Welcome to the mobile computing community on BrightTALK! With the consumerization of IT and the widespread adoption of mobile devices across the globe, mobile computing has become an important part of many people's lives in a culture of bring your own device (BYOD). With mobile devices doubling as work phones and more employees working from home, businesses need to provide secure access to data and work applications from anywhere at any time. Join this growing community and hear from industry thought leaders in webinars and videos as they share their insight on mobile computing research and trends.
The Gartner 2017 Market Guide for Privileged Access Management (PAM) reviews 24 vendors across various categories. This comprehensive information can help you find an ideal solution for your unique business needs. Yet, selecting the right PAM solution is a pivotal decision; it is critical to weigh your options.
Make an informed decision. Join Suresh Sridharan, Director Privileged Access Management at CA Technologies, as he guides you through report recommendations, evaluates the latest tools and technologies, and compares and contrasts industry choices.
The cloud provides organizations with elasticity and speed and by 2018 60% of an enterprises’ workloads will run in the cloud says 451 Research. The amount of business operations running in the cloud means organizations have more cloud computing service providers, with a typical enterprise having roughly six. This requires companies to develop and implement a multi-cloud strategy, especially when it comes to security. But each CSP has its own security offerings and integrations sometimes making the process confusing and complex. Even prior to the cloud, encryption and key management have presented challenges for many organizations, but with encryption becoming ubiquitous – a strong key management strategy is key. This is especially important with industry mandates and government regulations like European General Data Protection Regulation (GDPR) and U.S state data breach disclosure laws.
In this joint webinar with 451 Research, we will cover topics including:
-Building a multi-cloud security strategy for encryption and key management
-Best practices, benefits and pitfalls of managing your own security
-Impact of regulations on data protection in the next few years
-Understanding the different CSP requirements for key management:
oCustomer-Supplied Encryption Key (CSEK)
oBring Your Own Key (BYOK)
oHold Your own Key (HYOK)
oGeneral cloud service provider key management services overview
The Payment Industry has seen its fair share of innovation, but there’s never been a more exciting time for Payments than now. New technology is everywhere – Selfie Pay, Tokenization, Biometric Authentication. And with new technology, there is the inescapable need for advanced security.
In fact, several global initiatives have surfaced to make electronic payments safer – including PSD2 and 3-D Secure 2.0. This means big changes for banks, merchants, PSPs, and consumers. Are you prepared?
Join industry leaders from Mastercard and CA Technologies for a straightforward look at how to take advantage of these innovations. You’ll be briefed on:
• Regulatory technical standards on strong customer authentication
• Best practices to reduce abandonment rates and fraud
• Key dates, choices, and planning considerations to implement the new protocols
Host: Karen Webster, CEO, PYMNTS
• Michael Sass, Vice President, Market Product Management, Security Solutions, Europe, Mastercard
• James Rendell, Vice President, Product Management, Payment Security, CA Technologies
How much visibility do you have via Secure Access end-points – from the Data Center, to the Cloud, to Devices and Applications hitting your network?
Join Pulse Secure for a compelling Webinar Centered on Pulse One – its’ leading edge Monitoring-Visibility Solution. Configured correctly, Pulse One also enhances compliance alliance, segmentation and pro-active management and consolidation for Secure Access at the front-edge of your network.
The modern science of securing applications to a broad range of devices.
Do you want people accessing your data from that device? Do you know where that device has been? Would you trust that device to protect your personal data? While cloud applications offer tremendous benefits over traditional on-premise, IT Executives face many challenges involving data security and compliance. Unmanaged devices, unauthorized access, and unsanctioned apps are all significant threats, increasing the risk of data leakage and being the next organization in the headlines. Cloud access security brokers, or “CASBs” are the tools technology leaders have turned to, protecting data across applications, and mitigating other malicious threats.
In this webinar, Benjamin Massin, CEO of The SCE Group, and Gleb EvfaresTov, Solutions Engineer at Bitglass, will discuss how to balance the benefits of moving to the cloud, while implementing a security solution, protecting identities and data end-to-end.
