Hi [[ session.user.profile.firstName ]]
Sort by:
    • How TIAA Uses Threat Intelligence to Enhance Security
      How TIAA Uses Threat Intelligence to Enhance Security Michael Kirk and Joseph Walbert, Senior Information Security Analysts, TIAA Recorded: Aug 9 2016 6:00 pm UTC 42 mins
    • TIAA is the leading provider of financial services in the academic, research, medical, cultural, and government fields, with $854 billion in assets under management.

      In this webinar Joe Walbert and Mike Kirk, both senior information security analysts at TIAA, will explain how the company applies real-time threat intelligence to:

      • Monitor for sensitive information disclosures, such as credentials or sensitive personal information, to ensure quick action can be taken to lower risk.
      • Improve prioritization of vulnerability management with external intelligence on emerging vulnerabilities and exploits.
      • Enhance SOC effectiveness by integrating its SIEM with threat intelligence analyzed from the entire web.
      • Deliver targeted daily threat briefs to its internal stakeholders on relevant trending news on threats to increase user awareness.

      -----

      Michael Kirk and Joseph Walbert are senior information security analysts on TIAA's Cyber Security Applied Intelligence team specializing in security automation, vulnerability and threat intelligence, and incident response.

      Prior to joining TIAA, Mike worked as a digital forensics and intrusion analyst for defense contractors supporting both public and private sector clients — while Joe was an information operations (IO) professional in the United States Marine Corps focusing on IO systems research and development.

      Read more >
    • Top European Uses Cases: Transformation with Big Data
      Top European Uses Cases: Transformation with Big Data Louise Matthews, Senior Manager, Customer and Solutions Marketing, Hortonworks Recorded: Jun 30 2016 9:00 am UTC 48 mins
    • Every industry, every organisation, every department is going through a huge change, whether realised or not, as the opportunity to harness data to impact their business is ripe. Many European businesses are successfully leveraging new platform technologies to transform their organization using data. Whether they are renovating their existing infrastructure for substantial cost savings or innovating their architecture to find new business opportunities the impact is undeniable. In this webinar we will review the industry trends as well as highlight transformative business use cases drawn from a wide range of market sectors across Europe to bring the future of data to life.

      Louise Matthews is the senior manager of customer and solutions marketing for Hortonworks’s international business (EMEA and APJ). With nearly 20 years’ experience in the enterprise IT sector, Louise works closely with IT decision makers to understand what better business outcomes look like for their organizations—both horizontally and vertically—in order to drive visibility and awareness of the pioneers in big data. Previously, Louise led channel and field marketing at VCE. Prior to that, Louse held a number of roles at Citrix Systems, latterly heading up its solutions marketing in EMEA. You can follow Louise on Twitter at @LouiseMatthews.

      Read more >
    • Shut the Traps: Take the Win out of Recon for an Attacker
      Shut the Traps: Take the Win out of Recon for an Attacker Alissa Torres, Senior Security Consultant at Sibertor Forensics Recorded: Sep 7 2016 10:00 pm UTC 44 mins
    • By the time sophisticated cyber criminals gain access to your network, they may already possess incredible insight into the culture, infrastructure, security and day-to-day operations of your company. How are they able to obtain such information? Reconnaissance is the FIRST stage in remote exploitation performed in a targeted attack and can take place over a period of days, weeks or even years prior to the attacker ever delivering his first phishing email. Just what sensitive information has your company, your employees, your vendors or your customers made publicly available, either knowingly or inadvertently? Though a tweet or social media post may be harmless on its own, in aggregate, a company may suffer a weakened security posture if details such as key individuals, sensitive projects, financial projections and internal politics are disclosed in a public forum.This talk will focus on ways you can access and reduce your online disclosures. Take the "win" out of reconnaissance for the attacker by cutting off his pre-attack intelligence sources.

