Hi [[ session.user.profile.firstName ]]

Fintech

  • FireEye Chat | Front and Center: How to Empower. Evolve. Defend.
    FireEye Chat | Front and Center: How to Empower. Evolve. Defend.
    Vasu Jakkal CMO, FireEye; General Earl Matthews VP, Strategy, Mandiant Security Validation; Martin Holste Cloud CTO, FireEye Recorded: Jun 5 2020 28 mins
    Cyber attackers never rest, but neither does FireEye. In our upcoming Virtual Summit on June 9-11, industry professionals will showcase best practices, research and strategies to empower organizations to evolve their cyber security solutions and better defend against attackers.

    In this latest episode of the quarterly talk show FireEye Chat, we dive deeper into two topics from the virtual summit: security effectiveness and cloud security. Watch now to hear from our experts who are front and center from their homes as they tackle these common questions:

    • How secure are you? And can we be sure we’re protected against the evolving threat landscape?
    • Are your cyber security products effective and working the way they should?
    • Do you know how to be secure in the cloud?
    • What should you consider when moving to the cloud?
  • Maximize Cortex XSOAR’s performance with Sixgill’s Darkfeed
    Maximize Cortex XSOAR’s performance with Sixgill’s Darkfeed
    Pramukh Ganeshamurthy (Palto Alto Networks) & Dov Lerner (Sixgill) Recorded: Jun 4 2020 28 mins
    Please join us to explore how Sixgill and Cortex XSOAR (previously Demisto) are enabling customers to scale and accelerate their incident prevention and response by combining deep and dark web intelligence with automation. Building simple, automated & effective cyber security, and executing it to the fullest extent, is critical in order to get the best outcomes and maximize business impact.

    Learn how combined Cortex XSOAR and Darkfeed can:
    - Automatically integrate and enrich a data stream of industry-related indicators of compromise (IOCs) from closed-access sources in the cyber underground
    -Receive automated early warnings of new threats before they are deployed in the wild
    -Hunt for malicious IOCs on corporate networks from a single dashboard
  • Cryptocurrency Exposure Management: Regulation, Compliance, and Security
    Cryptocurrency Exposure Management: Regulation, Compliance, and Security
    Stephen Ryan, co-founder & COO of Ciphertrace; Rebecca Aspler, Director of Product Management – Blockchain at Unbound Tech Recorded: Jun 4 2020 54 mins
    As digital assets move into the mainstream, regulation and compliance has become more important than ever for custody providers.
    In this fireside chat, Stephen Ryan, co-founder and COO of Ciphertrace, and Rebecca Aspler, Director of Product Management – Blockchain at Unbound Tech, will discuss:

    + Cryptocurrency intelligence – tracing, risk scoring and threat detection
    + AML and anti-fraud as it applies to digital assets
    + Technical enablers to AML and anti-fraud policy enforcement
  • Digital Transformation in Wealth: How to Compete Amid Rapid Change
    Digital Transformation in Wealth: How to Compete Amid Rapid Change
    Lauren Crossett, Ramprasad ‘RP’ Sandilya, Julie Coin Recorded: Jun 4 2020 61 mins
    June 4, 2020 | 1:30 pm ET

    -Lauren Crossett, Wealth Vertical Lead, Plaid
    -Ramprasad ‘RP’ Sandilya, VP, Business Development, Wealth & BPO at Broadridge
    -Julie Coin, President, DriveWealth

    What you’ll learn:
    -The impact of evolving investor expectations on your practice
    -How to leverage emerging technologies to grow assets under management through improved account portability
    -How COVID-19 is changing what people demand from financial services and what it means for wealth management’s digital transformation

    Wealth management is an incredibly sticky service, with little customer churn. Few services organically increase per-customer revenue over time in the way that AUM fee-based wealth management does. In spite of this value, wealth management is becoming increasingly commoditized. Downward pressure on fees continues and we are approaching the end of paid trades. Consolidation of the advisory space has not occurred—rather, it has become more competitive—with robo advisory services and breakaway RIAs providing investors with a seemingly growing number of wealth management options.

    So what can wealth management firms do to compete and stand out in this increasingly commoditized market? Firms must put a continued emphasis on delivering best-in-class digital experiences. From account opening and funding to ongoing holistic financial advice, everything must be easy, seamless, and value additive for retail investors. This webinar will explore some of the ways in which firms can work with technology vendors to revamp their digital experiences in order to accommodate investor expectations and behaviors—both of which are rapidly evolving in real-time due to the COVID-19 pandemic.
  • Kafka, Pulsar, Mosquitto, Oh My!
    Kafka, Pulsar, Mosquitto, Oh My!
    William McLane, TIBCO thought leader for global data distribution Recorded: Jun 4 2020 34 mins
    You are certainly not in Kansas anymore! With the rise in open source options for data distribution, stream processing, IoT, and messaging, what’s a person to do when choosing the best solution for enterprise communications requirements?

    What use cases best fit prominent open source options like Apache Kafka, and how can communications be facilitated between various cloud platforms?

    The road might not be paved with bricks, but in our ever changing world, a solid communications nervous system is the key to unlocking data for analytics, stream processing, and event driven architectures. Open source is one of the many paths that you can follow, so let this session be your guide on an adventure into open source messaging.
  • Think like a brand, not like a bank.
    Think like a brand, not like a bank.
    Liz High, VP of Strategy and Insight, Metia Inc. Recorded: Jun 4 2020 43 mins
    Unleash your marketing mindset: Accelerate digital transformation in a time of change

    Join Liz High, VP of Strategy and Insight at Metia for exclusive access to a new study that shows why marketers hold the keys to creating meaningful digital experiences in a post Covid-19 world. The survey of 500 senior financial marketers in the U.S. and Europe reveals compelling evidence that applying marketing discipline can unleash the true potential of your digital transformation investment.

    Liz High, VP of Strategy and Insight, Metia Inc.
    Liz is a passionate, data-driven strategist who has been working at the intersection of insight, design, data, and technology for almost thirty years. She specializes in creating powerful marketing programs, meaningful brands, and world-class customer experiences for a variety of clients, from global enterprises to ambitious startups. Liz has worked for almost every industry but specializes in financial services and technology.

