As an IT professional, many of the problems you face are multifaceted, complex and don’t lend themselves to simple solutions. The information technology community features useful and free information technology resources. Join to browse thousands of videos and webinars on ITIL best practices, IT security strategy and more presented by leading CTOs, CIOs and other technology experts.
Today’s reality is that your organization will continue to be confronted by increasingly frequent and complex cyber threats.
The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to monitor and search across your IT environment and ends with the ability to quickly mitigate and recover from security incidents. The result? Faster time to detect and time to respond, without adding staff to accomplish the job.
See how LogRhythm’s Threat Lifecycle Management Platform can help your team sort through the noise to quickly discover and neutralize concerning incidents.
Making sense out of the mass of data collected, identifying, organizing and explaining causalities of the things we see and experience every day and taking action requires discovery of small patterns not big trends. Oren Falkowitz, CEO of Area1 Security, gives this talk at Structure Data 2016.
Securing a global enterprise requires security, development, vulnerability management, compliance and risk professionals to understand the engagement and inflection points in the software development lifecycle—and their roles to accelerate it.
Join Veracode for a two part session featuring "Securing the Enterprise in a DevOps World" with David Wayland, and an interactive panel discussion to continue the conversation on securing the enterprise in a DevOps World. This open round table discussion will be led by Veracode Co-Founder and CTO, Chris Wysopal. We will have time for Q&A so bring your questions!
The discussion will touch upon:
· Are you crawling, walking or running with your DevOps initiative?
· Pitfalls? Success?
· How are you connecting the dots for the business and the board on how your application security initiative is mitigating risk?
Panelists: David Wayland, Head of Enterprise Application Security—Fortune 500 Financial Firm, Pete Chestna, Director of Developer Engagement—Veracode, Joseph Feiman Chief Innovation Officer—Veracode.
10 in Tech hosts Carlos Casanova and Shane Carlson sat down with Michael Ludwig from Blazent at Knowledge17 where they discussed discovery, the CMDB and data quality. Getting the CMBD right is critical to success in a ServiceNow implementation. Listen to this episode to find out how Blazent deals with data quality and the CMDB.
If you are moving between methodologies, you are probably looking for a roadmap or at least lessons from someone that’s been through it already. Over its 10+ years, Veracode has moved from monolith to microservice and from waterfall to DevOps. We have learned a lot along the way and I’m eager to share the story. In this session learn:
· A basic Understanding of Waterfall, Agile and DevOps from a people, process and technology point of view
· Considerations when transitioning between these methodologies
· An approach to leading the change in your own company
· How Security can best be integrated into DevOps
The Cloud Economy represents a drastic change in how enterprises perform computing but it's not totally unprecedented. Running simultaneously in parallel with the advent of the Cloud First mentality, is the Gig Economy.
In the Gig Economy people don't have to buy, lease or rent cars. They can use an Uber or Lyft. They don't habitually reserve a hotel room on a trip. They can use AirBnB. What lessons can cloud leaders learn from the Gig Economy that apply to the Cloud Economy and what pitfalls can we avoid?
Cloud Professor Todd Bernhard will address these lessons in our next webinar, Back to School: Cloud Economy and Lessons from AirBnB, Uber and the Gig Economy. During this live webcast we’ll discuss:
- Financial savings promised by the new economic model
- New challenges presented
- How to mitigate against such challenges
Mobile apps fall in scope for a number of regulatory requirements that govern the banking and financial services industries, such as: guidelines from the Federal Financial Institutions Examination Council (FFIEC), the Gramm–Leach–Bliley Act (GLBA), New York State cybersecurity requirements for financial services companies, the Payment Card Industry Data Security Standard (PCI DSS), the Sarbanes-Oxley Act, and more. Luckily, a repeatable mobile app security assessment program and standardized reporting go a long way in both achieving compliance objectives and securing mobile apps and data.
Join us for a 30-minute webinar during which NowSecure Security Solutions Engineer Brian Lawrence will explain:
-- How and where exactly mobile apps fall in scope for various compliance regimes
-- Mobile app security issues financial institutions must identify and fix for compliance purposes
-- How assessment reports can be used to demonstrate due diligence
Looking to solve the puzzling visibility gap across the virtual and physical network? Trying to find the elusive answer to ensuring health and availability while also enhancing security and compliance? Need to deliver faster time to value?
See how you can quickly and easily design and deploy micro-segmentation across the network with an intuitive and easy-to-use UI with natural language search. Optimize network performance and availability with visibility and analytics across virtual and physical networks. And get troubleshooting and operational views to quickly and confidently manage and scale VMware NSX deployments. This session will provide you an overview of vRealize Network Insight (vRNI) product and capabilities.
