Matt Hudson, Head of Pan-European Business Cycle, explains the shift we are beginning to see in the market to focus on companies with interesting valuations and the potential to offer good yields and dividend growth.Read more >
The Schroder UK Alpha Income Fund, for professional investors.Read more >
Join John Hudson, Thinking Dimensions, to learn how to:
- Identify the key stakeholders represented in any situation
- Identify the Critical Thinking skills and processes that underlie a successful Root Cause Analysis
- How to successfully prioritise issues every time
- Identify the core issues represented in any situation
What you will take-away:
- An appropriate set of Thinking processes to adopt
- An intuitive and structured set of Questioning techniques
- Structured templates that allow for the timely analysis/filtering of information
- The confidence to adopt the process for your everyday work
An intuitive approach to the Risk ProcessRead more >
Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
(ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
(ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.
2015 is the year of customer experience. If by now you are not offering your customers a highly personalised and targeted experience then you can be sure your competitors are.
Whether you are just starting out with customer segmentation, or you need some fresh ideas for increased targeting this is a must attend webinar. Pure360 Account Manager, Lauren Hudson, will talk you through six segmentation strategies that will help you to offer the best customer experience possible, in turn significantly increasing your email ROI.
By attending this webinar you will:
- Learn six key segmentation strategies that will improve your ROI
- View up to the minute big brand segmentation case studies
- Understand why segmentation should form a key part of your email strategy moving forwards
Security and Storage covers a diverse range of technologies and approaches that can make it challenging to distill a workable strategy from the mix of architectures, tools, techniques, recommendations, standards and competing vendor solutions. Guidance on how to contrast the various security approaches in storage and evaluate the right mix for your specific problem domain forms the majority of the material covered in this session.Read more >
You probably know that 2016 represents a major release for Office, across PCs, Macs, mobile phones, and tablets, with new end-user experiences for simple users and power users alike. Learn more, in this session, and find out how the Office 2016 release also includes more manageability, security, and deployment options for IT. Plus, learn about Office 365 ProPlus deployments, which even let you choose how fast you decide to enable these new capabilities in your organization.Read more >
This WebCast will cover the basics of Encryption & Key Management as it relates to storage systems, as well as some of the related Best Practices.
This WebCast will explore the fundamental concepts of implementing secure enterprise storage using current technologies, and will focus on the implementation of a practical secure storage system. The high level requirements that drive the implementation of secure storage for the enterprise, including legal issues, key management, current available technologies, as well as fiscal considerations will be explored.
There will also be implementation examples that will illustrate how these requirements are applied to actual system implementations.
At the end, there will be a Q&A at the end for the audience to ask questions for the Panelists.
Join John Hudson, Operations Director @ Thinking Dimensions as he shares his insight into the 4 processes that make up itRCA product, developed by KEPNERandFOURIE. Evaluation of one of the intuitive step by approaches that go to make up the suite of 4 processes.
An overview of:
With a more in-depth examination of CauseWise and its application in a case study.
Take a holistic approach to building an excellent event experience. Join Sharon Hudson of MarketingProfs as she discusses some of the strategies MarketingProfs uses to build a successful physical event.Read more >
Provider agility demands a high degree of connectivity whether to address episodes of care across the clinical continuum, to facilitate the exchange of claims data, or even to accommodate a rapid acquisition. Meanwhile, the specter of malware has grown to become a significant risk to provider organizations increasing the risk to PHI and business data. As cyber criminals now focus on malware as a means to generate revenue, it will only create an avenue for more attacks in the future.
Malware/Ransomware has already plagued several healthcare organizations this year this trend will continue. Additional controls and strategies need to be explored to help prevent this widespread issue both right now and in the future. This webcast will allow you to further explore what ransomware is, how it propagates, what can be done to help prevent it and explore some of the solutions VMware ha developed to help minimize the risk related to ransomware.
- Gain a clearer understanding of the threat to healthcare providers that ransomware presents
- Learn how ransomware propagates across both corporate and personal assets
- Identify some strategies to address how your organization can prevent ransomware from taking hold within your organization
- Develop a better understanding of VMware’s solutions which help address this risk and create a platform for enhanced security
Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.
Hybrid cloud is emerging as a way for healthcare organizations to transform legacy healthcare systems into robust, agile environments. VMware vCloud Air™ is a secure, infrastructure-as-a-service hybrid cloud, built on the trusted VMware vSphere® foundation. Join us for this webinar and discover how you can take advantage of the agility and flexibility of hybrid cloud for the unique needs and compliance requirements of your healthcare information.
Attend this webcast and learn:
- An introduction to vCloud Air
- HIPAA BAAs to meet security controls and breach notification requirements
- Use case opportunities for adopting hybrid cloud to support healthcare IT initiatives
Representatives from a range of established KMIP Key Management vendors answer questions from the moderators and from the audience on various aspects of encryption, standardized key management via KMIP and some of the deployment issues and opportunities brought about through enterprise key management.
Join this live broadcast from SNIA's Data Storage Security Summit 2015. Panelists include:
Tim Hudson, CTO, Cryptsoft
Nathan Turajski, Senior Product Manager, HP Enterprise
Bob Lockhart, Chief Solutions Architect, Thales e-Security, Inc
Liz Townsend, Director of Business Development, Townsend Security
Imam Sheikh, Director of Product Management, Vormetric Inc - See more at: http://www.snia.org/dss-summit#agenda
Application delivery automation tools should do more than just automate delivery. They should reduce companies’ time to market, scale to enterprise levels, provide cross-project visibility, enable compliance and security, and increase resource utilization. Many open source tools fail to provide all of these benefits – inflating companies’ total cost of ownership. Join our webinar to learn about the hidden costs of open source tools and how Electric Cloud’s ElectricCommander provides the enterprise-level solution you need for success.
Who should attend this webinar?
•Companies struggling to consolidate open source sprawl
•Growing organizations currently using open source automation tools
•Build, test, and release teams held back by their current automation process
•Managers and executives who have limited visibility into their software application development process
Deploying enterprise Java applications is a pain! Luckily, new deployment automation technology can save you from spending stressful weekends and late nights deploying applications and patches.
Join Michael Schmidt, Sr. Product Manager, and Andy Cureton, Services at UC4, as they show you how to overcome the bottlenecks caused by deployment tasks throughout the application lifecycle.
Attend this webcast and learn about:
- Continuous deployment through integration with Jenkins/Hudson continuous integration servers
- How to promote applications from QA to staging and production with a single click
- How to automatically rollback back a release if a problem arises