Effective risk management is critical for every organization, especially in the current era of increasingly frequent and complex cyber threats. Organizations with the ability to detect changes across global IT environments in real time can better prevent and respond to malicious acts such as ransomware/malware attacks and configuration tampering.
Join our panel of InfoSec experts on this CPE accredited webinar to learn how your organization can take command of risk to proactively prioritize and address the risks that matter most, and ignite your risk management program to enable cybersecurity.
Qualifying participants will earn 1 CPE credit.
- Discover how to identify, catalog, and prioritize risks across the enterprise
- Find out how to quickly measure critical activities and address inherited risk
- Learn how to gain efficiency and effectiveness of current risk-management approaches
As IoT crosses the chasm and goes from hype to reality, security and data privacy (top IoT challenges) need to be addressed by the industry and government organizations for once and all.
The stakes are high but tackling the problem is far from simple. Mainly, because IoT is a complicated stack made up of untrusted sourced components.
Join us on this IDC webcast in which we will address the “IoT Supply Chain of Trust” as the cornerstone to IoT Security today. This webcast will cover the following topics:
What’s the weakest link in an IoT solution?
Security and accountability in IoT vendor ecosystems
Supply chain of trust and Blockchain
GDPR and government regulations: security by design
Although GDPR is primarily a legal and compliance issue, a data breach is the point of failure that will highlight any deficiencies in an organization’s data protection and larger security posture.
GDPR Article 33 requires breaches to be reported within 72 hours of discovery. With just 72 hours after breach discovery to report the nature of the breach, number of records and subjects affected, and likely consequences, every hour matters, and visibility across the environment becomes a must.
With speed of response being critical, you need a trusted partner with the incident response expertise, threat intelligence and purpose-built technology to enable rapid initial notification, and to provide support with subsequent notifications once further data points are identified/obtained.
Join the conversation with Stuart McKenzie, Vice President Mandiant EMEA, to talk about :
· How FireEye can help you meet the GDPR 72-hour breach reporting requirement, should you be breached, and
· How FireEye can help reduce the risk and impact of a breach by securing sensitive and confidential data and improving breach response readiness—before, during, and after a cyber-attack.
Sebbene il GDPR sia soprattutto una questione legale e di compliance, un evento di "data breach" evidenzia la presenza di carenze nel sistema aziendale di protezione dei dati e più in generale nella security posture.
L'articolo 33 del GDPR richiede la notifica delle brecce informatiche entro 72 ore dalla scoperta.
Un tempo decisamente limitato per notificare la natura della breccia, il numero di record e soggetti coinvolti e le possibili conseguenze. Ogni ora conta ed è fondamentale disporre di una visibilità del proprio ambiente completa ed approfondita.
In questo scenario, la rapidità di risposta diventa un fattore critico. Per questo è necessario potersi affidare ad un partner che abbia un'elevata competenza nell'incident response, che disponga di soluzioni di threat intelligence di qualità e di tecnologia atta non solo a garantire una prima notifica rapida, ma anche a supportare le notifiche successive sullo stato di avanzamento del processo di risposta e di rimedio all'incidente.
Ne parliamo il 22 marzo con Marco Rottigni, Sr. Product Marketing Manager EMEA, per comprendere come FireEye possa:
"aiutarti a soddisfare il requisito di notifica incidente entro le 72 ore dalla scoperta della breccia
"ridurre il rischio e l'impatto di una potenziale breccia con la messa in sicurezza di dati sensibili e confidenziali, migliorando le capacità di risposta agli incidenti prima, durante e dopo un cyber attack
Les plateformes de sécurité présentent aujourd'hui beaucoup de challenges qui les rendent difficiles à gérer : manque de visibilité, trop volume d'alertes, peu de contextualisation… Le résultat est une perte d'efficacité, et de vitesse dans la prise en compte des incidents de sécurité.
