Hi [[ session.user.profile.firstName ]]

IT Service Management

  • Don’t know where to start with migrating to the cloud? Here’s one answer.
    Don’t know where to start with migrating to the cloud? Here’s one answer.
    Ensono Recorded: Feb 15 2019 3 mins
    Do you want the unlimited elastic scale, smart security and intelligence of the cloud but don’t know where to start? Does the cloud feel out of reach because of your legacy infrastructure, servers and storage devices? You could lift and shift everything but that means you don’t get the full benefits of the cloud.

    Or you could build from scratch in the cloud but that takes time and costs a lot of money. Another option is re-platforming. It combines the ease of lift-and-shift with the benefits of building directly in the cloud.

    Replace all your old hardware built to peak demand and get all the scalable, smart and secure benefits of the cloud. Re-platforming lifts-and-shifts just the app code and user data, leaving behind your outdated OS and physical disk volumes. This allows you to turn up and down your services based on real-time customer demand.
  • Tiedonhallintalaki tulossa, mitä tulossa?
    Tiedonhallintalaki tulossa, mitä tulossa?
    Jarkko Koivuniemi Recorded: Feb 15 2019 40 mins
    Hallituksen Digitalisoidaan julkiset palvelut -kärkihankkeen päätoimenpiteisiin kuuluu uuden tiedonhallintalain valmistelu. Tiedonhallinnan uudistamisen tavoitteena on varmistaa tietojen monipuolinen, sujuva ja turvallinen hyödyntäminen julkisissa palveluissa. Tulossa on siis uusi tiedonhallintaa koskeva yleislaki, julkisen hallinnon tiedonhallintalaki Laki tulisi voimaan vuoden 2019 aikana. Tule webinaariin kuuntelemaan ajatuksia, mihin pitää varautua.

    Julkisen hallinnon tiedonhallintaon muutosten edessä.

    Sisältö

    - Sääntelykohteet
    - Tiedonhallinta ja tietoturvallisuus
    - Tietoturvallisuussäännöksiä
    - Tekniset rajapinnat
    - VAHTI suositusvaatimukset
    - Asianhallinta ja tietoaineistojen muodostaminen
    - Metatietoa ja rekistereitä
    - Tiedonhallinnan elinkaarikysymykset ja arkistointi
    - JHS-179 ja kokonaisarkkitehtuuri
    - Suomen Ammattipuhujat on yksi Oppia.fi kouluttajakumppaneista.
  • ITIL 4 - Uusimmat uutiset
    ITIL 4 - Uusimmat uutiset
    Lari Peltoniemi Recorded: Feb 15 2019 54 mins
    Maailman suosituin palvelunhallinan viitekehys ITIL® saa uuden version. Julkaisuaikataulu on marraskuun 2018 mukaan vuoden 2019 ensimmäisellä neljänneksellä. Axelos julkaisee asiasta koko ajan uutta tietoa. Tässä webinaarissa kerrotaan mitä ITIL 4:stä on jo julkaistu.

    Lari Peltoniemi on työskennellyt prosessien ja toiminnan kehittämisen ja arvioinnin alueella yli 10 vuotta. Päätoimisesti IT-palveluiden prosessien määrittelyn, kehittämisen ja johtamisen alueella hän on toiminut vuodesta 2005. Hän on konsultoinut ja valmentanut useita suomalaisia ja kansainvälisiä yrityksiä ja organisaatioita ITIL/ITSM prosessien määrittelyihin, käyttöönottoon ja kehittämiseen liittyen. Lari on sertifioitu ITIL Foundation, ITIL Intermediate, VeriSM, SIAM Foundation, CAPO, CASM ja CMDB Foundation valmentaja.
  • Mastering IT Metrics
    Mastering IT Metrics
    Quentin McPhee, Implementation Manager, Vivantio Recorded: Feb 14 2019 53 mins
    IT monitoring and metrics play a key role in measuring IT service management success. By properly analyzing, understanding and measuring where the true value lies in your organization, you can effectively analyze risk, add value, reduce the cost of service delivery and boost the overall performance of your service teams.

    But without knowing what to measure, how to interpret the results and how to leverage your organization’s tools and data to make this possible, you’re setting yourself up for frustration and a lack of clarity in your reporting output.

    On Thursday, May 17th, join BrightTALK and Vivantio’s Senior Implementation Manager Quentin McPhee to learn what you and your senior management need to inform IT decision-making and drive sustainable service improvement, in practical terms.

    Quentin McPhee has more than 20 years’ experience in service management delivery and brings significant knowledge in implementing solutions for all types of organizations.

    This session is not just a ‘back to basics’, but rather will set out what every ITSM organization should be measuring and how to interpret the results, plus how to sustain the measuring process to become a self-aware powerhouse. We’ll also discuss:

    •What value reporting on your ITSM processes can realise
    •Different types of reports and who needs them
    •Tips, tricks and best practices to build out, maintain and sustain your organisation’s reporting structure

    We’ll also cover real-life examples of organizations who have improved efficiency through effective data analysis.

    --

    Vivantio is a leader in help desk, IT service management and customer service software, empowering service teams to embrace automation and improve service levels at hundreds of organisations around the world.
  • Cloud-Native Security: Understanding the Why and How
    Cloud-Native Security: Understanding the Why and How
    David M. Zendzian, CTO, at Pivotal and Jeff Williams, Co-founder and CTO at Contrast Security Recorded: Feb 14 2019 63 mins
    The latest Verizon Data Breach Investigations Report continues to confirm that top sources of data breaches continue to be at the application layer. DevOps and security teams are adopting modern, fully automated software delivery platforms to release apps to production environments multiple times a week or even daily. This has forced security teams to rethink the traditional processes and practices to make security a key component of their cloud-native transformation.

    Join Jeff and David to learn how enterprises are addressing cloud native application security at speed and scale. This session will cover:

    - Common security anti-patterns
    - What is Cloud-Native Security?
    - People: How to align Dev, Security and Ops teams to achieve Cloud Native Security
    - Process: How does Cloud Native change security processes to support the modern agile business?
    - Technology: Introducing Cloud Native Security tools to achieve continuous application security
    - Q&A


    This is the first webinar in a series presented by Pivotal and Contrast Security on Cloud-native Security best practices
  • Live Demo of OptiView XG
    Live Demo of OptiView XG
    Mike Pennacchi, Network Protocol Specialists Recorded: Feb 14 2019 61 mins
    Troubleshooting performance problems in today’s networks is only getting more complex:

    • Growth of 10G links with limited visibility
    • Increasing demands on wireless networks
    • Complex infrastructure with outdated documentation

    Last thing you need are hard-to-use tools that are complex in themselves or require extensive training before you can effectively use them.

    Please join us for a free webinar where Mike Pennacchi will talk about these issues and present a live demo of the OptiView® XG Network Analysis Tablet.

    XG expedites network performance problem solving by automating root cause analysis and providing guided troubleshooting to address problem areas - anywhere on the network – wired or wireless.
  • The ROI for VR/AR in the Enterprise
    The ROI for VR/AR in the Enterprise
    Intel, Atheer, Accenture, Nielsen Recorded: Feb 14 2019 79 mins
    The VR/AR Association Enterprise industry committee will present the latest case studies, best practices, and ROI
  • Introducing Anypoint Runtime Fabric: Deploy apps to the cloud easily
    Introducing Anypoint Runtime Fabric: Deploy apps to the cloud easily
    Ahyoung An, Sr. Product Marketing Manager at MuleSoft and Sundip Patel, Product Manager at MuleSoft Recorded: Feb 14 2019 45 mins
    This session covers how Anypoint Runtime Fabric provides greater flexibility and simplifies operations––enabling enterprises to transform their businesses faster using public, private, or hybrid clouds.

    Watch this webinar to learn how to:
    - Manage deployments in multiple clouds––all from Anypoint Platform’s cloud-based control plane, hosted by MuleSoft
    - Isolate applications, deploy multiple runtime versions in the same Anypoint Runtime Fabric, scale horizontally, and re-deploy with zero downtime
    - Eliminate manual tasks and optimize processes with an easy-to-use container service that offers built-in support for Docker and Kubernetes
  • Gain Control of Your Software Licensing Universe with SAM Best Practices
    Gain Control of Your Software Licensing Universe with SAM Best Practices
    Jennah Michalik Recorded: Feb 13 2019 54 mins
    This Webinar session will consist of a brief walk through of Software Asset Management’s foundation. Diving deeper into answering the age-old IT question “What do we own and how do we own it?” Specifically, we will highlight various types of legal documentation, noting key verbiage and contractual elements Software Asset Managers encounter in their day to day responsibilities. The briefing will cover various aspects of reviewing, drafting and negotiating agreements to ensure adequate protection and overall license term understanding. Attendees will gain insight into defining drafting and assigning SAM policies, procedures and responsibilities.
  • Teradici PCoIP Management Console Release 3.2.1
    Teradici PCoIP Management Console Release 3.2.1
    Edna Menon – Sr Product Mgr. & Paul Barrett – Systems Specialist - Teradici Recorded: Feb 13 2019 35 mins
    PCoIP Management Console Release 3.2.1 delivers powerful endpoint management capabilities with support for Active Directory and User Roles.
    Learn more about these much requested capabilities, and participate in our live Q&A with Teradici experts Paul Barrett, Systems Specialist, Global Support Services and Edna Menon, Senior Product Manager. This brief webinar will cover everything you need to learn about this important release through a live demonstration, including:
    •Support for Active Directory, including support for sub-domains
    •User Roles: System Administrator and Administrator roles
    •Web Interface performance improvements
    •…and more!

    Register now.
  • NNT Vulnerability Tracker™ - Re-Innovating the Vulnerability Scanning Market
    NNT Vulnerability Tracker™ - Re-Innovating the Vulnerability Scanning Market
    Mark Kerrison and Mark Kedgley Recorded: Feb 13 2019 46 mins
    Through a major collaboration with Greenbone Networks, NNT has advanced their security through system integrity strategy with distributed, fast and accurate Enterprise-Class vulnerability scanning.

    NNT Vulnerability Tracker is based on the commercial-grade version of OpenVAS, the world’s most widely adopted vulnerability assessment tool. This forms a significant progression of NNT’s SecureOps Enterprise Security Strategy and complements NNT’s award-winning Change Tracker Gen7R2 to further efforts in solving IT Security through the definition and delivery of Integrity.

    NNT’s Vulnerability Tracker™ identifies known vulnerabilities within software and configuration settings before they can be exploited by a cyber-attack. Vulnerability Tracker continuously tests and assesses your IT network and any device connected to it against more than 66k Network Vulnerability Tests (NVTs) with new vulnerabilities are added daily.

    Join Mark Kerrison, Chief Executive Officer of New Net Technologies and Mark Kedgley, Chief Technology Officer of New Net Technologies, in an interactive webinar as they showcase the all-new Vulnerability Tracker. Key topics and highlights will include:

    • Understanding how vulnerability management aligns with the basic underlying principles required for every security strategy
    • Where and how vulnerability management corresponds with the CIS Top 20 Controls
    • Architectural, features, functionality and competitive differentiators
    • Familiarity with our hyper-fast scanning technology allowing you can assess over 50,000 endpoints per 24 hours

    With Vulnerability Tracker, you will be able to identify and reduce the attack surface giving you better control and assurance that your infrastructure is operating with the least amount of risk.

    Register now to learn more about Vulnerability Tracker’s unique ability to deliver a comprehensive security solution that aligns with your security strategy to mitigate your overall security risk.
  • February Patch Tuesdayd 2019
    February Patch Tuesdayd 2019
    Chris Goettl, Todd Schell, Brian Secrist Recorded: Feb 13 2019 64 mins
    The average spent on Valentine’s Day is a topic that’s been making the rounds on social media. It’s generated shock and awe—but it’s nothing compared to the damage one exploited vulnerability can unleash on your organization. So, let’s keep the money in February flowing into flower stores and candlelit dinners, rather than into the pockets of those we’d never choose to date. For February the men (and women) of Patch Tuesday recommend you lavish attention upon Microsoft. Patch the exploited zero day, public disclosures, and privilege escalation vulnerability. Also, make time for the ever-popular target, Adobe. Because nothing leaves a worse taste in your mouth than a breach you could have prevented—unless, perhaps, it’s those chalky conversation hearts.
  • Dynaaminen johtamisjärjestelmä
    Dynaaminen johtamisjärjestelmä
    Mika Haikonen Recorded: Feb 13 2019 40 mins
    Digitalisaatio, ketteryys ja dynaamisuus ovat nykyaikaiselle johtamisjärjestelmälle asetettuja perusvaatimuksia. Toiminnan kehittämisessä vahvoja nykyteemoja ovat analytiikka, robotisointi ja automatisointi.

    Webinaariin ovat tervetulleita kaikki johtamisjärjestelmistä kiinnostuneet. Webinaarin kohderyhmää ovat erityisesti yrityksen johto sekä laadusta, toiminnan kehityksestä ja operatiivisesta toiminnasta vastaavat henkilöt. Osallistujat oppivat johtamisjärjestelmistä sekä teorian että käytännön esimerkkien kautta.

    Live-lähetyksessä pääset esittämään puhujalle kysymyksiä chatin kautta. Tarjolle tulee myös jälkitallenne.
    Webinaari toimii hyvänä pohjustuksena Oppian kouluttajakumppani QPR SOFTWAREN LUOKKAKOULUTUKSILLE.

    Asiantuntija Mika Haikonen toimii lead konsulttina QPR Software Oy:ssä. Hän on muutos-, prosessi- ja projektijohtamisen ammattilainen, jolla on yli 20 vuoden kokemus kansainvälisestä ICT-, prosessi- ja myyntiprojektitoiminnasta sekä yksityisellä että julkisella sektorilla. Mika on kokenut asiakas- ja sidosryhmäviestijä, ja intohimoinen ratkaisija niin työelämässä kuin vapaa-ajallakin.
  • CISO summit: what is ‘enough’ protection in light of inevitable cyber breaches?
    CISO summit: what is ‘enough’ protection in light of inevitable cyber breaches?
    Christian Toon, Ilijana Vavan, Thom Langford, Tilly Travers Recorded: Feb 13 2019 49 mins
    Replay: Kaspersky Lab is hosting a digital panel, bringing together cybersecurity executives and experts, to discuss the challenges that Chief Information Security Officers are facing after 86% revealed they believe cyber breaches are inevitable in a global survey.

    More than a third of CISOs say they struggle to secure required budgets when they cannot guarantee security, but how can they persuade the board to offer them more resources? This summit will cover how CISOs can manage limited resources – such as internal talent and budgets – to effectively protect increasingly digital businesses, as well as the importance of collaborating with other departments and company boards to keep up with the ever-evolving cyberthreat landscape.

    The panelists include Christian Toon, Chief Information Security Officer, Pinsent Masons LLP, Ilijana Vavan, Managing Director, Kaspersky Lab Europe, Thom Langford, Chief Information Security Officer, Publicis Groupe.

    The event is moderated by Tilly Travers, Senior Corporate Communications Manager, Kaspersky Lab.
  • 2FA is Not Enough
    2FA is Not Enough
    Rob Pakai and J.R. Miller Recorded: Feb 12 2019 31 mins
    Using two-factor authentication (2FA) alone is not enough to protect against determined attackers. If security is important, you need to look beyond just 2FA. The next generation of identity security uses risk checks to supplement 2FA, improving security and significantly reducing authentication disruptions for users.
  • Understanding & Safeguarding Credentials
    Understanding & Safeguarding Credentials
    Andy Brown, James Romer & David Thomas Recorded: Feb 12 2019 31 mins
    Cyber-attacks happen every day and law firms are a prime target because their intellectual property & client data can be easily monetized. Passwords, and even 2FA, alone are not enough. Ensure your data access is secured with multi-factor and adaptive authentication from the market leader, SecureAuth IdP.
  • Portal Protection Using Adaptive Authentication: Enable Users & Enhance Security
    Portal Protection Using Adaptive Authentication: Enable Users & Enhance Security
    Damon Tepe & Jeff Hickman Recorded: Feb 12 2019 6 mins
    An age-old dilemma: security versus user experience. Traditionally, hardening security adds to the user burden. But with 81% of reported breaches involving stolen or weak credentials, can you continue to sacrifice security for user convenience? Good news, you don’t have to. Raise security without raising disruptions, SecureAuth IdP.
  • SecureAuth Adaptive Access Control
    SecureAuth Adaptive Access Control
    SecureAuth Recorded: Feb 12 2019 3 mins
    SecureAuth Adaptive Access Control
  • Best Practices For IT Service Delivery with Intelligent Operations
    Best Practices For IT Service Delivery with Intelligent Operations
    Gerald Beaulieu, Joe Corpion Recorded: Feb 12 2019 57 mins
    IT is the engine that delivers service reliability and agility for your business. Watch this webinar to see how ServiceNow practices what we preach. By bringing together the power of IT Operations Management (ITOM) with IT Service Management (ITSM), ServiceNow proactively identifies issues, eliminates service outages and accelerates time-to-resolution.

    By automating IT operations, we transformed our Network Operations Center (NOC) into a service reliability team that can quickly and accurately respond to the needs of the business.

    Hear best practices from Joe Corpion, Director of IT Operations, and Michael Prouty, Senior Manager of IT Operations on how to combine the power of ITOM + ITSM.

    Learn how ServiceNow:

    Decreased P1 and P2 incidents by a whopping 67%
    Eliminated 9,600 hours of work in the NOC annually
    Achieved a 50% reduction in MTTR
  • Delivering Trusted Digital Customer Experiences with Adaptive Access Control
    Delivering Trusted Digital Customer Experiences with Adaptive Access Control
    Robert Block, SVP of Identity Security (SecureAuth) & Merritt Maxium, Principal Analyst (Forrester) Recorded: Feb 12 2019 42 mins
    Delivering Trusted Digital Customer Experiences with Adaptive Access Control
  • Autonomous Threat Hunting
    Autonomous Threat Hunting
    Alexandre Pinto, Product Manager and Distringuished Engineer Security Services Global Products and Solutions Recorded: Feb 12 2019 57 mins
    Attendees will learn how Verizon's Autonomous Threat Hunting...

    •Improves automation and efficiency on monitoring and incident response processes by mimicking and applying security analyst experience and intuition at unprecedented scale.


    •Automatically builds context and relationship between indicators of compromise (IOCs), their inferred Tactics, Techniques and Procedures (TTPs), and log or event data generated by their organization.


    •Transforms hundreds of millions of raw data events into tens of high confidence alerts, so analysts can focus on investigating qualified leads.
  • Global contact centre solutions from BT
    Global contact centre solutions from BT
    BT Recorded: Feb 12 2019 3 mins
    We know your customers expect more from you than ever. And when they have got a problem or a question, there are many ways they want to get in touch with you. To stay ahead, you need to meet their expectations and deliver effortless service across every channel. But without the right technology, that can be tricky. And a poor customer experience can have a big impact on your reputation. So what if we could make it easier for your people and for your customers?
  • Defining the Principles, Habits, and Practices of a Site Reliability Engineer
    Defining the Principles, Habits, and Practices of a Site Reliability Engineer
    Beth Long Recorded: Feb 12 2019 40 mins
    No matter how you define it, the Site Reliability Engineer (SRE) role is clearly expanding into more and more companies. To be effective in this new role, SREs must possess a depth of understanding of how different systems work together, how they fail, how they can be improved, and how they can best be designed and monitored.
  • Beyond Two-Factor: Secure Access Control for O365
    Beyond Two-Factor: Secure Access Control for O365
    James Romer, Chief Secuirty Architect (EMEA) Recorded: Feb 11 2019 36 mins
    Beyond Two-Factor: Secure Access Control for O365
    Prevent the Misuse of Stolen Credentials
  • The Death of 2FA and the Birth of Modern Authentication
    The Death of 2FA and the Birth of Modern Authentication
    Frank Dickson, Research Director (IDC) & Keith Graham, CTO (SecureAuth) Recorded: Feb 11 2019 61 mins
    The Death of 2FA and the Birth of Modern Authentication
  • The Cybersecurity Future Summit – Adapting to an ultra-connected world
    The Cybersecurity Future Summit – Adapting to an ultra-connected world
    Kaspersky Lab and guests Feb 17 2019 12:00 pm UTC 56 mins
    The connected world needs a strong, resilient cyberspace, but the landscape is increasingly fragile and fragmented. At this summit, hosted by Kaspersky Lab, leaders from across the cybersecurity industry will debate the growing need for transparency, collaboration and trust in addressing these challenges and more.
  • Jobs-as-Code : It’s Time to Accelerate
    Jobs-as-Code : It’s Time to Accelerate
    Alon Lebenthal, Senior Manager, Solutions Marketing, Workload Automation, BMC Feb 19 2019 5:00 pm UTC 45 mins
    Everybody talks about Operations “Shifting Left” but Developers also need to “Shift Right” and start thinking about how applications are orchestrated in production. Taking a Jobs-as-Code approach means putting all the workflows and operational instrumentation in the CI/CD pipeline to ensure you get the acceleration and increased quality that comes from automated testing and deployment.
    Join this session and hear how you can orchestrate your workflows with a DevOps enabled approach.
  • Why Traditional ITSM Metrics Will Fail in 2020—And What to Do About It
    Why Traditional ITSM Metrics Will Fail in 2020—And What to Do About It
    Stephen Mann, ITSM Analyst and Matt Klassen, VP Product Marketing, Cherwell Feb 19 2019 5:00 pm UTC 60 mins
    Industry best practices provide IT service desks a wealth of metrics to adopt, and benchmarking data offers guidance on the KPIs to employ. These have both remained virtually static for the last decade or longer. However, a growing reliance on IT services, a rapidly changing technology landscape, and demands that the service desk shift from a cost center to a value center, is forcing IT leaders to re-think and re-define traditional KPIs and metrics. Those who remain complacent in this respect will almost certainly fail to deliver the outcomes the business demands.

    In this webinar, hosted by ITSM analyst, Stephen Mann, and Cherwell’s Matt Klassen, you’ll learn:

    • How the evolving workplace and employee expectations are driving the need for new KPIs
    • Why the adoption of self-service, automation, and AI require further changes to your measurement philosophy
    • Metrics you are using today that will no longer be relevant in three to five years
    • Tips for developing a new portfolio of metrics that will position you for future success
  • How AI and machine learning are supercharging cybersecurity
    How AI and machine learning are supercharging cybersecurity
    VentureBeat Feb 19 2019 6:00 pm UTC 60 mins
    Cyber threats continually evolve, growing more sophisticated and aggressive, regularly overwhelming and bypassing traditional security solutions. With AI-powered software trained on large datasets of cybersecurity, network, and even physical information, cybersecurity solutions are increasingly able to detect and block abnormal behavior, even without a known signature or pattern.

    Adding AI into the mix is a major turning point for cybersecurity. It’s growing clear that artificial intelligence and machine learning is the safest, and perhaps the only, path for cybersecurity professionals to really lock down their data and protect the enterprise. These systems offer the fastest, smartest ways to identify and analyze threats in real time -- and find the quickest way to taking them down.

    To learn more about how to improve privacy and security, and how new AI-powered security can protect companies and their customers better, don’t miss this VB Live event!

    Registration is free.

    Attend this webinar and learn:

    * How AI is defeating and preventing cyberattacks
    * When AI analytics need to be deployed and for what reason
    * How to build AI-powered tools that can assure consumers their data is secure
    * Real-world AI applications and what they mean for cybersecurity

    Speakers:

    * Fernando Maymi, Cybersecurity Researcher & Consultant, Moderator
    * Jim Ducharme, VP, Identity Products, RSA.
    * Eduardo Delgado, AVP of Enterprise Tech & Cybersecurity, TD
  • Making AI work for you
    Making AI work for you
    Wayne Speechly: Principal Director, Dimension Data and Richard Sutherland: Global Technical Account Manager, Intel Feb 20 2019 2:00 pm UTC 60 mins
    Mainstream Artificial Intelligence (AI) may still be in its infancy, but it offers real business benefits today. Join Wayne Speechly and Richard Sutherland as they discuss how AI is penetrating the workplace and how it is causing business leaders to rethink how they run their organisations.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Clarence Hill, David Kennedy Feb 20 2019 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Clarence Hill, Senior Manager, PS Advisory Services
    •David Kennedy, Managing Principal, Open Source Intelligence

    This month's theme: Device Overlays

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • The Four Levels of Thinking as a Geek Leader
    The Four Levels of Thinking as a Geek Leader
    Tom Cooper, Principal Geek, Bright Hill Group Feb 20 2019 4:00 pm UTC 60 mins
    As a highly technical expert, you have been successful because of your expert skills. People hire and promote you because of your talent and ability to solve hard problems. This is true. It's also not enough.
    What no one tells you is that you're only looking at one of the three factors that lead to career success.
    In this session, you will:
    - Learn the other two factors (and what you should do about them)
    - Learn the four levels of thinking needed to be an expert who leads
    - Assess where you are in each of the areas
    - Identify at least 2 practical things that you can do to improve your influence, get more support for your ideas and projects and gain more respect as a professional.
  • Scaling security at the Internet edge with stateless technology
    Scaling security at the Internet edge with stateless technology
    Tom Bienkowski – NETSCOUT Arbor, Director, Product Marketing Feb 20 2019 7:00 pm UTC 60 mins
    As the scale of all types of attacks continues to increase, traditional stateful perimeter security devices like firewalls often strain to keep up. Adding stateless technology between the firewall and the Internet router, armed with advanced reputation and threat intelligence data, can decrease the heavy load on your existing perimeter defenses, protect them from state exhaustion attacks, and even provide blocking of outbound threats (like bots communicating with C&C). This webinar will explore the realm of stateless technology and the Internet edge, with best practices, lessons learned, and key deployment strategies that will prepare attendees for a future of increasing and diverse attacks.

    During this webinar we will talk more about:

    - Understand the limitations of existing perimeter security solutions because of their stateful nature

    - See how stateless technology can protect you from inbound attacks (like DDOS), more efficiently block inbound IoCs and outbound threats (communications with suspicious destinations based on reputation)

    - Learn how stateful and stateless technologies can work together the make a more secure Internet edge

    - Arm yourself with protection against Internet-scale attacks

    - Answers to audience questions during live Q&A​

    Featured Speaker:

    Tom Bienkowski – NETSCOUT Arbor, Director, Product Marketing

    Tom has been in the network and security field for over 20 yrs. During this time, he has worked for large enterprises as a Network Engineer and for multiple network management and security vendors where he has had roles in Sales Engineering /Management, Technical Field Marketing and Product Management. Currently at NETSCOUT he’s a Director of Product Marketing focusing on their industry leading Edge Defense and Threat Intelligence solutions. Tom routinely speaks at IT security events around the world providing insights into cyber threats and best practices in defense.
  • CX Automation and AI: Achieving real world results
    CX Automation and AI: Achieving real world results
    Rob Allman - SVP Customer Experience, Dimension Data; Dr Harsh Vinayak - SVP of BPO and R&D, NTT Data Feb 21 2019 2:00 pm UTC 60 mins
    Robotic process automation is quickly becoming an integral part of the new CX delivery model. Technologies like predictive analytics, machine learning, and cognitive computing are becoming more powerful. But what does this mean for your customer and for your business?
    We will be discussing the application of these technologies in a real world CX automation context.
  • The Best Way to Assess Incident Response Preparedness
    The Best Way to Assess Incident Response Preparedness
    Jeff Laskowski, Security Consulting Director, FireEye Mandiant Feb 21 2019 4:00 pm UTC 60 mins
    Many breached organizations—of all sizes—believed they had effective security programs and incident response plans. Reality proved otherwise.
    Now, executive leaders are far more concerned with incident preparedness. When the Board asks, ‘How ready are we, really?’ your security team must have a defensible response.

    In this webinar, Jeff Laskowski, Security Consulting Director of FireEye Mandiant, explains how to achieve effective preparation:

    • Test your team’s detection and response capabilities to protect key assets against real-world targeted attacks—without the consequences of a real incident
    • Assess your organization’s crisis management capabilities through the lens of an executive team
    • Improve your team’s detection and response capabilities in accordance with the latest attacker tactics, techniques, and motivations

    Join this webinar today to learn what it takes for your team to know how they would perform under a real threat, before they actually have to.
  • Enterprise service management transforms employee productivity
    Enterprise service management transforms employee productivity
    Troy DuMoulin, Bruce Randall Feb 21 2019 5:00 pm UTC 59 mins
    Organizations are recognizing that adopting a service-oriented operating model, underpinned by system-based automation, can address many of the core challenges of competing in a digital economy. At the same time, defining value-based outcomes in the form of products and services, and optimizing shared processes with automation, have been proven to increase productivity, foster collaboration, lower costs and improve speed, no matter the business department or function. The sum of these capabilities and outcomes are often referred to as Enterprise Service Management.

    Join Troy DuMoulin from Pink Elephant and Bruce Randall from ServiceNow as they provide an overview of the many dimensions of Enterprise Service Management.

    In this webinar you’ll learn:

    How to increase employee productivity and creativity with ESM
    How to focus on service management capabilities like service definition, publishing, and knowledge management
    How to transform workflow automation related to incident and request fulfillment
  • Gain deep visibility into APIs and integrations with Anypoint Monitoring
    Gain deep visibility into APIs and integrations with Anypoint Monitoring
    Andrew Bragdon, Principal Product Manager, MuleSoft and Sanjna Verma, Product Marketing Manager, MuleSoft Feb 21 2019 5:00 pm UTC 50 mins
    On average, a business supporting digital transactions now crosses 35 backend systems — and legacy tools haven’t been able to keep up. This session will cover how MuleSoft’s new monitoring and diagnostic solutions provide end-to-end actionable visibility to APIs and integrations to help customers identify and resolve issues quickly.

    Key Takeaways:

    - Measure application performance across APIs and integrations in production
    - How to query and retrieve log data across your network
    - End-to-end walkthrough of priority issue identification and resolution
    - Exciting new capabilities of Anypoint Monitoring
  • Enterprise-Wide Kubernetes, Ep 6: Ingress and Load Balancing
    Enterprise-Wide Kubernetes, Ep 6: Ingress and Load Balancing
    Komal Bhardwaj & Ritesh Patel Feb 21 2019 6:00 pm UTC 60 mins
    When applications that are deployed in Kubernetes need to be accessed from outside the cluster, an Ingress needs to be created. In Kubernetes, Services can also be exposed via a Load Balancer. There are several options available to make your application accessible and the right choice may depend on your requirements.

    In this webinar, we will discuss how Ingress and Load Balancing works in Kubernetes. We will also show a demo of how Citrix ADC serves as an Ingress device on a Nirmata managed Kubernetes distribution.

    Presenter:
    Ritesh Patel - VP Products at Nirmata
    Komal Bhardwaj - Principal Product Manager at Citrix
  • Monitoring Modern Cloud-Native Workloads
    Monitoring Modern Cloud-Native Workloads
    Eric Carter, Director of Product Marketing, Sysdig & Shadi Albouyeh, Offering Manager, Developer Services - IBM Cloud Feb 21 2019 6:00 pm UTC 45 mins
    If you’re involved with developing applications, chances are you’re being tasked with adapting to cloud-native infrastructure and being able to support cloud-native workloads with solutions like containers and Kubernetes. Join this discussion with Sysdig and IBM Cloud, who have recently built a partnership focused on improving monitoring and troubleshooting for your modern DevOps services. Together, IBM and Sysdig have launched a new offering that provides end-to-end monitoring capabilities in the IBM Cloud. You’ll come away with a better understanding of key visibility challenges and solutions that will help you successfully deliver the apps that drive your business.
  • Two-Factor Authentication - You are not as protected as you think
    Two-Factor Authentication - You are not as protected as you think
    Damon Tepe & Jeff Hickman Feb 21 2019 6:00 pm UTC 60 mins
    Breaches continue to litter headlines, increasing in volume and severity. To protect critical systems and assets from attack many organizations rely on two-factor authentication (2FA). But that may be resulting in a false sense of security.

    Join SecureAuth as we explore how evolved attackers are working around popular 2FA methods. And we will demonstrate how behind-the-scenes adaptive risk checks of device, location, IP address, account type, and behavior can elevate identity trust and stop attackers cold! Even if they have stolen credentials and can bypass 2FA.

    Better breach protection starts with better identity trust!

    During this session you’ll learn how:
    • Attackers are getting around two-factor authentication
    • Risk and context checks can raise trust in identities and identify attackers
    • Adaptive authentication delivers better access security without slowing down your business


    Speakers:
    Damon Tepe - Director, Product Marketing, SecureAuth
    Jeff Hickman - Director of Sales Engineering, SecureAuth
  • Can bigger security budgets save businesses from costly cloud breaches?
    Can bigger security budgets save businesses from costly cloud breaches?
    Maxim Frolov, Vice President of Global Sales, Kaspersky Lab and Jim Reavis, Co-founder and CEO, Cloud Security Alliance Feb 25 2019 10:00 am UTC 46 mins
    Nearly 1.5 million dollars. That’s how much an average data breach in the cloud costs enterprises, according to the Global IT Security Risks Survey 2018.

    Second only to targeted attacks, breaches affecting IaaS are among the most costly faced by businesses today. But what can be done about this? Apparently, investing more in protection is only part of the solution, as businesses are already allocating a greater share of their IT budgets to security…

    During the webinar, Maxim Frolov, VP Global Sales, Kaspersky Lab, presents key findings from the company’s latest report On the Money: Growing IT Security Budgets to Protect Digital Transformation Initiatives. Maxim, along with special guest Jim Reavis, Co-founder and CEO, Cloud Security Alliance, will discuss the potential damage and the main risks associated with cloud breaches, as well as what businesses can do to protect themselves.

    Webinar attendees gets the latest insights on the dynamics of corporate security incidents and IT security budgets. They will learn what financial, organizational and technological decisions should be made to protect businesses from the threat of cloud infrastructure breaches.
  • Your Game Plan For A Quick, Peaceful and Successful Cloud Migration
    Your Game Plan For A Quick, Peaceful and Successful Cloud Migration
    Eveline Oehrlich Feb 26 2019 10:00 am UTC 48 mins
    Will your game plan make you a winner in your cloud migration project? Ensure your tactics and team are in the best position possible.

    With all the organisational decision-making required, companies can end up struggling—and spending way too much time and money—on their Cloud migration projects.
  • Where are you on the Digital Transformation Journey? Further than you think
    Where are you on the Digital Transformation Journey? Further than you think
    Vishal Ganeriwala, Senior Director, Product Marketing, Citrix Workspace Feb 26 2019 12:00 pm UTC 37 mins
    Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?

    Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.

    You’ll learn how to:

    • Simplify your systems and ongoing management with a cloud-based approach
    • Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
    • Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
  • Ask a Cloud Access Software Expert…
    Ask a Cloud Access Software Expert…
    Jonathan Culver, Solutions Architect & Andrew Waite Brown, Regional Director - EMEA- Teradici Feb 26 2019 2:15 pm UTC 30 mins
    Join our monthly webinar for a quick review on Cloud Access Software followed by a Question and Answer session with our Cloud Access Software expert and Solutions Architect Jonathan Culver.

    1.What graphics adapters does Cloud Access Software support?
    2.What Windows versions does Cloud Access Software support?
    3.Can USB devices be used with Cloud Access Software?
    4.What are the supported hypervisors and cloud platforms for Cloud Access Software?
    5.Can I connect to my Cloud Access Software workstation on a tablet device?

    Submit a question when registering or during the webinar. Our goal is to ensure your deployment is a success!
    Register today.
  • Digital Transformation in 2019: 5 Ways to Drive Growth and Customer Experience
    Digital Transformation in 2019: 5 Ways to Drive Growth and Customer Experience
    Terence Fogarty, Contact Center Consultant, Carousel Industries; Robin Gareiss, President and Founder, Nemertes Research Feb 26 2019 6:00 pm UTC 60 mins
    With the ability to increase sales, reduce costs, and improve customer satisfaction, it’s no surprise that more than 75% of companies have, or plan to have, a Digital Customer Experience (DCX) strategy. Leveraging collaboration technology can transform how you’re engaging customers and driving organizational innovation.

    In this interactive webinar Carousel Industries and Nemertes Research explore the top five digital customer experience projects that drive business growth.

    What you will learn:

    • Which digital customer experience projects deliver measurable success
    • How to realize the business value of upgrading or replacing existing communications platforms
    • Why aligning your approach with your financial model can boost business impact
    • How to identify the right approach for your business: on-premises, cloud, or hybrid
    • Why you need to take a closer look at your internal unified communications and collaboration
    • How to determine if now is the time to upgrade or replace existing communications platforms
  • Inside HR Trends in 2019: Transform Your HR Service Delivery with ServiceNow
    Inside HR Trends in 2019: Transform Your HR Service Delivery with ServiceNow
    John Huckle, Josh Scott, Stacey Prezel, Bradford Shelley, Meghan Lockwood Feb 26 2019 6:00 pm UTC 60 mins
    Learn what trends HR leaders are talking about in 2019 with results from Business Forward's Annual HR Leadership Survey - then be a pioneer of those strategic initiative trends.

    Business Forward and Acorio executives will walk you through going beyond the "imagination" and show you how to make real changes with the power of ServiceNow's HR Service Delivery platform.
  • How to Prepare Your Organization for SQL Server 2008 End of Life
    How to Prepare Your Organization for SQL Server 2008 End of Life
    Jim Haas, Vice President of Managed Services at Ntirety Feb 26 2019 6:00 pm UTC 77 mins
    On July 9th, 2019 Microsoft will end all support for SQL Server 2008. How can you prepare your organization? Start by understanding your options.

    Why should you attend?
    Doing nothing is not an option this time. Data security is a risk to your organization, as all critical patches and security updates for SQL Server 2008 will end. Your Lack of compliance with industry standards and applicable regulations may lead to security breaches, data loss, litigation, and reputational risk.

    Join Jim Haas, Vice President of Managed Services at Ntirety (a Division of Hostway|HOSTING), as he discusses how you can go about making a compelling case:

    • Upgrade Options: Migrate to Azure, Upgrade SQL Server, or Purchase Extended Security
    Updates.
    • The many advances since SQL 2008.
    • How to get started. What you can do yourself. Where you may need help and where to find
    help.

    Register Today!
  • How to Achieve High Availability for SAP Deployments on AWS
    How to Achieve High Availability for SAP Deployments on AWS
    Ricardo Casanovas, CTO Linke / Guillermo Torres & Maurici Galofré, AWS Solution Architect and SAP experts at Linke Feb 27 2019 3:00 pm UTC 60 mins
    Traditionally, setting up High Availability for SAP systems has been achieved through the implementation of third-party software tools, often expensive and complex to deploy. Today, customers can leverage AWS highly available cloud services to achieve High Availability for their SAP systems at a fraction of their cost.

    Learn how you can configure High Availability for SAP systems on Amazon Web Services using their own AWS tools and services such as Amazon Cloudwatch, AWS Lambda, and AWS Systems Manager.

    Join us to learn:
    •How to plan and define your SAP landscape in High Availability
    •Setup SAP in High Availability using AWS Services
    •Operate with SAP in High Availability on AWS
  • What Service and Support Managers Should Know About AI
    What Service and Support Managers Should Know About AI
    Stephen Mann, ITSM.tools; Roy Atkinson, HDI; Dr. Akhil Sahai, Symphony SummitAI Feb 27 2019 6:00 pm UTC 60 mins
    Articles, headlines, blogs, and presentations about AI are everywhere, most being either apocalyptic (we’ll all lose our jobs) or utopian (we won’t have to work) about how AI will affect the near future. In this webinar, industry analysts Stephen Mann and Roy Atkinson and AI expert Dr. Akhil Sahai will speak directly to service and support managers about how AI is being integrated into service management software, and how that integration has a direct bearing on how service management and support can and will be done in the near future.

    The webinar will feature a panel discussion followed by time for attendee Q&A.

    What You Will Learn:

    In this webinar, we will discuss:
    - What AI is and is not
    - How AI is being built into service management tools
    - How next-generation tools will affect the day-to-day operations of service and support

    Who Should Attend:
    - Service desk/support center directors, managers, supervisors, and team leads
    - ITSM professionals responsible for workflows and processes
    - Support organization leaders
  • How to Increase Employee Productivity by Automating Service Management
    How to Increase Employee Productivity by Automating Service Management
    Liz Beckner Feb 27 2019 7:00 pm UTC 30 mins
    The primary goal of service management is deliver value to the customer, or internally, your employees. As advanced technology reshapes the service desk, there are more and more ways to enhance service delivery. In this webinar, ITIL-certified Samanage Solutions Consultant Liz Beckner will discuss:

    - How she has helped organizations integrate technology within the service desk
    - How automated workflows and self-service provide maximum value
    - How to create a single platform for services in multiple departments
    - New research on how the experience with the service desk impacts employee productivity

    Join us to start transforming the service experience for your employees!