Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Reach for the cloud: Cost-effective scalability with hybrid cloud and SaaS
    Reach for the cloud: Cost-effective scalability with hybrid cloud and SaaS Malcolm Isaacs and Petri Maanonen, HPE Jul 28 2017 5:00 pm UTC 45 mins
    This Webinar will be available OnDemand on July 28, 2017

    The cloud changes two main aspects of application delivery. Firstly, cloud and SaaS models change how applications are built and tested, moving from custom development to composites of on-premises and cloud APIs; and secondly, cloud economics drive development, testing, and lifecycle management tool purchase preference towards SaaS and Cloud utility models. This webinar will explore how taking the time and effort to evaluate the benefits of hybrid-cloud development and testing will ultimately pay off major dividends in cost and agility.
  • How IoT and Predictive Analytics Transform Operations in the Digital Age
    How IoT and Predictive Analytics Transform Operations in the Digital Age Ray Wang, Constellation Research, David Bishop & Martin Boggess, Hitachi Solutions, & Rahul Garg, Microsoft Jul 28 2017 6:00 pm UTC 105 mins
    Today's manufacturers are operating in a world of uncertainty. Successful manufacturers are combating market volatility by focusing on productivity gains via new technology. The Internet of Things (IoT) and predictive analytics are likely to determine who wins and who loses in this age of uncertainty.

    Join this virtual event to hear from leading experts and analysts about technologies manufacturers need to adopt to stay competitive. Industry analyst, Ray Wang will outline the macroeconomics trends affecting the industry and lay a path forward. Experts from Hitachi Solutions will discuss the promise of IoT and the cloud for discovering new opportunities and achieving operational efficiencies. Microsoft’s IoT lead will share upcoming trends to watch.

    Hear leading experts and analysts discuss the state of manufacturing today—and a path to the future.
  • Sales Lessons from the Masters: Session 1
    Sales Lessons from the Masters: Session 1 Ken Smith Jul 31 2017 3:00 pm UTC 60 mins
    Ken Smith will be presenting a four-week webinar training series based on his book "Sales Lessons from the Masters."Great sales people learn from great sales people."


    Agenda:
    *Importance of a sales process
    *Using questions to solve a problem
    *One product may not solve the problem
    *Accident Plan
    -Who is a prospect
    -What problem does it solve?
    -What questions should you ask?
  • Automation, Machine Learning, and AI: Saving Security or Job Stealing Overlords?
    Automation, Machine Learning, and AI: Saving Security or Job Stealing Overlords? Michael Ball CISSP IT Security Consultant, Davi Ottenheimer President of flyingpenguin, Chris Pace, Recorded Future Jul 31 2017 3:00 pm UTC 60 mins
    Headlines as we left 2016 and predictions for 2017 suggest that the future of the IT department (including information security) looks to be increasingly reliant upon machines doing the work, courtesy of the adoption and explosion of automation technologies, artificial intelligence and machine learning. How capable can machines ultimately become in securing businesses from an increasing array of threats? What role does this leave for humans?

    In this webinar we will look at the rise in popularity of artificial intelligence generally, what it means for businesses and its potential to improve efficiency and security. Which areas of security strategy may have the most to gain and lose in this transformation?

    This webinar will:

    • Consider the power of AI in threat intelligence, security operations and incident response
    • Discuss how AI and predictive analytics can lower risk
    • Question whether automation will always require the human factor
  • Gain Visibility into Your Open Source Risk with Veracode Software Composition An
    Gain Visibility into Your Open Source Risk with Veracode Software Composition An Jacob Martel, Solution Architect, Veracode Jul 31 2017 4:00 pm UTC 30 mins
    Most development organizations don’t have the time or the resources to create every application from scratch, so they rely on third-party software and integrate open source components into their internally developed software. However, securing open source components is challenging for many security professionals because they lack visibility into what components are in use where in their organizations.

