Hi [[ session.user.profile.firstName ]]

Information Technology

  • Next-Gen File Sharing, Cloud Storage & Collaboration with OneDrive & SharePoint Next-Gen File Sharing, Cloud Storage & Collaboration with OneDrive & SharePoint Todd Kirk, Manager of Product Development, Brainstorm, Inc. Live 60 mins
    File sharing and cloud storage are quickly becoming commonplace in the modern business. However, it can be difficult to know when to use one tool over another and what advantages each provides. Moreover, technology is evolving quickly and keeping up to date on the latest and greatest can be extremely time-consuming for many professionals.

    Join us for a few minutes to find out how to take your productivity to the next level, and become a file, sync, and share Office all-star with OneDrive for Business Next Generation Synchronization and SharePoint 2016’s wide array of new cloud collaboration tools.

    In this webcast your will learn:
    - When and why to use particular tools for file sharing, storage, and collaboration
    - How OneDrive for business can help you get the most out of personal file storage
    - How to use some of the newest features to securely store, edit, and share your documents
    - How to make professional teamsites in minutes
  • Abusing Bleeding Edge Web Standards For AppSec Glory Abusing Bleeding Edge Web Standards For AppSec Glory Ryan Lester, CEO & Co-Founder of Cyph Recorded: Dec 9 2016 42 mins
    Through cooperation between browser vendors and standards bodies in the recent past, numerous standards have been created to enforce stronger client-side control for web applications. As web appsec practitioners continue to shift from mitigating vulnerabilities to implementing proactive controls, each new standard adds another layer of defense for attack patterns previously accepted as risks.

    With the most basic controls complete, attention is shifting toward mitigating more complex threats. As a result of the drive to control for these threats client-side, standards such as SubResource Integrity (SRI), Content Security Policy (CSP), and HTTP Public Key Pinning (HPKP) carry larger implementation risks than others such as HTTP Strict Transport Security (HSTS). Builders supporting legacy applications actively make trade-offs between implementing the latest standards versus accepting risks simply because of the increased risks newer web standards pose.

    In this talk, we'll strictly explore the risks posed by SRI, CSP, and HPKP; demonstrate effective mitigation strategies and compromises which may make these standards more accessible to builders and defenders supporting legacy applications; as well as examine emergent properties of standards such as HPKP to cover previously unforeseen scenarios.
  • Dev and Test Better in the Cloud Dev and Test Better in the Cloud Rajesh Agadi, Technical Solutions Professional & Rodrigo de Carvalho, Cloud AppDev Marketing Manager, Microsoft Recorded: Dec 9 2016 23 mins
    Support your IT and applications team better than ever!

    Companies of all sizes are under pressure to deliver greater results. The search for quicker and more impactful results, while balancing costs, governance, and agility, are one of the biggest challenges of many IT organizations. While applications – developed internally, packaged, or off-shored – are the engine behind business transformation, the ability to deliver better apps is compromised by the lack of environments to proper develop and test them. High hardware procurement time and costs are usually major roadblocks faced by IT.

    Cloud Computing plays a key role in providing application teams with the tools needed to develop and test in production-like environment, while never ignoring costs, security, and agility.

    Join this webcast to learn how to:
    - Understand the challenges in IT to provision development and testing environments for applications teams
    - See how cloud computing and Microsoft Azure can be the answer for dev-test environments
    - Learn about Microsoft Azure and the Azure Dev-Test Offer
    - Receive an overview of dev-test labs and governance and security of dev-test environments
  • Harnessing 2017’s biggest database trends Harnessing 2017’s biggest database trends Matt Aslett, 451 Research Director for Data Platforms & Analytics; Mike Kelly Blue Medora & GM SelectStar platform Recorded: Dec 9 2016 57 mins
    Recent years have seen an explosion in the number of different platforms and approaches used to store, process and analyze data in multiple formats from multiple sources. An abundance of data platforms (relational and non-relational databases, NoSQL, NewSQL, Hadoop, database as a service, etc.) has created a complex data management landscape that relies on the integration of multiple interdependent platforms and analysis tools. This trend is expected to continue in 2017. This webinar will preview how the database market is expected to change and what database professionals can do to use these changes to their advantage.

    In this session you’ll:

    - Learn what’s driving increasing adoption trends in specific data platforms like NoSQL and Hadoop
    - See how cloud-based data platforms are being used—and who is using them
    - Discover the implications of IoT for data platforms
    - See a demo of a new database management platform designed to address these changes
  • AMPing Up STEM Instruction with 3D Printing AMPing Up STEM Instruction with 3D Printing THE Journal, Stratasys & GIT Recorded: Dec 9 2016 62 mins
    Students will enter a job market that requires skills far different that those of today. Learn how schools are taking new approaches to develop critical thinking with 3D printing for future careers. Witness the connection of teacher instruction and student achievement with Jeff Rosen, Program Director for Technology and Robotics at Georgia Institute of Technology. Jeff outlines AMP (Advanced Manufacturing and Prototyping Integrated to Unlock Potential), a National Science Foundation project which includes designed courses, mini challenges and interdisciplinary course experience for grades 6 – 8. Explore the uses of 3D printers for the classroom, and get an introduction to the Stratasys uPrint 3D Printer which offers educators reliability and repeatable results for streamlined learning.
  • Cyphort Adaptive Detection Fabric: Demo Cyphort Adaptive Detection Fabric: Demo Tim Zack Recorded: Dec 9 2016
    Walk through the product features of Cyphort's Adaptive Detection Fabric (ADF)
  • Simplifying Container Management with Habitat Simplifying Container Management with Habitat Ian Henry, Habitat Community Manager & Michael Ducy, Director of Product Marketing Recorded: Dec 9 2016 45 mins
    Containers provide a delightful development experience. It’s easy to download a container image and get started writing code. But it’s a different story when you have to run containers in production at scale. That’s when all the hidden complexities become apparent and the real challenges begin. What tools are you going to use to build, deploy, run, and manage your containerized applications? How are you going to manage difference between environments like staging and production with a fleet of immutable objects? How will you effectively scale containerized applications once you’ve deployed them?

