Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • Using SecureMail with Office 365
    Using SecureMail with Office 365 DataMotion Recorded: Jul 27 2017 2 mins
    Does the native message encryption meet your compliance and ease-of-use needs? This short 60 second video reviews how DataMotion SecureMail works with Office 365 to enhance its encryption capabilities.
  • Modern Portals: The Digital Transformation of Enterprise Systems & Business Apps
    Modern Portals: The Digital Transformation of Enterprise Systems & Business Apps Fouad ElNaggar, CEO and Co-Founder of Sapho Recorded: Jul 26 2017 45 mins
    Enterprise systems are failing today’s employees because they are hard to use, they trap data in silos, they have a poor user experience, and they offer limited mobile support. Therefore, it is no surprise that a Forrester Research study showed that 76% of employees believe it takes too long to complete tasks in their systems and another 62% delay completing tasks that require multiple systems. In short, this means your business has delays.

    On the flip side, consumer applications keep getting better and better – these apps are simple, enable quick task completion, are accessible from anywhere, and offer a great user experience. Why can’t enterprise systems be as easy to use as consumer apps? It turns out, they can be. Modern portals are the next generation digital workplace tools that push data and key actions to employees from their systems so they can more effectively do their jobs.

    Join this webinar to learn how easy it is to:

    •Remove system bottlenecks, reduce helpdesk calls, decrease software spending, enable smart decision-making, and streamline workflows with consumer-like business apps.
    •Build smart, event-driven micro apps that sit on top of your existing systems and push actionable insights and tasks to employees on any device, intranet, or messenger.
    •Triple the productivity of your workforce with a modern portal that surfaces personalized and relevant tasks and information from all your systems.
  • Workloads, Data Centers & Cloud Strategy: Market & Technology Trends
    Workloads, Data Centers & Cloud Strategy: Market & Technology Trends Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center busines Recorded: Jul 25 2017 58 mins
    IT planners have far more options as to where to run their workloads than ever before. On-premises data centers, co-location facilities and managed services providers are now joined by hybrid multi-clouds – a combination of Software-, Infrastructure- and Platform-as-a-Service (SaaS, IaaS, and PaaS) execution venues. All have unique operational, performance and economic characteristics that need to be considered when deploying workloads.

    In this Webinar Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center business will discuss how industry leading enterprises determine the best execution venues for their workloads by addressing:

    •The market and technology trends that influence workload, data center and cloud strategy
    •How to evaluate the characteristics of various workloads and execution venues
    •How to manage workloads across on-premises and off-premises ecosystems
    Attendees will learn how to formulate an IT strategy that can be used to guide the decision criteria needed for placing workloads on their best execution venues, and enable the migration and ongoing management of workloads across a hybrid multi-cloud enterprise architecture.
  • The Human Factor 2017
    The Human Factor 2017 Adenike Cosgrove, Cybersecurity Strategist at Proofpoint , Davide Canali - Senior Threat Analyst Proofpoint Recorded: Jul 25 2017 47 mins
    Ransomware. Business email compromise (BEC). Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure.

    In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it.

    Register now to learn about:
    •The latest social engineering targeting trends and techniques
    •Top email fraud tactics, including business email compromise (BEC) and social media account phishing
    •The rise of fraudulent mobile apps and how criminals target users on the go
  • Keys to Continuous Testing for Faster Delivery
    Keys to Continuous Testing for Faster Delivery Shane Evans, Director of Product Management and Ayal Cohen, Chief Functional Architect, HPE Recorded: Jul 21 2017 25 mins
    If you haven’t already, we recommend you listen to the first webinar in this series, the 9-minute overview by our SVP and GM Raffi Margaliot as he introduces the three core disruptions facing application delivery teams today.

    Your business needs to deliver faster. To accommodate, Development needs to introduce fewer changes but in a much more frequent cadence. This creates a challenge for test teams to keep up with the rapid pace of change without compromising on quality. Automation is paramount to the success or failure of Continuous Delivery, and Continuous Testing enables early and frequent quality feedback throughout the CI/CD pipeline. In this webinar, we will explore how to implement Continuous Testing to ensure high quality releases in a Continuous Delivery environment; including what to test and when to automate new functionality in order to optimize your efforts.
  • ASO or GTFO: App store optimization that works
    ASO or GTFO: App store optimization that works Trey Stout, CTO and co-founder, ScribbleChat and Handwriting.io Recorded: Jul 20 2017 61 mins
    For LTV, engagement, and life­cycle, organic installs blow paid install campaigns out of the water—and they're a lot cheaper. VB Insight analysts report that if you want to boost organic downloads by at least 20 percent—or in some cases double or even triple that rate—you need to get in the ASO game.

    ASO basics have been buried alive in the avalanche of new apps, flawed app search, and rapid-fire algorithm changes that aren't always developer friendly. To get the most out of your entire marketing funnel, not just your app store presence, you need to step up your ASO game with these key takeaways from our latest in-depth, Godzilla-sized ASO report.

    For report highlights, key best practices and can't-miss ASO insights from super-analyst Stewart Rogers, join our latest interactive VB Live event!

