Hi [[ session.user.profile.firstName ]]

IT Service Management

  • Using Complete ITAM Data to Improve Your ITSM
    Using Complete ITAM Data to Improve Your ITSM
    Jason Yeary Recorded: Aug 22 2019 30 mins
    IT asset management (ITAM) and IT service management (ITSM) are the perfect partners in crime (so to speak). An organization’s success within each discipline can impact the employee’s experience. In fact, these two areas of IT should live together, fully integrated and compliment each other.

    The service desk is the epicenter for employees’ relationships with business technology, and IT asset management holds the data for the technology they use. That means a clear view of asset data and histories can help deliver better incident management and request fulfillment. It can drive successful change, problem, and release management. It can drive automated actions that connect employees to the resources they need, and help manage the risks that you don’t need.

    In this presentation, you’ll learn:
    - How to build a self-sustaining IT asset management strategy as a main pillar to growing your ITSM strategy
    - How to improve your existing incident management process by automatically linking tickets with the underlying assets related to them through asset discovery
    - How to analyze the impact of technology changes, and improve tracking and resolutions of employee impacting issues
  • Data Loss Prevention Deep Dive: Protecting Sensitive Data
    Data Loss Prevention Deep Dive: Protecting Sensitive Data
    Shamil Turner, Industry Principle, Dropbox & Dror Liwer, CISO & Co-Founder, Coronet Recorded: Aug 22 2019 30 mins
    Data volume has been growing exponentially, dramatically increasing opportunities for theft and accidental disclosure of sensitive information. Companies are looking at Data Loss Prevention (DLP) solutions to help identify, monitor and protect sensitive data.
    Watch this Webinar to learn the importance of DLP, and how our products together can help you automate and align to your company’s security strategy.

    Coronet and Dropbox will cover how you can provide risk visualizations and implement a remediation strategy without disrupting end user productivity.

    In this Webinar, we will cover:

    - How to identify and block insider suspicious behavior
    - Ways to protect company data and content via DLP rules
    - How to protect Dropbox Business from malware and ransomware attacks
  • Cost Optimize Your Success in the Cloud
    Cost Optimize Your Success in the Cloud
    Mike Boudreau, Director of Cloud Optimization at Mission Recorded: Aug 22 2019 35 mins
    There is a lot of information out there about saving money/cost optimization on AWS, but a lot of it comes with a catch. In this webinar, the Director of Cloud Optimization at Mission, Mike Boudreau, will identify these potential snags and how to avoid them, so you can optimize your success in the cloud.
  • IT Change Management in a High-Speed World
    IT Change Management in a High-Speed World
    Greg Sanker, Roy Atkinson (Moderator) Recorded: Aug 22 2019 60 mins
    Organizations are increasingly caught between competing goals: They must meet compliance and cybersecurity requirements and produce stable technology environments while simultaneously allowing for high-velocity changes. How can these competing goals be managed?

    In the webinar, Greg Sanker, author of IT Change Management: A Practitioner’s Guide will shed light on how these goals can be reconciled using accepted frameworks and proven methods, including:
    •The changing role of the Change Advisory Board (CAB)
    •Enabling change rather than inhibiting change
    •Using the “blast radius” model to determine risk
  • ITSM 2020: Top 5 Predictions to Guide Your Service Desk Strategy
    ITSM 2020: Top 5 Predictions to Guide Your Service Desk Strategy
    Stephen Mann of ITSM.tools, Matt Klassen, Cherwell Software, VP, Product Marketing Recorded: Aug 22 2019 62 mins
    2020 is just around the corner, and it’s time to begin defining your ITSM goals, strategy, and related investments—with a focus on delivering business value. Join Kari Nelson of Cherwell Software and Stephen Mann of ITSM.tools for an in-depth discussion of the five most significant business and industry trends that will shape the service desk in 2020 and beyond.

    This webinar will explore:
    •Key shifts in both business and IT that will revolutionize the role of the service desk
    •Common barriers to embracing emerging trends and the opportunities they present
    •The imperative of shifting from an operational mindset to a business value mindset
    •How to build a practical roadmap that ensures not only the success but the very survival, of the IT service desk
  • Conversational AI: Go beyond chatbots with intelligent customer and employee exp
    Conversational AI: Go beyond chatbots with intelligent customer and employee exp
    Kevin Fredrick, Managing Partner, OneReach.ai and Vishnu Samevedula, Senior Solution Engineer, ISV Partnerships Recorded: Aug 22 2019 44 mins
    In this webinar we’ll attempt to go around the chatbot hype. With conversational AI, your customers and employees get the answers they need fast. It’s more than simple “if-then” logic; it incorporates natural language to make human-to-machine conversations more like human-to-human ones. The result? Increased customer engagement, continued trust and reliability in your business, and the ability to free up your best thinkers and doers to become more productive than ever before.

    Watch this live webinar to learn how to:
    - Automatically parse data, intent, and tasks from customer interactions using the power of Anypoint Platform combined with no-code/low-code conversational AI solutions from OneReach.ai
    - Build task-specific, channel-agnostic experiences by integrating data from systems and channels like Slack, SMS, Voice, WhatsApp, and Facebook Messenger.
    - Retool your team for operational efficiency by automating the known, handing off the unknown, and more.
  • Control Your Digital Transformation with IT4IT Value Streams
    Control Your Digital Transformation with IT4IT Value Streams
    Lars Rossen, Micro Focus Fellow, Ph.D. MBA and Travis Greene, Director of Product Marketing, Micro Focus Recorded: Aug 22 2019 52 mins
    Digital transformation can be a costly failure without proper controls. How can we learn from others who have succeeded in the journey to avoid repeating mistakes?