    Habitat, our open-source project for application automation, simplifies container management by packaging applications in a compact, atomic, and easily auditable format that makes it easier to deploy your application on various container runtimes. Once your applications are deployed, the Habitat supervisor simplifies the complexities of running in production environments with built-in abstractions for functions typically handled by external tooling, such as dynamic scaling and rolling updates.

    Join Ian Henry and Michael Ducy on Friday, December 9th at 10:00 AM PT, to learn how Habitat makes building, deploying, and running your applications in containers simple, no matter how complex the production environment.

    Join us to learn:
    - Why automation is critical to deploying in a containerized world and how - Habitat provides the minimum viable automation.
    - Why a strong container build system is important, and how the Habitat studio provides that system.
    - Why Habitat is the easiest way to build and run containers at scale, no matter the underlying container architecture.

    Who should attend:
    - Anyone new to containers
    - Anyone challenged by running containers in production at scale
  • Taking the Risk out of IT Operations:  Increasing Service Levels and ROI Taking the Risk out of IT Operations: Increasing Service Levels and ROI Joakim Tenlen, Offering Manager, IBM Recorded: Dec 9 2016 15 mins
    Today, consumerization of IT drives user expectations for new apps, richer analytics and support for every device under the sun, IT teams are under increasing pressure to deliver better than “five nines” for virtually every application imaginable, and to do so under a data deluge that shows no signs of abating. And the need is real; The Ponemon Institute estimates the average outage lasts about 90 minutes and costs $450,000!

    Attend this TechBytes series, presented by Slashdot Media and sponsored by IBM to learn how enterprises of all kinds are taking advantage of the latest in middleware tools to increase business agility, accelerate decision-making, and embrace hybrid environments to meet increasing user demand while reducing operating costs overall.  Attendees will learn:

    - How to leverage analytics to increase efficiency while improving reliability
    - Benefits of becoming proactive rather than firefighting application performance issues
    - How to apply cognitive predictive analytics to stop costly IT outages before they start.
    - Where to start when beginning to leverage ITSM in your environment
    - Why Telcos and other companies providing “dial-tone” reliability are utilizing advanced analytics tools in their ITSM portfolio to ensure uptime for even the most dynamic network infrastructure

    Register now to hear expert speakers discuss how operations insight, analytics, and automation can work together to give your CIO peace of mind and keep your users happy. 
  • Accelerating Threat Hunting Maturity - From Adhoc to Advanced Machine Learning Accelerating Threat Hunting Maturity - From Adhoc to Advanced Machine Learning James Hanlon, Security Markets Director, Splunk, Adrian Davis, Managing Director, (ISC)² EMEA Recorded: Dec 9 2016 62 mins
    Threat hunting is evolving. Many organizations still carry out threat hunting in an adhoc manner without a defined and repeatable process. Yet some organizations are now looking at new machine learning driven approaches to accelerate their maturity and success. This session will review the current approaches to threat hunting and explain how Splunk can support & accelerate your threat hunting maturity.
  • 3 Ways to Achieve Workload Portability 3 Ways to Achieve Workload Portability Nigel Tozer, Solutions Marketing Director EMEA Recorded: Dec 9 2016 27 mins
    If you’re concerned about the challenges of vendor lock-in, and how it impacts your organisation’s ability to adopt new technologies, join this webinar in which Nigel Tozer, Commvault Solutions Marketing Director, will reveal ‘3 Ways to Achieve Workload Portability’ for application, virtual and big data workloads.

    This webinar is an expanded version of the speaker session delivered by Nigel at the Gartner Data Center, Infrastructure & Operations Management Summit in London on 29 November 2016.
  • Exploit kits: getting in by any means necessary Exploit kits: getting in by any means necessary Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks Recorded: Dec 9 2016 50 mins
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity (hint: it’s a big business!)
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • How to Quantify the ROI of Low-Code Application Development How to Quantify the ROI of Low-Code Application Development Mike Hughes (OutSystems) & Seth Lippincott (Nucleus Research) Recorded: Dec 9 2016 49 mins
    It’s no secret - low-code platforms accelerate digital transformation. They cut app dev time, they help you bring new innovation to market faster, and they catalyze disruption. And, although time-to-market is apparent, the real question is what is the ROI to the business?

    So, we sought to quantify the real impact faster development times have in terms of cost, benefits, payback, and real ROI. To do this, OutSystems engaged Nucleus Research to provide objective reports on the quantitative benefits of our low-code platform.

    Join us and Nucleus Research as we explore the measurable benefits that you’ll enjoy when taking a low-code approach to development. We’ll also share the quantitative results of some recent customer projects and dissect the methodology for determining ROI.

    In this webinar, you will learn:

    * How Japanese electronics company Ricoh achieved a six-month payback and a 253% ROI.
    * How Worcestershire County Council, a UK Government agency, built 30 new applications and saw a 442% ROI.
    * How to build your own business case for low-code by identifying ROI, payback, NPV, TCO, and other metrics.

