Hi [[ session.user.profile.firstName ]]

Health IT

  • Connect any health app, device and data with Salesforce and MuleSoft to reach in
    Connect any health app, device and data with Salesforce and MuleSoft to reach in
    Sean Kennedy, Senior Director, Industry Solutions and Architecture, Salesforce, Matt Serna, Industry Marketing, MuleSoft Live 45 mins
    The healthcare industry is witnessing an explosion of medical data from EHRs, fitness trackers, mobile health applications, and more.

    To provide compelling patient experiences, the entire healthcare continuum must think beyond just driving interoperability across clinical data stores and consider how to extend interoperability across all partners and non-clinical applications. Doing so requires a new integrated healthcare strategy that extends beyond those traditionally offered by HL7 interface engines.

    Learn how NYU Langone Health implemented a new integrated approach to provide their call service agents with a one-stop comprehensive patient view, leveraging MuleSoft’s Anypoint Platform to surface real-time data from EHRs and other internal systems into Salesforce Health Cloud.

    In this webinar, you will learn:
    - How healthcare organizations can drive integration to transform their IT delivery model.
    - How modern APIs can enable connectivity across clinical and non-clinical systems.
    - How Salesforce and MuleSoft are tackling EHR interoperability challenges.
  • Compliance and Policy Management for 2020 and Beyond
    Compliance and Policy Management for 2020 and Beyond
    Sam Abadir, Lockpath Recorded: Apr 18 2019 43 mins
    Complying with regulations, managing policies and controls demand that organizations be flexible to meet any requirement thrown at them. It’s imperative that organizations plan to advance compliance and policy management so it can adapt as requirements change. If they’re using manual office tools, like spreadsheets and email this can slow down the advancement process, causing unnecessary risk. In this live webinar, Lockpath’s, Sam Abadir will share what compliance and policy management for 2020 and beyond entails, including:

    • How your organization can gain efficiency from compliance and policy management
    • Strategies for collaborating across departments
    • How streamlining processes can boost productivity
    • Planning ahead for sustained growth

    Discover the future for compliance and policy management by attending this educational webinar. Register now!
  • The Practitioner’s Guide to Security Monitoring in the Cloud
    The Practitioner’s Guide to Security Monitoring in the Cloud
    Danielle Russell Group Product Marketing Manager, Brian Bledsoe Sr. Technical Manager, Sales Enablement for North America Recorded: Apr 18 2019 58 mins
    Cloud computing continues to transform the way organizations use, store, and share data, applications, and workloads, but has also introduced a host of new security threats and challenges. With so much data going into the cloud—and into public cloud services in particular—these resources become natural targets for bad actors. And, contrary to what you may think, the primary responsibility for protecting corporate data in the cloud lies with the cloud customer, not with the service provider.

    AlienVault is at the leading edge of cloud security with AlienVault USM Anywhere. Whether you are looking to secure your AWS & Azure cloud environments, cloud applications like Office 365 and G Suite or on-premises assets, USM Anywhere delivers essential security capabilities in a single SaaS platform.

    Join this webcast to learn more about cloud security challenges and how to address them with USM Anywhere. You'll learn:

    - What the shared responsibility model means for the security of your cloud assets
    - Challenges with trying to use traditional on-prem security monitoring tools in your cloud environments
    - How USM Anywhere gives you visibility into all assets across your cloud and on-premises environments
    - Benefits of an all-in-one security solution for threat detection, incident response and compliance management
  • Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle of React
    Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle of React
    ISSA International Recorded: Apr 17 2019 56 mins
    In this session, ExtraHop Deputy CISO Jeff Costlow will discuss how security operations teams can escape the cycle of reactivity characterized by constantly responding to a flood of alerts, and move toward a more proactive stance by using the right data sources and workflows, driven by network traffic analysis, to focus on developing proactive capabilities like continuous encryption auditing, policy auditing, and more advanced use cases like threat hunting.

    Moderator:
    Mikhael Felker, Director of Information Security & Risk Management for Farmers Insurance

