Hi [[ session.user.profile.firstName ]]

IT Service Management

  • The State of the Industry: A Mid-Year Research Roundup
    The State of the Industry: A Mid-Year Research Roundup
    Roy Atkinson, Sr. Writer/Analyst Recorded: Jun 18 2019 61 mins
    HDI conducts extensive research throughout the year. In this webinar, we will review our 2019 research to date, examine what it means for the industry, and suggest areas that leaders should be paying attention to, including possible courses of action. We will review the latest findings on:

    •Knowledge management, including self-help/self-service
    •Staffing and compensation findings, including industry health indicators
    •Emerging technologies
    •Consequences for metrics

    Who Should Attend:

    •Service desk/support center directors, managers, supervisors, and team leads interested in understanding why knowledge management and emerging technologies are the key to the future
    •Support center/service desk leaders who need information about the current state of the industry
  • 6 Ways to Increase Self-Service Success on Your Support Portal
    6 Ways to Increase Self-Service Success on Your Support Portal
    David James, Director, Product Marketing, Coveo Recorded: Jun 18 2019 36 mins
    It’s no surprise when it comes to resolving issues and finding information, customers prefer self-service. And organizations prefer it because it dramatically reduces support costs. But if you want to make great self-service a reality on your support portal, you need to give customers an intelligent and intuitive search experience and proactively recommend content that can help.

    Join us for this live webinar to learn the 6 best practices to increase self-service success & boost case deflection.

    In this webinar, we will:

    -Dive into what great self-service looks like and show you the formula for creating relevant support experiences
    -Share case study examples of successful support portals and communities using Coveo
    -Answer questions about AI-powered search capabilities

    If you’re a Customer Service Innovator, a Community Manager, or interested in the latest self-service trends, you won’t want to miss this info-packed session on the power of AI-powered search to boost customer self-service.
  • True or False? Print Security Myths Exposed
    True or False? Print Security Myths Exposed
    Michael Howard, Head of Security, HP Inc. Recorded: Jun 18 2019 7 mins
    HP Head of Security discusses standards in printer security, the competition and why having 'good enough' security isn't 'good enough'.
  • Using Risk Management to Optimize Cybersecurity Costs
    Using Risk Management to Optimize Cybersecurity Costs
    Matt Keane, Senior Director, Risk Management Services – FireEye Mandiant Recorded: Jun 18 2019 57 mins
    Using Risk Management to Optimize Cybersecurity Costs: Best Practices for the C-Suite

    Cyber risk management is increasingly becoming a strategic priority for executive leaders worldwide, though many organizations find it challenging to accurately anticipate, prioritize, and forecast risk mitigation costs.

    C-level executives can meet these challenges by engaging their boards and their security teams to ensure they have the right data to scope risk-based focus areas. This allows the organization to plan effectively while keeping necessary security investments top of mind.

    Join this webinar with Matt Keane, FireEye Mandiant Senior Director of Risk Management Services, as he explains how to:

    • Identify the top risks to your organization based on threat intelligence—and communicate these trends to your board of directors in a way they’ll hear
    • Ensure that the board’s security investment decisions support your organization’s appetite for risk
    • Establish a framework that ensures the alignment of strategic priorities with security spending
    • Track the right risk performance metrics to monitor changes in your unique risk profile, so that you can shift priorities and spending when needed
    • Apply these lessons to a sample business scenario.

    Register for this webinar to learn how executives like yourself can effectively implement these cyber risk management practices today.
  • Cloud Security Best Practices for Defending Against Targeted Attacks
    Cloud Security Best Practices for Defending Against Targeted Attacks
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Recorded: Jun 18 2019 44 mins
    Recent years has seen a move towards more targeted attacks, especially in the realm of ransomware. Attackers are no longer trying to infect the globe, choosing instead to carefully select targets to increase their chances of success and maximise payouts.

    SMBs find themselves in the crosshairs of these attacks. Their defense and contingency plans often leave them vulnerable to ransomware, information theft, and other attacks.

    Is your organisation a soft target? Automated processes can often determine this in a matter of minutes, and cybercriminals are aware.

    Learn how to lift your organisation from easy target to robustly defended with learnings from this webinar.
  • Best Practices for Healthcare Digital Transformation
    Best Practices for Healthcare Digital Transformation
    John Lehane, Product Marketing &Danny Akacki, Technical Account Manager, Gigamon; Lyle Kelly, Sr. Systems Engineer, Forescout Recorded: Jun 18 2019 43 mins
    Are you ready for digital transformation? Transformation begins with visibility – looking inside the network “black box” and understanding exactly what’s running. But we know that can be easier said than done, especially in the healthcare industry where privacy, security and compliance are paramount.

    Join our webinar to hear experts from Gigamon and Forescout delve into the network and security challenges they’ve observed in healthcare. Participants will learn how to surmount the challenges in:

    •Achieving visibility of digital app usage across distributed, dynamic environments
    •Ensuring the most relevant application traffic is delivered to the right security tool
    •Pinpointing lateral movement of malware and shadow IT for faster time to detection and remediation
    •Monitoring, tracking and securing Internet of Medical Things (IoMT) devices
    •Integrating new sites and locations into your network
  • An Introduction to Linke Emory: Amazon S3 Backint agent for SAP HANA
    An Introduction to Linke Emory: Amazon S3 Backint agent for SAP HANA
    Ricardo Casanovas, CTO & Co-Founder Linke / Guillem Torres, Solution Architect and SAP expert. Recorded: Jun 18 2019 57 mins
    SAP HANA database is becoming the new default database engine from SAP. Enterprises worldwide are shifting towards SAP HANA and are relying in hyperscale cloud providers, such as AWS, to run their SAP workloads. While AWS provides the infrastructure and services to run SAP HANA, managing database backups and ensuring its availability in a secure and cloud native way is still a challenge for customers.