    Increasingly, Liz brings her experience, thought leadership, and proven marketing models to banks and credit unions that are struggling to define what digital transformation should mean for them and their customers. Her approach helps identify the optimal combination of technology, culture, brand storytelling, and marketing execution to deliver meaningful digital banking experiences that drive loyalty and measurable return on investment.
  • Migrate to S/4HANA with MuleSoft
    Migrate to S/4HANA with MuleSoft
    John Withers, Product Marketing Manager, MuleSoft & Jimil Patel, Product Marketing Manager, MuleSoft Recorded: Jun 4 2020 60 mins
    SAP S/4HANA represents a major step forward in enterprise resource planning (ERP) software, and with support ending in 2025 for ECC 6.0, now is the time to begin planning your migration. Traditionally, migrations are costly, complex, multi-year projects that introduce considerable risk to both IT and lines of business.

    MuleSoft’s API-led approach to S/4HANA migration uses APIs to decouple your ERP, data, and third-party systems. By doing so, you de-risk the entire process while increasing flexibility to migrate on your own terms.

    Watch this webinar, which includes a demo of Anypoint Platform, to learn how to:
    - De-risk your program by adopting best practices built directly into APIs that reduce the need for S/4HANA customization
    - Increase speed of delivery by building your migration layer and integration layer simultaneously
    - Reduce program spend by accelerating dev, test, and training processes
    - Maximize business outcomes with a flexible architecture designed for future growth
  • Know Your Digital Customers in the Data Breach Era
    Know Your Digital Customers in the Data Breach Era
    Frederic Ho, VP, APAC Recorded: Jun 4 2020 20 mins
    As more and more businesses evolve to support a complete digital experience, a very basic question must be asked: How can I truly trust I know my customer?

    In the world of data breaches and identity theft, the old ways of identity proofing and authentication do not deliver a high level of confidence or assurance that the digital user is who they claim to be. New biometric-based technologies and approaches are needed to more definitively establish a customer's digital identity and detect bad actors more accurately.

    During this informative 20-minute session, Frederic Ho, Jumio's VP of APAC explores how biometric-based identity verification and authentication can streamline the onboaridng experience, better detect online fraud, and meet string KYC and AML regulatory requirements.
  • Part 2: Moving off of a Legacy System: How to Migrate Successfully (EMEA)
    Part 2: Moving off of a Legacy System: How to Migrate Successfully (EMEA)
    Chaitanya Yinti, Sr. Director PMM & Allan Foster, Chief Evangelist, ForgeRock Recorded: Jun 4 2020 59 mins
    Based on the state of my organization’s legacy IAM system, what is the best plan for migrating to a more modern platform? What is the best way to execute that plan, while also maintaining the current platform, its availability and integrity of data?

    Join ForgeRock to learn how to make migrating IAM systems seamless, and the best strategies to consider for deployment.

    •Parallel Deployments vs. Coexistence vs. Rip-and-Replace: Which method makes sense for your organization? What are the pros and cons of each?
    •How to migrate efficiently, successfully and securely
    •Why migrating a wide variety of applications can be a roadblock, and how to overcome it
    •Use Case Spotlight - Successful client journeys
  • Mandiant Security Validation: verifica la tua sicurezza, niente presupposti
    Mandiant Security Validation: verifica la tua sicurezza, niente presupposti
    Gabriele Zanoni, Solutions Architect, EMEA, FireEye Recorded: Jun 4 2020 59 mins
    Mandiant Security Validation: verifica la tua sicurezza, niente presupposti, solo evidenze. NEW Report Security Effectiveness.

    Il Webinar “Mandiant Security Validation: verifica la tua sicurezza, niente presupposti, solo evidenze” fa parte di una serie di incontri settimanali intitolati: #FireEyeCyberTalks. Si terranno ogni giovedì, dal 21 maggio al 18 giugno, e ti offriranno contenuti stimolanti e approfondimenti da parte dei nostri esperti.

    Mandiant Security Validation è una tecnologia di “Security Instrumentation” che fornisce evidenze per verificare gli investimenti effettuati in Security.
    La security è spesso basata su presupposti come:
    •si ritiene che le tecnologie funzionino come descritte in fase di acquisizione;
    •si ritiene che i prodotti siano installati, configurati e mantenuti nel tempo in modo corretto;
    •si ritiene che le persone o i partner gestiscano allarmi e processi come stabilito;
    •si ritiene che i cambiamenti nell’infrastruttura e nella security siano compresi, comunicati e implementati in modo corretto.
    Come nel settore della availabilty si fanno test per verificare backup e restore, così Mandiant Security Validation mette alla prova i sistemi di sicurezza (SIEM, FW,Proxy, Endpoint, Email, DLP, Cloud etc..) e ne suggerisce l’eventuale remediation.
    Questa tecnologia permette di dimostrare la bontà degli investimenti fatti in sicurezza e di massimizzare il risultato degli investimenti.
    Il risultato è di estremo interesse per i SOC Manager, i CISO e per il Board.
    Inoltre, in anteprima, forniremo i risultati del Report “Mandiant Security Effectiveness Report 2020”. Scopri come continuare a migliorare i tuoi processi e la tua tecnologia; stai al passo con lo scenario delle minacce cyber in costante evoluzione.

    Prenota il tuo posto oggi #FireEyeCyberTalks
  • Comment Boomi aide les entreprises à accélérer leur modernisation ERP ?
    Comment Boomi aide les entreprises à accélérer leur modernisation ERP ?
    Alexandre Pilz, Group IT Manager Vernicolor; Alexandre Martin, AE Boomi; Bruno Labidoire, Pre Sale Manager Boomi Recorded: Jun 4 2020 56 mins
    Dates : Jeudi 4 Juin
    Horaire : 11h à 11h45
    Selon une étude Coleman Parkes*, les entreprises européennes s’attaquent au « dilemme de l’innovation dans l’ERP » et repensent leurs anciens ERP en orientant davantage leurs investissements vers la modernisation et l’innovation.

    Cette étude pointe ce nouveau dilemme technologique qui place les entreprises européennes et françaises face à un choix cornélien : renforcer leurs investissements dans ce que certaines considèrent encore comme un processus coûteux et complexe de modernisation de leur ERP ou bien se laisser distancer par des concurrents moins réticents à prendre des risques.

    Aussi, le principal défi auquel sont confrontées la majorité des entreprises en EMEA, y compris la France, est d’abord le manque de technologies d’intégration capables de capturer des données provenant des équipements ou sources existantes, suivi du coût lié à la maintenance de multiples technologies d’intégration ou encore de la pénurie de compétences adéquates en matière d’intégration.

