Welcome to the mobile computing community on BrightTALK! With the consumerization of IT and the widespread adoption of mobile devices across the globe, mobile computing has become an important part of many people's lives in a culture of bring your own device (BYOD). With mobile devices doubling as work phones and more employees working from home, businesses need to provide secure access to data and work applications from anywhere at any time. Join this growing community and hear from industry thought leaders in webinars and videos as they share their insight on mobile computing research and trends.
Join us for part two of our webinar series focused on helping companies prepare for the upcoming Australian Privacy Act and global government regulations, like European General Data Protection Regulation (GDPR).
Data sovereignty, especially for cloud first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.
This follow up webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our legal counsel for global data privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Graeme Pyper, Regional Director for New Zealand and Australia, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.
Join us to hear more about:
•The Mandatory Data Breaches scheme
•Case Study: A look at how Gemalto is preparing for Australia’s NDB & GDPR
•The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations
Let’s face it. Not all enterprise applications are born for Agile delivery. Organizations will have mission critical applications that are updated infrequently and will continue using waterfall development methodologies. “Why change when it is working well?” say customers. The question then becomes – Will your businesses be able to plan/build/test/track across an enterprise application portfolio for agile and non-agile teams?
Join us in this webinar, as we talk about balancing the needs of legacy and digital first applications, and what true hybrid application development means to your complex application portfolio.
Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.
Steve Reynolds, CTO, Imagine Communications
Steve Reynolds is Chief Technology Officer at Imagine Communications and responsible for the technical strategy and roadmap of the company, as well as managing business development, partner relationships, and M&A activity. Reynolds brings 20 years of technology leadership in the cable industry to Imagine Communications. At Comcast, he served as Senior Vice President of Premises Technology overseeing the strategy, roadmap and development of all technologies employed in service delivery to the customer premises. Prior to Comcast, Reynolds was Senior Vice President of Technology at OpenTV Incorporated, a world leader in digital and interactive television technology.
Host: Limor Schafman, Content Development Director, TIA
GDPR is coming into force in May 2018. Many organisations are now getting into gear in order to ensure they are compliant by the deadline. This is even more important for those organisations who are hosting their data off premises.
But what does GDPR really mean to businesses, how will it impact the way in which organisations handle their data and engage with trusted third parties?
Join Matthew Johns, Product Marketing Manager of CenturyLink and Slam Laqtib, Senior Product Manager of Thales eSecurity for a thought provoking discussion drawing from real-life examples on:
1) Organisational best practices when working with cloud service providers to adhere to GDPR
2) Key factors organisations to take into account when complying to GDPR
3) The steps global enterprises are taking get themselves #fit4GDPR
Recommended audience: CIO, CFO, Chief Procurement Officers, Finance Directors and Managers, Controllers, IT Procurement, Procurement Directors and Managers, Sales and Marketing Operations Directors and Managers
In this webinar, Amalgam introduces a new set of solutions focused on enterprise SaaS expense management, a $40 billion+ global market that is largely unmanaged at this point.
Amalgam estimates that less than 5% of SaaS spend is currently centrally managed. The other 95% is hiding in expense reports and one-off accounts that escape corporate control. No rules, no buik discounts, no disputes, no contract enforcement or negotiations.
Stop the insanity! Learn which vendors to consider to manage an expense that may now represent $5,000 or more per employee in your organization.
The next generation of applications being built at the rising star companies are different from the clunky software being built in traditional businesses. As traditional companies modernize their software stacks, they need to incorporate renewed expectations into their applications such as tailored user experiences, built-in analytics and decision-making while meeting response time requirements under any conditions.
James Curtis, senior analyst at 451 group, outlines top trends in user experience requirements and the higher bar for application developers when it comes to delivering complex analytics so users can take real time action. The wide availability of new NoSQL, streaming and advanced analytics technologies are enabling state of the art functionality in applications. Join this session for a discussion of top drivers and barriers organizations face while overhauling their applications to incorporate cutting edge functionality.
Leena Joshi, VP Product Marketing at Redis Labs examines specific advantages of the Redis Enterprise platform that simplify the implementation of real-time analytics functionality such as probabilistic counts, time-series analysis, leaderboards, personalized recommendations, location-based calculations into modern applications.
Capital One is a Top 10 credit card issuer in the UK and is recognized as an award winner for its exceptional customer experience. The team's philosophy to continually try new things, allows them to successfully balance tighter fraud prevention and increased customer satisfaction. In fact, Capital One readily adopted the CA Payment Security Suite to help ensure that balance.
