Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • How to Enable Trust, Interoperability, & Shared Credentials
    How to Enable Trust, Interoperability, & Shared Credentials Ora Niknamfard, Product Marketing Manager Security at CA Technologies Recorded: Jun 21 2018 40 mins
    The promise of digital identity is to remove silos; minimize redundancies; facilitate better collaboration; and shape a foundation for regulatory compliance.
    The challenge with digital identity is that it requires shared credentials that force you to deliberately assess:

    • Managing physical access
    • Protecting PII
    • Delivering cross-agency services
    • Revising digital consumer interaction

    In this session, Ora Niknamfard, Product Marketing Manager Security at CA Technologies will share industry best practices to help ensure credentials are, in fact, interoperable. Plus, you’ll have a unique opportunity to explore the architectural measures that can manage identity assurance levels and identity verification for both logical and physical access.

    Implementing a digital identity strategy can be complicated. Let CA help.
  • Pourquoi sécuriser sa messagerie sous Office 365 ?
    Pourquoi sécuriser sa messagerie sous Office 365 ? Laura Peytavin, Sales Engineer, CISSP et Miguel Battais, Account Manager France, Proofpoint Recorded: Jun 21 2018 38 mins
    Office 365 est en France et en Europe une solution collaborative de plus en plus adoptée par les organisations.

    La messagerie fait partie des services déployés en priorité.

    Les clients Office365 sont confrontés à deux soucis majeurs :

    1 Obtenir la meilleure sécurité possible contre les attaques sur les courriels, qui représentent encore aujourd’hui 93% des vecteurs de menaces sur vos données et vos postes de travail,

    2 Conserver une continuité de service lorsqu’Office 365 est indisponible.

    Lors de ce webinaire, nous présenterons entre autre comment Proofpoint, fournisseur de solutions de cybersécurité « people-centric » adresse les défis suivants :

    -Protection des identifiants utilisateurs ciblés par du phishing O365 de plus en plus sophistiqué
    -Contrer la fraude email (attaques au président, FOVI) qui n’est pas traitée par O365, quel que soit l’offre souscrite
    -Donner une visibilité en temps réel des attaques
    -Pouvoir faire des corrélations d’attaques qui deviennent de plus en plus multi-vectorielles (liens vers du partage de fichiers dans le Cloud : Box, OneDrive, SalesForce, Sharepoint, GSuite, etc…)
  • Learn to Fight Cloud Sprawl and Eliminate Service Outages
    Learn to Fight Cloud Sprawl and Eliminate Service Outages Vid Sista, Director of Technology Solutions Recorded: Jun 20 2018 15 mins
    Adding automation to your IT environment is one of the best ways to fight cloud sprawl and help eliminate service outages. In this 15-minute webinar, Accudata’s Director of Technology Solutions Vid Sista will explain:

    How automation solutions enable you to proactively identify service issues
    Why cloud sprawl is a major threat to IT security – and how you can stop it
    What businesses can do to automate their IT services lifecycle
  • Merging Robotics, Documents and Process to Digitally Transform Business
    Merging Robotics, Documents and Process to Digitally Transform Business Sheryl Kingstone of 451 Research and Ryan Bazler of Kofax Recorded: Jun 20 2018 57 mins
    70% of organizations are in the midst of plans to digitally transform the way they conduct business for more process efficiency, reduced cost, optimized customer experience and competitive advantage. Experiences not price or products will be the battleground of the future. But where to begin? Robotic Process Automation promises to automate repetitive, manual tasks normally done by humans. Cognitive Document Automation provides related benefits, but for documents and emails – typically a challenge for RPA. Together, RPA and document automation deliver the one-two punch that organizations need to succeed in their digital transformation initiatives. Join us to understand how RPA and document automation work together to automatically and efficiently acquire, understand and deliver content in critical business processes.

    Don’t miss this webinar where we will discuss:
    •The state of Leaders and Laggards of Digital Transformation
    •Business benefits of RPA and Cognitive Document Automation
    •Applying software platforms for common use cases

    Register today!
  • Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting
    Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Jun 20 2018 77 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Cyber-Espionage and Threat Hunting

    Our Verizon Threat Research Advisory Center presenters will be:
    •Chris Novak, Director, Investigative Response
    •Jihana Clemetson, Senior Analyst, Threat Intelligence
    •Marcus Cymerman, Senior Analyst, Network Forensics
    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas

    For this month's theme of 'Cyber-Espionage and Threat Hunting' we'll here from Chris Novak, Director, Investigative Response on cyber-espionage and threat hunting as seen across the Investigative Response Team caseload. We'll then transition into a Q&A session with Jihana Clemetson, Senior Analyst, Threat Intelligence, and Marcus Cymerman, Senior Analyst, Network Forensics to dig further into our cyber-espionage cases and discuss typical indications of being a victim of cyber-espionage, the components of threat hunting, and the approaches to investigating cyber-espionage incidents.

