Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Training Snapshot: Proximity Searching From CloudNine
    Training Snapshot: Proximity Searching From CloudNine Brian Kelley Recorded: Feb 22 2018 5 mins
    A snapshot demonstration of the process and syntax required to perform proximity searches within CloudNine to locate responsive terms that are not only in the same document, but close to each other without having to be in an exact phrase.

    When performing keyword searching, the challenge to performing those searches effectively is to balance recall (retrieving responsive documents with hits) and precision (not retrieving too many non-responsive documents with hits). One way to achieve that balance is through proximity searching, which is simply searching for two or more words that appear close to each other in the document. Proximity searching is more precise then an AND search (where two terms can appear in the document together but be completely unrelated) with more recall than a phrase search (where the terms must be exactly together in that order), so proximity searching can be a valuable search strategy for striking the proper balance in your search results.

    Training Snapshot Presenter: Brian Kelley

    Brian is the Director of Customer Success for CloudNine. At CloudNine, Brian manages training, support and customer success efforts for CloudNine's Software-as-a-Service (SaaS) eDiscovery clients. Brian has extensive experience providing legal technology consulting and technical support services to numerous commercial and government clients ranging from multinationals corporations and large law firms to litigation support providers and governmental agencies.
  • GDPR's Effect On Internet Application Developers and Security Professionals
    GDPR's Effect On Internet Application Developers and Security Professionals Eric Greenfeder Primitive Logic, Nathan Wenzler AsTech, Michael Rubin Latham & Watkins, and Robert Shields Informatica Recorded: Feb 22 2018 58 mins
    Join this panel discussion of technology solution, information security, legal privacy and data protection experts along with Informatica’s Director of Product Marketing for Data Security to find out:

    - How does GDPR change the way security is approached by both Internet application developers and security professionals?

    - What are the rights provided to data subjects by GDPR and how does this change the way Internet business applications must be designed and secured?

    - How can organizations demonstrate the GDPR requirements for Article 25: Data Protection by Design and by Default?

    Day 3 of 3 day series:
    Day 3 - Focus on Security side of GDPR from a technology perspective

    ~ Day 1 – Overview of key concepts with legal and technical discussion of suggested actions
    ~ Day 2 – Focus on Privacy side of GDPR from a technology perspective

    Eric Greenfeder, Primitive Logic Chief Architect
    Nathan Wenzler, AsTech Consulting, Chief Security Strategist
    Michael Rubin, Latham & Watkins Partner – Privacy and Data Protection
    Robert Shields, Informatica Director Product Marketing for Data Security
  • Make Your Customers Your Partners
    Make Your Customers Your Partners Melanie Turek, VP of Connected Work, Frost & Sullivan Recorded: Feb 22 2018 44 mins
    In today’s sharing economy, people like to offer their insights and expertise. Let them.

    By embracing your most loyal followers, you can gain authenticity and reach. Prospects and other customers are more likely to trust information when it comes from a third party, especially one with experience with your products or services.

    Power users can deliver valuable insight through reviews and feedback, but they can also help with FAQs and basic customer support issues. This is especially true in the B2B marketplace, where knowledge and experience can pay huge dividends for employees and companies that use them.

    This session will focus on creating loyalty programs that identify key supporters and power users, and then suggest ways to engage them to help sell and support the brand, ultimately boosting business.
  • Direct Query SAP Hana with Pyramid
    Direct Query SAP Hana with Pyramid Avi Perez, Pyramid CTO Recorded: Feb 22 2018 7 mins
    Pyramid allows you to combine SAP Hana data with other data sources to provide better insights for your business. This short demonstration shows how easy it is to setup and directly query SAP Hana with Pyramid.
  • The 7 Steps to a Value Proposition That SELLS
    The 7 Steps to a Value Proposition That SELLS Lisa Dennis Recorded: Feb 22 2018 34 mins
    Brainstorming a 1-line value prop rarely results in a message that is extendable across communications platforms, and is buyer-focused. Focusing on just a tag line or elevator pitch short circuits developing a Value Prop Platform that is both complete and flexible enough for marketing content and sales conversations.
  • 2018 State of Cross-Device Digital Shopping
    2018 State of Cross-Device Digital Shopping Mary Sheehan, Global Director of Product Marketing at Verto Analytics, Aaron Schwartz, Senior Data Analyst at Verto Analytics Recorded: Feb 22 2018 36 mins
    Browse, Click, Buy: Shopping across screens in 2018

    More than 96% of all American adults engage with an e-commerce property at least once a month.* Consumers use a variety of devices to research, shop, and complete their purchases. To understand today’s digital shopper, it’s imperative to look at the full funnel view, the path before and after purchase, on multiple screens.

    In this live webinar, we’ll look at real-world examples from consumers across devices on top shopping platforms. Also, learn how you can reach and engage the right audience at the right time. We’ll discuss:

    - What does the shopper funnel view look like? See which properties are visited most before or after shopping, including day-in-the-life and week-in-the-life views of key demographics.

