Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Tethering brand & buyer: Targeting your brand in a changing digital B2B space Cristina Dumitrache, Aruba, a Hewlett Packard Enterprise company | Stuart Harrison, MOI Global | Adam Davis, TechTarget According to Statista 2022 research, 40% of events in 2022 will be virtual while only 35% of events will be in-person. The personal connection of in... June 28, 2022 1:00pm Introduction to Ubuntu Core 22 David Beamonte Arbués, Ubuntu Core Product Manager Ubuntu Core, the Ubuntu flavour optimised for IoT and edge devices, has a new version available. With 4 releases behind, Ubuntu Core 22 is a mature e... June 28, 2022 2:00pm Don't ignore the value of your conversational data Kieron Guinamard, Research Scientist at Privitar & Chris Pierpan, VP Customer Solutions A closer look at Privitar’s Data Privacy for Chat For many organizations, social media, chatbots, and SMS messaging generates a large amount of conve... June 28, 2022 3:00pm Combating Ransomware 2.0: Beyond Backups Dr. Mike Lloyd, Chief Technology Officer and Bryan Barney, CEO, RedSeal Ransomware isn’t new – we can track it back to attacks using floppy disks in 1989 – and like all attacks, it has evolved over time. As defenders adopt... June 28, 2022 5:00pm Transformation to the Modern Cloud in 2022 - Featuring: Johnson Controls Intl. Kyle Usher, Integration Architecture, JC, Veera Malempati, Technical Architect, JC & Emmanuel Verge, Product Marketing, Axway Join us for an educational session with Johnson Controls International, a valued Axway Managed File Transfer customer. We will sit down with Kyle Ushe... June 29, 2022 9:00am How to Tackle Data Quality Issues Across the Lifecycle of Your CRM Systems Steve Farr, VP of Solutions & Marketing, Experian and Lucy Bourne, Partner Development Manager, Microsoft Your CRM sits at the heart of your organisation and is best placed for implementing data quality best practices – to help you to retain existing custo... 3 days ago | 29 mins Stopping Business Email Compromise with Technology and Culture Jess Burn, Senior Analyst, Forrester and Mike Bailey, Manager, Product Marketing, Proofpoint Featuring Forrester Research Successful business email compromise (BEC) attacks are causing billions in losses, while becoming more sophisticated and... 4 days ago | 61 mins Gone Phishing? Don't Let Your Employees Bite with Graham Cluley Graham Cluley, Cybercrime Researcher & Blogger & Mike Britton, CISO @ Abnormal Security There are plenty of phish in the sea, making it harder than ever for organizations to protect themselves against these attacks. Nearly 77% of all emai... June 30, 2022 3:00pm CBDC 101: Central Bank Digital Currencies Explained Innovate Finance This webinar will provide an introduction to Central Bank Digital Currencies and explore what the future may look like. Questions this session will an... July 7, 2022 11:00am Ransomware for the Remote User Eric Howard, Cisco When your users no longer sit in your line of sight, and are using devices spread out across an entire WAN, detecting and responding to a ransomware o... 2 weeks ago | 54 mins Load more