As an IT professional, many of the problems you face are multifaceted, complex and don’t lend themselves to simple solutions. The information technology community features useful and free information technology resources. Join to browse thousands of videos and webinars on ITIL best practices, IT security strategy and more presented by leading CTOs, CIOs and other technology experts.
Organisations are constantly under threat with over two-thirds of them experiencing data breaches in 2018. As a result, preparedness and resiliency are paramount to protecting an organisation’s information from cyber attacks.
Business leaders and their security teams can improve their ability to handle cyber attacks by running cyber security exercises. These exercises should help the organisation identify areas of improvement in people, process and technology, reducing the impact should a real cyber attack occur.
In this webinar Daniel Norman, Research Analyst, ISF will share how organisations should approach running internal cyber security exercises to support breach identification, prevention and response.
Richard Tibbetts - Product Manager, AI, Tableau | Kris Skrinak - Machine Learning Lead, AWSLive57 mins
The promise of artificial intelligence (AI) is that machines will help humans make better decisions. In some cases decisions are automated away; in other cases humans collaborate with AI to make the best decisions. In all cases, people need to understand what machines are doing, to avoid mistakes, to make ethical decisions, and to understand their data.
Gartner research indicates “85% of CIOs will be piloting artificial intelligence programs through a combination of buy, build, and outsource efforts.” But as organisations become more reliant on AI and machine learning models, how can humans be sure they are receiving trustworthy answers to the right questions?
Attend this webinar to hear directly from the developers at Tableau who lead our investments in AI and learn about our plans to partner with AWS.
Joakim Lialias, Symantec | Sundeep Vijeswarapu, PayPal | Fernando Montenegro, 451 ResearchLive60 mins
As attackers become more sophisticated, advanced protection and hardening are necessary for added layers of security.
Hear from Joakim Liallias, Symantec and special guest speakers Sundeep Vijeswarapu from PayPal and top industry analyst Fernando Montenegro, 451 Research as they discuss:
- How to gain a better understanding about the trends that are driving the need for a more comprehensive endpoint security approach.
- How PayPal is using Symantec Endpoint Security to protect their endpoints.
- How Symantec is redefining endpoint security with its new complete cloud-delivered endpoint defense:
- Introducing never seen before innovation to deliver best-in-class prevention
- Hardening Detection and Response to help customers achieve superior threat prevention,
- Quicker identification of attackers and more tightly integrated technology and human expertise lead to better response and faster remediation
- Security professionals and IT teams are strapped for time – streamlined management and automation will reduce significant burden
Don't miss this great opportunity to get the latest information to simplify Endpoint Security for your organization.
Amanvir Sangha, Consultant, SynopsysRecorded: Feb 20 201970 mins
We all know that fixing defects early in the SDLC is the right approach to building secure software. Security needs to be in every part of the pipeline but it’s often hard to get everybody onboard with software security initiatives.
Come join us on this webinar to explore how to build a culture of proactive secure programming in your technical organization and how to implement security as an enabler without disrupting the velocity of projects in modern development teams. See how Synopsys tools and services can allow you to build secure, reliable and quality software.
Helen Kinsella, Senior Product Specialist, InformaticaRecorded: Feb 20 201942 mins
Data landscapes are changing constantly, and data is exploding. Companies have ambitious plans to expand and disrupt markets based on data. Business users want answers to many complex business questions.
However, finding the right data is not a trivial task.
No matter how modern your modern analytics platform is, unless your business users can find, trust, understand the context of, and quickly leverage their data assets throughout the enterprise, your analytics modernization initiative will probably deliver underwhelming results.
Data cataloging is an essential component for a modern analytics initiative, supporting self-service discovery and access to data.
Join this webinar to
•Hear how Informatica Enterprise Data Catalog enables both business and IT users to discover, understand, curate, and manage all data assets across the enterprise.
•See an AI-powered data catalog in action
•Find out what your next steps might be to accelerate your data-driven digital transformation through data insights and decisions based on trustworthy and relevant data
David Simpkins, Anne-Gaëlle Santos, and Maarten Verhaegh from BTRecorded: Feb 20 201924 mins
Cloud adoption is mainstream, but accelerating.
Recent research from the Cloud Industry Forum found that nine in ten organisations (89%) currently use cloud-based services and the vast majority (85)% expect to increase their usage over the next 12 months.
