Hi [[ session.user.profile.firstName ]]

Health IT

  • Sepsis Overview: Challenges and Solutions for Laboratories
    Sepsis Overview: Challenges and Solutions for Laboratories
    Mirta Gamez, MT(ASCP), CLS Recorded: Aug 16 2019 47 mins
    Sepsis presents a global healthcare crisis, with more people dying from sepsis than from prostate cancer, colon cancer, breast cancer and AIDS combined.(1,2) Early intervention is critical, and the clinical laboratory plays a crucial role in early detection.

    View this on-demand webinar to hear Mirta Gamez, MT(ASCP), CLS, explore the laboratory’s role in clinical sepsis diagnosis and treatment.

    After attending this webinar, you will be able to:
    -Articulate the basic etiology of sepsis and its impact on healthcare
    -Identify the challenges that affect the rapid diagnosis of sepsis
    -Guide how—and when—common sepsis biomarkers are used for detection and monitoring
    -Advise on the role of the laboratory in sepsis diagnosis and management

    P.A.C.E. credit is available for your participation.*

    (1)Kumar G A et al. “Nationwide Trends of Severe Sepsis in the twenty First Century (2000-2007). Chest, 2011;16:1223–1231. doi: 10.1378/chest.11-0352.
    (2)Hall MJ, Williams SJ, DeFrances CJ, Golosinsky A. “Inpatient Care for Septicemia or Sepsis: a Challenge for Patients and Hospitals.” Accessed on http://www.cdc.gov/nchs/data/databriefs/db62.pdf Apr 16, 2019.

    *Beckman Coulter Inc. is approved as a provider of continuing education programs in the clinical laboratory sciences by the ASCLS P.A.C.E.® Program. These credits are recognized by the State of California. At this time, we cannot issue continuing education credits for those who provide healthcare (or work for an institution that provides healthcare) in Massachusetts or Vermont.
  • From Skeptics to Champions: Selling the Value of Security Awareness Training
    From Skeptics to Champions: Selling the Value of Security Awareness Training
    Dale Zabriskie, Security Awareness Training Evangelist & Joe Krock, Cyber Training and Awareness Leader Recorded: Aug 15 2019 106 mins
    The value of security awareness training may be obvious to you and other cybersecurity professionals. But in order to launch a new or more comprehensive training program, you’ll need to convince management—and your end users. To make your case for security awareness training, speaking the language of your customer is key.

    Expect tough questions: What’s wrong with what we’re doing now? What measurable goals can the security awareness training program achieve? How does the program justify the cost? Users may have concerns the value of simulated phishing tests and whether training will interfere with their work.

    Taking the time to win over doubters and skeptics can reduce obstacles—and even turn them into future champions for your security awareness training program. In this webinar, you’ll learn about:

    - Best practices for selling the value of security awareness training internally
    - Preparing a business case for your training program
    - Engaging employees through creative programming, recognition, and incentives
  • Building a connected service experience with Salesforce Service Cloud
    Building a connected service experience with Salesforce Service Cloud
    Esther Chen, Product Marketing Manager, MuleSoft & Jimil Patel, Technical Product Marketing Manager, MuleSoft Recorded: Aug 15 2019 38 mins
    Salesforce Service Cloud to systems like ERP, OMS, and databases to give agents a single view of customers and orders. Rather than switching between different systems, agents can instead focus on delivering superior service. Together, MuleSoft and Salesforce increase agent productivity by 25% by automating workflows and service actions and improve customer satisfaction by 35% with personalization throughout the service experience.

    Watch this webinar to:
    * See a live MuleSoft Flow designer demo with Salesforce Service Cloud to create a holistic view of your customer.
    * Learn how customers are transforming their service experience using MuleSoft to synchronize Service Cloud with other systems of record.
    * Get best practices to integrate Service Cloud with ERP, OMS, and third-party systems.
  • The Power of 2: How Automated Threat Hunting & ATT&CK Can Work Together
    The Power of 2: How Automated Threat Hunting & ATT&CK Can Work Together
    Jason Bevis, VP Global Threat Hunting, Cylance; Alex Holden, CISO/Pres, Hold Security, Chip Wagner, Sec Analytics, IBM Recorded: Aug 15 2019 59 mins
    Many organizations are so busy responding to and remediating indents that they don’t have the time, resources or framework for being proactive and searching for these threats. Automation (artificial intelligence or machine learning) can provide actionable intelligence quickly without being a resource drain. Pairing automation with a threat hunting framework like the MITRE ATT&CK can help to build an overarching strategy for addressing this critical area. Join BlackBerry Cylance and (ISC)² on August 15, 2019 at 1:00PM Eastern for a discussion on how to better and more quickly identify malicious behaviors and how a model of continuous improvement can benefit an organization.
  • Vendor Risk Management for 2020 and Beyond
    Vendor Risk Management for 2020 and Beyond
    Sam Abadir, Lockpath Recorded: Aug 15 2019 48 mins
    Vendors are essential to your company's success; most organizations can’t operate without them. However, vendors require a different approach to risk management.

    Outsourcing your activities does not mean you outsourced managing the risk of those activities. The public, the regulators and the courts still hold you responsible. Without a considered approach to third-party risk management, the risk management of vendors and suppliers can easily get out of your control.

    In this live webinar, Lockpath’s Sam Abadir will share what vendor risk management for 2020 and beyond looks like, including:

    • What vendor risk management encompasses

    • How your organization can gain efficiency from proper vendor risk management

    • Advantages of managing vendors on an Integrated Risk Management or Governance Risk and Compliance platform

    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage vendor risk in 2020 and beyond by attending this educational webinar. Register now!
  • Total BS: Using Brain Science to Debunk & Transform the Business of Speaking
    Total BS: Using Brain Science to Debunk & Transform the Business of Speaking
    Alyssa Dver, CCO at American Confidence Institute Recorded: Aug 15 2019 62 mins
    This week Alyssa Dver joins us to discuss total BS; using brain science to debunk and transform the business of speaking.

