Hi [[ session.user.profile.firstName ]]

CxO Strategy

  • How to Avoid Unexpected Leaks in Your Market Research Budget
    How to Avoid Unexpected Leaks in Your Market Research Budget
    Justin Ethington, Thought Leadership Market Research @ Qualtrics Live 21 mins
    Learn to anticipate and minimize the unexpected costs of market research. We’ll address some costs you can expect, some costs you probably don’t expect, and we’ll identify cost-saving actions you can take to make your market research budget plan.

    What you will learn from this webinar:
    * How to anticipate and minimize the unexpected costs of market research
    * How to address some costs you can expect and some costs you probably don’t expect
    * How to identify cost-saving actions you can take to make your market research budget plan
  • Migrating Your Apps to the Cloud: How to do it and What to Avoid
    Migrating Your Apps to the Cloud: How to do it and What to Avoid
    Allison Willams, Pivotal Senior Solutions Architect & Tom Collings, Pivotal Advisory Solutions Architect Live 60 mins
    Migrating your applications to the cloud can be a harrowing journey, one fraught with complexity and uncertainty. What’s required to succeed, above and beyond the right platform, are the right set of people, equipped with modern practices, to build and run cloud native applications with confidence.

    Join Allison and Tom, from Pivotal's Application Transformation (AppTx) team, as they discuss what common problems arise when teams try to get their apps on the platform and the AppTx team approach to solving them.

    Whether you have purchased PCF (Pivotal Cloud Foundry) or are of a mind to move your legacy applications to the cloud this webinar will help you understand:

    ● Why it’s imperative to have a small team dedicated to the application portfolio
    ● When to re-platform, modernize or rewrite an application
    ● Strategies to address the most common issues we see

    We look forward to you joining us.
  • Journeys in transformation - Talent in the digital age
    Journeys in transformation - Talent in the digital age
    Genpact CDO Sanjay Srivastava, Elizabeth Lyle of BCG, David Crawford of Heidrick & Struggles, Brinda Murty of Genpact Recorded: Mar 19 2019 40 mins
    Today’s enterprises are not only thinking about how to progress with the latest technology and tools, but also how to cultivate the right talent. In the third installment of his “Journeys in Transformation” webchat series, Genpact Chief Digital Officer Sanjay Srivastava explores the talent part of the digital equation, including what does leadership looks like, how to establish a solid foundation for talent, and what are the key skills in the digital age. Joining him in the discussion are: • Elizabeth Lyle, Partner and Managing Director of Boston Consulting Group (BCG) • David Crawford, Regional Managing Partner of Heidrick & Struggles • Brinda Murty, Senior Vice President, Digital, of Genpact
  • More Than Loyalty: How the Open Economy is Changing Loyalty Programs
    More Than Loyalty: How the Open Economy is Changing Loyalty Programs
    Eric Grover (Intrepid Ventures), Thomas Tyree (FIS) and Bruce Parker (ModoPayments) Recorded: Mar 19 2019 60 mins
    Loyalty programs are nothing new, but opportunities to leverage them at the in-store and online checkout are. Innovations in payments and banking have ushered in the beginnings of the "open economy" and are bringing exciting new technologies to the market that will change the future of consumer engagement.

    Ty Tyree (FIS) and Bruce Parker (Modo) speak with Eric Grover (Intrepid Ventures) on the work they're doing in the payments and loyalty space, and what opportunities they see in the market.

    Join in to learn: Who are the major players in the "open economy"?, What are disruptors in the loyalty space doing (both banks, merchants, and payments players)?, What are new ways in which you can engage your end consumers to establish true brand loyalty?, What is the "open economy", and how are we going to see that playing out in the next 5 years?, and What is required in order to continue the "open economy"?

    Moderator:
    Eric Grover, Principal at Intrepid Ventures

    Panellists:
    Thomas (Ty) Tyree, VP of Loyalty Product at FIS
    Bruce Parker, Founder & CEO at Modo
  • SkyStem: Seducing the Auditors with Internal Controls
    SkyStem: Seducing the Auditors with Internal Controls
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Mar 19 2019 57 mins
    With the auditors approaching (or maybe they just never left), the accounting team needs to put its best foot (and documentation) forward in order to avoid a long and drawn out affair with the auditors. Join us in this webinar, where we share the best ways to build and maintain your internal controls infrastructure to impress your auditors and make the year-end audit as quick and painless as can be.

    Please note: CPE credit not available for this playback.
  • ServiceNow Madrid: Mobile Studio, Agent Workspace, HR & CSM Updates
    ServiceNow Madrid: Mobile Studio, Agent Workspace, HR & CSM Updates
    Adam Mason, Carleen Carter, Ken Michelson, Meghan Lockwood Recorded: Mar 19 2019 62 mins
    Acorio Executives will chat all about ServiceNow Madrid. Join the webinar to learn about:

    - The Top Platform Enhancements: Mobile Studio, Agent Workspace, Service Portal, Flow Designer, Automated Testing Framework, Custom App Licensing
    - Improvements & Updates in HR, CSM, Problem Management, and Software Asset Management License Workbench
    - Upgrading the right way
  • The Email Security Goal: ONE Single Solution
    The Email Security Goal: ONE Single Solution
    Ken Bagnall, Vice President, Email Security, FireEye, moderated by Christopher Porter, Chief Intelligence Strategist, FireEye Recorded: Mar 19 2019 50 mins
    FireEye research recently indicated that an average of 14 thousand malicious emails per month were being missed by most email security solutions. Email is the number one threat vector and with impersonation and credential phishing or URL-based attacks on the rise your email security solution must keep up with the evolving threat landscape. In this webinar:

    -Get a brief overview on the latest email threat trends
    -Learn about the must haves for email security solutions and the benefits of having one provider
    -Find out about additional email security capabilities that can help you have an adaptable solution
    -Hear about a use case where FireEye helped detect and block impersonation techniques that the incumbent solution missed
  • What do you get when you cross a CEO and a CISO’s strategy
    What do you get when you cross a CEO and a CISO’s strategy
    Mark Chaplin, Principal, ISF Recorded: Mar 19 2019 45 mins
    While the board ‘get cyber’, questions remain around embedding cyber risk management into business strategy execution. For many CISOs, strategy alignment represents the best opportunity to engage with the board and ensure a business-driven approach to managing cyber risk.

