Hi [[ session.user.profile.firstName ]]

End User Computing

  • Shift Left: How testing early and often is best for the business and customer
    Shift Left: How testing early and often is best for the business and customer Nancy Gohring 451 Research and Steve Feloney CA Technologies Recorded: Dec 12 2017 50 mins
    Organizations in most any industry are feeling increasing pressure to move fast. But at what cost? Some have learned the hard way that skipping crucial processes, like testing, damages performance and impacts customer sentiments on your brand. In this case, the fast time to market becomes meaningless.

    Smart businesses are adapting to a shift left strategy. These teams are learning how to incorporate testing early and often in the release cycle, supporting business requirements to move fast while ensuring high-performing products and quality. But getting there isn’t easy. In this webinar, we’ll cover:

    •Testing tools: tool choice is important. Not all tools have been designed to support this new paradigm.
    •Integrations: to be effective, testing tools must integrate easily with the tools and processes modern teams use, including CI/CD and APM products. Further, these tools must be very easy to use, specifically for developers.
    •Organizational models: shifting left requires changes to traditional organizations and culture. We’ll share insight into the successful models we’ve seen.
  • Endpoints in the Hyperconnected Era: Weaknesses and Weapons
    Endpoints in the Hyperconnected Era: Weaknesses and Weapons Scott Crawford, 451 Research | Ofer Israeli, Illusive Recorded: Dec 7 2017 60 mins
    If ever there were a truly asymmetric battle, it’s in the war for the endpoint. Enterprises must apply defense as broadly and consistently across hundreds or thousands of endpoints as best they can. But to penetrate an organization, the attacker only needs to succeed with one that exposes a weakness. And from the network, to the endpoint itself, to the user that interacts with malicious content, these weaknesses may be many.

    There is a new array of tools in the fight for the endpoint that go beyond traditional monitoring and controls, or the trend toward applying machine learning to the art of defense. In this webinar, Scott Crawford of 451 Research and Ofer Israeli of Illusive Networks will examine these issues and opportunities, and shed light on deception technology and other new tools for intelligent defense at the endpoint that can recognize and contain a threat before it has a serious impact.
  • How to Eliminate Cloud Waste with a Holistic DevOps Strategy
    How to Eliminate Cloud Waste with a Holistic DevOps Strategy Chris Parlette, Director of Cloud Solutions, ParkMyCloud Recorded: Dec 7 2017 47 mins
    Renting infrastructure on demand is the most disruptive trend in IT in decades. In 2016, enterprises spent $23B on public cloud IaaS services. By 2020, that figure is expected to reach $65B. The public cloud is now used like a utility, and like any utility, there is waste. Who's responsible for optimizing the infrastructure and reducing wasted expenses? It’s DevOps.
    The excess expense, known as cloud waste, comprises several interrelated problems:
    •Services running when they don't need to be
    •Improperly sized infrastructure
    •Orphaned resources
    •Shadow IT
    There are a few core tenets of DevOps that can be applied to reducing cloud waste:
    •Holistic thinking
    •No silos
    •Rapid useful feedback
    Join Chris to learn why you should include continuous cost optimization in your DevOps processes. Automate cost control, reduce your cloud expenses, and make your life easier.
  • Introduction to MAAS: building the agile data centre
    Introduction to MAAS: building the agile data centre Andres Rodriguez Recorded: Dec 6 2017 45 mins
    As more and more applications move to the public cloud, many wonder if it still makes sense to maintain a data centre apart from regulated workloads. In this presentation Andres Rodriguez, MAAS engineering manager, will look into how devops and infrastructure managers can build an agile data centre with a developer agility and a cost base that can compete with public cloud.