By 2020, five billion people will be online, with 25 billion devices and machines using the Internet. Many devices will share data and services, and the way we engage with them will fundamentally change. In a connected world, consumer expectations of executing transactions on a phone, tablet, VR device – or even a refrigerator – will be higher than ever.
As time goes on, devices will become smarter and make more and more decisions for us. We’ll be able to create rules as users to tell our devices what we’re comfortable with them paying for automatically. The use cases for rule-based payment are endless!
As such, the onus of creating frictionless download and shopping experiences while overcoming barriers between devices lies with each business. When it comes to recurring and subscription payments, the technology underpinning these user experiences across devices is critical. Seamless, simple, and secure are the watchwords of an IoT world.
Don’t wait until 2020 to address consumer pain points and overcome technological barriers to IoT adoption. Tune in to the latest VB Live event and hone in on the fastest, best ways to prepare for the IoT world. After all, it’s already here. Attend this webinar and find out:
•How companies are already dealing with device connectivity
•How the challenges posed by IoT are being solved for today
•Global consumer attitudes around payments made by devices
•How payments will become ‘invisible’ or ‘translucent’ for users
•Payment technology that will enable devices to make decisions
* Kevin Gordon, Lead Innovation Architect, Worldpay
* Stewart Rogers, Analyst-at-Large, VentureBeat
* Rachael Brownell, Moderator, VentureBeat
In today’s digital marketplace, consumers and businesses increasingly expect to be able to make instant payments, wherever they are, and at any time of day. The adoption of real-time payments capabilities is very much an essential for banks who wish to retain market share and capture new customers.
Chief Information Security Officer Reveals How With Arbor Spectrum.
Attackers continuously have new tools, tactics and practices in their weapons arsenal. Human defenders must shift their strategies to more proactively uncover meaningful threats, and find ways that dramatically accelerate threat investigation.
Join us to hear:
- NETSCOUT’s Chief Security Officer discuss how the Arbor Spectrum threat analytics platform was used to help her team take detection and investigation to a new level.
- In depth examples of how security teams can begin or enhance their detection and investigation of attack campaigns.
In this golden age of software applications, delivering a great customer experience at scale is a business differentiator. Microservices platforms, containers and cloud-native applications promise faster time-to-market but introduce unparalleled complexity. Added value can quickly be eroded by failing to understand and manage your application performance across environments that are in a constant state of change.
Join us for this special webcast, where guest speaker Dean Davison, Principal Consultant, Forrester Research will discuss findings from the recent Total Economic ImpactTM (TEI) of CA Application Performance Management (APM) that can assist businesses evaluating this solution – including the potential to realize: $5.4 Million NPV, 316% ROI and payback in 3 months.
Joining Dean, Pete Waterhouse, Advisor, CA Technologies will outline the essential elements of a modern APM solution needed to deliver these outcomes.
Artificial intelligence was Gartner’s top 2017 strategic technology trend, and the year isn’t over yet. But for too many companies, AI myths are persistent, use cases and strategies are still on the “shiny new thing” level, and expectations continue to hover in the spirit of Skynet/HAL, making it hard to determine whether it’s really right for your company.
As AI technologies multiply, how do you sort fact from fiction? Should you stop daydreaming about replacing your entire staff with chatbots — or can you start augmenting agent abilities? Most importantly, while AI undoubtedly has shown real-live ROI in case study after case study, where is the particular value in chasing the AI buzz for your own company?
Register now for our our latest VB Live event and find out. We’ll be tackling the AI legends and the AI realities, breaking down the potential AI has for your bottom line, and giving you a glimpse of the future of AI for business.
In this webinar, you’ll explore:
* Myths and realities of AI replacing vs. augmenting staff functions
* How to bake AI into your business strategy
* On- and offline use cases for AI
* The future of AI for business
* Avinash Gangadharan, Sr Director of Engineering, Walmart
* Allen Sebrell, Senior Manager E-Commerce Team, Amtrak
* Deep Varma, VP of Engineering, Trulia
* Stewart Rogers, Analyst-at-Large, Venturebeat
* Rachael Brownell, Moderator, VentureBeat
Digital transformation is real, and it’s happening – our data in the retail industry lends more insight to the state of the transition. It is an inescapable truth that every business is becoming a digital business empowered by new software initiatives such as AI, Robotics and IoT. The adoption of these disruptive trends will force a divide between business leaders and laggards. With the upcoming Black Friday and Cyber Monday, how prepared are you to meet rising customer expectations. As the pace of innovation accelerates, retailers need to act now. Our Global retail research illustrates a significant gap between digital leaders and laggards and even a modest investment can improve operational efficiencies and agility.