    Speakers:
    Jeff Costlow, CISO, ExtraHop
    Michael Wylie, Director of Cybersecurity Services, Richey May Technology Solutions.
  • Chronicle #1: How Backstory Can Help Organizations Rethink Enterprise Security
    Chronicle #1: How Backstory Can Help Organizations Rethink Enterprise Security
    Mike Hom, Product Management, Chronicle; Brandon Dunlap (Moderator) Recorded: Apr 16 2019 63 mins
    Today, most security teams struggle to identify and locate threats in their networks. Without the ability to find the bad actors in the network, security teams are unable to be effective in their roles. Organizations need tools to link intelligence about threats in the wild, threats in your network, and understand unique signals from both. In this webcast, we’ll examine the latest trends and downfalls in this space, and how Chronicle, an Alphabet company, is looking to solve them at a global scale with a focus on speed and efficacy. We’ll also have a demo of the Chronicle security platform, Backstory and how it can help streamline your security.
  • Meet the Experts – EDC 10.2.2 Release Deep-Dive & Demo
    Meet the Experts – EDC 10.2.2 Release Deep-Dive & Demo
    Gaurav Pathak, Product Management, Dharma Kuthanur, Product Marketing Recorded: Apr 15 2019 58 mins
    Get a deep-dive into how you can leverage the best of human expertise and AI with EDC 10.2.2. Subject matter expertise and social curation combined with the power of AI deliver a collaborative experience for data discovery, cataloging and management.
  • Going Off Script – Code Eats InfoSec
    Going Off Script – Code Eats InfoSec
    Tarik Saleh, Snr Sec. Engr, DomainTools; Erik von Geldern, CISO, FXCM; Clinton Campbell, CEO & Prin. Consul., Quirktree, LLC Recorded: Apr 11 2019 58 mins
    Marc Andreessen famously said “Software is eating the world”, but what about in InfoSec? In the beginning, security practitioners depended on Excel and VB scripts to make sense of their data. Today, machine learning is aiding in the discovery and reporting of insights. As more and more cloud-forward companies are embracing an “infrastructure-as-code” model, what does this mean for the security leaders of tomorrow? Is automation important to your role and to the organization’s infosecurity posture? If so, join DomainTools and (ISC)2 on April 11, 2019 at 1:00PM for a discussion on security automation and how being fluent with programming languages and scripting can expand your knowledge and value to an organization, as well as strategizing for machines to work in harmony with the compliance and risk teams.
  • How to drive Digital Transformation in your healthcare organisation
    How to drive Digital Transformation in your healthcare organisation
    Cleveland Henry Recorded: Apr 11 2019 10 mins
    UKCloud Health, Director of Cloud, Cleveland Henry discusses the opportunities, benefits, and challenges on the ‘journey to cloud’ highlighting some recent examples and how UKCloud Health wants to support organisations in their digital transformation vision.

    Cleveland delivered this presentation at Digital Health Rewired on March 26th to a packed audience so if you missed it, join us live to see how UKCloud Health can help with health focused solutions alongside our ecosystem of specialist partners.

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Human Firewalls: Fact or Fiction
    Human Firewalls: Fact or Fiction
    Erich Kron, Mitch Parker, Dominick Frazier Recorded: Apr 10 2019 112 mins
    Looking at the current cyber attacks it's clear that ransomware, phishing, CEO Fraud / W-2 scams are on the rise costing organizations billions of dollars in 2018 alone. It got us thinking what security measures are actually effective with this ever-changing threat landscape? Are technological defenses enough? Is it really necessary or feasible for you to train and test users to the point of becoming a human firewall? Is a human firewall even helpful if antivirus, firewalls, email security, etc. are already in place?

    Join our team of experts as we discuss the advantages and disadvantages of a technology-only approach and whether end users can actually be trained to the point of reducing organizational risk. Learn the facts, so you can decide how best to invest your time and money to make sure your organization gets the best bang out of your security budget buck.
  • Security Awareness: Securing the Human Layer
    Security Awareness: Securing the Human Layer
    Roger Grimes, Scott Lowe Recorded: Apr 5 2019 59 mins
    It’s common knowledge that humans are the leading cause of IT security incidents. Whether accidental or intentional, a human-centric root cause lies at the center of literally every security incident.

    You can’t just eliminate all the humans, so security professionals are left to find reasonable measures to ensure that the human element of their organizations can act as a bulwark of security rather than as a catalyst for disaster. This is easier said than done and requires constant vigilance.

    Human security is not a “one and done” effort. It’s an ongoing process often including automated security awareness training and simulated phishing. How do you make it happen? What steps can you take to get there? What are the real problems that need to be solved? Most importantly, do your employees really understand their critical role in protecting your organization?
  • Keylight Platform Overview
    Keylight Platform Overview
    Lockpath Recorded: Apr 4 2019 4 mins
    Learn how Keylight's approach to integrated risk management can help your organization and improve your business decision-making.
  • Blockchain: Worldwide Technology Market Update and Spending Outlook
    Blockchain: Worldwide Technology Market Update and Spending Outlook
    Stacey Soohoo, Research Manager and James Wester, Research Director Recorded: Apr 4 2019 61 mins
    The future of blockchain remains promising as enterprises move along their digital transformation journeys and look to blockchain to gain a competitive advantage. End users will realize the long-term value this new and innovative technology holds, building upon their existing technology infrastructure and also layering on new and emerging technology to create a complete ecosystem. In this webinar, we will share market insights on expectations about technology adoption from the field and key insights on the spending landscape for key blockchain use cases and trends.
  • InnovationX2 – Doubling down to overcome cloud complexities
    InnovationX2 – Doubling down to overcome cloud complexities
    Don Barlow, COO and Mark Click, Area Sales Manager Recorded: Apr 3 2019 47 mins
    The recent merger of Hostway and HOSTING didn’t just multiply our office space and workforce. More importantly, it’s allowed us to meld our most valuable offerings and the expertise of each company to provide a healthy list of unmatched products and services.

    This is a particularly critical time for IT organizations as they come to grips with the fact that the “easy migration” to public cloud preached a few years ago is not so simple. And “One-size-fits-all” is a risky and costly approach to take when you’re trying to control IT spend, maintain compliance, and stay secure—all while bringing real value to the entire business.

    During this 45-minute webinar, two Hostway|HOSTING technology experts will share our most exciting combined services, including:

    Monitoring Insights: Offering an unmatched, game-changing single view of your infrastructure, operating systems, and applications.

    Guidance Level Agreements (GLAs): Uniquely going ten steps further than standard SLAs to offer a regular cadence of actionable recommendations that guarantee positive outcomes.

