Are you an IT service management professional interested in developing your knowledge and improving your job performance? Join the IT service management community to access the latest updates from industry experts. Learn and share insights related to IT service management (ITSM) including topics such as the service desk, service catalog, problem and incident management, ITIL v4 and more. Engage with industry experts on current best practices and participate in active discussions that address the needs and challenges of the ITSM community.
Get inspired to take the next steps in modernizing your IT service management. You’re invited to join us for a live demo of how ServiceNow can help you transform work for the better.
Attend this live demo to learn about:
•Incident, problem, and change management, knowledge base, workflow and service catalog
•How ServiceNow consolidates fragmented tools and legacy systems, and automates work processes on a single cloud platform
•How ServiceNow improves the speed, visibility, and agility of IT
ServiceNow Performance Analytics brings the power of data to stakeholders and subject matter experts at all levels of your business – delivering actionable insights where they can make the most impact. It can help your organization make better decisions, improve business services, and help align with your organization’s goals.
But how do you get started on this journey? How can you optimize business processes and deliver outcomes, such as 10% reduction in IT spend?
We will provide you with the resources you need to get started with Performance Analytics and drive adoption within your organization.
By listening to this webinar, you’ll learn:
•The importance of trusted data to drive business decisions
•How to align stakeholders with overall company goals
•How to drive adoption of Performance Analytics
Join us to discover how ServiceNow customer, AbbVie, is able to demonstrate IT success using Performance Analytics—and what they learned along the way. See how they make quick, performance-based decisions and pinpoint actions to improve overall IT performance. We’ll explore methods to define and choose critical success factors, KPIs and operational metrics, build dashboards, as well as set targets and baselines.
Learn how to:
•Choose and prioritize the right indicators to align with business goals
•Get started immediately with best practices and industry standard metrics
•Identify areas for optimization and quickly take action to accelerate time to value
Harness the power of machine learning to automatically categorize and route incidents without hiring additional data scientists—in less than a day. Really. Join Archana Penukonda, Senior Product Marketing Manager, and George Rubio, Senior Technical Product Marketing Manager, to discover how ServiceNow brings machine learning to everyday work. Independent studies show an impressive 42% ROI with benefits exceeding $100k and a payback period of just 10 months.
•Understand your readiness for machine learning
•See Agent Intelligence in action with a live demonstration
•Uncover best practices to boost your productivity and customer satisfaction with Agent Intelligence
Find out how TESM's multi-branching Five Whys method provides an iterative approach to visualising problem management, getting to the real root cause of a problem to allow the instigation of a complete resolution to prevent reoccurrence.
As enterprises transition their Business Intelligence and Analytics environments to Machine Learning and Artificial Intelligence driven ecosystems, their core data infrastructure has to scale. Focusing only on the compute layers, creates a highly inefficient infrastructure. Vexata with its VX-OS version 3.5 release brings to market transformative economics and breakthrough performance to power these next-generation workloads at scale.e.
You will learn about:
• How to scale core data infrastructures for the transition to Machine Learning and Artificial Intelligence workloads
• What are the key considerations before creating an AI/ML-centric storage infrastructure
• How Vexata's new VX-OS version 3.5 release addresses these challenges
What are the top application components running in containers? What is the lifespan of containers, container images, and services? How is orchestrator adoption changing? What keeps container developers and administrators up at night?
Join us for a discussion of these topics and more in our review of the 2018 Docker Usage Report - based on a sample of 90,000 containers in real-world deployments.
Join us for a 30 minute overview and Q&A session with our Teradici Cloud Access Software Product Manager Mirela Cunjalo. We will share the use cases and benefits of delivering desktops and workstations with Cloud Access Software and its latest features, including the new brokering and provisioning service.
While traditional video conference rooms remain an anchor in most organizations, today’s accessible video technology means any space can be turned into a video collaboration space. In fact, With the growth in remote workers, the need for collaborative meeting spaces is on the rise to connect on and offsite workforces.
