Hi [[ session.user.profile.firstName ]]

HPE ALM Octane – Deliver High Quality Applications at Speed

As the industry accelerates adoption of DevOps for speed, quality and scale, HPE is evolving their ALM and quality solutions to embrace Agile and DevOps best practices. ALM Octane embraces Agile and Continuous Integration processes and in this webinar, HPE shall showcase some of the newest ALM Octane features, and paint a picture of what the future will look like for unprecedented lifecycle agility.

Join us and hear about:

The new ‘Team BackLog’ module for Agile planning
Pipeline Build Analytics
Personalized ‘My Work’ page
Recorded Nov 15 2016 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Vandan Nayak HPE
Presentation preview: HPE ALM Octane – Deliver High Quality Applications at Speed

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Achieving Data Agility in a DevSecOps World Dec 11 2019 11:00 am UTC 35 mins
    Sanjeev Sharma, VP and Global Practice Director for Data Modernization, Delphix
    As organizations mature on their DevOps adoption journey, adopting Continuous Integration and Continuous Delivery (CI/CD) automation, and breaking down organizational silos, application delivery and infrastructure provisioning speed is being accelerated. The next challenge now being exposed is the lack of agility in delivering Data into non-production environments.

    Development and Testing require the availability of relevant data in the production-like Dev and Test environments on demand, to ensure rapid testing and validation of each Build. Data is however difficult to provision and deliver on demand. This results in Data Friction being the impediment to true ‘flow’ through application delivery pipelines. Other than the inherent cost and time it takes to provision and store data instances, there is also the risk that exponentially increases as more and more instances of Data are provisioned in multiple non-production environments.

    As Dev-Test teams deliver faster and leverage more environments across parallel development streams, the number of non-production Data instances is typically several orders of magnitude higher than Production instances, increasing the exposed surface area. The ask hence is to be able to provision and deliver production-like Data instances, on-demand, as, when and where Dev-test practitioners need them in non-prod environments, while securing the Data at the same time.

    In this session Sanjeev Sharma, VP and Global Practice Director for Data Modernization will discuss practices large enterprises need to adopt, across Process, Technology and People in order to be able to Provision, Deploy, Manage, Govern, and Secure Data in Application Delivery Pipelines, addressing Data Friction and Data Security challenges that may be impeding DevSecOps adoption.
  • CCS [Ep.6]: Next-Generation Cybersecurity - Policy Process and Organization Oct 31 2019 3:00 pm UTC 60 mins
    Johna Till Johnson, CEO and Founder, Nemertes Research
    Cloud and Cybersecurity Series [Ep.6]: Next-Generation Cybersecurity: Policy Process and Organization

    Resources are finite. So deploying them wisely is what differentiates successful cybersecurity organizations from those that are less successful. Find out how these successful cybersecurity organizations are structured, what policies they have in place, and what strategies they do—and don’t—follow to protect their enterprise organizations.
  • Agile Blind-spots: Angles to Keep at Sight for a True Agile Transformation Oct 24 2019 10:00 am UTC 45 mins
    Cristiane (Coca) Pitzer, Retail inMotion
    This Talk is based on real-life experience while leading Agile transformation in organisations.

    I will speak about what I have learned as well as some angles I almost missed, and that other Agile Coaches typically miss while identifying corporate problems.

    A practical session where I call out the blind spots and actual actions taken to course-correct.

    Presented by:
    Cristiane (Coca) Pitzer, Head of Agile & Agile Transformation, Retail inMotion
  • CCS [Ep.5]: Application Security Meets Multicloud Oct 23 2019 5:00 pm UTC 60 mins
    John Burke, CIO and Principal Research Analyst, Nemertes Research
    Cloud and Cybersecurity Series [Ep.5]: Application Security Meets Multicloud

    Enterprises are developing and buying applications to run everywhere: across multiple clouds, multiple data centers, desktops, mobile devices, and IoT devices. In a multicloud environment, IT needs to take a multipronged approach to securing applications.

    We'll how organizations approach securing their applications for the multicloud, ranging from changes in the development process to the embrace of security technologies including IAMaaS, microservice authentication, and enterprise secure cloud access and policy enforcement (ESCAPE).

