The energy community on BrightTALK brings together top experts from around the world. Find relevant webinars and videos on renewable energy, efficiency and more presented by recognized energy management thought leaders. Join the conversation by participating in live webinars and round table discussions on energy trends.
George Anderson, Director of Product Marketing, WebrootRecorded: Jul 16 201954 mins
Phishing is flying under most organisations radar. Yet more than nine of 10 successful security breaches start with a phish.
Phishing takes many forms and is constantly adapting and morphing to become harder to detect and therefore harder to stop. We used to talk about polymorphic malware, but we now live in the age of polymorphic phishing.
This webinar looks at the real threat that poses and defenses you can use to mitigate its effects on profitability.
Chirag Rathi, Consulting Director, Energy & Environment, Frost & SullivanRecorded: Jul 11 201929 mins
The Oil & Gas industry is going through a costly war, and the weapon of choice is innovation for all operators. Wellsite operation is a key area of CAPEX and OPEX and also one of the most workforce-intensive. However, wellsite operations are quickly evolving as operators embrace the “digital oilfield age.” New technologies such as the Internet of Things/Internet of Everything, predictive analytics, cloud, and profit insights from Big Data are provided operational efficiency opportunities but offer a new set of challenges as well.
• Gain insight into the top operational pain points and how they are driving investment priorities.
• Learn about process control technology advances, including surveillance, analysis, and optimization, and how the Oil & Gas industry can benefit
• Identify innovation that can easily be leveraged to improve wellsite automation
Tyler Moffitt, Sr. Threat Research Analyst, WebrootRecorded: Jul 9 201949 mins
The year 2018 and the first half of 2019 saw a significant number of major events showcasing cybercriminal innovation. We saw cryptojacking and botnets reach their most widespread, ransomware become more targeted, and phishing attacks transition their focus from financial to tech targets.
Webroot believes it's possible to effectively protect businesses and clients, but only by understanding the adversary and the techniques they use.
In this webinar, Webroot threat analyst Tyler Moffitt will offer insights into prevailing malware trends and tactics, and discuss how implementing a layered security strategy can help you protect your clients from multi-pronged attacks.
We hope you can join us for this live, educational session.
Ed Maguire, Principal Partner, Momenta PartnersRecorded: Jul 5 201957 mins
When it comes to innovation, we've arguably seen more technological advancements over the last ten years than at any other point in time. Technology as we know it is changing before our eyes. We see the merging of the digital and physical worlds through technologies such as augmented reality; artificial intelligence enables computers to think faster than humans, and blockchain technology is considered by many to be the greatest technological innovation since the internet.
More importantly, we're not only seeing new technologies but the convergence and intersection of multiple technologies as they extend and create new capabilities through their collaboration. The era of combinatorial innovation is upon us, and the combined impact of augmented reality, artificial intelligence, blockchain and other technologies on Connected Industry will be unprecedented.
This webinar provides an opportunity to explore and consider the applications of new technologies as they related to IoT and Connected Industry.
We'll take a look at:
- The current status of AI, AR, blockchain and distributed ledger technologies and their role in empowering Connected Industry
- Benefits and risks of evolution
- Use cases across multiple industries
- Future timelines and predictions
Leigh Preece, Power Electrics, Steph Charnaud, Enzygo, Jack Christie, KiWi PowerRecorded: Jul 4 201960 mins
The Medium Combustion Plant Directive (MCPD) and Specific Generator Regulation aim to improve air quality and reduce pollution by cutting harmful emissions from medium combustion plants (1-50 MW) and specified generators. The regulations apply to all medium combustion plants across the UK including back-up generators, Combined Heat and Power (CHP) plant and boilers.
The legislation is complex with multiple compliance deadlines and this has resulted in a lot of confusion amongst businesses. This webinar will untangle the process and clearly explain how businesses are affected and what they need to do.
-MCPD & abatement – Leigh Preece, Power Electrics
-Permitting – Steph Charnaud, Enzygo
-Impact on DSR – Jack Christie, KiWi Power
Our expert speakers:
Leigh Preece, Sales Director, Power Electrics
Leigh Preece is the Sales Director for Power Electrics, the UK’s largest independent supplier of FG Wilson generators.
Steph Charnaud, Principal Consultant, Enzygo
Steph has 16 years’ experience within the environmental sector, within non-governmental organisations, local authorities and as a regulatory officer and policy advisor within the Environment Agency.
