Hi [[ session.user.profile.firstName ]]

IT Service Management

  • Sysdig & SANS Institute: Forensics and Incident Response in Containers
    Sysdig & SANS Institute: Forensics and Incident Response in Containers Knox Anderson, Sysdig and Jake Williams, SANS Analyst Recorded: Jul 20 2018 61 mins
    Almost 5 years, 48,000+ github stars, and tens of thousand of production deployments later we can safely say containers are a technology that is a here to stay. They’re developer friendly, easy to operationalize, and allow organizations to provide stable and secure services to their customers.

    While there are clear best practices for what it takes to build and run containers, there isn't as much knowledge around the performing forensic analysis of incidents that occur inside your containers.

    In this webinar we'll cover:
    - How containers change incident response and forensics
    - Best practices around forensic data collection in container environments
    - Compare opensource and commercial forensics options
    - A live demo of multiple forensics investigations using Sysdig Inspect: an opensource container forensics tool
  • 3 Challenges of Distributed Agile Retrospectives & How to Solve Them
    3 Challenges of Distributed Agile Retrospectives & How to Solve Them Michael Ball-Marian, Agile Expert at CA Technologies Recorded: Jul 19 2018 58 mins
    Of all the Agile practices, none is more foundational than the inspect & adapt cycle of the retrospective. Even if you struggle with every other aspect of Agile, if you consistently engage in productive retrospectives, you will get better.

    Industry surveys and studies suggest that 80% or more of Agile organizations have at least some distributed teams. Most of the traditional retrospective methods assume that all team members are co-located.

    Running effective retrospectives for distributed teams presents unique challenges, but also, potentially, some great advantages. In this webinar, Agile coach and Instant Agenda co-founder Michael Ball-Marian will discuss the three greatest challenges to running distributed Agile retrospectives and how to solve them. Michael will share a variety of tips and techniques that you can use in any retrospective, co-located or distributed. Finally, he’ll present a few ways in which a distributed retrospective can actually be better than a co-located one.
  • The Public Sector Guide to FISMA Accreditation
    The Public Sector Guide to FISMA Accreditation Jeff Valentine, Chief Product Officer, CloudCheckr, and Matt Jordan, VP Corporate Development, JHC Technology Recorded: Jul 19 2018 47 mins
    FISMA is the all-embracing legislative framework for protecting the security, integrity, and availability of federal information and information systems. To meet FISMA compliance requirements, governmental agencies and private contractors that handle federal data must maintain full visibility over their information system inventory.

    Attendees will learn:
    - How to leverage existing documentation
    - Shared responsibility
    - Gaining an ATO without FedRAMP assessed infrastructure
  • SEC Guidance - Cyber Security Disclosures
    SEC Guidance - Cyber Security Disclosures Aseem Rastogi CEO & Founder - CloudOptics Recorded: Jul 19 2018 32 mins
    Information / Discussion on SEC Guidance On Public Company Cyber Security Disclosures

    The Securities & Exchange Commission, in Feb-2018 has published a guidance to assist public companies in handling Cyber Security Risks and Incidents. In this webinar, participants will learn about -
    - Context Of SEC Guidance
    - Purpose Of SEC Guidance
    - Disclosure Approach
    - Steps to Adhere to Guidelines
    - Technology & Operational Considerations
  • The Rise and Fall of the Empire - ITIL and Digital Transformation
    The Rise and Fall of the Empire - ITIL and Digital Transformation David Smith President Micromation Inc. VeriSM, ITSM, ITIL, Lean, Kaizen, ISO, TCO. Author – Implementing Metrics Recorded: Jul 19 2018 44 mins
    DT is altering the food chain! Is your ecosystem adapting fast enough?

    Listen to real-world examples of how some companies are evolving and transforming at an incredible rate fueled by technologies that didn’t even exist a short while ago.

    No sector or industry is immune or future proofed from what’s about to follow. Traditional big business and institutions are at risk of being displaced, becoming obsolete or made irrelevant.

    The pace of change is accelerating exponentially; are you adapting fast enough?

    What if - there was a new service management model that could help you tap into and leverage your current investments, methods and human capital to adapt more quickly.

    What if - this new service management model was self-organizing, just-in-time, low entry cost, flexible and elastic?

    What if - this new service management model inspired innovation, creativity and outside the box thinking?

    Would it be worth the hearing about it?

    This session is about how to optimize and transform IT Service Management in the digital age.

    In 45 minutes we’ll cover: 
    *How digital transformation is shaking things up
    *How ITSM is evolving to manage services in the digital age.
    *What’s VeriSM all about
    *What’s the new Business/IT ecosystem
    *What’s the new management mesh
    *How does governance enable innovation
    *How to pick up the pace
    *How to learn more
  • ITSM Masterclass: ITIL in a world of digital transformation
    ITSM Masterclass: ITIL in a world of digital transformation Akshay Anand, ITSM Product Ambassador, AXELOS Recorded: Jul 19 2018 33 mins
    What is digital transformation, how are companies going about accomplishing it and what does that mean for ITSM?

    In this session ITSM Product Ambassador, Akshay Anand, discusses the role of ITIL in digital transformation initiatives. Akshay will reveal how you can leverage the ITIL 9 Guiding Principles to achieve success in your digital transformation.

    Join this session to gain actionable insights and learn how you can get involved with upcoming ITIL content which will improve success for digital transformation at your business today.
  • VeriSM™ - Exploring the New (Service Management) Kid in Town
    VeriSM™ - Exploring the New (Service Management) Kid in Town Simon Dorst, Michelle Major-Goldsmith - Kinetic IT Recorded: Jul 19 2018 45 mins
    Michelle Major-Goldsmith and Simon Dorst of Kinetic IT will discuss the role of VeriSM in digital transformation, and its relation to ITIL and other service management practices.
  • The New Frontier Of Hybrid IT
    The New Frontier Of Hybrid IT Scott Mathewson, Data Center Practice Lead, North America, Softchoice Recorded: Jul 18 2018 52 mins
    The journey to the cloud had just had a major breakthrough.
     
