nas eleições do próximo ano
  • Cultivating Your Strategic and Creative Thinking
    Cultivating Your Strategic and Creative Thinking Dr. Ted Marra Recorded: Oct 18 2017 72 mins
    Join our guest, Dr. Ted Marra as he introduces his new strategic leadership course in Global Risk Academy.

    During the webinar we will cover:

    How does a truly strategic organization think? What is strategic thinking versus strategic planning? What are the vital few factors that will determine your organisation’s long-term success or failure and are they on your radar screen?

    Who should attend.

    People with 10 years management experience minimum up to and including C-Level in all disciplines responsible for strategic decisions or large scale operational issues - so they have large budget and many people reporting to them.

    Managers and senior management from all areas of the organisation having responsibility for planning and achievement of key business objectives.

    Why you should attend.


    - Reflect on how you got where you are as an organisation;

    - What factors were critical to your success? What factors were the basis for your success?

    - What held you back – prevented you from being even more successful?
    - What could you have done differently


    Understand what are the most critical factors that will better ensure your organisation is a “winner” in the future (e.g., next 3-5 years).

    Find out which ones you may be missing and what to do about it before it’s too late and you become just an “average or good” organisation when, with a little effort and the right strategic thinking and creativity, you could take the organisation to the next level of performance and move toward “greatness”.

    How to build exceptional stakeholder relationships and why doing this is critical in especially in turbulent times.
  • The Rise of the Robots - Automating the Content Chain for the Connected Traveler
    The Rise of the Robots - Automating the Content Chain for the Connected Traveler Kevin Ashbridge, Ph.D, Account Director, SDL Recorded: Oct 17 2017 57 mins
    It is now possible to deliver relevant, localized and personalized content instantly, across digital channels and devices globally. Hear how automated content machines can now handle content creation, translation and internet publishing processes.

    Discussion Points:
    *Explore the idea that it is now possible to deliver relevant, localized and personalized content instantly, across digital channels and devices globally.

    *Hear how automated content machines can now handle content creation, translation and internet publishing processes for your travel business"
  • Managing Advanced Aerospace Programs in the 21st Century
    Managing Advanced Aerospace Programs in the 21st Century Anurag Jain, James L Roche, Kiran Rao, Ankur Rana Recorded: Oct 12 2017 69 mins
    While traditional challenges of cost, quality and schedule in aerospace program management (PM) keep increasing, the newer challenges are becoming more complex. Research instituted by TCS and conducted by CIMdata portrays several complexities and challenges faced by companies globally in meeting Program deadlines. There is a need of paradigm shift in the way Program, Processes and Profitability are managed. There are several opportunities which are rapidly gaining embracing Digital possibilities to leap frog with future ready solutions.

    Join us for a webinar, where thought leaders from CIMdata and TCS define the Art of Possible for advanced program and configuration management, to address the new challenges and leverage them to create new competitive and business opportunities.

    Join us for a webinar, where thought leaders from CIMdata and TCS reveal the research findings, define the Art of Possible for advanced program and configuration management, to address the new challenges and leverage them to create new competitive and business opportunities on October 12, 2017 7 AM PT

    In this webinar you will learn:

    1. The key to managing advanced aerospace programs

    2. TCS' aerospace and defense capabilities

    3. The art of possibility and experience sharing to solve complex problems
  • Hybrid IT in Australia: How to Simplify & Manage Multiple Cloud Environments
    Hybrid IT in Australia: How to Simplify & Manage Multiple Cloud Environments Kelly Morgan, Research VP, Services at 451 Research; Nathan Vandenberg, GM, Data Centre at Dimension Data Recorded: Oct 12 2017 50 mins
    How can your enterprise better manage multiple cloud and non-cloud IT environments to accelerate your digital business? Are you among the 50% of enterprises challenged by the complexity of managing applications and data across hybrid environments?

    Find out what workloads are still on physical IT, where they’re moving to, and why enterprises use migration services to help.

    Join Kelly Morgan, Research Vice President, Services from 451 Research and Nathan Vandenberg, General Manager, Data Centre from Dimension Data on Thursday 12 October 2017, 11:00am – 11:45am, to understand the most common challenges faced when managing multiple IT environments in Australia and how to overcome them.

    We will guide you through the hybrid IT maze and provide you with actionable steps to simplify the complexity of managing multiple enterprise cloud and non-cloud IT environments.

