Hi [[ session.user.profile.firstName ]]
Sort by:
    • Cybersecurity Now: A Guide to Building a People-Centric Strategy
      Cybersecurity Now: A Guide to Building a People-Centric Strategy Ryan Kalemeber, SVP, Cybersecurity Strategy, Proofpoint Recorded: Sep 18 2018 3:00 pm UTC 62 mins
    • Do you know when or how your executives are being targeted? Do you know who the most cyber attacked people in your organisation are? Are your very attacked people (VAPs) the same your very important people (VIPs)?

      You need to protect your companies greatest assets– it’s people, and the data that they have access to. You must have visibility into the risky behaviours that indicate that your people may fall for a modern, socially-engineered attack.​The only way to successfully combat today’s advanced attacks is to focus on protecting your people.

      Join Proofpoint’s SVP of Cybersecurity, Ryan Kalember during this webinar to learn how to build a people centric cybersecurity strategy that will:

      o Prevent cyberattacks by stopping them before they start

      o Defend against email and cloud threats

      o Respond quickly to threats and limit the damage they could cause

      About the presenter:

      With over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry. Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.

      Read more >
    • Unified Content Strategy: How To Make Product Content Work For You
      Unified Content Strategy: How To Make Product Content Work For You Regina Lynn Preciado, Content Strategy Consultant Recorded: Mar 7 2017 4:00 pm UTC 62 mins
    • If you want your product content to work for you (rather than the other way around), you need a content strategy. In fact, you probably need a Unified Content Strategy -- a three-pronged approach that empowers you to do just about anything with your product content.

      Join me, Scott Abel, The Content Wrangler, for a free, one-hour webinar with content strategy maven, Regina Lynn Preciado. Regina will discuss the need for a flexible, forward-looking content strategy. You'll learn what a Unified Content Strategy is, why it’s important, and five things you can do to start working toward a more strategic approach to product content.

      ABOUT OUR GUEST

      Regina Lynn Preciado is a content strategy consultant who helps companies transform how they organize, manage, and leverage content. From the dot-com boom of the ‘90s to today’s demand for intelligent, global, mobile-friendly content, Regina has helped dozens of organizations make content work for people (instead of the other way around).

      “I’ve worked with projects of all sizes, from sole proprietors to large international enterprises, and have found that a unified content strategy is scalable for any size organization -- the principles and the purpose remain the same,” – Regina Lynn Preciado

      Regina is a senior consultant with Content Rules, Inc., the only licensed provider of The Rockley Method™ unified content strategy.

      Read more >
    • IDC FutureScape: Worldwide Digital Transformation 2019 Predictions
      IDC FutureScape: Worldwide Digital Transformation 2019 Predictions Robert Parker, Group Vice President, Shawn Fitzgerald, Research Director, Digital Transformation Strategies Upcoming: Nov 7 2018 4:00 pm UTC 60 mins
    • In this IDC FutureScape presentation, the IDC Worldwide Digital Transformation team discusses the key predictions that will impact CIOs and IT professionals in the worldwide digital transformation industry over the next three to five years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

      About IDC FutureScape
      IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.

      To learn more about IDC FutureScape 2019, please go to http://www.idc.com/events/FutureScape

      Read more >
    • Securing Information: How To Mitigate with a Data-Centric Security Strategy
      Securing Information: How To Mitigate with a Data-Centric Security Strategy Doug Cahill, Analyst at Enterprise Strategy Group (ESG), Lynne Courts, VP of Marketing at Seclore Recorded: Nov 2 2016 3:00 pm UTC 61 mins
    • Organizations collaborating with third-party entities, where employees are sharing files with individuals outside of the organization, are facing security risks at unprecedented scale. These dynamics correlate to the need for security controls such as Enterprise Digital Rights Management (EDRM) to protect sensitive information when it travels outside of the corporate firewall.
      In this presentation, analyst Doug Cahill from Enterprise Strategy Group (ESG) will discuss the findings from a recent study where over 200 IT and Security Professionals shared their views on the challenges with external collaboration, and his recommendations for best practices. Lynne Courts, VP of Marketing from Seclore will share how to build a comprehensive data-centric security strategy with such technologies as next-generation EDRM.

      Join us and discover:

      - The most vulnerable information – what types of files are regularly shared externally that pose the greatest risks
      - Industry and analyst views on where shared sensitive data needs protecting, and what defences are most effective
      - How to best design a comprehensive data-centric security strategy for shared information that will protect data, meet compliance regulations and reduce your risks

      Read more >
    • Income At Retirement: EMEA Outlook and Strategies
      Income At Retirement: EMEA Outlook and Strategies Jean Francois Hautemulle, George Lagarias, Adrian Lowcock, Toby Nangle Recorded: Sep 13 2018 10:00 am UTC 58 mins
    • This Webinar will bring experts together to discuss income at retirement investment strategies.

      We should hear about the challenges to generate income in a consistent and substantial manner in all asset classes, Fixed Income, Equity Income products as well as multi asset income products, which are becoming increasingly popular with savers and investors.

      We will also discuss solutions driven products that are being offered to savers and investors at retirement age, including draw down solutions to complement retirement income.

      Finally, we will address how distributors and advisors are helping their clients before retirement and once they are retired in meeting their financial needs.

