Come join us for a session on all about search term families! We’ll set up a search term family together, see how it speeds up our review in conjunction with list, browse, and map, and use Nuix Discover’s analytics tool for data analysis with search terms.
Sam Weiss, Kyle PazandakRecorded: Aug 6 202014 mins
Managing your Apple environment with Jamf produces a lot of data that can be very useful, especially when utilized for security, compliance and forecasting. Are you ready to realize the full capability of reporting with Jamf?
In our webinar, Level Up Your Reporting Capabilities with Jamf, we'll cover the basic reporting functionalities within Jamf solutions and explore advanced integrations with popular reporting tools.
- The questions you can answer with data
- In-product reporting functionality
- Integrations with tools like Splunk, Power BI and Numerics
- How to leverage the Jamf Pro Log Stream
Zohar Kaufman, VP R&D and Ariel Shuper, VP Product Portshift.ioRecorded: Aug 6 202058 mins
Human error remains a persistent cause of the majority of container security incidents. According to Gartner, 95% of cloud security failures are rooted in mistakes made by users. As your application workloads become more distributed and run in containers managed by Kubernetes, the risk of a misconfigured component exposing you to a security incident grows.
In today’s DevOps driven, application development environment, configuration management must be as automated and streamlined as possible for it to be effective. It should be comprehensive, covering not just the pods deployments, but also the Kubernetes objects (e.g. ConfigMap) and settings (Roles, Roles bindning, Security Context, Secrets etc.)
Join our session to learn about configuration management best practices and how to avoid the common misconfiguration pitfalls of containers and Kubernetes.
On our Talk Session, Ariel Shuper and Zohar Kaufnam will discuss -
* Kubernetes RBAC misconfiguration, detection and mitigation
* Secrets management best practices
* Security Context and Pod Security Policies
* Automated policies generations with Developers manifests
* Network policies - The good, the bad and the ugly
* Kubernetes APIs protection
Dennis Birchard, Principal Lead Cloud Security Architect at AkamaiRecorded: Aug 6 202041 mins
A DDoS attack could be a ruse to distract your focus from other key processes, such as fraudulent transactions, or outright destruction of data. "At Alliant we wanted the brains behind DDoS mitigation and that's what Prolexic gives us." said Bill Podborny, Chief Security Officer, Alliant Credit Union.
The number of DDoS attacks instantly mitigated via the Prolexic platform has increased exponentially over the past four years. Akamai mitigates DDoS attacks against its Prolexic platform via proactive mitigation controls, in 0 seconds and with no customer impact. But, what about DDoS attacks in the COVID-19 era?
Join Dennis Birchard, Akamai’s Principal Cloud Security Architect, to learn more about:
•Recent DDoS Attack Trends Q1-2020
•How does Prolexic protect Akamai customers and why does it matter
•Mitigation Strategies re: Proactive vs Reactive controls
•Work from home and how our customers have changed their risk
•How to interpret DDoS industry mitigation SLAs
Brian Uffelman, Sr Manager Product Marketing, Shape Security, a F5 Company | Luke Lehman, Product Mgr, F5 SilverlineRecorded: Aug 6 202048 mins
Today’s applications have become the fabric of our economies and our lives. Applications are how value is exchanged and where the most sensitive data is stored. And that’s precisely why applications have become the focal point for cybercriminals, who target your applications for financial fraud and abuse.
In this webinar, learn how Silverline Shape Defense – the newest solution in F5’s Silverline managed services portfolio – protects your web apps from bots and other automated attacks by delivering continuous protection, even when attackers retool.
We will discuss tactics to help you:
- Slash losses due to fraud and abuse Deliver better application performance and uptime
- Achieve measurable cost savings for hosting and bandwidth costs
- Prevent sophisticated attacks including those on the OWASP Automated Threats to Web Applications list
- Detect and mitigate vulnerability exploits and denial-of-service attacks
Calvin Yoa, Calvin Hariman and Jordan JimenezRecorded: Aug 6 202059 mins
Traditionally, the corporate office space was built to suit a 9-5 workday from Monday to Friday. However, the new generation and the global pandemic has forced the corporate office to change overnight. During this webinar, we will explore the history and evolution of the office, current technology deployed to help, and organizational, cultural, and personal factors that define the make up of the future workplace.
