Hi [[ session.user.profile.firstName ]]

CxO Strategy

  • From Incident Response to a Continuous Monitoring & Active Threat Hunting
    From Incident Response to a Continuous Monitoring & Active Threat Hunting Stuart Davis, Director, Mandiant & David Grout, Systems Engineering Director, FireEye Recorded: Apr 27 2017 49 mins
    With over 13 years of front-line experience dealing with advanced threat actors from around the globe, our Mandiant team know how the bad guys think and can help you win the battle against cyber attackers.


    In this webinar, Stuart Davis and David Grout will cover:
    - Best practices in regards to Security as a Service
    - How organisations can move from an alert-led security to an intelligence-led security
    - How FireEye can provide the adequate tools, processes and expertise required to build a next generation security program
  • Accelerating NFV, SD-WAN, and SDN adoption for Telcos and Service Providers
    Accelerating NFV, SD-WAN, and SDN adoption for Telcos and Service Providers Jim Pfleger, Architect at Verizon; Pascal Joly, Director at Quali; Aaron Edwards, Dir. TME at CloudGenix Recorded: Apr 26 2017 60 mins
    This educational webinar will include:

    > Verizon’s perspectives on trends in software-defined architectures and NFV
    > CloudGenix's thoughts on SD-WAN trends
    > Quali's cloud sandboxes for NFV and SDN/SD-WAN compliance
    > Demo - NFV certification in action!
  • API Integration - The Key Accelerator for Digital Transformation
    API Integration - The Key Accelerator for Digital Transformation Hariharan Ganesh - Head of Enterprise Integration, Aspire Systems & Sid Lasley - Global Director, Dell Boomi Recorded: Apr 26 2017 59 mins
    There is a growing realization that to succeed today and going forward, the stakes to remain competitive are directly related to the ability to be a digital business. As organizations move to modernize IT in order to become digitalized businesses for better customer experience, they realize that their traditional architecture aren’t built to support rapid change & innovation in this new digital business environment.

    Join the webinar and learn how Dell Boomi platform and Aspire's Unified Reference Architecture Solution (AURAS - Cloud) can help enterprises to accelerate business agility & achieve digital transformation.

    During the webinar you'll learn about:

    - Why Digital Transformation is challenging and time consuming
    - How API & Integration plays major role in Digital Transformation program
    - Capabilities of Dell Boomi Platform to drive Digital Transformation
    - Role of AURAS in the Digital Transformation initiative
    - How AURAS & Dell Boomi combination helps to accelerate Digital Transformation
    - Success Story of Dell Boomi and AURAS
  • Best key practices for GDPR and utilizing IncMan™ Incident Response platform
    Best key practices for GDPR and utilizing IncMan™ Incident Response platform Mike Fowler, Vice President, Professional Services and Steve Ditmore, Senior Sales Engineer for DFLabs Recorded: Apr 26 2017 34 mins
    The GDPR will apply in all EU member states in May 2018, organizations and businesses that are data owners and/or dealing with data belonging to EU citizens have the responsibility to ensure their processing abides by new data protection law and processors must themselves abide by rules to maintain records of their processing activities. If organizations and businesses are involved in a data breach, they are far more liable under GDPR than they were under the Data Protection Act.

    Complying with the new regulations requires operating to high standards of data security and protection. If suffering a data breach that puts the rights and freedoms of individuals at risk, organizations must notify the people affected and the data protection authority (Information Commissioner's Office (ICO) in the UK) within 72 hours of becoming aware of it. Data breaches occur every day - and the EU have just increased the financial liability and consequences of inadequate security.

    Hear from Mike Fowler, author of the popular white paper: Automation as a Force Multiplier in Cyber Incident Response. Mike will provide insight into how best to leverage automation to provide incident response and reporting consistency for GDPR.

    Steve Ditmore will present IncMan™ – Security Automation and Orchestration features covering:

    •Installation and set-up is measured in hours rather than days or weeks without the need for expensive professional services support.
    •Review steps involved in a mitigating and controlling a data breach.
    •Automation of menial enrichment activities, so incident responders can determine/contain and mitigate breaches more efficiently and effectively.
    •Enhanced visibility creating a layered approach to information gathering.
    •Incident management including response prioritization.
    •How incident and notification workflows are automatically assigned to an incident.
  • Using APIs to Unlock Business Value
    Using APIs to Unlock Business Value K. Scott Morrison, SVP & Distinguished Engineer - CA Technologies Recorded: Apr 25 2017 39 mins
    APIs are an exciting new technology for integrating applications quickly and efficiently. But APIs are more than just a technology solution; they can also transform your business. In this webinar, you will learn why APIs are so important and how you can use them to create new value streams in your business.
  • 10 Reasons Employees Under-Perform & How to Turn Them Around
    10 Reasons Employees Under-Perform & How to Turn Them Around Deb Calvert, Executive Coach & President of People First Productivity Solutions Recorded: Apr 20 2017 44 mins
    Don't exacerbate turnover issues or risk losing skilled talent by giving up too soon on under-performers. Instead, take a look at these root causes for a lackluster performance and turn this situation around.Your colleagues and business partners will become more engaged and elevate their performance when you take this approach.
  • CEO PoV: Take Control of your Cloud Application Experience
    CEO PoV: Take Control of your Cloud Application Experience Praveen Akkiraju, CEO, Viptela Recorded: Apr 20 2017 39 mins
    Enterprises are undergoing a revolution in their infrastructure as the application world is being transformed by cloud technologies. Today your applications can be located in the data center, through IaaS, or in a SaaS cloud. Similarly, users are transforming with mobility; no longer are they tied to one location. Enterprises want to solve the problem of connecting users to their applications in a consistent and secure manner.

    The overarching issue is the connectivity between these two worlds as we're stuck in two-decades old technology. Enterprises are therefore challenged with the requirement to transform their infrastructure while integrating underlying legacy technologies, and for the user to access their applications while maintaining policy and security framework.