    The IT4IT™ Reference Architecture is a vendor-neutral standard maintained by The Open Group that provides a comprehensive framework for delivering value to the business.

    Join us for this webcast with Lars Rossen, Micro Focus Fellow and co-inventor of the IT4IT standard, as he takes you on a fast-paced tour of the nine value streams that tie together the essential functions of IT.

    Learn how each value stream delivers a measurable improvement to controlling and delivering digital services, by connecting enterprise DevOps and hybrid IT management with built-in security and end-to-end insight.
  • [Panel] The New Era of Proactive Problem & Incident Management in the Enterprise
    [Panel] The New Era of Proactive Problem & Incident Management in the Enterprise
    Elisabeth Thomas, Mohan Kompella, Christoph Goldenstern, Beverly Weed-Schertzer Recorded: Aug 22 2019 58 mins
    As AI-enabled tools continue to make a mark on IT operations, the face of proactive problem and incident management in the enterprise is starting to change.

    From making IT staff roles’ easier to encouraging self-service, there is a broad range of AI-powered solutions on offer. Join leading ITSM experts as they debate the complexities, functionalities, benefits and considerations of next-generation cloud and hybrid problem and incident management tools.

    Moderator: Elisabeth Thomas, Launch Product Marketing
    Panellists: Christoph Goldenstern - VP, Kepner Tregoe; Mohan Kompella - VP, BigPanda and Beverly Weed-Shertzer - ITSM Author
  • IAST Stories From the Field
    IAST Stories From the Field
    Michael Haddon IAST Evangelist for North America Recorded: Aug 22 2019 39 mins
    As DevOps continues along its path of domination, organizations are seeking to make use of application security testing tools that leverage automation and easily scale up.

    With that, we see that Interactive Application Security Testing (IAST) is gaining increasing momentum.

    Join industry-experts Michael Haddon for insights on:
    •Why customers are seeking IAST solutions
    •Common IAST use cases
    •How customers are using IAST successfully
    •The benefits customers gain from using IAST
  • Application Awareness with the Power to Take Action
    Application Awareness with the Power to Take Action
    David Davis, Partner & Vexpert, ActualTech Media and Bassam Khan, VP, Product & Technical Marketing Engineering, Gigamon Recorded: Aug 22 2019 54 mins
    Managing and securing a network can feel like a lot like navigating a ship in a turbulent storm at night. You might hear thunder and see lightning, but you never really know when or from where the next threat is coming.

    What if you could permanently illuminate the best path forward? Better visibility will help you uncover hidden threats in your network traffic and prevent waves of duplicate or irrelevant data from overwhelming your analytics and security tools.

    Join Gigamon and ActualTech Media in this webinar and learn how to:
    - Unleash visibility to secure and optimize your network
    - Discover applications that you didn’t even know were running on your network
    - Increase overall performance of your network and shared components
    - Spot potential security vulnerabilities before they become a problem

    Join Gigamon and ActualTech Media in this webinar to learn how to discover applications that you didn’t even know were running on your network.

    Watch as we share insight and demonstrate live how to increase overall performance as well as spot potential security vulnerabilities before they become a problem.
  • 3 Tips for Maximizing the Business Value of ITIL and ITSM
    3 Tips for Maximizing the Business Value of ITIL and ITSM
    George Spaulding of Pink Elephant and Matt Klassen of Cherwell Software Recorded: Aug 21 2019 63 mins
    Value may be overused word, but there is no escaping the reality that IT is faced with pressure to deliver more of it with each passing day. So how can you take what some would make you believe is a legacy framework like ITIL and a commodity technology like ITSM and extract maximum value?

    Join us for this relevant and compelling webinar in which George Spalding, VP at PinkElephant and Matt Klassen, VP at Cherwell Software, will unpack the key challenges IT faces today such as self-service, accelerating pace of change, AI and automation technology, Agile and devops practices, and more. They will show you which value levers have the most effect and give you 3 practical tips you can use today in your organization to impact the business in a real way.
  • HP Podcast: Episode 3: After the Print Security Assessment: What’s Next?
    HP Podcast: Episode 3: After the Print Security Assessment: What’s Next?
    Pam Dill, Senior Security Advisor, HP Inc. Recorded: Aug 21 2019 11 mins
    In the second of a two-part conversation with IDG, Pam Dill, Senior Security Advisor at HP Inc., discusses the options that organizations have to increase their security posture following an engagement with HP’s Print Security Advisory Service.

    Also, be sure to tune in for episodes 1 and 2:

    1:
    https://www.brighttalk.com/webcast/14095/369316?utm_source=HP+Inc+Business+Printing&utm_medium=brighttalk&utm_campaign=369316

    2:
    https://www.brighttalk.com/webcast/14095/369320?utm_source=HP+Inc+Business+Printing&utm_medium=brighttalk&utm_campaign=369320
  • HP Podcast: Episode 2: What Is the HP Print Security Advisory Service?
    HP Podcast: Episode 2: What Is the HP Print Security Advisory Service?
    Pam Dill, Senior Security Advisor, HP Inc. Recorded: Aug 21 2019 14 mins
    In the first of a two-part conversation with IDG, Pam Dill, Senior Security Advisor at HP Inc., discusses how HP Print Security Advisory Service can help you develop a cohesive printing security strategy to protect your business. HP engages stakeholders, assesses the current state of your printing security, and recommends solutions.

