Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Digital Workplace Transformation with Virtual Desktops Digital Workplace Transformation with Virtual Desktops Seshu Venkata, Global Practice Head for VirtuaDesk, Wipro; Mike Brennan, Cisco, Venugopal Tadepalli, Wipro Live 60 mins
    Virtual Desktop Infrastructure or Digital Workspace solutions enable businesses to easily secure and share applications and data for a collaborative and mobile workforce. It helps to implement quickly business decisions that extend, modernize or replace application portfolios, support branch office expansion and create a business activity-based virtual workplace. Wipro's in depth knowledge of various industries and experience in delivering infrastructure solutions combined with Cisco’s industry leading servers and network hardware technology deliver a futuristic desktop or application as a service offering with this new technology.

    Through this live webinar, Wipro and Cisco aim to provide industry executives with key insights and recommendations to build a winning digital business strategy. Join this interactive 1 hour webinar where technology experts from Wipro and Cisco will help you understand:

    1) Virtual Desktop Infrastructure and its unique features like Self-Service portal, Storage boost technology, workload flexibility and intelligent image management

    2) Role of this industry leading technology in delivering unparalleled end user experience.

    3) Virtual Desktop Infrastructure's role in an organization's digital transformation through real life examples of a leading UK based energy supplier and a global software company
  • Securing Hyperconverged Infrastructure Securing Hyperconverged Infrastructure Rohit Goyal, Nutanix Security PMM Live 60 mins
    Security in the modern datacenter requires an evolved mindset and approach. In this technical webinar, Nutanix will provide deep insight into the latest security advancements engineered into the Nutanix enterprise cloud platform, and explain how these advancements can be leveraged to build the most secure environments for your applications and data. Join this webinar to learn security best practices and ask questions relevant to your organization.

    Nutanix offers defense in depth by embracing a security-first approach to platform design and development. The Nutanix enterprise cloud platform combines powerful features, including two-factor authentication and data at rest encryption, with a Security Development Lifecycle that is integrated into product development to help customers meet the most stringent security requirements. The Nutanix solution is certified across a broad set of evaluation programs to ensure compliance with the strictest standards.
  • The Goldilocks Budget: Best practices for developing your “just right” budget The Goldilocks Budget: Best practices for developing your “just right” budget Jeff Epstein, Operating Partner, Bessemer Venture Partners Live 45 mins
    Getting to a budget that is “just right” for the needs of your organization can prove a painstaking and daunting task. Yet by following a proven approach developed by Jeff Epstein and Byron Deeter of Bessemer Venture Partners, you can establish a transformative budgeting practice that enhances communication and collaboration, better informs planning, and can even help drive growth.

    In this Webinar, you will learn how to:

    Motivate your teams to perform and achieve at their highest levels.
    Invest resources in the highest priority projects.
    Protect the company if things go wrong or unforeseen challenges arise.
  • Accelerate Your Analytics Pipeline with Self-Service Data Prep Accelerate Your Analytics Pipeline with Self-Service Data Prep Scott Holden, CMO, ThoughtSpot; Joe Abbott, Technical Product Marketing, ThoughtSpot Live 60 mins
    Join us as we discuss new self-service data prep strategies that will address these challenges. We will take a deep dive into ThoughtSpot’s technology stack and show how within one analytics platform it is possible to simplify and automate the entire analytics pipeline—from data connections to data prep, and then using a simple search interface for analysis. We will also share how customers have used ThoughtSpot to streamline these operations and accelerate time to insight for their business users.
  • Practical Approaches to Interactive Data Discovery & Predictive Analytics Practical Approaches to Interactive Data Discovery & Predictive Analytics Wayne Thompson, Chief Data Scientist SAS & Tapan Patel, Product Marketing Manager SAS Live 75 mins
    Successful data science and analytics projects should focus on the explanation and delivery of business impact – this requires strong collaboration between business analysts and data scientists. Preparing rich representative data is important, but data discovery and predictive analytics are equally valuable – they enable team members to quickly evaluate which events are drivers or inhibitors of success, and to predict future outcomes. Throughout the course of a project, how can business analysts stay focused on the most important details? How can data scientists prototype and operationalize models in a quick, productive, and easy-to-use manner?