    Ce webinaire vous permettra d'explorer :
    • Les tendances de la modernisation de l’ERP
    • Les initiatives technologiques et raisons de moderniser l'environnement ERP comme une priorité, et un avantage pour les entreprises (notamment SAP/S4Hana, Microsoft Dynamics, Best of Breed SaaS comme Netsuite ou IFS)
    • La valeur de la plateforme IpaaS Boomi dans la modernisation du SI et la gestion de vos données
    • Retour d’Expérience Clients : Vernicolor : stratégie d’urbanisation du SI
    • Q&A

    Et vous sera présenté par :
    Alexandre Pilz, Group IT Manager Vernicolor
    Alexandre Martin, Account Executive Boomi, France
    Bruno Labidoire, Pre Sale Manager, Boomi Southern Region

    Vous pourrez participer au talk en posant vos questions en direct et obtenir l’ebook de cette étude « The ERP Innovator’s Dilemma » (Le dilemme de l’innovateur ERP).

    Inscrirez-vous dès maintenant pour obtenir votre place.
    L’équipe Boomi France
  • Gefährliche Fehleinschätzung der eigenen Sicherheit
    Gefährliche Fehleinschätzung der eigenen Sicherheit
    Christian Husemeyer, Solutions Architect EMEA, FireEye Recorded: Jun 4 2020 59 mins
    53% aller Angriffe bleiben unbemerkt!

    FireEye hat für mehr als 100 Unternehmen aus 11 Branchen überprüft, welches Sicherheitsniveau diese durch ihre aktuell implementierten Prozesse und Sicherheits-Produkte erreicht haben. Die mit Hilfe der Mandiant Security Validation Lösung (vormals Verodin) ermittelten Ergebnissen waren erschreckend:
    -Von mehreren tausend durchgeführten Angriffen sind nur 33% geblockt worden
    -Weitere 14% wurden erkannt, aber nicht geblockt
    -Bedeutet: In 53% der Fälle wären Angreifer erfolgreich und unerkannt eingedrungen!
    -Von all diesen Angriffen haben nur 9% einen Alarm in SIEM oder SOAR generiert
    Diese Ergebnisse zeigen deutlich, dass sich ein Großteil aller Unternehmen vermutlich in falscher Sicherheit wiegt, da die über Jahre oder Jahrzente aufgebauten Sicherheits-Technologien und -Prozesse
    nur unzureichenden Schutz gegen Angriffe auf ihre wichtigsten Daten und Ressourcen bieten, als bisher vermutet oder erhofft.

    Dieses Webinar gibt Ihnen Einblick, wie sie ihre technischen und organisatorischen Sicherheitsmechanismen unter absolut realistischen Bedingungen prüfen und optimieren können.
  • Worldline e-Payments Challenge 2020 [Option 1]
    Worldline e-Payments Challenge 2020 [Option 1]
    Anne-Céline Muller (Worldline), Michael Petiot (Worldline), Adélaïde Hervagault (BeMyApp), Christophe Remillet (Onevisage) Recorded: Jun 4 2020 45 mins
    Welcome to Worldline e-Payments Challenge webinar ! FinTech from all around Europe are competing to get a chance to take part in the next edition of the e-Payments Challenge in September. Thanks to this webinar you will be able to learn and discover more about this thrilling 3-days co-innovation journey which would allow you to work hand in hand with Worldline customers and experts. You will get the chance to have all key stages presented to you, from the application day to the pitching session. You want to know what’s in it for you ? Then take part in the webinar and learn about all the opportunities and advantages that the e-Payments Challenge could bring to you!
  • Strategies for Improving Cash Flow and Strengthening Accounts Receivable (AR)
    Strategies for Improving Cash Flow and Strengthening Accounts Receivable (AR)
    Eduardo Lopez, Paystand Recorded: Jun 3 2020 32 mins
    Companies are working hard to navigate the business challenges COVID-19 has created. Revenue targets are being reassessed, work environments are changing, and finance teams are looking for ways to operate faster, leaner, and more efficiently to address both short and long-term sustainability.

    During these times, it's critical for businesses to focus on expediting payment collection and managing cash flow more effectively. This is a key business success factor at any time, but it’s especially important during an economic crisis.

    Join us for our webinar on "15 Strategies for Improving Cash Flow and Strengthening Accounts Receivable (AR)". You'll learn how to gain control over delayed payments and leave with actionable tips on short and long-term cash flow solutions for your business.
  • Achieve Rapid AppSec with Open Source Security (ZeroNorth demo, 6/3 @1:00pm ET)
    Achieve Rapid AppSec with Open Source Security (ZeroNorth demo, 6/3 @1:00pm ET)
    ZeroNorth Recorded: Jun 3 2020 18 mins
    Ensuring security keeps pace with accelerating application development can be a major challenge for organizations with immature or resource-stretched application security (AppSec) programs.

    In this 30-minute webinar, complete with a live demo, learn how you can jump-start and accelerate critical security initiatives, leveraging the free-to-use scan tools the come out of the box with the ZeroNorth platform—SCA, SAST, DAST, container and cloud management—to enable security across both the development and operational phases of the development lifecycle.
  • Ask Me Anything About Customer Identity and Access Management
    Ask Me Anything About Customer Identity and Access Management
    James Quick, Director, Solutions & Advisory at Simeio Solutions, and Richard Bird, Chief Customer Information Officer at Ping Recorded: Jun 3 2020 32 mins
    Simeio Coffee Talks were created to give IAM and IT professionals space to soundboard and troubleshoot problems related to remote work. Join us for 30 minutes to ask us anything about our next topic, Customer Identity and Access Management (CIAM) with James Quick, Director of Solutions and Advisory at Simeio Solutions, and Richard Bird, Chief Customer Officer at Ping Identity.
  • Accelerating Innovation in Insurance
    Accelerating Innovation in Insurance
    Tym Lawrence, Director, Solutions Consultants at TIBCO Software Recorded: Jun 3 2020 42 mins
    The Insurance industry is facing major disruptions from trends including expectations of more personalised and engaging services, the rise of virtual platforms and insurtech competitors and the use of machine learning / AI. As IDC wrote, "Insurers that fail to act on the trends driving demand for insurance worldwide will eventually lose to more agile, flexible competitors who are adapting to the new world."