    In this presentation you will learn:
    * How to build a low cost / high usage smart data centre based on automation
    * Most common use cases best suited for bare metal provisioning
    * How MAAS, Canonical's server provisioning tool, can be used to build your agile data centre
  • Ubuntu: What's the security story?
    Ubuntu: What's the security story? Dustin Kirkland, VP, Product Development, Canonical Recorded: Dec 6 2017 57 mins
    Of course you know Ubuntu. Your developers use it everywhere. But you're from an enterprise, where the IT Security team has the final say. As they should. Before your app built on Ubuntu can go into production, you need their signoff. So what's the security story with Ubuntu? How is it hardened? Are there best practices around patch management? What about standards and compliance? How can Canonical help?

    In this webinar, join Dustin Kirkland to learn:
    >How Ubuntu is secured out of the box
    >How we ensure that we are compliant
    >How Canonical ensure customers get a first class support experience
    >Why Ubuntu has the leading edge in security
  • [Live Keynote]: Building 21st century infrastructure
    [Live Keynote]: Building 21st century infrastructure Mark Shuttleworth Recorded: Dec 5 2017 36 mins
    In his introduction keynote to the Ubuntu Enterprise Summit Mark Shuttleworth, founder and CEO of Canonical, will be explaining his vision for the future of enterprise architecture.

    In his presentation Mark will look into the various trends at play that are currently transforming the way IT infrastructures are being built and managed. From technology to operations, Mark will expose how enterprises are taking new approaches to containing costs and giving developers the freedom to build new breakthrough services.

    More about Mark:
    Mark Shuttleworth is Founder of Ubuntu and CEO of Canonical. Mark founded Thawte, an internet commerce security company in 1996 while studying finance and IT at the University of Cape Town before selling the company to VeriSign in 1999. In 2000 he founded HBD, an investment company, and created the Shuttleworth Foundation to fund innovative leaders in society with a combination of fellowships and investments. In 2002 he flew to the International Space Station as a member of the crew of Soyuz mission TM34, after a year of training in Star City, Russia. In 2004, he founded Ubuntu and Canonical.
  • Managing Security and Risk for Digital Transformation in Financial Services
    Managing Security and Risk for Digital Transformation in Financial Services Nicholle Lindner, Industry Director; Leon Manson, Lead Cybersecurity Architect; Ian Selbie, Solution Director, Unisys Recorded: Nov 30 2017 75 mins
    Consumers are enjoying a rapidly expanding choice of how, when and where they bank. However, banks must now manage the extra responsibilities and risks these new channels bring.

    In APAC, the Unisys Security Index™ revealed consumers are more concerned about bankcard fraud, ID theft and cyber security than about physical threats like the threat of war/terrorism and natural disasters.

    So how can banks balance the need to digitally transform, maintain privacy and security but still provide a seamless, personalized and trustworthy customer experience?

    We will cover:
     The 10 steps banks need to take to get digital transformation right, and how to improve customer experience and trust during this journey.

     How the CISO’s office can be part of the digital transformation journey, embedding security as part of the development lifecycle from the start as a value added component and not a burden as an afterthought.

     Innovative technologies like predictive analytics and biometrics can help provide a seamless, frictionless experience for customers. But how can they be applied without seeming invasive?

    Nicholle is an experienced senior financial services executive with almost 20 yrs experience working in financial institutions and corporates. She has extensive knowledge across financial services, payments, consumer and business banking, IT, analytics, marketing and strategy. 

    Leon Manson, Lead Cybersecurity Architect for Unisys APAC, is responsible for the range of real-time protection solutions delivered through Unisys Managed Security Services. Leon has over 25 years IT security industry experience in consulting and systems engineering for startups, tier-one vendors, and as a business owner.

