Hi [[ session.user.profile.firstName ]]

Information Technology

  • Vea la experiencia de su usuario en una nueva dimensión.
    Vea la experiencia de su usuario en una nueva dimensión. Adriana Ríos Recorded: Oct 20 2017 49 mins
    Facilite la gestión automatizada de los servicios y proporcione un soporte ágil en la entrega, con base en las expectativas modernas de analistas, usuarios y clientes de negocio.
    Participe de este webcast y entienda cuál es el camino que estamos emprendiendo con los nuevos cambios.
    Descubra aquí cómo mejorar la productividad de la fuerza de trabajo, controlar los costos y acompañar el crecimiento del negocio.
  • Today’s Predictions for Tomorrow’s Connected World
    Today’s Predictions for Tomorrow’s Connected World Kevin Haley, Director of Product Management for Symantec Security Technology & Response Recorded: Oct 20 2017 32 mins
    In the new world of IoT, smart cities, smart cars and home, our personal devices are more connected than ever before. Learn about predicting the future by looking at the past with insights on how to improve the world of IoT that is coming into our homes.
  • Security Operations Center (SOC): Aufbau eines SOC oder SOC als Service
    Security Operations Center (SOC): Aufbau eines SOC oder SOC als Service Patrick Kuttruff Recorded: Oct 20 2017 52 mins
    Wer sich mit der Frage beschäftigt, wie man ein effektives und effizientes Security Operations Center (SOC) aufbauen sollte, steht vor einer großen Herausforderung, denn neben den Investitionen der physischen Sicherheitsmaßnahmen, Hard- und Software ist besonderes Augenmerk auf die Analysten zu setzen, die hochkonzentriert – einem Mitarbeiter der Flugüberwachung ähnlich – das Geschehen beobachten und auf den „Ernstfall“ eines Angriffs vorbereitet sind.
    Diese Mitarbeiter befinden sich persönlich als auch technisch kontinuierlich im "Alarmzustand", denn jede Anomalie ist für geübte IT-Sicherheitsspezialisten bereits eine potenzielle Cyberbedrohung, die es zu analysieren und abzuwehren gilt. Damit ein SOC wirksam sein kann, bedarf es eines soliden Fundaments aus:
    • Schlanke Prozessabläufe und eindeutig festgelegte und vernünftige Befugnisse der Beteiligten
    • Hocheffiziente und moderne Technologien und Technologiepartnerschaften mit eingespielten Eskalationsstufen
    • Hochmotivierte und vertrauensvolle Mitarbeiter und vertraute Partner, die in Engpässen das eigene SOC Team unterstützen können

    In diesem Seminar zum Thema SOC, wird der SOC grundlegend erläutert und diese Grundsäulen eines schlanken SOC beschrieben. Außerdem gibt das Webinar einen Ausblick darauf, was auf die Unternehmen zukommt und welche Herausforderungen die einzelnen (n>1) Phasen begleiten und welche Services man outsourcen kann.
  • Career Conversations with Women in Cyber Security featuring Leslie Taylor
    Career Conversations with Women in Cyber Security featuring Leslie Taylor Leslie Taylor from ICF International and Jessica Gulick from WSC Recorded: Oct 19 2017 55 mins
    Join us at our next Career Conversations with Women in Cyber Security session. This webinar gives WSC members the opportunity to connect with female career professionals. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Featured Guest: Leslie Taylor, Recruiter Lead for ICF International
    Jessica Gulick, VP of the Women's Society of Cyberjutsu board will moderate discussions.