    At Veracode we know it can be difficult to pinpoint applications using vulnerable open source components. In this 30 minute webinar find out how Veracode Software Composition Analysis can help you:

    •Assess proprietary and open source code in a single scan
    •Build an inventory of your third-party components
    •Gain visibility into which applications have a vulnerable version of a component
    •Identify and remediate vulnerabilities to help comply with industry regulations
  • 7 Advantages (and 3 Disadvantages) of Working with a Local IT Partner
    7 Advantages (and 3 Disadvantages) of Working with a Local IT Partner Jay Jordan, President of CMIT Solutions of West Metro Charlotte, York & Lancaster Jul 31 2017 5:00 pm UTC 30 mins
    Your business runs on technology. From processing transactions to taking and making phone calls; you can't afford any downtime or problems. So who do you count on to manage your business' technology?

    There are several advantages to working with a local IT partner to manage your business technology, but there are also some common pitfalls to avoid. At CMIT Solutions we have seen it all. Don't miss this 30 minute webinar, as we share the realities of what it's like working with a local IT partner.
  • NIST 800-171 Protect CUI or Risk Losing Federal Business
    NIST 800-171 Protect CUI or Risk Losing Federal Business Charles Russell Jul 31 2017 5:00 pm UTC 60 mins
    Federal contractors that process, store or transmit what’s called Controlled Unclassified Information have until December to implement new, more stringent security guidelines to protect that information. Chances are your organization already meets some of the requirements, but it’s unlikely that you meet them all. Join us to identify what’s new, what’s not, what you have to do and how to assess the impact.
  • Is it time to rethink Minimum Variance ?
    Is it time to rethink Minimum Variance ? Wade Guenther, Global ETF Strategist at Horizons ETFs and Christoph Gackstatter, Product Development Manager at STOXX Ltd. Jul 31 2017 6:00 pm UTC 30 mins
    With a trove of low volatility products in the marketplace, you may think your portfolio is covered. But are your investments reducing risk as much as you think?

    Please join our webinar which will focus on how to navigate the low volatility environment, the importance of employing a transparent minimum variance strategy in your portfolio and why you may want to rethink your current allocation.
  • Makeover Monday Viz Review
    Makeover Monday Viz Review Eva Murray Jul 31 2017 6:00 pm UTC 60 mins
    VIZ REVIEW is your chance to join the Makeover Monday community for a 60min live webinar where we discuss selected data visualizations from this week's submissions.
    You can participate in the webinar, ask questions but also submit a viz ahead of time for review (do this on Twitter via the usual process, but also let us know specifically that you'd like to receive feedback during the webinar)

    VIZ REVIEW is our way to provide much more comprehensive feedback for everyone, which is always difficult within the limitations of Twitter.

    Find out more about Makeover Monday on www.makeovermonday.co.uk and join the conversation on Twitter by following Andy (@VizWizBI) and Eva (@TriMyData) as well as the #MakeoverMonday community.
  • Phishing & Credential Abuse 101: Exposing the Ecosystem and Motives Behind
    Phishing & Credential Abuse 101: Exposing the Ecosystem and Motives Behind Jen Miller-Osborn, Unit 42 Threat Intelligence Analyst, Palo Alto Networks Aug 1 2017 2:00 am UTC 60 mins
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will:

    • Identify trends and techniques in methods used for credential theft and abuse.
    • Review how cyber criminals have changed their tactics to compromise networks.
    • Examine who is being targeted, and why.
    • Discuss techniques to stop credential leakage.
  • Die Vorteile von Security as a Service
    Die Vorteile von Security as a Service Sven Janssen Aug 1 2017 8:00 am UTC 75 mins
    Unternehmen stehen heute vor der Herausforderung, robuste Sicherheitsmaßnahmen zu implementieren und gleichzeitig die Investitions- und Betriebskosten in Grenzen zu halten. SecaaS bietet ihnen die Möglichkeit, auf robuste, skalierbare, kosteneffektive und immer verfügbare Cybersicherheitsservices zuzugreifen. Nehmen Sie an diesem SonicWall-Webinar teil und lernen Sie wichtige Vorteile von Security as a Service kennen.
  • Phishing & Credential Abuse 101: Exposing the Ecosystem and Motives Behind
    Phishing & Credential Abuse 101: Exposing the Ecosystem and Motives Behind Jen Miller-Osborn, Unit 42 Threat Intelligence Analyst, Palo Alto Networks Aug 1 2017 9:00 am UTC 60 mins
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will:

    • Identify trends and techniques in methods used for credential theft and abuse.
    • Review how cyber criminals have changed their tactics to compromise networks.
    • Examine who is being targeted, and why.
    • Discuss techniques to stop credential leakage.
  • Staffing a Security Operations Center: Humans vs machines
    Staffing a Security Operations Center: Humans vs machines Seth Goldhammer (Sr. Director of Product Management at LogRhythm) Roselle Safran (Co-founder of Uplevel Security) Aug 1 2017 9:00 am UTC 90 mins
    Industry estimates project that there will be a shortfall of as many as one million cybersecurity professionals in the next few years.

    In this webinar, Seth Goldhammer, senior director of product management at LogRhythm, will join speakers from Dark Reading to discuss how organisations can manage the cybersecurity skills shortage.

    You’ll learn:

    - Methods for improving security operations capabilities with fewer resources
    - Time-saving tools for automating security functions
    - Effective ways to utilise outsourcing and third-party services
    - Best practices for hiring and retaining staff in a competitive market

    Watch now to learn how to manage the lack of skilled cybersecurity professionals.
  • JOHCM UK Equity Income Fund - Q2 2017
    JOHCM UK Equity Income Fund - Q2 2017 James Lowen and Clive Beagles Aug 1 2017 10:00 am UTC 45 mins
    Co-managers James Lowen and Clive Beagles review the Fund's quarterly performance and portfolio activity as well as current portfolio positioning.
  • 6 steps to GDPR compliance
    6 steps to GDPR compliance Adrian Davis, Managing Director, (ISC)² EMEA, Jan Smets, Certified Data Protection Officer, Gemalto Aug 1 2017 11:00 am UTC 60 mins
    The introduction of GDPR is set to bring data protection to the top of businesses’ priority lists. So how can businesses ensure they are compliant and what steps do they need to take?
    In this webinar, certified DPO Jan Smets with provide a six-step overview to help achieve compliance:

    1) Understand the GDPR legal framework
    2) Create a Data Register
    3) Classify your data
    4) Start with your top priority
    5) Assess and document additional risks and processes
    6) Revise and repeat
  • RESILIA™ - HELPING BALANCE TRANSFORMATION AND RESILIENCE IN THE DIGITAL WORLD
    RESILIA™ - HELPING BALANCE TRANSFORMATION AND RESILIENCE IN THE DIGITAL WORLD Nick Wilding - Manager, Cyber Resilience, AXELOS. Stuart Rance - Managing Director, Optimal Service Management Aug 1 2017 1:00 pm UTC 45 mins
    Our globally connected world delivers a wealth of opportunities for economic growth and innovation but it also brings with it the real risk of cyber-attack. Many organizations continue to invest in multiple layers of ‘intelligent’ technical controls to protect themselves from cyber attackers. However, security breaches continue to grow in their scale and impact. There’s something missing in our organisational response to the cyber risks we face.

    Effective cyber resilience need to focus on aligning strategic priorities, service management tools, operational systems and architectures with ongoing training and involvement of people across the organization. By applying these proven disciplines organizations can more effectively balance their business opportunities and risks, their people, processes and technology and their ability to prevent, detect and respond to cyber-attacks.

    This webinar will outline the cyber resilience challenges and the opportunities open to organizations and how RESILIA™ best practice can be used to build the critical collaboration between ITSM and InfoSec teams needed to effectively manage and respond to the cyber risks they face.