    Also, be sure to tune in for episodes 1 and 3:

    1:
    https://www.brighttalk.com/webcast/14095/369316?utm_source=HP+Inc+Business+Printing&utm_medium=brighttalk&utm_campaign=369316

    3:
    https://www.brighttalk.com/webcast/14095/369324?utm_source=HP+Inc+Business+Printing&utm_medium=brighttalk&utm_campaign=369324
  • The State of IT Resilience 2019 Webinar
    The State of IT Resilience 2019 Webinar
    Jayme Williams, Tencate Recorded: Aug 21 2019 60 mins
    2019 Results are in: 84% weren’t IT resilient enough

    The 2019 IDC State of IT Resilience study found that a whopping 84% of respondents experienced a malicious attack in the past 12 months. Of those organizations who suffered a successful attack, 93%of those attacks resulted in data corruption or loss. Do you know how much a malicious IT attack would cost you?

    Find out how to make your organization IT resilient. Remove the risk of disruption and data loss, which can jeopardize customer loyalty, company reputation, productivity and employee morale. With the average cost of downtime at $250,000 an hour across industries, implementing an IT Resilience strategy is necessary not just to survive, but to go beyond your competitors and thrive.

    Join us to learn more about the 2019 results. Hear Jayme Williams from Tencate discuss how IT resilience is keeping their multi-national advanced-manufacturing operations running 24/7, and the threat of ransomware a non-issue.
  • HP Podcast: Episode 1: What Is a “Self-Healing” Printer?
    HP Podcast: Episode 1: What Is a “Self-Healing” Printer?
    Loren Roberts, Senior Security Advisor, HP Inc. Recorded: Aug 21 2019 10 mins
    In this episode, Loren Roberts, Senior Security Advisor at HP Inc., discusses how HP print devices are uniquely designed to protect themselves by detecting when something is amiss and recovering themselves to a state of integrity.

    Also, be sure to tune in for episodes 2 and 3:

    2:
    https://www.brighttalk.com/webcast/14095/369320?utm_source=HP+Inc+Business+Printing&utm_medium=brighttalk&utm_campaign=369320

    3:
    https://www.brighttalk.com/webcast/14095/369324?utm_source=HP+Inc+Business+Printing&utm_medium=brighttalk&utm_campaign=369324
  • AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    AI for Business & IT - 8 Technologies, 9 processes, 10 checklist items
    Arun Trivedi Recorded: Aug 21 2019 45 mins
    As AI becomes all-pervasive, more and more companies need to start thinking about how AI can help in their business transformation and optimization journey. According to a Gartner survey, 54% respondents plan to start deployment within the next few years. However, their are multiple barriers, including finding a starting point and fear of the unknown.

    This webinar breaks down AI for the business & IT - what use cases should CIOs and business organizations focus on and how do we get started? What are the possible use cases? How do we even go about thinking about AI in our organization in a structured way?
  • NTT 2019 Digital Means Business Benchmarking Report
    NTT 2019 Digital Means Business Benchmarking Report
    Wayne Speechly -VP: Advanced Competencies – NTT Ltd. Recorded: Aug 21 2019 60 mins
    Key highlights from the NTT 2019 Digital Means Business Benchmarking Report which provides insights and analysis from surveying more than 1,150 executives across five regions, 15 countries, and 11 industry verticals.

    Digital is starting to gain meaningful traction in organizations. They’re focusing internally to see quick wins but are still grappling with prioritization and organization-wide execution of digital transformation.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    John Grim, Senior Manager, PS Advisory Services Recorded: Aug 21 2019 81 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Erika Gifford, Senior Manager, GSS | Security Operations Advisory
    •Hayden Williams, Senior Manager, VTRAC | Investigative Response
    •John Grim, Managing Principal, VTRAC | Innovations and Development
    •David Kennedy, Managing Principal, VTRAC | Open Source Intelligence

    Preparing for and responding to data breaches and cybersecurity incidents is never easy. It takes knowledge of your environment and its unique threats, effective teamwork, and just as importantly, a rigorous Incident Response (IR) Plan. We'll introduce our monthly listeners to the VIPR Report – the Verizon Incident Preparedness and Response Report. We'll provide a high-level overview of our findings across three years of IR Plan assessments and data breach simulations. Insight will include:

    •Observations and recommendations across the six phases of incident response
    •Top takeaways for building a solid IR Plan and capability
    •Breach Simulations Kits and using these resources to run data breach tabletop exercises

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • [Ep.1]: AI Drives Measurable Success in Customer Engagement
    [Ep.1]: AI Drives Measurable Success in Customer Engagement
    Robin Gareiss, President & Founder, Nemertes Research Recorded: Aug 21 2019 60 mins
    Intelligent Customer Engagement Series [Ep.1] AI Drives Measurable Success in Customer Engagement

    Nearly 50% more companies are using or planning to use AI in their customer engagement initiatives.
    Nemertes recently studied how 518 companies are using AI and analytics to improve their customer experiences. This webinar details:
    • how these companies use AI
    • what measurable improvements resulted.
  • The Risks From Unsecured Networks (APAC)
    The Risks From Unsecured Networks (APAC)
    Jonathan Barnett, Sales Engineer Recorded: Aug 21 2019 19 mins
    ** This is an APAC focused webinar **

    More than 88% of malware trying to enter your network can be stopped with a DNS filtering solution. These allow admins to take back control of their network, securing all devices, preventing internet misuse, and improving productivity. A filtered DNS solution is capable of blocking DDoS attacks, botnets, cache poisoning, and other threats.