    In this webinar you'll:
    * Learn why ASO is fundamental to the success of any app
    * Familiarize yourself with the pillars of solid ASO strategy
    * Leverage technology to increase your lifetime user value
    * Think beyond keywords for your search strategies

    Speakers:
    * Trey Stout, CTO and Co-founder, ScribbleChat and Handwriting.io
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Peggy Anne Salz, Chief Analyst, MobileGroove
    * Wendy Schuchart, Moderator, VentureBeat

    Don't miss out, register today!
  • Keeping Enterprise Data Safe from Mobile Travel Risks
    Keeping Enterprise Data Safe from Mobile Travel Risks Domingo Guerra, Co-Founder and President at Appthority Recorded: Jul 19 2017 23 mins
    Over 459 million business trips and 1.7 billion US leisure trips will be booked in 2017. Mobile threats can increase significantly when employees travel with their mobile phones and devices and their guard is down.

    Domingo Guerra provides tips for keeping data safe while employees travel and reducing risks when they return.
  • How To Secure And Empower Your Mobile Workforce
    How To Secure And Empower Your Mobile Workforce Chris Sherman, Sr Analyst at Forrester & Mike Schuricht, Sr Director of Product Management at Bitglass Recorded: Jul 19 2017 59 mins
    The rise of Millennials in the workforce, increasing employee
    demand for technology flexibility, and a focus on the employee experience continue to disrupt traditional work procedures. Companies launch limited bring-your-own-device (BYOD) deployments, but these programs often stall when an employee is required to install EMM/MAM/MDM software.

    In this webinar, we will discuss the best practices related to securing employee devices while maintaining user productivity.
  • Streamlining Your Data-Security Program to Meet Regulatory Change
    Streamlining Your Data-Security Program to Meet Regulatory Change Mark Bower, Global Director of Product Management, HPE Security – Data Security Recorded: Jul 19 2017 61 mins
    Data security and the challenge of data protection is increasing in scope and difficulty. The massive volume of data that businesses are collecting is growing exponentially, and managing compliance delivery is a daunting task with huge negative consequences for getting it wrong. While organizations have long needed to safeguard intellectual property and confidential information, changes in information technology and business models introduce new threats, and new regulations. Governments and industry bodies are imposing new regulations to motivate organizations to protect the privacy and confidentiality of information. Responsibilities can vary widely by region and by industry, and staying on top of an ever-shifting regulatory landscape is complex and challenging, but it isn't impossible.

    Successful organizations coordinate enterprise-wide regulatory compliance activities with tools to identify and address new and changing regulations, and are able to map the impact of these regulations across the entire infrastructure, and prioritize compliance activities according to business impact. By deploying a consistent, sustainable, scalable and measurable process for managing regulatory change, they are able to eliminate manual, non-scalable and non-strategic activities to reduce the cost and improve the speed of regulatory compliance programs.
  • Why your VR game is virtually useless without data
    Why your VR game is virtually useless without data Kiyoto Tamura, VP Marketing, Treasure Data Recorded: Jul 19 2017 60 mins
    The reality is virtual, but successful VR games still require cold, hard data. For wildly popular games like Survios’ Raw Data, the first VR-exclusive game to reach #1 on Steam’s Global Top Sellers list, data and analytics are the key to success.

    And now online gaming companies have the full-stack analytics infrastructure and tools to measure every aspect of a virtual reality game and its ecosystem in real time. You can keep tabs on lag, which ruins a VR experience, improve gameplay and identify issues before they become showstoppers, and create fully personalized, completely immersive experiences that blow minds and boost adoption, and more. All with the right tools.

    Make success a reality: Register now for our latest interactive VB Live event, where we’ll tap top experts in the industry to share insights into turning data into winning VR games.

    Attendees will:
    * Understand the role of VR in online gaming
    * Find out how VR company Survios successfully leverages the Exostatic analytics infrastructure for commercial and gaming success
    * Discover how to deploy full-stack analytics infrastructure and tools

    Speakers:
    Nicolas Nadeau, President, Exostatic
    Kiyoto Tamura, VP Marketing, Treasure Data
    Ben Solganik, Producer, Survios
    Stewart Rogers, Director of Marketing Technology, VentureBeat
    Wendy Schuchart, Moderator, VentureBeat

    Sponsored by Treasure Data
  • Introduction to Box as Cloud Content Management
    Introduction to Box as Cloud Content Management Beth Vogel, Product Marketing Manager, Box Recorded: Jul 18 2017 57 mins
    Your content is important to your success — and how you manage and make the most of it in the changing business landscape ahead will be even more so. Join this session and live demo to learn how managing your content in the cloud fosters collaboration, improves security and lowers costs, so your entire organization can work as one.
  • Pervasive Intelligence: The IoT Computing Continuum
    Pervasive Intelligence: The IoT Computing Continuum Christian Renaud, Research Director, Internet of Things Recorded: Jul 18 2017 49 mins
    Computing and applications in IT have shifted over the last decade from a de-centralized to a centralized, cloud-based model. New Internet of Things applications promise to reverse that trend with an emphasis on local edge computing and analytics, and create a continuum of new aggregation points to address the unique needs of each IoT vertical application. This webinar will look at key drivers behind the re-emergence of the edge in IoT analytics and the growing demand for near-edge aggregation models to solve for application latency and cost constraints.
  • Virtual & Augmented Reality with Robert Scoble hosted by the VR/AR Association
    Virtual & Augmented Reality with Robert Scoble hosted by the VR/AR Association Robert Scoble Recorded: Jul 18 2017 85 mins
    Spend 1hr with Robert online and ask any question you want! Robert will present the latest industry information and give you insights into the present and the near-future.

