Hi [[ session.user.profile.firstName ]]

Health IT

  • Case Study: How a Large Financial Services Company Utilizes Email Fraud Defense
    Case Study: How a Large Financial Services Company Utilizes Email Fraud Defense
    Rich Wegner, Sr. Cybersecurity Engineer - Financial Services & Ryan Terry, Product Marketing Manager - Proofpoint Recorded: Sep 12 2019 52 mins
    Email fraud has cost organizations of all sizes and in all industries billions of dollars in losses. As the number one threat vector to businesses, email must be authenticated to restore trust to business communications. So what is the best way to accomplish this?

    Join us for our case study with one of the largest financial services companies as we examine how they are using Proofpoint's Email Fraud Defense (EFD) to help stop email spoofing attacks in their tracks.

    In this session, we'll share:
    - The benefits of deploying DMARC email authentication
    - How the organization is utilizing Proofpoint's EFD
    - How to strengthen your secure email gateway to better protect your end users
  • How Intelligent Data Governance Increases KPN’s Value to Customers
    How Intelligent Data Governance Increases KPN’s Value to Customers
    Zimma Kluit, Metadata Product Owner, KPN, Thomas Brence, Director, Product Marketing, Informatica Recorded: Sep 12 2019 30 mins
    Data needs to be a business asset, from the board of directors on down, and the team at KPN took this message to heart. In order to ensure that they could create a valuable experience for their customers, they needed to know what data they had, who was responsible for it, and if it was high quality. Without completing these basic steps they couldn’t consider their data to be valuable. During this informative webinar, the team from KPN will share how they have put data in control in order to:
    • Comply with regulations
    • Drive faster innovations
    • Optimize operations
    Together with Informatica’s Intelligent Data Governance products, KPN has been able to design a solution that is purposefully built for their team members, captures the right data and information, and can scale across their enterprise through automation.
    Join us to learn how their Intelligent Data Governance solution is:
    • Valuable
    • Scalable
    • Agile
    • Secure
  • Email Security: Why Now Is The Time To Review Your Strategy
    Email Security: Why Now Is The Time To Review Your Strategy
    Adenike Cosgrove, International Cybersecurity Strategist Sep 26 2019 9:00 am UTC 60 mins
    Nearly 100% of attacks require a human to click. Cybercriminals target people, largely via email, rather than systems and infrastructure. Security trams are spending over half of their time responding to phishing attacks. It’s never been more critical to have an effective and accurate email gateway that can identify and stop these attacks and provide the right forensics and visibility into who your most attacked people are.

    Legacy solutions cannot provide this visibility and are behind the curve in stopped advanced email threats.

    Join us to gain insights into:
    How the email threat landscape has changed with attackers evading legacy approaches;
    How leaders like Proofpoint have innovated to keep up;
    Our recommendations on the steps you must take to protect your people from email-based targeted attacks.
  • Preparing for the CCPA With Privacy Governance That Scales
    Preparing for the CCPA With Privacy Governance That Scales
    Nathan Turajski , Data Governance & Privacy, Informatica Recorded: Sep 11 2019 26 mins
    As home to Silicon Valley high tech and the global media capital in Hollywood, California helps lead innovation as the world’s fifth-largest economy. But the state’s citizens also have personal data at risk as they adopt Internet of Things (IoT) devices and share their personal and household information online. As a result, California has also become an innovator in legislation designed to protect personal information privacy, from the early days of SB 1386 for breach notification to the California Consumer Privacy Act (CCPA) taking effect in just a few short months from now. Are you prepared to do business with California citizens after January 1, 2020?

    Join Nathan Turajski, Sr. Director, Data Privacy and Protection, as he reviews the CCPA, where you will learn:
    - How privacy regulation is evolving beyond GDPR and prior mandates
    - How a Data Privacy Governance Framework can help reduce risk
    - How keeping data safe for business helps accelerate next-generation analytics, cloud migration, customer 360 insights, and more
  • 53 solutions to your biggest IT hurdles with G-Cloud 11
    53 solutions to your biggest IT hurdles with G-Cloud 11
    Andy Webb, Head of Products Recorded: Sep 11 2019 24 mins
    The G-Cloud framework has been live since 2012 and allows UK Public Sector organisations to search over 25,000 services listings for hosting, software and support services from any one of the 2,800 suppliers. So far, over £6bn has been spent through this framework.

    July marks the launch of G-Cloud 11 which has been the busiest iteration of the marketplace yet for UKCloud with a total of 53 services being listed aimed at solving some of your biggest cloud computing challenges.

    To guide you through all of this, UKCloud Head of Products Andy Webb delivers a 20-minute webinar packed with invaluable guidance on how UKCloud’s latest updates can help you solve some of your greatest IT hurdles.