Jack Christie, Head of Account Management, KiWi Power
Jack has worked with KiWi Power for the past three years within the company’s sales team, becoming the head of the account management channel in June 2017.
Please note, all data you provide through pre-registration will be shared with our webinar partners once the webinar has been concluded. If you do not wish your data to be shared with the partner, please email email@example.com detailing the specific webinar.
Ed Maguire, Momenta PartnersRecorded: Jun 27 201957 mins
Edge, mobile edge, and fog computing have emerged, offering a panacea to the pain points of IoT data. Companies such as Intel, SAP, Ericsson and Dell Technologies are creating their own solutions. Edge computing has the potential to impact the data infrastructure of the IoT, but what are the benefits and risks of moving away from the cloud? Edge computing comes with a suite of considerations that need to be carefully considered prior to adoption that we'll explore in turn.
This webinar will cover:
- The current state of fog and intelligent edge computing
- What are the benefits/risks of moving away from the cloud?
- What does this mean for cloud computing, data infrastructure and data analytics?
- What are the best use cases of edge computing and what are its limitations?
- Forecasts on future applications
Justin Bean, Global Director of Smart Cities and Smart Spaces Marketing, Hitachi VantaraRecorded: Jun 21 201935 mins
What are smart spaces and how are video intelligence, IoT, big data and artificial intelligence (AI) enabling their rapid growth? How does this drive smarter, data driven decisions to enhance safety, operations, experience, and sustainability?
Rajiv Parikh, host of Center Stage from Regalix TV speaks to Justin Bean, Global Director of Smart Cities and Smart Spaces Marketing, Hitachi Vantara to discuss this and more.
See additional episodes of Regalix TV here: https://www.regalix.tv
Tyler Moffitt, Sr. Threat Research Analyst, WebrootRecorded: Jun 18 201944 mins
Recent years has seen a move towards more targeted attacks, especially in the realm of ransomware. Attackers are no longer trying to infect the globe, choosing instead to carefully select targets to increase their chances of success and maximise payouts.
SMBs find themselves in the crosshairs of these attacks. Their defense and contingency plans often leave them vulnerable to ransomware, information theft, and other attacks.
Is your organisation a soft target? Automated processes can often determine this in a matter of minutes, and cybercriminals are aware.
Learn how to lift your organisation from easy target to robustly defended with learnings from this webinar.
Margaret Phillips, Purdue University and Eleonora Presani, ElsevierRecorded: Jun 6 201959 mins
Join us for a webinar on Thursday, June 6th as we discuss how Scopus can assist librarians in addressing researchers’ top priorities and questions, such as:
•Where do I publish?
•How can I make sure my research is novel?
•How can I easily maintain my researcher profile and showcase my impact?
Co-presenting the webinar will be:
Margaret Phillips, Purdue University
Margaret is an Assistant Professor of Library Science and Engineering Information Specialist at Purdue University Libraries and School of Information Studies. She is the Libraries liaison to the Schools of Engineering Technology, Industrial Engineering, Mechanical Engineering, and Nuclear Engineering.
Eleonora Presani, Elsevier
Before Dr. Eleonora Presani (@elepre17) joined Elsevier in 2012, she was a particle physicist at CERN. At Elsevier, her first role was as a publisher, managing 14 academic journals in Nuclear and High Energy Physics. In 2016 she joined the Scopus team as Product Manager, working on research data linking and author assessment.
Fiona Challis, Channel Enablement & Sales Expert, Next GenRecorded: Jun 4 201941 mins
CompTIA explores the forces shaping the IT industry, its workforce, and its business models in 2019. Some of the trends we’re monitoring and will discuss include:
• How the cloud, edge computing, and 5G form modern economic infrastructure
• How IoT and AI are opening new doors for ambient computing
• How distributed technology models challenge existing structures
• How the business of emerging technology prompts sales channels’ reinvention
• How partnerships are bridging gaps in the new tech ecosystem
• How persistent tech personnel shortages are fueling new, creative staffing solutions
• How global tech hubs shine the spotlight on the ingredients for innovation
Gabriele Roberti and Andrea SivieroRecorded: May 30 201930 mins
Innovation Accelerators such as Artificial Intelligence, Internet of Things, Augmented & Virtual Reality and other emerging technologies are drawing unique opportunities and challenges across European vertical markets, with multiple digital use cases unlocking new technology scenarios for companies.
