Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • State of the Internet/ Security Report–Latest DDoS and Web App Attack Trends
    State of the Internet/ Security Report–Latest DDoS and Web App Attack Trends Nick Rieniets, Senior Security Specialist, Akamai Technologies Recorded: May 24 2017 60 mins
    As an organization that delivers and protects 15-30% of the world’s web traffic on a daily basis, Akamai is uniquely positioned to observe a large amount of attacks ranging from 20 malicious HTTP requests containing SQL injection to DDoS attacks up to 650 Gbps. Our security experts analyze this information and share trends, observations, and findings in our quarterly State of the Internet / Security Report. We will present this information and associated insights in this webinar series.

    In this webinar, you will learn:

    • A summary of global findings from the State of the Internet Report
    • Attack statistics for APJ
    • How IoT botnets have changed the attack topology in APJ
    • The responsibilities for security of IoT

    Join Akamai and (ISC)² on May 24 (Wed) at 13:00 (Singapore time) for an overview and analysis of traffic and trends from Distributed Denial of Service (DDoS) and web application attacks.
  • Don’t let Smartphones Kill your PKI Security Strategy
    Don’t let Smartphones Kill your PKI Security Strategy Gregory Vigroux, Enterprise Mobility Expert at Gemalto Recorded: May 23 2017 51 mins
    Half of businesses admit security is their biggest concern to increasing user mobility. Securing enterprise mobility has been an ongoing and arduous topic for IT security professionals. Maintaining high-assurance security, while offering access to company resources to an on-the-go workforce has become a balancing act. So much so, a third of businesses actually prevent employee access to company resources via mobile. This is likely not a long term or sustainable solution to the problem.

    So how do you find a compromise that won’t kill your security strategy? There are currently many technologies from derived credentials to mobile PKI. IT professionals are feeling the pressure to find a viable, user friendly, easy-to-deploy and secure options. In this webinar, we will discuss the current solutions in-depth and how they impact your current IT security policies. Attendees will learn more about:
    -Software-based security versus hardware-based security
    -How this impacts your back-end systems
    -Technology such as derived credentials and mobile PKI
    -Implementing a mobile PKI solution
  • DataMotion SDX Services Platform for Healthcare
    DataMotion SDX Services Platform for Healthcare This is a short 40 second video overview Recorded: May 18 2017 1 min
    The DataMotion SDX Platform for Healthcare is a hub for secure data exchange services – a toolkit that can be used to solve a wide range of sensitive data in motion workflows. Using our API and connector toolkit, solution developers can rapidly meet key regulatory and industry pre-requisites for participating in the programs that are driving healthcare transformation, including Meaningful Use, MACRA/MIPS, and APMs.

    To achieve the data security and interoperability standards enabled by DataMotion, developers would need to incur the significant expense of engaging multiple vendors and hundreds of hours of development time.
  • Ransomware – The Billion Dollar Thief
    Ransomware – The Billion Dollar Thief Ryan Kalember, SVP Cybersecurity Strategies Recorded: May 18 2017 64 mins
    With WannaCry, Ransomware has once again burst onto the scene, reminding us of the need to stay vigilant. Ransomware attacks have continued to grow with security experts estimating that criminals will collect around $1 billion this year.

    Join us for this webinar as we discuss WannaCry, its variants and other Ransomware and how you can ensure your people, data and brand are protected.

    - The latest attacks, including WannaCry and its variants
    - The challenges in combating Ransomware
    - Tips and suggestions to mitigate WannaCry and other Ransomware attacks
  • Data Encryption for the Cloud-First Era
    Data Encryption for the Cloud-First Era Doug Cahill, Senior Analyst, at Enterprise Strategy Group, Inc. Recorded: May 18 2017 58 mins
    The broad adoption of cloud applications has resulted in more and more data assets leaving the corporate perimeter and being stored in the cloud. However, many organizations need to retool their cybersecurity processes, skills, and technology to be ready for the Cloud First Era. This webinar will explore how bring your own key (BYOK) and Key Management as a Service (KMaaS) offers flexible enterprise-class data encryption capabilities to secure cloud-resident data and meet and maintain compliance with industry regulations.

    About the presenter:

    Doug Cahill is a senior analyst covering cybersecurity at Enterprise Strategy Group drawing upon more than 25 years of industry experience across a broad range of cloud, host, and network-based products and markets.

    Prior to joining ESG, Doug held executive leadership positions at security firms Threat Stack and Bit9 where he launched market leading products and forged strategic partnerships. Over the course of his career, Doug has also served in product management, marketing, and business development roles for cybersecurity, storage management, networking, and database vendors, and started his career in IT as a business analyst. 
  • Are You Prepared for Ransomware?
    Are You Prepared for Ransomware? Carl Leonard, Principal Security Analyst at Forcepoint Recorded: May 18 2017 47 mins
    One of the most frustrating threat innovations of the last decade has been ‘ransomware’ malware. Initially considered just a consumer threat, financial, government and commercial enterprise networks can now be listed among its victims. Carl Leonard, Principal Security Analyst at Forcepoint, examines the technical and business threats that ransomware continues to pose to organizations for which IT security teams must be prepared to address and overcome.

    During the session, Carl will discuss the latest on WannaCry, Jaff and Cradlecore as well as examining the concept of “have-a-go” cybercrime. Highlights include:

    - Which ransomware should you defend against?
    - Should you pay the ransom?
    - What can you do to protect your data and network? (research-based)
    - How is your organization using the Cloud in a risky way, putting your data more at risk?


    About the Presenter:
    Carl Leonard is a Principal Security Analyst within Forcepoint’s Security Labs team. He is responsible for enhancing threat protection and threat monitoring technologies at Forcepoint, in collaboration with the company’s global Security Labs teams. Focusing on protecting companies against the latest cyberattacks that can lead to data theft, Carl advises customers on the state of the threat landscape and how to enhance their security posture. Carl is an active international spokesperson and an expert speaker, regularly contributing to externally-facing blogs and research papers. Carl has over 10 years of experience in the security research arena.
  • [Video Panel] Fighting Ransomware & Responding if the Worst Happens
    [Video Panel] Fighting Ransomware & Responding if the Worst Happens Josh Downs, BrightTALK; Adrian Taylor, FireEye; Ian Whiting, Titania & Bart Parys, PwC Recorded: May 18 2017 47 mins
    Ransomware was one of the biggest threats facing businesses in 2016 and that trend is expected to continue as we press further into 2017.

    As more and more cheap malware becomes available to cyber criminals the sheer amount of ransomware attacks is on the rise.

    However, cyber defences are beginning to catch up.

    This expert video panel will be discussing the ransomware landscape, what you can do to better protect your business from the threat and steps to take should the worst happen.

    Panelists:

    - Josh Downs, BrightTALK (moderator)

    - Adrian Taylor, Field CTO, FireEye

    - Ian Whiting, CEO, Titania

    - Bart Parys, Threat Intelligence Analyst, PwC
  • [Video Interview] Pentest Masterclass & Getting the Most of Your Security Spend
    [Video Interview] Pentest Masterclass & Getting the Most of Your Security Spend Josh Downs, Senior Community Manager BrightTALK & Ian Whiting, CEO, Titania Recorded: May 18 2017 8 mins
    - BrightTALK at CRESTCON & IISP Congress -

    BrightTALK caught up with Titania's Ian Whiting for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - How to run a comprehensive pentest to protect your business

    - How to get the most from your cyber security budget

    - AI & Machine learning and the influence it'll have on the security industry

    - The explosion of connected devices on the IoT and where networks are especially vulnerable
  • Data Protection for IoT – Securing Enterprise Business Intelligence
    Data Protection for IoT – Securing Enterprise Business Intelligence Jay Irwin, Director, Teradata InfoSec COE and Andrew Lance Sr. Manager, Business Development at Thales e-Security Recorded: May 17 2017 61 mins
    The Internet of Things (IoT) has us now counting data elements in the trillions. Collecting, storing, and analyzing this data is transforming business intelligence. However, with this new capability, security is also essential. Teradata offers a best-in-class platform for IoT data processing, storage, and analytics. Together with Thales, the solution address the evolving business intelligence needs of enterprises, while protecting data elements and business intelligence. In this webinar, we will examine the key elements necessary to process IoT data, and the security aspects that enterprises need to focus on to safely harness the power of the technology.

    • Examine the realities of IoT data processing and analytics
    • Describe the architectures needed to support the capability
    • Analyze drivers and technique to secure IoT data elements
  • European Utilities: The Digital Transformation Journey
    European Utilities: The Digital Transformation Journey Yiru Zhong and Jonathan Robinson Recorded: May 17 2017 45 mins
    As Europe’s electricity power sector evolves and utilities embark on their own digital transformation journeys, traditional IT and industrial OEMs have built out adjacent portfolios to address market demand. This presentation looks at what utilities are doing with key digital technologies, such as analytics, digital marketing, cloud, or IoT, and their operational or business objectives. It also compares the routes to market by different types of ecosystem participants to identify utilities’ challenges.
  • Email — The Achilles Heel of Cybersecurity That Lets Everyone Down
    Email — The Achilles Heel of Cybersecurity That Lets Everyone Down Randal Pinto, Co-founder & COO, Red Sift Recorded: May 17 2017 21 mins
    A hole in the way the global email infrastructure works exposes every business to cyber-criminals. DMARC is a new security protocol that secures your email, protects your clients and improves the deliverability of every email you send.

    This webinar will provide you with an overview about the DMARC protocol and the types of attack that it protects against, its email configuration and deliverability benefits and how to protect your business.
  • Reinforcement Learning: Recent Progress and Future Problems
    Reinforcement Learning: Recent Progress and Future Problems Pedro Mediano, Research Scientist at Emotech Ltd. Recorded: May 16 2017 21 mins
    Reinforcement Learning (RL) is a field within AI that makes machines learn by trial-and-error. RL systems have improved enormously in the recent years, being able to master games like Space Invaders or Go.

    However, we have many challenges ahead: How can we make RL systems that live in the real world, with real people? How can we make sure these systems remain stable and well-behaved?

    In this talk we will explore these challenges and suggest a few ways forward to bring useful RL technology to people's daily lives.
  • Securing Finance: Lessons Learnt So Far
    Securing Finance: Lessons Learnt So Far Roger Francis, Senior Consultant, Mandiant; Jeroen Herlaar, Regional Director, Mandiant Recorded: May 16 2017 47 mins
    In 2016 FireEye observed an increase in the number of advanced targeted attacks leveraged against financial institutions in Europe and the Middle East. Much of the activity involved sophisticated financially motivated attackers targeting poorly defended institutions, and centred on the interbanking messaging system.

