Hi [[ session.user.profile.firstName ]]

IT Service Management

  • How do enterprises use containers? A discussion of 2018 Docker usage.
    How do enterprises use containers? A discussion of 2018 Docker usage. Eric Carter Recorded: Jun 21 2018 45 mins
    What are the top application components running in containers? What is the lifespan of containers, container images, and services? How is orchestrator adoption changing? What keeps container developers and administrators up at night?

    Join us for a discussion of these topics and more in our review of the 2018 Docker Usage Report - based on a sample of 90,000 containers in real-world deployments.
  • A New Era in Data Storage for Machine Learning and AI Ecosystems
    A New Era in Data Storage for Machine Learning and AI Ecosystems Ashish Gupta Recorded: Jun 21 2018 45 mins
    As enterprises transition their Business Intelligence and Analytics environments to Machine Learning and Artificial Intelligence driven ecosystems, their core data infrastructure has to scale. Focusing only on the compute layers, creates a highly inefficient infrastructure. Vexata with its VX-OS version 3.5 release brings to market transformative economics and breakthrough performance to power these next-generation workloads at scale.e.

    You will learn about:
    • How to scale core data infrastructures for the transition to Machine Learning and Artificial Intelligence workloads
    • What are the key considerations before creating an AI/ML-centric storage infrastructure
    • How Vexata's new VX-OS version 3.5 release addresses these challenges
  • Securely deliver high-performance desktops and workstations from anywhere
    Securely deliver high-performance desktops and workstations from anywhere Mirela Cunjalo Recorded: Jun 21 2018 33 mins
    Join us for a 30 minute overview and Q&A session with our Teradici Cloud Access Software Product Manager Mirela Cunjalo. We will share the use cases and benefits of delivering desktops and workstations with Cloud Access Software and its latest features, including the new brokering and provisioning service.
  • Creating Collaborative Huddle Rooms—How to Select the Right Tools and Technology
    Creating Collaborative Huddle Rooms—How to Select the Right Tools and Technology Brian Fichter, Director, Video Collaboration, Carousel Industries & Chris Thorson, Sr. Director, Polycom Recorded: Jun 20 2018 46 mins
    While traditional video conference rooms remain an anchor in most organizations, today’s accessible video technology means any space can be turned into a video collaboration space. In fact, With the growth in remote workers, the need for collaborative meeting spaces is on the rise to connect on and offsite workforces.
    Regardless of what solutions you are using today — Polycom, Microsoft, WebEx or GoToMeeting, to keep up with the demands of the modern workforce, you should be able to easily integrate legacy functionality with new capabilities.

    During this webinar, collaboration technology experts from Carousel and Polycom will discuss how you can:

    • Maximize capabilities within multi-vendor platforms for investment protection
    • Design collaborative workspaces with high quality audio, HD content and business-class video
    • Drive adoption with easy to use technology that doesn’t scare people away
  • DevOps Through the Lens of ITSM
    DevOps Through the Lens of ITSM Kaimar Karu, Head of Product Strategy & Development, AXELOS Recorded: Jun 20 2018 1 min
    The session explores the evolution of the DevOps philosophy through the lens of ITSM and provides a set of recommendations for improving organizations' ITSM practices based on the lessons learned from DevOps. We will look at the journey DevOps has taken over the years, discuss several key DevOps practices in more detail, and address the challenges of introducing DevOps into organizations.
  • Learn to Fight Cloud Sprawl and Eliminate Service Outages
    Learn to Fight Cloud Sprawl and Eliminate Service Outages Vid Sista, Director of Technology Solutions Recorded: Jun 20 2018 15 mins
    Adding automation to your IT environment is one of the best ways to fight cloud sprawl and help eliminate service outages. In this 15-minute webinar, Accudata’s Director of Technology Solutions Vid Sista will explain:

    How automation solutions enable you to proactively identify service issues
    Why cloud sprawl is a major threat to IT security – and how you can stop it
    What businesses can do to automate their IT services lifecycle
  • [Ep.17] Ask the Expert: Data Migration and Third Party Maintenance
    [Ep.17] Ask the Expert: Data Migration and Third Party Maintenance Chris Crotteau, Director of Strategic Product Development & Glenn Fassett, GM - EMEA, Curvature Recorded: Jun 20 2018 61 mins
    How easy is it to move data?

    Between traditional, on-premises data centers, hosted/collocated data centers, and infrastructure as a service (IaaS) through the large cloud providers, where to store your data and run your business critical applications is now a source of significant complexity in the IT world. Understanding your application set and business needs, then determining where best to run those applications and store their data presents a host of challenges both old and new.

    So where does Third Party Maintenance fit into all of this? Or better yet….what IS Third Party Maintenance?

    Join us for an engaging discussion with Curvature’s IT infrastructure experts to learn:

    •What Third Party Maintenance (TPM) is and how it has become a vital market segment focused first and foremost on the client’s needs
    •How TPM can cost-effectively extend the life of IT assets and align the lifetime of those assets to your application and software lifecycles
    •How TPM can enable you to manage major IT infrastructure transitions in a much more cost effective manner

    About the experts:

    Chris primarily works in the Services department as a Solutions Architect developing technological solutions and strategies for clients. As a technology expert, Chris leads a team of technical engineers to develop new tactics and processes for clients from development to design. Chris was named Employee of the Year in 2005 and 2009.

    Glenn is responsible for the strategic growth and expansion throughout Europe. Previously, Glenn managed Curvature’s international operations and led the company’s entry into Europe in 2002, successfully launching Curvature’s Asia-Pacific division in 2007. Prior to leading this international expansion, Glenn managed enterprise accounts as a distinguished member of Curvature’s U.S. sales organization beginning in 1996.
  • Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting
    Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Jun 20 2018 77 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Cyber-Espionage and Threat Hunting

    Our Verizon Threat Research Advisory Center presenters will be:
    •Chris Novak, Director, Investigative Response
    •Jihana Clemetson, Senior Analyst, Threat Intelligence
    •Marcus Cymerman, Senior Analyst, Network Forensics
    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas

    For this month's theme of 'Cyber-Espionage and Threat Hunting' we'll here from Chris Novak, Director, Investigative Response on cyber-espionage and threat hunting as seen across the Investigative Response Team caseload. We'll then transition into a Q&A session with Jihana Clemetson, Senior Analyst, Threat Intelligence, and Marcus Cymerman, Senior Analyst, Network Forensics to dig further into our cyber-espionage cases and discuss typical indications of being a victim of cyber-espionage, the components of threat hunting, and the approaches to investigating cyber-espionage incidents.

