Hi [[ session.user.profile.firstName ]]

Information Technology

  • Why Is Operational Data Important for IT?
    Why Is Operational Data Important for IT? Dan Ortega - Vice President of Marketing Recorded: Apr 28 2017 4 mins
    Each day, with every customer transaction, employee task and business process, companies generate vast amounts of operational data that provides leaders and managers with insight into what is working well and what requires attention. Operational data is particularly important to those responsible for stewarding the information and technology assets of their organization.
    In this context, operational data is particularly important to IT, which is why it is so critical to understand the three different types of operational data on which IT leaders rely.
    Business operational data is all about the business processes and user experiences, which IT enables with the technology and services it provides. The reason organizations invest in technology is to improve the productivity and effectiveness of business operations. Process and user-related data evaluated over time provides a contextual picture into how effectively the technology is achieving that goal.
    IT operational data is concerned with the content of “what” technology components are operating and being used. IT operational data is important as a part of the IT planning process to understand capacity utilization and determine where scalability constraints exist, as well as to understand the cost of services provided to users and to assess security and risk considerations of the business-technology ecosystem. Within IT service management processes, operational data is critical to ensure performance and availability Service Levels Agreements (SLAs) are honored, and to drive technology cost reduction through infrastructure optimization.
    Operational data provides IT with the critical picture it needs to understand and optimize the role it plays in the context of the company.
  • Enterprise Security and Productivity in the Age of Digital Transformation
    Enterprise Security and Productivity in the Age of Digital Transformation Ali Mazaheri, Chief Technical Architect, Microsoft; Dean Suzuki, Technology Architect, Microsoft Recorded: Apr 28 2017 25 mins
    It’s a fact: Digital Transformation is arguably the number one growth opportunity among today’s IT and business leaders. Organizations that embrace advanced technologies are attracting the best talent, optimizing productivity and creating enduring value for customers and shareholders.

    Join us to engage with subject matter experts, network with peers and learn about new innovations that will streamline operational efficiencies and reinvent the way your organization performs with the advanced security you require in the cloud era.
  • Maximize Scale & Agility: Leveraging Public Cloud Best Practices & Optimization
    Maximize Scale & Agility: Leveraging Public Cloud Best Practices & Optimization Aaron Newman, CloudCheckr CEO/Co-founder Recorded: Apr 28 2017 54 mins
    Building your workloads on AWS unleashes speed and agility. To keep your foot on the pedal and stay aggressive, you need to infuse governance and best practices into your patterns.

    Join CloudCheckr Co-Founder/CEO Aaron Newman in this webcast as he walks you through best practices and strategies for successfully scaling out your AWS environment. In this webinar, learn how to

    - Stay lean and maximize spend

    - Ensure proper controls are in place

    - Apply cost optimization strategies

    - Manage right sizing services and administrative privileges
  • How Prairie Dogs Improve Incident Response
    How Prairie Dogs Improve Incident Response Jim Hansen, COO, PhishMe Recorded: Apr 28 2017 42 mins
    No matter how quickly you’re detecting and responding to breaches, it’s still not fast enough for your customers’ and clients’ peace of mind. Even companies with the best solution in place are only doing half the job. The other half? Training your people.

    The average time to find and respond to a breach?
    147 days. (That’s not a typo.)

    So, how do you get your organization better – and faster? And how do you train and empower your employees to do better than 147 days? In this presentation, we will explore how to harness the common detection techniques used by prairie dogs (yes, prairie dogs) and lessons we can learn from them in the domain of cyber security. HINT? It’s called Collective Security.

    Prairie dog calls contain specific information as to what the predator is, how big it is and how fast it is approaching.
    - Slobodchikoff, C. N. (2002), Cognition and Communication in Prairie Dogs
  • The Performance Challenge: Providing Amazing Customer Experience No Matter What
    The Performance Challenge: Providing Amazing Customer Experience No Matter What Nick Panahi, Product Management, DataStax Recorded: Apr 28 2017 48 mins
    Building and managing cloud applications is not easy. Delivering one with an amazing customer experience is even harder.

    Join us for “The Performance Challenge: Providing an Amazing Customer Experience No Matter What” webinar where we will deep dive into the challenges customers face with providing a consistent experience no matter where customers are, providing real-time access to data and how DataStax Enterprise can help.
  • Make Troubleshooting Smarter and Collaborative With Intelligence
    Make Troubleshooting Smarter and Collaborative With Intelligence David Millis, Staff Architect of IT Markets, Splunk Recorded: Apr 28 2017 61 mins
    For decades, your operations center has been trapped by “insights” from the wall of charts. Meanwhile, your operations teams are flooded with alerts that lack context and a problem is emerging. You soon find yourself sitting in war rooms, watching siloed tools, navigating event storms and running scripts to extract “relevant” logs for triage. This just does not scale.

    Splunk IT Service Intelligence (ITSI) brings a unique approach to monitoring and troubleshooting with detailed swim lanes, logical drill-downs and meaningful and contextual insights into events.

