Hi [[ session.user.profile.firstName ]]

Information Technology

  • Tableau Careers - Tableau the Skill
    Tableau Careers - Tableau the Skill Eva Murray, Andy Kriebel, Edward Beaurain Recorded: Oct 19 2018 45 mins
    Data analysis and visualization skills are in very high demand and rank among the top technical skills companies are looking for right now.

    Hear from Edward Beaurain, Director of Commercial Sales at Tableau, why Tableau skills have become so important in the market place and what the organizations he works with are looking for when they recruit new talent.

    As a final chapter of our Tableau Careers series, Edward will also share how you can join TC18 from anywhere in the world and make the most of the networking opportunities out there so you can land you dream data job.
  • Two is company, is three too many clouds? Keeping the clichés out of multi-cloud
    Two is company, is three too many clouds? Keeping the clichés out of multi-cloud Brad King, Chief Architect and Co-Founder, Scality Recorded: Oct 19 2018 31 mins
    The term multi-cloud has caught on this year, and we’ll be discussing the reasons it could matter a great deal to your business. If you are a cloud user, a company providing services and solutions that use public cloud infrastructure, or currently defining a cloud strategy, we’ll discuss why being able to keep your cloud options open is so important. Scality is working hard to provide tools to help public and private cloud users keep control of their storage, permitting the use of the right cloud for the right job. We’ll be discussing the business implications of multi-cloud storage, the freedom that our Zenko technology allows. We’ll be joined by Nodeweaver who will share why multi-cloud is important to their business.
  • Sécurité des mobiles: quelles sont les stratégies mises en place par vos pairs ?
    Sécurité des mobiles: quelles sont les stratégies mises en place par vos pairs ? Hervé Doreau, Directeur Technique, et Benjamin Ménard, Consultant Avant-Vente Recorded: Oct 19 2018 27 mins
    Les entreprises de toutes tailles doivent faire face aux nouveaux risques liés à l'utilisation grandissante des mobiles et il leur est difficile de définir la meilleure stratégie pour protéger leurs informations sensibles.
    Au travers de cas d'usages concrets, nos experts vous proposent lors de ce webcast d'en savoir plus sur :
    - Pourquoi est-ce si important de sécuriser les appareils mobiles ?
    - Quelles bonnes pratiques de vos pairs pouvez-vous appliquer dans l'adoption d'une stratégie de protection des terminaux ?
    - Quelles sont les fonctionnalités primordiales d'une solution de sécurité des mobiles ?
  • Worry-Free Security on Azure
    Worry-Free Security on Azure Robert Smith & Hubert Ng Recorded: Oct 19 2018 55 mins
    Presenter

    Robert Smith - Higher Education & Research Specialist – APAC - Microsoft

    Hubert Ng – Cloud Engagement Manager – Asia Pacific - Palo Alto Networks

    An exclusive webinar for the education sector

    Businesses are not the only organisations looking to take advantage of the innovation and disruption that moving to the cloud can provide. Schools, colleges and universities across the Asia-Pacific region are moving their data and applications to the cloud.

    Join our webinar on October 19, and learn how to secure your data and apps in Microsoft® Azure®.

