Hi [[ session.user.profile.firstName ]]

CxO Strategy

  • Top Security Considerations in Moving to the Cloud
    Top Security Considerations in Moving to the Cloud
    Sherif El-Nabawi, Vice President, Systems Engineering, Asia Pacific and Japan, Symantec Recorded: Aug 20 2019 30 mins
    By 2020, organisations in Asia Pacific are expected to utilise an average of 5 cloud solutions. But with 51% of these organisations storing sensitive data on public clouds and 45% feeling that the public clouds’ security features are sufficient, organisations urgently need to factor in more security considerations when moving to the cloud.

    In this webinar, Sherif El Nabawi, Vice President of Systems Engineering at Symantec Asia Pacific and Japan, discusses the top security considerations in moving to the cloud, including:

    - The risks and issues created by cloud migration
    - Symantec’s Direct to Net Secure Access Services
    - IaaS and SaaS adoption challenges and solutions
    - Why every organisation needs to establish a Cloud Center of Excellence

    Register now to watch the webinar.
  • Reaching new customers by optimizing your product data
    Reaching new customers by optimizing your product data
    Hamaad Chippa, Director of Industry Consulting and Roland O Ehigiamusoe, Senior Manager, Consumer, Analytics and Cognitive Recorded: Aug 20 2019 32 mins
    Retailers are looking to reach customers in as many channels as possible – stores, e-commerce, mobile applications, and partner marketplaces. As one can imagine, managing these various touchpoints and relationships can be complex, especially ensuring information about products are properly defined. As online shopping grew in popularity, retail organizations stood-up dedicated support teams to manage sales and marketing, separate from the rest of the business. Customers now expect retailer companies to interact with them in a seamless manner, regardless of channel.To guarantee brand continuity, a uniform customer experience, and high customer satisfaction, retailers must diligently manage product data, making sure that products are represented properly across all channels. With better product information and insight, retailers will be to engage with customers in a more personal and meaningful way, driving additional revenue.
  • [PANEL] Beyond Perimeter-Based Security
    [PANEL] Beyond Perimeter-Based Security
    Jo Peterson (Clarify360) | Tina Gravel (Cyxtera) | Adrian Taylor (ITC) | Josh Frantz (Rapid7) Recorded: Aug 19 2019 48 mins
    For years organisations have relied on perimeter-based security strategies to protect and secure their networks. As the workplace becomes increasingly fluid, it is clear that relying solely on perimeter-based security is no longer suitable.

    Join this exclusive panel of industry experts as they discuss:
    • Where traditional perimeter-based security models fall short
    • Notable cyber attack methods and how to protect against them
    • Strategies for improved network security and how to implement them

    Speakers:
    - Jo Peterson, VP Cloud Services, Clarify360 (moderator)
    - Tina Gravel, SVP Global Channels, Cyxtera
    - Adrian Taylor, CTO, ITC Secure
    - Josh Frantz, Lead Security Consultant, Rapid7
  • Scaling DevOps Episode 2: Scaling CI Environments
    Scaling DevOps Episode 2: Scaling CI Environments
    Roni Dover, Director of Sales Innovation & Meni Besso, Product Manager Recorded: Aug 15 2019 16 mins
    It can be easy to do cutting edge DevOps for small teams working on small-scale projects. However, different problems start to emerge when scaling DevOps processes and operations to multiple (sometimes distributed) teams, complex deployments, multiple technologies (Kubernetes, instances, and serverless functions), and critical production systems with millions of users being affected by each change.

    In the second episode in the series, we will discuss the specific challenges DevOps engineers and developers face in scaling cloud environments for continuous integration and CI tools such as Jenkins or Teamcity. We will discuss how we view the 'shift left' movement and how it impacts the complexity of developing scalable end-to-end automation for your cloud environments.
  • Cloud-Native Operations with Kubernetes and CI/CD
    Cloud-Native Operations with Kubernetes and CI/CD
    Paul Czarkowski, Principal Technologist, Pivotal Software Recorded: Aug 15 2019 62 mins
    Operations practices have historically lagged behind development. Agile and Extreme Programming have become common practice for development teams. In the last decade, the DevOps and SRE movements have brought these concepts to operations, borrowing heavily from Lean principles such as Kanban and Value Stream Mapping. So, how does all of this play out if we’re using Kubernetes?

    In this class, Paul Czarkowski, Principal Technologist at Pivotal, will explain how Kubernetes enables a new cloud-native way of operating software. Attend to learn:

    ● what cloud-native operations are;
    ● how to build a cloud-native CI/CD stack; and
    ● how to deploy and upgrade an application from source to production on Kubernetes.

    We look forward to you joining us.
  • Top 5 Podcasts: Digital Transformation From Cisco to GE and Beyond with Bill Ruh
    Top 5 Podcasts: Digital Transformation From Cisco to GE and Beyond with Bill Ruh
    Ed Maguire, Principal Partner, Momenta Partners & Bill Ruh, CEO of Digital Business at LendLease Group Recorded: Aug 15 2019 58 mins
    Bill Ruh is CEO of Digital Business at Lendlease Group, a global developer and construction company for high rise and other real estate developments. Previously, he was the Chief Digital Officer for all of GE and CEO of GE Digital. Our conversation explored the nature of digital transformation, the considerations for creating goals and aligning the organization for success. One of the key insights is that transformation for industrial firms draws from best practices of technology companies, and the core principle is that technology companies’ missions are tied to asset optimization and better outcomes. He also shared how large companies need to think of transformation in two speeds – shorter term and longer term, where Speed 1 is the quarter to quarter focus and Speed 2 is the long term “moon shots”. He compares and contrasts the innovation mindset and approaches between startups and established companies, and shares best practices for larger companies to bridge the cultural gaps between their legacy and digital businesses. He also shares his views of the future of the construction and real estate industries enabled by the transformative impact of new technologies, which he is spearheading in his new role at Lendlease.
  • Why You Should Have Zero Trust in the Web
    Why You Should Have Zero Trust in the Web
    Menlo Security Recorded: Aug 15 2019 38 mins
    "Trusted” Websites Are Not as Safe as First Thought!