      Panellists
      George Lagarias, Senior Economist, Mazars
      Adrian Lowcock, Head of Personal Investing, Willis Owen
      Toby Nangle, Global Co-Head of Asset Allocation & Head of Multi-Asset, EMEA, Columbia Threadneedle

      Moderated by;
      Jean-Francois Hautemulle, Principal, Terres Neuves Consulting Limited

      Read more >
    • How to Build your People-Centric Cybersecurity Strategy
      How to Build your People-Centric Cybersecurity Strategy Ryan Kalember, SVP Cybersecurity Strategies at Proofpoint Recorded: Sep 12 2018 6:00 pm UTC 60 mins
    • Today’s most popular security and compliance tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities.

      But cybercriminals don’t target technical vulnerabilities. They target human weakness: the distracted user who clicks on an email attachment, the eager customer who fills in credentials to claim a fake offer, a loyal employee who follows directions to wire money from a criminal impersonating their CEO.

      The only security strategy that will successfully combat today’s advanced attacks is one that focuses on protecting our people. Join Proofpoint SVP Ryan Kalember to learn how to build a strategy that:

      • Reveals who is targeted and how
      • Combats attacks before they reach your users, and
      • Mitigates damage from the attacks that inevitably will reach your people

      About the presenter:

      With over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry. Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.

      Read more >
    • Get Your Cloud (Service) Strategy Right!
      Get Your Cloud (Service) Strategy Right! Martin Palmgren, IT Strategy and Transformation Executive @ .Communicate Recorded: Jun 29 2011 11:00 am UTC 45 mins
    • As you move to the cloud, ensure that you secure your IT Delivery apabilities with spelled out business objectives to which the IT organisation can deliver with an effective Service Strategy to leverage IT in the execution of the Business Strategy http://www.brighttalk.com/webcast/29211 .

      Where security is important, and I would think twice on the data that I would choose to put on the cloud, Time to Market and Cost Effectiveness are the critical success factors.

      Time to Market should not only include “how fast do we get IT services set” but how can we leverage the business strategy execution with IT as we support the end to end delivery of new products / services to market.
      The impact of Cost Effectiveness can be measured only as Total Cost of Ownership with cost, consumption and chargeback is defined (Cloud Computing: Fluff or Lightening http://www.brighttalk.com/community/it-service-management/webcast/21892 ).

      We also need to define a clear IT Service Strategy with an “IT Business Model” (“This is how we deliver IT services to the business”) and a “Business (IT) Value proposition” (“This is how we support business objectives with services in a time to market perspective”).

      Read more >
    • Making Content Work: How to Conduct a Content Strategy Audit
      Making Content Work: How to Conduct a Content Strategy Audit Corey Padveen, Director of Global Social Business Strategy, t2 Marketing International Recorded: Aug 14 2014 4:00 pm UTC 40 mins
    • Content marketing is an exciting concept that can generate a tremendous amount of success when executed correctly. For a lot of us, the issue is just that: we are not sure exactly how to execute a content marketing program. Suffice it to say that content marketing is the last step in the overall content creation process, and success with the process all comes down to your content strategy.

      In this session, we'll start off by going over exactly what the difference between content strategy and content marketing really is. Subsequently, we'll examine how to conduct a content strategy audit in order to ensure that our content is working towards helping us achieve our goals. Attendees will walk away with the necessary steps and action items to review key performance indicators related to their content, identify opportunities through the analysis of social data and optimize their content strategy based on the findings of their audit.

      Content marketing can be a cornerstone of success when it comes to your social business. In order for that to be the case, a fully optimized content strategy needs to be in place.

      Read more >
    • Part 2: Is DNS a Part of Your Cyber Strategy?
      Part 2: Is DNS a Part of Your Cyber Strategy? Adrian Davis, (ISC)² EMEA, Peter Goodwin, Infoblox, Mo Cashman, McAfee Recorded: Mar 29 2018 11:00 am UTC 61 mins
    • Today, 91% of malware uses DNS to carry out campaigns once it has breached the perimeter. In a recent SC Magazine survey, 46% of survey respondents said they experienced DNS-based data exfiltration. DNS traffic is not investigated or filtered by firewalls and thus is a gap that is commonly exploited by malicious actors.

      Solving these challenges requires:
      •Visibility into DNS traffic
      •Plugging the DNS security gap with a multipronged approach to threat detection
      •Integration between DNS Security and other security tools that are part of the ecosystem

      As part of the continued DNS Security webinar series, please join (ISC)², Infoblox and McAfee for this interactive discussion and learn more on why DNS should be part of your cyber strategy.

      For part 1 in this series: paste the following URL into your browser: https://www.isc2.org/News-and-Events/Webinars/EMEA-Webinars/Focused-Webinars?commid=293803&part2

      Read more >
    • IAM's Place in Your Breach Prevention Strategy
      IAM's Place in Your Breach Prevention Strategy Joe Diamond, Okta, Director, Cybersecurity Strategy Recorded: Nov 14 2017 5:00 pm UTC 43 mins
    • In recent years data breaches have become a common occurrence. What’s more surprising is how consistently these breaches occur. It’s not just the usual suspects of phishing, social engineering and insider threats; weak and stolen passwords are the majority cause (81% of the time per Verizon’s DBIR).

      There’s no silver bullet for breach prevention, but there are excellent strategies to defend against today’s threat actors. In this session, we’ll unveil the findings of a research study from leading analyst firm IDG. You’ll learn:
      - Challenges and priorities for IAM as a part of a breach prevention strategy
      - Threats they’re most concerned about and the best way to defend against them
      - How they’re identifying and responding to account compromise

      Read more >