Low-code platforms have become a critical factor in helping AD&D organizations rapidly deliver applications to win, serve and retain customers.
With these platforms, enterprises are routinely delivering apps much faster than conventional methods. But can these platforms truly scale across the full modern app lifecycle? What are the top use cases for deploying a low-code platform?
Join John Rymer of Forrester Research for an engaging discussion about the innovative ways organizations are utilizing low-code platforms across the app lifecycle. Hear from IT executives with Autoliv, Estafeta and NES Financial as they talk candidly about how low-code platforms have driven growth and competitive advantage in their organizations.
IT security risks are changing, and undoubtingly increasing in complexity and frequency. Enterprises across the globe are struggling to not only keep up, but to maintain a secure network environment. From a recent breach by hackers to gain sensitive information of more than 100,000 taxpayers, to the breach of 110 million consumer records, the cyber threat landscape is getting worse every year. Hackers are faster, and organizations are taking longer to discover the breaches, giving thieves hours, days, and even weeks to explore the most private and sensitive company data.
Gemalto has identified key steps to help secure your enterprise network, certainly one of the first areas fraudsters attempt to infiltrate.
Join us on September 28th for an informative presentation that will help you plan a strategy to protect your most critical assets.
VMware Horizon View allows IT organizations to deliver virtual or hosted desktops and applications through a single platform to users. The success of these virtual desktop deployments is linked to the user experience: virtual desktops have to deliver better performance than physical desktops.
The heterogeneous, multi-tier, inter-dependent nature of the underlying infrastructure makes performance monitoring, diagnosis and reporting a challenge. When users complain that “the virtual desktop or application is slow”, IT administrators often struggle to determine the actual cause of the problem. Is it the network, database, application, virtualization platform, connection server, storage or the virtual desktop?
This webinar will help you learn how to unlock the benefits of desktop and application virtualization by enabling your organization to monitor, diagnose and report on the performance of your VMware Horizon View infrastructure.
Robots and drones have captivated us for more than half a century. When you think about a robot, you might automatically think about Rosie from the Jetsons. However, the next revolution of robotics will be very different than what you think. Robotics will enhance everyday life by enabling a broad range of applications from smart home to healthcare and transportation.
Why now? Historically, robots have been pre-programmed to complete tasks in industrial settings, but thanks to the same technology powering our smart phones, robots are poised to evolve into intelligent, intuitive machines capable of processing their environments quickly and efficiently - both on the ground and in the air. Robots will be seamlessly integrated with everyday life, handling tasks once too time-consuming or tedious for us.
In this webinar, we'll discuss:
*The key consumer and commercial applications of robots and drones
*The role robots will play in societies and economies
*How smartphone technologies will pave the way to robotics' future
* How cognitive technologies will transform our lives and business
* How Qualcomm is fostering innovation and helping the ecosystem
* The foundation of many IoT applications in shaping the way to robotics
Jim McGregor, Principal Analyst, Tirias Research
Andra Keay, Managing Director of Silicon Valley Robotics
Anthony Lewis, Senior Director of Technology, Qualcomm
Maged Zaki, Director of Technical Marketing, Qualcomm Technologies, Inc.
There are many ways in which people approach adding real-time communications with WebRTC to their service. While the dominant approaches are probably self development and using a WebRTC PaaS vendor, there’s a wider range of approaches.
In this session, Tsahi Levent-Levi, consultant and analyst of everything WebRTC, will go over the various approaches, revealing their advantages along with real vendor use cases.
We've all heard how DevOps can greatly accelerate velocity and efficiency. The challenge is how to transform an enterprise which was not born with the cloud, with established processes and systems. Join us on this webinar and hear how HP IT is making the move from:
• organizational silos to integrated teams and continuous delivery pipelines
• physical systems and storage to cloud infrastructure and Docker containers
• templates and forms to infrastructure-as-code
• change requests to change records
IDC Announces the Best Vendors for Client Computing Software
In the multi-device workplace, there are many vendors IT can choose from to better manage applications and desktops. So, which vendors offer the best client computing solutions with a commitment to long-term end-user computing innovation?
Find out how a variety of vendors compare and the reasons why VMware has moved into the Leaders category in the IDC MarketScape: Worldwide Virtual Client Computing Software 2015 Vendor Assessment.
Join us and learn:
Which vendors are well aligned when it comes to customer needs
Which vendors offer the best client computing solutions with a commitment to long-term end-user computing innovation?
Which vendors have the commitment to providing resources and continued expansion of the EUC infrastructure
Are you communicating with your customers the same way you did 5 years ago? As technology evolves, so do your customers’ communication preferences. The customer service industry has seen a significant increase in SMS (aka texting) due to its ability to deliver convenient, proactive service for today’s on-the-go customer. Register for our webinar to learn how SMS technology can help you lower wait times and keep your customers informed.
