Hi [[ session.user.profile.firstName ]]
Sort by:
    • Journey to Cloud-Native: Reducing Production Risks at Scale
      Journey to Cloud-Native: Reducing Production Risks at Scale Kamala Dasika, Pivotal and Mike Villiger, Dynatrace Upcoming: Jun 7 2017 4:00 pm UTC 45 mins
    • More and more operational decision-making and activity that previously required human intervention is being programmatically driven into platforms. This type of intelligent automation baked into cloud-native platforms is transforming Operations teams into champions of delivering business value. This webinar will cover how you can:
      - Auto detect apps and services running on multiple clouds
      - Automate problem detection and resolution
      - Identify behavior patterns, anticipate trends and respond quickly
      - Why correlation is not causation

      This is the final webinar in the series presented by Pivotal and Dynatrace on modernizing your application portfolio to cloud-native.

      Webinars in this series are searchable by title:
      - Journey to Cloud-Native: Where to start in your app modernization process
      - Journey to Cloud-Native: Continuous Delivery with Artificial Intelligence
      - Journey to Cloud-Native: Making Sense of Your Service Interactions
      - Journey to Cloud-Native: Reducing Production Risks at Scale

      Thank you in advance for joining us.

      About the Speakers:
      Kamala Dasika has been working on the Cloud Foundry product team since its inception in 2011 and previously held various product or engineering positions at VMware, Tibco, SAP and Applied Biosystems.

      Mike Villiger helps Dynatrace customers implement Application Performance Management technologies and processes in the worlds of Public/Private Cloud, DevOps, Platform-as-a-Service (PaaS) and NoSQL.

      Read more >
    • How Software Eats Hardware in the Datacenter: Reducing Cost and Complexity
      How Software Eats Hardware in the Datacenter: Reducing Cost and Complexity Andy Ryan, Cloud Solutions Architect at vArmour Recorded: Sep 1 2016 5:00 pm UTC 35 mins
    • INTRO:

      As organizations move to virtual data centers and multi-cloud environments in a dangerous threat climate, they are faced with new security challenges they must overcome. But, they must do this without exponentially increasing the manpower, products, or resources they need, so they still get the most of their valuable security budgets. These challenges include:

      -Improving visibility inside data centers and cloud
      -Reducing the attack surface
      -Maintaining regulatory compliance standards.


      vArmour will explore trends in data center security that include the rise of software to replace firewalls inside the data center, segmentation and micro-segmentation as security techniques, and shifting ideas about software defined networking that:

      -Eliminate under-utilized zones and choke points
      -Avoid costly hardware refresh cycles and on-going maintenance
      -Lower the time it takes to see and stop threats
      -Reduce the time and complexity to process security changes
      -Increase speed of secure application delivery


      Andy Ryan, Cloud Solutions Architect at vArmour

      Read more >
    • CIP – Significantly Reducing Costs in Outpatients
      CIP – Significantly Reducing Costs in Outpatients Chris Rodwell, Robin Kilner Recorded: Oct 27 2015 2:00 pm UTC 62 mins
    • The NHS Five Year Forward View requires £20bn - £30bn cost improvements by 2020. Patient care requires continuous improvements to keep pace with increasing expectations on services. This calls for Trusts to improve processes, while reducing actual delivery costs.

      Trusts need to understand the positive financial impact of an Outpatient Process Redesign. Winscribe’s healthcare process experts Chris Rodwell and Robin Kilner show how this can be achieved. The purpose of the redesign is to identify and write an action plan to reduce the costs of supporting outpatients by a minimum of £1m per annum for a small to medium trust. More for larger trusts.

      Cost savings can be made as a result of:-
      •Better document creation – getting it down to seconds per appointment for the clinician
      •Reducing costs of administration for discharge / clinic letter production – reductions of 50 – 60% possible
      •Improve document sharing (time taken) and document TAT – reduces admin further
      •Accuracy – right first time
      •Reduced cost per letter - reductions of 50 – 60% possible

      This webinar is to share this approach with NHS Finance Managers and Directors. We will examine actual case studies and show the savings that can be made, in the current financial year and over a 5 year plan. Winscribe’s healthcare process experts Chris Rodwell and Robin Kilner show how this can be achieved.

      Read more >
    • The Role of DevOps in Reducing the Likelihood of a Data Breach
      The Role of DevOps in Reducing the Likelihood of a Data Breach Amy DeMartine, Principal Analyst, Security & Risk, Forrester & Bhavna Sarathy, Principal Product Manager, Veracode Upcoming: May 30 2017 3:00 pm UTC 60 mins
    • Security breaches continue to make headlines and negatively impact the reputation and bottom line for many businesses. According to Cybersecurity Ventures, global annual cybercrime costs will double between now and 2021. More than 50% of all cyberattacks target the software application layer* and the number of these attacks grows at a rate of about 25% per year**.

      Enter DevOps- a delivery approach that focuses on continuous software delivery and gives organizations an opportunity to reduce overall security risks in applications. It offers development teams the ability to introduce security earlier in the development lifecycle so they can identify and address vulnerabilities faster.

      While traditional methodologies typically introduce security during later phases of development, DevOps enables security visibility across the lifecycle to decrease discovery and remediation time.