So, it’s a good time to explore the potential challenges, risks and rewards of multi-cloud adoption, so you can identify how to best exploit the benefits, while also avoiding the pitfalls.
In an earlier webinar, we highlighted 3 common challenges that organisations face with multi-cloud adoption:
- traditional infrastructure not supporting cloud transformation
- complexities of multi-cloud management
- attraction and retention of the right skills and tools to manage and secure hybrid cloud
In this live expert panel, we turn our focus on infrastructure and explore in more detail why cloud networking in particular is so critical to your cloud strategy.
Join our experts as they share their in-depth experience and learning and get some valuable tips on how to get your multi-cloud strategy in good shape.
David Simpkins – general manager, managed services and public cloud, BT
Anne-Gaëlle Santos - head of dynamic network services, BT
Maarten Verhaegh - head of cloud strategic alliances, BT
Asankha Perera and Chathura Widanage, SLAppForgeLive53 mins
Join Asankha Perera and Chathura Widanage from SLAppForge to learn about:
- A significantly more productive IDE for Serverless computing
- How to develop an end-to-end Serverless application in a few minutes
- How to build, test and deploy applications without leaving the IDE
- Work hands-on with the AWS API Gateway, Lambda, DynamoDB and S3
- Learn about upcoming features - Serverless security and monitoring
Girish Dadge, Director Product Management and Ryan Boyer, Partner Solutions Architect - Sungard ASRecorded: Feb 20 201931 mins
Follow us throughout this series as we discuss The Sungard AS Amazon Web Services (AWS) portfolio, which includes Cloud Recovery- AWS and Managed Backup- AWS, as well as Managed Cloud- AWS for everyday production systems.
Adam Meyers: VP Intelligence - CrowdStrike, Kurt Baker: Senior Director of Product Marketing for Intelligence - CrowdStrikeRecorded: Feb 20 201949 mins
Today’s security Operation Center (SOC) teams are challenged by the volume and growing sophistication of cyber threats. The typical SOC receives tens of thousands of alerts each week, yet, due to a lack of time and resources, only a small percentage will ever be investigated.
This webcast, "A Day in the Life of a SOC Analyst," looks at typical SOC activities, including the pitfalls and failures, and offers a new approach to alert investigation and response. Join CrowdStrike VP of Intelligence Adam Meyers to gain an understanding of how integrating and automating threat intelligence with endpoint protection can accelerate incident research, streamline the investigative process and drive better security responses.
Attend this webcast to hear CrowdStrike experts discuss:
- How you can cut your incident investigation time from 8 hours to 10 minutes
- How SOC teams can focus on the most relevant threats — the ones that reach your endpoints
- How you can automatically investigate all incidents, learn from attacks, and accelerate your decision-making and response
- Why understanding custom indicators of compromise (IOCs) is critical and how they can help you defend against future attacks
- How to get ahead of adversaries by understanding their motivations and tradecraft, enabling you to predict and anticipate their next move
Ciaran Bolger, Ed HumplemanRecorded: Feb 20 201938 mins
Oracle has the complete set of solutions to transform your customers legacy communication environment into a platform for innovation. Nuvias can help you build more agile and extensible communications solutions that deliver state-of-the-art collaboration capabilities while protecting existing investments and future-proofing their network.
Candid Wuest and Alexander PetersRecorded: Feb 20 201960 mins
Verpassen Sie die Möglichkeit nicht, sich mit den führenden Analysten von Symantec über die Erkenntnisse aus dem neuesten Internet Security Threat Report (ISTR) aus dem Jahr 2018 auszutauschen.
Erhalten Sie tiefe Einblicke in die Themen:
- Der Goldrausch der Cryptominen
- Der sich wandelnde Trend der Ransomware-Infektionen
- Details über gezielte Cyber-Angriffe
- Infektionsgefahren durch Softwareupdates
- Die Welle der mobilen und IoT Bedrohungen setzt sich fort
Ingo Pieper, Solution Architect AMC, Micro FocusRecorded: Feb 20 201954 mins
Unternehmensapplikationen bilden das Herzstück der digitalen Geschäftswelt und müssen erheblich mehr leisten als je zuvor. Ständig werden neue Verbindungen geschaffen, Änderungen und Verbesserungen vorgenommen. Und das ist bei vielschichtigen Anforderungen in einer immer komplexeren IT-Welt mit Risiken und Herausforderungen behaftet. Hinzu kommt, dass Änderungen quasi schon gestern hätten fertig sein sollen!
