Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • Symantec Monthly Threat Briefing - 2017 in review, 2018 ahead
    Symantec Monthly Threat Briefing - 2017 in review, 2018 ahead Jeff Barto and Angelique Pereira, Trust Strategists at Symantec Recorded: Dec 14 2017 42 mins
    As we wrap up another year, let's take a moment to discuss what 2017 brought to the industry, and what we should expect to see next year.
  • Developing an Insights-Driven Approach for Exceptional Digital Experiences
    Developing an Insights-Driven Approach for Exceptional Digital Experiences Bryan Whitmarsh, Director, Product Management at CA Technologies Recorded: Dec 14 2017 55 mins
    Providing a great digital experience is critical for your brand, but the complexity of monitoring modern apps presents a challenge. When you combine a mix of mobile and Web applications, containers and microservices in distributed environments, identifying when and why your customers are having a poor app experience is often difficult.

    Join us for this webinar where Bryan Whitmarsh, Director, Product Management at CA Technologies will demonstrate how you can achieve a 5-star app experience for your customers. See how CA App Experience Analytics leverages a powerful, open source analytics platform to provide user experience insights and deep visibility into performance across apps and channels.
  • Filling the GDPR Compliance Gap
    Filling the GDPR Compliance Gap Adenike Cosgrove, Sr. Product Marketing Manager, Proofpoint Recorded: Dec 14 2017 30 mins
    Join this session to discuss: How your organization can drive towards compliance, how to embed "privacy by design" to your development lifecycles, and how to protect all identified EU personal data and prevent data breaches.
  • Healthcare Orgs: Empower Your Mobile Workforce Without Sacrificing Data Security
    Healthcare Orgs: Empower Your Mobile Workforce Without Sacrificing Data Security Hussein Syed, RWJBarnabas Health; Alex Fry, Strong Crypto Innovations LLC; Mike Schuricht, Bitglass Recorded: Dec 13 2017 57 mins
    Mobile computing and the use of cloud applications are touted as ways to help healthcare providers deliver better patient care. Clinicians carrying tablets or other devices to exam rooms and patients’ bedsides can quickly access and update patient data and other vital resources necessary for accurate and expeditious treatment.

    No one disputes the value of “anytime, anywhere” computing in healthcare – indeed, in other industries as well – but there is a concern about the risk associated with access to sensitive and regulated data via unmanaged devices and unsanctioned cloud applications.

    In this CISO panel discussion moderated by Hussein Syed, CISO at RWJBarnabas Health and joined by panelists Alex Fry, Principal Security Consultant at Strong Crypto Innovations LLC and Mike Schuricht, VP of Product Management, Bitglass, you’ll learn about real-world approaches to some of the most vexing challenges of mobile and cloud computing.
  • Healthcare Holiday Tales
    Healthcare Holiday Tales DataMotion Recorded: Dec 13 2017 6 mins
    A fun healthcare twist on a holiday tale reading. For anyone who has received health care from multiple providers, and all those working in the healthcare or technology industries. Happy holidays!
  • How today’s threats prey on the human factor | 2017 Human Factor Report
    How today’s threats prey on the human factor | 2017 Human Factor Report Patrick Wheeler, Director, Threat Intelligence, Proofpoint Recorded: Dec 13 2017 48 mins
    Ransomware. Business email compromise (BEC). Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure.

    In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it.

    Register now to learn about:
    •The latest social engineering targeting trends and techniques
    •Top email fraud tactics, including business email compromise (BEC) and social media account phishing
    •The rise of fraudulent mobile apps and how criminals target users on the go
  • Endpoint Security for Cloud Generation & New Integrations Extend Data Protection
    Endpoint Security for Cloud Generation & New Integrations Extend Data Protection Sam Tong, Senior Principal Systems Engineer, Symantec; Moderator: S.C. Leung, Member, Asia-Pacific Advisory Council, (ISC)² Recorded: Dec 13 2017 64 mins
    First in the Industry to deliver Deception, Mobile Threat Defense, and Endpoint Detection and Response (EDR) in a Single-Agent Architecture. Join us to learn the latest Evolution of Endpoint Security & Data Protection:

    •Defend against ransomware with multi-layered protection
    •Gain enhanced visibility into suspicious files via tunable protection to make better policy decisions
    •Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
    •Extend advanced security to mobile devices
    •Use deception techniques to expose hidden adversaries and determine their intent to improve security posture
    •Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications

    New Integrations Extend Data Protection Beyond Traditional DLP

    Powered by the industry’s leading data loss prevention technology, to give you greater visibility and control over your confidential data.