In this IDC web conference Gabriele Roberti and Andrea Siviero from the IDC European Customer Insights & Analysis team will discuss the combination of these emerging technologies and the leading disruptive use cases across European industries, such as professional services, retail, healthcare and others, answering questions such as:
Andy Lawrence - Executive Director of Research, Rhonda Ascierto - VP of Research, Christopher Brown - Chief Technical OfficerRecorded: May 29 201961 mins
The data center industry’s largest and most influential survey results are in. Join us May 29th at 9:00 AM Pacific time to see what’s trending. Are data centers getting more efficient? How are outages changing? What proportion of workloads are running in the cloud? Will rack density rise at last?
Stuart Lea, Inenco, David Oliver, Inenco, Michael McGowan, IbstockRecorded: May 23 201958 mins
•Inenco - Stuart Lea, Head of Energy Procurement
•Inenco – David Oliver, Technical Product and Insight Manager
•Inenco customer – Michael McGowan, Group Sustainability Manager, Ibstock
Increasing commodity and non-commodity costs amidst a back drop of unprecedented economic uncertainty means that revisiting your energy buying strategy is more important than ever.
A robust energy strategy, executed well, will give your businesses long-term cost and carbon savings, it will shelter you from rising commodity and non-commodity energy costs and provide you will revenue generating opportunities.
In this webinar, we will share our top five essential steps for developing a future-proofed energy strategy that can handle anything 2019 throws at it.
You will also hear from Inenco customer, Ibstock, who will share first-hand experience of how an effective energy procurement strategy helped their business achieve a competitive advantage, despite a changing and challenging environment.
The webinar will explore all elements of the energy strategy, from choosing the right procurement tools through to optimising your consumption patterns.
Simon Hill, Chief Legal and Compliance Officer, Certes NetworksRecorded: May 22 201941 mins
Handling lawful consent in GDPR is one area that can be especially tricky. Companies need to be particularly aware of new rights for consumers and notification requirements as these types of regulated responsibilities are not just limited to Europe. Any enterprise that provides a service whereby personal data is processed, are impacted by GDPR requirements.
So, companies may think they have obtained sufficient consent regarding personal data and transparency only to find out that they have failed to obtain valid consent.
In this interactive webinar, Certes Networks will cover:
• What Did We Learn in 2018?
• What is Important in 2019?
• Getting Back to Basics
• The Top Three Keys to Sufficient Consent
• Case Studies
On behalf of Certes Networks, we look forward to your participation.
‘Modularisation’ refers to the design and production of standardised components or systems that can be arranged or fitted together in a variety of ways. It can be used to reduce costs, improve quality, and speed up construction. The webinar explores the use of modularisation in the development and construction of modern coal-fired power plants and looks at its potential.
Lorcan Anglin, Inenco Mark Winn, InencoRecorded: May 16 201959 mins
Lorcan Anglin, Head of Solutions at Inenco
Mark Winn, Lead Consultant, Public Sector at Inenco
How can a better approach to energy management help NHS organisations to deliver the Ten Point Efficiency Plan?
Bottom lines in NHS Trusts take a direct hit every time energy costs rise, forcing organisations to direct an already-stretched budget away from front line service delivery. Many choose to fix their energy prices annually, but taking a different approach to procurement can provide greater budget certainty and create opportunities to better control energy price inflation. Looking afresh at energy consumption can also unearth real optimization opportunities and the chance to control overall costs.
Using real life case studies and practical advice, this webinar will focus on delivering both better energy procurement and an holistic approach to energy optimisation. Our industry experts will address:
1.How differing approaches to procurement strategies can achieve better outcomes and reduce the risk of annual price variations and provide greater budget certainty
2.Taking a shorter-term focus on invoice validation to remove the need for retrospective review and recovery, keeping much needed resources available for vital frontline services within financial year
3.What opportunities exist to review technology and processes that will optimise energy consumption to both reduce cost and help achieve 2020 carbon reduction targets
4.Five essential steps for identifying saving opportunities, prioritising them and developing investment cases based on short pay-back periods.
George Anderson, Director of Product Marketing, WebrootRecorded: May 7 201957 mins
As the volume, sophistication, and complexity of cyberattacks on SMBs grows, current IT security solutions must become more pro-active, automated, and effective in response.