      Read more >
    • How Top Companies Use Customer Experience To Drive More Leads
      How Top Companies Use Customer Experience To Drive More Leads Bonnie Crater, President and CEO, Full Circle CRM; Christine Crandell, President, New Business Strategies Recorded: Mar 7 2013 4:00 pm UTC 45 mins
    • Customer Experience (CX) is the new competitive differentiator. Marketers at Apple, Chrysler, Phillips, RBS and Lithium have tossed out traditional market segmentation and lead generation campaigns and drive bigger pipeline by delivering compelling experiences.
      This webinar brings together two CX experts for a lively discussion on how to marketers can design, deliver and measure compelling experiences that convert into revenue. You’ll learn how to uncover the experience your prospects value most, how to use that to differentiate your brand, and how to build marketing campaigns that get buyers to engage in your experience. It’s not enough to just deliver compelling experiences; you also need to measure if they are driving more preference for your brand and higher quality leads.

      Topics Covered:
      •The state of the Customer Experience movement
      •How to uncover the experience that will differentiate your brand
      •How to build marketing campaigns that deliver customer experience
      •How to use CRM and Marketing Automation systems to correctly measure customer preference


      Bonnie is President and CEO of Full Circle CRM, a leading provider of Marketing Performance Management software. Prior to joining Full Circle CRM, Bonnie was vice president of marketing for VoiceObjects and Realization and held vice president and senior vice president roles at Genesys, Netscape, Network Computer Inc., Salesforce.com, and Stratify. In 2000, Bonnie was named one of the “Top 20 Female Executives in Silicon Valley” by San Jose Magazine.

      As President of New Business Strategies, Christine Crandell leads client services teams serving customers including Good Technology, Oracle, DotNetNuke, and McKesson. She is as one of the top twenty women in Sales and Marketing by the SLMA, one of the top 15 influential leaders in sales and lead management, one of the top 15 leaders in social selling, and one of Silicon Valley’s Most Influential Women by the Silicon Valley/San Jose Business Journal.

      Read more >
    • Get to Know DomainTools PhishEye
      Get to Know DomainTools PhishEye Tim Helming Recorded: Nov 10 2016 5:10 pm UTC 58 mins
    • Phishing and other cybercrime campaigns often use deceptive domain names to accomplish their nefarious goals. These look alike domains can allow criminals to pose as employees or partners by spoofing email addresses, or to create deceptive links for the victim to click on. Phishing is the most often-used vector in successful data breaches; it targets an organization’s employees, its customers, or the world at large, with alarming effectiveness. Fake website and phishing scams cost the average-sized organization nearly $4 million annually. Prevention is key and starts with monitoring the Internet for “phishy” domain name registrations.

      Prior to the release of PhishEye, phishing domain searching was typically available only via custom tools built by security teams themselves. PhishEye automates this painful manual process by showing you existing and new domains that spoof legitimate brand, product, organization, or other names, so that you can carry out defensive or investigative actions against them.

      You will learn:

      -How to move from reactive to proactive, by identifying dangerous domains before they cause harm
      -Ways to disrupt spearphishing, such as business email compromise attacks, by blocking look-alike domains before the attacker uses them
      -Strategies to mitigate or prevent brand damage caused by illegitimate domains

      Read more >
    • SQL and Search: Impactful Results, Manageable Implementations
      SQL and Search: Impactful Results, Manageable Implementations Jason Stamper 451 Research Senior Analyst; Kevin Risden Apache Lucene/Solr Committer; Hadoop and Search Tech Lead Recorded: Dec 14 2016 4:00 pm UTC 58 mins
    • Search engines have changed the way everyone accesses information. Apache Solr and Elasticsearch, two open source search engines built on Lucene, have enabled companies to integrate search for a variety of use cases. On the flipside, SQL has been the bedrock for analytics. Joining the power of search and SQL opens up search to users who are familiar with SQL. This combination of technologies allows companies to utilize existing SQL skills to implement innovative search that answer questions previously not possible.


      ---------
      451 Research’s webinars are protected by international copyright law. Reproduction and distribution of this webinar, in whole or in part, in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. 451 Research disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although 451 Research may discuss legal issues related to the information technology business, 451 Research does not provide legal advice or services and their research should not be construed or used as such. 451 Research shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpreta¬tions thereof. The viewer assumes sole responsibility for the selection of this webinar to achieve its intended results. The opinions expressed herein are subject to change without notice.

      Read more >
    • Automating System-Wide Security Response through Orchestration
      Automating System-Wide Security Response through Orchestration Jennifer Geisler , Vice President of Marketing, ForeScout Technologies Recorded: Jun 28 2016 3:00 pm UTC 28 mins
    • Discover the Anatomy of Multivendor Security Orchestration

      Multivendor integration can improve operational efficiencies, accelerate threat response, boost security ROI and greatly improve a company’s network security and compliance posture. In this webinar, Ms. Geisler breaks down the anatomy of security orchestration. In addition, you’ll learn how ForeScout is extending the visibility and control capabilities of ForeScout CounterACT® to its partners’ security management products, as well as:
      - The role ForeScout ControlFabric® Architecture and ForeScout Extended Modules play in achieving rapid security orchestration
      - Real-world security orchestration use cases
      - Specific examples of how ForeScout helps leading security management vendors share information and automate security workflows and response

      Register now!

      --

      Jennifer Geisler , Vice President of Marketing, ForeScout Technologies

      With 20 years of industry experience, Jennifer drives ForeScout’s corporate branding, content marketing and sales enablement initiatives. Prior to joining ForeScout, Jennifer held senior marketing positions at Packeteer (acquired by Blue Coat Systems), Cisco and Intel Security. Jennifer holds a bachelor’s degree in business from Wright State University.

      Read more >
    • Better Safe Than Sorry - Best Practices for Infection Control Re: Drug Diversion
      Better Safe Than Sorry - Best Practices for Infection Control Re: Drug Diversion Kimberly New, JD, BSN, RN Recorded: Sep 24 2015 4:00 pm UTC 60 mins
    • Infection spread throughout healthcare facilities due to drug diversion has become a major problem, with some potentially serious long-term effects to patients. Infection from drug diversion is not a matter of “if” anymore, but “when.” In this webinar, Kim New will discuss:
      •Methods diverters use that can spread infection
      •Long-term impact on both the patient and the hospital
      •Best practices to prevent the spread of infection and protect both the patient and your hospital


      PLEASE BE SURE TO TEST YOUR SYSTEM'S COMPATIBILITY ON THE BRIGHTTALK PLATFORM PRIOR TO ATTENDING THE EVENT TO ENSURE AN OPTIMAL EXPERIENCE. SMARTPHONES MAY NOT WORK DURING THE LIVE EVENT, BUT WILL WORK IN THE RECORDED PLAYBACK MODE AFTER THE EVENT.

      Read more >
    • J.P. Morgan Income Opportunity Strategy
      J.P. Morgan Income Opportunity Strategy Bill Eigen Recorded: Feb 9 2016 3:00 pm UTC 35 mins
    • Please join Bill Eigen, portfolio manager for the J.P. Morgan Income Opportunity Strategy for a review of the strategy over the prior month, current positioning and his outlook for the months ahead.

      The JPMorgan Investment Funds - Income Opportunity Fund is an absolute return fixed income Fund, focusing on delivering the traditional characteristics of fixed income: Capital preservation, low correlation, and a reasonable risk adjusted return. It employs nontraditional techniques and instruments and draws on a variety of uncorrelated sources across the fixed income spectrum to aim for these characteristics even when the broad fixed income markets may struggle.

      Don't miss this opportunity to hear from Bill and put forward your questions.

      Featured Fund: JPMorgan Investment Funds - Income Opportunity Fund

      If you prefer to listen over the telephone please use the appropriate dial in details from the numbers below.

