Hi [[ session.user.profile.firstName ]]

Information Technology

  • The Future Workspace: Intelligent Platforms
    The Future Workspace: Intelligent Platforms Jon Howell, Aruba Smart Office and Location Based Solutions, EMEA Recorded: Apr 23 2018 46 mins
    The Digital Workplace is quickly becoming a critical initiative for today’s modern enterprise. To keep pace IT and business leaders must not only stay ahead of the competition but must now reassess how their greatest assets - their employees, work and collaborate.

    Watch our OnDemand webinar and discover how smart, modern workspaces can bridge the physical and digital environment with actionable intelligence to further improve team productivity and effectiveness while boosting resource efficiency, productivity and reducing costs.

    Topics
    - Overview of current trends in the workspace
    - Challenges faced by employers and employees
    - Aruba Intelligent Edge solutions
    - Analytics and how to improve workspace utilisation
  • How to Detect Wire Fraud with Machine Learning and Behavioral Analytics
    How to Detect Wire Fraud with Machine Learning and Behavioral Analytics Eric Tran-Le, VP, Product Management, Guardian Analytics Recorded: Apr 23 2018 34 mins
    This webinar is part one of the Wire Webinar Series. We will be discussing how you can leverage Guardian Analytics behavior-based, real-time wire fraud detection solution to monitor all activities and transactions for each account holder allowing you to build a profile of each user’s typical behavior. Tracked activities include hundreds of elements from payment amounts, wire originators and recipients, plus online login, session duration, sequence of activities during each session.
  • [Breach Prevention Week] Beyond Layered Approach
    [Breach Prevention Week] Beyond Layered Approach Navneet Singh, Product Marketing Director, Palo Alto Networks Recorded: Apr 23 2018 50 mins
    Maintaining and troubleshooting disparate, layered security technologies is complex and time-consuming. What’s even more troubling is that these technologies don’t work together effectively to protect you against sophisticated cyberattacks.

    It’s time to rethink IT security with a strategic, architectural approach – preventing successful cyberattacks from getting to your data, apps and users.

    In this webinar, you’ll learn:
    •Why a layered security approach doesn’t work.
    •Why a strategic approach to evaluating security technologies is the way to go.
    •How the security architecture of our next-gen firewalls prevents successful cyber breaches.
  • [Webcam Panel] Trends Discussed at RSAC 2018
    [Webcam Panel] Trends Discussed at RSAC 2018 Roselle Safran (Rosint Labs) | Ulf Mattsson (TokenEx) | Dave Morris (Morris Cybersecurity) | UJ Desai (Bitdefender) Recorded: Apr 23 2018 59 mins
    Join this post-RSAC panel as we look at the biggest trends and cyber threats covered during the RSA Conference 2018 in San Francisco.

    Tune in for an interactive Q&A panel with industry experts as they discuss:
    - What are the biggest threats to security in 2018?
    - Key steps to take today to better secure your critical data assets
    - Top technological advancements powering security
    - CISO strategy in the age of breaches

    Speakers:
    - Roselle Safran, President, Rosint Labs
    - Ulf Mattsson, Head of Innovation, TokenEx
    - David Morris, Managing Partner, Morris Cybersecurity
    - UJ Desai, Group Product Manager, Bitdefender
  • Fürsorgepflicht – Wie gut ist Ihr Notfallplan?
    Fürsorgepflicht – Wie gut ist Ihr Notfallplan? Andreas Krugmann Global Account Director Concur (Germany) GmbH, Jochen Neubauer, Customer Value Sales SAP SE Recorded: Apr 23 2018 56 mins
    Für Unternehmen besteht – und das wissen viele gar nicht - eine Fürsorgepflicht für Ihre Geschäftsreisenden. Sie sind verantwortlich dafür, dass Ihre Beschäftigten vorbereitet und sicher reisen.

    Lernen Sie:
    - Warum es so wichtig ist, das Thema Fürsorgepflicht ernst zu nehmen.
    - Was Arbeitgeber alles beachten müssen, um Ihrer gesetzlichen Verpflichtung hinsichtlich der Fürsorgepflicht nachzukommen.
    - Wie SAP Concur Unternehmen so ausstattet, dass diese sogar über den Notfall hinaus in der Lage sind, mit den Reisenden in Kontakt zu bleiben.
  • Approfondimento tecnico: come pianificare e progettare una rete wireless
    Approfondimento tecnico: come pianificare e progettare una rete wireless Claudio Dell'Ali Recorded: Apr 23 2018 61 mins
    Gli Access Point SonicWall della serie SonicWave, utilizzano la nuova tecnologia Wave 2. Pensata con particolare attenzione alla sicurezza ed alla facilità di utilizzo, la serie SonicWave offre una soluzione End-to-End stabile, sicura e performante.

    Scopri le procedure consigliate per pianificare e implementare una rete Wireless con SonicWall attraverso i seguenti argomenti:
    • Fondamenti di RF e l’importanza della tecnologia 802.11ac Wave 2
    • Una panoramica del portafoglio di prodotti SonicWave
    • Come effettuare un Site Survey per definire dove installare le antenne al fine di ottenere una coperture ottimale
    • Impostazione, monitoraggio e configurazione dei punti di accesso
  • GDPR Series - Part 3 - Marketing Compliance
    GDPR Series - Part 3 - Marketing Compliance John Cheney & Penny Lowe Recorded: Apr 23 2018 54 mins
    Our CEO and Head of Service Delivery, John Cheney and Penny Lowe, provide practical advice and guidance on email marketing, e-privacy and GDPR.