    Critical Availability Services: Offering the BEST availability guarantee in the industry.

    Database Services: Not many companies in our space also offer full data lifecycle management capabilities. A service not to be understated, Gartner Analysts have found that nearly 90% of businesses have little or no analytics expertise in house.
  • Tech Talks: An Interview with Karsten Smet, COO at UKCloud
    Tech Talks: An Interview with Karsten Smet, COO at UKCloud
    Karsten Smet Recorded: Apr 3 2019 15 mins
    Join the Tech Talks hosts in our latest webinar where they chat with Karsten, the COO of UKCloud. Karsten was a deeply technical professional who has pivoted his career to focus on customer service and culture. In the session they explore how he’s implementing a customer centric culture at UKCloud and helping the business go through a period of rapid growth.

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Integrating AIOps and ITIL 4: End-to-end IT Ops
    Integrating AIOps and ITIL 4: End-to-end IT Ops
    Dominic Wellington, Nick Hansell Recorded: Apr 3 2019 44 mins
    The explosion in the volume of operational data requires a new approach to IT Operations, enabled by new machine-learning capabilities: AIOps — Artificial Intelligence for IT Operations. Algorithmic analysis of events and alerts can help IT professionals from different teams and backgrounds to swarm together in virtual teams, specific to each particular incident. By collaborating and sharing information and insights, these virtual teams can solve issues and problems much faster than traditional “waterfall” sequential processes can. These new processes help organisations ensure continuous assurance of their critical business services.
  • Third-Party Risk Management Trends & Predictions
    Third-Party Risk Management Trends & Predictions
    Shawn Malone, Linda Tuck Chapman, Kelly White, Shane Deay Recorded: Mar 28 2019 63 mins
    Managing vendors, third parties and business associates is one of the most challenging aspects of business. In this exclusive webinar, our panel of industry experts will share their perspectives of the current third-party risk management landscape and where it's headed. As an attendee you’ll learn the latest trends in third-party risk and top predictions in 2020. Discover the future of third-party risk management in this can't miss webinar.
  • A Governed Self-Service Data Platform Accelerates Insights
    A Governed Self-Service Data Platform Accelerates Insights
    Ryan Peterson, Global Technology Segment Lead at AWS & Scott Gidley, Vice President of Product at Zaloni Recorded: Mar 27 2019 58 mins
    Today's enterprises need a faster way to get to business insights. That means broader access to high-value analytics data to support a wide array of use cases. Moving data repositories to the cloud is a natural step. Companies need to create a modern, scalable infrastructure for that data. At the same time, controls must be in place to safeguard data privacy and comply with regulatory requirements.

    In this webinar, Zaloni will share its experience and best practices for creating flexible, responsive, and cost-effective data lakes for advanced analytics that leverage Amazon Web Services (AWS). Zaloni’s reference solution architecture for a data lake on AWS is governed, scalable, and incorporates the self-service Zaloni Data Platform (ZDP).

    Join our webinar to learn how to:
    - Create a flexible and responsive data platform at minimal operational cost.
    - Use a self-service data catalog to identify enterprise-wide actionable insights.
    - Empower your users to immediately discover and provision the data they need.
  • IT Org Transformation – Seven Strategies We Can Implement This Week
    IT Org Transformation – Seven Strategies We Can Implement This Week
    Joe Pucciarelli, GVP & IT Executive Advisor / Cora Carmody, Adjunct Advisor Recorded: Mar 26 2019 59 mins
    Many enterprises and their IT teams continue to struggle with the accelerating pace of change being brought about by the new digital technologies, business model innovation and increased competitive tempo. This challenge is more than “change management”; this is a broader problem – a need to accelerate organization transformation and evolve cultural norms. During this IDC web conference, our analysts will share both cultural frameworks and specific, tangible tactics for executive IT leaders, noted within our research, that have been found to power IT’s broader organizational transformation.
  • Cyberattacks: Q1 Review and Emerging Trends
    Cyberattacks: Q1 Review and Emerging Trends
    Kelvin Murray, Threat Expert, Webroot Recorded: Mar 26 2019 45 mins
    With cybercriminals constantly seeking innovative ways to steal information and monetise data, it is crucial for businesses and MSPs to keep up to date on emerging trends in the threat landscape.

    Webroot is hosting a series of webinars every 3 months that aim to keep the industry informed on the latest threat trends and review the top cyberattacks that hit businesses each quarter. These webinars will also provide tips on how to stay safe in a complex threat landscape.

    Join Webroot’s Threat expert as he discusses topics such as:

    •The rise of information stealers
    •The changing face of ransomware
    •Relentless phishing attacks
    •The theft, trade and cracking of passwords
  • Want 100% Storage Uptime for Years? City Of Carmel Will Share How They Did It
    Want 100% Storage Uptime for Years? City Of Carmel Will Share How They Did It
    Brian McClesky, Systems Engineer-Mirazon, Rebecca Chike, Systems Supervisor-City of Carmel Recorded: Mar 21 2019 57 mins
    Join us to hear the story of City of Carmel and Mirazon. City of Carmel is one of the fastest growing cities in Indiana. Carmel was voted #1 in American's Best Places to Live by Money magazine. CNBC voted Indianapolis/Carmel ”Best Cities to Relocate to in America”. Over the last two decades the city has almost tripled its population and this growth has forced their IT infrastructure to expand rapidly.

