Hi [[ session.user.profile.firstName ]]

CxO Strategy

  • How Pivotal Training and Certification Can Make a Difference for You
    How Pivotal Training and Certification Can Make a Difference for You
    Tyson Gern, Director, Pivotal Education & Dylan Ham, Lead, Pivotal Education Recorded: Apr 24 2019 32 mins
    Pivotal Education enables you to continuously deliver business value in a rapidly evolving market by providing the modern software expertise you need to excel in a cloud-native world.

    In this webinar, we will discuss the breadth of training, certification and the Platform Acceleration Lab (PAL) options available for Spring and Cloud Foundry developers, architects, and operators.

    We'll also show you how Pivotal Education makes it easy create a custom Spring or Cloud Foundry training plan specific to your learning needs and schedule, using in-person and online content and tools.
  • Episode 1 – Bank and Chill – Redefine Customer Segmentation with AI
    Episode 1 – Bank and Chill – Redefine Customer Segmentation with AI
    Anand Subramaniam, Principal Architect AI & ML Practice, Aspire Systems & Anusha Natrajan, Research Analyst, Aspire Systems Recorded: Apr 24 2019 30 mins
    Aspire Systems Original Series - Banking in the Age of Siri

    Episode 1 – Bank and Chill – Redefine Customer Segmentation with AI

    Let’s just call it as it is! Netflix has a high-powered, customer centric AI model. The way Netflix uses Artificial Intelligence to give their customers accurate recommendations is nothing short of mind-blowing.

    Now, what if we told you that banks can be the Netflix of the Finance Industry by just adopting an advanced AI system? It’s true; banks can do so much more for their customers, with such little effort as long as Artificial Intelligence has your back!

    Join us to discover the endless possibilities AI has to offer, and why it is important to take action now. In this webinar learn how to:

    1.Identify and predict current and future customer segments
    2.Construct collaborative models for insightful AI processes
    3.Identify different customer touchpoints and pain points across various platforms for effective customer segmentation

    Tune in on April 24th, 2019 at 10:00 am CST to uncover all the tricks of the trade! Register Now!
  • Aligning your Marketing Tools for Better Digital Experiences
    Aligning your Marketing Tools for Better Digital Experiences
    Marc Vieleers, CEO, EXLRT and Arjen van den Akker, Product Marketing Director, SDL Recorded: Apr 24 2019 57 mins
    Meeting customer expectations is tough, especially when your systems and processes aren’t properly aligned to create joined up customer journeys.

    How do you deliver a relevant digital experience for your customers, while retaining authenticity as a brand? Which marketing systems do you need to adopt to make it a reality?

    In our webinar we will explore:

    - Examples of great and poor contextual experiences and what makes them so
    - Why you need to focus on both data and content
    - The Turkish Airlines case: the results of cleverly combining data and content
    - Requirements for interoperability between your various marketing systems, and in particular your Content Management System (CMS)
    - The future of digital experiences.
  • Why Visual Analytics?
    Why Visual Analytics?
    Grant Lawrence Recorded: Apr 24 2019 38 mins
    When you are trying to understand and find key insights from your data, where do you begin?

    There are two popular approaches to visual data exploration-data visualisation and visual analytics. Both methods can help you to better understand your data, and this webinar will show you why.

    You'll discover how visual analysis makes it easy for you to deconstruct your data, quickly identify trends and correlations, get to the bottom of all sticky questions, and improve your reporting efficiency. By doing ad hoc analysis faster, you can put more energy into driving business impact.​

    Join us to learn about:

    The advantages of visual analysis over traditional analysis
    How to take the first step in visual data exploration - answering the 'what' questions
    How visual analytics lets you dig deeper into your data - the power of asking 'why'
  • ServiceNow Automated Test Framework (ATF) – Advanced analysis, ROI and Demo
    ServiceNow Automated Test Framework (ATF) – Advanced analysis, ROI and Demo
    Stephen Makowski-ServiceNow Consultant,Kiruthiga Shanmuga-ServiceNow Lead Developer,Kaviarasan Selvaraj-ServiceNow Evangelist Recorded: Apr 23 2019 53 mins
    ServiceNow has released its Automated Test Framework (ATF) feature in last year’s Istanbul release. Ever since, it’s widely used by ServiceNow customers to create and run automated tests on their ServiceNow instance. In this webinar session, we will conduct an expert analysis on ATF, and find out how organizations are leveraging ATF to achieve ROI from their investment. We will also demo few use cases on ATF to help users navigate through this feature and learn the advantages of using it.

    Key topics in the session include:

    • Automated Testing Framework Overview
    • Why use ATF?
    • ATF for ServiceNow and Upgrades
    • Achieve ROI through ATF and Automation
    • ATF Use case Demo,
    - Creating and running manual tests (timed)
    - How to create and run same tests using ATF version and view the results
    - Overview of Test Suites and scheduled testing/reports
    - Display of Custom Scripts and Configuration
    • Advantages and Disadvantages
  • ServiceNow Knowledge19 Sneak Peek: How to Conquer the Conference
    ServiceNow Knowledge19 Sneak Peek: How to Conquer the Conference
    Ellen Daley, Grant Pulver, Dana Canavan, James Hamilton, Ryan Dinwiddie, Meghan Lockwood Recorded: Apr 23 2019 61 mins
    Learn how to maximize your ServiceNow Knowledge 2019 experience. This team of ServiceNow experts (and Knowledge veterans) will cover everything A-Z K19. Join this webinar to...

    - Learn tips to maximize your experience
    - Uncover the questions our clients ask us the most
    - Find out the three things you absolutely must do to ensure it's the most successful Knowledge conference yet
    - Get a preview of two of Acorio's Presentations at K19
  • Fighting ATO Attacks: Protect Your Brand and Customers
    Fighting ATO Attacks: Protect Your Brand and Customers
    Alon Shem Tov - VP Product, Ephy Rinsky - Head of Content Recorded: Apr 23 2019 38 mins
    The webinar explains how to balance customer verification measures with defending against attacks that can compromise customer data.

