Hi [[ session.user.profile.firstName ]]

Information Technology

  • Meet Your New Best Friend: DNS Security
    Meet Your New Best Friend: DNS Security
    Rachel Ackerly, Cisco Umbrella Product Manager Recorded: Dec 6 2019 24 mins
    Telecommuting is on the rise. More users are working remotely, off the network, and off VPN, which leaves them vulnerable to malware, data exfiltration, and other malicious threats. Because DNS-layer security is built into the backbone of the internet, it can protect all users and devices with internet connections, even when roaming.

    More than 91% of malware uses DNS to gain command and control, exfiltrate data, or redirect web traffic. Join us to brush up on DNS security fundamentals, learn how DNS-layer security can help you block threats before they reach your users, and gain visibility into what’s really happening on your network.
  • Be Embedded – Lesson Learned from Teamwork & Embedded Cybersecurity
    Be Embedded – Lesson Learned from Teamwork & Embedded Cybersecurity
    Dawn Beyer, Senior Fellow, Lockheed Martin Space Recorded: Dec 6 2019 52 mins
    Attracting, developing, and retaining women in cyber top talent fields (continuation on the March WiCyS Conference Keynote).

    Dr. Dawn Beyer is a Lockheed Martin Senior Fellow. She has over 30 years of experience covering information security, information assurance, security engineering, cybersecurity, systems engineering, military intelligence and operations, risk assessments, strategy, and policy development and execution. She provides consultation to research and development, proposal, program, and operations and maintenance teams. She also provides guidance, direction, leadership, training, and mentoring to Engineers.

    Dr. Beyer provides leadership with visibility into cyber strategy, workforce talent, technology, capabilities, risks, policy, and opportunities. At Lockheed Martin, Dr. Beyer is the Cyber Fellows Action Team Chair. She also engages in industry exchanges and Co-chairs the National Defense Industrial Association Cybersecurity Division and is a member of the INCOSE Systems Security Engineering Working Group. She is also a board member with the Women in CyberSecurity (WiCyS) Board of Governors.

    Dr. Beyer is a retired Air Force Intelligence Officer with 24 years of service and has performed additional responsibilities as an Information Systems Security Manager, Computer Systems Security Officer, Communications Security Manager, Operations Security Manager, and Emissions Security Manager.

    Dr. Beyer earned her Ph.D., M.S., and B.S. in Information Systems. She maintains the following certifications: Project Management Institute’s Program Management Professional (PMP)®, (ISC)2’s Certified Information Systems Security Professional (CISSP)® and Certified Secure Software Lifecycle Professional (CSSLP)®, and ISACA’s Certified Information Security Manager (CISM)®.
  • Data Center Knowledge Talks Business Continuity
    Data Center Knowledge Talks Business Continuity
    Kerry Doyle, Data Center Knowledge & Brian Eichman, CoreSite Recorded: Dec 6 2019 49 mins
    It is critical that your employees and end-users have always-on availability to your systems and services. Business continuity has never been more important, and more complex. Cloud? Colocation? Both? Listen to this webinar from Data Center Knowledge and CoreSite on the three business continuity models that every IT expert should know as they plan for 100% uptime.
  • The 2019 Dell Commercial Client Solutions Lineup
    The 2019 Dell Commercial Client Solutions Lineup
    Cameron Goedde - Client Solutions Field Marketing | Dell EMC Recorded: Dec 6 2019 42 mins
    Smarter & faster experiences are the driver behind Dell’s 2019 Client Solutions lineup. We have the broadest portfolio to meet all needs. From highly configurable fixed solutions – our OptiPlex desktops and AIOs and our Wyse Thin clients. To the smallest, lightest mobile solutions including Latitude and the XPS to specialty systems – our powerful Precision workstations, including towers, racks and mobile workstations and finally our Rugged devices. We also have a full portfolio of displays and accessories to help build your entire ecosystem.

    Presented by: Cameron Goedde - Client Solutions Field Marketing, Dell EMC
  • What will shape Security Awareness Education in the future?
    What will shape Security Awareness Education in the future?
    Nadya Ilina - Senior product manager Kaspersky Security Awareness, adult education expert, master-trainer Recorded: Dec 6 2019 57 mins
    Security Awareness development is influenced by trends from multiple disciplines: IT, education, media and more. How will growing digital transformation change the approach towards the human factor in cybersecurity? How will the change in approach to education modify Security Awareness platforms?
    The requirements for types of content in the threat landscape are changing; how will these affect the content of training programs? What will be the future of Security Awareness?
    We will go through all these questions and trends in this webinar. With this session, you will learn what innovations need to be implemented and how security awareness training providers can keep up and stay in demand.
  • Ransomware Hostage Rescue Manual
    Ransomware Hostage Rescue Manual
    Erich Kron, David Littman Recorded: Dec 6 2019 55 mins
    It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks.

    So, how can your organization avoid getting held hostage? Join us and Erich Kron CISSP, Security Awareness Advocate at KnowBe4 we look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and provide tips on what to do when you are hit with ransomware.
  • Automatiser le déploiement d'infrastructures +sécurité +opérations dans le cloud
    Automatiser le déploiement d'infrastructures +sécurité +opérations dans le cloud
    Thomas Beaumont Recorded: Dec 6 2019 65 mins
    La transition vers AWS, Azure ou Google Cloud crée de nouveau modèles d'architectures et d'applications dont la structure est en perpétuel mouvement. La seule manière que l'infrastructure, la sécurité et les opérations puissent suivent ce rythme est l'automatisation. Dans cette session, Thomas Beaumont, Cloud Consulting Engineer, va détailler les différents outils qui peuvent etre utilises pour déployer de l'infrastructure (as code), expliquer comment ajouter les vm-series pour protéger des menaces de sécurité (security as code) pour enfin modifier les règles de sécurité en se basant sur des outils tiers partie et externes (operations as code). Une brève démonstration conclut la session.
  • Introducing Azure Spring Cloud—A Managed Runtime for Spring-Based Apps
    Introducing Azure Spring Cloud—A Managed Runtime for Spring-Based Apps
    Josh Long, Spring Developer Advocate Recorded: Dec 5 2019 62 mins
    You love Spring Boot because it eliminates boilerplate code and helps you build robust Java applications quickly. And you love Spring Cloud because it brings modern microservices patterns to Spring Boot applications. The trouble has been creating, configuring, and maintaining Spring Cloud infrastructure—until now.