The retail industry is bursting with digital innovation driving change. This session will review:
•How differentiation demands digital maturity
•Transformational technologies essential to create immersive, connected retail experiences across digital and physical worlds
•The role of cloud services and its impact on customer experience, agility, efficiency and risk
Financial services firms face a unique set of challenges. Not only do they store large amounts of sensitive personal data, but they also face heavier regulations than many other verticals. In particular, these organizations must reach compliance with regulations like the Gramm-Leach-Bliley Act (GLBA). As cloud adoption continues to spread within the industry, financial firms must be particularly focused on achieving cybersecurity in ways that ensures compliance. Join Bitglass and (ISC)2 on October 5, 2017 at 1:00PM Eastern as we discuss the different aspects of GLBA that financial services organizations need to know and how different tools that can help with compliance.
In this webinar, security and privacy expert Chris Apgar will review highlights from a recently published Health Care Industry Cybersecurity (HCIC) Task Force report, including findings and recommendations for the industry and some practical implications for implementing these recommendations. The HCIC Task Force was formed by the 2015 Cybersecurity Act passed by Congress and charged with addressing challenges the health care industry faces in securing and protecting against cybersecurity threats. In June of 2017 the Task Force released a comprehensive 96-page report called “Improving Cybersecurity in the Health Care Industry”. During the webinar, Apgar will net out pertinent and actionable report content including:
•State of Cybersecurity in the Health Care Industry
•Risks across the Health Care Industry
•Imperatives, recommendations and action needed
Apple and Google have joined the call for an Augmented Reality future, bringing hundreds of millions of users with them. Given multiple visions for the massive opportunity ahead, how should we divide our efforts? In this webcast, you’ll hear expert opinions from a group living this challenge. VR/AR Association Marketing Committee Chair John Buzzell and YOU ARE HERE technology lead Ricardo Olivo will reveal their journey – from Vuforia and HoloLens to ARKit and beyond – covering use cases, technology insights, hardware challenges and more. You’ll learn where to place your bets, and how to make the most of this transition. This session will also include 30 minutes of Q&A to help you make sense of your VR/AR options.
Global ransomware attacks like WannaCry already move too quickly for humans to keep up, and even more advanced attacks are on the horizon. Cyber security is quickly becoming an arms race — machines fighting machines on the battleground of corporate networks. Algorithms against algorithms.
Artificial intelligence-based cyber defense can not only detect threats as they emerge but also autonomously respond to attacks in real time. As the shortage of trained cyber analysts worsens, the future of security seems to be automatic. But are humans ready to accept the actions machines would take to neutralize threats?
Darktrace recently ran tests across enterprises of all sizes in a variety of industries and has subsequently deployed AI-autonomous response in over one hundred organizations. In this presentation, we will discuss our lessons learned and explore several use-cases in which AI-based ‘Autonomous Response’ technology augmented human security teams.
This session will cover:
AI approaches and algorithms for detecting and responding to threats
How human teams adopt (or resist) automated defenses
The concepts of ‘human confirmation’ mode and ‘active defense’
Real-world examples of autonomous response in action
The South West Regional Cyber Crime Unit are involved in fighting cyber crime along with other national and international law enforcement agencies.
As such they see certain traits, methodologies and vulnerabilities over and over again. Lisa Forte, the Cyber Protect Officer for the Unit, will be explaining how businesses should adapt their thinking to "see what the hackers see" to better defend themselves against the threat she sees every day.
Lisa will also be talking about the importance of planning and war gaming out cyber attack scenarios. The businesses that have a plan are the businesses that survive to tell the tale. Lisa will be using real life cases that the Cyber Crime Unit have dealt with to highlight how quickly things can go wrong as well as providing some simple steps businesses can apply to reduce their vulnerability.