In this webinar you’ll learn how SMS can:
- Reduce wait times and lower call volumes
- Help you stay proactive with your customers
- Mitigate risks for your business or customers
- Pair well with other communications solutions
Getting more from your UC investment:
Using Cisco APIs and SDKs to extend Cisco functionality directly to your users
Cisco provides APIs and SDKs which allow users to integrate their existing or new products on top of Cisco's UC platforms. Most customers don't realize these features are available to them out-of-the-box with their Cisco products.
Join us for a discussion and demonstration of how some of these APIs and SDKs, including the Jabber SDK, AXL API and other UC specific integrations that Cisco packages with their popular UC products.
In 2014, Hogan-De Paul joined the ranks at NYC-based Akkadian Labs as an experienced software engineer, specializing in custom Cisco Collaboration software with the company. His day to day role consists of gathering customer requirements, designing, testing, and implementing custom software solutions on top of Cisco VoIP platforms. Previously, Peter has also worked on configuring Cisco device firmware and technical marketing for VoIP based services. Peter graduated in 2013 from the New Jersey Institute of Technology with a degree in Software Engineering, with previous education credits from Rensselaer Polytechnic Institute and Stevens Institute of Technology.
Learn how to use the latest advances in cloud communications to activate your customer data and call activity into profitable sales accelerators. Every day, you collect more data in your CRM and telephone call reports. 8x8 will show you how to turn that data into higher close rates and more satisfying customer engagement experiences and provide you the analytics tools required to measure the results.
Jeff Melnick, Manager of Sales Engineering, Netwrix Corporation
According to Verizon’s “2015 Data Breach Investigation Report,” the cyberattacks are becoming increasingly sophisticated. Cybercriminals have been successful in creating new techniques and deceptive tactics that outpace security efforts. Under these conditions, what would be your approach to dealing with security threats?
Join us for a live webinar session and discover how auditing can help mitigate the risk of data breaches and solidify your security strategy overall. During the session, we will talk about:
- The latest data breaches and their ramifications;
- How auditing complements threat-defense mechanisms;
- What should be audited and why.
Today’s cyber attacks have become increasingly more sophisticated, requiring organisations to embrace an agile and ever more adaptive approach to their cyber security strategy. Join our webinar as we discuss the changing landscape of advanced threats in EMEA, look into the anatomy of APTs and explain why conventional security methods are no longer equipped to deal with these advanced attacks. In addition, we’ll share insights into real-life case studies of advanced threat actors using zero-day attacks and how an adaptive defense model allows FireEye to quickly respond, detect and remediate such attacks.
Jason Creasey, Information Security Consultant, Jerakano
Jason will introduce some of the major challenges associated with monitoring and logging cyber security events, highlighting the need to identify indicators of compromise at a much earlier stage and in a more consistent, insightful manner.
He will present a cyber-security monitoring framework, emphasising the benefits of taking a balanced, intelligence-led approach, based on fundamental log management and situational awareness. He will then look at what a cyber-security incident actually is and outline how to prepare for and respond to a cyber-security incident effectively – ensuring that it is properly followed up - helping to reduce the frequency and impact of future cyber security incidents.
Finally, Jason will introduce a cyber-security incident response maturity model, showing how you can measure the maturity of a cyber-security incident response capability.
The growing sophistication and evasiveness of cyber threats have redesigned the paradigms of the information security landscape. Since traditional signature-based technologies alone cannot keep the pace with advanced threats, a breed of new technologies has been developed to fill the gap in what seems an endless arms race against malware creators. In the same time, the volatility of the perimeter, direct consequence of the growing adoption of cloud services, dramatically broadens the vulnerability surface of the organizations, requiring a new approach for the CISOs in terms of both technologies and policies.
In this webcast we will analyse the current threat landscape related to advanced malware, demonstrating that, unlike what is commonly believed, it is not necessarily related to state-sponsored operations, but it is frequently used even in opportunistic attacks (and in several cases also available as a P/SaaS model).
After showing the characteristics that make a malware “advanced” (evasion at the endpoint and network level, polymorphism, etc), the webcast will outline the foundations of a multi-layered approach needed to detect, contain and mitigate the threats posed by advanced threats.
Ginny Turley, Director of North American Marketing
While network security encompasses both the physical and software preventative measures to prevent and monitor unauthorized accesses or misuse of a computer network, the adoption of a password management policy and strategy can be foundational to the prevention of unauthorized uses of network resources. In many cases, simple password management is the weakest link. In this webcast, we'll explore what needs to be done to strengthen this important and oft overlooked aspect of network security and discuss password synchronization, and self-reset functions that can save time and money - and a lot of post-it notes as well.