    Join our CEO as he discusses how IT infrastructure is being transformed during the era of cloud technologies, and how Enterprises across a number of industries can embrace the network revolution.
  • AmerisourceBergen: Architecting Enterprise Master Data Hub for One ABC
    AmerisourceBergen: Architecting Enterprise Master Data Hub for One ABC Pete Stormer, Director, Data Mgmt, ABC; David Lyle, VP, Informatica; Prash Chandramohan, Product Marketing Mgr, Informatica Recorded: Apr 20 2017 60 mins
    Located at the intersection of pharmaceutical manufacturers and healthcare providers, AmerisourceBergen Corporation (ABC) is a $147B global pharmaceutical services and distribution company. The company’s success rests on knowing its diversified customer mix and serving them with innovative programs and solutions.

    Formed in 2001, AmerisourceBergen had become a group of companies under one banner. Join us to hear how the company designed a data strategy to view business interactions holistically across multiple business groups to serve customers as a single company. Pete Stormer, Director of Data Management at ABC, will talk about their experience, best practices, and lessons learned to support the journey to one ABC.

    The webinar will also cover the following topics:

    • The evolution of MDM as a strategic platform to deliver trusted data to business users
    • Best practices for master data management, data quality, data governance and reference data
    • Defining the enterprise strategy for data management in complex business environments
  • How Will Geopolitical Events and Weak Investments Add to Global Uncertainties?
    How Will Geopolitical Events and Weak Investments Add to Global Uncertainties? Aroop Zutshi, Craig Parker and Neha Anna Thomas Recorded: Apr 20 2017 56 mins
    2017 will be the sixth year of global stagnation, and we will again see a low rate of global economic growth. Geopolitical events, restrained demand and weak investments will take a toll on the global growth trajectory. Lack of business confidence due to the global uncertainties will make investors wait and watch, which could further slow progress. Amidst such circumstances, which areas of growth will produce the best business opportunities? This briefing delivers an in-depth global and regional growth analysis highlighting the opportunities, risks, policy challenges and economic trends, and provides economic predictions for 2017.
  • What’s New in Symantec IT Management Suite 8.1?
    What’s New in Symantec IT Management Suite 8.1? Damon Covey, Director of Product Management, Symantec Recorded: Apr 20 2017 58 mins
    Want to know what’s new in Symantec’s latest release of IT Management Suite version 8.1? Join us as we discuss the exciting new features such as Windows 10 and Office 365 Patch Management, Mac OS Profile Management, Symantec Endpoint Protection and Compliance integration and many more, all of which have been introduced in this latest launch.

    Join our webinar “What’s New in Symantec IT Management Suite 8.1?” to learn about:
    • How Symantec IT Management Suite will simplify and help keep Windows 10 and Office 365 up to date
    • Dealing with Windows 10 cumulative updates
    • Handle large updates in bandwidth constrained environments
    • Support for AWS Marketplace, Mac application metering and profile management
    • Integration with your existing Symantec Endpoint Protection & Control Compliance Suite
    • Enhanced support for Ghost Solution Suite
    • Network discovery support via Simple Network Management Protocol v3
    • Off-box data migration and much more


    We look forward to having you for this live session.
  • Data - The Key to Effective Marketing Solutions and Automating Processes
    Data - The Key to Effective Marketing Solutions and Automating Processes Don Nanneman, Sr. Director, Product Marketing, Informatica & Mike Braund, Director, Marketing Operations, Tableau Recorded: Apr 19 2017 49 mins
    Advances in marketing technologies and the automation of processes have been on a huge upswing in the past several years, and for good reason.

    The problem marketers and business leaders face today isn't from a lack of data; it's just the opposite: Businesses can easily drown in the deluge of data that they are collecting from so many sources and in so many formats, and the quality of the data can't always be guaranteed. With the right technology, companies can effectively see, understand, and share data insights across their organization.

    Join Informatica and Tableau on this webcast, sponsored by CRM Magazine, and you will learn how:

    •Great data quality will improve marketing ROI and create excellent customer experiences
    •Master data management, data hubs, and automation will provide more accurate, real-time data and reduce errors
    •The disparate sources of data can be combined for a more holistic view of what's happening
    •Data and application integration is absolutely key to leveraging the data you have for more effective marketing campaigns
    •Best practices can be used to create a data-driven culture

    The key to great marketing is entirely in your control.
  • How to engage employees w/ realtime feedback, learning & continuous listening
    How to engage employees w/ realtime feedback, learning & continuous listening Denis Descause , Founder & CEO of Flashbrand Recorded: Apr 19 2017 45 mins
    In this webinar you will learn what the key secrets of employee engagement are and how to develop a growth mindset culture with highly engaged employees.
  • Three Ways to Make Sure Your Marketing Campaigns Connect
    Three Ways to Make Sure Your Marketing Campaigns Connect Allison Stilley, Sales Consultant; Jason Medd, Sr Product Manager; Donal Dunne, Sr Product Marketing Manager Recorded: Apr 19 2017 27 mins
    Marketo helps marketers get the most relevant messages to prospects at the right time. But too many companies’ Marketo systems are full of inaccurate or outdated data—including bad email addresses, postal addresses, and phone numbers.

    You need to protect these fields’ quality and integrity if you want to communicate with your customers and prospects, and obtain a single view of them across all channels. Fortunately, this is easy to achieve with the right knowledge and technology.