Migrating your infrastructure from on-premises to the cloud requires extensive monitoring to ensure your IT operations don't suffer along the way. For many organizations, garnering this insight can be difficult -- if not impossible. Join Blue Medora's Mike Langdon to learn key best practices to monitor your infrastructure during migration, helping you simplify the process and ensure optimal performance from migration to decommissioning.
Surveys show that 64% of companies have storage arrays from 3 or more vendors. What does it mean to manage storage infrastructure with so many different products?
In a word, CHAOS!
That’s why a majority of people interested in software-defined storage (SDS) want to simplify management of their storage infrastructure.
Join us for this webinar where we will show how the Lenovo DX8200D Powered by DataCore can bring order to your environment. The DX8200D is the fast path to SDS and it:
• Abstracts away the underlying complexity of storage infrastructure
• Consolidates IT infrastructure and simplifies management through automation and self-adaptive technologies.
KPCB Partner Ted Schlein hosts leaders from cybersecurity portfolio companies to discuss the changing nature of cyber threats and the challenges facing companies today. His panel includes Endgame CEO Nathaniel Fick; Synack CEO Jay Kaplan and Area 1 Security CEO Oren Falkowitz who are all entrepreneurs who have experience working in government but now offer security solutions to companies.
Ransomware is just one of the many threats that can impact your business data. With the use of cloud storage and virtualization expanding, and with a +500% in attacks and +600% in new variants, NOW is the time to ensure you have a proactive backup plan. Join Veeam and Quantum to learn how to set up a solid BCDR (business continuity and disaster recovery) and backup strategy to protect your virtual data against any ransomware and cyber security threat, including some lessons learned by our customers.
UC&C platforms continue to evolve to satisfy the needs of your business communications and enhance user collaboration - but how can you keep up and assure service quality as you bring together multiple vendors, platforms creating these complex, hybrid integrated solutions.
This webinar explores a framework for managing availability and service quality of multivendor on-prem and hybrid Unified Communications Services such as Skype for Business; Cisco UC ; SIP Trunking; VoIP; desktop video; video conferencing; and telepresence, and discusses best practices for improving IT collaboration to reduce management costs and complexity, improve service quality and reduce MTTR.
According to Akamai, attacks at the application layer are growing by more than 25% annually. But many organizations still struggle to understand how to get started with application security, or what good looks like.
To shed light on the application security process, this session will outline the steps most of Veracode's customers take to develop a mature application security program. Attend and hear about Colin’s experience developing and managing an application security program from the ground up and learn:
• The different AppSec phases most organizations are currently in
• The next steps to take when moving toward a more comprehensive AppSec program
• Lessons learned, best practices and pitfalls to avoid -- from someone who’s been there
• What a comprehensive, mature AppSec program entails
Today businesses of varying sizes, products and services, and industries are actively applying Predictive Business Analytics in seeking to improve greater customer engagement and resulting increased revenues and profits. Often these businesses are looking to their finance group to guide, if not lead, these efforts to successful outcomes.
In a recent article written by Ray Tong, he cited a CFO magazine survey that:
• Over 70% of respondents said that they plan to substantially increase the use of data analytics to support decision making and improve business partnering;
• 68% of respondents, the majority of who were finance executives, said that they plan to improve their data analytic skills in the coming year.
Consequently, it is essential that the financial professional understands what it is going to take for them to succeed.
This webinar discusses the five (5) keys to applying Predictive Business Analytics in your organization. It provides attendees with specific and practical insights to guide their approaches to develop and deploy an effective process that improves managerial decision making across many core performance and financial areas.
What you will learn:
• What are the key steps to success with practical examples
• What steps to avoid
• How to ensure and gain organizational impact
Larry Maisel a recognized author and thought leader in Business Analytics, with experience assisting companies to improve operating performance and business results. An accomplished business professional, with over 20+ years of experience, with proven leadership skills, expertise to drive bottom-line profits and implementing business systems.
Performance is often a key factor in choosing big data platforms. Over the past few years, Apache Spark has seen rapid adoption by enterprises, making it the de facto data processing engine for its performance and ease of use.
Since starting the Spark project, our team at Databricks has been focusing on accelerating innovation by building the most performant and optimized Unified Analytics Platform for the cloud. Join Reynold Xin, Co-founder and Chief Architect of Databricks as he discusses the results of our benchmark (using TPC-DS industry standard requirements) comparing the Databricks Runtime (which includes Apache Spark and our DBIO accelerator module) with vanilla open source Spark in the cloud and how these performance gains can have a meaningful impact on your TCO for managing Spark.
