Hi [[ session.user.profile.firstName ]]

Procurement and Sourcing

  • Getting to Grips with the GDPR: How to Fast-Track Your Compliance
    Getting to Grips with the GDPR: How to Fast-Track Your Compliance Phil Lee, Partner at Fieldfisher and Jacqueline de Gernier, AVP at DocuSign Recorded: May 23 2018 32 mins
    The General Data Protection Regulation (GDPR) represents the most important data protection regulation change in 20 years. All companies processing and holding the personal data of subjects residing in the EU must comply once it comes into effect on 25 May 2018, regardless of location.

    One of the biggest changes is around obtaining consent to use personal data. The new requirements not only impact how businesses attain and renew consent but also introduce the need to record the details for auditing purposes.

    Hear from Phil Lee, Partner at Fieldfisher, who will discuss the key changes under the GDPR, the challenges facing businesses, and how digital tools like eSignatures can streamline your compliance.

    Join this webinar to understand:

    - The impacts of the GDPR on businesses
    - How to obtain and record consent in a compliant manner
    - How to re-procure suppliers with contracts that contain the terms of the GDPR
    - How digital tools can be part of a GDPR solution
  • Responding to a data breach
    Responding to a data breach Jim Steven - Head of Data Breach Services, Experian Recorded: May 23 2018 38 mins
    Jim Steven, Head of Data Breach Response, Experian talks through the key considerations for organisations when pulling together a consumer data breach response plan and draws out key insights and steps that can be taken, ensuring your organisation puts customers/employees at the heart of any notification response. Applying these key learnings means your organisation can confidently develop a plan and response team, in advance and understand responsibilities under EU GDPR.

    Know your threats. Prepare your plan. Recover trust.
  • Understand the Performance of Customer Facing Applications
    Understand the Performance of Customer Facing Applications Heather Abbott, SVP of Corporate Solutions, Nasdaq Barry Russell, GM, AWS Marketplace Recorded: May 22 2018 35 mins
    Come learn how NASDAQ used AWS Marketplace to purchase and launch AppDynamics unified Application Performance Management (APM) and business performance monitoring solution for their migration to AWS.


    With AppDynamics, NASDAQ was able to move their critical applications to AWS and used AppDynamics to accelerate, visualize and validate the migration process. This allowed NASDAQ to improve their applications in AWS with business performance monitoring and make clear, understandable correlations between the quality of their customer experience with their applications.
  • Outsourcing Core IT When You Are Core IT
    Outsourcing Core IT When You Are Core IT Hyoun Park Recorded: May 17 2018 28 mins
    How do you know if you are outsourceable? And how can you guide the outsourcing without simply being replaced?

    This webinar takes the analyst's experiences in IT, examples from current IT organizations and managed mobility service providers, and key trends in the IT world to show when and how to identify IT jobs ripe for outsourcing and how to position yourself to take advantage of the outsourcing rather than simply be replaced.
  • Moving on Up - Is it time to shift your Database strategy from IaaS to DBaaS?
    Moving on Up - Is it time to shift your Database strategy from IaaS to DBaaS? Bobby Allen, CloudGenera CTO Recorded: May 17 2018 61 mins
    Use CloudGenera's data to give you insight on the best venue and service model to run your relational databases. We'll focus on MySQL, PostgreSQL, Oracle and SQL Server across AWS, Azure and Google.
  • Enhancing GDPR Compliance: How to Obtain Consent with DocuSign
    Enhancing GDPR Compliance: How to Obtain Consent with DocuSign Tom Wilson and Iain Jones of DocuSign, Paul Day of Filestream Recorded: May 16 2018 26 mins
    Under the GDPR, consent must be obtained in an understandable and easily digestible format, using clear and simple language. By offering people genuine choice and control over how you use their data, it helps you build trust and enhance your reputation.

    The problem for a lot of businesses is that their legacy systems usually don’t document the level of data required to prove that a valid, unambiguous consent or contractual acceptance was obtained. Manual processes and paper plague the most common transactions and introduce friction in the moments that matter most to their business.

