As an IT professional, many of the problems you face are multifaceted, complex and don’t lend themselves to simple solutions. The information technology community features useful and free information technology resources. Join to browse thousands of videos and webinars on ITIL best practices, IT security strategy and more presented by leading CTOs, CIOs and other technology experts.
Presenter: Clive Chan, Senior Consultant, F5 Networks. Moderator: Otto Lee, CISSP, CSSLP, Membership Chair, (ISC)²Recorded: Jun 25 201960 mins
IT automation and orchestration, the key enabler of digitization is the number one IT initiate globally according to our state of application services report 2019. In addition, Zero Trust and Security-By-Design are key imperatives of organizations pursuing digital transformation as these organizations accelerate adoption of cloud technologies to gain speed, scale and accessibility to innovative technologies like AI and blockchains.
In this webinar, we will look at the changing landscape of DevOps. We will explore the practice of scaling application security, controlling vulnerabilities and controlling advanced threats with the web application firewall in CI/CD environments. We will also take a look at how the technologies enable close collaboration between security teams and development teams on securing APPs without requiring application teams having in-depth knowledge of security.
*This webinar will be conducted in Cantonese. (本次網上研討會將以粵語進行。)
Bryan Jennewein, Andreia Martins and Retesh ShahRecorded: Jun 25 201946 mins
Countless platforms promise predictive capabilities for your IT organization. What is your strategy for integrating artificial intelligence and machine learning, and what do you need from your tech stack to be successful?
Watch our webinar with Vodafone and Accenture to understand the 5 critical components to build an effective AI strategy, benefits realized from implementing a predictive IT solution, and what to look for when evaluating predictive analytics solutions.
What you’ll learn:
• 5 steps to an effective predictive IT strategy
• How Vodafone with Accenture improved their customer experience with AI
• Where AI can help, and where it can’t
Director, Product Marketing
Head of IT Operations
Application Outsourcing Lead for Vodafone
Swabhiman Chhotray, Managing Consultant, Marsh Risk Consulting Asia, and Naureen Rasul, Cyber Leader, Marsh AsiaRecorded: Jun 25 201926 mins
Every organization has cyber risks. They are difficult to comprehend. They are even harder to assess and quantify.
An end-to-end cyber risk management approach can be achieved if you:
1.Understand cyber risks from a business perspective and assess the nature of any potential cyber-related losses – know your threats.
2.Measure the financial impact of cyber exposures and quantify how much is acceptable across the organization – know yourself.
3.Manage the insurance and recovery process by having a clear action plan based off your capabilities and capacities – know what you can do.
Join Marsh Risk Consulting’s, Swabhiman Chhotray and Marsh’s Cyber Leader, Naureen Rasul as they discuss a risk management framework that allows you to understand, measure, and manage your inherent cyber risks.
Brian Reed, Chief Mobility Officer, NowSecure // Alan Snyder, Chief Executive Officer, NowSecureRecorded: Jun 24 201947 mins
It’s hard to believe that mobile app stores are more than a decade old yet some crazy misconceptions about mobile application security still linger.
Stop us if you’ve heard these before:
- Testing mobile apps is the same as web apps
- SAST is good enough for mobile, you don’t need DAST
- Mobile apps are secure because Apple and Google security test them
- Outsourcing a penetration test once per year is sufficient to mitigate risk
Join us to sort fact from fiction and learn how to ensure your mobile appsec program is on the right track. You may discover some surprising things about modern mobile application security.
Deepak Anand, Senior Advisory Platform Architect, ServiceNowRecorded: Jun 24 201957 mins
Wish you had an app for that new use case? Learn how business and IT can partner to build apps fast on the NOW Platform.
Whether you are an experienced developer, a System Admin ready to start building apps, an Enterprise Architect, or a business focused person, this is for you.