    In this presentation, you’ll learn how insurance companies can leverage new technologies to adapt to changing business drivers while still protecting their combined ratio. In 45 minutes, we will show you how insurers can develop a data fabric to unify siloed information and then use this to confidently predict outcomes and optimize their business. It will include a number of case studies and a sneak peek at the dynamic pricing accelerator that provides a freely available fast-start for AI-based pricing for insurance companies.
  • Unleashing the Push-Button Automation in Turbulent Times (Recorded)
    Unleashing the Push-Button Automation in Turbulent Times (Recorded)
    Joel Garnatz, former Director Global Presales & Maureen Fleming, VP Intelligent Process Automation Research & Advisory Srvs Recorded: Jun 3 2020 34 mins
    Unleashing the Push-Button Automation in Turbulent Times with Kryon Process Discovery 

    Automation is a key enabler of digital transformation. Technologies like cloud, advances in networking technology, and AI and ML are pushing automation to new levels. 

    In this webinar, you’ll learn more about:
    - The latest insights on RPA
    - Process Discovery and how it can speed up your automation program
    - How businesses have adopted it
    - Where Process Discovery is needed most
  • Maximize Cortex XSOAR’s performance with Sixgill’s Darkfeed
    Maximize Cortex XSOAR’s performance with Sixgill’s Darkfeed
    Pramukh Ganeshamurthy (Palto Alto Networks) & Dov Lerner (Sixgill) Recorded: Jun 3 2020 32 mins
    Please join us to explore how Sixgill and Cortex XSOAR (previously Demisto) are enabling customers to scale and accelerate their incident prevention and response by combining deep and dark web intelligence with automation. Building simple, automated & effective cyber security, and executing it to the fullest extent, is critical in order to get the best outcomes and maximize business impact.

    Learn how combined Cortex XSOAR and Darkfeed can:
    - Automatically integrate and enrich a data stream of industry-related indicators of compromise (IOCs) from closed-access sources in the cyber underground
    -Receive automated early warnings of new threats before they are deployed in the wild
    -Hunt for malicious IOCs on corporate networks from a single dashboard
  • The role of biometrics and KYC in seamless onboarding
    The role of biometrics and KYC in seamless onboarding
    Susana Lopes, Senior Product Manager at Onfido Recorded: Jun 3 2020 23 mins
    What does effective onboarding look like? It’s a balancing act. With user friction, identity proofing and effective KYC all fighting for attention. In this webinar, Susana Lopes, Senior Product Manager at Onfido, considers how best to assess these competing factors in creating an ideal user onboarding flow, and how biometrics can help to mitigate traditional tensions.

    She will be discussing:

    - The evolution of account opening in the modern age and how user experiences have changed
    - The principles of proportional risk, and how they can help you ask for more at the right moments
    - How biometrics can help increase security and confidence in identity proofing
  • When is a CRM not a CLM? When it’s a core banking system.
    When is a CRM not a CLM? When it’s a core banking system.
    Antony Bream, MD - EMEA & Americas, Wealth Dynamix Recorded: Jun 3 2020 47 mins
    Every private bank and wealth manager need to improve client engagement, formulate more compelling prospecting campaigns and offer more personalised services that drive AuM growth.

    And although you may think that Client Lifecycle Management (CLM) is easier said than done, it doesn’t have to be that way.

    •Do you fully understand what CLM is?
    •Do you have the right tools for the job?
    •Do you have full visibility of the client lifecycle, from end to end, via one single view?
    •Is your service quality suffering due to the range of disparate systems required to manage customer interactions and records efficiently?
    •Are you able to focus on client service and business development, without being distracted by complex, disjointed systems that fail to deliver best practice?

    If you answer “no” to one or more of these questions, it is time to re-evaluate.

    The most competitive and agile firms are those with seamless front to back office capabilities that ensure compliance, increase operational efficiency and optimise cost-income ratio.

    Join Wealth Dynamix and Azqore on a webinar to discover what best practice CLM looks like, and how to integrate it with your core banking system within a single, unified solution that spans the entire front to back office.
  • Résultats du rapport Mandiant 2020 sur l'efficacité de la sécurité
    Résultats du rapport Mandiant 2020 sur l'efficacité de la sécurité
    David Grout, CTO, EMEA, FireEye Recorded: Jun 3 2020 52 mins
    Résultats du rapport Mandiant 2020 sur l'efficacité de la sécurité : une plongée dans la réalité

    Participez à notre webinaire pour comprendre pourquoi la plupart des attaques testées continuent d’infiltrer les environnements d'entreprise sans être détectées et pourquoi la validation de la sécurité est si critique.
    Les résultats du Rapport sont préoccupants : les contrôles de sécurité ne fonctionnent pas comme prévu.
    Le constat qui en ressort et ce à travers des milliers de tests effectués par des experts de l'équipe Mandiant Security Validation (anciennement Verodin) est que pour 53% des environnements testés, les attaques ont réussi à contourner les contrôles en place. C'est pourquoi la validation continue de la sécurité devient aujourd’hui une tâche critique pour une protection efficace des environnements IT et OT.

    Rejoignez David Grout, CTO, EMEA, FireEye, pour notre prochain webinaire afin de découvrir les fondements de la validation de la sécurité et d’acquérir des connaissances pour répondre à des questions telles que :

    - Ai-je confiance dans l'efficacité de mes contrôles de sécurité ?
    - Puis-je évaluer rapidement la pertinence des informations sur les menaces ou l'exposition à la dernière attaque ?
    - Suis-je capable d'arrêter la perte de données et de protéger l'intégrité des données sur mon réseau ?
    - Comment simplifier et standardiser mon architecture de sécurité ?
    - Ai-je les bonnes éléments quantifiables pour communiquer les chiffres clés aux dirigeants de mon entreprise ?

    S’inscrire maintenant!
  • How a Measured Approach is Leading the Way for the Growing Crypto Economy
    How a Measured Approach is Leading the Way for the Growing Crypto Economy
    Jesse Spiro, Global Head of Policy at Chainalysis Recorded: Jun 3 2020 46 mins
    Few markets have embraced blockchain technology while rolling out regulations as quickly and seriously as the United Arab Emirates. As the UAE positions itself as a global hot spot for the safe adoption of cryptocurrency, Wai Lum Kwok leads the oversight of digital assets and other financial products in his role as the Senior Executive Director, Capital Markets at Abu Dhabi Global Market (ADGM). In this virtual “fireside chat,” Chainalysis Head of Global Policy Jesse Spiro sits down with Senior Executive Director Kwok to discuss opportunities and challenges in the MENA market, how ADGM approaches regulatory frameworks, why the UAE prioritizes blockchain, and more.