    Following the cyber-espionage insights, we'll cover the following topics:

    •Current Intelligence
    •Attacks & Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Der IT Brennpunkt: GDPR/DSGVO
    Der IT Brennpunkt: GDPR/DSGVO Oliver Stöeckl - Solution Strategist Recorded: Jun 20 2018 43 mins
    Datenschutz und -absicherung sind für Ihre Organisation von entscheidender Bedeutung und keine Verordnung hat weltweit weiter reichende Anforderungen als die DSGVO. Cherwell ISMS bietet eine einfache Möglichkeit, die DSGVO-Artikel Ihren Sicherheitskontrollen zuzuordnen. Darüber hinaus können Sie mit dem Incident Management die Meldefrist von 72 Stunden einhalten und die betroffenen Personen kontaktieren. Schließlich können Sie unser Self-Service-Portal erweitern, um EU-Bürgern eine einfache Möglichkeit zu bieten, Anfragen in Bezug auf Datenzugriff, Berichtigung, Löschung und Portabilität zu erstellen und zu verfolgen.
  • Connecting Clinical and Non-Clinical Systems Using Anypoint Platform
    Connecting Clinical and Non-Clinical Systems Using Anypoint Platform Matt Serna, Healthcare Marketing Manager; Gregg Prothero, Solution Consulting; Maxim Abrams, Product Management Recorded: Jun 19 2018 34 mins
    The healthcare industry is witnessing an explosion of medical data from EHRs, fitness trackers, mobile health applications, and more.

    To provide compelling patient experiences, providers must think beyond just driving interoperability across clinical data stores, and consider how to extend interoperability across healthcare partners and non-clinical applications. Doing so requires a new integrated healthcare strategy that extends beyond those traditionally offered by HL7 interface engines.

    Attendees will learn:

    - Why healthcare organizations are leaning on their IT teams to drive business critical and care-centric strategic initiatives.
    - How MuleSoft’s Anypoint Platform and Edifecs’ solution can help health organizations unlock medical data from EHRs and other systems, to better improve the patient experience.
    - How pre-built connectors, such as the Anypoint Connector for the Edifecs XEngine Server, can enable connectivity and validation of healthcare data––providing patients with vital information, at the right time and place.
  • Cloud Security: Lessons from the Trenches
    Cloud Security: Lessons from the Trenches Brian Talbert, Alaska AIrlines; Enrique Salem, Bain Capital; Ami Hofman, Dimension Data; John Parker, ShieldX Recorded: Jun 19 2018 46 mins
    According to ESG, 25 percent of organizations say maintaining strong and consistent security across their own data center and multiple public cloud environments with a centralized command-and-control a top CISO concern. So how do you do it?

    Join Alaska Airlines Director of Network and Connectivity Solutions Brian Talbert, former Symantec CEO Enrique Salem and ShieldX VP of Products John Parker for a discussion on best practices for secure cloud migration. This panel will discuss:
    - How security can help your company adopt a cloud first strategy
    - Key threats security teams should expect.
    - Why micro-segmentation becomes a critical control when your perimeter defenses are defeated
    - How to gain visibility into your data center and cloud environments
    - Overcoming common objections encountered during migration
  • The Future of the IT Support Center
    The Future of the IT Support Center Roy Atkinson and Stephen Smith Recorded: Jun 19 2018 62 mins
    Technology is changing at a faster pace than ever and will continue to accelerate. Support centers (helpdesks or service desks) not only need to keep up with the technologies of their customers or users but also the technology within the support center itself.

    The customers and end users seeking support will be increasingly mobile, more likely to be using their own devices and applications, and more tech-savvy than in the past. Support centers will be handling fewer easy, “one and done” contacts, and will need increasingly sophisticated knowledge and tools to maintain their organization’s workforce.

    You will learn about:
    * How new technologies both impact and enable the service and support center’s role
    * How to think about the coming innovations in automation and artificial intelligence


    Who Should Attend:
    * New and established service and support leaders
    * Anyone wishing to learn more about how the world of support will change over the next few years
  • Optimize Your IT Infrastructure with Micro Focus Cloud Transformation
    Optimize Your IT Infrastructure with Micro Focus Cloud Transformation Jo De Baer, Arul Murugan Alwar and Renee Bradshaw, Micro Focus Recorded: Jun 19 2018 53 mins
    Enterprises today are looking to optimize their IT infrastructure to take advantage of new digital technologies and services.

    One of the most popular ways to achieve this is by moving server workloads and applications to the cloud. Since this often happens in large numbers, a cloud transformation project can be a complex effort.

    Join us on this webcast and learn how to easily execute even the largest and most complex cloud and data center migration projects, on time and within budget.
  • GDPR: A regulation, an opportunity, a call to action
    GDPR: A regulation, an opportunity, a call to action Oleg Gorobets, Senior Global Product Marketing Manager, Kaspersky Lab Recorded: Jun 19 2018 34 mins
    GDPR is an EU regulation that comes into effect on the 25th of May 2018.

    GDPR is designed to uphold the rights of the individual in terms of how their personal data is handled, stored and secured.

    It also places greater responsibility on businesses to observe data security and related processes and practices.

    Kaspersky Lab solutions help companies process personal data by offering effective measures to reduce the risks of a data breach, prevent security incidents and enhance visibility of the monitored infrastructure.

