After a record-setting year in 2015, where will the tech M&A market go in 2016? What trends that pushed M&A spending to its highest level since the Internet Bubble burst will continue to drive deals and which ones will wind down? What other sectors are likely to see the most activity this year? And most importantly, what valuations will be handed out in deals over the coming year? Drawing on data and views from across 451 Research, the Tech M&A Outlook webinar maps many of the major developments in the IT landscape (IoT, Big Data, cloud computing) to how those influence corporate acquisition strategies. Join us for a look ahead to what we expect for tech M&A in 2016.
Everything is getting digitized - everything is becoming “software empowered”. Who is writing all this software? It is central IT or is it business IT and the third parties they employ? How can central IT ensure that it is relevant this exciting new, software empowered, world?
The new release of Scaled Agile Framework Version 4 features extensive refinements to many elements of the framework, as well as new content and guidance that helps enterprises better organize around value delivery, develop systems that include hardware and software, and improve development, coordination, and delivery of value streams.
In this webinar, Dean Leffingwell will highlight what’s new in SAFe 4.0:
• SAFe now supports both software and systems development
• a new Value Stream Level – including new roles, activities and artifacts – is provided for those building the world’s largest systems
• Enterprise Kanban systems manage the flow of work across all systems
• the SAFe Requirements Model has been updated to reflect additional backlog items and to clarify the expression for each
• built-In Quality practices now support software and systems development
• and much, much more!
Register now to hear Dean speak about SAFe 4.0 in this exciting webinar!
Evidence is mounting that traditional batch and blast email marketing is broken. Without the ability to smartly segment and truly personalize email campaigns based on consumers’ actual behaviors on web and mobile, brands are simply turning up the volume in an attempt to rise above the noise.
To get noticed in an increasingly crowded inbox, marketers must be able to leverage contextual customer data to effectively engage their audience and drive results. Join the upcoming webinar, “5 Ways to Use Mobile Behavioral Data to Send Engaging Emails” to see how brands can create impactful emails that are ideal for a mobile-first world.
Kahuna’s Doug Roberge will lead a panel discussion including Yummly’s COO Brian Witlin about how innovative companies are rethinking email. This includes leveraging insights from consumer behavior across all channels to deliver the right message to the right person on the right channel.
After this webinar, you’ll:
* Create email campaigns that incorporate cross-channel behavioral data
* Understand the role of email in a holistic omnichannel experience with push, in-app, and more
* Learn how intelligent communication plays a crucial part in each customer’s individual journey
Please join us for “Five ways to increase email engagement through mobile behavioral data” on January 27, 2016. Even if you can’t attend live, registering ensures you’ll have on-demand access to the webinar materials. Save your seat today!
Microsoft’s Enterprise Mobility Suite (EMS) allows you to manage devices, applications, and access simply and securely. In this webinar, we will dive deeper into this industry-leading solution and discuss some of the newest features.
Register for this webcast to learn about:
•New EMS features, including Advanced Threat Analytics (ATA) and Mobile Application Management (MAM)
•How to provide remote access and single sign-on to on-premises web applications with Application Proxy
•Azure AD auditing capabilities, and how you can easily report on security events for any Azure-AD protected application or service
Register now to watch live or receive notification when this program is available on-demand.
Reliance on IT to support business’ strategic goals and objectives are continuing to increase year over year. With this heavy reliance, IT organizations are modernizing and transforming the way they deliver services.
Join ServiceNow and Okta, as they review the key strategies and solutions for Identity and Service Management that unite and automate IT processes. Watch this webinar and learn how to:
•Standardize service processes by automating request fulfillment and user provisioning
•Consolidate redundant legacy IT service tools to a single system of record
•Secure connections between people and technology
In 2016, it's time to revamp your mobile app strategy.
It’s no longer enough to target mobile customers based on bare-bones demographics. Now you need to understand who your customers are by segmenting them based on in-app behaviors. This includes their interests, activities, and even the times of day they’re most likely to interact with your business.
To kick off new year, we’re laying down the law in The State of Mobile 2016. Alongside top mobile brands, we will analyze key learnings from the past year — the strategies that succeeded and the surprises that didn't. Next, our speakers share their biggest mobile secrets, including predictions and plans for the rest of the year.
