Hi [[ session.user.profile.firstName ]]

Information Technology

  • DevSecOps - Web Application Firewall in a CI/CD Workflow
    DevSecOps - Web Application Firewall in a CI/CD Workflow
    Presenter: Clive Chan, Senior Consultant, F5 Networks. Moderator: Otto Lee, CISSP, CSSLP, Membership Chair, (ISC)² Recorded: Jun 25 2019 60 mins
    IT automation and orchestration, the key enabler of digitization is the number one IT initiate globally according to our state of application services report 2019. In addition, Zero Trust and Security-By-Design are key imperatives of organizations pursuing digital transformation as these organizations accelerate adoption of cloud technologies to gain speed, scale and accessibility to innovative technologies like AI and blockchains.

    In this webinar, we will look at the changing landscape of DevOps. We will explore the practice of scaling application security, controlling vulnerabilities and controlling advanced threats with the web application firewall in CI/CD environments. We will also take a look at how the technologies enable close collaboration between security teams and development teams on securing APPs without requiring application teams having in-depth knowledge of security.

    *This webinar will be conducted in Cantonese. (本次網上研討會將以粵語進行。)
  • 5 Steps to a Predictive IT Strategy to Achieve Mission Success
    5 Steps to a Predictive IT Strategy to Achieve Mission Success
    Bryan Jennewein, Andreia Martins and Retesh Shah Recorded: Jun 25 2019 46 mins
    Countless platforms promise predictive capabilities for your IT organization. What is your strategy for integrating artificial intelligence and machine learning, and what do you need from your tech stack to be successful?

    Watch our webinar with Vodafone and Accenture to understand the 5 critical components to build an effective AI strategy, benefits realized from implementing a predictive IT solution, and what to look for when evaluating predictive analytics solutions.

    What you’ll learn:
    • 5 steps to an effective predictive IT strategy
    • How Vodafone with Accenture improved their customer experience with AI
    • Where AI can help, and where it can’t

    Featured Presenters:

    Bryan Jennewein
    Director, Product Marketing
    Splunk Inc.

    Andreia Martins
    Head of IT Operations
    Vodafone UK

    Retesh Shah
    Application Outsourcing Lead for Vodafone
    Accenture UK
  • Cyber Risk Assessment and Quantification - Understand, Measure, Manage
    Cyber Risk Assessment and Quantification - Understand, Measure, Manage
    Swabhiman Chhotray, Managing Consultant, Marsh Risk Consulting Asia, and Naureen Rasul, Cyber Leader, Marsh Asia Recorded: Jun 25 2019 26 mins
    Every organization has cyber risks. They are difficult to comprehend. They are even harder to assess and quantify.

    An end-to-end cyber risk management approach can be achieved if you:
    1.Understand cyber risks from a business perspective and assess the nature of any potential cyber-related losses – know your threats.
    2.Measure the financial impact of cyber exposures and quantify how much is acceptable across the organization – know yourself.
    3.Manage the insurance and recovery process by having a clear action plan based off your capabilities and capacities – know what you can do.

    Join Marsh Risk Consulting’s, Swabhiman Chhotray and Marsh’s Cyber Leader, Naureen Rasul as they discuss a risk management framework that allows you to understand, measure, and manage your inherent cyber risks.
  • Tableau in the Cloud
    Tableau in the Cloud
    Luke Stapleton, Manager, Analytics Platform, nib + Gerad Crow, Manager, Analytics and Reporting, nib Recorded: Jun 25 2019 20 mins
    Tableau in the cloud @ nib – Hear from Luke Stapleton and Gerad Crow as they talk about the journey nib has been on to modernise their data analytics environments, the challenges and insights.
  • Debunking the Top 5 Myths About Mobile AppSec
    Debunking the Top 5 Myths About Mobile AppSec
    Brian Reed, Chief Mobility Officer, NowSecure // Alan Snyder, Chief Executive Officer, NowSecure Recorded: Jun 24 2019 47 mins
    It’s hard to believe that mobile app stores are more than a decade old yet some crazy misconceptions about mobile application security still linger.

    Stop us if you’ve heard these before:
    - Testing mobile apps is the same as web apps
    - SAST is good enough for mobile, you don’t need DAST
    - Mobile apps are secure because Apple and Google security test them
    - Outsourcing a penetration test once per year is sufficient to mitigate risk

    Join us to sort fact from fiction and learn how to ensure your mobile appsec program is on the right track. You may discover some surprising things about modern mobile application security.
  • How to Build Cloud Apps at Lightening Speed
    How to Build Cloud Apps at Lightening Speed
    Deepak Anand, Senior Advisory Platform Architect, ServiceNow Recorded: Jun 24 2019 57 mins
    Wish you had an app for that new use case? Learn how business and IT can partner to build apps fast on the NOW Platform.

    Whether you are an experienced developer, a System Admin ready to start building apps, an Enterprise Architect, or a business focused person, this is for you.

    Join this webinar with our team of Platform Innovation experts to:

    • Learn about the Now Platform architecture and capabilities
    • Understand what apps are best to build on the Now Platform
    • Experience the cloud application development process from start to finish with a live demo
    • Discover how to significantly reduce app development time and delivery
  • [PANEL] Breach Protection - Best Practices, Tips and Tools
    [PANEL] Breach Protection - Best Practices, Tips and Tools
    David Morris | Nick Vigier | Kalani Enos Recorded: Jun 24 2019 56 mins
    As more and more organizations are getting breached, executives are finally paying attention to cybersecurity and data protection. What are the biggest challenges for businesses when it comes to securing the enterprise?

    Join this panel of experts to learn more about the current state of breaches, how organizations of all sizes are coping, and what CISOs are prioritizing this year.

    Attendees will learn more about:
    - Who is most at risk of being breached
    - How to prevent a breach or minimize its impact
    - How long it takes to detect a breach
    - Best practices for investigation and remediation
    - Words of wisdom from the experts

    Speakers:
    - David Morris, Managing Partner, Morris Cybersecurity
    - Nick Vigier, CxO Advisor, Coalfire
    - Kalani Enos, Founder & CEO, kenos Technologies
  • How To Increase MITRE ATT&CK Coverage with Network Traffic Analysis
    How To Increase MITRE ATT&CK Coverage with Network Traffic Analysis
    John Smith, Principal Sales Engineer at ExtraHop; Chris Crowley, Senior Instructor at SANS Recorded: Jun 24 2019 63 mins
    The MITRE ATT&CK Framework is a useful tool for SecOps teams trying to understand their security posture against common adversary tactics, techniques, and procedures (TTPs). In this presentation you'll learn how to take your ATT&CK understanding and coverage to the next level with network traffic analysis. You'll also learn:

    - Key tips for understanding the MITRE ATT&CK Framework and how to use it as a tool to improve your security posture.
    - What the framework is optimized for, and where it has room to grow
    - Which security tools and data sources you'll need to achieve the best coverage against TTPs in all 12 categories of the MITRE ATT&CK Framework
  • Out With KBA; In with New Digital Identity Guidelines for the US Government
    Out With KBA; In with New Digital Identity Guidelines for the US Government
    Patrick Hearn, CEO, Endeavor Worldwide & Frances Zelazny, Chief Strategy & Marketing Officer, BioCatch Recorded: Jun 24 2019 32 mins
    The newest report issued by the U.S. General Accounting Office (GAO), Federal Agencies Need to Strengthen Online Identity Verification Processes, calls for an overhaul and updated guidelines on identity proofing, highlighting the availability of data stolen in various data breaches over the years in the hands of attackers and fraudsters. Already, the National Institute of Standards and Technology (NIST) has issued guidance in 2017 that effectively prohibits agencies from using Knowledge-Based Authentication (KBA) methods for sensitive applications. Now, the GAO is going one step further, recommending that all agencies discontinue the use of KBA and highlights various alternatives for consideration. The outcome may have far-reaching implications not just for federal agencies but across the board for all private entities that conduct identity verification and authentication to provide digital products and services.
    Join industry veterans Patrick Hearn and Frances Zelazny next Monday, for a short, 30-minute debrief on this latest GAO report and what it means for you.
  • Building the Optimal Architecture for Open Banking
    Building the Optimal Architecture for Open Banking
    Eyal Sivan Senior Director and Platform Owner, CIBC Recorded: Jun 24 2019 43 mins
    In this session, we'll discuss:

    • The evolution of open banking architecture across different regions and markets.
    • Creativity vs. standardization: competing pressures and concerns in open banking.
    • How application programming interface (API) gateways and microservices fit into a comprehensive architectural solution.
    • The emergence of service mesh as the foundation of open banking architecture.
    • Canadian Imperial Bank of Commerce's (CIBC’s) open source, cloud-native API platform.
    • How to establish an API-driven business culture focused on speed and innovation.
  • Overcoming Key Barrier to SD-WAN Adoption in the Enterprise Journey to the Cloud
    Overcoming Key Barrier to SD-WAN Adoption in the Enterprise Journey to the Cloud
    Rajesh Ghai Research Director, Carrier Network Infrastructure IDC, Rajesh Ghai Director, Carrier Network Infrastructure Recorded: Jun 24 2019 53 mins
    Enterprises have embraced cloud computing to unlock the opportunity offered by digital transformation. The cloud’s flexibility and agility enable enterprises to grow their business without borders and ensure productivity and efficiency.

    While enterprise applications continue to migrate to the cloud, the necessary change in the wide area network (WAN) is often overlooked. The hub-and-spoke WAN architecture that served the needs of the enterprise when applications were delivered from the datacenter, must evolve to serve the needs of the era of cloud applications. Software-defined WAN (SD-WAN) is the WAN's response to this paradigm shift in application traffic to the cloud.

    While SD-WAN has emerged as a key enabler of secure and seamless direct cloud application access with the benefits of transport independence, better security and path selection, it has brought into focus the importance of the transport underlay and the technology investment — both past and future — that an enterprise needs to consider before adopting SD-WAN.

    This webinar spotlights two critical success factors for driving mainstream enterprise adoption of SD-WAN:

    *Predictable and robust Internet connectivity
    *Investment protection (of installed legacy network equipment or in new technology) as the WAN evolves to support applications delivered from the cloud.

    Join us at this webinar as we make sense of SD-WAN adoption for your company.
  • Secure your SaaS Applications with SonicWall Cloud App Security
    Secure your SaaS Applications with SonicWall Cloud App Security
    OnDemand Video Recorded: Jun 24 2019 4 mins
    SonicWall Cloud App Security provides email security and data protection for SaaS applications, using cloud-native APIs, for a latency-free user experience.
  • Top 3 security risks for your SD-WAN implementation
    Top 3 security risks for your SD-WAN implementation
    Kevin Brown, Adrian Comley, and Peter Sader Recorded: Jun 24 2019 30 mins
    The visibility, control and agility that an SD-WAN can deliver to a global organisation makes it very attractive, but it can come with significantly higher risks. In around 80 per cent of the bids we see, customers aren’t actively considering or aware of these risks. SD-WAN is highlighting the tension between CIOs, focused on supporting the business with technology enabled solutions, and CISOs, concerned with managing information security risks. Are you clear on how to deliver the benefits of SD-WAN, whilst maintaining the security of your organisation?

    Join our webinar on 24 June where Kevin Brown, our Managing director of Security, Adrian Comley, General manager, Dynamic Network Services, and Peter Sader, Security head of business development, discuss the top 3 security risks you need to consider to make sure your SD-WAN implementation is secure.
  • Verwalten Sie Ihr Security-Ökosystem mit SonicWall Capture Security Center
    Verwalten Sie Ihr Security-Ökosystem mit SonicWall Capture Security Center
    OnDemand Video Recorded: Jun 24 2019 3 mins
    Verwaltung des gesamten globalen SonicWall Security-Pakets, das virtuelle und physische Firewalls der nächsten Generation, Cloud App Security, Capture Client für Endpunkte und SonicWave-Wireless-Access-Points einschließt.
  • Gestione todo su ecosistema de seguridad con SonicWall Capture Security Center.
    Gestione todo su ecosistema de seguridad con SonicWall Capture Security Center.
    OnDemand Video Recorded: Jun 24 2019 3 mins
    Gestione toda su pila global de seguridad de SonicWall: firewalls físicos y virtuales de última generación, Cloud App Security, Capture Client para endpoints y access points inalámbricos.
  • Webinar: An Actionable Plan for Segmenting Your Network
    Webinar: An Actionable Plan for Segmenting Your Network
    Erez Tadmor,Sr. Product Manager, Tufin & Dan Rheault, Sr. Product Marketing Manager, Tufin Recorded: Jun 24 2019 49 mins
    A segmented network operationalizes your network security policy, enables a demonstrable state of continuous compliance, and provides mitigation options for cyberattacks.

    Our advice: organizations must go back to the basics to accomplish this crucial project.

    This webinar will cover actionable tips for network segmentation based on the experience of over 2,000 organizations. We will share:
    •Common pitfalls to avoid
    •How to start segmenting your network today
    •Tips for applicable enforcement
    •Q&A from the attendees
  • Gestite l’intero ecosistema di sicurezza con SonicWall Capture Security Center
    Gestite l’intero ecosistema di sicurezza con SonicWall Capture Security Center
    OnDemand Video Recorded: Jun 24 2019 3 mins
    Gestite l’intero stack di sicurezza SonicWall, compresi i firewall virtuali e fisici di prossima generazione, Cloud App Security, Capture Client per endpoint e access point wireless
  • Manage your Entire Security Ecosystem with SonicWall Capture Security Center
    Manage your Entire Security Ecosystem with SonicWall Capture Security Center
    OnDemand Video Recorded: Jun 24 2019 3 mins
    Manage your entire global SonicWall security stack, including next-generation virtual and physical firewalls, Cloud App Security, Capture Client for endpoints and wireless access points
  • ATT&CK Deep Dive: Defense Evasion
    ATT&CK Deep Dive: Defense Evasion
    Phil Hagenm DFIR Strategist SANS Senior Instructor - Red Canary Recorded: Jun 24 2019 71 mins
    Join Red Canary, Carbon Black, and MITRE as we shine a light on defense evasion. This informative webinar will offer a comparative across operating systems, sharing examples of defense evasion in Windows, macOS, and Linux environments.

    You will learn:

    - Real-world insights into what security teams are facing in their environments.
    - Examples of prominent, defense-evading malware.
    - Common adversary techniques like scripting, masquerading, code obfuscation, and disabling security tools.
    - Actionable advice on how to hunt for and build detection strategies around defense evasion.

    Presenters include: Tony Lambert, Detection Engineer - Red Canary, John Wunder, Principle Cybersecurity Engineer - MITRE and Rick McElroy, Head of Security Strategy - Carbon Black
  • What Makes Local Government an Enticing Cyber Target
    What Makes Local Government an Enticing Cyber Target
    Dr. Kevin Mahoney, Practice Director, Advanced Threat Protection Recorded: Jun 21 2019 31 mins
    Discover the tactics cyber criminals are using to steal valuable taxpayer and student data. State government, local government, and educational institutions across the globe are at risk of facing sophisticated attacks if they do not have the proper security in place. We'll look at common exploit trends and provide actionable tips on how to outsmart them by implementing proactive measures to better secure your organization's most critical data.
  • Make Digital Cities a Reality with Dell Technologies & Boomi
    Make Digital Cities a Reality with Dell Technologies & Boomi
    Rob Silverberg, Dell Technologies CTO, Digital Communities Recorded: Jun 21 2019 34 mins
    As cities move to embrace smart city technologies and Internet of Things (IoT) solutions, they need to understand the new data challenges associated with these projects. In this webcast, we’ll explore the drivers and reasons to implement a Smart City Data strategy and architecture for tangible city and community improvements, not just a science experiment. We will review the challenges and how some cities are preparing to manage the data coming from sensors and IoT devices, as well as review how the Boomi platform and Dell EMC infrastructure supports smart city solutions.
  • To Whack or Not to Whack — Incident Response and Breach Mitigation
    To Whack or Not to Whack — Incident Response and Breach Mitigation
    Danny Akacki, Sr. Technical Account Manager, Gigamon Insight and TJ Biehle,Sr. Technical Account Manager, Gigamon Insight Recorded: Jun 21 2019 44 mins
    To whack, or not to whack, that is the question:
    Whether ‘tis nobler in the mind to torch all
    The compromised boxes on your poor network,
    Or to take arms against a sea of malware
    And by blocking stop them all.

    So, what do you do during an active security incident? When is the proper time to whack-a-mole with your mallet? Is it better to light everything on fire and start over, or should you make observations a key component of your response and mitigation strategy? In this webinar, we'll discuss strategies for when it's time to scorch the earth versus sit back with a cup of tea, gaining intel into what active adversaries are doing in your house.

    We’ll break down some of the most important points to remember during the commotion of an active incident response, including:

    •Context is king. We’ll explain the important questions you need to be ask when scoping an incident to get an improved view of the situation.
    •Thinking fast and slow. It’s understandable to want to nuke everything from orbit just to be thorough, but it’s usually not the smartest play. We’ll outline the potential benefits and risks of hasty containment and remediation efforts versus slow, thoughtful analysis when executing a response game plan.
    •The law of diminishing returns. There can be a tipping point where the cost of your decisions and polices no longer justify the answers you’ll find. We’ll talk you through some tactics to find the sweet spot between effort and return.
  • 5 Steps for SMBs to Improve Cyber Risk Management & Gain a Competitive Advantage
    5 Steps for SMBs to Improve Cyber Risk Management & Gain a Competitive Advantage
    Mike Volk, VP, Cyber Risk Solutions, PSA Financial and Casey Corcoran, CISO, OPAQ Recorded: Jun 21 2019 30 mins
    Cyber security is complicated. Managing cyber risk is even more complicated, particularly for small- and midsize businesses that have limited financial and personnel resources to apply to this business priority. It’s not that SMB executives don’t understand the consequences of falling prey to cyber-attacks. They acknowledge that they should do more to improve their risk posture. However, they need help with understanding where best to invest their finite resources to reduce their exposures.

    Forget the fear and uncertainty factor, and say goodbye to depending solely on fate and hope for risk management – this webcast is designed to equip SMBs with actionable steps to greatly improve their risk management posture and open up opportunities with customers, supply chain partners, and others who seek to do business with risk-savvy businesses.
  • Venez découvrir les nouveautés de la gamme Precision Dell.
    Venez découvrir les nouveautés de la gamme Precision Dell.
    Julien Vinel, Workstation Sales Specialist - Dell Technologies Jun 25 2019 8:00 am UTC 75 mins
    Nous vous présenterons nos nouveautés Workstation et la gamme Precision, ainsi qu'un cas client sur la Réalité Virtuelle & Augmentée.
  • Fujitsu, SAP und SUSE: SAP Data Hub
    Fujitsu, SAP und SUSE: SAP Data Hub
    Martin Werner, Fujtsu, Matthias Kretschmer, SAP & Carsten Duch, SUSE Jun 25 2019 8:00 am UTC 60 mins
    Stellen Sie intelligente Daten für das intelligente Unternehmen bereit, indem Sie sämtliche Daten verteilter Datenlandschaften richtig koordinieren und steuern mit dem containerbasierten SAP Data Hub. Containerbasiert heißt, dass die zugrundeliegenden Komponenten wie Engines, Agents und Metadatenspeicher in SAP HANA jeweils in einer isolierten Ausführungsumgebung innerhalb von Kubernetes ausgeführt werden. Insofern wird dadurch die Installation erheblich vereinfacht und die Bereitstellung beschleunigt. Eine zentrale Rolle spielt hierbei die SUSE-Lösung SUSE Container-as-a-Service Platform. Sie sorgt dafür, flexible, vereinfachte und automatisierte Möglichkeiten zur Auslieferung von kleinteiligen Services (Microservices) mithilfe von Containern bereitzustellen, samt der Verwendung von Kubernetes.

    Erfahren Sie in dem gemeinsamen Webinar von Fujitsu und SUSE mehr über die Strategie und Neuerungen im containerbasierten SAP Data Hub und wie Kubernetes ein Schlüsselelement für die Lösungen zur Anwendungsbereitstellung sein wird.
  • Seminario web: 5 señales claras que necesitas automatización
    Seminario web: 5 señales claras que necesitas automatización
    Alberto Maestre, Pre-Sales Engineer SEEMEA Jun 25 2019 8:30 am UTC 60 mins
    ¿Por qué automatizar? ¿Porqué ahora? La automatización es crítica para la transformación digital, esencial para reducir la superficie de ataque y obligatoria para garantizar el cumplimiento continuo.

    Únase a nosotros para nuestro webcast el 25 de junio a las 10:30 “5 señales claras que necesita para automatizar las operaciones de seguridad de red” para aprender:

    Cómo acelerar de forma segura el proceso de cambio de red
    Mejores prácticas para comenzar con la automatización
    Pautas para cumplir con el objetivo de Zero-Touch Automation

    Conviértalo en una de sus resoluciones 2019 para adoptar la automatización y reducir el tiempo y el esfuerzo que dedica a las tareas manuales relacionadas con las operaciones de firewall. Los cinco signos claros pueden ayudarlo a desarrollar el caso de negocios y obtener una participación de la administración para maximizar la agilidad y la seguridad con la automatización y la orquestación de políticas de seguridad de Tufin.
  • Securing Email, Data and User Credentials in Office 365 and G Suite
    Securing Email, Data and User Credentials in Office 365 and G Suite
    John Aarsen, SE - Benelux and Nordics, SonicWall Jun 25 2019 9:00 am UTC 60 mins
    Many organizations are adopting cloud platforms such as Office 365 or G Suite. These offer a broad range of productivity tools beyond just email, so email security point solutions alone cannot protect the entire platform from targeted attacks.
    Hear from our SonicWall security expert to learn:
    •The key capabilities needed to protect cloud office platforms
    •How SonicWall Cloud App Security can help you protect email, data and user credentials for Office 365, G Suite and other SaaS apps.
  • Airheads Tech Talks Cluster: Live Upgrade
    Airheads Tech Talks Cluster: Live Upgrade
    Abdul Ali Irfaan, Aruba TAC Team Jun 25 2019 9:00 am UTC 90 mins
    The Live Upgrades feature allows the managed devices and APs in a cluster to automatically upgrade the software from ArubaOS 8.1 version to higher ArubaOS versions. Managed Devices in a cluster can be seamlessly upgraded by specifying the new image file and a target partition.

    During this webinar we will cover the below topics:

    · Cluster Live Upgrade is a feature introduced in 8.1.x version.
    · This feature works along with clustering.
    · It provides seamless upgrade of the controllers, APs with minimal RF impact.
    · No manual intervention required during the upgrade.
    · APs are logically partitioned and upgraded using AP image pre-load feature and thereby providing the coverage for the clients during the upgrade.
  • Expertise On-Demand - Flexibler Zugang zu Expertenwissen
    Expertise On-Demand - Flexibler Zugang zu Expertenwissen
    Stefan Munz, Account Manager, FireEye Jun 25 2019 9:00 am UTC 60 mins
    Die Anforderungen für eine handlungsfähige Cyber-Defense Organisation sind anspruchsvoll. Heute braucht man einen Malware-Reverese Engineer, morgen einen Threat Hunter, übermorgen einen Intelligence Analyst und nächste Woche einen Incident Response Consultant. Das Expertenwissen muss "von jetzt auf gleich" verfügbar sein, jedoch hat man im Durchschnitt nicht das Budget für alle 4 Arbeitsstellen.
    Für Unternehmen und Organisationen stellt sich dann die Frage: wie kann man das gesamte Expertenwissen intelligent vereinen?
    Erfahren Sie in unserem Webinar, wie FireEye mit unterschiedlichsten Experten und Services als verlängerter Werkbank Ihrer Cyber-Defense Organisation agiert und welche weiteren Vorteile sich hierbei für Sie ergeben:

    · Kompletter Zugriff auf die vollständige FireEye Cyber Intelligence Services
    · Ad-Hoc Verfügbarkeit von Expertise und Erfahrung unseres Teams
    · Regelmäßige Cyber Threat Briefings
    · Einfacher Zugang zu Services wie Red Teaming, Table Top Exercises oder Purple Teaming
    · Incident Response Retainer mit globalen SLAs
  • Moving Big Data Pipelines to the Cloud: Plan, Migrate, Validate & Manage
    Moving Big Data Pipelines to the Cloud: Plan, Migrate, Validate & Manage
    Dave Berry, Senior Solutions Engineer - International, Unravel Data Jun 25 2019 9:00 am UTC 60 mins
    The movement to utilize data to drive more effective business outcomes continues to accelerate. But with this acceleration comes an explosion of complex platforms to collect, process, store, and analyze this data. Ensuring these platforms are utilized optimally is a tremendous challenge for businesses.

    Join Dave Berry, Senior Solution Engineer at Unraveldata, as he takes you through an AI/ML based approach to Application Performance Management applied to data applications on any infrastructure - whether it be cloud, on-premise, or a combination of the two.
  • Présenté en Français: Traitement du Langage Naturel avec H2O Driverless AI
    Présenté en Français: Traitement du Langage Naturel avec H2O Driverless AI
    Badr Chentouf, H2O.ai Jun 25 2019 9:00 am UTC 60 mins
    H2O Driverless AI is H2O.ai's flagship platform for automatic machine learning. It fully automates the data science workflow including some of the most challenging tasks in applied data science such as feature engineering, model tuning, model optimization, and model deployment. Driverless AI turns Kaggle Grandmaster recipes into a full functioning platform that delivers "an expert data scientist in a box" from training to deployment.

    In the latest version of our Driverless AI platform, we have included Natural Language Processing (NLP) recipes for text classification and regression problems. With this new capability, Driverless AI can now address a whole new set of problems in the text space like automatic document classification, sentiment analysis, emotion detection and so on using the textual data. Stay tuned to the webinar to know more.
  • Is browser isolation the new ‘sandbox’ for security?
    Is browser isolation the new ‘sandbox’ for security?
    Brett Raybould, Solutions Architect, Menlo Security Jun 25 2019 9:00 am UTC 45 mins
    Protecting organisations from web threats has typically been done with a proxy or DNS solution, but a new approach has emerged.

    Isolation defends against today’s sophisticated zero-day exploits using an “air-gapped” browsing approach.

    Identified by Gartner as “one of the single most significant ways to reduce web-based attacks,” remote browser isolation has become an important line item in IT budgets around the world. But not all Isolation is created equal. With so many offerings how do you weed through the noise?

    Join us and Menlo Security to learn:
    - Why remote browser isolation technology adoption is on the rise
    - Key use cases for Isolation that should be evaluated
    - 3 critical requirements when selecting a practical browser isolation solution
  • How to Optimize Network Performance During Infrastructure Transformation
    How to Optimize Network Performance During Infrastructure Transformation
    Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Jun 25 2019 10:00 am UTC 47 mins
    How do you reduce complexity of your transforming infrastructure, gain greater IT tool efficiency and maximize visibility into your network? The right solution should empower you to produce better outcomes with less effort at lower cost. That is where a next-generation packet broker comes into play.

    Join Gigamon to get the latest best practices to:
    • Acquire and aggregate all network traffic for better visibility
    • Stop duplicate packets from overloading your tools
    • Filter traffic to provide the right data to the right tools
    • Optimize compliance and reduce risk across your entire IT environment

    If you need to optimize your tools, improve network performance and availability, get better insights into threats and enable your Network Operations and Security Operations teams to collaborate, you won’t want to miss this technical webinar.
  • Case Study: How a tier 1 bank transformed its mobile offering with Re:Call
    Case Study: How a tier 1 bank transformed its mobile offering with Re:Call
    Mark Elwood Jun 25 2019 10:00 am UTC 35 mins
    One of the UK’s largest and oldest high street banks is investing over £3 billion to deploy new technology that will make banking simpler and easier for customers and drive operational efficiencies. Improving digital services and creating a digital workplace are central to this transformation.

    Research by networking specialists, Aruba, finds there are clear benefits to being a ‘digital revolutionary’ – an employee who works in a fully-enabled digital workplace – versus a ‘digital laggard’ - those that have less access to workplace technology. These include increased productivity, collaboration and job satisfaction.

    The bank wanted to introduce an alternative to the existing mobile phone offering for better colleague choice, to improve collaboration and increase productivity. They came to TeleWare based on our expertise in mobile communications to specifically help them to:
    •Move from wired to wireless communications technology
    •Support them in adopting modern working practices
    •To provide an alternative to the existing mobile phone offering
    •To provide greater colleague choice

    In this exclusive interview with pivotal TeleWare stakeholders on this project, find out how TeleWare are helping this major bank transform its mobile communications offering for colleagues.

    Audience:
    IT Professionals
    Financial Services professionals
    HR professionals interested in employee engagement

    What you’ll take away:
    Unique insight into how a tier 1 bank is using Re:Call to improve employee engagement and mobility can have positive impacts on your bottom line.
    Hosted by Mark Elwood, Marketing Director, TeleWare
    Nick Reaks, Sales and Customer Director, TeleWare
    Alan Clarke, Technical Project Lead, TeleWare
  • Secure By Design: Internet of Things
    Secure By Design: Internet of Things
    Fulya Sengil, Solution Architect & Adam Reyland, Regional Marketing Specialist at Veracode Jun 25 2019 10:00 am UTC 45 mins
    Many commentators observe that the IoT devices just aren’t up to scratch, when it comes to security. GDPR requires vendors to and service providers to design things with security as standard. In February 2019, the European Standards body ETSI published security guidelines for the consumer Internet of Things aligning with IOT Security Compliance Framework.

    IoT requires the best in all aspects of security — physical, operational technology, and cybersecurity. Thus, it makes sense to envisage IoT security as an ecosystem in itself. Unexpected challenges are likely to erupt because of the existence of several layers in the IoT ecosystem. This calls upon leaders to initiate regular automated risk assessments and simulations such that IoT specific breaches can be monitored closely. This helps businesses build reliable playbooks that enable organizations to respond to IoT security challenges.

    Software installed on these devices could be potentially vulnerable, if it has not an automated security assessment before deployment. We take a look at how it’s possible to make the software that drives these devices and the backend serverless technologies secure based on requirements in IOT Security Compliance Framework.
  • Cyberattacks: Q2 Review and Emerging Trends
    Cyberattacks: Q2 Review and Emerging Trends
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Jun 25 2019 10:00 am UTC 60 mins
    With cybercriminals constantly innovating ways to steal information and monetise data, it’s crucial for businesses and MSPs to keep up to date on emerging cyber threat trends.

    Webroot is hosting a series of webinars every three months that aim to keep the industry informed on the latest threat trends and to review the top cyberattacks that hit businesses each quarter, as well as tips for staying safe in a complex threat landscape.

    Join Webroot as we discuss topics like:

    • Information theft and phishing attacks
    • Headline-grabbing breaches and the torrent of smaller ones that don't make the news
    • The evolution of ransomware
    • The theft, trade, and cracking of passwords
  • De-Mystifying Capacity Management in the Digital World
    De-Mystifying Capacity Management in the Digital World
    Jamie Baker, Senior Product Manager, Syncsort Jun 25 2019 11:00 am UTC 55 mins
    Capacity management is an integral function of organizations running multi-domain complex IT environments. However, the shift over the years from physical to virtual to Cloud and DevOps/Microservices has inevitably changed the perception of capacity management and whether it is still needed.

    View this webinar to learn why it’s necessary to invest in a capacity management solution to deliver business and service assurance, but also control costs and meet SLAs. In this webinar we cover:

    •How capacity management has evolved and why it’s as important for the Cloud
    •How capacity management can encompass but differ from real-time monitoring
    •What benefits can be realized from implementing and maturing a capacity management process
    •Why a mature capacity management process should co-exist with your load and performance testing activities
  • Unified Storage for a Multi-Cloud World
    Unified Storage for a Multi-Cloud World
    Stewart Hunwick, Dell EMC’s EMEA Presales Specialist Jun 25 2019 11:00 am UTC 60 mins
    Optimise workloads and simply data management with no-compromise, midrange storage – Dell EMC Unity next generation multi-cloud solutions. Gain data speed, cloud simplicity and management efficiency

    Built for a multi-cloud strategy, the next-generation Dell EMC Unity XT delivers unified storage speed for quicker access to application data as well as increased efficiency. This no-compromise midrange storage platform easily supports a fully-integrated multi-cloud infrastructure for faster, simpler data access and operations. Unlock the value of your data capital with Dell EMC Unity XT.
    •Speed performance and optimize any workload
    •Simply your data landscape with increased management efficiency
    •Achieve cloud readiness
  • Four Steps to Multi-CDN: How to make the most of your investment (EMEA)
    Four Steps to Multi-CDN: How to make the most of your investment (EMEA)
    Emily Pali, Product Manager, and James Royalty, Principal Engineer Jun 25 2019 12:00 pm UTC 22 mins
    CDNs are critical in a globally distributed world where users expect optimal performance regardless of where they are located.

    The reasons for implementing a multi-CDN environment might seem obvious--high availability and redundant infrastructure--but if set up correctly, it can actually impede the user experience.

    The reality is, if you’re not routing traffic efficiently across your multi-CDN environment you’re not truly benefiting from it. NS1’s Pulsar Active Traffic Steering allows you to truly harness the power of multi-CDN without the headache.
  • Taking Security From Mediocre to Mighty With The MITRE ATT&CK Framework
    Taking Security From Mediocre to Mighty With The MITRE ATT&CK Framework
    Matthias Maier, EMEA Director of Product Marketing, Splunk, Brandon Dunlap, Moderator, (ISC)² Jun 25 2019 12:00 pm UTC 60 mins
    What is the MITRE ATT&CK framework? Where did it come from? Why and how should you use it? Get the answers to all of these questions, as security experts from Splunk take a practical look at how your SOC and SIEM can apply the MITRE ATT&CK framework. Ensure the coverage of known TTP’s of threats your business is exposed to, to improving threat hunting and detection of Adversary’s. Join this webinar to discover:

    • What the MITRE ATT&CK framework is, and why it should be used
    • How to align your use cases to the MITRE ATT&CK framework
    • How to navigate an ATT&CK Threat group TTP's
    • How to track and monitor your detection capabilities to ensure wide coverage
  • Customer Service-How IBM's Agents & Mobile Workers Deliver Intelligent Service
    Customer Service-How IBM's Agents & Mobile Workers Deliver Intelligent Service
    Joanna Dapkevich, VP, Support Tooling and Watson Innovation, IBM Lily Ryzebol, Offering Manager, Watson in Support, IBM Bob F Jun 25 2019 1:00 pm UTC 40 mins
    IBM, a 105-year-old company, transformed its customer support channel for over 22,000 agents. To evolve its business and drive new levels of engagement, IBM partnered with Salesforce to support its service transformation, create a consistent agent experience, and drive greater value to customers globally.

    Join us for an in-depth look at how IBM reinvented its 50+ year old ticketing system, now powered by AI, and how it uses Watson and Salesforce to deliver outstanding customer service. Also, learn about its breakthrough initiatives using Community Cloud to build a digital front door for its customers and Field Service Lightning to manage complex remote deployments around the world. Finally, plan how you can launch your own transformation with lessons learned and best practices from IBM.
  • Friendly Friction: How to optimise user onboarding for Financial Services
    Friendly Friction: How to optimise user onboarding for Financial Services
    Dan Leitao, Product Manager at Onfido Jun 25 2019 1:00 pm UTC 35 mins
    When it comes to user onboarding, there’s a tension between security and convenience. For financial services, non-compliance with KYC requirements can be costly. But adding too much friction will impact your ability to scale. So how can you optimise your user experience to introduce just the right amount of ‘friendly’ friction and unlock growth?

    Join this webinar with Dan Leitao, Product Manager at Onfido to learn:

    - Why financial services need friendly friction
    - How to tailor and optimise your onboarding process according to your risk-based approach
    - The key features you can utilise to improve your UX
    -How to manage the balance between security and convenience
    -Ensuring you stay compliant in an ever-changing regulatory environment
  • Cloud Storage Security Innovations Video
    Cloud Storage Security Innovations Video
    Symantec Jun 25 2019 1:00 pm UTC 2 mins
    CWP 4.0 and DLP Integration Video
  • Our technology in action: delivering superior experiences .
    Our technology in action: delivering superior experiences .
    Mark Burton, from Riverbed and Tim Wade, from Dimension Data Jun 25 2019 2:00 pm UTC 60 mins
    For anyone following pro cycling, our web-based Race Center application is revolutionary. Combining live data, video, images, social media feeds and commentary, it gives fans, teams and organisers an unparallel view of the action. Through the smart application of machine learning and artificial intelligence it enables us to tell the story of pro cycling like never before.
    But in order for us to provide seamless access to the information Race Centre requires that the team have transparent view of the user experience.

    Join Dimension Data and Riverbed to find out how we’re using a high-performance platform to delivers superior experiences with quick access to data with 100% accuracy and no blind spots.
  • Automating AI in the Data-Driven Enterprise Webinar
    Automating AI in the Data-Driven Enterprise Webinar
    Andrew Brust, Kurt Muehmel Jun 25 2019 2:00 pm UTC 60 mins
    Artificial intelligence (AI) and machine learning (ML) are exciting, growing in adoption and more applicable to business contexts than ever before. The problem is, a lot of AI/ML work to date has relied upon rare and expensive data scientists. These practitioners take data sets, then experiment with different frameworks, algorithms and parameter values to create the best predictive models possible. This bespoke approach can be fascinating, but it just won’t scale sufficiently to bring AI and ML into the Enterprise mainstream.

    Why perpetuate an AI process that is so manual when heuristics – and even ML itself – can help automate data cleansing, algorithm selection and parameter tuning? Yes, AI automation can help organizations without data scientists do AI and ML. But beyond that, even orgs with strong data science teams can use AI automation to remove tedium from, and increase accuracy in, their work. It’s win-win, even if it removes some of AI’s mystique.

    Want to learn more about automating AI, and making it actionable and accessible to all your data workers? Join us for this free 1-hour webinar from GigaOm Research. The webinar features GigaOm analyst Andrew Brust with Kurt Muehmel, VP of Sales Engineering at Dataiku, a leader in AI for the Enterprise.

    In this 1-hour webinar, you will discover:

    Why bespoke AI work is fast becoming unsustainable
    The science and power behind automated machine learning (AutoML)
    How to leverage AI automation while combating bias, drift and other AI/ML pitfalls
    Register now to join GigaOm Research and Dataiku for this free expert webinar.
  • So integrieren Sie Ihre Reisekosten einfach in Ihr ERP
    So integrieren Sie Ihre Reisekosten einfach in Ihr ERP
    Benjamin Tattermusch (SAP Concur), Armin Friemelt (Integration Expert, Platinum Engineering Concur, SAP) Jun 25 2019 2:00 pm UTC 37 mins
    Die Integration der Reisekosten in das Finanzsystem ist wichtig für die Transparenz. Erfahren Sie in diesem Webinar alles über das einmalige Aufsetzen der Integration von SAP Concur in das SAP ERP in vier einfachen Schritten (Live Demo), und den sicheren, automatisierten Datentransfer zwischen Concur und SAP.

    Sie wollen zu Travel & Expense Management auf dem Laufenden bleiben? Dann registrieren Sie sich jetzt für den News-Service von SAP Concur: https://bit.ly/2GZRZba
  • BEC attack methods, and how to stop them
    BEC attack methods, and how to stop them
    Corie Chung, Chief Strategy Officer - Perception Point; Benny Reich, VP Products - Perception Point Jun 25 2019 2:00 pm UTC 30 mins
    If you're in email security, you probably know that BEC is something to be worried about. It's very hard to detect and plays very well on human vulnerabilities. But do you really understand how this attack works? Did you know that BEC isn't just social-engineering but also relies on payload-based attacks? Did you know real-time prevention (and not detection) of BEC attacks is possible with the right techniques?

    Join our Chief Strategy Officer and VP Products to learn more about:
    1. What BEC really means
    2. How BEC attackers think and how they work their way into your organization
    3. Real-life examples of BEC attacks
    4. How you can better protect your company
  • Accelerate Your Business with a DevOps Approach to the Cloud
    Accelerate Your Business with a DevOps Approach to the Cloud
    Nigel Kersten, Chief Tech Strategist, Puppet and Steve Francis, Founder and Chief Evangelist, LogicMonitor Jun 25 2019 3:00 pm UTC 55 mins
    The cloud allows your organization to deliver more value to customers faster. In order to execute a successful cloud strategy, organizations have adopted a DevOps approach.

    Join this webcast watch this webcast, hosted by Puppet Labs and LogicMonitor, to:

    - Learn what should and shouldn’t be migrated to the cloud

    - Learn why having strong configuration management along the way is
    ideal

    - Gain valuable insights and tips on how to increase your IT agility

    - Understand what steps you can take to enhance the DevOps culture
    within your organization