Hi [[ session.user.profile.firstName ]]

Information Technology

  • Detect and Respond to Cyber Threats with Threat Lifecycle Management
    Detect and Respond to Cyber Threats with Threat Lifecycle Management LogRhythm Recorded: Aug 23 2017 8 mins
    Today’s reality is that your organization will continue to be confronted by increasingly frequent and complex cyber threats.

    The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to monitor and search across your IT environment and ends with the ability to quickly mitigate and recover from security incidents. The result? Faster time to detect and time to respond, without adding staff to accomplish the job.

    See how LogRhythm’s Threat Lifecycle Management Platform can help your team sort through the noise to quickly discover and neutralize concerning incidents.
  • Pattern Analysis: Why Small is the New Big; Structure
    Pattern Analysis: Why Small is the New Big; Structure Oren Falkowitz, CEO of Area1 Security Recorded: Aug 22 2017 5 mins
    Making sense out of the mass of data collected, identifying, organizing and explaining causalities of the things we see and experience every day and taking action requires discovery of small patterns not big trends. Oren Falkowitz, CEO of Area1 Security, gives this talk at Structure Data 2016.
  • Securing the Enterprise in a DevOps World: Keynote & Panel
    Securing the Enterprise in a DevOps World: Keynote & Panel David Wayland, Head of Enterprise Application Security, Fortune 500 Financial Firm & Chris Wysopal, CTO & Co-Founder Veracode Recorded: Aug 22 2017 59 mins
    Securing a global enterprise requires security, development, vulnerability management, compliance and risk professionals to understand the engagement and inflection points in the software development lifecycle—and their roles to accelerate it. 

    Join Veracode for a two part session featuring "Securing the Enterprise in a DevOps World" with David Wayland, and an interactive panel discussion to continue the conversation on securing the enterprise in a DevOps World. This open round table discussion will be led by Veracode Co-Founder and CTO, Chris Wysopal. We will have time for Q&A so bring your questions!

    The discussion will touch upon:
    · Are you crawling, walking or running with your DevOps initiative?
    · Pitfalls? Success?
    · How are you connecting the dots for the business and the board on how your application security initiative is mitigating risk?


    Panelists: David Wayland, Head of Enterprise Application Security—Fortune 500 Financial Firm, Pete Chestna, Director of Developer Engagement—Veracode, Joseph Feiman Chief Innovation Officer—Veracode.
  • Getting the Best out of DevSecOps
    Getting the Best out of DevSecOps Colin Domoney, Consultant Solutions Architect—Veracode Recorded: Aug 22 2017 47 mins
    With application security rapidly moving towards a DevSecOps approach, it's important to understand from each team's perspective how to be successful in the new agile process. 

    Join this webinar to understand the perspectives--both the challenges and benefits of a DevSecOps approach, and how to integrate your security, operation and Developer teams.
  • An interview with Michael Ludwig
    An interview with Michael Ludwig IT Chronicles Media Recorded: Aug 22 2017 11 mins
    10 in Tech hosts Carlos Casanova and Shane Carlson sat down with Michael Ludwig from Blazent at Knowledge17 where they discussed discovery, the CMDB and data quality. Getting the CMBD right is critical to success in a ServiceNow implementation. Listen to this episode to find out how Blazent deals with data quality and the CMDB.
  • Learn how the NIST Cybersecurity Framework Benefits State and Local Governments
    Learn how the NIST Cybersecurity Framework Benefits State and Local Governments Renault Ross, Chief Cybersecurity Business Strategist North America, Symantec Recorded: Aug 22 2017 34 mins
    The NIST Cybersecurity Framework (CSF) provides an excellent guide for state and local governments looking to improve their overall cybersecurity posture.

    Join our webcast hosted by Symantec Chief Cybersecurity Business Strategist, Renault Ross, where he reveals how to apply the CSF to state and local government.

    Learn to:

    •Identify where sensitive data is and who is accessing it.

    •Protect that data with universal policies to ensure stability of networks and infrastructure.

    •Detect cyber threats quickly and reduce the chance of breaches.

    •Respond to threats with automated actions.

    •Recover after a threat to produce reports to prove compliance.

