Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • Outsourcing Core IT When You Are Core IT
    Outsourcing Core IT When You Are Core IT Hyoun Park Recorded: May 17 2018 28 mins
    How do you know if you are outsourceable? And how can you guide the outsourcing without simply being replaced?

    This webinar takes the analyst's experiences in IT, examples from current IT organizations and managed mobility service providers, and key trends in the IT world to show when and how to identify IT jobs ripe for outsourcing and how to position yourself to take advantage of the outsourcing rather than simply be replaced.
  • Beyond the stack trace: A new approach to debugging
    Beyond the stack trace: A new approach to debugging AJ Jindal, Product Manager of Mobile & IoT, AppDynamics Recorded: May 17 2018 27 mins
    Mobile app crashes lose you revenue, loyalty, and potential customers due to poor user ratings at the App Store or Play Store.

    But stack traces, the traditional debugging method, can leave you with more questions than answers. Learn how to keep your apps healthy and customers happy by fixing crashing apps more quickly, and for good.

    This invaluable lesson on debugging apps will teach you how to:
    - Access a full context of user behavior, application flow, and code execution
    - Reduce your Mean Time to Identification of a crash issue
    - Eliminate costly trial and error, replicating, or not finding the issue at all

    ​The health of your apps is too important to your business to pass up these valuable tips. Register now.
  • Accudata's White-Hat Files | May 2018 Edition
    Accudata's White-Hat Files | May 2018 Edition Josh Berry, CISSP & OSCP, Principal Consultant for Risk & Compliance Recorded: May 17 2018 16 mins
    Welcome to the White Hat Files – a monthly series where the best white hat hackers give you what you need to know about the threat landscape.

    Our first White Hat File comes from Josh Berry, who holds OSCP, CISSP, and GIAC certifications.
    In this 15-minute webinar, he’ll give you the rundown on Accudata’s most-seen vulnerabilities, as well as best practices you can use to defeat attackers looking to dissect and destroy your business.

    Join us for our next edition in June! Register here: https://www.brighttalk.com/webcast/16347/322209?utm_source=Accudata+Systems&utm_medium=brighttalk&utm_campaign=322209
  • Verizon Risk Report - Streamline Security with Actionable Insights
    Verizon Risk Report - Streamline Security with Actionable Insights Katie Crammer, Director, Verizon Global Security Solutions Recorded: May 17 2018 39 mins
    Please join Katie Crammer, Director of Global Security Solutions as she provides an in-depth conversation about a new powerful tool to help enterprises quantify cyber risk and ROI.

    Enterprises routinely struggle to correlate security-related costs with cyber risks and have difficulty determining their security ROI and measuring their security posture. The Verizon Risk Report provides a comprehensive, automated, 360-degree security risk posture assessment, updated daily. The report provides a security score by measuring outside security posture against peers, evaluates control effectiveness, exposes gaps, weaknesses and associated risks, yielding actionable recommendations for mitigating real and likely risks.
  • 2018 Global Encryption Trends:  The Effects of Multi-Cloud Use and Compliance
    2018 Global Encryption Trends: The Effects of Multi-Cloud Use and Compliance Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute and John Grimm, Sr. Director of Security Strategy, Thales eSecurity Recorded: May 17 2018 61 mins
    In today’s environment data protection is more critical than ever and businesses are responding. This 13th edition of the Global Encryption Trends Study, conducted by the Ponemon Institute and sponsored by Thales eSecurity, reveals how increased cloud use and accelerated compliance initiatives are driving adoption of new encryption strategies. Join Dr. Larry Ponemon and John Grimm to learn about some of the top findings in this year’s Global Encryption Trends Study, including:

    • Growth in encryption and Hardware Security Module (HSM) usage
    • The importance of performance, scalability and consistent policy enforcement across enterprise and cloud use cases for encryption solutions
    • Trends in encryption deployment across multiple vertical markets and geographies that are useful for benchmarking
  • Verizon Threat Research Advisory Center - Monthly Intel Briefing
    Verizon Threat Research Advisory Center - Monthly Intel Briefing John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: May 16 2018 73 mins
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Mobile Security Index 2018 Highlights

    Our Verizon Threat Research Advisory Center presenters will be:

    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •John Pernini, Security Consultant, Investigative Response – Americas
    •Roy Porter, Senior Analyst, Threat Intelligence

    This month we'll be covering mobile device security threats by featuring the Verizon Mobile Security Index (MSI) 2018. Mobile devices are an appealing target—there are more of them, they have access to more data, and they are critical to business operations. The MSI includes recommendations that can help strengthen your organization's mobile device security, to include security measures for your network, devices, applications, and people.

