Hi [[ session.user.profile.firstName ]]

CxO Strategy

  • Modern Data Strategies – Moving Beyond RDBMS
    Modern Data Strategies – Moving Beyond RDBMS
    Mike Stone, Lead Architect & CIO, House of Brick Recorded: Oct 16 2019 45 mins
    Relational databases have been the undisputed industry standard for data storage and management since the concept was introduced to the computing community, with the first commercially viable products appearing in the late 1970’s. Today, 50 years later, there continues to be a place for this technology and it is still a pillar of modern computing. However, in the ever-changing landscape of data platforms and technology, how does your organization determine the best options for storing, managing, and retrieving data going forward? Learn how concepts like Virtual, NoSQL, Columnar, and Streaming increase your options as well as offer the potential for improving your ability to truly manage data while maximizing its utility for your business.

    Topics covered:
    • Security
    • Governance
    • Management
    • Self-Service
    • Common Cloud Services
    - Google Spanner
    - Amazon DynamoDB
  • What’s Your Organization’s Exposure on the Dark Web?
    What’s Your Organization’s Exposure on the Dark Web?
    Emily Wilson, VP of Research, and Dee Liebenstein, VP of Product Management, Terbium Labs Recorded: Oct 17 2019 58 mins
    A thriving fraud economy exists in the criminal underground, on the Dark Web and beyond, that trades in compromised information. Even if it’s not your business’s information, it’s still your problem because stolen user credentials are used for large-scale phishing attacks, credential stuffing, and account takeover. Join two Terbium Labs VPs—Emily Wilson, VP of Research, and Dee Liebenstein, VP of Product Management—as they offer insights into how your organization should rethink data security as more information is exposed, and re-exposed, every day.
  • Geek's guide to the workspace (part 4): first you get content, then the apps
    Geek's guide to the workspace (part 4): first you get content, then the apps
    Brian Jozefat, Crystal Ricevuto Recorded: Oct 17 2019 30 mins
    Users create an ever-increasing number of documents, presentations, drawings and other content that are stored in files. There is also no shortage of locations to store those files. Making sure that your users have seamless access to all those files, in any repository, is key to providing a productive user experience. In this session, we will demonstrate how Citrix Workspace provides access to all those repositories, including the native Citrix Content Collaboration repository, existing repositories on-premises and in the cloud, and repositories inside Workspace apps to those integrated into Explorer and Finder, all with a seamless experience.
  • Why Rip and Replace Your VPN if You Don’t Need to?
    Why Rip and Replace Your VPN if You Don’t Need to?
    Richard Greenberg, CISSP, OWSAP Foundation; Eitan Bremler - Co-Founder & VP Technology Safe-T Recorded: Oct 16 2019 33 mins
    VPNs have been a cornerstone of secure networking for the last 20+ years. While VPNs have stood the test of time, today, we now know that a true security architecture is hinged upon the concept of Zero Trust Network Access.

    Most organizations have already poured a great deal of time and resources into building out their VPN infrastructure. Considering that the technology does exactly what it’s supposed to do, ripping and replacing it may not make much sense.

