Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Comment organiser vos systèmes de protection de données en fonction du RGPD
    Comment organiser vos systèmes de protection de données en fonction du RGPD Philippe Decherat Live 45 mins
    Connectez-vous à notre prochain webinaire présentant la solution Commvault® Data Platform® prévu le 26 septembre 2017 à 9h30 pour découvrir comment Commvault peut vous aider à aligner vos systèmes de PROTECTION DE DONNÉES pour répondre aux contraintes réglementaires RGPD.

    Reconnu à ce jour comme le règlement le plus dur de la protection de la vie privée et le plus important, le RGPD a été adopté en avril 2016 et prendra effet le 25 mai 2018. Il transformera le paysage des données personnelles et plus précisément leur collecte et leur utilisation. Il obligera les entreprises et le secteur public à effectuer des analyses profondes sur la façon dont ils gèrent et exploitent les données privées.

    Plusieurs organisations ont décidé de consolider les opérations les plus critiques de protection, de conformité et de découverte des données sur une seule plate-forme unifiée, Commvault. Cela permet à l ‘entreprise d’avoir une vision claire sur les applications et les données non structurées qu’elle détient, et ainsi pouvoir respecter les articles et les principes clés du RGPD et être en mesure d’assurer la conformité auprès du régulateur.

    Une approche intégrée offre une vue d'ensemble permettant d'optimiser les contrôles d'accès, de consolider autant que possible et de prioriser les efforts de sécurité tout en permettant une réactivité accrue aux demandes d'accès. En outre, il est possible d’automatiser l'application de la politique de rétention dans un paysage de données, y compris en réduisant considérablement les risques liés aux terminaux.
  • 5 things you can do with a security policy management solution [APAC]
    5 things you can do with a security policy management solution [APAC] Jeffrey Starr, CMO & Edy Almer, VP Product Recorded: Sep 26 2017 45 mins
    Today’s enterprises are continuously evolving to support new applications, business transformation initiatives such as cloud and SDN, as well as fend off new and more sophisticated cyber-attacks on a daily basis. But security and network staff are struggling to keep up – which not only impacts business agility, but exposes your enterprise to risk and hampers its ability to address the modern threat landscape.

    Many professionals believe that they need latest and greatest new tools to address these challenges. But what if you already have what you need, up and running in your organization: your security policy management solution?

    Today’s security policy management solutions do a far more than automate traditional change management tasks. In this technical webinar, Edy Almer, VP of Products at AlgoSec highlights 5 key security management challenges facing enterprise organizations today and explains how AlgoSec’s solution can help you manage security, reduce risk and respond to incidents while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.

    This technical webinar focuses on:

    - Managing security policies end-to-end across public and private cloud including --Microsoft Azure, Amazon Web Services AWS, Cisco ACI and VMWare NSX
    - Mapping security vulnerabilities to their applications to assess and prioritize risk
    - Enable SOC engineers to tie cyber-attacks to business processes
    - Migrating Firewall policies between firewall brands
    - Performing a fully automated, zero-touch security policy change
  • Learn to be a Top-Gun Troubleshooter Through Simulation - APAC
    Learn to be a Top-Gun Troubleshooter Through Simulation - APAC Russell Whitehouse, Kepner-Tregoe Recorded: Sep 26 2017 51 mins
    Before a pilot is given the keys to fly a passenger jet they spend many hours in a simulator preparing to avoid dire consequences. Troubleshooters in all walks of life prepare for real-life calamities by studying theory and working through case studies none of which replicate the pressure cooker they find themselves in when things have gone pear shaped.

    Kepner-Tregoe will be demonstrating a method that has answered our clients needs to hone troubleshooting skills in a safe to fail environment. One that simulates the pressure cooker of a real-live challenge complete with consequences and rewards for actions taken.

    •Prevent trial-and-error by narrowing down possible causes BEFORE taking action
    •Use only the critical pieces of the troubleshooting process appropriate to the situation
    •Learn to solve problems under pressure and restore operations safely and quickly
    •Cloud-based simulation that allows troubleshooting practice in a safe-to-fail environment
  • Modern PMO - Sense Change and Respond Proactively
    Modern PMO - Sense Change and Respond Proactively Andy Jordan, Roffensian Consulting Inc. and Jim Tisch, CA Product Marketing Recorded: Sep 26 2017 57 mins
    In the rapidly evolving world, the ability for organizations to develop greater agility depends on the ability of their PMO to evolve and grow the role they play.

    What should a Modern PMO be?