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • How to Tackle Federal Data Strategy w/ Data Inventory & Cataloging
    How to Tackle Federal Data Strategy w/ Data Inventory & Cataloging
    Informatica's Michael Anderson, Federal Chief Strategist & Michael Tomechak, Big Data Domain Expert Recorded: Sep 10 2019 25 mins
    Policy mandates and initiatives such as the Federal Data Strategy are moving agencies to become better stewards of data. But how can you deliver on mission outcomes with data? Building a Federal Data Strategy can never be a “one and done” initiative. Instead, it’s a process that continually evolves as your Agency’s goals and challenges change.
  • IT Security: from Complacent to Critical (EMEA)
    IT Security: from Complacent to Critical (EMEA)
    George Anderson, Director of Product Marketing, Webroot Recorded: Sep 10 2019 50 mins
    ** This is an EMEA focused webinar **

    IT security for small to medium-sized businesses (SMBs) has turned from a situation where clients were complacent about IT Security to it now being a critical, high-demanded service offering.

    This presentation looks at what has driven this shift in client attitudes, and how IT security needs to rapidly evolve to give MSPs access to the expertise and security technology they need to thrive.

    Many MSPs are struggling with this new reality. This presentation will help you evaluate the IT security options open to you.
  • Automate the security and governance of APIs and microservices
    Automate the security and governance of APIs and microservices
    Aaron Landgraf, Senior Product Marketing Manager, MuleSoft & Edgar Ortiz, Senior Solution Engineer, MuleSoft Recorded: Sep 6 2019 33 mins
    Explore Anypoint Security, a suite of capabilities that makes APIs, microservices and integrations running on Anypoint Platform secure and governable by default.

    In this webinar, you'll learn how to:
    - Protect your APIs and microservices from denial of service and content attacks
    - Detect and tokenize sensitive data in-transit across your application network
    - Apply automated policies to enable security by default
    - Move towards a zero-trust architectural model
  • Live Demo: Security Awareness Training
    Live Demo: Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Sep 5 2019 30 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Die heutigen ITSM-Herausforderungen prägen den Geschäftserfolg von morgen.
    Die heutigen ITSM-Herausforderungen prägen den Geschäftserfolg von morgen.
    Markus Bause; Pierre Aeschlimann Recorded: Sep 5 2019 49 mins
    In diesem Webinar zeigen wir Ihnen wie Sie die neuesten ITSM Trends nutzen können, damit Ihre Organisation auf die kommenden Entwicklungen vorbereitet ist. Das sind die Diskussionpunkte:
    - Die aktuellen Herausforderungen und Trends, die bereits die Zukunft von ITSM prägen.
    - Die neuesten ITSM-Fähigkeiten, die Ihnen helfen, effizienter zu sein, eine höhere Benutzerzufriedenheit, eine schnellere Betriebseinführung und niedrigere Gesamtbetriebskosten zu erreichen.
    - Wie sieht das ITSM von morgen aus und was sind die Vorteile für Ihr Unternehmen, einschließlich der Zukunft von Self-Service, des Wissensmanagements der nächsten Generation, der no-code Automatisierung und des reibungslosen Betriebs.
  • How Kelly Services Uses MDM & iPaaS for Data Estate Modernization
    How Kelly Services Uses MDM & iPaaS for Data Estate Modernization
    Ravi Ginjupalli - Kelly Services, Venkat Gupta - Capgemini, Monica Mullen - Informatica Recorded: Sep 4 2019 52 mins
    At 70 years, Kelly Services is a global workforce solution company serving 91% of Fortune 100 companies with more than 1 million workers in the talent supply chain. In 2017, Kelly Services began modernizing its data platform with a cloud-first strategy to quickly connect the right talent with the right customers. Critical to the success of Kelly Services is a multidomain strategy for MDM, starting with the customer domain.



    During this webinar you will hear how the company began on its MDM journey to a 360-degree view for an end-to-end approach to data estate modernization.



    Join us to hear from Ravi Ginjupalli, Sr. Director of BI & Analytics Integrations at Kelly Services and Venkat Gupta, Director of Insights & Data at Capgemini, as they review the technical design and architecture considerations necessary to meet business needs using Informatica iPaaS (Informatica Intelligent Cloud Services, IICS) to connect MDM in a hybrid cloud environment that includes Azure and Salesforce and multiple cloud-based services.
  • Top 10 Reasons Why You Should Hire a Coach
    Top 10 Reasons Why You Should Hire a Coach
    Kirsten Bunch, coach, speaker, and bestselling author Recorded: Sep 4 2019 46 mins
    Does it seem like you can’t go to a networking event without meeting a professional coach? Your friends rave about their coaches and you are wondering what all the hype is about. Should you get a coach? Is it worth the investment? That depends.

    Personal coaching is a $1 billion industry. Fortune 500 companies require coaches for many of their leaders. But what about the solopreneur and small business owner? What is the ROI of hiring your own coach?

    In this webinar, Mid-Career Transformation Coach and International Bestselling Author, Kirsten Bunch, will uncover the mystery of coaching and help you discover if it’s time for you to hire a coach.

    You’ll learn:

    •What a coach can do for you
    •How to decide if coaching is worth the investment (and how to make the case to your boss)
    •The brain science behind coaching

    About Kirsten

    Kirsten Bunch is a coach, strategist, speaker and bestselling author. She is a graduate of the The Co-Active Training Institute, the world’s premiere coaching and leadership training program. She also has two graduate degrees from New York University. Kirsten helps mid-career professionals reinvent their careers to align with how they want to show up in the world. Her clients, which range from a neuroscientist to a celebrity stylist, start new careers and businesses that are good for them and good for the world. Before starting her own business in 2016, Kirsten spent 25 years traveling to over 50 countries for game-changing organizations like the Rainforest Alliance and VisionSpring. She helped fundraise over $20 million and designed and managed social change programs in 10 countries. Kirsten lives in New Jersey and works with clients all over the world.
  • ITIL is dead! Long live ITIL!
    ITIL is dead! Long live ITIL!
    Josh Caid Recorded: Sep 4 2019 45 mins
    ITIL, as we used to know it, was a great framework for organis ing and rationalising our IT processes. But, as an industry, we built a lot of hard-to-move bureaucracy on top of it. These days, businesses have to change rapidly to stay competitive, can ITIL survive the transition?

    Short answer - yes, but only if ITIL evolves at the same pace as digital business revolution. And the good news is this: with V4, ITIL is making the leap out from the IT department into the entire organisational value chain. In this webinar, we'll be looking at some of these differences and how they can apply to your own Digital Transformation initiatives.
  • Next-Gen Enterprise Architectures: AI-driven Intelligent Data Platform
    Next-Gen Enterprise Architectures: AI-driven Intelligent Data Platform
    Darshan Joshi, SVP , Awez Syed, SVP, Amit Kara, Director Recorded: Sep 3 2019 30 mins
    Your data-centric strategies depend on your ability to deliver trusted data quickly – even as you manage more types of data across hundreds of systems and fast-changing technologies. Can your data architecture handle the challenge?

    Learn about Informatica's approach to taking a data-first view of data architectures in our complimentary webinar, "AI-Driven Intelligent Data Platform for Next-Gen Data Architecture." Darshan Joshi, Informatica's Senior Vice President of Technology, will discuss how Informatica's intelligent data management platform:

    automates tasks

    facilitates collaboration

    provides intelligent recommendations to guide user behavior

    Find out how to implement a new approach to data architecture that will make your business truly data-driven.
  • A simple guide to getting ahead of the growing cyber security threat
    A simple guide to getting ahead of the growing cyber security threat
    Chris Wright, Account Director at UKCloud Recorded: Sep 3 2019 11 mins
    The field of Cyber Security can be incredibly confusing to understand and navigate, Your security landscape is constantly evolving and it can be impossible to understand where your vulnerabilities lie and what tools & technology you should be procuring to deter and mitigate cyber threats.

    To remedy this, UKCloud & partner E2E assure have devised a solution - CloudSoc. CloudSoc makes your organisation's Cyber Security simple, by providing an end-to-end cyber security capability that gives you an 'always on' cyber defence solution that enables you to identify threats before they become incidents.

    Watch this webinar to learn more.

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • EMEA Threat Landscape: Volumes, Focus, & Shifting Targets
    EMEA Threat Landscape: Volumes, Focus, & Shifting Targets
    Ed Rowley, Senior Technical Engineer and Dan MarleyCook, Team Lead, Sales Engineer Recorded: Sep 3 2019 24 mins
    2019 is the year where individuals in organisations are taking center stage in the cybersecurity threat landscape. Bad actors have shifted their strategies beyond perimeter and endpoint attacks and now look at high value individuals who have privileged access or handle sensitive data.

    While not everyone is a VIP, anyone can be a VAP (Very Attacked Person). In this webinar, we explore the shifts in the EMEA threat landscape in the first quarter of 2019, the threats targeting VAPs, and share ways in which organisations can protect identified VAPs from targeted attacks.
  • [#1] Data Governance im Fokus: Der Weg zum "Data Quality Detective"
    [#1] Data Governance im Fokus: Der Weg zum "Data Quality Detective"
    Dagmar Hillmeister-Müller - Data Governance Sales Specialist / Thomas Bodenmüller-Dodek - Product Expert Big Data & Analytics Recorded: Sep 3 2019 58 mins
    Unternehmen spüren kontinuierlich die Auswirkungen mangelhafter Datenqualität; dennoch ist die Erkenntnis, was genau Datenqualität bedeutet, immer noch nicht genug ausgeprägt.

    In diesem Webinar betrachten wir einige der Auswirkungen und wie neue Ansätze zu Datenqualität die Nutzung von Daten innerhalb von Organisationen verändern. Wir sprechen auch darüber, wie neue technische Lösungen Unternehmen bei der Untersuchung und Diagnose von Ursachen mangelhafter Datenqualität unterstützen können und wie sich deren Behebung positiv auf die Leistungsfähigkeit eines Unternehmens auswirkt.

