Hi [[ session.user.profile.firstName ]]
Sort by:
    • The State of National Security & The Evolving IT Threatscape
      The State of National Security & The Evolving IT Threatscape Iveta Topalova, WW Public Sector Architect Manager Upcoming: Mar 7 2017 4:00 pm UTC 30 mins
    • National security agencies face significant challenges today. From new and unknown threats, to operating tempo and budget challenges, having the right technology in place is key to ensuring security in an increasingly evolving threatscape.

      In this webcast, we begin with the end in mind: the need for the optimization of data insights through analytics, the alignment of platforms and devices for enhanced security and readiness, and the enablement of command and operations within an agile, data-driven national security ecosystem.

      Join this discussion to:
      - Discuss current trends that are presenting significant challenges to protecting US citizens from terrorism and crime
      - See how advancements in technology are empowering national security and federal law enforcement agencies to meet these challenges
      - Learn how agencies are implementing a digital transformation strategy to enhance how they better protect citizens

      Read more >
    • How to Achieve Cyber Resiliency in an Evolving Threatscape - Roundtable
      How to Achieve Cyber Resiliency in an Evolving Threatscape - Roundtable Dante Disparte, John Bone, Ed Liebig, Sidney Pearl Upcoming: Feb 28 2017 4:00 pm UTC 60 mins
    • Join fellow security executives for a roundtable discussion over the necessity and importance of staying secure in a dynamically evolving and competitive landscape.

      The cyber resiliency assessments are based on the U.S. Department of Defense’s mission-critical procedures and Unisys’ commercial best business practices. They provide an unbiased 3rd party expert assessment of the client’s Incident Response Capabilities, deliver a Security Enhancement Playbook, and identify the gaps in their cyber defense network that leads to improved cyber resiliency.

      These assessments provide leadership with:
      - A deeper insight into the effectiveness of decision making
      - Understanding of the vulnerabilities in their cyber defenses
      - How to enhance adaptability to the unanticipated and the capacity to emerge from a crisis faster with less damage to profitability, brand and customer loyalty.

      We will also discuss how crisis-preparedness exercises help your team experience real-world threat scenarios in order to assess the team’s ability to address, contain, respond and mitigate security threats.

      Facilitator:
      Dante Disparte, CEO of Risk Cooperative

      Panelists:
      John Bone, Global Director of Cyber Resilience, Unisys
      Ed Liebig, VP of Global Security, Professional Services, Unisys
      Sidney Pearl, Global MSS Executive Architect, Unisys

      Read more >
    • The Evolving Perimeter - Where Are The New Boundaries?
      The Evolving Perimeter - Where Are The New Boundaries? Joseph Carson, Cyber Evangelist at Thycotic Upcoming: Mar 13 2017 4:00 pm UTC 60 mins
    • The traditional security perimeter is proving to no longer be an effective cyber security control and fast growing technologies, such as cloud, mobile and virtualization make the boundaries of an organization blurry.

      For many years, organizations have protected their valuable and sensitive information by building a fence around assets, and all of the data that flowed in and out was either via a single internet access point or on physical devices.

      This meant that a traditional perimeter was an effective measure as the boundaries were known. As long as the internet access was controlled by the data that flowed through it, it was possible to protect, monitor and control that data.

      Organizations protected internet access with firewalls, VPNs, access controls, IDS, IPS, SIEMs, email gateways, and so forth, building multiple levels of security on the so-called perimeter. On physical devices, systems management and antivirus protected those systems and kept them updated with the latest security patches.

      This is a traditional security approach, used for nearly 30 years. However, in today’s world it is no longer effective alone. The perimeter has moved and we need to move with it.

      During this session, attendees will learn about how identity and access management is evolving fast and becoming the new security perimeter, including:

      • Why the traditional perimeter is no longer effective
      • What hacker techniques are being used to compromise organizations
      • What some governments are doing to protect their citizens
      • Technologies that will help create the new cyber security perimeter

      Read more >
    • Evolving the Industrial IoT Into Strategic Advantage
      Evolving the Industrial IoT Into Strategic Advantage Bill Roberts, Director, Global IoT Practice, SAS; Ted Connell, Director, Solution Architect Group, Intel Recorded: Feb 15 2017 7:00 pm UTC 56 mins
    • Heavy industry was first to arrive at the IoT party, quickly recognizing the potential to augment existing processes and establish new protocols. As a result, organizations that embraced the industrial internet of things (IIoT) have been at the forefront of fine-tuning applications and establishing best practices. And while many of those practices have turned out to be impactful, it’s becoming increasingly apparent that the opportunity is much bigger with predictive analytics.

      We’ve entered a perfect storm where the falling costs of capturing, processing and analyzing data coincide with the explosion of data streams generated by millions of pieces of connected equipment, devices and systems. And the same technology that created the perfect storm has empowered customers with near-instant data and instantaneous engagement with each other and also with your organization. So the opportunities extend beyond tactical process improvements and have become both strategic and enterprise-wide.

      Recognizing and capitalizing on the opportunities requires an evolution of skills and mindset, made possible with key technology relationships. The Industrial IoT collaboration between SAS and Intel enables organizations to capture, process and analyze data. The end result is the ability to evolve their strategic advantage and realize the full value of their IIoT data.

      Tune in to this webinar to gain insights and best practices for evolving the industrial IoT into strategic advantage for your organization.

      Read more >
    • Evolving an Enterprise Risk Management Program
      Evolving an Enterprise Risk Management Program Colin Whittaker, Russell McGuire, Riskonnect; Yo Delmar, MetricStream; Albert Biketi, HPE; and Marshall Toburen, RSA Recorded: Nov 17 2016 6:00 pm UTC 76 mins
    • Organizations are suffering from volatility across all risk types, and in every organization, there are a multitude of applications and devices with threats and vulnerabilities. Every process, function and system has certain risks and compliance requirements, and senior management are being pressured to improve enterprise risk management capabilities.