    About Wai Lum:
    Wai Lum joined the Financial Services Regulatory Authority (FSRA) of Abu Dhabi Global Market (ADGM) in June 2015. He heads up the Capital Markets division responsible for authorisation and supervision of financial market infrastructures and capital markets intermediaries. The division also regulates the offering of securities and collective investments schemes. Wai Lum also spearheads FSRA’s strategy and efforts to support the supervision of innovation in Financial Technology (FinTech) and development of the FinTech ecosystem in ADGM. Wai Lum has more than 10 years of supervisory experience. Prior to ADGM, Wai Lum served as the Director of the Capital Markets Intermediaries Division of the Monetary Authority of Singapore.

    About Jesse:
    Jesse Spiro is the Global Head of Policy for Chainalysis. Previously, he was the Head of Threat Finance and Emerging Risks for Thomson Reuters/Refinitiv, where he oversaw global engagement and research on threat finance, including terrorism, proliferation, cyber crime, organized crime, smuggling, trafficking. He is a 2018 National Security Fellow at the Foundation for Defense of Democracies, a member of the Intelligence and National Security Alliance (INSA) Financial Threats Council, and on the U.S. Chamber of Commerce Human Trafficking Task Force.
  • Unleashing the Push-Button Automation in Turbulent Times (Recorded)
    Unleashing the Push-Button Automation in Turbulent Times (Recorded)
    Joel Garnatz, former Director Global Presales & Maureen Fleming, VP Intelligent Process Automation Research & Advisory Srvs Recorded: Jun 3 2020 34 mins
    Unleashing the Push-Button Automation in Turbulent Times with Kryon Process Discovery 

    Automation is a key enabler of digital transformation. Technologies like cloud, advances in networking technology, and AI and ML are pushing automation to new levels. 

    In this webinar, you’ll learn more about:
    - The latest insights on RPA
    - Process Discovery and how it can speed up your automation program
    - How businesses have adopted it
    - Where Process Discovery is needed most
  • S8 03 The Value of Introverts And Importance of Apprentices
    S8 03 The Value of Introverts And Importance of Apprentices
    Julia Streets Recorded: Jun 3 2020 32 mins
    Host Julia Streets is joined by Carol Stewart, Coach for high achieving introverted women and Rosie Reynolds, Chief Commercial Officer at Aspect Capital. They discuss the value of introverted employees, their particular leadership strengths and how other leaders can embrace their often overlooked contribution. This episode explores the contribution that apprentices can make in challenging traditional practices and bringing fresh vitality to an organisation. The world of work has changed radically over the past months and together Rosie and Carol consider many of the compelling reasons why diversity and inclusion must remain high on the agenda as we navigate the path ahead - most notably investor scrutiny.
  • Understand mobile risk: Lookout Mobile Threat Defense
    Understand mobile risk: Lookout Mobile Threat Defense
    Marius Rohart, Security Sales Engineer EMEA, Lookout Jun 9 2020 12:00 am UTC 46 mins
    Enterprises must securely enable employees to work remotely.

    More and more enterprises recognise the need to allow employees to work remotely. However, as mobile access to cloud resources increase, data is exposed to cyber threats such as phishing, unreliable Wi-Fi networks and social engineering attacks.

    Join Lookout for this 30-minute webinar where we will cover:

    - The mobile threat landscape
    - How to securely enable a remote workforce
    - How to protect cloud data from phishing and social engineering attacks
    - How Lookout provides visibility into mobile threats
  • The Analytics and AI Approach to the Customer Experience
    The Analytics and AI Approach to the Customer Experience
    Melanie Turek VP of Research and Fellow, Connected Work, Frost & Sullivan Jun 9 2020 1:00 am UTC 35 mins
    With the rise of mobile and social technologies, customers are more knowledgeable and empowered than ever before. Their ability to access and share information gives them enormous control—and they know it.

    As a result, they expect data-driven, personalized interactions at every stage of the customer experience. Frost & Sullivan research shows that one of the clearest trends in customer engagement is the shift from traditional to digital interactions. Buyers like self-service, automated channels because they want easy access to information, on their time line, from anywhere. At the same time, agents want to discard the routine tasks that lower job satisfaction and lead to boredom and churn.

    AI and ML help companies leverage real-time and historical information to deliver a contextual, relevant and highly personal customer experience while improving agent morale. This webinar will show you how.
  • An Intelligence Driven Approach to Security Validation
    An Intelligence Driven Approach to Security Validation
    Shashwath Hegde, Solutions Architect, APAC Jun 9 2020 2:00 am UTC 60 mins
    A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lack the investigative skills to conduct searches. This continues to be a growing problem in the cyber security industry as organizations struggle to justify the high-cost of their defences.
    We make significant investments to justify our methods of stopping evil. However, we rarely spend time in measuring our methods or investments. Instead, we rely on assumptions to guide our decisions and justify our judgements. In this session, we will explore real world data and dive deep into the performance of cybersecurity controls across enterprise networks; from email, endpoint, network to cloud-based controls and examine some alarming results. As organizations continue to struggle to justify the high-cost of their defences, Security Validation provides a solution to validate, consolidate, recoup and maximize the value from existing investments.
  • Data and Machine Learning in Financial Fraud Prevention
    Data and Machine Learning in Financial Fraud Prevention
    Kayla Hartman, Data Analyst, Alloy Jun 9 2020 3:00 am UTC 34 mins
    According to Capgemini’s World Payments Report 2017, global digital payments are expected to rise to roughly 726 billion transactions in 2020. The growth of digital financial services offers innumerable opportunities, expanding access to financial services products and allowing for essentially instantaneous feedback loops. With these opportunities, however, also come risks, including fraud. The threat of fraud requires financial services organizations to act proactively to minimize losses due to fraud. Analysis of data surrounding their customers and transactions is an essential effort to ensure the benefits of the digital payments space continue to outweigh the risks.

    In this webinar, Kayla Hartman will discuss the various ways data is used in fraud prevention. As a Data Analyst at Alloy, a fintech company that provides identity verification APIs for clients’ KYC (know your customer) and AML (anti-money laundering), she has firsthand experience in enhancing fraud prevention efforts through data analysis. She will dive into the ways the use of data is currently advantageous to fraud prevention, as well as the challenges that are presented in this quickly changing space.
  • Managing Digital Adoption: Banking & Payments in a Contactless World
    Managing Digital Adoption: Banking & Payments in a Contactless World
    Dr. Louise Beaumont | Simon Cureton, Funding Options | Matt Phillips, Diebold Nixdorf | Ioannis Mallios, Profile Software Jun 9 2020 4:00 am UTC 60 mins
    A discussion on open banking, the accelerating need for mobile and contactless payments, and how the ecosystem is being disrupted by COVID-19.
  • Effective Cyber Risk Management in the Digital Age
    Effective Cyber Risk Management in the Digital Age
    Chandran Subramaniam, Director, CyberFort DigiSec Solution Private Limited Jun 9 2020 5:00 am UTC 60 mins
    Discussion shall broadly cover the emerging Technologies, disruptions to Financial Services, need for Digital Transformation, understanding of the existing Cyber Ecosystem, recent Security & Data breaches, understanding of challenges to Financial Services from Cyber Risks, emerging Regulatory & Legal compliance on Data Privacy & Security, developing a Cyber Security Management strategy for secure Digital Transformation and steps for effective management of Cyber Risks and providing a reasonable assurance to the relevant stakeholders.

    Join this webcast as we discuss:

    - Disruptive Technologies
    - Impact on Financial Services Industry
    - Understanding the Cyber Ecosystem
    - Cyber attack surface
    - Data Privacy & Security
    - Cyber Security Management frameworks
    - Effective Cyber Risk Management
    - Open Session
  • Cybersecurity in the Age of IoT
    Cybersecurity in the Age of IoT
    Ashwin Ram, Cyber Security Evangelist Jun 9 2020 6:00 am UTC 54 mins
    A recent industry study reveals: 67% of enterprises have experienced an IoT security incident. From smart TV’s, IP cameras, and smart elevators, to hospital infusion pumps and industrial PLC controllers, IoT and OT (Operational Technology) devices are inherently vulnerable and easy to hack.

    In this live webinar, we will show you how to minimize your exposure to the IoT cyber-risk and prevent the next cyberattack.
  • Banking & Payments Trends in APAC
    Banking & Payments Trends in APAC
    Johnny Ang, Yingyu Wang & Siobhan Hartnoll Jun 9 2020 6:00 am UTC 60 mins
    The simplicity of contactless payments is driving fintech adoption by consumers in APAC. The necessity of reducing contact with others - driven by coronavirus - is bolstering adoption as well. But, the challenge in streamlined access is security and fraud, especially with an increasingly digital society. Join this panel to hear about news in the banking & payments ecosystem, including:
    - How the payments industry is adapting to a COVID-19 World
    - New ways to detect & reduce fraud and eliminate chargebacks
    - How trade sanctions may affect banking regulations

    Speakers:
    Johnny Ang, Regional Senior Director, Business Development, Value Added Services, APAC, Wirecard (Moderator)
    Yingyu Wang, Managing Director, Taylor Vinters Via LLC
    Siobhan Hartnoll, Head of APAC Business Development, Featurespace
  • Beyond Covid-19: Reshape your Business Strategy with Conversational AI
    Beyond Covid-19: Reshape your Business Strategy with Conversational AI
    Chris Tew & Alexander Hoffmann Jun 9 2020 8:00 am UTC 60 mins
    The world has fundamentally changed since the start of 2020 as businesses frantically work to adapt to the new normality driven by COVID-19. Where the growing cost of contact centre operations was once king, scalability and continuity of service will be the new master!

    One of the ways in which companies are increasingly building this continuity, resilience and scalability is to embrace conversational AI to help reshape their strategy for business operations, people and assets.

    It is now time to reimagine the future and start planning decisively.

    In this thought-provoking webinar, Artificial Solutions’ VP Chris Tew and AI specialist Alexander Hoffmann will present how companies around the world are leveraging Conversational AI in innovative ways and putting themselves in pole position to strategically benefit from the technology in delivering resilient, efficient and agile customer service. The speakers will also showcase a live solution.

    This webinar will arm you with all the information you need to understand the ‘Why’, ‘How’ and ‘What’ you need to do to successfully implement Conversational AI in your organization.
  • Understand mobile risk: Lookout Mobile Threat Defense
    Understand mobile risk: Lookout Mobile Threat Defense
    Marius Rohart, Security Sales Engineer EMEA, Lookout Jun 9 2020 9:00 am UTC 46 mins
    Enterprises must securely enable employees to work remotely.

    More and more enterprises recognise the need to allow employees to work remotely. However, as mobile access to cloud resources increase, data is exposed to cyber threats such as phishing, unreliable Wi-Fi networks and social engineering attacks.

    Join Lookout for this 30-minute webinar where we will cover:

    - The mobile threat landscape
    - How to securely enable a remote workforce
    - How to protect cloud data from phishing and social engineering attacks
    - How Lookout provides visibility into mobile threats
  • Security Validation - what is it and how can it improve security effectiveness?
    Security Validation - what is it and how can it improve security effectiveness?
    Mike Batten - VP Sales Engineering EMEA, FireEye Jun 9 2020 9:00 am UTC 60 mins
    In order to stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:

    -Who are the attackers that target my industry and what techniques do they use?
    -Which alerts matter most and how do I respond?
    -Are my tools, controls, processes working as expected?
    -Where should I focus improvement efforts?

    Join Mike Batten, VP Sales Engineering EMEA, for our upcoming webinar to:

    -Learn how cyber threat intelligence can inform which attackers target your industry and understand the techniques they employ
    -Find out how continuous validation can pinpoint where you have gaps so you can target improvements where they are needed
    -Understand how validation technology powered by relevant intelligence can generate proof of effectiveness and reduce risk
    -View the results of a recent security effectiveness report, spanning the production environments of multiple industries and enterprises

    Register Now!
  • Virtual Cyber Attack Simulation
    Virtual Cyber Attack Simulation
    Michael Trevett, UKI Mandiant Director, FireEye with external panellists Mark Deem, Partner, Cooley LLP Jun 9 2020 9:00 am UTC 90 mins
    Did you know that 90% of successful cyber-attacks rely on human error by any one member of staff?
    It is common to assume that cyber security is the sole responsibility of your IT or security team. However, in many cases all it takes is one click on an email or a visit to a website which has been successfully attacked for you to cause a security breach in your organisation.
    So how do you know what to look out for and how do you mitigate the risks of a breach when it does occur?
    Join the FireEye Mandiant Consultants along with external panel of experts in our Cyber Attack Simulation as we experience a successful breach first hand;
    •See the impact of the attack on an organization
    •the level of resource needed to resolve an attack, and
    •the overall potential impact an attack might have on your business
  • Measure, improve & optimize your cybersecurity with Mandiant Security Validation
    Measure, improve & optimize your cybersecurity with Mandiant Security Validation
    Lluis Coma, EMEA Consulting Sales Engineer, FireEye Jun 9 2020 11:00 am UTC 60 mins
    Mandiant Security Validation allows you to accurately assess a company's security posture. We help our clients take a proactive approach to identifying and mitigating risks due to incorrect configurations, inefficiencies in products, and / or established security processes.

