As an IT professional, many of the problems you face are multifaceted, complex and don’t lend themselves to simple solutions. The information technology community features useful and free information technology resources. Join to browse thousands of videos and webinars on ITIL best practices, IT security strategy and more presented by leading CTOs, CIOs and other technology experts.
Mario Matthee, SQA Architecture and R&D, DVT Global Testing SolutionsRecorded: Apr 25 201941 mins
In this session, Mario Matthee shares insights into a real life project that was completed by DVT. DVT’s testers were responsible for the testing of a new investment bot, and in the process we faced many challenges: distributed teams, being too agile, red tape (banks have plenty of this), complex financial models, ever-changing requirements and more.
Mathee shares the story of how his team took DVT’s first bot live using behavior-driven development methodology and a mixture of manual and automated testing. You will learn that BDD is not as scary as it is made out to be, that there is a place for manual testers in BDD, that you can be agile and still work in your own way.
Dave Bartoletti, Vice President and Principal Analyst, Forrester ResearchRecorded: Apr 24 201947 mins
Accelerate your innovation journey using containers.
Firms have become more comfortable with containers in the last 3 years and container usage is expected to continue to grow. With growth comes more sophisticated requirements. Containers support configuration management and continuous integration/continuous delivery (CI/CD) processes by offering improved flexibility, performance, and security. Open source software has been key in unlocking container and container platform innovation. Firms have learned to use and contribute to open source to reap the rewards of communities.
In this webinar, Forrester research analyst Dave Bartoletti will share new insights from a March 2018 study into how organizations are using containers, container platforms, and open source to quicken adoption of more enterprise apps. He'll cover:
How container usage has improved in recent years.
What the future of containers and container platforms looks like.
Navigating the performance and security challenges of containers and container platforms.
How containers can improve customer experience and lower costs.
How open source can accelerate innovation in your organization.
Zack Allen, Director of Threat Operations, ZeroFOX and Ryan Trost, Chief Technology Officer, ThreatQuotientRecorded: Apr 24 201941 mins
How to identify and mitigate social media and digital risk
Financial service organizations have a massive footprint and attack surface on social media & external digital platforms — all of which is ungoverned, unmonitored and unprotected by the existing security perimeter. Understanding the threats on these platforms is critical, from financial fraud, phishing and malware spread on social media, customer scams, impersonating accounts and mobile apps, and more. Join ZeroFOX and ThreatQuotient to learn the top risks facing financial institutions on social and digital channels and key tactics for addressing those risks.
-Understand top trends and threats facing financial institutions on social and digital channels
-Gain knowledge of key tactics for addressing social and digital threats
-Learn about the tools available to your organization for mitigating risk
Rich Graves, Director of Product Management at ServiceaideRecorded: Apr 24 201961 mins
Are the machines out to get you? Are they going to replace you and your colleagues? The short answer is "No", but they have the potential to change how you do your job. This primer will enable you to be informed about these changes and proactive in making your job more productive and enjoyable.
This presentation will dive into how components of artificial intelligence are being used to create modern conversational support experiences today. Learn about the differences between chatbots and virtual agents, discuss scenarios where virtual agents excel, and how virtual agents can improve key support metrics such as MTTR and customer satisfaction.
According to new ICMI research, only 16% of contact center leaders strongly agreed that their QA program was setting them up for success. Are you part of the 84% that aren’t completely sold on your QA program? If so, mark your calendar! Join us on April 24 to get an exclusive first look at the soon-to-be-released results from our recent quality management and analytics study. Whether you’re looking to benchmark your current practices against your peers, or seeking ways to refine your approach to analytics and quality management, you don’t want to miss this!
During this webinar, you will learn:
- What ICMI’s research reveals about the current state of quality management and analytics in the contact center
- How contact center leaders feel about the impact and influence of quality management on their organizations
- How you can leverage predictive analytics to take your quality to the next level
Join us for an interactive and informative hour, complete with live audience Q&A.