    Attend this webinar to learn how you can:

    •Quickly visualize and monitor the health of your Marketo data
    •Fix the most impactful data quality problems right inside Marketo
    •Enrich your data with business and/or consumer information
  • Employee Engagement through Leadership: Energize Your Workforce
    Employee Engagement through Leadership: Energize Your Workforce Hartmut Eggert, CPC, ELI-MP, Areli Group, Inc. Recorded: Apr 19 2017 49 mins
    In this webinar, you will learn about:
    -The cost associated with Disengaged Employees
    -The 3 levels of Employee (Dis)-Engagement
    -How to identify disengaged employees
    -Leadership techniques to energize your workforce and prevent employee disengagement
  • Growth mindset and happiness – The secret to recruiting top talent
    Growth mindset and happiness – The secret to recruiting top talent Stephanie Davies, CEO, Laughology Recorded: Apr 18 2017 47 mins
    When recruiting people do you look for skills or potential? Talent is something that needs to be honed and continually developed and skills can always be learnt and improved. In an ever changing world organisations need people who can be flexible, continually learn and are able to take new ideas forward quickly. In short attracting people with a growth mindset and therefore learning potential will ensure your organisation is future fit. But even that’s not enough, you need to stand out against other companies as the place to work, a place where people will not only grow but be happy too.
  • Branding and Social Media-A Strategic Approach to Talent Acquisition
    Branding and Social Media-A Strategic Approach to Talent Acquisition Jenni Stone, MHRM, PHR, SHRM-CP Partner, HR Director-HR Shield, Robin Quale Sr. Talent Acquisition Advisor-Malwarebytes Recorded: Apr 18 2017 63 mins
    “Great vision without great people is irrelevant.”- Jim Collins, Good to Great

    Not that long ago, talent acquisition was referred to as the recruiting department – with no more responsibility than reviewing resumes, screening candidates, and organizing candidate interviews. The phrase “talent acquisition” is now mainstream and widely accepted by companies of all sizes.

    Now you and your organization, your employee brand ambassadors, have a story to tell, one that draws people to your organization now, and in the future, so what’s YOUR STORY?

    This presentation will identify how individual communication impacts the brand, how brands communicate and what it all means for recruiting and employer branding. This session will demonstrate how to utilize the best search engines and sourcing tools available today to find biographical information as well as lists of names of top talent on the web. We will explore a variety of search tools as well as essential techniques for leveraging social media sites to attract and locate the candidates that you need to fill your toughest requisitions.

    There is a broad end-to-end focus needed; one which stretches from building a strategic employment brand, through sourcing and recruiting, all the way to onboarding top people.

    Key Takeaways:

     Planning and Strategizing

     Segmenting the Workforce

     Creating, Validating and Maintaining an Employment Brand

     Managing and Cultivating Candidate Relationships

     Defining Metrics and Conducting Analysis

     Creating an Organizational Recruiting Culture
  • Risk Management Strategies
    Risk Management Strategies Pierre Mitchell, Chief Research Officer Spend Matters Recorded: Apr 13 2017 56 mins
    Join us to learn more about risk embedded in contracts, presented by Pierre Mitchell (Chief Research Officer at Spend Matters) and the Icertis Contract Management platform.
  • Customer support: Unleash your superpowers with AI
    Customer support: Unleash your superpowers with AI Stewart Rogers, Director of Marketing Technology, VentureBeat Recorded: Apr 13 2017 59 mins
    Flawless customer support directly translates to bottom line success. And that means reading customers' minds by offering real-time, reliable responses wherever they are—a feat that's not easily accomplished with call centers or even Live Chat.

    To help companies get it right every time, AI has stepped into the breach, cape blowing in the breeze. AI is impacting just about all areas of company activity, and now enables cost-effective, efficient, and superpowered solutions that turn customer agents into heroes, helping them assist more customers, more quickly, in the channel they're most accustomed to using—messaging platforms. Or maybe not using agents at all, but bots.

    Join our interactive VB Live event where Stewart Rogers will take a deep dive into his latest VB Insight report to give you the who, what, why—and especially how—of AI-powered customer service.

    In this webinar you'll:
    * Use AI to accelerate your customer support
    * Learn why chatbots are the answer to increased customer service
    * Get started on the first steps toward implementing an AI solution on the help desk
    * Integrated an innovative social customer service operation in a bot-driven world

    Speakers:
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Tony Jamous, President of Nexmo, part of Vonage
    * Wendy Schuchart, Moderator, VentureBeat
  • Continuous Testing- The "Missing Link" in DevOps and CI/CD
    Continuous Testing- The "Missing Link" in DevOps and CI/CD Shashi Kiran, CMO at Quali, Mark Hornbeek, Principal Consultant for DevOps at Trace3 Recorded: Apr 12 2017 62 mins
    Modern release management teams pride themselves on setting up a seamless workflow for continuous integration and delivery. However, continuous testing – which is one of the most critical components of the workflow is often taken for granted or marginalized without clear ownership leading to impediments in quality. With the advent of DevOps and the movement to break down silos between developers and operations, it becomes critically important that all members of an IT team - regardless of what tools they use, or role they play - understand the essentials of continuous testing.
  • How will GDPR Impact Incident Response and Data Breach Management?
    How will GDPR Impact Incident Response and Data Breach Management? Rebecca Herold, President, SIMBUS360 and CEO, The Privacy Professor, and Dario Forte, CEO, and Founder of DFLabs Recorded: Apr 12 2017 62 mins
    Prior to May 2018, global companies operating by any means in the EU are required to be compliant with the new General Data Protection Regulations (GDPR). Non-compliance will result in an expensive alternative compounding the situation with fines, penalties, and legal fees.

    Join Rebecca Herold, President, SIMBUS360 and CEO, The Privacy Professor, and Dario Forte, CEO, and Founder of DFLabs an expert on incident response and data breach management.

    This session will cover key GDPR compliances and how they impact Incident Response and Data Breach Management, wrapping up with a Question & Answer.
    • Understand the 1st steps for personal data protection compliance
    • Anonymizing collected data to protect privacy under GDPR requirements
    • Learn how to broaden Cybersecurity Plans with Incident Response Platform
    • Recommended steps for evaluating requirements for a complete Incident Response management plan
  • SEP 14 Webinar Series: Zero-Day Attacks and What To Do About Them?
    SEP 14 Webinar Series: Zero-Day Attacks and What To Do About Them? Christopher Covert, Enterprise Products Group – Solution Product Manager, Asia Pacific & Japan, Symantec Recorded: Apr 11 2017 43 mins
    All applications have vulnerabilities and attackers are incented to find them. Once the vulnerability has been discovered, the longer it remains unpatched, the greater the risk of a breach, potential loss of information, and damage to reputation.