    Today, attackers leverage the web’s ubiquity and users’ trust to infect devices and propagate malware. Website categorization has been compromised. Phishing and spear-phishing attacks drive today’s most significant data breaches, and clicking on apparently legitimate links within phishing emails exposes users to credential theft or malware infections, and possibly ransomware. “Trusted” websites are not as safe as first thought, and the list goes on.

    Whether users are accessing it for business or pleasure, the Internet today is no longer a place that can be trusted.

    Watch this webinar to learn how you can protect your users and lower your odds of a web-borne, companywide cyberattack.

    Discover:

    - Why the internet remains a dangerous place
    - Best practices for lowering the odds of a cyberattack
    - Newer technologies that are solving this problem
  • 5 Lessons learnt from 5 real-world AI Deployments
    5 Lessons learnt from 5 real-world AI Deployments
    Iain Brown, Head of Data Science, SAS UK&I Recorded: Aug 15 2019 46 mins
    Aiming to dispel the AI myth from the AI reality.

    This session provides practical real-world applications of AI solutions detailing the lessons learned and the pitfalls to avoid. You will understand the critical factors that will make your AI strategies successful and see what AI could deliver within your organisation.

    In addition we will discuss how to make sure AI is ethical by design, and why a governance framework is the crucial first step in ensuring AI is used in the right way.

    Speaker: Iain Brown

    Dr. Iain Brown (Twitter: @IainLJBrown) is the Head of Data Science at SAS UKI and Adjunct Professor of Marketing Analytics at University of Southampton working closely with the Financial Services sector, providing thought leadership on the topics of Risk, AI and Machine Learning.

    During his time at SAS he has been involved in delivering numerous projects, and driving innovation in the fields of AI and the corresponding fields of machine learning, deep learning and natural language understanding.

    As an experienced public speaker, he has presented at a number of internationally renowned conferences and conventions and has papers published in the European Journal of Operational Research, International Journal of Forecasting and the Journal of Expert Systems with Applications on the aforementioned areas of expertise
  • Strengthen Endpoint Security with Real-time Visibility and Remediation
    Strengthen Endpoint Security with Real-time Visibility and Remediation
    Rob Barker, Product Manager, Symantec Recorded: Aug 15 2019 46 mins
    In today’s world of increasing threats, there is a greater need to reduce the latency in data collection and act quickly based on that data. Join us on August 15 for a special webinar focused on our new real-time visibility and remediation capabilities to help protect and secure endpoints.

    In this webinar, we will discuss and demonstrate how Symantec endpoint management provides:

    Real-time management
    • gain deep visibility into your organization’s endpoints and software
    • make better-informed decisions
    • take faster actions such as identifying vulnerabilities and quickly deploying the appropriate patches and updates

    Integration with Symantec Endpoint Protection (SEP)
    • quarantine endpoints that fail a compliance scan to prevent the spread of infection
    • monitor the health of the SEP agent and quickly remediate if needed

    Don’t miss this great opportunity to learn how Symantec endpoint management solutions can strengthen endpoint security and maximize user productivity.

    Register Today
  • Today’s State of S&OE
    Today’s State of S&OE
    Hear from Victoria Chen, who has been helping F500 companies achieve supply chain operational excellence for over a decade Recorded: Aug 14 2019 33 mins
    Time is running out, so register today to save your spot.
  • Combat Phishing: How to Turn Links Into Read Only
    Combat Phishing: How to Turn Links Into Read Only
    Jonathan Lee, Sr. Product Manager - Menlo Security Recorded: Aug 14 2019 53 mins
    99% of security breaches are initiated through email and webmail attacks. Thus, proving prevention obviously fails, and detection and response are far from guaranteed. So why try the same old failed security approaches?

    It’s time to try something that’s transforming email security—isolation. Isolation doesn’t block threats—it eliminates.

    In this webcast, attendees will learn:
    -How to combat users who are re-offenders when it comes to clicking unsafe email links and attachments
    -Need an additional layer other than a sandbox waiting for patient zero
    -The ease of deploying isolation without interfering with user experience in 10 minutes

    Save your seat to see how Isolation can help you eliminate malware and improve productivity of your employees.
  • APIs & Microservices for a Modern and Integrated Enterprise
    APIs & Microservices for a Modern and Integrated Enterprise
    Renu Motwani Recorded: Aug 14 2019 23 mins
    Digital Transformation starts with the need for modernization of legacy systems and/or integration of the existing systems with the modern cloud. APIs form the first logical step in undertaking that journey. The underlying implementation: business logic, integration with the vast variety of data sources - both new and legacy, follows as the next important undertaking – and that defined the role of Microservices. In this session we'll dive deeper into how APIs and Microservices can help define a modern, digital enterprise.
  • Industrial Cyber Security as a Service – Defense in the Cloud
    Industrial Cyber Security as a Service – Defense in the Cloud
    Chris Grove & Michael Rothschild Recorded: Aug 13 2019 62 mins
    When it comes to critical infrastructure and industrial operations both the attack surface and attack vectors are increasing at an unprecedented rate. And while virtually every industrial vertical of every size is at risk not all are able to deploy massive amounts of gear on site to protect from all OT threats. This is where Industrial Cyber Security as a Service (ICSaas) comes in.

    Join us for this webinar where we will discuss:
    •What is ICSaaS and how it works
    •When to go virtual, hybrid or fully physical
    •Benefits and limitations of each scenario
    •How to decide what will work best for you
    •Questions you should ask to help find the best solution
  • Symantec Emerging Technologies: We Invest So You Don't Have To
    Symantec Emerging Technologies: We Invest So You Don't Have To
    John Cunningham, Vice President, Emerging Technologies, Asia Pacific, Symantec Recorded: Aug 13 2019 24 mins
    Staying current with the latest digital technologies can be a costly endeavour to both implement and secure, yet organisations cannot afford to fall behind. How can an organisation keep up with the ever-changing digital business landscape?

