Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Signavio Live Series: Sustainable Change with Deloitte
    Signavio Live Series: Sustainable Change with Deloitte
    Sanjiv Nathwani, Principal Recorded: Feb 21 2020 49 mins
    As the desire for digital transformation grows, and customer expectations continue to rapidly evolve, firms are being pushed toward a need for change. Discover how Deloitte uses Signavio to help its clients keep pace.
  • Better Together: Automated Bot Protection with AWS and Cequence Security
    Better Together: Automated Bot Protection with AWS and Cequence Security
    Stephen Mayne, Partner Solutions Architect at AWS and Subbu Iyer, VP of Products at Cequence Security Recorded: Feb 21 2020 45 mins
    Automated attacks against public facing web, mobile and API-based apps deployed on AWS can result in fraud, theft, lost sales, reduced customer confidence and infrastructure cost overruns. These attacks appear to be legitimate transactions, hiding in plain sight, making detection and prevention an ongoing security challenge.

    Deployed in conjunction with Amazon CloudFront and AWS WAF, CQ botDefense SaaS detects your public facing applications and APIs, then analyzes each transaction using ML-based automation indicators to uncover and block malicious activity.

    Join AWS, and Cequence Security to learn how malicious bots target your public facing applications and how you can protect them.
  • Prevent Phishing Attacks with Proofpoint's Security Awareness Training
    Prevent Phishing Attacks with Proofpoint's Security Awareness Training
    Andrew Brown, Account Executive at Proofpoint Recorded: Feb 21 2020 24 mins
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats

    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense

    - Enable your employees to report suspicious messages with a single mouse click
  • CISSP Exam Clinic #2: How to pass the 1st Time---Hands-On Labs
    CISSP Exam Clinic #2: How to pass the 1st Time---Hands-On Labs
    Alan Belshaw, M.S., MBA, Senior Cybersecurity Solutions Architect| Booz Allen and Hamilton Recorded: Feb 21 2020 29 mins
    In Clinic #2 you will learn how to integrate labs into your CISSP study plan.

    If you want to pass your CISSP Exam the first time, you’ll want to get access to the six live online CISSP Exam Prep Clinics. You will learn about:

    • The new CISSP exam format, the “adaptive exam format”
    • How hands-on labs will help you prepare for your exam
    • Tactics to select the best answer for each question
    • How to get your employment endorsement and what happens if you need more experience

    Qualify to get access to all six Web Clinics and a full, or partial scholarship.
    https://missioncriticalinstitute.org/cybersecurity-career-readiness-assessment/

    SPONSORED BY: Mission Critical Institute
  • Perilous Peripherals - The Hidden Dangers Inside Windows and Linux Computers
    Perilous Peripherals - The Hidden Dangers Inside Windows and Linux Computers
    Jesse Michael, Principal Researcher, Eclypsium and Rick Altherr, Principal Engineer, Eclypsium Recorded: Feb 21 2020 61 mins
    Eclypsium researchers Jesse Michael and Rick Altherr will describe new research showing how unsigned firmware in WiFi adapters, USB hubs, trackpads, laptop cameras and network interface cards provides pathways for malicious attackers to compromise laptops and servers.
  • GDPR Cookie Consent-The Catalyst to Better Marketing
    GDPR Cookie Consent-The Catalyst to Better Marketing
    Bob Mattison Recorded: Feb 21 2020 47 mins
    What was learned when Stanley Black and Decker achieved GDPR cookie compliance across 300 websites. Few companies are prepared for the complexity of GDPR Cookie Consent Compliance. Even fewer realize that done properly, cookie compliance can lead to faster, easier and more effective marketing campaigns.
  • Investing in Innovation
    Investing in Innovation
    Matt Moberg, Manager, Franklin Innovation Fund Recorded: Feb 21 2020 2 mins
    Five investment themes exciting us now whilst looking forward to 2030;
    •Disruptive Commerce
    •Genomics
    •Intelligent Machines
    •Finance
    •Exponential Data
  • Build and scale applications with confidence using Red Hat OpenShift on Azure
    Build and scale applications with confidence using Red Hat OpenShift on Azure
    Shawn Purtell Principal Technical Marketing Manager, Red Hat and Ahmed Sabbour Product Marketing Manager, Microsoft Recorded: Feb 21 2020 38 mins
    Red Hat® OpenShift® Container Platform, based on Kubernetes, helps organizations develop, deploy, and manage container-based applications seamlessly across physical, virtual, and public cloud infrastructures. Combined with the power of the Microsoft Cloud via Azure, organizations can quickly move existing applications to the cloud, get new products to market, and deliver innovation to customers.

    Marketing managers from Microsoft and Red Hat will discuss both OpenShift Container Platform on Azure as well as Azure Red Hat OpenShift, a fully managed OpenShift service on Azure. Jointly engineered, operated, and supported service by Microsoft and Red Hat, Microsoft Azure Red Hat OpenShift enables you to quickly build and run your apps on a trusted enterprise Kubernetes platform. Empower developers to innovate with a consistent experience, built-in continuous integration/continuous delivery (CI/CD) pipelines, and a wide range of supported technologies and streamlined workflows.