      Password: 44037

      United Kingdom Local Call: +44 (0) 844 581 9089
      Austria: +43 (0) 2 68220 56552
      Belgium: +32 (0) 2 789 8603
      Denmark: +45 3271 4573
      Finland: +358 9 2319 5437
      France: +33 (0) 1 7037 7166
      Germany: +49 (0) 69 7104 45598
      Ireland: +1 800 930 488
      Italy: +39 02 36269665
      Netherlands: 0207948426
      Norway: 21563318
      Portugal: +351 3 0880 2081
      Spain: +34 91 787 0777
      Sweden: +46 (0) 8 50520424
      Switzerland: +41 (0) 22 592 7103
      Standard International dial: +44 (0) 20 3003 2666

      Read more >
    • Working Capital Disputes: The Role of the Neutral Arbitrator
      Working Capital Disputes: The Role of the Neutral Arbitrator Basil Imburgia, Jeff Litvak Recorded: May 6 2015 5:00 pm UTC 89 mins
    • With global M&A activity on the rise, companies should prepare themselves for potential post-acquisition disputes prior to buying or selling a business. Often times, the contract between the parties will address the process to be followed in the event of any purchase price disputes and will reference the use of a neutral arbitrator.

      This presentation will address the important role of a neutral arbitrator in purchase price disputes, including how that role is created, defined and executed, from the initial negotiation of the purchase price agreement to the final opinion given to the parties by the neutral arbitrator. The presentation will also briefly highlight the most common types of working capital account and other post-closing adjustment disputes that a neutral arbitrator typically adjudicates, as well as controversies regarding GAAP, consistency, and whether alternatives to GAAP apply.

      Read more >
    • How to use ETFs as Building Blocks for a Core Portfolio
      How to use ETFs as Building Blocks for a Core Portfolio Ben Johnson, European ETF Strategist, Morningstar Recorded: Sep 14 2010 1:00 pm UTC 41 mins
    • This session will provide a broad overview of both the tactical and strategic potential for ETFs in investors’ portfolios. Ben will examine the advantages and disadvantages of using ETFs as building blocks for a core portfolio, discuss how they can be used to supplement existing core positions, and provide real examples of core portfolios constructed solely of ETFs.

      Ben Johnson is an ETF Strategist covering European exchange traded products. Prior to assuming his current role he was a senior stock analyst in Morningstar's basic materials group covering the agriculture and chemical industries. Before joining Morningstar in June 2006, he worked as a financial advisor with Morgan Stanley. Johnson holds a bachelor's degree in economics from the University of Wisconsin.

      Read more >
    • Build and deploy cross-platform enterprise apps faster with Oracle MCS & Sencha
      Build and deploy cross-platform enterprise apps faster with Oracle MCS & Sencha Gautam Agrawal and Suhas Uliyar Recorded: Feb 9 2016 6:00 pm UTC 60 mins
    • Developing and deploying great looking cross-platform enterprise mobile and web applications is not hard, as long as you use secure back-end services and a robust and scalable framework. Join us as Gautam Agrawal, Senior Director of Products at Sencha and Suhas Uliyar, Vice President Mobile Strategy at Oracle discuss how we’ve teamed to help you improve developer productivity and deliver sophisticated, cross-platform web applications faster.

      In this webinar you’ll learn:

      - How to accelerate the design and development of universal web applications
      -How to visualize and analyze complex data sets
      -How you can can add enterprise security, push notifications, authentication, back-end integrations, data storage, diagnostics, and analytics to your Ext JS applications.

      About the speakers:

      Suhas Uliyar: Mr. Suhas Uliyar is a 19-year mobile industry veteran, known as an exceptional visionary, strategist and technology evangelist responsible for designing and developing enterprise mobile application, middleware and tools. Suhas was recently voted one of top 100 influencers in enterprise mobile industry. As the VP for mobile strategy, Suhas is responsible for driving Oracle’s mobile strategy and vision. Suhas is focused on integrating the distributed Oracle mobile components into a simple, cohesive and easy to consume mobile offering bringing together mobile applications, mobile platform and mobile security delivered through the Oracle Cloud.


      Gautam Agrawal: Gautam Agrawal leads product management at Sencha. He is responsible for guiding new product strategies and roadmap initiatives across the Sencha product portfolio. Additionally, Gautam works with strategic partners to establish and develop new market opportunities. Prior to joining Sencha, he held various product and engineering positions at organizations developing SaaS and Business Intelligence applications. Gautam holds a PhD and MS from State University of NY (SUNY) at Buffalo.

      Read more >
    • Capsules for Use in Dry Powder Inhalers (DPIs) in Early Phase Dev
      Capsules for Use in Dry Powder Inhalers (DPIs) in Early Phase Dev Matt Richardson, Capsugel; Massimo Moratto, Aptuit; Mike Savill, Capsugel Recorded: Jun 28 2011 3:00 pm UTC 69 mins
    • Finding efficient drug delivery methods is becoming increasingly important as the pharmaceutical industry looks to improve the performance of its new compounds and extend the applications of existing drugs. One option that has long been used to successfully treat respiratory conditions and provide compounds with a fast-acting route into circulation is drug delivery via inhalation using a dry powder inhaler (DPI).

      Capsugel’s Xcelodose technology is ideally suited to meet the specialized demand for filling capsules for DPI use, as it is proven to dispense very low weights repeatably with precision and accuracy. The technology is suitable for any dry powder, including micronized and cohesive powders, and fills the powder into the capsule without compressing or compacting the powder base, thereby facilitating evacuation on inhalation. Collaborative data shows that the action of filling does not give rise to segregation of blended products provided the constituents have similar particle size and density, nor will it degrade the bonds between API and carrier particles.

      Matt Richardson, Pharmaceutical Business Development Manager, Capsugel
      Matt has a BS in Chemistry (Wofford College) and Ph.D. (Wake Forest) in synthetic organic and organometallic chemistry. Prior to joining Capsugel in 2005, he worked in process development and scale up of pharmaceuticals.

      Massimo Moratto, Senior Scientist Pharmaceutical Development, Aptuit
      Massimo has worked in formulation development at Aptuit, formerly GSK, for ten years. He works with solid oral dosage forms, Dry Powder Inhaler formulations and is responsible for upgrading the Aptuit Verona facility for respiratory technologies, including the purchase of a new Xcelodose 600S.

      Mike Savill, Pharmaceutical Technology Manager, Capsugel
      Mike supports product and process development for Capsugel’s laboratory equipment. He has helped develop the Xcelodose technology and specialises in the automated precision dosing of dry powders.

      Read more >
    • J.P. Morgan Income Opportunity Strategy
      J.P. Morgan Income Opportunity Strategy Bill Eigen Recorded: Nov 10 2015 3:00 pm UTC 35 mins
    • Please join Bill Eigen, portfolio manager for the J.P. Morgan Income Opportunity Strategy for a review of the strategy over the prior month, current positioning and his outlook for the months ahead.

      The JPMorgan Investment Funds - Income Opportunity Fund is an absolute return fixed income Fund, focusing on delivering the traditional characteristics of fixed income: Capital preservation, low correlation, and a reasonable risk adjusted return. It employs nontraditional techniques and instruments and draws on a variety of uncorrelated sources across the fixed income spectrum to aim for these characteristics even when the broad fixed income markets may struggle.

      Don't miss this opportunity to hear from Bill and put forward your questions.

      Featured Fund: JPMorgan Investment Funds - Income Opportunity Fund

      If you prefer to listen over the telephone please use the appropriate dial in details from the numbers below.

      Password: 43047

      United Kingdom Local Call: +44 (0) 844 581 9089
      Austria: +43 (0) 2 68220 56552
      Belgium: +32 (0) 2 789 8603
      Denmark: +45 3271 4573
      Finland: +358 9 2319 5437
      France: +33 (0) 1 7037 7166
      Germany: +49 (0) 69 7104 45598
      Ireland: +1 800 930 488
      Italy: +39 02 36269665
      Netherlands: 0207948426
      Norway: 21563318
      Portugal: +351 3 0880 2081
      Spain: +34 91 787 0777
      Sweden: +46 (0) 8 50520424
      Switzerland: +41 (0) 22 592 7103
      Standard International dial: +44 (0) 20 3003 2666

      Read more >