    Join Andy Jordan, internationally recognized PMO and PPM expert together with CA Technologies, Jim Tisch to explore the evolution of PMOs to ensure they are ‘future proofed’ to deliver the evolving needs of organizations. Among other topics Andy will explore:

    •The move from business focused to business driving
    •A shift in emphasis from value to cost of value
    •The evolution from strategic to differentiating
    •The steps necessary to make the change

    Delivered in Andy’s signature high energy style this webinar promises to not only challenge the way you think about project execution and the role the PMO plays, but also to think about the implications on other areas of your organization. Andy will provide a roadmap to help you start that journey of evolution and ensure your PMO is ready for the brave new project delivery world ahead.
  • Are Your Apps Chasing Users Away ?
    Are Your Apps Chasing Users Away ? Dennis Drogseth EMA V.P Research & Nik Koutsoukos Riverbed VP, Recorded: Sep 25 2017 62 mins
    How to Deliver Superior Digital Experiences: Users expect flawless digital experiences when using your apps, irrespective of device or location. To succeed, IT and business stakeholders need digital experience insights to ensure that every business-critical application keeps customers happy and employees productive. This requires a comprehensive Digital Experience Management (DEM) strategy.

    Join us as we discuss:

    - Must-haves to rolling out successful digital experience management practices
    - Critical components of an effective DEM solution
    - Expected business results and outcomes
    - Pitfalls to avoid along the way
  • Big Data Maturity Survey Results: Big Data is No Longer Experimental
    Big Data Maturity Survey Results: Big Data is No Longer Experimental AtScale Recorded: Sep 25 2017 2 mins
    Abstract: Check out AtScales’ 2016 Big Data Maturity Survey Results in this fast 2min video summary including data from more than 2,550 Big Data pros, across over 1,400 companies and 77 countries. The AtScale Big Data Maturity Survey Report and scope is unparalleled and defines the current state of the industry providing real-world analysis to help you with your 2018 Big Data strategy.

    Watch now to discover key findings:

    - Close to 70% have been using Big Data for more than a year (vs. 59% last year)
    - 74% of respondents have more than 10 nodes, close to 20% have over 100 nodes
    - 73% of respondents now in production (vs. 65% last year)
    - 95% of respondents have achieved positive value or are anticipating they would
  • DevOps, NPM, & DNS with Kentik
    DevOps, NPM, & DNS with Kentik Avi Freedman, Co-founder & CEO of Kentik Recorded: Sep 25 2017 12 mins
    Avi Freedman, co-founder and CEO of Kentik, shows off Kentik Detect as a plugin for DevOps tools such as Grafana. This provides a subset of data from the Kentik API that can be used alongside other application metrics in an overall dashboard.
  • Network Peering & Planning with Kentik Detect
    Network Peering & Planning with Kentik Detect Jim Meehan, Director of Solutions Engineering at Kentik Recorded: Sep 25 2017 31 mins
    Jim Meehan, Director of Solutions Engineering at Kentik, reviews using Kentik Detect for network peering analysis and planning purposes. This can be used by service providers, content source networks, and CDNs. Because Kentik Detect correlates flow data with other variables at full resolution, it gives organizations easily understood information to prioritize traffic for cost and performance.
  • Gain Real-Time Vulnerability Assessment for Rapid Response to Security Threats
    Gain Real-Time Vulnerability Assessment for Rapid Response to Security Threats John Chirhart, Federal Technical Director, Tenable & Ellen Sundra, RVP of Systems Engineering PubSec, ForeScout Technologies Recorded: Sep 25 2017 50 mins
    Whether you’re an information security, compliance or IT executive, your job is harder than it’s ever been before. Regardless of your organization’s size or industry, there is a lack of immunity against the increasingly advanced threat environment.

    The number of data breaches reported today is growing at a rapid pace – as are the associated costs. At the same time, regulatory mandates continue to evolve. Yet, even with most organizations spending significant money on people and technology, the bad guys keep getting through.

    Join industry experts John Chirhart, Tenable and Ellen Sundra, ForeScout, on June 14 and discover how to:

