Sensor technologies are already signaling transformation across different applications and are expected to bring changes more significantly in the future. Innovative sensor technology is expected to disrupt existing business models and applications. Industries are continuously intermingling with one another to develop innovative products and services to satisfy the discerning needs of consumers. Regulations play a vital role in the adoption of technology, especially drone and energy-harvesting technologies. Therefore, it’s imperative that companies review their portfolio and build their innovation pipeline of sensor technologies and customized products to be ready for the future in line with regulations, and consumer and business demands.
In this webinar, we will cover how to develop a centralized issue management solution leveraging RSA Archer to integrate, manage and visualize overall risk postures of applications, systems and devices.
Given the threat landscape reality, it is hard to find organizations that have not been doing anything about it, but are you doing the "right" things?
Management of security issues in a large enterprise usually translates to dealing with several different tools like baseline control testers, vulnerability scanners, and SAST/DAST (Static/Dynamic Application Security Testing) tools. These tools are typically operated by various independent teams that churn out a deluge of reports on a periodic basis. These could be overwhelming to the system administrators.
Multitudes of systems and multitudes of fixes have to compete with lack of time, lack of resources, compatibility issues and lack of visibility. It is very difficult for the application owners and security teams to get an overall sense of risk exposure, and what to prioritize from a risk mitigation perspective.
We will be sharing some of the best practices in the industry gained by working with some of the best security-first organizations in the world.
Are you aware of the changes Microsoft introduced for providing updates to Windows 10 and Office 365? These changes for feature and cumulative updates and roll-ups have caused confusion and additional complexity for many enterprises.
Join our webinar to learn:
- What these changes are
- How these changes can impact managing your environment, especially for patch management
- How IT Management Suite will simplify keeping Windows 10 and Office 365 up to date
Malicious bots, or what OWASP calls Automated Threats, are more sophisticated than ever and fast becoming the biggest threat to web application security. Join Tin Zaw, Director of Security Solutions at Verizon Digital Media Services and Edward Roberts, Director of Product Marketing at Distil Networks, for a lively conversation about the new automated threat and how enterprises can protect themselves with a proactive and layered approach to web application security and performance.
About the Presenters:
Tin Zaw, Director of Security Solutions, Verizon Digital Media Services
Elias Terman, VP of Marketing, Distil Networks
Edward Roberts, Director of Product Marketing, Distil Networks
With tech acquirers having spent a record $1 trillion over the past two year, what’s the outlook for M&A activity in 2017? Where will buyers be looking and what do they expect to have to spend? Drawing on data and insight from across 451 Research, our annual Tech M&A Outlook webinar will highlight specific trends in key enterprise IT markets – including information security, software, mobility and IoT -- that will shape dealflow and valuations in the coming year.
Join Brenon Daly, 451 Research’s Director of Financials, for a look at where the tech M&A market is headed after its recent record run.
Our Mandiant Industrial Control Systems (ICS) practice will discuss findings which have been captured over recent ICS security engagements which highlight critical security areas for customers. The discussion will focus on the Mandiant methodology that is used in ICS related engagements and examples of findings which are relevant to ICS customers; with specific focus on the relevant security challenges facing these ICS customers. At the end of this discussion, the Mandiant practice will open up for Q&A on the topic.
This live demo will cover the major use cases of SD-WAN that are applicable to both large and small enterprise scenarios.
- Distributed media streaming with multicast
- Enabling cloud-security capabilities with Zscaler
- Segmentation and per-segment topologies
- Service insertion and service chaining
- Virtualized elements for Cloud (IaaS+PaaS)
- Zero touch provisioning
It's time to re-evaluate your contract management strategy. Today's digital business world demands the latest contract management software, automation, and integration in the cloud. Contracts are the foundation of commerce touching every department and function across the enterprise. Contract lifecycle management (CLM) systems help firms create, execute and manage the contracts that define their relationships with their customers and suppliers.
There are a number of options that companies can choose to get the most out of their current and future CLM implementations.
In this webinar: Icertis CEO Samir Bodas and Andrew Bartels, VP and Principal Analyst at Forrester will discuss the pros and cons of the various approaches to meet your contract-related business goals.
Since 2015, Limelight has surveyed thousands of consumers about their online video viewing habits and expectations, but findings from our latest report reveal some interesting changes. Bottom line – the consumer has taken control of the online video experience. They not only want, but also expect, to be able to choose what they watch and when they watch it.
