Hi [[ session.user.profile.firstName ]]

Research and Development

  • Trustworthiness: Evolving IT Security to Support Digital Transformation
    Trustworthiness: Evolving IT Security to Support Digital Transformation
    Jim Morrish, Transforma Insights; Bassam Zarkout, IGnPower Inc. Live 60 mins
    Digital Transformation (DX) is the strategic realignment associated with the application of digital technologies towards new and improved business, industrial models and processes. A key component in successful transformation is ensuring trustworthiness of your digital systems.

    Trustworthiness is the degree to which an industrial system can be relied on to do what it should, and not to do things that it shouldn’t. During this webinar we will explore why Trustworthiness (especially security) is such an important concept, considering that historically OT (Operational Technology) systems were designed to be resilient, reliable and very safe, whilst IT (Information Technology) systems have been built to be secure, private and reasonably reliable.

    With the advent of IoT and Digital Transformation, the requirements of IT and OT become intertwined. Different industrial environments have their own unique challenges, and as they are digitally transformed, they become more connected, and potentially more vulnerable. The trustworthiness of industrial environments need to be handled differently than the traditional IT environment and newly IT/OT-converged systems must meet trustworthiness considerations associated with each.

    Bottom line: Failure to address the trustworthiness issues of IoT systems (especially security) can put the organization’s DX strategy at risk, resulting in serious negative consequences such as missed market opportunities and wasted critical investments in DX initiatives.

    In this webinar we will explore:
    •What is Trustworthiness?
    •How much trustworthiness do you need?
    •The trustworthiness journey
    •Best practices for managing trustworthiness
    •Applying Trustworthiness to Digital Transformation
  • 2020 H1 Global Food Commodity Review
    2020 H1 Global Food Commodity Review
    The Mintec Intelligence team Recorded: Jan 28 2020 19 mins
    Our analysts provide an exclusive market update and price outlook for the first half of the year on chosen key commodities.
  • Lower Your Business Risk with Best Practice Data Privacy Impact Assessments
    Lower Your Business Risk with Best Practice Data Privacy Impact Assessments
    Lecio DePaula Jr. Recorded: Jan 28 2020 45 mins
    Whether you're creating a new product, going through a merger & acquisitions, or significantly changing a process in your organization, new processing activities can present high risk to your organization. As we can see from Marriott’s acquisition of Starwood, not undergoing a full security and privacy assessment can present huge problems for your organization and now Marriott faces a $123.6 million dollar fine due to lack of due diligence.

    One way to reduce risks and identify security/privacy risk is to conduct a data protection impact assessment. Not only will this assessment help you reduce business risk, but it also helps identify new processes in your organization to maintain compliance with GDPR, LGPD, CCPA and other global privacy laws.

    Join Lecio DePaula Jr., KnowBe4’s Data Privacy Director, for this webinar to hear about creating a robust data protection impact assessment to analyze new processes, workflows, and products to identify problems before they happen.

    In this webinar you’ll learn:

    - Best practices for conducting a robust DPIA
    - The privacy and security risks of M&A, creating new software products, other initiatives
    - How conducting a DPIA aligns with global privacy requirements
    - Common DPIA mistakes and how to avoid them
    - Tools that help manage and streamline your DPIA process
  • Séries Temporelles et AutoML avec H2O Driverless AI
    Séries Temporelles et AutoML avec H2O Driverless AI
    Badr Chentouf, Senior Solution Engineer, H2O.ai Recorded: Jan 28 2020 58 mins
    Ce webinar présentera une introduction à l’utilisation de DriverlessAI, la plateforme d’Automatic Machine Learning, qui permet aux datascientistes de tous niveaux d’accélerer leurs projets de datascience.

    Dans ce webinar, nous ferons un focus sur le cas des séries temporelles, problématique transverse aux secteurs d’activité pour prédire des consommations, des ventes, des pannes, … sur un horizon de temps donné. Nous verrons comment DriverlessAI permet de répondre à cette problématique, et de gagner en précision et en rapidité grâce aux techniques d’AutoML.
  • Building an Effective Security Awareness Program
    Building an Effective Security Awareness Program
    Dale Zabriskie CISSP, CCSK, Security Awareness Training Evangelist Recorded: Jan 28 2020 57 mins
    Implementing and sustaining a successful security awareness program can be a daunting task. Without formal policies and frameworks, many organizations are shooting in the dark when it comes to determining how often to phish and train while managing stakeholder expectations. So what can you do to help your end users better protect themselves?

    Join our webinar as we examine what it means to have and how to build an effective security awareness program. In this session, we'll discuss:

    - Proven best practices for increasing the effectiveness of cybersecurity education
    - How to build a culture of security within your organization
    - Actionable guidance on executing security awareness & training initiatives that deliver measurable results
  • Top 3 Fraud Prevention Opportunities You Might be Leaving on the Table
    Top 3 Fraud Prevention Opportunities You Might be Leaving on the Table
    Mike Failor, Sr. Director of Risk Analytics, Enova International; Jay Johns, Global Partner Channel Manager, iovation Recorded: Jan 24 2020 25 mins
    The telecommunications and communications industry is evolving fast, leaving service providers susceptible to new fraud schemes. While new technologies such as machine learning and crowd-sourced intelligence is available, service providers face the challenge of creating fraud fighting techniques that do not deteriorate customer experience.

    In this webinar, Enova Decisions and iovation leadership will cover fraud solutions for telecommunications and communications that balance the competing demands of catching fraud, authenticating good customers, and providing an outstanding customer experience.

    Topics that will be covered include:
    -Current trends in the rapidly changing fraud environment
    -Preventing fraud throughout the consumer’s journey…not just at the purchase moment
    -How to best leverage 1st and 3rd party data to significantly improve fraud detection
    -Protection of your consumers’ personal information (PII) while optimizing fraud detection
    -The impact businesses have seen by implementing device intelligence
  • Developing Safe and Secure Autonomous Vehicles Across Industries
    Developing Safe and Secure Autonomous Vehicles Across Industries
    Tony Karam, New Technology Director, ANSYS Recorded: Jan 24 2020 53 mins
    Autonomous driving systems can only be released to the public after developers have demonstrated their ability to achieve adequately high levels of safety. Today’s hands-off autonomous driving systems are largely built with deep learning algorithms that can be trained to make the right decision for nearly every driving situation. These systems, however, lack the detailed requirements, architecture, and validation that is already being used today in the development of safety-critical systems, such as the control systems of commercial airliners. Road and air testing is clearly an essential part of the development process, but the billions of miles of testing that will be necessary to validate the safety of autonomous driving systems and software is clearly impractical.

    These challenges can be addressed with a comprehensive and open autonomous vehicle simulation platform that integrates physics, electronics, embedded systems and software to accurately simulate complete autonomous driving systems in a fraction of the time and cost required for physical testing. A platform that spans the simulation of all sensors, including lidars, cameras, radars, and ultrasonic sensors; the multiphysics simulation of physical and electronic components; the analysis of system functional safety; as well as the design and automatic code generation of safety-certified embedded software, will be presented in this webinar

    Join this webinar to learn more about how to safely design, validate and test your autonomous vehicle, whether it is an automobile, air taxi, or subsea robot.
  • Reaching DAL A Certification for COTS Hardware, Software
    Reaching DAL A Certification for COTS Hardware, Software
    Vance Hilderman, Chief Technical Officer, AFuzion Inc.; Mike Horgan, Technical Marketing Manager, DDC-I Recorded: Jan 24 2020 60 mins
    Designers of modern avionics systems are leveraging technology such as multicore, graphics processing, and other key commercial-off-the-shelf (COTS) technologies. The performance benefits these innovations bring to the flight deck are game changing, however challenges remain when it comes to the safety certification process — getting these technologies and systems certified to Design Assurance Level (DAL) A. This webcast of industry experts will cover methods for certifying COTS technology such as multicore solutions, GPU hardware, avionics graphics applications, and more.
  • Jumpstarting Level 5 Autonomous Drive: Development Platforms and Considerations
    Jumpstarting Level 5 Autonomous Drive: Development Platforms and Considerations
    Robert Day, Arm; Jim Shaw, Crystal Group; Ricardo Camacho, LDRA; James Smith, National Instruments Recorded: Jan 23 2020 64 mins
    With the path to fully autonomous driving still up for debate, embedded automotive solutions providers have wasted no time bringing Level 5 autonomous vehicle development platforms to market. These integrated prototyping and design suites provide the software and/or hardware required to process, fuse, and manage camera, sensor, and network inputs, all within an acceptable automotive power envelope and designed to functional safety standards. What could be left to debate? Join this panel of automotive industry experts as they review considerations for integrating Level 5 Autonomous Drive technology into next-generation vehicles. Learn how to efficiently balance power consumption with processor load, conform to standards such as ISO 26262 and AUTOSAR, and leverage available tools to skip steps in the race towards fully autonomous vehicles.
  • Empowering Your Human Firewall: The Art and Science of Secure Behavior
    Empowering Your Human Firewall: The Art and Science of Secure Behavior
    Perry Carpenter, David Littman Recorded: Jan 23 2020 61 mins
    You know that "security awareness" is key to a comprehensive security strategy. But just because someone is aware doesn't mean they care. So how can you design programs that work with, rather than against, human nature? Here's the great news. Creating a security awareness strategy that not only educates, but reinforces good behaviors can be achieved and we'll show you how.

    In this webinar, Perry Carpenter, Chief Evangelist and Strategy Officer for KnowBe4, and David Littman of TruthInIT unpack a number of key elements from his new book Transformational Security Awareness. What Neuroscientists, Storytellers, and Marketers can Teach Us About Driving Secure Behaviors. Drawn from his experience as an awareness practitioner, CISO mentor, researcher, and author, Perry will dive into ideas like how to use "Trojan Horses for the Mind," how to leverage social dynamics to drive behavior and shape culture, and will unveil some exciting new behavior models that will help you stop the bad guys in their tracks.

    This presentation will take a deep (and practical) dive into:

    · How to understand and design for behavioral segments
    · How to successfully debug bad behaviors
    · How to influence motivation in three different ways
    · And why it is important to live your awareness program through the eyes of your audience
  • IoT Scaling Strategies & Security Implications
    IoT Scaling Strategies & Security Implications
    Steve Hanna, Senior Principal, Infineon Technologies; Brett Murphy, Sr Director Market Development IIoT, RTI Recorded: Jan 23 2020 61 mins
    End-to-end IoT use cases and operational scenarios are becoming understood in a variety of industries. Focus starts shifting toward operational corner cases that can make or break the IoT system and how to plan for them. Initial deployment is one thing - how does the system behave if sensors, software, or users are added? What kinds of Metrics can be built into the system to predict capacity and performance in these cases? How does the system behave when there is a failure? Join us as our panel of IoT experts discuss these critical corner cases, how to identify them, and how to address them.
  • Air Force, Army, Navy Convergence on Military Open Architectures
    Air Force, Army, Navy Convergence on Military Open Architectures
    Dr. Ilya Lipkin, Steering Committee Chair, Sensor Open Systems Architecture (SOSA) Consortium, Air Force Life Cycle Managemen Recorded: Jan 23 2020 61 mins
    The defense acquisition community is looking to reduce costs and development time via open-architecture principles in a practical and consensus-driven way with all three services Air Force, Army, and Navy working together. This tri-service convergence effort set itself up for success since it is driven by the end user in the acquisition community, tied to specific programs. Open architecture initiatives such as the Hardware Open Systems Technologies (HOST) and Modular Open Radio Frequency (RF) Architecture (MORA) are all feeding into the Sensor Open Systems Architecture (SOSA). This webcast with Air Force Life Cycle Management Center (AFLCM) representative Dr. Ilya Lipkin will cover how these efforts will reduce life cycle costs and enable reuse.
  • Fairness in AI and Machine Learning
    Fairness in AI and Machine Learning
    Navdeep Gill, H2O.ai Recorded: Jan 23 2020 48 mins
    This webinar introduces methods that can uncover discrimination in your data and predictive models, including the adverse impact ratio (AIR), false positive and false negative rates, marginal effects, and standardized mean difference. Once discrimination is identified in a model, new models with less discrimination can usually be found, typically by more judicious feature selection or by tweaking hyperparameters. Mitigating discrimination in ML is important for both consumers and operators of ML. Consumers of ML deserve equitable decisions and predictions and operators of ML want to avoid reputational and regulatory damages.

    If you are a data scientist or analyst working on decisions that affect people's lives, then this presentation is for you!
  • What Most Computer Security Defenses are Doing Wrong, and How to Fix It
    What Most Computer Security Defenses are Doing Wrong, and How to Fix It
    Roger Grimes, David Littman Recorded: Jan 23 2020 55 mins
    Most companies have huge gaps in their computer security defenses and can be compromised at will by a determined hacker. The industry even has a term for it: “Assume Breach”.

    But it doesn’t have to be that way!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and David Littman of TruthInIT for this webinar where he explores the latest research on what’s wrong with current network defenses and how they got this way. Roger will teach you what most organizations are doing wrong, why, and how to fix it. You’ll leave this webinar with a fresh perspective and an action plan to improve the efficiency and effectiveness of your current computer security defenses.

    Roger will teach you:

    · What most companies are doing wrong, why, and how to fix it
    · An action plan to improve the effectiveness of your computer security defenses
    · How to create your “human firewall”
  • Security Investigation: Restoring Calm from Chaos
    Security Investigation: Restoring Calm from Chaos
    Jae Lee Director, Product Marketing Splunk Inc. Recorded: Jan 23 2020 66 mins
    Security teams are underfunded, understaffed and overwhelmed by constantly putting out fires. They struggle to deal with threats and attacks, while having to answer hard questions from management. Everyone is demanding detailed, accurate answers about cyberthreats and risk and compliance – and they all need answers NOW.

    So, how useful is it to know that you’re not alone, since others are in the same boat? The answer is “not useful at all.” What IS useful, is knowing how to work smarter and get answers faster.

    Join us in this one-hour technical deep dive and demo to learn:
    - How to analyze events from three common data sources to look for malicious activity
    - How to get more efficient at discovery, triage and the investigation of potential security incidents
    - How to leverage automation methods to accelerate investigations and get answers faster
  • New (and free) analysis tools for the cyber threat hunter
    New (and free) analysis tools for the cyber threat hunter
    Chris Doman, Tawnya Lancaster, Amy Pace, Michael Vaughn - AT&T Cybersecurity Recorded: Jan 23 2020 59 mins
    Today’s threat detection systems are highly effective for most attacks however no single system can detect 100 percent of attacks all the time. In response, security teams are turning to proactive threat hunting to help find the bad actors in their environment that have slipped past initial defenses.

    Join AT&T Cybersecurity to see how you use the AT&T Alien Labs Open Threat Exchange (OTX™), among the world’s largest open threat-sharing communities, along with free malware and threat analysis tools to improve your threat hunting program.

    In this webinar, we’ll cover:

    ● New features in OTX for threat hunting, including how to submit suspicious files and URLs for analysis

    ● Enhanced functionality for our indicator of compromise (IoC) extraction tool, which now includes the ability to auto-extract indicators from emails and PCAP files

    ● How OTX can help you quickly identify and investigate new and evolving threat trends

    ● How Alien Labs is using analytics and machine learning for threat analysis that is then fed back into the OTX community
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training
    Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Jan 23 2020 38 mins
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • The Four 'P's of the Future of Retail
    The Four 'P's of the Future of Retail
    Frost & Sullivan Visionary Innovation Experts and Heidi Dethloff, VP, Marketing, Digimarc Corporation Recorded: Jan 23 2020 57 mins
    The retail industry will undergo massive changes as the age of disruption continues to impact consumer behaviors and buying trends. In this constant flux, retailers should understand and prepare strategies to retain customers and gain an edge over the competition. In this webinar session, Frost & Sullivan experts and Heidi Dethloff, VP, Marketing, Digimarc Corporation, will discuss The Future of Retail across four distinct segments:

    • Future retail “Person” - Gen Alpha as the new wave of “digital native” influencers and future customers
    • Future retail “Place” - Reinvention of physical retail as a point of engagement from a small box to a “novel” box
    • Future retail “Points” – Advent of new points of commerce such as in-vehicle commerce
    • Future retail “Process” – Advances in technology such as AI, automation, and AR/VR disrupting the prevailing retail process

    Join Frost & Sullivan for a complimentary webinar on January 23 as we take a deep dive and answer:

    • How can you keep up with the rapidly evolving physical retail environment?
    • What retail technologies will drive growth opportunities over the next decade?
    • How can your company build a strategy to stay relevant to this new target customer?
  • The Download: Tech Talks by the HPCC Systems Community, Episode 30
    The Download: Tech Talks by the HPCC Systems Community, Episode 30
    HPCC Systems Recorded: Jan 23 2020 72 mins
    Join us as we continue our webinar series specifically designed for the community by the community with the goal to share knowledge, spark innovation, and further build and link the relationships within our HPCC Systems community. Featured topics include project work presented by two interns from our HPCC Systems academic community:

    Elimar Macena - Federal Institute of Espírito Santo (IFES) - Campus Serra, Brazil - Studying Crime Patterns in São Paulo state between 2006 and 2016.

    Intelligence led policing (ILP) refers to technology-driven crime data analysis activities to support the design of effective crime prevention and prosecution strategies. This is a new approach to fighting crime that has been gaining strength due to the convergence of two technological streams: the digitization and release of public information related to the occurrence of crimes and the development of technological platforms that allow the proper handling of such information, such as the HPCC Systems platform. Elimar's project used the HPCC platform to analyze crime patterns in the state of São Paulo in Brazil between the years of 2006 and 2016.

    Muiredach O'Riain - Goldsmiths, University of London - Machine Learning and the Forensic Applications of Audio Classification: An exploration of the forensic applications of sound classification using Artificial Neural Nets

    Muiredach will present how he used HPCC Systems to help build a reliable classification model that is able to accurately classify an input sound file to its location. His project intends to not only demonstrate a proof of concept for this technology, but also to lay the groundwork for what could be the next step in forensic audio analysis and a new means of gathering information through sound.
  • Third-Party Vendor Security and Risk Management
    Third-Party Vendor Security and Risk Management
    Sam Heiney, Director of Product Management, Netop Tech Recorded: Jan 23 2020 34 mins
    How many vendors need at least some access to your network? For most businesses, service providers and other third parties are critical to success, but they can also introduce additional risks.

    Sign up for this webinar, where we cover the best practices for managing third-party risk using remote access software.
  • Узнайте, как «чистая этикетка» может увеличить рентабельность инвестиций в сфере
    Узнайте, как «чистая этикетка» может увеличить рентабельность инвестиций в сфере
    Natalia Orochko and Svetlana Danilenko from Ingredion Incorporated Recorded: Jan 23 2020 20 mins
    Эксперты в области clean label компании Ingredion расскажут вам о том, как переход к «чистой этикетке» навсегда изменил пищевую промышленность и производство напитков в Европе. Потребители требуют большей прозрачности от этикеток приобретаемой ими продукции, при этом они вооружены мобильными устройствами, чтобы получать информацию о том, в чем они не уверены, выбирая товары на полках магазинов.

    Все мы знаем, что «чистая этикетка» желанна для потребителей, а значит полезна вашему бизнесу. Ingredion расскажет, как «чистая этикетка» поможет достичь ускоренной разработки рецептур продукта, увеличения продаж и прибыли.

    Узнайте, как ведущий производитель хлебобулочных изделий обнаружил, что использование модифицированного крахмала в его печенье макарон негативно отражается на продажах, и тогда он обратился к компании Ingredion за помощью.
    Присоединяйтесь к нашему вебинару, чтобы узнать, как вы можете увеличить прибыль, используя ингредиенты с «чистой этикеткой» сегодня.
  • Blue Prism RPA Platform Demo | Intelligent Automation & Digital Exchange Skills
    Blue Prism RPA Platform Demo | Intelligent Automation & Digital Exchange Skills
    Daniel Welcel, Solution Engineer and Lisa Hackbarth, Global Marketing Recorded: Jan 23 2020 39 mins
    Join us for a 45-minute, interactive live demo. We’ll show you how Blue Prism’s connected-RPA platform works and answer your questions live.

    With the advent of Robotic Process Automation (RPA), today, humans and Digital Workers are working side by side.

    But how does it actually work?

    If you’re ready to see Blue Prism’s Intelligent Automation in action, join us for our next 45-minute demo where we’ll showcase the simplicity and security of the leading RPA platform on the market.

    In this foundational look at what it takes to implement Blue Prism connected-RPA, you will:
    • Experience the integral role that the human worker plays in our evolving workforce
    • Take a tour of the Blue Prism Process and Object Studio where you’ll teach your Digital Workers what to do and how to do it
    • Learn how to incorporate our pre-built, out-of-the-box processes without the need for coding, and get your Digital Workforce up and running quickly
    • See examples of processes that Digital Workers can help to automate
    • Learn how to manage your Digital Workers to achieve maximum productivity using the included Control Room, Work Queues, and Scheduler
    • Get a detailed look at Blue Prism’s security, access control, and audit log features that reduce automation audit risk

    Ready to unleash the human potential at your organization by freeing up your team to do the valuable, skilled work they were hired to do? Register to view the demo to take the next step on your digital transformation journey and get ready to see what’s possible.
  • AI's Impact on Financial Service & Insurance - The Good, The Bad & The Ugly
    AI's Impact on Financial Service & Insurance - The Good, The Bad & The Ugly
    Mark Palmer, SVP and General Manager of Analytics at TIBCO Software & David Skerrett, Digital Transformation Leader Recorded: Jan 23 2020 59 mins
    Delve into the FSI computing trends that will facilitate next-generation banking systems. From adaptive data science for real-time and predictive intelligence, to visual intelligence that helps humans effectively “query the future,” this webinar examines:

    - How artificial intelligence is innovating the industry and how humans and machines can combine to achieve strategic enhancement
    - How FSI leaders can make sense of millions of data points and turn them into meaningful insights, and how AI is making this easier than ever before
    - How data analytics is transforming risk and fraud management
    - Discussions and participant poll results surrounding the good, the bad, and the ugly of AI
  • Blue Prism RPA Platform Demo | Intelligent Automation & Digital Exchange Skills
    Blue Prism RPA Platform Demo | Intelligent Automation & Digital Exchange Skills
    Daniel Welcel, Solution Engineer and Lisa Hackbarth, Global Marketing Recorded: Jan 23 2020 39 mins
    Join us for a 45-minute, interactive live demo. We’ll show you how Blue Prism’s connected-RPA platform works and answer your questions live.

    With the advent of Robotic Process Automation (RPA), today, humans and Digital Workers are working side by side.

    But how does it actually work?

    If you’re ready to see Blue Prism’s Intelligent Automation in action, join us for our next 45-minute demo where we’ll showcase the simplicity and security of the leading RPA platform on the market.

    In this foundational look at what it takes to implement Blue Prism connected-RPA, you will:
    • Experience the integral role that the human worker plays in our evolving workforce
    • Take a tour of the Blue Prism Process and Object Studio where you’ll teach your Digital Workers what to do and how to do it
    • Learn how to incorporate our pre-built, out-of-the-box processes without the need for coding, and get your Digital Workforce up and running quickly
    • See examples of processes that Digital Workers can help to automate
    • Learn how to manage your Digital Workers to achieve maximum productivity using the included Control Room, Work Queues, and Scheduler
    • Get a detailed look at Blue Prism’s security, access control, and audit log features that reduce automation audit risk

    Ready to unleash the human potential at your organization by freeing up your team to do the valuable, skilled work they were hired to do? Register to view the demo to take the next step on your digital transformation journey and get ready to see what’s possible.
  • The Edge: Mission Critical Computing
    The Edge: Mission Critical Computing
    Luca Beltramino, Senior Vice President, Global Programs, Uptime Institute Recorded: Jan 22 2020 55 mins
    Join us for a discussion about the growing opportunity to bring computing closer to both users and data for reasons of simplicity, quicker deployment and cost avoidance. We’ll explore what it takes to leverage this edge capacity in mission critical infrastructures as well as the key value and application drivers for these distributed deployments. In addition, we’ll demonstrate that the core requirements for mission-critical continue to apply regardless of deployment size, edge to core.
  • Blue Prism RPA Platform Demo | The Building Blocks of Automation
    Blue Prism RPA Platform Demo | The Building Blocks of Automation
    Daniel Welcel, Solution Engineer and Lisa Hackbarth, Global Marketing Jan 28 2020 5:00 pm UTC 60 mins
    Join us for a 45-minute, interactive live demo. We’ll show you how Blue Prism’s connected-RPA platform works and answer your questions live.

    With the advent of Robotic Process Automation (RPA), today, humans and Digital Workers are working side by side.

    But how does it actually work?

    If you’re ready to see Blue Prism’s Intelligent Automation in action, join us for our next 45-minute demo where we’ll showcase the simplicity and security of the leading RPA platform on the market.

    In this foundational look at what it takes to implement Blue Prism connected-RPA, you will:
    • Experience the integral role that the human worker plays in our evolving workforce
    • Take a tour of the Blue Prism Process and Object Studio where you’ll teach your Digital Workers what to do and how to do it
    • Learn how to incorporate our pre-built, out-of-the-box processes without the need for coding, and get your Digital Workforce up and running quickly
    • See examples of processes that Digital Workers can help to automate
    • Learn how to manage your Digital Workers to achieve maximum productivity using the included Control Room, Work Queues, and Scheduler
    • Get a detailed look at Blue Prism’s security, access control, and audit log features that reduce automation audit risk

    Ready to unleash the human potential at your organization by freeing up your team to do the valuable, skilled work they were hired to do? Register to view the demo to take the next step on your digital transformation journey and get ready to see what’s possible.
  • How NDR Powers Event-Driven Security in the Cloud
    How NDR Powers Event-Driven Security in the Cloud
    Ryan Davis, Senior Manager, Cloud Product Marketing & Vince Stross, Principal Security SE at ExtraHop Jan 28 2020 6:00 pm UTC 60 mins
    For public cloud customers, event-driven security isn’t just practical—it’s expected. Although organizations still rely on perimeter-focused technologies, they’re moving away from a strictly protect-and-prevent mindset to one that includes detect-and-respond capabilities.

    In this webinar, we’ll dig into how network detection and response (NDR) can power event-driven security in the cloud. Topics will include:
    - How virtual taps enable agentless NDR in the public cloud
    - How NDR completes Gartner’s SOC Visibility Triad in the cloud
    - How NDR can be used for response automation
  • Gigamon #1: Transport Layer Security (TLS) 1.3: A New Private World
    Gigamon #1: Transport Layer Security (TLS) 1.3: A New Private World
    Ricardo Font, Product Marketing Manager, Gigamon ThreatINSIGHT; Brandon Dunlap, Moderator Jan 28 2020 6:00 pm UTC 60 mins
    Network traffic encryption is the pillar on which the Internet, as we know it today, rests on. E-commerce, banking transactions, private and sensitive communications…all occur based on the implicit assumption that our communications are secured. However, ubiquity also means targetable, and Transport Layer Security (TLS) has undergone changes in an effort to stay ahead of the security game. Join (ISC)2 and Gigamon on Tuesday, January 28, 2020 at 1:00PM Eastern as we dive into TLS 1.3, the newest version of the TLS encryption protocol. Areas covered include an overview of statistics associated with encrypted traffic, what changes are introduced in TLS 1.3, and the advantages and challenges associated with them, implementation caveats and gotchas and best practice deployment strategies.
  • Managing Model Complexity in the Fight Against Fraud
    Managing Model Complexity in the Fight Against Fraud
    Ajay Andrews, Ekata VP of Product Management and Trevor Anderson, Ekata Director of Solutions Architecture Jan 28 2020 6:00 pm UTC 37 mins
    Fighting fraud is a complex business. As new trends emerge across different regions and product lines, it can be a challenge to manage the large amounts of data required to build effective fraud models.

    Instead of spending time cleansing and normalizing data from various sources, join our webinar and learn how to optimize your models by:

    -Leveraging robust data sets that improve performance
    -Avoiding the time suck of endless feature engineering and overfitting
    -Consolidating data vendors to focus your horsepower on sophisticated algorithms
  • 2020 Cyber Threat Landscape – A 20/20 Look into Cybersecurity Predictions
    2020 Cyber Threat Landscape – A 20/20 Look into Cybersecurity Predictions
    Chris Dawson, Threat Intelligence Publications Lead Jan 28 2020 6:00 pm UTC 60 mins
    Every year, Proofpoint’s threat research team examines trends from the prior year and predicts changes in the threat landscape for the year to come. For 2020, some of the top concerns include a significant evolution in impostor attacks and increasingly sophisticated attacks on cloud applications.

    Join us for a deep dive into the biggest trends that we’re predicting for the next 12 months, and how you can prepare and protect your most valuable assets: your people and your data.

    You’ll learn:

    - Predictions for the 2020 cyber threat landscape
    - Key actions you can take to prepare your organization
    - Top resources to help support your security efforts

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Unlocking DevOps Security with PKI Automation
    Unlocking DevOps Security with PKI Automation
    Keyfactor's Senior Solution Engineer, Shian Sung and Thales Senior Solutions Architect, Matthew Armstrong Jan 28 2020 7:00 pm UTC 60 mins
    Today, DevOps teams are focused on getting new features out faster, yet they need digital certificates for critical tasks in the build and release process - things like signing code, spinning up containers, and using SSL/TLS certificates for load balancers and web servers.

    Maintaining an optimized development and release cycle requires frictionless, automatic PKI processes to provide timely, valid certificates while maintaining the visibility and control security teams need to ensure compliance and prevent delays.

    How do you unlock DevOps security with PKI Automation?

    Join Keyfactor and Thales to discuss how enterprises can automate and securely integrate PKI into continuous integration and continuous deployment (CI/CD) pipeline and the DevOps toolchain – including Jenkins, Kubernetes, and HashiCorp Vault.
  • Getting Enterprise-Grade Authentication with Sitefinity
    Getting Enterprise-Grade Authentication with Sitefinity
    Jordan Ilchev, Progress Sitefinity Jan 29 2020 4:00 pm UTC 33 mins
    In a very special encore webinar from ProgressNEXT, join the Sitefinity engineering team as they present technical topics with a live question and answer session on enterprise-grade authentication.

    One of the main challenges for developers is connecting multiple diverse systems. This is where Sitefinity shines, with standards-based authentication, OData services and built-in connectors that enable enterprises to tackle this critical piece of the puzzle.

    This on-demand webinar will discuss:

    Why large enterprises choose Sitefinity as their WCM for authentication capabilities
    New authentication capabilities, OData services and connectors in Sitefinity
    Integration with OAuth and Azure AD and best practices for configuration

    See how Sitefinity simplifies the integration of enterprise-grade authentication capabilities!
  • CCPA: A New Age In Privacy
    CCPA: A New Age In Privacy
    24by7Security, Inc Jan 29 2020 5:00 pm UTC 60 mins
    On January 1, 2020, the CCPA became effective. With this new change comes the dawn of a new era in privacy for the citizens of California. Any California consumer may demand to see all the information a company has saved on them, as well as a full list of all the third parties that data is shared with. In addition, the California law allows consumers to sue companies if privacy guidelines are violated, even if there is no breach.

    Tune in to listen to Kevin Levy, Shareholder at Gray Robinson and Sanjay Deo, President of 24By7Security as they come together and talk about how CCPA's overarching influence will impact how privacy is kept and handled in the US.

    CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
  • 3 keys to moving toward white-box, explainable AI
    3 keys to moving toward white-box, explainable AI
    Dataiku x VentureBeat Jan 29 2020 6:00 pm UTC 60 mins
    With black-box AI, people are refused or given loans, accepted or denied university admission, offered a lower or higher price on car insurance, and more, all at the hands of AI systems that usually offer no explanations. In many cases, humans who work for those companies can’t even explain the decisions.
     
    That’s why white-box AI is now getting heaps of attention. But what does it mean in practice? And how can businesses start moving away from black-box systems to more explainable AI? 
     
    We’ll delve into the three key components needed for white-box AI success: more collaborative data science, involving all teams from lines of business through IT; trust in data at all levels, including tools that
    can be used to increase transparency in data processes; and the role of education and the democratization of data. 
     
    And we’ll address why white-box AI brings business value in the first place and how it’s a necessary evolution for AI. Not only do customers care about explainable results of AI systems, but internally, white-
    box AI is less risky. Don’t miss this VB Live event on how to move towards explainable AI. 

    REGISTER FOR FREE

    Key Takeaways:
     
    + How to make the data science process collaborative across the organization 
    + How to establish trust from the data all the way through the model
    + How to move your business toward data democratization

    Speakers:

    + Triveni Gandhi, Data Scientist, Dataiku
    + David Fagnan, Director, Applied Science, Zillow Offers
    + Rumman Chowdhury, Global Lead for Responsible AI, Accenture Applied Intelligence
    + Seth Colaner, AI Editor, VentureBeat
  • Understanding ASTM’s New Building Energy Assessment Standard E3224-19
    Understanding ASTM’s New Building Energy Assessment Standard E3224-19
    Anthony Buonicore, P.E., Chair, ASTM Building Energy Performance Task Group Jan 29 2020 7:00 pm UTC 60 mins
    Sound business considerations, combined with growing regulatory requirements and focus, are driving commercial real estate investors and lenders to include an assessment of building energy performance in the property condition assessment (PCA) that is conducted as part of the property due diligence process prior to the transaction's closing.

    Newly published ASTM E3224-19, Building Energy Performance and Improvement Evaluation (referred to as the “BEPIE”), aims to address this growing need for assessing building energy performance. Its purpose is to identify if a building is under-performing compared to peers, and if so, identify possible measures that might improve energy performance and/or cost. The overall objective is to evaluate what it might take to achieve parity with peer buildings in the area. E3224 is specifically designed to be used in conjunction with ASTM E2018 for property condition assessment. As such, it will become more and more likely that a PCA consultant will be asked to include an assessment of the building’s energy performance.

    Join this webinar when Anthony Buonicore, P.E., Chair, ASTM Building Energy Performance Task Group, will cover the background for E3224, its practical application as part of a PCA, and the opportunity it offers firms who are able to include energy assessments into their scopes of work.

    What You’ll Learn:

    • The regulatory and business driving forces behind building’s energy
    performance assessment
    • The steps in conducting a BEPIE pre-acquisition screening
    assessment
    • The data requirements for a BEPIE
    • How BEPIE results can be integrated into a PCA
    • Why this is a new business opportunity for property due diligence
    consultants
    • The benefit to commercial real estate owners, investors and lenders
  • Broadcaster VOD: Delivering the next-generation of catch-up viewing
    Broadcaster VOD: Delivering the next-generation of catch-up viewing
    IBC365 | CBC | NLZIET | Finally Found Jan 30 2020 2:00 pm UTC 75 mins
    The onslaught of global OTT players is facing stiff competition in Europe from broadcasters' own catch-up VOD services (BVOD). Platforms like the BBC's iPlayer and Discovery's newly-launched dplay form a key part of broadcasters' strategy to protect audiences and advertising revenues.

    Join IBC365 on Thursday 30 January at 2pm GMT to find out how broadcasters with limited budgets build platforms to compete with the global players. In this webinar we:
    - Unbox BVOD platforms' content strategy, business models, technology platforms and operational requirements.
    - Explore the next steps in BVOD - from the BBC's move to build a deep content library of free-to-view box sets, to the importance of data, personalisation and addressable advertising models.
    - Understand the technology investment required to build class-leading user experience and assess the rise of shared platforms like LovesTV and Salto.

    Speakers:
    Roma Kojima, senior director OTT video (CBC Gem), Canadian Broadcasting Corporation

    Niels Baas managing director, NLZIET

    Richard Davidson-Houston, Founder and MD, Finally Found
  • Identification of unknown extractables and leachables using mass spectrometry...
    Identification of unknown extractables and leachables using mass spectrometry...
    Petra Booij, Investigator at GlaxoSmithKline & Dr Kyle D’Silva, Pharma & BioPharma Marketing Leader, Thermo Fisher Scientific Jan 30 2020 3:00 pm UTC 90 mins
    Full Title: Identification of unknown extractables and leachables using mass spectrometry: Identification with confidence?

    Extractable and Leachable (E&L) studies on materials used in the manufacturing process and container closer systems of drug products and drug substances are commonly used to assess the risk for patient exposure. Most often LC-MS or GC-MS is used to detect, identify and then quantify extractables and leachables. In general, an analytical evaluation threshold or reporting threshold is set based on a calculated patient exposure. Substances above the set threshold required further investigation if patient exposure exceeds this. Substances can be identified using mass spectral libraries to enable a toxicological risk assessment which considers the risk of patient exposure. However, how confident are we when we identify a substance using spectral libraries? A match with mass spectral libraries, data from orthogonal techniques, fragmentation data and availability of a certified reference standard can increase the level of confirmation. We will discuss an approach for different levels of identification and how to increase the level of confidence of identified extractables and leachables
  • Focus on Digital Experiences, Not the Infrastructure
    Focus on Digital Experiences, Not the Infrastructure
    Gregg Shupe & Sergei Sokolov, Progress Jan 30 2020 4:00 pm UTC 60 mins
    The pace of business is accelerating, as are the demands of today’s digital consumer. Does your organization have the agility, scalability and infrastructure necessary to deliver great customer experiences and stay competitive in an omnichannel landscape?

    With digital experiences as a key competitive differentiator for modern businesses, the underlying architecture has never been more important. The best digital experiences demand a content management system coupled with an architecture that facilitates agility, extensibility and scalability.

    This webinar recording covers:
    * Why the industry is moving content operations to the cloud and what it means to your business
    * How to make an impact with your global experiences fast to support corporate growth initiatives and drivers
    * How a move to the cloud can address performance, security and the development process

    Sitefinity Cloud empowers companies to easily develop and deploy powerful, unique digital experiences at the speed of business. Learn more by watching our webinar.
  • How to Communicate Risk & Security Program Value to Executives
    How to Communicate Risk & Security Program Value to Executives
    Sam Abadir, CISM, Lockpath Jan 30 2020 5:00 pm UTC 60 mins
    Many departments struggle with building a business case to create an effective, ethics-based risk management program. Plenty of executives today still think of risk management as a defensive, overhead activity or activities that are performed to satisfy legislative or regulatory requirements and deserve minimal attention.

    In this webinar, Lockpath’s Sam Abadir will help attendees understand the different value propositions business executives need to know to understand and support risk management projects across the organization.

    Attendees will learn how to:
    •Articulate their current and future risk management goals
    •Understand their risk management value proposition
    •Define business case benefits and communicate value to business executives
    •Define tools and resources needed to achieve goals
    •Understand an approach for their GRC or IRM program
  • Mechanical Updates in ANSYS 2020 R1
    Mechanical Updates in ANSYS 2020 R1
    Joe Woodward, Senior Mechanical Engineer & Lead Trainer, PADT, Inc. Jan 30 2020 6:00 pm UTC 60 mins
    With ANSYS structural analysis software, users are able to solve more complex engineering problems, faster and more efficiently than ever before. Customization and automation of structural solutions is much easier to optimize thanks to new and innovative finite element analysis (FEA) tools available in this product suite.

    Once again, ANSYS is able to cement their role as industry leaders when it comes to usability, productivity, and reliability; adding innovative functionality to an already groundbreaking product offering. ANSYS Mechanical continues to be used throughout the industry, and for good reason as it enables engineers to optimize their product design and reduce the costs of physical testing.

    Join PADT's Senior Mechanical Engineer & Lead Trainer Joe Woodward, for an in-depth look at what's new in the latest version of ANSYS Mechanical, including updates regarding:

    - External Modeling
    - Graphics
    - Composites
    - Linear Dynamics
    - And much more
  • Walking on the Wild Side: Exploring the Attacker Underground
    Walking on the Wild Side: Exploring the Attacker Underground
    Tarik Saleh, DomainTools; Aamir Lakhani; Ju-Lie McReynolds; Brandon Dunlap, Moderator Jan 30 2020 6:00 pm UTC 60 mins
    You don’t have to visit the dark web to find a black market where attackers and other bad actors trade information and can acquire tools & services that they can use to compromise your organization. Examples include things like Packer services (crypters, binders and packers), Malware services (RATs and silent doc kits) and Infrastructure services (such as VPSs, Domains and Shells). Join Domain Tools and (ISC)2 on Thursday, January 30, 2020 at 1:00PM Eastern for a discussion of attacker underground economy, how attackers see success with these tools and services and what defenders need to know to combat these threats.
  • Co-Solvent Injection Module
    Co-Solvent Injection Module
    Sam Shomper/Jake Didion Jan 30 2020 7:30 pm UTC 60 mins
    Learn about our newest technology, the co-solvent injection module! Sam Shomper in engineering will talk about the results so far, the advantages, and Jake Didion from sales will answer questions about retrofitting and availability.
  • From Source to Value: Why Automation is Driving Data Catalog Success
    From Source to Value: Why Automation is Driving Data Catalog Success
    Matthew Monahan, Senior Product Manager Jan 30 2020 8:00 pm UTC 90 mins
    Traditional data catalog solutions often require a conglomeration of separate tools (multiple catalogs, ETL, data governance, etc.) which are managed in silos by separate teams. When a data analyst needs to derive business value from this data, it requires communication across teams, integrations between products, and a high level of coordination to get them the data they need.

    A single platform, on the other hand, provides a single source of truth for analysts to quickly gain access to the data they need in a self-service manner. From source to provisioning, the automated data catalog keeps gears aligned and the train on the track. This reduces the burden on the IT staff, while ensuring the right level of governance over the whole process.

    An automated data catalog provides the workflow to take your data from source to value without manual intervention. Allowing a small team to accomplish the same tasks as one much larger. The catalog can automatically bring the data in from the systems of record, execute data quality rules, profile the data, prepare it for consumption, and provision it to the locations where the analysts can use it.

    During this webinar, Matthew Monahan, Senior Product Manager at Zaloni, will explore:
    - The benefits of a single application over connecting various point-solutions
    - How automation from source to destination reduces your workload
    - Real-world examples that you can leverage
  • Achieving Geo-Distributed Deployment with Sitefinity
    Achieving Geo-Distributed Deployment with Sitefinity
    Lilia Messechkova, Senior Director Software Engineering, Progress Jan 31 2020 4:00 pm UTC 24 mins
    While traditional content delivery networks with multiple points of presence may be the answer to serving static assets, more and more organizations are facing the challenges of delivering multichannel, dynamic and personalized content to global audiences.

    This webinar delves into one of the unique capabilities of the Sitefinity platform that can help deliver instant, personalized content across multiple regions.
  • Identification of Approaches to Simulated Leachable Studies: What are They? W...
    Identification of Approaches to Simulated Leachable Studies: What are They? W...
    Jason Creasey, Managing Director at Maven E&L and Karen Pieters, Ir. Team Leader E&L at Nelson Labs Europe Feb 3 2020 3:00 pm UTC 90 mins
    Full Title: Identification of Approaches to Simulated Leachable Studies: What are They? When to do Them?

    Presented by Jason Creasey, Managing Director at Maven E&L Ltd. Followed by an Industry Perspective presentation presented by Karen Pieters, Ir. Team Leader Extractables and Leachables at Nelson Labs Europe

    The term “Simulated leachable studies” is open to interpretation. I hope to provide a definition of this term and in doing so suggest when they can and should be used. The general aim of such studies is to provide an accurate qualitative and quantitative description of the substances which might be present as leachables in a pharmaceutical drug product (DP) derived from container closure system (and sometimes its manufacturing process) when the drug product is stored up to and including its shelf-life. Simulated studies provide an alternative to analysis of leachables directly in the drug product. A simulated study aims to avoid some of the downfalls of leachable analysis such as; inaccurate analysis of leachables due to interference from drug product and/or formulation elements, availability of stored DP samples, reaching required limits of detection in the DP and time / resource constraints associated with complex method development using DP.
    Simulated leachable studies must be able to accurately simulate the expected leachables in a DP and should be carefully crafted to achieve this. The system used for extraction must have similar propensity to leach from materials under study a drug product and care must be taken not to use system which either leach too much (potentially masking other substance) or too little.
  • Email Security: Why Now Is The Time To Review Your Strategy
    Email Security: Why Now Is The Time To Review Your Strategy
    Adenike Cosgrove Cybersecurity Strategy, International and Matt Cooke, Cybersecurity Strategist Feb 4 2020 10:00 am UTC 57 mins
    Nearly 100% of attacks require a human to click. Cybercriminals target people, largely via email, rather than systems and infrastructure. Security teams are spending over half of their time responding to phishing attacks. It’s never been more critical to have an effective and accurate email gateway that can identify and stop these attacks and provide the right forensics and visibility into who your most attacked people are.

    Legacy solutions cannot provide this visibility and are behind the curve in stopped advanced email threats.

    Join us to gain insights into:
    How the email threat landscape has changed with attackers evading legacy approaches;
    How leaders like Proofpoint have innovated to keep up;
    Our recommendations on the steps you must take to protect your people from email-based targeted attacks.
  • Reaxys PhD Prize 2020 - Tips and Tricks for Applicants
    Reaxys PhD Prize 2020 - Tips and Tricks for Applicants
    Dr Friedrich Kroll and Alica May - Reaxys PhD Prize team Feb 5 2020 2:00 pm UTC 60 mins
    This webinar will provide interested applicants with an overview of the prestigious Reaxys PhD Prize competition. It will cover submission requirements, eligibility criteria, deadlines and walk researchers through the application platform. Be sure to tune in if you are a young chemist and are thinking of applying to the 10th anniversary of this global competition! There will be plenty of time for Q&A at the end.
  • Informed patients: evolving healthcare, clinical trials and medical information
    Informed patients: evolving healthcare, clinical trials and medical information
    Andrew Schorr, Patient Power, Dominic Jack, Merck, Vale Nicoli-Carr, mdgroup, Dr Vidal Pérez, Cardiologist, Dom Tyer, pp Feb 5 2020 2:00 pm UTC 75 mins
    Overview

    Patients are more informed than ever about their conditions and what is available for them to improve their quality of life.

    The healthcare sector is increasingly focused on understanding patient needs and engaging them in the clinical development and medical information process. Therefore, it is paramount to create patient-focused educational content using a range of communication channels and digital tools.

    However, do we take any time to think like a patient and, by doing so, understand their evolving needs and how this will affect the development of clinical trials and other healthcare educational initiatives?

    This pharmaphorum webinar, held in association with Plenum and mdgroup, takes place on Wednesday 5th February from 14:00-15:00 GMT and will look at the impact of patient involvement, from clinical programme design through to launch and post-launch activities.

    Focus

    • What should patient-led communication look like and who will provide it?
    • How to best meet patients’ needs during clinical trials
    • Which meeting formats and other channels are most relevant to reach the broadest and most appropriate audiences?
    • What role will each stakeholder play in the future?

    Register to find out more and be part of this exciting debate.
  • 2020 Global Economic Outlook
    2020 Global Economic Outlook
    Craig Parker, Neha Anna Thomas, Jan E. Kristiansen Feb 5 2020 2:00 pm UTC 75 mins
    The global economy witnessed much turbulence in 2019, with intensified trade wars and Brexit delays influencing the growth story tremendously. Should businesses expect more volatility for 2020, or are global economic prospects looking up? 2020 growth prospects have notably improved in recent weeks following the finalization of Phase 1 of the US-China trade deal and with Brexit set to take place by the end of January without any further delays. Growth prospects for significant economies such as the US and China have marginally improved following the Phase 1 trade deal, but growth will continue to come under pressure from prolonged trade wars. Businesses could look to relocate production from China to Southeast Asia to circumvent tariffs, while countries such as Canada are also enjoying export gains in light of US-China trade wars.

    Key Takeaways:

    • Learn more about the 2020 global growth pulse and GDP growth outlook for major economies
    • Identify regional growth prospects, risks, and growth opportunities
    • Explore 2020 scenarios for trade wars, Brexit, and other key economic developments
    • Interact with Frost & Sullivan senior economists and regional experts
  • Protecting Your People and Data - Featuring Forrester's Zero Trust Framework
    Protecting Your People and Data - Featuring Forrester's Zero Trust Framework
    Ryan Kalember, EVP of Cybersecurity Strategy - Proofpoint & Chase Cunningham, Principal Analyst Feb 5 2020 6:00 pm UTC 60 mins
    There's lots of noise in the cybersecurity industry around zero-trust, but Forrester Research pioneered the original and most effective framework. It’s never been more important to understand how zero-trust principles apply to your environment, with people becoming the new perimeter, and protecting them and the data they access becoming the new imperative.

    In our upcoming webinar, we will take a closer look at the original Zero Trust Approach as defined by Forrester Research and applied in practice by leading security teams. The webinar will cover:

    - An overview of the Zero Trust approach
    - Concrete first steps for getting started
    - Guidelines on how to evaluate your standing within the maturity model
    - How Zero Trust reinforces people-centric security

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.