    - Reduce security risk through faster, automated vulnerability scans of newly introduced systems on your network
    - Improve efficiency by focusing vulnerability scans on newly detected systems and on systems that have changed since the last scan
    - Increase ability to identify and eliminate vulnerable systems in hard to reach or unknown areas within your network
    - Orchestrate multi-system security
  • The Kentik Data Engine
    The Kentik Data Engine Avi Freedman, Kentik Co-founder & CEO Recorded: Sep 25 2017 20 mins
    Kentik Co-founder & CEO Avi Freedman provides a technical overview of the Kentik Data Engine (KDE). It is run in the cloud and designed for the particularly high ingest required to maintain full resolution of all network flow data. KDE allows for real-time stream processing of network traffic for anomaly detection. Avi goes into the details of how the system was designed from the ground up for that specific purpose.
  • UCare 2018 Medicare Advantage portfolio
    UCare 2018 Medicare Advantage portfolio Brian Eck, Sales Director, UCare & Richard Lett, CEO LeClair Group, Recorded: Sep 25 2017 60 mins
    Following the introduction to UCare, this webinar will be a deep dive into UCare's 2018 Medicare Advantage portfolio, including plan designs, service areas, support, training, and getting appointed through LeClair group as your FMO.
  • Overview of the Kentik Detect SaaS Platform
    Overview of the Kentik Detect SaaS Platform Jim Meehan, Kentik Director of Solutions Engineering Recorded: Sep 25 2017 30 mins
    Jim Meehan, Director of Solutions Engineering at Kentik, reviews the UI and functionality of Kentik Detect, the SaaS-based network traffic intelligence platform. This is designed to keep the full resolution of network flow data, rather than an aggregated ingest. This enables the creation of summary reports, while still allowing for drill down into very narrow pieces of data.
  • Introduction to Kentik with Co-founder/CEO Avi Freedman
    Introduction to Kentik with Co-founder/CEO Avi Freedman Avi Freedman, Kentik Co-founder & CEO Recorded: Sep 25 2017 13 mins
    Avi Freedman, co-founder and CEO at Kentik, introduces the company to Networking Field Day 16. Kentik offers network traffic analytics, starting with flow information and augments it with routing and other metrics.
  • 1/3- Ética em Pesquisa e Publicações
    1/3- Ética em Pesquisa e Publicações Karin Hoch Fehlauer Ale Recorded: Sep 25 2017 72 mins
    Na primeira aula do curso, conversaremos sobre as bases éticas em pesquisa e publicações. Também abordaremos a detecção de erros honestos e má conduta em artigos. Encerraremos a aula com a retratação de artigos publicados.


    Minicurso "Seja um pesquisador responsável: publique com ética"

    O minicurso é composto por três aulas que abordarão o comportamento ético para a boa qualidade da pesquisa científica. A conduta antiética existe tanto dentro como fora do contexto do mundo acadêmico. Casos rotineiros de trapaça, fraudes e golpes são exemplos de comportamento antiético que têm consequências graves, passíveis de punição. Na Academia, a conduta antiética também pode ter desdobramentos sérios. O desenvolvimento de boas práticas em pesquisa ética ajuda os autores a publicarem seu trabalho de forma responsável e a evitarem assim rejeição e principalmente retração devido à má conduta. Além de acabar com uma trajetória profissional, a má conduta fere gravemente a integridade da Ciência. Neste curso, forneceremos orientação sobre quais são os preceitos éticos em publicação e como não cair em armadilhas durante o processo.

    This will be delivered in Portuguese
  • 10 inTech with Mark Stouse, CEO, Proof Analytics
    10 inTech with Mark Stouse, CEO, Proof Analytics IT Chronicles Media Recorded: Sep 25 2017 12 mins
    Mark Stouse, CEO of Proof Analytics speaks with the Ten in Tech team about how they use gathered data to provide insight to marketing departments by addressing the challenge of measuring the results they are getting for their marketing spend.
  • Blue Cross and Blue Shield 2018 Small Group Product Portfolio and Updates
    Blue Cross and Blue Shield 2018 Small Group Product Portfolio and Updates Michelle Ahcan, Blue Cross and Blue Shield; Sarah Ohlmanson, Blue Cross and Blue Shield; Richard Lett, LeClair Group Recorded: Sep 25 2017 59 mins
    Please join Michelle Ahcan and Sarah Olmanson on September 25th as they review Blue Cross Blue Shield’s small group portfolio for 2018. We will review and update you on using the Blue Cross small group portal, providing tips and tricks on getting your business submitted accurately and on time.
  • Shifting sands: buyers are changing the rules of buying – adapt now or die!
    Shifting sands: buyers are changing the rules of buying – adapt now or die! Dr Lucy Green CEO and Melanie Foster from Larato Recorded: Sep 25 2017 45 mins
    Four in ten planned technology purchases don’t happen. Buyers struggle to buy in the way they want to. The result? They choose not to purchase and that’s a lose-lose for buyer and supplier.
    Buyers say they don’t feel they have been guided well enough for them to be confident in making a purchase. The ground simply isn’t solid enough.
    Join Dr Lucy Green and Melanie Foster from Larato and our guest technology buyer to learn what buyers want their technology suppliers to do to help them buy. Want to secure more sales? This is the webinar to attend!
  • Latest developments in the global private placement market
    Latest developments in the global private placement market Scott Ashton and Brian Bates, Morrison & Foerster; Tarun Sakhrani, Barclays; Tom Young, IFLR Recorded: Sep 25 2017 86 mins
    The cross-border private placement market has continued to grow, providing issuers with an opportunity to raise capital from US and European financial institutions. This market, which has seen incredibly robust activity this past year, has continued to attract issuers across a myriad of industries and from multiple worldwide jurisdictions. These issuers seek to, among other things, diversify their funding sources or supplement their bank lending, lengthen their existing debt profile, refinance acquisition debt or finance certain single-asset projects. In this webinar, speakers will discuss:

