Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • IT Cost Control: Five Warning Signs that Fast Growing Companies Are Overwhelmed
    IT Cost Control: Five Warning Signs that Fast Growing Companies Are Overwhelmed Hyoun Park and Valicom Recorded: Feb 22 2018 61 mins
    Recommended Audience: CFOs, CIOs, IT Directors, Network Directors, Telecom Directors, Mobility Directors, Enterprise Architects, Procurement Directors

    Recommended Company Size: $10 million to $1 billion in annual revenue or companies growing more than 100% year-over-year.

    Summary: It's easy to lose control of IT costs when companies grow quickly. Those that lose track of IT costs will give up valuable funds that could be used to hire talent or acquire key assets.

    In this webinar, Amalgam CEO and Principal Analyst Hyoun Park and Telecom Expense Management vendor Valicom explore 5 big warning signs that company IT spend is going off the rails and then how to fix these issues via either a software, back office support, or managed services solution.

    This Amalgam Insights webinar is generously sponsored by Valicom
  • Panel Discussion: The Road to a Data-Driven Business
    Panel Discussion: The Road to a Data-Driven Business Jen Stirrup, Gordon Tredgold, Joanna Schloss, & Lyndsay Wise Recorded: Feb 22 2018 62 mins
    Join Jenn Stirrup (Director, DataRelish), Gordon Tredgold (CEO & Founder, Leadership Principles LLC), Joanna Schloss (Data Expert) and Lyndsay Wise (Solution Director, Information Builders) as they discuss what it takes to take a business from needing analytics to leveraging analytics successfully.
  • How to unlock savings in Mobile Device Deployments
    How to unlock savings in Mobile Device Deployments Craig Riegelhaupt Recorded: Feb 22 2018 9 mins
    Gartner states that companies with 500+ employees could be paying upward of 30% more than necessary on mobile*

    Want to make sure you're not one of them? We'll take 10 minutes to uncover how.

    *Gartner, “Focus on Four Areas to Control U.S. Cellular Voice and Data Service Costs, 2016,” Bill Menezes, 8 December 2016
  • 5 Best Practices for App Adoption and Engagement
    5 Best Practices for App Adoption and Engagement Dustin Amrheim, VP Professional Services & Mobile, Pendo & Adam Covati, Sr. Director, Product Management, Bandwidth Recorded: Feb 21 2018 58 mins
    5 Best Practices for Highly Effective Mobile App Adoption and User Engagement
    How does your app stack up? Mobile product teams are challenged to drive app adoption and usage in an environment where most apps don’t last past the first use. Successful mobile teams don’t just drive one-way outreach in their app, they close the loop with customers - offering deep engagement and communication throughout the user journey.

    Why this webinar is worth your 60 minutes:

    * You’ll learn new tactics for user engagement that you can use inside and outside of your app
    * You’ll know how your users want to be contacted and surveyed
    * You’ll see how app owners and product managers can marry customer experience with app engagement
    * You’ll take actionable feedback that you can use immediately, no matter what kind of app you manage
  • Healthcare orgs: Slay the risks of data-enabling your care providers
    Healthcare orgs: Slay the risks of data-enabling your care providers Mitchell Parker, Indiana University Health, Information Security & Compliance & Salim Hafid, Product Marketing, Bitglass Recorded: Feb 21 2018 59 mins
    The healthcare industry is adopting technologies that give care providers rapid access to sensitive patient information, when and where they need it. While productivity is enhanced with cloud computing, mobility, “BYOD” unmanaged personal devices, and hosted SaaS apps like Office 365, the CISO is concerned with resolving the inherent risk these technologies bring with them.

    For the CISO, it’s important to look at everything, assess risk the right way, and have a practical mitigation plan to address issues that could lead to data loss or breaches, ransomware and other threats.

    In this webinar led by Mitchell Parker, Executive Director of Information Security and Compliance (CISO) at Indiana University Health and Salim Hafid, Product Marketing Manager at Bitglass, you’ll learn how to resolve the risk of cloud applications and access via unmanaged devices, and how to apply appropriate controls that enable patient care in a seamless and secure manner.

    Our experts will talk about the issues everyone is struggling with, and how cloud security is evolving to address them.
  • Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
    Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA David Weinstein (CTO, NowSecure) // Sergi "Pancake" Àlvarez (R2) // Ole André (FRIDA) Recorded: Feb 21 2018 56 mins
    From the creators behind top mobile tools R2 and FRIDA, get the inside scoop on the R2 and FRIDA OSS projects. Led by NowSecure Research Team including David Weinstein, Ole André and Pancake (Sergi Àlvarez), this webinar speaks to our favorite mobile AST OSS projects. Peek behind the curtain on these tools, check out on their latest updates, learn how to use them to solve a crackme, and talk about potential future enhancements.