      An organization’s enterprise risk management (ERM) program can be a powerful management tool for achieving strategic and operational objectives, but it can be difficult to maintain and grow over time. If an ERM program is not moving forward it stagnates, so executives need to implement a program that evolves with the times. Implementation has its challenges but there are a range of responses that can be effective for each ERM program challenge. In this webinar our experts discuss these responses and address some of the ways to implement an evolving GRC program that gets boardroom backing.

      Read more >
    • THE EVOLVING ROLE OF THE PHARMACIST AND PHARMACY SERVICES
      THE EVOLVING ROLE OF THE PHARMACIST AND PHARMACY SERVICES Roshani Perera, Cofounder and Director, Wicked Minds Recorded: Mar 29 2016 3:00 pm UTC 61 mins
    • Join us for a lively and informative webinar that explores the evolving role of the pharmacist and pharmacy services.

      Topics include:
      •Medicines optimisation and the evolution of pharmacy
      •Medicines optimisation: looking ahead
      •Hospital Pharmacy and Medicines Optimisation Project (HoPMOp)
      •Practice Pharmacist Initiative

      Wicked Minds are delighted to have the following speakers presenting:
      • Professor Ray Fitzpatrick, Centre for Medicines Optimisation, Keele University
      • Heidi Wright, English Practice & Policy Lead, Royal Pharmaceutical Society
      • Professor Ann Jacklin, UCL Centre for Medicines Safety and Service Quality (TBC)
      • Ravi Sharma, Head of Primary Care Integration and Lead GP Practice Pharmacist at Green Light

      Read more >
    • The Modern Day Buyers Journey: Evolving your Sales Funnel in 2017
      The Modern Day Buyers Journey: Evolving your Sales Funnel in 2017 Matt Heinz, Carol Krol, and Barbara Giamanco Recorded: Feb 21 2017 9:00 pm UTC 61 mins
    • What's different about the buyer's journey today? How has the sales funnel adapted and evolved over the past 5 to 10 years?

      A sales funnel has traditionally represented how a buyer moves from the awareness phase into action. But today, the rapid pace of innovation is pushing B2B sales and marketing organizations to reexamine what they thought they knew about finding, engaging, and converting prospects into customers. Update how you envision your buyer's journey in this webcast overview of the modern day sales funnel.

      Join this webcast with Matt Heinz, President of Heinz Marketing, Carol Krol, Editor in Chief of the Demand Gen Report, and Barbara GIamanco, CEO of Social Centered Selling, to learn:

      - Why the modern day sales funnel doesn’t follow a linear path
      - How buyer behavior is driving the need for change
      - What steps to take to move a prospect through the sales funnel and build loyalty in the process
      - How content plays a role in today’s modern funnel
      - How to get involved in the buying process before the decision is made
      - How the internet and social channels provide new opportunities to build flexible and scalable pipelines

      Read more >
    • The Evolving DataTech Landscape: Spend, Trend and Impact
      The Evolving DataTech Landscape: Spend, Trend and Impact Bruce Biegel, Justin Schuster Recorded: Apr 21 2015 5:00 pm UTC 59 mins
    • As marketers in the digital age, it is important to understand the complexity and new demands of today’s evolving data landscape. In this webinar, Bruce Biegel, senior managing director at Winterberry Group will examine today’s evolving data landscape and the trends that marketers and suppliers need to be thinking about for 2015 and beyond. Based on new research from Winterberry Group, Mr. Biegel will also provide deeper insights into the impact of the $11.5 billion (and growing) U.S. market spend on data, data technology and data services across the direct mail, email and display channels.

      Attendees will leave this session with a deeper understanding of the changing marketing data landscape, how to tackle the complexities of marketing technology and what needs to be accomplished to deliver best in class data-driven marketing programs.

      Read more >
    • The Identity Economy: Evolving from Analog to Digital
      The Identity Economy: Evolving from Analog to Digital Jose Caldera, IDM- Travis Jarae, One World Identity- Blake Hall, ID.me- David Delouya, AlphaPoint- Srikant Movva, HSBC Upcoming: Mar 1 2017 7:00 pm UTC 75 mins
    • Digital identities are the lifeblood of the modern digital economy

      As human activity migrates online, challenges for authenticating physical identities arise, while businesses and consumers look around for guidance.

      Increasing demand for answers to the identity verification dilemma was just one of the contributing factors for the emancipation of the identity space as an industry of its own, vertical-agnostic.

      With such an outlook, it is important to understand what a Digital Identity is, and their current role in our society. Furthermore, how to leverage the identities to build better business models, deliver better products and services; and most importantly, how to take the leap and hop on the Identity Evolution train - after all, you don’t want to get left behind.

      We know implementing new technologies, and changing your current operations and processes can be a challenge. And even though the benefits far outweigh the costs, it always helps to have a guiding hand. Today, that guiding hand comes as a framework to understand how digital identities play a beneficial role in each industry and YOUR business, so you can start the journey from analog to digital identities within your organization.

      At the end of the webinar you will:

      - Be able to differentiate physical from digital identities, and the attributes that shape them.
      - Appreciate the function digital identities play today, and their potential to help overcome present [and future] social and economic challenges.
      - Understand the role of Blockchain in the Digital Identity Ecosystem.
      - Recognize the business models that are placing identity at the center: Identity-as-a-Service, or Identity APIs - and how they can reshape the world as we know it.
      - Know WHY and HOW to make the leap over to digital identities within your business.

      Read more >