    •The global private placement market and recent trends;
    •Market participants;
    •Documentation requirements for traditional and structured transactions;
    •Financial covenants, MFLs and model form provisions;
    •New issuers using the market (social housing trusts, universities, investment trusts, etc);
    •Marketing process with Agented and direct Private Placements; and
    •Ratings and the NAIC.
  • BCI Cyber Resilience Report 2017
    BCI Cyber Resilience Report 2017 Gianluca Riglietti CBCI Recorded: Sep 25 2017 26 mins
    The BCI Cyber Resilience Report is an analysis of cyber security incidents experienced by organizations across the world, and how they respond to them. These types of incidents are not rare occurrences with two-thirds of organizations experiencing at least one disruption during the previous year, while 15% report at least ten. Furthermore, one third of respondents report cumulative losses in excess of €50,000, while 13% put this figure in excess of €250,000.
  • The Keylight Platform 2-Minute Overview
    The Keylight Platform 2-Minute Overview LockPath Recorded: Sep 25 2017 2 mins
    Our award-winning Keylight Platform is used by organizations across industries, to automate business processes, manage risk, and demonstration regulatory compliance – all in an effort to achieve audit-ready status.

    Learn more about LockPath, the Keylight Platform, and the full family of apps by visiting us at www.lockpath.com.
  • Oltre il GDPR Difese informatiche integrate
    Oltre il GDPR Difese informatiche integrate Alessandro Gioso; Giampiero Nanni Recorded: Sep 25 2017 58 mins
    È cominciato il conto alla rovescia per il GDPR, e per la privacy dei dati si apre una nuova era.
    Unisciti agli esperti Symantec per scoprire perché il GDPR offre una grande opportunità per cambiare totalmente l’approccio alla sicurezza dei dati.

    La sicurezza informatica integrata può migliorare la protezione offerta alle informazioni aziendali, oltre ad aiutarti a sfruttarle al meglio per farti acquisire un maggiore vantaggio competitivo.
  • Work smarter, not harder
    Work smarter, not harder Sarra Beajoui Recorded: Sep 25 2017 33 mins
    At InTouchNetworks.com, we work with leading companies and expert advisors to bring you business information and insight. Our latest fee webinar, ‘Work Smarter, not harder- ensure you are working to your strengths and maximising your value’ is brought to you by SmartPA.

    The webinar will be presented by Sarra Beajoui, the co-founder of the market leaders in the administrative and business support sector. With over 20 years project management experience in Blue Chip organisations, Sarra now heads up a vast international talent pool of SmartPAs.

    During the 45-minute seminar, Sarra will cover:

    -How best to identify the non-value add activities you have grown accustomed to doing and how to stop doing these
    -Identify how to integrate your own dedicated business support executive into your business/role
    -Discover how to maximise the output from your business support person

    There will also be a 15 minute session, during which you can raise any questions you may have for Sarra.

    The live webinar will take place on Monday 25th September (1pm); alternatively, you may watch a recorded version any time after the event by registering on the link below.
  • 3GPP RAN Chairman - Status report - RAN#77
    3GPP RAN Chairman - Status report - RAN#77 Balazs Bertenyi Recorded: Sep 25 2017 21 mins
    Balazs Bertenyi will give a 15 minute presentation on the outcome of the last 3GPP RAN plenary, which took place in Sapporo from 11 - 14 September, 2017.

    There will be time for Q&A afterwards.

    - Completion of Rel-14
    - Rel-15 Status
    - New Radio work
    - Some thoughts about the timeline for 5G
  • Unearthing Customer Sentiments using Natural Language Processing
    Unearthing Customer Sentiments using Natural Language Processing Sai Gopalakrishnan, Big Data Scientist & Thomas Joseph, Chief Data Scientist Recorded: Sep 25 2017 30 mins
    You have to listen to what people are saying about your brand, products, services… and more importantly you should react and respond. But is it possible for you to manually look at every single customer feedback available in emails, social media et al and respond appropriately? Certainly, a tall task. Smart automation is necessary.

    Take action on customer feedback and reach closer to your business goals.
    Understand the dynamics of Customer Sentiment Analysis in just under 30 mins.

    Key takeaways of this webinar:

     An overview of customer sentiment analysis and its applications in selective industries
     Learn how Aspire captures the sentiments behind customer responses using NLP techniques
     How to Identify products and services that are craved for and those that need improvement?
     Ideas for minimizing Customer Churn and strategizing targeted campaigns using the results of Sentiment Analysis
  • Game Over Ransomware, Wie Malwarebytes Ihren Tag rettet
    Game Over Ransomware, Wie Malwarebytes Ihren Tag rettet Helge Husemann Recorded: Sep 25 2017 62 mins
    Unternehmensendpunkte stehen unter ständigem Angriff. Eine erfolgreiche Malware-Infektion bietet den festen Cyber-Kriminellen, die die sensiblen Daten einer Organisation stehlen müssen. Obwohl Ransomware selbst weit von einer neuen Bedrohung entfernt ist, mit einem beispiellosen Wachstum von 267% im letzten Jahr allein, ist es eindeutig schnell zu den Cyber-Kriminellen aktuelle Waffe der Wahl.
  • The fight against cyber crime in financial services: how prepared are you?
    The fight against cyber crime in financial services: how prepared are you? Matthew Thomas, Asia Bureau Chief, Euromoney Institutional Investor Sep 26 2017 8:00 am UTC 105 mins
    Euromoney Moderator:
    Matthew Thomas, Asia Bureau Chief, Euromoney Institutional Investor