This webinar covers:
Differences between open source Spark and Databricks Runtime.
Details on the benchmark including hardware configuration, dataset, etc.
Summary of the benchmark results which reveal performance gains by up to 5x over open source Spark and other big data engines.
A live demo comparing processing speeds of Databricks Runtime vs. open source Spark.
Special Announcement: We will also announce an experimental feature as part of the webinar that aims at drastically speeding up your workloads even more. Be the first to see this feature in action. Register today!
Javelin AD|Protect focuses on the endpoint security issue of vulnerability by design. On the contrary, Microsoft ATA focuses on logs events and behavior. When it’s obvious that the attack starts on the endpoint, which solution is better suited to stop it?
Given the sheer pace of innovation and ever-increasing competition in today’s marketplace, organizations are leaning on the CIO more than ever before to lead a lean, agile enterprise. For IT teams, this has translated into delivering faster, at greater scale, and more efficiently.
These same demands have also catalyzed a demand for new applications that are delivered both more nimbly and more quickly. This places further stress on the IT Operations team, as they are now tasked with providing a scalable, on-demand infrastructure that can service both developers and the business.
As these expectations converge, IT leaders can no longer focus solely on a management strategy – they must also consider, “What is our automation strategy?” Red Hat and Intel are bring together senior IT executives from across industries for this webinar: Driving Change in IT Ops through Automation. Join us for a brief presentation that will explore how automation can help transform IT operations for the next generation of IT management, followed by a panel of senior IT executives as they discuss the challenges and best practices related to these topics and more.
Software makes the world go round these days, and it’s also causing a lot of problems. The U.S. Department of Homeland Security recently found that 90 percent of security incidents result from exploits against defects in software. It sometimes seems like we’re just rolling out the red carpet for cyberattackers with our applications. Why is software so riddled with security defects? Are developers to blame? Is it just the nature of software?
We’ll discuss the four primary ways that vulnerabilities end up in your software. Attendees at this session will understand the main sources of vulnerabilities and how to prevent them -- a good first step in making apps less like a red carpet for cyberattackers, and more like a moat. We’ll get attendees up to speed on the following:
• Insecure coding
• A threat landscape that never quits
• Indiscriminate use of components
• Programming language choice
In this technical session, we will learn about the different use cases around Amazon Redshift and discuss how Informatica Intelligent Cloud Services is used to implement these use cases. Through real world examples, you’ll learn about best practices, when to use ETL versus ELT, performance tuning, and new features recently introduced.
Key webinar learnings:
• Amazon Redshift: Key benefits, capabilities, and use case patterns
• Informatica Intelligent Cloud Services for Amazon Redshift and other Amazon services
• Best Practices
• Deep Dive Demo of key use cases
Data is the lifeblood of today's business. As the volume of generated data continues to grow, so does the number of data breaches. It's more critical than ever for organizations to adopt database audit and protection solutions. But not all solutions are created equal.
What are the key capabilities that IT and security teams should evaluate? Join Terry Ray as he discusses key considerations for selecting a database audit and protection solution.
About the Presenter:
Terry Ray is the Chief Technology Officer for Imperva, Inc., the leading provider of data security solutions. Terry works directly with Imperva’s largest customers to educate on industry best practices, challenges and regulations. He also, operates as an executive sponsor to strategic customers who benefit from a bridge between both company’s executive teams. During his 12 years at Imperva, he has deployed hundreds of data security solutions to meet the requirements of customers and regulators from every industry. Terry is a frequent speaker for RSA, ISSA, OWASP, ISACA, Gartner, IANS and other professional security and audit organizations in the Americas and abroad.
Tensorflow is an open source software library for numerical computation and machine learning.
Join this session where Marwa will discuss:
-Introduction to Artificial intelligence, machine learning and deep learning
-Sample of machine learning applications
-Tensorflow Story, Model and windows installation steps with object recognition demo.
In an open banking ecosystem, 92% of millennials are going to choose a bank for its digital services. Banks need to have a robust framework they can go by to develop new business models, services and data for radical transformation of millennial engagement. In this webinar you will realize:
•The needs and MOTs of millennials in the digital age for a customer-centric approach
•How the Millennial Banking Framework can be used by banks to transform millennial interactions
•Value delivered through Aspire’s Millennial Banking Offering
•Millennial engagement success stories
Organizations are rapidly embracing multi-cloud architectures that span software-defined data centers (private clouds) and public cloud environments. To help organizations protect their cloud-based applications and data from cyberattacks, PAN-OS® 8.0 expands the VM-Series with new models and optimized performance, making it the broadest, most powerful line of virtualized firewall appliances on the market.