    Join us as we explore the findings from the Hybrid IT report, a 451 Research report commissioned by Dimension Data.
  • Microbiome: Revisiting the Micro and Macro
    Microbiome: Revisiting the Micro and Macro Sudeep Basu, Ph.D. Practice Leader, TechVision Recorded: Oct 11 2017 42 mins
    In an era of personalized medicine, the current trajectory of growth across the microbiome industry parallels the growth that took place across genomics. Some of the milestones that have occurred in the microbiome field include the application of next-generation screening toward identifying and assessing microbial levels within the human gut. Using these microbial biomarkers, scientists are pushing the boundaries by identifying novel drug targets as well as probiotic or prebiotic products that could aid in balancing the microbial ecosystem within the human body.
  • ISM - We have changed
    ISM - We have changed ISM Recorded: Oct 11 2017 1 min
    A video representing the brand change at the ISM.
  • APT33: Panoramica FireEye sulle attività cyber iraniane
    APT33: Panoramica FireEye sulle attività cyber iraniane Gabriele Zanoni, Systems Engineer, FireEye Recorded: Oct 11 2017 49 mins
    Le recenti investigazioni condotte da Mandiant, la divisione di Incident Response di FireEye, combinate con le analisi del nostro servizio di Threat Intelligence iSIGHT, hanno fornito una panoramica completa sulle attività di un gruppo di Cyber attaccanti iraniani operante dal 2013.
    Durante il webinar, spiegheremo come questo gruppo di attaccanti sia stato coinvolto in attività di cyber spionaggio al fine di raccogliere informazioni strategiche di intelligence da aziende nel settore dell’aviazione e dell’energia, con il fine ultimo di mettere le informazioni trafugate a disposizione di uno sponsor statale o militare.
    Registrati al webinar per saperne di più!
  • The Power of Evident
    The Power of Evident Evident Recorded: Oct 10 2017 2 mins
    Safely and securely share verified personal information. We simplify the complicated world of personal data and security by taking you out of the middle of it.
  • Recruiting for a Future-Fit, Diverse and Resilient Organisation
    Recruiting for a Future-Fit, Diverse and Resilient Organisation Stephanie Davies – CEO Laughology Recorded: Oct 10 2017 39 mins
    In a global market that can be quick to change and volatile diverse skills and ideas are needed more than ever. However when faced with over 200 applicants or more for just two roles, time constraints and efficiency needed to whittle candidates down can lead to organisations missing these hidden qualities. Changing the way we recruit can be risky, but small changes in how we attract, select and interact with potential talent can make a difference long term. In this introductory webinar, suggestions about how to do this will be made and discussed.
  • Retail Survival in the Age of Digital Disruption
    Retail Survival in the Age of Digital Disruption Sheryl Kingstone 451 Research, Sudesh Girdhari CenturyLink Recorded: Oct 10 2017 57 mins
    Digital transformation is real, and it’s happening – our data in the retail industry lends more insight to the state of the transition. It is an inescapable truth that every business is becoming a digital business empowered by new software initiatives such as AI, Robotics and IoT. The adoption of these disruptive trends will force a divide between business leaders and laggards. With the upcoming Black Friday and Cyber Monday, how prepared are you to meet rising customer expectations. As the pace of innovation accelerates, retailers need to act now. Our Global retail research illustrates a significant gap between digital leaders and laggards and even a modest investment can improve operational efficiencies and agility.

    The retail industry is bursting with digital innovation driving change. This session will review:
    •How differentiation demands digital maturity
    •Transformational technologies essential to create immersive, connected retail experiences across digital and physical worlds
    •The role of cloud services and its impact on customer experience, agility, efficiency and risk
  • The Fixer Bites Back Against Hackers like The Wolf with HP Secure Print Services
    The Fixer Bites Back Against Hackers like The Wolf with HP Secure Print Services Jonathan Banks, Actor Recorded: Oct 9 2017 2 mins
    After The Wolf brings down a hospital, The Fixer (Jonathan Banks) shows them how to bite back with help from HP Managed Print Services.

    HP Secure Managed Print Services:

    - Works to identify your risks, then develop and implement a custom print security policy and plan
    - Manages your print security from device hardening to deploying advanced security solutions to address people, processes and compliance requirements
    - Helps secure your fleet with the industry’s strongest print security protections
  • The Fixer Stops Hackers like The Wolf in their Tracks with HP Print Security
    The Fixer Stops Hackers like The Wolf in their Tracks with HP Print Security Jonathan Banks, Actor Recorded: Oct 9 2017 2 mins
    The Fixer (Jonathan Banks) is here to put The Wolf on a leash with an HP Enterprise printer featuring Run-Time Intrusion Detection that is constantly protecting against malware attacks.

    HP Run-Time Intrusion Detection:

    - Monitors complex firmware and memory operations, automatically stops the intrusion and reboots in the event of an attack
    - Protects HP business printers from becoming an entry point for attacks on your network
    - Offers the only real-time detection, automated monitoring, and built-in software validation to stop threats the moment they start
  • The Fixer is Here to Tame Hackers like The Wolf with HP SureStart Print Security
    The Fixer is Here to Tame Hackers like The Wolf with HP SureStart Print Security Jonathan Banks, Actor Recorded: Oct 9 2017 2 mins
    Armed with an HP Enterprise printer featuring HP Sure Start self-healing BIOS protection, The Fixer (Jonathan Banks) is going to make sure The Wolf never leaves a scratch on this place again.

    HP Sure Start:

    - Protects against malware by detecting, stopping, and self-healing from BIOS attacks
    - Prevents the execution of malicious code during bootup by allowing only HP-signed, genuine code to be loaded
    - Restarts with a safe “golden copy” of its BIOS, if compromised
    - Is the industry’s only self-healing BIOS
  • Wargaming.net: Analyzing 550 Million Daily Events to Increase Customer Lifetime
    Wargaming.net: Analyzing 550 Million Daily Events to Increase Customer Lifetime Sergei Vasiuk Recorded: Oct 5 2017 4 mins
    Wargaming has implemented a “state of the art” enterprise data platform that can be scaled to store massive amounts of game data and produce relevant management KPIs and interface for data analytics.

    Overall, the Wargaming team has to process over 3TB of raw data daily. Cloudera Enterprise is the cornerstone for this purpose and the data reservoir is where data teams store all the raw data. Wargaming then uses machine learning techniques to better understand the players, their needs, and if the game provided an enjoyable experience.
  • Demand Driven MRP (DDMRP): Part 2
    Demand Driven MRP (DDMRP): Part 2 Anandh Rajappa(Head, Supply Chain Consulting, TCS), Erik Bush(CEO, DDTECH) & Lakshmi Subbaraya(Material Management, TCS) Recorded: Oct 5 2017 47 mins
    Companies around the world have adopted the Demand Driven MRP (DDMRP) methodology and experienced substantial improvements in customer service, reduced lead times and lower inventories. Introduced to the market in 2011, the DDMRP methodology is experiencing rapid adoption around the globe as companies from a wide range of segments are finding it unlocks substantial improvements in their Supply Chain Performance.

