Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Ushering Your ESM Journey Towards a Connected Service Experience Eveline Oehrlich, VP & Research Director, Research In Action & Vesna Soraic, Product Marketing, ESM, Micro Focus According to Gartner Research, CIOs, IT leaders and the entire IT team must be focused on a Human-Centric Design for the Workplace. Research In Action... 10 months ago | 49 mins Career Conversations with Marcelle Lee Mari Galloway CEO, Founding Board Member of Women's Society of Cyberjutsu A mentor-mentee relationship is proven to have powerful positive impacts on both parties. However, not often do we have the resources to commit to suc... 1 year ago | 58 mins Inside Data Lineage: Lineage at Large Customer Panel Ryan Doupe, American Fidelity Assurance; Shaun Rankin, Huntington Bank & Isabelle St-Cyr, CSX Transportation As businesses scale the use of data as a transformative power to innovate and increase efficiency, usage of intelligent data lineage is exploding. It’... 2 years ago | 57 mins Harnessing Infrastructure as CodeTo Deliver Elastic Networks of the Future William Collins, Principal Cloud Architect, Alkira Automation is now a business imperative that underpins elasticity and intersects directly with business outcomes. In this demonstration, William Colli... 1 year ago | 14 mins Cyber Authors Ep.3: How to Do Application Security Right Ted Harrington, Author of Hackable & Executive Partner at ISE | Sushila Nair VP Security Services at NTT DATA If you don’t fix your security vulnerabilities, attackers will exploit them. It’s simply a matter of who finds them first. If you fail to prove that y... 2 years ago | 58 mins Eliminate Multi-Cloud Networking Challenges in One Click Binu Nadarajan and Julian Greensmith Enterprises IT teams usually focus on the effective use of computing and storage services in their cloud environments, often taking networking aspects... 2 years ago | 46 mins Using Automation and Data Analytics to Combat Increasing Cyber Threats Richard Telleria, Anand Trivedi, Halim Santoso, Abbas Kudrati With cyber threats increasing in quantity and complexity, what strategy should CISOs adopt in order to be prepared and protected from constant and new... 3 years ago | 49 mins Design a Mentoring Program That Delivers! Sushila Nair, Joy Harrison, Virginia "Ginger" Spitzer, and Kwasi Mitchell Mentoring programs can increase knowledge and build skills for future goals and milestones, allowing your workforce to grow their skills organically a... 2 years ago | 59 mins Insider Cyber Theft and Sabotage: How Does It Work and How Can We Stop It? Dawn Cappelli, VP & CISO at Rockwell Automation In the current threat environment – with threat actors like North Korea targeting Sony Pictures and Russian hackers targeting the Ukraine power grid –... 6 years ago | 44 mins Cyber Authors Ep.1: Inside the Cyberwar to Hijack Elections & Distort the Truth Theresa M Payton - CEO & Founder of Fortalice Solutions & Sushila Nair - VP, Security Services NTT DATA Theresa Payton, leading cybersecurity expert and first female Whitehouse CIO, discusses her book "Manipulated: Inside the Cyberwar to Hijack Elections... 2 years ago | 56 mins