Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • Death to Traffic: How Smart Cities are Changing Transportation
    Death to Traffic: How Smart Cities are Changing Transportation Laura Schewel, CEO, StreetLight Data Recorded: Jun 23 2017 45 mins
    From automated vehicles to ride hailing apps, transportation as we know it is changing - and fast. But new technologies alone won't help communities build the efficient, equitable, and sustainable transportation networks communities want. In fact, these innovative technologies could do just the opposite, especially if they are not deployed wisely. Cities must collect the right data and enact the right policies to ensure they do not exacerbate problems like inequity and traffic, and to hold themselves accountable to the promise of new mobility technologies.

    In this webinar, you will find out why - and how - the smartest cities of tomorrow will be those that adopt data-driven transportation strategies today. Join for Laura Schewel's presentation to gain insights into:

    • Why the status quo for transportation data collection is no longer good enough
    • The types of Massive Mobile Data that are useful for transportation and urban planning
    • Algorithmic processing techniques that are critical for making this data useful
    • Case studies from California and Virginia that demonstrate why Massive Mobile Data drives more effective transportation planning
    • A forward-looking blueprint for using Massive Mobile Data to maximize the potential benefits of new transportation technologies - and minimize negative impacts

    Laura Schewel founded StreetLight Data, a mobility analytics provider, after spending more than a decade as an advanced transportation researcher and statistician at the Rocky Mountain Institute and FERC. She has particular expertise in transportation systems, sustainability and safety, and vehicle/system modeling and analysis.
  • How IoT Will Make Healthcare Healthy, Wealthy, & Wise
    How IoT Will Make Healthcare Healthy, Wealthy, & Wise Jarie Bolander, COO, Lab Sensor Solutions Recorded: Jun 23 2017 46 mins
    IoT is a technology that has the potential to make us healthy, wealthy, and wise especially in healthcare. Healthcare is just now adopting IoT to improve patient outcomes and decrease the cost of care.

    In this webinar, you’ll learn:

    - How to identify if an IoT solution will work for your use case.
    - What others in healthcare are using IoT for.
    - The challenges of IoT in healthcare
  • What Can be Done to Secure a Connected Vehicle?
    What Can be Done to Secure a Connected Vehicle? Mike Nelson, VP, Critical Infrastructure at DigiCert, Mike Ahmadi, Global Director of Critical Systems Security at Synopsys Recorded: Jun 22 2017 60 mins
    As self-driving vehicles are coming off the production line, automakers are deploying technology to improve the driving experience, from the infotainment system to enhancing brake and fuel efficiency. Yet, adequate cyber security measures still need to catch up. Whether it’s the hacked Jeep or the Nissan Leaf app vulnerability, connected vehicles often fail to implement basic authentication and encryption measures to protect users.

    Mike Nelson and Mike Ahmadi will cover the following topics:

    - Insight into the state of connected vehicle security and the need for interoperable standards-based solutions.
    - How connected device manufacturers are using public key infrastructure (PKI) to provide scalable authentication, encryption and data integrity for the vehicle and its thousands of connected parts.
    - Specific steps security teams can take beginning today.
  • Automating Your Corporate Mobility Management
    Automating Your Corporate Mobility Management Michele Pelino, Principal Analyst at Forrester & Pallavi Vanacharla, Head of Prod. Mktg Mobility at Cisco Jasper Recorded: Jun 22 2017 55 mins
    The increasing mobile workforce is impacting corporate mobility management needs and costs.

    Speaker Michele Pelino, Principal Analyst at Forrester, will share Forrester’s research on how enterprises are addressing this challenge.

    Joining her will be Pallavi Vanacharla, product marketing at Cisco Jasper, will share how their new platform – Control Center for Mobile Enterprise - puts the control back in the hands of enterprise.

    What you’ll learn:
    *Real examples of mobility challenges faced by enterprise IT teams
    *Forrester data on the top mobility management tools and services in use today
    *How Cisco Jasper automates mobility management

    Presented by
    Michele Pelino, Principal Analyst at Forrester & Pallavi Vanacharla, Head of Prod. Mktg Mobility at Cisco Jasper
  • Clearing the Fog Around IoT Analytics
    Clearing the Fog Around IoT Analytics Jason Stamper, Data Platforms and Analytics Analyst, 451 Research Recorded: Jun 22 2017 38 mins
    In this webinar, Jason Stamper, analyst for Data Platforms and Analytics at 451 Research, will look at some of the latest trends that are being seen in IoT and specifically analytics at the edge of the network — in other words close to where the data is generated.

    He will also identify a number of data platform and analytics themes that are becoming more critical in the IoT era: security and data governance; infrastructure including edge analytics and server less computing; data processing; data integration and messaging.
  • Balancing Security and Usability for Mobile Apps
    Balancing Security and Usability for Mobile Apps Will LaSala, Director of Services @ VASCO Recorded: Jun 21 2017 41 mins
    Many businesses today are driven to make their mobile apps more convenient and user-friendly, which often comes at the expense of security. Increasingly, cybercriminals exploit this oversight, shifting their focus from PCs to mobile devices and driving up the sophistication and rate of mobile attacks. Mobile malware, jailbroken devices, rogue apps, keylogging, screen capture and other threats are becoming serious disruptors of mobile business.

