Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • How to Successfully Plan and Implement your Digital Transformation Journey How to Successfully Plan and Implement your Digital Transformation Journey Paulo Rosado, CEO, OutSystems & Customer Panel Recorded: Dec 1 2016 56 mins
    Digital transformation is moving at lightning speed. From a global enterprise software perspective, the use of rapid application development, continuous integration, and standards-based code and tech stacks is growing - your organization can’t afford to miss the boat.

    Join OutSystems CEO Paulo Rosado and a panel of experts as they dish out best practices for planning, launching and expanding your digital transformation journey without crashes or failures.
  • The Six W's Webinar: Why Mobility Management is becoming more of an essential? The Six W's Webinar: Why Mobility Management is becoming more of an essential? Dan Dearing, Senior Director of Product and Solutions Marketing Recorded: Dec 1 2016 27 mins
    Welcome to Pulse Secure’s webinar series on The Six W’s of Pulse Secure! We will take you through the journey on the perfect formula for staying contemporary in the vast evolving world of Hybrid IT.

    The fifth webinar in our series will lead you through Pulse Workspace, our app-agnostic container solution, allowing employees to enjoy the true native user experience of their preferred mobile device for both work and life.
  • The Big Challenge of Big Data: Untangling the Security Conundrum The Big Challenge of Big Data: Untangling the Security Conundrum Alex Hanway, Marketing Manager for Encryption at Gemalto Recorded: Dec 1 2016 39 mins
    Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they break many of the traditional security approaches and spark questions like:

    With massive volumes of data, how are organizations going to ensure that their customer information is safe from people looking to exploit it?

    Is it possible to adopt big data technologies while demonstrating compliance with industry regulations?

    Will security get in the way of the analytics tools?

    How can security apply to different data consumption technologies like Hadoop and NOSQL?

    Join Gemalto on Thursday, December 1, 2016 as we discuss what’s in store for the ‘big data’ technologies of the future and how security models like encryption can solve the security conundrum.
  • Exploring Mobile VR: Insights and Strategy Exploring Mobile VR: Insights and Strategy David Mullett, Virtual Reality Content Innovator, Virtualize: david@virtualizevr.com Recorded: Nov 30 2016 36 mins
    Mobile VR is going to be far and away the largest market for virtual reality in both the immediate term and as the VR market expands. This is where VR is going to come in and disrupt entrenched competition in the digital landscape. Currently less than 1% of PCs worldwide are powerful enough to run the Oculus Rift or HTC Vive, so producing VR for low end hardware specs on Mobile VR is going to be the best strategy for accessing large numbers of consumers. 5G and expanding wifi is going to explode current bandwidth limitations and be the backbone for next generation Mobile VR experiences. Together with the new WebVR format, 5G and Mobile VR will be the place to build your disruptive VR application and open up a whole new realm of solution, acquisition, and engagement. Through social VR, sharing, avatars, and solutions-based VR, Mobile VR is going to be the brand of VR that changes the world. What can you build in VR that has the same value, or more value, than non-VR applications?
  • VR The Future of the Creative World VR The Future of the Creative World Ryan A Bell, Head of Studio, VRScout & Rob Crasco: VR Influencer/Entrepreneur Recorded: Nov 30 2016 49 mins
    Will Virtual Reality connect us to the world or separate us?

    Join world creator Rob Crasco and speaker Ryan A Bell for a special live discussion on immersive media, tipping points and the future of creating. In this session you’ll learn how to get started in VR, the mentality of the future creator, building worlds and, of course, what will happen in the future.
  • Location-based Virtual Reality: Opportunities for Experiential Storyliving Location-based Virtual Reality: Opportunities for Experiential Storyliving Maren Demant, Immersive Experience Designer Recorded: Nov 30 2016 27 mins
    The webinar will tackle the possibilities for brand communication with location-based Virtual Reality experiences. VR lets the consumer not just step inside the brands world but also feel, smell and touch. The presentation gives insights on VR theory with a focus on marketing and
    an overview on currents state of the technology.
  • 特権アカウント乗っ取り事件の事例とその真相 特権アカウント乗っ取り事件の事例とその真相 Naohiko Yamanouchi 山之内 真彦, マーケティングマネージャー、APJ, CyberArk Software Recorded: Nov 30 2016 62 mins
    ~ ウクライナの電力会社とバングラデッシュ中央銀行はどのように攻撃されたか ~



