Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • From Where You Are to Where You Want to be with 3DS 2.0
    From Where You Are to Where You Want to be with 3DS 2.0 Hannah Preston, Solution Strategist, Payment Security, CA Technologies Recorded: Jan 18 2018 23 mins
    3-D Secure 2.0’s impact on the financial industry will be one of the most significant in recent years. Built around the increasing popularity of mobile commerce, 3-D Secure 2.0 is predicated on risk-based authentication, leveraging data points for accurate verification, while optimizing the consumer experience.

    But, what about migration? How do you get from where you are to where you want to be? It’s time to fine-tune your authentication strategy. Join Hannah Preston, Solution Strategist, Payment Security at CA to learn how to:

    • Design the best payment security architecture for your business
    • Exploit the power of a consistent device identity across online channels
    • Incorporate a global network of devices to shut down fraud fast
  • Security Management in the Cloud
    Security Management in the Cloud Presenter: Greg Singh, Technical Director-APAC, Skybox Security | Moderator: Clayton Jones, Managing Director, APAC, (ISC)2 Recorded: Jan 17 2018 60 mins
    As organizations migrate workloads to cloud computing, they benefit from flexibility and agility, but network security operations grow increasingly difficult.

    Gaining visibility into cloud environments, extending existing security operations and workflows, ensuring compliance, and managing shared responsibility create new challenges for security professionals. Add to this the complexity of hybrid and multi-cloud environments — and the loss of control within those environments — and it’s no wonder security leaders are scratching their heads over how to best secure their organization’s journey to the cloud.

    This session will look at approaches to addressing the many challenges around cloud security management and best practices for translating on-prem security controls and processes into hybrid and multi-cloud environments.

    Join Skybox Security and (ISC)² on Jan 17, 2018 (Wed) at 14:00 Singapore time to learn more about security management in the cloud.
  • 국내외 보안관제솔루션 시장과 Best Practice
    국내외 보안관제솔루션 시장과 Best Practice 황원섭, 차장 Security Presales, Micro Focus Korea Recorded: Jan 10 2018 60 mins
    빠르게 진화하는 사이버 위협에 대해 보다 신속·효율적인 보호와 대응을 위해서는 IT 인프라 전반에서 가시성을 확보하고, 보안 사고를 탐지·조사·대응할 수 있어야 합니다. 현재 국내외 다양한 통합로그 분석 및 보안관제 솔루션이 존재하며, 이를 보통 가트너에서 정의한 SIEM(Security Information and Event Management)이라는 명칭으로 불리우고 있습니다. 본 웨비나를 통해서 국내/외 대형 보안관제센터에서 사용 중인 솔루션의 특징 및 고려사항 등을 파악한 후, 향후 관련 솔루션 도입을 검토하신다면 많은 시행착오를 줄일 수 있을 것으로 생각됩니다.
  • Quality & Testing SIG Talk: Proven Practices
    Quality & Testing SIG Talk: Proven Practices Teri Sarallo Recorded: Jan 9 2018 61 mins
    We are excited to be hosting another Vivit SIG Talk [#VivitSIGTalk] event focused on Proven Practices around Quality & Testing for you. The live event is being held on 9 Jan 2018 at 12 PM ET, and a full session replay, along with individual session replays and slides presented will all be available.

    For this Vivit SIG Talk session, we will be featuring speakers from the United States, England and Australia. If you have been in the Quality & Testing space for any period of time, you will recognize each of these individuals as experts. We are fortunate enough to have them as speakers, so they can share their thoughts, and provide our members with some thought provoking and actionable content.
  • The Importance of EDR within an Endpoint Security Strategy
    The Importance of EDR within an Endpoint Security Strategy Fernando Montenegro of 451 Research and Erik Kristiansen of Tanium Recorded: Jan 9 2018 53 mins
    Identifying security incidents isn’t always easy. Properly scoping incidents can be difficult. And, most organizations admit they aren’t able to fully remediate every incident. On average, over 80% of organizations are concerned with their ability to address all three of the aforementioned tasks. Organizations struggle because they lack confidence in their endpoint data due to incomplete visibility, control, and accuracy.

    64% of organizations believe that a successful attack on endpoints is likely to recur and succeed again. This cycle is doomed to repeat over, and over, and over again. However, it's possible to break out of the re-compromise cycle for good. As the endpoint security landscape evolves, what role does EDR play?

