Hi [[ session.user.profile.firstName ]]

CxO Strategy

  • GDPR Mini-Webinar Series - Episode 8 - Working with Third-Parties
    GDPR Mini-Webinar Series - Episode 8 - Working with Third-Parties Amar Singh & Chris Payne Recorded: Jun 23 2017 13 mins
    Our eight-part mini-webinar series aims to get you up to speed with the main articles of the GDPR with short, no nonsense and informative webinars. In this webinar we will discuss working with third-parties
  • Digitizing legacy POS for Omni-channel Integration
    Digitizing legacy POS for Omni-channel Integration Hariharan Ganesh - Head of Enterprise Integration, Aspire Systems Recorded: Jun 22 2017 55 mins
    Since its advent in 1974, POS has managed almost 100% of transaction processing with utmost efficiency. Even though modern Cloud POS helps to establish digital experience, traditional legacy POS systems cannot meet digital requirements and diminish the customer experience, online reachability as it lacks real-time access, inventory management & Omni-channel capabilities.

    Learn how you can make your existing legacy POS more powerful & connected with your digital strategy to meet modern customers.
  • 6 Hidden Security Risks for Industrial Environments
    6 Hidden Security Risks for Industrial Environments Rob Caldwell, ICS Manager, FireEye Recorded: Jun 22 2017 35 mins
    Industrial enterprises – like electric utilities, petroleum companies, and manufacturing organisations – invest heavily in industrial control systems (ICS) to operate industrial processes efficiently, reliably, and safely. Without technology operating the plant floor, business halts or worse.

    Join our webcast to discuss six key plant floor weaknesses that adversaries exploit to undermine plant operations. Subversive and difficult to detect, explore the implications and a step-by-step checklist for mitigating these risks firsthand with our experts.
  • Tableau in the Cloud: A Netflix Original
    Tableau in the Cloud: A Netflix Original Albert Wong - Reporting Platform Manager, Netflix Recorded: Jun 22 2017 65 mins
    See how Netflix built its analytics in the cloud with Tableau and Amazon Web Services

    Building out a data platform doesn't have to be like building a House of Cards, and our friends at Netflix know this better than anyone else. With 86 million members and counting, and more than 700 billion events per day, Netflix has had to expand their data capabilities by developing a scalable and flexible analytics platform built on Tableau and AWS.

    Attend this webinar to hear from Albert Wong, analytics expert at Netflix, to see how they simplified their data stack by building a data lake/data warehouse strategy which allows Netflix to collect and store massive amounts of data, supporting thousands of Tableau users with managed data.

    You'll learn about:

    How to set up effective analytics on top of enormous data sets
    How Netflix serves large groups of people with governed data
    The details of Netflix's data lake/data warehouse strategy
    How Netflix manages Hadoop with Tableau
  • Hybrid IT: How to create the right multi-cloud strategy.
    Hybrid IT: How to create the right multi-cloud strategy. William Fellowes, Founder, 451 Research, Neville Roberts, CEO, Planixs, James Griffin, Cloud Evangelist, Vodafone Recorded: Jun 22 2017 60 mins
    How can you better embrace multiple cloud and non-cloud IT environments in order to accelerate your digital business?
    How can you succeed in a multi-cloud world? We’ve gathered a range of experts opinions including the analyst perspective, the Vodafone view and a Vodafone customer CEO’s outlook.

    Speakers:
    William Fellowes, Analyst, 451 Research
    Neville Roberts, CEO, Planixs
    James Griffin, Cloud Evangelist, Vodafone


    Key talking points:
    -Common challenges of managing IT environments
    -What challenges enterprises face in different countries
    -How to select the right cloud for the right application
    -Choosing the right cloud vendors
    -How to manage these environments simply and securely

    Hear from Vodafone’s key customer Planixs (http://www.planixs.com) on:
    - How they manage multi cloud environments
    - The key things they consider when selecting vendors
  • Protect Against Ransomware
    Protect Against Ransomware Adam Licata, Senior Product Marketing Manager, Symantec; Damon Covey,Director of Product Management, Symantec Recorded: Jun 22 2017 56 mins
    Ransomware attacks are on the rise and wreaking havoc like never before. Attend this webinar to find out some of the key things you can do to greatly reduce the chance of Ransomware ever becoming an issue for your organization. We will discuss how to set up a strong defense across email, web, endpoints, and workloads.

    Join us for this free session today!
  • [Webinar] Cyber ranges: Because you don't #wannacry
    [Webinar] Cyber ranges: Because you don't #wannacry Amritam Putatunda,Technical Product,Ixia, Alex Handy,Tech Journalist,THENEWSTACK,Pascal Joly,Tech Partnerships ,Quali Recorded: Jun 21 2017 58 mins
    Despite billions of dollars invested in cyber security measures, companies are still falling behind when it comes to cyber attack prevention. Case in point, The recent malware campaign “WannaCry” that was able to infect more than 300 thousand systems in short duration of time. This is a testimony to the fact that investments in proactive, rather than reactive defense strategy is acutely needed. Current cyber range solutions are often siloed efforts that takes weeks to set up and cover limited scenarios.
    Addressing these problems requires a new approach with on demand self-service environments to train incident response teams in a holistic manner across the entire organization and simulate a comprehensive set of attacks on IT infrastructure.
    In this webinar you will learn how you can use the power of Quali sandboxes and Ixia Breaking Point solution in creation of a Cyber Range training environment to
    -Rapidly provision full-stack, real-world cyber threat environments
    -Generate thousands of unique attacks mixed with a large variety of real life traffic profiles
    -Reports and grades that measures trainees abilities to neutralize attacks while maintaining traffic continuity.
  • Managing Digital Applications for rapid growth: CIO’s nightmare
    Managing Digital Applications for rapid growth: CIO’s nightmare Janaki Jayachandran: Technology Director, Jothi Rengarajan: Principle Architect Recorded: Jun 21 2017 58 mins
    Almost every Enterprise is in the middle of digital transformation wave spanning across the landscape of social media, mobility, Analytics and Cloud. However, Enterprises have a big challenge in managing the digital applications built across this landscape comprising of both custom built and out of box solutions. While the number of applications grows rapidly there is also an increasing demand from the business which puts Enterprise IT under constant pressure to improve their agility and provide faster response times to meet market demands. Therefore, Enterprises are in dire need of a solution to simplify the development and management of digital applications with little to no operational overhead.
    In this webinar, we will be focusing on how to address the challenges of managing multiple digital applications and bring in standardization in the way they are built and managed.

