Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Secure Your Journey to the Hybrid Cloud
    Secure Your Journey to the Hybrid Cloud
    Tim Woods, Vice President of Technology Alliances | Elisa Lippincott, Director of Product Marketing Recorded: Feb 22 2019 56 mins
    Many enterprises are adopting a cloud-first strategy in efforts to drive business innovation and growth. As cloud deployments grow, security requirements grow with them – leading to a trend of security responsibilities becoming dispersed as traditional security implementations impede the speed to delivery. Distributed responsibilities lead to fragmented security implementations - add to the problem the lack of skilled personnel, misconfiguration errors, overly permissive access, shadowed IT, and a lack of consistency between on-premise and cloud security controls, and you can end up with a recipe for disaster.

    Join Tim Woods, VP of Technology Alliances at FireMon and Elisa Lippincott, Director of Product Marketing at FireMon, in this webinar where they will discuss:

    • Steps you need to take to gain full visibility and control to secure your hybrid environment
    • How to ensure consistency of your security controls within hybrid cloud and multi-cloud environments
    • How to manage risk and complexity in your hybrid cloud with a cloud security posture management strategy
  • 15 Minute Webinar: Do You Need to Protect Laptops, Office 365, & Salesforce.com?
    15 Minute Webinar: Do You Need to Protect Laptops, Office 365, & Salesforce.com?
    George Crump, Storage Switzerland and W. Curtis Preston, Druva Recorded: Feb 22 2019 18 mins
    If you think the cloud provides enough protection for your critical data, you’re putting that data at risk. You can’t assume data is protected because it’s “in the cloud” -- you need to ensure all of the data in your critical applications, including Office 365 and Salesforce.com, get the protection they deserve.

    Join George Crump, Founder, and Lead Analyst at Storage Switzerland, and W. Curtis Preston (a.k.a. Mr. Backup), Chief Technologist at Druva, where they will discuss:

    - What level of protection do cloud services provide?
    - Is the provided level of protection enough for the enterprise?
    - What does the enterprise need to add to achieve complete protection?

    Register Now and get Storage Switzerland’s latest eBook “Protecting the Organization From Its Endpoints.”
  • Utilizing a Digital Risk Management Framework for Securing the Cloud
    Utilizing a Digital Risk Management Framework for Securing the Cloud
    Bob Liscouski, Juanita Koilpillai and David Morris Recorded: Feb 22 2019 60 mins
    How a Digital Risk Framework (an understanding of the differences between cyber security, cyber risk and digital risk) can help identify and mitigate risks to your Cloud Infrastructures.

    In this session you will learn what a Digital Risk Framework is, how a Digital Risk Framework can help you comply with the onslaught of privacy regulations (CCPA, GDPR, HIPPA, etc) and its impact on your Cloud Infrastructures, which are most commonly used.
  • ISSA International Series: 2018 Year in Review and Predictions for 2019
    ISSA International Series: 2018 Year in Review and Predictions for 2019
    ISSA International Recorded: Feb 22 2019 120 mins
    2018 was worse than 2017 for cyber security. This year every month was filled with even more major breaches, hacks, and attacks surfacing then 2017. The nature and range of the attacks varied from email hacking to zero days, from minor incursions to (potentially) everyone’s data being stolen. 2018 will probably go down as the new worst year for Cyber Security with all the previous year’s events having been far surpassed. Even our doom and gloom or same old same old predictions of last year have been blown away. The question now, will 2019 bear the full weight and impact of the events of 2019, or will it have its own harrowing events. Will the growing impact and occurrences spotlight security and translate in terms of media and regulatory attention? What kinds of threats will dominate the 2019 landscape?

    Join us, make notes, and then check back in a year to see how our panel of experts did in providing insight and making predictions for the 2019 challenges to InfoSec.

    Moderator:
    James McQuiggan, Product & Solutions Security Officer, Service Americas Division, Siemens Gamesa Renewable Energy

    Speakers:
    Ricky Allen, CISO, Critical Start
    Ira Winkler, President, Secure Mentem
    Patrick Miller, Managing Partner, Archer International
  • Mitigating Security Risks on Your Cloud Journey
    Mitigating Security Risks on Your Cloud Journey
    Tim Fong, Product Marketing Lead, Security Solutions & Derek Yee, Product Marketing Lead, Performance Solutions @ Cloudflare Recorded: Feb 22 2019 44 mins
    Whether you are just exploring moving workloads to the cloud, or are fully cloud-enabled, one thing is certain: security has changed from a purely on-premise environment.

    As cybersecurity risks continue to grow with more advanced attackers and more digital surface area, how you think about staying secure without compromising user experience must adapt.

    During this talk, you will:

    -Hear how global consistency, agile controls, and predictable costs are goals and principles that matter in this new environment
    -Be able to evaluate your current plans against a "customer security model"
  • Premier Multi-Asset Low Risk Funds: Q4 2018 Update
    Premier Multi-Asset Low Risk Funds: Q4 2018 Update
    Mark Rimmer and Mike Hammond Recorded: Feb 22 2019 12 mins
    Mark Rimmer, Product Director of Premier Multi-Asset Funds, provides a quarterly update on Premier's multi-asset low risk funds, discussing performance, portfolio activity and his investment outlook for 2019.
  • Premier Multi-Asset Growth Funds: Q4 2018 Update
    Premier Multi-Asset Growth Funds: Q4 2018 Update
    Mark Rimmer and Mike Hammond Recorded: Feb 22 2019 14 mins
    Mark Rimmer, Product Director of Premier Multi-Asset Funds, provides a quarterly update on Premier's multi-asset growth funds, discussing performance, portfolio activity and his investment outlook for 2019.
  • The Role of Investors in Promoting a Just Transition
    The Role of Investors in Promoting a Just Transition
    Climate Action | UNEPFI | Wim Van Hyfte, Global Head of Responsible Investments and Research, Candriam Recorded: Feb 22 2019 83 mins
    The Sustainable Investment Forum Europe 2019 in partnership, with Headline Partner Candriam and Official Event Partner UNEP Finance Initiative are excited to invite you to our upcoming free webinar.

