Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • Three reasons to choose Citrix Workspace over VMware Workspace ONE
    Three reasons to choose Citrix Workspace over VMware Workspace ONE Amandeep Nagra, Sr. Product Marketing Manager, Workspace services, Citrix Recorded: Jul 18 2018 57 mins
    Join Amandeep Nagra, Sr. Product Marketing Manager, Workspace services as he explores Why Citrix Workspace wins vs Workspace ONE.

    With more IT resources moving to the cloud and a greater mobile workforce, you need to deliver a secure digital perimeter with a framework that enables greater user productivity, security, and IT management flexibility. This webinar shares why customers choose an integrated Workspace that maintains user context through apps, files and desktops across networks. Citrix Workspace offers a unified user and admin experience.

    Some of Citrix Workspace key advantages include:
    • Higher user productivity and a better experience
    • Stronger security which extends to the cloud
    • joe Greater flexibility to manage apps, data and devices for any on-prem, cloud or hybrid scenario

    Machine learning based user behavioral analytics that feeds from Citrix product analytics and constantly refines the “normal” user behavior to proactively prevent compromised users from accessing corporate data
  • Verizon Threat Research Advisory Center - Insider and Privilege Misuse
    Verizon Threat Research Advisory Center - Insider and Privilege Misuse David Kennedy and John Rudolph, Verizon Global Security Recorded: Jul 18 2018 79 mins
    Leverage Threat Intelligence where it matters most.

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Insider and Privilege Misuse

    Our Verizon Threat Research Advisory Center presenters will be:

    • John Rudolph, Principal Consultant, Identity and Access Management
    • Steve Atnip, Senior Analyst, Threat Intelligence
    • David Kennedy, Managing Principal, Open Source Intelligence
    • Laurance Dine, Managing Principal, Investigative Response – EMEA

    For this month's theme of 'Insider and Privilege Misuse' we'll feature John Rudolph, Principal Consultant, Identity and Access Management who'll discuss insider threat motivations, common denominators, and countermeasures, to include the Zero Trust approach. We'll then touch base on the IR Pulse and trends in our caseload, followed by:

    • Current Intelligence
    • Attacks & Threat Indicators
    • Latest Malware Trends
    • Significant Vulnerabilities
  • Attacker’s Advantage - Understand How & Why Cyberattackers Beat Your Defence
    Attacker’s Advantage - Understand How & Why Cyberattackers Beat Your Defence Robert Healey, Senior Director Marketing, Asia Pacific, Tenable Network Security Recorded: Jul 18 2018 60 mins
    In its inaugural report, Tenable Research explores who has the first-mover advantage – cyber criminals or security teams? What’s the difference in time between when an exploit is publicly available for a given vulnerability and the first time that security teams actually assess their systems? And why does this even matter to your organization?

    The research team analyzed the 50 most prevalent critical and high-severity vulnerabilities from just under 200,000 vulnerability assessment scans over a three-month period. What did they find?

    Alarmingly, all too often, the attackers have the advantage. On average, they have a seven-day head start on defenders. Threat actors are sprinting ahead, exploiting vulnerabilities before security teams have even left the starting blocks – before businesses even know they’re at risk.

    Join Tenable and (ISC)² on Jul 18, 2018 (Wed) at 14:00 (Singapore Time) to understand how and why cyber attackers are beating your defence.

    Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
    Moderator: Tony Vizza, CISSP Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Integrate your Micro Focus IT Operations into a Single Pane of Glass 4D Solution
    Integrate your Micro Focus IT Operations into a Single Pane of Glass 4D Solution Ed Willhide Recorded: Jul 12 2018 59 mins
    edgeSuite is a fully secure, system control plane that integrates your applications and data into SPoG (Single Pane of Glass) in a 4D solution. edgeSuite is unique in the marketplace because it incorporates the data within your environment, and the methods used to manage your business to create a single tool for both back-end and front-end solutions. When you are dealing with multiple data sets and multiple data sources, you are faced with the problem of complex navigation of different software solutions, and the inability to access them simultaneously in an efficient and effective way. Come to our webinar and learn how you can optimize your current Micro Focus investments. Seeing is believing!