    With VMware software now available on the global AWS Cloud, there is now a single, consistent, pervasive connectivity and a secure platform for apps and data. Whether that is in the Datacenter or in the AWS Cloud. This gives you the power to move existing applications seamlessly to the cloud and back as needed.
     
    You’ll understand how you can quickly get workloads on the cloud without having to re-engineer your applications. Keep applying the skills you've developed on the VMware platform, backed by the large array of services in the AWS platform. This allows you to be agile, reduce capital costs and increase availability for innovations.
     
    In this webinar, we will show you: 
    - How, as a VMware customer, you can go into the cloud without retraining, reconfiguring your apps, refactoring and more
    - What it will mean to have immediate access to the AWS platform and services and how it'll accelerate innovation
    - Immediate value Business Cases related to increased agility, disaster recovery, and stretch networking for high availability.
     
    Presenter Info:
     
    Scott Mathewson, Data Center Practice Lead, North America, Softchoice
    As Practice Lead for Softchoice North America, Scott has over 25 years of Datacenter experience with EMC, VMWare and Cisco, he is responsible for defining Softchoice assessments and services offerings for VM ware and SDN. Scott works with customers to develop solid solutions as it relates to SDS, SDN, Cloud, management and automation solutions.
  • Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint
    Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint Srinivas Kumar, Vice President of Engineering, Mocana and Keao Caindec, Vice President of Marketing, Mocana Recorded: Jul 18 2018 40 mins
    Part 1 - Securing the Boot Process

    When people think about cybersecurity today, they typically think about securing data in motion and at rest or analyzing threats. But when you move into this new IoT connected world, you need to think about more than just the data and monitoring hackers. How do you ensure you can trust the actual IoT endpoint device? This 3-part webinar series will focus on approaches for making devices trustworthy and enabling secure device-to-cloud communications.
  • Re-Inventing IT Service Management with Artificial Intelligence
    Re-Inventing IT Service Management with Artificial Intelligence Rich Graves, Director of Product Management @ ServiceAide Recorded: Jul 18 2018 48 mins
    Artificial Intelligence has finally come to IT Service Management in the form of a Virtual Agent that can act as a Level-0 analyst. This webinar will explain how Luma, a virtual agent can perform the duties of a Level-0 technician, freeing organizations from the high cost of manning a help desk and providing round-the-clock support. You will see Luma in action, automating self-service, guiding users to create actionable tickets, performing knowledge lookups, and automating tasks such as reset password. Users stay informed of ticket status and can provide feedback whenever and wherever they are through the channel of your choice. Since a Level-0 tech should also unburden senior techs, you’ll see how Luma helps level-2 technicians improve their productivity by managing and assigning tickets, automatically following up with users, and enabling users to access and update ticket information without a human technician in the loop. Finally, see the no-coding tools available to create unique capabilities for your organization if the 200+ out of the box skills need to be extended.
  • The Digital Transformation of ITSM - AI, Automation and NLP
    The Digital Transformation of ITSM - AI, Automation and NLP Doug Tedder, Principal, Tedder Consulting Recorded: Jul 18 2018 49 mins
    So much is being written (myself included!) about how ITSM helps an organization prepare and support digital transformation. But ITSM itself is going through digital transformation.

    How will the way we approach and deliver ITSM change as a result?

    Join me as I discuss “The Digital Transformation of ITSM”.

    About Doug Tedder:
    Doug Tedder is the principal of Tedder Consulting LLC, a Service Management and process improvement consultancy. Doug is a recognized thought leader who is equally adept in interactions from senior leadership to day-to-day practitioners. His attention to detail, industry knowledge, emotional intelligence, and the ability to “see the big picture” and make it actionable has resulted in a track record of success in transforming IT organizations into valued business partners.

    Prior to starting his business, Doug spent over 25 years working in corporate IT organizations in a variety of local, regional, and global roles.
    Doug holds numerous industry certifications in disciplines ranging from ITIL®, COBIT®, Lean IT, DevOps, KCS™, VeriSM™, and Organizational Change Management.

    Doug is an author, blogger, and frequent speaker and contributor at local industry user group meetings, webinars, and national conventions. Doug is a member and former president of itSMF USA, a member of HDI, a contributing author to VeriSM™, and co-author of the VeriSM™ Pocket Guide. Follow Doug on Twitter (@dougtedder) or visit his website (dougtedder.com).
  • Three reasons to choose Citrix Workspace over VMware Workspace ONE
    Three reasons to choose Citrix Workspace over VMware Workspace ONE Amandeep Nagra, Sr. Product Marketing Manager, Workspace services, Citrix Recorded: Jul 18 2018 57 mins
    Join Amandeep Nagra, Sr. Product Marketing Manager, Workspace services as he explores Why Citrix Workspace wins vs Workspace ONE.

    With more IT resources moving to the cloud and a greater mobile workforce, you need to deliver a secure digital perimeter with a framework that enables greater user productivity, security, and IT management flexibility. This webinar shares why customers choose an integrated Workspace that maintains user context through apps, files and desktops across networks. Citrix Workspace offers a unified user and admin experience.

    Some of Citrix Workspace key advantages include:
    • Higher user productivity and a better experience
    • Stronger security which extends to the cloud
    • joe Greater flexibility to manage apps, data and devices for any on-prem, cloud or hybrid scenario

    Machine learning based user behavioral analytics that feeds from Citrix product analytics and constantly refines the “normal” user behavior to proactively prevent compromised users from accessing corporate data
  • The Future of Service Management
    The Future of Service Management Vidhya Srinivasan, AVP, DSM Solution Marketing, BMC Software Recorded: Jul 18 2018 60 mins
    In today’s world, IT processes are often manual, inaccurate, and slow. This results in frustration for users and IT: high costs and low productivity. In an age of digital disruption and transformation, savvy leaders know that the future of IT is not just in the cloud, but in multiple clouds. As multi-cloud and hybrid cloud become the norm, managing and scaling these services are key. Yet, even as multi-cloud strategies are powering mission-critical service requirements of today’s digital businesses, there are considerable challenges.