    Robert Scoble is on the Advisory Board of the VR/AR Association and is an authority on what's next, particularly when it comes to VR, AR, and MR. Partner at Transformation Group, Robert helps companies deal with the disruption that next generation augmented reality, AKA "Mixed Reality" represents. In his book, "The Fourth Transformation," he details how it will change everything from retailing to education to sports. Robert received several endorsements: Time: One of the top 140 Twitterers! FT: One of the five most influential Twitterers! Inc.: Top 5 on list of Tech Power Players You Need to Know. Next Reality: Top 50 AR influencer.
  • Protecting Data After The Digital Disruption
    Protecting Data After The Digital Disruption Ryan Kalember, SVP Cybersecurity Strategies, Heidi Shey, Forrester Researcher Recorded: Jul 18 2017 61 mins
    Join Guest Forrester Research Senior Analyst, Heidi Shey, and Proofpoint SVP of Cybersecurity, Ryan Kalember, as they discuss what SaaS applications, BYOD, and GDPR (General Data Protection Regulation) mean for protecting data in today’s organizations. Hear what critical developments you should be factoring into your long-term information protection strategy.

    Join this lively discussion to learn:

    - Trends and implications for traditional network and endpoint DLP
    - Real-world examples, such as the recent phishing worm, that illustrate new risks and why you need to think differently
    - Strategies on how to move forward to protect your critical data
  • Open Banking – what does it mean for banks & fintechs?
    Open Banking – what does it mean for banks & fintechs? Jason O'Shaughnessy, Senior Vice President - EMEA and Australia, ENVESTNET | YODLEE Recorded: Jul 18 2017 28 mins
    ECN is pleased to be hosting, via webinar, an expert interview with Jason O'Shaughnessy, Senior Vice President - EMEA and Australia, ENVESTNET | YODLEE on 18 July.

    Open Banking is coming in January 2018, but what does this mean and does it change anything?

    Tune in to find out exactly what it means for you and join in the discussion.
  • Explore Sapho in 3 minutes!
    Explore Sapho in 3 minutes! Sapho Recorded: Jul 17 2017 3 mins
    Watch this quick demo of how easy it is to build micro applications and deliver them to your employees on any device, messenger, or intranet.
  • HIPAA Compliance in the Age of Population Health Management
    HIPAA Compliance in the Age of Population Health Management Andy Nieto Recorded: Jul 14 2017 6 mins
    This short video describes what population health management means, how it works and the role of secure messaging in effective population health management.
  • Push notifications that work: 6 tips for building a devoted user base
    Push notifications that work: 6 tips for building a devoted user base Marissa Aydlett, VP Marketing, Appboy Recorded: Jul 13 2017 60 mins
    A push notification is a tricky kind of social engagement: it can be a tap on the shoulder, a punch in the face, or water torture. In other words, it can be tremendously successful at driving commerce and engagement, or it could piss your customer off so badly they'll go rip you a new one on Twitter. And we've seen how well that works out for brands.

    At the very least, every misstep reduces open rates, strikes a blow against retention and destroys engagement. You want to know how to not be the boor at a cocktail party, because push notifications, one of the most powerful and immediate engagement tools in your arsenal (when you do it right) can garner 2770% higher conversion rates.

    Don't be part of the 63 percent of marketers who stumble on the messaging, timing, and frequency of your notification strategy—join this interactive VB Live event.

    You'll:
    * Discover the one trick to never-fail push notifications everywhere, not just apps
    * Drive 2770% higher conversion rates through a specific kind of push notifications
    * Learn how to apply behavioral triggered push notifications in your own marketing strategy
    * Build better timing into your push notifications to increase conversions


    Speakers:
    * Marissa Aydlett, VP Marketing, Appboy
    * Colleen LeCount, SVP Global Sales and Marketing, Mobolize
    * Kara Dake, Founder, Women in Wireless
    * Stewart Rogers, Director of Marketing Technology for VentureBeat
    • Rachael Brownell, Moderator, VentureBeat
  • Harnessing the Cloud to Embrace New International Opportunities
    Harnessing the Cloud to Embrace New International Opportunities Adrian Drozd, Research Director, Frost & Sullivan and David Turner, Senior Director, EMEA Marketing, Oracle NetSuite Recorded: Jul 13 2017 59 mins
    Prior to the era of digital transformation, international expansion was largely the domain of very large organisations that were capable of investing in infrastructure across the world. Today, the vast majority of IT solutions that enable innovation are deployed in the cloud; such solutions are opening up new opportunities for businesses of all sizes. When it comes to international expansion, acting local but delivering consistent and flexible services is essential. Cloud-based solutions allow organisations to internationalise quickly and enable start-ups to be “born global”.
  • Data Security – Identifying Your Last Line of Defense
    Data Security – Identifying Your Last Line of Defense Jules Anderson – UK Regional Sales Manager, Thales e-Security Recorded: Jul 13 2017 54 mins
    Join Verisec and Thales and gain a deeper understanding into how you can review your data security in an efficient and effective way to enable your organisation to focus on the truly challenging areas of data security and compliance.

    Sensitive data continues to make it into a broader set of environments, including cloud deployments, big data platforms, virtualised systems, and more. The policies and regulatory mandates in effect continue to grow more stringent. At the same time, these groups have to guard against more sophisticated cyber-attacks, and the continuous threats posed by users that have stolen privileged user credentials.

