As an IT professional, many of the problems you face are multifaceted, complex and don’t lend themselves to simple solutions. The information technology community features useful and free information technology resources. Join to browse thousands of videos and webinars on ITIL best practices, IT security strategy and more presented by leading CTOs, CIOs and other technology experts.
Facilite la gestión automatizada de los servicios y proporcione un soporte ágil en la entrega, con base en las expectativas modernas de analistas, usuarios y clientes de negocio.
Participe de este webcast y entienda cuál es el camino que estamos emprendiendo con los nuevos cambios.
Descubra aquí cómo mejorar la productividad de la fuerza de trabajo, controlar los costos y acompañar el crecimiento del negocio.
In the new world of IoT, smart cities, smart cars and home, our personal devices are more connected than ever before. Learn about predicting the future by looking at the past with insights on how to improve the world of IoT that is coming into our homes.
Wer sich mit der Frage beschäftigt, wie man ein effektives und effizientes Security Operations Center (SOC) aufbauen sollte, steht vor einer großen Herausforderung, denn neben den Investitionen der physischen Sicherheitsmaßnahmen, Hard- und Software ist besonderes Augenmerk auf die Analysten zu setzen, die hochkonzentriert – einem Mitarbeiter der Flugüberwachung ähnlich – das Geschehen beobachten und auf den „Ernstfall“ eines Angriffs vorbereitet sind.
Diese Mitarbeiter befinden sich persönlich als auch technisch kontinuierlich im "Alarmzustand", denn jede Anomalie ist für geübte IT-Sicherheitsspezialisten bereits eine potenzielle Cyberbedrohung, die es zu analysieren und abzuwehren gilt. Damit ein SOC wirksam sein kann, bedarf es eines soliden Fundaments aus:
• Schlanke Prozessabläufe und eindeutig festgelegte und vernünftige Befugnisse der Beteiligten
• Hocheffiziente und moderne Technologien und Technologiepartnerschaften mit eingespielten Eskalationsstufen
• Hochmotivierte und vertrauensvolle Mitarbeiter und vertraute Partner, die in Engpässen das eigene SOC Team unterstützen können
In diesem Seminar zum Thema SOC, wird der SOC grundlegend erläutert und diese Grundsäulen eines schlanken SOC beschrieben. Außerdem gibt das Webinar einen Ausblick darauf, was auf die Unternehmen zukommt und welche Herausforderungen die einzelnen (n>1) Phasen begleiten und welche Services man outsourcen kann.
Join us at our next Career Conversations with Women in Cyber Security session. This webinar gives WSC members the opportunity to connect with female career professionals. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?
Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!
Featured Guest: Leslie Taylor, Recruiter Lead for ICF International
Jessica Gulick, VP of the Women's Society of Cyberjutsu board will moderate discussions.
About the Speaker:
Leslie Taylor is the Recruiting Lead at ICF and Recruiting lead for their Enterprise Cyber Security Division. She is a member of Leadership Fairfax and has a master’s degree in Human Resources. She has spoken at numerous Cyber and Recruiting conferences to include Cyber Montgomery, CyberMD, and numerous Recruiting events. Leslie Taylor has more than 15 years of experience in IT, cleared, cybersecurity and military recruiting. She is an active member in several professional associations and leverages participation in a variety of IT/cyber, university/college, association and military career fairs and networking events. Leslie primarily recruits for opportunities on a national scale. She plays an integral role in recruiting for a wide range of skills and talent to include Software Developers, Network Analysts, Programmers, Cyber Specialists, Homeland Security, Emergency Management and Program Managers that provide the following services to our clients.
The rapid adoption of enterprise cloud-based solutions brings data integration as one of the greatest challenges. The challenge grows on increasingly numerous SaaS applications with lack of suitable connectors that fit your business needs. Join this webinar led by Primitive Logic team to see how data integration can be simplified for your cloud. This talk introduces the generic declarative zero-coding approach using Informatica Cloud Rest Connector as an example and illustrates its practical features, as well as best practices and hidden gems.
Moderator: Jill Reber, CEO, Primitive Logic
Panelists: JayJay Zheng, Technical Director & Eric Greenfeder, Chief Architect, Primitive Logic
At Berk-Tek, we put the customer at the heart of everything we do. This statement stands true in the TEK Center’s research and development labs. A network is only as strong as the cables used to connect it and the applications lab works to ensure that every Berk-Tek cable performs beyond your expectations. By employing industry-leading research, advanced testing procedures and sophisticated modeling for emerging technologies, the applications lab translates expanding network requirements into leading edge cabling solutions that perform beyond the standard.
Meeting the demands of everchanging IT management and security requirements means evolving both how you respond to and resolve incidents. It’s critical for organizations to adopt a scalable DevOps solution that integrates with their current monitoring systems to enable collaboration across development and operations teams, reducing the mean time to resolution.