    Join us for this webinar. Speakers will include:
    1.Fernando Montenegro (Sr. Analyst at 451 Research) will provide an EDR market overview and trends
    2.Erik Kristiansen (Sr. Director at Tanium) will explore the findings from a recent security survey
  • Cloud Service Management: Managing Cost, Resources, and Security
    Cloud Service Management: Managing Cost, Resources, and Security Hyoun Park Recorded: Dec 21 2017 40 mins
    Recommended Audience: CIOs, CFOs, Enterprise Architects, IT Project Managers, IT Procurement, IT Service, IT Finance

    This webinar provides key tips on the Cloud Service Management market, including the drivers, best practices and top vendors including, but not limited to:

    BMC TrueSight
    Cloudcheckr
    CloudHealth Technologies
    HPE OneSphere
    IBM Cloud Asset Management
    Microsoft Cloudyn
    RightScale Optima
    SoftwareOne Pyracloud

    Cloud Infrastructure-as-a-Service is growing rapidly as companies replace obsolete data center servers and storage with "The Cloud." As companies use more services from multiple regions and even multiple vendors, Cloud Computing becomes yet another management headache where discounts, service levels, and IT governance can go unenforced.
  • 万能なエンドポイントセキュリティを目指して
    万能なエンドポイントセキュリティを目指して Presenter: 株式会社シマンテック エバンジェリスト 髙岡 隆佳 / Moderator: (ISC)2 Director of Business Development, Japan小熊慶一郎 Recorded: Dec 20 2017 52 mins
    ~多様なモバイル環境と多角的な脅威に対応するために~

    昨今では高度な脅威は境界線をすり抜け、または公衆にさらされたモバイル環境から直接ユーザのエンドポイントを脅かし続けています。クラウドシフトや働き方改革により今まで以上にエンドポイントの保護が求められる中、多角的で高度な脅威からエンドポイントを包括的に保護するための最新の技術動向(機械分析・EDR・要塞化・詐称など)について解説いたします。
  • How to Stop All Impostor Threats Coming Into, and Going Out of Your Organization
    How to Stop All Impostor Threats Coming Into, and Going Out of Your Organization Ryan Terry, Product Marketing Manager and Ash Valeski, Sr. Manager Product Managemen Recorded: Dec 19 2017 56 mins
    The cost of Impostor email has risen to $5.1B. Business email compromise (BEC) is impacting employees, business partners and customers of organizations around the world.

    Proofpoint Email Fraud Defense (EFD) extends the security already offered by Email Protection to block criminals that spoof your trusted domains to trick victims, both inside and outside of your organization, into sending money and other sensitive information to the attacker.

    Join us for a live webinar on Tuesday, June 6th at 10am PST where you will learn:
    • Latest impostor email trends including BEC and consumer phishing
    • How to extend your current protection to stop all impostor threats
    • Upcoming product integration with Email Protection to secure your entire email ecosystem
  • How to Prepare for GDPR: A Gemalto Case Study
    How to Prepare for GDPR: A Gemalto Case Study Jean-Pierre Mistral, Director of Global Data Privacy and Alex Hanway, Encryption Product Marketing Recorded: Dec 18 2017 60 mins
    Join us for a new webinar in our series focused on helping companies prepare for the upcoming global government regulations, like European General Data Protection Regulation (GDPR). Data sovereignty, especially for cloud-first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.

    This webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our Director of Global Data Privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Alex Hanway, Product Marketing, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.

    Join us to hear more about:
    •What is GDPR?
    •Case Study: A look at how Gemalto has prepared for GDPR
    •The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations
  • How Cryptocurrencies are Changing the Face of Financial Services
    How Cryptocurrencies are Changing the Face of Financial Services Eric Larchevêque, CEO at Ledger and Joe Pindar, CTO Office Director of Strategy Recorded: Dec 15 2017 61 mins
    Joint webinar with Ledger and Gemalto discussing how cyrptocurrencies have the potential to revolutionize the financial industry and what needs to be done to secure the digital assets.
  • Developing an Insights-Driven Approach for Exceptional Digital Experiences
    Developing an Insights-Driven Approach for Exceptional Digital Experiences Bryan Whitmarsh, Director, Product Management at CA Technologies Recorded: Dec 14 2017 55 mins
    Providing a great digital experience is critical for your brand, but the complexity of monitoring modern apps presents a challenge. When you combine a mix of mobile and Web applications, containers and microservices in distributed environments, identifying when and why your customers are having a poor app experience is often difficult.