We will discuss four core principles (flexibility, safety, security, and value) that will serve as the foundation for a platform for the future workplace.
Mike Kelly, CIO, Red Hat | Brendan McErlain, VP, Product Portfolio Marketing, Red Hat | Kent Norton, CTO, OmnitracsRecorded: Aug 6 202019 mins
Digital transformation is no longer optional. Every organization knows it must become a digital leader to survive and thrive. Organizations must build and deliver exciting new software applications while also continuously innovating and adapting to stay ahead of the never-ending onslaught of digital data, experiences, and channels.
Many new software or IT projects still fail because technology alone does not solve digital transformation. It doesn’t address the fundamental issues that block or drive transformational success, and the most critical dependency—the people. During this keynote, Red Hat CIO, Mike Kelly; VP of Product Marketing, Brendan McErlain; and CTO of Omnitracs, Kent Norton will reveal the elements of digital transformation that technology can’t resolve and why people and processes are critical to our success.
PowerStore is designed to take advantage of the performance and economics of the next wave of storage media. At its core, PowerStore is a highly optimized I/O stack with inline data services including deduplication, compression, as well as QOS. With the advantage of integrated data protection, the flexibility to scale-up/down and scale-out, PowerStore delivers industry leading economics and simplicity, with predictable performance as a result.
Richard Olivieri - Lateetud VP Solutions and Professional Services, Bruce Mazza Blue Prism - VP, Technology Alliances ProgramRecorded: Aug 6 202058 mins
With over 4.14M loans in active forbearance representing 7.8% of all active mortgages and over $900B in unpaid capital, mortgage servicers are shifting from pipeline of new forbearance requests to managing a new wave of forbearance extensions and post-forbearance workouts. Millions of customer touch points will be required to support the modifications and decisions that are to follow in the next 12 months.
Is your organization fully prepared with Intelligent Automation capabilities to help end-clients navigate repayment plans, deferrals, or loan modifications automatically?
Blue Prism, in partnership with Lateetud helps banks and lenders quickly assist customers experiencing financial hardship and in need of mortgage forbearance. Together, we automate the entire end-to-end process, from receiving a request and confirming qualification to executing forbearance and engaging the customer in post forbearance activity—all while adhering to bank policies and federal guidelines.
1. Process in minutes, not hours. Reduce service costs, eliminate strain on resources
2. Better serve customers with an intuitive, seamless experience through web portal, chatbot or call center IVR/
3. Build & deploy quickly and easily, improving outcomes and quality of service
4. Maintain strict compliance with federal guidelines and bank policies
Join this webinar to learn more about how you can gain an Intelligent Automation advantage.
Dave Landa, Kintone CEORecorded: Aug 6 202028 mins
The democratizing forces of no-code software development and citizen developers are turning disruptive Digital Transformation into productive Digital Execution. In this webinar by Kintone’s CEO Dave Landa, learn how citizen developers and new mode IT teams together are revolutionizing agile software development, deployment and iteration from the ground up.
Thomas Hatch, SaltStack Co-Founder and CTORecorded: Aug 6 202056 mins
The SaltStack labs team have been hard at work cooking up some incredible new innovations to help IT, security and devops teams tackle the challenges facing them today—and we want to share some of the best with you!
Join SaltStack Co-Founder and CTO, Thomas Hatch, as he takes us through powerful new features and innovations from the brightest minds at SaltStack and throughout the Salt community.
- A million minions: Reaching absurd levels of scale with SaltStack
- Salt and Azure are now an Idem: Optimizing Azure Cloud management with Idem
- POP culture: Plugging in to the most powerful plugin-oriented dev platform
- Phenomenal cosmic power, itty bitty living space: Deploying Salt in a single binary
Adam Barber Presidio, Peter Scheffler F5, Orlando Santiago Jr,F5Recorded: Aug 6 202042 mins
Presidio, and F5 will present on a combined solution for enhancing the security you already have with your Firepower and WSA deployments by providing enhanced SSL offload with F5’s SSL Orchestrator solution. The Webcast will cover use cases, advantages, and additional benefits that you can realize with the deployment of SSL Orchestrator in your network environment.