Diana Garcia, Customer Onboarding and Training Manager, PhishMe
As spear phishing continues to be one of the top security threats, enterprises have looked to user training programs to bolster their defenses. One of the main challenges security awareness professionals face is implementing a phishing training program which shows continuous improvement and value to their organization. How do you start and build upon a training program to showcase continuous success?
The key to implementing an effective program is to focus on the biggest threats and leverage behavioral metrics to drive your program. During this webinar, Diana Garcia, Manager, Customer Onboarding and Training, will cover:
-How do you implement a phishing awareness program and run it continuously?
-What are the key elements of a successful program and what does it look like?
-How do you show the value this program and your trained users add to the security organization?
Araldo Menegon, Global Managing Director, Financial Services, Fortinet and John Bryant, CTO of Options
Fortinet protects the most valuable assets of the largest financial services institutions across the globe. Learn how they provide high-performance protection against cyber-threats by hearing from security experts and key customers.
David Dufour | Senior Director of Security Architecture
Traditional cybersecurity approaches aren’t effective in the world of IoT with the vast disparity in device capabilities, resource constraints and architectural designs. This diversity has created an environment where attacking the IoT infrastructure of an organization will become more common place. This presentation will discuss what can be done in the near term to help protect against attacks on the varying device types and their ecosystems.
Andrew Hay, Director of Security Research, OpenDNS & Meg Diaz, Product Marketing Manager, OpenDNS
Many have hypothesized about the security impact of the “Internet of Things” (IoT) for enterprises, but for the first time, we have actual data on the potential security risks introduced by these devices—and the results may surprise you!
Andrew Hay, Director of Security Research at OpenDNS, conducted a multi-month study on the prevalence of IoT devices in enterprise networks. In this webcast, Andrew will walk through the key findings, including:
The prevalence of IoT devices—even in the most regulated industries—and which devices are most commonly found
Where IoT hosting infrastructure is located on the internet
Vulnerabilities found in IoT hosting infrastructure
Implications to consider for your security program
How to gain IoT visibility in your enterprise network
- See more at: https://www.opendns.com/enterprise-security/resources/webcasts/internet-of-things-in-the-enterprise-the-data-behind-the-risks/#sthash.INikZJu0.dpuf
In this cloud DLP webcast, “Cloud Security Alliance and Elastica: Revealing Shadow Data”, Jim Reavis, CEO of CSA, and Elastica delve deeply into the Elastica Q2 2015 Shadow Data Report and share insights into how organizations can unlock the full business potential of cloud apps and the sensitive corporate data stored in them, while staying secure and compliant.
In addition, Ben Munroe from Cisco shares his insights into how Cisco is addressing the cloud data loss prevention problem.
Looking beyond Shadow IT, this webcast examines:
• What types of sensitive data are typically found in cloud sharing apps (PHI, PCE, and PII)
• Which vertical industries have the riskiest exposures (Hint: its healthcare) and what steps can be taken to mitigate the these risks.
• Why managing Shadow Data is the next critical step in protecting cloud apps beyond just controlling Shadow IT.
• How to build an effective cloud app security architecture that provides visibility, control, and remediation.
You can’t defend against something you don’t understand. Most network attacks are actually easy to understand if you have the right background. Join SolarWinds’ Mav Turner to review the basics of network security. He will discuss key concepts and core networking technology necessary for a solid foundation to secure your infrastructure.
Technology trends such as cloud, mobile, and collaboration help businesses boost growth and competitiveness but each brings it own set of security gaps that give attackers a clear path to slip malware into the network, evade detection, and steal valuable information.
In 2014, global malware attacks increased by 136%. Attackers launch twice as many unique attacks. These are trying times for every organization as it faces elevated risk from the latest threats and cyber-criminals bent of greed and nefarious deed. Join us as security experts look at some of the latest security challenges and discusses the building block of developing a resilient security defense system to help you effectively combat evolving threats as they emerge.
You will learn how to better protect your networks as well as yourself with solutions that reduce work for IT and security teams.
In this webinar, you will:
1. get up to speed on the current threat landscape
2. discover ways to take advantage of modern-day network security tools and services for ongoing protection against new threats
3. learn why it truly counts to have a nimble threat research and response team working for you
4. and why it truly makes a big difference to have multiple layers of threat protection to bolster your security posture
Mark Allen, Technical Sales Engineer and Bjorn Hovd, Technical Sales Engineer
They may be the oldest tricks in the book, but SQL injection and cross-site scripting (XSS) attacks still put a hurt on thousands of web applications every year, impacting millions of users—your users and customers. SIEM solutions are essential in finding these exposures quickly, by collecting and correlating data to spot patterns and alert you of an attack. Join us for this demo to learn more about how these attacks work and how AlienVault USM gives you the built-in intelligence you need to spot trouble quickly.