    So how should business leaders develop, update and execute business strategy with so many cyber-related implications? How can organisations meet their business goals, against a backdrop of increasing cybersecurity costs, greater regulatory scrutiny and increased frequency and magnitude of data breaches?

    In this webinar, Mark Chaplin, Principal, ISF will discuss the significance of aligning security strategy with business strategy. Mark will draw on executive engagement, exploring the essential factors for success and highlighting the pitfalls to avoid.
  • 2019 Global Emerging Market Leaders
    2019 Global Emerging Market Leaders
    Prerna Mohan, Rituparna Majumder, Frost & Sullivan, Rustam Issatayev, Kazakh Invest, Marcela Granados Galvis, ProColombia Recorded: Mar 19 2019 55 mins
    In the global economic and business environment, emerging markets have increasingly taken center stage in the growth strategies of businesses, with GDP growth rates across emerging markets outpacing that of developed economies. With accelerated middle-class expansion and a large and growing working-age population, investors are increasingly taking advantage of emerging markets. Moreover, prudent governance in emerging markets through the provision of state-of-the-art infrastructure and attractive doing-business measures also work as prime growth enablers.

    The concept of go-to emerging markets, however, is an ever-changing one in light of heightened volatility in the financial markets, looming geopolitical concerns, increasing competition, and changing business needs. To help companies develop a systematic and proactive approach to emerging market expansion, Frost & Sullivan developed the 2019 Emerging Markets List.

    Key Takeaways:
    • With the fall of the BRICS, which emerging markets should you focus on?
    • Identify go-to emerging markets based on a multi-dimensional approach that evaluates countries across six crucial pillars, including economic growth, business environment, and investment attractiveness.
    • Leverage country case studies on emerging market leaders and identify the success stories that propel these countries to the top.
  • Journeys in transformation - Getting ready for AI: Data lakes or a big swamp
    Journeys in transformation - Getting ready for AI: Data lakes or a big swamp
    Genpact CDO Sanjay Srivastava,Barbara Stortz, Data Science Leader,Microsoft,Tushar Shah,VP, Paypal,Amaresh Tripathy, Genpact Recorded: Mar 19 2019 51 mins
    If data is indeed the gold that enterprises mine on their way to an AI-first world, how do we extract, refine and make it available it in the most efficient manner? Too often options are fuzzy, opportunity costs are high, and mistakes very expensive. And visions of beautiful data lakes end up in expensive and never ending swamps. Genpact CDO Sanjay Srivastava talks to Barbara Stortz, Data Science Leader at Microsoft; Bhaskar Ghosh, Partner and CTO at 8VC; Tushar Shah, VP Enterprise Services Platforms at Paypal, and Amaresh Tripathy, Analytics Services leader at Genpact to explore the world of data swamps.
  • M-Trends 2019: Trends Behind Today's Cyber Attacks
    M-Trends 2019: Trends Behind Today's Cyber Attacks
    Chris Nutt, Managing Director, FireEye Mandiant and Nick Bennett, Director, FireEye Mandiant Recorded: Mar 14 2019 58 mins
    Explore the latest developments behind today’s attacker techniques, behaviors, and motivations sourced from this year’s M-Trends 2019 Report, our annual publication based on FireEye Mandiant’s frontline investigations of the most interesting and impactful cyber attacks in 2018.

    Join us for this webinar, as experts, Chris Nutt, Managing Director, FireEye Mandiant and Nick Bennett, Director, FireEye Mandiant discuss highlights and case studies from this year’s edition, including:

    • Evolving attack trends in today’s threat landscape
    • New advanced persistent threat (APT) groups that emerged in 2018
    • Hidden risks found across M&A business activities
    • Best practices lessons learned from the front lines of incident response


    Register for the webinar NOW!
  • Embedding Quality Engineering in DevOps Pipeline
    Embedding Quality Engineering in DevOps Pipeline
    Jayanthi Jayaraman, Test Automation Consultant, Aspire Systems ; Clinton Sprauve, Director of Product Marketing, Sauce Labs Recorded: Mar 12 2019 50 mins
    Aspire and Sauce Labs are jointly conducting this webinar on the topic ‘Embedding Quality Engineering in DevOps Pipeline’. This webinar is aimed at helping organizations understand the importance of Continuous Testing in a DevOps environment and how it can be integrated with cloud environments.

    Key Takeaways:

    •Different Dimensions of Quality Engineering
    •How Continuous Testing can Make or Break your DevOps Pipeline
    •Integrating Continuous Testing with Cloud Environments
    •Recommended Tools and Techniques
    •Sample Use Cases
  • SkyStem: Back to Basics with Reconciliations, SkyStem
    SkyStem: Back to Basics with Reconciliations, SkyStem
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Mar 12 2019 59 mins
    [Live Recording] It's time to show some love for the workhorse of the financial close process -- balance sheet account reconciliations! Join us in this webinar, where we share best practices on how to think about the reconciliation work each month, when best to do reconciliations, how they should be prepared, and some common pitfalls to avoid.

    Please note: CPE credit not available for this playback.
  • Predicting churn and case management
    Predicting churn and case management
    Luke Williams, Head of CX Strategy @ Qualtrics Recorded: Mar 12 2019 44 mins
    How well do you understand customers leaving your organization or what could have been done to successfully encourage them to stay? Organizations need the tools to gather customer data, identify red flags in customer behavior, and take action to prevent customer attrition, or churn.