Rod Moore, Cloud Domain Architect, Red HatRecorded: Aug 6 202049 mins
In today's open hybrid datacenter, Applications are moving from a monolithic to a cloud-native approach that leverages Kubernetes. These modern applications may have components that span multiple clusters and multiple cloud providers. In addition, new clusters are being added for specific purposes like edge deployments and reduced latency. This "Cluster Sprawl" introduces several new management issues. For example;
How can I manage the lifecycle of multiple clusters regardless of where they reside (on-premise or across public clouds) using a single control plane?
How do I get a simplified understanding of my cluster health and the impact it may have on my application availability?
In this webinar, you'll learn to address these management concerns and numerous others with Red Hat Advanced Cluster Management for Kubernetes. It offers end-to-end management visibility and control to manage your cluster and application life cycle, along with security and compliance of your entire Kubernetes domain across multiple datacenters and public clouds.
About the speaker:
Roderick Moore is a Cloud Domain Architect on Red Hat's North American Public Sector team. He covers the products that comprise Red Hat's management portfolio. His more than 25 years of helping customers choose and implement enterprise management software makes him a valued resource when discussing the management needs of today's open hybrid environments.
Steve Moritz, Chief Digital Officer & Eric Leonard, Microsoft Practice Lead & Don Bilbrey, Senior Solution ArchitectRecorded: Aug 6 202060 mins
If you think the “cloud” is solely a technical strategy to cut IT costs, then you are wrong. Attend this webinar and learn how organizations (maybe your competitors) are leveraging Azure to thrive.
About this Webinar
Unprecedented and uncertain times call for senior leaders to find near-term and practical ways to optimize business processes, expand revenue sources, and implement digital innovation.
Organizations can’t survive by only cutting costs, reducing headcount, and shuttering operations. Yes, it is practical and achievable to enhance business operations through the migration and expansion of Azure Cloud Services.
While many leaders may think that the cloud is an effective way to quickly eliminate fixed costs for infrastructure, we will illuminate how top line, customer engagement, and product expansion can be achievable outcomes as well. This webinar will be of interest to the C-Level Executives who want to hear real-life examples of how Microsoft Azure Cloud has supported tangible business transformation.
As a business or technology leader, you will gain meaningful knowledge and tangible ideas as we thoroughly review these case studies (and others) of how Azure Cloud Services has been used by a:
- Health Care firm to design and deliver new services to an expanded geographic market, with lower costs and higher margins to drive an increase is product revenue of 18%
- Global Telecommunications company to leverage Azure Artificial Intelligence and Machine Learning to implement a customer attrition proactive strategy that cut attrition by 15%
- A security analytics business migrated an on-premise implementation of its technology to Azure to enable a Security Analytics as a Service business model, greatly increasing total addressable market, value proposition and revenue
Webinar attendees will also gain insights on an approach for defining a roadmap for Azure transformation, from business ideation through technical architecture design and migration.
Patrick Hall, Advisory Consultant at H2O.ai and Michael Proksch, Senior Director, Customer Data Science at H2O.aiRecorded: Aug 6 202062 mins
Insurance and credit lending are highly regulated industries that have relied heavily on mathematical modeling for decades. In order to provide explainable results for their models, data scientists and statisticians in both industries relied heavily on generalized linear models (GLMs). However, new machine learning algorithms like GBMs are not only more sophisticated estimators of risk, but due to a Nobel-laureate breakthrough known as Shapley values, they are now seemingly just as interpretable as traditional GLMs. More nuanced risk estimation means less payouts and write-offs for policy and credit issuers, but it also means a broader group of customers can participate in mainstream insurance and credit markets.
In this webinar, you will learn about:
- The Advantages of Machine Learning vs. Linear Models
- Why you should think about the AI shift in perspective
- How to move to new ML Methods (e.g. GBM)
Patrick Hall, Advisory Consultant at H2O.ai
Michael Proksch, Senior Director, Customer Data Science at H2O.ai
Erica Carranza, Ph.D. VP of Consumer Psychology Chadwick Martin Bailey & Christina Zurek Insights & Strategy Leader ITARecorded: Aug 6 202051 mins
Enriching compensation packages is an effective but expensive way to engage individual employees, and as recent research has revealed, many of the most common employee wellness and engagement initiatives are not yielding their promised impact. What are these initiatives missing?
Join us to learn more about the results of a landmark study that seeks to answer this question by uncovering what engagement initiatives must accomplish for employees—on a psychological level—to be effective.
Using scientific insight into human motivation and advanced analytic techniques, we will share several key findings from our research, including:
• How tapping into five critical psychological benefits can provide a framework for true, sustainable engagement
• Why wellness and other popular programs aren’t delivering on the promise of employee engagement—and where organizations must focus instead
• How organizations can determine the right combination of initiatives to deliver the key psychological benefits that ultimately drive talent retention
Ortal Keizman, Vulcan Cyber research team lead; Yonatan Amitay, Vulcan Cyber security engineerRecorded: Aug 6 202018 mins
Join members of the Vulcan Cyber research team on this episode of The Vulnerability Report webcast series for unique insights into the latest infrastructure and application vulnerabilities threatening your digital business.
We promise we won't just read the CVE to you. Instead we run the research and do the work to provide you with useful tips, tricks, best solutions and remedies for the vulnerabilities that matter. We're focused on vulnerability remediation...not just vulnerability management. Together we can get fix done to secure IT.
On this episode we will dive into the SIGRed and BootHole vulnerabilities for starters, and provide the best remedies and solutions for each.
Andy Cease: Marketing Manager Financial Solutions, EDC & Juan Asenjo: Director Product Solution & Partner Marketing, EDCRecorded: Aug 6 202053 mins
Whether you’re issuing a credit or debit card instantly in a branch or centrally from a bureau, the security of the end-to-end solution is of utmost importance. Processing sensitive, personally identifiable financial data requires encryption – and the technology that underpins this cryptography depends on hardware security modules (HSMs). Entrust Datacard and nCipher have teamed up to create the built-for-purpose nShield Issuance HSM that is optimized for the increasingly complex needs of payment technology. As the industry evolved from Magstripe to EMV chip to dual-interface contactless, the card security paradigms continues to evolve. Having the right crypto engine ensures you can keep pace with evolving needs.
• What are the security threats faced by the evolving card issuance technologies
• Why a certified HSM root of trust is required to secure card issuance software
• How to ensure instant gratification for your customers’ card issuance demand
Laureen Kautt & Mary MackRecorded: Aug 6 202061 mins
LegalTech Recruiter Laureen Kautt is joined by EDRM's CEO Mary Mack introducing the first in a series of workshops designed to help the global community seeking employment in a pandemic. New tools and a shift in mindset are needed to navigate the changing currents.
Jason Creasey, Managing Director at Maven E&L and Karen Pieters, Ir. Team Leader E&L at Nelson Labs EuropeAug 7 20204:30 amUTC80 mins
Full Title: Identification of Approaches to Simulated Leachable Studies: What are They? When to do Them?
Presented by Jason Creasey, Managing Director at Maven E&L Ltd. Followed by an Industry Perspective presentation presented by Karen Pieters, Ir. Team Leader Extractables and Leachables at Nelson Labs Europe
The term “Simulated leachable studies” is open to interpretation. I hope to provide a definition of this term and in doing so suggest when they can and should be used. The general aim of such studies is to provide an accurate qualitative and quantitative description of the substances which might be present as leachables in a pharmaceutical drug product (DP) derived from container closure system (and sometimes its manufacturing process) when the drug product is stored up to and including its shelf-life. Simulated studies provide an alternative to analysis of leachables directly in the drug product. A simulated study aims to avoid some of the downfalls of leachable analysis such as; inaccurate analysis of leachables due to interference from drug product and/or formulation elements, availability of stored DP samples, reaching required limits of detection in the DP and time / resource constraints associated with complex method development using DP.
Simulated leachable studies must be able to accurately simulate the expected leachables in a DP and should be carefully crafted to achieve this. The system used for extraction must have similar propensity to leach from materials under study a drug product and care must be taken not to use system which either leach too much (potentially masking other substance) or too little.
Henry Pea, Director, Security Engineering (APAC) and Gary Gardiner, Head of Security Engineering (APJ)Aug 7 20205:30 amUTC75 mins
Consolidating all aspects of your security environment to enable seamless security management is never easy task. Tufin compliments Check Point’s vision through comprehensive visibility and automation as the key drivers to enforcing a unified security policy across the organization and enabling agile delivery of innovations, allowing customers all over the world to remove impediments for digital innovation via consolidation.