What does this mean for broadcasters and content distributors trying to satisfy consumer demand while also maximizing revenue?
Join us for this free webinar on Tuesday, January 31st as our video delivery experts share recent findings from the latest State of Online Video report. We will discuss strategies organizations can implement in 2017 to deliver compelling online video experiences to their audiences that will keep them coming back for more.
Some of the topics that will be covered, include:
· Which aspects of the online video experience matters most to consumers;
· Demographic differences in online video viewing behaviors and expectations;
· Shifting consumer attitudes about online video advertising and paying for content; and
· Tips for optimizing the online video viewing experience.
All webinar attendees will receive the complete December 2016 State of Online Video report.
Organizations worldwide are looking to compete on data and analytics, and this increasingly means moving beyond the data warehouse. In this webinar, Krishna Sarma, Director of Data Development at TD Ameritrade, will talk about their experience, best practices, and lessons learned while augmenting their data warehouse with a new data lake for innovation. He will also describe their data management approaches for this new hybrid architecture.
Along with data experts at Informatica, the webinar will also cover:
• The relative strengths and weaknesses of data warehouses and data lakes
• When to use what for the task at hand
• Best data management practices for an increasingly hybrid data architecture
• How to deliver data faster and better in the face of increasing data complexity and technology changes
Learn the top 8 reasons why GRC programs fail - no matter the size of the program. We will share what you can do to: identify red flags to side-step failure, turn failures into successes, create the path to GRC success The session will incorporate the use of GRC tools as well as company / organizational tips.
The fight for market share is online. Does your organization have the strategy and technology in place to win customer experiences?
Register today to hear analyst Simon Crawley from Vanson Bourne provide best practices, based on results from a new commerce experience survey, for optimizing analytics to create an engaging customer journey.
- Understand where businesses struggle most in creating personalized commerce experiences
- How to avoid departmental silos and bad lines of communication
- Why, and how, a contextualized experience must go beyond the point of purchase
Inspire your organization to deliver the personalized, contextualized commerce experience your customers expect. Register for this free webinar today!
Join Donnie Berkholz, Research Director for 451 Research, and Sinclair Schuller, CEO of Apprenda, for a presentation on the trends in software development lifecycle at a time when containers are leading to Cambrian explosion of application development. Berkholz will present research from 451 on how organizations are currently using containers and container management. Schuller joins the discussion to add insights from working with many Fortune 500 through their transformation to using containers for rapid delivery and efficient management of applications.
To Be Discussed:
• Are organizations running docker containers in production?
• How has software development lifecycle changed with advent of
microservices and containers?
• Where are your peers concentrating their microservices efforts?
• How container platforms change development lifecycle?
ISSA has assembled a panel of experts to discuss insight and make predictions for the 2017 InfoSec challenges. 2016 was a monumental year in cyber security, with major news stories surfacing nearly every month. From email hacking impacting the United States political world to the October DNS attacks and the ongoing rise of Ransomware and IoT concerns, “Cyber” is huge right now. How will this growing spotlight on security translate in terms of media and regulatory attention? And what kinds of threats will dominate the 2017 landscape?
Marketers deal with data every day in every channel. Need to segment leads by job title for an email campaign? We’ve got data for that. Want to prove which programs generate higher quality leads than others? Go ask the data.
In this webinar, we’ll show you exactly how a data company uses analytics in its marketing efforts. Susan Graeme, Marketing Director at Tableau, will show you examples of real marketing dashboards that we at Tableau use internally to drive world class marketing programs.
Vulnerability Management is one of the first chapters in security, yet something that most of us still struggle with.
Our favorite is this one liner from the Verizon 2016 Data Breach Investigations Report. "Vulnerability management has been a Sisyphean endeavor for decades" (as per Greek mythology - Sisyphean was a king who was cursed to roll a large boulder up a hill, only to watch it come back to hit him, repeating this action for eternity.)
Unlike in the Greek times, today there is lot of data that can help. In-fact there is an overwhelming quantity of vulnerability and threat information available. The challenge is what to do with it in order to help mitigate risk better.
How do you pick the ones that are relevant to your specific case, How you action upon it and How you manage your remediation cycle before the next one hits you.