    Join John Cunningham, Vice President of Emerging Technologies, Asia Pacific at Symantec, in this webinar as he discusses:

    - The challenges organisations face trying to keep up with the digital landscape
    - How Symantec’s investments in emerging technologies can aid organisations
    - Symantec’s acquisition of Luminate to help organisations achieve Zero Trust
    - The enhancement of Symantec’s web isolation capabilities with Fireglass

    Register now to watch the webinar.
  • SkyStem: Overview of the SEC's Whistleblower Program
    SkyStem: Overview of the SEC's Whistleblower Program
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Aug 8 2019 57 mins
    [Live Recording] Join us for an overview of the SEC's Whistleblower Program. Learn about how the program is set up, the extent of damages awarded to date, and the resulting benefits the program has produced for our society at large.

    Please note: CPE credit not available for this playback
  • Scaling DevOps Episode 1: Challenges of Scaling DevOps
    Scaling DevOps Episode 1: Challenges of Scaling DevOps
    Roni Dover, Director of Sales Innovation & Meni Besso, Product Manager Recorded: Aug 8 2019 20 mins
    It can be easy to do cutting edge DevOps for small teams working on small-scale projects. However, different problems start to emerge when scaling DevOps processes and operations to multiple (sometimes distributed) teams, complex deployments, multiple technologies (Kubernetes, instances, and serverless functions), and critical production systems with millions of users being affected by each change.

    In this webinar series, we will reveal and provide solutions to the challenges of scaling DevOps including:

    - Scaling Continuous Integration environments
    - Automating complex environments
    - Establishing processes for increased productivity
    - Standardizing environments from development to production
    - Managing governance and policies
    - Deploying to production

    In this first introductory episode, we'll lay the groundwork for the series and discuss some common challenges we've seen first hand at numerous organizations trying to scale their DevOps. Some of these challenges are technical in nature whereas others have to do with culture and processes and the need to balance the need of multiple stakeholders involved in the DevOps process. Why are DevOps engineers frustrated and what is always but always easy to scale?
  • RPA + AI – Delivering intelligent automation in supply chain & logistics
    RPA + AI – Delivering intelligent automation in supply chain & logistics
    Ramesh Muniyandi, Senior Manager - RPA Recorded: Aug 8 2019 58 mins
    According to ISG, a global technology research firm reports that in forthcoming years, most enterprises will shift towards using RPA to increase productivity & level of compliance and efficiency in Supply Chain & Logistics.
    The webinar will shed lights on why intelligent automation is the future of supply chain and how enterprises can quickly adopt RPA to streamline processes, increase productivity and deliver exceptional results.
    Join this webinar to learn:
    1. How to implement RPA in supply chain & logistics processes
    2. Creating a smart data-centric supply chain organization
    3. Making better & faster decisions with Intelligent Automation
    4. Deliver better customer satisfaction using Intelligent Automation
    5. Success Story
  • What is your (Computer) Vision of AI?
    What is your (Computer) Vision of AI?
    Federica Citterio, Data Scientist, SAS Global Technology Practice Recorded: Aug 8 2019 32 mins
    While some still associate Artificial Intelligence with robots taking over the world, we are surrounded by far more realistic and beneficial examples of AI in our everyday life.

    Find out how applications of computer vision reinforce the interplay between man and machine.

    About the Webinar:

    In the last few years, the field of machine learning has made tremendous progress around computer vision. Convolutional neural networks can achieve reasonable performance on difficult visual recognition tasks – matching or even exceeding human performance in some domains.

    In this session we will explore successful use cases for computer Vision including various industries and aspects of everyday life. We want to uncover the value of moving your AI projects out of the lab and into the business.

    Speaker: Federica Citterio

    Federica is a Data Scientist at SAS, working across EMEA on the latest SAS technologies involving Artificial Intelligence. She is excited about combining business and data science to help companies make better decisions, grounded in trusted data and assisted by analytics

    Federica holds a master’s degree in applied mathematics from University of Milan, majoring in Statistics, Probability and Numerical Analysis.
  • Security Begins Here: Insight from Shan Lee
    Security Begins Here: Insight from Shan Lee
    Nominet Cyber Security Recorded: Aug 8 2019 5 mins
    Nominet’s Security Begins Here series captures thoughts and opinions from some of the most influential and vibrant voices in the cyber security industry. We explore the issues organizations are exposed to every day at every level: from digital transformation, to cloud security and cyber confidence. Our series experts draw from first-hand experience to explain how they have dealt with today’s cyber challenges, with advice on how others can better manage security risks.

    Shan Lee is CISO and DPO at TransferWise, a financial company for people who travel, live and work internationally. In this video he discusses his views on security culture in the workplace, as well as the challenges companies face in the fast-evolving wold of cloud security and cyber confidence.

    #SecurityBeginsHere
  • Digital Transformation: Perspectives from Industry Leaders
    Digital Transformation: Perspectives from Industry Leaders
    Nominet Cyber Security Recorded: Aug 8 2019 3 mins
    Today, if an organization is unable to keep pace with digital disruption its very existence is at threat. What’s more, unlike many previous business challenges, digital transformation is not a one-off event. Rather, it’s an unfolding process that changes over time as new technologies emerge that lead to new business models and modes of differentiation.

    Digitally transforming an enterprise to a point where it is capable of continual innovation is a huge prize, but it also brings with it a range of challenges, particularly when it comes to cyber security. In the digital age, organizations can no longer hide behind the security of their perimeter walls. Instead, they must open up digitally to partners, suppliers, IoT devices and even competitors in order to create the seamless, customer-centric services people increasingly demand.