    Thanks for Mirazon’s recommendations they found the perfect solution that helped them modernize their infrastructure to provide 24/7 data access for Fire and Police department’s critical systems. For nearly a decade, City of Carmel has experienced Zero storage-related downtime. Even through maintenance windows, their VM’s have achieved 100% uptime.

    The best part is, they have done with budget-friendly backend disks and allowed Software-defined storage to do all the heavy lifting. They have enjoyed Enterprise level active/active HA functionalities across 2 different buildings, running a VMware stretch cluster with HPE Servers connected via 10Gb and HP MSA backend enclosures.

    Learn how City of Carmel has been able to stay running without downtime for almost 10 years and have saved $75,000 by extending their hardware life expectancy thanks to their secret sauce.

    In this webcast you will discover how City of Carmel:
    • Has experienced 100% uptime for nearly 10 years
    • Extended their storage life expectancy by 80% and saved $75k
    • Replaced every storage component without doing a forklift and replace
  • Navigating new frontiers: Ways to find space in the future RA market
    Navigating new frontiers: Ways to find space in the future RA market
    Helen Parfitt, Head of Therapy Watch, Research Partnership, Mariel Metcalfe and Mark Hollis, Research Partnership Recorded: Mar 21 2019 52 mins
    Rheumatoid arthritis (RA) has been a major growth driver for the pharmaceutical industry over the last 15 years, led by AbbVie’s blockbuster anti-TNF inhibitor treatment Humira (adalimumab).

    The emergence of low-cost biosimilar versions of Humira and the new janus kinase (JAK) inhibitors, are shaking up a once-stable market.

    Although there are only two drugs in this class available in the region – Eli Lilly’s Olumiant (baricitinib) and Pfizer’s Xeljanz (tofacitinib) – this is not likely to be the case for much longer, as several other candidates reach late-stage development.

    Analysis of Therapy Watch data, a real-time' syndicated market tracking tool from Research Partnership, shows that JAK inhibitors have already made a strong impression in the European RA market, where their convenient oral administration advantage may override cost considerations that would otherwise favour biosimilar uptake.

    This pharmaphorum webinar, held in conjunction with Research Partnership, will use the latest intelligence from both physicians and patients to look at emerging trends in the RA market, how these will shape the RA market of tomorrow and how companies can best position themselves for future success.

    This webinar will provide an opportunity to interact with the panel about how companies can best harness the potential of this increasingly complex, but highly rewarding, market.

    Topics to be covered include:

    The European RA market
    Current status and market situation of JAK inhibitors (key EU5 countries)
    Uptake curve of JAKs compared to other new entrants and biosimilars
    Profile of physicians prescribing JAKS
    Country differences
    The future of new classes of JAK inhibitors
  • The digital disruption butterfly effect across European industries in 2019
    The digital disruption butterfly effect across European industries in 2019
    Angela Vacca, Giulia Carosella Recorded: Mar 21 2019 33 mins
    The European vertical market digital scenario is more vibrant than ever, – with some industries that are on the edge of technological change, and others that are rapidly catching-up and showing interesting pockets of growth.
    In this IDC Web Conference Angela Vacca and Giulia Carosella from the IDC Customer Insights and Analysis team will discuss how European industries, such as transportation, finance, public sector and others, are ripe for the 2019 digital evolution, answering questions such as:
    •What are the key vertical trends that are driving IT spending in Europe?
    •How to spot technology hypergrowth pockets?
    •What is the digital disruption ‘butterfly effect’, and how will it affect European industries?
    Our webinar will help you improve your vertical go-to-market strategy and tactical planning, – highlighting what is under the spotlight for European industries, learning about real-life examples, and charting out a successful vertical digital roadmap for 2019.
  • Avoiding Commodity Cybercrime
    Avoiding Commodity Cybercrime
    David Carroll, CEO, XQ Cyber & Andy Webb, Head of Products, UKCloud Recorded: Mar 21 2019 19 mins
    Join us for our upcoming webinar: Avoiding Commodity Cybercrime with David Carroll, CEO at XQ Cyber and Andy Webb, Head of Products at UKCloud.

    This webinar will explore the cyber risks faced by organisations with a particular focus on commodity cybercrime. Over the course of the webinar, XQ Cyber CEO David Carroll will delve into some infamous incidents of cybercrime, the possible implications organisations face from having poor cybersecurity. He will also discuss why it's going to get worse, why should we care and what we can do about it.

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Top 5 IT Security Myths Your CISO Believes Are True… BUSTED!
    Top 5 IT Security Myths Your CISO Believes Are True… BUSTED!
    Roger Grimes, Erich Kron Recorded: Mar 20 2019 64 mins
    Facts are facts… but what happens when IT security pros take myths at face value?

    That got us thinking… what if we whip out our magnifying glasses, pull out the trench coats and use our research skills to differentiate fact from fiction? That's exactly what we did for this interactive webinar where we dug deep to help you decide how to invest your time and money wisely, how to implement worthwhile defenses, and what holes to plug so your organization gets the best bang for your security budget buck.

