Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • Hunting Criminals with Hybrid Analytics, Semi-supervised Learning, & Feedback
    Hunting Criminals with Hybrid Analytics, Semi-supervised Learning, & Feedback David Talby, CTO, Atigeo Recorded: Aug 23 2017 62 mins
    Fraud detection is a classic adversarial analytics challenge: As soon as an automated system successfully learns to stop one scheme, fraudsters move on to attack another way. Each scheme requires looking for different signals (i.e. features) to catch; is relatively rare (one in millions for finance or e-commerce); and may take months to investigate a single case (in healthcare or tax, for example) – making quality training data scarce.

    This talk will cover a code walk-through, the key lessons learned while building such real-world software systems over the past few years. We'll look for fraud signals in public email datasets, using IPython and popular open-source libraries (scikit-learn, statsmodel, nltk, etc.) for data science and Apache Spark as the compute engine for scalable parallel processing.

    David will iteratively build a machine-learned hybrid model – combining features from different data sources and algorithmic approaches, to catch diverse aspects of suspect behavior:

    - Natural language processing: finding keywords in relevant context within unstructured text
    - Statistical NLP: sentiment analysis via supervised machine learning
    - Time series analysis: understanding daily/weekly cycles and changes in habitual behavior
    - Graph analysis: finding actions outside the usual or expected network of people
    - Heuristic rules: finding suspect actions based on past schemes or external datasets
    - Topic modeling: highlighting use of keywords outside an expected context
    - Anomaly detection: Fully unsupervised ranking of unusual behavior

    Apache Spark is used to run these models at scale – in batch mode for model training and with Spark Streaming for production use. We’ll discuss the data model, computation, and feedback workflows, as well as some tools and libraries built on top of the open-source components to enable faster experimentation, optimization, and productization of the models.
  • Technical Deep Dive: Building a Modern Portal For Your Digital Workforce
    Technical Deep Dive: Building a Modern Portal For Your Digital Workforce Omar ElNaggar, Sr. Product Manager at Sapho, Natalie Lambert, VP of Marketing at Sapho Recorded: Aug 23 2017 37 mins
    Do your employees struggle to access and analyze information that sits across multiple systems? Do they delay completing tasks that require they login to yet another system? Employees are now pushing back against legacy systems – both on-premises and SaaS – and demanding more modern applications to complete their work. Unfortunately, you have spent millions of dollars on software and replacing them is not an option. The question: how do you meet employee expectations for more user-friendly tools without costly upgrades or throwing out your existing systems? Answer: a modern portal.

    Sapho’s modern portal surfaces personalized and relevant tasks and data to employees using micro apps. Sapho micro apps are built by IT on top of your existing systems using a simple micro app builder and pre-built templates. These micro apps – available on any device, intranet, or messenger app – provide employees with proactive notifications about interesting system data, actions that need to be completed, and changes in business data that require attention. With Sapho, employees can complete work faster and make better decisions, improving their overall productivity and effectiveness.

    In this webinar, we will show you how easy it is to build a modern portal that:

    - Connects to your existing systems with pre-built connectors for systems such as SAP, Oracle, Concur, Salesforce, or ServiceNow
    - Surfaces event-driven micro apps, that you can build in just 15 minutes to deliver simplified workflows and data access
    - Is accessible by employees from any device, intranet, or messenger allowing them to complete actions and review information from anywhere
  • What is an Identity Provider (IdP) and Do You Need One?
    What is an Identity Provider (IdP) and Do You Need One? Stephen Allen, Authentication Expert at Gemalto Recorded: Aug 23 2017 47 mins
    The explosion of cloud-based applications in the enterprise is making IT and security professionals rethink their cloud identity management strategy. By default, every cloud user creates an average of 17 cloud identities. But catering to 17 different user stores per employee or partner is simply not scalable from an administration perspective. And as if IT’s time is not precious enough, password resets account for 20% of helpdesk tickets. This adds to the compliance and security risks associated with cloud-based applications, which by default require only weak static passwords and offer no central point of management across disparate cloud-based services.

    Join Stephen Allen, Gemalto Product Manager for Authentication and Access Management, and learn how deploying an Identity Provider enables:

    •Cloud Single Sign-On for easy access to cloud apps
    •Regulatory compliance with standards such as PCI DSS
    •Reduced identity lifecycle overheads
    •Centralized management of cloud access policies
    •Increased security with step-up authentication
  • Using Predictive Analytics to Empower Customer Experience
    Using Predictive Analytics to Empower Customer Experience Patrick Rice, CEO, Lumidatum Recorded: Aug 23 2017 44 mins
    Predictive analytics & artificial intelligence are transforming the way all companies connect with customers. The customer experience is on the verge of being completely redefined with A.I.

    In this talk, you will learn what it takes for a business to deliver this new 21st-century customer conversation. Patrick will cover:

    - Collecting & Managing CX data - What I learned analyzing 3 billion records at Amazon
    - We have the data, now what? AI & the Future of Customer Experience
    - How to use Predictive Analytics to find the right customer on the right channel
    - 3 ways to drive ROI for your business by applying AI to improve the Customer Experience

    Patrick is CEO of Lumidatum which helps CMOs apply artificial intelligence to the customer experience in order to grow revenue. He has been in the data and analytics space for over a decade including running a machine learning and advanced analytics team at Amazon.
  • Solving for compliance: Mobile app security for banking and financial services
    Solving for compliance: Mobile app security for banking and financial services Brian Lawrence, NowSecure Security Solutions Engineer Recorded: Aug 22 2017 29 mins
    Mobile apps fall in scope for a number of regulatory requirements that govern the banking and financial services industries, such as: guidelines from the Federal Financial Institutions Examination Council (FFIEC), the Gramm–Leach–Bliley Act (GLBA), New York State cybersecurity requirements for financial services companies, the Payment Card Industry Data Security Standard (PCI DSS), the Sarbanes-Oxley Act, and more. Luckily, a repeatable mobile app security assessment program and standardized reporting go a long way in both achieving compliance objectives and securing mobile apps and data.