    Watch this webcast to learn how to:

    -Speed up investigations by organizing and correlating relevant metrics and events
    -Analyze real-time performance in relation to past trends
    -Identify and alert on notable events by creating predefined correlation searches
    -Navigate through event storms easily and quickly and make informed decisions to focus your attention on what matters

    Speaker: David Millis, Staff Architect of IT Markets, Splunk

    Agenda:
    15 min - Key Concepts of Splunk ITSI
    30 min - Demo: Deep Dives, Multi-KPI Alerts and Notable Events
    15 min - Q&A
  • How a catalog can drive business for MTDC & Hosting Provider
    How a catalog can drive business for MTDC & Hosting Provider Patrick Buech Recorded: Apr 28 2017 5 mins
    Putting the customer center-stage when defining the service portfolio is crucial in order to stay successful in a highly competitive market. However, service providers in the multi-tenant and hosting market need to leverage a new catalog-driven approach to drive their organization end-2-end: from order management, delivery and provisioning, to billing, accounting and finally, to operation.

    In this interview, service management expert Patrick Büch explains how to tackle today’s challenges and how to increase an organization’s flexibility and agility in terms of how services are offered to the customer.

    For more details, please see the further information in the section "attchments": Expert Paper and website link.
  • RGPD, LPM, DSP2 : Comment résoudre le paradoxe de la nécessité d'ouvrir son SI e
    RGPD, LPM, DSP2 : Comment résoudre le paradoxe de la nécessité d'ouvrir son SI e Marie-Benoîte Chesnais, Senior Principal Consultant chez CA Technologies Recorded: Apr 28 2017 44 mins
    Les nouveaux usages de consommation et les nouvelles pratiques marketing favorisent la multiplication des données renseignées, collectées, analysées, et utilisées. Où sont ces données ? Comment les récupérer ? Peut-on les effacer ? Sont-elles exposées ?

    Le contrôle de leurs données échappe aux citoyens.

    Les entreprises font face à un paradoxe : nécessité d’ouvrir leur système d'information pour répondre aux besoins du marché et obligation de protéger les données exposées.

    Les différentes réglementations (RGPD, DSP2, Loi de Programmation Militaire) imposent aux entreprises de mettre en place les mesures nécessaires pour :
    •Protéger de manière proactive l'accès aux données personnelles,
    •Être en mesure de détecter les fuites de données et réagir rapidement.

    Pour renforcer la sécurité de son SI, et également se mettre en conformité, il est indispensable d'identifier, gérer et contrôler les accédants aux SI. Il est également indispensable pour les entreprises que ces obligations de sécurité n’impactent pas les efforts déployés pour optimiser et fluidifier l’expérience utilisateur.

    Dans ce webcast, nous vous proposons d’aborder les points suivants :

    1.Focus sur les différentes réglementations en lien avec les données personnelles : RGPD, LPM, DSP2

    2.Impact de ces réglementations sur les DSI

    3.Identification et contrôle des portes d'entrées aux données critiques
    Quelles sont les différentes portes d’entrées au SI
    Quels sont les risques associés à chacune d’entre elles
    Comment répondre à ces risques
  • Co dalej z moim środowiskiem VDP?
    Co dalej z moim środowiskiem VDP? Daniel Olkowski, DellEMC Recorded: Apr 28 2017 51 mins
    VMware ogłosił koniec rozwoju rozwiązania vSphere Data Protection (VDP) do backupu / odtwarzania środowisk VMware.
    W tym kontekście pojawiają się pytania:
    •Jak długo mogę korzystać z VDP?
    •Kiedy kończy się wsparcie?
    •Czy mogę zmigrować moje środowisko VDP do Avamara (pełnej wersji VDP)?
    •Jakie są koszty?
    •Jak technicznie wygląda migracja?
    •Czy są inne opcje?
    Zapraszam na krótką, 30 minutową sesję w trakcie której przedyskutujemy
    •Szczegóły dotyczące VDP i ogłoszenia VMware
    •Możliwości dalszego użytkowania VDP
    •Techniczne i komercyjne szczegóły dotyczące migracji
  • Don’t Let Your Legacy SIEM Be Your Kryptonite
    Don’t Let Your Legacy SIEM Be Your Kryptonite Girish Bhat,Director of Security Product Marketing at Splunk, Risi Avila, Security Professional Services Consultant at Splunk Recorded: Apr 27 2017 59 mins
    It’s a bird, it’s a plane, no it’s just your legacy SIEM. Did you know your SIEM might be weakening your security powers? Your legacy SIEM could be:

    • Limiting your ability to collect, store and use security-relevant unstructured and structured data
    • Making it difficult to maintain your SIEM and requiring skilled staff to work around the clock just to keep the lights on
    • Burdening your security operations team by forcing them to chase false alarms while missing critical alerts
    • Failing to detect modern threats and putting your entire business at risk

    But have no fear, Splunk’s security experts are here to make you a security super hero again. Put on your cape and join us for this webinar to learn how Splunk can be used as a modern SIEM to solve a range of security use cases and more.

    Splunk’s security experts will share common SIEM replacement and migration scenarios and discuss how a department store, a financial services firm and a luxury retailer successfully migrated from their legacy SIEM to Splunk.

    Speakers
    Girish Bhat, Splunk director of security product marketing
    Risi Avila, Security professional services consultant

    Agenda
    10 mins – The challenges of having a legacy SIEM
    15 mins – The options to migrate
    15 mins – Customer success stories
    5 mins – Resources to guide and help you
    10mins – Q&A
  • New York’s New Cybersecurity Regulations: Explained!
    New York’s New Cybersecurity Regulations: Explained! Mihir Mistry, Senior Security Manager Recorded: Apr 27 2017 60 mins
    The nation's first state-mandated cybersecurity regulations regarding banking and financial services companies went into effect in New York state on March 1st. However, many businesses subject to the regulations are asking, what are these rules and how will they affect my business operations.