    Emory Cloud Backup is Linke’s implementation of the SAP backint agent for SAP HANA to manage database backups on Amazon S3. Its SAP-Certified and supports both single node and multi node (scale-out) SAP HANA deployments on AWS. Emory Cloud Backup integrates seamlessly with Amazon S3 making it an extension of your SAP HANA database and leverages SAP administration tools to manage your database backup catalog stored on Amazon S3.

    Join us to learn how Linke’s Emory Cloud backup can help you manage your SAP HANA database backups on Amazon S3 storage service to:

    •Reduce costs associated to database backups
    •Increase backup performance by reducing recovery times
    •Implement a cloud native solution to manage your cloud based SAP
    HANA databases.
  • What’s New in Service Management Automation X 2019.05
    What’s New in Service Management Automation X 2019.05
    Vesna Soraic, Senior Product Marketing Manager and Dean Clayton, SMA Product Manager, Micro Focus Recorded: Jun 18 2019 59 mins
    The confluence of machine learning and analytics with automation capabilities has made certain types of services possible in new ways and at new levels.

    Join us on this webcast and see how this latest release of Service Management Automation X (SMAX) turns the virtual agent into a smart virtual agent and expands its Enterprise Service Management (ESM) usage.

    Learn how the smart virtual agent can help you:

    • Save your service desk time
    • Resolve user’s issues faster
    • Empower your ESM journey
  • A Red Team Case Study
    A Red Team Case Study
    Steve Ledzian, Vice President & Chief Technology Officer, APAC, FireEye Recorded: Jun 18 2019 48 mins
    Red Team assessments help organizations identify weaknesses in their current detection and response procedures so they can update their existing security programs to better deal with modern threats. We'll look at a red team case study detailed in FireEye's MTrends 2019 report where consultants performed an objective-based assessment that emulated a real cyber attack of an advanced, nation state attacker across the entire attack lifecycle
  • Episode 1 – Bank and Chill – Redefine Customer Segmentation with AI
    Episode 1 – Bank and Chill – Redefine Customer Segmentation with AI
    Anand Subramaniam, Principal Architect AI & ML Practice, Aspire Systems & Anusha Natrajan, Research Analyst, Aspire Systems Recorded: Jun 18 2019 29 mins
    Aspire Systems Original Series - Banking in the Age of Siri

    Episode 1 – Bank and Chill – Redefine Customer Segmentation with AI

    Let’s just call it as it is! Netflix has a high-powered, customer centric AI model. The way Netflix uses Artificial Intelligence to give their customers accurate recommendations is nothing short of mind-blowing.

    Now, what if we told you that banks can be the Netflix of the Finance Industry by just adopting an advanced AI system? It’s true; banks can do so much more for their customers, with such little effort as long as Artificial Intelligence has your back!

    Join us to discover the endless possibilities AI has to offer, and why it is important to take action now. In this webinar learn how to:

    1.Identify and predict current and future customer segments
    2.Construct collaborative models for insightful AI processes
    3.Identify different customer touchpoints and pain points across various platforms for effective customer segmentation

    Tune in on June 18th, 2019 at 01:00 pm ACT to uncover all the tricks of the trade! Register Now!
  • Threat Intelligence on the Frontlines
    Threat Intelligence on the Frontlines
    Tavis Newsome, Senior Intelligence Optimisation Analyst, FireEye Recorded: Jun 18 2019 55 mins
    Today, defeating cyber attackers and the techniques they employ requires real-time insight and intelligence. Staying ahead of attacks, instead of merely reacting, is the heart of cyber threat intelligence. To illustrate the importance of these capabilities to both public and private sector organizations, Tavis will draw from recent real-world intelligence findings, such as FireEye’s collaboration with Facebook and Google to identify Iranian government influence campaigns, as well as our identification of North Korean state-sponsored groups targeting the energy sector.
  • Veritas and AWS: 350 Data Management in a Multicloud World
    Veritas and AWS: 350 Data Management in a Multicloud World
    Rick Wissenz, Matt Sirbu, Jeremy Snow Recorded: Jun 17 2019 44 mins
    Storage cost, the risk of data corruption, and increased strain on IT's time and resources is why many orgniazations look at backup and disaster recovery as their first meaningful move to the public cloud.

    Our webinar: 360 Data Mangement in a Multicloud World with Veritas, AWS, and Softchoice will discuss the effective ways to move and protect your data in AWS.

    In this webinar you’ll learn:

    - Data management and protection across multiple use cases:
    -Backup and Restore
    -Large Data Archive and Recovery
    -Onsite Virtualization Replication, Backup and Failover
    -Multi-site Replication Failover
    -How optimizing your data prior to migration helps you in:
    -Compliance risk
    -Cost overruns
  • Miten tunnistaa strateginen kyvykkyys?
    Miten tunnistaa strateginen kyvykkyys?
    Timo Valli (FM, eMBA), Kirsi Elina Kallio (FL) Recorded: Jun 14 2019 29 mins
    Miten tunnistaa strateginen kyvykkyys?

    Strategisilla kyvykkyyksillä tarkoitetaan organisaation kykyä hallita toimintansa kannalta merkittäviä järjestelmiä, rakenteita ja prosesseja. Digitaalisessa transformaatiossa on usein kyse juuri uudenlaisen strategisen kyvykkyyden rakentamisesta.

    Miten sitten tunnistaa strategian kannalta kriittiset kyvykkyydet, joita kannattaa kehittää? Toisaalta, miten tunnistaa vanhentuneet kyvykkyydet, jotka eivät enää tuota arvoa liiketoimintaan? Miten kyvykkyys eroaa taidon ja osaamisen käsitteistä? Voiko liiketoimintaa kehittää ilman strategisesti kriittisten kyvykkyyksien tunnistamista?