    In this webcast, we will use SAS Visual Analytics and SAS Visual Statistics to teach you how to:

    • Quickly identify predictive drivers
    • Discover outliers by using interactive tools
    • Use drag-and-drop features to build predictive models
    • Simultaneously build models and process results for each group or segment of data
    • Visually explore your predictive outputs or values
    • Compare your models and apply them to new data
  • Attain PCI Compliance without AV Attain PCI Compliance without AV Michael Moshiri Director, Advanced Endpoint Protection Live 60 mins
    Many PCI-compliant organizations continue to deploy traditional AV -- not because of its superior security capabilities, but because they wrongly assume it’s required to remain PCI compliant. Join us for this webinar to learn how to achieve and maintain PCI compliance while replacing traditional AV with superior security capabilities, specifically:

    •Which PCI requirements prescribe the use of traditional AV
    •How auditors and Qualified Security Assessors (QSA)s interpret those requirements today
    •How Palo Alto Networks customers replace traditional AV with real prevention -- while maintaining PCI compliance
  • Best Practices to Integrate Referrals into Sales Best Practices to Integrate Referrals into Sales Trisha Winter, CMO and Ben Michael, Lead Software Architect Live 45 mins
    As presented at Dreamforce 2016: Referral marketing is becoming a standard part of the lead generation mix. For companies with sales teams, this means enabling sales to play a key role and that includes making it easy for them to obtain and track referrals in Salesforce. This session will showcase how 3 companies have successfully integrated referral programs into their sales teams and explains the integration with Salesforce that allows them to drive high quality leads at scale.
  • Digital Information Management Beyond the FinTech Era Webcast | Dell EMC Digital Information Management Beyond the FinTech Era Webcast | Dell EMC Craig Focardi, CEB Analyst & Patrick McGrath, Senior Manager Product marketing Recorded: Oct 25 2016 60 mins
    Watch this CEB and DELL EMC Webcast, and learn how digital content management is helping financial institutions respond to digital transformation.
  • Is your Integration Architecture Future Ready & Optimized for Digital Business? Is your Integration Architecture Future Ready & Optimized for Digital Business? Tarak Kudumu and Saurabh Sharma (Ovum) Recorded: Oct 25 2016 61 mins
    Is your integration architecture optimized for a digital enterprise?

    The integration landscape is changing — fast. As technologies, products and services, customer expectations and deployment models continue to evolve, IT and integration leaders look to digital transformation to meet the requirements of today’s digital business. You’re under increased pressure to speed up, scale and distribute enterprise integration capabilities just to keep up. The question “Is your integration architecture future ready and optimized for digital business?” has never been more relevant than now.
    Join us for an informative webinar where, Saurabh Sharma, senior analyst - middleware Ovum, will share unique insights into the technological advances in integration architecture, converging business models and strategies for integrating disparate application environments, and digital channels into existing enterprise IT set up. He’ll be joined by Tarak Kudumu, director, Enterprise Business Integration, Dell Services, to discuss the key characteristics of a future-ready integration architecture and how Dell Services’ Enterprise Business Integration offerings and engagement models can help you transform your integration landscape to be future ready.

    By the end of this webinar, you will:
    • Discover the rapid advancements in the field of enterprise business integration
    • Rethink ways to improve and better integrate your application environments
    • Learn more about Dell Services’ comprehensive enterprise integration service offerings
  • Automating Security and License Compliance in Agile DevOps Environments Automating Security and License Compliance in Agile DevOps Environments Utsav Sanghani Product Manager Integrations, Partnerships & On-Demand, Black Duck Recorded: Oct 25 2016 41 mins
    Yes, it’s possible to automate open source security and license compliance processes and maintain DevOps agility. In this webinar, Product Manager Utsav Sanghani will demonstrate how Black Duck Hub plugs into Jenkins to address open source license compliance and security risks as part of an overall release process. He will cover:
    - Automating and managing open source security as part of the SDLC
    - Defining and implementing custom policies that prevent potential open source risks
    - Issue management and remediation workflow, with ideas on how going left translates into greater savings
  • What Exactly is 3D Printing, Where it Makes Sense, and Where it Doesn't What Exactly is 3D Printing, Where it Makes Sense, and Where it Doesn't Jim Snodgrass, Technical Training Manager, Cimquest Recorded: Oct 25 2016 60 mins
    Coverage of how additive manufacturing processes work and what that means in terms of where the technology should or should not be applied. This will also overview how the technology has been used over the past 30 years, how it came into the limelight recently and why some may think the industry is waning. The goal of this segment is to create a realistic depiction of the state of the industry.? Day 1 class sponsored by Stratasys.
  • Virtualize Any App & Efficiently Manage Your Infrastructure with Intelligent Ops Virtualize Any App & Efficiently Manage Your Infrastructure with Intelligent Ops Hicham Mourad – Sr. Technical Marketing Manager, VMware; Martin Yip – Product Line Marketing Manager, VMware Recorded: Oct 25 2016 75 mins
    The more apps that benefit from server virtualization, the better. But when they’re mobile or big data apps, can you still guarantee performance and do it cost-effectively? It’s not easy when siloed operations and disparate management tools get in the way.