    About the Speaker:
    Leslie Taylor is the Recruiting Lead at ICF and Recruiting lead for their Enterprise Cyber Security Division. She is a member of Leadership Fairfax and has a master’s degree in Human Resources. She has spoken at numerous Cyber and Recruiting conferences to include Cyber Montgomery, CyberMD, and numerous Recruiting events. Leslie Taylor has more than 15 years of experience in IT, cleared, cybersecurity and military recruiting. She is an active member in several professional associations and leverages participation in a variety of IT/cyber, university/college, association and military career fairs and networking events. Leslie primarily recruits for opportunities on a national scale. She plays an integral role in recruiting for a wide range of skills and talent to include Software Developers, Network Analysts, Programmers, Cyber Specialists, Homeland Security, Emergency Management and Program Managers that provide the following services to our clients.
  • Simplifying Data Integration for the Cloud
    Simplifying Data Integration for the Cloud Jill Reber, CEO, JayJay Zheng, Technical Director & Eric Greenfeder, Chief Architect, Primitive Logic Recorded: Oct 19 2017 54 mins
    The rapid adoption of enterprise cloud-based solutions brings data integration as one of the greatest challenges. The challenge grows on increasingly numerous SaaS applications with lack of suitable connectors that fit your business needs. Join this webinar led by Primitive Logic team to see how data integration can be simplified for your cloud. This talk introduces the generic declarative zero-coding approach using Informatica Cloud Rest Connector as an example and illustrates its practical features, as well as best practices and hidden gems.

    Moderator: Jill Reber, CEO, Primitive Logic
    Panelists: JayJay Zheng, Technical Director & Eric Greenfeder, Chief Architect, Primitive Logic
  • The TEK Center: Real World Testing for Real World Applications
    The TEK Center: Real World Testing for Real World Applications The TEK Center Recorded: Oct 19 2017 5 mins
    At Berk-Tek, we put the customer at the heart of everything we do. This statement stands true in the TEK Center’s research and development labs. A network is only as strong as the cables used to connect it and the applications lab works to ensure that every Berk-Tek cable performs beyond your expectations. By employing industry-leading research, advanced testing procedures and sophisticated modeling for emerging technologies, the applications lab translates expanding network requirements into leading edge cabling solutions that perform beyond the standard.
  • DevOps at Scale: Using AWS & PagerDuty to Improve Growth & Incident Resolution
    DevOps at Scale: Using AWS & PagerDuty to Improve Growth & Incident Resolution Thomas Robinson, Solutions Architect, AWS & Eric Sigler, Head of DevOps, PagerDuty; Christopher Hoey, SRE, Datadog Recorded: Oct 19 2017 39 mins
    Meeting the demands of everchanging IT management and security requirements means evolving both how you respond to and resolve incidents. It’s critical for organizations to adopt a scalable DevOps solution that integrates with their current monitoring systems to enable collaboration across development and operations teams, reducing the mean time to resolution.

    PagerDuty works with AWS services like Amazon CloudWatch, to provide rapid incident response with rich, contextual details that allow you to analyze trends and monitor the performance of your applications and AWS environment.
  • How Browser Security Indicators Can Protect You from Phishing
    How Browser Security Indicators Can Protect You from Phishing Chris Bailey, VP Strategy & Business Development, and Kirk Hall, Director of Policy & Compliance Recorded: Oct 19 2017 56 mins
    The move to requiring encryption on all websites is picking up speed, with browsers starting to show UI warnings for unencrypted websites. Roughly 60% of internet page loads already "https", and the number of sites switching to encryption grows every month. This trend is helped by the availability of anonymous, free Domain Validated (DV) SSL certificates from several Certification Authorities (CAs), which include no identity information about the website owner.

    While increased encryption is good for connection security and combating “man-in-the-middle” (MITM) attacks, many phishing and malware fraudsters are using DV certificates to imitate login pages for top sites such as PayPal.com, banking sites, etc. and steal user information. Unfortunately, these fake DV login pages receive a favorable green padlock “Secure” security indicator in the Chrome UI, causing some users to believe Chrome is vouching for the phishing website as safe or trustworthy.

    Join Entrust Datacard's Chris Bailey and Kirk Hall as they discuss:
    • The difference between DV, OV, and EV
    • The issues with current browser UIs to do with certificate information
    • A proposed new UI security indicator to help users and enhance security
  • Expanding on DataCore’s Vision - Learn What's New at DataCore
    Expanding on DataCore’s Vision - Learn What's New at DataCore Paul Nashawaty, Director of Technical Marketing, DataCore Software Recorded: Oct 19 2017 46 mins
    George Teixeira, our CEO, President and Co-Founder once said:

    “DataCore is committed to creating an enduring and dynamic software-driven architecture liberating data and its productivity from static hardware based limitations.”

