Hi [[ session.user.profile.firstName ]]

Information Technology

  • A Brief History of Ransomware
    A Brief History of Ransomware Alex Tilley, Senior Information Security Consultant and Dan Eden, IT Security & Risk Consultant Recorded: Jul 27 2017 60 mins
    With the recent global attacks of WannaCry and NotPetya, ransomware has taken the headlines in a massive way. But this is nothing new, the 2014 Crypto locker attacks still in the back of the minds of many organisations. In order to help organisations understand ways to cope with ransomware attacks SecureWorks very own CTU e-crimes lead, Alex Tilley, and senior incident responder, Dan Eden will discuss a brief history of ransomware. Discussing where ransomware originated, some examples of attacks from times gone by and discuss the what, the how, the why, and the who of some of these attacks. Alex and Dan will also provide some tips and tricks to give your organisation the ability to reduce the risk of ransomware affecting your organisation.
  • Machine Learning for the Masses
    Machine Learning for the Masses Satyam Vaghani, VP of Technology, Nutanix & Sameer Singh, Asst. Professor, Computer Science University of California, Irvine Recorded: Jul 26 2017 52 mins
    Machine learning and machine intelligence have moved into the corporate datacenter. Along with seeing live demos of machine learning in action, attendees will learn how advanced algorithms can rapidly analyze large data sets to find relevant patterns, and employ inferential learning to make real-time adjustments to datacenter processes.
  • It’s Time To Take Charge Of Our Digital Future
    It’s Time To Take Charge Of Our Digital Future Ariel Robinson, ITSPmagazine | Jay Beale, Inguardians | Jessy Irwin, Jessysaurusrex | Mzbat Recorded: Jul 26 2017 55 mins
    - Broadcast LIVE from Las Vegas during Black Hat 2017 -
    Disruptors and visionaries across the globe are pushing the boundaries of science and technology, economics and industry, healthcare, policy, communications, and governance. From these advances emerge new career paths, educational disciplines, and opportunities for creation and discovery.

    But things don't always work the way we expect them to, and the consequences of disruption are impossible to predict. What is sacrificed for the sake of efficiency or convenience? Who gets to make that call? Whose fault is it when pre-teens get radicalized online, or health records get misused for unauthorized research? And whose job is it to prevent that from happening? Is prevention even possible?

    Individuals, enterprises, and society writ large have the right and responsibility to proactively shape and secure the future, but our ability to do so is at risk. As technology continues to proliferate without being well understood, people who fall victim to its failure or misuse feel more and more disempowered to prevent future damage. This is The Tech Effect: the complacency driven by the complexity of the technology ecosystem, and a rejection of responsibility for individual and collective safety, security, and ethics.

    It’s time to take charge of our digital future.

    Join us for this lively conversation as the experts explore the following:

    - What is a technology ecosystem?
    - Who are the players?
    - What are their roles?
    - What are the challenges with security and privacy?
    - What are the challenges with ethics? How do they compete with capability, capitalism, security, and privacy?
    - What might the long-term impact on humanity be?

    - Ariel Robinson, Editor & Host, The Tech Effect, ITSPmagazine

    - Jay Beale, CTO & COO, InGuardians
    - Jessy Irwin, Security Empress at Jessysaurusrex
    - Mzbat
  • The Wonderful World of Containers
    The Wonderful World of Containers Binny Gill, Chief Architect, Nutanix Recorded: Jul 26 2017 49 mins
    Containers provide application owners and IT datacenter operators with a flexible model to quickly provision and de-provision applications—without worrying about infrastructure compatibility. This advanced technology session will cover container basics, and detail how Nutanix Enterprise Cloud provides the ideal scale-out platform for running containerized apps.
  • IoT and Edge Computing
    IoT and Edge Computing Richard Arsenian, Staff Solutions & Performance Engineer, Nutanix & Satyam Vaghani, VP Technology, Nutanix Recorded: Jul 26 2017 50 mins
    We're living in a centralized world—but that’s all about to change with the proliferation of Intelligent IoT devices, sensors and machine to machine (M2M) communication. Big data, security, governance and compliance are just a few of the key challenges to consider. Attendees will learn how to create and run agile intelligent M2M applications, analyze and predict behavior and drive greater business value.
  • Your Month End Best Friend in Excel: GL Connect
    Your Month End Best Friend in Excel: GL Connect Rafael Torres, Director - Finance Reporting Josh Milstein, Regional Sales Manager Recorded: Jul 26 2017 25 mins
    Does this sound familiar? It’s month end… time for reconciliations, account analysis, journal entries, and long hours. Pulling multiple reports to get to the necessary subledger transactions can be tedious and time consuming. Booking journal entries, tying out accounts, plus more, all in different systems and tools is inefficient and error-prone. What if you had a tool that can simplify these processes, plus more? In this webinar, we will show you GL Connect, a month end tool that allows:

    •Reconciliations with full drill down to the subledger

    •Journal Entry and Budget uploads

    •Create your own Financial Statements

    •Conversion of Oracle FSGs

    •Ad hoc account analysis

    •Plus much more!
  • How to Effortlessly Manage Tasks & Project Management Software Like a Pro
    How to Effortlessly Manage Tasks & Project Management Software Like a Pro Dale Howard, Director of Technical Solutions, Sensei Project Solutions Recorded: Jul 26 2017 68 mins
    Task Types and Effort Driven can be two of the most confusing features of Microsoft Project, both to novice users and to experienced users alike. For example, have you ever changed one number in Microsoft Project, and then the software changed another number in response, and you don’t know why?

