Hi [[ session.user.profile.firstName ]]

IT Service Management

  • IT Service Management Community Update
    IT Service Management Community Update
    Harriet Jamieson, BrightTALK and Elisabeth Thomas, Launch Product Marketing Recorded: Apr 24 2019 19 mins
    Join BrightTALK's Harriet Jamieson and Launch Product Marketing's Elisabeth Thomas as they review the latest developments in IT Service Management.

    From automation to ITIL 4, Harriet and Elisabeth will be covering where ITSM is headed in the coming months.
  • The Bots are coming! Overview of Virtual Agents & How They Modernize Support
    The Bots are coming! Overview of Virtual Agents & How They Modernize Support
    Rich Graves, Director of Product Management at Serviceaide Recorded: Apr 24 2019 61 mins
    Are the machines out to get you? Are they going to replace you and your colleagues? The short answer is "No", but they have the potential to change how you do your job. This primer will enable you to be informed about these changes and proactive in making your job more productive and enjoyable.

    This presentation will dive into how components of artificial intelligence are being used to create modern conversational support experiences today. Learn about the differences between chatbots and virtual agents, discuss scenarios where virtual agents excel, and how virtual agents can improve key support metrics such as MTTR and customer satisfaction.
  • Secrets of Fintech Startup Success: A Formula for Disruption
    Secrets of Fintech Startup Success: A Formula for Disruption
    Yodlee Recorded: Apr 24 2019 60 mins
    Every founder starts with a big idea, but only 1 out of 10 see their idea succeed. So what’s the difference between the fintech startups that get off the ground and those that don’t make it out of the gate? What are the secrets of the startups that disrupt entire industries? This is your chance to find out how founders and VCs look at creating successful startups first-hand.

    Our panel of industry experts will cover a range of topics, from getting started building your team, to the importance of finding an impactful mentor, and more. They’ll also answer questions from future startup founders in a Q&A. It’s everything you need to travel the path from big idea to successful startup.

    Register for the webinar to discover:

    • What successful fintech startups have in common
    • The differences between being a solopreneur vs. being a co-founder
    • Tips for finding and growing your dream team
    • How to go from killer idea to disruptive startup


    Speakers:

    • Evan Schuman, Moderator, VB
    • Jeff Cain, Senior Director, Envestnet | Yodlee Incubator, Envestnet | Yodlee
    • Pierre Wolff, SVP Business Development, InCountry
    • Ken Kruszka, CEO, SnapCheck
    • Kathleen Utecht, Managing Partner, Core Innovation Capital
  • Make Support Personal: Inject Relevance Into Every Interaction
    Make Support Personal: Inject Relevance Into Every Interaction
    John Ragsdale, Distinguished Research VP, Service Technology at TSIA & Jennifer MacIntosh, VP Customer Experience at Coveo Recorded: Apr 24 2019 32 mins
    As your business scales, manually tracking, updating, and surfacing the right knowledge to your customers in a personalized, relevant manner quickly becomes unmanageable. This can lead to inconsistent and unreliable experiences for your customers and places unnecessary burdens on your support staff. Smarter, automated, and more scalable user experiences are necessary to get ahead.

    Join TSIA and Coveo for this 45-minute, prescriptive webinar that will reveal how to inject relevance into your support experiences at every customer interaction. We’ll demonstrate how companies are using AI-powered search and insights to leverage the intent and information behind every touch point of the customer journey to drive contextual, personalized, proactive experiences that result in:

    -Improved self-service success and case deflection.
    -Coherent and unified interactions across all support channels.
    -Better content strategy and user experience decisions based on data.

    You’ll also get a peek at the AI-powered support strategies that pacesetter companies like Salesforce, VMware, and Informatica are using to achieve relevance at every touchpoint.
  • What's new in Citrix Virtual Apps and Desktops
    What's new in Citrix Virtual Apps and Desktops
    Carisa Stringer, Sr. Director, Product Marketing, Virtual Apps and Desktops, Citrix and Nitin Sharma, Product Marketing Recorded: Apr 24 2019 44 mins
    Citrix continues to innovate our industry-leading Virtual Apps and Desktops platform. Join us to experience the latest updates to see how we are enhancing the user experience, improving environment management and making your move to the cloud easier than ever.

    In this webinar, we’ll share the latest capabilities of Citrix Virtual Apps and Desktops including:

    Key enhancements from the latest Cloud, Current and Long Term Service releases
    - How to make your journey to the cloud seamless
    - Administrative flexibility and security enhancements
    - Industry-first user experience innovations around graphics, video and more
    - Don’t miss this exciting product update! In addition to seeing the new features in action, you’ll hear what’s coming next and be able to ask questions of our product experts.
  • Can AIOps cure your service desk problems?
    Can AIOps cure your service desk problems?
    Mohan Kompella, Senior Director, Product Marketing @BigPanda Recorded: Apr 24 2019 34 mins
    If you use ServiceNow, JIRA or another service desk system, your helpdesk and ITSM teams have probably run into some of these issues:

    A single outage or disruption creating hundreds of tickets
    Critical contextual information missing from these tickets
    Duplicate and wasted efforts because your service desk and your monitoring tools are not connected through a bi-directional integration

    What's the cure? AIOps.

    When you adopt AIOps with BigPanda, in about 8-12 weeks, you can reduce your ticket volume by up to 99%, use information from your CMDB, inventory databases, spreadsheets and excel files to add critical context to your tickets, and unify workflows between your IT Ops, helpdesk and ITSM teams.
  • Episode 1 – Bank and Chill – Redefine Customer Segmentation with AI
    Episode 1 – Bank and Chill – Redefine Customer Segmentation with AI
    Anand Subramaniam, Principal Architect AI & ML Practice, Aspire Systems & Anusha Natrajan, Research Analyst, Aspire Systems Recorded: Apr 24 2019 30 mins
    Aspire Systems Original Series - Banking in the Age of Siri

    Episode 1 – Bank and Chill – Redefine Customer Segmentation with AI

    Let’s just call it as it is! Netflix has a high-powered, customer centric AI model. The way Netflix uses Artificial Intelligence to give their customers accurate recommendations is nothing short of mind-blowing.

