Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • 2018 Cyberthreat Defense Report
    2018 Cyberthreat Defense Report Mark Bouchard, Co-Founder and COO, CyberEdge Group and Graham Melville, Sr. Director Security Solutions Marketing, Gigamon Jun 19 2018 8:00 am UTC 60 mins
    New research from CyberEdge’s 2018 Cyberthreat Defense Report shows that in spite of increasing their security budgets, companies are finding that there is too much data even for new tools to analyze, not enough skilled IT security professionals and little confidence in current investments. Sign up for this webinar to gain key insights into the cyberthreat landscape and how to protect your organization.

    Attendees will learn how to:

    - Deal with cyberthreat headaches such as increased breaches, vulnerabilities and encrypted traffic.
    - Reduce incident response and remediation time with automation.
    - Find products that use automation to minimize their dependency on skilled security personnel.

    Now in its fifth year, this report provides a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. Register now to learn how your colleagues plan to defend against cyberthreats!
  • Stream Processing and IoT Leveraging Apache Kafka
    Stream Processing and IoT Leveraging Apache Kafka Neil Avery, Technologist, Office of the CTO, Confluent Jun 19 2018 9:00 am UTC 60 mins
    This session walks through the IoT landscape, from its origins up until the present day. From there we will explore the diverse use-cases that currently dominate IoT including smart cities, connected-cars and wearable technology. We will then expand these into a solution architecture with the streaming platform as the central nervous system and backbone of IoT projects.

    Putting Kafka at the heart of the IoT stack opens up unique ‘Kafka’ semantics which supports the opportunity to drive IoT solutions via heuristics, machine learning or other methods. This approach reinforces the concepts of event-time streaming and stateful stream processing. By exploring Message Queuing Telemetry Transport (MQTT) and how MQTT streams can be sent to Kafka using ‘Connect’ we build several IoT solutions that leverage Kafka Streams and KSQL to see how they can be used to underpin real solutions. Use-cases include ‘Car towed alert’ and ‘Location-based advertising’.
  • Miton Multi Asset Webinar
    Miton Multi Asset Webinar David Jane & Anthony Rayner Jun 19 2018 9:00 am UTC 30 mins
    With current uncertainty in financial markets, Miton Multi Asset fund managers David Jane and Anthony Rayner will discuss their views surrounding current topics in this forthcoming webinar.
  • Live Demo: Email Fraud Defense by Proofpoint
    Live Demo: Email Fraud Defense by Proofpoint Neil Hammet, Email Fraud Specialist Jun 19 2018 9:30 am UTC 45 mins
    Email Fraud is one of the oldest yet most successful threats against your organisations. Proofpoint Email Fraud Defense (EFD) can help you protect your organisation and your customers, leveraging the power of email authentication.

    Join this product demo to discover how you can protect your organisation and people by leveraging the power of EFD.

    •Block malicious emails spoofing your domains before they reach your employees and customers
    •Monitor all emails (inbound and outbound) from your domains and those of third parties
    •Accurately distinguish between legitimate emails and fraudulent emails
  • Single View (of the customer): Data Quality (in a Big Data world)
    Single View (of the customer): Data Quality (in a Big Data world) Davinity Powis, Pre-sales Consultant, Syncsort Jun 19 2018 10:00 am UTC 60 mins
    Data is everywhere! Growing exponentially in size, and complexity too. In this session, we look specifically at the ‘Holy Grail’ of Single Customer View, and at some of these techniques required to achieve that in your own data. But why is it exclusive to Customer Data? Isn’t product data is just as important to a Product manager as Customer Data is to a Marketer or Salesperson? Davinity explores the DQ techniques which can be applied to any type or kind of data to keep it clean and fit for purpose. And is there any difference in achieving such high Data Quality in a Big Data space over more traditional environment? Tune in to find out…
  • Salesperson - You’re FIRED!
    Salesperson - You’re FIRED! Nigel Dunand, ISM Fellow Jun 19 2018 10:00 am UTC 30 mins
    Here’s why: the three habits you never acquired the three mindsets you never changed and the three techniques you never mastered.
  • GDPR: A regulation, an opportunity, a call to action
    GDPR: A regulation, an opportunity, a call to action Oleg Gorobets, Senior Global Product Marketing Manager, Kaspersky Lab Jun 19 2018 10:00 am UTC 75 mins
    GDPR is an EU regulation that comes into effect on the 25th of May 2018.

