Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • Manage your Secure Access with one view via Pulse One
    Manage your Secure Access with one view via Pulse One Jim Hebler, Partner Velocity Director & Greg Bassett, Senior Director - Solutions Architecture Recorded: Oct 17 2017 32 mins
    How much visibility do you have via Secure Access end-points – from the Data Center, to the Cloud, to Devices and Applications hitting your network?

    Join Pulse Secure for a compelling Webinar Centered on Pulse One – its’ leading edge Monitoring-Visibility Solution. Configured correctly, Pulse One also enhances compliance alliance, segmentation and pro-active management and consolidation for Secure Access at the front-edge of your network.
  • Are you going to access that data, FROM THERE?
    Are you going to access that data, FROM THERE? Benjamin Massin, CEO at The SCE Group & Gleb EvfaresTov, Solutions Engineer at Bitglass Recorded: Oct 17 2017 29 mins
    The modern science of securing applications to a broad range of devices.

    Do you want people accessing your data from that device? Do you know where that device has been? Would you trust that device to protect your personal data? While cloud applications offer tremendous benefits over traditional on-premise, IT Executives face many challenges involving data security and compliance. Unmanaged devices, unauthorized access, and unsanctioned apps are all significant threats, increasing the risk of data leakage and being the next organization in the headlines. Cloud access security brokers, or “CASBs” are the tools technology leaders have turned to, protecting data across applications, and mitigating other malicious threats.

    In this webinar, Benjamin Massin, CEO of The SCE Group, and Gleb EvfaresTov, Solutions Engineer at Bitglass, will discuss how to balance the benefits of moving to the cloud, while implementing a security solution, protecting identities and data end-to-end.
  • Connected devices and the rise of invisible payments
    Connected devices and the rise of invisible payments Kevin Gordon, Lead Innovation Architect, Worldpay Recorded: Oct 17 2017 31 mins
    By 2020, five billion people will be online, with 25 billion devices and machines using the Internet. Many devices will share data and services, and the way we engage with them will fundamentally change. In a connected world, consumer expectations of executing transactions on a phone, tablet, VR device – or even a refrigerator – will be higher than ever.

    As time goes on, devices will become smarter and make more and more decisions for us. We’ll be able to create rules as users to tell our devices what we’re comfortable with them paying for automatically. The use cases for rule-based payment are endless!

    As such, the onus of creating frictionless download and shopping experiences while overcoming barriers between devices lies with each business. When it comes to recurring and subscription payments, the technology underpinning these user experiences across devices is critical. Seamless, simple, and secure are the watchwords of an IoT world.

    Don’t wait until 2020 to address consumer pain points and overcome technological barriers to IoT adoption. Tune in to the latest VB Live event and hone in on the fastest, best ways to prepare for the IoT world. After all, it’s already here. Attend this webinar and find out:

    •How companies are already dealing with device connectivity
    •How the challenges posed by IoT are being solved for today
    •Global consumer attitudes around payments made by devices
    •How payments will become ‘invisible’ or ‘translucent’ for users
    •Payment technology that will enable devices to make decisions

    SPEAKERS:
    * Kevin Gordon, Lead Innovation Architect, Worldpay
    * Stewart Rogers, Analyst-at-Large, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by: Worldpay
  • Forrester Total Economic Impact Study of CA APM
    Forrester Total Economic Impact Study of CA APM Dean Davison, Principal Consultant, Forrester Research and Pete Waterhouse, Advisor, CA Technologies Recorded: Oct 12 2017 64 mins
    In this golden age of software applications, delivering a great customer experience at scale is a business differentiator. Microservices platforms, containers and cloud-native applications promise faster time-to-market but introduce unparalleled complexity. Added value can quickly be eroded by failing to understand and manage your application performance across environments that are in a constant state of change.

    Join us for this special webcast, where guest speaker Dean Davison, Principal Consultant, Forrester Research will discuss findings from the recent Total Economic ImpactTM (TEI) of CA Application Performance Management (APM) that can assist businesses evaluating this solution – including the potential to realize: $5.4 Million NPV, 316% ROI and payback in 3 months.

    Joining Dean, Pete Waterhouse, Advisor, CA Technologies will outline the essential elements of a modern APM solution needed to deliver these outcomes.
  • Case Study: Transform Threat Investigation With a Stretched Security Team
    Case Study: Transform Threat Investigation With a Stretched Security Team Arabella Hallawell, Sr. Director Advanced Threat Product Marketing + Deb Briggs, CSO, NETSCOUT Recorded: Oct 12 2017 43 mins
    Chief Information Security Officer Reveals How With Arbor Spectrum.

    Attackers continuously have new tools, tactics and practices in their weapons arsenal. Human defenders must shift their strategies to more proactively uncover meaningful threats, and find ways that dramatically accelerate threat investigation.

