Hi [[ session.user.profile.firstName ]]
Sort by:
    • Safe at Any Speed! Safe at Any Speed! Kevin Rowney, Senior Director, Breach Response and MegaTrends, Symantec Corporation Recorded: Oct 13 2011 8:00 pm UTC 27 mins
    • Critics have likened cloud computing to flying in an airplane, in that loss of service could be catastrophic to an organization that trusts its data in the cloud. For those who have chosen the cloud computing route for their business, this session will liken cloud implementation to buying a car. Just as a new car purchase requires research and preparation to get the highest quality product at the best price, organizations should do their homework to ensure effective cloud service that delivers high availability and good performance.

      The session will start by examining the most common concerns expressed by enterprises when making decisions around cloud computing, including possible downtime and loss of data control. With the risks carefully delineated, we will then outline the steps to the most effective cloud solution possible such as prioritizing services by tiers, establishing recovery time objectives (RTOs) and recovery point objectives (RPOs), and the important questions to ask regarding data handling and how to negotiate favorable SLAs.

      Speaker Bio:
      Kevin Rowney is a data loss prevention visionary who joined Symantec in 2007 as part of the Vontu acquisition, a company which he founded. He currently oversees MegaTrends and Breach Response at Symantec and is focused on helping customers address breach incidents and identifying risks of future breaches. He also drives MegaTrends thought leadership at Symantec, covering Moblity, Cloud and Virtualization. For the past 14 years, Rowney served in a variety of security roles at software startups in Silicon Valley. At Vontu, Rowney conceived the original value proposition, designed the system architecture and wrote the patent-pending search algorithms used in their award-winning product.

      Read more >
    • Is Your Vulnerability Management Program Vulnerable? (Part 2) Is Your Vulnerability Management Program Vulnerable? (Part 2) Carlos Krause, Manager of Professional Services, CISSP, CISA, MCSO Recorded: Dec 18 2014 4:30 pm UTC 59 mins
    • Is your vulnerability management program vulnerable? If you are unsure or answered “yes," sign up to join Carlos Krause, Modulo’s lead technical consultant for Part 2 of this two-part webinar series.

      In Part 1, Carlos identified key challenges and pitfalls most vulnerability management programs face. In Part 2, he will outline best practices and action items to improve your vulnerability management process, including how to:

      *Integrate your vulnerability management program with the risk and compliance actions in the organization
      *Harmonize vulnerability metrics with other programs and assessments
      *Represent risks in a business language
      *Plan and deploy a successful implementation

      Carlos Krause presented this topic at ISACA ISRM 2014 at a record-setting Megatrend Session. Due to its popularity, we wanted to bring it to you in a webinar series. Don’t miss out!

      Read more >
    • Four Performance Strategies for Today’s Trends: Social, Mobile, Big Data, Cloud Four Performance Strategies for Today’s Trends: Social, Mobile, Big Data, Cloud Rob Whiteley, VP Solutions Marketing, Riverbed Technology Recorded: Nov 13 2013 5:00 pm UTC 48 mins
    • As your employees become more mobile and embrace social collaboration, the way they communicate and work together could be impacting and slowing down business. A big data and cloud to the mix and you get infrastructure complexity and security concerns that could compromise internal and external user experience and drive up costs.

      Join this live broadcast to learn how to:
      - Maximize the availability of your business processes
      - Don’t just preserve but IMPROVE user experience
      - Simplify infrastructure complexity to reduce costs
      - Deliver a better, faster return on your megatrend projects

      Register now to walk away with Rob’s four key strategies for today’s megatrends and a framework for intelligent performance management that can help you accelerate business success.

      About the Presenter:
      Rob Whiteley was previously at Forrester Research as an industry analyst, research director and operation effectiveness leader for the past 10 years.

      Read more >
    • Technology Convergence Scenarios – Exploring Untapped Business Models Technology Convergence Scenarios – Exploring Untapped Business Models Ankit Shukla, Practice Director, TechVision Recorded: Oct 13 2016 3:00 pm UTC 51 mins
    • In an inter-connected world where technology has no boundaries, two or more emerging technologies across industries may converge in various scenarios, leading to unexplored applications or business models. For example, technologies like next-generation stem cells, additive manufacturing and nano-coatings may converge to give rise to "personalized cosmeceuticals," which are cosmetics customized based on phenotype and genotype of the user. Unexplored business models like these may become the next disruptive billion-dollar idea for investors, corporate executives and R&D professionals. The webinar will discuss key trends that drive these convergence scenarios and potential market challenges that should be noted while considering these opportunities.

      Read more >
    • Look Beyond Machine Learning to an AI Future Look Beyond Machine Learning to an AI Future Robin Varghese, Senior Research Analyst, Visionary Innovation Group Recorded: Oct 4 2016 3:00 pm UTC 57 mins
    • Movies have created much hype around artificial intelligence, which has distorted the understanding of the technology for people, businesses, and government. Most people picture a dystopian society when they think about artificial intelligence, but the truth is light years away from this notion. In reality, the true capabilities of AI devices don’t meet general expectations. But in the past decade, the industry has witnessed significant development in terms of technology and the skills that are pushing the boundaries of AI capabilities. Newer innovations in machine learning algorithms (deep learning) and computing technologies (neuromorphic or quantum computing) show promise for AI. But is the public or government ready for this future? Are businesses aware of what needs to be done to become AI ready?

      Read more >
    • Identifying structural growth winners underpinned by demographic mega-trends Identifying structural growth winners underpinned by demographic mega-trends Nick Armet Recorded: Mar 19 2014 2:00 pm UTC 14 mins
    • Nick Armet, Head of Corporate and Investment Communications, recently recorded a webcast to bring to life a white paper which looks into investing in demographics. This white paper argues the equity market is less efficient at valuing companies benefiting from structural growth, which creates opportunities for long-term investors. We identify three demographic megatrends - population growth, the rise of the emerging market consumer, and the impact of ageing – which, in turn, support a number of structural growth themes that allow identifiable companies to benefit from strong and compounding cash returns over investible timescales. Case studies are used to illustrate and validate the thesis.

      Read more >
    • Achieving Intelligence-Aware Security, Monitoring Controls, and Agility Achieving Intelligence-Aware Security, Monitoring Controls, and Agility Tony Zirnoon, CISSP - Sr. Director Security Strategy at VSS Monitoring Recorded: Jul 25 2014 4:00 am UTC 64 mins
    • As network data has exploded in volume, velocity and variety, network security and monitoring solutions have been behind the curve in adopting new technologies and approaches to cost-effectively scale and accommodate continuous monitoring in consolidated physical, virtual and cloud based data centers. The network’s increasing speed and rapidly growing megatrends (e.g. virtualization and tunneling protocols), pose challenges for IT network and security professionals trying to manage and secure Financial Services network infrastructure in a more agile and proactive manner.

      The IT organization as a whole needs to ensure end-to-end visibility and data access to meet and exceed business, network and application performance SLAs while keeping their infrastructure and data secure against continually evolving advanced and targeted attacks. How does one architect a scalable failsafe security & monitoring architecture to withstand the test of time while ensuring adaptability to evolving business needs?

      Attend this webinar to learn how to:
      - The value props a Network Packet Broker system could deliver for Financial Services networks
      - How to use the security intelligence offered by Next Generation IPS and advanced malware prevention tools in one segment
      - How to identify bad actor(s) / suspicious traffic patterns, and then leverage an extensible Network Packet Broker system to not only perform intelligent traffic capture, but also gain intelligence aware security and monitoring controls across the entire network infrastructure

      Read more >