Tim Woods, Vice President of Technology Alliances | Elisa Lippincott, Director of Product MarketingRecorded: Feb 22 201956 mins
Many enterprises are adopting a cloud-first strategy in efforts to drive business innovation and growth. As cloud deployments grow, security requirements grow with them – leading to a trend of security responsibilities becoming dispersed as traditional security implementations impede the speed to delivery. Distributed responsibilities lead to fragmented security implementations - add to the problem the lack of skilled personnel, misconfiguration errors, overly permissive access, shadowed IT, and a lack of consistency between on-premise and cloud security controls, and you can end up with a recipe for disaster.
Join Tim Woods, VP of Technology Alliances at FireMon and Elisa Lippincott, Director of Product Marketing at FireMon, in this webinar where they will discuss:
• Steps you need to take to gain full visibility and control to secure your hybrid environment
• How to ensure consistency of your security controls within hybrid cloud and multi-cloud environments
• How to manage risk and complexity in your hybrid cloud with a cloud security posture management strategy
George Crump, Storage Switzerland and W. Curtis Preston, DruvaRecorded: Feb 22 201918 mins
If you think the cloud provides enough protection for your critical data, you’re putting that data at risk. You can’t assume data is protected because it’s “in the cloud” -- you need to ensure all of the data in your critical applications, including Office 365 and Salesforce.com, get the protection they deserve.
Join George Crump, Founder, and Lead Analyst at Storage Switzerland, and W. Curtis Preston (a.k.a. Mr. Backup), Chief Technologist at Druva, where they will discuss:
- What level of protection do cloud services provide?
- Is the provided level of protection enough for the enterprise?
- What does the enterprise need to add to achieve complete protection?
Register Now and get Storage Switzerland’s latest eBook “Protecting the Organization From Its Endpoints.”
Bob Liscouski, Juanita Koilpillai and David MorrisRecorded: Feb 22 201960 mins
How a Digital Risk Framework (an understanding of the differences between cyber security, cyber risk and digital risk) can help identify and mitigate risks to your Cloud Infrastructures.
In this session you will learn what a Digital Risk Framework is, how a Digital Risk Framework can help you comply with the onslaught of privacy regulations (CCPA, GDPR, HIPPA, etc) and its impact on your Cloud Infrastructures, which are most commonly used.
2018 was worse than 2017 for cyber security. This year every month was filled with even more major breaches, hacks, and attacks surfacing then 2017. The nature and range of the attacks varied from email hacking to zero days, from minor incursions to (potentially) everyone’s data being stolen. 2018 will probably go down as the new worst year for Cyber Security with all the previous year’s events having been far surpassed. Even our doom and gloom or same old same old predictions of last year have been blown away. The question now, will 2019 bear the full weight and impact of the events of 2019, or will it have its own harrowing events. Will the growing impact and occurrences spotlight security and translate in terms of media and regulatory attention? What kinds of threats will dominate the 2019 landscape?
Join us, make notes, and then check back in a year to see how our panel of experts did in providing insight and making predictions for the 2019 challenges to InfoSec.
James McQuiggan, Product & Solutions Security Officer, Service Americas Division, Siemens Gamesa Renewable Energy
Ricky Allen, CISO, Critical Start
Ira Winkler, President, Secure Mentem
Patrick Miller, Managing Partner, Archer International
Tim Fong, Product Marketing Lead, Security Solutions & Derek Yee, Product Marketing Lead, Performance Solutions @ CloudflareRecorded: Feb 22 201944 mins
Whether you are just exploring moving workloads to the cloud, or are fully cloud-enabled, one thing is certain: security has changed from a purely on-premise environment.
As cybersecurity risks continue to grow with more advanced attackers and more digital surface area, how you think about staying secure without compromising user experience must adapt.
During this talk, you will:
-Hear how global consistency, agile controls, and predictable costs are goals and principles that matter in this new environment
-Be able to evaluate your current plans against a "customer security model"
Mark Rimmer and Mike HammondRecorded: Feb 22 201912 mins
Mark Rimmer, Product Director of Premier Multi-Asset Funds, provides a quarterly update on Premier's multi-asset low risk funds, discussing performance, portfolio activity and his investment outlook for 2019.