    Attendees will learn about popular open source projects for AST and walk away with hands-on experience on how to use them and get a peek at the future.
  • Better Cost Allocations. Better Business Decisions
    Better Cost Allocations. Better Business Decisions Ann-Marie Murray Recorded: Feb 21 2018 12 mins
    Don't let inefficient cost allocations cause bad business decisions. Inaccurate allocations diminish the value of reporting, distorting your understanding of where in the business costs are being consumed.

    With the right practices in place, accurate cost allocations are achievable. In 10 minutes we’ll talk about how to get it right.
  • Next-Gen Directory Services: How CIAM and IoT Drive Security & Performance
    Next-Gen Directory Services: How CIAM and IoT Drive Security & Performance CA Technologies: Clayton Donley, SVP Software Engineering, Security & Rob Lindberg, Sr Principal Product Mngr, CA Directory Recorded: Feb 15 2018 38 mins
    The reality is that Consumer Identity and Access Management and the Internet of Things are fostering unprecedented change. The scale and types of devices and digital identities are increasing at a significant pace, driving huge security and performance concerns. These concerns have many companies asking:

    • How are potential risks being monitored and secured?
    • How are users and devices being managed?
    • How are directory services being configured?

    Learn to address these challenges, while shaping a more secure and cost-effective infrastructure.

    Join CA Technologies gurus Clayton Donley, SVP, Software Engineering, Security and Rob Lindberg, Sr Principal Product Manager, CA Directory to explore alternatives and recommendations. You'll also be able to compare performance results of leading next-gen directory services, tested and compiled by an independent, third-party.
  • Storage Performance Benchmarking: Workloads
    Storage Performance Benchmarking: Workloads Mark Rogov, Dell EMC, Chris Conniff, Dell EMC, Tim Lustig, Mellanox Recorded: Feb 14 2018 57 mins
    Benchmarking storage performance is both an art and a science. In this 5th installment of the SNIA Ethernet Storage Forum’s “Storage Performance Benchmarking” series, our experts take on optimizing performance for various workloads. Attendees will gain an understanding of workload profiles and their characteristics for common Independent Software Vendor (ISV) applications and learn how to identify application workloads based on I/O profiles to better understand the implications on storage architectures and design patterns. This webcast will cover:
    •An introduction to benchmarking storage performance of workloads
    •Workload characteristics
    •Common Workloads (OLTP, OLAP, VMware, etc.)
    •Graph fun!

    Spend Valentine’s Day with us. We think you’ll “love” this webcast!
  • CMD+CTRL Peek & Play
    CMD+CTRL Peek & Play Roman Garber, Development & Security Manager, Security Innovation Recorded: Feb 14 2018 29 mins
    Unique to the industry, CMD+CTRL are simulators where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

    For every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

    We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

    Sign up to test drive CMD+CTRL!
  • How to Build an Efficient Security Operation Center with the ArcSight SIEM
    How to Build an Efficient Security Operation Center with the ArcSight SIEM Soma Bola Recorded: Feb 14 2018 34 mins
    With the growth of the number of cyberattacks, having a Security Information Event Management (SIEM) Technology in place can aggregate and correlate data from security feeds. These include: network discovery and vulnerability assessment systems, risk and compliance systems, log management systems, penetration testing tools, firewalls, IPS, threat intelligence feeds, host antivirus systems, web security appliances, and email security appliances. SIEM can be a "single pane of glass" for the security analysts to monitor the enterprise.

    SIEM Technology also allows companies to be able to correlate data from various sources to surface patterns that could represent malicious or suspicious activity. This way, they can prevent, block, or contain all nefarious networks activity and attacks.
  • Ep. 8 Using Splunk to Analyze Performance Metrics: Q&T SIG Talk
    Ep. 8 Using Splunk to Analyze Performance Metrics: Q&T SIG Talk Chris Trimper Recorded: Feb 13 2018 18 mins
    Using Splunk to Analyze Performance Metrics

    Chris Trimper will show you how to leverage Splunk for storing and analyzing performance data from LoadRunner. This allows for easy trending and possible collaboration with other application metrics stored in Splunk. We will also look at building self-service dashboards showing application performance metrics.

    You will be hearing about:

    • Introduction to Splunk
    • Process of preparing LR data for Splunk consumption
    • Building dashboards and performing analytics in Splunk

    Join us for the next upcoming SIG Talk on Tuesday, March 13, 2018: http://www.vivit-worldwide.org/events/EventDetails.aspx?id=1073255&group=.
  • SIG Talk: Quality & Testing 3 - Testing Tools
    SIG Talk: Quality & Testing 3 - Testing Tools Scott Moore,Chris Trimper Recorded: Feb 13 2018 62 mins
    For this Vivit SIG Talk session, 2 Performance Testing thought leaders will be featured. They will share their knowledge and expertise with you.