    What if we tell you that you don’t have to rip and replace your VPN in order to start your journey towards Zero Trust Network Access? Join us to this webinar to find out how.
  • Best Practices for Secured ICS Deployments
    Best Practices for Secured ICS Deployments
    Barak Perelman Recorded: Oct 16 2019 60 mins
    Manufacturing and critical infrastructure organizations require the right OT solution that can deliver visibility & security from emerging threats. But that is only half the battle. Each environment is a bit different and what may be appropriate for some, will simply not work for others. Whether you are big or small, distributed or centralized will determine the right deployment model for you. Join us as we discuss a variety of deployment best practices based on different organizational models, structures and goals. After all, it is about leveraging the right model for YOUR organization that will ultimately achieve a fully secured environment.
  • Realizing Value and Calculating ROI of DocuSign
    Realizing Value and Calculating ROI of DocuSign
    Justin Park, Customer Success Architect, DocuSign / George Faris, Director Account Management, DocuSign Recorded: Oct 16 2019 33 mins
    This hands-on workshop led by our team of strategic advisors will guide you through the process of calculating ROI for your existing DocuSign use cases using real-world scenarios and sample outputs. Take away valuable insights and gain the confidence to share the business value you're delivering with DocuSign. Plus, learn how to get the executive buy-in needed to secure additional budget to grow your DocuSign program.
  • No Geek-Speak Allowed: The Financial View of Cyber Risk
    No Geek-Speak Allowed: The Financial View of Cyber Risk
    Jerry Caponera, VP of Products & Cyber Risk, Nehemiah Security Recorded: Oct 15 2019 50 mins
    Join us for this webinar to explore how cyber risk models have evolved to more accurately predict financial outcomes through better alignment with frameworks and models like NIST and MITRE ATT&CK. Jerry Caponera, VP of Products and Cyber Risk at Nehemiah Security, will share insights from global cybersecurity leaders who have risen above cyber geek talk and successfully translated risk into business terms. He will cover managing risk by tracking associated potential financial losses; what’s behind the hype surrounding financial data risk assessment (FinDRA); how to calculate ROI for security and mitigation investments; and how to brief your Board on cyber risk in financial terms.
  • AmerisourceBergen: Data Protection for HIPAA, CCPA, GDPR Privacy Compliance
    AmerisourceBergen: Data Protection for HIPAA, CCPA, GDPR Privacy Compliance
    Arvin Bansal, Senior Director Cyber Governance, AmerisourceBergen, Nathan Turajski, Sr. Director, Informatica Recorded: Oct 10 2019 32 mins
    The California Consumer Privacy Act (CCPA), GDPR and other mandates are a wake-up call to take a fresh look at data protection for personal information. As the scope of sensitive data and user rights requirements have evolved, this includes industries with significant experience managing legacy mandates such as PCI DSS or HIPAA.

    AmerisourceBergen is no stranger to industry mandates like HIPAA and HITECH, but is now preparing for a future where the number and impact of healthcare data breaches continues to increase, even as user transparency demands expanded controls. However, there is a silver lining as data privacy controls can also help accelerate digital transformation and enable safe value creation. In this webinar, you’ll learn how AmerisourceBergen approaches making information safe with world-class data masking techniques as a critical component of their privacy journey, and how Informatica is helping deliver data privacy governance solutions for the next-generation Data 3.0 evolution.
  • Geek's guide to the workspace (part 3): protecting your SaaS
    Geek's guide to the workspace (part 3): protecting your SaaS
    Matthew Brooks, Vijaya Raghavan Krishnan Recorded: Oct 10 2019 43 mins
    SaaS apps are great. They are extremely easy to buy, easy to deploy and easy to access. Regardless of the user's endpoint and location, they can access the app without relying on IT to deploy complex VPNs. Unfortunately, each SaaS app introduces a new identity for the user to remember. User accounts can be easily compromised with a weak password, resulting in stolen data. We have no easy way to disable access to SaaS apps when users leave the company. This session will demonstrate how to incorporate single sign-on, enhanced security, and website filtering for SaaS and web apps into the Citrix Workspace experience.
  • How to achieve GRC maturity using ServiceNow? - Part 3
    How to achieve GRC maturity using ServiceNow? - Part 3
    Clara Abraham, GRC Consultant; Vignesh Mohan, ServiceNow Specialist; Lalith Boovaragavan, Assistant Marketing Manager Recorded: Oct 9 2019 61 mins
    Stage-3 of this GRC webinar series is – Predict and Prioritize Risks.

    From this session you can:
    · Get an executive view into compliance requirements, monitor enterprise compliance and demonstrate compliance with policies and external standards and regulatory requirements
    · Use the risk dashboard to prioritize and respond to risks
    · Get insights on enterprise risks
    · Plan and execute audit engagements
    · Report and track audit observations
    · Get a view of audit results and engagement breakdowns by task, allowing areas of concern to be identified quickly

    Key takeaways:
    · Using compliance dashboard to demonstrate and manage enterprise compliance
    · Using risk dashboard to prioritize, manage and monitor enterprise risks
    · Planning and execution of audit engagements using Audit Management
    · Viewing audit results and identify areas of concerns using Audit overviews
  • How CX Can Impact Business Success from End to End
    How CX Can Impact Business Success from End to End
    Vikas Bhambri (SVP, Global Sales & Customer Experience) and Molly Garraway (Senior Manager of CX) Nov 21 2019 6:00 pm UTC 30 mins
    Customer service can do more for your business than simply keep customers happy. It can be used as a competitive advantage. Join Kustomer and The Farmer’s Dog as we explore how CX can impact business success from end to end, and the importance of leveraging CX insights to influence business decisions.