    We will be joined by Robert Smith, higher education and research specialist – APAC from Microsoft, and Hubert Ng, cloud engagement manager for Palo Alto Networks, who will share their experience in bringing the advantages of the cloud specifically to organisations like yours.
  • [#1] Big Data im Fokus: Der Data Catalog – Ihre Big Data Schatzkarte
    [#1] Big Data im Fokus: Der Data Catalog – Ihre Big Data Schatzkarte Thomas Bodenmüller-Dodek - Product Expert Big Data & Analytics, Informatica Recorded: Oct 19 2018 35 mins
    „You can´t use it, if you can´t find it” – Heutzutage werden in Unternehmen mehr Daten denn je gesammelt, gespeichert und genutzt. Studien und Umfragen zeigen jedoch, dass lieber gesammelt als genutzt wird.
    Woran liegt das? Eine Ursache hierfür ist, dass Unternehmen gar nicht wissen, welche Daten gesammelt werden, wo sie gespeichert werden und wie diese genutzt werden können. Es fehlt an Transparenz und Struktur.
    In unserem 45-minütigen Webinar möchten wir Ihnen anhand einiger Praxisbeispiele zeigen, wie Sie mit einem Data Catalog Informationen über alle Datentöpfe hinweg zentral zur Verfügung stellen können. Erfahren Sie, wie unsere Kunden davon profitieren und welche Herausforderungen mit einem Data Catalog gemeistert werden können.
  • SUSE und Empalis: Höchstleistung für Ihre Storage-Umgebung
    SUSE und Empalis: Höchstleistung für Ihre Storage-Umgebung Thomas Grätz, SUSE Linux GmbH & Markus Stumpf, Empalis Consulting GmbH Recorded: Oct 19 2018 54 mins
    Sie haben eine dynamisch wachsende Storage-Umgebung? Sie stehen bei Backup, Desaster Recovery und Archivierung aktuell vor großen Herausforderungen? Sie suchen nach einer zukunftsfähigen Backup-Lösung, die entsprechend Ihrer Anforderungen skalierbar ist? Dann sollten Sie an unserem Webcast teilnehmen!

    Gemeinsam mit Empalis zeigen wir Ihnen, wie Sie mit Hilfe von SUSE Enterprise Storage Ihre TSM / Spectrum Protect Storage Umgebung optimieren und dabei die Grenzen traditioneller Systeme (mangelnde Skalierbarkeit, hohe Kosten, keine Cloudfähigkeit) umgehen. Die intelligente, softwaredefinierte Storage- Lösung auf Basis von Ceph-Technologie ermöglicht Ihnen die Transformation der Storage Infrastruktur Ihres Unternehmens, um Kosten zu senken und unbegrenzte Skalierbarkeit bereitzustellen.
  • Pure 1 - innovativster Support & Monitoring
    Pure 1 - innovativster Support & Monitoring Stilianos Spanidis, Systems Engineer Commercial bei Pure Storage Recorded: Oct 19 2018 59 mins
    Mit dem Einsatz von künstlicher Intelligenz können Fehler behoben werden bevor sie auftreten.
  • Chmura jako archiwum – kiedy, dlaczego, za ile?
    Chmura jako archiwum – kiedy, dlaczego, za ile? Daniel Olkowski Recorded: Oct 19 2018 62 mins
    Czy chmura może być archiwum?
    Co zyskujemy a co tracimy?
    Czy jest to konkurencja do ośrodka zapasowego?

    Zapraszam na 30 minutową dyskusję dotyczącą możliwości przechowywania długoterminowych kopii zapasowych w chmurze.
    Porozmawiamy o możliwościach, technologiach i oczywiście cenach.

    Piątek, 19.09, 10:00, 30 minut.

    Zapraszam na poranną kawę!

    Do zobaczenia…
    Daniel Olkowski
  • The Downsides and Dangers of Cryptocurrency Mining
    The Downsides and Dangers of Cryptocurrency Mining Magni Sigurdsson, Senior Threat Researcher, CYREN Recorded: Oct 19 2018 48 mins
    Browser-based mining for cryptocurrency is up 725% globally since the debut of Coinhive. The rapid spread of "cryptojacking" is grabbing headlines and driving discussion about this new "business model" for websites, but the problems and risks posed by cryptomining run deeper than just non-consensual use of a small bit of CPU power.

    What You Will Learn
    - The different types of cryptominers and why they are an issue for IT security
    - The top 5 security risks and downsides associated with cryptomining
    - How cryptomining scripts and malware is being distributed
    - The recent history of cryptomining and likely future trends
    - Best practices from a security perspective with respect to cryptocurrency mining
  • Worry-Free Security on Azure
    Worry-Free Security on Azure Robert Smith & Hubert Ng Recorded: Oct 19 2018 54 mins
    Presenter

    Robert Smith - Higher Education & Research Specialist – APAC - Microsoft

    Hubert Ng – Cloud Engagement Manager – Asia Pacific - Palo Alto Networks

    An exclusive webinar for the education sector

    Businesses are not the only organisations looking to take advantage of the innovation and disruption that moving to the cloud can provide. Schools, colleges and universities across the Asia-Pacific region are moving their data and applications to the cloud.

