Hi [[ session.user.profile.firstName ]]

CxO Strategy

  • The 5 Essentials of Every Next-Gen SOC
    The 5 Essentials of Every Next-Gen SOC Peter Sparkes, Senior Director, Cyber Security Services, Symantec Feb 27 2018 5:00 am UTC 60 mins
    Every cybersecurity organisation is challenged with enabling the fast pace and nuances of their business strategy. Security measures must quickly keep up and be an enabler while continuing to mitigate the risks of a breach occurring.

    New technology adoption and expanded attack surfaces, evasive cyber threats, and limited budget and staffing resources make this challenging – there’s a lot to stay on top of.

    How does your Security Operations Center (SOC) keep up?

    Join us to learn how to scale and extend the capabilities of your SOC.

    We’ll review topics such as:

    - Automated security event analysis

    - Human security event analysis and prioritisation

    - Threat visibility across key on-premise and cloud control points

    - Consumption of technical and strategic threat intelligence

    - Proactive threat hunting and incident response

    Register Today
  • Sind sie richtig abgesichert?
    Sind sie richtig abgesichert? Kai Kudlek, CISSP, CISA, CISM Senior Systems Engineer Feb 27 2018 9:00 am UTC 60 mins
    Auf der Wunschliste für tägliche Aufgaben steht Hunting bei Sicherheitsanalysten, SOC Mitarbeitern und Administratoren häufig ganz oben. Die fehlenden Möglichkeiten, Aufgaben sinnvoll und effizient zu priorisieren und dabei die Sicht aufs Ganze zu behalten sorgt aber oft dafür, dass dieser Wunsch selten erfüllt wird und stattdessen die tägliche Routine in der Analyse von false positive Alarmen und Alarmen mit geringer Kritikalität liegt.

    FireEye Helix stellt eingehende Alarme in Kontext dar, bewertet diese und bietet Ihnen so die Möglichkeit, schnell zu priorisieren und bei den wenigen, entscheidenden Fällen in der gleichen Oberfläche mit dem Hunting zu beginnen.

    Dieses Webinar gibt einen kurzen Überblick über die Möglichkeiten der FireEye Helix Plattform gefolgt von einer leicht verständlichen Hunting-Demonstration.
  • MT Use Case #1: Secure Communication and Collaboration
    MT Use Case #1: Secure Communication and Collaboration Kirti Vashee, Language Technology Evangelist, SDL and Randy Endemann, Business Development Director, SDL Feb 27 2018 4:00 pm UTC 60 mins
    Join us for a live webinar where we will discuss how clients can integrate MT into core business applications, while protecting information privacy and security. We'll also explore real use cases that help clients gain value from Enterprise MT that can be customized for an organization’s application and mission.
  • Increasing the Effectiveness of Incident Management
    Increasing the Effectiveness of Incident Management John Moran, Senior Product Manager at DFLabs,and Mike Fowler, CISSP, Vice President of Professional Services at DFLabs Feb 27 2018 4:00 pm UTC 60 mins
    Incidents are fast-paced, dynamic events, forcing responders in to stressful and unfamiliar situations. Ineffective or delayed response to an incident can potentially lead to millions of dollars in lost revenue and damages. Even seasoned response teams require structure and leadership to respond effectively to an incident.

    This webinar offers a deeper look into the Incident Management System (IMS) and explains how when combined with a properly designed and implemented incident response process, the IMS can help organizations achieve a more effective and efficient incident management process, translating directly to a decrease in financial loss and reputational damage from incidents.

    Key Takeaways:

    - One of the core requirements of an IMS is that it must remain both flexible and scalable.
    - The first and most crucial step in implementing an IMS is integrating it into current organization processes and procedures.
    - Incorporating an IMS can elevate incident management to a level which is simply not possible with a more ad hoc system.
    - Utilizing an IMS for every incident large and small alike, will ensure that stakeholders remain proficient and in control of the process.