    Watch this session for tips on seeing through common account takeover (ATO) tricks to improve fraud detection efficiency.
  • From Gut Feeling to Good Planning: The Scientific Secrets of Perfect Timing
    From Gut Feeling to Good Planning: The Scientific Secrets of Perfect Timing
    Daniel H. Pink New York Times Bestselling Author Recorded: Apr 23 2019 66 mins
    A SmartTalkHR Webinar with 'New York Times' best selling author Daniel

    Most of us make decisions about when to start a business, schedule a class, take the next step in a relationship, or make a change in our careers based on intuition and guesswork.

    You may be surprised to learn that timing is really a science. Let New York Times bestselling author Daniel Pink show you his newly discovered scientific method for timing your decisions to propel you into a richer, more satisfying, and more successful lifestyle.

    In this #SmartTalkHR webinar, Daniel will reveal the scientific secrets of perfect timing to help participants discover how to:

    •Use the hidden patterns of the day to build the ideal schedule
    •Create natural breaks to improve performance
    •Turn a stumble into a fresh start
    •Identify the ideal time to make a change

    Save your seat today!
  • The Perfect ICS Cyber Storm - And What You Need To Weather It
    The Perfect ICS Cyber Storm - And What You Need To Weather It
    Michael Rothschild Recorded: Apr 23 2019 55 mins
    Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. A confluence of trends has caused all the right conditions for the perfect and potentially devastating security event. This session will immerse you in this rapidly evolving topic and provide you with the expertise to weather the next category 5 cyber storm.
  • A 360-Degree View of  the Latest APT Groups
    A 360-Degree View of the Latest APT Groups
    Fred Plan, Sr. Threat Intel Analyst, FireEye Recorded: Apr 18 2019 58 mins
    FireEye analysts work to identify cyber espionage trends and gather the evidence needed to name APT groups.

    The most recently named groups—APT38, APT39, APT40—exemplify the variety of state-sponsored threats that network defenders face today: a North Korean operator specializing in bank heists, an Iranian group tracking personal data and specific individuals and a long-established Chinese actor shifting its targeting to reflect changing geopolitics.

    In this webinar, Fred Plan, Sr. Threat Intelligence Analyst at FireEye provides:

    • A high-level overview on how nation-state interests are driving APT activity
    • Insight into the most recent APT groups investigated by FireEye
    • The latest adversary tactics, techniques and procedures (TTPs) these groups use

    Register NOW for the live webinar
  • Data-as-a-Service on the Data Lake
    Data-as-a-Service on the Data Lake
    Kelly Stirman, CMO and VP Strategy, Dremio Recorded: Apr 17 2019 48 mins
    Enterprises have been using data lakes to take advantage of their flexibility, cost model, elasticity, and scalability – but access to the data is a challenge for analysts and BI users.

    Join this webinar to learn how to:

    - Create a self-service semantic layer across all of your data sources, including your data lake
    - Accelerate query performance for BI and data science workloads
    - Secure, govern and mask sensitive data from any source
    - Build a zero-copy data curation model

    And do it all using open source technologies.
  • Learn How to Build an Exceptional Conversational AI Bot
    Learn How to Build an Exceptional Conversational AI Bot
    Peter Joles, Yelena Kasianova Recorded: Apr 17 2019 46 mins
    Many bots fail to deliver enterprise ready conversational solutions and fall short of understanding inquiries.

    That's where our Conversational AI Platform Teneo is different.

    Teneo is one of the most human-like experiences available in commercial conversational AI today, providing the complex capabilities required to create the simple, intuitive experience that your customer demands, while increasing customer engagement. With Teneo, a chatbot can be trained to go beyond the typical 85% understanding mark of competitor products to deliver near perfect results every time.

    Join Peter Joles, Presales Consultant at Artificial Solutions as he demos a Teneo built financial bot called "MyBank". See in real-time how Peter adds flows to enhance the chatbots' capabilities.

    -

    Introducing Teneo Developers, a new comprehensive resource to allow enterprise developers and partners fast access to experience the power of Teneo. Visit www.teneo.ai to get started for free.
  • Understanding Hybrid Resiliency for Business Service Delivery
    Understanding Hybrid Resiliency for Business Service Delivery
    Vincent Rais, Director of Resiliency Services, Uptime Institute Recorded: Apr 17 2019 56 mins
    Understand the critical areas required to provide resilient applications and data across a multi-site hybrid environment.
  • The Digital Media Challenge: Turn Content Consumers into Subscribers
    The Digital Media Challenge: Turn Content Consumers into Subscribers
    Eric Fullerton, Product Marketing Manager, Acquia & Myles Davidson, Managing Director, Inviqa Recorded: Apr 17 2019 56 mins
    Today’s entertainment and media consumers expect an increasingly intuitive, fully personalised digital experience. In order to keep up, savvy media and publishing companies aren’t asking whether or not they need to transform. They’re figuring out how to gain better control of their brand’s digital assets, and how to use analytics and insight to drive the most effective prospective and converted customer journeys.