    As an application publisher, you cannot stop these attacks from happening but you can render them ineffective — while also providing the best possible user experience. Join this webcast from VASCO Data Security and learn how to reduce your mobile apps’ vulnerabilities and maintain a frictionless user experience.

    Topics of discussion will include:

    - The nature and anatomy of mobile attacks
    - The most common mobile app vulnerabilities
    - The key components of holistic mobile app security
    - Using “invisible” security such as behavioral authentication and runtime application self-protection to improve user experience
  • Encryption: Critical Protection Against Hackers
    Encryption: Critical Protection Against Hackers Bob Janacek, CEO DataMotion Recorded: Jun 21 2017 4 mins
    In this short video, Bob Janacek discusses how hacking has evolved, and has become much more sophisticated, going after data previously thought to be relatively safe - and how encryption is imperative to its protection.
  • Aruba's Asset Tracking Solution
    Aruba's Asset Tracking Solution Aruba, a Hewlett Packard Enterprise Company Recorded: Jun 20 2017 5 mins
    Aruba’s asset tracking solution allows organizations to track high value assets using their existing Aruba WLAN infrastructure and BLE-based Aruba Tags. This increases staff efficiency, reduces equipment costs and improves customer satisfaction.
  • Quantum Threat Conundrum: How to Create a Quantum-Safe Security Strategy Today
    Quantum Threat Conundrum: How to Create a Quantum-Safe Security Strategy Today Stan Mesceda from Gemalto -Bruno Huttner & Gilles Trachsel from ID Quantique Recorded: Jun 19 2017 61 mins
    With the advent of massively powerful quantum computers, much of today's encryption will be vulnerable. Preparing for the inevitability of quantum should be an integral part of current risk management strategy. Gemalto is teaming up with ID Quantique, a leader in quantum security, to help security professionals understand quantum-safe cryptography and the impact it will have on enterprise security. Find out how you can create a quantum-safe environment for voice, video, virtualization and mass data today, securing these assets from even the most advanced cybercriminals and their super-computers.

    Join Gemalto and ID Quantique for a joint webinar to learn more about:
    •What is quantum computing and how it affects security
    •Quantum cryptography in action
    •Examples of quantum cryptography in the enterprise and government space
    •Quantum-safe solutions at a glance
    •Future developments of quantum cryptography
  • Transitioning IoT Infrastructure: From Networks of People to Networks of Things
    Transitioning IoT Infrastructure: From Networks of People to Networks of Things Christian Renaud, Research Director, Internet of Things, 451 Research Recorded: Jun 15 2017 33 mins
    Networks are changing. With the vast expansion of IoT, we're experiencing the transition of enterprise and operator infrastructure from networks of people to networks of people, places and things.

    Join Christian Renaud, Research Director, IoT at 451 Research, as he looks at the impacts of the growing number of instrumented environments and objects on enterprise and carrier networks, capacities, signaling protocols, and emerging opportunities for value creation beyond simple connectivity.

    This webinar will cover:
    - Possible bottlenecks and roadblocks on the path to the Internet of Things
    - What leading organizations are doing today to prepare for the coming influx of new types of devices
  • The Future of Agile Network Architectures & IoT Connectivity
    The Future of Agile Network Architectures & IoT Connectivity Ahmed Banafa, Ryan Allphin, and Brenda Boehm Recorded: Jun 15 2017 59 mins
    The Internet of Things is upon us. Vast amounts of big data are quickly approaching and network traffic, latency and bandwidth are at higher demands than ever. Storing, transmitting, and analyzing this data from IoT devices will require a secure and agile network architecture. Network failover and network security will be of the utmost importance.

    How will these changes in demand and technologies have an impact on new standards and protocols? Will network communications between devices and the cloud be safe? Tune into this dynamic panel discussion with leading IoT and network experts for the state of IoT networks.

    Panelists:
    Ahmed Banafa, SJSU Faculty Member and LinkedIn IoT Influencer
    Ryan Allphin, CTO, Cradlepoint
    Brenda Boehm, Chief Strategy Officer & Board Advisor, IoT Smart Solutions, TIA

    No BICSI CEC
  • Machine Vision for large-scale Aerial Imagery
    Machine Vision for large-scale Aerial Imagery Zbigniew Bogdan Wojna (Cofounder at TensorFlight Inc.; also PhD at UCL; Google, Nvidia, Microsoft) Recorded: Jun 15 2017 33 mins
    Zbigniew will provide insight into how Tensorflight is building a digital brain capable of understanding the world from the sky. The approach is based on deep convolutional neural networks, inspired by visual processing in the human brain.

    The company has partnered with DroneDeploy, the leading platform for collection aerial imagery via drones.

    Tensorflight’s first machine vision solution can count different types of objects such as trees, crops, cars, livestock etc. It is based on state of the art research. Models are easily scalable and deployed on the cloud through almost real-time analysis and a distributed orchestration system. Zbigniew will discuss how they have solved problems of processing maps that are 30.000 x 30.000 pixels in size in almost real time.
  • DreamWorks Animation and Aruba: The Outdoor Wi-Fi Experience
    DreamWorks Animation and Aruba: The Outdoor Wi-Fi Experience Keith McKay, Network Operations Supervisor, DreamWorks Animation & Eric Johnson Director, Product Management, Aruba Recorded: Jun 14 2017 31 mins
    With the growing demands of enterprise outdoor Wi-Fi users, customers’ expectations of outdoor Wi-Fi has gone beyond the basic network connection. Outdoor Wi-Fi deployments for small and large areas are often different and how to improve the user experience while minimizing costs has always been a concern for enterprises.

