Click "Attend" to confirm your registration.Read more >
One of the big priorities for companies in 2018 is to achieve compliance. GDPR is going into effect in May, but even before that new new PCI DSS 3.2 requirements are set to become operational in February. According to the PCI SSC, these requirements were previously considered to be 'best practices' until January 31, 2018, after which compliance with them becomes mandatory. Although this is not connected to GDPR, companies that implement this standard will be some way to becoming GDPR compliant, at least as far as payments are concerned. E.g. In PCI DSS 3.2., multi-factor authentication (MFA) becomes mandatory, offering retailers and other companies a way of protecting customer personal details.
Join the PCI Dream Team as they discuss:
- What are the new PCI DSS 3.2 requirements?
- Who needs to be PCI DSS 3.2 compliant?
- What is the impact on data protection and cyber security?
- David Mundhenk, Senior Security Consultant at Herjavec Group
- Jeff Hall, Principal Security Consultant at Optiv Security
- Ben Rothke, Principal Security Consultant at Nettitude Group
Technical teams rely on the availability of meaningful data and effective tools to perform process monitoring, to conduct root cause analysis and investigations and, most of all, to obtain new insights into their operations. In this article, the authors discuss the implementation and management of a comprehensive system for data analytics at Shire –Lexington, MA site, the lessons learned, and practical advice towards the successful deployment of these key applications.Read more >
Warning - this is a technical webinar.
Since the outbreak of Petya there have been many webinars dissecting the malware, its purpose, and its attribution. We view the Petya outbreak differently. In this webinar we show you how we leveraged threat hunting techniques developed to identify and pattern malicious behaviour evident in malware like Petya.
Join us to
* -See a Live Demo of actual tools used to dissect the malware.
* -Ask and interact with the specialists in threat analysis.
Following on from our successful webinar titled A Day in the Life of a Threat Analyst, we bring you another informational and educational webinar on how an experienced threat analyst would investigate Petya.
Sign up now for this interactive webinar.
Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?
In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.
We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.
After attending, you will be able to:
- Recognize how AI and Machine Learning are typically used in Cyber Security, and what are the gaps
- Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
- Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks
About our guest speaker:
Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.
Gene and Cell Therapy – An Overview of the Current and Changing Regulatory Requirements and Study Design for Nonclinical Safety Evaluation
Nonclinical development of gene and cell therapies has been ongoing for more than three decades, and has been increasing in recent years. In the early days of these efforts, these therapies shared the fate of many novel experimental medicine approaches with progress impeded by severe side effects in treated patients or a failure to demonstrate efficacy in the target patient population. Research over the past decade has resulted in the development of highly sophisticated gene transfer tools with improved safety and therapeutic efficacy. As these tools have been developed, regulatory agencies worldwide have adapted new review processes and developed a wide range of guidance documents to aide researchers in designing rigorous nonclinical studies to ensure the safety, biodistribution and potential benefit of these advanced therapeutics. This presentation will provide an overview of the regulatory guidelines, provide some key considerations in the nonclinical development and testing of cellular and gene therapies, and detail several case studies of these therapeutics.
Top earning sales professionals are relentless, unstoppable prospectors, and obsessive about keeping their pipeline full of qualified opportunities. Renowned sales expert, Jeb Blount, teaches his secrets - real techniques that work with real prospects, in the real world. With insights from Jeb's latest book, Fanatical Prospecting, you'll learn how to keep your pipeline and bank account full.
By attending this webinar, you'll gain actionable takeaways including:
-How to target a specific prospect and create a compelling message to get them engaged
-Key strategies to effectively carry out discovery conversations
-How engagement data directly affects deal outcomes
A single weak point in a line of code can create an open door for attackers. Threats originating from applications are now more pervasive than ever. We believe that the best defense against application vulnerabilities is a good offense.
In this webinar, we will share results from our recent primary research study that reveals:
• The top five application security risks
• Where these risks originate
• How to remediate these risks
• Best practices to protect your business, protect your customers
This IDC Web Conference will feature data highlights from the inaugural IDC Worldwide Data Services for Hybrid Cloud Forecast. Every vertical industry is now seeing the impact of digital transformation (DX). In DX, data is core as every change and process relies on converting data into actionable insights. And the leading digital organizations are discovering that the cloud – in terms of its power to deliver agility and flexibility in data management and faster time to insights – is indispensable for achieving their DX business objectives.