    Join Acquia and our expert partner Inviqa as we uncover topics such as:

    - The challenges and opportunities for media organisations looking to grow their reader revenue
    - Strategies and success stories for converting digital audiences into engaged subscribers
    - How you can deliver the right content, on the right channel, and at the right time
    - Discussing the steps for creating a personalised customer experience
  • 5 Revenue Killers for eCommerce Merchants
    5 Revenue Killers for eCommerce Merchants
    Yarden Altshul, Ephy Rinsky Recorded: Apr 16 2019 24 mins
    Ecommerce merchants spend significant time and money trying to optimize sales and the omnichannel shopping experience, only to harm revenue with conversion mistakes. This is especially the case in larger companies, as multiple stakeholders in separate departments often measure success differently. In this 30-minute webinar, held by Practical eCommerce & sponsored by Riskified, you will learn to:
    * Appreciate the impact of false declines - What's the true cost of rejecting good customers from
    fear of fraud?
    * Stop turning away legitimate customers - Simple, actionable steps for merchants to approve
    more good orders
    * Optimize your automation measures - Learn which data to use in automated management
    systems to boost accuracy.
  • Slaying the Beast! Getting your arms around your vuln management program.
    Slaying the Beast! Getting your arms around your vuln management program.
    Caspian Kilkelly, Senior Advisory Services Consultant Recorded: Apr 16 2019 48 mins
    Security isn't just about boundaries and defenses. Maintenance, especially in the form of patching, mitigation and threat reduction, are often just as important as a solid set of firewall rules for reducing an attacker's ability to compromise your systems or networks.

    For most security departments, this maintenance comes in the form of a vulnerability management program. Typically, these include patching, scanning, testing, mitigation- when they're done properly, they can prevent incidents before they happen. Vulnerability management is the key to a strong security program in any enterprise, but it's also a lot of work.

    In this webcast, we'll talk about why most security teams need vulnerability management, who to work with to get it done, and strategies to reduce the workload.
  • Trends in Advanced Threat Detection & Vulnerability Management
    Trends in Advanced Threat Detection & Vulnerability Management
    Wade Woolwine, Rapid7, Ajay Uggirala, Juniper Networks & O'Shea Bowens, Null Hat Security & Paul Crichard, BT Global Services Recorded: Apr 16 2019 61 mins
    As cyber attacks become increasingly common, it is vital for organisations to be armed with the most effective tools and knowledge to prevent, detect and respond to cyber threats.

    Join this interactive Q&A panel with top security experts across the ecosystem to learn more about:

    - Trends in Advanced Threat Detection & Vulnerability Management
    - How to use analytics to fight against cyber attacks – patching, detection and response
    - What are the common mistakes made when it comes to Advanced Threat Detection implementation
    - Best practices and recommendations for improving your security posture

    Panel moderated by:
    Michele Drolet, CEO, Towerwall

    Panelists:
    Wade Woolwine, Director of Managed Services, Rapid7
    Ajay Uggirala, Sr. Manager, Product Marketing, Juniper Networks
    O'Shea Bowens, CEO & Founder, Null Hat Security
    Paul Crichard, Security CTO, BT Global Services
  • Provide Better MDR Services to Clients with SOAR for MSSPs
    Provide Better MDR Services to Clients with SOAR for MSSPs
    John Moran, Senior Product Manager, DFLabs and Heather Hixon, Senior Solutions Architecht, DFLabs Recorded: Apr 16 2019 45 mins
    MSSPs face the same challenges that SOCs and CSIRTs are experiencing, including an inundation of security alerts, lack of documented processes and workflows, manual tasks and competition for skilled analysts, but all are faced at a scale multiplied by the number of customers they serve. One of the most pressing is the increasing number of third-party security products they must support in customer environments.

    Performance analytics such as unique KPIs and reporting are also critical assets for MSSPs, for improving service levels and meeting SLAs, while demonstrating value to customers. As service providers, MSSPs are also driven to maximize capabilities and efficiencies to offer their customers the highest quality service at the most competitive prices.

    Security Orchestration, Automation and Response (SOAR) technology is no longer seen as solely a solution for SOCs and CSIRTs. MSSPs are increasingly turning to SOAR solutions to achieve greater internal efficiency, differentiate their services from competitors, and provide advanced Managed Detection and Response (MDR) services.

    IncMan SOAR, DFLabs’ award-winning SOAR platform provides MSSPs with the unique capabilities they need, enabling a multitenant, collaborative approach to security as a service. With IncMan, MSSPs can work seamlessly across multiple customer instances, take as many actions when needed, maintain data segregation and granular access controls, provide per-customer analytics and reporting, while improving their overall effectiveness.

    Join our webinar to learn how SOAR can overcome these MSSP pain points and see firsthand the new features and capabilities of our SOAR solution specifically designed for MSSPs, with more due in Q2 2019.

    Key Takeaways:

    - Common Challenges and Pain Points of MSSPs
    - Benefits of Providing Managed Detection and Response Services
    - Benefits of Utilizing a SOAR Solution
    - New Features and Capabilities of IncMan SOAR for MSSPs
  • Critical Infrastructure Cyber War Game
    Critical Infrastructure Cyber War Game
    IndegyTV Recorded: Apr 15 2019 3 mins
    In the high stakes game of industrial cyber security, which powers will you need to defend your organization. Will you choose player 1 or player 2.
  • Meet the Experts – EDC 10.2.2 Release Deep-Dive & Demo
    Meet the Experts – EDC 10.2.2 Release Deep-Dive & Demo
    Gaurav Pathak, Product Management, Dharma Kuthanur, Product Marketing Recorded: Apr 15 2019 58 mins
    Get a deep-dive into how you can leverage the best of human expertise and AI with EDC 10.2.2. Subject matter expertise and social curation combined with the power of AI deliver a collaborative experience for data discovery, cataloging and management.
  • Converting Threat Intelligence to Business Strategy
    Converting Threat Intelligence to Business Strategy
    Josh Douglas, Vice President, Product Management for Threat Intel Recorded: Apr 15 2019 16 mins
    Understanding the threat is more than just IoCs that only have a marginal capability to actionable to protect your enterprise. Today’s security team’s need to understand what attackers want and how they are a target. This means moving away from post breach threat intelligence and becoming more active in your security posture to divert attacks to a softer target. By applying measures of counter intelligence your organization can solve problems that create strategic initiaitives.
  • Managing Complex Requirements in an Agile World
    Managing Complex Requirements in an Agile World
    Mark Barbir, Bryon Kroger, Robin Calhoun, Kevin Steigerwald Recorded: Apr 12 2019 61 mins
    More and more, teams are looking to develop faster, react faster, and plan faster—even
    companies building complex software and hardware products. Do you have the skills to properly
    balance moving fast while still documenting and maintaining complicated requirements? Our
    expert panel discuss the tools, tricks, and processes they use to achieve success and avoid
    failure when managing complex requirements.