    As your virtualized infrastructure grows, vSphere with Operations Management can help. Its advanced hypervisor technologies support new app requirements, while minimizing operational complexity and cost.

    •Virtualize any app with confidence and make better decisions on workload placement.
    •Automate operational intelligence and gain consistency in management.
    •Reduce waste in overprovisioning and reduce the costs of compliance across VMs.

    Don’t miss it! This technical deep-dive will show you how to keep up with performance and high availability for all your cloud-based, business-critical (SaaS), and mobile apps.
  • Latest developments in the global private placement market Latest developments in the global private placement market Scott Ashton, Morrison & Foerster; Brian Bates, Morrison & Foerster; Tarun Sakhrani, Barclays Recorded: Oct 25 2016 90 mins
    The cross-border private placement market has continued to grow, providing non-US issuers with an opportunity to raise capital from US and European financial institutions. This market, which has seen incredibly robust activity this past year, has continued to attract issuers across a myriad of industries and from multiple worldwide jurisdictions. These issuers seek to, among other things, diversify their funding sources or supplement their bank lending, lengthen their existing debt profile, refinance acquisition debt or finance certain single-asset projects. In this webinar, speakers will discuss:

    •The global private placement market and recent trends;
    •Market participants;
    •Documentation requirements for traditional and structured transactions;
    •Financial covenants, "MFLs" and model form provisions;
    •New Issuers using the market (social housing trusts, universities, investment trusts, etc);
    •Marketing process with Agented and "direct" Private Placements; and
    •Ratings and the NAIC.
  • Yacktman US Equity Fund Q3 2016 Webcast Yacktman US Equity Fund Q3 2016 Webcast Jason Subotky Recorded: Oct 25 2016 27 mins
    Join us for our quarter-end strategy update webcast. Engage with portfolio managers to learn about what drove third-quarter performance, the portfolio manager's outlook, and current portfolio positioning.
  • Driving adoption of Commercial Analytic solutions Driving adoption of Commercial Analytic solutions Dominic Tyer Recorded: Oct 25 2016 50 mins
    Commercial analytic solutions are becoming more and more common within the Pharma industry. Companies are spending millions implementing tools which are aimed at helping users identify opportunities to improve the bottom line, segment customers, track multichannel campaign success and meet a myriad of other objectives. Despite all the 'perceived' value these tools can add, they remain largely unused. Excuses for the lack of adoption are varied but can generally be classified into one of three areas - they are either too complex, it isn't convenient to use or it just doesn't deliver on the value promised. These issues are compounded by the fact that they are generally only identified when the solution has been deployed and expected to be used. By ensuring that these issues are addressed at all stages during the development and not just when adoption targets are not being met, commercial analytic solutions can be exploited to attain the anticipated value and more.
  • Responsible Big Data Architectures in Financial Services Responsible Big Data Architectures in Financial Services Chris Smith, Privitar & Vamsi Chemitiganti, Hortonworks Recorded: Oct 25 2016 62 mins
    With the advent of Big Data platforms, Banking & Financial Services companies are building applications that create massive business value. However, the datasets being used often contain significant amounts of confidential, proprietary and highly sensitive data and so the potential benefits are held back by privacy concerns.

    In this joint webinar, Hortonworks and Privitar will draw on their experience of delivering technology which enables data innovation whilst ensuring compliance and risk mitigation across a range of use cases within Financial Services. With a review of the benefits of Hortonworks' Data Platforms and an introduction to Privitar's privacy preserving technology solution.
  • JPM Global Income Fund JPM Global Income Fund Michael Schoenhaut Recorded: Oct 25 2016 42 mins
    Please join Michael Schoenhaut, Portfolio Manager in the Multi Asset Solutions team, for a review of the strategy, current positioning and the outlook.

