Organizations collaborating with third-party entities, where employees are sharing files with individuals outside of the organization, are facing security risks at unprecedented scale. These dynamics correlate to the need for security controls such as Enterprise Digital Rights Management (EDRM) to protect sensitive information when it travels outside of the corporate firewall.
In this presentation, analyst Doug Cahill from Enterprise Strategy Group (ESG) will discuss the findings from a recent study where over 200 IT and Security Professionals shared their views on the challenges with external collaboration, and his recommendations for best practices. Lynne Courts, VP of Marketing from Seclore will share how to build a comprehensive data-centric security strategy with such technologies as next-generation EDRM.
Join us and discover:
- The most vulnerable information – what types of files are regularly shared externally that pose the greatest risks
- Industry and analyst views on where shared sensitive data needs protecting, and what defences are most effective
- How to best design a comprehensive data-centric security strategy for shared information that will protect data, meet compliance regulations and reduce your risks
From managing Big Data to developing new applications, we are driven by open source technologies.
As more traditional companies consume, contribute and generally start engaging with open source, there is a critical need for a coordinated and thought through approach.
Best in class companies are creating Open Source offices which drive engagement with community, coordinate how the company works with the community and generally puts in place best practices in compliance, community and communication. Join Nithya Ruff, Director of Open Source Strategy to hear how SanDisk established an open source office and lessons we've learned.
Consumers today have access to more information than ever before when making a purchase decision. Buyers are looking for informative and trusted thought leadership content as they research their purchases, meaning that your brand's PR strategy needs to be working in tandem with marketing campaigns. As buyer behavior continues to change, marketers are re-examining their campaign and product launch strategy to incorporate PR storytelling tactics.
Join us as we discuss how to tell a unique story through a cohesive content plan to build audience trust and achieve campaign success.
During this webinar we will discuss:
• How to influence behavior through authentic and transparent content
• The evolution of earned media, and how to harness it
• The role of distribution as the missing link to any content plan
New technologies are emerging at a rapid pace and it’s imperative that companies are ready to embrace, lead and execute in this new landscape. Kurt DelBene is Microsoft’s Executive Vice President for Corporate Strategy and Planning, his role is to monitor emerging technology and guide Microsoft’s strategy to stay ahead of the trends. During this interview Kurt will talk about his role, his view of emerging trends and how he works with Microsoft’s CEO and executive suite to drive strategic initiatives.Read more >
As you move to the cloud, ensure that you secure your IT Delivery apabilities with spelled out business objectives to which the IT organisation can deliver with an effective Service Strategy to leverage IT in the execution of the Business Strategy http://www.brighttalk.com/webcast/29211 .
Where security is important, and I would think twice on the data that I would choose to put on the cloud, Time to Market and Cost Effectiveness are the critical success factors.
Time to Market should not only include “how fast do we get IT services set” but how can we leverage the business strategy execution with IT as we support the end to end delivery of new products / services to market.
The impact of Cost Effectiveness can be measured only as Total Cost of Ownership with cost, consumption and chargeback is defined (Cloud Computing: Fluff or Lightening http://www.brighttalk.com/community/it-service-management/webcast/21892 ).
We also need to define a clear IT Service Strategy with an “IT Business Model” (“This is how we deliver IT services to the business”) and a “Business (IT) Value proposition” (“This is how we support business objectives with services in a time to market perspective”).
Content marketing is an exciting concept that can generate a tremendous amount of success when executed correctly. For a lot of us, the issue is just that: we are not sure exactly how to execute a content marketing program. Suffice it to say that content marketing is the last step in the overall content creation process, and success with the process all comes down to your content strategy.
In this session, we'll start off by going over exactly what the difference between content strategy and content marketing really is. Subsequently, we'll examine how to conduct a content strategy audit in order to ensure that our content is working towards helping us achieve our goals. Attendees will walk away with the necessary steps and action items to review key performance indicators related to their content, identify opportunities through the analysis of social data and optimize their content strategy based on the findings of their audit.
Content marketing can be a cornerstone of success when it comes to your social business. In order for that to be the case, a fully optimized content strategy needs to be in place.
The latest hacking strategies include attacking targets from multiple fronts using DDoS attempts, malware and other techniques at the same time. Automation, including widespread use of compromised systems, hired botnets and IoT (Internet of Things) devices, is on the rise.