    Ian Selbie is responsible for Unisys Financial Industry solutions in APAC focused on enhancing business processes and compliance in financial institutions including omnichannel, financial crime prevention, enterprise payments and case management solutions.
  • Cybercrime Tactics & Techniques Q3 2017
    Cybercrime Tactics & Techniques Q3 2017 Helge Husemann Recorded: Nov 29 2017 55 mins
    In our fourth Cybercrime Tactics & Techniques webinar, we are going to take a deep look at what threats got our attention the most during the last three months and what we expect to happen moving into the last quarter of 2017. Thus far, the year has brought us outbreaks of ransomware and breaches across the globe, making it more important than ever to implement multi-vector protection.
  • Governance, Compliance & Print Security
    Governance, Compliance & Print Security Ron Chestang GCIH, CEH, CISM Print Security Advisor, HP Inc. & Michael Mayberry Technology Account Executive, Staples Recorded: Nov 16 2017 37 mins
    HP and Staples Business Advantage present:
    Governance, Compliance & Print Security - Three keys to protecting business
    • The rise of IoT and its evolving role in Security Challenges
    • IoT Standards & Framework Developments in CyberSecurity
    • Governance and its role in mitigating risk
    • And More: Influential Mega Trends, Risks & Hidden Costs

    Ron Chestang – GCIH, CEH, CISM
    Print Security Advisor
    HP Inc.
    Ron joined HP, Inc. from one of the big four consulting firms where he performed IT Security consulting in Oil and Gas Industry in Houston, Texas. Ron also has over 15 years’ experience as a Cyber Officer in the US Air Force where he received the nation’s most comprehensive cyber security training and the highest level AF security certifications. During his tenure with the AF, Ron participated in numerous cyber exercises and operations including wartime cyber efforts coordinating defense of the nation’s top secret information and coordinating offensive efforts.
    Ron has numerous industry Cyber Security Certifications including the EC Council Certified Ethical Hacker, SANS GIAC Certified Incident Handler, and the ISACA Certified Information Security Manager Certification.

    Michael Mayberry
    Technology Account Executive
    Staples Business Advantage
    Mike Mayberry our Staples Technology Solutions Healthcare Technology Account Executive has been part of the Staples family for 10 years. Mike started with Staples on our Small Business Account sales team before moving to our retail team as a Sales Manager. Mike joined the Technology Commercial Contract team in 2011 providing IT solutions to our Mid-Market customer. After spending two and a half years with the Mid Market team Mike transitioned to the Commercial team working with F-500 customers. Recently Mike helped launch the new Healthcare team within Staples Technology Solutions and is now working to provide relevant IT solution thought-out our Healthcare base.
  • CSO Lessons Learned:Cybersecurity Risk on the Road to Digital Transformation
    CSO Lessons Learned:Cybersecurity Risk on the Road to Digital Transformation Aaron Sherrill Senior Analyst 451 Research, Dave Mahon CSO CenturyLink Recorded: Nov 15 2017 48 mins
    Organizations on the journey to digital transformation are encountering new challenges with managing risk. Not only are complex digital transformation initiatives making it difficult for organizations to fully grasp their entire risk profile but digital transformation is also resulting in new types of risk for the company. Organizations with strong risk aversion are in danger of preventing or stifling innovation and change. How can organizations manage risk and create a strategy that empowers digital transformation? What have organizations learned on the road to digital transformation that can help others early on in the journey?
  • Rethinking Data Security in a Zero Perimeter World
    Rethinking Data Security in a Zero Perimeter World Eric Ogren 451 Research and Bharath Vasudevan Forcepoint Recorded: Nov 8 2017 58 mins
    IT’s desire to become more nimble and agile has resulted in the rapid adoption of cloud delivered applications. This is not limited to the heavy hitters like salesforce.com for CRM or Office 365 for productivity. There are also applications servicing tasks and functions organizations might choose to outsource. The result is critical data spread across a vast array of resources, both on and off premise. Many organizations may use built-in cloud security functionality on top of their individual legacy deployments. However, this leads to silos of capability, mismatched policies, and noise in the form of alerts needing to be addressed.