    This webinar will address various outdoor use cases and their most appropriate solution; DreamWorks Animations will share their real-life outdoor deployment experience with the audience, including their unique outdoor Wi-Fi requirements, deployment challenges and their future move to enable an always-on indoor/outdoor Wi-Fi connectivity in the entire work place.

    Join us to learn more about the current challenges and benefits of outdoor Wi-Fi and ways to meet the new demands and performance standards.
  • Protecting Valuable Data Assets in IoT Ecosystems
    Protecting Valuable Data Assets in IoT Ecosystems Reiner Kappenberger, Global Product Management HPE Security – Data Security Recorded: Jun 14 2017 45 mins
    The possibilities may be endless, but so are the threats. A connected world with Big Data analytics and the Internet of Things opens all kinds of doors, which means forward-looking companies are carefully planning their roadmaps now. How can so much data be captured, analyzed and leveraged effectively? Safely? With data privacy? Hear data security expert Reiner Kappenberger discuss standards and innovations such as NIST / FIPS approved format-preserving encryption technology, for a “build it in” approach to more trusted Big Data and IoT ecosystems. Discover how you can persistently secure your most sensitive data-in-use across the enterprise ecosystem.
  • A New Frontier in Cloud Security: The Secure Internet Gateway
    A New Frontier in Cloud Security: The Secure Internet Gateway Dan Cummins - 451 Research & Meghan Diaz - Cisco Recorded: Jun 14 2017 55 mins
    Your employees are using more cloud apps than ever, and mobile workers frequently work without turning on their VPN. You need new ways to extend protection anywhere your employees work — and you need it to be simple, yet incredibly effective.

    Exciting innovations in network security-as-a-service offer distributed organizations the potential to extend and meaningfully increase security effectiveness. Join this 451 Research webinar with Cisco Security to hear a discussion about new cloud-delivered protection for mobile workers, lean branch offices, and cloud applications. We’ll cover the changing market landscape, the emergence of the Secure Internet Gateway, and highlight important buying considerations for companies looking to add these capabilities.
  • Avoiding Mobile Execution Pitfalls:Real Life Insights into Mobile Transformation
    Avoiding Mobile Execution Pitfalls:Real Life Insights into Mobile Transformation Craig Reigelhaupt, Mobility Director Recorded: Jun 14 2017 41 mins
    Which platforms to support? BYOD, CL or Both? Unlocked or Locked? Cover all employees or just some? What about security? We deal with these questions on a daily basis, so why make the same mistakes as your peers? In this webcast we’ll share pitfalls to avoid and best practices to successfully deploy, manage and secure mobile to initiate transformation and promote growth within your organization.
  • Mobile App Messaging to Salesforce Service Cloud
    Mobile App Messaging to Salesforce Service Cloud Pete Cafarchio Recorded: Jun 9 2017 2 mins
    This short case study video gives an overview of how a large payer seamlessly connected their mobile messaging app to their Salesforce Service Cloud, automating customer support inquiries in a secure, HIPAA compliant manner.
  • Is your mobile app too slow? Five best tips for mobile immediacy
    Is your mobile app too slow? Five best tips for mobile immediacy Stewart Rogers, Director of Marketing Technology, VentureBeat Recorded: Jun 8 2017 61 mins
    Sure, you have a beautiful app, but if your load times are too slow and your file sizes are too large, you're leaving money on the table. The mandate is clear: Your mobile game needs to start up in five seconds, or you’ll start to churn players.

    It’s a tough balancing act between delivering rich content and letting players enjoy the game without a painful loading screen. And in some countries, speed and minimalism are a must, not a nice-to-have, if you're going to succeed.

    We're going to take a deep dive in the best practice for reducing load times across both the mobile web and apps. We'll look at screen load micro-data and how slow load times are killing publishers in the mobile arena.

    In this webinar, you'll:

    * Identify the best practices for optimizing load times for games with rich content
    * Find out the risks are if you fail to optimize load times, including the dangers associated with global reach
    * Discover what to do first, and which technologies can help you get there quicker


    Speakers:
    * David Holtkamp, CEO, Crimson Moon
    * Jonathan Meson, CEO, VisualBlasters
    * Martín Domínguez, CIO at Etermax
    * Stewart Rogers, Director of Marketing Technology, VentureBeat

    Sponsored by Akamai
  • Getting Voice Biometrics Authentication Right in Financial Services
    Getting Voice Biometrics Authentication Right in Financial Services Dan Miller, Lead Analyst, Opus Research; Ravin Sanjith, Director, Opus Research; Interactions LLC Recorded: Jun 8 2017 47 mins
    As financial service companies battle to build customer loyalty and increase security in the age of FinTech, providing efficient, secure and personal services is a source of competitive advantage. The rapid growth of voice biometrics authentication demonstrates it is a convenient and secure way to authenticate real customers, detect impostors and prevent fraud. 