It is a game where the odds are always stacked up against you and you are always running to catch-up, to be repeated again in the next cycle.
How to change this ?
In this webinar we talk about Vulnerability Intelligence, and why and how it can help make Analytics really work in managing your vulnerability management cycles better.
Advancements in infrastructure and platform technologies with growing availability of innovative business models has inclined the focus on user-centric service delivery mechanisms by redefining the very nature of IT strategy within a business organization. Companies that wish to pave the way for a successful digital transformation journey must shed conventional thinking and embrace towards an agile approach to IT operations and have a reliable and intelligent Ecosystem. So, to start with, we ask ourselves How and What should we look for in a partner?
The endpoint market is one that everyone seems to be talking about these days. With all that hype and buzz comes a confusing vendor landscape filled with nearly identical marketing speak from each and every vendor. How can the security professional make sense of all this noise? While certainly not an exhaustive list, here are seven questions to get you started.
Growing exposure to IT risks has made organizations across industries volatile. Recent IT vendor incidents like data and security beaches, violation of privacy guidelines, which caused substantial fines, penalties, brand value, highlight that IT vendor risks are business risks and require focus from the leadership. An immature ITVRM programs limits the insights which are necessary for strengthening vendor relationships and building a robust ERM program. Rather than treating each risk in isolation, organizations need to have an integrated approach to manage risks holistically and in line with their business operations and objectives. With the growing dependency on IT and IT vendors, organizations need to align enterprise and IT VRM objectives to build a resilient framework suitable for today’s environment.
During the session, panelists will discuss how organizations can strengthen vendor management in the current landscape and improve business performance.
- Causes of Vendor Risks incidents and the impact on the enterprise
- Best approach to align IT vendor risk to enterprise risk
- Building mature VRM Program
- Role of technology in integrating Vendor risk to Enterprise risk management
There’s a new threat in town – Jackpotting. It utilises malware directly infected onto ATMs, requiring no card skimmers that can be easily detected, no time needed to steal credentials, and grants access to every single dollar held in the machine.
ATM machines may not follow the strict patch management regimes that corporate machines do, leaving their operating system potentially much more vulnerable to malware attacks. Beyond the monetary loss, being Jackpotted can also negatively impact the brand, and expose the bank to regulatory action from lack of due diligence in risk management.
Hear how Symantec Cyber Security Services can help deliver a solution for these types of attacks. Through the combination of Data Center Security (DCS) and Managed Security Services (MSS) monitoring, you will receive prompt validated detection of both pre and post compromise attempts in near real-time, allowing faster responses and remediation.
What are the absolute essential requirements in an SD-WAN solution? Although Gartner has defined the four key requirements for SD-WAN (see below), there are some more critical features required to meet the enterprise-grade capabilities. For example, network segmentation for different kinds of applications is a widely deployed feature across all major industries, primarily to isolate critical applications and to reduce the attack surface during vulnerabilities.
This webinar will more broadly cover the essential enterprise SD-WAN features and how they translate to common deployment scenarios in different industries. These features include:
- Overlay capability over MPLS, Broadband and LTE
- Unified and centralized management of all WAN infrastructure
- Network segmentation with per-segment topologies
- Predictable Application SLA with centralized policies and real-time traffic steering
- Mature routing capabilities with BGP, OSPF, VRRP, and IGMP
- Unified and centralized management of all WAN infrastructure
- Robust-zero trust WAN security including authentication, encryptions, segmentation and service chaining
As a background, here are Gartner’s four key requirements for SD-WAN:
- SD-WAN solutions provide a lightweight replacement for traditional WAN routers, and are agnostic to WAN transport technologies (that is, they support MPLS, Internet, Long Term Evolution [LTE], etc.).
- Based on business and/or application policies, SD-WAN solutions allow for load sharing of traffic across multiple WAN connections in an efficient and dynamic fashion.
- SD-WAN solutions dramatically simplify the complexity associated with management, configuration and orchestration of WANs.
- SD-WAN solutions must provide secure VPNs, and have the ability to integrate additional network services and offload Internet-destined traffic closer to the edge of the network.
Operation teams need to detect and correlate application problems with the real-time events happening on, both, the overlay and underlay networks. They also need capability for retrospective visualization into such problems. SD-WAN introduces new requirements for such advanced monitoring capabilities.