    What you will learn:

    •How our ETV technology collects data for visualization and actionable response
    •How our Click-to-Write-Back and Click-to-Navigate technologies streamline operations over your digital transformation suite
    •How to create Role-Based views
    •How a Single Pane of Glass solution is built
  • How AI is changing the customer retention game
    How AI is changing the customer retention game Kara Dake, VP Growth & Partnerships, Clevertap Recorded: Jul 11 2018 61 mins
    Your users are like fine wine or good cheese: They get better over time. Which is why user retention is essential. With a steady retention rate your revenue just compounds over time. And increasing retention by just 10 percent will boost your business value by more than 30 percent.

    That’s where artificial intelligence comes in. AI marketing tools let you anticipate customer needs, create personalized campaigns that make them feel seen and heard, lock on to essential customer purchasing patterns, deliver highly relevant messaging, marketing, and offers when and where they want to see them, and more. And with the volume of customer data you have at your fingertips, you can identify what characteristics make up high-value customers, so you know exactly where to put your focus.

    Learn how tapping into your oil well of data and harnessing it via marketing automation platforms powered by AI and machine learning can strengthen your bottom line when you join this VB Live event!

    In this webinar you'll learn:

    * Key engagement strategies using AI
    * How to use AI to strengthen campaigns (including creative, messaging, segmentation and personalization)
    * The role of time-based triggering in automation and monetization
    * The evolving trends in marketing automation and omnichannel marketing

    Speakers:
    * Kara Dake, VP Growth & Partnerships, Clevertap
    * Aditi Mohanty, Digital Marketing Manager, Vodafone
    * Rachael Brownell, Moderator, VentureBeat
    * Stewart Rogers, Analyst-at-Large, VentureBeat

    Sponsored by Clevertap
  • Integrating Secure Message Features Results in Happy Customers
    Integrating Secure Message Features Results in Happy Customers DataMotion Recorded: Jul 10 2018 1 min
    Financial services customers want to interact with you securely, in multiple ways - whether through a mobile or enterprise app or on your customer portal. This short video briefly describes how to integrate secure message features and bring everything together for your customer.
  • Migrate PC & Mobility with Unified Endpoint Management
    Migrate PC & Mobility with Unified Endpoint Management Suzanne Dickson Sr. Dir. Product Marketing, Mobility Citrix; Amandeep Nagra Sr. Product Marketing Manager, Citrix Recorded: Jul 9 2018 53 mins
    Windows 10 and the proliferation of BYO devices introduced into the workforce has transformed the digital workspace and forced organizations to evolve from traditional client management tools. Embrace unified endpoint management (UEM) to solve the challenges of managing PC, IoT and mobile devices with a centralized solution to manage and secure endpoints.

    Register for this webinar to hear from Suzanne Dickson, Sr. Director, Product Marketing and Citrix Workspace Product Marketing Expert, Amandeep Nagra on how to manage and secure your endpoints.

    This session will address how UEM helps solve challenges of traditional client management in the context of the new digital workspace. Learn more about:

    • UEM and how it fits into a Digital Workspace
    • Managing endpoints through Citrix UEM
    • The future of Citrix UEM
  • Four Practical Ways Cloud Simplifies Managing Apps, Devices, and Data
    Four Practical Ways Cloud Simplifies Managing Apps, Devices, and Data Vishal Ganeriwala Sr. Director, Workspace Marketing, Citrix Recorded: Jun 28 2018 35 mins
    Traditionally, apps, desktops, devices and data are all managed through different systems, which is complex and time-consuming. Unifying management as cloud services with a single control plane improves the delivery and management of the apps and data employees need. Citrix delivers a complete, secure digital workspace.

    Join this webinar to learn more about how managing apps, desktops, devices and data with Citrix Workspace is:

    • Fast: Deploy apps and desktops, or complete secure digital workspaces in hours, not weeks.
    • Simple: Implement a fully-integrated portfolio via a single-management plane to simplify administration.
    • Adaptable: Choose to deploy on any cloud or virtual infrastructure — or a hybrid of both.
    • Secure: Keep all proprietary information for your apps, desktops and data under your control.
  • Why an Operational Data Layer is Critical for Open Banking
    Why an Operational Data Layer is Critical for Open Banking Richard Henderson Recorded: Jun 28 2018 52 mins
    Innovative banking applications and comprehensive, instant insight into customer interactions are critical to competing in today’s disruptive competitive landscape. Not only do customer expectations continue to grow, but payment infrastructure evolution and compliance requirements mean access to highly contextual, real-time data is no longer a nice to have - it’s a must have.
    Don’t miss this chance to hear from Richard Henderson at DataStax around how an operational data layer can meet the distributed, real-time, always available demands of the enterprise. Join live to hear real case examples of customers using DataStax Enterprise, the data management platform trusted by 9 out of the top 15 global banks.
  • The Role of API Management in Digital App Strategies
    The Role of API Management in Digital App Strategies Carl Lehmann of 451 Research & Sumit Sarkar of Progress Software Recorded: Jun 27 2018 58 mins
    Hyper-competition and digital-first initiatives are forcing organizations to reconsider how they do business. ‘Digital transformation’ has emerged to engage customers, improve efficiencies, and fend off threats from rivals. It’s driving the need to rethink application design that delivers information in context and automates tasks that must behave consistently across diverse mobile devices and all digital touchpoints. Common approaches include cloud-first and mobile-first strategies that accelerate the use of cloud services but also often forces an unwieldy redistribution of workloads across hybrid IT infrastructure.

    APIs have emerged as integration enablers, and API management is now integral to IT and development discipline. But APIs are only part of a broader toolchain needed to deliver web and mobile apps. Emerging cloud-native app platforms for hybrid infrastructure represent the next-generation enabling technology needed by enterprises that seek transformative means to engage customers and craft new competitive advantages.

    In this webinar Carl Lehmann, principal analyst at 451 Research and Sumit Sarkar, chief researcher at Progress will discuss the business and technical considerations for API management within a broader context of application strategies and hybrid IT integration by:
    • Describing digital transformation and how it is used to create competitive advantage
    • Identifying the critical technology enablers needed for execution
    • Defining the role of APIs as accelerants to new ways of doing business
    * Planning for rapid delivery of new application experiences in response to digital transformation
    * Understanding backend requirements for web and mobile app delivery beyond API Management

    AppDev, DevOps, integration and API development professionals alike will learn how to reconsider their development strategies and integration toolchains to become core enabling assets for digital transformation.
  • Legacy Modernisation: Overcoming the Transformation Barriers
    Legacy Modernisation: Overcoming the Transformation Barriers Simon Ratcliffe, Principal Consultant, Ensono, Kevin Stoodley, CTO, IBM Z Series, & Alex Hilton, CEO, CIF Recorded: Jun 27 2018 58 mins
    A recent survey conducted by Ensono, in partnership with the Cloud Industry Forum, showed that 89% of respondents believed that legacy technology was a barrier to effective digital transformation. Given that many organisations operate a complex technology landscape often with elements in different locations, and with core components that are regarded as ‘legacy but critical’, there needs to be a clear and simple approach to overcoming these obstacles.

    Breaking down the barriers requires effective change in people, process and technology to attain a viable level velocity that will enable transformation without being held back by perceptions of legacy issues.