    Join us to hear:
    - NETSCOUT’s Chief Security Officer discuss how the Arbor Spectrum threat analytics platform was used to help her team take detection and investigation to a new level.
    - In depth examples of how security teams can begin or enhance their detection and investigation of attack campaigns.
  • Instant Payments - Is Your Business Ready for the Real-time Challenge?
    Instant Payments - Is Your Business Ready for the Real-time Challenge? Jean-Noel Georges, Global Program Director, Frost & Sullivan, Tristan Blampied, Pelican and Petra Plompen, EBA Clearing Recorded: Oct 12 2017 50 mins
    In today’s digital marketplace, consumers and businesses increasingly expect to be able to make instant payments, wherever they are, and at any time of day. The adoption of real-time payments capabilities is very much an essential for banks who wish to retain market share and capture new customers.
  • AI facts vs fiction: AI business decisions that really work
    AI facts vs fiction: AI business decisions that really work Avinash Gangadharan, Sr Director of Engineering, Walmart Recorded: Oct 10 2017 61 mins
    Artificial intelligence was Gartner’s top 2017 strategic technology trend, and the year isn’t over yet. But for too many companies, AI myths are persistent, use cases and strategies are still on the “shiny new thing” level, and expectations continue to hover in the spirit of Skynet/HAL, making it hard to determine whether it’s really right for your company.

    As AI technologies multiply, how do you sort fact from fiction? Should you stop daydreaming about replacing your entire staff with chatbots — or can you start augmenting agent abilities? Most importantly, while AI undoubtedly has shown real-live ROI in case study after case study, where is the particular value in chasing the AI buzz for your own company?

    Register now for our our latest VB Live event and find out. We’ll be tackling the AI legends and the AI realities, breaking down the potential AI has for your bottom line, and giving you a glimpse of the future of AI for business.

    In this webinar, you’ll explore:
    * Myths and realities of AI replacing vs. augmenting staff functions
    * How to bake AI into your business strategy
    * On- and offline use cases for AI
    * The future of AI for business

    Speakers:
    * Avinash Gangadharan, Sr Director of Engineering, Walmart
    * Allen Sebrell, Senior Manager E-Commerce Team, Amtrak
    * Deep Varma, VP of Engineering, Trulia
    * Stewart Rogers, Analyst-at-Large, Venturebeat
    * Rachael Brownell, Moderator, VentureBeat
  • Retail Survival in the Age of Digital Disruption
    Retail Survival in the Age of Digital Disruption Sheryl Kingstone 451 Research, Sudesh Girdhari CenturyLink Recorded: Oct 10 2017 57 mins
    Digital transformation is real, and it’s happening – our data in the retail industry lends more insight to the state of the transition. It is an inescapable truth that every business is becoming a digital business empowered by new software initiatives such as AI, Robotics and IoT. The adoption of these disruptive trends will force a divide between business leaders and laggards. With the upcoming Black Friday and Cyber Monday, how prepared are you to meet rising customer expectations. As the pace of innovation accelerates, retailers need to act now. Our Global retail research illustrates a significant gap between digital leaders and laggards and even a modest investment can improve operational efficiencies and agility.

    The retail industry is bursting with digital innovation driving change. This session will review:
    •How differentiation demands digital maturity
    •Transformational technologies essential to create immersive, connected retail experiences across digital and physical worlds
    •The role of cloud services and its impact on customer experience, agility, efficiency and risk
  • Security Briefings Part 2: Compliance Checkup - GLBA & the Cloud
    Security Briefings Part 2: Compliance Checkup - GLBA & the Cloud Jacob Serpa, Product Marketing Manager, Bitglass; Brandon Dunlap (Moderator) Recorded: Oct 5 2017 60 mins
    Financial services firms face a unique set of challenges. Not only do they store large amounts of sensitive personal data, but they also face heavier regulations than many other verticals. In particular, these organizations must reach compliance with regulations like the Gramm-Leach-Bliley Act (GLBA). As cloud adoption continues to spread within the industry, financial firms must be particularly focused on achieving cybersecurity in ways that ensures compliance. Join Bitglass and (ISC)2 on October 5, 2017 at 1:00PM Eastern as we discuss the different aspects of GLBA that financial services organizations need to know and how different tools that can help with compliance.
  • Take Action: Improving Cybersecurity in the Health Care Industry
    Take Action: Improving Cybersecurity in the Health Care Industry Chris Apgar, CISSP; CEO & President, Apgar & Associates; Bud Walder, Vice President Sales & Marketing DataMotion Recorded: Oct 4 2017 59 mins
    In this webinar, security and privacy expert Chris Apgar will review highlights from a recently published Health Care Industry Cybersecurity (HCIC) Task Force report, including findings and recommendations for the industry and some practical implications for implementing these recommendations. The HCIC Task Force was formed by the 2015 Cybersecurity Act passed by Congress and charged with addressing challenges the health care industry faces in securing and protecting against cybersecurity threats. In June of 2017 the Task Force released a comprehensive 96-page report called “Improving Cybersecurity in the Health Care Industry”. During the webinar, Apgar will net out pertinent and actionable report content including:
    •State of Cybersecurity in the Health Care Industry
    •Risks across the Health Care Industry
    •Imperatives, recommendations and action needed
  • Forging our Future with ARKit: Balancing Tech Investments in Augmented Reality
    Forging our Future with ARKit: Balancing Tech Investments in Augmented Reality John Buzzell, Ricardo Olivo Recorded: Oct 3 2017 64 mins
    Apple and Google have joined the call for an Augmented Reality future, bringing hundreds of millions of users with them. Given multiple visions for the massive opportunity ahead, how should we divide our efforts? In this webcast, you’ll hear expert opinions from a group living this challenge. VR/AR Association Marketing Committee Chair John Buzzell and YOU ARE HERE technology lead Ricardo Olivo will reveal their journey – from Vuforia and HoloLens to ARKit and beyond – covering use cases, technology insights, hardware challenges and more. You’ll learn where to place your bets, and how to make the most of this transition. This session will also include 30 minutes of Q&A to help you make sense of your VR/AR options.
  • AI for Autonomous Response: The Machine Fights Back
    AI for Autonomous Response: The Machine Fights Back Andrew Tsonchev, Director of Cyber Analysis & Dan Fein, Senior Cyber Technology Lead Recorded: Sep 29 2017 41 mins
    Global ransomware attacks like WannaCry already move too quickly for humans to keep up, and even more advanced attacks are on the horizon. Cyber security is quickly becoming an arms race — machines fighting machines on the battleground of corporate networks. Algorithms against algorithms.