LiveAction’s LiveNX™ is a robust visualization and analytics engine that integrates the network-generated metadata from Viptela SD-WAN technology to monitor application traffic on an end-to-end basis in real time. The retrospective visualization capability complements the intelligence provided by Viptela’s management solution and thus simplifies SD-WAN planning, monitoring and troubleshooting.
This webinar will cover the major integration capabilities between LiveAction’s LiveNX and Viptela’s SD-WAN and share existing best practices to effectively manage the entire lifecycle of an SD-WAN deployment. These include:
• Planning: Selecting pilot sites when planning SD-WAN deployments, identifying unsanctioned applications and end users, and establishing network utilization baselines which are used for right-sizing
• Deployment: Using LiveNX real-time visualization to verify Viptela SD-WAN policies and assure services are not impacted in the event of brownouts or abnormal events
• Management: Monitoring bandwidth and visualizing path control so network administrators can ensure application performance and mitigate problems before they affect users. Reporting on business applications to manage and optimize voice and video communications
Ten seasoned network engineers will debate on their views and experiences with SD-WAN. This roundtable discussion moderated by Tech Field Day focuses on how network professionals are analyzing and adopting SD-WAN technology, and integrating it into existing network architectures.
SD-WAN has been the most rapidly deployed SDN technology. But major concerns remain on which features are the most fundamental and differentiating, and the maturity of the technology for large scale deployments. The major discussion topics will include:
- Maturity of SD-WAN for prime-time deployment
- Relative importance of features like routing, security, segmentation, vCPE, multi-tenancy, Application steering, SaaS, and Cloud.
- ROI and the Before/After picture
- Most typical use-cases across industries
- Best practices in deploying SD-WAN based on personal experiences
SD-WAN presents a transformational opportunity for Telcos and MSPs to offer value added services. Anuta NCX orchestrator bridges the multi-vendor legacy and SD-WAN infrastructure for a smoother transition. Join us live to learn about Anuta's SD-WAN and vCPE customer deployments at global Tier-1 MSPs.
Gartner estimates that by the end of 2019, 30% of enterprises will use SD-WAN technology in all their branches, up from less than 1% today. And as of Nov 2016, Gartner has estimated about 50,000 production SD-WAN deployments. SD-WAN is a transformational approach to simplifying branch office networking.
However, security is a critical factor for SD-WAN adoption, especially for cloud and Internet applications. With Zscaler and Viptela you can now secure all Internet traffic without having to backhaul it to centralized DMZs. Customers have seen more than 50% WAN cost-savings while keeping their branch offices and employees protected.
Join Viptela and Zscaler to discuss the best practices for securing your distributed enterprise with cloud security and SD-WAN. They will also cover:
- Common use case scenarios for SD-WAN and cloud security
- Real world deployment examples
- Best practices for improving your security posture with cloud security
- Zscaler and Viptela technical integration elements
Contracts are the backbone of an enterprise. Blockchain technology will have important implications when it comes to contract management. Blockchain is becoming a new area of interest, from governments creating secure databases of land titles to consortiums of leading financial institutions working together to design new distributed ledger technologies.
It is a brave new world and a lot of conversations are going on. Where will it go? What will the impact be? What will blockchain bring to contract management?
In this webcast, we’ll answer these questions and more with two of the industry’s leading experts: Gartner Research Director, Nigel Montgomery, and Monish Darda, CTO and co-founder of Icertis.
In the webcast, Nigel and Monish discuss:
- The opportunity seen by enterprises, working together, to design new distributed ledger technologies
- What will be the impact of blockhain related technologies?
- What will blockchain bring to contract management?
Is your organization prepared to take advantage of the most impactful and transformational trends set to take place in 2017? Frost & Sullivan's Visionary Innovation Group has drawn on the expertise of its global team of futurists, consultants, and analysts to forecast which trends will most affect business, society, and government this year. Each of our top 17 trends are analyzed and supported with key predictions and the expected impact of those predictions.
Digital and self-service payment channels have changed the way banks and customers interact. Less direct interaction means more reliance on “Big Data” for insights that will help you identify ways to better serve your customers, run more effective card programs and capture more wallet share.