Mark Rimmer and Mike HammondRecorded: Feb 22 201914 mins
Mark Rimmer, Product Director of Premier Multi-Asset Funds, provides a quarterly update on Premier's multi-asset growth funds, discussing performance, portfolio activity and his investment outlook for 2019.
Fiona Thomas (Author, Depression in a Digital Age) and Ina Yulo (BrightTALK)Recorded: Feb 22 201932 mins
Fiona Thomas is an active blogger, writer, and influencer in the mental health community. In this BrightTALK interview, Fiona talks about her new book "Depression in a Digital Age" and offers a different, positive perspective on mental health and the internet.
Join this online interview where you will learn about:
-The link between mental illness and how we form our own idea of success
-How to overcome internal pressures to push yourself to both your physical and mental limits
-Understanding your triggers and the risks involved in keeping up with your online persona
-How to reframe what success means
-How to make social media something that is for you and not something that goes against your mental wellbeing
Mike Hammond, Sales DirectorRecorded: Feb 22 201918 mins
Mark Rimmer, Product Director of Premier Multi-Asset Funds, provides a quarterly update on Premier's multi-asset income funds, discussing performance, portfolio activity and his investment outlook for 2019.
Asaf Lerner, Director IAM Solutions at GemaltoRecorded: Feb 22 201946 mins
As mid-sized and large organizations move to cloud based delivery for software, infrastructure and storage, hybrid environments are the de-facto reality. Perimeter security schemes no longer meet the security challenges of distributed software and application delivery, leading CISOs to try and mesh disparate solutions, or worse knowingly compromise on protection. Join Gemalto to hear best practices for applying consistent and effective access security and strong authentication to both on-prem and cloud apps.
Ken Tom, Sr. Manager, Product Marketing, Symantec and Sheetal Venkatesh, Principal Product Manager, SymantecRecorded: Feb 22 201953 mins
In the typical enterprise, employees use hundreds of apps that significantly expand the endpoint attack surface-whether IT is aware, or not. Clearly, apps are a fact of life and employees will use them as they see fit. The best defense is application whitelisting, but attackers show us otherwise: In fact, all 10 of the Top 10 attacker groups use whitelisted software to infect endpoints. And with long patching cycles and insufficient training, IT security teams need something more.
However, a win-win approach exists so that users can benefit from any productivity app they want without compromising the security of the entire infrastructure.
Join us for a first-look webinar into Symantec Endpoint Protection Hardening, whose isolation capabilities allow end users to download and use any app safely.
Join us to learn how you can:
- Discover and assess the risk of applications on your endpoints automatically.
- Shield known good applications to prevent vulnerability exploits.
- Isolate suspicious and malicious applications to stop privileged operations automatically.
In addition, we'll show you SEP Hardening in action with a demo that showcases how you can keep your endpoints safe and your employees productive.
Chris Hill, RVP, Public Cloud EMEA; Jez Back, Founder & Principal Erebus Technology Consulting Services LtdRecorded: Feb 22 201945 mins
One of the challenges with public cloud environments is the rate at which they change. Yet the ability to change / grow elastically is one of the key advantages to adopting public cloud. Complicate that further with a multi-cloud environment and you quickly find yourself lacking the ability to visualize your infrastructure, drill down into detail, gather resource level information and understand the relationship and interconnectivity of those resources and how they affect compliance and your security posture.
Gartner has predicted that “Through 2020, 80% of cloud breached will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”.
So how can you ensure your organisation not only has complete visibility of its cloud infrastructure but is also securing its workloads and apps and being compliant? Is it really an impossible task?
Find out more in this webinar with Chris Hill, RVP of Public Cloud at Barracuda Networks and Jez Back, Founder & Principal Erebus Technology Consulting Services Ltd, where they will discuss:
• The threat landscape around cloud infrastructure
• Shared security model – what are you really responsible for when it comes to cloud security
• Challenges associated with multi-cloud and keeping your organisation secure
• How to maintain compliance across your cloud environment
• How to obtain visibility of your cloud infrastructure and security posture at all times
Many procurement professionals we speak with struggle to get the insights into software purchases, software and cloud usage, contract terms, outstanding invoices, expired quotes and renewal information that they require to do their roles effectively.
This information is often spread across multiple paper documents, systems, spreadsheets or databases, which makes it tedious and time consuming to gather the necessary data and often leaves Procurement Specialists unprepared at the time of software renewals.