    Join two of Boston’s best speakers as they candidly discuss why so many speakers fail -- and the real secrets to speaking success. Whether you’re a speaker or an event professional, learn a bit of brain science to give yourself, and your audience real, sustained confidence.

    Innovation Women founder Bobbie Carlton will act as both host and mythslayer while she interviews the refreshingly candid Alyssa Dver. After years as a CMO for several companies, Alyssa founded and now helms the American Confidence Institute and the ERG Leadership Alliance. She speaks professionally 8-10 times every month and has trained over 300,000 people how to use the science of confidence to pitch, coach and be kickass. As both pro speakers and event planners, Bobbie and Alyssa will share real secrets and science so you can have remarkable impact on your audience and your career. Seriously, no BS.
     
    Learn:
    -The benefits and challenges of being a part- or full-time pro speaker
    -How to use brain science to make speaking more fulfilling for you and your audience
    -Expert tips to optimize speaking revenue and/or career opportunities

    About Alyssa

    Alyssa Dver is Co-Founder and Chief Confidence Officer at the American Confidence Institute. Recognized as the world’s Chief Confidence Officer and one of Boston’s Best Speakers, Alyssa helps students and professionals use brain science to inspire confidence in themselves and to anyone they pitch, coach, or care about. Alyssa is the co-founder of the American Confidence Institute which conducts and collects research that is then shared through keynotes, workshops, online and certification programs. Clients include Spotify, Wayfair, Pepsi, The US Air Force, State Street, Staples, The Royal Bank of Canada, plus dozens of other confidence-committed organizations, conferences, and associations. 
  • Today’s State of S&OE
    Today’s State of S&OE
    Hear from Victoria Chen, who has been helping F500 companies achieve supply chain operational excellence for over a decade Recorded: Aug 14 2019 33 mins
    Time is running out, so register today to save your spot.
  • How to reduce IoT device onboarding time to seconds and improve IoT security
    How to reduce IoT device onboarding time to seconds and improve IoT security
    Richard Kerslake, Intel and James Penney, Device Authority Recorded: Aug 14 2019 57 mins
    Want to realize faster IoT device onboarding with additional security capabilities such as credential management and data security?

    Today, a manual process exists where device ownership is transferred, activated in the field, configured on the network, and registered with the device owner in an IoT management platform. This time-intensive and costly process is fraught with security holes, as exemplified by recent large-scale attacks in which device manufacturers have shipped default credentials that were co-opted for botnet-style DNS attacks.

    Imagine you’re going to install 10,000 smart light bulbs in a factory. How much time should you schedule? Before they can start streaming data, you need to key in each device identity, coordinate network credentials with IT, and register each device with the operational technology (OT) smart building control platform. If you guessed 20 minutes per bulb, you’re about right. For 10,000 bulbs, you’d need almost two years!

    You can imagine that if you have thousands and thousands of devices in larger projects this leads to quite some costs.

    Once you’ve onboarded the devices, what next?
    Do you need help managing credentials such as PKI certificates or default passwords?
    Do you have the correct level of data security and privacy for your use case?
    Are you leveraging automation without human intervention for IoT devices out in the wild?

    With speakers from Intel and Device Authority, the discussion will include:
    • Secure by Design: An approach to address IoT security challenges
    • Ownership transfer, zero-touch onboarding and registering of devices (in seconds!)
    • Credential management
    • Data security
    • Automation
  • Achieving Big Business Value from Big Data Initiatives
    Achieving Big Business Value from Big Data Initiatives
    Rick Karl, Vice President of Value Engineering, Zaloni Recorded: Aug 13 2019 34 mins
    ROI.
    Risk reduction.
    Cost savings.

    Ask 3 different people what their idea of business value means and you’ll often get three different answers. When you’re trying to implement an enterprise-wide data hub, it’s often necessary to show value early and often but how can that be easily done when there are multiple stakeholders?

    To justify the investment, it’s critical to show how your new data hub will meet the goals of IT, Finance, and any other departments involved in the initiative. By accurately measuring value, your project will be poised to cut costs, generate revenue, and radically transform the business.

    Join Rick Karl, Zaloni’s VP of Value Engineering, as he shows what’s needed when trying to highlight the value an enterprise data hub can provide to an organization.

    Topics include:
    - Challenges in demonstrating business value for complex data initiatives
    - How to perform a business value assessment for modern data efforts
    - Making the business case that aligns IT and Finance objectives
  • Securing the Multi-Cloud in the Age of Threats
    Securing the Multi-Cloud in the Age of Threats
    Raj Mallempati (CloudKnox Security) | Chris Schueler (Trustwave) | Tim Choi (Proofpoint) | Nathan Wenzler (Moss Adams) Recorded: Aug 8 2019 55 mins
    How are organizations handling security for their multiple clouds and applications? Join cloud and security leaders in an interactive discussion to learn about:
    - Multi-cloud reality
    - Addressing your cyber risk
    - Managing vulnerabilities, detecting breaches and responding to incidents
    - Automating security tasks across multiple clouds and applications
    - Recommendations for improving enterprise cloud security

    Speakers:
    - Raj Mallempati, COO, CloudKnox Security
    - Chris Schueler, Senior Vice President of Managed Security Services, Trustwave
    - Tim Choi, VP, Product Marketing, Proofpoint
    - Nathan Wenzler, Senior Director of Cybersecurity, Moss Adams
  • Webisode 4: Proofpoint Demo - Enterprise Information Archiving
    Webisode 4: Proofpoint Demo - Enterprise Information Archiving
    Tom Mahoney, Senior Archiving Sales Specialist; Jason Colvin, Senior Systems Engineer Recorded: Aug 8 2019 29 mins
    Developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content.