    Now, what if we told you that banks can be the Netflix of the Finance Industry by just adopting an advanced AI system? It’s true; banks can do so much more for their customers, with such little effort as long as Artificial Intelligence has your back!

    Join us to discover the endless possibilities AI has to offer, and why it is important to take action now. In this webinar learn how to:

    1.Identify and predict current and future customer segments
    2.Construct collaborative models for insightful AI processes
    3.Identify different customer touchpoints and pain points across various platforms for effective customer segmentation

    Tune in on April 24th, 2019 at 10:00 am CST to uncover all the tricks of the trade! Register Now!
  • 7 Tips for Getting Knowledge Management Right for Self-Service
    7 Tips for Getting Knowledge Management Right for Self-Service
    Stephen Mann Recorded: Apr 24 2019 53 mins
    Nearly all organizations know the opportunities and benefits of effective knowledge management, yet many still struggle to achieve long-term ROI. Knowledge management initiatives can be difficult, and your organization may be facing numerous challenges when it comes to people, processes, technology, and the overall culture in your organization. To help you, EasyVista teamed up with ITSM industry leader and analyst, Stephen Mann, in a 45-minute webinar to show you how to effectively create the best possible knowledge management environment for self-service success.
  • WISSENSMANAGEMENT DER SCHLÜSSEL ZU EINER ZUKUNFT MIT KI
    WISSENSMANAGEMENT DER SCHLÜSSEL ZU EINER ZUKUNFT MIT KI
    Aria Naderi Recorded: Apr 24 2019 55 mins
    Künstliche Intelligenz, einst auf den Großbildschirm beschränkt, steht den Verbrauchern in Grundform mit Alexa-, Siri- und selbstfahrenden Tesla-Autos zur Verfügung. Aber was bedeutet das für die Wirtschaft? Wir haben vielleicht noch keine Ex-Machina-ähnlichen Roboter, aber engagierte "Futuristen" schließen sich in vielen Unternehmen der C-Suite an, um zukunftssichere Entscheidungen zu treffen und sich auf zukünftige technologische Innovationen vorzubereiten.

    KI-Tools basieren auf datenbankgestützter, prädiktiver Technologie, die die kognitive Leistungsfähigkeit des Menschen verbessert. Lernen Sie mit uns, wie Sie mit guten Wissensmanagementpraktiken eine solide Grundlage für KI-Initiativen schaffen können.
  • Tietoarkkitehtuuri esimerkin avulla
    Tietoarkkitehtuuri esimerkin avulla
    Anna Aaltonen, Senior Consultant (Coala) Recorded: Apr 24 2019 59 mins
    Tietoarkkitehtuuri koetaan haastavimmaksi arkkitehtuurinäkökulmaksi. Tietomalleja ei tunnu syntyvän ja jos syntyykin, niitä ei osata lukea. Vaikka tietoarkkitehtuuriin käyttäisi paljonkin aikaa, voi olla että hyödyllisiä tuotoksia syntyy vähälti. Tarpeita tietoarkkitehtuurille on sitäkin enemmän. Sen avulla olisi tarve hallita kaikenlaista integraatioista GDPR:ään. Mikä avuksi?

    Anna näyttää webinaarissaan esimerkkien avulla, miten lähdetään liikkeelle liiketoiminnan tietotarpeesta ja edetään edelleen muihin kuvauksiin. Liitämme tietoihin rekisterit sekä erilaiset tietoturvaluokitukset. Näet myös miten IT:n nykytilaa kannattaa lähestyä, jotta saadaan riittävät nykytilan inventaariot aikaan käyttämättä niihin aivan hillittömästi aikaa.
  • ITIL 4: What, How, and Why
    ITIL 4: What, How, and Why
    Lou Hunnenbeck Recorded: Apr 23 2019 61 mins
    Earlier this year, AXELOS, the owners of the ITIL intellectual property, released the Foundation publication and certification part of ITIL 4. But what is it? Our speaker, Lou Hunnebeck, is one of the authors of the new foundation material and the lead editor of the “Direct, Plan & Improve” ITIL 4 publication currently being written. She will speak with us about ITIL 4 and share key information and insights.

    Expect to hear about:
    •The elements and organization of ITIL4 – books and exams
    •How ITIL 4 evolved from earlier versions of the guidance
    •Learning and Certification on ITIL 4
    •Maximizing your value from ITIL 4.

    We’ve all moved into the future. ITIL is doing the same!
  • ServiceNow Automated Test Framework (ATF) – Advanced analysis, ROI and Demo
    ServiceNow Automated Test Framework (ATF) – Advanced analysis, ROI and Demo
    Stephen Makowski-ServiceNow Consultant,Kiruthiga Shanmuga-ServiceNow Lead Developer,Kaviarasan Selvaraj-ServiceNow Evangelist Recorded: Apr 23 2019 53 mins
    ServiceNow has released its Automated Test Framework (ATF) feature in last year’s Istanbul release. Ever since, it’s widely used by ServiceNow customers to create and run automated tests on their ServiceNow instance. In this webinar session, we will conduct an expert analysis on ATF, and find out how organizations are leveraging ATF to achieve ROI from their investment. We will also demo few use cases on ATF to help users navigate through this feature and learn the advantages of using it.

