Hi [[ session.user.profile.firstName ]]

CxO Strategy

  • Bigger, better, faster subscription commerce growth
    Bigger, better, faster subscription commerce growth Emma Clark, Senior Product Manager, Recurly Recorded: May 24 2017 60 mins
    Better, stronger, faster subscription commerce growth

    The value of a subscription business model is its consistency: predictable revenue to lifetime customer value, you've got a solid foundation to start seeing incredible growth—and that comes directly from becoming the 6 million dollar man of customer acquisition.

    That's where the subscription model delivers another distinct advantage: The capability to identify your most profitable customers, and the technology—a wealth of key data about marketing, customer and billing events—right at your fingertips.

    Now how do you turn that data into insights to optimize subscriber acquisition and accelerate your business growth up to 60 mph or more? Join this interactive VB Live event to learn how, plus tap into the latest research and benchmarks on key subscriber acquisition metrics.

    In this webinar, you'll:

    * Identify the most effective subscription plans and promotions
    * Compare your trial program performance against industry benchmarks
    * Use best practices to create a frictionless subscription experience
    * Capture the key metrics for measuring acquisition performance--plan performance, MRR, LTV and more.

    Speakers:

    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Wendy Schuchart, Moderator, VentureBeat
    * Emma Clark, Sr Product Manager, Recurly

    Sponsored by Recurly
  • Turn Disruption into Differentiation with your Digital Transformation Strategy
    Turn Disruption into Differentiation with your Digital Transformation Strategy Sheryl Kingstone 451 Research, Bill Hurley CMO CenturyLink Recorded: May 24 2017 55 mins
    Join 451 Research and CenturyLink May 24th at 1pm ET to discuss how enterprises are choosing and using digitization initiatives for business gain.

    Organizations of all sizes and in every sector are busy redefining their IT priorities for a digital future, identifying the goals of enhanced customer experience, operational efficiency, business agility and improved risk management as four key pillars for their digital transformation strategies.

    Digital transformation is playing out differently depending on a company’s maturity, the vertical sector in which it operates, its employees, its infrastructure, and its ability to innovate. Knowing where to start, and how to maintain momentum is critical.

    Join 451 Research and Centurylink to learn how some global enterprises are making assured first steps, and hear the following:

    •Understand how companies with more progressive Digital Transformation strategies are prioritizing their efforts for competitive differentiation, changing the nature of their business with innovative technologies that are becoming more easily accessible with a lower barrier to entry.

    •Insights and recommendations from a major survey of enterprises worldwide about IT priorities and how to make service provider choices to accelerate digital transformation mandates such as the role of cloud and other IT infrastructure options that are built for availability, speed, and resilience.

    •Identification of key shifts in business context that will continue to shape digitization efforts, and how these need to be reflected in a digital transformation roadmap for IT organizations.
  • APT32: New Cyber Espionage Group
    APT32: New Cyber Espionage Group Nick Carr, Sr. Manager Incident Response, Mandiant, a FireEye Company Recorded: May 24 2017 57 mins
    Learn more about APT32 (OceanLotus Group), a Southeast Asian cyber espionage group threatening multi-national companies operating in Vietnam. After long-term monitoring and response of their activities, FireEye has given this threat actor the newest APT designation.

    Join Nick Carr, Sr. Manager of Incident Response, as he shares how Mandiant, iSIGHT Intelligence and FireEye as a Service teams reveal:

    • Who is part of APT32, where they are based, whom they target and how they operate
    • Advice on how to defend against, hunt for and respond to APT32
    • How your organization can improve your ability to detect, prevent and remediate APT32 attacks
  • Action GDPR: Finding Sensitive Data
    Action GDPR: Finding Sensitive Data Paul Garstang, Snr Manager EMEA - Data Security Group & Steve Holyer, EMEA Specialist - Data Security Group Recorded: May 24 2017 55 mins
    GDPR (General Data Protection Regulation) is only a year away, and many organisations are still trying to understand what this new regulation means to them, and their data governance practices.

    Join us for the second in a series of webinars which focus on how organisation's can begin to action GDPR - this short session is all about accelerating Data Discovery & Classification, how to automate and put in place a repeatable 'near real time capability' with Informatica's Secure@Source.

    Secure@Source provides 360º visibility of sensitive data and analyses and ranks sensitive data risk. In the context of GDPR, it helps organisations understand where their sensitive data resides, which data stores contain high risk combinations and how it proliferates through the organisation.

    This session will cover:
    - Where to start with your sensitive data
    - How to identify potential data risks
    - Live Demo of Secure@Source
  • Sales Analytics: How to Build a Data-Driven Sales Strategy
    Sales Analytics: How to Build a Data-Driven Sales Strategy Joe Clarke, UK Sales Manager - Tableau Recorded: May 24 2017 46 mins
    Tableau is the one of the leading players in analytics, and like any company, Tableau needs to make decisions about sales data. As a data company, we’re always on the hunt for the best way to look at sales information to help make decisions about quota, territory management, and must-win deals.