    In this webinar you will learn:
    - The changing expectations of the modern day consumer
    - How exceptional customer service can impact business success
    - Why support data should be leveraged throughout the business
    - Why CX is the cornerstone of The Farmer’s Dog
  • How a Trusted Employee Becomes a Business Risk
    How a Trusted Employee Becomes a Business Risk
    Tom Miller, CEO, ClearForce Recorded: Oct 9 2019 52 mins
    Behind professional exteriors, many employees struggle with personal and financial pressures and workplace stress. The implications of employee stress to your business extend well beyond human resource concerns. Join Tom Miller, CEO of ClearForce, for this webinar discussing how employee stress leads to inadvertent errors, financial risks, disengagement, harassment, and in extreme cases, insider threats and criminal activity in the workplace. Tom will discuss how to discover and understand employee behavioral cycles so that you can take action to improve workplace safety, the productivity of both your workers and your business, and defend against insider threats.
  • Digital Transformations are Built on a New Foundation of Agreements
    Digital Transformations are Built on a New Foundation of Agreements
    Ted Schadler, Vice President and Principal Analyst, Forrester Recorded: Oct 9 2019 26 mins
    With a new foundation for agreements, you will be able to transformation the way you operate, yes, but you'll also be able to support the rise of new business models, bigger ecosystems, and more powerful business growth. In this presentation, Forrester Vice President and Principal Analyst, Ted Schadler, will describe where agreements fit into firms' digital transformations and describe the impact of agreement platforms on your future.
  • Unified Endpoint Management & Security: A Force Multiplier for Small Businesses
    Unified Endpoint Management & Security: A Force Multiplier for Small Businesses
    Scott Scheferman, Cylance Director of Global Services; Masataka Hashiguchi, Interfocus Sales Engineer Recorded: Oct 8 2019 55 mins
    Join Interfocus and Cylance for this webinar outlining the workplace productivity gains that your business can realize through an integrated and unified platform delivering both IT asset management and endpoint security. Most IT teams today suffer from "alert fatigue" from the growing number of devices on their network, and spend on average 5-13 hours a week cleaning up compromised endpoints. Scott Scheferman from Cylance and Masataka Hashiguchi from Interfocus will demonstrate how automation and prevention is worth a pound of cure on your endpoints.
  • Shoot for the Cloud...? Getting Started with Security in AWS.
    Shoot for the Cloud...? Getting Started with Security in AWS.
    Josh Frantz, Lead Security Consultant, Rapid7 Recorded: Oct 8 2019 35 mins
    Is your organization moving to Amazon Web Services? Or are you a seasoned AWS pro, but need to know where to start to secure it?

    It’s a fact—Cloud environments aren’t going away anytime soon. Cloud adoption is expected to grow at 12.4% annually until 2025. When you need to get started in a new cloud environment, or secure an existing one, vulnerability management is the place to start.

    Join Josh Frantz to learn the fundamentals of setting up vulnerability management in your cloud environment and common pitfalls to watch out for. You may even pick up a few good wise cracks along the way.

    In this webinar we will cover:

    1. The future of the cloud infrastructure landscape
    2. Some common misconceptions. Did you know AWS doesn’t secure your environment for you?
    3. Vulnerability Management best practices
    4. How Rapid7 and InsightVM can help
  • Geek's guide to the workspace (part 2): beyond Pa$$w0rds for workspace authentic
    Geek's guide to the workspace (part 2): beyond Pa$$w0rds for workspace authentic
    Daniel Feller, Martin Zugec Recorded: Oct 8 2019 43 mins
    One hundred and seventy-seven and counting. That is how many different identities I have. Each identity has a password. Are they secure passwords? Probably not. Passwords, by nature, are insecure. Securing authentication is not easy because there are so many approaches available. In this session, we will look into many of these options, understand how they work and how they differ, and see how we can incorporate them into our primary Citrix Workspace identity.
  • Integrating Data Protection: Risks & Benefits for Asia-Pac Solution Developers
    Integrating Data Protection: Risks & Benefits for Asia-Pac Solution Developers
    Amit Sharma, Asia-Pacific Specialty Sales - Dell Technologies OEM & Charlie Wood, Project Manager - Vanson Bourne Recorded: Oct 8 2019 34 mins
    In this co-produced webinar by Vanson Bourne and Dell Technologies, we will examine the results of a recent worldwide survey entitled the Global Data Protection Index (GDPI) and how OEM solution developers can benefit from integrating data protection.

