The IT project management community on BrightTALK includes thousands of IT project and portfolio management professionals. Find relevant webinars and videos on agile methodologies, scrum strategy, project management processes and more. Attend live webinars or view on demand content presented by recognized thought leaders in the IT project management industry.
Is Data Center Colocation the Right Approach for the Enterprise? A 451 Conversation with the CIO of NCR.
Large enterprises have traditionally owned and operated their own data centers. But the capital and personnel requirements of owning and operating your own data centers as well as the strategic distraction, are causing many enterprises to consider replacing their data centers with a mix of colocation and cloud computing.
In this webinar, Kelly Morgan, Vice President at 451 Research and one of the leading authorities on the economics and finances of the data center and hosting industries, will present the key considerations for enterprises as they evaluate colocation. Then, William VanCuren, Chief Information Officer at NCR, will join Kelly for a discussion on NCR’s hybrid cloud strategy, including their convergence of public cloud and colocation to support the enterprise
Join Eric Ogren, Senior Security Analyst at 451 Research, and Omri Iluz, CEO of PerimeterX, as they discuss how your best defense against automated website attacks rests with an approach founded on analyzing the behavior of humans and bots. 451 Research has talked with organizations that have saved millions in fraudulent transactions after embracing a behavioral analysis approach to security.
Sophisticated attackers are commercially motivated, using automated attacks to inflict damage. By abusing encoded business logic, they utilize real browsers to take over accounts, perform fraudulent purchases and scrape intellectual property, without triggering traditional security mechanisms. Through advanced techniques of cloaking from the world of malware, they disguise their nefarious intentions. Signature-based bot detection and WAFs are blind to these new threats, leaving your organization’s website defenseless.
In this webinar you will learn:
•How bots have evolved from simple scripts to sophisticated Man-in-the-Browser attacks
•How to protect against advanced modern attacks utilizing real-user browsers
•How to detect malicious behavior with Web Behavior Analytics (WBA) technologies
•Real-world attacks and how organizations use behavioral analysis to prevent them
•How to future-proof your business and your infrastructure
Organizations are increasingly looking to expand Agile to a greater number of projects and to increasingly diverse business areas. The process and tools that served them well for just a handful of software development projects may well struggle to scale vertically and horizontally and organizations need solutions. Join Andy Jordan, ProjectManagement.com as he discusses the need to evolve Agile approaches in different areas and at different scales.
This session is approved for 1 Project Management Institute (PMI) PMP Credit.
Come prepared to look at disaster recovery planning with a 360 degree view for the enterprise and SMB space, and walk away with technical ideas you can begin to implement immediately. During this presentation, we will discuss disaster recovery planning considerations and partnerships. We will also walk through technical solutions that provide a way to use virtualization and storage strategies for an approachable DR solution.
You’re already using CA Project & Portfolio Management to manage your innovation lifecycle and make better strategic decisions. What if you could take that up a notch by adopting agile and connecting your development work to your company’s most important business initiatives?
Join our experts on Wednesday, 19 October at 15:00 BST / 16:00 CEST for an insightful webinar, “The Secret to Making PPM Work (with Agile).” You’ll discover how to:
- Prioritize and select the right investments
- Coordinate agile teams to deliver on those investments
- Provide visibility into a fast, predictable, high-quality delivery engine.
Cyber threats facing a nation's critical infrastructure, mission-critical systems, or any Internet of Things (IoT) system, demand a cyber infrastructure that matches their combined enormity and complexity. Risk management solutions must be capable of understanding intricate attack patterns and assessing complex vulnerabilities to give stakeholders confidence in their system's ability to withstand malicious attacks.
Currently -- understanding, assessing and managing the risks of complex cyber and/or cyber-physical systems is a very costly and challenging task that requires the expertise of well-trained and seasoned security professionals, a scarce commodity. The traditional approach to risk assessment relies primarily on informal inputs such as documentation and personnel interviews, making this approach subjective, non-comprehensive, non-repeatable, and prone to inaccuracies about the true nature of risks and vulnerabilities involved.