    Below is a quick outline of the agenda and topics for you:

    Speaker: Scott Moore - Performance Testing Internet of Things:

    • An overview of IoT architecture and protocols
    • A deeper look into the MQTT and CoAP protocols specifically
    • A demonstration of how to test the performance of IoT applications using LoadRunner 12.55

    Speaker: Chris Trimper - Using Splunk to Analyze Performance Metrics:

    • Introduction to Splunk
    • Process of preparing LR data for Splunk consumption
    • Building dashboards and performing analytics in Splunk

    Join us for the next upcoming SIG Talk on Tuesday, March 13, 2018: http://www.vivit-worldwide.org/events/EventDetails.aspx?id=1073255&group=.
  • Ep. 7 Performance Testing Internet of Things: Q&T SIG Talk
    Ep. 7 Performance Testing Internet of Things: Q&T SIG Talk Scott Moore Recorded: Feb 13 2018 36 mins
    Performance Testing Internet of Things

    Scott Moore will take a dive into performance testing Internet of Things (IoT) applications and platforms. It includes a deeper look into two of the most popular protocols being used today: MQTT and CoAP. Learn how you can ensure your IoT platform and applications scale and reduce the risk of failure under load in highly constrained environments.

    What will be covered:

    • An overview of IoT architecture and protocols
    • A deeper look into the MQTT and CoAP protocols specifically
    • A demonstration ofhow to test the performance of IoT applications using LoadRunner 12.55

    Join us for the next upcoming SIG Talk on Tuesday, March 13, 2018: http://www.vivit-worldwide.org/events/EventDetails.aspx?id=1073255&group=.
  • The Second Wave of Business Mobility: The Intersection of Big Data and Mobility
    The Second Wave of Business Mobility: The Intersection of Big Data and Mobility Chris Marsh of 451 Research & Jay Klauser of NetMotion Software Recorded: Feb 8 2018 59 mins
    The first era of business mobility is over. Companies are expecting a better return from the investments in mobile devices and applications and stronger utilization of the mobile data that runs across them. As a result companies are looking for new ways to assert security while also looking to a wider range of benefits from their mobility management solutions. Cost control, performance management and compliance, in addition to security, top the list. Fortunately the intersection of mobility and big data is showing the way, with vast amounts of data from outside the firewall capable of being intelligently analyzed so that IT Operations teams can make better decisions, faster.
  • Advanced Access Management for the Modern Enterprise
    Advanced Access Management for the Modern Enterprise CA Technologies hosts: Martin Yam, VP Authentication & Cloud Solutions, Carol Alexander, Senior Director, Security Products Recorded: Feb 8 2018 37 mins
    It’s a dilemma. Today, security must be built into mobile applications to fight rampant online fraud, but many App Developers don't have the necessary skill set … nor the time required to become proficient coders. What is the answer?

    Join CA Technologies hosts - Martin Yam, VP, Authentication & Cloud Solutions and Carol Alexander, Senior Director, Security Products - to learn how to quickly build and maintain modern, frictionless, and secure apps for your customers. It’s true. With CA Rapid App Security, developers can easily and rapidly:
    • Integrate device security and multifactor and risk-based authentication into apps
    • Eliminate dozens of complex steps, typically required for coding user and device security

    Let your developers focus on mobile applications requirements, while your business delivers a trusted user experience.
  • Key trends in Telecom Industry for 2018
    Key trends in Telecom Industry for 2018 Robert Whitmore Recorded: Feb 8 2018 13 mins
    Watch our 10-minute On-Demand Webinar "Key trends in Telecom Industry for 2018" to learn more about the expansion of traditional TEM into new expense management categories, such as:
    - SD WAN and what it means for traditional network design
    - Telecom and cloud pricing models
  • Mobile Developer Insights: See What Your Code is Doing in the Real World
    Mobile Developer Insights: See What Your Code is Doing in the Real World Bryan Whitmarsh, CA Technologies Recorded: Feb 7 2018 56 mins
    You spend countless hours developing and nurturing your code before sending it out into the real world. But once the world gets its hands on your app, anything can happen.

    In this webinar we'll cover how mobile developers can see what their code is doing in production, how users are interacting with your app and how to tell which features you'll want to focus on and perhaps which ones you'll want to drop for your app all together. Join this webinar to learn how you can:
    - Improve the next version of your app based on real-user insights
    - Leverage analytic visualizations to improve app flow and design
    - “Peek over the shoulder” of your users to see how they’re interacting with your app
    - Gain code-level visibility into app crashes across platforms
    - Compare KPIs from your latest app release to previous versions
  • The OWASP Top 10 2017 - Let's Cut to The Chase
    The OWASP Top 10 2017 - Let's Cut to The Chase Kevin Poniatowski and Mark Burnett Recorded: Feb 7 2018 60 mins
    What Do You REALLY Need to Know About the New OWASP Top Ten?

    The OWASP Top Ten is the de-facto web application security standard because it reflects the evolving threat landscape, providing organizations a framework to manage and mitigate application security risk.