    Join us for this webinar where Bryan Whitmarsh, Director, Product Management at CA Technologies will demonstrate how you can achieve a 5-star app experience for your customers. See how CA App Experience Analytics leverages a powerful, open source analytics platform to provide user experience insights and deep visibility into performance across apps and channels.
  • Symantec Monthly Threat Briefing - 2017 in review, 2018 ahead
    Symantec Monthly Threat Briefing - 2017 in review, 2018 ahead Jeff Barto and Angelique Pereira, Trust Strategists at Symantec Recorded: Dec 14 2017 42 mins
    As we wrap up another year, let's take a moment to discuss what 2017 brought to the industry, and what we should expect to see next year.
  • Filling the GDPR Compliance Gap
    Filling the GDPR Compliance Gap Adenike Cosgrove, Sr. Product Marketing Manager, Proofpoint Recorded: Dec 14 2017 30 mins
    Join this session to discuss: How your organization can drive towards compliance, how to embed "privacy by design" to your development lifecycles, and how to protect all identified EU personal data and prevent data breaches.
  • Healthcare Orgs: Empower Your Mobile Workforce Without Sacrificing Data Security
    Healthcare Orgs: Empower Your Mobile Workforce Without Sacrificing Data Security Hussein Syed, RWJBarnabas Health; Alex Fry, Strong Crypto Innovations LLC; Mike Schuricht, Bitglass Recorded: Dec 13 2017 57 mins
    Mobile computing and the use of cloud applications are touted as ways to help healthcare providers deliver better patient care. Clinicians carrying tablets or other devices to exam rooms and patients’ bedsides can quickly access and update patient data and other vital resources necessary for accurate and expeditious treatment.

    No one disputes the value of “anytime, anywhere” computing in healthcare – indeed, in other industries as well – but there is a concern about the risk associated with access to sensitive and regulated data via unmanaged devices and unsanctioned cloud applications.

    In this CISO panel discussion moderated by Hussein Syed, CISO at RWJBarnabas Health and joined by panelists Alex Fry, Principal Security Consultant at Strong Crypto Innovations LLC and Mike Schuricht, VP of Product Management, Bitglass, you’ll learn about real-world approaches to some of the most vexing challenges of mobile and cloud computing.
  • Healthcare Holiday Tales
    Healthcare Holiday Tales DataMotion Recorded: Dec 13 2017 6 mins
    A fun healthcare twist on a holiday tale reading. For anyone who has received health care from multiple providers, and all those working in the healthcare or technology industries. Happy holidays!
  • How today’s threats prey on the human factor | 2017 Human Factor Report
    How today’s threats prey on the human factor | 2017 Human Factor Report Patrick Wheeler, Director, Threat Intelligence, Proofpoint Recorded: Dec 13 2017 48 mins
    Ransomware. Business email compromise (BEC). Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure.

    In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it.

    Register now to learn about:
    •The latest social engineering targeting trends and techniques
    •Top email fraud tactics, including business email compromise (BEC) and social media account phishing
    •The rise of fraudulent mobile apps and how criminals target users on the go
  • Endpoint Security for Cloud Generation & New Integrations Extend Data Protection
    Endpoint Security for Cloud Generation & New Integrations Extend Data Protection Sam Tong, Senior Principal Systems Engineer, Symantec; Moderator: S.C. Leung, Member, Asia-Pacific Advisory Council, (ISC)² Recorded: Dec 13 2017 64 mins
    First in the Industry to deliver Deception, Mobile Threat Defense, and Endpoint Detection and Response (EDR) in a Single-Agent Architecture. Join us to learn the latest Evolution of Endpoint Security & Data Protection:

    •Defend against ransomware with multi-layered protection
    •Gain enhanced visibility into suspicious files via tunable protection to make better policy decisions
    •Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
    •Extend advanced security to mobile devices
    •Use deception techniques to expose hidden adversaries and determine their intent to improve security posture
    •Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications

    New Integrations Extend Data Protection Beyond Traditional DLP

    Powered by the industry’s leading data loss prevention technology, to give you greater visibility and control over your confidential data.

    •Expanded Information Centric (ICE) Encryption integration
    •Enhanced data classification integration
    •Sensitive Image Recognition
    •Stronger endpoint controls
    •Enhanced data at rest discovery
    •Improved cloud app policy and incident management
    •Flexibility on cloud deployment
    •And More …

    Join Symantec and (ISC)² on Dec 13 at 14:00 (Hong Kong time) and learn about the latest Evolution of Endpoint Security & Data Protection.