Doch wie kann man den Anforderungen von heute gerecht werden und Innovationen schneller liefern? Micro Focus einzigartiger Ansatz basiert auf der Überzeugung, Werte zu bewahren und darauf aufzubauen, statt sie über Bord zu werfen. Sie sollen nachhaltig wirken und in der stets ändernden hybriden IT-Welt lebendig bleiben. Das erreichen wir durch eine Modernisierung mit DevOps-Verfahren und Automatisierungen für die schnellere Bereitstellung neuer Funktionalitäten.
In dieser Webinarreihe stellen wir Ihnen marktführende Lösungen vor, mit denen Sie unterschiedliche Modernisierungsstrategien umsetzen können, um Ihr Unternehmen in der Schaffung neuer Geschäftsfelder besser, schneller und ohne Risiko zu unterstützen.
Webinar 1: 20. Februar
Im ersten Webinar dieser Reihe zeigen wir Ihnen, was die Modernisierungslösungen von Micro Focus basierend auf den drei Pfeilern Applikations-, Prozess- und Infrastruktur Modernisierung für Sie leisten können. Erfahren Sie, wie Sie mit der richtigen Technologie Ihre Kernsysteme mit .NET, JVM, Docker, Azure und AWS, APIs, Web und mobilen Lösungen betreiben und verbessern können, indem Sie agile Prozesse, DevOps, CI und kontinuierliche Auslieferungsprozesse nutzen.
Xavier Stern, Territory Director Southern Europe, HYCU, Inc.Recorded: Feb 20 201946 mins
Deseamos invitarle a nuestro workshop de HYCU, la única solución de recuperación y respaldo dedicada a NUTANIX
HYCU es la única solución de respaldo y seguridad dedicada a NUTANIX (AHV, ESX), para complementar la protección de datos proporcionada de forma nativa por NUTANIX.
Certificado en AHV (HYCU se desarrolla en primer lugar en Acrópolis) ESX, Nutanix Files, Volume Groups, y CALM .
HYCU, socio tecnológico estratégico de Nutanix.
Nutanix utiliza la solución de HYCU para sus copias de seguridad.
Terence Grey, Senior Systems Engineer, ANZ, InfobloxRecorded: Feb 20 201963 mins
Most organisations have multiple products and services, from multiple vendors and suppliers to address their cybersecurity needs. The lack of integration and inability to share critical information results in silos of technology that cause inefficiency, lack of agility, limited visibility and a poor security posture. How can an organization solve and streamline to improve their cybersecurity operations?
Join Infoblox and (ISC)² on Feb 20, 2019 (Wed) at 14:00 (GMT +8) to learn how to assist organisations in improving their security operations and reducing time to containment.
Presenter: Terence Grey, Senior Systems Engineer, ANZ, Infoblox
Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
Chris Hiatt - Systems Engineer, N2WSRecorded: Feb 20 201960 mins
The promise of the cloud has been a more agile, cost-effective and disaster-proof way to scale. However, this promise comes with some fine print - AWS and other public cloud providers guarantee the safety of your infrastructure but not your data.
Join our LIVE session to find out more about:
•Why you need to protect your AWS environments and why native backup is just not enough
•How to perfect rapid, granular disaster recovery
•How you can reach application consistency for 100% uptime
Alex Holden, CISO, Hold SecurityRecorded: Feb 19 201962 mins
The simplest way to compromise systems is not by hacking but through use of previously stolen information like credentials that would let the bad guys walk in through the front door and take everything.
Therefore, stolen credentials have a high demand on the Dark Web and we are constantly barraged by news about massive credentials thefts.
You should be protecting your users from losing their credentials and subsequent abuse. However, you should also protect them against misinformation about "new" credentials cache discoveries.
After being credited with the largest legitimate stolen credentials discoveries, I feel like one of the world's foremost experts to provide you with insights about critical thefts.
Marc Petrivelli, Consulting Architect, Red Hat, and Benjamin Leung, Consultant, Red HatRecorded: Feb 19 201960 mins
Many organizations are facing a difficult challenge to automate their systems. They worry it will require ample resources to write custom code they think is required.
Fortunately, there is another option. Organizations can use Red Hat® Ansible® Automation to write simple task descriptions that even new team members can understand the first time. Using Ansible Automation saves upfront costs and makes it easier to react to change over time.
In this webinar, we will discuss how to:
> Look at an app and its dependencies to construct a common framework for deployment.
> Deploy multitier applications reliably and consistently, all from a singular common framework.
> Configure services and push application artifacts from a common system.
Rema Deo, Managing Director, 24By7Security, Inc.Recorded: Feb 19 201956 mins
About this webinar:
We discuss key requirements related to a Vendor Risk Assessment. If you have vendors performing important duties for you and/ or have access to your or your clients' confidential information, you may need to perform a Vendor Risk Assessment. This session is part of our Cyber Conversations webinar series.
Learn, among other topics, how to:
- Identify the vendors that need a risk assessment.
- Risk Rating your vendors
- How do you go about performing a step-by-step vendor risk assessment, sometimes also called a Third Party Risk Assessment or Third Party Information Security Assessment?
CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. We will issue a Certificate of Completion to those who attend the webinar, to the specific email address and attendee name on the registration form. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar.
Nathan Rowe, Chief Product Officer & Co-Founder, EvidentRecorded: Feb 19 201942 mins
Cybercriminals can easily monetize stolen data, either by leveraging it themselves for fraudulent activity, or by selling it –– either way, they’re getting paid.
Digitally innovative hackers who target non-profit, educational, government, and other industries with minimal cyber defense mechanisms often find it easier to steal financial or medical records than it is to steal actual money, which further contributes to the value of personal data.
Companies are handling and collecting more and more personal data than ever before… just one small lapse or vulnerability, and a hacker can potentially gain access to volumes of sensitive personal data.
In this webinar, we’ll discuss why it’s just as important to safeguard your employees’ and customers’ personal data as it is to protect your bank account.
- Why cybercriminals prioritize data hacking for financial gain
- The increasing value of data translates directly to dollars saved/lost
- Mitigating the liability of handling data can be your best security measure
Zero Trust security for microservices, containers and cloud works through the transparent generation of strong application identity. This identity is used for authenticating and authorizing application component interaction with themselves, user interfaces, and external services. In this webinar we will discuss how enterprises can adopt microservices and the cloud while leveraging their existing, brownfield infrastructure without compromising security.
Rohit Chettiar, Detection & Response Solutions Engineer, Rapid7Recorded: Feb 19 201928 mins
The biggest challenge that security analytics addresses is the volume and diversity of information that can be analyzed at a given point to assist security professionals in detecting, responding to and mitigating cyber threats. But how do you leverage that data to implement security best practices?
InsightIDR is a single solution that provides visibility across your traditional on-premise environment, but also extends monitoring to your remote endpoints and cloud services. Join us to learn how InsightIDR provides visibility into your network and highlight useful metrics to implement security best practices.
In this webcast, we will discuss:
1. How to make security analytics more consumable
2. The data sources you need to collect and analyze
3. How InsightIDR leverages pre-built analytics to detect top attack vectors
John Strand and Jake Williams - SANS Senior Instructors & John Pescatore, SANS Director of Emerging Security TrendsRecorded: Feb 19 2019126 mins
Join John Strand and Jake Williams - SANS Senior Instructors along with John Pescatore, SANS Director of Emerging Security Trends for a discussion on your best strategies to consider for 2019 to build and maintain your cybersecurity defenses. This special 2 hour webcast includes talks from John Strand and Jake and is followed by a lively panel of all three experts. Sponsored by Cisco.
Clive D'Souza, AWS Service Catalog | Demetrius Comes, VP of Engineering, GoDaddy Inc. | Ketal Patel, Sr. Manager, GoDaddy IncFeb 20 20192:00 pmUTC60 mins
Learn how GoDaddy achieved self-service, standardisation, and governance through AWS Service Catalog in the first 100 days of their cloud migration journey. We walk through GoDaddy’s use case of how they migrated to AWS with AWS Landing Zone, AWS Service Catalog, and the initial 100 days to establish their Cloud Center of Excellence to increase their speed of delivery and improve performance and reliability, while not sacrificing on security and financial controls.