    Join us for a 30-minute webinar during which NowSecure Security Solutions Engineer Brian Lawrence will explain:
    -- How and where exactly mobile apps fall in scope for various compliance regimes
    -- Mobile app security issues financial institutions must identify and fix for compliance purposes
    -- How assessment reports can be used to demonstrate due diligence
  • Managing Complexity in the World of Predictive
    Managing Complexity in the World of Predictive Dr. Megan Sheehan and Vandan Nayak, HPE Recorded: Aug 22 2017 32 mins
    If you haven’t already, we recommend you listen to the first webinar in this series, the 9-minute overview by our SVP and GM Raffi Margaliot as he introduces the three core disruptions facing application delivery teams today.

    Software development teams are under pressure to release faster while maintaining the same level of quality—or ideally increasing it. This has significantly increased application lifecycle complexity to the point of chaos. Join us, as we discuss how application development teams can leverage HPE’s ALM Octane, an integrated lifecycle management solution, along with advanced analytics to mitigate the risks in application delivery and optimize their resource investments. Learn how to scale Agile and DevOps processes with data driven insights and prescriptive guidance.
  • Challenges in Building Connected Communities
    Challenges in Building Connected Communities Kate Garman, Jascha Franklin-Hodge, Peter Marx, Limor Schafman Recorded: Aug 21 2017 76 mins
    Creating a seamless connected environment that supports smart community citizen services, streamlines operations, supports economic development is already a challenge for community officials. There are many different needs and directions to begin the conversion to an “intelligent” environment. Communities are also planning and building not just for current needs, but also for future connectivity infrastructure that will be used by autonomous vehicles, smart buildings, connected homes, AR/VR, eRetail, eHealthcare, smartgrid and more.

    This webcast will discuss such questions as:
    > What issues are city officials prioritizing for resolution through smart community applications?
    > How are communities planning for and deploying small cell infrastructure?
    > Which departments are involved in communications infrastructure?
    > How can suppliers navigate the multiple departments involved in decision making?
    > What business models are cities negotiating with their technology product partners?
    > What are some of the lessons learned from cities that you can translate into your own business offering?

    Speakers:
    Jascha Franklin-Hodge, CIO, Boston, MA
    Kate Garman,Smart City Coordinator, Seattle, WA
    Peter Marx, former CTO, City of Los Angeles, currently in the position of VP, GE Digital
  • Destination: 3-D Secure 2.0 - Hosted by PYMNTS.com
    Destination: 3-D Secure 2.0 - Hosted by PYMNTS.com Ankur Karer, Director of Payment Security Presales, CA Technologies Recorded: Aug 18 2017 61 mins
    After a 17-year journey through hardships & learning experiences, 3-D Secure is finally undergoing a much-needed overhaul. EMVCo has released EMV 3-D Secure 2.0 (3DS 2.0); optimized for mobile and traditional web browser transactions.

    The new protocol delivers important additional e-commerce transaction metadata, including an extensive set of device data. This enhanced data will facilitate even greater fraud prevention gains for customers, who participate in cardholder authentication programs based on 3-D Secure.

    Join Ankur Karer, Director of Payment Security Presales at CA Technologies to learn how 3-D Secure 2.0 is poised to change online payments authentication.
    • Discover the key drivers that influenced this indisputable transformation
    • Evaluate the important benefits for mobile and in-app purchases
    • Analyze the significant new data elements to combat fraud
  • B2B video marketing: Turn your CRO into your BFF
    B2B video marketing: Turn your CRO into your BFF Michael Ballard,Sr Manager Digital Marketing, Lenovo Recorded: Aug 17 2017 62 mins
    You better get good at conversational video marketing, fast—or you're going to be obsolete.

    Videos and photos get the most retweets. Last year, Facebook's video viewership doubled from 4 billion views per day to 8 billion views per day in seven months. Google owns YouTube, and coincidentally, rich media is a favorite of the search engine's algorithms.

    Conversational videos drive traffic, boost engagement, and serve up information better than any other medium. They promote trust in your brand and your products. They're eminently shareable, potentially viral, and taking over the internet: 74 percent of all Internet traffic in 2017 will be video.

    Step up and stand out in every step of the sales funnel with conversational video marketing when you join our latest interactive VB Live event.

    By watching this webinar, you'll:
    * Optimize your audience takeaways for video content
    * Get tips from the savviest sales and marketing people on their video content strategy
    * Focus your energy on the right distribution channels for your adverts
    * Personalize video content to lock in the close

    Speakers:
    * Michael Ballard,Sr Manager Digital Marketing, Lenovo
    * Todd Hartley, CEO, Wirebuzz
    * Stewart Rogers, Director of Marketing Technology, VentureBeat

    This VB Live event sponsored by Vidyard
  • GDPR Privacy Impact and Risk Assessments
    GDPR Privacy Impact and Risk Assessments Ariel Evans, CEO, InnoSec Recorded: Aug 17 2017 49 mins
    - InnoSec is the winner of the EU commission Horizon 2020 grant based on its innovation in GDPR and cyber risk -

    GDPR is an urgent issue that has companies scrambling to be compliant by May of 2018. Any organization that processes EU citizen data is in scope and the penalties are severe.