      In this webinar, guest speaker Amy DeMartine, Principal Analyst at Forrester Research and Bhavna Sarathy, Principal Product Manager at Veracode will provide an overview of the current state of cybersecurity and the DevOps movement, how security is changing the way that software is being built and deployed, and the technologies and best practices organizations should consider in order to reduce the likelihood of a data breach. Specific topics addressing the threat of data breaches to be discussed include:

      • The organizational gaps that both security and development teams are currently tackling with regards to data breach prevention

      • Practical steps both teams can take to transition to a secure DevOps environment

      • Leveraging technologies such as Web Application Scanning which enable teams to discover and address vulnerabilities during the production and pre-production phases of the software development lifecycle

      Read more >
    • A Tactical Guide to Reducing Your Data Breach Risk
      A Tactical Guide to Reducing Your Data Breach Risk HPE Security - Data Security, MetricStream Upcoming: Aug 29 2017 5:00 pm UTC 60 mins
    • Over 90% of the world’s data has been generated in the last few years. Accompanying this rapid growth in data comes exponential risks, as witnessed by the spike in cyber attacks of which no organization seems immune. The financial rewards gained by the perpetuators of cyber attacks is blatant, and this is driving continued attacks on companies containing massive amounts of consumer data. For these companies securing data is only half the battle. The risks can be greater when data is transmitted externally, hence it is critical that organizations know where sensitive data is going, how it is being transmitted, and how it is being handled and stored.

      On this webinar our panel of experts will discuss some of the best practices organizations can consider to reduce the risk of suffering from a data breach, and to proactively prepare for any subsequent breach that could happen.

      Read more >
    • Reducing Open Source Risk and Remediation Costs Early in the SDLC
      Reducing Open Source Risk and Remediation Costs Early in the SDLC Pat Durante, Senior Director Education Services; John Beaudoin, Senior Instructional Designer Recorded: Feb 22 2017 4:00 pm UTC 74 mins
    • Increasingly, organizations worldwide are implementing open source security and license risk assessment capabilities early in the software development lifecycle when the cost to remediate issues is lowest. This webinar will demonstrate Black Duck Hub’s effectiveness in providing comprehensive risk assessments when used in combination with our Eclipse IDE plugin, Build Tool, and CI Tool integrations. Additionally, we'll review valuable new features in Black Duck Hub 3.5.
      You’ll also learn:
      - How to improve the accuracy of your open source inventory by leverage open source dependency discovery techniques for build tools and package managers
      - Options for incorporating Hub scanning into your Continuous Integration environments
      - How to track remediation tasks using the Hub-Jira integration
      - How to streamline your component review process
      - Use cases for scanning binary repositories such as Artifactory

      Read more >
    • Reducing Threats through Improving Identity Security
      Reducing Threats through Improving Identity Security David Coxe, Co-Founder, Criterion Systems and Co-Founder & CEO of ID DataWeb Recorded: Dec 12 2016 6:00 pm UTC 41 mins
    • Cyber threats are increasing in frequency and complexity, and all industry segments are vulnerable. Join this presentation to learn the advances in identity security and privacy, and how you can protect your organization in 2017.

      David Coxe is the CEO of ID DataWeb, Inc. (IDW) and was the Principal Investigator for the Criterion Systems NSTIC pilot program. He is also co- founder of Criterion Systems, a successful IT services contractor that provides information security, cloud computing, software development and other services to civilian agencies, DoD, and the Intelligence community. David has 20 years identity management experience and is currently very active in the development and implementation of attribute exchange trust frameworks. He co-chaired the Attribute Exchange Working Group (AXWG) at the Open Identity Exchange (OIX) for implementing the business, legal, technical, policy/privacy and assessor/certification requirements for Attribute Exchange (AX) Trust Frameworks.

      Read more >
    • Reducing Risks by Mitigating Vulnerabilities
      Reducing Risks by Mitigating Vulnerabilities Craig Hinkley, WhiteHat Security; Preston Hogue, F5 Networks Recorded: Nov 16 2016 2:30 pm UTC 50 mins
    • Build an Active Application Defense System
      Web applications accounted for an astounding 40% of last year’s security breaches. The challenges of securing legacy systems, third-party apps, and the extensive shadow IT landscape can be challenging, to put it mildly.

      But here’s the good news: The combined F5 and WhiteHat Security approach to web application security represents a powerful new way for organizations to defend against application-level attacks.

      Companies are constantly developing new applications, and it’s expensive to stop and patch as soon as a new vulnerability is found. Additionally, it may not be practical to remediate every finding due to issues with legacy code, third-party integrations, or other inherited limitations.

      But the integration of F5 Networks and WhiteHat Security technology helps you more quickly identify and remediate vulnerabilities in your web applications. By automating updates to the web application firewall, you can ease the burden of management and reduce costs, while ensuring that your security posture remains strong.

      Read more >
    • The Ability-to-Pay Defense: A Strategy for Reducing Criminal Fines
      The Ability-to-Pay Defense: A Strategy for Reducing Criminal Fines Seth Farber, Trey Nicoud, Basil Imburgia, Jeff Litvak Recorded: Oct 26 2016 5:00 pm UTC 82 mins
    • In recent years, criminal fines and penalties have risen drastically as a result of price-fixing and bid-rigging conspiracies uncovered among automotive parts manufacturers. While companies face these mounting fines, they need not accept the fine initially imposed. The United States Sentencing Guidelines do allow for a reduction of a criminal fine based on a company’s inability to pay. This webcast seeks to inform practitioners on the considerations of this ability-to-pay defense, strategies and process. As an illustration, this webcast includes a case study analyzing a company’s ability to pay a fine resulting from antitrust violations; however, the described methodology has other applications. Additional arenas where this defense has relevance include environmental clean-up costs, healthcare fraud, securities and commodities fraud, as well as FCPA and sanctions violations.

      The session will provide insight into the financial analyst’s role in evaluating the company’s financial status and the basis of the framework for the ability-to-pay argument. As part of the case study, the session will walk through an ability-to-pay model including analysis of projected free cash flow and the strength of the company’s balance sheet. Lastly, the session will address the importance of the financial expert’s role in discussions with the DOJ and its financial expert.

      Read more >