    Among other data points, we’ll review the costs associated with downtime, compliance with government regulations, and the challenges faced in protecting newer technologies associated with Artificial Intelligence/Machine Learning, Robotics, etc. All of this will be done through both industry and geographical lenses, allowing attendees to compare their solution’s preparedness against that of their peers.
  • Evan Kirstel's TECH Talks
    Evan Kirstel's TECH Talks
    Evan Kirstel & Tom Cross Recorded: Oct 4 2019 15 mins
    This is a weekly one-hour livecast with Evan Kirstel and Tom Cross discussing the highlights of the week titled: What’s REALLY UP and Down For the WEEK in TECH
    with Topics for Each Week
    - Customer Experience - Good, Bad, Ugly
    - Tech – Up’s and Down’s
    - Gadgets – Love/Hate
    - Ideas for Action
    - Random Weird Events
    - Coming Soon - Future Thoughts
  • 9 Modern Data Warehousing Architecture Patterns and Use Cases
    9 Modern Data Warehousing Architecture Patterns and Use Cases
    Dave Wells, Director, Eckerson Vamshi Sriperumbudur, Portfolio Marketing, Informatica Recorded: Oct 3 2019 43 mins
    For successful analytics & AI initiatives, your cloud data warehouses and cloud data lakes must work together in a cohesive data management architecture. There is no one-size-fits-all solution for data management architecture. Every data warehouse is unique; thus, every modernization plan is unique. There are, however, several architectural patterns for modernization that help to shift from data warehouse and data lake silos to cohesion and compatibility between data lakes and data warehouses.

    Use these patterns individually, in combination, or as mix-and-match for multiple warehouses to develop a modernization plan and drive your analytics and AI projects:
    • Data Warehousing Outside the Data Lake
    • Data Warehousing Inside the Data Lake
    • Data Warehousing in Front of the Data Lake
    • Data Warehousing Inside & Outside the Data Lake
  • [Earn 1 CPE]  CCPA 101: What is It, and How Will It Impact Your Organization?
    [Earn 1 CPE] CCPA 101: What is It, and How Will It Impact Your Organization?
    Speakers: Jannie Wentzel, Risk Management Professional; and Kerwyn Velasco, Product Manager - Riskonnect Recorded: Oct 3 2019 73 mins
    The California Consumer Privacy Act goes into effect January 1, 2020. If you are a for-profit company operating in the state of California, you need to have the right processes in place to support CCPA privacy requirements – or face stiff penalties. Are you ready?

    Attend this CPE accredited webinar to understand what is required by the CCPA, what you need to do now to prepare, how it relates to the rest of your compliance program, and what other privacy laws are on the horizon.

    You’ll learn:

    - What types of companies are affected by CCPA
    - How CCPA compares to GDPR
    - How technology can help you comply with privacy laws
  • Geek's guide to the workspace (part 1): workspace fundamentals
    Geek's guide to the workspace (part 1): workspace fundamentals
    Frank Srp, Michael Dombroski Recorded: Oct 3 2019 45 mins
    The desktop may still rule the corporate world; however, it’s not the only corporate-managed device your users need. Smart devices simplify work, automating repetitive tasks and allowing users to better navigate their environment. In this session, learn how Citrix Workspace enables you to expand your management to incorporate Raspberry Pi, Apple, Android and other platforms in addition to Windows.
  • Desktops as a service with Citrix
    Desktops as a service with Citrix
    Kireeti Valicherla, Paul Carley Oct 22 2019 9:00 am UTC 45 mins
    Citrix Desktops-as-a-Service offering is the simplest and fastest way to deliver applications and desktops to today’s workforce while improving IT efficiency and enhancing user experience. This Azure-hosted solution delivers high-performance Windows desktops and applications as a service to any device from anywhere. Attend this session to learn about DaaS use cases, features and architecture to uncover opportunities where the Citrix Desktops-as-a-Service offering is right for your business.
  • Die Cloud ist sicher, Ihre Konfiguration ist es möglicherweise nicht!
    Die Cloud ist sicher, Ihre Konfiguration ist es möglicherweise nicht!
    Maximilian Bode, Sales Engineer, FIreEye Oct 22 2019 9:00 am UTC 45 mins
    Wussten Sie, dass Angreifer die eDiscovery-Funktionen von Office 365 verwenden, um nach vertraulichen Daten zu suchen? FireEye nutzt Regeln, die z.B. speziell auf die Verwendung von eDiscovery und den Export von eDiscovery abzielen, welche in einem regulären Büroalltag im Allgemeinen selten sind.