    We are expanding on our vision with the new capabilities in the next release of DataCore SANsymphony and Hyperconverged Virtual SAN.

    Join us for this webinar and learn about:

    •DataCore Cloud Replication
    •Container Management
    •Data Resiliency
    •Automation & Enhanced API Integration
  • Keep C.A.L.M. and Integrate DevOps into Azure
    Keep C.A.L.M. and Integrate DevOps into Azure Glenn Mate, Solution Architect, 10th Magnitude & Ryan Lee, Cloud Infrastructure Engineer, 10th Magnitude Recorded: Oct 19 2017 50 mins
    Companies that embrace DevOps in the cloud develop apps faster, reduce overhead and can decrease downtime by 60% or even more. In this webinar, Glenn Mate, Solution Architect at 10th Magnitude & Ryan Lee, Cloud Infrastructure Engineer, 10th Magnitude will share several use cases around how to integrate your DevOps processes into Azure. They will also emphasize CALMS:

    * The framework that integrates the DevOps teams
    * Functions and systems within an organization around culture
    * Automation, lean, metrics, and sharing.

    By distilling the philosophy behind DevOps in the cloud, you’ll find automation and optimization at the core.
  • Transitioning Load Balancing to the Cloud
    Transitioning Load Balancing to the Cloud Ethan Banks, Co-Founder, Packet Pushers, Chiradeep Vittal, Distinguished Engineer, Citrix & Derek Yee, Sr. Product Mgr,Citrix Recorded: Oct 19 2017 66 mins
    ADCs have largely become commoditized, and the services they provide are fairly indistinguishable from the sea of competitors on the market today. With many data center architects faced with modernizing their infrastructure, what are the considerations when transitioning applications to new automation frameworks and topologies in the cloud?

    This webinar will focus on key challenges faced by the enterprise when transitioning their load balancers to the cloud.

    What you will learn:

    •The shift to cloud native, software and service-based offerings
    •Support for new application architectures
    •Operational complexities and scale at production
    •Flexibility and support for hybrid topologies in transition
  • Webinar Part II: Changes to SBA's Environmental Guidelines
    Webinar Part II: Changes to SBA's Environmental Guidelines James Haberlen Recorded: Oct 19 2017 31 mins
    The updated SOP was released by the SBA last Friday.

    EDR is pleased to host Part II of last week’s webcast where we’ll focus exclusively on changes to the environmental guidelines. This 20-minute webinar is a must attend for anyone originating SBA 504 or 7a loans.
    Version J of SOP 50 10 5 represents the agency’s first update to its environmental guidance since 2014 (when it adopted the revised ASTM Phase I E 1527 standard). EDR’s James Haberlen will provide a timely update on what this round of changes mean to the environmental due diligence required on any loans seeking the SBA’s approval.
  • Analytics 101 Part 2: Data Exploration & Predictive Modeling
    Analytics 101 Part 2: Data Exploration & Predictive Modeling Molly Jones, SAS Systems Engineer & Jen Lampert, SAS Solutions Architect Recorded: Oct 19 2017 55 mins
    In this webinar, we dive deeper into analytics and talk about the advantages of data exploration and predictive modeling. We’ll also show attendees how to fine-tune the accuracy and precision of those analytic models so you can make critical decisions with confidence.
  • How to Make Network Analytics Useful for the Whole Business
    How to Make Network Analytics Useful for the Whole Business Kentik Co-founder & CEO Avi Freedman and Forrester Analyst Andre Kindness Recorded: Oct 19 2017 60 mins
    In the new enterprise network reality, boundaries have blurred: the internet is central and out of your control. A modern approach to network analytics is now more important than ever. The good news is that it’s possible to get vastly better insights from network traffic data than ever before, due to the power of cloud and big data systems. The key is to link that network traffic data and show the benefit to the broader business. In this webinar guest speaker Forrester analyst Andre Kindness and Kentik Co-founder and CEO Avi Freedman will help you understand:

    - The changes in enterprise networks that make modern network analytics a must-have
    - Why it’s so important to combine network data with business context
    - Examples of business intelligence driven by network data in IT organizations today
    - How you can gain the business advantage that modern network analytics offers
  • Defending Your Workloads with a Distributed Web Application Firewall (WAF)
    Defending Your Workloads with a Distributed Web Application Firewall (WAF) Guru Chahal Recorded: Oct 19 2017 57 mins
    Avi Networks has launched a new intelligent web application firewall (iWAF) that performs 50X faster than legacy appliances, processing hundreds of Gbps of throughput and over a million transactions per second. As a software-only solution, iWAF operates as a centrally managed fabric across data centers, private clouds, and public clouds. Register for this webinar to learn about the unique capabilities of Avi Networks’ iWAF include:

    Highest-performance web application security
    ● Elastic, automatic scale-out across data centers and clouds
    ● Scalable per-application deployments allow each mission-critical app to get its own WAF

    Analytics-driven, accurate security policies
    ● Real-time security insights eliminate false positives
    ● Visual policy checks prior to enforcement

    Central, simplified policy management
    ● Central management and automation of all distributed iWAF instances
    ● Point-and-click policy configurations, with pre-defined templates for OWASP Core Rule Set
  • Stop Wasting Their Time! 5 Ways to Ease Customer Frustration
    Stop Wasting Their Time! 5 Ways to Ease Customer Frustration Art Schoeller, Brendan Dykes, Megan Selva (moderator) Recorded: Oct 19 2017 54 mins
    2017 Forrester research revealed that 73% of online consumers cite valuing their time as the most important thing a company can do to provide excellent service. And according to ICMI’s Brad Cleveland, prompt service is one of the top ten customer expectations. The problem? Outdated, disjointed processes and systems still prevent most contact centers from delivering a truly seamless experience, and the result is often low efficiency and high frustration.

    Are you looking for ways to reduce customer frustration? Join us for this complimentary webinar as we share five practical steps you can take to simplify the customer experience and drive ROI for the business.

    In this webinar you will learn:
    * How to train and empower agents to ease the customer experience
    * Why omnichannel service impacts the whole business, not just the contact center
    * How to enable better collaboration between the contact center and other departments
    * How the right technology can enable a better omnichannel experience for both agents and customers

    Join us for an interactive and informative hour, complete with audience Q&A.
  • How to Design SQL Server Infrastructures for Optimal Performance
    How to Design SQL Server Infrastructures for Optimal Performance Matt Henderson, Director of Microsoft Technology Recorded: Oct 19 2017 57 mins
    Successful analytics and transactional systems start with proper architectural principles and considerations. This webinar will be a detailed walkthrough of all the software and hardware infrastructure below the database server. It will explain how each layer affects database workloads as well as give tools and metrics for determining optimal architectural configurations.

    From this webinar you will learn:

    • How to design SQL server infrastructures for optimal performance
    • How the software and hardware infrastructure affect database performance
    • Tools and metrics to determine appropriate hardware allocations. For example, how many CPU cores, data volumes, tempdb files or GBs of memory are needed for your workload.
    • Tools and metrics to find current bottlenecks, inside and outside of the database server
    • Tools and best practices for monitoring all layers

    Presented by Matt Henderson, who has over two decades of experience in designing high-performance database platforms and over five years working with the latest all-flash storage technologies. He currently is the Director of Microsoft Technologies at Vexata where he helps customers optimize and scale their mission-critical databases.
  • How to Power Your Customer Experience with Data
    How to Power Your Customer Experience with Data Rafael Flores, Senior Product Manager at Treasure Data Recorded: Oct 19 2017 41 mins
    Do you know what your top ten 'happy' customers look like? Would you like to find ten more just like them? Come learn how to leverage 1st & 3rd party data to map your customer journey and drive users down a path where every interaction is personalized, fun, & data-driven. No more detractors, power your Customer Experience with data!

