Hi [[ session.user.profile.firstName ]]

Information Technology

  • Getting started with GDPR, Privacy and Applying Appropriate Security Controls Getting started with GDPR, Privacy and Applying Appropriate Security Controls Jason Hart, Gemalto, Christine Andrews, DQM GRC, Adrian Davis, (ISC)² EMEA Mar 23 2017 12:00 pm UTC 60 mins
    In this webinar, presented by compliance experts Christine Andrews (DQM GRC) and Jason Hart (Gemalto) you will learn:

    a. The background to the new General Data Protection Regulation
    b. An overview of the key areas of change from the existing Data Protection Act – and the penalties for getting it wrong
    c. A focus on the information security implications and considerations for meeting compliance
    d. An approach for understand the “Gaps” in your current compliance and, importantly, how best to move forwards
  • Performance Management - Webinar 4: Teil von Continuous Testing Performance Management - Webinar 4: Teil von Continuous Testing Amir Khan, Presales Consultant, HPE Software Mar 23 2017 1:00 pm UTC 60 mins
    Systemleistung und Zeitverhalten spielen in den meisten IT-Anwendungen eine bedeutende Rolle. Sie beeinflussen nachhaltig den Erfolg eines Unternehmens. Im internen Geschäftsbetrieb können lange Wartezeiten ein Unternehmen erhebliche Summen kosten. Noch schwerwiegender ist jedoch mangelnde Performance in der Kundenbeziehung, da Nutzer eine nicht performante Anwendung schneller verlassen oder gar deinstallieren. Das Ergebnis: unzufriedene Kunden und potenzielles Geschäft bleibt aus. Gute Performance ist also nicht optional, sondern geschäftskritisch und lohnenswert.

    Erfahren Sie in unserer kostenfreien Webinarreihe, wie moderne Last- und Performance Testing-Lösungen Sie dabei unterstützen, leistungsstarke Anwendungen, unabhängig von der Umgebung, kontinuierlich bereitzustellen und zugleich eine Transparenz über die Performance im gesamten Anwendungslebenszyklus zu erhalten. Egal ob es sich um eine mobile App, eine Website oder eine komplexe Multi-Tier SAP Umgebung handelt.

    Webinar 4: Performance Management - wesentlicher Bestandteil von Continuous Testing:
    Continuous Integration/Testing ist eine etablierte Technik in agilen Software-Projekten, um kontinuierlich die Änderungen seitens Funktionalität, Performance als auch Stabilität zusammenzuführen. Dabei muss die Performance einer agil entwickelten Anwendung bei jeglicher Änderung im Code der Last im Betrieb Stand halten. Erfahren Sie, wie Sie diese Herausforderungen durch das Zusammenspiel innovativer Performance Management-Lösungen erfolgreich meistern können.
  • Rapid7 InsightIDR Product Demo - EMEA Rapid7 InsightIDR Product Demo - EMEA Eric Sun and Pat Haley Mar 23 2017 1:00 pm UTC 60 mins
    Rapid7 InsightIDR delivers trust and confidence: you can trust that any suspicious behavior is being detected, and have confidence that with the full context, you can quickly remediate.

    Developed side-by-side with incident response teams, InsightIDR eliminates data complexity, reduces alert fatigue, and makes analytics accessible to all. You see only what you need to see – from endpoint to cloud.

    By integrating with your existing network & security stack, InsightIDR leverages user behavior analytics to correlate the millions of events your organization generates daily to the exact users and assets behind them. Along with custom included intruder traps, you'll automatically detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing. Combined with a fully searchable data set and endpoint interrogation, InsightIDR directly addresses the gaps found in most of today's detection technologies, including SIEM and IPS.

    Watch this video to learn how InsightIDR can help you:

    - How to cut through the noise to detect attacks
    - How to investigate incidents faster
    - How to end the drudgery of security data management
    - Q&A
    - And more!
  • Alternative Finance: striking the balance between innovation and regulation Alternative Finance: striking the balance between innovation and regulation Damian Reffin Solutions Consultant at Niu, John Mallios Solutions Manager at Profile & Jay Tikam Managing Director at Vedanvi Mar 23 2017 2:00 pm UTC 45 mins
    The recent announcement by the FCA about upcoming regulation for the Crowdfunding market has left many Alternative Finance platforms wondering how they need to adapt?

