Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • Virtualizing Media Broadcast: TV Transformed
    Virtualizing Media Broadcast: TV Transformed Steve Reynolds - Imagine Communications, Limor Schafman - TIA Recorded: Nov 17 2017 46 mins
    Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.

    Steve Reynolds, CTO, Imagine Communications

    Steve Reynolds is Chief Technology Officer at Imagine Communications and responsible for the technical strategy and roadmap of the company, as well as managing business development, partner relationships, and M&A activity. Reynolds brings 20 years of technology leadership in the cable industry to Imagine Communications. At Comcast, he served as Senior Vice President of Premises Technology overseeing the strategy, roadmap and development of all technologies employed in service delivery to the customer premises. Prior to Comcast, Reynolds was Senior Vice President of Technology at OpenTV Incorporated, a world leader in digital and interactive television technology.

    Host: Limor Schafman, Content Development Director, TIA

    NOT BICSI accredited.
  • Best Practices for GDPR when hosting data off-premises
    Best Practices for GDPR when hosting data off-premises Matthew Johns, Product Marketing Manager of CenturyLink and Slam Laqtib, Senior Product Manager of Thales eSecurity Recorded: Nov 17 2017 49 mins
    GDPR is coming into force in May 2018. Many organisations are now getting into gear in order to ensure they are compliant by the deadline. This is even more important for those organisations who are hosting their data off premises.

    But what does GDPR really mean to businesses, how will it impact the way in which organisations handle their data and engage with trusted third parties?

    Join Matthew Johns, Product Marketing Manager of CenturyLink and Slam Laqtib, Senior Product Manager of Thales eSecurity for a thought provoking discussion drawing from real-life examples on:

    1) Organisational best practices when working with cloud service providers to adhere to GDPR

    2) Key factors organisations to take into account when complying to GDPR

    3) The steps global enterprises are taking get themselves #fit4GDPR
  • Key Vendors for Managing $40+ Billion in SaaS Costs
    Key Vendors for Managing $40+ Billion in SaaS Costs Hyoun Park Recorded: Nov 16 2017 32 mins
    Recommended audience: CIO, CFO, Chief Procurement Officers, Finance Directors and Managers, Controllers, IT Procurement, Procurement Directors and Managers, Sales and Marketing Operations Directors and Managers

    In this webinar, Amalgam introduces a new set of solutions focused on enterprise SaaS expense management, a $40 billion+ global market that is largely unmanaged at this point.

    Amalgam estimates that less than 5% of SaaS spend is currently centrally managed. The other 95% is hiding in expense reports and one-off accounts that escape corporate control. No rules, no buik discounts, no disputes, no contract enforcement or negotiations.

    Stop the insanity! Learn which vendors to consider to manage an expense that may now represent $5,000 or more per employee in your organization.
  • Next Gen Apps Need Next Gen Databases
    Next Gen Apps Need Next Gen Databases James Curtis Senior Analyst of Data Platforms & Analytics at 451 Research; Leena Joshi, VP of Marketing at Redis Labs Recorded: Nov 16 2017 51 mins
    The next generation of applications being built at the rising star companies are different from the clunky software being built in traditional businesses. As traditional companies modernize their software stacks, they need to incorporate renewed expectations into their applications such as tailored user experiences, built-in analytics and decision-making while meeting response time requirements under any conditions.

    James Curtis, senior analyst at 451 group, outlines top trends in user experience requirements and the higher bar for application developers when it comes to delivering complex analytics so users can take real time action. The wide availability of new NoSQL, streaming and advanced analytics technologies are enabling state of the art functionality in applications.  Join this session for a discussion of top drivers and barriers organizations face while overhauling their applications to incorporate cutting edge functionality.