    Join us to learn what can be done to block exploit attacks on day zero:

    • What behaviors and techniques are used to block attacks
    • Why exploit prevention plays a critical part in endpoint protection
    • How Memory Exploit Mitigation works

    Then see Memory Exploit Mitigation in action with a demo Symantec Endpoint Protection.

    Register Today!
  • Experts Panel - Compliance with New-York State Cybersecurity Regulations
    Experts Panel - Compliance with New-York State Cybersecurity Regulations Karl Kispert, VP (ex CISO), Jayesh Kamat, VP (Risk and Compliance), Ankush Kapoor, VP (Information Security) Recorded: Apr 6 2017 59 mins
    In this Q&A style live webinar, Information Security Experts would answer all your questions related to the regulations and compliance. The What? When? How? and Why?

    New-York State Department of Financial Services (known as NYS DFS) has recently published regulations for Cyber-Security and it is effective as of March 1, 2017. You have 180 days to become compliant. Attend this webinar to get all your questions answered.

    Highly recommended for CEO/CIO/CISO/Head-IT/IS in Financial Services Companies with business presence in the State of New-York.

    Also check-out the compliance kit page under attachments for everything you need to know about NYSDFS Cyber-security Regulations in 1 place.
  • Create more engaging financial wellness solutions
    Create more engaging financial wellness solutions Katy Gibson, VP Product Management, Envestnet | Yodlee Recorded: Apr 6 2017 61 mins
    For years, delivering a powerful personal financial management solution (PFM) consisted of providing consumers with basic budgeting, spending and tracking tools. And, while many PFM users found these tools useful, many more are still left searching for more personalized and predictive solutions to help them better understand and manage their financial wellness. Today, if your PFM solution doesn't offer the personalized services and support your customers want, with the features they need, you've already lost them.

    Successful providers of financial wellness solutions understand that their biggest competitive advantage — and the key to retaining their customers — is having an intimate understanding of their clients' financial wellness. With improved data aggregation, AI models, and predictive and prescriptive analytics, your company can provide smarter, more personalized financial wellness solutions that deliver the actionable suggestions and guidance that build long-term trust and loyalty.

    To find out how you can deliver more meaningful and productive financial wellness solutions that deliver engagement and longevity, don't miss out on this interactive VB Live event!


    In this webinar, the panelists will discuss:
    * Pivoting the drivers of change and the evolution of PFM in banking
    * How to improve customer interaction with financial wellness solutions
    * Using predictive analytics and AI to deliver more personalized and engaging financial wellness applications
    * Driving customer loyalty and engagement with the next wave of financial wellness solutions

    Panelists:
    * Katy Gibson, VP Product Management, Envestnet | Yodlee
    * Keith Armstrong, Co-founder and Chief Operating Officer, Abe.ai
    * Colin Walsh, CEO and Co-founder, Varo Money
    * Evan Schuman, Moderator, VentureBeat


    Register today!
  • Trends Behind Today's Breaches & Cyber Attacks in EMEA
    Trends Behind Today's Breaches & Cyber Attacks in EMEA Jens Monrad, Senior Intelligence Account Analyst, FireEye iSIGHT Intelligence Recorded: Apr 6 2017 47 mins
    Join us in a live webinar as Jens Monrad explores trends that define today’s threat landscape based on Mandiant’s investigation of last year’s successful cyber attacks.
    Register today and get insights into:
    •New phishing trends breaching today’s companies
    •Changes in modern attack telemetry and methodology
    •Intelligence-led insights into emerging global threats
    •Modern defensive strategies to better protect your organisation
    •How GDPR is changing business in EMEA
  • How Digital Transformation is Catalyzing the New Era of Customer 360
    How Digital Transformation is Catalyzing the New Era of Customer 360 Sheryl Kingstone, Research Director, 451 Research & David Corrigan, CMO, AllSight Recorded: Apr 5 2017 56 mins
    Digital transformation is a pressing concern for most organizations. At the very heart of digital transformation is the idea of better serving your customers by using new digital data sources to understand them deeply, and using that information to improve the customer experience.This transformation is being driven by four c-level roles - the Chief Analytics Officer (CAO), the Chief Data Officer (CDO), the Chief Marketing Officer (CMO) and the Chief Customer Officer (CCO). They are all coming at the same challenge with different customer perspectives - data, analytics, acquisition and experience. A new category of software, Customer Intelligence Management, is rising up to address all of their perspectives.

    In this webinar, you will learn how to combine different sources of big, unstructured and structured customer data into a Customer 360. You’ll see how that data can be enriched, analyzed and discovered to create unique and actionable insights. And you’ll see how the customer journey and each individual customer experience can be improved with an Intelligent Customer 360.

    You will hear from an industry expert, Sheryl Kingstone, Research Director of Business Applications at 451 Research , about organizational strategies to profit from digital transformation and become much more customer-centric. And you’ll hear from David Corrigan, CEO of AllSight, about how leading organizations are using new big data technology and Customer Intelligence Management Systems to improve the customer experience considerably.
  • Tirez-vous le meilleur de votre programme de gestion des vulnérabilités?
    Tirez-vous le meilleur de votre programme de gestion des vulnérabilités? Stéphane Barbier et François Maufrais, Senior Solution Engineers chez Flexera Software. May 3 2017 12:00 pm UTC 45 mins
    La gestion des vulnérabilités est nécessaire pour réduire les failles et les risques de sécurité dans votre environnement.

    Beaucoup d’organisations luttent encore pour mettre en place une solution efficace de gestion des vulnérabilités et des processus inhérents, et ce, en accord avec les contraintes de conformité de sécurité et réglementaire.

    Dans la plupart des cas, le contrôle des trois fonctions essentielles du cycle de gestion des vulnérabilités reste un challenge: découverte, analyse et prioritisation, et correction.

