Hi [[ session.user.profile.firstName ]]

2014 Predictions for Telecommunications Services in Latin America

Why You Should Attend:

- Hear Frost & Sullivan's main predictions for telecom services
- Identify key drivers and restraints
- Participate in an interactive Q&A session
Why You Should Attend:

- Hear Frost & Sullivan's main predictions for telecom services
- Identify key drivers and restraints
- Participate in an interactive Q&A session
Recorded Jan 14 2014 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Renato Pasquini, Industry Manager
Presentation preview: 2014 Predictions for Telecommunications Services in Latin America
Recommended for you:
  • Date
  • Rating
  • Views
  • Improve CX, Productivity, Revenues and Security with Identity Coherence Improve CX, Productivity, Revenues and Security with Identity Coherence Steve Tout of Forte Advisory Live 60 mins
    Customers expect a seamless experience across services and devices, critical to ensure successful conversions and renewals in e-commerce. At the same time, the impact of disconnected user experience on employee productivity can have significant financial implications. Big egos, politics, a shortage of skilled talent, legacy systems and complexity can also conspire to undermine the success of your IAM program unless you plan for and take massive action today. Join Steve Tout as he presents Identity Coherence, a blueprint for creating massive value and success with IAM in a multi-vendor, multi-cloud environment.
  • Scary Facts About Online Security Scary Facts About Online Security Tricia Pattee, HOSTING Director of Managed Services Live 45 mins
    As the Internet of Things encourages businesses to embrace big data, IT professionals turn to online resources to house and manage applications. However, cyber attacks are increasingly becoming a matter of “when,” not “if,” leading IT professionals to seek robust security solutions. Still on the fence about whether your small to medium sized enterprise really needs that much protection? Join Tricia Pattee, Product Manager at HOSTING, for a 30 minute webinar about scary facts about online security you need to know. Bring your questions – we’ll host a Q&A at the end of the presentation.
  • Securing the Foundation to Secure the Cloud Securing the Foundation to Secure the Cloud J. Trent Adams, Director of Ecosystem Security, PayPal Recorded: May 5 2016 42 mins
    Secure clouds don't exist in a vacuum. The very nature of a secure cloud relies on effective standardized, interoperable, and scalable Internet security. As the cloud metaphor displaces the concept of proprietary point-to-point networked servers, the key to its value can be found in the interoperability of service protocols. Securing these connections requires understanding and deploying standards such as TLS HSTS, CT, CSP, DMARC, and FIDO. Each protocol addresses specific security concerns encountered when you extend your security perimeter to include external cloud services. Developing and deploying technologies like these requires a holistic view of the security landscape, and working within a robust Internet security ecosystem.

    Key Talking Points:

    - Cloud security relies on standardized Internet security protocols.

    - Developing Internet security protocols requires multistakeholder involvement.

    - Key areas of focus include securing: transport, content, communication, and authentication.

    - Case studies presented in developing CT, CSP, DMARC, FIDO, and TLS 1.3

    - Internet security is constantly evolving; adapt or perish.
  • Securing the Foundation to Secure the Cloud Securing the Foundation to Secure the Cloud J. Trent Adams, Director of Ecosystem Security, PayPal Recorded: May 5 2016 42 mins
    Secure clouds don't exist in a vacuum. The very nature of a secure cloud relies on effective standardized, interoperable, and scalable Internet security. As the cloud metaphor displaces the concept of proprietary point-to-point networked servers, the key to its value can be found in the interoperability of service protocols. Securing these connections requires understanding and deploying standards such as TLS HSTS, CT, CSP, DMARC, and FIDO. Each protocol addresses specific security concerns encountered when you extend your security perimeter to include external cloud services. Developing and deploying technologies like these requires a holistic view of the security landscape, and working within a robust Internet security ecosystem.

    Key Talking Points:

    - Cloud security relies on standardized Internet security protocols.

    - Developing Internet security protocols requires multistakeholder involvement.

    - Key areas of focus include securing: transport, content, communication, and authentication.

    - Case studies presented in developing CT, CSP, DMARC, FIDO, and TLS 1.3

    - Internet security is constantly evolving; adapt or perish.
  • Securing the Foundation to Secure the Cloud Securing the Foundation to Secure the Cloud J. Trent Adams, Director of Ecosystem Security, PayPal Recorded: May 5 2016 42 mins
    Secure clouds don't exist in a vacuum. The very nature of a secure cloud relies on effective standardized, interoperable, and scalable Internet security. As the cloud metaphor displaces the concept of proprietary point-to-point networked servers, the key to its value can be found in the interoperability of service protocols. Securing these connections requires understanding and deploying standards such as TLS HSTS, CT, CSP, DMARC, and FIDO. Each protocol addresses specific security concerns encountered when you extend your security perimeter to include external cloud services. Developing and deploying technologies like these requires a holistic view of the security landscape, and working within a robust Internet security ecosystem.

    Key Talking Points:

    - Cloud security relies on standardized Internet security protocols.

    - Developing Internet security protocols requires multistakeholder involvement.

    - Key areas of focus include securing: transport, content, communication, and authentication.