    In this webinar, we’ll discuss the importance of network security and how Webroot® DNS Protection can benefit your business and protect against attacks.
  • ITSM Trends You Can't Ignore, and How Your Tech Stack Must Support It
    ITSM Trends You Can't Ignore, and How Your Tech Stack Must Support It
    Josh Caid, Chief Evangelist, Cherwell Software Recorded: Aug 20 2019 59 mins
    The pace of change within the modern enterprise is nothing short of dizzying. Evolving workforce demands, emerging technologies, and increasing expectations that IT deliver quantifiable business value means that pressure on the service desk has never been higher. Unfortunately, many IT organizations continue to rely on a combination of poorly integrated, legacy technologies that create friction for end users, consume precious IT resources, and prevent IT from taking a proactive and strategic role within the business.

    Join Cherwell’s Josh Caid, Chief Technology Evangelist, for a lively discussion on the top trends shaping IT service management, and how IT teams must evolve their ITSM tech stacks in order to keep pace with digital transformation initiatives and ever-changing business needs.
  • B2B Site Search Best Practices: Give Customers What They Need, When They Want It
    B2B Site Search Best Practices: Give Customers What They Need, When They Want It
    Andrew Crowder & Lipika Brahma Recorded: Aug 20 2019 60 mins
    Are visitors looking for a needle in a haystack when they come to your website? Prospects and customers have an insatiable need for information. If they can’t find what they are looking for quickly and easily, they will stop looking and leave.

    That’s why personalized search results delivered with lightning speed are critical. Search is the most popular site function for manufacturers, and the biggest indicator of a customer’s intent to purchase from distributors. The website is now a crucial priority that directly impacts business revenue.

    Join us to learn how Acuity Brands -- the largest manufacturer of lighting and lighting control systems in North America -- completely rebuilt its search-led website in just five months and on budget. Andrew Crowder, VP of Enterprise Architecture, will share his team’s strategy for executing on a critical imperative that came with high expectations, with tips on planning, lessons learned, and what’s next for search.

    Attend this webinar and learn:

    - How to plan and execute a large search-enabled site on time and on budget
    - Why machine learning, AI and a server-less environment are key to delivering quality content for every search use case, every time
    - The efficiencies of enabling business users to manage search right from Sitecore
  • Increase Network Resilience and Optimize Uptime with Inline Bypass
    Increase Network Resilience and Optimize Uptime with Inline Bypass
    John Lehane Senior Product Marketing Manager, Gigamon, Haider Jarral Technical Marketing Engineer, Gigamon Recorded: Aug 20 2019 37 mins
    IT teams are adding newer and more Digital Transformation capable tools. Deployment agility and network resiliency are primary concerns. Inline appliances present potential points of failure in the network. Whether due to a power outage, software malfunction, or processing bottlenecks, failing inline tools can disrupt the very applications and services they are meant to protect.

    With bypass protection, traffic continuity can be maintained as new tools are deployed and tools outages occur.

    Join us to learn how the Gigamon Visibility Fabric with Inline Bypass can enhance the day-to-day operations for Network Operations teams. Topics covered include;

    • Enhancing Infrastructure resiliency and availability
    • Reducing operating and monitoring Costs
    • Improved operation efficiencies and cooperation between IT teams
    • Step by step GUI configuration examples
  • Platform of the Future - Efficiency (Part 5)
    Platform of the Future - Efficiency (Part 5)
    Fady Sharobeem, Systems Engineer, Cisco Meraki Aug 27 2019 1:00 am UTC 9 mins
    IT can be a complex topic for all businesses. In this 5 part video series, we’ll cover how Meraki is changing the industry and simplifying IT with modern technology.

    Learn how to build a full Meraki stack from scratch as well as taking advantage of APIs for variety of use cases.
  • 5 Apple Security Misconceptions
    5 Apple Security Misconceptions
    Kat Garbis, Solutions Architect – Jamf Aug 27 2019 1:00 pm UTC 32 mins
    Despite Apple’s growing market share in the enterprise, there are still misconceptions and concerns surrounding Apple hardware and device security compared to other platforms.

    In this webinar, 5 Apple Security Misconceptions, we examine areas where misinformation lingers and empower IT administrators and their organizations with the facts regarding Mac, iPad, iPhone and Apple TV device security.
    Five misconceptions we’ll cover:

    1.Deploying and securing devices is the same across all platforms
    2.Additional encryption tools are required for Apple
    3.Apple IDs are cumbersome and difficult to use
    4.Apple's native security features are not enough
    5.Binding Mac devices to a network is a must
  • Future-Proof Your ServiceNow Strategy: How to Build a Strategic Roadmap
    Future-Proof Your ServiceNow Strategy: How to Build a Strategic Roadmap
    John Huckle, John Beasley, Marci Parker, Meghan Lockwood Aug 27 2019 5:00 pm UTC 60 mins
    Does your ServiceNow strategy hold-up to the demanding needs of IT, your Customers, and your employees in 2020?