    In this presentation, Vidhya Srinivasan will talk about how companies are migrating workloads to the cloud to spend less time on upgrades and achieve the flexibility needed to survive in today’s digital environments. She’ll share best practices on:

    - How to deliver the immediacy and accuracy of service end-users expect, on the channel of their choice.
    - How to automate service desk processes and leverage containers as a delivery model for increased business agility and reduced time for upgrades and DevOps integrations.
    - How to deflect lower-level service calls, scale support, and reduce costs with chatbots and virtual agents.


    Attendees will walk away with an understanding of:

    - How to select the right tools for managing, securing, and optimizing your investments.

    - How to deliver everything-as-a-service with intelligent omni-channel experiences.

    - How to transform with cognitive capabilities to improve productivity, reduce costs and resolution time. 

  • A new approach to IT Service Management: Selfless Service
    A new approach to IT Service Management: Selfless Service Sanjeev NC, Solutions Architect, Freshworks Recorded: Jul 18 2018 31 mins
    Service desks are closer to the customers than we can ever imagine. With self-service adoption on the rise and Service desks making it easy for their users to reach them, why do we still hear IT agents complaining users don’t raise tickets? Can we get the Service desk closer to the customers? What if the Service desk lives where the customers are already there?

    This talk explores the possibility of approaching Service management with a selfless mindset focusing primarily on self-service and customers logging tickets with the service desk. A selfless approach takes a lot of effort but not without its benefits.

    About Sanjeev NC;

    Sanjeev is a Solution Architect helping Enterprise customers with their ITSM tool implementation. He’s an ITSM enthusiast with consulting, blogging & speaking experience and enjoys delivering content creatively through memes, comics and puns. He is currently on a mission to ensure every customer support interaction yields the best possible experience.
  • Verizon Threat Research Advisory Center - Insider and Privilege Misuse
    Verizon Threat Research Advisory Center - Insider and Privilege Misuse David Kennedy and John Rudolph, Verizon Global Security Recorded: Jul 18 2018 79 mins
    Leverage Threat Intelligence where it matters most.

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Insider and Privilege Misuse

    Our Verizon Threat Research Advisory Center presenters will be:

    • John Rudolph, Principal Consultant, Identity and Access Management
    • Steve Atnip, Senior Analyst, Threat Intelligence
    • David Kennedy, Managing Principal, Open Source Intelligence
    • Laurance Dine, Managing Principal, Investigative Response – EMEA

    For this month's theme of 'Insider and Privilege Misuse' we'll feature John Rudolph, Principal Consultant, Identity and Access Management who'll discuss insider threat motivations, common denominators, and countermeasures, to include the Zero Trust approach. We'll then touch base on the IR Pulse and trends in our caseload, followed by:

    • Current Intelligence
    • Attacks & Threat Indicators
    • Latest Malware Trends
    • Significant Vulnerabilities
  • Your Growing Cloud Investment: The Magic Formula for Your Cloud Success Story
    Your Growing Cloud Investment: The Magic Formula for Your Cloud Success Story Todd Bernhard, CloudCheckr Product Specialist, Ian Thorton-Trump, Cybersecurity Expert, Laurent Mombel, N2WS System Engineer Recorded: Jul 18 2018 57 mins
    Abracadabra AWS! Presto change Cloud!

    Magic words alone are not enough to deliver the return on investment and cyber security out of your AWS cloud. Join N2WS for a great Webinar Magic Show. We will dispel your business’s fears of cloud migration, demystify cloud compliance and escape from the dunk tank of complexity – especially when it comes to managing backup and ensuring uptime.

    Hosted by cybersecurity expert Ian Thornton-Trump, N2WS System Engineer, Laurent Mombel, and CloudCheckr Product Specialist Todd Bernhard, we will spend an hour brewing up a cauldron of information for you - using the recipe for AWS success:

    - Rapid Recovery
    - Flexible Backup
    - Shrink Downtime
    - Why hybrid is dangerous
    - Benefits for small, medium and large companies
    - Maintain Compliance
    - Ease Auditing

    Alakazam! See you there!
  • How Can ITSM Exist in the Cloud?
    How Can ITSM Exist in the Cloud? Daniel Breston, Principal Consultant, Virtual Clarity Recorded: Jul 18 2018 41 mins
    I remember when virtual or cloud became the scary marketing words for any Operations or Infrastructure or ITSM person. My role is going, my skills won’t be needed. Our processes will break. We can’t go that fast!!!

    Now years later – we have seen that what we do underpins what the organisations gets when they adopt and adapt to cloud based services. Let’s see why this happened and discuss how we can continue to be the innovation side of technology just like we have been all along.

    Join me, Daniel Breston, to discuss how ITSM is relevant in the world of cloud or fast technology services delivered by multiple suppliers or technologies.

    About Daniel Breston;

    Daniel is a Principal Consultant for Virtual Clarity leading the operating model practices incorporating DevOps, ITSM, Agile Ops and leanIT Leadership. Daniel is a frequent speaker for BrightTalk, the British Computer Society, SITS, HDI or other conferences. Daniel is also a contributor to the VeriSM and SIAM Body of Knowledge acts as a mentor or coach for leaders interested in getting the best from technology services.
  • Best Practices in Driving DevOps Transformation
    Best Practices in Driving DevOps Transformation Paul Rechsteiner, Principal Product Manager, Incident Response Recorded: Jul 17 2018 21 mins
    The benefits of DevOps transformation are significant and well-understood, with over 70% of organizations having already implemented or planning to implement DevOps within the next 12 months according to Forrester. But it’s not a change that happens overnight. After empowering tens of thousands of operations teams to effectively manage their services in production, we’ve distilled what we’ve learned from them into a few best practices that have been foundational to driving change and transforming to be more agile.

