Hi [[ session.user.profile.firstName ]]

CISO Career Development Series

On May 16 we will be kicking off our CISO Career Development Series with AMTRAK’s CISO, Ron Baklarz. Ron will be discussing the salient points of his career path while touching on how the typical CISO career path has changed over the last decade. Specifically, he’ll venture into how the CISO role
On May 16 we will be kicking off our CISO Career Development Series with AMTRAK’s CISO, Ron Baklarz. Ron will be discussing the salient points of his career path while touching on how the typical CISO career path has changed over the last decade. Specifically, he’ll venture into how the CISO role itself has morphed from purely technical to a more holistically business-minded position. He’ll touch on typical challenges that new CISOs encounter as well as some best practices that have served him well over his long career.
Recorded May 16 2012
49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ron Baklarz
Presentation preview: CISO Career Development Series
Recommended for you:
  • Date
  • Rating
  • Views
  • How to build an awesome customer experience How to build an awesome customer experience Brian Boroff, Asana Recorded: May 31 2016 63 mins
    Speakers:
    * Brian Boroff, Head of Customer Success and User Operations, Asana
    * Jon Ferrara, CEO/ Founder Nimble
    * Stewart Rogers, Director Marketing Technology, VentureBeat


    Customer experience is a tough one -- we all have seen those businesses who think they're building a great scalable customer experience, but have customers who might not have the same opinion. And it's not enough to build a great product -- we define ourselves in the marketplace through each and every interaction we have with the customer.

    You might understand that the reason you're doing something is for a very valid business reason, but the customer may interpret that action entirely differently. And your world class customer service can sometimes start to falter as your startup organization adds more resources and more layers -- good for your growth but sometimes risking the very people who made your company successful. Ouch.

    Customer engagement doesn't take costly tools and high priced business analysts -- but it's also not always intuitive. We're going to show you some no-nonsense ways to keep customers loyal and driving growth while also building amazing customer experience that scales along with your business. Our panel of experts will share tactics and strategies that will help you kick start and refine your approach to delivering service -- and helps your company grow even faster.

    In this webinar you'll:

    * Understand what your customer wants and needs throughout the product lifecycle.
    * Learn strategies for rethinking the role of customer service within the organization
    * Create a new process for empowering employees to retain a top tier customer experience
    * Identify potential obstacles that may be causing customer attrition

    SPONSORED BY: Desk.com
  • Empower your mobile workforce: Enterprise Mobility Management made simple Empower your mobile workforce: Enterprise Mobility Management made simple Alex Shteynberg Technology Architect; David Hansford Technology Architect, Microsoft Corporation Recorded: May 31 2016 45 mins
    Your workforce is using 3+ devices, is working from many locations, uses both business apps and a plethora of personal apps, and all while expecting to access their data easily and securely. How do you implement a solution that empowers your workforce while protecting your Corporate assets and resources? Discover Enterprise Mobility Suite (EMS) - a comprehensive cloud solution designed specifically to address the challenges of a mobile workforce.

    Join this webcast to learn:

    What components make up EMS
    How to get up and running with EMS
    How to provide secure access to corporate data
    Protect everything—across devices, operating systems and applications
  • Neue Betrügerische „Hochstapler-Emails“ - Geschäftsführung als Angriffsvektor Neue Betrügerische „Hochstapler-Emails“ - Geschäftsführung als Angriffsvektor Marc Lindenblatt, Presales Engineer Proofpoint Recorded: May 31 2016 40 mins
    Proofpoint stellt neue dynamische Sicherheitslösung gegen betrügerische Emails vor

    Erfahren Sie in unserem Live-Webcast am 31. Mai, mehr über die Motivation und Folgen betrügerischer E-Mails und wie Proofpoint Unternehmen hilft, betrügerische E-Mails automatisch zu erkennen und vor Cyber-Kriminellen geschützt zu bleiben.
    Betrügerische E-Mails sind aufwendig erstellte Anfragen, die vorgeben von der obersten Führungsebene zu kommen und im letzten Jahr um mehr als 270 Prozent zugenommen haben. Die betrügerische E-Mail ist eine Bedrohung, die Mitarbeiter dazu verleiten soll, Gelder oder persönliche Informationen an Cyber-Kriminelle zu senden. Sicherheits-Tool werden sie nicht alarmieren. Es gibt keinen Erpresserbrief. Ihre Systeme laufen weiter und alles scheint wie immer. Das genau ist der Punkt.

    Erfahren Sie in dem Webcast
    • Wie diese betrügerischen Emails aussehen und warum sie so „gut“ funktionieren
    • Welche Auswirkungen diese betrügerische Emails auf die Security-Landschaft haben
    • Warum dynamische Analysen helfen, Unternehmen und deren Mitarbeiter zu schützen
  • Social media 30-minute series: Hard lessons for social advertisers Social media 30-minute series: Hard lessons for social advertisers Stewart Rogers, Director of Marketing Technology, VentureBeat Recorded: May 26 2016 33 mins
    Let’s face it. Most consumers are less likely to click on keyword searches served up by Facebook than they are to run in place to get their 10,000 steps on FitBit. Does it pay to pay for social advertising marketshare? That is the existential dilemma faced by all social media marketers.

