Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • Trust But Verify: Mobile App Protection Best Practices - Arxan AppSec Series 3/3
    Trust But Verify: Mobile App Protection Best Practices - Arxan AppSec Series 3/3 Chris Stahly, Arxan Senior Security Architect | Deborah Clark McGinn, Arxan VP of Marketing Recorded: May 24 2018 59 mins
    Traditional network and app security approaches are no longer sufficient to protect high-value apps running in untrusted environments. Knowing the status of apps running in the wild and whether they are under attack is key to responding to the ever changing threat landscape. Visibility into when, how and from where an attack is happening, and the ability to optimize your response in real time can mean the difference between stopping a threat before it spreads or picking up the pieces after the fact.

    In part three of our application security series, we’ll share best practices for app protection and mitigation, plus how Arxan’s comprehensive app protection and alerting capabilities can help prevent reverse engineering, code tampering, IP theft, and help level the playing field with attackers.
  • Digital Workplace
    Digital Workplace Aruba, a Hewlett Packard Enterprise company Recorded: May 24 2018 3 mins
    Are BYOD and IoT stressing your network? See how Aruba can help you build the mobile-cloud network of the future.
  • Does it matter if an algorithm can't explain how it knows what it knows?
    Does it matter if an algorithm can't explain how it knows what it knows? Beau Walker, Founder, Method Data Science Recorded: May 24 2018 34 mins
    With the General Data Protection Regulation (GDPR) becoming enforceable in the EU on May 25, 2018, many data scientists are worried about the impact that this regulation and similar initiatives in other countries that give consumers a "right to explanation" of decisions made by algorithms will have on the field of predictive and prescriptive analytics.

    In this session, Beau will discuss the role of interpretable algorithms in data science as well as explore tools and methods for explaining high-performing algorithms.

    Beau Walker has a Juris Doctorate (law degree) and BS and MS Degrees in Biology and Ecology and Evolution. Beau has worked in many domains including academia, pharma, healthcare, life sciences, insurance, legal, financial services, marketing, and IoT.
  • Aruba's hospitality solution
    Aruba's hospitality solution Aruba, a Hewlett Packard Enterprise company Recorded: May 24 2018 3 mins
    With the average hotel guest bringing in 3 devices each, fast, always-on Wi-Fi is critical to keeping guests happy. Aruba’s technology powers the biggest airports, stadiums and hospitality venues in the world so we deliver capacity in the highest density environments, including hotel properties.
  • Human Factor 2018 - Cryptocurrencies, Ransomware and Cloud Based Attacks
    Human Factor 2018 - Cryptocurrencies, Ransomware and Cloud Based Attacks Adenike Cosgrove, Cybersecurity Strategist and Davide Canali, Senior Threat Analyst Recorded: May 24 2018 44 mins
    ‘The human factor’—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.

    Join our speakers, Adenike Cosgrove and Davide Canali, as they discuss the findings from our Human Factor 2018 report. We’ll talk through the many ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users.

    During the webinar, we’ll cover:
    -- Trends in volume and type of attack providing useful insights for both defenders and organizations.
    -- Ransomware and Email Fraud - how effective have they become and who is being targeted the
    most.
    -- How bad actors are using cloud services to their benefit
    -- Live Q&A with the speakers
  • Mobile App Reverse Engineering is easier than you think: Arxan AppSec Series 2/3
    Mobile App Reverse Engineering is easier than you think: Arxan AppSec Series 2/3 Chris Stahly, Arxan Senior Security Architect | Deborah Clark McGinn, Arxan VP of Marketing Recorded: May 23 2018 57 mins
    Everyone knows that high-value mobile applications like banking or payment apps can be the gateway to a treasure trove of sensitive information. What most organizations may not understand, however, is just how easy it is to reverse engineer applications after they’ve been deployed to an app store, using freely available tools. In part two of our application security series, Arxan Senior Security Architect Chris Stahly will demonstrate how easily an attacker can gain access to IP, customer data, and even encryption keys if a high-value app is not properly protected. We’ll discuss ways to improve mobile app security, reduce threat response times and minimize the impact of an attack using real-time threat intelligence.
  • Accudata + Forcepoint Security Series | Risk-Adaptive Protection
    Accudata + Forcepoint Security Series | Risk-Adaptive Protection Bharath Vasudevan, Senior Director Recorded: May 23 2018 30 mins
    What comes to mind when you hear “decision making based on calculated behavioral analytics”? It’s a pretty exciting concept–one that’s new to cyber security and one that Forcepoint does very well. Join our webinar to learn how risk-adaptive protection is helping organizations:

    - Continually improve security effectiveness through machine learning and AI
    - Better understand risky behavior
    - Automate policies
    - Dramatically reduce the quantity of alerts
    - Streamline and accelerate investigation of those alerts

    Tune in May 23!
  • Semantic AI: Bringing Machine Learning and Knowledge Graphs Together
    Semantic AI: Bringing Machine Learning and Knowledge Graphs Together Kirk Borne, Principal Data Scientist, Booz Allen Hamilton & Andreas Blumauer, CEO, Managing Partner Semantic Web Company Recorded: May 23 2018 64 mins
    Implementing AI applications based on machine learning is a significant topic for organizations embracing digital transformation. By 2020, 30% of CIOs will include AI in their top five investment priorities according to Gartner’s Top 10 Strategic Technology Trends for 2018: Intelligent Apps and Analytics. But to deliver on the AI promise, organizations need to generate good quality data to train the algorithms. Failure to do so will result in the following scenario: "When you automate a mess, you get an automated mess."

    This webinar covers:

    - An introduction to machine learning use cases and challenges provided by Kirk Borne, Principal Data Scientist at Booz Allen Hamilton and top data science and big data influencer.
    - How to achieve good data quality based on harmonized semantic metadata presented by Andreas Blumauer, CEO and co-founder of Semantic Web Company and a pioneer in the application of semantic web standards for enterprise data integration.
    - How to apply a combined approach when semantic knowledge models and machine learning build the basis of your cognitive computing. (See Attachment: The Knowledge Graph as the Default Data Model for Machine Learning)
    - Why a combination of machine and human computation approaches is required, not only from an ethical but also from a technical perspective.
  • 2018 Ponemon Institute Study on Application Security: Arxan AppSec Series 1/3
    2018 Ponemon Institute Study on Application Security: Arxan AppSec Series 1/3 Dr. Larry Ponemon, Ponemon Institute Chairman & Founder | Deborah Clark McGinn, Arxan VP of Marketing Recorded: May 22 2018 59 mins
    Data breaches caused by unprotected applications affected nearly 75% of companies in a recent global survey, yet a majority of these companies admit they don’t adequately invest in app security until after they’ve suffered significant losses. Join Arxan and the Ponemon Institute for part one of our application security insights series, where we’ll share the results of the 2018 Study on Application Security. This survey of nearly 1,400 IT and IT security practitioners from around the world examines the risk unprotected applications pose to businesses, and how companies are addressing those risks.

    During part 1 of this webinar series, we’ll cover:
    •The impact of cyberattacks and data breaches on unsecured mobile applications
    •Global trends on application security investments and spending
    •Insights to improve application security posture, including the use of threat intelligence data
  • Quality and Testing SIG Talk Series - Tips & Tricks (Complete Edition)
    Quality and Testing SIG Talk Series - Tips & Tricks (Complete Edition) Ramesh Subramaniam, Ricardo Garza Recorded: May 22 2018 54 mins
    Speaker: Ramesh Subramaniam
    Micro-focus Project and Portfolio Management (PPM) Logging Tips and Tricks: Learn how to get the most out of your logging.conf, discuss logger names per the Micro Focus PPM functional domain and see how creating separate nodes will increase performance.

