Hi [[ session.user.profile.firstName ]]

Information Technology

  • HealthCare Data – Hacker Magnet
    HealthCare Data – Hacker Magnet Alex Holden, CISO of Hold Security Recorded: Aug 15 2018 60 mins
    What do hackers want to do with your medical data? These are practical examples from the Dark Web of real HealthCare data abuse. What is important to the bad guys, what is not? Learn about the hackers’ perspective and how to defend the data against abuses.
  • Advancing Cybersecurity in Health Care
    Advancing Cybersecurity in Health Care Julian Crowley and Vaughn Adams Recorded: Aug 15 2018 26 mins
    As the value of patient records, infrastructure, and services grows, the health care industry continues to become a major target for cyberattacks With an expanding attack surface — due to cloud infrastructure — it's critical this vulnerable industry continues to mature its security capabilities for its most valuable data and apps.

    Epic Systems is a market-leading Electronic Health Records (EHR) vendor widely used by large hospitals and health systems to access, organize, store, and share patient medical records. Given the volume and sensitivity of personal data on Epic platforms, it’s critical to ensure threats to patient privacy are detected and mitigated quickly.

    In this webinar you’ll learn how organizations in health care are using LogRhythm’s Epic Hyperspace App, combined with traditional security data, to provide greater value and network visibility. Members of LogRhythm’s Strategic Integration team and Health Care Sales Engineering team will show you how LogRhythm’s Epic Hyperspace App provides a focused point solution for real time visibility — as well as detection of suspicious activity within an Epic deployment. See how this app provides real-time visibility (including alarms and reports) into:

    · Inappropriate access or access attempts to patient medical records
    · Inappropriate attempts to record or download patient medical records
    · Users and systems trying to access the EHR
    · Context of the user who is accessing the patient records
    · Logic or reasoning behind the attempted access to medical records

    If you have Epic and LogRhythm, this is a must-see webinar. If you use another EHR, use the information from this webinar as a template on how and why to monitor your EHR platform.

    Speakers:
    - Julian Crowley, Strategic Integration Engineer
    - Vaughn Adams, Enterprise Sales Engineer
  • Artificial Intelligence & Employee Security: Greasing the Wheels of Productivity
    Artificial Intelligence & Employee Security: Greasing the Wheels of Productivity Ehab Samy, VP Product Management, Plurilock Recorded: Aug 15 2018 32 mins
    Traditional security and authentication methods are designed to put up stumbling blocks for your employees, challenging them at several points throughout their workday to identify themselves. To do this they must enter, remember, and frequently change passwords, and in the expanding world of two- or multi-factor authentication the enterprise seeks greater security at the further expense of productivity. But traditional passwords and other authentication methods can be compromised, so the impact to your user processes does not always deliver proportional security.

    Artificial intelligence and biometrics can change the authentication game, supporting enhanced security by automatically identifying employee identity without impacting workflows and user processes. Join Ehab Samy, VP Product Management, to learn about applications of biometrics and Artificial Intelligence that smooth your employees’ path to completing any task at work.
  • HIPAA-Aware Security Breach Prevention Policies for Email
    HIPAA-Aware Security Breach Prevention Policies for Email Simon Reddington, Technical Product Manager, Healthcare Practice Recorded: Aug 15 2018 32 mins
    Healthcare is the number one industry where employees are the predominant data security breach and compliance threat. 62% of breaches tend to be associated with unintentional outbound email misdelivery. In the context of ever increasing expectations on healthcare workers and reliance on electronic communication, it has become critical for IT security professionals to develop strategies to mitigate security breaches related to the release of protected health information (PHI).

    Join this summit session to learn how organizations are automating security breach policy oversight with pre-defined, HIPAA-aware data leak prevention policies that can be rapidly configured and then applied to a healthcare organization’s entire local or distributed workforce.

    Presenter Info:

    Simon Reddington, Technical Product Manager, Healthcare Practice

    Simon is a Technical Product Manager at Mimecast. Prior to joining Mimecast in 2013, he held technical roles at companies such as WorkShare and Fuel-IT Ltd. He has domain expertise around cloud computing and virtualized environments, Windows Server, Microsoft Exchange, and network administration. He holds a BSc in Computer Science, with Honors, from the University of Essex.
    David Hood, Cyber Security Strategist and Director of Technology Marketing, Healthcare Practice
    David is a Director of Technology Marketing at Mimecast. Previously he was Vice President and General Manager of Data Services at Connotate. David has held senior positions in marketing and product marketing at Kyruus, Memento (acquired by FIS) and additional enterprise software companies. He holds an MBA from Boston College and graduated from Vanderbilt University.
  • Take the Safer Road: Best Practices in SaaS Application Security
    Take the Safer Road: Best Practices in SaaS Application Security Doug Cahill (ESG) Recorded: Aug 15 2018 40 mins
    For most SaaS developers, security features aren’t top of mind. Because there are no real standard practices yet, the risks presented by the myriad SaaS applications varies widely.