    SecureWorks invites you to join us on April 27th for a webcast designed to help you understand these new mandates and develop an approach to ensure that your organization has a mature and effective security program in place that will not only help you achieve compliance but will improve your overall information security posture.

    What you will learn:
    • Which entities are covered by the mandate and what type of data needs protecting.
    • The five core elements needed to establish a comprehensive cybersecurity program.
    • Critical questions you should be asking your security program partner.
  • Stop attacks such as ransomware and get HIPAA compliant for Healthcare
    Stop attacks such as ransomware and get HIPAA compliant for Healthcare Sridhar Karnam, Director of Product Marketing at Arctic Wolf Networks Recorded: Apr 27 2017 35 mins
    Stop attacks such as ransomware and get HIPAA compliant for Healthcare. Understand the top 3 attacks in Healthcare, how to stop them using simple cloud-based tools and ensure HIPAA compliance for business continuity.
  • 6 Lessons for Cyber Threat Hunters
    6 Lessons for Cyber Threat Hunters Mary Karnes Writz and Alona Nadler, HPE Recorded: Apr 27 2017 46 mins
    Hunt teams are relative newcomers within the security operations domain. Many companies say they are doing “hunt” but when we dig deeper, we find the capabilities are ad hoc, with no measurable indicators of success nor formal organizational support. That means hunt teams are growing in popularity and use, but there is no “gold standard” yet for how they work. With increasing scarcity of skilled resources in cyber security and lack of efficient tools, it is challenging to build successful hunt practices inside an organization.

    Join this webcast to:
    •Gain a clear understanding of the current challenges of hunt and investigation procedures
    •Learn how to build “hunt” capabilities that search for security breaches
    •Increase speed, simplicity and effectiveness across the entire workflow of hunt and investigation with ArcSight’s new solution

    Mary Writz is a seasoned professional with more than 15 years of experience in cyber security and, under her services leadership role, her team filed 9 patents and built a successful hunt practice with a focus on Big Data, machine learning and visualization. Alona Nadler is a senior product manager for ArcSight with a background in Big Data analytics platform.
  • Inside Server Evolution and Spending: Insights from 451 Research
    Inside Server Evolution and Spending: Insights from 451 Research Christian Perry, Research Manager, Voice of the Enterprise: Servers and Converged Infrastructure Recorded: Apr 27 2017 60 mins
    As workload migration to public cloud continues, IT organizations face a wealth of challenges as they determine the most effective compute ecosystem for their needs. Server technologies are evolving quickly—from converged to hyperconverged to composable—and finding the right fit for on-premises workloads is now a critical component of infrastructure strategies. This webinar will explore the drivers behind enterprise server purchases and how they are planning for the future.

    Join Christian Perry, Research Manager, Voice of the Enterprise: Servers and Converged Infrastructure, for this interactive webinar highlighting analysis of customer spending and adoption trends from 451 Research’s latest survey of IT buyers.

    During the webinar, learn:

    -Drivers of today’s purchases of servers and converged infrastructure
    -Key customer pain points and objectives for servers and converged infrastructure
    -How cloud migration is impacting spending on servers and converged infrastructure
    -Where hyperconverged fits into new infrastructure deployments
    -How vendors are positioning themselves to win in this evolving compute market
  • The Truth about 802.11ac Wave-2 Technology
    The Truth about 802.11ac Wave-2 Technology Devin Akin, CEO, Divergent Dynamics Recorded: Apr 27 2017 63 mins
    We’re now half way through the sales cycle of 802.11ac Wave-2 APs. Where are those 4x4:4 clients we were promised? Why is nobody using 160MHz channels? What about the value that MU-MIMO was supposed to deliver? So far, Wave-2 has failed to deliver on the marketed promises and will soon be replaced with the new 802.11ax technology. What is preventing customers from realizing the value of Wave-2, as marketed by AP manufacturers? Have the vendors finally been caught red-handed in their mis-marketing of a technology?  Join Devin Akin as he shares the facts about Wave-2 technology.

    Devin Akin Bio:
    * 15+ years of Innovative Experience in Wi-Fi
    * Named to the TWW Top 100 Wireless Technology Experts list for 2014
    * Co-founder/CTO, The CWNP Program (cwnp.com), 2001-2009
    * Chief Wi-Fi Architect, Aerohive Networks 2009-2013
    * Network Architect, Evangelist, Author, Speaker, Teacher, Blogger
    * Advisor to most Wi-Fi manufacturers at some point since 2001
  • Embedded Analytics: A New Approach for Getting Value From Your Data
    Embedded Analytics: A New Approach for Getting Value From Your Data Alex Woodie, Editor at Datanami, Daniel Mintz, Chief Data Evangelist at Looker Recorded: Apr 27 2017 50 mins
    Embedded analytics is not new, but the technology for integrating charts, reports, dashboards, and self-service exploration has evolved considerably in the past 5 years. Today, companies in every industry are strengthening relations with customers and suppliers by productizing their data to make it accessible where people need it, when people need it.