    In this session, we’ll go over a few topics:

    - Common operational challenges across the organizational spectrum
    - The top best practices that organizations use to empower distributed teams
    - How to enable both central and distributed teams to gain comprehensive visibility, take action on issues fast, and be more productive
    - A couple of case studies of real organizations who have achieved successes in the journey toward DevOps transformation, and how they’re getting there
  • Employee Service is a Game Changer
    Employee Service is a Game Changer Bob Gardner, David Russell Recorded: Jul 17 2018 42 mins
    In today’s organization, every department is a service provider. Modern service management strategy has drastically improved IT services, but employees need more than that. Accreditation Commission for Health Care (ACHC), actually introduced a service catalog and ticketing strategy through its marketing department. It was such a success that multiple departments followed suit. Learn how they strategized, implemented, and measured results throughout their organization!
  • How can static analysis help DevOps teams maintain velocity securely?
    How can static analysis help DevOps teams maintain velocity securely? Meera Rao, senior principal consultant and director of the secure development practice - Synopsys Software Recorded: Jul 17 2018 46 mins
    Static application security testing (SAST) is the process of examining source code for security defects. SAST is one of many checks in an application security assurance program designed to identify and mitigate security vulnerabilities early in the DevOps process. Integrating SAST tools into DevOps processes is critical to building a sustainable program. And automating these tools is also an important part of adoption, as it drives efficiency, consistency, and early detection.

    If you have questions like these, and you’re concerned about integrating SAST tooling into your DevOps process, this session will offer actionable advice to automate security testing that supports DevOps velocity.

    But DevOps practitioners looking to integrate SAST tools into the DevOps pipeline often have questions:

    How do I manage false positives?
    How do I triage the results?
    What happens to new issues identified?
    How can I use a tool in my DevOps pipeline?
  • DevOps and Continuous Delivery: The Keys to Digital Transformation
    DevOps and Continuous Delivery: The Keys to Digital Transformation Carl Caum, Engineering Product Manager, Puppet Recorded: Jul 17 2018 48 mins
    Your customers have become accustomed to new capabilities at unprecedented speeds. In order to meet expectations and outperform your competitors, you need to continuously — and reliably — deploy updates to applications and infrastructure, while minimizing risk and downtime.

    In this talk, you’ll learn why DevOps and continuous delivery are the single greatest changes your organization can embrace to achieve your digital transformation goals, and what you’ll need to get started.
  • Need for Speed! Digital Transformation and DevOps
    Need for Speed! Digital Transformation and DevOps David Smith President Micromation Inc. VeriSM, ITSM, ITIL, Lean, Kaizen, ISO, TCO. Author – Implementing Metrics Recorded: Jul 17 2018 45 mins
    DevOps! Curse or Cure for DT’s insatiable need for speed?

    Many predict mass extinction of traditional jobs as we know them today as a result of digital transformation and disruption.
    No sector or industry is immune or future proofed from what’s about to follow. Traditional businesses and institutions are at risk of being displaced, becoming obsolete or made irrelevant.

    Listen to real-world examples of how some companies are evolving and transforming at an incredible rate fueled by management practices and technologies that didn’t even exist a short while ago.

    The pace of change is accelerating exponentially; are you adapting fast enough?
    What if – you could deploy software 46 times faster?
    What if – you could recover 96 times faster from system downtime?
    What if – you could deploy changes with 80% less failures?
    Would it be worth the hearing about it?

    This session is about how smart companies are deploying new business functionality in the digital age.

     In 45 minutes we’ll cover: 
    * How digital transformation is shaking things up
    * What’s DevOps all about
    * How’s DevOps evolving in the digital age
    * What are the key lessons learned so far
    * What’s the new management practice TRIAD
    * What are the killer automation Apps
    * How to pick up the pace
    * How to learn more
  • The Secret to Harder, Better, Faster, Stronger DevOps
    The Secret to Harder, Better, Faster, Stronger DevOps Prakash Vyas, ITOA Specialist EMEA and Endre Peterfi, Major Account Sales Engineer, Splunk Recorded: Jul 17 2018 49 mins
    Does your organization move at the speed your business needs it to? Keeping up with the pace is a game of do or die and those that recognize the impact of DevOps on digital transformation, will be the ones left standing. Bringing together insights from practice experts, industry roundtable discussions and research on the state of DevOps, Splunk shares the secret to winning the DevOps game.

    Join this session to:
    - Find out how DevOps can make your IT team and overall business (work) harder, better, faster, stronger
    - Discover what you need to benefit from DevOps (spoiler alert – you already have the key to its success!)
    - Learn all about ditching meh-trics in favour of measurement that matters
    - Hear how others are already experiencing the value of data-driven DevOps on their digital transformation journey
  • 2018 GTIR Report: Cybersecurity insights for protecting your digital business
    2018 GTIR Report: Cybersecurity insights for protecting your digital business Mark Thomas from Dimension Data & Rob Kraus, from NTT Security Recorded: Jul 17 2018 50 mins
    Cybercrime remains a pervasive threat; attractive and lucrative in its ability to generate profits with minimal risk of attribution or interdiction. Barriers to entry are reducing due to the diversification of illicit subscription services, automated software toolkits, and vast online criminal support forums. Cybercriminal ingenuity continues to mature, making the most of attack opportunities arising from new technology adoption.

    In this webinar, we explore the findings of the NTT Security Global Threat Intelligence Report, and provide insights to guide your security investment decisions aligned with your industry sector, geographic profile, and risk appetite.