    During the webinar, we’ll look at the following topics:
    •What GDPR is - and isn’t - when it comes to cybersecurity.
    •How cybersecurity fits into GDPR-aligned processes.
    •The endpoint: a good starting point for the cybersecurity aspect of a data protection strategy.
    •The role of storage and the impact of storage security.
    •Guarding the bottlenecks: perimeter defenses to reduce the risks of human influence.
    •Why data in the cloud requires special security.
    •Forewarned is forearmed: the importance of cybersecurity essentials training.
    •Understanding the risks: get more from your Data Protection Impact Assessments.
    •Kaspersky Lab’s GDPR readiness.
  • 2018 Cyberthreat Defense Report
    2018 Cyberthreat Defense Report Mark Bouchard, Co-Founder and COO, CyberEdge Group and Graham Melville, Sr. Director Security Solutions Marketing, Gigamon Recorded: Jun 19 2018 60 mins
    New research from CyberEdge’s 2018 Cyberthreat Defense Report shows that in spite of increasing their security budgets, companies are finding that there is too much data even for new tools to analyze, not enough skilled IT security professionals and little confidence in current investments. Sign up for this webinar to gain key insights into the cyberthreat landscape and how to protect your organization.

    Attendees will learn how to:

    - Deal with cyberthreat headaches such as increased breaches, vulnerabilities and encrypted traffic.
    - Reduce incident response and remediation time with automation.
    - Find products that use automation to minimize their dependency on skilled security personnel.

    Now in its fifth year, this report provides a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. Register now to learn how your colleagues plan to defend against cyberthreats!
  • GDPR ja tiedonhallinta
    GDPR ja tiedonhallinta Juha Sallinen ja Rosa-Maria Suorsa Recorded: Jun 19 2018 46 mins
    Useissa yrityksissä on ongelmana ärsyttävät excelit ja wordit sekä muut dokumentit, joissa on mahdollisesti henkilöön liittyviä tietoja ja jotka ovat unohtuneet ajan saatossa, joita tallennetaan vain varmuuden vuoksi. Harvemmin tulee ajateltua, että nämä dokumentit ovat myös riski GDPR:n, eli EU:n tietosuoja-asetuksen kannalta. Miten löydetään nämä tiedot, jotka ovat olennaisia sekä nopeutetaan samalla tietopyyntöihin vastaamista että tehostetaan myös hakutoimintoja, takaamalla käyttäjälle samalla ajantasaiset tiedot? Tai miten vastataan tietosuoja-asetuksen vaatimukseen tiedon minimoinnista?

    Kaikissa yrityksessä on tietoa, josta ei tiedetä sisältöä tai tarpeellisuutta: rakenteetonta tietoa, jota on kerääntynyt vuosien saatossa ilman päätöksiä ja vailla teknisiä toteutuksia datan hävittämiseen. Kerromme webinaarissamme millaisia ratkaisuja näiden tiedon löytämiseen ja läpikäymiseen sekä kuinka nopeutetaan asiakkaiden tietopyyntöihin vastaamista. Webinaari on suunnattu yrityksen tietohallinnasta vastaaville henkilöille.

    uha Sallinen toimii GDPR Tech -yhtiössä konsulttina ja kouluttajana. Hän on taustaltaan nykyaikainen moniosaaja, jota GDPR:ssä oleviin vaatimuksiin tarvitaan. Menneet työtehtävät niin arkkitehtinä kuin myyntitehtävissä antavat riittävän laajan kokonaisnäkymän GDPR:ään ja käytännönläheiset työpajat GDPR:ssä pitävät hänet asiakasrajapinnassa tietoisena Pohjoismaiden ja Baltian GDPR-valmiustilasta.

    Rosa-Maria Suorsa toimii Varoniksella Pohjoismaiden liiketoiminnan kehityksen parissa. Varonis on tietoturvaohjelmistoihin ja data-analytiikkaan erikoistunut yhtiö, joka auttaa asiakkaitaan ratkaisemaan muun muassa tiedon hallintaan ja klassifiointiin sekä uhkatekijöiden analysointiin liittyviä haasteita. Varonis auttaa yrityksiä tunnistamaan ja suojaamaan arkaluontoisen sekä henkilötietoja sisältävän datan, ja sitä kautta vastaamaan säädösten ja asetusten vaatimuksiin.
  • Rekisteröidyn oikeudet ja GDPR: Mitä tulee huomioida
    Rekisteröidyn oikeudet ja GDPR: Mitä tulee huomioida Jan Nieminen Recorded: Jun 19 2018 38 mins
    GDPR antaa rekisteröityneille laajat tietosuojaoikeudet. Rekisterin pitäjän tulee yhdessä tietojen prosessoijan kanssa toteuttaa asianmukaiset toimenpiteet oikeuksien toteuttamiseksi, sekä tehdä niiden käyttämisestä mahdollisimman helppoa. Rekisterin pitäjälle GDPR tuo mukanaan tarkat rekisterinpitovaatimukset, joihin liittyy muun muassa vastausaika rekisteröityneelle, henkilöllisyyden varmistaminen sekä suojattu viestinvaihto.

    Webinaarissa käsitellään, miten organisaatiot saavat etumatkaa kiristyvien tietosuojaoikeuksien hallinnassa käyttäen apuna tietosuojaohjelmistojen tarjoamaa automatiikkaa pyyntöjen vastaanottamissa, prosessoinnissa sekä kommunikoinnissa rekisteröityjen kanssa.

    Jan Nieminen (Account Executive, CIPP/E, OneTrust) is sales and marketing oriented cloud enthusiast. Jan is experienced with helping customers to understand the best solution for them. Jan sees future in cloud technologies and want to take everybody there along with him.
  • Deliver Service Excellence with Machine Learning and Agent Intelligence
    Deliver Service Excellence with Machine Learning and Agent Intelligence Archana Penukonda (Sr. Product Marketing Manager, ServiceNow), George Rubio (Sr. Marketing Manager, ITSM, ServiceNow) Recorded: Jun 15 2018 55 mins
    Harness the power of machine learning to automatically categorize and route incidents without hiring additional data scientists—in less than a day. Really. Join Archana Penukonda, senior product marketing manager, and George Rubio, senior technical product marketing manager, to discover how ServiceNow brings machine learning to everyday work. Independent studies show an impressive 42% ROI with benefits exceeding $100k and a payback periof of just 10 months.