    In this webinar, see how the sales team at Tableau have made sales analytics and dashboards part of their team daily routine. We're going to dive deep into the dashboards that sales leverage to manage their time, measure performance, collaborate globally, strategically target territories, and more. Joe Clarke, Tableau's UK & Ireland SalesManager will show you how sales performance management is obtained and adopted across the organisation.
  • Vulnerability Intelligence Eine wichtige Komponen
    Vulnerability Intelligence Eine wichtige Komponen Thomas Todt, Senior Sales Engineer DACH, MEA & Eastern Europe Recorded: May 24 2017 35 mins
    Software Vulnerability Management ist eine Herausforderung für die IT- und Informationssicherheitsstrategie Ihres Unternehmens. Hunderte neue Schwachstellen pro Woche machen das Thema zu einem Albtraum für Sicherheitsprofis. Die Informationen zu sammeln, zu prüfen und sie den relevanten Personen als Grundlage für die Risikobewertung zur Verfügung zu stellen ist eine weitere Herkules-Aufgabe. Doch es geht auch einfacher:

    *Was ist Vulnerability Intelligence?
    *Wie kann Vulnerability Intelligence Manager eingesetzt werden, um die Herausforderungen zu meistern?
    *Wie managen Sie Software Vulnerabilities effektiv?

    Nehmen Sie an diesem Webinar teil, um einen Überblick über Vulnerability Intelligence und den Wert für Ihr Unternehmen zu gewinnen. Lernen Sie, wie Sie die Sicherheit Ihrer Anwendungen mit Vulnerability Intelligence Manager effektiv steigern.
  • Poor Sales Leads, And Six Other Revenue Disasters!
    Poor Sales Leads, And Six Other Revenue Disasters! Peter Strohkorb, Smarketing Expert, Author, Speaker, Business Coach Recorded: May 23 2017 42 mins
    "The Top 7 Sales Growth Challenges, And How To Solve Them."

    Working with our clients we come across many challenges to sales growth, but there are seven of these that we encounter all the time. They do not need to remain a challenge for your business as we have already solved them in our clients' organizations. Now you can benefit from our experience, too.
  • Strategies for Effective 3rd Party Risk Management
    Strategies for Effective 3rd Party Risk Management Scott Roller, Founder of 3WP; Rebecca Herold, Privacy Professor; Sam Kassoumeh, SecurityScorecard. James Christiansen, Optiv. Recorded: May 23 2017 63 mins
    The challenges that organizations face today are increasingly more complex than in the past. The constant change of the global economy, dynamics of business risks and opportunities, and an increased threat of cyber-attacks add complexities we’ve never faced. As organizations rely on more and more third parties to grow and thrive, they’re exposed to higher levels of risk, and regulators are focused on the need for organizations to manage 3rd party risk more effectively.

    Manual processes, silos in contract administration, and technology and resource constraints can all lead to significant errors in the third party supply chain that leads to violation of privacy guidelines and security breaches, which cause substantial fines, penalties, and damage to brand value. On this webinar our panel of experts will discuss the risks and repercussions associated with third party contract management shortcomings, common gaps in third party contract management processes, examples of how new solutions and technologies can help organizations optimize their third party processes, and effective strategies for managing 3rd Party Risk.
  • Stop Blaming Russia & China for all Cyber Attacks
    Stop Blaming Russia & China for all Cyber Attacks Amar Singh, Joseph Carson Recorded: May 23 2017 59 mins
    Cyber-attacks can originate from anywhere, but there appears to be an unabated trend of pointing the finger on either "sophisticated attackers" or, more blatantly, naming and blaming nation-states like Russia, China and now North Korea (alright, maybe even Iran).

    The truth about attribution (who is the attacker) is often overlooked for something more dramatic, especially in situations where sensitive information or brand reputation is at risk.

    The tactic is simple. Switch the focus from internal bad practices and shift the blame to “sophisticated, nation states and or criminal gangs.” Lazy, but effective.

    Join Amar Singh and Joseph Carson, from Thycotic, as they both discuss the real reason behind why cyber attacks succeed (no - not because of Russia or China)and the steps you can take to make the job of hackers, both sophisticated and otherwise, much harder.
  • Are you ready for the GDPR? One year out.
    Are you ready for the GDPR? One year out. Christoph Luykx, Director, Government Relations EMEA, CA Recorded: May 23 2017 61 mins
    The European Union General Data Protection Regulation (GDPR) is a new regulation in Europe with global impact that will come into force on May 25th, 2018. Its objective is to further strengthen data protection. Enforcement will be backed by heavy fines. Organizations that deal with data on a Global scale will need to review their data lifecycle and put in place processes and technology to be compliant. In this webinar, CA experts will share some thoughts around the journey organizations are on and discuss some real life examples.
  • 2017 Internet Security Threat Report (ISTR): A Review of the Threat Landscape
    2017 Internet Security Threat Report (ISTR): A Review of the Threat Landscape Peter Sparkes, Senior Director, Cyber Security Services, Symantec Recorded: May 23 2017 54 mins
    2016 was a year marked by extraordinary attacks, with cyber attackers conducting multi-million dollar virtual bank heists, attempting to disrupt electoral process, and organising some of the biggest distributed denial of service (DDoS) attacks on record, powered by a botnet of IoT devices.

    Join our Senior Director of Cyber Security Services for Asia Pacific and Japan, Mr Peter Sparkes, in this webinar for an in-depth analysis on the latest cyber threats trends, and find out why:

    • Targeted attacks aimed at politically motivated sabotage and subversion has increased at alarming rates
    • One in 131 emails contained a malicious link or attachment – highest rate in five years
    • Ransomware infections increased by 36 percent, with size of ransoms spiking 266 percent
    • CIOs have lost track of how many cloud apps are used inside their companies – When asked most will say up to 40 when in reality the number nears 1,000

    Be the first to gain insight into the latest cyber threat trends in the Asia Pacific region, and learn about best practices and steps you can take to improve your security posture in 2017.

