Hi [[ session.user.profile.firstName ]]
Sort by:
    • How to get the most out of the Internet of Things
      How to get the most out of the Internet of Things Manu Marchal, Basho & Annard Brouwer, Senior Software Architect at Intellicore Services Recorded: Oct 4 2016 11:00 am UTC 56 mins
    • The Internet of Things (IoT) has steamrolled its way into businesses around the world, presenting itself as a golden opportunity for creating value and generating new revenue streams.

      Of all the new types of data that have been unleashed onto organisations by the IoT, time series data – data created with a timestamp – is the most significant.

      Time series data makes it possible to identify patterns and forecast trends in ways that create significant competitive advantages for businesses. Both speed and scale are integral, which is a unique challenge for enterprise databases.

      In a webinar hosted by Information Age and Basho, learn how to get the most out of the Internet of Things. The webinar will discuss:

      • What is time series data and the market dynamics driving changes in data – time series data is fast becoming the largest-growing data type in the IoT universe.

      • How to deliver the high performance required for time series data and its huge number of data sources

      • Best practices and real IoT practical examples on how to structure and leverage data for success

      • Annard Brouwer, Senior Software Architect at Intellicore Services, will discuss how they are using Time Series data to drive customer and fan engagement through their Sports Data Platform for the likes of the National Rugby League (NRL), FIA Formula E Championship and Wembley Stadium.

      Read more >
    • State of DDoS Mitigation: Testing Shows Most Businesses Aren't Ready
      State of DDoS Mitigation: Testing Shows Most Businesses Aren't Ready Sahba Kazerooni Recorded: Nov 7 2016 6:00 pm UTC 27 mins
    • DDoS Strike recently released the “State of DDoS Mitigation” report, with findings based on authorized DDoS tests on numerous companies in the telecom, tech, financial, and entertainment sectors. Despite having enterprise-level DDoS mitigation technology in place, virtually all of the targets were compromised, revealing common vulnerabilities and oversights in DDoS defenses.

      Major findings included:

      95% of targets experienced service degradation
      78% of targets were unable to mitigate an attack
      70% of targets needed non-technical improvements (people and process)
      95% of targets needed rate limit tuning
      Application layer attacks were the most successful and caused the longest downtime
      Average bandwidth to cause downtime was only 4.3 GB/s
      While problems were pervasive, the vast majority were fixable, and arose from misunderstandings about the nature of DDoS attacks and how to use DDoS mitigation technology and techniques.

      In this webinar, DDoS Strike Vice President Sahba Kazerooni will dig into the report and explain how and why so many DDoS defences fail. Then he’ll explain what businesses can do to catch up and be ready when hit with a real DDoS attack.

      Read more >
    • Your Most Pressing Questions in Identity-Driven Security: Microsoft Panel
      Your Most Pressing Questions in Identity-Driven Security: Microsoft Panel Patrick Arnold, Patrick Huff, Alex Weinert Recorded: Oct 4 2016 5:30 pm UTC 56 mins
    • There are a number of security-related questions that come up often in our conversations with clients and industry professionals. We have invited the Avaleris VP, IT Security & Emerging Technologies and three leading security experts from Microsoft to answer these questions and discuss the most pressing identity-driven security issues faced in the industry today. In this panel webinar, hear from Patrick Arnold, Senior Global Director - Enterprise Cybersecurity Group at Microsoft, Patrick Huff, Senior Director, Advanced Service Delivery at Microsoft, and Alex Weinert, Group Program Manager at Microsoft, on issues such as: “If Microsoft gets attacked, what happens to my cloud security products?” and “What is the best way to protect against cyber espionage?”. All attendees are invited to submit their own security questions in advance of the panel and during the live session.

      Read more >
    • Cohort Analysis: Get the Most Out of Your Data
      Cohort Analysis: Get the Most Out of Your Data Looker Recorded: May 31 2016 10:45 pm UTC 66 mins
    • By analyzing a cohort, you can discern patterns across the customer journey and answer any number of questions — which marketing channels delivered the highest-value customers? At what point do users stop engaging? Where is fraud coming from and how do we shut it down?

      In this webinar, Looker and Avant discuss the value of cohort analysis, tips and tricks to get the most out of it and specific examples of cohort analyses done by Avant.

      Some topics covered:
      -How Avant used cohort analysis to identify and optimize their key acquisition channels
      -How Avant identified sophisticated fraud rings by cohorting applications by banking and network data
      -Best practices for using cohort analysis to bubble-up insights
      -How to identify where cohort analysis could help your business

      Read more >
    • Making the Most of Your Season Review with Wendy Walker
      Making the Most of Your Season Review with Wendy Walker Wendy Walker Recorded: May 4 2016 3:00 pm UTC 24 mins
    • Most of the main tax season deadlines have come and gone. It’s now time to collect your notes and start preparing your review to internal stakeholders. How do you compile this information and present this data in a clear manner that will help drive process improvements for next year?

      Sovos is presenting a complimentary webinar that addresses these concerns that will be hosted by Wendy Walker who has over 15 years of reporting and compliance experience, including organizations like Zions Bancorporation and Chase.

      Why are season reviews so powerful?

      1. Creates alignment and more efficient communication with all the people, departments, and vendors involved with year-end processing.

      2. Improves the overall process by bringing visibility to the impact tax reporting processes can have when they go well and when they don’t.

      3. Creates better risk management (with penalties increasing twice this year) by facilitating valuable discussions and feedback needed to improve the accuracy of data, meet state and federal deadlines, and identify shortfalls and limitations of current systems and processes.

      This webinar will discuss six ways to help your review make a difference.

      •Document the details!
      •Decide when to conduct the review.
      •Determine who should attend the season review.
      •Set ground rules for the meeting in advance.
      •Set basic questions to use as a guideline for discussion.
      •Share and build on the results of the lessons learned.

      Wendy Walker is an experienced tax information reporting professional with over 15 years of reporting and compliance experience. In her former roles at Zions Bancorporation and Chase, she managed compliance and operations functions (and teams) associated with US withholding tax and 1099, 1042-S, and state reporting. Additionally, Wendy was the FATCA Reporting Officer at Zions, responsible for researching and advising the various lines of business of their obligations.

      Read more >
    • 12 Most Common Questions in a Client Data Protection Audit
      12 Most Common Questions in a Client Data Protection Audit Tony Themelis, VP of Product Strategy, Digital Guardian Recorded: Aug 26 2015 3:00 pm UTC 34 mins
    • Are you ready for your next security audit from one of your most important customers? This webinar will help you gauge your readiness and identify areas you need to improve.

      Sophisticated cybercriminals have identified third party suppliers and service providers as a lucrative back door to steal sensitive corporate information. Consequently, many companies are facing increasing pressure to meet stringent data protection audits from their largest clients.

      Based on our experience with a range of customers who have had to meet stringent partner data protection security audits, we’ve identified the most common data protection audit questions.
      – The 12 most common questions in a client data protection audit
      – What the client is really looking for with each question
      – Guidance on your “audit readiness”

      Read more >
    • Tracking the most significant cyber threat: Ransomware
      Tracking the most significant cyber threat: Ransomware Dan Hubbard, CTO at OpenDNS, and Dean De Beer, Principal Engineer at AMP Threat Grid Recorded: Apr 13 2016 6:00 pm UTC 52 mins
    • Imagine losing access to all of your critical data — only to find out you are being extorted by criminals who require payment in order to get it back. This is happening at an alarming rate and is commonly referred to as Ransomware.

      While these attacks are most prevalent on employee laptops, ransomware is now targeting departmental file servers and other critical infrastructure.

      But, there are steps you can take to better protect your company and reduce the risk of ransomware infections — and OpenDNS and Cisco have been at the forefront helping our customers against various versions of ransomware.

      Join this webcast with experts from Cisco including Dan Hubbard, CTO at OpenDNS, and Dean De Beer, Principal Engineer at AMP Threat Grid, as they discuss steps you can take to reduce the risk of ransomware infections.

      Learn how:
      - Ransomware has evolved and what we know about it today
      - To predict what ransomware might do next
      - You can identify the Internet infrastructure used by the attackers to connect, control, and transfer the encryption keys

      Read more >
    • How to get the most out of AppSec tools
      How to get the most out of AppSec tools Justin Collins, Mike Milner, Goran Begic Recorded: Mar 16 2016 7:25 pm UTC 46 mins
    • "SAST", "DAST", "IAST", "RASP"... In the application security testing space it is very easy to get lost within all the technologies that help find issues in code and dependent libraries.

      While the most effective approach is to use multiple technologies and tools, for many organization this is not a sensible option due to resource and time constraints.

      In this webcast Justin, Mike and Goran will explain the differences and benefits of different application security technologies and provide advice on how to get started.

      No new project, or major code rework should be checked in without a scan with a static analyzer.

      Applications deployed in production, especially those that are known to use outdated frameworks and libraries need to be protected with a runtime protection library.

      Read more >