    Join us for the last of four webisodes to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance
  • Seven Steps to Effective Reputational Due Diligence
    Seven Steps to Effective Reputational Due Diligence
    John Arvanitis, Kroll; Tony Rock, Lockpath Recorded: Aug 8 2019 64 mins
    In today’s environment of evolving regulatory regimes and societal norms, more attention than ever is paid to how and with whom companies do business. As a result, effective reputational risk management is increasingly important for today’s compliance and ethics professionals. This webcast, “Seven Steps to Effective Reputational Due Diligence” discusses what organizations can do to protect and preserve its most important asset – its reputation.

    Topics covered include:

    • Creating a culture of compliance and accountability
    • Instituting and updating the code of conduct
    • Establishing a risk assessment methodology
    • Building a framework of communication and training related to reputation management
    • Crafting a third-party management strategy
    • Improving the Investigation and Reporting process
    • Instilling an Environment of Continuous Improvement
  • Webisode 5: Proofpoint Demo - Ramping Up People-Centric Cybersecurity
    Webisode 5: Proofpoint Demo - Ramping Up People-Centric Cybersecurity
    Craig Morell, Security Sales Engineer, Proofpoint Recorded: Aug 7 2019 36 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a demo to learn about the second phase of this maturity model, and see for yourself how the tools work. We'll discuss how to:

    - Identify and remediate account compromise attacks
    - Solve for data loss through email
    - Make your users more resilient against attacks through awareness training
  • Women & Money: 5 Steps to Create Financial Freedom
    Women & Money: 5 Steps to Create Financial Freedom
    Kelly Gushue, Founder & CEO at Personal Finance Warrior Recorded: Aug 7 2019 62 mins
    This week Kelly Gushue joins us to discuss steps to creating financial freedom.

    What does financial freedom mean to you? Female leaders need to think about making their money work for them because females live eight years longer than men and make $0.80 on the dollar. In this webinar, we will discuss five key steps to organize your money, think bigger about money and make your money work for you through investing. You will walk away with the Wealthy Warrior Woman Money System and a financial plan to own your financial power!

    Learn:

    •How to think bigger about managing your money
    •A new way to manage your money and accounts
    •How to maximize your retirement plan and investing
    •How to use speaking as a way to start building your wealth

    About Kelly

    Kelly is a financial professional with 15 years of investment, money management and personal finance experience. Kelly is passionate about empowering individuals to take ownership and responsibility of their personal finances. This is what inspired Kelly to establish Personal Finance Warrior, a financial consulting platform for women.
    Before starting her own company, Kelly served as a portfolio consultant at Natixis Global Asset Management. Kelly has also served in a variety of roles at top companies in the industry such as Citi and JPMorgan. Kelly is a Harvard graduate and received an MBA from the Booth School of Business at the University of Chicago.
  • Cloud Done Right! 9 Critical Elements for Success
    Cloud Done Right! 9 Critical Elements for Success
    Unisys - Raj Raman, Lakshmi Ashok, Allen McMichael, Lori Pierson, Lisa McLaine, Brenda Celeste Recorded: Aug 7 2019 63 mins
    Enterprises need to modernize their operations to grow and stay competitive. But changes to IT infrastructure can quickly get out of hand. This involves moving workloads from on-premises data centers to public-cloud, private-cloud and hybrid-cloud solutions. The process is challenging and time consuming, leaving many organizations struggling to meet their business initiatives. In this webinar we’ll describe the nine key attributes that enterprises must master to be successful.

    Please join us on July 24th to learn how Unisys CloudForte™ helps our clients accelerate their migration to the cloud, while mitigating their risk and managing their costs.


    Presenters
    •Lisa McLaine - Global Director - Cloud and Infrastructure Services
    •Raj R. Ramen - Chief Technology Officer - Cloud
    •Lori Pierson - Portfolio Head - Global Cloud, Infrastructure and Application Services
    •Lakshmi Ashok - Chief Technology Officer - Homeland Security and Critical Infrastructure
    •Allen McMichael - Head - Global Cloud Managed Service Operations
    •Brenda Celeste - Director - Analyst Relations, North America
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Aug 6 2019 33 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a live demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • 2019 Phishing Attack Landscape and Benchmarking
    2019 Phishing Attack Landscape and Benchmarking
    Perry Carpenter Recorded: Aug 5 2019 61 mins
    As a security leader, you’re faced with a tough choice. Even as you increase your budget for sophisticated security software, your exposure to cybercrime keeps going up!

    IT security seems to be a race between effective technology and clever attack methods. However, there’s an often overlooked security layer that can significantly reduce your organization’s attack surface: New-school security awareness training.

    Do you know how your organization compares to your peers of similar size?

    We just finished a big-data analytics exercise over the 18,000 customers we have and came up with new baseline phish-prone percentages…

    Watch it now!
  • Ransomware Hostage Rescue Manual
    Ransomware Hostage Rescue Manual
    Erich Kron, David Littman Recorded: Aug 5 2019 55 mins
    It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks.