    - Case studies presented in developing CT, CSP, DMARC, FIDO, and TLS 1.3

    - Internet security is constantly evolving; adapt or perish.
  • Securing the Foundation to Secure the Cloud Securing the Foundation to Secure the Cloud J. Trent Adams, Director of Ecosystem Security, PayPal Recorded: May 5 2016 42 mins
    Secure clouds don't exist in a vacuum. The very nature of a secure cloud relies on effective standardized, interoperable, and scalable Internet security. As the cloud metaphor displaces the concept of proprietary point-to-point networked servers, the key to its value can be found in the interoperability of service protocols. Securing these connections requires understanding and deploying standards such as TLS HSTS, CT, CSP, DMARC, and FIDO. Each protocol addresses specific security concerns encountered when you extend your security perimeter to include external cloud services. Developing and deploying technologies like these requires a holistic view of the security landscape, and working within a robust Internet security ecosystem.

    Key Talking Points:

    - Cloud security relies on standardized Internet security protocols.

    - Developing Internet security protocols requires multistakeholder involvement.

    - Key areas of focus include securing: transport, content, communication, and authentication.

    - Case studies presented in developing CT, CSP, DMARC, FIDO, and TLS 1.3

    - Internet security is constantly evolving; adapt or perish.
  • Planning for SOC 3.0 Planning for SOC 3.0 Moderator: Stephen Pritchard - Speakers: Haim Goldshtein & Brian Honan Recorded: May 5 2016 60 mins
    What is the next-generation Security Operations Centre (SOC)? Security operations are challenged with threat complexity, alert fatigue, prioritization and skill shortage. Security operations are required to be more closely aligned with business processes. A SOC should not only be able to contain an incident, but to manage the complete incident workflow across business units in the entire organization, as well as outside the organization.

    In this webinar we will examine the foreseen challenges in managing next-generation security operations and present a case study demonstrating the tools and processes being used by a forward-looking enterprise to prepare for SOC 3.0.

    Key takeaways:

    • Which challenges should enterprises prepare for when planning security operations?
    • [case study] which tools and processes do forward-looking enterprises use to build the next-generation SOC?
    • How can enterprises who are not in position to build their own SOC manage security incidents effectively?
  • IBM Government Analytics Forum Livestream IBM Government Analytics Forum Livestream IBM Live 560 mins
    Wherever you are in the mission space – IT, development, program management, research or analysis – we all have one thing in common: We strive to meet mission outcomes that will transform and improve government services. But in a world of exponential change, federal agencies must continue to be innovative, agile and informed in order to make the best possible decisions to achieve results.

    Analyzing and understanding data allows federal agencies to generate predictive insights that lead to impactful actions and ultimately create a smart, efficient and highly-capable government. At the 2016 Government Analytics Forum, we’ll explore ways to:

    - Build a better understanding of the data acquired anywhere from social interactions to sensors, weather patterns to wearables, transactions to interactions and more
    - Develop informed decisions that drive mission performance and innovation in the areas of citizen programming, operational management, and threat mitigation
    - Expand and apply advanced analytics to enhance mission outcomes, reduce risks, and operate more efficiently
  • Assumption of Attack Webinars series #5: Central Management (Italian) Assumption of Attack Webinars series #5: Central Management (Italian) Alberto Malerba, Senior Sales Engineer, Trend Micro. Recorded: May 5 2016 15 mins
    Il 18 febbraio abbiamo lanciato la nostra serie di webinar dal titolo Assumption of Attack e abbiamo parlato di come le Smart Protection Suite ti assicurano una protezione completa e avanzata che costituisce uno scudo protettivo estremamente difficile da penetrare per i criminali informatici.

    Il nostro quinto webinar guarderà dietro la porta n. 5, Gestione centralizzata. Come puoi riuscire a gestire a livello centrale i criteri su minacce e dati per tutta l’infrastruttura IT? Quali sono i vantaggi di una visibilità utente-centrica in tutto il tuo ambiente?
  • Data, the new oil: Find out why and what it means for your organization Data, the new oil: Find out why and what it means for your organization Moderator: Adrian Davis, (ISC)² EMEA; Speaker: Jason Hart, IDP CTO, Gemalto Recorded: May 5 2016 62 mins
    Every day, we create 2.5 quintillion bytes of data — so much that 90% of the data in the world today has been created in the last two years alone.
    More data in more places is leading to an increasing number of data breaches with attackers intent on trying to monetize your sensitive information.
    Jason Hart, IDP CTO at Gemalto will explain why data is the new oil and how easy it is to get hacked with a live hacking demo.
    In this interactive webinar we will also discuss:
    - Why your data is wanted
    - The new data Protection paradigm
    - Live Hacking demo
    - What’s next and what to do now to remain on the safe side

    Join the webinar to find out what you should know about Data Protection, how Cloud, IOT and big data impact your information security solutions and to how to keep your data safe.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 2014 Predictions for Telecommunications Services in Latin America
  • Live at: Jan 14 2014 3:00 pm
  • Presented by: Renato Pasquini, Industry Manager
  • From:
Your email has been sent.
or close
You must be logged in to email this