    Dans ce webinaire, vous allez découvrir comment:

    *Tirer le meilleur parti de votre solution de gestion des vulnérabilités avec les outils Flexera Software
    *Associer gestion des vulnérabilités de sécurité avec vos processus ITSM en place
    *Améliorer efficacement votre sécurité informatique
  • Software Vulnerabilities verstehen
    Software Vulnerabilities verstehen Thomas Todt, Senior Sales Engineer, DACH, MEA & Eastern Europe May 10 2017 12:00 pm UTC 30 mins
    Nehmen Sie an dem Webinar teil, um einen Überblick über Software Vulnerabilities und Handlungsfelder für Unternehmen zu gewinnen.
  • Aktuelle Trends bei Sicherheitsverletzungen und Cyberangriffen in D/A/CH
    Aktuelle Trends bei Sicherheitsverletzungen und Cyberangriffen in D/A/CH Sven Schriewer, Director, FireEye May 10 2017 12:00 pm UTC 45 mins
    Cyberkriminelle entwickeln ihre Taktiken, Techniken und Prozesse stets weiter und sind dabei häufig schneller als die Sicherheitsteams. Die Angreifer sind bestens organisiert und ihre Methoden werden von Jahr zu Jahr raffinierter – 2016 war da keine Ausnahme.

    In diesem Live-Webinar stellt Sven Schriewer, Director, FireEye, die Beobachtungen und Schlussfolgerungen der Experten von Mandiant aus der Untersuchung einiger der schwerwiegendsten Cyberangriffe und Sicherheitsverletzungen des vergangenen Jahres vor.

    Melden Sie sich noch heute an, um sich über die folgenden Themen zu informieren:
    •Neue Trends bei Phishing-Angriffen auf Unternehmen
    •Neue Entwicklungen in der Angriffstelemetrie und -methodologie
    •Datengestützter Überblick über neue Bedrohungen weltweit
    •Moderne Abwehrstrategien zum besseren Schutz von Unternehmen und Institutionen
    •Auswirkungen der Datenschutz-Grundverordnung auf Unternehmen in EMEA
    •Trends in EMEA, Nordamerika und APAC im Vergleich
    Neben den Untersuchungsergebnissen in der Regionen EMEA mit Schwerpunkt auf Deutschland, Österreich und Schweiz, enthalten Sie in diesem Webinar auch Informationen wie Sie eine proaktive Strategie zur Stärkung Ihrer Sicherheitsinfrastruktur entwickeln.
  • Action GDPR: Understanding Your Data
    Action GDPR: Understanding Your Data Patrick Dewald, Senior Director - Data Governance. Giuseppe Mura, Solution Architect - Financial Services. May 10 2017 1:00 pm UTC 60 mins
    GDPR (General Data Protection Regulation) is just over a year away, and many organisations are still trying to understand what this new regulation means to them, their organisation and their data.

    Join us for the first in a series of webinars which focus on how organisation's can begin to action GDPR - with this first short session focusing on Understanding Your Data with Informatica Axon.

    Informatica Axon Powers Informatica's Enterprise Data Governance Solution and in the context of GDPR will help organisations show how personal data is connected and used throughout the business and make it high-quality, consistent, trustworthy and secure at all levels of the organisation.

    This session will cover:
    - Key GDPR documentation requirements, and how companies need to be able to respond & action
    - Bringing visibility of end-to-end data flows across and beyond organisational boundaries
    - Capturing GDPR policies, rule & requirements and linking back to the data concepts & processes
    - Live Demo of Informatica Axon – visualising how data is interconnected & how information flows through the business
  • Top Five Mistakes Companies Make when Executing a Cloud Strategy
    Top Five Mistakes Companies Make when Executing a Cloud Strategy Tab Schadt, CEO at DoubleHorn May 10 2017 7:00 pm UTC 30 mins
    Choosing the right cloud provider, that meets your requirements at the right price can be a daunting task. We’ve seen too many make the wrong choices. In this webinar, we will guide you through the things to think about when executing a cloud strategy and how to avoid the pitfalls. Is there a better way to do things? We think so.

    Some things you'll learn in this webinar:
    Not all clouds are created equal. How to choose the best cloud(s) for your companies needs
    How to estimate your bandwidth
    How to avoid sticker shock and leverage the best value
  • ACI: Simplified, cloud like agility in your enterprise data centre
    ACI: Simplified, cloud like agility in your enterprise data centre Barrie Blackwell, Cisco & Phil Lees, WhiteSpider May 11 2017 9:30 am UTC 60 mins
    Learn how Cisco ACI can help you manage your data centre, speed up application deployments, and deliver services more quickly
  • GDPR – be prepared, be response-ready
    GDPR – be prepared, be response-ready Stuart McKenzie, VP, Mandiant Consulting & Dan Wire, Sr. Director, Marcom May 11 2017 3:00 pm UTC 45 mins
    As any business unfortunate enough to have suffered a data breach can attest, in a crisis situation, being organised enough to provide a detailed notification to affected customers (or indeed regulators) is a difficult task on its own. When combined with required incident response processes – identifying the cause, closing the vulnerability, all while determining the extent of the damage, it becomes all the more difficult. Furthermore, GDPR means data breaches will need to be reported within 72 hours – how will you manage the fallout?
    In this webinar we discuss the risks, challenges and answers surrounding response-readiness and the importance of having a critical communications strategy in place.

    Presented by:
    Stuart McKenzie | VP, Mandiant Consulting
    Dan Wire | Sr. Director, Marcom
  • Between a ROC and a Hard Place with PCI?
    Between a ROC and a Hard Place with PCI? Jennifer Pesci-Anderson, Jeff Avery May 11 2017 4:00 pm UTC 30 mins
    Learn how to conquer and manage the PCI process. Businesses are challenged with attempting to continuously monitor their PCI environment, responding when something changes and managing all the information to gather evidence and generate the report on compliance (ROC) or attestation on compliance (AOC). Verterim is providing a 3 part, educational PCI series to address some of these business challenges and provide our tips on how you can take advantage of technology you may already have in house. The first 30 minute BrightTalk will look at the PCI process at a higher level and provide a view into a standard RSA Archer use case to help solve the problem. Join our GRC practitioners, Jennifer Pesci-Anderson, National Practice Lead and Jeff Avery, Engineer on May 11 from 12-12:30 to see how you can address your PCI business challenges.
  • Turn Disruption into Differentiation with your Digital Transformation Strategy
    Turn Disruption into Differentiation with your Digital Transformation Strategy Nick Patience 451 Research, Matt Leonard CenturyLink May 16 2017 1:00 pm UTC 60 mins
    Join 451 Research and Century Link May 16th at 14.00 UTC to discuss how enterprises are choosing and using digitization initiatives for business gain.