Regardless of what solutions you are using today — Polycom, Microsoft, WebEx or GoToMeeting, to keep up with the demands of the modern workforce, you should be able to easily integrate legacy functionality with new capabilities.
During this webinar, collaboration technology experts from Carousel and Polycom will discuss how you can:
• Maximize capabilities within multi-vendor platforms for investment protection
• Design collaborative workspaces with high quality audio, HD content and business-class video
• Drive adoption with easy to use technology that doesn’t scare people away
Adding automation to your IT environment is one of the best ways to fight cloud sprawl and help eliminate service outages. In this 15-minute webinar, Accudata’s Director of Technology Solutions Vid Sista will explain:
How automation solutions enable you to proactively identify service issues
Why cloud sprawl is a major threat to IT security – and how you can stop it
What businesses can do to automate their IT services lifecycle
Between traditional, on-premises data centers, hosted/collocated data centers, and infrastructure as a service (IaaS) through the large cloud providers, where to store your data and run your business critical applications is now a source of significant complexity in the IT world. Understanding your application set and business needs, then determining where best to run those applications and store their data presents a host of challenges both old and new.
So where does Third Party Maintenance fit into all of this? Or better yet….what IS Third Party Maintenance?
Join us for an engaging discussion with Curvature’s IT infrastructure experts to learn:
•What Third Party Maintenance (TPM) is and how it has become a vital market segment focused first and foremost on the client’s needs
•How TPM can cost-effectively extend the life of IT assets and align the lifetime of those assets to your application and software lifecycles
•How TPM can enable you to manage major IT infrastructure transitions in a much more cost effective manner
About the experts:
Chris primarily works in the Services department as a Solutions Architect developing technological solutions and strategies for clients. As a technology expert, Chris leads a team of technical engineers to develop new tactics and processes for clients from development to design. Chris was named Employee of the Year in 2005 and 2009.
Glenn is responsible for the strategic growth and expansion throughout Europe. Previously, Glenn managed Curvature’s international operations and led the company’s entry into Europe in 2002, successfully launching Curvature’s Asia-Pacific division in 2007. Prior to leading this international expansion, Glenn managed enterprise accounts as a distinguished member of Curvature’s U.S. sales organization beginning in 1996.
For this month's theme of 'Cyber-Espionage and Threat Hunting' we'll here from Chris Novak, Director, Investigative Response on cyber-espionage and threat hunting as seen across the Investigative Response Team caseload. We'll then transition into a Q&A session with Jihana Clemetson, Senior Analyst, Threat Intelligence, and Marcus Cymerman, Senior Analyst, Network Forensics to dig further into our cyber-espionage cases and discuss typical indications of being a victim of cyber-espionage, the components of threat hunting, and the approaches to investigating cyber-espionage incidents.
Following the cyber-espionage insights, we'll cover the following topics:
Datenschutz und -absicherung sind für Ihre Organisation von entscheidender Bedeutung und keine Verordnung hat weltweit weiter reichende Anforderungen als die DSGVO. Cherwell ISMS bietet eine einfache Möglichkeit, die DSGVO-Artikel Ihren Sicherheitskontrollen zuzuordnen. Darüber hinaus können Sie mit dem Incident Management die Meldefrist von 72 Stunden einhalten und die betroffenen Personen kontaktieren. Schließlich können Sie unser Self-Service-Portal erweitern, um EU-Bürgern eine einfache Möglichkeit zu bieten, Anfragen in Bezug auf Datenzugriff, Berichtigung, Löschung und Portabilität zu erstellen und zu verfolgen.
According to ESG, 25 percent of organizations say maintaining strong and consistent security across their own data center and multiple public cloud environments with a centralized command-and-control a top CISO concern. So how do you do it?
Join Alaska Airlines Director of Network and Connectivity Solutions Brian Talbert, former Symantec CEO Enrique Salem and ShieldX VP of Products John Parker for a discussion on best practices for secure cloud migration. This panel will discuss:
- How security can help your company adopt a cloud first strategy
- Key threats security teams should expect.