    •Expanded Information Centric (ICE) Encryption integration
    •Enhanced data classification integration
    •Sensitive Image Recognition
    •Stronger endpoint controls
    •Enhanced data at rest discovery
    •Improved cloud app policy and incident management
    •Flexibility on cloud deployment
    •And More …

    Join Symantec and (ISC)² on Dec 13 at 14:00 (Hong Kong time) and learn about the latest Evolution of Endpoint Security & Data Protection.

    This webinar will be conducted in Cantonese.
  • Natural Language Processing Exposed: The Art, the Science and the Applications
    Natural Language Processing Exposed: The Art, the Science and the Applications Sid J Reddy, Chief Scientist, Conversica Recorded: Dec 12 2017 62 mins
    In this presentation, we will discuss several applications of NLP such as information extraction, knowledge synthesis, and entity retrieval. We will discuss how these fundamental set of algorithms are applicable for a wide array of use-cases and industry verticals such as healthcare, business intelligence, life sciences, legal, e-commerce, sales, and marketing.

    Additionally, case studies from these areas will be used to provide an intuitive explanation of complex NLP topics such as distributional semantics, computational linguistics, question-answering, conversational AI, and applications of deep learning to text data.

    Dr. Sid J. Reddy's Bio: https://www.conversica.com/sid-j-reddy/
  • Shift Left: How testing early and often is best for the business and customer
    Shift Left: How testing early and often is best for the business and customer Nancy Gohring 451 Research and Steve Feloney CA Technologies Recorded: Dec 12 2017 50 mins
    Organizations in most any industry are feeling increasing pressure to move fast. But at what cost? Some have learned the hard way that skipping crucial processes, like testing, damages performance and impacts customer sentiments on your brand. In this case, the fast time to market becomes meaningless.

    Smart businesses are adapting to a shift left strategy. These teams are learning how to incorporate testing early and often in the release cycle, supporting business requirements to move fast while ensuring high-performing products and quality. But getting there isn’t easy. In this webinar, we’ll cover:

    •Testing tools: tool choice is important. Not all tools have been designed to support this new paradigm.
    •Integrations: to be effective, testing tools must integrate easily with the tools and processes modern teams use, including CI/CD and APM products. Further, these tools must be very easy to use, specifically for developers.
    •Organizational models: shifting left requires changes to traditional organizations and culture. We’ll share insight into the successful models we’ve seen.
  • Building a Fast, Scalable & Accurate NLP Pipeline on Apache Spark
    Building a Fast, Scalable & Accurate NLP Pipeline on Apache Spark David Talby, CTO, Pacific AI Recorded: Dec 12 2017 62 mins
    Natural language processing is a key component in many data science systems that must understand or reason about text. Common use cases include question answering, paraphrasing or summarization, sentiment analysis, natural language BI, language modeling, and disambiguation. Building such systems usually requires combining three types of software libraries: NLP annotation frameworks, machine learning frameworks, and deep learning frameworks.

    This talk introduces the NLP library for Apache Spark. It natively extends the Spark ML pipeline API's which enabling zero-copy, distributed, combined NLP & ML pipelines, which leverage all of Spark's built-in optimizations.

    The library implements core NLP algorithms including lemmatization, part of speech tagging, dependency parsing, named entity recognition, spell checking and sentiment detection. The talk will demonstrate using these algorithms to build commonly used pipelines, using PySpark on notebooks that will be made publicly available after the talk.