    Webinaarissa saat konkreettisten esimerkkien kautta vinkkejä strategisten kyvykkyyksien tunnistamiseen omassa organisaatiossasi. Aiheeseen johdattelijoina toimivat Smart Capability Management -konseptin kehittäneet Vallum Oy:n asiantuntijat. Smart Capability Management on toimintamalli, joka auttaa yrityksiä tunnistamaan, hallitsemaan ja uudistamaan strategiansa kannalta merkittäviä kyvykkyyksiään.



    Puhujat:

    Timo Valli (FM, eMBA) on johtaja, joka on tehnyt pitkän työuran vakuutus- ja terveyspalvelualoilla sekä julkisen hallinnon suurissa organisaatioissa. Timo muistetaan mm. Valtiovarainministeriön ict-johtajana ja Valtion tieto- ja viestintätekniikkakeskus Valtorin hallituksen puheenjohtajana. Tällä hetkellä hän toimii digi- ja alusta-ajan uutta työtä (New Work) jäsentävän Vallum Oy:n toimitusjohtajana ja strategiakonsulttina.

    Kirsi Elina Kallio (FL) on kokenut työtoiminnan kehittäjä ja tutkija. Hän on opettanut, valmentanut ja tutkinut työelämän oppimiseen ja muutokseen liittyviä teemoja yrityksissä ja yliopistoissa yli kahdenkymmenen vuoden ajan. Yrittäjänä Kirsin erityisalaa on kasvattaa asiakasyritystensä kilpailukykyä tarjoamalla tieteellisesti testattuja välineitä strategisten kyvykkyyksien rakentamiseen.
  • Doing AI with AI: How Open-Source AI Platforms Help Data Scientists
    Doing AI with AI: How Open-Source AI Platforms Help Data Scientists
    Sinisa Nikolic AP DirecDirector IBM Systems for Cloud and Cognitive Platforms Recorded: Jun 14 2019 26 mins
    H2O.ai, a leading open source machine learning and artificial intelligence platform, is here to help data scientists do 'AI with AI!.' H2O.ai is a Leader in the 2018 Gartner Data Science and Machine Learning Platforms and is already driving value in 50% of the Fortune 500 companies and 14,000 enterprises globally.



    Listen to this webinar to find out how you can benefit from this industry leading ML & AI platform.



    - How H2O Driverless AI works
    - How H2O Driverless AI complements IBM’s own PowerAI platform
    - Why IBM Power Systems enables H2O’s platform to get maximum performance gains
  • Live Demo of OptiView XG
    Live Demo of OptiView XG
    Mike Pennacchi, Network Protocol Specialists Recorded: Jun 13 2019 64 mins
    Troubleshooting performance problems in today’s networks is only getting more complex:

    • Growth of 10G links with limited visibility
    • Increasing demands on wireless networks
    • Complex infrastructure with outdated documentation

    Last thing you need are hard-to-use tools that are complex in themselves or require extensive training before you can effectively use them.

    Please join us for a free webinar where Mike Pennacchi will talk about these issues and present a live demo of the OptiView® XG Network Analysis Tablet.

    XG expedites network performance problem solving by automating root cause analysis and providing guided troubleshooting to address problem areas - anywhere on the network – wired or wireless.
  • Move From One Bot to Many
    Move From One Bot to Many
    Steve Walker, Roger Arias Recorded: Jun 13 2019 28 mins
    Robotic process automation, or RPA, can speed up and improve many rote business processes. Learn how to scale up or expand into other areas of your business with tips to accelerate your success, from technologies to processes, in a center of excellence framework.
  • Peripherals on the periphery: Security in the Internet of Things
    Peripherals on the periphery: Security in the Internet of Things
    Michael Howard, Head of Security, HP Inc. Recorded: Jun 13 2019 7 mins
    Michael Howard, Head of Security at HP, gives an overview on IoT with regards to Print Security. He will also share about the challenges and disparity in devices.
  • DevOps ja SAFe: tehokkuutta arvontuottoon
    DevOps ja SAFe: tehokkuutta arvontuottoon
    Vesa Purho, Tuuli Pesonen Recorded: Jun 13 2019 55 mins
    Mietitkö mistä lähteä liikkeelle DevOps muutoksessa?

    Haluatko holistisen näkökulman DevOpsiin?

    Tule kuuntelemaan Talent Basen ketterien valmentajien käytännön kokemuksia ja oppeja DevOpsista SAFe-mallin kannalta katsottuna. Webinaarissa käydään läpi eri näkökulmia DevOpsiin ja tekemisen optimointiin. Lähtökohtana on kehityksen kokonaisprosessin ymmärtäminen ja arvontuoton lisääminen tunnistamalla ja avaamalla hidasteita prosessin sisältä.
  • SD-WAN Security 101: Defining and Ensuring Security through the Cloud
    SD-WAN Security 101: Defining and Ensuring Security through the Cloud
    David Van-Schravendijk, Product Marketing Cisco Meraki Recorded: Jun 13 2019 55 mins
    IT admins are tasked with maintaining network security and uptime, whilst juggling increasing demand for bandwidth and keeping WAN costs down. Discover in this webinar how Meraki SD-WAN can dramatically reduce the deployment and operational complexity associated with traditional solutions, without sacrificing security!
  • Driving Digital Transformation with Application Intelligence
    Driving Digital Transformation with Application Intelligence
    John LeHane, Product Marketing Gigamon Recorded: Jun 13 2019 19 mins
    Is explosive data growth and network complexity hindering your ability to deliver results? You’re not alone: a lack of application visibility makes it difficult to pinpoint and resolve performance issues.

    Join us for our 20 minute interactive webcast to see how application-aware network visibility can accelerate your organization’s digital transformation.