    - Who is the online shopper? How often do different demographics shop, how much time do they spend shopping, and when do they shop? How are online shopping behaviors different depending on demographics?

    - How do consumers behave differently with different shopping platforms? Understand how Macy's, Groupon, Wish, Target, Google, and Amazon consumers interact when they’re shopping.

    - How does multitasking play a part in shopping? Understand the other apps consumers are using while shopping, which may influence their purchase decision.

    Learn how Verto Analytics uses single-source panel data to provide the latest in digital shopping analysis. Register today.

    * Source: Verto Analytics data from December 2017.
  • Trends in the Modern Data and Analytics Market and Industry Forecasts for 2018
    Trends in the Modern Data and Analytics Market and Industry Forecasts for 2018 CTO, Ruhollah Farchtchi & Jake Flomenberg Partner at Accel Partners Recorded: Feb 22 2018 61 mins
    Silicon valley venture capitalist Jake Flomenberg gets to see, track and make investments in the evolution of big picture technology trends across areas such as big data analytics, machine learning and artificial intelligence, and emerging modern data platforms and data types that are enabling organizations to be data and analytics-driven. Data driven companies make more effective information backed decisions and tend to significantly outcompete their peers operating on guesses and gut feel. Some companies are now even selling ‘data products’, for example aircraft engine manufacturers tracking and analyzing huge volumes of engine performance data to enable predictive maintenance, fixing things before failure to avoid costs and negative impact on customers.

    Jake will discuss trends he’s seeing related to the data analytics market, such as the growing need for self-service data discovery on very large volumes of data, analytics on streams of data, analytics on unstructured data, and contextual analytics embedded inside of software vendor and enterprise applications. He’ll discuss the characteristics of these markets, where he sees these markets going in the future, and why his firm chose to invest in a company like Zoomdata.

    Zoomdata CTO Ruhollah Farchtchi will then discuss industry trends he has forecast for 2018 including the eclipsing of relational databases by modern data platforms for doing analytics, how the cloud has changed the game for application development, and how working with streaming data is becoming the new normal. He’ll also discuss trends that are more specifically relevant to Zoomdata such as how to leverage the value of company’s investments in modern elastically scalable back-end data infrastructure and how to get corresponding value on the front-end, such as the ability to analyze and get insights from huge volumes of data, streaming data, and unstructured data types.
  • GDPR: Achieving Compliance and Secure Authentication with 2FA & Customer IAM
    GDPR: Achieving Compliance and Secure Authentication with 2FA & Customer IAM Alex Yakubov (Yubico), Jesper Johansson (Yubico), Baber Amin (Ping Identity) Recorded: Feb 22 2018 31 mins
    The General Data Protection Regulation (GDPR) comes into effect May 25, 2018, and it impacts organizations throughout the world who sell, market to, and even collect any personal data of EU citizens. It has far reaching operational and IT impacts. Critical to GDPR compliance are security, data-access governance, and transparency in the collection and use of personal data for EU citizens, including use-based consent, self-service personal data management, and data encryption in every state (at rest, in motion, in use).

    As organizations look for efficient ways to check the compliance boxes, article by article, it is important to note that compliance is only a step towards strengthening your engagement with customers and preserving their data privacy.

    One of the key components for GDPR compliance is the need for strong authentication and identity management. Join this webinar to learn about the Secure Authentication requirements of GDPR, how to meet those requirements, and strengthen security at the same time.

    In this webinar, Yubico and Ping Identity will discuss:
    ● How Customer Identity and Access Management (Customer IAM) solutions provide key capabilities that help meet GDPR requirements ‘out of the box’
    ● Architectural best practices of Customer IAM that make compliance more cost effective and efficient
    ● How organizations can turn the GDPR compliance challenge into an opportunity by providing a single, unified view of the customer, building trust, and enabling secure, seamless and personalized customer engagement

    Alex Yakubov, Senior Director - Ecosystem (Yubico)

    Jesper Johansson, Chief Security Architect (Yubico)
    Baber Amin, Market Leader, Cloud Security Services (Ping Identity)
  • Customer Support through Natural Language Processing and Machine Learning
    Customer Support through Natural Language Processing and Machine Learning Robin Marcenac, Sr. Managing Consultant, IBM, Ross Ackerman, Dir. Digital Support Strategy, NetApp, Alex McDonald, SNIA CSI Recorded: Feb 22 2018 60 mins
    Watson is a computer system capable of answering questions posed in natural language. Watson was named after IBM's first CEO, Thomas J. Watson. The computer system was specifically developed to answer questions on the quiz show Jeopardy! (where it beat its human competitors) and was then used in commercial applications, the first of which was helping with lung cancer treatment.