    Organizations of all sizes and in every sector are busy redefining their IT priorities for a digital future, identifying the goals of enhanced customer experience, operational efficiency, business agility and improved risk management as four key pillars for their digital transformation strategies.

    Digital transformation is playing out differently depending on a company’s maturity, the vertical sector in which it operates, its employees, its infrastructure, and its ability to innovate. Knowing where to start, and how to maintain momentum is critical.

    Join 451 Research and Centurylink to learn how some global enterprises are making assured first steps, and hear the following:

    •Understand how companies with more progressive Digital Transformation strategies are prioritizing their efforts for competitive differentiation, changing the nature of their business with innovative technologies that are becoming more easily accessible with a lower barrier to entry.

    •Insights and recommendations from a major survey of enterprises worldwide about IT priorities and how to make service provider choices to accelerate digital transformation mandates such as the role of cloud and other IT infrastructure options that are built for availability, speed, and resilience.

    •Identification of key shifts in business context that will continue to shape digitization efforts, and how these need to be reflected in a digital transformation roadmap for IT organizations.
  • Eine neue Perspektive des Patchmanagements
    Eine neue Perspektive des Patchmanagements Thomas Todt, Senior Sales Engineer DASH,MEA & Eastern Europe May 17 2017 12:00 pm UTC 30 mins
    Nehmen Sie an diesem Webinar teil, um einen Überblick über die Möglichkeiten des Patchmanagements zu gewinnen und lernen Sie, wie Sie Prozesse mit Corporate Software Inspector automatisieren können.
  • Top 10 Cloud Trends for 2017
    Top 10 Cloud Trends for 2017 Ashley Kramer, Director of Product Management, Tableau and Marshall Daly, Cloud Data Evangelist, Tableau May 17 2017 3:00 pm UTC 60 mins
    In 2016, cloud technologies went mainstream. But with maturity came the realization that moving to the cloud doesn’t happen overnight. As the shift to cloud progresses, we’re exploring the newest trends for cloud technology for the upcoming year.

    In this webinar you’ll learn more about:

    •Emerging global trends in cloud and cloud analytics

    •Tableau experts' take on the changing cloud landscape

    •Considerations for your 2017 cloud strategy
  • The State of Tech M&A in China: Activity & Outlook
    The State of Tech M&A in China: Activity & Outlook Brenon Daly, Agatha Poon & Tim Miller May 17 2017 5:00 pm UTC 60 mins
    A decade ago, tech deal flow barely trickled into and out of China. While M&A in the world’s second-largest economy is still relatively small, it has dramatically accelerated in recent years, with the overall number of tech transactions in China having doubled over the past half-decade to a record level in 2016. Spending on deals also surged to unprecedented levels last year. However, there are some concerns about whether the M&A boom will continue. China’s currency has weakened, economic growth has slowed and relations with its main tech partner – the US – have soured. Will M&A falter, too?

    Join 451 Research’s Brenon Daly, Research Director, Financials, Agatha Poon, Research Director of APAC Services, and Tim Miller, VP of Financial Markets for a 45-minute webinar on the state of M&A in China now, as well as the outlook for the coming years.
  • Tendances et chiffres sur les fuites d’information et les attaques Cyber en EMEA
    Tendances et chiffres sur les fuites d’information et les attaques Cyber en EMEA David Grout, Director, Southern Europe Systems Engineering, FireEye May 19 2017 8:30 am UTC 45 mins
    Rejoignez-nous pour un webinaire en live avec David Grout, Directeur Technique Europe du Sud, qui explorera les tendances qui définissent le paysage actuel des menaces en se basant sur les investigations des équipes Mandiant en 2016.
     
    Inscrivez-vous aujourd’hui pour découvrir :
     
    •Les nouvelles tendances d’hameçonnage
    •Les changements en termes de volume et de méthodologie
    •Les apports de la cyber veille et de l’intelligence sur les attaques émergentes
    •Les approches défensives pour mieux se protéger
    •Comment la GDPR impacte les sociétés en EMEA
    •Comment l’Europe se situe par rapport à l’Amérique du Nord et à l’Asie
     
    Inscrivez-vous!
  • Are you ready for the GDPR? One year out.
    Are you ready for the GDPR? One year out. Christoph Luykx, Director, Government Relations EMEA, CA May 23 2017 9:00 am UTC 60 mins
    The European Union General Data Protection Regulation (GDPR) is a new regulation in Europe with global impact that will come into force on May 25th, 2018. Its objective is to further strengthen data protection. Enforcement will be backed by heavy fines. Organizations that deal with data on a Global scale will need to review their data lifecycle and put in place processes and technology to be compliant. In this webinar, CA experts will be joined by one of our customers to share some thoughts around the journey organizations are on and discuss some real life examples.
  • Strategies for Effective 3rd Party Risk Management
    Strategies for Effective 3rd Party Risk Management Scott Roller, Founder of 3WP; Rebecca Herold, Privacy Professor; Sam Kassoumeh, SecurityScorecard. James Christiansen, Optiv. May 23 2017 5:00 pm UTC 60 mins
    The challenges that organizations face today are increasingly more complex than in the past. The constant change of the global economy, dynamics of business risks and opportunities, and an increased threat of cyber-attacks add complexities we’ve never faced. As organizations rely on more and more third parties to grow and thrive, they’re exposed to higher levels of risk, and regulators are focused on the need for organizations to manage 3rd party risk more effectively.