    Nehmen Sie an diesem Webinar teil, um mehr über FireEye‘s Security Maßnahmen in O365 zu erfahren. FireEye’s Sales Engineer Maximilian Bode teilt:

    Einblicke in Microsoft Azure Events
    - Azure Audit und Azure AD
    - MS Exchange und Office365

    Schaffen Sie Transparenz: Durch Erkennung von Anomalien in Logs kann der Diebstahl von Anmeldeinformationen identifiziert werden. Wir zeigen Ihnen, wie Sie verdächtige Ereignisse und kritische Konfigurationen durch die Verwendung von Regeln erkennen.
  • Migrating to Microservices? Hacks to follow & Pitfalls to Avoid
    Migrating to Microservices? Hacks to follow & Pitfalls to Avoid
    Jothi Rengarajan – Principal Architect, Chandramouli Parasuraman – Technical Architect Oct 22 2019 5:00 pm UTC 60 mins
    Many organizations that have made the decision to move to Microservices from monolith architecture struggle with the strategy and process rather than the technology itself. This webinar digs deep in to the common pitfalls and the best practices involved in Microservices adoption.

    Key Takeaways:

    • Common Pitfalls in Microservices that may lead to loss of high productivity
    • Best architecture practices and patterns involved in implementing Microservices
    • Implementation and Process Do’s and Don’ts
  • Five Keys to Fixing Healthcare Provider Data Quality Once and for All
    Five Keys to Fixing Healthcare Provider Data Quality Once and for All
    Richard Cramer, Chief Healthcare Strategist, Informatica & Tony Sheaffer, Master Data Management Specialist, Informatica Oct 22 2019 5:00 pm UTC 30 mins
    Health plans have made big investments and great progress in improving operations, enhancing the member experience and becoming more data-driven. However, inaccurate and unreliable provider data continues to be a source of inefficiency, unnecessary rework, and a barrier to innovation.
  • Multi-Cloud Data Integration with Data Virtualization (APAC)
    Multi-Cloud Data Integration with Data Virtualization (APAC)
    Paul Moxon, VP Data Architecture and Chief Evangelist Oct 23 2019 1:30 am UTC 53 mins
    'By 2020, over 90% of Enterprises Will Use Multiple Cloud Services and Platforms' IDC FutureScape: Worldwide Cloud 2018 Predictions

    More and more organization are adopting multi-Cloud strategies to provide greater flexibility, cost savings, and performance optimization. Even when organizations commit to a single Cloud provider, they often have data and applications spread across different Cloud regions to support different business units or geographies. The result of this is a high distributed infrastructure that makes finding and accessing the data needed for reporting and analytics even more challenging.

    Data Virtualization provides a data discovery and access layer that allows data users across the organization access the data that they need for their work - irrespective of whether the data is in a data center or in the Cloud - any Cloud! The Denodo Platform Multi-Location Architecture provides quick and easy managed access to data while still providing local control to the 'data owners' and complying with local privacy and data protection regulations (think GDPR and CCPA!).

    In this webinar, you will learn about:
    - The challenges facing organizations as the adopt multi-Cloud data strategies
    - How the Denodo Platform provides a managed data access layer across the organization
    - The different multi-location architectures that can maximize local control over data while still making it readily available
    - How organizations have benefited from using the Denodo Platform as a multi-Cloud data access layer
  • Failure to Launch – Common Mistakes AP Departments Make
    Failure to Launch – Common Mistakes AP Departments Make
    Bob Cohen, Ardent Partners; Justin Kline, Canon Business Process Services; Mike Jud, Tradeshift Oct 23 2019 3:30 pm UTC 60 mins
    The intelligent AP function sounds like something I want and need, but what is it? If it’s something I want, how do I get there? How can I make Accounts Payable a strategic partner so I can get the budget? Review the “Accounts Payable Metrics that Matter in 2019” from Ardent Partners to benchmark your performance. Then learn from a panel of industry and technology experts to create the game plan that not only solves the tactical and manual-based challenges, but also builds an intelligent AP function.