    In this webinar we will cover how to:

    - Create fully managed Red Hat OpenShift clusters in minutes with self-service deployment.

    - Easily add or remove nodes to match resource demand.

    - Use Azure Active Directory integration allows control access to your cluster through an integrated sign-on experience.
  • Meistern Sie die Extreme! - Der Dell Latitude 7220EX Rugged Extreme
    Meistern Sie die Extreme! - Der Dell Latitude 7220EX Rugged Extreme
    Peter Beck, FMM Workstation & Rugged Recorded: Feb 21 2020 54 mins
    Das neue Latitude Rugged 7220EX bietet die Langlebigkeit und Ausfallsicherheit, die Sie von einem robusten Tablet erwarten und verfügt über die ATEX, IECEx-Zertifizierung, die Sie in möglicherweise explosiven Umgebungen benötigen.
    Lassen Sie sich die Vorteile des Latitude Ruggeds 7220EX von unserem Workstation & Rugged Experten, Peter Beck, aufzeigen und nutzen Sie die Chance ihm Ihre Fragen zu stellen.
  • Reducing variation, quality improvement & bringing finance & clinicians together
    Reducing variation, quality improvement & bringing finance & clinicians together
    Professor Stephen Powis, National Medical Director and Professor Matthew Cripps, NHS England/NHS Improvement Recorded: Feb 21 2020 62 mins
    Reducing variation, quality improvement and how the finance community can work with clinicians.

    Previously the Medical Director at the Royal Free London for 12 years before being appointed to this national role, Professor Powis will explore how the finance community can work with clinicians drawing upon his own experience within a trust. He will further delve into some of the initiatives that he is now overseeing nationally to reduce variation and drive quality improvement across the NHS.

    If you require a CPD certificate for this webinar please email Stephanie.Zahorodnyj@hfma.org.uk
  • SSL-Entschlüsselung: Stärkere Sicherheit, bessere Sichtbarkeit
    SSL-Entschlüsselung: Stärkere Sicherheit, bessere Sichtbarkeit
    Jens Egger Recorded: Feb 21 2020 55 mins
    In den letzten Jahren ist der Umfang des verschlüsselten Datenverkehrs deutlich gestiegen. Leider bietet dies neben den offensichtlichen Vorteilen der Verschlüsselung auch die Möglichkeit, böswillige Aktivitäten zu verbergen, was die Notwendigkeit einer effektiven Entschlüsselung noch dringender macht.

    Zusammen mit unserem Experten Jens Egger werfen wir einen genaueren Blick auf folgende Themen:

    - Innovationen in PAN-OS® 9.0 zur Optimierung der SSL-Entschlüsselung
    - Best-Practices und eine vollständige Übersicht über Protokolle wie HTTP/2
    - Die richtige Strategie zur Implementierung der SSL-Entschlüsselung
  • Modernizza la tua strategia di protezione dei dati per l'Hybrid IT
    Modernizza la tua strategia di protezione dei dati per l'Hybrid IT
    Laura Roberto, Systems Engineer | Andrada Enache, Account Executive Recorded: Feb 21 2020 43 mins
    Man mano che le organizzazioni passano alle architetture Hybrid Cloud, sono tenute a riconsiderare l'approccio alla protezione dei dati, rivedendo se necessario le strategie di Backup e Disaster Recovery (DR).

    Partecipa a questa sessione per scoprire come colmare il divario tra il tradizionale piano di continuità aziendale e la strategia di DR di cui la tua organizzazione ha bisogno nell'era del Cloud. Scoprirai come le funzionalità Nutanix di protezione dei dati e ripristino di emergenza, tramite soluzioni on-prem o SaaS, possono essere applicate a tutti i casi d'uso per garantire la disponibilità delle tue applicazioni.

    Approfondiremo insieme:

    • Le attuali sfide della protezione dei dati in un mondo ibrido
    • Come semplificare e ottimizzare la tua strategia di DR
    • Come garantire la protezione delle applicazioni critiche con diversi livelli di servizio
    • Come ridurre i costi legati alla protezione del dato ed aumentare i tempi di attività
  • Modernizza la tua strategia di protezione dei dati per l'Hybrid IT
    Modernizza la tua strategia di protezione dei dati per l'Hybrid IT
    Laura Roberto, Systems Engineer | Andrada Enache, Account Executive Recorded: Feb 21 2020 4 mins
    Man mano che le organizzazioni passano alle architetture Hybrid Cloud, sono tenute a riconsiderare l'approccio alla protezione dei dati, rivedendo se necessario le strategie di Backup e Disaster Recovery (DR).

    Partecipa a questa sessione per scoprire come colmare il divario tra il tradizionale piano di continuità aziendale e la strategia di DR di cui la tua organizzazione ha bisogno nell'era del Cloud. Scoprirai come le funzionalità Nutanix di protezione dei dati e ripristino di emergenza, tramite soluzioni on-prem o SaaS, possono essere applicate a tutti i casi d'uso per garantire la disponibilità delle tue applicazioni.