    Hot topics:
    •Understand your readiness for machine learning
    •See Agent Intelligence in action with a live demonstration
    •Uncover best practices to boost your productivity and customer satisfaction with Agent Intelligence
  • Streamlining Workflows to Improve Internal and External Service Delivery
    Streamlining Workflows to Improve Internal and External Service Delivery Sheila Pickett, Deputy CIO Howard County Recorded: Jun 15 2018 64 mins
    Like many state and local jurisdictions, Howard County, MD, has hundreds of IT applications and systems it relies on to run an efficient government. And like many governments, Howard County found it difficult to obtain an accurate view of its IT environment to better streamline and automate processes. Until now.

    Join Howard County’s deputy CIO for an hour-long, informative webinar on how the county uses an innovative IT management platform to streamline its workflows and ultimately provide better service both internally and externally.

    Don’t miss this webinar where you will learn:
    •Why you should be thinking about service automation to improve workflows
    •How IT automation can be easily replicated to streamline business and citizen-facing processes
    •Best practices for ensuring success as you start down the service automation path
  • Digital Transformation Requires Integrated Service Management
    Digital Transformation Requires Integrated Service Management Troy DuMoulin (VP of R&D at Pink Elephant), Gerald Beaulieu (Director, Product Manager of ITSM, ServiceNow) Recorded: Jun 15 2018 59 mins
    As IT service delivery organizations shift gears to accommodate the business need for new levels of speed and agility, there is growing interest in models such as Lean, Agile and DevOps to accelerate business value generation. Digital Transformation translated to IT Service Delivery means reducing technical debt, becoming more agile and increasing speed to market.

    Join Troy DuMoulin, VP of R&D at Pink Elephant, in this strategic webinar to learn:

    •How to make a compelling business case for integrated service management
    •How to help your organization achieve the elusive challenge to be “better, faster, cheaper”
    •How to accelerate value delivery and improve your customer engagement
  • Solving the Contact Center Puzzle
    Solving the Contact Center Puzzle Mark Smiley and Matt Walton Recorded: Jun 15 2018 59 mins
    Join Cask to learn how different pieces come together to build an awesome environment for all in Customer Service
  • VeriSM - Mistä siinä on kysymys?
    VeriSM - Mistä siinä on kysymys? Lari Peltoniemi Recorded: Jun 15 2018 60 mins
    VeriSM™on palvelunhallinnan lähestymistapa, joka on räätälöity tukemaan organisaatioita digitaalisten palveluiden tuottamisessa. VeriSM™ auttaa organisaatioita määrittämään palvelunhallinnan periaatteensa. Nämä periaatteita sovelletaan kaikkien tuotteiden ja palveluiden tuottamisessa ja ne kattavat alueita kuten turvallisuus, laatu, kustannukset ja riskit.

    Minkä takia sen on kehitetty? Mihin kysymyksiin se vastaa? Miten se asemoituu muihin viitekehyksiin? Tervetuloa webinaariin kuulemaan esittely uudesta VeriSM -viitekehyksestä ja saamaan vastaus missä tilanteissa ja millä tavalla siihen kannattaa tutustua paremmin.

    Lari Peltoniemi on työskennellyt prosessien ja toiminnan kehittämisen ja arvioinnin alueella yli 10 vuotta. Päätoimisesti IT-palveluiden prosessien määrittelyn, kehittämisen ja johtamisen alueella hän on toiminut vuodesta 2005. Hän on konsultoinut ja valmentanut useita suomalaisia ja kansainvälisiä yrityksiä ja organisaatioita ITIL/ITSM prosessien määrittelyihin, käyttöönottoon ja kehittämiseen liittyen. Lari on sertifioitu ITIL Foundation, ITIL Intermedate, CMDB Foundation, SIAM Foundation ja VeriSM Foundation -valmentaja.
  • DevOps 2020 Vision - Achieve Full Continuous Testing Agility
    DevOps 2020 Vision - Achieve Full Continuous Testing Agility Ankita Bhargava Recorded: Jun 14 2018 29 mins
    The year 2020 is approaching faster that you imagined. And the paradigm is shifting rapidly, with go, no go decisions being made in seconds and the battle for customer loyalty becoming an everyday reality. As companies across the board are moving towards DevOps and a shift-left approach, defining clear goals and making the right decisions, right now, is critical to success. The enterprises that most espouse shared responsibility, empowered autonomous teams, and continuous learning environment allow DevOps to thrive in their organization, in the truest sense.

    Join Zephyr Product Manager, Ankita Bhargava as she covers the four critical components to test management in a DevOps ecosystem and why it is integral to achieving continuous software delivery.

    In this session Ankita addresses:

    - Why your organization needs to focus NOW on Continuous Testing Agility
    - Actions your organization can take to get ahead in the race
    - How Zephyr is accelerating the global adoption of DevOps with the launch of Zephyr DevOps

    Presenter Bio: Ankita Bhargava brings over 7 years of product, engineering, and networking technology experience. Prior to Zephyr, Ankita has worked in product and marketing roles in companies such as Godrej, Aadtech and Loadstar. She holds an MBA in Product Management & Marketing and a Bachelor’s degree in Computer Science. Outside of work, Ankita enjoys playing tennis, scuba diving, hiking and travelling and experiencing new cultures.
  • Blending Operations and Technology Panel Discussion
    Blending Operations and Technology Panel Discussion Cy Howells, Jeremy Gill, Carl Rizzo and George Letavay Recorded: Jun 14 2018 54 mins
    Cy Howells, Jeremy Gill, Carl Rizzo ,George Letavay
    Speakers are from Duquesne Light and CTP, LLC.