  • Understanding Strategies for VR/AR in Business – Methods and Cases Understanding Strategies for VR/AR in Business – Methods and Cases Prof. Mark Skilton, Warwick Business School & Strategic Leader in Digital Strategy, enzen Recorded: Nov 29 2016 49 mins
    The session will explore how this rapidly developing area of VR / AR / Mixed Reality and its position and convergence in the areas of advanced Customer Experience, Digital Asset Management and new A.I. led augmentation strategies starting to transform processes and experience.

    We introduce a novel approach to framing digital spaces and how to measure Augmented impact on performance metrics and then explore how this is further developing into A.I. Intelligent spaces and what this may mean for Business Operating Models and future work automation design in what is described as Intelligent Business Strategy.

    We include a few actual cases studies of how Cyber-physical systems driving “Digital Twins” are extending across processes and changing supply chain feedback and interaction for smart energy, smart design and new knowledge capabilities.
  • Hacking the Brain: Unlocking the power of NeuroVR Hacking the Brain: Unlocking the power of NeuroVR Luciana Carvalho Se, Chief Evangelist, Racefully & Founder SE3 Solutions Recorded: Nov 29 2016 48 mins
    Can immersive reality actually help us better understand each other? Understand ourselves? How does human cognitive processing change, or become enhanced, once VR and AR are added to the mix?

    What does that mean for our (future) sense of self? What is the impact of literally ‘putting oneself in somebody else’s shoes’ and what that means for human empathy?

    Exploring recent findings on the treatment of phobias, PTSD and mental health issues using VR, and theories around the virtual-physical illusion of presence, this webinar asks how neuroscience has been affected and/or advanced by the development of immersive tech.
  • The Business of Virtual Reality The Business of Virtual Reality Ed Greig, Chief Disruptor, Deloitte Digital Recorded: Nov 29 2016 48 mins
    Ed Greig will be talking about how Deloitte Digital is working with clients using virtual and augmented realities today, as well as describing how these technologies are being adopted more broadly across industries.

    He will also describe how to assess and work with new technology so that your organisation can get the most out of it before your competitors do.
  • Fighting the Next Generation of Targeted BEC Attacks Fighting the Next Generation of Targeted BEC Attacks Adenike Cosgrove, Sr. Product Marketing Mgr, Email Fraud Defense & Richard Davis, Field Product & Solutions Mgr, Proofpoint Recorded: Nov 24 2016 51 mins
    Highly-targeted, low volume spear phishing--or business email compromise (BEC)--attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organisations face today. This is not news.

    But what may come as a surprise is that the vast majority of BEC attacks are preventable. According to Gartner, Secure Email Gateways are struggling to address social engineering attacks with no payload. But things are changing. New technology can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.

    In this webinar, you’ll learn:

    - Why email spoofing works
    - What the current BEC trends and attack methods are
    - How Proofpoint’s new Email Fraud Defense solution can identify and block BEC attacks before they hit the inbox
  • Create Customer-first Experience with Next-generation Contact Centers Create Customer-first Experience with Next-generation Contact Centers Andrew Milroy, Sr. Vc President, Frost & Sullivan and Ankush Gangwani,Director,Global Product Management, TATA Communications Recorded: Nov 23 2016 60 mins
    Why You Must Attend:
    • Discover why digital transformation is at the heart of customer experience
    • Learn about next-generation intelligent contact centers incorporating Artificial Intelligence (AI) and leveraging the power of SMAC
    • See how digitalization is driving the 4Cs of global contact centers: consistent customer experience, customer segmentation, consolidation and control
    • Follow customer use cases, which demonstrate the benefits of Tata Communications’ hosted contact centers
  • The 2016 Malware Awards The 2016 Malware Awards Tyler Moffitt | Senior Threat Research Analyst Recorded: Nov 22 2016 48 mins
    This webinar will provide expert insights on the latest cybercriminal activity and recognize the year's most innovative, dangerous, and pervasive malware. Specifically, we will be covering the latest developments and providing updates on Angler, Neutrino, CryptXXX, TeslaCrypt, Locky, Cerber, CryptoMix, and RaaS. Come learn about these developments and strategies to help secure your organization from ransomware and next-generation cyberthreats.
  • Performance Engineering Solution Overview Performance Engineering Solution Overview Paul Shovlin Recorded: Nov 22 2016 50 mins
    This unique and fresh webinar will take a look at the process foundation of Performance Engineering and various solution blueprints organizations are using at each step of the process to deliver effective Performance Engineering. We’ll take a look at blueprints from HPE, CA, IBM, Micro Focus, Open Source, etc. We’ll also discuss Agile solutions. You may be surprised to discover how well these solutions may work together and you may already have them in-house. We’ll also show example blueprints some larger organizations are using. We are looking forward to this collaborative webinar. We hope you will join us.
  • The Intersection of IoT and Payments: An Emerging Commerce Opportunity The Intersection of IoT and Payments: An Emerging Commerce Opportunity Jordan McKee, Christian Renaud Recorded: Nov 17 2016 64 mins
    Join 451 Research to learn how IoT and connectivity are shifting user behavior and payment vendors' offerings, and will ultimately make transactions far more integrated while far less visible to consumers and enterprises. In this webinar we’ll examine previous attempts at integrated commerce, discuss what worked and what didn't, and detail the drivers underpinning the next frontier of commerce. Throughout the discussion, 451 will leverage recent insights from its Voice of the Connected User Landscape and Voice of the Enterprise: IoT surveys to paint a 360 degree picture of the key opportunities rapidly emerging at the intersection of IoT and payments.
  • Mind Your Business: Why Privacy Matters to the Successful Enterprise Mind Your Business: Why Privacy Matters to the Successful Enterprise Dr. Robin Bloor,The Bloor Group; Jay Irwin, Teradata Center; Carole Murphy, HPE Security - Data Security Recorded: Nov 17 2016 67 mins
    There's no such thing as bad publicity? In the era of data breaches, that's not really true. Time and again in recent years, the mighty have fallen. And as sensitive data reaches the hands of bad guys the world over, so go the fates of customers and companies alike. That's why security is the fastest growing sector of enterprise IT today, with privacy issues front and center.

    Register for this episode of The Briefing Room to hear veteran Analyst Dr. Robin Bloor explain why companies need to pay serious attention to the ever-growing importance of privacy, not just security. He'll be briefed by Jay Irwin of Teradata and Carole Murphy of HPE Security, who will demonstrate how their technologies can be combined to create a robust privacy infrastructure that allows organizations to avoid data breaches, or at least keep the data encrypted, thus avoiding the damage of a breach.
  • Anatomy of a Mobile Hack Attempt Anatomy of a Mobile Hack Attempt Scott King, Director of Marketing, Zimperium Recorded: Nov 17 2016 10 mins
    Join this presentation and experience what a mobile attack looks like from the viewpoint of the victim. Get insight into the complete process of a man-in-the-middle Wi-Fi attack.

    This talk will cover a specific attack which took place at Dallas Fort Worth International Airport on AT&T Wi-Fi while a business traveler was waiting in terminal A for his flight. The presentation will examine details of the attack, including how the wireless carrier rerouted the user's personal wireless traffic from an LTE network to Wi-Fi. You will see exactly what the user experienced on his device and all of the correlating events that took place during and after the attack. All of the detailed forensics and threat data are provided in this presentation to give you an understanding of the exact data provided to the security team.
  • Current State of Storage in the Container World Current State of Storage in the Container World Eric Forgette, Technical Director, Nimble Storage, Chad Hintz, SNIA-ESF Board, Cisco Recorded: Nov 17 2016 58 mins
    The first wave of adoption of container technology was focused on micro services and ephemeral workloads. The next wave of adoption won’t be possible without persistent, shared storage. This webcast will provide an overview of Docker containers and the inherent challenge of persistence when containerizing traditional enterprise applications. We will then examine the different storage solutions available for solving these challenges and provide the pros and cons of each.