    Join the webinar and learn how effectively you can improve business agility and achieve faster time to market through simplifying management of Digital Applications.

    Key Takeaways:
    •Challenges in managing diversified applications
    •Features of a Digital Management Platform
    •Building blocks for rapid development of new digital applications
    •Digital Management Journey of a Fortune 400 company
  • PCI Continuous Controls; Set It and Forget It
    PCI Continuous Controls; Set It and Forget It Jennifer Pesci-Anderson, Peter Ridgley, George Waller Recorded: Jun 20 2017 61 mins
    With mounting HIPAA regulations and PCI requirements, learn why securing your access credentials should be your number 1 priority this year and solutions that can take the guess work out of the authentication process.
  • Disruptive Technologies Influencing the Future of Logistics to 2025
    Disruptive Technologies Influencing the Future of Logistics to 2025 Archana Vidyasekar, Global Manager and Vijay Narayanan, Senior Research Analyst, Visionary Innovation Group Recorded: Jun 20 2017 58 mins
    Technological intrusion in the logistics space has resulted in minimizing the current complexity. Trends such as connectivity have resulted in creating new types of service deliveries centered on app-based and marketplace models that are already disrupting the supply chain. The study is broken down into three clusters—technology scenarios, business scenarios and market scenarios—covering the new innovations, business models, and routes and regions that are expected to create a multitude of opportunities in the logistics space.
  • A Structured Approach to Better Staff Scheduling
    A Structured Approach to Better Staff Scheduling Steve O'Brian, Vice President, Shiftboard Recorded: Jun 15 2017 49 mins
    Learn how a better scheduling framework creates a better workflow and leads to better outcomes. Scheduling is a critical activity in modern shift-based workplaces – with impacts on labor cost, productivity, and even legal compliance. A chaotic scheduling process impacts worker satisfaction, absenteeism, and turnover. It also increases the likelihood for human error and makes last minute changes very disruptive.

    Learn about:
    -How to think about a scheduling framework
    -Key ingredients to a staff scheduling workflow
    -7 steps to a better workflow for staff scheduling

    Our presenter, Steve O’Brian is the Vice President of Marketing at Shiftboard and has over a decade of experience in human resources business process optimization
  • GDPR – being prepared and response-ready
    GDPR – being prepared and response-ready Stuart McKenzie, VP, Mandiant Consulting & Dan Wire, Sr. Director, Marketing Communications Recorded: Jun 15 2017 41 mins
    The new GDPR requires businesses to report data breaches within 72 hours – how will you manage the process?

    In a crisis, being organized and informed enough to provide an accurate notification to affected customers (or indeed regulators) is a difficult task on its own. When combined with a mandatory incident response processes – identifying the cause, containing and remediating the vulnerability, and determining the extent of the damage, it makes the situation a lot more difficult and time sensitive.

    In this webinar we will tackle the importance of a having an effective and actionable incident response plan, and how to develop a crisis communications strategy that minimizes the impact of a data breach.
  • Dealing with Skills Gap in Cyber Security
    Dealing with Skills Gap in Cyber Security Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific & Japan Recorded: Jun 15 2017 61 mins
    As cyber threats in the business world evolve, so do the skill requirements on Cyber Security specialists. In 2017, 55% of enterprises required at least three months to fill open Cyber Security positions and 37% reported that less than 1 in 4 candidates have the qualifications they need (1). Building and maintaining a capable Cyber Security team today is a challenge.

    A fundamental shortage of Cyber Security professionals, coupled with high attrition rates, can lead to organisations failing to acquire or retain the expertise necessary to respond to an ever-evolving threat landscape.

    To better help you prepare against this situation, we have arranged for a webinar session, where we will explore the skills gap in the different stages of a Cyber Security programme, and provide recommendations on how to:

    •Create and operationalise a robust cyber security team
    •Build and upskill existing talent
    •Address the skills gap in different stages of your Cyber Security programme
    •Source skilled security professionals differently

    (1) Source: ISACA’s State of Cyber Security 2017: Current Trends in Workforce Development
  • Taking Workforce Analytics from Good to Great
    Taking Workforce Analytics from Good to Great Blake Sheldon, Solutions Architect and Sarah Harden, Systems Engineer Recorded: Jun 14 2017 58 mins
    Join SAS experts for this webinar and demo and learn how to take your workforce analytics from good to great. Learn how to put data-driven decisions within everyone’s reach when you empower your HR department with advanced (yet easy-to-use) SAS® analytics, BI and data visualization.
  • GDPR Mini-Webinar Series - Episode 7 - Incident Response
    GDPR Mini-Webinar Series - Episode 7 - Incident Response Amar Singh & Chris Payne Recorded: Jun 14 2017 11 mins
    Our eight-part mini-webinar series aims to get you up to speed with the main articles of the GDPR with short, no nonsense and informative webinars. In this webinar we will discuss the fines and penalties available to the supervisory authority in the event of a breach.
  • Action GDPR – Data Masking for Sensitive Data Security & The Right to Erasure
    Action GDPR – Data Masking for Sensitive Data Security & The Right to Erasure Paul Garstang, Snr Manager EMEA - Data Security Group & Steve Holyer, EMEA Specialist - Data Security Group Recorded: Jun 14 2017 50 mins
    GDPR (General Data Protection Regulation) is only a year away, and many organisations are still trying to understand what this new regulation means to them, and their data governance practices.