    Join our webinar on October 19, and learn how to secure your data and apps in Microsoft® Azure®.

    We will be joined by Robert Smith, higher education and research specialist – APAC from Microsoft, and Hubert Ng, cloud engagement manager for Palo Alto Networks, who will share their experience in bringing the advantages of the cloud specifically to organisations like yours.
  • Career Conversations w/ Kristen Judge, Cybercrime Support Network
    Career Conversations w/ Kristen Judge, Cybercrime Support Network Jessica Gulick, MBA | PMP | CISSP Recorded: Oct 18 2018 46 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Guest: Kristin Judge, Author at LinkedIn Learning

    Kristin was elected to serve as a Washtenaw County Commissioner in 2008 and supported the U.S. Department of Homeland Security in growing cybersecurity outreach to state and local government officials. After elected office, she worked at the Center for Internet Security, focusing on connecting state and local governments to federal services and technology needed to improve cyber security.

    As Director of Government Affairs at the National Cyber Security Alliance (NCSA), Kristin worked with Google, FTC, FBI, SBA, DHS, NIST, congressional leaders and other key stakeholders across the country to educate consumers and businesses how to protect sensitive data.

    As a thought leader, Kristin has been seen on the C-SPAN Network, local news outlets and called on by technology publications like SC Magazine and Government Technology to share best practices for online safety; being named an SC Media “Women in IT Security Influencer” in 2017.

    In 2017, Kristin was chosen for the 3rd cohort in the Presidential Leadership Scholars program which is a partnership between the presidential centers of George W. Bush, William J. Clinton, George H.W. Bush, and Lyndon B. Johnson to bring together a select group of leaders who share a desire to create positive change across our Nation.

    To address the needs of cybercrime victims, Kristin recently founded the nonprofit Cybercrime Support Network to connect victims with federal, state and local resources in a coordinated manner.
  • Transform ServiceNow Data into Business Insights
    Transform ServiceNow Data into Business Insights Arjen Pront (Analytics & Reporting Program Director, ServiceNow), Dan Kane (Analytics Solution Advisor, ServiceNow) Recorded: Oct 18 2018 61 mins
    ServiceNow Performance Analytics brings the power of data to stakeholders and subject matter experts at all levels of your business – delivering actionable insights where they can make the most impact. It can help your organization make better decisions, improve business services, and help align with your organization’s goals.

    But how do you get started on this journey? How can you optimize business processes and deliver outcomes, such as 10% reduction in IT spend?

    We will provide you with the resources you need to get started with Performance Analytics and drive adoption within your organization.

    By listening to this webinar, you’ll learn:

    •The importance of trusted data to drive business decisions
    •How to align stakeholders with overall company goals
    •How to drive adoption of Performance Analytics
  • FireEye Cyber Resilience Virtual Summit
    FireEye Cyber Resilience Virtual Summit Vasu Jakkal, Executive Vice President and Chief Marketing Officer, FireEye Recorded: Oct 18 2018 5 mins
    Executive Vice President and Chief Marketing Officer, Vasu Jakkal, shares what you can expect over the next three days of the Cyber Resilience Virtual Summit. Learn why the intelligence-led approach matters and what you need to know to prepare, defend and protect your organization from a breach.

    Register now: https://fireeye.brighttalk.com/summit/4444-cyber-resilience/
  • Modernizing How HR Work Gets Done for a Better Employee Experience at Whirlpool
    Modernizing How HR Work Gets Done for a Better Employee Experience at Whirlpool Lawrence Krajewski, Carolyn Bradfield, Mike Vilimek Recorded: Oct 18 2018 58 mins
    The journeyfrom manual processes to modern experiencesJoin HR Director of NAR Operations Carolyn Bradfield,and HR Project Manager LorenKrajewski as they share what it took to truly transform Whirlpool’s employee experience. You’ll learn how they were ableto successfully:•Eliminatelegacy HR technologyto meet the needs ofanever-changing workforce•Deliveron their strategic HR Excellence initiative•Gainvisibility into the volume and types of employee inquiries and requests•Providea consistent employeeservice experience with HRacross the globe•Usechat to help drive digital change and improve their service levels
  • Cassandra, Spark, Kafka: The Benefits of the Managed Platform
    Cassandra, Spark, Kafka: The Benefits of the Managed Platform Ben Slater, Chief Product Officer, Instaclustr Recorded: Oct 18 2018 49 mins
    Instaclustr’s Managed Platform simplifies and accelerates the delivery of reliability at scale through open source solutions. By providing Apache Cassandra, Apache Kafka, Elasticsearch, Apache Spark and other leading open source technologies through single environment, Instaclustr make it easy to deliver applications at any scale and, most importantly, operate them at the highest levels of reliability. Instaclustr provides the benefits of open source without the risk and costs of learning to manage it yourself.