OMG's C4I Task Force Request For Information (RFI) is currently open for response “Cyber Security Protection for Front Line Real-Time Systems RFI” seeking input on a) How to develop Standards to move Tool/Integration community forward to reduce costs and focus on higher quality system development b) What area of standards can be addressed to reduce cost in developing Cyber Security solutions and designs for systems and c) What can be done to integrate current standards that will allow standards based tools to better support design, development and life-cycle support to reduce costs and control costs.
You’re already using CA Agile Central at the team level and possibly into the program level. But to effectively increase your speed to market you need to link your team-level work with the business strategy.
Join us on Tuesday, 18 October at 15:00 BST / 16:00 CEST for our webinar: “Igniting Business Agility - The Secret to Connecting PPM Strategy to Agile Execution”. You’ll discover how to:
· Identify and sequence the right investments for the desired business outcomes
· Align agile delivery teams to deliver on those investments
· Leverage a rapid, predictable, high-quality delivery engine to empower nimble business decisions
Why is Business Continuity Management (BCM) relevant to your organization? BCM is most relevant to organizations seeking to mitigate exposure to emerging global risk and trends. Learn the "value added" role of Internal Audit.
After attending this webinar, you will be able to:
•Understand the importance of Business Continuity Management to your organization
•Discover the emerging global risks and trends that could impact the viability of your organization
•Learn the "value added" role of Internal Audit as it relates to Business Continuity Management
Project Portfolio Management or PPM is rapidly becoming a mainstream project execution approach. It is a key element of the linking of strategy with project delivery, and without that link organizations risk falling short of their strategic goals. However, as PPM expert Andy Jordan explains in this webinar, many organizations are starting PPM way too late in the business cycle. In his usual high energy, engaging style, Andy will explain:
•The problems with many PPM approaches
•Why PPM begins too late, and where it needs to begin
•How to move your organization to more effective PPM
Andy will use this webinar as a ‘call to action’, urging organizations to improve their PPM approach and providing them with tools to do so. If your organization wants to improve its project performance you simply cannot miss this webinar.
Database-as-a-service offers multiple potential benefits, including lower database licensing and infrastructure costs, faster time to application development, and reduced administration overheads. These benefits are most likely to be experienced by database administrators and architects, although senior decision-makers and business users also stand to gain from having on-demand access to database services, rather than waiting for databases to be configured and deployed on dedicated physical or virtual server infrastructure.
While 451 Research anticipates growing adoption of database-as-a-service (DBaaS), adoption is currently nascent compared with other cloud services, as enterprises look to make the most of their investments in on-premises database deployments, and also to identify the most appropriate workloads for transition or migration to DBaaS. This webinar explores the factors shaping those adoption trends, including the potential benefits and challenges to DBaaS adoption, the economics of the cloud as they relate to database workloads, and adoption lifecycles.
Based on research involving enterprises currently deploying database workloads in the cloud, the webinar will:
• Highlight the trends driving enterprises to move database workloads to the cloud
• Identify the challenges causing enterprises to be hesitant about migrating database workloads to the cloud
• Identify the use-cases that are prime candidates for migrating database workloads to the cloud
• Highlight the critical success factors for database migration to the cloud
To support new BrightTalk capabilities, we’ve moved this event to a new URL.
Please join us here:
We apologize for the inconvenience!
Resource Management is a relatively straight forward concept with significant benefits. However, some organizations choose to postpone those benefits and focus on other aspects of PPM. How can we extend organizational maturity for PPM with high value outcomes from Resource Management?
Please join Erich Kissel, CA Services Architect for PPM, and Lars Matzerath, Head of Sales from itdesign GmbH for an insightful discussion on Resource Management on Friday, Oct.7th.
CA Services will provide tips for getting started and for expanding into new Resource Management use cases. Our partner, itdesign, will share some insights of two powerful packaged work products
for CA PPM: itd Assignment Editor and itd Allocation Editor which enhance project and resource managers’ visibility and editing options of resources.