    So, how can your organization avoid getting held hostage? Join us and Erich Kron CISSP, Security Awareness Advocate at KnowBe4 we look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and provide tips on what to do when you are hit with ransomware.
  • Top 5 IT Security Myths Your CISO Believes Are True...BUSTED!
    Top 5 IT Security Myths Your CISO Believes Are True...BUSTED!
    Roger Grimes, Erich Kron Recorded: Aug 1 2019 59 mins
    Roger Grimes and Erich Kron will help you decide how to invest your time and money wisely, how to implement worthwhile defenses, and what holes to plug so your organization gets the best bang for your security budget buck. Join them to uncover the truth behind the Top 5 IT Security Myths.
  • 10 Incredible Ways You Can Be Hacked Through Email
    10 Incredible Ways You Can Be Hacked Through Email
    Roger Grimes, David Littman Recorded: Aug 1 2019 61 mins
    Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer, Kevin Mitnick.
  • Beyond the Phish: A Snapshot of End-User Behavior
    Beyond the Phish: A Snapshot of End-User Behavior
    Dale Zabriskie CISSP, CCSK, Security Awareness Training Evangelist Recorded: Jul 31 2019 59 mins
    Phishing is one of InfoSec's longstanding threats. But for cybercriminals, email is just one entry point of many. How can you better prepare you and other end users in your organization for cybersecurity threats beyond email-based social engineering?

    During this session, we will share results from the Proofpoint’s Beyond the Phish® Report, which examines end-user understanding of a broad range of cybersecurity topics and best practices. The report features analysis of data related to nearly 130 million cybersecurity questions and offers insights into employee knowledge levels across 14 categories, 16 industries, and more than 20 commonly used department classifications.

    We’ll share:

    - The importance of assessing and training end users about cybersecurity threats beyond email-based social engineering
    - The strengths and weaknesses among end users across 14 cybersecurity topics, highlighting how end-user knowledge levels vary across industries which provides a benchmark to compare readiness within your organization
    - A more wholistic view of susceptibility by looking beyond knowledge assessments and training activities to discover how this data can differ from simulated phishing attacks
    - How you can use this information to reduce the risk of successful cyberattacks within your organization

    Join our experts as we dive into the report and share best practices and pitfalls as we stimulate a stronger security culture.

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Live Demo – Browser & Email Isolation to Protect Your Users in Minutes
    Live Demo – Browser & Email Isolation to Protect Your Users in Minutes
    Eric Schwake, Product Marketing Manager & Paul Wang, Technical Product Marketing Manager Recorded: Jul 30 2019 34 mins
    When your employees are browsing the web or accessing webmail, your organization can be facing a wide range of online threats. These can include ransomware, web-based & file exploitation, leaks of sensitive and confidential information, and catastrophic data breaches. Web isolation technology is one of the best ways to help you protect against these risks.

    Join Proofpoint’s Browser and Email Isolation live demo as we share:

    • How Proofpoint protects your users within minutes from web born threats from risky browsing and malicious email in both corporate and personal email
    • How Proofpoint’s new integration with Targeted Attack Protection (TAP) allows us to provide adaptive controls within corporate email to enhance security
    • How Proofpoint’s people-centric approach to Isolation stacks up against competitors
  • Cybersecurity in Healthcare: 3 Ways Organizations Can Mitigate Security Risks
    Cybersecurity in Healthcare: 3 Ways Organizations Can Mitigate Security Risks
    Mike Jude, Ph.D., Research Manager, Frost & Sullivan, Erin Benson, Director, Market Planning, LexisNexis Risk Solutions Recorded: Jul 25 2019 50 mins
    What is complicating healthcare cybersecurity?

    Solution providers need to articulate their value proposition, not only in business terms, but also in terms of the impact their technology will have on the delivery of healthcare and, ultimately, the wellbeing of the patient.

    Key Takeaways:

    • Identify primary barriers to establishing excellent healthcare cybersecurity.
    • What impact will IoT and cloud services, including computing and storage, have on healthcare cybersecurity?
    • What are the substantial growth opportunities?
  • Spiceworks On the Air: Fake News! How Hackers Are Using Headlines As Phish-Bait
    Spiceworks On the Air: Fake News! How Hackers Are Using Headlines As Phish-Bait
    Erich Kron, Justin Ong, Angie Mongtomery Recorded: Jul 25 2019 65 mins
    Extra Extra! Read all about it! Your users are far more likely to click on phish-bait when it references current events and other headlines they may be reading from other sources. So how can organizations stay ahead of this startling trend and keep their users in the know?

    On this episode of On the Air, we’ll be talking about exactly how and in what ways bad guys are successfully turning real news stories into clickbait, and what you should be doing about it. We’ll be talking with an IT pro from the Spiceworks Community as well as an expert from KnowBe4.

    Here’s what we’ll discuss:

    - Which types of news stories are more irresistible to your users than others
    - Keeping your training up to date and teaching your users how to spot fake news headlines
    - How to utilize these techniques in your own phish testing
  • Webisode 3: Future-Proof Your Legacy and Cloud Archive
    Webisode 3: Future-Proof Your Legacy and Cloud Archive
    John Pepe Archiving Specialist; Martin Tuip, Sr Product Marketing Manager Recorded: Jul 25 2019 58 mins
    Many organizations have already deployed a compliance solution but continuing adoption of the cloud for business processes eventually results in the reevaluation of the existing compliance infrastructure. With email and collaboration data in Office 365 growing daily and the need to meet compliance and legal requirements, you need to come up with a strategy of how to address legacy and cloud archive data that is future-proof.

    Join the third of four webisodes to discuss what a modern archiving strategy looks like, and how you can get there.