    Here’s what you’ll learn in this webinar:
    ● Requirements management done the right way
    ● Tips for managing requirements across teams and products
    ● Best practices for traceability and change management

    Presenters:
    Mark Barbir, Senior Vice President of Engineering at ProductPlan
    Bryon Kroger, Chief Operating Officer at Kessel Run.
    Robin Calhoun is a Senior Product Manager with Jama Software
    Kevin Steigerwald is the VP of Products and UX at Jama Software
  • Tendances et méthodes derrière les dernières cyberattaques d’aujourd’hui
    Tendances et méthodes derrière les dernières cyberattaques d’aujourd’hui
    David Grout, EMEA CTO, FireEye Recorded: Apr 11 2019 48 mins
    Explorez les dernières innovations utilisées par les groupes d’attaquants, leurs méthodes et motivations dans notre rapport M-Trends 2019; rapport annuel publié par nos équipes d’investigations et de réponse à Incidents Mandiant sur les cyberattaques les plus conséquentes de l’année.

    Rejoignez-nous au webinaire durant lequel les experts Mandiant de FireEye discutent des faits principaux et des études de cas de l'édition de cette année, notamment:

    Nouveaux groupes d’attaquants et APT émergés en 2018
    •L’évolution du cyber espionnage en Corée du Nord, Russie, Chine et en Iran.
    •Pourquoi la phrase ‘Ciblé une fois, toujours ciblé’ est plus vraie que jamais
    •Les risques de phishing lors d’activités de fusion et d’acquisitions
    •Des cas d’usages et retour clients par régions
    •Les meilleures pratiques tirées de l’expérience de nos équipes en front line sur des interventions cybers
    S’inscrire au webinaire MAINTENANT
  • EU Settlement Scheme - what retailers need to know
    EU Settlement Scheme - what retailers need to know
    BRC, Home Office Recorded: Apr 10 2019 58 mins
    The EU Settlement Scheme allows EEA citizens currently resident in the UK, and their family members, to continue living in the UK after the UK leaves the EU. This webinar, delivered in partnership with the Home Office, will provide retail employers:
    • with key information about the scheme to support colleagues secure their status and;
    • information regarding employers’ right to work obligations.
  • M-Trends 2019: quali trend dietro un attacco Cyber
    M-Trends 2019: quali trend dietro un attacco Cyber
    Marco Riboli, VP, Southern Europe, FireEye; Gabriele Zanoni, Sales Engineer, FireEye Recorded: Apr 10 2019 48 mins
    Scopri quali sono le tecniche più utilizzate, i comportamenti e le motivazioni degli attaccanti di oggi nel Report M-Trends 2019, la nostra pubblicazione annuale basata sulle investigazioni condotte dai consulenti Mandiant, società di FireEye, sugli attacchi informatici che hanno avuto il maggior impatto nel 2018.

    Partecipa al webinar durante il quale i nostri esperti, sulla base dell’esperienza Mandiant, azienda di FireEye, evidenzieranno le novità e i casi studio di quest’ultima edizione, in particolare:
    • Evoluzione dei trend d’attacco nell’attuale panorama delle minacce cyber
    • Nuovi gruppi APT identificati nel 2018
    • Rischi di phishing nascosti durante operazioni di fusione e acquisizione (M&A)
    • Casi di compromissioni reali
    • Best practice basate sull’esperienza diretta degli esperti di incident response

    Registrati al webinar ORA!
  • Eliminate Cloud Compliance Bottlenecks: How to Automate IaaS Security Monitoring
    Eliminate Cloud Compliance Bottlenecks: How to Automate IaaS Security Monitoring
    Anand Visvanathan, Director of Product Management, Symantec and Linda Park, Sr. Manager IaaS, Security & Compliance, Symantec Apr 25 2019 5:00 am UTC 45 mins
    Cloud computing enables companies to be more agile and squeeze the inefficiencies out of the development cycle, such as procuring compute resources on demand rather than waiting for IT. But as companies move fast to deliver new products, security must move faster to keep up with new regulations and threats – or risk slowing down the business.

    Cloud configuration errors can lead to gaping holes in cloud infrastructure deployments and present low hanging fruit for hackers. Security and DevOps teams need a proactive, automated approach to monitoring and securing their cloud management plane.

    Join us for this informative webinar on how to achieve security compliance for public cloud Infrastructure-as-a-Service (IaaS) platforms such as AWS and Microsoft Azure.

    During this webinar, you'll learn:

    • Why traditional security monitoring tools cannot provide visibility into cloud compliance risks

    • Why Security and DevOps teams need automated cloud security
    posture management (CSPM) tools to remove compliance bottlenecks

    • How to migrate your legacy infrastructure to the cloud without compromising security and compliance

    Please Join Us, Register Today
  • Networking, Connecting and Communicating your way to a Non-Executive Career
    Networking, Connecting and Communicating your way to a Non-Executive Career
    Anne Watson & Naomi Coxwell Apr 25 2019 9:00 am UTC 60 mins
    This interactive, free webinar session will take place on Thursday 25th of April at 10 am and will give you a clear insight into the art of networking and how it can unlock a multitude of opportunities when conducted well.



    The presentation will be led by Anne Watson, award-winning author and non-executive director and she will be joined by Naomi Coxwell, former Vice President of BP America and portfolio non-executive.