    As technology continues to evolve and becomes a bigger part of everything we do, it’s not just the computers on our desk anymore. The line between field operations and IT has become less clear, and this can affect IT service management.


    Questions for the panel:
    How have changes in technology impacted the relationship between IT and field operations?

    What challenges has this brought to IT service management?

    How is or has your organization addressed those challenges?
  • Continuous Security & Compliance Monitoring | Why - What - Way Forward
    Continuous Security & Compliance Monitoring | Why - What - Way Forward Aseem Rastogi CEO & Founder - Cloud Optics Recorded: Jun 14 2018 33 mins
    The urge for continuous Visibility, Security and Compliance in the cloud has never been greater! Traditional approaches are no longer effective to keep up with the fast paced Dev Ops and other challenges across Multiple Accounts & Hybrid Cloud Platforms.

    In order to defend reputation, Security and Compliance must be effectively enforced on a continuous basis.
  • How to Audit a Wi-Fi Network for Security
    How to Audit a Wi-Fi Network for Security Julio Petrovitch, Principal Technical Marketing Engineer - Wireless Jun 26 2018 4:00 pm UTC 60 mins
    Based on research by IHS, approximately 70% of WLAN investments are driven by the need to improve network security. After all, prevention of accidental confidential data leakage, protection against theft of data, control of unauthorized devices, and secure management of IoT devices is an essential part of modern Wi-Fi network management. WLAN management systems help with this, but they could be costly solutions that may need to sacrifice client service time to scan for rogue or unauthorized devices. In environments where such a solution is not available (no-Wi-Fi zones) or it is not desirable to enable the rogue detection feature for better client service, a periodic walkthrough survey method can be used with a hand-held device such as the NETSCOUT Aircheck G2. This webinar will show you how to perform a quick and simple security audit of your Wi-Fi network using an AirCheck G2.


    The topics to be covered on this webinar are:


    * Learn how to import ACL lists from your AP controller

    * Learn how to quickly detect and identify unauthorized or rogue Wi-Fi devices

    * Learn how to easily locate unauthorized or rogue Wi-Fi devices
  • Kubernetes Run-Time Security, an Example of Blocking an Application Attack
    Kubernetes Run-Time Security, an Example of Blocking an Application Attack Knox Anderson Jun 26 2018 5:00 pm UTC 30 mins
    Join us for an online demo of blocking an application attack in your Kubernetes cluster.
  • CMDB for the Enterprise Mind
    CMDB for the Enterprise Mind Terrell Pursley, Ryan Gillespie, Meghan Lockwood Jun 26 2018 5:00 pm UTC 60 mins
    Get the rundown of different audiences for the CMDB and how to achieve each of their objectives through out-of-the-box products.

    Plus, Find out...
    - Why CMDB should be your ServiceNow foundation
    - What's the roadmap to success
    - Conventional and specialized uses, including services and dashboards
    - Real-world examples of companies transforming today
  • Vulnerability Analytics : The Visual Language of Vulnerability Management
    Vulnerability Analytics : The Visual Language of Vulnerability Management Syed Abdur, Brinqa, Director of Product and James Walta, Brinqa, Sales Engineer Jun 26 2018 7:00 pm UTC 60 mins
    Join us for this webinar as we discuss the visual language necessary to communicate with all the varied stakeholders that are impacted by or part of the vulnerability risk management process: business users, application owners, IT administrators, security professionals, compliance regulators, and others.
    We will discuss the data analysis necessary to create and communicate different types of metrics, including :

    Business Exposure: What risks are different business entities exposed to due the vulnerabilities?

    Vulnerability Impact: How do different technologies and various types of vulnerabilities contribute to risk?

    Remediation Performance: How effective and efficient are current remediation efforts?

    And More...
  • The importance of innovation throughout the workplace
    The importance of innovation throughout the workplace Jade Pearson, Regional Lead, Global Training Services, Kepner-Tregoe Jun 26 2018 8:00 pm UTC 60 mins
    Great innovators solve important problems that make peoples’ lives better often by designing simple adjustments that look obvious. Innovators are curious, they look for fresh approaches and tend to see a bigger picture than the world that is presented to them. They are always on the lookout for methods, systems or new designs to cut through complexity, reduce time or combine many tasks into one. Ultimately their work ends up being “of service” to their team and their organisation.

    If you consider that tomorrow’s problems will not be solved using yesterday’s thinking and you are looking to provide value to your organisation’s strategic planning and problem-solving capabilities then becoming an innovator should be on your short list!

    Join Jade Pearson, Regional Lead, Global Training Services with Kepner-Tregoe, in the second of our “Future of Thinking” webinar series where she’ll discuss how innovation can be a friendly component of your work.

    What you will learn:

    How innovative thinking can improve dealings with customers

    Design thinking techniques that solve human-centred problems

    A method of “questioning” that helps people help themselves
  • Why Visibility is Key to GDPR
    Why Visibility is Key to GDPR Adrian Rowley, EMEA Technical Director at Gigamon Jun 27 2018 8:00 am UTC 45 mins
    The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.

    Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.

    In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:

    - Eliminate monitoring blind spots
    - Vastly improve the accuracy and precision of data risk detection
    - Help organisations meet the GDPR challenge

    About the Presenter

    Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
  • Legacy Modernisation: Overcoming the Transformation Barriers
    Legacy Modernisation: Overcoming the Transformation Barriers Simon Ratcliffe, Principal Consultant, Ensono, Kevin Stoodley, CTO, IBM Z Series, & Alex Hilton, CEO, CIF Jun 27 2018 12:00 pm UTC 60 mins
    A recent survey conducted by Ensono, in partnership with the Cloud Industry Forum, showed that 89% of respondents believed that legacy technology was a barrier to effective digital transformation. Given that many organisations operate a complex technology landscape often with elements in different locations, and with core components that are regarded as ‘legacy but critical’, there needs to be a clear and simple approach to overcoming these obstacles.

