According to Gartner, the application layer contains 90% of all vulnerabilities. This is why you cannot let potential system flaws or weaknesses in your application be exploited to compromise the security of your organization’s most critical assets. Learn about the methods and solutions attackers typically rely on to perform application vulnerability discovery and compromise.
Join this 20-minute webinar to see how Veracode can help your security and development teams identify and remove the vulnerabilities and flaws that can put your organization at risk. Recognized as a Gartner Magic Quadrant Leader since 2010, Veracode provides on-demand application vulnerability testing to detect and offer solutions for vulnerabilities and other security issues.
We will cover the latest copy management functionality for Oracle databases and file systems on UNIX and Windows Server as well as improved Dell EMC VMAX storage management and easier to use log files. You can also learn about the latest addition to AppSync supported storage platforms.Read more >
A language program is a powerful benefit provided to employees. What are the key steps in implementing a successful language program in your organization? Join us to learn some of the strongest strategies that we’ve seen in successful implementations. Learn how to motivate and track employees’ progress.Read more >
The GDPR compliance date is fastly approaching and many companies will not be compliant. What will this mean for them, what can they do over the remaining time left and what will the impact mean?
Join this panel of world-class experts:
Lance James: Chief Scientist at Flashpoint, internationally renowned Cybersecurity Specialist who has advised Boards and CISO’s at a wide range of government and F-500 organizations. Frequent lecturer and speaker.
Mark Rasch: Chief Legal and Compliance Partner for Digital Risk Management & GDPR. Former Chief Security Evangelist for Verizon Enterprise Solutions, Chief Privacy Officer at SAIC and Led U.S. Department of Justice’s Cyber Crime Unit.
Martyn Hope: Founder of the EU-GDPR Institute.
In this session you will learn:
- What will happen if I'm not Compliant by May 25, 2018
- Where do I Begin to start my compliance effort
- Who should I trust to advise me through my compliance program
If you are a CISO, Board Member, Compliance Officer, Data Privacy Officer or anyone tasked with GDPR , this is a must see discussion of world-class panelists who are experts and have first hand knowledge and expereince.
Buying a GRC platform isn’t so much about sizing up the options as it is about analyzing your company’s needs. After that, it’s about knowing which questions to ask vendors and how to evaluate their offerings while keeping business processes front and center. In this webinar, we’ll share how to self assess needs and benchmark your GRC maturity. Throughout the hour, we’ll offer buyer’s tips and empower you to buy the GRC platform that’s right for your company.
In this webinar, you will discover:
• How to assess your organization and determine what type of platform is right for you
• What questions to ask when evaluating GRC vendors
• Tips for building a business case for a GRC platform and estimating potential ROI
In our increasingly competitive and digital world, organizations need to evolve to be more competitive. For many, an untapped resource is GRC and its role in increasing efficiency and organizational resiliency. Explore what’s possible in this educational webinar.
Watson is a computer system capable of answering questions posed in natural language. Watson was named after IBM's first CEO, Thomas J. Watson. The computer system was specifically developed to answer questions on the quiz show Jeopardy! (where it beat its human competitors) and was then used in commercial applications, the first of which was helping with lung cancer treatment.
NetApp is now using IBM Watson in Elio, a virtual support assistant that responds to queries in natural language. Elio is built using Watson’s cognitive computing capabilities. These enable Elio to analyze unstructured data by using natural language processing to understand grammar and context, understand complex questions, and evaluate all possible meanings to determine what is being asked. Elio then reasons and identifies the best answers to questions with help from experts who monitor the quality of answers and continue to train Elio on more subjects.
Elio and Watson represent an innovative and novel use of large quantities of unstructured data to help solve problems, on average, four times faster than traditional methods. Join us at this webcast, where we’ll discuss:
•The challenges of utilizing large quantities of valuable yet unstructured data
•How Watson and Elio continuously learn as more data arrives, and navigates an ever growing volume of technical information
•How Watson understands customer language and provides understandable responses
Learn how these new and exciting technologies are changing the way we look at and interact with large volumes of traditionally hard-to-analyze data.
Join Jenn Stirrup (Director, DataRelish), Gordon Tredgold (CEO & Founder, Leadership Principles LLC), Joanna Schloss (Data Expert) and Lyndsay Wise (Solution Director, Information Builders) as they discuss what it takes to take a business from needing analytics to leveraging analytics successfully.Read more >
Is a cloud-first approach right for your organization? Cloud-first offers a leaner, more efficient, and more manageable approach to enterprise functionality than legacy architecture.
In this webinar learn more about the benefits of having and cloud-first approach, and how it can positively impact your business.
Are you ready to cut your costs, cut complexity, cut ties and get to the cloud? Learn the five things you should ask before you act.Read more >
ATMs continue to face risks and threats of jackpotting attacks. These attacks can be widespread and lead to significant losses. Recent announcements have highlighted new vulnerabilities in PC processing chips, as well as new organized criminal activities. Join experts from NCR Security for an informational and interactive webinar to learn more about these risks and the steps that you can take to proactively protect your ATMs.Read more >
With great power comes great responsibility. According to Gartner, CMO budgets are on the rise in 2017 as marketers take on more responsibility for driving business growth. By taking custody of these dollars, CMOs are promising more and more back to the business.
But, many marketers struggle to articulate the result of their investment to the rest of the organization. (Hint: Your CFO doesn’t care about your email open-rates.)
Marketers risk the perception of a cost-center, instead of a growth-driver. In this session, we’ll share how leading marketing organizations manage their investments and translate their tactics to speak in the common language as the rest of the business: money.