Lack of visibility into software and cloud spend makes it difficult to negotiate optimal commercial terms and contracts.
This is why we developed the new Procurement Workbench in PyraCloud.
We wanted to provide Procurement Specialists with a quick and easy way to see all relevant information and insights needed for their role.
Join one of our experts, Rhys Williams, and learn how the PyraCloud Procurement Workbench can help you streamline your process by:
• Simplifying the management of quotes, orders and invoices
• Improving product search capabilities across multiple products and services in global catalogues
• Tracking software previously purchased, product favourites and subscriptions
• Consolidating multiple aspects of the procurement process in one place
PyraCloud provides a single platform to manage the software procurement process in one place – no need to login to multiple systems – saving you time and money. Join us on the webinar to find out more.
Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst ForresterRecorded: Feb 22 201962 mins
Three major trends define the Cloud Generation chaos that organizations face today:
1) Use of cloud applications
2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter
3) Use of both corporate owned and BYO devices (PC, Mac and Mobile)
On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organizations with ransomware, targeted attacks and mobile malware.
Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for Organizations who face a severe shortage of skilled IT security personnel.
Attend this webinar and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.
In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:
-Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security
-Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
-Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
-Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.
Ed Hallock, Director Product Management,SyncsortRecorded: Feb 22 201927 mins
From the early days of IT, organizations have grappled with the challenges of understanding how well their infrastructure is performing in support of the business. They have used a plethora of tools to detect, manage, and resolve problems that are causing disruption of services, but still struggle to achieve a unified, cross-domain understanding of what is happening across their IT infrastructure.
Fortunately, over the past few years analytics platforms like Splunk, Elastic, and others have emerged to address requirements around IT Operations Analytics (ITOA). Today the buzz is around AIOps – Artificial Intelligence Operations. But what is AIOps, and what can it do to help organizations address IT challenges?
View this webinar on demand to get a better understanding of:
•What is Artificial Intelligence for IT Operations
•What are the required technologies for success at AIOps
•What challenges exist for achieving AIOPs
Thomas Bodenmüller-Dodek, Informatica Product Expert|Carrie Ellard, Informatica Cloud ConsultantRecorded: Feb 22 201944 mins
Gibt es bei Ihnen eine Cloud-First-Strategie, planen Sie ein Cloud Datawarehouse, schon mal über APIs nachgedacht oder müssen Sie Daten von Cloud-Applikationen in Ihr Unternehmen transportieren? Wie man sieht haben Projekte rund um die „Cloud“ viele Gesichter und erfordern deshalb auch eine sehr umfangreiche und leistungsfähige iPaaS-Lösung, wie die Informatica Intelligent Cloud Services – kurz IICS. In diesem Webinar möchten wir Ihnen einen Einblick über das Konzept, die Leistungsfähigkeit und den Umgang mit sog. hybriden Integrationsmöglichkeiten – also die Vorteile einer On-Premise und Cloud Architektur vorstellen. Dabei werden wir auch Best Practices von bestehenden Kundenprojekten einfließen lassen.
Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²Recorded: Feb 22 201957 mins
Earning the globally recognized CSSLP secure software development certification is a proven way to build your career and better incorporate security practices into each phase of the software development lifecycle (SDLC).
In this info-session, you will learn:
- How large is the cybersecurity workforce gap today
- Why you should pursue CCSLP
- How to earn the certifications – exam and experience requirements
- The recent updates on membership benefits and policies
- And, ask any question that will support your certification journey
Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.
CSSLP certification recognizes leading application security skills. It shows employers and peers you have the advanced technical skills and knowledge necessary for authentication, authorization and auditing throughout the SDLC using best practices, policies and procedures established by the cybersecurity experts at (ISC)².
Prove your skills, advance your career, and gain support from a community of cybersecurity leaders here to help you throughout your professional journey.
Are you ready to prove yourself? Register and begin your CSSLP journey today!
James Herbert, Solutions Engineer, OneLogin, TJ Gryziec, Chief Product Officer, Clear SkyeRecorded: Feb 21 201954 mins
Are you looking to strengthen identity governance and risk management for compliance initiatives like GDPR? Or to automate enterprise access management?
Today’s enterprises handle a growing volume of unique identities and applications and the process is only getting more complex. The combination of complex web of identities and manual workflows for application provisioning, compliance reporting, and access fulfillment, leads to massive inefficiencies and potential risk.