    In this webinar you'll learn about:

    - The evolution of embedded analytics
    - Applications and use cases for embedded analytics
    - Whether to build or buy analytics to embed in applications
    - Technology today that is making it possible to monetize data
  • Is SaaS Safe? SaaS Security vs Today’s Zero-Day Attack
    Is SaaS Safe? SaaS Security vs Today’s Zero-Day Attack Michael Landewe Recorded: Apr 27 2017 43 mins
    Every day, we test popular SaaS like Office365 and GSuite against the latest zero-day threats.
    In this webinar we will answer the questions that CISOs regularly ask:

    • Which SaaS offer the best built-in protection?
    • Is it worth paying more for Microsoft's Advanced Threat Protection?
    • Is there a difference in protection between email and file sharing?
    • Should I scan both inbound and outbound? What about internal email and sharing?
    • How do I add more security if I need it?

    Avanan's Cloud Security Platform is uniquely positioned to understand the security profile of most every cloud provider. Integrated with all major SaaS and partnering with over 70 security vendors, Avanan constantly monitors for the latests security threats and measures the risk profile of each cloud provider.

    We will discuss recent attacks and the speed of each cloud vendor's response. We will compare each SaaS window of vulnerability and adaptation to the changing threat vectors.

    Before and after the webinar, real time vulnerability information will be available at https://avanan.com/gauge
  • Threat Protection for Office 365 - Live Demonstration
    Threat Protection for Office 365 - Live Demonstration Proofpoint Recorded: Apr 27 2017 55 mins
    The good news: Microsoft Office 365 allows your people to work anywhere, anytime, on any device. The not-so-good news: That freedom creates security issues. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats. Plus, it’s not designed to help you efficiently respond and remediate threats.

    That’s where our Threat Protection for Microsoft Office 365 comes in.

    Join us for a live demo and see firsthand how our solution can help you:

    •Protect against advanced malware-based threats delivered through URLs and attachments and non-malware threats
    •Keep your email service connected even during Office 365 email server outages
    •See at a glance the campaigns targeting your organization
    •Quickly reduce the attack surface
  • Finding Talent in the Rapidly Changing Landscape of Virtual Reality
    Finding Talent in the Rapidly Changing Landscape of Virtual Reality Joe Radak, Course Developer at Udacity & Co-Founder of Eerie Bear Games Recorded: Apr 27 2017 22 mins
    In today's rapidly changing landscape of Virtual Reality, it can be difficult to stay on top of the plethora of technologies and use-cases for this emerging market. Joseph Radak, Course Developer at Udacity and Co-Founder of Eerie Bear Games, will share his insights on how to stay relevant in the world of VR and keep up with consumer demand - not just in gaming, but in other industries like mobile, technology, media, healthcare and more. Joseph will share trends on VR consumption, up-skilling your existing workforce for VR, and finding the right talent that will help your company excel in the rapidly changing landscape of VR.
  • Pitfalls and Potholes to Avoid in Your eDiscovery Projects
    Pitfalls and Potholes to Avoid in Your eDiscovery Projects Doug Austin and Karen DeSouza, Esq. Recorded: Apr 27 2017 58 mins
    If you’ve conducted discovery for litigation, investigations or audits, you know that “Murphy’s Law” dictates that a number of “pitfalls” and “potholes” could occur that can derail your project. These issues can add considerable cost to your discovery effort through unexpected rework and also cause you to miss important deadlines or even incur the wrath of a judge for not following accepted rules and principles for discovery. This webcast* will discuss some of the most common “pitfalls” and “potholes” that you can encounter during the discovery life cycle and how to address them to keep your discovery project on track.

    Webcast Highlights

    + Avoiding the Mistake in Assuming that Discovery Begins When the Case is Filed
    + How to Proactively Address Inadvertent Privilege Productions
    + Up Front Planning to Reduce Review Costs
    + How to Avoid Getting Stuck with a Bad Production from Opposing Counsel
    + Understanding Your Data to Drive Discovery Decisions
    + Minimizing Potential ESI Spoliation Opportunities
    + Ways to Avoid Potential Data Breaches
    + How to Avoid Processing Mistakes that Can Slow You Down
    + Common Searching Mistakes and How to Avoid Them
    + Techniques to Increase Review Efficiency and Effectiveness
    + Checklist of Items to Ensure a Smooth and Accurate Production

    Presenters Include:

    
Doug Austin: Doug is the VP of Ops and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing consulting, technical project management and software development services to numerous commercial and government clients.

    
Karen DeSouza: Karen is the Director of Review Services and a Professional Services Consultant for CloudNine. Karen is a licensed attorney in Texas and has over 15 years of legal experience. She also has a Bachelor of Science in Legal Studies - American Jurisprudence.

    * Submitted for MCLE in Texas and Florida
  • How to “Future Proof” Data Protection for Organizational Resilience
    How to “Future Proof” Data Protection for Organizational Resilience Storage Switzerland, Carbonite Recorded: Apr 27 2017 61 mins
    Users expectations of IT's ability to return mission critical applications to production are higher than ever. These expectations are leading IT to abandon many of their backup and recovery solutions to try new, unproven solutions that may or may not solve the problem. In either case, the organization wasted its investment in the first solution for the unknown potential of a new solution. User expectations are certain to get higher, so this cycle will likely repeat itself. IT needs a new strategy, one that will meet the current expectations of users and pave the way for true organizational resilience.
  • Breaking L2 Barriers for Storage Clusters
    Breaking L2 Barriers for Storage Clusters Jacob Smith, SVP, Engagement at Packet and Ashok Rajagopalan, Head of Product at Datera Recorded: Apr 27 2017 40 mins
    Discover how to create flexible, API-focused scale-out storage that supports today’s demanding enterprise applications. Join the live webinar from Datera and Packet.net for an advanced customer case study and technical deep dive.