    This dual-presenter format will examine the critical newcomers and pesky incumbents from both an offensive and defensive perspective. Attend to get our expert insight on how to harden Web applications and align your program towards OWASP compliance.


    Topics covered include:

    - The newcomers – why they are so tricky and elude traditional test efforts
    - XSS and Injection – mistakes organizations keep making that land these preventable threats on every Top Ten list
    - Design flaws that cause them and coding errors that expose them
    - High impact activities that reduce exploitability, prevalence and impact

    Meet the Presenters:

    Kevin Poniatowski, Sr. Security Instructor & Engineer at Security Innovation, brings an optimal blend of speaking ability, technical savvy, and an insatiable passion for security to Security Innovation's training customers. Kevin entered the application security field in 2007 with Security Innovation, where he has split time between application security course development and delivering instructor-led courses.

    Mark Burnett is a security consultant, author, and researcher who specializes in application security, authentication, and hardening Microsoft Windows-based servers and networks. Since 1999 he has worked in numerous areas of IT security, developing unique strategies and techniques for protecting critical assets. Mark is author and coauthor of a number of security books and publishes security articles for several web sites, newsletters, and magazines.
  • Spectrum of Mobile Risk
    Spectrum of Mobile Risk Lookout Recorded: Feb 7 2018 3 mins
    Short advertorial showing the potential risks and consequences of a company's mobile phone being hacked.
  • Project & Portfolio Management: What is new v9.42
    Project & Portfolio Management: What is new v9.42 Jay Krackeler, Sylvia Davis Recorded: Feb 6 2018 62 mins
    Project and Portfolio Management, PPM, is continuously evolving, especially with the Agile adoption in the Enterprise. Portfolio managers are now asked to manage integrated portfolios with hybrid projects (Waterfall & Agile).

    PPM version 9.42 brings a new portfolio management module, including Epic and seamless integration with Agile tools. You can now create your own KPIs to measure success of the various portfolios and integrated programs and projects. These new features bring agility and more insight data, so that you can focus on what is most important for the business.

    In this webinar, you will learn about:

    New integrated PPM Portfolio management
    How to create unlimited portfolio scenarios
    How to create Epics in PPM and integrate with Agile tools
    New KPIs to monitor and measure portfolio strategy
  • Tips for Using Encryption to Reduce HIPAA Compliance Risk and Protect Your Data
    Tips for Using Encryption to Reduce HIPAA Compliance Risk and Protect Your Data Chris Apgar, CISSP; CEO & President, Apgar & Associates; Andy Nieto, Health IT Strategist, DataMotion Recorded: Feb 6 2018 64 mins
    Learn some practical steps for implementing encryption to reduce your organization’s HIPAA compliance risk.

    In this webinar renowned security and privacy expert, Chris Apgar, CISSP, discusses options for protecting PHI data at rest, what steps to take and how to implement them. Andy Nieto, Health IT Strategist, will cover the role encryption and secure messaging can play in protecting PHI data in motion. Together, they’ll offer best practices you can follow to lower your risk, including:
    •How to get started – assessing your risk
    •What your options are – how to protect PHI
    •What’s the budget – dispelling the cost myth
    •Using encryption appropriately – balancing the need to encrypt
    with getting work done
    •Maintaining ease of use and efficient workflow
    •Mobile devices and encryption

    (Note video voice starts at 40 seconds)
  • Before you choose Microsoft – 5 Things to Check in an Access Management solution
    Before you choose Microsoft – 5 Things to Check in an Access Management solution Mor Ahuvia, Authentication Product Marketing at Gemalto Feb 26 2018 4:00 pm UTC 60 mins
    Organizations with Microsoft environments, such as Azure or Office 365, are inclined to implement Microsoft’s native access management solutions (namely, Azure AD and AD FS). Defaulting to Microsoft’s cloud SSO solutions may appear to be the best choice, a closer examination of these solutions reveals critical downsides, as well.

    Join this webinar to learn the five things to consider before implementing Microsoft’s access management solutions. You will also see a demo of how you can centrally define access management policies (including cloud SSO and step-up authentication) for Microsoft and 3rd party apps with a vendor agnostic-solution.
  • Cyber Security Update 2018
    Cyber Security Update 2018 Markus Grüneberg, Security Strategist and Mario Seefried, Cyber Security Professional Feb 27 2018 9:00 am UTC 60 mins
    So bleiben Sie vor den neuesten Cyber-Bedrohungen geschützt

    Erfahren Sie in unserem Cybersecurity-Jahresupdate für 2018, wie aktuelle Angriffe aussehen und wie Sie Ihr Unternehmen vor diesen neuen Bedrohungen schützen. Informieren Sie sich unter anderem, über

    - Vorhersagen für die Bedrohungslandschaft 2018 mit besonderem Fokus auf Europa
    - Wichtige Maßnahmen, die Sie ergreifen können, um Ihr Unternehmen zu schützen
    - Top-Ressourcen zur Unterstützung Ihrer Sicherheitsanstrengungen
  • Digitising Customer Onboarding
    Digitising Customer Onboarding Abe Smith, Founder & CEO, Dealflo Feb 27 2018 12:00 pm UTC 60 mins
    Digitising Customer Onboarding: How to improve the customer experience without compromising on compliance and risk

    Today’s consumers, accustomed to receiving smart and convenient digital services from companies such as Uber, Apple and Amazon, and are beginning to demand personalised, interactive and immediate services from their banks.