    Guest expert Dale Howard will unlock the mysteries of Task Types and Effort Driven behavior in Microsoft Project, showing you how their behavior is logical, predictable, and meaningful.

    Join this webcast to:
    - Eliminate the confusion around these two Microsoft Project features
    - Harness the power of Task Types in your own projects
    - See how Effort Driven task statuses interact with each Task Type
  • Deliver Performant & Highly Available User Session Stores for Cloud-Native Apps
    Deliver Performant & Highly Available User Session Stores for Cloud-Native Apps Kamala Dasika, Pivotal and Roshan Kumar, Redis Labs Recorded: Jul 26 2017 43 mins
    As demands on your cloud-native applications rapidly change, how can you ensure that your database is responsive and highly available? The truth is that modern applications are usually still supported by monolithic shared databases and traditional operational practices. Pivotal and Redis Labs are collaborating to bring developers more agility and autonomy with a highly available, scalable, and high performance Redis database service for their cloud-native applications.

    Join Roshan Kumar from Redis Labs and Kamala Dasika from Pivotal as they discuss:

    - How Redis Labs supports real-time use cases for the modern enterprise
    - How Redis Enterprise provides seamless high availability and disaster recovery for Redis applications
    - How full life cycle management of your apps and Redis Enterprise via Pivotal Cloud Foundry enables dynamic scale, high performance and uptime
  • Demo: Introduction to CoreOS Tectonic and Quay Enterprise
    Demo: Introduction to CoreOS Tectonic and Quay Enterprise Scott Summer, Solutions Engineer Recorded: Jul 26 2017 48 mins
    CoreOS Tectonic is an enterprise-ready Kubernetes platform that provides automated operations, enables portability across private and public cloud providers, and is always upstream open source Kubernetes.

    Quay is CoreOS's enterprise-ready container and application registry. Quay makes it easy for developers to store, manage and deploy container images, and simplifies your development to production workflow for your software containers.
  • Power To The People - Knowledge Is Power
    Power To The People - Knowledge Is Power Debra Farber, ITSPmagazine | Chris Roberts, Acalvio | Dr. Christopher Pierson, Viewpost | Arun Vishwanath, SUNY Buffalo Recorded: Jul 26 2017 50 mins
    - Broadcast LIVE from Las Vegas during Black Hat 2017 -
    As a society, we continue to focus on the capabilities that new technological products and services bring to bear, leaving the security - or rather, the safety - conversation for a later date and time… if at all.

    Why is this? Perhaps it’s because we don’t care. Or, perhaps it’s because we don’t understand how things work. Or, maybe it’s because we don’t know all the technical mumbo jumbo. Or, it could just be that we expect “someone else” to take care of it for us. For example, every car has a seat belt, right? We don’t have to ask for the car dealer to add seat belts for us and there really aren’t different types of seat belts available in the commercial car arena. Cars just come with seat belts - period. We expect them to be there - even if some people choose to not wear them.

    Regardless of the reason(s) behind the lack of conversation surrounding cybersecurity, we should all be able to agree on one simple fact: we use these new gadgets and services completely unfettered - with little to no regard to the risks we face for our privacy and even our safety.

    Attend this session to gain the initial knowledge necessary by:
    - Learning to ask is this thing secure?
    - Understanding how or why it is or isn’t safe to use.
    - Identifying your role in your own cyber safety and that of those around you.

    It’s time to open our eyes and become aware of our surroundings. Join us to become aware.

    - Debra Farber, Host of The Privacy Pact, ITSPmagazine

    - Chris Roberts, Chief Security Architect, Acalvio Technologies
    - Dr. Christopher Pierson, CISO, Viewpost
    - Arun Vishwanath, Associate Professor at SUNY Buffalo & Black Hat Presenter
  • Citrix VDI and Nutanix - Everything You Want to Know
    Citrix VDI and Nutanix - Everything You Want to Know Tomas Griger & Matt Slotten, Nutanix & David Leclair, Innovations Healthcare, & Calvin Hsu, Citrix Recorded: Jul 26 2017 51 mins
    Infrastructure can make or break a VDI project. Successful Citrix XenDesktop and XenApp deployments require efficient, high performance and scalable IT infrastructure to deliver a great user experience. Hear from actual VDI project owners about what it takes to make Citrix VDI successful, and get a sneak peek into where Citrix + Nutanix integration is headed next.
  • The Network:  Cerebro for the Growing IT Enterprise
    The Network: Cerebro for the Growing IT Enterprise Chris Abella and Eric Thomas, ExtraHop Recorded: Jul 26 2017 38 mins
    IT environments are becoming larger and more complex through organic growth as well as acquisition. Accompanying initiatives—like datacenter migrations, for example—are expensive. Done well, these moves cost $1,200 to $6,000 per server. But when things go wrong? A poorly optimized load balancer could mean downtime for critical application servers – a price that could skyrocket to more than $25,000 per server.

    What if IT teams could be guided through the process? What if they had a way to map the plan and troubleshoot issues before they became outages?

    In this webinar, we'll share a story from an ExtraHop customer who underwent a large datacenter migration after it acquired a new business. Not only did their IT team undergo a successful migration, they also decreased troubleshooting time and cost to the company by 85 percent – freeing them to move beyond reactive firefighting to proactive solution building for the business.

    Join us to learn how they did it.
  • Elasticsearch and Object Storage
    Elasticsearch and Object Storage Jamshid Afshar, Engineer & Tony Barbagallo, VP of Product Recorded: Jul 26 2017 42 mins
    Elasticsearch is a distributed, RESTful search and analytics engine that can be used with object storage to enhance searchability of metadata searching operations. Join Caringo VP of Product Tony Barbagallo and Caringo Engineer Jamshid Afshar as they take an in-depth look at best practices for using Elasticsearch with object storage and demonstrate use of Elasticsearch with Caringo Swarm Object Storage.
  • Endpoint Detection and Response is not enough
    Endpoint Detection and Response is not enough Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Jul 26 2017 35 mins
    Traditional Endpoint Protection (EPP) products have failed to detect advanced malware that easily evade signature-based antivirus solutions. To counteract this problem, Gartner reports that 100% of EPP solutions will incorporate Endpoint Detection and Response (EDR) capabilities, focused heavily on security analytics and incident response.

    Even so, customers are realizing that protecting endpoints alone is not enough to prevent security breaches. That’s where a managed detection and response (MDR) service comes into play. MDR provides 360-degree visibility into endpoints and security devices, and offers 24/7 network monitoring.

    In this webinar, you will learn:
    - What EDR vendors offer beyond EPP solutions
    - Why Endpoint Detection and Response alone is not enough
    - How Managed Detection and Response (MDR) makes up for EDR shortcomings
  • Oracle and Nutanix: How to Architect an Efficient Environment
    Oracle and Nutanix: How to Architect an Efficient Environment Michael Webster & Murali Sriram, Nutanix & Darryl Maraj, GA Telesis, LLC Recorded: Jul 26 2017 51 mins
    Oracle apps and databases power an organization’s most critical workloads. There is a time to be conservative, but not when it means sacrificing the performance, availability and economics of your Oracle infrastructure. Come listen to veteran enterprise IT managers running Oracle on Nutanix, and loving it. Go home with details about architecting an efficient environment for Oracle eBusiness Suite, deploying test/dev environments and running core Oracle databases in production, and at scale.
  • How to Assess and Improve Your Problem Management Process
    How to Assess and Improve Your Problem Management Process John Clipp and Ted Gaughan Recorded: Jul 26 2017 56 mins
    This presentation will offer guidance on using the ISO/IEC 15504/33000 Assessment Methodology to conduct a maturity assessment of your Problem Management Process as part of your Continual Service Improvement (CSI) initiative.

    With the goal of achieving continuous improvement of the Problem Management Process, ISO/IEC 15504/33000 offers a structured methodology for process baseline and follow-on assessments. As a flexible assessment solution, which can be adapted to a company of any size, an assessment using the ISO/IEC 15504/33000 methodology provides the first step in a Continual Service Improvement initiative.
  • The Showdown for Data Preservation: Iron Mountain vs. The Cloud
    The Showdown for Data Preservation: Iron Mountain vs. The Cloud Storage Switzerland, CloudLanes Recorded: Jul 26 2017 59 mins
    Join Storage Switzerland and CloudLanes for our live webinar as we compare Iron Mountain to the cloud and provide ways to solve the gaps in public cloud storage's ability to be a viable data preservation service. Pre-register today and receive our new eBook "Using the Cloud for Long Term Data Preservation" in advance of the webinar.
  • Harness the power of crowdsourced mobile data and GPU-powered analytics
    Harness the power of crowdsourced mobile data and GPU-powered analytics Tom Luke, VP Sales, Marketing and Partnerships, and Mike Gardner, CSM at MapD Recorded: Jul 26 2017 46 mins
    Telecom providers and mobile application developers rely on mobile experience and usage data to drive investment decisions and improve service. But a lack of statistically significant and useful data, coupled with a limited ability to visualize and make sense of large datasets, has made it impossible to make informed, timely decisions.

    Tutela and MapD have partnered to provide an industry leading data solution for the mobile industry. Their solution combines billions of rows of crowdsourced data from Tutela with MapD’s GPU-powered data visualization and analytics platform.

    Attend this webinar to learn how telecoms and other mobile companies can:

    Leverage Tutela’s massive crowdsourced dataset with MapD’s real-time analytics platform to quickly spot trends, problems and opportunities to improve networks.

    Rapidly investigate competitors’ network performance and subscriber behaviour, from country to street-level detail.

    Access an unparalleled repository of mobile network quality data, including mobile network, device and application usage, market penetration and performance.

    Tutela is the world’s largest mobile data crowdsourcing company. Its software is installed on over 200 million devices and collects over 1 billion data points per day.

    MapD’s open source analytics and visualization platform leverages the parallel processing power of GPUs to query billions of rows of data in milliseconds, enabling businesses to gather insights from massive datasets.

    Try the demo here: https://www.tutela.com/explorer/
  • Tech Demo - AWS Container Security with SecureSphere
    Tech Demo - AWS Container Security with SecureSphere Giora Omer - Principal Engineer, Natasha Gupta - Product Marketing Manager Recorded: Jul 26 2017 28 mins
    Containers are exponentially growing as an agile and efficient way to deploy applications on the cloud. This opens new security challenges for cloud environments. In this session, learn about how Imperva SecureSphere can protect applications leveraging Amazon’s EC2 Container Service (ECS) and walk through a brief demonstration on configuring SecureSphere alongside applications using ECS.
  • Behavior-Driven Development: A Guide to Agile Practices
    Behavior-Driven Development: A Guide to Agile Practices Joshua Eastman, Test Automation Architect Recorded: Jul 26 2017 54 mins
    Behavior-Driven Development with Ruby/Cucumber automation is a practical, fail-proof, read-to-use strategy or process that improves software quality and decreases costs. 

    Ambiguity and miscommunication cause the majority of critical defects and undesirable outcomes in the software development lifecycle. Behavior Driven Development (BDD) ensures that requirements are accurate. It builds a mutual understanding of what should be developed and tested through a common vocabulary.

    This webinar introduces BDD methods that promote product quality by generating business requirements in Gherkin (Given-When-Then) format. Tool agnostic, BDD emphasizes communication between business, requirements analysts, developers, and testers to ensure quality expectations are achieved. Describing requirements in the form of system behavior eliminates scope creep and guarantees proper software functionality.
  • End the IT Blame Game
    End the IT Blame Game Moderator: Isaac Roybal, Presenter: Matt Cauthorn Recorded: Jul 26 2017 61 mins
    Network engineers and system administrators can spend a great deal of time responding to user complaints and troubleshooting slow performance issues that are difficult to diagnose or replicate. Resolving those issues can be especially problematic if those applications are provided by a third-party vendor or hosted by third parties, such as SaaS EMR applications, claims processing applications, and practice management applications. Often, IT teams do not have enough visibility to determine root causes or to counter claims from third-party vendors and managed service providers that host applications. With real-time insight into end-user experience for these hosted applications, including application-level transaction details, IT teams can hold vendors accountable and identify root causes faster.

    Learn how ExtraHop helps you identify the root cause of your IT problems, avoiding unnecessary friction among your IT teams and ransomware by providing full, real-time visibility into which devices are accessing network share and what type of behavior they are exhibiting, backed by machine learning for immediate anomaly detection.
  • VR content production: How to take advantage of the VR wave
    VR content production: How to take advantage of the VR wave Stewart Rogers, Director of Marketing Technology, VentureBeat Recorded: Jul 26 2017 60 mins
    VR creates infinite storytelling possibilities, but it’s also infinitely difficult to pull off. It’s a completely new medium that requires an entirely new way of creating content, and endless inventiveness, and have you ever seen a 360-degree camera?

    Join our latest interactive VB Live event to hear how companies are reducing travel expenses but improving employee connection, conducting interviews, and giving presentations. Learn about companies like Walmart using VR technology to train employees; how doctors are leveling up their skills; educators are transforming learning; and audience engagement skyrockets when you give them a whole new way to see, touch and interact.

    And discover how consumers are interacting with VR right now, and what the marketplace is expected to look like in the year ahead.

    Register now for real talk on the possibilities of virtual reality, the resources you need, and the rules to break.

    In this webinar you’ll:
    *Hear the results - for the first time - of the latest VR market research
    *Discover the compelling business case for VR
    *Understand why consumer-generated VR content is important to business
    *Find out how companies are using VR content to strengthen their bottom line
    *Learn what’s next in the VR content world

    * Dean Johnson, Head of Innovation, Brandwidth
    * Crystal O’Hea, Senior Director Expedition X, SeaWorld Parks and Entertainment
    * Stewart Rogers, Director of Technology, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat
  • [Breach Prevention] Disrupting Credential-based Attacks
    [Breach Prevention] Disrupting Credential-based Attacks Martin Walter, Product Line Manager, Palo Alto Networks Recorded: Jul 26 2017 58 mins
    Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

    In this session, get details on:
    * Why the platform plays a critical role towards disrupting credential-based attacks
    * Preventing the theft of credentials, using new PAN-OS 8.0 technologies
    * Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
  • Data Protection Made Easy: App Availability and Robust Data Protection
    Data Protection Made Easy: App Availability and Robust Data Protection Marc Lucas, Systems Engineer, Commvault Jul 27 2017 9:00 am UTC 60 mins
    In this webinar, produced in conjunction with Commvault EMEA Platinum Partner of the Year COOLSPIRiT, learn how Commvault's scalable, powerful and simple solutions ensure Application Availability and Robust Data Protection across your entire infrastructure.

    Presented by Marc Lucas, Commvault Systems Engineer, find out how to:

    * Simplify the move to the Cloud
    * Utilise award-winning BaaS, DraaS and SaaS Data Protection
    * Obtain greater insight with software defined storage
    * Ensure data availability for business-critical applications
    * Minimize system downtime with an innovative and scalable solution

    COOLSPIRiT provides in-depth knowledge and expertise across the solutions portfolio. Their highly-skilled accredited experts can analyse and review your existing IT infrastructure to recommend and deliver the best value for your business. With proven best practice and multiple use cases, COOLSPIRiT Solutions Architects can help to design, configure and implement a robust IT strategy for data availability, compliance and disaster recovery.
  • How to build a high performance team to meet demand
    How to build a high performance team to meet demand Michael Harris, Executive Coach and IT Consultant Jul 27 2017 9:00 am UTC 45 mins
    Join Michael Harris on how to build the right high performing teams to meet demand - it’s all about people - How do we make the corporate machine value that and attract, inspire, unlock the potential of and retain, the right people?

    He has a unique combination of leadership, industry, coaching and transformational experience. His passion is helping organisations, and individuals, shape and build their future. In a career spanning over 30 years, Michael has worked in Financial Services, Manufacturing, Telecoms, Government and as a freelance consultant.

    Michael has a broad experience that has given him unique insight into the future challenges leaders face. As Michael says “One of the most difficult things that leaders need to do is to articulate a clear vision, collaboratively build a strategy and plan to achieve that vision and, most importantly, build a strong and passionate following to bring people with them.”
  • Accelerate Your Advanced Analytics
    Accelerate Your Advanced Analytics Bora Beran - Product Manager, Tableau Jul 27 2017 11:00 am UTC 60 mins
    Tableau is all about making your analytics faster, smarter, and more powerful, so that everyone can get the answers they need. Helping people gain insight into their data to solve unexpected problems is what drives us.

    In this webinar, we will explore how Tableau can help with all stages of an analytics project, but focus specifically on a few advanced capabilities. Broadly, we will look at the following scenarios and the capabilities that support them:

    -Segmentation and Cohort Analysis
    -What-If and Scenario Analysis
    -Sophisticated Calculations
    -Time-Series Analysis
    -Predictive Analysis
    -Rand Python Integration

    Attend to see how Tableau is making advanced analytics exploratory, faster and more scalable than ever before.
  • An Exciting Day in the Life of a Risk Manager! - Really!
    An Exciting Day in the Life of a Risk Manager! - Really! Amar Singh, Chris Payne, Dom Saunders Jul 27 2017 1:00 pm UTC 60 mins
    Policy? We have a policy? Have you read the policy? Thats right...who actually reads company policies?

    Risk and compliance managers globally have lost the fight against user policy acceptance leading to increasing organisational risk and the decreased ability to stand up and demonstrate effective compliance to regulatory bodies.

    Does it have to be this way? In this webinar, we

    * Demo what we use to transform and make mainstream what is often boring and ignored.

    * Show how you can effectively measure (yes measure and report) on how effective your policy implementation is.

    * Better engage and enforce your policies with third parties.
  • CDCP (Certified Data Centre Professional) Course Sneak Peek
    CDCP (Certified Data Centre Professional) Course Sneak Peek Marco van Gink Jul 27 2017 2:00 pm UTC 45 mins
    Find out why the CDCP is the most attended course by data centre professionals from all over the world. The CDCP is a must-have for anyone working in and around the data centre industry, whether a vendor/supplier, designer/builder, data centre owner/operator, those involved in daily operations of a data centre or a data centre user/customer. CDCP provides you with the knowledge of all aspects of the data centre and will enable you to talk confidently about the data centre with your colleagues, vendors, customers or your superiors. CDCP certification is a must have for your career in the growing data centre industry.
  • Cyber-Threat Report 2017 - Selected Case Studies from Darktrace
    Cyber-Threat Report 2017 - Selected Case Studies from Darktrace Andrew Tsonchev, Director of Cyber Analysis and Bethany Edgoose, Lead Research Analyst Jul 27 2017 3:00 pm UTC 30 mins
    Over the course of the past year, cyber-attacks have frequently made headlines. In 2017 alone, global ransomware damage costs are expected to exceed $5 billion, with the total cost of cyber-crime expected to reach trillions of dollars.

    Darktrace has detected over 30,000 in-progress cyber-threats, and has firsthand experience with modern, never-before-seen attacks, including fast moving ransomware, new strains of malware, compromised IoT devices, malicious insiders, attacks on cloud environments, and more.

    Join our Director of Cyber Analysis, Andrew Tsonchev, and our Lead Research Analyst, Bethany Edgoose, as they present Darktrace's 2017 Threat Report, review novel cyber-attacks, and break down how they were detected by the Enterprise Immune System.
  • Secrets of the Superstar CISO
    Secrets of the Superstar CISO Jake Olcott, VP of Strategic Partnerships, BitSight; Chris McClean, Vice President, Research Director, Forrester (Guest) Jul 27 2017 3:00 pm UTC 60 mins
    As business success grows more reliant on data, technology, and third parties, CISOs and security leaders are finding themselves more often in the spotlight. They're being asked to brief board members, respond to third party requests, guide critical decisions, and make tough strategic calls. These increasing expectations are creating great opportunities for CISOs to shine, but to do so, they need to rise to the occasion. This webinar takes best practices and lessons learned from "superstar" CISOs, explaining what top security leaders are doing to lead their companies successfully through some of today's most complex business and technology challenges.
  • 5 Myths of Modern Infrastructure... Busted!
    5 Myths of Modern Infrastructure... Busted! Saif Gunja, Product Marketing Manager Jul 27 2017 3:00 pm UTC 30 mins
    In this session, we will discuss – and debunk – common misconceptions that you may encounter when planning to modernize your infrastructure. We’ll examine whether ‘build-it-yourself’ modernization deliver the same results as integrated solutions, if a modern infrastructure impacts the role of IT admins, how it effects the ROI of your existing infrastructure, the readiness of a simple, modern infrastructure for enterprise workloads, and whether or not infrastructure modernization leads to vendor lock-in.
  • Security a Revenue Center: How Security Can Drive Your Business
    Security a Revenue Center: How Security Can Drive Your Business Joe DiPietro Jul 27 2017 3:00 pm UTC 60 mins
    Traditionally Security was viewed as necessary cost center or an insurance policy you hoped you’d never have to cash in. Yet by automating security policy management you can actually save your organization both time and money and even enable and support the revenue generation processes.

    Presented by Joe DiPietro, SE Director, this technical webinar will provide an overview of how automated security policy management goes beyond providing ROI and cost savings, to directly impacting business productivity and agility.

    This webinar will:

    * Highlight the security policy processes that can be automated, including challenges, benefits, planning and prioritization considerations.
    * Provide an overview of the security management maturity model and highlight opportunities for automation and optimization for each stage of the model.
    * Dissect and assess cost saving and revenue generation opportunities for specific key challenges including security change management, risk management, application migration, and auditing and compliance.
  • CSPs must adopt turnaround strategies to transform customer/employee experience
    CSPs must adopt turnaround strategies to transform customer/employee experience Ken Jacobsen, Group Sales Director, Media and Comms & Rob Allman, Group General Manager, Customer Experience, Dimension Data Jul 27 2017 3:00 pm UTC 45 mins
    CSPs need to engage turnaround strategies to transform customer and employee experience issues across the sector. This will turn current challenges into positives for 2018 and beyond! The latest CX benchmarking report provides insightful findings about the top issues and how to address them through innovative solutions and services.

    According to Joe Manuele, Dimension Data’s Group Executive, CX and Collaboration said: “The world has formed a digital skin and business, service, technology and commercial models have changed forever. However, organisations are strategically challenged to keep pace with customer behaviour.” Join us for this webinar where we’ll be discussing the CSP specific findings from the report.
  • Multiple Virtualized Workloads with Dell EMC
    Multiple Virtualized Workloads with Dell EMC Dell EMC Jul 27 2017 3:00 pm UTC 60 mins
    Learn how Dell EMC helps customers simplify how they deploy and manage their server virtualization, private cloud, and desktop and application virtualization solutions.
  • GDPR: Minimise the risk of non-compliance with an assessment strategy
    GDPR: Minimise the risk of non-compliance with an assessment strategy Amanda Maguire- Education Solution Architect SAP SuccessFactors Jul 27 2017 3:00 pm UTC 45 mins
    Preparing for GDPR? Are you wondering how you'll track and manage employee compliance?

    If your answer is yes, join Amanda and Chloe live on July 27th for this 45-minute FREE, educational webinar: 'Using Assessments for GDPR Compliance'.

    During this webinar, Amanda and Chloe will talk you through the basics of GDPR and show you how to achieve compliance by not only training your people but testing their knowledge so you can prove you’ve taken every step to fulfil the regulation and prevent data breaches.
    Amanda Maguire is a senior education architect with over 20 years' experience on business transformation programmes. With a career focused on the impacts on people – project team members, end users, suppliers and customers, Amanda has a passion for effective and engaging education, enabling people through innovative learning interventions. Her experience is wide ranging - from national to global programmes in a variety of industries.

    Chloe Mendonca is a Marketing Manager who leads a variety of digital communication campaigns and events across EMEIA. She is particularly fascinated by the way digital technology is changing the world and enjoys helping organisations worldwide realise the power of Questionmark's assessment management system. For the past 5 years, Chloe has worked with businesses across an array of verticals, sharing their stories.
  • Defining Enterprise Cloud Data Management for a hybrid world
    Defining Enterprise Cloud Data Management for a hybrid world James Humphrey, National Instruments and Forbes Analyst Joe McKendrick Jul 27 2017 4:00 pm UTC 60 mins
    Is your company on a data-driven digital transformation journey?
    With cloud being a strong directive, managing the enterprise data across cloud and on-premises environments is a common impediment in this journey. However, you are not alone when facing this hybrid data management challenge.
    Join Forbes contributor and analyst, Joe McKendrick and James Humphrey, Principal Architect at National Instruments as they share critical business drivers, use cases and challenges shaping the success of the journey to cloud.

    In this webinar, you will learn:
    - Current digital transformation market trends driving the influence of cloud.
    - Role of hybrid data management
    - How National Instruments is growing at scale and reducing time to market for their products and services
    - How National Instruments is making cloud work for their Data Lake projects to scale cost-effectively and augment existing hybrid landscape
  • Expert Panel: Bug Bounty Trends and What They Mean
    Expert Panel: Bug Bounty Trends and What They Mean Casey Ellis, Founder & CEO, Bugcrowd Jeremiah Grossman, Chief of Security Strategy, SentinelOne HD Moore, Founder of The Meta Jul 27 2017 4:00 pm UTC 60 mins
    Traditional methods for vulnerability discovery are failing us. With rapidly expanding attack surfaces, motivated adversaries, and the growing shortage of full-time infosec professionals, organizations are fighting a losing battle. One thing is clear: We need a new approach.

    Enter the Bug Bounty model. Bug bounties have quickly evolved from a “nice to have” to a “must have” for most application security teams.

    What’s behind this trend? Why are bug bounties growing, and why now?

    Join our expert panel as we discuss the key findings from The 2017 State of Bug Bounty Report.

    - Casey Ellis, Founder & CEO of Bugcrowd
    - Jeremiah Grossman, Chief of Security Strategy at SentinelOne
    - HD Moore, Founder of The Metasploit Project
  • Applying Advanced Analytics to Your Industry - Lessons from Healthcare
    Applying Advanced Analytics to Your Industry - Lessons from Healthcare Gwen O'Keefe, MD Principal of GO Healthcare Strategy Jul 27 2017 4:00 pm UTC 60 mins
    In this webinar, Healthcare Analytics Expert, Dr. Gwen O'Keefe will explore analytics capabilities that have transformed other industries, like healthcare, and how they can be applied to yours. She'll outline the key steps for success and adoption of predictive analytics projects and share how to advance the use of predictive analytics and machine learning to improve all aspects of your business.
  • Going Hybrid with Google Cloud Platform and Kubernetes
    Going Hybrid with Google Cloud Platform and Kubernetes Allan Naim, Global Product Lead for Google Cloud Platform, Google Jul 27 2017 4:00 pm UTC 50 mins
    It’s not news to anyone in IT that container technology has become one of the fastest growing areas of innovation. We’re excited about this trend and are continuously enhancing Google Cloud Platform (GCP) to make it a great place to run containers. Join us to learn more about how to get started with GCP and why it is the “container-optimized” cloud.
  • Time for Banks to Reassess Their Risk of DDoS Attacks
    Time for Banks to Reassess Their Risk of DDoS Attacks Tom Bienkowski, Director of DDoS Product Marketing, Arbor Networks Jul 27 2017 4:00 pm UTC 45 mins
    A study by McKinsey suggests the increased operational risk of digital innovation threatens 6% of the net profit for a retail bank. Renowned hactivist group Anonymous’ OpIcarus; a Distributed Denial of Service (DDoS) attack siege on the world’s banking infrastructure and other well publicized successful attacks have exposed just how vulnerable banks are to such threats. The reality is modern day DDoS attacks are getting more frequent, more sophisticated, and are commonly used as a distraction during the data exfiltration stage of advanced threat campaigns. The unfortunately reality is that in many cases, these attacks succeed because the targets were simply inadequately prepared to stop them.

    Join this webcast to learn:
    •The latest trends in DDoS attacks.
    •Commonly overlooked costs due to DDoS attacks.
    •And best practices in DDoS attack defense.
  • Not All Endpoint Protection Platforms Are Created Equal
    Not All Endpoint Protection Platforms Are Created Equal Torry Campbell, Senior Director Product Management, Symantec Jul 27 2017 5:00 pm UTC 60 mins
    Prevent, detect, respond and assess, all through a single agent

    Did you know McAfee is no longer a leader in industries Magic Quadrant? While your endpoint security is at risk, how many agents/modules do they require you to install? How many servers? And with all that, are you getting the right level of endpoint protection against advanced threats?

    Symantec provides the most complete endpoint security in the world - from threat prevention, detection, response and assessment with the highest efficacy and performance.

    In this webinar, you’ll learn how to:

    · Drastically improve your protection and security posture with various next-gen capabilities like Advanced Machine Learning and Exploit Prevention

    · Perform incident investigation and response using the same agent using the integrated Endpoint Detection and Response solution

    - Obtain automated security risk assessment and track effectiveness against security policy changes via a cloud console

    · Lower your IT burden and reduce complexity with everything built into a single agent

    · Facilitate a painless migration and get your IT staff up-to-speed

    Finally, see a demo that showcases how Symantec stops ransomware and unknown threats with Next-gen technologies built into a single light weight agent.

    Register Today!
  • See It In Action - Advanced Email Protection Live Demo
    See It In Action - Advanced Email Protection Live Demo Proofpoint Jul 27 2017 5:00 pm UTC 60 mins
    Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information. This event focuses on both.

    Join us Thursday, July 27, 10 AM PT for a live demo that will explore Proofpoint Email Protection and Targeted Attack Protection.

    Learn about:

    -- Today’s threat landscape and to how to build your defense against spam, malware, and non-malware threats
    -- Approaches for identifying suspicious messages
    -- The latest in security software to fight against advanced threats
  • "Cloud-First" Ransomware - A Technical Analysis
    "Cloud-First" Ransomware - A Technical Analysis Bob Gilbert and Sean Hittel of Netskope Jul 27 2017 5:00 pm UTC 60 mins
    Cloud services have emerged as the preferred attack vector of some of the most dangerous and innovative cloud malware exploits of the past six months. Why?  Because many organizations don't inspect their cloud SSL traffic for malware and the same functionalities of the cloud dramatically increase productivity (sync, share, collaborate, etc) also provide ransomware developers with a perfect medium for faster delivery of malware payloads to more targets.

    Join Netskope chief evangelist, Bob Gilbert, and Threat Detection Engineer, Sean Hittel, for a fascinating look at how malicious actors now design ransomware to make best use of popular cloud services to hide in plain sight, and do more damage in less time. 
    Bob and Sean will provide technical analyses of recent malware campaigns discovered or documented by Netskope Threat Research Labs and how to defend against them.  These include:
    • Virlock, which encrypts files and also infects them, making it a polymorphic file infector 
    • CloudFanta, which uses the SugarSync cloud storage app to deliver malware capable of stealing user credentials and monitoring online banking activities
    • CloudSquirrel, which takes advantage of multiple cloud apps throughout the ransomware kill chain with the intent to steal and exfiltrate user data
    • The Zepto variant of Locky ransomware, now distributed both by popular cloud storage apps and via DLL
  • [Breach Prevention] Phishing & Credential Abuse 201 - Inside the Attack
    [Breach Prevention] Phishing & Credential Abuse 201 - Inside the Attack Brad Duncan, Unit 42 Threat Intelligence Analyst, Palo Alto Networks Jul 27 2017 5:00 pm UTC 60 mins
    This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

    In this presentation, our Unit 42 Threat Intelligence team will show you:
    • How credential theft and abuse were used in real world attacks
    • Demonstration of tools attackers use to capture credentials.
    • How attackers buy and sell credentials on the dark web to further their criminal operations.
  • Containers and Persistent Memory
    Containers and Persistent Memory Arthur Sainio, SNIA NVDIMM SIG Co-chair, SMART Modular, Chad Thibodeau, Veritas, Alex McDonald, NetApp Jul 27 2017 5:00 pm UTC 75 mins
    Containers can make it easier for developers to know that their software will run, no matter where it is deployed. This webcast, presented by the SNIA Cloud Storage Initiative and the SNIA Solid State Storage Initiative, will discuss how persistent memory is a revolutionary technology, which will boost the performance of next-generation packaging of applications and libraries into containers.

    You’ll learn:
    •What SNIA is doing to advance persistent memory
    •What the ecosystem enablement efforts are around persistent memory solutions
    •How NVDIMMs are paving the way for plug-n-play adoption into containers environments

    Join SNIA experts, Arthur Sainio, SNIA NVDIMM SIG Co-chair, Chad Thibodeau, SNIA Cloud Storage member and Alex McDonald Co-chair of SNIA Solid State Storage and SNIA Cloud Storage Initiatives to find out what customers, storage developers, and the industry want to see to fully unlock the potential of persistent memory in a container environment.
  • The traditional data center is dead: How to win with hybrid DR
    The traditional data center is dead: How to win with hybrid DR Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Jul 27 2017 5:00 pm UTC 60 mins
    Today, with hybrid cloud, collocation sites and managed service options, you can build a robust disaster recovery environment without physically building data centers. Saving money and time. In this webinar you’ll hear best practices to leverage new technologies for an optimal hybrid DR solution.