    In this session, ESG Senior Analyst Doug Cahill, will discuss some best practices and the risks presented by a lack of standards, including:

    - Challenges securing cloud applications
    - The Shadow IT Reality
    - Cloud App Security
    - Implementing Cloud App Security Best Practices with a CASB
  • Salesforce Monitoring Best Practices
    Salesforce Monitoring Best Practices Angelique Medina, Sr. Product Marketing Manager, ThousandEyes Recorded: Aug 15 2018 40 mins
    Salesforce is a SaaS leader, powering Customer Service, Marketing and Sales for enterprises all over the globe. Yet too many organizations run into user experience issues due to external dependencies such as ISPs, DNS and secure web gateways impacting availability and performance. Without visibility into those dependencies, you’re operating blind and exposed to a large business continuity risk.

    Join us for our third webinar in our SaaS series where we’ll share:

    -How Salesforce service delivery works and monitoring best practices to de-risk adoption and ensure optimal performance
    -Real-world use cases where Network Intelligence uncovered the root cause of performance issues
    -Hands-on demonstrations of using ThousandEyes for Salesforce visibility
  • What's Breaking Your VMware Backups? And How You Can Fix Them Quickly
    What's Breaking Your VMware Backups? And How You Can Fix Them Quickly George Crump, Storage Switzerland and W. Curtis Preston, Druva Recorded: Aug 15 2018 60 mins
    Backing up VMware successfully has always been a challenge. The introduction of the cloud ever increasing scale of VMware infrastructure continues to give backups fits and makes it even harder.

    Please join George Crump, Lead Analyst at Storage Switzerland and our guest speaker W. Curtis Preston, Chief Technical Architect at Druva, for a discussion on the new challenges with VMware backups, and how to address them successfully.

    The Top 5 Reasons VMware Backups Still Break
    * Lack of Auto-Discovery
    * Lack of Full Cloud Support
    * Too Much Backup Infrastructure
    * Expensive and Complicated Disaster Recovery
    * No VMware on AWS Support
  • Enhance Application Security with Automated, Open-Source Security Management
    Enhance Application Security with Automated, Open-Source Security Management Dave Meurer, Alliances Technical Manager at Black Duck by Synopsys, Kamala Dasika, Pivotal Recorded: Aug 15 2018 60 mins
    Almost every major company uses or builds software containing open-source components today—96% of them, according to a report from Black Duck by Synopsis. The same report revealed that 78% of the apps that were audited had at least one vulnerability, including several that were reported nearly six years ago! Needless to say, not having solid open-source use policies and procedures in place for your developers poses a significant risk to any enterprise.

    Black Duck and Pivotal collaborated to deliver a secure and simple user experience for rapidly building and deploying applications so that developers can benefit from the many advantages of using open source in their apps with confidence.
    Join Dave Meurer from Black Duck and Kamala Dasika from Pivotal as they discuss:

    - Key security concepts you need to know pertaining to cloud-native application development
    - How to simplify and automate open-source security management for your applications and reduce license, operational risk, or policy violations

    Dave Meurer, Alliances Technical Manager at Black Duck by Synopsys, leads solution development, enablement, and evangelism for Synopsys Software Integrity Group.

    Kamala leads GTM with Pivotal Cloud Foundry Technology partners. She has been working at Pivotal since 2013 and has previously held various product or engineering positions at VMware, Tibco, SAP, and Applied Biosystems.

    Pivotal Privacy Statement:
    https://pivotal.io/privacy-policy

    BlackDuck Privacy Statement:
    https://www.blackducksoftware.com/legal/privacy

    This webinar:
    https://content.pivotal.io/webinars/aug-15-enhance-application-security-with-automated-open-source-security-management-webinar
  • 2/3 Get the Exact Identity Solution You Need - In the  Cloud - Deep Dive
    2/3 Get the Exact Identity Solution You Need - In the Cloud - Deep Dive Warren Strange, ForgeRock and Steve Giovannetti, Hub City Media Recorded: Aug 15 2018 58 mins
    Containerized IAM on Amazon Web Services - Deep Dive

    A deep technical look at the architecture behind running containerized IAM on AWS and what your team needs for a successful deployment

    You’ll experience an in depth review of:

    Assets and processes needed to containerize ForgeRock
    Architecture and processes guiding containerized IAM on AWS
    How containers are deployed into Kubernetes
    Monitoring and management strategies
    Continuous integration configuration

    BONUS: A demonstration of a deployment of ForgeRock into Kubernetes

    *By registering for this webcast you agree ForgeRock will maintain and process your personal information for communicating with you. (https://www.forgerock.com/privacy-policy)

    The following partner(s) of the the above webcast(s) will have access to the list of registrants, including your contact information.

    Hub City Media (https://www.hubcitymedia.com/privacy-policy)
  • Should More Protection Really Equal More False Positives?
    Should More Protection Really Equal More False Positives? Nir Gaist, Founder & CTO, Nyotron Recorded: Aug 15 2018 30 mins
    Security professionals accept the paradigm of “more protection equals more false positives (FPs)” as a fact of life. The tighter they make the “screws” of the security policies in their DLP, Web or Email Gateways, UEBA, application control/whitelisting and AV tools, the higher the likelihood something benign is misclassified as malicious. That’s why it is not uncommon to see false positive rates exceed 5% using the most aggressive settings.

    What if we were thinking about this wrong? Can we break this correlation between more security and more FPs?

    During this webinar we will briefly review the definition of false positives, false negatives, true positives and true negatives, as well as the history of “more protection = more FPs” paradigm. Then we will turn the paradigm on its head and discuss how more protection can actually mean fewer FPs.


    About the Speaker
    Nir Gaist, Founder and CTO of Nyotron, is a recognized information security expert and ethical hacker. He started programming at age 6 and began his studies at the Israeli Technion University at age 10. Nir has worked with some of the largest Israeli organizations, such as the Israeli Police, the Israeli parliament and Microsoft’s Israeli headquarters. He also wrote cybersecurity curriculum for the Israel Ministry of Education. Nir holds patents for the creation of a programming language called Behavior Pattern Mapping (BPM) that enables monitoring of the integrity of the operating system behavior to deliver threat-agnostic protection.
  • Peek Under the Hood of H2O Driverless AI with Auto Doc
    Peek Under the Hood of H2O Driverless AI with Auto Doc Megan Kurka, Vinod Iyengar Recorded: Aug 15 2018 60 mins
    H2O Driverless AI is H2O.ai's flagship platform for automatic machine learning. It fully automates the data science workflow including some of the most challenging tasks in applied data science such as feature engineering, model tuning, model optimization, and model deployment. Driverless AI turns Kaggle Grandmaster recipes into a full functioning platform that delivers "an expert data scientist in a box" from training to deployment.

    Driverless AI with Auto Doc is the next logical step of the data science workflow by taking the final step of automatically documenting and explaining the processes used by the platform. Auto Doc frees up the user from the time consuming task of documenting and summarizing their workflow while building machine learning models. The resulting documentation provides users with insight into machine learning workflow created by Driverless AI including details about the data used, the validation schema selected, model and feature tuning, and the final model created. With this capability in Driverless AI, users can focus on model insights and results.
  • What is 802.11ax? And how to prepare your network.
    What is 802.11ax? And how to prepare your network. Peter Thornycroft, Distinguished engineer in the CTO group Recorded: Aug 15 2018 62 mins
    Each new Wi-Fi standard has brought significant improvements in performance. Unfortunately, these gains have not been enough to keep pace with demand. There is still a need for higher speeds, better network capacity and longer battery life.
    The 802.11ax standard solves these problems and others by completely redesigning how Wi-Fi works and taking some best practices from LTE.
    Join us for a tour of the key technical ingredients of this new release, and a discussion of how it works, where it will be useful, and how you should prepare.
  • Single Realm Multi-Cloud Security Management with Palo Alto Networks
    Single Realm Multi-Cloud Security Management with Palo Alto Networks Peter Meister, Sr. Director, Research & Strategy Recorded: Aug 15 2018 59 mins
    Customers across the globe are moving past mono-cloud operations and driving fast to consume cloud capabilities from multi-cloud providers. As clients start to use this broad multi-cloud fabric, it becomes ever more important to start to look at new and innovative ways to centralize management and security.

    In this session we will cover the new paradigm of thinking around Realm Management, the ability to manage multi-cloud infrastructure security from one central point of management and start collapsing the cloud providers down to a mission-critical cloud fabric. With the Palo Alto product family under the VM Series platform in coupling with Panorama, we are able to bring to life a single pane of glass management initiative that allows for central security, control and management of Microsoft Azure and Amazon Web Services in one console. We will review the technical architecture surrounding this solution and discuss, in-depth, the principal around realm management of multi-cloud and how best to centralize security once and push across many cloud providers at scale.

    Enterprise customers are moving quickly to multi-cloud consumption, and single realm security management will optimize and enhance the way they manage enterprise cloud security going forward.
  • Cloud Security Foundations
    Cloud Security Foundations Doug Cahill (ESG) Recorded: Aug 15 2018 33 mins
    Cloud access security brokers (CASB) provide visibility and control for cloud applications (SaaS, PaaS, and IaaS), and an increasingly important part of a CASB solution is to extend data loss protection for data stored in the cloud.

    In this session, ESG Senior Analyst Doug Cahill, will discuss cloud trends and how deploying enterprise-class DLP and CASB solutions together can provide key value for your business, including:

    - Cloud Adoption Trends
    - Who is the “user”?
    - Understanding The Shared Responsibility Security Model
    - The Role of DevOps in Cloud Security
    - The Rise of the Cloud Security Architect
  • Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint
    Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint Dean Weber, CTO, Mocana and Keao Caindec, Vice President of Marketing, Mocana Recorded: Aug 15 2018 46 mins
    Part 2 Dangers of Relying on Threat Detection

    When people think about cybersecurity today, they typically think about securing data in motion and at rest or analyzing threats. But when you move into this new connected world, you need to think about more than just the data and watching hackers. How do you ensure you can trust the actual IoT endpoint device? This 3-part webinar series will focus on approaches for making devices trustworthy and enabling secure device-to-cloud communications.
  • Advanced Threat Protection: Email Best Practice Recommendations Webinar
    Advanced Threat Protection: Email Best Practice Recommendations Webinar Jimmy Lin Recorded: Aug 15 2018 50 mins
    The purpose of this webinar is to make sure our ATP Email customers are aware of all the services within this solution and that they are configured to our recommended best practices.

    The ATP Email solution consists of the following services:

    Click-time URL Protection
    Cynic sandboxing
    Auto remediation for Office 365
    Advanced Email Analytics
    Phishing Readiness
  • Understanding the Limitations of Microsoft O365 Security
    Understanding the Limitations of Microsoft O365 Security Mike Osterman (Osterman Research) Recorded: Aug 15 2018 26 mins
    Microsoft Office 365 includes native security at various levels, depending on your license. But is that enough? Osterman Research discovered that over 73% of organizations will choose to either supplement or replace native Office 365 security with third-party solutions by 2019.

    In this 30-minute session, CEO and founder Mike Osterman will discuss their findings and what’s driving these organizations’ decisions, including:

    - Organizations’ key priorities for securing O365
    - Barriers to adoption and full migration of users
    - Identifying key third-party solutions like Email Security, CASB, and DLP that can help mitigate security gaps and lower TCO

    Presenter: Mike Osterman, CEO and Founder, Osterman Research
  • Adote uma arquitetura de aplicações que garanta o sucesso
    Adote uma arquitetura de aplicações que garanta o sucesso Wagner Brunca Recorded: Aug 15 2018 68 mins
    A tecnologia digital melhora significativamente a economia e as capacidades de cada negócio, mas apenas mediante a assimilação das regras e dos sistemas que regem as experiências digitais, as operações digitais, os ecossistemas digitais e a inovação digital. Quando os líderes empresariais veem a tecnologia como um ativo empresarial que é fundamental para o sucesso, estão em condições de se transformar. Os benefícios são enormes: aqueles que os alcançam conseguem envolver seus clientes, criar ofertas, aproveitar sócios e operar seus negócios dez vezes mais rápido e dez vezes mais barato.
    Acompanhe-nos neste webinar e conheça elementos da arquitetura de aplicações modernas que todos os líderes empresariais deveriam conhecer: nuvem, API, microsserviço, análise, IoT e automatização.
  • [Webcam Panel] Trends Discussed at Black Hat 2018
    [Webcam Panel] Trends Discussed at Black Hat 2018 Charles Tendell (The Charles Tendell Show) | Eddie Lamb (6point6) | Other Panelists TBA Recorded: Aug 15 2018 60 mins
    Join this post-Black Hat panel as we look at the biggest trends and cyber threats covered during the Black Hat Conference 2018 in Las Vegas.

    Tune in for an interactive Q&A panel with industry experts across the security ecosystem as they discuss:
    - What are the biggest threats to security in 2018?
    - Key steps to take today to better secure your critical data assets
    - Top technological advancements powering security
    - CISO strategy in the age of breaches

    Speakers:
    - Charles Tendell, Renown Cybersecurity Expert, Certified Ethical Hacker & Host of "The Charles Tendell Show"
    - Eddie Lamb, Managing Director, Cyber Security at 6point6
    - Other Panelists TBA

    The session is being brought to you in partnership with ITSPmagazine.
  • The Future of Work in the 21st Century: Multigenerational Teams
    The Future of Work in the 21st Century: Multigenerational Teams Monique Morrow, President & Co-Founder, The Humanized Internet Recorded: Aug 15 2018 51 mins
    The way in which we work is changing. Technology, social norms and economic influences are impacting the working world every day.

    Did you know the right to work is a human right? It allows men and women of all ages and backgrounds to become self-reliant in dignity and free from discrimination. At a time when technology is taking over the workplace and a younger demographic is entering most workforces, it's more imperative than ever to understand the future of work and how multi-generational teams can make a meaningful impact on your business.

    Tune in with Monique Morrow, Dedicated Futurist, Technologist and Advisor, as she discusses these ever-important topics, opportunities and calls to action.
  • Top Drivers for SD-WAN Adoption
    Top Drivers for SD-WAN Adoption Scott Raynovich, Principal Analyst, Futuriom Recorded: Aug 15 2018 45 mins
    Huge demand for cloud services means huge demand for wide area network (WAN) connectivity, security, and bandwidth. It has also changed enterprise network architectures and created new challenges for Chief Information Officers (CIOs) and IT managers in charge of building networks and purchasing bandwidth for their company. The need for fast, secure access to cloud applications, demand for services and app agility, and the desire to leverage Internet connectivity is boosting demand for software-defined WAN (SD-WAN), which has more flexibility and better economics than traditional WANs.

    Tune in as Futuriom Principal Analyst R. Scott Raynovich recaps the findings of its recent SD-WAN Growth Outlook, detailing what’s driving fast adoption for SD-WAN technologies.
  • The IoT Enterprise: Why Your Organisation Is Already IoT'd
    The IoT Enterprise: Why Your Organisation Is Already IoT'd Nick Savvides, Chief Technology Officer APAC, Symantec Aug 16 2018 5:00 am UTC 60 mins
    With the potential for energy savings, improvement of business processes, automation of the supply chain and more, organisations around the world are giving IoT a serious look - but security concerns are proving to be a barrier for adoption.

    With most IoT devices and platforms missing even basic security hygiene and existing network security tools lacking the capability to properly manage an IoT network, implementing IoT devices can be a security nightmare.

    Join us in our upcoming webinar as we discuss the current state of IoT in enterprises, the challenges of properly securing IoT devices, and our top recommendations on how to resolve these challenges and prepare your organisation for the age of automation.
  • SUSE OpenStack Cloud 8
    SUSE OpenStack Cloud 8 Hargitai Zsolt Aug 16 2018 8:00 am UTC 90 mins
    Az OpenStack Pike kiadására épülő SUSE OpenStack Cloud 8 az első olyan verzió, amely integrálja a SUSE OpenStack Cloud képességeit és a SUSE által tavaly megvásárolt HPE OpenStack technológiákat. A megoldás felgyorsítja a szoftveresen vezérelt infrastruktúrák bevezetését, emellett továbbfejlesztett interoperabilitása, skálázhatósága és rugalmassága révén támogatja a nagyvállalatokat az IT-rendszer modernizálásában, és ezen keresztül az éles piaci versenyben jelentkező, új üzleti kihívások legyőzésében is. A webinárban bemutatjuk a termék legfontosabb újdonságait, valamint a legfontosabb felhasználási területeket, beleértve a szoftver alapú hálózatokat (SDN) és a konténereket. További információ a termékről: https://www.suse.com/products/suse-openstack-cloud/
  • How to Build a Robust Incident Response Capability for Financial Institutions
    How to Build a Robust Incident Response Capability for Financial Institutions Michelle Drolet, CEO, Towerwall, Inc. Aug 16 2018 12:00 pm UTC 45 mins
    Michelle Drolet CEO of Towerwall will be discussing the need for developing a solid Incident Response Program and doing Tabletop exercise throughout the year. An Incident Response Plan (IRP) will ensure information security incidents, once identified, will be handled and communicated appropriately. Consistency of how incidents are handled and communicated is paramount to a successful incident response.

    The IRP provides a quick, organized, and effective response to computer-related and physical security incidents. The IRP’s mission is to prevent a serious loss of information, information assets, property, and customer confidence by providing an immediate, effective, and informed response to any event involving your information systems, networks, workplace, or data.

    Security incident response is an organized approach to address and manage activities during and after a security breach. The goal of security incident response is to handle any information security incident in an organized and effective manner that limits damage to the organization and reduces recovery time and cost.
  • Don't Ignore Endpoint Data Protection in your Data Management Plans
    Don't Ignore Endpoint Data Protection in your Data Management Plans Kalyani Kallakuri and Gregg Ogden from Commvault Aug 16 2018 12:00 pm UTC 45 mins
    Today, most organizations already have a practical understanding of how to manage their data center. However, they often overlook or decide not to focus on data that resides on endpoints, and walk out the door on a nightly basis.

    This session will discuss the business drivers and technical challenges associated with protecting, managing and controlling data that lives on their edge devices – endpoints. 

    We will help you the answer the question : Isn’t using a cloud file-sharing service good enough?
  • Reconciling Balance Sheets with Excel4apps
    Reconciling Balance Sheets with Excel4apps Erika Creary, Missy Ojigho Aug 16 2018 12:00 pm UTC 60 mins
    The balance sheet reconciliation is a key element of ‘closing the books’. It has long been an important control to ensure the accuracy of your financial statements, which in turn highlights the financial condition of your organisation. Reconciliations can identify mistakes and misappropriations and help to ensure that internal controls are being adhered to. Stringent review and scrutiny of balance sheet accounts during the period close cycle provides key stakeholders, management and auditors with assurance that internal controls are being applied and are working effectively.

    In this webinar, we’ll discuss Balance Sheet Reconciliation – the good and the bad.

    Join us to look at contributing factors to poor balance sheet reconciliations and how Excel4apps can help you to create a robust, efficient and seamless process.

    We’ll explore:

    - Time lost to repetitive and manual manipulation of data exported into Excel
    - Frustrating dependency on IT to execute ad-hoc report customisation
    - Audit risks due to not identifying potential fraudulent, improper or material transactions quickly.

    And more…
  • Das Geheimnis erfolgreicher Unternehmen
    Das Geheimnis erfolgreicher Unternehmen Oliver Sehon (Director Analytics Integation, SAP) und Jochen Alig (Solution Consultant Senior, SAP Concur) Aug 16 2018 1:00 pm UTC 45 mins
    Nur wer seine Daten kennt, kann sie erfolgreich einsetzen. Erleben Sie anhand des Digital Boardrooms, welche Möglichkeiten die Integration von SAP Concur in die SAP Analytics Cloud bringt.

    Daten aus dem Geschäftsreisemanagement berühren viele Abteilungen:

    - Finanzverantwortliche, die sich volle Transparenz über Kosten und eine verlässliche Datengrundlage für Investitionsentscheidungen wünschen.

    - Travel Manager, die wissen wollen, wie Mitarbeiter reisen, um in Verhandlungen mit Anbietern das Maximum herauszuholen.

    - HR-Experten, für die es wichtig ist, die (Reise-)Gewohnheiten Ihrer Mitarbeiter zu kennen, um so in der Lage zu sein, deren Zufriedenheit zu erhöhen.
  • Digitalization in the Factory, How to Protect The Network for IIoT
    Digitalization in the Factory, How to Protect The Network for IIoT Rich Karpinski, 451 Research & David Knapp, Chatsworth Aug 16 2018 3:00 pm UTC 60 mins
    This presentation presents recent survey data from 451 Research [VOTE product] on trends in Digitization of the Factory from the perspective of Operational Technologists. Top use cases for the Industrial Internet of Things (IIoT) and the current project focus of IT/OT teams will be discussed. Followed by a discussion of how to protect your technology investment in non-traditional environments, including extending the network onto the factory floor, the wireless overlay, and the addition of compute and storage resources on the site (edge computing).
  • Enable SAP Predictive Maintenance/Analytics with IoT Data
    Enable SAP Predictive Maintenance/Analytics with IoT Data Roland Wartenberg, Senior Director, Global Alliances, NetApp and Juergen Hamm, SAP Solution Architect, NetApp Aug 16 2018 3:00 pm UTC 60 mins
    Out of a variety of projects, NetApp has developed a five-staged model to solve the challenge of data management in the Internet of Things domain. In this session you will learn how SAP helps customer get ready for the digital journey using SAP Business Objects for Analytics and SAP HANA. We will show, based on a real-world scenario, how IoT data are processed for predictive analytics and how a hybrid model with SAP Leonardo can be deployed.

    Key Takeaways:
    - Understand how SAP, Hadoop, and NetApp work well together
    - Learn how predictive analytics could be applied to IoT data
    - See the integration of NetApp into several SAP IoT related products
  • Webinar: Aproveche el potencial de las identidades digitales de los consumidores
    Webinar: Aproveche el potencial de las identidades digitales de los consumidores Juan Cerchia Aug 16 2018 3:00 pm UTC 75 mins
    Los consumidores de hoy no quieren esperar al servicio de atención al cliente por teléfono. Los consumidores de hoy no quieren completar formularios largos en línea para acceder a información o recursos. En resumen, el tiempo de los consumidores de hoy es valioso y no ilimitado. Como resultado, cada compañía está redefiniendo su experiencia digital en línea para maximizar la participación del cliente, mejorar la afinidad de la marca y aumentar su participación en la cartera del consumidor.

    Esta es su oportunidad para aprender cómo aprovechar la identidad digital del consumidor para fomentar una estrategia efectiva de participación del cliente. Únase a nosotros, en este Webinar y conozca casos de éxito de múltiples industrias que están explotando el poder de la identidad digital del consumidor para generar confianza y hacer que la interacción con el cliente no tenga fricciones.
  • How to Choose Influencers Based on Your Business Values
    How to Choose Influencers Based on Your Business Values Alistair Wheate Aug 16 2018 3:00 pm UTC 60 mins
    Brands are working with influencers to create marketing partnerships based on mutual value exchanges, to more effectively communicate with and influence their target audiences. These partnerships include activities such as speaking at events, co-creating content and networking with senior executives. It is therefore imperative that the influencers brands partner with can be trusted and that they share the same brand values so their voice is aligned to the brand’s messaging and that they are a good fit.

    In this webinar discussion featuring Mark Schaefer, Konstanze Alex and Tim McLoughlin we will explore how brands need to look beyond the quantitative influence numbers to decide which influencers to work with.

    Konstanze Alex is the Influencer Marketing lead at Dell. Her focus is on driving a robust global strategy for influencer content co-creation that positively impacts Dell's Share of voice.

    Mark Schaefer is a globally recognized blogger, speaker, marketing consultant, author and executive branding coach. He teaches graduate marketing classes at Rutgers University and has written six best-selling books.

    Tim McLoughlin is the Global social media head for Hotels.com encompassing all brand social media marketing across the world. He manages a team across four locations, in North America, Latin America, Europe and Asia. He has won awards for his work and talks about advertising at conferences around the world.
  • 200+ New Reasons FortiOS 6.0 is the Leading Network Security Operating System
    200+ New Reasons FortiOS 6.0 is the Leading Network Security Operating System John Maddison, SVP Products & Solutions, Fortinet Aug 16 2018 4:00 pm UTC 60 mins
    The security challenges facing organizations today can't be solved with traditional approaches. Digital transformation is creating an unending digital attack surface, point solutions are creating unprecedented complexity, and threats are constantly becoming more sophisticated.

    Watch our webinar to learn how FortiOS, the most deployed network security operating system in the world, solves today's security challenges with broad coverage, massive integrations, and time-saving automation. Specifically, learn the details on revolutionary new features that deliver better protection in all areas of the network.
  • [Ep.19] Ask the Expert: From the Office of the CTO
    [Ep.19] Ask the Expert: From the Office of the CTO Simon Evans, CTO, Amido & Kelly Harris, Senior Content Manager, BrightTALK Aug 16 2018 4:00 pm UTC 45 mins
    This webinar is part of BrightTALK's Ask the Expert Series.

    Join Simon Evans, CTO of Amido, as he takes a technical deep dive into key priorities for next-gen CTOs and what they should be considering for their 2020 strategy and beyond.

    Simon will bring perspective from both the CTO of a consultancy, but also from the perspective of their clientele who are primarily Enterprise CTOs.

    Join us for this live Q&A and get all of your questions answered!
  • How to Simplify PCI DSS Compliance with a Unified Approach to Security
    How to Simplify PCI DSS Compliance with a Unified Approach to Security Sanjay Ramnath, AlienVault; Jacques Lucas, Terra Verde; Zuri Cortez, AlienVault Aug 16 2018 4:00 pm UTC 60 mins
    Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of time and effort to access the necessary data and reports from many different systems and tools. And, after an audit is complete many teams struggle to maintain compliance.

    In this webcast, you'll hear from Jacques Lucas, a Qualified Security Assessor (QSA) with Terra Verde, and Sanjay Ramnath, VP of Product Marketing at AlienVault, sharing best practices to help you simplify implementation of PCI DSS security controls and reporting.

    Join us for this webcast to learn:

    - The most common challenges in meeting and maintaining compliance with PCI DSS
    - Best practices to help you plan and prepare for an audit
    - The core security capabilities you need to demonstrate compliance
    - How AlienVault Unified Security Management can simplify the compliance process

    Hosted By
    Sanjay Ramnath
    VP of Product Marketing at AlienVault
    Jacques Lucas
    Qualified Security Assessor (QSA) with Terra Verde
    Zuri Cortez
    Sales Engineer at AlienVault
  • VxBlock 1000: Introducing Next-Gen All-In-One Converged Infrastructure
    VxBlock 1000: Introducing Next-Gen All-In-One Converged Infrastructure Mark Geel Aug 16 2018 4:00 pm UTC 60 mins
    The new VxBlock 1000 breaks the physical boundaries of traditional converged infrastructure to give businesses unprecedented simplicity and flexibility to meet all their application data services needs. Learn how this next-generation engineered system provides unmatched choices of market-leading storage, data protection, and compute for all workloads to maximize system performance and utilization.
  • Solving the Gordian Knot of DevOps in the Hybrid Cloud
    Solving the Gordian Knot of DevOps in the Hybrid Cloud Darren Pulsipher Aug 16 2018 4:00 pm UTC 60 mins
    As software developers move to micro-service and cloud aware application frameworks, IT and DevOps professionals are having a harder time untying the complexity of managing multiple environments across multiple clouds with the number of artifacts increasing exponentially. Just like Alexander the Great, we will look at techniques and principles that cut through the Gordian knot that is being tied by the invisible hands of complexity.
  • Gain Deep Visibility into APIs and Integrations with Anypoint Monitoring
    Gain Deep Visibility into APIs and Integrations with Anypoint Monitoring Andrew Bragdon, Principal Product Manager, MuleSoft Aug 16 2018 4:00 pm UTC 60 mins
    On average, a business supporting digital transactions now crosses 35 backend systems — and legacy tools haven’t been able to keep up. This session will cover how MuleSoft’s new monitoring and diagnostic solutions provide end-to-end actionable visibility to APIs and integrations to help customers identify and resolve issues quickly.

    Key Takeaways:
    * Measure application performance across APIs and integrations in production
    * How to query and retrieve log data across your network
    * End-to-end walkthrough of priority issue identification and resolution
    * Exciting new capabilities of Anypoint Monitoring
  • Are You Expecting Too Much from Your WAF?
    Are You Expecting Too Much from Your WAF? Vinay Mamidi, Sr. Director of Product Management; Shauntinez Jakab, Director of Product Marketing Aug 16 2018 5:00 pm UTC 45 mins
    Learn How to Improve Security While Reducing Your WAF Dependency

    Web application firewalls are a popular line of defense, but they can also be difficult to manage, require too much expert tuning, and deliver floods of false positives. And many advanced attacks such as the Equifax breach have easily bypassed WAFs. Perhaps we’re asking too much from a tool that sits at the network perimeter and has limited application context.

    Join experts from Virsec for an interactive webinar discussing next-generation technology that can augment WAF protection, dramatically reduce false positives, reduce your reliance on patching, and stopping advanced attacks that weaponize at runtime (WRT).
  • Aproveite o potencial das identidades digitais dos consumidores
    Aproveite o potencial das identidades digitais dos consumidores Darcio Takara Aug 16 2018 5:00 pm UTC 75 mins
    Os consumidores da atualidade não querem ficar esperando no serviço de atendimento ao cliente por telefone. Os consumidores da atualidade não querem preencher longos formulários on-line para acessar informações ou recursos. Resumindo, o tempo dos consumidores da atualidade é valioso e limitado. Assim, cada empresa está redefinindo sua experiência digital on-line para maximizar a participação do cliente, melhorar a afinidade da marca e aumentar a participação na carteira do consumidor.