    The Global Income strategy aims to exploit income opportunities from across the full range of asset classes, across the capital structure and to provide global diversification in both developed and emerging markets. It pursues a flexible allocation strategy to access the most attractive risk adjusted yield and invests in a broad range of opportunities to ensure income is distributed efficiently to meet the needs of yield-orientated investors.

    Don't miss this opportunity to put forward your questions.

    Featured fund: JPMorgan Investment Funds – Global Income Fund

    If you prefer to listen over the telephone please use the appropriate dial in details from the numbers below.

    Password: 45841

    United Kingdom Local Call: +44 (0) 844 581 9089
    Austria: +43 (0) 2 68220 56552
    Belgium: +32 (0) 2 789 8603
    Denmark: +45 3271 4573
    Finland: +358 9 2319 5437
    France: +33 (0) 1 7037 7166
    Germany: +49 (0) 69 7104 45598
    Hungary: +36 (06) 1 700 8142
    Ireland: +1 800 930 488
    Italy: +39 02 36269665
    Netherlands: 0207948426
    Norway: 21563318
    Poland: +48 22 397 9053
    Portugal: +351 3 0880 2081
    Spain: +34 91 787 0777
    Sweden: +46 (0) 8 50520424
    Switzerland: +41 (0) 22 592 7103
    Standard International dial: +44 (0) 20 3003 2666
  • Video interview: The Future of the Mobile Financial Landscape Video interview: The Future of the Mobile Financial Landscape Goran Loncaric, Head of Solutions, Ericsson Mobile Financial Services Recorded: Oct 25 2016 5 mins
    Listen to our interview at Sibos with Goran Loncaric, Head of Solutions, Ericsson Mobile Financial Services

    Goran touches on if he thinks we'll ever live in a truly "cashless" society and how he believes we can turn inclusion into expansion.

    He also reveals his opinion on what the mobile financial landscape will look like in 5-10 years' time.
  • Tips on Anyalyzing and Modeling Complex Data Sets Tips on Anyalyzing and Modeling Complex Data Sets Scott Dallon, BrainStorm, Inc. Recorded: Oct 25 2016 20 mins
    Discover how businesses turn big data into meaningful insights to help make organizations work smarter, and make better decisions faster.

    Join Scott Dallon to learn tips on analyzing and modeling complex data sets!
  • Ransomware - To pay or not to pay? Ransomware - To pay or not to pay? Peter Mackenzie, Malware Escalations Manager, Sophos Recorded: Oct 25 2016 60 mins
    Flying spiders, snakes, and ghosts are long gone. Ransomware is now the stuff of nightmares and it’s easy to see why.

    Ransomware has become one of the most widespread and damaging threats internet users now face. Since the infamous CryptoLocker first appeared in 2013, we’ve seen a new era of file-encrypting ransomware variants delivered through spam messages and Exploit Kits, extorting money from home users and businesses alike.

    Join Sophos ransomware pro, Peter Mackenzie, as he shows us how ransomware attacks work, explains why so many new infections keep surfacing, and what practical precautions you can take to protect your organisation.

    If this webinar doesn’t help an IT Hero sleep at night, we don’t know what will.
  • Clustered File Systems: No Limits Clustered File Systems: No Limits John Kim, SNIA-ESF Chair, James Coomer, DDN, Alex McDonald, SNIA-ESF Vice Chair Oct 25 2016 5:00 pm UTC 75 mins
    Today's storage world would appear to have been divided into three major and mutually exclusive categories: block, file and object storage. Much of the marketing that shapes much of the user demand would appear to suggest that these are three quite distinct animals, and many systems are sold as exclusively either SAN for block, NAS for file or object. And object is often conflated with cloud, a consumption model that can in reality be block, file or object.

    But a fixed taxonomy that divides the storage world this way is very limiting, and can be confusing; for instance, when we talk about cloud. How should providers and users buy and consume their storage? Are there other classifications that might help in providing storage solutions to meet specific or more general application needs?

    This webcast will explore clustered storage solutions that not only provide multiple end users access to shared storage over a network, but allow the storage itself to be distributed and managed over multiple discrete storage systems. In this webcast, we’ll discuss:
    •General principles and specific clustered and distributed systems and the facilities they provide built on the underlying storage
    •Better known file systems like NFS, GPFS and Lustre along with a few of the less well known
    •How object based systems like S3 have blurred the lines between them and traditional file based solutions.