    In this webcast we will cover
    •Overview of Containers
    ◦Quick history, where we are now
    ◦Virtual machines vs. Containers
    ◦How Docker containers work
    ◦Why containers are compelling for customers
    •Storage Options for Containers
    ◦NAS vs. SAN
    ◦Persistent and non-persistent
    •Future Considerations
    ◦Opportunities for future work

    This webcast should appeal to those interested in understanding the basics of containers and how it relates to the storage used with containers.
  • LTE Network Technology: Bringing Seamless Connectivity to the Enterprise LTE Network Technology: Bringing Seamless Connectivity to the Enterprise Ken Rehbehn -451 Research, Mike Carper -Nokia, Amit Jain- SpiderCloud Recorded: Nov 17 2016 52 mins
    During this webinar, the MulteFire Alliance will provide an overview of MulteFire technology and detail how it provides a new wireless connectivity option for enterprises. MulteFire is an LTE-based technology that operates in unlicensed and shared spectrum, enabling an enterprise to deploy its own high-performance wireless network. 451 Research analyst Ken Rehbehn and Alliance members will discuss MulteFire in enterprise IT applications and share why IT decision makers should start planning to incorporate MulteFire into their networks.

    Attendees will learn how MulteFire:
    •Improves indoor and outdoor capacity
    •Delivers a neutral host to serve any user
    •Offers opportunity to cover more area and devices with fewer nodes than Wi-Fi
    •Leverages LTE’s strong security, authentication, and more
    •Supports features such as VoLTE, LTE broadcast, interface management, advanced radio resource management and more
    •Plans for the continued evolutionary path established for LTE
  • The Right Transformation Model for European Businesses in 2017 The Right Transformation Model for European Businesses in 2017 Alexander Michael, Director of Consulting, Frost & Sullivan Dec 6 2016 2:00 pm UTC 60 mins
    Digital transformation affects every industry, every type of organisation and every country in Europe. It is a strategic priority for businesses to address the top drivers behind industry change: (1) changing needs of customers; (2) new distribution channels; and (3) new products entering the industry.

    A unified suite of applications running off of a single database answers these challenges efficiently, and Frost & Sullivan research finds that businesses increasingly see cloud as a solution to the challenges of industry transformation, competition, and as a means to facilitate global expansion. They are turning to the cloud for its agility, scalability and flexibility, and reaping the rewards by delivering innovative products and services that are transforming industries.
  • Identity & KYC Webinar Series Identity & KYC Webinar Series Presenter: TBC Dec 6 2016 5:00 pm UTC 45 mins
    Ensure KYC, Reduce Fraud, Provide a Great Customer Experience -- How digital currency is Winning on 3 Fronts

    From traditional banks to, money transfer and now the growing Bitcoin market, meeting KYC requirements is critical. Come learn how Coinbase, the leader in digital currency, is using Jumio to ensure regulatory compliance, reduce fraud, and ensure a frictionless customer experience.
  • Adding Intelligence to Investigations (Focus on data breach investigations) Adding Intelligence to Investigations (Focus on data breach investigations) Stuart Clarke, CTO, Cybersecurity, Nuix; John Douglas, Technical Director, First Response Dec 7 2016 6:00 am UTC 60 mins
    Data volumes are growing in both size and complexity; we have increasingly less control and awareness of the data we hold. In this session, we will highlight the benefits of information governance practices enabling organisations to build intelligence about their own data and identify their critical information assets. In the event of a data breach or security incident, this information provides actionable intelligence, allowing you to discover and respond to an incident before the matter escalates into a crisis.

    Key takeaways:
    1. Understand the basic principles required to understand your data
    2. See how leveraging intelligence can get you to the answer faster
    3. Extract hidden links and relationships with analytics

    Join Nuix and (ISC)² on Dec 07 (Wed) at 02:00p.m. (Singapore time) in learning how to add intelligence to investigations (focus on data breach investigations).