    You will learn:

    • How to simplify network monitoring with granular insight into application traffic
    • How to detect, manage and isolate shadow IT, non-business apps and others
    • Why filtering unnecessary traffic is critical to improving tool efficiency

    Discover how application-aware network visibility can improve the performance of both your network and its tools.
  • Dropbox + Forrester Webinar: Building Your Digital Transformation Strategy
    Dropbox + Forrester Webinar: Building Your Digital Transformation Strategy
    Rob Koplowitz, VP & Principal Analyst with Forrester Recorded: Jun 12 2019 28 mins
    Digital transformation requires radically different thinking about the role of technology in driving business outcomes. While it’s easy to focus exclusively on customer facing technologies, without an end-to-end technology strategy, these initiatives are doomed to fall on the scrap heap of failed “digital illusions”.

    To drive true change, you must consider the role of your end-to-end technology strategy with an eye toward a foundation that supports new and very different business journeys and outcomes.

    Join Rob Koplowitz, VP & Principal Analyst with Forrester, to learn about the role of a solid technology foundation in supporting your digital transformation strategy.
  • Windows 10 & Office 365 Migration and Optimization Strategies
    Windows 10 & Office 365 Migration and Optimization Strategies
    Matt Crawford, Citrix Dir. Solutions Marketing and Matt Brooks, Citrix Sr. Technical Product Marketing Mgr. Recorded: Jun 12 2019 51 mins
    Learn how to manage the top migration challenges and improve user productivity, security and IT management flexibility.

    With the shift to the Cloud, more companies are moving to Office 365 and Windows 10. Before you make your move, you’ll want to attend this webinar to learn how to manage the top migration challenges with Citrix Workspace and improve user productivity, security and IT management flexibility.

    For a sneak preview, here are few of the top challenges that you’ll learn how to solve by attending the webinar:

    •Managing a mixed environment of Windows 10 and Windows 7 devices with legacy PC management tools
    •Windows 10 application incompatibilities
    •Mobile security risks with running Exchange on-prem
    •Network latency from running O365 in the cloud
    •Managing multiple file hosting services including OneDrive
  • How to Create a Self-Service Portal that Revolutionizes the Employee Experience
    How to Create a Self-Service Portal that Revolutionizes the Employee Experience
    Matt Klassen, VP of Product Marketing, Cherwell Software Recorded: Jun 12 2019 46 mins
    IT teams are under increasing pressure to deliver a service experience that meet both the needs and the expectations its users. As today’s workforce comes to expect greater self-sufficiency, along with personalized and instantaneous service, IT organizations must establish a self-service strategy that elevates—if not revolutionizes—the employee experience.

    In this webinar, Matt Klassen, VP of Product Marketing for Cherwell, will discuss how (and why) the employee experience has become central to mission of IT, and why the IT self-service portal must become the new “face of IT.” He will offer practical guidance on how to create an IT self-service portal that:

    • Maximizes portal utilization and engagement
    • Automates and streamlines the request and fulfillment process
    • Provides the visibility needed to spot trends and identify areas for improvement
    • Improves productivity for both IT staff and employees
  • June Patch Tuesday 2019
    June Patch Tuesday 2019
    Chris Goettl, Brian Secrist Recorded: Jun 12 2019 63 mins
    Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.
  • How to Make Open Source Experimental AI Deployments in the Enterprise
    How to Make Open Source Experimental AI Deployments in the Enterprise
    Scott Campbell, Senior Offering Manager IBM Watson . Kelvin Lui, Technical Product Manager Recorded: Jun 12 2019 51 mins
    Artificial Intelligence (AI) and Machine Learning (ML) became buzzwords in 2018. But only two-fifths (39%) of senior executives believe their organizations are getting the most value out of AI and machine learning according to a RELX Emerging Tech Executive Report, which polled 1,000 US senior executives.



    The question then before enterprises is how they go from proof of concepts to production by transitioning their ML/DL sandboxes into mission-critical AI deployments. In this webinar, you will learn how to capitalize on an open-source based Enterprise AI platform. It enables:



    • Elastic distributed Training: Scale GPUs as Required

    • Drastic reduction of ML/DL Training times: days to hours, hour to minutes

    • Secured and multi-tenant environment

    • Larger, more complex model support

    • Automatic Quality of Service (QoS)
  • Green Demon Denied
    Green Demon Denied
    Shashwath Hegde, Solutions Architect, APAC Jun 19 2019 2:00 am UTC 25 mins
    Managed Detection and Response (MDR) services should spot prevention failures and respond quickly. Good MDR services spot Red Teams and Pen Testers who are tasked with defeating preventative controls. A great MDR service knows when real, malicious threat actors are hiding their footprints amongst Red Team activity. In this war story, we discuss how Managed Defense, FireEye's MDR service, deals with such situations.
  • Der Schlüssel zu Produktivität im Digitalen Unternehmen
    Der Schlüssel zu Produktivität im Digitalen Unternehmen
    Pierre-Andre Aeschlimann Jun 19 2019 8:30 am UTC 45 mins
    Die Digitalisierung verursacht eine radikale Umgestaltung von Unternehmen und sogar ganzer Branchen. Es ist eine radikale Umformung der Interaktion zwischen Kunden und Unternehmen aber auch, immer wichtiger, zwischen Mitarbeiter und deren Unternehmen. Die Rolle der IT ist strategischer als je zuvor. Ein unternehmensweiter Service Management Ansatz hat sich als der beste Ausgangspunkt gezeigt.