    The session will last around 45 minutes, with the first 20 minutes led by Anne, dedicated to the secrets of good networking. It will cover:



    The challenges you may face in a career transition
    How to harness your existing connections and make new ones
    Why Corporate Governance could dictate what roles are available to you
    How to create new connections, reach out to recruiters and engage at events


    This will then be followed by an informative Q&A between Anne and Naomi, where Naomi will discuss her transition to a non-executive career, experience on our Ahead of the Curve programme and how she’s managed to secure and excel in three different boardroom roles.
  • [Panel] Harnessing Knowledge: The State of Enterprise Application Security
    [Panel] Harnessing Knowledge: The State of Enterprise Application Security
    Daniel Blander, Virtual Clarity (Moderator), Joseph Feiman, CSO, WhiteHat Security & Paul Farrington, CTO, Veracode EMEA Apr 25 2019 3:00 pm UTC 60 mins
    As organizations strive to transform themselves for the digital economy, application development is moving further into the spotlight - and right behind it is application security.

    So in 2019, AppSec can make or break a business. Instead of being overwhelmed by this pressure, there are tools and processes on the market that can help your application both meet and exceed business and security demands.

    From infrastructure-as-code models to API security and DevOps, learn from this panel of global experts how to harness knowledge and accelerate application release cycles, improve security and transform your business.

    Moderator: Daniel Blander, Virtual Clarity
    Panelists:
    Joseph Feiman, Chief Strategy Officer, WhiteHat Security
    Paul Farrington, CTO, Veracode EMEA
  • The Patient Experience Imperative: Simplifying The Healthcare System
    The Patient Experience Imperative: Simplifying The Healthcare System
    Colette Balaam, CEO, Hive / Karl Hampson, Director of AI, Solstice / Steve Prewitt, Chief Analytics Officer, Healthfirst Apr 25 2019 4:00 pm UTC 45 mins
    Join Colette Balaam, CEO at Hive, Karl Hampson, Director of AI at Solstice, and Steve Prewitt, Chief Analytics Officer at Healthfirst, as they explore how enterprises should leverage advanced analytics and data platforms to improve health outcomes for their patients and members.
  • Changing the Game: Transforming Customer Engagement in Financial Services
    Changing the Game: Transforming Customer Engagement in Financial Services
    Tim Crawford Apr 25 2019 5:00 pm UTC 54 mins
    This free 1-hour webinar from Gigaom Research brings together leading minds in CRM for the financial services industry, featuring Gigaom head of research and CIO Tim Crawford joined by NextJ thought leaders in a roundtable discussion on how to transform customer engagement in financial services.

    In today’s hyper-competitive business climate, companies are looking at differentiated services to build stronger relationships with their clients. Specifically, in the financial services industry, the competition for both commercial and retail products is fierce.

    This webinar delves into the opportunities that come from domain expertise that industry-specific solutions deliver. In addition, we look at the ways that companies can develop differentiated services to build stronger relationships with their clients. We cover approaches specific to the financial services industry, including AI and machine learning, to better understand customers in ways that makes it hard for others to compete.

    This 1-hour webinar will give attendees insights to:

    •What are the challenges that financial services organization face today?
    •What does ‘holistic view of the customer’ mean? (ecosystem)
    •How does customer engagement and loyalty play a role?
    •Does domain expertise in the financial services industry benefit CRM?
    •CRM is not new. What is the value from an industry-specific CRM solution?
    •How are regulatory/ compliance and KYC issues addressed?
    •Is integration with other systems/ data sources a key issue?
    •How does Machine Learning and AI fit in?
  • How to Migrate Applications Off a Mainframe
    How to Migrate Applications Off a Mainframe
    Rohit Kelapure, Consulting Practice Lead, Pivotal Apr 25 2019 5:00 pm UTC 60 mins
    Ah, the mainframe. Peel back many transactional business applications at any enterprise and you’ll find a mainframe application under there. It’s often where the crown jewels of the business’ data and core transactions are processed. The tooling for these applications is dated and new code is infrequent, but moving off is seen as risky. No one. Wants. To. Touch. Mainframes.

    But mainframe applications don’t have to be the electric third rail. Modernizing, even pieces of those mainframe workloads into modern frameworks on modern platforms, has huge payoffs. Developers can gain all the productivity benefits of modern tooling. Not to mention the scaling, security, and cost benefits.

    So, how do you get started modernizing applications off a mainframe? Join Rohit Kelapure, Consulting Practice Lead at Pivotal, as he shares lessons from projects with enterprises to move workloads off of mainframes. You’ll learn:

    ● How to decide what to modernize first by looking at business requirements AND the existing codebase
    ● How to take a test-driven approach to minimize risks in decomposing the mainframe application
    ● What to use as a replacement or evolution of mainframe schedulers
    ● How to include COBOL and other mainframe developers in the process to retain institutional knowledge and defuse project detractors
    ● How to replatform mainframe applications to the cloud leveraging a spectrum of techniques

    We look forward to you joining us.
  • [Earn 1 CPE] Key Steps to Identify Risk and Master Vendor Risk Management
    [Earn 1 CPE] Key Steps to Identify Risk and Master Vendor Risk Management
    Colin Whittaker, IRD; Jake Olcott, BitSight; Blake Brannon, OneTrust; Kelly White, RiskRecon; and Todd Boehler, ProcessUnity. Apr 25 2019 5:00 pm UTC 75 mins
    In today’s interconnected technology ecosystem, companies increasingly rely on third party vendors to meet their operational needs. However, the current state of vendor risk management (VRM) is bleak. More than half of all information security breaches are caused by third-party vendors, and according to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes.

    Understanding and managing cyber risk posed by vendors, suppliers, and third parties has proven to be a difficult task. The right mix of people, processes, and technology result in the most effective and comprehensive program. Join this CPE accredited panel webinar as our expert panel address some key steps to master VRM, including:

    - Implementing a scalable VRM program from the ground up,
    - Tips on managing vendor data and mapping the digital supply chain,
    - Assessing third, fourth, and fifth-party risk,
    - Performing quantifiable vendor security analyses,
    - Establishing pre-procurement standards.
  • Evaluating a Modern Business Intelligence Platform
    Evaluating a Modern Business Intelligence Platform
    Jurgen Hoogerboord Apr 30 2019 12:00 pm UTC 61 mins
    When moving from a Traditional to a Modern Business Intelligence platform, giving business users access to data whilst maintaining data governance may seem like an either/or choice. With Tableau, it's not.