- Why micro-segmentation becomes a critical control when your perimeter defenses are defeated
- How to gain visibility into your data center and cloud environments
- Overcoming common objections encountered during migration
The healthcare industry is witnessing an explosion of medical data from EHRs, fitness trackers, mobile health applications, and more.
To provide compelling patient experiences, providers must think beyond just driving interoperability across clinical data stores, and consider how to extend interoperability across healthcare partners and non-clinical applications. Doing so requires a new integrated healthcare strategy that extends beyond those traditionally offered by HL7 interface engines.
Attendees will learn:
- Why healthcare organizations are leaning on their IT teams to drive business critical and care-centric strategic initiatives.
- How MuleSoft’s Anypoint Platform and Edifecs’ solution can help health organizations unlock medical data from EHRs and other systems, to better improve the patient experience.
- How pre-built connectors, such as the Anypoint Connector for the Edifecs XEngine Server, can enable connectivity and validation of healthcare data––providing patients with vital information, at the right time and place.
Technology is changing at a faster pace than ever and will continue to accelerate. Support centers (helpdesks or service desks) not only need to keep up with the technologies of their customers or users but also the technology within the support center itself.
The customers and end users seeking support will be increasingly mobile, more likely to be using their own devices and applications, and more tech-savvy than in the past. Support centers will be handling fewer easy, “one and done” contacts, and will need increasingly sophisticated knowledge and tools to maintain their organization’s workforce.
You will learn about:
* How new technologies both impact and enable the service and support center’s role
* How to think about the coming innovations in automation and artificial intelligence
Who Should Attend:
* New and established service and support leaders
* Anyone wishing to learn more about how the world of support will change over the next few years
Enterprises today are looking to optimize their IT infrastructure to take advantage of new digital technologies and services.
One of the most popular ways to achieve this is by moving server workloads and applications to the cloud. Since this often happens in large numbers, a cloud transformation project can be a complex effort.
Join us on this webcast and learn how to easily execute even the largest and most complex cloud and data center migration projects, on time and within budget.
GDPR is an EU regulation that comes into effect on the 25th of May 2018.
GDPR is designed to uphold the rights of the individual in terms of how their personal data is handled, stored and secured.
It also places greater responsibility on businesses to observe data security and related processes and practices.
Kaspersky Lab solutions help companies process personal data by offering effective measures to reduce the risks of a data breach, prevent security incidents and enhance visibility of the monitored infrastructure.
During the webinar, we’ll look at the following topics:
•What GDPR is - and isn’t - when it comes to cybersecurity.
•How cybersecurity fits into GDPR-aligned processes.
•The endpoint: a good starting point for the cybersecurity aspect of a data protection strategy.
•The role of storage and the impact of storage security.
•Guarding the bottlenecks: perimeter defenses to reduce the risks of human influence.
•Why data in the cloud requires special security.
•Forewarned is forearmed: the importance of cybersecurity essentials training.
•Understanding the risks: get more from your Data Protection Impact Assessments.
•Kaspersky Lab’s GDPR readiness.
New research from CyberEdge’s 2018 Cyberthreat Defense Report shows that in spite of increasing their security budgets, companies are finding that there is too much data even for new tools to analyze, not enough skilled IT security professionals and little confidence in current investments. Sign up for this webinar to gain key insights into the cyberthreat landscape and how to protect your organization.
Attendees will learn how to:
- Deal with cyberthreat headaches such as increased breaches, vulnerabilities and encrypted traffic.
- Reduce incident response and remediation time with automation.
- Find products that use automation to minimize their dependency on skilled security personnel.
Now in its fifth year, this report provides a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. Register now to learn how your colleagues plan to defend against cyberthreats!