    To adapt to these expanding demands, IT and security professionals have to leverage technologies that offer a strong mix of security, implementation flexibility, and operational efficiency.

    During this webinar we will cover:
    - Compliance with privacy and data security requirements (helping you comply with the critical Article 32 and 34 GDPR rules)

    - Cyber-security risk management and mitigation - using Thales encryption, an organisation can render private data unintelligible to a cyber-intruder (external or internal) even in the event of a breach

    - Enabling organisations to securely drive digital transformation such as BYOD, Cloud Migration, IoT, Blockchain

    - Giving organisations capability to keep control and visibility on their data and encryption keys while moving to the cloud

    This introduction is aimed at those within your organisation looking to gain an insight into data protection and the potential challenges that your organisation could face.
  • [Ask the Expert Q&A] McAfee's Raj Samani on the Petya Ransomware Attacks
    [Ask the Expert Q&A] McAfee's Raj Samani on the Petya Ransomware Attacks Raj Samani, Chief Scientist, McAfee Recorded: Jul 12 2017 45 mins
    - Interactive audience Q&A -

    Fresh of the heels of WannaCry this week has seen the Petya / notPetya / Goldeneye attacks strike many global organisations in a wave of devastating ransomware attacks.

    Questions need to be raised though:

    - Where did Petya originate and who was responsible?

    - What halted the spread?

    - Why was it such an effective and newsworthy cyber attack?

    - Should you be worried about something similar happening to your business?

    - What you do to be better prepared to defend against similar ransomware striking again?

    Tune in live to this interactive ask the expert webinar with McAfee Chief Scientist Raj Samani as he takes your questions on the attacks and suggests ways that you can defend yourself from similar variations in the future.
  • Research Findings: Quantifying ROI for Application Security
    Research Findings: Quantifying ROI for Application Security Shelly Yao, Security Architect – South East Asia, Hewlett-Packard Enterprise Recorded: Jul 12 2017 53 mins
    Continuous delivery of application is the new norm. Businesses recognize that applications are a competitive differentiator so they are creating and pushing them out at a lightning pace, thus putting a lot of pressure on development and security teams. HPE Enterprise Security, together with Mainstay Partners, studied data collected from a broad set of Fortify customers to quantify the business value they are experiencing by building security into each phase of development.

    Join HPE and (ISC)² on July 12 (Wed) at 13:00 (Singapore time) to learn about the key findings from the research. Discover the ROI of application security practices for your organization to scale confidently for business growth.

    Presenter: Shelly Yao, Security Architect – South East Asia, Hewlett-Packard Enterprise
    Moderator: Clayton Jones, Regional Managing Director, Asia-Pacific, (ISC)²
  • Mobile Edge Computing/Fog Computing: A Journey from Concepts to Reality
    Mobile Edge Computing/Fog Computing: A Journey from Concepts to Reality Naveen Mishra, Ajay Sunder, Frost & Sullivan Aug 2 2017 7:00 am UTC 60 mins
    The need to embrace digital transformation in all possible scenarios is paramount to bring efficiencies and improve current business processes. The challenges of real-time data processing, high network speeds and latency can be overcome by using ICT technologies, i.e., Mobile Edge Computing/Fog Computing. These computing technologies bring compute and storage capabilities to the edge of the network and enable real-time and context-based business applications. All industry verticals can find relevant application areas that can benefit from computing at the edge of the network.
  • Combating Data Breaches: Proactive Defence during a Digital Transformation
    Combating Data Breaches: Proactive Defence during a Digital Transformation Ian Greenwood, Regional Sales Manager and Mark Penny, PKI Security Consultant, Professional Services EMEA, Thales e-Security Aug 2 2017 11:30 am UTC 60 mins
    Combating Data Breaches: Proactive Defence during a Digital Transformation
    Join Herjavec Group and Thales and gain a deeper understanding into how you can review your data security in an efficient and effective way to enable your organisation to focus on the truly challenging areas of data security and compliance.
    Sensitive data continues to make it into a broader set of environments, including cloud deployments, big data platforms, virtualised systems, and more. The policies and regulatory mandates in effect continue to grow more stringent. At the same time, these groups have to guard against more sophisticated cyber-attacks, and the continuous threats posed by users that have stolen privileged user credentials.
    To adapt to these expanding demands, IT and security professionals have to leverage technologies that offer a strong mix of security, implementation flexibility, and operational efficiency.

    Topics covered during the webinar:

     Complex and sophisticated data threat landscape

     GDPR at a glance

     Digital transformation ambitions and challenges

     Why adopt a data encryption strategy?

     Focus on how encryption and key management solutions can help you comply, secure and keep control of your data

    This introduction is aimed at those within your organisation looking to gain an insight into data protection and the potential challenges that your organisation could face.
  • High Scale, High Stakes: Adjusting Focus and Investment at the Network Gateway
    High Scale, High Stakes: Adjusting Focus and Investment at the Network Gateway Dan Cummins, Senior Analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing with Symantec Aug 2 2017 6:00 pm UTC 60 mins
    As cloud continues to erase the network perimeter, it’s more important than ever to align IT infrastructure to track more closely to the businesses it serves.

    As a result, gateway technology choices and investments need to fit the cloud model and fit in terms of security use case, value, and real-world business requirements.

    Join Dan Cummins, analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing at Symantec, for an informative webinar on August 2 to hear a discussion of network security today.