    Join Forcepoint and 451 Research as we address how taking a human-centric, risk adaptive approach can transform data security programs.
  • Getting the Most from Big Data: The Benefits of Partnering with a DBaaS Provider
    Getting the Most from Big Data: The Benefits of Partnering with a DBaaS Provider Jim Curtis 451 Research, Steve Croce, Product Manager for ElasticSearch and DBaaS Object Rocket Recorded: Oct 31 2017 54 mins
    Clearly, the onslaught of data, particularly big data, continues to cause many organizations to look for new ways in which to store, analyze, and manage that data. Cloud computing from public cloud vendors is often one place in which enterprises turn. Traditionally deployed and managed on-premises, databases are the lifeline of many enterprises. And while the cloud is appealing for a number of reasons, there are still questions on the minds of many organizations in choosing the right cloud partner to manage their database in the cloud.
  • How to Embrace New Workplace Communication Technology
    How to Embrace New Workplace Communication Technology Simon Dudley, Director of Product Strategy, Logitech & Zane Carroll, Product Development Manager, Staples Business Advantage Recorded: Oct 25 2017 40 mins
    Gain valuable insight from our expert speakers.
    Webinar topics include:
    Cross Company Platform Adoption
    -How IT Managers can make every department happy
    Change Management
    -How to deal and adapt when everything changes
    Multi- Communication Solutions
    Communication is Key
    -What to consider when looking at a new communication plan

    Presenter Information:
    Simon Dudley, Director of Product Strategy, Logitech

    Simon Dudley is Director of Product Strategy for Logitech’s Video Collaboration business. Dudley joined Logitech in August 2016. Prior to that, he operated Excession Events, where he consulted organizations on optimizing their use of video collaboration. Dudley also spent a number of years working in sales, marketing, and product management at companies like LifeSize and Polycom, which has given him a holistic view of the video conferencing market.

    Dudley is an expert in the design, implementation and use of visual collaboration tools. He is a sought-after speaker in the collaboration industry, a published author, and the recipient of two patents. A native of the United Kingdom, Dudley currently resides in Austin, Texas.

    Zane Carroll, Product Development Manager, Staples Business Advantage

    Zane Carroll leads the Product Development Office at Staples Technology Solutions. He is collegiately trained as an Audio engineer with a passion for all things technology and quality sound. Throughout his time at Staples, he has supported our Computing & Printing hardware, managed services, and supported the launch of many new product categories, including the tablet, mobility, and most recently Device as a Service offerings here at Staples.
  • Why DCIM fails: Overcoming the pitfalls
    Why DCIM fails: Overcoming the pitfalls Fred Dirla, Dave Eastman, John Parker, Rhonda Ascierto Recorded: Oct 25 2017 61 mins
    When deployed successfully, managers say that DCIM software has revolutionized their operations. It lowers risk, it makes it easier to push utilization levels higher, and it enables effective capacity provisioning and planning, among other benefits.

    For others, however, the software has not achieved the ROI they expected. This is often because DCIM is an enabling technology as much as it is a management approach. To realize DCIM's full value, project leadership, operational process and cross-domain collaboration are essential. This means that the cost – and value – of a DCIM installation goes well beyond the software license; new internal operational, business procedures and workflows are required.

    This webinar explores these issues in detail and addresses the key question: "Is there any ‘easy’ button’ for DCIM to be successful?" Tune in to find out!
  • Machine Learning Analytics for Financial Services
    Machine Learning Analytics for Financial Services Rodrigo Fontecilla,Vice President and Global Lead for Analytics, Unisys & Maria Allen, Senior Director & Global Head, Unisys Recorded: Oct 25 2017 61 mins
    Unisys advises banks, non-bank lenders, insurers, and payments providers developing data management and artificial intelligence capabilities. This webinar will showcase client examples applying machine learning and predictive analytics to optimize consumer engagement, identify fraud and cyber security risks, and bring new capabilities to credit modeling.

    About the Speakers:
    Rodrigo Fontecilla is vice president and global lead for analytics for Unisys Federal Systems, where he leads all aspects of software development, system integration, mobile development, and data management focused on the federal government. Rod is responsible for providing leadership, coordination, and oversight on all IT solutions, emerging technologies, and IT services delivery to the federal government. He has more than 25 years of professional experience in the capture, design, development, implementation, and management of information management systems delivering mission-critical IT solutions and has an extensive background and expertise in cloud computing, mobile development, social media, enterprise architecture, data analytics, SOA-based solutions, and IT governance.