From assigning and aligning resources to projects, evaluating and normalizing demand, to gaining a better understanding of available skills, it’s time to fulfill your resource management aspirations!
Project and Portfolio Management (PPM) solutions from CA Technologies empower you to innovate with agility, transform your portfolio with confidence, and optimize the right resources and investments to manage business demands.
In this live demo you will see a high-level overview of the CA PPM solution and hear how it can help your organization to:
•Improve project execution results
•Provide organizational visibility
Every one of our PPM customers is pursuing the same end goal – how to deliver the highest value to the organization. Working with hundreds of customers, we have learned that the answer requires a comprehensive approach across multiple disciplines. To drive bigger results and achieve greater PPM maturity, organizations need to improve PPM leadership, governance, change management, product management, development, support and other disciplines.
Please join us for this presentation that discusses how to achieve PPM excellence by building competencies across disciplines in-house with the option of augmenting that approach with Application Managed Services for CA PPM.
Every organization’s Agile transformation is different, however there are key landmines that can cause an organization’s Agile transformation to struggle. Join Andy Jordan, ProjectManagement.com as he discusses how you can avoid seven common Agile transformation mistakes and put your organization on the right path with Agile.
This session is approved for 1 Project Management Institute (PMI) PMP PDU Credit.
IT organizations have hit a breaking point in siloed management tools to address one of the most critical issues today - cybersecurity hygiene. In particular, numerous point solutions targeting the endpoints drive cost, complexity, and other challenges. New investments in cloud, distributed workforces and increasing numbers of connected devices only exasperate this problem. Addressing cybersecurity hygiene means that critical actions must be made on demand versus scheduled. Teams must also have confidence that assessment results and remediation actions are complete.
Come learn about the key issues why cybersecurity hygiene fails in most organization. We’ll discuss in depth how the platform approach and speed of Tanium are poised to fix this critical problem. Eric Hanselman, 451 Chief Analyst, and Erik Kristiansen, Senior Director of Product Marketing at Tanium will discuss.
Many companies experimenting with agile development methods in their engineering and IT groups are having only mixed success.
Unless you’re implementing agile both upstream (through your portfolio) and downstream (through testing and operations,) you’re not harnessing agile’s full power through Digital Transformation. Being faster to market doesn’t help your bottom line if you deliver the wrong things, and failing to get the right things into production fast means you’re leaving money on the table.
Join this web seminar to gain insight into the benefits of a digital transformation. You’ll discover a strategic, collaborative approach to channel the power of agile and deliver more value to your customers.
Historically IT asset management (ITAM) and IT service management (ITSM) have been managed as separate entities with separate teams and unconnected objectives. In reality they are highly dependent upon each other with intersecting processes and shared data. When processes, data and tools are combined, they bring considerable benefits - reflecting that the whole is considerably more effective than the sum of the parts. Ian Aitchison, ITSM&ITAM Product Director will explore the synergies between ITAM and ITSM, and the benefits an organisation can achieve with greater visibility into the assets that make up its business services.
Live from the 2016 Hosting & Cloud Transformation Summit in Las Vegas, Katie Broderick of 451 Research will interview David Leighton, President of Women in Technology about a recent survey of 1,100 WITI members, which found that early STEM (science, technology, engineering and math) exposure is crucial and a variety of support mechanisms are needed to achieve women's goals in a predominantly male field.
Are your teams building the right things, the right way? How do you know? Are they working on projects that deliver the highest value to the company? Can your company rely on you to deliver what you promised, on time? The struggle to meet these expectations is real and organizations all over the world are trying to go agile to better connect their business strategy to the execution of work.
Join us on Tuesday, September 20, 10am PST / 1pm ET, for a unique look into how CA Technologies GIS organization took on an agile transformation. During this webinar, you’ll learn:
•The obstacles faced as they embarked on this journey and how they overcame these obstacles
•The benefits almost two years later
•Their vision and roadmap for scaling agile further in their organization
No one can tell you agile is easy; the shift requires executive buy-in, culture or behavior change and ultimately the desire to provide your customer with what they need to be successful. Spend some time with us and ask questions. We’ll help you get to a point where your organization can stop starting and start finishing.