    Speaker: Ricardo Garza
    AI FIRST Project Management: How we Augment Project and Portfolio Managers with Micro Focus PPM and Artificial Intelligence: Right now, there is a lot of hype around Artificial Intelligence and Machine Learning; these technologies are going to profoundly disrupt every industry and make most applications SMART in the next 5 years. We have built AI aides around our PPM implementation in order to augment our Project and Portfolio Managers as well as Project Team Members. These tools help them to be more productive and have consistent results. We will Demo some of these features live, and discuss implementation challenges and future work.
  • Outsourcing Core IT When You Are Core IT
    Outsourcing Core IT When You Are Core IT Hyoun Park Recorded: May 17 2018 28 mins
    How do you know if you are outsourceable? And how can you guide the outsourcing without simply being replaced?

    This webinar takes the analyst's experiences in IT, examples from current IT organizations and managed mobility service providers, and key trends in the IT world to show when and how to identify IT jobs ripe for outsourcing and how to position yourself to take advantage of the outsourcing rather than simply be replaced.
  • IT Ops SIG Talk Ep. 5: SiteScope the WebScript Monitor Tool
    IT Ops SIG Talk Ep. 5: SiteScope the WebScript Monitor Tool Nels Hoenig Recorded: May 17 2018 19 mins
    Web Site Monitoring using SiteScope the WebScript Monitor Tool and a LoadRunner Script

    Web Site Monitoring using SiteScope the WebScript Monitor Tool and a LoadRunner Script: Join us for this presentation of the power of a SiteScope Webscript to monitor your websites in a production environment to provide real time checking on a website including interactions ( login, screen validation, etc). Learn how this will also generate alerts to the OPS team when something is wrong.
  • Beyond the stack trace: A new approach to debugging
    Beyond the stack trace: A new approach to debugging AJ Jindal, Product Manager of Mobile & IoT, AppDynamics Recorded: May 17 2018 27 mins
    Mobile app crashes lose you revenue, loyalty, and potential customers due to poor user ratings at the App Store or Play Store.

    But stack traces, the traditional debugging method, can leave you with more questions than answers. Learn how to keep your apps healthy and customers happy by fixing crashing apps more quickly, and for good.

    This invaluable lesson on debugging apps will teach you how to:
    - Access a full context of user behavior, application flow, and code execution
    - Reduce your Mean Time to Identification of a crash issue
    - Eliminate costly trial and error, replicating, or not finding the issue at all

    ​The health of your apps is too important to your business to pass up these valuable tips. Register now.
  • Accudata's White-Hat Files | May 2018 Edition
    Accudata's White-Hat Files | May 2018 Edition Josh Berry, CISSP & OSCP, Principal Consultant for Risk & Compliance Recorded: May 17 2018 16 mins
    Welcome to the White Hat Files – a monthly series where the best white hat hackers give you what you need to know about the threat landscape.

    Our first White Hat File comes from Josh Berry, who holds OSCP, CISSP, and GIAC certifications.
    In this 15-minute webinar, he’ll give you the rundown on Accudata’s most-seen vulnerabilities, as well as best practices you can use to defeat attackers looking to dissect and destroy your business.

    Join us for our next edition in June! Register here: https://www.brighttalk.com/webcast/16347/322209?utm_source=Accudata+Systems&utm_medium=brighttalk&utm_campaign=322209
  • IT Ops SIG Talk Ep. 6: Surviving OMW to OMi Migration
    IT Ops SIG Talk Ep. 6: Surviving OMW to OMi Migration Bogdan Vosnjak Recorded: May 17 2018 36 mins
    Surviving OMW to OMi Migration

    Surviving OMW to OMi Migration: The customer with a well-developed OMW-based monitoring solution was faced with a challenge to migrate to OMi10 due to OMW obsolescence. Their old monitoring system was deeply integrated, highly customized and exposed to the outside world (their partners and customers) on a 24/7 basis. Migration challenges included:

    Migration of event sources (OM agents, SNMP Trap sources, NNMi, SiteScope)
    Migration of Service models with complex propagation/calculation rules
    Migration of customized Incident ticketing integration (Service Manager)
    Migration of custom applications (event archive, Service availability web portal, downtime management)
    Minimum downtime during migration

    In this presentation, attendees will learn how these challenges were addressed and ultimately overcome.
  • Verizon Risk Report - Streamline Security with Actionable Insights
    Verizon Risk Report - Streamline Security with Actionable Insights Katie Crammer, Director, Verizon Global Security Solutions Recorded: May 17 2018 39 mins
    Please join Katie Crammer, Director of Global Security Solutions as she provides an in-depth conversation about a new powerful tool to help enterprises quantify cyber risk and ROI.

    Enterprises routinely struggle to correlate security-related costs with cyber risks and have difficulty determining their security ROI and measuring their security posture. The Verizon Risk Report provides a comprehensive, automated, 360-degree security risk posture assessment, updated daily. The report provides a security score by measuring outside security posture against peers, evaluates control effectiveness, exposes gaps, weaknesses and associated risks, yielding actionable recommendations for mitigating real and likely risks.
  • IT Operations SIG Talk Series: SiteScope & OMi  (Complete Edition)
    IT Operations SIG Talk Series: SiteScope & OMi (Complete Edition) Nels Hoenig, Bogdan Vosnjak Recorded: May 17 2018 60 mins
    This Vivit SIG Talk session will feature speakers who will share their vast knowledge and experience on SiteScope and OMi. Vivit is excited to present this informative SIG Talk on these important topics.

    Shown below is an outline of the agenda and topics:

    Speaker: Nels Hoenig
    Web Site Monitoring using SiteScope the WebScript Monitor Tool and a LoadRunner Script: Join us for this presentation of the power of a SiteScope Webscript to monitor your websites in a production environment to provide real time checking on a website including interactions ( login, screen validation, etc). Learn how this will also generate alerts to the OPS team when something is wrong.

    Speaker: Bogdan Vosnjak
    Surviving OMW to OMi Migration: The customer with a well-developed OMW-based monitoring solution was faced with a challenge to migrate to OMi10 due to OMW obsolescence. Their old monitoring system was deeply integrated, highly customized and exposed to the outside world (their partners and customers) on a 24/7 basis. Migration challenges included:

    - Migration of event sources (OM agents, SNMP Trap sources, NNMi, SiteScope)
    - Migration of Service models with complex propagation/calculation rules
    - Migration of customized Incident ticketing integration (Service Manager)
    - Migration of custom applications (event archive, Service availability web portal, downtime management)
    - Minimum downtime during migration

    In this presentation, attendees will learn how these challenges were addressed and ultimately overcome.
  • 2018 Global Encryption Trends:  The Effects of Multi-Cloud Use and Compliance
    2018 Global Encryption Trends: The Effects of Multi-Cloud Use and Compliance Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute and John Grimm, Sr. Director of Security Strategy, Thales eSecurity Recorded: May 17 2018 61 mins
    In today’s environment data protection is more critical than ever and businesses are responding. This 13th edition of the Global Encryption Trends Study, conducted by the Ponemon Institute and sponsored by Thales eSecurity, reveals how increased cloud use and accelerated compliance initiatives are driving adoption of new encryption strategies. Join Dr. Larry Ponemon and John Grimm to learn about some of the top findings in this year’s Global Encryption Trends Study, including:

    • Growth in encryption and Hardware Security Module (HSM) usage
    • The importance of performance, scalability and consistent policy enforcement across enterprise and cloud use cases for encryption solutions
    • Trends in encryption deployment across multiple vertical markets and geographies that are useful for benchmarking
  • New Design Principles for Measuring Customer Satisfaction
    New Design Principles for Measuring Customer Satisfaction Dr. René Degen, Co-Founder at Comparable and Former Director of Services - Miele and Jeroen Peters, Co-Founder at Comparable Recorded: May 16 2018 46 mins
    In this webinar, Jeroen Peters and René Degen, of Comparable B.V. will propose the following:Customer satisfaction surveys is a dead end street, why you may not want to use the NPS score anymore, Customer Satisfaction Score is probably not the most meaningful measurement, new design principles for future customer satisfaction measurements, Using your service engineer as an information source.
  • Verizon Threat Research Advisory Center - Monthly Intel Briefing
    Verizon Threat Research Advisory Center - Monthly Intel Briefing John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: May 16 2018 73 mins
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Mobile Security Index 2018 Highlights

    Our Verizon Threat Research Advisory Center presenters will be:

    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •John Pernini, Security Consultant, Investigative Response – Americas
    •Roy Porter, Senior Analyst, Threat Intelligence

    This month we'll be covering mobile device security threats by featuring the Verizon Mobile Security Index (MSI) 2018. Mobile devices are an appealing target—there are more of them, they have access to more data, and they are critical to business operations. The MSI includes recommendations that can help strengthen your organization's mobile device security, to include security measures for your network, devices, applications, and people.

    For this month's MIB, we'll highlight findings within the MSI and provide insight and recommendations from our investigations and threat intelligence to help you improve your mobile device security and response posture.

    Following the MSI highlights, we'll cover the following topics:

    •Current Intelligence
    •Latest Malware Trends
    •Attacks and Threat Indicators
    •Significant Vulnerabilities

    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Harnessing Contactless Payments to Drive New Growth Opportunities in LATAM
    Harnessing Contactless Payments to Drive New Growth Opportunities in LATAM Adrian Drozd, Frost & Sullivan, Joe Santana, FIME, Marcelo de Oliveira,Visa Recorded: May 15 2018 61 mins
    Digital transformation has disrupted the payments ecosystem. Recent technology innovations around contactless payment have transformed the payment industry by providing concrete advantages and benefits to both merchants and consumers. Applying contactless functionality to traditional payment cards can enable a better customer experience based on convenience and ease of use. Furthermore, by promoting contactless payment, merchants can improve their operational efficiency through faster digital transactions that reduce payment times. The infrastructure deployed to process contactless payments must be certified and aligned with the latest security standards to ensure success.

    Key Takeaways:
    · Understand the recent specifications and requirements published for Latin America
    · Hear about the new Visa deadline regarding contactless implementation
    · Find out how your organization can derive competitive advantage by embracing contactless payments
    · Discuss expected industry transformation with key industry stakeholders
  • 451 Research and Gemalto present "MSPs - Maximizing ROI with Security"
    451 Research and Gemalto present "MSPs - Maximizing ROI with Security" Gary Marsden, Senior Director of Data Protection Solutions at Gemalto and William Fellows, Research VP 451 Research Recorded: May 15 2018 60 mins
    Digital transformation is a critical part of an enterprise business strategy. However, for many organizations, having more digital assets introduces major headaches due to the complexity of technologies, the lack of available and affordable skills and the ever-changing security threat landscape. The ability to use cloud based solutions to service digital strategies is helping reduce costs but is also increasing risks, isolating data and reducing controls.

    Many MSPs have recognized this as an opportunity and are building business plans and service strategies to help their customers. Being the one-stop shop for applications, cloud services and related security aspects is a path that is actively being trodden by MSP’s, MSSP’s and traditional resellers alike. According to 451 Research, it is about a “sell with” approach by addressing business requirements with security “built-in”. In this joint webinar, our guest William Fellows, 451 Research analyst will provide new research results this related data points and discuss how the cloud is creating opportunities as well as challenges. The interactive Q&A style webinar will cover:

    • A current view of the cloud’s impact on digital transformation
    • Opportunities for MSPs to expand service portfolios and generate new revenue streams
    • What a true “sell with” partnership looks like
    • Technology enabling this new sales and marketing strategy for MSPs

    Presenters:
    William Fellows is a co-founder of The 451 Group. As VP of Research, he is responsible for the Cloud Transformation Channel at 451 Research.

    Gary Marsden: Senior Director of Partnerships at Gemalto
  • GDPR compliance on mobile devices, how secure is your organization?
    GDPR compliance on mobile devices, how secure is your organization? Aaron Cockerill, Chief Strategy Officer, Lookout May 29 2018 11:00 am UTC 60 mins
    Since 25 May, the General Data Protection Regulation (GDPR) is now officially enforceable. By now, most of the companies dealing with data should have taken the necessary steps to comply with the regulation and stay out of trouble. And this is all good but, have you thought about how your employees are using their mobile phones or devices to access your company data? How do you protect your organization from an employee's phone being hacked? The risk of GDPR fines & brand reputation damage has made the security of personal data on mobile an urgent priority for CISOs, and executive boards.

    By popular demand, we're replaying this webinar hosted by Aaron Cockerill, Chief Strategy Officer at Lookout and his guest, Kabir Barday, CEO at OneTrust.

    On the agenda:
    - Why mobile is a problem for GDPR compliance
    - Understanding the threats & risks to GDPR compliance from mobile
    - Finding & stopping mobile threats to GDPR compliance

    Did you know?

    84% of security & IT executives say personal data accessed on employee mobile devices could put their company at risk for GDPR noncompliance.

    31% of enterprise employees that have a title of Vice President or higher say their mobile devices have been hacked or compromised.

    63% of enterprise employees say they access their organization's customer, partner, data and employee data while on their mobile device.
  • How to Reduce Excessive Access for Highly Privileged Users
    How to Reduce Excessive Access for Highly Privileged Users Naresh Persaud, Senior Director of Security at CA Technologies May 31 2018 5:00 pm UTC 60 mins
    Adopting privileged access management typically means forcing users to use named accounts instead of root and administrator accounts. As a result, the volume of privileged "named user" accounts in the enterprise is increasing. Fortunately, with effective role management and certification review, organizations can streamline and reduce excessive access.

    Join Naresh Persaud, Senior Director of Security at CA Technologies as he explains the challenge of privileged user governance, explores solutions, and presents a demo on how to manage privileged "named users."
  • Der Faktor Mensch 2018 – aktuelle Proofpoint Forschungsergebnisse
    Der Faktor Mensch 2018 – aktuelle Proofpoint Forschungsergebnisse Markus Grüneberg, Senior Cyber Security Strategist, Proofpoint Jun 5 2018 8:00 am UTC 60 mins
    Proofpoint hat seinen neuen Faktor Mensch Bericht für das Jahr 2018 veröffentlicht, der untersucht, wie Bedrohungsakteure ihre Herangehensweisen mit Social Engineering und ausgeklügelten Angriffen verfeinern, die selbst versierte Benutzer regelmäßig täuschen.

    Melden Sie sich jetzt zu unserem Live-Webcast Der Faktor Mensch 2018 am 5. Juni 2018 um 10:00Uhr an und informieren Sie sich über die wichtigsten Erkenntnisse des diesjährigen Berichts.
    Der jährliche Proofpoint Bericht basiert auf der Analyse von Angriffsversuchen bei mehr als 6.000 weltweiten Unternehmenskunden während des gesamten Jahres 2017 und bietet Einblicke in Angriffstrends über E-Mail, Cloud-Anwendungen und soziale Medien hinweg, um Unternehmen und Benutzern die Sicherheit zu gewährleisten.

    Themen des Berichtes:
    -Soziale Engineering: Wie Social Engineering auf den Faktor Mensch abzielt
    -Bedrohungs-Trends: Malware, Phishing und E-Mail-Betrug: Dropbox, Docusign & Co
    -Trends zu gezielte Angriffen: Spam-Kampagnen bis zielgerichteter E-Mail-Betrugs
    -Neue digitale Risiken: Collaboration-Tools als neue Angriffsziele
    -Angriffe über Cloud Dienste: Cyberangriffe über Cloud-Dienste und -Apps
  • AI-powered location: A step closer to the future?
    AI-powered location: A step closer to the future? Peter Frans Pauwels, Co-founder, TomTom Jun 5 2018 5:00 pm UTC 60 mins
    By leveraging the power of the cloud, artificial intelligence and machine learning, mapping devices are getting smarter over time, recognizing patterns and farming insight from contextualized data. And that means smart cities and data-based Location of Things navigation is becoming a reality.

