Protiviti's Managing Director Steve Hobbs discusses the current state of the IPO process with NASDAQ Economist Frank Hatheway prior to his Protiviti presentation on October 29th, 2013.Read more >
A Fireside Chat with IIA's new CAO, Bill Franks and IIA Co-Founder and Advisor Tom Davenport. Learn 5 keys to success for newly minted and experienced analytics leaders alike.Read more >
Focus today is shifting from simply capturing big data and discovering new insights with it to operationalizing those insights. The industrial revolution took manufacturing processes from an artisanal practice to a modern technological marvel that is able to manufacture quality items at massive scale. The same type of revolution must happen with analytics and big data. Based on the popular book "The Analytics Revolution", this webinar will address technological, organizational, and cultural points that must be considered to succeed in making big data actionable and operational.Read more >
Join our webinar led by Frank Cirillo, Sr. Consultant Advanced Analytics, Dun & Bradstreet and Jack Scarpelli, VP North America Credit Risk Officer, Xerox Corporation. In this session, Frank and Jack will be discussing the growing trends toward globally consistent risk management, the barriers many face and steps that can be taken to overcome those barriers. As companies shift from decentralized, judgmental, manual processed to centralized, statistically-based, automated process, they will discuss the positive impact to KPIs and how to make it less overwhelming to execute on a global strategy.Read more >
David Frank from Kepner-Tregoe talks about Proactive Problem Management, Termites, and Solving the World's Problems in Eight MinutesRead more >
In this IDC FutureScape Web conference, Chief Analyst Frank Gens predicts ten key developments in the tech world that will impact every enterprise's ability to grow and compete over the next 18-36 months and beyond. The predictions track the IT biggest story of our time: the Digital Transformation (DX) of modern enterprises and the application of IT to multiply innovation in the DX economy.
About IDC FutureScape
IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three-year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.
Artificial Intelligence is the rocket fuel to all Process Automation projects, whether the task is low-level RPA or high-level complex processes. In this session, you will hear a holistic but pragmatic approach to implementing artificial intelligence as part of a company’s digital transformation journey.
Join this webinar to hear Frank Beyer and Bizagi as they discuss:
- How to structure your approach to RPA and to higher-level process automation
- Identifying processes that require a higher level of cognitive skills
- How to digitize cognitive work such as analysis, synthesis and evaluation
Who should attend: Digital Technology Leaders, Application Development Leaders, IT and Business Process Professionals.
Your company is constantly under the threat of a potential cyber attack that can wreak havoc and impact your business. Cyber criminals are finding new ways to compromise systems and the hacking community continues to fine-tune their methods of attack. The maturation of hacking groups around the globe poses a cyber security threat that never stops.
Join Paul Fletcher, Cyber Security Evangelist at Alert Logic, and Frank Shultz, Managing Director at BC in the Cloud, as they present, “Preparing for Cyber Attacks… Expect the Unexpected.” Hear about emerging threats and the current state of web application vulnerabilities. Learn about the most impactful web app attacks as well as remediation strategies. And take away best practices on how to ensure secure continuity in the cloud.
In this webinar, these experts will reveal:
• The true impact of a cyber attack on a company from the bottom line to the board room
• The importance of having a business continuity/disaster recovery plan in place
• How business continuity planning tools and security software go hand in hand
• The significance of exercising and testing a plan prior to an attack
Interview in partnership with BrightTALK, The Stack and Cloud Industry Forum
In this conversation, Alex and Frank are revealing the results of the annual research performed by Cloud Industry Forum in regards to the current state of digital transformation in the UK.
The discussion covers the importance of cloud for digital transformation, as well as other "a ha" moments to expect in 2017.
Fraunhofer Institute, a leading German research organization, identified 30% of virtual machines sampled on a leading public cloud were vulnerable to attack due to incorrect configurations by the user. The article further states: "The problem clearly lies in the customers’ unawareness and not in Amazon Web Services." With the long list of existing cloud services and the rapid innovation of new cloud services, how can you make sure to engineer security and reliability into your cloud solutions from the get go?
This session will drill deep on the following topics:
- The key public cloud architecture principles that apply to all workloads
- Architecting for business continuity and how to adjust availability and cost with business seasons
- How to protect your data in the cloud, providing data loss prevention and disaster recovery
- Demo of an enterprise class business solution in the public cloud
Frank Stienhans is an early cloud adopter and CTO of Ocean9. He is fluent on both Azure and AWS and concepts and examples will cover both clouds.
Hear why T-Systems GmbH decided to upgrade to HPE Service Manager 9.50. Frank Eck, Head of Fault 2 Restoration, shares his approach, learnings and success of upgrading a huge ITSM environment with minimum production downtime.Read more >
Digital transformation is the change associated with the application of digital technology in all aspects of human society. For businesses, it is about creating a competitive edge by digitizing operations for greater efficiency, intelligence and agility.
One main challenge of digitization is modelling human behavior and cognitive processes into logical expressions that can be digitized and automated. How do we translate complex human behavior and thinking into digital processes?
Frank Beyer, a business process management expert will share how approvals of various kind and pricing calculations can be automated thereby drawing on his experience with a pilot project at former employer Kyocera , a Japanese multinational electronics and ceramics manufacturer, automates its pricing calculation and approvals.
Register and hear Frank Beyer and Bizagi discuss:
•How to model human activities into digital processes
•How to break the cognitive barrier to embark on RPA
•The impact and hidden benefits of digitizing human activities
Who should attend: Digital Technology Leaders, Application Development Leaders, IT and Business Process Professionals
Interview in partnership with BrightTALK, The Stack and Cloud Industry Forum
Scott Cairns, CTO of T-Systems, discusses with Frank Bennett, what are the challenges and opportunities in the telecommunication industry.
