Eileen Kelly, Dig Your Garden Landscape Design, will discuss a variety of landscape design alternatives to replace or minimize the traditional lawn such as no-mow grasses, hardscape materials (gravel, decomposed granite, natural stone, boulders, mulch, and sculpture), and eco-friendly strategies such as “sheet mulching” to quickly eradicate the lawn.
For over ten years, East Bay Municipal Utility District has offered rebates for converting ornamental lawn to sustainable landscaping. Hear Michael Hazinski provide a water utility perspective on the trends in consumer acceptance of sustainable landscaping and a comprehensive approach to implementing landscape water conservation incentives.
Jodie Sheffield, Sod Development Expert from Delta Bluegrass Company will introduce you to their water saving California Native Sod products. The presentation and discussion will focus on: how to choose the right native sod for your project, water wise irrigation management, and how to maintain native sod.
Learn how the new features of Landscape, Ubuntu's premier systems management tool, can help your enterprise manage Ubuntu deployments at scale.
This new version of Landscape introduces key features such as Role Based Access Control, Bare Metal Provisioning, a complete API along with other tools and reporting capabilities aimed at giving you total operational awareness.
This channelcast will provide comprehensive insight into how Landscape's enterprise systems management and regulatory compliance functionality can help an organization tame complexity. Our special guest is Dave Russell, who heads Global Pre-sales at Canonical, joined by Federico Lucifredi, Landscape and Ubuntu Advantage product manager.
With cyber threats constantly emerging every week, many struggle to keep up with all of the issues and many others feel hopeless. We will examine recent trends and breach categories to understand how the threat landscape has shifted. We must learn from our recent and not so recent history to be able to predict the next wave of attacks and to structure our defenses against them.Read more >
How Data-Driven Approaches are Changing Your Data Management Strategies
Introducing data-driven strategies into your business model alters the way your organization manages and provides information to your customers, partners and employees. Gone are the days of “waterfall” implementation strategies from relational data to applications within a data center. Now, data-driven business models require agile implementation of applications based on information from all across an organization–on-premises, cloud, and mobile–and includes information from outside corporate walls from partners, third-party vendors, and customers. Data management strategies need to be ready to meet these challenges or your new and disruptive business models will fail at the most critical time: when your customers want to access it.
In this webinar, John L. Myers of Enterprise Management Associates (EMA) and Jack Norris of MapR will discuss how the new business advancements require data-rich applications that enable global, real-time data integration, microservices support, and in-place and continuous machine learning/AI and SQL capabilities.
Watch this video to learn:
Examples of disruptive business models
Drivers of changes to the management landscape
Best practices associated with meeting requirements for data-driven applications
The ever-changing cyber threat landscape requires better security practices to assess, detect and block threats to applications and other workloads. Many regulations, such as PCI, HIPAA and the upcoming European GDPR also require accurate and timely detection of threats and compromise. So how can you keep pace with a threat target that is constantly moving?
In this session, Misha Govshteyn, SVP of Product Management and Founder at Alert Logic provides insight on the latest web application security threats, the role of threat intelligence, security technologies, machine learning and security experts.
Tis the season of predictions looking ahead to 2017 and paying lip service to the threat landscape. Not a fan of either of those? You’re not alone. Join FireEye in this BrightTalk webinar where we’ll discuss more than just the threats that may or may not be awaiting us in 2017. We’ll discuss real attacker tactics and techniques, along with how you can actually counter the risk they present.Read more >
When working with state and governmental agencies, it can be tough to navigate the communications divide. With ever-changing requirements and fast-paced IT landscapes, how do you keep up with your organization's demands and streamline your communications? Join this webinar to hear how MHM Services, a mental health expert, tackles the ever-changing requirements and IT landscape to deliver the highest level customer service. See how 8x8’s unified communications help alleviate headaches and enable MHM to connect with over 6,000 clinical, managerial and administrative professionals nationwide.Read more >
Join Ryan Olson, Senior Director of Threat Intelligence for Palo Alto Networks as he looks at the multiple instances of compromises we make within the Software Supply Chain, and get this predictions of what to expect from 2018.
Discover more by reading the blog in the attachments.
The security paradigm for nearly two decades has been to increasingly invest in technology. These solutions have not only failed to solve the problem but have made the challenge more complex. Even if true threats are detected, they are lost in a sea of alerts and lack the context to prioritize and build response. This security posture is only exacerbated by the skills deficit currently facing the industry.
In this webinar, we look at the emergence of a new security-as-a-service paradigm and the capabilities required to help organizations reduce risk and time to protection. The discussion will cover how the cost, specialization and complexity of cyber defense have positioned security to follow other markets in adopting an “as-a-service” paradigm.
We will also address the capabilities that define an ideal security-as-a-service partner such as:
•the availability of security expertise
•a broad intelligence capability and
•flexible deployment options
Not only does this approach improve a security posture and reduce risk but it does so with a lower total cost of ownership (TCO). Register today to learn more about this emerging security-as-a-service model.
The FireEye Team
The most persistent security challenge you face today is bad guys social engineering your users. Phishing campaigns continue to be hacker’s No. 1 preferred attack vector to get your unsuspecting users to download and install their malicious software.