    Register for the Symantec 2017 Internet Security Threat Report Webinar today.
  • Tendances et chiffres sur les fuites d’information et les attaques Cyber en EMEA
    Tendances et chiffres sur les fuites d’information et les attaques Cyber en EMEA David Grout, Director, Southern Europe Systems Engineering, FireEye Recorded: May 19 2017 48 mins
    Rejoignez-nous pour un webinaire en live avec David Grout, Directeur Technique Europe du Sud, qui explorera les tendances qui définissent le paysage actuel des menaces en se basant sur les investigations des équipes Mandiant en 2016.
     
    Inscrivez-vous aujourd’hui pour découvrir :
     
    •Les nouvelles tendances d’hameçonnage
    •Les changements en termes de volume et de méthodologie
    •Les apports de la cyber veille et de l’intelligence sur les attaques émergentes
    •Les approches défensives pour mieux se protéger
    •Comment la GDPR impacte les sociétés en EMEA
    •Comment l’Europe se situe par rapport à l’Amérique du Nord et à l’Asie
     
    Inscrivez-vous!
  • Data Virtualization: An Introduction (Packed Lunch Webinars)
    Data Virtualization: An Introduction (Packed Lunch Webinars) Paul Moxon, VP Data Architectures & Chief Evangelist, Denodo Recorded: May 18 2017 56 mins
    According to Gartner, “By 2018, organizations with data virtualization capabilities will spend 40% less on building and managing data integration processes for connecting distributed data assets.” This solidifies Data Virtualization as a critical piece of technology for any flexible and agile modern data architecture.

    This session will:

    Introduce data virtualization and explain how it differs from traditional data integration approaches
    Discuss key patterns and use cases of Data Virtualization
    Set the scene for subsequent sessions in the Packed Lunch Webinar Series, which will take a deeper dive into various challenges solved by data virtualization.
    Agenda:

    Introduction & benefits of DV
    Summary & Next Steps
    Q&A
  • The State of Tech M&A in China: Activity & Outlook
    The State of Tech M&A in China: Activity & Outlook Brenon Daly, Agatha Poon & Tim Miller Recorded: May 17 2017 61 mins
    A decade ago, tech deal flow barely trickled into and out of China. While M&A in the world’s second-largest economy is still relatively small, it has dramatically accelerated in recent years, with the overall number of tech transactions in China having doubled over the past half-decade to a record level in 2016. Spending on deals also surged to unprecedented levels last year. However, there are some concerns about whether the M&A boom will continue. China’s currency has weakened, economic growth has slowed and relations with its main tech partner – the US – have soured. Will M&A falter, too?

    Join 451 Research’s Brenon Daly, Research Director, Financials, Agatha Poon, Research Director of APAC Services, and Tim Miller, VP of Financial Markets for a 45-minute webinar on the state of M&A in China now, as well as the outlook for the coming years.
  • Top 10 Cloud Trends for 2017
    Top 10 Cloud Trends for 2017 Ashley Kramer, Director of Product Management, Tableau and Marshall Daly, Cloud Data Evangelist, Tableau Recorded: May 17 2017 59 mins
    In 2016, cloud technologies went mainstream. But with maturity came the realization that moving to the cloud doesn’t happen overnight. As the shift to cloud progresses, we’re exploring the newest trends for cloud technology for the upcoming year.

    In this webinar you’ll learn more about:

    •Emerging global trends in cloud and cloud analytics

    •Tableau experts' take on the changing cloud landscape

    •Considerations for your 2017 cloud strategy
  • Eine neue Perspektive des Patchmanagements
    Eine neue Perspektive des Patchmanagements Thomas Todt, Senior Sales Engineer DASH,MEA & Eastern Europe Recorded: May 17 2017 34 mins
    Nehmen Sie an diesem Webinar teil, um einen Überblick über die Möglichkeiten des Patchmanagements zu gewinnen und lernen Sie, wie Sie Prozesse mit Corporate Software Inspector automatisieren können.
  • Industry Expert Panel Discussion: Are You Really Ready for SD-WAN?
    Industry Expert Panel Discussion: Are You Really Ready for SD-WAN? Enterprise Management Associates (EMA), Bell Canada, Viptela, CA Technologies Recorded: May 16 2017 57 mins
    On May 16, join industry analyst firm EMA along with SD-WAN innovator Viptela, Bell Canada and CA Technologies for an expert panel discussion on SD-WAN challenges, opportunities and its impact on today’s network monitoring. Nearly 88% of enterprises surveyed either currently deploy SD-WAN today or plan to do so within the next 12 months. SD-WAN technologies possess sophisticated, built-in capabilities for operations and management and advanced automation to address network problems in real-time. Join us on May 16 as we uncover the importance of validating SD-WAN intelligence while applying advanced analytics to correlate customer experience impact for comprehensive, end-to-end modern network assurance.
  • Digital Transformation: how Europe will turn disruption into differentiation
    Digital Transformation: how Europe will turn disruption into differentiation Nick Patience 451 Research, Matt Leonard CenturyLink Recorded: May 16 2017 53 mins
    Join 451 Research and Century Link May 16th at 2pm UK 3pm CET to discuss how enterprises are choosing and using digitization initiatives for business gain. This webinar will focus on Europe and the unique decisions that are occurring in that region of the world.

    Organizations of all sizes and in every sector are busy redefining their IT priorities for a digital future, identifying the goals of enhanced customer experience, operational efficiency, business agility and improved risk management as four key pillars for their digital transformation strategies.

    Digital transformation is playing out differently depending on a company’s maturity, the vertical sector in which it operates, its employees, its infrastructure, and its ability to innovate. Knowing where to start, and how to maintain momentum is critical.