    For this month's MIB, we'll highlight findings within the MSI and provide insight and recommendations from our investigations and threat intelligence to help you improve your mobile device security and response posture.

    Following the MSI highlights, we'll cover the following topics:

    •Current Intelligence
    •Latest Malware Trends
    •Attacks and Threat Indicators
    •Significant Vulnerabilities

    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Harnessing Contactless Payments to Drive New Growth Opportunities in LATAM
    Harnessing Contactless Payments to Drive New Growth Opportunities in LATAM Adrian Drozd, Frost & Sullivan, Joe Santana, FIME, Marcelo de Oliveira,Visa Recorded: May 15 2018 61 mins
    Digital transformation has disrupted the payments ecosystem. Recent technology innovations around contactless payment have transformed the payment industry by providing concrete advantages and benefits to both merchants and consumers. Applying contactless functionality to traditional payment cards can enable a better customer experience based on convenience and ease of use. Furthermore, by promoting contactless payment, merchants can improve their operational efficiency through faster digital transactions that reduce payment times. The infrastructure deployed to process contactless payments must be certified and aligned with the latest security standards to ensure success.

    Key Takeaways:
    · Understand the recent specifications and requirements published for Latin America
    · Hear about the new Visa deadline regarding contactless implementation
    · Find out how your organization can derive competitive advantage by embracing contactless payments
    · Discuss expected industry transformation with key industry stakeholders
  • 451 Research and Gemalto present "MSPs - Maximizing ROI with Security"
    451 Research and Gemalto present "MSPs - Maximizing ROI with Security" Gary Marsden, Senior Director of Data Protection Solutions at Gemalto and William Fellows, Research VP 451 Research Recorded: May 15 2018 60 mins
    Digital transformation is a critical part of an enterprise business strategy. However, for many organizations, having more digital assets introduces major headaches due to the complexity of technologies, the lack of available and affordable skills and the ever-changing security threat landscape. The ability to use cloud based solutions to service digital strategies is helping reduce costs but is also increasing risks, isolating data and reducing controls.

    Many MSPs have recognized this as an opportunity and are building business plans and service strategies to help their customers. Being the one-stop shop for applications, cloud services and related security aspects is a path that is actively being trodden by MSP’s, MSSP’s and traditional resellers alike. According to 451 Research, it is about a “sell with” approach by addressing business requirements with security “built-in”. In this joint webinar, our guest William Fellows, 451 Research analyst will provide new research results this related data points and discuss how the cloud is creating opportunities as well as challenges. The interactive Q&A style webinar will cover:

    • A current view of the cloud’s impact on digital transformation
    • Opportunities for MSPs to expand service portfolios and generate new revenue streams
    • What a true “sell with” partnership looks like
    • Technology enabling this new sales and marketing strategy for MSPs

    William Fellows is a co-founder of The 451 Group. As VP of Research, he is responsible for the Cloud Transformation Channel at 451 Research.

    Gary Marsden: Senior Director of Partnerships at Gemalto
  • New Data Breach Findings: The Year of Internal Threats & Misplaced Data
    New Data Breach Findings: The Year of Internal Threats & Misplaced Data Jason Hart, CTO of Data Protection at Gemalto Recorded: May 14 2018 52 mins
    2018 has started off as an eventful year with data breaches at Saks Fifth Avenue, Lord & Taylor and Under Armour’s MyFitnessPal app. And it will continue to be a catalyst year for data security with the 25th of May deadline for the European Unions’ General Data Protection Regulation, which regards “privacy as a fundamental human right and to protect it as such.” Data exposed or breached is not only a headache for security teams, but also impacts brand reputation, customer confidence and stock prices.

    Gemalto’s 2017 Breach Level Index found 2.6 billion records where compromised in 2017, a 88% increase from 2016. In this webinar our expert, Jason Hart, will walk attendees through the most shocking 2017 stats, new data breach tactics and how companies can manage risk by mapping out where your data resides. Join us to learn more about:
    -Internal threats and misconfigured cloud databases
    -Growing security threats like data integrity attacks
    -Innovative technology that is solving some of these issues
    -What we have in store for 2018
  • 2018 Verizon DBIR and Federal Agencies: A Cyber Security Panel Discussion
    2018 Verizon DBIR and Federal Agencies: A Cyber Security Panel Discussion Craig Bowman, Vice President - Advanced Solutions, Verizon Recorded: May 10 2018 60 mins
    The 2018 Verizon Data Breach Investigations Report (DBIR), now in its eleventh year, is an industry benchmark for information on cybersecurity threats. This year we looked at over 53K security incidents and 2,216 confirmed breaches. But what does it really mean for federal agencies?

    Join our panel of federal cyber security experts for a look at some of the key findings of the 2018 report:
    • Cybercrime can come in any shape or size, and not always in the form you’d expect.
    • State affiliated actors are prevalent threat actors against the public sector.
    • The average time gap between the first click on a phishing campaign and the first report to security? Longer than you think.
    • Ransomware was the top variety of malicious software in 2017.
    • The overwhelming majority of incidents fell into one of nine attack patterns — knowing these can help you mitigate the risks of a breach.

    Our panel:
    • Chris Gagne- ASAIC, Criminal Investigative Division, Cyber Forensics and Technology Unit, United States Secret Service
    • Matthew Noyes - Cyber Policy and Strategy Director, United States Secret Service
    • Bernard Wilson - Program Manager - Network Intrusion Responder (NITRO), United States Secret Service
    • Jeff Wagner- Associate Chief information Officer, U.S. Office of Personnel Management (OPM).
    • Marc Spitler- DBIR Author/Analyst, Verizon
    • Craig Bowman (moderator)- Vice President, Advanced Solutions Division, Verizon
  • Cash in at scale on the esports explosion
    Cash in at scale on the esports explosion Dean Takahashi, Lead Writer, GamesBeat Recorded: May 9 2018 60 mins
    The esports market is on fire. Last year 43 million people watched the League of Legends world championships, a multiplayer fighting game. And it's not a niche market of teenage boys in basements. A recent report found that 31 million people watch esports tournaments in the U.S., and more than double that -- 68M -- in China.

    And the question is -- how do you monetize that at scale?

    Look to the wild success of the Asia-Pacific esports companies. The companies who stage events like China’s 2017 Riot Championships, which posted more than 32 million viewers, have been able to compel customers to actually pay to view content, and even tip players, with the right streaming and payment technologies.

    Don’t miss this VB Live event for keen insights from leaders in the space on how U.S. companies can effectively operate globally or begin to expand globally. You’ll learn how to confront the challenges that scaling your audience can pose and improve it, from west to east, as you look to capture more of the global audience opportunity.

    Register now for free.

    You’ll learn about:
    * The opportunities provided by the growth in the esports streaming content market
    * What's causing the streaming content surge and market growth
    * The technology making this explosive esports growth possible on a global scale
    * Confronting the problems around scale in markets like China and elsewhere

    * Dean Takahashi, Lead Writer, GamesBeat
    * Johannes Waldstein, CEO, FanAI Inc.
    * Roc Harry, Relationship Director, Worldpay
    * Carter Rogers, Senior Analyst, SuperData Research

    Sponsored by Worldpay
  • Threat Modeling – Locking the Door on Vulnerabilities
    Threat Modeling – Locking the Door on Vulnerabilities Ed Adams, CEO by day, engineer at heart Recorded: May 9 2018 63 mins
    Did you lock the door before leaving your house this morning? If you did, you threat modeled without even realizing it. Threat modeling is identifying potential threats (house robbery) and implementing measures to mitigate the risk (locking your door).

    Protecting valuable assets, no matter if personal assets or business-related assets such as the software you are developing, threat modeling should become an instinctual and necessary part of your process.

    Our talk highlights how nearly 50% of security flaws can be mitigated through threat modeling. We help you prevent and mitigate risks by utilizing a reliable and hard-hitting analysis technique that can be applied to individual applications or across an entire portfolio. We show you how to effectively apply these techniques at the start of the design phase and throughout every phase of the development lifecycle so you can maximize the ROI of your security efforts.

    Topics covered include:
    • Threat Modeling 101
    • The propagating effect of poor design
    • Tabletop exercise – a world with and without threat modeling
    • Best practices and metrics for every stakeholder
  • Stronger Security Posture through Zero Trust and API Management
    Stronger Security Posture through Zero Trust and API Management Fernando Serto, Head of Security Tech & Strategy, APJ; Dawson Sewo, Senior Enterprise Security Architect, Akamai Technologies Recorded: May 9 2018 64 mins
    Organizations today are facing multiple challenges on providing an enhanced digital experience to their customers, whilst ensuring confidential data remains secure in accordance to evolving regulatory and compliance regimes. While APIs are the core of digital experiences, including single-page apps and mobile applications, traditional perimeter security architecture is no longer enough to protect your business and you must concurrently evolve your security approach.

    In this webinar, Akamai will be sharing findings on how adopting a zero trust model will increase the security posture of organisation through a “Never Trust, Always Verify” paradigm. We will also look at how the API threat landscape have evolved and share best practises in API security.

    Join Akamai and (ISC)² on May 9, 2018 (Wed) at 13:00 (Singapore time) to learn stronger security posture through zero trust and API management.
  • 5 things you need to know to prepare for (& successfully deploy) digital advice
    5 things you need to know to prepare for (& successfully deploy) digital advice Panel Webinar - Please see description for the panellist names. Recorded: May 8 2018 34 mins
    • Identifying your target market and accompanying strategy, customer proposition and distribution models
    • Getting your business model right
    • Choosing the right technology strategy
    • Ensuring you have the right workforce on-board
    • The role of compliance when deploying digital advice

    Panel speakers:

    Rickard Lindell, Head of Digital Advice, Nordea
    Dean Butler, Head of Innovation, Prudential
    Maria Lagutina, Head of Product Innovation & Propositions, CYBG
    Simon Crowe, Sales Director, EMEA, Glassbox
  • The Smart Digital Workplace
    The Smart Digital Workplace Aruba, a Hewlett Packard Enterprise company Recorded: May 8 2018 3 mins
    The Aruba Smart Digital Workplace combines the right technology foundation with the best workspace design to enable creativity, collaboration, speed and freedom.
  • How businesses win with Aruba Mobile Engagement
    How businesses win with Aruba Mobile Engagement Aruba, a Hewlett Packard Enterprise company Recorded: May 8 2018 2 mins
    The Aruba Mobile Engagement Solution transforms the way large, public-facing enterprises engage with guests at their venues.
  • Seal, Lock & Protect: How not to leave your networks and cloud vulnerable
    Seal, Lock & Protect: How not to leave your networks and cloud vulnerable John Ray, Product Management and Danna Bethlehem, Product Marketing Gemalto and Josh Chambers, Product Management at F5 Recorded: May 7 2018 54 mins
    Securing and monitoring your network and cloud environments has changed over the past few years and compliance and government regulations will add to it. Network traffic monitoring tools have been presented as a solution to meeting compliance and performance on a network. But monitoring alone is not enough. In terms of security, companies need to holistically secure their network, cloud and data, no matter where their users are accessing from.
    This joint webinar between F5 and Gemalto will help attendees prepare for the next-generation of secure network access as more data resides in more places with more people accessing it. It will also walk them through the integration between F5 and Gemalto and what options this partnership offers.

    In this webinar, you will earn how to:
    •Reduce the risk of breaches by ensuring that only authorized users are accessing network, using the F5 environment as an example
    •Protect & encrypt your customer data
    •Manage secure cloud access
    •Comply with regulations
  • Navigating the Hidden Challenges of IoT:  How to make your IoT Project a Success
    Navigating the Hidden Challenges of IoT: How to make your IoT Project a Success Brian Partridge of 451 Research & Bryan Lubel of Integron Recorded: May 4 2018 61 mins
    Deploying and managing thousands of connected assets across an enterprise and around the world can be a daunting task, to say the least. From hardware selection and multiple carrier contracts, to device management, security, coverage, and global rollout, the complexities are numerous. These complexities can result in delayed time-to-market, cost overages, and inability to scale.

    Enterprise companies are turning to outsourced managed IoT servicers to address these challenges – achieving a faster time to market and reduced total cost of ownership for their solutions, with edge-to-cloud managed services becoming increasingly important piece of their outsourcing strategy.

    In this webinar, join 451 Research vice president Brian Partridge and Integron president Bryan Lubel as they:

    •Discuss today’s IoT market drivers, challenges, and new opportunities
    •Review 451 IoT research results on connectivity trends, IoT skills gap, and IoT adoption strategies
    •Share many of the hidden challenges and roadblocks that enterprise companies face as they roll out their IoT projects
    •Discuss models and approaches for addressing and overcoming these hidden challenges to optimize cost and reduce risk
    •Discuss real-world case studies in healthcare, energy, transportation, and retail
  • 451 Research Webinar: How the GDPR Impacts Enterprise Mobility Management
    451 Research Webinar: How the GDPR Impacts Enterprise Mobility Management Chris Marsh, 451 Research and Magnus Mjøsund, Apperian Product Manager, Arxan Recorded: May 3 2018 57 mins
    The European Union’s General Data Protection Regulation (GDPR) that goes into effect on 25 May 2018 expands the meaning of personal data, mandates when such data can be collected, and enforces full transparency and consent from the user. Organizations of all types processing data from EU residents must evaluate and likely make changes to their enterprise mobility management practices in order to adhere to the new law or face severe penalties.

    Watch this webinar to understand what GDPR means for infrastructure and operations professionals that are responsible for mobile and endpoint strategy to make sure your organization is compliant from day one.

    We review the most important sections of the law related to enterprise mobility from an administration and end user perspective as well as the implications for BYOD programs. Learn how EMM can be leveraged to meet GDPR requirements and how a mobile application management solution like Apperian supports privacy and mitigates risk by managing corporate data while leaving personal data untouched.
  • Encryption Lunch and Learn
    Encryption Lunch and Learn Rain Networks and DataMotion Recorded: May 3 2018 45 mins
    Join us on Thursday, May 3rd for a webinar with DataMotion! For nearly 20 years DataMotion has provided users with an easy to use secure email delivery system. With SecureMail Desktop, you can send emails that are encrypted and secure, helping to meet any compliance regulation requirements. The best part is that this can all be done via an easy to install plug-in. During the webinar, we will be discussing the following topics:
    •DataMotion's balance between security and ease of use
    •How DataMotion helps customers stay in compliance with regulations like HIPAA, GLBA, FISMA, and more.
    •How recipients open and view encrypted emails
    •DataMotion's Partner Program
  • Security at the Speed of App Development: DevOps Meets CA Single Sign-On
    Security at the Speed of App Development: DevOps Meets CA Single Sign-On CA Hosts: Herbert Mehlhorn, Product Management & Venky Karukuri, Sr Principal Architect Recorded: May 3 2018 61 mins
    For businesses and government organizations to succeed, development and security teams must quickly build, test, and deploy secure apps and features. The challenge presented by this DevOps process? Typically, there are only a few security teams to support many development teams.

    The good news? DevOps is not just for developers anymore. Join us as we discuss how CA Single Sign-On REST APIs can help security teams:
    • Confidently create, read, update, and delete policies
    • Easily move policies from dev to staging to production
    • Efficiently keep pace with development team practices

    We’ll also cover how to apply DevOps techniques to your infrastructure, allowing security teams to better prepare for releases, minimize downtime, and avoid costly upgrades.
  • Strategies for Monetising Open Banking
    Strategies for Monetising Open Banking Roger Vincent, Head of Partner Innovation, Equifax; Nick Cabrera, Director, Finance Edge Recorded: May 2 2018 38 mins
    Roger Vincent, Head of Innovation with Equifax will share his insights on making the most of Open Banking and his lessons learned along the way.

    In this webinar Roger will talk about:

    * How increased use of open APIs is likely to shape the financial services market, why challenger banks are making headway, the big banks are building partnerships and the impact of APIs among payment service providers.
    * Activities banks need prioritise in the wake of Open Banking; starting with compliance & legal issue and why they need to assess time/resources carefully before trying to deploy solutions.
    * Which strategies are likely to thrive in the new environment and how regulatory compliance can quickly be turned into competitive advantage to commercialise Open Banking.
    * Overcoming security and privacy concerns associated with data sharing and the implementation of GDPR.
    * Strategies to encourage customer engagement by using Open Banking applications to enrich user experience to create long term value over short term revenue.
  • Apperian App Management Platform Demo
    Apperian App Management Platform Demo Arxan Recorded: May 1 2018 6 mins
    Watch the 5-minute Apperian App Management demo video today and tour the platform that enables IT and line of business professionals to deliver critical apps to 100% of users across their organization.
  • The Essentials of Container Monitoring
    The Essentials of Container Monitoring Peter Waterhouse, Sr. Advisor, CA Technologies Recorded: May 1 2018 44 mins
    Containers are being widely adopted across DevOps teams to speed the development and deployment of applications but sometimes at the cost application performance and the user experience. As these new modern architectures are deployed, teams struggle to understand how best to gain performance and user insights due into these highly ephemeral environments. Traditional monitoring techniques are challenged and require a new approach. Download this webcast to learn more about essentials of monitoring containerized application environments.
  • Harnessing the Power of Digital Consumer Identity
    Harnessing the Power of Digital Consumer Identity Naresh Persaud, Senior Director of Security at CA Technologies Recorded: Apr 26 2018 41 mins
    Today’s consumers do not want to wait on the phone for customer service. Today’s consumers do not want to fill out lengthy online forms to access information or resources. In short, today’s consumers’ time is valuable and not unlimited. As a result, every company is redefining its online digital experience to maximize customer engagement, enhance brand affinity, and increase consumer wallet share.

    This is your opportunity to learn how harnessing digital consumer identity can foster an effective consumer engagement strategy. Join Naresh Persaud, Senior Director of Security at CA Technologies as he shares case studies from multiple industries that are exploiting the power of digital consumer identity to build trust and make customer interaction frictionless.