Join security advocate, Erich Kron, for this live webinar. Erich will discuss brand-new research based on what your users are clicking and how you compare to your peers with new phishing benchmarks by industry.
Key topics covered in this webinar:
- New phishing benchmark data by industry
- Understanding the current phishing landscape
- Most clicked simulated phishing attacks
- Top 10 “In the Wild” reported phishing emails
- Actionable tips to create your “human firewall”
This webinar offers organizations an easy guide to navigate the complex regulatory landscape which they are in by managing privileged users and sensitive access to strategic resources.
Digitalization has touched on almost every part of the business, affecting companies’ employees, stakeholders, as well as their daily operations across all sectors of activity. Along with digitalization arose major cybersecurity issues, leading to numerous mandatory regulations which keep evolving and increasing as our uses and approach to technology change.
This growth in regulatory changes often overwhelms organizations which need to become more flexible to comply quickly and simultaneously to different mandatory controls and requirements (GDPR, HIPAA, PCI-DSS, SOX, NIST SP800-171 etc.). This 45-minute webinar is constructed as a guide to help organizations navigate the complex regulatory landscape they are in by managing privileged users and sensitive access to strategic resources.
From AI and Machine Learning to the human factor, new cybersecurity threats and the tools used to fight them are evolving at a pace never before seen. Join our panel of cybersecurity experts as they discuss the evolving cybersecurity landscape and answer questions ranging from the latest cybersecurity trends to incident response and data breach legal requirements. Panelists will include:
• Jennifer Rathburn, Partner, Foley and Lardner, LLP Law Firm
• Paul Mazzucco, Chief Security Officer, TierPoint
• Scott Lambert, VP ActiveIntelligence, Alert Logic
As the ‘public profile’ of cybercrime continues to increase, enterprises are encouraged to look at how they keep their businesses and customers safe by sharing intelligence, best practice and defense measures.
Join Nahim Fazal, Head of Cyberthreat Intelligence at Blueliv, for a webinar reflecting on the incidents and trends discussed in Blueliv’s annual cyberthreat report, and guidance on how organizations of all sizes can protect themselves in an ever-more sophisticated threat landscape.
The report combines intelligence gathered through Threat Compass with insight from the Blueliv analyst team, leading to informed assessments about the current state of play and areas which require immediate attention.
Register today to reserve your spot.
Blueliv is leading a new wave of proactive, real-time threat monitoring that protects organizations from the outside in, radically reducing attack success rates and improving incident response performance through fresh, actionable intelligence. The in-house team is bolstered by the Blueliv Threat Exchange Network, a global community of thousands of security experts united in the fight against cybercrime.
What You'll Learn
In the digital economy, the goal of HR is clear — to evolve from an administrative office to a strategic partner. While in the past HR operated separately from other parts of the business, in a digital business landscape HR must be able to integrate across the organization to participate in the reshaping of business models and to meet current and future business challenges.
Digitizing your HR operations is the key, and SAP landscapes are well-positioned for this journey with a range of available solutions, but many HR managers do not know where to start, or how to make the business case for digitization.
In this webinar, you will learn about the top five timewasters of HR and how digitizing your HR operations helps you avoid them. Topics include:
• The top 5 timewasters and possible solutions for them
• A roadmap for successfully digitizing your HR operations
• How to reduce costs and save time in the HR department
- Bartosz Golas, Senior Sales Manager HCM / SaaS, T.CON
Bartosz has 4 years responsible for SAP ERP Sales, and 3 years responsible for SAP HCM & SuccessFactors Sales.
The last year has been dominated by costly attacks, newsworthy breaches ransomware and economic espionage. Cybercrime has gotten bigger and bolder and the financial rewards have gotten much bigger. Cyber attacks have started to become a regular occurrence in the news,. This webcast will review
• Review the threat landscape of 2017
• Who or what has been to blame in these ransomware and cyber attacks
• What lessons can you the security professionals take from the year
• What solutions can help secure you as we move into 2018.
Steve Locke, Director of Security Technology at Northern Trust, shares insights on today’s cyber security landscape. In this session, he discusses trends in the cyber landscape, cyber attacks of 2017 and strategies for demystifying cyber threats.Read more >
2017 was the year of cyber attacks and high profile data breaches. Discover what cyber security professionals should be focusing on in order to secure their organizations in 2018.
This interactive Q&A panel will discuss:
- The trends shaping the cyber threat landscape in 2018
- Lessons from the biggest cyber events of the year
- Recommendations for CISOs on securing the enterprise in an age of frequent and persistent attacks
- The technological advancements in the fight against cyber criminals and the processes organizations need to have in place to enable their security teams
- Amar Singh, Cyber Management Alliance
- Stuart Davis, Director, Global Services & Intelligence Europe, Middle East & Africa at Mandiant
- Edward Tucker, CIO, DP Governance
- Dharminder Debisarun, Industry Security Architect, Palo Alto Networks
2017 was a year dominated by costly cyber-attacks, massive data breaches, malicious ransomware, and economic espionage. With cyber-criminals getting bolder, and financial rewards getting bigger, cyber-attacks are now a regular occurrence in the news.
Join us in this webinar as we review:
• The threat landscape of 2017
• Who or what were to blame for these ransomware and cyber-attacks
• What lessons can security professionals like you take from the year
• What solutions can help secure you as we move into 2018