With Clear Skye and OneLogin, ServiceNow customers achieve a single system of record for all enterprise identities and access management. Additionally, the joint solution integrates seamlessly with ServiceNow GRC and provides evidence for auditing and IT compliance.
Join us on Wednesday, Aug 29th at 10 am PST to hear from security experts from OneLogin and Clear Skye on how to automate identity orchestration for enhanced security and compliance on ServiceNow.
In this webinar, you will learn how to:
- Simplify identity management on ServiceNow including real time user provisioning and deprovisioning
- Build automation processes to reduce risk and extend service management
- Fast track your GDPR or other compliance initiatives
Jeffrey Deverter, Cloud Strategist, CloudreachRecorded: Feb 21 201957 mins
Learn from industry-leading Cloud Strategist Jeffrey Deverter how to modernize your applications using continuous deployment and continuous integration on the Cloud.
Jeffrey will discuss a methodology that will enable you to modernize applications to reap several business benefits - including Agile improvements, transparency into the true cost of ownership of application operation - and share advice on how to drive business value and the direction of applications.
The adoption of cloud and containers requires new and more dynamic methods of securing applications. These methods need to address the complexity associated with applications that can span multiple clouds, hybrid infrastructure and private deployments. Instead of relying on traditional networking constructs, cloud-native security needs to enable security teams to centrally manage security policies and enforce them in a distributed fashion.
In this webinar, we will discuss how to enable faster cloud adoption with less security friction. We will also address the following topics:
– Customer case studies for addressing PCI & SWIFT requirements in the cloud
– Gaining visibility into applications data flow before moving to, and after deploying in, the cloud
– Adopting the Zero Trust security model that requires authentication and authorization for all communication
We hear over and over again that employee engagement is low. A 2017 Gallup report shows 51% of the workforce is not engaged, and 16% are actively disengaged. What’s missing in our workplace cultures that has led to such low engagement?
Connection. Connection between people - between employees and their leaders. Between teams. Between people and their companies. We have so much technology at hand to bring us together, but it may actually cause us to drift apart. Think of the email or text you send to a coworker sitting right across from you. The instant message you send instead of picking up the phone.
This lack of connection leads to less collaboration, innovation, trust, and engagement. But companies can take active steps to build more interaction and relationships between their people, and use practices, like appreciation, to create a more integrated culture.
Join Mindi Cox, Senior Vice President of People and Great Work at O.C. Tanner, as she shares insights and best practices on how to create a more connected workforce in today’s increasingly disconnected environment.
During the webinar you’ll learn:
• The importance of human connection in the workplace today
• How to foster high-quality interactions among employees and teams
• The impact of having a connected workforce on company culture and employee performance
Zu den größten Herausforderungen für Einzelhändler gehören die Einhaltung der PCI(Payment Card Industry)-Anforderungen und der Schutz von Kundendaten. PCI-Probleme entstehen oft aufgrund schlecht verwalteter drahtloser Netzwerke.
Melden Sie sich für dieses exklusive Webinar an und erfahren Sie mehr über typische Wireless-Herausforderungen und Cyberbedrohungen für Einzelhändler. Wenden Sie Best Practices an, um Ihre Daten zu schützen, geltende Vorschriften einzuhalten und:
•Ihr Einzelhandelsunternehmen in einer dynamischen Cyberbedrohungslandschaft zu schützen
•sichere drahtlose Verbindungen zu ermöglichen
•bekannte und unbekannte Cyberangriffe abzuwehren
•sichere Verbindungen für Ihre Kunden und Mitarbeiter zu gewährleisten
Lynne Capozzi, CMO @ Acquia, Geneviève Gourichon, Digital Project Manager @ Solvay, Sebastien Debon, Director @ MirumFeb 25 201910:00 amUTC52 mins
In this digital-first world, organisations must be customer-first.
No matter the brand or enterprise, the new rules require you to engage individuals and deliver personalised experiences at every point in the customer journey.
The complexity is only growing as CMOs, customer experience (CX) pros and tech leaders grapple with digital sprawl – wrestling with greater marketing demands, higher customer expectations, and rising complexity across martech, data and touchpoints.
Join this webinar to learn more about achieving global marketing excellence with a digital factory.