Join us in this webinar to review common use cases of enhanced security and compliance, and learn how you can:
• Reduce attack surface for malicious attack through comprehensive visibility and reduction of misconfigurations on your network devices
• Expedite and expand your Check Point deployments by reducing misconfiguration errors as well as efficient change management
• Deliver continuous and pro-active compliance through interactive unified security policy matrix and effective ‘what-if’ analysis
• Ace your audits through detail records of business reasoning as well as identification of authorized and unauthorized changes
If you're unable to attend this live webinar, you may still register to receive a link after the webinar to watch the session on-demand any time.
Tenh Shiao Peng Regional Senior Cloud Economics Consultant Microsoft & Matthew Heap Head of Solution Architecture, RackspaceAug 7 20208:00 amUTC45 mins
The COVID-19 pandemic has created a perfect storm of security risks for enterprises. The volume of possible attack surfaces has multiplied as a larger remote workforce means more possible entry points for cybercriminals.
The opportunity to target that workforce has increased exponentially, too. Out of necessity, many workers are utilizing technology that has been rapidly rolled out or scaled from solutions designed for in-house use, all in the interest of preserving organizational productivity.
So what are the processes and mindsets enterprises should adopt to stay secure during this exceptionally challenging time?
Join this webinar to learn how Rackspace and Microsoft can help you improve your security posture and manage risks:
1. Find out the biggest security concerns and challenges facing companies today
2. How to maintain a tight security posture while implementing Microsoft Teams for your WFH strategy
3. How you can ensure business continuity, by helping employees work remotely without feeling isolated
4. Learn how you can optimize your cloud security and address any security challenges via expert custom recommendations.
Securing your IT environment to run your business is of utmost importance.
By joining this webinar, we will show you how you can gain insights into your current security posture and develop a fact and risk-based action plan to keep the IT your systems and business safe.
Mark Olding and Lee RendellAug 7 20209:00 amUTC60 mins
Our industry and customer acclaimed cybersecurity technologies – with EDR at the core – empower you to defend your organisation effectively against evasive attacks – with no extra effort from your team.
This webinar will provide an overview of our tightly integrated proactive cyber defence system, armed with the following technologies:
• Kaspersky EDR Optimum plugs any gaps left by Endpoint Protection, empowering you to achieve true cyber-immunity in a world where simple anti-malware solutions are no longer enough.
• Kaspersky Sandbox is a vital addition to Kaspersky Endpoint Security for Business that automatically blocks complex threats without the need for additional resources.
• Kaspersky Endpoint Protection for Business, which won a 2019 Gartner Peer Insights Customers’ Choice for Endpoint Protection Platforms (with the largest share of customer reviews), and scored 100% for fileless threat protection in a recent test by AV-Test
Award-winning endpoint protection, automated Sandbox and a unified cloud console, work alongside EDR to aggressively defend your IT estate. If you’re looking for a provider of EDR, you can be confident that Kaspersky has been awarded in April 2020 the Gartner Peer Insights ‘Voice of the Customer’: Endpoint Detection and Response Solutions, coming first or equal first (from 16 shortlisted vendors) across ALL categories.
Minimize the risks to tomorrow’s business growth today.
Anthony Grenga, VP Cyber Operations, Peter Rydzynski, Detection Research Engineer & Oliver Wai, VP Product MarketingAug 7 202012:00 pmUTC45 mins
Between Russian COVID-19 vaccine hacking, Valak and Maze ransomware, and the Twitter hack, July gave threat hunters and cyber enthusiasts a lot to talk about. Join two members of IronNet’s elite SOC, VP of Cyber Operations Anthony Grenga and Detection Research Engineer Peter Rydzynski, along with Oliver Wai, VP of product marketing, for a fast-paced deep-dive into why these events matter, and what IronNet saw in customer environments over the month of July.
Tom Eckett, Deputy Editor, ETF StreamAug 7 20203:00 pmUTC55 mins
The ETF wrapper passed another stress test during the coronavirus turmoil with capital markets teams playing a crucial role in keeping ETF spreads narrow and ensuring authorised participants continued to make markets.
