- BrightTALK at CRESTCON & IISP Congress -
BrightTALK caught up with IBM Security Europe's Martin Borrett for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- AI & machine learning and the influence that the technology will have on the security space
- The ins and outs of AI & machine learning and how it analyses your data looking for security incidents
- How to find a good solution to suit all budgets
- The growth of IoT networks and how we can look to protect them effectively
- V2V security and how to ensure connected cars are protected from cyber threats
- The threatscape in 2017; the threat actors, motives and attack techniques
Businesses sometime ignore Oracle database performance until poor performance impacts profitability, or the cost of Oracle licensing becomes significant. But this consideration frequently comes a bit late, and can cause tension between the business and technical staff.
Hear how we have helped our clients bridge the gap between business needs and technical resources. Learn how using the right tools, like Statspack and AWR, can help identify performance trends and enable a healthy dialogue between the business, technical, DBA, developer, and infrastructure teams.
Discover the importance of benchmarks in establishing baselines that:
1) Facilitate performance troubleshooting
2) Enable efficient use of existing hardware
3) Inform the hardware and software requisition narrative
Is the problem poorly performing hardware, misconfigured servers and instances, expensive SQL, and/or a lack of data life cycle management? An incorrect answer could place blame with the wrong department, increase frustration levels, and possibly result in higher hardware and software costs. So find the correct answer using the tools discussed in this webinar and facilitate a more cost effective and attainable solution for your business.
The digital business is growing at a rate IT can’t match without over-worked staff and costly data storage. Over the next few years, more reliance on cloud hosting and SDN will send your stress levels up and your IT visibility down… unless you take advantage of a smarter workflow designed to scale IT with real-time insight on-prem and in the cloud. Backed by machine learning for “always-on” anomaly detection, the ExtraHop platform redefines analytics for a more productive—and proactive—you.Read more >
Enforcement of the EU General Data Protection Regulation (GDPR) is looming, giving you less than 12 months to prepare. And it has major implications for every organization that processes EU personal data – regardless of where they are based.
With the cost of non-compliance set at an astronomical 4% of global annual revenue – not to mention damage to reputation – the time to protect yourself is now.
On May 23rd, join Absolute’s data protection experts alongside leading technology and compliance lawyer Jonathan Armstrong, as they share practical insights on the global implications of GDPR. Register today and learn:
• GDPR compliance – what’s required and what’s at stake
• Organizational steps you need to take now to avert disaster
• The best security approaches to ensure compliance and protect your data – and your brand
The Route Fifty Navigator Awards seeks to identify and highlight individuals and teams of state and local innovators, technologists, leaders, and rising stars who have demonstrated their ability to conceive and implement great ideas. In 2017 we are traveling across the country to talk with exceptional individuals about their collaborative skills, leadership styles, and innovative programs.
On May 23, Route Fifty will be in Salt Lake City to highlight the innovations driving Utah’s state, county, and municipal governments. We’ll talk with state and local officials about what what makes these leaders, teams, and programs so successful, as well as what lessons can be applied governments across the country.
Office 365 has garnered widespread adoption from enterprises due to its advantages such as ease of deployment, lower TCO, and high scalability. Additionally, it enables end-users to work and collaborate from anywhere and on any device. Although Office 365 enables IT to shift the burden for app and infrastructure to the cloud vendor, data security remains the responsibility of the enterprise. Given the limitations of native malware protection on Office 365, should the enterprise rely on Office 365 to protect their data from malware and ransomware?
Join Bitglass and Cylance for a discussion on malware protection solutions for Office 365. We will cover the limitations of native Office 365 malware protection as well as the benefits of AI and machine learning based approaches. We will wrap up the session by discussing how CASBs, with Advanced Threat Protection (ATP) capabilities, are uniquely positioned to protect cloud apps and end-points from malware attacks and proliferation.
The healthcare sector is experiencing explosive growth in bandwidth demand. From transmitting MRI images to wearable devices to video consultations, networks must work at higher-than-ever speeds to deliver services that ensure patient safety. It’s clear that this demand will continue to grow exponentially, putting more and more strain on your network infrastructure. Topics to be covered include:
- How IP convergence is driving explosive growth in bandwidth demand, particularly in the healthcare sector
- Healthcare requirements and trends that are contributing to ever-increasing need for more bandwidth
- Cabling best practices that will help you avoid costly mitigation and/or reinstalls in the future
Convergence is a hot trend in today’s data center – with Converged Infrastructure (CI) and Hyper-Converged Infrastructure (HCI) playing a growing role in how IT departments are architecting for the future.
In this session Senior Analyst at Enterprise Strategy Group, Terri McClure, will discuss her recent research in to CI and HCI offerings and why companies turn to convergence to improve infrastructure simplicity and reduce management overhead. Terri will be joined by Vaughn Stewart, VP and Enterprise Architect at Pure Storage to discuss how the latest generation of converged architectures are evolving as the underlying technologies become increasingly sophisticated. Terri and Vaughn will detail some key considerations for buyers who are considering CI or HCI solutions for their critical workloads.