    Join us for the third in a series of webinars which focus on how organisation's can begin to action GDPR - this short session is all about data privacy by de-identifying, de-sensitizing and anonymizing sensitive data with Informatica’s Data Masking tools.

    In the context of GDPR, Data Masking tackles several critical requirements by protecting and preserving the privacy of customer/employee data. Persistent Masking creates ‘Pseudonymised data’ which replaces the original sensitive data with new values, but critically retaining both contextually and referentially integrity. Alternatively, for production environments Dynamic Masking preserves the original data format, but strictly limits who can see the data. This control of access to sensitive data is essential under GDPR, as a breach of sensitive data can also be deemed to have taken place if employees without business processing cause have access to and visibility of that data.

    Increasingly Data Masking is also becoming the best practice approach to enacting “The Right to Erasure”, in this session we will discuss why this is the case, and how this approach to Erasure contrasts with a Data removal approach.

    This session will cover:
    - Persistent & Dynamic Data Masking
    o What they are
    o When to use them
    o What they are delivering for a GDPR project
    - How Masking can deliver Erasure
    - Live Demo of Informatica’s Data Masking
  • GDPR Mini-Webinar Series - Episode 6 - The Data Protection Officer
    GDPR Mini-Webinar Series - Episode 6 - The Data Protection Officer Amar Singh & Chris Payne Recorded: Jun 14 2017 17 mins
    Our eight-part mini-webinar series aims to get you up to speed with the main articles of the GDPR with short, no nonsense and informative webinars. In this webinar we will discuss the fines and penalties available to the supervisory authority in the event of a breach.
  • [ChalkTalk] Multi-Cloud Solution with Quali Cloud Sandboxes
    [ChalkTalk] Multi-Cloud Solution with Quali Cloud Sandboxes Alex Azrah, R&D Developer, Quali Recorded: Jun 14 2017 8 mins
    In this Chalk Talk session, Alex Azarh from Quali's Engineering team goes over how Quali helps companies modernize their application portfolio at scale, fast and under budget with multi-cloud support.
  • [Webinar] Financial Application Certification  Shift Release into High Gear!
    [Webinar] Financial Application Certification Shift Release into High Gear! Christian Horner, Area Dir., WWT, Dos Dosanjh, Tech Architect, Quali, Shashi Kiran, CMO, Quali Recorded: Jun 12 2017 67 mins
    The opportunity to generate multimillion-dollar revenue streams is based upon how quickly your organization can adapt to market and technology shifts in order to meet new customer demands. Speed to market for financial service institutions depends on how expeditiously they can leverage technology as a differentiator.
    However, a seemingly “simple” update to a data center financial application, applying security & compliance policies and automating the modification of IT Infrastructure could easily become a multi-month undertaking. Indeed, FSIs are highly regulated and constrained to meet compliance requirements. With environment complexity increasing, one of the critical requirements during these stages is to ensure that the introduction of even minor changes meet industry certification standards. How can your IT team accelerate this process without compromising on integrity?


    Watch this 60-minute webinar with a demo and Q&A to learn:
    > Overview of how IT infrastructure updates impact security and compliance faced by financial services
    > Application and Infrastructure modernization initiatives including in brownfield deployments
    > How to efficiently introduce, test and validate IT infrastructure and application updates
  • Cloud Transformation for SaaS and IaaS
    Cloud Transformation for SaaS and IaaS Ariful Huq, Product Management at Viptela Recorded: Jun 8 2017 42 mins
    Traditional WAN network infrastructure is breaking the adoption of SaaS and IaaS. Connecting users of an enterprise to application and infrastructure in the cloud requires many transformational changes. For one, the network itself needs to be cloud aware. Next, there needs to be unified management capability for both cloud and on-prem applications. Last, there needs to be a dynamic management of application experience based on realtime network unreliabilities.

    Topics covered:
    - SaaS / IaaS Challenges (ie. Quality of Experience, Onboarding Workflows, Scale, Security)
    - Network Transformation and the Cloud onRamp Solution
    - Benefits for IaaS (ie. Single Solution, Branch to Cloud Connectivity including AWS and Azure)
    - Benefits for SaaS (ie. Improved Experience, Visibility for Office365, Salesforce, Dropbox and more)
    - Use Cases and Case Studies
  • Top 50 Emerging Technologies - Growth Opportunities to Fuel Global Innovation
    Top 50 Emerging Technologies - Growth Opportunities to Fuel Global Innovation Rajiv Kumar, Senior Partner and Global Vice President, TechVision Recorded: Jun 8 2017 62 mins
    Top 50 Emerging Technologies is a comprehensive insight of the most promising and disruptive technologies poised to impact our world in the next few years. It highlights and offers strategic guidance and actionable ideas on the hottest 50 technologies that pack maximum potential to fuel global innovation, spawn innovative products and services, and drive commercial growth. The top 50 technologies are key beacons that will guide the strategic moves of innovation-focused organizations and professionals. While each of the top 50 technologies represents an area of intensified R&D, heightened investments, increased IP activity, and tremendous market potential, the possible convergence of several of these technologies opens up unprecedented opportunities for new revenue models and the next generation of innovative products and solutions.
  • Accelerate your Advanced Analytics
    Accelerate your Advanced Analytics Bora Beran, Product Manager, Tableau Recorded: Jun 8 2017 51 mins
    At Tableau we help people see and understand data. Seven words that drive everything we do. And they’ve never been more relevant. Tableau is all about making your analytics faster, smarter, and more powerful, so that everyone can get the answers they need. Helping people gain insight into their data to solve unexpected problems is what drives us.