    - Stuart Clarke, Chief Technical Officer, Cybersecurity, Nuix
    - John Douglas, Technical Director, first response - data investigation & incident response

    Member, Asia-Pacific Advisory Council, (ISC)²
  • Lessons learned from implementing HCE for cloud-based NFC mobile payments Lessons learned from implementing HCE for cloud-based NFC mobile payments Sarah Clark, Rob Macmillan and Shaun Hodgkiss Dec 8 2016 3:00 pm UTC 45 mins
    Join NFC World, Proxama and South Africa-based payments processor Tutuka to get real world insight into the practical issues involved in implementing a host card emulation (HCE) mobile payments service using Visa and MasterCard's cloud based payment standards.
  • Smarter Cybersecurity™ solutions start with next-gen protection Smarter Cybersecurity™ solutions start with next-gen protection Shane Cooper | Senior Sales Engineer Dec 8 2016 6:00 pm UTC 45 mins
    Discover the smarter way to protect endpoints.

    Today’s threats evolve at an alarming pace. That means cybersecurity and threat intelligence have to move even faster to help businesses stay secure against modern cyberattacks. Join us for in-depth technical demonstration of Webroot SecureAnywhere® Business Endpoint Protection to learn how Webroot works to safeguard your employees, clients, and data without adding complexity or slowing users down.
  • Customer Service: Maximizing Service Management Beyond IT Customer Service: Maximizing Service Management Beyond IT Paul Kelsey, Kifinti Solutions Inc., & Mike Heberling, HEAT Software Dec 8 2016 6:00 pm UTC 60 mins
    Customer Service: Maximizing Service Management Beyond IT

    There is a distinct need for a tech support staff with a desire for supporting customers with immediacy and social intelligence— creating a better connection in a digital world.

    Both internal and external customers are utilizing more communication channels and more devices now than ever before. The mobile workforce, remote work, consumerization, increased self-service, and emerging technologies have all played a part in creating the demand for better ways to serve customers and users.

    Join us for this Customer Service webinar & learn:

    Instant information to clients
    - Workflow to run based on known and secure criteria
    - Voice system knows everything the Service Desk knows

    Multiple communication channels
    - Integration and capabilities
    - Omni Channel
    - Single message representation

    Distributed Support/Telecommuting
    - Globalization
    - Repatriation of Call Centers

    Voice of the Customer Score
    - Personalization of Interaction and Routing
    - Custom Surveys based on Service and Category

    Auditing and Compliance
    - Reporting on actual effort for Labor Law compliance

    Who should attend?
    - VP of Support
    - IT Service Desk managers
    - Desktop Support managers
  • The End of Enterprise Software The End of Enterprise Software Merav Yuravlivker, Co-founder and CEO, Data Society Dec 8 2016 7:00 pm UTC 45 mins
    Is it worth it for companies to spend millions of dollars a year on software that can't keep up with constantly evolving open source software? What are the advantages and disadvantages to keeping enterprise licenses and how secure is open source software really?

    Join Data Society CEO, Merav Yuravlivker, as she goes over the software trends in the data science space and where big companies are headed in 2017 and beyond.

    About the speaker: Merav Yuravlivker is the Co-founder and Chief Executive Officer of Data Society. She has over 10 years of experience in instructional design, training, and teaching. Merav has helped bring new insights to businesses and move their organizations forward through implementing data analytics strategies and training. Merav manages all product development and instructional design for Data Society and heads all consulting projects related to the education sector. She is passionate about increasing data science knowledge from the executive level to the analyst level.
  • 451 Group and Gemalto Present "The Keys to Multi-Cloud Security" 451 Group and Gemalto Present "The Keys to Multi-Cloud Security" John Ray, Senior Product Strategist and EricHanselman, Chief Analyst at 451 Group Dec 13 2016 4:00 pm UTC 60 mins
    The cloud isn’t consumed by enterprises in just one way. Enterprises have varying internal capabilities and infrastructure means using different deployment models, on or off-premises, private and public clouds, hosted clouds through via multiple cloud vendors, which lends to a complex environment. Today, enterprises run roughly 41% of applications in the cloud, but workloads in cloud environments are expected to increase to 60% over the next two years. Organizations with multiple cloud platforms is becoming a fact of life, but creates challenges for businesses needing to secure them.