Bob Laliberte, Senior Analyst at ESG Inc.Recorded: Apr 24 201956 mins
For many organizations, the wide area network (WAN) infrastructure that connects an enterprise’s remote and branch offices has not changed for decades. However, as application are rapidly moving to the cloud ( SaaS and IaaS), the WAN needs to evolve in response.
Bob Laliberte, Senior Analyst with ESG, Inc., will explore the challenges many organizations face with legacy WAN environments, illustrate why a new solution is needed and highlight the business value of rearchitecting with SD-WAN. This will include reviewing customer examples and a TCO model to demonstrate the value to your business. Organizations will learn how SD-WAN provides a combination of pure economic benefits as well as agility and flexibility to help organizations be successful.
Violations of the Foreign Corrupt Practices Act and other similar laws occur when money or other things of value are provided, directly or indirectly, to foreign officials to obtain or retain business.
Often times the money needed for a bribery scheme is generated internally within a company by culpable employees, working with culpable third parties, through false invoices and other contracting schemes.
This frequent aspect of FCPA enforcement will be the focus of an engaging webinar presented by FCPA expert Professor Mike Koehler. During the webinar, participants will learn of false invoicing and contracting schemes alleged in recent enforcement actions as well as invoice and contract monitoring practices designed to minimize FCPA risk.
Tyson Gern, Director, Pivotal Education & Dylan Ham, Lead, Pivotal EducationRecorded: Apr 24 201932 mins
Pivotal Education enables you to continuously deliver business value in a rapidly evolving market by providing the modern software expertise you need to excel in a cloud-native world.
In this webinar, we will discuss the breadth of training, certification and the Platform Acceleration Lab (PAL) options available for Spring and Cloud Foundry developers, architects, and operators.
We'll also show you how Pivotal Education makes it easy create a custom Spring or Cloud Foundry training plan specific to your learning needs and schedule, using in-person and online content and tools.
Brian McHenry and Graham AldersonRecorded: Apr 24 201935 mins
Distinguishing between good bots, bad bots, and humans is a major challenge. Today, over 50% of online traffic is generated by bots and they are involved in nearly every attack. Identifying malicious bots and safeguarding against them is now a top priority for organisations developing a sustainable security strategy.
Join us for this webinar to learn:
- How bots infect, propagate, and attack applications
- What types of application attacks are commonly performed by bots
- How you can defend against bad bots without disrupting the good ones
Molly Stamos, Customer Success Engineer and Ben Hartshorne, Senior EngineerRecorded: Apr 24 201961 mins
Distributed systems bring complexity for developer and ops teams. When incidents occur in production, expected and unexpected, you want to pinpoint which part of the service is giving problems. Distributed tracing illuminates distributed systems, making your logs easier to navigate. Quickly identify where there are errors or latency in your code or service, even within 3rd party services you use. Instrumentation is the key to the best tracing experience possible.
This session is live @10am PDT April 24. We will dive into the importance of tracing when debugging, and show how Honeycomb Beelines fast-track instrumenting code. You will learn:
* The importance of tracing when debugging production along with other types of analysis
* how to debug by analyzing patterns and trends in the data generated by traces
* how to work with OpenCensus or OpenTracing (yes you can with Honeycomb).
Join this exciting session and discover the value of tracing. Spoiler: it's easier than you may think.
Persistent data management is challenging, especially for companies experiencing fast growth or volatility in data proliferation. Performance telemetry is vital for operating databases like PostgreSQL, Oracle, and SAP HANA. Viewing third-party database telemetry in the context of a full Google Cloud environment allows you to understand impact and relationships. Attendees will learn how to use Stackdriver to monitor third-party databases along with Google Cloud resources at a depth that allows them to tune database performance and solve application problems more quickly.