    Alignment with the requirements can reduce the chances of triggering a Data Protection Authority (DPA) to investigate a company’s privacy practices after the GDPR takes effect in May 2018. DPAs can impose a fine on companies of up to 4% of annual global revenues for egregious violations of the GDPR. Member states can also add to these fines. The Netherlands, for instance, has more than doubled its own fining capacity to 10% of annual revenues. European privacy advocates are pressuring DPAs to fully exercise these new powers after May 2018.To manage this risk, multinationals should have a means to demonstrate alignment with the GDPR requirements and communication of this program with DPAs that have jurisdiction over their major European operations.

    InnoSec’s GDPR solution provides privacy impact and risk assessments which measure the confidentiality and integrity of the system and the risk associated to it meeting articles 1,2, 5, 32, 35 and 36. Additionally, we provide a readiness gap analysis for managing, planning and budgeting for GDPR.

    Most e-commerce, educational and multi-national organizations process EU citizen data and are in scope for GDPR. Moreover, most organizations are not ready according to Gartner and his means the race to the finish line requires as much automation as you can afford. InnoSec provides a means for companies to save money and time with their GDPR assessment and gap analysis offering.. Our GDPR offering automates the assessment process and provides a gap analysis readiness feature, that also ensures that organizations can plan, budget and manage their GDPR program.

    Come to this webinar to see how it is done.
  • Privacy Level Agreement Code of Conduct for CSPs: a compliance tool for GDPR
    Privacy Level Agreement Code of Conduct for CSPs: a compliance tool for GDPR Nicola Franchetto of ICT Legal Consulting Recorded: Aug 17 2017 60 mins
    Nicola Franchetto will discuss in a practical and business oriented way, the new provisions of the GDPR and how the PLA Code of Conduct supports compliance with the forthcoming EU Data Protection Legislation. More precisely, Franchetto will highlight the true privacy compliance “game changers” introduced by the GDPR and offer the audience practical inputs on how to set up a sound and effective corporate Data Protection Compliance Programme, which will also include having a PLA in place with Cloud Service Providers.
  • Using Open Standards to Comply with GDPR
    Using Open Standards to Comply with GDPR Tommaso De Orchi, Solution Manager (EMEA), Yubico and Nic Sarginson, Solutions Engineer (EMEA) Recorded: Aug 17 2017 33 mins
    The EU General Data Protection Regulation (GDPR) was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens’ data privacy, and to reshape the way organizations across the region approach data privacy. Acknowledging identity threats like phishing and man-in-the-middle attacks, the GDPR applies to all companies processing and holding the personal data of those residing in the European Union, regardless of the company’s location.

    An excerpt from the GDPR describes authentication as ‘key to securing computer systems’ and as the first step ‘in using a remote service or facility, and performing access control’. The document also outlines various GDPR-compliant authentication solutions, such as smart card, OTP push apps, and FIDO Universal 2nd Factor (U2F).

    Yubico’s enterprise solution - the YubiKey - combines support for OpenPGP (an open standard for signing and encryption), FIDO U2F (a protocol that works with an unlimited number of applications), and smart card / PIV (a standard that enables RSA or ECC sign/encrypt operations using a private key stored on the device) all in one multi-protocol authentication device. This makes it a strong and flexible solution for companies required to comply with GDPR. Attend this webcast and learn:

    •How GDPR will impact the way organizations worldwide store and access the personal information of EU citizens
    •How to leverage open standards to achieve GDPR compliance for strong authentication
    •How a multi-protocol authentication device protects organizations from phishing and man-in-the-middle attacks
  • 5G in Asia Pacific, Forecast to 2022
    5G in Asia Pacific, Forecast to 2022 Quah Mei Lee, Industry Principal - Telecoms & Payments Strategy, Digital Transformation Practice, Frost Sullivan Recorded: Aug 17 2017 17 mins
    5G is on its way. It may be closer to 2019-2020 for some but for others, it may be 2023-2025 before it materializes. In all the countries that are frontrunners of 5G in Asia-Pacific, 5G is benefiting from local government support coupled with local demand or at least the potential for demand for 5G services. The demand may be incentive or market driven.

    The market for 5G is expected to have reached $4.50 billion by 2022 with 280.4 million 5G subscriptions. The implementation timeline for MNOs will vary from country to country, albeit not as widely as it was with 3G or 4G. Frost and Sullivan expects that government support for 5G in populous countries such as China and India and new business models that will emerge out of the trials by MNOs at the upcoming Olympics will support high service revenue growth at CAGR of 315.1% from 2019 to 2022.

    5G will trigger a quicker transition to distributed, cloud native networks that leverage on NFV, SDN, and MEC to reduce cost to serve and improve on efficiency and profitability for MNOs. Further, with 5G offering latency below 1ms and larger bandwidths, mobile networks can gain an edge over fibre networks and regain competitiveness.
    If you have any client that has an interest in gaining an in depth understanding of 5G developments in Asia Pacific, this study will help address questions such as:
    •How will 5G impact industry?
    •What are the market challenges and opportunities?
    •What are the key drivers for growth?
    •How big will the market be for 5G by 2022?
  • Securing BYOD Without MDM Hassles
    Securing BYOD Without MDM Hassles Shalmali Rajadyax, Product Manager at Bitglass Recorded: Aug 16 2017 50 mins
    With the increasing demand for BYOD in the workplace, many organizations are adopting Mobile Device Management (MDM) solutions. However MDM is seen by many as cumbersome and invasive and has struggled to see meaningful adoption among employees. Fortunately, Cloud Access Security Brokers (CASBs), like Bitglass, offer an easy-to-use alternative for securing corporate data stored in public cloud applications on both managed and unmanaged devices.