    In this webinar series, we discuss what to consider to ensure your electronic marketing communication does not put you in breach of the regulation.

    It won't come as a surprise that at Workbooks we are driving many of our processes using our CRM platform. This webinar series is about sharing our thinking and approach around GDPR and how to leverage CRM to make it easier to get compliant and remain compliant.
  • How to integrate Security & Compliance into your Continuous Delivery pipelines
    How to integrate Security & Compliance into your Continuous Delivery pipelines Kevin Lee, Senior Solutions Architect, Micro Focus. Recorded: Apr 23 2018 61 mins
    Learn the reasons for and techniques behind DevSecOps and how to integrate it into your existing continuous delivery pipelines.

    Agenda
    •What is DevSecOps - and where does it fit in?
    •Continuous Inspection - how automated continuous inspection can help detect potential security issues early in your development lifecycle.
    •Secure Deployment – how to secure your deployment process to deploy from a known source (aritfact repository) and with secure credentials (password vault).
    •Recommendations – for implementing DevSecOps in your delivery process.
    •Demonstration of the Micro Focus solution.
  • Optimising the Quality Portfolio
    Optimising the Quality Portfolio Mark Turner, EMEA PPM Pre-Sales Consultant and Toby Marsden, Director of ADM and DevOps Solutions Recorded: Apr 23 2018 27 mins
    Webinar looking into a managerial view of what is happening in your programs and portfolios. In a hybrid world, where delivery is ever accelerating, Micro Focus explores how you can step back and examine combined views of all of your work, products and applications in real time.

    Project Portfolio Management
    • Visibility - Do you lack aggregated visibility into your team’s workload?
    • Assessing Work Items - Are work items delivered before you can even assess them?
    • DevOps - Do you need visibility, feedback and assessment of your DevOps processes?
    • Agile Tools - Do you deliver work from multiple agile tools?
    • Quality - Do you lack an aggregated view of quality across all your business lines, programs, products and projects?
  • Best Practices for Implementing Strategic Portfolio Management with Forrester
    Best Practices for Implementing Strategic Portfolio Management with Forrester Margo Vistacion (VP, Principal Analyst, Forrester), Richard Hawes (Director Product Marketing ITBJM, ServiceNow) Recorded: Apr 20 2018 58 mins
    Organizations are trying to drive transparency between IT and the business, but the range of tools and the effort required to compile and translate planning into IT portfolio investments can make business-like conversations impossible for IT.

    In this webinar, guest speaker, Forrester VP and principal analyst Margo Visitacion will discuss best practices for the implementation of Strategic Portfolio Planning and why it is essential to your Digital Transformation. ServiceNow will also discuss how it provides a single platform that delivers a unified view of how business products, domains, and capabilities drive technology innovation, which it believes led to ServiceNow being named as a leader in The Forrester Wave™: Strategic Portfolio Management Tools, Q3 2017 (Forrester Research, Inc., September 20, 2017)
  • The Future of Project and Portfolio Management
    The Future of Project and Portfolio Management Rick Bylina (Sr. Product Marketing Manager, ServiceNow), Simon Grice (Principal Solution Consultant, ITBM) Recorded: Apr 20 2018 58 mins
    The days of managing IT projects in legacy standalone tools are coming to an end. Progressive PMOs know that they have a key role in driving digital transformation by focusing on the right investments and optimizing resources for all work, whether planned or unplanned.

    In this session, we’ll use a live demonstration to show how ServiceNow PPM can provide unique insights into the full IT project lifecycle on a single platform. We’ll show how the ServiceNow solution can align a request with business goals, allocate the best resources, and build and release a solution – all using the most efficient methodology on the most appropriate platform.
  • Protecting your Digital Way of Life and 2018 Security Trends
    Protecting your Digital Way of Life and 2018 Security Trends Greg Day, VP & CSO, EMEA, Palo Alto Networks Recorded: Apr 20 2018 50 mins
    The way we consume IT is changing in a big way and this is being driven, in no small part, by the continued prevalence of cloud computing.

    How are these changes transforming your business and the landscape you operate in? What do these changes mean for the future?

    Join Greg Day, VP and Chief Security Officer for Palo Alto Networks EMEA as he takes us through the transforming world of IT consumption and what the impacts are for Digital Way of Life and cybersecurity.

    Greg will take us through what trends we have witnessed in recent years, as well as what we can expect in the future - focusing on the fast-changing world of IT consumption, digital transformation and of course what these mean for cybersecurity.
  • Enhancing classical IT services monitoring and diagnostics tools
    Enhancing classical IT services monitoring and diagnostics tools Dominic Colson, Senior Solutions Architect, Micro Focus Recorded: Apr 20 2018 25 mins
    Enterprise AIOps and Big Data

    Join us for this 40-minute webinar to find out what big data analytics is all about and how multi-vendor solutions deployment can be implemented across both new and existing applications.

    Agenda:
    •The story so far–While IT operations have tended to specialise in either one of big data or machine learning new strategies are now leading to platforms that need to combine both solutions.

    •Big Data–What is Big Data and where does it fit in IT Operations?

    •Recommendations–Ensure comprehensive insight into past, present and future states of IT systems by selecting AIOps platforms that are capable of ingesting and providing access to log data, text data, wire data, metrics, API data and social-media derived user sentiment data.

    •Demonstration of the Micro Focus solution.
  • Panel: IoT Empowering Digital Transformation with Cloud Security
    Panel: IoT Empowering Digital Transformation with Cloud Security Stuart Davis, Kelvin Rorive, Romain Fourchereau, Markus Handte & Andrew Shepherd Recorded: Apr 20 2018 50 mins
    To catalyse digital transformation, business and IT leaders are embracing the Internet of Things (IoT). The IoT is empowering businesses and consumers to connect to the Cloud, applications, and services. Most importantly - to handle the deluge of data they collect, consume, and analyse. In this context, the role of Cloud security and actionable intelligence is highly significant.

    Take a virtual seat on this cross-industry panel discussion covering the Internet of Things as one of driving forces behind Digital Transformation. The panellists will exchange their experiences and how their organizations approach cloud security and have changed their security strategy to actionable intelligence.

    Panellists;
    * Romain Fouchereau, IOT Analyst IDC
    * Markus Handte, Director of Systems Engineering EMEA ForeScout Technologies
    * Kelvin Rorive, Manager IT Security operations & Threat at Rabobank
    * Stuart Davis, Director of Global Services & Intelligence

    Moderated by;
    * Andrew Shepherd, Palo Alto Networks
  • Новое слово в хранении файловых данных. Обзор платформы Isilon Gen6.
    Новое слово в хранении файловых данных. Обзор платформы Isilon Gen6. Михаил Владимиров Recorded: Apr 20 2018 48 mins
    Как просто работать с нарастающими объёмами фаловых данных? Присоединяйтесь к обзору новой платформы Isilon Gen6. Вебинар проводится при поддержке компании Intel®
  • Asiantuntija on ylivertainen liikevaihdon tekijä
    Asiantuntija on ylivertainen liikevaihdon tekijä Pekka Paloheimo Recorded: Apr 20 2018 40 mins
    Yritykset elävät myynnistä – ja siksi jokainen asiantuntija on myyjä

    Kenellä yrityksessäsi tai organisaatiossasi on eniten asiakaskontakteja? Todennäköisesti jokaisella asiantuntijalla, devaajalla, teknisellä tuella, projektipäälliköllä jne. Ja yleensä heitä kuunnellaan aivan eri tavalla kuin myyjää…

    Asiantuntijoilla on ylivertainen paikka kasvattaa yritystensä liikevaihtoa joko myymällä itse, tai antamalla myynnille kullanhohtoisia vinkkejä. Olipa kyse devaajasta tai teknisestä tuesta, molemmat pääsevät lähelle asiakasta ja nauttivat luottamusta, arvostusta ja sympatiaa, josta myyjä voi pahimmillaan vain uneksia. Kun asiantuntija ohimennen mainitsee, että ohjelmaan tai laitteeseen kannattaisi varmaan hankkia joku lisäominaisuus tai -osa, asiakas ei koe olevansa myyntityön kohde.

    Miksi usein kuulee kuitenkin sanottavan, ettei insinööri osaa myydä… tai ”en minä ole myyjä, olen asiantuntija…” tai jopa ”taas on myyty jotain ihan muuta kuin asiakkaan tarve on tai pystytään toimittamaan.” Ongelma ei ole asiantuntijoiden myyntiosaamisessa (toki tässäkin on paljon parannettavaa) vaan johdon asenteessa ja sitä seuraavassa sanattomassa ja tahattomassa viestinnässä.

    Asiantuntijamyynti on ensisijaisesti johtamiskysymys. Tässä webinaarissa keskitymme vaativaa asiantuntijamyyntiä tekevien organisaatioiden kannalta kriittisiin kysymyksiin:

    - Miksi asiantuntijan roolissa myynti on ENSISIJAISEN tärkeää?
    - Miksi aktiivista myyntityötä on syytä arvostaa ja siihen on kannustettava jokaista roolista riippumatta?
    - Miksi jokainen asiakaskohtaaminen on myyntitilanne?

    Asiantuntijana Pekka Paloheimo, Senior Consultant, Mercuri International Oy

    Pekka Paloheimo on myynnin ja johtamisen valmentaja, konsultti ja asiantuntija Mercuri International Oy:ssä.
  • Fast SAP Migrations with AWS
    Fast SAP Migrations with AWS Michael Bukva (SUSE), Santosh Choudhary (AWS) Recorded: Apr 20 2018 41 mins
    In this jointly presented webinar from SUSE and AWS in Australia, you will learn how you can take an on-premises SAP application running on a non-HANA (anyDB) database, and use the SAP Rapid Migration Test program with Amazon Web Services (AWS) to migrate to an SAP HANA version of your application on AWS.
  • Nasdaq's Business Transformation: Accelerated with AppDynamics & AWS
    Nasdaq's Business Transformation: Accelerated with AppDynamics & AWS Featured Speaker: Heather Abbott, SVP of Corporate Solutions of Nasdaq; featuring David from AWS and Justin from AppDynamics Recorded: Apr 19 2018 56 mins
    Nasdaq is transforming — focusing on technology-driven innovation centered around their strengths in market-powering data and analytics. Supporting this move, Nasdaq is cloud-enabling all core applications using AWS for agility and using AppDynamics to speed up, visualize, and validate the migration process.

    An AppDynamics-powered migration has allowed Nasdaq to support its strategic pillars of user engagement, velocity, and agile infrastructure, empowering them to draw clear, understandable correlations between customer experience and application performance.

    Hear experts from Nasdaq, AWS, and AppDynamics for in this on demand webinar. You’ll learn:

    - How to justify moving to AWS and re-platforming applications
    - How AppDynamics provides full visibility into hybrid cloud performance
    - How a common dashboard across ops, dev, and infrastructure teams can accelerate DevOps adoption
  • Qlik Data Concierge for Actian Vector - Demo
    Qlik Data Concierge for Actian Vector - Demo Pradeep Bhanot - Director of Product Marketing at Actian Recorded: Apr 19 2018 4 mins
    This video shows how easy it is to build Qlik Sense applications using direct queries to Aciian Vector analytics database.
    The demo explores a pre-defined set of metadata before using Qlik Data Concierge to define the data selection, which is in turn used to create visualizations in Qlik Sense.
  • How to Modernize Legacy Applications for a Microservices-Based Deployment
    How to Modernize Legacy Applications for a Microservices-Based Deployment Oleg Chunikhin, CTO, Kublr and Sergey Maksimov, Sr. Product Manager, Virtuozzo Recorded: Apr 19 2018 55 mins
    DevOps and microservices architectures are said to deliver project nirvana, promising faster time to market and higher reliability. The reality, however, is quite different. While this promise is often fulfilled in greenfield projects, in real-life scenarios with existing legacy/monolithic applications, these benefits are much more difficult to realize.

    During this webinar we’ll discuss:

    - Approaches to modernizing monolithic legacy applications that leverage the benefits of microservices-based containerized architectures;
    - Migration strategies, and organizational and technical considerations when refactoring applications;
    - A reference architecture for an application delivery platform and factors you need to consider when selecting major platform components, including the microservices framework, container management platform, and cloud native storage.
  • Career Conversations: Julia Hermann, Global Information Security Analyst
    Career Conversations: Julia Hermann, Global Information Security Analyst Julia Hermann, Information Security Analyst at Giesecke & Devrient GmbH Recorded: Apr 19 2018 61 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guests: Julia Hermann, Information Security Analyst at Giesecke & Devrient GmbH

    Hosted by Elena Steinke, Board Member of the Women's Society of Cyberjutsu

    About the Speaker:
    Julia Hermann brings more than 15 years of experience in systems engineering, IT security and information security management. She started off her career at a large German Telco provider in the field of IT security consulting, developing and implementing security solutions for large international customers. Afterwards, she spent the longest time of her career at an agency of the European Union as Information Security and Risk Officer, establishing IT security from the moment of its foundation.

    Currently, as Information Security Analyst within the corporate security department of an international company in Munich, her main tasks involve assessment of requirements and technical conception of security solutions as well as threat intelligence, security incident management and audits.

    Being a certified CISSP and CISM, she contributed to the foundation of the (ISC)2 Chapter Germany. Previously as a member and since May 2017 as lead of the ISACA Germany Chapter working group on information security, she co-authored the Implementation Guideline ISO/IEC 27001:2013 and participated to the development of the 2-day certification course “Information Security Practitioner.”
  • Microservices and Containers: A Marriage Made in Heaven
    Microservices and Containers: A Marriage Made in Heaven Parminder Kocher, Director of Engineering, Cisco Networking Academy, Cisco Systems Recorded: Apr 19 2018 51 mins
    Microservices aren’t for every organization, but if you know what to expect and prepare accordingly—and if you pair them with Docker containers—they can bring unprecedented agility and scalability to application development and deployment, especially in large, complex projects where speed is crucial and small errors can be disastrous.

    In this high-level presentation geared toward executives and other decision-makers, Parminder Kocher, author of the newly published book, Microservices and Containers, will break down these potentially game-changing technologies. First, are they right for you? Making the switch to microservices is a large undertaking with a steep learning curve, both operationally and culturally, so it's crucial to assess the risks before taking the plunge. Second, what should you expect if and when you decide to move forward with the shift? Kocher draws from his own personal experience to help you with the transition. By the end of the presentation, you should have a good idea how microservices—especially when paired with Docker containers—can bring unprecedented agility and scalability to application development and deployment, especially in large, complex projects where time to market and scalability are paramount.

    About the presenter:

    As the Engineering Director for the Cisco Networking Academy, Parminder currently leads the team responsible for developing the Academy’s platform, which is accessed by 1.5 million students in 180 countries. In addition to bachelor’s and master’s degrees in computer science, Kocher has an executive MBA from Baylor’s Hankamer School of Business, an executive certificate in strategy and innovation from MIT’s Sloan School of Management, and a certificate in Professional Coaching from iPEC, an International Coach Federation (ICF)-accredited coaching training program. His first book, Microservices and Containers, was published by Addison-Wesley earlier this month.
  • Cloud-Based Billing: The Digital Transformation of Customer Experience
    Cloud-Based Billing: The Digital Transformation of Customer Experience Adam Ragauskis, CFO, Edgenet & Andrew Dailey, Managing Director, MGI Research Recorded: Apr 19 2018 48 mins
    In an increasingly fast-paced marketplace, businesses are under pressure to accelerate time-to-market for products and services. Companies need technologies that support agility and flexibility when it comes to getting products out the door quickly, and packaged and priced at a point that customers want to consume.

    Join Adam Ragauskis, CFO at Edgenet, a SaaS company that provides retailers, distributors, and suppliers the ability to manage and improve their product content, and Andrew Dailey of MGI Research as they discuss:

    1. How to transform business with the introduction of new pricing models and product offerings
    2. Why prioritizing an investment in cloud-based usage and activity billing is key
    3. How to launch a successful digital transformation strategy throughout your organization
  • Best Practices for Effective Endpoint Security
    Best Practices for Effective Endpoint Security Joel Boyd, senior product marketing manager, Palo Alto Networks & Chris Kisselburgh, security engineer, Cloud Harmonics Apr 24 2018 2:00 am UTC 60 mins
    There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common.

    Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks.

    In this webinar, you’ll learn:
    •Why so many attacks succeed and how to stop them
    •Effective techniques to protect against malware, exploits and ransomware
    •Next steps for successful endpoint protection
  • [APAC] Intent-Based Networking in Security Policy Management
    [APAC] Intent-Based Networking in Security Policy Management Edy Almer, VP Product Apr 24 2018 5:00 am UTC 45 mins
    The next big thing in networking, intent-based networking, enables users to define what they want and, like magic, their intentions are automatically translated into the desired network environment, including its policies.

    Well, it’s not magic, and this next big thing is already here. In this new technical webinar, Edy Almer, AlgoSec’s VP of products explains how AlgoSec’s network security policy management solution delivers on the promise of Intent-based networking to enable faster application delivery to market - without compromising on security or compliance.

    In this webinar, Edy will explain how:

    • Users can request network connectivity for their business applications, without having to understand anything about the underlying network or security

    • AlgoSec automatically translates, computes and deploys these intentions directly onto the security devices – all with zero touch (if risk profiles allow)

    • AlgoSec ensures that reality aligns with the intent, or is automatically adjusted if network connectivity deviates or introduces risk or compliance violations
  • How to Lower Vulnerability Risk of DevOps SDLC  w/ Continuous Security Testing
    How to Lower Vulnerability Risk of DevOps SDLC w/ Continuous Security Testing Ron Peeters, Managing Director EMEA, Synack Apr 24 2018 7:00 am UTC 60 mins
    DevOps allows organizations to bring web and mobile applications to life faster than traditional SDLC. However with more frequent application updates, there is increased risk of introducing exploitable vulnerabilities to the production stream that won't get detected.

    Traditional penetration testing can't keep up with the frequency and such short deployment cycles and due to its compliance based nature is not comprehensive enough to mimic increasingly sophisticated cyberattack behavior. The result is many high-profile breaches and an increase of serious, exploitable vulnerabilities in live applications.

    Leading organizations are moving towards a security testing model that combines continuous vulnerability scanning tools with continuous manual testing. The manual security testing is performed by international top class Security Researchers who perform offensive and adversarial-based testing that more closely resembles real attack traffic and better aligns with DevOps SDLC.

    Join this webinar led by Ron Peeters, Managing Director of Synack, to learn more about how continuous application security testing lowers the risk of dynamic deployments with DevOps SDLC Synack’s continuous, offensive security testing model better supports DevOps SDLC and lowers the risk of being breached.
  • Новый XtremIO X2-T: доступная точка входа для ваших инноваций
    Новый XtremIO X2-T: доступная точка входа для ваших инноваций Денис Серов Apr 24 2018 8:00 am UTC 60 mins
    Мы расскажем о новой модели XtremIO X2.
    Приходите на наш вебинар – и вы все узнаете из первых рук. Вебинар проводится при поддержке компании Intel®
  • Managementsicht auf den IT-Betrieb: Micro Focus Operations Bridge Business Value
    Managementsicht auf den IT-Betrieb: Micro Focus Operations Bridge Business Value Klaus Holthaus, Presales Consultant, Micro Focus Apr 24 2018 8:00 am UTC 60 mins
    Eine vollkommen dem Corporate Layout und den individuellen Managementwünschen angepasste Echtzeitdarstellung von IT und non-IT KPIs – das bietet das Business Value Dashboard (BVD) als Bestandteil der Micro Focus Operations Bridge Suite.

    Wir zeigen Ihnen in diesem Webinar an einigen Beispielen, wie solche BVDs erstellt und mit Datenkanälen zum Leben erweckt werden.
  • Address Capture with Seven Keystrokes
    Address Capture with Seven Keystrokes Ben Dunmore, Global Solutions Consultant EMEA Apr 24 2018 9:00 am UTC 60 mins
    Optimising address capture is something that is often overlooked from a user and business perspective. But clean address capture can enhance the user experience, not only while entering an address, but also during the whole customer journey. At the same time, it can also help an organisation to successfully recognise, market to and extract value from its customer base. In this webinar, we’ll take a look at:

    •How to get data right from the start with only seven keystrokes and avoid bad data
    •Enhancing the user experience with seven keystrokes
    •Cost benefits of improved address capture in the call centre
    •Case studies covering better customer targeting and improved logistics
    •Address capture from a global perspective
  • Résoudre les ralentissements de réseau Wi-Fi
    Résoudre les ralentissements de réseau Wi-Fi David LAURENTIE, Channel Account Manager, France Apr 24 2018 9:00 am UTC 60 mins
    Les ralentissements du réseau constituent l’un des problèmes les plus courants en matière de Wi-Fi. Ce second webinaire de notre série sur le dépannage des réseaux Wi-Fi visera à vous expliquer comment dépanner rapidement et efficacement les ralentissements.
    Assister à ce webinaire en direct. Nous commencerons par vous montrer comment vérifier si vous avez vraiment des problèmes de ralentissement du réseau Wi-Fi ou si le problème se situe ailleurs (réseau Ethernet câblé, fournisseur d’accès à Internet). Ensuite, nous vous montrerons comment identifier les causes les plus courantes des problèmes de ralentissement du réseau Wi-Fi et nous vous donnerons des conseils sur la façon de résoudre ces ralentissements.
  • Best Practices for Effective Endpoint Security
    Best Practices for Effective Endpoint Security Joel Boyd, Senior Product Marketing Manager, Palo Alto Networks & Chris Kisselburgh, Security Engineer, Cloud Harmonics Apr 24 2018 9:00 am UTC 60 mins
    There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common.

    Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks.

    In this webinar, you’ll learn:
    •Why so many attacks succeed and how to stop them
    •Effective techniques to protect against malware, exploits and ransomware
    •Next steps for successful endpoint protection
  • Security is NOT an Abstract Concept – Building Consensus in the Boardroom
    Security is NOT an Abstract Concept – Building Consensus in the Boardroom Patrick Grillo, Senior Director, Security Solutions, Fortinet Apr 24 2018 9:00 am UTC 45 mins
    Making the connection between “Cause and Effect” is difficult enough but when technology executives need to explain their strategy to a non-technical audience, all too often the key message is lost in technical jargon.

    When technology is embraced by business leaders, it’s because of the perceived business benefit the technology could bring to the organization. What is frequently not discussed, or even thought about at this level, are the security implications associated with technology. The challenge for the senior technology executives is to be able to associate technology with risk, and risk with business disruption, without resorting to a Fear, Uncertainty and Doubt strategy.

    This session will focus on how senior technology executives can better relate to a non-technical audience, using tangible and quantifiable examples, to both inform and persuade of the need of making security an essential component of any business plan.
  • Get all your questions on GDPR answered
    Get all your questions on GDPR answered Sunil Choudrie, Giampiero Nanni, Robert Arandjelovi, Alexander Peters, Ramses Gallego Apr 24 2018 11:00 am UTC 60 mins
    Do you have a burning question you’d like to ask about the GDPR? Now you have a chance to get an answer – straight from the experts. We’ll be hosting a live Q&A with a panel of GDPR experts. And with the clock ticking down to the May 25th deadline, this is a perfect opportunity to get the answers you need.

    The discussion will enable you to successfully prepare for the GDPR by:

    • Understanding its full implications for your organisation
    • Identifying and tracking personal data, wherever it may be
    • Implementing cyber security to protect your data systems
    • Detecting and responding effectively to security breaches
    • Building a GDPR compliance program for the long term

    Get all your questions answered and ensure you’re ready for May 25th by joining our Q&A.
  • 5 areas to accelerate your Oracle Period end Close with Excel!
    5 areas to accelerate your Oracle Period end Close with Excel! Malcolm Hewlett & David Rincon Apr 24 2018 11:00 am UTC 60 mins
    When it comes to closing your financial month end, finance is usually looking at a tedious and time-intensive process requiring skipped lunches and late nights. Our recent survey of 780+ financial professionals from around the world showed that 33% are taking 5 days to close their books for a single period with another 41% taking more than 5 days.

    In this webinar, we will introduce five areas of the period end close process that you can easily expedite using Excel. By saving time and effort throughout your close, you can gain extra time for value-added tasks like audit preparations, data analysis, or simply getting to leave the office at a reasonable time. Gain insight into how you can accelerate 5 critical areas:
    1.Subledger Close
    2.Closing, Adjusting, Correcting, and Recurring Journal Entries
    3.Balance Sheet Reconciliations
    4.Consolidation
    5.Preparing and Publishing Financial Statements

    All financial professionals who are looking to shave time off their period-end close should attend this webinar.

    Register today!
  • The evolution of ransomware and how to protect your organisation
    The evolution of ransomware and how to protect your organisation Rik Ferguson | Vice President Security Research | Trend Micro Apr 24 2018 2:00 pm UTC 75 mins
    Ransomware has been a huge talking point over the last year or so with the large scale Wannacry and Petya outbreaks that caused significant damage worldwide. The strains that are now being seen show that cybercriminals are becoming more sophisticated in order to try and bypass security controls in order to encrypt files and extort organisations for financial gain.

    Unfortunately, Ransomware can enter an organisation through many vectors; including via email spam, phishing attacks, or malicious web downloads making it difficult to defend against. There is no silver bullet when it comes to Ransomware so you need a multi-layered approach, prioritised for the best risk mitigation.

    Join this webinar to find out more on the history and evolution of ransomware, new ransomware techniques such as “rotating” ransomware but importantly to understand how and why threat actors utilise ransomware and what you can do to mitigate against it.
  • [EXECUTIVE PANEL] How To Make the Cyber Risk Message a Board's Priority
    [EXECUTIVE PANEL] How To Make the Cyber Risk Message a Board's Priority FireEye EMEA Apr 24 2018 2:00 pm UTC 75 mins
    Cyber threats are growing faster than any other category of business risk, breaches are inevitable, and the areas put at risk when they happen are broad and deep: from a compromised system or supply chain to the financial implications of non-compliance and breach notification. You not only face compromised or lost data, but your brand will take a huge hit that it may not recover from. Add to that the legal risks resulting from regulatory fines and failure to keep customer commitments, and it adds up to a game-changing argument.

    Business leaders need to understand the potential losses they face on multiple levels, acknowledge the changing risk and have a breach response plan in place, but most importantly they must escalate cyber risk at the highest organisational levels and bridge the gap between the fight on the frontlines and priorities in the boardroom.

    Join us for an executive panel with our EMEA VP & regional leaders as they discuss insights on how the CISOs take the risk message to the board and how they bridge the gap by translating technical jargon into business language.

    ----------------------------
    "Cyber security is a constant battle for every business, and one of the challenges is getting the Board of Directors to understand that enterprise-wide risk management is more than an IT problem. FireEye helps security teams and company executives bridge the gap between the fight on the frontlines and priorities in the boardroom."

    - KEVIN MANDIA, CHIEF EXECUTIVE OFFICER, FIREEYE

    "Cybersecurity is now a persistent business risk. The impact has extended to the C-suite and boardroom.
    - PWC Global State of Info Security Survey, 2015
  • [US/UK] Intent-Based Networking in Security Policy Management
    [US/UK] Intent-Based Networking in Security Policy Management Edy Almer, VP Product Apr 24 2018 2:00 pm UTC 45 mins
    The next big thing in networking, intent-based networking, enables users to define what they want and, like magic, their intentions are automatically translated into the desired network environment, including its policies.

    Well, it’s not magic, and this next big thing is already here. In this new technical webinar, Edy Almer, AlgoSec’s VP of products explains how AlgoSec’s network security policy management solution delivers on the promise of Intent-based networking to enable faster application delivery to market - without compromising on security or compliance.

    In this webinar, Edy will explain how:

    •Users can request network connectivity for their business applications, without having to understand anything about the underlying network or security

    •AlgoSec automatically translates, computes and deploys these intentions directly onto the security devices – all with zero touch (if risk profiles allow)

    •AlgoSec ensures that reality aligns with the intent, or is automatically adjusted if network connectivity deviates or introduces risk or compliance violations
  • Pop-up shops: more than just a fad?
    Pop-up shops: more than just a fad? Raj Mistry, Group Sales Vertical Director & Joel Gamsu, Senior Client Manager, Dimension Data MEA Apr 24 2018 2:00 pm UTC 45 mins
    Consumers today are actively looking for an emotional connection with a brand, and, are no longer staying loyal to a single retailer. However, one thing that has not changed is that shopping remains a social activity. To capitalise on this trend, retailers must change their sales strategies to take the brand experience directly to consumers in bite-sized formats or face risking their place in today’s retail world.

    This is where pop-up, or experience stores come into the mix. Global brands such as Nike, Louis Vuitton, and Marie Claire, are actively increasing their investments to support these pop-up shops; and in this webinar, we are going to investigate how even the smallest business can open pop-up stores by focusing on what retailers would need to consider and put in place to ensure stores are successful.
  • Cloud Foundry Roadmap in 2018
    Cloud Foundry Roadmap in 2018 Chip Childers, CTO, Cloud Foundry Apr 24 2018 3:00 pm UTC 60 mins
    Cloud Foundry from the Linux Foundation is a collection of complementary open source technologies focused on application developers and operators, as well as many projects to support and extend them.

    In this webinar on April 24th, Chip Childers will provide an overview of Cloud Foundry technologies (Application Runtime, Container Runtime and BOSH) discussing use cases and core project updates. He will discuss the technical benefits of the platform, focus areas for 2018, and major highlights from the Cloud Foundry Summit, April 18-20 in Boston, MA.
  • How Predictive Analytics makes YOU and everyone else smarter
    How Predictive Analytics makes YOU and everyone else smarter Jorge Maestre - HPE Storage Evangelist Apr 24 2018 3:00 pm UTC 75 mins
    In the storage community, flash is definitely the new normal; so much so that box-to-box or array-to-array comparisons aren’t all that differentiated these days. So what separates the average from the outstanding, when it comes to flash storage arrays? HPE believes that it is storage that 1.) leverages predictive analytics, 2.) is cloud-ready and is able to understand your application, regardless of where it resides, and 3.) is timeless, with characteristics that protect your IT investment. In this webinar, Jorge Maestre, HPE Storage evangelist and influencer, drills down into these new age storage requirements. Take predictive analytics for example. Think about the possibilities in your datacentre, when storage can take advantage of intelligence coming from 10’s of thousands of arrays, to make your experience better – from a support perspective, from a usability perspective, and from an all-around ownership perspective. You’ll come away with a new appreciation on how predictive analytics is a game changer for storage.

    Presenter Bio: Jorge Maestre, Senior Technologist & Strategist for Worldwide Storage at Hewlett Packard Enterprise, also known as “The World’s Strongest Technologist” because of his rare combination of powerlifting and long-standing technical experience. He started his career on the customer side as a Data Center Architect, then moved into a sales role. Jorge left the block storage world to take on the role of evangelist for a small startup focused on a File and Database solution, and then for a second startup focused on Container/Application Virtualization technology. After a successful acquisition, Jorge returned to the world of block storage with HPE. As a subject-matter expert & strategist Jorge has forged a unique perspective of the storage industry by developing a deep understanding of the market, and the individual vendors, through thorough examination of their financial position, technological offerings, & strategic directions.
  • [Webcam Panel] CISO Strategy & the Boardroom
    [Webcam Panel] CISO Strategy & the Boardroom Dr. Christopher Pierson (Binary Sun) | Ben Johnson (Obsidian) | Deidre Diamond (CyberSN) Apr 24 2018 3:00 pm UTC 60 mins
    Having a strong buy-in from the highest level of executive leadership in your organization is a key factor for a successful implementation of your CISO strategy. With high-profile breaches on the rise and a company's reputation at stake, cybersecurity is a top-of-mind issue for CISOs.

    Join this interactive Q&A panel to learn more about:
    - Key factors for building a successful CISO strategy
    - Selling your security strategy to the Board
    - Why your Board should be up to date on cybersecurity
    - Top threats to look out for in 2018

    Speakers:
    - Ben Johnson, CTO of Obsidian Security
    - Deidre Diamond, Founder and CEO, CyberSN
    - Dr. Christopher Pierson, CEO of Binary Sun Cyber Risk Advisors
  • Master the Changing Landscape of Payments in the Subscription Economy
    Master the Changing Landscape of Payments in the Subscription Economy Jim Cho, Executive Director Business Development, JPMorgan Chase & Co Apr 24 2018 3:00 pm UTC 60 mins
    The payments landscape is changing. Ever-increasing payment options and growing global customer bases leads to a whole lot of complexity and a whole host of potential issues, like payments fraud which is reaching record highs.

    And payments are all the more complex in the Subscription Economy where businesses have to manage ongoing recurring payments versus one-time purchases.

    In this changing payments landscape how can you manage fraud explosion, limit attrition, satisfy customers’ varied payment demands, and protect your company?

    Join Jim Cho, Executive Director of Business Development at JPMorgan Chase & Co, and Kristin Hagen, Global Head of ISVs and Technology Partnerships at Zuora, to learn how to master the changing landscape of payments in the Subscription Economy.

    Register now!
  • Accelerate the Delivery of Compliant and Secure IT Infrastructure
    Accelerate the Delivery of Compliant and Secure IT Infrastructure Derek Kruger, Technical Marketing and Megan Glick, Product Marketing, Micro Focus Apr 24 2018 3:00 pm UTC 60 mins
    Simplify regulatory IT compliance and mitigate vulnerability risk with automation

    See how you can easily automate regulatory and patching compliance across OS, database, and middleware to help meet benchmarks like FISMA, HIPPA, SOX, PCI, and CIS using policies, out-of-the-box content and remediation actions. At the end of this session you will take-away actions you can adopt to reduce cost of your IT operations and accelerate the speed of managing compliance and risk.
  • New Data Breach Findings: The Year of Internal Threats & Misplaced Data
    New Data Breach Findings: The Year of Internal Threats & Misplaced Data Jason Hart, CTO of Data Protection at Gemalto Apr 24 2018 3:00 pm UTC 60 mins
    2018 has started off as an eventful year with data breaches at Saks Fifth Avenue, Lord & Taylor and Under Armour’s MyFitnessPal app. And it will continue to be a catalyst year for data security with the 25th of May deadline for the European Unions’ General Data Protection Regulation, which regards “privacy as a fundamental human right and to protect it as such.” Data exposed or breached is not only a headache for security teams, but also impacts brand reputation, customer confidence and stock prices.

    Gemalto’s 2017 Breach Level Index found 2.6 billion records where compromised in 2017, a 88% increase from 2016. In this webinar our expert, Jason Hart, will walk attendees through the most shocking 2017 stats, new data breach tactics and how companies can manage risk by mapping out where your data resides. Join us to learn more about:
    -Internal threats and misconfigured cloud databases
    -Growing security threats like data integrity attacks
    -Innovative technology that is solving some of these issues
    -What we have in store for 2018
  • Feed the Bots: Strategies to Improve Chat Bots through Knowledge
    Feed the Bots: Strategies to Improve Chat Bots through Knowledge Julie L. Mohr Apr 24 2018 3:00 pm UTC 60 mins
    Chatbots rely on programming known questions and answers into the system to make them more effective. The more we know about the questions our customers ask, the more information we have to feed to the Bots and increase their intelligence.

    To improve the success of capturing the proper knowledge and improving self-service, knowledge must be captured in the workflow using the context of our customer. Knowledge captured using our customer's language will improve the success of artificial intelligence and improve the success of offering a new chatbot channel for support.

    In this webinar, we will uncover strategies to improve your existing implementation of chatbots or help you to develop a successful implementation strategy. It's time to feed our bots with knowledge management interactions.
  • Funcionalidad del sistema operativo
    Funcionalidad del sistema operativo Andrés Mendez Apr 24 2018 3:00 pm UTC 75 mins
    Cree TI ágil, implante servicios esenciales y logre una mejora continua de su infraest­ructura de TI

    SUSE Linux Enterprise Server es un sistema operativo de servidor de prestigio mundial, seguro y de código abierto, concebido para procesar cargas de trabajo físicas, virtuales o basadas en nube que sean esenciales. El sistema operativo sube aún más el listón a la hora de ayudar a las organizaciones a acelerar la innovación, mejorar la fiabilidad de los sistemas, cumplir los exigentes requisitos de seguridad y adaptarse a nuevas tecnologías.

    Participe del webinar para conocer esta solución!
  • Magnify the Analytical Impact: Accelerate Insight with Machine Learning
    Magnify the Analytical Impact: Accelerate Insight with Machine Learning Aberdeen's VP Mike Lock and Yellowfin's SVP Daniel Shaw-Dennis Apr 24 2018 3:00 pm UTC 45 mins
    When it comes to your critical business questions, are you a spectator or an implementer? Today’s most effective companies blend approachable, business-relevant tools for data exploration with sophisticated technology under the hood to deliver an optimal user experience. Delivering visually appealing insights augmented with machine learning technology helps users better understand the what, why, and what now when it comes to their most pressing business questions.

    On this webinar, join as Mike and Dan discuss how empowering users with analytics in context can deliver tangible results. The webinar will explore recent research findings and real-world examples related to:
    - Top business challenges driving the urgency for better analytics
    - Market-wide shifts in user technology preferences
    - Best-in-Class approaches for magnifying analytical insight (e.g. machine learning, AI)
    - Quantifiable business impact of today’s leading analytics