Lisa Forte is the Cyber Protection Officer for the South West Police Cyber Crime Unit. Her role involves helping businesses of all shapes and sizes defend against the ever growing cyber threat. Prior to working in the Cyber Crime Unit Lisa worked in intelligence for Counter Terrorism agencies in the UK.
The data is crystal clear. DDoS attacks are dramatically increasing in size, frequency and complexity. Unfortunately, many organizations have been severely impacted by DDoS attacks simply because they either assumed they would never be the target or they thought they had adequate protection in place. Join IP Networks and Arbor Networks - the industry leader in DDoS attack protection products and services to learn:
-The latest trends in DDoS attacks
-The importance of proper network visibility for anomaly & DDoS attack detection.
-Best practices in DDoS attack defense; including an intelligent combination of in-cloud and on-premises attack protection solutions - which offers the most comprehensive form of protection.
The European Union’s General Data Protection Regulation (GDPR) that goes into effect on 25 May 2018 expands the meaning of personal data, mandates when such data can be collected, and enforces full transparency and consent from the user. Organizations of all types processing data from EU residents must evaluate and likely make changes to their enterprise mobility management practices in order to adhere to the new law or face severe penalties.
Join this webinar to understand what GDPR means for infrastructure and operations professionals that are responsible for mobile and endpoint strategy to make sure your organization is compliant from day one.
We will review the most important sections of the law related to enterprise mobility from an administration and end user perspective as well as the implications for BYOD programs. EMM should be leveraged to meet GDPR requirements and you will learn how a mobile application management solution like Apperian supports privacy and mitigates risk by managing corporate data while leaving personal data untouched.
Samantha Kingston will explore why she bet her career on virtual reality and what it’s really like running a marketing company solely for VR, looking at trends and what challenges are ahead for 2018.
Virtual Umbrella is an award-winning marketing consultancy specialising in Virtual Reality. Virtual Umbrella has worked on a number of notable projects including creating a virtual reality cinema in Cannes, curating and running a technology hub as part of the Edinburgh Fringe Festival and providing immersive experiences along the BBC and Imperial War Museum.
Samantha Kingston is the award-winning client director at Virtual Umbrella. Virtual Umbrella is a marketing and PR agency specialising in virtual reality. Samantha fell into the VR industry by accident but has spent her time in the industry building up her own company and working with the VR industry in the UK, Europe, and US. Samantha is an advocate for Women in tech and VR and she is often found moderating panels on equality in the workplace. In 2016 she won the regional and national ‘New Business’ award at Venus Awards, highlighted as one of MCV 30 under 30 and one of the rising stars of BIMA100 2016.
ALM QC 12.55 has just been released in August, providing enhanced features and benefits for Application teams, end users and ALM admins working together to deliver high quality applications with confidence.
Join us as we review the key newly released capabilities of ALM/QC 12.55 and walk through a live demo.
ALM/QC 12.55 Highlights include:
•Test board enhancements providing improved user experience for test management and execution
•Support for Quality of Things (QoT) – ALM client for offline/online Internet of Things (IoT) & device manual testing
•Improved collaboration through integration of Skype for business
•Upgraded administration with ability to back up large files
•Synchronization tools connecting ALM to other management tools such as JIRA, TFS and RTC
We will also discuss the benefits of ALM Octane – our next-generation ALM product with Agile and DevOps capabilities built in, and how you can get started today!
Despite the past two years of hoopla surrounding VR technology, adoption rates are low and retention rates are even worse. Giants such as Facebook, Google, and Samsung have dumped billions into the space, but why isn't it taking off yet? In this webinar, Brian Herrera, CEO of Vidi VR, will give an outsider's look at the inside of this nascent industry and lead a candid discussion about:
- Hurdles in the way of widespread adoption (spoiler alert: it's NOT technology)
- The true value proposition of VR for consumers
- What the big players and "thought leaders" got wrong
- How Vidi VR is a differentiator in the industry
According to some analysts, 25 billion connected devices will be part of the Internet of Things (IoT) by the year 2020. Every one of these devices on the Internet of Things (IoT) ecosystem may be malicious or a threat vector. What are enterprises and manufacturers doing to make IoT a safe place?