Maxim Frolov, Vice President of Global Sales, Kaspersky Lab and Jim Reavis, Co-founder and CEO, Cloud Security AllianceFeb 25 201910:00 amUTC46 mins
Nearly 1.5 million dollars. That’s how much an average data breach in the cloud costs enterprises, according to the Global IT Security Risks Survey 2018.
Second only to targeted attacks, breaches affecting IaaS are among the most costly faced by businesses today. But what can be done about this? Apparently, investing more in protection is only part of the solution, as businesses are already allocating a greater share of their IT budgets to security…
During the webinar, Maxim Frolov, VP Global Sales, Kaspersky Lab, presents key findings from the company’s latest report On the Money: Growing IT Security Budgets to Protect Digital Transformation Initiatives. Maxim, along with special guest Jim Reavis, Co-founder and CEO, Cloud Security Alliance, will discuss the potential damage and the main risks associated with cloud breaches, as well as what businesses can do to protect themselves.
Webinar attendees gets the latest insights on the dynamics of corporate security incidents and IT security budgets. They will learn what financial, organizational and technological decisions should be made to protect businesses from the threat of cloud infrastructure breaches.
Nathan "Q" Quist (LogRhythm) and Randy Franklin Smith (UWS)Feb 25 201910:00 amUTC105 mins
In this real training for free session, we will discuss the minimum toolset and data requirements (and not necessarily volume) you need for successful threat hunting. We will take into account that while some of you can devote most of your time to threat hunting, most of us have limited time and resources for this activity. The good news is that threat hunting is flexible and anyone can do it, ranging from a few hours a week to full-time.
As an example, a great type of threat hunting is to look for unrecognised/suspicious executables running on your network. You can dip your toe in the water with this type of hunt with a small commitment of time and resources or you can dive in deep with a major data collection and analysis effort. Starting out simple means you just focus on EXE names; baseline the EXE names being executed on your network, and then perform a daily review of new EXE names showing up for the first time. You can get this information from event ID 4688 and the query capabilities are very light. But I think you’ll be surprised what you are able to learn and catch.
We will take the same approach with a total of 7 types of threat hunting:
Recognising suspicious software
Hervé Doreau, Directeur Technique, Symantec FranceFeb 25 20191:00 pmUTC42 mins
À l'ère de la génération cloud, les collaborateurs exigent une flexibilité à toute épreuve et un accès où qu'ils se trouvent, ce qui peut mettre vos données les plus sensibles en danger.
Les environnements distribués, comme ceux mis en place pour les télétravailleurs et les employés mobiles, créent de nouvelles surfaces d’attaque qu’il est impératif de protéger. De même, le recours aux applications cloud SaaS rend encore plus nécessaires les contrôles de conformité et de sécurité.
Résultat, les équipes IT et sécurité sont obligées de repenser la conception de leur réseau pour mieux répondre aux interrogations suivantes :
- Comment encadrer efficacement l’accès aux données, aux applications et aux systèmes ?
- Comment lutter contre les menaces avancées qui ciblent notre entreprise via le Web, le cloud et l’e-mail ?
- Comment sécuriser les informations qui circulent entre notre réseau, les terminaux et le cloud ?
Retrouvez nos experts pour ce webcast sur les grands défis de sécurité que les grands comptes clients de Symantec doivent relever avec la génération cloud. Vous découvrirez comment les solutions Cloud de sécurité de Symantec peuvent protéger les utilisateurs, les terminaux et les données d’entreprise, où qu’elles se trouvent.
Ruth Steinholtz and Shona MatthewsFeb 25 20191:00 pmUTC60 mins
Culture and Conduct: The many reasons why things go wrong and what can you do about it
For most of us, compliance might seem something that happens to us, only about interpretations of what legislation and regulation requires of us; necessary but boring – a nuisance even. But what if doing the right thing was actually good for business? What if we looked beyond the processes to the basis of ethical behaviour? Wouldn’t we care a little more about “compliance” if we thought about the outcome and not just the process? Ruth Steinholtz a leading practitioner in value-based business ethics and co-author of Ethical Business Practice and Regulation: A Behavioural and Values-based Approach to Compliance and Enforcement joins us to stimulate our thinking and personal awareness of why conduct and culture are so important and how each of us can improve the industry and benefit from it at the same time.