    Agenda:

    - Discussion on the increased dependence on HTTP and HTTPS

    - The limitations of Firewalls in the web and cloud world

    The increasing critical need for web gateways, both on premise and in the cloud, for achieving:

    - Access governance for users and devices

    - Verifiable protection against advanced attack methods

    - Agile risk management and measurable return on investment.

    Important opportunities are at hand right now to integrate network and cloud-based approaches to achieve coordinated and robust anti-malware, privacy, policy and connectivity capabilities, while continuing on a path to flexible, software-defined infrastructure.

    Register Today
  • Trust and Privacy Online: Managing your Business Identity
    Trust and Privacy Online: Managing your Business Identity Leon Brown, Geoffrey Noakes and Jeff Barto from Symantec Aug 15 2017 2:00 pm UTC 45 mins
    With more and more transactions happening online, and a dramatic increase in incidents involving brands and fraudsters on the Web, the concept of online trust has never been so vital for businesses. In this webinar you will learn how to help prevent these incidents by leveraging the Web PKI to display your business identity online: we will explain the principles of trust through business authentication and how to show your identity to your visitors thanks to various types of digital certificates.

    We will run through the benefits of business authentication, what the current best practices and policies are for both e-commerce and Enterprise businesses when it comes to trust, what is mandatory and what is coming. We will help you clarify priorities for your business and provide some action plans.
  • Inventing the Future: Mobile-First Learning
    Inventing the Future: Mobile-First Learning Dan Rivera, Aruba Product Solutions Manager, K12 & Frankie Jackson, Cypress Fairbanks ISD Asst. Superintendent, CTO Aug 15 2017 5:00 pm UTC 75 mins
    Learning is transforming! With new technology being introduced into the classroom at breakneck speeds, it may seem impossible to stay ahead of the curve. While mobile learning, collaborative environments and cloud-based apps put a higher demand on the wired and wireless infrastructure, the advent of IoT puts stress on the network like never before. With a projected 30 billion new IoT devices coming in the next three years, what do you need to do to prepare your network?

    Join us to learn how Cypress Fairbanks ISD began Inventing the Future. During the webinar we will discuss:

    •Creating future-ready educational environments
    •Key Trends in K12
    •Challenges – The Solvable, the Difficult and the Wicked
    •EdTech Developments

    Speakers
    Dan Rivera, Aruba Product Solutions Manager, K12
    Frankie Jackson, Cypress Fairbanks ISD Asst. Superintendent, CTO
  • Managing Complexity in the World of Predictive
    Managing Complexity in the World of Predictive Dr. Megan Sheehan and Vandan Nayak, HPE Aug 15 2017 5:00 pm UTC 45 mins
    If you haven’t already, we recommend you listen to the first webinar in this series, the 9-minute overview by our SVP and GM Raffi Margaliot as he introduces the three core disruptions facing application delivery teams today.

    Software development teams are under pressure to release faster while maintaining the same level of quality—or ideally increasing it. This has significantly increased application lifecycle complexity to the point of chaos. Join us, as we discuss how application development teams can leverage HPE’s ALM Octane, an integrated lifecycle management solution, along with advanced analytics to mitigate the risks in application delivery and optimize their resource investments. Learn how to scale Agile and DevOps processes with data driven insights and prescriptive guidance.
  • Hybrid Mobile Apps: From Security Challenges to Secure Development
    Hybrid Mobile Apps: From Security Challenges to Secure Development Dr. Achim D. Brucker, Security Consultant & Senior Lecturer, University of Sheffield Aug 16 2017 12:00 pm UTC 45 mins
    Cross-platform frameworks, such as Apache Cordova, Adobe PhoneGap, or SAP Kapsel are becoming increasingly popular. They promote the development of hybrid apps that combine native, i.e., system specific, code and system independent code, e.g., HTML5/JavaScript. Combining native with platform independent code opens Pandora's box: all the security risks for native development are multiplied with the security risk of web applications.

    In this talk, we will give a short introduction into hybrid app development, present specific attacks and discuss how Android developers are using Apache Cordova. In the second half of the talk, we will focus on the secure development of hybrid apps: both with hands-on guidelines for defensive programming as well as recommendations for hybrid app specific security testing strategies.

    Speaker bio:

    Dr. Achim D. Brucker (https://www.brucker.ch) leads the Software Assurance & Security Research Team (https://logicalhacking.com) at the University of Sheffield, UK. Until December 2015, he was a Security Testing Strategist in the Global Security Team of SAP SE, where, among others, he defined the risk-based security testing strategy of SAP. He is a frequent speaker at security conferences.
  • Securing BYOD Without MDM Hassles
    Securing BYOD Without MDM Hassles Shalmali Rajadyax, Product Manager at Bitglass Aug 16 2017 8:00 pm UTC 60 mins
    Many organizations adopted MDM solutions to deal with the increasing demand for BYOD. However MDM is seen by many as cumbersome and invasive and has struggled to see meaningful adoption among employees. Fortunately, Cloud Access Security Brokers (CASBs), like Bitglass, offer an easy-to-use alternative for securing corporate data stored in public cloud applications on both managed and unmanaged devices.