    In this followup webinar hosted by Tata Consultancy Services(TCS), together with Demand Driven Technologies you will learn

    1. Core concepts of DDMRP
    2. A short demonstration of Replenishment+, the world's leading DDMRP compliant software solution

    To view the part 1 of the series follow the link below:
    https://www.brighttalk.com/webcast/15799/271295
  • How the US Secret Service combats advanced ransomware
    How the US Secret Service combats advanced ransomware Amar Singh, Mark Grantz, Chris Payne, Brian Laing, Ronny Wolf Recorded: Oct 4 2017 60 mins
    Following on from our popular webinar, "Petya, notPetya or Goldeneye - The Lies, the Truth and What's Coming Next", we bring to you our next special episode with US Secret Service Special Agent Mark Grantz.

    If you think criminals are bored of Ransomware, think again! The ransomware market is anything but boring. Criminals are continuing to flock to ransomware as the barriers to entry, RaaS or ransomware-as-a-service, make it easy for anyone to try their luck at digital extortion. The authors behind Cerber — currently the most prominent ransomware family — release updated variants every 8.4 days on average!

    Join Amar Singh, global CISO and CEO of Cyber Management Alliance and US Secret Service Special Agent Mark Grantz as they
     
    •Dig deep into the inner workings of advanced cyber criminal gangs
    •Share how law enforcement agents, like Mark Grantz, keep pace and take down these criminal outfits and police cyberspace.
    •Share best practice tips and strategies on securing your organisation.
     
    Joining Mark and Amar are Ronny Wolf from GFI, Brian Laing from Lastline and cyber and data privacy expert Chris Payne from Advanced Cyber Solutions.
  • Future of B2B Online Retailing: Landscape and Platform
    Future of B2B Online Retailing: Landscape and Platform Malabika Mandal, Senior Research Analyst - Visionary Innovation Group Recorded: Oct 4 2017 45 mins
    Online business-to-business (B2B) eCommerce is at a retraction point. The B2B market will outgrow the business-to-consumer (B2C) market by 2025, marking the beginning of an important transformation for B2B. The focus area for B2B vendors has shifted from procurement tools and electronic data interchange (EDI) to hypermarkets and an omni-channel presence, thereby creating a unique and personalized service experience. B2B growth strategies will include investing aggressively in born-in-the-cloud platforms that are increasingly selling speed, scale, and simplicity. The value proposition of B2B models (one-to-many and many-to-many) will depend on the impact of mobility and the role of digital channels.
  • 11 Symptoms of a Broken Recurring Revenue Model
    11 Symptoms of a Broken Recurring Revenue Model Jeff Wissink, Managing Director and Stephen Terry, Director of Subscription Services, Navint Partners Recorded: Oct 3 2017 39 mins
    Recurring revenue and subscription business models are taking hold across every market sector. Initially the transition to recurring revenue is simple. But as a company scales and diversifies their products, operational issues are exposed that have real business consequences. Organizations are finding that their traditional methods, tools, and approaches are not only a hindrance, but eroding the recurring revenue business.

    This webinar covers the 11 organizational symptoms such as mushrooming headcount, customer churn, reporting inaccuracies and more, that should alert you to a severe problem—reduced performance and increased operational cost—in your subscription business.

    Jeff Wissink, Managing Director for Navint Partners has 22 years of experience in interim Executive Leadership (CIO), business strategy realization and enterprise business transformation. His expertise includes extensive work with consumer products, SaaS, apparel/retail, and media and entertainment.

    Stephen Terry, Director of Subscription Services, Navint Partners has over 20 years of experience delivering product and service innovation. He has developed deep expertise in helping clients transition their product catalog, operating practices, and business systems to build and grow subscription and consumption revenue streams.
  • How to Make the Most of Your Data - HR Analytics
    How to Make the Most of Your Data - HR Analytics Nicola Feare - HR Director, Tableau Recorded: Sep 29 2017 49 mins
    A company’s most important asset is their people. Organisations that use data to make informed decisions about employees will help recruiters gain, retain, develop and nurture high performing teams and programs. This webinar is part of the "Analytics in Action" week.

    Join this live webinar with Tableau's HR Director, Nikki Feare, to see how data-driven decision-making has made Tableau's HR team more proactive and agile.

    You'll learn how Tableau's HR department uses Tableau to:

    *Find insights for compensation
    *Track recruiting metrics
    *Visually analyse resource management
    *Optimise budget across multiple programs
  • Three Case Studies in SD-WAN Deployments
    Three Case Studies in SD-WAN Deployments Lloyd Noronha, Head of Global Marketing, Viptela Recorded: Sep 28 2017 43 mins
    This webinar will discuss case studies from customers across healthcare, financial, and manufacturing that underwent transformations to SD-WAN technology. We will walk through the major issues that drove the transformation, and the migration journey for each customer. Beyond significant reduction in WAN Opex, there are common themes of challenges that SD-WAN solves across industries. These include resiliency for critical applications, agile change control, secure isolation of critical assets, and building a cloud-aware infrastructure.