    We spoke with industry leaders to garner their views on cyber security in the age of digital transformation.
  • データ仮想化とは ~ データ統合のための最先端ソリューションのご紹介(更新版)
    データ仮想化とは ~ データ統合のための最先端ソリューションのご紹介(更新版)
    赤羽 善浩 パートナービジネス戦略部長 Denodo Technologies 株式会社 Recorded: Aug 8 2019 39 mins
    データ仮想化とは、どのようなソリューションなのか。昨今データ活用に注目が集まる中、データ統合や連携は重要な位置づけになりつつあります。データ仮想化は、データの物理的な複製なしでリアルタイムにデータ統合を実現できる、これまでとは全く異なる手法を採用するデータ統合戦略です。本ウェビナーでは、データ仮想化について、事例を交えてご紹介します。(本編は30分程度を予定しています。Q&Aのお時間も含めて1時間程度になります)
  • How to Recruit and Attract the Best Talent
    How to Recruit and Attract the Best Talent
    Helen Chao, Ravi Goel, Vivi Fenwick, Keith Halperin Recorded: Aug 7 2019 41 mins
    Join this panel discussion to learn:

    - How culture changes as a company scales and how the culture shift impacts recruitment

    - How to set realistic hiring expectations in order to hire quality candidates

    - Hiring strategies for technical roles
  • Quantifying Culture: How to Use AI to Turn Culture into Competitive Advantage
    Quantifying Culture: How to Use AI to Turn Culture into Competitive Advantage
    Erin Michelson is Founder & CEO, Summery Recorded: Aug 7 2019 48 mins
    An introduction into how to leverage behavioral science and AI technologies, such as Machine Learning & Natural Language Processing, to attract and engage top talent. The discussion focuses on the scientific methodology underscoring the Net Culture Score℠ and Employee Net Culture Score℠ assessments. Use cases demonstrate the advantages of using evidence-based applications to measure, re-engineer, and monitor your corporate culture, providing a look at the future of HR analytics.

    Participants will learn how engineering corporate culture can benefit:
    · HR Executives: Increasing stakeholder accountability, workgroup productivity and corporate profitability by establishing and auditing a cultural baseline
    · Recruiting Managers: Maximizing the pool of diverse candidates and using AI-based social impact values matching to close open positions faster
    ·Applicants & Employees: Providing personal insights into your social impact values to better discern cultural alignment & find opportunities for advancement

    Speaker Bio:
    Erin Michelson is Founder & CEO of Summery (www.summery.ai) a data analytics company that harnesses AI technologies to help companies better recruit, retain, and engage high performing talent. Erin has been profiled in @BBCTech, @Entrepreneur, @NPR, @NatGeoTraveler, @FoxNews, and @HuffPost. Follow her @ErinMichelson
  • How to achieve GRC Maturity using ServiceNow? (Part-2)
    How to achieve GRC Maturity using ServiceNow? (Part-2)
    Clara Abraham, GRC Consultant; Swetha Shankar, ServiceNow Specialist; Kaviarasan S, ServiceNow Evangelist. Recorded: Aug 7 2019 50 mins
    In this part-2 of the GRC webinar, we are going to cover the stage 2 in achieving GRC maturity – ‘Improve Visibility and Performance’. In the previous session, we have covered how to get on-board in ServiceNow GRC from a manual processes. This session would cover step-by-step process on the following areas:

    Key takeaways:

    Introduction to stage 2: Repeatable (Improve Visibility and Performance)

    - Expand GRC/IRM to 2-3 use cases
    - Adoption expansion to process and control/risk owners
    - Monitoring on a point- in-time basis
    - Visibility through Dashboards & PA.
    - Start top-down. Leverag the Profiling engine

    Demo on ServiceNow GRC to cover the following:

    - Scoping for GRC using profiles
    - Controls management - Control Attestation and Control Indicators
    - Enterprise risk management - Risk assessments, Upstream and downstream risks and Risk Indicators
    - Dashboards to monitor controls and risks
  • How to Create a Data Strategy for Virtualization
    How to Create a Data Strategy for Virtualization
    Erik Ottem, Sr. Director, Data Center Systems at Western Digital Corporation Recorded: Aug 7 2019 28 mins
    Virtualization has been around for quite a while. Now might be a good time to review what you’re doing from a data perspective. Classic hardware virtualization has been the key to consolidation efficiencies and savings. Now data virtualization can provide similar benefits in a different way. A modern data strategy should consider the benefits and costs of data virtualization. Some people are surprised to find out that hardware virtualization is not the end of the story, that there is data virtualization as well. In this webinar we’ll take a look at how having the right data strategy can improve the way you provide value to business operations by making data more available by reducing siloes and reducing the amount of management required.

    Join Erik Ottem, Senior Director, Data Center Systems at Western Digital Corporation, as he shares tips on how to get the most from a virtualized environment from a data perspective.

    In this webinar you’ll learn:

    - Data Strategy: Why organizations must start with a data strategy; the business value of building a
    data strategy and aligning infrastructure planning with that strategy

    - Shifting from Hardware Virtualization to Data Virtualization: Why viewing your virtualization strategy
    from a different lens is imperative to driving a competitive business advantage

    - Cost Savings: How implementing a data strategy can help you spend less on both building and
    managing data infrastructure

    - Virtualization-Worthy Data: How to identify what data is better housed in a virtual environment;
    including identifying the single source of truth (Golden Copy) and managing data quality

    - Case Study: we’ll take a look at how data virtualization can work in the real world and the benefits that
    have been realized.
  • Learn How Dirty Data can increase Profitability at Banks
    Learn How Dirty Data can increase Profitability at Banks
    Anand Subramaniam, Principal Architect AI & ML Practice, Aspire Systems Aug 20 2019 1:30 pm UTC 60 mins
    Figuring out how dirty data can be converted into useful insights can be a pain. Information about your customers can be easily retrieved if you have correct and actionable data that can be worked on. AI can only do wonders if this is the case. Banks that segment their customers’ data using AI have increased their revenue up to 30%. But let’s take a step back and think – when was the last time you checked for data accuracy. Or how sure are you that the data you’ve entered into your AI algorithm is correct? To predict what your banking customers are looking for, you need to have the data cleaned and all set for AI initiatives to succeed.

    In this webinar, you will learn

    • How to get the data cleaned up?
    • How to use them to get better insights?
    • How to use insights to improve your ROI?