    This webinar presents data from Nemertes' in-depth research study of 335 organizations in 11 countries across a range of vertical industries.
  • Common Security Misconfigurations and How Not to Get Hacked Oct 23 2019 8:00 am UTC 60 mins
    Michal Brygidyn, Cloud Solutions Architect | Security Researcher, PGS Software
    Michal Brygidyn, Cloud Solutions Architect and Security Researcher for PGS Software, will suggest helpful hints and tips on how Data Leaks occur and what your organisation can do to mitigate the risk. He'll also be discussing:

    - Black Hats – How They WILL Exploit You
    - Cloud Infrastructure Security: AWS Oriented Good Practices
    - How can these security issues be tackled

    Register for this session, listen in live and put your questions to Michal.
  • ICE [Ep.6]: Setting Budgets, Finding Stakeholders for AI-Enabled DCX Projects Oct 22 2019 3:00 pm UTC 60 mins
    Robin Gareiss, President and Founder, Nemertes Research
    Intelligent Customer Engagement Series [Ep.6]: Setting Budgets, Finding Stakeholders for AI-Enabled DCX Projects

    As IT and business leaders evaluate their how to use AI to improve customer experience, one of the biggest roadblocks is funding.

    This webinar provides step-by-step guidance on finding stakeholders to fund the projects, with specific data on how much companies are spending today on their AI-enabled initiatives.
  • Usage Based Software Testing With AI Tools and Automation Oct 22 2019 7:00 am UTC 60 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    Usage based testing allows engineering organizations to ramp up different types of software testing into their environment and equally quickly ramp down whenever needed. Software regression testing is composed of three distinct phases : Creation, execution and analysis. Utilizing AI tools built on a cloud infrastructure it is now possible to reduce setup/create time fo regression testing from months to weeks, execution time from days to 24 hours or less and analysis time from 10's of hours to mere hours.
  • ICE [Ep.5]: CX Success Stories Require Technology, Leadership, Data Recorded: Oct 9 2019 59 mins
    Robin Gareiss, President and Founder, Nemertes Research
    Intelligent Customer Engagement Series [Ep.5]: CX Success Stories Require Technology, Leadership, Data

    A great story requires more than a compelling narrative. Marketing teams can significantly elevate their success with the right combination of leadership, technology, and data derived from well-planned customer interviews.

    Crafting that perfect story requires an expanded mindset about what comprises “marketing.”

    In this webinar, join Nemertes Research President Robin Gareiss, who recently completed detailed research with 518 companies on how they use advanced technologies and reshape their organizational structure to improve customer experience. Based on this research and her experience as a journalist, marketing content developer, and CX advisor, she will cover:

    1. Organizational overhaul: Why a Chief Customer Officer is vital, and how the CMO and CCO work together for joint success.
    2. Technology leverage: What are the key technologies and contact-center initiatives that result in measurable CX success—ultimately delivering crucial data to marketing teams that support their success stories?
    3. The perfect story: How to conduct interviews that get real-world data to support your mission.
  • CCS [Ep.4]: Next-Generation Cybersecurity - Technology Foundations Recorded: Oct 1 2019 53 mins
    Johna Till Johnson, CEO and Founder, Nemertes Research
    Cloud and Cybersecurity Series [Ep.4] Next-Generation Cybersecurity - Technology Foundations

    The bad news? Threats evolve. Bad actors continue to improve their games.
    The good news? Cybersecurity technology is also evolving and improving. This webinar drills down into the emerging technologies that successful cybersecurity organizations are deploying to protect their firms. Find out what works, what's a waste of resources--and how to deploy the technologies that work.
  • ICE [Ep.4]: Analytics' Role in Improving DCX Recorded: Sep 26 2019 45 mins
    Robin Gareiss, President and Founder, Nemertes Research
    Intelligent Customer Engagement Series [Ep.4]: Analytics' Role in Improving DCX

    Information is king, and without both real-time and historical data, it's nearly impossible to deliver the experience customers are expecting.

    Analytics tools are providing incredible insight to companies about customer sentiment, agent performance, and predictive actions.

    In this webinar, learn how successful organizations are using analytics to drive more revenue, reduce costs, and improve the customer experience.
  • CCS [Ep. 3]: Succeeding in the Multicloud Recorded: Sep 24 2019 39 mins
    John Burke, CIO and Principal Research Analyst, Nemertes Research
    Cloud and Cybersecurity Series [Ep.3]: Succeeding in the Multicloud

    With most IT work being done in the cloud, what does it mean to be successful and what are the characteristics of highly successful cloud enterprises?

    We'll dig into the what it means to be successful in the cloud and what successful organizations do more of (and less of) than their less successful peers. We'll look across technologies adopted, organizational and operational practices, and vendors embraced.

