Technologies never remain in silos; they intermingle with one another to form innovative scenarios that may potentially disrupt existing business models and applications. For example, technologies such as Smart Haptics, 5G Networks, Surgical Robots, Artificial Intelligence and XaaS could combine to generate an innovative business scenario, “Haptic-enabled Remote Robotic Surgeries,” that may possibly disrupt the healthcare industry. For business executives and R&D organizations, these scenarios usher in innovation for their strategic business planning and help them stay ahead in the market. The webinar also discusses some of the key initiatives enabling the convergence of emerging technologies.Read more >
In an inter-connected world where technology has no boundaries, two or more emerging technologies across industries may converge in various scenarios, leading to unexplored applications or business models. For example, technologies like next-generation stem cells, additive manufacturing and nano-coatings may converge to give rise to "personalized cosmeceuticals," which are cosmetics customized based on phenotype and genotype of the user. Unexplored business models like these may become the next disruptive billion-dollar idea for investors, corporate executives and R&D professionals. The webinar will discuss key trends that drive these convergence scenarios and potential market challenges that should be noted while considering these opportunities.Read more >
Join John Nall, Founder and CEO of Appzion, as he takes a technical deep-dive into workforce mobilization through augmented reality.
In this webinar you will learn the steps to enterprise AR productivity. Methods include techniques to identify ideal scenarios for augmenting humans, process mapping and observation techniques. Once the scenario is chosen, other considerations include software and hardware assessment and selection and cybersecurity for wearables.
Whether you are in the beginning stages of implementing a vendor risk management (VRM) program, or you have a robust program, there are always scenarios that can blindside your organization. Compounding this uncertainty is the dynamic environment of cyber risk. Yet, there are tools and techniques organizations can leverage in order to reduce uncertainty about the security of their third parties and vendors.
Join Matt Cherian, Director of Products at BitSight as he discusses how to grapple with common vendor risk scenarios. In this webinar, viewers will learn:
- How to gain full visibility into the security of your critical third parties to avoid being caught off guard
- How to understand and communicate potential threats occurring on the networks of your third parties
- What to do when an infection- or breach occurs
Exercising and testing is a key part of the business continuity management lifecycle. A well-planned, well-run scenario-based exercise can help us to validate assumptions, identify gaps in our plans, exercise key players and develop our business continuity capability. In this webinar Andy Osborne, who has prepared and facilitated dozens of scenario-based exercises for his clients, shares his experience and provides some practical hints and tips for making your scenario-based exercises successful.Read more >
Building middleware applications is challenging because of the multi-tier nature of the application; discipline, communication and transparency across all the teams are required to be successful.
Depending on what is most important to your organization, specific application lifecycle patterns might be most suitable.
Join us on this TechByte session, where we will provide an overview of the most common DevOps scenarios we come across, as well as highlight characteristics and benefits of each of these lifecycle patterns.
Partecipi al prossimo webinar con Sandra Crowl, Membro del Comitato Investimenti, che parlerà delle attuali strategie globali e di investimento di Carmignac. Potrà inviare delle domande durante la conferenza, verranno prese in considerazione al temine della sessione.
LA CONFERENZA SARA’ IN ITALIANO.
On Tuesday, May 22, 2012, the Growth Team MembershipTM will present a case-based best practice on how the corporate strategy function at Merck & Co., Inc. used scenario planning to explore long-term risks and opportunities.
Featured Thought Leader Douglas Black, General Manager for the Innovative Ventures Unit at Merck, will share key lessons learned and participate in a Q&A session.
The webcast shows how Merck:
• Gathered internal insights and external expertise to establish plausible scenarios for the future of healthcare
• Challenged assumptions about how the critical issues faced today will evolve over the coming years through exploring several scenarios
• Considered investment implications in the context of each scenario
• Integrated scenario-based conclusions with Merck’s strategy planning
Industry statistics point to 1 in 5 enterprise breaches involve insider actions. Insider threats are often the costliest and most disruptive to an enterprise - even highly secure enterprises (think Edward Snowden). According to the FBI, “the thief who is harder to detect and who could cause the most damage is the insider—the employee with legitimate access.” With the insider there is no malware necessary, no access rule violations, no credentials theft, no command and control traffic, no firewall intrusions. Your enterprise is mounting a Maginot Line defense against the knowledgeable insider, gun emplacements facing away from the real threat, easily bypassed. Security is breached, critical data is exfiltrated, and any data privacy is vaporized as your most sensitive data assets appear for sale on the dark web, while embarrassing revelations are leaked online, making headline news, triggering investigations and resignations.