IDC Research Director Ritu Jyoti will discuss the latest trends in hybrid/multicloud deployments, proliferation of application deployment models and data formats across hybrid IT, associated data management challenges, and how data services for hybrid cloud can help organizations gain a competitive edge and thrive in the DX era.
Data Protection Suite is package contain the best Dell EMC solutions.
Join us in the short, 30 min session describing what is new from technology and sales perspective
Enterprises are transitioning from on-premise, monolithic applications to highly dynamic, polyglot environments using microservices and cloud computing. During this transition, organizations are often left wondering what to do with existing investments in legacy platforms and application development frameworks that are running the business of today but are quickly becoming obsolete in the face of the ongoing digital revolution.
In this webcast, we'll explore how organizations can meet the challenges of modern business using existing applications while at the same time driving new innovation using modern application development technologies like microservices, containers, and hybrid cloud. These techniques can help deliver market innovation faster and with more reliability while minimizing the risk of introducing new technology too quickly.
From its early days as a Platform-as-a-Service (PaaS) to the current evolution as the industry's leading enterprise-ready Kubernetes platform, Red Hat OpenShift has quickly evolved to enable containers, cloud-native applications and open hybrid cloud deployments for companies around the world.
In this webcast, learn how OpenShift is helping developers and operators deploy a broad range applications across multiple cloud environments.
Even the most security focused businesses are susceptible to vulnerabilities such as DNS cache poisoning, DNS outages, or DDoS attacks. These can lead to a website or application becoming slow, completely unavailable, or even worse - hijacked. In this 30-minute live webinar, Jonathan Lewis, VP Product Marketing will cover the several, practical ways enterprises can protect themselves from losing control over their domain, and ensuring an excellent user experience for their customers.Read more >
AI and machine learning have the potential to transform payments to be less risky, more profitable, and real-time. However, implementing these new technologies can be prohibitive in terms of time, resources, and cost. This session shows how digital decisioning overcomes those barriers and enables businesses to integrate analytics with existing business rules and platforms to deliver smarter payments.
•What is digital decisioning and why does it matter?
•How can digital decisioning lead to better debiting results?
•What should be considered when selecting a digital decisioning system?
The “ban the box” (now, perhaps more accurately “Fair Chance Act”) and “salary history ban” trends continue to catch fire, with California just the latest jurisdiction to adopt new laws. Simply modifying employment applications is no longer enough to comply with the wide array of restrictions now placed on employers. The trends hit staffing agencies and PEOs perhaps the hardest. Agencies and PEOs have a high volume of candidates to screen, increasing the chances of a costly error slipping through the cracks. Moreover, client requirements and business needs often can seem to conflict with a compliant or “50 state universal” solution. Bill Simmons, labor law attorney at Littler, will discuss how these new laws impact staffing firms and offer solutions on what to do right now to stay out in front.
What you will learn:
• The complicated compliance issues in employment screening and how these impact staffing agencies
• The special challenges these laws pose and some possible solutions for your staffing firm
• How a background check partner can help you navigate these issues
Vous en avez assez des mises à jours compliquées de votre infrastructure de sauvegarde et de vos Appliances de déduplication ? Avez-vous l’impression d’êtes pris dans un cycle sans fin d’achats de logiciels et de matériels àchaque fois que vous devez ajouter de la capacité ou augmenter les performances de votre système de protection des données ?
Vous devriez utiliser une infrastructure robuste et évolutive pour sauvegarder et restaurer vos données !
Participez au webinaire Commvault sur les 5 avantages de la protection des données avec une architecture évolutive « Scale-Out », et découvrez comment Commvault avec ses offres HyperScale Software et HyperScale Appliance vous permettra de répondre à vos exigences de protection des données et d’évolutivité pour votre organisation.
