Hi [[ session.user.profile.firstName ]]
Sort by:
    • Developing Practical Single-Use Processes for New Vaccine Formulations
      Developing Practical Single-Use Processes for New Vaccine Formulations Kirsten Strahlendorf Recorded: May 16 2017 2:00 pm UTC 76 mins
    • New vaccine process designs – and all the kinks that go with them – are typically hammered out in a small scale capacity, for example, prior to manufacturing for early phase human clinical trials. They are then upsized and further defined for industrial scale to supply the vast market. Single-use technologies (SUTs) have been a hot topic for several years now and their advantages well-known: easy product changeover, processing in lower classification areas, reduced CAPEX, elimination of glass, sterility assurance, to name a few. In vaccine manufacturing, SUTs are used throughout the processing stages, from cell culture all the way to filling. SUTs are quickly and conveniently designed, purchased and implemented for short-term manufacturing of clinical trial phase materials. Here a large percentage of new vaccines in Research and Development do not even make it to market.

      As the final production stages are critical as they are the last stages before patient injection, the scope of thisarticle covers SU applications involving drug substance formulations, adjuvant processing, final bulk formulation and filling. The actual process itself may include some or all of the following: filtration, pumping, ingredient addition, mixing, adsorption, filling, labelling, sampling and and storage.

      In this presentation only liquid formulations (“presentations”) will be discussed.

      Read more >
    • How TIAA Uses Threat Intelligence to Enhance Security
      How TIAA Uses Threat Intelligence to Enhance Security Michael Kirk and Joseph Walbert, Senior Information Security Analysts, TIAA Recorded: Aug 9 2016 6:00 pm UTC 42 mins
    • TIAA is the leading provider of financial services in the academic, research, medical, cultural, and government fields, with $854 billion in assets under management.

      In this webinar Joe Walbert and Mike Kirk, both senior information security analysts at TIAA, will explain how the company applies real-time threat intelligence to:

      • Monitor for sensitive information disclosures, such as credentials or sensitive personal information, to ensure quick action can be taken to lower risk.
      • Improve prioritization of vulnerability management with external intelligence on emerging vulnerabilities and exploits.
      • Enhance SOC effectiveness by integrating its SIEM with threat intelligence analyzed from the entire web.
      • Deliver targeted daily threat briefs to its internal stakeholders on relevant trending news on threats to increase user awareness.

      -----

      Michael Kirk and Joseph Walbert are senior information security analysts on TIAA's Cyber Security Applied Intelligence team specializing in security automation, vulnerability and threat intelligence, and incident response.

      Prior to joining TIAA, Mike worked as a digital forensics and intrusion analyst for defense contractors supporting both public and private sector clients — while Joe was an information operations (IO) professional in the United States Marine Corps focusing on IO systems research and development.

      Read more >
    • How to Use OTX with OSSIM
      How to Use OTX with OSSIM Jake Mosher, Sr. Product Marketing Manager Recorded: Jan 26 2017 9:20 pm UTC 55 mins
    • The AlienVault® Open Threat Exchange™ is an open platform for security research that provides a mechanism for updating your OSSIM instance with the latest threat intelligence from AlienVault Labs or other security researchers. By connecting your OSSIM instance to OTX, you will continuously receive updates from the researchers you trust to help detect relevant Indicators of Compromise (IoC's) in your environment. Or, you can use OTX for your own security research and to share your results with the community.

      Join us for this OSSIM training session covering how to:

      Set up an OTX account and link it to your OSSIM instance
      View OTX Pulses to get context on threats
      See how the OSSIM platform alerts you of IoCs from OTX in your environment

      Jake is a Sr. Product Marketing Manager at AlienVault, responsible for go-to-market strategy, product messaging and positioning, and sales enablement. Prior to AlienVault, Jake held various Product Marketing and Strategy roles at Symantec Corporation. Jake has an MBA from the University of Texas at Austin and a BA in Business Economics from UCLA.