    Examining these issues, this webinar will provide insight and thought provoking approaches for organisations seeking to transform their operations against this backdrop.
  • Achieve Your Security Goals with Inline Prevention Tools
    Achieve Your Security Goals with Inline Prevention Tools Presenter:Ian Farquhar, Distinguished Engineer, Security, Gigamon; Moderator: SC Leung, Member, Asia-Pacific Advisory Council Recorded: Jun 27 2018 61 mins
    Inline security tools operate by actively preventing threats in your network, but deploying and optimizing these tools presents several challenges to both network and security engineers. The downsides can include a potential point of failure, degradation of network and application performance, difficulty to scale and upgrade. The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges. Join Gigamon and (ISC)² on Jun 27, 2018 (Wed) at 12:00 noon (Singapore Time) to examine how inline bypass can overcome physical deployment obstacles, maximize network availability, increase the scale of inspection and reduce the impact to network performance.
  • Malware versus AI
    Malware versus AI Keith Rayle, Security Strategist, Fortinet Recorded: Jun 26 2018 50 mins
    During this presentation, you'll learn about deep learning, the history of artificial intelligence, the history of malware management, and the current approach to eliminating malware threats to the enterprise using AI.
  • Demystify the cloud: Stay secure in Microsoft Office 365
    Demystify the cloud: Stay secure in Microsoft Office 365 Edward Rowley, Sales Engineering Manager and Tim Ricketts, Principal Sales Engineer Recorded: Jun 26 2018 38 mins
    Digital transformation and cloud migration brings many benefits to organisations and one of the main drivers for the rapid adoption is the cloud based email service provided by Office 365.
    While leveraging cloud services unarguably enhances productivity, it can still leave your organisation vulnerable to new risks. It is more important than ever for security professionals to ensure full protection against these new risks in real time.

    Join us as we discuss the potential threats and solutions you can implement to ensure protection and productivity. What to expect:

    --Threats: credential phishing, email fraud, targeted attacks etc
    -- Enabling secure digital transformation: people centric security at the heart of the transformation
    -- Solutions: regulatory compliance and tools to implement
  • Schutz vor modernen CEO-Fraud-Angriffen: Live-Hack und umfassende Schutzkonzepte
    Schutz vor modernen CEO-Fraud-Angriffen: Live-Hack und umfassende Schutzkonzepte Chris Wojzechowski,Security Researche,Institut für IT-Sicherheit und Markus Grünenerg, Senior Security Strategist, Proofpoint Recorded: Jun 26 2018 61 mins
    E-Mail-Betrug, auch CEO-Fraud oder BEC (Business Email Compromise) ist weit verbreitet und kostet Unternehmen Milliarden. Dabei ist ein Großteil dieser E-Mail-Angriffe vermeidbar. Diese Bedrohungen beginnen meist mit einer E-Mail, die von einer hochrangigen Führungskraft, aber auch von Partnern oder Lieferanten zu stammen scheint. Diese E-Mail weist Mitarbeiter an Gelder zu überweisen oder sensible Daten zur Verfügung zu stellen. Die Empfänger erfüllen pflichtbewusst die übertragenen Aufgaben, überweisen zb das angeforderte Geld – und lernen erst später, dass sie betrogen worden sind.

    Erleben Sie in unserem Webinar anhand eines CEO Fraud Live Hack, wie leicht Ihre Mitarbeiter dazu gebracht werden, die betrügerischen Anfragen auszuführen. Anschließend zeigen wir Ihnen auf, wie Proofpoint Ihre Mitarbeiter und Ihr Unternehmen anhand eines mehrstufigen Schutzkonzeptes vor derartigen Angriffen schützen kann.
  • Moving ePHI Securely at the Speed of Digital Transformation
    Moving ePHI Securely at the Speed of Digital Transformation Hugh Gilenson, Director Healthcare Solutions Recorded: Jun 25 2018 57 mins
    How do you accelerate the move to efficient digital workflows containing ePHI and maintain compliance? In this informative webinar we'll discuss enabling healthcare delivery transformation when it requires sharing information. Topics covered include:

    - Digital transformation of legacy workflows across care settings
    - Communicating with patients, providing access and control
    - Maintaining security, privacy and regulatory compliance
  • IT Ops SIG Talk Ep. 7: Integrate IBM mainframe & iSeries (AS/400) into MF UD
    IT Ops SIG Talk Ep. 7: Integrate IBM mainframe & iSeries (AS/400) into MF UD Chip Sutton Recorded: Jun 21 2018 15 mins
    Integrate IBM mainframe & iSeries (AS/400) into Micro Focus Universal Discovery

    IBM Mainframe and IBM i (iSeries-AS/400) environments continue to play a very critical part in today’s corporate IT infrastructures, processing some of the most valued and important data. Learn how one of the world’s largest insurance companies brought their IBM environments into the modern era by extending their Micro Focus Universal Discovery (UD) platform to include the key IBM systems.