    Register Today
  • You Can Get There From Here: The Road to Secure DevOps
    You Can Get There From Here: The Road to Secure DevOps Pete Chestna, Director of Developer Engagement—Veracode Recorded: Aug 22 2017 47 mins
    If you are moving between methodologies, you are probably looking for a roadmap or at least lessons from someone that’s been through it already. Over its 10+ years, Veracode has moved from monolith to microservice and from waterfall to DevOps. We have learned a lot along the way and I’m eager to share the story. In this session learn:

    · A basic Understanding of Waterfall, Agile and DevOps from a people, process and technology point of view
    · Considerations when transitioning between these methodologies
    · An approach to leading the change in your own company
    · How Security can best be integrated into DevOps
  • Back to School: Cloud Economy and Lessons from AirBnB, Uber and the Gig Economy
    Back to School: Cloud Economy and Lessons from AirBnB, Uber and the Gig Economy Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Aug 22 2017 28 mins
    The Cloud Economy represents a drastic change in how enterprises perform computing but it's not totally unprecedented. Running simultaneously in parallel with the advent of the Cloud First mentality, is the Gig Economy.

    In the Gig Economy people don't have to buy, lease or rent cars. They can use an Uber or Lyft. They don't habitually reserve a hotel room on a trip. They can use AirBnB. What lessons can cloud leaders learn from the Gig Economy that apply to the Cloud Economy and what pitfalls can we avoid?

    Cloud Professor Todd Bernhard will address these lessons in our next webinar, Back to School: Cloud Economy and Lessons from AirBnB, Uber and the Gig Economy. During this live webcast we’ll discuss:

    - Financial savings promised by the new economic model
    - New challenges presented
    - How to mitigate against such challenges
  • Expanding to International Markets
    Expanding to International Markets Eric Negler, Head of Strategic Partnerships at Signifyd, and Vince Lau, Product Marketing at ThreatMetrix Recorded: Aug 22 2017 35 mins
    Join this webinar to hear stories of how specific digital retailers have successfully entered new international markets and are now realizing increased sales without the downside of risky orders.
  • Solving for compliance: Mobile app security for banking and financial services
    Solving for compliance: Mobile app security for banking and financial services Brian Lawrence, NowSecure Security Solutions Engineer Recorded: Aug 22 2017 29 mins
    Mobile apps fall in scope for a number of regulatory requirements that govern the banking and financial services industries, such as: guidelines from the Federal Financial Institutions Examination Council (FFIEC), the Gramm–Leach–Bliley Act (GLBA), New York State cybersecurity requirements for financial services companies, the Payment Card Industry Data Security Standard (PCI DSS), the Sarbanes-Oxley Act, and more. Luckily, a repeatable mobile app security assessment program and standardized reporting go a long way in both achieving compliance objectives and securing mobile apps and data.

    Join us for a 30-minute webinar during which NowSecure Security Solutions Engineer Brian Lawrence will explain:
    -- How and where exactly mobile apps fall in scope for various compliance regimes
    -- Mobile app security issues financial institutions must identify and fix for compliance purposes
    -- How assessment reports can be used to demonstrate due diligence
  • Virtual Network Insight: Installation, Configuration & Microsegmentation
    Virtual Network Insight: Installation, Configuration & Microsegmentation Karl Hauck (Sr. Systems Engineer) and Brian Wilson (Staff Systems Engineer) Recorded: Aug 22 2017 41 mins
    Looking to solve the puzzling visibility gap across the virtual and physical network? Trying to find the elusive answer to ensuring health and availability while also enhancing security and compliance? Need to deliver faster time to value?

    See how you can quickly and easily design and deploy micro-segmentation across the network with an intuitive and easy-to-use UI with natural language search. Optimize network performance and availability with visibility and analytics across virtual and physical networks. And get troubleshooting and operational views to quickly and confidently manage and scale VMware NSX deployments. This session will provide you an overview of vRealize Network Insight (vRNI) product and capabilities.
  • Watch the Cloud: Monitoring Your Migration
    Watch the Cloud: Monitoring Your Migration Mike Langdon, Product Manager Recorded: Aug 22 2017 24 mins
    Migrating your infrastructure from on-premises to the cloud requires extensive monitoring to ensure your IT operations don't suffer along the way. For many organizations, garnering this insight can be difficult -- if not impossible. Join Blue Medora's Mike Langdon to learn key best practices to monitor your infrastructure during migration, helping you simplify the process and ensure optimal performance from migration to decommissioning.
  • Bring Order to Chaotic Storage Management with Software-defined Storage
    Bring Order to Chaotic Storage Management with Software-defined Storage Sushant Rao Senior Director WW Product Marketing DataCore Software & Bill Hansen Sr. Product Manager & Product Planner Lenovo Recorded: Aug 22 2017 36 mins
    Surveys show that 64% of companies have storage arrays from 3 or more vendors. What does it mean to manage storage infrastructure with so many different products?