Wesley Simpson, (ISC)²; Christopher Pierson, BLACKCLOAK & Marija Atanasova, BrightTALKRecorded: Apr 24 201963 mins
Find out what's trending in BrightTALK's IT Security community and the challenges keeping security professionals up at night.
Join Wesley Simpson, COO of (ISC)², Dr. Christopher Pierson, Founder & CEO of BLACKCLOAK and Marija Atanasova, Sr. Content Strategist from BrightTALK for an interactive Q&A session to learn more about:
- Topic trends & key insights
- What security professionals care about
- Events in the community
- What to expect in Q2 2019 and beyond
Brandon Cooper, Sales Support EngineerRecorded: Apr 24 201925 mins
Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability. Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do. We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately. Sign up to test drive CMD+CTRL!
Sanjay Agrawal, Co-Founder & VP of Engineering & Sean Zinsmeister, Head of Product Marketing, ThoughtSpotRecorded: Apr 24 201962 mins
For years, analytics vendors have helped enterprises understand what’s happening in their business, yet often failed at answering the more valuable question of why it’s happening.
Everyone expects to have data to understand what’s happening it their business. When it comes to understanding why that’s happening, it’s a completely different story. People don’t even know what questions to ask to begin answering that question, slowing down decisions and stifling business growth.
With AI-driven analytics, that’s all about to change. SpotIQ, the AI engine from ThoughtSpot, asks thousands of questions and automatically shares relevant, customized insights buried in your data. Business users can get to the heart of why changes are happening to make decisions with confidence.
Aaron Weaver - Application Security Architect, OWASP and DefectDojoRecorded: Apr 24 201943 mins
You’ve probably heard many talks about DevSecOps and continuous security testing but how many provided the tools needed to actually start that testing? This talk does exactly that. It provides an overview of the open source AppSec Pipeline tool which has been used in real-world companies to do real security work. Beyond a stand-alone tool, the OWASP AppSec Pipeline provides numerous docker containers ready to automate, a specification to customize with the ability to create your own implementation and references to get you started.
The talk will also cover how to add an AppSec Pipeline to your team’s arsenal and provide example templates of how best to run the automated tools provided. Finally, we’ll briefly cover using OWASP Defect Dojo to store and curate the issues found by your AppSec Pipeline. The goal of this talk is to share the field-tested methods of Aaron Weaver - If you want to start your DevSecOps journey by continuously testing rather then hear about it, this talk is for you.
John Armstrong, Head of Product MarketingRecorded: Apr 24 201931 mins
The business case for cloud migration is compelling: cost reductions, ease of growth and
expansion, outsourcing of infrastructure and maintenance, and improved access to the latest
technologies. However, many organizations that are migrating to the cloud focus on technical factors and overlook the broader business implications of their projects. As a best practice, assessing the opportunities and risks for the organization should be a joint effort led by the IT and business unit teams. At the highest level, a business justification focuses on the return on investment (ROI) associated with a proposed technical change. However, many supporting data points are required to populate the formula and achieve a realistic calculation.
In this webinar, we will address these and other critical questions:
What are the key business expectations associated with a cloud migration?
What are the implications if the cloud migration doesn’t go as planned?
What business considerations should be included in any cloud migration plan?
And always, this webinar will be followed by a short Q and A session with the audience. Please join us!
Jinan Budge, Principal Analyst Security & Risk, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, ProofpointRecorded: Apr 24 201966 mins
Why is cybersecurity transformation critical right now, and what are the most effective frameworks for organizing change?
Join guest Forrester speaker Jinan Budge and Proofpoint for an interactive discussion of the biggest challenges that today's CISOs face, and why a people-centric approach to security is necessary in today’s threat landscape.
· How business transformation like the rise of Office 365 has driven cybersecurity transformation
· Why you should pivot your transformation around people and culture, rather than infrastructure
· 6 principles for successful cybersecurity transformation
Rani Osnat, Aqua Security and Mark Bouchard, CyberEdgeRecorded: Apr 24 201953 mins
A joint presentation by Aqua Security and CyberEdge
Based on findings published in CyberEdge’s 6th annual 2019 Cyberthreat Defense Report*, containers are highlighted as one of this year’s “weakest links” in IT security given the lowest overall security posture score.