    The company’s former process of conducting manual audits was a time consuming, resource intensive, and outdated way of doing things at best. Attendees will:

    •Learn how the combination of Micro Focus Software and EView Technology provided a cost-effective, comprehensive, automated, and real-time view of their business services across their multi-IBM system enterprise
    •Hear a brief overview of the architecture of the solution and the business benefits
    •View a short demo of the seamless integration
  • IT Ops SIG Talk Ep. 8: Advanced Data Analysis with Operations Bridge
    IT Ops SIG Talk Ep. 8: Advanced Data Analysis with Operations Bridge Brian Bowden Recorded: Jun 21 2018 11 mins
    Advanced Data Analysis with Operations Bridge

    Every day big data becomes bigger, and each day enterprises are coming up with new use cases for the data they have at their disposal. Finding systems that have the capabilities and the horsepower to deliver on the use case is a challenge. Greenlight Group will review one such use case, and how Operations Bridge System Collectors and Operations Bridge Analytics were leveraged to harness the power of big data to process millions per day and provide near live dashboards of critical IBM DataPower statistics for one of its customers.

    We will show real world Perl scripting examples for you to try in your environment.
  • How to Enable Trust, Interoperability, & Shared Credentials
    How to Enable Trust, Interoperability, & Shared Credentials Ora Niknamfard, Product Marketing Manager Security at CA Technologies Recorded: Jun 21 2018 40 mins
    The promise of digital identity is to remove silos; minimize redundancies; facilitate better collaboration; and shape a foundation for regulatory compliance.
    The challenge with digital identity is that it requires shared credentials that force you to deliberately assess:

    • Managing physical access
    • Protecting PII
    • Delivering cross-agency services
    • Revising digital consumer interaction

    In this session, Ora Niknamfard, Product Marketing Manager Security at CA Technologies will share industry best practices to help ensure credentials are, in fact, interoperable. Plus, you’ll have a unique opportunity to explore the architectural measures that can manage identity assurance levels and identity verification for both logical and physical access.

    Implementing a digital identity strategy can be complicated. Let CA help.
  • IT Ops SIG Talk Ep. 9: How to Integrate Vertica/3rd Party Data Sources into BVD
    IT Ops SIG Talk Ep. 9: How to Integrate Vertica/3rd Party Data Sources into BVD Jason Batson Recorded: Jun 21 2018 17 mins
    How to Integrate Vertica and other 3rd party data sources into BVD

    Our customer had reached a point where flexible dashboarding and data sources were required for their users for performance over time data. In this presentation we review:

    •The Vertica data source and query
    •How to connect to that source using a Perl script
    •How to post the data to BVD using Perl and curl
    •How to manipulate the data channels in BVD
  • IT Ops SIG Talk Series: Mainframe to UD, Data Analysis w/ OpsBridge, Vertica
    IT Ops SIG Talk Series: Mainframe to UD, Data Analysis w/ OpsBridge, Vertica Chip Sutton, Brian Bowden, Jay Batson Recorded: Jun 21 2018 47 mins
    IT Operations SIG Talk Series: Mainframe to UD, Data Analysis with OpsBridge, Vertica into BVD (complete edition)

    This Vivit SIG Talk session will feature speakers who will share their vast knowledge and experience on Mainframe to Universal Discovery (UD), Data Analysis with Operations Bridge and Vertica into BVD.

    Shown below is an outline of the agenda and topics:

    •Speaker: Chip Sutton
    Integrate IBM mainframe & iSeries (AS/400) into Micro Focus Universal Discovery

    •Speaker: Brian Bowden
    Advanced Data Analysis with Operations Bridge

    •Speaker: Jay Batson
    How to Integrate Vertica and other 3rd party data sources into BVD
  • Pourquoi sécuriser sa messagerie sous Office 365 ?
    Pourquoi sécuriser sa messagerie sous Office 365 ? Laura Peytavin, Sales Engineer, CISSP et Miguel Battais, Account Manager France, Proofpoint Recorded: Jun 21 2018 41 mins
    Office 365 est en France et en Europe une solution collaborative de plus en plus adoptée par les organisations.

    La messagerie fait partie des services déployés en priorité.

    Les clients Office365 sont confrontés à deux soucis majeurs :

    1 Obtenir la meilleure sécurité possible contre les attaques sur les courriels, qui représentent encore aujourd’hui 93% des vecteurs de menaces sur vos données et vos postes de travail,

    2 Conserver une continuité de service lorsqu’Office 365 est indisponible.

    Lors de ce webinaire, nous présenterons entre autre comment Proofpoint, fournisseur de solutions de cybersécurité « people-centric » adresse les défis suivants :

    -Protection des identifiants utilisateurs ciblés par du phishing O365 de plus en plus sophistiqué
    -Contrer la fraude email (attaques au président, FOVI) qui n’est pas traitée par O365, quel que soit l’offre souscrite
    -Donner une visibilité en temps réel des attaques
    -Pouvoir faire des corrélations d’attaques qui deviennent de plus en plus multi-vectorielles (liens vers du partage de fichiers dans le Cloud : Box, OneDrive, SalesForce, Sharepoint, GSuite, etc…)
  • Learn to Fight Cloud Sprawl and Eliminate Service Outages
    Learn to Fight Cloud Sprawl and Eliminate Service Outages Vid Sista, Director of Technology Solutions Recorded: Jun 20 2018 15 mins
    Adding automation to your IT environment is one of the best ways to fight cloud sprawl and help eliminate service outages. In this 15-minute webinar, Accudata’s Director of Technology Solutions Vid Sista will explain:

    How automation solutions enable you to proactively identify service issues
    Why cloud sprawl is a major threat to IT security – and how you can stop it
    What businesses can do to automate their IT services lifecycle
  • The Evolution of Mobile Threat Actors
    The Evolution of Mobile Threat Actors Michael Flossman, Head of Threat Intelligence, Lookout Jul 19 2018 3:00 pm UTC 60 mins
    Cybercriminals and nation states are consistently using mobile threat tooling as part of their espionage or financially motivated attacks and campaigns. The Lookout Threat Intelligence team has noticed this increase as we research and protect against these adversaries. These actors are increasingly seeing value from having an offensive mobile capability in their toolkit and we have even seen low sophistication groups break into this space and successfully steal gigabytes of data from compromised devices. As BYOD and the prevalence of mobile devices in corporate environments continue to blur the traditional enterprise perimeter, the ability to understand the risks to mobile endpoints is critical.

    Join Michael Flossman, Head of Threat Intelligence at Lookout, for this informative webinar as he covers the evolution of threat actors on mobile, discusses several recent high-profile cases, and explains why gaining visibility into your mobile endpoints and proactively securing them is key for today’s organizations."
  • Master DNS Security for a Bulletproof, Tier One Network
    Master DNS Security for a Bulletproof, Tier One Network Tony Scott, DJ Goldsworthy, D.J. Long, Cricket Liu, Victor Danevich Jul 19 2018 6:00 pm UTC 90 mins
    You're charged with building a bulletproof, tier one secure network. If your Domain Name System (DNS) goes down, nothing else matters. And, DNS is the leading attack vector for cyber villains. Say “Hack no! ” to DNS threats.

    Join guest speaker Tony Scott, former CIO of the United States, Microsoft, and the Walt Disney Company, alongside leading practitioners from Aflac and McAfee in this live panel discussion. This unique gathering of industry experts will discuss their perspectives on building a safe, secure network and actionable best practices in this era of cloud and mobile. Moderated by Infoblox Chief DNS Architect Cricket Liu, this discussion will give you an opportunity to hear from the experts and ask questions about.

    - What leading organizations are doing to secure their DNS
    - When to best utilize DNS data, network context, and threat intelligence in your security operations
    - How to integrate DNS data with your security ecosystem to accelerate threat mitigation and remediation
    - How Aflac blocked nearly 37 million threat connections with < 100 false positives

    Save your spot now.

