Hi [[ session.user.profile.firstName ]]
Sort by:
    • HP Security Panel: Expert Analysis
      HP Security Panel: Expert Analysis Graham Cluley | Michael Howard | Louella Fernandes | Howard Roberts Recorded: Nov 14 2018 10:00 am UTC 40 mins
    • We recently launched a series of short films for HP printers, featuring Christian Slater as The Wolf. At the upcoming HP Security Panel webinar, we’ll look beyond the films to discuss the smartest ways of safeguarding against hackers like The Wolf.

      Join our panel of independent and HP security experts to hear their invaluable insights on Wednesday, 14th November at 10:00 GMT.

      In this security masterclass discussion, our panelists will address a series of pressing issues.

      • Are vendors using scaremongering to sell their own services?
      • If faces are the new fingerprints, what are the security risks?
      • How big a threat is IoT and what’s the next Mirai Botnet?
      • Is the public sector the weakest link?
      • Can security be baked into the hardware?

      This is an excellent opportunity for board-level and IT directors to gain invaluable security insights from experts on the frontlines.

      Panelists:
      Graham Cluley: Award-winning security blogger - moderator
      Michael Howard: Head of Security Practice, HP Inc.
      Louella Fernandes: Research Director Quocirca
      Howard Roberts: Print Technologist, HP Inc.

      Read more >
    • IDC FutureScape: Worldwide Cloud 2019 Predictions
      IDC FutureScape: Worldwide Cloud 2019 Predictions Frank Della Rosa, Al Gillen, and Deepak Mohan of IDC's Cloud Services Team Processing: Nov 14 2018 4:00 pm UTC 60 mins
    • In this IDC FutureScape presentation, IDC's Frank Della Rosa, Al Gillen, and Deepak Mohan will discuss some of the key predictions that will impact the global market for cloud services over the next one to five years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

      About IDC FutureScape
      IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within a typical five-year business planning cycle. Each prediction is assessed based on its impact (a mix of cost and complexity to address) and time frame to expected stated adoption level.

      To learn more about IDC FutureScape 2019, please go to http://www.idc.com/events/FutureScape

      Read more >
    • Say “No” to Ransomware Demands with End-to-End Data Protection
      Say “No” to Ransomware Demands with End-to-End Data Protection Joe Leung, Ken Lamb and Ed Gavin, Micro Focus Processing: Nov 14 2018 4:00 pm UTC 45 mins
    • Hardly a day goes by without some news of ransomware attacks. Ransomware is a lucrative business. According to a recent report by security firm Sophos, one ransomware attack called SamSam, which attacks mainly healthcare organizations, has generated the attacker $6 million so far. With the wave of this epidemic continuing unabated, organizations face a tremendous risk of financial loss and business disruptions. Data, regardless of where it resides within your organization, must be protected to counter such a threat.

      Join us for this webinar to learn about how a holistic data protection approach, enabled by Micro Focus Data Protector and Micro Focus Connected MX, can be applied to:

      • Holistically protect your organization from ransomware
      • Securely back up data from servers and end-user devices
      • Enable simple data recovery in the event of a ransomware attack

      Read more >
    • HP Security Panel: analisi degli esperti
      HP Security Panel: analisi degli esperti Graham Cluley | Michael Howard | Louella Fernandes | Howard Roberts Recorded: Nov 14 2018 10:00 am UTC 40 mins
    • Recentemente abbiamo lanciato una serie di video sulle stampanti HP, con la partecipazione di Christian Slater nel ruolo di The Wolf. In occasione del webinar “HP Security”, prenderemo spunto dai contenuti del video per analizzare le strategie più efficaci per proteggersi dagli hacker come The Wolf.

      Unisciti al nostro gruppo di esperti in materia di sicurezza di HP ed esterni per ottenere preziose informazioni Mercoledì, 14 Novembre alle ore 11:00 CET.

      In questa discussione dedicata agli esperti della sicurezza, i nostri relatori affronteranno una serie di problematiche urgenti.

      • La sicurezza basata sul riconoscimento facciale biometrico si sta rapidamente affermando, ma potrebbe esporre la tua azienda ad attacchi informatici?
      • Il modello Firewall-as-a-Service può potenziare la tua sicurezza?
      • L'IoT costituisce una minaccia reale e quale sarà la prossima botnet Mirai?
      • Il settore pubblico rappresenta l'anello debole?
      • I fornitori adottano un atteggiamento allarmista per vendere i propri servizi?
      • In quale modo e perché la sicurezza dovrebbe essere integrata?