    Leena Joshi, VP Product Marketing at Redis Labs examines specific advantages of the Redis Enterprise platform that simplify the implementation of real-time analytics functionality such as probabilistic counts, time-series analysis, leaderboards, personalized recommendations, location-based calculations into modern applications.
  • Adaptive Thinking: How Capital One Combats Fraud
    Adaptive Thinking: How Capital One Combats Fraud Dave Laramy, Director of Fraud Strategy, Capitol One & Hannah Preston, Solution Strategist, Payment Security, CA Recorded: Nov 16 2017 40 mins
    Capital One is a Top 10 credit card issuer in the UK and is recognized as an award winner for its exceptional customer experience. The team's philosophy to continually try new things, allows them to successfully balance tighter fraud prevention and increased customer satisfaction. In fact, Capital One readily adopted the CA Payment Security Suite to help ensure that balance.

    Join Dave Laramy, Director of Fraud Strategy at Capital One and Hannah Preston, Solution Strategist, Payment Security at CA as they share tactics to eliminate legacy fraud controls and embrace more efficient ways to battle the bad guys with intelligent data and authentication.

    Tune in and explore how to:
    • Implement best practices and strategies for leveraging data and authentication
    • Improve fraud prevention and the checkout experience with 3DS 2.0
    • Prepare for regulatory changes, scheme mandates, and future transformations
  • CSO Lessons Learned:Cybersecurity Risk on the Road to Digital Transformation
    CSO Lessons Learned:Cybersecurity Risk on the Road to Digital Transformation Aaron Sherrill Senior Analyst 451 Research, Dave Mahon CSO CenturyLink Recorded: Nov 15 2017 48 mins
    Organizations on the journey to digital transformation are encountering new challenges with managing risk. Not only are complex digital transformation initiatives making it difficult for organizations to fully grasp their entire risk profile but digital transformation is also resulting in new types of risk for the company. Organizations with strong risk aversion are in danger of preventing or stifling innovation and change. How can organizations manage risk and create a strategy that empowers digital transformation? What have organizations learned on the road to digital transformation that can help others early on in the journey?
  • Tackling the f-word: The smarter approach to ad fraud
    Tackling the f-word: The smarter approach to ad fraud Emily Storino, Network Strategy Lead, Electronic Arts (EA) Recorded: Nov 15 2017 61 mins
    Ad fraud isn’t becoming more prevalent -- the fraudsters are just getting slicker. From bot nets to device ID spoofing, the tricks are getting more sophisticated, and raking in more and more cash for the swindlers.

    Staying ahead of the fraudster’s learning curve is the key — and collaboration is the crucial element. While vendors and advertisers are directly impacted by fraud, tracking partners provide the technology to help fight fraud – all three players have to work together to circle the wagons.

    Making a game plan can be complex, when there are no clear benchmarks for defining or measuring fraud, as each player defines it differently and different benchmarks are needed for each app type, geo, traffic source, and so on.

    Join this VB Live event to learn how to tackle that complexity, how to define benchmarks, detect and manage fraud, and work with your partners to circle the wagons against the fraudsters.

    Register for free!

    You’ll learn:
    * Who the stakeholders are, plus why and how is each is affected
    * The MMPs’ role in this ecosystem
    * What fraud is and what benchmarks should be used for defining it
    * How to collaborate to detect and manage fraud on an ongoing basis
    * What tools are out there to fight fraud

    * Emily Storino, Network Strategy Lead, Electronic Arts (EA)
    * Grant Simmons, Head of Client Analytics, Kochava
    * Tal Nissenson VP Client Success US, Taptica
    * Stewart Rogers, Analyst-at-Large, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by: Taptica
  • Cat 8 Data Center Cabling Systems Update
    Cat 8 Data Center Cabling Systems Update Frank Straka, Panduit; Mark Mullins, Fluke Networks; Moderated by Limor Schafman, TIA Recorded: Nov 15 2017 69 mins
    The Telecommunications Industry Association (TIA) TR-42 Telecommunications Cabling Systems Engineering Committee is issuing a Category 8 cabling systems update. Join this webcast to learn the details.