FireEye a conçu une plateforme de gestion des opérations de sécurité avec ces objectifs en tête, plus de visibilité, une meilleure lisibilité et une contextualisation de la menace, le but ultime étant de fournir une plateforme facile à déployer, à administrer et qui répond aux besoins d'aujourd'hui.
Lors de ce webinaire nous couvrirons les points suivants :
Comment HELIX centralise les opérations de sécurité :
- Améliore la visibilité de bout en bout
- Aide à la Priorisation et la contextualisation des alertes
- Accompagne à la prise Prise de décisions et à la levée de doutes
Nous terminerons par une démonstration de la plateforme à travers un Business Case réel et nous laisserons le temps aux différentes questions en live.
Knapp 70 Prozent der Unternehmen und Institutionen in Deutschland sind in den Jahren 2016 und 2017 Opfer von Cyber-Angriffen geworden. In knapp der Hälfte der Fälle waren die Angreifer erfolgreich und konnten sich Zugang zu IT-Systemen verschaffen, die Funktionsweise von IT-Systemen beeinflussen oder Internet-Auftritte manipulieren.
Aufgrund der hohen Anzahl von Risiken und Lösungen brauchen Unternehmen zunächst Klarheit, welchen Grad an Sicherheit sie erreichen möchten, um Budget und Ressourcen optimal einzusetzen. Wollen Sie lediglich die gesetzlichen Vorgaben einhalten, den Branchenstandard erfüllen oder Sicherheit als Alleinstellungsmerkmal für Ihr Unternehmen definieren?
Wir erläutern Ihnen unseren Ansatz zum Aufbau einer effektiven Sicherheitsarchitektur, die auf die individuellen Bedürfnisse Ihres Unternehmens abgestimmt ist und bieten Entscheidungshilfen zur Festlegung des notwendigen Grads an Sicherheit. Dabei fokussieren wir folgende Themen:
Bewertung der Ausgangssituation (bestehende Sicherheitsarchitektur)
"Bewertung von Sicherheitsprogrammen
"Fazit: Erstellung eines Aktionsplans in Abhängigkeit von Budget und Ressourcen
Zielgruppe: Geschäftsführer, Sicherheitsbeauftragte, IT-Leiter, Datenschutzbeauftragte und Fachabteilungen, die an der Ausarbeitung von nachhaltigen Sicherheitskonzepten beteiligt sind.
Are you struggling to turn big data into useful, accurate, consistent, and impactful insights? Organizations are rapidly adopting new technologies like Hadoop, Spark, and Kafka to help lines of business develop new insights. However, with the sheer quantity of data available and complexity of new technologies, the opportunity to drive operational efficiencies and grow sales can feel overwhelming, inflexible, manual, and complex. Informatica's customers have successfully pursued digital transformation strategies through more systematic approaches for getting the right data, in the right place, at the right time to the right people.
In this webinar, learn how to:
• Design an architecture for data management with Hadoop and big data that can scale for large organizations
• Understand best practices for data integration, data quality, data cataloging, and data preparation
• Exploit automated approaches to data management to get more trusted data assets every time
Join experts from Cloudera and Informatica to learn about an enterprise approach to data management that enables big data to be turned into useful, accurate, consistent, and impactful business insights.
How can ServiceNow transform your HR Service Delivery? Start simplifying HR processes, reducing time spent on routine tasks, and modernizing the employee service experience.
- The Big Picture: Why are we all investing in HR?
- Real World Examples: What's possible in HRSD
- Build your Business Case: Alignment, Impact, and your 4 steps to a killer pitch
- Questions to expect: New demands and changes we see with Acorio clients as ServiceNow HRSD expands
During the webcast, we will analyse:
•What are the steps to be taken to effectively use design thinking in mobile health services
•What are the challenges you may face in a user-centered design process
•How this approach can be more generalised to other service design to deliver better patient experience
Today, modern, Customer Support teams use thoughtful, intuitive technology to solve customer issues at light speed. In some cases, they have even transformed from a cost center to a juiced up revenue producer.
In our March Lunch and Learn our Customer Service experts will show how to do just that, with real-world examples from companies winning Customer Service right now, and a live demo.