    Breaking down the barriers requires effective change in people, process and technology to attain a viable level velocity that will enable transformation without being held back by perceptions of legacy issues.

    Examining these issues, this webinar will provide insight and thought provoking approaches for organisations seeking to transform their operations against this backdrop.
  • Application Deployments with Kubernetes
    Application Deployments with Kubernetes Slava Koltovich, CEO Kublr Jun 27 2018 3:00 pm UTC 60 mins
    Kubernetes ensures your deployed applications are always available to users. But how do you deploy applications in Kubernetes without user/service interruptions? Should you write your own scripts using low-level Kubernetes objects, package everything in Helm, or use specific CI/CD tools? There isn’t a clear-cut answer; it always depends.

    In this online meetup, Slava Koltovich, CEO of Kublr, will discuss various application deployment options and demonstrate how tools like Spinnaker, Istio, and Jenkins can be used to implement blue-green or canary deployments to ensure zero-downtime application rollout.
  • Can bigger security budgets save businesses from costly cloud breaches?
    Can bigger security budgets save businesses from costly cloud breaches? Maxim Frolov, Vice President of Global Sales, Kaspersky Lab and Jim Reavis, Co-founder and CEO, Cloud Security Alliance Jun 27 2018 3:00 pm UTC 75 mins
    Nearly 1.5 million dollars. That’s how much an average data breach in the cloud costs enterprises, according to the Global IT Security Risks Survey 2018.

    Second only to targeted attacks, breaches affecting IaaS are among the most costly faced by businesses today. But what can be done about this? Apparently, investing more in protection is only part of the solution, as businesses are already allocating a greater share of their IT budgets to security…

    During the webinar, Maxim Frolov, VP Global Sales, Kaspersky Lab, will present key findings from the company’s latest report On the Money: Growing IT Security Budgets to Protect Digital Transformation Initiatives. Maxim, along with special guest Jim Reavis, Co-founder and CEO, Cloud Security Alliance, will discuss the potential damage and the main risks associated with cloud breaches, as well as what businesses can do to protect themselves.

    Webinar attendees will get the latest insights on the dynamics of corporate security incidents and IT security budgets. They will learn what financial, organizational and technological decisions should be made to protect businesses from the threat of cloud infrastructure breaches.
  • How to Drive Better SAP Performance with ABAP Visibility
    How to Drive Better SAP Performance with ABAP Visibility Jonah Kowall, VP Market Development and Insights, AppDynamics and Paul Urfi, Sr Sales Enablement, AppDynamics Jun 27 2018 4:00 pm UTC 45 mins
    When SAP performance suffers, business suffers. This industry-first solution offers ABAP code-level visibility and instrumentation, giving you real-time performance monitoring and diagnostics across mission-critical environments.

    See how AppDynamics for SAP can unify monitoring and deliver code-level visibility across your SAP environments. In this webinar, you will see a live demo of SAP performance monitoring and learn how AppDynamics:

    * Visualizes SAP components and dependencies in real time
    * Establishes dynamic baselines for key SAP transactions
    * Diagnoses SAP issues down to a single ABAP statement
    * Assists with cloud migrations and SAP S/4HANA transitions
  • Stop Playing Catch-Up on Risk: How To Prioritize and Address App Vulnerabilities
    Stop Playing Catch-Up on Risk: How To Prioritize and Address App Vulnerabilities Ed Bellis, CTO of Kenna Security Jun 27 2018 4:00 pm UTC 45 mins
    Finding and prioritizing application vulnerabilities is an extremely time-consuming, manual process, and it’s one that is rarely undertaken comprehensively. It’s not that application security teams don’t know where risk lies—they do. Many simply lack the time, resources, or context to address those which pose the greatest risk.

    The result? Oftentimes, the wrong vulnerabilities are fixed while the more dangerous ones are left unaddressed, forcing your team into reaction mode after the damage is already done.

    Join us for our next webinar: “Stop Playing Catch-Up on Risk: How To Prioritize Application Vulnerabilities,” powered by the Kenna Application Risk Module.

    In this webinar, you’ll learn:

    - The challenges in identifying vulnerabilities at the application layer
    - The requirements to better manage application risk
    - What application security teams can do to improve their risk posture
    - How the Kenna Application Risk Module can help you proactively manage your application risk

    Enable security and DevOps teams, developers, and executives to team up to proactively remediate application risk. Join us and see the Kenna Security Application Risk Module in action to learn how you can take a risk-based approach to application security.
  • Migrating to Azure SQL DB or Amazon RDS
    Migrating to Azure SQL DB or Amazon RDS Rodney Landrum, Senior DBA/BI Consulting Services, Ntirety Jun 27 2018 5:00 pm UTC 60 mins
    In this webinar, learn the benefits of moving your workload to a Database-as-a-Service (DBaaS) environment and the key differentiators between Amazon RDS and Azure SQL Database.

    Join Rodney Landrum, Senior DBA/BI Consulting Services at Ntirety, a division of HOSTING, and learn:

    • The benefits of moving your workload to a DBaas Environment
    • How to assess if your workload is compatible with a DBaaS Environment
    • How you can optimize your workload for a DBaaS Environment

    In addition, Rodney will give a full comparison of Amazon RDS verse Azure SQL Database to help you make the right decision for your business. Including:

    • Security
    • Cost
    • Performance
    • Migration strategies

    See Rodney's Amazon Author Page Here: http://bit.ly/RodneyLandrum-Amazon
  • Four Ways Network Traffic Analytics Can Supercharge Your SOC
    Four Ways Network Traffic Analytics Can Supercharge Your SOC Eric Ogren, Senior Analyst at 451 Research; Barbara Kay Sr. Director of Security Product Marketing at ExtraHop Jun 27 2018 5:00 pm UTC 60 mins
    The network doesn’t lie. That’s one reason companies are increasingly turning to their network to simplify and speed up common SOC workflows. Network Traffic Analytics (NTA) complements log data and endpoint instrumentation with an objective view of threat behavior on the network, and dramatically reduces the time to detect and respond to threats.

