Exercising and testing is a key part of the business continuity management lifecycle. A well-planned, well-run scenario-based exercise can help us to validate assumptions, identify gaps in our plans, exercise key players and develop our business continuity capability. In this webinar Andy Osborne, who has prepared and facilitated dozens of scenario-based exercises for his clients, shares his experience and provides some practical hints and tips for making your scenario-based exercises successful.Read more >
Building middleware applications is challenging because of the multi-tier nature of the application; discipline, communication and transparency across all the teams are required to be successful.
Depending on what is most important to your organization, specific application lifecycle patterns might be most suitable.
Join us on this TechByte session, where we will provide an overview of the most common DevOps scenarios we come across, as well as highlight characteristics and benefits of each of these lifecycle patterns.
On Tuesday, May 22, 2012, the Growth Team MembershipTM will present a case-based best practice on how the corporate strategy function at Merck & Co., Inc. used scenario planning to explore long-term risks and opportunities.
Featured Thought Leader Douglas Black, General Manager for the Innovative Ventures Unit at Merck, will share key lessons learned and participate in a Q&A session.
The webcast shows how Merck:
• Gathered internal insights and external expertise to establish plausible scenarios for the future of healthcare
• Challenged assumptions about how the critical issues faced today will evolve over the coming years through exploring several scenarios
• Considered investment implications in the context of each scenario
• Integrated scenario-based conclusions with Merck’s strategy planning
The global economic weakness hinted at by the oil price caused anxiety for investors in late 2014 – growth is slowing in China, which is impacting on its neighbours; the eurozone remains weak; and Japan is still struggling. This is now affecting countries with stronger growth such as the US and UK – there is a tension between the ‘Goldilocks’ scenario (where growth is neither too hot to need interest rate increases nor too cold) and a deflationary spiral that will destroy growth.
Register now to join Julian Chillingworth, CIO of Rathbone Unit Trust Management, in our opening webcast on Tuesday 21 January at 11am, as he discusses where our growth opportunities lie, and the key issues that will shape our investment strategy.
Put your questions to Julian in advance or during the call using the ‘questions’ tab at the top of the video screen. A recording will be available 'on demand' after the call if you unable to join us at 11am.
SAP HANA usage scenarios in the real-world – SAP Business Warehouse Powered by SAP HANA, SAP Business Suite powered by SAP HANA, Native applications on SAP HANA, SAP HANA in the cloudRead more >
In order to meet the compute infrastructure requirements for the broad range of service consumers, a common framework is required around which infrastructure as a service can be defined, provisioned, monitored and managed. A common set of principles, metrics and architectural frameworks can be defined, resulting in consistent capabilities, service levels and service attributes across multiple providers, while still allowing the individual providers to innovate and differentiate. In this session ODCA representatives will outline the framework and some usage scenarios.Read more >
One of the most powerful tools attackers use today is PowerShell.
Join (ISC)² EMEA's Managing Director Adrian Davis and Jason Garman, Principal Software Architect at Carbon Black, who will explain 3 ways attackers use PowerShell in order to perform actions on objectives, dump credentials, and move laterally through target networks. This webinar will also cover methods and a live demo to show how the risk of PowerShell-leveraged attacks can be mitigated through prevention and detection. Attendees will learn the basics of PowerShell, how attackers leverage tools like PowerShell to “live off the land”, and receive real-world tips on how to identify potentially malicious PowerShell activity on their networks.
You can be a lean startup in an Enterprise! Through collaboration between development, test and operations, an innovative idea can be quickly delivered for customer feedback and reaction. Let’s find out how a team working within a large Enterprise can, in fact, be nimble and creative in getting innovations to market.Read more >
Developing multi-tier applications introduces numerous challenges to teams and organizations; orchestrating work across teams that work and behave very differently, understanding cross-team dependencies so as to minimize risks, ensuring everyone’s backlogs are aligned to the same priorities, keeping teams focused on customer needs/feedback …. to highlight just a few.
Join us on this TechByte session where we will share with you what we’ve seen customers do to handle these challenges.
Fingers wagging, eyes squinting –“Why didn’t you find this problem during testing?!”How many times have you been asked that, only to try to defend yourself with things like “we can’t test everything!” and “it’s a corner case”? Everyone knows you can’t improve quality by testing alone, so what can you do when your testing team is taking the blame for poor quality in production?
Join us on this TechByte session where we will discuss practices and tools that will help improve your test effectiveness and overall quality.
Over 1,000 new customers per day are successfully leveraging the Microsoft Azure cloud platform as part of their IT platform! Attend this session to quickly learn where Windows Azure can fit into your IT and cloud strategy. In this session, we'll review the Top 6 Cloud Scenarios where other organizations have experienced immediate results with Microsoft Azure - even if they're currently leveraging other cloud providers. By the end of this session, you’ll be prepared with the information needed for planning a productive jumpstart into the clouds with Microsoft Azure.Read more >
No one wants to end up as the next headline from a cyber security attack. But application security can be hard to do and takes time. Perhaps you failed an audit or swallowed the risk of vulnerabilities to get a new business app online. You need to CYA (cover your apps) fast!
Learn how runtime application self-protection can protect you in minutes when your applications:
• are too complex, too fragile, or ill supported to risk changing the code to remove security vulnerabilities
• have thousands of vulnerabilities – or that have never been tested – but are in production
• rely on code that is off-the-shelf, third party, or in the cloud - don’t be at the vendor’s mercy.
Learn how to identify and defend software vulnerabilities while the app is still being used. Quickly implement compensating controls to breeze past that next audit.
Fast Start Video Series; Basic Consumer Scenario in CSARead more >
Fast Start Video Series; Advanced Consumer Scenario in CSARead more >
Transition towards smart capital expenditure (CAPEX) and innovative operational expenditure (OPEX) are imminent in the oil and gas industry, especially with highly unstable barrel prices. Frost & Sullivan's “2015 E&P CAPEX Outlook Model” estimates global E&P spending in 2015 to decline to $659.8 billion, down from an estimated $723.3 billion in 2014, if the price of crude oil remains around $60 per barrel.
Attend this briefing to:
- Learn about the 2015 top predictions for the oil and gas industry
- Understand the impact that oil price fluctuations will have on the future
- Discover how innovative solution providers are driving the adoption of - Totally Integrated Digital Oilfields (TIDO) to aid end-users overcome key industry challenges
The Mexican Total Telecommunications Services Markets earned revenues of $30.8 billion in 2013 and estimates this to reach $37.,2 billion in 2019., This is mainly driven by the positive economic outlook;, intensifying competition;, investments by competitors to offer triple-, quadruple-, and quintuple-play bundles;, and investments to implement and expand thi3rd- generation (3G), long-term evolution (LTE), GigaEthernet, fiber to the home (FTTH), and other networks.
By attending this Analyst Briefing you will learn:
-What segments offer the best growth opportunities?
-What are the growth drivers?
-What segments are already mature?
-Where is the competitive pressure larger?
No one wants to be the next cyber casualty. Collectively, organizations spend an enormous amount of resources deploying and managing security solutions to block malware, protect data, and keep critical business services operating.
Yet most organizations remain inadequately protected against evolving and dangerous cyber threats. In this session, we will learn to recognize common network attack scenarios and mitigate the combination of misconfigurations, vulnerabilities, access policy violations and other security gaps that can be exploited by sophisticated attackers.
High-profile breaches at Epsilon, Sony, and other enterprise and government networks have dominated the news lately, raising awareness of the need to design effective security strategies against sophisticated attacks and advanced persistent threats (APTs). Many companies struggle with where to begin to develop an effective plan of cyber defense.
During this session we will walk the audience through several attack scenarios using a visual attack explorer tool, highlighting the combination of security gaps that are often used and how to prevent them. Network modeling, vulnerability analysis, access path analysis, and attack simulation will all be introduced and we will show how these analytical tools can be used to quickly and automatically find exposed areas of a network.
The session will center on reviewing real-world attack techniques used in recent attacks and data breaches. We will then talk about how to recognize security gaps, compare attack scenarios and define remediation alternatives. Attendees will learn how to prevent assaults on their network infrastructure from occurring by taking proactive measures and using an automated and sustained approach to risk and vulnerability management.
Aberdeen fund managers speak to three topics that were discussed at Aberdeen's US Investment Conference titled "Navigating a New Investment Reality". Mike Turner, Hugh Young and Mark Parry speak to the possible effects of US monetary easing, global inflation and a manufacturing renaissance. For more information on the Aberdeen US Investment Conference, visit:
Security practitioners today are confronted with a large complex threat surface of exposure of confidential information: data theft on laptops, information copied to USB devices, stored on smartphones, posted on blogs, burned to CDs and DVDs and sent via IM and e-mail. The consequences for loss of this data are quite severe including regulatory fines/sanctions, brand damage and customer attrition. The WikiLeaks scenario we hear so much about in the press represents a further escalation in the risks and consequences of breach of sensitive data. The results of the latest U.S. Cost of a Data Breach from the Ponemon Institute indicate that malicious attacks are more prevalent than in years past and they’re the most expensive form of breach event. Malicious attacks come from both outside and inside the organization, ranging from data-stealing malware to social engineering. Malicious insiders with intent to misuse information are most often white collar criminals, terminated employees and corporate espionage aspirants. Well-meaning insiders who walk out the door with corporate data on a USB drive do so for mostly legitimate reasons like working from home or for an off-site meeting. These insiders seem to think either that company security policies are a hindrance to their jobs or that they can get away with it as long as they’re careful. These insiders, however well-intentioned, make it easier for hackers and malicious insiders to get their hands on confidential data and leak it. It’s easy to see how the dual priorities of a worker-friendly environment and the need to share information quickly could lead to a data loss scenario. This session will explore these risks, as well as how to protect your sensitive data by implementing multi-level security practices such as encryption, device control, data loss prevention, protection against advanced persistent threats and broader information protection best practices.Read more >
A successful BCMS stands and falls with the right choice of strategy options for a worst-case scenario. Each scenario has a variety of strategy options, but which one is the correct choice? Based on practical examples the webinar shows the importance of threat assessments as a filter for choosing the right strategy.Read more >