    In diesem Kontext werden wir folgende Themen und deren Wichtigkeit erklären:
    •Wie verwalte ich Services effizient quer durch das ganze Unternehmen (IT, HR, Security, Facilities, Marketing, Customer Service,...) ?
    •Wie automatisiere ich die dazugehörenden Prozesse oder Arbeitsabläufe intelligent und einfach?
    •Wie ermögliche ich meinen Kunden und Mitarbeitern eine moderne, intuitive und immersive Erfahrung/Erlebniss/Experience, und warum ist ganz speziell die Employee Experience so wichtig?
    •Das Ganze illustriert durch Fallbeispiele von Kunden aus dem deutschsprachigen Raum (DACH)
  • Visibility in Public Cloud Umgebungen
    Visibility in Public Cloud Umgebungen
    Daniela Fusaro, Senior Solutions Architect Jun 19 2019 12:00 pm UTC 14 mins
    Viele Unternehemen ziehen es in Betracht Ihre existierende Infrastruktur in der Public Cloud zu erweitern oder sogar in einigen Fällen zu ersetzen. Während der Einsatz der Public Cloud unerhörte Flexibilität bietet, was das Ausrollen und die Bereitstellung angeht, stellt es Organisationen vor der Herausforderung, wie sie dieses Umfeld am besten sichern und überwachen können, vor allem wenn es sich um den East-West Traffic im Netzwerk handelt.
    Einsicht im Netzwerkverkehr zu gewinnen ist der erste Schritt, diese Umgebungen zu sichern und dafür zu sorgen, daß alle Resourcen effizient genutzt und ihre Performanz optimiert wird.


    Finden Sie heraus in unserem 15minutigen Webinar wie Sie:

    - Mehr erfahren über die Herausforderungen von Unternehmen bei der Einführung von der Public Cloud
    - Einsicht gewinnen wie Tools mit Hilfe der Gigamon Lösung, Zugriff auf diesem Netzwerkverkehr gewinnen und dabei Sicherheit und Leistung verbessert werden
    - Herausfinden wie Gigamon Netzwerk Packet Broker innnerhalb dieser Umgebungen virtualisiert hat und wie alles mit GigaVUE-FM zusammenhängt
  • Digital? Transformation? Oh, you mean shiny new tech! ...Err, no, I don't!
    Digital? Transformation? Oh, you mean shiny new tech! ...Err, no, I don't!
    Daniel Breston, Technology Leadership Transformation Coach, Virtual Clarity Jun 19 2019 12:00 pm UTC 60 mins
    Sounds easy this Digital Transformation thing. Everyone apparently is doing it. Save a bunch of money. Makes customers happy. Our organisation looks good in the press or on the stock market. Hey – we don’t even have to do it as we can outsource everything to someone else! Nirvana!

    Really? I mean REALLY? What percentage of these initiatives do not meet their expectations? What percentage of these initiatives instead make customers unhappy, or cause staff to leave or cost you money because you did not consider what these 2 words REALLY mean?

    Let’s discuss what Digital Transformation can mean to you in what I hope is an interactive session on language, leadership expectations, metrics, basic tools you need, challenges, outcomes and the impact on your people. This is not a technical session. This is a discussion for leaders at any level on how to best engage the new industrial movement of our time best known as Digital Transformation.

    About the speaker:
    Daniel Breston was a technology leader at some level for over 3 decades for large financial services organisations in the USA and UK. Now at Virtual Clarity, Daniel coaches leaders that want to benefit from or lead technology teams to help organisations do better things faster and safer. You can also find Daniel speaking at ITSM, DevOps or local conferences or join him in discussion blogs.
  • Frictionless Inter-provider Operations with MEF 3.0 & LSO Sonata
    Frictionless Inter-provider Operations with MEF 3.0 & LSO Sonata
    Kevin Vachon, COO, MEF; Bob Mandeville, President, Iometrix; Greg Spear, Solution Manager, Accedian Jun 19 2019 2:00 pm UTC 60 mins
    MEF's Carrier Ethernet generated an 80+ Billion USD market. Growth continues with the latest MEF 3.0 Carrier Ethernet standards, secured with the integrity of MEF services & technology certification. The next frontier is frictionless inter-provider service automation focusing on business applications with the first phase. Imagine automating your serviceability queries, quoting, ordering and inventory for the latest Carrier Ethernet E-access services. Given service providers' top deployment challenge of multi-provider network orchestration, this business-to-business automation could not come at a better time. This is your opportunity to get the latest on MEF 3.0 Carrier Ethernet wholesale services, its automation capabilities, LSO Sonata & APIs, plus how to fast-track your API development while getting first-to-market with MEF's LSO Sonata certification.

    Whether a buyer or seller of Carrier Ethernet services, learn how to best guide your wholesale Carrier Ethernet business with LSO Sonata and MEF 3.0 certifications. Join MEF's COO, MEF's Certification Committee Co-Chair and President of Iometrix, MEF's certification partner, to explore MEF 3.0 Carrier Ethernet, amplified by LSO Sonata.

    What you will learn:

    • Highlights of MEF 3.0 Carrier Ethernet
    • MEF 3.0 Carrier Ethernet E-Access business value
    • New certification process and how to achieve MEF 3.0 Carrier Ethernet certification
    • Inter-provider automation enabled by LSO Sonata
    • LSO Sonata certification program
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Joshua Costa, Manager, PS Advisory Services Jun 19 2019 2:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss threat hunting and incident detection leveraging EDR and the current cybersecurity threat landscape.

    We'll cover:
    •Incident investigation considerations - old versus new
    •Threat remediation and recovery
    •Third-party and threat intelligence integration

    Our Verizon Threat Research Advisory Center presenters will be:
    •Hayden Williams, Sr. Manager, PS Advisory Services
    •Joshua Costa, Manager, PS Advisory Services
    - David Kennedy, Managing Principal, Open Source Intelligence

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com


    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Critical Incident Response: Why Good Enough Is Just Not Good Enough
    Critical Incident Response: Why Good Enough Is Just Not Good Enough
    Valerie O'Connell, Research Director, EMA and Vincent Geffray, Senior Director, Product Marketing, Everbridge Jun 19 2019 3:00 pm UTC 58 mins
    Technology incidents happen every day to companies of all sizes, across every vertical, in all degrees of impact from inconvenient to potentially catastrophic. So, by definition, all organizations do IT incident response. The question is, how well do they do it? Research from leading IT analyst firm Enterprise Management Associates (EMA) shows that unless the response takes advantage of automation, the answer “not nearly well enough” is an understatement.