    In this webinar, we will explore how Tableau can help with all stages of an analytics project, but focus specifically on a few advanced capabilities. Broadly, we will look at the following scenarios and the capabilities that support them:

    •Segmentation and Cohort Analysis
    •What-If and Scenario Analysis
    •Sophisticated Calculations
    •Time-Series Analysis
    •Predictive Analysis
    •R and Python Integration

    Attend to see how Tableau is making advanced analytics exploratory, faster and more scalable than ever before.
  • The Resurgence of APT10
    The Resurgence of APT10 Stuart Davis, Director, Mandiant & David Grout, Systems Engineering Director, FireEye Recorded: Jun 8 2017 49 mins
    FireEye has tracked APT10, a Chinese cyber espionage group, since 2009. APT10, also known as MenuPass Group, have historically targeted the United States, Europe, and Japan with a specific focus on construction, engineering, aerospace, telecom, and government.
    In June 2016, FireEye first reported that APT10 expanded their operations with a new suite of tools and techniques to target their adversaries.

    Join our experts whom have hands on experience with this group to learn:

    •Who is a part of APT10, whom they target and how they operate
    •How to defend against, hunt for and respond to APT10
    •How your organisation can improve its ability to detect, prevent and remediate APT10 attacks
  • [Webinar] Financial Application Certification  Shift Release into High Gear!
    [Webinar] Financial Application Certification Shift Release into High Gear! Cristian Horner, Area Dir. Financial Services, WWT, Dos Dosanjh, Solution Architect, Quali, Shashi Kiran, CMO, Quali Recorded: Jun 7 2017 67 mins
    The opportunity to generate multimillion-dollar revenue streams is based upon how quickly your organization can adapt to market and technology shifts in order to meet new customer demands. Speed to market for financial service institutions depends on how expeditiously they can leverage technology as a differentiator.
    However, a seemingly “simple” update to a data center financial application, applying security & compliance policies and automating the modification of IT Infrastructure could easily become a multi-month undertaking. Indeed, FSIs are highly regulated and constrained to meet compliance requirements. With environment complexity increasing, one of the critical requirements during these stages is to ensure that the introduction of even minor changes meet industry certification standards. How can your IT team accelerate this process without compromising on integrity?


    Join this 60-minute webinar with a demo and Q&A to learn:
    > Overview of how IT infrastructure updates impact security and compliance faced by financial services
    > Application and Infrastructure modernization initiatives including in brownfield deployments
    > How to efficiently introduce, test and validate IT infrastructure and application updates
  • Top 50 Emerging Technologies - Growth Opportunities to Fuel Global Innovation
    Top 50 Emerging Technologies - Growth Opportunities to Fuel Global Innovation Anand S, Vice President, TechVision Recorded: Jun 7 2017 62 mins
    Top 50 Emerging Technologies is a comprehensive insight of the most promising and disruptive technologies poised to impact our world in the next few years. It highlights and offers strategic guidance and actionable ideas on the hottest 50 technologies that pack maximum potential to fuel global innovation, spawn innovative products and services, and drive commercial growth. The top 50 technologies are key beacons that will guide the strategic moves of innovation-focused organizations and professionals. While each of the top 50 technologies represents an area of intensified R&D, heightened investments, increased IP activity, and tremendous market potential, the possible convergence of several of these technologies opens up unprecedented opportunities for new revenue models and the next generation of innovative products and solutions.
  • Mastering Operational Risk. Theory and Practice in a single package.
    Mastering Operational Risk. Theory and Practice in a single package. Boris Agranovich, Calvin Lee Jun 27 2017 2:00 pm UTC 90 mins
    Join me and our guest, Calvin Lee, Operations Director at RISKID, for a lively discussion as we aim to dispel confusion surrounding many of the elements of the Operational Risk framework.


    Operational risk is perhaps the most significant risk organizations face. Virtually every major loss that has taken place during the past 30 years, from Enron, Worldcom and Baring's Bank to the unauthorized trading incident at Société Générale and the subprime credit crisis, has been driven by operational failures.

    Many financial institutions have spent millions of dollars trying to develop a robust framework for measuring and managing operational risk. Yet, in spite of this huge investment, for many firms developing a viable operational risk management (ORM) program remains an elusive goal.

    This webinar is designed for both current students of the “Mastering Operational Risk” - http://www.globalriskacademy.com/p/orm online course and for other busy risk professionals who are interested in studying both theoretical and practical application of ORM but don’t have time to attend in-person classes.