    Join us as Luke Williams, Head of CX Strategy, shares how to anticipate customer needs, predict customer churn, and determine the actions you can take to improve retention. Learn methods to build effective predictive models and how to implement automated systems to personally engage with your most-valued customers at scale.

    What you'll learn from this webinar:

    * How to predict customer churn using key metrics
    * How to respond to drivers of churn to retain more customers
    * Strategies to help improve the impact of your CX program
  • Leveraging Your Existing SIEM Solution with SOAR Technology
    Leveraging Your Existing SIEM Solution with SOAR Technology
    Mike Fowler, VP of Professional Services at DFLabs; Christian Have, Chief Product Officer at LogPoint Recorded: Mar 12 2019 42 mins
    Improve Your Incident Response with LogPoint and DFLabs

    Empower your security analysts to accelerate detection and response of cyber incidents by combining the power of SIEM and SOAR.

    Based on the recent joint solution from DFLabs and LogPoint resulting from their deep two-way integration, join this webinar to see how two security operations tools can work seamlessly together fusing intelligence to improve the overall effectiveness and operational performance of your existing security program.

    While a SIEM solution delivers tons of valuable information about the security status of your IT system, a SOAR solution uses this information to automate the response needed to incoming cyber threats. Combining the two will free up valuable time and resources in any security program and make for faster, smarter detection, response, and remediation of potential incidents.

    Learn how to:

    · Respond to all security alerts
    · Automate repeatable, mundane tasks
    · Orchestrate actions across multiple security tools
    · Enrich raw data, allowing for more informed, effective decisions
    · Reduce the mean time to detection and response
    · Increase the ROI on existing security operations tools
  • Setting SLOs and SLIs in the Real World
    Setting SLOs and SLIs in the Real World
    Elisa Binette Recorded: Mar 12 2019 40 mins
    Clearly defined and well-measured Service Level Objectives (SLOs) and Service Level Indicators (SLIs) are a key pillar of any reliability program. SLOs allow organizations and teams to make smart, data-driven decisions about risk and the right balance of investment between reliability and product velocity.
  • FireEye Chat - Front and Center with Kevin Mandia and the Evolution of M-Trends
    FireEye Chat - Front and Center with Kevin Mandia and the Evolution of M-Trends
    Vasu Jakkal, EVP & CMO, FireEye; Kevin Mandia, CEO, FireEye Recorded: Mar 11 2019 20 mins
    FireEye Chat
    Front and Center with Today’s Leading Cyber Security Experts

    FireEye Chat is a new quarterly talk show that brings guest experts front and center to cover today’s most important cybersecurity topics.

    Episode #1: Front and Center with Kevin Mandia and the Evolution of M-Trends

    Our inaugural episode celebrates the 10-year anniversary of M-Trends, our annual report on the latest developments that define today’s threat landscape. Join host Vasu Jakkal, FireEye CMO and special guest Kevin Mandia, FireEye CEO as they discuss the report’s origin story and the people behind it. They also cover:
    • Key milestones in the evolution of the report
    • How M-Trends has raised awareness about the importance of cyber security
    • The most significant trends in today’s cyber threat landscape.

    Watch now to get unique insights, direct from the frontlines, in what promises to be a series of lively and thought-provoking exchanges.
  • What is the Future of Identity Authentication and Key Trends
    What is the Future of Identity Authentication and Key Trends
    Thomas French, Industry Consultant, SAS & Vince Tocce, Host, Vince in the Bay Podcast Recorded: Mar 7 2019 23 mins
    Join Thomas French, Industry Consultant, SAS for a live Q&A interview at RSA Conference 2019 to learn more about the key trends in digital identity and authentication, specifically in the Financial Services industry.

    Discussion topics will include:
    - Tends in payments fraud
    - Ways this data is being monetized today
    - Emerging cybersecurity and fraud trends that have resulted from the adoption of faster payments
    - How financial institutions manage their risk postures with increasing security and fraud challenges
    - How the concept of digital identity is changing in financial institutions
  • [Earn 1 CPE] Revitalizing Access Control Programs: Intelligent Automation
    [Earn 1 CPE] Revitalizing Access Control Programs: Intelligent Automation
    Colin Whitaker, Informed Risk Decisions; Phil Shomura, Senior Product Manager, ACL Recorded: Mar 7 2019 64 mins
    Access control, a critical component of IT security compliance programs, ensures that organizations protect confidential information, like intellectual property and customer data. But your access management program can easily become outdated and static—especially if you rely on manual control testing and user access administration tasks.

    By using robotics and process automation, or RPA, you can tackle some of the common challenges associated with access control programs. RPA works 24/7, reduces human error, and saves employees from manual, repetitive tasks. RPA might be the key to advancing your access control program.

    Join this CPE webinar for insights into how you can reduce costs, increase efficiency and improve the effectiveness of your access control program with RPA. We will share:

    - How to get started with an access control program.
    - Ways to evaluate the right tools to automate processes at a task level, and align to your process automation strategy.
    - Practical steps you can take to see value from advanced analytics in risk management, compliance, and continuous monitoring programs.
    - How to embed governance, risk management, and controls into your enterprise’s mobilization and deployment of RPA, so you can catch issues before they arise.
  • Cyber Security Platform Shift
    Cyber Security Platform Shift
    Art Gilliland, Exec. VP & GM, Ent. Products, Symantec | Peter Doggart, VP, Symantec | Jon Oltsik, Snr. Principal Analyst, ESG Recorded: Mar 7 2019 20 mins
    Cyber threats continue to evolve and target enterprise weaknesses, while the cost and complexity of operating cyber security are increasing. And the old way of fighting cyber-attacks using fragmented tools no longer works. How do organisations adapt their cyber security technology strategies?

    There's a seismic shift happening in cyber security. Integrated platforms are the future. Join us for a webinar to hear how Symantec and our partners are working together to drive down the cost and complexity of cyber security, while protecting enterprises against sophisticated threats.