    This webinar will
    - walk through the key features of Instaclustr’s platform and offering;
    - illustrate specific features and value-adds for each of the open source technologies offered; and
    - provide insight into Instaclustr’s product roadmap for future enhancements.
  • Her View on Finding Funding
    Her View on Finding Funding Jessica Gulick, CEO of Katzcy & Gail Ball, Managing Partner of Chestnut Street Ventures Recorded: Oct 18 2018 30 mins
    As a woman entrepreneur, you know firsthand how challenging it can be to get venture funding. Finding the right investors and other sources of capital to get your idea off the ground can be difficult. There are ways to get the funding you need to get your business moving! Please join Jessica Gulick, Owner of Katzcy Consulting, and Gail Ball, Managing Partner of Chestnut Street Ventures, as they share how to navigate the funding challenge and match investors to the needs of your growing technology firm. This 30-minute webinar gives you keen insight and tactics to gain capital, increase funding success and launch your business.
  • Modernizing HR and the New Hire Onboarding Experience at ServiceNow
    Modernizing HR and the New Hire Onboarding Experience at ServiceNow Jefferey Gore, Danielle Lulley Recorded: Oct 18 2018 57 mins
    Like many organizations, ServiceNow began its employee onboarding journey with a myriad of custom and point HR solutions that resulted in broken cross-departmental processes, lack of personalization, frustrating upgrades, and an inflexible model that could no longer scale. For us to create the workplace of the future we needed to go on our own HR Transformation journey and re-design the New Hire Onboarding experience to support our rapid growth and today’s consumer-driven workforce.

    In this webinar, you’ll learn how we’re “drinking our own champagne” by successfully replacing our legacy onboarding application with ServiceNow’s out-of-the-box Enterprise Onboarding and Transitions solution. Discover how ServiceNow is building the workplace of the future by making it easy for employees to get the services they need.

    The key learnings will include:

    Best practices of successfully implementing a new enterprise onboarding solution
    How to accelerate the time to provision IT resources for new hires by 94%
    How HR is saving 4,000 hours annually by automating onboarding activities
    Using real-time dashboards to monitor onboarding activities and continuously improve service delivery
  • A Truly Hybrid Cloud: Where Business Drives Technology
    A Truly Hybrid Cloud: Where Business Drives Technology Mark Vaughn, Director, Strategic Technology Group, Presidio Recorded: Oct 18 2018 45 mins
    Many hybrid cloud technologies are designed to allow different private cloud and public cloud technologies communicate with each other, while leaving the actual workloads in proprietary formats that are not portable.

    With Hybrid Cloud offerings like VMware Cloud on AWS, existing VMware environments can be extended to the cloud and create a truly hybrid model that allows workloads to easily move to where the business needs them.

    Mark Vaughn, Director of the Strategic Technology group at Presidio, will share his insights and expertise during this engaging talk.
  • Secure Active Directory in 4 Steps
    Secure Active Directory in 4 Steps David Philpotts Recorded: Oct 18 2018 36 mins
    Attend this session and you’ll learn 4 tried-and-true steps you can take to secure your Active Directory and learn how to spot & fix AD misconfigurations, identify, prevent, and investigate advanced AD attacks.
  • Cloud Transformation Demystified
    Cloud Transformation Demystified Jacqueline Touma & Chaitra Vedullapalli Recorded: Oct 18 2018 53 mins
    Cloud Transformation has gained greater traction in the recent years. However, to propel your business to achieve the cloud profitability that you deserve, there are three core concepts that need to be understood.