    David Talby has over a decade of experience building real-world machine learning, data mining, and NLP systems. He’s a member of the core team that built and open sourced the Spark NLP library.
  • Digital Transformation Through Automation
    Digital Transformation Through Automation Carl Lehmann, 451 Research | Ryan Bazler, Kofax Recorded: Dec 7 2017 60 mins
    Organizations across the globe are engaged in what some consider to be another IT buzzword – Digital Transformation. Many though take it seriously, as concerted means to optimize customer experiences, improve business efficiencies, and capitalize on new market opportunities.

    In this webinar Carl Lehmann, Principal Analyst at 451 Research will discuss how industry leading enterprises pursue digital transformation from both business and technical perspectives by:

    •Describing digital transformation and how it is used to create competitive advantage
    •Discussing why and how enterprises are pursuing such initiatives
    •Identifying the critical technology needed for execution
    •Revealing how digital automation platforms improve and enable new ways of doing business
    Attendees will learn how to define and structure digital transformation initiatives unique to their firms and how best to make use of digital automation platforms for IT and business transformation.
  • Your Security Sandbox Won't Catch It All - The Phishing Problem
    Your Security Sandbox Won't Catch It All - The Phishing Problem Ryan Kalember, SVP Cybersecurity Strategies Recorded: Dec 6 2017 45 mins
    Phishing attacks don’t involve malware, but instead they take advantage of people to steal credentials, rendering your sandbox useless.

    Email threats continue to plague organizations around the world, but when thinking about email threats, it’s critical not to focus only on malware. It’s Phishing that actually makes up the majority of threats targeting both organizations and consumers.

    Watch this webinar to learn:
    - How phishing has evolved
    - Phishing threat landscape
    - Top phishing lures that impact employees
    - How Proofpoint can effectively address phishing attacks
  • Five Risks That Could Jeopardize Your Application Security Strategy
    Five Risks That Could Jeopardize Your Application Security Strategy Arxan: Dustin Anders | 451: Scott Crawford Recorded: Dec 5 2017 39 mins
    Applications are ubiquitous and essential to the operation and growth of business in today's digital enterprise. Applications are a treasure trove of customer information, intellectual property, and confidential data. They often contain critical IP, application functionality, data, and keys for accessing back-end corporate systems.

    Many enterprises believe the measures they have taken to protect their networks and endpoints and to develop more secure applications are sufficient to mitigate these risks. But many of these measures only build better fences around applications. Organizations that develop applications, meanwhile, may believe that the measures invested in application security testing and operational defense can mitigate at least the most significant exposures. But when an adversary has the ability to analyze applications closely, organizations may be surprised to discover that the security of sensitive data, their competitive advantage, and keys to accessing critical back-end systems, can be laid bare more easily than they think.

    Compromises to an organization’s applications can create enormous risks that company leaders may rarely consider fully. Breaches to an application can quickly lead to a loss of IP, damage an organization’s brand, violate compliance and regulatory requirements, and even lead to customer harm – consequences abundantly evident in recent high-profile breaches.

    Join us to learn more about the 5 critical areas where application risk management falls short.
  • 5 Mobile App Security MUST-DOs in 2018
    5 Mobile App Security MUST-DOs in 2018 Andrew Hoog (Founder) // Katie Strzempka (VP of Customer Success & Services) // Brian Reed (Chief Mobility Officer) Recorded: Dec 5 2017 48 mins
    To close out the 2017 webinar season, our mobile security expert panel will review the top mobile threats of 2017 (e.g., Cloudbleed, Bootstomp, Broadpwn, and more) and then debate what’s next in mobile app security and mobile app security testing for 2018. Join us for a spirited discussion of the security ramifications of the new iPhone X, iOS 11, Android 8, the latest innovations in the mobile app security testing, and more. Compare your mobile app security and mobile app security testing initiatives with what our experts say should be your top priorities in 2018.