    A recent report revealed 42% of UK consumers have adopted FinTech services (EY 2017 FinTech Adoption Survey), so it’s no surprise banks want to adapt to the fast-moving digital marketplace where new and disruptive competitors are already circling. What’s stopping them though, is risk.

    Creating an environment that drives the productivity, speed and compliance essential to sell financial services via digital channels is paramount to survival.

    This webinar will explore how banks can digitise the customer onboarding process without compromising on risk, satisfying customers, regulators and shareholders alike.
  • Ponemon Research 2017 Trends in Cloud Security: Cloud & Compliance Compatible?
    Ponemon Research 2017 Trends in Cloud Security: Cloud & Compliance Compatible? Larry Ponemon, Chairman and Founder of the Ponemon Institute and Jason Hart, CTO office for data protection Feb 27 2018 4:00 pm UTC 60 mins
    95% of companies have adopted cloud services but the 2018 Global Cloud Data Security Survey found there is a wide gap in the level of security precautions applied by companies in different markets. Organizations admitted that on average, only two-fifths (40%) of the data stored in the cloud is secured with encryption and key management solutions. This is disturbing since only a quarter (25%) of IT and IT security practitioners revealed they are very confident they know all the cloud services their business is using,

    The reality is cloud creates challenges in knowing where your data resides and what or who has access to it. In 2018, breaches like Uber and Accenture occurred because of improperly configured security for web and cloud applications that were connected to a company’s network. A major catalyst to address this is upcoming regulations and compliance, which are trying to catch up with cloud adoption. Over the next few years, companies will be faced with more complicated and intricate auditing to demonstrate security and privacy best efforts in the cloud.

    During this webinar, Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Jason Hart, CTO of Data Protection, will walk attendees through the research methodology, key findings and how things have changed over the past couple of years. Join us to learn more about:
    -2018 Global Cloud Data Security Findings
    -Compliance and cloud security: How will this work?
    -A shift in the budget: Where is IT spending their money?
    -Country breakdown of IT cloud security: Who is doing the best?
    -What can you do to secure the cloud and comply with regulations?
  • What are the full spectrum of mobile risks in 2018?
    What are the full spectrum of mobile risks in 2018? Burak Agca - System Engineer Feb 28 2018 10:00 am UTC 60 mins
    Mobile has become the primary espionage target. Everyday employee behaviors can jeopardize your data, systems, and compliance policies.

    With over 120M mobile devices using our endpoint security products, Lookout has unparalleled global insight into the full spectrum of mobile risks, threats, and vulnerabilities.

    Register to today's webinar to learn about:
    - The threat landscape
    - The evolution of mobile threats
    - How does that impact your organization?
    - How other other organizations are doing?
    - The impact of a breach post GDPR
    - How to protect your enterprise data?

    Live Q&A session at the end.
  • CMD+CTRL Peek & Play
    CMD+CTRL Peek & Play Roman Garber Feb 28 2018 6:00 pm UTC 30 mins
    Unique to the industry, CMD+CTRL are simulators where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

    For every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

    We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

    Sign up to test drive CMD+CTRL!
  • How to Build Exceptional Products
    How to Build Exceptional Products Annie Dunham, Director of Product Management at ProductPlan, and Kelsey Hughes, UX Designer at Pendo Feb 28 2018 7:00 pm UTC 75 mins
    Product Management & UX can be a harmonious super-team, or they can be mired in overlap and conflict. Guess which approach leads to more successful products? The most effective teams embrace overlap and focus on delivering an exceptional product experience for their customers. Together, Product Managers and UX/UI Designers turn unique market insight into tangible products that have the power to surprise and delight customers. Product teams which master the craft of user experience tend to win big by creating end-to-end product experiences that attract, delight and retain their users.

    Please join us as we sit down with Annie Dunham, Director of Product Management at ProductPlan, and Kelsey Hughes, UX Designer at Pendo, to share how they inspire user experience in their respective roles.

    We’ll show you how ProductPlan and Pendo deliver excellent experiences with smart, efficient, and beautiful products and give you the chance to ask questions and join the discussion.
  • GDPR & Privileged Access Management … Are You Ready?
    GDPR & Privileged Access Management … Are You Ready? Cullen Lemley, Cybersecurity Consultant at CA Technologies Mar 1 2018 6:00 pm UTC 60 mins
    May 25, 2018. It’s a date that is approaching quickly. It’s also the deadline for GDPR compliance. For companies that fail to comply, the cost can be high - as much as 4% of annual turnover.