Mostly this can be attributed to the challenges enterprises face as they transition their containerized applications from the Dev/Test environment into production. Containers require a new approach to security as the traditional security infrastructure is not applicable to cloud native and serverless deployments. Rather they must leverage the cloud-native principles of immutability, microservices and portability using machine-learned behavioral whitelisting, integrity controls and nano-segmentation.
We will discuss :
•Key findings from the 2019 Cyberthreat Defense Report
•The unique security challenges (and benefits) of containers
•What leading enterprises are doing to automate their container security
•What you should look for in a container security solution
Doug Austin and Tom O'ConnorRecorded: Apr 24 201965 mins
In today’s era of growing data privacy concerns with GDPR and CCPA, increase in harassment claims with #MeToo and rising corporate malfeasance concerns, there are a lot of potential compliance and investigations needs with regard to discovery that organizations have today whether or not they ever lead to litigation. This CLE-approved webcast* will discuss the drivers and challenges facing organizations today to be more proactive in understanding their data to identify issues before they lead to litigation and address them proactively. Topics include:
+ Timeframes to Act After the Case is Filed
+ Challenges Posed by BIG Data and Variety of Data Sources
+ Data Privacy Trends and Challenges
+ Challenges from #metoo and Corporate Malfeasance
+ Key Stats and Challenges Regarding Data Breaches
+ Will Information Governance Bail Us Out of This Mess?
+ Data Discovery vs. Legal Discovery
+ Where the Technology is Heading
+ Recommendations for Addressing Data Discovery Challenges
Doug Austin is the Vice President of Products and Services for CloudNine. Doug has over 30 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which is a trusted resource for eDiscovery news and analysis, and has received a JD Supra Readers Choice Award as the Top eDiscovery Author each year since 2017.
Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
Omar Zarabi - CEO and founder of Port53 Technologies, Nathan Chan - Sr SE at OneLoginRecorded: Apr 24 201939 mins
Companies are moving to the cloud to compete more effectively and employees are using an increasing number of SaaS cloud applications. Unfortunately, these apps come with hidden risks and vulnerabilities when IT is not involved in securing and managing them. This issue is known as Shadow IT.
The good news is that, as serious as the Shadow IT is, it’s a solvable problem. By joining this webinar, you will learn:
- Measure the scope and risk of the Shadow IT within your business
- Gain back full control of your cybersecurity
- Bring visibility into corporate cloud application usage
- Get data driven recommendations no matter if your IT team is big or small
We will be showing a live demo of Cloud Risk Assessment Tool and walk you through a real customer case study.
So, join our two cloud security experts, Omar Zarabi CEO & Founder of Port53 Technologies, and Nathan Chan Sr SE at OneLogin on April 24th 10am PT for this webinar.
Can’t make it to the webinar? Register anyway, and we’ll send you a link to the on-demand recording once available.
Every founder starts with a big idea, but only 1 out of 10 see their idea succeed. So what’s the difference between the fintech startups that get off the ground and those that don’t make it out of the gate? What are the secrets of the startups that disrupt entire industries? This is your chance to find out how founders and VCs look at creating successful startups first-hand.
Our panel of industry experts will cover a range of topics, from getting started building your team, to the importance of finding an impactful mentor, and more. They’ll also answer questions from future startup founders in a Q&A. It’s everything you need to travel the path from big idea to successful startup.
Register for the webinar to discover:
• What successful fintech startups have in common
• The differences between being a solopreneur vs. being a co-founder
• Tips for finding and growing your dream team
• How to go from killer idea to disruptive startup
• Evan Schuman, Moderator, VB
• Jeff Cain, Senior Director, Envestnet | Yodlee Incubator, Envestnet | Yodlee
• Pierre Wolff, SVP Business Development, InCountry
• Ken Kruszka, CEO, SnapCheck
• Kathleen Utecht, Managing Partner, Core Innovation Capital
Mikey Warner, Director of QA, Office Depot - EuropeApr 25 20194:00 amUTC20 mins
Join us as we explore Office Depot’s journey from a legacy waterfall delivery organization to agile, via the use of agile principles and empowerment and a modern toolset that includes qTest for test management. In this session, Office Depot Europe’s Director of QA Mikey Warner shares how he drove process improvement, transformation and change across the global organization.
Anand Visvanathan, Director of Product Management, Symantec and Linda Park, Sr. Manager IaaS, Security & Compliance, SymantecApr 25 20195:00 amUTC45 mins
Cloud computing enables companies to be more agile and squeeze the inefficiencies out of the development cycle, such as procuring compute resources on demand rather than waiting for IT. But as companies move fast to deliver new products, security must move faster to keep up with new regulations and threats – or risk slowing down the business.
Cloud configuration errors can lead to gaping holes in cloud infrastructure deployments and present low hanging fruit for hackers. Security and DevOps teams need a proactive, automated approach to monitoring and securing their cloud management plane.
Join us for this informative webinar on how to achieve security compliance for public cloud Infrastructure-as-a-Service (IaaS) platforms such as AWS and Microsoft Azure.
During this webinar, you'll learn:
• Why traditional security monitoring tools cannot provide visibility into cloud compliance risks
• Why Security and DevOps teams need automated cloud security
posture management (CSPM) tools to remove compliance bottlenecks
• How to migrate your legacy infrastructure to the cloud without compromising security and compliance
Piotr Łukasiewicz, System Engineer, CommvaultApr 25 20198:00 amUTC75 mins
Licencjonowanie Commvault Data Platform nigdy nie było jeszcze tak uproszczone - dowiedz się, jak łatwo dobrać licencje w sposób optymalny dla swojej infrastruktury. Aplikacje, wirtualizacja czy endpointy - Commvault Complete to kompletna recepta na bezpieczeństwo!
Jörg Bunse, SUSE Linux GmbHApr 25 20198:00 amUTC60 mins
Unter dem Motto „My kind of open" fand die SUSECON vom 1. bis 5. April 2019 statt. Sie hatten nicht die Möglichkeit, zur SUSECON nach Nashville zu reisen und möchten Ihr Wissen auf den neuesten Stand bringen?
In unserem Webinar präsentieren wir Ihnen alle wichtigen Produktankündigungen und Neuigkeiten von der SUSECON.
Ashwath Nagaraj (Founder & CTO, Aryaka)Apr 25 20199:00 amUTC47 mins
As the hype cycle around SD-WAN reduces and enterprises continue to deploy hundreds of boxes across different sites, scalability is emerging as the primary challenge for growing global organizations. Network managers have to juggle multiple vendors while managing configuration, patches and security loopholes, complicating and slowing down SD-WAN adoption. Managed SD-WAN solutions are growing rapidly, but not all vendors are created equal. Some vendors offer cloud, but don’t own the network. Other service providers offer managed WANs, and yet others offer professional management. How do you differentiate between the options and pick the right managed SD-WAN for your organization?
In this webinar you will join industry experts to learn:
- Fundamental building blocks of a managed SD-WAN architecture
- Pros and cons for each of the different management and operational models
- Total cost of ownership (TCO) benefits of a 100% managed SD-WAN for a global deployment
Richard Leadbetter, Technical Sales Specialist, EMEAApr 25 20199:00 amUTC30 mins
By 2019, 92% of industrial organizations will have adopted Internet of Things (IoT) technology and 77% believe it will transform manufacturing. But, how are business executives using IoT today and what do they expect from it in the future? Join us and find out
Steve Drew and Sriram RajanApr 25 20199:00 amUTC60 mins
Kubernetes Containers can help modernise applications which is especially important for businesses. Using them means you can deploy code in small batches allowing your development teams to release software quickly increasing agility. But running large and stable clusters of Containers presents its own challenges.
Join Rackspace Principal Architect, Sriram Rajan and AWS Specialist Architect, Steve Drew on 25th April at 10am as they explain:
• How to adopt a microservices architecture using Containers
• The benefits and architectural recommendations for using Kubernetes on AWS
• An end to end approach to adopting Kubernetes from architecture to operations
A well-thought out strategy leads to success and we’ll explain exactly what a Kubernetes Containers strategy looks like.
A $100 credit voucher allowing you to test the AWS platform for a few hours will be available for all attendees that fill in our email survey. Please be aware that promo codes will be distributed only to verified company email addresses in EMEA, after completing the survey. The survey will be shared to all verified attendees following the webinar.
We’re an AWS-audited Managed Service Partner with 1,000+ certifications and an AWS Premier Consulting Partner and have all the expertise you’ll ever need.
Jenni Lee, Product Marketing Manager, AcquiaApr 25 201910:00 amUTC28 mins
In this webinar, we will cover the following topics:
- How to transform your IT digital team from a “bottleneck” to a trusted service provider
- How to implement a site-governance strategy across your organization
- Best practices for expediting website development and delivery
James McLeod, Software Engineering Lead, Lloyds Banking GroupApr 25 201910:00 amUTC30 mins
Lloyds Banking Group is a financial services group with millions of customers and a presence in nearly every UK community, both online and on the local high street. With more than one million businesses serviced through their brands, the hopes for creating the bank of the future is firmly locked in the sights of this digitally transforming organization.
In order to hit their ambitious goal, Lloyds Banking Group is changing from a traditionally introverted bank, hardened to risk through years of manual process, into an open and collaborative organization where innovation and experimentation are driven by engineering and automation.
During this talk you’ll learn how Lloyds Banking Group journeyed into Inner Source with the formation of engineering guilds and how this lead to the adoption of GitHub Enterprise from proof of concept to widespread use. We’ll also explore how engineering guilds formed the GitHub Enterprise Working Group to share successes and educate on best practices, while safeguarding the operation of their engineering community.
Finally, we’ll tell the story of how Lloyds Banking Group is moving fast toward Open Source, powered by the determination and ambition of Lloyds Engineering and the Lloyds Banking Group Open Source Mission.
About the speaker:
James McLeod is a passionate Software Engineer with a belief in open collaboration and a drive for growing engineering communities.
James’ role as Software Engineering Lead at Lloyds Banking Group focuses on guiding the engineering community, listening to feedback, and removing barriers through leading and advocating for Lloyds engineering guilds and Inner Source collaboration.
His energy and passion goes beyond the workplace where James is the founder of ‘React London–Bring Your Own Project’ – a rapidly growing London meetup, with over 1300 active members.
KTMD - A Corporate Cybersecurity Strategy to meet digital disruption challenges
Join our technical team in our first session to explore the dedicated features that gives Kaspersky Threat Management and Defense an edge.
- how KTMD exposes advanced attacks with precision machine learning and behavioral analytics, plus how it minimizes false positives to help ensure high levels of productivity for security teams, powered by the Kaspersky Security Network (KSN).
- discover what the Threats Landscape actually looks like
- what challenges Enterprises have today and explore how to mitigate against Advanced Threats whilst protecting against Complex Threats
At the end of the session you'll learn how to effectively PREVENT the threats, Rapidly DETECT the breach and RESPOND to incidents with our Multi-dimensional Advanced Threat Detection with Machine Learning.
Dan Pitman, Principal Security ArchitectApr 25 201910:00 amUTC60 mins
Financial organisations fall victim to cyber-attacks more frequently than any other industries. The growth in volume and sophistication of cyber-threats, combined with regulatory changes, mean that financial institutions are having to improve their IT security postures notably.