    Listen in as Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, and Erich Kron, KnowBe4’s Security Awareness Advocate, uncover the truth behind the Top 5 IT Security Myths. They’re stating facts and slinging stats. Then the audience decides whether each myth is confirmed or BUSTED!
  • Configuration Compliance Management for 2020 and Beyond
    Configuration Compliance Management for 2020 and Beyond
    Sam Abadir, Lockpath Recorded: Mar 20 2019 40 mins
    Planning and managing for hardened, secure assets is a key requirement for managing IT Risk and is mandated by many compliance sources such as PCI, NIST, FISMA and HIPAA – yet many organizations are not fully assessing their IT hosts and applications for secure configuration. In this live webinar, Lockpath’s Sam Abadir will share what configuration compliance management for 2020 and beyond looks like, including:

    •What configuration compliance management encompasses
    •Who should care about secure configuration management
    •Why organizations are not doing this today and how this impacts the business beyond IT


    Discover the future for configuration compliance management by attending this educational webinar. Register now!
  • WISSENSMANAGEMENT DER SCHLÜSSEL ZU EINER ZUKUNFT MIT KI
    WISSENSMANAGEMENT DER SCHLÜSSEL ZU EINER ZUKUNFT MIT KI
    Aria Naderi Apr 24 2019 9:00 am UTC 55 mins
    Künstliche Intelligenz, einst auf den Großbildschirm beschränkt, steht den Verbrauchern in Grundform mit Alexa-, Siri- und selbstfahrenden Tesla-Autos zur Verfügung. Aber was bedeutet das für die Wirtschaft? Wir haben vielleicht noch keine Ex-Machina-ähnlichen Roboter, aber engagierte "Futuristen" schließen sich in vielen Unternehmen der C-Suite an, um zukunftssichere Entscheidungen zu treffen und sich auf zukünftige technologische Innovationen vorzubereiten.

    KI-Tools basieren auf datenbankgestützter, prädiktiver Technologie, die die kognitive Leistungsfähigkeit des Menschen verbessert. Lernen Sie mit uns, wie Sie mit guten Wissensmanagementpraktiken eine solide Grundlage für KI-Initiativen schaffen können.
  • Are e-Signatures Legal in Europe? Understanding eIDAS
    Are e-Signatures Legal in Europe? Understanding eIDAS
    John Jolliffe, Strategic Engagement, Adobe Document Cloud. Apr 25 2019 1:00 pm UTC 45 mins
    When it comes to conducting business with paperless documents, organisations have embraced electronic and digital signatures. The Electronic Identification and Trust Services Regulation (eIDAS) clarifies and simplifies the legal framework for e-signatures across Europe, but how should organisations decide which type of e-signature is appropriate to their needs? And how are new technologies helping to make electronic signatures relevant for the multi-device, highly mobile workspace of today?

    Join our webinar, to learn:

    • Why e-signatures are essential to your company's success now and in the future.
    • Which three signature types are legal under eIDAS.
    • How to select the right approach for your business.
    • Next-gen e-Signatures and The Cloud Signature Consortium.
  • Optimize Your Third-Party Protection Program
    Optimize Your Third-Party Protection Program
    Bob Maley, Normshield; Tony Rock, Lockpath Apr 25 2019 4:00 pm UTC 60 mins
    Interaction between the financial industry and third-parties has become more complicated due to the combined risk of the financial industry's rapid growth and an increase in third-party relationships.

    In this exclusive webinar, Bob Maley, Chief Security Officer of Normshield, Inc., who designed information security programs from the ground up for major financial services organizations, will share his perspective of third-party risk in the financial services industry. He’ll discuss common financial third-party risk challenges and trends in the market, best practices and challenging scenarios from his career and how he resolved them.

    As an attendee you’ll learn how his real-world third-party risk examples, best practices and recommendations can apply to your organization’s unique needs. Discover how to build and mature a successful third-party risk program in financial services by attending this educational webinar.

    Register now!
  • Hot vs Cold Data: Its Influence On Data Placement Decision & What to Do About It
    Hot vs Cold Data: Its Influence On Data Placement Decision & What to Do About It
    Augie Gonzalez, Director of Product Marketing, DataCore Software Apr 25 2019 6:00 pm UTC 60 mins
    The short half-life of data, quickly decaying from hot to warm to cold, governs how much you should spend on it throughout its stages.

    Humans are poorly equipped to track the rapid temperature changes, much less capable of reacting to it. Consequently, largely dormant data consumes precious space on expensive storage, blowing up disk capacity and spiraling up costs.

    In this webinar you’ll become acquainted with:
    •Machine learning (ML) techniques that sense data temperature variations in real-time
    •Artificial intelligence (AI) methods used to dynamically migrate data accordingly, between primary, secondary and cloud storage from different suppliers
    •Relative distribution of storage tiers necessary for optimum savings
  • The Webroot 2019 Threat Report
    The Webroot 2019 Threat Report
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Apr 29 2019 3:00 pm UTC 60 mins
    Webroot conducted an extensive research on the Threat Landscape for 2019 and presented the findings in the recently published Webroot 2019 Threat Report.