Francesco Curto, PhD, Head of CROCI; Colin McKenzie, Head of CROCI IntelligenceFeb 25 20192:45 pmUTC45 mins
During the past decade, equity investors have benefitted from two principal trends: the inflation of asset prices via quantitative easing and strong earnings growth from the Technology sector. Both these trends are now showing signs of fatigue. In 2019, investors face a choice between Scylla and Charybdis.
For investors, Charybdis is the central banks’ tightening programmes: excessive tightening risks creating a whirlpool which rapidly deflates asset prices. The alternative is Scylla: this would involve fewer rate hikes, a synchronised global economic slowdown and the hope that the journey does not veer off course. Odysseus chose Scylla—a rational choice that kept the ship safe in return for the sacrifice of a few sailors. Conservatism might dictate a similar choice to policymakers now.
Our bottom-up analysis suggests that a slowdown is well underway, with capex falling and risk premia rising. Equity valuations may still be rich at the market level, but there are few alternatives available to investors and good pockets of value are starting to emerge for astute investors.
Arti Bareja, Head of Investor Relations at ClearlySo | Martin Jacobson, Impact Investor | Nicolas Cardyn, Impact InvestorFeb 25 20193:00 pmUTC45 mins
Impact investors come in all shapes and sizes, and from all backgrounds including the world of poker. In 2014, Martin Jacobson won the World Series of Poker, the $10,000,000 prize was the fifth largest single payout in the history of the tournament. Nicolas Cardyn is also a professional poker player, as well as an investor in startups and the stock market, with lifetime winnings now exceeding $1,000,000. Both are now members of the ClearlySo Angels - the UK's leading group of high-net-worth individuals and families focused on creating social and environmental impact alongside financial return.
During this webinar, ClearlySo Head of Investor Relations Arti Bareja will interview Martin and Nicolas to discover what led them to impact investing, the types of impact they are most interested in, and discuss what angel investors should be looking out for when investing in early stage growth businesses.
Ru Zang, Associate Director at Mersana Therapeutics and John Bonham Carter, Director of Upstream Sales at RepligenFeb 25 20194:00 pmUTC75 mins
EFFECT OF CELL CULTURE PROCESS CHANGE FROM FED-BATCH TO CONTINUOUS ON PRODUCTIVITY AND PRODUCT QUALITY
Integrated continuous bioprocessing has attracted a growing interest due to its potential to improve agility and flexibility in the manufacture of therapeutic proteins. To convert an existing fed-batch cell culture process to continuous, or perfusion, the major technical hurdles include maintaining steady state cell culture performance and generating product with comparable product quality attributes. In this presentation, we evaluated three molecules including a fusion protein, an aglycosylated monoclonal antibody (mAb), and a glycosylated mAb. Steady state culture at high cell density was achieved for all three molecules, which allows the delivery of products with consistent product quality and adequate productivity. However, as compared to fed-batch processes, product quality and cell specific productivity differences were observed in perfusion cultures. Further studies indicated that it was feasible to modulate product quality in perfusion process by adding process levers in culture medium. It was also feasible to increase cell specific productivity through medium and process optimization. This presentation provides an insight into the product quality and productivity differences between traditional fed-batch and perfusion cell culture processes and potential approaches to addressing these differences.
Akeela B. Davis, President of Courageous Business CultureFeb 25 20194:00 pmUTC60 mins
Research shows that people leaves bosses, not jobs. So, what is a person to do if they love what they do, but not who they are reporting to? Bosses who are verbally abusive, bullying, blaming, passive/aggressive, micromanaging or any combination of these, do untold damage to the organizations which tolerates them and to the health and careers of their direct reports.
It is not unusual for Employees to feel at least disrespected, fearful, angry, lonely, dis-empowered, shame, and guilt. Their perceived choices? Leave, stay and suffer becoming more disengaged and stressed, or participate in the dysfunction, making a bad situation worse, for all concerned.
There is another choice.
This webinar will give you coping tips and techniques so that you can choose to keep doing what you are doing with less stress, more control and therefore allowing you to make better choices.
Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²Feb 26 20196:00 amUTC60 mins
Accelerate your cybersecurity career with the CISSP certification.
Join this online info-session hosted by (ISC)² and learn everything you need to know about the globally recognized credential CISSP!