    Artificial intelligence-based cyber defense can not only detect threats as they emerge but also autonomously respond to attacks in real time. As the shortage of trained cyber analysts worsens, the future of security seems to be automatic. But are humans ready to accept the actions machines would take to neutralize threats?

    Darktrace recently ran tests across enterprises of all sizes in a variety of industries and has subsequently deployed AI-autonomous response in over one hundred organizations. In this presentation, we will discuss our lessons learned and explore several use-cases in which AI-based ‘Autonomous Response’ technology augmented human security teams.

    This session will cover:
    AI approaches and algorithms for detecting and responding to threats
    How human teams adopt (or resist) automated defenses
    The concepts of ‘human confirmation’ mode and ‘active defense’
    Real-world examples of autonomous response in action
  • Defending Against Cyber Crime
    Defending Against Cyber Crime Lisa Forte, Cyber Protection Officer, South West Police Cyber Crime Unit Recorded: Sep 29 2017 46 mins
    The South West Regional Cyber Crime Unit are involved in fighting cyber crime along with other national and international law enforcement agencies.

    As such they see certain traits, methodologies and vulnerabilities over and over again. Lisa Forte, the Cyber Protect Officer for the Unit, will be explaining how businesses should adapt their thinking to "see what the hackers see" to better defend themselves against the threat she sees every day.

    Lisa will also be talking about the importance of planning and war gaming out cyber attack scenarios. The businesses that have a plan are the businesses that survive to tell the tale. Lisa will be using real life cases that the Cyber Crime Unit have dealt with to highlight how quickly things can go wrong as well as providing some simple steps businesses can apply to reduce their vulnerability.

    Speaker bio:

    Lisa Forte is the Cyber Protection Officer for the South West Police Cyber Crime Unit. Her role involves helping businesses of all shapes and sizes defend against the ever growing cyber threat. Prior to working in the Cyber Crime Unit Lisa worked in intelligence for Counter Terrorism agencies in the UK.
  • The Increasing Risk of DDoS Attacks – Are You Adequately Prepared?
    The Increasing Risk of DDoS Attacks – Are You Adequately Prepared? Tom Bienkowski Director of DDoS Product Marketing Arbor Networks + John Pearson Founder and Chief Strategist IP Networks Inc. Recorded: Sep 28 2017 45 mins
    The data is crystal clear. DDoS attacks are dramatically increasing in size, frequency and complexity. Unfortunately, many organizations have been severely impacted by DDoS attacks simply because they either assumed they would never be the target or they thought they had adequate protection in place. Join IP Networks and Arbor Networks - the industry leader in DDoS attack protection products and services to learn:

    -The latest trends in DDoS attacks
    -The importance of proper network visibility for anomaly & DDoS attack detection.
    -Best practices in DDoS attack defense; including an intelligent combination of in-cloud and on-premises attack protection solutions - which offers the most comprehensive form of protection.
  • How the GDPR Impacts Your Enterprise Mobility Management Practices
    How the GDPR Impacts Your Enterprise Mobility Management Practices Magnus Mjøsund, Apperian Product Manager & Chris Marsh, 451 Research Director, Workforce Productivity & Compliance Recorded: Sep 28 2017 57 mins
    The European Union’s General Data Protection Regulation (GDPR) that goes into effect on 25 May 2018 expands the meaning of personal data, mandates when such data can be collected, and enforces full transparency and consent from the user. Organizations of all types processing data from EU residents must evaluate and likely make changes to their enterprise mobility management practices in order to adhere to the new law or face severe penalties.

    Join this webinar to understand what GDPR means for infrastructure and operations professionals that are responsible for mobile and endpoint strategy to make sure your organization is compliant from day one.

    We will review the most important sections of the law related to enterprise mobility from an administration and end user perspective as well as the implications for BYOD programs. EMM should be leveraged to meet GDPR requirements and you will learn how a mobile application management solution like Apperian supports privacy and mitigates risk by managing corporate data while leaving personal data untouched.
  • Virtual Umbrella: Why We Chose Virtual Reality
    Virtual Umbrella: Why We Chose Virtual Reality Samantha Kingston, Founder, Virtual Umbrella Recorded: Sep 28 2017 34 mins
    Samantha Kingston will explore why she bet her career on virtual reality and what it’s really like running a marketing company solely for VR, looking at trends and what challenges are ahead for 2018.