    ----------------------------------------------------------------------------------------------

    Panelists:

    Tony Scott,U.S. CHIEF INFORMATION OFFICER (2015–2017), TONYSCOTTGROUP

    DJ Goldsworthy, DIRECTOR, SECURITY OPERATIONS AND THREAT MANAGEMENT, AFLAC

    D.J. Long, VICE PRESIDENT, STRATEGIC BUSINESS DEVELOPMENT, MCAFEE

    Cricket Liu, CHIEF DNS ARCHITECT, INFOBLOX

    Victor Danevich, VICE PRESIDENT, WORLDWIDE FIELD ENGINEERING, INFOBLOX
  • Phishing – Sensibilisez vos utilisateurs par la simulation et la formation
    Phishing – Sensibilisez vos utilisateurs par la simulation et la formation Mickael Omer, Sales Engineer Jul 24 2018 9:00 am UTC 45 mins
    Le phishing reste l’une des plus grandes menaces pour les entreprises. Ce type d’attaque ciblée exploite le facteur humain plutôt que la technologie, ce qui la rend plus difficile à détecter par les solutions de sécurité traditionnelles. Nous vous ferons découvrir comment réduire le risque d’hameçonnage en permettant la simulation de phishing et la formation pour aider vos utilisateurs finaux à détecter, signaler et se prémunir de cette menace.

    Durant cette session, nous couvrirons les sujets suivants :

    • Comment évaluer la vulnérabilité de vos utilisateurs aux attaques de phishing et de spear phishing
    • Sensibiliser et former vos utilisateurs pour qu’ils reconnaissent et évitent les attaques de phishing et autres escroqueries d'ingénierie sociale
    • Comment permettre à vos employés de signaler les messages suspects en un seul clic.
  • How John Muir Health is Securing a Growing Base Of Cloud Applications
    How John Muir Health is Securing a Growing Base Of Cloud Applications Rich Campagna, CMO & VP of Product Management at Bitglass. Bill Hudson, VP IT at John Muir Health. Thomas August, CISO, JMH Jul 24 2018 4:30 pm UTC 60 mins
    For John Muir Health (JMH) and other leading healthcare firms, Office 365 is often IT's first foray into the public cloud and the start of a broader initiative to migrate from premises-based applications to cloud. Most are now looking to deploy cloud messaging, file sharing, collaboration apps, and more. Deploying this "long-tail" of SaaS applications shares a great deal with platforms like Office 365, but some considerations are different.

    In this webinar, learn how John Muir Health journeys to secure these lesser known cloud applications and gain actionable advice that you can bring to your organization to protect data in Office 365 and beyond.
  • Windows 10 & Office 365 Migration and Optimization Strategies
    Windows 10 & Office 365 Migration and Optimization Strategies Matt Crawford, Citrix Dir. Solutions Marketing and Matt Brooks, Citrix Sr. Technical Product Marketing Mgr. Jul 24 2018 6:30 pm UTC 60 mins
    Learn how to manage the top migration challenges and improve user productivity, security and IT management flexibility.

    With the shift to the Cloud, more companies are moving to Office 365 and Windows 10. Before you make your move, you’ll want to attend this webinar to learn how to manage the top migration challenges with Citrix Workspace and improve user productivity, security and IT management flexibility.

    For a sneak preview, here are few of the top challenges that you’ll learn how to solve by attending the webinar:

    •Managing a mixed environment of Windows 10 and Windows 7 devices with legacy PC management tools
    •Windows 10 application incompatibilities
    •Mobile security risks with running Exchange on-prem
    •Network latency from running O365 in the cloud
    •Managing multiple file hosting services including OneDrive
  • DigiCert Monthly Threat Briefing - July 2018
    DigiCert Monthly Threat Briefing - July 2018 Jeff Barto and Angelique Pereira, Trust Strategists at DigiCert Jul 26 2018 3:00 pm UTC 60 mins
    Stay updated on July’s threats within the SSL, TLS, PKI, IoT, encryption, identity and digital certificate space. From DigiCert.
  • How to Build a True Conversational Messaging Platform
    How to Build a True Conversational Messaging Platform Abinash Tripathy, Helpshift; Dan Miller and Mitch Lieberman, Opus Research Aug 2 2018 5:00 pm UTC 45 mins
    Brands in every industry and geography feel an urgency to meet the conversational needs of their customers. Executives walk the fiscal tightrope between exceptional customer experiences and operational efficiency. Today’s contact center, as the communications hub for customers, is caught in the middle of the battle. Customers value fast, frictionless convenience; executives must invest accordingly.