    Opportunity, Knowledge, and Actions

    It works like this:

    1. Your business realizes that there’s an opportunity to solve a problem or add value to the lives of many customers and make a recurring revenue from it.
    2. You and your team acquire the knowledge that you need to take advantage of the cloud opportunity.
    3. You and your team will execute actions based on the knowledge obtained, and your profit will be directly proportionate to how many customers you empower with Cloud technologies.

    In this webinar, we will share the secret formula for you to lead the transformation:
    1. Establishing cloud transformation principles
    2. How to develop a strategic business case & roadmap
    3. Get access to best practices & Case Studies
    4. Learn about our special offer to get you started at (no cost)
    5. Learn how to assess Cloud Hyperscalers such as Microsoft, AWS, Google in the market

    Join us in making you and your business cloud ready company. We look forward to collaborating with you.
  • NoSQL As-A-Service in the Cloud Using Containers and Kubernetes
    NoSQL As-A-Service in the Cloud Using Containers and Kubernetes Mike Wiederhold, Sr. Engineering Manager - Cloud, Tools, & UI Recorded: Oct 18 2018 38 mins
    The unique and powerful architecture of NoSQL can provide unparalleled performance at any scale for cloud and container-based environments - even across multiple datacenters operated by different cloud vendors. In this webinar, Mike Wiederhold, Sr. Manager Engineering-Cloud, Tools & UI, will explain how you can run Couchbase NoSQL as-a-service in the cloud which includes unique Multi-Dimensional Scaling, in-memory performance, and flexible JSON document store, all of which make Couchbase ideal for modern containerized mission-critical applications.

    Mike will also show you how to deploy a Couchbase cluster in OpenShift with a Couchbase operator, and how to manage Couchbase’s high availability and resiliency in a distributed system while running on the Red Hat OpenShift Container Platform including a live demo where he will create a Couchbase cluster on Red Hat OpenShift Container Platform.
  • Case Study: Ironclad Messaging & Secure App Dev for Regulated Industries
    Case Study: Ironclad Messaging & Secure App Dev for Regulated Industries Avi Elkoni (COO/CTO, Vaporstream), Kristi Perdue Hinkle (Vaporstream), & Brian Reed (NowSecure) Recorded: Oct 18 2018 55 mins
    Enterprise-grade ephemeral messaging provider Vaporstream knows firsthand that security needs to be built into the software development lifecycle rather than bolted on. Serving highly regulated industries such as federal government, energy, financial services and healthcare, Vaporstream’s leakproof communication platform provides the highest level of assurance that compliance professionals require. Vaporstream partners with NowSecure to test and certify its Android and iOS mobile messaging apps.

    Join us for this case study webinar to learn how Vaporstream adheres to a rigorous secure app lifecycle in order to meet customer expectations for secure communications:
    + Designing a secure app architecture & development process
    + Incorporating security testing into the release cycle
    + Comprehensive penetration testing
  • Enterprise-Wide Kubernetes: Episode 2 - Security
    Enterprise-Wide Kubernetes: Episode 2 - Security Patrick Maddox and Jim Bugwadia Recorded: Oct 18 2018 54 mins
    Kubernetes has become the multi-cloud OS for enterprises. In this series, we will look at what makes up an enterprise-grade Kubernetes stack, and the key tradeoffs for each component.

    In this episode, we will take a close look at end-to-end security for Kubernetes. Here are some of the key questions that we will discuss:

    1. What are the top 5 things I need to do to secure my cluster?
    2. What do I need to consider for securing applications deployed in the Kubernetes cluster?
    3. How do you recommend customers evaluate and compare the security solutions in the CNCF ecosystem?


    Presenters:

    Patrick Maddox, Senior Director, Solution Architecture at Twistlock
    Jim Bugwadia, CEO at Nirmata
  • FireEye Global Threat Response – How we Protect the World
    FireEye Global Threat Response – How we Protect the World Tim Wellsmore, Director, Government Security Programs, Mandiant International, a FireEye Company Oct 22 2018 2:00 am UTC 75 mins
    Most approaches to the global cyber security problem are usually focused locally inside separate organisations, who struggle to look out across the global landscape and effectively respond. National responses from government capabilities can be challenged by capacity and jurisdiction to truly understand the global threat environment, and to effectively respond. This presentation will highlight how FireEye utilises its various capabilities and threat focused teams from all parts of the business to build a cohesive global detection and response capability for the biggest global threats.