    Manual processes, silos in contract administration, and technology and resource constraints can all lead to significant errors in the third party supply chain that leads to violation of privacy guidelines and security breaches, which cause substantial fines, penalties, and damage to brand value. On this webinar our panel of experts will discuss the risks and repercussions associated with third party contract management shortcomings, common gaps in third party contract management processes, examples of how new solutions and technologies can help organizations optimize their third party processes, and effective strategies for managing 3rd Party Risk.
  • Vulnerability Intelligence Eine wichtige Komponen
    Vulnerability Intelligence Eine wichtige Komponen Thomas Todt, Senior Sales Engineer DACH, MEA & Eastern Europe May 24 2017 12:00 pm UTC 45 mins
    Software Vulnerability Management ist eine Herausforderung für die IT- und Informationssicherheitsstrategie Ihres Unternehmens. Hunderte neue Schwachstellen pro Woche machen das Thema zu einem Albtraum für Sicherheitsprofis. Die Informationen zu sammeln, zu prüfen und sie den relevanten Personen als Grundlage für die Risikobewertung zur Verfügung zu stellen ist eine weitere Herkules-Aufgabe. Doch es geht auch einfacher:

    *Was ist Vulnerability Intelligence?
    *Wie kann Vulnerability Intelligence Manager eingesetzt werden, um die Herausforderungen zu meistern?
    *Wie managen Sie Software Vulnerabilities effektiv?

    Nehmen Sie an diesem Webinar teil, um einen Überblick über Vulnerability Intelligence und den Wert für Ihr Unternehmen zu gewinnen. Lernen Sie, wie Sie die Sicherheit Ihrer Anwendungen mit Vulnerability Intelligence Manager effektiv steigern.
  • Sales Analytics: How to Build a Data-Driven Sales Strategy
    Sales Analytics: How to Build a Data-Driven Sales Strategy Joe Clarke, UK Sales Manager - Tableau May 24 2017 1:00 pm UTC 45 mins
    Tableau is the one of the leading players in analytics, and like any company, Tableau needs to make decisions about sales data. As a data company, we’re always on the hunt for the best way to look at sales information to help make decisions about quota, territory management, and must-win deals.

    In this webinar, see how the sales team at Tableau have made sales analytics and dashboards part of their team daily routine. We're going to dive deep into the dashboards that sales leverage to manage their time, measure performance, collaborate globally, strategically target territories, and more. Joe Clarke, Tableau's UK & Ireland SalesManager will show you how sales performance management is obtained and adopted across the organisation.
  • Action GDPR: Finding Sensitive Data
    Action GDPR: Finding Sensitive Data Paul Garstang, Snr Manager EMEA - Data Security Group & Steve Holyer, EMEA Specialist - Data Security Group May 24 2017 1:00 pm UTC 60 mins
    GDPR (General Data Protection Regulation) is only a year away, and many organisations are still trying to understand what this new regulation means to them, and their data governance practices.

    Join us for the second in a series of webinars which focus on how organisation's can begin to action GDPR - this short session is all about accelerating Data Discovery & Classification, how to automate and put in place a repeatable 'near real time capability' with Informatica's Secure@Source.

    Secure@Source provides 360º visibility of sensitive data and analyses and ranks sensitive data risk. In the context of GDPR, it helps organisations understand where their sensitive data resides, which data stores contain high risk combinations and how it proliferates through the organisation.

    This session will cover:
    - Where to start with your sensitive data
    - How to identify potential data risks
    - Live Demo of Secure@Source
  • Bigger, better, faster subscription commerce growth
    Bigger, better, faster subscription commerce growth Wendy Schuchart, VentureBeat May 24 2017 5:00 pm UTC 60 mins
    Better, stronger, faster subscription commerce growth

    The value of a subscription business model is its consistency: predictable revenue to lifetime customer value, you've got a solid foundation to start seeing incredible growth—and that comes directly from becoming the 6 million dollar man of customer acquisition.

    That's where the subscription model delivers another distinct advantage: The capability to identify your most profitable customers, and the technology—a wealth of key data about marketing, customer and billing events—right at your fingertips.

    Now how do you turn that data into insights to optimize subscriber acquisition and accelerate your business growth up to 60 mph or more? Join this interactive VB Live event to learn how, plus tap into the latest research and benchmarks on key subscriber acquisition metrics.

    In this webinar, you'll:

    * Identify the most effective subscription plans and promotions
    * Compare your trial program performance against industry benchmarks
    * Use best practices to create a frictionless subscription experience
    * Capture the key metrics for measuring acquisition performance--plan performance, MRR, LTV and more.

    Speakers:

    * Wendy Schuchart, Moderator, VentureBeat
    * Emma Clark, Sr Product Manager, Recurly
  • Turn Disruption into Differentiation with your Digital Transformation Strategy
    Turn Disruption into Differentiation with your Digital Transformation Strategy Sheryl Kingston 451 Reserach, Bill Hurley CMO CenturyLink May 24 2017 5:00 pm UTC 60 mins
    Join 451 Research and CenturyLink May 24th at 1pm ET to discuss how enterprises are choosing and using digitization initiatives for business gain.

    Organizations of all sizes and in every sector are busy redefining their IT priorities for a digital future, identifying the goals of enhanced customer experience, operational efficiency, business agility and improved risk management as four key pillars for their digital transformation strategies.

    Digital transformation is playing out differently depending on a company’s maturity, the vertical sector in which it operates, its employees, its infrastructure, and its ability to innovate. Knowing where to start, and how to maintain momentum is critical.

    Join 451 Research and Centurylink to learn how some global enterprises are making assured first steps, and hear the following:

    •Understand how companies with more progressive Digital Transformation strategies are prioritizing their efforts for competitive differentiation, changing the nature of their business with innovative technologies that are becoming more easily accessible with a lower barrier to entry.

    •Insights and recommendations from a major survey of enterprises worldwide about IT priorities and how to make service provider choices to accelerate digital transformation mandates such as the role of cloud and other IT infrastructure options that are built for availability, speed, and resilience.