Join us to learn more about multi-layered attacks and how intelligence and automation are making them significantly more powerful. You will also learn tips to help your organization mitigate the risks.
· How bots are simplifying automation creating an even bigger volumetric attack force.
· How DDoS attacks are often a smoke screen to other malware attacks happening.
· Strategies for protecting your organization against multi-layer attacks.
The session will explore how this rapidly developing area of VR / AR / Mixed Reality and its position and convergence in the areas of advanced Customer Experience, Digital Asset Management and new A.I. led augmentation strategies starting to transform processes and experience.
We introduce a novel approach to framing digital spaces and how to measure Augmented impact on performance metrics and then explore how this is further developing into A.I. Intelligent spaces and what this may mean for Business Operating Models and future work automation design in what is described as Intelligent Business Strategy.
We include a few actual cases studies of how Cyber-physical systems driving “Digital Twins” are extending across processes and changing supply chain feedback and interaction for smart energy, smart design and new knowledge capabilities.
Are you ready for the next wave in endpoint computing? It’s multi-platform, multi-device, mobile, virtual, - get ready to gain control!
Employees are no longer chained to desktops in one location, but constantly on the move, using a variety of devices, and accessing a multitude of applications. The dramatic growth of Apple technologies in the enterprise, coinciding with the growth of mobility, and the increase in employee-owned devices is making it more challenging for organizations to manage and secure their infrastructure.
Join our webinar to learn about the top challenges and 3 strategies to manage and secure your cross-platform environment and future-proof your organization for the next wave.
"Content Strategy Simplified" gives you the insight needed to get the most out of your content marketing efforts, regardless of what stage you are at.
Learn how to setup, implement, monitor and adjust your strategies, ensuring you get the best results possible.
We all know that content is king, but what is your strategy to building that killer content? A recent survey by the Content Marketing Institute shows that 63% of UK companies either don’t have a content strategy or it is undocumented.
In this Marketing Week webinar, Richard Whitehead, Senior Director Solutions Marketing at Workfront, will share with you 8 tips and tricks that will help you build and document a killer content strategy. This will include strategies on team organisation, process and technology. Don’t go another year without a documented content strategy!
Cloud, Big Data, ITSM – all things we should be doing. Right?
Perhaps. As IT professionals, we’re often so heads-down keeping the lights on that we forget why we’re doing all this work in the first place: Our CUSTOMERS! This session begins with offering some key reasons companies implement Service Management and how it can bring value to the organization, followed by implementation strategies that rely heavily on customer engagement. Listeners will be able to clearly envision where customer involvement is critical vs. those internal processes they can craft themselves.
Key points of this session include:
- Engaging customers in the processes of Service Strategy
- The importance of customer involvement in Service Design
- Adoption and buy-in for service improvement
- The importance of the “service review” meeting
According to Gartner, organizations spend over 80% of their security product dollars on their networks and their endpoints. However, these spending priorities are increasingly at odds with the threat landscape: it’s been over a decade since network perimeter was declared dead, and with the advent of mobility and BYOD, endpoint security has become both more challenging and less relevant to stopping today’s threats. Advanced threats no longer target networks, servers or endpoints: they target users, the data they have access to, and the transactions they facilitate.
Join Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember as they discuss how organizations can better position themselves to defend against advanced threats as they adjust to the cloud-enabled, mobile-friendly, and socially networked way their users work today.
Join this webinar to learn:
• The key stages in the evolution of a post-infrastructure approach to security
• Strategies and tactics for dealing with post-infrastructure security challenges, from technologies to
• Case studies in post-infrastructure threats, illustrated by cloud email, social media and mobile apps
A B2B marketer’s life is often focused on creating killer campaigns, generating leads and developing content to fill the top of the sales funnel. Unfortunately, that is why many B2B marketers are so busy, yet have only a small percentage of revenue, if any, that they can attribute to their activities.
Why? Without a solid Demand Generation Strategy – lead generation is nothing more than a bunch of tactics that attempt to build pipeline, ineffectively.
This webinar will teach marketers how to live by 3 Rules of Strategy:
•Become more buyer-centric throughout our marketing
•Eliminate tactical-focused campaigns
•Track results and continuously optimize