Join this webinar with our team of Platform Innovation experts to:
• Learn about the Now Platform architecture and capabilities
• Understand what apps are best to build on the Now Platform
• Experience the cloud application development process from start to finish with a live demo
• Discover how to significantly reduce app development time and delivery
David Morris | Nick Vigier | Kalani EnosRecorded: Jun 24 201956 mins
As more and more organizations are getting breached, executives are finally paying attention to cybersecurity and data protection. What are the biggest challenges for businesses when it comes to securing the enterprise?
Join this panel of experts to learn more about the current state of breaches, how organizations of all sizes are coping, and what CISOs are prioritizing this year.
Attendees will learn more about:
- Who is most at risk of being breached
- How to prevent a breach or minimize its impact
- How long it takes to detect a breach
- Best practices for investigation and remediation
- Words of wisdom from the experts
John Smith, Principal Sales Engineer at ExtraHop; Chris Crowley, Senior Instructor at SANSRecorded: Jun 24 201963 mins
The MITRE ATT&CK Framework is a useful tool for SecOps teams trying to understand their security posture against common adversary tactics, techniques, and procedures (TTPs). In this presentation you'll learn how to take your ATT&CK understanding and coverage to the next level with network traffic analysis. You'll also learn:
- Key tips for understanding the MITRE ATT&CK Framework and how to use it as a tool to improve your security posture.
- What the framework is optimized for, and where it has room to grow
- Which security tools and data sources you'll need to achieve the best coverage against TTPs in all 12 categories of the MITRE ATT&CK Framework
Patrick Hearn, CEO, Endeavor Worldwide & Frances Zelazny, Chief Strategy & Marketing Officer, BioCatchRecorded: Jun 24 201932 mins
The newest report issued by the U.S. General Accounting Office (GAO), Federal Agencies Need to Strengthen Online Identity Verification Processes, calls for an overhaul and updated guidelines on identity proofing, highlighting the availability of data stolen in various data breaches over the years in the hands of attackers and fraudsters. Already, the National Institute of Standards and Technology (NIST) has issued guidance in 2017 that effectively prohibits agencies from using Knowledge-Based Authentication (KBA) methods for sensitive applications. Now, the GAO is going one step further, recommending that all agencies discontinue the use of KBA and highlights various alternatives for consideration. The outcome may have far-reaching implications not just for federal agencies but across the board for all private entities that conduct identity verification and authentication to provide digital products and services.
Join industry veterans Patrick Hearn and Frances Zelazny next Monday, for a short, 30-minute debrief on this latest GAO report and what it means for you.
Eyal Sivan Senior Director and Platform Owner, CIBCRecorded: Jun 24 201943 mins
In this session, we'll discuss:
• The evolution of open banking architecture across different regions and markets.
• Creativity vs. standardization: competing pressures and concerns in open banking.
• How application programming interface (API) gateways and microservices fit into a comprehensive architectural solution.
• The emergence of service mesh as the foundation of open banking architecture.
• Canadian Imperial Bank of Commerce's (CIBC’s) open source, cloud-native API platform.
• How to establish an API-driven business culture focused on speed and innovation.
Rajesh Ghai Research Director, Carrier Network Infrastructure IDC, Rajesh Ghai Director, Carrier Network InfrastructureRecorded: Jun 24 201953 mins
Enterprises have embraced cloud computing to unlock the opportunity offered by digital transformation. The cloud’s flexibility and agility enable enterprises to grow their business without borders and ensure productivity and efficiency.
While enterprise applications continue to migrate to the cloud, the necessary change in the wide area network (WAN) is often overlooked. The hub-and-spoke WAN architecture that served the needs of the enterprise when applications were delivered from the datacenter, must evolve to serve the needs of the era of cloud applications. Software-defined WAN (SD-WAN) is the WAN's response to this paradigm shift in application traffic to the cloud.
While SD-WAN has emerged as a key enabler of secure and seamless direct cloud application access with the benefits of transport independence, better security and path selection, it has brought into focus the importance of the transport underlay and the technology investment — both past and future — that an enterprise needs to consider before adopting SD-WAN.