    Speaker - Anand Subramaniam, the Head of AI Practice at Aspire Systems

    Join us on a August 20, Tuesday for an hour, discussing vital topics that can place you ahead in your data transformation journey.
  • Tackling the Top 5 Incident Response Challenges with SOAR
    Tackling the Top 5 Incident Response Challenges with SOAR
    John Moran, Senior Product Manager, DFLabs Aug 20 2019 3:00 pm UTC 60 mins
    Incident response can feel like a constant battle, especially for those analysts who are on the front lines of the organization’s response, struggling every day to protect its resources and minimize risk from any potential security events.

    While there are some inherent challenges in incident response which will exist no matter the circumstances, it is the responsibility of security managers and executives to reduce or remove impediments to the incident response process as much as possible. Incident response will never be a frictionless process, however, there are many things we can do to minimize the impediments and provide analysts with the needed resources in order to be successful.

    Year after year, security analysts express the same challenges, across all verticals. Even though we have made many important strides in the past several years, it is clear that our current approach is not adequate to completely solve the most pressing challenges we are facing.

    Incident response analysts typically possess a high drive and passion for their chosen career. Not being given the proper tools to perform a job can be demoralizing and cause the types of analysts you really want on your team to look elsewhere for career satisfaction. With competition for skilled analysts as strong as ever, this is a real concern.

    In order to overcome these challenges, organizations today are increasingly turning to the capabilities of Security Orchestration, Automation and Response (SOAR) technology to help.

    Join this webinar to learn more in-depth about these top 5 incident response challenges and how a SOAR solution can be utilized to successfully resolve them:

    - Shortage of staffing and skills
    - Lack of budget for tools and technology
    - Poorly defined processes and owners
    - Organizational silos between IR and other groups or between data sources and tasks
    - Lack of integration with our other security and monitoring tools
  • A guide to biotechnology commercialisation
    A guide to biotechnology commercialisation
    Pete Hotten Aug 20 2019 3:00 pm UTC 60 mins
    Over the past century, life sciences has exploded with innovation and it continues to promise excellent commercial opportunities for those with scientific and academic research in this area. However, research on its own is not enough for these discoveries and inventions to reach their commercial potential. With over thirty years' experience in the biotechnology sector, expert Pete Hotten provides a framework for commercialisation, what to look out for in market research and how evaluating the competition can help determine next best steps.
  • Driving Increased Productivity with Your Vulnerability Management Program
    Driving Increased Productivity with Your Vulnerability Management Program
    Tori Sitcawich, Product Marketing Manager, Rapid7 Aug 20 2019 4:00 pm UTC 60 mins
    In today’s world, security teams are faced with challenges that can oftentimes hinder the productivity of their vulnerability management programs. These challenges include working with operations teams, demonstrating ROI to leadership, and finding ways to accelerate remediation. In this session with Rapid7, learn about best practices to overcome these challenges and improve collaboration, communication, and overall productivity.

    We’ll cover:
    1. How to break down organizational silos
    2. How to track meaningful progress and build effective reports for leadership
    3. How to effectively make automation a part of your day-to-day remediation workflow
  • Achieve Development Speed and Code Quality with Behavior Testing
    Achieve Development Speed and Code Quality with Behavior Testing
    Dr. David Brumley Aug 20 2019 5:00 pm UTC 41 mins
    Join Dr. David Brumley, CEO of ForAllSecure, as he shares a proven method known as behavior testing for achieving both development speed and code quality. In this session, viewers will learn:
    -How to add continuous behavior testing to their shift-left strategy.
    -How behavior testing can help organizations not only develop quickly and securely, but also manage inherited risk from developers’ software supply chain.
    -Real-world use cases on how behavior testing is used to secure Dockerized applications.
  • The Role of Data Virtualization in an API Economy (APAC)
    The Role of Data Virtualization in an API Economy (APAC)
    Pablo Alvarez-Yanez, Director of Product Management, Denodo Aug 21 2019 1:30 am UTC 47 mins
    Digital Transformation, even though a cliche, is definitely on top of every CEO's strategic initiative list. At the heart of any digital transformation, no matter the industry or the size of the company, there is an API strategy. Application programming interfaces (APIs) are the connection points between one application and another, and as such, they enable applications to build on each other, extend each other, and work with each other. Taken together, APIs represent a thriving ecosystem of developers that is showing no sign of slowing down.

    Attend this webinar to learn:

    - How data virtualization greatly enhances the capabilities of an API
    - How data virtualization works as a service container, as a source for microservices and as an API gateway
    - How data virtualization can create managed data services ecosystems in a thriving API economy
  • DocuSign Click: Reduce your risk by capturing legal acceptance to standard terms
    DocuSign Click: Reduce your risk by capturing legal acceptance to standard terms
    Kelli Feeley, Product Marketing / Julianne Wu, Director, Product Management Aug 21 2019 9:00 am UTC 17 mins
    What if you could easily improve user experience by clearly displaying your terms and reduce your risk of non-compliance to legal standards?

    In this webinar, we’ll introduce you to DocuSign Click, one of our newest products that lets you capture customer acceptance of standard agreement “terms” with a single click on websites or mobile apps.