    Learn from leading experts who can guide you to the intelligent AP function.

    • Learn the Game Plan to the intelligent AP function and how companies are executing on that path today.
    • What is causing all those exceptions and how do I tackle the root causes? Is it the organization? Is it the technology?
    • Is “best in class” the best we can do?
    • What is the goal line? How do you get started and how do you show the progress?

    Speakers:
    Bob Cohen, Ardent Partners
    Justin Kline, Canon Business Process Services
    Mike Jud, Tradeshift
  • Enterprise Data Governance -- Dream Work vs. Team Work
    Enterprise Data Governance -- Dream Work vs. Team Work
    Thomas Brence, Dir Product Marketing, Data Quality and Governance, & Patrick Dewald, Sr. Dir of Data Governance Strategy Oct 23 2019 6:00 pm UTC 39 mins
    For too long, Data Governance was seen as a hindrance to growth in organizations. Often stuck with the same perception as Legal or Regulatory, the Data Governance team was seen as red-tape. In order to overcome this perception, effective data governance leaders have turned to Collaboration instead of Control. By working with each team across the organization, effective data governance leaders can overcome the stigma and ensure that enterprise-wide programs can be built and goals can be met.
  • Avoid performance stress when using hybrid cloud workloads
    Avoid performance stress when using hybrid cloud workloads
    Thomas Poppelgaard, Christiaan Brinkhoff Oct 24 2019 2:00 pm UTC 44 mins
    Performance is always key for the end user, whether it’s on-premises, hybrid, or public cloud workloads. If your environment faces performance issues, you’ll be pleasantly surprised by the same performance when you move to the cloud. What is the most cost-effective sizing for your virtual machines to get the best performance? Are GPU workloads still relevant? What about WAN optimizers for cloud workloads, such as the HDX Enlightened Data Transport (EDT) protocol and Citrix SD-WAN? During this session, Citrix Technology Professionals (CTPs) will walk you through best practices gathered while deploying workloads on several clouds in addition to Citrix Cloud. Join this session to learn the fundamentals, gain insights into Citrix Virtual Apps and Desktop workloads, and ultimately get prepared to work on your first or second date towards Citrix Cloud services.
  • Transforming accounts receivables in Oracle financials with RPA
    Transforming accounts receivables in Oracle financials with RPA
    Arshad Imran, Ramesh Muniyandi Oct 24 2019 5:00 pm UTC 60 mins
    The webinar will take you through Oracle ERP Financials and the AR process along with the challenges faced by the organizations due to manual ERP process. The solution experts will give insights on the ways to overcome the challenges with the help of RPA. Furthermore, the RPA process will be dealt in detail covering the step by step approach to automate AR process with the help of RPA. This webinar will also take you through the role of RPA in helping Oracle ERP customers maximize their ROI and productivity. The case study explaining how Aspire Systems have helped one of the clients to automate legacy processes with RPA along with a demo on AR process automation is the highlight of this webinar.

    Key takeaways:

    • End-to-end knowledge tablet on Oracle Financial suite and AR processes.
    • Insights on generic challenges organizations face due to manual ERP process.
    • Solutions to the challenges with the help of RPA.
    • RPA and AR process automation.
    • RPA’s role in maximizing ROI and productivity for Oracle ERP customers.
    • Case study on automation of legacy process with RPA and demonstration on AR process automation.
  • [Earn CPE] Key Steps to Mature Your Third-Party Risk Management Program
    [Earn CPE] Key Steps to Mature Your Third-Party Risk Management Program
    Colin Whittaker with Todd Boehler, Process Unity; Jason Sabourin, OneTrust; Mark Deluca, Coupa; and Chris Poulin, BitSight Oct 31 2019 5:00 pm UTC 75 mins
    High-Profile Data Breaches have placed a spotlight on the risk of cyber security breaches with vendors and subcontractors, expanding the need to have greater rigor in third party risk management and ongoing risk assessments. Maintaining an effective third-party risk management program doesn't happen overnight. It's a journey that involves continual learning, refinement and evolution.