Useissa yrityksissä on ongelmana ärsyttävät excelit ja wordit sekä muut dokumentit, joissa on mahdollisesti henkilöön liittyviä tietoja ja jotka ovat unohtuneet ajan saatossa, joita tallennetaan vain varmuuden vuoksi. Harvemmin tulee ajateltua, että nämä dokumentit ovat myös riski GDPR:n, eli EU:n tietosuoja-asetuksen kannalta. Miten löydetään nämä tiedot, jotka ovat olennaisia sekä nopeutetaan samalla tietopyyntöihin vastaamista että tehostetaan myös hakutoimintoja, takaamalla käyttäjälle samalla ajantasaiset tiedot? Tai miten vastataan tietosuoja-asetuksen vaatimukseen tiedon minimoinnista?
Kaikissa yrityksessä on tietoa, josta ei tiedetä sisältöä tai tarpeellisuutta: rakenteetonta tietoa, jota on kerääntynyt vuosien saatossa ilman päätöksiä ja vailla teknisiä toteutuksia datan hävittämiseen. Kerromme webinaarissamme millaisia ratkaisuja näiden tiedon löytämiseen ja läpikäymiseen sekä kuinka nopeutetaan asiakkaiden tietopyyntöihin vastaamista. Webinaari on suunnattu yrityksen tietohallinnasta vastaaville henkilöille.
uha Sallinen toimii GDPR Tech -yhtiössä konsulttina ja kouluttajana. Hän on taustaltaan nykyaikainen moniosaaja, jota GDPR:ssä oleviin vaatimuksiin tarvitaan. Menneet työtehtävät niin arkkitehtinä kuin myyntitehtävissä antavat riittävän laajan kokonaisnäkymän GDPR:ään ja käytännönläheiset työpajat GDPR:ssä pitävät hänet asiakasrajapinnassa tietoisena Pohjoismaiden ja Baltian GDPR-valmiustilasta.
Rosa-Maria Suorsa toimii Varoniksella Pohjoismaiden liiketoiminnan kehityksen parissa. Varonis on tietoturvaohjelmistoihin ja data-analytiikkaan erikoistunut yhtiö, joka auttaa asiakkaitaan ratkaisemaan muun muassa tiedon hallintaan ja klassifiointiin sekä uhkatekijöiden analysointiin liittyviä haasteita. Varonis auttaa yrityksiä tunnistamaan ja suojaamaan arkaluontoisen sekä henkilötietoja sisältävän datan, ja sitä kautta vastaamaan säädösten ja asetusten vaatimuksiin.
GDPR antaa rekisteröityneille laajat tietosuojaoikeudet. Rekisterin pitäjän tulee yhdessä tietojen prosessoijan kanssa toteuttaa asianmukaiset toimenpiteet oikeuksien toteuttamiseksi, sekä tehdä niiden käyttämisestä mahdollisimman helppoa. Rekisterin pitäjälle GDPR tuo mukanaan tarkat rekisterinpitovaatimukset, joihin liittyy muun muassa vastausaika rekisteröityneelle, henkilöllisyyden varmistaminen sekä suojattu viestinvaihto.
Webinaarissa käsitellään, miten organisaatiot saavat etumatkaa kiristyvien tietosuojaoikeuksien hallinnassa käyttäen apuna tietosuojaohjelmistojen tarjoamaa automatiikkaa pyyntöjen vastaanottamissa, prosessoinnissa sekä kommunikoinnissa rekisteröityjen kanssa.
Jan Nieminen (Account Executive, CIPP/E, OneTrust) is sales and marketing oriented cloud enthusiast. Jan is experienced with helping customers to understand the best solution for them. Jan sees future in cloud technologies and want to take everybody there along with him.
Harness the power of machine learning to automatically categorize and route incidents without hiring additional data scientists—in less than a day. Really. Join Archana Penukonda, senior product marketing manager, and George Rubio, senior technical product marketing manager, to discover how ServiceNow brings machine learning to everyday work. Independent studies show an impressive 42% ROI with benefits exceeding $100k and a payback periof of just 10 months.
•Understand your readiness for machine learning
•See Agent Intelligence in action with a live demonstration
•Uncover best practices to boost your productivity and customer satisfaction with Agent Intelligence
Like many state and local jurisdictions, Howard County, MD, has hundreds of IT applications and systems it relies on to run an efficient government. And like many governments, Howard County found it difficult to obtain an accurate view of its IT environment to better streamline and automate processes. Until now.
Join Howard County’s deputy CIO for an hour-long, informative webinar on how the county uses an innovative IT management platform to streamline its workflows and ultimately provide better service both internally and externally.
Don’t miss this webinar where you will learn:
•Why you should be thinking about service automation to improve workflows
•How IT automation can be easily replicated to streamline business and citizen-facing processes
•Best practices for ensuring success as you start down the service automation path
Based on research by IHS, approximately 70% of WLAN investments are driven by the need to improve network security. After all, prevention of accidental confidential data leakage, protection against theft of data, control of unauthorized devices, and secure management of IoT devices is an essential part of modern Wi-Fi network management. WLAN management systems help with this, but they could be costly solutions that may need to sacrifice client service time to scan for rogue or unauthorized devices. In environments where such a solution is not available (no-Wi-Fi zones) or it is not desirable to enable the rogue detection feature for better client service, a periodic walkthrough survey method can be used with a hand-held device such as the NETSCOUT Aircheck G2. This webinar will show you how to perform a quick and simple security audit of your Wi-Fi network using an AirCheck G2.
The topics to be covered on this webinar are:
* Learn how to import ACL lists from your AP controller
* Learn how to quickly detect and identify unauthorized or rogue Wi-Fi devices
* Learn how to easily locate unauthorized or rogue Wi-Fi devices
Get the rundown of different audiences for the CMDB and how to achieve each of their objectives through out-of-the-box products.
Plus, Find out...
- Why CMDB should be your ServiceNow foundation
- What's the roadmap to success
- Conventional and specialized uses, including services and dashboards
- Real-world examples of companies transforming today
Join us for this webinar as we discuss the visual language necessary to communicate with all the varied stakeholders that are impacted by or part of the vulnerability risk management process: business users, application owners, IT administrators, security professionals, compliance regulators, and others.
We will discuss the data analysis necessary to create and communicate different types of metrics, including :
Business Exposure: What risks are different business entities exposed to due the vulnerabilities?
Vulnerability Impact: How do different technologies and various types of vulnerabilities contribute to risk?
Remediation Performance: How effective and efficient are current remediation efforts?
Great innovators solve important problems that make peoples’ lives better often by designing simple adjustments that look obvious. Innovators are curious, they look for fresh approaches and tend to see a bigger picture than the world that is presented to them. They are always on the lookout for methods, systems or new designs to cut through complexity, reduce time or combine many tasks into one. Ultimately their work ends up being “of service” to their team and their organisation.
If you consider that tomorrow’s problems will not be solved using yesterday’s thinking and you are looking to provide value to your organisation’s strategic planning and problem-solving capabilities then becoming an innovator should be on your short list!
Join Jade Pearson, Regional Lead, Global Training Services with Kepner-Tregoe, in the second of our “Future of Thinking” webinar series where she’ll discuss how innovation can be a friendly component of your work.
What you will learn:
How innovative thinking can improve dealings with customers
Design thinking techniques that solve human-centred problems
A method of “questioning” that helps people help themselves
The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.
Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.
In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:
- Eliminate monitoring blind spots
- Vastly improve the accuracy and precision of data risk detection
- Help organisations meet the GDPR challenge
About the Presenter
Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
A recent survey conducted by Ensono, in partnership with the Cloud Industry Forum, showed that 89% of respondents believed that legacy technology was a barrier to effective digital transformation. Given that many organisations operate a complex technology landscape often with elements in different locations, and with core components that are regarded as ‘legacy but critical’, there needs to be a clear and simple approach to overcoming these obstacles.
Breaking down the barriers requires effective change in people, process and technology to attain a viable level velocity that will enable transformation without being held back by perceptions of legacy issues.
Examining these issues, this webinar will provide insight and thought provoking approaches for organisations seeking to transform their operations against this backdrop.
Nearly 1.5 million dollars. That’s how much an average data breach in the cloud costs enterprises, according to the Global IT Security Risks Survey 2018.
Second only to targeted attacks, breaches affecting IaaS are among the most costly faced by businesses today. But what can be done about this? Apparently, investing more in protection is only part of the solution, as businesses are already allocating a greater share of their IT budgets to security…
During the webinar, Maxim Frolov, VP Global Sales, Kaspersky Lab, will present key findings from the company’s latest report On the Money: Growing IT Security Budgets to Protect Digital Transformation Initiatives. Maxim, along with special guest Jim Reavis, Co-founder and CEO, Cloud Security Alliance, will discuss the potential damage and the main risks associated with cloud breaches, as well as what businesses can do to protect themselves.
Webinar attendees will get the latest insights on the dynamics of corporate security incidents and IT security budgets. They will learn what financial, organizational and technological decisions should be made to protect businesses from the threat of cloud infrastructure breaches.
Kubernetes ensures your deployed applications are always available to users. But how do you deploy applications in Kubernetes without user/service interruptions? Should you write your own scripts using low-level Kubernetes objects, package everything in Helm, or use specific CI/CD tools? There isn’t a clear-cut answer; it always depends.
In this online meetup, Slava Koltovich, CEO of Kublr, will discuss various application deployment options and demonstrate how tools like Spinnaker, Istio, and Jenkins can be used to implement blue-green or canary deployments to ensure zero-downtime application rollout.
Finding and prioritizing application vulnerabilities is an extremely time-consuming, manual process, and it’s one that is rarely undertaken comprehensively. It’s not that application security teams don’t know where risk lies—they do. Many simply lack the time, resources, or context to address those which pose the greatest risk.
The result? Oftentimes, the wrong vulnerabilities are fixed while the more dangerous ones are left unaddressed, forcing your team into reaction mode after the damage is already done.
Join us for our next webinar: “Stop Playing Catch-Up on Risk: How To Prioritize Application Vulnerabilities,” powered by the Kenna Application Risk Module.
In this webinar, you’ll learn:
- The challenges in identifying vulnerabilities at the application layer
- The requirements to better manage application risk
- What application security teams can do to improve their risk posture
- How the Kenna Application Risk Module can help you proactively manage your application risk
Enable security and DevOps teams, developers, and executives to team up to proactively remediate application risk. Join us and see the Kenna Security Application Risk Module in action to learn how you can take a risk-based approach to application security.
When SAP performance suffers, business suffers. This industry-first solution offers ABAP code-level visibility and instrumentation, giving you real-time performance monitoring and diagnostics across mission-critical environments.
See how AppDynamics for SAP can unify monitoring and deliver code-level visibility across your SAP environments. In this webinar, you will see a live demo of SAP performance monitoring and learn how AppDynamics:
* Visualizes SAP components and dependencies in real time
* Establishes dynamic baselines for key SAP transactions
* Diagnoses SAP issues down to a single ABAP statement
* Assists with cloud migrations and SAP S/4HANA transitions
The network doesn’t lie. That’s one reason companies are increasingly turning to their network to simplify and speed up common SOC workflows. Network Traffic Analytics (NTA) complements log data and endpoint instrumentation with an objective view of threat behavior on the network, and dramatically reduces the time to detect and respond to threats.
In this webinar, you will learn how your peers are using NTA technology based on a new market research from 451 Research, as well as ExtraHop’s approach to NTA that goes beyond just detecting threats to also include automated investigation and robust forensics capabilities.
Keeping up with rapidly changing technology is a challenge IT service management leaders across all types of organizations face. And, setbacks caused by outdated, legacy ITSM solutions do not make modernization efforts easy. Whether your goals include artificial intelligence, incorporating DevOps, or automating key IT processes, all ITSM teams must embrace change, and innovate.
Join our upcoming webinar with representatives from higher-education, healthcare, and government as they share successes, blunders, and challenges from the IT trenches.
Can't attend AWS Public Sector Summit 2018? Don't worry, we've got you covered. CloudCheckr Vice President of Partner Alliances, Elissa Livingston, hosts Thursday, June 28 to catch you up on everything you missed.
Elissa will explore the different ways you can reach the full potential of AWS for Government. Part of achieving it is finding a management platform that will give you continuous security monitoring, policy enforcement, and usage visibility to meet all compliance requirements in the sector, including HIPAA, FedRAMP, DFARS and more.
The IT infrastructure management landscape is rapidly changing. Much of what IT used to support, build and deliver on premises is moving up into the Cloud. IT services are moving up and out of the data center and access to these services is moving beyond the four walls of the business. New technologies and devices are spreading and stretching when and where IT services can be used (e.g. Internet of Things). While the shift towards more agile and flexible delivery channels for IT services is creating new business opportunities, it is also creating new business challenges for securing the IT infrastructure and delivering those services safely. How are IT organizations meeting this challenge? What strategies are organizations employing? What technologies, processes and organization changes are taking place to keep the business safe? Learn some answers to these questions and leave with ideas and a roadmap to secure your own IT Infrastructure.
All too often, L&D vendors offer a plethora of tools with no guidance on when to use which tools. The result: weak adoption and sub-optimal learning and performance with no clear path forward. This talk briefly reviews the plethora of exciting new technologies on the L&D market, the psychology and brain science of learning, and a set of best practices for mapping these technologies onto representative learning problems.
First, we start with a quick tour of the array of technologies available to L&D professional. Next, we offer a primer on the psychology and brain science of learning and discover the multiple distinct learning systems that have evolved in the brain to learn different skills. We conclude by providing an example of an effective mapping from learning tools to learning problem that derives from the learning science.
By attending this talk, you can bring back to your organization a better understanding of how psychology and brain science can be leveraged to provide a roadmap for successfully training employees.
If you are struggling to keep up with selecting, testing and deploying new security tools, you won’t want to miss this webinar.
You’ll learn how to:
- Address the unique challenges of securing your unique network.
- Implement smart network segmentation and intelligent tool routing.
- Facilitate testing and deploying tools through a security delivery platform.
- Handle the challenges of setting up realistic tests.
Learn how the GigaSECURE security delivery platform strengthens new security tool testing and streamlines deployment.
Employee attrition is a challenge that every organization, regardless of industry, faces. People change jobs and move companies for many different reasons. This got us thinking—is on-call health a factor that can significantly affect employee attrition rates? If the health factors of on-call pain are bad enough, could it cause your employees to leave your company prematurely?
Join us for our upcoming webinar, where we’ll address these questions and share results from a global survey of IT managers and practitioners on employee attrition.
We’ll also show you how to tackle employee dissatisfaction with real-time operations health data so you can effectively build and retain teams responsible for your digital transformation. You’ll gain insight into the most impactful operations health indicators as they relate to average employee tenure length across your organization, including:
• Notifications that interrupt work and life.
• Notifications that wake up responders at night.
• Notifications that interrupt weekends.
• Notifications that interrupt consecutive weekend days.
The platform economy represents a fundamental shift in how companies operate. Organisations that rely on a single product are being rapidly overtaken by those who can almost instantly react to customer demand, generating product or service innovations as and when required. The flexibility and scale offered by a platform economy approach means every senior executive now has to be fluent in the application of data and technology, and the part the cloud plays in underpinning it all.
But the platform economy isn’t just about doing things faster and more reliably – it’s about using data to accelerate customer interactions and deliver fresh experiences that weren’t previously possible. But how can companies adapt to an environment that embraces experiences and enablement rather than products and cost?
Join this webinar to understand how the platform economy can underpin the customer experience and unlock new scenarios and markets. Yasser Zaki, Global Partner Technology Strategist at Microsoft; and Peter Menadue, Dimension Data, SVP Microsoft Alliance, CX and Workplace Productivity will explore what the platform economy is, and its potential to transform the client experience, as well as the tools you’ll need to effectively realise the platform economy’s potential.
How do you prove you are compliant every month in a constantly shifting technology and regulatory environment?
The combination of ServiceNow's GRC and Performance Analytics enables the automation, simplification, and remediation of complex controls, giving you short order visibility of your compliance.
Toby will focus on how TESM achieved exactly that, with further augmentation, using operational dashboards, resulting in actionable insights to help prevent potential breaches - before they happen.
Toby will demonstrate how to achieve:
1. Reduced risk exposure, because you acted in 3, rather than 30, days
2. Transparent empowerment for proactive compliance
3. The ability for the CIO to identify problem areas in seconds, knowing what needs focus right now
The outcome is a stress-free compliance management experience.
The adoption of DevOps fundamentals has changed the game of software delivery. And DevOps has come a long way from being a methodology that was considered, “for startups only” to what it is today—a culture and people first approach to engineering that enables teams to deploy faster, eliminate silos, and iteratively improve no matter your size. Do it right, and your team stands to release much faster, predictively, and safely, while mitigating unplanned work and making it easier to get ahead of customer experience.
Join us as we discuss the future of DevOps with leaders from Pivotal, New Relic, and PagerDuty. We’ll look back at where DevOps has been, what it’s brought to the table, and where it’s going.
• What are the biggest challenges organizations face when cultivating DevOps adoption?
• What key fundamentals of DevOps are here to stay?
• Can DevOps best practices and fundamentals be adopted beyond the engineering team?
• Is it time for the enterprise to finally embrace DevOps?
• What’s the next big thing for DevOps?
Tori Wield, Developer Advocate, New Relic
Tony Hansmann, Field CTO, Pivotal
Matt Stratton, DevOps Evangelist, PagerDuty
Vera Chen, Technical Marketing Manager, PagerDuty
In Unleashing the Enormous Power of Call Center KPIs, MetricNet provides an overview of the Best Practices in Call Center Performance Measurement. Our best practices help call centers lower costs and increase customer satisfaction!
Viewers will learn:
How the industry's top performing Call Centers track and trend their performance.
How to use Call Center KPIs diagnostically to achieve World-Class Performance.
How to apply Best Practices in Call Center Performance Measurement and Management.
The key success factors in performance measurement from the industry's top performing Call Centers.
Once considered a source of risk for companies, the BYOA (Bring Your Own Application) approach to application management has rapidly evolved into a series of great opportunities for the modern digital workplace. BYOA means employees are now closer than ever to customers, and can operate in a more productive and efficient manner, all contributing to a better work-life balance.
But how do companies strike the right balance between giving their employees the flexibility to manage their own applications, and establishing proper regulations to safeguard and govern BYOA safely and effectively?
This webinar will cover:
•The growth of BYOA from a security risk into a tool that can drive employee happiness and boost productivity, ultimately improving bottom line results.
•How to embrace the versatility of BYOA without compromising on security efficiency.
•How to ensure compliance by educating your employee.
•Best practice advice for integrating BYOA process and methodology into your overall digital workplace transformation strategy.
Join Krista Brown, Principal Practice Director: Mobility, CX and Workplace Productivity at Dimension Data; and Shawn Bass, VP and CTO of VMware End-User Computing, as they examine how BYOA has developed into a real opportunity for business success.
Planning and managing changes to data centres and equipment rooms isn’t easy if you don’t what is there and how devices connect. This webinar look at how to avoid the unnecessary project delays and costs associated with repeated site surveys and multi-site auditing. Maintaining knowledge of the local physical infrastructure is vital for centralised planning, provisioning and operational management, but you need a baseline to start with. With this baseline you can maintain knowledge of local infrastructure through improved change processes, as well as simplifying and reducing workload on infrastructure teams. Undertaking a baseline project isn’t easy, but there are methods and practices we’ll be covering that reduce the pain and improve the accuracy of baseline audits.
David will be covering;
- Data centres
- Equipment rooms
- Data and power connectivity