    The market continues to grow rapidly, and technology innovation remains very much at the forefront of competition. Alternative Finance platforms need to revise their current strategies in order to comply with the proposed regulation, but also build flexible reliable systems and workflows that will enable them to continue innovating in the future, whilst maintaining their compliance.

    Join our webinar with Profile Software, where we will be joined by regulation expert Jay Tikham of Vedanvi, to discuss:

    •How the existing and upcoming regulations affect the alternative finance market in terms of cost, compliance and competition
    •What would companies need to do to overcome these challenges?
    •How can they continue to innovate and protect their business against new competitive entrants?
    •Is technology ready to deliver a “best-of-breed” approach?
  • 5 things you didn’t know you could do with a security policy management solution 5 things you didn’t know you could do with a security policy management solution Edy Almer, VP Product Management at AlgoSec Mar 23 2017 2:00 pm UTC 60 mins
    Today’s enterprises are continuously evolving to support new applications, business transformation initiatives such as cloud and SDN, as well as fend off new and more sophisticated cyber-attacks on a daily basis. But security and network staff are struggling to keep up – which not only impacts business agility, but exposes your enterprise to risk and hampers its ability to address the modern threat landscape.

    Many professionals believe that they need latest and greatest new tools to address these challenges. But what if you already have what you need, up and running in your organization: your security policy management solution?
    Today’s security policy management solutions do a far more than automate traditional change management tasks. In this technical webinar, Edy Almer, VP of Products at AlgoSec will highlight 5 key security management challenges facing enterprise organizations today, and will explain how AlgoSec’s solution can help you manage security, reduce risk and respond to incidents, while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.

    In this technical webinar Edy will focus on:

    •Managing security policies end-to-end across public and private cloud including Microsoft Azure, Amazon Web Services AWS, Cisco ACI and VMWare NSX
    •Mapping security vulnerabilities to their applications to assess and prioritize risk
    •Enable SOC engineers to tie cyber-attacks to business processes
    •Migrating Firewall policies between firewall brands
    •Performing a fully automated, zero-touch security policy change
  • Skype for Business - Go Live with Confidence Skype for Business - Go Live with Confidence John Hand - Global Microsoft Alliance Director | Dave Bottomley - UC Solutions Engineer Mar 23 2017 3:00 pm UTC 60 mins
    If your organization is evaluating or looking to further expand its use of Skype for Business, how can you be confident you'll ace the deployment? This session will look at key factors to make sure you can Go Live with Confidence.
  • itSMF CursoTools: 05. Indicadores, automatización en cálculo niveles de servicio itSMF CursoTools: 05. Indicadores, automatización en cálculo niveles de servicio Raquel Fernández - OBSIDIAN Mar 23 2017 3:00 pm UTC 60 mins
    Las organizaciones definen SLAs para especificar los niveles de servicio que prestan a sus clientes externos/internos. También para evaluar a los proveedores que les prestan servicio.

    Sin embargo, muchas veces este cálculo es manual, subjetivo y centrado en el análisis histórico.

    En este webinar se presentan las principales técnicas para definir y cuantificar automáticamente los niveles de servicio, tanto en tiempo real como históricos. A modo de ejemplo, se utiliza la plataforma OBSIDIANsoft como agregador de indicadores provenientes de herramientas de monitorización, service desk, ERPs, etc.

    ¿Cuenta su organización con una herramienta de service desk? ¿Y con herramientas de monitorización? Por supuesto, tendrán también un ERP y otras aplicaciones de negocio.