This webinar spotlights two critical success factors for driving mainstream enterprise adoption of SD-WAN:
*Predictable and robust Internet connectivity
*Investment protection (of installed legacy network equipment or in new technology) as the WAN evolves to support applications delivered from the cloud.
Join us at this webinar as we make sense of SD-WAN adoption for your company.
Kevin Brown, Adrian Comley, and Peter SaderRecorded: Jun 24 201930 mins
The visibility, control and agility that an SD-WAN can deliver to a global organisation makes it very attractive, but it can come with significantly higher risks. In around 80 per cent of the bids we see, customers aren’t actively considering or aware of these risks. SD-WAN is highlighting the tension between CIOs, focused on supporting the business with technology enabled solutions, and CISOs, concerned with managing information security risks. Are you clear on how to deliver the benefits of SD-WAN, whilst maintaining the security of your organisation?
Join our webinar on 24 June where Kevin Brown, our Managing director of Security, Adrian Comley, General manager, Dynamic Network Services, and Peter Sader, Security head of business development, discuss the top 3 security risks you need to consider to make sure your SD-WAN implementation is secure.
Verwaltung des gesamten globalen SonicWall Security-Pakets, das virtuelle und physische Firewalls der nächsten Generation, Cloud App Security, Capture Client für Endpunkte und SonicWave-Wireless-Access-Points einschließt.
Erez Tadmor,Sr. Product Manager, Tufin & Dan Rheault, Sr. Product Marketing Manager, TufinRecorded: Jun 24 201949 mins
A segmented network operationalizes your network security policy, enables a demonstrable state of continuous compliance, and provides mitigation options for cyberattacks.
Our advice: organizations must go back to the basics to accomplish this crucial project.
This webinar will cover actionable tips for network segmentation based on the experience of over 2,000 organizations. We will share:
•Common pitfalls to avoid
•How to start segmenting your network today
•Tips for applicable enforcement
•Q&A from the attendees
Phil Hagenm DFIR Strategist SANS Senior Instructor - Red CanaryRecorded: Jun 24 201971 mins
Join Red Canary, Carbon Black, and MITRE as we shine a light on defense evasion. This informative webinar will offer a comparative across operating systems, sharing examples of defense evasion in Windows, macOS, and Linux environments.
You will learn:
- Real-world insights into what security teams are facing in their environments.
- Examples of prominent, defense-evading malware.
- Common adversary techniques like scripting, masquerading, code obfuscation, and disabling security tools.
- Actionable advice on how to hunt for and build detection strategies around defense evasion.
Presenters include: Tony Lambert, Detection Engineer - Red Canary, John Wunder, Principle Cybersecurity Engineer - MITRE and Rick McElroy, Head of Security Strategy - Carbon Black
Dr. Kevin Mahoney, Practice Director, Advanced Threat ProtectionRecorded: Jun 21 201931 mins
Discover the tactics cyber criminals are using to steal valuable taxpayer and student data. State government, local government, and educational institutions across the globe are at risk of facing sophisticated attacks if they do not have the proper security in place. We'll look at common exploit trends and provide actionable tips on how to outsmart them by implementing proactive measures to better secure your organization's most critical data.
Rob Silverberg, Dell Technologies CTO, Digital CommunitiesRecorded: Jun 21 201934 mins
As cities move to embrace smart city technologies and Internet of Things (IoT) solutions, they need to understand the new data challenges associated with these projects. In this webcast, we’ll explore the drivers and reasons to implement a Smart City Data strategy and architecture for tangible city and community improvements, not just a science experiment. We will review the challenges and how some cities are preparing to manage the data coming from sensors and IoT devices, as well as review how the Boomi platform and Dell EMC infrastructure supports smart city solutions.
Danny Akacki, Sr. Technical Account Manager, Gigamon Insight and TJ Biehle,Sr. Technical Account Manager, Gigamon InsightRecorded: Jun 21 201944 mins
To whack, or not to whack, that is the question:
Whether ‘tis nobler in the mind to torch all
The compromised boxes on your poor network,
Or to take arms against a sea of malware
And by blocking stop them all.
So, what do you do during an active security incident? When is the proper time to whack-a-mole with your mallet? Is it better to light everything on fire and start over, or should you make observations a key component of your response and mitigation strategy? In this webinar, we'll discuss strategies for when it's time to scorch the earth versus sit back with a cup of tea, gaining intel into what active adversaries are doing in your house.
We’ll break down some of the most important points to remember during the commotion of an active incident response, including:
•Context is king. We’ll explain the important questions you need to be ask when scoping an incident to get an improved view of the situation.
•Thinking fast and slow. It’s understandable to want to nuke everything from orbit just to be thorough, but it’s usually not the smartest play. We’ll outline the potential benefits and risks of hasty containment and remediation efforts versus slow, thoughtful analysis when executing a response game plan.
•The law of diminishing returns. There can be a tipping point where the cost of your decisions and polices no longer justify the answers you’ll find. We’ll talk you through some tactics to find the sweet spot between effort and return.
Mike Volk, VP, Cyber Risk Solutions, PSA Financial and Casey Corcoran, CISO, OPAQRecorded: Jun 21 201930 mins
Cyber security is complicated. Managing cyber risk is even more complicated, particularly for small- and midsize businesses that have limited financial and personnel resources to apply to this business priority. It’s not that SMB executives don’t understand the consequences of falling prey to cyber-attacks. They acknowledge that they should do more to improve their risk posture. However, they need help with understanding where best to invest their finite resources to reduce their exposures.
Forget the fear and uncertainty factor, and say goodbye to depending solely on fate and hope for risk management – this webcast is designed to equip SMBs with actionable steps to greatly improve their risk management posture and open up opportunities with customers, supply chain partners, and others who seek to do business with risk-savvy businesses.
Martin Werner, Fujtsu, Matthias Kretschmer, SAP & Carsten Duch, SUSEJun 25 20198:00 amUTC60 mins
Stellen Sie intelligente Daten für das intelligente Unternehmen bereit, indem Sie sämtliche Daten verteilter Datenlandschaften richtig koordinieren und steuern mit dem containerbasierten SAP Data Hub. Containerbasiert heißt, dass die zugrundeliegenden Komponenten wie Engines, Agents und Metadatenspeicher in SAP HANA jeweils in einer isolierten Ausführungsumgebung innerhalb von Kubernetes ausgeführt werden. Insofern wird dadurch die Installation erheblich vereinfacht und die Bereitstellung beschleunigt. Eine zentrale Rolle spielt hierbei die SUSE-Lösung SUSE Container-as-a-Service Platform. Sie sorgt dafür, flexible, vereinfachte und automatisierte Möglichkeiten zur Auslieferung von kleinteiligen Services (Microservices) mithilfe von Containern bereitzustellen, samt der Verwendung von Kubernetes.
Erfahren Sie in dem gemeinsamen Webinar von Fujitsu und SUSE mehr über die Strategie und Neuerungen im containerbasierten SAP Data Hub und wie Kubernetes ein Schlüsselelement für die Lösungen zur Anwendungsbereitstellung sein wird.
Alberto Maestre, Pre-Sales Engineer SEEMEAJun 25 20198:30 amUTC60 mins
¿Por qué automatizar? ¿Porqué ahora? La automatización es crítica para la transformación digital, esencial para reducir la superficie de ataque y obligatoria para garantizar el cumplimiento continuo.
Únase a nosotros para nuestro webcast el 25 de junio a las 10:30 “5 señales claras que necesita para automatizar las operaciones de seguridad de red” para aprender:
Cómo acelerar de forma segura el proceso de cambio de red
Mejores prácticas para comenzar con la automatización
Pautas para cumplir con el objetivo de Zero-Touch Automation
Conviértalo en una de sus resoluciones 2019 para adoptar la automatización y reducir el tiempo y el esfuerzo que dedica a las tareas manuales relacionadas con las operaciones de firewall. Los cinco signos claros pueden ayudarlo a desarrollar el caso de negocios y obtener una participación de la administración para maximizar la agilidad y la seguridad con la automatización y la orquestación de políticas de seguridad de Tufin.
John Aarsen, SE - Benelux and Nordics, SonicWallJun 25 20199:00 amUTC60 mins
Many organizations are adopting cloud platforms such as Office 365 or G Suite. These offer a broad range of productivity tools beyond just email, so email security point solutions alone cannot protect the entire platform from targeted attacks.
Hear from our SonicWall security expert to learn:
•The key capabilities needed to protect cloud office platforms
•How SonicWall Cloud App Security can help you protect email, data and user credentials for Office 365, G Suite and other SaaS apps.
Abdul Ali Irfaan, Aruba TAC TeamJun 25 20199:00 amUTC90 mins
The Live Upgrades feature allows the managed devices and APs in a cluster to automatically upgrade the software from ArubaOS 8.1 version to higher ArubaOS versions. Managed Devices in a cluster can be seamlessly upgraded by specifying the new image file and a target partition.
During this webinar we will cover the below topics:
· Cluster Live Upgrade is a feature introduced in 8.1.x version.
· This feature works along with clustering.
· It provides seamless upgrade of the controllers, APs with minimal RF impact.
· No manual intervention required during the upgrade.
· APs are logically partitioned and upgraded using AP image pre-load feature and thereby providing the coverage for the clients during the upgrade.
Stefan Munz, Account Manager, FireEyeJun 25 20199:00 amUTC60 mins
Die Anforderungen für eine handlungsfähige Cyber-Defense Organisation sind anspruchsvoll. Heute braucht man einen Malware-Reverese Engineer, morgen einen Threat Hunter, übermorgen einen Intelligence Analyst und nächste Woche einen Incident Response Consultant. Das Expertenwissen muss "von jetzt auf gleich" verfügbar sein, jedoch hat man im Durchschnitt nicht das Budget für alle 4 Arbeitsstellen.
Für Unternehmen und Organisationen stellt sich dann die Frage: wie kann man das gesamte Expertenwissen intelligent vereinen?
Erfahren Sie in unserem Webinar, wie FireEye mit unterschiedlichsten Experten und Services als verlängerter Werkbank Ihrer Cyber-Defense Organisation agiert und welche weiteren Vorteile sich hierbei für Sie ergeben:
· Kompletter Zugriff auf die vollständige FireEye Cyber Intelligence Services
· Ad-Hoc Verfügbarkeit von Expertise und Erfahrung unseres Teams
· Regelmäßige Cyber Threat Briefings
· Einfacher Zugang zu Services wie Red Teaming, Table Top Exercises oder Purple Teaming
· Incident Response Retainer mit globalen SLAs
Dave Berry, Senior Solutions Engineer - International, Unravel DataJun 25 20199:00 amUTC60 mins
The movement to utilize data to drive more effective business outcomes continues to accelerate. But with this acceleration comes an explosion of complex platforms to collect, process, store, and analyze this data. Ensuring these platforms are utilized optimally is a tremendous challenge for businesses.
Join Dave Berry, Senior Solution Engineer at Unraveldata, as he takes you through an AI/ML based approach to Application Performance Management applied to data applications on any infrastructure - whether it be cloud, on-premise, or a combination of the two.
H2O Driverless AI is H2O.ai's flagship platform for automatic machine learning. It fully automates the data science workflow including some of the most challenging tasks in applied data science such as feature engineering, model tuning, model optimization, and model deployment. Driverless AI turns Kaggle Grandmaster recipes into a full functioning platform that delivers "an expert data scientist in a box" from training to deployment.
In the latest version of our Driverless AI platform, we have included Natural Language Processing (NLP) recipes for text classification and regression problems. With this new capability, Driverless AI can now address a whole new set of problems in the text space like automatic document classification, sentiment analysis, emotion detection and so on using the textual data. Stay tuned to the webinar to know more.
Brett Raybould, Solutions Architect, Menlo SecurityJun 25 20199:00 amUTC45 mins
Protecting organisations from web threats has typically been done with a proxy or DNS solution, but a new approach has emerged.
Isolation defends against today’s sophisticated zero-day exploits using an “air-gapped” browsing approach.
Identified by Gartner as “one of the single most significant ways to reduce web-based attacks,” remote browser isolation has become an important line item in IT budgets around the world. But not all Isolation is created equal. With so many offerings how do you weed through the noise?
Join us and Menlo Security to learn:
- Why remote browser isolation technology adoption is on the rise
- Key use cases for Isolation that should be evaluated
- 3 critical requirements when selecting a practical browser isolation solution
Sam Kumarsamy, Senior Product Marketing Manager, GigamonJun 25 201910:00 amUTC47 mins
How do you reduce complexity of your transforming infrastructure, gain greater IT tool efficiency and maximize visibility into your network? The right solution should empower you to produce better outcomes with less effort at lower cost. That is where a next-generation packet broker comes into play.
Join Gigamon to get the latest best practices to:
• Acquire and aggregate all network traffic for better visibility
• Stop duplicate packets from overloading your tools
• Filter traffic to provide the right data to the right tools
• Optimize compliance and reduce risk across your entire IT environment
If you need to optimize your tools, improve network performance and availability, get better insights into threats and enable your Network Operations and Security Operations teams to collaborate, you won’t want to miss this technical webinar.
One of the UK’s largest and oldest high street banks is investing over £3 billion to deploy new technology that will make banking simpler and easier for customers and drive operational efficiencies. Improving digital services and creating a digital workplace are central to this transformation.
Research by networking specialists, Aruba, finds there are clear benefits to being a ‘digital revolutionary’ – an employee who works in a fully-enabled digital workplace – versus a ‘digital laggard’ - those that have less access to workplace technology. These include increased productivity, collaboration and job satisfaction.
The bank wanted to introduce an alternative to the existing mobile phone offering for better colleague choice, to improve collaboration and increase productivity. They came to TeleWare based on our expertise in mobile communications to specifically help them to:
•Move from wired to wireless communications technology
•Support them in adopting modern working practices
•To provide an alternative to the existing mobile phone offering
•To provide greater colleague choice
In this exclusive interview with pivotal TeleWare stakeholders on this project, find out how TeleWare are helping this major bank transform its mobile communications offering for colleagues.
Financial Services professionals
HR professionals interested in employee engagement
What you’ll take away:
Unique insight into how a tier 1 bank is using Re:Call to improve employee engagement and mobility can have positive impacts on your bottom line.
Hosted by Mark Elwood, Marketing Director, TeleWare
Nick Reaks, Sales and Customer Director, TeleWare
Alan Clarke, Technical Project Lead, TeleWare
Fulya Sengil, Solution Architect & Adam Reyland, Regional Marketing Specialist at VeracodeJun 25 201910:00 amUTC45 mins
Many commentators observe that the IoT devices just aren’t up to scratch, when it comes to security. GDPR requires vendors to and service providers to design things with security as standard. In February 2019, the European Standards body ETSI published security guidelines for the consumer Internet of Things aligning with IOT Security Compliance Framework.
IoT requires the best in all aspects of security — physical, operational technology, and cybersecurity. Thus, it makes sense to envisage IoT security as an ecosystem in itself. Unexpected challenges are likely to erupt because of the existence of several layers in the IoT ecosystem. This calls upon leaders to initiate regular automated risk assessments and simulations such that IoT specific breaches can be monitored closely. This helps businesses build reliable playbooks that enable organizations to respond to IoT security challenges.
Software installed on these devices could be potentially vulnerable, if it has not an automated security assessment before deployment. We take a look at how it’s possible to make the software that drives these devices and the backend serverless technologies secure based on requirements in IOT Security Compliance Framework.
Kelvin Murray, Sr. Threat Research Analyst, WebrootJun 25 201910:00 amUTC60 mins
With cybercriminals constantly innovating ways to steal information and monetise data, it’s crucial for businesses and MSPs to keep up to date on emerging cyber threat trends.
Webroot is hosting a series of webinars every three months that aim to keep the industry informed on the latest threat trends and to review the top cyberattacks that hit businesses each quarter, as well as tips for staying safe in a complex threat landscape.
Join Webroot as we discuss topics like:
• Information theft and phishing attacks
• Headline-grabbing breaches and the torrent of smaller ones that don't make the news
• The evolution of ransomware
• The theft, trade, and cracking of passwords
Jamie Baker, Senior Product Manager, SyncsortJun 25 201911:00 amUTC55 mins
Capacity management is an integral function of organizations running multi-domain complex IT environments. However, the shift over the years from physical to virtual to Cloud and DevOps/Microservices has inevitably changed the perception of capacity management and whether it is still needed.
View this webinar to learn why it’s necessary to invest in a capacity management solution to deliver business and service assurance, but also control costs and meet SLAs. In this webinar we cover:
•How capacity management has evolved and why it’s as important for the Cloud
•How capacity management can encompass but differ from real-time monitoring
•What benefits can be realized from implementing and maturing a capacity management process
•Why a mature capacity management process should co-exist with your load and performance testing activities
Stewart Hunwick, Dell EMC’s EMEA Presales SpecialistJun 25 201911:00 amUTC60 mins
Optimise workloads and simply data management with no-compromise, midrange storage – Dell EMC Unity next generation multi-cloud solutions. Gain data speed, cloud simplicity and management efficiency
Built for a multi-cloud strategy, the next-generation Dell EMC Unity XT delivers unified storage speed for quicker access to application data as well as increased efficiency. This no-compromise midrange storage platform easily supports a fully-integrated multi-cloud infrastructure for faster, simpler data access and operations. Unlock the value of your data capital with Dell EMC Unity XT.
•Speed performance and optimize any workload
•Simply your data landscape with increased management efficiency
•Achieve cloud readiness
Emily Pali, Product Manager, and James Royalty, Principal EngineerJun 25 201912:00 pmUTC22 mins
CDNs are critical in a globally distributed world where users expect optimal performance regardless of where they are located.
The reasons for implementing a multi-CDN environment might seem obvious--high availability and redundant infrastructure--but if set up correctly, it can actually impede the user experience.
The reality is, if you’re not routing traffic efficiently across your multi-CDN environment you’re not truly benefiting from it. NS1’s Pulsar Active Traffic Steering allows you to truly harness the power of multi-CDN without the headache.
Matthias Maier, EMEA Director of Product Marketing, Splunk, Brandon Dunlap, Moderator, (ISC)²Jun 25 201912:00 pmUTC60 mins
What is the MITRE ATT&CK framework? Where did it come from? Why and how should you use it? Get the answers to all of these questions, as security experts from Splunk take a practical look at how your SOC and SIEM can apply the MITRE ATT&CK framework. Ensure the coverage of known TTP’s of threats your business is exposed to, to improving threat hunting and detection of Adversary’s. Join this webinar to discover:
• What the MITRE ATT&CK framework is, and why it should be used
• How to align your use cases to the MITRE ATT&CK framework
• How to navigate an ATT&CK Threat group TTP's
• How to track and monitor your detection capabilities to ensure wide coverage
Joanna Dapkevich, VP, Support Tooling and Watson Innovation, IBM Lily Ryzebol, Offering Manager, Watson in Support, IBM Bob FJun 25 20191:00 pmUTC40 mins
IBM, a 105-year-old company, transformed its customer support channel for over 22,000 agents. To evolve its business and drive new levels of engagement, IBM partnered with Salesforce to support its service transformation, create a consistent agent experience, and drive greater value to customers globally.
Join us for an in-depth look at how IBM reinvented its 50+ year old ticketing system, now powered by AI, and how it uses Watson and Salesforce to deliver outstanding customer service. Also, learn about its breakthrough initiatives using Community Cloud to build a digital front door for its customers and Field Service Lightning to manage complex remote deployments around the world. Finally, plan how you can launch your own transformation with lessons learned and best practices from IBM.
Dan Leitao, Product Manager at OnfidoJun 25 20191:00 pmUTC35 mins
When it comes to user onboarding, there’s a tension between security and convenience. For financial services, non-compliance with KYC requirements can be costly. But adding too much friction will impact your ability to scale. So how can you optimise your user experience to introduce just the right amount of ‘friendly’ friction and unlock growth?
Join this webinar with Dan Leitao, Product Manager at Onfido to learn:
- Why financial services need friendly friction
- How to tailor and optimise your onboarding process according to your risk-based approach
- The key features you can utilise to improve your UX
-How to manage the balance between security and convenience
-Ensuring you stay compliant in an ever-changing regulatory environment
Mark Burton, from Riverbed and Tim Wade, from Dimension DataJun 25 20192:00 pmUTC60 mins
For anyone following pro cycling, our web-based Race Center application is revolutionary. Combining live data, video, images, social media feeds and commentary, it gives fans, teams and organisers an unparallel view of the action. Through the smart application of machine learning and artificial intelligence it enables us to tell the story of pro cycling like never before.
But in order for us to provide seamless access to the information Race Centre requires that the team have transparent view of the user experience.
Join Dimension Data and Riverbed to find out how we’re using a high-performance platform to delivers superior experiences with quick access to data with 100% accuracy and no blind spots.
Andrew Brust, Kurt MuehmelJun 25 20192:00 pmUTC60 mins
Artificial intelligence (AI) and machine learning (ML) are exciting, growing in adoption and more applicable to business contexts than ever before. The problem is, a lot of AI/ML work to date has relied upon rare and expensive data scientists. These practitioners take data sets, then experiment with different frameworks, algorithms and parameter values to create the best predictive models possible. This bespoke approach can be fascinating, but it just won’t scale sufficiently to bring AI and ML into the Enterprise mainstream.
Why perpetuate an AI process that is so manual when heuristics – and even ML itself – can help automate data cleansing, algorithm selection and parameter tuning? Yes, AI automation can help organizations without data scientists do AI and ML. But beyond that, even orgs with strong data science teams can use AI automation to remove tedium from, and increase accuracy in, their work. It’s win-win, even if it removes some of AI’s mystique.
Want to learn more about automating AI, and making it actionable and accessible to all your data workers? Join us for this free 1-hour webinar from GigaOm Research. The webinar features GigaOm analyst Andrew Brust with Kurt Muehmel, VP of Sales Engineering at Dataiku, a leader in AI for the Enterprise.
In this 1-hour webinar, you will discover:
Why bespoke AI work is fast becoming unsustainable
The science and power behind automated machine learning (AutoML)
How to leverage AI automation while combating bias, drift and other AI/ML pitfalls
Register now to join GigaOm Research and Dataiku for this free expert webinar.
Benjamin Tattermusch (SAP Concur), Armin Friemelt (Integration Expert, Platinum Engineering Concur, SAP)Jun 25 20192:00 pmUTC37 mins
Die Integration der Reisekosten in das Finanzsystem ist wichtig für die Transparenz. Erfahren Sie in diesem Webinar alles über das einmalige Aufsetzen der Integration von SAP Concur in das SAP ERP in vier einfachen Schritten (Live Demo), und den sicheren, automatisierten Datentransfer zwischen Concur und SAP.
Sie wollen zu Travel & Expense Management auf dem Laufenden bleiben? Dann registrieren Sie sich jetzt für den News-Service von SAP Concur: https://bit.ly/2GZRZba
If you're in email security, you probably know that BEC is something to be worried about. It's very hard to detect and plays very well on human vulnerabilities. But do you really understand how this attack works? Did you know that BEC isn't just social-engineering but also relies on payload-based attacks? Did you know real-time prevention (and not detection) of BEC attacks is possible with the right techniques?
Join our Chief Strategy Officer and VP Products to learn more about:
1. What BEC really means
2. How BEC attackers think and how they work their way into your organization
3. Real-life examples of BEC attacks
4. How you can better protect your company