    Join 451 Research and Centurylink to learn how some global enterprises are making assured first steps, and hear the following:

    •Understand how companies with more progressive Digital Transformation strategies are prioritizing their efforts for competitive differentiation, changing the nature of their business with innovative technologies that are becoming more easily accessible with a lower barrier to entry.

    •Insights and recommendations from a major survey of enterprises worldwide about IT priorities and how to make service provider choices to accelerate digital transformation mandates such as the role of cloud and other IT infrastructure options that are built for availability, speed, and resilience.

    •Identification of key shifts in business context that will continue to shape digitization efforts, and how these need to be reflected in a digital transformation roadmap for IT organizations.
  • Don't Cry Over WannaCry Ransomware
    Don't Cry Over WannaCry Ransomware Bob Shaker, Global Product Manager for Incident Response Services, part of Symantec's Cyber Security Services Recorded: May 15 2017 39 mins
    Wannacry is big but how big is it really? It’s important to understand how this piece of ransomware is operating, what you can do to stop it and what to do if you’ve been compromised.

    Join us to learn what Symantec customers and non-customers can do against this threat and future threats like it.
  • HP Security Expert Video Series - Video 2: HP Solutions
    HP Security Expert Video Series - Video 2: HP Solutions Michael Howard Recorded: May 12 2017 9 mins
    In this second video of a 2 part series, Michael Howard, HP Inc.'s WW Chief Security Advisor, shares How is HP Bringing Solutions to your Organization.
  • HP Security Expert Series - Why Security is Important to your Business
    HP Security Expert Series - Why Security is Important to your Business Michael Howard Recorded: May 12 2017 8 mins
    In this first video of a 2 video series, Michael Howard, HP Inc.'s WW Chief Security Advisor, shares insights on Why Security is Important to your Business
  • Webinar- What’s new with CloudShell 8.0? A Look Under the Hood
    Webinar- What’s new with CloudShell 8.0? A Look Under the Hood Edan Evantal, VP of Engineering at Quali Recorded: May 12 2017 45 mins
    Quali’s CloudShell has become the de-facto cloud sandbox software platform for a variety of use-cases ranging from DevOps automation, continuous testing, cyber ranges, lab-as-a-service, hybrid cloud, demo and POC compliance and many more. With hundreds of marquee customers worldwide, it continues to add new capabilities that significantly increase Dev/Test productivity and innovation velocity while lowering costs. Release 8.0 expands upon these capabilities focusing on a multi-cloud offering with “one-click” cloud deployment paths for Microsoft Azure and OpenStack. It also includes Ansible integration.



    Quali’s VP of Engineering, Edan Evantal, shares what’s under the hood of Release 8.0 and provides a no-BS engineer’s perspective.
  • AmerisourceBergen: Architecting Enterprise Master Data Hub for One ABC
    AmerisourceBergen: Architecting Enterprise Master Data Hub for One ABC Pete Stormer, Director, Data Mgmt, ABC; David Lyle, VP, Informatica; Prash Chandramohan, Product Marketing Mgr, Informatica Recorded: May 11 2017 61 mins
    Located at the intersection of pharmaceutical manufacturers and healthcare providers, AmerisourceBergen Corporation (ABC) is a $147B global pharmaceutical services and distribution company. The company’s success rests on knowing its diversified customer mix and serving them with innovative programs and solutions.

    Formed in 2001, AmerisourceBergen had become a group of companies under one banner. Join us to hear how the company designed a data strategy to view business interactions holistically across multiple business groups to serve customers as a single company. Pete Stormer, Director of Data Management at ABC, will talk about their experience, best practices, and lessons learned to support the journey to one ABC.

    The webinar will also cover the following topics:

    • The evolution of MDM as a strategic platform to deliver trusted data to business users
    • Best practices for master data management, data quality, data governance and reference data
    • Defining the enterprise strategy for data management in complex business environments
  • ACI: Simplified, cloud like agility in your enterprise data centre
    ACI: Simplified, cloud like agility in your enterprise data centre Barrie Blackwell, Cisco & Phil Lees, WhiteSpider Recorded: May 11 2017 60 mins
    Learn how Cisco ACI can help you manage your data centre, speed up application deployments, and deliver services more quickly
  • Top Five Mistakes Companies Make when Executing a Cloud Strategy
    Top Five Mistakes Companies Make when Executing a Cloud Strategy Tab Schadt, CEO at DoubleHorn Recorded: May 10 2017 21 mins
    Choosing the right cloud provider, that meets your requirements at the right price can be a daunting task. We’ve seen too many make the wrong choices. In this webinar, we will guide you through the things to think about when executing a cloud strategy and how to avoid the pitfalls. Is there a better way to do things? We think so.

    Some things you'll learn in this webinar:
    Not all clouds are created equal. How to choose the best cloud(s) for your company's needs
    How to estimate your bandwidth
    How to avoid sticker shock and leverage the best value
  • Workload Placement Made Simple: Private or Public?
    Workload Placement Made Simple: Private or Public? Jason McKinney, Chief Revenue Officer and Julian Macri. Cloud Consultant May 25 2017 6:00 pm UTC 30 mins
    During this session you will learn how to bring clarity to help make cloud decisions in minutes, not months.

    Jason McKinney will be presenting.

    CloudAssist™ is the portal through which you research cloud options and map your application portfolio to the best cloud solution.

    Assess application profiles, model transformation scenarios, and discover the best execution venues for your needs based upon user demographics, service levels, security, technology and total cost of ownership.