    In this webinar you will learn:

    -When, why, and how to leverage 1st, 2nd, and 3rd party data
    -Tips & Tricks for marketers to become more data driven when launching their campaigns
    -Why all marketers needs a 360 degree customer view
  • Learn how Proxy Plays a Critical Role in Protecting Your Enterprise
    Learn how Proxy Plays a Critical Role in Protecting Your Enterprise Timothy Chiu - Senior Director of Product Marketing, Symantec Recorded: Oct 19 2017 32 mins
    Solving the most sophisticated security challenges requires an advanced approach that is built upon a proxy-based architecture. This approach allows you to leverage best of breed security technologies to provide a safe and confident cloud and network experience.

    Symantec secure web gateway solutions deliver strong proxy-based security in the form factor your organization needs: on-premises appliance, virtual appliance, in the cloud, or in a unified hybrid combination of these solutions.

    The solution’s unique proxy architecture allows it to effectively monitor, control, and secure traffic to ensure a safe web and cloud experience.

    In this webinar learn:
    • Why Proxy architecture is more important than ever as a critical security component of your network
    • How a web proxy can serve as a platform for advanced threat detection and data protection
    • Why pre-filtering your sandbox with proxy architecture is a smart move for both your SOC and your bottom line.

    Register Today
  • Fileless Cyber Attacks Demystified
    Fileless Cyber Attacks Demystified Jack Danahy, CTO, Barkly Recorded: Oct 19 2017 39 mins
    From attacks that abuse PowerShell to attacks that live exclusively in memory, “fileless” threats have become increasingly common and dangerous. They’re built to evade detection from even the most advanced defenses, but that doesn’t mean they can’t be stopped — or that they have to be difficult to understand.

    Join us to learn how attackers are using fileless techniques to gain execution, persistence, and lateral movement, and what you can do to keep your company protected.
  • Cybersecurity in the Workplace is Everyone’s Business
    Cybersecurity in the Workplace is Everyone’s Business Rinki Sethi, Senior Director, Information Security and Brian Tokuyoshi, Sr. Product Marketing Manager Recorded: Oct 19 2017 50 mins
    Creating a culture of cybersecurity is critical for all organizations. Join the conversation with our own security pros to learn how they keep employees ahead of phishing attacks, share best practices for phishing education and explain how to use innovative technologies to strengthen cyber resilience.
  • Business Insight: How to Interpret the Gartner Market Guide for PAM
    Business Insight: How to Interpret the Gartner Market Guide for PAM Suresh Sridharan, Director Privileged Access Management, CA Technologies Recorded: Oct 19 2017 36 mins
    The Gartner 2017 Market Guide for Privileged Access Management (PAM) reviews 24 vendors across various categories. This comprehensive information can help you find an ideal solution for your unique business needs. Yet, selecting the right PAM solution is a pivotal decision; it is critical to weigh your options.

    Make an informed decision. Join Suresh Sridharan, Director Privileged Access Management at CA Technologies, as he guides you through report recommendations, evaluates the latest tools and technologies, and compares and contrasts industry choices.
  • Navigating the Stormy Sea of Risk & Compliance Regulations
    Navigating the Stormy Sea of Risk & Compliance Regulations Martin Tuip, Sr Product Manager | Joanna Belbey, Compliance Subject Matter Expert Recorded: Oct 19 2017 50 mins
    A current increasingly uncertain and complex regulatory environment has made it challenging for firms tasked with creating and maintaining a “culture of compliance”. The business demands access to new forms of communications to increase engagement with employees, partners and customers, only increasing the quantity and complexity of the data you manage. Join Proofpoint to gain an understanding of the challenges that compliance faces and the consequences of not meeting the expectations of the regulators

    Join us to

    •Develop insight into the rapidly changing regulatory environment
    •Hear how new forms of communications are bringing about the digital revolution
    •Discover how to protect your organization from reputational risk and stay out of the cross hairs of the regulators