New scalability and resiliency features for Microsoft® Azure® and Amazon® Web Services enable organizations to build secure cloud-centric architectures. Workflow automation features for VMware® NSX® and KVM with OpenStack® help streamline VM-Series deployments.
Cyberattacks are top of mind for organizations across the globe. In fact, 62 percent of firms are being attacked at least weekly and 145 percent are experiencing a rise in the number of security threats. But do organizations have the processes in place to investigate and effectively respond to these incidents? IDC recently surveyed security decision makers at 600 organizations to understand the state of security operations today.
Join this webinar to hear from guest speaker Duncan Brown, Associate Vice President, Security Practice, IDC, and Matthias Maier, Security Product Marketing Manager, Splunk, and discover:
●The time and associated cost security teams spend on incident response and how you compare to your peers
●How organizations are coping with an average of 40 actionable security incidents per week
●Where teams are focusing their security efforts
●Why an analytics-driven approach can make security investigation more efficient and effective, reducing costs and improving security posture
Artificial Intelligence (AI) is not a technology for the future; it’s a huge business opportunity for today. But how can your organisation become a trailblazer for AI innovation, transforming the way you work to deliver immediate – and lasting – bottom line value?
Former CERN scientist, Prof. Dr. Michael Feindt, is one of the brightest minds in Machine Learning. Join him for a 30-minute masterclass in how to apply AI to your business.
You’ll learn how AI can:
•Make sense of market and customer complexity, to deliver quick and effective decisions every single day
•Increase workforce productivity to improve output and staff morale
•Enhance decision-making and forecasting accuracy, for operational efficiency and improved productivity
•Be implemented into your business quickly, easily, with minimal disruption
Michael will also share real-life examples of how international businesses are using AI as a transformation tool, from his experience as founder of market-leading AI solution provider, Blue Yonder.
En tant que PME, vous n'êtes pas immunisées contre les attaques ciblées, les ransomwares et les vulnérabilités Zero Day. Vous avez besoin d'une solution simple et efficace pour protéger vos terminaux contre ces menaces avancées. Assistez à ce court webcast pour savoir comment Symantec Endpoint Protection Cloud (SEP Cloud) protège vos PC, Mac, mobiles et serveurs grâce à ses technologies multicouches de protection des menaces.
The cloud promises to enable organisations to be more flexible, agile and responsive to the needs of their business and the demands of customer and partners. As physical infrastructure has become invisible to end-users, the role of service providers and channel partners has changed. Faced with public and private options, many firms are taking a XaaS approach, embracing the best of both private and public worlds - implementing hybrid architectures to deliver on-demand access to compute resources, capacity, and services, while also providing greater levels of control, security, and visibility of data and applications. In this webinar, Rory Duncan, Research Director with 451 Research will outline the opportunities for Service Providers and channel partners delivering cloud services, examining topics such as support, managed services, data protection and data sovereignty for facilitating cloud consumption.
Although vSAN provides a means for customers to have block-based storage, many customers still have a requirement for native file services. Join this session to learn about NetApp’s complimentary software solution, which provides file services for a vSAN deployment.
The explosion of cloud-based applications in the enterprise is making IT and security professionals rethink their cloud identity management strategy. By default, every cloud user creates an average of 17 cloud identities. But catering to 17 different user stores per employee or partner is simply not scalable from an administration perspective. And as if IT’s time is not precious enough, password resets account for 20% of helpdesk tickets. This adds to the compliance and security risks associated with cloud-based applications, which by default require only weak static passwords and offer no central point of management across disparate cloud-based services.
Join Stephen Allen, Gemalto Product Manager for Authentication and Access Management, and learn how deploying an Identity Provider enables:
•Cloud Single Sign-On for easy access to cloud apps
•Regulatory compliance with standards such as PCI DSS
•Reduced identity lifecycle overheads
•Centralized management of cloud access policies
•Increased security with step-up authentication
It’s well known that web application attacks are the leading cause of breaches, according to Verizon’s 2017 Data Breach Investigations Report, but have you ever wondered how adversaries conduct their attacks and what methods they use to successfully compromise their web application targets?