    Approfondiremo insieme:

    • Le attuali sfide della protezione dei dati in un mondo ibrido
    • Come semplificare e ottimizzare la tua strategia di DR
    • Come garantire la protezione delle applicazioni critiche con diversi livelli di servizio
    • Come ridurre i costi legati alla protezione del dato ed aumentare i tempi di attività
  • Model driven decision making (Session1: Concepts) - Deutsch
    Model driven decision making (Session1: Concepts) - Deutsch
    Dirk Lerner - Tedamoh, Mathias Brink - Exasol, André Dörr - Exasol Recorded: Feb 21 2020 58 mins
    The fictitious company FastChangeCo has developed a possibility to manufacture Smart Devices, but also to extend the Smart Devices as wearables in the form of bio-sensors to clothing and living beings. With each of these devices, a large amount of (sensitive) data is generated. Based on this data, FastChangeCo aims to make forward-looking decisions. On the one hand, this is intended to encourage customers to make targeted purchases, but also to significantly improve the quality of existing products and develop future products. In this presentation, the speakers will show how FastChangeCo has achieved its goals by rapidly building the required computing capacity in its Hybrid Cloud Data Warehouse architecture using existing enterprise technologies.
    In this presentation, the speakers will show how FastChangeCo has achieved its goals by rapidly building the required computing capacity in its Hybrid Cloud Data Warehouse architecture using existing enterprise technologies. The elasticity thus achieved contributes significantly to a cost-efficient solution.
  • Crime and Email: Real-Life Stories from the Trenches w/ the U.S. Secret Service
    Crime and Email: Real-Life Stories from the Trenches w/ the U.S. Secret Service
    Stephen Doughtery, U.S. Secret Service, Ryan Terry, Proofpoint, Christopher Pierson, BlackCloak Recorded: Feb 20 2020 124 mins
    Email—you either love it or hate it. Cybercriminals love it. We all know that email is the attack vector of choice for hackers. Why? Bottom line, it works. And they really capitalize on it. There are many ways the bad guys go about compromising the network and getting what they want: spear phishing, BEC/CEO fraud attacks, W-2 scams, ransomware… the list goes on and on.

    Email fraud is an expensive cybercrime for its victims. All it takes is one mistake, one erroneous mouse click of an email to let an attacker in. That is how it starts. Then attackers move around your email or network and learn more about your employees and company than you do. Eventually they strike—when the time is right. Do they get away with the cash? Or did you arm your employees with the tools and training they need to recognize email fraud and ransomware and stop a possible BEC attack?

    On this web conference, our three experts will share real-world examples of these heinous crimes: what went down, how they got caught, what they got away with, and lessons learned.

    Tune in and get an understanding of how these attacks work and what you can do to make it more difficult for hackers to fool your end-users.
  • The Extraordinary is Becoming Too Ordinary
    The Extraordinary is Becoming Too Ordinary
    Rob Almeida, MFS Global Investment Strategist Recorded: Feb 20 2020 4 mins
    Rob Almeida discusses the importance of understanding earnings quality as the gap between operating earnings and reported earnings widens.
  • SANS TALK: How to Use OSINT for Cyber Threat Intelligence Investigations
    SANS TALK: How to Use OSINT for Cyber Threat Intelligence Investigations
    SANS expert Jake Williams and Authentic8’s Head of Special Services, Nick Espinoza Recorded: Feb 20 2020 7 mins
    Renowned SANS expert Jake Williams and Authentic8's Head of Special Services, Nick Espinoza, discuss today's use of OSINT for Cyber Threat Intelligence (CTI). The talk addresses:

    - If Counter Intelligence (CI) depends on an organization's maturity level
    - If an organization can be too small to have a CTI program
    - Why a framework for CI is so challenging to build
    - How managed attribution is like CI on steroids
    - If it's more important to prioritize spending on CTI tools or processes

    You'll also receive instructions on how to participate in the CTI 2020 Survey. Watch the talk and join in the discussion on the magnitude of OSINT in CTI.
  • [Panel] Exploring Real World Digital Transformation at the Edge
    [Panel] Exploring Real World Digital Transformation at the Edge
    Michelle Ruyle | Fred Hintermister | Dr. Lorraine Basset | Dale Tucker Recorded: Feb 20 2020 45 mins
    Edge computing is key to meeting Digital Transformation demands, and at the dawn of this new decade, nearly every industry will be able to take advantage of edge technology to propel their Digital Transformation programs.

    Join this panel, live or on demand, to take a closer look at how real businesses and verticals are implementing edge computing, and the challenges and successes they’re seeing.

    From understanding the business requirements, and overcoming the complex technical requirements, we’ll look at:

    - Dealing with the hyper-converged infrastructure demands of edge computing for digital transformation
    - Automation and remote management capabilities for edge sites
    - Navigating how edge computing requires organizations to change their thinking around new revenue streams, products, services, and business models
    - And more