This presentation looks at how SMBs and MSPs can tackle these issues now and in the future, and equips them with the IT security expertise and technology they need to defend their clients while benefitting from market growth.
Tyler Moffitt, Sr. Threat Research Analyst, WebrootRecorded: Apr 29 201945 mins
Each year, Webroot conducts extensive research on the current threat landscape. This webinar will present findings for 2019, which were also recently published in the Webroot 2019 Threat Report
A few of the key findings that will be covered, and their consequences explored, during this webinar include:
-40% of malicious URLs were found on good domains
-36% increase in the number of phishing attacks
-93% of phishing domains offered an HTTPS site
-54% of devices that got infected once were re-infected the same year
-25 of the top recurring malicious IP addresses were reused 95 times
Join Webroot security analyst Tyler Moffitt to learn about our threat discoveries and analysis, and to arm your business with the tools it needs to overcome modern cybercrime.
The webinar explores the direct and indirect effects of coal-fired power generation. It summarises a report that looks at these impacts with respect to employment and the supply of reliable power generation, especially at a time of uncertainty for many coal communities and economies around the world today.
Driving the Growth of Corporate Renewable Energy Market: Gaining Advantage through Innovative Energy Sourcing Options
Large corporations around the world are sourcing renewable energy for self-consumption. Companies are becoming part of prestigious groups to source renewable electricity.
Frost & Sullivan invites you to join Shaik Safik, Senior Consulting Analyst, as he discusses the sourcing methods adopted by corporations across the world to procure renewable energy and how this trend is expected to grow in the future.
Questions this Session Will Answer:
· How has the corporate renewable purchase evolved over the years?
· What are the drivers and barriers for renewable energy purchase at a global level?
· Who are the major corporate renewable energy purchasers and their renewable energy targets?
· What are the sourcing methods adopted and the risks involved?
Farah Saeed, Research Director, Digital Grids, Frost & SullivanRecorded: Apr 11 201937 mins
There are several cutting-edge companies already present in the market that have introduced their digital platform/architecture for transitioning to a digital grid. However, the industry currently does not have a clear market leader. The presence of unstructured data is creating a tremendous opportunity for the industry to take a market leader position for creating and innovating tools that will help utilities make the smooth transition to a fully digital grid through analytics.
Frost & Sullivan invites you to join Farah Saeed, Research Director, Digital Grids, for the webinar: Growth Opportunities and Challenges for Optimizing the Electric Grid through Data Analytics. Learn what type of data analytic solutions are gaining the most traction along with market growth projections by region for smart grid analytics.
• Gain in-depth market perspective on what the future holds for smart grid analytics
• Growing data complexity, concern for cybersecurity breaches, and lack of in-house expertise will encourage utilities to explore cloud-based and x-as-a-service offerings
• Discover why the industry needs to invest in and embrace smart grid analytics
Jesse DeMesa, Partner, Momenta Partners AdvisoryJul 18 20195:00 pmUTC60 mins
There is no one-size-fits-all-strategy for implementing digital innovation, but there are best practices and experiences you can leverage to enable your firm's road to change in the 21st century. Momenta Partners has created a playbook gleaned from practitioner's perspectives on how to best navigate digital transformation, and we'll share our insights with you in this webinar. This webinar is for CEOs and leadership teams seeking insights and actionable intelligence by example.
We will take a look at:
- The steps of a firm's digital transformation journey
- The best approaches to beginning your transformation journey
- Getting your team to embrace digital transformation
- Building a playbook to help you achieve your transformation goals
- Best practices for adoption
Jonathan Barnett, Sales EngineerJul 24 201912:00 amUTC27 mins
More than 88% of malware trying to enter your network can be stopped with a DNS filtering solution. These allow admins to take back control of their network, securing all devices, preventing internet misuse, and improving productivity. A filtered DNS solution is capable of blocking DDoS attacks, botnets, cache poisoning, and other threats.
In this webinar, we’ll discuss the importance of network security and how Webroot® DNS Protection can benefit your business and protect against attacks.
Tracy Pound, CompTIA Faculty, CompTIAJul 24 20192:00 pmUTC60 mins
As technology becomes a critical component for digital organisations, security becomes an even higher priority. Most companies know security is important, but they aren’t sure how to best change their IT approach to reflect the new reality.