    Viewers will get insights on how elastic block storage is evolving in on-premises clouds, challenges with current storage solutions scaling beyond a rack, and data center alternatives for service providers and cloud builders. Learn about Datera’s unique solution to scale easily across the data center and hear from Packet.net on how they are operationalizing Datera Elastic Block Storage.

    This insightful webinar is designed for service providers and data center professionals chartered with providing a high performance, consistent and profitable elastic block storage.
  • RANSOMWARE: Your Money or Your Data Protecting the Public Sector from Ransomware
    RANSOMWARE: Your Money or Your Data Protecting the Public Sector from Ransomware Bil Harmer, Strategist, Office of the CISO, Zscaler Recorded: Apr 27 2017 61 mins
    Cyber extortion is on the rise, and the public sector is particularly vulnerable. A study conducted by a leading cybersecurity threat management firm reported that state and local government networks are twice as likely as their commercial counterparts to be infected with either ransomware or malware.
    Why are ransomware perpetrators increasingly setting their sights on the public sector? First, many agencies and public institutions rely on legacy systems that are challenged to meet all of today’s cybersecurity threats. Second, the proliferation of devices and technology platforms, including smartphones, tablets and mobile apps, are giving hackers more points of entry into public sector networks. Are you prepared for such an attack?

    Join Bil Harmer, Strategist, Office of the CISO, Zscaler Inc., for a compelling webcast highlighting how ransomware can impact your organization and steps you can take to secure your network and systems.

    Bil will also cover:

    - How ransomware has evolved
    - Lessons learned from recent attacks
    - Why cloud sandboxing is so important
    - Tips for mitigating ransomware

    For more information about Zscaler, go to www.zscaler.com

    Bil Harmer leads Zscaler’s Office of the CISO for the Americas, where he advises organizations on best practices for implementing cloud-based cybersecurity solutions. A veteran of the IT industry, he has helped startups, governments, and financial institutions design and implement security programs. Bil pioneered the use of the SAS70 coupled with ISO, to create a trusted security audit methodology used by the SaaS industry. A highly sought-after speaker, Bil frequently presents on security and privacy-related topics at conferences such as RSA, ISSA, GrrCon and the Cloud Security Alliance.
  • The Real Value of PhishMe’s Human Phishing Defense Solutions
    The Real Value of PhishMe’s Human Phishing Defense Solutions Rohyt Belani, PhishMe CEO & Dean Davison, Forrester Principal Consultant Recorded: Apr 27 2017 56 mins
    With phishing attacks accounting for over 90% of all breaches and the cost of cybercrime rising, is your company doing all it can to prevent a phishing attack and costly breach?

    The results are in and PhishMe’s suite of anti-phishing solutions can help protect you against attacks. Forrester Consulting has analyzed the Total Economic Impact (TEI) of implementing PhishMe’s Human Phishing Defense Solutions and the results are outstanding!

    Join this webcast, featuring Rohyt Belani, PhishMe’s CEO and Dean Davison, Forrester Principal Consultant to learn more about PhishMe Solutions and the benefits Forrester identified such as:

    - Return on Investment (ROI) of 336%
    - Payback in less than 3 months
    - Time required to address phishing threats reduced by 30%
    - Employee click rate reduced on average by 80%.
  • The Ransomware Epidemic: an End-to-End Look at the #1 Security Threat
    The Ransomware Epidemic: an End-to-End Look at the #1 Security Threat Michael Haag, Jamison Utter, Ben Johnson May 1 2017 5:00 pm UTC 60 mins
    There’s no shortage of educational content on ransomware. This webinar takes an end-to-end look at the crime’s inner workings. Hear from a security researcher who built a ransomware operation from the ground up to gain a better understanding of its origins, how it works, and why we can expect exponentially more attacks. Then, get practical advice and prevention techniques from an expert in advanced threat detection and research. You’ll learn strategies for building a holistic IT security program and preventative methods your organization can implement today with near zero business impact.

    Moderated by: Ben Johnson, Security Executive, Carbon Black Co-Founder
    Ben Johnson is currently working on his next move in the cyber security space. Previously, Ben co-founded Carbon Black, a next-generation endpoint security company, where as CTO he helped drive technology vision, product effectiveness, and security evangelism while the company grew from 2 to 750 employees. Ben serves on the boards of several security start-ups and is routinely sought out for advice regarding security strategy, product strategy, or to help venture capitalists with due diligence.

    Presenter: Michael Haag, Director of Advanced Threat Detection and Research, Red Canary
    Michael has over a decade of experience across the security spectrum, from architecting security programs to overseeing day-to-day tuning and operations. His expertise includes advanced threat hunting, investigations, technology integrations, and hands-on development of tools, processes, and frameworks to drive efficient security operations.

    Presenter: Jamison Utter, Cyber Security Researcher
    A lifetime technologist and enthusiast, Jamison has 20 years of experience as an engineer, security consultant, and thought leader. Natural curiosity has taken Jamison beyond the technical hack into the workings of the criminal industry: how and why malware is written, how people make money at it, and what their motivations are.
  • Better Data, Better Account Based Marketing: What You Need to Know
    Better Data, Better Account Based Marketing: What You Need to Know John Donlon, research director at SiriusDecisions, Mark Godley, CRO of HG Data, Vin Turk, COO of Madison Logic, May 1 2017 6:00 pm UTC 45 mins
    There’s a lot of data available to B2B marketers, but having the right data is the first step toward building an effective account based marketing strategy. But what is the right data, and how do you apply it?

    When account based marketing is done right, sales and marketing teams can align behind the best prospects to target and develop messages that resonate with these prospects. This webinar will help you:

    - Recognize the right data for account based marketing campaigns
    - Apply that data to create hyper-relevant campaigns
    - Measure and continually optimize your ABM campaigns

    Moderated by John Donlon, research director at SiriusDecisions, and featuring presentations by Mark Godley, CRO of HG Data, and Vin Turk, COO of Madison Logic, this webinar demonstrates the type of data you need to succeed in your programs. Vin and Mark will also share use cases as to how data is helping them deliver extraordinary results in real-world ABM programs.
  • Next-generation Security for the Public Cloud
    Next-generation Security for the Public Cloud Matt Keil, Director of Product Marketing at Palo Alto Networks May 2 2017 8:00 am UTC 60 mins
    As more and more organizations move their workloads to the public cloud, security remains a top concern because cybercriminals do not care whether your applications and data reside in your datacenter or in the cloud. Their goal is to steal data or computing resources by gaining access to the network, then moving laterally, potentially to the cloud to execute their goal.

    Join us for this webinar to learn how the VM-Series protects your public cloud deployment with the same next-generation firewall and threat prevention features available in our physical appliances.

    The webinar will cover:
    • Overview of the VM-Series next-generation firewall
    • How the VM-Series prevents cyberattacks in the public cloud
    • Key differences between the VM-Series and other cloud security offerings
  • CTO series: Episode 2: -What does a Good Strategy look like...?
    CTO series: Episode 2: -What does a Good Strategy look like...? Andrew Bird : Chief Digital Officer & EA Visionary May 2 2017 9:00 am UTC 30 mins
    An organisations strategy should be unique in terms of fit for its business model. In this context, good strategy should show direct linkage to the operating model of the business and the road map of how growth will be achieved.
    In this Episode 2 of the CTO series, we discuss the measure of linkage to the operating model and the tools which can be used to show alignment or otherwise to the business vision.
  • [Video Interview] Tarah Wheeler on the Ethics of Hacking Back and AI in Security
    [Video Interview] Tarah Wheeler on the Ethics of Hacking Back and AI in Security Josh Downs, BrightTALK & Tarah Wheeler, Principal Security Advocate, Symantec May 2 2017 1:00 pm UTC 30 mins
    - BrightTALK at CRESTCON & IISP Congress -

    BrightTALK caught up with Symantec's Tarah Wheeler for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The ethics of 'hacking back'

    - AI & Machine learning and the influence it'll have on security

    - Cyber security in the financial sector

    - Cyber warfare and the new tactics coming through

    - Vulnerabilities in the IoT and what we can do about them

    Enjoy!
  • Cloud Data Warehouse with PowerCenter and Amazon Redshift – Deep Dive & Demo
    Cloud Data Warehouse with PowerCenter and Amazon Redshift – Deep Dive & Demo Meera Srinivasan, Prateek Shrivastava, Andrew McIntyre, Product Management May 2 2017 3:00 pm UTC 60 mins
    In this technical session we will discuss the reasons many customers are extending PowerCenter to support cloud data warehouses on AWS with Amazon Redshift and review common patterns for Amazon Redshift adoption. We will overview the Amazon Redshift architecture and discuss available options from Informatica for extending PowerCenter to support Amazon Redshift. We will share details about using prebuilt Informatica connectors for Amazon Redshift and other AWS services such as Amazon S3, and overview advanced scaling features such as grid, partitioning and pushdown optimization.

    Key webinar learnings:
    • AWS journey and Amazon Redshift: Key benefits and capabilities.
    • Key use cases for extending PowerCenter with Amazon Redshift.
    • Extending with PowerCenter Redshift connector vs extending with Informatica Cloud Redshift connector.
    • Scalability features like grid, partioning and pushdown optimization to maximize the power of Amazon Redshift
    • AWS deployment options: Single-click deployment of PowerCenter on AWS EC2 and Informatica Cloud ‘Pay as You Go’ via AWS Marketplace
    • Demos of key use cases
  • Is Your Security Keeping Pace with Your Cloud Initiatives?
    Is Your Security Keeping Pace with Your Cloud Initiatives? Jonathan Glass, Turner Broadcasting System, Chris Geiser, Garrigan Lyman Group, and Allison Armstrong, Alert Logic May 2 2017 3:00 pm UTC 60 mins
    You’ve decided to move to the cloud. It’s faster, more scalable, and more agile. Security is a priority, but you don’t want it to slow you down. The foundational infrastructure delivered by cloud providers is secure, but protecting the applications, workloads, and data you run on top of it is your responsibility—and it’s a big one.