    Following the cyber-espionage insights, we'll cover the following topics:

    •Current Intelligence
    •Attacks & Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Live Demo: Email Fraud Defense by Proofpoint
    Live Demo: Email Fraud Defense by Proofpoint Neil Hammet, Email Fraud Specialist Recorded: Jun 19 2018 47 mins
    Email Fraud is one of the oldest yet most successful threats against your organisations. Proofpoint Email Fraud Defense (EFD) can help you protect your organisation and your customers, leveraging the power of email authentication.

    Join this product demo to discover how you can protect your organisation and people by leveraging the power of EFD.


    •Block malicious emails spoofing your domains before they reach your employees and customers
    •Monitor all emails (inbound and outbound) from your domains and those of third parties
    •Accurately distinguish between legitimate emails and fraudulent emails
  • Simple Facts About Encryption
    Simple Facts About Encryption Andy Nieto Recorded: Jun 14 2018 48 mins
    Between Edward Snowden, the NSA, and the FBI we’ve all been hearing the term “encryption” thrown around a lot. But what do you really know about encryption? And as a business, what do you need to know? How does it work, and what are your options?
    In this 60 minute session, Andy Nieto, IT Strategist for DataMotion, provides a clear, simple overview of encryption, and will include plenty of time for questions, Topics include:

    The who, what, where, why, when, and how’s of encryption
    The difference between proprietary and open source encryption
    Encrypting data at rest
    Encrypting data in motion
    Key management
    Mobile devices and encryption
  • Unraveling the confusing world of IoT economics
    Unraveling the confusing world of IoT economics Owen Rogers, Research Director - Digital Economics Unit, and Christian Renaud, Research Director - Internet of Things Recorded: Jun 13 2018 52 mins
    Organizations that use cloud services to handle the Internet of Things often employ one of the three largest hyperscale providers — Microsoft, Google or AWS. In this webinar, we reveal the results of an extensive study, using machine-learning methods, to identify what factors drive the cloud-related costs of Internet of Things deployments, and in what scenarios each cloud provider has a cost advantage.
  • Aruba delivers secure and fast connectivity at the Bryanston School
    Aruba delivers secure and fast connectivity at the Bryanston School Aruba, a Hewlett Packard Enterprise company Recorded: Jun 13 2018 5 mins
    Aruba lays the foundation for educational excellence at leading UK independent school, Bryanston School, providing a secure and collaborative environment with pervasive connectivity across 400 acres and over 30 buildings.
  • Enhancing the hospitality wi-fi experience at Amadria Park
    Enhancing the hospitality wi-fi experience at Amadria Park Aruba, a Hewlett Packard Enterprise company Recorded: Jun 13 2018 3 mins
    Amadria Park, Croatia's leading hotel venue turned to Aruba Network Solutions when seeking to enhance the guest experience. Aruba's comprehensive hospitality wi-fi coverage and security were there to help.
  • Plymouth Hospitals NHS Trust foster mobile healthcare services
    Plymouth Hospitals NHS Trust foster mobile healthcare services Aruba, a Hewlett Packard Enterprise company Recorded: Jun 13 2018 4 mins
    Aruba enables seamless mobile healthcare services at one of the largest hospitals in South West England.
  • Mobile Phishing, the biggest unsolved problem in cybersecurity
    Mobile Phishing, the biggest unsolved problem in cybersecurity Lookout Recorded: Jun 13 2018 1 min
    It only takes one errant tap to compromise a mobile device. This short video clip highlights the threats and how inconspicuous a phishing attack on a mobile device can be. You will also be able to download our latest whitepaper to understand mobile phishing facts that will help you make informed decisions on how to protect corporate data.
  • iOS 12 Preview - What You Need To Know
    iOS 12 Preview - What You Need To Know Tony Ramirez (Mobile Security Analyst), Brian Reed (CMO) Recorded: Jun 12 2018 54 mins
    Much of the improvements for iOS 12 focused on security and reliability. What prompted these changes and how will it affect the path forward? Join our discussion on Tuesday as Tony Ramirez, Mobile Security Analyst, shares about the following:

    + Learnings & remediations from iOS 11
    + Predictions coming out of WWDC
    + How we see the newest software update, iOS 12, affecting mobile app security testing
  • Shift from On-premise to the Cloud Drives Contact Center Growth Opportunities
    Shift from On-premise to the Cloud Drives Contact Center Growth Opportunities Audrey William, Head of Research at Frost & Sullivan’s Australian and New Zealand ICT Practice Recorded: Jun 12 2018 23 mins
    We can expect to see higher shifts from the on-premise market to the cloud contact center market in the next 12-18 months. While it is still early days, the vendors in this space are already closing deals for real cloud deals, and these are across healthcare, education, retail, government and financial services. The market has seen an entry of new players in 2018 and these players were traditionally not from the contact center segment. Competition is expected to heighten from 2019 onwards. These new breed of players are offering end to end contact center capabilities coupled with analytics and artificial intelligence capabilities.

    Key Takeaways:
    · Get an in-depth view of emerging players introducing new platforms to disrupt the traditional players
    · Learn about the benefits of the cloud contact center model
    · Understand what's driving growth in this market and what's inhibiting the growth
  • Powering the digital workplace with Box and Office 365
    Powering the digital workplace with Box and Office 365 Rand Wacker, VP, Product Marketing, Box; Rafael Perez, Sr. Sales Engineer, Box Recorded: Jun 8 2018 51 mins
    If you are deploying Microsoft Office 365, you owe it to yourself to see how Box can help you power a best-of-breed digital workplace.

    Tens of thousands of businesses running Office 365 choose Box over OneDrive and Sharepoint so they can improve user and IT productivity, improve content security and protection, and reduce infrastructure costs. At this webinar, you’ll hear in detail why Box and Office 365 make such a winning combination. Box offers a single cloud content management platform for securely managing all your content in one place, including a:

    - Better user experience —users can share, edit and collaborate on all their content with all of their teams inside Box without needing to switch between different tools
    - Better admin experience — more granular controls, more simplified management of all your content
    - Better security — a central platform for consistent security and governance
    - Better integrations — Box is integrated with more than 1,400 popular applications like Salesforce, Slack, NetSuite and Okta
  • LIVE DEMO - Securing your Open Banking API implementation
    LIVE DEMO - Securing your Open Banking API implementation Isabelle Mauny, CTO & Co-Founder, 42Crunch Recorded: Jun 7 2018 62 mins
    .During this practical webinar, you will learn:
        
    1. Why TLS and OAuth2 are not enough to secure your APIs
    API Security has a much wider spectrum and even if you are using OAuth today, you may not use it in a way that is adapted to the risk taken when exposing Open banking APIs. What about API attacks protection ? PKCE ? Message confidentiality and integrity ? 

    2. Why API security must be declared and not coded
    Developers should not have to master security standards such as OAuth and OpenID Connect and try to implement them properly into their APIs. Instead, they should rely on proven, reliable policies approved by the bank’s security team and simply apply those policies on top of their APIs.

    3. How declarative security helps with consistency and automation
    42Crunch's innovative tagging mechanisms can be used by developers to express security constraints on top of their Open API definitions (aka Swagger). Those tags are translated automatically, either via the UI or in the CI/CD pipeline into policies which are applied on APIs requests/responses, making it possible to apply security as early as possible in the API lifecycle and find security vulnerabilities early.

    4. How to enforce security in a scalable way using micro-firewalls
    We will show how to deploy the 42Crunch API Firewall at run-time whether on premises, in the Cloud or in a hybrid environment and how to monitor the system through real-time security dashboards.
  • AI-powered location: A step closer to the future?
    AI-powered location: A step closer to the future? Peter Frans Pauwels, Co-founder, TomTom Recorded: Jun 5 2018 61 mins
    By leveraging the power of the cloud, artificial intelligence and machine learning, mapping devices are getting smarter over time, recognizing patterns and farming insight from contextualized data. And that means smart cities and data-based Location of Things navigation is becoming a reality.

    Cities can analyze and improve congested traffic. Freight companies with connected trucks can better manage logistics, optimize fleets, and track customer engagement. And cars will learn to make split-second decisions on our behalf, making the call on turning left or hitting the breaks when it recognizes a pedestrian is in the crosswalk.

