Hi [[ session.user.profile.firstName ]]
Sort by:
    • How to get the most out of the Internet of Things How to get the most out of the Internet of Things Manu Marchal, Basho & Annard Brouwer, Senior Software Architect at Intellicore Services Recorded: Oct 4 2016 11:00 am UTC 56 mins
    • The Internet of Things (IoT) has steamrolled its way into businesses around the world, presenting itself as a golden opportunity for creating value and generating new revenue streams.

      Of all the new types of data that have been unleashed onto organisations by the IoT, time series data – data created with a timestamp – is the most significant.

      Time series data makes it possible to identify patterns and forecast trends in ways that create significant competitive advantages for businesses. Both speed and scale are integral, which is a unique challenge for enterprise databases.

      In a webinar hosted by Information Age and Basho, learn how to get the most out of the Internet of Things. The webinar will discuss:

      • What is time series data and the market dynamics driving changes in data – time series data is fast becoming the largest-growing data type in the IoT universe.

      • How to deliver the high performance required for time series data and its huge number of data sources

      • Best practices and real IoT practical examples on how to structure and leverage data for success

      • Annard Brouwer, Senior Software Architect at Intellicore Services, will discuss how they are using Time Series data to drive customer and fan engagement through their Sports Data Platform for the likes of the National Rugby League (NRL), FIA Formula E Championship and Wembley Stadium.

      Read more >
    • Your Most Pressing Questions in Identity-Driven Security: Microsoft Panel Your Most Pressing Questions in Identity-Driven Security: Microsoft Panel Patrick Arnold, Patrick Huff, Alex Weinert Recorded: Oct 4 2016 5:30 pm UTC 56 mins
    • There are a number of security-related questions that come up often in our conversations with clients and industry professionals. We have invited the Avaleris VP, IT Security & Emerging Technologies and three leading security experts from Microsoft to answer these questions and discuss the most pressing identity-driven security issues faced in the industry today. In this panel webinar, hear from Patrick Arnold, Senior Global Director - Enterprise Cybersecurity Group at Microsoft, Patrick Huff, Senior Director, Advanced Service Delivery at Microsoft, and Alex Weinert, Group Program Manager at Microsoft, on issues such as: “If Microsoft gets attacked, what happens to my cloud security products?” and “What is the best way to protect against cyber espionage?”. All attendees are invited to submit their own security questions in advance of the panel and during the live session.

      Read more >
    • Cohort Analysis: Get the Most Out of Your Data Cohort Analysis: Get the Most Out of Your Data Looker Recorded: May 31 2016 10:45 pm UTC 66 mins
    • By analyzing a cohort, you can discern patterns across the customer journey and answer any number of questions — which marketing channels delivered the highest-value customers? At what point do users stop engaging? Where is fraud coming from and how do we shut it down?

      In this webinar, Looker and Avant discuss the value of cohort analysis, tips and tricks to get the most out of it and specific examples of cohort analyses done by Avant.

      Some topics covered:
      -How Avant used cohort analysis to identify and optimize their key acquisition channels
      -How Avant identified sophisticated fraud rings by cohorting applications by banking and network data
      -Best practices for using cohort analysis to bubble-up insights
      -How to identify where cohort analysis could help your business

      Read more >
    • 12 Most Common Questions in a Client Data Protection Audit 12 Most Common Questions in a Client Data Protection Audit Tony Themelis, VP of Product Strategy, Digital Guardian Recorded: Aug 26 2015 3:00 pm UTC 34 mins
    • Are you ready for your next security audit from one of your most important customers? This webinar will help you gauge your readiness and identify areas you need to improve.

      Sophisticated cybercriminals have identified third party suppliers and service providers as a lucrative back door to steal sensitive corporate information. Consequently, many companies are facing increasing pressure to meet stringent data protection audits from their largest clients.

      Based on our experience with a range of customers who have had to meet stringent partner data protection security audits, we’ve identified the most common data protection audit questions.
      – The 12 most common questions in a client data protection audit
      – What the client is really looking for with each question
      – Guidance on your “audit readiness”

      Read more >
    • Making the Most of Your Season Review with Wendy Walker Making the Most of Your Season Review with Wendy Walker Wendy Walker Recorded: May 4 2016 3:00 pm UTC 24 mins
    • Most of the main tax season deadlines have come and gone. It’s now time to collect your notes and start preparing your review to internal stakeholders. How do you compile this information and present this data in a clear manner that will help drive process improvements for next year?

      Sovos is presenting a complimentary webinar that addresses these concerns that will be hosted by Wendy Walker who has over 15 years of reporting and compliance experience, including organizations like Zions Bancorporation and Chase.

      Why are season reviews so powerful?

      1. Creates alignment and more efficient communication with all the people, departments, and vendors involved with year-end processing.

      2. Improves the overall process by bringing visibility to the impact tax reporting processes can have when they go well and when they don’t.

      3. Creates better risk management (with penalties increasing twice this year) by facilitating valuable discussions and feedback needed to improve the accuracy of data, meet state and federal deadlines, and identify shortfalls and limitations of current systems and processes.