    Moderator: Michelle Ruyle, CEO & Founder, Optimized Channel
    Fred Hintermister, Vice President, Energy Protection, Global Resilience Federation
    Dr. Lorraine Bassett, Principal, WWPS Technical Business Development Leader, IoT, Amazon Web Services
    Dale Tucker, Senior Director Global Alliances, Equinix
  • Smart Cities’ Digital Transformation: Hosted Edge IOT Platforms
    Smart Cities’ Digital Transformation: Hosted Edge IOT Platforms
    Chris Davis Vice President, Smart Cities and Strategic Alliances CIMCON Lighting, Inc. Recorded: Feb 20 2020 44 mins
    Smart cities are driving towards Digital Transformation to improve city operations and citizen services. Innovative outdoor Edge technologies deployed on smart streetlights will accelerate that transformation by powering connected sensors and controls, collecting data, managing devices and cybersecurity, local processing, backhaul over wireless networks, and cloud applications for user displays, alerts, reporting and data analytics.
    This webinar introduces an Innovative, outdoor Smart City Edge IoT Platform. Installed on a luminaire, the Edge-based platform performs multiple data functions for connected sensors – capture, analysis, aggregation from multiple sensors, and communication – to cloud SaaS applications. In addition, the Edge platform delivers network flexibility, communicating data to the cloud over both wireless smart grid and cellular networks.
    Technology factors driving Edge platform adoption and wireless infrastructures for smart city applications will be discussed:
    •Improve security
    •Speed data analysis
    •Reduce the volume of data transmissions
    •Lower hardware compute and storage costs
    •Edge Analytics
    oDiagnostic analysis
    oMetrics and measurement for real-time analysis
    oData analysis plus Artificial Intelligence and Machine Learning

    Real and installed “smart” applications using this technology – urban planning, traffic statistics, bicycle and people counting, road condition monitoring, environmental air quality, power line monitoring, video and audio analytics – and their associated benefits will be highlighted.
  • Let’s talk leadership: 5 steps to making an impact
    Let’s talk leadership: 5 steps to making an impact
    Lori Kleiman, SPHR SHRM-SCP Recorded: Feb 20 2020 47 mins
    Enterprise growth requires executive leadership involvement when it comes to changing the culture, focus, or services an organization offers. To be successful, the growth strategy must focus on many things at once, including people. Every aspect of the organization has to work together, and here’s where HR’s role is crucial. Whether it’s a new product, or a shift in competitive focus, HR is intrinsic to helping the company stay competitive.
    HR’s role in driving the success of the organization includes a number of factors. HR must ensure the administrative function of the organization are handled, but must focus attention on the important role of sharing the culture and vision of the organization. Internal and external relationships will help shape the HR function, as well as your career.
    In order to drive enterprise growth and achieve optimal business results, HR and the leadership team must get on the same page and keep communications open. But, how can you do this? We will share proven tips and tricks to being a strategic executive who is action oriented and technologically savvy. We do this by defining a 5 step process to join the leadership team and have the career of your dreams today!
    Learning Objectives:
    ·Presenting your initiatives in way that the leadership team will listen
    ·Make connections to become the leader your organization needs
    ·How to align the HR goals with organizational strategy
    ·Evaluation of strategic planning as it impacts your function
    ·Tools that will help you show added value to your organization

    Enroll to earn 1 general credit for SHRM or HRCI
  • How to Future-Proof Long-Lived IoT Devices with Quantum-Safe Signatures
    How to Future-Proof Long-Lived IoT Devices with Quantum-Safe Signatures
    John Ray, Thales and Alexander Truskovsky, Isara Recorded: Feb 20 2020 49 mins
    The number of IoT devices increases every day, including durable “things” that hadn’t been connected in the past such as cars, smart meters and implanted medical devices. These devices represent a unique security challenge as they must remain in use and secure for several years to come. However, with the onset of large-scale quantum computing – which will render modern security measures obsolete – IoT device manufacturers need to begin looking at different options to secure their devices or they risk being overtaken by spoofed software updates in the future.

    In this talk, Thales and ISARA will explore securing connected cars using the next-generation of digital signatures: Stateful hash-based signatures.

    Join us as we cover the following topics:
    •A brief overview of quantum computing and its effect on current public key cryptography – no PhD required!
    •Understanding the unique challenge quantum presents to durable IoT devices
    •Exploring new, quantum-safe options for signatures and roots of trust such as stateful hash-based signatures
    •Learn how quantum-safe options are different, what makes them challenging to work with and what steps needs to be taken to use them today
    •Discover Thales’ Luna HSM Post-Quantum Functionality Module (FM) - the first commercially available HSM to offer stateful hash-based signatures ready for implementation and how you can get started today
    •Learn how crypto agility can help you quickly react to cryptographic threats by implementing alternative methods of encryption
  • 2020 Trends in Cybersecurity
    2020 Trends in Cybersecurity
    Kunal Anand, CTO, Imperva & David Gee, CMO, Imperva Recorded: Feb 20 2020 40 mins
    Join us for a fireside chat with Imperva CTO Kunal Anand and CMO David Gee as they share with you the cybersecurity trends and things to watch for in 2020.
  • ONTAP Modern SAN: SAN Today NVMe-oF Tomorrow
    ONTAP Modern SAN: SAN Today NVMe-oF Tomorrow
    Michael Pepper Recorded: Feb 20 2020 32 mins
    This presentation is an overview of ONTAP SAN offerings around NVMe. It covers current NVMe-oF offerings, explaining what they are and the benefits provided to customers that adopt them. In addition to covering NVMe attached storage, it also covers NVMe-oF AND MAX Data. In addition it offers a preview of All SAN Array, once again providing a high-level overview of the ASA product. The presentation begins with some context around ONTAP’s market position and also mentions a new SAN startup services offering from NetApp Professional Services.
  • Advanced Reporting with Collateral360
    Advanced Reporting with Collateral360
    EDR/LightBox's Al Gabberty & Matt DeVoe Recorded: Feb 20 2020 59 mins
    EDR/LightBox is excited to announce a new, advanced reporting module to Collateral360 that is designed to give you the information you need to drive critical business decisions. This new tool allows for greater report functionality including the ability to group common elements, add calculations to any report, and plot data on a comprehensive graph or chart.