    To find out more about how cloud-based, AI-powered location technology is creating the highly accurate and always up-to-date maps that can revolutionize everything from autonomous cars to connected cities, don’t miss this VB Live event!

    In this webinar you'll learn:

    * How to leverage the power of the cloud, AI, and machine learning across devices by contextualizing location data in real time
    * Understand the role of location-based data mapping in the "Location of Things"
    * The application of data-enriched mapping to industries like retail and automotive
    * How "Location of Things" powered by geographical data can be used to connect autonomous driving, smart mobility, and smarter cities

    Speakers:
    * Chris Pendleton, Principal PM, Azure Maps
    * Peter Frans Pauwels, Co-founder, TomTom
    * Jennifer Belissent, Principal Analyst, Forrester
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by TomTom
  • Der Faktor Mensch 2018 – aktuelle Proofpoint Forschungsergebnisse
    Der Faktor Mensch 2018 – aktuelle Proofpoint Forschungsergebnisse Markus Grüneberg, Senior Cyber Security Strategist, Proofpoint Recorded: Jun 5 2018 54 mins
    Proofpoint hat seinen neuen Faktor Mensch Bericht für das Jahr 2018 veröffentlicht, der untersucht, wie Bedrohungsakteure ihre Herangehensweisen mit Social Engineering und ausgeklügelten Angriffen verfeinern, die selbst versierte Benutzer regelmäßig täuschen.

    Melden Sie sich jetzt zu unserem Live-Webcast Der Faktor Mensch 2018 am 5. Juni 2018 um 10:00Uhr an und informieren Sie sich über die wichtigsten Erkenntnisse des diesjährigen Berichts.
    Der jährliche Proofpoint Bericht basiert auf der Analyse von Angriffsversuchen bei mehr als 6.000 weltweiten Unternehmenskunden während des gesamten Jahres 2017 und bietet Einblicke in Angriffstrends über E-Mail, Cloud-Anwendungen und soziale Medien hinweg, um Unternehmen und Benutzern die Sicherheit zu gewährleisten.

    Themen des Berichtes:
    -Soziale Engineering: Wie Social Engineering auf den Faktor Mensch abzielt
    -Bedrohungs-Trends: Malware, Phishing und E-Mail-Betrug: Dropbox, Docusign & Co
    -Trends zu gezielte Angriffen: Spam-Kampagnen bis zielgerichteter E-Mail-Betrugs
    -Neue digitale Risiken: Collaboration-Tools als neue Angriffsziele
    -Angriffe über Cloud Dienste: Cyberangriffe über Cloud-Dienste und -Apps
  • How to Reduce Excessive Access for Highly Privileged Users
    How to Reduce Excessive Access for Highly Privileged Users Naresh Persaud, Senior Director of Security at CA Technologies Recorded: May 31 2018 41 mins
    Adopting privileged access management typically means forcing users to use named accounts instead of root and administrator accounts. As a result, the volume of privileged "named user" accounts in the enterprise is increasing. Fortunately, with effective role management and certification review, organizations can streamline and reduce excessive access.

    Join Naresh Persaud, Senior Director of Security at CA Technologies as he explains the challenge of privileged user governance, explores solutions, and presents a demo on how to manage privileged "named users."
  • Project and Portfolio Management: What is new 9.50
    Project and Portfolio Management: What is new 9.50 Ronen Aseo , Silvia Davis, Keith Flournoy Recorded: May 29 2018 64 mins
    As Agile teams are growing exponentially, companies are looking to adapt new process and tools, to integrate, optimize and manage hybrid (Agile, Waterfall) portfolio of applications. There is a need to increase visibility and collaboration while enabling insight into their organization’s process to maintain governance, avoid compliance issues, deliver quality and optimize resource and investments.

    Join this webinar to learn more about:

    • Integrated Portfolio Management focus on product development,
    including new what if scenarios
    • New capabilities to support Enterprise Agile frameworks
    • Consolidated time and resource management for Agile and waterfall projects
  • GDPR compliance on mobile devices, how secure is your organization?
    GDPR compliance on mobile devices, how secure is your organization? Aaron Cockerill, Chief Strategy Officer, Lookout Recorded: May 29 2018 50 mins
    Since 25 May, the General Data Protection Regulation (GDPR) is now officially enforceable. By now, most of the companies dealing with data should have taken the necessary steps to comply with the regulation and stay out of trouble. And this is all good but, have you thought about how your employees are using their mobile phones or devices to access your company data? How do you protect your organization from an employee's phone being hacked? The risk of GDPR fines & brand reputation damage has made the security of personal data on mobile an urgent priority for CISOs, and executive boards.