    With ServiceNow expanding beyond IT in recent years with Customer Service Management and HR Service Delivery, we see clients building strategic roadmaps that cross the entire enterprise.

    In this webinar, you'll learn how roadmaps are changing (and how to effectively communicate ServiceNow's value to your executives), roadmap examples from our clients with varying levels of maturity, the keys to success like governance and organizational change management, and what you can still accomplish in 2019.

    Don't miss out on this opportunity - register for the webinar today.
  • 5 Apple Security Misconceptions
    5 Apple Security Misconceptions
    Kat Garbis, Solutions Architect – Jamf Aug 27 2019 6:00 pm UTC 32 mins
    Despite Apple’s growing market share in the enterprise, there are still misconceptions and concerns surrounding Apple hardware and device security compared to other platforms.

    In this webinar, 5 Apple Security Misconceptions, we examine areas where misinformation lingers and empower IT administrators and their organizations with the facts regarding Mac, iPad, iPhone and Apple TV device security.
    Five misconceptions we’ll cover:

    1.Deploying and securing devices is the same across all platforms
    2.Additional encryption tools are required for Apple
    3.Apple IDs are cumbersome and difficult to use
    4.Apple's native security features are not enough
    5.Binding Mac devices to a network is a must
  • How to Use Intelligent Site Search to Increase Conversions
    How to Use Intelligent Site Search to Increase Conversions
    Jon Rossman & Mark Floisand Aug 27 2019 6:00 pm UTC 55 mins
    Your customers don’t have time to browse all over your site. They want to search for – and find – what they need quickly and easily through personalized experiences. And with site search users being up to 5 times more likely to convert, the stakes for relevant results and recommendations are higher than ever before.

    In this webinar, you will learn how Motorola Solutions is adapting its digital strategy to the changing expectations of their customers. Jon Rossman, Solutions Digital Experience Manager at Motorola will share his experience and lessons learned from creating a more relevant, unified and personalized website experience. You’ll hear practical tips to increase website traffic and conversion, and strengthen the relationships with your brand. Additionally, you will learn:

    · Motorola’s strategy and roadmap to create relevant experiences at scale
    · Simple site design and functionality changes that can have a big impact on search
    · How artificial intelligence can help you deliver the most relevant search results
    · How to leverage analytics from the search experience to evolve your web strategy
  • Improve process and increase customer satisfaction through Service Automation
    Improve process and increase customer satisfaction through Service Automation
    Richard de Boer, Pink Elephant Aug 28 2019 9:00 am UTC 45 mins
    On 28 August at 11 a.m. (CET) Pink Elephant trainer Richard de Boer will be talking about Service Automation, looking at customer services in particular and how this can increase user satisfaction and the quality of services.
    The webinar will include a discussion on the theoretical framework (Service Automation Framework) and the various steps you need to shape, roll out and make Service Automation a success.
    Learn how Cherwell, a leading provider of Enterprise Service Management, can make this Service Automation process possible. With Cherwell, workflows, facility management and HR processes can easily be created within IT, as can a self-service portal which end users can initiate and work through.
  • 8 Must-Have Remote Desktop Features
    8 Must-Have Remote Desktop Features
    Sam Heiney, Product Solutions Director, Netop Tech Aug 28 2019 1:00 pm UTC 45 mins
    Remote connections are more important than ever as workplaces become more distributed - however, these connections have become a common target for hackers.

    Most of the basic remote access tools like RDP and VNC are vulnerable to flaws and exploits. Popular tools like TeamViewer and LogMeIn also have weaknesses which can put your business at risk. Learn about the 8 essential capabilities your remote access software should have to keep your business network secure:

    - Centralized authentication
    - Advanced access control
    - Application whitelisting
    - Closed user groups and secure deployment packages
    - Secure tunneling
    - Flexible configurations and integrations
    - Centralized dashboard
    - Robust logging
  • Tips for realizing value from & managing impediments to digital transformation
    Tips for realizing value from & managing impediments to digital transformation
    Wayne Speechly - VP: Advanced Competencies – NTT Ltd Aug 28 2019 1:30 pm UTC 60 mins
    Join us for a panel discussion about how organizations are realizing value from and managing impediments to digital transformation. We’ll be discussing some of the results from the NTT 2019 Digital Means Business Benchmarking Report which indicate that digital is starting to gain meaningful traction in organizations. It also reveals that they’re focusing internally to see quick wins but still grappling with prioritization and organization-wide execution of digital transformation.
    Listen to experts in different areas of digital transformation share their insights and provide actionable advice on where to focus and what to avoid.
    Please join our panel discussion:
    Wayne Speechly - VP: Advanced Competencies – NTT Ltd.
    Hayden Lamberti – Digital Strategist, Digital Advisory – NTT Ltd.
    Adrian Ryan – Organizational Design Lead, Digital Advisory – NTT Ltd.
    Brittany Anderson – Innovation Lead – Digital Advisory – NTT Ltd.
    Siegfried Schallenmüller – General Manager – Customer Experience – Dimension Data
  • How to Reduce Incident Volume with AI & Analytics
    How to Reduce Incident Volume with AI & Analytics
    Jim Henaghan, Solutions Architect, Numerify Aug 28 2019 3:00 pm UTC 39 mins
    Every IT organization would like to reduce the number of incidents they experience. The rewards for achieving this are substantial: fewer business disruptions, lower IT costs, and the ability to concentrate talent on growth and innovation. However, with your organization experiencing ever-increasing complexity, where do you start? It can be hard to know with service delivery fragmented across multiple systems, processes, geographies, and providers. These silos of teams and data lead to a lack of visibility, process inefficiencies, and knowledge gaps.

    What analytics-driven best practice can help you reduce incident volume and improve customer satisfaction? Come hear Numerify’s Jim Henaghan, Solutions Consultant, as he shares ways companies like yours have reduced their incident volumes.

    Topics that will be covered include:

    - Proactive analytics-driven incident reduction strategies that target the highest impact problem hot spots

    - How Machine Learning models can help predict incidents and reduce incident volume

    - Using analytics to bring together siloed teams and standardize on best practice processes

    - How text analytics techniques can help extract insights trapped in unstructured data
  • ITSM’s Vital Role in Optimizing Cloud Management
    ITSM’s Vital Role in Optimizing Cloud Management
    Ben Perack, AWS, Cloud Management Tools; Kari Nelson, Cherwell Software Aug 28 2019 5:00 pm UTC 60 mins
    Chances are, your organization is contemplating or in the process of migrating some or all of your infrastructure to the cloud. No matter where you’re at in your cloud journey, you won’t want to miss our upcoming webinar discussing the service desk’s critical role in optimizing—if not transforming—your organization’s approach to cloud management, with an emphasis on business outcomes.

    What we'll learn about:
    - Recent drivers, trends, and insights around cloud adoption
    - Why (and how) ITSM must play a role in your organization’s cloud migration strategy
    - How to ensure key ITSM processes/activities support your hybrid cloud environment
    - A hands-on demonstration of how cloud provisioning, governance, and compliance can be achieved through a centralized self-service portal
  • How to Create a Modern IAM Framework for Healthcare.
    How to Create a Modern IAM Framework for Healthcare.
    Balraj Dhillon, Director, Engagement of Key Accounts Simeio Solutions, Stephen Payne, Principle Solutions Architect-ForgeRock Aug 28 2019 6:00 pm UTC 60 mins
    Healthcare providers are using digital technology to access, secure, and share patient information in order to efficiently deliver care. Does your healthcare organization need assistance in securing and maintaining a single patient identity? Do you have an effective privacy and consent control model across your ecosystem? Without a comprehensive framework for patient data, many healthcare providers have incomplete data on patients that cannot be transferred or shared between and within differing organizations. This results in security, privacy, and data management challenges.

    In this joint ForgeRock and Simeio webinar, you will learn key strategies for modernizing your healthcare organization including:

    · Top challenges your peers face when managing data for authenticating patients, consent, and governing permissions for external physicians and partners

    · How to enable a secure, cost-effective privacy and consent model and data governance framework to unlock innovation

    · How to quickly deploy the right IAM solution for your organization, whether that is on-premise, multi-cloud, or in a hybrid model environment

    Join Balraj Dhillon, Director, Engagement, Key Accounts of Simeio Solutions, and Stephen Payne, Principle Solution Architect of ForgeRock, to learn how to modernize your healthcare organization.
  • Human Digital Journey: From Where We Are to ‘Self-Running’ everything!
    Human Digital Journey: From Where We Are to ‘Self-Running’ everything!
    Farooq Khalid, Vice President, Customer Interactions at SKAEL,Inc. Aug 28 2019 7:00 pm UTC 60 mins
    Human Digital Journey From Where We are to ’Self-Running’ Everything

    Digitization is often confused with digitalization- the task of taking something analog and converting it into a digital form. This webinar is focused to go through What Digitization, Digitalization, and Digital transformation means, what are the current trends happening in the industry? what are the trends around this topic?

    Agenda:
    Is there any confusion? (digitization vs digitalization vs digital transformation)
    Automation everywhere
    The obvious next step: Artificial Intelligence/Cognitive Services
    Wrap Up
    Q & A (All questions will be taken at the end, but please post questions as they arise)
  • Today’s ITSM Challenges are Shaping Tomorrow’s Business Success. Are you ready?
    Today’s ITSM Challenges are Shaping Tomorrow’s Business Success. Are you ready?
    Pierre Andre Aeschlimann Aug 29 2019 9:00 am UTC 45 mins
    This webinar will look at how to leverage the latest in ITSM and make sure that you and your organisation are prepared for what’s coming. We’ll be discussing:

    •The current challenges and trends that are already shaping the future of ITSM.
    •The latest ITSM capabilities that will help you be more efficient, achieve higher user satisfaction, faster time to market and a lower total cost of ownership.
    •Tomorrow’s ITSM, what does it look like and what are the benefits for your organisation, including the future of self-service, next generation knowledge management, codeless automation and seamless operations.
  • Double Dragon: APT41, a Dual Espionage and Cyber Crime Operation
    Double Dragon: APT41, a Dual Espionage and Cyber Crime Operation
    Jacqueline O'Leary,Principal Analyst; Raymond Leong, Principal Threat Analyst; Dan Perez, Principal Threat Analyst Aug 29 2019 3:00 pm UTC 60 mins
    Defending the frontlines of cybersecurity is a never-ending battle, with new advanced persistent threat (APT) groups lurking to steal data, compromise infrastructure, and interfere with victim business operations. FireEye’s newly named threat group, APT41 is no exception. Their aggressive and consistent mode of operation, and highly sophisticated tactics, distinguishes them from other adversaries making them a double threat to contend with.