    This webinar will be conducted in Cantonese.
  • Protect your SAP system with improved governance of exchange rate & market data
    Protect your SAP system with improved governance of exchange rate & market data Dirk Neumann, Co-Founder, BRISKEN LLC Recorded: Dec 13 2017 60 mins
    What You'll Learn

    The increasingly disparate market data universe can lead to errors and inconsistencies in your exchange rates and market data — issues that can cause significant problems once the market data is loaded into your SAP system. So how do you prevent these problems? How do you ensure the accuracy of this data before it enters your system landscape? SAP customers can reduce these risks by using automated market data governance with data validation and anomaly detection, and by implementing a central market data repository to avoid reporting and consolidation issues.

    Attend this webinar and find out how to easily source market data — including foreign exchange rates, interest rates, security prices, and volatilities — from multiple providers, such as Reuters, Bloomberg, and OANDA, without any programming, and then distribute that data across your entire system landscape, including both SAP and non-SAP systems, on an automated schedule. You will learn how to:

    • Set up a trusted central market data repository
    • Govern your data processes
    • Detect data anomalies
    • Perform a quality check on your exchange rate and market data before committing it to your system
    • Personalize the way you source your market data and map it into your system landscape
  • Natural Language Processing Exposed: The Art, the Science and the Applications
    Natural Language Processing Exposed: The Art, the Science and the Applications Sid J Reddy, Chief Scientist, Conversica Recorded: Dec 12 2017 62 mins
    In this presentation, we will discuss several applications of NLP such as information extraction, knowledge synthesis, and entity retrieval. We will discuss how these fundamental set of algorithms are applicable for a wide array of use-cases and industry verticals such as healthcare, business intelligence, life sciences, legal, e-commerce, sales, and marketing.

    Additionally, case studies from these areas will be used to provide an intuitive explanation of complex NLP topics such as distributional semantics, computational linguistics, question-answering, conversational AI, and applications of deep learning to text data.

    Dr. Sid J. Reddy's Bio: https://www.conversica.com/sid-j-reddy/
  • Shift Left: How testing early and often is best for the business and customer
    Shift Left: How testing early and often is best for the business and customer Nancy Gohring 451 Research and Steve Feloney CA Technologies Recorded: Dec 12 2017 50 mins
    Organizations in most any industry are feeling increasing pressure to move fast. But at what cost? Some have learned the hard way that skipping crucial processes, like testing, damages performance and impacts customer sentiments on your brand. In this case, the fast time to market becomes meaningless.

    Smart businesses are adapting to a shift left strategy. These teams are learning how to incorporate testing early and often in the release cycle, supporting business requirements to move fast while ensuring high-performing products and quality. But getting there isn’t easy. In this webinar, we’ll cover:

    •Testing tools: tool choice is important. Not all tools have been designed to support this new paradigm.
    •Integrations: to be effective, testing tools must integrate easily with the tools and processes modern teams use, including CI/CD and APM products. Further, these tools must be very easy to use, specifically for developers.
    •Organizational models: shifting left requires changes to traditional organizations and culture. We’ll share insight into the successful models we’ve seen.
  • Quality & Testing SIG Talk Introduction
    Quality & Testing SIG Talk Introduction Richard Bishop, Todd DeCapual, Chris Trimper Recorded: Dec 12 2017 68 mins
    Vivit launches their first ever SIG Talk event with three speakers who will give you insights into StormRunner Functional, Dynamic data handling in performance tests as well as AI and machine learning as it applies to testing.

    We will discuss:

    How StormRunner Functional is the latest functional test offering from Micro Focus. In this session, Chris Trimper, an early adopter and beta tester, will share his experiences with this new product

    How Virtual Table Server (VTS), in days of Mercury Interactive, was the often-overlooked repository for dynamically updated real-time test data. Even after a revamp and relaunch in 2014, many people still don't use it, but they should. Richard's VTS demo will help you to get value from this great add-on for LoadRunner and Performance Center

    How Big Data, Artificial Intelligence and Machine learning are rapidly impacting businesses and customers, enabling another massive shift through technology enablement. In this session, Todd DeCapua will share how these capabilities are being leveraged in Performance Engineering now, and into the future.
  • Building a Fast, Scalable & Accurate NLP Pipeline on Apache Spark
    Building a Fast, Scalable & Accurate NLP Pipeline on Apache Spark David Talby, CTO, Pacific AI Recorded: Dec 12 2017 62 mins
    Natural language processing is a key component in many data science systems that must understand or reason about text. Common use cases include question answering, paraphrasing or summarization, sentiment analysis, natural language BI, language modeling, and disambiguation. Building such systems usually requires combining three types of software libraries: NLP annotation frameworks, machine learning frameworks, and deep learning frameworks.