During the online info-session, you will:
- Gain an insight into the CISSP credential-its domains and career benefits for credential holders
- Hear about the practical application of the CISSP related to real world issues for security professionals
- Ask questions about the credential, exam and experience requirements
- Learn everything you need to know about getting certified
Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.
Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities.
Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career.
从最终用户、用户服务商角度，如何实现业务的逐步迁移？ 迁移后，发现开发测试环境、预生产环境，都有很大的效率要求。如何采用迅捷的方式满足在X86架构下的sap 开发测试、预生产的业务需求？
这次线上的分享会，在关注以上内容的同时，会给大家聊一些OpenStack for SAP、K8S for SAP的内容，希望能更多的帮助SUSE/SAP的用户、SUSE/SAP的合作伙伴。
Дмитрий Иванюк, эксперт по решениям CommvaultFeb 26 20198:00 amUTC90 mins
У Вас есть вопросы по:
- основным компонентам решения Commvault?
- методам настройки решения Commvault и архитектурным особенностям решения?
- каковы приёмы конфигурирования и повышения производительности?
- как устранить неполадки? И какие есть для этого инструменты?
- вы хотите увидеть демонстрацию решения!?
И у Вас есть вопросы, на которые Вы хотите получить оперативный ответ в режиме диалога. Все это и намного больше вы сможете узнать, посетив наш вебинар
Курс предназначен для менеджеров по продукту, архитекторов, инженеров, администраторов.
For the first time, MetaPack will be live streaming from The Delivery Conference 2019 (TDC Global), the number one event for eCommerce delivery. Our focus will be on the eCommerce and Customer Experience Stream, where you can enjoy 4 different sessions.
Taking place in London on Tuesday 26th February 2019, TDC Global will bring together 1300+ attendees – 70% of which are from the leading retailers and brands.
You can join an unrivalled gathering of senior eCommerce executives at TDC Global, simply by registering for the session below.
Session 1 - The Delivery Conference 2019 - Opening Presentations
(08:25 - 10:55 GMT)
08:55 ‐ 09:15 - Patrick Wall, Founder, MetaPack - Welcome and Trends in Delivery
09:15 ‐ 09:45 - Howard Saunders, Retail Futurist, Twenty-second and fifth
09:45 ‐ 10:05 - Xuan Jin, Lead Solutions Architect, Alibaba
10:05 ‐ 10:25 - Professor Matthew Goodwin, University of Kent/Chatham House
10:25 ‐ 10:55 - Martijn Bertisen, UK Sales Director, Google
For the full agenda visit https://www.thedeliveryconference.com/tdc-global/agenda/
L’un des plus grands défis des commerçants est de garantir la conformité PCI (Payment Card Industry) ainsi que la sécurité des données clients. Les réseaux sans fil mal gérés figurent parmi les erreurs courantes de conformité PCI.
Inscrivez-vous à ce webcast exclusif pour découvrir les défis des réseaux sans fil et les cyber menaces auxquels doivent faire face les commerçants. Pour garantir la sécurité et la conformité de vos données, vous verrez comment appliquer des pratiques d’excellence pour :
•protéger votre commerce de détail dans le paysage des cybermenaces en constante évolution
•assurer une connectivité sans fil sécurisée
•bloquer les cyber attaques connues et inconnues
•garantir que vos clients et vos employés sont connectés en toute sécurité.
Alexander Peters, Symantec (Deutschland) GmbHFeb 26 20199:00 amUTC50 mins
URL-Filter sind ein hervorragendes Tool, um Ihre Systeme vor webbasierte Threats zu schützen. Achtung! Sie stoßen aber an ihre Grenzen, wenn Mitarbeiter unkategorisierte Webseiten ansteuern.
In den meisten Unternehmen werden Zugriffe auf diese Grauzone durch die Policy unterbunden – auch wenn man gelegentliche False Positives in Kauf nehmen muss. In anderen lässt man die Zugriffe zu, und riskiert lieber eine Infektion, als Mitarbeiter von potenziell wichtigen Informationen abzuschneiden.
Beides ist nicht ideal – und ab sofort gibt es endlich eine bessere Alternative: Die Übernahme des amerikanischen Security-Anbieters Fireglass ermöglicht es uns, unser marktführendes Web-Security-Portfolio jetzt auch um eine leistungsstarke Web-Isolation-Lösung zu erweitern.