    Understanding the risks of each cloud platform is crucial to defining and implementing strong, dynamic data protection policies with comprehensive key management across all cloud-enabled environments. When encryption is used, the risk is transferred from the data itself to the cryptographic key. This is why it is essential that organizations control their own key infrastructure. Diving deeper into the topic, Eric Hanselman from 451 Group and John Ray from Gemalto will discuss the three key considerations to a successful multi-cloud security strategy: interoperability, control and compliance.

    Join our webinar “The Keys to Multi-Cloud Security” on Tuesday, December 13th 2016 and learn about:
    • Recent findings on enterprise cloud usage from 451 Group
    • How to analyze the security risks of your cloud platforms
    • Security practices for different cloud platforms and business processes
    • Future-proofing your Cloud security and data protection compliance
    • How security can work in the multi-cloud universe
    • Implementing a key management system that you own
  • Who You Gonna Call? Arm the Service Desk to Ghost-Bust Issues Before They Occur Who You Gonna Call? Arm the Service Desk to Ghost-Bust Issues Before They Occur Chris Marsh, 451 Research; Chris Dunn, Easy Vista; & Bruce Aboudara, Scalable Software Dec 13 2016 6:00 pm UTC 60 mins
    The Service Desk is at the frontlines of a changing landscape in IT. IT is now, more than ever, required to provide 100% uptime of their services, and provide them to users anytime and anywhere – thanks in large part to the growth in new consumer apps and services accessed through mobile devices.

    To support this demand the service desk must be aware of and prepared for several key trends:

    •Mobile. More and more, users are accessing their services through their mobile devices. Powerful trends are shaping the mobile world that will impact the Service Desk. We in the service desk must adapt, but what does that mean?

    •Service Availability. Users expect their services to always be up – just like they experience with their other mobile apps and should there be an issue, they expect it to be resolved immediately. What can the Service Desk to make this dream a reality?

    •New Technologies. Prompted by this need for always-on, mobile-available services, infrastructure teams are looking toward newer technologies such as public clouds, software defined networking (SDN), and hyperconverged architectures. How does this impact the Service Desk?

    Join, Chris Marsh, lead mobility analyst at 451 research, Chris Dunn, Global Director of Product marketing for EasyVista, and Bruce Aboudara SVP at Scalable Software as they discuss the key trends the service desk need to know about as well as actions the service desk can take to capitalize on those trends.
  • Evolving the Digital Experience in 2017 Evolving the Digital Experience in 2017 Simon Crawley Dec 13 2016 6:00 pm UTC 60 mins
    The digital revolution within society is in full swing, as the rate of consumer-facing technological advancement accelerates to unprecedented levels. Your users have never been so tech aware, and businesses need to keep up in order to stay relevant in the current marketplace. The pressure on businesses is two-fold – not only do they need to successfully transform themselves and their processes, but they need to apply that transformation to their customers’ experience.
    So where do organizations need to focus their digital transformation efforts in order to be successful? And what part does analytics play in this digital revolution? How beneficial is a comprehensive and experienced analytics partner to organizations currently attempting to transform digitally?
    During this webinar we will discuss the difficulties organizations are encountering when undertaking their digital journey, investigate why some organizations are more successful at digital transformation than others, and take a look at the impact and repercussions of failing to successfully transform in 2017.
    Huge business challenges are also often opportunities, and where some businesses struggle, others will excel. Organizations today need to view digital transformation as their defining moment, and reap the benefits moving into the future.
  • IoT普及で急拡大するDDoS, Web攻撃リスクと防衛のための検討ポイント IoT普及で急拡大するDDoS, Web攻撃リスクと防衛のための検討ポイント 中西一博, セキュリティプロダクトマーケティングマネージャ, アカマイ・テクノロジーズ 合同会社 Dec 14 2016 7:00 am UTC 60 mins
    現在、最も頻繁に用いられるサイバー攻撃のひとつとなったDDoS攻撃。Mirai Botnetに代表されるIoTを媒介する新たな攻撃手法によって、ビジネス停止のリスクがかつてないほど高まっています。実際にその攻撃を受け止めたAkamaiが観測した最新の攻撃データに基づき、現在のDDoSの特徴としくみ、その対策を用意する際に留意すべきポイントを中心に、企業Webを中心にしたシステムが今まさに直面しているリスクを解説します。
  • The Six W's Webinar:How to accelerate your transition to embracing the Hybrid IT The Six W's Webinar:How to accelerate your transition to embracing the Hybrid IT David Goldschlag, CTO & Senior VP of Strategy Dec 14 2016 4:30 pm UTC 30 mins
    Welcome to Pulse Secure’s webinar series on The Six W’s of Pulse Secure! We will take you through the journey on the perfect formula for staying contemporary in the vast evolving world of Hybrid IT.

