While Family Offices do rely extensively on the human touch to create and nurture relationships, technology can enable humans to do jobs that need to be done but still low-value.
Indeed, this is becoming a selling point, but how can you know what tech is worth it vs. what tech is just fun to say you have?
Further, what new business models exist that are driving value for clients?
This webinar will explore;
* Future tech that will enable increased output: BlockChain, AI & Automation
* Non-office technology that enables human connection: health & travel hacks
* What the best Family Offices are using to service their clients
* How to identify where you can be more efficient in your operations
You'll leave this webinar with an understanding of what technology exists to streamline operations, cut your work in half, and make you physically able to work more effectively, and what new business models exist.
Marc A. DePaul, J Jack Family Office
Michael L. Kalscheur, CFP®, Senior Financial Consultant, Castle Wealth Advisors, LLC
Stephen Wall, The Wealth Mosaic
While the technological and commercial advances of the cloud have created significant opportunities for enterprises, service providers and IT vendors alike, this cloud-driven transformation has also undone conventional approaches to data security and created compliance challenges when it comes to data control and ownership.
These changes have unwittingly drawn us into a realm of increasing threat vectors, poor security practices and bad actors. From reducing cost of ownership to empowering IT decision making across the value chain, it is safe to say that the cloud means that life will never be the same for anyone.
During this webinar we will:
- Look at the challenges facing today's IT and security teams;
- See how this wave of disruption can be overcome using ever advancing automation, processing and intelligence technologies that can be used to build and deliver security an increasingly diverse IT landscape; and
- Look at how security will need to evolve in the wake of digital transformation.
Many hybrid cloud technologies are designed to allow different private cloud and public cloud technologies communicate with each other, while leaving the actual workloads in proprietary formats that are not portable.
With Hybrid Cloud offerings like VMware Cloud on AWS, existing VMware environments can be extended to the cloud and create a truly hybrid model that allows workloads to easily move to where the business needs them.
Mark Vaughn, Director of the Strategic Technology group at Presidio, will share his insights and expertise during this engaging talk.
SMBs make up 95% of all businesses globally and employ 70% of the workforce, yet their productivity is typically lower than large enterprises. Embracing mobile is the ideal lever to improve their competitiveness, and this is indeed what is happening. SMBs are ramping up with those saying they are moving from experimenting to investing more heavily in mobile technologies jumping from 44% to 50% in just the last year.
In this webinar you will learn:
•Why SMBs stand to gain big from mobility and how they can succeed in their mobile journey.
•The four stages - Starting, Organizing, Strategizing and Optimizing – that they typically pass through as they mature their capabilities
•How to think through mobile strategy, security, governance, user engagement, processes and business model innovation.
•The pitfalls to avoid and questions to answer at each stage to get the most out of mobile.
Continuous Delivery Pipelines: Automating the value stream through continuous release
Join us for this 40-minute webinar to find out what Continuous Delivery is all about and how multi-application deployment pipelines can be implemented across both new and existing applications.
•The Journey to Continuous Delivery – what is Continuous Delivery and why the IT industry is transitioning to it.
•Implementing Continuous Delivery – what are some of the challenges of implementing Continuous Delivery and some recommendations for implementing it in complex multi-modal organisations.
•Demonstration of the Micro Focus solution.
Ist das V-Modell am Ende? Wenn man die Nachrichtenlage zur Agilität und DevOps verfolgt, so könnte man diesen Eindruck gewinnen. Dabei bestehen ein Großteil der Entwicklungen nicht nur aus Softwarekomponenten.
Richtig ist, sich zu erneuern, moderne Entwicklungsmuster aufzunehmen und in die klassische Produktentwicklung einfließen zu lassen. Ein Spagat, da die Produktion und Bereitstellung von Produktsamples kostenintensiv ist und sich daher nur bedingt für kurze Entwicklungszyklen eignet.
In diesem Webinar möchten wir die Verbindung von Bewährtem und Neuem in der Softwarekomponenten Entwicklung aufzeigen und diskutieren. Entlang des V-Modells zeigen wir, wie Modernisierungsmaßnahmen aussehen, Agilität eingebracht werden kann und moderne Produkt- und Variantenentwicklung unterstützt wird.
Wir freuen uns auf Ihre Teilnahme!
Financial institutions face a daunting combination of cybersecurity threats and compliance requirements. IT teams at regional banks and credit unions have a relatively small staff but facing similar security and compliance burden to what larger, well-resourced financial institutions carry. How can small and mid-sized financial institutions counter sophisticated cyberthreats, provide monitoring and incident response needed for compliance, and do so with tight budgets that do not allow for staffing an elaborate security operations center? Managed detection and response provides a “force multiplier” to address all three issues.