    This webinar presents the highlights of Nemertes' in-depth research study of 335 organizations in 11 countries across a range of vertical industries. Later episodes will discuss security topics as well as focusing in on application development and security.
  • CCS [Ep.2]: Mastering Multicloud - Architectures, Organizations, Building Blocks Recorded: Sep 12 2019 57 mins
    John Burke, CIO and Principal Research Analyst, Nemertes Research
    Cloud and Cybersecurity Series [Ep. 2]: Mastering Multicloud - Architectures, Organizations, Building Blocks

    In 2019 the balance tipped, and for the first time the majority of enterprise IT workloads are running in the cloud, not in a data center.

    Enterprise IT staff need to stop thinking of cloud solutions as islands of function and special cases and begin to think of pulling it all together into a cohesive multicloud. We'll lay out the major categories of tools and systems and how they fit together, and at the organizational structures and operational practices needed to support multicloud operations.

    This webinar presents the highlights of Nemertes' in-depth research study of 335 organizations in 11 countries across a range of vertical industries. Later episodes will discuss cloud organizations and operational practices, and success metrics and best practices for cloud organizations.
  • ICE [Ep 3]: The Agent Experience - From Good to Great Recorded: Sep 10 2019 51 mins
    Robin Gareiss, President and Founder, Nemertes Research
    Intelligent Customer Engagement Series [Ep 3]: The Agent Experience - From Good to Great

    Although organizations are busy adding self-service channels, and AI-enabled chatbots or virtual agents to their customer engagement strategies, there is no replacement for the human touch.

    Successful companies are transforming the agent experience, delivering better coaching, more analytics, and improved compensation packages.

    Learn how you can leverage AI and analytics to reduce contact center agent turnover rates--and ultimately improve the customer experience.
  • CCS[Ep1]: Next-Generation Cybersecurity - Success Metrics, Best Practices & More Recorded: Sep 5 2019 59 mins
    Johna Till Johnson, CEO & Founder, Nemertes Research
    Cloud & Cybersecurity Series [Ep.1]: Success Metrics, Best Practices & More

    What does it take for enterprise cybersecurity teams to "up their games" to the next level of cybersecurity? What does it mean to be a "successful" cybersecurity organization, and what technologies and practices does it take to become one?

    This webinar presents the highlights of Nemertes' in-depth research study of 335 organizations in 11 countries across a range of vertical industries.

    We separated the best from the rest, and took an in-depth look into what made the most successful organizations that way. Participants will come away with best practices, tools, technologies, and organizational structures that contribute to success. Most importantly, they'll learn how to measure cybersecurity success--and their progress towards it.
  • Speed Matters in AppSec: How to Start Improving Your Fix Rate Recorded: Sep 3 2019 40 mins
    Pejman Pourmousa, Vice President, Services, Veracode and Amy DeMartine, Research Director, Forrester Research
    The most important function of an application security program is effectively fixing flaws once they’re discovered. But the speed of that fix rate matters — the time it takes for attackers to come up with exploits for newly discovered vulnerabilities is measured in days, and sometimes hours. Yet our most recent State of Software Security report found that one in four high and very high severity flaws aren’t addressed within 290 days of discovery.

    Improving your fix rate is critical, but the sheer volume of vulnerabilities present in most organizations’ application portfolios makes it necessary for them to make daily tradeoffs between security, practicality, and speed.

    This might seem like an insurmountable problem, but our data also presents hopeful glimpses at potential prioritization and software development methods that could help organizations reduce risk more quickly. In this session, we’ll share some steps and best practices that will start lowering your fix rate.

    This session is part of Veracode's "Your AppSec Game Plan" Summit.
  • Shifting Security Right: Know What Web Apps You Own Recorded: Sep 3 2019 34 mins
    Bipin Mistry, Director of Product Management, Veracode
    It’s more common than you think that organizations and brands have more web apps than they realize. In fact, Veracode customers often find roughly 30 per cent more applications than they knew about. With one project Veracode worked on for a high street bank in the UK, they discovered 1,800 websites that had yet to be logged.

    There are a number of reasons unknown or unlogged web applications continue to live in your portfolio. For example, through M&A activity, more than just a company or brand is acquired – you also acquire their web assets. Further, the digital landscape is decorated with marketing promotional sites meant to attract attention. And the very thing meant to draw attention to your brand and boost your bottom line is the same target attackers go after to infiltrate your organization.

    Join this session to learn how to uncover unknown web applications in your portfolio to ensure their security from cyberattackers.