    GDPR is designed to uphold the rights of the individual in terms of how their personal data is handled, stored and secured.

    It also places greater responsibility on businesses to observe data security and related processes and practices.

    Kaspersky Lab solutions help companies process personal data by offering effective measures to reduce the risks of a data breach, prevent security incidents and enhance visibility of the monitored infrastructure.

    During the webinar, we’ll look at the following topics:
    •What GDPR is - and isn’t - when it comes to cybersecurity.
    •How cybersecurity fits into GDPR-aligned processes.
    •The endpoint: a good starting point for the cybersecurity aspect of a data protection strategy.
    •The role of storage and the impact of storage security.
    •Guarding the bottlenecks: perimeter defenses to reduce the risks of human influence.
    •Why data in the cloud requires special security.
    •Forewarned is forearmed: the importance of cybersecurity essentials training.
    •Understanding the risks: get more from your Data Protection Impact Assessments.
    •Kaspersky Lab’s GDPR readiness.
  • Using Inline Security Tools to Achieve Your Security Goals
    Using Inline Security Tools to Achieve Your Security Goals Adrian Rowley, Technical Director EMEA, Gigamon, Lindsay Drabwell, Head of Membership Services EMEA, (ISC)² Jun 19 2018 11:00 am UTC 60 mins
    Inline security tools operate by actively preventing threats in your network, but deploying and optimising these tools presents several challenges to both network and security engineers. The downsides can include a potential point of failure, degradation of network and application performance, difficulty to scale and upgrade.
    The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges.
    Join Gigamon and (ISC)² EMEA in this webinar where we aim to examine how inline bypass can overcome physical deployment obstacles, maximise network availability, increase the scale of inspection and reduce the impact to network performance.
  • Career Development Live Q&A
    Career Development Live Q&A Teresa Robertson & Colette Reilly Jun 19 2018 12:00 pm UTC 60 mins
    Create a career that works for you by bringing your questions to this interactive session with two highly experienced career coaches.

    Submit your questions during the live webcast and/or prior to the Career Development Live Q&A; email comms@charteredbanker.com

    Teresa and Colette look forward to receiving and answering your questions.
  • The Digital-Native Network: How Software Will Define The WAN
    The Digital-Native Network: How Software Will Define The WAN Roz Parkinson, Jan Hein Bakkers Jun 19 2018 1:00 pm UTC 45 mins
    Join this IDC webinar to find out:
    •How SD-WAN can help organizations progress on their digital transformation journey
    •What vendors and service providers should do to succeed as SD-WAN disrupts the enterprise networking market
    Watch this short, teaser video now: https://youtu.be/rfJ1Hd6hJQs
  • BrightTALK Pitch: UK
    BrightTALK Pitch: UK . Jun 19 2018 1:00 pm UTC 75 mins
    Investors Looking for Deal Flow meet Startups Looking for Investments in this live webinar. 6 startups pitch for 10 minutes each. Investors can choose who to connect with.
  • Adeque seu ERP SAP à era digital
    Adeque seu ERP SAP à era digital Marcelo Devesa Jun 19 2018 1:00 pm UTC 75 mins
    Processos de negócios tradicionais estão sob pressão dos novos disruptores digitais, e isso requer um nível mais alto de automação dos processos. Isso é ainda mais complicado pela necessidade de se reorganizar processos que abrangem várias plataformas para incluir aplicativos na nuvem, fontes de dados externas e infraestrutura de terceiros.
    Junte-se à CA Automic em um webinar empolgante e rápido e obtenha informações de especialistas sobre como sua empresa pode se beneficiar do Business Automation.
    Os participantes terão a oportunidade de ouvir Marcelo Devesa, consultor de automação da CA Technologies.
  • Asociese al socio estrategio de SAP. Capacitación - suse linux enterprise server
    Asociese al socio estrategio de SAP. Capacitación - suse linux enterprise server Cesar Lorca, Presales Engineer y Anders Olesen, Partner Executive Jun 19 2018 2:00 pm UTC 135 mins
    Dia 1 - Capacitación Comercial

    10.00 hrs - 11.00hrs - Modelo de Canales

    •¿Que es el SUSE Partner Program?
    •Requisitos de Inscripción y Beneficios de Asociarse a SUSE
    •Certificaciones en SUSE y Administración de Ventas

    11.00hrs - 12.00hrs - SUSE FOR SAP Modulo 1
    •Conoce la cooperación entre SUSE y SAP
    •Que es SUSE Linux Enterprise Server for SAP Applications?
  • GDPR Compliance: Keep it SIEMple
    GDPR Compliance: Keep it SIEMple Rob McGovern & Chris Dutch, LogRhythm Jun 19 2018 2:00 pm UTC 60 mins
    GDPR is live. Whether you are deep into your compliance initiatives or playing catchup, you should know how your SIEM plays a key role in supporting your compliance efforts.