    Define Requirements
    Compare Options and Providers
    Receive Actionable Recommendations
    Evaluate the Business Case
    Move from Decision to Provision
  • SEP 14 Webinar Series: Easy Ways to Improve Your Security Posture
    SEP 14 Webinar Series: Easy Ways to Improve Your Security Posture Kirk Gibbons, System Engineer, Symantec May 30 2017 5:00 am UTC 30 mins
    Effective communication between the network and the endpoint is critical to quickly identifying advanced threats and preventing the spread of infection. The more automated the process the less damage an attack can do.

    Join use to learn what tight integration between Symantec Endpoint Protection and Secure Web Gateway looks like. You will discover:

    •Why tighter integration between the network and endpoint improves security posture
    •How new REST APIs help orchestrate a rapid response at the endpoint
    •What the future plans are for new APIs, integrations, and global threat intelligence

    Lastly, watch a demo that showcases how easy it is to integrate Symantec Endpoint Protection and Secure Web Gateway and what orchestrated response looks like.

    We look forward to welcoming you in our webinar.

    Register today!
  • Attacchi cyber in EMEA: i nuovi trend
    Attacchi cyber in EMEA: i nuovi trend Gabriele Zanoni, Systems Engineer di FireEye May 30 2017 9:30 am UTC 45 mins
    Partecipa al webinar con Gabriele Zanoni, Systems Engineer di FireEye, per scoprire come si sta evolvendo il panorama delle minacce sulla base dei dati sui cyber attacchi dello scorso anno, rilevati dalle investigazioni di Mandiant.

    Il webinar affronterà temi quali:

    •I nuovi trend negli attacchi di phishing usati per compromettere le aziende
    •I cambiamenti nella telemetria e nella metodologia degli attacchi
    •Le analisi di intelligence sulle minacce emergenti
    •Le nuove strategie di difesa per proteggere al meglio le aziende
    •L’impatto del GDPR sul business
    •Confronto fra trend europei, americani e asiatici
  • GDPR Compliance Made Easy with Data Virtualization
    GDPR Compliance Made Easy with Data Virtualization Mark Pritchard, Sales Engineering, Denodo May 30 2017 6:00 pm UTC 60 mins
    Companies should be gearing up for May 25, 2018 when the General Data Protection Regulation (GDPR) comes into effect. GPDR will affect how businesses that serve the European Union collect, use and transfer data, forcing them to provide specific reasons and need for the personal data they gather and prove their compliance with the principles established by the regulation.

    The regulation is already creating many challenges for companies, including:

    - Ensuring secure access to most current data, whether on or off-premise
    - Consistent security across all data sources
    - Data access audit
    - Ability to provide data lineage

    This webinar aims to demonstrate how data virtualization has surfaced as a straight-forward solution to many of the challenges and questions brought on by the GDPR. It will also include a case study of how Asurion already achieved the desired level of security with data virtualization.

    Join the webinar to learn more about the benefits of using data virtualization to smoothly comply with the GDPR.
  • Building an agile team to drive amazing customer experiences
    Building an agile team to drive amazing customer experiences Jeff Julian, co-founder of Enterprise-Marketer.com, CEO of Squared Digital May 31 2017 3:00 pm UTC 60 mins
    In recent years, you can’t read a trade pub without hearing about the explosion and effectiveness of content marketing. More than 90% of marketers cite it as a key strategy in their mix. As marketers, we know we need content. We know audiences want it. But the question becomes, how to do it, do it well, and get it done on time?

    According to Jeff Julian, Co-founder of EnterpriseMarketer.com, the power is in planning. Jeff will share how marketing teams he has led have employed sophisticated and agile techniques to deploy content that works.

    About the presenter: Jeff Julian has been helping companies develop content strategies for over ten years, after launching one of the largest blogging communities, Geekswithblogs.net. He’s been a web developer since 1994, and a Microsoft Most Valuable Professional in XML and SharePoint. He is also the best-selling author of a book on SharePoint development and Jeff recently published a book titled, Agile Marketing: Building Endurance for your Content Marketing Teams
  • Digitizing legacy POS for Omni-channel Integration
    Digitizing legacy POS for Omni-channel Integration Hariharan Ganesh - Head of Enterprise Integration, Aspire Systems Jun 1 2017 5:30 am UTC 60 mins
    Since its advent in 1974, POS has managed almost 100% of transaction processing with utmost efficiency. Even though modern Cloud POS helps to establish digital experience, traditional legacy POS systems cannot meet digital requirements and diminish the customer experience, online reachability as it lacks real-time access, inventory management & Omni-channel capabilities.

    Learn how you can make your existing legacy POS more powerful & connected with your digital strategy to meet modern customers.
  • Between a ROC and a Hard Place with PCI?
    Between a ROC and a Hard Place with PCI? Jennifer Pesci-Anderson, Jeff Avery Jun 6 2017 4:00 pm UTC 60 mins
    Learn how to conquer and manage the PCI process. Businesses are challenged with attempting to continuously monitor their PCI environment, responding when something changes and managing all the information to gather evidence and generate the report on compliance (ROC) or attestation on compliance (AOC). Verterim is providing a 3 part, educational PCI series to address some of these business challenges and provide our tips on how you can take advantage of technology you may already have in house. The first 30 minute BrightTalk will look at the PCI process at a higher level and provide a view into a standard RSA Archer use case to help solve the problem. Join our GRC practitioners, Jennifer Pesci-Anderson, National Practice Lead and Jeff Avery, Engineer on May 11 from 12-12:30 to see how you can address your PCI business challenges.
  • Top 50 Emerging Technologies - Growth Opportunities to Fuel Global Innovation
    Top 50 Emerging Technologies - Growth Opportunities to Fuel Global Innovation Anand S, Vice President, TechVision Jun 7 2017 5:30 am UTC 60 mins
    Top 50 Emerging Technologies is a comprehensive insight of the most promising and disruptive technologies poised to impact our world in the next few years. It highlights and offers strategic guidance and actionable ideas on the hottest 50 technologies that pack maximum potential to fuel global innovation, spawn innovative products and services, and drive commercial growth. The top 50 technologies are key beacons that will guide the strategic moves of innovation-focused organizations and professionals. While each of the top 50 technologies represents an area of intensified R&D, heightened investments, increased IP activity, and tremendous market potential, the possible convergence of several of these technologies opens up unprecedented opportunities for new revenue models and the next generation of innovative products and solutions.
  • Financial Services Apps - Shift IT Infrastructure Certification into High Gear!
    Financial Services Apps - Shift IT Infrastructure Certification into High Gear! Christian Horner, Area Dir., WWT, Dos Dosanjh, Solution Architect, Quali, Jun 7 2017 5:00 pm UTC 60 mins
    Challenged by IT infrastructure bottlenecks? Certification, compliance and security issues impeding your roll out of new applications? Are you an IT, Ops or Automation person working in the financial services industry? Then, this webinar is for you!