    Key topics in the session include:

    • Automated Testing Framework Overview
    • Why use ATF?
    • ATF for ServiceNow and Upgrades
    • Achieve ROI through ATF and Automation
    • ATF Use case Demo,
    - Creating and running manual tests (timed)
    - How to create and run same tests using ATF version and view the results
    - Overview of Test Suites and scheduled testing/reports
    - Display of Custom Scripts and Configuration
    • Advantages and Disadvantages
  • Supporting Distance Learners Through Remote Support: The SNHU Story
    Supporting Distance Learners Through Remote Support: The SNHU Story
    Michael O’Leary (Southern New Hampshire University), Roy Atkinson (HDI) Recorded: Apr 23 2019 59 mins
    More and more students are taking advantage of online college resources, often in the form of distance learning programs. In fact, a 2018 study by the Babson Survey Research Group found that distance program enrollments have increased for 14 consecutive years. The total distance learning population is now well over 6 million students, and those students depend on robust, reliable technologies, tools, and support to enable their education.

    In this interview with Michael O'Leary, Client Services Manager at Southern New Hampshire University, learn how SNHU, which offers over 200 career-focused online college degree programs, enables student success through remote support. This webinar will feature valuable takeaways for leaders in higher education, but also for any leader in any industry that supports distributed users/customers or remote workers.

    Who Should Attend?

    Service desk/support center directors, managers, supervisors, and team leads looking for better ways to support the ever-increasing numbers of remote faculty, students, customers, or employees.
  • ServiceNow Knowledge19 Sneak Peek: How to Conquer the Conference
    ServiceNow Knowledge19 Sneak Peek: How to Conquer the Conference
    Ellen Daley, Grant Pulver, Dana Canavan, James Hamilton, Ryan Dinwiddie, Meghan Lockwood Recorded: Apr 23 2019 61 mins
    Learn how to maximize your ServiceNow Knowledge 2019 experience. This team of ServiceNow experts (and Knowledge veterans) will cover everything A-Z K19. Join this webinar to...

    - Learn tips to maximize your experience
    - Uncover the questions our clients ask us the most
    - Find out the three things you absolutely must do to ensure it's the most successful Knowledge conference yet
    - Get a preview of two of Acorio's Presentations at K19
  • The Four Levels of Thinking as a Geek Leader
    The Four Levels of Thinking as a Geek Leader
    Tom Cooper, Principal Geek, Bright Hill Group Recorded: Apr 23 2019 52 mins
    As a highly technical expert, you have been successful because of your expert skills. People hire and promote you because of your talent and ability to solve hard problems. This is true. It's also not enough.
    What no one tells you is that you're only looking at one of the three factors that lead to career success.
    In this session, you will:
    - Learn the other two factors (and what you should do about them)
    - Learn the four levels of thinking needed to be an expert who leads
    - Assess where you are in each of the areas
    - Identify at least 2 practical things that you can do to improve your influence, get more support for your ideas and projects and gain more respect as a professional.
  • IGEL Software - Now With the Security and Performance of the PCoIP Protocol
    IGEL Software - Now With the Security and Performance of the PCoIP Protocol
    Arjen van der Meulen, Director Product Management, Teradici & Douglas Brown, Global Technology Evangelist, IGEL Technology Recorded: Apr 22 2019 24 mins
    Did you hear about the latest Teradici-IGEL Collaboration?

    Teradici and IGEL are working together to offer IGEL thin client customers a solution to connect to Amazon WorkSpaces – or any of the major public clouds like AWS, Google Cloud, and Microsoft Azure - with the security and performance of PCoIP.

    In this webinar, learn more about the PCoIP protocol and how it compares to the other protocols on the market.

    Learn more at https://www.teradici.com/
  • Connect any health app, device and data with Salesforce and MuleSoft to reach in
    Connect any health app, device and data with Salesforce and MuleSoft to reach in
    Sean Kennedy, Senior Director, Industry Solutions and Architecture, Salesforce, Matt Serna, Industry Marketing, MuleSoft Recorded: Apr 19 2019 45 mins
    The healthcare industry is witnessing an explosion of medical data from EHRs, fitness trackers, mobile health applications, and more.

    To provide compelling patient experiences, the entire healthcare continuum must think beyond just driving interoperability across clinical data stores and consider how to extend interoperability across all partners and non-clinical applications. Doing so requires a new integrated healthcare strategy that extends beyond those traditionally offered by HL7 interface engines.

    Learn how NYU Langone Health implemented a new integrated approach to provide their call service agents with a one-stop comprehensive patient view, leveraging MuleSoft’s Anypoint Platform to surface real-time data from EHRs and other internal systems into Salesforce Health Cloud.

    In this webinar, you will learn:
    - How healthcare organizations can drive integration to transform their IT delivery model.
    - How modern APIs can enable connectivity across clinical and non-clinical systems.
    - How Salesforce and MuleSoft are tackling EHR interoperability challenges.
  • Introduction to Anuta ATOM Network Workflow Automation
    Introduction to Anuta ATOM Network Workflow Automation
    Anuta Networks Recorded: Apr 18 2019 1 min
    Introduces a graphical designer to automate network provisioning and maintenance activities using low-code automation.

    ATOM Network Workflow Automation eliminates human errors and empowers network administrators to focus on strategic business outcomes rather than mundane daily tasks.
  • Optimization and management of AWS, Azure, Google and private cloud environments
    Optimization and management of AWS, Azure, Google and private cloud environments
    Steve Wilson, VP, Product for Cloud and IoT, Citrix and Robin Manke-Cassidy, Director, Product Marketing, Citrix Recorded: Apr 18 2019 36 mins
    While the cloud does provide businesses greater agility, migrating to the cloud and then managing the cloud is a different story. Learn how Citrix simplifies your cloud journey by easily migrating workloads, provides choice through partnerships with Microsoft, Amazon and Google and other cloud ecosystems, improves the cloud experience for your users and reduces IT management and security complexity for IT.

