Welcome to the mobile computing community on BrightTALK! With the consumerization of IT and the widespread adoption of mobile devices across the globe, mobile computing has become an important part of many people's lives in a culture of bring your own device (BYOD). With mobile devices doubling as work phones and more employees working from home, businesses need to provide secure access to data and work applications from anywhere at any time. Join this growing community and hear from industry thought leaders in webinars and videos as they share their insight on mobile computing research and trends.
As an organization that delivers and protects 15-30% of the world’s web traffic on a daily basis, Akamai is uniquely positioned to observe a large amount of attacks ranging from 20 malicious HTTP requests containing SQL injection to DDoS attacks up to 650 Gbps. Our security experts analyze this information and share trends, observations, and findings in our quarterly State of the Internet / Security Report. We will present this information and associated insights in this webinar series.
In this webinar, you will learn:
• A summary of global findings from the State of the Internet Report
• Attack statistics for APJ
• How IoT botnets have changed the attack topology in APJ
• The responsibilities for security of IoT
Join Akamai and (ISC)² on May 24 (Wed) at 13:00 (Singapore time) for an overview and analysis of traffic and trends from Distributed Denial of Service (DDoS) and web application attacks.
Half of businesses admit security is their biggest concern to increasing user mobility. Securing enterprise mobility has been an ongoing and arduous topic for IT security professionals. Maintaining high-assurance security, while offering access to company resources to an on-the-go workforce has become a balancing act. So much so, a third of businesses actually prevent employee access to company resources via mobile. This is likely not a long term or sustainable solution to the problem.
So how do you find a compromise that won’t kill your security strategy? There are currently many technologies from derived credentials to mobile PKI. IT professionals are feeling the pressure to find a viable, user friendly, easy-to-deploy and secure options. In this webinar, we will discuss the current solutions in-depth and how they impact your current IT security policies. Attendees will learn more about:
-Software-based security versus hardware-based security
-How this impacts your back-end systems
-Technology such as derived credentials and mobile PKI
-Implementing a mobile PKI solution
The DataMotion SDX Platform for Healthcare is a hub for secure data exchange services – a toolkit that can be used to solve a wide range of sensitive data in motion workflows. Using our API and connector toolkit, solution developers can rapidly meet key regulatory and industry pre-requisites for participating in the programs that are driving healthcare transformation, including Meaningful Use, MACRA/MIPS, and APMs.
To achieve the data security and interoperability standards enabled by DataMotion, developers would need to incur the significant expense of engaging multiple vendors and hundreds of hours of development time.
With WannaCry, Ransomware has once again burst onto the scene, reminding us of the need to stay vigilant. Ransomware attacks have continued to grow with security experts estimating that criminals will collect around $1 billion this year.
Join us for this webinar as we discuss WannaCry, its variants and other Ransomware and how you can ensure your people, data and brand are protected.
- The latest attacks, including WannaCry and its variants
- The challenges in combating Ransomware
- Tips and suggestions to mitigate WannaCry and other Ransomware attacks
The broad adoption of cloud applications has resulted in more and more data assets leaving the corporate perimeter and being stored in the cloud. However, many organizations need to retool their cybersecurity processes, skills, and technology to be ready for the Cloud First Era. This webinar will explore how bring your own key (BYOK) and Key Management as a Service (KMaaS) offers flexible enterprise-class data encryption capabilities to secure cloud-resident data and meet and maintain compliance with industry regulations.
About the presenter:
Doug Cahill is a senior analyst covering cybersecurity at Enterprise Strategy Group drawing upon more than 25 years of industry experience across a broad range of cloud, host, and network-based products and markets.
Prior to joining ESG, Doug held executive leadership positions at security firms Threat Stack and Bit9 where he launched market leading products and forged strategic partnerships. Over the course of his career, Doug has also served in product management, marketing, and business development roles for cybersecurity, storage management, networking, and database vendors, and started his career in IT as a business analyst.
One of the most frustrating threat innovations of the last decade has been ‘ransomware’ malware. Initially considered just a consumer threat, financial, government and commercial enterprise networks can now be listed among its victims. Carl Leonard, Principal Security Analyst at Forcepoint, examines the technical and business threats that ransomware continues to pose to organizations for which IT security teams must be prepared to address and overcome.