    Webinar Highlights:

    · Key WAN problems for three customers in healthcare, financial, and manufacturing
    · Different drivers for SD-WAN (M&A, Bandwidth shortage, long times for change control, lack of app visibility)
    · Difference in choices of Hybrid WAN architecture
    · Walking through the testing process, pilots and full deployments
  • Are You Running The Right Business Vehicle Program?
    Are You Running The Right Business Vehicle Program? Dillon Blake - General Manager - Southwest and Senior Sales Director Recorded: Sep 28 2017 45 mins
    Many firms have a love-hate relationship with their business vehicle program, but it doesn't need to be that way.
    Join us for a information packed 45 minute webinar as we discuss your different options in programs.
  • How to Make the Most of Your Data - Marketing Analytics
    How to Make the Most of Your Data - Marketing Analytics Susan Graeme - EMEA Marketing Director, Tableau Recorded: Sep 28 2017 55 mins
    Marketers are no strangers to data, especially as the number of tools generating marketing data grows each year. Curious about how much revenue was attributed to paid search last quarter? We've got data for that. Want to prove which programs generate higher quality leads than others? Data. This webinar is part of the "Analytics in Action" week.

    Here at Tableau, we rely on analytics to understand the mass of data - a challenge all marketers must overcome to thrive in a data-driven world. In this live webinar with Tableau's Marketing Director, Susan Graeme, you'll see how we tackle the marketing data dilemma.

    You’ll learn how Tableau's marketing team uses analytics to:

    *Build a Demand Generation funnel
    *Overcome our 5 marketing dilemmas
    *Visually analyse data from our marketing technology stack
    *Connect disparate data sources (Salesforce, Eloqua, Google Analytics)
  • How to Make the Most of Your Data - IT Analytics
    How to Make the Most of Your Data - IT Analytics Brian Smith - VP of Technical Operations Recorded: Sep 28 2017 59 mins
    At Tableau, we use Tableau to run every part of our business, from Sales, Marketing, Development, HR to everything in between. At the center of it all is our IT team, not only do they manage our entire global Tableau platform, but they also use Tableau to monitor and track infrastructure, assets, budgeting, staffing, and their ServiceNow ticketing queue. This webinar is part of the "Analytics in Action" week.

    Join this live webinar to learn how Tableau's IT department uses analytics to:

    *Support our internal instance of Tableau
    *Create a secure environment for thousands of employees
    *Track infrastructure, budgeting, and our support ticket queue
    *Manage Tableau Online for all of our customers
  • Moderne Endpoint-Sicherheit - Selbstverteidigung für Fortgeschrittene
    Moderne Endpoint-Sicherheit - Selbstverteidigung für Fortgeschrittene Christian Husemeyer , Systems Engineer, FireEye Recorded: Sep 28 2017 49 mins
    In unserem Webinar “Intelligente Endpunktsicherheit: mehr als nur Vorbeugung” vom 19. Juli 2017 haben wir aufgezeigt, worauf Sie achten sollten, damit Ihre Sicherheitslösung Ihre Endpunkte lückenlos schützt.

    In unserer Live-Demonstration gehen wir einen Schritt weiter und zeigen Ihnen, wie Sie sich im Falle eines Angriffs verteidigen oder Angreifern sogar zuvorkommen können.

    Erleben Sie, wie mit innovativen proaktiven Erkennungs- und Präventionsfunktionen von FireEye Bedrohungen gehandhabt werden und wir professionellen Angreifern zuvorkommen, die herkömmliche Sicherheitslösungen auf Endpunkten immer häufiger erfolgreich umgehen.

    Christian Husemeyer, Systems Engineer bei FireEye, gibt Ihnen praktische Einblicke in:
    •Moderne Endpoint-Sicherheit: nicht nur Malware sondern Angriffe erkennen!
    •Automatisierte Abwehrmöglichkeiten gegen fortschrittliche Angriffe
    •Optimierte Untersuchung und Bereinigung von Angriffen
    •Aktives "Hunting" - wie komme ich Angreifern zuvor?

    Dank der Kombination aus EDR-Funktionen (Endpoint Detection and Response) und zusätzlichen Virenschutz- und Exploit-Erkennungsfeatures steht Analysten nun ein zentraler Endpunkt-Agent gegen ein breites Spektrum von Bedrohungen zur Verfügung. Das bedeutet mehr Transparenz für bekannte und neue Sicherheitsrisiken, sodass das Ausmaß und der Schweregrad eines Angriffs in kürzester Zeit genau ermittelt und aktive Gegenmaßnahmen eingeleitet werden können.

    Wir freuen uns auf Ihre Anmeldung zum Webinar.
  • The Cost of Building a Threat Hunting Team in Your SOC
    The Cost of Building a Threat Hunting Team in Your SOC Stuart Davis, Director, Mandiant Oct 24 2017 9:00 am UTC 60 mins
    At this point your SOC is effectively covering SIEM, IDP, Vulnerability Management and a number of other areas.
    However, the next phase of maturity is to build the APT Threat Hunting capability.

    Join us for a short webinar to discuss the costs of building a hunting team versus buying it.
  • The 3 Pillars of Social Selling. Part 1: Becoming The Brand & Selling You
    The 3 Pillars of Social Selling. Part 1: Becoming The Brand & Selling You Daniel Disney Oct 24 2017 10:00 am UTC 60 mins
    This 3 part webinar series will give show you the 3 key pillars to achieving social success in sales. Learn how to create the ultimate profile, build a winning personal brand, create great and consistent content and build a winning strategy. The final session will be packed with the best industry tips and tricks to make social work for you.