    Join us and learn how to:

    - Seamlessly migrate workloads to the cloud private or public including Azure, AWS, Google
    - Enhance cloud reliability, speed up load times, reduce network latency
    - Improve cloud worker experience
    - Reduce cloud based security threats with user-centric analytics
    - Simplify cloud management including apps, data, device and network through a single console
  • Lower Service Desk Call Volume with Interactive Knowledge Experiences
    Lower Service Desk Call Volume with Interactive Knowledge Experiences
    Joseph Hurley Recorded: Apr 18 2019 32 mins
    Watch this 30-min live demo showcasing EasyVista’s innovative Self Help solution where we’ll show how you can create an interactive knowledge experience that simplifies access to the answers users need to help solve their problems on their own, resulting in benefits for end users and IT technicians alike.
  • A 360-Degree View of  the Latest APT Groups
    A 360-Degree View of the Latest APT Groups
    Fred Plan, Sr. Threat Intel Analyst, FireEye Recorded: Apr 18 2019 58 mins
    FireEye analysts work to identify cyber espionage trends and gather the evidence needed to name APT groups.

    The most recently named groups—APT38, APT39, APT40—exemplify the variety of state-sponsored threats that network defenders face today: a North Korean operator specializing in bank heists, an Iranian group tracking personal data and specific individuals and a long-established Chinese actor shifting its targeting to reflect changing geopolitics.

    In this webinar, Fred Plan, Sr. Threat Intelligence Analyst at FireEye provides:

    • A high-level overview on how nation-state interests are driving APT activity
    • Insight into the most recent APT groups investigated by FireEye
    • The latest adversary tactics, techniques and procedures (TTPs) these groups use

    Register NOW for the live webinar
  • HP Expert Security Panel
    HP Expert Security Panel
    Graham Cluley | Michael Howard | Louella Fernandes | Howard Roberts Recorded: Apr 18 2019 38 mins
    In this 40-minute HP Security Panel webinar, our expert panelists address the following pressing security issues:

    • Are vendors using scaremongering to sell their own services?
    • If faces are the new fingerprints, what are the security risks?
    • How big a threat is IoT and what’s the next Mirai Botnet?
    • Is the public sector the weakest link?
    • Can security be baked into the hardware?

    Gather your colleagues
    To make the most of this event, why not booking a meeting room, invite your colleagues and watch the discussion together?

    In summary
    This is an excellent opportunity for board-level and IT decision makers to gain invaluable security insights from experts on the frontlines.

    Panelists:
    Graham Cluley: Award-winning security blogger - moderator
    Michael Howard: Head of Security Practice, HP Inc.
    Louella Fernandes: Research Director Quocirca
    Howard Roberts: Print Technologist, HP Inc.
  • How to Get a Better Job in IT
    How to Get a Better Job in IT
    Phil Richards, Paul Underwood Recorded: Apr 18 2019 64 mins
    Are you dreaming of moving up the corporate ladder within your IT department? Do you want to develop your skills to make you a top choice for a promotion, but you’re not sure where to start? Tune into this non-salesy webinar, where Ivanti CISO Phil Richards and COO of Emagined Security Paul Underwood discuss IT recruitment and give invaluable advice to help you progress in your career. We’ll discuss:
    -How the IT industry is changing
    -Tips to progress your career in IT
    -Practical advice to breaking into IT
    -IT skills gaps
    -What executives are looking for in an IT hire
    -And more!
  • Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle of React
    Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle of React
    ISSA International Recorded: Apr 17 2019 56 mins
    In this session, ExtraHop Deputy CISO Jeff Costlow will discuss how security operations teams can escape the cycle of reactivity characterized by constantly responding to a flood of alerts, and move toward a more proactive stance by using the right data sources and workflows, driven by network traffic analysis, to focus on developing proactive capabilities like continuous encryption auditing, policy auditing, and more advanced use cases like threat hunting.

    Moderator:
    Mikhael Felker, Director of Information Security & Risk Management for Farmers Insurance

    Speakers:
    Jeff Costlow, CISO, ExtraHop
    Michael Wylie, Director of Cybersecurity Services, Richey May Technology Solutions.
  • What’s New in Hybrid Cloud Management 2019.02
    What’s New in Hybrid Cloud Management 2019.02
    Neil Miles, Senior Product Marketing Manager and Shweta Mohanty, Solution Architect, Micro Focus Recorded: Apr 17 2019 61 mins
    Join us for an exciting and informative look at the latest release of Hybrid Cloud Management (HCM).

    HCM 2019.02 introduces new features for bringing your existing services under management with our “Brown-to-manage” capabilities – helping you define and manage services that can fulfill a broad number of user resource requests.

    Learn how you can enhance IT’s support for business units across both public and private cloud with new showback subscription detail reports and comparisons for entities.

    HCM provides a complete solution for enterprise multi-cloud management bringing governance to public cloud spending, design and deploy architected hybrid services that run on any cloud, and fully automated IT processes. You will also see a live demo of all the key new features.
  • Advanced Threat Mitigation | Solving the Major Enterprise Challenges
    Advanced Threat Mitigation | Solving the Major Enterprise Challenges
    Jibril Hassan | Executive Pre-Sales Manager | Kaspersky Lab Apr 25 2019 10:00 am UTC 47 mins
    KTMD - A Corporate Cybersecurity Strategy to meet digital disruption challenges

    Join our technical team in our first session to explore the dedicated features that gives Kaspersky Threat Management and Defense an edge.
    Learn:
    - how KTMD exposes advanced attacks with precision machine learning and behavioral analytics, plus how it minimizes false positives to help ensure high levels of productivity for security teams, powered by the Kaspersky Security Network (KSN).
    - discover what the Threats Landscape actually looks like
    - what challenges Enterprises have today and explore how to mitigate against Advanced Threats whilst protecting against Complex Threats

    At the end of the session you'll learn how to effectively PREVENT the threats, Rapidly DETECT the breach and RESPOND to incidents with our Multi-dimensional Advanced Threat Detection with Machine Learning.
  • [Panel] Harnessing Knowledge: The State of Enterprise Application Security
    [Panel] Harnessing Knowledge: The State of Enterprise Application Security
    Daniel Blander, Virtual Clarity (Moderator), Joseph Feiman, CSO, WhiteHat Security & Paul Farrington, CTO, Veracode EMEA Apr 25 2019 3:00 pm UTC 60 mins
    As organizations strive to transform themselves for the digital economy, application development is moving further into the spotlight - and right behind it is application security.