The expectation from the start of 2017 – that we hadn’t seen the back of ransomware – was justified. 2017 was plagued with global attacks such as Petya, WannaCry, Bad Rabbit and many others. Unfortunately, 2018 could be even worse.
With ransomware continuously developing new delivery techniques, organisations must learn how to prepare and protect themselves from the threat of ransomware, but how can they do this?
In this webinar, Nick Frost, Principal Consultant at the ISF, will explore the latest threats in ransomware and what organisations can do to minimise vulnerabilities to reduce risks of an attack.
About the presenter:
Nick is currently the Principal Researcher for the Information Security Forum (ISF) Ltd. He has more than 15 years’ experience designing and implementing a risk-based approach to securing information. He has developed leading solutions for evaluating risk across both internal and supplier environments.
I will share my thoughts on how we overcome a lot of objections by creating certainty around our products/services, us and our companies. Increase credibility, position ourselves as the expert or authority figure to gain control of an inquiry so we may find it easier to close. I will also look at how this will have a positive impact upon your prospect.
With the new Privacy Amendment (Notifiable Data Breaches) Act 2017 now in effect, many Australian businesses and government agencies are starting to take action to ensure their data protection and breach response plans are up to date and comply with the new scheme. However, knowing how to avoid the higher penalties and reputational damage caused by data breaches is a tough challenge for any business.
Don't miss this opportunity to join Symantec's privacy expert Brian Fletcher, Director, Government Affairs, Symantec, Asia Pacific and Japan to learn more about the new laws and what you can do to ensure your business is not making headlines for all the wrong reasons.
" Hear about new challenges introduced by the Australian mandatory data breach notification laws and the wide reaching General Data Protection Regulation (GDPR)
" Learn about key steps in the journey towards privacy compliance and why most Australian businesses have approached privacy wrong
"Understand how these regulations can enable you to gain trust and enhance customer experiences
Recent trends suggest a continued increase in popularity of ATM “jackpotting” operations leveraging various tactics, techniques and procedures (TTPs). While we have observed an increase in the use of ATM malware in underground communities since 2011, highly publicized events demonstrating the potential for lucrative profits from ATM jackpotting operations have undoubtedly sparked more interest in this attack vector. Join this webinar to learn about the marketplace dynamics enabling ATM jackpotting, common TTPs used by criminals, and what organizations can do to mitigate risk associated with these operations.
The future of blockchain remains promising as enterprises move along their digital transformation journeys. End users will realize the long-term value this new and innovative technology holds, building upon their existing technology infrastructure and also layering on new and emerging technology to create a complete ecosystem. In order to help vendors capitalize on the opportunity, we will share market insights and data on the key blockchain use cases and trends.
Recruiting top talent is a contentious process, especially in an industry as competitive as pharmaceutical and medical device. In the dog-eat-dog world, how do you set your company apart from rival organizations? Join us for this webinar on how the right business vehicle program can give you a hiring advantage over the competition.
Scheduling and managing mobile workers is complicated and if you aren't using scheduling automation technology, you are missing a huge opportunity to be more efficient and provide better communications for your workers.
Step beyond the hype and the myths about Artificial Intelligence (AI) and Machine Learning (ML). Join us on this webinar to learn the real world significance of AI for an enterprise. This webinar will take a practical view of how ML can make a difference in your business, illustrating the role it plays in any meaningful digital transformation effort employing AI. The focus will be on the business value this technology can deliver.
Infosys Nia, a comprehensive AI platform, comes equipped with Advanced Machine Learning that works in concert with its other aspects rendering effective digital transformation solutions for an enterprise. Join us to learn how you can embark on your own digital transformation journey.