    Live attendees will be entered to win a free mobile app security assessment!
  • How to Use Attack Path Mapping to Prescribe Security Controls. Hosted by ISACA
    How to Use Attack Path Mapping to Prescribe Security Controls. Hosted by ISACA Ed Parsons, Associate Director at MWR InfoSecurity and Naresh Persaud, Sr. Director of Security at CA Technologies Recorded: Dec 5 2017 64 mins
    A new technology has emerged called Attack Path Mapping (APM). APM lets you evaluate the probability of the hacker kill chain and quantify the risks, significantly reducing risks through more effective controls.

    Join Ed Parsons, Associate Director at MWR InfoSecurity and Naresh Persaud, Sr. Director of Security at CA Technologies as they share how APM can help companies think like a hacker, leveraging insight to resolve vulnerabilities.

    What’s more, find out how Scotia Gas Network and National Center for Cyber Security are successfully employing Attack Path Mapping … today.
  • Paytech Driving Fintech Ecosystem while Neobanks Provide Innovative Services
    Paytech Driving Fintech Ecosystem while Neobanks Provide Innovative Services Jean-Noël Georges, Frost & Sullivan, Gijzel Marijne, Digital Payments, Adam Moulson, Form3 Recorded: Dec 5 2017 53 mins
    Digital transformation has already disrupted the traditional payment ecosystem. Now a new subcategory, paytech, is dominating the Fintech revolution. Most innovative services are included in the paytech ecosystem, such as instant, cross-border, mobile, invisible, peer-to-peer or cryptocurrency payments. Furthermore, banks and financial institutions had to digitalize their existing services, creating a new channel with the digital platform. The recent emergence of Neobanks has particularly influenced the historical players by providing innovative approaches leveraging technologies and social media. However, payment services success is based on the perceived confidence future customers will have in the different payment platforms. Trust in the payment service is directly linked to the associated security.
  • Take Control of Your Cloud Billing and Be a Hero
    Take Control of Your Cloud Billing and Be a Hero Miles Betro - Orbitera Solutions Architect Recorded: Nov 30 2017 51 mins
    Do you struggle managing your cloud spend? Are you ever surprised by your cloud bills at the end of the month? Do customer billing inquiries send you into a cold sweat?

    In this webinar you will learn how to:
    - Track your cloud spend, across multiple cloud platforms, any time
    - Quickly generate accurate, easy-to-read bills across public, private and hybrid clouds
    - Optimize margins with flexible payment models and customer-specific pricebooks
    - Manage a unified view of your costs and usage for specific customers or categories

    In addition, we will deliver a live demo of setting up and using cloud billing and budget tools and dashboards. We will also answer live questions from the webinar audience.
  • 2018 Security Predictions
    2018 Security Predictions Bob Hansmann, Director, Security Technologies, Forcepoint Recorded: Nov 30 2017 53 mins
    New security challenges in 2018

    Hackers are already scheming their next wave of targets: will they replicate the colossal Equifax breach and cash in on reams of personal data or freeze up IoT devices simply in order to disrupt critical systems?

    Join Forcepoint's Bob Hansmann, Director, Security Technologies for a Forcepoint 2018 Security Predictions Report webcast on the most pressing security issues for the upcoming year.

    You’ll receive an advance copy of the Forcepoint 2018 Security Predictions Report just for attending.
  • Securing Identities & Earning Consumer Trust in the Mobile Commerce World
    Securing Identities & Earning Consumer Trust in the Mobile Commerce World Al Pascual, Research Dir, Javelin Strategy & Research & Carol Alexander, Sr Dir, Digital Payments Security, CA Technologies Recorded: Nov 30 2017 62 mins
    Mobile is increasingly becoming a part of every consumers’ identity. In fact, it has proven to be at the center of consumers’ financial lives, providing a boon for financial institutions. However, the increasing use of this digital channel is escalating the security risks faced by consumers and institutions.

    Join Javelin Strategy & Research and CA Technologies to learn about such advances in authentication as, real-time behavioral analytics, machine learning, and 3-D Secure 2.0. Advancements that are designed to secure accounts and payments, without overburdening consumers with a friction-laden experience.