    Join us on this webinar as we try to answer the common questions surrounding how to increase the effectiveness of incident management, including the best set up of an Incident Management System, its structure and roles, when it should be used, as well as how an organization should go about implementation.
  • Service Portal 360 – Bridging the gap in your IT Service Delivery
    Service Portal 360 – Bridging the gap in your IT Service Delivery Ravi Kumar, Principal Consultant; Mohamed Shoaib, ServiceNow Developer Feb 27 2018 6:00 pm UTC 60 mins
    Designing and developing a user-friendly Service Portal or Self-service portal tops the to-do charts of any IT Service Management leader. But enabling the end-user to use the service portal effectively is a herculean task and that’s where most organizations fail. In this knowledge session, our ServiceNow experts will demonstrate how to build an easy-to-use service portal and achieve your organization’s IT Service Management goals.

    Key topics covered in the session include:
    - Evolution of IT Service Delivery: From simple service request forms to brand/face of IT
    - Key strategies to adopt while building your Service Portal
    - Case analysis: Role of service portal in successful IT Service Delivery
    - Demo: Service Portal creation without coding
    - Q & A
  • What does 2018 have in store for the channel?
    What does 2018 have in store for the channel? Margaret Adam and Hannah Breeze Feb 28 2018 2:00 pm UTC 45 mins
    With cloud and broader digital transformation having an impact, the European partnering landscape continues to evolve. What was once a fairly straightforward, linear supply-chain channel is now quickly emerging as a complex, nuanced and fast-changing partnering ecosystem. This transition is having a huge impact on the way partners do business, and how vendors (and distributors) must interact with them.
    In this 30-minute webcast – which is suitable for vendors, distributors, service providers and solution providers - IDC's Channels and Alliances analysts will delve into some of the key topics for 2018, and offer advice on how to navigate these complexities. This year, some of the big changes impacting partners include the impact of digital transformation, the growing importance of Partner-to-Partner and alliance engagements, the changing role of distributors, and of course, GDPR.
    Including the latest IDC data and a chance for Q&A with industry analysts, this webinar is essential listening for those planning and executing a partner strategy for 2018.
  • Securing the Cloud Generation: Who’s Using My Cloud
    Securing the Cloud Generation: Who’s Using My Cloud John Cunningham, VP - Cloud Security APAC, Symantec Mar 6 2018 5:00 am UTC 60 mins
    Do you know who’s using your cloud?

    Organisations around the world are embracing cloud solutions like Office 365 at a breakneck pace, but online collaborative platforms can leave an unprepared organisation vulnerable to cyber-attacks. Who is accessing your cloud applications? Are they truly authorised users, and are they conducting illegitimate activities?

    Without sufficient visibility, detection and protection, it can be easy for a cyber-criminal, or rogue employee to slip through the cracks – and when they do, your sensitive data won’t be their only target. Cyber-criminals have been known to load partial payloads for ransomware attacks, access email accounts for targeted phishing campaigns, host malware on SharePoint, and more.

    On 6 March 2018, Symantec will be hosting the ‘Securing the Cloud Generation: Who’s Using My Cloud’ webinar. Join our speaker and panel of experts as they discuss:

    •The state of today’s cloud security landscape
    •How to detect unauthorised access or risky user activity
    •How to protect your cloud from cyber threats

    Sign up for the webinar now, and gain critical insights on cyber security in the era of cloud applications and services.
  • What to say in LinkedIn messages to your ideal potential customers
    What to say in LinkedIn messages to your ideal potential customers Tom Mallens, MD of SI Media Ltd Mar 6 2018 11:00 am UTC 60 mins
    One of the challenges that people face when using LinkedIn for business, is knowing what to say to their connections and ideal potential clients.
    We will share with you some of the proven messages that we and our clients use on LinkedIn, so that you will know what to say to your ideal potential clients in order to generate more leads, appointments and sales for your business.
  • Mitigating risk through IP strategy and innovation alignment
    Mitigating risk through IP strategy and innovation alignment Candice Landry from 10e5 Solutions | Jon Calvert from ClearViewIP | Jim Hinton from Bereskin & Parr Mar 7 2018 4:00 pm UTC 60 mins
    The term innovation can refer to various stages within a product development cycle, and an invention created in this process can be protected by various forms of intellectual property. Most inventions are created to solve and address consumer needs and problems. To do that job, products enter the market, creating opportunities for the business or the inventor who owns it. A businesses’ IP strategy plays an important role in the success of a new product by ensuring competitive advantage in the market, for now and the future.