    Speakers:

    Nick Wilding:
    General Manager of RESILIA at AXELOS where he’s responsible for leading the successful design, development and demand of the RESILIA portfolio that provides cyber resilience best practice, training, learning and insight for organisations from the boardroom down. Previous to AXELOS Nick spent 11 years at Detica (now BAE Systems Applied Intelligence) where he helped set up their Cyber Security business and led their cyber market engagement and thought leadership.

    Stuart Rance:
    An expert in information security management and IT service management. He works with IT organizations all over the world, helping them create value for their customers. Stuart is an author of ITIL® and RESILIA™ and blogs at optimalservicemanagement.com. He is chief examiner for RESILIA, and an examiner for ITIL.
  • Intro to Anypoint Exchange 2.0 & API Designer
    Intro to Anypoint Exchange 2.0 & API Designer Ahyoung An, Sr. Manager, Product Marketing, MuleSoft; Amit Saxena, Sr. Director, Product Management, MuleSoft Aug 1 2017 3:00 pm UTC 60 mins
    It’s clear that reusing high-quality IT assets accelerates onramp and development, yet in most organizations, there is a lack of reuse because discovering, saving, updating and reusing assets is often cumbersome. To solve this costly challenge, we are introducing the new Anypoint Exchange and API designer.

    Join this webinar to learn how to:

    - One-click save reusable IT assets such as APIs for reuse
    - Keep assets high quality, relevant and useful through collaboration
    - Increase the reuse of assets by intentionally curating them for specific users
  • You Can't Always Get What You Want: Manufacturing Webinar
    You Can't Always Get What You Want: Manufacturing Webinar John Brandt, CEO of the MPI group and Marcia Walker, Principal Consultant, SAS Aug 1 2017 3:00 pm UTC 60 mins
    A majority of manufacturers in MPI’s recent survey are now making money off the IoT – a big change from just two years ago. But challenges remain. Many decision makers can’t access essential data: They can’t always get what they want. This growing digital divide means that improvements in operations, supply chain, logistics, and customer service are being delayed for some while others are benefiting. Webinar attendees will learn how their manufacturing peers benefit from IoT data today, what solutions, such as streaming analytics, are gaining traction, and where early adopters are seeing success.
  • The Download: Tech Talks by the HPCC Systems Community, Episode 6
    The Download: Tech Talks by the HPCC Systems Community, Episode 6 Flavio Villanustre Aug 1 2017 3:00 pm UTC 105 mins
    Join us as we continue this series of workshops specifically designed for the community by the community with the goal to share knowledge, spark innovation and further build and link the relationships within our HPCC Systems community.

    Episode 6 will include 15 minute Tech Talks from our HPCC Systems summer interns. Come hear the cool projects they have been working on!

    This session will include Lorraine Chapman, Consulting Business Analyst, LexisNexis Risk Solutions, who manages our HPCC Systems internship program, along with our 2017 HPCC Systems summer interns. Come hear the cool projects they have been working on!

    Lily Xu - PhD student of Computer Science at Clemson University, USA
    Extending the YinYang K-Means machine learning algorithm in ECL

    Vivek Nair - PhD student of Computer Science North Carolina State University, USA
    Working to allow Spark to use HPCC Systems as a datastore and provide ECL programmers with the ability to access Spark algorithms.

    George Mathew - PhD student of Computer Science at North Carolina State University, USA
    Implementing the Gradient Trees machine learning algorithm in ECL to build predictive models.
  • Introducing Mobile Threat Defense for the Cloud Generation
    Introducing Mobile Threat Defense for the Cloud Generation Sri Sundaralingam, Head of Product Marketing, Enterprise Security Products, Symantec and Varun Kohli, VP Marketing, Skycure Aug 1 2017 3:00 pm UTC 60 mins
    Learn how you can protect both BYOD and corporate managed mobile devices from ransomware and advanced threats.

