Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • How Cryptocurrencies are Changing the Face of Financial Services
    How Cryptocurrencies are Changing the Face of Financial Services Eric Larchevêque, CEO at Ledger and Joe Pindar, CTO Office Director of Strategy Recorded: Dec 15 2017 61 mins
    Joint webinar with Ledger and Gemalto discussing how cyrptocurrencies have the potential to revolutionize the financial industry and what needs to be done to secure the digital assets.
  • Symantec Monthly Threat Briefing - 2017 in review, 2018 ahead
    Symantec Monthly Threat Briefing - 2017 in review, 2018 ahead Jeff Barto and Angelique Pereira, Trust Strategists at Symantec Recorded: Dec 14 2017 42 mins
    As we wrap up another year, let's take a moment to discuss what 2017 brought to the industry, and what we should expect to see next year.
  • Developing an Insights-Driven Approach for Exceptional Digital Experiences
    Developing an Insights-Driven Approach for Exceptional Digital Experiences Bryan Whitmarsh, Director, Product Management at CA Technologies Recorded: Dec 14 2017 55 mins
    Providing a great digital experience is critical for your brand, but the complexity of monitoring modern apps presents a challenge. When you combine a mix of mobile and Web applications, containers and microservices in distributed environments, identifying when and why your customers are having a poor app experience is often difficult.

    Join us for this webinar where Bryan Whitmarsh, Director, Product Management at CA Technologies will demonstrate how you can achieve a 5-star app experience for your customers. See how CA App Experience Analytics leverages a powerful, open source analytics platform to provide user experience insights and deep visibility into performance across apps and channels.
  • Filling the GDPR Compliance Gap
    Filling the GDPR Compliance Gap Adenike Cosgrove, Sr. Product Marketing Manager, Proofpoint Recorded: Dec 14 2017 30 mins
    Join this session to discuss: How your organization can drive towards compliance, how to embed "privacy by design" to your development lifecycles, and how to protect all identified EU personal data and prevent data breaches.
  • Healthcare Orgs: Empower Your Mobile Workforce Without Sacrificing Data Security
    Healthcare Orgs: Empower Your Mobile Workforce Without Sacrificing Data Security Hussein Syed, RWJBarnabas Health; Alex Fry, Strong Crypto Innovations LLC; Mike Schuricht, Bitglass Recorded: Dec 13 2017 57 mins
    Mobile computing and the use of cloud applications are touted as ways to help healthcare providers deliver better patient care. Clinicians carrying tablets or other devices to exam rooms and patients’ bedsides can quickly access and update patient data and other vital resources necessary for accurate and expeditious treatment.

    No one disputes the value of “anytime, anywhere” computing in healthcare – indeed, in other industries as well – but there is a concern about the risk associated with access to sensitive and regulated data via unmanaged devices and unsanctioned cloud applications.

    In this CISO panel discussion moderated by Hussein Syed, CISO at RWJBarnabas Health and joined by panelists Alex Fry, Principal Security Consultant at Strong Crypto Innovations LLC and Mike Schuricht, VP of Product Management, Bitglass, you’ll learn about real-world approaches to some of the most vexing challenges of mobile and cloud computing.
  • Healthcare Holiday Tales
    Healthcare Holiday Tales DataMotion Recorded: Dec 13 2017 6 mins
    A fun healthcare twist on a holiday tale reading. For anyone who has received health care from multiple providers, and all those working in the healthcare or technology industries. Happy holidays!
  • How today’s threats prey on the human factor | 2017 Human Factor Report
    How today’s threats prey on the human factor | 2017 Human Factor Report Patrick Wheeler, Director, Threat Intelligence, Proofpoint Recorded: Dec 13 2017 48 mins
    Ransomware. Business email compromise (BEC). Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure.

    In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it.