    APT41 uniquely balances espionage activity concurrently with financially motivated activity driven by personal gain. Since 2012 FireEye has observed APT41 conduct in a wide range of operations including data theft, innovative supply-chain attacks, and the use of unique tools and targeting techniques.

    Join this webinar to hear FireEye Threat Intelligence experts, Jacqueline O’Leary, Raymond Leong and Dan Perez, provide:

    •Insights into attribution and shared tactics between espionage and financially motivated operations
    •Supply chain compromises attributed to APT41 activity
    •Unique malware capabilities and techniques
    •Details on connections to identified personas
  • [Ep.2]: Top 5 'Must-Haves' for Your Next-Generation Contact Center
    [Ep.2]: Top 5 'Must-Haves' for Your Next-Generation Contact Center
    Robin Gareiss, President & Founder, Nemertes Research Aug 29 2019 3:00 pm UTC 60 mins
    Intelligent Customer Experience Series [Ep.2]: Top 5 'Must-Haves' for Your Next-Generation Contact Center

    Contact centers are changing--drastically and swiftly. If you're not keeping pace--or exceeding it--you'll be at a competitive disadvantage.

    Learn what successful companies are doing with areas such as agent experience, interaction channels, and emerging technologies.

    Based on Nemertes' brand new, detailed, Customer Experience research study with 518 organizations, this webinar will explain the five crucial items that must be on your priority list to ensure your contact center is positioned to deliver successful customer experiences.
  • Resolving IT Security Incidents Faster & More Predictably w/ Smart Orchestration
    Resolving IT Security Incidents Faster & More Predictably w/ Smart Orchestration
    Hugh Pyle, Product Manager, IBM Resilient and Diptesh Shah, Director Product Management, Everbridge Aug 29 2019 3:00 pm UTC 60 mins
    Security Operation Centers (SOCs) today are complex environments with a growing volume of attacks, a persistent skill shortage, and a complex regulatory landscape that requires more stakeholders to be involved in the incident response process. Because of this, SOCs constantly struggle to respond rapidly and consistently to the most urgent incidents. The integration between Everbridge IT Alerting and IBM Resilient helps SOCs overcome these challenges and achieve consistent, predictable, and faster response & resolution to complex cyberattacks.

    Join experts Hugh Pyle, Product Manager, IBM Resilient and Diptesh Shah, Director of Product Management, Everbridge IT Alerting for this webinar to learn:
    *How the IBM Resilient-Everbridge IT Alerting integration works within your SOC to streamline coordination and communication during security incident response
    *Strategies to implement Smart Orchestration and automation in your incident response process to engage the right people at the right time to quickly resolve incidents and keep stakeholders informed
    *Actions that can be taken today for maximizing the effectiveness of your SOC and incident response process
  • Apcela Talks | How geography is messing with your cloud strategy
    Apcela Talks | How geography is messing with your cloud strategy
    Mark Casey - Founder & CEO, Sean Kaine - VP of Product & Marketing and Kunal Thakkar - Director of Integration Aug 29 2019 4:00 pm UTC 45 mins
    It’s easy to forget that the “cloud” has a physical footprint, and it’s location is more important than you think. During this Apcela Talks webinar, we’ll take a look at how the physical geography of the cloud impacts the performance of your applications. Join us as we explore:

    1) The dramatic difference in application latency across networks
    2) Mapping cloud applications to users and branch offices
    3) Over-the-Top Internet Services: what they are and how they can help
  • Introducing the Verizon Incident Preparedness and Response Report
    Introducing the Verizon Incident Preparedness and Response Report
    John Grim, Sr. Manager, VTRAC Aug 29 2019 5:00 pm UTC 75 mins
    For 12 years, we've written the book on data breaches. Literally. Now, we've written the book on data breach response. Introducing the VIPR Report, the Verizon Incident Preparedness and Response Report. The VIPR covers a three-year review of our IR Plan assessments and data breach simulation exercises across various industries. In this session, we'll discuss the top 20 key takeaways for incident preparedness and response as it relates to the six phases of incident response:

    Phase 1 – Planning and Preparation
    Phase 2 – Detection and Validation
    Phase 3 – Containment and Eradication
    Phase 4 – Collection and Analysis
    Phase 5 – Remediation and Recovery
    Phase 6 – Assessment and Adjustment

    Speakers will include:
    •John Grim, Managing Principal, VTRAC | Innovations and Development
    •Erika Gifford, Senior Manager, GSS | Security Operations Advisory
    •Hayden Williams, Senior Manager, VTRAC | Investigative Response
  • ITIL is dead! Long live ITIL!
    ITIL is dead! Long live ITIL!
    Josh Caid Sep 4 2019 1:30 pm UTC 45 mins
    ITIL, as we used to know it, was a great framework for organis ing and rationalising our IT processes. But, as an industry, we built a lot of hard-to-move bureaucracy on top of it. These days, businesses have to change rapidly to stay competitive, can ITIL survive the transition?