    In this webinar, discover the most important details that IT must consider when evaluating and selecting a modern analytics platform.

    Join analytics expert Jurgen Hoogerboord to learn:

    Why moving from Traditional to Modern analytics is needed in today’s business landscape
    What to consider when evaluating Modern Business Intelligence and Analytics platforms
    How shifting to enterprise self-service analytics tools empowers both the business and IT
  • DevOps in the Real World
    DevOps in the Real World
    Jon Collins, Nigel Kersten Apr 30 2019 5:00 pm UTC 60 mins
    This free 1-hour webinar from Gigaom Research brings together leading minds in DevOps, featuring Gigaom principal analyst Jon Collins and Puppet's Nigel Kersten in a discussion about the practicalities of delivering on the benefits of DevOps.

    As increasing numbers of organizations look to DevOps as a way of delivering on their innovation and continuous delivery goals, they are confronted with many challenges — to the extent that they might conclude that DevOps isn’t for them. At the same time, decision makers looking to automate and simplify integration, test and deployment activities recognize that tools cannot be adopted in a vacuum.

    So, how can organizations take a pragmatic position on DevOps, and what lessons can they learn about delivering both efficiency and effectiveness, and above all, make things simpler with DevOps automation?

    In this webinar, we consider the options now available to simplify development and operations tasks. We look at the role and scope of model-driven management, for example where it needs to be supported by discrete activity. And overall, if DevOps is a journey, we consider lessons to be learned from those further down the path.

    This 1-hour webinar will give attendees insights into:

    What challenges are enterprises looking to address with DevOps today?
    How can decision makers determine if DevOps is valid for their environments?
    What automation options are available for those adopting DevOps practices?
    Why are organizations adopting best-of-breed DevOps automation approaches?
    How can decision makers navigate bureaucracy and demonstrate value?
    What is the role of management data and visualization for development decisions?
    Why are maturity models the wrong starting point for the DevOps journey?
    Are there other factors to consider such as organization, process?
  • Protecting Your Business from eCommerce Fraud
    Protecting Your Business from eCommerce Fraud
    Emilie Grunzweig - Director of insights Apr 30 2019 5:00 pm UTC 43 mins
    Originally presented to the members of the Federation of Credit, this webinar covers the background of eCommerce fraud, its impact, and provides some tips for protecting your business.

    Find out how fraudsters attack - Get an overview of types of fraud and how to spot them
    Learn about the impact of fraud- See how much merchants lose annually to attacks
    Protect your business - Use our actionable tips for preventing fraud attacks
  • SkyStem: Overview of the SEC's Whistleblower Program
    SkyStem: Overview of the SEC's Whistleblower Program
    Nancy Wu, Sales and Customer Support, SkyStem Apr 30 2019 6:00 pm UTC 57 mins
    [Live Recording] Join us for an overview of the SEC's Whistleblower Program. Learn about how the program is set up, the extent of damages awarded to date, and the resulting benefits the program has produced for our society at large.

    Please note: CPE credit not available for this playback
  • Solving Business Challenges with Mobile Device Customization
    Solving Business Challenges with Mobile Device Customization
    Bob Egan, Valerie Espinoza, Bharat Saini, Kyle Toburen, Edward Horowitz, May 1 2019 5:00 pm UTC 60 mins
    This free 1-hour webinar from Gigaom Research brings together leading minds in digital business transformation, featuring Gigaom Senior Executive Analyst Bob Egan, Samsung’s Knox expert, Valerie Espinoza, Hipaax’s Founder and CTO, Bharat Saini and UCHealth’s Kyle Toburen and Edward Horowitz. This roundtable conversation will discuss how businesses are finding new ways to customize technology to solve business challenges.

    As employees and customers become increasing digital, businesses must find new ways to provide up-to-date information and content in a secure and cost effective way. With device customization technology, businesses can transform off-the-shelf hardware into single-purpose devices designed with both employees and customer needs in mind.
    In this webinar, Bob Egan will moderate the discussion with our panelists as:

    •Samsung’s Knox expert Valerie Espinoza, reviews several ways businesses have used customized hardware and applications to solve business challenges in healthcare, education, retail and more.
    •UCHealth’s Kyle Toburen and Edward Horowitz discuss how customizing tablets with preload applications helped increase overall employee and patient satisfaction while maintaining HIPPA compliance.
    •Hipaax’s Founder and CTO, Bharat Saini provides insight on the deployment process and implementation of a custom wearable solution to meet a specific business needs.
  • Operational Technology Security: Building a System of Trust
    Operational Technology Security: Building a System of Trust
    Nick Savvides, Chief Technology Officer, APAC, Symantec May 2 2019 12:00 am UTC 60 mins
    As the 4th Industrial Revolution drives tremendous progress in energy, manufacturing, mining, transportation, and countless other Industrial Control Systems (ICS), threats targeting these systems are on the rise.

    Operational Technology (OT) is mission-critical in these industries, but legacy systems are often outdated and nearly impossible to secure with traditional corporate security controls. The infamous Symantec-discovered Stuxnet malware that manipulated centrifuges in Iranian nuclear, was carried in via USB, demonstrating the devastating physical consequences of outdated security controls to OT.

    Join Nick Savvides, CTO, Asia-Pacific, Symantec, to learn how Symantec can help you protect your factories, refineries, hospitals, building management and infrastructure by embedding security directly into industrial equipment, and helping you better monitor industrial networks for cyber threats..