    Join LogRhythm’s compliance experts to learn how we, as a cyber-security vendor, are not only working through our own compliance needs, but also finding ways to make it easier to achieve compliance.


    •How GDPR is playing out in the real world
    •What LogRhythm is doing for our own GDPR compliance
    •How to leverage LogRhythm’s experience and GDPR Compliance Module to simplify your own compliance efforts

    Register today to see how other organisations are handling compliance with GDPR and learn how a SIEM solution like LogRhythm can streamline your compliance with the regulation.
  • Financial Implications of Climate Change Legislation and Litigation
    Financial Implications of Climate Change Legislation and Litigation James Cameron Jun 19 2018 2:00 pm UTC 45 mins
    In this webinar, we discuss the financial implications of climate change legislation and litigation with Richard Saines, Richard Lord and James Cameron.

    - Current trends in climate litigation

    - Climate change and fiduciary duty, are they linked? 

    - Legal issues and their likely impact on US corporations and investors worldwide

    - Risk mitigation in the era of climate change for investors and company directors

    Richard Saines, Partner at Baker McKenzie
Richard heads the North America Climate Change and Environmental Markets Practice at Baker McKenzie. He is recognised by Chambers USA and Chambers Global as a leading climate change lawyer.

    Richard Lord, Q.C. at Brick Court Chambers, London

    Richard has appeared in and advised on numerous cases in tribunals at The Supreme Court and House of Lords. He co-edited the book Climate Change Liability: Transnational Law and Practice.

    James Cameron, Chairman of Overseas Development Institute, and Chairman of Engaged Tracking
James has worked on climate change matters including the United Nations Framework Convention on Climate Change and Kyoto Protocol. He recently advised the Fijian presidency at COP23 in Bonn.
  • You Can't Make Good Business Decisions Today with Yesterday's Data
    You Can't Make Good Business Decisions Today with Yesterday's Data Larry Romireo at EFCO Corporation & Giacomo Lorenzin, Managing Director, Direct Solutions at BackOffice Associates Jun 19 2018 3:00 pm UTC 45 mins
    There is a growing demand for high-speed analytic database systems and platforms where data can be processed at lightning speed for business decision-making. However, is that data up-to-date? If the process to update that data is batch or overnight, the data delivery may be fast, but the information may be outdated which can result in error-prone reporting and ineffective (or disastrous) business decisions.

    For successful analytics it’s important to move data in real time from multiple systems, including legacy databases, so that combined data can be properly presented in a uniform way.

    Change Data Capture is a technology employed in the best data replication solutions to minimize the amount of time and resources necessary to update data changes from one system to another. By propagating only what’s changed since the last check on the source system, minimal data is passed between systems in order to ensure identical copies of data on both source and target.

    Change Data Capture is frequently used to select and update copies of key data for operational reasons such as maintaining activity on separate systems that interact externally with customers or vendors, or remote systems that interact with corporate databases. However, it is also useful to maintain freshly updated data in systems that are used extensively for non-transactional activity, such as for analysis, reporting and data warehousing.

    Main points:
    1.Retrieving information from any source database for your analytic system
    2.Specialized and configured support to load data into the analytic system
    3.Automatically prepare and map the data between systems, saving time and resources
    4.Best-in-class process to automatically and continuously update data
    5.Change Data Capture saves time, money and effort through efficient and cost-effective technology
  • Where are you on the Digital Transformation Journey? Further than you think
    Where are you on the Digital Transformation Journey? Further than you think Vishal Ganeriwala, Senior Director, Product Marketing, Citrix Workspace Jun 19 2018 3:00 pm UTC 60 mins
    Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?

    Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.

    You’ll learn how to:

    • Simplify your systems and ongoing management with a cloud-based approach
    • Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
    • Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
  • IT Complexity and the New Monitoring Landscape
    IT Complexity and the New Monitoring Landscape Nancy Gohring of 451 Research and cPacket Jun 19 2018 3:00 pm UTC 60 mins
    Businesses across sectors are adopting a host of new technologies – containers, SDN, IoT and many others -- as digital transformation disrupts practically every industry. The result is a significantly more complex IT environment than ever before. These environments present new challenges for professionals tasked with ensuring applications perform perfectly, leading to a re-examination of a once widely accepted monitoring toolset.