    Register for the webinar and find out how Mandiant Security Validation enables you to:

    • Evaluate your security posture in order to prioritize investments;
    • Optimize the configuration of your technologies to maximize the return on investment;
    • Compare your security with market standards such as MITRE ATT&CK Framework and others;
    • Test the correct operation of your DLP-type tools;
    • Measure the security of your security processes in the CLOUD;
    • Validate the correct operation of your Endpoint tools;
    • Confirm network segmentation in IT / OT / SCADA environments.

    The results can be extremely interesting for managers of SOCs, CISOs and for the Board of Directors.
  • The modern Identity Fabric
    The modern Identity Fabric
    Hanns Nolan and Olivier Naveau Jun 9 2020 12:00 pm UTC 60 mins
    This Talk is discussing how to transform your IT landscape to sustain new business requirements and how an innovative Digital Identity Fabric will support your transformation efforts.
  • Spotlight on... Apiax
    Spotlight on... Apiax
    Cédric Neuville, Head of Delivery, Wealth Dynamix Jun 9 2020 1:00 pm UTC 30 mins
    We are excited to launch ‘Spotlight on…’, a new series of webinars where we sit down for a cozy fireside chat with our partners from the wealth management industry.

    In this episode we welcome Ralf Huber, Co-founder of Apiax, to discuss

    •What are the current technology related challenges and opportunities in wealth management?
    •What combination of technologies can help wealth managers embrace the new way of working?
    •When you look at the technology capabilities and resources now available to the wealth management sector, what excites you most?

    Look out for more exciting discussions in this webinar series!
  • How To Create World Class Customer Service - Lessons from Aileen Allkins
    How To Create World Class Customer Service - Lessons from Aileen Allkins
    Aileen Allkins, Recent Microsoft Global Vice President, Customer Service & Support Jun 9 2020 3:00 pm UTC 60 mins
    Delivery of great service to earn customer loyalty is the goal of all Customer Service and Support (CSS) leaders. For years we have known that satisfied employees will mean higher customer satisfaction. So, how can we empower our workforce so they are highly satisfied and thus, highly engaged?

    Our front-line teams, who represent our brand and often have more touchpoints with our customers than anyone else, have an incredibly tough job. They deal with unhappy customers, see the flaws in our products and services, and are often under-equipped in terms of tools and training to deliver the level of service we aspire to achieve.

    Aileen Allkins, recent Microsoft Global Corporate Vice President and a 30-year CSS veteran will share how to develop a thriving, loyal, and engaged CS workforce with an emphasis on the connection between a company’s mission, its culture, people and customers. This webinar will offer insights on:

    • How to design a pathway to achieve differentiation through your
    front-line teams
    • Creating a highly engaged and satisfied workforce even in difficult
    circumstances
    • Setting this to work across medium to large-scale Customer Service
    and Support organizations


    Our Presenter: Aileen Allkins
    Over the course of her 30-year career, Aileen Allkins has been transforming the CSS experience of some of the world’s best-known technology companies. She was most recently the Corporate Vice President of Global CSS at Microsoft, leading a diverse and international team of over 25,000 service professionals to provide world-class support for millions of customers. At Microsoft, Aileen was responsible for leading the CSS organization to achieve numerous industry awards. She has a genuine passion for people and is a strong advocate for front-line teams. Aileen is a fan of KT. During her tenure at Microsoft and Hewlett Packard, she has deployed Kepner-Tregoe tools and practices across both organizations
  • Take Control of Your Cloud Environments
    Take Control of Your Cloud Environments
    Martin Holste, Cloud CTO; Lisun Kung, Sr. Director; Joshua Bass, Sr. Manager; Matthew McWhirt, Mandiant Director Jun 9 2020 3:00 pm UTC 60 mins
    Complex cloud environments are a reality for many enterprises and organizations, and managing them is a requirement. But it can be done. Learn firsthand how FireEye delivers world-class capabilities to prevent, detect, and respond to security threats in and from the cloud.

    This Virtual Summit session covers:
    -Ways to gain greater visibility across hybrid, public, private, and multi-cloud environments
    -Expectations of the shared responsibility model
    -Pitfalls when approaching a move to the cloud
    -Best practices based on real-world use cases

    Register Now!
  • How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness
    How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness
    Chris Key, Sr. VP Mandiant Security Validation featuring Josh Zelonis, Principal Analyst, Forrester Jun 9 2020 4:00 pm UTC 60 mins
    Proactive Security Operations: How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness

    With economic uncertainty and an evolving threat landscape, organizations must prove their effectiveness across various operational functions, especially cyber security. While they usually focus on detection and response capabilities, they need to do more to develop proactive security operations.

    Join this webinar on Tuesday, June 9 at 9 a.m. PT/ 12 p.m. ET as FireEye Sr. VP of Mandiant Security Validation, Chris Key and featured speaker, Forrester Principal Analyst, John Zelonis highlight the:

    -MITRE ATT&CK knowledge base and how it can be used to help test your security posture and prove effectiveness
    -Importance of relevant threat intelligence for your organization and how its application can help pinpoint failure points
    -Impact of environmental drift on your security posture and how to plan for it
    -Evidence continuous validation delivers to prove effectiveness, reduce costs and optimize your security infrastructure

    Register Now>>
  • Tips for Securing Your Cloud Environments
    Tips for Securing Your Cloud Environments
    Chris Romano, Mandiant Senior Consultant and Greg Blaum, Mandiant Principal Consultant Jun 9 2020 5:00 pm UTC 60 mins
    For the last several years, organizations around the world have been moving applications and services to the cloud at an increasing pace. Despite this investment, many organizations fail to fully understand the security controls they have at their disposal and fail to effectively harden their cloud environments against attack. As a result, FireEye Mandiant experts have observed a significant rise in cloud-related breaches driven by both targeted and opportunistic threat actors over the past several years.