    Join Opus Research Lead Analyst Dan Miller and Program Director Mitch Lieberman, with Abinash Tripathy, Chief Strategy Officer and Co-Founder from Helpshift, as they address the urgent topics that help brands and enterprises supercharge customer service experiences, including:

    * How digital messaging promotes operational excellence while meeting — and exceeding — customer needs
    * Strategic steps necessary to support top-line growth and in-depth customer engagement
    * How brands infuse intelligence, accuracy, and precision into company/customer conversations
    * How to leverage investments and resources to build the next generation of customer service and support
  • AppDynamics + Cisco: Driving Transformation Across the Stack
    AppDynamics + Cisco: Driving Transformation Across the Stack Steve Long, Regional CTO, AppDynamics Aug 9 2018 4:00 pm UTC 60 mins
    In today's digital enterprise, it's technology that drives business success. And with the strategic pairing of AppDynamics and Cisco, organizations can now drive their digital transformation forward in ways never before possible. But how?

    In this webinar, you’ll learn how AppDynamics real-time data platform is being correlated with Cisco’s data platforms to give you the richest end-to-end view across the stack, allowing for faster remediation and automation

    You’ll gain insights into:

    - New challenges of cross-domain failures in the enterprise
    - The future of IT intelligence across the software and infrastructure industries
    - How Cisco solutions like ACI, CloudCenter and Workload Optimization Manager (CWOM) will be integrated with AppDynamics and Cisco
  • Can your data infrastructure support AI marketing?
    Can your data infrastructure support AI marketing? Michelle Goetz, Principal Analyst, Forrester Aug 9 2018 5:00 pm UTC 60 mins
    Are you AI-ready? You need to be. Artificial intelligence marketing applications are delivering on their promise to source new insights to grow your business fast, AI technology is becoming available to any company looking for a competitive edge, and now’s the time to move, if you want to stay ahead of the curve.

    But the challenge is not just in defining an AI strategy; it requires developing the infrastructure to support it.

    Should you be developing in-house, or look to available technology and collaborate with outside experts? Keep deployment on-premise, or reach for the cloud? Can your current infrastructure, from server performance to processing power, stand up to the demands of increasingly complex AI applications?

    Get ready to level up your marketing strategy with AI, advance your technological capabilities in smart, strategic ways, learn how to make sure your next infrastructure move helps you exploit the AI advantage and more when you join this VB Live event!

    Register for free!

    Attend this webinar and learn:
    * How to tell if your marketing and IT departments are AI-ready
    * The fundamentals of an AI-driven infrastructure
    * The role of clean, definable data goals in successful AI implementation
    * How to scale the AI workload

    Speakers:
    * Michelle Goetz, Principal Analyst, Forrester
    * Rachael Brownell, Moderator, VentureBeat

    More speakers coming soon!
  • DigiCert Monthly Threat Briefing - August 2018
    DigiCert Monthly Threat Briefing - August 2018 Jeff Barto and Angelique Pereira, Trust Strategists at DigiCert Aug 30 2018 3:00 pm UTC 60 mins
    Stay updated on August’s threats within the SSL, TLS, PKI, IoT, encryption, identity and digital certificate space. From DigiCert.
  • DigiCert Monthly Threat Briefing - September 2018
    DigiCert Monthly Threat Briefing - September 2018 Jeff Barto and Angelique Pereira, Trust Strategists at DigiCert Sep 27 2018 3:00 pm UTC 60 mins
    Stay updated on September’s threats within the SSL, TLS, PKI, IoT, encryption, identity and digital certificate space. From DigiCert.
  • Architecting an Open Source Data Science Platform: 2018 Edition
    Architecting an Open Source Data Science Platform: 2018 Edition David Talby, CTO, Pacific AI Oct 23 2018 5:00 pm UTC 60 mins
    Join David Talby of Pacific AI as he updates the best practices and techniques for building an open source data science platform.