    Virtual Umbrella is an award-winning marketing consultancy specialising in Virtual Reality. Virtual Umbrella has worked on a number of notable projects including creating a virtual reality cinema in Cannes, curating and running a technology hub as part of the Edinburgh Fringe Festival and providing immersive experiences along the BBC and Imperial War Museum.

    Speaker bio:

    Samantha Kingston is the award-winning client director at Virtual Umbrella. Virtual Umbrella is a marketing and PR agency specialising in virtual reality. Samantha fell into the VR industry by accident but has spent her time in the industry building up her own company and working with the VR industry in the UK, Europe, and US. Samantha is an advocate for Women in tech and VR and she is often found moderating panels on equality in the workplace. In 2016 she won the regional and national ‘New Business’ award at Venus Awards, highlighted as one of MCV 30 under 30 and one of the rising stars of BIMA100 2016.
  • What’s New in ALM - Enhancing your team’s efforts to deliver amazing Apps
    What’s New in ALM - Enhancing your team’s efforts to deliver amazing Apps Oren Ziv, Collin Chau, Esther Balestrieri Recorded: Sep 27 2017 57 mins
    ALM QC 12.55 has just been released in August, providing enhanced features and benefits for Application teams, end users and ALM admins working together to deliver high quality applications with confidence.

    Join us as we review the key newly released capabilities of ALM/QC 12.55 and walk through a live demo.

    ALM/QC 12.55 Highlights include:

    •Test board enhancements providing improved user experience for test management and execution
    •Support for Quality of Things (QoT) – ALM client for offline/online Internet of Things (IoT) & device manual testing
    •Improved collaboration through integration of Skype for business
    •Upgraded administration with ability to back up large files
    •Synchronization tools connecting ALM to other management tools such as JIRA, TFS and RTC

    We will also discuss the benefits of ALM Octane – our next-generation ALM product with Agile and DevOps capabilities built in, and how you can get started today!
  • Forget the Buzzwords - It's Time for Virtual Reality to Deliver Real Value
    Forget the Buzzwords - It's Time for Virtual Reality to Deliver Real Value Brian Herrera, CEO and Co-Founder of Vidi VR Recorded: Sep 27 2017 62 mins
    Despite the past two years of hoopla surrounding VR technology, adoption rates are low and retention rates are even worse. Giants such as Facebook, Google, and Samsung have dumped billions into the space, but why isn't it taking off yet? In this webinar, Brian Herrera, CEO of Vidi VR, will give an outsider's look at the inside of this nascent industry and lead a candid discussion about:

    - Hurdles in the way of widespread adoption (spoiler alert: it's NOT technology)
    - The true value proposition of VR for consumers
    - What the big players and "thought leaders" got wrong
    - How Vidi VR is a differentiator in the industry
  • IMMERSIVE EXPERIENCES - PASSING THE “SO WHAT?” TEST FOR BRANDS
    IMMERSIVE EXPERIENCES - PASSING THE “SO WHAT?” TEST FOR BRANDS Chris Helm, COO & Co-Founder, Blend Media Recorded: Sep 27 2017 45 mins
    Brands typically invest in one-off, high end immersive experiences that
    deliver difficult to measure ROI metrics whilst also being challenging to
    consume for viewers.

    Multiple friction points along this journey make us ask “So What?” when it comes to the immersive visual experience.

    Blend Media specialise in 360˚ video and have built a creator network,
    content library and web editor to pass the ‘So What?’ test.

    We enable brands to create immersive, affordable visual experiences that deliver longer term campaign value that are engaging and easy for consumers to enjoy.
  • How to Jump Start GDPR with Identity & Access Management. Hosted by ISACA
    How to Jump Start GDPR with Identity & Access Management. Hosted by ISACA Christian Almskou, Senior Partner, ICY Security & Paul Ferron, Director Digital Identity Strategy, CA Technologies Recorded: Sep 27 2017 54 mins
    More than 50% of businesses today don't have a strategy to address the European General Data Protection Regulation (GDPR). For companies that fail to comply, the cost can be high - as much as 4% of annual turnover. Take control. Learn the steps to successfully implement GDPR.

    Join Christian Almskou, Senior Partner ICY Security and Paul Ferron, Director Digital Identity Strategy, CA Technologies as they share perspectives on how to:
    •Put breach notifications in place
    •Establish repeatable controls and governance
    •Prevent data breaches from happening

    Join us for this informative peer session to help jump start GDPR.
  • Customer Due Diligence after the Money Laundering Regulations 2017
    Customer Due Diligence after the Money Laundering Regulations 2017 Jane Jee, CEO, Kompli-Global Oct 19 2017 1:00 pm UTC 45 mins
    Do you really know your customer? Customer Due Diligence after the Money Laundering Regulations 2017 and the Criminal Finances Act 2017