    Kelli Feeley, Product Marketing Lead for Click and Julianne Wu, Director, Product Management for Click, will show you how companies are using Click to:

    - Ensure sufficient evidence when capturing customer consent.
    - Deploy and maintain with speed and ease to free up their IT team’s time.
    - Reduce the risk of non-compliance to legal standards.
  • Best Practices in Threat Hunting: Optimizing the Anomalous Activity Search
    Best Practices in Threat Hunting: Optimizing the Anomalous Activity Search
    Brenden Bishop, Data Scientist, the Columbus Collaboratory Aug 21 2019 3:00 pm UTC 43 mins
    Join us for this webinar that will present an advanced data science approach to detecting anomalous behavior in complex systems like the typical corporate network that your IT Security team is trying to defend. Generalized anomaly detectors, without tuning for a specific use case, almost always result in high false alarm rates that lead to analyst alert fatigue and a detector which is effectively useless. In this session, Brenden Bishop, Data Scientist at the Columbus Collaboratory, will present an open source tool and best practices for building specific, repeatable, and scalable models for hunting your network’s anomalies. Through iteration and collaboration, defenders can hone in on interesting anomalies with increasing efficiency.
  • State of ePayables: How best in class organizations improve performance
    State of ePayables: How best in class organizations improve performance
    Bob Cohen, Research Director and VP of Marketing, Ardent Partners and Andy Moir, Senior Product Marketing Manager, Tradeshift Aug 21 2019 3:30 pm UTC 60 mins
    With advances in technology and moves toward digital transformation, today’s accounts payable departments are more focused than ever on leveraging automation to streamline the AP process, make it more efficient and enable more strategic activities to be carried out. But according to Ardent Partners’ State of ePayables 2019 report, even best-in-class organizations are still left with invoice exceptions, only about half of the suppliers submitting electronic invoices, and low early payment opportunities to improve working capital. Is that the best that we can do? Is your AP department truly digital?

    Join Ardent Partners and Tradeshift for our upcoming webinar where we will:
    • Deep dive into the challenges faced by the AP department and the drivers that shape AP leaders’ priorities on the quest to digitize
    • Present the outcomes you should be looking for in an AP transformation journey and how you should go from electronic to digital
    • Explore what best-in-class organizations do and how you can leverage to take your AP department to the next level
    • Identify quick wins and long-term strategies to improve operations and results going beyond best-in-class
  • Make Tableau perform on Massive Scale at the Speed of light
    Make Tableau perform on Massive Scale at the Speed of light
    Ajay Anand - Chief Product Officer, Kyvos Insights | Pareen Patel -Solutions Engineer, Kyvos Insights Aug 21 2019 4:00 pm UTC 60 mins
    Tableau has disrupted the BI market by delivering brilliant visual analytics across enterprises. The new challenge for Tableau users is to bring this brilliance to the consumption of Big Data with no compromise on performance.

    Kyvos is already helping thousands of Tableau users to interact with their data lakes at the speed of light, both on the cloud and on-premise.

    Attend our webinar to learn how Kyvos supercharges Tableau performance by creating a BI acceleration layer on data lakes enabling instant access to massive data. With this layer in place, Tableau connects to Kyvos, achieving high performance, irrespective of the size of your data.

    In this webinar and based on a real-life use case, you will learn how our next-generation OLAP technology helps you:

    • Use Tableau to analyze massive data on the cloud and on-premise platforms
    • Get instant responses to Tableau queries even on trillions of rows of data
    • Eliminate extracts and data movement
  • AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    Arun Trivedi Aug 21 2019 4:00 pm UTC 45 mins
    As AI becomes all-pervasive, more and more companies need to start thinking about how AI can help in their business transformation and optimization journey. According to a Gartner survey, 54% respondents plan to start deployment within the next few years. However, their are multiple barriers, including finding a starting point and fear of the unknown.

    This webinar breaks down AI for the business & IT - what use cases should CIOs and business organizations focus on and how do we get started? What are the possible use cases? How do we even go about thinking about AI in our organization in a structured way?
  • Quantifying Risk in Today’s Computing Infrastructures
    Quantifying Risk in Today’s Computing Infrastructures
    Vincent Rais, Director of Resiliency Services, Uptime Institute and Todd Traver, Vice President, IT Optimization and Strategy Aug 21 2019 4:00 pm UTC 60 mins
    The complexity of today’s hybrid environments increases risk – what do you need to look for?

    Despite the promised simplicity provided by the cloud and other technologies, the majority of IT loads still run inside enterprise data centers, leading to challenges in managing workloads across the hybrid architectures emerging between these facilities and the cloud. We’ll discuss what we are seeing, along with the challenges, focus areas and important critical success factors necessary to reduce risk and provide resiliency and uninterrupted application availability.
  • How to Integrate Virtualized Server Environments with NVMe AFAs
    How to Integrate Virtualized Server Environments with NVMe AFAs
    Matt Hebb, Product Marketing, Data Center Systems, Western Digital Aug 21 2019 5:00 pm UTC 18 mins
    As you likely know, the reason companies deployed virtualization in the beginning was to get more out of their hardware – and make their lives a little easier – it is the very same reason they are deploying it today. As a result, virtualized servers are the defacto standard in today’s data centers. While, it’s true that virtualization lowers IT infrastructure costs and allows enterprises to respond to new business needs quickly, it also creates an additional layer of infrastructure complexity. Complexity that the IT team has to manage across both the ESX and storage array layer.

    We get it – it’s a double-edged sword. Virtualization is meant to lower costs and allow quicker response time, but when the infrastructure becomes complex, the resources required to manage it could increase and offset the savings you were hoping to achieve. Join us for this webinar where we’ll address how IT can more easily manage their virtual environment.

    In this webinar, we’ll introduce you to the IntelliFlash vCenter Plug-in and share how the product offers visibility into storage datastore, offers the ability to self-provision VMs, and provides a consistent snapshot of VM-level performance metrics. In addition to better understanding the IntelliFlash vCenter Plug-in, you will learn:
    >How to simplify your VMware administrative tasks
    >How to take full advantage of All-Flash Arrays to create and deploy denser, faster VMs
  • Gaining Complete Visibility of Your Environment with Attack Surface Monitoring
    Gaining Complete Visibility of Your Environment with Attack Surface Monitoring
    Tori Sitcawich, Product Marketing Manager; Jon Hart, Principal Security Researcher Aug 21 2019 6:00 pm UTC 56 mins
    Join Rapid7 experts for an in-depth look into Attack Surface Monitoring with Rapid7s Project Sonar research and industry reports. Learn how data from these sources can be leveraged in Rapid7s industry-leading vulnerability management solution, InsightVM, to provide complete visibility into your environment.