    In a word, CHAOS!

    That’s why a majority of people interested in software-defined storage (SDS) want to simplify management of their storage infrastructure.

    Join us for this webinar where we will show how the Lenovo DX8200D Powered by DataCore can bring order to your environment. The DX8200D is the fast path to SDS and it:
    • Abstracts away the underlying complexity of storage infrastructure
    • Consolidates IT infrastructure and simplifies management through automation and self-adaptive technologies.
  • The New Frontier of Cybersecurity
    The New Frontier of Cybersecurity Ted Schlein hosts. His panel includes Endgame CEO Nathaniel Fick; Synack CEO Jay Kaplan and Area 1 Security CEO Oren Falkowit Recorded: Aug 22 2017 32 mins
    KPCB Partner Ted Schlein hosts leaders from cybersecurity portfolio companies to discuss the changing nature of cyber threats and the challenges facing companies today. His panel includes Endgame CEO Nathaniel Fick; Synack CEO Jay Kaplan and Area 1 Security CEO Oren Falkowitz who are all entrepreneurs who have experience working in government but now offer security solutions to companies.
  • Ransomware attacks continue... do you have a backup plan?
    Ransomware attacks continue... do you have a backup plan? Ronn Martin, Solution Architect - Veeam and Terry Grulke, Principal Technical Advisor - Quantum Recorded: Aug 22 2017 45 mins
    Ransomware is just one of the many threats that can impact your business data. With the use of cloud storage and virtualization expanding, and with a +500% in attacks and +600% in new variants, NOW is the time to ensure you have a proactive backup plan. Join Veeam and Quantum to learn how to set up a solid BCDR (business continuity and disaster recovery) and backup strategy to protect your virtual data against any ransomware and cyber security threat, including some lessons learned by our customers.
  • Building a Monitoring Foundation Assuring UC&C Quality On-Prem, Hybrid and Cloud
    Building a Monitoring Foundation Assuring UC&C Quality On-Prem, Hybrid and Cloud Ray Krug, Enterprise Solutions Engineer, NETSCOUT Recorded: Aug 22 2017 37 mins
    UC&C platforms continue to evolve to satisfy the needs of your business communications and enhance user collaboration - but how can you keep up and assure service quality as you bring together multiple vendors, platforms creating these complex, hybrid integrated solutions.

    This webinar explores a framework for managing availability and service quality of multivendor on-prem and hybrid Unified Communications Services such as Skype for Business; Cisco UC ; SIP Trunking; VoIP; desktop video; video conferencing; and telepresence, and discusses best practices for improving IT collaboration to reduce management costs and complexity, improve service quality and reduce MTTR.
  • Your Path to a Mature AppSec Program
    Your Path to a Mature AppSec Program Colin Domoney, Consultant Solutions Architect—Veracode Recorded: Aug 22 2017 46 mins
    According to Akamai, attacks at the application layer are growing by more than 25% annually. But many organizations still struggle to understand how to get started with application security, or what good looks like.

    To shed light on the application security process, this session will outline the steps most of Veracode's customers take to develop a mature application security program. Attend and hear about Colin’s experience developing and managing an application security program from the ground up and learn:

    • The different AppSec phases most organizations are currently in
    • The next steps to take when moving toward a more comprehensive AppSec program
    • Lessons learned, best practices and pitfalls to avoid -- from someone who’s been there
    • What a comprehensive, mature AppSec program entails
  • The 5 Keys to Successful Predictive Business Analytics
    The 5 Keys to Successful Predictive Business Analytics Lawrence Maisel, President, DecisionVu Group, Inc. Recorded: Aug 22 2017 49 mins
    Today businesses of varying sizes, products and services, and industries are actively applying Predictive Business Analytics in seeking to improve greater customer engagement and resulting increased revenues and profits. Often these businesses are looking to their finance group to guide, if not lead, these efforts to successful outcomes.

    In a recent article written by Ray Tong, he cited a CFO magazine survey that:
    • Over 70% of respondents said that they plan to substantially increase the use of data analytics to support decision making and improve business partnering;
    • 68% of respondents, the majority of who were finance executives, said that they plan to improve their data analytic skills in the coming year.

    Consequently, it is essential that the financial professional understands what it is going to take for them to succeed.

    This webinar discusses the five (5) keys to applying Predictive Business Analytics in your organization. It provides attendees with specific and practical insights to guide their approaches to develop and deploy an effective process that improves managerial decision making across many core performance and financial areas.

    What you will learn:

    • What are the key steps to success with practical examples
    • What steps to avoid
    • How to ensure and gain organizational impact

    Larry Maisel a recognized author and thought leader in Business Analytics, with experience assisting companies to improve operating performance and business results. An accomplished business professional, with over 20+ years of experience, with proven leadership skills, expertise to drive bottom-line profits and implementing business systems.
  • Performance Benchmarking Big Data Platforms in the Cloud
    Performance Benchmarking Big Data Platforms in the Cloud Reynold Xin, Co-founder and Chief Architect at Databricks Recorded: Aug 22 2017 47 mins
    Performance is often a key factor in choosing big data platforms. Over the past few years, Apache Spark has seen rapid adoption by enterprises, making it the de facto data processing engine for its performance and ease of use.


    Since starting the Spark project, our team at Databricks has been focusing on accelerating innovation by building the most performant and optimized Unified Analytics Platform for the cloud. Join Reynold Xin, Co-founder and Chief Architect of Databricks as he discusses the results of our benchmark (using TPC-DS industry standard requirements) comparing the Databricks Runtime (which includes Apache Spark and our DBIO accelerator module) with vanilla open source Spark in the cloud and how these performance gains can have a meaningful impact on your TCO for managing Spark.

    This webinar covers:
    Differences between open source Spark and Databricks Runtime.
    Details on the benchmark including hardware configuration, dataset, etc.
    Summary of the benchmark results which reveal performance gains by up to 5x over open source Spark and other big data engines.
    A live demo comparing processing speeds of Databricks Runtime vs. open source Spark.

    Special Announcement: We will also announce an experimental feature as part of the webinar that aims at drastically speeding up your workloads even more. Be the first to see this feature in action. Register today!
  • Javelin vs. ATA
    Javelin vs. ATA Javelin Networks Recorded: Aug 22 2017 6 mins
    Javelin AD|Protect focuses on the endpoint security issue of vulnerability by design. On the contrary, Microsoft ATA focuses on logs events and behavior. When it’s obvious that the attack starts on the endpoint, which solution is better suited to stop it?
  • Driving Change in IT Ops through Automation
    Driving Change in IT Ops through Automation Justin Nemmers, General Manager, Ansible by Red Hat Recorded: Aug 22 2017 68 mins
    Given the sheer pace of innovation and ever-increasing competition in today’s marketplace, organizations are leaning on the CIO more than ever before to lead a lean, agile enterprise. For IT teams, this has translated into delivering faster, at greater scale, and more efficiently.

    These same demands have also catalyzed a demand for new applications that are delivered both more nimbly and more quickly. This places further stress on the IT Operations team, as they are now tasked with providing a scalable, on-demand infrastructure that can service both developers and the business.

    As these expectations converge, IT leaders can no longer focus solely on a management strategy – they must also consider, “What is our automation strategy?” Red Hat and Intel are bring together senior IT executives from across industries for this webinar: Driving Change in IT Ops through Automation. Join us for a brief presentation that will explore how automation can help transform IT operations for the next generation of IT management, followed by a panel of senior IT executives as they discuss the challenges and best practices related to these topics and more.
  • Top 4 Ways Vulnerability Gets Into Software
    Top 4 Ways Vulnerability Gets Into Software Maria Loughlin, Senior VP of Engineering| Veracode Recorded: Aug 22 2017 35 mins
    Software makes the world go round these days, and it’s also causing a lot of problems. The U.S. Department of Homeland Security recently found that 90 percent of security incidents result from exploits against defects in software. It sometimes seems like we’re just rolling out the red carpet for cyberattackers with our applications. Why is software so riddled with security defects? Are developers to blame? Is it just the nature of software?

    We’ll discuss the four primary ways that vulnerabilities end up in your software. Attendees at this session will understand the main sources of vulnerabilities and how to prevent them -- a good first step in making apps less like a red carpet for cyberattackers, and more like a moat. We’ll get attendees up to speed on the following:

    • Insecure coding
    • A threat landscape that never quits
    • Indiscriminate use of components
    • Programming language choice
  • Informatica Intelligent Cloud Services for Amazon Redshift – Deep Dive & Demo
    Informatica Intelligent Cloud Services for Amazon Redshift – Deep Dive & Demo Informatica Recorded: Aug 22 2017 61 mins
    In this technical session, we will learn about the different use cases around Amazon Redshift and discuss how Informatica Intelligent Cloud Services is used to implement these use cases. Through real world examples, you’ll learn about best practices, when to use ETL versus ELT, performance tuning, and new features recently introduced.

    Key webinar learnings:
    • Amazon Redshift: Key benefits, capabilities, and use case patterns
    • Informatica Intelligent Cloud Services for Amazon Redshift and other Amazon services
    • Best Practices
    • Deep Dive Demo of key use cases
  • How to Choose Your Next Database Audit Solution
    How to Choose Your Next Database Audit Solution Terry Ray, Chief Technology Officer at Imperva Recorded: Aug 22 2017 64 mins
    Data is the lifeblood of today's business. As the volume of generated data continues to grow, so does the number of data breaches. It's more critical than ever for organizations to adopt database audit and protection solutions. But not all solutions are created equal.

    What are the key capabilities that IT and security teams should evaluate? Join Terry Ray as he discusses key considerations for selecting a database audit and protection solution.

    About the Presenter:

    Terry Ray is the Chief Technology Officer for Imperva, Inc., the leading provider of data security solutions. Terry works directly with Imperva’s largest customers to educate on industry best practices, challenges and regulations. He also, operates as an executive sponsor to strategic customers who benefit from a bridge between both company’s executive teams. During his 12 years at Imperva, he has deployed hundreds of data security solutions to meet the requirements of customers and regulators from every industry. Terry is a frequent speaker for RSA, ISSA, OWASP, ISACA, Gartner, IANS and other professional security and audit organizations in the Americas and abroad.
  • Tensorflow machine learning library and sample of application
    Tensorflow machine learning library and sample of application Marwa Ayad Mohamed ( Founder of YourChildCode ,Team lead software Engineer, Women Techmakers Cairo Lead) Aug 23 2017 8:00 am UTC 45 mins
    Tensorflow is an open source software library for numerical computation and machine learning.

    Join this session where Marwa will discuss:

    -Introduction to Artificial intelligence, machine learning and deep learning
    -Sample of machine learning applications
    -Tensorflow Story, Model and windows installation steps with object recognition demo.
  • The Millennial Banking Technology Framework
    The Millennial Banking Technology Framework Mythili Madhav, BFS Delivery Manager & Vishwas Anand, Head of Thought Leadership Aug 23 2017 9:30 am UTC 15 mins
    In an open banking ecosystem, 92% of millennials are going to choose a bank for its digital services. Banks need to have a robust framework they can go by to develop new business models, services and data for radical transformation of millennial engagement. In this webinar you will realize:
    •The needs and MOTs of millennials in the digital age for a customer-centric approach
    •How the Millennial Banking Framework can be used by banks to transform millennial interactions
    •Value delivered through Aspire’s Millennial Banking Offering
    •Millennial engagement success stories
  • Accelerating Multi-Cloud Deployments
    Accelerating Multi-Cloud Deployments Matt Keil, Director of Product Marketing, Public Cloud at Palo Alto Networks Aug 23 2017 10:00 am UTC 45 mins
    Organizations are rapidly embracing multi-cloud architectures that span software-defined data centers (private clouds) and public cloud environments. To help organizations protect their cloud-based applications and data from cyberattacks, PAN-OS® 8.0 expands the VM-Series with new models and optimized performance, making it the broadest, most powerful line of virtualized firewall appliances on the market.

    New scalability and resiliency features for Microsoft® Azure® and Amazon® Web Services enable organizations to build secure cloud-centric architectures. Workflow automation features for VMware® NSX® and KVM with OpenStack® help streamline VM-Series deployments.
  • The State of Security Operations: How Prepared Are You For An Attack?
    The State of Security Operations: How Prepared Are You For An Attack? Duncan Brown, IDC, Matthias Maier, Splunk, Nathaniel Ford, (ISC)² EMEA Aug 23 2017 11:00 am UTC 60 mins
    Cyberattacks are top of mind for organizations across the globe. In fact, 62 percent of firms are being attacked at least weekly and 145 percent are experiencing a rise in the number of security threats. But do organizations have the processes in place to investigate and effectively respond to these incidents? IDC recently surveyed security decision makers at 600 organizations to understand the state of security operations today.

    Join this webinar to hear from guest speaker Duncan Brown, Associate Vice President, Security Practice, IDC, and Matthias Maier, Security Product Marketing Manager, Splunk, and discover:

    ●The time and associated cost security teams spend on incident response and how you compare to your peers

    ●How organizations are coping with an average of 40 actionable security incidents per week

    ●Where teams are focusing their security efforts

    ●Why an analytics-driven approach can make security investigation more efficient and effective, reducing costs and improving security posture
  • Putting AI into LeAdershIp
    Putting AI into LeAdershIp Prof. Dr. Michael Feindt, Founder & Chief Scientific Officer, Blue Yonder Aug 23 2017 12:00 pm UTC 45 mins
    Artificial Intelligence (AI) is not a technology for the future; it’s a huge business opportunity for today. But how can your organisation become a trailblazer for AI innovation, transforming the way you work to deliver immediate – and lasting – bottom line value?

    Former CERN scientist, Prof. Dr. Michael Feindt, is one of the brightest minds in Machine Learning. Join him for a 30-minute masterclass in how to apply AI to your business.

    You’ll learn how AI can:
    •Make sense of market and customer complexity, to deliver quick and effective decisions every single day
    •Increase workforce productivity to improve output and staff morale
    •Enhance decision-making and forecasting accuracy, for operational efficiency and improved productivity
    •Be implemented into your business quickly, easily, with minimal disruption

    Michael will also share real-life examples of how international businesses are using AI as a transformation tool, from his experience as founder of market-leading AI solution provider, Blue Yonder.
  • Protéger vos terminaux et serveurs contre les ransomwares
    Protéger vos terminaux et serveurs contre les ransomwares Aymen Ben Aouicha, Ingénieur Avant-Vente, Symantec France Aug 23 2017 12:30 pm UTC 45 mins
    En tant que PME, vous n'êtes pas immunisées contre les attaques ciblées, les ransomwares et les vulnérabilités Zero Day. Vous avez besoin d'une solution simple et efficace pour protéger vos terminaux contre ces menaces avancées. Assistez à ce court webcast pour savoir comment Symantec Endpoint Protection Cloud (SEP Cloud) protège vos PC, Mac, mobiles et serveurs grâce à ses technologies multicouches de protection des menaces.
  • Moving towards XaaS: Could the Public versus Private Cloud debate be over?
    Moving towards XaaS: Could the Public versus Private Cloud debate be over? Rory Duncan, Research Director at 451 Research; Dan Havens, SVP, WorldWide Sales at Ormuco Aug 23 2017 1:00 pm UTC 60 mins
    The cloud promises to enable organisations to be more flexible, agile and responsive to the needs of their business and the demands of customer and partners. As physical infrastructure has become invisible to end-users, the role of service providers and channel partners has changed. Faced with public and private options, many firms are taking a XaaS approach, embracing the best of both private and public worlds - implementing hybrid architectures to deliver on-demand access to compute resources, capacity, and services, while also providing greater levels of control, security, and visibility of data and applications. In this webinar, Rory Duncan, Research Director with 451 Research will outline the opportunities for Service Providers and channel partners delivering cloud services, examining topics such as support, managed services, data protection and data sovereignty for facilitating cloud consumption.
  • Ask the Data Expert: Live Q&A on All Things Machine Learning & AI
    Ask the Data Expert: Live Q&A on All Things Machine Learning & AI Wim Stoop, Cloudera Aug 23 2017 2:00 pm UTC 60 mins
    Join this webinar where data expert Wim Stoop from Cloudera will answer all of your Machine Learning & AI questions live.