PagerDuty works with AWS services like Amazon CloudWatch, to provide rapid incident response with rich, contextual details that allow you to analyze trends and monitor the performance of your applications and AWS environment.
The move to requiring encryption on all websites is picking up speed, with browsers starting to show UI warnings for unencrypted websites. Roughly 60% of internet page loads already "https", and the number of sites switching to encryption grows every month. This trend is helped by the availability of anonymous, free Domain Validated (DV) SSL certificates from several Certification Authorities (CAs), which include no identity information about the website owner.
While increased encryption is good for connection security and combating “man-in-the-middle” (MITM) attacks, many phishing and malware fraudsters are using DV certificates to imitate login pages for top sites such as PayPal.com, banking sites, etc. and steal user information. Unfortunately, these fake DV login pages receive a favorable green padlock “Secure” security indicator in the Chrome UI, causing some users to believe Chrome is vouching for the phishing website as safe or trustworthy.
Join Entrust Datacard's Chris Bailey and Kirk Hall as they discuss:
• The difference between DV, OV, and EV
• The issues with current browser UIs to do with certificate information
• A proposed new UI security indicator to help users and enhance security
Companies that embrace DevOps in the cloud develop apps faster, reduce overhead and can decrease downtime by 60% or even more. In this webinar, Glenn Mate, Solution Architect at 10th Magnitude & Ryan Lee, Cloud Infrastructure Engineer, 10th Magnitude will share several use cases around how to integrate your DevOps processes into Azure. They will also emphasize CALMS:
* The framework that integrates the DevOps teams
* Functions and systems within an organization around culture
* Automation, lean, metrics, and sharing.
By distilling the philosophy behind DevOps in the cloud, you’ll find automation and optimization at the core.
ADCs have largely become commoditized, and the services they provide are fairly indistinguishable from the sea of competitors on the market today. With many data center architects faced with modernizing their infrastructure, what are the considerations when transitioning applications to new automation frameworks and topologies in the cloud?
This webinar will focus on key challenges faced by the enterprise when transitioning their load balancers to the cloud.
What you will learn:
•The shift to cloud native, software and service-based offerings
•Support for new application architectures
•Operational complexities and scale at production
•Flexibility and support for hybrid topologies in transition
The updated SOP was released by the SBA last Friday.
EDR is pleased to host Part II of last week’s webcast where we’ll focus exclusively on changes to the environmental guidelines. This 20-minute webinar is a must attend for anyone originating SBA 504 or 7a loans.
Version J of SOP 50 10 5 represents the agency’s first update to its environmental guidance since 2014 (when it adopted the revised ASTM Phase I E 1527 standard). EDR’s James Haberlen will provide a timely update on what this round of changes mean to the environmental due diligence required on any loans seeking the SBA’s approval.
In this webinar, we dive deeper into analytics and talk about the advantages of data exploration and predictive modeling. We’ll also show attendees how to fine-tune the accuracy and precision of those analytic models so you can make critical decisions with confidence.
In the new enterprise network reality, boundaries have blurred: the internet is central and out of your control. A modern approach to network analytics is now more important than ever. The good news is that it’s possible to get vastly better insights from network traffic data than ever before, due to the power of cloud and big data systems. The key is to link that network traffic data and show the benefit to the broader business. In this webinar guest speaker Forrester analyst Andre Kindness and Kentik Co-founder and CEO Avi Freedman will help you understand:
- The changes in enterprise networks that make modern network analytics a must-have
- Why it’s so important to combine network data with business context
- Examples of business intelligence driven by network data in IT organizations today
- How you can gain the business advantage that modern network analytics offers
Avi Networks has launched a new intelligent web application firewall (iWAF) that performs 50X faster than legacy appliances, processing hundreds of Gbps of throughput and over a million transactions per second. As a software-only solution, iWAF operates as a centrally managed fabric across data centers, private clouds, and public clouds. Register for this webinar to learn about the unique capabilities of Avi Networks’ iWAF include:
Highest-performance web application security
● Elastic, automatic scale-out across data centers and clouds
● Scalable per-application deployments allow each mission-critical app to get its own WAF
Analytics-driven, accurate security policies
● Real-time security insights eliminate false positives
● Visual policy checks prior to enforcement
Central, simplified policy management
● Central management and automation of all distributed iWAF instances
● Point-and-click policy configurations, with pre-defined templates for OWASP Core Rule Set
2017 Forrester research revealed that 73% of online consumers cite valuing their time as the most important thing a company can do to provide excellent service. And according to ICMI’s Brad Cleveland, prompt service is one of the top ten customer expectations. The problem? Outdated, disjointed processes and systems still prevent most contact centers from delivering a truly seamless experience, and the result is often low efficiency and high frustration.