These real-life case studies will help inform your 2016 mobile marketing strategy.
In this webinar, you'll:
* Optimize your user onboarding to improve lifelong retention
* Learn about tools you didn’t know existed for driving deeper personalization
* Triple mobile push notification opt-ins through new tactics that are proven success factors
Relationships are hard work. Relationships in the modern mobile age are about ten times harder. It comes down to more than just a message and smart branding – it's one part heart, one part messaging and about four parts data science. What worked yesterday probably won't work today and it definitely isn't going to be good enough tomorrow.
Publishing superpowers CBSi and Thrillist are two best in class examples of mobile success stories. CBSi of course comes from the same organization that gave our great grandparents the news – this monolithic media company has now transitioned gracefully into the digital age. VentureBeat lifestyle peer Thrillist, meanwhile, is dominating the new media publishing space. What do they have in common? Each of these titans adopted to changing usage models through predictive tech and machine learning to build robust user data banks.
We’ll learn how they’re delivering relevant user experience at scale. We’ll find out how they went mobile to triple their user engagement and find out how machine learning can be applied in actionable ways to increase personalization and deliver bottom line results – today.
By attending this webinar, you’ll
* Learn how to use machine learning against user profile data to increase user engagement.
* Boost user engagement and retention by 300% through predictive technology applied against email, website and mobile deliverables.
* Get the scoop on how digital marketing is changing – and is no longer the same space as it was last year.
* Michael Powers, Vice President of Product, CBSi
* Ken Peltzer, Vice President of Technology, Thrillist Media Group
* Andrew Jones, Analyst, VentureBeat
* Wendy Schuchart, Moderator, VentureBeat
Register today for this free interactive web event and get the opportunity to have your burning questions answered by Powers and Peltzer LIVE in the panel discussion.
More than 8 out of 10 customers are moving from one channel to another to complete a transaction or get an issue resolved. And, on average, they use more than 4 different “channels” over the course of their respective journeys. Despite this, customers expect consistent answers and personalized service regardless of their channel preference, device of choice and time of day.
Join Dan Miller, Lead Analyst at Opus Research, and Daniel Hong, Sr. Director of Product Marketing and Strategy at 7 as they review these recent findings and their impact your self-service and assisted service strategies via text, chat, Web forms or phone calls. Dan will bring context from a recent study of Enterprise Intelligent Assistants (EIAs), culminating in the “8 Attributes of Successful EIAs”. Daniel will review primary research findings addressing both practices and preferences of customers in a digital, omnichannel world. The webinar will also include a case study.
Attend this webinar to refine your company’s digital customer experience to keep your customers in charge, even when it’s a classic self-service situation, including:
The Eight Characteristics of Highly Effective Intelligent Assistants
How a Smart UI supports a delightful UX
Making your investment in CRM, Analytics and Knowledge Management support AI
Hear about Playtech’s story of a successful deployment of predictive analytics monitoring method. Playtech implemented the Predictive Analytics as a complementary monitoring to allow additional fault detection in places where standard monitoring can’t be applied. Using its business activity as a health indicator, problems are detected faster, sooner and even before it gets to a complete downtime.
Join us to hear about:
How monitoring your business metrics can provide another method of monitoring
How Predictive Analytics can help detect faults
Why dynamic thresholds can be better than static thresholds.
How easy it is to implement Predictive Analytics and help reduce the MTTR in your organization
Jules Pagna Disso, Head of Research and Development, Nettitude
The success of cyber threat intelligence is measured by its effectiveness in reducing the impact of malicious actors. It is therefore important to understand the economy of malware in order to break the chains of success of such economy. Such success needs to be materialised by a change in attitude, policies and configurations.
Whilst applicable to most organisations, most examples used during this seminar will feature the financial sector and aim to:
· Analyse the core components of the economy of malware
· Analyse how to gather intelligence to reduce the impact of malicious actors
· Show how to use the intelligence gathered to improve the security posture of the organisation
Jack Nichelson and Kevin Merolla, Chart Industries and Barry Fisher, OpenDNS
We all know that security gaps are widening due to technology shifts and advanced threats. Whether you are in finance, energy, tech, or manufacturing, the infosec challenges are much the same.
Chart Industries — a global manufacturer with 5,000 employees and 45 locations — was facing a huge volume of malicious activity every day resulting in excessive break-fix work for their small security team. They had thousands of unmanaged mobile and guest devices connecting to their networks. And neither web proxies nor endpoint security could fully protect them. They needed a new layer of malware and breach protection. But it also had to be a painless deployment and it needed to be a transparent experience for their employees and guests.
Hear directly from Jack Nichelson, Chart’s Director of IT Infrastructure and Security to learn:
-Why they use a layered approach to security and how OpenDNS complements their security stack
-How long it took to deploy OpenDNS Umbrella globally
-How his security analyst, Kevin Merolla, quickly responds to incidents or false positives using OpenDNS Investigate
Chanel Suggs, IT Security Manager, Professor and Advisory board member, EC-Council
The future for women in Cyber Security is NOW.
Despite the growing demand and tremendous opportunities in the job market, cyber security remains an area where there is a significant shortage of skilled professionals regionally, nationally and internationally.
At EC-Council University we want to empower and recognize women who are results-driven and able to manage multiple disparate tasks while leading groups to achieve positive outcomes and astonishing professional successes.
Even worse, women’s representation in this male-dominated field of security is alarmingly low. Women are detail oriented with an analytical mind that quickly assess and achieve solutions to the most difficult problems, prioritizing and executing in a rapid, dynamic environment.
“At EC-Council University we wish to highlight these prestigious women and set examples for others to follow suit.”
Harris D. Schwartz, Head, Global Cyber Security, Levi Strauss & Co.
Levi Strauss & Co., one of the world’s largest brand name apparel companies and a global leader in jeanswear, enhances its security with threat intelligence to better protect its worldwide operations — including its online and physical stores.
Listen to Harris D. Schwartz, Head of Global Cyber Security at Levi Strauss & Co., explain how Levi Strauss applies real-time threat intelligence to monitor the most critical risks, direct threats, and emerging trends that could impact the organization. Schwartz explains how threat intelligence is used for:
* Real-time alerts on direct cyber threats made on the deep and dark Web including hacker forums.
* Monitoring threats against IT infrastructure, domain, or IPs (CIDR).
* Notifications about breached/exposed credentials.
* Warnings about exploits/attacks/threats/breaches related to suppliers, industry peers, and vendors.
* Creating a daily email digest of top trending and emerging observables: TTPs, including malicious IPs, CVEs, hackers, and more.
Levi Strauss & Co. products are sold in more than 110 countries worldwide through a combination of chain retailers, department stores, online sites, and a global footprint of approximately 2,700 retail stores and shop-in-shops.
Harris D. Schwartz is a global security, risk and investigations professional, with over 20 years of private sector experience; experience in the design, development and implementation of comprehensive security, investigations and threat intelligence strategies in a variety of business climates and organization cultures. Schwartz has developed security and risk programs for a variety of business sectors, designing comprehensive threat mitigation solutions, coordination and managing and mentoring of direct reports and multiple departments.
The second in our Lowering Cyber Risk series with a focus on the Financial Services and helping to meet SOX compliance requirements.
Cyber Risk is the Risk most underestimated by businesses according to the 2015 Allianz Risk Barometer.
Learn how organisations are able to lower Cyber Risks associated with Loss Reputation, Business Interruption, and Loss of Customer Data, and thus improving Detection and Response capability.
Discover how you can help to meet SOX compliance requirements by utilising User Behavioural Analytics, monitoring the user’s access to critical systems with required surveillance, forensics and reporting user access.
Plus, see a LIVE DEMO with an example of an internal employee attempting to exfiltrate data from critical systems on a Financial Services environment.
Powerful technologies from the core to the edge are enabling new insights and transforming value creation. But these opportunities create new risks and urgently beg for innovative approaches to securing our most precious information. Learn how a new architecture of cloud security expertise, endpoints and apps will enable high-confidence computing and deliver security and privacy anywhere, anytime.
You can't have a discussion on the next generation of information security without talking about securing the cloud. The “move to the cloud” has long been considered a key initiative by organizations worldwide. With this move, there’s a level of increased risk that enterprises must address. What’s different is using cloud services requires abdicating some control over how systems and data are being protected. We begin this discussion on this footing.
Join Scott Hogrefe, VP of Market Data for Netskope, who will lead this discussion about what security professionals need to know about:
- Their cloud risk
- How to quantify it for their corporate leadership and board of directors
- How to convey it in the context of their overall cloud strategy
- 6 steps to take right now to address cloud security risk
Jeffrey Ritter, External Lecturer, University of Oxford
Security, information governance, and public regulation all share a core value--creating digital information that can be trusted as the truth. But an effective economic business case has eluded security advocates. Making that case succeed requires a new way of counting the value of effective security and measuring the trust that can be achieved.
Something is seriously wrong here. Businesses spend millions every year on the latest security technologies to keep their businesses safe – and then they still get attacked! Why does this continue to happen over and over again, and what can we do about it? This presentation – loaded with compelling research data from many different industry sources – provides revealing statistics on how bad this cyber security problem really is, and why it has continued to get worse despite your best efforts. But, if you’re willing to think differently about network security, there is now a way you can eliminate a huge number of attacks on your network, improve productivity of your IT staff, keep your business safe, and save a significant amount of money in the process. Skeptical, right? Well attend this session, learn the facts, then decide for yourself.
Gemalto surveyed 900 IT decision makers from around the globe on the subject of securing user mobility. Our findings reveal that although most organizations (97%) recognize the importance of mobility in their work practices, 92% still restrict access to resources from mobile devices. Not only were mobile access challenges uncovered, but with 20% of support tickets resulting from lost or forgotten passwords, identity management hurdles were uncovered, as well. Based on the Gemalto 2015 Authentication and Identity Management Index survey results, this webinar covers obstacles encountered by IT leaders in their quest for greater mobility, and four takeaways on how they are overcome.
Big Data has come from nowhere to become an integral part of our daily lives. It is a new and compelling way to see and understand the world we live in. Sadly, the information security industry has yet to harness the power of big data because we just don’t understand it.
This presentation provides a clear, simple and useable perspective on big data to include:
Sian John & Laurence Pitt – Security Specialists, Symantec Peter Ridley, Data Protection - HP
Accessing data from the early morning train could bring your business to a standstill. We can help turn it into a point of protection. Organisations need to work more flexibly and this brings challenges. Managing Data and workers everywhere, along with emerging technologies, can make protecting your information seem like an insurmountable challenge.
We’re holding a series of 3 webcasts on Information Protection, beginning with this one on 20 January 2016. These will feature discussions from a panel of industry experts to guide you through the basics of protecting your information in real-time. We’ll also look at how to use data to drive better decision making, and how the actions you take before, during and after an incident can minimise the impact.
Join your fellow professionals and sign up for the first in the series, No Passwords, No Boundaries, No Problem.
Jitender Arora, Information Security and Risk Executive
We’re often told that security professionals don’t know how to communicate with the board or the executives. But in the attempt to dispel this notion, has the cyber security pendulum swung too far the other way? Have professionals forsaken the skills which made them valuable – and at a time where companies are under attack like never before.
Privileged access is a game of managing risk, and breaches leveraging privileged access exploits will solidify as the ‘attack of choice’ this year. Privileged account credentials with connections to valuable systems give hackers access to critical systems without triggering any alarms, making those people and roles the ideal target for hackers. It’s no wonder that we’ve seen this particular attack vector utilized time and time again, and beyond that, outside third-parties and vendors with privileged access are particularly juicy targets because they often use legacy access methods like tunneling that create unrestricted and unmonitored attack footholds on a network.
Effectively controlling and monitoring privileged access is central to an effective defense in depth strategy. This webinar will offer insight into how to mitigate cybercrime risks and create a winning network protection strategy.
Charles Hessifer, Senior Sales Engineer, ThreatTrack
Join us Tuesday, Jan. 19, to see how ThreatSecure Network, which detects advanced threats and anomalous network behavior to disrupt cyberattacks, integrates with Tenable’s SecurityCenter and Log Correlation Engine (LCE) to streamline threat and risk detection capabilities for your organization.