    Introducing Azure Spring Cloud, the runtime for Spring Boot-based applications and Spring Cloud-based microservices jointly developed by Microsoft and Pivotal—now in public beta. Azure Spring Cloud is a managed environment built on top of Azure Kubernetes Service with preconfigured, opinionated, ready-to-deploy infrastructure services, and runtime for Spring-based applications.

    Sound too good to be true? It isn’t! Join Spring Developer Advocate Josh Long (@starbuxman) as he walks you through an overview of Azure Spring Cloud and demos how easy it is to push and run Spring Boot microservices into production with Microsoft and Pivotal managing the infrastructure for you.
  • Reinstall a Clean macOS with One Button
    Reinstall a Clean macOS with One Button
    William Smith Recorded: Dec 5 2019 25 mins
    See how you can eliminate costly downtime, keep IT workflows intact and perfect your macOS upgrades.

    With Apple operating system season in full swing, it’s time to determine when and how you want to update your Mac environment. It’s safe to assume that the best option is the simplest and most effective one, and it doesn’t get easier than pressing one button.

    In our webinar, Reinstall a Clean macOS with One Button, we’ll show you how to:

    - Identify Macs ready to install macOS Catalina
    - Obtain the macOS Catalina installer
    - Deploy macOS Catalina to shared Macs in labs
    - Deploy macOS Catalina to 1-to-1 Macs
  • If You're Not Reviewing Slack Data, You're Missing Half the Conversation
    If You're Not Reviewing Slack Data, You're Missing Half the Conversation
    David Slarskey, Matthew Dodge, Casey Sullivan Recorded: Dec 5 2019 61 mins
    Slack, the massively popular workplace messaging platform, is changing communications and discovery as we know them. That's because Slack is quickly supplementing, if not replacing, email and discrete documents. Yet legal teams are used to documents, not chat rooms.

    Join us for an upcoming webinar on how Slack is changing communications and discovery--and why your discovery and investigations process needs to catch up.

    Register now to learn:

    How Slack is changing discovery and investigations
    Why Slack could hold key data for your case
    The unique challenges Slack data poses
    How creative legal teams are leveraging Slack data during the discovery process
    Best practices for dealing with Slack data, from those who’ve done it

    Featured Presenters:


    David Slarskey
    Founder, Slarskey LLC
    David Slarskey is the founder of Slarskey LLC and an experienced commercial litigator with more than a decade of experience in litigation, trial, arbitration, and appellate practice. He has represented a wide range of individual and corporate clients, including entrepreneurs, large health care and pharmaceutical companies, financial guarantors and hedge funds, real estate developers, media, energy, and international interests. Prior to founding Slarskey LLC, he was Counsel in the litigation department of Patterson Belknap Webb & Tyler LLP, and associated with Friedman Kaplan Seiler & Adelman LLP. For four years running, David Slarskey has been recognized by Super Lawyers as a Rising Star of Business Litigation in the New York Metro Area.

    Matthew Dodge
    Customer Success Manager, Logikcull
    Matt is a seasoned eDiscovery expert and account manager at Logikcull where he helps law firm and enterprise customers implement efficient, defensible, and cost-effective discovery workflows. Before joining Logikcull, he worked as a director for the Association of Certified eDiscovery Specialists, responsible for training and certification for Fortune 500 companies and leading service providers.
  • DataCore vFilO: Unprecedented Visibility and Control Over Widely-scattered Data
    DataCore vFilO: Unprecedented Visibility and Control Over Widely-scattered Data
    Steve Hunt, Sr. Director of Product Management, DataCore Recorded: Dec 5 2019 64 mins
    To deliver a distributed file sharing environment, IT organizations often have to deploy multiple, discrete solutions. DataCore vFilO now allows IT organizations to deploy a single, scalable, hybrid file and object storage solution, with built-in data management. Learn how vFilO can enable you to consolidate your existing file storage silos into one globally managed environment, and enable complete control over whether data is on high performance, on-premises storage or archived to the public cloud.
  • How to Avoid a CCPA Data Subject Request Denial of Service Attack
    How to Avoid a CCPA Data Subject Request Denial of Service Attack
    Nathan Rowe (Evident) I Michael Lin (TrustArc) I Drew Schuil (Integris) Recorded: Dec 5 2019 51 mins
    Demonstrating Compliance Through DSR Fulfillment Automation with Identity Verification

    Companies that are flooded with thousands of DSRs all at once are at greater risk for a denial of service (DoS) attack that can overwhelm CSR and IT staff. In this scenario, manual processes reach a breaking point, in which businesses can’t safely respond to requests within the required timelines (usually 30 to 45 days depending on the regulation). With CCPA right around the corner, there’s no time like the present to start thinking about your company’s plans to circumvent DoS attacks and streamline DSR processes, which, according to the new regulations, must now include identity verification prior to fulfilling each request.