    Maria L. Allen is Senior Director and Global Head of Unisys' Financial Services Portfolio Solutions. In this role, Maria is responsible for building new products and services across all regions, platforms and channels ensuring that solutions and services are delivered in a way that enable our clients to meet their strategic goals and objectives.

    For more information on our Advanced Analytics offerings contact us at advancedanalytics@unisys.com and visit http://www.unisys.com/analytics
  • Remote Endpoint Management and PCoIP Management Console
    Remote Endpoint Management and PCoIP Management Console Paul Barrett, Systems Specialist, Teradici Recorded: Oct 19 2017 32 mins
    Are your users tired of having to login to the corporate network via VPN? Do you wish you could manage at-home devices remotely? In our latest release of PCoIP Management Console, we’ve added the ability to manage both office-based and at-home PCoIP Zero Clients.

    During this 30-minute webinar you’ll learn the best ways how to set up PCoIP Zero Clients so your employees or external consultants can be productive from wherever they happen to be.

    The demonstration will cover how to:
    •Configure PCoIP Zero Clients for off-site employees or contractors
    •Determine the best WAN settings to recognize out-of-office devices
  • The Emerging Impact of NVMe-oF and Storage Class Memory
    The Emerging Impact of NVMe-oF and Storage Class Memory Jeff Kato, Senior Analyst & Consultant, Taneja Group Recorded: Oct 17 2017 61 mins
    Join us for a fast-paced and informative 60-minute roundtable as we discuss the latest—and potentially most game-changing—technology disruptors to traditional storage architectures since flash: NVMe over fabric and Storage Class Memory.

    It was just five years ago that Flash technology transformed the traditional storage market forever. Modern flash-first arrays are now the new normal for traditional storage. Will a new shared storage access protocol called NVM express over Fabric (NVMe-oF) combined with the advent of storage class memory (SCM) be equally disruptive to traditional storage over the next five years as NAND flash technology was in the past?

    Vendors are now announcing new products and future architectures to enable them to support these new technologies. With the help of a lively panel of experts from HPE, Pivot3, and Mellanox, we will unpack this topic and explore how their innovative approaches to leveraging Storage Class Memory and NVMe-oF can radically improve storage products and solutions.
  • Multi-Cloud, Security & Encryption: The State of the Market
    Multi-Cloud, Security & Encryption: The State of the Market Rory Duncan 451 Research, Charles Goldberg Thales Recorded: Oct 12 2017 59 mins
    The rapid rise of hybrid cloud and multi-cloud infrastructure is enabling business agility and cost reduction, but at what price to infrastructure security? Concerns over increased hacking and malicious attacks, regulatory compliance, and internal auditing are driving infrastructure decision-makers to think again about protecting sensitive data in multiple cloud workloads, and what security solutions to spend their budgets on. At the same time, the lack of skilled talent, rapidly evolving cloud security offerings, and the management of legacy environments is creating additional strain on protecting data.

    In this session, Rory Duncan, Research Director with 451 Research will outline market trends and disruptive factors facing the security services market, sharing demand-side primary research and providing insight into areas of innovation.
  • Hybrid IT in Australia: How to Simplify & Manage Multiple Cloud Environments
    Hybrid IT in Australia: How to Simplify & Manage Multiple Cloud Environments Kelly Morgan, Research VP, Services at 451 Research; Nathan Vandenberg, GM, Data Centre at Dimension Data Recorded: Oct 12 2017 50 mins
    How can your enterprise better manage multiple cloud and non-cloud IT environments to accelerate your digital business? Are you among the 50% of enterprises challenged by the complexity of managing applications and data across hybrid environments?

    Find out what workloads are still on physical IT, where they’re moving to, and why enterprises use migration services to help.