The power of CA PPM is in the information it can put at your fingertips. The Jaspersoft Ad Hoc reporting feature enables users create their own reports without specialized programming knowledge. With Jaspersoft, users can create their own custom reports in a number of different formats. Users can add or remove columns, format data, add filters and more without any help from developers.
In his 60 minutes webinar we’ll cover:
•An introduction of Jaspersoft Ad Hoc reports in CA PPM
•Understanding Jaspersoft and report writing terminology
•Stepwise creation of different types of Ad Hoc views and reports - Tables, Charts, Crosstabs
•Personalizing Ad Hoc reports
ITOps and DevOps are polar opposites. One group wants to move fast and drive change; the other group is hard-wired to provide security and reliability.
Yet both groups have one common goal: to turbocharge performance and create innovative solutions to impact the business.
Learn how to achieve both objectives through lean thinking and collaboration in our webinar: Striking a Balance Between DevOps and ITOps. Troy DuMoulin, Vice President of Research and Development at Pink Elephant, will explore:
-How to deliver on four seemingly contradictory objectives: innovation, speed, security, and compliance
-Value-stream thinking vs. framework thinking
-Lean IT, DevOps, and agile development
-Why ITSM is critical in agile environments when defining non-functional requirements
What are some of today's biggest challenges for women in STEM? We will examine the findings from the WITI/451 Research report examining the impact of gender in the workplace for the science, technology, engineering and math (STEM) fields. Titled "Wanted: Women in STEM - An Exploration of Influential Factors, Their Professional Journey & Ways to Foster Change," the survey of 1,100 WITI members found that early STEM exposure is crucial and a variety of support mechanisms are needed to achieve women's goals in a predominantly male field. Read more at: http://www.witi.com/STEMwomen
Katie Broderick is Research Director at 451 Research. She has collaborated on some of the industry's leading quantitative research on colocation, cloud computing, and datacenter infrastructure management. Currently, Ms. Broderick runs 451 Research's Datacenter KnowledgeBase. She also studies market dynamics on a custom basis for clients including topics such as cloud computing, hosting, software-defined infrastructure, and brand awareness.
The history of DDoS provides a clear, unambiguous guide as to where things are going - attacks are becoming more expansive, impacting a wider variety of targets, and the durations are longer and more destructive. Response strategies however, have kept pace and can handle the scale. Available in variety of deployment options and informed by vast quantities of intelligence, the right technology can empower you to stay abreast the threats and prevent or mitigate the inevitable attacks. The key is in discovering the optimal match between your architecture and the available solutions.
Join this session to find out:
-Learnings from past DDoS threat and attack trends
-How today’s DDoS poses threat to any organization’s availability
-What prevention and mitigation approaches are proving most effective
Modern content consumption is changing dramatically, driving a need for real-time content output and intelligent content repurposing and delivery. Does your content management system (CMS) deliver the necessary agility to help you keep pace with shifting customer, market and business needs?
In this webinar with Eric Hoffman from Eastbanc Tech, you’ll learn:
· Why high-value content alone isn’t enough to satisfy consumer demand
· How a CMS can better serve different channels and how to optimize these
· How a CMS can help you better understand your audience’s journey
· How tomorrow’s content is changing – and what this means for your CMS
In addition, Mark Peerdeman of Hippo CMS will share a practical example of this by illustrating how Hippo future-proofs its CMS, including how Hippo thinks about the future of content management and a sneak peek at the Hippo product roadmap.
Targeted threats using zero-day malware embedded in file downloads and email attachments are increasingly used to attack organizations like yours. Unfortunately these bleeding-edge attacks are often undetectable by traditional anti-virus engines.
So what can you do to keep yourself secure?
Join us to see why sandboxing is the perfect solution to these advanced threats and despite what you may have heard – IS affordable and simple to use.