    This webcast should appeal to those interested in exploring some of the different ways of accessing & managing storage, and how that might affect how storage systems are provisioned and consumed. POSIX and other acronyms may be mentioned, but no rocket science beyond a general understanding of the principles of storage will be assumed. Contains no nuts and is suitable for vegans!
  • Racing Against Nation States on the Automation Continuum Racing Against Nation States on the Automation Continuum CP Morey, VP Products & Marketing at Phantom Cyber Oct 25 2016 5:00 pm UTC 60 mins
    Both Presidential candidates agree on the need for increased spending on our nation’s infrastructure. While we tend to think first of bridges, roads, and other physical features, cyber is also an area impossible to ignore given the pervasiveness of technology in our lives.

    Without question, the speed, sophistication, and volume of cyber security attacks is constantly changing. In the case of nation states, the motives are also shifting from spying and surveillance to using offensive capabilities to attack critical infrastructure, national security assets, and even the political system itself. It’s no longer just about the money; safety and even lives may be at stake.

    Adversaries are attacking us at an unmanageable scale. For instance, research sponsored by Department of Homeland Security and NSA showed environments with security event traffic of more than 1 billion alerts per day. Even after reducing the load to 1 million alerts per day with correlation and other tools, more than 20,000 human analysts would be needed to respond.

    State-backed adversaries are using automation against us. It’s time we do the same, and projects like Integrated Adaptive Cyber Defense at Johns Hopkins Applied Physics Lab are leading us there.

    Join our webcast to learn how public and private organizations are progressing on the security automation continuum from simple security lifecycle management to predictive response strategies.
  • Compliance as Code with InSpec 1.0 Compliance as Code with InSpec 1.0 Christoph Hartmann, InSpec core contributor & George Miranda, Global Partner Evangelist Oct 25 2016 5:00 pm UTC 60 mins
    InSpec is an open-source testing framework with a human-readable language for specifying compliance, security and other policy requirements. Just as Chef treats infrastructure as code, InSpec treats compliance as code. The shift away from having people act directly on machines to having people act on code means that compliance testing becomes automated, repeatable, and versionable.

    Traditionally, compliance policies are stored in a spreadsheet, PDF, or Word document. Those policies are then translated into manual processes and tests that often occur only after a product is developed or deployed. With InSpec, you replace abstract policy descriptions with tangible tests that have a clear intent, and can catch any issues early in the development process. You can apply those tests to every environment across your organization to make sure that they all adhere to policy and are consistent with compliance requirements.

    Inspec applies DevOps principles to security and risk management. It provides a single collaborative testing framework allowing you to create a code base that is accessible to everyone on your team. Compliance tests can become part of an automated deployment pipeline and be continuously applied. InSpec can be integrated into your software development process starting from day zero and should be applied continuously as a part of any CI/CD lifecycle.

    In this webinar, we’ll explore how InSpec can improve compliance across your applications and infrastructure.

    Join us to learn about:
    - What’s new in InSpec 1.0
    - InSpec enhancements for Microsoft Windows systems
    - Integration between InSpec and Chef Automate

    Who should attend:
    Security experts, system administrators, software developers, or anyone striving to improve and harden their systems one test at a time.
  • DRaaS vs. DIY DR - Which is Best For Your Organization? DRaaS vs. DIY DR - Which is Best For Your Organization? George Crump, Storage Switzerland Oct 25 2016 5:00 pm UTC 60 mins
    Organizations are under constant pressure to improve their ability to recover from a disaster while lowering the cost of the disaster recovery process. Disaster Recovery as a Service (DRaaS) is catching the attention of many IT professionals as a viable way to improve recovery times, lessen data loss and lower costs. But DRaaS may not be the right answer for every organization.

    In this live webinar Storage Switzerland and Carbonite will explain the differences between DRaaS and DIY DR and how to select the best strategy for your organization.
  • Transitioning from Managed Services to Managed Security: One Partner’s Success Transitioning from Managed Services to Managed Security: One Partner’s Success Garrett Gross & Tim Foley Oct 25 2016 5:00 pm UTC 75 mins
    Over the past 10 years, IT managed services have become universally available and moving from a luxury to more of a must-have. Building on this notion of IT as a service, more companies are recognizing the need for a comprehensive security posture but may lack the ability or desire to manage in-house. This leaves the door open to whom will provide this security as a service.