    The goal is three-fold:

    1. Existing students will be able to understand more on how to work with the RISKID tool and get an opportunity to ask questions about the subject matter.
    2. People who are planning to join the course will get some explanation in what is the course about, how the e-learning system works.
    3. People who are just interested to know more about ORM

    During the webinar we will cover:

    1. 3 things most organizations are focusing on right now.
    2. What are the major steps to take control of operational risks.
    3. How to use Collaborative Risk Management tools to conduct your ORM operations and why traditional risk management practices involving risk registers and Excel are not effective anymore.
  • Data-Centric Security for GDPR Compliance
    Data-Centric Security for GDPR Compliance Moderated by Brandon Dunlap, Amazon; Carole Murphy, HPE; Les McMonagle, Blue Talon; Cheryl Tang, Imperva; Mark Chaplin, ISF. Jun 27 2017 5:00 pm UTC 75 mins
    In today’s threat landscape, traditional approaches to securing data are falling short. Since 2015 we have seen some of the largest data breaches ever and it is clear that no industry or organization is immune from cyber attacks. The threat landscape is increasingly dangerous, while new technologies are distributing sensitive data farther across locations, devices and repositories. Starting in May 2018, enforcement will kick in on the European Union’s General Data Protection Regulation (GDPR), a move that could have a stronger privacy/security standardization effect than any technological effort has to date. Globalization efforts will make GDPR compliance essential for global companies wherever they are located.

    The development of a comprehensive data-centric security program, including data discovery, classification, encryption, and file protection, can uniquely position your organization to protect what matters most, and make security move with your data to comply with global regulations such as GDPR. On this webinar our panel of experts will discuss the key points that you should consider when developing such a program for your organization.
  • Action GDPR – Execute on Data Rights
    Action GDPR – Execute on Data Rights Matthew Cawsey, Financial Services Master Data Management Specialist, Informatica Jun 28 2017 1:00 pm UTC 60 mins
    GDPR (General Data Protection Regulation) is only a year away, and many organisations are still trying to understand what this new regulation means to them, and their data practices.

    Join us for the final in a series of webinars which focus on how organisations can begin to action GDPR - this short session is all about creating a single place to access, maintain and administer Data Subjects and manage their Consent - with Master Data Management.

    In the context of GDPR, a mastering process collects Subject Data from across the enterprise and a range of techniques are applied to match & merge data related to the same party, enabling an organization to accurately identify all records related to that data subject from a single place.

    This session will cover:

    -Essentials in the ‘right to be forgotten’ and SAR GDPR Clauses
    -Benefits which can be achieved in addition to preparation for GDPR Compliance
    -Live Demo of Informatica’s Master Data Management Capabilities for Subject and Consent Mastering
  • Digital Transformation: How APAC businesses turn disruption into differentiation
    Digital Transformation: How APAC businesses turn disruption into differentiation Agatha Poon 451 Research, Gery Messer Managing Director, Asia Pacific CenturyLink Jun 29 2017 3:00 am UTC 60 mins
    How enterprises are choosing and using digitization initiatives for business gain.

    Organizations of all sizes and in every sector are busy redefining their IT priorities for a digital future, identifying the goals of enhanced customer experience, operational efficiency, business agility and improved risk management as four key pillars for their digital transformation strategies.

    Digital transformation is playing out differently depending on a company’s maturity, the vertical sector in which it operates, its employees, its infrastructure, and its ability to innovate. Knowing where to start, and how to maintain momentum is critical.

    Join 451 Research and Centurylink to learn how some global enterprises are making assured first steps, and hear the following:

    •Understand how companies with more progressive Digital Transformation strategies are prioritizing their efforts for competitive differentiation, changing the nature of their business with innovative technologies that are becoming more easily accessible with a lower barrier to entry.

    •Insights and recommendations from a major survey of enterprises worldwide about IT priorities and how to make service provider choices to accelerate digital transformation mandates such as the role of cloud and other IT infrastructure options that are built for availability, speed, and resilience.

    •Identification of key shifts in business context that will continue to shape digitization efforts, and how these need to be reflected in a digital transformation roadmap for IT organizations.
  • Location Analytics: Use Cases for Improving Visualizations & Reports
    Location Analytics: Use Cases for Improving Visualizations & Reports Rick Styll, Product Management, SAS; AJ Rice, Alliance Manager, Esri Jun 29 2017 3:00 pm UTC 60 mins
    Nearly 70 percent of business data contains some level of location information. But business analysts rarely use this data within their BI and analytics workflows.

    Location analytics is more than just putting points on a map. It’s part of a much larger picture of using location to provide context in visualizations, reports and analytics. Utilizing geographic data in descriptive and predictive analytics helps companies discover new patterns, identify location-specific opportunities, and get a complete picture before making business decisions.

    In this webinar, Esri and SAS discuss the role that location analytics can play in determining practical next steps for your organization. A product demonstration will be shown as well.