    Join this interactive webinar session to learn:
    - The challenges companies face while deploying MDM
    - Alternative solutions used to secure employee-owned devices without agents
  • 6 Key Tech Disruptions and Our Point of View
    6 Key Tech Disruptions and Our Point of View Chris Hsu Recorded: Aug 16 2017 63 mins
    HPE Software EVP & GM Chris Hsu hosts: 6 Key Tech Disruptions and Our Point of View

    As part of the planned Software spin-off and merger with Micro Focus, HPE’s Software organization is undergoing a major transformation to shape the combined company as uniquely positioned to help customers on challenges across a hybridized environment.

    And hybrid is much more than a buzzword. In today’s reality, not only do businesses have to deal with the rapidly changing technologies and multiple deployment models, but they also have to deal with the pressure of reducing their run costs and to constantly innovate.

    During this transformation, we have interviewed thousands of customers, conducting deep market research, allowing us to gain unprecedented market insights. Join this webcast and learn about the new waves of tech disruptors, and how, our combined, software pure-play company is going to shape the industry.

    “When you prepare for a global merger of this scale, it gives each company an unprecedented opportunity to look at all of their processes and take steps to optimize. We have had the luxury of stepping back and asking how do we transform our IT platform to support our strategy for tomorrow? Few of us ever get this opportunity.”
  • Hybrid Mobile Apps: From Security Challenges to Secure Development
    Hybrid Mobile Apps: From Security Challenges to Secure Development Dr. Achim D. Brucker, Security Consultant & Senior Lecturer, University of Sheffield Recorded: Aug 16 2017 35 mins
    Cross-platform frameworks, such as Apache Cordova, Adobe PhoneGap, or SAP Kapsel are becoming increasingly popular. They promote the development of hybrid apps that combine native, i.e., system specific, code and system independent code, e.g., HTML5/JavaScript. Combining native with platform independent code opens Pandora's box: all the security risks for native development are multiplied with the security risk of web applications.

    In this talk, we will give a short introduction into hybrid app development, present specific attacks and discuss how Android developers are using Apache Cordova. In the second half of the talk, we will focus on the secure development of hybrid apps: both with hands-on guidelines for defensive programming as well as recommendations for hybrid app specific security testing strategies.

    Speaker bio:

    Dr. Achim D. Brucker (https://www.brucker.ch) leads the Software Assurance & Security Research Team (https://logicalhacking.com) at the University of Sheffield, UK. Until December 2015, he was a Security Testing Strategist in the Global Security Team of SAP SE, where, among others, he defined the risk-based security testing strategy of SAP. He is a frequent speaker at security conferences.
  • The Imminent Smart Device Mutiny
    The Imminent Smart Device Mutiny Amar Singh & Chris Payne Recorded: Aug 16 2017 59 mins
    Are we filling our homes and carrying around in our pockets, our biggest cybersecurity vulnerabilities? Join us in a lively debate where we will discuss the increase in IoT and smart devices, some of the lesser talked about threats and what steps are being taken to reduce the risk to the imminent smart device mutiny of future.
  • Inventing the Future: Mobile-First Learning
    Inventing the Future: Mobile-First Learning Dan Rivera, Aruba Product Solutions Manager, K12 & Frankie Jackson, Cypress Fairbanks ISD Asst. Superintendent, CTO Recorded: Aug 15 2017 62 mins
    Learning is transforming! With new technology being introduced into the classroom at breakneck speeds, it may seem impossible to stay ahead of the curve. While mobile learning, collaborative environments and cloud-based apps put a higher demand on the wired and wireless infrastructure, the advent of IoT puts stress on the network like never before. With a projected 30 billion new IoT devices coming in the next three years, what do you need to do to prepare your network?

    Join us to learn how Cypress Fairbanks ISD began Inventing the Future. During the webinar we will discuss:

    •Creating future-ready educational environments
    •Key Trends in K12
    •Challenges – The Solvable, the Difficult and the Wicked
    •EdTech Developments

    Speakers
    Dan Rivera, Aruba Product Solutions Manager, K12
    Frankie Jackson, Cypress Fairbanks ISD Asst. Superintendent, CTO
  • Trust and Privacy Online: Managing your Business Identity
    Trust and Privacy Online: Managing your Business Identity Leon Brown, Geoffrey Noakes and Jeff Barto from Symantec Recorded: Aug 15 2017 49 mins
    With more and more transactions happening online, and a dramatic increase in incidents involving brands and fraudsters on the Web, the concept of online trust has never been so vital for businesses. In this webinar you will learn how to help prevent these incidents by leveraging the Web PKI to display your business identity online: we will explain the principles of trust through business authentication and how to show your identity to your visitors thanks to various types of digital certificates.

    We will run through the benefits of business authentication, what the current best practices and policies are for both e-commerce and Enterprise businesses when it comes to trust, what is mandatory and what is coming. We will help you clarify priorities for your business and provide some action plans.
  • Securing India's Aadhaar Numbers as per UIDAI's Mandates
    Securing India's Aadhaar Numbers as per UIDAI's Mandates Nanda Mohan Shenoy, CAIIB, CISA - Bestfit Business Solutions and Prasun Srivastava - Solution Expert, IDP, Enterprise & Cyber Recorded: Aug 11 2017 60 mins
    The India's Unique Identification numbers (UIDs), also named "Aadhaar numbers" contain Personally Identifiable Information (PII), the Unique Identification Authority of India (UIDAI) has mandated that the private cryptographic keys used to digitally sign and authenticate the UIDs must be stored in a Hardware Security Module (HSM).

    In addition to HSMs, the UIDAI has also mandated the use of tokenization – replacing sensitive data with a token that can be securely stored, processed and transmitted as of August 2017.