During the session, Carl will discuss the latest on WannaCry, Jaff and Cradlecore as well as examining the concept of “have-a-go” cybercrime. Highlights include:
- Which ransomware should you defend against?
- Should you pay the ransom?
- What can you do to protect your data and network? (research-based)
- How is your organization using the Cloud in a risky way, putting your data more at risk?
About the Presenter:
Carl Leonard is a Principal Security Analyst within Forcepoint’s Security Labs team. He is responsible for enhancing threat protection and threat monitoring technologies at Forcepoint, in collaboration with the company’s global Security Labs teams. Focusing on protecting companies against the latest cyberattacks that can lead to data theft, Carl advises customers on the state of the threat landscape and how to enhance their security posture. Carl is an active international spokesperson and an expert speaker, regularly contributing to externally-facing blogs and research papers. Carl has over 10 years of experience in the security research arena.
The Internet of Things (IoT) has us now counting data elements in the trillions. Collecting, storing, and analyzing this data is transforming business intelligence. However, with this new capability, security is also essential. Teradata offers a best-in-class platform for IoT data processing, storage, and analytics. Together with Thales, the solution address the evolving business intelligence needs of enterprises, while protecting data elements and business intelligence. In this webinar, we will examine the key elements necessary to process IoT data, and the security aspects that enterprises need to focus on to safely harness the power of the technology.
• Examine the realities of IoT data processing and analytics
• Describe the architectures needed to support the capability
• Analyze drivers and technique to secure IoT data elements
As Europe’s electricity power sector evolves and utilities embark on their own digital transformation journeys, traditional IT and industrial OEMs have built out adjacent portfolios to address market demand. This presentation looks at what utilities are doing with key digital technologies, such as analytics, digital marketing, cloud, or IoT, and their operational or business objectives. It also compares the routes to market by different types of ecosystem participants to identify utilities’ challenges.
A hole in the way the global email infrastructure works exposes every business to cyber-criminals. DMARC is a new security protocol that secures your email, protects your clients and improves the deliverability of every email you send.
This webinar will provide you with an overview about the DMARC protocol and the types of attack that it protects against, its email configuration and deliverability benefits and how to protect your business.
Reinforcement Learning (RL) is a field within AI that makes machines learn by trial-and-error. RL systems have improved enormously in the recent years, being able to master games like Space Invaders or Go.
However, we have many challenges ahead: How can we make RL systems that live in the real world, with real people? How can we make sure these systems remain stable and well-behaved?
In this talk we will explore these challenges and suggest a few ways forward to bring useful RL technology to people's daily lives.
In 2016 FireEye observed an increase in the number of advanced targeted attacks leveraged against financial institutions in Europe and the Middle East. Much of the activity involved sophisticated financially motivated attackers targeting poorly defended institutions, and centred on the interbanking messaging system.
Join Mandiant’s live webinar and hear real world experts as they discuss recent interbanking messaging system breaches, what lessons should be learnt, and how to avoid such pitfalls in the future.
Security for a Mobile World. Appthority’s mission is to identify, expose, and eliminate mobile risk to the enterprise. We keep security teams informed, employees productive and enterprise data private and secure.
Join this exclusive Forcepoint™ webcast on the Top 5 Risk Mitigations in a Cloud-First World. As applications and data become cloud-based, IT security professionals must prepare their future architecture and risk management programs for a cloud-first world.
In this webcast we will examine:
The perception that cloud data centers are more secure than legacy data centers
Freedom of data – managing the flow of data from endpoint to Cloud and vice-versa
Cloud security – combining application and data security controls for contextual insight
Access control – policy enforcement with applied monitoring, visibility and analytics
Behavior analysis – how to detect threats from external and inside threats
Join security experts from 451 Research and Forcepoint for an in-depth, interactive discussion on these challenges and more.
Financial Services enterprises and quickly moving into the 21st century and adopting the BYOD, enterprise mobility and mobile workforce mentality. But with this they are unknowingly increasing the risks their companies face, creating thousands of new end-points with the potential for breaches, hacks and compromises.
Mobility teams can manage devices through EMM (Enterprise Mobility Management) software, but these platforms only go so far. Fully securing an environment from the hidden risks embedded deep in applications, and real time threats from compromised network connections and devices are threats that require a new Mobile Threat Defense strategy (as outlined by Gartner) including state of the art automation and machine learning. But how could, and should you implement this - and where do you start?