    Malware targeting mobile devices are growing at an alarming rate. According to Symantec ISTR 22 report, mobile malware detections doubled in 2016 to a total of 18.4 million and there were 606 new mobile vulnerabilities found in 2016 on both iOS and Android mobile operating systems.

    This has increased the risks to BYOD and corporate managed mobile devices to malware attacks, suspicious wireless networks and man-in-the-middle attacks.

    Existing management tools like Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) are not able to defend users against these types of threats. Enterprises need advanced mobile security with high efficacy with easier deployment options as they continue to expand Bring Your Own Device (BYOD) and corporate managed mobility initiatives.
  • How to Identify, Disrupt and Dismantle Unauthorized Product Distribution
    How to Identify, Disrupt and Dismantle Unauthorized Product Distribution Josh Hopping, Investigative Research Specialist; Annie Wood, Client Service Manager Aug 1 2017 4:00 pm UTC 60 mins
    As widespread unauthorized product distribution reaches a new level of complexity, brand owners are finding themselves mired in a “whack-a-mole” battle against fraudsters. Unauthorized sellers are adept at setting up new sites and marketplace listings almost as quickly as they are taken down. Meanwhile, their multi-level marketing networks allow them to hide behind layers of anonymity.

    Please join MarkMonitor brand protection experts Josh Hopping and Annie Wood as they discuss how to generate actionable intelligence and leverage investigative tactics to disrupt and dismantle infringing online networks at their source.

    During this webinar, you’ll learn how to:

    -Identify interconnected networks of infringing activity and shut them down
    -Use test purchases and investigations to support legal action
    -Connect the dots between online infringement and physical enforcement
  • Transforming K-12 Cybersecurity Through Visibility
    Transforming K-12 Cybersecurity Through Visibility Dr. Kecia Ray, Exec Director, Center for Digital Education & Erik Floden, K12 Education Strategist, ForeScout Technologies Aug 1 2017 4:00 pm UTC 60 mins
    As school districts continue to make technology adoption in the classroom a top priority, they face increasing network security risks, including persistent cyberattacks and the potential theft or manipulation of student data. Dr. Kecia Ray, Executive Director of the Center for Digital Education, will address these challenges and discuss how school districts can effectively manage the rapid expansion of the number of devices students, educators and administrators are adding to their IT networks. Webinar topics will include:
    • Cybersecurity and student data security trends in K-12
    • Top K-12 priorities to address these challenges
    • Recent funding and legislative developments at federal and state levels
  • Cradlepoint Unifies NetCloud Platform with New Updates
    Cradlepoint Unifies NetCloud Platform with New Updates Cradlepoint's Product Management Team Aug 1 2017 4:00 pm UTC 60 mins
    Join the Cradlepoint Product Management team to learn about these new updates to the Cradlepoint NetCloud Platform.

    Cradlepoint updates key software elements to unify them under the NetCloud Services umbrella: 
    NetCloud OS: Router firmware is named and elevated as a key pillar of the NetCloud Platform
    NetCloud Manager: Enterprise Cloud Manager, the single-pane-of-glass management service for all Cradlepoint solutions, is renamed NetCloud Manager
    NetCloud Engine: A Software-Defined Perimeter service offering dark cloud security

    When combined with Cradlepoint routers, this integrated platform of flexible, extensible, and rapidly deployable applications enables an entirely new way to easily build, secure, control, and manage end-to-end private networks in the cloud.

    Cradlepoint is also launching NetCloud OS 6.4 router software for enhanced network security and configuration flexibility. Cradlepoint leverages NetCloud Manager’s unique connectivity to enable secure cloud management for non-cloud-managed third-party devices, plus enhancements to Out-of-Band Management capabilities.

    Cradlepoint continues to invest in NetCloud Engine to bring the advantages of dark cloud security (or of a software-defined perimeter) to customers who need to integrate IoT connections into corporate networks.