    So in 2019, AppSec can make or break a business. Instead of being overwhelmed by this pressure, there are tools and processes on the market that can help your application both meet and exceed business and security demands.

    From infrastructure-as-code models to API security and DevOps, learn from this panel of global experts how to harness knowledge and accelerate application release cycles, improve security and transform your business.

    Moderator: Daniel Blander, Virtual Clarity
    Panelists:
    Joseph Feiman, Chief Strategy Officer, WhiteHat Security
    Paul Farrington, CTO, Veracode EMEA
  • Cherwell-Everbridge Integrated Solution to Restore IT Services Faster Than Ever
    Cherwell-Everbridge Integrated Solution to Restore IT Services Faster Than Ever
    Vincent Geffray, Sr. Director, Product Marketing, Everbridge; Chuck Darst, Sr. Product Marketing Manager, Cherwell Software Apr 25 2019 3:00 pm UTC 60 mins
    IT incidents happen all the time, from outages, application slowdowns to cyber-attacks and some more critical than others. For IT incidents which require immediate attention, IT experts must be engaged in a timely manner and different groups need to be informed and/or updated. The challenge most organizations are facing is around the coordination of IT incident response when time is of essence. For instance, how to:
    - Aggregate and manage all the relevant information centrally
    - Identify the appropriate information share with different roles
    - Ensure timely and effective response across teams
    - Enable efficient collaboration regardless of people's location

    In this webinar, Chuck Darst from Cherwell and Vincent Geffray from Everbridge will explain how the integrated Cherwell-Everbridge solution helps organizations manage, control and automate their response to IT incidents to minimize the impact on their IT professionals and on their business.
  • Dissecting an OEM Maintenance Contract: What Services are Actually Included?
    Dissecting an OEM Maintenance Contract: What Services are Actually Included?
    Ed Ismail, VP Maintenance; Jordan Bischof, Global Dir., Storage; Joel Coviello, Dir. Enterprise Storage Apr 25 2019 4:00 pm UTC 60 mins
    Understanding the number of services and features included in an OEM maintenance contract can be confusing and knowing which platforms these services will benefit is equally challenging.

    Join this presentation to better understand:
    •The services often “bundled” in an OEM support agreement
    •How the link between hardware maintenance and software licensing affects buying decisions
    •Variables to consider when determining which portions of your data center do and do not require premium services
    •Case-studies highlighting the operational and financial impacts of these practices
  • Creating compelling customer experiences through MDM with Stibo Systems
    Creating compelling customer experiences through MDM with Stibo Systems
    Rob Long, Head of IoT & Senior Director Applied Technology at Stibo & Vishnu Samavedula, Senior Solution Engineer at MuleSoft Apr 25 2019 5:00 pm UTC 35 mins
    Did you know that each retail customer transaction takes an average of 39 different backend systems to complete? Overlapping systems, complex backend integrations, and constant maintenance needs are crippling IT teams as they work to drive the innovation necessary to meet growing consumer expectations.

    This webinar examines how retailers are leveraging MuleSoft’s Anypoint Platform and Stibo Systems Master Data Management platform to bridge online and offline channels, resulting in deeper customer insights, simplified operations, and exceptional customer experiences. Retailers leveraging this approach are seeing an average of a 6% increase in profitability and a 6x increase in customer retention

    In this webinar, you will learn how to:
    - Streamline product lifecycle management processes with your eCommerce systems.
    - Leverage Master Data Management to gain visibility across inventory and customer data.
    - Deliver personalized customer experiences based on past behaviors and purchases.
  • Raising the bar on content moderation for social & gaming platforms
    Raising the bar on content moderation for social & gaming platforms
    Two Hat Security Apr 25 2019 5:00 pm UTC 60 mins
    Social networks today are undergoing a massive paradigm shift when it comes to content moderation. From tragic shootings broadcast live on Facebook, to YouTube removing comments on children's videos due to child predator concerns, social platforms are under fire from users, governments, and law enforcement to adopt better technology and strengthen their content moderation practices.

    It’s not all bad news. Business leaders have also realized that accurate, efficient moderation, coupled with positive reinforcement, can increase user retention and encourage growth.

    But who is responsible for enforcing these policies and practices? How did hate speech, abuse, and extremism become the "cost of being online"? And how can like-minded businesses band together to raise the bar and make their social platforms engaging, safe for all users, and ultimately, more profitable?

    Join Two Hat CEO and founder Chris Priebe and veteran analyst and market influencer Brian Solis for an insightful talk about the changing landscape of online conversations and the role of content moderation. Social abuse and objectionable materials need no longer be the price of admission.

    Register today for this free event!