    This presentation will outline how we tactically respond within our internal capability teams, and across our customer base of 67 countries and how we keep the media, our customers and our government partners informed on the latest information. How we scale quickly to respond to WannaCry or NotPetya to ensure our Community Protection mandate is relentless maintained is an impressive story. This presentation will highlight how our FireEye technology arm and FireEye's subsidiary companies of Mandiant and iSight work seamlessly together in a global cyber threat event to bring our best against the world's most advanced cyber threat actors.
  • What Executives Should Know about Cyber AI
    What Executives Should Know about Cyber AI Claudio Scarabello Director Product, APAC FireEye Inc Oct 22 2018 6:00 am UTC 60 mins
    Artificial intelligence (AI) is a transformative technology that provides organizations with better cyber defense tools but also helps adversaries improve methods of attack. Organizations need to understand how AI will impact cyber security before they rely on it for their defenses.
    Watch this webinar as we discuss:
    • How AI tools can be used for offensive and defensive purposes in the cyber domain
    • Changing geopolitical landscape as threat actors develop and implement AI capabilities
    • Enhancement of a businesses’ defensive capabilities through AI technology
    • How FireEye uses machine learning to bolster its internal defenses and tools
  • Symantec CASB - Cloud Access Security Broker (CASB) - CLOUD SECURITY
    Symantec CASB - Cloud Access Security Broker (CASB) - CLOUD SECURITY Martin Krömer, Regional Director CEEUR Cloud Security, Symantec (Deutschland) GmbH Oct 22 2018 9:00 am UTC 75 mins
    Nutzen Sie Cloud-Anwendungen und -Services auf sichere Weise, während Ihr Unternehmen dabei sicher, geschützt und richtlinienkonform bleibt.
    Erhalten Sie Einblick in die Schatten-IT, Kontrolle über Ihre Daten in Cloud-Anwendungen sowie Schutz vor Bedrohungen, die auf Cloud-Benutzerkonten abzielen – mit der Lösung, die Forrester als "Leader" im Bereich Cloud Security Gateways bezeichnet.
  • Your breach readiness master plan: take the sting out of a cyber attack
    Your breach readiness master plan: take the sting out of a cyber attack Judith Moore, Director & Partner, FleishmanHillard Fishburn; Mark Deem, Partner, Cooley; Mike Trevett, UKI Director, Mandiant Oct 22 2018 10:00 am UTC 60 mins
    With numerous market-leading companies making negative data breach headlines this year, and attackers constantly evolving their techniques, tactics and procedures, it seems there’s no longer a case of ‘if’ an organisation will be breached, but instead ‘when’.

    “Do you know how your team will respond to and remediate a cyber-attack?”, is an increasingly pertinent question that all C-suite leaders should be able to answer—and more importantly, have a role in finding that answer to ensure their organisation’s cyber-security posture and incident response (IR) plan is built for success.

    Join and contribute to the conversation as Judith Moore, Director & Partner, Corporate and Crisis at FleishmanHillard Fishburn, Mark Deem, Partner at Cooley LLP and Mike Trevett, UKI Director at Mandiant discuss:

    •How to identify security maturity improvement areas before, during and after a breach
    •Why constantly-evolving threats require organisations to periodically revisit their crisis communication plans
    •What actions organisations should take to ensure they can effectively protect their reputation in the event of a breach
    •Which key strategic communication tactics should be considered when reporting a breach
  • Cyber Security in Today's IoT World
    Cyber Security in Today's IoT World Parnian Najafi Borazjani, Senior Analyst, FireEye Oct 22 2018 11:00 am UTC 45 mins
    IoT devices have become a mainstream part of our lives. IoT devices are no longer just consumer devices, rather they are interwoven in different parts of corporations.