Ce Webinaire vous présentera comment une architecture de sauvegarde « Scale-Out » peut :
-Eliminer la complexité des évolutions de la plateforme ;
-Proposer une flexibilité de type cloud ;
-Augmenter la disponibilité et la robustesse de la solution ;
-Limiter les tâches d’administration par automatisation et libre-service ;
-Optimiser les investissements avec une architecture basée sur des serveurs standardisés et du stockage cloud.
We sit down down with Adrian Cockcroft and chat about everything from working better in a developer driven culture to chaos engineering. He shares insight into how AWS and Netflix instill DevOps best practices that enable teams to write better code, bring tools and ideas together, go on-call for code they own, influence organizational change, and so much more.Read more >
New opportunities are opening up as technologies such as artificial intelligence and the Internet of Things go mainstream. But at the same time businesses are under intense pressure to meet changing customer expectations. In this session, learn five key trends that will drive profitability and growth in 2018, if you can quickly leverage them and adapt to them. Anita will explain what these trends mean for your business, with concrete, actionable tips for how to take advantage of these trends in ways that add to your top line and bottom line. Get ahead of the curve and lead in your marketplace, by understanding how to use these trends for growth and profit.Read more >
Join us as we sit down with leaders from Intuit, Gainsight, and Symantec as they each share their digital transformation stories and lessons learned.Read more >
PagerDuty loves DevOps. We support a culture of empowerment and enablement. As such, our newly announced capabilities integrate applied machine learning, end-to-end response automation, and the mobilization of people in real-time across the entire business, to help teams eliminate inefficiencies when it matters most and get back to innovation.Read more >
What is the real value that organizations get from undergoing a DevOps transformation? Join us as industry experts and IT leaders discuss actual DevOps implementations, and their value to the customer, the business, and the team, in dollars, time, and satisfaction. We’ll explore the key metrics that you should use to measure for building a strong case for DevOps.Read more >
In this live webinar join Storage Switzerland’s founder and lead analyst George Crump and Vexata’s VP of Products and Solutions Rick Walsworth as they explain how all-flash systems have fallen short and how IT can realize the full potential of flash-based storage without the compromises. Learn 5 areas where all-flash arrays miss the database performance mark.Read more >
Join Dave Schubmehl, Research Director, Cognitive Systems and Content Analytics at IDC as he discusses how organizations are leveraging this technology to become information-driven and experiencing a myriad of benefits as a result, including enhanced transparency for better decision-making and risk mitigation, cost avoidance, amplified expertise, accelerated innovation, advanced regulatory compliance, and elevated productivity across the board.
During this webcast, Scott Parker, Senior Product Marketing at Sinequa will highlight with real world examples how an AI-powered Search platform delivers relevant information from vast amounts of data in large corporations and government agencies.
As technology becomes inherent in every part of business today, OEMs need to be thinking about digital transformation and which advances and breakthroughs in technology will allow them to best achieve the unique missions of their customers.
Hyper-converged infrastructure (HCI) solutions accelerate IT transformation by delivering all the building blocks of IT in a single appliance. But how do you simplify the deployment of your solutions on and off-premise while maintaining a high degree of performance, availability and security? What does digital transformation mean for your business?
Join Dell EMC OEM experts for this live webinar to learn how your organization can simplify how you deliver your solution, scale quickly and maximize workload performance to innovate, stay competitive, and drive stronger business outcomes for your customers.
In this webinar you’ll learn:
• What digital transformation means for your business, and why your organization needs to be actively exploring which advances and breakthroughs in technology will give you a competitive advantage today.
• The benefits of migrating your solutions to a modern HCI architecture.
• Why working with Dell EMC OEM will give you the ability to innovate fast, optimize the performance of your IP and meet all your varied hyper-converged needs.
Erwin Meyer, Senior Director & GM, OEM & IoT Solutions, Dell EMC OEM
Damian Murphy, Global Solution Architect – Hyper-Converged, Dell EMC OEM
Yes, I admit it: the title is a cheap trick to grab your attention. But this is not just clickbait: this webinar is about ITSM as one of the oldest professions in IT. Ever since the development of the first information systems, there has been a need to manage them. This webinar explores the emergence of the ITSM discipline, its shortcomings in the digital era, and how DevOps fills one of the gaps.Read more >