    Datenqualität ist ein Grundpfeiler erfolgreicher Data Governance und entscheidender Erfolgsfaktor bei vielen Unternehmensinitiativen – wir zeigen Ihnen, welches Instrumentarium Sie als „Data Quality-Detective“ benötigen.
  • Innovative contracting in Europe – a Trojan horse?
    Innovative contracting in Europe – a Trojan horse?
    Smita Sealey and Barry Farimond, ZS Associates, Malcolm Qualie, NHS England, Alain Boulanger, Filippo Drago Recorded: Sep 2 2019 64 mins
    Overview

    With pricing of drugs at the centre of political and social debate, the market access and pricing environment in Europe has become increasingly challenging over the years. Innovative contracting has since become a common route to overcome these challenges and ensure timely access for patients.


    Focus

    Join us on Monday 2nd September from 15:00-16:00 BST as we discuss the future of innovative contracting with our panel of European payers. Key topics to be covered include:

    To what extent and how contracting helps improve patient access?
    What prior successes and failures can teach us about designing contracts that deliver true value to the health systems?
    Can we avoid contracting and what would be the alternative?

    In the past decade, we have moved from simple discounting and traditional volume-based agreements to more complex value-based models involving measurement of health outcomes, risk-sharing and cost containment guarantees. The feasibility of these contracts tends to vary by EU market, dependent mainly on the available healthcare system infrastructure to collect and process data as well as other regulatory and philosophical differences.

    Ultimately, the question remains as to whether these agreements are a move towards better healthcare provision and more connected healthcare infrastructures, or are they slowing down access and creating administrative burden due to their complexity?
  • Data Warehouse Modernization: 10 Must-Haves for Analytics and AI Projects
    Data Warehouse Modernization: 10 Must-Haves for Analytics and AI Projects
    Dave Wells, Director, ​Eckerson, Vamshi Sriperumbudur, Portfolio Marketing, Informatica Recorded: Aug 29 2019 32 mins
    Are your data warehouses ready for advanced analytics and AI projects? Legacy data warehouses are ill-equipped to handle unstructured data complexities or today’s multi-cloud environments. But that doesn’t mean data warehousing is going away. Instead, your peers and competitors are modernizing their data warehouses, which, together with data lakes, form the basis of modern data architectures.

    Join experts from Eckerson Group and Informatica for an in-depth discussion of data warehouse modernization. You’ll learn about 10 must-haves for modernization and discover why modernizing your data warehouses is a natural next step in the evolution of data management.
    Make sure you’re prepared for tomorrow’s analytics.
  • 5 Foundational Elements of a Successful Enterprise Data Governance
    5 Foundational Elements of a Successful Enterprise Data Governance
    Thomas Brence, Dir Product Marketing, Data Quality and Governance, & Patrick Dewald, Sr. Dir of Data Governance Strategy Recorded: Aug 28 2019 41 mins
    In the webinar, “The 5 Foundational Elements of a Successful Enterprise Data Governance Program”, the Informatica Data Governance team will share how organizations can start their enterprise data governance journey.
  • How to Create a Modern IAM Framework for Healthcare.
    How to Create a Modern IAM Framework for Healthcare.
    Balraj Dhillon, Director, Engagement of Key Accounts Simeio Solutions, Stephen Payne, Principle Solutions Architect-ForgeRock Recorded: Aug 28 2019 55 mins
    Healthcare providers are using digital technology to access, secure, and share patient information in order to efficiently deliver care. Does your healthcare organization need assistance in securing and maintaining a single patient identity? Do you have an effective privacy and consent control model across your ecosystem? Without a comprehensive framework for patient data, many healthcare providers have incomplete data on patients that cannot be transferred or shared between and within differing organizations. This results in security, privacy, and data management challenges.

    In this joint ForgeRock and Simeio webinar, you will learn key strategies for modernizing your healthcare organization including:

    · Top challenges your peers face when managing data for authenticating patients, consent, and governing permissions for external physicians and partners

    · How to enable a secure, cost-effective privacy and consent model and data governance framework to unlock innovation

    · How to quickly deploy the right IAM solution for your organization, whether that is on-premise, multi-cloud, or in a hybrid model environment

    Join Balraj Dhillon, Director, Engagement, Key Accounts of Simeio Solutions, and Stephen Payne, Principle Solution Architect of ForgeRock, to learn how to modernize your healthcare organization.
  • What the Symantec Acquisition Means for Your Email Security Future
    What the Symantec Acquisition Means for Your Email Security Future
    Ryan Kalember, EVP of Cybersecurity Strategy for Proofpoint Recorded: Aug 28 2019 61 mins
    It’s official – the Symantec Enterprise Security business is being sold to Broadcom. You may be concerned about what this acquisition means for your Symantec email security solution. Legacy solutions are not able to keep up with today’s threat landscape and acquisitions create uncertainty. In this unpredictable time, it’s important that you have a solution for email security that is keeping up with the evolving threats.