    Register now to learn about:
    •The latest social engineering targeting trends and techniques
    •Top email fraud tactics, including business email compromise (BEC) and social media account phishing
    •The rise of fraudulent mobile apps and how criminals target users on the go
  • Endpoint Security for Cloud Generation & New Integrations Extend Data Protection
    Endpoint Security for Cloud Generation & New Integrations Extend Data Protection Sam Tong, Senior Principal Systems Engineer, Symantec; Moderator: S.C. Leung, Member, Asia-Pacific Advisory Council, (ISC)² Recorded: Dec 13 2017 64 mins
    First in the Industry to deliver Deception, Mobile Threat Defense, and Endpoint Detection and Response (EDR) in a Single-Agent Architecture. Join us to learn the latest Evolution of Endpoint Security & Data Protection:

    •Defend against ransomware with multi-layered protection
    •Gain enhanced visibility into suspicious files via tunable protection to make better policy decisions
    •Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
    •Extend advanced security to mobile devices
    •Use deception techniques to expose hidden adversaries and determine their intent to improve security posture
    •Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications

    New Integrations Extend Data Protection Beyond Traditional DLP

    Powered by the industry’s leading data loss prevention technology, to give you greater visibility and control over your confidential data.

    •Expanded Information Centric (ICE) Encryption integration
    •Enhanced data classification integration
    •Sensitive Image Recognition
    •Stronger endpoint controls
    •Enhanced data at rest discovery
    •Improved cloud app policy and incident management
    •Flexibility on cloud deployment
    •And More …

    Join Symantec and (ISC)² on Dec 13 at 14:00 (Hong Kong time) and learn about the latest Evolution of Endpoint Security & Data Protection.

    This webinar will be conducted in Cantonese.
  • Natural Language Processing Exposed: The Art, the Science and the Applications
    Natural Language Processing Exposed: The Art, the Science and the Applications Sid J Reddy, Chief Scientist, Conversica Recorded: Dec 12 2017 62 mins
    In this presentation, we will discuss several applications of NLP such as information extraction, knowledge synthesis, and entity retrieval. We will discuss how these fundamental set of algorithms are applicable for a wide array of use-cases and industry verticals such as healthcare, business intelligence, life sciences, legal, e-commerce, sales, and marketing.

    Additionally, case studies from these areas will be used to provide an intuitive explanation of complex NLP topics such as distributional semantics, computational linguistics, question-answering, conversational AI, and applications of deep learning to text data.

    Dr. Sid J. Reddy's Bio: https://www.conversica.com/sid-j-reddy/
  • Shift Left: How testing early and often is best for the business and customer
    Shift Left: How testing early and often is best for the business and customer Nancy Gohring 451 Research and Steve Feloney CA Technologies Recorded: Dec 12 2017 50 mins
    Organizations in most any industry are feeling increasing pressure to move fast. But at what cost? Some have learned the hard way that skipping crucial processes, like testing, damages performance and impacts customer sentiments on your brand. In this case, the fast time to market becomes meaningless.

    Smart businesses are adapting to a shift left strategy. These teams are learning how to incorporate testing early and often in the release cycle, supporting business requirements to move fast while ensuring high-performing products and quality. But getting there isn’t easy. In this webinar, we’ll cover:

    •Testing tools: tool choice is important. Not all tools have been designed to support this new paradigm.
    •Integrations: to be effective, testing tools must integrate easily with the tools and processes modern teams use, including CI/CD and APM products. Further, these tools must be very easy to use, specifically for developers.
    •Organizational models: shifting left requires changes to traditional organizations and culture. We’ll share insight into the successful models we’ve seen.
  • Quality & Testing SIG Talk Introduction
    Quality & Testing SIG Talk Introduction Richard Bishop, Todd DeCapual, Chris Trimper Recorded: Dec 12 2017 68 mins
    Vivit launches their first ever SIG Talk event with three speakers who will give you insights into StormRunner Functional, Dynamic data handling in performance tests as well as AI and machine learning as it applies to testing.