    * How do you ensure you conduct a thorough search for, and provide ongoing monitoring of, adverse information on existing and potential clients?
    * How do you prove you are conducting compliant CDD?
  • 451 Research & Gemalto Present "Alphabet Soup: Deciphering Multi-Cloud Security
    451 Research & Gemalto Present "Alphabet Soup: Deciphering Multi-Cloud Security Eric Hanselman, Chief Analyst at 451 Research and Michael Gardiner, Security Lead for CTO office, Gemalto Oct 19 2017 3:00 pm UTC 60 mins
    The cloud provides organizations with elasticity and speed and by 2018 60% of an enterprises’ workloads will run in the cloud says 451 Research. The amount of business operations running in the cloud means organizations have more cloud computing service providers, with a typical enterprise having roughly six. This requires companies to develop and implement a multi-cloud strategy, especially when it comes to security. But each CSP has its own security offerings and integrations sometimes making the process confusing and complex. Even prior to the cloud, encryption and key management have presented challenges for many organizations, but with encryption becoming ubiquitous – a strong key management strategy is key. This is especially important with industry mandates and government regulations like European General Data Protection Regulation (GDPR) and U.S state data breach disclosure laws.

    In this joint webinar with 451 Research, we will cover topics including:

    -Building a multi-cloud security strategy for encryption and key management
    -Best practices, benefits and pitfalls of managing your own security
    -Impact of regulations on data protection in the next few years
    -Understanding the different CSP requirements for key management:
    oCustomer-Supplied Encryption Key (CSEK)
    oBring Your Own Key (BYOK)
    oHold Your own Key (HYOK)
    oGeneral cloud service provider key management services overview
  • Business Insight: How to Interpret the Gartner Market Guide for PAM
    Business Insight: How to Interpret the Gartner Market Guide for PAM Suresh Sridharan, Director Privileged Access Management, CA Technologies Oct 19 2017 5:00 pm UTC 60 mins
    The Gartner 2017 Market Guide for Privileged Access Management (PAM) reviews 24 vendors across various categories. This comprehensive information can help you find an ideal solution for your unique business needs. Yet, selecting the right PAM solution is a pivotal decision; it is critical to weigh your options.

    Make an informed decision. Join Suresh Sridharan, Director Privileged Access Management at CA Technologies, as he guides you through report recommendations, evaluates the latest tools and technologies, and compares and contrasts industry choices.
  • IDC: Securing the IoT Device Ecosystem
    IDC: Securing the IoT Device Ecosystem TBC Oct 24 2017 4:00 pm UTC 60 mins
    Learn about security risks and best practices for protecting devices and communications.
  • What attackers know about your mobile apps that you don’t: Banking & FinTech
    What attackers know about your mobile apps that you don’t: Banking & FinTech Andrew Hoog, NowSecure Founder Oct 24 2017 6:00 pm UTC 45 mins
    Our threat research team spends every waking moment reverse-engineering and cracking mobile apps and devices to help organizations reduce mobile risk. During this webinar, renowned mobile security expert and NowSecure founder Andrew Hoog will explain the attacker’s point-of-view, what attackers are looking for in mobile banking or financial services apps, and what makes your mobile app an appetizing target. We will then provide tips for deploying a mobile app security testing program to ensure you proactively plug security holes, squash privacy leaks, and fill compliance gaps in your mobile apps.
  • [Panel] Protecting Data in the Next Generation of the Cloud
    [Panel] Protecting Data in the Next Generation of the Cloud Amar Singh (Cyber Management Alliance); Klaus Gheri (Barracuda Networks), Daniele Catteddu (CSA) Oct 25 2017 10:00 am UTC 60 mins
    Cloud computing is an increasingly vital element of information security. It’s used to protect sensitive data; for identity and access management; for network security and to aid with incident response. However it’s not without it’s own set of risks and has been hit in the past with significant and newsworthy breaches.

    Join this interactive Q&A panel with top cloud and security experts as they discuss the future of the cloud and considerations to take for protecting sensitive data when it's held in the Cloud.

    Moderator:
    - Amar Singh, Cyber Management Alliance

    Speakers:
    - Daniele Catteddu, CTO, Cloud Security Alliance
    - Klaus Gheri, VP and GM, Network Security, Barracuda Networks
  • Making the Leap from TEM to IT Management
    Making the Leap from TEM to IT Management Hyoun Park Oct 26 2017 5:00 pm UTC 45 mins
    Recommended Audience: CIO, CFO, Procurement officers, IT Finance, IT Sourcing.

    Telecom Expense has traditionally been the most challenging of IT costs to manage. With the emergence of Software-as-a-Service, Cloud Computing, the Internet of Things, and software defined networks, the rest of the IT world is quickly catching up.

    This webinar will provide best practices for expanding your existing telecom expense management program into a bigger IT management program to take advantage of the robust capabilities and vendor management experience already in TEM. This presentation will include anonymized end user examples and a list of vendors with experience in managing non-telecom expense categories.
  • A Crisis of Trust: The Vulnerabilities of Usernames & Passwords.
    A Crisis of Trust: The Vulnerabilities of Usernames & Passwords. David Duncan, Vice President, Product & Solutions Marketing, Security, CA Technologies Oct 26 2017 5:00 pm UTC 60 mins
    ***Security Alert: Unusual Activity Detected. Your company has suffered a data breach.***

    In today’s brave new world, where the Internet is used for everything from finance to heathcare, traditional usernames and passwords are, in fact, reckless. If we want to erase Hacker Headlines, we need a new model of Trust for Digital Identities.