    Wim will also go over some frequently asked questions on Machine Learning and AI such as:

    - Why is machine learning and AI crucial to master for organisations?
    - What components are needed to take advantage of data science?
    - Which use cases drive the greatest value?
  • Extending vSAN with File Services
    Extending vSAN with File Services Peter Skovrup, Director, Product Management, NetApp Aug 23 2017 3:00 pm UTC 45 mins
    Although vSAN provides a means for customers to have block-based storage, many customers still have a requirement for native file services. Join this session to learn about NetApp’s complimentary software solution, which provides file services for a vSAN deployment.
  • Live Demonstration of CA Privileged Access Manager
    Live Demonstration of CA Privileged Access Manager John Christensen Aug 23 2017 3:00 pm UTC 30 mins
    Join us for a live demo of CA PAM. We'll highlight key features & functions as well as show you standard use cases.
  • What is an Identity Provider (IdP) and Do You Need One?
    What is an Identity Provider (IdP) and Do You Need One? Stephen Allen, Authentication Expert at Gemalto Aug 23 2017 3:00 pm UTC 60 mins
    The explosion of cloud-based applications in the enterprise is making IT and security professionals rethink their cloud identity management strategy. By default, every cloud user creates an average of 17 cloud identities. But catering to 17 different user stores per employee or partner is simply not scalable from an administration perspective. And as if IT’s time is not precious enough, password resets account for 20% of helpdesk tickets. This adds to the compliance and security risks associated with cloud-based applications, which by default require only weak static passwords and offer no central point of management across disparate cloud-based services.

    Join Stephen Allen, Gemalto Product Manager for Authentication and Access Management, and learn how deploying an Identity Provider enables:

    •Cloud Single Sign-On for easy access to cloud apps
    •Regulatory compliance with standards such as PCI DSS
    •Reduced identity lifecycle overheads
    •Centralized management of cloud access policies
    •Increased security with step-up authentication
  • Web App Attacks: Hacker Methodologies and Remediation Strategies
    Web App Attacks: Hacker Methodologies and Remediation Strategies Stephen Coty, Chief Security Evangelist at Alert Logic Aug 23 2017 3:00 pm UTC 60 mins
    It’s well known that web application attacks are the leading cause of breaches, according to Verizon’s 2017 Data Breach Investigations Report, but have you ever wondered how adversaries conduct their attacks and what methods they use to successfully compromise their web application targets?

    Register for this eye-opening webinar presented by Stephen Coty, Chief Security Evangelist at Alert Logic, who will discuss the realities of web application attacks and:

    • The global perspective of the current state of web application vulnerabilities
    • Understand how reconnaissance is used by attacks to discover and pinpoint systems to compromise
    • Attack methodologies and how vulnerable web apps can be leveraged by attackers to gain privileged access
    • Remediation strategies to help defend against web apps attacks
  • GDPR - How to embrace PCI’s big brother
    GDPR - How to embrace PCI’s big brother Chief Operations Officer, Nick Rafferty & Head of GRC, Oliver Vistisen Aug 23 2017 3:00 pm UTC 45 mins
    If your organization stores, processes and transmits cardholder data, PCI’s big brother - the EU General Data Protection Regulation - could affect your ability to do business in the EU.

    Impacted PCI US companies may have EU residents as employees or customers.

    The GDPR has become a primary item on most organizations' agenda this past year, yet a disproportionate amount of focus has fallen on the fines that are set to come in force May 25, 2018.

    We want to take a more optimistic look at the regulation, why it came to be and how it can be a massive opportunity to strengthen your reputation and (re)gain customer confidence. We will also look at how the implementation and ongoing maintenance of compliance can be addressed through an analytical approach to the Articles themselves; the rules of the regulation.

    What attendees will learn:
    • How US ecommerce and other companies involved in payment card transactions can be impacted by the GDPR.
    • Why the world’s most valuable resource is no longer oil, but data.
    • Why the GDPR is far more than a simple check-box compliance exercise.
    •Why the GDPR is a massive opportunity in disguise for organizations who take it seriously.
    •How the GDPR aims to change company culture by turning risk assessments on their head.
    •An analytical breakdown of the GDPR Articles that uncovers those that are applicable to your organization, and how to tackle these through a risk based approach.
    •Key areas of focus for any GDPR program based on personal and client feedback.
    •How to effectively implement GDPR by expanding upon existing compliance programs and management systems (ISO 27001).
  • Using Predictive Analytics to Empower Customer Experience
    Using Predictive Analytics to Empower Customer Experience Patrick Rice, CEO, Lumidatum Aug 23 2017 3:00 pm UTC 45 mins
    Predictive analytics & artificial intelligence are transforming the way all companies connect with customers. The customer experience is on the verge of being completely redefined with A.I.