    Speakers:
    - Margaret Harwood-Jones, Global Head of Securities Services, Standard Chartered
    - Cheri F. McGuire, Group Chief Information Security Officer, Standard Chartered
    - Patrick Wheeler, Director, Cyberwayfinder
    - Paul Jackson, Head of Asia-Pacific Cyber Security & Investigations Practice, Kroll (Contact: Paul.jackson@kroll.com)

    Agenda:
    Know your (cyber) enemy
    Technology advancements have changed the way financial services operate, but they have also ushered in new challenges and threats.
    What are the risks, how big are they and what is the impact? Eg. Data theft versus system shut downs – which has a greater economic threat?

    When financial services are attacked…
    Cyber criminals have exposed vulnerabilities of financial institutions to disturbing effect. Is it more effective for banks to counter cyber risks on their own, or collectively as an industry? Would it help to have a central regulator for bank cyber security? When assessing counterparty risks, how much weightage is placed on their cyber security controls?

    Responding to the cyber challenge – how financial services can best prepare
    The establishment of regulatory controls and standards can only go so far, and the industry itself need to do much more to improve the situation – getting the basics right in a legacy environment, sharing best practices, building a security-based culture etc…

    Looking ahead: Anticipating paradigm shifts
    How much closer are we to creating ‘unhackable’ systems? Can quantum computing or other technologies present a cost-efficient solution?


    By signing up to this webinar you agree to be contacted (by email) by the hosts Euromoney & Global Capital, as well as the sponsor Standard Chartered.
  • Exploitez l'analyse en temps réel des Big Data pour optimiser le parcours client
    Exploitez l'analyse en temps réel des Big Data pour optimiser le parcours client Edouard Guérin - Spécialiste Big Data, Informatica Sep 26 2017 9:00 am UTC 45 mins
    L'IoT ouvre l'accès à de vastes données qui favorisent la prise de décision, à condition d'être exploitées de manière opportune. A l'instar des géants du digital, les Entreprises doivent être en mesure de collecter et analyser ces informations en temps réel, afin d'en tirer tout le potentiel et offrir des expériences exceptionnelles et pertinentes, au bon moment.

    Mardi 26 Septembre à 11 heures, participez à ce webinaire et découvrez comment :
    - Ingérer automatiquement les données issues des objets connectés grâce aux technologies de streaming ;
    - Améliorer la pertinence de vos analyses en temps réel en combinant connaissance client et données contextuelles ;
    - Augmenter les revenus et rentabilisez vos investissements en adaptant le parcours client de façon simultanée.
  • WebFOCUS - Now and the Road Ahead
    WebFOCUS - Now and the Road Ahead Antonio Mendes , Presales Consultant Southern Region, Information Builders Sep 26 2017 9:00 am UTC 60 mins
    Esta sessão visa apresentar o mais recente Roadmap de WebFOCUS com demonstrações das novidades contidas no último lançamento.

    Tópicos a desenvolver:

    • WebFOCUS Now: Demonstração das características chave de WebFOCUS 8201M
    • Melhorias da versão 8.2 do WebFOCUS Portal, InfoAssist +, Mobile e muito mais!
    • Futuro: Componentes do WebFOCUS 82XX
    • Iniciativas estratégicas
  • How to Respond to Peer Reviewer Comments
    How to Respond to Peer Reviewer Comments Steven Ward Sep 26 2017 9:00 am UTC 60 mins
    Would you like to have more confidence when you respond to reviewer comments? Are you trying to gain a better understanding of the peer review process in general? Together we will look at the practical aspects of writing a response letter, including responding to reviewer comments.

    Who is this for?
    Anyone who would like to get published in an international academic journal but find themselves intimidated by the review process can join the webinar. It will be particularly helpful to authors that are awaiting an answer to their submitted manuscripts.

    Why should you attend?
    In a very short time, you will develop a very detailed understanding of the entire process. You will know the best tone and format for responding.

    Note that the webinar will be conducted in English.
  • 5 THINGS YOU SHOULD BE DOING RIGHT NOW TO BE MiFID II COMPLIANT
    5 THINGS YOU SHOULD BE DOING RIGHT NOW TO BE MiFID II COMPLIANT Andrew Fawcett, MiFID II Product Manager TeleWare Sep 26 2017 10:00 am UTC 45 mins
    The clock is ticking until MiFID II is implemented. January 3rd 2018 is just over 100 days away. How confident are you that your business can comply with the new record-keeping requirements?

    We're working with our customers to help ensure they will meet their MiFID II recording requirements. In this webinar we will share practical advice on how you can be ready on time.

    We will discuss:

    •Market insight into where businesses are in their MiFID II journey
    •What to do about data storage post MiFID II
    •Planning to grow despite more compliance
    •How to tackle the increased record keeping requirements

    The session will be hosted by:
    Vicky Ryder – Microsoft Practice Lead
    Andrew Fawcett – MiFID II Product Manager

    Target audience:
    Senior compliance and IT professionals in businesses impacted by MiFID II.
  • Snow for SAP
    Snow for SAP Dan Kirtley & Martin Snookes Sep 26 2017 10:00 am UTC 45 mins
    Discover how your peers have significantly reduced their SAP licensing costs. An expert guide.
    Part of a series
  • Why sales people fail...and what you can do about it
    Why sales people fail...and what you can do about it Nigel Dunand Sep 26 2017 10:00 am UTC 60 mins
    •Sales cycles dragging on?
    •Not getting in front of enough on-profile prospects?
    •Frustrated by prospects haggling on price?
    •Tired of hearing the same old excuses from your sales team?

    If you manage sales people, and any of these types of challenges resonate with you, then sign up for this webinar.

    •Learn the importance of having a system for selling, and coaching your people to stick to it.
    •Find out why selling features, advantages, and benefits wastes everyone's time.
    •Discover how closing for a decision, YES or NO, can improve your sales teams effectiveness and efficiency.
  • How to increase customer lifetime value using post conversion email campaigns
    How to increase customer lifetime value using post conversion email campaigns Chantelle Knoetze, Key Account Director Sep 26 2017 11:30 am UTC 60 mins
    Join Chantelle to learn why your relationship with subscribers and customers shouldn't stop at the sign-up or the sale, and how you can increase customer lifetime value using post conversion email campaigns.
  • DFLabs IncMan Product Overview
    DFLabs IncMan Product Overview Oliver Rochford, VP of Security Evangelism; Mike Fowler, VP of Professional Services Sep 26 2017 12:00 pm UTC 30 mins
    Learn how DFLabs IncMan can help you automate, orchestrate and measure your incident response and security operations.

    By joining this webinar you will have the opportunity to discover DFLabs IncMan and how our solution can help you to:

    - Minimize Incident Resolution Time by 90%
    - Maximize Analyst Efficiency by 80%
    - Increase the amount of handled Incidents by 300%
  • How to Make the Most of Your Data - Sales Analytics
    How to Make the Most of Your Data - Sales Analytics Joe Clarke - UK Sales Manager, Tableau Sep 26 2017 12:00 pm UTC 60 mins
    In sales, the right data and analytics can be the difference between making or missing your quota. Here at Tableau, we rely on analytics to empower every salesperson to better understand their accounts, identify promising prospects, and forecast accurately. This webinar is part of the "Analytics in Action" week.

    Join the live webinar with Tableau's UK Sales Manager, Joe Clarke, to see how our sales team have made sales analytics part of their team daily routine.

    You'll learn how Tableau's sales organisation uses analytics to:

    *Develop strategic account plans
    *Align with marketing campaigns
    *Define territories and lead routing
    *Collaborate globally for the best customer experience
  • Gérez vos données Big Data dans Hadoop
    Gérez vos données Big Data dans Hadoop M. Fateh Naili Sep 26 2017 1:00 pm UTC 45 mins
    Gérez vos données Big Data dans Hadoop

    Si vous rencontrez des difficultés dans le pilotage de vos projets Big Data du fait de coûts trop importants pour développer les compétences adéquates ou de scripts trop longs de mouvements de données, rejoignez-nous lors de ce séminaire en ligne sur iWay Hadoop Data Manager.

    Ce nouveau produit simplifie la création, la gestion et l'utilisation des Data Lakes basés sur Hadoop.

    iWay Hadoop Data Manager permet de :
    - Ingérer, transformer, gérer et exporter les données nativement dans Hadoop - Sans avoir besoin d'écrire des codes Sqoop et Flume
    - Assembler rapidement les données pour des projets ad hoc et analytiques
    - Capacités, standards et négociations de ressources natives Marshall Hadoop

    Durant ce webinar, vous découvrirez comment utiliser votre environnement Hadoop en vue de fournir des données plus fiables et de meilleures analyses, en moins de temps et à moindre coût.
  • Defending your endpoints from attacks starts with effective patch management
    Defending your endpoints from attacks starts with effective patch management Thomas Hemker, CISSP, CISM, CISA Director Security Strategy, CTO Office Symantec Sep 26 2017 1:00 pm UTC 45 mins
    Like many other attacks, the high-profile cyberattacks this year (Wannacrry, NotPetya) have exploited vulnerabilities for which patches and updates already existed.

    Register for this short webinar for an overview on the biggest attacks of the year and learn more about how Symantec Patch Management provides visibility and compliance across today’s heterogenous environments to protect against similar attacks in the future.
  • Once bitten Twice Shy – (Maybe)!
    Once bitten Twice Shy – (Maybe)! Mark Penberthy FBCI Sep 26 2017 2:00 pm UTC 45 mins
    One would think that catastrophic incidents of global proportions would cause organizations globally to exercise extra vigilance in ensuring that these events do not recur, particularly in their proverbial back yards!

    Surprisingly, as we continue to analyze events which have caused untold damage and disruption to organizations, we have to ask ourselves; are they becoming less frequent and why do we seem to see history repeating itself?
  • GDPR One Year Countdown: Prepare and Improve Readiness Today
    GDPR One Year Countdown: Prepare and Improve Readiness Today Ted Julian, IBM Resilient, Gant Redmon, IBM Security, & Dr. Larry Ponemon, the Ponemon Institute Sep 26 2017 2:00 pm UTC 60 mins
    GDPR is only one year away. The major reform in data protection and breach notification will require smart preparation for the changes to avoid possible penalties. This webinar will help you prepare for and understand the scope of the changes in these impending regulations.

    Hear from cyber security experts Ted Julian and Larry Ponemon, as well as privacy expert Gant Redmon, who will look ahead to the EU’s General Data Protection Regulation (GDPR). During the webinar, you’ll learn:

    • What you can do to best prepare your organization in the next 12 months to address these new obligations and avoid stiff penalties
    • How IBM Resilient can help your business comply with GDPR obligations
    • How the Resilient IR Platform orchestrates and prescribes a data breach response in compliance with specific regulations

    Speakers:
    • Ted Julian, VP of Product Management, IBM Resilient
    • Gant Redmon, Program Director, Data Governance, and Risk, IBM Security
    • Dr. Larry Ponemon, Founder & Chairman, the Ponemon Institute
    • Moderator: Maria Battaglia, CMO, IBM Resilient
  • Syndicated Loans – Floating Rate Income In A Low Yield World
    Syndicated Loans – Floating Rate Income In A Low Yield World Torben Ronberg, Sam McGairl, Alex Woolrich Sep 26 2017 2:00 pm UTC 45 mins
    The Muzinich Syndicted Loans team will provide an update on the asset class, current market conditions and where the opportunities lie, followed by a Q&A.
  • JPMorgan Funds – Emerging Markets Strategic Bond Fund
    JPMorgan Funds – Emerging Markets Strategic Bond Fund Pierre-Yves Bareau Sep 26 2017 2:00 pm UTC 60 mins
    Please join Pierre-Yves Bareau, the CIO for our Emerging Markets Debt Team within the International Fixed Income Group, for a discussion on our outlook for emerging markets debt as well as recent performance and positioning in Emerging Markets Strategic Bond Fund, where Pierre-Yves is the lead portfolio manager.

    Don’t miss this opportunity to hear from our Emerging Market Debt CIO and put forward your questions.

    Featured Fund: JPMorgan Funds – Emerging Markets Strategic Bond Fund

    Password: 50551

    Austria: +43 (0) 2 68220 56552
    Austria toll free: 0800 005384
    Belgium: +32 (0) 2 789 8603
    Belgium toll free: 0800 746 68
    Denmark: +45 3271 4573
    Denmark toll free: 8088 8649
    Finland: +358 9 2319 5437
    Finland toll free: 0800 914672
    France: +33 (0) 1 7037 7166
    France toll free: 0805 630061
    Germany: +49 (0) 69 7104 45598
    Germany toll free: 0800 673 7932
    Hungary: +36 (06) 1 700 8142
    Hungary toll free: 06 800 13360
    Ireland: 014360959
    Ireland toll free: +1 800 930 488
    Italy: +39 02 36269665
    Italy toll free: 800 986 477
    Luxembourg: 800 2 6438
    Netherlands: 0207948426
    Netherlands toll free: 0 800 022 9132
    Norway: 21563318
    Norway toll free: 800 19 457
    Poland: +48 22 397 9053
    Poland toll free: 0 0 800 121 2695
    Portugal: +351 3 0880 2081
    Portugal toll free: 800 814 155
    Spain: +34 91 787 0777
    Spain toll free: 800 300206
    Sweden: +46 (0) 8 50520424
    Sweden toll free: 020 089 6377
    Switzerland: +41 (0) 22 592 7103
    Switzerland toll free: 0800 800 038
    UK: +44 (0) 20 3003 2666
  • Is Your Data Safe from Ransomware?
    Is Your Data Safe from Ransomware? Gregg Ogden, Senior Manager and Don Foster, Senior Director, Solutions Marketing Commvault Sep 26 2017 2:00 pm UTC 45 mins
    Data Protection in the Age of Ransomware
    Ransomware Attacks on the Rise

    Ransomware happens. Is your data environment optimized to make recovery as fast and painless as possible?