    Cities can analyze and improve congested traffic. Freight companies with connected trucks can better manage logistics, optimize fleets, and track customer engagement. And cars will learn to make split-second decisions on our behalf, making the call on turning left or hitting the breaks when it recognizes a pedestrian is in the crosswalk.

    To find out more about how cloud-based, AI-powered location technology is creating the highly accurate and always up-to-date maps that can revolutionize everything from autonomous cars to connected cities, don’t miss this VB Live event!

    In this webinar you'll learn:

    * How to leverage the power of the cloud, AI, and machine learning across devices by contextualizing location data in real time
    * Understand the role of location-based data mapping in the "Location of Things"
    * The application of data-enriched mapping to industries like retail and automotive
    * How "Location of Things" powered by geographical data can be used to connect autonomous driving, smart mobility, and smarter cities

    Speakers:
    * Chris Pendleton, Principal PM, Azure Maps
    * Peter Frans Pauwels, Co-founder, TomTom
    * Jennifer Belissent, Principal Analyst, Forrester
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by TomTom
  • LIVE DEMO - Securing your Open Banking API implementation
    LIVE DEMO - Securing your Open Banking API implementation Isabelle Mauny, CTO & Co-Founder, 42Crunch Jun 7 2018 3:00 pm UTC 60 mins
    .During this practical webinar, you will learn:
        
    1. Why TLS and OAuth2 are not enough to secure your APIs
    API Security has a much wider spectrum and even if you are using OAuth today, you may not use it in a way that is adapted to the risk taken when exposing Open banking APIs. What about API attacks protection ? PKCE ? Message confidentiality and integrity ? 

    2. Why API security must be declared and not coded
    Developers should not have to master security standards such as OAuth and OpenID Connect and try to implement them properly into their APIs. Instead, they should rely on proven, reliable policies approved by the bank’s security team and simply apply those policies on top of their APIs.

    3. How declarative security helps with consistency and automation
    42Crunch's innovative tagging mechanisms can be used by developers to express security constraints on top of their Open API definitions (aka Swagger). Those tags are translated automatically, either via the UI or in the CI/CD pipeline into policies which are applied on APIs requests/responses, making it possible to apply security as early as possible in the API lifecycle and find security vulnerabilities early.

    4. How to enforce security in a scalable way using micro-firewalls
    We will show how to deploy the 42Crunch API Firewall at run-time whether on premises, in the Cloud or in a hybrid environment and how to monitor the system through real-time security dashboards.
  • iOS 12 Preview - What You Need To Know
    iOS 12 Preview - What You Need To Know Tony Ramirez (Mobile Security Analyst), Brian Reed (CMO) Jun 12 2018 6:00 pm UTC 60 mins
    iOS 12 is anticipated to make strides in security and performance. The week after WWDC, we’ll discuss:
    + Learnings & remediations from iOS 11
    + Predictions coming out of WWDC
    + How we see the newest software update, iOS 12, affecting mobile app security testing.
  • Why IAM Built on Open-Standards is the Key to Open Banking
    Why IAM Built on Open-Standards is the Key to Open Banking Rob Otto, EMEA Field CTO, Ping Identity; Ralph Bragg, Senior Partner, RaiDiAM Jun 13 2018 9:00 am UTC 60 mins
    Security, Compliance and User Experience - Why Identity Access Management Built on Open-Standards is the Key to Open Banking