    >> Mark Mullins - Global Communications Manager, Fluke Networks
    Mark is one of the founding members of Fluke Networks, starting in 1993. He has been involved in all of the key areas of the business, including cable testing, network troubleshooting and analysis. He holds a B.S. in Computer Science and an MBA from the University of Washington.

    >> Frank Straka - Product Line Manager, Panduit
    Frank Straka manages Panduit’s copper and fiber cable product lines. Frank holds multiple degrees in both engineering and business, including a BSEE, MSEE, and MBA. He holds 26 patents in copper connectivity and cable design. Frank is active in the TIA TR42.7 standards group, which developing new standards to support new applications like 25 and 40GBASE-T, 100W PoE++ and NBASE-T. He has spoken at multiple conferences such as BICSI, IWCS, and the Ethernet Summit on new copper developments.

    This program does not offer accreditation.
  • Phishing Incident Response - How to Stop the Chaos!
    Phishing Incident Response - How to Stop the Chaos! Presenter: Duncan Thomas, Director of Sales, PhishMe; Moderator: Clayton Jones, Managing Director, APAC, (ISC)2 Recorded: Nov 15 2017 61 mins
    A recent survey conducted among security professionals in Australia, Singapore revealed that up to 95% of respondents said phishing is the #1 threat. Yet many acknowledged they’re unprepared to deal with phishing attacks.

    Attend this webinar to learn why responders are drowning in emails instead of hunting real threats. See why they’re betting on automation whilst we know, tech alone won’t stop threats from getting through and wreaking serious havoc. Learn what rapid changes and investments your peers are planning to turn the tide against phishing and protect their organisations.

    In this webinar, you will learn:

    - How bad is the phishing threat?
    - How confident are companies in their phishing responses?
    - What solutions are companies using—and which ones should they add?
    - How can automation and technology help? Why are humans important, too?
    - How does your organisation compare to organisations in Australia, Singapore and other countries around the globe?

    Join PhishMe and (ISC)² on Nov 15 (Wed) at 14:00 (Singapore time) and learn more about phishing incident response.
  • Danger in the App Stores: 3rd Party Mobile App Risk for Banks, FinServ & FinTech
    Danger in the App Stores: 3rd Party Mobile App Risk for Banks, FinServ & FinTech Brian Reed, CMO // Alex Wishkoski, Director of Product Management Recorded: Nov 14 2017 45 mins
    What you don’t know about third-party apps in the Apple® App Store® and the Google Play™ store can hurt you. Apple and Google have app review processes at various levels, but banks and financial services organizations require more scrutiny -- especially for BYOD & COPE devices. Commercial apps used by employees in the workplace can leak data and violate security policies. Third party apps that use your company SDKs or APIs can expose your organization, defraud your customers, and tarnish your brand. Join our webinar to learn how to incorporate third-party commercial apps in your mobile threat modeling exercises and application security programs to protect your organization, your reputation, and your customers.
  • Optimize Mobility TCO with Automation
    Optimize Mobility TCO with Automation Michele Pelino, Principal Analyst at Forrester & Pallavi Vanacharla, Head of Enterprise Mobility Prod Mktg at Cisco Jasper Recorded: Nov 14 2017 61 mins
    Employees with business mobile phones have become more pervasive and so have the management challenges associated with them. Unexpected overages, high mobile helpdesk costs, and unused mobile phones, are all too common, leading to an ever-increasing mobility TCO.

    Cisco recently commissioned Forrester Consulting to conduct a research study on mobility management challenges. Guest speaker Michele Pelino, Principal Analyst at Forrester, will reveal Forrester’s findings on what is actually impacting your mobility costs and how automation can solve your challenges. She’ll also share her top recommendations on what you can do to optimize your mobility TCO.