    Join Kelly Morgan, Research Vice President, Services from 451 Research and Nathan Vandenberg, General Manager, Data Centre from Dimension Data on Thursday 12 October 2017, 11:00am – 11:45am, to understand the most common challenges faced when managing multiple IT environments in Australia and how to overcome them.

    We will guide you through the hybrid IT maze and provide you with actionable steps to simplify the complexity of managing multiple enterprise cloud and non-cloud IT environments.

    Join us as we explore the findings from the Hybrid IT report, a 451 Research report commissioned by Dimension Data.
  • How Performance Management can Drive Growth & Loyalty: An Allscripts Case Study
    How Performance Management can Drive Growth & Loyalty: An Allscripts Case Study John Worthington, Director of Product Management at eG Innovations and Mike Montano, CDO of Strategy at Allscripts Recorded: Oct 11 2017 61 mins
    In a fast-moving, 24/7 healthcare environment, doctors and nurses cannot afford any impediments to delivering the best possible patient care. To ensure that the hospitals, physicians, nurses and other care providers it serves receive the best client experience possible, Allscripts offers a proactive application monitoring service that checks for potential problems that could slow down or disrupt the use of its mission-critical healthcare IT systems.

    Initially launched in 2006, the proactive support offering monitors clients’ IT infrastructure and use of Allscripts solutions. Since its introduction, Allscripts has been able to improve client experiences in a way that has had a significant impact on business growth and client retention.
  • Cyber security: Threats and opportunities across the public sector
    Cyber security: Threats and opportunities across the public sector Richard Mullins, Account Manager Malwarebytes & Mark Phillips, Sales Engineer, Malwarebytes Recorded: Oct 11 2017 62 mins
    In light of recent high profile cyberattacks, notably WannaCry, it is now more important than ever for organisations to take stock of their current IT environment and mitigate security risks caused by the ever-changing threat landscape.
    In fact, a recent report by iGov found that nearly 76% of participants had experienced a cyber-attack, and 50% were ransomware victims in the last twelve months.
    This webinar focuses on how organisations can best meet this challenge and also explored the most common pitfalls faced and offer expert advice to combat this. Stuart Rogers, IT Security and Technical Architecture Manager at Cheshire Constabulary, shares his organisation’s story.
  • Retail Survival in the Age of Digital Disruption
    Retail Survival in the Age of Digital Disruption Sheryl Kingstone 451 Research, Sudesh Girdhari CenturyLink Recorded: Oct 10 2017 57 mins
    Digital transformation is real, and it’s happening – our data in the retail industry lends more insight to the state of the transition. It is an inescapable truth that every business is becoming a digital business empowered by new software initiatives such as AI, Robotics and IoT. The adoption of these disruptive trends will force a divide between business leaders and laggards. With the upcoming Black Friday and Cyber Monday, how prepared are you to meet rising customer expectations. As the pace of innovation accelerates, retailers need to act now. Our Global retail research illustrates a significant gap between digital leaders and laggards and even a modest investment can improve operational efficiencies and agility.

    The retail industry is bursting with digital innovation driving change. This session will review:
    •How differentiation demands digital maturity
    •Transformational technologies essential to create immersive, connected retail experiences across digital and physical worlds
    •The role of cloud services and its impact on customer experience, agility, efficiency and risk
  • Seus clientes confiam na segurança da sua empresa, produtos e serviços?
    Seus clientes confiam na segurança da sua empresa, produtos e serviços? Leonardo Carissimi, Especialista em Segurança e Diretor de Soluções de Cybersecurity para América Latina da Unisys Recorded: Oct 5 2017 61 mins
    Saiba mais sobre as preocupações dos seus consumidores!

    O Unisys Security Index mede as preocupações dos consumidores em questões relacionadas à segurança nacional, pessoal, financeira e da Internet. O Unisys Security Index mostrou um aumento de 20% na preocupação de segurança geral em 2017. Saiba mais neste webinar onde iremos apresentar os detalhes do estudo e falar sobre como lidar com ameaças cibernéticas, o que os consumidores pensam sobre Internet das Coisas, e como aumentar a confiança de seus consumidores enquanto sua empresa avança na Transformação Digital.