    With the average time to engage the right response team taking 1 to 2 hours, and the average time to resolve a major outage taking 5 to 6 hours, there is a definitive need for immediate and dramatic operational improvement.

    Leveraging EMA research and a case-based approach, this webinar will explain how to reduce mean time to repair (MTTR) through automated slashing of the time it takes to begin effective response. A simple method for determining the point at which it makes more business sense to invest in an improvement than it does to continue funding the status quo will also be discussed.

    Additionally, webinar attendees will learn more about:

    *Top automation drivers, indicators, obstacles, and benefits realized
    *The case for automating incident response – real numbers from real places
    *Quantifying the high cost of status quo – a conservative approach to demonstrating value
  • Enriching Production Readiness in DevOps with Jobs-as-Code
    Enriching Production Readiness in DevOps with Jobs-as-Code
    Basil Faruqui, Lead Solutions Manager, BMC Jun 19 2019 4:00 pm UTC 45 mins
    A key principle in DevOps is ensuring that code is production ready at any point so you can release on demand based on business justification. How the workflows of business applications are orchestrated in production is a key factor in ensuring production readiness. Join this session to learn how BMC's Control-M uses a Jobs-as-Code approach makes application workflows become part of the DevOps pipeline ensuring that applications are production any time.
  • Simplifying Security Operations with ONE Platform
    Simplifying Security Operations with ONE Platform
    Ben Forster, Sr. Product Marketing Manager, FireEye Jun 19 2019 4:00 pm UTC 60 mins
    Managing security operations is a challenge, and the technologies most organizations are using don’t provide the visibility, detection efficacy, or context they need. As their risk profile expands, organizations rely on hiring more analysts and purchasing more tools, often depending on manual processes to find and mitigate threats. The high volume of alert noise strains security teams’ resources and increases the probability they will miss an alert that matters. Organizations need a single solution that centralizes their security management, provides visibility, and allows them to quickly respond to threats with automation.

    In this webinar:
    - Understand the benefits of technology consolidation
    - Learn about what a single platform can do for your people and processes
    - Discover the untapped potential of your security investments
  • ITSM Trends You Can't Ignore, and How Your Tech Stack Must Support It
    ITSM Trends You Can't Ignore, and How Your Tech Stack Must Support It
    Josh Caid, Chief Evangelist, Cherwell Software Jun 19 2019 5:00 pm UTC 60 mins
    The pace of change within the modern enterprise is nothing short of dizzying. Evolving workforce demands, emerging technologies, and increasing expectations that IT deliver quantifiable business value means that pressure on the service desk has never been higher. Unfortunately, many IT organizations continue to rely on a combination of poorly integrated, legacy technologies that create friction for end users, consume precious IT resources, and prevent IT from taking a proactive and strategic role within the business.

    Join Cherwell’s Josh Caid, Chief Technology Evangelist, for a lively discussion on the top trends shaping IT service management, and how IT teams must evolve their ITSM tech stacks in order to keep pace with digital transformation initiatives and ever-changing business needs.
  • How to Gain Control of Complex Apps Central to Your Digital Transformation
    How to Gain Control of Complex Apps Central to Your Digital Transformation
    John Gudmundson, Sr. Product Marketing Manager Gigamon Jun 19 2019 5:00 pm UTC 53 mins
    Today’s applications — complex, sprawling, multi-tiered, opaque — determine the success or failure of digital transformations. Isn’t it time you took control?

    Join us to learn about Application Intelligence, a pioneering set of capabilities for getting the visibility and the context needed to discover, manage and secure your sophisticated applications.

    During this live demonstration, you’ll see how Application Intelligence helps you:
    •Identify and extract traffic from over 3,000 applications
    •Detect and manage shadow IT and rogue apps
    •Separate unnecessary application traffic to greatly improve tool efficiency

    We’ll also preview its application metadata capabilities for help in solving a number of critical concerns such as troubleshooting subpar performance.

    Register now to see it in action >
  • The Cyber Skills Gap: A Practitioner’s Perspective
    The Cyber Skills Gap: A Practitioner’s Perspective
    Stanley Parret, Principal Consultant, FireEye Managed Defense Jun 19 2019 6:00 pm UTC 60 mins
    The shortage of cybersecurity workers is a growing concern for the teams who are directly responsible for protecting the organization against cyber threats. It’s estimated that by 2021, 3.5 million cyber security positions will go unfilled.

    Join Stanley Parret, Principal Consultant for FireEye Managed Defense, for a look at the unforeseen challenges and consequences of the growing cyber skills gap, especially around protecting against advanced threats. In this webinar, we’ll discuss:

    -The impact of staffing shortages on security practitioners
    -How they’re being required to protect more with less
    -The options available to security teams who need to extend their capacity

    Register now for the webinar
  • Why you need a MID server
    Why you need a MID server
    Chuck Tomasi, Senior Technical Product Marketing Manager; Kreg Steppe, Services Program Mgr; Stacey Bailey, Program Manager Jun 19 2019 6:00 pm UTC 47 mins
    Accessing resources from inside an organization's physical or cloud firewall can be challenging. A Management, Instrumentation, and Discovery (MID) server offers a direct, secure solution. It's a Java application that runs as a Windows service or UNIX daemon on a server in your local network. You can communicate and move data faster, easier, and more securely between a ServiceNow instance and external applications, data sources, and services.

    Join Chuck Tomasi, Kreg Steppe, and Stacey Bailey of ServiceNow for an introduction to this powerful, versatile tool.