    Join this product spotlight when Al Gabberty and Matt DeVoe will demonstrate this powerful new feature.
  • Introduction to Sparkling Water: Productionalizing H2O Models with Apache Spark
    Introduction to Sparkling Water: Productionalizing H2O Models with Apache Spark
    Edgar Orendain, Software Engineer, H2O.ai Recorded: Feb 20 2020 55 mins
    Spark is a powerful and robust open-source, general-purpose computation platform. It is an invaluable tool for users who want to munge, wrangle, clean and transform data before training a model. Spark Pipelines are also powerful constructs but have little support for easily plugging in advanced third-party machine learning libraries.

    At the same time, many novice and advanced data scientists are leveraging the power of the H2O machine learning platform, a highly distributable and tunable machine learning library. The H2O platform provides the powerful MOJO concept (Model Object Optimized), making it easy to deploy trained models with a focus on scoring speed, traceability, exchangeability and backward compatibility.

    In this webinar, Edgar will introduce H2O Sparkling Water, the glue between Spark and the H2O ML platform, allowing users to seamlessly incorporate advanced data science libraries with their Spark environments. We will demonstrate creation of Spark pipelines integrating H2O ML models and their deployments using Scala or Python. We will use H2O’s AutoML algorithm for automatic model selection and ensembling and show how to load that into production-grade model into Spark pipeline for deployment.
  • Evolving PRI Reporting: your views on the next steps
    Evolving PRI Reporting: your views on the next steps
    The PRI Feb 24 2020 9:00 am UTC 60 mins
    As part of our 10-year Blueprint for responsible investment – looking at how to take responsible investment forward over the next decade – we committed to undertake an extensive review of our Reporting Framework. This includes the reporting indicators themselves, our assessment methodology, the reporting outputs and the platforms to support this.

    The Reporting Framework review began with a first consultation phase between March and July 2019. The PRI has since then taken a number of steps to carefully put together a more developed proposal of what a new Reporting and Assessment framework could look like. The proposal has been heavily based on signatory feedback during the first consultation phase, with oversight from the PRI Board and support from the Reporting and Assessment Advisory Committee. We are now in the second consultation phase, asking signatories to indicate their level of support for the proposal that the PRI has put forward.

    This webinar will:
    • serve as an update on the overall Reporting and Assessment review, including the steps taken so far and what’s next;
    • outline the current Reporting and Assessment proposal out for consultation;
    • test the ideas/collect feedback through polling questions about the proposal; and,
    • answer any questions the audience might have in regards to the proposal.

    Presenter:
    Senita Galijatovic, Head of Reporting and Accountability (The PRI)
  • AML and KYC: Best practices for the new era of compliance and security
    AML and KYC: Best practices for the new era of compliance and security
    Alex Ford (Encompass), Denisse Rudich (FireDrake Consulting) Feb 24 2020 9:00 am UTC 60 mins
    -How to better handle performing client due diligence on an ongoing basis?
    -What are the challenges of the traditional AML/KYC procedures?
    -What can we expect from the AML Directive that comes into force in June of this year?
    -What are the common mistakes FIs make when managing their data?
    -How can Machine Learning and automation help?
  • Protecting your environment from a ransomware attack with Commvault
    Protecting your environment from a ransomware attack with Commvault
    Matt Tyrer and David Moyer, Commvault Feb 24 2020 11:00 am UTC 44 mins
    The threat of ransomware requires that you must always be ready to defend against it and recover at any time. Ransomware is a scourge that you cannot afford to ignore. The risks of lengthy downtime, corruption, data loss and a disabled business are just too great.

    But what if there was a way to minimize any potential disruption quickly and automatically? Commvault gives you the confidence you want when it comes to quick recovery and risk mitigation.

    Take a few minutes and watch this demonstration of a simulated ransomware attack and see how Commvault keeps your data protected and your business fully operational. Otherwise, if you ignore ransomware, your data will go away.
  • Financial Crime Fighters: A Closer Look at Risks & Best Practices
    Financial Crime Fighters: A Closer Look at Risks & Best Practices
    Salma Sobhy, Compliance Officer, Emirates NBD Feb 24 2020 1:00 pm UTC 44 mins
    What are the current risks banks are facing regarding financial crimes, and what are the controls that need to be put in place to mitigate those risks? This webinar will take a closer look into best practices that financial institutions can implement to lessen the risk of fraud and protect their customers. You'll discover:

    - The security risks and threats that banks and financial institutions are facing in today's technology landscape
    - Best practices around KYC (Know Your Customer), CDD (Customer Due Diligence), (Enhanced Due Diligence) EDD and Transactions Monitoring that will strengthen data security and reduce potential for fraud
    - And more!
  • Build a solid landscape for SAP HANA and S/4HANA on AWS
    Build a solid landscape for SAP HANA and S/4HANA on AWS
    Sherry Yu, Principal Partner Success Architect, Red Hat and Sabareesan Radhakrishnan, Principal Solutions Architect, AWS Feb 24 2020 2:00 pm UTC 59 mins
    SAP HANAⓇ and S/4HANA play an important role in many companies’ global operations to support mission-critical business functions. The need for maximized system availability has become more and more crucial. Join Red Hat and AWS to review the latest, high availability (HA) solutions for SAP HANA database and applications such as S/4HANA, and how to build a strong SAP platform in a hybrid environment. This session will review the latest HA solutions based on SAP HANA System Replication in Scale-Up and HANAScale-Out, as well as HA solutions based on Enqueue Replication, including the new ENSA2 methodology. It will also review the status of SAP HA-Interface certification. The HA solutions covered in this session are ready for deployment in a hybrid environment.

    After completing this webinar, you should become more familiar with HA solutions for SAP HANA and S/4HANA and feel confident to choose Red Hat and AWS as your preferred solution provider.
  • The Automation Journey Towards Compliance Adherence and Quality
    The Automation Journey Towards Compliance Adherence and Quality
    Warren Ledingham, GM Kryon Feb 24 2020 3:00 pm UTC 37 mins
    It is estimated that 45% of workforce tasks can be automated, saving an estimated $2 trillion in global workforce costs. Software robots are easy to configure and do not require extensive IT knowledge.

    For internal audit, RPA presents both opportunity and responsibility. By helping the organization understand and control RPA risks and identifying opportunities to embrace RPA within their own organization, internal audit can position themselves as trusted advisors. It can also help internal audit increase productivity, expand its risk coverage and help address the ongoing compliance burden by doing more with less.
  • Measuring Account-Based Advertising Results
    Measuring Account-Based Advertising Results
    Rod Fuentes, VP of Product, Integrate Advertising and Co-Founder of ListenLoop and Neil Glass, GM & VP of Integrate Advertisi Feb 24 2020 4:00 pm UTC 27 mins
    Future-focused B2B marketers aren’t solely relying on traditional lead gen methods to fill pipeline and generate revenue – they’re implementing ABM strategies to create long-term success. Join us to hear from Rod Fuentes, VP of Product, Integrate Advertising and Co-Founder of ListenLoop and Neil Glass, GM & VP of Integrate Advertising to learn how you can view and measure results from your account-based digital advertising strategies and increase ROI.

    Join this webinar to learn about:

    -Data-Backed Story Telling Methods
    -Leading and Lagging Indicators of Success
    -ABM strategy success timeline – strategies for the long play
  • 2020 Election – Hacking The Vote
    2020 Election – Hacking The Vote
    David Morris | Cameron Koffman | Tinatin Japaridze | Lance James Feb 24 2020 5:00 pm UTC 60 mins
    The inaugural episode of the Election Hacking series will introduce the topic of who, how and why the upcoming 2020 election will be hacked.

    Join this interactive Q&A session to learn more about election hacking, its impact, the various stakeholders, and what if anything, can be done.

    Our unique panel of individuals will bring diverse perspectives to this topic.

    - Cameron Koffman, who, if elected, would be the youngest candidate since Theodore Roosevelt running for the NY State Assembly
    - Tinatin Japaridze, former United Nations correspondent for the Russian and Ukrainian media, with expertise in bi-lateral US-Russian relations on cyber security.
    - Lance James, CEO of Unit 221B and noted cyber security expert who has assisted various law enforcement and government agencies on some of the most highly publicized hacking investigations.

    Moderator: David Morris, Executive Director at Digital Risk Management Institute
  • A Practical Data Privacy and Security Approach to FFIEC, GDPR and CCPA
    A Practical Data Privacy and Security Approach to FFIEC, GDPR and CCPA
    Ulf Mattsson, Head of Innovation, TokenEx Feb 24 2020 6:00 pm UTC 61 mins
    With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced data privacy and security solutions has become even more critical. French regulators cited GDPR in fining Google $57 million and the U.K.'s Information Commissioner's Office is seeking a $230 million fine against British Airways and seeking $124 million from Marriott. Facebook is setting aside $3 billion to cover the costs of a privacy investigation launched by US regulators.

    This session will take a practical approach to address guidance and standards from the Federal Financial Institutions Examination Council (FFIEC), EU GDPR, California CCPA, NIST Risk Management Framework, COBIT and the ISO 31000 Risk management Principles and Guidelines.

    Learn how new data privacy and security techniques can help with compliance and data breaches, on-premises, and in public and private clouds.
  • Cryptocurrency Typologies for Traditional Finance
    Cryptocurrency Typologies for Traditional Finance
    Nina Heyden, Economist, Chainalysis Feb 24 2020 7:00 pm UTC 60 mins
    As cryptocurrency adoption increases, financial institutions need to assess the opportunities and risks of this new asset class presents. The first step? Understanding who’s who on the blockchain.