    During this webinar, youll learn about:

    1. The importance of having complete visibility of both your organizations known and unknown assets
    2. Rapid7s unique research project, Project Sonar, that regularly catalogs the public internet
    3. Industry reports released by Rapid7 based on data from Project Sonar, among other sources
    4. How data from Project Sonar can be leveraged within Rapid7s industry-leading vulnerability management tool, InsightVM
  • Reimagine Data Governance: Data Governance. Meet Data Security.
    Reimagine Data Governance: Data Governance. Meet Data Security.
    Andy Joss, Head of Solutions & Data Governance, Steve Holyer, Solutions Specialist, Informatica Aug 22 2019 4:30 am UTC 58 mins
    With organizations collecting an ever-increasing volume of data, the risk of a data breach or falling foul of a regulator is also increasing. Data security, privacy and protection is fast becoming a “must have” requirement within many data programs.

    Organizations are starting to realize that there are potentially great synergies in having a much closer understanding of their data from both a governance and security viewpoint. Add in Artificial Intelligence and automation for remediation, together these capabilities are proving to be significant allies in the continuous battle of cyber-security and enabling Data Governance programs.

    This webinar explores how these two worlds can now better understand the role that each has to play, in supporting and protecting their organization.

    As part of the Reimagine Data Governance series of webinars, Informatica will demonstrate how having a closer relationship between the worlds of governance and security can enhance existing data use and data security capabilities. And how you, in taking that holistic approach, can provide governed and protected data to achieve key business outcomes.
  • DFLabs and SEMNet: Strengthening Security Operations with SOAR
    DFLabs and SEMNet: Strengthening Security Operations with SOAR
    Andrea Fumagalli, VP of Engineering at DFLabs and John Chai, Solution Engineer at SEMNet Aug 22 2019 7:00 am UTC 60 mins
    In the race to keep up with the increasing number and sophistication of cyberattacks, organizations need to have the capability to not only try to prevent attacks, but to also respond to them when they should occur, before they turn into more damaging security breaches.

    With security operations teams experiencing a number of common challenges and pain points, including a lack of skilled cyber security professionals, a growing volume of security alerts being received, as well as a lack of integration of existing tools in the security tool stack to name a few, organizations are recognizing the need for security orchestration and automation and response (SOAR) technology to help to overcome them.

    Partnering with DFLabs, SEMNet is able to offer its award-winning SOAR solution, IncMan SOAR to customers throughout Asia pacific, providing them with the localized knowledge, guidance and support needed to enable them to successfully implement efficient and effective security operations and incident response programs.

    During this webinar you will learn:

    - What is Security Orchestration, Automation and Response (SOAR) technology?
    - Why there is a growing need for SOAR solutions?
    - The problems SOAR technology can help you solve
    - How it helps to improve security operations and incident response programs
    - How DFLabs and SEMNet partner together to make this possible

    Plus, you will get to see IncMan SOAR live in action, discover some of its use cases and ask any questions you may have.

    Together, DFLabs and SEMNet can ensure security operations teams have the right SOAR solution in place, with standardized processes and workflows to detect, respond to and remediate security incidents in the fastest possible time frame, before significantly impacting your organization.

    Please note: Your registration information will be shared with SEMNet who may contact you in follow-up to your registration and/or attendance of this webinar.
  • Delivering an Effective Cyber Security Exercise: Enhanced Breach Response
    Delivering an Effective Cyber Security Exercise: Enhanced Breach Response
    Daniel Norman, Research Analyst, ISF Aug 22 2019 12:00 pm UTC 44 mins
    Organisations are constantly under threat with over two-thirds of them experiencing data breaches in 2018. As a result, preparedness and resiliency are paramount to protecting an organisation’s information from cyber attacks.

    Business leaders and their security teams can improve their ability to handle cyber attacks by running cyber security exercises. These exercises should help the organisation identify areas of improvement in people, process and technology, reducing the impact should a real cyber attack occur.

    In this webinar Daniel Norman, Research Analyst, ISF will share how organisations should approach running internal cyber security exercises to support breach identification, prevention and response.
  • How to overcome the challenges of a computer vision project
    How to overcome the challenges of a computer vision project
    Matthew Stainer & Haidar Altaie, SAS UK&I Aug 22 2019 1:00 pm UTC 60 mins
    From recognizing faces to processing the live action of a football game, computer vision opens many exciting possibilities.

    Find out what it takes to really capitalize on advancements in AI.

    Many Data Scientists tend to get very excited about deep learning. And why not? It has strongly contributed to the further development of game-changing applications like computer vision or Neural Language Processing.

    However, before starting any computer vision endeavours, it pays to zoom in on some basics: Using a repeatable end-to-end process – to guide you through image pre-processing, deep learning and productionising your models - will help ensure your deep learning models are as accurate as possible and take your models out of the lab and drive actual business value.

    Speakers: Matthew Stainer & Haidar Altaie

    Matthew is a Principal Data Scientist at SAS UKI, supporting customers to enhance their businesses decision making. He works across the analytical technologies including data mining and forecasting. His particular areas of interest and expertise is text analysis, identifying the impact of analytical solutions on business processes and communicating the results of analysis to a business audience. He has specific experience in Customer Management solutions, including Complaints Analysis, NPS, Customer Analysis, Optimisation, Decision Management, Recommendation Engines, Campaign Management, Debt Management and Web Analytics.

    Haidar is a Data Scientist at SAS UKI. He joined SAS in September 2018 after graduating from University with a Mathematics and Statistics degree, and is passionate about integrating the analytical skills he’s learned across growing industries to enable customers to solve complex real life issues.
  • Top 5 Podcasts: Helping Industrial IoT Become a Reality with Dr. Richard Soley
    Top 5 Podcasts: Helping Industrial IoT Become a Reality with Dr. Richard Soley
    Ed Maguire, Principal Partner, Momenta Partners & Dr. Richard Soley, Chairman and CEO of the Object Management Group Aug 22 2019 4:00 pm UTC 46 mins
    Richard Soley is Chairman and CEO of the Object Management Group, Executive Director of the Industrial Internet Consortium (IIC) and founding partner of the IoT Solutions World Congress. In this special edition of the Edge Podcast recorded on site in Barcelona, he shares some of the notable developments coming out of the conference.