    Learn how identity & access management (IAM) solutions, built on open standards, can help meet the technical requirements of PSD2 and Open Banking, including secure XS2A (access to accounts), Strong Customer Authentication (SCA), Dynamic Linking, and Consent Management, all while providing a seamless user experience and distinct competitive advantage.
  • How to Enable Trust, Interoperability, & Shared Credentials
    How to Enable Trust, Interoperability, & Shared Credentials Naresh Persaud, Senior Director Security at CA Technologies Jun 21 2018 5:00 pm UTC 60 mins
    The promise of digital identity is to remove silos; minimize redundancies; facilitate better collaboration; and shape a foundation for regulatory compliance.
    The challenge with digital identity is that it requires shared credentials that force you to deliberately assess:

    • Managing physical access
    • Protecting PII
    • Delivering cross-agency services
    • Revising digital consumer interaction

    In this session, Naresh Persaud, Senior Director Security at CA Technologies will share industry best practices to help ensure credentials are, in fact, interoperable. Plus, you’ll have a unique opportunity to explore the architectural measures that can manage identity assurance levels and identity verification for both logical and physical access.

    Implementing a digital identity strategy can be complicated. Let CA help.
  • Malware versus AI
    Malware versus AI Keith Rayle, Security Strategist, Fortinet Jun 26 2018 4:00 pm UTC 60 mins
    During this presentation, you'll learn about deep learning, the history of artificial intelligence, the history of malware management, and the current approach to eliminating malware threats to the enterprise using AI.
  • Customer Data Platforms: Sorting the Truth from the Hype
    Customer Data Platforms: Sorting the Truth from the Hype Jeff Cotrupe, Industry Director, BDA,Stratecast | Frost & Sullivan Mike Jude, Research Manager, Stratecast | Frost & Sullivan Jun 27 2018 4:00 pm UTC 75 mins
    To understand how a customer data platform (CDP) unifies customer data under one (conceptual) roof and can provide actionable analytic insights, we invite you to join Frost & Sullivan’s renowned Stratecast experts who will lead an interactive panel discussion on Customer Data Platforms: Sorting the Truth from the Hype. Hear expert insight on strategies to gather essential information about your customers in a new way that does not merely stockpile more intelligence, but enables you to analyze and act on it.

    Key Takeaways:

    • Gain insight on how to attain a higher state of business consciousness and make choice buzzword phrases such as “data-driven” and “customer-driven” a reality for your organization.
    • Understand big data and analytics (BDA) and the technology markets.
    • Learn new ways to invest wisely and know whether—and where—to place your bets on the right CDP solution.
  • How AI is changing the customer retention game
    How AI is changing the customer retention game Stewart Rogers, Analyst-at-Large, VentureBeat Jul 11 2018 5:00 pm UTC 60 mins
    Your users are like fine wine or good cheese: They get better over time. Which is why user retention is essential. With a steady retention rate your revenue just compounds over time. And increasing retention by just 10 percent will boost your business value by more than 30 percent.

    That’s where artificial intelligence comes in. AI marketing tools let you anticipate customer needs, create personalized campaigns that make them feel seen and heard, lock on to essential customer purchasing patterns, deliver highly relevant messaging, marketing, and offers when and where they want to see them, and more. And with the volume of customer data you have at your fingertips, you can identify what characteristics make up high-value customers, so you know exactly where to put your focus.

    Learn how tapping into your oil well of data, and harnessing it via marketing automation platforms powered by AI and machine learning, can strengthen your bottom line when you join this VB Live event!.

    Register here free.

    In this webinar you'll learn:

    * Key engagement strategies using AI
    * How to use AI to strengthen campaigns (including creative, messaging, segmentation and personalization)
    * The role of time-based triggering in automation and monetization
    * The trends in automation and IoT in ecommerce

    Speakers:

    * Rachael Brownell, Moderator, VentureBeat
    * Stewart Rogers, Analyst-at-Large, VentureBeat

    More speakers coming soon!

    Sponsored by Clevertap
  • Architecting an Open Source Data Science Platform: 2018 Edition
    Architecting an Open Source Data Science Platform: 2018 Edition David Talby, CTO, Pacific AI Oct 23 2018 5:00 pm UTC 60 mins
    Join David Talby of Pacific AI as he updates the best practices and techniques for building an open source data science platform.