    So, what’s the answer? Join David Duncan, Vice President, Security at CA Technologies, to discuss:
    • Risks posed to your business by legacy authentication
    • Problems inadvertently created by human behavior
    • New model for digital identity that leverages user Digital DNA and risk analytics

    Let us show you how CA Technologies can help you reduce identity theft and fraud, while building sustainable online Trust.
  • How to Build an Open Sourced Data Science Platform
    How to Build an Open Sourced Data Science Platform David Talby, CTO, Atigeo Oct 26 2017 5:00 pm UTC 75 mins
    This talk shows how to build a scalable data science platform, using only free, commercially-friendly open source software. The end-to-end architecture covers interactive queries & visualization, machine learning & data mining, deploying models to production, and a full 24x7 operations toolset.

    Requirements include what an enterprise typically requires: Strong security (authentication, authorization, audit, encryption, multi-tenancy), active monitoring for both systems & data, backup & restore, user management (with LDAP integration), distributed deployment on commodity hardware, auto scaling, and self-healing when containers or services go down. Technologies covered include Spark, Hadoop, ElasticSearch, Kibana, Jupyter notebooks, TensorFlow, OpenScoring, Docker Swarm, and supporting tools.

    This talk is intended for practicing architects and technology leaders, who need to understand how to best leverage the open source ecosystem in this space and what it takes to integrate the available cutting-edge technologies into a cohesive, enterprise-grade and production-grade architecture.

    David Talby is Atigeo’s senior vice president of engineering, leading the R&D, product management, and operations teams. David has extensive experience in building and operating web-scale analytics and business platforms, as well as building world-class, agile, distributed teams.
  • Multi-Channel Digital Services: Intersection of Microservices & API Management
    Multi-Channel Digital Services: Intersection of Microservices & API Management Rahul Kamdar, Sr. Product Manager, TIBCO Software, Inc. and Jeremy Pollock, Sr. Director, Product Management, TIBCO Software Oct 30 2017 10:00 am UTC 60 mins
    Companies today who are investing in digital transformation initiatives are focusing on finding new ways to interact with their existing customers, and experimenting with creative approaches to acquiring new ones. Often times this involves the creation of new routes to market and a multi-channel approach to marketing and sales.

    If you work in an IT or line-of-business organization tasked with building this new class of digital services, you should attend this webinar, where the following important topics will be covered:

    - What multichannel digital services are, and why they matter
    - Why microservices are critical for successful multi-channel digital initiatives
    - Synergies and benefits of combining API Management & microservices
    - Practical advice on how to get started
  • Getting the Most from Big Data: The Benefits of Partnering with a DBaaS Provider
    Getting the Most from Big Data: The Benefits of Partnering with a DBaaS Provider Jim Curtis 451 Research, Steve Croce, Product Manager for ElasticSearch and DBaaS Object Rocket Oct 31 2017 6:00 pm UTC 60 mins
    Clearly, the onslaught of data, particularly big data, continues to cause many organizations to look for new ways in which to store, analyze, and manage that data. Cloud computing from public cloud vendors is often one place in which enterprises turn. Traditionally deployed and managed on-premises, databases are the lifeline of many enterprises. And while the cloud is appealing for a number of reasons, there are still questions on the minds of many organizations in choosing the right cloud partner to manage their database in the cloud.
  • Smart Communities and Autonomous Vehicles
    Smart Communities and Autonomous Vehicles Jill North - DOT City of San Jose; Robert Grant - Lyft; Moderated by Limor Schafman, TIA Nov 1 2017 3:00 pm UTC 60 mins
    Smart communities and corporations developing products and services for that environment understand that it requires a holistic view of what a “living” experience will be in a fully 5G-connected environment. Level 5 automotive autonomy will require a combination of wireless networks with V2V and V2I connectivity. This webcast will review the work automotive OEMs, cities and universities are doing to build infrastructure and transportation vehicles that will move from human driven, through connected to fully autonomous capabilities.

    Speakers:
    >> Jill North, Innovation Program Manager, Department of Transportation, City of San Jose
    >> Robert Grant, Senior Director of Public Policy, Lyft

    Bios:
    >> Jill North is Innovation Program Manager for the Department of Transportation at the City of San Jose. Although Jill is new to the public sector in her role as the Innovation Program Manager for the Department of Transportation in San Jose, she is no stranger to how emerging technology can change the way people experience the world around them. After 5 years as a Program Manager for Streetview at Google Maps, Jill is looking to bring her expertise leveraging technology to make San Jose the most innovative city in America. In 2014, she was granted the National CEO Award of Excellence for her Streetview collaboration with Parks Canada.