Join Domingo Guerra, President & Co-Founder of Appthority as he discusses how Fortune 1000 financial services companies are implementing measures to solve their mobile device challenges. In this session Domingo will cover:
- How to gain visibility of your mobile risks
- How leading financial services companies secure mobile use, while maintaining productivity and privacy
- How to get additional value from an existing EMM deployment while adding security coverage.
As cloud, mobility, Big Data, and social business have transformed the role of technology in the enterprise, workers require access to corporate applications, customers, and data through mobile devices.
This shift requires a fundamental change in the way that networks are designed and managed – and while the technical benefits of a digital workplace may be immediately apparent, enterprises want to understand the business value associated with this network transition.
Join us as IDC and Aruba discuss how to transition to a Mobile-First Enterprise, and hear from six customers who have realized the benefits of the digital workplace, including:
•360% five-year ROI
•9 months breakeven point
•2,844 hours additional productive time per 100 users
•77% less unplanned downtime
As a partner in the oneM2M global IoT standards development Partnership, TIA supports its deployment around the world. oneM2M is designed as an architecture and standards platform for IoT deployments in many industry sectors including Smart Cities, Industrial Automation, Home Automation and eHealth and Telemedicine, among others.
Now in its second published release, it is being deployed in a number of projects.
Now in its second published release, it is being tested for resilience as an IoT standard in a number of projects. This webcast will focus on:
• 3 projects such as Korean Smart Cities(Busan, Ilsan) and Wise-IoT which is the Joint European-Korean project.
• In England, U.K.’s oneTRANSPORT intelligent system trial which serves four U.K. counties. This trial involves England’s highways transportation agency and two private sector sensor-network owners over a single, interoperable IoT platform powered by the oneM2M™ standard.
• Overview of oneM2M certification(including background of the need for oneM2M certification program).
• Introduction of Certified Product (Target service and use cases are included per each company).
• An update from the National Institute for Science and Technology (NIST) on its IoT-enabled Smart City Framework and oneM2M smart city collaboration.
-- Ken Figueredo, IoT Strategy Industry Advisor, InterDigital
-- Sookhyun Jeon, Senior Engineer, Telecommunications Technology Association (TTA)
-- JaeSeung Song, Associate Professor, Sejong University and Korea Electronics Technology Institite (KETI)
-- David Wollman, Deputy Director, Smart Grid and Cyber-Physical Systems Program Office NIST
To speak to TIA about oneM2M for further information, contact: Victoria Mitchell, Director, Global Standards Programs, at firstname.lastname@example.org.
To learn more about oneM2M, visit: http://www.onem2m.org/
To learn more about oneM2M certification by TTA, visit: http://www.onem2mcert.com/main/main.php
AI ain't a maybe anymore. New payments and mobile commerce conversion strategies are erupting, all in the wake of the impact that AI and bots are having. More than 2.5 billion people worldwide use instant messaging services, and you need to be where your customers are – it's where AI and commerce meet.
Indeed, messaging platforms are revving up to let businesses dive face-first into the buffet of expanded commerce opportunities, letting businesses leverage customized communications like receipts, shipping notifications, and even direct conversations with customer service.
In this interactive VB Live event, we'll dive deep into the latest Bot Insight consumer study to show you why you need to get on board, and take you on a deep dive into how to take a running start, with full C-suite support.
Don't miss out!
In this webinar you'll:
* Dive into the current AI landscape, from free tools to enterprise-class options
* Learn how conversational UI and AI will transform your mobile commerce
* Understand which new platforms are right for your own commerce strategy
* Get the key points to convince your CEO and CFO to put these master class tools in your hands
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Jonathan Jarvis, CEO, Token
* Wendy Schuchart, Moderator, VentureBeat
Cloud apps are being pulled into the enterprise hand-over-fist, with 93% of organizations using cloud-based IT services. But the efficiencies and convenience offered by cloud apps come at a price. While organizations have long been applying two-factor authentication to their network, VPN and email portals, they have failed to extend that same level of security to cloud-based applications, such as Office 365, AWS and Salesforce.
But the need for stronger cloud access security is only part of the story. Businesses looking to scale and increase their cloud adoption find there are other issues to contend with. Visibility into cloud access events and regulatory compliance become challenging to maintain. Helpdesk staff are burdened with password resets, and the most important link in the chain—users—are plagued with password fatigue.