- Mike Gualtieri, VP, Principal Analyst Serving Application Development & Delivery Professionals, Forrester
Sales Operations Professionals are known for being adaptable, however, only 30% of sales ops pros are adjusting their strategies as conditions change throughout the year. Which makes them less likely to actually validate their assumptions and measure their success against their plan, leaving them (and their company) open to the risk of miss sales targets. During this webinar, Sales veteran and OpsPanda CEO, Jon Kondo, shares methodologies that Sales Operations can adopt to create a more agile sales environment that mitigates risk, drives revenue, and ensures that sales, finance, and the CEO are all happy with the results.
You will Learn:
-Tips on how utilize your Annual Operating Plan (it’s only useful if you use it)
-How and why you should monitor and manage your plan year round
-The key factors affecting your growth that you should be analyzing
The term innovation can refer to various stages within a product development cycle, and an invention created in this process can be protected by various forms of intellectual property. Most inventions are created to solve and address consumer needs and problems. To do that job, products enter the market, creating opportunities for the business or the inventor who owns it. A businesses’ IP strategy plays an important role in the success of a new product by ensuring competitive advantage in the market, for now and the future.
However, IP protection can often be seen as an output of product development, leaving the organisation open to risk—whether it's in a new or an existing market. So how can you align IP protection with your invention creation to ensure your IP team is involved at the most effective points throughout the product development process? Too early could mean a slower time to market, and too late could mean lost opportunities in the market.
In this webinar, we’ll be discussing how your organisation can mitigate risk, by aligning your IP and innovation strategy. We will also be looking at:
- Examples of successful organisations who have aligned their IP and innovation
- Intellectual property & open innovation
- Why IP should be a part of the innovation process, not an event
Way back in 2000 it was common practice to spend considerable time configuring and tinkering the plumbing of what we today call cyberspace. The technology was embryonic, immature and often hours were spent ensuring nothing broke and that the business operations carried on smoothly.
Today, those flaky technologies are settled and stable.
- AI and Machine Learning are the focus of marketing teams.
- Everyone keeps focusing on NG or next generation technology.
- If not technology, we keep blaming the human!
Today, surely, the technical plumbing, the boring stuff is secure and stable, correct?
In this webinar we explore the bedrock technologies underpinning cyberspace and discuss why we need to focus on understanding and securing them.
- Amar Singh - CEO and Founder Wisdom of Crowds, Cyber Management Alliance Ltd
- Adam Gladsden - SME cybersecurity technologies.
- NH - DV Cleared, Cyber Criminologist, Dark web researcher & master ethical hacker
The data contained in the data lake is too valuable to restrict its use to just data scientists. It would make the investment in a data lake more worthwhile if the target audience can be enlarged without hindering the original users. However, this is not the case today, most data lakes are single-purpose. Also, the physical nature of data lakes have potential disadvantages and limitations weakening the benefits and possibly even killing a data lake project entirely.
A multi-purpose data lake allows a broader and greater use of the data lake investment without minimizing the potential value for data science or for making it a less flexible environment. Multi-purpose data lakes are data delivery environments architected to support a broad range of users, from traditional self-service BI users to sophisticated data scientists.
Attend this session to learn:
* The challenges of a physical data lake
* How to create an architecture that makes a physical data lake more flexible
* How to drive the adoption of the data lake by a larger audience
Learn on what the future holds for the European market for Big Data and Analytics in 2018 and beyond, together with insight into the top industry use cases driving adoption. Join us for this 30-minute webinar to discover and learn from IDC's insights on:
•How the big data and analytics landscape is evolving driven by key technological forces
•How the push towards digital transformation is prompting forward thinking companies to take a proactive data driven approach
•How the regulatory backdrop in Europe is shaping and influencing big data and analytics initiatives
•Top tips and recommendations for scaling your big data and analytics across the organization.
Cloud is radically changing the way we do business, making #cloudfirst strategies an essential mandate for European organizations. As part of this movement, Multicloud is an imperative that many organizations are striving for. Multicloud can enable significant IT cost savings, greater control over compliance and data security, and provide enhanced functionality through the selection of advanced IT cloud services.