Attend this webinar and learn about:
• Top cyberthreats facing financial institutions
• Financial services compliance evolution, security monitoring and incident response
• Differences between SIEM, SOC, and SOC-as-a-service
• Monitoring on premises and cloud resources without adding headcount
To gain insights on these challenges and how to solve them, save your seat now!
Financial institutions must contend with the big three challenges of digital transformation, cyberthreats and regulations.
Always seeking a competitive edge, financials invest heavily in digital transformation, especially customer-facing technology innovations, but delivery often trails behind the need. New apps are developed, but network security policy management is often perceived as holding up progress, hampered by manual and error-prone change-management processes.
Errors in network security management procedures also expose institutions to unreasonable levels of cyber risk.
The growing body of demanding regulations burdens financial institutions with severe compliance requirements and never-ending audits.
There must be a better way!
Our latest webinar shows financial institutions how to make the triple play by automating network security policy management changes, at once enabling the business, reducing risk and enforcing compliance.
In this webinar you will learn about:
• Key industry metrics that compare security environments within and beyond the finance industry
• Network security policy management challenges that hamper digital transformation
• Overcoming security management complexity with automation for speed and accuracy
• Passing compliance audits in the face of demanding regulations
In this webcast, Justin Buchanan and Eric Sun will walk you through specific ways you can apply automation, both in vulnerability management and threat detection and response. If you’re on the fence between investing in more staff, automation technology, or managed services, we’ll provide you with what to consider to be ready for current and future threats.Read more >
Its your job to secure email, sensitive data and apps in Office 365. Now What?
Moving to cloud applications provides the opportunity to get your security right. This is the time to set up optimum data loss prevention, malware and phishing prevention, and access controls on your systems. No matter if you are still planning, have just started, are in the midst, or are fully migrated to Office 365, there are security policies and procedures to implement and optimize.
Join ESG industry analyst Mark Bowker, Insight’s Cloud Security Architect, Richard Diver, and Symantec’s System Engineering Manager, Jereme Lee to learn how to:
- Get the most out of your Office 365 instance by enhancing the security
- Understand what Microsoft offers and how Symantec compliments their security offering
- Enhance your email, app and data security in Microsoft Office 365 which can be used across all your cloud apps
Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?
Guest: Kristin Judge, Author at LinkedIn Learning
Kristin was elected to serve as a Washtenaw County Commissioner in 2008 and supported the U.S. Department of Homeland Security in growing cybersecurity outreach to state and local government officials. After elected office, she worked at the Center for Internet Security, focusing on connecting state and local governments to federal services and technology needed to improve cyber security.
As Director of Government Affairs at the National Cyber Security Alliance (NCSA), Kristin worked with Google, FTC, FBI, SBA, DHS, NIST, congressional leaders and other key stakeholders across the country to educate consumers and businesses how to protect sensitive data.
As a thought leader, Kristin has been seen on the C-SPAN Network, local news outlets and called on by technology publications like SC Magazine and Government Technology to share best practices for online safety; being named an SC Media “Women in IT Security Influencer” in 2017.
In 2017, Kristin was chosen for the 3rd cohort in the Presidential Leadership Scholars program which is a partnership between the presidential centers of George W. Bush, William J. Clinton, George H.W. Bush, and Lyndon B. Johnson to bring together a select group of leaders who share a desire to create positive change across our Nation.
To address the needs of cybercrime victims, Kristin recently founded the nonprofit Cybercrime Support Network to connect victims with federal, state and local resources in a coordinated manner.
People with savings want to earn a decent return without running too much risk. Some have saved out of their earnings, some have built up capital in a business which they sell, some have inherited some money. None of them want to throw it away. In an era of ultra-low interest rates just putting it in a bank means the value of your capital goes down each year, as prices are rising faster than the return on a deposit. That’s why many conclude they do need to take some more risk, to own some shares and bonds that offer a higher income but can also go down in value.
Investment managers need to maximise return for a given level of risk, and need to construct portfolios so not everything goes down at the same time if things do go wrong. This talk will examine how you spread your risks, and argues that over the longer term buying a portfolio of shares usually delivers a return above inflation, with a rising income from increasing dividends. Managers also are able to choose from a range of different countries with different currencies for their shares, and to look at the opportunities in commercial property as well. That can help find the right mix of return and risks.
This keynote panel is part of Cloud Month on BrightTALK.
Join this keynote panel of security and cloud experts as they discuss:
- The most prevalent security risks and challenges and how to contend with them
- Your cloud strategy and how it affects your overall security posture
- How to extend network security to the cloud
- Areas for automation
- Best practices on how to secure your enterprise in 2019
- Sushila Nair Sr. Director Security Portfolio, NTT DATA Services
- Diana Kelley, Cybersecurity Field CTO, Microsoft
- Yonatan Klein, Sr. Product Manager, Algosec
IoT devices have become a mainstream part of our lives. IoT devices are no longer just consumer devices, rather they are interwoven in different parts of corporations.
The August 2016 Mirai botnet attack has shown that security in IoT is required to have overall security. The lack of security in IoT devices not only affects users, but also affects the society in a larger scale. Manufactures of these devices need to follow a set of guidelines to ensure secure developments and deployments.
Moreover, device consumers such as corporations should be aware of their attack surface.
Join us for a live webinar as we address the top security and privacy issues in IoT devices, the threats that are targeting them and recommendations for possible solutions.
Nicholas Hsiao 北亞技術顧問將會討論有關人工智能系列的第二單元：
Please join Mark Nash, head of fixed income, and Nicholas Wall, portfolio manager, for a webcast in which they will discuss the outlook for fixed income markets.
Central bankers have been turning more hawkish in recent months, and there’s good reason to suggest bond yields in developed markets outside of the US are set to rise. The discussion will cover fund performance and positioning, macro-economic conditions, the outlook for emerging market debt and yield, risk and inflation trends.
Participant Dial In Number(s):
+44 (0) 20 3003 2666 - Standard International Access
0808 109 0700 - UK Toll Free
1 866 966 5335 - USA Toll Free
Pass code: 61544
Network and security are more critical than ever, but they need to be application centric and a virtualized extension of your business. Learn how to re-architect your cloud to drive better business results and take advantage of technologies like Software Defined Networking (SDN), Network Function Virtualization (NFV), and Everything-as-a-Service (XaaS). We’ll discuss how cloud solutions can enable you to take control of your digital strategies and form the foundation for your enterprise’s Digital Transformation.Read more >
Today’s digital-savvy customers expect to be able to buy on their terms - how they want and whenever they want. This is good news for retailers because customers who buy across multiple channels are more loyal and spend more. But in order to win and retain these customers, retailers need to create a seamless and holistic experience at every customer touchpoint, and many are falling short of realising this to its full potential and failing to meet rapidly rising customer expectations.
On this webinar, we will discuss how retailers can rise to this challenge by developing a deep understanding of their customers’ needs and expectations across the entire customer journey, break down organisational silos, and deliver seamless and connected journeys that delight customers and drive business growth.
On this webinar you will:
- Learn how to develop a thorough understanding of your customers
- Learn how retailers are breaking down silos and using cross-channel analytics
- Understand how to create a shared vision organisation-wide
The objective of the workshop is to provide basic understanding of the React Native framework and the React designs principles by building a Native App for iOS and Android platform.
Additionally, the GraphQL query language will be presented and used during the workshop as a strategic companion for frontend development and a perfect match for React design.
By the end of the workshop, attendees will be capable of understanding the technologies involved and proactively progress in their learning journey.
Who is it for?
Developers of all levels interested in mobile application development with very little or no knowledge of React Native and GraphQL technologies.
The workshop is provided in 3 sessions of 1h each.
- In the first session we will focus on React and React Native principles, code organisations and useful tips and tricks.
- In the second session an app will be produced using React Native, running on both iOS and Android.
- In the third and final session we will focus on GraphQL and its integration with the previously built React Native App.
- Core principles of React and React Native
- How to organise a React Native project
- Core principles of GraphQL
- How to query GraphQL from React Native
- React Native
- Apollo for GraphQL
In order to follow the workshop with your computer a software stack should be installed. Details will be provided.
What are companies with superior customer experiences doing differently? Join industry leaders John Irey and Greg Cummings as they share the strategy behind an effective omnichannel customer care success model. Participate in a discussion on how self-service, AI, and digital tools are shaping the customer journey and how to leverage that knowledge to build a better digital plan. Benefit from shared examples of the best and worst attempts at omnichannel and get equipped with the tools necessary to build your own strategy.
Greg Cummings - Greg has 20 years of industry experience in consulting, operations, and contact centers -- helping to drive process improvement through an outcomes based methodology. He is currently Manager Global Channels with NICE inContact.
John Irey - John, a contact center Principal Consultant at Mindsight, is an 18 year veteran assisting in the full life cycle of contact center engagements. His experience in both solutions and deployment engineering roles gives him deep insight into the strategy behind developing an omnichannel contact center solution for every business need.
Can your organization react to customer events as they occur?
Can your organization detect anomalies before they cause problems?
Can your organization process streaming data in real time?
Real time and event-driven architectures are emerging as key components in developing streaming applications. Nearly half of organizations consider it essential to process event data within seconds of its occurrence. Yet less than one third are satisfied with their ability to do so today. In this webinar featuring Dave Menninger of Ventana Research, learn from the firm’s benchmark research about what streaming data is and why it is important. Joanna Schloss also joins to discuss how event-streaming platforms deliver real time actionability on data as it arrives into the business. Join us to hear how other organizations are managing streaming data and how you can adopt and deploy real time processing capabilities.
In this webinar you will:
-Get valuable market research data about how other organizations are managing streaming data
-Learn how real time processing is a key component of a digital transformation strategy
-Hear real world use cases of streaming data in action
-Review architectural approaches for adding real time, streaming data capabilities to your applications
Le applicazioni moderne vengono distribuite in poche ore anziché giorni o settimane, consentendo alle aziende di accelerare il time-to-value e fornire una migliore esperienza al loro cliente finale. Uno dei modi più rapidi per passare dall'ideazione alla produzione è quello di disporre di una piattaforma di gestione dei container coerente e affidabile che aiuti gli sviluppatori a erogare il software più velocemente e all'IT di semplificare le operazioni
VMware e Pivotal mettono insieme le nostre competenze combinate per offrire una soluzione di gestione dei container completa con Pivotal Container Service (PKS).
Unisciti ai tuoi colleghi in questo evento gratuito della durata di un'ora per sapere in che modo le aziende possono implementare i containers su vSphere con PKS, semplificando la gestione di un ambiente Kubernetes dall’installazione (day 1) fino all’aggiornamento ed evoluzione infrastrutturale (day 2).
Agenda del webinar:
- Kubernetes e l'orchestrazione dei container
- La gestione dei container e di Kubernetes in ambienti di produzione con VMware e -
- Pivotal Container Service (PKS)
- La modernizzazione delle applicazioni con PKS
- Demo di Pivotal Container Service e delle integrazioni con l'infrastruttura VMware
- Chiusura del webinar e Q/A
Pivotal Privacy Statement:
VMware Privacy Statement:
D3 Security and EMA Present: How to Prepare Your SOC for Security Orchestration.
Sophisticated cyber attacks and a siloed IT ecosystem have prompted the rise of Security Orchestration, Automation and Response technology. To keep up with the threat landscape, security professionals and architects must understand how to prepare for and deploy "SOAR".
In this webinar hosted by EMA Security and Risk Management Expert, David Monahan, and D3 Director of Cyber Security, Stan Engelbrecht learn how to:
• Define expectations for security and IR orchestration
• Map your tools, processes and stakeholders
• Prioritize compliance and business requirements
• Automate a full-lifecycle Phishing / BEC playbook
We'll also do a deep-dive on the latest automation and orchestration capabilities, including threat intelligence enrichment, artificial intelligence (AI) and machine learning (ML), and share insight from real-world SOAR deployments and security operations.
If you're deploying Microsoft Office 365, you owe it to yourself to see how Box can help you power a best-of-breed digital workplace.
Tens of thousands of businesses running Office 365 choose Box over OneDrive and SharePoint so they can improve user and IT productivity, improve content security and protection, and reduce infrastructure costs. At this webinar, you’ll hear in detail why Box and Office 365 make such a winning combination. Box offers a single cloud content management platform for securely managing all your content in one place, including a:
-Better user experience — users can share, edit and collaborate on all their content with all of their teams inside Box without needing to switch between different tools
-Better admin experience — more granular controls, one admin console to manage all your content
-Better security — a central platform for consistent security and governance
-Better integrations — Box is integrated with more than 1,400 popular applications like Salesforce, Slack, NetSuite and Okta
Even though VC investment into UK FinTech has grown exponentially in recent years, reaching $1.8 billion in 2017, women still only raise a minute percentage of this. A recent study by Boston Consulting Group (BCG) and Mass Challenger, a network of startup accelerators, found that when women applied for investment, they received less funding compared to the average male founder, but made double the revenue.
Our panel of CEOs in leading FinTech firms and investors will look at how women in FinTech are raising funding. Who are the funders? What are they looking for and what needs to change? Do women need to rely less on traditional modes of finance or are more dynamic options available?
Julia Streets, Streets Consulting
Clare Flynn Levy, Founder and CEO, Essentia Analytics
Felicia Meyerowitz Singh, Co-founder and CEO, Akoni
Francesca Tondi, Board Member, Investor, Unicredit Group, Angel Academe, FinTech Circle
Georgia Stevenson, Associate, Northzone
Laura Hutton, CPO and Co-Founder, Quantexa