    What you’ll learn:
    •What are the biggest contributors to high mobility TCO?
    •What are the hidden costs of asset management?
    •Why you should care about instant MACDs?
    •How can automation deliver the most savings?
    •Forrester’s top recommendations to reduce mobility costs

    Co-speaker Pallavi Vanacharla, Cisco Jasper’s Head of Enterprise Mobility Product Marketing, will show you how to automate your mobility management with Cisco’s Control Center for Mobile Enterprise (CCME) platform.
  • 10 Tips to Start Scaling DevOps
    10 Tips to Start Scaling DevOps Alan Schimel, Editor-in-Chief, DevOps.com & Ashish Kuthiala, Sr. Director, Micro Focus Recorded: Nov 14 2017 59 mins
    Many organizations have started on their DevOps transformation journey today, but only 10% have fully embraced DevOps. Is it still so new that organizations are struggling to understand it?

    Change is hard, and the transformation to DevOps is hard. It flies in the face of the traditional silos:

    (1) Applications departments for the majority of the larger enterprises were in place to support their business; today they are expected to be revenue-generating, and expected to be the main way to engage with their users, including customer support; and

    (2) There were a lot of teams, processes, and infrastructure that were all set up to support the original models.

    Learn how to engage with your organization to move towards a more optimal DevOps model.
  • Filling the GDPR Compliance Gap
    Filling the GDPR Compliance Gap Adenike Cosgrove, Sr. Product Marketing Manager, Proofpoint Recorded: Nov 14 2017 29 mins
    Join this session to discuss: How your organization can drive towards compliance, how to embed "privacy by design" to your development lifecycles, and how to protect all identified EU personal data and prevent data breaches.
  • Next in the Web PKI industry: are you ready for short-lived certificates?
    Next in the Web PKI industry: are you ready for short-lived certificates? Justin Carroz, Senior Product Marketing Manager at Symantec and Dave Roche, Customer Success Manager at Symantec Recorded: Nov 14 2017 48 mins
    Short certificate validity as industry best practice will be here sooner than you might think. The emergence of devastating threats and vulnerabilities is driving the need to create smaller windows of opportunity for cyber criminals.

    Several new measures have already been implemented to this end, such as Certificate Transparency (CT) and more recently Certificate Authority Authorisation (CAA). Now Certification Authorities and browser vendors are becoming increasingly vocal to urge the industry to move toward short-lived SSL/TLS certificates.

    In this webinar, we will help you understand:
    - what are short-lived SSL/TLS certificates
    - why the industry is reducing SSL/TLS certificates validity time
    - what the benefits and drawbacks this brings to your organisation
    - how to start preparing for the introduction of short-lived SSL/TLS certificates to your portfolio.
  • API Management for the IT Architect
    API Management for the IT Architect Andy Hampshire, Technical Evangelist at TIBCO Mashery®, TIBCO Software, Inc. Recorded: Nov 14 2017 25 mins
    Digital transformation creates a new set of challenges for IT architects and developers. Applications need to be created much faster than before, in a way that makes frequent changes possible for reacting quickly to customer needs and your competitive environment. And these applications need to fit in with your existing IT landscape.

    Watch this on-demand webinar in which Andy Hampshire, technical evangelist at TIBCO Mashery® explains how you can achieve these goals using a combination of fine grained services and composable APIs.
  • Email Fraud Defence - How to Fight the Next Generation of Targeted BEC Attacks
    Email Fraud Defence - How to Fight the Next Generation of Targeted BEC Attacks Richard Davis - Director Cybersecurity Strategy, and Tim Ricketts - Snr Security Engineer - EMEA, Proofpoint Recorded: Nov 14 2017 48 mins
    Find out how highly-targeted, low volume impostor email – or business email compromise (BEC) – attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organisations face today.

    This is not news but things are changing. New technology or protocols, such as DMARC, can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.