    Watch ‘Is Your Security Keeping Pace with Your Cloud Initiatives?’, for a lively discussion on how to evolve your security strategy to account for innovation at cloud speeds. Our panel of experts will discuss:

    - Why conventional security approaches falter in highly dynamic and elastic environments
    - Key steps to eliminate choke points, keep pace with elastic workloads, and how to deploy security controls in minutes
    - How to keep your internal and external customer’s applications and workloads secure while meeting compliance requirements
    - Why a Security-as-a-Service can help you strike the optimum balance between risk, cost and cloud speed.

    Join Jonathan Glass, Cloud Security Architect, Turner Broadcasting System, Chris Geiser, CTO of the Garrigan Lyman Group, and Allison Armstrong, VP of Technology and Product Marketing at Alert Logic, for a discussion on ‘Is Your Security Keeping Pace with Your Cloud Initiatives?’, and learn how it can. Register now!
  • The New IT Operating Model: Why an Architect's Role is Key to Agile & DevOps
    The New IT Operating Model: Why an Architect's Role is Key to Agile & DevOps Richard Sey, Head of Development Operations (DevOps), Siemens Energy Management; Mark Daly, Client Architect, MuleSoft May 2 2017 3:00 pm UTC 60 mins
    With their unique position at the centre of an organization, Architects can play a pivotal role to usher digital evolution and transformation in-line with business and IT objectives, including the adoption of Agile, DevOps and other disruptive paradigms.

    Join Richard Sey, Head of Development Operations (DevOps), Siemens Energy Management, and Mark Daly, Client Architect, MuleSoft, on January 18 at 10am (GMT) for a live webinar as they look at the key role of the Architect in achieving the new IT Operating model. It will cover:

    - A working example from Siemens Energy Management on how they have realised the new IT Operating Model from a business and Architect's perspective to drive operational efficiency, cutting development time by half
    - A view of Enterprise Architecture and DevOps from a leader in the field
    - What an organization needs to support delivery of the new IT Operating Model, including the creation of a Centre for Enablement (C4E), which has reduced dependency on Central IT in the Lines of Business at Siemens by 25%
  • Advanced SD-WAN Monitoring and Management
    Advanced SD-WAN Monitoring and Management Jeremy Rossbach, Sr. Principal Product Marketing Manager and Jason Normandine Sr Principal Product Manager May 2 2017 3:00 pm UTC 60 mins
    How does SD-WAN shift the status quo for Operations teams? SD-WAN technology possesses sophisticated, in-built capability for operations and management, and advanced automation to address network problems in real-time. However, network operations teams need to seamlessly integrate this network and health status intelligence from their new SD-WAN infrastructure into their existing monitoring and management infrastructure. Additionally, monitoring solutions must provide visibility across all network architectures including highly dynamic and complex hybrid clouds and other SDN elements and should:
    - Eliminate visibility gaps between traditional networks and SD-WAN providing administrators with insights to optimize and transform their large hybrid networks
    - Provide relationship mapping of major IT events
    - Visualize physical and logical dependencies in applications and service chains
    - Extend visibility for operators with network performance monitoring across traditional, SDN, NFV, SDDC, SD-WAN, NFV and cloud networks (including service chains)
    - Enable operational insight into how all elements of traditional and overlay networks affect service integrity
  • Smarter Endpoint Security: How to Go Beyond Prevention
    Smarter Endpoint Security: How to Go Beyond Prevention Jim Waggoner, Sr. Director, Endpoint Product Management May 2 2017 3:00 pm UTC 60 mins
    Today’s endpoint security products do what they were designed to do, but they still leave gaps in protection. Comprehensive endpoint protection requires prevention, AV, endpoint detection and response (EDR) and other capabilities. Even when organizations adopt multiple point products, there are still gaps in their endpoint protection.

    Some companies tout “next-generation endpoint security,” but what does that mean? Jim Waggoner, Sr. Director of Endpoint Product Management at FireEye will tell you how to make sure your next-generation endpoint security solution is delivering a comprehensive. In this webinar, you will:

    > Learn about the current endpoint security landscape and the challenges it poses
    > Find out what makes EDR capabilities valuable
    > Understand why threat intelligence is important and how it affects endpoint threat detection and prevention
    > Discover why a single endpoint agent should include (1) Multiple detection and prevention engines, (2) Integrated workflows from detection to investigation to remediation, and (3) Scalable, multiple form factors and breadth of OS support
  • It’s true, SAP can be virtualized – and it’s not difficult.
    It’s true, SAP can be virtualized – and it’s not difficult. Krishna Kattumadam, Sr. Director, Solutions & Engineering - Sachin Chheda, Director Product Marketing, Nutanix May 2 2017 4:00 pm UTC 60 mins
    Virtualization, hyperconvergence, and the cloud bring a host of benefits to IT landscapes, including management simplicity, enhanced resource utilization, better availability, and increased business agility. So what options are available for bringing these advantages to your business-critical SAP landscapes? And what considerations are involved when migrating your two or three-tier SAP architecture to a virtualized cloud platform built on hyperconverged infrastructure?

