Welcome to the mobile computing community on BrightTALK! With the consumerization of IT and the widespread adoption of mobile devices across the globe, mobile computing has become an important part of many people's lives in a culture of bring your own device (BYOD). With mobile devices doubling as work phones and more employees working from home, businesses need to provide secure access to data and work applications from anywhere at any time. Join this growing community and hear from industry thought leaders in webinars and videos as they share their insight on mobile computing research and trends.
3-D Secure 2.0’s impact on the financial industry will be one of the most significant in recent years. Built around the increasing popularity of mobile commerce, 3-D Secure 2.0 is predicated on risk-based authentication, leveraging data points for accurate verification, while optimizing the consumer experience.
But, what about migration? How do you get from where you are to where you want to be? It’s time to fine-tune your authentication strategy. Join Hannah Preston, Solution Strategist, Payment Security at CA to learn how to:
• Design the best payment security architecture for your business
• Exploit the power of a consistent device identity across online channels
• Incorporate a global network of devices to shut down fraud fast
As organizations migrate workloads to cloud computing, they benefit from flexibility and agility, but network security operations grow increasingly difficult.
Gaining visibility into cloud environments, extending existing security operations and workflows, ensuring compliance, and managing shared responsibility create new challenges for security professionals. Add to this the complexity of hybrid and multi-cloud environments — and the loss of control within those environments — and it’s no wonder security leaders are scratching their heads over how to best secure their organization’s journey to the cloud.
This session will look at approaches to addressing the many challenges around cloud security management and best practices for translating on-prem security controls and processes into hybrid and multi-cloud environments.
Join Skybox Security and (ISC)² on Jan 17, 2018 (Wed) at 14:00 Singapore time to learn more about security management in the cloud.
빠르게 진화하는 사이버 위협에 대해 보다 신속·효율적인 보호와 대응을 위해서는 IT 인프라 전반에서 가시성을 확보하고, 보안 사고를 탐지·조사·대응할 수 있어야 합니다. 현재 국내외 다양한 통합로그 분석 및 보안관제 솔루션이 존재하며, 이를 보통 가트너에서 정의한 SIEM(Security Information and Event Management)이라는 명칭으로 불리우고 있습니다. 본 웨비나를 통해서 국내/외 대형 보안관제센터에서 사용 중인 솔루션의 특징 및 고려사항 등을 파악한 후, 향후 관련 솔루션 도입을 검토하신다면 많은 시행착오를 줄일 수 있을 것으로 생각됩니다.
We are excited to be hosting another Vivit SIG Talk [#VivitSIGTalk] event focused on Proven Practices around Quality & Testing for you. The live event is being held on 9 Jan 2018 at 12 PM ET, and a full session replay, along with individual session replays and slides presented will all be available.
For this Vivit SIG Talk session, we will be featuring speakers from the United States, England and Australia. If you have been in the Quality & Testing space for any period of time, you will recognize each of these individuals as experts. We are fortunate enough to have them as speakers, so they can share their thoughts, and provide our members with some thought provoking and actionable content.
Identifying security incidents isn’t always easy. Properly scoping incidents can be difficult. And, most organizations admit they aren’t able to fully remediate every incident. On average, over 80% of organizations are concerned with their ability to address all three of the aforementioned tasks. Organizations struggle because they lack confidence in their endpoint data due to incomplete visibility, control, and accuracy.
64% of organizations believe that a successful attack on endpoints is likely to recur and succeed again. This cycle is doomed to repeat over, and over, and over again. However, it's possible to break out of the re-compromise cycle for good. As the endpoint security landscape evolves, what role does EDR play?