    In this webinar, join Interactions and Opus Research as they describe the steps that financial service companies should take to incorporate voice biometrics authentication into the customer care experience. 

    Topics to be discussed include:
    • Identifying Responsibilities and Stakeholders: Contact center, security/risk management, marketing, customer care, IT, and communications infrastructure
    • Finding the Budget: Making a business case and finding the budget for voice biometrics authentication
    • Best Practices: Engaging Marketing to build customer awareness around voice biometrics
    • Preparing for Success: Anticipating the need to scale operations to accommodate new interaction patterns to suit multichannel environments
  • [Video Panel] Fighting Ransomware: Lessons from WannaCry
    [Video Panel] Fighting Ransomware: Lessons from WannaCry Josh Downs, BrightTALK, Darren Thomson, Symantec; Chris Ross, Barracuda Networks Recorded: Jun 8 2017 50 mins
    - BrightTALK at Infosecurity Europe 2017 -

    One month on from the WannaCry attacks, we'll be discussing their influence on the cyber security industry; whether it was a success for the cyber criminals and what organisations could've done to be better protected.

    This expert panel will cover how the ransomware spread, why there's been an explosion over the last few years, why businesses are especially vulnerable and how the malware is more and more intertwined with crypto currencies.

    Fighting Ransomware was a top priority on security professionals' minds in 2016 and that will only continue into 2017. Tune into this live panel to get insights and takeaways to protect your business from the threat of ransomware.
  • Best Practices for Using Email Encryption in Office 365
    Best Practices for Using Email Encryption in Office 365 Michael Osterman, President Osterman Research Recorded: Jun 7 2017 55 mins
    Email is the most frequently implemented application in Office 365, and whether you use a cloud or hybrid solution, email needs to be thoroughly secured. A failure to properly encrypt email can lead to loss of intellectual property, breaches of sensitive customer and employee information, and violations of data breach and privacy laws.

    Join Michael Osterman of Osterman Research and DataMotion for a
    55-minute webinar that reviews the Office 365 environment, the reasons for securing email, and addresses best practices for implementing and using email encryption.

    This webinar will address a number of important questions:

    • Why worry about encryption in Office 365?
    • Why should you encrypt email?
    • What are the best practices for securing email in Office 365?
    • Is the native Office 365 email encryption your best option for
    securing email?

    Whether you are just beginning your plans to move to Office 365, or you’re already fully implemented, you need to make sure that your organization is moving data as securely as possible.
  • [Video Panel] Protecting the IoT: Threats, Vulnerabilities & Solutions
    [Video Panel] Protecting the IoT: Threats, Vulnerabilities & Solutions Josh Downs, BrightTALK, Patrick Grillo, Fortinet, Danielle Cattedu, CSA & Marc Laliberte, WatchGuard Recorded: Jun 7 2017 48 mins
    - BrightTALK at Infosecurity Europe 2017 -

    IoT networks grow by the day - prompting sleepless nights from security professionals the world over. As more and more devices join the network, how can we ensure that they're not becoming the latest weak link in the network?

    This expert panel will look at vulnerabilities in the IoT, those that are more obvious and those that perhaps aren't. It'll also cover the latest threats targeting IoT networks; the mechanisms and techniques that are being used and how to stop them.

    The IoT will be critical to business and consumer life from hospitals to connected cars to factory floors. Security and privacy remain key concerns and this panel will break down what the explosion of IoT networks will mean for security professionals.
  • 互联网现状/互联网安全现状报告——最新DDoS及Web App攻击趋势概览
    互联网现状/互联网安全现状报告——最新DDoS及Web App攻击趋势概览 马俊 James, 阿卡迈中国高级售前工程师, 阿卡迈中国; Moderator: 阎光, (ISC)² 上海分会 会员主席, 德勤风险咨询, 副总监 Recorded: Jun 7 2017 60 mins
    参加这个网络研讨会,您可获取DDoS及Web应用攻击的流量和趋势的概览及深度分析。

    Akamai每天都承载了全球 15%到30%的Web流量,因此可以观察到大量的互联网攻击,从包含SQL注入的恶意HTTP请求,到规模高达650Gbps的DDoS攻击。我们的安全专家会对此信息进行分析,对相关趋势和发现进行分享,这些信息都包含在我们按照季度发布的互联网现状/互联网安全现状报告中。我们将在本系列在线研讨会中发布相关信息。

    主要话题:
    - 互联网现状报告中的全球网络流量概况
    - APJ区域的网络攻击情况
    - IoT(物联网)僵尸网络是如何改变APJ地区网络攻击的拓扑结构的
    - IoT的安全责任

    参加Akamai 和 (ISC)² 在06月07日下午2:00至3:00的在线论坛《互联网现状/互联网安全现状报告——最新DDoS及Web App攻击趋势概览》,获取DDoS及Web应用攻击的流量和趋势的概览及深度分析,还等什么?赶紧加入我们吧。
  • Network Security & Compliance Best Practices on Google Cloud Platform
    Network Security & Compliance Best Practices on Google Cloud Platform Naresh Venkat, Business Development, Google Cloud Platform and Alex Corstorphine, Solutions Architect, Dome9 Security Recorded: Jun 6 2017 59 mins
    The Google security model is built on over fifteen years of experience in keeping customers safe while using Google applications. The security architecture of the Google Cloud Platform (GCP) is based on the same foundation and offers enterprises the tools they need to secure their data and applications in the cloud. Organizations deploying workloads on GCP need to understand the fundamental ways in which security in the public cloud is different from traditional datacenter security and use the right tools to harden their cloud environments.

    Join Alex Corstorphine, Solutions Architect at Dome9 Security, and Naresh Venkat with the Google Cloud Strategic Technology Partnerships team, as they discuss best practices and common pitfalls around managing security, compliance, and governance in GCP environments. They will review GCP network security best practices and available compliance certifications, and provide practical examples of how to harden your cloud network environment.

    The webinar will include a live demo of the Dome9 Arc SaaS platform that offers greater network visibility, control, and active enforcement in the cloud. Additionally, we will show how the Dome9 Compliance Engine allows businesses using GCP to assess their compliance posture, identify risks and gaps, fix issues such as overly permissive security group rules and weak password policies, enforce requirements and prove compliance in audits.

    In this 45 minute webinar you will learn:

    - Key features and capabilities of the GCP network security model
    - How to gain visibility into network security posture and misconfigurations
    - How to harden your Google Cloud environment by applying security best practices
  • Webinar: Are Mobile Apps Exposing Your Data?
    Webinar: Are Mobile Apps Exposing Your Data? Appthority's Domingo Guerra, Co-Founder and President and Seth Hardy, Director of Security Research Jun 28 2017 5:00 pm UTC 60 mins
    Domingo Guerra and Seth Hardy discuss Appthority's Q2 2017 MTR's findings and the potential HospitalGown repercussions for your enterprise.
  • Getting Ready for Australia’s Privacy Act Amendment (Notifiable Data Breaches)
    Getting Ready for Australia’s Privacy Act Amendment (Notifiable Data Breaches) Helaine Leggat, an legal expert in data protection regulations and Graeme Pyper, Regional Director at Gemalto Jun 29 2017 12:00 am UTC 60 mins
    The Gemalto’s Breach Level Index reported 1.4 billion data records compromised worldwide in 2016, up 86% from 2015. Closer to home, there were 44 & 16 voluntarily reported breaches in Australia and New Zealand respectively. With the new Privacy Amendment (Notifiable Data Breaches) Act 2017 in Australia, these numbers are expected to increase dramatically as organisations are required to declare any “eligible data breaches”.

    Navigating these regulations such as the Australian Privacy Act and European General Data Protection Regulation (GDPR) and the impact they will have can be daunting. Organisations must start planning ahead to mitigate the potential risks of being non-compliant. The implications of a data breach can go beyond compliance. In 2014, the Target breach had a massive impact on the company’s brand reputation, while last year’s announcement of the Yahoo! data breach cost the company nearly $1.7 billion in stock market value.

    During this webinar, Helaine Leggat, an legal expert in data protection regulations will discuss the Australian Privacy Act Amendment in detail, what it means for businesses in Australia and internationally. Graeme Pyper, Regional Director at Gemalto will provide recommendations to help prepare for the 2018 deadline. We will share industry best practices and methodologies companies can evaluate to simplify a government audit process. Join our experts to ask questions and learn more about:

    •The local and global government data privacy regulations (Australia and Europe)
    •Gauging the true cost of a data breach and how to reduce the scope of risk
    •Understanding privacy by design throughout business
    •Strategies for simplifying operations for regulation and internal audits
    •Determining current industry compliance, which may be applicable to the APA and GDPR
  • Future Proof Docker and Microservices with Modern Monitoring
    Future Proof Docker and Microservices with Modern Monitoring Presenter: Chris Kline, VP DevOps Strategy Jun 29 2017 3:00 pm UTC 60 mins
    Containerized applications and microservices challenge existing monitoring tools and processes. The ephemeral nature of containers presents massive tracking issues and the massive increase in objects, service and metrics makes traditional alerting obsolete.

    In this webcast, you will learn:
    • The benefits of using an agentless application monitoring approach in Docker environments
    • How an open data model is key to understanding and tracking microservice relationships and dependencies
    • The importance of analytics-driven monitoring to help detect anomalies, predict problems and prevent alert storms
  • Governing the Future of IT: Technology Consumption Management
    Governing the Future of IT: Technology Consumption Management Hyoun Park Jun 29 2017 5:00 pm UTC 45 mins
    AI presents a framework for managing cloud, telecom, and software consumption in a Hybrid IT world. A must-attend for IT executives managing multi-million dollar cloud, telecom, mobility, and/or software budgets.

    In this webinar, Amalgam Insights provides a framework for the CIO and CFO offices to understand the fragmented world of Technology Consumption Management, which you need to understand if you manage:

    * IT Financial Management.
    * Telecom Expense Management
    * Cloud Cost Management
    * Software Lifecycle Management

    This webinar will include descriptions of each of these toolkits, anonymized business examples, and representative vendors to consider at the enterprise level.
  • Turning the Table on Hackers and Breaches
    Turning the Table on Hackers and Breaches Jason Hart, CTO of Data Protection at Gemalto Jul 11 2017 3:00 pm UTC 60 mins
    Data breaches in 2016 got even more personal with big hacks of adult entertainment sites and social media databases. Hackers mined these for gold, in other words, valuable data to create social engineering attacks, ransom operations and identity theft. According to Gemalto’s Breach Level Index, the number of stolen, compromised or lost records increase by 86% in 2016, while the number of breaches decreased by 4%. Hackers are going after more data than ever before, and they are finding it in large databases that are left relatively insecure.

    Whether consciously or not, hackers have grasped the idea of situational awareness. They have figured out how to exploit these golden opportunities by keeping a pulse on what is going on. It seems too simple to be true, but it goes back to the age-old principle of information is power. Getting the information comes from being aware of one’s surroundings. To become situationally aware, companies need to change their mindset- building a walled garden isn’t an option anymore. During the webinar, we will look at the major data breach trends and findings from 2016 and discuss how this information can help develop your situational awareness. Join us as we cover topics like:

    -What we can learn from Jason Bourne about knowing one’s surroundings
    -What we can learn from hackers to better protect valuable data
    -What we as security professionals can do by going back to the basics of accountability, integrity, auditability, availability and confidentiality
    -How to change our mindset in a new era of a hacker driven gold rush
  • Research Findings: Quantifying ROI for Application Security
    Research Findings: Quantifying ROI for Application Security Shelly Yao, Security Architect – South East Asia, Hewlett-Packard Enterprise Jul 12 2017 5:00 am UTC 45 mins
    Continuous delivery of application is the new norm. Businesses recognize that applications are a competitive differentiator so they are creating and pushing them out at a lightning pace, thus putting a lot of pressure on development and security teams. HPE Enterprise Security, together with Mainstay Partners, studied data collected from a broad set of Fortify customers to quantify the business value they are experiencing by building security into each phase of development.

    Join HPE and (ISC)² on July 12 (Wed) at 13:00 (Singapore time) to learn about the key findings from the research. Discover the ROI of application security practices for your organization to scale confidently for business growth.
  • Push notifications that work: 6 tips for building a devoted user base
    Push notifications that work: 6 tips for building a devoted user base Stewart Rogers, Director of Marketing Technology, VentureBeat Jul 13 2017 5:00 pm UTC 60 mins
    A push notification is a tricky kind of social engagement: it can be a tap on the shoulder, a punch in the face, or water torture. In other words, it can be tremendously successful at driving commerce and engagement, or it could piss your customer off so badly they'll go rip you a new one on Twitter. And we've seen how well that works out for brands.

    At the very least, every misstep reduces open rates, strikes a blow against retention and destroys engagement. You want to know how to not be the boor at a cocktail party, because push notifications, one of the most powerful and immediate engagement tools in your arsenal (when you do it right) can garner 2770% higher conversion rates.

    Don't be part of the 63 percent of marketers who stumble on the messaging, timing, and frequency of your notification strategy—join this interactive VB Live event.

    You'll:
    * Discover the one trick to never-fail push notifications everywhere, not just apps
    * Drive 2770% higher conversion rates through a specific kind of push notifications
    * Learn how to apply behavioral triggered push notifications in your own marketing strategy
    * Build better timing into your push notifications to increase conversions


    Speakers:
    * Stewart Rogers, Director of Marketing Technology for VentureBeat
    • Wendy Schuchart, Moderator, VentureBeat

    More speakers to be announced soon!
  • Open Banking – what does it mean for banks & fintech’s?
    Open Banking – what does it mean for banks & fintech’s? TBC Jul 18 2017 12:45 pm UTC 90 mins
    Open Banking is coming in January 2018, but what does this mean and does it change anything?
    ENVESTNET YODLEE has lead the way for 18 years, helping users access their data via services provided by both banks and fintech providers. This Webinar will provide a perspective from a bank, fintech and platform provider on the changes coming next year.
  • Pervasive Intelligence: The IoT Computing Continuum
    Pervasive Intelligence: The IoT Computing Continuum Christian Renaud, Research Director, Internet of Things Jul 18 2017 7:00 pm UTC 75 mins
    Computing and applications in IT have shifted over the last decade from a de-centralized to a centralized, cloud-based model. New Internet of Things applications promise to reverse that trend with an emphasis on local edge computing and analytics, and create a continuum of new aggregation points to address the unique needs of each IoT vertical application. This webinar will look at key drivers behind the re-emergence of the edge in IoT analytics and the growing demand for near-edge aggregation models to solve for application latency and cost constraints.
  • Why your VR game is virtually useless without data
    Why your VR game is virtually useless without data Kiyoto Tamura, VP Marketing, Treasure Data Jul 19 2017 5:00 pm UTC 60 mins
    The reality is virtual, but successful VR games still require cold, hard data. For wildly popular games like Survios’ Raw Data, the first VR-exclusive game to reach #1 on Steam’s Global Top Sellers list, data and analytics are the key to success.

    And now online gaming companies have the full-stack analytics infrastructure and tools to measure every aspect of a virtual reality game and its ecosystem in real time. You can keep tabs on lag, which ruins a VR experience, improve gameplay and identify issues before they become showstoppers, and create fully personalized, completely immersive experiences that blow minds and boost adoption, and more. All with the right tools.

    Make success a reality: Register now for our latest interactive VB Live event, where we’ll tap top experts in the industry to share insights into turning data into winning VR games.

    Attendees will:
    * Understand the role of VR in online gaming
    * Find out how VR company Survios successfully leverages the Exostatic analytics infrastructure for commercial and gaming success
    * Discover how to deploy full-stack analytics infrastructure and tools

    Speakers:
    Nicolas Nadeau, President, Exostatic
    Kiyoto Tamura, VP Marketing, Treasure Data
    Ben Solganik, Producer, Survios
    Stewart Rogers, Director of Marketing Technology, VentureBeat
    Wendy Schuchart, Moderator, VentureBeat

    Sponsored by Treasure Data
  • How To Secure And Empower Your Mobile Workforce
    How To Secure And Empower Your Mobile Workforce Chris Sherman, Sr Analyst at Forrester & Mike Schuricht, Sr Director of Product Management at Bitglass Jul 19 2017 6:00 pm UTC 60 mins
    The rise of Millennials in the workforce, increasing employee
    demand for technology flexibility, and a focus on the employee experience continue to disrupt traditional work procedures. Companies launch limited bring-your-own-device (BYOD) deployments, but these programs often stall when an employee is required to install EMM/MAM/MDM software.

    In this webinar, we will discuss the best practices related to securing employee devices while maintaining user productivity.
  • ASO or GTFO: App store optimization FTW
    ASO or GTFO: App store optimization FTW Stewart Rogers, Director of Marketing Technology, VentureBeat Jul 20 2017 7:30 pm UTC 60 mins
    For LTV, engagement, and life­cycle, organic installs blow paid install campaigns out of the water—and they're a lot cheaper. VB Insight analysts report that if you want to boost organic downloads by at least 20 percent—or in some cases double or even triple that rate—you need to get in the ASO game.

    ASO basics have been buried alive in the avalanche of new apps, flawed app search, and rapid-fire algorithm changes that aren't always developer friendly. To get the most out of your entire marketing funnel, not just your app store presence, you need to step up your ASO game with these key takeaways from our latest in-depth, Godzilla-sized ASO report.

    For report highlights, key best practices and can't-miss ASO insights from super-analyst Stewart Rogers, join our latest interactive VB Live event!

    In this webinar you'll:
    * Learn why ASO is fundamental to the success of any app
    * Familiarize yourself with the pillars of solid ASO strategy
    * Leverage technology to increase your lifetime user value
    * Think beyond keywords for your search strategies

    Speakers:
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Peggy Anne Salz, Chief Analyst, MobileGroove
    * Wendy Schuchart, Moderator, VentureBeat

    Don't miss out, register today!
  • Privacy Level Agreement Code of Conduct for CSPs: a compliance tool for GDPR
    Privacy Level Agreement Code of Conduct for CSPs: a compliance tool for GDPR Paolo Balboni, Founding Partner of ICT Legal Consulting Aug 17 2017 12:00 pm UTC 60 mins
    Paolo Balboni will discuss in a practical and business oriented way, the new provisions of the GDPR and how the PLA Code of Conduct supports compliance with the forthcoming EU Data Protection Legislation. More precisely, Balboni will highlight the true privacy compliance “game changers” introduced by the GDPR and offer the audience practical inputs on how to set up a sound and effective corporate Data Protection Compliance Programme, which will also include having a PLA in place with Cloud Service Providers.
  • B2B video marketing: Turn your CRO into your BFF
    B2B video marketing: Turn your CRO into your BFF Stewart Rogers, Director of Marketing Technology, VentureBeat Aug 17 2017 5:00 pm UTC 60 mins
    You better get good at conversational video marketing, fast—or you're going to be obsolete.

    Videos and photos get the most retweets. Last year, Facebook's video viewership doubled from 4 billion views per day to 8 billion views per day in seven months. Google owns YouTube, and coincidentally, rich media is a favorite of the search engine's algorithms.

    Conversational videos drive traffic, boost engagement, and serve up information better than any other medium. They promote trust in your brand and your products. They're eminently shareable, potentially viral, and taking over the internet: 74 percent of all Internet traffic in 2017 will be video.

    Step up and stand out in every step of the sales funnel with conversational video marketing when you join our latest interactive VB Live event.

    By watching this webinar, you'll:
    * Optimize your audience takeaways for video content
    * Get tips from the savviest sales and marketing people on their video content strategy
    * Focus your energy on the right distribution channels for your adverts
    * Personalize video content to lock in the close

    Speakers:
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    More speakers to be announced soon!
  • Hunting Criminals with Hybrid Analytics, Semi-supervised Learning, & Feedback
    Hunting Criminals with Hybrid Analytics, Semi-supervised Learning, & Feedback David Talby, CTO, Atigeo Aug 23 2017 5:00 pm UTC 60 mins
    Fraud detection is a classic adversarial analytics challenge: As soon as an automated system successfully learns to stop one scheme, fraudsters move on to attack another way. Each scheme requires looking for different signals (i.e. features) to catch; is relatively rare (one in millions for finance or e-commerce); and may take months to investigate a single case (in healthcare or tax, for example) – making quality training data scarce.

    This talk will cover a code walk-through, the key lessons learned while building such real-world software systems over the past few years. We'll look for fraud signals in public email datasets, using IPython and popular open-source libraries (scikit-learn, statsmodel, nltk, etc.) for data science and Apache Spark as the compute engine for scalable parallel processing.

    David will iteratively build a machine-learned hybrid model – combining features from different data sources and algorithmic approaches, to catch diverse aspects of suspect behavior:

    - Natural language processing: finding keywords in relevant context within unstructured text
    - Statistical NLP: sentiment analysis via supervised machine learning
    - Time series analysis: understanding daily/weekly cycles and changes in habitual behavior
    - Graph analysis: finding actions outside the usual or expected network of people
    - Heuristic rules: finding suspect actions based on past schemes or external datasets
    - Topic modeling: highlighting use of keywords outside an expected context
    - Anomaly detection: Fully unsupervised ranking of unusual behavior

    Apache Spark is used to run these models at scale – in batch mode for model training and with Spark Streaming for production use. We’ll discuss the data model, computation, and feedback workflows, as well as some tools and libraries built on top of the open-source components to enable faster experimentation, optimization, and productization of the models.
  • Mobile advertising: Stop fraud and step up clicks
    Mobile advertising: Stop fraud and step up clicks VentureBeat Aug 24 2017 5:00 pm UTC 60 mins
    It's 2017 and the digital ad space hasn't stopped growing in size and complexity. Mobile advertisers are seeing increased opportunities for ad placements in apps and messaging platforms, which means more opportunities, but also new marketing challenges—and a major surge in fraud.

    Make this the year you stop letting fraudulent bots burn through your budget and start maximizing the power of mobile advertising with must-click messaging. Join our latest live, interactive event for an in-depth look at how to stay in front of your audience, ahead of your competitors, and on top of fraud.

    In this webinar you'll:
    * Learn what works and what doesn't in 2017's mobile advertising arena
    * Mitigate the mobile advertising fraud risk in your own applications
    * Create the most engaging mobile advertisements for savvy app patrons
    * Use video and 360 advertising to stay abreast of the latest trends in mobile advertising

    Speakers:
    * Stewart Rogers, Director of Technology, VentureBeat
    * Wendy Schuchart, Moderator, VentureBeat
    More speakers to be announced?

    Want to be a speaker on a VB Live event? Pitch your story at Webinars at VentureBeat Dot Com.
  • Augmenting Humans: Identifying Ideal Scenarios for Enterprise Productivity
    Augmenting Humans: Identifying Ideal Scenarios for Enterprise Productivity John Nall, Founder, Appzion Sep 26 2017 3:00 pm UTC 60 mins
    Join John Nall, Founder and CEO of Appzion, as he takes a technical deep-dive into workforce mobilization through augmented reality.

    In this webinar you will learn the steps to enterprise AR productivity. Methods include techniques to identify ideal scenarios for augmenting humans, process mapping and observation techniques. Once the scenario is chosen, other considerations include software and hardware assessment and selection and cybersecurity for wearables.
  • Virtual Umbrella: Why We Chose Virtual Reality
    Virtual Umbrella: Why We Chose Virtual Reality Samantha Kingston, Founder, Virtual Umbrella Sep 28 2017 1:00 pm UTC 45 mins
    Samantha Kingston will explore why she bet her career on virtual reality and what it’s really like running a marketing company solely for VR, looking at trends and what challenges are ahead for 2018.

    Virtual Umbrella is an award-winning marketing consultancy specialising in Virtual Reality. Virtual Umbrella has worked on a number of notable projects including creating a virtual reality cinema in Cannes, curating and running a technology hub as part of the Edinburgh Fringe Festival and providing immersive experiences along the BBC and Imperial War Museum.

    Speaker bio:

    Samantha Kingston is the award-winning client director at Virtual Umbrella. Virtual Umbrella is a marketing and PR agency specialising in virtual reality. Samantha fell into the VR industry by accident but has spent her time in the industry building up her own company and working with the VR industry in the UK, Europe, and US. Samantha is an advocate for Women in tech and VR and she is often found moderating panels on equality in the workplace. In 2016 she won the regional and national ‘New Business’ award at Venus Awards, highlighted as one of MCV 30 under 30 and one of the rising stars of BIMA100 2016.
  • How to Build an Open Sourced Data Science Platform
    How to Build an Open Sourced Data Science Platform David Talby, CTO, Atigeo Oct 26 2017 5:00 pm UTC 60 mins
    This talk shows how to build a scalable data science platform, using only free, commercially-friendly open source software. The end-to-end architecture covers interactive queries & visualization, machine learning & data mining, deploying models to production, and a full 24x7 operations toolset.

    Requirements include what an enterprise typically requires: Strong security (authentication, authorization, audit, encryption, multi-tenancy), active monitoring for both systems & data, backup & restore, user management (with LDAP integration), distributed deployment on commodity hardware, auto scaling, and self-healing when containers or services go down. Technologies covered include Spark, Hadoop, ElasticSearch, Kibana, Jupyter notebooks, TensorFlow, OpenScoring, Docker Swarm, and supporting tools.

    This talk is intended for practicing architects and technology leaders, who need to understand how to best leverage the open source ecosystem in this space and what it takes to integrate the available cutting-edge technologies into a cohesive, enterprise-grade and production-grade architecture.

    David Talby is Atigeo’s senior vice president of engineering, leading the R&D, product management, and operations teams. David has extensive experience in building and operating web-scale analytics and business platforms, as well as building world-class, agile, distributed teams.