In the session we’ll cover:
• Why organizations like yours need sandboxing
• How Sophos Sandstorm keeps you secure against the latest threats
• Getting started with sandbox protection that’s simple to use and affordable
With over 17 years’ experience in information security, Peter currently specializes in Sophos advanced threat and Web security solutions.
Wie stellen Sie sicher, dass sich all Ihre Applikationen an Ihren Geschäftszielen ausrichten?
Passen Sie Ihr Budget für Applikationen regelmäßig an die aktuelle Geschäftsstrategie an?
Dieses Webinar möchte aufzeigen, wie Sie eine komplette Übersicht zu Ihrer Applikationslandschaft erhalten, diese objektiv hinsichtlich Geschäftszielen bewerten und dabei Redundanzen oder unnötige Applikationen identifizieren.
Das damit verbundene Einsparungspotential könnte in sinnvolle Innovationen oder Unternehmenstransformation eingesetzt werden.
Diese Webinar-Reihe beginnt mit dem Thema Applikation Portfolio Management und wird sich in weiterführenden Webinaren mit ausgewählten Themen aus der PPM-Welt ergänzen.
Flying spiders, snakes, and ghosts are long gone. Ransomware is now the stuff of nightmares and it’s easy to see why.
Ransomware has become one of the most widespread and damaging threats internet users now face. Since the infamous CryptoLocker first appeared in 2013, we’ve seen a new era of file-encrypting ransomware variants delivered through spam messages and Exploit Kits, extorting money from home users and businesses alike.
Join Sophos ransomware pro, Peter Mackenzie, as he shows us how ransomware attacks work, explains why so many new infections keep surfacing, and what practical precautions you can take to protect your organisation.
If this webinar doesn’t help an IT Hero sleep at night, we don’t know what will.
In this lively webinar we are pleased to welcome Claire Agutter of ITSM Zone and Jayne Groll from the DevOps institute to talk about Agile Service Delivery and answer the following questions:
1. Why are ITSM organizations looking to be more agile?
2. What does it mean for existing frameworks like ITIL?
3. What are organizations adopting? (agile ITSM, DevOps)
4. What is the role of tools and techniques such as process hacking to achieving agile service delivery?
5. What are the business benefits and value?
The webinar will cover topics that bridge Delivery Agility and Business Agility in The Agility Series.
About our presenters:
Claire Agutter is the lead tutor for ITSM Zone (www.itsm.zone), providers of high quality, accredited online training for IT professionals. Claire uses her background in service management operations and consultancy to blend old and new best practice to give organizations the toolkit they need to deliver business value. From ITIL to DevOps, OBASHI and Agile Service Management, Claire believes in sharing knowledge and experience between organizations, and hosts the popular ITSM Crowd hangouts that provide practical advice to professionals around the world.
Jayne Groll is a Board Member of the DevOps Institute (DOI). She is also President of ITSM Academy. Jayne carries many IT credentials including ITIL Expert™, Certified ScrumMaster, Certified Agile Service Manager, DevOps Foundation and is a Certified Process Design Engineer (CPDE)™ . Her IT management career spans over 25 years roles across a wide range of industries. Jayne is very active in the ITSM, Agile and DevOps communities and is the author of the Agile Service Management Guide. She is a frequent presenter at local, national and virtual events.
Social Engineering has been around for as long as the crooks have but in a modern online world, running a con game has never been easier. And that’s why we need to be savvy.
A social engineer can research you on Facebook and LinkedIn; read up about your company on its website; and then target you via email, instant messaging, online surveys…and even by phone, for that personal touch. Worse still, many of the aspects of a so-called “targeted attack” like this can be automated, and repeated on colleague after colleague until someone crumbles.
Greg Iddon will take you into the murky world of targeted attacks, and show you how to build defences that will prevent one well-meaning employee from giving away the keys to the castle.