    You’ll learn:

    * How to start a dialogue in your organization around protecting your audience without imposing on free speech
    * The business benefits of joining the growing movement to "raise the bar"
    * Practical tips and content moderation strategies from industry veterans
    * Why Two Hat’s blend of AI+HI (artificial intelligence + human interaction) is the first step towards solving today’s content moderation challenges

    Speakers:

    * Brian Solis, Principal Digital Analyst at Altimeter, author of "Lifescale"
    * Chris Priebe, CEO & founder of Two Hat Security
    * Stewart Rogers, VentureBeat
  • ITIL 4 Benefits to itSMF
    ITIL 4 Benefits to itSMF
    Ragu Mantatikar Apr 25 2019 6:00 pm UTC 120 mins
    Agenda
     
    1. National itSMF and Local Highlights (Dawn Simmons Khan)
    2. Introduction ITIL and ITIL4 (Ragu Mantatikar)
    a. ITIL4 Value System b. Element and Organization c. ITIL4 evolutions and improvements from earlier versions d. Learning and Certification e. Maximizing and Value Recognition from ITIL4
    3. Wrap Up (SFBay itSMF Board)
    a. Chat Q&A b. Next Events
     
     
    About our Speaker
    Ragu Mantatikar is a multi-skilled IT Service Management, Program/ Project Management specialist and a certified ITIL, Prince2 Trainer with extensive experience in Service delivery, ITSM/ITIL processes and tools implementation in various organizations including internal and outsourced environments across APAC region over 20 years. Currently moved to San Francisco and working in SKAEL Inc., as Vice President looking after Service Delivery of Artificial Intelligence-based products.
  • Get a grip on cloud security: How to lasso your data and apps in Azure and AWS
    Get a grip on cloud security: How to lasso your data and apps in Azure and AWS
    Matt Peters is Chief Technology Officer at Expel & Peter Silberman is Director of Detection & Response at Expel Apr 25 2019 6:00 pm UTC 60 mins
    The cloud is a new frontier and -- just like in those old westerns -- it sometimes seems lawless. Decision makers and developers with credit cards are moving their data to Microsoft Azure and AWS while IT rolls out Office 365. CISOs are getting left in the dust, trying to understand where all the data and apps went and -- once they find them --  figuring out how to reverse engineer security into the cloud.

    The good news is that a smart combination of controls, workflow and some of the basic tools your cloud providers give you can help you find and reign in outlaw activity.

    Good news: Matt Peters, Chief Technology Officer and Peter Silberman, Director of Detection and Response at Expel have your back. They’ll help you figure out how to think about cloud security and what approach makes the most sense for your organization.

    During this webinar, Peters and Silberman will lay out how to set up the right cloud security controls for your particular infrastructure mix, and how to create a workflow for your security team that supports those. Specific topics include:

    •A deep-dive look at how SaaS, infrastructure, and custom applications each require slightly different security controls

    •A new way to think about cloud security controls (Did someone say audit logs? Or configuration monitoring?) that’ll help you figure out what you should be doing based on the type of data you’re storing in the cloud and the cloud services you use

    •Real-world examples of companies that have already set up camp in the cloud and the new security controls and workflows they’ve created to support their new infrastructure

    Whether you’ve thrown a lasso or not, if your cloud security controls and processes could use some fine tuning or you’re just not sure where to start, then this session is for you.
  • The Webroot 2019 Threat Report
    The Webroot 2019 Threat Report
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Apr 29 2019 3:00 pm UTC 60 mins
    Webroot conducted an extensive research on the Threat Landscape for 2019 and presented the findings in the recently published Webroot 2019 Threat Report.

    A few of the key findings that will be covered during this webinar:
    - 40% of malicious URLs were found on good domains
    - 36% increase in the number of phishing attacks
    - 93% of phishing domains offered an HTTPS site
    - 54% of devices that got infected once were re-infected the same year
    - 25 of the top recurring malicious IP addresses were reused 95 times

    Join Webroot's Sr. Threat Research Analyst, Tyler Moffitt to learn about our threat discoveries and analysis to arm your business to overcome modern cybercrime.
  • CloudHealth Upgrade Assistance: Make the Switch, for the Better
    CloudHealth Upgrade Assistance: Make the Switch, for the Better
    Todd Bernhard, CloudCheckr Product Marketing Manager Apr 30 2019 6:00 pm UTC 60 mins
    If you've outgrown the capabilities of CloudHealth and are making the switch to CloudCheckr, this educational webinar will translate the comparable functions and reports from CloudHealth to CloudCheckr. Additionally, attendees will be introduced to numerous features not available to CloudHealth users such as Total Compliance, SnapBack, Automation, White Labeling and more.

    This webinar is the "Rosetta Stone" to help you make the transition for the better.
  • Bringing AI to Enterprises -H2O Driverless AI on IBM Power Systems
    Bringing AI to Enterprises -H2O Driverless AI on IBM Power Systems
    Sinisa Nikolic AP DirecDirector IBM Systems for Cloud and Cognitive Platforms May 2 2019 4:00 am UTC 26 mins
    H2O.ai, a leading open source machine learning and artificial intelligence platform, is here to help data scientists do 'AI with AI!.' H2O.ai is a Leader in the 2018 Gartner Data Science and Machine Learning Platforms and is already driving value in 50% of the Fortune 500 companies and 14,000 enterprises globally.



    Listen to this webinar to find out how you can benefit from this industry leading ML & AI platform.



    - How H2O Driverless AI works
    - How H2O Driverless AI complements IBM’s own PowerAI platform
    - Why IBM Power Systems enables H2O’s platform to get maximum performance gains
  • Effective Incident Response | Kaspersky Threat Management and Defense
    Effective Incident Response | Kaspersky Threat Management and Defense
    Jibril Hassan | Executive Pre-Sales Manager | Kaspersky Lab May 2 2019 10:00 am UTC 59 mins
    A unified security solution for a new era of digital transformation.

    Join our technical team as they provide a deeper dive into the Kaspersky Anti-Targeted Attack (KATA) and Kaspersky Endpoint Detection and Response (EDR) platforms.

    Learn how:
    - it delivers complete visibility across the distributed enterprise environment, together with global threat statistics and reputations, providing contextualised, actionable Intelligence.
    - multi-dimensional advanced detection combines machine learning with advanced detection capabilities using static, behavioural, cloud reputation, sandboxing and pattern based detection engines, together with a Targeted Attack Analyser.
    - automated prevention of and response to advanced threats
    Verdicts are automatically shared via the platform with a whole spectrum of products, including email, web, endpoint and storage protection. As a result, instant action can be taken when an incident emerges.