Companies are spending more than ever on marketing. According to the Harvard Business Review, it is estimated that global spending on media is expected to reach $2.1 trillion by 2019. But is all that money effective in producing improved ROI? Without knowing which channels are driving sales, or more specifically, which individual marketing activities are working, marketing spending is a black box.
On this webinar, Data Scientist Colin Priest of DataRobot explains the importance of multichannel, multi-touch attribution to accurately measure the success of your marketing efforts – and how automated machine learning offers the shortest path to success.
It’s more critical than ever to focus on your cloud security strategy. But what does iron-clad protection really look like? It’s all about the people, process, and technology working in sync. A Security Operations Center (SOC) provides proactive threat monitoring, detection, verification, and identification of suspicious behavior, which enables you to respond to threats more quickly. Many businesses don’t realize the full extent of resources and effort required to ensure their data and workloads are not at risk. But getting fully managed, around-the-clock, threat monitoring and detection doesn’t have to be complicated or costly.
Join John Carse, Vice President of Security Operations at Alert Logic, as he explains the true value of a SOC, why every business needs one, and the unique benefits that make them vital to a more proactive security posture.
Register now to get answers to these important questions:
• What critical role does a SOC play in a defensive security strategy in cloud and hybrid environments?
• How does a 24x7 managed security service integrate with and enhance your security capabilities?
• How can Alert Logic’s unique SOC and security experts can help you stay ahead of threats without adding staff?
Our most recent insights into equity factors around current market events and trends. Find out how timely market events have been affecting equity valuations and returns from the industry experts.Read more >
Dr. Raj Aggarwal is back to address an important topic on the alignment of internal audit and the board. As a board member, Dr. Aggarwal gets to see both sides, internal audit interaction with the board, and the board expectations of the internal audit function.
Dr. Aggarwal will expand on the recent article of Board Matters in IIA’s Internal Auditor magazine and share his experiences related to the exchanges of the board and the internal audit.
This webinar is designed not only for the CAEs but all members of the internal audit function and the Board of Directors for both private and public companies.
Many countries have strict emission limits for nitrogen oxides (NOx) and so NOx control systems are widely used on coal-fired power plants. India has recently introduced NOx emission limits so pollution control technologies will need to be installed. This webinar will review available NOx controls for coal-fired units in general. With examples of recent developments, systems that could be successfully applied in Indian power plants are identified. The challenges facing Indian utilities are also considered. The new Indian standards have created opportunities for equipment manufacturers, as well as a need for global technology leaders to modify their products to meet local market requirements, particularly high ash content coal.Read more >
Review, Positioning & 2018 OutlookRead more >
Businesses are increasingly becoming more reliant on third parties for critical products and services. The factors are multi-fold : increased customer demand, time criticality, stringent service levels, evolving regulatory landscapes, technological advancements, mergers and acquisitions, diversification of risks, etc. With increasing dependencies on third parties, organizations become susceptible to major service disruptions owing to lack of supplier resilience; thus, running into risks such as loss of revenues, regulatory breaches, service level misses and eventually, loss of customer confidence. Supply Chain Resiliency is the key to sustained business model and must be integrated within the resilience or business continuity framework of organizations.
This session will reflect upon a few key trends, levers, risks, regulatory requirements and overview of building third party business continuity assessment process.
Check out our February Tech Talk - SSL Decryption Using Palo Alto Networks Firewall.Read more >
Machine Learning has become a competitive differentiator in a big data world. Vast amounts of data are already overwhelming existing BI tools and analytics processes. When faced with hundreds of variables, a human’s ability to efficiently identify new insights or detect changing patterns manually has also been exceeded. To address these challenges, BI and analytics professionals are adopting user-friendly, automated machine learning solutions.
In this on-demand webinar, recognized analytics industry expert Jen Underwood discusses how BI and analytics professionals can get started with automated machine learning.
Here you can find a short video with David Louapre where he explains how Augmented Intelligence is applied in Digital Manufacturing.Read more >
Within the federal sector, machine learning and artificial intelligence are treated like a distant possibility rather than an immediate reality. Considerable confusion exists about how the government can implement technology to automate predictive analytics and free data scientists to make educated decisions in real time, rather than crunch algorithms.
The objective of this webinar is to help educate the federal community about the realities, and real possibilities, data science can provide. See how agencies can start implementing machine learning for mission success.
Project Based Learning is a teaching method in which students gain knowledge and skills by working for an extended period of time to investigate and respond to a complex problem. Learn about ways to incorporate Rosetta Stone lessons into projects for your K - 12 classroom. We'll talk about both elementary and middle/high school project ideas and how to pull them together for a quarter or semester length language projects.
Join us for our monthly K-12 webinar series, Trainer’s Corner. Each month we will share information and ideas to help schools and districts make the most of their language-learning implementations.
In this IDC Web conference, outsourcing analysts David Tapper and Xiao-Fei Zhang will leverage IDC's BuyerPulse Services Deals Database to provide an analysis and assessment of outsourcing deals based on a rolling 4-quarter view from Q3 2015 through Q4 2017. The analysis will better enable service providers to pursue key markets, incorporate strategic capabilities, and ensure that they are optimally positioned.Read more >
If asked, “What’s our risk of a DDoS attack?”… Would you be able to answer with confidence? With all the attention given to ransomware, it’s easy to forget about availability protection. But the data is clear. DDoS attacks are increasing in frequency and complexity. And if not adequately prepared, the impact of a DDoS attack can be quite significant. To help you more accurately assess your risk of DDoS attacks, join Rob Ayoub, IDC Research Director and Tom Bienkowski, Arbor Networks Director of Product Marketing to learn about the latest trends in DDoS attacks and more importantly best practices in protection.Read more >