This webinar explains:
•Challenges to greater cloud adoption in the fintech space
•How strong authentication complements access management
•Why cloud access management is critical to an organization’s cloud adoption strategy
Serving public sector constituents efficiently means using today’s digital technologies – cloud services, mobile devices, web portals - to make the services your agencies provide more accessible, responsive and cost effective. But protecting information privacy and maintaining compliance can put the brakes on technology adoption even when new processes are sorely needed.
In this webinar, we will examine how on-demand secure data exchange services can empower government agencies to implement digital workflows using the latest technologies while ensuring trusted security and verifiable compliance for sensitive data:
•Digital technology accelerators
•Security and compliance brakes
•Secure data exchange services solutions
We'll take a look at some real world success stories including:
•Turning a costly background check workflow into a profit center
•Simplified statewide financial reporting workflows
•Secure data collection for sensitive population health reporting
Just one year remains before enforcement of the EU General Data Protection Regulation (GDPR) goes into effect. It’s arguably the most important privacy regulation in a generation. But it’s time to move beyond mere awareness and understanding of what GDPR is, and start making decisions about how you’re going to address it.
In this webinar, join Derek Brink, vice president and research fellow for Aberdeen Group, and Neil Cooper, Regional Sales Manager, UK&I, for Thales eSecurity, as they share the following helpful insights:
• Short synopsis of the timeline and key provisions of GDPR
• Quantify the business risk of GDPR, in terms of both the likelihood and the business impact of non-compliance
• Summarise the six fundamental strategies for safeguarding sensitive data
• Identify the three most important capabilities for addressing GDPR requirements
Developers and DevOps engineers want to fail fast, iterate, and continuously improve. If security practioners want to join in the fun, they need to integrate security assessments into existing mobile DevOps workflows and toolchains. This webinar will teach security professionals, developers, and DevOps engineers how to avoid common mistakes in embedding automated app security testing into mobile DevOps practices.
Join NowSecure Solutions Engineer Brian Lawrence and Product Marketing Leader Keith Mokris to learn how to do things like:
-- Address DevOps stakeholders' worries and concerns about integrating security testing
-- Determine the right depth of analysis for continuous mobile app security testing
-- Track mobile DevSecOps metrics over time to measure success
Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication. Join us for our EFD demo, one in a series covering our Email Protection Solution. Learn how EFD can help you:
•Block malicious emails spoofing your domains before they reach your employees and customers
•Monitor all emails (inbound and outbound) from your domains and those of third parties
•Accurately distinguish between legitimate emails and fraudulent emails
On the 1st June, there are just 358 days until the EU GDPR comes into force. At its core, the GDPR aims to put control of personal data back into the hands of EU residents. It regulates how personal data is collected, processed, and managed by organisations.
Businesses have only 358 days left to develop and implement a GDPR compliance roadmap. But what does successful compliance look like? What changes will your organisation have to make to internal processes, and what technologies should your company leverage to ensure that the personal data of EU residents are protected?
Join Adenike Cosgrove, Cybersecurity Strategist at Proofpoint and guest Forrester analyst Enza Iannopollo to discuss:
•The playbook of steps your organisation must implement to drive towards compliance
•How to embed ‘privacy by design’ to your development life cycles
•How to protect all identified EU personal data and prevent data breaches
People remain a wild card to the cyber security of an organisation. Many businesses recognise people as their biggest asset, yet still fail to recognise the need to secure the human element of information security.
In this webinar Steve Durbin, Managing Director of the ISF, tackles the question: How can organisations make people their strongest line of defence against cyber attack?
Digital transformation is impacting the automotive industry thanks to the rise of embedded software, autonomous behavior and hyper connectivity. But connected cars are often mentioned when referring to hacking or security threats and risks. At Frost & Sullivan, we strongly think that connected cars will drastically change the way people interact with vehicles due to the numerous communication technologies and associated services that will be available. Even if security is mandatory to create confidence in connected car usage, real value-added services are also vital for a successful commercial rollout. The My-Car-as-a-Service concept will transform existing car usage in a frictionless experience.
Healthcare security requirements become even more complicated with the move to the cloud. Competing internal priorities, along with numerous cloud apps to control, increase strain on already under-resourced teams. Visibility and control over data can seem almost impossible when it is being stored in locations you do not own or manage.
In this CISO-led webinar, learn about how avoid console overload by consolidating controls with a cloud access security broker platform.
Key topics include:
- Overcoming security dashboard overload when trying to manage authentication, access controls, devices, threats, compliance, malware, DLP, etc
- Healthcare security options to control data in the cloud
- CASB platform and solution overview
Email is the most frequently implemented application in Office 365, and whether you use a cloud or hybrid solution, email needs to be thoroughly secured. A failure to properly encrypt email can lead to loss of intellectual property, breaches of sensitive customer and employee information, and violations of data breach and privacy laws.
Join Michael Osterman of Osterman Research and DataMotion for a
55-minute webinar that reviews the Office 365 environment, the reasons for securing email, and addresses best practices for implementing and using email encryption.
This webinar will address a number of important questions:
• Why worry about encryption in Office 365?
• Why should you encrypt email?
• What are the best practices for securing email in Office 365?
• Is the native Office 365 email encryption your best option for
Whether you are just beginning your plans to move to Office 365, or you’re already fully implemented, you need to make sure that your organization is moving data as securely as possible.
Sure, you have a beautiful app, but if your load times are too slow and your file sizes are too large, you're leaving money on the table. The mandate is clear: Your mobile game needs to start up in five seconds, or you’ll start to churn players.
It’s a tough balancing act between delivering rich content and letting players enjoy the game without a painful loading screen. And in some countries, speed and minimalism are a must, not a nice-to-have, if you're going to succeed.
We're going to take a deep dive in the best practice for reducing load times across both the mobile web and apps. We'll look at screen load micro-data and how slow load times are killing publishers in the mobile arena.
In this webinar, you'll:
* Identify the best practices for optimizing load times for games with rich content
* Find out the risks are if you fail to optimize load times, including the dangers associated with global reach
* Discover what to do first, and which technologies can help you get there quicker
* Secil Watson, EVP Head of Digital Solutions, Wells Fargo
* David Holtkamp, CEO, Crimson Moon
* Jonathan Meson, CEO, VisualBlasters
* Martín Domínguez, CIO at Etermax
* Stewart Rogers, Director of Marketing Technology, VentureBeat
As financial service companies battle to build customer loyalty and increase security in the age of FinTech, providing efficient, secure and personal services is a source of competitive advantage. The rapid growth of voice biometrics authentication demonstrates it is a convenient and secure way to authenticate real customers, detect impostors and prevent fraud.
In this webinar, join Interactions and Opus Research as they describe the steps that financial service companies should take to incorporate voice biometrics authentication into the customer care experience.
Topics to be discussed include:
• Identifying Responsibilities and Stakeholders: Contact center, security/risk management, marketing, customer care, IT, and communications infrastructure
• Finding the Budget: Making a business case and finding the budget for voice biometrics authentication
• Best Practices: Engaging Marketing to build customer awareness around voice biometrics
• Preparing for Success: Anticipating the need to scale operations to accommodate new interaction patterns to suit multichannel environments
Which platforms to support? BYOD, CL or Both? Unlocked or Locked? Cover all employees or just some? What about security? We deal with these questions on a daily basis, so why make the same mistakes as your peers? In this webcast we’ll share pitfalls to avoid and best practices to successfully deploy, manage and secure mobile to initiate transformation and promote growth within your organization.
Your employees are using more cloud apps than ever, and mobile workers frequently work without turning on their VPN. You need new ways to extend protection anywhere your employees work — and you need it to be simple, yet incredibly effective.
Exciting innovations in network security-as-a-service offer distributed organizations the potential to extend and meaningfully increase security effectiveness. Join this 451 Research webinar with Cisco Security to hear a discussion about new cloud-delivered protection for mobile workers, lean branch offices, and cloud applications. We’ll cover the changing market landscape, the emergence of the Secure Internet Gateway, and highlight important buying considerations for companies looking to add these capabilities.
With the growing demands of enterprise outdoor Wi-Fi users, customers’ expectations of outdoor Wi-Fi has gone beyond the basic network connection. Outdoor Wi-Fi deployments for small and large areas are often different and how to improve the user experience while minimizing costs has always been a concern for enterprises.
This webinar will address various outdoor use cases and their most appropriate solution; DreamWorks Animations will share their real-life outdoor deployment experience with the audience, including their unique outdoor Wi-Fi requirements, deployment challenges and their future move to enable an always-on indoor/outdoor Wi-Fi connectivity in the entire work place.
Join us to learn more about the current challenges and benefits of outdoor Wi-Fi and ways to meet the new demands and performance standards.
You can also qualify for a free Aruba access point*
*Terms and Conditions apply
Networks are changing. With the vast expansion of IoT, we're experience the transition of enterprise and operator infrastructure from networks of people to networks of people, places and things.
Join Christian Renaud, Research Director, IoT at 451 Research, as he looks at the impacts of the growing number of instrumented environments and objects on enterprise and carrier networks, capacities, signaling protocols, and emerging opportunities for value creation beyond simple connectivity.
This webinar will cover:
- Possible bottlenecks and roadblocks on the path to the Internet of Things
- What leading organizations are doing today to prepare for the coming influx of new types of devices
It's 2017 and the digital ad space hasn't stopped growing in size and complexity. Mobile advertisers are seeing increased opportunities for ad placements in apps and messaging platforms, which means more opportunities, but also new marketing challenges—and a major surge in fraud.
Make this the year you stop letting fraudulent bots burn through your budget and start maximizing the power of mobile advertising with must-click messaging. Join our latest live, interactive event for an in-depth look at how to stay in front of your audience, ahead of your competitors, and on top of fraud.
In this webinar you'll:
* Learn what works and what doesn't in 2017's mobile advertising arena
* Mitigate the mobile advertising fraud risk in your own applications
* Create the most engaging mobile advertisements for savvy app patrons
* Use video and 360 advertising to stay abreast of the latest trends in mobile advertising
* Stewart Rogers, Director of Technology, VentureBeat
* Wendy Schuchart, Moderator, VentureBeat
More speakers to be announced?
Want to be a speaker on a VB Live event? Pitch your story at Webinars at VentureBeat Dot Com.
As self-driving vehicles are coming off the production line, automakers are deploying technology to improve the driving experience, from the infotainment system to enhancing brake and fuel efficiency. Yet, adequate cyber security measures still need to catch up. Whether it’s the hacked Jeep or the Nissan Leaf app vulnerability, connected vehicles often fail to implement basic authentication and encryption measures to protect users.
Mike Nelson, VP, Critical Infrastructure at DigiCert will cover the following topics:
- Insight into the state of connected vehicle security and the need for interoperable standards-based solutions.
- How connected device manufacturers are using public key infrastructure (PKI) to provide scalable authentication, encryption and data integrity for the vehicle and its thousands of connected parts.
- Specific steps security teams can take beginning today.
A push notification is a tricky kind of social engagement: it can be a tap on the shoulder, a punch in the face, or water torture. In other words, it can be tremendously successful at driving commerce and engagement, or it could piss your customer off so badly they'll go rip you a new one on Twitter. And we've seen how well that works out for brands.
At the very least, every misstep reduces open rates, strikes a blow against retention and destroys engagement. You want to know how to not be the boor at a cocktail party, because push notifications, one of the most powerful and immediate engagement tools in your arsenal (when you do it right) can garner 2770% higher conversion rates.
Don't be part of the 63 percent of marketers who stumble on the messaging, timing, and frequency of your notification strategy—join this interactive VB Live event.
* Discover the one trick to never-fail push notifications everywhere, not just apps
* Drive 2770% higher conversion rates through a specific kind of push notifications
* Learn how to apply behavioral triggered push notifications in your own marketing strategy
* Build better timing into your push notifications to increase conversions
* Stewart Rogers, Director of Marketing Technology for VentureBeat
• Wendy Schuchart, Moderator, VentureBeat
For LTV, engagement, and lifecycle, organic installs blow paid install campaigns out of the water—and they're a lot cheaper. VB Insight analysts report that if you want to boost organic downloads by at least 20 percent—or in some cases double or even triple that rate—you need to get in the ASO game.
ASO basics have been buried alive in the avalanche of new apps, flawed app search, and rapid-fire algorithm changes that aren't always developer friendly. To get the most out of your entire marketing funnel, not just your app store presence, you need to step up your ASO game with these key takeaways from our latest in-depth, Godzilla-sized ASO report.