    Join us for this exciting webinar!
  • Dial Tone Reliability:  Optimizing Hybrid Telco Infrastructure through ITSM Dial Tone Reliability: Optimizing Hybrid Telco Infrastructure through ITSM Denis Murphy, Offering Manager Cloud, IBM Recorded: Dec 9 2016 17 mins
    Today, consumerization of IT drives user expectations for new apps, richer analytics and support for every device under the sun, IT teams are under increasing pressure to deliver better than “five nines” for virtually every application imaginable, and to do so under a data deluge that shows no signs of abating. And the need is real; The Ponemon Institute estimates the average outage lasts about 90 minutes and costs $450,000!

    Attend this TechBytes series, presented by Slashdot Media and sponsored by IBM to learn how enterprises of all kinds are taking advantage of the latest in middleware tools to increase business agility, accelerate decision-making, and embrace hybrid environments to meet increasing user demand while reducing operating costs overall.  Attendees will learn:

    - How to leverage analytics to increase efficiency while improving reliability
    - Benefits of becoming proactive rather than firefighting application performance issues
    - How to apply cognitive predictive analytics to stop costly IT outages before they start.
    - Where to start when beginning to leverage ITSM in your environment
    - Why Telcos and other companies providing “dial-tone” reliability are utilizing advanced analytics tools in their ITSM portfolio to ensure uptime for even the most dynamic network infrastructure

    Register now to hear expert speakers discuss how operations insight, analytics, and automation can work together to give your CIO peace of mind and keep your users happy. 
  • Exploit kits: getting in by any means necessary Exploit kits: getting in by any means necessary Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks Recorded: Dec 9 2016 50 mins
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity (hint: it’s a big business!)
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Embracing New Software Agility to Drive Customer Satisfaction, Deliver New Svc. Embracing New Software Agility to Drive Customer Satisfaction, Deliver New Svc. Soloman Barghouthi, STSM, WW - Application Platform Specialist IBM Cloud Recorded: Dec 8 2016 22 mins
    Today’s dynamic business climate is increasingly application-powered, and as a result the need for code to address change is accelerating. Even businesses that have already adopted agile development and deployment processes and DevOps strategies are struggling with many challenges including:
     
    - Requirement for significant IT involvement to deliver functionality
    - The increasing challenge of “multi-speed” IT and connecting front-end and back-end systems, exacerbated by application and data silos
    - Application development, testing and QA backlogs due to increasing user demands driven by consumerization of IT

    to name just a few. Attend this TechBytes video series sponsored by IBM to learn how organizations of all types and sizes are now addressing these myriad challenges by adopting new development and execution platforms that accelerate the entire application lifecycle while creating substantial savings. These bite-sized webinars will cover the latest market conditions in the application development arena, with a particular focus on mobile; dive into the greatest challenges facing development and deployment teams today, and present strategies and tactics that can reduce workload, deliver more, faster, while getting more out of your IT dollar.
  • The Modernization Imperative:  Developing and Deploying in our Hybrid IT World The Modernization Imperative: Developing and Deploying in our Hybrid IT World Soloman Barghouthi, STSM, WW - Application Platform Specialist IBM Cloud Recorded: Dec 8 2016 21 mins
    Today’s dynamic business climate is increasingly application-powered, and as a result the need for code to address change is accelerating. Even businesses that have already adopted agile development and deployment processes and DevOps strategies are struggling with many challenges including:
     
    - Requirement for significant IT involvement to deliver functionality
    - The increasing challenge of “multi-speed” IT and connecting front-end and back-end systems, exacerbated by application and data silos
    - Application development, testing and QA backlogs due to increasing user demands driven by consumerization of IT

    to name just a few. Attend this TechBytes video series sponsored by IBM to learn how organizations of all types and sizes are now addressing these myriad challenges by adopting new development and execution platforms that accelerate the entire application lifecycle while creating substantial savings. These bite-sized webinars will cover the latest market conditions in the application development arena, with a particular focus on mobile; dive into the greatest challenges facing development and deployment teams today, and present strategies and tactics that can reduce workload, deliver more, faster, while getting more out of your IT dollar.
  • How New Cloud Strategies Drive Productivity and Savings for the App Economy How New Cloud Strategies Drive Productivity and Savings for the App Economy Soloman Barghouthi, STSM, WW - Application Platform Specialist IBM Cloud Recorded: Dec 8 2016 18 mins
    Today’s dynamic business climate is increasingly application-powered, and as a result the need for code to address change is accelerating. Even businesses that have already adopted agile development and deployment processes and DevOps strategies are struggling with many challenges including:
     
    - Requirement for significant IT involvement to deliver functionality
    - The increasing challenge of “multi-speed” IT and connecting front-end and back-end systems, exacerbated by application and data silos
    - Application development, testing and QA backlogs due to increasing user demands driven by consumerization of IT

    to name just a few. Attend this TechBytes video series sponsored by IBM to learn how organizations of all types and sizes are now addressing these myriad challenges by adopting new development and execution platforms that accelerate the entire application lifecycle while creating substantial savings. These bite-sized webinars will cover the latest market conditions in the application development arena, with a particular focus on mobile; dive into the greatest challenges facing development and deployment teams today, and present strategies and tactics that can reduce workload, deliver more, faster, while getting more out of your IT dollar.
  • Tech Talk: Accelerate DB Projects With Transformational Storage Capabilities Tech Talk: Accelerate DB Projects With Transformational Storage Capabilities Bala Chandrasekaran Recorded: Dec 8 2016 34 mins
    All Flash Storage accelerates database applications. But, are your business processes stuck with legacy practices of developing and testing applications? Come join us to discuss how transformational capabilities of Dell EMC All Flash arrays can help you enable agility to your database projects.
  • Big Data, Predictive Analytics, and Sales Performance Big Data, Predictive Analytics, and Sales Performance Barbara Giamanco, Social Centered Selling, Peter Mollins, Knowledge Tree, & Melissa Treier, Information Builders Recorded: Dec 8 2016 58 mins
    Is your team ready for the new era of data?