    Con los datos proporcionados por este tipo de herramientas es posible modelar los servicios de TI de una organización siguiendo las buenas prácticas de ITIL y los requisitos de la ISO 20000, definir las dependencias entre servicios y automatizar la generación de dashboards e informes de cumplimiento de nivel de servicio.
  • IoT Device Management IoT Device Management Charles J. Lord, PE, President & Chief Trainer, Blue Ridge Advanced Design and Automation Mar 23 2017 3:00 pm UTC 60 mins
    In our final class, we will look at the “Things” of the IoT – our nodes and devices – and how we can effectively commission, monitor, and detect problems in them throughout their lifecycle. We will look at methods for adding device management capabilities in our devices from the design stage as well as ways to add these capabilities in the legacy devices we looked at in the previous class. One topic we will look at is effective commissioning and decommissioning of devices in the network – how can we add or remove a node from the network without adversely impacting the rest of the network? Another area we will look at is security assurance and testing: how can we be sure of the device security – and how can we test it? And lastly we will look at maintenance. What methods can we use for testing devices or paths within the network and how can we effectively and safely perform system updates? To conclude our class, we will review our checklist and see what other issues we may need to be aware of in our IoT design. Day 3 sponsored by Wind River
  • Wie Sie eine Corporate Self-Service Analytics-Umgebung aufsetzen & verwalten Wie Sie eine Corporate Self-Service Analytics-Umgebung aufsetzen & verwalten Ronald van Loon, Big Data-, Analytics- & IoT-Experte, und Dirk Jung, Solution Sales Architect bei Pyramid Analytics Mar 23 2017 3:00 pm UTC 60 mins
    Daten gelten als Öl des 21. Jahrhunderts und Produktionsfaktor. Immer mehr Daten werden gesammelt, um fundierter entscheiden zu können und das Unternehmen dadurch erfolgreicher zu steuern. Dabei sind Unternehmen i.d.R. doppelt herausgefordert: einerseits durch die ständig wachsende Menge an Daten, andererseits durch die Notwendigkeit, sämtlichen Mitarbeitern immer umfassenderen Zugriff auf Daten zu geben.
    Es kann daher durchaus schwierig erscheinen, die riesigen Datenmengen und -nutzung erfolgreich zu managen.
    Eine Corporate Self-Service Analytics (SSA)-Umgebung ist daher ein wesentlicher Bestandteil zur Stärkung einer datengestützten Strategie.

    Erfahren Sie in diesem Webinar von Ronald van Loon, Big Data-, Analytics- & IoT-Experte, und Dirk Jung, Solution Sales Architect bei Pyramid Analytics:

    • Vorteile, die eine SSA-Umgebung bietet
    • Wie Ihr Unternehmen eine SSA-Umgebung erfolgreich managen kann
    • Best Practices
    • Praktische Beispiele analytischer Governance in einer SSA-Umgebung mit BI Office
    • Hilfreiche Tipps, womit und wie Sie am besten beginnen
    • Weitverbreitete Fallstricke, die mit einer SSA-Umgebung verbunden und zu vermeiden sind

    In einer abschließenden Q&A-Runde haben Sie dann noch die Möglichkeit, mit unseren beiden Experten Fragen bzw. Themen zu diskutieren.
  • Real Time, Predictive analytics to ensure customer experience for 1B subscribers Real Time, Predictive analytics to ensure customer experience for 1B subscribers Emon Haque, Anritsu, Product Manager - Analytics & Big Data and Carlo Arioli, EMEA Big Data Marketing Manager, HPE Mar 23 2017 3:00 pm UTC 60 mins
    In the last few years, telecommunications networks have experienced exponential increase in data volume, while the expected response time for analysis on those data volumes have experienced a similarly exponential decrease. Within half a decade or so, telecommunication networks have gone from Gigabytes of data and sub-minute response time to Exabytes of data and sub-second response time! At Anritsu, with the help of HPE Vertica, real time, predictive, multi-dimensional analytics solutions have been designed which are ensuring customer experience and service assurance for over 1 billion telecommunication subscribers world-wide. Join us to find out more about this innovative solution from Anritsu which utilizes the field proven, extensive analytics capabilities of HPE Vertica.
  • Litigating Open Source – Lessons learned from Hellwig and McHardy Litigating Open Source – Lessons learned from Hellwig and McHardy Mark Radcliffe, DLA Piper; Bernd Siebers, DLA Piper, Phil Odence, Black Duck Mar 23 2017 3:30 pm UTC 60 mins
    The next wave of open source compliance challenges is upon us. Historically, enforcement has been a community based effort with an emphasis on “doing the right thing”. In recent years, however, we have seen the emergence of private enforcement and enforcement driven by entities and individuals for purposes of economic gain. In some cases these actions are to enforce legitimate interests arising from, for instance, dual licensing models. In other cases, copyright “trolls” are pressing an agenda. In this webinar, Mark Radcliffe and Bernd Siebers will review some of the current litigation trends, evaluate how the different elements of the open source community are reacting to these trends and offer insights and strategies for avoiding the cross-hairs. This includes taking a closer look at open source cases litigated in 2016 in Germany, including the following questions:

    - Are we experiencing a shift in jurisprudence?
    - What should users and developers of open source software do to protect themselves?
    - What's the contribution of the open source community?
  • Are Your Security Solutions Simple and Efficient to Use? Are Your Security Solutions Simple and Efficient to Use? David Morris, Ulf Mattsson and Alex Pezold Mar 23 2017 4:00 pm UTC 60 mins
    As the adoption of cloud computing increases across many business sectors, your applications ingest and share data generated and stored within and beyond the limits of your firewall. This makes your data blind spots more dangerous than ever—both for your internal data and how customers and clients handle their vital information outside your cloud systems. To protect your business, you need a balanced approach to security—combining compliance, responsiveness, and engineering without sacrificing usability and agility.