Agile employees outperform so-called “hard workers” by nearly 20 percent, and research from Korn Ferry found that companies with more agile executives had 25 percent higher profit margins than their peers. Given the pervasiveness of agile in software development circles, and the pervasiveness of software as the backbone for every business today, it’s no surprise that agile tenets have pervaded employee expectations about the workplace. It’s why some of our agile coaches encourage customers to use employee happiness as a productivity metric.
Agile cultures are engaging cultures, and engaging cultures produce engaged employees. Are you ready to get going? We can help. Join us on Thursday, October 27, 10am PST / 1pm ET for this engaging webinar.
Companies have struggled to find their feet when it comes to combining technology, people and workflow in their mobile application development strategies. All too often fragmented technologies have impeded progress. As technologies mature however and mobile (as distinct from pure web development) becomes better understood, there is light at the end of the tunnel. In particular integration across the lifecycle is delivering significant productivity gains for developers and business stakeholders that makes moving from handfuls of apps to a scaled mobile app strategy more of a reality.
Improving the efficiency of existing processes is critical for enterprises, and one of the first proof points of many big data projects. In the long-term enterprises may be looking for big data to generate revenue from new projects and applications, but proving the potential benefits by improving the efficiency of existing business processes – such as optimizing supply chains, or accelerating compliance – is a good place to start. Additionally, operating more efficiently at lower cost and with lower risk enables an organization to redirect budget towards driving growth.
Join Oracle and 451 Research for a webinar exploring how to make this operational efficiency possible through a combination of data management, statistical analysis and visualization.
Eva Tsai will share her experience as a woman in tech charting a journey spanning multiple disciplines and excelling as a strategic business leader, her thoughts on the challenges women are facing, both in entering and advancing in their careers, and what her recommendations are on both professional and personal fronts.
Eva has extensive experience leading go-to-market transformation and managing company telemetry to drive growth worldwide. Her innovation and leadership has been recognized with significant industry awards and patents. She was selected by Silicon Valley Business Journal in 2015 as one of Silicon Valley's 100 Most Influential Women and won the 2014 Marketer That Matters™ award, sponsored by The Wall Street Journal. At vArmour, Eva has transformed the company into a growth machine via innovative and well-executed go-to-market strategy, insightful telemetry, and process optimization. vArmour has been named a “Company to Watch” by TechCrunch and a "Cool Vendor" by Gartner. Prior to vArmour, Eva held strategic roles at Citrix, BroadVision and Oracle. Eva holds a BS and a MS in Computer Science from Massachusetts Institute of Technology.
Join this expert panel in our Women in Tech series to discuss the current state of the industry, where the women in tech community is now and where it needs to be in terms of diversity in tech. In this panel presentation, we'll be highlighting the top challenges barring women from entering tech careers, some of the hurdles in their way as they are climbing up the leadership ladder, as well as potential solutions and learnings from personal and professional experiences.
- Jessica Voss, Cloud Guru & IT Consultant
- Cathy Han, CEO of 42 Technologies Inc.
- Megan Lin, Solutions Architect Team Lead at Dropbox
- Hilary Stone, Support Engineering Manager at MixPanel
We feel sorry for Andy Jordan, the presenter of this webinar. In his consulting practice he deals with many organizations looking to take project execution to the strategic level, but who think they can succeed with desktop project management tools, spreadsheets and sticky notes. Now Andy shares some war stories and provides practical advice on how to:
•Recognize when you need new tools
•Determine what kinds of tools you need
•Build a tool suite environment that supports your business today and in the future
•Use tools as an enabler for better performance
This webinar promises a few laughs, but also a few sobering moments when you likely recognize your organization’s mistakes. Don’t become one of Andy’s war stories, sign up today.