    The era of big data and predictive analytics is clearly upon sales and marketing professionals, representing a transformative paradigm shift for sales and marketing teams. No longer can salespeople rely on relationships and other soft factors to target and close business. Marketing has to move beyond one-off campaigns and brand advertising.
    Big data and predictive analytics technologies represent the opportunity to turn the tables. In other words, sales and marketing can finally become more about math than magic.

    Join this webcast to learn how to:
    - Justify big data and predictive analytics as part of your organization's sales and marketing strategy
    - Leverage insights from big data to accurately target high-value prospects in marketing campaigns, keep existing customers on board through account-based marketing strategies, and expand existing opportunities
    - Improve sales forecasting accuracy using more than "gut feel," relying on real-time sales data visualizations

    This webcast is part of our Microsoft Dynamics Business Applications webcast series. Sign up for this session, or the entire series today!
  • Enterprise Storage Megacast: What Makes Tegile Systems Different Than the Rest? Enterprise Storage Megacast: What Makes Tegile Systems Different Than the Rest? Chris Tsilipounidakis, Tegile, Senior Manager Product Marketing Recorded: Dec 8 2016 32 mins
    Storage has become the Achilles’ heel for many datacenter applications. It’s become expensive, constantly requires capacity expansion, and requires staff to keep it operational. Many customers are also dealing with the perpetual cycle of costly support and maintenance.

    Today, there are dozens of different storage options at your disposal. All of these solutions have a place in the market and each one carries its own set of benefits. Whether you’re looking for capacity, performance or TCO savings, an appropriate solution does exist for you.

    This webinar is your opportunity to get a better understanding of Tegile and the unique differentiation it provides in the storage market.
  • Rapid7 InsightIDR Product Demo Rapid7 InsightIDR Product Demo Eric Sun and Pat Haley Recorded: Dec 8 2016 49 mins
    By integrating with your existing network & security stack, InsightIDR leverages user behavior analytics to correlate the millions of events your organization generates daily to the exact users and assets behind them. Along with custom included intruder traps, you'll automatically detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing. Combined with a fully searchable data set and endpoint interrogation, InsightIDR directly addresses the gaps found in most of today's detection technologies, including SIEM and IPS.
  • How Viable is Google ColdLine Cloud Storage? How Viable is Google ColdLine Cloud Storage? Curtis Preston, Storage Switzerland Recorded: Dec 8 2016 62 mins
    Google has recently announced expansion of their cloud storage service. It offers similar service levels as Amazon S-3 and Glacier, but with simplified pricing. How viable is their cloud storage product for the average customer? How do their service levels compare to Amazon and Azure service levels? What about pricing? Is it really that different? And what are some example use cases?

    Other questions center around applications that support these offerings. If an application supports Amazon, will it be easy for them to support Google? Is there anything about Google cloud storage that makes it easier or harder for service providers to work with them?
  • The End of Proprietary Software The End of Proprietary Software Merav Yuravlivker, Co-founder and CEO, Data Society Recorded: Dec 8 2016 49 mins
    Is it worth it for companies to spend millions of dollars a year on software that can't keep up with constantly evolving open source software? What are the advantages and disadvantages to keeping enterprise licenses and how secure is open source software really?

    Join Data Society CEO, Merav Yuravlivker, as she goes over the software trends in the data science space and where big companies are headed in 2017 and beyond.

    About the speaker: Merav Yuravlivker is the Co-founder and Chief Executive Officer of Data Society. She has over 10 years of experience in instructional design, training, and teaching. Merav has helped bring new insights to businesses and move their organizations forward through implementing data analytics strategies and training. Merav manages all product development and instructional design for Data Society and heads all consulting projects related to the education sector. She is passionate about increasing data science knowledge from the executive level to the analyst level.
  • Les cyber-menaces du monde réel et la technologie d’Enterprise Immune System Les cyber-menaces du monde réel et la technologie d’Enterprise Immune System Jérôme Chapolard, Account Executive Dec 12 2016 10:00 am UTC 45 mins
    Les cyber-menaces sont plus diverses et sophistiquées que jamais. Le défi vient également de la complexité de nos réseaux – avec des changements constants, y compris le « Internet of Things », les services de Cloud et les applications SaaS.

    Des nouveaux types d’attaques sont capables de contourner nos outils traditionnels de cyber sécurité. Il est évident qu’une nouvelle approche est nécessaire. 