In this episode in the Threat Hunting series, we will review:
- The insider threat defense futility of traditional security placebos
- Essential visibility for effective user and endpoint activity monitoring
- Sensor and effector instrumentation to quickly observe and promptly thwart malicious insider activity
- Instrumentation customization for enterprise-specific tailoring
- The transition from routine operations team user support to security team insider threat awareness
- Spatial and temporal anomaly types associated with insider threats
- The FBI’s insider threat kill chain
- The importance of forensic lookback
- Exfiltration routes favored by insiders
The global economic weakness hinted at by the oil price caused anxiety for investors in late 2014 – growth is slowing in China, which is impacting on its neighbours; the eurozone remains weak; and Japan is still struggling. This is now affecting countries with stronger growth such as the US and UK – there is a tension between the ‘Goldilocks’ scenario (where growth is neither too hot to need interest rate increases nor too cold) and a deflationary spiral that will destroy growth.
Register now to join Julian Chillingworth, CIO of Rathbone Unit Trust Management, in our opening webcast on Tuesday 21 January at 11am, as he discusses where our growth opportunities lie, and the key issues that will shape our investment strategy.
Put your questions to Julian in advance or during the call using the ‘questions’ tab at the top of the video screen. A recording will be available 'on demand' after the call if you unable to join us at 11am.
SAP HANA usage scenarios in the real-world – SAP Business Warehouse Powered by SAP HANA, SAP Business Suite powered by SAP HANA, Native applications on SAP HANA, SAP HANA in the cloudRead more >
In order to meet the compute infrastructure requirements for the broad range of service consumers, a common framework is required around which infrastructure as a service can be defined, provisioned, monitored and managed. A common set of principles, metrics and architectural frameworks can be defined, resulting in consistent capabilities, service levels and service attributes across multiple providers, while still allowing the individual providers to innovate and differentiate. In this session ODCA representatives will outline the framework and some usage scenarios.Read more >
One of the most powerful tools attackers use today is PowerShell.
Join (ISC)² EMEA's Managing Director Adrian Davis and Jason Garman, Principal Software Architect at Carbon Black, who will explain 3 ways attackers use PowerShell in order to perform actions on objectives, dump credentials, and move laterally through target networks. This webinar will also cover methods and a live demo to show how the risk of PowerShell-leveraged attacks can be mitigated through prevention and detection. Attendees will learn the basics of PowerShell, how attackers leverage tools like PowerShell to “live off the land”, and receive real-world tips on how to identify potentially malicious PowerShell activity on their networks.
You can be a lean startup in an Enterprise! Through collaboration between development, test and operations, an innovative idea can be quickly delivered for customer feedback and reaction. Let’s find out how a team working within a large Enterprise can, in fact, be nimble and creative in getting innovations to market.Read more >
Developing multi-tier applications introduces numerous challenges to teams and organizations; orchestrating work across teams that work and behave very differently, understanding cross-team dependencies so as to minimize risks, ensuring everyone’s backlogs are aligned to the same priorities, keeping teams focused on customer needs/feedback …. to highlight just a few.
Join us on this TechByte session where we will share with you what we’ve seen customers do to handle these challenges.
Fingers wagging, eyes squinting –“Why didn’t you find this problem during testing?!”How many times have you been asked that, only to try to defend yourself with things like “we can’t test everything!” and “it’s a corner case”? Everyone knows you can’t improve quality by testing alone, so what can you do when your testing team is taking the blame for poor quality in production?
Join us on this TechByte session where we will discuss practices and tools that will help improve your test effectiveness and overall quality.
Over 1,000 new customers per day are successfully leveraging the Microsoft Azure cloud platform as part of their IT platform! Attend this session to quickly learn where Windows Azure can fit into your IT and cloud strategy. In this session, we'll review the Top 6 Cloud Scenarios where other organizations have experienced immediate results with Microsoft Azure - even if they're currently leveraging other cloud providers. By the end of this session, you’ll be prepared with the information needed for planning a productive jumpstart into the clouds with Microsoft Azure.Read more >
No one wants to end up as the next headline from a cyber security attack. But application security can be hard to do and takes time. Perhaps you failed an audit or swallowed the risk of vulnerabilities to get a new business app online. You need to CYA (cover your apps) fast!
Learn how runtime application self-protection can protect you in minutes when your applications:
• are too complex, too fragile, or ill supported to risk changing the code to remove security vulnerabilities
• have thousands of vulnerabilities – or that have never been tested – but are in production
• rely on code that is off-the-shelf, third party, or in the cloud - don’t be at the vendor’s mercy.
Learn how to identify and defend software vulnerabilities while the app is still being used. Quickly implement compensating controls to breeze past that next audit.
Fast Start Video Series; Advanced Consumer Scenario in CSARead more >
Fast Start Video Series; Basic Consumer Scenario in CSARead more >