Join us for this webinar. Speakers will include:
1.Fernando Montenegro (Sr. Analyst at 451 Research) will provide an EDR market overview and trends
2.Erik Kristiansen (Sr. Director at Tanium) will explore the findings from a recent security survey
Recommended Audience: CIOs, CFOs, Enterprise Architects, IT Project Managers, IT Procurement, IT Service, IT Finance
This webinar provides key tips on the Cloud Service Management market, including the drivers, best practices and top vendors including, but not limited to:
IBM Cloud Asset Management
Cloud Infrastructure-as-a-Service is growing rapidly as companies replace obsolete data center servers and storage with "The Cloud." As companies use more services from multiple regions and even multiple vendors, Cloud Computing becomes yet another management headache where discounts, service levels, and IT governance can go unenforced.
The cost of Impostor email has risen to $5.1B. Business email compromise (BEC) is impacting employees, business partners and customers of organizations around the world.
Proofpoint Email Fraud Defense (EFD) extends the security already offered by Email Protection to block criminals that spoof your trusted domains to trick victims, both inside and outside of your organization, into sending money and other sensitive information to the attacker.
Join us for a live webinar on Tuesday, June 6th at 10am PST where you will learn:
• Latest impostor email trends including BEC and consumer phishing
• How to extend your current protection to stop all impostor threats
• Upcoming product integration with Email Protection to secure your entire email ecosystem
Join us for a new webinar in our series focused on helping companies prepare for the upcoming global government regulations, like European General Data Protection Regulation (GDPR). Data sovereignty, especially for cloud-first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.
This webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our Director of Global Data Privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Alex Hanway, Product Marketing, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.
Join us to hear more about:
•What is GDPR?
•Case Study: A look at how Gemalto has prepared for GDPR
•The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations
Providing a great digital experience is critical for your brand, but the complexity of monitoring modern apps presents a challenge. When you combine a mix of mobile and Web applications, containers and microservices in distributed environments, identifying when and why your customers are having a poor app experience is often difficult.
Join us for this webinar where Bryan Whitmarsh, Director, Product Management at CA Technologies will demonstrate how you can achieve a 5-star app experience for your customers. See how CA App Experience Analytics leverages a powerful, open source analytics platform to provide user experience insights and deep visibility into performance across apps and channels.
Join this session to discuss: How your organization can drive towards compliance, how to embed "privacy by design" to your development lifecycles, and how to protect all identified EU personal data and prevent data breaches.
Mobile computing and the use of cloud applications are touted as ways to help healthcare providers deliver better patient care. Clinicians carrying tablets or other devices to exam rooms and patients’ bedsides can quickly access and update patient data and other vital resources necessary for accurate and expeditious treatment.
No one disputes the value of “anytime, anywhere” computing in healthcare – indeed, in other industries as well – but there is a concern about the risk associated with access to sensitive and regulated data via unmanaged devices and unsanctioned cloud applications.
In this CISO panel discussion moderated by Hussein Syed, CISO at RWJBarnabas Health and joined by panelists Alex Fry, Principal Security Consultant at Strong Crypto Innovations LLC and Mike Schuricht, VP of Product Management, Bitglass, you’ll learn about real-world approaches to some of the most vexing challenges of mobile and cloud computing.
Ransomware. Business email compromise (BEC). Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure.
In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it.
Register now to learn about:
•The latest social engineering targeting trends and techniques
•Top email fraud tactics, including business email compromise (BEC) and social media account phishing
•The rise of fraudulent mobile apps and how criminals target users on the go
First in the Industry to deliver Deception, Mobile Threat Defense, and Endpoint Detection and Response (EDR) in a Single-Agent Architecture. Join us to learn the latest Evolution of Endpoint Security & Data Protection:
•Defend against ransomware with multi-layered protection
•Gain enhanced visibility into suspicious files via tunable protection to make better policy decisions
•Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
•Extend advanced security to mobile devices
•Use deception techniques to expose hidden adversaries and determine their intent to improve security posture
•Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
New Integrations Extend Data Protection Beyond Traditional DLP
Powered by the industry’s leading data loss prevention technology, to give you greater visibility and control over your confidential data.