The Internet of Things (IoT) is a system of systems (SoS) in every sense of the definition. The future of IoT success, including technology advancements and revenue generating potential across the business spectrum, is dependent on the application of solid Systems Engineering and Model Based Systems Engineering (MBSE) principals. Without MBSE, the complexity involved in the design, development, and deployment of IoT systems would consume both system and operational providers. Absent of any industry standards, IoT systems cannot be built in a vacuum and their success will only be realized through application of modern day systems engineering processes, methods, and tools. Technology advancements in consumer products will continue to evolve to facilitate connection to larger and larger IoT networks. This will be the catalyst that will drive entire infrastructures changes to: Federal, State, City, and local governments; product development companies; utility and service providers; and even to consumers and their homes in order to support the growing demand for connected products. The infrastructure and management will need to be established prior to, or in conjunction with, the smart systems that support them.
Selecting a Content Management System (or Digital Experience Platform) is one of the most important decisions that a business will make on the path to truly comprehensive digital transformation. One of the most trusted reports for evaluating these platforms is the Gartner MQ.
Robert Rose, bestselling author and senior analyst at Digital Clarity Group explains what enterprises need to look for within the September 2016 Gartner Magic Quadrant for Web Content Management.
The Agile Product Owner is typically the project’s key stakeholder. They have a deep understanding of how products are used and the value they bring to both customers and the business.
Join Yvonne Kish, one of our awesome Agile Coaches, to learn more about the Product Owner Role. During this webinar, we’ll dig into:
•The definition of the Product Owner
•How the Product Owner role fits within an agile team
•What a Product Owner actually does
Following the webinar, we’ll have Q&A, so bring your questions.
Join Andy Jordan, ProjectManagement.com as he provides a guide to building a foundation for success before your Agile transformation actually begins. In this presentation, he will address the importance of executive buy-in, setting realistic expectations and aggressive but reasonable growth plans, communication, and the ability to measure progress appropriately. By attending this session, you will learn the importance of a commitment to organizational evolution and the recognition that things can take time - Agile isn’t a silver bullet that makes all problems disappear immediately.
This session is approved for 1 Project Management Institute (PMI) PMP Credit.
Despite years of headlines, many businesses today are under-invested and ill-prepared to handle modern DDoS attacks. Many wrongly believe they are not being targeted by DDoS attacks, and are in fact experiencing outages due to DDoS attacks that are being attributed to equipment failures or operational error because the companies lack DDoS visibility and defense. Still more rely on existing, more traditional, security devices such as firewalls and intrusion prevention systems (IPS), or a single layer of protection from their ISP or content delivery network (CDN). In each case, these businesses are exposed and only partially protected. Firewalls and IPS are stateful devices that are often targets of DDoS attacks, while cloud-only or CDN protection does not provide adequate protection for critical business applications.
Join this webinar with Arbor Networks and IDC to understand exactly how the stakes have changed, and what it means for the assumptions organizations have been making with regard to protecting the availability of their business-critical websites, services and applications.
• About the evolution of DDoS attacks
• The implications for DDoS defense
• Current best practices in DDoS defense
Agile is increasingly becoming a factor at the strategic level. There are a number of different frameworks for scaling Agile and they are starting to touch on the realm of traditional portfolio management. Does that mean portfolio management has to change? Does strategic Agile have to adapt? Are we going to end up with multiple portfolios? In this engaging webinar portfolio management expert Andy Jordan breaks through some of the confusion and offers guidance on:
•How to incorporate more strategic Agile concepts into portfolio management
•The importance of differentiating strategic Agile from Agile for strategic projects (they are different)
•Minimizing disruption and maximizing commitment with strategic Agile
•Leveraging Agile in all forms of portfolio management
This webinar promises to challenge some of the Agile stereotypes that exist as Andy offers innovative ideas and approaches that promise to give all organizations a chance to improve portfolio success. Don’t miss out, register today.
Organizations are frequently tempted to modify and adapt their Agile approaches as they become more experienced. As they then try and expand Agile use into other areas, or as they look for ways to integrate Agile and traditional project execution approaches they realize they are facing some unintended consequences. Join Andy Jordan, ProjectManagement.com as he discusses how best to look at options for enhancing or modifying Agile at your organization and how to ensure you aren’t causing future problems.
This session is approved for 1 Project Management Institute (PMI) PMP Credit.