    In this session we'll discuss:

    - What’s involved in the move – policy, planning, and people
    - Challenges with O365 from a compliance and legal view
    - The ins and outs of archiving with Office 365
    - Industry trends
  • Reaching new customers by optimizing your product data
    Reaching new customers by optimizing your product data
    Hamaad Chippa, Director of Industry Consulting and Roland O Ehigiamusoe, Senior Manager, Consumer, Analytics and Cognitive Aug 20 2019 4:30 am UTC 32 mins
    Retailers are looking to reach customers in as many channels as possible – stores, e-commerce, mobile applications, and partner marketplaces. As one can imagine, managing these various touchpoints and relationships can be complex, especially ensuring information about products are properly defined. As online shopping grew in popularity, retail organizations stood-up dedicated support teams to manage sales and marketing, separate from the rest of the business. Customers now expect retailer companies to interact with them in a seamless manner, regardless of channel.To guarantee brand continuity, a uniform customer experience, and high customer satisfaction, retailers must diligently manage product data, making sure that products are represented properly across all channels. With better product information and insight, retailers will be to engage with customers in a more personal and meaningful way, driving additional revenue.
  • HTTPS: SSL Certificates and Phishing (EMEA)
    HTTPS: SSL Certificates and Phishing (EMEA)
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Aug 20 2019 10:00 am UTC 60 mins
    ** This is an EMEA focused webinar **

    When we see HTTPS at the beginning of a URL, or the accompanying lock icon in our browser’s address bar, we tend to think it means we’re safe from harm. But HTTPS isn’t really about security. It’s about privacy. That lock icon simply means any information we transmit on that site is encrypted. It makes no guarantees the destination itself is safe.

    Cybercriminals know users are trained to look for the lock icon in the address bar, and have been working hard to take advantage of that trust.

    Join our 30-minute webinar to learn more about the tradeoffs between privacy and security, and discover why HTTPS may not really be as secure as we think.
  • How To Gain Board of Director Support For Cybersecurity Initiatives
    How To Gain Board of Director Support For Cybersecurity Initiatives
    24by7Security, Inc Aug 20 2019 4:00 pm UTC 45 mins
    When a company makes their case to the Board of Directors and C-Suite, they don’t always seem to appreciate the urgency and often turn down your request for funding. As such, there must be a better way to gain Board and C-Suite support. Hear directly from Michael Orenchuk, Principal of 24by7Security, discuss how the Board of Directors interest in cybersecurity is increasing and how regular discussions with the Board has started to increase.

    CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Aug 20 2019 4:00 pm UTC 45 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a live demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Change Your Mind, Change Your Life
    Change Your Mind, Change Your Life
    Mia Zambarano, Psychotherapist, Lifestyle Coach & Author Aug 21 2019 4:00 pm UTC 60 mins
    Mia Zambarano joins us to discuss the importance of mindset and the way we think.

    Everyone has bad days, but do you have to simply put up with them? What can you do to dispel those nagging self-doubts and expose your potential? Cognitive behavioral techniques help create positive changes in all aspects of life – including business and personal.

    When you take control of your mindset and learn to use it in your favor, success follows. As a licensed psychotherapist, Mia can open a window into your thought processes and show you how they impact our realities. She will discuss how to crush our limiting thoughts and build self-belief.
     
    Learn how to:
    - Use the power of your mind for good
    -Crush negative thought processes and behaviors
    -Harness your super powers and control and create the life you want

    About Mia:

    Mia Zambarano is a Licensed Psychotherapist and Lifestyle Coach, specializing in cognitive behavioral work. Mia has worked as a psychotherapist in since 2015; where she specializes in child, adolescent and family therapy. In her coaching practice, Mia focuses on empowering individuals to create positive changes and improve their overall wellness. Mia received her Master’s in social work in 2015 from Boston University and has a Bachelor of Science in psychology from Sacred Heart University.

    Mia’s work involves understanding what contributes to our reality, the interactions between our thoughts, feelings, and actions, and ways to create a better reality for ourselves through better insight and positive thinking.
  • Webisode 6: Proofpoint Demo - Advanced People-Centric Cybersecurity
    Webisode 6: Proofpoint Demo - Advanced People-Centric Cybersecurity
    Joel Sierra, Security Sales Engineer, Proofpoint Aug 21 2019 5:00 pm UTC 38 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1. Gain deeper visibility into attacks and respond when things go wrong
    2. Solve for unified data protection
    3. Defend against email fraud and social media fraud
  • Reimagine Data Governance: Data Governance. Meet Data Security.
    Reimagine Data Governance: Data Governance. Meet Data Security.
    Andy Joss, Head of Solutions & Data Governance, Steve Holyer, Solutions Specialist, Informatica Aug 22 2019 4:30 am UTC 58 mins
    With organizations collecting an ever-increasing volume of data, the risk of a data breach or falling foul of a regulator is also increasing. Data security, privacy and protection is fast becoming a “must have” requirement within many data programs.

    Organizations are starting to realize that there are potentially great synergies in having a much closer understanding of their data from both a governance and security viewpoint. Add in Artificial Intelligence and automation for remediation, together these capabilities are proving to be significant allies in the continuous battle of cyber-security and enabling Data Governance programs.

    This webinar explores how these two worlds can now better understand the role that each has to play, in supporting and protecting their organization.

    As part of the Reimagine Data Governance series of webinars, Informatica will demonstrate how having a closer relationship between the worlds of governance and security can enhance existing data use and data security capabilities. And how you, in taking that holistic approach, can provide governed and protected data to achieve key business outcomes.
  • How to Leverage NIST CSF
    How to Leverage NIST CSF
    Sam Abadir, Lockpath Aug 22 2019 4:00 pm UTC 60 mins
    Many organizations have difficulty leveraging information in their cybersecurity and business operations to make the right risk decisions, establish the right risk priorities and appropriately allocate budget to best achieve their risk management goals.

    Many believe that NIST CSF is another standalone methodology instead of a tool designed to help your organization understand and build a roadmap to achieve the right level of cybersecurity. Successful NIST CSF programs help integrate, message and prioritize cybersecurity efforts not only within IT but across the entire business.

    In this live webinar, Lockpath’s Sam Abadir will share what implementing a NIST CSF solution entails, including:

    • Framework support
    • Budget expectations vs. reality
    • Correctly assessing an organization’s needs to implement NIST CSF
    • Proper management and management skills
    • Prioritizing cybersecurity within an organization

    Find out what you need to know to implement a NIST CSF solution by attending this educational webinar. Register now!
  • How to Prepare for the Inevitable Security Incident with Digital Forensics Essen
    How to Prepare for the Inevitable Security Incident with Digital Forensics Essen
    Danielle Russell, Group Product Marketing Manager & Aaron Genereaux, Sales Engineer Aug 22 2019 4:00 pm UTC 58 mins
    As soon as you detect a security incident or breach in your environment, things move fast. You need to be able to quickly ascertain what happened and how as well as which assets were involved, so that you can decide how to respond, mitigate impact, and report the incident to the business and any affected parties. In this critical time between detection and remediation, your digital forensics and incident response (DFIR) readiness is key to success.

    What does it take to be forensics-ready? Join AT&T Cybersecurity for a special session webcast on DFIR readiness.

    We’ll address the following questions:

    - What does DFIR readiness include? What frameworks exist?
    - What security tools and technologies are essential for DFIR?
    - How does an effective DFIR program utilize security orchestration and automation reduce time to response (TTR)?
    - How can AT&T Cybersecurity solutions help you accelerate and simplify your DFIR?

    Meet Your Hosts:
    Danielle Russell, Group Product Marketing Manager
    Aaron Genereaux, Sales Engineer
  • How to Design an Adaptable, Flexible and Compliant Social Selling Program
    How to Design an Adaptable, Flexible and Compliant Social Selling Program
    Roman Tobe, Product Marketing Manager Proofpoint & Jeremy Goldstein, Sr. Solutions Consultant Hootsuite Aug 22 2019 5:00 pm UTC 60 mins
    Social media presents a big opportunity to develop relationships with clients and prospects. But the myriad regulations around it can be hard to interpret. It’s easy for advisers to wind up non-compliant or feel stifled and avoid the channel altogether.

    If you’re like your peers, you may wonder how to create a great experience for clients and advisers while staying compliant. Adding to the challenge, regulations are evolving as regulators and firms continue to observe the nuances of social. So the question is how do you design a social selling program that’s compliant, flexible and adaptable?

    Join Hootsuite and Proofpoint as our experts share:

    - How top firms balance compliance with their adviser experience
    - What experts believe is in store for social selling and compliance in the future
    - How Hootsuite and Proofpoint provide a solution that enables advisers and protects firms
  • Conversational AI: Go beyond chatbots with intelligent customer and employee exp
    Conversational AI: Go beyond chatbots with intelligent customer and employee exp
    Kevin Fredrick, Managing Partner, OneReach.ai and Vishnu Samevedula, Senior Solution Engineer, ISV Partnerships Aug 22 2019 5:00 pm UTC 44 mins
    In this webinar we’ll attempt to go around the chatbot hype. With conversational AI, your customers and employees get the answers they need fast. It’s more than simple “if-then” logic; it incorporates natural language to make human-to-machine conversations more like human-to-human ones. The result? Increased customer engagement, continued trust and reliability in your business, and the ability to free up your best thinkers and doers to become more productive than ever before.

    Watch this live webinar to learn how to:
    - Automatically parse data, intent, and tasks from customer interactions using the power of Anypoint Platform combined with no-code/low-code conversational AI solutions from OneReach.ai
    - Build task-specific, channel-agnostic experiences by integrating data from systems and channels like Slack, SMS, Voice, WhatsApp, and Facebook Messenger.
    - Retool your team for operational efficiency by automating the known, handing off the unknown, and more.
  • Building a Culture of Security within Healthcare Organizations
    Building a Culture of Security within Healthcare Organizations
    Gretel Egan, Security Awareness Training Strategist, and Ryan Witt, Managing Director Healthcare Industry Practice Aug 27 2019 5:00 pm UTC 59 mins
    Are you taking a patient-centric approach to cybersecurity? As a patient yourself, you no doubt care about the quality of your care... but you also want your personal data and medical history to remain private. Patient care is about more than caring for the body and mind. It’s also about data security.

    In this webinar, we will discuss the importance of visibility and agility when it comes to identifying end-user vulnerabilities, and how healthcare organizations can efficiently implement security awareness training and build a culture that prioritizes data, device, and patient security.

    Join us to learn:

    - What we mean by a “patient-centric” cybersecurity mindset
    - How to overcome common training obstacles and deliver the most effective cybersecurity education program
    - How to understand the current state of healthcare cybersecurity and the challenges faced by the industry
  • Improve process and increase customer satisfaction through Service Automation
    Improve process and increase customer satisfaction through Service Automation
    Richard de Boer, Pink Elephant Aug 28 2019 9:00 am UTC 45 mins
    On 28 August at 11 a.m. (CET) Pink Elephant trainer Richard de Boer will be talking about Service Automation, looking at customer services in particular and how this can increase user satisfaction and the quality of services.
    The webinar will include a discussion on the theoretical framework (Service Automation Framework) and the various steps you need to shape, roll out and make Service Automation a success.
    Learn how Cherwell, a leading provider of Enterprise Service Management, can make this Service Automation process possible. With Cherwell, workflows, facility management and HR processes can easily be created within IT, as can a self-service portal which end users can initiate and work through.
  • What the Symantec Acquisition Means for Your Email Security Future
    What the Symantec Acquisition Means for Your Email Security Future
    Ryan Kalember, EVP of Cybersecurity Strategy for Proofpoint Aug 28 2019 4:30 pm UTC 60 mins
    It’s official – the Symantec Enterprise Security business is being sold to Broadcom. You may be concerned about what this acquisition means for your Symantec email security solution. Legacy solutions are not able to keep up with today’s threat landscape and acquisitions create uncertainty. In this unpredictable time, it’s important that you have a solution for email security that is keeping up with the evolving threats.