Attend this webcast to:
-Find out about the latest trends and challenges in securing IoT devices
-Discover best practice and solutions to mitigate security risks
-Learn about how the cable industry transformed itself to meet the challenges with IoT
Our presenters for this session:
-Robert Westervelt, Research Manager, IoT Security, Data Security
-Mitch Ashley, President and General Manager of Kyrio, Inc.
-Srinivasa Padmanabha, Senior Product Manager, Symantec Website Security
Our threat research team spends every waking moment reverse-engineering and cracking mobile apps and devices to help organizations reduce mobile risk. During this webinar, renowned mobile security expert and NowSecure founder Andrew Hoog will explain the attacker’s point-of-view, what attackers are looking for in mobile banking or financial services apps, and what makes your mobile app an appetizing target. We will then provide tips for deploying a mobile app security testing program to ensure you proactively plug security holes, squash privacy leaks, and fill compliance gaps in your mobile apps.
Cloud computing is an increasingly vital element of information security. It’s used to protect sensitive data; for identity and access management; for network security and to aid with incident response. However it’s not without it’s own set of risks and has been hit in the past with significant and newsworthy breaches.
Join this interactive Q&A panel with top cloud and security experts as they discuss the future of the cloud and considerations to take for protecting sensitive data when it's held in the Cloud.
Recommended Audience: CIO, CFO, Procurement officers, IT Finance, IT Sourcing.
Telecom Expense has traditionally been the most challenging of IT costs to manage. With the emergence of Software-as-a-Service, Cloud Computing, the Internet of Things, and software defined networks, the rest of the IT world is quickly catching up.
This webinar will provide best practices for expanding your existing telecom expense management program into a bigger IT management program to take advantage of the robust capabilities and vendor management experience already in TEM. This presentation will include anonymized end user examples and a list of vendors with experience in managing non-telecom expense categories.
This talk shows how to build a scalable data science platform, using only free, commercially-friendly open source software. The end-to-end architecture covers interactive queries & visualization, machine learning & data mining, deploying models to production, and a full 24x7 operations toolset.
Requirements include what an enterprise typically requires: Strong security (authentication, authorization, audit, encryption, multi-tenancy), active monitoring for both systems & data, backup & restore, user management (with LDAP integration), distributed deployment on commodity hardware, auto scaling, and self-healing when containers or services go down. Technologies covered include Spark, Hadoop, ElasticSearch, Kibana, Jupyter notebooks, TensorFlow, OpenScoring, Docker Swarm, and supporting tools.
This talk is intended for practicing architects and technology leaders, who need to understand how to best leverage the open source ecosystem in this space and what it takes to integrate the available cutting-edge technologies into a cohesive, enterprise-grade and production-grade architecture.
David Talby is Atigeo’s senior vice president of engineering, leading the R&D, product management, and operations teams. David has extensive experience in building and operating web-scale analytics and business platforms, as well as building world-class, agile, distributed teams.
***Security Alert: Unusual Activity Detected. Your company has suffered a data breach.***
In today’s brave new world, where the Internet is used for everything from finance to heathcare, traditional usernames and passwords are, in fact, reckless. If we want to erase Hacker Headlines, we need a new model of Trust for Digital Identities.
So, what’s the answer? Join David Duncan, Vice President, Security at CA Technologies, to discuss:
• Risks posed to your business by legacy authentication
• Problems inadvertently created by human behavior
• New model for digital identity that leverages user Digital DNA and risk analytics
Let us show you how CA Technologies can help you reduce identity theft and fraud, while building sustainable online Trust.
Companies today who are investing in digital transformation initiatives are focusing on finding new ways to interact with their existing customers, and experimenting with creative approaches to acquiring new ones. Often times this involves the creation of new routes to market and a multi-channel approach to marketing and sales.
If you work in an IT or line-of-business organization tasked with building this new class of digital services, you should attend this webinar, where the following important topics will be covered:
- What multichannel digital services are, and why they matter
- Why microservices are critical for successful multi-channel digital initiatives
- Synergies and benefits of combining API Management & microservices
- Practical advice on how to get started
Clearly, the onslaught of data, particularly big data, continues to cause many organizations to look for new ways in which to store, analyze, and manage that data. Cloud computing from public cloud vendors is often one place in which enterprises turn. Traditionally deployed and managed on-premises, databases are the lifeline of many enterprises. And while the cloud is appealing for a number of reasons, there are still questions on the minds of many organizations in choosing the right cloud partner to manage their database in the cloud.
Level 5 autonomy for automotive and the broader intelligent transportation industry will require hyper broadband connectivity. Smart communities and corporations developing products and services for ubiquitous connectivity understand that it requires a holistic vision of a fully 5G-connected environment.
This webcast will discuss the work cities, and automotive suppliers and OEMs are doing to build infrastructure and transportation vehicles that will move from human driven, through connected to autonomous capabilities.
>> Jill North, Innovation Program Manager, Department of Transportation, City of San Jose
>> Robert Grant, Senior Director of Public Policy, Lyft
>> Jeff Stewart, Assistant Vice President, Global Public Policy, AT&T
>> Tim Weisenberger, Project Manager, Technical Programs, Ground Vehicle Standards, SAE International
Organizations in the healthcare industry handle data more sensitive (and valuable) than that of companies in perhaps any other sector. Because of this, those organizations need to demonstrate a heightened standard of data security and privacy. To ensure this, the U.S. has enacted the Health Insurance Portability and Accountability Act of 1996 (HIPAA). While use of the cloud affords organizations greater efficiency, it also complicates issues of security and regulatory compliance. But the good news is that solutions that enable cloud and security are available. Join Bitglass and (ISC)2 on November 2, 2017 at 1:00PM Eastern to learn about the requirements of HIPAA and the specific security capabilities that healthcare firms need in order to meet compliance requirements.
The recently updated CA Privileged Access Manager provides a simple, secure, and scalable Privileged Access Management capability that organizations can use to meet their current and evolving needs. The release includes:
• Graphical redesign of the user interface to provide consistency, improved usability and a modernized look
• New management console to offer greater visibility into clustered environments for large multi-department and Managed Service Provider (MSP) environments
• Augmented session recording, encryption and crypto module enhancements to support deployments of all sizes
• And more
Please join Mike Dullea, Senior Director of Product Management for PAM at CA Technologies, as he guides you through many of the new use cases in this release and demonstrates the enhanced user experience.
APIs are generally referred to as a way to access a specific piece of data or business logic. But what if you need to compose APIs into flows that externally expose a business process with more complex data manipulation requirements?
In many cases, this functionality already exists in SOAP services or ESB functionality, but requires repurposing and updating to a more modern REST approach. Digital business applications often require melding of existing functionality with new capabilities, a convergence of old and new.
Attend this webinar to learn:
- Why choreography and orchestration matter in an API architecture
- How service decomposition can be applied
- How to maximize reuse of existing APIs to reduce time to market
- How both orchestration and choreography are handled by TIBCO Mashery® Enterprise
More than 90% of targeted attacks start with email fraud. Learn how to gain insight into, and effectively defend against, these attacks.
Join us for a Proofpoint technical webinar, brought to you by engineers, for engineers. This session will focus on effectively defending your domains from impostors and fraudsters attacking your organization, your customers and your partners.
Topics will include:
• The Threat Landscape
• SMTP Standards and Evolution
• Stop Attacks with Visibility & Authentication
• Configuring Email Protection to help block imposter threat
• Creating DMARC reporting in less than 10 minutes
In the second year of a global tracking study, Opus Research presents findings from a survey of 500 business decision-makers to understand their perspectives in evaluating and deploying Speech Analytics platforms and services.
This study, commissioned by Uniphore, documents critical datapoints in the perceived value of Speech Analytics and its impact on contact center operations, compliance and regulation, workforce optimization, customer experience and delivering a return on investment.
Attendees to this webinar will receive a complimentary copy of the report “Executive Survey: Drivers for Deploying Speech Analytics (2017 Edition)."
On Wednesday, November 8th (11 a.m. EST | 8 a.m. PST), join Dan Miller, lead analyst & founder at Opus Research, Derek Top, director of research with Opus Research, and representatives from Uniphore, as they unveil the key findings from this definitive report on speech analytics.