    Rejoignez ce Webinar pour découvrir :

    • Le panorama des menaces changeant et les nouveaux types d’attaques
    • L’approche d’auto-apprentissage de Darktrace à la détection des menaces
    • Des exemples concrets de menaces détectées par Darktrace
    • Des témoignages clients d’Avancial et Apave Group et pourquoi ils dépendent d’une approche auto-apprenante pour dépasser ces menaces et regagner 100% de visibilité sur votre réseau
     
    www.darktrace.com
  • Introducción a Amazon EC2 Introducción a Amazon EC2 Carlos Carús Dec 12 2016 4:00 pm UTC 60 mins
    Amazon Elastic Compute Cloud (Amazon EC2) es un Servicio Web de AWS que proporciona capacidad de cómputo con tamaño modificable en la nube. Está diseñado para ofrecer un auténtico entorno virtual de cómputo profesional y escalable que permite utilizar interfaces de servicios web para lanzar instancias con distintos sistemas operativos, cargarlas con su entorno de aplicaciones personalizado, administrar sus permisos de acceso a la red y ejecutar su imagen utilizando los sistemas que desee.

    En este webinar gratuito te mostraremos en directo los principales beneficios y uso de Amazon EC2 tales como control total sobre sus instancias, aumentar o disminuir la capacidad en minutos, posibilidad de elegir entre varios tipos de instancia, sistemas operativos y paquetes de software, pago por uso o funcionalidad de red sólida y segura para sus recursos informáticos.
  • How Cybersecurity, Technology and Risk Is Maturing the Role of the Modern CISO How Cybersecurity, Technology and Risk Is Maturing the Role of the Modern CISO Gary Hayslip, CISO - City of San Diego, CA Dec 12 2016 5:00 pm UTC 60 mins
    The landscape that today’s CISOs operate in and the role they fill has fundamentally changed in the last few years. Today, CISOs must understand the technical side of cyber security, as well as enterprise risk management and how both disciplines impact their organization’s ability to successfully conduct business.

    Join this presentation to learn about the evolving cyber threat landscape, the challenges for CISOs and the requirements to ensure cyber security throughout their organization.
  • Reducing Threats through Improving Identity Security Reducing Threats through Improving Identity Security David Coxe, Co-Founder, Criterion Systems and Co-Founder & CEO of ID DataWeb Dec 12 2016 6:00 pm UTC 45 mins
    Cyber threats are increasing in frequency and complexity, and all industry segments are vulnerable. Join this presentation to learn the advances in identity security and privacy, and how you can protect your organization in 2017.

    Presenter:
    David Coxe is the CEO of ID DataWeb, Inc. (IDW) and was the Principal Investigator for the Criterion Systems NSTIC pilot program. He is also co- founder of Criterion Systems, a successful IT services contractor that provides information security, cloud computing, software development and other services to civilian agencies, DoD, and the Intelligence community. David has 20 years identity management experience and is currently very active in the development and implementation of attribute exchange trust frameworks. He co-chaired the Attribute Exchange Working Group (AXWG) at the Open Identity Exchange (OIX) for implementing the business, legal, technical, policy/privacy and assessor/certification requirements for Attribute Exchange (AX) Trust Frameworks.
  • Combating Cloud Security Threats in 2017 Combating Cloud Security Threats in 2017 Manolo Gonzalez, VP, ​Platform and​ Technology Alliances​ at CloudLock Dec 12 2016 7:00 pm UTC 60 mins
    Gartner named CASB the #1 infosecurity technology in 2016. Why is cloud security number one? As users, data and applications move to the cloud and traffic happens off the network, new vectors for malware and threats open up and a new paradigm and breed of security solutions is required: Cloud Access Security Brokers (CASB).

    This presentation will demonstrate how to regain visibility and control in your cloud environments, as well as key use cases in the cloud, and how CloudLock works to provide effective security.
  • Protecting Your Business from the Ransomware Threat Protecting Your Business from the Ransomware Threat James Carder, CISO of LogRhythm, Ryan Sommers, Manager of Threat Intelligence and Incident Response, LogRhythm Labs Dec 13 2016 12:00 am UTC 45 mins
    The Scenario

    It's 2:00 p.m. on a Friday afternoon, and you get that fateful call. An employee's laptop was hit by the latest CryptoWall variant. The employee was merely searching for how to solve a computer problem, but within minutes of clicking a link, his files have been encrypted and he must pay a ransom fee to get them back.

    Unfortunately, his laptop wasn't the only thing affected. The file shares that he was connected to were also encrypted beyond reach. Other calls start coming in. Files in various department shares are "corrupted" and things are grinding to a halt. Another ruined weekend for the SOC and IT--and likely another payday for the bad guys.

    Defending Your Organization Against Ransomware

    In this webinar, LogRhythm will look at the business problems surrounding the new and evolved ransomware threat. The webinar will also give you a brief technical overview of how these schemes function and how they can be spotted and responded to early enough in the threat lifecycle to severely limit the potential damage. You'll also be given a framework that you can work through to better protect your organization in the face of this looming menace.

    Webinar topics include:

    • The early indicators of ransomware
    • Automated defenses that you can put in place to thwart the attack
    • The steps that must be followed (with robotic precision) to make a mole hill out of the potential mountain.
  • Help! Easy Ways to Validate 10G Network Connectivity? Help! Easy Ways to Validate 10G Network Connectivity? Mike Pennacchi, Network Protocol Specialists Dec 13 2016 1:00 am UTC 60 mins
    “I don’t always validate network connectivity… but when I do, it’s an enormous time sink.” -The Most Interesting IT Pro in the World
    If this sounds familiar, we have good news. You can now drastically reduce the time spent on network analysis and validation with the right tools and know-how.
    Join us for a guided walkthrough of the validation process and learn about:
    Understanding and navigating the Open Systems Interconnection model (OSI model)
    Troubleshooting connectivity vs. network performance
    Determining availability of services
  • Hidden Benefits of OneTouch AT Network Tester Hidden Benefits of OneTouch AT Network Tester Mike Pennacchi, Network Protocol Specialists Dec 13 2016 2:01 am UTC 60 mins
    There is no doubt that when it comes to network validation, the NETSCOUT OneTouch AT is the best tool. However, this highly portable network troubleshooting tool has many features to offer, beyond just network validation. In this webcast, we will cover a number of tools built into the OneTouch AT that will help you quickly get to the root of your networking problems.
    In this webcast, we will look at:
    •How to trace a path through the network at layer 2 and layer 3
    •Using the built-in web browser and SSH client to configure devices
    •Inspect fiber end faces, using the optional Fiber Inspector
    •Locate wireless interference sources
    •Remotely control the OneTouch AT via the cloud based web interface
    •Automatically upload test results to the cloud
    •Control the OneTouch AT via the management interface
    •Perform in-line packet capture
    •Export test results to XML files, so they can be opened in MS Excel
  • What Happened @ AWS Re-Invent 2016? (30 mins wrap up!) What Happened @ AWS Re-Invent 2016? (30 mins wrap up!) Mark Duhm, Hyperscaler Practice Lead; Rob Selby, Product Manager, Hyperscaler Services Dec 13 2016 9:30 am UTC 60 mins
    Not managed to go to Las Vegas this year to attend AWS re:Invent? Worry not, we are consolidating a week’s worth of presentations and announcements into just 30 mins of your time… Come join us to see how we have coped with this challenge!

    Duration: 30 mins + Q&A

    AWS has grown at a phenomenal rate since 2006 and released a total of 722 new features and services, just in the last year – how does one keep up you may wonder? Well, AWS re:Invent – the world’s largest AWS gathering – is a great starting point but of course, it’s about much more than feature releases – how do you figure out what is relevant to your business? How do you assess whether your business is ready to effectively use AWS? How do you take what is available and deploy it to your own benefit?

    In this webinar we discuss both the hottest ins and outs as well as the most thought provoking perspectives that came out of this years' re:Invent. Our Hyperscaler Practice Lead, Mark Duhm and Hyperscaler Services Product Manager, Rob Selby, will be covering a number of topics:

    - Key updates & announcements (and their relevance in today's marketplace)
    - The 'so what' to AWS strategy & roadmap updates
    - Relevant perspectives around AWS in a Hybrid Cloud world, Security and Migration

    This is your chance to get a very personal download on what's happened at re:Invent - don't miss out!

    Duration: 30 mins + Q&A (so come prepared!)

    Presenters:
    - Mark Duhm, Hyperscaler Practice Lead
    - Rob Selby, Product Manager, Hyperscaler Services
  • Intelligent Data Lake : Valorisez les données issues du Big Data Intelligent Data Lake : Valorisez les données issues du Big Data Edouard Guérin - Spécialiste Big Data, Informatica Dec 13 2016 10:00 am UTC 45 mins
    La digitalisation du marketing et l’émergence de nouvelles applications génèrent un flux toujours plus important de données, de toutes formes et tailles. L’exploitation de ces informations permet de mieux cibler, acquérir et satisfaire la clientèle, cependant, trop peu de directions marketing parviennent à en tirer parti.

    Le 13 décembre à 11 heures, participez à notre webinaire Intelligent Data Lake et découvrez grâce à des exemples concrets de mise en œuvre comment :
    - Visualiser le parcours client global pour identifier les programmes les plus efficaces et optimiser le mix marketing ;
    - Développer des stratégies efficaces pour mieux cibler et acquérir de nouveaux clients ;
    - Tirer profit des données issues du Big Data à travers tous les points de contact pour créer de la valeur métier.

    Informatica Intelligent Data Lake
    La solution Intelligent Data Lake d’Informatica offre la data préparation en libre-service, en combinant l’automatisation, l’intégration et la gestion de la qualité des données, aux capacités de gestion de la gouvernance et de la sécurité requises pour tirer la véritable valeur métier de tous types de données, tout en rationalisant les risques.
  • Использование Amazon Web Services для разработчиков Использование Amazon Web Services для разработчиков Андрей Зайчиков, AWS Solution Architect Dec 13 2016 12:00 pm UTC 120 mins
    На вебинаре мы рассмотрим возможности использования облака AWS для создания и управления средами разработки, тестовыми и предпродуктивными средами, коснемся организации процессов CICD с использованием средств, предоставляемых AWS и open-source решений.
  • Digital Transformation: The Key to Building an Agile Insurer Digital Transformation: The Key to Building an Agile Insurer Mark Breading of Strategy Meets Action Research Dec 13 2016 2:00 pm UTC 60 mins
    The need for speed to compete in the market requires insurers to create an agile company, capable of responding to market opportunities and changes. Technology solutions must be developed, deployed, and revised more rapidly to support business strategies.
  • Privacy by Design: How to Protect your Hybrid Enterprise from the Inside Out Privacy by Design: How to Protect your Hybrid Enterprise from the Inside Out Paul Ferron, Digital Identity Strategist CA Technologies EMEA and John McGonagle, Sr. Associate, DLA Piper Dec 13 2016 2:00 pm UTC 60 mins
    As organisations transform digitally the opportunity exists to build security into the network and infrastructure from the beginning. The new EU General Data Protection Regulation extends to virtual and cloud environments as well as traditional on-premise – and there are implications for moving and sharing data within these environments too.