Im Webinar erfahren Sie:
>>Wie Sie mit Symantec Web Isolation allzu streng eingestellte URL-Filter vermeiden und Ihren Mitarbeitern Zugang zu mehr Webinhalten gewähren, ohne zusätzliche Risiken einzugehen
>>Wie Sie die Lösung nutzen können, um Ihre Privilegierten Accounts und Anwender künftig noch besser vor webbasierten Attacken zu schützen
>>Wie sich durch das Isolieren potenziell gefährlicher eingebetteter Links viele gängige Phishing-Attacken und Account-Übernehmen zuverlässig unterbinden lassen
>>Wie Sie Symantec Web Isolation mit Ihren ProxySGs, Content Analysis Systemen und Malware Analysis Appliances kombinieren und zu einer nahtlos integrierten Komplettlösung bündeln lassen
Darüber hinaus verraten wir Ihnen Sie, wie die weitere Roadmap zur Integration der Fireglass-Produkte in unser bestehendes Portfolio aussieht, und geben Ihnen einen kurzen Überblick über alle anderen wichtigen Neuerungen in unserem Portfolio.
Join Alex Chen Associate Director, Yang Wang Director Research & Analytics FTSE RussellFeb 26 20199:30 amUTC45 mins
Increased market volatility is rarely a welcomed phenomenon; but how might investors approach a market characterised by it?
Join Alex Chen Associate Director and Yang Wang Director Research & Analytics as they explore, with reference to their recently published paper, ‘Accessing the China A-Shares Market via Minimum-Variance Investing, in the Journal of Portfolio Management, how best to participate in the China A Shares market when looking to limit overall portfolio risk.
John Kindervag, Field CTO, Palo Alto NetworksFeb 26 201910:00 amUTC60 mins
“Trust is always a vulnerability in a digital system,” - John Kindervag, Founder of Zero Trust and Field CTO at Palo Alto Networks
Much has been written about the topic of Zero Trust. Is it a security buzz word or a true effective security strategy?
High-profile breaches involving “trusted” insiders have given industry-wide visibility to the fact that trust represents a vulnerability for digital systems. It’s something malicious actors can and do exploit for their advantage.
Zero Trust was first introduced around the principles of “never trust, always verify” as a means for enterprises to implement effective network segmentation. As the model has been embraced, Zero Trust evolved to become a strategic Cybersecurity initiative that major enterprises align to in order to prevent successful cyberattacks.
Watch as our Palo Alto Networks® expert John Kindervag discusses the “whys and hows” of building a Zero Trust architecture. In this webcast, you will:
• Learn specific outcomes of implementing a Zero Trust architecture
• Hear recommendations on where to start when planning and implementing a Zero Trust framework
• See how Palo Alto Networks performed in an independent evaluation on Zero Trust Networks
• Get your questions answered in our Live Q&A
Chris Williams, Head of Public Cloud Strategy, and Steve Drew, AWS Solution ArchitectFeb 26 201910:00 amUTC60 mins
Do you want to drive business growth by optimising your IT infrastructure? Do you need guidance to overcome the challenges of adopting AWS and to apply best practices in the design and delivery of a secure AWS migration?
Then sign up for our webinar on Tuesday 26 February at 10am (UK), and learn how adopting AWS helps modernise your IT infrastructure. With a specific emphasis on creating the right business model and designing the right technical foundations, our AWS-certified experts will cover:
• key drivers for moving to the cloud
• common challenges faced along the way
• building a secure Landing Zone on AWS to start your modernisation journey
So, complete the registration form and book your webinar place now. Join us to make the most out of your cloud migration journey.
Rackspace is an AWS-audited Managed Service Partner with 1,000+ certifications and an AWS Premier Consulting Partner.
Bob Honour & John AarsenFeb 26 201910:00 amUTC60 mins
One of the major challenges for retailers is ensuring Payment Card Industry (PCI) compliance and the need to secure customer data. Poorly managed wireless networks are one of the common PCI mistakes. This webinar will walk through some of the wireless best practices to ensure your data remains secure and compliant.
This webinar will cover the wireless threats faced by retailers and how you can apply best practices to:
• Protect your retail business in the evolving cyber threat space
• Secure wireless connectivity
• Stop known and unknown threats
• Ensure that your customers and employees are connected securely