    The August 2016 Mirai botnet attack has shown that security in IoT is required to have overall security. The lack of security in IoT devices not only affects users, but also affects the society in a larger scale. Manufactures of these devices need to follow a set of guidelines to ensure secure developments and deployments.
    Moreover, device consumers such as corporations should be aware of their attack surface.

    Join us for a live webinar as we address the top security and privacy issues in IoT devices, the threats that are targeting them and recommendations for possible solutions.
  • Cloud Security: The next generation
    Cloud Security: The next generation Chris Hill, RVP, Public Cloud EMEA; Alex Hilton, Chief Executive, Cloud Industry Forum Oct 22 2018 2:00 pm UTC 60 mins
    Multi-Cloud or hybrid environments has become a growing strategy for many organisations moving their applications and data in the cloud as it gives organisations the ability to be flexible in what they need for their business. In fact, according to recent research by Computing, 26 per cent of enterprises surveyed were using a multi-cloud approach compared with 22 per cent last year. However, along with this approach one thing organisations should not forget is that the need for security does not diminish. As the cloud continues to offer more in services, organisations need to be aware of the protection they are responsible for to ensure their applications and workloads are safe.

    So how do organisations stay ahead of the curve with security as well as being able to manage these multi-cloud or hybrid environments?

    Join our latest webinar where, Chris Hill, VP Public Cloud EMEA at Barracuda, and Alex Hilton, Chief Executive and Cloud Industry Forum (CIF)will discuss the latest challenges when it comes to migrating to the cloud, especially in a multi-cloud environment as well as analyse CIFs latest research findings on what organisations need to consider when adopting these cloud services.
  • Introduction to React Native and GraphQL for App Development: Part 1
    Introduction to React Native and GraphQL for App Development: Part 1 Nicola Zaghini - Solution Architect | Senior Software Engineer, Phorest Salon Software Oct 22 2018 3:00 pm UTC 60 mins
    The objective of the workshop is to provide basic understanding of the React Native framework and the React designs principles by building a Native App for iOS and Android platform.

    Additionally, the GraphQL query language will be presented and used during the workshop as a strategic companion for frontend development and a perfect match for React design.

    By the end of the workshop, attendees will be capable of understanding the technologies involved and proactively progress in their learning journey.

    Who is it for?
    Developers of all levels interested in mobile application development with very little or no knowledge of React Native and GraphQL technologies.

    The workshop is provided in 3 sessions of 1h each.
    - In the first session we will focus on React and React Native principles, code organisations and useful tips and tricks.
    - In the second session an app will be produced using React Native, running on both iOS and Android.
    - In the third and final session we will focus on GraphQL and its integration with the previously built React Native App.

    Main topics:
    - Core principles of React and React Native
    - How to organise a React Native project
    - Core principles of GraphQL
    - How to query GraphQL from React Native

    Technologies involved.
    - React
    - React Native
    - TypeScript and Javascript
    - GraphQL
    - Apollo for GraphQL

    Pre-requisites.
    In order to follow the workshop with your computer a software stack should be installed. Details will be provided.
  • Closing the Backdoor with Endpoint Security
    Closing the Backdoor with Endpoint Security Brook Chelmo, Senior Product Marketing Manager, SonicWall Migo Kedem, Senior Director of Products & Marketing SentinelOne Oct 22 2018 3:00 pm UTC 60 mins
    Threat actors leverage malware to create backdoors into systems for a few key reasons. These forms of malware, even when they fail, can create serious vulnerabilities in systems.

    This webcast will cover the threat landscape and discuss new types of attacks. Come for the news but stay for a live hacking demonstration that will install a backdoor on an unprotected endpoint and later, an attempt on a protected one.

    In this webcast you’ll learn:

    •The current threat landscape
    •What backdoors are
    •How to stop backdoors like Calisto
    •How to roll back the damage of an attack like ransomware
  • Getting Identity Management Right
    Getting Identity Management Right Neil Chapman (ForgeRock), Regina Yulo (BrightTALK) Oct 22 2018 3:30 pm UTC 30 mins
    Finding the right balance between security and risk is a tough one to manage. Banks and financial services organisations face larger challenges because of their complex legacy systems and the amount of sensitive data they have to deal with.