    Whether acquiring consent from new customers or renewing consent from your existing database, you can do so with DocuSign’s secure and user-friendly solution. Attend this webinar to:

    - Learn how DocuSign's eSignature solution can help customers collect consent to demonstrate compliance
    - See a demo of DocuSign's consent-capture process, with built-in documentation and tracking
    - Hear from Filestream's Technical Director on how the company is using DocuSign for GDPR purposes
  • Improve Decision Making with Embedded Analytics
    Improve Decision Making with Embedded Analytics Simon Ellis, Program VP - Supply Chain, IDC MfG Insights, Lorenzo Veronesi, Research Mgr, IDC and Mark Morley, OpenText Recorded: May 2 2018 63 mins
    You need full visibility into your supply chain to take the optimal course of action for your business. And, you can derive actionable intelligence from your supply chain by applying embedded analytics to your B2B transactions. This enables more informed business decision-making and improved performance.

    Watch this webinar on demand featuring IDC supply chain experts Simon Ellis and Lorenzo Veronesi to learn:

    How embedded analytics can provide deeper supply chain intelligence
    The important benefits gained by applying the VUCA (volatility, uncertainty, complexity and ambiguity) management theory to a supply chain analytics environment
    How to extract maximum value from analytics for your supply chain operations
  • How Simplifying Your Food and Beverage Vehicle Program Pays Off
    How Simplifying Your Food and Beverage Vehicle Program Pays Off Valerie Myer Recorded: May 2 2018 33 mins
    In the constantly shifting marketplace of food and beverage, efficiencies are far from the only challenge. One way to mitigate major operational challenges of today’s industry? Combining effective technology with a manageable vehicle program. Join Valerie Myer and our guest speaker from US Foods, Irene Sanchez, to learn what your company can do to meet these challenges head on and come out on top!
  • Optimize Your Supply Chain to Improve Business Performance
    Optimize Your Supply Chain to Improve Business Performance Rob O'Regan, Director of Content Marketing Strategy, IDG and Greg Horton, Director of Product Marketing, OpenText Recorded: Apr 25 2018 37 mins
    How well information flows into and out of your supply chain network can have a significant impact on your business performance. If communication and transactions are hindered, the results can be disastrous – late payments, missed deliveries, unhappy suppliers, and disgruntled customers.

    Automating interactions with your trading partners can streamline your supply chain operations while increasing visibility. It means that transactions between you, your suppliers, and your buyers happen electronically and automatically. Whether you're looking to simplify supplier integration and collaboration with procure-to-pay, optimize your inventory levels with logistics track-and-trace, or leverage e-invoicing to reduce errors and contain costs, automation is essential to boosting supply-chain efficiency. And a more efficient supply chain can lead to reduced costs, greater agility, and revenue growth.

    In this webinar, IDG Director of Content Marketing Strategy Rob O'Regan and OpenText™ Director of Product Marketing Greg Horton discuss the advantages of automating supply chain networks. Find out how automation can help you derive more value from your supply chain.
  • Next Gen Solutions to Digitally Transform Your Business
    Next Gen Solutions to Digitally Transform Your Business Will Spendlove VP, Product Marketing at Conga Recorded: Apr 25 2018 59 mins
    Join us to hear Conga's VP of Product Marketing, Will Spendlove, discuss how digital transformation is impacting the business landscape. Data is becoming increasingly important in dictating how business is done, creating the need for IT, sales, legal and business goals to better align. Conga provides a suite of intelligent automation solutions to bridge these gaps. In this webinar you will:

    -Learn how Conga is helping our customers digitally transform their organizations
    -See how Artificial Intelligence is leading the way with Conga products
    -Experience how Conga is helping SmartFocus operationally transform their business
    -Meet some of the recently acquired products and companies
  • [Ep.11] Ask the Expert: Data Center Infrastructure Management
    [Ep.11] Ask the Expert: Data Center Infrastructure Management Christopher Brown, CTO, Uptime Institute & Kelly Harris, Sr. Content Manager, BrightTALK Recorded: Apr 24 2018 49 mins
    This webinar is part of BrightTALK's Ask the Expert Series.

    Join Christopher Brown, CTO of Uptime Institute and Kelly Harris, Senior Content Manager at BrightTALK, as they take a technical deep dive into data center infrastructure management in 2018.

    Chris will answer questions related to trends from the field:

    - What really makes a well-run data center?
    - The changes we are seeing in the industry
    - What Tier level do I need for my data center(s)?
    - What can you tell us about the typical issues we see every day?
    - What are the challenges ahead for data centers?

    Audience members are encourage to send questions to the expert which will be answered during the live session.
  • Fürsorgepflicht – Wie gut ist Ihr Notfallplan?
    Fürsorgepflicht – Wie gut ist Ihr Notfallplan? Andreas Krugmann Global Account Director Concur (Germany) GmbH, Jochen Neubauer, Customer Value Sales SAP SE Recorded: Apr 23 2018 56 mins
    Für Unternehmen besteht – und das wissen viele gar nicht - eine Fürsorgepflicht für Ihre Geschäftsreisenden. Sie sind verantwortlich dafür, dass Ihre Beschäftigten vorbereitet und sicher reisen.

    Lernen Sie:
    - Warum es so wichtig ist, das Thema Fürsorgepflicht ernst zu nehmen.
    - Was Arbeitgeber alles beachten müssen, um Ihrer gesetzlichen Verpflichtung hinsichtlich der Fürsorgepflicht nachzukommen.
    - Wie SAP Concur Unternehmen so ausstattet, dass diese sogar über den Notfall hinaus in der Lage sind, mit den Reisenden in Kontakt zu bleiben.
  • Understanding how VMC on AWS complements your cloud strategy
    Understanding how VMC on AWS complements your cloud strategy Bobby Allen, CloudGenera CTO Recorded: Apr 19 2018 54 mins
    The VMware cloud on AWS may be a valid part of your cloud strategy. This Webinar will talk through pros and cons of that service.
  • Best Practices for Each Stage of a Contract Lifecycle Management Implementation
    Best Practices for Each Stage of a Contract Lifecycle Management Implementation Tim Cummings, CEO, IACCM and Skip Walter, VP Product Management, Conga Recorded: Apr 17 2018 60 mins
    Contract lifecycle management (CLM) software helps firms optimize business transactions by linking five essential stages. However, fewer than one in five of all CLM customers captures all the strategic values a CLM implementation can bring.

    We don’t want that to happen to you or your organization so we’ve put together a webinar that will highlight the best practices for professionals to follow when embarking on a CLM project.

    Register to watch IACCM CEO Tim Cummins and Conga VP of Product Management for CLM Skip Walter chat about:

    - Learn how to engage with stakeholders early and managing their expectations

    -Have a solid and funded business case that drives later stages of implementation --- not leaving any money on the table

    -Boost efficiency while overcoming bottlenecks and pitfalls

    -Realize the importance of getting contract management right
  • Introduction to HP Managed Print Services
    Introduction to HP Managed Print Services HP Secure Managed Print Services Recorded: Apr 16 2018 2 mins
    Cybercrime, internal breaches, compliance infringement and more can hurt your business. In addition to expensive fines and lawsuits, a security breach can result in a damaged reputation and loss of revenue.

    Due to the growing sophistication and perseverance of cybercriminals, network firewalls are proving to be insufficient security measures. Organizations need to fortify their endpoints behind the firewall, including network printers. But print security can be complicated. Enterprise-level multifunction printers (MFPs) have more than 250 security settings. Keeping devices, data, and documents secure across the fleet requires specialized knowledge and can be time-consuming.

    Let HP Secure Managed Print Services (MPS) manage security so you can focus on your core business. You can count on HP MPS to help assess your risks, secure and manage your fleet, maintain printer security compliance, and keep everything up to date with the latest protections.

    Obsess less and focus more on what you’re good at.

    Learn more here: http://www8.hp.com/us/en/services/securemps.html?jumpid=sc_p3aehv6yid
  • HP Security Expert Video Series - Video 2: HP Solutions
    HP Security Expert Video Series - Video 2: HP Solutions Michael Howard Recorded: Apr 9 2018 9 mins
    In this second video of a 2 part series, Michael Howard, HP Inc.'s WW Chief Security Advisor, shares How is HP Bringing Solutions to your Organization.

    To learn more about how to ensure you’re secure across all your endpoints:

    http://www8.hp.com/us/en/solutions/business-solutions/printingsolutions/securityoverview.html?jumpid=sc_ucq8stx21w
  • HP Security Expert Video Series - Video 1: Why Security is Important to Business
    HP Security Expert Video Series - Video 1: Why Security is Important to Business Michael Howard Recorded: Apr 8 2018 8 mins
    In this first video of a 2-video series, Michael Howard, HP Inc.'s WW Chief Security Advisor, shares insights on Why Security is Important to your Business
  • Nothing is Safe with The Wolf in your Midst
    Nothing is Safe with The Wolf in your Midst Christian Slater, Actor Recorded: Apr 7 2018 7 mins
    The Wolf steals data just because he can.

    Company secrets. Employee identities. Financial data. They’re all at risk when The Wolf is on the prowl for a vulnerable network. Watch the film and see how a hacker, portrayed by Christian Slater, exploits unsecured printers and PCs and takes down companies.

    Printer security is about more than just your printers.

    It’s about helping secure your entire network from data theft by handling threats as they happen. Only HP enterprise printers offer built-in malware protection, including runtime intrusion detection and HP Sure Start, the industry’s only self-healing BIOS.

    If you're not taking your printer security seriously, someone else might be. From director Lance Acord comes The Wolf starring Christian Slater.

    To learn more about how to ensure you’re secure across all your endpoints:

    http://www8.hp.com/us/en/solutions/business-solutions/printingsolutions/securityoverview.html?jumpid=sc_ucq8stx21w
  • The Wolf: The Hunt Continues
    The Wolf: The Hunt Continues Christian Slater, Actor Recorded: Apr 6 2018 8 mins
    The Wolf is on the prowl, breaking through network security, devouring data.
     
    Find out how you can protect yourself from predators by securing printing.
     
    Your first layer of defense: printers with built-in protection.

    The moment an attack starts, HP printers detect it, stop it, and self-heal. All without IT intervention. HP enterprise printers—it’s the powerful security that every office needs.
     
    What you need to get HP secure:

    With over 60% of companies reporting a print-related data breach in the past year, it’s time to invest in complete security and defend your devices, data, and documents. Get the help you need with fundamental and advanced security offerings from HP.
     
    If you're not taking your printer security seriously, someone else might be. From director Lance Acord comes The Wolf starring Christian Slater.

    To learn more about how to ensure you’re secure across all your endpoints:

    http://www8.hp.com/us/en/solutions/business-solutions/printingsolutions/securityoverview.html?jumpid=sc_ucq8stx21w”
  • 3 Challenges of Distributed Agile Retrospectives and How to Solve Them
    3 Challenges of Distributed Agile Retrospectives and How to Solve Them Michael Ball-Marian, Agile Expert at CA Technologies Recorded: Apr 5 2018 64 mins
    Of all the Agile practices, none is more foundational than the inspect & adapt cycle of the retrospective. Even if you struggle with every other aspect of Agile, if you consistently engage in productive retrospectives, you will get better.

    Industry surveys and studies suggest that 80% or more of Agile organizations have at least some distributed teams. Most of the traditional retrospective methods assume that all team members are co-located.

    Running effective retrospectives for distributed teams presents unique challenges, but also, potentially, some great advantages. In this webinar, Agile coach and Instant Agenda co-founder Michael Ball-Marian will discuss the three greatest challenges to running distributed Agile retrospectives and how to solve them. Michael will share a variety of tips and techniques that you can use in any retrospective, co-located or distributed. Finally, he’ll present a few ways in which a distributed retrospective can actually be better than a co-located one.
  • The Fixer Stops Hackers like The Wolf in their Tracks with HP Print Security
    The Fixer Stops Hackers like The Wolf in their Tracks with HP Print Security Jonathan Banks, Actor Recorded: Apr 5 2018 2 mins
    The Fixer (Jonathan Banks) is here to put The Wolf on a leash with an HP Enterprise printer featuring Run-Time Intrusion Detection that is constantly protecting against malware attacks.