    The role of investors in promoting a Just Transition



    Are social aspects often forgotten in efforts to drive investments to shift to a sustainable economy?

    This webinar will focus on key topics such as:



    · The rationale for investors to consider social dimensions of the low-carbon transition

    · What can investors do to support a just transition?

    · Examples of investor engagement on social issues

    · What is needed from regulators and policy makers to promote a just transition?

    · How well are social aspects integrated in sustainable finance initiatives such as the EU Sustainable Finance action plan?

    · Should the TCFD be extended to include the social dimension of climate change?


  • Depression in a Digital Age: The Highs and Lows of Perfectionism
    Depression in a Digital Age: The Highs and Lows of Perfectionism
    Fiona Thomas (Author, Depression in a Digital Age) and Ina Yulo (BrightTALK) Recorded: Feb 22 2019 32 mins
    Fiona Thomas is an active blogger, writer, and influencer in the mental health community. In this BrightTALK interview, Fiona talks about her new book "Depression in a Digital Age" and offers a different, positive perspective on mental health and the internet.

    Join this online interview where you will learn about:
    -The link between mental illness and how we form our own idea of success
    -How to overcome internal pressures to push yourself to both your physical and mental limits
    -Understanding your triggers and the risks involved in keeping up with your online persona
    -How to reframe what success means
    -How to make social media something that is for you and not something that goes against your mental wellbeing
  • Tips for Delivering a Successful IoT Product
    Tips for Delivering a Successful IoT Product
    Tri Dang, Director, Client Services, Woody Floyd, Managing Director, Vectorform & VP, Global IoT, SharkNinja Recorded: Feb 22 2019 48 mins
    Ayla's partner Vectorform, and customer SharkNinja, will discuss how to view the impact of IoT on your business.

    What you will learn:

    -How to select the right team
    -What issues/challenges you need to be aware of
    -What factors will make your connected product successful

    As part of the presentation, we will share details on how SharkNinja launched a massively successful robot vacuum in under six months.
  • Premier Multi-Asset Income Funds: Q4 2018 Update
    Premier Multi-Asset Income Funds: Q4 2018 Update
    Mike Hammond, Sales Director Recorded: Feb 22 2019 18 mins
    Mark Rimmer, Product Director of Premier Multi-Asset Funds, provides a quarterly update on Premier's multi-asset income funds, discussing performance, portfolio activity and his investment outlook for 2019.
  • Navigating Access Security in Cloud & Hybrid Enterprise Environments
    Navigating Access Security in Cloud & Hybrid Enterprise Environments
    Asaf Lerner, Director IAM Solutions at Gemalto Recorded: Feb 22 2019 46 mins
    As mid-sized and large organizations move to cloud based delivery for software, infrastructure and storage, hybrid environments are the de-facto reality. Perimeter security schemes no longer meet the security challenges of distributed software and application delivery, leading CISOs to try and mesh disparate solutions, or worse knowingly compromise on protection. Join Gemalto to hear best practices for applying consistent and effective access security and strong authentication to both on-prem and cloud apps.
  • How to Keep Endpoints Safe and Employees Productive with Application Isolation
    How to Keep Endpoints Safe and Employees Productive with Application Isolation
    Ken Tom, Sr. Manager, Product Marketing, Symantec and Sheetal Venkatesh, Principal Product Manager, Symantec Recorded: Feb 22 2019 53 mins
    In the typical enterprise, employees use hundreds of apps that significantly expand the endpoint attack surface-whether IT is aware, or not. Clearly, apps are a fact of life and employees will use them as they see fit. The best defense is application whitelisting, but attackers show us otherwise: In fact, all 10 of the Top 10 attacker groups use whitelisted software to infect endpoints. And with long patching cycles and insufficient training, IT security teams need something more.

    However, a win-win approach exists so that users can benefit from any productivity app they want without compromising the security of the entire infrastructure.

    Join us for a first-look webinar into Symantec Endpoint Protection Hardening, whose isolation capabilities allow end users to download and use any app safely.

    Join us to learn how you can:

    - Discover and assess the risk of applications on your endpoints automatically.

    - Shield known good applications to prevent vulnerability exploits.

    - Isolate suspicious and malicious applications to stop privileged operations automatically.

    In addition, we'll show you SEP Hardening in action with a demo that showcases how you can keep your endpoints safe and your employees productive.

    Register Today.
  • Shaping a security framework for multi cloud adoption
    Shaping a security framework for multi cloud adoption
    Chris Hill, RVP, Public Cloud EMEA; Jez Back, Founder & Principal Erebus Technology Consulting Services Ltd Recorded: Feb 22 2019 45 mins
    One of the challenges with public cloud environments is the rate at which they change. Yet the ability to change / grow elastically is one of the key advantages to adopting public cloud. Complicate that further with a multi-cloud environment and you quickly find yourself lacking the ability to visualize your infrastructure, drill down into detail, gather resource level information and understand the relationship and interconnectivity of those resources and how they affect compliance and your security posture.

    Gartner has predicted that “Through 2020, 80% of cloud breached will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”.

    So how can you ensure your organisation not only has complete visibility of its cloud infrastructure but is also securing its workloads and apps and being compliant? Is it really an impossible task?