    In this session, Mandiant consultants Greg Blaum and Chris Romano share lessons learned from real-world incident response experiences, identify some common pitfalls and provide best practices for organizations to harden their cloud environments and reduce the risk of compromise. They also discuss the pitfalls and best practices presented in M-Trends 2020.
  • What Institutional Investors Really Think About Cryptocurrency
    What Institutional Investors Really Think About Cryptocurrency
    Kim Grauer, Head of Research at Chainalysis Jun 9 2020 5:00 pm UTC 60 mins
    Do cryptocurrencies offer real diversification benefits for institutional investors?” This is the question Michael Sonnenshein fields nearly every day in his conversations with family offices, hedge funds, and other institutions. In his role overseeing Grayscale, the world’s largest digital currency asset manager, Michael has unique insights into what institutional investors are thinking and how an allocation to crypto can support their strategies. In this virtual “fireside chat,” Michael sits down with Kim Grauer, Head of Research at Chainalysis, to unpack the investment thesis behind digital currencies and discuss why cryptocurrency as an asset class might be having a moment this year.

    About Michael:
    Michael Sonnenshein is the Managing Director at Grayscale Investments, the world’s largest digital currency asset manager with more than $2.4 billion in assets under management its family of 10 products – all of which provide access and exposure to the digital currency asset class in the form of a traditional security without the challenges of buying, storing, and safekeeping digital currencies directly. In this role, Michael oversees the daily operations and growth of the business and its assets under management.

    About Kim:
    Kim is the Head of Research at Chainalysis, where she examines trends in cryptocurrency economics and crime. She was trained in economics at the London School of Economics and in politics at Oxford University. Previously, she explored technological advancements in developing countries as an academic research associate at the London School of Economics, and was an economics researcher at the New York City Economic Development Corporation.
  • Rethink Cyber Defense Strategies Starting with Threats
    Rethink Cyber Defense Strategies Starting with Threats
    Peter Watts, former Director for Cybersecurity Policy, National Security Council Jun 9 2020 6:00 pm UTC 60 mins
    Many organizations define cyber defense strategies based on fears or fines: decisions makers are often influenced by the latest news headline or the next audit.
    Today, threat intelligence content levels have evolved to reach new readers or enable innovative use cases. Consequently, threat intelligence can inform how you optimize cyber strategies, from essential high-quality detection to alert investigation and the reduction of enterprise threat surfaces.
    In this session, Peter Watts, threat intelligence veteran and former Director for Cybersecurity Policy, National Security Council lays out:

    • A modern definition of threat intelligence with important milestones
    • How to recognize and develop critical success factors for producing or consuming threat intelligence
    • The impact of actionable threat intelligence on security risk leaders and their organizations
    • Future use cases that may reshape how we think about cyber defense and business value
  • Proactive Solutions to Stop Modern Ransomware in its Tracks
    Proactive Solutions to Stop Modern Ransomware in its Tracks
    Nader Zaveri, Incident Response Mgr; Matt Bromiley, Principal Consultant; Kimberly Goody, Threat Intelligence Sr. Mgr. Jun 9 2020 7:00 pm UTC 60 mins
    Ransomware is one of the most active and profound cyber threats facing organizations today. Years after Wannacry attacks shuttered businesses across the globe, stealthy ransomware infections continuously dominate headlines and board discussions. Attackers have developed advanced techniques that now require organizations to apply a holistic security risk mitigation strategy from the C-suite to practitioners.

    This webinar brings together Mandiant incident response, threat intelligence and managed detection and response experts to discuss strategic and tactical solutions that will help your organization:

    • Learn modern ransomware trends and attacker behaviors observed on the frontlines
    • Realize why proactive assessment is critical when preparing for and preventing ransomware
    • Understand how threat intelligence, hunting, and response provides the decision support and detection needed to outmaneuver ransomware actors
    • Implement effective mitigation strategies to stop ransomware attackers in their tracks

    Register today to join Nader Zaveri – Incident Response Manager, Matt Bromiley – Managed Defense Principal Consultant, and Kimberly Goody – Threat Intelligence Senior Manager, as they provide expert insights on modern-day ransomware attacks and how best to mitigate them.
  • Considerations for Evolving to Intelligence-Led Security
    Considerations for Evolving to Intelligence-Led Security
    Gina Hill, Principle Consultant, Mandiant & Duke McDonald, Consultant, Mandiant Jun 9 2020 8:00 pm UTC 60 mins
    An intelligence-led security posture and program recognizes that cyber threat intelligence has the potential to help keep organizations ahead of adversaries. The challenge is how to effectively and repeatedly make proper use of the intelligence that organizations collect and consume. Ultimately, organizations need to be able to understand the return on their threat intelligence investments.

    Mandiant Threat Intelligence experts Gina Hill and Duke McDonald present an in-depth explanation of what it means to be intelligence-led, how organizations should seek to increase intelligence maturity and capability, and how to get started on this journey.

    Join this session to learn:
    • The definition, characteristics and caveats of an intelligence-led security approach
    • Things to consider when assessing and evolving intelligence maturity
    • The importance of frameworks when assessing, measuring and executing on your strategy

    Register Now
  • Ransomware Trends with A Focus on MAZE
    Ransomware Trends with A Focus on MAZE
    Steve Ledzian VP, CTO - APAC, FireEye Jun 10 2020 2:30 am UTC 60 mins
    Ransomware threat actors are upping their game along with their ransom demands, which are climbing into millions of dollars. Large organizations with significant security controls in place are still falling prey to the attackers' tactics. This session examines how ransomware has evolved, and more importantly, what you can do about it. Come learn how to can gain some control your next ransomware experience.
  • 2020 webinar series: Asian market outlook - Asian fixed income
    2020 webinar series: Asian market outlook - Asian fixed income
    Endre Pedersen, CIO, Fixed Income, Asia ex-Japan | Fiona Cheung, Head of Credit, Asia Jun 10 2020 3:00 am UTC 60 mins
    With many countries and regions in Asia gradually easing their COVID-19 restrictions and resuming work, is now the time for investors to review their portfolios? If so, what are the investment themes that will drive Asian and Greater China markets?

    In our webinars, you can find out what Manulife Investment Management’s experts think will happen next and where investment opportunities lie in Asian markets. What’s more, you will have the opportunity to submit your questions during the live Q&A session.

    Hear from our speakers why Asian bonds which have high credit quality is an increasingly attractive asset class.