    In this webinar you'll learn the challenges companies face while deploying MDM and some of alternative solutions used to secure employee-owned devices without agents
  • Privacy Level Agreement Code of Conduct for CSPs: a compliance tool for GDPR
    Privacy Level Agreement Code of Conduct for CSPs: a compliance tool for GDPR Paolo Balboni, Founding Partner of ICT Legal Consulting Aug 17 2017 12:00 pm UTC 60 mins
    Paolo Balboni will discuss in a practical and business oriented way, the new provisions of the GDPR and how the PLA Code of Conduct supports compliance with the forthcoming EU Data Protection Legislation. More precisely, Balboni will highlight the true privacy compliance “game changers” introduced by the GDPR and offer the audience practical inputs on how to set up a sound and effective corporate Data Protection Compliance Programme, which will also include having a PLA in place with Cloud Service Providers.
  • GDPR Privacy Impact and Risk Assessments
    GDPR Privacy Impact and Risk Assessments Ariel Evans, CEO, InnoSec Aug 17 2017 12:00 pm UTC 45 mins
    - InnoSec is the winner of the EU commission Horizon 2020 grant based on its innovation in GDPR and cyber risk -

    GDPR is an urgent issue that has companies scrambling to be compliant by May of 2018. Any organization that processes EU citizen data is in scope and the penalties are severe.

    Alignment with the requirements can reduce the chances of triggering a Data Protection Authority (DPA) to investigate a company’s privacy practices after the GDPR takes effect in May 2018. DPAs can impose a fine on companies of up to 4% of annual global revenues for egregious violations of the GDPR. Member states can also add to these fines. The Netherlands, for instance, has more than doubled its own fining capacity to 10% of annual revenues. European privacy advocates are pressuring DPAs to fully exercise these new powers after May 2018.To manage this risk, multinationals should have a means to demonstrate alignment with the GDPR requirements and communication of this program with DPAs that have jurisdiction over their major European operations.

    InnoSec’s GDPR solution provides privacy impact and risk assessments which measure the confidentiality and integrity of the system and the risk associated to it meeting articles 1,2, 5, 32, 35 and 36. Additionally, we provide a readiness gap analysis for managing, planning and budgeting for GDPR.

    Most e-commerce, educational and multi-national organizations process EU citizen data and are in scope for GDPR. Moreover, most organizations are not ready according to Gartner and his means the race to the finish line requires as much automation as you can afford. InnoSec provides a means for companies to save money and time with their GDPR assessment and gap analysis offering.. Our GDPR offering automates the assessment process and provides a gap analysis readiness feature, that also ensures that organizations can plan, budget and manage their GDPR program.

    Come to this webinar to see how it is done.
  • B2B video marketing: Turn your CRO into your BFF
    B2B video marketing: Turn your CRO into your BFF Michael Ballard,Sr Manager Digital Marketing, Lenovo Aug 17 2017 5:00 pm UTC 60 mins
    You better get good at conversational video marketing, fast—or you're going to be obsolete.

    Videos and photos get the most retweets. Last year, Facebook's video viewership doubled from 4 billion views per day to 8 billion views per day in seven months. Google owns YouTube, and coincidentally, rich media is a favorite of the search engine's algorithms.

    Conversational videos drive traffic, boost engagement, and serve up information better than any other medium. They promote trust in your brand and your products. They're eminently shareable, potentially viral, and taking over the internet: 74 percent of all Internet traffic in 2017 will be video.

    Step up and stand out in every step of the sales funnel with conversational video marketing when you join our latest interactive VB Live event.

    By watching this webinar, you'll:
    * Optimize your audience takeaways for video content
    * Get tips from the savviest sales and marketing people on their video content strategy
    * Focus your energy on the right distribution channels for your adverts
    * Personalize video content to lock in the close

    Speakers:
    * Michael Ballard,Sr Manager Digital Marketing, Lenovo
    * Todd Hartley, CEO, Wirebuzz
    * Stewart Rogers, Director of Marketing Technology, VentureBeat

    This VB Live event sponsored by Vidyard
  • Solving for compliance: Mobile app security for banking and financial services
    Solving for compliance: Mobile app security for banking and financial services Brian Lawrence, NowSecure Security Solutions Engineer Aug 22 2017 6:00 pm UTC 45 mins
    Mobile apps fall in scope for a number of regulatory requirements that govern the banking and financial services industries, such as: guidelines from the Federal Financial Institutions Examination Council (FFIEC), the Gramm–Leach–Bliley Act (GLBA), New York State cybersecurity requirements for financial services companies, the Payment Card Industry Data Security Standard (PCI DSS), the Sarbanes-Oxley Act, and more. Luckily, a repeatable mobile app security assessment program and standardized reporting go a long way in both achieving compliance objectives and securing mobile apps and data.

    Join us for a 30-minute webinar during which NowSecure Security Solutions Engineer Brian Lawrence will explain:
    -- How and where exactly mobile apps fall in scope for various compliance regimes
    -- Mobile app security issues financial institutions must identify and fix for compliance purposes
    -- How assessment reports can be used to demonstrate due diligence
  • Challenges in Building Connected Communities
    Challenges in Building Connected Communities Kate Garman, Limor Schafman Aug 23 2017 3:00 pm UTC 75 mins
    Creating a seamless connected environment that supports smart community citizen services, streamlines operations, supports economic development is already a challenge for community officials. There are many different needs and directions to begin the conversion to an “intelligent” environment. Communities are also planning and building not just for current needs, but also for future connectivity infrastructure that will be used by autonomous vehicles, smart buildings, connected homes, AR/VR, eRetail, eHealthcare, smartgrid and more. This webcast will discuss how cities and their partner communications suppliers are working together to build connectivity infrastructure for today and tomorrow.
  • Hunting Criminals with Hybrid Analytics, Semi-supervised Learning, & Feedback
    Hunting Criminals with Hybrid Analytics, Semi-supervised Learning, & Feedback David Talby, CTO, Atigeo Aug 23 2017 5:00 pm UTC 60 mins
    Fraud detection is a classic adversarial analytics challenge: As soon as an automated system successfully learns to stop one scheme, fraudsters move on to attack another way. Each scheme requires looking for different signals (i.e. features) to catch; is relatively rare (one in millions for finance or e-commerce); and may take months to investigate a single case (in healthcare or tax, for example) – making quality training data scarce.