    Find out more in this webinar with Chris Hill, RVP of Public Cloud at Barracuda Networks and Jez Back, Founder & Principal Erebus Technology Consulting Services Ltd, where they will discuss:
    • The threat landscape around cloud infrastructure
    • Shared security model – what are you really responsible for when it comes to cloud security
    • Challenges associated with multi-cloud and keeping your organisation secure
    • How to maintain compliance across your cloud environment
    • How to obtain visibility of your cloud infrastructure and security posture at all times
  • Streamline Software Procurement Processes with PyraCloud
    Streamline Software Procurement Processes with PyraCloud
    Rhys Williams Recorded: Feb 22 2019 31 mins
    Many procurement professionals we speak with struggle to get the insights into software purchases, software and cloud usage, contract terms, outstanding invoices, expired quotes and renewal information that they require to do their roles effectively.

    This information is often spread across multiple paper documents, systems, spreadsheets or databases, which makes it tedious and time consuming to gather the necessary data and often leaves Procurement Specialists unprepared at the time of software renewals.

    Lack of visibility into software and cloud spend makes it difficult to negotiate optimal commercial terms and contracts.

    This is why we developed the new Procurement Workbench in PyraCloud.

    We wanted to provide Procurement Specialists with a quick and easy way to see all relevant information and insights needed for their role.

    Join one of our experts, Rhys Williams, and learn how the PyraCloud Procurement Workbench can help you streamline your process by:

    • Simplifying the management of quotes, orders and invoices
    • Improving product search capabilities across multiple products and services in global catalogues
    • Tracking software previously purchased, product favourites and subscriptions
    • Consolidating multiple aspects of the procurement process in one place


    PyraCloud provides a single platform to manage the software procurement process in one place – no need to login to multiple systems – saving you time and money. Join us on the webinar to find out more.
  • Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security
    Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security
    Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester Recorded: Feb 22 2019 62 mins
    Three major trends define the Cloud Generation chaos that organizations face today:
    1) Use of cloud applications
    2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter
    3) Use of both corporate owned and BYO devices (PC, Mac and Mobile)

    On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organizations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for Organizations who face a severe shortage of skilled IT security personnel.

    Attend this webinar and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.

    In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:
    -Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security
    -Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
    -Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
    -Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.

    Register now!
  • What Does Artificial Intelligence Have to Do with IT Operations?
    What Does Artificial Intelligence Have to Do with IT Operations?
    Ed Hallock, Director Product Management,Syncsort Recorded: Feb 22 2019 27 mins
    From the early days of IT, organizations have grappled with the challenges of understanding how well their infrastructure is performing in support of the business. They have used a plethora of tools to detect, manage, and resolve problems that are causing disruption of services, but still struggle to achieve a unified, cross-domain understanding of what is happening across their IT infrastructure.

    Fortunately, over the past few years analytics platforms like Splunk, Elastic, and others have emerged to address requirements around IT Operations Analytics (ITOA). Today the buzz is around AIOps – Artificial Intelligence Operations. But what is AIOps, and what can it do to help organizations address IT challenges?

    View this webinar on demand to get a better understanding of:
    •What is Artificial Intelligence for IT Operations
    •What are the required technologies for success at AIOps
    •What challenges exist for achieving AIOPs
  • [#2]Cloud im Fokus: Hybride Architekturen mit Informatica
    [#2]Cloud im Fokus: Hybride Architekturen mit Informatica
    Thomas Bodenmüller-Dodek, Informatica Product Expert|Carrie Ellard, Informatica Cloud Consultant Recorded: Feb 22 2019 44 mins
    Gibt es bei Ihnen eine Cloud-First-Strategie, planen Sie ein Cloud Datawarehouse, schon mal über APIs nachgedacht oder müssen Sie Daten von Cloud-Applikationen in Ihr Unternehmen transportieren? Wie man sieht haben Projekte rund um die „Cloud“ viele Gesichter und erfordern deshalb auch eine sehr umfangreiche und leistungsfähige iPaaS-Lösung, wie die Informatica Intelligent Cloud Services – kurz IICS. In diesem Webinar möchten wir Ihnen einen Einblick über das Konzept, die Leistungsfähigkeit und den Umgang mit sog. hybriden Integrationsmöglichkeiten – also die Vorteile einer On-Premise und Cloud Architektur vorstellen. Dabei werden wir auch Best Practices von bestehenden Kundenprojekten einfließen lassen.
  • (ISC)² Info Session: CSSLP-The Premier Secure Software Development Certification
    (ISC)² Info Session: CSSLP-The Premier Secure Software Development Certification
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)² Recorded: Feb 22 2019 57 mins
    Earning the globally recognized CSSLP secure software development certification is a proven way to build your career and better incorporate security practices into each phase of the software development lifecycle (SDLC).

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - Why you should pursue CCSLP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================

    CSSLP certification recognizes leading application security skills. It shows employers and peers you have the advanced technical skills and knowledge necessary for authentication, authorization and auditing throughout the SDLC using best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain support from a community of cybersecurity leaders here to help you throughout your professional journey.

    www.isc2.org/csslp

    Are you ready to prove yourself? Register and begin your CSSLP journey today!

    NOTE: Join this info-session and earn 1 CPE.
  • 3 Steps to Unleash the Power of ServiceNow with OneLogin and Clear Skye
    3 Steps to Unleash the Power of ServiceNow with OneLogin and Clear Skye
    James Herbert, Solutions Engineer, OneLogin, TJ Gryziec, Chief Product Officer, Clear Skye Recorded: Feb 21 2019 54 mins
    Are you looking to strengthen identity governance and risk management for compliance initiatives like GDPR? Or to automate enterprise access management?