    Explore:
    •How the confluence of mobile banking and payments is influencing future standards
    •How consumer expectations are evolving with their mobile channel experiences
    •How financial institutions and service providers should be securing their accounts
  • 진화하는 봇(Bot)의 공격을 방어하라
    진화하는 봇(Bot)의 공격을 방어하라 정덕진, Technical Project Manager II, Akamai Korea Recorded: Nov 29 2017 64 mins
    Bot은 자동화된 프로그램으로, 웹사이트의 정보를 수집하거나, credential abuse와 같은 악성행위를 수행합니다. Bot으로 인한 피해는 IT 측면의 퍼포먼스 저하 뿐만 아니라, 매출 감소, 경쟁력 저하, 비즈니스 기회 상실과 같이 비즈니스에 심각한 영향을 끼치는 경우까지 퍼져 있습니다. Bot을 운영하는 쪽은 심지어 차단을 회피하기 위한 여러 가지 기술까지 활용하여 지속적으로 대응하기 때문에, 차단만이 모든 문제를 해결해 주는 방법은 아닙니다. 점점 다양해지고 지속적으로 변화하고 발전하는 Bot의 공격 방법 등을 알아보고, 이를 효과적으로 관리하기 위한 접근방법 및 기술에 대해 알아봅니다.
  • Introducing StormRunner Functional – Easily Extend your Tests to the Cloud
    Introducing StormRunner Functional – Easily Extend your Tests to the Cloud Robert Gutierrez, Eran Bachar Recorded: Nov 28 2017 61 mins
    Today’s world of testing is a marathon! Testing teams are required to test more environments and mobile devices, without damaging the quality of their applications. They are required to test much earlier in the cycle, and to provide constant visibility, enabling development teams to have a short feedback loop in order to run faster and meet the business demand. This creates a big challenge for testing teams to keep up with the rapid pace of change without compromising on quality.

    In this webinar, Eran will introduce you to StormRunner Functional, the very first and only hybrid test execution service to support the Micro Focus testing tools with Unified Functional Testing (UFT) and UFT Pro (LeanFT), as well as the popular and open source Selenium. Learn how it can help you improve your testing and achieve faster execution times.

    Key Takeaways:

    •Leverage your existing testing assets in a variety of ways: run them remotely to utilize SRF’s on-demand virtual lab or upload them for faster parallel execution and runtime scalability
    •Create new testing assets from scratch using SRF’s online recording service for both web and mobile. This allows you to go “full-SaaS”, from test design to test execution and lab
    •Design and execute your exploratory sessions on all your apps: native, hybrid, and web apps
    •Identify and investigate the changes in your apps with SRF’s advanced root-cause analysis, and submit defects to your defect management tools
  • What's New: The Latest Proofpoint Email Security Release
    What's New: The Latest Proofpoint Email Security Release Jeff Burstein, Sr. Director, Product Management Recorded: Nov 28 2017 40 mins
    Proofpoint always strives to offer the most advanced security to our customers and invests around 20% of our revenue back into R&D.

    The latest Proofpoint Email Security release has added additional defenses against a changing threat landscape. Join this webinar to learn how upgrading to the latest version brings significant benefits across email security including:

    * Email Authentication
    * Attachment Sandboxing
    * Data Loss Prevention
    * Encryption
  • Are you Ready for Australia's Privacy Act? A Gemalto Case Study
    Are you Ready for Australia's Privacy Act? A Gemalto Case Study Jean -Pierre Mistral, Legal Counsel for Data Privacy and Graeme Pyper, Regional Director of Enterprise and Cybersecurity Recorded: Nov 22 2017 61 mins
    Join us for part two of our webinar series focused on helping companies prepare for the upcoming Australian Privacy Act and global government regulations, like European General Data Protection Regulation (GDPR).
    Data sovereignty, especially for cloud first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.

    This follow up webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our legal counsel for global data privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Graeme Pyper, Regional Director for New Zealand and Australia, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.

    Join us to hear more about:
    •The Mandatory Data Breaches scheme
    •Case Study: A look at how Gemalto is preparing for Australia’s NDB & GDPR
    •The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations