Session on how you can optimize your Cisco collaboration environmentRead more >
This session will cover two main subjects: minimizing the amount of hardware your Splunk installation requires through performance tuning and troubleshooting a number of issues that will likely occur as your Splunk installation grows in size and users. This session aims to assist Splunk administrators with troubleshooting and tuning their growing Splunk installation.Read more >
Feeling bludgeoned by bullhorn messaging suggesting your monolithic behemoth should be put down (or sliced up) to make way for microservices? Without question, “unicorn-style” microservices are the super-nova-hot flavor of the day, but what if teaching your tried and true monolith to be a nimble, fast-dancing elephant meant you could deploy every week versus every 6 to 9 months?
In this session, we’ll look beyond the hype to understand the deployment model your business case actually demands, and if weekly deployments courtesy of a dancing (or flying) elephant fit the bill, love the one you're with as you lead the organization's journey to digital transformation.
What are the latest trends in the cyber-criminal underworld?
Which attacks are you likely to be preventing as we move further into 2018?
Who’s looking for vulnerability on your network?
These questions and more, answered by Peter Wood FBCS CITP MIEEE CISSP M.Inst.ISP
Chief Executive Officer, First Base Technologies LLP
Peter’s career spans 48 years, with experience in network security, social engineering, threat and risk analysis, red teaming, industrial control systems and electronics. He founded First Base Technologies, one of the UK’s first information security consultancies in 1989. Peter has provided security advice and guidance for businesses of all sizes for more than 28 years, leading a team of expert penetration testers and consultants unrivalled in the industry.
He is also a world-renowned security evangelist, speaking at major conferences and delivering seminars and webinars. He has appeared in documentaries for BBC television, provided commentary on security issues for TV and radio, and written many articles on a variety of security topics.
He is a BCS Fellow, a Chartered IT Professional, CISSP and a member of IISP, ISACA, ISSA, IEEE, ACM and Mensa. He is a visiting lecturer at the University of Sussex, teaching cybersecurity and ethical hacking.
One of the many benefits of best-of-breed object storage solutions is the ability to scale on demand and pay as you grow. How do you predict your capacity needs and determine your roadmap for scaling your storage? VP of Product Tony Barbagallo and Sr. Consultant John Bell will provide concrete guidance to help you predict your needs so you can accurately map out and budget for your organization’s data growth.Read more >
In today’s digital marketplace, your applications are the backbone of your business. However, cloud-based apps create a host of complex challenges and new risks. With automated tools and hackers for hire, threats are increasing and cybercrime has turned into a game for profit. The digital world has opened the door to unprecedented threats, putting your corporate data and reputation at risk.
Join us for this webinar to learn about:
• The 7 most common threats to your apps and data: Malicious bots, Credential stuffing, DDoS, Ransomware, Web fraud, Phishing, and Malware
• How you can leverage threat intelligence to secure your apps and data
• Where to spend your security budget to provide the strongest level of protection
What sank the Titanic and is sinking some of our great companies? What will separate future winners from losers?
50% of the Fortune 500 companies in the year 2000 do not longer exist because they were not able to measure and predict their strategy execution risk and link their decisions to the results of their decisions.
By the end of the webinar you will be in a better position to identify the risk to your strategy execution and understand why identifying and measuring your strategy execution risk must be an important component of your operational risk.
The webinar is based on the SIMMETHOD risk and performance methodology and C-suite risk alerts, a top 10 innovation product from the Department of Trade in NSW Australia with top 1% views in LinkedIn’s Slideshare and frequently consulted by over 300 global Universities.
In spite of Billions of dollars spent on Enterprise Risk Management and analytics, why do companies continue to fail or miss their targets? Can industrial era metrics mislead you into the incorrect decisions?
According to IBM’s CFO Insights, 53% of CFOs think that they are not effective at measuring and managing performance and according to Deloitte, one of the top CFO concerns is predicting execution missteps.
According to John Chambers, Cisco’s Chairman, 70% of the S&P 500 will attempt digital transformations during the next years but only 30% will succeed? Why?
The missing ingredient
Although the C-suite is aware that digital transformations entail new processes, management procedures, information systems and customer relationships, we continue to use industrial era metrics that were designed for a business environment that does not longer exist. And… in digital transformations, the way you measure will determine your results.
Additionally, the webinar will assist you to identify C-level metrics linked to the Best In Class and develop a bridge between you and your C-suite via holistic and industry agnostic actionable indicators.
Customer data falling into the hands of cybercriminals. It’s the stuff of nightmares for any organisation. Today the insider threat has the potential to pose a bigger risk to cybersecurity than external hackers.
In this webinar, LogRhythm experts will take you through a real use case in which data worth millions of pounds was stolen. And they will explain how the incident could have been stopped with the right response and mitigation approach.
Join the webinar to:
• Learn how cybercrime has evolved so much that insider threats now rival external threats
• See a live display of activity generated by an insider threat
• Discover cybersecurity innovations that can detect and respond to insider threats in real time
Join us to get a better understanding of the insider threat – and how to combat rogue elements in your organisation.
Are you struggling to turn big data into useful, accurate, consistent, and impactful insights? Organizations are rapidly adopting new technologies like Hadoop, Spark, and Kafka to help lines of business develop new insights. However, with the sheer quantity of data available and complexity of new technologies, the opportunity to drive operational efficiencies and grow sales can feel overwhelming, inflexible, manual, and complex. Informatica's customers have successfully pursued digital transformation strategies through more systematic approaches for getting the right data, in the right place, at the right time to the right people.
In this webinar, learn how to:
• Design an architecture for data management with Hadoop and big data that can scale for large organizations
• Understand best practices for data integration, data quality, data cataloging, and data preparation
• Exploit automated approaches to data management to get more trusted data assets every time
Join experts from Cloudera and Informatica to learn about an enterprise approach to data management that enables big data to be turned into useful, accurate, consistent, and impactful business insights.
In today's mobile connected age, it’s imperative for businesses to understand how to leverage mobile location data, in real-time, to alter engagement and garner greater customer insight.
So how do brands create thumb-stopping experiences with this real-time, contextual and passive behavior? Register now to learn:
- The fundamentals of mobile location tracking
- How consumer attitudes towards privacy are driving new data collection
- The differences in data insight between cookies and mobile location tracking
- Tips and strategies for optimizing your mobile channel(s)
To stay competitive in today's global arena, you need capabilities to create and deploy a multi-channel program that delivers training wherever and whenever employees need it. SAP Learning Hub is the answer: lower your costs and bypass obstacles with instant online access to SAP's vast reservoir of knowledge and learning content.
Join us for an in-depth tour of the full SAP Learning Hub on March 22 2018 at 12:00 pm CEST. Discover how SAP Learning Hub provides:
•A complete repository of multi-modal content across the SAP solutions and beyond
•Collaborative learning with instructors and peers via the SAP Learning Rooms
•Hands on experience with SAP Live Access
•Internal corporate learning reporting via the underlying SAP SuccessFactors platform
•Gamification to make learning fun
And how SAP supports this with:
•Learning needs analyses and User mapping services
Speaker: Caroline Kinsman
An experienced senior education architect who has worked within the field of SAP Education Solutions for over seventeen years.
Responsible for designing and delivering successful education programmes for ERP system implementations at both national and multinational organisations. A qualified Chartered Accountant and fluent in three languages Caroline is able to bring her considerable wealth of business experience to a range of stakeholders and sponsors at many levels within an organisation. With twenty years of experience in project team training and consulting, she is able to engage on multiple levels from the strategic to the practical within a project environment. Caroline's experience covers a multitude of sectors including pharmaceutical, public sector, financial services, utilities, oil and gas, consumer goods and automotive. Specialties: A holistic education approach from cradle to grave; detailed knowledge of Project Team Training and SAP Learning Hub.
To harness the full power of enterprise software, your users need to rapidly gain fluency with new applications, keep abreast of ongoing changes, and keep improving their skills. As the trend in learning moves from formal learning to informal and time-of-need learning, *SAP Enable Now can support your move to a blended learning approach while providing flexible online performance support. Find out why SAP Enable Now is not just about rapid authoring, and discover the value and power of SAP Enable Now as a collaborative authoring and content management platform for learning and for knowledge sharing.
•With SAP Enable Now, formal learning, informal leaning and online performance support is available for any application.
•SAP Enable Now efficiently creates rich, interactive and flexible e-learning, process simulations and quiz functionality.
•Collaborative authoring, updating, sharing and management of content is key to a successful learning and knowledge sharing strategy.
•SAP Enable Now has unique support for SAP’s flagship application suite, SAP S/4 HANA.
Zusätzlich zu Angreifern von außen stellt das Verhalten von Mitarbeitern eine Gefahr für Unternehmen dar. Deswegen muss das Sicherheitsbewusstsein aller Mitarbeiter geschärft werden, um das Risiko von internen Bedrohungen zu minimieren. Das Aufgabenfeld von Sicherheitsteam steigt somit weiter an.Read more >
This webinar is part of BrightTALK's Founders Spotlight series. In the seventh episode of this series, Harriet Jamieson interviews Jeff Rumburg, founder of MetricNet and recipient of the 2014 Ron Muns Lifetime Achievement Award for his contributions to the IT Service and Support industry.
Jeff’s education includes an M.B.A. from the Harvard Business School, an M.S. magna cum laude in Operations Research from Stanford University, and a B.S. magna cum laude in Mechanical Engineering. He is author of A Hands-On Guide to Competitive Benchmarking: The Path to Continuous Quality and Productivity Improvement, is a renowned ITSM speaker, and thought leader, and has taught graduate-level engineering and business courses. He was previously Vice President at Gartner.
Discover how content drives the digital journey.
The digital world is transforming how we interact with our customers. In this world, content is currency and the right content drives the customer journey and connects each customer touchpoint with the next. But managing this content on a global scale across channels in multiple languages requires a new approach that centralizes data, standardizes process, and integrates technology into a unified platform.
That sounds great in theory, but what does it actually mean? Join SDL as we discuss how a Global Content Operating Model (GCOM) can help you achieve your business goals by defining processes and technology frameworks that support your entire content supply chain.
We’ll look at business parameters that factor into how you deploy such a model, and take a peek at how this model evolves over time and even prepares companies to take advantage of emergent AI.
We’ll break down each step, including:
• How to manage the content supply chain across departments and platforms.
• How to apply processes that address each step from content creation and translation to delivery.
• Criteria for selection of technology and services that lead to growth and sales.
Today, modern, Customer Support teams use thoughtful, intuitive technology to solve customer issues at light speed. In some cases, they have even transformed from a cost center to a juiced up revenue producer.
In our March Lunch and Learn our Customer Service experts will show how to do just that, with real-world examples from companies winning Customer Service right now, and a live demo.
With new technologies such as Hive LLAP or Spark SQL, do you still need a data warehouse or can you just put everything in a data lake and report off of that? No! In the presentation, James will discuss why you still need a relational data warehouse and how to use a data lake and an RDBMS data warehouse to get the best of both worlds.
James will go into detail on the characteristics of a data lake and its benefits and why you still need data governance tasks in a data lake. He'll also discuss using Hadoop as the data lake, data virtualization, and the need for OLAP in a big data solution, and he will put it all together by showing common big data architectures.
Aufwendige Reisekostenabrechnungen auf Papier oder in Excel-Tabellen gehören in Unternehmen der Vergangenheit an. Erfahren Sie, warum Automatisierung die Lösung auch für komplexe Reisetätigkeit ist.Read more >
Gary Kirk, Partner and Portfolio Manager on the TwentyFour Select Monthly Income Fund will be hosting a webinar on Tuesday 27th March at 2:30pm.Read more >
Обзор PaaS платформы Pivotal Cloud Foundry, позволяющей создать единую среду для запуска приложений, построенных на базе микро-сервисной архитектуры и технологий контейнеризации. Комплексное решение Dell EMC Pivotal Ready Architecture позволяет построить готовую программно-аппаратную инфраструктуру и в максимально короткий срок начать предоставлять PaaS сервисы разработчикам и владельцам приложений. Вебинар проводится при поддержке компании Intel®Read more >
Our recent survey highlighted the challenges and opportunities facing UK small and medium businesses going into 2018. Join Dun & Bradstreet and the Forum of Private Business for a discussion on how to help mitigate the impact of late payments and an economist’s view on what the latest Brexit developments mean for the UK’s SME community.Read more >
LeClair Group wants to help make your business the number one seed with your group clients during our March Group Madness Webinar Sprint Series. During four quick-hitting webinars, LeClair Group and our partners at Blue Cross and Blue Shield will bring to you important information about how to serve your clients and potential prospects.
With LeClair Group in your court, you will be able to score more sales.
Understanding what pharmacies are in and out of network can often be a confusing topic. This webinar will identify what strategies are in place to help simplify these discussions.
OLIVER won Bronze in the best writing category at the 2017 DMA Awards.
The team will present a case study of the campaign. They will pick apart the copy they wrote for it, the ideas behind what they wrote, the successes and challenges of writing the campaign – essentially the blood, sweat and tears that went into making it award worthy.
Examining 2017 to prepare for what's coming in 2018
The modern cyber war — against governments, businesses and individuals alike — is comprised of a series of attacks, counterattacks and respective defensive countermeasures. The SonicWall 2018 Cyber Threat Report provides exclusive data that highlights advances by both the security industry and cyber criminals.
Attend this webinar to gain a better understand the current State of Cyber-Security Arms Race. We’ll share our findings, intelligence, analysis and research to help you improve your security preparations and posture going forward.