This market intelligence session, based on CompTIA’s latest research, describes the areas that every business should focus on: the new technology that is needed, the new processes that must be adopted, and the education that must be given to end users.
Ed Maguire, Principal Partner, Momenta PartnersJul 25 20194:00 pmUTC64 mins
LPWA technologies enable low power communications over a large area, typically at low bit rates. With billions of sensors capturing data from the physical world, there’s growing need to transmit data from remote locations that are not connected to power sources. The family of LPWA technologies including LoRa, NB-IOT, and others are perfectly suited to support new use cases in agriculture, transportation, smart spaces, supply chain, manufacturing and many other areas.
The reality is that there is not one solution but rather a variety of low-power, wide area network technologies that take many shapes and forms. It follows that there are various criteria that need to be considered before a business should invest into a LPWA structure.
We take a critical look at the current market landscape, providing deep industry insights by experienced technologists who will share first-hand use cases and offer thought-provoking insights into how this technology is transforming connected industry.
We will be taking a look at:
- The current market landscape
- The different types of LPWA technologies
- How LPWA technologies can solve unique problems
- How to incorporate LPWA technologies into your business
- Tips and pointer for LPWA success
Sue Gilkes, CompTIA Faculty, CompTIAAug 7 20192:00 pmUTC60 mins
Small businesses are rightly described as the lifeblood of the global economy. This isn’t hyperbole, as SMBs account for the vast majority of business entities while serving as a key driver of job growth and innovation. Success as a small business owner means overcoming challenges on many fronts, but also embracing new opportunities in technology and business.
CompTIA’s latest research explores the business relevance of technology to SMBs and the factors affecting their perceptions, decisions, and investments in established and emerging technologies. We also explore the professional services industry, taking a look at their decision to offer technology to their own customers.
Kelvin Murray, Sr. Threat Research Analyst, WebrootAug 20 201910:00 amUTC60 mins
When we see HTTPS at the beginning of a URL, or the accompanying lock icon in our browser’s address bar, we tend to think it means we’re safe from harm. But HTTPS isn’t really about security. It’s about privacy. That lock icon simply means any information we transmit on that site is encrypted. It makes no guarantees the destination itself is safe.
Cybercriminals know users are trained to look for the lock icon in the address bar, and have been working hard to take advantage of that trust.
Join our 30-minute webinar to learn more about the tradeoffs between privacy and security, and discover why HTTPS may not really be as secure as we think.
Kelvin Murray, Sr. Threat Research Analyst, WebrootSep 17 201910:00 amUTC60 mins
This webinar will recap some of the major cybersecurity highlights of the past quarter.
From high-profile attacks making a media splash, to emerging threat trends being tracked by our researchers, a Webroot threat analyst will take attendees through the highlights and lowlights of another busy quarter for cybercrime.
Tried and true best practices established for building profitable managed IT service businesses certainly exist. This session explains those best practices and provides in-depth advice on six key actions for their implementation.
From understanding the opportunity to developing a marketing plan to support a sales team, attendees will gain valuable insight into best practices for building their business.
George Anderson, Director of Product Marketing, WebrootOct 8 20193:00 pmUTC60 mins
One thing is certain: the threats facing small and medium-sized businesses keep changing.
This webinar looks at the threats Webroot, our MSP partners, and SMB clients are experiencing and the impact to their business. The aim of this webinar is to provide threat information you can easily share with your business colleagues or managed service clients to reassure them you have the knowledge and the tools to look after their endpoints.
Kelvin Murray, Sr. Threat Research Analyst, WebrootNov 11 201911:00 amUTC60 mins
This webinar will provide expert insights on the latest cybercriminal activity, highlighting the year's most innovative, dangerous, and pervasive instances of malware.
Specifically, we will be covering the developments including information theft, Emotet, BEC scams, ransomware, targeted attacks, and more. Come learn about these developments and strategies to help secure your organisation from ransomware and next-generation cyberthreats.
Fiona Challis, Channel Enablement & Sales Expert, Next GenDec 9 20193:00 pmUTC60 mins
The role of the cloud in IT security can be confusing and frightening for many customers and clients.
Learn five tips for implementing cloud-based security for your clients. Discuss how to balance an approach with customers with those tips and understand the important questions to consider with customers considering cloud security as an option.