    Join this 60-minute webinar with a demo and Q&A to learn:
    •Overview of how IT infrastructure updates impact security and compliance faced by financial services
    •Application and Infrastructure modernization initiatives including in brownfield deployments
    •How to efficiently introduce, test and validate IT infrastructure and application updates

    DEMO!!
  • The Resurgence of APT10
    The Resurgence of APT10 Stuart Davis, Director, Mandiant & David Grout, Systems Engineering Director, FireEye Jun 8 2017 1:00 pm UTC 45 mins
    FireEye has tracked APT10, a Chinese cyber espionage group, since 2009. APT10, also known as MenuPass Group, have historically targeted the United States, Europe, and Japan with a specific focus on construction, engineering, aerospace, telecom, and government.
    In June 2016, FireEye first reported that APT10 expanded their operations with a new suite of tools and techniques to target their adversaries.

    Join our experts whom have hands on experience with this group to learn:

    •Who is a part of APT10, whom they target and how they operate
    •How to defend against, hunt for and respond to APT10
    •How your organisation can improve its ability to detect, prevent and remediate APT10 attacks
  • Accelerate your Advanced Analytics
    Accelerate your Advanced Analytics Bora Beran, Product Manager, Tableau Jun 8 2017 3:00 pm UTC 60 mins
    At Tableau we help people see and understand data. Seven words that drive everything we do. And they’ve never been more relevant. Tableau is all about making your analytics faster, smarter, and more powerful, so that everyone can get the answers they need. Helping people gain insight into their data to solve unexpected problems is what drives us.

    In this webinar, we will explore how Tableau can help with all stages of an analytics project, but focus specifically on a few advanced capabilities. Broadly, we will look at the following scenarios and the capabilities that support them:

    •Segmentation and Cohort Analysis
    •What-If and Scenario Analysis
    •Sophisticated Calculations
    •Time-Series Analysis
    •Predictive Analysis
    •R and Python Integration

    Attend to see how Tableau is making advanced analytics exploratory, faster and more scalable than ever before.
  • Top 50 Emerging Technologies - Growth Opportunities to Fuel Global Innovation
    Top 50 Emerging Technologies - Growth Opportunities to Fuel Global Innovation Rajiv Kumar, Partner, TechVision Jun 8 2017 4:00 pm UTC 60 mins
    Top 50 Emerging Technologies is a comprehensive insight of the most promising and disruptive technologies poised to impact our world in the next few years. It highlights and offers strategic guidance and actionable ideas on the hottest 50 technologies that pack maximum potential to fuel global innovation, spawn innovative products and services, and drive commercial growth. The top 50 technologies are key beacons that will guide the strategic moves of innovation-focused organizations and professionals. While each of the top 50 technologies represents an area of intensified R&D, heightened investments, increased IP activity, and tremendous market potential, the possible convergence of several of these technologies opens up unprecedented opportunities for new revenue models and the next generation of innovative products and solutions.
  • Action GDPR – Data Masking for Sensitive Data Security & The Right to Erasure
    Action GDPR – Data Masking for Sensitive Data Security & The Right to Erasure Paul Garstang, Snr Manager EMEA - Data Security Group & Steve Holyer, EMEA Specialist - Data Security Group Jun 14 2017 1:00 pm UTC 60 mins
    GDPR (General Data Protection Regulation) is only a year away, and many organisations are still trying to understand what this new regulation means to them, and their data governance practices.

    Join us for the third in a series of webinars which focus on how organisation's can begin to action GDPR - this short session is all about data privacy by de-identifying, de-sensitizing and anonymizing sensitive data with Informatica’s Data Masking tools.

    In the context of GDPR, Data Masking tackles several critical requirements by protecting and preserving the privacy of customer/employee data. Persistent Masking creates ‘Pseudonymised data’ which replaces the original sensitive data with new values, but critically retaining both contextually and referentially integrity. Alternatively, for production environments Dynamic Masking preserves the original data format, but strictly limits who can see the data. This control of access to sensitive data is essential under GDPR, as a breach of sensitive data can also be deemed to have taken place if employees without business processing cause have access to and visibility of that data.

    Increasingly Data Masking is also becoming the best practice approach to enacting “The Right to Erasure”, in this session we will discuss why this is the case, and how this approach to Erasure contrasts with a Data removal approach.