      Si tratta di un'opportunità eccezionale per i responsabili IT e i dirigenti che desiderano ottenere preziose informazioni sulla sicurezza da esperti che operano in prima linea in questo campo.

      Graham Cluley: blogger che si occupa di sicurezza, premiato con numerosi riconoscimenti – moderatore
      Michael Howard: Head of Security Practice HP Inc.
      Louella Fernandes: Research Director Quocirca
      Howard Roberts: Print Technologists HP Inc.

      Read more >
    • Bringing clarity to the confusion of smart beta
      Bringing clarity to the confusion of smart beta Mark Carver, MSCI Upcoming: Nov 15 2018 4:00 pm UTC 60 mins
    • Bringing clarity to the confusion of smart beta

      Factor investing is transforming the way investors construct and manage portfolios. But how can you be sure you’re getting the factor exposure you seek? MSCI FaCS and Factor Box remove this uncertainty by providing a factor standard that can be incorporated into your due diligence process.
      In this webcast we will:
      •Provide an overview of MSCI FaCS and MSCI Factor Box
      •Demonstrate how to measure and analyze factor exposures at the security, fund or portfolio level using MSCI FaCS
      •Use Factor Box to compare funds to funds, funds to benchmarks and report fund or style characteristics

      Read more >
    • Build your Connected Enterprise with Workday
      Build your Connected Enterprise with Workday Jitterbit: Andrew Leigh and Paul Lathrop --- Humantelligence: Vera Rossi Recorded: Nov 14 2018 6:00 pm UTC 50 mins
    • Workday Rising 2018 was a show packed with great discussions around Workday Prism Analytics and how enterprises are amplifying the value of Workday by connecting Human Capital Management and Financial applications with other systems.

      Questions included: How do enterprises manage their employee on-boarding and off-boarding today? How do enterprises eliminate all the manual effort in extracting employee information from so many disparate systems? How are companies building their Connected Enterprise 4X faster?

      Don’t miss Jitterbit’s “Build your Connected Enterprise with Workday” webinar which answers these questions and learn how you can:

      - Innovate faster by connecting Workday rapidly to any system
      - Leverage Cultural AI with Humantelligence to determine the best employee fit
      - Utilize APIs, integration, and analytics to power your organization
      - Infuse intelligence into any process with APIs

      Save your seat today!

      Presenters:
      Andrew Leigh, VP of Alliances, Jitterbit
      Paul Lathrop, Integration Engineer, Jitterbit
      Vera Rossi, VP of Global Alliances, Humantelligence

      Read more >
    • Have it All: Achieving Agility and Security with Automation
      Have it All: Achieving Agility and Security with Automation Yoni Geva, Product Manager Upcoming: Nov 19 2018 3:00 pm UTC 60 mins
    • Are you still implementing firewall changes manually? Are you still trying to keep track of all the changes and their ramifications with spreadsheets?
      Network security policy automation gives you quick, accurate change management across even the most complex hybrid networks, avoiding security holes, compliance issues and costly outages. With automation, you don’t have to choose between agility and security. You can have both.
      In this webinar, Yoni Geva, Product Manager at AlgoSec, explains how security policies can be updated automatically and accurately.
      Join our webinar to learn how to take advantage of:
      •Automated security policy automation with zero touch
      •Security policy management that keeps up with business requirements
      •Automatic identification of risk
      •Enhanced compliance with quick audit reports on demand

      Read more >
    • ¿Por qué importa la seguridad?  Perspectivas de Latinoamérica de Unisys Security
      ¿Por qué importa la seguridad? Perspectivas de Latinoamérica de Unisys Security Leonardo Carissimi, Security Solutions Director, Unisys Latin America Recorded: Nov 14 2018 8:30 pm UTC 62 mins
    • Unisys Security Index es una importante encuesta regular de las preocupaciones de seguridad llevada a cabo en todo el mundo. Lanzada a nivel mundial desde 2007, proporciona una medida regular y estadísticamente sólida de las preocupaciones que tienen los consumidores de 13 países con respecto a los principales aspectos de la seguridad, incluyendo seguridad nacional, financiera, personal y ciber seguridad.
      Únase a este webinar para escuchar a Leonardo Carissimi, director de Ciberseguridad para Unisys América Latina, compartir los resultados y realidades de la encuesta sobre de las preocupaciones de seguridad de los consumidores en Argentina, Colombia y México.
      Leonardo usará los resultados de este año, yuxtapuestos con más de una década de historial de encuestas realizadas para proporcionar un informe convincente sobre el estado de la seguridad desde la perspectiva que más importa: la del usuario.