    Join us for our this talk and you’ll get:

    - A rundown of the key typologies transacting with cryptocurrency today, including mining pools, exchanges, crypto ATMs, darknet markets, and more.

    - Original data and research into how these entities interact with one another.

    - Case studies and examples for each typology, with an emphasis on risk and compliance
  • How the Right Data Platform Can Lower Risk
    How the Right Data Platform Can Lower Risk
    Lenley Hensarling, Chief Strategy Officer, Aerospike Matt Bushell, Director of Product and Solutions Marketing, Aerospike Feb 24 2020 8:00 pm UTC 60 mins
    Banks, brokerages, global instant payment systems - they all rely on data in an instant to verify, authenticate, approve, and ultimately transact. But the challenge is always the changing landscape of tactics that fraudsters will employ. To adjust, financial services organizations often employ massive datasets powered by machine learning to outwit malevolent actors in real-time.


    Learn:

    What some of the trends are across industry and the growing global threats

    How a top global brokerage firm lowered its pre-trade risk and was able to offload its mainframes, saving literally $10,000 USD per day in the process

    How PayPal scaled its real-time fraud prevention dataset from 10TB to 160TB while avoiding $5M USD a day in losses, improving its fraud prevention SLAs by a factor of 30

    How LexisNexis Solutions drives higher fidelity models by processing more data within tight SLAs
  • Application of Privacy Regulations in the Canadian Financial Services Industry
    Application of Privacy Regulations in the Canadian Financial Services Industry
    Jason Wang, CFA, Chief Risk Officer, Synergy Credit Union Feb 24 2020 10:00 pm UTC 60 mins
    This webinar will explain the 10 principles of Canada’s privacy law, and use some examples to showcase the importance of privacy management in the financial services industry. Project managers of cross-functional team initiatives would benefit from learning the importance of setting up boundaries for disclosing purposes, getting consent, limiting data collection and limiting use.
  • The CMO Guide to Personalization Trends: SoDA & Sitecore
    The CMO Guide to Personalization Trends: SoDA & Sitecore
    Paige O'Neill, CMO, Sitecore; Tom Beck, Executive Director, SoDA Feb 25 2020 2:00 am UTC 63 mins
    The biggest barrier to effective personalization isn’t a lack of data; it’s overconfidence. How do we know? We recently asked more than 350 CMOs and senior marketing executives how their brand personalizes customer experiences, and their answers were fascinating.

    Join Sitecore CMO Paige O’Neill and SoDA Executive Director Tom Beck as they dive into the findings of the research to reveal:

    • Why senior marketers may not be as good at personalization as they think
    • The biggest priorities for marketing departments
    • Top findings of the research — including investment plans, adoption, priorities, and key challenges
    • Actionable insights to move forward
    • Concrete examples of the trends among CMOs across global markets, and more
  • Machine Learning Based Fraud Detection: A Use Case Demo
    Machine Learning Based Fraud Detection: A Use Case Demo
    Kevin Graham, Advanced Technology Strategist for Financial Services, and Will Nowak, Solutions Architect Feb 25 2020 3:00 am UTC 43 mins
    Fraudulent actors are always looking for new ways to subvert legitimate transaction systems; traditional rules-based approaches are no longer sufficient (or efficient enough) to combat fraud. In this webinar, we’ll discuss best practices and examples on how machine learning can improve fraud detection capabilities.

    Data Scientists, Quants, and Analysts in the banking sector can benefit from expert best practices on tackling fraud detection. We’ll include a brief use case demo to concretely ground the discussion and discuss real-time considerations for detection. Kevin’s financial expertise and Will’s diverse implementation experience make them the perfect team to explore the host of factors that go into a machine learning fraud detection model.

    Kevin Graham is a Dataiku Account Executive with nearly 10 years of experience across financial services and technology. He started his career in Sales & Trading before moving into a technology sales capacity at Oracle and Merlon Intelligence. At Merlon, Kevin focused on how AI and machine learning could help solve complex challenges within financial crime compliance. He currently is part of a financial services focused sales team across the Eastern United States and Canada at Dataiku.

    Will Nowak is a solutions architect at Dataiku, where he helps Fortune 500 companies improve data science operations. Previously, he engineered machine learning models for several Y Combinator startups, learning the pitfalls and challenges to productionalizing machine learning. Will holds a bachelor’s in Math and Economics from Northwestern University and a Master’s in Organizational Leadership from Columbia University.
  • Bring speed and security to the Intranet with Cloudflare for Teams
    Bring speed and security to the Intranet with Cloudflare for Teams
    Naveen Singh, Solutions Engineer @ Cloudflare & Sophie Qiu, Customer Success Manager @ Cloudflare Feb 25 2020 5:00 am UTC 60 mins
    Cloudflare was started to solve one half of every IT organization's challenge: how do you ensure the resources and infrastructure that you expose to the Internet are safe from attack, fast, and reliable? To deliver that, we built one of the world's largest networks. Today our network spans more than 200 cities worldwide and is within milliseconds of nearly everyone connected to the Intranet.

    Cloudflare for Teams is a new platform designed to solve the other half of every IT organization's challenge: ensuring the people and teams within an organization can safely access the tools they need to do their job. Now you can extend Cloudflare’s speed, reliability and protection to everything your team does on the Intranet.