Terri McClure, Senior Analyst, ESG
Vaughn Stewart, VP of Product, Pure Storage
Joel McKelvey, Infrastructure Solutions, Pure Storage
Site availability has become the new competitive advantage. By moving from 3-nines availability to 4-nines, you can catapult your site into the lead. It’s surprisingly easy to adopt methods to dramatically improve your site uptime and resolve issues before they get out of hand. Join PagerDuty and Incapsula to understand how you can take steps today to improve your competitive advantage and deliver customer satisfaction. In this webcast PagerDuty and Incapsula will discuss latest techniques to improve event intelligence and orchestrate incident response. We’ll also demonstrate how developing a cloud-based high-availability solution is surprisingly easy to implement.Read more >
Half of businesses admit security is their biggest concern to increasing user mobility. Securing enterprise mobility has been an ongoing and arduous topic for IT security professionals. Maintaining high-assurance security, while offering access to company resources to an on-the-go workforce has become a balancing act. So much so, a third of businesses actually prevent employee access to company resources via mobile. This is likely not a long term or sustainable solution to the problem.
So how do you find a compromise that won’t kill your security strategy? There are currently many technologies from derived credentials to mobile PKI. IT professionals are feeling the pressure to find a viable, user friendly, easy-to-deploy and secure options. In this webinar, we will discuss the current solutions in-depth and how they impact your current IT security policies. Attendees will learn more about:
-Software-based security versus hardware-based security
-How this impacts your back-end systems
-Technology such as derived credentials and mobile PKI
-Implementing a mobile PKI solution
"The Top 7 Sales Growth Challenges, And How To Solve Them."
Working with our clients we come across many challenges to sales growth, but there are seven of these that we encounter all the time. They do not need to remain a challenge for your business as we have already solved them in our clients' organizations. Now you can benefit from our experience, too.
Data breaches in 2016 got even more personal with big hacks of adult entertainment sites and social media databases. Hackers mined these for gold, in other words, valuable data to create social engineering attacks, ransom operations, and identity theft. According to Gemalto's Breach Level Index, the number of stolen, compromised, or lost records increased by 86% in 2016, while the number of breaches decreased by 4%. Hackers are going after more data than ever before, and they are finding it in large databases that are left relatively insecure.
Whether consciously or not, hackers have grasped the idea of situational awareness. They have figured out how to exploit these golden opportunities by keeping a finger on the pulse of what is going on. It seems too simple to be true, but it goes back to the age-old principle "information is power". Getting the information comes from being aware of one's surroundings. To become situationally aware, companies need to change their mindset—building a walled garden isn't an option anymore. During the webinar, we will look at the major data breach trends and findings from 2016 and discuss how this information can help develop your situational awareness. Join us as we cover topics like:
•What we can learn from Jason Bourne about knowing one's surroundings
•What we can learn from hackers to better protect valuable data
•What we as security professionals can do by going back to the basics of accountability, integrity, auditability, availability, and confidentiality
•How to change our mindset in a new era of a hacker-driven gold rush
In the next 2 years, over 90% of organizations will make net new investments in technologies, like containers, that facilitate DevOps. But as more organizations consider container adoption, a sound approach to workload migration is necessary to ensure the successful introduction of a container-based Platform-as-a-Service (PaaS).
In this webinar, you'll learn the essentials for building a successful container migration strategy, including how to:
-Evaluate and understand the value and impact of PaaS in your organization
-Devise a migration vetting process
-Create a migration plan to optimize business value
-Use lessons learned from other organizations
Sales teams today are capturing more data than ever. The multitude of sales technologies leave teams swimming in data and attempting to measure everything - then lacking a clear idea of what to do with all of it.
In fact, research shows that 83% of the metrics being used by sales leaders are unmanageable*, leaving managers at a disadvantage, even among this abundance of data.
Sales leaders need to get back to the basics. Are your reps spending time with their buyers, and can you measure it?
In this webinar, you will learn the modern sales metrics that will arm you with impactful coaching opportunities. Join LevelEleven CEO Bob Marsh and ClearSlide Sr. Director of Partner Alliances Chris Badger as they dig into the KPIs that matter, and how to drive the data that supports these findings.
Register now to join the live session. Can’t attend? Fill out the form and we’ll send you the recording.
*Research from Vantage Point Performance, 2014
HL7 is growing as a wide-ranging solution to the requirement for improved interoperability. But merely conforming to HL7 specifications is not enough to deliver superior IT performance. This webinar will provide an update through insights into the Standards and explore the steps that healthcare providers are taking in building optimized HL7 application environments.
In this webinar, learn:
* Overview of HL7 standards
* The role of HL7 toward achieving health data interoperability
* How to leverage HL7 for service assurance to uncover the full context of IT service anomalies crossing multiple layers which contribute to slow application response times and poor patient experience in transmitting health information.
The shift of customer service from a cost center to an engagement center will spur investments in more intelligent automation and conversational approaches to service and commerce. With 76% of customers preferring digital channels to communicate with businesses, and roughly 40% choosing to chat with a business through SMS, social media or Facebook messenger, conversational technologies have forever changed the customer service experience. Learn first-hand, from industry peers, how smart chatbots are improving how businesses converse with customers, and nurture relationships across the customer journey.