    Leonardo Carissimi, Especialista em Segurança e Diretor de Soluções de Cybersecurity para América Latina da Unisys. Possui mais de 20 anos de experiência no setor de segurança. Na Unisys, ajuda a construir um mundo mais seguro, ao mesmo tempo em que transforma o setor de segurança com uma inovadora abordagem de microssegmentação, bem como a arquitetura de segurança adaptativa e a inteligência de ameaças cibernéticas.
  • The Explosion of Hyperconverged Infrastructure: Tackling Data Center Complexity
    The Explosion of Hyperconverged Infrastructure: Tackling Data Center Complexity Ben Bolles, VP of Product, Pivot3 Recorded: Oct 4 2017 34 mins
    The hyperconverged infrastructure space is exploding! It can be hard to keep up with the leading technologies in this incredibly fast growing market. Hear how Pivot3’s unique architecture tackles the data center complexity problem and simplifies IT deployment, performance & datacenter management. We’ll discuss how Pivot3’s newest product, Acuity, delivers 6X the performance and is capable of supporting 2X – 3X more VMs than conventional HCI solutions.
  • ¿Sus clientes confían en la seguridad de su compañía, productos y servicios?
    ¿Sus clientes confían en la seguridad de su compañía, productos y servicios? Leonardo Carissimi, Experto en Seguridad y Director de Soluciones de Seguridad en América Latina de Unisys Recorded: Oct 3 2017 61 mins
    ¡Conozca las preocupaciones de sus clientes y actúe!

    El Unisys Security Index mide las preocupaciones de los consumidores en problemas relacionados a la seguridad nacional, personal, financiera y en Internet. El Índice Global de Seguridad mostró en 2017 un aumento de 20% en la preocupación general de seguridad. Aprenda más en este webinar sobre los detalles del estudio, cómo hacer frente a ciber amenazas, qué opinan los consumidores sobre el Internet of Things, y gánese la confianza de sus consumidores mientras continúa su proceso de Transformación Digital.

    Leonardo Carissimi, Experto en Seguridad y Director de Soluciones de Seguridad en América Latina de Unisys. Cuenta con más de 20 años de experiencia en la industria de seguridad. En Unisys, ayuda a construir un mundo más seguro mientras transforma la industria de seguridad con el innovador enfoque de micro-segmentación, así como con la Arquitectura de Seguridad Adaptativa y la Inteligencia de Ciber-Amenazas.
  • Reducing data breaches by focusing on the people problem
    Reducing data breaches by focusing on the people problem Victoria Windsor Feb 27 2018 3:00 pm UTC 60 mins
    We’ve got clearer rules around data protection and we’re spending more money than ever on preventing breaches,* so it’s logical to expect the number of reported incidents would at least plateau or, in an ideal world, decline.

    However, we all know that isn’t what we’re experiencing. In fact, the most recent statistics published in The Breach Level Index show that there were as many records breached in the first six months of 2017 as there were in the whole of 2016.

    Backing up the idea that buying information security tech alone won’t solve this issue, further analysis of the Breach Level Index shows that 86% of breached records were directly caused by accidental loss as a result of human error or employee negligence.

    During this webinar the speakers will share strategies for understanding user behaviour and look at how technology can work effectively with staff to provide a combined approach to tackling the insider threat, covering:

    •Analysis of the latest statistics to evaluate the threat your staff present to sensitive data
    •The psychology behind the insider threat, how people behave when handling sensitive data and their responses to data breaches, using real human error data breach examples
    •The level of reliance placed on pure technology to combat data breaches, compared with a blended approach focused on securing the user and their behaviour
    •Steps that can be taken to embed data protection into organisational culture in a way that’s meaningful for both staff and the wider business
    •Examine the insider threat from IT and Compliance’s viewpoint to discuss the real challenges you face