    A few of the key findings that will be covered during this webinar:
    - 40% of malicious URLs were found on good domains
    - 36% increase in the number of phishing attacks
    - 93% of phishing domains offered an HTTPS site
    - 54% of devices that got infected once were re-infected the same year
    - 25 of the top recurring malicious IP addresses were reused 95 times

    Join Webroot's Sr. Threat Research Analyst, Tyler Moffitt to learn about our threat discoveries and analysis to arm your business to overcome modern cybercrime.
  • What's new in G-Cloud 11?
    What's new in G-Cloud 11?
    Nicky Stewart, Commercial Director at UKCloud Apr 30 2019 10:00 am UTC 60 mins
    Join our Commercial Director Nicky Stewart as she guides you through :
    - What's new in G-Cloud
    - Important G-Cloud Rules, Guidelines, Dates and Deadlines


    and much more..

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Five Tips for Securing and Managing your IoT environment with PKI
    Five Tips for Securing and Managing your IoT environment with PKI
    Vishvas Patel, VP Product & Chief Architect and Rao Cherukuri, CTO Apr 30 2019 3:00 pm UTC 60 mins
    Learn how
    1. to use PKI for strong authentication, data encryption & code signing for IoT devices;
    2. to establish identities to IoT Devices with unique characteristics and manage those identities at IoT scale without human intervention;
    3. modern encryption techniques are used to establish a verifiable device identity and ensure that devices do not get compromised; and
    4. IoT IAM can be used to operationalize trust and manage the provisioning of millions of devices with zero human intervention at IoT scale.
    5. to enforce identity and access through online AND offline authentication

    With over a billion connected devices worldwide, Internet of Things (IoT) security remains top concerns for companies of all sizes. The growth of ransomware and IoT-specific botnets such as Mirai and Reaper have heightened awareness and security concerns of IoT devices. Even though many organizations may not have been victimized by IoT security breaches yet, they must start assessing their IoT security strategy and how to leverage IoT IAM technologies to reduce IoT security risk.

    Join this webinar to learn how you can leverage Public Key Infrastructure (PKI) with the scalability and automation for strong authentication and data protection through encryption. We will explore how this is relevant for different industries including national and local Government, Education and Healthcare.
  • New Paradigms in Healthcare: Cloud Ready with MSFT Azure and Informatica
    New Paradigms in Healthcare: Cloud Ready with MSFT Azure and Informatica
    Craig Darling, Health & Life Sciences, Microsoft and Richard Cramer, Chief Healthcare Strategist, Informatica Apr 30 2019 6:00 pm UTC 60 mins
    Healthcare is a highly regulated industry. Before migrating data to the cloud, you must have the right measures and framework in place—including HIPAA and HITRUST—to protect healthcare information and other sensitive data. Replacing an established on-premises enterprise data warehouse (EDW) is not as simple as moving data from an on-premises database to a database in the cloud; healthcare IT organizations require an incremental, well-governed, secure strategy based on a specific provider’s needs to rapidly deliver business results while ensuring minimal disruption to existing applications and analytic workloads.
  • A New Approach to Managing "Identity Risk"
    A New Approach to Managing "Identity Risk"
    Focal Point Data Risk, Lockpath, SailPoint May 2 2019 4:00 pm UTC 60 mins
    More than 80 percent of hacking-related breaches leverage stolen, default, or weak passwords, and compromising user credentials remains the easiest way for hackers to gain access to your systems and networks. The potential harm is even greater if those credentials belong to a privileged user.

    So, what are leading organizations doing to manage this identity-related risk? The answer is Identity Risk Management – the process of integrating an IAM system with an Integrated Risk Management or GRC program. Identity Risk Management, when executed properly, allows for improved risk visibility, better risk-based decision making, and reduces enterprise risk management siloes.

    In this 60-minute webinar, look into the future as leading identity and risk management experts explore how companies are utilizing this game-changing approach to manage critical identity risks. Our expert panel will outline the best practices for identity risk management, give you a behind-the-scenes look at how it works in the real world, and discuss strategies for overcoming some of the most common hurdles.

    In this webinar, attendees will learn:

    • The benefits of applying an integrated approach to identity risk
    • The key strategies for overcoming common identity risk management
    challenges
    • How to integrate enterprise systems to more effectively manage identity risk
  • Why Artificial Intelligence and Machine Learning are Key for MSPs
    Why Artificial Intelligence and Machine Learning are Key for MSPs
    George Anderson, Director of Product Marketing, Webroot May 7 2019 3:00 pm UTC 60 mins
    As the volume, sophistication and complexity of attacks on SMBs grows, current IT Security solutions need to become more pro-active, automated and effective.

    This presentation looks at how SMBs and MSPs can tackle these issues now and in the near future, and equip with the IT Security expertise and technology they need to defend their Clients and benefit from the this growth market.
  • Insider Data Breach – Separating the Malicious from the Mistaken
    Insider Data Breach – Separating the Malicious from the Mistaken
    Sudeep Venkatesh, Chief Product Officer, Egress; Charles Moore, Opinions Matters; Spencer Wilcox, Brandon Dunlap (Moderator) May 9 2019 5:00 pm UTC 60 mins
    According to a recent Ponemon Institute survey, the average data breach costs $3.8M, up 6.4% from 2017. When it comes to an insider data breach, 95% of IT leaders view this as a concern for their organization (statistic from 2019 Data Breach Survey from Egress Software and Opinions Matters). Employees can put sensitive data at risk by accessing or sharing without permission, just because they are “curious” or intrigued by the content. An insider data breach can be the most damaging, the most expensive and the most difficult to detect and stop. How can an organization deal with these insider data breaches? Join Egress Software and (ISC)² on May 9, 2019, at 1PM Eastern for a wide-ranging discussion on insider data breaches, the malicious and the accidental and what can be done to mitigate such occurrences.
  • Unsecured Networks: The Risks For Your Business
    Unsecured Networks: The Risks For Your Business
    Francis Bourke, Sales Engineer, Webroot May 14 2019 10:00 am UTC 60 mins
    More than 88% of malware trying to enter your network can be stopped with a DNS filtering solution. These allow admins to take back control of their network, securing all devices, preventing internet misuse, and improving productivity.