    Today’s enterprises handle a growing volume of unique identities and applications and the process is only getting more complex. The combination of complex web of identities and manual workflows for application provisioning, compliance reporting, and access fulfillment, leads to massive inefficiencies and potential risk.

    With Clear Skye and OneLogin, ServiceNow customers achieve a single system of record for all enterprise identities and access management. Additionally, the joint solution integrates seamlessly with ServiceNow GRC and provides evidence for auditing and IT compliance.

    Join us on Wednesday, Aug 29th at 10 am PST to hear from security experts from OneLogin and Clear Skye on how to automate identity orchestration for enhanced security and compliance on ServiceNow.

    In this webinar, you will learn how to:

    - Simplify identity management on ServiceNow including real time user provisioning and deprovisioning
    - Build automation processes to reduce risk and extend service management
    - Fast track your GDPR or other compliance initiatives
  • How to Modernize Applications in the Cloud Era
    How to Modernize Applications in the Cloud Era
    Jeffrey Deverter, Cloud Strategist, Cloudreach Recorded: Feb 21 2019 57 mins
    Learn from industry-leading Cloud Strategist Jeffrey Deverter how to modernize your applications using continuous deployment and continuous integration on the Cloud.

    Jeffrey will discuss a methodology that will enable you to modernize applications to reap several business benefits - including Agile improvements, transparency into the true cost of ownership of application operation - and share advice on how to drive business value and the direction of applications.
  • Cloud Security for Financial Institutions
    Cloud Security for Financial Institutions
    Aporeto Recorded: Feb 21 2019 40 mins
    The adoption of cloud and containers requires new and more dynamic methods of securing applications. These methods need to address the complexity associated with applications that can span multiple clouds, hybrid infrastructure and private deployments. Instead of relying on traditional networking constructs, cloud-native security needs to enable security teams to centrally manage security policies and enforce them in a distributed fashion.

    In this webinar, we will discuss how to enable faster cloud adoption with less security friction. We will also address the following topics:

    – Customer case studies for addressing PCI & SWIFT requirements in the cloud

    – Gaining visibility into applications data flow before moving to, and after deploying in, the cloud

    – Adopting the Zero Trust security model that requires authentication and authorization for all communication
  • Connection: The Key to Employee Engagement
    Connection: The Key to Employee Engagement
    Mindi Cox Recorded: Feb 21 2019 55 mins
    We hear over and over again that employee engagement is low. A 2017 Gallup report shows 51% of the workforce is not engaged, and 16% are actively disengaged. What’s missing in our workplace cultures that has led to such low engagement?

    Connection. Connection between people - between employees and their leaders. Between teams. Between people and their companies. We have so much technology at hand to bring us together, but it may actually cause us to drift apart. Think of the email or text you send to a coworker sitting right across from you. The instant message you send instead of picking up the phone.

    This lack of connection leads to less collaboration, innovation, trust, and engagement. But companies can take active steps to build more interaction and relationships between their people, and use practices, like appreciation, to create a more integrated culture.

    Join Mindi Cox, Senior Vice President of People and Great Work at O.C. Tanner, as she shares insights and best practices on how to create a more connected workforce in today’s increasingly disconnected environment.

    During the webinar you’ll learn:

    • The importance of human connection in the workplace today
    • How to foster high-quality interactions among employees and teams
    • The impact of having a connected workforce on company culture and employee performance
  • Wireless-Best-Practices verstärken die Cybersicherheit im Einzelhandel
    Wireless-Best-Practices verstärken die Cybersicherheit im Einzelhandel
    Fabian Freundt Feb 25 2019 9:00 am UTC 60 mins
    Zu den größten Herausforderungen für Einzelhändler gehören die Einhaltung der PCI(Payment Card Industry)-Anforderungen und der Schutz von Kundendaten. PCI-Probleme entstehen oft aufgrund schlecht verwalteter drahtloser Netzwerke.

    Melden Sie sich für dieses exklusive Webinar an und erfahren Sie mehr über typische Wireless-Herausforderungen und Cyberbedrohungen für Einzelhändler. Wenden Sie Best Practices an, um Ihre Daten zu schützen, geltende Vorschriften einzuhalten und:
    •Ihr Einzelhandelsunternehmen in einer dynamischen Cyberbedrohungslandschaft zu schützen
    •sichere drahtlose Verbindungen zu ermöglichen
    •bekannte und unbekannte Cyberangriffe abzuwehren
    •sichere Verbindungen für Ihre Kunden und Mitarbeiter zu gewährleisten
  • Achieve Global Marketing Excellence with a Digital Factory
    Achieve Global Marketing Excellence with a Digital Factory
    Lynne Capozzi, CMO @ Acquia, Geneviève Gourichon, Digital Project Manager @ Solvay, Sebastien Debon, Director @ Mirum Feb 25 2019 10:00 am UTC 52 mins
    In this digital-first world, organisations must be customer-first.

    No matter the brand or enterprise, the new rules require you to engage individuals and deliver personalised experiences at every point in the customer journey.

    The complexity is only growing as CMOs, customer experience (CX) pros and tech leaders grapple with digital sprawl – wrestling with greater marketing demands, higher customer expectations, and rising complexity across martech, data and touchpoints.

    Join this webinar to learn more about achieving global marketing excellence with a digital factory.
  • Can bigger security budgets save businesses from costly cloud breaches?
    Can bigger security budgets save businesses from costly cloud breaches?
    Maxim Frolov, Vice President of Global Sales, Kaspersky Lab and Jim Reavis, Co-founder and CEO, Cloud Security Alliance Feb 25 2019 10:00 am UTC 46 mins
    Nearly 1.5 million dollars. That’s how much an average data breach in the cloud costs enterprises, according to the Global IT Security Risks Survey 2018.