    Short answer - yes, but only if ITIL evolves at the same pace as digital business revolution. And the good news is this: with V4, ITIL is making the leap out from the IT department into the entire organisational value chain. In this webinar, we'll be looking at some of these differences and how they can apply to your own Digital Transformation initiatives.
  • Die heutigen ITSM-Herausforderungen prägen den Geschäftserfolg von morgen.
    Die heutigen ITSM-Herausforderungen prägen den Geschäftserfolg von morgen.
    Markus Bause; Pierre Aeschlimann Sep 5 2019 8:30 am UTC 45 mins
    In diesem Webinar zeigen wir Ihnen wie Sie die neuesten ITSM Trends nutzen können, damit Ihre Organisation auf die kommenden Entwicklungen vorbereitet ist. Das sind die Diskussionpunkte:
    - Die aktuellen Herausforderungen und Trends, die bereits die Zukunft von ITSM prägen.
    - Die neuesten ITSM-Fähigkeiten, die Ihnen helfen, effizienter zu sein, eine höhere Benutzerzufriedenheit, eine schnellere Betriebseinführung und niedrigere Gesamtbetriebskosten zu erreichen.
    - Wie sieht das ITSM von morgen aus und was sind die Vorteile für Ihr Unternehmen, einschließlich der Zukunft von Self-Service, des Wissensmanagements der nächsten Generation, der no-code Automatisierung und des reibungslosen Betriebs.
  • [Ep.1]: Next-Generation Cybersecurity - Success Metrics, Best Practices & More
    [Ep.1]: Next-Generation Cybersecurity - Success Metrics, Best Practices & More
    Johna Till Johnson, CEO & Founder, Nemertes Research Sep 5 2019 3:00 pm UTC 60 mins
    Cloud & Cybersecurity Series [Ep.1]: Success Metrics, Best Practices & More

    What does it take for enterprise cybersecurity teams to "up their games" to the next level of cybersecurity? What does it mean to be a "successful" cybersecurity organization, and what technologies and practices does it take to become one?

    This webinar presents the highlights of Nemertes' in-depth research study of 335 organizations in 11 countries across a range of vertical industries.

    We separated the best from the rest, and took an in-depth look into what made the most successful organizations that way. Participants will come away with best practices, tools, technologies, and organizational structures that contribute to success. Most importantly, they'll learn how to measure cybersecurity success--and their progress towards it.
  • Take the Complexity Out of Employee Onboarding with ITSM Automation
    Take the Complexity Out of Employee Onboarding with ITSM Automation
    Jaime Spector Sep 5 2019 6:00 pm UTC 45 mins
    This webinar will focus on the process of employee automation for HR onboarding/offboarding operations. It will cover the challenges, use cases applied to specific industries and how automation integrated with ITSM solutions can help to resolve common issues.
  • Automate the security and governance of APIs and microservices
    Automate the security and governance of APIs and microservices
    Aaron Landgraf, Senior Product Marketing Manager, MuleSoft & Edgar Ortiz, Senior Solution Engineer, MuleSoft Sep 6 2019 5:00 pm UTC 33 mins
    Explore Anypoint Security, a suite of capabilities that makes APIs, microservices and integrations running on Anypoint Platform secure and governable by default.

    In this webinar, you'll learn how to:
    - Protect your APIs and microservices from denial of service and content attacks
    - Detect and tokenize sensitive data in-transit across your application network
    - Apply automated policies to enable security by default
    - Move towards a zero-trust architectural model
  • Accélérez la transformation digitale de votre organisation
    Accélérez la transformation digitale de votre organisation
    Mathieu Pierard, Solutions Architect Sep 10 2019 7:30 am UTC 10 mins
    Visibilité centrée sur l'application

    Inscrivez-vous à notre webinar interactif pour comprendre comment la visibilité de votre réseau centrée sur les applications peut accélérer la transformation numérique de votre entreprise.

    La croissance explosive des données et la complexité du réseau vous empêchent-ils d’atteindre vos objectifs ? Vous n'êtes pas seul : le manque de visibilité des applications rend difficile l'identification et la résolution des problèmes de performance.

    Vous comprendrez :

    - Comment simplifier la surveillance du réseau avec une vision granulaire du trafic applicatif
    - Comment détecter, gérer et isoler le shadow IT, les applications non métiers et autres
    - Pourquoi le filtrage du trafic inutile est essentiel pour améliorer l'efficacité de l'outil

    Découvrez comment une visibilité réseau centrée sur les applications peut améliorer les performances de votre réseau et de ses outils.
  • Realise the benefits of your self-service portal
    Realise the benefits of your self-service portal
    Eddie Potts, Pink Elephant; Steve Parker, Cherwell Sep 10 2019 12:00 pm UTC 60 mins
    The term self-service has been in vogue for several years now. However, in practice, many organisations are yet to implement it. And for those that have, many fail to exploit the expected benefits. This webinar will discuss the reasons why self-service portal implementations often fail, as well as identify what are the critical success factors you need to make sure self-service is fully integrated into your business.