    Join a lively panel discussion with experts from Integris Software, TrustArc, and Evident, and get ready to pose your toughest DSR fulfillment questions live as they explain:

    • Why you must address data subject rights as a big data problem
    • How to automate identity verification of DSAR requests
    • The critical components of DSR lifecycle management
    • The importance of privacy- and security-by-design

    Each registrant will receive a copy of the white paper, Solving DSAR’s Big Data Problem – Four Recommendations Plus the One Thing You Should Never Do

    Can’t make the webinar? Don’t worry. Register now, and we’ll send you the recording.
  • Go Beyond IT With Enterprise Service Management (ESM)
    Go Beyond IT With Enterprise Service Management (ESM)
    Jaime Spector & Timothy Knowles Recorded: Dec 5 2019 36 mins
    This webinar will cover on the concept of Enterprise Service Management (ESM) and explore why it’s a critical area to focus on in light of Digital Transformation. Additionally, we will demonstrate how our customers today are using ChangeGear’s own Flex Modules in unique ways to manage and deliver processes outside of IT and better support the Enterprise.
  • How a CISO Disruptor Stops Phishing Fire Drills
    How a CISO Disruptor Stops Phishing Fire Drills
    Oren Falkowitz, Mike Britton Recorded: Dec 5 2019 27 mins
    Mike Britton of $7.7B leader, Alliance Data, shares a game-changing cybersecurity solution.

    Mike was seeing an increase in the frequency and sophistication of phishing emails hitting his organization’s Office 365 inboxes. C-levels were worried. SOC brush fires kept breaking out.

    To reduce risk and stop the fire drills, he launched an anti-phishing project. Join this live webinar and hear Mike discuss his priorities, approach and results. He’ll be joined by Area 1 Security CEO Oren Falkowitz to discuss how pay-for-performance solutions can close the cybersecurity gap.
  • 2020 Outlook – Making AI Conversational Analytics Work for You
    2020 Outlook – Making AI Conversational Analytics Work for You
    Brett Paulson, Head of Sales & Marketing; and Roger Lee, Director Customer Success, Gridspace Recorded: Dec 5 2019 55 mins
    Digital transformation and all its glory – the continued quest to improve customer service, customer experience and employee experience remains a priority. Since AI/machine learning continues to be a strategic investment and remains a hot discussion topic, you will learn how specifically AI conversational analytics will impact your organization in the areas of people, process, and technology.

    Join Brett Paulson and Roger Lee, aka Professor CXi, for an engaging, informative, and action-oriented session.
  • Improve Compliance and Outcomes with Data
    Improve Compliance and Outcomes with Data
    Nirvana Farhadi, Global Head RegTech, HV & Dan Knight, CTO, Global Financial Services, HV Recorded: Dec 5 2019 54 mins
    Let’s face it, financial services institutions’ main business objectives are to generate revenue, grow the business and be competitive. Most firms, though, are caught up in ever-increasing cost and resource burdens from dramatic increases in regulatory obligations. Data is changing the world as we know it and pulling us from our comfort zones into change, transformation and, in some cases, uncertainty. Let’s delve into how financial services firms can use their data to navigate these complex changes in regulatory and legal obligations. Learn how to monetize data for better business revenue and outcomes.

    In this session, we’ll examine two solutions that allow you to apply your data to simplify compliance and risk obligations and improve your bottom line. We’ll take a look at regulatory challenges around liquidity risk with Intraday Insights and learn how to optimize intraday liquidity to generate immediate savings while simplifying compliance reporting. And Datacom will share observations and insights on the development of Open Banking Standards and APIs and how major banks are complying with the updated policies

    Also joining this webinar will be Bruce Hrovat from Intraday Insights and Michael Lentini from Datacom.
  • Security Investigation: Restoring Calm from Chaos
    Security Investigation: Restoring Calm from Chaos
    Jae Lee Director, Product Marketing Splunk Inc. Recorded: Dec 5 2019 66 mins
    Security teams are underfunded, understaffed and overwhelmed by constantly putting out fires. They struggle to deal with threats and attacks, while having to answer hard questions from management. Everyone is demanding detailed, accurate answers about cyberthreats and risk and compliance – and they all need answers NOW.

    So, how useful is it to know that you’re not alone, since others are in the same boat? The answer is “not useful at all.” What IS useful, is knowing how to work smarter and get answers faster.

    Join us in this one-hour technical deep dive and demo to learn:
    - How to analyze events from three common data sources to look for malicious activity
    - How to get more efficient at discovery, triage and the investigation of potential security incidents
    - How to leverage automation methods to accelerate investigations and get answers faster

    This webinar will provide demo examples of how to ask questions of your machine data to get security insights. For example, we will explore whether login behavior looks suspicious the root cause of how an attacker entered your network. We’ll show how you can get to investigative findings quickly and make use of those answers just as quickly. This webinar aims to help security teams learn how to stay focused on solving security problems faster so they can get ahead of it all.
  • Key Considerations for SaaS Security and Performance
    Key Considerations for SaaS Security and Performance
    Akhilesh Dhawan, Matt Brooks, Robin Manke-Cassidy, & Wesley Shepherd Recorded: Dec 5 2019 70 mins
    Companies are turning to Software as a Service (SaaS) to ease their cloud transformation and increase agility. According to a Bettercloud survey, 73% of all companies say that nearly all of their apps will be SaaS by 2020. SaaS offers speed to market, great functionality, and lower IT operating costs. However, it can also create IT security and app performance headaches.

    Join us as two Citrix experts in the fields of networking and IT provide industry perspective and their experiences on:

    - How hackers use different techniques to exploit weaknesses in your SaaS, web, and other applications

    - How Citrix can reduce SaaS and web security threats with an integrated solution

    - Key factors that influence SaaS and web app performance

    - How Citrix can improve application performance for more than 4,000 SaaS apps, including O365
    - Why a Citrix-differentiated security approach with a people-centric focus extends the digital perimeter
  • 2019 Verizon Payment Security Report (PSR)
    2019 Verizon Payment Security Report (PSR)
    Ciske van Oosten and Ron Tosto Recorded: Dec 5 2019 58 mins
    *We are offering two sessions on December 5, 2019 for your convenience. Please register for the session that works best for you: 10AM EST or 2PM EST.