    The final webinar in our series will show you how to get up to speed on a new robust security perimeter with policy at its core, compliance for the cloud, and frictionless experience for workers.
  • Sight for Sore Eyes: How Security & Risk Pros Can Restore Their Visibility Sight for Sore Eyes: How Security & Risk Pros Can Restore Their Visibility Ryan Kalember, Proofpoint SVP of Cybersecurity with Guest Speaker Joseph Blackenship, Forrester Analyst Dec 14 2016 6:00 pm UTC 60 mins
    The threat landscape in 2016 shifted more quickly than it ever has. But one element stayed the same: the most harmful attacks targeted people, not infrastructure. Record volumes of ransomware and business email compromise (BEC) spoofing, for example, have joined old standbys like credential phishing. That’s why getting visibility into how cyber attacks are targeting your people has never been more critical.

    Join guest speaker, Forrester’s Joseph Blankenship, senior analyst serving security and risk professionals, and Ryan Kalember, SVP of cybersecurity strategy at Proofpoint, for an interactive discussion. They’ll explore how security and risk professionals can get greater visibility into modern threats.

    Topics include:
    - How to grapple with “malware-free” threats, like BEC spoofing
    - Staying ahead of digital risks, such as evolving social media and mobile app-based risks to data and user credentials
    - Managing a move to the cloud without losing visibility into attacks
  • Instant messaging: The future of mobile marketing Instant messaging: The future of mobile marketing Stewart Rogers, Dir. of Marketing Technology, VentureBeat Dec 14 2016 6:00 pm UTC 60 mins
    The rise of instant messaging has created the largest and fastest-growing potential consumer audience ever—and a powerful opportunity to form instant, one-to-one connections between your brand and your customers. According to Juniper research, by 2019, over 160 trillion messages will be sent every year. That amounts to 438 billion messages daily.

    Most messages are read within three minutes of being opened—this kind of immediacy is unparalleled in other communications. And IMs can include a stunning variety of contextual, relevant, interactive content, and create conversations, engagement, and a deeply personalized connection that’s never been possible with email.

    Join our latest VB Live executive workshop to learn how to leverage the power of instant messaging to form meaningful connections and reimagine how you think about retail, customer service, and the entire customer experience.

    By participating in this VB Live event you’ll:
    * Learn how to leverage instant messaging
    * Capture customer details in IM
    * Leverage instant messaging technologies to improve your marketing strategy overall
    * Use the high engagement of messaging in terms of viewabilty


    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Quinn Banks, Sr. Mobile Marketing Manager, Farmer's Insurance
    * Wendy Schuchart, Moderator, VentureBeat
    More speakers announced soon
  • Masters of Mobile Data IV: From hype to reality in 2017 and beyond Masters of Mobile Data IV: From hype to reality in 2017 and beyond James Peng, Head of Mobile and Social Acquisition, Match Group Dec 15 2016 6:00 pm UTC 60 mins
    Remember when the experts scoffed at the idea that people would buy stuff with their smartphones? In an industry that reinvents itself every five years, what was once groundbreaking becomes table stakes in the blink of an eye.