      This webinar will discuss six ways to help your review make a difference.

      •Document the details!
      •Decide when to conduct the review.
      •Determine who should attend the season review.
      •Set ground rules for the meeting in advance.
      •Set basic questions to use as a guideline for discussion.
      •Share and build on the results of the lessons learned.

      Wendy Walker is an experienced tax information reporting professional with over 15 years of reporting and compliance experience. In her former roles at Zions Bancorporation and Chase, she managed compliance and operations functions (and teams) associated with US withholding tax and 1099, 1042-S, and state reporting. Additionally, Wendy was the FATCA Reporting Officer at Zions, responsible for researching and advising the various lines of business of their obligations.

      Read more >
    • Tracking the most significant cyber threat: Ransomware Tracking the most significant cyber threat: Ransomware Dan Hubbard, CTO at OpenDNS, and Dean De Beer, Principal Engineer at AMP Threat Grid Recorded: Apr 13 2016 6:00 pm UTC 52 mins
    • Imagine losing access to all of your critical data — only to find out you are being extorted by criminals who require payment in order to get it back. This is happening at an alarming rate and is commonly referred to as Ransomware.

      While these attacks are most prevalent on employee laptops, ransomware is now targeting departmental file servers and other critical infrastructure.

      But, there are steps you can take to better protect your company and reduce the risk of ransomware infections — and OpenDNS and Cisco have been at the forefront helping our customers against various versions of ransomware.

      Join this webcast with experts from Cisco including Dan Hubbard, CTO at OpenDNS, and Dean De Beer, Principal Engineer at AMP Threat Grid, as they discuss steps you can take to reduce the risk of ransomware infections.

      Learn how:
      - Ransomware has evolved and what we know about it today
      - To predict what ransomware might do next
      - You can identify the Internet infrastructure used by the attackers to connect, control, and transfer the encryption keys

      Read more >
    • Minimizing Data Threats: How to Protect Your Most Precious Resource Minimizing Data Threats: How to Protect Your Most Precious Resource David Lingenfelter, CSA Mobile Working Group Co-Chair Recorded: Mar 15 2016 9:40 pm UTC 25 mins
    • According to Netskope, the average organization has 730 cloud apps in use, and 90.8% aren't enterprise-ready.* This puts the corporate data you're charged with securing at risk. And as workers continue to use consumer-grade cloud apps to share, access and create corporate data, it's clear that these threats aren't going away. So how can enterprise IT proactively mitigate these risks and protect the integrity of its most precious resource?

      Watch this on-demand webinar, featuring Co-Chair of the Cloud Security Alliance (CSA)'s Mobile Working Group David Lingenfelter, to learn:

      •Key considerations for minimizing the inherent risks embedded within mobile computing
      •Critical vulnerabilities associated with the introduction of IoT in the enterprise, and best practices for mitigation
      •How the CSA's Cloud Controls Matrix (CCM) provides enterprise IT with a framework for global, implementation-ready controls to prevent and manage cloud-centric information-security risks

      Read more >
    • How to get the most out of AppSec tools How to get the most out of AppSec tools Justin Collins, Mike Milner, Goran Begic Recorded: Mar 16 2016 7:25 pm UTC 46 mins
    • "SAST", "DAST", "IAST", "RASP"... In the application security testing space it is very easy to get lost within all the technologies that help find issues in code and dependent libraries.

      While the most effective approach is to use multiple technologies and tools, for many organization this is not a sensible option due to resource and time constraints.

      In this webcast Justin, Mike and Goran will explain the differences and benefits of different application security technologies and provide advice on how to get started.

      No new project, or major code rework should be checked in without a scan with a static analyzer.

      Applications deployed in production, especially those that are known to use outdated frameworks and libraries need to be protected with a runtime protection library.

      Read more >
    • Getting The Most Out Of The Data You Already Have Getting The Most Out Of The Data You Already Have Adam Rossow, CMO, iModerate Recorded: Jan 20 2016 7:00 pm UTC 40 mins
    • Be honest - are you currently fully leveraging the data you already have? If you are like most marketers, the answer is likely 'No.'

      Today's consumers take full advantage of their ability to share their perceptions of, experiences with, and feelings toward a brand – whether brand-driven (e.g., CSAT surveys or brand perception studies) or consumer-generated (e.g., social commentary or product reviews). Yet many marketers aren’t making the most of all of this valuable information flowing into their dashboards, CRMs, and survey platforms. The energy seems to be placed on the capturing of the data rather than its utilization.

      You are likely already sitting on a gold mine of insights. The question is - how can you transform the customer feedback you already have into the actionable intelligence your brand(s) need to succeed?

      Join Adam Rossow, CMO of iModerate, for this informative, actionable, and free webinar where you will learn:

      • What types of data marketers are neglecting instead of harnessing

      • How to derive meaningful insight from these info streams without waiting weeks or breaking the bank

      • Additional opportunities to collect and leverage consumer feedback through pre-existing platforms

      Read more >