    In this webinar, you will learn about:

    •New customer research demonstrating the need for integrated platforms
    •Unprecedented industry collaboration around the platform shift in cyber security
    •Broad ecosystem support of Symantec’s Integrated Cyber Defense Platform (ICD)
    •How the ICD platform drives customer adoption and value
    •New innovations extending the value of the ICD platform

    Please join us. Register today.
  • Measurement While Drilling—Patenting and Technology Development Trends
    Measurement While Drilling—Patenting and Technology Development Trends
    Isaac Premsingh, Industry Analyst, Manmohan Singh, Senior Consultant, TechVision Recorded: Mar 6 2019 56 mins
    Concerns about continued crude price volatility and decline in consumption due to slowing economic growth across regions indicate more problems for oil companies as they scramble to maintain profits. As with any industry, when margins are affected, service providers take the hit and are forced to cut contract prices. To stay relevant and sustain growth, the oilfield OEMs and service providers have disrupted themselves by adopting broadly minded approaches to eliminate inefficiencies in operations and unlock new opportunities for operating companies.

    Frost & Sullivan invites you to join Isaac Premsingh, Industry Analyst, and Manmohan Singh, Senior Consultant, to gain expert insight on patent filing trends and top assignees in the measurement while drilling (MWD) technology landscape and technology trends, followed by an interactive, live question-and-answer session.

    Key Takeaways:

    • Learn how digital technologies can impact MWD and the initiatives that have laid the foundation for automated directional drilling.
    • What are the drilling efficiency improvements?
    • Hear about key ways to reduce the cost of service delivery.
    • Explore technology from sensors to software platforms that enable the digital transformation in MWD operations.
  • MITRE ATT&CK Evaluation Framework Analysis
    MITRE ATT&CK Evaluation Framework Analysis
    David Grout, EMEA CTO, FireEye Recorded: Mar 6 2019 45 mins
    When EDR gives you Answers and not Alerts

    On February 13, MITRE released the results of its evaluation of FireEye Endpoint Security in a simulation of real-world attacks by APT3 (a Chinese government-backed adversary). Based on this evaluation and an independent scoring methodology, FireEye delivered the highest efficacy scores and the highest number of behavior-based detections and provided the most relevant contextual information about an attack.

    During this session, our EMEA CTO David Grout will present the MITRE Methodology and how to interpret it. We will discuss about metrics and capabilities highlighted during this process and how FireEye has been ranked the number #1 EDR in this test.
  • How to meet the Growing Challenges of Med Device Regulatory Compliance
    How to meet the Growing Challenges of Med Device Regulatory Compliance
    Volker Zeinar - B Braun, Grant Hodgkins - Smith & Nephew, Geraldine Lissalde-Bonnet - GS1, Jenny James - Innovit, Recorded: Mar 6 2019 59 mins
    Seven years ago when the Federal Drug Administration (FDA) announced its Unique Device Identification (UDI) regulations, there were no off-the-shelf solutions for submitting regulatory data to the Global UDI Database (GUDID).

    Now these options exist, so how will this influence your approach to Medical Device Regulations (MDR)? How would you do things differently for MDR and UDI, specifically European Databank on Medical Devices (EUDAMED)? Our panel of experts will weigh‑in on:
    - How this is a key priority for global medical device manufacturers.
    - Whether this is it just the structured master data or more?
    - What about forms and documents like: post-market vigilance and surveillance, clinical investigations and performance studies, actor registration, notified bodies & certificates?…
  • Analyse MITRE ATT&CK Evaluation Framework: Quand l’EDR donne des réponses
    Analyse MITRE ATT&CK Evaluation Framework: Quand l’EDR donne des réponses
    David Grout, EMEA CTO, FireEye Recorded: Mar 6 2019 45 mins
    Le 13 février 2019, MITRE a dévoilé les résultats de son évaluation de la technologie FireEye Endpoint Security effectués en se basant sur les techniques d’attaques utilisées sur le terrain par le groupe APT3 (Groupe Chinois).
    Basé sur les résultats de cette évaluation, à travers la méthodologie de notation indépendante du Forrester, FireEye apparaît comme le leader de la catégorie dans de nombreux domaines : Meilleure Efficacité, Meilleure Détection et Meilleur enrichissement de données.
    Pendant ce webinaire de 45mn David Grout CTO EMEA reviendra sur la méthodologie MITRE et sur les éléments permettant d’interpréter les résultats. Nous reviendrons sur des exemples et sur les détails ayant permis à FireEye d’être leader sur le marché de l’ EDR.
  • The Value of Personalization for B2B Companies
    The Value of Personalization for B2B Companies
    Eric Fullerton, Product Marketing Manager, Acquia & Jonathan Tam, Research Director, SiriusDecisions Recorded: Mar 5 2019 51 mins
    Personalization is top of mind for many organizations – 67 percent of marketers are pursuing personalization today. And although personalization is critical to engaging audiences in an increasingly competitive digital landscape, it’s challenging for organizations to understand where exactly to start.

    In the first portion of this webinar, SiriusDecisions will share its industry and market insight to highlight the value personalization can deliver to your business based on their years of expertise in the B2B space.

    Next, you’ll hear about Acquia’s multi-step approach to enabling data-driven personalization at your organization, with a specific focus on customers who have just started down the path to personalization.
  • UK supermarkets - the longest cold war?
    UK supermarkets - the longest cold war?
    ISM Fellow - Andrew Grant Mar 21 2019 11:00 am UTC 30 mins
    Why you should attend:

    An up to date analysis of the UK supermarket sector - mergers, acquisitions, consolidation, relentless pressure - but why no all-out price war for the past 15 plus years - would Amazon's entry be the final straw?

    What you will learn

    •Unmissable for anyone selling into the UK supermarkets
    •Get yourself fully up to date with the latest changes that could impact your business
    •Delivered by an acknowledged industry expert
  • The digital disruption butterfly effect across European industries in 2019
    The digital disruption butterfly effect across European industries in 2019
    Angela Vacca, Giulia Carosella Mar 21 2019 2:00 pm UTC 30 mins
    The European vertical market digital scenario is more vibrant than ever, – with some industries that are on the edge of technological change, and others that are rapidly catching-up and showing interesting pockets of growth.
    In this IDC Web Conference Angela Vacca and Giulia Carosella from the IDC Customer Insights and Analysis team will discuss how European industries, such as transportation, finance, public sector and others, are ripe for the 2019 digital evolution, answering questions such as:
    •What are the key vertical trends that are driving IT spending in Europe?
    •How to spot technology hypergrowth pockets?
    •What is the digital disruption ‘butterfly effect’, and how will it affect European industries?
    Our webinar will help you improve your vertical go-to-market strategy and tactical planning, – highlighting what is under the spotlight for European industries, learning about real-life examples, and charting out a successful vertical digital roadmap for 2019.
  • [Earn 1 CPE] Implementing a NIST Framework for Adaptive Cybersecurity
    [Earn 1 CPE] Implementing a NIST Framework for Adaptive Cybersecurity
    Colin Whittaker, with Sam Abadir, Lockpath; Allan Liska, Recorded Future; and Gina Mahin, Lynx TP; David McNeely, Centrify Mar 21 2019 5:00 pm UTC 75 mins
    In an age where cybersecurity threats are an everyday fact of life, organizations are looking for solutions that enable them to predict, prepare and react to the shifting landscape of cyber threats, and implementation of adaptive cyber security strategies is becoming inevitable to achieve that goal.

    Adaptive cyber security methods allow for the simultaneous defense of multiple attack surfaces against this new wave of advanced cyber attacks targeting businesses and services. The NIST Cybersecurity Framework enables organizations — regardless of size, degree of cybersecurity risk, or cybersecurity sophistication — to apply the principles and best practices of risk management to improving security. Attend this CPE webinar to gain insights on:

    - Getting a clear picture of the current health of your organizations' defenses
    - Defining your security road map using NIST CSF as a framework
    - Conducting gap analysis and executing remediation actions
    - Mapping the NIST CSF with security controls and built-in reporting templates that align with the framework.
  • Getting Started with AWS IoT Demo
    Getting Started with AWS IoT Demo
    Tolga Tarhan, CTO at Onica Mar 21 2019 6:00 pm UTC 30 mins
    Learn how AWS can accelerate your IoT strategy by allowing for rapid IoT prototyping in less than 6 weeks. By leveraging AWS' connectivity, storage, application, and analytics capabilities, you can build IoT-enabled apps quickly and at a fraction of the cost. We'll cover serverless IoT architecture as well as do a live demo on how to connect & configure devices on AWS IoT Core.

    What we’ll cover:
    * Device connectivity & security
    * Ingesting data with AWS IoT
    * Reacting to IoT data in real-time
    * Storing data in Amazon DynamoDB and Amazon S3
    * Building a simple RESTful API to consume the stored data
    * Analytics: Batch processing, analytics at the edge device with AWS Greengrass
    * IoTanium by Onica for quick hardware/software prototyping
    * Customer success: automation and remote management with AWS IoT
  • Balancing Prevention, Detection & Response: Your Guide to Success
    Balancing Prevention, Detection & Response: Your Guide to Success
    Alan Foster, Senior Solutions Engineer & Justin Buchanan, Senior Solutions Manager Mar 21 2019 7:00 pm UTC 45 mins
    Security teams today understand the need to invest across threat prevention, detection, and incident response. But with strained teams, siloed technologies, and ever-looming compliance audits, where do you start?

    Join us for a special session with Justin and Alan, who will share prioritization guidance from working with hundreds of security teams, as well as key findings from an all-new Rapid7 Threat Report. We’ll cover:

    1. How teams are bringing automation to their vulnerability management program
    2. How to prioritize prevention across your modern network, from remote workers to cloud environments
    3. Top alerts & attacker trends, based on findings from Rapid7’s 24/7 Managed Detection and Response service
    4. Using the MITRE ATT&CK framework to assess your current detection capabilities
  • Otwórz. Kliknij. Daj się zhakować
    Otwórz. Kliknij. Daj się zhakować
    Marcin Kacprzak, Senior Sales Engineer & Damian Hoffman, Senior Sales Engineer Mar 26 2019 10:00 am UTC 45 mins
    Kliknąć, czy nie? Każdego dnia użytkownicy poczty elektronicznej zadają sobie podobne pytanie. Wg najnowszych statystyk 1 na 101 wszystkich wiadomości email zawiera złośliwą treść, która może prowadzić do infekcji zarówno pojedynczego komputera, jak i całej organizacji.

    Podczas naszego webinarium dowiesz się jak wykrywać i blokować podejrzane wiadomości email oraz poznasz szczegóły efektywnej strategii ochrony poczty elektronicznej przed takimi atakami jak:
    ·Spear phishing
    ·Impersonation
    ·W2 Scam
  • Understanding Microservice Latency: Overview of New Relic Distributed Tracing
    Understanding Microservice Latency: Overview of New Relic Distributed Tracing
    Sean Carpenter & Stephen Crowley Mar 26 2019 10:00 am UTC 39 mins
    Software teams, working in an environment where there are many services involved in servicing a request, need to deeply understand the performance of every service, so they can more effectively resolve performance issues, measure overall system health, and prioritise high-value areas for improvement.

    New Relic Distributed Tracing is designed to give software teams an easy way to capture, visualise, and analyse traces through complex architectures, including architectures that use both monoliths and microservices.
  • ISM Webinar: Lack of Pipeline - The number 1 reason you are not hitting Quota
    ISM Webinar: Lack of Pipeline - The number 1 reason you are not hitting Quota
    ISM Fellow, Steve Burton Mar 26 2019 11:00 am UTC 30 mins
    Let’s face it… selling isn't easy. Sometimes it seems easier to lure a ravenous lion with a lettuce leaf than hit your monthly sales target. Even the best, most seasoned salespeople will feel pressurized from time to time and result in them not hitting the target. It’s this pressure that spawns excuses – excuses that detract attention away from a salesperson’s performance (or lack of it).