    However, IP protection can often be seen as an output of product development, leaving the organisation open to risk—whether it's in a new or an existing market. So how can you align IP protection with your invention creation to ensure your IP team is involved at the most effective points throughout the product development process? Too early could mean a slower time to market, and too late could mean lost opportunities in the market.

    In this webinar, we’ll be discussing how your organisation can mitigate risk, by aligning your IP and innovation strategy. We will also be looking at:

    - Examples of successful organisations who have aligned their IP and innovation
    - Intellectual property & open innovation
    - Why IP should be a part of the innovation process, not an event
  • 2018 Cloud and DevOps trends – The barriers and the breakthroughs
    2018 Cloud and DevOps trends – The barriers and the breakthroughs Shashi Kiran, CMO, Quali Mar 7 2018 6:00 pm UTC 60 mins
    As part of its annual survey, Quali received inputs from over 1300 practitioners working in mid-to-large enterprises – all in different stages of their journey to Cloud and DevOps. We learnt about maturity of their own processes, their challenges and learnings, the barriers they’re still challenged to pull down and where they’ve made headway compared to the past couple of years. The survey, now entering into its fourth year provides a great way to look at the industry landscape over a 3-year and map it to the maturity of the transformation that enterprises are experiencing.

    We encourage you to join this webinar and learn what you’re peers in the industry shared. Here’re a few things you will walk away with:

    •What are the top careabouts for enterprises in their quest for agility? Where are the existing bottlenecks?
    •How is the cloud strategy shaping up and what are the top automation tools?
    •Is DevOps adopting maturing? What are the barriers? Has the culture evolved?
    •How does this compare to the past 2 years?
    •How should you prioritize your efforts for 2018?

    Register now to hold the spot.
  • How Sales Ops can Drive Revenue Growth
    How Sales Ops can Drive Revenue Growth Jon Kondo, CEO at OpsPanda Mar 7 2018 8:00 pm UTC 45 mins
    Sales Operations Professionals are known for being adaptable, however, only 30% of sales ops pros are adjusting their strategies as conditions change throughout the year. Which makes them less likely to actually validate their assumptions and measure their success against their plan, leaving them (and their company) open to the risk of miss sales targets. During this webinar, Sales veteran and OpsPanda CEO, Jon Kondo, shares methodologies that Sales Operations can adopt to create a more agile sales environment that mitigates risk, drives revenue, and ensures that sales, finance, and the CEO are all happy with the results.

    You will Learn:
    -Tips on how utilize your Annual Operating Plan (it’s only useful if you use it)
    -How and why you should monitor and manage your plan year round
    -The key factors affecting your growth that you should be analyzing
  • Live Demo Breaking the Ageing Security Infrastructure in Cloud Providers
    Live Demo Breaking the Ageing Security Infrastructure in Cloud Providers Amar Singh, Klaus Gheri Mar 9 2018 1:00 pm UTC 75 mins
    The title says it all folks - we are going to talk about what's broken in the cloud and do a demo of why it is so easy to break down the current security infrastructure that most companies deploy in the cloud.