    Take Instagram. Once upon a time, they were the darling of social advertising and engagement, but a recent report indicates a 40% drop off in the interaction rate in 2015. According to some experts, one of Instagram’s biggest changes was an increase in advertising; namely that instagram ads were pushed out to everyone around the world. Like a warning to social advertisers everywhere, the all ads all the time approach resulted in a dramatic decrease in engagement.

    With more engagement comes more responsibility and an increasingly intelligent audience will be quick to yawn and then to resent an overly aggressive advertising effort. Join us for a discussion of what went wrong and how to do social advertising right.

    In this webinar you’ll learn to avoid similar mistakes, including how to:
    * Use not abuse user engagement
    * Target and personalize ads to maximize ROI
    * Understand the difference between social advertising and advertising
    * Identify which social channels are most effective for which advertising

    Register for free today!

    Panelists include:
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Travis Wright,Chief Marketing Technology Officer, CCP Global
    * Nancy Smith, CEO Bevy.co
  • Making games pay: Data secrets for monetization Making games pay: Data secrets for monetization Dean Takahashi, Games Beat Editor, VentureBeat Recorded: May 26 2016 62 mins
    Most games need to make money. It’s a simple reality. In free-to-play games, this can be a formidable challenge when players are under no obligation to pay. Forcing players to pay is not a good plan - they’ll only leave disgruntled. The trick is to inspire player engagement, long-term retention, and multiple payments. But that’s easier said than done, right?

    We can show you how to rock a bottom line without turning off your best players, and make cash hand over fist in the process. The secret lies in data - what to measure, what to ignore, and which actions to take based on those KPIs.

    Using data has been proven to increase profits and player satisfaction. Sound too good to be true? Join the webinar and discover how data covers all bases you need for a lucrative game.

    Learn how to:
    * Target the right players, and the key engagement strategies that work
    * Maximize profits from ads and IAP, and which players are most receptive
    * Predict and measure the lifetime value of players by acquisition channel
    * Apply killer strategies, taking lessons from the most successful games
    * Unlock the lesser-known data secrets behind monetization

    Sign up now!


    Speakers:

    * Dean Takahashi, GamesBeat editor, VentureBeat
    * Stefano Melucci, VP of Product, Thumbspire
    * Mark Robinson, CEO, DeltaDNA
    * Jon Burg, Product Marketing Lead, AppsFlyer

    Sponsored by DeltaDNA
  • Visibility into the Modern Threat Landscape: Thinking Beyond the Network Visibility into the Modern Threat Landscape: Thinking Beyond the Network Ryan Kalember, Cybersecurity Strategist, Proofpoint Recorded: May 26 2016 47 mins
    Attackers today do not just use one channel to launch their targeted attacks – they use all of them. Emails, links posted to social media, and even apps in public app stores are all part of the modern cybercriminal’s arsenal, and many of these attacks are invisible to traditional security tools. Join this webinar and learn how to protect the cloud-enabled, mobile-friendly, and socially networked way users work today.
  • CA ARD: efficienza ed ottimizzazione dei test tramite un approccio Model-Driven CA ARD: efficienza ed ottimizzazione dei test tramite un approccio Model-Driven Domenico Maracci - CA Technologies Recorded: May 26 2016 28 mins
    In un momento in cui le iniziative IT corrono di pari passo col business, l’abilità di comunicare i requisiti di business in un modo che sia direttamente comprensibile all’IT diventa un imperativo. CA ARD utilizza l’approccio Model Driven Testing per eliminare ambiguità nei requisiti, ottimizzando i cicli di test garantendo totale test coverage.
  • Ransomware: Dark Money and Emerging Threats Ransomware: Dark Money and Emerging Threats Michael Aguilar, Business Product Technical Lead, ESET North America Recorded: May 25 2016 55 mins
    You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
    Join an ESET business product technical lead to learn:
    •How ransomware has evolved and spread
    •Why mobile phones and Apple OS X are increasingly vulnerable
    •Best practices for avoiding and dealing with ransomware
    •Why to implement backup and recovery solutions now
  • Transactional Analytics Delivers Greater Visibility With End-to-End Monitoring Transactional Analytics Delivers Greater Visibility With End-to-End Monitoring Eric Odell, Dan Iuster, Dana Gilboa Recorded: May 25 2016 61 mins
    Poor application performance and crashes cost millions of dollars to businesses globally. Yet, recent surveys show that only 26% of application teams will proactively examine user experience metrics in production. 72% of app teams first learn of UX issues through user complaints.

    Today’s impatient and intolerant user is quick to abandon slow performing, crashing and error prone apps. So it is up to application teams to quickly isolate issues, understand what went wrong and know how to fix it fast.

    Join us for this webinar and learn how HPE AppPulse Trace cuts through the complexity of isolating transaction performance issues. During this live webcast, user experience experts will demonstrate how to correlate performance issues from the user action to service code execution and diagnose issues down to the line of code and log messages.

    During this Webinar, you will learn how to:

    Quickly drill down to server-side transactions for rapid investigation of performance bottlenecks
    Trace transactions from the browser or mobile app all the way to the backend
    Trace all aspects of transaction execution including end-to-end flow, code timing, contextual logs, exceptions and database queries

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: CISO Career Development Series
  • Live at: May 16 2012 5:00 pm
  • Presented by: Ron Baklarz
  • From:
Your email has been sent.
or close
You must be logged in to email this