    This talk will cover a code walk-through, the key lessons learned while building such real-world software systems over the past few years. We'll look for fraud signals in public email datasets, using IPython and popular open-source libraries (scikit-learn, statsmodel, nltk, etc.) for data science and Apache Spark as the compute engine for scalable parallel processing.

    David will iteratively build a machine-learned hybrid model – combining features from different data sources and algorithmic approaches, to catch diverse aspects of suspect behavior:

    - Natural language processing: finding keywords in relevant context within unstructured text
    - Statistical NLP: sentiment analysis via supervised machine learning
    - Time series analysis: understanding daily/weekly cycles and changes in habitual behavior
    - Graph analysis: finding actions outside the usual or expected network of people
    - Heuristic rules: finding suspect actions based on past schemes or external datasets
    - Topic modeling: highlighting use of keywords outside an expected context
    - Anomaly detection: Fully unsupervised ranking of unusual behavior

    Apache Spark is used to run these models at scale – in batch mode for model training and with Spark Streaming for production use. We’ll discuss the data model, computation, and feedback workflows, as well as some tools and libraries built on top of the open-source components to enable faster experimentation, optimization, and productization of the models.
  • Mobile advertising: Stop fraud and step up clicks
    Mobile advertising: Stop fraud and step up clicks VentureBeat Aug 24 2017 5:00 pm UTC 60 mins
    It's 2017 and the digital ad space hasn't stopped growing in size and complexity. Mobile advertisers are seeing increased opportunities for ad placements in apps and messaging platforms, which means more opportunities, but also new marketing challenges—and a major surge in fraud.

    Make this the year you stop letting fraudulent bots burn through your budget and start maximizing the power of mobile advertising with must-click messaging. Join our latest live, interactive event for an in-depth look at how to stay in front of your audience, ahead of your competitors, and on top of fraud.

    In this webinar you'll:
    * Learn what works and what doesn't in 2017's mobile advertising arena
    * Mitigate the mobile advertising fraud risk in your own applications
    * Create the most engaging mobile advertisements for savvy app patrons
    * Use video and 360 advertising to stay abreast of the latest trends in mobile advertising

    Speakers:
    * Stewart Rogers, Director of Technology, VentureBeat
    * Wendy Schuchart, Moderator, VentureBeat
    More speakers to be announced?

    Want to be a speaker on a VB Live event? Pitch your story at Webinars at VentureBeat Dot Com.
  • Eight Telecom Expense Solutions Gartner Missed
    Eight Telecom Expense Solutions Gartner Missed Hyoun Park Aug 31 2017 5:00 pm UTC 30 mins
    Recommended Audience: Telecom Directors and Managers, Network Directors and Managers, Mobility Directors and Managers, IT Procurement, IT Finance, IT Architects

    Amalgam Insights has been covering the Telecom Expense Management (TEM) market for over a decade. In May of 2017, Gartner released "Market Guide for Telecom Expense Management Services, 2017". In this guide, Amalgam believes that eight key vendors were overlooked that can provide enterprise-grade services and represent billions of dollars in technology spend including:

    * A pioneer in Robotic Process Automation
    * The largest standalone TEM in Europe
    * A SaaS solution partnering with IBM, Unisys, and Verizon
    * A Fortune 1000-focused vendor with 100% referenceable clients
    * A fast-growing technology management platform built on ServiceNow
    * A commercial and government-focused vendor with over 4 million lines under management
    * The largest Australian provider with over 500,000 items under management
    * One of the Bay Area's best rated places to work with spend management expanding to IoT, data center, & SD-WAN
  • Discover the New Micro Focus Application Delivery Management
    Discover the New Micro Focus Application Delivery Management Kelly Emo and Ashish Kuthiala, HPE Sep 5 2017 5:00 pm UTC 45 mins
    If you haven’t already, we recommend you listen to the first webinar in this series, the 9-minute overview by our SVP and GM Raffi Margaliot as he introduces the three core disruptions facing application delivery teams today.