    Join this session where our identity expert will discuss:
    -What are the key challenges we see in the industry adopting and adapting the technology?
    -How can businesses know when they have got identity management right?
    -What are the barriers to making this happen?
    -How will IoT and AI change how we think about, and manage, identity?
    -How can we make identity an enabler of, rather than a barrier to, innovation?
    -How is Open Banking and PSD2 affecting and impacting the wider industry?
  • The Latest Innovations in Informatica MDM and MDM Customer 360 v10.3
    The Latest Innovations in Informatica MDM and MDM Customer 360 v10.3 Oliver Soans, Principal Product Manager, MDM Solutions, Informatica Oct 22 2018 4:00 pm UTC 60 mins
    As an enduring leader in master data management, Informatica continues to innovate, anticipate market needs, deliver new functionality and enhancements to organizations of all sizes. The newest capabilities delivered in Multidomain MDM 10.3 and MDM – Customer 360 10.3 make it easier for the business user to manage, curate, and consume master data. This includes:
    •Configurable, secure and feature-rich user interfaces for managing master data
    •Improved search and query experiences, more workflow configuration options, and new capabilities to support compliance use cases
    •Improved business user interface to make it easier to work with different mastered domains, hierarchies, and stewardship
    •Increased efficiency for data stewards through ad hoc match, wizard-driven reports and charts, and more

    Join Oliver Soans, Principal Product Manager, MDM Solutions to learn how Informatica is simplifying the complex art of master data management to deliver business value faster. You will also see a demo of the product.
  • Off-Network: The New Security Normal
    Off-Network: The New Security Normal Christina Ayiotis, Cyber Strategy Consultant Oct 22 2018 5:00 pm UTC 51 mins
    Long gone are the days when Security Professionals could protect their actual network and not have to worry about organization, employee, student or customer information being at risk. In today's always-connected world, much happens beyond the network (especially in the cloud) and the concept of perimeter security has all but evaporated.

    Wherever Users are - the office, the classroom, traveling, or working from home - organizations need to enable security so Users can easily and safely to do their jobs. Users want to be able to just "connect" and work-- oblivious to the dangers out there. Moving security "behind the scenes" means needing to be more predictive about how attacks will happen and engaging early in the attack cycle. DNS-layer security is an important component piece of an overall security strategy that aims to stop attacks before they cause irreparable harm. Watch this webcast to learn more.
  • Cloud Strategy & Improving Your Enterprise Security Posture in 2019
    Cloud Strategy & Improving Your Enterprise Security Posture in 2019 Sushila Nair (NTT DATA Services) | Yonatan Klein (AlgoSec) | Diana Kelley (Microsoft) Oct 22 2018 5:00 pm UTC 60 mins
    This keynote panel is part of Cloud Month on BrightTALK.

    Join this keynote panel of security and cloud experts as they discuss:
    - The most prevalent security risks and challenges and how to contend with them
    - Your cloud strategy and how it affects your overall security posture
    - How to extend network security to the cloud
    - Areas for automation
    - Best practices on how to secure your enterprise in 2019

    Speakers:
    - Sushila Nair Sr. Director Security Portfolio, NTT DATA Services
    - Diana Kelley, Cybersecurity Field CTO, Microsoft
    - Yonatan Klein, Director of Product, Algosec
  • Outsmart Hackers by Coordinating Your Defenses
    Outsmart Hackers by Coordinating Your Defenses Greg Bennett, Engineer, Sophos Oct 22 2018 6:00 pm UTC 45 mins
    Smart hackers coordinate their attacks across your system. Now, you can learn how to outsmart the hackers by coordinating your defenses!

    Synchronized Security is a best-of-breed security system that enables security solutions to talk to each other, sharing information and responding automatically to threats.

    For example, if the endpoint detects a threat, the firewall automatically isolates the infected computer and then the cleanup kicks right in to finish the job.

    Join us for this engaging webinar to learn more about this new approach to IT security. You’ll find out how Synchronized Security:

    • Gives you unprecedented protection against advanced threats

    • Slashes incident response time by 99.9%

    • Saves IT time and effort every day