    Join us to learn:

    - Why email spoofing works

    - Current BEC trends and attack methods

    - How Proofpoint’s new Email Fraud Defense solution can identify and block BEC threats before they reach the inbox".
  • Foundation for a Secure Internet of Things (IoT) Ecosystem, Featuring Forrester
    Foundation for a Secure Internet of Things (IoT) Ecosystem, Featuring Forrester Merritt Maxim, Principal Analyst at Forrester Research and Srini Padmanabha, Senior Product Manager at Symantec Recorded: Nov 9 2017 59 mins
    In a recent survey, 43 percent of organizations are implementing or planning to implement the Internet of Things. Along with the benefits come challenges and risks. Every one of “thing” on the Internet may be an attack vector.
    How do organizations set up a foundation for secure IoT implementation?

    Attend this webcast to:
    - Find out about trends and challenges in implementing IoT
    - Discover best practice and solutions to mitigate security risks
    - Learn about industry use cases on securing IoT
  • What You Need to Know: OCR Guidance on Patient Access
    What You Need to Know: OCR Guidance on Patient Access Chris Apgar, CISSP; CEO & President, Apgar & Associates; Bud Walder, Vice President Sales & Marketing DataMotion Recorded: Nov 8 2017 63 mins
    In this webinar, security and privacy expert Chris Apgar will delve into the recent guidance issued by OCR (Office of Civil Rights) on patients’ right to access their health information, parsing out what you need to know to not only meet HIPAA requirements, but also engage and serve the patient.
    The HIPAA Privacy Rule requires health care providers and plans to give individuals the ability to view and receive copies of their medical and health records as well as make their medical record available to third parties. But what does this mean for providers? During the webinar, Apgar will brief you on:
    •Scope of Information included / excluded
    •Timeliness, fees and costs
    •Form, format and manner of access
    •Right to request providers send medical records to a third party
    •Denial of access
    •Steps to take now

    Who should attend:CIO, CISO, Data Security and Compliance Officers and Staff
  • 2017 Global PKI Trends: PKI at the Crossroads
    2017 Global PKI Trends: PKI at the Crossroads Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute and John Grimm, Sr Director of Security Strategy, Thales e-Security Recorded: Nov 8 2017 62 mins
    PKI (public key infrastructure) has quietly become one of the most critical assets for enterprises today. Our 2017 study, conducted by the Ponemon Institute and sponsored by Thales e-Security, reveals an increase in the number of applications that use digital certificates, that enterprises are investing in fortifying the security posture of their PKIs, and that the IoT is the next game-changer for the future of PKI.

    Join this webcast to learn about the top findings of this research, including:

    • The increasing influence of the IoT in PKI planning
    • The increasing security maturity of enterprise PKIs including the use of Hardware Security Modules
    • Identification of enterprise applications that commonly depend on PKI credentials
    • The ongoing challenges associated with PKI deployment and management
  • Executive Survey -- Drivers for Deploying Speech Analytics
    Executive Survey -- Drivers for Deploying Speech Analytics Dan Miller, Lead Analyst, Opus Research; Derek Top, Research Director, Opus Research; Uniphore Recorded: Nov 8 2017 48 mins
    In the second year of a global tracking study, Opus Research presents findings from a survey of 500 business decision-makers to understand their perspectives in evaluating and deploying Speech Analytics platforms and services.

    This study, commissioned by Uniphore, documents critical datapoints in the perceived value of Speech Analytics and its impact on contact center operations, compliance and regulation, workforce optimization, customer experience and delivering a return on investment.

    Attendees to this webinar will receive a complimentary copy of the report “Executive Survey: Drivers for Deploying Speech Analytics (2017 Edition)."

    On Wednesday, November 8th (8:30 PM IST | 11 AM EST | 8 AM PST), join Dan Miller, lead analyst & founder at Opus Research, Derek Top, director of research with Opus Research, and representatives from Uniphore, as they unveil the key findings from this definitive report on speech analytics.
  • Rethinking Data Security in a Zero Perimeter World
    Rethinking Data Security in a Zero Perimeter World Eric Ogren 451 Research and Bharath Vasudevan Forcepoint Recorded: Nov 8 2017 58 mins
    IT’s desire to become more nimble and agile has resulted in the rapid adoption of cloud delivered applications. This is not limited to the heavy hitters like salesforce.com for CRM or Office 365 for productivity. There are also applications servicing tasks and functions organizations might choose to outsource. The result is critical data spread across a vast array of resources, both on and off premise. Many organizations may use built-in cloud security functionality on top of their individual legacy deployments. However, this leads to silos of capability, mismatched policies, and noise in the form of alerts needing to be addressed.