    We’ve explored disruptions facing application delivery teams as they deliver software innovation faster to accelerate business success in the Digital Economy. And we’ve found disruptions bring challenges but also promise opportunity for the companies who can rapidly embrace seismic changes in software development, testing and delivery while balancing speed and quality. As the new Micro Focus, we stand ready for these challenges with a comprehensive and innovative portfolio of DevOps and Application Delivery Management solutions. This webinar will dive into the disruptions, define approaches to address them, and explore and map the suite of the new Micro Focus solution set across these needs. Bring your questions and discover the new Micro Focus.
  • Virtualization Changes to Service Performance and Business Models
    Virtualization Changes to Service Performance and Business Models Moderated by Limor Schafman, TIA Sep 6 2017 3:00 pm UTC 60 mins
    The push to virtualize communication networks, control centers, and data centers offers both great opportunity for management, speed to market, scale and business, and also brings many challenges. What are the new business models that software enables? What are the customer expectations for new service deliverables? How can service providers, data centers and others guarantee quality of service? What tests are being conducted and what industry practices are being established? This webcast will review how companies are meeting the challenge of operating with new processes and with new requirements.
  • Android “O” and iOS 11 security updates: What you need to know
    Android “O” and iOS 11 security updates: What you need to know Michael Krueger, NowSecure Mobile Security Analyst // Tony Ramirez, NowSecure Software Support Engineer Sep 14 2017 6:00 pm UTC 45 mins
    Google and Apple will release major updates to the Android and iOS operating systems in the coming months, and beta versions of Android “O” and iOS 11 include a number of security enhancements. During this webinar, NowSecure Mobile Security Analyst Michael Krueger and Software Support Engineer Tony Ramirez will provide an overview of the security updates in both new releases and explain:
    -- Changes in iOS 11 that provide better security for app data in transit
    -- App permissions updates in Android O
    -- How Android O and iOS 11 updates affect mobile app security assessments
  • IoT and Smart Buildings: The New Construct
    IoT and Smart Buildings: The New Construct Moderated by Limor Schafman, TIA Sep 20 2017 3:00 pm UTC 60 mins
    Real estate developers, owners and tenants are rethinking the office building experience. Not only are buildings becoming increasingly efficient in in-door energy management and operations, they are also beginning to interact with the people who work within the walls, and with the out of doors environment. This type of sentient building design is making use of increased connectivity to and in buildings, as well as the use of sensors and IoT applications. This webcast will discuss communications and connectivity infrastructure that is being deployed in and to current real estate developments; what buiding owners, operators and tenants expect; the impact smart community development is having on smart buildings; and sample smart building IoT applications.
  • Augmenting Humans: Identifying Ideal Scenarios for Enterprise Productivity
    Augmenting Humans: Identifying Ideal Scenarios for Enterprise Productivity John Nall, Founder, Appzion Sep 26 2017 3:00 pm UTC 60 mins
    Join John Nall, Founder and CEO of Appzion, as he takes a technical deep-dive into workforce mobilization through augmented reality.

    In this webinar you will learn the steps to enterprise AR productivity. Methods include techniques to identify ideal scenarios for augmenting humans, process mapping and observation techniques. Once the scenario is chosen, other considerations include software and hardware assessment and selection and cybersecurity for wearables.
  • Virtualizing Media Broadcast: TV Transformed
    Virtualizing Media Broadcast: TV Transformed Steve Smith, Limor Schafman Sep 27 2017 3:00 pm UTC 75 mins
    Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.

    Speakers:
    Steve Smith, CTO, Cloud, Imagine Communications
    Stephen Smith is the CTO, Cloud, for Imagine Communications, where he leads the transformation of solutions to support media and entertainment markets in a future defined by IP, software, virtualization and cloud. Previously, Smith was the Executive Director of Media Systems at Starz Entertainment in Colorado, where he was responsible for the technology, implementation and operation of their Media Asset Management and Content Processing platforms. With 20+ years in the industry, Stephen has extensive experience in architecting, deploying, owning and operating complex media processing, origination and distributions systems.

    Host: Limor Schafman, Content Development Director, TIA
  • Virtual Umbrella: Why We Chose Virtual Reality
    Virtual Umbrella: Why We Chose Virtual Reality Samantha Kingston, Founder, Virtual Umbrella Sep 28 2017 1:00 pm UTC 45 mins
    Samantha Kingston will explore why she bet her career on virtual reality and what it’s really like running a marketing company solely for VR, looking at trends and what challenges are ahead for 2018.

    Virtual Umbrella is an award-winning marketing consultancy specialising in Virtual Reality. Virtual Umbrella has worked on a number of notable projects including creating a virtual reality cinema in Cannes, curating and running a technology hub as part of the Edinburgh Fringe Festival and providing immersive experiences along the BBC and Imperial War Museum.

    Speaker bio:

    Samantha Kingston is the award-winning client director at Virtual Umbrella. Virtual Umbrella is a marketing and PR agency specialising in virtual reality. Samantha fell into the VR industry by accident but has spent her time in the industry building up her own company and working with the VR industry in the UK, Europe, and US. Samantha is an advocate for Women in tech and VR and she is often found moderating panels on equality in the workplace. In 2016 she won the regional and national ‘New Business’ award at Venus Awards, highlighted as one of MCV 30 under 30 and one of the rising stars of BIMA100 2016.
  • Machine Learning, Design Thinking, and the Rise of the REEP
    Machine Learning, Design Thinking, and the Rise of the REEP Hyoun Park Sep 28 2017 5:00 pm UTC 30 mins
    Role-Based Expert Enhancement Platforms (REEPs) are the future of embedded Artificial Intelligence.

    Amalgam Insights believes that the key to success for artificial intelligence is embedded AI aligned to role-specific and industry-specific challenges. The goal is to provide focused outputs that enhance the best judgment of subject matter experts. This leads to a core mission of Amalgam Insights: improving the consumption of enterprise technology.

    Based on interviews with dozens of enterprise application platform users, application vendors, and machine learning providers, Amalgam Insights described how lessons from embedded BI and application analytics can be used to create the next-generation of embedded AI and embedded machine learning applications.