    We will discuss:

    How StormRunner Functional is the latest functional test offering from Micro Focus. In this session, Chris Trimper, an early adopter and beta tester, will share his experiences with this new product

    How Virtual Table Server (VTS), in days of Mercury Interactive, was the often-overlooked repository for dynamically updated real-time test data. Even after a revamp and relaunch in 2014, many people still don't use it, but they should. Richard's VTS demo will help you to get value from this great add-on for LoadRunner and Performance Center

    How Big Data, Artificial Intelligence and Machine learning are rapidly impacting businesses and customers, enabling another massive shift through technology enablement. In this session, Todd DeCapua will share how these capabilities are being leveraged in Performance Engineering now, and into the future.
  • Building a Fast, Scalable & Accurate NLP Pipeline on Apache Spark
    Building a Fast, Scalable & Accurate NLP Pipeline on Apache Spark David Talby, CTO, Pacific AI Recorded: Dec 12 2017 62 mins
    Natural language processing is a key component in many data science systems that must understand or reason about text. Common use cases include question answering, paraphrasing or summarization, sentiment analysis, natural language BI, language modeling, and disambiguation. Building such systems usually requires combining three types of software libraries: NLP annotation frameworks, machine learning frameworks, and deep learning frameworks.

    This talk introduces the NLP library for Apache Spark. It natively extends the Spark ML pipeline API's which enabling zero-copy, distributed, combined NLP & ML pipelines, which leverage all of Spark's built-in optimizations.

    The library implements core NLP algorithms including lemmatization, part of speech tagging, dependency parsing, named entity recognition, spell checking and sentiment detection. The talk will demonstrate using these algorithms to build commonly used pipelines, using PySpark on notebooks that will be made publicly available after the talk.

    David Talby has over a decade of experience building real-world machine learning, data mining, and NLP systems. He’s a member of the core team that built and open sourced the Spark NLP library.
  • Behind the scenes of Allianz Group's Continuous Peer-to-Peer Feedback Program
    Behind the scenes of Allianz Group's Continuous Peer-to-Peer Feedback Program Eduard Kaussner, VP Business Development EMEA & MEE, SAP SE / Goran Rice, Head of Customer Success, Semos Cloud Recorded: Dec 12 2017 51 mins
    What You'll Learn

    Allianz Group has drastically improved its internal feedback culture among employees. Learn how Allianz used the Feed-bck app, built native on SAP Cloud Platform, to improve the engagement and insights of its employees and introduce the latest trend of continuous, peer-to-peer evaluations to employees during their day-to-day work.

    During this webinar you will explore:

    • Allianz use cases, its experience working on the SAP Cloud Platform, and how the company improved the feedback culture

    • How your employees can instantly ask for feedback when they require it the most, shortening the overall feedback cycle

    • How to achieve and measure impact on your continuous feedback processes

    • A rating system and dashboards that can provide an objective measure that provides insight into how effective and trusted the feedback of your leaders is to your employees, helping to identify the influencers and true leaders of your organization
  • Digital Transformation Through Automation
    Digital Transformation Through Automation Carl Lehmann, 451 Research | Ryan Bazler, Kofax Recorded: Dec 7 2017 60 mins
    Organizations across the globe are engaged in what some consider to be another IT buzzword – Digital Transformation. Many though take it seriously, as concerted means to optimize customer experiences, improve business efficiencies, and capitalize on new market opportunities.

    In this webinar Carl Lehmann, Principal Analyst at 451 Research will discuss how industry leading enterprises pursue digital transformation from both business and technical perspectives by:

    •Describing digital transformation and how it is used to create competitive advantage
    •Discussing why and how enterprises are pursuing such initiatives
    •Identifying the critical technology needed for execution
    •Revealing how digital automation platforms improve and enable new ways of doing business
    Attendees will learn how to define and structure digital transformation initiatives unique to their firms and how best to make use of digital automation platforms for IT and business transformation.
  • How to Sell Smarter in the Digital Economy with SAP Hybris Solutions
    How to Sell Smarter in the Digital Economy with SAP Hybris Solutions Marco Flores, SAP Hybris Sales Cloud / Sourajit Ghosh, SAP / Bill Butler, CallidusCloud Recorded: Dec 7 2017 55 mins
    What You'll Learn

    Customers are increasingly empowered in their buying journeys, making winning and retaining their business a challenge, especially with readily available and equally determined competitors a simple click away. The companies that succeed in this highly competitive environment are the ones that focus on customer centricity, customer engagement, and the overall customer experience.