Facing modern cyber-threats head-on requires organisations to follow well-defined processes and mature IT security tools that need to be closely monitored and managed. Additionally, financial businesses handle highly confidential data that must be stored in a compliant manner and managed securely. A seamless combination of platform, threat intelligence, and expert services can provide a simpler, most cost-effective approach to security for all infrastructure and workloads across physical, virtual and cloud environments.
Get the inside scoop on a new approach to threat management that gives financial organisations the right level of coverage for the right resources. Join our Principal Security Architect, Dan Pitman, to learn more about this more effective approach to cybersecurity and threat management in the financial world.
• The state of cybersecurity at financial institutions
• Integrating security and compliance within Financial Services
• Understand how today’s vulnerabilities are being exploited
• Find out how to achieve the right level of leverage for the optimal level of investment
Using Dynamics 365 with Power BI? Frustrated by slow query response times? Struggling to report against transactional data?
If so, don’t miss our next webinar: “Turbo Charge your Power BI Dashboards with Atlas”.
During this webinar, our solutions specialist will show you how Atlas for Dynamics:
•Provides live, record level reporting against D365 data with access to 45+ additional transactional data entities – opening up a whole new world for Power BI
•Massively speeds up D365 query response time with incremental caching – see how queries that took hours now refresh in seconds … delivering snappy Power BI visualizations that keep your business users happy
•Combine multiple data sources to create Power BI dashboards that span D365 and on-premise legacy data
•Improve your financial and operational reporting with real-time reporting in Excel with drill-down into journals, balances and sub-ledgers
… and more!
Anass Bezzari, Senior Pre-Sales ConsultantApr 25 201912:30 pmUTC60 mins
Selon une étude de la Harvard Business Review, en moyenne 47% des nouvelles données ont, au moins, une erreur importante.
Que vos données soient structurées, non structurées, stockées sur site ou dans le Cloud, vous devez pouvoir vous fier à leur exactitude. Vous concrétiserez leur valeur métier en veillant à ce que tous les projets et les processus importants soient alimentés en données fiables et pertinentes.
Avec les produits de qualité et de gouvernance des données d'Informatica, vous avez la possibilité d'accroître la valeur métier en veillant à ce que tous les projets et les processus importants soient alimentés en données fiables et pertinentes.
Vincent Lieffroy, Senior Lead EngineerApr 25 201912:30 pmUTC60 mins
Les entreprises doivent agir plus rapidement que jamais dans un monde caractérisé par une hyper-concurrence et par les attentes grandissantes des clients.
C'est pourquoi nous avons conçu le Cloud Content Management (CCM) - une plate-forme unique pour accélérer vos processus métier, augmenter la satisfaction de vos employés et protéger vos informations les plus précieuses. Découvrez les nouveautés du cloud content management (CCM) en assistant à ce webinaire:
- Collaboration aisée et sécurisée dans Google Docs, Sheets et Slides, grâce à notre nouvelle intégration avec G-Suite
- Productivité permanente avec Mark for Offline - emportez vos fichiers Box avec vous lorsque vous n'êtes pas en ligne (vos modifications sont automatiquement enregistrées dans Box lorsque vous vous reconnectez)
- Des workflows de contenus fiabilisés avec Box pour ServiceNow Integration Hub
- Des cycles de développement d'applications accélérés avec Box Elements
John Jolliffe, Strategic Engagement, Adobe Document Cloud.Apr 25 20191:00 pmUTC45 mins
When it comes to conducting business with paperless documents, organisations have embraced electronic and digital signatures. The Electronic Identification and Trust Services Regulation (eIDAS) clarifies and simplifies the legal framework for e-signatures across Europe, but how should organisations decide which type of e-signature is appropriate to their needs? And how are new technologies helping to make electronic signatures relevant for the multi-device, highly mobile workspace of today?
Join our webinar, to learn:
• Why e-signatures are essential to your company's success now and in the future.