    HP Run-Time Intrusion Detection:

    - Monitors complex firmware and memory operations, automatically stops the intrusion and reboots in the event of an attack
    - Protects HP business printers from becoming an entry point for attacks on your network
    - Offers the only real-time detection, automated monitoring, and built-in software validation to stop threats the moment they start
  • Contract Automation: How to Thrive in an Automated World
    Contract Automation: How to Thrive in an Automated World Doug Rybacki, Conga VP of Product Management, Marilyn Salyer, Conga Sr. Solutions Engineer, and Tim Cummins, IACCM CEO Recorded: Apr 4 2018 61 mins
    The next big thing is here!

    According to Forbes, 38% of enterprises are already using AI technologies, and 62% will use AI technologies by 2018.

    The rise of AI points a spotlight at the need for integrating intelligent technologies into our business processes -- particularly around contracts. Creating effective automation rules is a necessity, as contracts are a critical component of business but are complex to create, difficult to negotiate, time-consuming to manage, and often create bottlenecks and slow-downs. Poor contract management can lead to lost work time (or more time spent on administrative, trivial tasks), slow contract and business cycles, longer time to revenue, loss of control, and greater risk.

    The accumulated effect of these problems has a very real effect on your bottom line.

    Business professionals in Legal, Procurement or Operations should join this webinar to learn how to:

    - Optimize and prepare for contract automation in order to maximize efficiency.
    - Prepare for contract automation in order to maximize efficiency.
    - Learn what maturity is and its impact on revenue growth.
    - Understand why companies are implementing intelligent automation.
    - Realize the cost-savings and benefits of automation.

    Automation is coming to your world - are you ready?

    Join Doug Rybacki, Conga VP of Product Management, Marilyn Salyer, Conga Sr. Solutions Engineer, and Tim Cummins, IACCM CEO, for a discussion on tips and tricks to thrive in tomorrow's automated world.
  • The Fixer is Here to Tame Hackers like The Wolf with HP SureStart Print Security
    The Fixer is Here to Tame Hackers like The Wolf with HP SureStart Print Security Jonathan Banks, Actor Recorded: Apr 4 2018 2 mins
    Armed with an HP Enterprise printer featuring HP Sure Start self-healing BIOS protection, The Fixer (Jonathan Banks) is going to make sure The Wolf never leaves a scratch on this place again.

    HP Sure Start:

    - Protects against malware by detecting, stopping, and self-healing from BIOS attacks
    - Prevents the execution of malicious code during bootup by allowing only HP-signed, genuine code to be loaded
    - Restarts with a safe “golden copy” of its BIOS, if compromised
    - Is the industry’s only self-healing BIOS
  • The Fixer Bites Back Against Hackers like The Wolf with HP Secure Print Services
    The Fixer Bites Back Against Hackers like The Wolf with HP Secure Print Services Jonathan Banks, Actor Recorded: Apr 3 2018 2 mins
    After The Wolf brings down a hospital, The Fixer (Jonathan Banks) shows them how to bite back with help from HP Managed Print Services.

    HP Secure Managed Print Services:

    - Works to identify your risks, then develop and implement a custom print security policy and plan
    - Manages your print security from device hardening to deploying advanced security solutions to address people, processes and compliance requirements
    - Helps secure your fleet with the industry’s strongest print security protections

    To learn more about how to ensure you’re secure across all your endpoints:

    http://www8.hp.com/us/en/solutions/business-solutions/printingsolutions/securityoverview.html?jumpid=sc_ucq8stx21w
  • A Journey through HP’s Embedded Print Security
    A Journey through HP’s Embedded Print Security Jonathan Banks, Actor Recorded: Apr 2 2018 2 mins
    Newsflash: If your print fleet can’t detect, stop, and self-heal from an attack, your company may be at risk.

    HP Sure Start: it’s like chicken soup for your printer’s soul. Checks BIOS code and, if there’s something sketchy, it restarts with a safe “golden copy”. Detect, protect, and self-heal.

    HP Connection Inspector: keep your printer from talking to strangers. Keeps an eye on printer connections and stops suspicious activity by triggering a self-healing reboot.

    HP Run-time intrusion detection: stops attacks to your printer in real time. Detects a threat and self-heals before you realize what happened.

    All of this—only with HP enterprise printers.

    To learn more about how to ensure you’re secure across all your endpoints:

    http://www8.hp.com/us/en/solutions/business-solutions/printingsolutions/securityoverview.html?jumpid=sc_ucq8stx21w