Tom Walker, Head of Global Property Securities, discusses his optimistic outlook for property markets and why allocations to real estate may increase over the next 5 and 10 years.Read more >
Tom Dorey, Head of Property Product, explores the rapid appreciation in central London property, investor sentiment and his positive outlook for the sectorRead more >
ITSPmagazine meets up with Tom Brennan, Director at Intel Security and Board of Directors at OWASP, to discuss diversity, education, and the Internet of Things. Here are a few highlights from the conversation:
- Diversity is important in the organization relevant to having different perspectives. OWASP is a community of doers - if you're able to participate in the discussion from a tech perspective you're welcome, regardless of race, age gender etc.
- If you truly believe in the mission that software security is important then this is one of those communities really focuses on that aspect.
- There are 55,000 OWASP members that all have one thing in common: they understand tech and they understand the risk that impacts safety.
Tom Wilson discusses where he sees value in UK equities, FTSE versus AIM, corporation tax rates and government spending.Read more >
Tom Hoops, Legg Mason Business DevelopmentRead more >
Tom Bailey, Vice President of Product Management at Alemba shares why he thinks social media will have more of an influence on ITSM this year and why he thinks it's an interesting time for the ITIL framework.Read more >
A Fireside Chat with IIA's new CAO, Bill Franks and IIA Co-Founder and Advisor Tom Davenport. Learn 5 keys to success for newly minted and experienced analytics leaders alike.Read more >
Tom Mendoza of NetApp congratulates InterVision Systems on 20 years of business and industry success.Read more >
Tom introduces the F&C UK Mid-Cap Fund and discusses why buying out of favour shares may feel uncomfortable, but can offer the greatest reward.
UK, mid-cap, equities, Tom Wilson, BMO, Brexit
We get metaphorical on your ass as Certified Ethical Hacker instructor and 8th degree black belt Tom Updegrove shows Alicia Webb some martial arts techniques and explains how they relate to computer hacking.
It's all about testing your opponent to see how they will defend themselves, and then circumventing those defenses. Think reconnaissance and foot printing.
As Tom always says in his Cyber Kung Fu classes, "Figure things out and make something cool happen."
Don't miss an episode of SecureNinjaTV!
Subscribe to our YouTube channel at http://youtube.com/secureninja
Like us on Facebook at http://facebook.com/secureninja
Follow us on Twitter @secureninja
Connect with us on LinkedIn
Visit our website http://secureninja.com
In this webcast, Tom Ross, Tim Winstone and Tom Hanson discuss the opportunities in credit markets despite recent global market volatility. With central bank policy diverging for the first time for many years, can European credit in both the investment grade and high yield space be insulated from broader market moves? Areas covered will include:
• Market movements and their drivers
• Using bottom-up credit selection to avoid idiosyncratic risk
• Deploying the flexibility inherent in the funds and using off-benchmark positioning to generate return
• Portfolio positioning and where the biggest opportunities and risks lie
Forget Simon Cowell...there's an opportunity for every business leader to have the real 'M' Factor and we have just the book to show you how...
It's not every day an ex-BBC presenter and Media Training expert shares his secrets' in a book, and very rarely does Sir Stuart Rose, former Chairman and CEO of Marks and Spencer comment: " If you want to understand how to get the media on-side, in good times or bad this book is a good place to start".
Intrigued? Join us for a look into how to develop the M-Factor....
In Conversation with Tom Caddick & Toby Vaughan - Active vs Passive debateRead more >
As business analytics continues to gain momentum and increase its impact on organizations, the challenges facing analytics leaders continue to evolve. While the need to establish credibility and build new data analytics teams dominated agendas just a few years ago, many organizations now focus on expanding capacity, operating more efficiently and measuring the return on analytics investment. With continuous, rapid advances in technology and automation, knowing which trends to pay attention to is more important than ever.
With that in mind, the International Institute for Analytics will unveil its annual list of top predictions and priorities on December 15. Each year, IIA shares its perspective on the year ahead in the world of analytics, presenting viewpoints from leading analytics practitioners, executives and thought leaders. This year IIA has gathered feedback from more than 200 analytics executives and our broad network of unbiased analytics experts.
Don't miss this compelling hour of insights to learn where to focus your time, attention and resources in the coming year.
Tom discusses how a value and quality approach come together to protect and grow clients’ capital in the mid-cap space.
UK mid-cap, quality approach, BMO
Join guest speaker Brendan Witcher, Principal Analyst at Forrester Research and Tom Wilde, Chief Product Officer at Cxense as they break down the complex world of “personalization” and how easy-to-use cloud-based solutions are changing the game for publishers and marketers alike. Register for this complimentary webinar and discover how real-time, online personalization has evolved to provide the ultimate customer experience.
This webinar is now available on-demand.
Staying ahead of the curve in broadcast media technologies is a challenge. Join TV Technology’s Editor-in-Chief Tom Butts along with Grass Valley’s Sara Kudrle and Dell EMC’s Tom Burns, as they provide a shortcut to the best practices for evolving from media appliance broadcast workflows to IP based software defined workflows leveraging a foundation of enterprise grade IT hardware. Find out the unique combination of IP solutions to smooth the transition to IP, including:
· Evolving workflow and application modernization
· Stepwise approach to move into IP and cloud ready applications
· Underlying technologies needed to future proof workflows
· Skills the Broadcast Engineer of tomorrow will need
Modernize IT by taking a business centric approach to improve current business processes that support organizational objectives. This panel will discuss best practices for building a digital business model, and how IT modernization will impact IT service management
- Matt Hooper
Digital Transformation expert, author, podcaster, blogger, & Twitter addict, Matt Hooper is an engaging international speaker on agile business management, leadership, technology, & customer service. His 20+year career has taken him from help desk analyst to CIO. An active member of the ITSM, DevOps, & Agile communities @Vigilantguy
- Tom Catalini
Tom Catalini is an author, blogger, and speaker who teaches lessons on professional development and leadership based on his real-world experience as an IT Leader in nearly every type of business environment. He has written 2 books on communication skills for IT professionals (available on Amazon) and blogs at www.tomcatalini.com and on www.CIO.com.
- Carlos Casanova
Speaker and co-author of “The CMDB Imperative.” Carlos Casanova is a trusted advisor to Fortune 500 companies, a mentor and coach – someone who strives to do more than simply fix ITSM issues. His decades of experience in a wide range of industries, across large and small organizations enables him to listen and provide sound advice that enable positive business outcomes. Carlos is a blogger at http://carloscasanova.com/blog/ He is also a guest writer for TechTarget and a contributor to Global Podcasts at “All Things ITSM” www.CarlosCasanova.com
- Marcel Shaw
IT blogger at who focuses on IT service management, asset management, and endpoint management. Marcel has worked as a technical consultant for over 25 years, and has also consulted as a legal expert witness for a top Washington DC law firm. Marcel works extensively with United States federal government agencies building IT solutions. Twitter - @marcelshaw www.marcelshaw.com
With the growing number of newly-released, longtime-funded automation tools and platforms, it’s clear that network security operations automation has reached an inflection point. While automation promises to provide significant value to security and network operations teams, along with hopes and promises comes concerns about limitations, potential failures, and critical oversights—especially when it comes to automating incident response. These limitations don’t stem from a lack of APIs, compute power, or the advancement of machine learning or artificial intelligence, but rather from the tools that are doing the detection, notification, and remediation.
Security operations expert Tom Gorup addresses short- and long-term automation challenges and provides analysis on why investments should be focused on arming people with more assistive technology, rather than attempting to remove humans from the equation entirely.
About the Presenter:
As Director of Security Operations for Rook Security, Tom Gorup oversees Managed Security Services and develops proprietary security operations management tools and services for organizations ranging from Fortune 100 firms to fast-growing startups. Prior to joining Rook, Tom served 6 years in the U.S. Army. As an Infantry Squad Leader, Tom served two tours in Iraq and Afghanistan, where he received a Purple Heart alongside several other awards for actions on the battlefield. Tom is GCIA certified, a participant in the GIAC mentor program and advisory board, Indiana Infragard Sector Specialist, and on the NexTech advisory board.
Tune in to hear our Founders Ed James and Tom Skinner discuss the challenges facing the UK Digital Marketing Landscape.Read more >
The HDI Service Improvement Award recognizes an organization that has successfully implemented or improved one or more service offerings. Attend this webinar to learn how the 2016 award winner, CGI Federal, implemented world-class service improvements. Shane Knipschild and Tom Wible will share:
* The state of the organization before CGI Federal launched its service improvement initiative
* The strategy for CGI Federal's service improvement initiative
* The outcome, including lessons learned and the impact on CGI Federal
As a cyber security professional, you already know that users are both an organisation’s greatest asset and its greatest vulnerability. Users can do great damage - and they’re notoriously difficult to catch. Many companies are confronting this challenge with User Behaviour Analytics (UBA), which can help you detect and respond to user threats, such as when:
- An insider turns against your organisation
- A cyber attacker steals a user’s credentials
- An administrator abuses account privileges
If you’re focused on addressing user threats, UBA can be a powerful tool in your kit.
Join Tom Salmon from LogRhythm, as he discusses the elements of an effective user threat detection program. You’ll learn:
- Why detecting user threats is so important—and so difficult
- Different approaches to UBA
- The value of data from across your business
- How to maximise the efficiency of your security analysts
Watch this on-demand webinar to learn how UBA can help you discover hidden user threats, reduce false-positives and prioritise the most concerning threats.
What do you need to know about Cloudbleed, the latest security flaw from Cloudflare, to protect yourself and your company's data? The company was transparent about disclosing the bug in late February, but users should still play it safe and change their passwords across many websites.
Join this interactive session with industry experts and learn the facts, good and bad, on how Cloudbleed may affect you. We'll also cover the broader trends on how user information can be used by cyber criminals, and the security steps users should have in mind before and after a data leak.
Vince in the Bay
Kaushik Narayan, CTO of Skyhigh Networks
Lori MacVittie, Principal Technical Evangelist at F5 Networks
Bojan Simic, CTO of HYPR Corp
Tom Gorup, Director of Security Operations at Rook Security