    In this talk, you will learn what it takes for a business to deliver this new 21st-century customer conversation. Patrick will cover:

    - Collecting & Managing CX data - What I learned analyzing 3 billion records at Amazon
    - We have the data, now what? AI & the Future of Customer Experience
    - How to use Predictive Analytics to find the right customer on the right channel
    - 3 ways to drive ROI for your business by applying AI to improve the Customer Experience

    Patrick is CEO of Lumidatum which helps CMOs apply artificial intelligence to the customer experience in order to grow revenue. He has been in the data and analytics space for over a decade including running a machine learning and advanced analytics team at Amazon.
  • Why the stage-gate process is killing your innovation strategy?
    Why the stage-gate process is killing your innovation strategy? Presented by Robert Weidner MD of DMInc | Hosted by Ruta at patsnap.com Aug 23 2017 3:00 pm UTC 60 mins
    The stage-gate process is as ubiquitous in R&D as doors are in the real-world. But, like doors, stage-gate processes aren't always the best solution for filling a gap. They can be overly elaborate (leading to slowness), fixated on pruning rather optimising (leading to negativity), and lacking in flexibility (leading to missed opportunities).

    Join our webinar as we explore:

    - The shortcomings of the stage-gate process
    - Potential alternatives that could drive more efficiency and productivity

    This webinar is essential viewing for any innovation leaders who are looking to take their innovation strategy out of its comfort zone and to the next level.
  • Makeover Monday Viz Review - Week 34
    Makeover Monday Viz Review - Week 34 Eva Murray, Exasol & Andy Kriebel, The Data School Aug 23 2017 3:30 pm UTC 90 mins
    Join the Makeover Monday community for a 60min live webinar to discuss selected data visualizations from this week's submissions.
    You can participate in the webinar, ask questions but also submit a viz ahead of time for review (do this on Twitter via the usual process, and include #MMVizReview if you want live feedback).

    VIZ REVIEW is our way to provide much more comprehensive feedback for everyone, which is always difficult within the limitations of Twitter.

    Find out more about Makeover Monday on www.makeovermonday.co.uk and join the conversation on Twitter by following Andy (@VizWizBI) and Eva (@TriMyData) as well as the #MakeoverMonday community.
  • Technical Deep Dive: Building a Modern Portal For Your Digital Workforce
    Technical Deep Dive: Building a Modern Portal For Your Digital Workforce Omar ElNaggar, Sr. Product Manager at Sapho, Natalie Lambert, VP of Marketing at Sapho Aug 23 2017 4:00 pm UTC 60 mins
    Do your employees struggle to access and analyze information that sits across multiple systems? Do they delay completing tasks that require they login to yet another system? Employees are now pushing back against legacy systems – both on-premises and SaaS – and demanding more modern applications to complete their work. Unfortunately, you have spent millions of dollars on software and replacing them is not an option. The question: how do you meet employee expectations for more user-friendly tools without costly upgrades or throwing out your existing systems? Answer: a modern portal.

    Sapho’s modern portal surfaces personalized and relevant tasks and data to employees using micro apps. Sapho micro apps are built by IT on top of your existing systems using a simple micro app builder and pre-built templates. These micro apps – available on any device, intranet, or messenger app – provide employees with proactive notifications about interesting system data, actions that need to be completed, and changes in business data that require attention. With Sapho, employees can complete work faster and make better decisions, improving their overall productivity and effectiveness.

    In this webinar, we will show you how easy it is to build a modern portal that:

    - Connects to your existing systems with pre-built connectors for systems such as SAP, Oracle, Concur, Salesforce, or ServiceNow
    - Surfaces event-driven micro apps, that you can build in just 15 minutes to deliver simplified workflows and data access
    - Is accessible by employees from any device, intranet, or messenger allowing them to complete actions and review information from anywhere