    We’ll answer:
    • How does location analytics add value to BI and analytics initiatives?
    • What are the right uses for location analytics?
    • What pitfalls should organizations consider as they implement processes and technology for analyzing geographic data?
    • Are special skill sets required to use location information?
    • How can organizations best develop a strategy for using geographic data?
  • Mexico's Macroeconomic Prospects in the Light of a Changing Policy Environment
    Mexico's Macroeconomic Prospects in the Light of a Changing Policy Environment Lorena Isla- Latin America Director, Mobility and Neha Anna Thomas- Senior Economist, Emerging Market Innovation Jun 29 2017 5:00 pm UTC 60 mins
    Without a doubt, Mexico stands amongst the global emerging frontrunners and the country has established itself as a go-to investment destination, supported by lower wages and multiple free-trade agreements. Today, however, as a result of Donald Trump's presidency and change in policy direction, there is significant uncertainty concerning the future of Mexican trade, industry, and growth. The impending redefinition of the North American Free Trade Agreement (NAFTA), for example, will play a pivotal role in influencing the future of Mexico. The upcoming webinar will shed greater light on Mexico's macroeconomic prospects by evaluating potential US policy changes and resultant implications on Mexico, while also evaluating its economic and industry outlook.
  • Building a simpler, more intelligent WAN for the Hybrid Cloud era
    Building a simpler, more intelligent WAN for the Hybrid Cloud era Phil Lees, CTO of WhiteSpider Jul 4 2017 12:00 pm UTC 45 mins
    Enterprises can simplify the move to a Hybrid Cloud infrastructure with SD-WAN, building a secure, unified connectivity over any transport with simplified operations, centralised management, policy control and application visibility across the enterprise.
  • ASEAN'S Economic Growth and Investment Opportunities in the Next Decade
    ASEAN'S Economic Growth and Investment Opportunities in the Next Decade Rhenu Bhuller, Partner and Malabika Mandal, Senior Research Analyst, Visionary Innovation Group Jul 5 2017 6:30 am UTC 60 mins
    ASEAN as a single entity over 50 years has evolved from resuming regional security and fostering trade integration to achieving a holistic and comprehensive economic community. ASEAN, at the current level of economic growth, is poised to become the fourth-largest market—after EU, US, and China—by 2030, supported by an increased skilled workforce, abundant natural resources, and favorable geographic location for trade and commerce. This briefing examines the potential contributions of this integration to regional growth by analyzing the impact of various Mega Trends, the new growth drivers, and the areas of innovation most likely to be seen in ASEAN by 2025.
  • Intelligente Endpunktsicherheit: mehr als nur Vorbeugung
    Intelligente Endpunktsicherheit: mehr als nur Vorbeugung Ruediger Weyrauch, Director, Central Europe System Engineering bei FireEye Jul 5 2017 12:00 pm UTC 45 mins
    Moderne Lösungen für die Endpunktsicherheit erfüllen zwar die Aufgaben, für die sie entwickelt wurden, bieten jedoch keine lückenlose Sicherheit.
    Umfassender Endpunktschutz erfordert vorbeugende Maßnahmen, Virenschutz, Tools zur Bedrohungserkennung und -abwehr am Endpunkt und weitere Funktionen.
    Selbst wenn ein Unternehmen dazu mehrere Punktlösungen einsetzt, werden dadurch höchstwahrscheinlich nicht alle Sicherheitslücken geschlossen.
    Manche Anbieter werben mit „Endpunktsicherheit der nächsten Generation“. Doch was genau meinen sie damit?

    Ruediger Weyrauch, Director, Central Europe System Engineering bei FireEye, erläutert in einem Webinar, worauf Sie achten sollten, damit Ihre Endpunktsicherheitslösung der nächsten Generation Ihre Endpunkte lückenlos schützt.

    Die Themen:
    - Der aktuelle Stand der Endpunktsicherheit und die damit verbundenen Herausforderungen
    - Die Vorteile von Lösungen für die Angriffserkennung und -abwehr an Endpunkten (EDR)
    - Die Vorteile von Bedrohungsdaten und ihre Rolle bei der EDR
    - Warum ein Endpunkt-Agent die folgenden Merkmale aufweisen sollte:
    •Mehrere Engines für die Bedrohungserkennung und -abwehr
    •Integrierte Prozessabläufe von der Erkennung über die Untersuchung bis hin zur Abwehr
    •Skalierbarkeit, mehrere verfügbare Formfaktoren, Unterstützung für verschiedene Betriebssysteme
  • Power of The Proxy
    Power of The Proxy Timothy Chiu, Senior Director, Product Marketing Jul 6 2017 5:00 am UTC 30 mins
    The reality & one of the biggest challenges for IT today is that there’s a complex user definition – there are now many options for connectivity via multiple types of devices, and the truth is, there is a lack of security for many of these new devices both on premise and in the cloud.

    The traditional security perimeter that your IT team used to be able to define surrounding cloud security is now dissolving. So if you are adopting more cloud services, putting more employees in remote or distributed offices, or are concerned about the increasing number of cyber threats you are reading about in the headlines, join us for this session to better understand what it means to be a proxy, why that’s so important today, and how that plays against what our competitors are saying about us.

    Register for our webinar ‘Power of The Proxy’ today!
  • Migrating from any Oracle Retail version to the latest V16
    Migrating from any Oracle Retail version to the latest V16 Yamini Chitturi, Merchandising Solutions Architect and Chetan Singh, Store Solutions Architect Jul 6 2017 4:00 pm UTC 60 mins
    Current Omnichannel scenario demands retailers to stay abreast with the latest developments in Oracle Retail V16. This webcast focuses on educating them about:

    1.Why a feasibility study is crucial to your migration decision?
    2.Introduction to Aspire Systems Accelerators
    3.How can you reduce the Go-To-Market time to 6 months?
  • EMD: Fundamentally Attractive
    EMD: Fundamentally Attractive Presented by: Shamaila Khan - Director - Emerging Market Debt and Pete Cornax - Senior Investment Strategist Jul 11 2017 1:00 pm UTC 30 mins
    Investors in emerging markets should not be blown off course by the occasional challenging headline or outbreaks of volatility. Fundamentals are improving—and warrant a closer look from insurers seeking higher levels of income without stretching their risk appetite.

    Please join Shamaila Khan, Director of Emerging Market Debt, and Peter Cornax, Senior Investment Strategist, as they examine improving fundamentals valuations both from a historical perspective and relative to fixed-income opportunities.

    Shamaila Khan is a Director of AB's Emerging Market Debt strategies. In January 2017, she was named a Director of Emerging Market Debt, expanding her influence on our Emerging Market Debt team to include the management and oversight of our hard- and local-currency emerging-market sovereign-debt strategies. Khan joined AB in 2011 as a senior vice president and portfolio manager, focusing on emerging-market corporate and quasi-sovereign issuers across all of AB's emerging-market debt and credit strategies. She has been actively managing and evaluating corporate and sovereign emerging-market debt issuance since 1997.