    Organizations might be spending a lot of time and money creating their data protection and compliance programs (DPCPs). Despite good intentions, more than half of companies are struggling to design, implement and maintain a sustainable DPCP.

    The 2019 Verizon Payment Security Report provides guidance to accomplish these tasks, and explains how new tools can help you move your compliance management to new levels.

    This year’s PSR has exciting aspects in its findings. For the first time, the report contains assessment data compiled from additional qualified security assessor (QSA) companies. This expands the view and perspective provided in past PSRs.
  • Become the A.I. Hero of IT
    Become the A.I. Hero of IT
    NetApp and NVIDIA Recorded: Dec 5 2019 52 mins
    Every organization wants to use AI to enhance customer relationships, streamline supply chain, and improve patient care. But most of the industry innovations thus far have happened in the absence of an IT strategy that supports and accelerates the end-to-end lifecycle of AI development and deployment across edge, core and cloud, from prototyping to production. IT leaders now have the opportunity to move beyond the confines of “Shadow AI” and deliver a prescriptive architecture and platform that offers the fastest time-to-insights. Attend this webcast on Thursday, December 5th to hear from NetApp and NVIDIA on how you can become the hero of your company’s AI-powered ambitions.
  • A 2019 Cybersecurity Retrospective and Trends to Watch in 2020
    A 2019 Cybersecurity Retrospective and Trends to Watch in 2020
    Jonathan Cran, Head of Research, Kenna Security Recorded: Dec 5 2019 49 mins
    It’s that time of year, the time to reflect on the biggest surprises of 2019 and look forward to the new year. It's been a banner year for security professionals, CISOs and researchers— with important new technology, vulnerability, and threat trends emerging. Join Jonathan Cran and the Kenna research team for an hour to discuss what surprised us this year, what we expect to drive our efforts in 2020 and what you can do to prepare and get ahead of threats.
  • Automation Doesn't Replace Your Job, It Strengthens Your Position
    Automation Doesn't Replace Your Job, It Strengthens Your Position
    Ryan LaFevers, Federal Solutions Architect, Red Hat Recorded: Dec 5 2019 39 mins
    Just about every business and agency is developing an IT automation strategy to increase their time to market and decrease human error. However, not everyone is excited about this new direction. Some IT workers are concerned that “automation” is a code word for “job elimination.”

    In this session, we’ll examine why that fear is not a reality. In fact, automation is having quite the opposite effect by creating new roles and career paths in IT.

    Ansible automation has simply shifted the workload from manual, time consuming, and error-prone tasks to automated workflows that are faster, safer, and reusable. But we need experts in those things we automate. Come hear about how you can strengthen your value in the workforce by embracing automation rather than dismissing it.
  • Protecting what you Cannot See is Difficult, Enhance your Security with FortiNAC
    Protecting what you Cannot See is Difficult, Enhance your Security with FortiNAC
    Andres Ruz, Director of Information Security with Meriplex and Jeffrey Reed, Systems Engineer with Fortinet Recorded: Dec 5 2019 32 mins
    With digital transformation era evolving, it is a priority for organizations to have complete visibility for every device and user attached to their network. For some organizations, a new device can be added and removed without ever being detected, leaving your network in perpetual risk for a costly data breach. With FortiNAC, organizations receive visibility to see everything connected to the network protecting both wireless and wired networks, as well as the ability to control those devices and users, including dynamic, automated responses.

    In this webinar we will discuss:

    1. Challenges organizations face with limited visibility on their network
    2. Understanding the architecture of FortiNAC and how it works
    3. Enabling IoT success with device management and automated response
  • Container Monitoring Tools Comparison
    Container Monitoring Tools Comparison
    Jake Malmad, Senior DevOps Consultant at Mission and Luke Reimer, Cloud Consultant at Mission Recorded: Dec 5 2019 35 mins
    In 2019, using containers to package your applications is a standard best practice, as is using an orchestration service like Amazon ECS or Amazon EKS to manage and orchestrate running containers at scale. However, in spite of all the information and resources available when it comes to managing and scaling containers, the decision about which container monitoring tool to use can often be a source of confusion and difficult to evaluate.

    In this webinar, Mission’s Senior DevOps Consultant Jake Malmad and Cloud Consultant Luke Reimer will compare different container monitoring tools and the right context for when to utilize them. The presentation will specifically delve into:

    * Best practices to consider whether you are using Amazon ECS or Amazon EKS
    * The key differences between AWS monitoring tools like Amazon CloudWatch and Container Insights, tools from partners like New Relic, open-source tools like Prometheus and Grafana, and the right use cases for each
    * Customer use cases leveraging different monitoring tools, and subsequent takeaways
  • Multi-Cloud in the Age of Serverless and DevOps
    Multi-Cloud in the Age of Serverless and DevOps
    Pawel Gieniec, CloudAdmin.IO | Todd Greene, PubNub | Kelly Dyer, SourceFuse | Kiley Williams, Polyverse Corporation Recorded: Dec 5 2019 56 mins
    Join this live panel discussion with experts at AWS re:Invent for a closer look at the adoption and evolution of multi-cloud. Tune into this interactive Q&A session with world renowned Cloud, DevOps and IT leaders while they discuss the following:

    - You've implemented a successful multi-cloud strategy - now what?
    - How serverless architectures and DevOps continue to evolve multi-cloud management
    - How serverless impacts or intersects with microservice architectures and the future of solutions development

    Moderator:
    Pawel Gieniec, CEO, CloudAdmin.IO

    Panelists:
    Todd Greene, CEO, PubNub
    Kelly Dyer, CEO, SourceFuse
    Kiley Williams, Security Architect, Polyverse Corporation
  • We are not ready for Next-Generation Cybersecurity
    We are not ready for Next-Generation Cybersecurity
    David Froud, Director, Core Concept Security Dec 9 2019 11:00 am UTC 60 mins
    The temptation to buy a technology to fix a security hole is almost overwhelming. Most vendors know this, and will happily exploit it if you let them. The fact is that very few organisations are even doing the basics yet, without which new technology will be no more effective that the Last-Generation.

    Technology cannot fix a broken process, it can only make a good process better.

    About the speaker:
    David has almost 20 years experience in areas of Information / Cybersecurity, including Regulatory Compliance, Secure Architecture Design, Governance Frameworks, Data Privacy & Protection, FinTech and Sustainable Innovation.

    As Project Lead for several Fortune / FTSE ‘Enterprise Class’ clients, David has performed hundreds of on-site security and compliance assessments for merchants and service providers globally.

    Currently focused on helping organisation unify their security programs with EU regulatory compliance regimes, including GDPR & PSD2.
  • Designing Dashboards for IT Operational Excellence
    Designing Dashboards for IT Operational Excellence
    Steve Parker, Solutions Strategist, Cherwell Dec 9 2019 2:00 pm UTC 45 mins
    For IT Service Management professionals, dashboards are an important tool to filter out information and key stats from the flood of data that comes through on a daily basis.

    It’s also critical to present them in an appealing, clear and simple way, as not all information is useful or helpful at first glance.

    In this webinar, we’ll look at practical examples and discuss how dashboards work, from planning through to technical implementation. They’ll be plenty of time for Q&As afterwards!
  • What is a dashboard, anyway?
    What is a dashboard, anyway?
    Andy Cotgreave - Technical Evangelism Director, Tableau Dec 9 2019 2:00 pm UTC 60 mins
    What is a dashboard? And does it matter? Should a dashboard fit one screen? Should it provide instant insight? Should it be interactive?

    In this webinar, Andy Cotgreave will challenge the traditional definition of a dashboard. He will share his own definition and explain how the purpose of sharing data isn't to fit a particular definition but to fulfill a goal. Andy will show many examples of different dashboards, explaining why they work and how they push the definition of the term "dashboard". Attend this webinar if you want to more effectively engage the users of your dashboards.
  • MSP’s Top Cloud Security Concerns and How to Tackle Them (EMEA)
    MSP’s Top Cloud Security Concerns and How to Tackle Them (EMEA)
    Fiona Challis, Channel Enablement & Sales Expert, Next Gen Dec 9 2019 3:00 pm UTC 60 mins
    ** This is an EMEA focused webinar **

    The role of the cloud in IT security can be confusing and frightening for many customers and clients.

    Learn five tips for implementing cloud-based security for your clients. Discuss how to balance an approach with customers with those tips and understand the important questions to consider with customers considering cloud security as an option.
  • Transforming Insurance with RPA and Intelligent Automation
    Transforming Insurance with RPA and Intelligent Automation
    Ken Mertzel, Global Industry Leader–Insurance, Automation Anywhere & Ann Delmedico IPA Advisory Managing Principal, Cognizant Dec 9 2019 4:00 pm UTC 60 mins
    InsurTechs and new online insurance companies are disrupting the industry, forcing insurers to rethink how they interact with customers and deliver a high-quality experience. With the emergence of attended automation and cognitive intelligence capabilities, Robotic Process Automation (RPA) is a critical technology solution empowering insurance associates to quickly deliver exceptional service by putting critical information at their fingertips, automating manual tasks and enabling real-time collaboration across the organization.

    Automation Anywhere, the leading provider of RPA and cognitive intelligence solutions, and Cognizant, a leader among intelligent process automation service providers, will offer insights on how insurance organizations are using RPA, machine learning and intelligent automation to drive operational efficiency and transform insurance operations.

    During this session, we will discuss:

    •Robotic Process Automation trends and benefits
    •Use cases describing where companies typically apply RPA in the insurance industry
    •Specific examples showing how RPA and intelligent automation can be used to increase operational efficiency and improve customer service.
  • AI & Machine Learning in Real Life
    AI & Machine Learning in Real Life
    Salil Amonkar, Global Head AI for Manufacturing & Retail, Pluto7 Dec 9 2019 6:00 pm UTC 42 mins
    In this session we will cover key take away and lessons learnt from practical deployment of Ai and ML solutions in actual enterprise settings. Participants can use these learning to incorporate in their own organizations to ensure success of Ai and ML initiatives.

    Join BrightTALK's LinkedIn Group for BI & Analytics!
    - http://bit.ly/BrightTALKBI
  • An International Alliance for Cyber Security
    An International Alliance for Cyber Security
    Dr. Lynette Nusbacher | Owner, Coach & Devil's Advocate, Nusbacher Associates Dec 9 2019 6:00 pm UTC 45 mins
    Alliance is a strong word for a strong relationship. An alliance that sought to achieve collective security in the cyber domain would need to include states with closely aligned interests, would need to agree formal terms of alliance, and would need carefully-defined conditions governing mutual support. Whether or not the United States were formally a member of this alliance, American participation (or non-participation) would critically shape the alliance. Participants close to US security structures, senior figures (active and retired in the Five Eyes Community) and senior cyber security professionals would contribute both the political and technical realities that would determine the paper’s message.

    Cyberspace, like the high seas of classical security strategy, is a space that is partly governable, but inherently chaotic. In order for states’ economies to function in cyberspace, states need to exercise optimal governance over this hard-to-govern space. To do so in an arrangement for collective defence could optimise trading advantages for all.

    About the Speaker:
    Dr. Lynette Nusbacher | Owner, Coach & Devil's Advocate, Nusbacher Associates

    Lynette Nusbacher is an expert on horizon scanning and strategy. She was part of the team that created two of the UK’s National Security Strategies and set up Britain’s National Security Council. She has been Senior Lecturer in War Studies, Royal Military Academy Sandhurst, Head of the Strategic Horizons Unit in the UK Cabinet Office and the Devil’s Advocate in Britain’s Joint Intelligence Organisation. She has a background in red teaming, devil’s advocacy and structured methods of analysis.
  • Cooperative Compliance, Enhancing Cybersecurity Foundational Minimums
    Cooperative Compliance, Enhancing Cybersecurity Foundational Minimums
    Nat Bongiovanni, Chief Technology Officer, NTT DATA Federal Services, Inc. Dec 9 2019 7:00 pm UTC 45 mins
    Cybersecurity policies meant to protect sensitive information are often misunderstood, avoided, or circumvented by employees. Employees don’t like to be inconvenienced by the extra steps necessary for protection that to them seem unnecessary. This can be compounded by a complex cybersecurity environment with multiple competing standards that seem similar but have unique approaches, naming conventions, and acronyms.

    This session will discuss how to solve these challenges by creating cooperative compliance. Cooperative compliance starts by understanding the entire risk environment based on the NIST SP 800-171 Framework, a foundational minimum for confidentiality and integrity. Using the NIST framework and straightforward messaging for employees, cooperative compliance communicates the reasons for cybersecurity inconveniences and protection.

    Key takeaways:
    •Define cooperative compliance
    •Define and describe the cybersecurity foundational minimum
    •Describe communication strategies
    •Provide practical approaches based on the foundational minimum
    •Comment on useful tools, techniques, and approaches

    About the speaker:
    NTT DATA Federal Services, Chief Technology Officer, Nat Bongiovanni is a US Navy veteran with over 35 years’ experience. Mr. Bongiovanni’s broad IT background allows him to view IT challenges through multiple lenses-- analyst, architect, manager, software developer and cybersecurity expert.

    Nat has spoken extensively on cybersecurity, software and policy development. He recently spearheaded a team of cyber experts to develop a cybersecurity solution to protect network assets and data from internal vulnerabilities.

    Nat’s experience comes from practical application and valuable lessons learned across a diverse set of clients including, the Office of the Secretary of Defense, Defense Intelligence Agency, the Department of the Interior CIO, the U.S. Securities and Exchange Commission, Blue Cross Blue Shield, and Enterprise Rent-A-Car.
  • Agile Testing in Regulated Environments: Challenges and Best Practices
    Agile Testing in Regulated Environments: Challenges and Best Practices
    Ryan Yackel, Product Management, Tricentis Jason Secola, Support Sales Manager, Tx3 Dec 10 2019 2:00 am UTC 41 mins
    Traditional electronic signature approaches don’t work when Life Sciences companies adopt Agile and DevOps.

    Testing regulated applications has long required programmatic process controls with electronic signatures. Now, with the shift to Agile processes and DevOps tools, many organizations are attempting to apply traditionally rigid governance practices within processes and tools architected for a much faster, more flexible paradigm. This is a risky approach.

    Watch our on-demand webinar as a panel of Life Sciences and Agile testing experts explore the top challenges and best practices associated with testing regulated Life Sciences applications in Agile and DevOps processes. We cover:

    - How to adopt a data-driven approach to computer systems validation (CSV) for a balance of speed and governance
    - How to take a practical approach to applying the “right” balance of programmatic process controls
    - How Tricentis and Tx3 Vera work together to help you achieve Continuous Testing that meets regulatory requirements
  • Data resiliency moves to the cloud, featuring Forrester
    Data resiliency moves to the cloud, featuring Forrester
    Naveen Chhabra, Senior Analyst Forrester Research and Mike Palmer, Chief Product Officer Druva Dec 10 2019 4:00 am UTC 59 mins
    Why should your business adopt a modern data-resiliency mindset? Data is becoming increasingly distributed across on-premises and multi-cloud environments and according to Forrester “this scattering of data requires infrastructure and operations leaders to take a fresh approach to data resiliency.”

    To address today’s IT challenges, companies are looking for innovative data-resiliency solutions, and best practices to manage, protect and optimize their valuable data.

    Join our webinar to hear a guest speaker from Forrester discuss:

    •Why businesses need data resiliency more than ever before

    •Methodology and market research findings in evaluation of data resiliency providers

    Also in this presentation, Druva will discuss:

    •Their debut as a Strong Performer in The Forrester Wave™: Data Resiliency Solutions, Q3 2019

    •How Druva’s data protection solutions align to the global shift in moving data applications to the cloud.
  • How to Automate Machine Learning and Scale Delivery
    How to Automate Machine Learning and Scale Delivery
    Nauman Fakhar, Solutions Architect at Databricks Brett Olmstead, Data Scientist at DataRobot Dec 10 2019 4:00 am UTC 62 mins
    On-Demand Webinar
    Creating and testing machine learning models is time consuming, and delivering results in production at high volumes is prone to error. Automating the development of models is not only helping companies reduce errors but it’s also uncovering powerful business insights - faster.

    Join our upcoming webinar, How to Automate Machine Learning and Scale Delivery, to learn how to:
    Use automation to dynamically select optimal machine learning models for your use case
    Automate the process of deploying models to production with high-volume data pipelines
    Configure your automation to quickly scale up and down as data volumes change
  • Accelerating Cloud Scale and Migration with SD-WAN
    Accelerating Cloud Scale and Migration with SD-WAN
    Lee Doyle, Principal Analyst at Doyle Research & Rosa Lear, Director of Marketing at VeloCloud, now part of VMware Dec 10 2019 4:30 am UTC 28 mins
    SD-WAN technology is becoming widely deployed to enable quality of user experience, increased WAN bandwidth and support for IoT applications. IT organizations should select SD-WAN solutions based on their ability to support multi-cloud (e.g. 1 click access), application performance at scale, and security (both native and via partnership). In this webinar, industry analyst and Principal Analyst at Doyle Research, Lee Doyle, shares his perspective on the accelerated evolution of SD-WAN to support changing business requirements including: multi- and hybrid cloud, client-to-cloud-to-container, native advanced security, and hyperscale.
  • Consolidating and Simplifying Secondary Storage
    Consolidating and Simplifying Secondary Storage
    Laura Jordana, Technical Marketing Engineer, Nutanix Dec 10 2019 5:00 am UTC 29 mins
    Legacy backup solutions can be complicated and can take too much time to deploy and manage, requiring resources that could be spent doing more productive tasks that drive the business. There are disparate silos and management teams that can lead to missing SLAs and backup window targets.

    A backup platform should be cloud-ready, intelligent and designed for a data-centric world. Join us to learn how to solve these pain points with a single platform, hosted on any hardware, managed from a single management interface
  • Webinar: Practical Guidelines to Security Policy for Your Cloud Environment
    Webinar: Practical Guidelines to Security Policy for Your Cloud Environment
    Maya Malevich, Director Product Marketing, Tufin & Aleck Brailsford Director Of Sales Engineering, US Dec 10 2019 6:00 am UTC 42 mins
    Cloud migration is an integral part of digital transformation. As your team moves workloads to the cloud, how do you determine the right security policy to use?

    Join this webinar on practical guidelines for setting the right security policy as we explore the following topics on December 10:

    * The security challenges of cloud migration
    * Why a central security policy is essential
    * Standards and benchmarks to get you started

    Register now now to ensure you have the right policy to protect your hybrid network.
  • Accelerating Cloud Scale and Migration with SD-WAN
    Accelerating Cloud Scale and Migration with SD-WAN
    Lee Doyle, Principal Analyst at Doyle Research & Rosa Lear, Director of Marketing at VeloCloud, now part of VMware Dec 10 2019 9:00 am UTC 28 mins
    SD-WAN technology is becoming widely deployed to enable quality of user experience, increased WAN bandwidth and support for IoT applications. IT organizations should select SD-WAN solutions based on their ability to support multi-cloud (e.g. 1 click access), application performance at scale, and security (both native and via partnership). In this webinar, industry analyst and Principal Analyst at Doyle Research, Lee Doyle, shares his perspective on the accelerated evolution of SD-WAN to support changing business requirements including: multi- and hybrid cloud, client-to-cloud-to-container, native advanced security, and hyperscale.
  • Datacenter : Comment combiner évolutivité et modularité ?
    Datacenter : Comment combiner évolutivité et modularité ?
    Jean-Sébastien Volte Dec 10 2019 9:00 am UTC 60 mins
    Architecture composable, infrastructure modulaire datacenter désagrégé, peut-être avez-vous vu passer l’un de ces termes ces derniers mois. Tous renvoient à une nouvelle famille de plateformes qui vise à augmenter l’agilité des ressources informatiques. Chez Dell EMC, cette solution, c’est le PowerEdge MX.
    Participez à notre webinar pour tout comprendre de ces nouvelles plateformes.
  • Modern Analytics: Drive Growth, Innovation and Competitive Advantage
    Modern Analytics: Drive Growth, Innovation and Competitive Advantage
    Victor Ivarsson (Head of Operations, Upsales) and Robbie McKiernan (Account Executive, Looker) Dec 10 2019 9:00 am UTC 45 mins
    While 'data-driven marketing' is common practice, it typically relies on Sales/CRM data to gain insights and make decisions.

    Companies today use thousands of SaaS applications and business systems that create more data than ever imagined - so leveraging a data silo in a world with a myriad of data sources will inherently limit business potential.

    To differentiate and drive growth, businesses must creatively leverage the plethora of data they collect - from every source - to maximise its value.

    In this webinar, we'll cover how to:
    - Gain accurate, holistic and actionable insights from your data, with a modern approach to analytics.
    - Integrate reporting and self-serve analytics into your existing software applications, portal or website.
    - Achieve rapid time to value, by sharing a real-life example of an Upsales implementation.
  • An AI Experience Playbook for Enterprise IT
    An AI Experience Playbook for Enterprise IT
    MuckAI Girish, CEO, Muck.AI | Muddu Sudhakar Entrepreneur & Executive Dec 10 2019 9:00 am UTC 49 mins
    Applying AI in business has limitless potential. More and more organizations are implementing AI solutions to improve their core business functions. AI is not only revolutionary for end-user experience but also drives productivity and efficiency through automation and cost-savings.

    How do you leverage AI to streamline your core Enterprise IT organization?

    In this webinar, AI experts Muckai and Sudhakar break down the need for curated historical data, the pros and cons of specific Enterprise IT/Cloud Challenges, and the necessary AI-native solutions. The webinar will provide examples powerful enough to attain the ultimate goal for personalization, automation, prediction, cost savings and improve experience.

    Three takeaways planned for the session are:

    •Discover how AI will make up 80% of user daily interactions
    •Learn how AI delivers automated, human-like service experiences that empower users to self-solve problems
    •How AI can be leveraged for your enterprise organization


    Join BrightTALK's LinkedIn Group for BI & Analytics!
    - http://bit.ly/BrightTALKBI
  • Updating Your WSO2 Products
    Updating Your WSO2 Products
    Nihla Akram, Senior Software Engineer, WSO2 and Kasun Siyambalapitiya, Software Engineer, WSO2 Dec 10 2019 9:30 am UTC 54 mins
    We at WSO2 continuously improve our products with bug and security fixes and various other improvements. We want everyone evaluating, developing, or preparing WSO2 products for production deployments to have the best experience and not trip over a bug that has already been fixed. WSO2 Updates makes this process much easier.
    Join our webinar to learn how to update your WSO2 product using our tools.
  • Maximize your application delivery to Hybrid Cloud with Citrix ADC
    Maximize your application delivery to Hybrid Cloud with Citrix ADC
    David Jack - Director of Product Management and Marketing - Networking Dec 10 2019 10:00 am UTC 40 mins
    Maximize your application delivery to Hybrid Cloud with Citrix ADC
    Learn about how Citrix ADC helps customers in their digital transformation journey, suporting migration of applications between on-premis deploymnts into hybrid environments spanning multiple public and private clouds.
  • Rapport 2019 de Verizon sur la sécurité des paiements
    Rapport 2019 de Verizon sur la sécurité des paiements
    Loic Breat, Senior Manager PCI QSA, Security Assurance,Verizon Business Group Dec 10 2019 10:00 am UTC 60 mins
    Les organisations peuvent dépenser beaucoup de temps et d'argent pour créer leurs programmes de protection des données et de conformité (DPCP). Malgré de bonnes intentions, plus de la moitié des entreprises ont du mal à concevoir, mettre en œuvre et maintenir un programme DPCP durable.