      Read more >
    • Top European Uses Cases: Transformation with Big Data
      Top European Uses Cases: Transformation with Big Data Louise Matthews, Senior Manager, Customer and Solutions Marketing, Hortonworks Recorded: Jun 30 2016 9:00 am UTC 48 mins
    • Every industry, every organisation, every department is going through a huge change, whether realised or not, as the opportunity to harness data to impact their business is ripe. Many European businesses are successfully leveraging new platform technologies to transform their organization using data. Whether they are renovating their existing infrastructure for substantial cost savings or innovating their architecture to find new business opportunities the impact is undeniable. In this webinar we will review the industry trends as well as highlight transformative business use cases drawn from a wide range of market sectors across Europe to bring the future of data to life.

      Louise Matthews is the senior manager of customer and solutions marketing for Hortonworks’s international business (EMEA and APJ). With nearly 20 years’ experience in the enterprise IT sector, Louise works closely with IT decision makers to understand what better business outcomes look like for their organizations—both horizontally and vertically—in order to drive visibility and awareness of the pioneers in big data. Previously, Louise led channel and field marketing at VCE. Prior to that, Louse held a number of roles at Citrix Systems, latterly heading up its solutions marketing in EMEA. You can follow Louise on Twitter at @LouiseMatthews.

      Read more >
    • Interview: Getting ready for the extreme innovations in the cloud
      Interview: Getting ready for the extreme innovations in the cloud John Abel, Head of Technology and Cloud for UK, Ireland, Israel, Oracle & Andrew Bird, EA Visionary, Interview Moderator Recorded: Apr 25 2017 9:00 am UTC 17 mins
    • Interview in partnership with BrightTALK, The Stack and Cloud Industry Forum
      ----------
      In this interview John Abel, the Head of Technology and Cloud for UK, Ireland and Israel at Oracle, is discussing the latest innovations in the cloud and how these impact the modern business environment.

      Among topics discussed:

      - Cloud in 2020
      - Extreme innovations in the cloud
      - Challenges with cloud adoption today
      - Legacy organisations and digital transformation in the cloud
      - "What does lobsters have to do with innovation"
      - Top 3 pieces of advice for aspiring technology leaders

      About the Speaker:
      John Abel has worked with Oracle for over 20 years and during this time he has worked in Support, Applications, Technology and Consulting.

      More recently John has been in Oracle Systems for four years. John's main focus now is Engineered Systems and Oracle Database Cloud (Database as a Service) across Europe, Middle East and Africa and he often uses his prior experience to explain all aspects of technology to customers. In his presentations, John relates to actual customer experience and provides real world answers to real world problems. John is also a successful Oracle Press Author and using his experience of over 300+ customer engagements has produced publications explaining the Oracle Technology and Applications.

      Read more >
    • Security Automation Strategies for Cloud Services
      Security Automation Strategies for Cloud Services Peleus Uhley of Adobe Upcoming: Jun 15 2017 4:00 pm UTC 60 mins
    • Security automation strategies are a necessity for any cloud-scale enterprise. There are challenges to be met at each phase of developing and deploying security automation including identifying the appropriate automation goals, creating an accurate view of the organization, tool selection, and managing the returned data at scale. This presentation will provide the details of various of open-source materials and methods that can be used to address each of those challenges.

      About the speaker:
      Peleus Uhley has been a part of the security industry for more than 15 years. As the Lead Security Strategist at Adobe, he assists the company with proactive and reactive security. Prior to joining Adobe, Peleus was a senior developer at Anonymizer, and a security consultant for @stake and Symantec.

      Read more >
    • Video Interview: Rethinking BI in the era of AI and Machine Learning
      Video Interview: Rethinking BI in the era of AI and Machine Learning Naveen Miglani, CEO and co-founder of SplashBI & Ina Yulo, Senior Content Strategist, BrightTALK Recorded: Apr 27 2017 2:00 pm UTC 15 mins
    • Interview in partnership with BrightTALK, The Stack and Cloud Industry Forum
      ----------
      BrightTALK discussed with Naveen Miglani, CEO and co-founder of SplashBI, the relationship between BI and digital transformation.