Printec and INETCO invite you to attend a 30-45 minute live webinar, where we will showcase new technologies that will help your financial organization derive better value from customer transaction data. Learn how you can establish real-time insights into:
- Card usage patterns
- Profitability and cash flow
- Application, network or third party service performance
Can’t make the date? That’s ok. Contact Printec or INETCO if you are still interested in arranging a private discussion on how detailed transactional data can help you to predict next best product, identify customer performance problems, customize the consumer experience, competitively price card services and loans, execute targeted marketing strategies, and much more.
Today’s IT departments can’t simply provide IT solutions to other departments. Passively processing other departments’ requests is no longer sufficient to meet modern business needs, power company growth, and excel in a constantly changing marketplace. Instead, IT must strive to be the leading force and early adopters for information technology themselves.
Join this live webinar to see how Tableau’s IT department uses analytics on a daily basis to analyse their own performance and improve their own efficiency.
In today’s digital landscape, it’s much easier for criminals to access sensitive payment card data, not only gaining direct access to a consumer’s available funds, but also their personal identity. With cyber attacks becoming much more advanced, the PCI DSS standard has been forced to adapt to address these new threats.
However, PCI compliance is something that any organization can successfully achieve. The requirements of PCI DSS are clear, but it takes work to accomplish compliance across an organization. On this webinar our panel will discuss some best practices, and solutions that provides your business with an easy, cost effective and highly automated way to achieve compliance with PCI DSS in 2017.
Donald Trump's ascendancy to president of the United States promises to bring big change. Controversial campaign rhetoric targeting topics as diverse as trade, the environment and healthcare, coupled with Trump's long list of unconventional government appointees, have created an environment of uncertainty. Citizens, businesses, and governments around the world are trying to separate the hyperbolic from the probable and wondering what policies Trump will actually pursue. “Trump's Impact on the Future of the United States” helps provide clarity without sacrificing complexity.
The EMEA experiences of 2016 are a sobering reminder of the reach and capability of a determined and motivated cyber adversary. We will continue to see a rise in attacks from sophisticated financially motivated threat actors in 2017.
Join Jens Monrad, Senior Intelligence Analyst, in a live webinar as he goes through some of the trends and takeways from 2016 and talk about what we can expect moving into 2017, with highlights on the risks we are seeing in the Northern Europe region.
The biggest challenge facing global enterprises today is the ability to deliver fast and reliable performance of mission-critical applications to worldwide users, especially when they work in cloud and SaaS environments. The move to cloud has exposed some of the limitations to MPLS networking services. Is it time to replace (or augment) MPLS with SD-WAN?
Join Jim Davis, Senior Analyst of 451 Research, and Dave Nuti, Vice President of Business Development at Aryaka, as they present their latest findings on the best practices for delivering fast and reliable application performance using a global SD-WAN. Attend this special webinar to learn:
•The current challenges with data and application delivery faced by global enterprises, including striking a balance between performance, cost, and deployment flexibility.
•Why legacy networks, such as MPLS and the public Internet, do not work for application delivery in today’s global environment
•The best practices to improve global application performance using an SD-WAN as a service
Flawless customer support directly translates to bottom line success. And that means reading customers' minds by offering real-time, reliable responses wherever they are—a feat that's not easily accomplished with call centers or even Live Chat.
To help companies get it right every time, AI has stepped into the breach, cape blowing in the breeze. AI is impacting just about all areas of company activity, and now enables cost-effective, efficient, and superpowered solutions that turn customer agents into heroes, helping them assist more customers, more quickly, in the channel they're most accustomed to using—messaging platforms. Or maybe not using agents at all, but bots.
Join our interactive VB Live event where Stewart Rogers will take a deep dive into his latest VB Insight report to give you the who, what, why—and especially how—of AI-powered customer service.
In this webinar you'll:
* Use AI to accelerate your customer support
* Learn why chatbots are the answer to increased customer service
* Get started on the first steps toward implementing an AI solution on the help desk
* Integrated an innovative social customer service operation in a bot-driven world
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Quinn Banks, Sr. Product Marketing Manager, Mobile, Farmers Insurance
* Wendy Schuchart, Moderator, VentureBeat
Global interest in Myanmar as an investment destination has increased in the past five years following liberalization efforts and other reforms. The country has since witnessed commendable expansion in foreign investment, trade, and gross domestic product (GDP). Enabling factors such as the recent opening of the first special economic zone (SEZ), a rising middle class, and supportive new government policies for businesses will only help accelerate Myanmar's catch-up process. In light of these developments, Frost & Sullivan's upcoming webinar will enable you to:
• Gain a deeper knowledge of Myanmar's economic and business conditions.