    Staying ahead of the curve isn’t simply adopting new technology, but reinventing your approach as new platforms and channels emerge. The next wave is about to crest with the advent of wearables, VR, and the Internet of Things. Are you ready to catch it?

    In our latest VB Live event, we’re going to smash the myths that are holding your company back, and make some big, audacious predictions about the state of mobile business over the next five years—from 2017 and beyond.

    Join industry leaders for a lively hourlong discussion on the future of mobile apps -- and get your real world questions answered live.

    In this webinar you’ll:
    * Learn which mobile analytics will matter in the next five years
    * Understand the ways that KPIs monthly active users (MUA) can be interpreted
    * Measure beyond smartphones -- including wearables, connected cars and more.

    * Mark Rasch, Chief Security Evangelist, Verizon
    * James Peng, Head of Mobile and Social Acquisition, Match Group
    * Bob Sherwin, VP Direct Marketing, Wayfair
    * Jesse Robbins, CEO, Orion Labs former CEO of Chef
    * Evan Schuman, Moderator, VentureBeat

    Sponsored by mParticle
  • Redefining Endpoint Incident Response with Behavioral Analysis Redefining Endpoint Incident Response with Behavioral Analysis Michael Angelo Vien, CounterTack Cyber Response Expert Dec 15 2016 7:00 pm UTC 60 mins
    Cybersecurity teams and incident responders struggle to gather the most accurate intelligence on threats, and targeted, specific security incidents. Teams need technology to drill down into information on incidents, often to respond quickly, and in doing so, determine root cause.

    Is it malware? Are there other indicators that you are blind to? Are your systems maligned with attack residue that you can’t analyze in-memory?

    The art of incident responses contains three key components typically:

    1)Understanding your threat landscape to the point where you can effectively begin to eradicate threats quickly and with confidence
    2)Determining through deep investigation the root cause of security incidents, and the broader impact incidents that are not triaged
    3)Applying forensic-level analysis to add a layer of intelligence based on what was found, and what can be predictably analyzed

    CounterTack delivers incident response capabilities built for analyzing today’s threats, and for drilling down forensically into incidents that might stem from varying levels of malicious code associated with malware and other IOC’s. Leveraging behavioral traits and predictive analytics through its solutions, CounterTack is dedicated to continually improving IR for organizations globally.

    This webinar will feature key trends on how the discipline of incident response has shifted toward needing more definitive analysis. The presentation will convey a few real-world use cases, leveraging CounterTack technology across multiple common and uncommon types of threats from a forensic point of view, so attendees can learn new techniques to elevate their IR workflow.

    As a takeaway, we’ll leave you with an endpoint IR checklist and a set of best practices, and a special incentive to acquire Responder PRO for detailed incident investigation.
  • Addressing a Key Challenge in Network Security – ZERO DOWNTIME Addressing a Key Challenge in Network Security – ZERO DOWNTIME Joshua Kooh, Strategic Security Solutions Consultant, Forcepoint Dec 21 2016 5:00 am UTC 60 mins
    One of the top CIO challenges is to maintain 100% uptime. Access to applications, data, and resources on the network is mission-critical for every organization. Downtime costs can be high and in various forms - loss of revenue and productivity, the cost of recovery and other intangible costs, such as damage to their reputation and brand value. Downtime is simply unacceptable. Hence, security for that network must be highly available and not cause any performance degradation of the network - in migration, deployment or through human error.

    In this session, we will explore these questions:
    • Is it possible to have no downtime when maintaining network security?
    • What are the different causes of downtime?
    • What are the different approaches to minimize downtime?
    • How do you manage the costs to achieve 99.999% uptime in the network security solutions?

    Join Forcepoint and (ISC)² on Dec 21 (Wed) at 1:00p.m. (Singapore time) and learn how to maintain 100% uptime.