    >> Robert Grant - Rob Grant is the Senior Director of Public Policy at Lyft, where he spearheads Lyft's legislative and policy priorities throughout the U.S, including on autonomous vehicles. He previously worked at the United States Senate and the Federal Housing Finance Agency. In his ten years in the Senate, Rob played an integral role in addressing some of the most complex issues faced by the Senate Banking and Judiciary Committees, including the Dodd-Frank Act.
  • Security Briefings Part 3: Compliance Checkup - HIPAA & the Cloud
    Security Briefings Part 3: Compliance Checkup - HIPAA & the Cloud Salim Hafid, Product Marketing Manager, Bitglass; Brandon Dunlap, Brightfly Nov 2 2017 5:00 pm UTC 75 mins
    Organizations in the healthcare industry handle data more sensitive (and valuable) than that of companies in perhaps any other sector. Because of this, those organizations need to demonstrate a heightened standard of data security and privacy. To ensure this, the U.S. has enacted the Health Insurance Portability and Accountability Act of 1996 (HIPAA). While use of the cloud affords organizations greater efficiency, it also complicates issues of security and regulatory compliance. But the good news is that solutions that enable cloud and security are available. Join Bitglass and (ISC)2 on November 2, 2017 at 1:00PM Eastern to learn about the requirements of HIPAA and the specific security capabilities that healthcare firms need in order to meet compliance requirements.
  • CA PAM 3.0.1 - What's New
    CA PAM 3.0.1 - What's New Mike Dullea, Senior Director of Product Management for PAM. CA Technologies Nov 2 2017 5:00 pm UTC 60 mins
    The recently updated CA Privileged Access Manager provides a simple, secure, and scalable Privileged Access Management capability that organizations can use to meet their current and evolving needs. The release includes:

    • Graphical redesign of the user interface to provide consistency, improved usability and a modernized look
    • New management console to offer greater visibility into clustered environments for large multi-department and Managed Service Provider (MSP) environments
    • Augmented session recording, encryption and crypto module enhancements to support deployments of all sizes
    • And more

    Please join Mike Dullea, Senior Director of Product Management for PAM at CA Technologies, as he guides you through many of the new use cases in this release and demonstrates the enhanced user experience.
  • API Orchestration & Choreography: Why It Matters for Digital Business
    API Orchestration & Choreography: Why It Matters for Digital Business Leon Stigter, Integration Product Management & Strategy, TIBCO Software, Inc. Nov 7 2017 10:00 am UTC 60 mins
    APIs are generally referred to as a way to access a specific piece of data or business logic. But what if you need to compose APIs into flows that externally expose a business process with more complex data manipulation requirements?

    In many cases, this functionality already exists in SOAP services or ESB functionality, but requires repurposing and updating to a more modern REST approach. Digital business applications often require melding of existing functionality with new capabilities, a convergence of old and new.

    Attend this webinar to learn:

    - Why choreography and orchestration matter in an API architecture
    - How service decomposition can be applied
    - How to maximize reuse of existing APIs to reduce time to market
    - How both orchestration and choreography are handled by TIBCO Mashery® Enterprise
  • Edge Computing & Micro Data Centers
    Edge Computing & Micro Data Centers Don Byrne, Metrix411; Phillip Marangella, EdgeConneX; Limor Schafman, TIA Nov 8 2017 4:00 pm UTC 75 mins
    The high speeds expected from future 5G networks and the demands of dense data over those networks is leading to communications network densification. Data centers, a key component of high speed delivery, are redefining their role, becoming a part of the fog and moving increasingly to the edge. This webcast will cover the role micro data centers will play in community network communications infrastructure; their configuration and structure; use of artificial intelligence and virtualization; control systems and operations; and workforce needs.

    Speakers:
    >> Don Byrne, Managing Director, Metrix411
    >> Phillip Marangella, VP of Business Development, Cloud and IoT Solutions, EdgeConneX
  • Executive Survey -- Drivers for Deploying Speech Analytics
    Executive Survey -- Drivers for Deploying Speech Analytics Dan Miller, Lead Analyst, Opus Research; Derek Top, Research Director, Opus Research; Uniphore Nov 8 2017 4:00 pm UTC 45 mins
    In the second year of a global tracking study, Opus Research presents findings from a survey of 500 business decision-makers to understand their perspectives in evaluating and deploying Speech Analytics platforms and services.

    This study, commissioned by Uniphore, documents critical datapoints in the perceived value of Speech Analytics and its impact on contact center operations, compliance and regulation, workforce optimization, customer experience and delivering a return on investment.

    Attendees to this webinar will receive a complimentary copy of the report “Executive Survey: Drivers for Deploying Speech Analytics (2017 Edition)."

    On Wednesday, November 8th (11 a.m. EST | 8 a.m. PST), join Dan Miller, lead analyst & founder at Opus Research, Derek Top, director of research with Opus Research, and representatives from Uniphore, as they unveil the key findings from this definitive report on speech analytics.
  • 2017 Global PKI Trends: PKI at the Crossroads
    2017 Global PKI Trends: PKI at the Crossroads Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute and John Grimm, Sr Director of Security Strategy, Thales e-Security Nov 8 2017 4:00 pm UTC 60 mins
    PKI (public key infrastructure) has quietly become one of the most critical assets for enterprises today. Our 2017 study, conducted by the Ponemon Institute and sponsored by Thales e-Security, reveals an increase in the number of applications that use digital certificates, that enterprises are investing in fortifying the security posture of their PKIs, and that the IoT is the next game-changer for the future of PKI.