    This session is highly recommended for technical roles and continues our series of technical talks. If you missed a previous one please check it out on our On-Demand Service.
  • Idaptive’s business solution for password breaches and identity theft
    Idaptive’s business solution for password breaches and identity theft
    Brian Krause, Director of Worldwide Channels at Idaptive May 2 2019 6:00 pm UTC 45 mins
    According to Verizon, 81% of breaches are a result of stolen, weak or default passwords. It is time for organizations, to act on this to protect their valuable business assets and intellectual properties. Our guest speaker Brian Krause, Director of Worldwide Channels, Idaptive and Senthil Palaniappan, CEO Sennovate Inc will share their views with the audience. They will review a strategy to build out a Zero Trust access management platform that lives up to the concept of Never Trust, Always Verify.

    You will Learn :

    - The strategy in building a zero trust management platform
    - How to verify users, validate devices and limit access within a framework
    - How to manage the a full user lifecycle from onboarding to offboarding
    - How to integrate with platforms such as HCM;ITSM’s and NGFWs
    - Idaptive customer implementation experience.
  • Sophisticated cyberthreats of 2018 – what matters?
    Sophisticated cyberthreats of 2018 – what matters?
    Costin Raiu, Head of Global Research & Analysis Team (GReAT) May 5 2019 8:00 pm UTC 40 mins
    Join our jargon-free kick-off session to find out what some of the most sophisticated threat actors were up to: their tools, techniques and targets, and how to spot and combat them and keep your business safe.

    Want to know more about cybersecurity in healthcare? Join our next webinar: https://kas.pr/1ryh
  • Why Artificial Intelligence and Machine Learning are Key for MSPs
    Why Artificial Intelligence and Machine Learning are Key for MSPs
    George Anderson, Director of Product Marketing, Webroot May 7 2019 3:00 pm UTC 60 mins
    As the volume, sophistication and complexity of attacks on SMBs grows, current IT Security solutions need to become more pro-active, automated and effective.

    This presentation looks at how SMBs and MSPs can tackle these issues now and in the near future, and equip with the IT Security expertise and technology they need to defend their Clients and benefit from the this growth market.
  • Creating Omnichannel Brand Experiences with New York & Company
    Creating Omnichannel Brand Experiences with New York & Company
    Allegra Margolis, Industry Marketing, MuleSoft; Alex Pinskiy, Director Omnichannel Systems, New York & Company May 7 2019 5:00 pm UTC 54 mins
    A billion dollar specialty retailer with over 400 retail stores, New York & Company, is leading the way in building an omnichannel strategy. Recently ranked #3 on the list of best omnichannel retailers, New York & Company is driving digital transformation in retail.

    Hear from Alex Pinskiy, Director of Omnichannel Systems at New York & Company, as he reveals their journey and success in building an omnichannel brand and connected store. Learn how New York & Company developed a mobile application with real-time inventory availability and was the first in specialty retail to complete end-to-end transactions using in-store kiosks.

    Attendees will learn:

    - How New York & Company approached omnichannel and is capitalizing on consumer demand to digitize the in-store experience
    - Real-life lessons from an IT strategy that re-platformed to integrate different applications and systems across an entire enterprise
    - Practical steps to building a top omnichannel brand and embracing a new IT operating model that tears down the imaginary wall between brick-and-mortar stores and eCommerce
  • The Role of IT Leadership in Service and Support
    The Role of IT Leadership in Service and Support
    Jeff Rumburg, Managing Partner at MetricNet May 7 2019 6:00 pm UTC 60 mins
    As the gateway to IT for most end users, service and support is the biggest driver of customer satisfaction and can generate a tremendous return on investment. IT leaders and managers who ignore these facts do so at their own peril, for the simple truth is this: the success and longevity of an IT management team are directly tied to the success of service and support. In this session, Jeff Rumburg will use benchmarking data and case studies to demonstrate the untapped value of all service and support organizations.
  • AWS Best Practices for Healthcare and Life Science Compliance
    AWS Best Practices for Healthcare and Life Science Compliance
    Glenn Grant May 7 2019 6:00 pm UTC 60 mins
    Introducing the cloud to an already complicated regulatory landscape can make even the most experienced technology leader apprehensive. Whether migrating on-prem apps to the cloud or building cloud-native apps from the ground up, the AWS cloud’s sheer volume of services can be overwhelming, and even more so in the context of dealing with security and compliance concerns.

    However, once we break down the seemingly insurmountable amount of challenges, one can quickly see how leveraging AWS can actually simplify and improve IT operations. This is crucial in the healthcare and life science space, where the ability to meet and maintain compliance requirements is essential to supporting workloads containing sensitive PHI.

    In this webinar, you will learn about:
    - The relationship between HITRUST and HIPAA
    - The AWS Shared Responsibility Model for Security Measures
    - AWS BAA and understanding HIPAA eligible services on AWS
    - Innovating more quickly and delivering better and faster outcomes for patients
    - Innovating at scale while managing security compliance requirements
    - Meeting and maintaining essential compliance requirements
  • 5 steps to boost your Digital Transformation with Service Management
    5 steps to boost your Digital Transformation with Service Management
    Aria Naderi; Per Strand May 8 2019 9:00 am UTC 45 mins
    Essential to your Digital Transformation success is a modern Service Management strategy combined with a state-of-the-art approach to digital knowledge management. During this webinar you’ll learn how the integration of Enterprise Service Management with Knowledge Management can add tangible value to your business, and how the configurability, scalability and security capabilities of an integrated solution have a direct influence on your process and service efficiency. You will also learn how to quantify the ROI and the TCO of an integrated approach for your organization.