    This talk introduces the NLP library for Apache Spark. It natively extends the Spark ML pipeline API's which enabling zero-copy, distributed, combined NLP & ML pipelines, which leverage all of Spark's built-in optimizations.

    The library implements core NLP algorithms including lemmatization, part of speech tagging, dependency parsing, named entity recognition, spell checking and sentiment detection. The talk will demonstrate using these algorithms to build commonly used pipelines, using PySpark on notebooks that will be made publicly available after the talk.

    David Talby has over a decade of experience building real-world machine learning, data mining, and NLP systems. He’s a member of the core team that built and open sourced the Spark NLP library.
  • Behind the scenes of Allianz Group's Continuous Peer-to-Peer Feedback Program
    Behind the scenes of Allianz Group's Continuous Peer-to-Peer Feedback Program Eduard Kaussner, VP Business Development EMEA & MEE, SAP SE / Goran Rice, Head of Customer Success, Semos Cloud Recorded: Dec 12 2017 51 mins
    What You'll Learn

    Allianz Group has drastically improved its internal feedback culture among employees. Learn how Allianz used the Feed-bck app, built native on SAP Cloud Platform, to improve the engagement and insights of its employees and introduce the latest trend of continuous, peer-to-peer evaluations to employees during their day-to-day work.

    During this webinar you will explore:

    • Allianz use cases, its experience working on the SAP Cloud Platform, and how the company improved the feedback culture

    • How your employees can instantly ask for feedback when they require it the most, shortening the overall feedback cycle

    • How to achieve and measure impact on your continuous feedback processes

    • A rating system and dashboards that can provide an objective measure that provides insight into how effective and trusted the feedback of your leaders is to your employees, helping to identify the influencers and true leaders of your organization
  • Digital Transformation Through Automation
    Digital Transformation Through Automation Carl Lehmann, 451 Research | Ryan Bazler, Kofax Recorded: Dec 7 2017 60 mins
    Organizations across the globe are engaged in what some consider to be another IT buzzword – Digital Transformation. Many though take it seriously, as concerted means to optimize customer experiences, improve business efficiencies, and capitalize on new market opportunities.

    In this webinar Carl Lehmann, Principal Analyst at 451 Research will discuss how industry leading enterprises pursue digital transformation from both business and technical perspectives by:

    •Describing digital transformation and how it is used to create competitive advantage
    •Discussing why and how enterprises are pursuing such initiatives
    •Identifying the critical technology needed for execution
    •Revealing how digital automation platforms improve and enable new ways of doing business
    Attendees will learn how to define and structure digital transformation initiatives unique to their firms and how best to make use of digital automation platforms for IT and business transformation.
  • 85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
    85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed? Andrew Hoog (Founder) // Brian Reed (Chief Mobility Officer) Jan 23 2018 7:00 pm UTC 60 mins
    NowSecure continuously monitors millions of mobile apps in third-party apps in the Apple® App Store® and the Google Play™ store for security, compliance and privacy risks.

    A comprehensive analysis of iOS and Android apps found that a staggering 85% of those apps fail one or more of the OWASP Mobile Top 10 criteria. Given that the average mobile device has over 89 mobile apps on it, what are the odds your employees have one or more of the apps and what’s the real risk to your business?

    During this webinar, renowned mobile security expert and NowSecure founder Andrew Hoog and Chief Mobility Officer Brian Reed will review the massive data set, detail the areas of exposure and review mitigation recommendations.

    Mobile apps power productivity in the modern business; don’t let a few bad apps bring it down.

    Note: Live attendees will be entered to win a free mobile app security assessment!
  • Minimize Cyber Exposure in a World of Cloud, Containers and Other Modern Assets
    Minimize Cyber Exposure in a World of Cloud, Containers and Other Modern Assets Robert Healey, Senior Director Marketing, APAC, Tenable Network Security Jan 24 2018 6:00 am UTC 60 mins
    As organizations embrace cloud infrastructure, DevOps methodologies, PAAS, IoT and mobile workforce, there are new risks coming from a broader attack surface. Vulnerability management designed for traditional assets is not enough. To improve security, you need to rethink how you do things. For example, containers have become the de facto standard in cloud architectures today, which means that security needs to move into developers’ build processes while complementing existing solutions.