Structural issues in the secondary market remain however. Fragmentation problems in Europe continue to be a headache for the ecosystem while investors are crying out for a consolidated tape to be brought to market.
This live discussion will take a closer look at the steps being taken to improve market structure and ensure ETFs trade as efficiently as possible.
Jeremy Sexton/Jim MooreAug 7 20205:00 pmUTC75 mins
Jeremy Sexton, Director of Engineering at Apeks Supercritical and his counterpart Jim Moore at Delta Separations, discuss UL certifications: what's involved, how to get it, where we are in the process, and more!
Josh Rosenberg, Group Product Marketing, Confluent + Ricardo Ferreira, Developer Advocate, ConfluentAug 7 20205:00 pmUTC60 mins
The number of mission-critical apps and the amount of data underpinning them has grown exponentially in the increasingly digital world - with no sign of slowing down. But rigid data architectures slow organizations down, forcing them to spend too much up front on resources they don’t use, and causing lag or downtime across their apps. In today’s hypercompetitive digital world where customer loyalty connects with the best performing applications, every millisecond delay could be another lost customer.
Adjusting to the real-time needs of your mission-critical apps is only possible with an architecture that scales elastically. Confluent re-engineered Apache Kafka into an elastically scalable, next-gen event streaming platform that processes real-time data wherever it lives - making it accessible for any budget or use case.
Register now to learn how to:
-Quickly deploy Kafka in Confluent Cloud with just a few clicks and elastically scale your workloads
-Effortlessly connect your critical data sources and sinks to Kafka to build a complete data pipeline for your real-time apps
-Easily process streaming data with a simple interactive SQL interface using fully-managed KSQL
-Accelerate the deployment of standardized, self-managed Kafka clusters as cloud-native systems on Kubernetes to achieve elastic scale with Confluent Platform
Kris Pennella, Director and Mike Walker, Senior Director and Global Lead, Red Hat Open Innovation LabsAug 7 20206:00 pmUTC31 mins
Digital transformation is no longer an option. Every organization knows it must become a digital leader to survive. Successful digital transformation is not just about changing technology, it’s also about changing the way organizations work together. In this session, Mike Walker, Senior Director and Global Lead, Red Hat Open Innovation Labs, and Kris Pennella, Director, Red Hat Open Innovation Labs weave in real world customer examples of transformative efforts. They’ll examine how companies are changing the game based on their ways of working, focusing on changing processes and the future of their organizations.
James Shelburne, Sr. Product Manager, Ujjwal Krishnamurthi, Software EngineerAug 7 20209:30 pmUTC39 mins
If you’re an app developer, you know mobile app users have frustrating experiences -- screen sizes are small, dropdowns and other UX elements are hard to navigate and require the user to learn and get used to. Touch and type is impossible to use while on the go. Graphical User Interfaces have reached their limits.
Join us May 26th and learn how you can revolutionize your app UX with the Alan Voice AI Platform. With Alan, you have everything you need to Build, Debug, and Integrate a powerful voice interface into your applications. Once Integrated, Alan provides deep insights with logs and analytics so you can Iterate quickly to bring users an amazing experience.
We'll show you prime use cases for voice and give a step-by-step guide on how you can add a voice interface to an existing iOS application.
Hear from leaders in Voice Application Development and learn how voice interfaces will play a significant role in enhancing the quality of our interactions with computers and transform every global industry.
Sadhana Nandakumar, Specialist Solutions Architect at Red HatAug 10 20201:00 amUTC13 mins
Session 4 of 4-part series:
During this demo, you’ll see how businesses can use open source technology to react to streaming events and data, integrating AI/ML models and decisioning to improve customer retention with compelling, relevant offers.
About the series:
By using open source technologies and event-driven architectures, you’ll be able to innovate faster, offer greater competitive differentiation, and gain improved digital customer engagement. Join Red Hat for a 4-part, self-paced workshop on how to modernize customer engagement.
Eric Munson, Professor and Head at Purdue UniversityAug 10 20204:30 amUTC59 mins
Full Title: High-Resolution Characterization of Structure, Interaction, and Miscibility of Drug Products
The local interactions between a drug and its surrounding environment is critical in both small and large molecule formulations. For small molecules, the drug-polymer interaction is needed to ensure that the drug does not crystallize in an amorphous solid dispersion. For proteins, phase separation in lyophilized formulations will lead to reduced stability and the potential for aggregation. In this presentation, the ability to probe these local structures and interactions in both small and large molecule systems will be shown. Case studies will be presented that demonstrate how structural properties (e.g. degrees of interaction, changes in conformation) can impact functional properties such as crystallization and aggregation.
Eric Munson of Purdue University
Eric Munson, Ph.D., is currently Professor and Head of the Department of Industrial and Physical Pharmacy at Purdue University. He received his B.A. degree from Augustana College in Sioux Falls, South Dakota, in 1987. After studying one year in Munich, Germany, on a Fulbright Fellowship, he received his Ph.D. in 1993 from Texas A&M University, and was a postdoctoral fellow at the University of California, Berkeley in 1994. He was in the Chemistry Department at the University of Minnesota before moving in 2001 to the Pharmaceutical Chemistry Department at the University of Kansas, to the Pharmaceutical Sciences Department at the University of Kentucky in 2010, where he was the Patrick DeLuca Endowed Professor in Pharmaceutical Technology. In 2018 he moved to Purdue University to become Professor and Head of the department. His research program is focused on the characterization of pharmaceutical solids using a variety of analytical techniques, with an emphasis on solid-state NMR spectroscopy. Dr. Munson is a coinventor on three patents and has published more than 100 research, review, and book chapters.
Dr. Chris Boorman, VP, Marketing, EMEA & APAC, Forcepoint & Dave Barnett, Dir Edge Protection Solutions, ForcepointAug 10 20207:00 amUTC20 mins
In this webinar we kick-off our Secure Access Service Edge (SASE) Summit; a virtual event for cybersecurity professionals who are interested in learning how to implement a true SASE architecture.
Join Dr. Chris Boorman, Vice-President of International Marketing and Dave Barnett, Director of Edge Protection solutions, as they discuss this revolutionary approach to securing the cloud and preview the 5 Sessions that will give you a blueprint for SASE success:
Step 1: Connectivity in a Borderless World - The New Edge
Step 2: Secure Access for a Remote Work Environment
Step 3: Data Protection in a Multi-Cloud Environment
Step 4: Becoming More Risk Aware by Understanding User Behavior
Step 5: Blueprint for SASE Success
Nicolas Fischbach, Global CTO, Forcepoint & Florent Fortune, VP and GM, Network and Edge Protection, ForcepointAug 10 20207:00 amUTC20 mins
En avant-première et en français, Nicolas Fischbach, CTO de Forcepoint et Florent Fortune, VP Network et Cloud, vous proposent un aperçu privilégié de la route vers SASE (Secure Access Service Edge) qui sera présentée lors du SASE Cybersummit du 11 aout.
Les deux experts feront un point sur la convergence des solutions réseau et sécurité dans le cloud et évoqueront le programme de la classe d’été virtuelle à l’intention des professionnels de la cybersécurité, déclinée en une série de sessions en langue anglaise :
- Keynote par le CEO de Forcepoint
- Les étapes clés pour réussir la démarche SASE
1 - Le nouveau périmètre
2 – Le travail à distance
3 – La protection des données en mode multicloud
4 – L’analyse comportementale
5 – Réussir son architecture SASE, avec Nico Popp, CPO
Nicolas Fischbach, Global CTO, Forcepoint & Frank Limberger, Data and Insider Threat Specialist, ForcepointAug 10 20207:00 amUTC17 mins
Dieser Webcast ist der Start zu unserem EMEA SASE Summit. Sie bekommen einen Überblick was SASE ist, welche 5 Schritte für ein erfolgreiches SASE Projekt notwendig sind und wie wir die aktuelle Situation im DACH-Markt sehen.