    Join this live webinar to know more about how to easily conform to the mandate:
    •What is UIDAI's requirements?
    •Why HSM and tokenization?
    •How to ensure Aadhaar numbers are protected?
    •What makes Gemalto's SafeNet Luna HSM and KeySecure unique?
    •How to meet UIDAI's compliance mandates?
  • DataMotion SDX: Secure Data Exchange Services Platform
    DataMotion SDX: Secure Data Exchange Services Platform Presentation Narrator Recorded: Aug 7 2017 12 mins
    Learn about secure data exchange services, why they are needed, examples of customer use cases and data flows, and the underlying DataMotion SDX Services Platform architecture.
  • High Scale, High Stakes: Adjusting Focus and Investment at the Network Gateway
    High Scale, High Stakes: Adjusting Focus and Investment at the Network Gateway Dan Cummins, Senior Analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing with Symantec Recorded: Aug 2 2017 50 mins
    As cloud continues to erase the network perimeter, it’s more important than ever to align IT infrastructure to track more closely to the businesses it serves.

    As a result, gateway technology choices and investments need to fit the cloud model and fit in terms of security use case, value, and real-world business requirements.

    Join Dan Cummins, analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing at Symantec, for an informative webinar on August 2 to hear a discussion of network security today.

    Agenda:

    - Discussion on the increased dependence on HTTP and HTTPS

    - The limitations of Firewalls in the web and cloud world

    The increasing critical need for web gateways, both on premise and in the cloud, for achieving:

    - Access governance for users and devices

    - Verifiable protection against advanced attack methods

    - Agile risk management and measurable return on investment.

    Important opportunities are at hand right now to integrate network and cloud-based approaches to achieve coordinated and robust anti-malware, privacy, policy and connectivity capabilities, while continuing on a path to flexible, software-defined infrastructure.

    Register Today
  • Data scientists: Can't live with them, can't live without them.
    Data scientists: Can't live with them, can't live without them. Wyatt Benno, CEO, DataHero Aug 24 2017 3:00 pm UTC 45 mins
    There has been a flood of publicity around big data, data processing, and the role of predictive analytics in businesses of the future.
    As business operators how do we get access to these valuable business insights, even when there is not a data analyst around to walk us through their results?

    - Should your software emulate a data scientist?
    - Learn about the power of data visualizations.
    - Learn about creating value from disperse data sets.
  • Mobile advertising: Stop fraud and step up clicks
    Mobile advertising: Stop fraud and step up clicks James Peng, Head of Mobile and Social Acquisition, Match Group Aug 24 2017 5:00 pm UTC 60 mins
    It's 2017 and the digital ad space hasn't stopped growing in size and complexity. Mobile advertisers are seeing increased opportunities for ad placements in apps and messaging platforms, which means more opportunities, but also new marketing challenges—and a major surge in fraud.

    Make this the year you stop letting fraudulent bots burn through your budget and start maximizing the power of mobile advertising with must-click messaging. Join our latest live, interactive event for an in-depth look at how to stay in front of your audience, ahead of your competitors, and on top of fraud.

    In this webinar you'll:
    * Learn what works and what doesn't in 2017's mobile advertising arena
    * Mitigate the mobile advertising fraud risk in your own applications
    * Create the most engaging mobile advertisements for savvy app patrons
    * Use video and 360 advertising to stay abreast of the latest trends in mobile advertising

    Speakers:
    * James Peng, Head of Mobile and Social Acquisition, Match Group
    * Stewart Rogers, Director of Technology, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Adjust
  • Delivering Serious ROI through Intelligent Assistants
    Delivering Serious ROI through Intelligent Assistants Opus Research, Synthetix Aug 29 2017 5:00 pm UTC 45 mins
    With ever-mounting pressure on customer experience, marketing and contact center professionals to deliver and chatbots and virtual agents, deploying an enterprise intelligent assistant requires a comprehensive business plan and deployment strategy.

    In this webinar, Opus Research and representatives from Synthetix, outline:
    •Differences between glorified FAQs and intelligent assistants
    •Choosing the right technology to enable ROI
    •How to build a successful business case
    •Real-world lessons learned from a intelligent assistant case study
  • Combat cyber fraud with security orchestration
    Combat cyber fraud with security orchestration Will LaSala, Director Security Solutions, VASCO Aug 29 2017 6:00 pm UTC 60 mins
    Combat cyber fraud with security orchestration without slowing down your customers

    With everything in the enterprise going all digital, bypassing traditional security mechanisms in favor of instantaneous, user-convenient transactions increases the risk to the business exponentially. Accessing confidential employee files electronically, e-signing contracts, or allowing your customers to transfer money via a mobile app without cumbersome verification steps makes you and your customer prone to cyber fraud.

    So, what is a digital business to do? You can’t very well remove security completely from your strategy. And, as passwords become obsolete, users increasingly want solutions that are invisible as well as convenient.

    Security Orchestration may be the answer to the growing security concerns of your digital enterprise. Join this webcast lead by VASCO Data Security and learn how to keep your digital enterprise secure without slowing down customers or their transactions.

    Topics of discussion will include:
    •The role of Digital Trust and Orchestration in using frictionless security mechanisms such as:
    oBehavioral authentication
    oStep-up authentication for risky behavior
    oBiometric authentication including fingerprint scan or face recognition
    oReal-time monitoring
    oContainer security for mobile apps
    •Using security orchestration to improve user experience
  • Eight Telecom Expense Solutions Gartner Missed
    Eight Telecom Expense Solutions Gartner Missed Hyoun Park Aug 31 2017 5:00 pm UTC 30 mins
    Recommended Audience: Telecom Directors and Managers, Network Directors and Managers, Mobility Directors and Managers, IT Procurement, IT Finance, IT Architects

    Amalgam Insights has been covering the Telecom Expense Management (TEM) market for over a decade. In May of 2017, Gartner released "Market Guide for Telecom Expense Management Services, 2017". In this guide, Amalgam believes that eight key vendors were overlooked that can provide enterprise-grade services and represent billions of dollars in technology spend including:

    * A pioneer in Robotic Process Automation
    * The largest standalone TEM in Europe
    * A SaaS solution partnering with IBM, Unisys, and Verizon
    * A Fortune 1000-focused vendor with 100% referenceable clients
    * A fast-growing technology management platform built on ServiceNow
    * A commercial and government-focused vendor with over 4 million lines under management
    * The largest Australian provider with over 500,000 items under management
    * One of the Bay Area's best rated places to work with spend management expanding to IoT, data center, & SD-WAN
  • Virtualization: Impacts on Performance Assurance and Business Models
    Virtualization: Impacts on Performance Assurance and Business Models Moderated by Limor Schafman, TIA Sep 6 2017 3:00 pm UTC 60 mins
    The push to virtualize communication networks, control centers, and data centers through NFV and SDN technologies offers both great opportunity for management, speed to market, scale and business, and also brings many challenges. Efficiency, cost management, ensuring SLAs, managing OPED and CAPEX, reducing product production costs are all business concerns faced by communications providers as they convert their networks to be increasingly software driven. What are the new business models that software enables? What are the customer expectations for new service deliverables? How can service providers, data centers and others guarantee quality of service? What tests are being conducted and what industry practices are being established? This webcast will review how companies are meeting the challenge of operating with new processes and with new requirements.
  • Monetizing VR: Turning the magic into money
    Monetizing VR: Turning the magic into money Charlie Fink, VR columnist, Forbes Sep 6 2017 5:00 pm UTC 60 mins
    VR has sprouted a lot of startups, but not a whole lot of revenue yet. Yet the theory is that where there’s investment, there’s got to be fire. In this new wave of VR technology, refined console headsets are being set loose in the world, and mobile VR and mobile 360 are growing more popular with consumers. So it’s time to start thinking about a monetization strategy.

    In mobile, for instance, freemium with a combination of ads and in-app purchases is the powerhouse that generates over 95 percent of revenues. For consoles, downloadable and extended content plus microtransactions are the big money makers. But virtual reality is an entirely new way of interacting with content. Will consumers be willing to stand through advertisements? Will they trust a virtual reality payment method, or is the technology too new to engender consumer confidence?

    In this VB LIve event, you’ll learn about:
    The future of VR payments, commerce, and innovation
    How payments technology is revolutionizing VR/AR experiences
    The challenges that emerge from the consumer and merchant side
    The global perspective of VR/AR and where it is headed

    Speakers:
    * Stewart Rogers, Director of Marketing Technology, VB
    * Cleveland Brown, CEO, Payscout
    * Charlie Fink, VR columnist, Forbes
    * Rachael Brownell, Moderator, VentureBeat
  • How to Protect Data in the Cloud
    How to Protect Data in the Cloud Brian Lozada, CISO of Zocdoc, and Karthik Venna, Product Manager at Bitglass Sep 12 2017 5:00 pm UTC 60 mins
    Driven by ease of deployment, cost effectiveness, and improved productivity among employees, many organizations have adopted cloud technology. Although there are significant benefits to cloud adoption, some organizations still face major challenges preventing their move to the cloud. From maintaining security and compliance to managing data on BYO devices, organizations have a unique set of data security requirements.

    In this webinar, Brian Lozada, CISO of Zocdoc, and Karthik Venna, Product Manager at Bitglass, will discuss how to balance the benefits of moving to the cloud with implementing a security solution that protects data end-to-end.

    - Find out the benefits of moving to cloud apps
    - Understand how to maintain control of your data
    - Learn how to use your partner ecosystem to keep your data secure
  • Beyond GDPR: Best Practices for Data Protection
    Beyond GDPR: Best Practices for Data Protection Aaron Davis, Senior Product Marketing Manager, PKI and Juan Asenjo Senior Partner Marketing Manager, Thales e-Security Sep 14 2017 3:00 pm UTC 60 mins
    In this webinar, we will examine the key elements necessary to protect sensitive data. The focus will be on comprehensive security aspects that enterprises need to consider going forward. The webinar will expand on how the General Data Protection Regulation (GDPR) is just the beginning; a set of best practices that every organization should adhere to, not just in the EU but globally, to use security as an enabler for a safe digital future.
    Topics discussed will include the expanded ecosystem of users, devices, applications, and things that must coexist in a trusted environment, as enterprises transform operations to depend on an all-digital infrastructure.

    Join the webinar to learn:

    • Why GDPR is only the beginning - cutting through the noise
    • How digital business is driving new approaches to data security
    • What are the best practices for improving data hygiene
  • Android “O” and iOS 11 security updates: What you need to know
    Android “O” and iOS 11 security updates: What you need to know Michael Krueger, NowSecure Mobile Security Analyst // Tony Ramirez, NowSecure Software Support Engineer Sep 14 2017 6:00 pm UTC 45 mins
    Google and Apple will release major updates to the Android and iOS operating systems in the coming months, and beta versions of Android “O” and iOS 11 include a number of security enhancements. During this webinar, NowSecure Mobile Security Analyst Michael Krueger and Software Support Engineer Tony Ramirez will provide an overview of the security updates in both new releases and explain:
    -- Changes in iOS 11 that provide better security for app data in transit
    -- App permissions updates in Android O
    -- How Android O and iOS 11 updates affect mobile app security assessments
  • Digital Transformation: how Europe will turn disruption into differentiation
    Digital Transformation: how Europe will turn disruption into differentiation Nick Patience 451 Research, Matt Leonard CenturyLink Sep 20 2017 2:00 pm UTC 60 mins
    Join 451 Research and CenturyLink on the 20th September at 3:00pm UK time, 4:00pm CET, to discuss how enterprises are choosing and deploying digital transformation initiatives for business gain. This webinar will focus on the strategies and actions impacting the European market.