    Attend this webinar to discover:
    •Where vulnerability management for today’s assets needs to start
    •What the new faces of attacks and remediation look like
    •Why prioritization should not be based on scan results
    •Why reports using Excel are no longer the answer
    •How DevOps can be part of the solution to incorporate security

    Join Tenable and (ISC)² on Jan 24, 2018 (Wed) at 14:00 (Singapore time) to learn how to minimize cyber exposure in a world of cloud, containers and other modern assets.

    Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
    Moderator: Clayton Jones, Regional Managing Director, APAC, (ISC)²
  • Show Me the Mandates! How to Interpret PSD2 RTS SCA / GDPR / 3DS 2.0
    Show Me the Mandates! How to Interpret PSD2 RTS SCA / GDPR / 3DS 2.0 CA Technologies Payment Security gurus, Product Management Advisor Jayakuma & Presales Director Matt Berryman Jan 25 2018 4:00 pm UTC 60 mins
    Recently, there have been several payment industry initiatives designed to make electronic payments safer. Consequently, financial entities like merchants, PSPs, and consumers will soon face many changes. Although the initiatives’ premise − to eliminate vulnerabilities in the payments cycle − is welcome; businesses must now prepare to comply. Are you ready?

    Join our CA Technologies Payment Security gurus, Product Management Advisor Jayakumar Krishnasamy and Presales Director Matt Berryman to find out:
    • How to interpret the recent payment initiatives
    • If risk-based authentication satisfies mandates
    • Which strong authentication methods are compliant
  • Symantec Monthly Threat Briefing - January 2018 update
    Symantec Monthly Threat Briefing - January 2018 update Jeff Barto and Angelique Pereira, Trust Strategists at DigiCert Jan 25 2018 4:00 pm UTC 60 mins
    Hear the latest on the current website security threats for January 2018 from DigiCert - formerly Symantec Website Security.
  • Cyber security Skills Gap: How modern attack vectors affect the cyber workforce
    Cyber security Skills Gap: How modern attack vectors affect the cyber workforce Regine Bonneau Jan 25 2018 4:30 pm UTC 60 mins
    Cybersecurity Skills Are in High Demand, Yet in Short Supply. The growing number of recent cybersecurity attacks highlights a shortage of skilled workforce in the cybersecurity industry, predicted to reach around 1.8 million workers by 2022. These challenges will also be impacted by evolution of IoT/ IoE and Artificial intelligence, which represents an unprecedented opportunity to connect people, processes, data, and things.


    Key Takeaways include:

    - Is Automation an answer to the skill gap?

    - Maintaining security in the face of growing cyber risks and threats

    - How the arrival of AI & IoT in both our personal and business lives will create a skills gap that will require both the retooling of people’s existing skillsets and the wide-scale hiring of new workers
  • How to prepare for the 2018 cyber threats
    How to prepare for the 2018 cyber threats Davide Canali, Senior Threat Analyst and Adenike Cosgrove, Cybersecurity Strategist Jan 30 2018 10:00 am UTC 60 mins
    DON'T FALL PREY TO SOPHISTICATED CYBER ATTACKS IN 2018

    Join Davide Canali, Senior Threat Analyst and Adenike Cosgrove, Cybersecurity Strategist, on Tuesday, 30th Jan at 10 AM GMT for our yearly webinar, “How to Prepare for the 2018 Cyber Threats.” This live event will cover:

    - Predictions for the 2018 threat landscape with a special focus on EMEA
    - Key actions you can take to prepare your organisation
    - Top resources to help support your security efforts
  • Developing Ethical IT in Your Organization
    Developing Ethical IT in Your Organization Hyoun Park Jan 30 2018 6:00 pm UTC 45 mins
    With AI, personal data, & business ethics all in ascendence, the need for ethical IT policies has never been greater. Otherwise, companies risk building services and products that fall short of the ethics and trust that they have been given by employees.

    In this webinar, Amalgam Insights explores how AI threatens ethical IT and provides guidance based on other rules-based frameworks that derive business outcomes, such as the law and corporate legislation.
  • SaaS-ify and Monetize your Products
    SaaS-ify and Monetize your Products Miles Betro - Orbitera Solutions Architect Jan 30 2018 7:00 pm UTC 60 mins
    Join this webcast with Miles Betro, Solutions Architect at Orbitera, to learn about:

    - Distributing products as easy-to-buy SaaS offerings
    - Profit maximizing strategies for cloud-hosted products
    - Tracking cloud input costs and revenue for margin management
    - Understanding consumption, subscription, and hybrid pricing models

    In addition, we will deliver a live demo of a multi-cloud marketplace working together with cloud billing tools. We will also answer live questions from the webinar audience.
  • The OWASP Top 10 2017 - Let's Cut to The Chase
    The OWASP Top 10 2017 - Let's Cut to The Chase Kevin Poniatowski and Mark Burnett Feb 7 2018 7:00 pm UTC 60 mins
    What Do You REALLY Need to Know About the New OWASP Top Ten?