    NetApp is now using IBM Watson in Elio, a virtual support assistant that responds to queries in natural language. Elio is built using Watson’s cognitive computing capabilities. These enable Elio to analyze unstructured data by using natural language processing to understand grammar and context, understand complex questions, and evaluate all possible meanings to determine what is being asked. Elio then reasons and identifies the best answers to questions with help from experts who monitor the quality of answers and continue to train Elio on more subjects.

    Elio and Watson represent an innovative and novel use of large quantities of unstructured data to help solve problems, on average, four times faster than traditional methods. Join us at this webcast, where we’ll discuss:

    •The challenges of utilizing large quantities of valuable yet unstructured data
    •How Watson and Elio continuously learn as more data arrives, and navigates an ever growing volume of technical information
    •How Watson understands customer language and provides understandable responses

    Learn how these new and exciting technologies are changing the way we look at and interact with large volumes of traditionally hard-to-analyze data.
  • A Day in the Life of a GDPR Breach
    A Day in the Life of a GDPR Breach Jae Lee Product Marketing Director, Security Markets Recorded: Feb 22 2018 46 mins
    You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organization has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?

    Join this session to learn about the impact of GDPR and go through a breach investigation and response scenario as it would be after GDPR comes into effect in May 2018.

    What you will learn:
    - What breach response will look like under the GDPR
    - What tools and processes a data privacy officer will rely on in case of a breach
    - What departments and entities will be involved beyond IT
    - What activities are currently happening within organizations to prepare for the GDPR
    - What the consequences of the breach could be
  • Transformation of Business using Containers, Orchestration & Digital Initiatives
    Transformation of Business using Containers, Orchestration & Digital Initiatives Paul Nashawaty, Director of Product Marketing, DataCore Software Recorded: Feb 22 2018 39 mins
    Technological innovation is increasing and expanding at an exponential rate. In response, digital transformation has become an established objective for many enterprises, and the adoption of digital initiatives is now widespread. Docker, Kubernetes and other technologies related to containers are being leveraged to access and deploy systems of engagement. But before you go adding these technologies to your digital transformation road-map, you need to evaluate whether they're the best fit for your needs.

    In this webinar you'll discover how to:
    • Use containers for digital initiatives
    • Maintain the desired application state and manage persistent storage
    • Maximize your IT investments by leveraging existing infrastructure
    • Automate and integrate your infrastructure

    Containers are a solution to the problem of how to get software to run reliably when moved from one computing environment to another. Join us on this webinar to learn how DataCore provides data management and integrity across your infrastructure!
  • My Friend, My Enemy
    My Friend, My Enemy Erich Kron CISSP, Security Awareness Advocate Recorded: Feb 22 2018 31 mins
    It’s always nice to find a kindred spirit — someone who knows what you know and likes what you like. The problem today is that kindred spirit whom you think is your friend might well be your worst enemy. One of the most effective tools attackers use to breach everything from high-security networks and physical installations to your most closely held secrets is social engineering. This webinar looks at how social engineering works, why it works as well as it does, how to identify an attack and what to do if you think you’ve been compromised.
  • Expanding Language Learning with Projects
    Expanding Language Learning with Projects Melanie Rogers, Lead Trainer at Rosetta Stone Recorded: Feb 22 2018 58 mins
    Project Based Learning is a teaching method in which students gain knowledge and skills by working for an extended period of time to investigate and respond to a complex problem. Learn about ways to incorporate Rosetta Stone lessons into projects for your K - 12 classroom. We'll talk about both elementary and middle/high school project ideas and how to pull them together for a quarter or semester length language projects.

    Join us for our monthly K-12 webinar series, Trainer’s Corner. Each month we will share information and ideas to help schools and districts make the most of their language-learning implementations.
  • Benefits of a Cloud-First Approach for Modern Enterprises
    Benefits of a Cloud-First Approach for Modern Enterprises Todd Bernhard, Product Marketing Manager Recorded: Feb 22 2018 24 mins
    Is a cloud-first approach right for your organization? Cloud-first offers a leaner, more efficient, and more manageable approach to enterprise functionality than legacy architecture.

    In this webinar learn more about the benefits of having and cloud-first approach, and how it can positively impact your business.
  • Protecting your ATMs from Malware and Black Box Attacks
    Protecting your ATMs from Malware and Black Box Attacks NCR ATM Security Team Recorded: Feb 22 2018 38 mins
    ATMs continue to face risks and threats of jackpotting attacks. These attacks can be widespread and lead to significant losses. Recent announcements have highlighted new vulnerabilities in PC processing chips, as well as new organized criminal activities. Join experts from NCR Security for an informational and interactive webinar to learn more about these risks and the steps that you can take to proactively protect your ATMs.
  • Data Orchestration: Providing The “Single Source of Truth” On Your Customer
    Data Orchestration: Providing The “Single Source of Truth” On Your Customer Elizabeth Marshall, Sr. Solutions Consultant, Tealium Recorded: Feb 22 2018 30 mins
    Engaging with today’s modern audience along the linear customer journey we’re accustomed to isn’t keeping up with customer expectations. In today’s digital ecosystem, brands have more opportunities than ever before to communicate with their audience. But making sense of so much data, gleaning timely and relevant insights and becoming smarter about delivering personalized experiences at scale is difficult.

    So why is creating in-the-moment, cross-channel and cross-device experiences so hard? Data is fragmented and hard to integrate across all of the technologies savvy professionals use to communicate with their customers.

    Join this webinar to learn:

    - How integrating a data supply chain can help brands collect, transform, enrich and orchestrate their data
    - What data orchestration is and how your brand can start taking advantage of it
    - The key ways to create downstream, fully correlated data that is available in any format and any environment
    - Top solutions to data fragmentation and martech tool integration challenges
  • Technology Secrets to Complying with the GDPR
    Technology Secrets to Complying with the GDPR John Ambra, Vice President Risk Product Strategy, SAI Global and Anton Merk, Director Presales, SAI Global Recorded: Feb 22 2018 61 mins
    It’s no secret that we’re on the heels of the deadline to comply with the General Data Protection Regulation (GDPR)—May 25, 2018. And to help you meet the specific criteria, we’ve built a complete technology platform that’s designed to help you become GDPR compliant.

    So save a seat for our latest GDPR webinar on February 22 at 2:00pm EST and up your understanding of a comprehensive solution that will guide you towards compliance.
  • What GDPR Means for Your Security
    What GDPR Means for Your Security Adenike Cosgrove, Cyber Security Strategist at Proofpoint Recorded: Feb 22 2018 46 mins
    For many, GDPR is a challenging undertaking that requires new processes, technology, skills, and oversights. It demands new ways to design privacy that places the protection of EU citizen and resident data at its core.

    Join us as we discuss how organizations can meet the GDPR requirements and the security implications for your organization.

    Join us to hear how to:

    • Discover and classify personal data.
    • Protect all personal data by developing and implementing appropriate security controls.
    • Enhance security controls by monitoring, detecting, responding, and reporting on all policy violations and external threats.
  • Bigger, Faster, Connected and More Valuable: Where Data Is Going
    Bigger, Faster, Connected and More Valuable: Where Data Is Going Daniel Mintz, Chief Data Evangelist, Looker Recorded: Feb 22 2018 45 mins
    The world of data is changing at breakneck speed. Costs are dropping, speed is increasing, and centralization is getting easier. But getting more value from your data isn’t always easy. We’ll talk about the key trends in analytics and how to prepare your organization for this new world.

    Join this webinar and learn:

    - Which new analytic technologies and trends you need to be aware of and how they’ll impact your business;
    - How to use new technologies to actually empower business users to self-serve to answers and make better decisions using data in their day-to-day workflows
    - Pitfalls to avoid (and flashy technologies to ignore) when you’re planning your analytics strategy
  • GDPR: Brace for Impact or Not?
    GDPR: Brace for Impact or Not? Lance James | Mark Rasch | Martyn Hope | David Morris Recorded: Feb 22 2018 64 mins
    The GDPR compliance date is fastly approaching and many companies will not be compliant. What will this mean for them, what can they do over the remaining time left and what will the impact mean?

    Join this panel of world-class experts:

    Lance James: Chief Scientist at Flashpoint, internationally renowned Cybersecurity Specialist who has advised Boards and CISO’s at a wide range of government and F-500 organizations. Frequent lecturer and speaker.

    Mark Rasch: Chief Legal and Compliance Partner for Digital Risk Management & GDPR. Former Chief Security Evangelist for Verizon Enterprise Solutions, Chief Privacy Officer at SAIC and Led U.S. Department of Justice’s Cyber Crime Unit.

    Martyn Hope: Founder of the EU-GDPR Institute.

    In this session you will learn:
    - What will happen if I'm not Compliant by May 25, 2018
    - Where do I Begin to start my compliance effort
    - Who should I trust to advise me through my compliance program

    If you are a CISO, Board Member, Compliance Officer, Data Privacy Officer or anyone tasked with GDPR , this is a must see discussion of world-class panelists who are experts and have first hand knowledge and expereince.
  • Intend Based Networking im Datacenter
    Intend Based Networking im Datacenter Martin Schönbacher Axians, Martin Krejca Axians, Markus Kunstmann Cisco Feb 23 2018 9:00 am UTC 45 mins
    Applikationen sind die Stars im Rechenzentrum. Aber sie werden oft missverstanden. Ohne Applikationen würden wir das Rechenzentrum nicht aufbauen. Es ist die App selbst, die Infrastruktur- und Benutzerdaten für das Unternehmen relevant macht.
    Kennen Sie die Kommunikationsprofile Ihrer Applikationen?
    Wissen Sie wie sie Ihr Datacenter agil und mit höchstmöglicher Sicherheit und unter Einhaltung der Compliance Richtlinien betreiben?
    Was wäre, wenn Sie JEDEN FLUSS in Echtzeit analysieren und seine Eigenschaften und Details in einem Datenpool für weitere Analysen, Simulationen oder Compliance-Berichte speichern könnten? Was wäre, wenn Sie eine automatische Zuordnung von Applikationsabhängigkeiten erhalten könnten und damit die von einer Applikationstransaktion in Echtzeit zugewiesenen Ressourcen beschreiben könnten?
    Die Antwort auf die offenen Fragen ist: Cisco intend based Networking
    -Vorstellung Cisco intend based Networking
    -Livedemo Network Assurance & Tetration
    -Deployment Modelle by Axians
  • Nowy Data Domain 3300 Możliwości, skalowalność, dla kogo?
    Nowy Data Domain 3300 Możliwości, skalowalność, dla kogo? Daniel Olkowski, Dell EMC Feb 23 2018 9:00 am UTC 60 mins
    W tym miesiącu został ogłoszony nowy model Data Domain DD330.
    •Dla kogo jest przeznaczony?
    •Jakie środowiska zabezpiecza?
    •Jakie nowości wprowadza?
    Zapraszam na 30 minutową dyskusję gdzie powiemy o wszystkich szczegółach nowego DD3300.

    Piątek, 23 luty, 10:00, 30 minut.
    Całość informacji w trakcie porannej kawy!

    Daniel Olkowski
  • El tiempo corre: haga algo ahora mismo para hacer frente al RGPD
    El tiempo corre: haga algo ahora mismo para hacer frente al RGPD Ramses Gallego, Strategist Symantec Feb 23 2018 10:00 am UTC 60 mins
    Faltan pocos meses para que el nuevo RGPD entre en vigor, por lo que no hay tiempo que perder. ¿Sabe qué puede hacer desde ahora mismo para prepararse debidamente? Organizado p or los expertos de Symantec, el seminario web «90 días para el RGPD» incluye numerosos consejos y técnicas al respecto.

    Independientemente de la etapa de preparación en la que se encuentre su organización, este seminario web le ayudará a entender el nivel de preparación de su organización y, además, le ofrece pasos prácticos y ejecutables para cumplir con la fecha límite de mayo.

    No se la juegue e inscríbase ahora mismo.

    Pero antes de asistir al seminario web, si no lo ha hecho aún, sería muy útil que realizara la evaluación de preparación para el RDPG preparada por IDC. Esta le ayudará a determinar en qué etapa se encuentra su plan de preparaci ón para el RGPD.
    Realice la evaluación INSCRÍBASE YA
  • Could a buy-in or buy-out be right for your scheme?
    Could a buy-in or buy-out be right for your scheme? Gavin Markham, Partner and Head of Bulk Annuities and Chris Hawley, Associate - Barnett Waddingham Feb 23 2018 11:00 am UTC 60 mins
    Are bulk annuities a potential option for your scheme? It could be the right time to consider a transaction. Buy-ins can play an important role in any de-risking journey – offering an effective way of removing both financial and demographic risks.
  • Die Uhr tickt: stellen Sie die Weichen für eine erfolgreiche DSGVO - Umsetzung
    Die Uhr tickt: stellen Sie die Weichen für eine erfolgreiche DSGVO - Umsetzung Symantec, Alexander Peters Feb 23 2018 12:00 pm UTC 60 mins
    Handeln Sie jetzt – und stellen Sie die Weichen für eine erfolgreiche DSGVO - Umsetzung

    Verlieren Sie keine Zeit – die DSGVO kommt schon in einigen Monaten. Aber wie können Sie sich aktiv darauf vorbereiten? Im Webinar
    ‘Noch 90 Tage bis zur DSGVO’ geben Ihnen die Symantec Experten v iele praxisnahe Tipps für die Umsetzung.

    Ganz egal, wie weit Sie mit Ihrer Vorbereitung heute sind: Im Webinar erfahren Sie, wo Sie aktuell stehen, und erhalten rechtzeitig vor dem Stichtag im Mai klare, handlungsrelevante Tipps.

    Gehen Sie kein Risiko ein – melden Sie sich noch heute an.

    Vor der Teilnahme am Webinar sollten Sie, wenn es noch nicht gesche hen ist, auch das GDPR Readiness Assessment von IDC
    absolvieren. Es hilft Ihnen einzuschätzen, wie weit Ihre Vorbereitung vorangeschritten ist.

    Zum Assessment •http://symantecgdpr.idcready.net/de/?utm=aI638CIsFU

  • LIVE demo - Safely Enable SaaS Applications with Aperture
    LIVE demo - Safely Enable SaaS Applications with Aperture Omar Amarin, Systems Engineer Feb 23 2018 2:00 pm UTC 45 mins
    The adoption of SaaS applications continues to grow at an exponential pace. You do not want to clamp down on these applications because they are valuable tools for many of your employees. However, because the data and usage of these SaaS applications is invisible to IT administrators, they do expose your organization to potentially disastrous security and data theft risks.

    Join us for a live webinar where you will learn how your organization can enable safe usage of SaaS applications and:

    •Gain visibility and granular, context-based control of SaaS applications.
    •Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
    •Protect against new insertion and distribution points for malware.
    •Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.

    The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable their use.
  • Il tempo scorre: agisci ora per accelerare il tuo viaggio verso il GDPR
    Il tempo scorre: agisci ora per accelerare il tuo viaggio verso il GDPR Giampiero Nanni Feb 23 2018 2:00 pm UTC 60 mins
    Mancano pochi mesi alla scadenza del GDPR, e non c’è tempo da perdere. Che cosa puoi fare, praticamente, in questo momento per prepararti al meglio? Organizzato dagli esperti in sicurezza Symantec, il webinar “90 giorni al GDPR” è ricco di suggerimenti e consigli essenziali.

    A prescindere dal tuo livello di preparazione, questo webinar ti aiuterà a capire la tua posizione, offrendoti consigli pratici e concreti da attuare prima della scadenza di maggio.

    Non affidarti al caso: registrati ora.

    Se non lo hai già fatto, prima di seguire il webinar completa il modulo di valutazione d el tuo stato di preparazione al GDPR (GDPR Readiness Assessment) di IDC: ti permetterà di capire a che punto sei nella tua pianificazione per realizzare la compliance al GDPR.

    Completa la valutazione >>
  • How to Hire and Test for Data Skills: A One-Size-Fits-All Interview Kit
    How to Hire and Test for Data Skills: A One-Size-Fits-All Interview Kit Tanya Cashorali, Data Scientist and Entrepreneur, TCB Analytics and Jack Phillips, IIA Co-Founder and CEO Feb 23 2018 5:00 pm UTC 60 mins
    Given the recent demand for data analytics and data science skills, adequately testing and qualifying candidates can be a daunting task. Interviewing hundreds of individuals of varying experience and skill levels requires a standardized approach. In this webinar, Tanya Cashorali explores strategies, best practices, and deceptively simple interviewing techniques for data analytics and data science candidates.
  • How to Build IoT solutions Quickly & Easily
    How to Build IoT solutions Quickly & Easily Olivier Bloch, Sr. Program Manager for Microsoft Azure IoT Feb 23 2018 6:00 pm UTC 75 mins
    Are you interested in building innovative IoT solutions to help your company improve efficiencies or create new revenue opportunities – but not sure where to start?

    Whether you’re an app developer, cloud developer or just looking for your next moonlighting project, come learn about the nuts and bolts of Azure IoT development from the experts.

    In this webinar, presented by Olivier Bloch, Sr. Program Manager for Azure IoT at Microsoft, you will learn:

    - How to get started using Azure IoT Hub, IoT Starter Kits and SDKs.
    - How to connect your first devices to Azure IoT Hub.
    - How to manage devices at scale with IoT Hub device management.
  • Supply Chain Resiliency
    Supply Chain Resiliency Arghajit Adhicary, Global BCM Manager - Unisy Feb 24 2018 4:30 am UTC 60 mins
    Businesses are increasingly becoming more reliant on third parties for critical products and services. The factors are multi-fold : increased customer demand, time criticality, stringent service levels, evolving regulatory landscapes, technological advancements, mergers and acquisitions, diversification of risks, etc. With increasing dependencies on third parties, organizations become susceptible to major service disruptions owing to lack of supplier resilience; thus, running into risks such as loss of revenues, regulatory breaches, service level misses and eventually, loss of customer confidence. Supply Chain Resiliency is the key to sustained business model and must be integrated within the resilience or business continuity framework of organizations.

    This session will reflect upon a few key trends, levers, risks, regulatory requirements and overview of building third party business continuity assessment process.
  • Data Protector zum Wochenstart: DP 10 New GUI and Consolidated Scheduler
    Data Protector zum Wochenstart: DP 10 New GUI and Consolidated Scheduler Claus Nöske, Presales Consultant Data Protection, Micro Focus Feb 26 2018 8:00 am UTC 90 mins
    In den Webinaren „Data Protector zum Wochenstart“ wird Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vorstellen.

    Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb. Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.

    In diesem Webinar möchten wir noch detaillierter auf die neue Benutzeroberfläche eingehen. Dabei zeigen wir die verschiedenen Ansichten und Funktionen von Dashboard und Consolidated Scheduler. Hier ist es nun in Zukunft möglich, die Backup Jobs neben der Weboberfläche auch über ein Command Line Interface oder die REST API zu verwalten.
  • Systematic searching in Embase: using PICO to identify relevant results
    Systematic searching in Embase: using PICO to identify relevant results Xuanyan Xu Feb 26 2018 3:00 pm UTC 60 mins
    Join us for a practical webinar on searching the medical literature to answer clinical questions, with a focus on PICO Search Strategies.

    The PICO (Patient, Intervention, Comparator/Control, Outcome) process is a technique used in evidence-based practice to frame and answer a clinical question. The PICO framework is also used to develop literature search strategies.

    In this webinar, Embase solution marketing manager Xuanyan Xu will discuss:

    - The basics of systematic review and guideline making
    - The concepts that form a PICO search strategy
    - How to use PICO search form in Embase to build effective searches

    About Embase
    Embase is a highly versatile, multipurpose and up-to-date biomedical database. It covers the most important international biomedical literature from 1947 to the present day and all articles are indexed in depth using Elsevier's Life Science thesaurus Embase Indexing and Emtree®. The entire database is also conveniently available on multiple platforms.

    Ready to take the next step? Get started with this introductory webinar.
  • Introducing Narrow High Factor Intensity Indices
    Introducing Narrow High Factor Intensity Indices Eric Shirbini, PhD, is Global Research and Investment Solutions Director with ERI Scientific Beta Feb 26 2018 4:00 pm UTC 60 mins
    Scientific Beta has produced a series of single narrow high factor intensity indices. These narrow smart factor indices have strong exposure to the desired factor tilt but are nevertheless well diversified through the application of a multi-strategy weighting scheme, thus remaining consistent with the Smart Beta 2.0 approach developed by EDHEC-Risk Institute and ERI Scientific Beta. These indices provide more pronounced factor exposure at the single factor level and can possibly be used in custom allocation solutions, notably in the case of factor overlay, because these indices:
    - Significantly strengthen the allocation of the overall portfolio to the selected risk factor through the strong exposure to this factor
    - Avoid altering the exposures to the other rewarded factors and preserve a very good level of factor intensity through the presence of a high factor intensity filter
  • Before you choose Microsoft – 5 Things to Check in an Access Management solution
    Before you choose Microsoft – 5 Things to Check in an Access Management solution Mor Ahuvia, Authentication Product Marketing at Gemalto Feb 26 2018 4:00 pm UTC 60 mins
    Organizations with Microsoft environments, such as Azure or Office 365, are inclined to implement Microsoft’s native access management solutions (namely, Azure AD and AD FS). Defaulting to Microsoft’s cloud SSO solutions may appear to be the best choice, a closer examination of these solutions reveals critical downsides, as well.

    Join this webinar to learn the five things to consider before implementing Microsoft’s access management solutions. You will also see a demo of how you can centrally define access management policies (including cloud SSO and step-up authentication) for Microsoft and 3rd party apps with a vendor agnostic-solution.
  • IR Magazine Webinar – Preparing your investors for revenue recognition
    IR Magazine Webinar – Preparing your investors for revenue recognition IR Magazine and Intelligize Feb 26 2018 4:00 pm UTC 60 mins
    Monday, February 26, 2018
    8.00 am PST / 11.00 am EST / 4.00 pm GMT / 5.00 pm CET
    Duration: 30 minutes

    Many US companies are grappling with FASB’s changes to reporting revenue. These changes have a knock-on effect for the analysts who cover you as internal models need to be updated and revenue needs to be recalculated.

    At Microsoft, the IR and accounting teams recognized the risks of the revenue recognition changes early. By starting early, they were able to address investor and analyst concerns, provide dedicated resources around revenue recognition, and clearly inform their investors and analysts of what the changes meant for them. The teams were recently presented with the Pacesetters of the Year award for excellence in financial reporting. Join this webinar for practical tips on navigating this accounting change and how you, as IR professionals, can keep your investors updated.

    Speakers include:

    • Ben Ashwell, digital editor, IR Magazine
    • Kristin Chester, senior financial manager of investor relations, Microsoft
    • Stacy Harrington, director of corporate revenue assurance, Microsoft

    Short, sharp and packed with expert insight, this webinar will get you up to speed on these critical issues in just 30 minutes. Sign up to BrightTALK to view this essential briefing and be informed of future webinars produced by IR Magazine.
  • Tu consumidor está cambiando. Lo que los mexicanos buscan en alimentos y bebidas
    Tu consumidor está cambiando. Lo que los mexicanos buscan en alimentos y bebidas Rodolfo Garza de Ingredion México Feb 26 2018 4:00 pm UTC 45 mins
    Rodolfo Garza, Gerente de Innovación en Ingredion México, hablará sobre la conferencia TU CONSUMIDOR ESTÄ CAMBIANDO con insights e información valiosa del estudio que realizamos con consumidores mexicanos acerca de su percepción en productos saludables impartida durante The MEXICAN Healthy Product Summit 2018.
  • Prevent Sophisticated Threats to Financial Services - Protect Your Endpoints
    Prevent Sophisticated Threats to Financial Services - Protect Your Endpoints Lawrence Chin, Financial Services Security Architect & Joel Boyd, Director of Endpoint Protection Feb 26 2018 5:00 pm UTC 60 mins
    It’s clear that targeted and zero day attacks aren’t going away any time soon. So what do these attacks have in common?