    This session will cover:
    - Persistent & Dynamic Data Masking
    o What they are
    o When to use them
    o What they are delivering for a GDPR project
    - How Masking can deliver Erasure
    - Live Demo of Informatica’s Data Masking
  • PCI Continuous Controls; Set It and Forget It
    PCI Continuous Controls; Set It and Forget It Jennifer Pesci-Anderson, Peter Ridgley, George Waller Jun 14 2017 4:00 pm UTC 60 mins
    With mounting HIPAA regulations and PCI requirements, learn why securing your access credentials should be your number 1 priority this year and solutions that can take the guess work out of the authentication process.
  • Dealing with Skills Gap in Cyber Security
    Dealing with Skills Gap in Cyber Security Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific & Japan Jun 15 2017 5:00 am UTC 60 mins
    As cyber threats in the business world evolve, so do the skill requirements on Cyber Security specialists. In 2017, 55% of enterprises required at least three months to fill open Cyber Security positions and 37% reported that less than 1 in 4 candidates have the qualifications they need (1). Building and maintaining a capable Cyber Security team today is a challenge.

    A fundamental shortage of Cyber Security professionals, coupled with high attrition rates, can lead to organisations failing to acquire or retain the expertise necessary to respond to an ever-evolving threat landscape.

    To better help you prepare against this situation, we have arranged for a webinar session, where we will explore the skills gap in the different stages of a Cyber Security programme, and provide recommendations on how to:

    •Create and operationalise a robust cyber security team
    •Build and upskill existing talent
    •Address the skills gap in different stages of your Cyber Security programme
    •Source skilled security professionals differently

    (1) Source: ISACA’s State of Cyber Security 2017: Current Trends in Workforce Development
  • 6 Hidden Security Risks for Industrial Environments
    6 Hidden Security Risks for Industrial Environments Rob Caldwell, ICS Manager, FireEye Jun 15 2017 1:00 pm UTC 45 mins
    Industrial enterprises – like electric utilities, petroleum companies, and manufacturing organisations – invest heavily in industrial control systems (ICS) to operate industrial processes efficiently, reliably, and safely. Without technology operating the plant floor, business halts or worse.

    Join our webcast to discuss six key plant floor weaknesses that adversaries exploit to undermine plant operations. Subversive and difficult to detect, explore the implications and a step-by-step checklist for mitigating these risks firsthand with our experts.
  • What CISOs Really Think About Security Incident Automation
    What CISOs Really Think About Security Incident Automation Dario Forte and Amar Singh Jun 15 2017 1:00 pm UTC 30 mins
    Join Dario Forte, founder of DFLabs, as he shares the results of an extensive survey on thoughts and practices of CISOs worldwide with regard to security incident automation and orchestration. With an exponentially increasing level of cyber threat and ever more scrutiny, CISOs are under pressure to ensure SOCs operate efficiently and with consistency. Hosted by Amar Singh of Cyber Management Alliance, this webinar will cover:

    - How automation and partial automation can speed up response times.
    - How playbooks can ensure your response is consistent and proven.
    - What challenges CISOs find when building an efficient SOC.
    - How CISOs plan to introduce security incident response and orchestration into their SOCs.
  • Managing Digital Applications rapid growth: CIO’s nightmare
    Managing Digital Applications rapid growth: CIO’s nightmare Janaki Jayachandran: Technology Director, Jothi Rengarajan: Principle Architect Jun 15 2017 3:30 pm UTC 60 mins
    Almost every Enterprise is in the middle of digital transformation wave spanning across the landscape of social media, mobility, Analytics and Cloud. However, Enterprises have a big challenge in managing the digital applications built across this landscape comprising of both custom built and out of box solutions. While the number of applications grows rapidly there is also an increasing demand from the business which puts Enterprise IT under constant pressure to improve their agility and provide faster response times to meet market demands. Therefore, Enterprises are in dire need of a solution to simplify the development and management of digital applications with little to no operational overhead.
    In this webinar, we will be focusing on how to address the challenges of managing multiple digital applications and bring in standardization in the way they are built and managed.

    Join the webinar and learn how effectively you can improve business agility and achieve faster time to market through simplifying management of Digital Applications.

    Key Takeaways:
    •Challenges in managing diversified applications
    •Features of a Digital Management Platform
    •Building blocks for rapid development of new digital applications
    •Digital Management Journey of a Fortune 400 company
  • Disruptive Technologies will Influence Logistics Supply Chain By 2025
    Disruptive Technologies will Influence Logistics Supply Chain By 2025 Vijay Narayanan, Senior Research Analyst, Visionary Innovation Group Jun 20 2017 2:00 pm UTC 60 mins
    Technological intrusion in the logistics space has resulted in minimizing the current complexity. Trends such as connectivity have resulted in creating new types of service deliveries centered on app-based and marketplace models that are already disrupting the supply chain. The study is broken down into three clusters—technology scenarios, business scenarios and market scenarios—covering the new innovations, business models, and routes and regions that are expected to create a multitude of opportunities in the logistics space.
  • Tableau in the Cloud: A Netflix Original
    Tableau in the Cloud: A Netflix Original Albert Wong - Reporting Platform Manager, Netflix Jun 22 2017 1:00 pm UTC 75 mins
    See how Netflix built its analytics in the cloud with Tableau and Amazon Web Services

    Building out a data platform doesn't have to be like building a House of Cards, and our friends at Netflix know this better than anyone else. With 86 million members and counting, and more than 700 billion events per day, Netflix has had to expand their data capabilities by developing a scalable and flexible analytics platform built on Tableau and AWS.

    Attend this webinar to hear from Albert Wong, analytics expert at Netflix, to see how they simplified their data stack by building a data lake/data warehouse strategy which allows Netflix to collect and store massive amounts of data, supporting thousands of Tableau users with managed data.