      Among topics covered:

      1. What is the future of BI?
      2. What are the implications of AI and machine learning on BI?
      3. What's the impact of digital transformation in the BI sector and vice versa?
      4. What can organisations do today to best prepare for all the changes?
      5. What are the key challenges for businesses in adopting and implementing a BI solution?
      6. What's the role of IT now in a self-service BI environment?
      7. Where are we seeing the most ROI when purchasing a BI reporting tool?

      About the speaker:
      Naveen Miglani is the CEO and Founder of Splash Business Intelligence and EiS Technologies. Naveen has more than 25 years of industry experience, including corporate strategy, service offerings, and business intelligence. Prior to joining EiS Technologies, Naveen held leadership roles at GE Energy and Oracle Corporation, as well as worked across many departments, including IT, Management, Business Development, Marketing, and Finance. Naveen holds a BS in Engineering and an MBA with a major in Information Systems and International Business from Mercer University.

      Read more >
    • WannaCry Ransomware: Why Kill Switches Will Not Protect You
      WannaCry Ransomware: Why Kill Switches Will Not Protect You Mounir Hahad, Sr. Director of Cyphort Labs Recorded: May 22 2017 5:00 pm UTC 35 mins
    • The world is experiencing a ransomware attack like no other. While the wave of infections was spreading from East to West, a kill switch was identified that slowed the campaign considerably. Then another kill switch was needed, then another. Against popular belief, these kill switches are only effective against the original strain of the malware. In this presentation, we will review a variant without a registerable web site kill switch and how to protect against it.

      Join this webinar and ask your most pressing WannaCry questions.

      About the Presenter:
      Mounir Hahad, Ph.D. is Sr Director at Cyphort, a Security Analytics company headquartered in Santa Clara, CA. Mounir is the head of Cyphort Labs, the group responsible for conducting threat research within Cyphort and driving detection enhancements for Cyphort’s Advanced Detection Fabric which uses behavioral analysis along with machine learning to detect advanced threats and correlate those incidents with ingested information from third party solutions. Mounir holds a Ph.D. in computer science from the University of Rennes. Prior to Cyphort, Mounir held various engineering management positions with Cisco’s Security Technology Group and with IronPort Systems.

      Read more >
    • Shut the Traps: Take the Win out of Recon for an Attacker
      Shut the Traps: Take the Win out of Recon for an Attacker Alissa Torres, Senior Security Consultant at Sibertor Forensics Recorded: Sep 7 2016 10:00 pm UTC 44 mins
    • By the time sophisticated cyber criminals gain access to your network, they may already possess incredible insight into the culture, infrastructure, security and day-to-day operations of your company. How are they able to obtain such information? Reconnaissance is the FIRST stage in remote exploitation performed in a targeted attack and can take place over a period of days, weeks or even years prior to the attacker ever delivering his first phishing email. Just what sensitive information has your company, your employees, your vendors or your customers made publicly available, either knowingly or inadvertently? Though a tweet or social media post may be harmless on its own, in aggregate, a company may suffer a weakened security posture if details such as key individuals, sensitive projects, financial projections and internal politics are disclosed in a public forum.This talk will focus on ways you can access and reduce your online disclosures. Take the "win" out of reconnaissance for the attacker by cutting off his pre-attack intelligence sources.

      Read more >
    • How Top Companies Use Customer Experience To Drive More Leads
      How Top Companies Use Customer Experience To Drive More Leads Bonnie Crater, President and CEO, Full Circle CRM; Christine Crandell, President, New Business Strategies Recorded: Mar 7 2013 4:00 pm UTC 45 mins
    • Customer Experience (CX) is the new competitive differentiator. Marketers at Apple, Chrysler, Phillips, RBS and Lithium have tossed out traditional market segmentation and lead generation campaigns and drive bigger pipeline by delivering compelling experiences.
      This webinar brings together two CX experts for a lively discussion on how to marketers can design, deliver and measure compelling experiences that convert into revenue. You’ll learn how to uncover the experience your prospects value most, how to use that to differentiate your brand, and how to build marketing campaigns that get buyers to engage in your experience. It’s not enough to just deliver compelling experiences; you also need to measure if they are driving more preference for your brand and higher quality leads.