    Organisations of all sizes and in every sector are busy redefining their IT priorities for a digital future, identifying the goals of enhanced customer experience, operational efficiency, business agility and improved risk management as four key pillars for their digital transformation strategies.

    Digital transformation can play out differently depending on a company’s maturity, the vertical sector in which it operates, its employees, its infrastructure, and its ability to innovate. Knowing where to start, and how to maintain momentum is critical.

    Join 451 Research and CenturyLink to learn how European enterprises are making assured first steps, and discover the following:

    - Understand how companies with more progressive digital transformation strategies are prioritising their efforts for competitive differentiation, changing the nature of their business with innovative technologies, and making service provider choices to accelerate results.

    - Gain insights and recommendations from a major survey of the IT priorities of enterprises in Europe.

    - Identify the key shifts in business context that will continue to shape digitisation efforts, and how these need to be reflected in a digital transformation roadmap for IT organisations.
  • IoT and Smart Buildings: The New Construct
    IoT and Smart Buildings: The New Construct Moderated by Limor Schafman, TIA Sep 20 2017 3:00 pm UTC 60 mins
    Real estate developers, owners and tenants are rethinking the office building experience. Not only are buildings becoming increasingly efficient in in-door energy management and operations, they are also beginning to interact with the people who work within the walls, and with the out of doors environment. This type of sentient building design is making use of increased connectivity to and in buildings, as well as the use of sensors and IoT applications. This webcast will discuss communications and connectivity infrastructure that is being deployed in and to current real estate developments; what buiding owners, operators and tenants expect; the impact smart community development is having on smart buildings; and sample smart building IoT applications.
  • Connected devices and the rise of invisible payments
    Connected devices and the rise of invisible payments Kevin Gordon, Lead Innovation Architect, Worldpay Sep 20 2017 4:00 pm UTC 30 mins
    By 2020, five billion people will be online, with 25 billion devices and machines using the Internet. Many devices will share data and services, and the way we engage with them will fundamentally change. In a connected world, consumer expectations of executing transactions on a phone, tablet, VR device – or even a refrigerator – will be higher than ever.

    As time goes on, devices will become smarter and make more and more decisions for us. We’ll be able to create rules as users to tell our devices what we’re comfortable with them paying for automatically. The use cases for rule-based payment are endless!

    As such, the onus of creating frictionless download and shopping experiences while overcoming barriers between devices lies with each business. When it comes to recurring and subscription payments, the technology underpinning these user experiences across devices is critical. Seamless, simple, and secure are the watchwords of an IoT world.

    Don’t wait until 2020 to address consumer pain points and overcome technological barriers to IoT adoption. Tune in to the latest VB Live event and hone in on the fastest, best ways to prepare for the IoT world. After all, it’s already here. Attend this webinar and find out:

    •How companies are already dealing with device connectivity
    •How the challenges posed by IoT are being solved for today
    •Global consumer attitudes around payments made by devices
    •How payments will become ‘invisible’ or ‘translucent’ for users
    •Payment technology that will enable devices to make decisions

    SPEAKERS:
    * Kevin Gordon, Lead Innovation Architect, Worldpay
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by: Worldpay
  • Augmenting Humans: Identifying Ideal Scenarios for Enterprise Productivity
    Augmenting Humans: Identifying Ideal Scenarios for Enterprise Productivity John Nall, Founder, Appzion Sep 26 2017 3:00 pm UTC 60 mins
    Join John Nall, Founder and CEO of Appzion, as he takes a technical deep-dive into workforce mobilization through augmented reality.

    In this webinar you will learn the steps to enterprise AR productivity. Methods include techniques to identify ideal scenarios for augmenting humans, process mapping and observation techniques. Once the scenario is chosen, other considerations include software and hardware assessment and selection and cybersecurity for wearables.
  • 了解安全威胁态势和凭据滥用攻击
    了解安全威胁态势和凭据滥用攻击 演講人: 李文涛,阿卡迈(Akamai)大中华区解决方案部门总经理;萧锦明,Akamai亚太高级企业安全系统架构师;主持人: 阎光,(ISC)² 上海分会主席,德勤风险咨询副总监 Sep 27 2017 6:00 am UTC 60 mins
    安全威胁态势不断变化,并且极为迅速。因此,组织应持续了解最新的攻击信息,以此来确定在当前的威胁态势下应该寻找的应对方式并预计攻击在未来变化的方式,从而免受该类威胁的影响。这一点至关重要。

    在今天的会议当中,Akamai 将基于已发布的《2017 年第二季度互联网安全现状》报告,与大家分享有关安全威胁态势的深度见解。


    近些年来,凭据滥用攻击已成为一种普遍的威胁,而且复杂性正日益增加。我们也将对此进行详细介绍。凭据滥用攻击活动一旦成功,用户将遭受无法访问、数据泄露或欺诈性交易等损失。Akamai 将揭示这些攻击活动中使用的技术以及难以检测出这些活动的原因。我们还将展示抵御此类攻击的方法和解决方案,从而使您的组织不再遭受此类攻击的影响。


    参加Akamai 和 (ISC)² 在09月27日下午2:00至3:00的在线论坛,了解安全威胁态势和凭据滥用攻击。
  • IMMERSIVE EXPERIENCES - PASSING THE “SO WHAT?” TEST FOR BRANDS
    IMMERSIVE EXPERIENCES - PASSING THE “SO WHAT?” TEST FOR BRANDS Chris Helm, COO & Co-Founder, Blend Media Sep 27 2017 1:00 pm UTC 45 mins
    Brands typically invest in one-off, high end immersive experiences that
    deliver difficult to measure ROI metrics whilst also being challenging to
    consume for viewers.