    Part 1 - Becoming The Brand & Selling YOU

    You're not just selling your product anymore, you're selling YOU. More and more of your prospects are looking at your social media profiles and this will influence buying decisions. Find out the best personal branding tips and how to build a profile that will generate opportunities, not scare them away.
  • Best Practices for Enterprise Cyber Intelligence Operations
    Best Practices for Enterprise Cyber Intelligence Operations Igors Konovalovs, Strategic Account Manager, GSI Sales Oct 24 2017 11:00 am UTC 45 mins
    Identifying effective threat intelligence is not easy. Learn what it means to have timely, relevant and actionable threat intelligence and how it can help you respond to threats quickly and decisively.

    This webinar explains:

    · Why do organisations require Cyber threat intelligence?
    o To aid technical and business decision making
    o To identify and manage risks
    o To efficiently deploy capital against the threats that matter to enterprise

    · The key requirements for establishing a cyber threat intelligence function
    · Basic cyber threat intelligence workflows
    · Resource and training requirements to support a Cyber Threat intelligence function
  • The Security Paradigm: "From the Cloud, To the Cloud, In the Cloud"
    The Security Paradigm: "From the Cloud, To the Cloud, In the Cloud" David Grout, Director, Southern Europe Systems Engineering, FireEye Oct 24 2017 2:00 pm UTC 45 mins
    Cloud adoption is a reality today, every company is moving applications and businesses in the cloud to get more flexibility, agility and to potentially reduce their costs.

    Security operations need to enable this transformation and help the business to activate capabilities in the cloud infrastructure. Risks exist and cannot be ignored if companies want to provide a sustainable and secure environment for themselves and their customers.

    During this webinar, we will describe the main risks associated with cloud adoption and cover how to mitigate those risks.  
  • How to Bridge the Gap between Citizen Developers and Corporate IT
    How to Bridge the Gap between Citizen Developers and Corporate IT Stephen Terlizzi Oct 24 2017 5:00 pm UTC 30 mins
    Not everyone can write code – but nearly anyone can solve a problem. Today's businesses are facing an ever increasing set of problems that require innovative digital solutions. Learn how to safely enable a new army of application developers: the citizen developer.

    This webinar will examine the use of citizen developers to meet the ever increasing demand for new applications. We will discuss:

    • The current challenges with citizen developers and the gap between them and corporate IT

    • An new approach to the application development lifecycle to reduce the complexity of software development and empower this new army of developers

    • The concept of gadgets and their role in providing functionality in a secure and compliant manner

    • Potential areas where citizen developers can quickly build their own applications
  • Philips Accelerates Innovation with Intelligent MDM and Integration Hub
    Philips Accelerates Innovation with Intelligent MDM and Integration Hub Manu Shivashankar, Delivery Manager MDM, Philips Oct 24 2017 5:00 pm UTC 60 mins
    Royal Philips of the Netherlands is a leading health technology company focused on improving people’s health and enabling better outcomes across the health continuum from healthy living and prevention, to diagnosis, treatment and home care. Philips focuses on creating people-centric innovations for 120 years.

    By leveraging advanced technology and deep clinical and consumer insights, Philips innovates to deliver innovative, integrated solutions to its customers. These are meaningful innovations that let Philips’ customers be healthy, live well and enjoy life.

    Join us as we speak to Philips about their modernization approach, master data strategy, and architecture to support data-driven innovations. In this webinar, you will:

    •Hear Philips describe how the company uses a modern data integration hub architecture with master data management
    •Learn how master data management provides one place to master clinical/health, consumer, vendor, product, financial, employee and machine-readable data
    •See how a data integration hub publish/subscribe architecture simplifies controlled delivery of consistent master data
    •Discover the benefits Philips has realized in improving decision quality, reducing cost of manual data reconciliation and alignment, and gaining competitive advantage through improved time-to-market efficiency
    •See a deep-dive into the architecture and the benefits of this approach over traditional approaches
    •Engage in a question and answer with Philips and Informatica experts
  • How to Get More Personal Data Without the Risk
    How to Get More Personal Data Without the Risk Nathan Rowe, Chief Product Officer, Evident Oct 24 2017 6:00 pm UTC 45 mins
    Personal data is essential for your business - to enable trust and safety, to enable personalization of services, to enable growth of your business and to enable verification of identities. While obtaining and managing personal data is necessary, it can be extremely complicated, time consuming and risky. Handling or holding sensitive data can lead to major security threats. Companies are investing more time and energy to effectively acquire, manage and protect the personal information of their users and workforce to the detriment of their own business focus. Additionally, the regulatory requirements and liability that accompany any interaction with personal data continue to increase, putting additional strain on businesses to stay updated and compliant.

    From a user perspective, as individuals are asked to provide their information more broadly, security concerns and a loss of control become more prevalent, putting once-standard interactions at risk. These put even more pressure on businesses to protect their communities’ information as well as their brand equity.

    This presentation will discuss what challenges are faced by companies dealing with personal data related issues. We will cover best practices, real world examples and lessons learned as businesses look to increase their access to the answers they need, while reducing their risk and liability.

    Key takeaways
    - Best practices for how to share and secure personal information
    - Pitfalls to avoid as you grow your organization and expand offerings
    - Hear real world examples on how businesses engage with their communities and personal data
  • Transhumanism: The Next Generation of Humanity
    Transhumanism: The Next Generation of Humanity Lauren Taylor, Principal Consultant, Visionary Innovation Group Oct 24 2017 6:00 pm UTC 60 mins
    Are you curious to know how biological augmentation will drive developments in anti-aging solutions and the reduction or elimination of infectious diseases? Are you interested in understanding what technologies will drive human thought evolution? Are you covering the innovation in implants and wearable’s that could have what may seem to be superhuman capabilities? Are you anxious to better understand new growth opportunities from industry experts on the future of humanity and what our world could look like in the next 30 years?
  • Endpoint Security: No longer taking a back seat!
    Endpoint Security: No longer taking a back seat! Remon Verkerk, Systems Engineer, FireEye Oct 25 2017 10:00 am UTC 60 mins
    Endpoint security has long been an obvious necessity, but mostly proved a resource heavy burden with limited value. The threat landscape has changed and so have the attack vectors. Endpoints are a popular and often easy in to customer networks. This ideal stepping stone needs proper protection and NGAV is no longer sufficient. Privacy laws and regulations demand answers quickly when things go south and data breaches occur. The endpoint is usually a good starting point to provider answers to questions like:

    - Is there command and control activity?
    - Did lateral movement occur?
    - What other systems were accessed?
    - Et cetera…

    This webinar explains how FireEye Endpoint Security (HX) helps our customer to protect their endpoints, and enable you to go from alert to fix in a matter of minutes. Visibility, speed and cost efficiency are the key components in this solution.

    After this webinar, you will have good understanding of the capabilities on countering attacks on your endpoints, and how Fireeye’s Endpoint Security can be of added value to your organisation.



    -----------------------------------------------------------------------------------------------------------
    Keywords/tags: protection, prevention, detection, hunting, exploit prevention, AV
  • Simplify Threat Response Through Integration & Automation
    Simplify Threat Response Through Integration & Automation Anthony Leigh, Systems Engineer, FireEye Oct 25 2017 1:00 pm UTC 45 mins
    FireEye Security Orchestrator helps you improve response times, reduce risk exposure, and maintain process consistency across your security program. It unifies disparate technologies and incident handling processes into a single console that codifies experiences from the frontlines to deliver real-time guided responses.

    In this technical session we hear from an orchestration expert on best practices to simplify and automate security tools and processes. We will look at real-life examples of providing teams with greater control of incident response process for improved efficiency, thus saving time & resources and increasing efficiency and performance. We will also look at orchestration services with incident response playbooks, plug-in development, automation and workflow deployment.
  • Customer Insight: Future-Proof your Colocation Data Center
    Customer Insight: Future-Proof your Colocation Data Center Rhonda Ascierto, Research Director at 451 Research; Greg Jones, VP Strategy - Cloud & SP segment, Schneider Electric Oct 25 2017 3:00 pm UTC 60 mins
    Against the ever-changing and complex hybrid IT landscape, 451 Research surveyed more than 450 colocation customers globally – to understand the changing facets driving colocation demand and how colocation providers can be positioned for success today, and in the future. This research shows that the role of the colocation provider has never been more important – but the threats and challenges will intensify, and the opportunities will be uneven. Led by 451 Research’s Rhonda Ascierto, Research Director – Data Centers, and hosted by Greg Jones, VP Strategy – Cloud & Service Provider segment, Schneider Electric, this webinar will reveal the findings of this research along with actionable guidance colocation providers can use to plan for the future.
  • CPE Webinar: A Data Security Survival Guide in an Interconnected World
    CPE Webinar: A Data Security Survival Guide in an Interconnected World Rebecca Herold, The Privacy Professor; M P. Suby, Frost & Sullivan; Deral Heiland, Rapid7; Bharath Vasudevan, ForcePoint Oct 25 2017 5:00 pm UTC 75 mins
    Attendees can earn 1 CPE credit on this session.

    As the number of internet-connected devices skyrockets into the billions, a data security strategy is an increasingly important part of any organization’s ability to manage and protect critical information. Enterprises are migrating to the cloud in droves, however, protecting data in the cloud remains a challenge as employees push to access cloud apps from any device, anywhere. In the last year alone, 1 in 3 organizations were hacked more than 5 times, and with the increased number of attacks the financial cost of security incidents is also rising.

    In many cases, breaches are caused by a combination of benevolent insiders, targeted attacks, and malicious insiders. For example, targeted attacks are often enabled inadvertently by well-meaning insiders who fail to comply with data or security policies, which can lead to a data breach. In this webinar, our panel will discuss major trends impacting cyber security – from the rising frequency of attacks and types of threats that organizations should be concerned about the most, and they will adress the risks, priorities, and capabilities that are top of mind for enterprises as they migrate to the cloud.
  • Using EU GDPR Compliance to Build Better Apps
    Using EU GDPR Compliance to Build Better Apps Nathan Devoll, CA Technologies Oct 25 2017 6:00 pm UTC 60 mins
    With less than a year before the EU General Data Protection Regulation (EU GDPR) goes into effect, many companies are scrambling to figure out how to be compliant with yet another regulation. A better way to approach this (or any) compliance initiative is to understand its basic requirements then search for solutions that will not only help you to meet compliance, but improve your business.

    Don’t just become compliant, become better! The EU GDPR is not only an opportunity to evaluate how your teams use personal data for testing, but how those teams can build better data from scratch with faster and better results.

    Join our expert, Nathan Devoll from CA Technologies, as he clearly explains the EU GDPR and builds the case for generating new data more quickly without the compliance headaches. You’ll come away with a clear understanding how you can become EU GDPR compliant and build better data, at the same time!
  • 2017- Une année déjà active pour les groupes APT
    2017- Une année déjà active pour les groupes APT David Grout, Director, Southern Europe Systems Engineering, FireEye Oct 26 2017 12:00 pm UTC 45 mins
    2017 est d’ores et déjà une des années les plus prolifiques en ce qui concerne l’activité des groupes APT. On a en effet depuis le début de l’année plusieurs exemples d’attaques majeures, d’extorsions ou de tentatives d’influences relayées dans la presse.

    Prenons une pause et regardons plus attentivement les TTPs de ces groupes, les techniques Outils et procédures qu’ils utilisent.

    Pendant 45mn nous regarderons dans le détails leurs motivations, leurs approches et nous en définirons les moyens possibles à mettre en place pour limiter voire éviter leur attaques.

    Nous couvrirons plusieurs domaines incluant les groupes sponsorisés par des états avec des volontés de prises d’avantages économiques voir de destructions de l’adversaire comme APT32 ou 33. Nous étudierons aussi les groupe jouant d’influence géopolitique et de fake news comme APT28 ou 29 et nous finirons sur le cyber espionnage (APT10) et les cybers criminels spécialisés dans l’extorsions de fond.
  • What to Consider When Transitioning to SD-WAN
    What to Consider When Transitioning to SD-WAN David Klebanov, Director of Technical Marketing, Viptela Oct 26 2017 5:00 pm UTC 45 mins
    When considering a transition to SD-WAN, there are several important capabilities needed to suit an enterprise-grade network infrastructure. This webinar will cover critical SD-WAN features and how they translate to common deployment scenarios in different industries.

    These features include:
    - Overlay capability over MPLS, Broadband and LTE
    - Unified and centralized management of the infrastructure
    - Network segmentation with per-segment topologies
    - Predictable Application SLA with centralized policies and real-time traffic steering
    - Mature routing capabilities with BGP, OSPF, VRRP, and IGMP
    - Robust zero-trust WAN security
  • Shifting Mindset on Cloud Security Controls
    Shifting Mindset on Cloud Security Controls 451 Analyst: Fernando Montenegro, Cloudvisory Speaker: Richard Eisenberg Oct 26 2017 6:00 pm UTC 60 mins
    “The traditional mindset of ‘lift & shift’ is sub-optimal. Perimeter security controls don’t need to go away, but organizations need to utilize Cloud-Native controls for micro-segmentation and stronger security of cloud resources” Source: 451 Research

    In this webinar, Fernando Montenegro, Information Security Analyst of 451 Research and Richard Eisenberg, VP Client Development of Cloudvisory will outline how companies can successfully transition to optimal Micro-segmentation and Security Orchestration in cloud, hybrid cloud, and multi-cloud environments. Done correctly, this will speed up dev-ops, greatly improve security and lower operational costs.

    1. Understand network security concepts in cloud environments, including difference between perimeter and workload controls.
    2. Learn the benefits of integration between workload security controls and DevOps processes.
    3. See Cloudvisory's approach to workload security with a demo covering key use cases such as discovery, orchestration, micro-segmentation, and auto-remediation.

    About Cloudvisory:
    Cloudvisory continuously discovers and visualizes multi-cloud infrastructures across providers like AWS, Azure, OpenStack...in real-time. It orchestrates and provisions immutable security policies with 24x7 audit and compliance.
  • Scaling Self-Service Analytics at Cox Enterprises
    Scaling Self-Service Analytics at Cox Enterprises Victor Wronowski, Applications Analyst, Cox Enterprises & Russ Johnson, Lead Project Manager, Cox Enterprises Oct 31 2017 3:00 pm UTC 60 mins
    Cox Enterprises is a leading communications, media and automotive services company. With revenues exceeding $20 billion and approximately 60,000 employees, the company's major national brands include Autotrader, Kelley Blue Book and Manheim.

    Attend this live webinar to learn how Cox Enterprises successfully empowered their employees to make data-informed decisions with self-service business intelligence.

    You’ll also learn how to:

    •build and maintain momentum with your business intelligence platform
    •empower people to quickly deliver meaningful results with data
    •set up processes that will quickly get team members up to speed
  • Getting the Most from Big Data: The Benefits of Partnering with a DBaaS Provider
    Getting the Most from Big Data: The Benefits of Partnering with a DBaaS Provider Jim Curtis 451 Research, Steve Croce, Product Manager for ElasticSearch and DBaaS Object Rocket Oct 31 2017 6:00 pm UTC 60 mins
    Clearly, the onslaught of data, particularly big data, continues to cause many organizations to look for new ways in which to store, analyze, and manage that data. Cloud computing from public cloud vendors is often one place in which enterprises turn. Traditionally deployed and managed on-premises, databases are the lifeline of many enterprises. And while the cloud is appealing for a number of reasons, there are still questions on the minds of many organizations in choosing the right cloud partner to manage their database in the cloud.
  • Webinar - Quelle signature électronique pour quel usage ?
    Webinar - Quelle signature électronique pour quel usage ? Selma Chauvin - Audrey Pedro Nov 1 2017 1:00 pm UTC 45 mins
    La signature électronique n'est que le début de la digitalisation. En simplifiant, sécurisant et en rendant 100% numérique n'importe quel processus de validation ou d'approbation, vous irez de l'avant !

    Faire signer des documents de manière électronique, à distance via une invitation par email, en quelques clics sur un site web ou en face à face sur une tablette, simplifie l’ensemble des processus de gestion.

    Fini l'impression, la signature manuelle, le scan ou l'envoi par la poste : vous réduisez vos coûts de 40% et devenez le véritable héros digital de votre entreprise.

    Nous vous présenterons les nombreux bénéfices de la signature électronique, pour vos processus internes comme externes :

    - Raccourcir les cycles de vente,
    - Conclure davantage d'affaires,
    - Mieux gérer ses fournisseurs,
    - Embaucher plus vite…

    De nombreuses entreprises françaises ont déjà transformé leurs processus métier en dématérialisant leur parcours de signature de, par exemple, leurs contrats de ventes, leurs contrats fournisseurs, RH, leurs processus de validations internes. Sautez le pas !
  • Retail Analytics: The Key to Unlocking Your Data
    Retail Analytics: The Key to Unlocking Your Data Simon Runc - Visual Data Analyst at Atheon Analytics & Jeff Huckaby - Global Market Segment Directo for Retail, Tableau Nov 1 2017 2:00 pm UTC 45 mins
    With tight margins, volatile markets, and changing customer demands, retailers and wholesalers can't rely on intuition alone to drive growth and adapt to change. They need data-guided analytics.