    As a market leader in email security, Proofpoint can provide confidence in your email security future. Join us for an informational webinar to learn:

    - How the email threat landscape has changed with attackers evading legacy approaches
    - How leaders like Proofpoint have innovated to keep up
    - How we have helped customers migrate from legacy products to Proofpoint
  • 5 Foundational Elements of a Successful Enterprise Data Governance
    5 Foundational Elements of a Successful Enterprise Data Governance
    Thomas Brence, Dir Product Marketing, Data Quality and Governance, & Patrick Dewald, Sr. Dir of Data Governance Strategy Aug 28 2019 6:00 pm UTC 41 mins
    In the webinar, “The 5 Foundational Elements of a Successful Enterprise Data Governance Program”, the Informatica Data Governance team will share how organizations can start their enterprise data governance journey.
  • How to Create a Modern IAM Framework for Healthcare.
    How to Create a Modern IAM Framework for Healthcare.
    Balraj Dhillon, Director, Engagement of Key Accounts Simeio Solutions, Stephen Payne, Principle Solutions Architect-ForgeRock Aug 28 2019 6:00 pm UTC 60 mins
    Healthcare providers are using digital technology to access, secure, and share patient information in order to efficiently deliver care. Does your healthcare organization need assistance in securing and maintaining a single patient identity? Do you have an effective privacy and consent control model across your ecosystem? Without a comprehensive framework for patient data, many healthcare providers have incomplete data on patients that cannot be transferred or shared between and within differing organizations. This results in security, privacy, and data management challenges.

    In this joint ForgeRock and Simeio webinar, you will learn key strategies for modernizing your healthcare organization including:

    · Top challenges your peers face when managing data for authenticating patients, consent, and governing permissions for external physicians and partners

    · How to enable a secure, cost-effective privacy and consent model and data governance framework to unlock innovation

    · How to quickly deploy the right IAM solution for your organization, whether that is on-premise, multi-cloud, or in a hybrid model environment

    Join Balraj Dhillon, Director, Engagement, Key Accounts of Simeio Solutions, and Stephen Payne, Principle Solution Architect of ForgeRock, to learn how to modernize your healthcare organization.
  • Data Warehouse Modernization: 10 Must-Haves for Analytics and AI Projects
    Data Warehouse Modernization: 10 Must-Haves for Analytics and AI Projects
    Dave Wells, Director, ​Eckerson, Vamshi Sriperumbudur, Portfolio Marketing, Informatica Aug 29 2019 6:00 pm UTC 32 mins
    Are your data warehouses ready for advanced analytics and AI projects? Legacy data warehouses are ill-equipped to handle unstructured data complexities or today’s multi-cloud environments. But that doesn’t mean data warehousing is going away. Instead, your peers and competitors are modernizing their data warehouses, which, together with data lakes, form the basis of modern data architectures.

    Join experts from Eckerson Group and Informatica for an in-depth discussion of data warehouse modernization. You’ll learn about 10 must-haves for modernization and discover why modernizing your data warehouses is a natural next step in the evolution of data management.
    Make sure you’re prepared for tomorrow’s analytics.
  • Innovative contracting in Europe – a Trojan horse?
    Innovative contracting in Europe – a Trojan horse?
    Smita Sealey and Barry Farimond, ZS Associates, Malcolm Qualie, NHS England, Alain Boulanger, Filippo Drago Sep 2 2019 2:00 pm UTC 75 mins
    Overview

    With pricing of drugs at the centre of political and social debate, the market access and pricing environment in Europe has become increasingly challenging over the years. Innovative contracting has since become a common route to overcome these challenges and ensure timely access for patients.


    Focus

    Join us on Monday 2nd September from 15:00-16:00 BST as we discuss the future of innovative contracting with our panel of European payers. Key topics to be covered include:

    To what extent and how contracting helps improve patient access?
    What prior successes and failures can teach us about designing contracts that deliver true value to the health systems?
    Can we avoid contracting and what would be the alternative?

    In the past decade, we have moved from simple discounting and traditional volume-based agreements to more complex value-based models involving measurement of health outcomes, risk-sharing and cost containment guarantees. The feasibility of these contracts tends to vary by EU market, dependent mainly on the available healthcare system infrastructure to collect and process data as well as other regulatory and philosophical differences.

    Ultimately, the question remains as to whether these agreements are a move towards better healthcare provision and more connected healthcare infrastructures, or are they slowing down access and creating administrative burden due to their complexity?
  • [#1] Data Governance im Fokus: Der Weg zum "Data Quality Detective"
    [#1] Data Governance im Fokus: Der Weg zum "Data Quality Detective"
    Dagmar Hillmeister-Müller - Data Governance Sales Specialist / Thomas Bodenmüller-Dodek - Product Expert Big Data & Analytics Sep 3 2019 7:00 am UTC 58 mins
    Unternehmen spüren kontinuierlich die Auswirkungen mangelhafter Datenqualität; dennoch ist die Erkenntnis, was genau Datenqualität bedeutet, immer noch nicht genug ausgeprägt.

    In diesem Webinar betrachten wir einige der Auswirkungen und wie neue Ansätze zu Datenqualität die Nutzung von Daten innerhalb von Organisationen verändern. Wir sprechen auch darüber, wie neue technische Lösungen Unternehmen bei der Untersuchung und Diagnose von Ursachen mangelhafter Datenqualität unterstützen können und wie sich deren Behebung positiv auf die Leistungsfähigkeit eines Unternehmens auswirkt.

    Datenqualität ist ein Grundpfeiler erfolgreicher Data Governance und entscheidender Erfolgsfaktor bei vielen Unternehmensinitiativen – wir zeigen Ihnen, welches Instrumentarium Sie als „Data Quality-Detective“ benötigen.
  • Next-Gen Enterprise Architectures: AI-driven Intelligent Data Platform
    Next-Gen Enterprise Architectures: AI-driven Intelligent Data Platform
    Darshan Joshi, SVP , Awez Syed, SVP, Amit Kara, Director Sep 3 2019 6:00 pm UTC 30 mins
    Your data-centric strategies depend on your ability to deliver trusted data quickly – even as you manage more types of data across hundreds of systems and fast-changing technologies. Can your data architecture handle the challenge?