    If you’re seeking an easy-to-use integrated solution, see how Cherwell and ComAround make work flow.
  • 2019 Verizon Data Breach Investigations Report
    2019 Verizon Data Breach Investigations Report
    Alex Pinto May 8 2019 2:00 pm UTC 60 mins
    2019 Verizon Data Breach Investigations Report
  • Use value-stream thinking to define metrics and Automation to improve processes.
    Use value-stream thinking to define metrics and Automation to improve processes.
    Troy DuMoulin VP, Research & Development, Pink Elephant & Vincent Geffray Senior Director, Product Marketing, Everbridge May 8 2019 3:00 pm UTC 57 mins
    Today’s digital businesses face more complex threats than ever before. These range from IT services failures, application latency and outages to performance and security issues, none of which your customers will tolerate. They expect services and applications to be available 24/ 7, wherever they are, and from any device. With these digital offerings increasingly at the core of your business, ensuring good quality service must be your top priority. Therefore solving IT issues as quickly as possible is essential.

    You’ve adopted ITIL and ITSM best practices and your IT teams use lots of point solutions and processes, but are your business users getting the full value of IT? How do you make improvements? Based on what metrics? Are your processes fully integrated? Are the cross-functional teams fully collaborative? How do you measure performance?

    In this webinar, Troy DuMoulin, Vice President of Research and Development at Pink Elephant, and Vincent Geffray, Senior Director of Product marketing at Everbridge will explore:

     How to deliver on four seemingly contradictory objectives: innovation, speed, security, and compliance
     Value-stream thinking vs. framework thinking
     Lean IT and Incident Response Automation to improve end-to-end performance
     Applications for ITSM, DevOps, and agile development
  • How to exploit a software defined world
    How to exploit a software defined world
    Keith Langridge, Jude Andrew, Dominic Elliott, and Joseph O’Sullivan May 9 2019 7:30 am UTC 22 mins
    As we move to a software defined world, in the LAN, WAN and data centre fabric, technology is helping to deliver a step change in customer experience. This could be the move to a self-healing network or transforming the services you offer in the branch through enhanced wi-fi and advanced applications.

    In our latest webinar we look at real world examples of how to deliver moments that matter to your end customer in the branch, to your network team and in your data centre. We’ll also explore the key role of technologies such as SD-WAN, Meraki and Cisco ACI. But technology alone isn’t enough. We’ll consider the other components which need to come together to create the perfect solution.

    Join our webinar with experts from BT and Cisco to find out more.

    Presenters:
    Keith Langridge, VP, network services, BT
    Jude Andrew, Strategic deal lead, BT
    Dominic Elliott, CTO BT global relationship, Cisco
    Joseph O’Sullivan, Portfolio lead, data centre solutions, BT
  • Spear Phishing Attack | Incident Analysis and Response with KTMD
    Spear Phishing Attack | Incident Analysis and Response with KTMD
    Jibril Hassan | Executive Pre-Sales Manager | Kaspersky Lab May 9 2019 10:00 am UTC 41 mins
    A unified security solution for a new era of digital transformation.

    Join our technical team as they provide a deeper dive into the Kaspersky Anti-Targeted Attack (KATA) and Kaspersky Endpoint Detection and Response (EDR) platforms.

    Learn how:
    - it delivers complete visibility across the distributed enterprise environment, together with global threat statistics and reputations, providing contextualised, actionable Intelligence.
    - multi-dimensional advanced detection combines machine learning with advanced detection capabilities using static, behavioural, cloud reputation, sandboxing and pattern based detection engines, together with a Targeted Attack Analyser.
    - automated prevention of and response to advanced threats
    Verdicts are automatically shared via the platform with a whole spectrum of products, including email, web, endpoint and storage protection. As a result, instant action can be taken when an incident emerges.

    This session is highly recommended for technical roles and continues our series of technical talks. If you missed a previous one please check it out on our On-Demand Service.
  • Windows 10 vs. Mac: The Modern Enterprise Migration
    Windows 10 vs. Mac: The Modern Enterprise Migration
    Dean Hager, CEO – Jamf & Garrett Denney, Solutions Architect – Jamf May 9 2019 1:00 pm UTC 60 mins
    Microsoft is ending extended support for Windows 7 on January 14, 2020 and it's time for organizations to make critical technology choices. After nearly a decade, Microsoft will no longer be required to put out security patches or provide support for the Windows 7 operating system (OS). 

    

In our webinar, Windows 10 vs. Mac: The Modern Enterprise Migration, we examine the options organizations have and what they need to know to make the most beneficial and economical decision ahead of the imminent Windows 7 end of life (EOL).
 


    You'll learn:

    •If a Windows 10 or Mac migration is the better option
    •How employee-choice programs are impacting migration decisions
    •Ways to securely offer Mac and Office 365 apps together

    Join us to see how the Windows 7 EOL impacts you and how you can future-proof your technology for today, tomorrow and 10 years down the road. Register now!
  • Enforcement and Containment using Segmentation
    Enforcement and Containment using Segmentation
    Jason Viera, Chief Technology Officer, Josh King, Director of Security Solutions May 9 2019 3:00 pm UTC 45 mins
    Join us for another edition of our popular Always On Virtual Series on Thursday, May 9.

    In this session, learn about Enforcement and Containment with Segmentation presented by Carousel Industries' Josh King—a 19-year InfraSec expert with Carousel Industries.

    In listening to Josh, attendees will learn what an assembly of the right mix of people, process, and technologies might look like to combat this evolving threat landscape. Additionally, hear about Data Center Next Generation Firewalls, Micro-Segmentation practices, and more.

    Join us and learn more about:

    • Leveraging an assumption of breach mindset in planning your overall strategy.
    • Using intent based segmentation to enforce policy, contain threats, and remediate risk.
    • Understanding how infrastructure plays a crucial role in your security strategy and should not be marginalized.
    • Navigating available security technologies to help execute on the vision of visibility and control at both the edge and in the data center.