Join the 451 Group, Ticketmaster and Inbenta for this session to discover how:
•Digital engagement will shift commerce and service from interactions to conversations [The 451 Group predicts that 80% of all customer interactions will eventually be contained in a self-service channel].
•Customers want self-service options on their own terms, in their preferred channels, including SMS, web or mobile chat. [The 451 Group data shows 55% of survey respondents prefer self-serve tools to avoid calling a customer service agent]
•How businesses like Ticketmaster leverage enterprise-class chatbots; key factors to include and what to to avoid when launching a chatbot pilot [55% of companies employ self-service solutions; and 26% say they plan to build a chatbot as part of their self-service strategy]
Single-Use Process Analytical Technologies (PAT) tools have a great potential to not only increase process understanding at the seed stage but also simplify cell culture operations. By utilizing PAT, the risk from bioburden or contamination can be significantly reduced and the overall operating efficiency increased. In fact, PAT also provides a data-driven platform to integrate Process Development and Manufacturing Operations that can mitigate risks associated with technology/process transfer.Read more >
Software Vulnerability Management ist eine Herausforderung für die IT- und Informationssicherheitsstrategie Ihres Unternehmens. Hunderte neue Schwachstellen pro Woche machen das Thema zu einem Albtraum für Sicherheitsprofis. Die Informationen zu sammeln, zu prüfen und sie den relevanten Personen als Grundlage für die Risikobewertung zur Verfügung zu stellen ist eine weitere Herkules-Aufgabe. Doch es geht auch einfacher:
*Was ist Vulnerability Intelligence?
*Wie kann Vulnerability Intelligence Manager eingesetzt werden, um die Herausforderungen zu meistern?
*Wie managen Sie Software Vulnerabilities effektiv?
Nehmen Sie an diesem Webinar teil, um einen Überblick über Vulnerability Intelligence und den Wert für Ihr Unternehmen zu gewinnen. Lernen Sie, wie Sie die Sicherheit Ihrer Anwendungen mit Vulnerability Intelligence Manager effektiv steigern.
La industria de los medios digitales se está volviendo más competitiva cada día, debiendo optimizar la creatividad y el pensamiento estratégico para poder conseguir sus metas de negocio. Los ingresos digitales no compensan a los ingresos tradicionales de medios impresos, la publicidad y las audiencias están cada vez más distribuidas en entre redes sociales y distintas formas de monetización de anuncios.
Únase a Gabriel D'Onofrio, General Manager LATAM en Cxense para comprender como las 4 principales tendencias de la industria están afectando su negocio,, y conozca cuales son las opciones estratégicas más recomendables en base a casos de éxito para poder continuar creciendo en un entorno cada vez más competitivo.
It's easy to feel lost with all the online tools and resources available these days. Office 365 makes it easy to find exactly what you're looking for, right when you need it. Having tools in place to help manage productivity, collaboration and workflow that can transcend technologies and digital transformations is key to business continuity and workload management.
Join this webcast to:
- Learn how to quickly search across Office 365 to find exactly what you are looking for
- Discover relevant resources and experts within your network
- See how Delve in Office 365 can help you and your institution work more efficiently and avoid duplicating efforts
David has been an angel investor for 20 years and has worked with Steve Jobs, Ed Catmul, and others in Silicon Valley. He played a significant role in the development of the Worldwide Web, has written five books, and coaches startups. Last year he was a candidate to be the next dean of Stanford business school. This year, he’s starting his 22nd company.
In this 60-minute webinar, you'll learn what really causes startups to fail, why you shouldn't build an MVP, explore how you can use Kanban to improve team coordination, why understanding your market is more important than understanding your product, raising money from crazy investors, why you shouldn't go to business school, and building an agile culture. Here are some of his writings:
This webinar is for both early-stage investors and entrepreneurs at all levels.
Our Hunter Spotlight series kicks off with Alan Orlikoski. From his 16+ years of security experience, Alan will share:
• Organizational strategies that work for both hunters and SOC managers
• How to create and sustain effective hunting teams
• Best practices and tools in the field
About the hunter:
Alan Orlikoski is a Security Engineer and Incident Responder with over 17 years of experience. He analyzes and tests existing incident response plans, conducts forensic investigations and provides incident response and forensics training. Alan has an extensive computer forensics background and has been a leader in some of the largest incident response and security operations center development programs in the history of the respective companies.
For companies operating online, web speed and performance always impact business outcome. As Cyber-Monday approaches companies are looking to maximize conversion and revenue. Part two of SOASTA’s “Easy Data Science” series illustrates how data science provides a real-time competitive advantage. We’ll show you “how.”
The talk will showcase SOASTA’s data science capabilities for the following outcomes:
- Alerting for campaigns or heightened periods of traffic, modeled from your entire user-event history
- Real-time visibility into user session paths, allowing marketing and development teams to quickly identify and remediate slow loading pages critical to campaign revenue
- Remedy poor user engagement, site slowdowns, and capitalize on revenue opportunities with total visibility across all of your dimensions (OS, Browser, Device, Geo, etc.)