While Multicloud brings a multitude of advantages for organizations, the solutions are not straightforward. The toolbox is diverse, and successful strategies need to address areas such as cloud cost monitoring, cloud compliancy (GDPR) policies, and holistic connectivity strategies into multiple cloud environments. IT Buyers also need to take different approaches to Multicloud based on existing infrastructure, internal skillsets, existing procurement strategies, and company size and location. Multicloud challenges extend to vendors and services providers, who need to adapt their consumption models and compliance policies to a rapidly changing market.
How can buyers discover where they sit in the Multicloud Readiness process, and where to go next? How can vendors and service providers best guide buyers towards building successful Multicloud infrastructure? What are the Multicloud adoption rates in Europe and what learnings can be found from organizations making the journey?
Please join Giorgio Nebuloni and team on March 27th, 2018, where these questions along with key findings from IDC’s Multicloud Readiness Survey will be presented. Essential guidance to European buyers and vendors will also be provided through IDC’s Multicloud Readiness Framework, as organizations plan their Multicloud strategies for 2018 and onwards.
Choosing the right chart type can be the difference between a good visualisation that answers the questions you have of your data, or a great visualisation that provokes new questions and discovers even more actionable insights.
In this live webinar, data visualisation specialist Andy Kirk will share his principles for choosing the chart type that delivers the most insights based upon your type of data and the questions you want to answer. Join us to discover how you can become more scientific in your chart selection.
Using research from his crowdsourced project - The Chartmaker Directory, Andy will analyse a number of different chart types so that you can learn:
-What each chart type reveals
-When a chart should and shouldn’t be used
-How to make your charts beautiful
Chinese entities are aggressively innovating in areas such as artificial intelligence (AI), robotics, supercomputing, quantum technologies, and genomics. Governments, policymakers and multinational corporations outside of China face challenges competing with the Chinese advancements as well as opportunities to level the playing field.
This session will explore answers to crucial questions:
• Where does China stand on various innovation indices globally?
• What does China’s considerable growth in its innovation ranking mean for other leading economies and companies that have business interests in China?
• Which policy initiatives were taken by the Chinese government resulted in improving the innovation ecosystem?
The digital world is transforming how we interact with our customers. In this world, content is currency and the right content drives the customer journey and connects each customer touchpoint with the next. But managing this content on a global scale across channels in multiple languages requires a new approach that centralizes data, standardizes process, and integrates technology into a unified platform.
That sounds great in theory, but what does it actually mean? Join SDL as we discuss how a Global Content Operating Model (GCOM) can help you achieve your business goals by defining processes and technology frameworks that support your entire content supply chain.
We’ll look at business parameters that factor into how you deploy such a model, and take a peek at how this model evolves over time and even prepares companies to take advantage of emergent AI.
We’ll break down each step, including:
• How to manage the content supply chain across departments and platforms.
• How to apply processes that address each step from content creation and translation to delivery.
• Criteria for selection of technology and services that lead to growth and sales.
Just as your company needs a mobile workforce, your mobile workforce needs dependable transportation. A company car program may seems like a shoe in with predictable lease costs, company control of provided vehicles, and a benefit to employees. But what is that Fleet really costing you? Join our webinar to learn the total cost of fleet ownership and the options a company can choose to avoid unnecessary expenses.
During this webinar, IDC Government Insights' Research Director, Chris Pennell will discuss:
•Which key areas governments must master to be successful at Digital Transformation: relationships, operations and information? How far along are European governments in their mastery of the dimensions that underpin these core areas?
•How European governments are adopting 3rd platform technologies?
•What are the governments’ business priorities that are driving digital investments and related security concerns?
The FDA Center for Drug Evaluation and Research (CDER) performs an essential public health task by making sure that safe and effective drugs are available to improve the health of people in the United States. CDER's primary mission is to promote and protect public health by ensuring availability of safe and effective drugs of high quality throughout the entire drug life cycle. The Center oversees the research, development, manufacture and marketing of drugs.