    In this webinar, you will learn how your peers are using NTA technology based on a new market research from 451 Research, as well as ExtraHop’s approach to NTA that goes beyond just detecting threats to also include automated investigation and robust forensics capabilities.
  • [Panel Discussion] Overcoming Your ITSM Technology Hurdles – 3 Real-Life Stories
    [Panel Discussion] Overcoming Your ITSM Technology Hurdles – 3 Real-Life Stories TJ Martinez, Univ. of New Mexico; Diane Burton, Seattle Cancer Care Alliance; Nick Kouloungis, Louisville Metro Technology Jun 27 2018 6:00 pm UTC 60 mins
    Keeping up with rapidly changing technology is a challenge IT service management leaders across all types of organizations face. And, setbacks caused by outdated, legacy ITSM solutions do not make modernization efforts easy. Whether your goals include artificial intelligence, incorporating DevOps, or automating key IT processes, all ITSM teams must embrace change, and innovate.

    Join our upcoming webinar with representatives from higher-education, healthcare, and government as they share successes, blunders, and challenges from the IT trenches.
  • Collaborative Cloud Management: Enabling Public Sector IT Transformation
    Collaborative Cloud Management: Enabling Public Sector IT Transformation Elissa Livingston, Vice President of Strategic Alliances Jun 28 2018 3:00 pm UTC 75 mins
    Can't attend AWS Public Sector Summit 2018? Don't worry, we've got you covered. CloudCheckr Vice President of Partner Alliances, Elissa Livingston, hosts Thursday, June 28 to catch you up on everything you missed.

    Elissa will explore the different ways you can reach the full potential of AWS for Government. Part of achieving it is finding a management platform that will give you continuous security monitoring, policy enforcement, and usage visibility to meet all compliance requirements in the sector, including HIPAA, FedRAMP, DFARS and more.
  • Unguarded – A Roadmap For Cyber-Security Improvement
    Unguarded – A Roadmap For Cyber-Security Improvement Randy Steinberg Jun 28 2018 4:00 pm UTC 60 mins
    The IT infrastructure management landscape is rapidly changing. Much of what IT used to support, build and deliver on premises is moving up into the Cloud. IT services are moving up and out of the data center and access to these services is moving beyond the four walls of the business. New technologies and devices are spreading and stretching when and where IT services can be used (e.g. Internet of Things). While the shift towards more agile and flexible delivery channels for IT services is creating new business opportunities, it is also creating new business challenges for securing the IT infrastructure and delivering those services safely. How are IT organizations meeting this challenge? What strategies are organizations employing? What technologies, processes and organization changes are taking place to keep the business safe? Learn some answers to these questions and leave with ideas and a roadmap to secure your own IT Infrastructure.
  • The Adoption Gap in Learning: How Brain Science Can Bridge the Divide
    The Adoption Gap in Learning: How Brain Science Can Bridge the Divide Todd Maddox, Ph.D Jun 28 2018 5:00 pm UTC 30 mins
    All too often, L&D vendors offer a plethora of tools with no guidance on when to use which tools. The result: weak adoption and sub-optimal learning and performance with no clear path forward. This talk briefly reviews the plethora of exciting new technologies on the L&D market, the psychology and brain science of learning, and a set of best practices for mapping these technologies onto representative learning problems.

    First, we start with a quick tour of the array of technologies available to L&D professional. Next, we offer a primer on the psychology and brain science of learning and discover the multiple distinct learning systems that have evolved in the brain to learn different skills. We conclude by providing an example of an effective mapping from learning tools to learning problem that derives from the learning science.

    By attending this talk, you can bring back to your organization a better understanding of how psychology and brain science can be leveraged to provide a roadmap for successfully training employees.
  • SOC Squad: Select and Deploy New Security Tools Faster
    SOC Squad: Select and Deploy New Security Tools Faster Simon Gibson, CISO and Security Architect, Gigamon and Graham Melville, Sr. Director, Security Solutions, Gigamon Jul 3 2018 8:00 am UTC 45 mins
    If you are struggling to keep up with selecting, testing and deploying new security tools, you won’t want to miss this webinar.

    You’ll learn how to:

    - Address the unique challenges of securing your unique network.
    - Implement smart network segmentation and intelligent tool routing.
    - Facilitate testing and deploying tools through a security delivery platform.
    - Handle the challenges of setting up realistic tests.

    Learn how the GigaSECURE security delivery platform strengthens new security tool testing and streamlines deployment.
  • Improving Your Employee Retention With Real-Time Ops Data
    Improving Your Employee Retention With Real-Time Ops Data Ophir Ronen, PagerDuty, Stephen O’Grady, RedMonk, and Mary Moore-Simmons, SendGrid Jul 3 2018 9:00 am UTC 30 mins
    Employee attrition is a challenge that every organization, regardless of industry, faces. People change jobs and move companies for many different reasons. This got us thinking—is on-call health a factor that can significantly affect employee attrition rates? If the health factors of on-call pain are bad enough, could it cause your employees to leave your company prematurely?

    Join us for our upcoming webinar, where we’ll address these questions and share results from a global survey of IT managers and practitioners on employee attrition.