    During this webinar, Nick will discuss:

    - The fundamentals of OT security and the importance OT security analytics for advanced threats
    - How to defend against USB-borne malware, network intrusion and zero-day attacks on operational technology
    - Recommendations for securing OT environments and building a system of trust.
  • Mobilizing Digital Transformation In The Workplace: Why Consumer Devices Aren’t
    Mobilizing Digital Transformation In The Workplace: Why Consumer Devices Aren’t
    Bob Egan, Andrew Duncan, David Krebs May 2 2019 5:00 pm UTC 66 mins
    The driving force behind most enterprise digital transformation initiatives is a fundamental need to enhance productivity, increase operational efficiency and create a competitive advantage. It’s why so many companies are seeking out and investing in more powerful mobile devices that help their staff work smarter, more efficiently and more collaboratively. But empowering enterprise workers to elevate outcomes requires enterprise-specific solutions. And, far too often, companies are instead turning to consumer smartphones as a solution—only to realize critical shortcomings that lead to higher cost of ownership and disappointing results.

    In this webinar, you’ll learn why it pays to factor in the hidden costs of time and budget that are often overlooked with consumer phones, including insufficient support and limited security that falls short of protecting sensitive data across enterprise systems and solutions. Join us for this free 1-hour webinar from GigaOm Research, featuring GigaOm contributor Bob Egan and special guests, Andrew Duncan, Vice President of Product Management and Technology Solutions from Spectralink and David Krebs Executive VP, Enterprise Mobility and Connected Devices from VDC Research.

    In this webinar, we will discuss three key issues:
    •Why enterprise mobility is key to digital transformation and how it is evolving
    •Why managing mobile devices to maximize efficiency is both a device and infrastructure undertaking
    •What the key tenants and considerations are for implementing mobility in an era of digital Transformation
  • SkyStem: Perfecting the Close Checklist
    SkyStem: Perfecting the Close Checklist
    Nancy Wu, Sales and Customer Support, SkyStem May 2 2019 6:00 pm UTC 55 mins
    [Live Recording] It's time to spruce up the close checklist! Join us in this webinar where we will revisit best practices as well as practical tips to help improve the financial close process. Whether you have a close checklist, a close calendar, or even if you are still forming a close process, these practices will surely help your period-end close.

    Please note: CPE credit not available for this playback
  • Shoot for the...Cloud? Getting started with security in AWS
    Shoot for the...Cloud? Getting started with security in AWS
    Josh Frantz, Senior Security Consultant May 2 2019 6:00 pm UTC 52 mins
    Is your organization moving to Amazon Web Services? Or are you a seasoned AWS pro, but need to know where to start to secure it?

    It’s a fact—Cloud environments aren’t going away anytime soon. Cloud adoption is expected to grow at 12.4% annually until 2025. When you need to get started in a new cloud environment, or secure an existing one, vulnerability management is the place to start.

    Join Josh Frantz to learn the fundamentals of setting up vulnerability management in your cloud environment and common pitfalls to watch out for. You may even pick up a few good wise cracks along the way.

    In this webinar we will cover:

    1. The future of the cloud infrastructure landscape
    2. Some common misconceptions. Did you know AWS doesn’t secure your environment for you?
    3. Vulnerability Management best practices
    4. How Rapid7 and InsightVM can help
  • Enabling the Future State of Content
    Enabling the Future State of Content
    Andrew Thomas, Senior Director Marketing, SDL May 7 2019 3:00 pm UTC 60 mins
    When change is a constant, how do you prepare for the future?

    We believe that companies can prepare for the future of content, and Linguistic AI plays a vital role in this transformation. Beyond an idealistic future vision, we want to offer real solutions to your challenges, obstacles and realities.

    Learn how the latest advances can help you create, translate and deliver those experiences for your customers, wherever they are in the world, all while preparing for a new reality.

    In this webinar, “Enabling the Future State of Content,” I will share where technology is taking us and how a machine-first strategy can optimize your customers’ experiences.
  • Top 50 Emerging Technologies and Growth Opportunities
    Top 50 Emerging Technologies and Growth Opportunities
    Rajiv Kumar, Senior Partner, TechVision, Frost & Sullivan May 9 2019 4:00 pm UTC 75 mins
    Emerging technologies are enabling powerful innovations by converging with other advanced innovative solutions to generate multi-billion dollar markets and growth opportunities across our world.

    At the core, technology convergence involves overlaying two or more emerging or existing technologies to create unique value propositions that could be commercialized. While each emerging technology on its own represents an area of intensified R&D, heightened investments, increased IP activity, and tremendous market potential, the possible convergence of several technologies opens up unprecedented opportunities for new revenue models and the next generation of innovative products and solutions.

    Frost & Sullivan invites you to join Rajiv Kumar, Senior Partner, TechVision, as he discusses the global innovation cycle and disruptive business opportunities in the webinar: Top 50 Emerging Technologies & Growth Opportunities.

    Key Takeaways:
    • Identify the hottest technologies that will change the direction and landscape of multiple industries
    • Learn best practices for convincing internal stakeholders to pursue technology convergence strategies
    • Receive action steps to leverage the ecosystem of technology partners to enable
  • Top 50 Emerging Technologies & Growth Opportunities
    Top 50 Emerging Technologies & Growth Opportunities
    Anand S. Vice President, TechVision, Frost & Sullivan May 13 2019 6:30 am UTC 60 mins
    Emerging technologies are enabling powerful innovations by converging with other advanced innovative solutions to generate multi-billion dollar markets and growth opportunities across our world.

    At the core, technology convergence involves overlaying two or more emerging or existing technologies to create unique value propositions that could be commercialized. While each emerging technology on its own represents an area of intensified R&D, heightened investments, increased IP activity, and tremendous market potential, the possible convergence of several technologies opens up unprecedented opportunities for new revenue models and the next generation of innovative products and solutions.