    Watch this webinar to hear Commvault’s top experts in Ransomware discuss a prescriptive approach for how your organization should be prepared if a massive ransomware attack gets through your defenses.

    In this webinar you will learn about:
    - Working with Media Agents
    - Recovering Clients and Applications
    - Protecting your Data Environment
  • High Availability Clusters with SUSE on Azure
    High Availability Clusters with SUSE on Azure David Rocha | public cloud architect Sep 26 2017 2:00 pm UTC 60 mins
    In this webinar you'll learn how SUSE has worked with Microsoft to enable HA clusters on Azure. Learn how to launch via the Azure Resource Manager; and how this applies to even the most demanding enterprise databases such as SAP HANA.
  • 6WIND & Intel Deliver 50%  Performance Increase for SW-based Security Gateways
    6WIND & Intel Deliver 50% Performance Increase for SW-based Security Gateways Kelly LeBlanc, VP of Marketing for 6WIND Sep 26 2017 3:00 pm UTC 45 mins
    Data centers and managed network operators looking for performance-oriented IPsec applications can now turn to Intel® Xeon® Platinum 8170 processors and 6WIND Turbo IPsec™ network software on commercial-off-the-shelf (COTS) servers.

    In this Webinar, attendees will learn how 6WIND Turbo IPsec performance tests on servers based on Intel® Xeon® Platinum processors demonstrate a 50% increase in processing power for common applications such as multi-site VPNs and backhaul security gateways. This performance benefit also scales in conjunction with the addition of cores. These applications are designed for today’s multi-core processor environments, driving a significant price/performance value proposition over legacy hardware.
  • Global Outlook Quarter 3 Update
    Global Outlook Quarter 3 Update Andrew Milligan Sep 26 2017 3:00 pm UTC 60 mins
    We are delighted to invite you to join our forthcoming webcast at which our Head of Global Strategy, Andrew Milligan, will discuss our latest macro-economic and market views whilst considering the Outlook for the next quarter. There will be an opportunity to pose your questions directly to Andrew.

    Audience dial in numbers:
    Standard International Access: +44 (0) 20 3059 2627
    Password: 9975890#
  • Augmenting Humans: Identifying Ideal Scenarios for Enterprise Productivity
    Augmenting Humans: Identifying Ideal Scenarios for Enterprise Productivity John Nall, Founder, Appzion Sep 26 2017 3:00 pm UTC 60 mins
    Join John Nall, Founder and CEO of Appzion, as he takes a technical deep-dive into workforce mobilization through augmented reality.

    In this webinar you will learn the steps to enterprise AR productivity. Methods include techniques to identify ideal scenarios for augmenting humans, process mapping and observation techniques. Once the scenario is chosen, other considerations include software and hardware assessment and selection and cybersecurity for wearables.
  • Evaluating CASB - Five Use Cases to Consider
    Evaluating CASB - Five Use Cases to Consider Aaron Smith, Sr. Product Marketing Manager, Cloud Security, Forcepoint Sep 26 2017 3:00 pm UTC 45 mins
    Your organization has a cloud-first imperative. You know that traditional, perimeter defenses will not protect employees using cloud applications. This webcast discusses five emerging use cases and how to address them while keeping employees, partners, and clients productive.

    - Discovery of Shadow IT
    - Managing any vs. all cloud applications
    - Securing users anywhere
    - Protecting the data, wherever it flows
    - UEBA in the cloud - it's more important than you think
  • 5 things you can do with a security policy management solution [US/UK]
    5 things you can do with a security policy management solution [US/UK] Jeffrey Starr, CMO & Edy Almer, VP Product Sep 26 2017 3:00 pm UTC 60 mins
    Today’s enterprises are continuously evolving to support new applications, business transformation initiatives such as cloud and SDN, as well as fend off new and more sophisticated cyber-attacks on a daily basis. But security and network staff are struggling to keep up – which not only impacts business agility, but exposes your enterprise to risk and hampers its ability to address the modern threat landscape.

    Many professionals believe that they need latest and greatest new tools to address these challenges. But what if you already have what you need, up and running in your organization: your security policy management solution?

    Today’s security policy management solutions do a far more than automate traditional change management tasks. In this technical webinar, Edy Almer, VP of Products at AlgoSec highlights 5 key security management challenges facing enterprise organizations today and explains how AlgoSec’s solution can help you manage security, reduce risk and respond to incidents while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.

    This technical webinar focuses on:

    - Managing security policies end-to-end across public and private cloud including --Microsoft Azure, Amazon Web Services AWS, Cisco ACI and VMWare NSX
    - Mapping security vulnerabilities to their applications to assess and prioritize risk
    - Enable SOC engineers to tie cyber-attacks to business processes
    - Migrating Firewall policies between firewall brands
    - Performing a fully automated, zero-touch security policy change