    By popular demand, we're replaying this webinar hosted by Aaron Cockerill, Chief Strategy Officer at Lookout and his guest, Kabir Barday, CEO at OneTrust.

    On the agenda:
    - Why mobile is a problem for GDPR compliance
    - Understanding the threats & risks to GDPR compliance from mobile
    - Finding & stopping mobile threats to GDPR compliance

    Did you know?

    84% of security & IT executives say personal data accessed on employee mobile devices could put their company at risk for GDPR noncompliance.

    31% of enterprise employees that have a title of Vice President or higher say their mobile devices have been hacked or compromised.

    63% of enterprise employees say they access their organization's customer, partner, data and employee data while on their mobile device.
  • Trust But Verify: Mobile App Protection Best Practices - Arxan AppSec Series 3/3
    Trust But Verify: Mobile App Protection Best Practices - Arxan AppSec Series 3/3 Chris Stahly, Arxan Senior Security Architect | Deborah Clark McGinn, Arxan VP of Marketing Recorded: May 24 2018 59 mins
    Traditional network and app security approaches are no longer sufficient to protect high-value apps running in untrusted environments. Knowing the status of apps running in the wild and whether they are under attack is key to responding to the ever changing threat landscape. Visibility into when, how and from where an attack is happening, and the ability to optimize your response in real time can mean the difference between stopping a threat before it spreads or picking up the pieces after the fact.

    In part three of our application security series, we’ll share best practices for app protection and mitigation, plus how Arxan’s comprehensive app protection and alerting capabilities can help prevent reverse engineering, code tampering, IP theft, and help level the playing field with attackers.
  • Digital Workplace
    Digital Workplace Aruba, a Hewlett Packard Enterprise company Recorded: May 24 2018 3 mins
    Are BYOD and IoT stressing your network? See how Aruba can help you build the mobile-cloud network of the future.
  • Schutz vor modernen CEO-Fraud-Angriffen: Live-Hack und umfassende Schutzkonzepte
    Schutz vor modernen CEO-Fraud-Angriffen: Live-Hack und umfassende Schutzkonzepte Chris Wojzechowski,Security Researche,Institut für IT-Sicherheit und Markus Grünenerg, Senior Security Strategist, Proofpoint Jun 26 2018 9:00 am UTC 60 mins
    E-Mail-Betrug, auch CEO-Fraud oder BEC (Business Email Compromise) ist weit verbreitet und kostet Unternehmen Milliarden. Dabei ist ein Großteil dieser E-Mail-Angriffe vermeidbar. Diese Bedrohungen beginnen meist mit einer E-Mail, die von einer hochrangigen Führungskraft, aber auch von Partnern oder Lieferanten zu stammen scheint. Diese E-Mail weist Mitarbeiter an Gelder zu überweisen oder sensible Daten zur Verfügung zu stellen. Die Empfänger erfüllen pflichtbewusst die übertragenen Aufgaben, überweisen zb das angeforderte Geld – und lernen erst später, dass sie betrogen worden sind.

    Erleben Sie in unserem Webinar anhand eines CEO Fraud Live Hack, wie leicht Ihre Mitarbeiter dazu gebracht werden, die betrügerischen Anfragen auszuführen. Anschließend zeigen wir Ihnen auf, wie Proofpoint Ihre Mitarbeiter und Ihr Unternehmen anhand eines mehrstufigen Schutzkonzeptes vor derartigen Angriffen schützen kann.
  • Demystify the cloud: Stay secure in Microsoft Office 365
    Demystify the cloud: Stay secure in Microsoft Office 365 Edward Rowley, Sales Engineering Manager and Tim Ricketts, Principal Sales Engineer Jun 26 2018 10:30 am UTC 45 mins
    Digital transformation and cloud migration brings many benefits to organisations and one of the main drivers for the rapid adoption is the cloud based email service provided by Office 365.
    While leveraging cloud services unarguably enhances productivity, it can still leave your organisation vulnerable to new risks. It is more important than ever for security professionals to ensure full protection against these new risks in real time.