    Join Mandiant’s live webinar and hear real world experts as they discuss recent interbanking messaging system breaches, what lessons should be learnt, and how to avoid such pitfalls in the future.
  • Appthority Intro: Mobile Threat Protection
    Appthority Intro: Mobile Threat Protection Domingo Guerra, Co-founder and President, Appthority Recorded: May 15 2017 25 mins
    Security for a Mobile World. Appthority’s mission is to identify, expose, and eliminate mobile risk to the enterprise. We keep security teams informed, employees productive and enterprise data private and secure.
  • Top 5 Risk Mitigations in a Cloud-First World
    Top 5 Risk Mitigations in a Cloud-First World Adrian Sanabria, Neil Thacker Recorded: May 11 2017 71 mins
    Join this exclusive Forcepoint™ webcast on the Top 5 Risk Mitigations in a Cloud-First World. As applications and data become cloud-based, IT security professionals must prepare their future architecture and risk management programs for a cloud-first world.
    In this webcast we will examine:
    The perception that cloud data centers are more secure than legacy data centers
    Freedom of data – managing the flow of data from endpoint to Cloud and vice-versa
    Cloud security – combining application and data security controls for contextual insight
    Access control – policy enforcement with applied monitoring, visibility and analytics
    Behavior analysis – how to detect threats from external and inside threats
    Join security experts from 451 Research and Forcepoint for an in-depth, interactive discussion on these challenges and more.
  • The Hidden Security Risks of Mobile & Mobility in Financial Services
    The Hidden Security Risks of Mobile & Mobility in Financial Services Domingo Guerra, President & Co-founder of Appthority Recorded: May 11 2017 34 mins
    Financial Services enterprises and quickly moving into the 21st century and adopting the BYOD, enterprise mobility and mobile workforce mentality. But with this they are unknowingly increasing the risks their companies face, creating thousands of new end-points with the potential for breaches, hacks and compromises.

    Mobility teams can manage devices through EMM (Enterprise Mobility Management) software, but these platforms only go so far. Fully securing an environment from the hidden risks embedded deep in applications, and real time threats from compromised network connections and devices are threats that require a new Mobile Threat Defense strategy (as outlined by Gartner) including state of the art automation and machine learning. But how could, and should you implement this - and where do you start?

    Join Domingo Guerra, President & Co-Founder of Appthority as he discusses how Fortune 1000 financial services companies are implementing measures to solve their mobile device challenges. In this session Domingo will cover:

    - How to gain visibility of your mobile risks
    - How leading financial services companies secure mobile use, while maintaining productivity and privacy
    - How to get additional value from an existing EMM deployment while adding security coverage.
  • Making the Case for the Mobile-First Enterprise
    Making the Case for the Mobile-First Enterprise Nolan Greene Sr. Research Analyst, Network Infrastructure at IDC & Christian Gilby Director of Product Marketing, Aruba Recorded: May 11 2017 46 mins
    As cloud, mobility, Big Data, and social business have transformed the role of technology in the enterprise, workers require access to corporate applications, customers, and data through mobile devices.

    This shift requires a fundamental change in the way that networks are designed and managed – and while the technical benefits of a digital workplace may be immediately apparent, enterprises want to understand the business value associated with this network transition.

    Join us as IDC and Aruba discuss how to transition to a Mobile-First Enterprise, and hear from six customers who have realized the benefits of the digital workplace, including:

    •360% five-year ROI
    •9 months breakeven point
    •2,844 hours additional productive time per 100 users
    •77% less unplanned downtime
  • Real World Deployments of the oneM2M Standard
    Real World Deployments of the oneM2M Standard Ken Figueredo, Sookhyun Jeon, JaeSeung Song, David Wollman Recorded: May 10 2017 79 mins
    As a partner in the oneM2M global IoT standards development Partnership, TIA supports its deployment around the world. oneM2M is designed as an architecture and standards platform for IoT deployments in many industry sectors including Smart Cities, Industrial Automation, Home Automation and eHealth and Telemedicine, among others.

    Now in its second published release, it is being deployed in a number of projects.

    Now in its second published release, it is being tested for resilience as an IoT standard in a number of projects. This webcast will focus on:

    • 3 projects such as Korean Smart Cities(Busan, Ilsan) and Wise-IoT which is the Joint European-Korean project.
    • In England, U.K.’s oneTRANSPORT intelligent system trial which serves four U.K. counties. This trial involves England’s highways transportation agency and two private sector sensor-network owners over a single, interoperable IoT platform powered by the oneM2M™ standard.
    • Overview of oneM2M certification(including background of the need for oneM2M certification program).
    • Introduction of Certified Product (Target service and use cases are included per each company).
    • An update from the National Institute for Science and Technology (NIST) on its IoT-enabled Smart City Framework and oneM2M smart city collaboration.

    Speakers:
    -- Ken Figueredo, IoT Strategy Industry Advisor, InterDigital
    -- Sookhyun Jeon, Senior Engineer, Telecommunications Technology Association (TTA)
    -- JaeSeung Song, Associate Professor, Sejong University and Korea Electronics Technology Institite (KETI)
    -- David Wollman, Deputy Director, Smart Grid and Cyber-Physical Systems Program Office NIST

    To speak to TIA about oneM2M for further information, contact: Victoria Mitchell, Director, Global Standards Programs, at vmitchell@tiaonline.org.

    To learn more about oneM2M, visit: http://www.onem2m.org/
    To learn more about oneM2M certification by TTA, visit: http://www.onem2mcert.com/main/main.php

    No BICSI Credit
  • Mobile commerce + AI: Not just a nice-to-have
    Mobile commerce + AI: Not just a nice-to-have Stewart Rogers, Director of Marketing Technology, VentureBeat Recorded: May 9 2017 61 mins
    AI ain't a maybe anymore. New payments and mobile commerce conversion strategies are erupting, all in the wake of the impact that AI and bots are having. More than 2.5 billion people worldwide use instant messaging services, and you need to be where your customers are – it's where AI and commerce meet.

    Indeed, messaging platforms are revving up to let businesses dive face-first into the buffet of expanded commerce opportunities, letting businesses leverage customized communications like receipts, shipping notifications, and even direct conversations with customer service.

    In this interactive VB Live event, we'll dive deep into the latest Bot Insight consumer study to show you why you need to get on board, and take you on a deep dive into how to take a running start, with full C-suite support.

    Don't miss out!

    In this webinar you'll:
    * Dive into the current AI landscape, from free tools to enterprise-class options
    * Learn how conversational UI and AI will transform your mobile commerce
    * Understand which new platforms are right for your own commerce strategy
    * Get the key points to convince your CEO and CFO to put these master class tools in your hands

    Speakers:
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Jonathan Jarvis, CEO, Token
    * Wendy Schuchart, Moderator, VentureBeat
  • Beyond 2FA: The Smart Way to Manage Cloud Access
    Beyond 2FA: The Smart Way to Manage Cloud Access Mor Ahuvia, Authentication Product Marketing at Gemalto Recorded: May 9 2017 44 mins
    Cloud apps are being pulled into the enterprise hand-over-fist, with 93% of organizations using cloud-based IT services. But the efficiencies and convenience offered by cloud apps come at a price. While organizations have long been applying two-factor authentication to their network, VPN and email portals, they have failed to extend that same level of security to cloud-based applications, such as Office 365, AWS and Salesforce.

    But the need for stronger cloud access security is only part of the story. Businesses looking to scale and increase their cloud adoption find there are other issues to contend with. Visibility into cloud access events and regulatory compliance become challenging to maintain. Helpdesk staff are burdened with password resets, and the most important link in the chain—users—are plagued with password fatigue.

    This webinar explains:
    •Challenges to greater cloud adoption in the fintech space
    •How strong authentication complements access management
    •Why cloud access management is critical to an organization’s cloud adoption strategy
  • The Role of Secure Messaging in Improving Patient Outcomes
    The Role of Secure Messaging in Improving Patient Outcomes Andy Nieto Recorded: May 8 2017 6 mins
    Andy Nieto, Healthcare IT Strategist, discusses how secure data exchange can impact patient outcomes by enabling members of a care team to easily exchange information.
  • Empowering Government Agencies with Secure Data Exchange Services
    Empowering Government Agencies with Secure Data Exchange Services Pete Cafarchio and Bud Walder Recorded: May 4 2017 28 mins
    Serving public sector constituents efficiently means using today’s digital technologies – cloud services, mobile devices, web portals - to make the services your agencies provide more accessible, responsive and cost effective. But protecting information privacy and maintaining compliance can put the brakes on technology adoption even when new processes are sorely needed.

    In this webinar, we will examine how on-demand secure data exchange services can empower government agencies to implement digital workflows using the latest technologies while ensuring trusted security and verifiable compliance for sensitive data:

    •Digital technology accelerators
    •Security and compliance brakes
    •Secure data exchange services solutions

    We'll take a look at some real world success stories including:

    •Turning a costly background check workflow into a profit center
    •Simplified statewide financial reporting workflows
    •Secure data collection for sensitive population health reporting
  • [Video Interview] Piers Wilson and the IISP Industry Survey
    [Video Interview] Piers Wilson and the IISP Industry Survey Josh Downs, BrightTALK & Piers Wilson, Director, IISP Recorded: May 4 2017 16 mins
    - BrightTALK at CRESTCON & IISP Congress -

    BrightTALK caught up with The IISP's Piers Wison for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The findings of the IISP Industry Survey

    - AI & machine learning in the security sphere

    - The steps cyber professionals need to take to prepare for GDPR

    - What banks can be doing to remain as protected as possible from cyber criminals

    - The growth of IoT networks and their subsequent vulnerabilities

    - What to look for when assembling a security team

    - How to get the most out of your security budget

    -
  • Tick, Tock: Just 1 Year to GDPR Enforcement – How to be technology ready
    Tick, Tock: Just 1 Year to GDPR Enforcement – How to be technology ready Derek Brink, VP, Research Fellow, Information Technology May 25 2017 3:00 pm UTC 60 mins
    Just one year remains before enforcement of the EU General Data Protection Regulation (GDPR) goes into effect. It’s arguably the most important privacy regulation in a generation. But it’s time to move beyond mere awareness and understanding of what GDPR is, and start making decisions about how you’re going to address it.

    In this webinar, join Derek Brink, vice president and research fellow for Aberdeen Group, and Neil Cooper, Regional Sales Manager, UK&I, for Thales eSecurity, as they share the following helpful insights:

    • Short synopsis of the timeline and key provisions of GDPR
    • Quantify the business risk of GDPR, in terms of both the likelihood and the business impact of non-compliance
    • Summarise the six fundamental strategies for safeguarding sensitive data
    • Identify the three most important capabilities for addressing GDPR requirements
  • Mobile DevSecOps 101: Common slip-ups in embedding mobile app security testing
    Mobile DevSecOps 101: Common slip-ups in embedding mobile app security testing Brian Lawrence, NowSecure Solutions Engineer & Keith Mokris, NowSecure Product Marketing Leader May 25 2017 6:00 pm UTC 45 mins
    Developers and DevOps engineers want to fail fast, iterate, and continuously improve. If security practioners want to join in the fun, they need to integrate security assessments into existing mobile DevOps workflows and toolchains. This webinar will teach security professionals, developers, and DevOps engineers how to avoid common mistakes in embedding automated app security testing into mobile DevOps practices.

    Join NowSecure Solutions Engineer Brian Lawrence and Product Marketing Leader Keith Mokris to learn how to do things like:

    -- Address DevOps stakeholders' worries and concerns about integrating security testing
    -- Determine the right depth of analysis for continuous mobile app security testing
    -- Track mobile DevSecOps metrics over time to measure success
  • Email Fraud Defense - Live Demo
    Email Fraud Defense - Live Demo Aaron Neff, Sr Engineer, Parker Bowman Account Manager May 26 2017 5:00 pm UTC 60 mins
    Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication. Join us for our EFD demo, one in a series covering our Email Protection Solution. Learn how EFD can help you:

    •Block malicious emails spoofing your domains before they reach your employees and customers
    •Monitor all emails (inbound and outbound) from your domains and those of third parties
    •Accurately distinguish between legitimate emails and fraudulent emails
  • GDPR - 358 Days To Fill the Compliance GAP
    GDPR - 358 Days To Fill the Compliance GAP Adenike Cosgrove, Cybersecurity Strategist at Proofpoint and guest analyst Enza Iannopollo Jun 1 2017 9:00 am UTC 45 mins
    On the 1st June, there are just 358 days until the EU GDPR comes into force. At its core, the GDPR aims to put control of personal data back into the hands of EU residents. It regulates how personal data is collected, processed, and managed by organisations.

    Businesses have only 358 days left to develop and implement a GDPR compliance roadmap. But what does successful compliance look like? What changes will your organisation have to make to internal processes, and what technologies should your company leverage to ensure that the personal data of EU residents are protected?

    Join Adenike Cosgrove, Cybersecurity Strategist at Proofpoint and guest Forrester analyst Enza Iannopollo to discuss:
    •The playbook of steps your organisation must implement to drive towards compliance
    •How to embed ‘privacy by design’ to your development life cycles
    •How to protect all identified EU personal data and prevent data breaches
  • The Role of the End User: your strongest line of defence against cyber-attack
    The Role of the End User: your strongest line of defence against cyber-attack Steve Durbin, Managing Director, ISF LTD Jun 1 2017 12:00 pm UTC 45 mins
    People remain a wild card to the cyber security of an organisation. Many businesses recognise people as their biggest asset, yet still fail to recognise the need to secure the human element of information security.

    In this webinar Steve Durbin, Managing Director of the ISF, tackles the question: How can organisations make people their strongest line of defence against cyber attack?
  • Connected Cars: Where are the Services?
    Connected Cars: Where are the Services? Jean-Noël Georges, Julien Clausse, Amadeus and Michael Tworek, Gemalto Jun 1 2017 3:00 pm UTC 60 mins
    Digital transformation is impacting the automotive industry thanks to the rise of embedded software, autonomous behavior and hyper connectivity. But connected cars are often mentioned when referring to hacking or security threats and risks. At Frost & Sullivan, we strongly think that connected cars will drastically change the way people interact with vehicles due to the numerous communication technologies and associated services that will be available. Even if security is mandatory to create confidence in connected car usage, real value-added services are also vital for a successful commercial rollout. The My-Car-as-a-Service concept will transform existing car usage in a frictionless experience.
  • Healthcare Security in a Cloud-first World
    Healthcare Security in a Cloud-first World Joey Johnson, CISO, Premise Health & Mike Schuricht, Sr Director of Product Management, Bitglass Jun 1 2017 6:00 pm UTC 60 mins
    Healthcare security requirements become even more complicated with the move to the cloud. Competing internal priorities, along with numerous cloud apps to control, increase strain on already under-resourced teams. Visibility and control over data can seem almost impossible when it is being stored in locations you do not own or manage.

    In this CISO-led webinar, learn about how avoid console overload by consolidating controls with a cloud access security broker platform.

    Key topics include:
    - Overcoming security dashboard overload when trying to manage authentication, access controls, devices, threats, compliance, malware, DLP, etc
    - Healthcare security options to control data in the cloud
    - CASB platform and solution overview
  • 互联网现状/互联网安全现状报告——最新DDoS及Web App攻击趋势概览
    互联网现状/互联网安全现状报告——最新DDoS及Web App攻击趋势概览 马俊 James, 阿卡迈中国高级售前工程师, 阿卡迈中国 Jun 7 2017 6:00 am UTC 60 mins
    参加这个网络研讨会,您可获取DDoS及Web应用攻击的流量和趋势的概览及深度分析。

    每天都承载了全球 15%到30%的Web流量,因此可以观察到大量的互联网攻击,从包含SQL注入的恶意HTTP请求,到规模高达650Gbps的DDoS攻击。我们的安全专家会对此信息进行分析,对相关趋势和发现进行分享,这些信息都包含在我们按照季度发布的互联网现状/互联网安全现状报告中。我们将在本系列在线研讨会中发布相关信息。

    主要话题:
    - 互联网现状报告中的全球网络流量概况
    - APJ区域的网络攻击情况
    - IoT(物联网)僵尸网络是如何改变APJ地区网络攻击的拓扑结构的
    - IoT的安全责任

    参加Akamai 和 (ISC)² 在06月07日下午2:00至3:00的在线论坛《互联网现状/互联网安全现状报告——最新DDoS及Web App攻击趋势概览》,获取DDoS及Web应用攻击的流量和趋势的概览及深度分析,还等什么?赶紧加入我们吧。
  • Best Practices for Using Email Encryption in Office 365
    Best Practices for Using Email Encryption in Office 365 Michael Osterman, President Osterman Research Jun 7 2017 6:00 pm UTC 60 mins
    Email is the most frequently implemented application in Office 365, and whether you use a cloud or hybrid solution, email needs to be thoroughly secured. A failure to properly encrypt email can lead to loss of intellectual property, breaches of sensitive customer and employee information, and violations of data breach and privacy laws.

    Join Michael Osterman of Osterman Research and DataMotion for a
    55-minute webinar that reviews the Office 365 environment, the reasons for securing email, and addresses best practices for implementing and using email encryption.

    This webinar will address a number of important questions:

    • Why worry about encryption in Office 365?
    • Why should you encrypt email?
    • What are the best practices for securing email in Office 365?
    • Is the native Office 365 email encryption your best option for
    securing email?

    Whether you are just beginning your plans to move to Office 365, or you’re already fully implemented, you need to make sure that your organization is moving data as securely as possible.
  • Is your mobile app too slow? Five best tips for mobile immediacy
    Is your mobile app too slow? Five best tips for mobile immediacy Stewart Rogers, Director of Marketing Technology, VentureBeat Jun 8 2017 5:00 pm UTC 60 mins
    Sure, you have a beautiful app, but if your load times are too slow and your file sizes are too large, you're leaving money on the table. The mandate is clear: Your mobile game needs to start up in five seconds, or you’ll start to churn players.

    It’s a tough balancing act between delivering rich content and letting players enjoy the game without a painful loading screen. And in some countries, speed and minimalism are a must, not a nice-to-have, if you're going to succeed.

    We're going to take a deep dive in the best practice for reducing load times across both the mobile web and apps. We'll look at screen load micro-data and how slow load times are killing publishers in the mobile arena.

    In this webinar, you'll:

    * Identify the best practices for optimizing load times for games with rich content
    * Find out the risks are if you fail to optimize load times, including the dangers associated with global reach
    * Discover what to do first, and which technologies can help you get there quicker


    Speakers:
    * Secil Watson, EVP Head of Digital Solutions, Wells Fargo
    * David Holtkamp, CEO, Crimson Moon
    * Jonathan Meson, CEO, VisualBlasters
    * Martín Domínguez, CIO at Etermax
    * Stewart Rogers, Director of Marketing Technology, VentureBeat

    Sponsored by Akamai
  • Getting Voice Biometrics Authentication Right in Financial Services
    Getting Voice Biometrics Authentication Right in Financial Services Dan Miller, Lead Analyst, Opus Research; Ravin Sanjith, Director, Opus Research; Interactions LLC Jun 8 2017 5:00 pm UTC 45 mins
    As financial service companies battle to build customer loyalty and increase security in the age of FinTech, providing efficient, secure and personal services is a source of competitive advantage. The rapid growth of voice biometrics authentication demonstrates it is a convenient and secure way to authenticate real customers, detect impostors and prevent fraud. 

    In this webinar, join Interactions and Opus Research as they describe the steps that financial service companies should take to incorporate voice biometrics authentication into the customer care experience. 

    Topics to be discussed include:
    • Identifying Responsibilities and Stakeholders: Contact center, security/risk management, marketing, customer care, IT, and communications infrastructure
    • Finding the Budget: Making a business case and finding the budget for voice biometrics authentication
    • Best Practices: Engaging Marketing to build customer awareness around voice biometrics
    • Preparing for Success: Anticipating the need to scale operations to accommodate new interaction patterns to suit multichannel environments
  • Avoiding Mobile Execution Pitfalls:Real Life Insights into Mobile Transformation
    Avoiding Mobile Execution Pitfalls:Real Life Insights into Mobile Transformation Craig Reigelhaupt, Mobility Director Jun 14 2017 2:00 pm UTC 45 mins
    Which platforms to support? BYOD, CL or Both? Unlocked or Locked? Cover all employees or just some? What about security? We deal with these questions on a daily basis, so why make the same mistakes as your peers? In this webcast we’ll share pitfalls to avoid and best practices to successfully deploy, manage and secure mobile to initiate transformation and promote growth within your organization.
  • A New Frontier in Cloud Security: The Secure Internet Gateway
    A New Frontier in Cloud Security: The Secure Internet Gateway Dan Cummins - 451 Research & Meghan Diaz - Cisco Jun 14 2017 5:00 pm UTC 60 mins
    Your employees are using more cloud apps than ever, and mobile workers frequently work without turning on their VPN. You need new ways to extend protection anywhere your employees work — and you need it to be simple, yet incredibly effective.

    Exciting innovations in network security-as-a-service offer distributed organizations the potential to extend and meaningfully increase security effectiveness. Join this 451 Research webinar with Cisco Security to hear a discussion about new cloud-delivered protection for mobile workers, lean branch offices, and cloud applications. We’ll cover the changing market landscape, the emergence of the Secure Internet Gateway, and highlight important buying considerations for companies looking to add these capabilities.
  • DreamWorks Animation and Aruba: The Outdoor Wi-Fi Experience
    DreamWorks Animation and Aruba: The Outdoor Wi-Fi Experience Keith McKay, Network Operations Supervisor, DreamWorks Animation & Eric Johnson Director, Product Management, Aruba Jun 14 2017 6:00 pm UTC 60 mins
    With the growing demands of enterprise outdoor Wi-Fi users, customers’ expectations of outdoor Wi-Fi has gone beyond the basic network connection. Outdoor Wi-Fi deployments for small and large areas are often different and how to improve the user experience while minimizing costs has always been a concern for enterprises.

    This webinar will address various outdoor use cases and their most appropriate solution; DreamWorks Animations will share their real-life outdoor deployment experience with the audience, including their unique outdoor Wi-Fi requirements, deployment challenges and their future move to enable an always-on indoor/outdoor Wi-Fi connectivity in the entire work place.

    Join us to learn more about the current challenges and benefits of outdoor Wi-Fi and ways to meet the new demands and performance standards.

    You can also qualify for a free Aruba access point*
    *Terms and Conditions apply
  • Transitioning IoT Infrastructure: From Networks of People to Networks of Things
    Transitioning IoT Infrastructure: From Networks of People to Networks of Things Christian Renaud, Research Director, Internet of Things, 451 Research Jun 15 2017 9:00 pm UTC 60 mins
    Networks are changing. With the vast expansion of IoT, we're experience the transition of enterprise and operator infrastructure from networks of people to networks of people, places and things.

    Join Christian Renaud, Research Director, IoT at 451 Research, as he looks at the impacts of the growing number of instrumented environments and objects on enterprise and carrier networks, capacities, signaling protocols, and emerging opportunities for value creation beyond simple connectivity.

    This webinar will cover:
    - Possible bottlenecks and roadblocks on the path to the Internet of Things
    - What leading organizations are doing today to prepare for the coming influx of new types of devices
  • Mobile advertising: Stop fraud and step up clicks
    Mobile advertising: Stop fraud and step up clicks VentureBeat Jun 21 2017 5:00 pm UTC 60 mins
    It's 2017 and the digital ad space hasn't stopped growing in size and complexity. Mobile advertisers are seeing increased opportunities for ad placements in apps and messaging platforms, which means more opportunities, but also new marketing challenges—and a major surge in fraud.

    Make this the year you stop letting fraudulent bots burn through your budget and start maximizing the power of mobile advertising with must-click messaging. Join our latest live, interactive event for an in-depth look at how to stay in front of your audience, ahead of your competitors, and on top of fraud.

    In this webinar you'll:
    * Learn what works and what doesn't in 2017's mobile advertising arena
    * Mitigate the mobile advertising fraud risk in your own applications
    * Create the most engaging mobile advertisements for savvy app patrons
    * Use video and 360 advertising to stay abreast of the latest trends in mobile advertising

    Speakers:
    * Stewart Rogers, Director of Technology, VentureBeat
    * Wendy Schuchart, Moderator, VentureBeat
    More speakers to be announced?

    Want to be a speaker on a VB Live event? Pitch your story at Webinars at VentureBeat Dot Com.
  • What Can be Done to Secure a Connected Vehicle?
    What Can be Done to Secure a Connected Vehicle? Mike Nelson, VP, Critical Infrastructure at DigiCert, Inc. Jun 22 2017 6:00 pm UTC 60 mins
    As self-driving vehicles are coming off the production line, automakers are deploying technology to improve the driving experience, from the infotainment system to enhancing brake and fuel efficiency. Yet, adequate cyber security measures still need to catch up. Whether it’s the hacked Jeep or the Nissan Leaf app vulnerability, connected vehicles often fail to implement basic authentication and encryption measures to protect users.

    Mike Nelson, VP, Critical Infrastructure at DigiCert will cover the following topics:
    - Insight into the state of connected vehicle security and the need for interoperable standards-based solutions.
    - How connected device manufacturers are using public key infrastructure (PKI) to provide scalable authentication, encryption and data integrity for the vehicle and its thousands of connected parts.
    - Specific steps security teams can take beginning today.
  • Push notifications that work: 6 tips for building a devoted user base
    Push notifications that work: 6 tips for building a devoted user base Stewart Rogers, Director of Marketing Technology, VentureBeat Jul 13 2017 5:00 pm UTC 60 mins
    A push notification is a tricky kind of social engagement: it can be a tap on the shoulder, a punch in the face, or water torture. In other words, it can be tremendously successful at driving commerce and engagement, or it could piss your customer off so badly they'll go rip you a new one on Twitter. And we've seen how well that works out for brands.

    At the very least, every misstep reduces open rates, strikes a blow against retention and destroys engagement. You want to know how to not be the boor at a cocktail party, because push notifications, one of the most powerful and immediate engagement tools in your arsenal (when you do it right) can garner 2770% higher conversion rates.

    Don't be part of the 63 percent of marketers who stumble on the messaging, timing, and frequency of your notification strategy—join this interactive VB Live event.

    You'll:
    * Discover the one trick to never-fail push notifications everywhere, not just apps
    * Drive 2770% higher conversion rates through a specific kind of push notifications
    * Learn how to apply behavioral triggered push notifications in your own marketing strategy
    * Build better timing into your push notifications to increase conversions


    Speakers:
    * Stewart Rogers, Director of Marketing Technology for VentureBeat
    • Wendy Schuchart, Moderator, VentureBeat

    More speakers to be announced soon!
  • ASO or GTFO: App store optimization FTW
    ASO or GTFO: App store optimization FTW Stewart Rogers, Director of Marketing Technology, VentureBeat Jul 20 2017 5:00 pm UTC 60 mins
    For LTV, engagement, and life­cycle, organic installs blow paid install campaigns out of the water—and they're a lot cheaper. VB Insight analysts report that if you want to boost organic downloads by at least 20 percent—or in some cases double or even triple that rate—you need to get in the ASO game.

    ASO basics have been buried alive in the avalanche of new apps, flawed app search, and rapid-fire algorithm changes that aren't always developer friendly. To get the most out of your entire marketing funnel, not just your app store presence, you need to step up your ASO game with these key takeaways from our latest in-depth, Godzilla-sized ASO report.

    For report highlights, key best practices and can't-miss ASO insights from super-analyst Stewart Rogers, join our latest interactive VB Live event!

    In this webinar you'll:
    * Learn why ASO is fundamental to the success of any app
    * Familiarize yourself with the pillars of solid ASO strategy
    * Leverage technology to increase your lifetime user value
    * Think beyond keywords for your search strategies

    Speakers:
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Peggy Anne Salz, Chief Analyst, MobileGroove
    * Wendy Schuchart, Moderator, VentureBeat

    Don't miss out, register today!
  • B2B video marketing: Turn your CRO into your BFF
    B2B video marketing: Turn your CRO into your BFF Stewart Rogers, Director of Marketing Technology, VentureBeat Aug 17 2017 5:00 pm UTC 60 mins
    You better get good at conversational video marketing, fast—or you're going to be obsolete.

    Videos and photos get the most retweets. Last year, Facebook's video viewership doubled from 4 billion views per day to 8 billion views per day in seven months. Google owns YouTube, and coincidentally, rich media is a favorite of the search engine's algorithms.

    Conversational videos drive traffic, boost engagement, and serve up information better than any other medium. They promote trust in your brand and your products. They're eminently shareable, potentially viral, and taking over the internet: 74 percent of all Internet traffic in 2017 will be video.

    Step up and stand out in every step of the sales funnel with conversational video marketing when you join our latest interactive VB Live event.

    By watching this webinar, you'll:
    * Optimize your audience takeaways for video content
    * Get tips from the savviest sales and marketing people on their video content strategy
    * Focus your energy on the right distribution channels for your adverts
    * Personalize video content to lock in the close

    Speakers:
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    More speakers to be announced soon!
  • Hunting Criminals with Hybrid Analytics, Semi-supervised Learning, & Feedback
    Hunting Criminals with Hybrid Analytics, Semi-supervised Learning, & Feedback David Talby, CTO, Atigeo Aug 23 2017 5:00 pm UTC 60 mins
    Fraud detection is a classic adversarial analytics challenge: As soon as an automated system successfully learns to stop one scheme, fraudsters move on to attack another way. Each scheme requires looking for different signals (i.e. features) to catch; is relatively rare (one in millions for finance or e-commerce); and may take months to investigate a single case (in healthcare or tax, for example) – making quality training data scarce.

    This talk will cover a code walk-through, the key lessons learned while building such real-world software systems over the past few years. We'll look for fraud signals in public email datasets, using IPython and popular open-source libraries (scikit-learn, statsmodel, nltk, etc.) for data science and Apache Spark as the compute engine for scalable parallel processing.

    David will iteratively build a machine-learned hybrid model – combining features from different data sources and algorithmic approaches, to catch diverse aspects of suspect behavior:

    - Natural language processing: finding keywords in relevant context within unstructured text
    - Statistical NLP: sentiment analysis via supervised machine learning
    - Time series analysis: understanding daily/weekly cycles and changes in habitual behavior
    - Graph analysis: finding actions outside the usual or expected network of people
    - Heuristic rules: finding suspect actions based on past schemes or external datasets
    - Topic modeling: highlighting use of keywords outside an expected context
    - Anomaly detection: Fully unsupervised ranking of unusual behavior

    Apache Spark is used to run these models at scale – in batch mode for model training and with Spark Streaming for production use. We’ll discuss the data model, computation, and feedback workflows, as well as some tools and libraries built on top of the open-source components to enable faster experimentation, optimization, and productization of the models.
  • Augmenting Humans: Identifying Ideal Scenarios for Enterprise Productivity
    Augmenting Humans: Identifying Ideal Scenarios for Enterprise Productivity John Nall, Founder, Appzion Sep 26 2017 3:00 pm UTC 60 mins
    Join John Nall, Founder and CEO of Appzion, as he takes a technical deep-dive into workforce mobilization through augmented reality.

    In this webinar you will learn the steps to enterprise AR productivity. Methods include techniques to identify ideal scenarios for augmenting humans, process mapping and observation techniques. Once the scenario is chosen, other considerations include software and hardware assessment and selection and cybersecurity for wearables.
  • Virtual Umbrella: Why We Chose Virtual Reality
    Virtual Umbrella: Why We Chose Virtual Reality Samantha Kingston, Founder, Virtual Umbrella Sep 28 2017 1:00 pm UTC 45 mins
    Samantha Kingston will explore why she bet her career on virtual reality and what it’s really like running a marketing company solely for VR, looking at trends and what challenges are ahead for 2018.

    Virtual Umbrella is an award-winning marketing consultancy specialising in Virtual Reality. Virtual Umbrella has worked on a number of notable projects including creating a virtual reality cinema in Cannes, curating and running a technology hub as part of the Edinburgh Fringe Festival and providing immersive experiences along the BBC and Imperial War Museum.

    Speaker bio:

    Samantha Kingston is the award-winning client director at Virtual Umbrella. Virtual Umbrella is a marketing and PR agency specialising in virtual reality. Samantha fell into the VR industry by accident but has spent her time in the industry building up her own company and working with the VR industry in the UK, Europe, and US. Samantha is an advocate for Women in tech and VR and she is often found moderating panels on equality in the workplace. In 2016 she won the regional and national ‘New Business’ award at Venus Awards, highlighted as one of MCV 30 under 30 and one of the rising stars of BIMA100 2016.