    Join this webcast to learn about the top findings of this research, including:

    • The increasing influence of the IoT in PKI planning
    • The increasing security maturity of enterprise PKIs including the use of Hardware Security Modules
    • Identification of enterprise applications that commonly depend on PKI credentials
    • The ongoing challenges associated with PKI deployment and management
  • What You Need to Know: OCR Guidance on Patient Access
    What You Need to Know: OCR Guidance on Patient Access Chris Apgar, CISSP; CEO & President, Apgar & Associates; Bud Walder, Vice President Sales & Marketing DataMotion Nov 8 2017 6:00 pm UTC 75 mins
    In this webinar, security and privacy expert Chris Apgar will delve into the recent guidance issued by OCR (Office of Civil Rights) on patients’ right to access their health information, parsing out what you need to know to not only meet HIPAA requirements, but also engage and serve the patient.
    The HIPAA Privacy Rule requires health care providers and plans to give individuals the ability to view and receive copies of their medical and health records as well as make their medical record available to third parties. But what does this mean for providers? During the webinar, Apgar will brief you on:
    •Scope of Information included / excluded
    •Timeliness, fees and costs
    •Form, format and manner of access
    •Right to request providers send medical records to a third party
    •Denial of access
    •Steps to take now

    Who should attend:CIO, CISO, Data Security and Compliance Officers and Staff
  • Forrester: Setting the Foundation for a Secure IoT Ecosystem
    Forrester: Setting the Foundation for a Secure IoT Ecosystem TBC Nov 9 2017 5:00 pm UTC 60 mins
    Discover how to mitigate security risks with IoT using public key infrastructure (PKI).
  • API Management for the IT Architect
    API Management for the IT Architect Andy Hampshire, Technical Evangelist at TIBCO Mashery®, TIBCO Software, Inc. Nov 14 2017 10:00 am UTC 60 mins
    Digital transformation creates a new set of challenges for IT architects and developers. Applications need to be created much faster than before, in a way that makes frequent changes possible for reacting quickly to customer needs and your competitive environment. And these applications need to fit in with your existing IT landscape.

    Watch this on-demand webinar in which Andy Hampshire, technical evangelist at TIBCO Mashery® explains how you can achieve these goals using a combination of fine grained services and composable APIs.
  • Next in the Web PKI industry: are you ready for short-lived certificates?
    Next in the Web PKI industry: are you ready for short-lived certificates? Symantec Nov 14 2017 3:00 pm UTC 45 mins
    Short certificate validity as industry best practice will be here sooner than you might think. The emergence of devastating threats and vulnerabilities is driving the need to create smaller windows of opportunity for cyber criminals.

    Several new measures have already been implemented to this end, such as Certificate Transparency (CT) and more recently Certificate Authority Authorisation (CAA). Now Certification Authorities and browser vendors are becoming increasingly vocal to urge the industry to move toward short-lived SSL/TLS certificates.

    In this webinar, we will help you understand:
    - what are short-lived SSL/TLS certificates
    - why the industry is reducing SSL/TLS certificates validity time
    - what the benefits and drawbacks this brings to your organisation
    - how to start preparing for the introduction of short-lived SSL/TLS certificates to your portfolio.
  • Virtualization: Impacts on Performance Assurance and Business Models
    Virtualization: Impacts on Performance Assurance and Business Models Andrew Young, iconectiv, Jay Stewart, Spirent, Moderated by Limor Schafman, TIA Nov 14 2017 4:00 pm UTC 75 mins
    The push to virtualize communication networks, control centers, and data centers through NFV and SDN technologies offers both great opportunity for management, speed to market, scale and business, and also brings many challenges. Efficiency, cost management, ensuring SLAs, managing OPEX and CAPEX, reducing product production costs are all business concerns faced by communications providers as they convert their networks to be increasingly software driven. What are the new business models that software enables? What are the customer expectations for new service deliverables? How can service providers, data centers and others guarantee quality of service? What tests are being conducted and what industry practices are being established? This webcast will review how companies are meeting the challenge of operating with new processes and with new requirements.

    Speakers:
    >> Andrew Young, VP of Business Development, iconectiv
    >> Jay Stewart, Senior Product Line Manager, Lifecycle Service Assurance, Spirent
  • Danger in the App Stores: 3rd Party Mobile App Risk for Banks, FinServ & FinTech
    Danger in the App Stores: 3rd Party Mobile App Risk for Banks, FinServ & FinTech Alex Wishkoski, NowSecure Director of Product // Brian Reed, NowSecure CMO Nov 14 2017 7:00 pm UTC 45 mins
    What you don’t know about third-party apps in the Apple® App Store® and the Google Play™ store can hurt you. Apple and Google have app review processes at various levels, but banks and financial services organizations require more scrutiny -- especially for BYOD & COPE devices. Commercial apps used by employees in the workplace can leak data and violate security policies. Third party apps that use your company SDKs or APIs can expose your organization, defraud your customers, and tarnish your brand. Join our webinar to learn how to incorporate third-party commercial apps in your mobile threat modeling exercises and application security programs to protect your organization, your reputation, and your customers.