    In the webinar, you'll learn:

    - How a MID server works and its benefits
    - Best practices for setting up a MID server
    - Using a MID server with ServiceNow applications, including Orchestration and IntegrationHub

    Speakers:
    - Chuck Tomasi, Senior Technical Product Marketing Manager, Platform, ServiceNow
    - Kreg Steppe, Services Program Mgr, ServiceNow
    - Stacey Bailey, Program Manager, App Development, Training and Certification, ServiceNow
  • Frictionless Inter-provider Operations with MEF 3.0 & LSO Sonata
    Frictionless Inter-provider Operations with MEF 3.0 & LSO Sonata
    Kevin Vachon, COO, MEF; Bob Mandeville, President, Iometrix; Greg Spear, Solution Manager, Accedian Jun 20 2019 1:00 am UTC 60 mins
    MEF's Carrier Ethernet generated an 80+ Billion USD market. Growth continues with the latest MEF 3.0 Carrier Ethernet standards, secured with the integrity of MEF services & technology certification. The next frontier is frictionless inter-provider service automation focusing on business applications with the first phase. Imagine automating your serviceability queries, quoting, ordering and inventory for the latest Carrier Ethernet E-access services. Given service providers' top deployment challenge of multi-provider network orchestration, this business-to-business automation could not come at a better time. This is your opportunity to get the latest on MEF 3.0 Carrier Ethernet wholesale services, its automation capabilities, LSO Sonata & APIs, plus how to fast-track your API development while getting first-to-market with MEF's LSO Sonata certification.

    Whether a buyer or seller of Carrier Ethernet services, learn how to best guide your wholesale Carrier Ethernet business with LSO Sonata and MEF 3.0 certifications. Join MEF's COO, MEF's Certification Committee Co-Chair and President of Iometrix, MEF's certification partner, to explore MEF 3.0 Carrier Ethernet, amplified by LSO Sonata.

    What you will learn:

    • Highlights of MEF 3.0 Carrier Ethernet
    • MEF 3.0 Carrier Ethernet E-Access business value
    • New certification process and how to achieve MEF 3.0 Carrier Ethernet certification
    • Inter-provider automation enabled by LSO Sonata
    • LSO Sonata certification program
  • A Review of Cyber Resilience -- Past, Present, and Future
    A Review of Cyber Resilience -- Past, Present, and Future
    Rob van der Ende, VP APJ, FireEye Mandiant & Naureen Rasul, Head of Cyber Practice Asia, Marsh Pacific Jun 20 2019 6:00 am UTC 60 mins
    Rapidly evolving threats and infiltration techniques have rendered traditional cyber defense strategies insufficient and ineffective. The emerging threat vectors and speed of change amplified by the digital transformation cannot be addressed by traditional means. Globally, laws are also changing to keep pace as cybercrime evolves, knowing no boundaries. Therefore, organizations must be nimble and agile to keep pace with policy changes, especially when expanding across different jurisdictions

    Join us as we discuss three strategic imperatives to strengthen cyber resilience:
    • Understand (know your threats) – Identify organization- and industry-specific cyber threats and regulations calls for robust strategies that include cross-disciplinary considerations.
    • Measure (know yourself) – Quantify the potential financial impact of cyber exposures to compare against the level of risk appetite acceptable to the board. This will determine the amount of investment necessary to mitigate and transfer any residual risk.
    • Manage (know what you can do) – Proactively manage cyber risks by having clear action plans based on your capabilities and capacities to protect against cyber criminals.

    While cyber-attacks are inevitable, proper preparation is the essential element that sets resilient organizations apart from the rest in managing risk, minimizing damage, and recovering quickly from any incidents.
  • Visibilité dans le cloud Public
    Visibilité dans le cloud Public
    Mathieu Pierard, Solutions Architect Jun 20 2019 7:30 am UTC 21 mins
    De nombreuses organisations se tournent vers le cloud public pour étendre - et dans certains cas, remplacer - leur infrastructure existante. Bien que l’utilisation du cloud public offre une flexibilité sans précédent en termes de déploiement et d’approvisionnement, les organisations ont toutefois du mal à sécuriser et à surveiller ces environnements, en particulier lorsque le trafic est-ouest est pris en compte. L'accès à ce trafic est la première étape pour sécuriser ces environnements et pour garantir que les ressources sont utilisées de manière efficace pour optimiser leurs performances.

    Inscrivez-vous à notre webinar pour :
    • Découvrir les défis auxquels les organisations sont confrontées lors de l’adoption du cloud public.
    • Comprendre comment les outils peuvent accéder à ce trafic en utilisant les solutions Gigamon, améliorant ainsi la sécurité et les performances.
    • Comprendre comment Gigamon a virtualisé le collecteur de paquets réseau dans ces environnements et l’a lié avec GigaVUE-FM.
  • Top 5 Cloud Security Myths Debunked
    Top 5 Cloud Security Myths Debunked
    Martin Holste, Cloud CTO, FireEye Jun 20 2019 1:00 pm UTC 55 mins
    Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story.

    Join our webinar, which helps debunk several common myths that jeopardize your fast, secure, migration to the cloud:

    • The cloud is unsafe
    • My organization doesn’t use the cloud
    • My cloud provider will keep me secure
    • The cloud is just someone else’s computer
    • Advanced adversaries aren’t attacking the cloud

    You’ll also learn how to identify a trusted advisor for cloud migration so you can confidently take advantage of cloud advancements.


    Presented by: Martin Holste, Cloud CTO at FireEye
  • Your Processes Are Poor, and Now You Want to Automate Them?
    Your Processes Are Poor, and Now You Want to Automate Them?
    Josh Caid, Chief Evangelist, Cherwell Software Jun 20 2019 1:30 pm UTC 45 mins
    Garbage in, garbage out, or so the saying goes. If you get more efficient at garbage, then you too can have a bigger pile of garbage. Automation is an area where “work smarter, not harder” really comes into play. Let’s look at what some companies have done to avoid this.
  • Detect and Protect: How Devices Can Prevent Intrusion
    Detect and Protect: How Devices Can Prevent Intrusion
    Loren Roberts, Senior Security Analyst, HP Inc. Jun 20 2019 4:00 pm UTC 4 mins
    Loren Roberts, Senior Security Analyst at HP, discusses the role of detection and recovery in the context of printer security and the printer biosphere.
  • How FireEye Protects FireEye
    How FireEye Protects FireEye
    Matt Shelton, Director, Technology Risk & Threat Intelligence, FireEye Jun 20 2019 4:00 pm UTC 60 mins
    FireEye relentlessly protects its customers. But who protects FireEye? Join us for an overview of how FireEye uses its own products and services to protect itself from the same threats faced by customers.

