Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Fireside Chat : Bringing Trust and Security to Blockchain Joe CAI, Chief Security Officer, HashKey Group; Jeff CHEN, Sales Engineer Manager, Greater China and Korea, Thales Within a permissioned blockchain, transactions are validated and processed by participants that are already recognized by the ledger. Despite this, th... 1 month ago | 48 mins Wealth Management: Putting Customer Data at the Center of Digital Transformation Kerry Ryan - Salesforce & Gavin Little-Gill - Appway CRM + CLM in Wealth Management: Putting Customer Data at the Center of Digital Transformation In this webinar, Kerry Ryan, Director Global Go to Mark... June 30, 2022 9:00am Stop Account Takeovers with Phishing-Resistant MFA Karen Larson, Sr. Director, Strategic Alliance, Axiad; Derek Hanson, VP Solutions Architecture and Product Evangelist, Yubico Cyberattacks were the fifth top rated risk in 2020, and they continue to grow in 2022 with 91% of all cyberattacks beginning with a phishing email. En... June 29, 2022 4:00pm Federated data management via Data Mesh at a Big 4 accounting firm Barak Gablinger, VP Customer Delivery and Gil Trotino, Director Product Marketing at K2View About this talk: For this international giant, complying with global and local data regulations – while federating data ownership – is a big daunting... 6 days ago | 58 mins Business Continuity & Digital Connection: Best Practices for Wealth Management Giorgio Luparia, Lynn Vo & Sarah Robins When faced with unexpected restrictions, how can wealth managers maintain the high quality of client engagement, compliance, and operational efficienc... 7 days ago | 36 mins 5 anomalies to watch out for in your network Siddharth, IT Security Expert Unusual events occur in a network that is under attack. These events, called anomalies, can be tracked by security teams to identify and investigate p... 1 week ago | 54 mins Mitigate Risks in Code_ Protect Your Software-Based Supply Chain Maor Kuriel Senior Product Line Manager & Guy Bar Gil & Head of Product Led Growth at WhiteSource As new threats in software development arise almost daily, attackers increasingly are targeting the software supply chain. CI/CD pipelines streamline ... June 30, 2022 5:00pm Enabling Data Centricity & Digital Innovations - Volvo Cars Magnus Wernersson, Data Architect at Volvo Cars and Pekka Tamminem, Data Architect & MDM Team Lead at Volvo Cars This video discusses how when saddled with a mature, overwhelming IT legacy and data landscape in need of modernization, organizations need to create ... July 7, 2022 5:00pm Data Hub: Strategies for Effective Convergence of Data Management and Governance Kevin Petrie, VP of Research at Eckerson Group; Matt Dahlman, VP Customer Success at Semarchy The data hub enables business managers and BI analysts to take a more hands-on role in data management and data governance. They use the data hub to i... 3 weeks ago | 61 mins Microservices Security Pattern in Kubernetes (East-West Traffic) Chris Nesbitt-Smith, Instructor at Learnk8s Join the experts from Learnk8s and NGINX to learn “How do I secure my APIs and apps to be production-ready?” In this session, you’ll learn about the s... 5 days ago | 64 mins Load more