Hi [[ session.user.profile.firstName ]]

Information Technology

  • Using BDD to Test a Robotic Process Automation Solution | Quality Jam London
    Using BDD to Test a Robotic Process Automation Solution | Quality Jam London
    Mario Matthee, SQA Architecture and R&D, DVT Global Testing Solutions Recorded: Apr 25 2019 41 mins
    In this session, Mario Matthee shares insights into a real life project that was completed by DVT. DVT’s testers were responsible for the testing of a new investment bot, and in the process we faced many challenges: distributed teams, being too agile, red tape (banks have plenty of this), complex financial models, ever-changing requirements and more.

    Mathee shares the story of how his team took DVT’s first bot live using behavior-driven development methodology and a mixture of manual and automated testing. You will learn that BDD is not as scary as it is made out to be, that there is a place for manual testers in BDD, that you can be agile and still work in your own way.
  • Business Intelligence & Analytics Community Update
    Business Intelligence & Analytics Community Update
    Erin Junio, BI & Analytics Content Strategist, BrightTALK Recorded: Apr 24 2019 16 mins
    Find out what's trending in BrightTALK's BI & Analytics community and what BI audiences care about in 2019!

    Join Erin Junio, BI & Analytics Content Strategist at BrightTALK for a session to learn more about:

    - Topic Trends & Key Insights
    - What BI & Analytics Professionals Care About
    - Events in the Community
    - What to expect in Q2 2019 and beyond
  • IT Service Management Community Update
    IT Service Management Community Update
    Harriet Jamieson, BrightTALK and Elisabeth Thomas, Launch Product Marketing Recorded: Apr 24 2019 19 mins
    Join BrightTALK's Harriet Jamieson and Launch Product Marketing's Elisabeth Thomas as they review the latest developments in IT Service Management.

    From automation to ITIL 4, Harriet and Elisabeth will be covering where ITSM is headed in the coming months.
  • Accelerate Your Innovation Journey By Leveraging Containers
    Accelerate Your Innovation Journey By Leveraging Containers
    Dave Bartoletti, Vice President and Principal Analyst, Forrester Research Recorded: Apr 24 2019 47 mins
    Accelerate your innovation journey using containers.

    Firms have become more comfortable with containers in the last 3 years and container usage is expected to continue to grow. With growth comes more sophisticated requirements. Containers support configuration management and continuous integration/continuous delivery (CI/CD) processes by offering improved flexibility, performance, and security. Open source software has been key in unlocking container and container platform innovation. Firms have learned to use and contribute to open source to reap the rewards of communities.

    In this webinar, Forrester research analyst Dave Bartoletti will share new insights from a March 2018 study into how organizations are using containers, container platforms, and open source to quicken adoption of more enterprise apps. He'll cover:

    How container usage has improved in recent years.
    What the future of containers and container platforms looks like.
    Navigating the performance and security challenges of containers and container platforms.
    How containers can improve customer experience and lower costs.
    How open source can accelerate innovation in your organization.
  • Protect Financial Customers From Fraud and Fakes
    Protect Financial Customers From Fraud and Fakes
    Zack Allen, Director of Threat Operations, ZeroFOX and Ryan Trost, Chief Technology Officer, ThreatQuotient Recorded: Apr 24 2019 41 mins
    How to identify and mitigate social media and digital risk

    Financial service organizations have a massive footprint and attack surface on social media & external digital platforms — all of which is ungoverned, unmonitored and unprotected by the existing security perimeter. Understanding the threats on these platforms is critical, from financial fraud, phishing and malware spread on social media, customer scams, impersonating accounts and mobile apps, and more. Join ZeroFOX and ThreatQuotient to learn the top risks facing financial institutions on social and digital channels and key tactics for addressing those risks.

    Key Takeaways:

    -Understand top trends and threats facing financial institutions on social and digital channels
    -Gain knowledge of key tactics for addressing social and digital threats
    -Learn about the tools available to your organization for mitigating risk
  • The Bots are coming! Overview of Virtual Agents & How They Modernize Support
    The Bots are coming! Overview of Virtual Agents & How They Modernize Support
    Rich Graves, Director of Product Management at Serviceaide Recorded: Apr 24 2019 61 mins
    Are the machines out to get you? Are they going to replace you and your colleagues? The short answer is "No", but they have the potential to change how you do your job. This primer will enable you to be informed about these changes and proactive in making your job more productive and enjoyable.

    This presentation will dive into how components of artificial intelligence are being used to create modern conversational support experiences today. Learn about the differences between chatbots and virtual agents, discuss scenarios where virtual agents excel, and how virtual agents can improve key support metrics such as MTTR and customer satisfaction.
  • Survey Says: It’s Time to Reimagine Quality Management!
    Survey Says: It’s Time to Reimagine Quality Management!
    Fancy Mills (ICMI); Lauren Maschio (NICE Nexidia); Erica Marois (Moderator) Recorded: Apr 24 2019 62 mins
    According to new ICMI research, only 16% of contact center leaders strongly agreed that their QA program was setting them up for success. Are you part of the 84% that aren’t completely sold on your QA program? If so, mark your calendar! Join us on April 24 to get an exclusive first look at the soon-to-be-released results from our recent quality management and analytics study. Whether you’re looking to benchmark your current practices against your peers, or seeking ways to refine your approach to analytics and quality management, you don’t want to miss this!

    During this webinar, you will learn:
    - What ICMI’s research reveals about the current state of quality management and analytics in the contact center
    - How contact center leaders feel about the impact and influence of quality management on their organizations
    - How you can leverage predictive analytics to take your quality to the next level

    Join us for an interactive and informative hour, complete with live audience Q&A.
  • Understanding the Business Value of a Modern WAN Architecture (SD-WAN)
    Understanding the Business Value of a Modern WAN Architecture (SD-WAN)
    Bob Laliberte, Senior Analyst at ESG Inc. Recorded: Apr 24 2019 56 mins
    For many organizations, the wide area network (WAN) infrastructure that connects an enterprise’s remote and branch offices has not changed for decades. However, as application are rapidly moving to the cloud ( SaaS and IaaS), the WAN needs to evolve in response.

    Bob Laliberte, Senior Analyst with ESG, Inc., will explore the challenges many organizations face with legacy WAN environments, illustrate why a new solution is needed and highlight the business value of rearchitecting with SD-WAN. This will include reviewing customer examples and a TCO model to demonstrate the value to your business. Organizations will learn how SD-WAN provides a combination of pure economic benefits as well as agility and flexibility to help organizations be successful.
  • Minimizing FCPA Risk Through Invoice And Contract Monitoring
    Minimizing FCPA Risk Through Invoice And Contract Monitoring
    Mike Koehler Recorded: Apr 24 2019 48 mins
    Violations of the Foreign Corrupt Practices Act and other similar laws occur when money or other things of value are provided, directly or indirectly, to foreign officials to obtain or retain business.

    Often times the money needed for a bribery scheme is generated internally within a company by culpable employees, working with culpable third parties, through false invoices and other contracting schemes.

    This frequent aspect of FCPA enforcement will be the focus of an engaging webinar presented by FCPA expert Professor Mike Koehler. During the webinar, participants will learn of false invoicing and contracting schemes alleged in recent enforcement actions as well as invoice and contract monitoring practices designed to minimize FCPA risk.
  • How Pivotal Training and Certification Can Make a Difference for You
    How Pivotal Training and Certification Can Make a Difference for You
    Tyson Gern, Director, Pivotal Education & Dylan Ham, Lead, Pivotal Education Recorded: Apr 24 2019 32 mins
    Pivotal Education enables you to continuously deliver business value in a rapidly evolving market by providing the modern software expertise you need to excel in a cloud-native world.

    In this webinar, we will discuss the breadth of training, certification and the Platform Acceleration Lab (PAL) options available for Spring and Cloud Foundry developers, architects, and operators.

    We'll also show you how Pivotal Education makes it easy create a custom Spring or Cloud Foundry training plan specific to your learning needs and schedule, using in-person and online content and tools.
  • See What Phishing Threats You’re Missing--Live Demo
    See What Phishing Threats You’re Missing--Live Demo
    Mark McDaniel, Senior Director of Technical Services at SlashNext, Inc. Recorded: Apr 24 2019 29 mins
    SlashNext Real-Time Phishing Threat Intelligence Live Demo

    Threat intelligence that covers new types of phishing threats is essential for understanding and defending against previously unknown zero-hour threats.

    During this 30-minute demo you’ll see:

    Slashnext’s behavioral analysis approach that leverages our Session Emulation and Environment Reconnaissance™ (SEER) threat detection technology.

    Real-time threat intelligence covering five major phishing categories: credential stealing, scareware, rogue software, phishing exploits, social engineering scams, phishing callback C2s

    Real-Time Phishing Threat Intelligence that is more automated by evaluating many more characteristics of the site, so it’s able to render a definitive verdict, malicious or benign.

    A continuously updated list of zero-hour phishing URLs, Domains, IPs that can be used for blocking purposes
  • Fight the good fight against the bad bots!
    Fight the good fight against the bad bots!
    Brian McHenry and Graham Alderson Recorded: Apr 24 2019 35 mins
    Distinguishing between good bots, bad bots, and humans is a major challenge. Today, over 50% of online traffic is generated by bots and they are involved in nearly every attack. Identifying malicious bots and safeguarding against them is now a top priority for organisations developing a sustainable security strategy.

    Join us for this webinar to learn:
    - How bots infect, propagate, and attack applications
    - What types of application attacks are commonly performed by bots
    - How you can defend against bad bots without disrupting the good ones
  • Ep. 3 See The Trace? Discover Errors, Latency & More across Distributed Systems
    Ep. 3 See The Trace? Discover Errors, Latency & More across Distributed Systems
    Molly Stamos, Customer Success Engineer and Ben Hartshorne, Senior Engineer Recorded: Apr 24 2019 61 mins
    Distributed systems bring complexity for developer and ops teams. When incidents occur in production, expected and unexpected, you want to pinpoint which part of the service is giving problems. Distributed tracing illuminates distributed systems, making your logs easier to navigate. Quickly identify where there are errors or latency in your code or service, even within 3rd party services you use. Instrumentation is the key to the best tracing experience possible.

    This session is live @10am PDT April 24. We will dive into the importance of tracing when debugging, and show how Honeycomb Beelines fast-track instrumenting code. You will learn:

    * The importance of tracing when debugging production along with other types of analysis
    * how to debug by analyzing patterns and trends in the data generated by traces
    * how to work with OpenCensus or OpenTracing (yes you can with Honeycomb).

    Join this exciting session and discover the value of tracing. Spoiler: it's easier than you may think.
  • 3rd-party Database Visibility in GCP with Deep Telemetry in Stackdriver
    3rd-party Database Visibility in GCP with Deep Telemetry in Stackdriver
    Cameron Jones Recorded: Apr 24 2019 46 mins
    Persistent data management is challenging, especially for companies experiencing fast growth or volatility in data proliferation. Performance telemetry is vital for operating databases like PostgreSQL, Oracle, and SAP HANA. Viewing third-party database telemetry in the context of a full Google Cloud environment allows you to understand impact and relationships. Attendees will learn how to use Stackdriver to monitor third-party databases along with Google Cloud resources at a depth that allows them to tune database performance and solve application problems more quickly.
  • IT Security Community Update
    IT Security Community Update
    Wesley Simpson, (ISC)²; Christopher Pierson, BLACKCLOAK & Marija Atanasova, BrightTALK Recorded: Apr 24 2019 63 mins
    Find out what's trending in BrightTALK's IT Security community and the challenges keeping security professionals up at night.

    Join Wesley Simpson, COO of (ISC)², Dr. Christopher Pierson, Founder & CEO of BLACKCLOAK and Marija Atanasova, Sr. Content Strategist from BrightTALK for an interactive Q&A session to learn more about:
    - Topic trends & key insights
    - What security professionals care about
    - Events in the community
    - What to expect in Q2 2019 and beyond
  • Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Brandon Cooper, Sales Support Engineer Recorded: Apr 24 2019 25 mins
    Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

Sign up to test drive CMD+CTRL!
  • Get to "Why" Faster with AI-Driven Analytics
    Get to "Why" Faster with AI-Driven Analytics
    Sanjay Agrawal, Co-Founder & VP of Engineering & Sean Zinsmeister, Head of Product Marketing, ThoughtSpot Recorded: Apr 24 2019 62 mins
    For years, analytics vendors have helped enterprises understand what’s happening in their business, yet often failed at answering the more valuable question of why it’s happening.

    Everyone expects to have data to understand what’s happening it their business. When it comes to understanding why that’s happening, it’s a completely different story. People don’t even know what questions to ask to begin answering that question, slowing down decisions and stifling business growth.

    With AI-driven analytics, that’s all about to change. SpotIQ, the AI engine from ThoughtSpot, asks thousands of questions and automatically shares relevant, customized insights buried in your data. Business users can get to the heart of why changes are happening to make decisions with confidence.
  • Making Continuous Security in Applications a Reality
    Making Continuous Security in Applications a Reality
    Aaron Weaver - Application Security Architect, OWASP and DefectDojo Recorded: Apr 24 2019 43 mins
    You’ve probably heard many talks about DevSecOps and continuous security testing but how many provided the tools needed to actually start that testing? This talk does exactly that. It provides an overview of the open source AppSec Pipeline tool which has been used in real-world companies to do real security work. Beyond a stand-alone tool, the OWASP AppSec Pipeline provides numerous docker containers ready to automate, a specification to customize with the ability to create your own implementation and references to get you started.

    The talk will also cover how to add an AppSec Pipeline to your team’s arsenal and provide example templates of how best to run the automated tools provided. Finally, we’ll briefly cover using OWASP Defect Dojo to store and curate the issues found by your AppSec Pipeline. The goal of this talk is to share the field-tested methods of Aaron Weaver - If you want to start your DevSecOps journey by continuously testing rather then hear about it, this talk is for you.
  • Cloud Migration: Opportunities and Risks for the Business Unit
    Cloud Migration: Opportunities and Risks for the Business Unit
    John Armstrong, Head of Product Marketing Recorded: Apr 24 2019 31 mins
    The business case for cloud migration is compelling: cost reductions, ease of growth and
    expansion, outsourcing of infrastructure and maintenance, and improved access to the latest
    technologies. However, many organizations that are migrating to the cloud focus on technical factors and overlook the broader business implications of their projects. As a best practice, assessing the opportunities and risks for the organization should be a joint effort led by the IT and business unit teams. At the highest level, a business justification focuses on the return on investment (ROI) associated with a proposed technical change. However, many supporting data points are required to populate the formula and achieve a realistic calculation.

    In this webinar, we will address these and other critical questions:

    What are the key business expectations associated with a cloud migration?
    What are the implications if the cloud migration doesn’t go as planned?
    What business considerations should be included in any cloud migration plan?

    And always, this webinar will be followed by a short Q and A session with the audience. Please join us!
  • Strategic Cybersecurity Transformation: Why Now, Why People-Centric
    Strategic Cybersecurity Transformation: Why Now, Why People-Centric
    Jinan Budge, Principal Analyst Security & Risk, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint Recorded: Apr 24 2019 66 mins
    Why is cybersecurity transformation critical right now, and what are the most effective frameworks for organizing change?

    Join guest Forrester speaker Jinan Budge and Proofpoint for an interactive discussion of the biggest challenges that today's CISOs face, and why a people-centric approach to security is necessary in today’s threat landscape.

    You'll learn:
    · How business transformation like the rise of Office 365 has driven cybersecurity transformation
    · Why you should pivot your transformation around people and culture, rather than infrastructure
    · 6 principles for successful cybersecurity transformation
  • Why Container Security Has Become a Top Challenge for Enterprises
    Why Container Security Has Become a Top Challenge for Enterprises
    Rani Osnat, Aqua Security and Mark Bouchard, CyberEdge Recorded: Apr 24 2019 53 mins
    A joint presentation by Aqua Security and CyberEdge

    Based on findings published in CyberEdge’s 6th annual 2019 Cyberthreat Defense Report*, containers are highlighted as one of this year’s “weakest links” in IT security given the lowest overall security posture score.

    Mostly this can be attributed to the challenges enterprises face as they transition their containerized applications from the Dev/Test environment into production. Containers require a new approach to security as the traditional security infrastructure is not applicable to cloud native and serverless deployments. Rather they must leverage the cloud-native principles of immutability, microservices and portability using machine-learned behavioral whitelisting, integrity controls and nano-segmentation.

    We will discuss :
    •Key findings from the 2019 Cyberthreat Defense Report
    •The unique security challenges (and benefits) of containers
    •What leading enterprises are doing to automate their container security
    •What you should look for in a container security solution
  • Discovery Isn’t Just for Litigation Anymore
    Discovery Isn’t Just for Litigation Anymore
    Doug Austin and Tom O'Connor Recorded: Apr 24 2019 65 mins
    In today’s era of growing data privacy concerns with GDPR and CCPA, increase in harassment claims with #MeToo and rising corporate malfeasance concerns, there are a lot of potential compliance and investigations needs with regard to discovery that organizations have today whether or not they ever lead to litigation. This CLE-approved webcast* will discuss the drivers and challenges facing organizations today to be more proactive in understanding their data to identify issues before they lead to litigation and address them proactively. Topics include:

    + Timeframes to Act After the Case is Filed
    + Challenges Posed by BIG Data and Variety of Data Sources
    + Data Privacy Trends and Challenges
    + Challenges from #metoo and Corporate Malfeasance
    + Key Stats and Challenges Regarding Data Breaches
    + Will Information Governance Bail Us Out of This Mess?
    + Data Discovery vs. Legal Discovery
    + Where the Technology is Heading
    + Recommendations for Addressing Data Discovery Challenges

    Presentation Leaders:

    Doug Austin is the Vice President of Products and Services for CloudNine. Doug has over 30 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which is a trusted resource for eDiscovery news and analysis, and has received a JD Supra Readers Choice Award as the Top eDiscovery Author each year since 2017.

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • How to Enable Secure Access to Cloud Apps with DNS Visibility and Single Sign on
    How to Enable Secure Access to Cloud Apps with DNS Visibility and Single Sign on
    Omar Zarabi - CEO and founder of Port53 Technologies, Nathan Chan - Sr SE at OneLogin Recorded: Apr 24 2019 39 mins
    Companies are moving to the cloud to compete more effectively and employees are using an increasing number of SaaS cloud applications. Unfortunately, these apps come with hidden risks and vulnerabilities when IT is not involved in securing and managing them. This issue is known as Shadow IT.

    The good news is that, as serious as the Shadow IT is, it’s a solvable problem. By joining this webinar, you will learn:
    - Measure the scope and risk of the Shadow IT within your business
    - Gain back full control of your cybersecurity
    - Bring visibility into corporate cloud application usage
    - Get data driven recommendations no matter if your IT team is big or small

    We will be showing a live demo of Cloud Risk Assessment Tool and walk you through a real customer case study.

    So, join our two cloud security experts, Omar Zarabi CEO & Founder of Port53 Technologies, and Nathan Chan Sr SE at OneLogin on April 24th 10am PT for this webinar.

    Can’t make it to the webinar? Register anyway, and we’ll send you a link to the on-demand recording once available.
  • Secrets of Fintech Startup Success: A Formula for Disruption
    Secrets of Fintech Startup Success: A Formula for Disruption
    Yodlee Recorded: Apr 24 2019 60 mins
    Every founder starts with a big idea, but only 1 out of 10 see their idea succeed. So what’s the difference between the fintech startups that get off the ground and those that don’t make it out of the gate? What are the secrets of the startups that disrupt entire industries? This is your chance to find out how founders and VCs look at creating successful startups first-hand.

    Our panel of industry experts will cover a range of topics, from getting started building your team, to the importance of finding an impactful mentor, and more. They’ll also answer questions from future startup founders in a Q&A. It’s everything you need to travel the path from big idea to successful startup.

    Register for the webinar to discover:

    • What successful fintech startups have in common
    • The differences between being a solopreneur vs. being a co-founder
    • Tips for finding and growing your dream team
    • How to go from killer idea to disruptive startup


    Speakers:

    • Evan Schuman, Moderator, VB
    • Jeff Cain, Senior Director, Envestnet | Yodlee Incubator, Envestnet | Yodlee
    • Pierre Wolff, SVP Business Development, InCountry
    • Ken Kruszka, CEO, SnapCheck
    • Kathleen Utecht, Managing Partner, Core Innovation Capital
  • Office Depot’s Agile Transformation | Quality Jam London
    Office Depot’s Agile Transformation | Quality Jam London
    Mikey Warner, Director of QA, Office Depot - Europe Apr 25 2019 4:00 am UTC 20 mins
    Join us as we explore Office Depot’s journey from a legacy waterfall delivery organization to agile, via the use of agile principles and empowerment and a modern toolset that includes qTest for test management. In this session, Office Depot Europe’s Director of QA Mikey Warner shares how he drove process improvement, transformation and change across the global organization.
  • Eliminate Cloud Compliance Bottlenecks: How to Automate IaaS Security Monitoring
    Eliminate Cloud Compliance Bottlenecks: How to Automate IaaS Security Monitoring
    Anand Visvanathan, Director of Product Management, Symantec and Linda Park, Sr. Manager IaaS, Security & Compliance, Symantec Apr 25 2019 5:00 am UTC 45 mins
    Cloud computing enables companies to be more agile and squeeze the inefficiencies out of the development cycle, such as procuring compute resources on demand rather than waiting for IT. But as companies move fast to deliver new products, security must move faster to keep up with new regulations and threats – or risk slowing down the business.

    Cloud configuration errors can lead to gaping holes in cloud infrastructure deployments and present low hanging fruit for hackers. Security and DevOps teams need a proactive, automated approach to monitoring and securing their cloud management plane.

    Join us for this informative webinar on how to achieve security compliance for public cloud Infrastructure-as-a-Service (IaaS) platforms such as AWS and Microsoft Azure.

    During this webinar, you'll learn:

    • Why traditional security monitoring tools cannot provide visibility into cloud compliance risks

    • Why Security and DevOps teams need automated cloud security
    posture management (CSPM) tools to remove compliance bottlenecks

    • How to migrate your legacy infrastructure to the cloud without compromising security and compliance

    Please Join Us, Register Today
  • 「ゼロトラスト」のホントのところ~騙される前に全容を知っておく~
    「ゼロトラスト」のホントのところ~騙される前に全容を知っておく~
    髙岡 隆佳, エバンジェリスト 株式会社シマンテック Apr 25 2019 6:00 am UTC 60 mins
    騙される前に全容を理解しておこ

    最近よく耳にする「ゼロトラスト」。トラスト(信用)=0(存在しない)、では一体何を信じればいいのでしょう?信用のない前提のセキュリティとは?ユーザ側の混乱を無視し、セキュリティ業界はゼロトラスト推しで持論を展開しています。
    当ウェビナーでは、今ここでゼロトラストの歴史を振り返り、ゼロトラストの本来の意味やフレームワークを理解し、今なぜゼロトラストが必要なのかを解説します。ぜひご参加ください。
  • Автоматизация статического тестирования безопасности кода в CI
    Автоматизация статического тестирования безопасности кода в CI
    Валерий Куваев, технический эксперт по решениям управления жизненным циклом ПО, Micro Focus в России Apr 25 2019 8:00 am UTC 90 mins
    В рамках вебинара будут рассморенны практические аспекты интеграции сканера безопасности исходного кода Fortify в процесс непрерывной сборки.
  • Status związku: "To nieskomplikowane" czyli proste i zoptymalizowane licencjonow
    Status związku: "To nieskomplikowane" czyli proste i zoptymalizowane licencjonow
    Piotr Łukasiewicz, System Engineer, Commvault Apr 25 2019 8:00 am UTC 75 mins
    Licencjonowanie Commvault Data Platform nigdy nie było jeszcze tak uproszczone - dowiedz się, jak łatwo dobrać licencje w sposób optymalny dla swojej infrastruktury. Aplikacje, wirtualizacja czy endpointy - Commvault Complete to kompletna recepta na bezpieczeństwo!
  • News von der SUSECON
    News von der SUSECON
    Jörg Bunse, SUSE Linux GmbH Apr 25 2019 8:00 am UTC 60 mins
    Unter dem Motto „My kind of open" fand die SUSECON vom 1. bis 5. April 2019 statt. Sie hatten nicht die Möglichkeit, zur SUSECON nach Nashville zu reisen und möchten Ihr Wissen auf den neuesten Stand bringen?

    In unserem Webinar präsentieren wir Ihnen alle wichtigen Produktankündigungen und Neuigkeiten von der SUSECON.
  • Основные обновления в линии продуктов Dell Latitude
    Основные обновления в линии продуктов Dell Latitude
    Артур Антонов, продукт-менеджер по клиентским решениям Dell Apr 25 2019 8:00 am UTC 60 mins
    •Персональные компьютеры Dell OptiPlex.
    •Обновленная линейка Dell Latitude.
    •Дисплеи, док-станции.
  • Introduction to Managed SD-WAN
    Introduction to Managed SD-WAN
    Ashwath Nagaraj (Founder & CTO, Aryaka) Apr 25 2019 9:00 am UTC 47 mins
    As the hype cycle around SD-WAN reduces and enterprises continue to deploy hundreds of boxes across different sites, scalability is emerging as the primary challenge for growing global organizations. Network managers have to juggle multiple vendors while managing configuration, patches and security loopholes, complicating and slowing down SD-WAN adoption. Managed SD-WAN solutions are growing rapidly, but not all vendors are created equal. Some vendors offer cloud, but don’t own the network. Other service providers offer managed WANs, and yet others offer professional management. How do you differentiate between the options and pick the right managed SD-WAN for your organization?

    In this webinar you will join industry experts to learn:

    - Fundamental building blocks of a managed SD-WAN architecture
    - Pros and cons for each of the different management and operational models
    - Total cost of ownership (TCO) benefits of a 100% managed SD-WAN for a global deployment
  • Taking the Oh out of IoT
    Taking the Oh out of IoT
    Richard Leadbetter, Technical Sales Specialist, EMEA Apr 25 2019 9:00 am UTC 30 mins
    By 2019, 92% of industrial organizations will have adopted Internet of Things (IoT) technology and 77% believe it will transform manufacturing. But, how are business executives using IoT today and what do they expect from it in the future? Join us and find out
  • Live Demo: Email Fraud Defense
    Live Demo: Email Fraud Defense
    Ash Valeski, Director Product Management, Proofpoint Apr 25 2019 9:00 am UTC 30 mins
    Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses.

    Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

    Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to:

    •Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People

    •Monitor all inbound impostor threats from your domains and those of third parties

    •Accurately distinguish between legitimate emails and fraudulent emails
  • AWS Webinar: Why should you use Kubernetes Containers, and how to run them?
    AWS Webinar: Why should you use Kubernetes Containers, and how to run them?
    Steve Drew and Sriram Rajan Apr 25 2019 9:00 am UTC 60 mins
    Kubernetes Containers can help modernise applications which is especially important for businesses. Using them means you can deploy code in small batches allowing your development teams to release software quickly increasing agility. But running large and stable clusters of Containers presents its own challenges.

    Join Rackspace Principal Architect, Sriram Rajan and AWS Specialist Architect, Steve Drew on 25th April at 10am as they explain:

    • How to adopt a microservices architecture using Containers
    • The benefits and architectural recommendations for using Kubernetes on AWS
    • An end to end approach to adopting Kubernetes from architecture to operations

    A well-thought out strategy leads to success and we’ll explain exactly what a Kubernetes Containers strategy looks like.

    A $100 credit voucher allowing you to test the AWS platform for a few hours will be available for all attendees that fill in our email survey. Please be aware that promo codes will be distributed only to verified company email addresses in EMEA, after completing the survey. The survey will be shared to all verified attendees following the webinar.

    We’re an AWS-audited Managed Service Partner with 1,000+ certifications and an AWS Premier Consulting Partner and have all the expertise you’ll ever need.

    Be strategic by booking now.
  • 5 Steps to Delivering Many Sites, Lowering Costs, and Improving Governance
    5 Steps to Delivering Many Sites, Lowering Costs, and Improving Governance
    Jenni Lee, Product Marketing Manager, Acquia Apr 25 2019 10:00 am UTC 28 mins
    In this webinar, we will cover the following topics:

    - How to transform your IT digital team from a “bottleneck” to a trusted service provider
    - How to implement a site-governance strategy across your organization
    - Best practices for expediting website development and delivery
  • A Journey into Open Development with Lloyds Banking Group
    A Journey into Open Development with Lloyds Banking Group
    James McLeod, Software Engineering Lead, Lloyds Banking Group Apr 25 2019 10:00 am UTC 30 mins
    Lloyds Banking Group is a financial services group with millions of customers and a presence in nearly every UK community, both online and on the local high street. With more than one million businesses serviced through their brands, the hopes for creating the bank of the future is firmly locked in the sights of this digitally transforming organization.

    In order to hit their ambitious goal, Lloyds Banking Group is changing from a traditionally introverted bank, hardened to risk through years of manual process, into an open and collaborative organization where innovation and experimentation are driven by engineering and automation.

    During this talk you’ll learn how Lloyds Banking Group journeyed into Inner Source with the formation of engineering guilds and how this lead to the adoption of GitHub Enterprise from proof of concept to widespread use. We’ll also explore how engineering guilds formed the GitHub Enterprise Working Group to share successes and educate on best practices, while safeguarding the operation of their engineering community.

    Finally, we’ll tell the story of how Lloyds Banking Group is moving fast toward Open Source, powered by the determination and ambition of Lloyds Engineering and the Lloyds Banking Group Open Source Mission.

    About the speaker:
    James McLeod is a passionate Software Engineer with a belief in open collaboration and a drive for growing engineering communities.

    James’ role as Software Engineering Lead at Lloyds Banking Group focuses on guiding the engineering community, listening to feedback, and removing barriers through leading and advocating for Lloyds engineering guilds and Inner Source collaboration.

    His energy and passion goes beyond the workplace where James is the founder of ‘React London–Bring Your Own Project’ – a rapidly growing London meetup, with over 1300 active members.
  • Advanced Threat Mitigation | Solving the Major Enterprise Challenges
    Advanced Threat Mitigation | Solving the Major Enterprise Challenges
    Jibril Hassan | Executive Pre-Sales Manager | Kaspersky Lab Apr 25 2019 10:00 am UTC 47 mins
    KTMD - A Corporate Cybersecurity Strategy to meet digital disruption challenges

    Join our technical team in our first session to explore the dedicated features that gives Kaspersky Threat Management and Defense an edge.
    Learn:
    - how KTMD exposes advanced attacks with precision machine learning and behavioral analytics, plus how it minimizes false positives to help ensure high levels of productivity for security teams, powered by the Kaspersky Security Network (KSN).
    - discover what the Threats Landscape actually looks like
    - what challenges Enterprises have today and explore how to mitigate against Advanced Threats whilst protecting against Complex Threats

    At the end of the session you'll learn how to effectively PREVENT the threats, Rapidly DETECT the breach and RESPOND to incidents with our Multi-dimensional Advanced Threat Detection with Machine Learning.
  • Cybersecurity in Financial Services: No one can afford a cyber attack
    Cybersecurity in Financial Services: No one can afford a cyber attack
    Dan Pitman, Principal Security Architect Apr 25 2019 10:00 am UTC 60 mins
    Financial organisations fall victim to cyber-attacks more frequently than any other industries. The growth in volume and sophistication of cyber-threats, combined with regulatory changes, mean that financial institutions are having to improve their IT security postures notably.

    Facing modern cyber-threats head-on requires organisations to follow well-defined processes and mature IT security tools that need to be closely monitored and managed. Additionally, financial businesses handle highly confidential data that must be stored in a compliant manner and managed securely. A seamless combination of platform, threat intelligence, and expert services can provide a simpler, most cost-effective approach to security for all infrastructure and workloads across physical, virtual and cloud environments.

    Get the inside scoop on a new approach to threat management that gives financial organisations the right level of coverage for the right resources. Join our Principal Security Architect, Dan Pitman, to learn more about this more effective approach to cybersecurity and threat management in the financial world.

    Highlights Include:
    • The state of cybersecurity at financial institutions
    • Integrating security and compliance within Financial Services
    • Understand how today’s vulnerabilities are being exploited
    • Find out how to achieve the right level of leverage for the optimal level of investment
  • Turbo Charge your Power BI Dashboards
    Turbo Charge your Power BI Dashboards
    Andrei Stefan Apr 25 2019 10:00 am UTC 42 mins
    Using Dynamics 365 with Power BI? Frustrated by slow query response times? Struggling to report against transactional data?

    If so, don’t miss our next webinar: “Turbo Charge your Power BI Dashboards with Atlas”.
    During this webinar, our solutions specialist will show you how Atlas for Dynamics:

    •Provides live, record level reporting against D365 data with access to 45+ additional transactional data entities – opening up a whole new world for Power BI
    •Massively speeds up D365 query response time with incremental caching – see how queries that took hours now refresh in seconds … delivering snappy Power BI visualizations that keep your business users happy
    •Combine multiple data sources to create Power BI dashboards that span D365 and on-premise legacy data
    •Improve your financial and operational reporting with real-time reporting in Excel with drill-down into journals, balances and sub-ledgers
    … and more!
  • Qualité des données : reprenez confiance dans vos prises de décision
    Qualité des données : reprenez confiance dans vos prises de décision
    Anass Bezzari, Senior Pre-Sales Consultant Apr 25 2019 12:30 pm UTC 60 mins
    Selon une étude de la Harvard Business Review, en moyenne 47% des nouvelles données ont, au moins, une erreur importante.

    Que vos données soient structurées, non structurées, stockées sur site ou dans le Cloud, vous devez pouvoir vous fier à leur exactitude. Vous concrétiserez leur valeur métier en veillant à ce que tous les projets et les processus importants soient alimentés en données fiables et pertinentes.

    Avec les produits de qualité et de gouvernance des données d'Informatica, vous avez la possibilité d'accroître la valeur métier en veillant à ce que tous les projets et les processus importants soient alimentés en données fiables et pertinentes.

    Participez à ce webinar jeudi 25 avril à 14h30.
  • Quoi de neuf chez Box? 
    Quoi de neuf chez Box? 
    Vincent Lieffroy, Senior Lead Engineer Apr 25 2019 12:30 pm UTC 60 mins
    Les entreprises doivent agir plus rapidement que jamais dans un monde caractérisé par une hyper-concurrence et par les attentes grandissantes des clients.
    C'est pourquoi nous avons conçu le Cloud Content Management (CCM) - une plate-forme unique pour accélérer vos processus métier, augmenter la satisfaction de vos employés et protéger vos informations les plus précieuses. Découvrez les nouveautés du cloud content management (CCM) en assistant à ce webinaire:

    - Collaboration aisée et sécurisée dans Google Docs, Sheets et Slides, grâce à notre nouvelle intégration avec G-Suite
    - Productivité permanente avec Mark for Offline - emportez vos fichiers Box avec vous lorsque vous n'êtes pas en ligne (vos modifications sont automatiquement enregistrées dans Box lorsque vous vous reconnectez)
    - Des workflows de contenus fiabilisés avec Box pour ServiceNow Integration Hub
    - Des cycles de développement d'applications accélérés avec Box Elements
  • Are e-Signatures Legal in Europe? Understanding eIDAS
    Are e-Signatures Legal in Europe? Understanding eIDAS
    John Jolliffe, Strategic Engagement, Adobe Document Cloud. Apr 25 2019 1:00 pm UTC 45 mins
    When it comes to conducting business with paperless documents, organisations have embraced electronic and digital signatures. The Electronic Identification and Trust Services Regulation (eIDAS) clarifies and simplifies the legal framework for e-signatures across Europe, but how should organisations decide which type of e-signature is appropriate to their needs? And how are new technologies helping to make electronic signatures relevant for the multi-device, highly mobile workspace of today?

    Join our webinar, to learn:

    • Why e-signatures are essential to your company's success now and in the future.
    • Which three signature types are legal under eIDAS.
    • How to select the right approach for your business.
    • Next-gen e-Signatures and The Cloud Signature Consortium.
  • Enable Instant Analytics On Azure Data Lakes
    Enable Instant Analytics On Azure Data Lakes
    Florent Voignier, Founder and Chief Technical Officer, Indexima Apr 25 2019 2:00 pm UTC 22 mins
    Every day, your business is producing new data, regardless of how many employees you have or what industry you work in.
    That data is full of valuable information that can help you better serve your customers, discover new opportunities, and take your business to the next level.
    But to realize that business value, you need the proper tools to transform that data into actionable insight.

    Best Practices to learn:
    1. Reduce query cost and increase your BI performance.
    2. Key factors to succeed with BI on the cloud.
    3. Get more from your existing data cluster.

    Demo:
    Set Up of Indexima on Azure

    Duration: 30 minutes
    Language: English
    Speaker: Florent Voignier, Co-founder and CTO – Indexima
  • New Attack Vectors: How Threats Have Changed and How to Combat Them
    New Attack Vectors: How Threats Have Changed and How to Combat Them
    Tom McNash, Senior Solutions Engineer, Cyren Apr 25 2019 2:00 pm UTC 60 mins
    In this webinar, Senior Solutions Engineer Tom McNash will review how new threat attack vectors are working, how cyber criminals are building threats in new ways today—whether for malware, phishing or denial-of-service attacks--and what security approach businesses need to be adapting to defend against these attacks. He will also explain how the profile of attackers targeting businesses is changing, and how one traditional form of defence against sophisticated attacks—the appliance sandbox—has itself become the object of attacks.
  • Deliver Azure Services from Your On-Premises Data Center
    Deliver Azure Services from Your On-Premises Data Center
    Lakshmi Kanthan, International Product Mktg, Fujitsu; Christophe Le Roux, Azure Stack Partner Lead EMEA, Microsoft Apr 25 2019 3:00 pm UTC 60 mins
    Microsoft Azure Stack enables you to deliver Azure Cloud Services from your on-premises data center, ensuring consistent service delivery across on-premises and public cloud. Fujitsu developed PRIMEFLEX for Microsoft Azure Stack which is an integrated system that includes all the hardware, software and support to simplify procurement, deployment, operation and maintenance of your Microsoft-based hybrid cloud infrastructure. Join us to learn more!
  • DigiCert Monthly Threat Briefing - April 2019
    DigiCert Monthly Threat Briefing - April 2019
    Jeff Barto and Angelique Pereira, Trust Strategists at DigiCert Apr 25 2019 3:00 pm UTC 60 mins
    Stay updated on April 2019’s news regarding the trends and threats in digital certificates including TLS, SSL and code signing, plus PKI, IoT, encryption, identity and trust.

    This month's briefing covers EV Extended Validation and OV Organization Validated certificates, Tumblr, HTTPS, eCommerce, code-signed malware-infected software updates, ACME and the IETF, US Senate bills Corporate Executive Accountability Act and Cyber Resiliency Act, the Weather Channel's ransomware attack, GDPR compliance, blockchain, cryptocurrency, Ethereum, weak passwords, weak private keys, AES, PQC post quantum cryptography, QKD quantum key distribution, IE Internet Explorer, zero day vulnerability with MHT files, Apache and nginx web servers, a suspicious uninvited Chinese guest at Mar-a-Lago, hacked Wi-Fi, Starz vs TorrentFreak, APT34 and OilRig, the Read My Lips and Lab Dookhtegan channel on Telegram, CryptoPokemon ransomware decrypter, charities, and free internet security training for citizens in Aurora, Illinois.
  • [Panel] Harnessing Knowledge: The State of Enterprise Application Security
    [Panel] Harnessing Knowledge: The State of Enterprise Application Security
    Daniel Blander, Virtual Clarity (Moderator), Joseph Feiman, CSO, WhiteHat Security & Paul Farrington, CTO, Veracode EMEA Apr 25 2019 3:00 pm UTC 60 mins
    As organizations strive to transform themselves for the digital economy, application development is moving further into the spotlight - and right behind it is application security.

    So in 2019, AppSec can make or break a business. Instead of being overwhelmed by this pressure, there are tools and processes on the market that can help your application both meet and exceed business and security demands.

    From infrastructure-as-code models to API security and DevOps, learn from this panel of global experts how to harness knowledge and accelerate application release cycles, improve security and transform your business.

    Moderator: Daniel Blander, Virtual Clarity
    Panelists:
    Joseph Feiman, Chief Strategy Officer, WhiteHat Security
    Paul Farrington, CTO, Veracode EMEA