• Leverage insights and trends associated with key growth industries.
• Hear from companies that have successfully expanded their business in Myanmar.
•Engage in a live Q&A session with representatives from the private sector in Myanmar as well as Frost & Sullivan experts.
Today’s marketing has a dirty secret: it’s gotten lazy. During the past decade the number of marketing technology tools has exploded to well over 3,000. Overwhelmingly those tools have focused on collecting, organizing and finding insights from data. In response, marketers have defined growth as a mathematical exercise of collecting bigger and bigger datasets. Get all the data you can, goes the conventional wisdom, and software will find the magic bullet buried within the numbers.
But what if we’re buying these marketing tools, because we think they will help us achieve growth where there isn’t a viable product market fit? What if it’s easier to continue to collect data than to take a risk without absolute certainty? What if we don’t need customer data beyond what’s explicitly been given to us by the customers already?
Join our latest VB Live event for insight into how to adapt to the emergence of conscious choosers and build trust with your customers.
In this webinar, you’ll:
* Discuss how big data and marketing data collection tools have made marketers lazy
* Learn about conscious choosers and how trust can help grow your business performance
* Hear about lean data practices and practical tips
* Jascha Kaykas-Wolff, CMO, Mozilla
* Wendy Schuchart, Moderator, VentureBeat
More speakers to be announced soon
If you’re betting your future on digital transformation initiatives to increase the loyalty of a changing customer base, don’t overlook the state of your customer data. It’s not only customer expectations and demographics that are changing, but how you reach customers is in a perpetual state of flux. Twenty percent of addresses, thirty percent of email addresses and eighteen percent of phone numbers change every year. People change jobs, get married, have families – and have different needs as a business person, with their families, or with their friends. Relying on customer data that is inaccurate and unreliable leads to offers that fall flat, higher program costs, and lower team productivity.
Join us to learn:
- Customer data best practices to support your digital transformation investments
- How you can keep customer contact data in Salesforce relevant and accurate to boost team productivity and increase trust in your data
- The ways you can easily verify, validate and enrich your customer data for better customer understanding and actionable insights
Data security and the challenge of data protection is increasing in scope and difficulty. The massive volume of data that businesses are collecting is growing exponentially, and managing compliance delivery is a daunting task with huge negative consequences for getting it wrong. While organizations have long needed to safeguard intellectual property and confidential information, changes in information technology and business models introduce new threats, and new regulations. Governments and industry bodies are imposing new regulations to motivate organizations to protect the privacy and confidentiality of information. Responsibilities can vary widely by region and by industry, and staying on top of an ever-shifting regulatory landscape is complex and challenging, but it isn't impossible.
Successful organizations coordinate enterprise-wide regulatory compliance activities with tools to identify and address new and changing regulations, and are able to map the impact of these regulations across the entire infrastructure, and prioritize compliance activities according to business impact. By deploying a consistent, sustainable, scalable and measurable process for managing regulatory change, they are able to eliminate manual, non-scalable and non-strategic activities to reduce the cost and improve the speed of regulatory compliance programs.
On this webinar our panel of experts will discuss the key points to streamline your data-security program and meet regulatory change.
With $1.4 million in seed funding, 6 employees, 20 brand partners, and 1,200 subscribers, Birchbox disrupted the beauty industry and turned the subscription box concept on its head.
In just six years, it has attracted an additional $70 million in funding, and expanded to 300 employees, 800 partners, and a million-plus subscribers, leaving competitors like Ipsy and Glossybox offering similar beauty subscription boxes in the dust.
So how did Birchbox and other box subscription companies become more than just another fad? And how do you apply those lessons to your own subscription models, from SaaS to other online subscriptions? Join our latest interactive VB Live event for an in-depth conversation with top execs from the best subscription services in the biz.
In this webinar you'll:
* Learn how the best subscription box companies tweaked their model to make it big
* Get best practices to every subscription-based business
* Avoid pitfalls and challenges in subscription management
* Strategize the billing and payment innovations that will impact you in the next five years
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Wendy Schuchart, Moderator, VentureBeat