    A filtered DNS solution is capable of blocking DDoS attacks, botnets, cache poisoning, and other threats.

    In this webinar, we’ll discuss the importance of network security and how Webroot® DNS Protection can benefit your business and protect against attacks.
  • Growth Opportunities in the Healthcare Technology and Biosciences Sector
    Growth Opportunities in the Healthcare Technology and Biosciences Sector
    Charlie Whelan, Vice President of Consulting, Transformational Health, Americas, Frost & Sullivan May 14 2019 3:00 pm UTC 75 mins
    For most cities and states, the healthcare technology and biosciences sector is one of the most attractive industries of the future that can grow their communities. However, that attention attracts significant competition among players seeking to expand in a field that is highly complex. How should your community address this industry, and what is the best path to nurturing start-ups, retaining existing employers, attracting new companies and encouraging workforce development?

    Key Takeaways:

    • The healthcare technology and biosciences market is large and complex. Learn how the industry is structured and which segments might align best with your community.
    • Cities and states across the country are all competing to grow their own biosciences economies. Find out what types of programs and strategies are the most effective.
    • Come away with a simple model for assessing your own community’s strength relative to the healthcare technology and biosciences market.
  • Improve Your PCI DSS Management Effectiveness
    Improve Your PCI DSS Management Effectiveness
    Sam Abadir, Lockpath May 15 2019 4:00 pm UTC 60 mins
    Payment Card Industry Data Security Standard (PCI DSS) pushes organizations to achieve six distinct goals in the aim of protecting payment systems from breaches and theft of cardholder data. The requirements supporting the goals force organizations to manage, govern and integrate different departments within the business including IT, security, compliance, risk, incident response, and policy management.

    Those managing this effort quickly realize that the effort to achieve the goals effectively and in a timely manner requires PCI DSS to be a day-to-day part of your business executed with purposeful coordination and immediate access to information to continuously assess the PCI DSS environment, remediate vulnerabilities and report required information.

    In this live webinar, Lockpath’s Sam Abadir will share what a PCI DSS solution looks like, including:

    • Best practices for effectively managing PCI DSS
    • How your organization can gain efficiency from proper a PCI DSS solution
    • Maintaining a strong vulnerability management program with PCI DSS
    • Advantages of managing PCI DSS solutions efforts on a Governance, Risk and Compliance or Integrated Risk Management platform

    Find out what you need to know to better manage your PCI DSS solution by attending this educational webinar. Register now!
  • Audit Management for 2020 and Beyond
    Audit Management for 2020 and Beyond
    Sam Abadir, Lockpath May 16 2019 4:00 pm UTC 60 mins
    As business risks and compliance mandates keep changing, audit teams are having a tougher time prioritizing audits, collecting information and performing analysis required to strengthen the business.

    Businesses are facing more regulations and competitive pressures which increase the need for internal audit teams to provide an orderly approach for evaluating and improving the effectiveness of risk management, internal control, and governance processes to improve the organization.

    Audit teams are being challenged by legacy audit processes that do not evolve at the same speed as business and regulations. These legacy audit processes include the use of spreadsheets, manual evidence requests, share drives and manual reports that often take weeks or months to complete.

    In this live webinar, Lockpath’s Sam Abadir will share what audit management for 2020 and beyond looks like, including:

    • What audit management encompasses
    • How your organization can gain efficiency from proper audit management
    • Advantages of managing audits and risk management efforts on an Integrated Risk Management or Governance Risk and Compliance platform
    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage audit risk in 2020 and beyond by attending this educational webinar. Register now!
  • A Day in the Life - Tips and Best Practices from 3 CISSPs
    A Day in the Life - Tips and Best Practices from 3 CISSPs
    Geraldo Castillo, CISSP, Costa Rica; James Packer, CISSP, London; Hoo Chuan Wei, CISSP, Singapore; B. Dunlap (Moderator) May 21 2019 2:00 pm UTC 60 mins
    More than 130,000 information security professionals have invested time, determination and resources to attain the CISSP certification. Join (ISC)² members from different regions on May 21, 2019 at 10:00AM Eastern as we discuss what pain points, issues and challenges they encounter in their day-to-day work life, as well as solutions, tips and best practices they have developed along the way. We’ll also examine how the CISSP certification has helped them with their job and career.
  • An Office Manager's perspective on HIPAA Compliance
    An Office Manager's perspective on HIPAA Compliance
    24By7Security, Inc,. May 21 2019 4:00 pm UTC 60 mins
    HIPAA requirements can be mind-boggling especially for smaller medical practices. Healthcare businesses of all sizes should comply with several requirements of HIPAA law. There are multiple components of the law involved, such as security, privacy and breach notification provisions. You may be too busy to focus only on Compliance matters, so hear from an office manager who has done this before, and learn from this office manager's perspective on HIPAA compliance.

    CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
  • The rise of targeted attacks to SMBs and MSPs
    The rise of targeted attacks to SMBs and MSPs
    Kelvin Murray, Sr. Threat Research Analyst, Webroot May 28 2019 10:00 am UTC 60 mins
    Cyber criminals are constantly targeting MSPs, but in 2019 this has become a worrying trend.

    Learn about the key targeted cyberattacks MSPs have been facing so far this year and how to protect your business against them.
  • IT Industry Outlook 2019
    IT Industry Outlook 2019
    To Be Confirmed Jun 4 2019 2:00 pm UTC 60 mins
    CompTIA explores the forces shaping the information technology industry, its workforce, and its business models in 2019. Some of the IT Industry trends to watch are:

    • Cloud, Edge and 5G Form the Modern Economic Infrastructure
    • IoT and AI Open New Possibilities in Ambient Computing
    • Distributed Technology Models Challenge Existing Structures
    • Business of Emerging Technology Prompts Sales Channels Reinvention
    • Partnerships Bridge Gaps in New Tech Ecosystem
    • Persistent Tech-Worker Shortages Fuel New, Creative Solutions
    • Global Tech Hubs Put Spotlight on the Ingredients for Innovation
  • Cloud Security Best Practices for Defending Against Targeted Attacks
    Cloud Security Best Practices for Defending Against Targeted Attacks
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Jun 18 2019 3:00 pm UTC 60 mins
    The past few years has seen a move towards targeted attacks. Attackers are no longer trying to infect the globe and are instead carefully selecting targets to maximise payouts.

    SMBs are right in the cross-hairs as their lack of defense and contingency plans can often leave them vulnerable to ransomware, information theft and other attacks.

    Is your organisation a soft target? Increasingly, automated processes can figure this out in a matter of minutes.

    Learn how to lift your organisation from the level of easy target and bolster your defenses against this scary current criminal focus.
  • Cyberattacks: Q2 Review and Emerging Trends
    Cyberattacks: Q2 Review and Emerging Trends
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Jun 25 2019 10:00 am UTC 60 mins
    With cybercriminals constantly seeking innovative ways to steal information and monetise data, it is crucial for businesses and MSPs to keep up to date on emerging trends in the threat landscape.

    Webroot is hosting a series of webinars every 3 months that aim to keep the industry informed on the latest threat trends and review the top cyberattacks that hit businesses each quarter. These webinars will also provide tips on how to stay safe in a complex threat landscape.

    Join Webroot’s Senior Threat Analyst as he discusses topics such as:

    • Headline breaches and a torrent of smaller ones that don't make the news
    • Information theft
    • Phishing attacks
    • The evolution of ransomware
    • Passwords: the theft, trade and cracking of passwords
  • Top threats today and how to protect against them
    Top threats today and how to protect against them
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Jul 9 2019 3:00 pm UTC 60 mins
    The year 2018 saw a significant number of major events showcasing cybercriminal innovation. We saw cryptojacking and botnets grow to their largest levels, ransomware become more targeted, and phishing transition from financial to tech targets.

    Webroot believes it's possible to effectively protect businesses and clients, but only by understanding your adversary and the techniques they use.

    In this webinar, Webroot Sr. Threat Research Analyst, Tyler Moffitt, will offer insights into the prevailing malware trends and tactics of the last year, and discuss how implementing a layered security strategy can help you protect your clients in the year ahead.

    We hope you can join us for this live, educational session!
  • Stopping Phishing: Your #1 Priority
    Stopping Phishing: Your #1 Priority
    George Anderson, Director of Product Marketing, Webroot Jul 16 2019 3:00 pm UTC 60 mins
    Phishing is literally flying under most organisations radar, but when you look at it over 9 out of 10 successful security breaches start with a phish.

    Phishing is not one thing but many things and its constantly adapting and morphing to make itself harder to detect and so harder to stop. We used to talk about polymorphic malware, but we are now in the age of polymorphic phishing.

    This webinar looks at the real threats that phishing poses and the defenses you can use to mitigate its effects on the profitability of your business.
  • IT Security Trends
    IT Security Trends
    To Be Confirmed Jul 24 2019 2:00 pm UTC 60 mins
    As technology becomes a critical component for digital organisations, security becomes an even higher priority. Most companies know that security is important, but they aren’t sure which steps to take as they change their IT approach.

    This market intelligence session, based on CompTIA’s latest research, describes the areas that every business should focus on: the new technology that is needed, the new processes that must be adopted, and the education that must be given to end users.
  • SMBs Market Overview and Technology Buying Trends
    SMBs Market Overview and Technology Buying Trends
    To Be Confirmed Aug 1 2019 2:00 pm UTC 60 mins
    Small businesses are commonly described as the lifeblood of the global economy. This is not hyperbole as SMBs account for the vast majority of business entities, while serving as a key driver of job growth and innovation. Success as a small business owner means overcoming challenges on many fronts, but also embracing new opportunities in technology and business.

    CompTIA’s latest research explores the business relevance of technology to SMBs and the factors affecting their perceptions, decisions, and investments in established and emerging technologies. We also explore the professional services industry, taking a look at their decision to offer technology to their own customers.