    Join this webcast with Paul Ferron, Digital Identity Strategist CA Technologies EMEA and Giulio Coraggio, Partner and Head of the Italian Technology Sector at DLA Piper as they explore

    -How to balance digital transformation with compliance and protect PII while also enabling identities.
    -How a Privacy by Design approach enables companies to realise economic growth by building Trusted Digital Relationships with stakeholders.
    -Using Trusted Digital Relationships as a basis for GDPR compliance.
    -Implications of GDPR on data sharing
    -How to leverage GDPR to benefit consumers
  • Big Cloud Solutions for Big Data Challenges in Gaming and Mobile App Development Big Cloud Solutions for Big Data Challenges in Gaming and Mobile App Development Harold Smith and Glynn Bird Dec 13 2016 2:00 pm UTC 60 mins
    For any developer, choosing the right compute infrastructure and back-end database is a critically important decision. In this webinar, we'll explore specific challenges that mobile app and game developers face and how the cloud can provide a winning solution. We’ll also explore cloud solutions for big data challenges for MMOG, built-in analytics, online and offline MOG online modes, infrastructure reference architecture, and social network and cross-platform game use cases.
  • Eliminating security blind spots for Endpoints or on the move Eliminating security blind spots for Endpoints or on the move Kim Ellery, Director Product Marketing Dec 13 2016 3:00 pm UTC 60 mins
    Just a few years ago it was all about keeping things out with traditional security focused on the perimeter. Today it’s a given that many risks have already made it past the front door – with the acceleration to the cloud combined with the exponential growth of mobility, sensitive data can be accessed from anywhere. This new reality has brought productivity gains but also a new landscape of risks. As a result, many organizations have upped their game, employing a strong playbook traversing from the endpoint to the cloud. This layered approach ensures organizations can tackle and respond to each play as it happens. Join Kim Ellery from Absolute for an insightful presentation on the strategic benefits of this new landscape, and why many organizations still miss critical security blind spots.
  • Carry an Umbrella and It Won’t Rain – Patching to Protect against the Bad Things Carry an Umbrella and It Won’t Rain – Patching to Protect against the Bad Things Rob Ayoub, IDC Research Director Dec 13 2016 3:00 pm UTC 60 mins
    Organizations struggle to prioritize and implement the vast number of patches being introduced by software vendors. Testing and implementing takes time and most organizations simply apply a blanket set of patches for well-known software. However, attacks like ransomware are multi-vector and target a wide range of vulnerable software. While many of these vulnerabilities have patches, most organizations are not applying the most critical patches across their infrastructure, leaving them open to these very effective attacks.
    In this webinar, IDC Research Director Rob Ayoub and Flexera Software will discuss the need for a more targeted approach to patching – an approach that considers the exploitability of vulnerabilities and other factors beyond a CVE score.
  • Partnerworks Office Hours: Dynamic Security & Data Governance in HDP 2.5 Partnerworks Office Hours: Dynamic Security & Data Governance in HDP 2.5 Srikanth Venkat Senior Director of Security & Sean Roberts, Partner Engineering EMEA, Hortonworks Dec 13 2016 3:00 pm UTC 90 mins
    The integration of Apache Ranger and Apache Atlas is driving the creation of a classification-based access security policies in Hadoop. The Atlas project is a data governance and metadata framework for the Hadoop platform that includes contributions from end users and vendors. The Ranger project provides central security policy administration, auditing, authorization, authentication, and data encryption for Hadoop ecosystem projects such as HDFS, Hive, HBase, Storm, Solr, Kafka,NiFi and YARN. When Atlas and Ranger are used together, system administrators can define flexible metadata tag-based security policies to protect data in real-time.

    In this month’s Partnerworks Office Hours we will discuss the Security & Governance capabilities of HDP 2.5 with integration Apache Ranger & Apache Atlas. As usual we will leave plenty of time for your questions & further discussion.

    Topics covered:

    - Classification-based Policies
    - Location-based Policies
    - Time-based Policies
    - Prohibition-based Policies
    - Hive Row Level Security & Dynamic Data Masking:
    - Broader Atlas eco-system support
  • Operate with Confidence: Responding to the Changing Risk Environment in LATAM Operate with Confidence: Responding to the Changing Risk Environment in LATAM Brian Weihs and Ian Cook with Kroll Investigations and Disputes and John Fanning with Kroll Compliance Dec 13 2016 3:00 pm UTC 75 mins
    Whether operating in the region or conducting business through third parties, the shifting risk and regulatory landscape in Latin America poses many challenges. With local nuances, a one-size-fits-all approach to compliance and due diligence might do little more than provide a false sense of security.

    Join Kroll's experts as they discuss the changing risk environment in Latin America and the potential implications on your risk mitigation and due diligence programs in the region.

    Agenda:

    - Corruption risks and trends in Latin America

    - Understanding local nuances: What you need to know when conducting business with third parties in the region

    - Best practices for risk mitigation and due diligence

    - Q&A
  • Commercialising IP: Bridging the gap between academia and industry Commercialising IP: Bridging the gap between academia and industry Bruno Reynolds, Senior Consultant at Isis Enterprise, Ben Oakley, Consultant at Isis Enterprise Dec 13 2016 4:00 pm UTC 60 mins
    Resource constraints, financial and human, mean that most universities simply do not have the luxury of being able to back every research commercialisation opportunity. Therefore, it is essential to develop a strategy and process that optimises the chances of backing winners, be it to maximise the financial return or to address the non-financial impact agenda.