    SAP Hybris solutions offer comprehensive functionality to address each of these areas, and the ability to extend this functionality to meet unique customer needs anywhere, at any time, while reducing time to close
    .
    This webinar shows you how to extend the functionality of your SAP Hybris implementation and empower your sales force to go beyond traditional selling methods and sell smarter in the digital economy. You will learn how to:

    • Enable your sales teams to accelerate engagement with customers
    • Deliver accurate pricing, incentives, rebates, and more
    • Launch new products and services
    • Protect and increase profit margins

    Presenter

    - Marco Flores, Global Vice President, Market Development, SAP Hybris Sales Cloud
    - Sourajit Ghosh, Principal Solution Engineer, SAP
    - Bill Butler, Director of Solutions Marketing, CallidusCloud
  • Your Security Sandbox Won't Catch It All - The Phishing Problem
    Your Security Sandbox Won't Catch It All - The Phishing Problem Ryan Kalember, SVP Cybersecurity Strategies Recorded: Dec 6 2017 45 mins
    Phishing attacks don’t involve malware, but instead they take advantage of people to steal credentials, rendering your sandbox useless.

    Email threats continue to plague organizations around the world, but when thinking about email threats, it’s critical not to focus only on malware. It’s Phishing that actually makes up the majority of threats targeting both organizations and consumers.

    Watch this webinar to learn:
    - How phishing has evolved
    - Phishing threat landscape
    - Top phishing lures that impact employees
    - How Proofpoint can effectively address phishing attacks
  • Five Risks That Could Jeopardize Your Application Security Strategy
    Five Risks That Could Jeopardize Your Application Security Strategy Arxan: Dustin Anders | 451: Scott Crawford Recorded: Dec 5 2017 39 mins
    Applications are ubiquitous and essential to the operation and growth of business in today's digital enterprise. Applications are a treasure trove of customer information, intellectual property, and confidential data. They often contain critical IP, application functionality, data, and keys for accessing back-end corporate systems.

    Many enterprises believe the measures they have taken to protect their networks and endpoints and to develop more secure applications are sufficient to mitigate these risks. But many of these measures only build better fences around applications. Organizations that develop applications, meanwhile, may believe that the measures invested in application security testing and operational defense can mitigate at least the most significant exposures. But when an adversary has the ability to analyze applications closely, organizations may be surprised to discover that the security of sensitive data, their competitive advantage, and keys to accessing critical back-end systems, can be laid bare more easily than they think.

    Compromises to an organization’s applications can create enormous risks that company leaders may rarely consider fully. Breaches to an application can quickly lead to a loss of IP, damage an organization’s brand, violate compliance and regulatory requirements, and even lead to customer harm – consequences abundantly evident in recent high-profile breaches.

    Join us to learn more about the 5 critical areas where application risk management falls short.
  • 5 Mobile App Security MUST-DOs in 2018
    5 Mobile App Security MUST-DOs in 2018 Andrew Hoog (Founder) // Katie Strzempka (VP of Customer Success & Services) // Brian Reed (Chief Mobility Officer) Recorded: Dec 5 2017 48 mins
    To close out the 2017 webinar season, our mobile security expert panel will review the top mobile threats of 2017 (e.g., Cloudbleed, Bootstomp, Broadpwn, and more) and then debate what’s next in mobile app security and mobile app security testing for 2018. Join us for a spirited discussion of the security ramifications of the new iPhone X, iOS 11, Android 8, the latest innovations in the mobile app security testing, and more. Compare your mobile app security and mobile app security testing initiatives with what our experts say should be your top priorities in 2018.

    Live attendees will be entered to win a free mobile app security assessment!
  • How to Use Attack Path Mapping to Prescribe Security Controls. Hosted by ISACA
    How to Use Attack Path Mapping to Prescribe Security Controls. Hosted by ISACA Ed Parsons, Associate Director at MWR InfoSecurity and Naresh Persaud, Sr. Director of Security at CA Technologies Recorded: Dec 5 2017 64 mins
    A new technology has emerged called Attack Path Mapping (APM). APM lets you evaluate the probability of the hacker kill chain and quantify the risks, significantly reducing risks through more effective controls.

