Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • ASO or GTFO: App store optimization that works
    ASO or GTFO: App store optimization that works Trey Stout, CTO and co-founder, ScribbleChat and Handwriting.io Recorded: Jul 20 2017 61 mins
    For LTV, engagement, and life­cycle, organic installs blow paid install campaigns out of the water—and they're a lot cheaper. VB Insight analysts report that if you want to boost organic downloads by at least 20 percent—or in some cases double or even triple that rate—you need to get in the ASO game.

    ASO basics have been buried alive in the avalanche of new apps, flawed app search, and rapid-fire algorithm changes that aren't always developer friendly. To get the most out of your entire marketing funnel, not just your app store presence, you need to step up your ASO game with these key takeaways from our latest in-depth, Godzilla-sized ASO report.

    For report highlights, key best practices and can't-miss ASO insights from super-analyst Stewart Rogers, join our latest interactive VB Live event!

    In this webinar you'll:
    * Learn why ASO is fundamental to the success of any app
    * Familiarize yourself with the pillars of solid ASO strategy
    * Leverage technology to increase your lifetime user value
    * Think beyond keywords for your search strategies

    Speakers:
    * Trey Stout, CTO and Co-founder, ScribbleChat and Handwriting.io
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Peggy Anne Salz, Chief Analyst, MobileGroove
    * Wendy Schuchart, Moderator, VentureBeat

    Don't miss out, register today!
  • Keeping Enterprise Data Safe from Mobile Travel Risks
    Keeping Enterprise Data Safe from Mobile Travel Risks Domingo Guerra, Co-Founder and President at Appthority Recorded: Jul 19 2017 23 mins
    Over 459 million business trips and 1.7 billion US leisure trips will be booked in 2017. Mobile threats can increase significantly when employees travel with their mobile phones and devices and their guard is down.

    Domingo Guerra provides tips for keeping data safe while employees travel and reducing risks when they return.
  • How To Secure And Empower Your Mobile Workforce
    How To Secure And Empower Your Mobile Workforce Chris Sherman, Sr Analyst at Forrester & Mike Schuricht, Sr Director of Product Management at Bitglass Recorded: Jul 19 2017 59 mins
    The rise of Millennials in the workforce, increasing employee
    demand for technology flexibility, and a focus on the employee experience continue to disrupt traditional work procedures. Companies launch limited bring-your-own-device (BYOD) deployments, but these programs often stall when an employee is required to install EMM/MAM/MDM software.

    In this webinar, we will discuss the best practices related to securing employee devices while maintaining user productivity.
  • Streamlining Your Data-Security Program to Meet Regulatory Change
    Streamlining Your Data-Security Program to Meet Regulatory Change Mark Bower, Global Director of Product Management, HPE Security – Data Security Recorded: Jul 19 2017 61 mins
    Data security and the challenge of data protection is increasing in scope and difficulty. The massive volume of data that businesses are collecting is growing exponentially, and managing compliance delivery is a daunting task with huge negative consequences for getting it wrong. While organizations have long needed to safeguard intellectual property and confidential information, changes in information technology and business models introduce new threats, and new regulations. Governments and industry bodies are imposing new regulations to motivate organizations to protect the privacy and confidentiality of information. Responsibilities can vary widely by region and by industry, and staying on top of an ever-shifting regulatory landscape is complex and challenging, but it isn't impossible.

    Successful organizations coordinate enterprise-wide regulatory compliance activities with tools to identify and address new and changing regulations, and are able to map the impact of these regulations across the entire infrastructure, and prioritize compliance activities according to business impact. By deploying a consistent, sustainable, scalable and measurable process for managing regulatory change, they are able to eliminate manual, non-scalable and non-strategic activities to reduce the cost and improve the speed of regulatory compliance programs.
  • Why your VR game is virtually useless without data
    Why your VR game is virtually useless without data Kiyoto Tamura, VP Marketing, Treasure Data Recorded: Jul 19 2017 60 mins
    The reality is virtual, but successful VR games still require cold, hard data. For wildly popular games like Survios’ Raw Data, the first VR-exclusive game to reach #1 on Steam’s Global Top Sellers list, data and analytics are the key to success.

    And now online gaming companies have the full-stack analytics infrastructure and tools to measure every aspect of a virtual reality game and its ecosystem in real time. You can keep tabs on lag, which ruins a VR experience, improve gameplay and identify issues before they become showstoppers, and create fully personalized, completely immersive experiences that blow minds and boost adoption, and more. All with the right tools.

    Make success a reality: Register now for our latest interactive VB Live event, where we’ll tap top experts in the industry to share insights into turning data into winning VR games.