    Note: There is a misconception is that the regulation affects only companies in the European Union. In fact, it applies to any company that has dealings or plans to have dealings with citizens that reside in the EU.

    Take the lead and get ready to initiate GDPR. Join Cullen Lemley, Cybersecurity Consultant at CA Technologies, for an overview of the impending regulations. Learn the important security facets of GDPR, the challenges for Privileged Access Management, and how businesses around the globe are preparing for the deadline.
  • Voice Biometrics and Deep Neural Networks: Intelligent Auth, Seamless CX
    Voice Biometrics and Deep Neural Networks: Intelligent Auth, Seamless CX Ravin Sanjith, Opus Research, Dan Miller, Opus Research, Matt Garland, Pindrop Mar 6 2018 6:00 pm UTC 45 mins
    The mixture of ever-increasing computing power, storage capacity and machine learning is enabling new, holistic security solutions for enterprise contact centers and customer support channels. Pindrop has leveraged it’s extensive access to hundreds of millions of calls per year via its anti-fraud solution and Phoneprinting™ technology to deliver their latest Deep Voice™ biometric engine, enabling the next generation of multi-layered security, intelligent authentication, and cross-platform identity.

    In this webinar, join Opus Research and Pindrop to learn how Pindrop’s proprietary Deep Voice biometric technology marries Deep Neural Networks and Voice Biometrics to overcome the cumbersome processes involved with enrollment, verification accuracy and fraud prevention to help contact centers deliver rich, natural, and secure voice experiences.
  • Mobility & Digital Transformation – The Big Picture
    Mobility & Digital Transformation – The Big Picture Christian Schuertz, Business Development Manager, Application Delivery Management Software Mar 7 2018 8:00 am UTC 60 mins
    Digital Transformation of Enterprises is going on as companies try to find ways to grow their revenues, enable the workplace of the future and at the same time reduce the cost of doing business.

    Technology enablers like access to stable broadband connections, proliferation of mobile devices, IoT and big data provide numberless opportunities to create new innovative offerings.

    In this webinar we will provide an overview on how Micro Focus Mobile Lifecycle Solutions enable enterprises to build, test, secure and monitor mobile and web applications that provide a superior user experience. The new SLA of any truly digital enterprise.
  • A new era of mobile threats demands a new form of defense
    A new era of mobile threats demands a new form of defense Orange Cyber Defense & Check Point Mar 7 2018 9:30 am UTC 30 mins
    Mobile devices are now considered to be one of the weakest links in the IT infrastructure of most enterprises. While the cost of a mobile breach is similar to that of a desktop or laptop breach, an astounding number of enterprises are still lacking next generation protection, leaving themselves at high risk of attack.

    Orange Cyber Defense has teamed with Check Point to lay down the hard facts surrounding the mobile threat landscape based on insight from current research and a deep understanding of the global market. The webinar will deliver practical advice surrounding common myths and offer a simple methodology approach which can be applied across the business.

    Join this short webinar to understand:
    •Why 100% of enterprises are at risk of attack.
    •What next generation mobile cyber attacks look like.
    •Vital steps enterprises should take to protect themselves.
  • Women in Tech Leadership: Building your Brand & Becoming a Better Leader
    Women in Tech Leadership: Building your Brand & Becoming a Better Leader Jeanne Morain, Emerald de Leeuw, Jill Donahue & Andrea Short Mar 8 2018 4:00 pm UTC 60 mins
    2017 was a historic year for women and feminists around the world. With the #metoo and #knowno campaigns, gender gaps and disparities were brought to light in ways they hadn't been before.

    Now it's a new year and with it comes new challenges for women in hi-tech careers: whether it be navigating your career through these times, finding or becoming a mentor, building your personal and professional brand as a leader, dealing with office politics or maintaining work-life balance, the challenges and opportunities for women in the workplace are endless.

    Join this expert panel with moderator Jeanne Morain and panelists Emerald de Leeuw, Executive Director, EuroComply Data Protection Technology, Jill Donahue, Sr. Director of Marketing, PC Connection, and Andrea Short, Director, Supplier Marketing at Tech Data.

    They will share personal stories and experiences, tips and best practices, problems and solutions around these and other topics for women in tech leadership.
  • Putting NPS to Work - 5 Ways to Get the Most Out Of Your Net Promoter Programs
    Putting NPS to Work - 5 Ways to Get the Most Out Of Your Net Promoter Programs DanLarsen, Sr. Product Manager, Henry Schein Mar 8 2018 7:00 pm UTC 60 mins
    You’ve setup your survey, you’ve segmented your customers, and you’re ready to start collecting NPS responses. Congratulations! Now what are you going to do with your score? You’re not alone if you’re not sure. NPS is becoming an increasingly popular metric, but it’s not always clear how product teams can take NPS feedback and make it actionable in their products.