Some topics discussed:
- How do AI and machine learning disrupt the industry
- What is the future of IoT
- Security in IoT
- Next industries to be disrupted
- How home will look like in 5-10 years
- How car industry will change in 5-10 years
- The most promising applications of VR and AR in the future
You feel trapped by your legacy IT and communications systems. You know you’re not using your company’s data properly, none of your systems work together or talk to each other. But you’re not sure what to do next. What’s holding you back? Is cloud the answer? Do you have the right skills in place to really understand what the cloud can offer you and your business? Is your job on the line if you don’t embrace the cloud? Is your job on the line if you do?
Join CIF and our exec panel to debate the issues and learn from practical experience shared of gaining control using cloud collaboration right across the business, from operations, marketing, support, sales and HR.
Frank Bennett Deputy Chair CIF / Moderator
Simon Dear CEO Tangent International
Gary Pryor Partner & Acquisitions Director, 8x8
Dr Lucy Green CEO Larato
Government Agencies, Enterprises and Service Providers all experience continuous cybersecurity attacks that often begin with Distributed Denial of Service (DDoS) attacks. DDoS attacks are a world-wide phenomenon impacting all industries, are more complex than ever before, and are increasing in size and frequency. It has never been easier to launch a DDoS attack because DDoS attack tools and DDoS for Hire Services are accelerating the weaponization of DDoS.
On this webinar our experts will address several key DDoS issues. You will learn about:
· The latest DDoS attack trends and recent examples of destructive attacks
· The real impact of a DDoS attack to an organization and common misconceptions
· Best practices for DDoS attack mitigation
· Advanced attack protection solutions for Cloud and On-premise, from Arbor Networks, the Security Division of NETSCOUT
Presented by: Frank Onyango, Consulting Engineer, Arbor Networks, The Security Division of NETSCOUT, and Karl Schaub, Chief Solution Architect, NETSCOUT
Web application security is becoming increasingly complex due to the continuously evolving threat landscape, the diverse nature of web applications, and the broad range of systems needed to manage security.
Qualys simplifies web app security with an end-to-end solution.
During this webcast, presenters Vikas Phonsa and Frank Catucci will show you how you can:
* Scan your apps using Qualys Web Application Scanning (WAS)
* Deploy one-click virtual patches for detected vulnerabilities in Qualys Web Application Firewall (WAF)
* Manage it all from a centralized, cloud-based portal
This webcast will include a live Q&A session.
IT performance management isn’t about monitoring CPU, memory or disk space any more. One of the toughest application performance challenges for any IT administrator is when a user says "my application is slow". You have to be able to quickly determine what the real cause of the problem is - is it in the network, the database, the application, storage? The fact that applications are using multi-tier architectures and being deployed in cloud and virtualized infrastructures only adds to the challenge.
Join us for this webinar where Frank Ohlhorst, Enterprise IT Analyst & Consultant and Srinivas Ramanathan, CEO of eG Innovations, will discuss the best practices for troubleshooting and prevention so even before a user complains their application is slow, you can pinpoint exactly where the cause of a problem lies – ensuring quick resolution and a positive user experience.
With the rise of cloud adoptions and ease of access to business and learning applications, higher education institutions are finding it increasingly difficult to maintain data integrity, authentication, and security for its students and faculty.
Join Symantec’s Frank Torrence, to discuss industry best practices for higher education to leverage Cloud Access Security Broker (CASB) and Data Loss Prevention(DLP) capabilities to provide auditing, reporting, and security for applications data wherever it resides.
In this webcast you will learn how to:
- Ensure secure cloud application and data access for students, teachers and faculty
- Secure your network from the cloud to the ”ground”
- Maintaining data integrity and security without sacrificing access
- Provide an environment that allows freedom and ease of use for all connected users.
A critical vulnerability has been found in Apache Struts 2, and it is being actively attacked in the wild, as hackers jump at the chance to hit high-profile targets by exploiting this critical bug.
Apache has issued an emergency security alert, classifying this as a high-risk vulnerability. If left unaddressed, organizations are at risk of remote code execution attacks, which could lead to complete system compromise.
During this webcast, Qualys Product Management Directors Vikas Phonsa (Web Application Firewall) and Frank Catucci (Web Application Scanning) will show you how Qualys' complete, end-to-end security solutions can detect and patch the vulnerability so that you can keep your business-critical information safe from attackers.
With Qualys Vulnerability Management, Web Application Scanning, and Web Application Firewall, you can find Struts in your environment quickly, comprehensively, and at scale, as well as shield your organization from Struts attacks while you identify and patch vulnerable systems.
This webcast will include a live demo and Q&A session.
Creating and managing great content is your job. Effective delivery of that content to your customers and prospects—on their terms—is a business imperative. As technical product content is increasingly recognized as an important asset for improved marketing and customer experience, we need to think in those terms, applying new best practices to enable better findability and discoverability of content. Integrating the long-tail value of product documentation with the short-term outlook of marketing campaigns is our challenge as a practice, thereby enabling greater business value around our content.
Join Scott Abel, The Content Wrangler, the host for this free one-hour webinar. Scott will be joined by intelligent content guru, Joe Gelb, President of Zoomin Software, Frank Miller, President and CEO of Ryffine, and Megan Gilhooly, Sr. Manager Content Management for Amazon Seller Support. This round-table discussion will provide an overview of how to move beyond publishing and Web Content Management to dynamic content delivery and a cross-touchpoint digital experience.