Are you looking for ways to reduce customer frustration? Join us for this complimentary webinar as we share five practical steps you can take to simplify the customer experience and drive ROI for the business.
In this webinar you will learn:
* How to train and empower agents to ease the customer experience
* Why omnichannel service impacts the whole business, not just the contact center
* How to enable better collaboration between the contact center and other departments
* How the right technology can enable a better omnichannel experience for both agents and customers
Join us for an interactive and informative hour, complete with audience Q&A.
Successful analytics and transactional systems start with proper architectural principles and considerations. This webinar will be a detailed walkthrough of all the software and hardware infrastructure below the database server. It will explain how each layer affects database workloads as well as give tools and metrics for determining optimal architectural configurations.
From this webinar you will learn:
• How to design SQL server infrastructures for optimal performance
• How the software and hardware infrastructure affect database performance
• Tools and metrics to determine appropriate hardware allocations. For example, how many CPU cores, data volumes, tempdb files or GBs of memory are needed for your workload.
• Tools and metrics to find current bottlenecks, inside and outside of the database server
• Tools and best practices for monitoring all layers
Presented by Matt Henderson, who has over two decades of experience in designing high-performance database platforms and over five years working with the latest all-flash storage technologies. He currently is the Director of Microsoft Technologies at Vexata where he helps customers optimize and scale their mission-critical databases.
Do you know what your top ten 'happy' customers look like? Would you like to find ten more just like them? Come learn how to leverage 1st & 3rd party data to map your customer journey and drive users down a path where every interaction is personalized, fun, & data-driven. No more detractors, power your Customer Experience with data!
In this webinar you will learn:
-When, why, and how to leverage 1st, 2nd, and 3rd party data
-Tips & Tricks for marketers to become more data driven when launching their campaigns
-Why all marketers needs a 360 degree customer view
Solving the most sophisticated security challenges requires an advanced approach that is built upon a proxy-based architecture. This approach allows you to leverage best of breed security technologies to provide a safe and confident cloud and network experience.
Symantec secure web gateway solutions deliver strong proxy-based security in the form factor your organization needs: on-premises appliance, virtual appliance, in the cloud, or in a unified hybrid combination of these solutions.
The solution’s unique proxy architecture allows it to effectively monitor, control, and secure traffic to ensure a safe web and cloud experience.
In this webinar learn:
• Why Proxy architecture is more important than ever as a critical security component of your network
• How a web proxy can serve as a platform for advanced threat detection and data protection
• Why pre-filtering your sandbox with proxy architecture is a smart move for both your SOC and your bottom line.
From attacks that abuse PowerShell to attacks that live exclusively in memory, “fileless” threats have become increasingly common and dangerous. They’re built to evade detection from even the most advanced defenses, but that doesn’t mean they can’t be stopped — or that they have to be difficult to understand.
Join us to learn how attackers are using fileless techniques to gain execution, persistence, and lateral movement, and what you can do to keep your company protected.
Creating a culture of cybersecurity is critical for all organizations. Join the conversation with our own security pros to learn how they keep employees ahead of phishing attacks, share best practices for phishing education and explain how to use innovative technologies to strengthen cyber resilience.
The Gartner 2017 Market Guide for Privileged Access Management (PAM) reviews 24 vendors across various categories. This comprehensive information can help you find an ideal solution for your unique business needs. Yet, selecting the right PAM solution is a pivotal decision; it is critical to weigh your options.
Make an informed decision. Join Suresh Sridharan, Director Privileged Access Management at CA Technologies, as he guides you through report recommendations, evaluates the latest tools and technologies, and compares and contrasts industry choices.
A current increasingly uncertain and complex regulatory environment has made it challenging for firms tasked with creating and maintaining a “culture of compliance”. The business demands access to new forms of communications to increase engagement with employees, partners and customers, only increasing the quantity and complexity of the data you manage. Join Proofpoint to gain an understanding of the challenges that compliance faces and the consequences of not meeting the expectations of the regulators
Join us to
•Develop insight into the rapidly changing regulatory environment
•Hear how new forms of communications are bringing about the digital revolution
•Discover how to protect your organization from reputational risk and stay out of the cross hairs of the regulators
The new Intel® Xeon® Scalable processors created an Intel-driven inflection point for data management. Now’s the time to explore what this new architecture means for your current and future storage environments. NetApp, a data management industry leader, shares how Intel Xeon Scalable processors coupled with a converged systems strategy is proven to help you perform at full capacity, do more with less, and optimize your full stack. Tune in to learn about:
• The opportunity with converged systems based on early Intel Xeon Scalable processor results
• NetApp’s multi-cloud strategy with respect to convergence
• Specific workloads that will benefit from enhanced processor power and a converged infrastructure
From the first time that criminal charges were files against a known state actor for hacking in 2014 to the recent US Senate Intelligence Committee hearing on Russian influence on the 2016 US Election, FireEye has been integral to investigations where cyber attacks resulted in the most significant impact on governments around the world. We will highlight some of the most public investigations, look to key government leaders to understand their perspective on the impact of cyber, and lastly review the top strategic mistakes that organizations make when trying to address cyber risk.
Join this webinar to understand the benefits of a unified view of your infrastructure and comprehensive security that keeps up with changing network requirements and technologies like cloud services and smart devices.
Iver van de Zand will talk and demo on the latest SAP innovations for analytics in the cloud. Keywords are live connectivity and the closed loop of combined business intelligence, planning and predictive analytics all in one environment. Fully ready and prepared for big data.
Join Esther Spanjer, Director, Enterprise Business Development EMEA, for this webinar where she will discuss how SanDisk branded SSDs and HGST branded HDDs and SSDs are ideal for environments that run Hadoop databases. This webinar will look at cases where, SanDisk and HGST devices, can dramatically reduce query response times and minimize server sprawl by tuning compute and storage separately. Optimizing your Hadoop environment that suffer from queries that take too long to return data or in which applications are not meeting their SLAs, will enable you to reduce your server footprint at massively increased query performance.
Les grands esprits ont besoin de systèmes à la hauteur de leur imagination, Dell Precision Workstation met des outils ultra puissants à disposition des experts les plus talentueux pour donner vie à leurs idées.
This 3 part webinar series will give show you the 3 key pillars to achieving social success in sales. Learn how to create the ultimate profile, build a winning personal brand, create great and consistent content and build a winning strategy. The final session will be packed with the best industry tips and tricks to make social work for you.
Part 1 - Becoming The Brand & Selling YOU
You're not just selling your product anymore, you're selling YOU. More and more of your prospects are looking at your social media profiles and this will influence buying decisions. Find out the best personal branding tips and how to build a profile that will generate opportunities, not scare them away.
If your processing and data is in the cloud, how can you deliver assurance, compliance and governance? How do you find the flaws and soft spots that criminals will exploit? From browser to database, through human factors and end points, this presentation will take a threat-based approach to securing the cloud.
Identifying effective threat intelligence is not easy. Learn what it means to have timely, relevant and actionable threat intelligence and how it can help you respond to threats quickly and decisively.
This webinar explains:
· Why do organisations require Cyber threat intelligence?
o To aid technical and business decision making
o To identify and manage risks
o To efficiently deploy capital against the threats that matter to enterprise
· The key requirements for establishing a cyber threat intelligence function
· Basic cyber threat intelligence workflows
· Resource and training requirements to support a Cyber Threat intelligence function
Securing Web Access & Protecting Data with Cloud-Delivered Enterprise Security
Increased cloud adoption, mobile device use, and the dramatic growth in the number of remote and home workers is putting pressure on existing security infrastructures.
In this environment, enterprise security teams are wrestling with questions like:
- How can I consistently enforce policies governing the use of the web and cloud?
- How can I effectively protect my users from web-based threats?
- How can I secure my sensitive data and comply with legal regulations?
Enterprises are turning to a comprehensive cloud-delivered security solution to tackle these challenges.
Join us to learn how Symantec’s Cloud Security Services can be leveraged to protect users, data and devices, addressing the challenges of the cloud generation.
Technology will underpin all aspects of modern society by 2019, profoundly impacting the way people live and work. Business leaders face a stark dilemma; should they rush to adopt new technology and risk major fallout if things go wrong; or wait and potentially lose ground to competitors. Organisations that are well informed about emerging technologies and corresponding threats will be best placed to make winning decisions.
In this webinar, Steve Durbin, Managing Director, ISF, will examine the threats that organisations will be dealing with over the next two years and will provide advice on the best ways of handling them.
Policies are critical to organizations to reliably achieve objectives while addressing risk and uncertainty and act with integrity. Policies set the boundaries and expectations for behavior of individuals, processes, transactions, and relationships of the organization. High performing organization rely on policies to provide consistent behavior and outcomes. This is particularly true in privacy, compliance, and information security management. However, policies fail if they are poorly written, not understood, or are just paper documents that are not followed in the organization. This webinar delivers guidance and best practice in engaging users on policies to ensure they are clearly understood and followed.
Key takeaways from this webinar are to learn how:
User engagement is a critical part of a successful policy management system
Consistency is critical to define clear rules of approach to Policy creation
Policy awareness enable a dialogue on important issues that can typically be forgotten in a day to day running of the business
Policy management has become a critical part of organisational oversight