    Second only to targeted attacks, breaches affecting IaaS are among the most costly faced by businesses today. But what can be done about this? Apparently, investing more in protection is only part of the solution, as businesses are already allocating a greater share of their IT budgets to security…

    During the webinar, Maxim Frolov, VP Global Sales, Kaspersky Lab, presents key findings from the company’s latest report On the Money: Growing IT Security Budgets to Protect Digital Transformation Initiatives. Maxim, along with special guest Jim Reavis, Co-founder and CEO, Cloud Security Alliance, will discuss the potential damage and the main risks associated with cloud breaches, as well as what businesses can do to protect themselves.

    Webinar attendees gets the latest insights on the dynamics of corporate security incidents and IT security budgets. They will learn what financial, organizational and technological decisions should be made to protect businesses from the threat of cloud infrastructure breaches.
  • Dabble or deep dive: Threat hunting you can do with available resources
    Dabble or deep dive: Threat hunting you can do with available resources
    Nathan "Q" Quist (LogRhythm) and Randy Franklin Smith (UWS) Feb 25 2019 10:00 am UTC 105 mins
    In this real training for free session, we will discuss the minimum toolset and data requirements (and not necessarily volume) you need for successful threat hunting. We will take into account that while some of you can devote most of your time to threat hunting, most of us have limited time and resources for this activity. The good news is that threat hunting is flexible and anyone can do it, ranging from a few hours a week to full-time.

    As an example, a great type of threat hunting is to look for unrecognised/suspicious executables running on your network. You can dip your toe in the water with this type of hunt with a small commitment of time and resources or you can dive in deep with a major data collection and analysis effort. Starting out simple means you just focus on EXE names; baseline the EXE names being executed on your network, and then perform a daily review of new EXE names showing up for the first time. You can get this information from event ID 4688 and the query capabilities are very light. But I think you’ll be surprised what you are able to learn and catch.

    We will take the same approach with a total of 7 types of threat hunting:

    Recognising suspicious software
    Scripting abuse
    AV follow-up
    Lateral movement
    Persistence
    DNS abuse
    Bait-the-bad-guy
  • *New Launch* Schroder ISF European Sustainable Equity
    *New Launch* Schroder ISF European Sustainable Equity
    Nicholette MacDonald-Brown and Scott MacLennan Feb 25 2019 10:00 am UTC 60 mins
    Please join Nicholette MacDonald-Brown and Scott MacLennan as they discuss key points of the newly launched fund, Schroder ISF European Sustainable Equity.
  • Répondre aux enjeux de sécurité de la génération cloud
    Répondre aux enjeux de sécurité de la génération cloud
    Hervé Doreau, Directeur Technique, Symantec France Feb 25 2019 1:00 pm UTC 42 mins
    À l'ère de la génération cloud, les collaborateurs exigent une flexibilité à toute épreuve et un accès où qu'ils se trouvent, ce qui peut mettre vos données les plus sensibles en danger.
    Les environnements distribués, comme ceux mis en place pour les télétravailleurs et les employés mobiles, créent de nouvelles surfaces d’attaque qu’il est impératif de protéger. De même, le recours aux applications cloud SaaS rend encore plus nécessaires les contrôles de conformité et de sécurité.

    Résultat, les équipes IT et sécurité sont obligées de repenser la conception de leur réseau pour mieux répondre aux interrogations suivantes :
    - Comment encadrer efficacement l’accès aux données, aux applications et aux systèmes ?
    - Comment lutter contre les menaces avancées qui ciblent notre entreprise via le Web, le cloud et l’e-mail ?
    - Comment sécuriser les informations qui circulent entre notre réseau, les terminaux et le cloud ?
    Retrouvez nos experts pour ce webcast sur les grands défis de sécurité que les grands comptes clients de Symantec doivent relever avec la génération cloud. Vous découvrirez comment les solutions Cloud de sécurité de Symantec peuvent protéger les utilisateurs, les terminaux et les données d’entreprise, où qu’elles se trouvent.
  • Culture and Conduct
    Culture and Conduct
    Ruth Steinholtz and Shona Matthews Feb 25 2019 1:00 pm UTC 60 mins
    Culture and Conduct: The many reasons why things go wrong and what can you do about it

    For most of us, compliance might seem something that happens to us, only about interpretations of what legislation and regulation requires of us; necessary but boring – a nuisance even. But what if doing the right thing was actually good for business? What if we looked beyond the processes to the basis of ethical behaviour? Wouldn’t we care a little more about “compliance” if we thought about the outcome and not just the process? Ruth Steinholtz a leading practitioner in value-based business ethics and co-author of Ethical Business Practice and Regulation: A Behavioural and Values-based Approach to Compliance and Enforcement joins us to stimulate our thinking and personal awareness of why conduct and culture are so important and how each of us can improve the industry and benefit from it at the same time.
  • CROCI Outlook 2019
    CROCI Outlook 2019
    Francesco Curto, PhD, Head of CROCI; Colin McKenzie, Head of CROCI Intelligence Feb 25 2019 2:45 pm UTC 45 mins
    During the past decade, equity investors have benefitted from two principal trends: the inflation of asset prices via quantitative easing and strong earnings growth from the Technology sector. Both these trends are now showing signs of fatigue. In 2019, investors face a choice between Scylla and Charybdis.

    For investors, Charybdis is the central banks’ tightening programmes: excessive tightening risks creating a whirlpool which rapidly deflates asset prices. The alternative is Scylla: this would involve fewer rate hikes, a synchronised global economic slowdown and the hope that the journey does not veer off course. Odysseus chose Scylla—a rational choice that kept the ship safe in return for the sacrifice of a few sailors. Conservatism might dictate a similar choice to policymakers now.

    Our bottom-up analysis suggests that a slowdown is well underway, with capex falling and risk premia rising. Equity valuations may still be rich at the market level, but there are few alternatives available to investors and good pockets of value are starting to emerge for astute investors.
  • ClearlySo Angels: Interview with poker champions turned impact investors
    ClearlySo Angels: Interview with poker champions turned impact investors
    Arti Bareja, Head of Investor Relations at ClearlySo | Martin Jacobson, Impact Investor | Nicolas Cardyn, Impact Investor Feb 25 2019 3:00 pm UTC 45 mins
    Impact investors come in all shapes and sizes, and from all backgrounds including the world of poker. In 2014, Martin Jacobson won the World Series of Poker, the $10,000,000 prize was the fifth largest single payout in the history of the tournament. Nicolas Cardyn is also a professional poker player, as well as an investor in startups and the stock market, with lifetime winnings now exceeding $1,000,000. Both are now members of the ClearlySo Angels - the UK's leading group of high-net-worth individuals and families focused on creating social and environmental impact alongside financial return.

    During this webinar, ClearlySo Head of Investor Relations Arti Bareja will interview Martin and Nicolas to discover what led them to impact investing, the types of impact they are most interested in, and discuss what angel investors should be looking out for when investing in early stage growth businesses.
  • Effect of Cell Culture Process Change from Fed-batch to Continuous on...
    Effect of Cell Culture Process Change from Fed-batch to Continuous on...
    Ru Zang, Associate Director at Mersana Therapeutics and John Bonham Carter, Director of Upstream Sales at Repligen Feb 25 2019 4:00 pm UTC 75 mins
    EFFECT OF CELL CULTURE PROCESS CHANGE FROM FED-BATCH TO CONTINUOUS ON PRODUCTIVITY AND PRODUCT QUALITY

    Integrated continuous bioprocessing has attracted a growing interest due to its potential to improve agility and flexibility in the manufacture of therapeutic proteins. To convert an existing fed-batch cell culture process to continuous, or perfusion, the major technical hurdles include maintaining steady state cell culture performance and generating product with comparable product quality attributes. In this presentation, we evaluated three molecules including a fusion protein, an aglycosylated monoclonal antibody (mAb), and a glycosylated mAb. Steady state culture at high cell density was achieved for all three molecules, which allows the delivery of products with consistent product quality and adequate productivity. However, as compared to fed-batch processes, product quality and cell specific productivity differences were observed in perfusion cultures. Further studies indicated that it was feasible to modulate product quality in perfusion process by adding process levers in culture medium. It was also feasible to increase cell specific productivity through medium and process optimization. This presentation provides an insight into the product quality and productivity differences between traditional fed-batch and perfusion cell culture processes and potential approaches to addressing these differences.
  • Surviving Bad Bosses
    Surviving Bad Bosses
    Akeela B. Davis, President of Courageous Business Culture Feb 25 2019 4:00 pm UTC 60 mins
    Research shows that people leaves bosses, not jobs. So, what is a person to do if they love what they do, but not who they are reporting to? Bosses who are verbally abusive, bullying, blaming, passive/aggressive, micromanaging or any combination of these, do untold damage to the organizations which tolerates them and to the health and careers of their direct reports.
    It is not unusual for Employees to feel at least disrespected, fearful, angry, lonely, dis-empowered, shame, and guilt. Their perceived choices? Leave, stay and suffer becoming more disengaged and stressed, or participate in the dysfunction, making a bad situation worse, for all concerned.

    There is another choice.

    This webinar will give you coping tips and techniques so that you can choose to keep doing what you are doing with less stress, more control and therefore allowing you to make better choices.
  • はじめての Informatica Intelligent Cloud Services -Application Integration編-
    はじめての Informatica Intelligent Cloud Services -Application Integration編-
    セールスコンサルティング部 シニアセールスコンサルタント 松林 晶 Feb 26 2019 5:00 am UTC 45 mins
    Intelligent Cloud Servicesシリーズ第二回目は、複数のアプリケーションと連携し、プロセスの開発・実行・モニタリングが簡単にできるApplication Integrationについてご紹介します。

    <内容>
    ・Informatica Intelligent Cloud Servicesとは
    ・Data Integrationとの違い
    ・Application Integrationの特徴
    ・デモのご紹介
    ・Q&A

    <こんな方におすすめ>
    Informatica Intelligent Cloud Servicesの導入をご検討中
    製品評価を予定されているお客様
    マルチクラウド運用にお困りの方
    手作業でプロセス連携を行われている方
  • (ISC)² Info Session: CISSP - The World's Premier Cybersecurity Certification
    (ISC)² Info Session: CISSP - The World's Premier Cybersecurity Certification
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)² Feb 26 2019 6:00 am UTC 60 mins
    Accelerate your cybersecurity career with the CISSP certification.

    Join this online info-session hosted by (ISC)² and learn everything you need to know about the globally recognized credential CISSP!

    During the online info-session, you will:
    - Gain an insight into the CISSP credential-its domains and career benefits for credential holders
    - Hear about the practical application of the CISSP related to real world issues for security professionals
    - Ask questions about the credential, exam and experience requirements
    - Learn everything you need to know about getting certified

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================
    Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities.

    Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career.

    https://www.isc2.org/cissp
  • SAP 与 云原生架构 -- 如何提升SAP 开发测试、预生产的环境效率?SAP中如何使用容器云、私有云?
    SAP 与 云原生架构 -- 如何提升SAP 开发测试、预生产的环境效率?SAP中如何使用容器云、私有云?
    徐亮 Feb 26 2019 6:30 am UTC 45 mins
    遵循SAP的2025计划,大量的小型机需要在这5年内彻底迁移至X86架构。这样给SAP用户、供应商都带来了大量的架构变更挑战。
    从最终用户、用户服务商角度,如何实现业务的逐步迁移? 迁移后,发现开发测试环境、预生产环境,都有很大的效率要求。如何采用迅捷的方式满足在X86架构下的sap 开发测试、预生产的业务需求?
    这次线上的分享会,在关注以上内容的同时,会给大家聊一些OpenStack for SAP、K8S for SAP的内容,希望能更多的帮助SUSE/SAP的用户、SUSE/SAP的合作伙伴。
  • Создание, конфигурация и эффективное использование Commvault
    Создание, конфигурация и эффективное использование Commvault
    Дмитрий Иванюк, эксперт по решениям Commvault Feb 26 2019 8:00 am UTC 90 mins
    У Вас есть вопросы по:
    - основным компонентам решения Commvault?
    - методам настройки решения Commvault и архитектурным особенностям решения?
    - каковы приёмы конфигурирования и повышения производительности?
    - как устранить неполадки? И какие есть для этого инструменты?
    - вы хотите увидеть демонстрацию решения!?

    И у Вас есть вопросы, на которые Вы хотите получить оперативный ответ в режиме диалога. Все это и намного больше вы сможете узнать, посетив наш вебинар

    Курс предназначен для менеджеров по продукту, архитекторов, инженеров, администраторов.
  • Fastmarkets小金属价格发现和2019年市场趋势
    Fastmarkets小金属价格发现和2019年市场趋势
    Huaqing Fu,价格分析师,亚洲 Amy Lv,价格分析师,亚洲 Susan Zou,小金属及铁合金编辑,亚洲 Feb 26 2019 8:00 am UTC 60 mins
    近期小金属市场趋势,2019年决定价格发展的因素
    环保检查会如何影响今年的小金属市场
    中国打击走私是否会继续影响锑市场
    全球贸易的不确定性-贸易战,宏观经济和政治因素
    我们如何评估小金属价格
  • The Delivery Conference 2019 Live - Opening Presentations
    The Delivery Conference 2019 Live - Opening Presentations
    Various Feb 26 2019 8:45 am UTC 135 mins
    For the first time, MetaPack will be live streaming from The Delivery Conference 2019 (TDC Global), the number one event for eCommerce delivery. Our focus will be on the eCommerce and Customer Experience Stream, where you can enjoy 4 different sessions.

    Taking place in London on Tuesday 26th February 2019, TDC Global will bring together 1300+ attendees – 70% of which are from the leading retailers and brands.

    You can join an unrivalled gathering of senior eCommerce executives at TDC Global, simply by registering for the session below.

    Session 1 - The Delivery Conference 2019 - Opening Presentations

    (08:25 - 10:55 GMT)

    Agenda:

    08:55 ‐ 09:15 - Patrick Wall, Founder, MetaPack - Welcome and Trends in Delivery
    09:15 ‐ 09:45 - Howard Saunders, Retail Futurist, Twenty-second and fifth
    09:45 ‐ 10:05 - Xuan Jin, Lead Solutions Architect, Alibaba
    10:05 ‐ 10:25 - Professor Matthew Goodwin, University of Kent/Chatham House
    10:25 ‐ 10:55 - Martijn Bertisen, UK Sales Director, Google

    For the full agenda visit https://www.thedeliveryconference.com/tdc-global/agenda/

    #TDCGlobal
  • Investments in European Equities
    Investments in European Equities
    Ivan Bouillot Feb 26 2019 9:00 am UTC 45 mins
    Investments in European equities and fund update for Banque de Luxembourg Investments' fund BL Equities Europe managed by Ivan Bouillot.
  • Pratiques d’excellence sans fil et cybersécurité renforcée en vente au détail
    Pratiques d’excellence sans fil et cybersécurité renforcée en vente au détail
    Laurent Meimoun Feb 26 2019 9:00 am UTC 60 mins
    L’un des plus grands défis des commerçants est de garantir la conformité PCI (Payment Card Industry) ainsi que la sécurité des données clients. Les réseaux sans fil mal gérés figurent parmi les erreurs courantes de conformité PCI.

    Inscrivez-vous à ce webcast exclusif pour découvrir les défis des réseaux sans fil et les cyber menaces auxquels doivent faire face les commerçants. Pour garantir la sécurité et la conformité de vos données, vous verrez comment appliquer des pratiques d’excellence pour :
    •protéger votre commerce de détail dans le paysage des cybermenaces en constante évolution
    •assurer une connectivité sans fil sécurisée
    •bloquer les cyber attaques connues et inconnues
    •garantir que vos clients et vos employés sont connectés en toute sécurité.
  • Symantec Web Isolation – Ihre Vorteile durch unsere Fireglass-Übernahme
    Symantec Web Isolation – Ihre Vorteile durch unsere Fireglass-Übernahme
    Alexander Peters, Symantec (Deutschland) GmbH Feb 26 2019 9:00 am UTC 50 mins
    URL-Filter sind ein hervorragendes Tool, um Ihre Systeme vor webbasierte Threats zu schützen. Achtung! Sie stoßen aber an ihre Grenzen, wenn Mitarbeiter unkategorisierte Webseiten ansteuern.

    In den meisten Unternehmen werden Zugriffe auf diese Grauzone durch die Policy unterbunden – auch wenn man gelegentliche False Positives in Kauf nehmen muss. In anderen lässt man die Zugriffe zu, und riskiert lieber eine Infektion, als Mitarbeiter von potenziell wichtigen Informationen abzuschneiden.