Learn how this integration will enable teams to:
·Decrease the time of incident detection and reporting
·Analyze data and make informed decisions on threat severity via a single interface
·Demonstrate and determine the impact of malware across the network
·Recognize and respond to post-threat detection changes on critical assets
Discover how to empower your team with enhanced continuous monitoring, compliance, vulnerability and advanced threat detection, and maximize your Tenable SecurityCenter and LCE investments.
Heather Hinton, CTO for IBM Security & Compliance; Sesh Murthy, Cloud Raxak CTO; Raghuram Yeluri, Principal Engineer
Heather Hinton, CTO for IBM Security and Compliance Architecture & Innovation, Sesh Murthy, Cloud Raxak CTO, and Raghuram Yeluri, Intel Security Architect, will discuss how to secure applications across the hybrid cloud through automated compliance. Automated security compliance can reduce cloud security costs up to 50% while also reducing the risk of a security breach. They will discuss the best ways to leverage cloud computing, while staying compliant with the security requirements of regulated industries including financial services, retail, healthcare, and more.
The Hybrid cloud is being embraced by a majority of enterprises of all sizes. A recent survey shows that 74% of enterprises have a hybrid cloud strategy, and 94% of enterprises are using some form of XaaS--software, platform, and infrastructure as a service.
The challenge in moving workloads to the Cloud, has been the cost and complexity of ensuring initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical to maintaining positive ROI.
Raxak Protect is an automated security compliance SaaS platform and managed service, that enables cloud apps to be deployed securely, quickly, cost-effectively, and without human error, across both private and public clouds.
In this webinar, IBM and Cloud Raxak will describe how:
1. To secure IBM dedicated and shared hybrid cloud solutions using Raxak Protect automated compliance.
2. To deliver audit-ready evidence of security compliance for any workload including regulated workloads in finance (FFIEC), healthcare (HIPAA) and Retail (PCI).
3. Raxak Protect leverages hardware features like Intel Cloud Integrity Technology to create an immutable root of trust for assured compliance.
George Anderson, Director Product Marketing and Tyler Moffitt, Senior Threat Research Analyst
Due to the ever-changing nature of the Crypto* family and other ransomware, the sad truth is that no vendor can guarantee 100% protection. But, between advanced defenses with heuristic detection and a solid cybersecurity best practices strategy, it is possible to protect your business and data from these insidious threats.
This webinar will examine:
» How ransomware is developed, and who the newest players are
» Why ransomware is so good at getting around the usual defenses
» Your best chance at beating the threat (and minimizing the impact in the case that you don’t)
Marcelo Pereira, Product Marketing Manager at Flexera Software
As we enter 2016, there is one certainty we all can have: we will continue to see costly breaches using well known vulnerabilities.
In this webinar, Marcelo Pereira will talk about the challenges that stop organizations implementing simple security best practices and suggest New Year’s resolutions related to Software Vulnerability Management that can help reduce the attack surface for cybercriminals and hackers.
Patton Adams, Director of Cyber Threat Analysis and Reconnaissance
Join Patton Adams, experienced network defender and Verisign iDefense Director of Cyber Threat Analysis and Reconnaissance as he presents Verisign’s unique view into the evolving DDoS attack ecosystem and recommendations for staying ahead of these increasingly effective threats.
Throughout 2015, Verisign noted a continued upward trend in the size, frequency and complexity of distributed denial of service (DDoS) attacks against its customer base, including rising average attack sizes and increased targeting of IT Services organizations. In addition, Verisign observed increasing availability of DDoS-as-a-service offerings from hacktivist and cyber criminal groups, and the prevalence of DDoS malware targeting the open-source Linux operating system, among other trends.
Patton Adams is Director of Threat Analysis and Reconnaissance at Verisign iDefense, leading an internationally-distributed team of researchers monitoring, analyzing, and reporting on global cyber crime, espionage, and hacktivist activity. Before coming to Verisign, he led and served on cyber threat analysis teams at Northrop Grumman, supporting the US Army 1st IO Command and Army Cyber Command and later Northrop Grumman’s corporate information security operations. Co-author of the 2012 US-China Commission report, “Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage,” Patton specializes in cyber espionage analysis, strategic geopolitically-focused research, and analytic process improvement for risk mitigation and long-range decision making. He conducted undergraduate studies in Foreign Service at Georgetown University and graduate studies in ancient Cambodian history at Cornell University.
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.