    Peter Cornax is a Senior Investment Strategist and Portfolio Manager of AB's Global Credit strategies, focusing on advising global insurers on strategic asset allocation and multi-sector/asset-class relative value. He has been a member of the Global Credit and Insurance Asset Management team for the past 16 years. Over that time, his primary focus has been on managing fixed-income portfolios for insurance and financial institutional clients in Europe, the US and Asia. Cornax specializes in incorporating regulatory and accounting considerations with traditional economic analysis.
  • Hybrid & Multi-cloud environments: Strategies for migration & app modernization
    Hybrid & Multi-cloud environments: Strategies for migration & app modernization Shashi Kiran, CMO, Quali, Jay Lyman,Analyst, 451 Research Jul 19 2017 5:00 pm UTC 60 mins
    Hybrid clouds are important for enterprises having on-premise deployments as well as legacy applications. Likewise, multi-cloud scenarios appeal to organizations that want the flexibility to move between different clouds and not get locked-in into either one public or private clouds architecture. While over 70% of enterprises have expressed a need to deploy hybrid and/or multi-cloud architectures, as they modernize their application architectures the rollouts are complex and time consuming causing budget overruns and delays. The complexity is largely associated with the lack of common tooling, mismatched cloud architectures and expertise. These can be significantly overcome by providing access to on-demand, self-service IT environments (on-premise as well as public cloud, or a combination thereof), that would allow for more predictable application performance and security, thereby allowing for faster cloud migration and rollout, with reduced cost and risk.

    Join this webinar with 451 research and Quali to learn:
    •Current trends in hybrid and multi-cloud deployments and enterprise requirements
    •How incorporating sandboxes and self-service environments in the workflow can smoothen cloud migration, hybrid deployments and the flexibility of multi-cloud deployment. Demo included.
    •Sample case study of an enterprise undergoing cloud migration with best practice recommendations
  • How Cisco Uses Architecture to Drive Their Digital Transformation
    How Cisco Uses Architecture to Drive Their Digital Transformation John Schmidt Jul 20 2017 4:00 pm UTC 60 mins
    Cisco has built their industry leadership over the years through an active M&A strategy. But as the organization transitioned into new businesses and new business models, the complexity left by M&A was slowing them down. We will describe how Cisco was able to accelerate business agility and implement new business models by taking an architecture-led approach. Even more importantly, he will discuss how they were able to connect their business strategy to their technical architecture to remove ambiguity and deliver exactly the results the business required.

    This session will include best practices and approaches to architecture that will drive measurable business results. Cisco also won an InfoWorld/Forrester industry architecture award for this work.

    Speakers:
    Matt Sidden, IT Manager Enterprise Architecture, Cisco
    John Schmidt, VP Global Integration Competency Center Practice, Informatica
    David Lyle, VP Business Transformation Services, Informatica
  • Turning advances in VR + AR into business innovation
    Turning advances in VR + AR into business innovation Stewart Rogers, Director of Marketing Technology, VentureBeat Jul 20 2017 4:00 pm UTC 30 mins
    Last year, alternative reality and virtual reality raked in $1.8B, with 6.3M headsets shipped. And those numbers are expected to just keep climbing. AR and VR technology is getting sweeter every day, and the number of use cases is piling up. VR and AR isn’t just transforming how we experience games, it’s led to breakthroughs in health care, dropped operating costs for businesses, and changed how marketers can connect with customers.

    In this VB Live event, Stewart Rogers, Director of Marketing Technology, will be unveiling the results of our latest in-depth VB Insight consumer study. Register now for insights into VR and AR usage, consumer attitudes, and whether the massive potential audience that exists is ready to go virtual.

    By attending this VB Live event, you'll:
    * Understand VR and AR attitudes across the globe
    * Learn what's holding consumers back from these technologies
    * Introduce innovation with AR and VR into your own organization
    * Learn how payment technology will help facilitate new VR/AR experiences
    * Hear what experts think the future holds

    Speakers:
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Laura Gemmell, Innovation Analyst, Technology Innovation, Worldpay
    * Wendy Schuchart, Moderator, VentureBeat

    Register today!

    Sponsored by Worldpay
  • Architecting Data, Analytics, & Process Improvement with MDM at BJC Healthcare
    Architecting Data, Analytics, & Process Improvement with MDM at BJC Healthcare Nathan Rain, Group Manager of MDM, BJC Healthcare & Prash Chandramohan, Principal Product Marketing Manager, Informatica Jul 26 2017 4:00 pm UTC 60 mins
    Finding a champion is a critical success factor of any master data project. Nathan Rain, Group Manager of Master Data Management at BJC Healthcare, designed a roadshow to explain what, where, when, why and how to explain the relevance of MDM to stakeholders at BJC and Washington University School of Medicine.

    In this webinar, Nathan will walk through his “show me” approach to gaining buy-in for the capabilities of multidomain, end-to-end MDM and data governance. He will share where to start with MDM, what’s relevant when building a business case, and how to explain the value of enterprise MDM and data governance to your executives. Join us to learn tips-and-tricks for a successful start, evangelizing the MDM thought leadership, and how MDM can turn you into a hero.

    If you need your executives to champion a trusted data initiative that fuels intelligent disruption in your organization, you won’t want to miss this!
  • Defining Enterprise Cloud Data Management for a hybrid world
    Defining Enterprise Cloud Data Management for a hybrid world James Humphrey, National Instruments and Forbes Analyst Joe McKendrick Jul 27 2017 4:00 pm UTC 60 mins
    Is your company on a data-driven digital transformation journey?
    With cloud being a strong directive, managing the enterprise data across cloud and on-premises environments is a common impediment in this journey. However, you are not alone when facing this hybrid data management challenge.
    Join Forbes contributor and analyst, Joe McKendrick and James Humphrey, Principal Architect at National Instruments as they share critical business drivers, use cases and challenges shaping the success of the journey to cloud.