    Le rapport 2019 de Verizon sur la sécurité des paiements fournit des conseils pour réaliser ces tâches et explique comment de nouveaux outils qui vous aideront à atteindre des niveaux nettement plus élevés pour la gestion de votre conformité.

    Le rapport de cette année présente des aspects très intéressants dans ses conclusions. Pour la première fois, le rapport contient des données supplémentaires d’évaluation, compilées à partir de données provenant de sociétés certifiés QSA. Cela élargit la vue et la perspective fournies par les précédents rapports PSR publiés par Verizon.
  • An introduction to MITRE ATT&CK
    An introduction to MITRE ATT&CK
    Randy Franklin Smith, Ultimate Windows Security and Brian Coulson, LogRhythm Dec 10 2019 10:00 am UTC 89 mins
    MITRE ATT&CK is a knowledge base and framework that lists and details adversary tactics and techniques within a common taxonomy. Having a taxonomy by itself has many valuable uses, such as providing a common vocabulary for exchanging information with others in the security community. But it also serves as a real technical framework for classifying your current detection efforts and identifying gaps where you are blind to certain types of attack behaviours.

    Join Randy Franklin Smith of Ultimate Windows Security and Brian Coulson of LogRhythm for an introduction to MITRE ATT&CK, as well as:

    - Share various ways to use ATT&CK, specifically in relation to designing, enhancing, assessing, and maintaining your security monitoring efforts.
    - Walk through an example of the MITRE attack process from start to finish while focusing on rule development and alignment in the LogRhythm NextGen SIEM Platform.

    Brian Coulson, from LogRhythm Labs, is leading an outstanding project at LogRhythm Labs where-in he will show you how they’re aligning the ATT&CK matrix with log sources, including windows event logs (XML – Security, XML Sysmon 8.0 and XML-System). While the matrix is wide spread in what it monitors, there are effective ways to filter around common and relevant detection techniques and logs.
  • Cyber criminals are adopting cloud services just as rapidly as the rest of us!
    Cyber criminals are adopting cloud services just as rapidly as the rest of us!
    Paolo Passeri - Cyber Intelligence Principal; Neil Thacker - CISO EMEA; & Ross Asquith - Security Transformation Principal Dec 10 2019 10:00 am UTC 60 mins
    Join Netskope for a 45 minute webinar, looking at the dark side of cloud - where it’s used not by respectable enterprises like yours, but instead by cyber criminals intent on attacking your respectable enterprise.

    It’s not surprising that cyber criminals are embracing the cloud, they’re after the same benefits that you are, such as scalability, business continuity, reliability, and reduced costs. Your organisation is adopting cloud, and this means opening up access to those same cloud environments used by cyber criminals and hackers. So, how do you make sure you’re not inadvertently opening a backdoor that allows your organisation to be compromised?

    On this webinar Netskope’s expert panel will provide:
    -Insight into the rapidly growing cloud threat landscape, and an overview of the cloud-enabled kill chain.
    -A live demonstration of how cyber criminals are using cloud to successfully deliver threats, and then also remotely control compromised machines using popular cloud services.
    -Guidance on how to ensure your employees are not accessing high risk cloud applications, and that they are only accessing your instances of cloud services.
  • Best of 2019 - Enterprise-Scale Big Data Analytics on Google Cloud Platform
    Best of 2019 - Enterprise-Scale Big Data Analytics on Google Cloud Platform
    Naveen Punjabi from Google & Anita Thomas from Qubole Dec 10 2019 10:00 am UTC 56 mins
    As companies scale their data infrastructure on Google Cloud, they need a self-service data platform with integrated tools that enables easier, more collaborative processing of big data workloads.

    Join Qubole and Google experts to learn:

    - Why a unified experience with native notebooks, a command workbench, and integrated Apache Airflow are a must for enabling data engineers and data scientists to collaborate using the tools, languages, and engines they are familiar with.

    - The importance of enhanced versions of Apache Spark, Hadoop, Hive and Airflow, along with dedicated support and specialized engineering teams by engine, for your big data analytics projects.

    - How workload-aware autoscaling, aggressive downscaling, intelligent Preemptible VM support, and other administration capabilities are critical for proper scalability and reduced TCO.

    - How you can deliver day-1 self-service access to process the data in your GCP data lake or BigQuery data warehouse, with enterprise-grade security.
  • Creating Security Champions to Improve Your DevOps Security Posture
    Creating Security Champions to Improve Your DevOps Security Posture
    Paul Farrington, EMEA CTO at Veracode | Calvin Mills, Software Engineer | Jamie Keegan, QA Test Lead Dec 10 2019 11:00 am UTC 45 mins
    What if I told you that you could improve the rate at which you fix your security issues up to 88% faster, without spending money on expensive consultants or blinky lights. 'Security Champions' could be the answer.
     
    Gartner predicts 3.4 million unfilled security roles by 2022 - simply because there are not enough expertise. DevOps teams in particular are leading the way in identifying Security Champions to help promote secure coding and reduce friction within teams. Rather than relying exclusively on a centralised security team, that can’t scale - we can go faster by nurturing security advocates in each development team. We talk about how to harness the existing talent in your teams and provide insights into how you can force-multiply the effect of security across your organisation, in a way that is likely to be received positively by your development teams.