    I hate hearing excuses; it feels like people are trying to blame others rather than accepting their own failings. But what are the top excuses you’ll hear from a salesperson?
  • IT Org Transformation – Seven Strategies We Can Implement This Week
    IT Org Transformation – Seven Strategies We Can Implement This Week
    Joe Pucciarelli / Marc Strohlein / Cora Carmody Mar 26 2019 3:00 pm UTC 60 mins
    Many enterprises and their IT teams continue to struggle with the accelerating pace of change being brought about by the new digital technologies, business model innovation and increased competitive tempo. This challenge is more than “change management”; this is a broader problem – a need to accelerate organization transformation and evolve cultural norms. During this IDC web conference, our analysts will share both cultural frameworks and specific, tangible tactics for executive IT leaders, noted within our research, that have been found to power IT’s broader organizational transformation.
  • How to Improve Software Engineering with DevOps Orchestration and Feedback Loop?
    How to Improve Software Engineering with DevOps Orchestration and Feedback Loop?
    Sridhar Prabhakar – Sr. Software Engineering Consultant, Althaf Ali - DevOps Solutions Architect Mar 26 2019 5:00 pm UTC 60 mins
    In grand finale of the webinar series ‘4 dimensions of DevOps’, we will conclude by discussing the importance of the fourth and final dimension – Orchestration and Feedback Loop. We would also offer the viewers a sneak peek into our DevOps Template rule engine that has the ideologies embedded. These are the DevOps essentials that we follow in our projects to help us streamline the DevOps Pipeline and deliver high ROI to our customers.

    In a nutshell, this session will offer the following takeaways:

    1. Introduction to the fourth dimension – orchestration and feedback loop.

    2. Why is it important and How does it affects the parameters of a developers requirement?

    3. How Aspire's inference engine applies rules to arrive at a template for a given DevOps project.

    4. Benefits of using this approach to help you make decisions faster and build products that meet your customer needs.
  • Value Stream Management vs Value Stream Mapping: What You Need To Know
    Value Stream Management vs Value Stream Mapping: What You Need To Know
    Dominica DeGrandis, Director of Digital Transformation, Tasktop Mar 26 2019 5:00 pm UTC 60 mins
    The emergence of Value Stream Management (VSM) as a concept applicable to IT signals a change for traditional enterprises in a tech-driven world. Finally, organizations have a digital practice available that is focused on the optimization of business value.

    By combining the people, processes, and technologies that map, optimize, visualize and control how value flows across software delivery pipeline, these organizations now have an opportunity to level the digital playing field.

    At the same time, all this talk of value streams and Value Stream Mapping - also acronymized as VSM - is causing some confusion. While the two “VSMs” are different concepts, they are not mutually exclusive. In this webinar, Dominica DeGrandis answers questions on how they complement one another, what they are and what they can do.
  • How Legacy Retailers Can Beat Young Upstarts at Their Own Game
    How Legacy Retailers Can Beat Young Upstarts at Their Own Game
    Jasmine Glasheen, Contributing Editor at RetailWire and Content Lead at Retail Minded Mar 27 2019 4:00 pm UTC 45 mins
    Maybe it’s their large amount of customer data, or their storefronts as a source of gathering data.

    Retail is the industry that never sleeps and in the past decade, many legacy retailers have fallen by the wayside in favor of stores with fresh retail concepts: Claire’s has been replaced by BaubleBar, Sears has given way to Amazon, Bon-Ton has given way to HauteLook, and so on. The reality of the current market is that some of these young upstarts understand something that many legacy retailers realizetoo late: advanced personalization initiatives are necessary to stay in the game. It isn’t a coincidence that 45 percent of retailers will use artificial intelligence to improve their operation in 2019. However, simply investing in AI isn’t enough… you need to know how to use it.

    This webinar will answer the following questions:

    • What will customers expect from retailers in 2019?

    • How are new retailers redefining the game?

    • Which legacy retailers have successfully evolved to meet customer demand?

    • What advantages do legacy retailers have, and how can they leverage those advantages to compete?

    • What are retailers’ top challenges to scaling personalization initiatives?

    • How will master data management (MDM) empower retailers in the years to come?
  • 2019 Internet Security Threat Report (ISTR): The New Threat Landscape
    2019 Internet Security Threat Report (ISTR): The New Threat Landscape
    Nick Savvides, Chief Technology Officer, APAC, Symantec Mar 28 2019 5:00 am UTC 60 mins
    As ransomware shows early signs of decline, new forms of attack emerge to take its place. Stealthy techniques allow attackers to fly under the radar, placing enterprises at increasing risk.

    Join us as we discuss these trends and more:

    • Formjacking was the breakthrough threat of 2018, as cryptojacking and ransomware show signs of decline. However enterprises continue to face the problem of targeted ransomware.

    • Living off the land and supply chain attacks are now a staple of the new threat landscape.

    • Cloud users facing challenges on multiple fronts through data leaks from cloud storage and low-level chip vulnerabilities.

    • Targeted attack groups show increasing interest in operational targets; greater number of groups adopting destructive malware.

    Please join us. Register today.
  • Lessons from a decade on the frontlines of cyber security | EMEA Spotlight
    Lessons from a decade on the frontlines of cyber security | EMEA Spotlight
    Stuart McKenzie, EMEA VP, FireEye Mandiant & Alister Shepherd, META Director Consulting Mar 28 2019 11:00 am UTC 45 mins
    Explore the latest developments behind today’s attacker techniques, behaviors, and motivations sourced from this year’s M-Trends 2019 Report, our annual publication based on FireEye Mandiant’s frontline investigations of the most interesting and impactful cyber attacks in 2018.

    This year will mark the 10th anniversary of M-Trends, giving us the perfect opportunity to a decade’s worth of cyber security developments.

