Hi [[ session.user.profile.firstName ]]
Sort by:
    • Assure the Network. Assure the Patient.
      Assure the Network. Assure the Patient. John Moyer, Cerner - Network Solutions Leader and Ryan Davis, ExtraHop - Product Marketing Upcoming: Mar 22 2018 6:00 pm UTC 60 mins
    • Every hospital room is a datacenter. By the year 2020, Internet-connected medical devices will outnumber people 2:1. There will be 13 devices per staffed bed, not just per room. And, an average of 89 vendors will access a hospitals network every week. These increasing trends will create unique challenges for healthcare institutions, such as:

      -Increased complexity due to siloed departments
      -Lack of visibility into east-west traffic
      -Security around the increasing amount of medical devices

      There’s a better way for hospitals to build a sustainable business model focused on lower costs and better outcomes. Cerner and ExtraHop can help IT health organizations prepare for this shift, by keeping their systems online and providing the quality care patients expect. ExtraHop and Cerner provide the ability to see, in real time and down to the transactional level, exactly what’s happening across your healthcare IT and clinical systems. This visibility isn’t just a nice to have, it is a must-have to keep your IT healthy.

      Read more >
    • How To Identify And Measure Your Strategy Execution Risk
      How To Identify And Measure Your Strategy Execution Risk Jorge Tabacman Recorded: Mar 20 2018 4:00 pm UTC 59 mins
    • What sank the Titanic and is sinking some of our great companies? What will separate future winners from losers?

      50% of the Fortune 500 companies in the year 2000 do not longer exist because they were not able to measure and predict their strategy execution risk and link their decisions to the results of their decisions.

      By the end of the webinar you will be in a better position to identify the risk to your strategy execution and understand why identifying and measuring your strategy execution risk must be an important component of your operational risk.

      The webinar is based on the SIMMETHOD risk and performance methodology and C-suite risk alerts, a top 10 innovation product from the Department of Trade in NSW Australia with top 1% views in LinkedIn’s Slideshare and frequently consulted by over 300 global Universities.

      In spite of Billions of dollars spent on Enterprise Risk Management and analytics, why do companies continue to fail or miss their targets? Can industrial era metrics mislead you into the incorrect decisions?

      According to IBM’s CFO Insights, 53% of CFOs think that they are not effective at measuring and managing performance and according to Deloitte, one of the top CFO concerns is predicting execution missteps.

      According to John Chambers, Cisco’s Chairman, 70% of the S&P 500 will attempt digital transformations during the next years but only 30% will succeed? Why?

      The missing ingredient

      Although the C-suite is aware that digital transformations entail new processes, management procedures, information systems and customer relationships, we continue to use industrial era metrics that were designed for a business environment that does not longer exist. And… in digital transformations, the way you measure will determine your results.

      Additionally, the webinar will assist you to identify C-level metrics linked to the Best In Class and develop a bridge between you and your C-suite via holistic and industry agnostic actionable indicators.

      Read more >
    • Hunting Rogue Elements: Fighting the Insider Threat
      Hunting Rogue Elements: Fighting the Insider Threat Kevin Eley, LogRhythm & Jonathan Zulberg, LogRhythm Upcoming: Mar 22 2018 2:00 pm UTC 45 mins
    • Customer data falling into the hands of cybercriminals. It’s the stuff of nightmares for any organisation. Today the insider threat has the potential to pose a bigger risk to cybersecurity than external hackers.

      In this webinar, LogRhythm experts will take you through a real use case in which data worth millions of pounds was stolen. And they will explain how the incident could have been stopped with the right response and mitigation approach.

      Join the webinar to:

      • Learn how cybercrime has evolved so much that insider threats now rival external threats
      • See a live display of activity generated by an insider threat
      • Discover cybersecurity innovations that can detect and respond to insider threats in real time

      Join us to get a better understanding of the insider threat – and how to combat rogue elements in your organisation.

      Read more >
    • Taking an Enterprise Class Approach to Data Lakes and Modern Analytics
      Taking an Enterprise Class Approach to Data Lakes and Modern Analytics Jay O'Leary, Solution Architect, Cloudera & Murthy Mathiprakasam, Director of Product Marketing, Informatica Processing: Mar 21 2018 5:00 pm UTC 60 mins
    • Are you struggling to turn big data into useful, accurate, consistent, and impactful insights? Organizations are rapidly adopting new technologies like Hadoop, Spark, and Kafka to help lines of business develop new insights. However, with the sheer quantity of data available and complexity of new technologies, the opportunity to drive operational efficiencies and grow sales can feel overwhelming, inflexible, manual, and complex. Informatica's customers have successfully pursued digital transformation strategies through more systematic approaches for getting the right data, in the right place, at the right time to the right people.

      In this webinar, learn how to:

      • Design an architecture for data management with Hadoop and big data that can scale for large organizations
      • Understand best practices for data integration, data quality, data cataloging, and data preparation
      • Exploit automated approaches to data management to get more trusted data assets every time

      Join experts from Cloudera and Informatica to learn about an enterprise approach to data management that enables big data to be turned into useful, accurate, consistent, and impactful business insights.

      Read more >
    • Proactive Data Defence for Digital Transformation
      Proactive Data Defence for Digital Transformation Ian Greenwood, Regional Sales Manager UK&I Upcoming: Mar 23 2018 10:00 am UTC 60 mins
    • Digital transformation is business enhancing and fraught with danger. With services moving online and into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking place in an increasingly precarious environment, more and more your corporate attack surface is being exposed.

      With data breaches at an all-time high and incidents of identity theft risen by 57% in a year, consumers are questioning the security of their personal data held by organisations. The rise of cloud and the Internet of Things, has forced companies to take control of their data – regardless of where it resides and in addition, reputational damage caused by public breach is firmly on the agenda of the board.

      This webinar will consider:

      • Key security considerations for a digital transformation strategy

      • Why a proactive data defence strategy is crucial

      • The benefits of maximising the level of control over data irrespective of where it is created, store or shared.

      Read more >
    • GDPR: Evita el riesgo de incumplimiento con la virtualizacion de datos
      GDPR: Evita el riesgo de incumplimiento con la virtualizacion de datos Anastasio Molano, Senior VP. Denodo Recorded: Mar 20 2018 10:00 am UTC 52 mins
    • En su reciente informe, “Predictions 2018: A year of reckoning” [Previsiones para 2018: el año de la verdad], Forrester prevé que el 80% de las empresas afectadas por el GDPR no cumplirá con este reglamento en mayo de 2018 y, entre las que no lo respeten, se tratará de un incumplimiento intencional en el 50% de los casos.

      El cumplimiento no debería ser tan difícil. ¿Y si cumplir con el GDPR fuera más fácil gracias a una tecnología que te permita reducir los costes de manera significativa? La virtualización de datos es una tecnología avanzada y rentable, con la que se garantiza la privacidad desde el diseño, con el fin de que sea más fácil satisfacer los requisitos del GDPR

      No te pierdas esta sesión y aprende:

      - Cómo la virtualización de datos proporciona los pilares para cumplir con el GDPR mediante auditoría, catálogo y seguridad de datos.

      - Cómo puedes activar en toda la empresa una sola capa de acceso a los datos con medidas de protección.

      - Por qué la virtualización de datos es una funcionalidad imprescindible a la hora de cumplir con el reglamento.

      - Qué fácil es cumplir con el GDPR para los clientes de Denodo.

      Read more >
    • Case Study: Measuring How Out-of-Home Increases Foot Traffic
      Case Study: Measuring How Out-of-Home Increases Foot Traffic Aaron Stewart & Shawn Spooner Recorded: Mar 21 2018 6:00 pm UTC 20 mins
    • For decades, OOH measurement was limited to impressions. But all that is changing. By using mobile data, we’re now able to track the movements of people who pass by an out-of-home unit. Combined with the right data science, measurement goes beyond simple impressions to a true map of your OOH campaign’s impact.

      In this webinar, our Science Product Director Aaron Stewart and Chief Scientist Shawn Spooner will walk you through a real campaign that we tracked. You’ll get a chance to see advanced measurement in action and how it answers these key marketing questions:

      How many people saw the ad, then went to the client location?
      Who are these visitors? Where do they go and what do they do?
      How do I target people who saw my ad with online ads?
      How can we build a stronger audience profile?

      We are on the cusp of a whole new world that integrates out-of-home seamlessly into our technological society. And observational results are only the beginning. Join us to see how data science and technology are changing the out-of-home world.

      Read more >
    • Using threat intelligence to stay one step ahead of the criminals
      Using threat intelligence to stay one step ahead of the criminals Melanie Johnstone, Head of Intelligence, BT Upcoming: Mar 22 2018 2:00 pm UTC 30 mins
    • Most organisations are too passive in their approach to security. The response to most breaches is passive defence. Battles can be won this way, but not the War.

      To stay ahead of the game, businesses need an effective digital/threat intelligence strategy. An approach that enables proactive threat hunting, pre-emptive control mitigation based on intelligence and process, visibility over an entire estate and the tools, people, and process to solve problems when they are discovered.

      We talk to customers often who pay for threat intelligence feeds only to realise that knowing a problem exists doesn’t mean the problem will be solved. Having the right teams and people in place are a lot harder than it sounds.

      Building a digital threat intelligence capability is about much more than collating technical information on the systems used to launch attacks.
      • You need to gather evidence-based information on potential attackers, the tools they use, their motivation and the vulnerabilities they exploit, and how understand how this interacts with your business.
      • Intelligence means improving your understanding and visibility of the risk context your business is in; getting to know your threat landscape better. Creating the perfect blend of people, process and technology for your business.
      • By sharing data, you can improve your own security and cut intelligence-gathering costs. All of this should be seen not only in the context of present but also future threat.
      •Sharing intelligence product throughout your business, in a way that everyone can understand.

      Basically, you need to be one step ahead of the criminals.

      Read more >
    • SAP Live Access – Practice with your own SAP Training System
      SAP Live Access – Practice with your own SAP Training System Caroline Kinsman, senior education architect at SAP Recorded: Mar 21 2018 11:00 am UTC 33 mins
    • Join us live on Wednesday, March 21 at 11:00 am for a 30-minute FREE webinar & demo to discover what SAP Live Access is all about. SAP Live Access lets you practice your skills and build experience in a live, fully supported private SAP environment. SAP Live Access systems are preconfigured with the data you’ll need to carry out the exercises in SAP Learning Hub classes and you're free to experiment on your own. SAP Education and the UK & Ireland SAP User Group have collaborated to offer SAP customers a significant discount on SAP Learning Hub & SAP Live Access subscriptions. For more info, watch the video: https://www.youtube.com/watch?v=XkkxD_eClqA

      Caroline Kinsman is an experienced senior education architect who has worked within the field of SAP Education Solutions for over seventeen years. Responsible for designing and delivering successful education programmes for ERP system implementations at both national and multinational organisations. A qualified Chartered Accountant and fluent in three languages Caroline is able to bring her considerable wealth of business experience to a range of stakeholders and sponsors at many levels within an organisation. With twenty years of experience in project team training and consulting, she is able to engage on multiple levels from the strategic to the practical within a project environment. Caroline's experience covers a multitude of sectors including pharmaceutical, public sector, financial services, utilities, oil and gas, consumer goods and automotive. Specialties: A holistic education approach from cradle to grave; detailed knowledge of Project Team Training and SAP Learning Hub.

      Read more >
    • No Safe Harbors: Charting a Smarter Course
      No Safe Harbors: Charting a Smarter Course Mark DuPont, Alan Rudd, Sage Wagner Recorded: Mar 21 2018 6:00 pm UTC 62 mins
    • Is the status quo really an option? What do maritime stakeholders (shipping companies, terminal operators, cruise lines, port authorities) need to do to prevent, prepare for and respond to the next attack on the horizon?

      To coin an old adage that has been used in many sports discussions and is also known as a principal of war, "The best defense is a good offense." This webinar will demonstrate tools and resources that maritime stakeholders can utilize to be Proactive and control their cyber risk.

      This webinar, focused on maritime operations, will provide unique insights of the recent cyber events and emerging threats. We will also:
      • Discuss nationally-recognized solutions and management approaches that can lead your organization to a proactive and predictive posture with a Cyber Risk Management strategy,
      • Include experts from a “bench” of cybersecurity experts that are recognized internationally for their knowledge and skills,
      • Demonstrate our Cyber Risk Management platform that can give you the “Situational Analysis and Awareness” that you need in today’s rapidly expanding and complex environment, and
      • Learn how we can provide you the same resources that the Department of Defense, NASA, and other federal agencies use and trust, with RiskSense.

      Attending this webinar will provide you and your staff valuable insights and offer a course of action that can be a game changer for all maritime organizations

      Read more >
    • Effective Onboarding drives better Performance Management
      Effective Onboarding drives better Performance Management Sri Chellappa, President-Engagely, Joseph Hammett - Partnerships-HRCloud Upcoming: Mar 22 2018 5:00 pm UTC 30 mins
    • When we profess performance matters, are we communicating that every step of the way starting with step 1-Onboarding?

      Organizations tend to focus on Performance Management for employees once the employee is onboarded and warmed up to the workplace. However, performance management starts on day 1. During the onboarding process not only an employee is introduced to the people and processes, they are really introduced to the performance culture you have. An effective onboarding process will provide a conduit to set the right expectation, orientation and tools to start the relationship on the right foot.

      In this webinar we will discuss how tools like HRCloud and Engagedly can work seamlessly to provide a delightful and effective onboarding experience and actively engage the employee on day 1. We will learn some best practices on driving the culture of performance driven in every step, from being a new hire to an employee.

      Read more >
    • Top 7 Docker Vulnerabilities & Threats
      Top 7 Docker Vulnerabilities & Threats Knox Anderson, Product Marketing Manager, Sysdig Recorded: Mar 21 2018 5:00 pm UTC 35 mins
    • Docker comes bundled with some neat security safeguards by default: isolation, a smaller attack surface, and task specific workloads.

      There are, however, some specific parts of Docker based architectures which are more prone to attacks. In this webinar we are going to cover 7 fundamental Docker security vulnerabilities and threats.

      Each section will be divided into:
      -Threat description: Attack vector and why it affects containers in particular.
      -Docker security best practices: What can you do to prevent this kind of security threats.
      -Proof of Concept Example(s): A simple but easily reproducible exercise to get some firsthand practice.

      Read more >
    • State of the Market: IT Spending Review and Outlook
      State of the Market: IT Spending Review and Outlook Stephen Minton, VP, IDC Customer Insights & Analysis Recorded: Mar 21 2018 2:00 pm UTC 56 mins
    • In this IDC web conference, Stephen Minton will review the latest ICT spending data and leading economic indicators for ICT budget trends and new 3rd Platform technologies, alongside updated market sizing and forecasts from the IDC Worldwide Black Book, answering questions such as:

      • How has the technology market performed so far in 2018, and how have forecasts for 2019-2022 changed as a result?
      • What impact will economic trends have on IT spending over the next 5 years, and what are the main downside risks to the outlook?
      • Which new technologies are experiencing the fastest growth in emerging markets, and which geographies are set to emerge as global leaders beyond 2020?
      • How quickly are tech budgets moving from traditional IT deployments to the 3rd Platform of cloud, mobile and new technologies such as IoT and robotics?
      • What does the expansion of the ICT industry and the emergence of new categories mean for traditional tech vendors and buyers?

      Read more >