• Which three signature types are legal under eIDAS.
• How to select the right approach for your business.
• Next-gen e-Signatures and The Cloud Signature Consortium.
Florent Voignier, Founder and Chief Technical Officer, IndeximaApr 25 20192:00 pmUTC22 mins
Every day, your business is producing new data, regardless of how many employees you have or what industry you work in.
That data is full of valuable information that can help you better serve your customers, discover new opportunities, and take your business to the next level.
But to realize that business value, you need the proper tools to transform that data into actionable insight.
Best Practices to learn:
1. Reduce query cost and increase your BI performance.
2. Key factors to succeed with BI on the cloud.
3. Get more from your existing data cluster.
Set Up of Indexima on Azure
Duration: 30 minutes
Speaker: Florent Voignier, Co-founder and CTO – Indexima
Tom McNash, Senior Solutions Engineer, CyrenApr 25 20192:00 pmUTC60 mins
In this webinar, Senior Solutions Engineer Tom McNash will review how new threat attack vectors are working, how cyber criminals are building threats in new ways today—whether for malware, phishing or denial-of-service attacks--and what security approach businesses need to be adapting to defend against these attacks. He will also explain how the profile of attackers targeting businesses is changing, and how one traditional form of defence against sophisticated attacks—the appliance sandbox—has itself become the object of attacks.
Lakshmi Kanthan, International Product Mktg, Fujitsu; Christophe Le Roux, Azure Stack Partner Lead EMEA, MicrosoftApr 25 20193:00 pmUTC60 mins
Microsoft Azure Stack enables you to deliver Azure Cloud Services from your on-premises data center, ensuring consistent service delivery across on-premises and public cloud. Fujitsu developed PRIMEFLEX for Microsoft Azure Stack which is an integrated system that includes all the hardware, software and support to simplify procurement, deployment, operation and maintenance of your Microsoft-based hybrid cloud infrastructure. Join us to learn more!
Jeff Barto and Angelique Pereira, Trust Strategists at DigiCertApr 25 20193:00 pmUTC60 mins
Stay updated on April 2019’s news regarding the trends and threats in digital certificates including TLS, SSL and code signing, plus PKI, IoT, encryption, identity and trust.
This month's briefing covers EV Extended Validation and OV Organization Validated certificates, Tumblr, HTTPS, eCommerce, code-signed malware-infected software updates, ACME and the IETF, US Senate bills Corporate Executive Accountability Act and Cyber Resiliency Act, the Weather Channel's ransomware attack, GDPR compliance, blockchain, cryptocurrency, Ethereum, weak passwords, weak private keys, AES, PQC post quantum cryptography, QKD quantum key distribution, IE Internet Explorer, zero day vulnerability with MHT files, Apache and nginx web servers, a suspicious uninvited Chinese guest at Mar-a-Lago, hacked Wi-Fi, Starz vs TorrentFreak, APT34 and OilRig, the Read My Lips and Lab Dookhtegan channel on Telegram, CryptoPokemon ransomware decrypter, charities, and free internet security training for citizens in Aurora, Illinois.
Daniel Blander, Virtual Clarity (Moderator), Joseph Feiman, CSO, WhiteHat Security & Paul Farrington, CTO, Veracode EMEAApr 25 20193:00 pmUTC60 mins
As organizations strive to transform themselves for the digital economy, application development is moving further into the spotlight - and right behind it is application security.
So in 2019, AppSec can make or break a business. Instead of being overwhelmed by this pressure, there are tools and processes on the market that can help your application both meet and exceed business and security demands.
From infrastructure-as-code models to API security and DevOps, learn from this panel of global experts how to harness knowledge and accelerate application release cycles, improve security and transform your business.
Moderator: Daniel Blander, Virtual Clarity
Joseph Feiman, Chief Strategy Officer, WhiteHat Security
Paul Farrington, CTO, Veracode EMEA