    And as a program matures over time, it results in the management of vendors and other third parties with fewer risks, lower costs, better performance and stronger compliance. Since every company is at a different place in their journey towards better vendor management, it's important to identify steps that you can follow as you mature your program, and to consider your vendor risk ecosystem and the data and services that can have an enormous impact on risk reduction. On this CPE accredited webinar our panel of experts will address some key steps to mature your third-party risk management program, including how to:

    - Create a third-party risk-management maturity roadmap.
    - Connect with enterprise systems to create a centralized data repository and enable seamless vetting activities across processes
    - Incorporate external content sources for a more wholistic view of your vendors plus more sustainable ongoing monitoring
    - Strengthen and streamline your third-party risk management efforts.
  • Top Challenges to Modernizing Your Contract Process and How to Overcome Them
    Top Challenges to Modernizing Your Contract Process and How to Overcome Them
    Andrew Bartels, Vice President and Principal Analyst at Forrester Nov 6 2019 9:30 am UTC 55 mins
    Join guest speaker, Andrew Bartels, Vice President and Principal Analyst at Forrester as he takes a deep dive into the world of contract lifecycle management (CLM). Andrew will cover:

    - The current state of contract processes
    - A high-level overview of The Forrester Wave™: Contract Lifecycle Management For All Contracts, Q1 2019
    - Selection criteria to help organizations make the right CLM choice

    Following Andrew's presentation, Erik Severinghaus, AVP, Business Development and Partners at DocuSign, will walk webinar attendees through how DocuSign is helping its customers solve today's contract process challenges.
  • Tradeshift Pay Deminar
    Tradeshift Pay Deminar
    Karen Brooks & Patrick Massar Nov 6 2019 6:00 pm UTC 60 mins
    Join us for a live demo of the Tradeshift Pay platform. During this demo, you will learn how to:

    • Connect to your suppliers in days
    • Eliminate manual processes through digitization
    • Speed up processing time through increased collaboration
    • Take advantage of a network of banks and suppliers that want to do business with you
    • Manage and increase working capital

    Save your seat!
  • Accelerate Your Sales Process with Copper, DocuSign and G Suite
    Accelerate Your Sales Process with Copper, DocuSign and G Suite
    Ryan Sandoval, Head of Apps Partnerships, Google / Leo Rodriguez, Partner Marketing Dir., DocuSign Nov 27 2019 9:30 am UTC 34 mins
    Sales teams that have to perform manual tasks, such as entering data into CRM systems, end up wasting precious time that could be spent on closing deals. Instead they are finding that deals take longer to close, human error is introduced to the process and customers are left frustrated whilst having to wait for their final, error - free agreements.

    With the combination of DocuSign, G Suite and Copper, sales teams can close more deals faster by sending and tracking signed documents, agreements or contracts directly from Copper.

    The Copper + DocuSign integration makes it simpler to upload contact details, apply document templates and send agreements for e-signatures through DocuSign in just a few clicks.

    By being fully embedded into Gmail we make your sales processes simpler streamline your sales process.

    Join this live webinar and enable your sales reps to:

    - Auto-pull in contact details and file information
    - Choose recipients and assign signing roles from inside Copper
    - Auto populate document templates based on the information you can pull through Copper +DocuSign’s artificial intelligence
    - Keep Track of your Document status in Copper
    - Store all related documents sent via DocuSign to relevant accounts and contacts
  • From Supply Chains to Ecosystem Commerce: Leveraging Business 4.0 Technologies
    From Supply Chains to Ecosystem Commerce: Leveraging Business 4.0 Technologies
    Rich Sherman, TCS Nov 14 2019 2:30 pm UTC 29 mins
    How are omnichannel fulfillment strategies disrupting traditional supply chains?
    The supply chain is transforming to an Enterprise Supply Network - the foundation for Ecosystem Commerce built on the connected ecosystem paradigm. Executives must leverage Business 4.0 Enterprise Supply Network management and emerging Ecosystem Commerce Platforms.
  • 3 Best Practices For Overcoming AI Obstacles to Build Future-ready Enterprise
    3 Best Practices For Overcoming AI Obstacles to Build Future-ready Enterprise
    Lakshmi Muthulakshmi Nellaiappan, Head, MFDM™ Practice, Automation & AI, TCS Nov 14 2019 3:00 pm UTC 29 mins
    Digital transformation is about applying a structured approach to harnessing abundance. Many CIOs are striving for this by automating crucial business process activities with a machine-first philosophy but are running into challenges. Learn three best practices for overcoming AI obstacles through relevant examples from industry-leading enterprises.
  • Powering an Intelligent and Agile Supply Chain
    Powering an Intelligent and Agile Supply Chain
    Manish Savla, Client Partner, TCS Nov 14 2019 3:30 pm UTC 29 mins
    Today’s Business 4.0 era demands enterprises deliver on agility. With customized products, complex buyer demands & legacy operation constraints, supply chain challenges are on the rise. Find out how a leading chemical enterprise is harnessing abundance & leveraging ecosystem to deliver winning business outcomes.
  • Tradeshift Buy Deminar
    Tradeshift Buy Deminar
    Robert Matias & Prem Vadlamudi Nov 20 2019 6:00 pm UTC 60 mins
    Striving for system efficiency is a common goal. We want our platforms to perform exactly how we expect and then some. Introducing Tradeshift Buy.