Join Dave Laramy, Director of Fraud Strategy at Capital One and Hannah Preston, Solution Strategist, Payment Security at CA as they share tactics to eliminate legacy fraud controls and embrace more efficient ways to battle the bad guys with intelligent data and authentication.
Tune in and explore how to:
• Implement best practices and strategies for leveraging data and authentication
• Improve fraud prevention and the checkout experience with 3DS 2.0
• Prepare for regulatory changes, scheme mandates, and future transformations
Organizations on the journey to digital transformation are encountering new challenges with managing risk. Not only are complex digital transformation initiatives making it difficult for organizations to fully grasp their entire risk profile but digital transformation is also resulting in new types of risk for the company. Organizations with strong risk aversion are in danger of preventing or stifling innovation and change. How can organizations manage risk and create a strategy that empowers digital transformation? What have organizations learned on the road to digital transformation that can help others early on in the journey?
Ad fraud isn’t becoming more prevalent -- the fraudsters are just getting slicker. From bot nets to device ID spoofing, the tricks are getting more sophisticated, and raking in more and more cash for the swindlers.
Staying ahead of the fraudster’s learning curve is the key — and collaboration is the crucial element. While vendors and advertisers are directly impacted by fraud, tracking partners provide the technology to help fight fraud – all three players have to work together to circle the wagons.
Making a game plan can be complex, when there are no clear benchmarks for defining or measuring fraud, as each player defines it differently and different benchmarks are needed for each app type, geo, traffic source, and so on.
Join this VB Live event to learn how to tackle that complexity, how to define benchmarks, detect and manage fraud, and work with your partners to circle the wagons against the fraudsters.
Register for free!
* Who the stakeholders are, plus why and how is each is affected
* The MMPs’ role in this ecosystem
* What fraud is and what benchmarks should be used for defining it
* How to collaborate to detect and manage fraud on an ongoing basis
* What tools are out there to fight fraud
* Emily Storino, Network Strategy Lead, Electronic Arts (EA)
* Grant Simmons, Head of Client Analytics, Kochava
* Tal Nissenson VP Client Success US, Taptica
* Stewart Rogers, Analyst-at-Large, VentureBeat
* Rachael Brownell, Moderator, VentureBeat
The Telecommunications Industry Association (TIA) TR-42 Telecommunications Cabling Systems Engineering Committee is issuing a Category 8 cabling systems update. Join this webcast to learn the details.
>> Mark Mullins - Global Communications Manager, Fluke Networks
Mark is one of the founding members of Fluke Networks, starting in 1993. He has been involved in all of the key areas of the business, including cable testing, network troubleshooting and analysis. He holds a B.S. in Computer Science and an MBA from the University of Washington.
>> Frank Straka - Product Line Manager, Panduit
Frank Straka manages Panduit’s copper and fiber cable product lines. Frank holds multiple degrees in both engineering and business, including a BSEE, MSEE, and MBA. He holds 26 patents in copper connectivity and cable design. Frank is active in the TIA TR42.7 standards group, which developing new standards to support new applications like 25 and 40GBASE-T, 100W PoE++ and NBASE-T. He has spoken at multiple conferences such as BICSI, IWCS, and the Ethernet Summit on new copper developments.
A recent survey conducted among security professionals in Australia, Singapore revealed that up to 95% of respondents said phishing is the #1 threat. Yet many acknowledged they’re unprepared to deal with phishing attacks.
Attend this webinar to learn why responders are drowning in emails instead of hunting real threats. See why they’re betting on automation whilst we know, tech alone won’t stop threats from getting through and wreaking serious havoc. Learn what rapid changes and investments your peers are planning to turn the tide against phishing and protect their organisations.
In this webinar, you will learn:
- How bad is the phishing threat?
- How confident are companies in their phishing responses?
- What solutions are companies using—and which ones should they add?
- How can automation and technology help? Why are humans important, too?
- How does your organisation compare to organisations in Australia, Singapore and other countries around the globe?
Join PhishMe and (ISC)² on Nov 15 (Wed) at 14:00 (Singapore time) and learn more about phishing incident response.
What you don’t know about third-party apps in the Apple® App Store® and the Google Play™ store can hurt you. Apple and Google have app review processes at various levels, but banks and financial services organizations require more scrutiny -- especially for BYOD & COPE devices. Commercial apps used by employees in the workplace can leak data and violate security policies. Third party apps that use your company SDKs or APIs can expose your organization, defraud your customers, and tarnish your brand. Join our webinar to learn how to incorporate third-party commercial apps in your mobile threat modeling exercises and application security programs to protect your organization, your reputation, and your customers.