    Join us for this webinar, as FireEye Mandiant experts discuss highlights and case studies from this year’s edition, including:

    • Evolving attack trends in today’s threat landscape
    • New advanced persistent threat (APT) groups that emerged in 2018
    • Regional case studies of real-world compromises
    • Best practices lessons learned from the front lines of incident response
  • SAM 2.0 - The Modern Approach to Software Asset Management
    SAM 2.0 - The Modern Approach to Software Asset Management
    Rich Reyes, EVP of Software Advisory at Connor Consulting and Alex Geuken, CEO, North Europe of Xensam Mar 28 2019 4:00 pm UTC 60 mins
    The evolution of Software Asset Management (SAM) is upon us as the latest trends such as cloud, IoT and digitization are making it more difficult than ever to track, manage and drive a positive ROI for IT investments. With a changing technology landscape, companies require a more modern and agile approach to SAM that incorporates the power of enterprise data, strategic program governance, and repeatable processes. Join Rich Reyes, EVP of Software Advisory at Connor Consulting and Alex Geuken, CEO, North Europe of Xensam as they discuss factors impacting IT and SAM, leading practices to modernize your license management program, and recommendations on how smart technology with thought leadership can get you there.
  • Ones to Watch in 3D Printing
    Ones to Watch in 3D Printing
    Keith Kmetz and Tim Greene of IDC's Hardcopy Solutions Team Mar 28 2019 4:00 pm UTC 60 mins
    IDC’s 3D printer analysts will discuss the latest research that examines the companies, applications, and market developments that are the most interesting “ones to watch” in the 3D printing industry. This Web conference will offer a comprehensive analysis across the industry, including the impact on printer hardware, materials, service providers, and much more. The insights provided are expected to have significant ramifications for today’s 3D printer market as well as for future market opportunities.
  • Optimize Cost of Quality for Retail Solutions using Incremental Test Automation
    Optimize Cost of Quality for Retail Solutions using Incremental Test Automation
    Bhanuprakash Pitchu, Test Automation Consultant - Retail Mar 28 2019 5:00 pm UTC 60 mins
    This webinar is aimed at helping organizations understand on how to reduce the cost of quality through selective and incremental test automation and improve the ROI by driving the automation development based on not only the test coverage, but the business needs as well.

    Join Bhanuprakash Pichu, an experienced Test Automation consultant who has handled large scale Software Test Automation projects from Inception to Deployment, for this session on how retailers can gain the best out of Test Automation using a Digital Commerce quality automation framework.

    In this webinar, retailers will learn,

    •Impact of quality on cost
    •How to handle the ever-increasing test coverage with advent of multiple devices as online shopping platforms
    •Cloud device platform as a solution to address this growing coverage
    •Walk-through of Digital Commerce quality automation framework
    •Recommended tools and methodologies
    •A sample use case showing the reduction in cost
  • All-in on AppSec: The concepts, technologies, and approaches you need to know.
    All-in on AppSec: The concepts, technologies, and approaches you need to know.
    Jay Paz, Director, Penetration Testing & Ben Glass, Manager, Product Consulting Mar 28 2019 6:00 pm UTC 43 mins
    Web applications have vulnerabilities—period, full stop. Most “AppSec” efforts focus on creating more secure applications, or attempt to deploy network appliances to protect those in production. The rapid growth of DevOps, microservices, and cloud deployments have made it more essential to secure apps before they get to production, and security software vendors seem to be introducing new, shiny solutions every month. But where do you start? What approach should you take?

    Join Rapid7’s application security experts as they take you through:

    1. Navigating the application security technology landscape
    2. Prioritizing your application security efforts
    3. Ensuring security doesn’t hinder productivity
  • Dive Head First into the Endpoint (Without Hitting Your Head)
    Dive Head First into the Endpoint (Without Hitting Your Head)
    John Moran, Senior Product Manager, DFLabs and Chris Berninger, Technical Alliances Engineer, Carbon Black Apr 2 2019 4:00 pm UTC 60 mins
    Dive Head First into the Endpoint (Without Hitting Your Head): A DFLabs and Carbon Black Use Case

    The time it takes attackers to progress from initial infection to establishing multiple beachheads and beginning data exfiltration is often measured in minutes. Responding effectively under these adverse conditions requires complete network visibility, actionable intelligence and intelligent automation to augment human analysts.

    Carbon Black has long been recognized as the industry leader in endpoint detection and response, providing unmatched visibility into all endpoint activity. By incorporating actionable intelligence into their suite of tools, Carbon Black allows enterprises to respond effectively to both known and unknown threats. Carbon Black Defense brings Carbon Black’s extensive Endpoint Detection and Response (EDR) experience together with their cutting-edge next-generation antivirus technology to provide protection against even the most advanced threats.

    However, when a network event, such as a Web Application Firewall (WAF) or Intrusion Detection System (IDS) alert is the impetus for an alert, correlating endpoint data and identifying and containing the threat is largely a manual process. This allows attackers enough time to begin wreaking havoc on the network.

    In this webinar we will explore DFLabs’ Security Orchestration, Automation and Response (SOAR) solution, IncMan SOAR, and Carbon Black Defense, to show how these industry-leading solutions can work seamlessly together to automatically pivot from the network into the endpoint, automatically identifying and containing unknown threats to immediately reduce the risk to the enterprise.

    Learn how:
    - Carbon Black’s suite of products can improve your security infrastructure
    - IncMan SOAR’s automation and orchestration capabilities can increase the efficiency and effectiveness of your security program
    - Carbon Black and DFLabs together can reduce incident detection and response times
  • Vulnerability Management - Why Programs Fail and What You Can Do About It
    Vulnerability Management - Why Programs Fail and What You Can Do About It
    Brian Carey, Manager, Security Consulting, Rapid7 Apr 2 2019 6:00 pm UTC 60 mins
    Vulnerability Management should be at the core of every Information Security program (it’s CIS Control #3) and yet it is often one of the most misunderstood elements. Requiring strong leadership and many foundational elements to be successful, programs often topple because the legs of the table we have built are not sturdy to hold the weight of our scanning tools, and the data these tools produce.