    Tune in for an exclusive demonstration of Tradeshift Buy where you’ll learn how to:

    • Manage your marketplace offerings in a central place, with custom pricing and options for each buyer or marketplace.
    • Aggregate offers from your sellers or marketplace, controlled and managed to the enterprise’s needs
    • Give everyone in your organization the power to buy what they need, for any kind of spend, across any marketplace
    • See and control all spend, with intelligent recommendations for optimizing your cost structure.
    • Connect any number of sellers and buyers, based on your brand and your T&Cs, with full access control
  • [Earn CPE] Critical Steps to Manage CCPA Compliance and Risk in 2020
    [Earn CPE] Critical Steps to Manage CCPA Compliance and Risk in 2020
    Panelists: K Royal, TrustArc; Ilia Sotnikov, Netwrix, and a speaker from LogicGate. Dec 17 2019 6:00 pm UTC 75 mins
    The California Consumer Privacy Act of 2018 (CCPA) is arguably the most expansive privacy law in U.S. history and will become enforceable in just a matter of months. The CCPA introduces new privacy rights for consumers and will force companies that conduct business in the State of California to implement structural changes to their privacy programs.

    The new rights given to California consumers are similar to the rights provided in the European Union’s General Data Protection Regulation (GDPR). The CCPA also subjects non-compliant businesses to expensive fines, class-action lawsuits, and injunctions.

    On this webinar, we will examine the impact of the CCPA, answer your burning questions, uncover the CCPA’s nuances, and address its ambiguities and challenges. We will also include strategies for creating compliance programs in the midst of the unknowns, and a strategic action plan for businesses to become compliant.
  • Tradeshift Pay Deminar
    Tradeshift Pay Deminar
    Bent Christiansen & Michael Creeden Dec 18 2019 6:00 pm UTC 60 mins
    Join us for a live demo of the Tradeshift Pay platform. During this demo, you will learn how to:

    • Connect to your suppliers in days
    • Eliminate manual processes through digitization
    • Speed up processing time through increased collaboration
    • Take advantage of a network of banks and suppliers that want to do business with you
    • Manage and increase working capital

    Save your seat!
  • [Earn CPE] Cornerstones to Fortify Your Enterprise Cybersecurity Defense
    [Earn CPE] Cornerstones to Fortify Your Enterprise Cybersecurity Defense
    Moderated by Colin Whittaker, Founder of Informed Risk Decisions. With panelists: Chronicle Security, and TBC. Jan 23 2020 6:00 pm UTC 75 mins
    The enterprise cybersecurity landscape is dramatically expanding in scale and complexity, and cyberattacks are growing in magnitude and impact as digital transformation increases on a global scale. From phishing scams, to ransomware attacks, to malicious breaches from state actors, the potential threat to your business is huge. According to the Ponemon Institute, the average per breach cost to a company in 2018 was estimated at $3.86 million, an increase of 6.4 percent over the previous year.

    Even though cybersecurity presents a challenge to the enterprise, you are not helpless against the bad actors who seek to cause real and costly damage to your business. A proactive, company-wide, integrated digital security strategy that addresses cybersecurity threats at all levels of your business will provide you with both the offensive and defensive capabilities you need to handle whatever comes your way. Earn 1 CPE credit by attending this educational and interactive panel webinar. Our experts will discuss why fortifying your cybersecurity strategy should be a critical priority and highlight some best practices that you can employ to stay ahead of evolving threats, including how to;

    - Understand the changing cyberattack landscape,
    - Create a company-wide cybersecurity task force,
    - Evaluate your security budget against your threat level,
    - Fortify your cybersecurity defense with systems hardening, adaptive authentication, and endpoint protection.