For report highlights, key best practices and can't-miss ASO insights from super-analyst Stewart Rogers, join our latest interactive VB Live event!
In this webinar you'll:
* Learn why ASO is fundamental to the success of any app
* Familiarize yourself with the pillars of solid ASO strategy
* Leverage technology to increase your lifetime user value
* Think beyond keywords for your search strategies
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Peggy Anne Salz, Chief Analyst, MobileGroove
* Wendy Schuchart, Moderator, VentureBeat
You better get good at conversational video marketing, fast—or you're going to be obsolete.
Videos and photos get the most retweets. Last year, Facebook's video viewership doubled from 4 billion views per day to 8 billion views per day in seven months. Google owns YouTube, and coincidentally, rich media is a favorite of the search engine's algorithms.
Conversational videos drive traffic, boost engagement, and serve up information better than any other medium. They promote trust in your brand and your products. They're eminently shareable, potentially viral, and taking over the internet: 74 percent of all Internet traffic in 2017 will be video.
Step up and stand out in every step of the sales funnel with conversational video marketing when you join our latest interactive VB Live event.
By watching this webinar, you'll:
* Optimize your audience takeaways for video content
* Get tips from the savviest sales and marketing people on their video content strategy
* Focus your energy on the right distribution channels for your adverts
* Personalize video content to lock in the close
* Stewart Rogers, Director of Marketing Technology, VentureBeat
More speakers to be announced soon!
Fraud detection is a classic adversarial analytics challenge: As soon as an automated system successfully learns to stop one scheme, fraudsters move on to attack another way. Each scheme requires looking for different signals (i.e. features) to catch; is relatively rare (one in millions for finance or e-commerce); and may take months to investigate a single case (in healthcare or tax, for example) – making quality training data scarce.
This talk will cover a code walk-through, the key lessons learned while building such real-world software systems over the past few years. We'll look for fraud signals in public email datasets, using IPython and popular open-source libraries (scikit-learn, statsmodel, nltk, etc.) for data science and Apache Spark as the compute engine for scalable parallel processing.
David will iteratively build a machine-learned hybrid model – combining features from different data sources and algorithmic approaches, to catch diverse aspects of suspect behavior:
- Natural language processing: finding keywords in relevant context within unstructured text
- Statistical NLP: sentiment analysis via supervised machine learning
- Time series analysis: understanding daily/weekly cycles and changes in habitual behavior
- Graph analysis: finding actions outside the usual or expected network of people
- Heuristic rules: finding suspect actions based on past schemes or external datasets
- Topic modeling: highlighting use of keywords outside an expected context
- Anomaly detection: Fully unsupervised ranking of unusual behavior
Apache Spark is used to run these models at scale – in batch mode for model training and with Spark Streaming for production use. We’ll discuss the data model, computation, and feedback workflows, as well as some tools and libraries built on top of the open-source components to enable faster experimentation, optimization, and productization of the models.
Join John Nall, Founder and CEO of Appzion, as he takes a technical deep-dive into workforce mobilization through augmented reality.
In this webinar you will learn the steps to enterprise AR productivity. Methods include techniques to identify ideal scenarios for augmenting humans, process mapping and observation techniques. Once the scenario is chosen, other considerations include software and hardware assessment and selection and cybersecurity for wearables.
Samantha Kingston will explore why she bet her career on virtual reality and what it’s really like running a marketing company solely for VR, looking at trends and what challenges are ahead for 2018.
Virtual Umbrella is an award-winning marketing consultancy specialising in Virtual Reality. Virtual Umbrella has worked on a number of notable projects including creating a virtual reality cinema in Cannes, curating and running a technology hub as part of the Edinburgh Fringe Festival and providing immersive experiences along the BBC and Imperial War Museum.
Samantha Kingston is the award-winning client director at Virtual Umbrella. Virtual Umbrella is a marketing and PR agency specialising in virtual reality. Samantha fell into the VR industry by accident but has spent her time in the industry building up her own company and working with the VR industry in the UK, Europe, and US. Samantha is an advocate for Women in tech and VR and she is often found moderating panels on equality in the workplace. In 2016 she won the regional and national ‘New Business’ award at Venus Awards, highlighted as one of MCV 30 under 30 and one of the rising stars of BIMA100 2016.