    PatSnap will be teaming up Isis Enterprise, the innovation consultancy division of Oxford University Innovation, to discuss some key measures that can be taken to identify promising commercialisation projects that are underpinned by strong intellectual property. We will also be providing insight on methods for trimming and shaping academic patent portfolios so that they are optimised for strong overall returns.
  • Don't Pay the Ransom! Protect Yourself from Ransomware with Cloud Don't Pay the Ransom! Protect Yourself from Ransomware with Cloud Ed Cabrera, Chief Cybersecurity Officer, Trend Micro and Justin Giardina, CTO, iland Dec 13 2016 4:00 pm UTC 60 mins
    Ransomware has become the Number 1 threat facing organizations in 2016; and it is of particular threat to any company that relies heavily on documents to run their business. With adoption of cloud computing for more mission-critical use cases growing, IT leaders are naturally concerned about protecting against ransomware in the cloud as well as on-premise.

    Join the Chief Cybersecurity Officer of Trend Micro and the CTO of iland for this webinar where they'll delve into the significant threat that Ransomware poses to enterprise IT organisations - and discuss how to protect and remediate your business from ransomware attacks in the cloud.

    This webinar will look into how Ransomware has changed; and how it’s becoming more targeted and harder to identify. With email still being the number 1 attack vector and a reported 70% of spam now delivering Ransomware, we will look at how advanced sandboxing technology can be used to identify new and unknown threats, like Ransomware, and why you need a robust disaster recovery and back-up plan.

    What will be covered:
    · Insight into Trend Micro’s ransomware and 2017 threat predictions
    · Threat detection techniques to identify new and unknown threats
    · How Trend Micro threat intelligence is integrated in the iland cloud platform
    · How a cloud-based disaster recovery and back-up plan helps remediate ransomware attacks
  • 451 Group and Gemalto Present "The Keys to Multi-Cloud Security" 451 Group and Gemalto Present "The Keys to Multi-Cloud Security" John Ray, Senior Product Strategist and EricHanselman, Chief Analyst at 451 Group Dec 13 2016 4:00 pm UTC 60 mins
    The cloud isn’t consumed by enterprises in just one way. Enterprises have varying internal capabilities and infrastructure means using different deployment models, on or off-premises, private and public clouds, hosted clouds through via multiple cloud vendors, which lends to a complex environment. Today, enterprises run roughly 41% of applications in the cloud, but workloads in cloud environments are expected to increase to 60% over the next two years. Organizations with multiple cloud platforms is becoming a fact of life, but creates challenges for businesses needing to secure them.

    Understanding the risks of each cloud platform is crucial to defining and implementing strong, dynamic data protection policies with comprehensive key management across all cloud-enabled environments. When encryption is used, the risk is transferred from the data itself to the cryptographic key. This is why it is essential that organizations control their own key infrastructure. Diving deeper into the topic, Eric Hanselman from 451 Group and John Ray from Gemalto will discuss the three key considerations to a successful multi-cloud security strategy: interoperability, control and compliance.

    Join our webinar “The Keys to Multi-Cloud Security” on Tuesday, December 13th 2016 and learn about:
    • Recent findings on enterprise cloud usage from 451 Group
    • How to analyze the security risks of your cloud platforms
    • Security practices for different cloud platforms and business processes
    • Future-proofing your Cloud security and data protection compliance
    • How security can work in the multi-cloud universe
    • Implementing a key management system that you own
  • Container Security Reality Check [Container Security Series: Part 1] Container Security Reality Check [Container Security Series: Part 1] Lars Herrmann, GM Integrated Services; Daniel Riek, Sr. Director Systems Design & Engineering Dec 13 2016 4:00 pm UTC 60 mins
    From the market hype, you’d think using containers to modernize existing workloads or build new microservices based applications is as easy as adding new apps to your iPhone. But all container technologies and images are not created equal. And before you set your developers (or ops team) loose on containers, you need to establish clear operational and security processes around your container usage.

    Join this vendor-agnostic session, by a Red Hat container expert, to see how enterprise IT can use containers to accelerate business agility, implement DevOps processes, and achieve greater security and control. Specifically, we'll explain why the OS you base your containers on, the images you use, and the registries you use all have security (and performance) implications.

    - You'll learn how to manage the life cycle of containers as updates occur, security issues arise, and functional requirements change.
    - And you'll discover how your container infrastructure can be managed consistently with the rest of your environment.
    - Most importantly, this session will set the story straight around the myths and misperceptions of containers.
  • Using Deep Packet Inspection, Semantic Awareness to Implement Zero Trust to IoT Using Deep Packet Inspection, Semantic Awareness to Implement Zero Trust to IoT Alexander Müller, Product Manager DPI, Rohde & Schwarz Cybersecurity ipoque Dec 13 2016 4:00 pm UTC 60 mins
    The Internet of Things (IoT) will provide a wealth of information that will enable us to collect, understand and process data in real-time. This new form of M2M interaction will be partially enabled through SDN/NFV. Networks in Telecoms and other enterprises will now become connected to legacy hardware through IoT ready Telematics platforms. Securing this new technology is imperative in maintaining and protecting the network. In this webinar we will discuss how to make the network ready for IoT and explore the relation between IoT and SDN/NFV:
    • Introduction to IoT
    • The impact of SDN on IoT
    • Securing brownfield IoT deployments (e.g. Industrial Control Systems (ICS) & Telematics platforms)
    • Where and when protection is required in the network
    • Using DPI to understand communicated data