•Expanded Information Centric (ICE) Encryption integration
•Enhanced data classification integration
•Sensitive Image Recognition
•Stronger endpoint controls
•Enhanced data at rest discovery
•Improved cloud app policy and incident management
•Flexibility on cloud deployment
•And More …
Join Symantec and (ISC)² on Dec 13 at 14:00 (Hong Kong time) and learn about the latest Evolution of Endpoint Security & Data Protection.
The increasingly disparate market data universe can lead to errors and inconsistencies in your exchange rates and market data — issues that can cause significant problems once the market data is loaded into your SAP system. So how do you prevent these problems? How do you ensure the accuracy of this data before it enters your system landscape? SAP customers can reduce these risks by using automated market data governance with data validation and anomaly detection, and by implementing a central market data repository to avoid reporting and consolidation issues.
Attend this webinar and find out how to easily source market data — including foreign exchange rates, interest rates, security prices, and volatilities — from multiple providers, such as Reuters, Bloomberg, and OANDA, without any programming, and then distribute that data across your entire system landscape, including both SAP and non-SAP systems, on an automated schedule. You will learn how to:
• Set up a trusted central market data repository
• Govern your data processes
• Detect data anomalies
• Perform a quality check on your exchange rate and market data before committing it to your system
• Personalize the way you source your market data and map it into your system landscape
In this presentation, we will discuss several applications of NLP such as information extraction, knowledge synthesis, and entity retrieval. We will discuss how these fundamental set of algorithms are applicable for a wide array of use-cases and industry verticals such as healthcare, business intelligence, life sciences, legal, e-commerce, sales, and marketing.
Additionally, case studies from these areas will be used to provide an intuitive explanation of complex NLP topics such as distributional semantics, computational linguistics, question-answering, conversational AI, and applications of deep learning to text data.
Dr. Sid J. Reddy's Bio: https://www.conversica.com/sid-j-reddy/
Organizations in most any industry are feeling increasing pressure to move fast. But at what cost? Some have learned the hard way that skipping crucial processes, like testing, damages performance and impacts customer sentiments on your brand. In this case, the fast time to market becomes meaningless.
Smart businesses are adapting to a shift left strategy. These teams are learning how to incorporate testing early and often in the release cycle, supporting business requirements to move fast while ensuring high-performing products and quality. But getting there isn’t easy. In this webinar, we’ll cover:
•Testing tools: tool choice is important. Not all tools have been designed to support this new paradigm.
•Integrations: to be effective, testing tools must integrate easily with the tools and processes modern teams use, including CI/CD and APM products. Further, these tools must be very easy to use, specifically for developers.
•Organizational models: shifting left requires changes to traditional organizations and culture. We’ll share insight into the successful models we’ve seen.
Vivit launches their first ever SIG Talk event with three speakers who will give you insights into StormRunner Functional, Dynamic data handling in performance tests as well as AI and machine learning as it applies to testing.
We will discuss:
How StormRunner Functional is the latest functional test offering from Micro Focus. In this session, Chris Trimper, an early adopter and beta tester, will share his experiences with this new product
How Virtual Table Server (VTS), in days of Mercury Interactive, was the often-overlooked repository for dynamically updated real-time test data. Even after a revamp and relaunch in 2014, many people still don't use it, but they should. Richard's VTS demo will help you to get value from this great add-on for LoadRunner and Performance Center
How Big Data, Artificial Intelligence and Machine learning are rapidly impacting businesses and customers, enabling another massive shift through technology enablement. In this session, Todd DeCapua will share how these capabilities are being leveraged in Performance Engineering now, and into the future.
Natural language processing is a key component in many data science systems that must understand or reason about text. Common use cases include question answering, paraphrasing or summarization, sentiment analysis, natural language BI, language modeling, and disambiguation. Building such systems usually requires combining three types of software libraries: NLP annotation frameworks, machine learning frameworks, and deep learning frameworks.
This talk introduces the NLP library for Apache Spark. It natively extends the Spark ML pipeline API's which enabling zero-copy, distributed, combined NLP & ML pipelines, which leverage all of Spark's built-in optimizations.
The library implements core NLP algorithms including lemmatization, part of speech tagging, dependency parsing, named entity recognition, spell checking and sentiment detection. The talk will demonstrate using these algorithms to build commonly used pipelines, using PySpark on notebooks that will be made publicly available after the talk.
David Talby has over a decade of experience building real-world machine learning, data mining, and NLP systems. He’s a member of the core team that built and open sourced the Spark NLP library.
Allianz Group has drastically improved its internal feedback culture among employees. Learn how Allianz used the Feed-bck app, built native on SAP Cloud Platform, to improve the engagement and insights of its employees and introduce the latest trend of continuous, peer-to-peer evaluations to employees during their day-to-day work.
During this webinar you will explore:
• Allianz use cases, its experience working on the SAP Cloud Platform, and how the company improved the feedback culture
• How your employees can instantly ask for feedback when they require it the most, shortening the overall feedback cycle
• How to achieve and measure impact on your continuous feedback processes
• A rating system and dashboards that can provide an objective measure that provides insight into how effective and trusted the feedback of your leaders is to your employees, helping to identify the influencers and true leaders of your organization
Organizations across the globe are engaged in what some consider to be another IT buzzword – Digital Transformation. Many though take it seriously, as concerted means to optimize customer experiences, improve business efficiencies, and capitalize on new market opportunities.
In this webinar Carl Lehmann, Principal Analyst at 451 Research will discuss how industry leading enterprises pursue digital transformation from both business and technical perspectives by:
•Describing digital transformation and how it is used to create competitive advantage
•Discussing why and how enterprises are pursuing such initiatives
•Identifying the critical technology needed for execution
•Revealing how digital automation platforms improve and enable new ways of doing business
Attendees will learn how to define and structure digital transformation initiatives unique to their firms and how best to make use of digital automation platforms for IT and business transformation.
NowSecure continuously monitors millions of mobile apps in third-party apps in the Apple® App Store® and the Google Play™ store for security, compliance and privacy risks.
A comprehensive analysis of iOS and Android apps found that a staggering 85% of those apps fail one or more of the OWASP Mobile Top 10 criteria. Given that the average mobile device has over 89 mobile apps on it, what are the odds your employees have one or more of the apps and what’s the real risk to your business?
During this webinar, renowned mobile security expert and NowSecure founder Andrew Hoog and Chief Mobility Officer Brian Reed will review the massive data set, detail the areas of exposure and review mitigation recommendations.
Mobile apps power productivity in the modern business; don’t let a few bad apps bring it down.
Note: Live attendees will be entered to win a free mobile app security assessment!
As organizations embrace cloud infrastructure, DevOps methodologies, PAAS, IoT and mobile workforce, there are new risks coming from a broader attack surface. Vulnerability management designed for traditional assets is not enough. To improve security, you need to rethink how you do things. For example, containers have become the de facto standard in cloud architectures today, which means that security needs to move into developers’ build processes while complementing existing solutions.
Attend this webinar to discover:
•Where vulnerability management for today’s assets needs to start
•What the new faces of attacks and remediation look like
•Why prioritization should not be based on scan results
•Why reports using Excel are no longer the answer
•How DevOps can be part of the solution to incorporate security
Join Tenable and (ISC)² on Jan 24, 2018 (Wed) at 14:00 (Singapore time) to learn how to minimize cyber exposure in a world of cloud, containers and other modern assets.
Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
Moderator: Clayton Jones, Regional Managing Director, APAC, (ISC)²
Recently, there have been several payment industry initiatives designed to make electronic payments safer. Consequently, financial entities like merchants, PSPs, and consumers will soon face many changes. Although the initiatives’ premise − to eliminate vulnerabilities in the payments cycle − is welcome; businesses must now prepare to comply. Are you ready?
Join our CA Technologies Payment Security gurus, Product Management Advisor Jayakumar Krishnasamy and Presales Director Matt Berryman to find out:
• How to interpret the recent payment initiatives
• If risk-based authentication satisfies mandates
• Which strong authentication methods are compliant
Cybersecurity Skills Are in High Demand, Yet in Short Supply. The growing number of recent cybersecurity attacks highlights a shortage of skilled workforce in the cybersecurity industry, predicted to reach around 1.8 million workers by 2022. These challenges will also be impacted by evolution of IoT/ IoE and Artificial intelligence, which represents an unprecedented opportunity to connect people, processes, data, and things.
Key Takeaways include:
- Is Automation an answer to the skill gap?
- Maintaining security in the face of growing cyber risks and threats
- How the arrival of AI & IoT in both our personal and business lives will create a skills gap that will require both the retooling of people’s existing skillsets and the wide-scale hiring of new workers
DON'T FALL PREY TO SOPHISTICATED CYBER ATTACKS IN 2018
Join Davide Canali, Senior Threat Analyst and Adenike Cosgrove, Cybersecurity Strategist, on Tuesday, 30th Jan at 10 AM GMT for our yearly webinar, “How to Prepare for the 2018 Cyber Threats.” This live event will cover:
- Predictions for the 2018 threat landscape with a special focus on EMEA
- Key actions you can take to prepare your organisation
- Top resources to help support your security efforts
With AI, personal data, & business ethics all in ascendence, the need for ethical IT policies has never been greater. Otherwise, companies risk building services and products that fall short of the ethics and trust that they have been given by employees.
In this webinar, Amalgam Insights explores how AI threatens ethical IT and provides guidance based on other rules-based frameworks that derive business outcomes, such as the law and corporate legislation.
What Do You REALLY Need to Know About the New OWASP Top Ten?
The OWASP Top Ten is the de-facto web application security standard because it reflects the evolving threat landscape, providing organizations a framework to manage and mitigate application security risk.
This dual-presenter format will examine the critical newcomers and pesky incumbents from both an offensive and defensive perspective. Attend to get our expert insight on how to harden Web applications and align your program towards OWASP compliance.
Topics covered include:
- The newcomers – why they are so tricky and elude traditional test efforts
- XSS and Injection – mistakes organizations keep making that land these preventable threats on every Top Ten list
- Design flaws that cause them and coding errors that expose them
- High impact activities that reduce exploitability, prevalence and impact
Meet the Presenters:
Kevin Poniatowski, Sr. Security Instructor & Engineer at Security Innovation, brings an optimal blend of speaking ability, technical savvy, and an insatiable passion for security to Security Innovation's training customers. Kevin entered the application security field in 2007 with Security Innovation, where he has split time between application security course development and delivering instructor-led courses.
Mark Burnett is a security consultant, author, and researcher who specializes in application security, authentication, and hardening Microsoft Windows-based servers and networks. Since 1999 he has worked in numerous areas of IT security, developing unique strategies and techniques for protecting critical assets. Mark is author and coauthor of a number of security books and publishes security articles for several web sites, newsletters, and magazines.
It’s a dilemma. Today, security must be built into mobile applications to fight rampant online fraud, but many App Developers don't have the necessary skill set … nor the time required to become proficient coders. What is the answer?
Join Carol Alexander, Senior Director, Security Products at CA Technologies, to learn how to quickly build and maintain modern, frictionless, and secure apps for your customers. It’s true. With CA Rapid App Security, developers can easily and rapidly:
• Integrate device security and multifactor and risk-based authentication into apps
• Eliminate dozens of complex steps, typically required for coding user and device security
Let your developers focus on mobile applications requirements, while your business delivers a trusted user experience.
Benchmarking storage performance is both an art and a science. In this 5th installment of the SNIA Ethernet Storage Forum’s “Storage Performance Benchmarking” series, our experts take on optimizing performance for various workloads. Attendees will gain an understanding of workload profiles and their characteristics for common Independent Software Vendor (ISV) applications and learn how to identify application workloads based on I/O profiles to better understand the implications on storage architectures and design patterns. This webcast will cover:
•An introduction to benchmarking storage performance of workloads
•Common Workloads (OLTP, OLAP, VMware, etc.)
Spend Valentine’s Day with us. We think you’ll “love” this webcast!
The reality is that Consumer Identity and Access Management and the Internet of Things are fostering unprecedented change. The scale and types of devices and digital identities are increasing at a significant pace, driving huge security and performance concerns. These concerns have many companies asking:
• How are potential risks being monitored and secured?
• How are users and devices being managed?
• How are directory services being configured?
Learn to address these challenges, while shaping a more secure and cost-effective infrastructure.
Join CA Technologies gurus Clayton Donley, SVP, Software Engineering, Security and Rob Lindberg, Sr Principal Product Manager, CA Directory to explore alternatives and recommendations. You'll also be able to compare performance results of leading next-gen directory services, tested and compiled by an independent, third-party.
Recommended Company Size: $10 million to $1 billion in annual revenue or companies growing more than 100% year-over-year.
Summary: It's easy to lose control of IT costs when companies grow quickly. Those that lose track of IT costs will give up valuable funds that could be used to hire talent or acquire key assets.
In this webinar, Amalgam CEO and Principal Analyst Hyoun Park and Telecom Expense Management vendor Valicom explore 5 big warning signs that company IT spend is going off the rails and then how to fix these issues via either a software, back office support, or managed services solution.
This Amalgam Insights webinar is generously sponsored by Valicom
How do you know if you are outsourceable? And how can you guide the outsourcing without simply being replaced?
This webinar takes the analyst's experiences in IT, examples from current IT organizations and managed mobility service providers, and key trends in the IT world to show when and how to identify IT jobs ripe for outsourcing and how to position yourself to take advantage of the outsourcing rather than simply be replaced.
May, 25 2018. It’s a date that is approaching quickly. It’s also the deadline for GDPR compliance. For companies that fail to comply, the cost can be high - as much as 4% of annual turnover.
Note: There is a misconception is that the regulation affects only companies in the European Union. In fact, it applies to any company that has dealings or plans to have dealings with citizens that reside in the EU.
Take the lead and get ready to initiate GDPR. Join Cullen Lemley, Cybersecurity Consultant at CA Technologies, for an overview of the impending regulations. Learn the important security facets of GDPR, the challenges for Privileged Access Management, and how businesses around the globe are preparing for the deadline.
Mobile devices are now considered to be one of the weakest links in the IT infrastructure of most enterprises. While the cost of a mobile breach is similar to that of a desktop or laptop breach, an astounding number of enterprises are still lacking next generation protection, leaving themselves at high risk of attack.
Orange Business Services has teamed with Check Point to lay down the hard facts surrounding the mobile threat landscape based on insight from current research and an extensive global vision of the market. The webinar will deliver practical advice surrounding common myths and offer a simple methodology approach which can be applied across the business.
Join this short webinar to understand:
•Why 100% of enterprises are at risk of attack
•What next generation of mobile cyber attacks look like
•What steps enterprises can take to protect themselves
As threats and attacks become more frequent, the alerts and alarms to be investigated become more unmanageable. Plus, by the time the warnings are checked, the damage may already be done. We need a new paradigm that moves the enterprise from reactive to predictive. Can user behavior analytics and machine learning deliver the threat intelligence that is needed, and if so, how do we start to use it?
Join Mark McGovern, Vice President, Product Management, CA Technologies as he takes a closer look at threat intelligence and its unique capabilities. The session will uncover the:
• Challenges and benefits of collecting the data needed to detect threats
• Immediate value and risks posed by a shared threat intelligence model
• Advantages of applying advanced machine learning to specific problems
Whether you are new to cybersecurity or an experienced professional, threat intelligence should be on your “need to know” security agenda.