    Henry Schein faced similar questions when rolling out NPS for their dental practice software. Dan Larsen, Sr. Product Manager, shares how they rolled out NPS to their customers, the lessons learned along the way, how and they built a tight feedback loop both inside and outside the company to ensure that customer input is captured, and leveraged directly to improve their product experience.
  • How Cloud & SDN will transform your network this year
    How Cloud & SDN will transform your network this year Ashley Nurcombe, CWNE Systems Engineer, UK Aerohive Networks Mar 14 2018 11:00 am UTC 45 mins
    How much time and missed opportunity is yesterday's network design costing today’s organisation? For many, cloud has already disrupted their software, communications and storage to scale and simplify operations – so why not networks?

    Join our CWNEs for this 30 minute workshop o review the benefits of today’s cloud networking offerings – and how to apply principles of software defined networking for radical simplification of the local and wide area network. Reviewed:

    How cloud networking compares to previous fixed network approaches
    How to remove limitations and achieve faster deployment, simpler management and instant adaptability
    Comparing clouds for your network’s future – scalability, security and performance
    How to automate complex operations and dynamically change network behaviour based on activity
    What cloud-powered big data, AI and analytics could do for you
  • 2018 Digital Commerce Fraud Outlook
    2018 Digital Commerce Fraud Outlook Jordan McKee, Principal Analyst Mar 14 2018 2:00 pm UTC 60 mins
    Transactions are migrating from offline to online channels, driving dramatic shifts in the fraud landscape. 2018 will be another challenging year as increasing EMV penetration in the US further throttles the counterfeiting market, shifting more fraudulent activity into digital channels. Join 451 Research Principal Analyst Jordan McKee as he discusses the major fraud trends to monitor in the New Year and shares market data on the current and future state of the digital commerce threat environment.
  • BlueCross BlueShield’s CASB Journey to Secure the Cloud
    BlueCross BlueShield’s CASB Journey to Secure the Cloud Michael Payne, Security Architect at BCBS, and Mike Schuricht, VP of Product Management at Bitglass Mar 14 2018 5:00 pm UTC 60 mins
    As one of the nation’s largest insurance providers, BlueCross BlueShield of Tennessee is always looking to make its 100,000 employee workforce more efficient through the use of technology. Fortunately, SaaS applications like Office 365 have enabled tremendous gains in employee productivity and mobility. Gains in ease of use, mobility, and efficiency, however, can come at a cost if proper security measures are not in place. To mitigate these risks, BlueCross BlueShield of Tennessee embarked on a mission to achieve HIPAA compliant cloud security and mobility for all of their employees.

    In this webinar, Michael Payne, Security Architect from BlueCross BlueShield and Bitglass’ VP of Product Management Mike Schuricht will walkthrough the security priorities and challenges BCBST faced in deploying Office 365, Workday, and more. Learn how Michael and his team approached data protection, unmanaged app discovery, and why they ultimately chose a CASB solution.
  • The AI use cases that keep you competitive
    The AI use cases that keep you competitive Matthias Keller, Kayak Mar 14 2018 5:00 pm UTC 60 mins
    The hype surrounding AI has reached a fever pitch, but practical uses that are delivering concrete, practical business results are here, and it’s time to get real.

    From taking over the routine requests for customer service agents, reducing costs, speeding up service, and boosting customer satisfaction, to reliably helping marketers deliver what a customer wants, when they want it and where, AI is popping up everywhere, and companies need to figure out where they stand, fast, to stay competitive.

    Join this VB Live event, hosted by Forrester Senior Analyst Brandon Purcell and Kayak Chief Scientist Matthias Keller to learn more about how to identify the AI use cases that can transform your business, and how to get started, stat.

    You’ll learn:
    * What technologies fall under the AI umbrella
    * How companies like Kayak use AI to understand customers and personalize experiences
    * How to identify the right AI use case for your business
    * Common challenges firms face when implementing AI
    * Why AI’s time in the sun has finally come, and why it’s here to stay