    In this webinar, you’ll learn:
    - Common challenges of scaling security for your growing business
    - How to extend Zero Trust security principles to your internally managed applications
    - How to make Intranet access faster and safer for your employees
  • 5 Tips for Your Best Cloud Data Protection Strategy
    5 Tips for Your Best Cloud Data Protection Strategy
    Keith Schenk and Penny Gralewski - Commvault Feb 25 2020 8:00 am UTC 23 mins
    Learn what’s needed to develop a plan for cloud data migration – and cloud data protection. Organizations of all sizes are rapidly adopting multiple clouds, but need to ask key questions:

    What is the best first workload for your cloud project?
    Do you have the right tools in place for high volume data migration?
    Could you be replacing tape and legacy products with a cloud-based data protection strategy?
    Are you missing cost-saving opportunities in your current cloud project?
    Are you overlooking automation opportunities to speed your project?
    Whether you’re just starting in the cloud or have a goal to be cloud-first, understand how to develop a cloud data strategy.
  • Master the Art of Zero-Touch Deployments
    Master the Art of Zero-Touch Deployments
    Jim Grandbois Feb 25 2020 9:00 am UTC 25 mins
    In the era of zero-touch deployment, IT can now successfully deploy Mac, iPad and iPhone to users directly without ever having to open the box. Apple’s deployment programs enable this by automating enrolment and configuration from a central location — eliminating the need to ever physically touch the device.

    In this webinar, Master the Art of Zero-Touch Deployments, we will demystify Apple’s deployment programs and walk through what it takes to implement these programs in your organisation.
  • Hybrid + Multi Cloud strategies - Accelerate Innovation [English]
    Hybrid + Multi Cloud strategies - Accelerate Innovation [English]
    Morten Rohlfes, Director EMEA: Openshift, Cloudinfra, JBOSS, Middleware, Storage at Red Hat Feb 25 2020 9:00 am UTC 44 mins
    Hybrid + Multi Cloud strategies - Accelerate Innovation and Enterprise Transformation 5

    Agenda:
    •IT Cloud Trends - Perceived Maturity and Reality
    •Open Source - Enabling the road to cloud native
    •Why and how Hybrid or Multi Cloud makes sense
    •Hybrid Cloud Examples: BMW and Deutsche Bank
  • Webinaire: Automatisation des politiques de sécurité pour votre structure SDN av
    Webinaire: Automatisation des politiques de sécurité pour votre structure SDN av
    Anthony Le Pipe | WEMEA Sales Engineering Feb 25 2020 9:00 am UTC 60 mins
    Renforcez vos équipes grâce à l’automatisation du firewall développé par Tufin. Donnez-leur la possibilité d’apporter des changements rapides et simples, de manière efficace tout en restant conformes.

    Participez à ce webinaire le 25 février pour découvrir comment les améliorations apportées à Tufin Orchestration Suite R19-3 GA peuvent vous aider :

    •Automatisez les modifications des règles du firewall grâce à un processus entièrement vérifiable à l’aide de SecureChange.
    •Simplifiez l’adoption de VMware NSX-T.
    •Obtenez une meilleure visibilité et une meilleure analyse du chemin d’accès pour Cisco ACI.

    Inscrivez-vous dès aujourd’hui pour connaître tous les avantages que présente le déploiement de Tufin Orchestration Suite R19-3.

    Si vous ne pouvez pas participer au webinaire en direct, inscrivez-vous ici et nous vous enverrons l’enregistrement.
  • Bitesize 30-minute update: JPM UK Equities Webconference
    Bitesize 30-minute update: JPM UK Equities Webconference
    Callum Abbot, portfolio manager of the JPM UK Equity Plus Fund Feb 25 2020 9:30 am UTC 60 mins
    The UK stock market’s mix of domestically-focused and multinational companies provides compelling long-term investment opportunities, allowing investors to build strong and internationally diversified portfolios.

    Join Callum Abbot, Portfolio Manager of the JPM UK Equity Plus Fund, for an update on how the fund can take both long and short positions in the UK stock market to enhance alpha opportunities.
  • Designing a Vault to protect your backup data from a possible ransomware breach
    Designing a Vault to protect your backup data from a possible ransomware breach
    Philipp Hobler - EMEA Chief Architect; Data Protection Division in Europe Feb 25 2020 10:00 am UTC 45 mins
    In case of a successful ransomware attack your backup data becomes your last line of defense.
    Hear from Philipp Hobler - EMEA Chief Architect with the Data Protection Division in Europe how to design a vault within your data center to protect a copy of your critical backup data.

    Join our webcast and learn how Dell EMC Cyber Recovery Solution gives you the extra certainty your organization can recover quickly, without compromise.
  • Airheads Tech Talks: Aruba Central 2.5.0 - New features and enhancements
    Airheads Tech Talks: Aruba Central 2.5.0 - New features and enhancements
    Dinesh Kumar: Senior Network Engineer - Aruba ERT Feb 25 2020 10:00 am UTC 60 mins
    This webinar will cover interface changes, workflow for quick deployment and reporting enhancements. Dinesh will also talk through configuration and troubleshooting.