Andy Yeates, Solutions Architect, IBM ResilientFeb 20 20192:00 pmUTC45 mins
Organisations today need to be agile, and dynamic in responding to the most advanced cyber threats, and although automation has it's place in improving SOC efficiencies, human intelligence is still one of the most important aspects in effective incident response.
In this session learn more about the journey to Intelligent orchestration and how leveraging it in an uncertain world can empower your organisation.
Wayne Speechly: Principal Director, Dimension Data and Richard Sutherland: Global Technical Account Manager, IntelFeb 20 20192:00 pmUTC60 mins
Mainstream Artificial Intelligence (AI) may still be in its infancy, but it offers real business benefits today. Join Wayne Speechly and Richard Sutherland as they discuss how AI is penetrating the workplace and how it is causing business leaders to rethink how they run their organisations.
Keith Langridge & Hasan Javed from BT, and Jon Howes & Ricardo Belmar from InfovistaFeb 20 20192:00 pmUTC30 mins
The pressure is on to deliver a smarter network for the future. So what’s holding you back? You could be losing around 2.6% of your annual revenues because of slow running applications and downtime.
It’s tricky to get sufficient visibility of your key applications and as you take on board more cloud services or digitise your operations, you may end up with blind-spots and inefficiencies.
In our upcoming live filmed webinar, experts from BT and Infovista will discuss how to get a full end-to-end view across your application and network infrastructure, improve performance and deliver the user experience your customers and employees demand.
You’ll find out more about :
• automated control of the user experience, optimised per user
• how to truly gain the benefits of the cloud in your digital transformation
• some unique ways to work with Microsoft business applications
• application intelligence in the era of SD-WAN
• Keith Langridge - Vice President, Network Services, BT
• Hasan Javed - Senior Product Manager,, Connect Intelligence Infovista, BT
• Jon Howes - Senior Vice President, Global Channels, Infovista
• Ricardo Belmar - Senior Director, Global Enterprise Marketing,, Infovista
Yoni Geva, Product ManagerFeb 20 20193:00 pmUTC60 mins
As cyber threats become more sophisticated, companies of all sizes are struggling to stay secure. Regardless of how many different firewalls you use, it’s merely a matter of time until a threat gets through. To prevent serious breaches, networks must be internally segmented to stop hackers moving freely inside the network and exfiltrating data – but network segmentation must be designed and managed correctly if it’s to be successful. This webinar will examine how to build a micro-segmentation strategy that truly protect your organization’s valuables.
In this webinar, Yoni Geva, Product Manager at AlgoSec will cover:
• Segmentation challenges
• Micro-segmentation explained
• Micro-segmentation strategy benefits
• Micro-segmentation strategy development – first steps
• Implementation Do’s and Don’ts
API’s are redefining every platform and every platform and company must have an API strategy. JB can help you build an API Integration Strategy to any platform: Salesforce, SAP, Netsuite, ServiceNow or Workday.
Our SI’s are adding value to their solutions by connecting platforms in exciting ways. Learn how to build your API and integration competency within your practice teams with a free consultation! You maybe asking why partner with Jitterbit? Jitterbit was ranked as a Leader in the Gartner Magic Quadrant for Integration Platform as a Service (iPaaS) the last three years in a row and #1 in customer satisfaction on G2Crowd. And The EiPaaS market is growing 70% YoY! So it’s a good time to partner with the market leader!
Brock Peterson & Peter HaagensonFeb 20 20194:00 pmUTC30 mins
Solve problems faster with real-time monitoring and predictive analytics for Pure Storage FlashArray, delivered in vRealize with this Management Pack by Blue Medora. Adding Pure Storage alongside the virtual layer in vRealize Operations translates to shorter times to resolution and better reliability for your business-critical applications.
Andy Kriebel, Head Coach and Tableau Zen Master at The Data School & Eva Murray, Head of BI and Tableau Zen Master at ExasolFeb 20 20194:00 pmUTC75 mins
Get live feedback on your MakeoverMonday viz in this weekly webinar. Submit your viz by tagging #MMVizReview on Twitter.
VIZ REVIEW is our way to provide comprehensive feedback for those who want to learn more.
Find out everything you need to know about Makeover Monday on www.makeovermonday.co.uk (http://www.makeovermonday.co.uk/) and join the conversation on Twitter by following Andy (@VizWizBI) and Eva (@TriMyData) as well as the #MakeoverMonday community.
Tom Cooper, Principal Geek, Bright Hill GroupFeb 20 20194:00 pmUTC60 mins
As a highly technical expert, you have been successful because of your expert skills. People hire and promote you because of your talent and ability to solve hard problems. This is true. It's also not enough.
What no one tells you is that you're only looking at one of the three factors that lead to career success.
In this session, you will:
- Learn the other two factors (and what you should do about them)
- Learn the four levels of thinking needed to be an expert who leads
- Assess where you are in each of the areas
- Identify at least 2 practical things that you can do to improve your influence, get more support for your ideas and projects and gain more respect as a professional.
David Neugebauer, Sr. Business Development Mgr, FujitsuFeb 20 20194:00 pmUTC60 mins
Today SAP customers face challenges when migrating their existing environments to SAP HANA in-memory solutions, while addressing growing needs for hybrid scenarios. Integrated System NFLEX for SAP Environments, running under Windows as well as Linux, brings simplicity and flexibility to SAP operations. The easy-to-use, integrated converged platform runs on both, Windows and Linux. The solution manages all types of SAP applications as well as all other workloads. Join us to learn more!
ICS, SCADA, NERC Compliance... the industrial sector of today faces major challenges in terms of cybersecurity to protect and defend its systems against cyber attack. In an age where IT and OT are converging, a threat to ICS is a threat to production, finances, and even public safety.
In this webinar, you'll discover:
- What threats are the Industrial sector facing?
- What challenges are there to implementing cybersecurity
- How can these challenges be overcome to enact robust security practices across all IT and OT systems?
Tony Palmer, Enterprise Strategy Group; Marcus Thordal, Brocade; Eduardo Freitas & Tony Huynh, Hitachi VantaraFeb 20 20195:00 pmUTC60 mins
Join Tony Palmer, senior analyst from Enterprise Strategy Group, and technical experts from Hitachi Vantara and Broadcom as we discuss how customers can achieve strict zero RTO/RPO objectives for mission-critical Oracle database deployments.
•Join experts from Enterprise Strategy Group, Hitachi Vantara and Broadcom as we discuss how you can achieve strict zero RTO/RPO SLO’s for your Oracle database deployment.
•Learn best practices to maximize Oracle performance on Hitachi Virtual Storage Platform (VSP) and Hitachi Unified Compute Platform (UCP).
•Ask your toughest Oracle questions and, if you can stump the experts, win a prize!
Christina Henry de Tessan and Meghan Harvey of Girl Friday ProductionsFeb 20 20195:00 pmUTC60 mins
Thanks to advancing technology, easier-than-ever distribution, and direct-to-reader marketing opportunities, there has never been a better time to publish your own book. But let’s be honest. It’s one thing to want a book and quite another to know where to start. In this IW fireside chat, the Girl Friday Productions team explains how a book can elevate your visibility and how to create the right content for your brand.
In this webinar, you’ll learn:
-- Why books matter more than ever in a day and age dominated by social media.
-- How creating a book is easier than ever thanks to a rapidly changing publishing industry.
-- How to go about it so that you end up with the book that’s right for you, your message, your brand, your audience.
-- Practical advice on how to set yourself up for success.
Danny Akacki, Sr. Technical Account Manager, Gigamon Insight and TJ Biehle,Sr. Technical Account Manager, Gigamon InsightFeb 20 20195:00 pmUTC45 mins
To whack, or not to whack, that is the question:
Whether ‘tis nobler in the mind to torch all
The compromised boxes on your poor network,
Or to take arms against a sea of malware
And by blocking stop them all.
So, what do you do during an active security incident? When is the proper time to whack-a-mole with your mallet? Is it better to light everything on fire and start over, or should you make observations a key component of your response and mitigation strategy? In this webinar, we'll discuss strategies for when it's time to scorch the earth versus sit back with a cup of tea, gaining intel into what active adversaries are doing in your house.
We’ll break down some of the most important points to remember during the commotion of an active incident response, including:
•Context is king. We’ll explain the important questions you need to be ask when scoping an incident to get an improved view of the situation.
•Thinking fast and slow. It’s understandable to want to nuke everything from orbit just to be thorough, but it’s usually not the smartest play. We’ll outline the potential benefits and risks of hasty containment and remediation efforts versus slow, thoughtful analysis when executing a response game plan.
•The law of diminishing returns. There can be a tipping point where the cost of your decisions and polices no longer justify the answers you’ll find. We’ll talk you through some tactics to find the sweet spot between effort and return.
Dr. Ann McNamara – Associate Professor, Texas A&M and Jennifer Sigmund – Sr. Higher Education Strategist, Dell EMCFeb 20 20195:00 pmUTC60 mins
Today’s employers are demanding graduates who are well versed in research, problem-solving and collaboration. Hear from Dr. McNamara from Texas A&M on how augmented and virtual reality innovations are used in the classroom to prepare students for today’s rapidly changing workplace.
Dr. Ann McNamara – Associate Professor, Associate Dept Head, Graduate Program Coordinator, Dept of Visualization, Texas A&M
Jennifer Sigmund – Sr. Higher Education Strategist, Dell EMC
Andrew Richardson, Elite SEM & Matt Hertig, Alight AnalyticsFeb 20 20195:00 pmUTC60 mins
Ready to build a marketing analytics practice that delivers powerful insights and lightning-fast reporting — and ultimately boosts your revenue?
In this webinar, you’ll hear from Elite SEM’s Andrew Richardson how Elite, one of the nation’s largest digital agencies, has streamlined and evolved its analytics — and how that’s allowed them to achieve even greater results for its clients.
And you’ll discover a proven framework for advancing your own marketing analytics practice, courtesy of Alight Analytics’ Matt Hertig.
Eric Sheridan, Chief Scientist, WhiteHat SecurityFeb 20 20195:00 pmUTC60 mins
For every 100KLOC, a monolithic application will have an average of 39 vulnerabilities whereas a microservice application will have an average of 180 vulnerabilities. You read that right. According to the data gathered from WhiteHat Security’s 2018 Stats Report, the transition of enterprise monolithic applications to distributed microservices architectures is actually increasing the overall average of total vulnerabilities. But why? Why is it that we seemingly continue to make the same mistakes again and again? And what does this say about the security of microservices architectures, or the developers that build them? The journey to a microservices architecture generally involves the decomposition of an already existing monolith application, wherein previous security assumptions and considerations are often questioned and sometimes invalidated.
Join Eric Sheridan, Chief Scientist at WhiteHat Security, for a dive into the security trends of microservice architectures. Participants of this talk will learn…
•Why we are seeing an increase in the number of vulnerabilities with the migration to microservices
•The most common vulnerability classes facing applications of microservices architectures
•Strategies that can be used to more readily find and fix vulnerabilities earlier in the development lifecycle
Sandeep Adwankar, Sr. Product Manager at SenchaFeb 20 20196:00 pmUTC60 mins
We recently announced the release of Sencha Ext JS 6.7, which includes enhancements to the Modern and Classic toolkits, tooling updates for ExtGen, Cmd and the JetBrains, Eclipse and Visual Studio IDE plugins, and new Ext JS examples.
Join us on February 20th to see the new modern features in the Ext JS 6.7 release in-action, including:
- Grid Filtering - Easily display grid records that meet multiple criterias of text, boolean, date and number filters
- Locking Grid - Similar to Excel, lock columns in left or right regions
- Chip - Material design-inspired compact component with thumbnail and text
- Multiselect Combobox - Combobox with the ability to select multiple chips
- Multiselect Select - Easily select multiple values in the select field
- Color Picker - Beautiful color picker available with HSVA and RGB options
You will also see what’s new with Ext JS tooling, including updates to ExtGen, Cmd and IDE plugins. Bring your questions and our team will be happy to help you during our live Q&A.
Panelists: Nick Hayes, Forrester; Idan Shoham, Hitachi-ID; Jason Bonds, Ping Identity; Perry Carpenter, KnowBe4Feb 20 20196:00 pmUTC76 mins
* This is a recording so CPE credit is unavailable.
Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. With large-scale data breaches continuing to make the headlines in 2018, organizations must be proactive, not reactive, in the face of looming cyber threats. Proactive threat intelligence can enable organizations to prevent breaches or compromises before they occur.
On this webinar our panel of experts will discuss some critical actions organisations can consider to prevent a data breach, and attendees will learn:
- Strategies you can implement now to help you protect against a breach.
- Best practices for gathering the intelligence to predict and prevent attacks.
- How to use threat intelligence to improve your organization’s security posture and reduce the risk of an attack.
- Steps to fortify your last line of defense.