    Speakers:
    * Brandon Purcell, Senior Analyst, Forrester
    * Matthias Keller, Chief Scientist, Kayak
    * Pradeep Elankumaran, CEO and Co-Founder of Farmstead
    * Rachael Brownell, Moderator, VentureBeat
  • Over-the-top Business Strategies for Media Companies—Are You Prepared?
    Over-the-top Business Strategies for Media Companies—Are You Prepared? Vidya Nath | Director | Digital Media | Frost & Sullivan Mar 15 2018 2:30 pm UTC 60 mins
    The challenges of scalability and time to market compel every content company to have a robust and agile strategy in place before launching an over-the-top (OTT) service for a critical mass of viewers. The service provider has to invest not only in content but also in technology and infrastructure, which enhances the quality of experience (QoE) for the end user. This webinar will provide an overview of viewership trends for digital versus traditional television, OTT video business, common challenges for OTT video services, and the modern-day approaches in the video delivery workflow.
  • Preparing for GDPR Compliance and Measuring Governance
    Preparing for GDPR Compliance and Measuring Governance CA Technologies hosts: Ora Niknamfard, Security Product Marketing Manager and Rusudan Losaberidze, Security Advisor Mar 15 2018 4:00 pm UTC 60 mins
    Today, it’s estimated that 80% of companies are not prepared to comply with GDPR. The most challenging use cases are managing portability, conducting certification campaigns, and overseeing data access approval. Are you ready?

    Join CA Technologies hosts, Ora Niknamfard, Security Product Marketing Manager and Rusudan Losaberidze, Security Advisor as they review:

    • How compliance requirements align with legislation
    • What data collection and analysis are required
    • Informative case studies on GDPR readiness

    What’s more, we’ll demo a dashboard for the Data Protection Officer to use for compliance reporting .
  • Mobility, Agile Development & Continuous Testing
    Mobility, Agile Development & Continuous Testing Christian Schuertz, Business Development Manager, Application Delivery Management Software Mar 22 2018 8:00 am UTC 60 mins
    Mobile applications, agile development methods and continuous testing are solidly linked together as fast time to market is key to success. However many development departments struggle today in actually getting this to work due to lack of processes, lack of know-how and lack of integrated, open and automated toolchains.

    In this webinar we will provide a perspective on how to achieve faster time to market without compromising quality and show a live example on how to get it to work. An end to end demo focused on automation and visibility.
  • Insider Threats – Using Privileged Access Management as Effective Countermeasure
    Insider Threats – Using Privileged Access Management as Effective Countermeasure Rob Marti, Director of Privileged Access Management at CA Technologies Mar 22 2018 5:00 pm UTC 60 mins
    Have you reviewed the 2018 Insider Threat Report from Cybersecurity Insiders? The results are dramatic:

    • 90% of organizations feel vulnerable to insider threats
    • Over 50% have experienced an insider attack in the past year
    • 67% cite phishing as the prime concern of attacks

    Insider Threats are real. Be ready. Join Rob Marti, Director of Privileged Access Management at CA Technologies to review the research and discuss how a layered and comprehensive privileged access management approach provides an effective countermeasure to both insider attacks and external actors.

    Exploit key security tactics and strategies.
  • Agentless Access Management: Can SiteMinder Do That?
    Agentless Access Management: Can SiteMinder Do That? Herbert Mehlhorn, Product Management and Aaron Berman, SSO and Directory Products Mar 27 2018 5:00 pm UTC 60 mins
    Today’s CA Single Sign-On (SSO) solution is not the CA SiteMinder of yesterday. Yes, SSO continues to offer seamless access management services using traditional agents, but it also offers a new range of agentless approaches. So now, you can use single sign-on and access management for applications of all shapes and sizes.

    Join CA solution leaders − Herbert Mehlhorn, Product Management and Aaron Berman, SSO and Directory Products − to learn how agentless access management can help you:

    •Securely address critical user productivity needs
    •Transform your approach to access management
    •Foster new collaboration between security and application development teams
  • Mobility, Function & Performance
    Mobility, Function & Performance Christian Schuertz, Business Development Manager, Application Delivery Management Software Mar 28 2018 7:00 am UTC 60 mins
    Mobile Users don’t accept bad performance or dysfunctional applications and abandon bad apps with a wipe of their hand. Bad mobile applications are far more complex to test given the fragmentation of devices out there and different network conditions in real life that are difficult to simulate in development labs.

    In this webinar we cover the Micro Focus approach to these issues and provide a live showcase on how to secure a stable app that exactly does what it is supposed to do.
  • 11ax Wi-Fi What you need to know for 2018
    11ax Wi-Fi What you need to know for 2018 Nathanial Moore, CWNE Systems Engineer, UK Aerohive Networks Mar 28 2018 10:00 am UTC 45 mins
    Are you ready for 802.11ax? This fast approaching IEEE standard addresses some of today’s biggest high density and performance challenges – increasing capacity by up to 4x; improving spectral efficiency to benefit both 2.4GHz and 5GHz bands in a variety of environments.

    Today’s 802.11ac standard already presents many fantastic capabilities for capacity and performance. So if you’re reviewing your network, which is right for you: 11ac or 11ax? And what will be the benefits of upgrading from 11ac?
    Join us for this 25 minute quick-hit, reviewing 11ax’s most important components:

    PHY and MAC layer enhancements for better traffic management and efficiency
    Downlink & uplink OFDMA; 8 x 8 MU-MIMO; Spatial re-use
    Considerations for clients and wider network enhancements