Employees with business mobile phones have become more pervasive and so have the management challenges associated with them. Unexpected overages, high mobile helpdesk costs, and unused mobile phones, are all too common, leading to an ever-increasing mobility TCO.
Cisco recently commissioned Forrester Consulting to conduct a research study on mobility management challenges. Guest speaker Michele Pelino, Principal Analyst at Forrester, will reveal Forrester’s findings on what is actually impacting your mobility costs and how automation can solve your challenges. She’ll also share her top recommendations on what you can do to optimize your mobility TCO.
What you’ll learn:
•What are the biggest contributors to high mobility TCO?
•What are the hidden costs of asset management?
•Why you should care about instant MACDs?
•How can automation deliver the most savings?
•Forrester’s top recommendations to reduce mobility costs
Co-speaker Pallavi Vanacharla, Cisco Jasper’s Head of Enterprise Mobility Product Marketing, will show you how to automate your mobility management with Cisco’s Control Center for Mobile Enterprise (CCME) platform.
Many organizations have started on their DevOps transformation journey today, but only 10% have fully embraced DevOps. Is it still so new that organizations are struggling to understand it?
Change is hard, and the transformation to DevOps is hard. It flies in the face of the traditional silos:
(1) Applications departments for the majority of the larger enterprises were in place to support their business; today they are expected to be revenue-generating, and expected to be the main way to engage with their users, including customer support; and
(2) There were a lot of teams, processes, and infrastructure that were all set up to support the original models.
Learn how to engage with your organization to move towards a more optimal DevOps model.
Join this session to discuss: How your organization can drive towards compliance, how to embed "privacy by design" to your development lifecycles, and how to protect all identified EU personal data and prevent data breaches.
Short certificate validity as industry best practice will be here sooner than you might think. The emergence of devastating threats and vulnerabilities is driving the need to create smaller windows of opportunity for cyber criminals.
Several new measures have already been implemented to this end, such as Certificate Transparency (CT) and more recently Certificate Authority Authorisation (CAA). Now Certification Authorities and browser vendors are becoming increasingly vocal to urge the industry to move toward short-lived SSL/TLS certificates.
In this webinar, we will help you understand:
- what are short-lived SSL/TLS certificates
- why the industry is reducing SSL/TLS certificates validity time
- what the benefits and drawbacks this brings to your organisation
- how to start preparing for the introduction of short-lived SSL/TLS certificates to your portfolio.
Find out how highly-targeted, low volume impostor email – or business email compromise (BEC) – attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organisations face today.
This is not news but things are changing. New technology or protocols, such as DMARC, can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.
Join us to learn:
- Why email spoofing works
- Current BEC trends and attack methods
- How Proofpoint’s new Email Fraud Defense solution can identify and block BEC threats before they reach the inbox".
Digital transformation creates a new set of challenges for IT architects and developers. Applications need to be created much faster than before, in a way that makes frequent changes possible for reacting quickly to customer needs and your competitive environment. And these applications need to fit in with your existing IT landscape.
Watch this on-demand webinar in which Andy Hampshire, technical evangelist at TIBCO Mashery® explains how you can achieve these goals using a combination of fine grained services and composable APIs.
In a recent survey, 43 percent of organizations are implementing or planning to implement the Internet of Things. Along with the benefits come challenges and risks. Every one of “thing” on the Internet may be an attack vector.
How do organizations set up a foundation for secure IoT implementation?
Attend this webcast to:
- Find out about trends and challenges in implementing IoT
- Discover best practice and solutions to mitigate security risks
- Learn about industry use cases on securing IoT
In this webinar, security and privacy expert Chris Apgar will delve into the recent guidance issued by OCR (Office of Civil Rights) on patients’ right to access their health information, parsing out what you need to know to not only meet HIPAA requirements, but also engage and serve the patient.
The HIPAA Privacy Rule requires health care providers and plans to give individuals the ability to view and receive copies of their medical and health records as well as make their medical record available to third parties. But what does this mean for providers? During the webinar, Apgar will brief you on:
•Scope of Information included / excluded
•Timeliness, fees and costs
•Form, format and manner of access
•Right to request providers send medical records to a third party
•Denial of access
•Steps to take now
Who should attend:CIO, CISO, Data Security and Compliance Officers and Staff
IT’s desire to become more nimble and agile has resulted in the rapid adoption of cloud delivered applications. This is not limited to the heavy hitters like salesforce.com for CRM or Office 365 for productivity. There are also applications servicing tasks and functions organizations might choose to outsource. The result is critical data spread across a vast array of resources, both on and off premise. Many organizations may use built-in cloud security functionality on top of their individual legacy deployments. However, this leads to silos of capability, mismatched policies, and noise in the form of alerts needing to be addressed.
Join Forcepoint and 451 Research as we address how taking a human-centric, risk adaptive approach can transform data security programs.
In the second year of a global tracking study, Opus Research presents findings from a survey of 500 business decision-makers to understand their perspectives in evaluating and deploying Speech Analytics platforms and services.
This study, commissioned by Uniphore, documents critical datapoints in the perceived value of Speech Analytics and its impact on contact center operations, compliance and regulation, workforce optimization, customer experience and delivering a return on investment.
Attendees to this webinar will receive a complimentary copy of the report “Executive Survey: Drivers for Deploying Speech Analytics (2017 Edition)."
On Wednesday, November 8th (8:30 PM IST | 11 AM EST | 8 AM PST), join Dan Miller, lead analyst & founder at Opus Research, Derek Top, director of research with Opus Research, and representatives from Uniphore, as they unveil the key findings from this definitive report on speech analytics.
The high speeds expected from future 5G networks and the demands of dense data over those networks is leading to communications network densification. Data centers, a key component of high speed delivery, are redefining their role, becoming a part of the fog and moving increasingly to the edge. This webcast will cover the role micro data centers will play in community network communications infrastructure; their configuration and structure; use of artificial intelligence and virtualization; control systems and operations; and workforce needs.
>> Don Byrne, Managing Director, Metrix411
>> Phillip Marangella, VP of Business Development, Cloud and IoT Solutions, EdgeConneX
PKI (public key infrastructure) has quietly become one of the most critical assets for enterprises today. Our 2017 study, conducted by the Ponemon Institute and sponsored by Thales e-Security, reveals an increase in the number of applications that use digital certificates, that enterprises are investing in fortifying the security posture of their PKIs, and that the IoT is the next game-changer for the future of PKI.
Join this webcast to learn about the top findings of this research, including:
• The increasing influence of the IoT in PKI planning
• The increasing security maturity of enterprise PKIs including the use of Hardware Security Modules
• Identification of enterprise applications that commonly depend on PKI credentials
• The ongoing challenges associated with PKI deployment and management
APIs are generally referred to as a way to access a specific piece of data or business logic. But what if you need to compose APIs into flows that externally expose a business process with more complex data manipulation requirements?
In many cases, this functionality already exists in SOAP services or ESB functionality, but requires repurposing and updating to a more modern REST approach. Digital business applications often require melding of existing functionality with new capabilities, a convergence of old and new.
Attend this webinar to learn:
- Why choreography and orchestration matter in an API architecture
- How service decomposition can be applied
- How to maximize reuse of existing APIs to reduce time to market
- How both orchestration and choreography are handled by TIBCO Mashery® Enterprise
Proofpoint always strives to offer the most advanced security to our customers and invests around 20% of our revenue back into R&D.
The latest Proofpoint Email Security release has added additional defenses against a changing threat landscape. Join this webinar to learn how upgrading to the latest version brings significant benefits across email security including:
* Email Authentication
* Attachment Sandboxing
* Data Loss Prevention
Bot은 자동화된 프로그램으로, 웹사이트의 정보를 수집하거나, credential abuse와 같은 악성행위를 수행합니다. Bot으로 인한 피해는 IT 측면의 퍼포먼스 저하 뿐만 아니라, 매출 감소, 경쟁력 저하, 비즈니스 기회 상실과 같이 비즈니스에 심각한 영향을 끼치는 경우까지 퍼져 있습니다. Bot을 운영하는 쪽은 심지어 차단을 회피하기 위한 여러 가지 기술까지 활용하여 지속적으로 대응하기 때문에, 차단만이 모든 문제를 해결해 주는 방법은 아닙니다. 점점 다양해지고 지속적으로 변화하고 발전하는 Bot의 공격 방법 등을 알아보고, 이를 효과적으로 관리하기 위한 접근방법 및 기술에 대해 알아봅니다.
Hackers are already scheming their next wave of targets: will they replicate the colossal Equifax breach and cash in on reams of personal data or freeze up IoT devices simply in order to disrupt critical systems?
Join Forcepoint's Bob Hansmann, Director, Security Technologies for a Forcepoint 2018 Security Predictions Report webcast on the most pressing security issues for the upcoming year.
You’ll receive an advance copy of the Forcepoint 2018 Security Predictions Report just for attending.
Digital transformation has already disrupted the traditional payment ecosystem. Now a new subcategory, paytech, is dominating the Fintech revolution. Most innovative services are included in the paytech ecosystem, such as instant, cross-border, mobile, invisible, peer-to-peer or cryptocurrency payments. Furthermore, banks and financial institutions had to digitalize their existing services, creating a new channel with the digital platform. The recent emergence of Neobanks has particularly influenced the historical players by providing innovative approaches leveraging technologies and social media. However, payment services success is based on the perceived confidence future customers will have in the different payment platforms. Trust in the payment service is directly linked to the associated security.
To close out the 2017 webinar season, our mobile security expert panel will review the top mobile threats of 2017 (e.g., Cloudbleed, Bootstomp, Broadpwn, and more) and then debate what’s next in mobile app security and mobile app security testing for 2018. Join us for a spirited discussion of the security ramifications of the new iPhone X, iOS 11, Android 8, the latest innovations in the mobile app security testing, and more. Compare your mobile app security and mobile app security testing initiatives with what our experts say should be your top priorities in 2018.
Live attendees will be entered to win a free mobile app security assessment!
Applications are ubiquitous and essential to the operation and growth of business in today's digital enterprise. Applications are a treasure trove of customer information, intellectual property, and confidential data. They often contain critical IP, application functionality, data, and keys for accessing back-end corporate systems.
Many enterprises believe the measures they have taken to protect their networks and endpoints and to develop more secure applications are sufficient to mitigate these risks. But many of these measures only build better fences around applications. Organizations that develop applications, meanwhile, may believe that the measures invested in application security testing and operational defense can mitigate at least the most significant exposures. But when an adversary has the ability to analyze applications closely, organizations may be surprised to discover that the security of sensitive data, their competitive advantage, and keys to accessing critical back-end systems, can be laid bare more easily than they think.
Compromises to an organization’s applications can create enormous risks that company leaders may rarely consider fully. Breaches to an application can quickly lead to a loss of IP, damage an organization’s brand, violate compliance and regulatory requirements, and even lead to customer harm – consequences abundantly evident in recent high-profile breaches.
Join us to learn more about the 5 critical areas where application risk management falls short.
Phishing attacks don’t involve malware, but instead they take advantage of people to steal credentials, rendering your sandbox useless.
Email threats continue to plague organizations around the world, but when thinking about email threats, it’s critical not to focus only on malware. It’s Phishing that actually makes up the majority of threats targeting both organizations and consumers.
Watch this webinar to learn:
- How phishing has evolved
- Phishing threat landscape
- Top phishing lures that impact employees
- How Proofpoint can effectively address phishing attacks
Digital transformation. It’s disrupting every industry and impacting how you deliver a great customer experience. Companies that ignore it risk their very survival; but those that embrace it can dramatically improve customer satisfaction and drive greater value. The truth is, keeping up with bandwidth demands and continuing innovation, while transitioning from manual processes to end-to-end digital processes, is extremely difficult on their own. Plus your customers have an expectation of your brand to be available 24x7 and deliver at any time of the day or night that they desire.
Join our live webinar and learn:
· Why digital transformation will only be successful if you begin with the customer in mind.
· What digital technologies are being used by top companies to maximize customer satisfaction and drive revenues.
· How to define the best approach to transforming the customer experience for your industry/organization.
Director of Strategic Enterprise Networks, Verizon Enterprise Solutions Product Marketing
Global Lead for Vertical Marketing
Director of Business Innovation & Digital Experience
Organizations across the globe are engaged in what some consider to be another IT buzzword – Digital Transformation. Many though take it seriously, as concerted means to optimize customer experiences, improve business efficiencies, and capitalize on new market opportunities.
In this webinar Carl Lehmann, Principal Analyst at 451 Research will discuss how industry leading enterprises pursue digital transformation from both business and technical perspectives by:
•Describing digital transformation and how it is used to create competitive advantage
•Discussing why and how enterprises are pursuing such initiatives
•Identifying the critical technology needed for execution
•Revealing how digital automation platforms improve and enable new ways of doing business
Attendees will learn how to define and structure digital transformation initiatives unique to their firms and how best to make use of digital automation platforms for IT and business transformation.
In this presentation, we will discuss several applications of NLP such as information extraction, knowledge synthesis, and entity retrieval. We will discuss how these fundamental set of algorithms are applicable for a wide array of use-cases and industry verticals such as healthcare, business intelligence, life sciences, legal, e-commerce, sales, and marketing.
Additionally, case studies from these areas will be used to provide an intuitive explanation of complex NLP topics such as distributional semantics, computational linguistics, question-answering, conversational AI, and applications of deep learning to text data.
Dr. Sid J. Reddy's Bio: https://www.conversica.com/sid-j-reddy/
First in the Industry to deliver Deception, Mobile Threat Defense, and Endpoint Detection and Response (EDR) in a Single-Agent Architecture. Join us to learn the latest Evolution of Endpoint Security & Data Protection:
•Defend against ransomware with multi-layered protection
•Gain enhanced visibility into suspicious files via tunable protection to make better policy decisions
•Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
•Extend advanced security to mobile devices
•Use deception techniques to expose hidden adversaries and determine their intent to improve security posture
•Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
New Integrations Extend Data Protection Beyond Traditional DLP
Powered by the industry’s leading data loss prevention technology, to give you greater visibility and control over your confidential data.
•Expanded Information Centric (ICE) Encryption integration
•Enhanced data classification integration
•Sensitive Image Recognition
•Stronger endpoint controls
•Enhanced data at rest discovery
•Improved cloud app policy and incident management
•Flexibility on cloud deployment
•And More …
Join Symantec and (ISC)² on Dec 13 at 14:00 (Hong Kong time) and learn about the latest Evolution of Endpoint Security & Data Protection.
Ransomware. Business email compromise (BEC). Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure.
In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it.
Register now to learn about:
•The latest social engineering targeting trends and techniques
•Top email fraud tactics, including business email compromise (BEC) and social media account phishing
•The rise of fraudulent mobile apps and how criminals target users on the go
Mobile computing and the use of cloud applications are touted as ways to help healthcare providers deliver better patient care. Clinicians carrying tablets or other devices to exam rooms and patients’ bedsides can quickly access and update patient data and other vital resources necessary for accurate and expeditious treatment.
No one disputes the value of “anytime, anywhere” computing in healthcare – indeed, in other industries as well – but there is a concern about the risk associated with access to sensitive and regulated data via unmanaged devices and unsanctioned cloud applications.
In this CISO panel discussion moderated by Hussein Syed, CISO at RWJBarnabas Health and joined by panelists Alex Fry, VP of Software Security Assurance at Elsevier and Mike Schuricht, VP of Product Management, Bitglass, you’ll learn about real-world approaches to some of the most vexing challenges of mobile and cloud computing.
Providing a great digital experience is critical for your brand, but the complexity of monitoring modern apps presents a challenge. When you combine a mix of mobile and Web applications, containers and microservices in distributed environments, identifying when and why your customers are having a poor app experience is often difficult.
Join us for this webinar where Bryan Whitmarsh, Director, Product Management at CA Technologies will demonstrate how you can achieve a 5-star app experience for your customers. See how CA App Experience Analytics leverages a powerful, open source analytics platform to provide user experience insights and deep visibility into performance across apps and channels.
Recommended Audience: CIOs, CFOs, Enterprise Architects, IT Project Managers, IT Procurement, IT Service, IT Finance
Cloud Infrastructure-as-a-Service is growing rapidly as companies replace obsolete data center servers and storage with "The Cloud." As companies use more services from multiple regions and even multiple vendors, Cloud Computing becomes yet another management headache where discounts, service levels, and IT governance can go unenforced.
This webinar provides key tips on the Cloud Service Management market, including the drivers, best practices and top vendors including, but not limited to:
HP Project New Stack
IBM Cloud Asset Management
The cost of Impostor email has risen to $5.1B. Business email compromise (BEC) is impacting employees, business partners and customers of organizations around the world.
Proofpoint Email Fraud Defense (EFD) extends the security already offered by Email Protection to block criminals that spoof your trusted domains to trick victims, both inside and outside of your organization, into sending money and other sensitive information to the attacker.
Join us for a live webinar on Tuesday, June 6th at 10am PST where you will learn:
• Latest impostor email trends including BEC and consumer phishing
• How to extend your current protection to stop all impostor threats
• Upcoming product integration with Email Protection to secure your entire email ecosystem