    In this webinar, you will learn:
    - Current digital transformation market trends driving the influence of cloud.
    - Role of hybrid data management
    - How National Instruments is growing at scale and reducing time to market for their products and services
    - How National Instruments is making cloud work for their Data Lake projects to scale cost-effectively and augment existing hybrid landscape
  • Utilizing ISO31000 to Map Risk Across the Enterprise
    Utilizing ISO31000 to Map Risk Across the Enterprise Informed Risk Decisions, Riskonnect Aug 8 2017 5:00 pm UTC 60 mins
    The global financial crisis in 2008 demonstrated the importance of adequate risk management. Since that time, new risk management standards have been published, including the international standard, ISO 31000 ‘Risk management – Principles and guidelines’.

    The ISO 31000 Risk Management Standard provides guidance for the framework of risk management applicable for organizations of any size. ISO 31000 defines a risk management framework as a 'set of components that provide the foundations and organizational arrangements for designing, implementing, monitoring, reviewing and continually improving risk management throughout the organization. On this webinar our panel of experts will discuss ISO 31000 and how your organization can utilize the standard to implementing a structured approach to enterprise risk management, and map risk across the organization.

    Key Points to be discussed:

    - The principles and processes of risk management
    - The requirements of ISO 31000
    - Practical guidance on designing a suitable framework
    - Practical advice on implementing enterprise risk management
  • Building Advanced Analytics Applications with R and Python Integration
    Building Advanced Analytics Applications with R and Python Integration Bora Beran, Product Manager at Tableau Aug 10 2017 3:00 pm UTC 60 mins
    At Tableau we help people see and understand data. Seven words that drive everything we do. And they’ve never been more relevant. Tableau is all about making your analytics faster, smarter, and more powerful, so that everyone can get the answers they need. Helping people gain insight into their data to solve unexpected problems is what drives us.

    Tableau is a visual analytics and reporting solution that connects directly to R, Python, and more. It’s designed for you, the domain expert who understands the data. Its drag-and-drop interface allows you effortlessly connect to libraries and packages, import saved models, or write new ones directly into calculations, visualizing them in seconds.

    In this webinar, we will explore how various analytics partners are leveraged in Tableau, and how to take advantage of these integrations to move your analysis to the next level. Whether you work with R, Python, or other statistical or data mining environments, Tableau allows you to take advantage of your existing investments and knowledge to compose impactful data stories.
  • A Tactical Guide to Reducing Your Data Breach Risk
    A Tactical Guide to Reducing Your Data Breach Risk HPE Security - Data Security, MetricStream Aug 29 2017 5:00 pm UTC 60 mins
    Over 90% of the world’s data has been generated in the last few years. Accompanying this rapid growth in data comes exponential risks, as witnessed by the spike in cyber attacks of which no organization seems immune. The financial rewards gained by the perpetuators of cyber attacks is blatant, and this is driving continued attacks on companies containing massive amounts of consumer data. For these companies securing data is only half the battle. The risks can be greater when data is transmitted externally, hence it is critical that organizations know where sensitive data is going, how it is being transmitted, and how it is being handled and stored.

    On this webinar our panel of experts will discuss some of the best practices organizations can consider to reduce the risk of suffering from a data breach, and to proactively prepare for any subsequent breach that could happen.
  • Don’t Forget to Pack Your Data Management on your Journey to Cloud
    Don’t Forget to Pack Your Data Management on your Journey to Cloud Anthony Smith, EMEA Head of Technology, JLL and Forbes Analyst Joe McKendrick, McKendrick Research Sep 20 2017 4:00 pm UTC 60 mins
    As digital is changing everything, most enterprises are embracing the transformation to streamline processes at the pace of technology and remain relevant to customers. The transformation involves an end-to-end, systemic change enterprise-wide including interactions with customers, partners and employees. Cloud is an important enabler of this multifaceted digital strategy.
    Join Forbes Contributor and analyst Joe McKendrick and Anthony Smith, EMEA Head of Technology Solutions at JLL to learn more about market trends, business drivers and lessons, important for any enterprise undergoing such a transformation with cloud.

    In this webinar, you will:
    - Market facts around why cloud is driving digital transformation
    - How JLL is innovating with flexible cloud computing to serve its clients better
    - Significance of standardized data management principles and data governance for increased consistency and accuracy of enterprise-wide data
    - The role of hybrid data management platform in enabling faster, deeper data analytics
  • A Data Security Survival Guide in an Interconnected World
    A Data Security Survival Guide in an Interconnected World Moderated by Dr Branden Williams with HPE Security - Data Security and Panelists Oct 25 2017 5:00 pm UTC 60 mins
    As the number of internet-connected devices skyrockets into the billions, a data security strategy is an increasingly important part of any organization’s ability to manage and protect critical information. Enterprises are migrating to the cloud in droves, however, protecting data in the cloud remains a challenge as employees push to access cloud apps from any device, anywhere. In the last year alone, 1 in 3 organizations were hacked more than 5 times, and with the increased number of attacks the financial cost of security incidents is also rising.

    In many cases, breaches are caused by a combination of benevolent insiders, targeted attacks, and malicious insiders. For example, targeted attacks are often enabled inadvertently by well-meaning insiders who fail to comply with data or security policies, which can lead to a data breach. In this webinar, our panel will discuss major trends impacting cyber security – from the rising frequency of attacks and types of threats that organizations should be concerned about the most, and they will adress the risks, priorities, and capabilities that are top of mind for enterprises as they migrate to the cloud.