    Esta é a sua oportunidade de aprender como aproveitar a identidade digital do consumidor pra fomentar uma estratégia efetiva de participação do cliente. Junte-se a nós, neste webinar e conheça casos de sucesso de diversas indústrias que estão explorando o poder da identidade digital do consumidor para gerar confiança e fazer com que a interação com o cliente não tenha atritos.
  • Hybrid Data Analytics Live TechTALK
    Hybrid Data Analytics Live TechTALK Pradeep Bhanot - Director of Product Marketing at Actian Aug 16 2018 5:00 pm UTC 45 mins
    In this webinar featuring Actian Vector analytics database, Pradeep will provide a product overview, share case studies and include a short demo.

    You can submit your question during the event for the live Q & A.

    Download the Evaluation Edition at https://www.actian.com/try-vector/
  • How to Develop a Secure Cloud Strategy
    How to Develop a Secure Cloud Strategy Brian McHenry, Security Solutions Architect; Tom Thomas, Director of Architecture Aug 16 2018 5:00 pm UTC 60 mins
    How are you deciding what applications should move to the cloud? Is there a clear understanding of how to best secure those apps?

    Join F5’s own Director of Architecture Tom Thomas, and Security Solutions Architect Brian McHenry, as they discuss a deployment framework which you can use to assess the impact of on-premises versus cloud, while considering the business, data security, and financial impact of cloud migration.

    By the end of this webinar you’ll have the answers to these questions and more:

    • Are the security services my cloud provider offers enough to secure my applications?
    • How much of my business should migrate to the cloud?
    • What tools can help protect against the cost of lost or compromised data?
  • Project Management Made Easy
    Project Management Made Easy Rick Morris, R2 Consulting and Alf Abuhajleh, CA Technologies Aug 16 2018 5:00 pm UTC 60 mins
    Delivering projects on time, under or on budget with the limited resources can be challenging. Often, there are multiple tools to juggle – project management, time management and resource allocation and finally financials. What about those global projects spanning business units? Now layer in the executives’ requests updates, which instantly become fire drills. So much to do and only one of you.

    Join agile project management expert, Rick Morris, R2 Consulting and CA Technologies for an overview managers can overcome these common obstacles and be more successful in the enterprise.
  • Defending our Critical Infrastructure
    Defending our Critical Infrastructure Juanita Koilpillai and Mark Rasch Aug 16 2018 5:00 pm UTC 90 mins
    Critical Infrastructures such as Power, Water, Internet, Pipeline(Gas), and Smart Cities have been and continue to be attacked. This session will address the vulnerabilities and best practices for defending and protecting critical infrastructures.

    In this session, you will learn:
    Attacks most commonly used
    Defensive measures
    Best practices
  • Nimble Storage Achieves 99.9999% Availability, 287% ROI with Vertica Analytics
    Nimble Storage Achieves 99.9999% Availability, 287% ROI with Vertica Analytics Medha Bhadkamkar, Senior Manager of Data Science and Services for InfoSight, Hewlett Packard Enterprise Aug 16 2018 5:00 pm UTC 60 mins
    Join the latest webcast in our Data Disruptors Series to hear how Nimble Storage leverages flash storage and predictive analytics to deliver advanced customer insights and 99.9999% availability. The company’s InfoSight customer platform eliminates headaches and wasted time by transforming how storage is managed and supported, analyzing millions of sensors every second to prevent problems.

    On this webcast you’ll hear from Medha Bhadkamkar, Senior Manager of Data Science and Services for InfoSight, on how Nimble Storage leverages Vertica to:
    • Improve customer experience and business efficiency
    • Make storage autonomous through the use of advanced analytics
    • Predict and solve 86% of issues automatically
    • Achieve 287% ROI and annual benefit of $13.6 million
  • Leveraging Security Automation for Improved Management
    Leveraging Security Automation for Improved Management Ken Wilson, Dir, Sales Central U.S., Skybox, Michael Roling, CISO, State of MO; Curtis Dukes, CIS; Brandon Dunlap (Moderator) Aug 16 2018 5:00 pm UTC 75 mins
    Security automation technologies can help drive improvements in managing security policies, including their implementation in firewalls and other network devices. However, whether you’re struggling with continuous compliance, auditing and reporting or managing firewall changes, deciding what to automate can be challenging. Join Skybox Security and (ISC)2 on August 16, 2018 at 1:00PM Eastern for a discussion where we’ll examine which automated processes in security policy management deliver the biggest rewards while introducing the least risk to your organization. Areas to be examined include why automation, visibility and context should be the indivisible, foundational components of any security policy management solution, which processes in security policy management are ripe for automation and where human intervention is still valuable. We’ll also explore how to educate security stakeholders in your organization on what’s needed to make automation initiatives a success.