    Join retail experts Jeff Huckaby and Simon Runc to learn how visual analytics enables you to see the big picture of your retail operations by looking across datasets. You'll learn how to build a real-time dashboard so you can optimise product mix and inventory by season, market, or segment in just a few clicks.

    You will learn about:

    -How to leverage all of your data to create sustainable, profitable strategies.
    -The best tips for designing a retail dashboard
    -The latest innovations in retail analytics revealed at Tableau Conference 2017
    -Can't attend? Register now and we will send you the recording the moment it's available.
  • Provide Better Customer Experience & the Right Content with a Modern PIM
    Provide Better Customer Experience & the Right Content with a Modern PIM Doug Lavelle, IT Management Consultant at School Specialty,Inc. Nov 1 2017 3:30 pm UTC 30 mins
    As enterprises move towards a unified commerce paradigm, moving products faster and improving customer experience across channels has never been more important. The foundation for your competitive differentiation is not just trusted content, but also delivering relevant information to the micro-segments and gathering insights for improved customer loyalty. A modern PIM (Product Information Management) system is what integrates product content across the purchase lifecycle of a customer. School Specialty Inc. (SSI) has embarked on a customer-focused transformation experience and streamlined internal processes with a modern PIM platform as their foundational elements in aligning digital transformation with business strategies.


    Speaker Bio:

    • 20 years of IT/IS management and technical experience

    • MDMCenter iImplementation for School Specialty

    • Lead implementation of a full ERP (Infor M3) solution for OtterBox

    • Over 9 years with Staples/Corporate Express as the Director IS Contract Systems,
    responsible for leading the development and architecture groups of e-Commerce,
    PDM, ERP, SFA, Process Architecture and Technical Architecture
  • Automating Analytics With Artificial Intelligence
    Automating Analytics With Artificial Intelligence Pat Richards, Director of Big Data and Analytics, Intel and Mary Beth Ainsworth, AI and Language Analytics Strategist, SAS Nov 1 2017 5:00 pm UTC 60 mins
    Buzzwords can be daunting. Take artificial intelligence – everyone's talking about it, so you feel like if you're not using it to further your business goals, you're falling behind. The good news is the real action around AI is happening now through advancements in analytics – faster computing, more complex algorithms and intelligent analytical output. But, because computers don’t understand strategy, human integrity is needed to identify and implement your organization’s vision for embracing AI. In this webinar, join Intel and SAS for a discussion on what’s needed to enable AI and what industry use cases can support development of your strategy.
  • DSGVO – Agieren oder Reagieren?
    DSGVO – Agieren oder Reagieren? Ruediger Weyrauch, Director, Central Europe System Engineering Nov 2 2017 12:00 pm UTC 45 mins
    Die Europäische Datenschutz-Grundverordnung muss bis zum 25. Mai 2018 von Unternehmen, die in Europa geschäftlich tätig sind oder mit EU-Kunden Geschäfte machen, umgesetzt werden.

    Neben Maßnahmen zur Einhaltung der neuen Vorschriften sollten Sie auch einen praxistauglichen Plan für die Reaktion auf Sicherheitsvorfälle erstellen, der den Anforderungen der DSGVO entspricht. Unternehmen, die rechtzeitig mit der Vorbereitung auf das Inkrafttreten der DSGVO beginnen, können die strengeren Anforderungen als Chance nutzen, ihre Geschäftsprozesse zu verbessern, die Kundenbindung zu stärken und sich eine Reputation für vorbildlichen Datenschutz zu erarbeiten.

    Erfahren Sie in diesem Seminar, wie Sie durch Beratungsleistungen von FireEye Ihre Prozesse und Kommunikation auf den Fall der Fälle vorbereiten und trainieren können.
  • Preventing Fraud and Financial Crimes
    Preventing Fraud and Financial Crimes Kim Minor - Global Financial Services Marketing Director, Tableau Nov 2 2017 2:00 pm UTC 60 mins
    Detecting potential fraudulent activities within your organization can be challenging. Whether you are monitoring bank account activities, examining insurance claims, or investigating suspicious card payments, Tableau’s robust visualization and analytics capabilities are well matched. Join us as we partner with Visa to share the latest in fraud trends and best ways to monitor suspicious activity.

    View this live webinar and we’ll cover:

    -An overview of the trends in fraud and financial crimes and required regulation in the industry
    -How to utilise Tableau dashboards to properly monitor for potentially fraudulent activity
    -A data-driven strategy to leverage your analytics to improve fraud investigations
    -Discover how your analytics can save you time and effort while maintaining the required level of risk management and oversight needed in your operation.
  • Optimize Omnichannel Marketing with Analytics for Big Results
    Optimize Omnichannel Marketing with Analytics for Big Results Robin Way (Corios) and Noah Powers (SAS) Nov 2 2017 4:00 pm UTC 60 mins
    As a marketer, you're charged with delivering the right message to the right audience at the right time - without wasting budget. It's a tall order, but data and analytics have helped top companies achieve the optimal balance. Tune in to this webinar to hear Corios President Robin Way and SAS Principal Solutions Architect Noah Powers share optimization lessons from retail, hospitality and financial services that you can apply to your own business to boost your marketing ROI.