    The OWASP Top Ten is the de-facto web application security standard because it reflects the evolving threat landscape, providing organizations a framework to manage and mitigate application security risk.

    This dual-presenter format will examine the critical newcomers and pesky incumbents from both an offensive and defensive perspective. Attend to get our expert insight on how to harden Web applications and align your program towards OWASP compliance.


    Topics covered include:

    - The newcomers – why they are so tricky and elude traditional test efforts
    - XSS and Injection – mistakes organizations keep making that land these preventable threats on every Top Ten list
    - Design flaws that cause them and coding errors that expose them
    - High impact activities that reduce exploitability, prevalence and impact

    Meet the Presenters:

    Kevin Poniatowski, Sr. Security Instructor & Engineer at Security Innovation, brings an optimal blend of speaking ability, technical savvy, and an insatiable passion for security to Security Innovation's training customers. Kevin entered the application security field in 2007 with Security Innovation, where he has split time between application security course development and delivering instructor-led courses.

    Mark Burnett is a security consultant, author, and researcher who specializes in application security, authentication, and hardening Microsoft Windows-based servers and networks. Since 1999 he has worked in numerous areas of IT security, developing unique strategies and techniques for protecting critical assets. Mark is author and coauthor of a number of security books and publishes security articles for several web sites, newsletters, and magazines.
  • Advanced Access Management for the Modern Enterprise
    Advanced Access Management for the Modern Enterprise Carol Alexander, Senior Director, Security Products , CA Technologies Feb 8 2018 6:00 pm UTC 60 mins
    It’s a dilemma. Today, security must be built into mobile applications to fight rampant online fraud, but many App Developers don't have the necessary skill set … nor the time required to become proficient coders. What is the answer?

    Join Carol Alexander, Senior Director, Security Products at CA Technologies, to learn how to quickly build and maintain modern, frictionless, and secure apps for your customers. It’s true. With CA Rapid App Security, developers can easily and rapidly:
    • Integrate device security and multifactor and risk-based authentication into apps
    • Eliminate dozens of complex steps, typically required for coding user and device security

    Let your developers focus on mobile applications requirements, while your business delivers a trusted user experience.
  • Storage Performance Benchmarking: Workloads
    Storage Performance Benchmarking: Workloads Mark Rogov, Dell EMC, Chris Conniff, Dell EMC, Tim Lustig, Mellanox Feb 14 2018 6:00 pm UTC 75 mins
    Benchmarking storage performance is both an art and a science. In this 5th installment of the SNIA Ethernet Storage Forum’s “Storage Performance Benchmarking” series, our experts take on optimizing performance for various workloads. Attendees will gain an understanding of workload profiles and their characteristics for common Independent Software Vendor (ISV) applications and learn how to identify application workloads based on I/O profiles to better understand the implications on storage architectures and design patterns. This webcast will cover:
    •An introduction to benchmarking storage performance of workloads
    •Workload characteristics
    •Common Workloads (OLTP, OLAP, VMware, etc.)
    •Graph fun!

    Spend Valentine’s Day with us. We think you’ll “love” this webcast!
  • Next-Gen Directory Services: How CIAM and IoT Drive Security & Performance
    Next-Gen Directory Services: How CIAM and IoT Drive Security & Performance CA Technologies: Clayton Donley, SVP Software Engineering, Security & Rob Lindberg, Sr Principal Product Mngr, CA Directory Feb 15 2018 6:00 pm UTC 60 mins
    The reality is that Consumer Identity and Access Management and the Internet of Things are fostering unprecedented change. The scale and types of devices and digital identities are increasing at a significant pace, driving huge security and performance concerns. These concerns have many companies asking:

    • How are potential risks being monitored and secured?
    • How are users and devices being managed?
    • How are directory services being configured?

    Learn to address these challenges, while shaping a more secure and cost-effective infrastructure.

    Join CA Technologies gurus Clayton Donley, SVP, Software Engineering, Security and Rob Lindberg, Sr Principal Product Manager, CA Directory to explore alternatives and recommendations. You'll also be able to compare performance results of leading next-gen directory services, tested and compiled by an independent, third-party.
  • IT Cost Control: Five Warning Signs that Fast Growing Companies Are Overwhelmed
    IT Cost Control: Five Warning Signs that Fast Growing Companies Are Overwhelmed Hyoun Park and Valicom Feb 22 2018 5:00 pm UTC 60 mins
    Recommended Audience: CFOs, CIOs, IT Directors, Network Directors, Telecom Directors, Mobility Directors, Enterprise Architects, Procurement Directors

    Recommended Company Size: $10 million to $1 billion in annual revenue or companies growing more than 100% year-over-year.

    Summary: It's easy to lose control of IT costs when companies grow quickly. Those that lose track of IT costs will give up valuable funds that could be used to hire talent or acquire key assets.

    In this webinar, Amalgam CEO and Principal Analyst Hyoun Park and Telecom Expense Management vendor Valicom explore 5 big warning signs that company IT spend is going off the rails and then how to fix these issues via either a software, back office support, or managed services solution.

    This Amalgam Insights webinar is generously sponsored by Valicom
  • Outsourcing Core IT When You Are Core IT
    Outsourcing Core IT When You Are Core IT Hyoun Park Feb 27 2018 6:00 pm UTC 45 mins
    How do you know if you are outsourceable? And how can you guide the outsourcing without simply being replaced?

    This webinar takes the analyst's experiences in IT, examples from current IT organizations and managed mobility service providers, and key trends in the IT world to show when and how to identify IT jobs ripe for outsourcing and how to position yourself to take advantage of the outsourcing rather than simply be replaced.
  • GDPR & Privileged Access Management … Are You Ready?
    GDPR & Privileged Access Management … Are You Ready? Cullen Lemley, Cybersecurity Consultant at CA Technologies Mar 1 2018 6:00 pm UTC 60 mins
    May, 25 2018. It’s a date that is approaching quickly. It’s also the deadline for GDPR compliance. For companies that fail to comply, the cost can be high - as much as 4% of annual turnover.

    Note: There is a misconception is that the regulation affects only companies in the European Union. In fact, it applies to any company that has dealings or plans to have dealings with citizens that reside in the EU.

    Take the lead and get ready to initiate GDPR. Join Cullen Lemley, Cybersecurity Consultant at CA Technologies, for an overview of the impending regulations. Learn the important security facets of GDPR, the challenges for Privileged Access Management, and how businesses around the globe are preparing for the deadline.
  • A new era of mobile threats demands a new form of defense
    A new era of mobile threats demands a new form of defense Oragne Business Services & Check Point Mar 7 2018 9:30 am UTC 30 mins
    Mobile devices are now considered to be one of the weakest links in the IT infrastructure of most enterprises. While the cost of a mobile breach is similar to that of a desktop or laptop breach, an astounding number of enterprises are still lacking next generation protection, leaving themselves at high risk of attack.

    Orange Business Services has teamed with Check Point to lay down the hard facts surrounding the mobile threat landscape based on insight from current research and an extensive global vision of the market. The webinar will deliver practical advice surrounding common myths and offer a simple methodology approach which can be applied across the business.

    Join this short webinar to understand:
    •Why 100% of enterprises are at risk of attack
    •What next generation of mobile cyber attacks look like
    •What steps enterprises can take to protect themselves
  • Threat Intelligence – Hype or Hope?
    Threat Intelligence – Hype or Hope? Mark McGovern, Vice President, Product Management, CA Technologies Mar 8 2018 6:00 pm UTC 60 mins
    As threats and attacks become more frequent, the alerts and alarms to be investigated become more unmanageable. Plus, by the time the warnings are checked, the damage may already be done. We need a new paradigm that moves the enterprise from reactive to predictive. Can user behavior analytics and machine learning deliver the threat intelligence that is needed, and if so, how do we start to use it?

    Join Mark McGovern, Vice President, Product Management, CA Technologies as he takes a closer look at threat intelligence and its unique capabilities. The session will uncover the:

    • Challenges and benefits of collecting the data needed to detect threats
    • Immediate value and risks posed by a shared threat intelligence model
    • Advantages of applying advanced machine learning to specific problems

    Whether you are new to cybersecurity or an experienced professional, threat intelligence should be on your “need to know” security agenda.
  • Architecting an Open Source Data Science Platform: 2018 Edition
    Architecting an Open Source Data Science Platform: 2018 Edition David Talby, CTO, Pacific AI Oct 23 2018 5:00 pm UTC 60 mins
    Join David Talby of Pacific AI as he updates the best practices and techniques for building an open source data science platform.