    We will share notable insights into the evolving and emerging threat landscape, including ransomware, threat intelligence, industry targeting, and compliance regulations observed during the past year.

    Speakers:
    - Mark Thomas: Group CTO Cybersecurity,Dimension Data
    - Rob Kraus, Senior Director, Global Threat Intelligence Center Operations, NTT Security
  • Open source Kubernetes run-time security with Falco
    Open source Kubernetes run-time security with Falco Michael Ducy Jul 24 2018 5:00 pm UTC 30 mins
    Effective security requires a layered approach. If one layer is comprised, the additional layers will (hopefully) stop an attacker from going further. Much of container security has focused on the image build process and providing providence for the artifacts in a container image, and restricting kernel level tunables in the container runtime (seccomp, SELinux, capabilities, etc). What if we can detect abnormal behavior in the application and the container runtime environment as well? In this talk, we’ll present Falco - an open source project for runtime security - and discuss how it provides application and container runtime security. We will show how Falco taps Linux system calls to provide low level insight into application behavior, and how to write Falco rules to detect abnormal behavior. Finally we will show how Falco can trigger notifications to stop abnormal behavior, notify humans, and isolate the compromised application for forensics. Attendees will leave with a better understanding of the container security landscape, what problems runtime security solves, & how Falco can provide runtime security and incident response.
  • The Portfolio Driven Organization
    The Portfolio Driven Organization Andy Jordan, Roffensian Consulting Inc. and Jim Tisch, CA Product Marketing Jul 24 2018 5:00 pm UTC 60 mins
    Portfolio management has become more important in recent years, but for most organizations it’s still a tool they use to support other strategic processes. Industry expert Andy Jordan doesn’t think that’s enough, and in this webinar he explains the concept of a portfolio driven organization. This puts portfolio management at the heart of everything the organization does including:

    - Investment planning and management
    - HR and development strategies
    - Technology strategy
    - Organizational capacity and capability planning

    In Andy’s usual upbeat and thought-provoking style, he’ll explain why portfolio management needs to be the hub of all strategic work in progressive organizations, and he’ll provide attendees with practical tools to start evolving their organization. Don’t miss out, register now.
  • Get IT Done: Strategies for Supporting the Modern Workforce
    Get IT Done: Strategies for Supporting the Modern Workforce Roy Atkinson and Peter Zeinoun Jul 24 2018 5:00 pm UTC 60 mins
    More than one-third of organizations identify "managing an increased workload with existing staff" as their primary challenge, according to a recent survey of support organizations conducted by HDI. Compounding this challenge is the growing complexity of the modern workforce: traditional workspaces are giving way to a remote workforce and the gig economy. These workers bring with them their own devices for use at work and are conditioned to expect business apps to be as lightweight and frictionless as the apps used in their consumer lives.

    In this webinar, HDI Senior Analyst and Peter Zeinoun will provide essential information for support leaders who must reimagine how to deliver an "awesome" support experience for employees, improving both the productivity of the modern workforce and those who support them.

    In this webinar, we will discuss:

    *How the employee support dynamic is shifting
    *How to create a frictionless employee experience
    *How to use training and professional development to increase productivity, retention, and morale
  • 10 Questions on ServiceNow with Acorio Experts
    10 Questions on ServiceNow with Acorio Experts Ajay Gautam, Damian Broccoli, Jared Romaine, Juliet Acuff, Meghan Lockwood, Ryan Dinwiddie, Sean Duhaime Jul 24 2018 5:00 pm UTC 60 mins
    This panel discussion will feature leading experts from various departments inside Acorio, bringing tactical experience and strategic vision to help you guide your ServiceNow journey today. Learn from Acorio’s hundreds and hundreds of successful go-live’s – and pick the experts’ brains about their experiences in the ServiceNow trenches.
  • Get Started: Security and Compliance in the Cloud
    Get Started: Security and Compliance in the Cloud Todd Bernhard, CloudCheckr Product Marketing Manager Jul 24 2018 6:00 pm UTC 30 mins
    When choosing a Cloud Management Platform (CMP), enterprises should be looking for Security and Compliance capabilities in addition to Cost Management and Cloud Governance. CloudCheckr is a full-service CMP that delivers "all of the above".

    Additionally, enterprises need to understand their role in the Shared Responsibility Model, in order to fully meet security standards like FedRAMP, HIPAA, PCI and more. CloudCheckr's new Total Compliance module can now automatically and continuously monitor your infrastructure for compliance with 37 different standards, such as HIPAA, PCI, and NIST 800-53.

    Join us for a hands-on demonstration of some of the popular security and compliance features CloudCheckr offers.

    Attendees will learn:
    - Best Practice Checks as it relates to cloud usage
    - Our *New* Total Compliance module
    - Automated "Fix Now" capabilities that can save time and effort
  • Windows 10 & Office 365 Migration and Optimization Strategies
    Windows 10 & Office 365 Migration and Optimization Strategies Matt Crawford, Citrix Dir. Solutions Marketing and Matt Brooks, Citrix Sr. Technical Product Marketing Mgr. Jul 24 2018 6:30 pm UTC 60 mins
    Learn how to manage the top migration challenges and improve user productivity, security and IT management flexibility.

    With the shift to the Cloud, more companies are moving to Office 365 and Windows 10. Before you make your move, you’ll want to attend this webinar to learn how to manage the top migration challenges with Citrix Workspace and improve user productivity, security and IT management flexibility.

    For a sneak preview, here are few of the top challenges that you’ll learn how to solve by attending the webinar:

    •Managing a mixed environment of Windows 10 and Windows 7 devices with legacy PC management tools
    •Windows 10 application incompatibilities
    •Mobile security risks with running Exchange on-prem
    •Network latency from running O365 in the cloud
    •Managing multiple file hosting services including OneDrive
  • Managing Hybrid Clouds like a Pro
    Managing Hybrid Clouds like a Pro Dan Waymire, Senior Manager of Unified Cloud at Hosting Jul 25 2018 5:00 pm UTC 60 mins
    Join Hosting’s Dan Waymire, SR. Manager of Unified Cloud, to see first-hand how Hosting can help your organization monitor assets in any environment, all within a single pane of glass.

    Enterprises today are aware of the risks of taking an exclusively public cloud approach. Companies need a holistic cloud strategy spanning deployments in:

    • Private Cloud
    • On-premise
    • Public Cloud

    As IT professionals distribute workloads across various clouds, it is more critical now than ever to manage the performance, availability, and cost of your IT assets.

    In this webinar, you will learn how you can effectively manage all of your environments, as Dan demonstrates the true value of adopting a single-platform monitoring tool.
  • Targeted Defense: The Future of Defending Applications in Production
    Targeted Defense: The Future of Defending Applications in Production Mahesh Babu, General manager, Runtime Protection, at Contrast Security Jul 25 2018 5:00 pm UTC 60 mins
    Raise your hand if this is you:

    - Our development teams have a massive security backlog and can’t fix everything in code
    - We need to protect legacy applications with no build pipeline or no dev team support them
    - Struts 2 made us realize we need better production controls and faster zero-day response
    - Our SOC has alert fatigue and has no visibility or context regarding production applications
    - RASP is interesting technology – we are curious to see how we would use it

    At Contrast Security, we have been hearing this from our customers and have been hard at work to solve these problems. We are proud to announce the release of the Contrast Targeted Defense Platform, the next generation of runtime protection.

    Join Mahesh Babu (General Manager, Runtime Protection) to learn more about Contrast’s new Targeted Defense Platform and its new capabilities that include, but are not limited to:

    - Intelligent, multi-technique detection
    - Advanced attack response that goes beyond monitoring and blocking
    - Language agnostic protection
    - Simple deployment
  • Modernizing the Employee Experience Through IT Service Management
    Modernizing the Employee Experience Through IT Service Management Kyle Shepard, Matt Cox, Joseph Brown Jul 25 2018 6:00 pm UTC 45 mins
    Organizations are looking to access services in a completely different way. In the past, technology leaders have had to deal with multiple softwares or solutions for individual lines of business, now they have the opportunity to take all of the services within an organization and measure them through one service platform. In this panel discussion, we’ll go through the tenants of customer service and how those are now applied through IT service management best practices to make this the era of employee services.
  • Automated Security Lifecycle Management – Mocana TrustCenter
    Automated Security Lifecycle Management – Mocana TrustCenter Srinivas Kumar, Vice President of Engineering, Mocana and Keao Caindec, Vice President of Marketing, Mocana Jul 25 2018 6:00 pm UTC 45 mins
    Part 1 Enrollment Service

    Protecting the manufacturing supply chain requires rethinking the way companies develop, manufacture, activate and manage IoT devices. Traditional IT approaches to identity management, enrollment and updates are vulnerable and not scalable. This 3-part webinar series will focus on approaches for making it easier to automate onboarding, enrollment and device management and updates.
  • The Future of ITSM: The Rise of Automation, Agile, and the User Experience
    The Future of ITSM: The Rise of Automation, Agile, and the User Experience George Spalding, VP, Pink Elephant and Chuck Darst, Senior Product Marketing Manager, Cherwell Jul 25 2018 7:00 pm UTC 60 mins
    The ”Digital Transformation” era is upon us. But, in many ways, this feels tactical in nature.

    The strategic goal of Digital Transformation should be “Value Transformation”, working in partnership with IT business partners. To do this and stay relevant, ITSM must integrate the key principles of Lean, Agile, and DevOps into a vastly improved delivery system that focuses on a single goal - business value. Namely, better services delivered faster and for less cost. Join George Spalding, Executive Vice President, Pink Elephant and Chuck Darst, Senior Product Marketing Manager, Cherwell Software as they discuss the next frontier of ITSM.

    George is one of North America’s most insightful and engaging ITSM and support leaders, George is an ITIL® expert with more than 30 years’ experience in the IT industry. He is co-author of the ITIL V3 Continual Service Improvement core volume.

    George spent several years as a consultant to the White House on technical presentations and conferences. He also coordinated technical presentations for members of the President’s cabinet, the Smithsonian Institute and the Federal Bureau of Investigation. A regular author of IT articles and white papers and a sought-after presenter at global ITSM conferences and webinars, George’s winning personality captivates audiences, be it in print, over the airwaves or in person.
  • Industrial IoT: What is Missing and What is Next?
    Industrial IoT: What is Missing and What is Next? Ian Hughes, Senior Analyst IoT, and Emily Wentworth, Research Associate Jul 26 2018 3:00 pm UTC 60 mins
    451 Research has covered the adoption of Industrial IoT for several years, and it is a significant area to consider both for existing IT providers and for those industries looking to automate further. IIoT has significant long-term equipment installations, brownfield sites, as well as major new installations adopting all of the latest technology, under its umbrella. This area also has the ongoing organizational struggles between Operational Technology (OT) and IT, making projects more complicated to build and deploy. There are also some noticeable gaps in the approaches to IIoT and its related technologies that may not have been dealing with adequately.

    During this webinar, Ian Hughes, Senior Analyst for IoT, VR and AR, and Emily Wentworth, Research Associate, at 451 Research will describe the current state of play of IIoT and then introduce some key challenges and opportunities in the future. Ian will touch on the challenge of defining architectures in IIoT, and testing and implementing solutions. He will further highlight the importance of uniting OT and IT and the role of people in what is often portrayed as a pure automation play, as well as cover how front-line workers will need to engage with IIoT on the shop floor, using tools such as Augmented Reality (AR) to get the full benefit of this digital transformation wave. Emily will cover her work on Cobots in this presentation.

    The webinar will be of use to those in the IT industry who will benefit from the OT perspective and vice versa.
  • Next Generation LinkRunner
    Next Generation LinkRunner James Kahkoska, CTO – NETSCOUT Handheld Tools Jul 26 2018 4:00 pm UTC 60 mins
    LinkRunner™ is the most popular Ethernet tester in the world. Since 2003 it has been the go to tool for over 120,000 dispatched network professionals doing network troubleshooting or moves, adds and changes. The LinkRunner AT has thrived 5 years in the fast waters of edge network test with over 70% of users giving it 5 stars in Amazon. So began the challenge to replace this iconic and beloved tester.

    During this webinar, you will learn how the next generation LinkRunner G2 and use of the Android operating system extends the functionality well beyond connectivity testing. Additionally the Link-Live Cloud Service enhances the collaboration between teams during the deployment and troubleshooting of the access network.
  • Unleash the Power of NVMe Fabrics
    Unleash the Power of NVMe Fabrics Rick Walsworth, Venky Nagapudi Jul 26 2018 5:00 pm UTC 60 mins
    This webcast will provide an architectural view of the NVMe over Fabrics, the different technology approaches, and best practices to consider when evaluating this technology. During this session, you’ll be provided with real-world use cases and examples as well as the benefits of NVMe for the following key areas:
    -How to migrate services from standard SCSI based to NVMe-oF based
    solutions using FC
    -Detailed architectural analysis and benefits achieved by deploying NVMe-
    oF via GbE.
    -Tradeoffs and decision to utilize mixed mode FC and GbE deployments.

    In addition to the presentation, there will be a brief demo of the Vexata
    NVMe-oF solution presented to show how the system performs for high frequency, enterprise use cases.
  • Best practices for Forensics and Incident Response in Containers
    Best practices for Forensics and Incident Response in Containers Knox Anderson Jul 26 2018 5:00 pm UTC 30 mins
    Almost 5 years, 48,000+ github stars, and tens of thousand of production deployments later we can safely say containers are a technology that is a here to stay. Theyre developer friendly, easy to operationalize, and allow organizations to provide stable and secure services to their customers.

    While there are clear best practices for what it takes to build and run containers, there isn't as much knowledge around the performing forensic analysis of incidents that occur inside your containers.

    In this webinar we'll cover:

    - How containers change incident response and forensics

    - Best practices around forensic data collection in container environments

    - Compare opensource and commercial forensics options

    - A live demo of multiple forensics investigations using Sysdig Inspect: an opensource container forensics tool
  • What's New: Cloud Management Updates
    What's New: Cloud Management Updates Todd Bernhard, CloudCheckr Product Expert Jul 26 2018 6:00 pm UTC 30 mins
    CloudCheckr is a robust cloud management platform (CMP) that offers a variety of features to help enterprises, resellers, and public sector organizations optimize their public cloud infrastructures. While most competing platforms only offer cost optimization or security, CloudCheckr offers both -- plus new compliance features.

    CloudCheckr is updated regularly to maintain and improve the user experience. Product Expert Todd Bernhard walks you through the latest updates in a software demo.

    New updates include:
    - New messaging system
    - Report export options
    - Enhanced Copy DBR functionality
  • From ground to cloud - HSBC’s journey to an application network
    From ground to cloud - HSBC’s journey to an application network Marco Tedone, Global Head of API, Integration and Microservices Practice, HSBC Jul 26 2018 7:00 pm UTC 60 mins
    To deliver superior customer experiences and reduce operational costs, organizations across industries face an imperative to move their applications and data to the cloud. This is the case at HSBC, one of the largest banks in the world. Watch this CONNECT 2018 session to learn more about HSBC’s journey and gain insights on:

    * Why traditional approaches to integration and migration are no longer suitable, as they make IT a bottleneck.
    * How Anypoint Platform enables IT teams to easily modernize monolithic legacy applications into composable microservices, as well as migrate these services to cloud or IaaS platforms.
    *How leading banks like HSBC are building multi-cloud application networks using MuleSoft.
  • The role of threat intelligence in an effective security operation
    The role of threat intelligence in an effective security operation Oleg Glebov, Threat Management and Defense Solution Leader, Alexander Liskin, Heuristic Detection Group Manager Kaspersky Lab Jul 31 2018 10:00 am UTC 60 mins
    Experts predict a busy year for cybersecurity threats… a rise in general and accidental malware infections, an increased risk of targeted ransomware attacks and new types of malware and malicious tools all lie ahead.

    Threat intelligence is a key component of any effective security operation. Without exceptional, coordinated threat intelligence, cyber threats simply can’t be reliably identified or stopped.

    Kaspersky Lab is hosting a webinar on the key role of threat intelligence in an effective security operation. The webinar will be presented by Oleg Glebov, solution leader for our Threat Management and Defense portfolio and Alexander Liskin, Kaspersky Lab anti-malware research expert.

    The webinar is aimed at anyone with a professional interest in cybersecurity and threat intelligence, in particular IT security officers, incident response specialists and SOC analysts.

    The webinar will cover the following topics:
    • the current threat landscape – and the methods cybercriminals use to evade detection;
    • the critical role threat data feeds play in protecting you from attack;
    • the increasing importance of proven, established sandboxing – and the capabilities of Kaspersky Lab’s Cloud Sandbox;
    • APT and Financial Threat Intelligence Reporting;
    • how our experts use Threat Lookup for incident investigation;
    • Kaspersky’s Threat Intelligence Services – and how we can help build a comprehensive Incident Response (IR) framework with our Threat Intelligence Portal and Cloud Sandbox.
  • How to select an ITSM tool
    How to select an ITSM tool Eddie Potts, Principal Consultant Pink Elephant EMEA ltd Jul 31 2018 12:00 pm UTC 60 mins
    ITSM tools are replaced too frequently because buyers fail to gain the expected benefits. This is because the buying selection process is ill-considered. In this vendor neutral session, Eddie Potts references his experience working with businesses and multiple platforms to prove why the flawed buying process is a major reason why ROI is not achieved.
  • Backup as a Service, HYCU Data Protection for Google Cloud Platform
    Backup as a Service, HYCU Data Protection for Google Cloud Platform Manvinder Singh, Head of Strategic Partnerships, Cloud Storage, Data & Analytics, Google; Subbiah Sundaram, VP, Product, HYCU Jul 31 2018 3:00 pm UTC 60 mins
    How are you backing up your Virtual Machines (VMs), Applications (Apps) and data running on Google Cloud Platform (GCP)? For starters, you don’t want to write scripts or use legacy backup. They will remove the simplicity of Google Cloud.
    In this session, you will learn how easy it is to protect your VMs and Apps on GCP with a completely managed Backup as a Service from HYCU. HYCU Data Protection for GCP is a fully-managed solution that has been purpose-built from the ground-up for Google Cloud. Simply define the service level objectives, assign to Application/VM instances and HYCU Data Protection for Google Cloud Platform will take care of the rest.

    In this session you will learn:
    • How to leverage GCP to Power your business
    • How to turn on the HYCU Service for your projects on GCP
    • How to stop worrying about backup schedules and start thinking in terms of SLA you care about
    • How to selectively recover entire apps, VMs or individual files
    • How HYCU can automatically setup Google Cloud Storage as your backup target
  • Critical KPIs for Successful Cloud Migration
    Critical KPIs for Successful Cloud Migration Tim Grieser, Research Vice President, IDC and John Rakowski, Director of Technology Strategy, AppDynamics Jul 31 2018 4:00 pm UTC 60 mins
    85% of enterprises worldwide have a cloud-first strategy to accelerate agility, scalability, and innovation-at-speed. IDC surveyed 600 global enterprise decision makers to learn how they made informed choices around cloud migration.

    Register for this webinar to hear the findings IDC discovered about the critical KPIs for migration success. Hear from our guest speaker, Tim Grieser, Research Vice President from IDC to learn:

    - Decision criteria and types of applications being migrated
    - Why container technologies are important in enterprise application strategy
    - The critical application and business KPIs to focus on during planning, pilot and ongoing management in the cloud
  • Easy. Say Goodbye to Excel with ServiceNow CMDB with Discovery
    Easy. Say Goodbye to Excel with ServiceNow CMDB with Discovery Mike Bledsoe, Advisory Solutions Consultant at ServiceNow Jul 31 2018 4:00 pm UTC 15 mins
    Configuration Management Database (CMDB) conjures thoughts of Excel (manual entry—blah); it’s so cumbersome. But what if you could make it easier—automated, cloud based—and proactively eliminate service outages?

    Join our 15-minute webinar with ServiceNow Advisory Solutions Consultant Mike Bledsoe as he discusses common-use cases that prove the value in effective CMDB with ServiceNow’s Discovery solution. We’ve already started seeing how this is changing IT departments’ lives—there’s a reason why ServiceNow is Forbes’ #1 most innovative organization in the nation.
  • Comparing Prometheus custom metrics to APM
    Comparing Prometheus custom metrics to APM Eric Carter Jul 31 2018 5:00 pm UTC 30 mins
    Developers have numerous options for instrumenting code to monitor and troubleshoot application performance. When should you turn to custom metrics like Prometheus, statsd and JMX? When are tracing and APM the right fit? How do these solutions compare?

    Join us for our online session to learn:
    - The advantages and disadvantages of different approaches for application performance monitoring
    - When you should choose one solution over another and what the best use cases are for each
    - How to consolidate monitoring and accelerate troubleshooting when using multiple options
  • Close the Gaps: Managing, Prioritizing, and Addressing Cyber Risk in Enterprises
    Close the Gaps: Managing, Prioritizing, and Addressing Cyber Risk in Enterprises Jon Oltsik, Sr Principal Analyst at ESG & Karim Toubba, CEO of Kenna Security Jul 31 2018 6:00 pm UTC 45 mins
    Cyber risk management is no easy task. Why? Because while security teams may know about these vulnerabilities, they often lack the right amount of context to determine which vulnerabilities pose the greatest risk to the organization. Without this, the security team can’t appropriately prioritize which vulnerabilities should be remediated first.

    Join Kenna Security for our next webinar - “Close the Gaps: Managing, Prioritizing, and Addressing Cyber Risk in Enterprise Organizations,” with Jon Oltsik, senior principal analyst at ESG and Karim Toubba, CEO of Kenna Security.

    In this webinar, we’ll cover:

    - Findings from the July 2017 ESG Research Report, Cybersecurity Analytics and Operations in Transition
    - The challenges facing leadership teams in traditional methods of vulnerability management
    - Why more security data doesn’t always lead to better decisions
    - How the Kenna Security Platform can enable you take a risk-based approach to vulnerability management and help teams work cross-functionally to prioritize and mitigate cyber risk

    Discover the next wave of risk-based reporting and gain operational efficiency to maximize return on your risk mitigation efforts.
  • The Exciting and Surprising Future of IT
    The Exciting and Surprising Future of IT Kevin J Smith Aug 1 2018 3:00 pm UTC 60 mins
    The role of IT as a leader in the business is very different than how IT has been seen in the past. The business needs the leadership of IT more than ever. As IT professionals, we will be part of a remarkable transformation of IT over the next decade. This will change virtually all of what we do. Join Kevin as he dives into the factors that are driving these changes and how you can rise and extend your career in the midst of the changes.

    In this webinar, we will explore:
    - What changes to expect
    - What we can do now to be ready
    - How IT will undergo these changes while at the same tie remaining true to the fundamentals of IT