    Join as we discuss:
    •Why monitoring has become a big data problem
    •The morphing monitoring tools landscape
    •The value network monitoring tools can bring to APM and security
  • ForgeRock and Trusona - Simplifying the Multi-factor User Experience
    ForgeRock and Trusona - Simplifying the Multi-factor User Experience Ben Goodman, ForgeRock and Kevin Goldman, Trusona Jun 19 2018 3:00 pm UTC 60 mins
    Authentication and MFA is no longer a one-mode-fits-all experience. Customer-centric companies need flexible intelligence models and simple, consistent login journeys across channels—web, call center, mobile—without being forced to bolt MFA on top of usernames and passwords.

    ForgeRock’s VP, Global Strategy and Innovation, Ben Goodman, and Trusona’s Chief Design Officer, Kevin Goldman, explain how ForgeRock combined with Trusona creates a broad range of multi-factor authentication modalities all with a consistent user experience, including primary MFA without usernames, passwords or typing whatsoever.

    Bonus: Trusona will reveal findings from the first-ever passwordless MFA behavioral research.

    Webcast Overview:
    Learn how to easily configure, measure, and adjust login journeys using digital signals including device, contextual, behavioral, user choice, and risk-based factors

    Learn how Trusona’s range of identity authentication experiences dovetail with ForgeRock’s decision tree authentication approach

    See behavioral research findings that show end-user preference for primary MFA over the comfort of the familiar username and password mode

    *By registering for this webcast you agree ForgeRock will maintain and process your personal information for communicating with you. (https://www.forgerock.com/privacy-policy)

    The following partner(s) of the the above webcast(s) will have access to the list of registrants, including your contact information.

    Trusona (https://www.trusona.com/privacy-policy/))
  • HCL NFV Cognitive troubleshooting framework
    HCL NFV Cognitive troubleshooting framework Ramesh Sriraman, GM, HCLTech Jun 19 2018 3:00 pm UTC 60 mins
    Complexity of troubleshooting NFV stack is manifold because of multiple layers of telemetry data. With such large data, SME driven exploratory analysis can be time-consuming and is not scalable. Cognitive Troubleshooting Framework augments exploratory analysis, reduces the time taken to find needle out of haystack by applying AI (ML/DL) algorithms based on model arrived at and help understand the behavior of the overall system and identify bottleneck regions that need be optimized.
  • Equity risk management: a ‘tail’ of two approaches
    Equity risk management: a ‘tail’ of two approaches Seth Finkelstein, CFA, Head of US Portfolio Solutions, and Julien Manhood, CFA, Solutions Manager Jun 19 2018 3:00 pm UTC 60 mins
    We explore two approaches to managing equity risk, and why both should be carefully considered given today’s market levels:

    1.Strategic: Making an allocation to a drawdown-oriented risk-managed equity strategy designed to improve a total portfolio’s risk/return profile

    2.Tactical: Designing and implementing a strategy designed to limit acute short-term equity losses late in the cycle

    Seth Finkelstein, Head of US Portfolio Solutions, and Julien Manhood, Solutions Manager, outline the merits for such equity risk management strategies within the context of an institutional client’s portfolio.
  • Makeover Monday Viz Review - week 25, 2018
    Makeover Monday Viz Review - week 25, 2018 Andy Kriebel, Head Coach and Tableau Zen Master at The Data School & Eva Murray, Head of BI and Tableau Zen Master at Exasol Jun 19 2018 3:00 pm UTC 75 mins
    Join the Makeover Monday community for a live webinar to discuss selected data visualizations from this week's submissions.

    You can participate in the webinar, ask questions but also submit a viz ahead of time for review (do this on https://data.world/makeovermonday by submitting your visualization in the Viz Review discussion for this week's dataset).

    VIZ REVIEW is our way to provide much more comprehensive feedback for everyone, which is always difficult within the limitations of Twitter and short-form comments in general.

    Find out more about Makeover Monday on www.makeovermonday.co.uk (http://www.makeovermonday.co.uk/) and join the conversation on Twitter by following Andy (@VizWizBI) and Eva (@TriMyData) as well as the #MakeoverMonday community.