    You'll learn about:

    How to set up effective analytics on top of enormous data sets
    How Netflix serves large groups of people with governed data
    The details of Netflix's data lake/data warehouse strategy
    How Netflix manages Hadoop with Tableau
  • Data-Centric Security for GDPR Compliance
    Data-Centric Security for GDPR Compliance Brandon Dunlap; Mark Chaplin, ISF, HPE, Imperva Jun 27 2017 5:00 pm UTC 60 mins
    In today’s threat landscape, traditional approaches to securing data are falling short. Since 2015 we have seen some of the largest data breaches ever and it is clear that no industry or organization is immune from cyber attacks. The threat landscape is increasingly dangerous, while new technologies are distributing sensitive data farther across locations, devices and repositories. Starting in May 2018, enforcement will kick in on the European Union’s General Data Protection Regulation (GDPR), a move that could have a stronger privacy/security standardization effect than any technological effort has to date. Globalization efforts will make GDPR compliance essential for global companies wherever they are located.

    The development of a comprehensive data-centric security program, including data discovery, classification, encryption, and file protection, can uniquely position your organization to protect what matters most, and make security move with your data to comply with global regulations such as GDPR. On this webinar our panel of experts will discuss the key points that you should consider when developing such a program for your organization.
  • Action GDPR – Execute on Data Rights
    Action GDPR – Execute on Data Rights Matthew Cawsey, Financial Services Master Data Management Specialist, Informatica Jun 28 2017 1:00 pm UTC 60 mins
    GDPR (General Data Protection Regulation) is only a year away, and many organisations are still trying to understand what this new regulation means to them, and their data practices.

    Join us for the final in a series of webinars which focus on how organisations can begin to action GDPR - this short session is all about creating a single place to access, maintain and administer Data Subjects and manage their Consent - with Master Data Management.

    In the context of GDPR, a mastering process collects Subject Data from across the enterprise and a range of techniques are applied to match & merge data related to the same party, enabling an organization to accurately identify all records related to that data subject from a single place.

    This session will cover:

    -Essentials in the ‘right to be forgotten’ and SAR GDPR Clauses
    -Benefits which can be achieved in addition to preparation for GDPR Compliance
    -Live Demo of Informatica’s Master Data Management Capabilities for Subject and Consent Mastering
  • Digital Transformation: how APAC will turn disruption into differentiation
    Digital Transformation: how APAC will turn disruption into differentiation Agatha Poon 451 Research, Gery Messer CenturyLink Jun 29 2017 3:00 am UTC 60 mins
    How enterprises are choosing and using digitization initiatives for business gain.

    Organizations of all sizes and in every sector are busy redefining their IT priorities for a digital future, identifying the goals of enhanced customer experience, operational efficiency, business agility and improved risk management as four key pillars for their digital transformation strategies.

    Digital transformation is playing out differently depending on a company’s maturity, the vertical sector in which it operates, its employees, its infrastructure, and its ability to innovate. Knowing where to start, and how to maintain momentum is critical.

    Join 451 Research and Centurylink to learn how some global enterprises are making assured first steps, and hear the following:

    •Understand how companies with more progressive Digital Transformation strategies are prioritizing their efforts for competitive differentiation, changing the nature of their business with innovative technologies that are becoming more easily accessible with a lower barrier to entry.

    •Insights and recommendations from a major survey of enterprises worldwide about IT priorities and how to make service provider choices to accelerate digital transformation mandates such as the role of cloud and other IT infrastructure options that are built for availability, speed, and resilience.

    •Identification of key shifts in business context that will continue to shape digitization efforts, and how these need to be reflected in a digital transformation roadmap for IT organizations.
  • Utilizing ISO31000 to Map Risk Across the Enterprise
    Utilizing ISO31000 to Map Risk Across the Enterprise Informed Risk Decisions, Riskonnect Aug 8 2017 5:00 pm UTC 60 mins
    The global financial crisis in 2008 demonstrated the importance of adequate risk management. Since that time, new risk management standards have been published, including the international standard, ISO 31000 ‘Risk management – Principles and guidelines’.

    The ISO 31000 Risk Management Standard provides guidance for the framework of risk management applicable for organizations of any size. ISO 31000 defines a risk management framework as a 'set of components that provide the foundations and organizational arrangements for designing, implementing, monitoring, reviewing and continually improving risk management throughout the organization. On this webinar our panel of experts will discuss ISO 31000 and how your organization can utilize the standard to implementing a structured approach to enterprise risk management, and map risk across the organization.

    Key Points to be discussed:

    - The principles and processes of risk management
    - The requirements of ISO 31000
    - Practical guidance on designing a suitable framework
    - Practical advice on implementing enterprise risk management
  • A Tactical Guide to Reducing Your Data Breach Risk
    A Tactical Guide to Reducing Your Data Breach Risk HPE Security - Data Security, MetricStream Aug 29 2017 5:00 pm UTC 60 mins
    Over 90% of the world’s data has been generated in the last few years. Accompanying this rapid growth in data comes exponential risks, as witnessed by the spike in cyber attacks of which no organization seems immune. The financial rewards gained by the perpetuators of cyber attacks is blatant, and this is driving continued attacks on companies containing massive amounts of consumer data. For these companies securing data is only half the battle. The risks can be greater when data is transmitted externally, hence it is critical that organizations know where sensitive data is going, how it is being transmitted, and how it is being handled and stored.

    On this webinar our panel of experts will discuss some of the best practices organizations can consider to reduce the risk of suffering from a data breach, and to proactively prepare for any subsequent breach that could happen.