    Endpoints were compromised.

    In fact, according to a 2017 analysis of financial services attacks by our threat research team Unit 42, 96% of cyberattacks were delivered by email in the financial services industry.

    Register for our webinar and learn:
    •How cyberattackers bypassed legacy security solutions in recent attacks
    •What you can do to reliably reduce the risk of successful attacks
    •How to prevent unknown threats from compromising your systems, even unpatched ones
  • A Silver Bullet for Zero-day and Ransomware Attacks
    A Silver Bullet for Zero-day and Ransomware Attacks Jason Rose, Senior Security Consultant Feb 26 2018 6:00 pm UTC 60 mins
    How to address the unknown of Zero-day threats and cryptoware variants.

    Anti-virus and anti-malware has a fundamental flaw that’s becoming more and more obvious: it needs a catalog of all the malicious software in the world in order to work effectively. Building this catalog is an impossible task; new exploits (“zero-day exploits”) are created every day and often go undetected for months at a time. The gap between the release and the discovery of malicious software is where the real threat to your organization lies. DriveLock addresses this gap with application whitelisting, and with DriveLock Smart AppGuard, maintaining that whitelist is easier than ever before.

    Anti-virus and anti-malware software is fundamentally flawed. A time lag will always exist between release of an exploit and its discovery; that time lag can mean your systems are vulnerable to that exploit for weeks or even months at a time.

    Application whitelisting addresses this flaw by taking the opposite approach of anti-malware: instead of providing a list of software the system is NOT allowed to run, it provides a list of software it IS allowed to run. Zero-day exploits never even have a chance to run because they aren’t on the approved list of software.

    By using a cryptographic hash function to positively identify software files, attackers can’t impersonate an entry on the whitelist. File name, file location, and file owner whitelist rules can all be easily circumvented.

    With DriveLock’s Smart AppGuard, the work that goes into maintaining an application whitelist database is effectively cut to zero. Enjoy the security of application whitelisting without the headaches of whitelist database maintenance.
  • Ransomware Hostage Rescue Guide
    Ransomware Hostage Rescue Guide Erich Kron CISSP, Security Awareness Advocate Feb 26 2018 7:00 pm UTC 60 mins
    2017 was a Ransomware nightmare. If you've been in the IT trenches over the past year, you've probably noticed that ransomware attacks are accelerating, damages are more severe and there is no end in sight for 2018

    Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4 for the webinar “Ransomware Hostage Rescue Guide”. We will look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and advise what to do when you are hit with ransomware.

    Erich will cover these topics:

    * What are new scary ransomware features in the wild?
    * I’m infected, now what?
    * Proven methods of protecting your organization
    * Why the “human firewall” is so effective
  • Bridging the Gap Between Sales and Marketing
    Bridging the Gap Between Sales and Marketing Alice Heiman and Liz Heiman Feb 26 2018 9:00 pm UTC 45 mins
    We have all seen just how devastating the results can be when sales and marketing teams aren't aligned. In this webinar, Alice and Liz will share their secrets about how aligning sales and marketing will better engage your customers at critical junctures in the buyer journey and will boost sales and marketing results.

    Sales, Marketing, Sales Enablement, Buyer's Journey, Sales Cycle, Customers
  • The 5 Essentials of Every Next-Gen SOC
    The 5 Essentials of Every Next-Gen SOC Peter Sparkes, Senior Director, Cyber Security Services, Symantec Feb 27 2018 5:00 am UTC 60 mins
    Every cybersecurity organisation is challenged with enabling the fast pace and nuances of their business strategy. Security measures must quickly keep up and be an enabler while continuing to mitigate the risks of a breach occurring.

    New technology adoption and expanded attack surfaces, evasive cyber threats, and limited budget and staffing resources make this challenging – there’s a lot to stay on top of.

    How does your Security Operations Center (SOC) keep up?

    Join us to learn how to scale and extend the capabilities of your SOC.

    We’ll review topics such as:

    - Automated security event analysis

    - Human security event analysis and prioritisation

    - Threat visibility across key on-premise and cloud control points

    - Consumption of technical and strategic threat intelligence

    - Proactive threat hunting and incident response

    Register Today
  • 한국인 저자를 위한 팁: 원고의 명료성를 높이는 방법
    한국인 저자를 위한 팁: 원고의 명료성를 높이는 방법 Jieun Hani Kim Feb 27 2018 5:30 am UTC 75 mins
    This webinar which will be delivered in Korean.

    You will understand why ESL authors fail to write clearly and coherently in English. The contents of the webinar are tailored to the Korean audience, explaining key differences between Korean and English and common misconceptions in technical writing that lead to poor readability and clarity when authors write scientific manuscripts. We will explain through examples how you can increase clarity at various levels of the text.