    Join me, Amar Singh and other specialists including

    - Amar Singh - CEO & Founder, Wisdom of Crowds and Cyber Management Alliance

    - Klaus Gehri - Specialist Cloud Security, VP Barracuda

    - TBC -
  • Leveling the Playing Field - Recruiting in Pharma and Med Device Companies
    Leveling the Playing Field - Recruiting in Pharma and Med Device Companies Arthur Tsakonas Mar 13 2018 3:30 pm UTC 30 mins
    Recruiting top talent is a contentious process, especially in an industry as competitive as pharmaceutical and medical device. In the dog-eat-dog world, how do you set your company apart from rival organizations? Join us for this webinar on how the right business vehicle program can give you a hiring advantage over the competition.
  • Blockchain: Market Spending and Trend Outlook for 2018 and Beyond
    Blockchain: Market Spending and Trend Outlook for 2018 and Beyond Stacey Soohoo, Research Manager and Bill Fearnley, Research Director, Worldwide Blockchain Strategies Mar 13 2018 6:00 pm UTC 60 mins
    The future of blockchain remains promising as enterprises move along their digital transformation journeys. End users will realize the long-term value this new and innovative technology holds, building upon their existing technology infrastructure and also layering on new and emerging technology to create a complete ecosystem. In order to help vendors capitalize on the opportunity, we will share market insights and data on the key blockchain use cases and trends.
  • IDC Future of Work: Augmenting, Replacing, Reinventing Human Work
    IDC Future of Work: Augmenting, Replacing, Reinventing Human Work Jonas Knudsen, Jean-Francois Segalotto, Helena Schwenk, Philip Carnelley Mar 14 2018 2:00 pm UTC 45 mins
    Join IDC's Future of Work team for a discussion of augmenting, replacing and reinventing human work. IDC's take and some use cases.
  • Vendor Management is Risky Business
    Vendor Management is Risky Business Jennifer Anderson, Jeff Avery, Ben Fagan Mar 14 2018 3:00 pm UTC 60 mins
    Do you struggle with truly understanding your risk with your vendors? Are you relying solely on static, self-assessments to understand vendor risk? This can put your company at a greater level of exposure. Join Verterim's Jennifer Anderson and Jeff Avery with BitSight Technology's Ben Fagan BrightTalk for an informative discussion on the changes in vendor management programs and a demonstration of the BitSight and Archer Integration. Our plug and play BitSight - RSA Archer integration provides dynamic risk information to augment your existing vendor assessment process, pointing you to specific areas that may be at risk, reducing your time on vendor risk analysis and proactively alerting you to potential issues real time.
  • First – Fix the Plumbing - What’s broken in cyberspace and How to Fix it
    First – Fix the Plumbing - What’s broken in cyberspace and How to Fix it Amar Singh, Adam Gladsden Mar 16 2018 1:00 pm UTC 75 mins
    The elephant in the room? Quite a few actually. However, in this webinar, we go back to the roots of the Internet and explore why we need to pause and assess the maturity of how we maintain this important but often shunned elementary control.

    Join Amar Singh and other experts in this interactive webinar where we take a deep dive into the various insecure components that underpin cyberspace and how NOT fixing them is costing online businesses.

    Panelists -

    Amar Singh - CEO and Founder Wisdom of Crowds, Cyber Management Alliance Ltd

    Adam Gladsden - SME cybersecurity

    NH - NATO Cleared Cybersecurity Researcher
  • Overcoming Objections through Creating Certainty
    Overcoming Objections through Creating Certainty Paul Blair Mar 20 2018 11:00 am UTC 60 mins
    I will share my thoughts on how we overcome a lot of objections by creating certainty around our products/services, us and our companies. Increase credibility, position ourselves as the expert or authority figure to gain control of an inquiry so we may find it easier to close. I will also look at how this will have a positive impact upon your prospect.
  • The Rise and Rise of Ransomware: Prepare and Protect
    The Rise and Rise of Ransomware: Prepare and Protect Nick Frost, Principal Consultant, ISF Mar 20 2018 1:00 pm UTC 45 mins
    The expectation from the start of 2017 – that we hadn’t seen the back of ransomware – was justified. 2017 was plagued with global attacks such as Petya, WannaCry, Bad Rabbit and many others. Unfortunately, 2018 could be even worse.

    With ransomware continuously developing new delivery techniques, organisations must learn how to prepare and protect themselves from the threat of ransomware, but how can they do this?

    In this webinar, Nick Frost, Principal Consultant at the ISF, will explore the latest threats in ransomware and what organisations can do to minimise vulnerabilities to reduce risks of an attack.

    About the presenter:

    Nick is currently the Principal Researcher for the Information Security Forum (ISF) Ltd. He has more than 15 years’ experience designing and implementing a risk-based approach to securing information. He has developed leading solutions for evaluating risk across both internal and supplier environments.
  • Live Webinar: Integrierte Buchung & Reisekostenabrechnung
    Live Webinar: Integrierte Buchung & Reisekostenabrechnung SAP Concur Jochen Alig Senior Solutions Consulting Stas Litau Inside Sales Representative Mar 20 2018 2:00 pm UTC 45 mins
    Aufwendige Reisekostenabrechnungen auf Papier oder in Excel-Tabellen gehören in Unternehmen der Vergangenheit an. Erfahren Sie, warum Automatisierung die Lösung auch für komplexe Reisetätigkeit ist.
  • Transforming Customer Service with ServiceNow: A Midwest Lunch & Learn
    Transforming Customer Service with ServiceNow: A Midwest Lunch & Learn Adam Mason, Jerry Sweeney, Ravi Kaipa and Meghan Lockwood Mar 20 2018 5:00 pm UTC 60 mins
    Today, modern, Customer Support teams use thoughtful, intuitive technology to solve customer issues at light speed. In some cases, they have even transformed from a cost center to a juiced up revenue producer.
    In our March Lunch and Learn our Customer Service experts will show how to do just that, with real-world examples from companies winning Customer Service right now, and a live demo.
  • Achieving superior patient experience in digital health services
    Achieving superior patient experience in digital health services Claudio Saccavini, Chief Information Officer Arsenàl.It Consortium, Silvia Piai, EMEA Senior Research Manager, IDC Mar 21 2018 2:00 pm UTC 60 mins
    During the webcast, we will analyse:
    •What are the steps to be taken to effectively use design thinking in mobile health services
    •What are the challenges you may face in a user-centered design process
    •How this approach can be more generalised to other service design to deliver better patient experience
  • Protecting your patents: What are the options?
    Protecting your patents: What are the options? Erik Alsegard from CFC Underwriting and Ruta @ PatSnap Mar 21 2018 4:00 pm UTC 60 mins
    The primary reason why people register their IP - including trademarks patents - is to protect their ideas from being used and monetized by others. Companies across the world spend trillions of dollars on research and patent thousands of new technologies each year, so why would you ever need IP insurance?

    We see dozens of cases each year where companies and individuals are claiming infringement upon their IP and that's when IP insurance comes into play.

    PatSnap is joined by Erik Alsegard, IP Practice Leader and Lewis Parle, In-House Solicitor and IP Underwriter, from CFC Underwriting to discuss the whys and hows of IP Insurance.

    Join this webinar to learn about the risks of IP, if you should consider insurance and what are the pros and cons of the options available to you when it comes to protecting your Intellectual Property assets.
  • Taking an Enterprise Class Approach to Data Lakes and Modern Analytics
    Taking an Enterprise Class Approach to Data Lakes and Modern Analytics Jay O'Leary, Solution Architect, Cloudera & Murthy Mathiprakasam, Director of Product Marketing, Informatica Mar 21 2018 5:00 pm UTC 60 mins
    Are you struggling to turn big data into useful, accurate, consistent, and impactful insights? Organizations are rapidly adopting new technologies like Hadoop, Spark, and Kafka to help lines of business develop new insights. However, with the sheer quantity of data available and complexity of new technologies, the opportunity to drive operational efficiencies and grow sales can feel overwhelming, inflexible, manual, and complex. Informatica's customers have successfully pursued digital transformation strategies through more systematic approaches for getting the right data, in the right place, at the right time to the right people.

    In this webinar, learn how to:

    • Design an architecture for data management with Hadoop and big data that can scale for large organizations
    • Understand best practices for data integration, data quality, data cataloging, and data preparation
    • Exploit automated approaches to data management to get more trusted data assets every time

    Join experts from Cloudera and Informatica to learn about an enterprise approach to data management that enables big data to be turned into useful, accurate, consistent, and impactful business insights.
  • IoT Security: Why the IoT Supply Chain of Trust Matters
    IoT Security: Why the IoT Supply Chain of Trust Matters Angela Salmeron, Romain Fouchereau Mar 22 2018 2:00 pm UTC 60 mins
    As IoT crosses the chasm and goes from hype to reality, security and data privacy (top IoT challenges) need to be addressed by the industry and government organizations for once and all.

    The stakes are high but tackling the problem is far from simple. Mainly, because IoT is a complicated stack made up of untrusted sourced components.

    Join us on this IDC webcast in which we will address the “IoT Supply Chain of Trust” as the cornerstone to IoT Security today. This webcast will cover the following topics:

    What’s the weakest link in an IoT solution?
    Security and accountability in IoT vendor ecosystems
    Supply chain of trust and Blockchain
    GDPR and government regulations: security by design
    IDC’s recommendations