    Multiple friction points along this journey make us ask “So What?” when it comes to the immersive visual experience.

    Blend Media specialise in 360˚ video and have built a creator network,
    content library and web editor to pass the ‘So What?’ test.

    We enable brands to create immersive, affordable visual experiences that deliver longer term campaign value that are engaging and easy for consumers to enjoy.
  • Virtualizing Media Broadcast: TV Transformed
    Virtualizing Media Broadcast: TV Transformed Steve Smith, Limor Schafman Sep 27 2017 3:00 pm UTC 75 mins
    Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.

    Speakers:
    Steve Smith, CTO, Cloud, Imagine Communications
    Stephen Smith is the CTO, Cloud, for Imagine Communications, where he leads the transformation of solutions to support media and entertainment markets in a future defined by IP, software, virtualization and cloud. Previously, Smith was the Executive Director of Media Systems at Starz Entertainment in Colorado, where he was responsible for the technology, implementation and operation of their Media Asset Management and Content Processing platforms. With 20+ years in the industry, Stephen has extensive experience in architecting, deploying, owning and operating complex media processing, origination and distributions systems.

    Host: Limor Schafman, Content Development Director, TIA
  • Virtual Umbrella: Why We Chose Virtual Reality
    Virtual Umbrella: Why We Chose Virtual Reality Samantha Kingston, Founder, Virtual Umbrella Sep 28 2017 1:00 pm UTC 45 mins
    Samantha Kingston will explore why she bet her career on virtual reality and what it’s really like running a marketing company solely for VR, looking at trends and what challenges are ahead for 2018.

    Virtual Umbrella is an award-winning marketing consultancy specialising in Virtual Reality. Virtual Umbrella has worked on a number of notable projects including creating a virtual reality cinema in Cannes, curating and running a technology hub as part of the Edinburgh Fringe Festival and providing immersive experiences along the BBC and Imperial War Museum.

    Speaker bio:

    Samantha Kingston is the award-winning client director at Virtual Umbrella. Virtual Umbrella is a marketing and PR agency specialising in virtual reality. Samantha fell into the VR industry by accident but has spent her time in the industry building up her own company and working with the VR industry in the UK, Europe, and US. Samantha is an advocate for Women in tech and VR and she is often found moderating panels on equality in the workplace. In 2016 she won the regional and national ‘New Business’ award at Venus Awards, highlighted as one of MCV 30 under 30 and one of the rising stars of BIMA100 2016.
  • Branding VR: Thoughts on Creating an Identity
    Branding VR: Thoughts on Creating an Identity David Mullett, Founder & Chief Design Officer, hellopupil Sep 28 2017 2:00 pm UTC 45 mins
    The public’s perception of virtual reality runs the spectrum from excitement to unknowing to downright confusion. When creating a VR product and brand, how should you navigate the landmines of being associated with virtual reality for better or worse. The science fiction, futuristic, and gaming-oriented identity of the medium can be appeal to fanboys and VR aficionados, but how do you build a brand that fosters frictionless adoption of your product? How does your VR technology product enter the market next to existing products and services? We’ll chat through visual and verbal branding and marketing issues that you may encounter in launching a VR product.
  • Mobile ad dollars ripe for the capture
    Mobile ad dollars ripe for the capture Stewart Rogers, Director of Marketing Technology, VentureBeat Oct 3 2017 5:00 pm UTC 60 mins
    The smartphone is the world’s first three-foot device — the only piece of technology that’s never out of your reach, from waking to sleeping. It’s the first thing a consumer reaches for in the morning, the tool they rely on throughout the day, and the last thing they look at in the evening.

    While some might argue that this has some troubling psychological implications, what it really represents is a huge opportunity for app publishers and developers. In-app advertising ad revenue is expected to generate $53.4 billion dollars by 2020.

    To get in on a chunk of that pie, don’t miss our latest VB Live event. We’ll explore all the ins and outs of in-app advertising, including innovative monetization tools and tactics, pitfalls to avoid, and how to find out where the money is.

    Don’t miss out!

    You’ll learn about:
    * Tools and tactics for publishers to monetize mobile apps (capture form, overlay, banner ads)
    * The role of sponsors and partnerships in mobile app monetization
    * Overcoming the challenges posed by technology fragmentation
    * How to NOT leave money on the table.

    Speakers:
    Stewart Rogers, Director of Marketing Technology, VentureBeat
    Rachael Brownell, Moderator, VentureBeat
  • AI facts vs fiction: AI business decisions that really work
    AI facts vs fiction: AI business decisions that really work Avinash Gangadharan, Sr Director of Engineering, Walmart Oct 10 2017 5:00 pm UTC 60 mins
    Artificial intelligence was Gartner’s top 2017 strategic technology trend, and the year isn’t over yet. But for too many companies, AI myths are persistent, use cases and strategies are still on the “shiny new thing” level, and expectations continue to hover in the spirit of Skynet/HAL, making it hard to determine whether it’s really right for your company.

    As AI technologies multiply, how do you sort fact from fiction? Should you stop daydreaming about replacing your entire staff with chatbots — or can you start augmenting agent abilities? Most importantly, while AI undoubtedly has shown real-live ROI in case study after case study, where is the particular value in chasing the AI buzz for your own company?

    Register now for our our latest VB Live event and find out. We’ll be tackling the AI legends and the AI realities, breaking down the potential AI has for your bottom line, and giving you a glimpse of the future of AI for business.

    In this webinar, you’ll explore:
    * Myths and realities of AI replacing vs. augmenting staff functions
    * How to bake AI into your business strategy
    * On- and offline use cases for AI
    * The future of AI for business

    Speakers:
    * Avinash Gangadharan, Sr Director of Engineering, Walmart
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat