Hi [[ session.user.profile.firstName ]]

Information Technology

  • Delivering an Effective Cyber Security Exercise: Enhanced Breach Response
    Delivering an Effective Cyber Security Exercise: Enhanced Breach Response
    Daniel Norman, Research Analyst, ISF Live 45 mins
    Organisations are constantly under threat with over two-thirds of them experiencing data breaches in 2018. As a result, preparedness and resiliency are paramount to protecting an organisation’s information from cyber attacks.

    Business leaders and their security teams can improve their ability to handle cyber attacks by running cyber security exercises. These exercises should help the organisation identify areas of improvement in people, process and technology, reducing the impact should a real cyber attack occur.

    In this webinar Daniel Norman, Research Analyst, ISF will share how organisations should approach running internal cyber security exercises to support breach identification, prevention and response.
  • Trust, Transparency, and the Opportunity of Artificial Intelligence
    Trust, Transparency, and the Opportunity of Artificial Intelligence
    Richard Tibbetts - Product Manager, AI, Tableau | Kris Skrinak - Machine Learning Lead, AWS Live 57 mins
    The promise of artificial intelligence (AI) is that machines will help humans make better decisions. In some cases decisions are automated away; in other cases humans collaborate with AI to make the best decisions. In all cases, people need to understand what machines are doing, to avoid mistakes, to make ethical decisions, and to understand their data.

    Gartner research indicates “85% of CIOs will be piloting artificial intelligence programs through a combination of buy, build, and outsource efforts.” But as organisations become more reliant on AI and machine learning models, how can humans be sure they are receiving trustworthy answers to the right questions?

    Attend this webinar to hear directly from the developers at Tableau who lead our investments in AI and learn about our plans to partner with AWS.
  • Key Insights: How PayPal is using Symantec Security to protect their endpoints
    Key Insights: How PayPal is using Symantec Security to protect their endpoints
    Joakim Lialias, Symantec | Sundeep Vijeswarapu, PayPal | Fernando Montenegro, 451 Research Live 60 mins
    As attackers become more sophisticated, advanced protection and hardening are necessary for added layers of security.

    Hear from Joakim Liallias, Symantec and special guest speakers Sundeep Vijeswarapu from PayPal and top industry analyst Fernando Montenegro, 451 Research as they discuss:

    - How to gain a better understanding about the trends that are driving the need for a more comprehensive endpoint security approach.
    - How PayPal is using Symantec Endpoint Security to protect their endpoints.
    - How Symantec is redefining endpoint security with its new complete cloud-delivered endpoint defense:
    - Introducing never seen before innovation to deliver best-in-class prevention
    - Hardening Detection and Response to help customers achieve superior threat prevention,
    - Quicker identification of attackers and more tightly integrated technology and human expertise lead to better response and faster remediation
    - Security professionals and IT teams are strapped for time – streamlined management and automation will reduce significant burden

    Don't miss this great opportunity to get the latest information to simplify Endpoint Security for your organization.
  • Building a Culture of Secure Programming in your Organisation
    Building a Culture of Secure Programming in your Organisation
    Amanvir Sangha, Consultant, Synopsys Recorded: Feb 20 2019 70 mins
    We all know that fixing defects early in the SDLC is the right approach to building secure software. Security needs to be in every part of the pipeline but it’s often hard to get everybody onboard with software security initiatives.

    Come join us on this webinar to explore how to build a culture of proactive secure programming in your technical organization and how to implement security as an enabler without disrupting the velocity of projects in modern development teams. See how Synopsys tools and services can allow you to build secure, reliable and quality software.
  • Data Cataloging - Essential for your Analytics Modernization Initiatives
    Data Cataloging - Essential for your Analytics Modernization Initiatives
    Helen Kinsella, Senior Product Specialist, Informatica Recorded: Feb 20 2019 42 mins
    Data landscapes are changing constantly, and data is exploding. Companies have ambitious plans to expand and disrupt markets based on data. Business users want answers to many complex business questions.

    However, finding the right data is not a trivial task.

    No matter how modern your modern analytics platform is, unless your business users can find, trust, understand the context of, and quickly leverage their data assets throughout the enterprise, your analytics modernization initiative will probably deliver underwhelming results.

    Data cataloging is an essential component for a modern analytics initiative, supporting self-service discovery and access to data.

    Join this webinar to

    •Hear how Informatica Enterprise Data Catalog enables both business and IT users to discover, understand, curate, and manage all data assets across the enterprise.
    •See an AI-powered data catalog in action
    •Find out what your next steps might be to accelerate your data-driven digital transformation through data insights and decisions based on trustworthy and relevant data
  • Live Cloud Masterclass: Why cloud thrives or dies on your infrastructure
    Live Cloud Masterclass: Why cloud thrives or dies on your infrastructure
    David Simpkins, Anne-Gaëlle Santos, and Maarten Verhaegh from BT Recorded: Feb 20 2019 24 mins
    Cloud adoption is mainstream, but accelerating.

    Recent research from the Cloud Industry Forum found that nine in ten organisations (89%) currently use cloud-based services and the vast majority (85)% expect to increase their usage over the next 12 months.

    So, it’s a good time to explore the potential challenges, risks and rewards of multi-cloud adoption, so you can identify how to best exploit the benefits, while also avoiding the pitfalls.

    In an earlier webinar, we highlighted 3 common challenges that organisations face with multi-cloud adoption:
    - traditional infrastructure not supporting cloud transformation
    - complexities of multi-cloud management
    - attraction and retention of the right skills and tools to manage and secure hybrid cloud

    In this live expert panel, we turn our focus on infrastructure and explore in more detail why cloud networking in particular is so critical to your cloud strategy.

    Join our experts as they share their in-depth experience and learning and get some valuable tips on how to get your multi-cloud strategy in good shape.

    Speakers:
    David Simpkins – general manager, managed services and public cloud, BT
    Anne-Gaëlle Santos - head of dynamic network services, BT
    Maarten Verhaegh - head of cloud strategic alliances, BT
  • How to Accelerate Serverless Application Development
    How to Accelerate Serverless Application Development
    Asankha Perera and Chathura Widanage, SLAppForge Live 53 mins
    Join Asankha Perera and Chathura Widanage from SLAppForge to learn about:

    - A significantly more productive IDE for Serverless computing
    - How to develop an end-to-end Serverless application in a few minutes
    - How to build, test and deploy applications without leaving the IDE
    - Work hands-on with the AWS API Gateway, Lambda, DynamoDB and S3
    - Learn about upcoming features - Serverless security and monitoring
  • 2019 IT New Year Resolutions
    2019 IT New Year Resolutions
    Girish Dadge, Director Product Management and Ryan Boyer, Partner Solutions Architect - Sungard AS Recorded: Feb 20 2019 31 mins
    Follow us throughout this series as we discuss The Sungard AS Amazon Web Services (AWS) portfolio, which includes Cloud Recovery- AWS and Managed Backup- AWS, as well as Managed Cloud- AWS for everyday production systems.
  • A Day in the Life of a SOC Analyst
    A Day in the Life of a SOC Analyst
    Adam Meyers: VP Intelligence - CrowdStrike, Kurt Baker: Senior Director of Product Marketing for Intelligence - CrowdStrike Recorded: Feb 20 2019 49 mins
    Today’s security Operation Center (SOC) teams are challenged by the volume and growing sophistication of cyber threats. The typical SOC receives tens of thousands of alerts each week, yet, due to a lack of time and resources, only a small percentage will ever be investigated.

    This webcast, "A Day in the Life of a SOC Analyst," looks at typical SOC activities, including the pitfalls and failures, and offers a new approach to alert investigation and response. Join CrowdStrike VP of Intelligence Adam Meyers to gain an understanding of how integrating and automating threat intelligence with endpoint protection can accelerate incident research, streamline the investigative process and drive better security responses.

    Attend this webcast to hear CrowdStrike experts discuss:

    - How you can cut your incident investigation time from 8 hours to 10 minutes
    - How SOC teams can focus on the most relevant threats — the ones that reach your endpoints
    - How you can automatically investigate all incidents, learn from attacks, and accelerate your decision-making and response
    - Why understanding custom indicators of compromise (IOCs) is critical and how they can help you defend against future attacks
    - How to get ahead of adversaries by understanding their motivations and tradecraft, enabling you to predict and anticipate their next move
  • Modernising Enterprise Communications Infrastructure Webinar
    Modernising Enterprise Communications Infrastructure Webinar
    Ciaran Bolger, Ed Humpleman Recorded: Feb 20 2019 38 mins
    Oracle has the complete set of solutions to transform your customers legacy communication environment into a platform for innovation. Nuvias can help you build more agile and extensible communications solutions that deliver state-of-the-art collaboration capabilities while protecting existing investments and future-proofing their network.
  • „Erkenntnisse aus dem neuesten Internet Security Threat Report (ISTR) 2018“
    „Erkenntnisse aus dem neuesten Internet Security Threat Report (ISTR) 2018“
    Candid Wuest and Alexander Peters Recorded: Feb 20 2019 60 mins
    Verpassen Sie die Möglichkeit nicht, sich mit den führenden Analysten von Symantec über die Erkenntnisse aus dem neuesten Internet Security Threat Report (ISTR) aus dem Jahr 2018 auszutauschen.
    Erhalten Sie tiefe Einblicke in die Themen:

    - Der Goldrausch der Cryptominen
    - Der sich wandelnde Trend der Ransomware-Infektionen
    - Details über gezielte Cyber-Angriffe
    - Infektionsgefahren durch Softwareupdates
    - Die Welle der mobilen und IoT Bedrohungen setzt sich fort
  • Live-Webinar: Applikations-, Prozess- & Infrastruktur-Modernisierung - Teil 1
    Live-Webinar: Applikations-, Prozess- & Infrastruktur-Modernisierung - Teil 1
    Ingo Pieper, Solution Architect AMC, Micro Focus Recorded: Feb 20 2019 54 mins
    Unternehmensapplikationen bilden das Herzstück der digitalen Geschäftswelt und müssen erheblich mehr leisten als je zuvor. Ständig werden neue Verbindungen geschaffen, Änderungen und Verbesserungen vorgenommen. Und das ist bei vielschichtigen Anforderungen in einer immer komplexeren IT-Welt mit Risiken und Herausforderungen behaftet. Hinzu kommt, dass Änderungen quasi schon gestern hätten fertig sein sollen!

    Doch wie kann man den Anforderungen von heute gerecht werden und Innovationen schneller liefern? Micro Focus einzigartiger Ansatz basiert auf der Überzeugung, Werte zu bewahren und darauf aufzubauen, statt sie über Bord zu werfen. Sie sollen nachhaltig wirken und in der stets ändernden hybriden IT-Welt lebendig bleiben. Das erreichen wir durch eine Modernisierung mit DevOps-Verfahren und Automatisierungen für die schnellere Bereitstellung neuer Funktionalitäten.

    In dieser Webinarreihe stellen wir Ihnen marktführende Lösungen vor, mit denen Sie unterschiedliche Modernisierungsstrategien umsetzen können, um Ihr Unternehmen in der Schaffung neuer Geschäftsfelder besser, schneller und ohne Risiko zu unterstützen.

    Webinar 1: 20. Februar
    Im ersten Webinar dieser Reihe zeigen wir Ihnen, was die Modernisierungslösungen von Micro Focus basierend auf den drei Pfeilern Applikations-, Prozess- und Infrastruktur Modernisierung für Sie leisten können. Erfahren Sie, wie Sie mit der richtigen Technologie Ihre Kernsysteme mit .NET, JVM, Docker, Azure und AWS, APIs, Web und mobilen Lösungen betreiben und verbessern können, indem Sie agile Prozesse, DevOps, CI und kontinuierliche Auslieferungsprozesse nutzen.
  • Workshop HYCU, la única solución de recuperación y respaldo dedicada a NUTANIX
    Workshop HYCU, la única solución de recuperación y respaldo dedicada a NUTANIX
    Xavier Stern, Territory Director Southern Europe, HYCU, Inc. Recorded: Feb 20 2019 46 mins
    Buen día,
    Deseamos invitarle a nuestro workshop de HYCU, la única solución de recuperación y respaldo dedicada a NUTANIX
    HYCU es la única solución de respaldo y seguridad dedicada a NUTANIX (AHV, ESX), para complementar la protección de datos proporcionada de forma nativa por NUTANIX.
    Certificado en AHV (HYCU se desarrolla en primer lugar en Acrópolis) ESX, Nutanix Files, Volume Groups, y CALM .
    HYCU, socio tecnológico estratégico de Nutanix.
    Nutanix utiliza la solución de HYCU para sus copias de seguridad.
    Los esperamos!
  • Remediating Threats by Bridging Islands of Security
    Remediating Threats by Bridging Islands of Security
    Terence Grey, Senior Systems Engineer, ANZ, Infoblox Recorded: Feb 20 2019 63 mins
    Most organisations have multiple products and services, from multiple vendors and suppliers to address their cybersecurity needs. The lack of integration and inability to share critical information results in silos of technology that cause inefficiency, lack of agility, limited visibility and a poor security posture. How can an organization solve and streamline to improve their cybersecurity operations?

    Join Infoblox and (ISC)² on Feb 20, 2019 (Wed) at 14:00 (GMT +8) to learn how to assist organisations in improving their security operations and reducing time to containment.

    Presenter: Terence Grey, Senior Systems Engineer, ANZ, Infoblox
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • エンドポイントセキュリティの再定義 -シマンテックの「完全なエンドポイント防御」
    エンドポイントセキュリティの再定義 -シマンテックの「完全なエンドポイント防御」
    世羅 英彦, プリンシパルセールスエンジニア, 株式会社シマンテック Recorded: Feb 20 2019 57 mins
    平素より格別のご高配を賜り厚く御礼申し上げます。

    進化を続ける今日のIT環境においても、攻撃者はより洗練された攻撃手法でネットワークに侵入し続け、エンドポイントへの到達を試みます。サイバー攻撃の対策のため複数のセキュリティ製品を導入、運用するのは困難を極めます。