    Join us as we explore one partner’s journey from managed services to managed security. Dataprise has been a leading provider of IT managed services for over a decade and now offers a complete managed security service.

    During this webcast, we’ll get an inside look into:

    The basics of becoming a MSSP
    Tools MSSPs use to build their service
    Common challenges in creating a managed security service
  • How to use AI in designing the customer experience How to use AI in designing the customer experience Stewart Rogers, Dir. of Marketing Technology, VentureBeat Oct 25 2016 5:00 pm UTC 60 mins
    Smart marketers know that the sweet spot between AI and the org’s branding is where true customer engagement spikes. It’s not enough to give the customers what they want. It’s about giving them what they didn’t realize they wanted. Like how every time you upload a photo to your Facebook account -- its DeepFace artificial intelligence program suggests that you need to tag your friend. Or how Starwood’s bot butler “Botlr” has not only freed up staff time in Aloft properties but also underlined its brand’s enthusiasm for AI and machine learning technologies.

    It’s time to take that AI one step further. We’ll talk about how to build and design the customer experience by using AI and machine learning. We'll show you how successful companies are making tremendous strides in moving the needle toward optimized customer engagement. And what's more, we're going to show you how to get started today by taking the guesswork out of your marketing strategy.

    Join us for this hour long deep dive into using AI and machine learning to design the customer experience.

    After this webinar you'll:

    * Learn how to build a customer engagement strategy from the ground up using artificial intelligence.
    * Hear valuable tips on improving your customer engagement now
    * Get insight from top execs who have been down this road and have the best advice to design the customer experience. In this VB Live curated hour long workshop.

    * Stewart Rogers, Dir. of Marketing Technology, VentureBeat
    * Robert Hoffer, founder, Smarter Child
    * Nick Edwards, CEO, Boomtrain
    * Wendy Schuchart, Moderator, VentureBeat

    Sponsored by Boomtrain
  • Grow's UI Update Grow's UI Update Alan Winters Oct 25 2016 5:00 pm UTC 45 mins
    Get a walkthrough of our newest release to learn how we're improving your ability to consume and act on data in real time.

    Includes live Q&A with Grow's VP of Product.

    Grow.com is the simplest way to access your data and visualize it in a real-time scoreboard. When business performance is measured it can be improved. And teams that know the score, play to win!
  • Rethink Security for SaaS: Power of the Platform Rethink Security for SaaS: Power of the Platform Anuj Sawani, Product Marketing Manager, Navneet Singh, Product Marketing Director Oct 25 2016 5:00 pm UTC 60 mins
    The challenges of SaaS applications such as Office 365 or Box are already here whether they are enabled by IT or end users themselves. With the adoption of SaaS, your data is now outside your traditional network perimeter and any changes to how the data is shared, who it is shared with and if it is free of malware is no longer known by your organization. History has shown that when a significant risk arises, a point solution is applied to address it. Defenses made up of multiple point products that do not integrate leave gaps that may expose your organization to attack.

    Join us for this live webinar where we will examine the various stages of a real-world attack targeting your SaaS applications. You will learn how to prevent these attacks at every single point in the security kill chain with a natively integrated Next Generation Security Platform and learn how to:

    * Gain visibility and granular, context-based control of SaaS applications

    * Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.

    *Satisfy compliance requirements while still maintaining the benefits of SaaS based application services
  • ADLINK Launches New Open Modular Architecture for COTS Platform ADLINK Launches New Open Modular Architecture for COTS Platform Jeff Sharpe, Senior Product Manger, ADLink Oct 25 2016 5:30 pm UTC 60 mins
    Vendors of traditional ICT hardware are challenged with integrating new applications in a short time-to-market solution. Even minor modifications can require extensive resources. Cloud computing answers the challenge with interoperable standards: flexible, on-demand resources that allow the interchange of system modules for processing, data transfer and storage.
    This webinar will introduce ADLINK’s vision for the transformation of ICT infrastructure to a more flexible, open design with Modular Industrial Cloud Architecture (MICA).
  • Finding the Holy Grail: Data Security AND Privacy Finding the Holy Grail: Data Security AND Privacy Robert Ball, Global Privacy Officer and Chief Legal Officer at Ionic Security, Inc. Oct 25 2016 6:00 pm UTC 60 mins
    Privacy vs. security, security vs. privacy… the debate is ongoing. Why can’t we have both? Good news: by leveraging the appropriate mix of policies, procedures and enabling technologies, it is possible to secure data AND control access to it in a way that ensures proper application of privacy policies.
  • The Power of Sales and Marketing Alignment The Power of Sales and Marketing Alignment Tracy Eiler, CMO & Andrea Austin, VP of Enterprise Sales at InsideView, Barbara Giamanco, CEO Social Centered Selling Oct 25 2016 6:00 pm UTC 60 mins
    Increase pipeline, crush quota and accelerate deals to close by aligning sales and marketing strategies and tactics.

    Marketing, sales and account management must align around the needs of the customer to generate bigger and better pipeline, crush quota, and drive stronger lead- to-close ratios in order to accelerate revenue.

    Join this webcast to learn:

    What 1,000 sales and marketing professionals said about aligning to generate bottom-line results
    Why data must be your foundation
    How to remove the cultural barriers to success
    The right processes to support alignment
    Strategies for getting started
  • CMDB – When Failure is Not an Option CMDB – When Failure is Not an Option Adam Mason and Terrell Pursley Oct 25 2016 6:00 pm UTC 30 mins
    Join two of our CMDB experts on Tuesday, October 25th for an exclusive web clinic, and learn our secrets for getting CMDB right the first time.

    You invest significant time and resources on your CMDB, and failure is not an option. Sign up today and learn how to guarantee success.
  • Zombie-Proof Your Data Center: Increasing Visibility with DCIM Software Zombie-Proof Your Data Center: Increasing Visibility with DCIM Software Jeff Klaus, Intel GM; Jason Sherman, Engineering and Support Manager, Graphical Networks Oct 25 2016 6:00 pm UTC 60 mins
    Graphical Networks and Intel DCM team up to Drive New Levels of Efficiency in the Data Center to find those Zombie Servers

    1 in 3 devices in today’s data centers are zombies. It’s a fact: these zombies are feeding on your energy and efficiency - skyrocketing costs. You can zombie-proof your data center, save money and optimize efficiency. It’s time to get proactive. Your best weapon? A solid data center infrastructure management software. With the power of DCIM on your side, you can attack and conquer functionally dead servers, wasted space, dead cables and security loopholes. If you’re ready to join the resistance against data center zombies, attending our upcoming webinar is your first step. Don’t be scared: get prepared.
  • MARKET BRIEF: Russell 2000 Index Update 3Q16 MARKET BRIEF: Russell 2000 Index Update 3Q16 Tom Goodwin, PhD Oct 25 2016 6:30 pm UTC 30 mins
    A brief market update on the Russell 2000 Index, previewing the release of the 3Q16 Small Cap Perspectives report.
  • A New Chapter in Emerging Market Growth A New Chapter in Emerging Market Growth John Keshner, MD, Endowments & Foundations, Bei Saville, CFA, CAIA, Client Investment Officer, Endowments & Foundations Oct 25 2016 7:00 pm UTC 60 mins
    In a historically low-yielding global environment, investors are increasingly looking beyond traditional investment opportunities. Emerging markets, with improving macroeconomic policies, strengthening domestic demand, stronger balance sheets and higher FX reserves are ripe for investors seeking additional sources of return. However, with a broadening emerging market universe expanding to include Africa and Middle East, investors need to understand the risks and vulnerabilities inherent in these markets.

    Looking through the lens of an investor we will discuss strategies and ways to manage your EM exposure. Discussion topics will be focused on:

    • The significance of the emerging markets growing share of global GDP
    • Identifying resilient emerging market opportunities
    • An investment framework that explores thematic investment opportunities focused on the strength of domestic demand
    • Prudent management of investment risks and regulatory frameworks in individual markets

    Register now to hear from our industry experts on how to assess the relative risks and take advantage of the growing opportunities in the expanding emerging market economies.
  • Customer Experience: From Account Based Marketing to Account Based Everything Customer Experience: From Account Based Marketing to Account Based Everything Barbara Giamanco, CEO of Social Centered Selling & Craig Rosenberg, Co-Founder and Chief Analyst TOPO, Inc. Oct 25 2016 8:00 pm UTC 75 mins
    Join host Barbara Giamanco, CEO of Social Centered Selling, along with Craig Rosenberg, Co-Founder and Chief Analyst at TOPO, for the on-demand webcast “Account Based Everything”!

    Learn how this next step in the evolution of Account Based Marketing coordinates personalized marketing, sales development and sales efforts to drive engagement and conversion of targeted accounts.
  • Auto Scaling Next-Gen Firewalls on AWS Auto Scaling Next-Gen Firewalls on AWS Matt Keil, Director of Product Marketing, Data Center and Warby Warburton, Manager, Technical Marketing Engineering Oct 25 2016 8:00 pm UTC 60 mins
    Through integration with AWS services, like Auto Scaling and AWS Elastic Load Balancing (AWS ELB), you can now build a next-generation security infrastructure that will dynamically, yet independently, scale to protect your AWS workloads as their traffic patterns fluctuate. This architecture will allow you to reduce costs by utilizing the firewall capacities intelligently and efficiently based on user-defined metrics. By scaling the security separately from the application workloads, this solution allows each firewall to be identically configured and managed centrally, resulting in lower administrative costs.

    Join us for an educational webinar to learn how you can scale next-generation security using AWS Auto Scaling and ELB. Using native AWS Services and VM-Series automation features, you can now dynamically, yet independently scale the VM-Series next-generation firewalls on AWS.

    This webinar will cover
    • Auto Scaling the VM-Series architecture
    • Auto Scaling and ELB integration details
    • Alternative architectures for protecting many VPCs
  • SD-WAN for Next-Generation Retail Networks SD-WAN for Next-Generation Retail Networks Ciaran Roche, CTO, Coevolve: Kangwarn Chinthammit, Director of Solutions, VeloCloud Oct 26 2016 2:00 am UTC 60 mins
    Retailers are constantly under pressure to deliver a better in-store experience for shoppers as part of an omni-channel engagement model. Much of these changes are driving new network requirements, including in-store wireless, sensors and beacons, streaming audio and video content, and new retail management systems. Traditional store networks just cannot keep up with these demands.

    Software-defined WAN (SD-WAN) is gaining significant momentum with hundreds of retail companies as a solution to keep up with the demands of these bandwidth hungry applications, and to provide a platform to deliver next-generation services to stores.
  • Workplace Fatigue: Managing the Risk Workplace Fatigue: Managing the Risk Todd Dawson Oct 26 2016 2:00 am UTC 60 mins
    In both work and life, fatigue is inevitable. It cannot be eliminated, so the risk of fatigue hindering safety is ever present. However, with some proven tools, processes and commitment, fatigue risk can be managed in the workplace and at home.

    Join Todd Dawson for the third and final webinar in the Workplace Fatigue series: Managing the Risk.

    Through case study examples, you will learn some practical risk reduction tactics and discover successful, and unsuccessful, approaches to fatigue management.

    As a special bonus, Dawson will share the tools Caterpillar customers are using to limit the impact of fatigue in their operations, and take your questions about how to deploy them in your organization.

    Learning Objectives:
    •Gain insight into what managing fatigue risk means
    •Understand fatigue management fundamentals
    •Acquire some basic tools to manage fatigue
  • Best Practices on Operational Efficiency in Network Security Best Practices on Operational Efficiency in Network Security Presenter: Michael Ferguson, Strategic Security Solutions Consultant, Forcepoint Oct 26 2016 5:00 am UTC 60 mins
    Most businesses prefer to control the day-to-day operations of their networks using their own resources. The increasing complexity of modern networks means that the overall acquisition, control and deployment for network security projects is far more challenging than before. With decreasing IT budgets and limited resources within high growth businesses; how are network teams expected to improve operational efficiency without sacrificing quality of service and service level agreements?

    In a world that is fraught with new security exploits, maintaining operational efficiency with a low impact on resource and cost can be very difficult.

    What are the best practices for maintaining an operationally efficient network security deployment? How do network teams stay on-top of daily routine tasks, such as policy configuration, upgrades and network security monitoring? How can network teams be enabled to focus on mission critical projects through automation?

    Learn from case studies about network security and firewalls which enable the deployment of firewalls within highly distributed networks without sacrificing time or security.

    Join Forcepoint and (ISC)² on Oct 26 (Wed) at 1:00p.m. (Singapore time) in learning the best practices on operational efficiency in network security.

    Presenter: Michael Ferguson, Strategic Security Solutions Consultant, Forcepoint

    Moderator: Clayton Jones, Managing Director, Asia-Pacific, (ISC)²