    We’ll also show you how to tackle employee dissatisfaction with real-time operations health data so you can effectively build and retain teams responsible for your digital transformation. You’ll gain insight into the most impactful operations health indicators as they relate to average employee tenure length across your organization, including:

    • Notifications that interrupt work and life.
    • Notifications that wake up responders at night.
    • Notifications that interrupt weekends.
    • Notifications that interrupt consecutive weekend days.
  • Enhancing Client Experiences through the Platform Economy
    Enhancing Client Experiences through the Platform Economy Yasser Zaki,Technology Strategist at Microsoft, & Peter Menadue, SVP Dimension Data CX & Workplace Productivity Jul 5 2018 9:00 am UTC 45 mins
    The platform economy represents a fundamental shift in how companies operate. Organisations that rely on a single product are being rapidly overtaken by those who can almost instantly react to customer demand, generating product or service innovations as and when required. The flexibility and scale offered by a platform economy approach means every senior executive now has to be fluent in the application of data and technology, and the part the cloud plays in underpinning it all.
    But the platform economy isn’t just about doing things faster and more reliably – it’s about using data to accelerate customer interactions and deliver fresh experiences that weren’t previously possible. But how can companies adapt to an environment that embraces experiences and enablement rather than products and cost?
    Join this webinar to understand how the platform economy can underpin the customer experience and unlock new scenarios and markets. Yasser Zaki, Global Partner Technology Strategist at Microsoft; and Peter Menadue, Dimension Data, SVP Microsoft Alliance, CX and Workplace Productivity will explore what the platform economy is, and its potential to transform the client experience, as well as the tools you’ll need to effectively realise the platform economy’s potential.
  • GRC in Colour with Performance Analytics
    GRC in Colour with Performance Analytics Toby Isaacson Jul 5 2018 2:00 pm UTC 45 mins
    How do you prove you are compliant every month in a constantly shifting technology and regulatory environment?

    The combination of ServiceNow's GRC and Performance Analytics enables the automation, simplification, and remediation of complex controls, giving you short order visibility of your compliance.

    Toby will focus on how TESM achieved exactly that, with further augmentation, using operational dashboards, resulting in actionable insights to help prevent potential breaches - before they happen.

    Toby will demonstrate how to achieve:
    1. Reduced risk exposure, because you acted in 3, rather than 30, days
    2. Transparent empowerment for proactive compliance
    3. The ability for the CIO to identify problem areas in seconds, knowing what needs focus right now

    The outcome is a stress-free compliance management experience.
  • Unleashing the Enormous Power of Call Center KPIs
    Unleashing the Enormous Power of Call Center KPIs Jeff Rumburg, Managing Partner at MetricNet Jul 10 2018 6:00 pm UTC 60 mins
    In Unleashing the Enormous Power of Call Center KPIs, MetricNet provides an overview of the Best Practices in Call Center Performance Measurement. Our best practices help call centers lower costs and increase customer satisfaction!

    Viewers will learn:

    How the industry's top performing Call Centers track and trend their performance.

    How to use Call Center KPIs diagnostically to achieve World-Class Performance.

    How to apply Best Practices in Call Center Performance Measurement and Management.

    The key success factors in performance measurement from the industry's top performing Call Centers.
  • What's the Future of DevOps?
    What's the Future of DevOps? Tori Wield, New Relic, Tony Hansmann, Pivotal, Matt Stratton, PagerDuty, and Vera Chen, PagerDuty Jul 10 2018 6:00 pm UTC 45 mins
    The adoption of DevOps fundamentals has changed the game of software delivery. And DevOps has come a long way from being a methodology that was considered, “for startups only” to what it is today—a culture and people first approach to engineering that enables teams to deploy faster, eliminate silos, and iteratively improve no matter your size. Do it right, and your team stands to release much faster, predictively, and safely, while mitigating unplanned work and making it easier to get ahead of customer experience.

    Join us as we discuss the future of DevOps with leaders from Pivotal, New Relic, and PagerDuty. We’ll look back at where DevOps has been, what it’s brought to the table, and where it’s going.

    • What are the biggest challenges organizations face when cultivating DevOps adoption?
    • What key fundamentals of DevOps are here to stay?
    • Can DevOps best practices and fundamentals be adopted beyond the engineering team?
    • Is it time for the enterprise to finally embrace DevOps?
    • What’s the next big thing for DevOps?

    Speakers
    Tori Wield, Developer Advocate, New Relic
    Tony Hansmann, Field CTO, Pivotal
    Matt Stratton, DevOps Evangelist, PagerDuty
    Vera Chen, Technical Marketing Manager, PagerDuty
  • BYOA: The natural evolution of Bring Your Own Application
    BYOA: The natural evolution of Bring Your Own Application Krista Brown: Principal Practice Director, Dimension Data & Shawn Bass, VP & CTO,VMware Jul 11 2018 2:00 pm UTC 45 mins
    Once considered a source of risk for companies, the BYOA (Bring Your Own Application) approach to application management has rapidly evolved into a series of great opportunities for the modern digital workplace. BYOA means employees are now closer than ever to customers, and can operate in a more productive and efficient manner, all contributing to a better work-life balance.

    But how do companies strike the right balance between giving their employees the flexibility to manage their own applications, and establishing proper regulations to safeguard and govern BYOA safely and effectively?
    This webinar will cover:
    •The growth of BYOA from a security risk into a tool that can drive employee happiness and boost productivity, ultimately improving bottom line results.
    •How to embrace the versatility of BYOA without compromising on security efficiency.
    •How to ensure compliance by educating your employee.
    •Best practice advice for integrating BYOA process and methodology into your overall digital workplace transformation strategy.
    Join Krista Brown, Principal Practice Director: Mobility, CX and Workplace Productivity at Dimension Data; and Shawn Bass, VP and CTO of VMware End-User Computing, as they examine how BYOA has developed into a real opportunity for business success.
  • How to baseline your physical IT infrastructure
    How to baseline your physical IT infrastructure David Cuthbertson Jul 12 2018 12:00 pm UTC 45 mins
    Planning and managing changes to data centres and equipment rooms isn’t easy if you don’t what is there and how devices connect. This webinar look at how to avoid the unnecessary project delays and costs associated with repeated site surveys and multi-site auditing. Maintaining knowledge of the local physical infrastructure is vital for centralised planning, provisioning and operational management, but you need a baseline to start with. With this baseline you can maintain knowledge of local infrastructure through improved change processes, as well as simplifying and reducing workload on infrastructure teams. Undertaking a baseline project isn’t easy, but there are methods and practices we’ll be covering that reduce the pain and improve the accuracy of baseline audits.

    David will be covering;

    - Data centres
    - Equipment rooms
    - Networks
    - Servers
    - Data and power connectivity