    As a market leader in email security, Proofpoint can provide confidence in your email security future. Join us for an informational webinar to learn:

    - How the email threat landscape has changed with attackers evading legacy approaches
    - How leaders like Proofpoint have innovated to keep up
    - How we have helped customers migrate from legacy products to Proofpoint
  • Improve process and increase customer satisfaction through Service Automation
    Improve process and increase customer satisfaction through Service Automation
    Richard de Boer, Pink Elephant Recorded: Aug 28 2019 46 mins
    On 28 August at 11 a.m. (CET) Pink Elephant trainer Richard de Boer will be talking about Service Automation, looking at customer services in particular and how this can increase user satisfaction and the quality of services.
    The webinar will include a discussion on the theoretical framework (Service Automation Framework) and the various steps you need to shape, roll out and make Service Automation a success.
    Learn how Cherwell, a leading provider of Enterprise Service Management, can make this Service Automation process possible. With Cherwell, workflows, facility management and HR processes can easily be created within IT, as can a self-service portal which end users can initiate and work through.
  • Building a Culture of Security within Healthcare Organizations
    Building a Culture of Security within Healthcare Organizations
    Gretel Egan, Security Awareness Training Strategist, and Ryan Witt, Managing Director Healthcare Industry Practice Recorded: Aug 27 2019 59 mins
    Are you taking a patient-centric approach to cybersecurity? As a patient yourself, you no doubt care about the quality of your care... but you also want your personal data and medical history to remain private. Patient care is about more than caring for the body and mind. It’s also about data security.

    In this webinar, we will discuss the importance of visibility and agility when it comes to identifying end-user vulnerabilities, and how healthcare organizations can efficiently implement security awareness training and build a culture that prioritizes data, device, and patient security.

    Join us to learn:

    - What we mean by a “patient-centric” cybersecurity mindset
    - How to overcome common training obstacles and deliver the most effective cybersecurity education program
    - How to understand the current state of healthcare cybersecurity and the challenges faced by the industry
  • Cyberattacks: Q3 Review and Emerging Trends (EMEA)
    Cyberattacks: Q3 Review and Emerging Trends (EMEA)
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Sep 17 2019 10:00 am UTC 60 mins
    ** This is an EMEA focused webinar **

    This webinar will recap some of the major cybersecurity highlights of the past quarter.

    From high-profile attacks making a media splash, to emerging threat trends being tracked by our researchers, a Webroot threat analyst will take attendees through the highlights and lowlights of another busy quarter for cybercrime.
  • The SaaS Operating Model: Why Software Providers Need to Think Cloud
    The SaaS Operating Model: Why Software Providers Need to Think Cloud
    Nick Mayhew, Director of Partners at UKCloud Sep 17 2019 1:00 pm UTC 32 mins
    UKCloud proudly hosted a team of experts to discuss the merits of a SaaS based operating model.

    The end result? A short, 30-minute video jam-packed with hints and tips from people who have been there, done that. Must-watch viewing for anyone who’s unsure whether they should migrate their applications to the cloud.

    The Panellists
    •Nick Mayhew, Director of Partners, UKCloud
    •Chris Farthing, Founder & CEO, Advice Cloud
    •Dave Blackburn, Technical Director, Geoff Smith Associates
    •Andrew Wilson, CEO, Mylife Digital

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Big Data Strategies for Cell Therapy Manufacturing
    Big Data Strategies for Cell Therapy Manufacturing
    Scott R. Burger, MD, Principal of Advanced Cell & Gene Therapy, LLC and Heidi Hagen, Co-founder and CSO for Vineti Inc Sep 17 2019 2:00 pm UTC 90 mins
    The quest to retrieve, analyze, and leverage that data has become the new gold rush in life sciences. This presentation will discuss the role of big data in cell therapy process development, real time analytics and commercial scale manufacturing.
  • Enhancing Safety, Operations, and Experience with Computer Vision
    Enhancing Safety, Operations, and Experience with Computer Vision
    Mark Jules, Global VP, Hitachi Vantara | Sameer Sharma, Global GM, Intel Sep 17 2019 4:00 pm UTC 60 mins
    Video data has long supported safety and security efforts. But thanks to improvements in vision technology, machine learning (ML) and artificial intelligence (AI), and the ability to run analysis at the edge, there are innovative new uses for video data that improve safety, operations and customer experience.

    Join us in this live webinar where we’ll discuss:
    •The evolution of video technology and how it drives insights that improve the way we do business.
    •How video data and vision technology are used across various industries to drive ROI.
    •The technologies that drive these innovations and outcomes.


    About our speakers

    Mark Jules: Global Vice President, Smart Spaces and Lumada Video Insights, Hitachi Vantara

    Mark Jules leads Hitachi Vantara’s Smart Spaces business which provides solutions incorporating video technologies, internet of things (IoT) sensors and analytics to help organizations create smarter spaces that operate more efficiently. Mark served as CEO of Avrio RMS Group for more than a decade and was also the President and Founder of Protean Solutions, a provider of mobile platforms for battlefield and emergency communications.

    Sameer Sharma: Global GM (New Markets/Smart Cities), Intel

    Sameer Sharma is the Global GM (New Markets/Smart Cities) for IoT Solutions at Intel and a thought-leader in the IoT/mobile ecosystem, having driven multiple strategic initiatives over the past 19 years. He leads a global team that incubates and scales new growth categories and business models in IoT and Smart Cities. These solutions include intelligent transportation, AI and video, air quality monitoring and smart lighting in cities.

    Sameer has an MBA from The Wharton School at UPenn, and a Master’s in Computer Engineering from Rutgers University. He holds 11 patents in the areas of IoT and Mobile.
  • Life After Passwords
    Life After Passwords
    24by7Security, Inc Sep 17 2019 4:00 pm UTC 60 mins
    In this webinar, Alessandro Chiarini will explain why authentication based on biometric factors--facial, fingerprint, and voice—is the new minimum standard. With compound biometrics, it offers the level of protection necessary to secure healthcare organizations in today’s threat environment. Two-factor authentication? Multi-factor? Through this webinar, there will be a finer understanding of the dangers companies face and the tools available to confront them. Anyone responsible for securing access to controlled data or areas will benefit by this brief and pithy webinar.

    CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
  • 2019 Domain Fraud Report with Proofpoint
    2019 Domain Fraud Report with Proofpoint
    Roman Tobe, Product Marketing Manager Sep 18 2019 9:00 am UTC 48 mins
    Web domain fraud is a growing risk for businesses, employees, and their customers. Every year, threat actors register millions of domains to impersonate brands and defraud those who trust them. How can you protect your employees and customers from these fake sites?

    Join Proofpoint as our security expert discusses the latest research findings of the 2019 Domain Fraud Report, the latest trends shaping the domain landscape, and the tactics and activities of threat actors.

    In this session, we'll share:

    • Tactics threat actors take to trick employees and customers
    • Connection between fraudulent domain registrations and highly-targeted email attacks
    • How to protect your corporate domains
  • Four Ways to Publish a Book
    Four Ways to Publish a Book
    Michelle Tillis Lederman, CSP, PCC Sep 18 2019 3:00 pm UTC 60 mins
    In this webinar, Michelle Tillis Lederman joins us to discuss executive essentials.

    Michelle is known for her energetic, engaging, and authentic presentations. An expert on workplace communications and relationships, Michelle's mission is to help people work better together and advance their individual impact. She is an accomplished speaker, trainer, coach, and author of four books including the #1 new release The Connectors Advantage and the internationally recognized, The 11 Laws of Likability.
  • Designing Customer Experience for Next Gen Data and Analytics
    Designing Customer Experience for Next Gen Data and Analytics
    Cindi Howson, Chief Data Strategy Officer, Thoughtspot & Alan Brumley, OEM | Embedded & Edge CTO Sep 19 2019 3:00 pm UTC 60 mins
    In the age of digital transformation, customer experience is critical to maintain a competitive edge no matter what industry you are in. Differentiation requires innovative solutions that can process and provide immediate access to data and its contextual information.

    Today’s personalization and 360-customer demands require next-generation designs that support memory-centric architectures as well as offload technologies.

    Join Alan Brumley of Dell Technologies, and special guest Cindi Howson of ThoughtSpot, as they discuss industry trends and creative solutions to provide the best customer experiences for the evolving landscapes of today and tomorrow.
  • PCI DSS vulnerability scanning: A compliance practitioner’s perspective
    PCI DSS vulnerability scanning: A compliance practitioner’s perspective
    Danielle Russell,Group Product Marketing Manager and Caryn Seippel, Manager of Risk and Compliance Sep 19 2019 4:00 pm UTC 58 mins
    Industry data indicates that PCI DSS Requirement 11, "Regularly test security systems and processes," is the most commonly failed requirement. In this webcast, we’ll take a close look at PCI DSS vulnerability scanning requirements and discuss how to prepare for your PCI DSS audit with regular internal and external vulnerability scanning practices. AT&T Cybersecurity Compliance analyst, Caryn Seippel, will share a practitioner's perspective on addressing this challenging requirement as well as common mistakes and pitfalls to avoid.

    Attend this webcast to learn:

    - Which PCI DSS requirements map to vulnerability scanning and how
    - Best practices and tips from a compliance practitioner
    - How AT&T Cybersecurity solutions can help address PCI DSS vulnerability scanning
    - A live demo of USM Anywhere
  • Live Demo: How Email Fraud Defense Authenticates Your Emails Quickly & Safely
    Live Demo: How Email Fraud Defense Authenticates Your Emails Quickly & Safely
    Ash Valeski, Director, Product Marketing & Tanner Luxner, Product Marketing Manager of Proofpoint Sep 19 2019 5:00 pm UTC 45 mins
    Email spoofing attacks are on the rise and email authentication is a proven solution that can block these threats before they reach your employees, customers, and business partners. The challenge is deploying authentication is time-consuming, requires expertise, and brings the risk of blocking legitimate email. So how can you overcome this challenge?

    Join us for a live product demonstration and learn how Proofpoint’s Email Fraud Defense (EFD) is helping organizations deploy email authentication quickly and confidently.

    In this session, we'll share:

    - Our 360-degree visibility of the email coming into and being sent from the organization
    - EFD’s proven authentication deployment program
    - How Proofpoint strengthens your secure email gateway to better protect your employees
  • Hardening Office 365’s Email for Better Security & Availability
    Hardening Office 365’s Email for Better Security & Availability
    Matthew Gardiner, Dir. Enterprise Sec. Campaigns, Mimecast; Bruce Beam, CIO, (ISC)²; Brandon Dunlap, Moderator Sep 19 2019 5:00 pm UTC 60 mins
    Organizations of all sizes are accelerating their move to the cloud and are shifting critical applications such as email to Office 365 as a first step. The security and resilience of such a critical application is paramount for an organization’s communications, data availability, and governance strategies. Organizations experience a significant productively hit when their email or email-based data becomes unavailable. And of course, there are no shortage of phishing attacks which leverage email and target Office 365. How can you ensure the security and availability of Office 365’s email and better defend against those threats that can bring it down? Join Mimecast and (ISC)2 on Thursday, September 19, 2019 at 1PM Eastern for a discussion on the topic of security and availability, as well as strategies for moving such applications to the cloud more easily and securely.
  • PCoIP Ultra: the most advanced remoting protocol for virtual workstations
    PCoIP Ultra: the most advanced remoting protocol for virtual workstations
    Ian Main, Technical Marketing Principal - Teradici Sep 19 2019 5:00 pm UTC 30 mins
    What’s PCoIP Ultra? This webinar introduces Cloud Access Software with its latest enhancements designed for our most demanding users in VFX/media, engineering, medical and other verticals. Learn about how we support 4K HFR content, efficient scaling across multicore CPUs, and third-party codecs like H.264. See how the AVX2 instruction set boosts PCoIP Ultra performance metrics that illustrate our latest PCoIP advancements.

    Q&A to follow.

    Register today!
  • Building a Strong Office of the Chief Data Officer (CDO)
    Building a Strong Office of the Chief Data Officer (CDO)
    Juan Tello, CDO Deloitte LLP and Juan Riojas, CDO Informatica Sep 19 2019 6:00 pm UTC 46 mins
    Data is no longer an advantage; everyone has it. But how you harness data to power your business can give your organization a competitive edge. The CDO is a critical enabler among the leadership team, providing the executive ownership needed to enhance decision making, improve operational efficiency, and empower innovation.
  • Managing IT Services: Quick Start Guide for MSPs (EMEA)
    Managing IT Services: Quick Start Guide for MSPs (EMEA)
    Sue Gilkes, CompTIA Faculty, CompTIA Sep 23 2019 2:00 pm UTC 60 mins
    ** This is an EMEA focused webinar **

    Tried and true best practices established for building profitable managed IT service businesses certainly exist. This session explains those best practices and provides in-depth advice on six key actions for their implementation.

    From understanding the opportunity to developing a marketing plan to support a sales team, attendees will gain valuable insight into best practices for building their business.
  • ISSA International Series: New Trends in Security - Outsourcing and Other Tech
    ISSA International Series: New Trends in Security - Outsourcing and Other Tech
    ISSA International Sep 24 2019 4:00 pm UTC 120 mins
    As deployment models evolve so does the need for our responses. With technology such as Cloud, containers, and rapid update deployment rolling out, what's going on with security?
  • 2019 Security Congress Preview – Security Automation
    2019 Security Congress Preview – Security Automation
    Winn Schwartau, Chief Visionary Officer, The Security Awareness Co; Chuck Easttom, Professor, Capitol Technology Univ Sep 24 2019 5:00 pm UTC 60 mins
    (ISC)² will hold its 2019 Security Congress in Orlando, Fl Oct 28th – 30th. This conference will bring together a global community of cybersecurity professionals and more than 180 educational sessions. One of the 18 tracks at the conference will focus on Security Automation and the role that Machine Learning and Artificial Intelligence is playing in securing organizations of all sizes. On September 24, 2019 at 1 p.m. Eastern, join (ISC)² and several speakers who’ll be presenting in the Security Automation track on the Impact of Machine Learning on Cyber Security and Ethical Bias in AI-Based Security Systems as they preview their sessions and discuss why security automation is a leading concern for cyber security practitioners to understand.
  • Why Marketers Should Be Obsessed with Data
    Why Marketers Should Be Obsessed with Data
    Informatica's Bryan Weinman, Business Development Executive and Jennifer McGinn, Director Product Marketing Sep 24 2019 6:00 pm UTC 31 mins
    Marketers need a customer intelligence system that will help them:
    •Drive customer engagement, customer loyalty, and advocacy
    •Differentiate from the competition on the ability to understand the customer better

    Informatica Customer 360 Insights enables marketers to connect fragmented customer data and create a contextual 360 view to power digital and marketing transformation initiatives.
  • How to Automate your PKI and Data Security for IoT
    How to Automate your PKI and Data Security for IoT
    Paul Hampton, Thales and Rob Dobson, Device Authority Sep 25 2019 3:00 pm UTC 60 mins
    The Internet of Things (IoT) holds huge potential for your organization, but if you’re like most, you still have concerns about security. How can you be sure that the IoT solutions you deploy will enable you to guarantee the security of your organization and your customers?

    IoT will be a game changer due to the scope of data and devices, but it also promises to change the security paradigm. The future of IoT will rely on the ability to create a foundation of security, trust, and data integrity, whilst being able to seamlessly manage countless numbers of devices.

    Today there is no single vendor responsible for securing IoT. It takes an entire ecosystem of solutions providers working together and playing their part to ensure end-to-end security across the device, network and application.

    In this webinar, experts from Thales and Device Authority will share their industry expertise, looking at security risks of IoT devices and infrastructures across many industries including medical devices, industrial manufacturing and automotive - exploring what learnings can be implemented today. You can explore how you can take the first steps to keeping your IoT devices and data secure, and your organization and customers safe.

    The agenda will include a discussion around:
    • Risks and Challenges of IoT
    • Why use PKI for IoT?
    • How to automate security operations and management
    • Bring Your Own Key (BYOK)
    • Examples / Use Cases – Medical, Industrial, Automotive etc.
    • Thales & Device Authority Solution
  • Cyber-Threats in Healthcare: Understanding and Protecting Against the Risks
    Cyber-Threats in Healthcare: Understanding and Protecting Against the Risks
    Roman Tobe, Product Marketing Manager Sep 25 2019 5:00 pm UTC 52 mins
    Security is more critical than ever for healthcare organizations. At the same time, the sector has become one of the most easily targeted. Hospitals, for example, are falling victim to cyber-attacks such as ransomware and business email compromise (BEC). However, healthcare organizations attack surface extends beyond email.

    Cyber criminals create fake social media accounts and register fraudulent domains to attack their supply chain, defraud their customers and gain access to sensitive data. Join this webinar and learn how Proofpoint can help protect healthcare organizations from these targeted attacks.

    Join us to learn:

    - The state of cyber risks in healthcare
    - The latest trends in cyber threats targeting healthcare organizations
    - How Proofpoint can help protect your organization
  • Enterprise Data Governance – Scale or Fail
    Enterprise Data Governance – Scale or Fail
    Thomas Brence, Dir Product Marketing, Data Quality and Governance, & Patrick Dewald, Sr. Dir of Data Governance Strategy Sep 25 2019 6:00 pm UTC 41 mins
    This is the second webinar in the three-part Data Governance series.  At the heart of a successful Enterprise Data Governance program are people. Some are technical. Some are not. Some are located in the lines of business while others work in IT. Some have a particular view on data policies. Others are likely to disagree. No enterprise data governance program is perfect but in order to scale and be truly enterprise-wide, silos need to be broken.

    This is a great webinar for anyone dealing with silos that are holding back an enterprise data governance program. In this webinar, we will showcase how others have overcome these challenges and will share some best practices.
  • Cerebral Organoids as a 3D Model for Glioma
    Cerebral Organoids as a 3D Model for Glioma
    Amanda Linkous, Ph.D. Sep 26 2019 4:00 pm UTC 45 mins
    The prognosis of patients with glioblastoma (GBM) remains dismal with a median survival of approximately 15 months. Current preclinical GBM models are limited by the lack of a “normal” human microenvironment and the inability of many tumor cell lines to accurately reproduce GBM biology. To address these limitations, our guest presenter and her team have established a unique model system whereby they can retro-engineer patient-specific GBMs using patient-derived glioma stem cells (GSCs) and human embryonic stem cell (hESC)-derived cerebral organoids. Their cerebral organoid glioma (GLICO) model shows that GSCs home toward the human cerebral organoid, and deeply invade and proliferate within the host tissue forming tumors that closely phenocopy patient GBMs. Furthermore, cerebral organoid tumors form rapidly and are supported by an interconnected network of tumor microtubes that aids in the invasion of normal host tissue. This GLICO model provides a new system for modeling primary human GBM ex vivo and for high throughput drug screening.


    Guest Presenter Bio:
    Dr. Amanda Linkous previously served as the Director of the Starr Foundation Cerebral Organoid Translational Core at Weill Cornell Medicine (New York, NY). She completed her postdoctoral training in the Neuro-Oncology Branch at the National Cancer Institute (Bethesda, MD). Dr. Linkous is currently the Scientific Center Manager for the NCI's Center for Systems Biology of Small Cell Lung Cancer (SCLC) at Vanderbilt University, where she is developing similar 3D model systems to study the biology and refractory nature of SCLC (Nashville, TN)