    Attendees will:
    * Understand the role of VR in online gaming
    * Find out how VR company Survios successfully leverages the Exostatic analytics infrastructure for commercial and gaming success
    * Discover how to deploy full-stack analytics infrastructure and tools

    Speakers:
    Nicolas Nadeau, President, Exostatic
    Kiyoto Tamura, VP Marketing, Treasure Data
    Ben Solganik, Producer, Survios
    Stewart Rogers, Director of Marketing Technology, VentureBeat
    Wendy Schuchart, Moderator, VentureBeat

    Sponsored by Treasure Data
  • Pervasive Intelligence: The IoT Computing Continuum
    Pervasive Intelligence: The IoT Computing Continuum Christian Renaud, Research Director, Internet of Things Recorded: Jul 18 2017 49 mins
    Computing and applications in IT have shifted over the last decade from a de-centralized to a centralized, cloud-based model. New Internet of Things applications promise to reverse that trend with an emphasis on local edge computing and analytics, and create a continuum of new aggregation points to address the unique needs of each IoT vertical application. This webinar will look at key drivers behind the re-emergence of the edge in IoT analytics and the growing demand for near-edge aggregation models to solve for application latency and cost constraints.
  • Virtual & Augmented Reality with Robert Scoble hosted by the VR/AR Association
    Virtual & Augmented Reality with Robert Scoble hosted by the VR/AR Association Robert Scoble Recorded: Jul 18 2017 85 mins
    Spend 1hr with Robert online and ask any question you want! Robert will present the latest industry information and give you insights into the present and the near-future.

    Robert Scoble is on the Advisory Board of the VR/AR Association and is an authority on what's next, particularly when it comes to VR, AR, and MR. Partner at Transformation Group, Robert helps companies deal with the disruption that next generation augmented reality, AKA "Mixed Reality" represents. In his book, "The Fourth Transformation," he details how it will change everything from retailing to education to sports. Robert received several endorsements: Time: One of the top 140 Twitterers! FT: One of the five most influential Twitterers! Inc.: Top 5 on list of Tech Power Players You Need to Know. Next Reality: Top 50 AR influencer.
  • Protecting Data After The Digital Disruption
    Protecting Data After The Digital Disruption Ryan Kalember, SVP Cybersecurity Strategies, Heidi Shey, Forrester Researcher Recorded: Jul 18 2017 61 mins
    Join Guest Forrester Research Senior Analyst, Heidi Shey, and Proofpoint SVP of Cybersecurity, Ryan Kalember, as they discuss what SaaS applications, BYOD, and GDPR (General Data Protection Regulation) mean for protecting data in today’s organizations. Hear what critical developments you should be factoring into your long-term information protection strategy.

    Join this lively discussion to learn:

    - Trends and implications for traditional network and endpoint DLP
    - Real-world examples, such as the recent phishing worm, that illustrate new risks and why you need to think differently
    - Strategies on how to move forward to protect your critical data
  • Open Banking – what does it mean for banks & fintechs?
    Open Banking – what does it mean for banks & fintechs? Jason O'Shaughnessy, Senior Vice President - EMEA and Australia, ENVESTNET | YODLEE Recorded: Jul 18 2017 28 mins
    ECN is pleased to be hosting, via webinar, an expert interview with Jason O'Shaughnessy, Senior Vice President - EMEA and Australia, ENVESTNET | YODLEE on 18 July.

    Open Banking is coming in January 2018, but what does this mean and does it change anything?

    Tune in to find out exactly what it means for you and join in the discussion.
  • Explore Sapho in 3 minutes!
    Explore Sapho in 3 minutes! Sapho Recorded: Jul 17 2017 3 mins
    Watch this quick demo of how easy it is to build micro applications and deliver them to your employees on any device, messenger, or intranet.
  • HIPAA Compliance in the Age of Population Health Management
    HIPAA Compliance in the Age of Population Health Management Andy Nieto Recorded: Jul 14 2017 6 mins
    This short video describes what population health management means, how it works and the role of secure messaging in effective population health management.
  • Push notifications that work: 6 tips for building a devoted user base
    Push notifications that work: 6 tips for building a devoted user base Marissa Aydlett, VP Marketing, Appboy Recorded: Jul 13 2017 60 mins
    A push notification is a tricky kind of social engagement: it can be a tap on the shoulder, a punch in the face, or water torture. In other words, it can be tremendously successful at driving commerce and engagement, or it could piss your customer off so badly they'll go rip you a new one on Twitter. And we've seen how well that works out for brands.

    At the very least, every misstep reduces open rates, strikes a blow against retention and destroys engagement. You want to know how to not be the boor at a cocktail party, because push notifications, one of the most powerful and immediate engagement tools in your arsenal (when you do it right) can garner 2770% higher conversion rates.

    Don't be part of the 63 percent of marketers who stumble on the messaging, timing, and frequency of your notification strategy—join this interactive VB Live event.

    You'll:
    * Discover the one trick to never-fail push notifications everywhere, not just apps
    * Drive 2770% higher conversion rates through a specific kind of push notifications
    * Learn how to apply behavioral triggered push notifications in your own marketing strategy
    * Build better timing into your push notifications to increase conversions


    Speakers:
    * Marissa Aydlett, VP Marketing, Appboy
    * Colleen LeCount, SVP Global Sales and Marketing, Mobolize
    * Kara Dake, Founder, Women in Wireless
    * Stewart Rogers, Director of Marketing Technology for VentureBeat
    • Rachael Brownell, Moderator, VentureBeat
  • Harnessing the Cloud to Embrace New International Opportunities
    Harnessing the Cloud to Embrace New International Opportunities Adrian Drozd, Research Director, Frost & Sullivan and David Turner, Senior Director, EMEA Marketing, Oracle NetSuite Recorded: Jul 13 2017 59 mins
    Prior to the era of digital transformation, international expansion was largely the domain of very large organisations that were capable of investing in infrastructure across the world. Today, the vast majority of IT solutions that enable innovation are deployed in the cloud; such solutions are opening up new opportunities for businesses of all sizes. When it comes to international expansion, acting local but delivering consistent and flexible services is essential. Cloud-based solutions allow organisations to internationalise quickly and enable start-ups to be “born global”.
  • Data Security – Identifying Your Last Line of Defense
    Data Security – Identifying Your Last Line of Defense Jules Anderson – UK Regional Sales Manager, Thales e-Security Recorded: Jul 13 2017 54 mins
    Join Verisec and Thales and gain a deeper understanding into how you can review your data security in an efficient and effective way to enable your organisation to focus on the truly challenging areas of data security and compliance.

    Sensitive data continues to make it into a broader set of environments, including cloud deployments, big data platforms, virtualised systems, and more. The policies and regulatory mandates in effect continue to grow more stringent. At the same time, these groups have to guard against more sophisticated cyber-attacks, and the continuous threats posed by users that have stolen privileged user credentials.

    To adapt to these expanding demands, IT and security professionals have to leverage technologies that offer a strong mix of security, implementation flexibility, and operational efficiency.

    During this webinar we will cover:
    - Compliance with privacy and data security requirements (helping you comply with the critical Article 32 and 34 GDPR rules)

    - Cyber-security risk management and mitigation - using Thales encryption, an organisation can render private data unintelligible to a cyber-intruder (external or internal) even in the event of a breach

    - Enabling organisations to securely drive digital transformation such as BYOD, Cloud Migration, IoT, Blockchain

    - Giving organisations capability to keep control and visibility on their data and encryption keys while moving to the cloud

    This introduction is aimed at those within your organisation looking to gain an insight into data protection and the potential challenges that your organisation could face.
  • [Ask the Expert Q&A] McAfee's Raj Samani on the Petya Ransomware Attacks
    [Ask the Expert Q&A] McAfee's Raj Samani on the Petya Ransomware Attacks Raj Samani, Chief Scientist, McAfee Recorded: Jul 12 2017 45 mins
    - Interactive audience Q&A -

    Fresh of the heels of WannaCry this week has seen the Petya / notPetya / Goldeneye attacks strike many global organisations in a wave of devastating ransomware attacks.

    Questions need to be raised though:

    - Where did Petya originate and who was responsible?

    - What halted the spread?

    - Why was it such an effective and newsworthy cyber attack?

    - Should you be worried about something similar happening to your business?

    - What you do to be better prepared to defend against similar ransomware striking again?

    Tune in live to this interactive ask the expert webinar with McAfee Chief Scientist Raj Samani as he takes your questions on the attacks and suggests ways that you can defend yourself from similar variations in the future.
  • Research Findings: Quantifying ROI for Application Security
    Research Findings: Quantifying ROI for Application Security Shelly Yao, Security Architect – South East Asia, Hewlett-Packard Enterprise Recorded: Jul 12 2017 53 mins
    Continuous delivery of application is the new norm. Businesses recognize that applications are a competitive differentiator so they are creating and pushing them out at a lightning pace, thus putting a lot of pressure on development and security teams. HPE Enterprise Security, together with Mainstay Partners, studied data collected from a broad set of Fortify customers to quantify the business value they are experiencing by building security into each phase of development.

    Join HPE and (ISC)² on July 12 (Wed) at 13:00 (Singapore time) to learn about the key findings from the research. Discover the ROI of application security practices for your organization to scale confidently for business growth.

    Presenter: Shelly Yao, Security Architect – South East Asia, Hewlett-Packard Enterprise
    Moderator: Clayton Jones, Regional Managing Director, Asia-Pacific, (ISC)²
  • Turning the Table on Hackers and Breaches
    Turning the Table on Hackers and Breaches Jason Hart, CTO of Data Protection at Gemalto Recorded: Jul 11 2017 45 mins
    Data breaches in 2016 got even more personal with big hacks of adult entertainment sites and social media databases. Hackers mined these for gold, in other words, valuable data to create social engineering attacks, ransom operations and identity theft. According to Gemalto’s Breach Level Index, the number of stolen, compromised or lost records increase by 86% in 2016, while the number of breaches decreased by 4%. Hackers are going after more data than ever before, and they are finding it in large databases that are left relatively insecure.

    Whether consciously or not, hackers have grasped the idea of situational awareness. They have figured out how to exploit these golden opportunities by keeping a pulse on what is going on. It seems too simple to be true, but it goes back to the age-old principle of information is power. Getting the information comes from being aware of one’s surroundings. To become situationally aware, companies need to change their mindset- building a walled garden isn’t an option anymore. During the webinar, we will look at the major data breach trends and findings from 2016 and discuss how this information can help develop your situational awareness. Join us as we cover topics like:

    -What we can learn from Jason Bourne about knowing one’s surroundings
    -What we can learn from hackers to better protect valuable data
    -What we as security professionals can do by going back to the basics of accountability, integrity, auditability, availability and confidentiality
    -How to change our mindset in a new era of a hacker driven gold rush
  • Digital transformation: Simplified business apps are the place to start
    Digital transformation: Simplified business apps are the place to start Michael Facemire, VP and Principal Analyst, Forrester Research and Peter Yared, CTO, Sapho Recorded: Jul 6 2017 30 mins
    Business requirements and technology are changing constantly, but enterprises often find that their business apps are frozen in time. Businesses need solutions that deliver innovation but focus on integration with existing infrastructure.

    This 30 minute webinar, featuring Forrester Research analyst Michael Facemire and Sapho CTO Peter Yared, discusses how simple micro apps will drive business transformation.
  • How IT can accelerate business transformation
    How IT can accelerate business transformation Michael Facemire, VP and Principal Analyst, Forrester Research and Peter Yared, CTO, Sapho Recorded: Jul 6 2017 28 mins
    Business requirements and technology are changing constantly, but enterprises often find that their business apps are frozen in time. Businesses need solutions that deliver innovation but focus on integration with existing infrastructure.

    This 30 minute webinar, featuring Forrester Research analyst Michael Facemire and Sapho CTO Peter Yared, discusses how simple micro apps will drive business transformation.
  • Using Email Encryption with Cloud-based Email Applications
    Using Email Encryption with Cloud-based Email Applications Matt Signorello Recorded: Jul 5 2017 1 min
    This very short video clip discusses why you should use DataMotion encryption with cloud email services.
  • Petya, notPetya or Goldeneye - The Lies, the Truth and What's Coming Next
    Petya, notPetya or Goldeneye - The Lies, the Truth and What's Coming Next Amar Singh, CEO & Founder, Cyber Management Alliance Recorded: Jul 5 2017 54 mins
    Media hype, so called cyber experts and the rest of the delettantes are all out in force trying to decipher what just happened with Petya. Ransomware or not? Script kiddies? Cyber warfare?

    Let's dive into behind the scenes of what may just be the turning point in targeted malware (sorry ransomware) attacks.

    Tune into this session to get the lowdown on where the attacks came from; who was behind them; what they mean for the cyber security industry and how you can improve the protection for your business the next time something similar rolls along.

    You'll also have the chance to ask Amar your Petya or ransomware questions and to get the upper hand defending your organisation.

    -----------------

    Amar Singh:

    CEO & Founder: Cyber Management Alliance & Give01Day.com - Chair of ISACA's UK Security Advisory Group.

    Experienced cyber, information security & data privacy practitioner. Senior C Level Executive, Global Chief Information Security Officer, Expert in Information Risk Management

    UK Government GCHQ Certified Trainer and creator of APMG & GCHQ Certified course CSPE (Cyber Security & Privacy Essentials)

    Creator and trainer of business focused Cyber Incident Planning & Response Course for middle to senior executives. (CIPR)

    Mentor & Trusted Advisor to FTSE 100 Firms, Start-ups & Incubator Funds

    Board Member and Consultant: MBA in Cyber Security. Chair of ISACA Security Advisory Group.

    Author, writer, Industry speaker & presenter
  • Governing the Future of IT: Technology Consumption Management
    Governing the Future of IT: Technology Consumption Management Hyoun Park Recorded: Jun 29 2017 45 mins
    Recommended Audience: IT finance and budget managers, telecom expense directors and managers, cloud and software sourcing managers.

    AI presents a framework for managing cloud, telecom, and software consumption in a Hybrid IT world. A must-attend for IT executives managing multi-million dollar cloud, telecom, mobility, and/or software budgets.

    In this webinar, Amalgam Insights provides a framework for the CIO and CFO offices to understand the fragmented world of Technology Consumption Management, which you need to understand if you manage:

    * IT Financial Management.
    * Telecom Expense Management
    * Cloud Cost Management
    * Software Lifecycle Management

    This webinar will include descriptions of each of these toolkits, anonymized business examples, and representative vendors to consider at the enterprise level.
  • The Human Factor 2017
    The Human Factor 2017 Adenike Cosgrove, Cybersecurity Strategist at Proofpoint , Davide Canali - Senior Threat Analyst Proofpoint Jul 25 2017 9:00 am UTC 45 mins
    Ransomware. Business email compromise (BEC). Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure.

    In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it.

    Register now to learn about:
    •The latest social engineering targeting trends and techniques
    •Top email fraud tactics, including business email compromise (BEC) and social media account phishing
    •The rise of fraudulent mobile apps and how criminals target users on the go
  • Workloads, Data Centers & Cloud Strategy: Market & Technology Trends
    Workloads, Data Centers & Cloud Strategy: Market & Technology Trends Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center busines Jul 25 2017 3:00 pm UTC 60 mins
    IT planners have far more options as to where to run their workloads than ever before. On-premises data centers, co-location facilities and managed services providers are now joined by hybrid multi-clouds – a combination of Software-, Infrastructure- and Platform-as-a-Service (SaaS, IaaS, and PaaS) execution venues. All have unique operational, performance and economic characteristics that need to be considered when deploying workloads.

    In this Webinar Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center business will discuss how industry leading enterprises determine the best execution venues for their workloads by addressing:

    •The market and technology trends that influence workload, data center and cloud strategy
    •How to evaluate the characteristics of various workloads and execution venues
    •How to manage workloads across on-premises and off-premises ecosystems
    Attendees will learn how to formulate an IT strategy that can be used to guide the decision criteria needed for placing workloads on their best execution venues, and enable the migration and ongoing management of workloads across a hybrid multi-cloud enterprise architecture.
  • Modern Portals: The Digital Transformation of Enterprise Systems & Business Apps
    Modern Portals: The Digital Transformation of Enterprise Systems & Business Apps Fouad ElNaggar, CEO and Co-Founder of Sapho Jul 26 2017 4:00 pm UTC 60 mins
    Enterprise systems are failing today’s employees because they are hard to use, they trap data in silos, they have a poor user experience, and they offer limited mobile support. Therefore, it is no surprise that a Forrester Research study showed that 76% of employees believe it takes too long to complete tasks in their systems and another 62% delay completing tasks that require multiple systems. In short, this means your business has delays.

    On the flip side, consumer applications keep getting better and better – these apps are simple, enable quick task completion, are accessible from anywhere, and offer a great user experience. Why can’t enterprise systems be as easy to use as consumer apps? It turns out, they can be. Modern portals are the next generation digital workplace tools that push data and key actions to employees from their systems so they can more effectively do their jobs.

    Join this webinar to learn how easy it is to:

    •Remove system bottlenecks, reduce helpdesk calls, decrease software spending, enable smart decision-making, and streamline workflows with consumer-like business apps.
    •Build smart, event-driven micro apps that sit on top of your existing systems and push actionable insights and tasks to employees on any device, intranet, or messenger.
    •Triple the productivity of your workforce with a modern portal that surfaces personalized and relevant tasks and information from all your systems.
  • Mobile Edge Computing/Fog Computing: A Journey from Concepts to Reality
    Mobile Edge Computing/Fog Computing: A Journey from Concepts to Reality Naveen Mishra, Ajay Sunder, Frost & Sullivan Aug 2 2017 7:00 am UTC 60 mins
    The need to embrace digital transformation in all possible scenarios is paramount to bring efficiencies and improve current business processes. The challenges of real-time data processing, high network speeds and latency can be overcome by using ICT technologies, i.e., Mobile Edge Computing/Fog Computing. These computing technologies bring compute and storage capabilities to the edge of the network and enable real-time and context-based business applications. All industry verticals can find relevant application areas that can benefit from computing at the edge of the network.
  • High Scale, High Stakes: Adjusting Focus and Investment at the Network Gateway
    High Scale, High Stakes: Adjusting Focus and Investment at the Network Gateway Dan Cummins, Senior Analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing with Symantec Aug 2 2017 6:00 pm UTC 60 mins
    As cloud continues to erase the network perimeter, it’s more important than ever to align IT infrastructure to track more closely to the businesses it serves.

    As a result, gateway technology choices and investments need to fit the cloud model and fit in terms of security use case, value, and real-world business requirements.

    Join Dan Cummins, analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing at Symantec, for an informative webinar on August 2 to hear a discussion of network security today.

    Agenda:

    - Discussion on the increased dependence on HTTP and HTTPS

    - The limitations of Firewalls in the web and cloud world

    The increasing critical need for web gateways, both on premise and in the cloud, for achieving:

    - Access governance for users and devices

    - Verifiable protection against advanced attack methods

    - Agile risk management and measurable return on investment.

    Important opportunities are at hand right now to integrate network and cloud-based approaches to achieve coordinated and robust anti-malware, privacy, policy and connectivity capabilities, while continuing on a path to flexible, software-defined infrastructure.

    Register Today
  • Securing BYOD Without MDM Hassles
    Securing BYOD Without MDM Hassles Shalmali Rajadyax, Product Manager at Bitglass Aug 16 2017 8:00 pm UTC 60 mins
    Many organizations adopted MDM solutions to deal with the increasing demand for BYOD. However MDM is seen by many as cumbersome and invasive and has struggled to see meaningful adoption among employees. Fortunately, Cloud Access Security Brokers (CASBs), like Bitglass, offer an easy-to-use alternative for securing corporate data stored in public cloud applications on both managed and unmanaged devices.

    In this webinar you'll learn the challenges companies face while deploying MDM and some of alternative solutions used to secure employee-owned devices without agents
  • GDPR Privacy Impact and Risk Assessments
    GDPR Privacy Impact and Risk Assessments Ariel Evans, CEO, InnoSec Aug 17 2017 12:00 pm UTC 45 mins
    - InnoSec is the winner of the EU commission Horizon 2020 grant based on its innovation in GDPR and cyber risk -

    GDPR is an urgent issue that has companies scrambling to be compliant by May of 2018. Any organization that processes EU citizen data is in scope and the penalties are severe.

    Alignment with the requirements can reduce the chances of triggering a Data Protection Authority (DPA) to investigate a company’s privacy practices after the GDPR takes effect in May 2018. DPAs can impose a fine on companies of up to 4% of annual global revenues for egregious violations of the GDPR. Member states can also add to these fines. The Netherlands, for instance, has more than doubled its own fining capacity to 10% of annual revenues. European privacy advocates are pressuring DPAs to fully exercise these new powers after May 2018.To manage this risk, multinationals should have a means to demonstrate alignment with the GDPR requirements and communication of this program with DPAs that have jurisdiction over their major European operations.

    InnoSec’s GDPR solution provides privacy impact and risk assessments which measure the confidentiality and integrity of the system and the risk associated to it meeting articles 1,2, 5, 32, 35 and 36. Additionally, we provide a readiness gap analysis for managing, planning and budgeting for GDPR.

    Most e-commerce, educational and multi-national organizations process EU citizen data and are in scope for GDPR. Moreover, most organizations are not ready according to Gartner and his means the race to the finish line requires as much automation as you can afford. InnoSec provides a means for companies to save money and time with their GDPR assessment and gap analysis offering.. Our GDPR offering automates the assessment process and provides a gap analysis readiness feature, that also ensures that organizations can plan, budget and manage their GDPR program.

    Come to this webinar to see how it is done.
  • Privacy Level Agreement Code of Conduct for CSPs: a compliance tool for GDPR
    Privacy Level Agreement Code of Conduct for CSPs: a compliance tool for GDPR Paolo Balboni, Founding Partner of ICT Legal Consulting Aug 17 2017 12:00 pm UTC 60 mins
    Paolo Balboni will discuss in a practical and business oriented way, the new provisions of the GDPR and how the PLA Code of Conduct supports compliance with the forthcoming EU Data Protection Legislation. More precisely, Balboni will highlight the true privacy compliance “game changers” introduced by the GDPR and offer the audience practical inputs on how to set up a sound and effective corporate Data Protection Compliance Programme, which will also include having a PLA in place with Cloud Service Providers.
  • B2B video marketing: Turn your CRO into your BFF
    B2B video marketing: Turn your CRO into your BFF Michael Ballard,Sr Manager Digital Marketing, Lenovo Aug 17 2017 5:00 pm UTC 60 mins
    You better get good at conversational video marketing, fast—or you're going to be obsolete.

    Videos and photos get the most retweets. Last year, Facebook's video viewership doubled from 4 billion views per day to 8 billion views per day in seven months. Google owns YouTube, and coincidentally, rich media is a favorite of the search engine's algorithms.

    Conversational videos drive traffic, boost engagement, and serve up information better than any other medium. They promote trust in your brand and your products. They're eminently shareable, potentially viral, and taking over the internet: 74 percent of all Internet traffic in 2017 will be video.

    Step up and stand out in every step of the sales funnel with conversational video marketing when you join our latest interactive VB Live event.

    By watching this webinar, you'll:
    * Optimize your audience takeaways for video content
    * Get tips from the savviest sales and marketing people on their video content strategy
    * Focus your energy on the right distribution channels for your adverts
    * Personalize video content to lock in the close

    Speakers:
    * Michael Ballard,Sr Manager Digital Marketing, Lenovo
    * Stewart Rogers, Director of Marketing Technology, VentureBeat

    This VB Live event sponsored by Vidyard
  • Solving for compliance: Mobile app security for banking and financial services
    Solving for compliance: Mobile app security for banking and financial services Brian Lawrence, NowSecure Security Solutions Engineer Aug 22 2017 6:00 pm UTC 45 mins
    Mobile apps fall in scope for a number of regulatory requirements that govern the banking and financial services industries, such as: guidelines from the Federal Financial Institutions Examination Council (FFIEC), the Gramm–Leach–Bliley Act (GLBA), New York State cybersecurity requirements for financial services companies, the Payment Card Industry Data Security Standard (PCI DSS), the Sarbanes-Oxley Act, and more. Luckily, a repeatable mobile app security assessment program and standardized reporting go a long way in both achieving compliance objectives and securing mobile apps and data.

    Join us for a 30-minute webinar during which NowSecure Security Solutions Engineer Brian Lawrence will explain:
    -- How and where exactly mobile apps fall in scope for various compliance regimes
    -- Mobile app security issues financial institutions must identify and fix for compliance purposes
    -- How assessment reports can be used to demonstrate due diligence
  • Challenges in Building Connected Communities
    Challenges in Building Connected Communities Kate Garman, Limor Schafman Aug 23 2017 3:00 pm UTC 75 mins
    Creating a seamless connected environment that supports smart community citizen services, streamlines operations, supports economic development is already a challenge for community officials. There are many different needs and directions to begin the conversion to an “intelligent” environment. Communities are also planning and building not just for current needs, but also for future connectivity infrastructure that will be used by autonomous vehicles, smart buildings, connected homes, AR/VR, eRetail, eHealthcare, smartgrid and more. This webcast will discuss how cities and their partner communications suppliers are working together to build connectivity infrastructure for today and tomorrow.
  • Hunting Criminals with Hybrid Analytics, Semi-supervised Learning, & Feedback
    Hunting Criminals with Hybrid Analytics, Semi-supervised Learning, & Feedback David Talby, CTO, Atigeo Aug 23 2017 5:00 pm UTC 60 mins
    Fraud detection is a classic adversarial analytics challenge: As soon as an automated system successfully learns to stop one scheme, fraudsters move on to attack another way. Each scheme requires looking for different signals (i.e. features) to catch; is relatively rare (one in millions for finance or e-commerce); and may take months to investigate a single case (in healthcare or tax, for example) – making quality training data scarce.

    This talk will cover a code walk-through, the key lessons learned while building such real-world software systems over the past few years. We'll look for fraud signals in public email datasets, using IPython and popular open-source libraries (scikit-learn, statsmodel, nltk, etc.) for data science and Apache Spark as the compute engine for scalable parallel processing.

    David will iteratively build a machine-learned hybrid model – combining features from different data sources and algorithmic approaches, to catch diverse aspects of suspect behavior:

    - Natural language processing: finding keywords in relevant context within unstructured text
    - Statistical NLP: sentiment analysis via supervised machine learning
    - Time series analysis: understanding daily/weekly cycles and changes in habitual behavior
    - Graph analysis: finding actions outside the usual or expected network of people
    - Heuristic rules: finding suspect actions based on past schemes or external datasets
    - Topic modeling: highlighting use of keywords outside an expected context
    - Anomaly detection: Fully unsupervised ranking of unusual behavior

    Apache Spark is used to run these models at scale – in batch mode for model training and with Spark Streaming for production use. We’ll discuss the data model, computation, and feedback workflows, as well as some tools and libraries built on top of the open-source components to enable faster experimentation, optimization, and productization of the models.
  • Mobile advertising: Stop fraud and step up clicks
    Mobile advertising: Stop fraud and step up clicks VentureBeat Aug 24 2017 5:00 pm UTC 60 mins
    It's 2017 and the digital ad space hasn't stopped growing in size and complexity. Mobile advertisers are seeing increased opportunities for ad placements in apps and messaging platforms, which means more opportunities, but also new marketing challenges—and a major surge in fraud.

    Make this the year you stop letting fraudulent bots burn through your budget and start maximizing the power of mobile advertising with must-click messaging. Join our latest live, interactive event for an in-depth look at how to stay in front of your audience, ahead of your competitors, and on top of fraud.

    In this webinar you'll:
    * Learn what works and what doesn't in 2017's mobile advertising arena
    * Mitigate the mobile advertising fraud risk in your own applications
    * Create the most engaging mobile advertisements for savvy app patrons
    * Use video and 360 advertising to stay abreast of the latest trends in mobile advertising

    Speakers:
    * Stewart Rogers, Director of Technology, VentureBeat
    * Wendy Schuchart, Moderator, VentureBeat
    More speakers to be announced?

    Want to be a speaker on a VB Live event? Pitch your story at Webinars at VentureBeat Dot Com.
  • Discover the New Micro Focus Application Delivery Management
    Discover the New Micro Focus Application Delivery Management Kelly Emo and Ashish Kuthiala, HPE Sep 5 2017 5:00 pm UTC 45 mins
    We’ve explored disruptions facing application delivery teams as they deliver software innovation faster to accelerate business success in the Digital Economy. And we’ve found disruptions bring challenges but also promise opportunity for the companies who can rapidly embrace seismic changes in software development, testing and delivery while balancing speed and quality. As the new Micro Focus, we stand ready for these challenges with a comprehensive and innovative portfolio of DevOps and Application Delivery Management solutions. This webinar will dive into the disruptions, define approaches to address them, and explore and map the suite of the new Micro Focus solution set across these needs. Bring your questions and discover the new Micro Focus.
  • Android “O” and iOS 11 security updates: What you need to know
    Android “O” and iOS 11 security updates: What you need to know Michael Krueger, NowSecure Mobile Security Analyst // Tony Ramirez, NowSecure Software Support Engineer Sep 14 2017 6:00 pm UTC 45 mins
    Google and Apple will release major updates to the Android and iOS operating systems in the coming months, and beta versions of Android “O” and iOS 11 include a number of security enhancements. During this webinar, NowSecure Mobile Security Analyst Michael Krueger and Software Support Engineer Tony Ramirez will provide an overview of the security updates in both new releases and explain:
    -- Changes in iOS 11 that provide better security for app data in transit
    -- App permissions updates in Android O
    -- How Android O and iOS 11 updates affect mobile app security assessments
  • Augmenting Humans: Identifying Ideal Scenarios for Enterprise Productivity
    Augmenting Humans: Identifying Ideal Scenarios for Enterprise Productivity John Nall, Founder, Appzion Sep 26 2017 3:00 pm UTC 60 mins
    Join John Nall, Founder and CEO of Appzion, as he takes a technical deep-dive into workforce mobilization through augmented reality.

    In this webinar you will learn the steps to enterprise AR productivity. Methods include techniques to identify ideal scenarios for augmenting humans, process mapping and observation techniques. Once the scenario is chosen, other considerations include software and hardware assessment and selection and cybersecurity for wearables.
  • Virtualizing Media Broadcast: TV Transformed
    Virtualizing Media Broadcast: TV Transformed Steve Smith, Limor Schafman Sep 27 2017 3:00 pm UTC 75 mins
    Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.

    Speakers:
    Steve Smith, CTO, Cloud, Imagine Communications
    Stephen Smith is the CTO, Cloud, for Imagine Communications, where he leads the transformation of solutions to support media and entertainment markets in a future defined by IP, software, virtualization and cloud. Previously, Smith was the Executive Director of Media Systems at Starz Entertainment in Colorado, where he was responsible for the technology, implementation and operation of their Media Asset Management and Content Processing platforms. With 20+ years in the industry, Stephen has extensive experience in architecting, deploying, owning and operating complex media processing, origination and distributions systems.

    Host: Limor Schafman, Content Development Director, TIA
  • Virtual Umbrella: Why We Chose Virtual Reality
    Virtual Umbrella: Why We Chose Virtual Reality Samantha Kingston, Founder, Virtual Umbrella Sep 28 2017 1:00 pm UTC 45 mins
    Samantha Kingston will explore why she bet her career on virtual reality and what it’s really like running a marketing company solely for VR, looking at trends and what challenges are ahead for 2018.

    Virtual Umbrella is an award-winning marketing consultancy specialising in Virtual Reality. Virtual Umbrella has worked on a number of notable projects including creating a virtual reality cinema in Cannes, curating and running a technology hub as part of the Edinburgh Fringe Festival and providing immersive experiences along the BBC and Imperial War Museum.

    Speaker bio:

    Samantha Kingston is the award-winning client director at Virtual Umbrella. Virtual Umbrella is a marketing and PR agency specialising in virtual reality. Samantha fell into the VR industry by accident but has spent her time in the industry building up her own company and working with the VR industry in the UK, Europe, and US. Samantha is an advocate for Women in tech and VR and she is often found moderating panels on equality in the workplace. In 2016 she won the regional and national ‘New Business’ award at Venus Awards, highlighted as one of MCV 30 under 30 and one of the rising stars of BIMA100 2016.
  • How to Build an Open Sourced Data Science Platform
    How to Build an Open Sourced Data Science Platform David Talby, CTO, Atigeo Oct 26 2017 5:00 pm UTC 60 mins
    This talk shows how to build a scalable data science platform, using only free, commercially-friendly open source software. The end-to-end architecture covers interactive queries & visualization, machine learning & data mining, deploying models to production, and a full 24x7 operations toolset.

    Requirements include what an enterprise typically requires: Strong security (authentication, authorization, audit, encryption, multi-tenancy), active monitoring for both systems & data, backup & restore, user management (with LDAP integration), distributed deployment on commodity hardware, auto scaling, and self-healing when containers or services go down. Technologies covered include Spark, Hadoop, ElasticSearch, Kibana, Jupyter notebooks, TensorFlow, OpenScoring, Docker Swarm, and supporting tools.

    This talk is intended for practicing architects and technology leaders, who need to understand how to best leverage the open source ecosystem in this space and what it takes to integrate the available cutting-edge technologies into a cohesive, enterprise-grade and production-grade architecture.

    David Talby is Atigeo’s senior vice president of engineering, leading the R&D, product management, and operations teams. David has extensive experience in building and operating web-scale analytics and business platforms, as well as building world-class, agile, distributed teams.