      Topics Covered:
      •The state of the Customer Experience movement
      •How to uncover the experience that will differentiate your brand
      •How to build marketing campaigns that deliver customer experience
      •How to use CRM and Marketing Automation systems to correctly measure customer preference


      Bonnie is President and CEO of Full Circle CRM, a leading provider of Marketing Performance Management software. Prior to joining Full Circle CRM, Bonnie was vice president of marketing for VoiceObjects and Realization and held vice president and senior vice president roles at Genesys, Netscape, Network Computer Inc., Salesforce.com, and Stratify. In 2000, Bonnie was named one of the “Top 20 Female Executives in Silicon Valley” by San Jose Magazine.

      As President of New Business Strategies, Christine Crandell leads client services teams serving customers including Good Technology, Oracle, DotNetNuke, and McKesson. She is as one of the top twenty women in Sales and Marketing by the SLMA, one of the top 15 influential leaders in sales and lead management, one of the top 15 leaders in social selling, and one of Silicon Valley’s Most Influential Women by the Silicon Valley/San Jose Business Journal.

      Read more >
    • Before You Outsource, Protect Your IP & Mitigate Open Source Risks
      Before You Outsource, Protect Your IP & Mitigate Open Source Risks Jim Markwith, Managing Partner at Symons Markwith LLP Recorded: Apr 18 2017 3:30 pm UTC 60 mins
    • Today’s rapidly changing technologies, including the proliferation of open source and the accelerating shift to the cloud, are increasing the use of outside experts for both application development and IT solutions. At the same time, IP security is top of mind worldwide. This presentation will look at ways organizations can outsource to meet their development needs and also address open source security and management risks before giving contractors access to their valuable technologies.


      Jim's bio:

      Jim Markwith is an experienced technology and corporate transactions attorney with over 20 years of experience. His clients range from start-ups to fortune 50 technology leaders, including computer software, on-line retail, and Healthcare IT product and service developers. Prior to private practice, Jim held Executive and Senior in-house legal positions with Microsoft, Adobe Systems, and Allscripts Healthcare. Jim received his J.D. degree from Santa Clara University School of Law, and is a member of the California, Washington, DC, and Washington State Bar Associations.

      For more information on Jim, please click http://symonsmarkwith.com/jim-markwith. For questions about this presentation, or for more information on available legal support, please contact Jim at jim@symonsmarkwith.com.

      Read more >
    • Hacker Secrets Revealed: 5 Security Mistakes to Avoid
      Hacker Secrets Revealed: 5 Security Mistakes to Avoid Paul Brandau & Mike Warren, Delta Risk Recorded: Apr 27 2017 5:00 pm UTC 44 mins
    • External penetration testing, also known as ethical hacking, is an independent engagement that can help pinpoint common attack vectors and patterns hackers look for in your network. Delta Risk research has identified the attack vectors bad actors most commonly use to get initial access to a network and spread across the rest of the organization. In this 45-minute webinar, our pen testers offer recommendations on how to combat various scenarios and outline the key mistakes defenders must avoid when protecting their security operations.

      WHAT YOU’LL LEARN:
      • Lessons learned from our 2016 external assessments
      • Common weaknesses our testers exploited such as kerberoasting and password reuse
      • Methods our testers use to quickly locate high value assets
      • Vendor-neutral solutions for protecting sensitive information
      • Why third-party penetration testing is in demand

      About the Presenters:
      Paul Brandau is the Managing Consultant with Delta Risk LLC. He has more than 10 years of experience in the cyber security domain providing a unique perspective on cyber exercises, operational (red team) assessments, and training in offensive network operations. He has helped design and lead a Red Team for the United States Department of Homeland Security. Prior to Delta Risk, his duties included reverse engineering malware and threat profile creation.

      Mike Warren is VP of Cyber Resiliency Services for Delta Risk LLC. He has more than 14 years of experience in the cyber security domain providing a threat perspective, operational (red team) assessments, enterprise vulnerability assessments (blue team), and training in defensive and offensive network operations. Prior to Delta Risk, he was an active duty Air Force Communications and Information Engineer Officer.

      Read more >