    In this webinar, we’ll show you how to implement an optimized, protected and high performing cloud platform on HCI across your SAP landscape, including NetWeaver, S/4HANA and RDBMSs. You will hear real-world customer experiences and learn about:

    • The technical details involved in a virtualized deployment of SAP Business Suite
    • Performance, availability, and scalability best practices for using HCI to build a private cloud solution
    • How to simplify and speed system copy and refresh with a web-scale architecture to benefit development, testing, quality assurance, copying, and migration in your SAP landscape
  • Credential Theft Detection & Risk Management: Active Directory Exposed Demo
    Credential Theft Detection & Risk Management: Active Directory Exposed Demo Greg Fitzgerald May 2 2017 4:00 pm UTC 60 mins
    Active Directory is an organization's greatest asset - and weakness. Attackers target this valuable database to access all users, credentials, computers, servers, applications, resources of the ENTIRE organization. Protecting it is required. Doing it from the endpoint before the attacker enters the network is essential.

    Your AD risk can be eliminated. Listen to an easy and efficient way to protect what no other security technology is doing or can do today. Javelin AD Protect was built by former 'Red Team' government trained attackers and will educate you on why Active Directory is easy for hackers to gain the 'keys to the kingdom.'.
  • How Threat Intelligence is Streamlining Security Operations
    How Threat Intelligence is Streamlining Security Operations Dr. Dhia Mahjoub, Principal Engineer of Cisco Umbrella Research, & Daniel Hatheway, Sr. Technical Analyst at Recorded Future May 2 2017 4:00 pm UTC 60 mins
    Manually turning data on cyber attacks, vulnerabilities, and exploits into actionable threat intelligence requires a significant investment of time and resources.

    With security talent and budget in short supply, you need to get more from your data, faster.

    Join Dr. Dhia Mahjoub, Principal Engineer of Cisco Umbrella Research, and Daniel Hatheway, Senior Technical Analyst at Recorded Future, to see how you can gain a more complete view of the threat landscape through a new, exciting integration.

    Attendees will learn how to accelerate incident response and streamline security operations, now. Learn how:

    -Cisco Umbrella Investigate provides access to a live view of domains, IPs, ASNs, and malware file hashes, enabling incident responders to pinpoint attackers’ infrastructures and predict potential threats.

    -Recorded Future expands upon the Investigate data from technical, open and dark web sources to further reduce the risk of attackers in the shortest amount of time.

    -Together, they automate threat intelligence across the broadest set of sources to provide the single best defense against threats.

    Register today to see how you can make more informed decisions, faster.
  • Uptime Institute's 2017 Data Center Industry Survey Results
    Uptime Institute's 2017 Data Center Industry Survey Results Matt Stansberry, Senior Director of Content and Publications May 2 2017 4:00 pm UTC 60 mins
    Insights from over 1,000 data center executives and end users from around the globe. Matt Stansberry, Senior Director of Content and Publications discusses Uptime Institute’s 2017 Data Center Industry Survey Results.

    Topics include:
    How are companies adjusting to shifting budgets and deployment models?
    What impact is cloud computing having on capacity planning?
    What are the adoption rates for new technologies?
    And what are the biggest challenges facing IT Infrastructure organizations in the coming year?
  • What is Lossless Network Capture, and Why it’s Vital to Your Mission
    What is Lossless Network Capture, and Why it’s Vital to Your Mission Scott Schweitzer and Les Davis May 2 2017 5:00 pm UTC 60 mins
    It’s commonly said in packet capture that the one packet you miss is ALWAYS the most important packet. That’s why lossless network packet capture is a vital component in the security and performance of your mission. Today given the huge traffic volumes common in most missions it’s not surprising to learn that many monitoring tools never see a complete picture of what it is they’re really monitoring. It is challenging to launch a forensic investigation into a problem knowing that perhaps some pieces of the puzzle may be missing.

    Please join us to learn how lossless network packet capture from Solarflare can provide agencies with an effective means of natively enhancing the security, and performance of their mission systems and applications.
  • Prepare for the Imminent Shifts in Endpoint Attacks
    Prepare for the Imminent Shifts in Endpoint Attacks Michael Moshiri, Director, Endpoint Protection; Rinki Sethi, Sr. Director of Info Security; Bryan Lee, Unit 42 Threat Analyst May 2 2017 5:00 pm UTC 60 mins
    The shifts in attackers’ tactics are easy to miss and will catch many organizations off-guard. Attackers have discovered new ways to re-engineer older tactics that are easier to execute and are perceived to be less risky by targeted users. Combined with targeting platforms that organizations falsely consider more secure, these new attacks are proving very damaging to unprepared organizations.

    Palo Alto Networks Michael Moshiri hosts colleagues Rinki Sethi, Senior Director of Information Security, and Bryan Lee, Unit 42 Threat Intelligence Analyst, in an exclusive webinar focusing on:

    - Vulnerabilities threat actors are now targeting most intensely
    - New tactics and techniques hackers are using against endpoints
    - Best practices Palo Alto Networks uses to secure its own endpoints
  • How to Optimize Cloud App Performance
    How to Optimize Cloud App Performance Rohan Naggi, Technical Marketing Manager May 2 2017 5:00 pm UTC 45 mins
    Cloud-Delivered SD-WAN provides enterprises with enhanced application performance by leveraging secure end-to-end SD-WAN overlay tunnels, enabling direct traffic routing to applications hosted in the cloud or a data center, tightly integrating mobile and wired access media, and monitoring network conditions in real-time to govern forwarding decisions that ensure optimal application response time.

    In this webinar you will learn:
    - How to leverage cloud-delivered gateways to enhance application performance and security
    - How cloud applications gain increased performance on mobile devices with an SD-WAN
    - How to monitor and measure the performance of cloud applications