In order for the FDA to best adapt to the ongoing rapid changes in the drug regulatory environment, driven by scientific innovation, globalization, the increasing complexity of regulated products, new legal authorities and additional user fee programs, CDER initiated a major effort five years ago to improve its ability to manage key regulatory data over the life of a drug and to better understand the global drug supply chain at a more granular level.
During this webinar, Shanthi Vigneshwaran, Computer Scientist at the Food and Drug Administration, will share how the CDER has created a 360 view of a drug’s lifecycle, from inception to product. This includes visibility of the global drug supply chain, product ingredients, suppliers, and facilities - bringing them into one trusted view – and empowering the agency to trace any potential harm, save lives, and respond to changes in supply and demand more quickly.
Join us to learn how it’s possible to:
• Gain visibility into a global supply chain across disparate locations and systems
• Address globalization and apply standards in data processes to ensure integrity
• Manage data across complex product lifecycles
As part of its annual survey, Quali received inputs from over 1300 practitioners working in mid-to-large enterprises – all in different stages of their journey to Cloud and DevOps. We learnt about maturity of their own processes, their challenges and learnings, the barriers they’re still challenged to pull down and where they’ve made headway compared to the past couple of years. The survey, now entering into its fourth year provides a great way to look at the industry landscape over a 3-year and map it to the maturity of the transformation that enterprises are experiencing.
We encourage you to join this webinar and learn what you’re peers in the industry shared. Here’re a few things you will walk away with:
•What are the top careabouts for enterprises in their quest for agility? Where are the existing bottlenecks?
•How is the cloud strategy shaping up and what are the top automation tools?
•Is DevOps adopting maturing? What are the barriers? Has the culture evolved?
•How does this compare to the past 2 years?
•How should you prioritize your efforts for 2018?
The reality: Many organizations have information security protections in place that still fail to reliably answer the question: "Have we already been compromised?". A truly advanced and persistent threat could be hiding in areas of your network, systems or devices and harvesting information for extended periods of time, undetected by security software and unnoticed by an untrained eye.
Join us to
* -See a Live Demo of actual tools used to detect, analyse and hunt down advanced malware.
- Understand how advanced threats evade detection
- Get a clear understanding of exactly how threat hunting works
- Learn how you can begin threat hunting in your organisation.
* -Ask and interact with the specialists in threat analysis.
Following on from our successful webinar titled A Day in the Life of a Threat Analyst, we bring you another informational and educational webinar on how an experienced threat analyst goes about investigating an advanced threat and the tools he/she would use to detect, analyse, hunt and remediate.
Join Amar Singh, CEO and globally acknowledged CISO along with Shanay Shah, deeply experienced senior security analyst and threat hunter on this interactive webinar.
eDiscovery driven by litigation involves analyzing large volumes of diverse sources of information - files, databases, paper documents, audio, video and more. To add to the complexity, Gartner research suggests that 80% of all litigation will be multilingual by 2020, which creates a significant challenge for organizations and makes it costly to process and analyze data.
Because machine translation (MT) is designed to automatically translate large volumes of data in a short amount of time, it provides an excellent solution for organizations dealing with large volumes of content.
In this webinar, experts from SDL and Nuance Communications will discuss:
• How MT optimizes eDiscovery and governance processes to reduce the time and improve the accuracy of search and analysis across multilingual content.
• How to deal with government regulations such as GDPR, which forces organizations to establish corporate compliance and informational governance policies to address multilingual content.
MondoBrain is a revolutionary platform for digitizing decision processes. It is a tool that allows the operational to make the best decision possible, given their own intelligence, artificial intelligence, and collective intelligence i.e. their ability to collaborate with their colleagues. This is called Augmented Intelligence.
Tools for technicians, managers and decision-makers, allows them to simulate a decision and to measure the impact of a particular decision on a key performance indicator: the performance of an organization, the life of a product, the conversion rate of a marketing operation ...
Through artificial intelligence, they are able to look for the best of past decisions, with the different data available, and share this decision with all stakeholders in the process. It is a real operational tool for decision support.
Program of this webinar:
- Introduction of the concept of Augmented Intelligence and its impact on Management 4.0
Bruno Saint-Cast with his 25 years of experience in decision-making will explain the concept of Augmented Intelligence which has found its application in an operational product and already used by several thousand users: MondoBrain. He will describe what Augmented Intelligence is, and how it opens the beginning of Management 4.0, an objective and rational approach to the future business direction.
- Demonstration of the MondoBrain solution
Theo Deschamps-Peugeot & Frédéric Roch: will make an online demonstration of the product and will highlight how MondoBrain allows combination and optimization of human, artificial and collective intelligences in a product as easy to use as a video game and whose return on average investment is less than the week.
- Augmented intelligence and decision-making systems: How do they complement each other?
Bruno Saint-Cast, will show what MondoBrain brings to this industry, and how any company, of any size, can make an immediate profit.
This session will look at the drivers, trends, impacts, and overall market for non-traditional robotics on the modern digitally connected business. The evolution of technology in general has helped to drive the evolution of robots for non-traditional business applications.
John Santagate, Research Director for Service Robotics at IDC, says “We are in a very interesting place relative to robotics. There has been a convergence of technology maturity and market acceptance that is helping to drive new robotic applications in business areas where robots have not typically been deployed”. Join us as we dig into what is driving the market, why this time it's different, and how the market will shake out over the coming several years.
Effective May 25, 2018, the European Union General Data Protection Regulation (GDPR) will be enforced, providing enhanced protection for the personal data of European consumers. The regulation affects all businesses that acquire, store or process the personal data of EU citizens. GDPR impacts both businesses within and outside the EU.
The cost of non-compliance could be high, with fines of up to €20 million, or 4 percent of a company's global revenue. GDPR compliance requires a combination of well-defined and audit-proof policies, processes, and alignment amongst general counsel, compliance, internal audit, business units and IT organizations to effectively identify, secure, retain, and govern sensitive data of EU citizens.
- Peter Ku, Vice President, Informatica. LLC.
- Mohit Sahgal, Vice President of Data Governance & Analytics Paradigm Technology
- Jarno Vanto, Shareholder at Polsinelli PC (www.polsinelli.com)
We will cover:
•GDPR overview: Why, What, When, Who, and Major Areas of Consideration for impacted organizations
•Key legal/regulatory considerations for US companies (Jarno Vanto, Polsinelli)
•Addressing the "DATA" aspects of GDPR with Informatica and Paradigm Technologies
•How to initiate a GDPR program, and measure the results and maturity of compliance over time
Are you struggling to compete with online competitors like Amazon? Are you able to deliver a seamless and harmonized experience across online and in-store? Do you understand what is motivating your customers to buy from you? Customers spend more on brands who offer a great personalized experience - across screens, channels, and — most importantly — the digital touchpoints that exist across the enterprise.
Join guest speaker, Gabe Rodino of SDL, together with John Kottcamp of Tahzoo as we share solutions to bridge the insight-to-action gap, and empower you to drive meaningful results with customer interactions. We’ll explore how a combination of visual recognition, cognitive computing and dynamic publishing are used to compile and curate in-store customer data, ultimately resulting in higher sales and greatly increased business and consumer intelligence. An integrated solution can increase customer loyalty, grow revenue per square foot, and even improve inventory management.
In this webinar, you’ll learn:
•How engagement technologies capture, measure, and assess dynamically and in real time.
•Methods to engage customers as a segment of one.
•How to personalize to the ever-elusive anonymous customer.
•What personalization is NOT, and best practices from real life examples.
Live demo of how to Dynamically Secure Cloud Infrastructure.
The title says it all folks - we are going to talk about what's broken in the cloud and do a demo of why it is so easy to break down the current security infrastructure that most companies deploy in the cloud.
Join me, Amar Singh and other specialists including
- Amar Singh - CEO & Founder, Wisdom of Crowds and Cyber Management Alliance
- Klaus Gehri - Specialist Cloud Security, VP Barracuda
This webinar aims to provide participants with a 'foolproof' plan for all telephone Negotiations. Many Negotiations are held over the phone today when buyers can 'catch us out' if we are not fully prepared. Attend this webinar to ensure you are driving better outcomes from any telephone negotiations.
By the end of this webinar participants will have:
- Explored the advantages of telephone negotiations
- Explored the disadvantages of telephone negotiations
- Created a 'foolproof' preparation document
- Committed to applying the learning to their real-world telephone negotiations
There are profound differences between asset-based pricing strategies and those of digital services. Good pricing models can improve B2B subscription renewals, align with your service’s business value, and balance simplicity with accuracy. They blend science with art.
Join Guest Speaker Duncan Jones, VP and principal analyst at Forrester Research, Inc., for a sharp, informative taking on the fundamentals of using subscription pricing as a growth weapon.
Join the webinar to learn:
•How to identify customer business case factors that drive ROI
•How to take advantage of optional extras to boost revenue
•How simplistic pricing schemes can lead to money left on the table
•How to avoid common pricing page mistakes
Growth through acquisition is a common strategy for recurring revenue businesses, providing rapid revenue gains, increased customer base, and cost-side synergies. Capturing those synergies requires thoughtful post-acquisition integration work; bringing multiple companies into a single way of operating across a larger pool of customers.
In many cases, each business has independently built a frictionless Continuous CustomerTM experience around their product offerings, fine-tuning their operations for the singular purpose of attracting, keeping, and growing that certain customer base for that particular offering. After the acquisition is made, attention quickly turns to how these independent entities can be quickly combined to operate efficiently and realize expected benefits.
This session will cover client examples of overcoming this challenge and map out the five steps to integrate recurring revenue business acquisitions to maximize value.
Intellectual property is fast becoming one of the largest, and most valuable items on many organisations balance sheet. These assets can bring to light considerable risks, and opportunities, during M&A.
By looking at the IP portfolio of an organisation, you can get an idea of whether you're strengthening, or weakening your market position and which assets will be the most valuable after the M&A.
In this webinar, we'll be looking at the role IP plays in mergers and acquisitions, as well as:
- What kind of due diligence to consider when looking into patent portfolios
- How to use intellectual property to highlight, and avoid risks during M&A
- How to make better decisions when navigating risks and opportunities
Join us for the fourth webinar in our Growth Webinar Series to learn how Riskalyze aligned project goals and collaborated across functions to deliver on a company-wide software implementation in less than 60 days—and best practices for your own fast, clean, efficient go live.
Riskalyze employees Jeremiah Renfro (VP, Systems Engineering) and Marcel Weiland (Product Manager) will detail core guidelines and strategies for implementing a mission-critical software platform, including.
• Building a clear cross-functional project framework between Services, Operations, IT, and Product.
• Achieving requirement consensus.
• Delivering on key business initiatives while aligning timelines, processes, and resources.
• Distinguishing between project objectives vs business goals.
A projected 10 billion more devices will be connecting to the Internet in the next four years. The business potential behind that number is huge, but so are the challenges the IoT ecosystem faces — from lack of a shared architecture for interconnection to the continued problem of how to authenticate devices on the network.
But as customers connect more devices and expect less friction and more continuity across them, blockchain technology seems to hold the potential to unlock new business model use cases — and ROI from them. Join the latest VB Live event to learn more about intersections between IoT and distributed ledger technologies and explore how they can unlock the security required to realize a profitable Future of Things.
In this webinar you'll learn:
*What distributed ledger technologies such as blockchain mean for businesses in 2018?
*How blockchain for IoT can build trust between people and parties who transact together, reduce costs, and accelerate transactions
*The future of universal architecture and what it means for autonomous products and services
* Jonathan Johnson, Overstock.com Board Member. Medici Ventures President
* Bob Kain, CEO, Luna DNA
* Jessica Groopman, Founding Partner, Kaleido Insights
* Rachael Brownell, Moderator, VentureBeat