Verpassen Sie nicht wenn Nico Fischbach, Global CTO Forcepoint und Frank Limberger, Data and Insider Threat Specialist, Forcepoint diesen neuen Ansatz zur Sicherung der Cloud besprechen und einen Ausblick auf die 5 Webinare geben:
Step 1: Connectivity in a Borderless World - The New Edge
Step 2: Secure Access for a Remote Work Environment
Step 3: Data Protection in a Multi-Cloud Environment
Step 4: Becoming More Risk Aware by Understanding User Behavior
Step 5: Blueprint for SASE Success
Jaret Chiles, Jason Gates,Wesley Mauer, Michael Wind and Himanshu RaoAug 10 20209:00 amUTC39 mins
Join us on Thursday, July 23 at 11:30 a.m. CDT for a live, one-hour Ask the Experts News Hour, “Modernising Your Infrastructure for the New Normal.” Hear from technology leaders from Rackspace Technology and Microsoft and discover how to:
• Ensure security, scalability and pay-for-what-you-use flexibility
• Satisfy your organisation’s cloud-first or digital transformation initiatives
• Cut costs by up to 40% with technologies like SAP on Azure
Rackspace Technology and Microsoft are here to help you leverage technology to solve today’s toughest challenges.
Malcolm Tyrrell, Retirement and Later Life Specialist, JustAug 10 202010:00 amUTC90 mins
With a growing demand for equity release, lifetime mortgages remain a useful tool in your kit when finding practical solutions for clients over the age of 55. It is no longer a ‘last resort’ solution, but part of a client’s assets that should be included within a holistic approach. There are a number of myths around lifetime mortgages that consumers need to be educated about and, as with many financial decisions, this area requires careful consideration. Clients should be handled with sensitivity and any vulnerabilities should be identified and taken into account in line with the FCA’s guidance in this area.
The Regulator has recently reviewed Equity Release advice and issued some clear guidelines. For most advisors in this market these guidelines can be ‘ticked off’ but this will be a useful opportunity to ensure your firm is fully aware of your obligations when recommending equity release products.
If approached in the right way, Lifetime Mortgages can be a particularly rewarding area in which to advise HNW clients. There are many tax planning opportunities and possibilities for professional, qualified financial intermediaries in the equity release space. In this session, Just will cover:
• The drivers for growth in the ER market
• The alternative options and FCA advice guidelines
• Why Equity Release is suitable for HNW clients
• Changing attitudes
• Responsible lending initiatives
• The impact of underwriting
Malcolm Tyrrell is a Retirement and Later Life Specialist at Just. Malcolm shares his knowledge of the retirement and later life markets with intermediaries through the delivery of high quality presentations and workshops.
He has over 39 years’ experience in financial services, both with a number of major providers and in his own IFA practice. Since 1990 Malcolm has specialised in training and business development.
Jesper Frederiksen, VP & General Manager, EMEA at Okta & David McClellandAug 10 202010:00 amUTC26 mins
At a time when the insurance industry has seen unprecedented consolidation, what are the smartest steps to digitally transform and remain competitive? How can you deliver productivity, connectivity and security fast, to outrun your legacy competitors and keep up with the innovative newcomers?
In this Inner Circle conversation, we explore how to put your business on the inside digital transformation track with Jesper Frederiksen, VP & General Manager for EMEA at Okta.
We are delighted to introduce the next edition of our CPD-endorsed fortnightly webinar series: T. Rowe Price @ 2.
Dan Hurley, Portfolio Specialist, will assess some commonly-held perceptions on the Japanese equity market. Unloved by many, loved by some, Japan has been playing catch-up with G8 peers for some time now. Despite these developments, the opportunity set is far from uniform. Find out what to consider when investing in Japan.
Attending this event will qualify you for 45 minutes of structured CPD.
CyberProof's CEO, Tony Velleca and VP of Security Strategy, Bruce RotonAug 10 20205:00 pmUTC45 mins
In this webinar CyberProof CEO, Tony Velleca and VP of Security Strategy, Bruce Roton, will shed light on how and why CyberProof uses this framework for better threat detection mapping, and how companies can benefit from implementing it into their cyber security strategy.
Michael Bingham, Technical Trainer, ConfluentAug 10 20208:00 pmUTC62 mins
Pick up best practices for developing applications that use Apache Kafka, beginning with a high level code overview for a basic producer and consumer. From there we’ll cover strategies for building powerful stream processing applications, including high availability through replication, data retention policies, producer design and producer guarantees.
We’ll delve into the details of delivery guarantees, including exactly-once semantics, partition strategies and consumer group rebalances. The talk will finish with a discussion of compacted topics, troubleshooting strategies and a security overview.
This session is part 3 of 4 in our Fundamentals for Apache Kafka series.