    Beides ist nicht ideal – und ab sofort gibt es endlich eine bessere Alternative: Die Übernahme des amerikanischen Security-Anbieters Fireglass ermöglicht es uns, unser marktführendes Web-Security-Portfolio jetzt auch um eine leistungsstarke Web-Isolation-Lösung zu erweitern.


    Im Webinar erfahren Sie:

    >>Wie Sie mit Symantec Web Isolation allzu streng eingestellte URL-Filter vermeiden und Ihren Mitarbeitern Zugang zu mehr Webinhalten gewähren, ohne zusätzliche Risiken einzugehen

    >>Wie Sie die Lösung nutzen können, um Ihre Privilegierten Accounts und Anwender künftig noch besser vor webbasierten Attacken zu schützen

    >>Wie sich durch das Isolieren potenziell gefährlicher eingebetteter Links viele gängige Phishing-Attacken und Account-Übernehmen zuverlässig unterbinden lassen

    >>Wie Sie Symantec Web Isolation mit Ihren ProxySGs, Content Analysis Systemen und Malware Analysis Appliances kombinieren und zu einer nahtlos integrierten Komplettlösung bündeln lassen

    Darüber hinaus verraten wir Ihnen Sie, wie die weitere Roadmap zur Integration der Fireglass-Produkte in unser bestehendes Portfolio aussieht, und geben Ihnen einen kurzen Überblick über alle anderen wichtigen Neuerungen in unserem Portfolio.

    Wir freuen uns auf Sie!
  • China A Shares & Minimum Variance  - Managing Volatility via Optimization
    China A Shares & Minimum Variance - Managing Volatility via Optimization
    Join Alex Chen Associate Director, Yang Wang Director Research & Analytics FTSE Russell Feb 26 2019 9:30 am UTC 45 mins
    Increased market volatility is rarely a welcomed phenomenon; but how might investors approach a market characterised by it?
    Join Alex Chen Associate Director and Yang Wang Director Research & Analytics as they explore, with reference to their recently published paper, ‘Accessing the China A-Shares Market via Minimum-Variance Investing, in the Journal of Portfolio Management, how best to participate in the China A Shares market when looking to limit overall portfolio risk.
  • Your Game Plan For A Quick, Peaceful and Successful Cloud Migration
    Your Game Plan For A Quick, Peaceful and Successful Cloud Migration
    Eveline Oehrlich Feb 26 2019 10:00 am UTC 48 mins
    Will your game plan make you a winner in your cloud migration project? Ensure your tactics and team are in the best position possible.

    With all the organisational decision-making required, companies can end up struggling—and spending way too much time and money—on their Cloud migration projects.
  • How to Build a Zero Trust Network
    How to Build a Zero Trust Network
    John Kindervag, Field CTO, Palo Alto Networks Feb 26 2019 10:00 am UTC 60 mins
    “Trust is always a vulnerability in a digital system,” - John Kindervag, Founder of Zero Trust and Field CTO at Palo Alto Networks

    Much has been written about the topic of Zero Trust. Is it a security buzz word or a true effective security strategy?

    High-profile breaches involving “trusted” insiders have given industry-wide visibility to the fact that trust represents a vulnerability for digital systems. It’s something malicious actors can and do exploit for their advantage.

    Zero Trust was first introduced around the principles of “never trust, always verify” as a means for enterprises to implement effective network segmentation. As the model has been embraced, Zero Trust evolved to become a strategic Cybersecurity initiative that major enterprises align to in order to prevent successful cyberattacks.

    Watch as our Palo Alto Networks® expert John Kindervag discusses the “whys and hows” of building a Zero Trust architecture. In this webcast, you will:

    • Learn specific outcomes of implementing a Zero Trust architecture
    • Hear recommendations on where to start when planning and implementing a Zero Trust framework
    • See how Palo Alto Networks performed in an independent evaluation on Zero Trust Networks
    • Get your questions answered in our Live Q&A
  • AWS WEBINAR: Modernise your infrastructure and migrate to AWS.
    AWS WEBINAR: Modernise your infrastructure and migrate to AWS.
    Chris Williams, Head of Public Cloud Strategy, and Steve Drew, AWS Solution Architect Feb 26 2019 10:00 am UTC 60 mins
    Do you want to drive business growth by optimising your IT infrastructure? Do you need guidance to overcome the challenges of adopting AWS and to apply best practices in the design and delivery of a secure AWS migration?

    Then sign up for our webinar on Tuesday 26 February at 10am (UK), and learn how adopting AWS helps modernise your IT infrastructure. With a specific emphasis on creating the right business model and designing the right technical foundations, our AWS-certified experts will cover:

    • key drivers for moving to the cloud

    • common challenges faced along the way

    • building a secure Landing Zone on AWS to start your modernisation journey

    So, complete the registration form and book your webinar place now. Join us to make the most out of your cloud migration journey.

    Rackspace is an AWS-audited Managed Service Partner with 1,000+ certifications and an AWS Premier Consulting Partner.
  • Wireless Best Practices for Your Retail Needs
    Wireless Best Practices for Your Retail Needs
    Bob Honour & John Aarsen Feb 26 2019 10:00 am UTC 60 mins
    One of the major challenges for retailers is ensuring Payment Card Industry (PCI) compliance and the need to secure customer data. Poorly managed wireless networks are one of the common PCI mistakes. This webinar will walk through some of the wireless best practices to ensure your data remains secure and compliant.

    This webinar will cover the wireless threats faced by retailers and how you can apply best practices to:

    • Protect your retail business in the evolving cyber threat space
    • Secure wireless connectivity
    • Stop known and unknown threats
    • Ensure that your customers and employees are connected securely