    •Identification of key shifts in business context that will continue to shape digitization efforts, and how these need to be reflected in a digital transformation roadmap for IT organizations.
  • SEP 14 Webinar Series: Easy Ways to Improve Your Security Posture
    SEP 14 Webinar Series: Easy Ways to Improve Your Security Posture Kirk Gibbons, System Engineer, Symantec May 30 2017 5:00 am UTC 30 mins
    Effective communication between the network and the endpoint is critical to quickly identifying advanced threats and preventing the spread of infection. The more automated the process the less damage an attack can do.

    Join use to learn what tight integration between Symantec Endpoint Protection and Secure Web Gateway looks like. You will discover:

    •Why tighter integration between the network and endpoint improves security posture
    •How new REST APIs help orchestrate a rapid response at the endpoint
    •What the future plans are for new APIs, integrations, and global threat intelligence

    Lastly, watch a demo that showcases how easy it is to integrate Symantec Endpoint Protection and Secure Web Gateway and what orchestrated response looks like.

    We look forward to welcoming you in our webinar.

    Register today!
  • Financial Services:Driving new sales via Single Customer View & Data Management
    Financial Services:Driving new sales via Single Customer View & Data Management Matthew Cawsey, Financial Services Master Data Management Specialist, Informatica, Steve Parry, EVP, Entity Jun 13 2017 1:00 pm UTC 60 mins
    Financial services organisations are under intense pressure to identify new opportunities to grow sales. In an increasingly digital world where customers are engaged via multiple channels, financial services organizations struggle to understand all of the interactions with customers to propose more targeted solutions and drive new sales. Using new data platforms, like Apache Hadoop, and enterprise data lake management solutions from Informatica, successful organisations are building a single trusted view of customers by finding, preparing, mastering, securing, and governing data into trusted data assets.

    These activities make up part of a robust Data Management approach - across people, process and technology - to validate and continually trust analysis and business decisions that arise.

    Those who fail to adopt integrated and systematic approaches to data management are not only missing an opportunity, but creating compliance risk and negative customer experiences deriving from data silos spanning across the organisation.

    Join Informatica and Entity Group on this webinar to learn about:

    •The Data Delta (or gap in people, process and technology) which organisations face in achieving a complete ‘Single Customer View’ – and how to integrate more data faster from more data sources
    •How Data Lake Management and Master Data Management collectively power a trusted single customer view
    • How you can augment your trusted master customer data & identify new relationships & opportunities
  • Action GDPR – Data Masking for Sensitive Data Security & The Right to Erasure
    Action GDPR – Data Masking for Sensitive Data Security & The Right to Erasure Paul Garstang, Snr Manager EMEA - Data Security Group & Steve Holyer, EMEA Specialist - Data Security Group Jun 14 2017 1:00 pm UTC 60 mins
    GDPR (General Data Protection Regulation) is only a year away, and many organisations are still trying to understand what this new regulation means to them, and their data governance practices.

    Join us for the third in a series of webinars which focus on how organisation's can begin to action GDPR - this short session is all about data privacy by de-identifying, de-sensitizing and anonymizing sensitive data with Informatica’s Data Masking tools.

    In the context of GDPR, Data Masking tackles several critical requirements by protecting and preserving the privacy of customer/employee data. Persistent Masking creates ‘Pseudonymised data’ which replaces the original sensitive data with new values, but critically retaining both contextually and referentially integrity. Alternatively, for production environments Dynamic Masking preserves the original data format, but strictly limits who can see the data. This control of access to sensitive data is essential under GDPR, as a breach of sensitive data can also be deemed to have taken place if employees without business processing cause have access to and visibility of that data.

    Increasingly Data Masking is also becoming the best practice approach to enacting “The Right to Erasure”, in this session we will discuss why this is the case, and how this approach to Erasure contrasts with a Data removal approach.

    This session will cover:
    - Persistent & Dynamic Data Masking
    o What they are
    o When to use them
    o What they are delivering for a GDPR project
    - How Masking can deliver Erasure
    - Live Demo of Informatica’s Data Masking
  • Tableau in the Cloud: A Netflix Original
    Tableau in the Cloud: A Netflix Original Albert Wong - Reporting Platform Manager, Netflix Jun 22 2017 1:00 pm UTC 75 mins
    See how Netflix built its analytics in the cloud with Tableau and Amazon Web Services

    Building out a data platform doesn't have to be like building a House of Cards, and our friends at Netflix know this better than anyone else. With 86 million members and counting, and more than 700 billion events per day, Netflix has had to expand their data capabilities by developing a scalable and flexible analytics platform built on Tableau and AWS.

    Attend this webinar to hear from Albert Wong, analytics expert at Netflix, to see how they simplified their data stack by building a data lake/data warehouse strategy which allows Netflix to collect and store massive amounts of data, supporting thousands of Tableau users with managed data.

    You'll learn about:

    How to set up effective analytics on top of enormous data sets
    How Netflix serves large groups of people with governed data
    The details of Netflix's data lake/data warehouse strategy
    How Netflix manages Hadoop with Tableau
  • Data-Centric Security with Classification, Encryption, & File Protection
    Data-Centric Security with Classification, Encryption, & File Protection Panel Discussion: Mark Chaplin, ISF, HPE Security - Data Security and TBC Jun 27 2017 5:00 pm UTC 60 mins
    In today’s threat landscape, traditional approaches to securing data are falling short. Since 2015 we have seen some of the largest data breaches ever and it is clear that no industry or organization is immune from cyber attacks. The threat landscape is increasingly dangerous, while new technologies are distributing sensitive data farther across locations, devices and repositories. It is no longer enough to focus IT security efforts on networks and endpoints. Organizations need to keep pace and advance their security by focusing on the data itself through the development of a data-centric security program.

    The development of a comprehensive data-centric security program, including data discovery, classification, encryption, and file protection, can uniquely position your organization to protect what matters most, and make security move with your data. On this webinar our panel of experts will discuss the key points that you should consider when developing such a program for your organization.