      Read more >
    • The Impact of Cybersecurity on IT Response Teams: A Game Changer!
      The Impact of Cybersecurity on IT Response Teams: A Game Changer! Vincent Geffray and Roy Atkinson Recorded: Nov 13 2018 6:00 pm UTC 62 mins
    • Ransomware, advanced persistent threats, and denial of service attacks—many initiated through “phishing”—will continue to frequently interrupt business and government operations. Across all industries, businesses see an uptick in cyberattacks frequency and damage to their organizations.

      “One of the best services we can provide for our customers, whether they are internal or external, is keeping their personal information—and the information needed for the business—safe. The first line of assistance should also be the first line of defense.” - Roy Atkinson, HDI

      The support center should have clear guidance on how to avoid social engineering threats and phishing threats, as well as the ability—including the time—to educate users on why support may not be able to immediately help them, or why additional information might be required. Meanwhile, when hit by a cyberattack, organizations need to execute a clearly defined and agreed upon cross-functional response plan to mitigate the risks and minimize the disruption.

      In this interview-style webinar, HDI’s Roy Atkinson and Everbridge’s Vincent Geffray will discuss the importance of the support center’s role in cybersecurity prevention and response.

      What you’ll learn:
      - How Cybersecurity Is Impacting Support
      - Support’s Role in Prevention
      - How, When, and Why the Support Center Should Respond


      Who should attend:
      - Support center managers who need to be aware of the importance of support in cybersecurity
      - IT directors who want to better understand responses and communications in the event of a cybersecurity event
      - Anyone in IT service and support wanting to improve their understanding of the role of support in cybersecurity

      Read more >
    • MR/RT for precision radiation medicine: see what you treat with Elekta Unity
      MR/RT for precision radiation medicine: see what you treat with Elekta Unity Jihong Wang and Daniel Zips Processing: Nov 14 2018 4:00 pm UTC 60 mins
    • A new class of radiation devices is emerging, and it has the potential to transform how cancer is treated through more precise tumor targeting and adapting treatment at the time of delivery. High-field MR-linac technology integrates the power of state-of-the-art MR imaging with precision radiation technology. It can deliver precisely-targeted radiation doses while simultaneously capturing the highest-quality MR images. This will allow clinicians to visualize tumors and the surrounding healthy tissue at any time during radiation delivery, and then adapt the treatment accordingly.

      High-field MR-linac devices based on diagnostic-standard MRI technology will offer many avenues for exploring improvements in radiotherapy, such as shorter treatment regimens or targeted adaption of the treatment in real time. Also, by integrating precision radiation and MRI technologies, high-field MRI capabilities can be optimally explored to help bring personalized cancer care to radiation therapy.

      During this webinar, clinical experts will share their experience with Elekta Unity.

      Read more >
    • Top 5 requirements for digital in-store experiences that work
      Top 5 requirements for digital in-store experiences that work Gaurav Pant Chief Insights Officer, Incisiv, and Ricardo Belmar, Senior Director, Global Enterprise Marketing, Infovista Upcoming: Nov 15 2018 7:00 pm UTC 56 mins
    • As the lines between online and in-store retailing become increasingly blurred, your stores’ digital transformation needs to enable new in-store experiences that increase conversion rates, while empowering your associates to raise customer satisfaction with the help of new technology. Yet 74% of retailers tell us their store network is the #1 barrier to an effective customer journey from these new technologies.

      Retailers tell us their top five applications that deliver on the promise of great customer experience and associate enablement are: point of sale (POS), inventory management, guest Wi-Fi, workforce management, and real-time data analytics. How do you enable your network to power your store transformation and deliver a consistent, high performance in-store experience?
      Join Gaurav Pant, Chief Insights Officer, Incisiv, and Ricardo Belmar, Senior Director, Global Enterprise Marketing, Infovista, as they discuss the 5 key imperatives that can help retailers deliver the digital in-store experiences that work.

      - Why digital is the front door to your store
      - Reveal the 5 Requirements for successful digital in-store experiences

      Learn why Ipanema SD-WAN, Application Intelligence for the WAN Edge, is the only solution that meets all of these requirements and how it helped the world’s largest QSR brand protect its digital revenues while enabling the digital transformation of its restaurants.

      Read more >