    Join us as we discuss the potential threats and solutions you can implement to ensure protection and productivity. What to expect:

    --Threats: credential phishing, email fraud, targeted attacks etc
    -- Enabling secure digital transformation: people centric security at the heart of the transformation
    -- Solutions: regulatory compliance and tools to implement
  • Malware versus AI
    Malware versus AI Keith Rayle, Security Strategist, Fortinet Jun 26 2018 4:00 pm UTC 60 mins
    During this presentation, you'll learn about deep learning, the history of artificial intelligence, the history of malware management, and the current approach to eliminating malware threats to the enterprise using AI.
  • Achieve Your Security Goals with Inline Prevention Tools
    Achieve Your Security Goals with Inline Prevention Tools Ian Farquhar, Distinguished Engineer, Security, Gigamon Jun 27 2018 4:00 am UTC 60 mins
    Inline security tools operate by actively preventing threats in your network, but deploying and optimizing these tools presents several challenges to both network and security engineers. The downsides can include a potential point of failure, degradation of network and application performance, difficulty to scale and upgrade. The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges. Join Gigamon and (ISC)² on Jun 27, 2018 (Wed) at 12:00 noon (Singapore Time) to examine how inline bypass can overcome physical deployment obstacles, maximize network availability, increase the scale of inspection and reduce the impact to network performance.
  • Legacy Modernisation: Overcoming the Transformation Barriers
    Legacy Modernisation: Overcoming the Transformation Barriers Simon Ratcliffe, Principal Consultant, Ensono, Kevin Stoodley, CTO, IBM Z Series, & Alex Hilton, CEO, CIF Jun 27 2018 12:00 pm UTC 60 mins
    A recent survey conducted by Ensono, in partnership with the Cloud Industry Forum, showed that 89% of respondents believed that legacy technology was a barrier to effective digital transformation. Given that many organisations operate a complex technology landscape often with elements in different locations, and with core components that are regarded as ‘legacy but critical’, there needs to be a clear and simple approach to overcoming these obstacles.

    Breaking down the barriers requires effective change in people, process and technology to attain a viable level velocity that will enable transformation without being held back by perceptions of legacy issues.

    Examining these issues, this webinar will provide insight and thought provoking approaches for organisations seeking to transform their operations against this backdrop.
  • The Role of API Management in Digital App Strategies
    The Role of API Management in Digital App Strategies Carl Lehmann of 451 Research & Sumit Sarkar of Progress Software Jun 27 2018 3:00 pm UTC 60 mins
    Hyper-competition and digital-first initiatives are forcing organizations to reconsider how they do business. ‘Digital transformation’ has emerged to engage customers, improve efficiencies, and fend off threats from rivals. It’s driving the need to rethink application design that delivers information in context and automates tasks that must behave consistently across diverse mobile devices and all digital touchpoints. Common approaches include cloud-first and mobile-first strategies that accelerate the use of cloud services but also often forces an unwieldy redistribution of workloads across hybrid IT infrastructure.

    APIs have emerged as integration enablers, and API management is now integral to IT and development discipline. But APIs are only part of a broader toolchain needed to deliver web and mobile apps. Emerging cloud-native app platforms for hybrid infrastructure represent the next-generation enabling technology needed by enterprises that seek transformative means to engage customers and craft new competitive advantages.

    In this webinar Carl Lehmann, principal analyst at 451 Research and Sumit Sarkar, chief researcher at Progress will discuss the business and technical considerations for API management within a broader context of application strategies and hybrid IT integration by:
    • Describing digital transformation and how it is used to create competitive advantage
    • Identifying the critical technology enablers needed for execution
    • Defining the role of APIs as accelerants to new ways of doing business
    * Planning for rapid delivery of new application experiences in response to digital transformation
    * Understanding backend requirements for web and mobile app delivery beyond API Management

    AppDev, DevOps, integration and API development professionals alike will learn how to reconsider their development strategies and integration toolchains to become core enabling assets for digital transformation.
  • Why an Operational Data Layer is Critical for Open Banking
    Why an Operational Data Layer is Critical for Open Banking Richard Henderson Jun 28 2018 9:00 am UTC 60 mins
    Innovative banking applications and comprehensive, instant insight into customer interactions are critical to competing in today’s disruptive competitive landscape. Not only do customer expectations continue to grow, but payment infrastructure evolution and compliance requirements mean access to highly contextual, real-time data is no longer a nice to have - it’s a must have.
    Don’t miss this chance to hear from Richard Henderson at DataStax around how an operational data layer can meet the distributed, real-time, always available demands of the enterprise. Join live to hear real case examples of customers using DataStax Enterprise, the data management platform trusted by 9 out of the top 15 global banks.
  • Live Broadcast: Master DNS Security for a Bulletproof, Tier One Network
    Live Broadcast: Master DNS Security for a Bulletproof, Tier One Network Tony Scott, DJ Goldsworthy, D.J. Long, Cricket Liu, Victor Danevich Jun 28 2018 5:00 pm UTC 90 mins
    You're charged with building a bulletproof, tier one secure network. If your Domain Name System (DNS) goes down, nothing else matters. And, DNS is the leading attack vector for cyber villains. Say “Hack no! ” to DNS threats.