    Join Rapid7’s Brian Carey for a discussion on some of the more common reasons Vulnerability Management programs fail, and more importantly what we can all do to ensure that doesn’t happen.

    Some of the topics we’ll cover include:

    1. The leadership void - setting goals and expectations from the top.
    2. Roles & Responsibilities
    3. Asset Management
    4. Classification & Prioritization
    5. Remediation
    6. Reporting to your Executive Teams & Board
  • Is the Disconnect Real? Marketers, Consumers and Customer Experiences
    Is the Disconnect Real? Marketers, Consumers and Customer Experiences
    Michael Barnett, Special Projects Editor @ Marketing Week, Sylvia Jensen, VP of Marketing @ Acquia & Regina Corso Consultant Apr 3 2019 10:00 am UTC 44 mins
    Find out what consumers in the UK think about customer experiences, and how closely marketers’ perceptions align with them.

    This webinar, hosted by Acquia, Marketing Week and Regina Corso Consulting discusses the results of a global survey among consumers and marketers, looking into how much those in the UK agree or disagree on customer experiences – and how that compares to worldwide trends.

    We focus on the expectations that consumers have with regard to these experiences, if marketers feel the same way and if reality supports these expectations.
  • Threat Horizon 2021
    Threat Horizon 2021
    Steve Durbin, Managing Director, ISF LTD Apr 4 2019 12:00 pm UTC 45 mins
    Driven by demands for increased speed, automation and efficiency, organisations are about to face a period of significant technological upheaval. Digitisation promises much, and development of the next generation of technologies will bring significant benefits to business and society. To survive in the digital world organisations will have to adapt. To thrive, they will need to evolve. Exploiting digital interconnectivity, competing in the digital arena while understanding the implications of a digital cold war will all become business as usual challenges for industry over the coming months and years.

    In this webinar, Steve Durbin, Managing Director, ISF will identify the key changes to the digital landscape over the next two years, focusing on emerging threats and means of mitigating their impact.
  • Panel Discussion: 3 Game-Changing Innovation Models in Financial Services Today
    Panel Discussion: 3 Game-Changing Innovation Models in Financial Services Today
    Pat Patel, Money20/20 | Drew Graham, Standard Chartered Bank | Megan Caywood, Starling Bank Apr 4 2019 1:00 pm UTC 60 mins
    Innovation has quickly become an overused and distorted word. At Money20/20 Europe expect to cut through the hype, explore what measurements we can use to benchmark innovation and get to the heart of sustainable and commercial step change. A key question which has moved back up the C-Level agenda of established; banks, tech companies and payments companies is:

    "How can incumbents deliver meaningful game-changing innovation?"

    There are three options available for incumbents, and at Money20/20 Europe we’ll be developing deeper into each one:

    1. Can organisations transform their cultures to execute true innovation internally within their organisations? (cultural transformation)

    2. Perhaps tech transformation is the way forward, partnering or acquisitions to do so?

    3. Or do they need to achieve business model transformation by building something entirely new outside of the organisation?


    These options are being heavily debated in boardrooms throughout Europe, with a number of high profile banks recently announcing plans to build brand new subsidiaries. Some of the traditional banks, payments and tech companies are pursuing a few or all of the options while others are sitting on the fence. Which is most effective and why? What are the dynamics at play that determine success for different types of companies? Hear from the leading companies in our industry as they share their incisive insight on the successes but also the failures and the lessons learned.

    Panellists
    Drew Graham, Director, Fintech Strategy & Engagement, Standard Chartered Bank
    Megan Caywood, Chief Platform Officer, Starling Bank,

    Hosted by Pat Patel, Content Director - Europe + Asia, Money20/20
  • Blockchain: Worldwide Technology Market Update and Spending Outlook
    Blockchain: Worldwide Technology Market Update and Spending Outlook
    Stacey Soohoo, Research Manager and James Wester, Research Director Apr 4 2019 3:00 pm UTC 60 mins
    The future of blockchain remains promising as enterprises move along their digital transformation journeys and look to blockchain to gain a competitive advantage. End users will realize the long-term value this new and innovative technology holds, building upon their existing technology infrastructure and also layering on new and emerging technology to create a complete ecosystem. In this webinar, we will share market insights on expectations about technology adoption from the field and key insights on the spending landscape for key blockchain use cases and trends.
  • ISM Guest Webinar: The 9 Key Characteristics Required in Strategic Sales
    ISM Guest Webinar: The 9 Key Characteristics Required in Strategic Sales
    Jim Bloomfield & Sarah Clapperton - Director, Bloojam Consulting Ltd Apr 9 2019 10:00 am UTC 30 mins
    Reasons to Attend:

    The Acuity® for Strategic Sales model has been designed by Business Psychologists to enable organisations to develop high performing salespeople and to recruit new sales talent.

    By reviewing credible research from 30 years of scientific studies into sales behaviours, the Acuity® for Strategic Sales model identifies the 9 key sales capabilities that determine success. Aimed at Sales Directors and Sales Managers this webinar will share with you how you can measure these sales capabilities in your team to drive sales performance.

    Key Takeaways

    Environmental drivers that require a change in sales behaviours

    What to look for in your sales teams:

    •Personal Drive- Describes why an individual enjoys sales activities and whether they will seek to perform at a consistently high level.

    •Sales Focus- Describes what the individual does to understand the client and the relevant economic and industry drivers, to use this knowledge to provide insight and solve customer problems, and to seize opportunities to create momentum in the sale.

    •Interpersonal Insight- Describes how the individual interacts with the customer, through appreciating the perspective of the other party, modifying their behaviour in a way that is appropriate to the situation and developing relationships and connections internally and externally.