    In this webinar, Matt Shelton, FireEye Director of Technology Risk and Threat Intelligence, will reveal how FireEye:

    •Uses threat intelligence to proactively protect the organization
    •Detects threats using FireEye Network Security products
    •Responds to incidents with FireEye Endpoint Security
    •Leverages Helix as its security operations platform
    •Hunts for known and unknown threats within its environment.
  • ITIL 4 vs ITIL v3 – From CSI to CI ​
    ITIL 4 vs ITIL v3 – From CSI to CI ​
    Allen Ureta Jun 20 2019 4:00 pm UTC 60 mins
    ITIL v3 introduced Continual Service Improvement (CSI) as a service lifecycle stage that identifies and implements improvements across service strategy, service design, service transition and service operation. This approach has been successfully used to transform organizations and provide a framework to plan, engage and improve the people, products, partners and products necessary to achieve organizational objectives. ITIL 4 maintains the importance of Continual Improvement to the overall Service Management System (SVS) with some updates to modern thinking. Applying a multi-dimensional view, along with an integrated system for value co-creation, enablement and delivery, ITIL 4 re-introduces Continual Improvement as both a model for improvement and a general management practice. This session will discuss hot ITIL 4 guiding principles continue to be used as part of the Service Value Chain to deliver value to customers and consumers.
  • What's new with Anypoint Platform - unified platform for integration
    What's new with Anypoint Platform - unified platform for integration
    Ahyoung An, Sr. Product Marketing Manager, MuleSoft and Aaron Landgraf, Sr. Product Marketing Manager, MuleSoft Jun 20 2019 5:00 pm UTC 22 mins
    The latest release of Anypoint Platform helps organizations create and engage a vibrant ecosystem of developers, partners and employees and succeed with API programs.

    This release features the launch of Anypoint API Community Manager and Catalyst Mobilize to increase customer loyalty and engagement, improve internal ops effectiveness and introduce new business models through API programs.

    See an in-depth overview of Anypoint Platform, including how to:
    - Promote API products, increase adoption, and build successful API programs with Anypoint API Community Manager.
    - Build and engage a vibrant ecosystem with Catalyst Mobilize, which includes in-person workshops, playbooks, and tailored exercises.
    - Monitor and optimize the performance of API programs.
    - Additional enhancements within Anypoint Partner Manager (EDI/B2B), Flow Designer, Government Cloud, and more.
  • IAM to SOC as a Service
    IAM to SOC as a Service
    Senthil Palaniappan is Founder & CEO and Kamal.J Solutions Architect at Sennovate Inc. Jun 20 2019 5:00 pm UTC 45 mins
    Identity and access management is important to protect any organization's digital assets. Most organizations does have SSO and MFA as part of their overall security strategy. However, this needs to be extended into protecting on-premise, cloud infrastructure and SaaS applications. Privileged Access Management and SIEM is the next logical step. Questions arises how you can leverage the various security products, to build a true Security Operations Center (SoC).

    • Security by Design -
    • What, why is DevSecOps?
    • From DevOps to DevSecOps
    • How to Merge Security and DevOps for Effective DevSecOps ?
    • Looking to the future (2020) of SoC's
    • MSSP & Soc as a Service
  • 3 Real World ITSM Transformations Using Intelligent Chatbots
    3 Real World ITSM Transformations Using Intelligent Chatbots
    Rich Graves | Director of Product Management at Serviceaide and Micah Garside-White | Solution Architect at Serviceaide Jun 20 2019 6:00 pm UTC 60 mins
    Chatbot technology is more than just hype, it’s transforming IT Service management. Learn how industry leaders are implementing this technology, and reaping the benefits of automation, self-service, and 24x7 support.

    Intelligent Chatbots or next level AI-powered Virtual Agents have digitally transformed IT Service Management resulting in innovative, accessible and “always on” customer support experiences. In this webcast, we’ll present successful Virtual Agent implementations done by leaders from the fast food and manufacturing industries. We’ll also review an MSP’s (Managed Service Provider) success story. Each implementation resulted in compelling improvements in customer satisfaction and operational efficiency.
  • Flow Designer: Accelerate outcomes by automating business processes
    Flow Designer: Accelerate outcomes by automating business processes
    Todd Zambrovitz, Director of Product Marketing, ServiceNow; Jake Burman, Sr. Staff Product Management Manager, ServiceNow Jun 21 2019 4:00 pm UTC 57 mins
    Want to strategically transform your business? Start by reimagining your business processes as digital workflows to deliver faster, smarter experiences. Quickly extend your ServiceNow solutions or build new workflow apps using a fast, intuitive, and extensible platform. Consolidate multiple automation capabilities into a single environment so process owners and developers can build and visualize business processes from a single interface. Empower anyone from process analysts to IT generalists to author end‑to‑end workflows that automate your business processes and accelerate your business outcomes.

    Join Todd Zambrovitz, Director of Product Marketing, Platform and Jake Burman, Sr. Staff Product Management Manager, both from ServiceNow, to hear how ServiceNow Flow Designer modernizes task automation with a codeless, natural language environment. This accelerates innovation by enabling anyone to build flows to deliver business solutions faster.

    Attendees will learn:

    - How process owners can automate processes without code or scripts
    - Ways to automate approvals, tasks, notifications, and record operations
    - How easy it is to connect people, data and systems with triggers, conditions, and actions