    Join guest speaker Tony Scott, former CIO of the United States, Microsoft, and the Walt Disney Company, alongside leading practitioners from Aflac and McAfee in this live panel discussion. This unique gathering of industry experts will discuss their perspectives on building a safe, secure network and actionable best practices in this era of cloud and mobile. Moderated by Infoblox Chief DNS Architect Cricket Liu, this discussion will give you an opportunity to hear from the experts and ask questions about.

    - What leading organizations are doing to secure their DNS
    - When to best utilize DNS data, network context, and threat intelligence in your security operations
    - How to integrate DNS data with your security ecosystem to accelerate threat mitigation and remediation
    - How Aflac blocked nearly 37 million threat connections with < 100 false positives

    Save your spot now.

    ----------------------------------------------------------------------------------------------

    Panelists:

    Tony Scott,U.S. CHIEF INFORMATION OFFICER (2015–2017), TONYSCOTTGROUP

    DJ Goldsworthy, DIRECTOR, SECURITY OPERATIONS AND THREAT MANAGEMENT, AFLAC

    D.J. Long, VICE PRESIDENT, STRATEGIC BUSINESS DEVELOPMENT, MCAFEE

    Cricket Liu, CHIEF DNS ARCHITECT, INFOBLOX

    Victor Danevich, VICE PRESIDENT, WORLDWIDE FIELD ENGINEERING, INFOBLOX
  • How AI is changing the customer retention game
    How AI is changing the customer retention game Kara Dake, VP Growth & Partnerships, Clevertap Jul 11 2018 5:00 pm UTC 60 mins
    Your users are like fine wine or good cheese: They get better over time. Which is why user retention is essential. With a steady retention rate your revenue just compounds over time. And increasing retention by just 10 percent will boost your business value by more than 30 percent.

    That’s where artificial intelligence comes in. AI marketing tools let you anticipate customer needs, create personalized campaigns that make them feel seen and heard, lock on to essential customer purchasing patterns, deliver highly relevant messaging, marketing, and offers when and where they want to see them, and more. And with the volume of customer data you have at your fingertips, you can identify what characteristics make up high-value customers, so you know exactly where to put your focus.

    Learn how tapping into your oil well of data and harnessing it via marketing automation platforms powered by AI and machine learning can strengthen your bottom line when you join this VB Live event!

    In this webinar you'll learn:

    * Key engagement strategies using AI
    * How to use AI to strengthen campaigns (including creative, messaging, segmentation and personalization)
    * The role of time-based triggering in automation and monetization
    * The evolving trends in marketing automation and omnichannel marketing

    Speakers:
    * Kara Dake, VP Growth & Partnerships, Clevertap
    * Rachael Brownell, Moderator, VentureBeat
    * Stewart Rogers, Analyst-at-Large, VentureBeat

    Sponsored by Clevertap
  • Attacker’s Advantage - Understand How & Why Cyberattackers Beat your Defence
    Attacker’s Advantage - Understand How & Why Cyberattackers Beat your Defence Robert Healey, Senior Director Marketing, Asia Pacific, Tenable Network Security Jul 18 2018 6:00 am UTC 60 mins
    In its inaugural report, Tenable Research explores who has the first-mover advantage – cyber criminals or security teams? What’s the difference in time between when an exploit is publicly available for a given vulnerability and the first time that security teams actually assess their systems? And why does this even matter to your organization?

    The research team analyzed the 50 most prevalent critical and high-severity vulnerabilities from just under 200,000 vulnerability assessment scans over a three-month period. What did they find?

    Alarmingly, all too often, the attackers have the advantage. On average, they have a seven-day head start on defenders. Threat actors are sprinting ahead, exploiting vulnerabilities before security teams have even left the starting blocks – before businesses even know they’re at risk.

    Join Tenable and (ISC)² on Jul 18, 2018 (Wed) at 14:00 (Singapore Time) to understand how and why cyber attackers are beating your defence.
  • Verizon Threat Research Advisory Center - Monthly Intel Briefing
    Verizon Threat Research Advisory Center - Monthly Intel Briefing David Kennedy and John Grim, Verizon Global Security Jul 18 2018 2:00 pm UTC 90 mins
    Leverage Threat Intelligence where it matters most.

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •Roy Porter, Senior Analyst, Threat Intelligence

    We'll cover the following topics:

    •Current Intelligence
    •Latest Malware Trends
    •Attacks and Threat Indicators
    •Significant Vulnerabilities

    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • The Evolution of Mobile Threat Actors
    The Evolution of Mobile Threat Actors Michael Flossman, Head of Threat Intelligence, Lookout Jul 19 2018 3:00 pm UTC 60 mins
    Cybercriminals and nation states are consistently using mobile threat tooling as part of their espionage or financially motivated attacks and campaigns. The Lookout Threat Intelligence team has noticed this increase as we research and protect against these adversaries. These actors are increasingly seeing value from having an offensive mobile capability in their toolkit and we have even seen low sophistication groups break into this space and successfully steal gigabytes of data from compromised devices. As BYOD and the prevalence of mobile devices in corporate environments continue to blur the traditional enterprise perimeter, the ability to understand the risks to mobile endpoints is critical.

    Join Michael Flossman, Head of Threat Intelligence at Lookout, for this informative webinar as he covers the evolution of threat actors on mobile, discusses several recent high-profile cases, and explains why gaining visibility into your mobile endpoints and proactively securing them is key for today’s organizations."
  • Speaking Your Customer’s Language: How to Build a True Conversational Messaging
    Speaking Your Customer’s Language: How to Build a True Conversational Messaging Abinash Tripathy, Helpshift; Dan Miller and Mitch Lieberman, Opus Research Aug 2 2018 5:00 pm UTC 45 mins
    Brands in every industry and geography feel an urgency to meet the conversational needs of their customers. Executives walk the fiscal tightrope between exceptional customer experiences and operational efficiency. Today’s contact center, as the communications hub for customers, is caught in the middle of the battle. Customers value fast, frictionless convenience; executives must invest accordingly.

    Join Opus Research Lead Analyst Dan Miller and Program Director Mitch Lieberman, with Abinash Tripathy, CEO and Co-Founder from Helpshift, as they address the urgent topics that help brands and enterprises supercharge customer service experiences, including:

    * How digital messaging promotes operational excellence while meeting — and exceeding — customer needs
    * Strategic steps necessary to support top-line growth and in-depth customer engagement
    * How brands infuse intelligence, accuracy, and precision into company/customer conversations
    * How to leverage investments and resources to build the next generation of customer service and support
  • Can your data infrastructure support AI marketing?
    Can your data infrastructure support AI marketing? Michelle Goetz, Principal Analyst, Forrester Aug 9 2018 5:00 pm UTC 60 mins
    Are you AI-ready? You need to be. Artificial intelligence marketing applications are delivering on their promise to source new insights to grow your business fast, AI technology is becoming available to any company looking for a competitive edge, and now’s the time to move, if you want to stay ahead of the curve.

    But the challenge is not just in defining an AI strategy; it requires developing the infrastructure to support it.

    Should you be developing in-house, or look to available technology and collaborate with outside experts? Keep deployment on-premise, or reach for the cloud? Can your current infrastructure, from server performance to processing power, stand up to the demands of increasingly complex AI applications?

    Get ready to level up your marketing strategy with AI, advance your technological capabilities in smart, strategic ways, learn how to make sure your next infrastructure move helps you exploit the AI advantage and more when you join this VB Live event!

    Register for free!

    Attend this webinar and learn:
    * How to tell if your marketing and IT departments are AI-ready
    * The fundamentals of an AI-driven infrastructure
    * The role of clean, definable data goals in successful AI implementation
    * How to scale the AI workload

    Speakers:
    * Michelle Goetz, Principal Analyst, Forrester
    * Rachael Brownell, Moderator, VentureBeat

    More speakers coming soon!
  • Architecting an Open Source Data Science Platform: 2018 Edition
    Architecting an Open Source Data Science Platform: 2018 Edition David Talby, CTO, Pacific AI Oct 23 2018 5:00 pm UTC 60 mins
    Join David Talby of Pacific AI as he updates the best practices and techniques for building an open source data science platform.