    このような課題に対処すべくシマンテックは「完全なエンドポイント防御」を実現します。
  • AWS Backup and Disaster Recovery: The Ultimate Checklist (APAC)
    AWS Backup and Disaster Recovery: The Ultimate Checklist (APAC)
    Chris Hiatt - Systems Engineer, N2WS Recorded: Feb 20 2019 60 mins
    The promise of the cloud has been a more agile, cost-effective and disaster-proof way to scale. However, this promise comes with some fine print - AWS and other public cloud providers guarantee the safety of your infrastructure but not your data.
    Join our LIVE session to find out more about:
    •Why you need to protect your AWS environments and why native backup is just not enough
    •How to perfect rapid, granular disaster recovery
    •How you can reach application consistency for 100% uptime
    …and more!
  • How Coding is Driving Women's Empowerment in Gaza
    How Coding is Driving Women's Empowerment in Gaza
    Rana Alqrenawi - Product Development & Women's Inclusivity Manager, Gaza Sky Geeks Accelerator Recorded: Feb 19 2019 56 mins
    Rana Alqrenawi, coder and business developer in Gaza, works to have better young female participation in entrepreneurship and coding.

    Join Rana to learn how coding is driving women's empowerment in Gaza, and how the lessons and challenges can help you overcome your challenges.
  • Facts and Myths about Stolen Credentials
    Facts and Myths about Stolen Credentials
    Alex Holden, CISO, Hold Security Recorded: Feb 19 2019 62 mins
    The simplest way to compromise systems is not by hacking but through use of previously stolen information like credentials that would let the bad guys walk in through the front door and take everything.
    Therefore, stolen credentials have a high demand on the Dark Web and we are constantly barraged by news about massive credentials thefts.
    You should be protecting your users from losing their credentials and subsequent abuse. However, you should also protect them against misinformation about "new" credentials cache discoveries.

    After being credited with the largest legitimate stolen credentials discoveries, I feel like one of the world's foremost experts to provide you with insights about critical thefts.
  • How to Automate Application Stack Deployments
    How to Automate Application Stack Deployments
    Marc Petrivelli, Consulting Architect, Red Hat, and Benjamin Leung, Consultant, Red Hat Recorded: Feb 19 2019 60 mins
    Many organizations are facing a difficult challenge to automate their systems. They worry it will require ample resources to write custom code they think is required.

    Fortunately, there is another option. Organizations can use Red Hat® Ansible® Automation to write simple task descriptions that even new team members can understand the first time. Using Ansible Automation saves upfront costs and makes it easier to react to change over time.

    In this webinar, we will discuss how to:
    > Look at an app and its dependencies to construct a common framework for deployment.
    > Deploy multitier applications reliably and consistently, all from a singular common framework.
    > Configure services and push application artifacts from a common system.
  • Know your Vendor Risk
    Know your Vendor Risk
    Rema Deo, Managing Director, 24By7Security, Inc. Recorded: Feb 19 2019 56 mins
    About this webinar:
    We discuss key requirements related to a Vendor Risk Assessment. If you have vendors performing important duties for you and/ or have access to your or your clients' confidential information, you may need to perform a Vendor Risk Assessment. This session is part of our Cyber Conversations webinar series.

    Learn, among other topics, how to:
    - Identify the vendors that need a risk assessment.
    - Risk Rating your vendors
    - How do you go about performing a step-by-step vendor risk assessment, sometimes also called a Third Party Risk Assessment or Third Party Information Security Assessment?

    CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. We will issue a Certificate of Completion to those who attend the webinar, to the specific email address and attendee name on the registration form. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar.
  • Money Makes the Cyberattacks Go ‘Round: Stealing Data Easier than Stealing Money
    Money Makes the Cyberattacks Go ‘Round: Stealing Data Easier than Stealing Money
    Nathan Rowe, Chief Product Officer & Co-Founder, Evident Recorded: Feb 19 2019 42 mins
    Cybercriminals can easily monetize stolen data, either by leveraging it themselves for fraudulent activity, or by selling it –– either way, they’re getting paid.

    Digitally innovative hackers who target non-profit, educational, government, and other industries with minimal cyber defense mechanisms often find it easier to steal financial or medical records than it is to steal actual money, which further contributes to the value of personal data.

    Companies are handling and collecting more and more personal data than ever before… just one small lapse or vulnerability, and a hacker can potentially gain access to volumes of sensitive personal data.

    In this webinar, we’ll discuss why it’s just as important to safeguard your employees’ and customers’ personal data as it is to protect your bank account.

    Key Takeaways
    - Why cybercriminals prioritize data hacking for financial gain
    - The increasing value of data translates directly to dollars saved/lost
    - Mitigating the liability of handling data can be your best security measure
  • Why Cloud Security Requires a Strong Application Identity
    Why Cloud Security Requires a Strong Application Identity
    Amir Sharif Recorded: Feb 19 2019 31 mins
    Zero Trust security for microservices, containers and cloud works through the transparent generation of strong application identity. This identity is used for authenticating and authorizing application component interaction with themselves, user interfaces, and external services. In this webinar we will discuss how enterprises can adopt microservices and the cloud while leveraging their existing, brownfield infrastructure without compromising security.
  • Leveraging Your SIEM to Implement Security Best Practices
    Leveraging Your SIEM to Implement Security Best Practices
    Rohit Chettiar, Detection & Response Solutions Engineer, Rapid7 Recorded: Feb 19 2019 28 mins
    The biggest challenge that security analytics addresses is the volume and diversity of information that can be analyzed at a given point to assist security professionals in detecting, responding to and mitigating cyber threats. But how do you leverage that data to implement security best practices?

    InsightIDR is a single solution that provides visibility across your traditional on-premise environment, but also extends monitoring to your remote endpoints and cloud services. Join us to learn how InsightIDR provides visibility into your network and highlight useful metrics to implement security best practices.

    In this webcast, we will discuss:

    1. How to make security analytics more consumable
    2. The data sources you need to collect and analyze
    3. How InsightIDR leverages pre-built analytics to detect top attack vectors
  • Gearing up for 2019 — Best Practices to Consider
    Gearing up for 2019 — Best Practices to Consider
    John Strand and Jake Williams - SANS Senior Instructors & John Pescatore, SANS Director of Emerging Security Trends Recorded: Feb 19 2019 126 mins
    Join John Strand and Jake Williams - SANS Senior Instructors along with John Pescatore, SANS Director of Emerging Security Trends for a discussion on your best strategies to consider for 2019 to build and maintain your cybersecurity defenses. This special 2 hour webcast includes talks from John Strand and Jake and is followed by a lively panel of all three experts. Sponsored by Cisco.
  • Drive Self-Service & Standardisation in the First 100 Days of Cloud Migration
    Drive Self-Service & Standardisation in the First 100 Days of Cloud Migration
    Clive D'Souza, AWS Service Catalog | Demetrius Comes, VP of Engineering, GoDaddy Inc. | Ketal Patel, Sr. Manager, GoDaddy Inc Feb 20 2019 2:00 pm UTC 60 mins
    Learn how GoDaddy achieved self-service, standardisation, and governance through AWS Service Catalog in the first 100 days of their cloud migration journey. We walk through GoDaddy’s use case of how they migrated to AWS with AWS Landing Zone, AWS Service Catalog, and the initial 100 days to establish their Cloud Center of Excellence to increase their speed of delivery and improve performance and reliability, while not sacrificing on security and financial controls.
  • The Orchestration Journey in Incident response
    The Orchestration Journey in Incident response
    Andy Yeates, Solutions Architect, IBM Resilient Feb 20 2019 2:00 pm UTC 45 mins
    Organisations today need to be agile, and dynamic in responding to the most advanced cyber threats, and although automation has it's place in improving SOC efficiencies, human intelligence is still one of the most important aspects in effective incident response.

    In this session learn more about the journey to Intelligent orchestration and how leveraging it in an uncertain world can empower your organisation.
  • Making AI work for you
    Making AI work for you
    Wayne Speechly: Principal Director, Dimension Data and Richard Sutherland: Global Technical Account Manager, Intel Feb 20 2019 2:00 pm UTC 60 mins
    Mainstream Artificial Intelligence (AI) may still be in its infancy, but it offers real business benefits today. Join Wayne Speechly and Richard Sutherland as they discuss how AI is penetrating the workplace and how it is causing business leaders to rethink how they run their organisations.
  • Live filmed panel:How to Make your Network Smarter with Application Intelligence
    Live filmed panel:How to Make your Network Smarter with Application Intelligence
    Keith Langridge & Hasan Javed from BT, and Jon Howes & Ricardo Belmar from Infovista Feb 20 2019 2:00 pm UTC 30 mins
    The pressure is on to deliver a smarter network for the future. So what’s holding you back? You could be losing around 2.6% of your annual revenues because of slow running applications and downtime.

    It’s tricky to get sufficient visibility of your key applications and as you take on board more cloud services or digitise your operations, you may end up with blind-spots and inefficiencies.

    In our upcoming live filmed webinar, experts from BT and Infovista will discuss how to get a full end-to-end view across your application and network infrastructure, improve performance and deliver the user experience your customers and employees demand.

    You’ll find out more about :
    • automated control of the user experience, optimised per user
    • how to truly gain the benefits of the cloud in your digital transformation
    • some unique ways to work with Microsoft business applications
    • application intelligence in the era of SD-WAN

    Presenters:
    • Keith Langridge - Vice President, Network Services, BT
    • Hasan Javed - Senior Product Manager,, Connect Intelligence Infovista, BT
    • Jon Howes - Senior Vice President, Global Channels, Infovista
    • Ricardo Belmar - Senior Director, Global Enterprise Marketing,, Infovista
  • The evolution of analytics: From BI to AI
    The evolution of analytics: From BI to AI
    Alvin Chan, Head of Product & Data Science, and Paul Way, VP Sales. Feb 20 2019 3:00 pm UTC 33 mins
    The session will discuss how analytics have evolved, from traditional BI and data warehousing to big data and data visualisation and now to next generation augmented analytics.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Clarence Hill, David Kennedy Feb 20 2019 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Clarence Hill, Senior Manager, PS Advisory Services
    •David Kennedy, Managing Principal, Open Source Intelligence

    This month's theme: Device Overlays

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Micro-Segmentation based Network Security Strategies
    Micro-Segmentation based Network Security Strategies
    Yoni Geva, Product Manager Feb 20 2019 3:00 pm UTC 60 mins
    As cyber threats become more sophisticated, companies of all sizes are struggling to stay secure. Regardless of how many different firewalls you use, it’s merely a matter of time until a threat gets through. To prevent serious breaches, networks must be internally segmented to stop hackers moving freely inside the network and exfiltrating data – but network segmentation must be designed and managed correctly if it’s to be successful. This webinar will examine how to build a micro-segmentation strategy that truly protect your organization’s valuables.

    In this webinar, Yoni Geva, Product Manager at AlgoSec will cover:

    • Segmentation challenges
    • Micro-segmentation explained
    • Micro-segmentation strategy benefits
    • Micro-segmentation strategy development – first steps
    • Implementation Do’s and Don’ts
  • Grow Your Integration Business with Jitterbit in EMEA
    Grow Your Integration Business with Jitterbit in EMEA
    Andrew Leigh Feb 20 2019 3:00 pm UTC 60 mins
    API’s are redefining every platform and every platform and company must have an API strategy. JB can help you build an API Integration Strategy to any platform: Salesforce, SAP, Netsuite, ServiceNow or Workday.
    Our SI’s are adding value to their solutions by connecting platforms in exciting ways. Learn how to build your API and integration competency within your practice teams with a free consultation! You maybe asking why partner with Jitterbit? Jitterbit was ranked as a Leader in the Gartner Magic Quadrant for Integration Platform as a Service (iPaaS) the last three years in a row and #1 in customer satisfaction on G2Crowd. And The EiPaaS market is growing 70% YoY! So it’s a good time to partner with the market leader!
  • Relational Visibility for Pure FlashArray Storage
    Relational Visibility for Pure FlashArray Storage
    Brock Peterson & Peter Haagenson Feb 20 2019 4:00 pm UTC 30 mins
    Solve problems faster with real-time monitoring and predictive analytics for Pure Storage FlashArray, delivered in vRealize with this Management Pack by Blue Medora. Adding Pure Storage alongside the virtual layer in vRealize Operations translates to shorter times to resolution and better reliability for your business-critical applications.
  • Makeover Monday Viz Review - week 8, 2019
    Makeover Monday Viz Review - week 8, 2019
    Andy Kriebel, Head Coach and Tableau Zen Master at The Data School & Eva Murray, Head of BI and Tableau Zen Master at Exasol Feb 20 2019 4:00 pm UTC 75 mins
    Get live feedback on your MakeoverMonday viz in this weekly webinar. Submit your viz by tagging #MMVizReview on Twitter.

    VIZ REVIEW is our way to provide comprehensive feedback for those who want to learn more.

    Find out everything you need to know about Makeover Monday on www.makeovermonday.co.uk (http://www.makeovermonday.co.uk/) and join the conversation on Twitter by following Andy (@VizWizBI) and Eva (@TriMyData) as well as the #MakeoverMonday community.
  • The Four Levels of Thinking as a Geek Leader
    The Four Levels of Thinking as a Geek Leader
    Tom Cooper, Principal Geek, Bright Hill Group Feb 20 2019 4:00 pm UTC 60 mins
    As a highly technical expert, you have been successful because of your expert skills. People hire and promote you because of your talent and ability to solve hard problems. This is true. It's also not enough.
    What no one tells you is that you're only looking at one of the three factors that lead to career success.
    In this session, you will:
    - Learn the other two factors (and what you should do about them)
    - Learn the four levels of thinking needed to be an expert who leads
    - Assess where you are in each of the areas
    - Identify at least 2 practical things that you can do to improve your influence, get more support for your ideas and projects and gain more respect as a professional.
  • Converged SAP Infrastructure Use Cases with NFLEX for SAP Environments
    Converged SAP Infrastructure Use Cases with NFLEX for SAP Environments
    David Neugebauer, Sr. Business Development Mgr, Fujitsu Feb 20 2019 4:00 pm UTC 60 mins
    Today SAP customers face challenges when migrating their existing environments to SAP HANA in-memory solutions, while addressing growing needs for hybrid scenarios. Integrated System NFLEX for SAP Environments, running under Windows as well as Linux, brings simplicity and flexibility to SAP operations. The easy-to-use, integrated converged platform runs on both, Windows and Linux. The solution manages all types of SAP applications as well as all other workloads. Join us to learn more!
  • Cybersecurity & Industry 4.0: Protecting the Industrial Sector
    Cybersecurity & Industry 4.0: Protecting the Industrial Sector
    Grant Burst Feb 20 2019 4:00 pm UTC 45 mins
    ICS, SCADA, NERC Compliance... the industrial sector of today faces major challenges in terms of cybersecurity to protect and defend its systems against cyber attack. In an age where IT and OT are converging, a threat to ICS is a threat to production, finances, and even public safety.

    In this webinar, you'll discover:
    - What threats are the Industrial sector facing?
    - What challenges are there to implementing cybersecurity
    - How can these challenges be overcome to enact robust security practices across all IT and OT systems?
  • Support Your Continuous Operations by Architecting Oracle Database
    Support Your Continuous Operations by Architecting Oracle Database
    Tony Palmer, Enterprise Strategy Group; Marcus Thordal, Brocade; Eduardo Freitas & Tony Huynh, Hitachi Vantara Feb 20 2019 5:00 pm UTC 60 mins
    Join Tony Palmer, senior analyst from Enterprise Strategy Group, and technical experts from Hitachi Vantara and Broadcom as we discuss how customers can achieve strict zero RTO/RPO objectives for mission-critical Oracle database deployments.

    •Join experts from Enterprise Strategy Group, Hitachi Vantara and Broadcom as we discuss how you can achieve strict zero RTO/RPO SLO’s for your Oracle database deployment.
    •Learn best practices to maximize Oracle performance on Hitachi Virtual Storage Platform (VSP) and Hitachi Unified Compute Platform (UCP).
    •Ask your toughest Oracle questions and, if you can stump the experts, win a prize!
  • OMG, you want me to write a book? How to create a book to support your business
    OMG, you want me to write a book? How to create a book to support your business
    Christina Henry de Tessan and Meghan Harvey of Girl Friday Productions Feb 20 2019 5:00 pm UTC 60 mins
    Thanks to advancing technology, easier-than-ever distribution, and direct-to-reader marketing opportunities, there has never been a better time to publish your own book. But let’s be honest. It’s one thing to want a book and quite another to know where to start. In this IW fireside chat, the Girl Friday Productions team explains how a book can elevate your visibility and how to create the right content for your brand.

    In this webinar, you’ll learn:

    -- Why books matter more than ever in a day and age dominated by social media.
    -- How creating a book is easier than ever thanks to a rapidly changing publishing industry.
    -- How to go about it so that you end up with the book that’s right for you, your message, your brand, your audience.
    -- Practical advice on how to set yourself up for success.
  • To Whack or Not to Whack — Incident Response and Breach Mitigation
    To Whack or Not to Whack — Incident Response and Breach Mitigation
    Danny Akacki, Sr. Technical Account Manager, Gigamon Insight and TJ Biehle,Sr. Technical Account Manager, Gigamon Insight Feb 20 2019 5:00 pm UTC 45 mins
    To whack, or not to whack, that is the question:
    Whether ‘tis nobler in the mind to torch all
    The compromised boxes on your poor network,
    Or to take arms against a sea of malware
    And by blocking stop them all.

    So, what do you do during an active security incident? When is the proper time to whack-a-mole with your mallet? Is it better to light everything on fire and start over, or should you make observations a key component of your response and mitigation strategy? In this webinar, we'll discuss strategies for when it's time to scorch the earth versus sit back with a cup of tea, gaining intel into what active adversaries are doing in your house.

    We’ll break down some of the most important points to remember during the commotion of an active incident response, including:

    •Context is king. We’ll explain the important questions you need to be ask when scoping an incident to get an improved view of the situation.
    •Thinking fast and slow. It’s understandable to want to nuke everything from orbit just to be thorough, but it’s usually not the smartest play. We’ll outline the potential benefits and risks of hasty containment and remediation efforts versus slow, thoughtful analysis when executing a response game plan.
    •The law of diminishing returns. There can be a tipping point where the cost of your decisions and polices no longer justify the answers you’ll find. We’ll talk you through some tactics to find the sweet spot between effort and return.
  • Immersive Learning in HiEd - Preparing Tomorrow’s Workforce Ready Students
    Immersive Learning in HiEd - Preparing Tomorrow’s Workforce Ready Students
    Dr. Ann McNamara – Associate Professor, Texas A&M and Jennifer Sigmund – Sr. Higher Education Strategist, Dell EMC Feb 20 2019 5:00 pm UTC 60 mins
    Today’s employers are demanding graduates who are well versed in research, problem-solving and collaboration. Hear from Dr. McNamara from Texas A&M on how augmented and virtual reality innovations are used in the classroom to prepare students for today’s rapidly changing workplace.

    Presenters:
    Dr. Ann McNamara – Associate Professor, Associate Dept Head, Graduate Program Coordinator, Dept of Visualization, Texas A&M

    Jennifer Sigmund – Sr. Higher Education Strategist, Dell EMC
  • Insights That Drive Revenue: How to Transform Your Marketing Analytics
    Insights That Drive Revenue: How to Transform Your Marketing Analytics
    Andrew Richardson, Elite SEM & Matt Hertig, Alight Analytics Feb 20 2019 5:00 pm UTC 60 mins
    Ready to build a marketing analytics practice that delivers powerful insights and lightning-fast reporting — and ultimately boosts your revenue?

    In this webinar, you’ll hear from Elite SEM’s Andrew Richardson how Elite, one of the nation’s largest digital agencies, has streamlined and evolved its analytics — and how that’s allowed them to achieve even greater results for its clients.

    And you’ll discover a proven framework for advancing your own marketing analytics practice, courtesy of Alight Analytics’ Matt Hertig.
  • Microservices Security: It Will Get Worse Before it Gets Better
    Microservices Security: It Will Get Worse Before it Gets Better
    Eric Sheridan, Chief Scientist, WhiteHat Security Feb 20 2019 5:00 pm UTC 60 mins
    For every 100KLOC, a monolithic application will have an average of 39 vulnerabilities whereas a microservice application will have an average of 180 vulnerabilities. You read that right. According to the data gathered from WhiteHat Security’s 2018 Stats Report, the transition of enterprise monolithic applications to distributed microservices architectures is actually increasing the overall average of total vulnerabilities. But why? Why is it that we seemingly continue to make the same mistakes again and again? And what does this say about the security of microservices architectures, or the developers that build them? The journey to a microservices architecture generally involves the decomposition of an already existing monolith application, wherein previous security assumptions and considerations are often questioned and sometimes invalidated.
     
    Join Eric Sheridan, Chief Scientist at WhiteHat Security, for a dive into the security trends of microservice architectures. Participants of this talk will learn…
    •Why we are seeing an increase in the number of vulnerabilities with the migration to microservices
    •The most common vulnerability classes facing applications of microservices architectures
    •Strategies that can be used to more readily find and fix vulnerabilities earlier in the development lifecycle
  • Learn What’s New in Sencha Ext JS 6.7 & Tooling
    Learn What’s New in Sencha Ext JS 6.7 & Tooling
    Sandeep Adwankar, Sr. Product Manager at Sencha Feb 20 2019 6:00 pm UTC 60 mins
    We recently announced the release of Sencha Ext JS 6.7, which includes enhancements to the Modern and Classic toolkits, tooling updates for ExtGen, Cmd and the JetBrains, Eclipse and Visual Studio IDE plugins, and new Ext JS examples.

    Join us on February 20th to see the new modern features in the Ext JS 6.7 release in-action, including:

    - Grid Filtering - Easily display grid records that meet multiple criterias of text, boolean, date and number filters
    - Locking Grid - Similar to Excel, lock columns in left or right regions
    - Chip - Material design-inspired compact component with thumbnail and text
    - Multiselect Combobox - Combobox with the ability to select multiple chips
    - Multiselect Select - Easily select multiple values in the select field
    - Color Picker - Beautiful color picker available with HSVA and RGB options

    You will also see what’s new with Ext JS tooling, including updates to ExtGen, Cmd and IDE plugins. Bring your questions and our team will be happy to help you during our live Q&A.
  • The Global Cybercrime Industry – A Holistic View
    The Global Cybercrime Industry – A Holistic View
    Gabriel Glusman Feb 20 2019 6:00 pm UTC 60 mins
    The cybercriminal economy is based on a global illicit industry that, although unregulated, has well defined regions, suppliers, distributors, consumers, innovators, and end-users.

    Join us for a qualitative view of cybercriminal hubs around the world - differentiating cultural and environmental factors, motivations, and what place each occupies in the cybercrime supply chain.
  • Critical Actions to Prevent a Data Breach in 2019 and Beyond [Recording]
    Critical Actions to Prevent a Data Breach in 2019 and Beyond [Recording]
    Panelists: Nick Hayes, Forrester; Idan Shoham, Hitachi-ID; Jason Bonds, Ping Identity; Perry Carpenter, KnowBe4 Feb 20 2019 6:00 pm UTC 76 mins
    * This is a recording so CPE credit is unavailable.

    Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. With large-scale data breaches continuing to make the headlines in 2018, organizations must be proactive, not reactive, in the face of looming cyber threats. Proactive threat intelligence can enable organizations to prevent breaches or compromises before they occur.

    On this webinar our panel of experts will discuss some critical actions organisations can consider to prevent a data breach, and attendees will learn:

    - Strategies you can implement now to help you protect against a breach.
    - Best practices for gathering the intelligence to predict and prevent attacks.
    - How to use threat intelligence to improve your organization’s security posture and reduce the risk of an attack.
    - Steps to fortify your last line of defense.