    Join Forcepoint and 451 Research as we address how taking a human-centric, risk adaptive approach can transform data security programs.
  • Edge Computing & Micro Data Centers
    Edge Computing & Micro Data Centers Don Byrne, Metrix411; Phillip Marangella, EdgeConneX; Limor Schafman, TIA Recorded: Nov 8 2017 75 mins
    The high speeds expected from future 5G networks and the demands of dense data over those networks is leading to communications network densification. Data centers, a key component of high speed delivery, are redefining their role, becoming a part of the fog and moving increasingly to the edge. This webcast will cover the role micro data centers will play in community network communications infrastructure; their configuration and structure; use of artificial intelligence and virtualization; control systems and operations; and workforce needs.

    >> Don Byrne, Managing Director, Metrix411
    >> Phillip Marangella, VP of Business Development, Cloud and IoT Solutions, EdgeConneX

    NOT BICSI accredited.
  • API Orchestration & Choreography: Why It Matters for Digital Business
    API Orchestration & Choreography: Why It Matters for Digital Business Leon Stigter, Integration Product Management & Strategy, TIBCO Software, Inc. Recorded: Nov 7 2017 40 mins
    APIs are generally referred to as a way to access a specific piece of data or business logic. But what if you need to compose APIs into flows that externally expose a business process with more complex data manipulation requirements?

    In many cases, this functionality already exists in SOAP services or ESB functionality, but requires repurposing and updating to a more modern REST approach. Digital business applications often require melding of existing functionality with new capabilities, a convergence of old and new.

    Attend this webinar to learn:

    - Why choreography and orchestration matter in an API architecture
    - How service decomposition can be applied
    - How to maximize reuse of existing APIs to reduce time to market
    - How both orchestration and choreography are handled by TIBCO Mashery® Enterprise
  • Security Briefings Part 3: Compliance Checkup - HIPAA & the Cloud
    Security Briefings Part 3: Compliance Checkup - HIPAA & the Cloud Rich Campagna, CEO, Bitglass; Brandon Dunlap, Brightfly Recorded: Nov 2 2017 61 mins
    Organizations in the healthcare industry handle data more sensitive (and valuable) than that of companies in perhaps any other sector. Because of this, those organizations need to demonstrate a heightened standard of data security and privacy. To ensure this, the U.S. has enacted the Health Insurance Portability and Accountability Act of 1996 (HIPAA). While use of the cloud affords organizations greater efficiency, it also complicates issues of security and regulatory compliance. But the good news is that solutions that enable cloud and security are available. Join Bitglass and (ISC)2 on November 2, 2017 at 1:00PM Eastern to learn about the requirements of HIPAA and the specific security capabilities that healthcare firms need in order to meet compliance requirements.
  • CA PAM 3.0.1 - What's New
    CA PAM 3.0.1 - What's New Mike Dullea, Senior Director of Product Management for PAM. CA Technologies Recorded: Nov 2 2017 39 mins
    The recently updated CA Privileged Access Manager provides a simple, secure, and scalable Privileged Access Management capability that organizations can use to meet their current and evolving needs. The release includes:

    • Graphical redesign of the user interface to provide consistency, improved usability and a modernized look
    • New management console to offer greater visibility into clustered environments for large multi-department and Managed Service Provider (MSP) environments
    • Augmented session recording, encryption and crypto module enhancements to support deployments of all sizes
    • And more

    Please join Mike Dullea, Senior Director of Product Management for PAM at CA Technologies, as he guides you through many of the new use cases in this release and demonstrates the enhanced user experience.