    Join this presentation to learn how your security solutions measure up when it comes to simplicity and efficacy.
    - Do you know what data you have, where it is, and how to protect it?
    - Do your data security solutions work seamlessly inside your environment? Are you able to secure multiple business units, ERP’s, etc.?
    - Does it play nice with fraud prevention, analytics, data sharing, etc?
    - Does your data security solution achieve PCI compliance as promised?
    - Does your data security solution secure ALL data sets that are a threat to your organization?
  • Del taller al punto de venta: Solución PStyle para sector textil sobre Openbravo Del taller al punto de venta: Solución PStyle para sector textil sobre Openbravo Jaume Balcells, CEO, Practics, (Openbravo Gold Partner) Mar 23 2017 4:00 pm UTC 45 mins
    Como consecuencia de un bajo nivel de innovación e inversión tecnológica, son muchas las empresas dentro del sector textil hoy en día, como fabricantes y distribuidores de telas, ropa o calzado que han visto reducidas en los últimos años sus ventas. Mayor competitividad, mayores costes y presión en precio, junto a la imposibilidad en muchos casos de aprovechar el crecimiento internacional han llevado a muchas de ellas incluso al cierre del negocio. En este entorno la tecnología se convierte en una herramienta fundamental para afrontar los retos actuales y conseguir una ventaja competitiva sostenible.
  • Machine Learning Can Address the Most Pressing Security Challenge Machine Learning Can Address the Most Pressing Security Challenge Kasey Cross, Director of Product Management at LightCyber Mar 23 2017 4:00 pm UTC 60 mins
    Noise is the enemy of breach detection and response. After a major data breach it is often the case that signs of an attacker existed, but were buried in thousands of other security alerts that were mainly false positives.

    With machine learning, meaningful signs of an attack are more easily detected and isolated, so a security operator can focus on precisely the right issue.

    This session will examine:
    - The problem of noise
    - The role of machine learning in sifting through vast amounts of data to get to the fidelity needed to detect an attacker
    - Best practices for including machine learning in your security operations

    About the Presenter:
    Kasey Cross is a Sr. Product Marketing Manager at Palo Alto Networks, joining this month through the acquisition of LightCyber. She has over 10 years of experience in marketing positions at cybersecurity companies including Imperva, A10 Networks, and SonicWALL. She was also the CEO of Menlo Logic and led the company through its successful acquisition by Cavium Networks. She graduated from Duke University.
  • Applink: Automate the process flow between HPE OpsBridge & 3rd party BSM vendors Applink: Automate the process flow between HPE OpsBridge & 3rd party BSM vendors Stefan Goeritz, Applink and Ian Bromehead, HPE Mar 23 2017 4:15 pm UTC 60 mins
    In this session we will demonstrate AppLink’s CLIP solution to implement a combined workflow of HPE OMi’s event management capabilities integrated into the incident management process of ServiceNow and BMC Remedy. In addition to CLIP’s out-of-the-box workflow, this session shows real life non-intrusive customer customizations of CLIP to address auto-assignment of incidents, context sensitive auto-resolution of incidents based on CLIP variables and direct vs. indirect integration options.
  • Next-Gen Enterprise Cloud Contract Management: A Microsoft Case Study Next-Gen Enterprise Cloud Contract Management: A Microsoft Case Study Michel Gahard, General Counsel, Nancy Gillespie, Solution Specialist, Microsoft, Niranjan Umarane, GM Product, Icertis Mar 23 2017 5:00 pm UTC 60 mins
    Join us for this upcoming live webinar to find out how your Contract Lifecycle Management system could be working harder for you. The webinar details Microsoft’s experience in moving from a ‘patchwork’ of third-party and internal solutions, to a scalable, streamlined solution from Icertis.