Register for this eye-opening webinar presented by Stephen Coty, Chief Security Evangelist at Alert Logic, who will discuss the realities of web application attacks and:
• The global perspective of the current state of web application vulnerabilities
• Understand how reconnaissance is used by attacks to discover and pinpoint systems to compromise
• Attack methodologies and how vulnerable web apps can be leveraged by attackers to gain privileged access
• Remediation strategies to help defend against web apps attacks
If your organization stores, processes and transmits cardholder data, PCI’s big brother - the EU General Data Protection Regulation - could affect your ability to do business in the EU.
Impacted PCI US companies may have EU residents as employees or customers.
The GDPR has become a primary item on most organizations' agenda this past year, yet a disproportionate amount of focus has fallen on the fines that are set to come in force May 25, 2018.
We want to take a more optimistic look at the regulation, why it came to be and how it can be a massive opportunity to strengthen your reputation and (re)gain customer confidence. We will also look at how the implementation and ongoing maintenance of compliance can be addressed through an analytical approach to the Articles themselves; the rules of the regulation.
What attendees will learn:
• How US ecommerce and other companies involved in payment card transactions can be impacted by the GDPR.
• Why the world’s most valuable resource is no longer oil, but data.
• Why the GDPR is far more than a simple check-box compliance exercise.
•Why the GDPR is a massive opportunity in disguise for organizations who take it seriously.
•How the GDPR aims to change company culture by turning risk assessments on their head.
•An analytical breakdown of the GDPR Articles that uncovers those that are applicable to your organization, and how to tackle these through a risk based approach.
•Key areas of focus for any GDPR program based on personal and client feedback.
•How to effectively implement GDPR by expanding upon existing compliance programs and management systems (ISO 27001).
Predictive analytics & artificial intelligence are transforming the way all companies connect with customers. The customer experience is on the verge of being completely redefined with A.I.
In this talk, you will learn what it takes for a business to deliver this new 21st-century customer conversation. Patrick will cover:
- Collecting & Managing CX data - What I learned analyzing 3 billion records at Amazon
- We have the data, now what? AI & the Future of Customer Experience
- How to use Predictive Analytics to find the right customer on the right channel
- 3 ways to drive ROI for your business by applying AI to improve the Customer Experience
Patrick is CEO of Lumidatum which helps CMOs apply artificial intelligence to the customer experience in order to grow revenue. He has been in the data and analytics space for over a decade including running a machine learning and advanced analytics team at Amazon.
The stage-gate process is as ubiquitous in R&D as doors are in the real-world. But, like doors, stage-gate processes aren't always the best solution for filling a gap. They can be overly elaborate (leading to slowness), fixated on pruning rather optimising (leading to negativity), and lacking in flexibility (leading to missed opportunities).
Join our webinar as we explore:
- The shortcomings of the stage-gate process
- Potential alternatives that could drive more efficiency and productivity
This webinar is essential viewing for any innovation leaders who are looking to take their innovation strategy out of its comfort zone and to the next level.
Join the Makeover Monday community for a 60min live webinar to discuss selected data visualizations from this week's submissions.
You can participate in the webinar, ask questions but also submit a viz ahead of time for review (do this on Twitter via the usual process, and include #MMVizReview if you want live feedback).
VIZ REVIEW is our way to provide much more comprehensive feedback for everyone, which is always difficult within the limitations of Twitter.
Find out more about Makeover Monday on www.makeovermonday.co.uk and join the conversation on Twitter by following Andy (@VizWizBI) and Eva (@TriMyData) as well as the #MakeoverMonday community.
Do your employees struggle to access and analyze information that sits across multiple systems? Do they delay completing tasks that require they login to yet another system? Employees are now pushing back against legacy systems – both on-premises and SaaS – and demanding more modern applications to complete their work. Unfortunately, you have spent millions of dollars on software and replacing them is not an option. The question: how do you meet employee expectations for more user-friendly tools without costly upgrades or throwing out your existing systems? Answer: a modern portal.
Sapho’s modern portal surfaces personalized and relevant tasks and data to employees using micro apps. Sapho micro apps are built by IT on top of your existing systems using a simple micro app builder and pre-built templates. These micro apps – available on any device, intranet, or messenger app – provide employees with proactive notifications about interesting system data, actions that need to be completed, and changes in business data that require attention. With Sapho, employees can complete work faster and make better decisions, improving their overall productivity and effectiveness.
In this webinar, we will show you how easy it is to build a modern portal that:
- Connects to your existing systems with pre-built connectors for systems such as SAP, Oracle, Concur, Salesforce, or ServiceNow
- Surfaces event-driven micro apps, that you can build in just 15 minutes to deliver simplified workflows and data access
- Is accessible by employees from any device, intranet, or messenger allowing them to complete actions and review information from anywhere