Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Gobierno de aplicaciones para infraestructuras inteligentes
    Gobierno de aplicaciones para infraestructuras inteligentes
    Nutanix Recorded: Aug 6 2020 20 mins
    Entrevista Gartner: Gobierno de aplicaciones para infraestructuras inteligentes
  • La Infraestructura Inteligente para la Plataforma Data to Everything
    La Infraestructura Inteligente para la Plataforma Data to Everything
    Nutanix Recorded: Aug 6 2020 20 mins
    Nutanix + Splunk: La Infraestructura Inteligente para la Plataforma Data to Everything
  • Prácticas de ciberseguridad a nivel financiero, entrevista con Arturo García
    Prácticas de ciberseguridad a nivel financiero, entrevista con Arturo García
    Arturo García Hernández | Autor y experto en ciberseguridad Recorded: Aug 6 2020 78 mins
    En esta entrevista, Arturo compartirá su visión de mejores prácticas a nivel financiero para prevenir ciberataques.

    “Todos los comentarios y opiniones son personales por lo que no representan a las instituciones donde labora”
  • Search Term Families: Creating, Searching, Browsing, and Driving Analytics
    Search Term Families: Creating, Searching, Browsing, and Driving Analytics
    Neal Carter Recorded: Aug 6 2020 60 mins
    Come join us for a session on all about search term families! We’ll set up a search term family together, see how it speeds up our review in conjunction with list, browse, and map, and use Nuix Discover’s analytics tool for data analysis with search terms.
  • Virtualización de escritorios y aplicaciones en el sector financiero
    Virtualización de escritorios y aplicaciones en el sector financiero
    Nutanix Recorded: Aug 6 2020 42 mins
    Customer experience: Virtualización de escritorios y aplicaciones en el sector financiero
  • Secrets of Scopus: Investigating Keywords with Rebecca
    Secrets of Scopus: Investigating Keywords with Rebecca
    Rebecca Gaudreau Recorded: Aug 6 2020 29 mins
    Join this session to discover the history of keywords, where they come from, and how you can use them during your search session with Scopus.
  • Level Up Your Reporting Capabilities with Jamf
    Level Up Your Reporting Capabilities with Jamf
    Sam Weiss, Kyle Pazandak Recorded: Aug 6 2020 14 mins
    Managing your Apple environment with Jamf produces a lot of data that can be very useful, especially when utilized for security, compliance and forecasting. Are you ready to realize the full capability of reporting with Jamf?

    In our webinar, Level Up Your Reporting Capabilities with Jamf, we'll cover the basic reporting functionalities within Jamf solutions and explore advanced integrations with popular reporting tools.

    We'll cover:
    - The questions you can answer with data
    - In-product reporting functionality
    - Integrations with tools like Splunk, Power BI and Numerics
    - How to leverage the Jamf Pro Log Stream
  • Misconfiguration in Containers Deployment and Kubernetes: Risks and Fixes
    Misconfiguration in Containers Deployment and Kubernetes: Risks and Fixes
    Zohar Kaufman, VP R&D and Ariel Shuper, VP Product Portshift.io Recorded: Aug 6 2020 58 mins
    Human error remains a persistent cause of the majority of container security incidents. According to Gartner, 95% of cloud security failures are rooted in mistakes made by users. As your application workloads become more distributed and run in containers managed by Kubernetes, the risk of a misconfigured component exposing you to a security incident grows.
    In today’s DevOps driven, application development environment, configuration management must be as automated and streamlined as possible for it to be effective. It should be comprehensive, covering not just the pods deployments, but also the Kubernetes objects (e.g. ConfigMap) and settings (Roles, Roles bindning, Security Context, Secrets etc.)

    Join our session to learn about configuration management best practices and how to avoid the common misconfiguration pitfalls of containers and Kubernetes.
    On our Talk Session, Ariel Shuper and Zohar Kaufnam will discuss -
    * Kubernetes RBAC misconfiguration, detection and mitigation
    * Secrets management best practices
    * Security Context and Pod Security Policies
    * Automated policies generations with Developers manifests
    * Network policies - The good, the bad and the ugly
    * Kubernetes APIs protection
  • Evaluating & Measuring DDoS Risk during a COVID 19 Era
    Evaluating & Measuring DDoS Risk during a COVID 19 Era
    Dennis Birchard, Principal Lead Cloud Security Architect at Akamai Recorded: Aug 6 2020 41 mins
    A DDoS attack could be a ruse to distract your focus from other key processes, such as fraudulent transactions, or outright destruction of data. "At Alliant we wanted the brains behind DDoS mitigation and that's what Prolexic gives us." said Bill Podborny, Chief Security Officer, Alliant Credit Union.

    The number of DDoS attacks instantly mitigated via the Prolexic platform has increased exponentially over the past four years. Akamai mitigates DDoS attacks against its Prolexic platform via proactive mitigation controls, in 0 seconds and with no customer impact. But, what about DDoS attacks in the COVID-19 era?

    Join Dennis Birchard, Akamai’s Principal Cloud Security Architect, to learn more about:

    •Recent DDoS Attack Trends Q1-2020
    •How does Prolexic protect Akamai customers and why does it matter
    •Mitigation Strategies re: Proactive vs Reactive controls
    •Work from home and how our customers have changed their risk
    •How to interpret DDoS industry mitigation SLAs
  • Defeat BOT Attacks with New Silverline Shape Defense Managed Service
    Defeat BOT Attacks with New Silverline Shape Defense Managed Service
    Brian Uffelman, Sr Manager Product Marketing, Shape Security, a F5 Company | Luke Lehman, Product Mgr, F5 Silverline Recorded: Aug 6 2020 48 mins
    Today’s applications have become the fabric of our economies and our lives. Applications are how value is exchanged and where the most sensitive data is stored. And that’s precisely why applications have become the focal point for cybercriminals, who target your applications for financial fraud and abuse.

    In this webinar, learn how Silverline Shape Defense – the newest solution in F5’s Silverline managed services portfolio – protects your web apps from bots and other automated attacks by delivering continuous protection, even when attackers retool.

    We will discuss tactics to help you:

    - Slash losses due to fraud and abuse Deliver better application performance and uptime

    - Achieve measurable cost savings for hosting and bandwidth costs

    - Prevent sophisticated attacks including those on the OWASP Automated Threats to Web Applications list

    - Detect and mitigate vulnerability exploits and denial-of-service attacks

    Register Today
  • Reimagining the Workplace: Laying the Foundation for the Future
    Reimagining the Workplace: Laying the Foundation for the Future
    Calvin Yoa, Calvin Hariman and Jordan Jimenez Recorded: Aug 6 2020 59 mins
    Traditionally, the corporate office space was built to suit a 9-5 workday from Monday to Friday. However, the new generation and the global pandemic has forced the corporate office to change overnight. During this webinar, we will explore the history and evolution of the office, current technology deployed to help, and organizational, cultural, and personal factors that define the make up of the future workplace.

    We will discuss four core principles (flexibility, safety, security, and value) that will serve as the foundation for a platform for the future workplace.
  • Accelerate Digital Transformation through people, process & technology
    Accelerate Digital Transformation through people, process & technology
    Mike Kelly, CIO, Red Hat | Brendan McErlain, VP, Product Portfolio Marketing, Red Hat | Kent Norton, CTO, Omnitracs Recorded: Aug 6 2020 19 mins
    Digital transformation is no longer optional. Every organization knows it must become a digital leader to survive and thrive. Organizations must build and deliver exciting new software applications while also continuously innovating and adapting to stay ahead of the never-ending onslaught of digital data, experiences, and channels.

    Many new software or IT projects still fail because technology alone does not solve digital transformation. It doesn’t address the fundamental issues that block or drive transformational success, and the most critical dependency—the people. During this keynote, Red Hat CIO, Mike Kelly; VP of Product Marketing, Brendan McErlain; and CTO of Omnitracs, Kent Norton will reveal the elements of digital transformation that technology can’t resolve and why people and processes are critical to our success.
  • Dell EMC PowerStore: Hardware Overview
    Dell EMC PowerStore: Hardware Overview
    Dell Technologies Recorded: Aug 6 2020 18 mins
    PowerStore is designed to take advantage of the performance and economics of the next wave of storage media. At its core, PowerStore is a highly optimized I/O stack with inline data services including deduplication, compression, as well as QOS. With the advantage of integrated data protection, the flexibility to scale-up/down and scale-out, PowerStore delivers industry leading economics and simplicity, with predictable performance as a result.
  • CARES ACT Mortgage Forbearance:  Automation Fast-Forward
    CARES ACT Mortgage Forbearance: Automation Fast-Forward
    Richard Olivieri - Lateetud VP Solutions and Professional Services, Bruce Mazza Blue Prism - VP, Technology Alliances Program Recorded: Aug 6 2020 58 mins
    With over 4.14M loans in active forbearance representing 7.8% of all active mortgages and over $900B in unpaid capital, mortgage servicers are shifting from pipeline of new forbearance requests to managing a new wave of forbearance extensions and post-forbearance workouts. Millions of customer touch points will be required to support the modifications and decisions that are to follow in the next 12 months.

    Is your organization fully prepared with Intelligent Automation capabilities to help end-clients navigate repayment plans, deferrals, or loan modifications automatically?

    Blue Prism, in partnership with Lateetud helps banks and lenders quickly assist customers experiencing financial hardship and in need of mortgage forbearance. Together, we automate the entire end-to-end process, from receiving a request and confirming qualification to executing forbearance and engaging the customer in post forbearance activity—all while adhering to bank policies and federal guidelines.
    1. Process in minutes, not hours. Reduce service costs, eliminate strain on resources
    2. Better serve customers with an intuitive, seamless experience through web portal, chatbot or call center IVR/
    3. Build & deploy quickly and easily, improving outcomes and quality of service
    4. Maintain strict compliance with federal guidelines and bank policies
    Join this webinar to learn more about how you can gain an Intelligent Automation advantage.
  • How to Move From Disruptive to Productive Digital Transformation
    How to Move From Disruptive to Productive Digital Transformation
    Dave Landa, Kintone CEO Recorded: Aug 6 2020 28 mins
    The democratizing forces of no-code software development and citizen developers are turning disruptive Digital Transformation into productive Digital Execution. In this webinar by Kintone’s CEO Dave Landa, learn how citizen developers and new mode IT teams together are revolutionizing agile software development, deployment and iteration from the ground up.
  • Straight from the Lab: SaltStack innovations showcase
    Straight from the Lab: SaltStack innovations showcase
    Thomas Hatch, SaltStack Co-Founder and CTO Recorded: Aug 6 2020 56 mins
    The SaltStack labs team have been hard at work cooking up some incredible new innovations to help IT, security and devops teams tackle the challenges facing them today—and we want to share some of the best with you!

    Join SaltStack Co-Founder and CTO, Thomas Hatch, as he takes us through powerful new features and innovations from the brightest minds at SaltStack and throughout the Salt community.

    Topics include:
    - A million minions: Reaching absurd levels of scale with SaltStack
    - Salt and Azure are now an Idem: Optimizing Azure Cloud management with Idem
    - POP culture: Plugging in to the most powerful plugin-oriented dev platform
    - Phenomenal cosmic power, itty bitty living space: Deploying Salt in a single binary
  • Yeti or Not.....SSL is Here to Stay!
    Yeti or Not.....SSL is Here to Stay!
    Adam​ Barber Presidio, Peter Scheffler F5, Orlando Santiago Jr,F5 Recorded: Aug 6 2020 42 mins
    Presidio, and F5 will present on a combined solution for enhancing the security you already have with your Firepower and WSA deployments by providing enhanced SSL offload with F5’s SSL Orchestrator solution. The Webcast will cover use cases, advantages, and additional benefits that you can realize with the deployment of SSL Orchestrator in your network environment.
  • End-to-End Visibility and Control for your Kubernetes Clusters
    End-to-End Visibility and Control for your Kubernetes Clusters
    Rod Moore, Cloud Domain Architect, Red Hat Recorded: Aug 6 2020 49 mins
    In today's open hybrid datacenter, Applications are moving from a monolithic to a cloud-native approach that leverages Kubernetes. These modern applications may have components that span multiple clusters and multiple cloud providers. In addition, new clusters are being added for specific purposes like edge deployments and reduced latency. This "Cluster Sprawl" introduces several new management issues. For example;

    How can I manage the lifecycle of multiple clusters regardless of where they reside (on-premise or across public clouds) using a single control plane?

    How do I get a simplified understanding of my cluster health and the impact it may have on my application availability?

    In this webinar, you'll learn to address these management concerns and numerous others with Red Hat Advanced Cluster Management for Kubernetes. It offers end-to-end management visibility and control to manage your cluster and application life cycle, along with security and compliance of your entire Kubernetes domain across multiple datacenters and public clouds.

    About the speaker:
    Roderick Moore is a Cloud Domain Architect on Red Hat's North American Public Sector team. He covers the products that comprise Red Hat's management portfolio. His more than 25 years of helping customers choose and implement enterprise management software makes him a valued resource when discussing the management needs of today's open hybrid environments.
  • Five Ways to Revolutionize Business Models Through Microsoft Azure Cloud
    Five Ways to Revolutionize Business Models Through Microsoft Azure Cloud
    Steve Moritz, Chief Digital Officer & Eric Leonard, Microsoft Practice Lead & Don Bilbrey, Senior Solution Architect Recorded: Aug 6 2020 60 mins
    If you think the “cloud” is solely a technical strategy to cut IT costs, then you are wrong. Attend this webinar and learn how organizations (maybe your competitors) are leveraging Azure to thrive.

    About this Webinar
    Unprecedented and uncertain times call for senior leaders to find near-term and practical ways to optimize business processes, expand revenue sources, and implement digital innovation.

    Organizations can’t survive by only cutting costs, reducing headcount, and shuttering operations. Yes, it is practical and achievable to enhance business operations through the migration and expansion of Azure Cloud Services.

    While many leaders may think that the cloud is an effective way to quickly eliminate fixed costs for infrastructure, we will illuminate how top line, customer engagement, and product expansion can be achievable outcomes as well. This webinar will be of interest to the C-Level Executives who want to hear real-life examples of how Microsoft Azure Cloud has supported tangible business transformation.

    As a business or technology leader, you will gain meaningful knowledge and tangible ideas as we thoroughly review these case studies (and others) of how Azure Cloud Services has been used by a:

    - Health Care firm to design and deliver new services to an expanded geographic market, with lower costs and higher margins to drive an increase is product revenue of 18%

    - Global Telecommunications company to leverage Azure Artificial Intelligence and Machine Learning to implement a customer attrition proactive strategy that cut attrition by 15%

    - A security analytics business migrated an on-premise implementation of its technology to Azure to enable a Security Analytics as a Service business model, greatly increasing total addressable market, value proposition and revenue

    Webinar attendees will also gain insights on an approach for defining a roadmap for Azure transformation, from business ideation through technical architecture design and migration.
  • From GLM to GBM: The Future of AI in Lending and Insurance
    From GLM to GBM: The Future of AI in Lending and Insurance
    Patrick Hall, Advisory Consultant at H2O.ai and Michael Proksch, Senior Director, Customer Data Science at H2O.ai Recorded: Aug 6 2020 62 mins
    Insurance and credit lending are highly regulated industries that have relied heavily on mathematical modeling for decades. In order to provide explainable results for their models, data scientists and statisticians in both industries relied heavily on generalized linear models (GLMs). However, new machine learning algorithms like GBMs are not only more sophisticated estimators of risk, but due to a Nobel-laureate breakthrough known as Shapley values, they are now seemingly just as interpretable as traditional GLMs. More nuanced risk estimation means less payouts and write-offs for policy and credit issuers, but it also means a broader group of customers can participate in mainstream insurance and credit markets.

    In this webinar, you will learn about:
    - The Advantages of Machine Learning vs. Linear Models
    - Why you should think about the AI shift in perspective
    - How to move to new ML Methods (e.g. GBM)

    Presenters:
    Patrick Hall, Advisory Consultant at H2O.ai
    Michael Proksch, Senior Director, Customer Data Science at H2O.ai
  • New Research to Elevate and Transform Employee Engagement Efforts
    New Research to Elevate and Transform Employee Engagement Efforts
    Erica Carranza, Ph.D. VP of Consumer Psychology Chadwick Martin Bailey & Christina Zurek Insights & Strategy Leader ITA Recorded: Aug 6 2020 51 mins
    Enriching compensation packages is an effective but expensive way to engage individual employees, and as recent research has revealed, many of the most common employee wellness and engagement initiatives are not yielding their promised impact. What are these initiatives missing?

    Join us to learn more about the results of a landmark study that seeks to answer this question by uncovering what engagement initiatives must accomplish for employees—on a psychological level—to be effective.

    Using scientific insight into human motivation and advanced analytic techniques, we will share several key findings from our research, including:
    • How tapping into five critical psychological benefits can provide a framework for true, sustainable engagement
    • Why wellness and other popular programs aren’t delivering on the promise of employee engagement—and where organizations must focus instead
    • How organizations can determine the right combination of initiatives to deliver the key psychological benefits that ultimately drive talent retention
  • The Vulnerability Report: 1
    The Vulnerability Report: 1
    Ortal Keizman, Vulcan Cyber research team lead; Yonatan Amitay, Vulcan Cyber security engineer Recorded: Aug 6 2020 18 mins
    Join members of the Vulcan Cyber research team on this episode of The Vulnerability Report webcast series for unique insights into the latest infrastructure and application vulnerabilities threatening your digital business.

    We promise we won't just read the CVE to you. Instead we run the research and do the work to provide you with useful tips, tricks, best solutions and remedies for the vulnerabilities that matter. We're focused on vulnerability remediation...not just vulnerability management. Together we can get fix done to secure IT.

    On this episode we will dive into the SIGRed and BootHole vulnerabilities for starters, and provide the best remedies and solutions for each.
  • Encryption at the speed of life: Securing the future of Instant Card Issuance
    Encryption at the speed of life: Securing the future of Instant Card Issuance
    Andy Cease: Marketing Manager Financial Solutions, EDC & Juan Asenjo: Director Product Solution & Partner Marketing, EDC Recorded: Aug 6 2020 53 mins
    Whether you’re issuing a credit or debit card instantly in a branch or centrally from a bureau, the security of the end-to-end solution is of utmost importance. Processing sensitive, personally identifiable financial data requires encryption – and the technology that underpins this cryptography depends on hardware security modules (HSMs). Entrust Datacard and nCipher have teamed up to create the built-for-purpose nShield Issuance HSM that is optimized for the increasingly complex needs of payment technology. As the industry evolved from Magstripe to EMV chip to dual-interface contactless, the card security paradigms continues to evolve. Having the right crypto engine ensures you can keep pace with evolving needs.

    • What are the security threats faced by the evolving card issuance technologies
    • Why a certified HSM root of trust is required to secure card issuance software
    • How to ensure instant gratification for your customers’ card issuance demand
  • JOB SEARCH WORKSHOP: "How to Have Certainty in Uncertainty"
    JOB SEARCH WORKSHOP: "How to Have Certainty in Uncertainty"
    Laureen Kautt & Mary Mack Recorded: Aug 6 2020 61 mins
    LegalTech Recruiter Laureen Kautt is joined by EDRM's CEO Mary Mack introducing the first in a series of workshops designed to help the global community seeking employment in a pandemic. New tools and a shift in mindset are needed to navigate the changing currents.
  • Identification of Approaches to Simulated Leachable Studies
    Identification of Approaches to Simulated Leachable Studies
    Jason Creasey, Managing Director at Maven E&L and Karen Pieters, Ir. Team Leader E&L at Nelson Labs Europe Aug 7 2020 4:30 am UTC 80 mins
    Full Title: Identification of Approaches to Simulated Leachable Studies: What are They? When to do Them?

    Presented by Jason Creasey, Managing Director at Maven E&L Ltd. Followed by an Industry Perspective presentation presented by Karen Pieters, Ir. Team Leader Extractables and Leachables at Nelson Labs Europe

    The term “Simulated leachable studies” is open to interpretation. I hope to provide a definition of this term and in doing so suggest when they can and should be used. The general aim of such studies is to provide an accurate qualitative and quantitative description of the substances which might be present as leachables in a pharmaceutical drug product (DP) derived from container closure system (and sometimes its manufacturing process) when the drug product is stored up to and including its shelf-life. Simulated studies provide an alternative to analysis of leachables directly in the drug product. A simulated study aims to avoid some of the downfalls of leachable analysis such as; inaccurate analysis of leachables due to interference from drug product and/or formulation elements, availability of stored DP samples, reaching required limits of detection in the DP and time / resource constraints associated with complex method development using DP.
    Simulated leachable studies must be able to accurately simulate the expected leachables in a DP and should be carefully crafted to achieve this. The system used for extraction must have similar propensity to leach from materials under study a drug product and care must be taken not to use system which either leach too much (potentially masking other substance) or too little.
  • Increasing efficiency & compliance with security policy automation
    Increasing efficiency & compliance with security policy automation
    Henry Pea, Director, Security Engineering (APAC) and Gary Gardiner, Head of Security Engineering (APJ) Aug 7 2020 5:30 am UTC 75 mins
    Consolidating all aspects of your security environment to enable seamless security management is never easy task. Tufin compliments Check Point’s vision through comprehensive visibility and automation as the key drivers to enforcing a unified security policy across the organization and enabling agile delivery of innovations, allowing customers all over the world to remove impediments for digital innovation via consolidation.

    Join us in this webinar to review common use cases of enhanced security and compliance, and learn how you can:
    • Reduce attack surface for malicious attack through comprehensive visibility and reduction of misconfigurations on your network devices
    • Expedite and expand your Check Point deployments by reducing misconfiguration errors as well as efficient change management
    • Deliver continuous and pro-active compliance through interactive unified security policy matrix and effective ‘what-if’ analysis
    • Ace your audits through detail records of business reasoning as well as identification of authorized and unauthorized changes

    If you're unable to attend this live webinar, you may still register to receive a link after the webinar to watch the session on-demand any time.
  • Securing Your Collaboration Technology On Microsoft
    Securing Your Collaboration Technology On Microsoft
    Tenh Shiao Peng Regional Senior Cloud Economics Consultant Microsoft & Matthew Heap Head of Solution Architecture, Rackspace Aug 7 2020 8:00 am UTC 45 mins
    The COVID-19 pandemic has created a perfect storm of security risks for enterprises. The volume of possible attack surfaces has multiplied as a larger remote workforce means more possible entry points for cybercriminals.

    The opportunity to target that workforce has increased exponentially, too. Out of necessity, many workers are utilizing technology that has been rapidly rolled out or scaled from solutions designed for in-house use, all in the interest of preserving organizational productivity.

    So what are the processes and mindsets enterprises should adopt to stay secure during this exceptionally challenging time?

    Join this webinar to learn how Rackspace and Microsoft can help you improve your security posture and manage risks:

    1. Find out the biggest security concerns and challenges facing companies today
    2. How to maintain a tight security posture while implementing Microsoft Teams for your WFH strategy
    3. How you can ensure business continuity, by helping employees work remotely without feeling isolated
    4. Learn how you can optimize your cloud security and address any security challenges via expert custom recommendations.

    Securing your IT environment to run your business is of utmost importance.

    By joining this webinar, we will show you how you can gain insights into your current security posture and develop a fact and risk-based action plan to keep the IT your systems and business safe.
  • Integrated cyber defence system – with EDR at the core
    Integrated cyber defence system – with EDR at the core
    Mark Olding and Lee Rendell Aug 7 2020 9:00 am UTC 60 mins
    Our industry and customer acclaimed cybersecurity technologies – with EDR at the core – empower you to defend your organisation effectively against evasive attacks – with no extra effort from your team.

    This webinar will provide an overview of our tightly integrated proactive cyber defence system, armed with the following technologies:
    • Kaspersky EDR Optimum plugs any gaps left by Endpoint Protection, empowering you to achieve true cyber-immunity in a world where simple anti-malware solutions are no longer enough.
    • Kaspersky Sandbox is a vital addition to Kaspersky Endpoint Security for Business that automatically blocks complex threats without the need for additional resources.
    • Kaspersky Endpoint Protection for Business, which won a 2019 Gartner Peer Insights Customers’ Choice for Endpoint Protection Platforms (with the largest share of customer reviews), and scored 100% for fileless threat protection in a recent test by AV-Test
    Award-winning endpoint protection, automated Sandbox and a unified cloud console, work alongside EDR to aggressively defend your IT estate. If you’re looking for a provider of EDR, you can be confident that Kaspersky has been awarded in April 2020 the Gartner Peer Insights ‘Voice of the Customer’: Endpoint Detection and Response Solutions, coming first or equal first (from 16 shortlisted vendors) across ALL categories.

    Minimize the risks to tomorrow’s business growth today.
  • The hottest cyber threats of July, deconstructed
    The hottest cyber threats of July, deconstructed
    Anthony Grenga, VP Cyber Operations, Peter Rydzynski, Detection Research Engineer & Oliver Wai, VP Product Marketing Aug 7 2020 12:00 pm UTC 45 mins
    Between Russian COVID-19 vaccine hacking, Valak and Maze ransomware, and the Twitter hack, July gave threat hunters and cyber enthusiasts a lot to talk about. Join two members of IronNet’s elite SOC, VP of Cyber Operations Anthony Grenga and Detection Research Engineer Peter Rydzynski, along with Oliver Wai, VP of product marketing, for a fast-paced deep-dive into why these events matter, and what IronNet saw in customer environments over the month of July.
  • Capital markets: Making the ecosystem tick
    Capital markets: Making the ecosystem tick
    Tom Eckett, Deputy Editor, ETF Stream Aug 7 2020 3:00 pm UTC 55 mins
    The ETF wrapper passed another stress test during the coronavirus turmoil with capital markets teams playing a crucial role in keeping ETF spreads narrow and ensuring authorised participants continued to make markets.

    Structural issues in the secondary market remain however. Fragmentation problems in Europe continue to be a headache for the ecosystem while investors are crying out for a consolidated tape to be brought to market.

    This live discussion will take a closer look at the steps being taken to improve market structure and ensure ETFs trade as efficiently as possible.
  • Giving your SDRs Superpowers with Virtual SDR Technology
    Giving your SDRs Superpowers with Virtual SDR Technology
    Aaron Bollinger Aug 7 2020 3:00 pm UTC 20 mins
    SDRs who qualify opportunities for the your business are already heroes. Learn how technology can make them Superheroes!

    Aaron Bollinger, CRO of Kronologic and experienced sales leader, will share a framework for upgrading your team and process, based on real-life examples and client success stories.
  • UL certifications: where, what, why, how
    UL certifications: where, what, why, how
    Jeremy Sexton/Jim Moore Aug 7 2020 5:00 pm UTC 75 mins
    Jeremy Sexton, Director of Engineering at Apeks Supercritical and his counterpart Jim Moore at Delta Separations, discuss UL certifications: what's involved, how to get it, where we are in the process, and more!
  • Elastically Scaling Kafka Using Confluent
    Elastically Scaling Kafka Using Confluent
    Josh Rosenberg, Group Product Marketing, Confluent + Ricardo Ferreira, Developer Advocate, Confluent Aug 7 2020 5:00 pm UTC 60 mins
    The number of mission-critical apps and the amount of data underpinning them has grown exponentially in the increasingly digital world - with no sign of slowing down. But rigid data architectures slow organizations down, forcing them to spend too much up front on resources they don’t use, and causing lag or downtime across their apps. In today’s hypercompetitive digital world where customer loyalty connects with the best performing applications, every millisecond delay could be another lost customer.

    Adjusting to the real-time needs of your mission-critical apps is only possible with an architecture that scales elastically. Confluent re-engineered Apache Kafka into an elastically scalable, next-gen event streaming platform that processes real-time data wherever it lives - making it accessible for any budget or use case.

    Register now to learn how to:
    -Quickly deploy Kafka in Confluent Cloud with just a few clicks and elastically scale your workloads
    -Effortlessly connect your critical data sources and sinks to Kafka to build a complete data pipeline for your real-time apps
    -Easily process streaming data with a simple interactive SQL interface using fully-managed KSQL
    -Accelerate the deployment of standardized, self-managed Kafka clusters as cloud-native systems on Kubernetes to achieve elastic scale with Confluent Platform
  • Digital transformation in 2020: Change the game the open source way
    Digital transformation in 2020: Change the game the open source way
    Kris Pennella, Director and Mike Walker, Senior Director and Global Lead, Red Hat Open Innovation Labs Aug 7 2020 6:00 pm UTC 31 mins
    Digital transformation is no longer an option. Every organization knows it must become a digital leader to survive. Successful digital transformation is not just about changing technology, it’s also about changing the way organizations work together. In this session, Mike Walker, Senior Director and Global Lead, Red Hat Open Innovation Labs, and Kris Pennella, Director, Red Hat Open Innovation Labs weave in real world customer examples of transformative efforts. They’ll examine how companies are changing the game based on their ways of working, focusing on changing processes and the future of their organizations.
  • Develop Voice Enabled Apps: Revolutionizing App UX with the Alan Platform
    Develop Voice Enabled Apps: Revolutionizing App UX with the Alan Platform
    James Shelburne, Sr. Product Manager, Ujjwal Krishnamurthi, Software Engineer Aug 7 2020 9:30 pm UTC 39 mins
    If you’re an app developer, you know mobile app users have frustrating experiences -- screen sizes are small, dropdowns and other UX elements are hard to navigate and require the user to learn and get used to. Touch and type is impossible to use while on the go. Graphical User Interfaces have reached their limits.

    Join us May 26th and learn how you can revolutionize your app UX with the Alan Voice AI Platform. With Alan, you have everything you need to Build, Debug, and Integrate a powerful voice interface into your applications. Once Integrated, Alan provides deep insights with logs and analytics so you can Iterate quickly to bring users an amazing experience.

    We'll show you prime use cases for voice and give a step-by-step guide on how you can add a voice interface to an existing iOS application.

    Hear from leaders in Voice Application Development and learn how voice interfaces will play a significant role in enhancing the quality of our interactions with computers and transform every global industry.
  • Provide the best value for the customer with offer management
    Provide the best value for the customer with offer management
    Sadhana Nandakumar, Specialist Solutions Architect at Red Hat Aug 10 2020 1:00 am UTC 13 mins
    Session 4 of 4-part series:

    During this demo, you’ll see how businesses can use open source technology to react to streaming events and data, integrating AI/ML models and decisioning to improve customer retention with compelling, relevant offers.

    About the series:
    By using open source technologies and event-driven architectures, you’ll be able to innovate faster, offer greater competitive differentiation, and gain improved digital customer engagement. Join Red Hat for a 4-part, self-paced workshop on how to modernize customer engagement.
  • High-Resolution Characterization of Structure, Interaction, and Miscibility
    High-Resolution Characterization of Structure, Interaction, and Miscibility
    Eric Munson, Professor and Head at Purdue University Aug 10 2020 4:30 am UTC 59 mins
    Full Title: High-Resolution Characterization of Structure, Interaction, and Miscibility of Drug Products

    The local interactions between a drug and its surrounding environment is critical in both small and large molecule formulations. For small molecules, the drug-polymer interaction is needed to ensure that the drug does not crystallize in an amorphous solid dispersion. For proteins, phase separation in lyophilized formulations will lead to reduced stability and the potential for aggregation. In this presentation, the ability to probe these local structures and interactions in both small and large molecule systems will be shown. Case studies will be presented that demonstrate how structural properties (e.g. degrees of interaction, changes in conformation) can impact functional properties such as crystallization and aggregation.

    Eric Munson of Purdue University

    Eric Munson, Ph.D., is currently Professor and Head of the Department of Industrial and Physical Pharmacy at Purdue University. He received his B.A. degree from Augustana College in Sioux Falls, South Dakota, in 1987. After studying one year in Munich, Germany, on a Fulbright Fellowship, he received his Ph.D. in 1993 from Texas A&M University, and was a postdoctoral fellow at the University of California, Berkeley in 1994. He was in the Chemistry Department at the University of Minnesota before moving in 2001 to the Pharmaceutical Chemistry Department at the University of Kansas, to the Pharmaceutical Sciences Department at the University of Kentucky in 2010, where he was the Patrick DeLuca Endowed Professor in Pharmaceutical Technology. In 2018 he moved to Purdue University to become Professor and Head of the department. His research program is focused on the characterization of pharmaceutical solids using a variety of analytical techniques, with an emphasis on solid-state NMR spectroscopy. Dr. Munson is a coinventor on three patents and has published more than 100 research, review, and book chapters.
  • SASE Summit: Stepping up to SASE
    SASE Summit: Stepping up to SASE
    Dr. Chris Boorman, VP, Marketing, EMEA & APAC, Forcepoint & Dave Barnett, Dir Edge Protection Solutions, Forcepoint Aug 10 2020 7:00 am UTC 20 mins
    In this webinar we kick-off our Secure Access Service Edge (SASE) Summit; a virtual event for cybersecurity professionals who are interested in learning how to implement a true SASE architecture.

    Join Dr. Chris Boorman, Vice-President of International Marketing and Dave Barnett, Director of Edge Protection solutions, as they discuss this revolutionary approach to securing the cloud and preview the 5 Sessions that will give you a blueprint for SASE success:

    Step 1: Connectivity in a Borderless World - The New Edge
    Step 2: Secure Access for a Remote Work Environment
    Step 3: Data Protection in a Multi-Cloud Environment
    Step 4: Becoming More Risk Aware by Understanding User Behavior
    Step 5: Blueprint for SASE Success
  • SASE Cybersummit : En avant pour SASE avec Forcepoint DEP
    SASE Cybersummit : En avant pour SASE avec Forcepoint DEP
    Nicolas Fischbach, Global CTO, Forcepoint & Florent Fortune, VP and GM, Network and Edge Protection, Forcepoint Aug 10 2020 7:00 am UTC 20 mins
    En avant-première et en français, Nicolas Fischbach, CTO de Forcepoint et Florent Fortune, VP Network et Cloud, vous proposent un aperçu privilégié de la route vers SASE (Secure Access Service Edge) qui sera présentée lors du SASE Cybersummit du 11 aout.

    Les deux experts feront un point sur la convergence des solutions réseau et sécurité dans le cloud et évoqueront le programme de la classe d’été virtuelle à l’intention des professionnels de la cybersécurité, déclinée en une série de sessions en langue anglaise :

    - Keynote par le CEO de Forcepoint
    - Les étapes clés pour réussir la démarche SASE

    1 - Le nouveau périmètre
    2 – Le travail à distance
    3 – La protection des données en mode multicloud
    4 – L’analyse comportementale
    5 – Réussir son architecture SASE, avec Nico Popp, CPO
  • SASE Summit: Ihr Erfolg mit SASE
    SASE Summit: Ihr Erfolg mit SASE
    Nicolas Fischbach, Global CTO, Forcepoint & Frank Limberger, Data and Insider Threat Specialist, Forcepoint Aug 10 2020 7:00 am UTC 17 mins
    Dieser Webcast ist der Start zu unserem EMEA SASE Summit. Sie bekommen einen Überblick was SASE ist, welche 5 Schritte für ein erfolgreiches SASE Projekt notwendig sind und wie wir die aktuelle Situation im DACH-Markt sehen.

    Verpassen Sie nicht wenn Nico Fischbach, Global CTO Forcepoint und Frank Limberger, Data and Insider Threat Specialist, Forcepoint diesen neuen Ansatz zur Sicherung der Cloud besprechen und einen Ausblick auf die 5 Webinare geben:

    Step 1: Connectivity in a Borderless World - The New Edge
    Step 2: Secure Access for a Remote Work Environment
    Step 3: Data Protection in a Multi-Cloud Environment
    Step 4: Becoming More Risk Aware by Understanding User Behavior
    Step 5: Blueprint for SASE Success
  • פגוש את העיתונות!
    פגוש את העיתונות!
    Amitai Ziv, Yotam Gutman Aug 10 2020 8:00 am UTC 30 mins
    אנחנו מארחים את אמיתי זיו מדהמרקר, לשיחה על עיתונות טק וכלכלית בארץ
    אמיתי זיו, כתב ועורך טק בדהמרקר, יספר לנו אילו סיפורים מעניינים את העיתונות פה בארץ, איך לדבר עם עיתונאים, וגם מה לא לעשות עם המדיה
  • Ask the Experts - News Hour - Infrastructure Modernisation
    Ask the Experts - News Hour - Infrastructure Modernisation
    Jaret Chiles, Jason Gates,Wesley Mauer, Michael Wind and Himanshu Rao Aug 10 2020 9:00 am UTC 39 mins
    Join us on Thursday, July 23 at 11:30 a.m. CDT for a live, one-hour Ask the Experts News Hour, “Modernising Your Infrastructure for the New Normal.” Hear from technology leaders from Rackspace Technology and Microsoft and discover how to:

    • Ensure security, scalability and pay-for-what-you-use flexibility
    • Satisfy your organisation’s cloud-first or digital transformation initiatives
    • Cut costs by up to 40% with technologies like SAP on Azure

    Rackspace Technology and Microsoft are here to help you leverage technology to solve today’s toughest challenges.

    Speakers:
    - Jaret Chiles, Senior Director, Strategic Services & Enablement, Rackspace Technology (Moderator)
    - Jason Gates, Senior Director, Private Cloud & Colo Sales, Rackspace Technology
    - Wesley Mauer, Senior Solution Architect, Rackspace Technology
    - Michael Wind, Solution Architect, Specialty Domain, Rackspace Technology
    - Himanshu Rao, Sr. Cloud Solution Architect, Microsoft
  • Lifetime Mortgages - Strategies for realising untapped wealth
    Lifetime Mortgages - Strategies for realising untapped wealth
    Malcolm Tyrrell, Retirement and Later Life Specialist, Just Aug 10 2020 10:00 am UTC 90 mins
    With a growing demand for equity release, lifetime mortgages remain a useful tool in your kit when finding practical solutions for clients over the age of 55. It is no longer a ‘last resort’ solution, but part of a client’s assets that should be included within a holistic approach. There are a number of myths around lifetime mortgages that consumers need to be educated about and, as with many financial decisions, this area requires careful consideration. Clients should be handled with sensitivity and any vulnerabilities should be identified and taken into account in line with the FCA’s guidance in this area.

    The Regulator has recently reviewed Equity Release advice and issued some clear guidelines. For most advisors in this market these guidelines can be ‘ticked off’ but this will be a useful opportunity to ensure your firm is fully aware of your obligations when recommending equity release products.

    If approached in the right way, Lifetime Mortgages can be a particularly rewarding area in which to advise HNW clients. There are many tax planning opportunities and possibilities for professional, qualified financial intermediaries in the equity release space. In this session, Just will cover:

    • The drivers for growth in the ER market
    • The alternative options and FCA advice guidelines
    • Why Equity Release is suitable for HNW clients
    • Changing attitudes
    • Responsible lending initiatives
    • The impact of underwriting

    Speaker bio
    Malcolm Tyrrell is a Retirement and Later Life Specialist at Just. Malcolm shares his knowledge of the retirement and later life markets with intermediaries through the delivery of high quality presentations and workshops.

    He has over 39 years’ experience in financial services, both with a number of major providers and in his own IFA practice. Since 1990 Malcolm has specialised in training and business development.
  • Digital Transformation: The inside track for Insurance
    Digital Transformation: The inside track for Insurance
    Jesper Frederiksen, VP & General Manager, EMEA at Okta & David McClelland Aug 10 2020 10:00 am UTC 26 mins
    At a time when the insurance industry has seen unprecedented consolidation, what are the smartest steps to digitally transform and remain competitive? How can you deliver productivity, connectivity and security fast, to outrun your legacy competitors and keep up with the innovative newcomers?

    In this Inner Circle conversation, we explore how to put your business on the inside digital transformation track with Jesper Frederiksen, VP & General Manager for EMEA at Okta.
  • T. Rowe Price @ 2: What next for Japan? (CPD accredited)
    T. Rowe Price @ 2: What next for Japan? (CPD accredited)
    Daniel Hurley Aug 10 2020 1:00 pm UTC 60 mins
    We are delighted to introduce the next edition of our CPD-endorsed fortnightly webinar series: T. Rowe Price @ 2.

    Dan Hurley, Portfolio Specialist, will assess some commonly-held perceptions on the Japanese equity market. Unloved by many, loved by some, Japan has been playing catch-up with G8 peers for some time now. Despite these developments, the opportunity set is far from uniform. Find out what to consider when investing in Japan.

    Attending this event will qualify you for 45 minutes of structured CPD.

    We hope you can join us.
  • Connect test webinar
    Connect test webinar
    Chris (PLD) & Sabrina (CII) Aug 10 2020 2:00 pm UTC 60 mins
    Connect test webinar
  • Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework
    Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework
    CyberProof's CEO, Tony Velleca and VP of Security Strategy, Bruce Roton Aug 10 2020 5:00 pm UTC 45 mins
    In this webinar CyberProof CEO, Tony Velleca and VP of Security Strategy, Bruce Roton, will shed light on how and why CyberProof uses this framework for better threat detection mapping, and how companies can benefit from implementing it into their cyber security strategy.
  • How Apache Kafka® Works
    How Apache Kafka® Works
    Michael Bingham, Technical Trainer, Confluent Aug 10 2020 8:00 pm UTC 62 mins
    Pick up best practices for developing applications that use Apache Kafka, beginning with a high level code overview for a basic producer and consumer. From there we’ll cover strategies for building powerful stream processing applications, including high availability through replication, data retention policies, producer design and producer guarantees.

    We’ll delve into the details of delivery guarantees, including exactly-once semantics, partition strategies and consumer group rebalances. The talk will finish with a discussion of compacted topics, troubleshooting strategies and a security overview.

    This session is part 3 of 4 in our Fundamentals for Apache Kafka series.