    About the speakers and what you will learn:

    Michel Gahard, Associate General Counsel & General Manager, Microsoft

    Hear first-hand from Michel about the challenges Microsoft faced and the solutions and implementation best practices they followed for a successful adoption of a NexGen Contract Management system and how implementing the Icertis Contract Management platform resulted in:

    - Increased contract compliance
    - 60% increase in contract speed
    - About 40% decrease in cost

    Niranjan Umarane, General Manager of Product Management, Icertis

    Niranjan will highlight implementation best practices for a large enterprise-wide initiative and discuss what is so unique about the Icertis Contract Management platform, including:

    - Configurable Business Rules Management for a globally dynamic environment
    - NextGen, easy-to-use interface
    - Quickly get up-and-running in 4-5 months
    - Scalability and flexibility based on the cloud-native architecture
  • Using Elastic as your Analytics Foundation Using Elastic as your Analytics Foundation CA Technologies: Bryan Whitmarsh Sr. Principal Product Manager; Himanshu Pande, Senior Director of Product Management Mar 23 2017 5:00 pm UTC 60 mins
    The collection of performance, usage, and error/crash data is a critical first step in building an application or infrastructure based analytics engine. Once collected, the normalization of this data into a proficient repository, that makes the data available to be analyzed, becomes the foundation of your Analytics initiatives.
    In this interactive webcast, experts from CA Technologies will facilitate some key topics related to using the ELK stack as a basis for their Analytics engine, sharing their lessons learned and best practices. The ELK stack is a set of products (Elasticsearch, Logstash, and Kibana) provided by Elastic used to log, store, and visualize both structured and unstructured data. We’ll answer these questions, and more in this webcast:
    •Why leverage the ELK Stack as part of your analytics strategy?
    •Lessons learned in running Elasticsearch at scale (Master Nodes + Client Nodes + Hot Nodes + Warm Nodes)
    •How to best support multi-tenant SaaS solutions with ELK
    •Elasticsearch is just one component of a Lambda Architecture, what else can/should be used?
    •How you can leverage CA’s new Agile Ops analytics platform to predict performance anomalies, end alert storms and false positives and leverage machine learning for faster root cause analysis.
  • Applying Lean Practices to Healthcare IT Processes Applying Lean Practices to Healthcare IT Processes Troy DuMoulin, VP of Research & Development, Pink Elephant Mar 23 2017 5:00 pm UTC 60 mins
    Join us for a live webcast, “Applying Lean Practices to Healthcare IT Processes" on March 23rd. Seasoned ITSM experts from Pink Elephant and Cherwell will demonstrate how Lean principles are critical in healthcare organizations for better process flow, improved patient care, and lower costs. Additionally, they will map out the connection between Lean, Agile Software Development, and DevOps, how they relate to principles of IT Service Management, and the methods to accelerate business value generation.
  • Storage Refresh? 3 Capabilities Primary Storage Must Have (but probably doesn't) Storage Refresh? 3 Capabilities Primary Storage Must Have (but probably doesn't) Charlie Hodges, Storage Switzerland Mar 23 2017 5:00 pm UTC 60 mins
    If your organization is embarking on a refresh of your primary storage system this year, this is the one webinar that you will want to attend. IT evaluators that haven't looked at storage in a few years, will be impressed the use of flash to improve performance, while many claim to integrate file (NFS, SMB) and block (iSCSI, Fibre) protocols. These features though are now table stakes for the modern storage solution.

    While all of these features are important (and not created equal), IT professionals should demand capabilities that solve today's organizational challenges like eliminating shadow IT, improving multi-site productivity and long term data retention as well as meeting increasingly strict compliance standards. IT professionals should look for not only high performance and universal protocol support but also enterprise file sync and share, inter-data center sync and secure archive with compliance.
  • Uniting a global development workforce with Juniper Uniting a global development workforce with Juniper Dave Uebele, Juniper Networks, SCM Engineer and Russ Hill, WANdisco, SCM Specialist Mar 23 2017 5:00 pm UTC 60 mins
    Join us to learn how Juniper Networks relies on WANdisco to unite a globally distributed development workforce within Subversion, delivering results such as:
    - A 24/7 Continuous Integration environment with zero Subversion downtime
    - Increased productivity and maximized valuable engineering time and efficiency
    - Eliminated the effects of network failures and the dependency on legacy backup procedures