    Join Ed Parsons, Associate Director at MWR InfoSecurity and Naresh Persaud, Sr. Director of Security at CA Technologies as they share how APM can help companies think like a hacker, leveraging insight to resolve vulnerabilities.

    What’s more, find out how Scotia Gas Network and National Center for Cyber Security are successfully employing Attack Path Mapping … today.
  • Paytech Driving Fintech Ecosystem while Neobanks Provide Innovative Services
    Paytech Driving Fintech Ecosystem while Neobanks Provide Innovative Services Jean-Noël Georges, Frost & Sullivan, Gijzel Marijne, Digital Payments, Adam Moulson, Form3 Recorded: Dec 5 2017 53 mins
    Digital transformation has already disrupted the traditional payment ecosystem. Now a new subcategory, paytech, is dominating the Fintech revolution. Most innovative services are included in the paytech ecosystem, such as instant, cross-border, mobile, invisible, peer-to-peer or cryptocurrency payments. Furthermore, banks and financial institutions had to digitalize their existing services, creating a new channel with the digital platform. The recent emergence of Neobanks has particularly influenced the historical players by providing innovative approaches leveraging technologies and social media. However, payment services success is based on the perceived confidence future customers will have in the different payment platforms. Trust in the payment service is directly linked to the associated security.
  • Take Control of Your Cloud Billing and Be a Hero
    Take Control of Your Cloud Billing and Be a Hero Miles Betro - Orbitera Solutions Architect Recorded: Nov 30 2017 51 mins
    Do you struggle managing your cloud spend? Are you ever surprised by your cloud bills at the end of the month? Do customer billing inquiries send you into a cold sweat?

    In this webinar you will learn how to:
    - Track your cloud spend, across multiple cloud platforms, any time
    - Quickly generate accurate, easy-to-read bills across public, private and hybrid clouds
    - Optimize margins with flexible payment models and customer-specific pricebooks
    - Manage a unified view of your costs and usage for specific customers or categories

    In addition, we will deliver a live demo of setting up and using cloud billing and budget tools and dashboards. We will also answer live questions from the webinar audience.
  • 2018 Security Predictions
    2018 Security Predictions Bob Hansmann, Director, Security Technologies, Forcepoint Recorded: Nov 30 2017 53 mins
    New security challenges in 2018

    Hackers are already scheming their next wave of targets: will they replicate the colossal Equifax breach and cash in on reams of personal data or freeze up IoT devices simply in order to disrupt critical systems?

    Join Forcepoint's Bob Hansmann, Director, Security Technologies for a Forcepoint 2018 Security Predictions Report webcast on the most pressing security issues for the upcoming year.

    You’ll receive an advance copy of the Forcepoint 2018 Security Predictions Report just for attending.
  • Securing Identities & Earning Consumer Trust in the Mobile Commerce World
    Securing Identities & Earning Consumer Trust in the Mobile Commerce World Al Pascual, Research Dir, Javelin Strategy & Research & Carol Alexander, Sr Dir, Digital Payments Security, CA Technologies Recorded: Nov 30 2017 62 mins
    Mobile is increasingly becoming a part of every consumers’ identity. In fact, it has proven to be at the center of consumers’ financial lives, providing a boon for financial institutions. However, the increasing use of this digital channel is escalating the security risks faced by consumers and institutions.

    Join Javelin Strategy & Research and CA Technologies to learn about such advances in authentication as, real-time behavioral analytics, machine learning, and 3-D Secure 2.0. Advancements that are designed to secure accounts and payments, without overburdening consumers with a friction-laden experience.

    Explore:
    •How the confluence of mobile banking and payments is influencing future standards
    •How consumer expectations are evolving with their mobile channel experiences
    •How financial institutions and service providers should be securing their accounts