    The IoT Solutions World Congress is differentiated from other events through the focus on end users and case studies, showcasing test bed work shepherded by the IIC. In our conversation, Richard Soley shares stories and examples of notable work underway, the potential for productivity gains across industries, and the view that manufacturing represents the industry with the most to gain from connecting assets and advanced analytics. Additionally he discusses the launch of the IIC’s new Resource Hub. Finally he shares a fascinating story about standards that connected the design of Space Shuttle booster with the Ancient Romans.
  • Why Browser Isolation is the New 'Sandbox'
    Why Browser Isolation is the New 'Sandbox'
    Lennart van den Ende, VP of Worldwide Sales Engineering - Menlo Security Aug 22 2019 5:00 pm UTC 51 mins
    Protecting organizations from Web threats has typically been done with a proxy or DNS solution but a new approach has emerged. Isolation defends against today’s sophisticated zero-day exploits using an “air-gapped” browsing approach.

    Identified by Gartner as "one of the single most significant ways to reduce web-based attacks," remote browser isolation has become an important line item in IT budgets around the world.

    But not all Isolation is created equal. With so many offerings how do you weed through the noise?

    Learn:

    - Why remote browser isolation technology adoption is on the rise
    - Key use cases for Isolation that should be evaluated
    - 3 critical requirements when selecting a practical browser isolation solution

    Featuring SC Media and Lennart van den Ende, VP of Worldwide Sales Engineering - Menlo Security
  • Scaling DevOps Episode 3: Scaling Environment Complexity and Orchestration
    Scaling DevOps Episode 3: Scaling Environment Complexity and Orchestration
    Roni Dover, Director of Sales Innovation & Alex Azrah, Senior Engineer Aug 22 2019 5:30 pm UTC 17 mins
    DevOps cloud environments are becoming more complex and heterogeneous in the technologies and infrastructure types they include. As environments are shifting left to provide early integration with production architectures, they can include a combination of VMs, Kubernetes instances, serverless functions, and PaaS services and also the orchestration to set everything up, import data and artifacts and glue everything together. In this episode, we will discuss the challenges of automation complex environments end-to-end and as always bring up some principles that can help us manage that complexity.
  • Use Cases for Conversational AI in the Automotive Industry
    Use Cases for Conversational AI in the Automotive Industry
    Siem Uittenhout, Ann Knox, Yelena Kasianova Aug 27 2019 4:00 pm UTC 60 mins
    Conversational AI is changing the way people interact with technology.

    From speech-enabled interfaces, through to intelligent virtual assistants and chatbots, it’s becoming increasingly apparent that customers are looking for a more humanlike, natural experience.

    Teneo is one of the most human-like experiences available in commercial conversational AI today, providing the complex capabilities required to create the simple, intuitive experience that your customer demands, while increasing customer engagement. With Teneo, a chatbot can be trained to go beyond the typical 85% understanding mark of competitor products to deliver near-perfect results every time.

    Join Siem Uittenhout, Presales Consultant at Artificial Solutions as he demos a Teneo built automotive solution called the Smart SatNav assistant. As well as, Ann Knox, who will discuss our current live solutions with a client in the automotive industry.

    -

    Introducing Teneo Developers, a new comprehensive resource to allow enterprise developers and partners fast access to experience the power of Teneo. Visit www.teneo.ai to get started for free.
  • Future-Proof Your ServiceNow Strategy: How to Build a Strategic Roadmap
    Future-Proof Your ServiceNow Strategy: How to Build a Strategic Roadmap
    John Huckle, John Beasley, Marci Parker, Meghan Lockwood Aug 27 2019 5:00 pm UTC 60 mins
    Does your ServiceNow strategy hold-up to the demanding needs of IT, your Customers, and your employees in 2020?

    With ServiceNow expanding beyond IT in recent years with Customer Service Management and HR Service Delivery, we see clients building strategic roadmaps that cross the entire enterprise.

    In this webinar, you'll learn how roadmaps are changing (and how to effectively communicate ServiceNow's value to your executives), roadmap examples from our clients with varying levels of maturity, the keys to success like governance and organizational change management, and what you can still accomplish in 2019.

    Don't miss out on this opportunity - register for the webinar today.
  • Under the Hoodie: Lessons from a Season of Penetration Testing
    Under the Hoodie: Lessons from a Season of Penetration Testing
    Tod Beardsley, Research Director, Rapid7 & Kwan Lin, Senior Data Scientist, Rapid7 Aug 27 2019 6:00 pm UTC 62 mins
    In 2017, Rapid7 launched the “Under the Hoodie” project to shed light on the “dark art” of pen testing by revealing the process, techniques, and tools that go into it, as well as the insights that can be extracted. The 2019 Under the Hoodie report continues to provide visibility into this often occult niche of information security. Based on the results of about 180 engagements conducted in the most recent season of penetration testing, as well as real-world anecdotes from our engineers and investigators, our research explores recent trends and patterns derived from penetration testing.

    Join Rapid7 experts for an engaging discussion where you will learn:

    1. The report’s most significant findings, including the most commonly exploited vulnerability classes and network misconfigurations
    2. The most effective methods our team has found to compromise high-value credentials
    3. How you can use the data in the report to effectively detect and prevent breaches on your own network
  • Building an evolving culture of continuous improvement
    Building an evolving culture of continuous improvement
    Andrea Goodkind, Wazoku Aug 28 2019 9:00 am UTC 38 mins
    Businesses today must be set up to change, but, more importantly create change as a constant capability inside it’s organisation.

    In this webinar, you will learn:

    - The importance of building a culture of EveryDay innovation where employees are engaged, and recognised and rewarded for their contributions.
    - How Waitrose has engaged senior leadership by demonstrating how small changes add up and are tied to the overall strategic vision.
    - How organisations can start in one area and use the lessons learned to build an organisation-wide capability.