PKI (public key infrastructure) has quietly become one of the most critical assets for enterprises today. Our 2017 study, conducted by the Ponemon Institute and sponsored by Thales e-Security, reveals an increase in the number of applications that use digital certificates, that enterprises are investing in fortifying the security posture of their PKIs, and that the IoT is the next game-changer for the future of PKI.
Join this webcast to learn about the top findings of this research, including:
• The increasing influence of the IoT in PKI planning
• The increasing security maturity of enterprise PKIs including the use of Hardware Security Modules
• Identification of enterprise applications that commonly depend on PKI credentials
• The ongoing challenges associated with PKI deployment and management
The high speeds expected from future 5G networks and the demands of dense data over those networks is leading to communications network densification. Data centers, a key component of high speed delivery, are redefining their role, becoming a part of the fog and moving increasingly to the edge. This webcast will cover the role micro data centers will play in community network communications infrastructure; their configuration and structure; use of artificial intelligence and virtualization; control systems and operations; and workforce needs.
>> Don Byrne, Managing Director, Metrix411
>> Phillip Marangella, VP of Business Development, Cloud and IoT Solutions, EdgeConneX
In this webinar, security and privacy expert Chris Apgar will delve into the recent guidance issued by OCR (Office of Civil Rights) on patients’ right to access their health information, parsing out what you need to know to not only meet HIPAA requirements, but also engage and serve the patient.
The HIPAA Privacy Rule requires health care providers and plans to give individuals the ability to view and receive copies of their medical and health records as well as make their medical record available to third parties. But what does this mean for providers? During the webinar, Apgar will brief you on:
•Scope of Information included / excluded
•Timeliness, fees and costs
•Form, format and manner of access
•Right to request providers send medical records to a third party
•Denial of access
•Steps to take now
Who should attend:CIO, CISO, Data Security and Compliance Officers and Staff
Digital transformation creates a new set of challenges for IT architects and developers. Applications need to be created much faster than before, in a way that makes frequent changes possible for reacting quickly to customer needs and your competitive environment. And these applications need to fit in with your existing IT landscape.
Watch this on-demand webinar in which Andy Hampshire, technical evangelist at TIBCO Mashery® explains how you can achieve these goals using a combination of fine grained services and composable APIs.
Short certificate validity as industry best practice will be here sooner than you might think. The emergence of devastating threats and vulnerabilities is driving the need to create smaller windows of opportunity for cyber criminals.
Several new measures have already been implemented to this end, such as Certificate Transparency (CT) and more recently Certificate Authority Authorisation (CAA). Now Certification Authorities and browser vendors are becoming increasingly vocal to urge the industry to move toward short-lived SSL/TLS certificates.
In this webinar, we will help you understand:
- what are short-lived SSL/TLS certificates
- why the industry is reducing SSL/TLS certificates validity time
- what the benefits and drawbacks this brings to your organisation
- how to start preparing for the introduction of short-lived SSL/TLS certificates to your portfolio.
The push to virtualize communication networks, control centers, and data centers through NFV and SDN technologies offers both great opportunity for management, speed to market, scale and business, and also brings many challenges. Efficiency, cost management, ensuring SLAs, managing OPEX and CAPEX, reducing product production costs are all business concerns faced by communications providers as they convert their networks to be increasingly software driven. What are the new business models that software enables? What are the customer expectations for new service deliverables? How can service providers, data centers and others guarantee quality of service? What tests are being conducted and what industry practices are being established? This webcast will review how companies are meeting the challenge of operating with new processes and with new requirements.
>> Andrew Young, VP of Business Development, iconectiv
>> Glen McGowan, Principal Consulting Architect, Service Provider Solution, Dell
What you don’t know about third-party apps in the Apple® App Store® and the Google Play™ store can hurt you. Apple and Google have app review processes at various levels, but banks and financial services organizations require more scrutiny -- especially for BYOD & COPE devices. Commercial apps used by employees in the workplace can leak data and violate security policies. Third party apps that use your company SDKs or APIs can expose your organization, defraud your customers, and tarnish your brand. Join our webinar to learn how to incorporate third-party commercial apps in your mobile threat modeling exercises and application security programs to protect your organization, your reputation, and your customers.