    Learn about Informatica's approach to taking a data-first view of data architectures in our complimentary webinar, "AI-Driven Intelligent Data Platform for Next-Gen Data Architecture." Darshan Joshi, Informatica's Senior Vice President of Technology, will discuss how Informatica's intelligent data management platform:

    automates tasks

    facilitates collaboration

    provides intelligent recommendations to guide user behavior

    Find out how to implement a new approach to data architecture that will make your business truly data-driven.
  • ITIL is dead! Long live ITIL!
    ITIL is dead! Long live ITIL!
    Josh Caid Sep 4 2019 1:30 pm UTC 45 mins
    ITIL, as we used to know it, was a great framework for organis ing and rationalising our IT processes. But, as an industry, we built a lot of hard-to-move bureaucracy on top of it. These days, businesses have to change rapidly to stay competitive, can ITIL survive the transition?

    Short answer - yes, but only if ITIL evolves at the same pace as digital business revolution. And the good news is this: with V4, ITIL is making the leap out from the IT department into the entire organisational value chain. In this webinar, we'll be looking at some of these differences and how they can apply to your own Digital Transformation initiatives.
  • Top 10 Reasons Why You Should Hire a Coach
    Top 10 Reasons Why You Should Hire a Coach
    Kirsten Bunch, coach, speaker, and bestselling author Sep 4 2019 4:00 pm UTC 60 mins
    Does it seem like you can’t go to a networking event without meeting a professional coach? Your friends rave about their coaches and you are wondering what all the hype is about. Should you get a coach? Is it worth the investment? That depends.

    Personal coaching is a $1 billion industry. Fortune 500 companies require coaches for many of their leaders. But what about the solopreneur and small business owner? What is the ROI of hiring your own coach?

    In this webinar, Mid-Career Transformation Coach and International Bestselling Author, Kirsten Bunch, will uncover the mystery of coaching and help you discover if it’s time for you to hire a coach.

    You’ll learn:

    •What a coach can do for you
    •How to decide if coaching is worth the investment (and how to make the case to your boss)
    •The brain science behind coaching

    About Kirsten

    Kirsten Bunch is a coach, speaker and bestselling author. Before launching her own coaching firm in 2016, she worked for leading international organizations, including the Rainforest Alliance and VisionSpring, where she started and managed programs in ten countries and raised millions of dollars. She’s worked across sectors in big corporations, nonprofits and small businesses. Kirsten’s book, Next Act Give Back became an international bestseller in 7 categories on Amazon in 2018.
  • How Kelly Services Uses MDM & iPaaS for Data Estate Modernization
    How Kelly Services Uses MDM & iPaaS for Data Estate Modernization
    Ravi Ginjupalli - Kelly Services, Venkat Gupta - Capgemini, Monica Mullen - Informatica Sep 4 2019 6:00 pm UTC 52 mins
    At 70 years, Kelly Services is a global workforce solution company serving 91% of Fortune 100 companies with more than 1 million workers in the talent supply chain. In 2017, Kelly Services began modernizing its data platform with a cloud-first strategy to quickly connect the right talent with the right customers. Critical to the success of Kelly Services is a multidomain strategy for MDM, starting with the customer domain.



    During this webinar you will hear how the company began on its MDM journey to a 360-degree view for an end-to-end approach to data estate modernization.



    Join us to hear from Ravi Ginjupalli, Sr. Director of BI & Analytics Integrations at Kelly Services and Venkat Gupta, Director of Insights & Data at Capgemini, as they review the technical design and architecture considerations necessary to meet business needs using Informatica iPaaS (Informatica Intelligent Cloud Services, IICS) to connect MDM in a hybrid cloud environment that includes Azure and Salesforce and multiple cloud-based services.
  • Die heutigen ITSM-Herausforderungen prägen den Geschäftserfolg von morgen.
    Die heutigen ITSM-Herausforderungen prägen den Geschäftserfolg von morgen.
    Markus Bause; Pierre Aeschlimann Sep 5 2019 8:30 am UTC 45 mins
    In diesem Webinar zeigen wir Ihnen wie Sie die neuesten ITSM Trends nutzen können, damit Ihre Organisation auf die kommenden Entwicklungen vorbereitet ist. Das sind die Diskussionpunkte:
    - Die aktuellen Herausforderungen und Trends, die bereits die Zukunft von ITSM prägen.
    - Die neuesten ITSM-Fähigkeiten, die Ihnen helfen, effizienter zu sein, eine höhere Benutzerzufriedenheit, eine schnellere Betriebseinführung und niedrigere Gesamtbetriebskosten zu erreichen.
    - Wie sieht das ITSM von morgen aus und was sind die Vorteile für Ihr Unternehmen, einschließlich der Zukunft von Self-Service, des Wissensmanagements der nächsten Generation, der no-code Automatisierung und des reibungslosen Betriebs.
  • Automate the security and governance of APIs and microservices
    Automate the security and governance of APIs and microservices
    Aaron Landgraf, Senior Product Marketing Manager, MuleSoft & Edgar Ortiz, Senior Solution Engineer, MuleSoft Sep 6 2019 5:00 pm UTC 33 mins
    Explore Anypoint Security, a suite of capabilities that makes APIs, microservices and integrations running on Anypoint Platform secure and governable by default.

    In this webinar, you'll learn how to:
    - Protect your APIs and microservices from denial of service and content attacks
    - Detect and tokenize sensitive data in-transit across your application network
    - Apply automated policies to enable security by default
    - Move towards a zero-trust architectural model