    Key Takeaways:
    · Identify the hottest technologies that will change the direction and landscape of multiple industries
    · Learn best practices for convincing internal stakeholders to pursue technology convergence strategies
    · Receive action steps to leverage the ecosystem of technology partners to enable
  • GDPR One Year On: what should retailers be considering now?
    GDPR One Year On: what should retailers be considering now?
    BRC, PwC May 21 2019 1:00 pm UTC 60 mins
    This webcast from the BRC, in association with PwC, will help retailers navigate the complexity of current legislation. It will give practical advice on how to manage risk as the legislation evolves and will bring all this to life with a number of case studies.
  • Deploying Kubernetes to Drive Business, Not Complexity
    Deploying Kubernetes to Drive Business, Not Complexity
    Chuck Knostman, Dave Bartoletti and Cornelia Davis May 29 2019 5:00 pm UTC 60 mins
    Everybody is talking about the promise of Kubernetes, but it takes more than optimism to turn a complex technology into something that can deliver real business results.

    Once deployed, Kubernetes presents a litany of operational, management, and cultural challenges for which many users will not have prepared adequately. This webinar will highlight approaches to successfully implementing Kubernetes at enterprise scale and making it an effective facilitator of digital transformation.

    Join special guest Dave Bartoletti of Forrester Research in conversation with Chuck Knostman, Vice President IT at T-Mobile, and Cornelia Davis, Vice President of Technology for Pivotal, as they discuss how companies can get the most value from their Kubernetes deployments, which workloads are best suited for those environments, and the true state of Kubernetes adoption among enterprises.

    Speakers:
    Chuck Knostman, Vice President IT, T-Mobile
    Dave Bartoletti, Vice President, Analyst, Forrester Research
    Cornelia Davis, Vice President of Technology, Pivotal
  • Future of Work and Workforce Transformation
    Future of Work and Workforce Transformation
    Kathi Enderes, Vice President, Talent and Workforce Research Leader, Bersin, Deloitte Consulting LLP May 29 2019 6:00 pm UTC 60 mins
    The Future of Work will see the culmination of many disruptive trends impacting the nature of work itself, an expansion of the workforce ecosystem and a broadening of workplace options. As technology is advancing exponentially, productivity is often stalling.

    Join Kathi Enderes, Vice President, Talent and Workforce Research Leader, Bersin, Deloitte Consulting LLP, and Eightfold.ai to learn about the disruptors in the Future of Work, and ways to use the new Bersin Workforce Transformation framework to help you continuously transform work and the workforce for these new realities.

    What You Will Learn:

    - Apply the 7 disruptors driving the Future of Work for your organization
    - Define the reason why productivity is stalling
    - Determine how to apply a Workforce Transformation framework to your business environment
    - Identify how to evolve talent management and workforce planning for the Future of Work
    - Review how technology can fuel your workforce of the future
  • Emerging technologies in Europe: The Digital Octopus' strategy
    Emerging technologies in Europe: The Digital Octopus' strategy
    Gabriele Roberti and Andrea Siviero May 30 2019 1:00 pm UTC 30 mins
    Innovation Accelerators such as Artificial Intelligence, Internet of Things, Augmented & Virtual Reality and other emerging technologies are drawing unique opportunities and challenges across European vertical markets, with multiple digital use cases unlocking new technology scenarios for companies.

    In this IDC web conference Gabriele Roberti and Andrea Siviero from the IDC European Customer Insights & Analysis team will discuss the combination of these emerging technologies and the leading disruptive use cases across European industries, such as professional services, retail, healthcare and others, answering questions such as:

    How fast the different European industries are surfing the innovation wave?

    What are the key digital use cases and associated business outcomes across European sectors?

    What are the next-horizon technologies and their impact on different industries?

    What a “Digital Octopus vertical strategy” is for handling multiple use cases and emerging technologies, and how to build one.

    Our webinar will help you charting out a solid vertical roadmap to address the most innovative and promising segments of the European technology market, while learning about real life end-user examples and preempting those emerging technologies that will reshape the future European business landscape.
  • [Earn CPE] Enabling GRC with Secure Authentication across the Digital Ecosystem
    [Earn CPE] Enabling GRC with Secure Authentication across the Digital Ecosystem
    Colin Whittaker, IRD; Richard Bird, Ping Identity; Teju Shyamsundar, Okta, Jerrod Chong, Yubico; and Andy Smith, Centrify. May 30 2019 5:00 pm UTC 75 mins
    The days of securing a well-defined perimeter around your organization are gone. The cloud, mobile technologies, the internet of things (IoT) and diverse user groups freely exchange data across digital ecosystems, network and economies. This fluidity, however, means that organizations must secure access at multiple points throughout the organization, or risk letting in intruders seeking to hijack data.

    To manage the increasingly diverse digital landscape, IT and security managers need to move beyond usernames and passwords, and expand their use of multi-factor authentication (MFA) to help provide secure and convenient access to the critical data and systems users need. On this webinar our panel of experts will address how secure authentication can help enable GRC across the digital ecosystem, and they will share tips on:

    - Securing access at all points across applications, devices, users and environments.
    - Sharing insights across security systems to strengthen security.
    - Collecting and analyzing information to stop attacks.
    - How MFA can transform secure access—to any application, from any device, anywhere, at any time.
    - Strengthening identity assurance with privileged users.
  • Technology as a Gamechanger for eCommerce
    Technology as a Gamechanger for eCommerce
    Daniel Kornitzer, Chief Business Development Officer, Paysafe + panel of experts Jun 3 2019 8:00 am UTC 75 mins
    What does the future of connected commerce look like? The changing need of the customer has meant that the shopping experience is changing and merchants, retailers, and payments companies need to future-proof their offerings.

    Join this panel to discover:

    -Current landscape and trends in the commerce industry
    -How can AI revolutionise the customer experience and help organisations evolve?
    -From PoS to multi-channel platforms, how can you provide a frictionless customer experience?
    -What are the risk and compliance challenges that need to be at top-of-mind?
    -How can we proactively prevent fraud rather than react when the damage has been done?