How these attacks work and what you can do to protect your network
What data you need to collect to identify the warning signs of an attack
How to identify impacted assets so you can quickly limit the damage
How AlienVault USM simplifies detection with built-in correlation rules & threat intelligence
Its taken decades for the leading financial services firms to establish trusted relationships with their customers - but that trust can be shattered in seconds with the click of a fraudulent email. Don't let cybercriminals misuse your brand, creating spoofed emails purporting to be from you, attacking your customers.
Learn to identify how fraudsters are impersonating financial services communications and what you can do to take back control of your email communications - so that the only emails your customers receive are the ones you are legitimately sending.
Mike Woodward, Program Director of Data, BitSight Technologies
Some cyber security analysts called 2014 “the year of the retail breach” due to major breaches affecting major American retailers and leading to millions of compromised customer records. Cyber security has continued to grab the headlines over the past year, as major breaches have affected companies across all industry sectors, from healthcare to finance.
Join this webinar to learn more about the security performance of six major industry sectors: finance, government, retail, utilities/energy, healthcare and education. Mike Woodward, Program Director of Data will reveal interesting insights into the performance of each industry based on BitSight’s proprietary Security Ratings data.
Attendees will learn:
- What are Security Ratings and how are they developed
- How and why does security performance vary across different industries
- Which industry sectors are still vulnerable to Heartbleed, POODLE and FREAK
- What botnets are trending across different industry segments
Michael Osterman, President, Osterman Research, Inc.
File sharing is the single most common activity on corporate networks and between companies, and email is still the most-used channel for file sharing. It’s easy, it’s ubiquitous, and it gets the information to its destination with a single click. So what’s the problem with sharing files via email?
Register today to hear Michael Osterman, President of Osterman Research, and Peter Brown, Director of Product Marketing, Intralinks, review:
•The drawbacks and costs of relying on email for file sharing
•The problems organizations face when employees turn to consumer-grade file sharing tools as a solution
•The steps that organizations should consider for enterprise collaboration
All registrants will receive a complimentary copy of the Osterman Research report “The Critical Need for Enterprise-Grade File Sync and Share Solutions,” including data from an in-depth survey on file sharing practices.
Matt Johansen, Director of Security Services & Research, WhiteHat and Jonathan Kuskos, Manager TRC Europe Ltd, WhiteHat Secur
Every year, our adversaries gain more intelligence and the number of attacks on our applications increase. The damage of these attacks are costly to organizations, reaching millions of dollars a year. The Top 10 Web Hacks Webinar, now in its ninth year, represents exhaustive research conducted by a panel of experienced security industry professionals.
In this webinar, you will learn:
•The top web hacks, ranked by your peers and a panel of industry experts
•How to protect your organization against these attacks
•Industry wide research on new advanced attack techniques
Files and emails are business necessities, but many companies struggle to stay productive, secure, and cost-efficient in the face of so much data.
Join our webinar to learn how connecting the data dots will help you:
* Find and access data faster, no matter where you are
* Be secure and compliant, because you’ll discover and eliminate vulnerabilities you never knew you had
* Automate manual tasks so you can reallocate your time to more important projects
* Save on storage costs by identifying and eliminating stale data
John Kindervag, Forrester Research and Seth Goldhammer, LogRhythm
60% of breached organizations included in the 2015 Verizon DBIR were initially compromised within minutes, and yet for most of those organizations it took hundreds of days to detect the intruders.
Fortunately, an intrusion does not equal a breach. In fact, there are usually several steps that typically follow an initial compromise before the bad guys get away with the goods or disrupt a critical service.
Detecting early warning signs such as an initial system compromise, command and control activity or suspicious lateral movement of intruders can provide the necessary lead time to respond and neutralize a threat before the intrusion leads to a material breach.
In this webinar, our guest speaker John Kindervag, Vice President, Principal Analyst at Forrester Research, and Seth Goldhammer, Director of Product Management at LogRhythm, will discuss how pervasive visibility and big data security analytics, when coupled with intelligent automated response, can substantially reduce an organization’s risk of experiencing a material breach or cyber incident.
Attend this webinar if you:
1. Are seeking to reduce your organizations meantime-to-detect (MTTR) and meantime-to-respond (MTTR) to cyber threats
2. Struggle to find the needle in the haystack of security events
3. Believe your current incident response process lacks adequate automation and efficiency
4. You have a first-gen SIEM platform deployed and are frustrated by its complexity or feel that you still have significant blind spots
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.