    This session is part of Veracode's "Your AppSec Game Plan" Summit.
  • Practical Steps to Start Using Open Source Code More Securely Recorded: Sep 3 2019 42 mins
    Javier Perez, Director of Product Management, Veracode
    Open source frameworks have changed the business world in profound ways. They’ve ushered in a level of speed, innovation, and convenience that significantly alters the IT equation. With large numbers of developers and others contributing to a project, it’s possible to advance and evolve software in ways that wouldn’t have been imaginable in the past. What’s more, this form of open collaboration benefits everyone by making software available at a lower cost point — and sometimes even at no cost.

    Make no mistake, open source software libraries are here to stay – and they can introduce new and sometimes dangerous risks to an enterprise. The use of open source code increases the number of users affected as well as the number of exposure points. It’s vital to have a strategy and framework in place to manage open source libraries and components. Otherwise, the road to digital transformation will likely be paved with frustrations, problems, and even failures.

    Open source software risks revolve around three key areas: visibility, security, and governance.

    In this session we will help you understand these factors and how to formulate a stronger cybersecurity strategy that protects you from open source risk.

    This session is part of Veracode's "Your AppSec Game Plan" Summit.
  • Steps to Creating Security Champions on your Application Development Team Recorded: Sep 3 2019 44 mins
    Ryan O'Boyle, Manager, Product Security, Veracode
    One of the most powerful things an organization can do to improve its security posture is to cultivate security-mindedness in its developers. Security and development teams often feel at odds with one another and yet they share a common goal: to put quality code into production. Bringing these teams into closer contact gives them a deeper understanding of each other’s pressures, priorities, and processes.

    Developers are well-positioned to address application security. By designing applications with security in mind, and finding and fixing flaws early in the software development lifecycle, developers shift security left. In doing so they both lighten the burden on the security team and reduce unplanned work for themselves down the road.

    An interested developer—given the right direction, encouragement, and tools—can become an effective security champion.

    Join this session to learn how to identify the right developers for this role and how to best train and support them over time. Your security champions will advocate for security as a non-negotiable component of code quality and in turn foster security-mindedness in their peers, amplifying security knowledge across the organization.

    About the speaker: Ryan O’Boyle is a Principal Security Researcher at Veracode, and a certified ScrumMaster. Prior to joining Veracode, he helped create the internal penetration testing team at Fidelity Investments, where he was focused not only on finding vulnerabilities but helping engineers fix them and avoid them altogether.

    This session is part of Veracode's "Your AppSec Game Plan" Summit.
  • Which AppSec Testing Type is Right for You? Recorded: Sep 3 2019 42 mins
    Chris Kirsch, Director Product Marketing, Veracode
    Although there are a variety of application security technologies, there is no silver bullet. You need to gather the strengths of multiple analysis techniques along the entire application lifetime — from development to testing to production — to drive down application risk. Each testing type, from static to dynamic to software composition analysis and manual pen testing, has different strengths and weaknesses and are better in different scenarios, but you won’t be effective without taking advantage of them all.

    Join this session to understand the strengths and weaknesses of the different AppSec testing types, how they work together, and how to get started.

    This session is part of Veracode's "Your AppSec Game Plan" Summit.
  • Shifting Application Security Left: Where to Start Recorded: Sep 3 2019 34 mins
    Chris Wysopal, CTO, Veracode
    The demands of modern software development and the rise of DevOps are shifting security left into the early phases of the development lifecycle. Companies that navigate this significant cultural, organizational, and technological change well are outpacing their competitors. But where to begin?

    In this session, we will describe five essential steps for shifting security left:

    1) Make security autonomous from day one.
    2) Integrate as you code.
    3) Avoid false alarms.
    4) Create security champions.
    5) Maintain operational visibility.

    Equipped with this guidance you can begin to make the changes that will transform application security into a responsibility that is shared by development and security and that continues once applications are in production and operation. By shifting security left, you unburden your security team, empower your developers to write better code from the start, and deliver stronger, better applications than your competitors.

    This session is part of Veracode's "Your AppSec Game Plan" Summit.
Trends and insights for developing apps and maintaining service
The webcasts in this channel will highlight trends and best practices for the application development lifecycle as well as how to make sure your application maintain a steady level of service.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: HPE ALM Octane – Deliver High Quality Applications at Speed
  • Live at: Nov 15 2016 6:00 pm
  • Presented by: Vandan Nayak HPE
  • From:
Your email has been sent.
or close