The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU). The session is an introduction to what are some of the key regulations that are being introduced.
Deliver Production-like Environments Early in the Dev/Test Lifecycle
As a growing number of financial enterprises look into adopting Cloud and DevOps, environment complexity is often cited as one of the top barriers for such initiatives. Focusing on a Shift Left philosophy to deliver production-like environment access early on in the dev/test lifecycle can tremendously increase quality, cut down the cost to fix issues and, more importantly, increase innovation speed. This webinar will cover an example of using cloud sandboxes for allowing access to authentic replicas of production environments, allowing financial firms to focus on release software faster without sacrificing security and compliance.
Attend this hands-on webinar where you will learn how your Angular app can immediately gain access to hundreds of features, components, and widgets from Sencha, all synched to work together!
Join us and you will:
- See why Sencha isn’t just Ext JS anymore - including how we are helping Angular and React developers
- Understand the benefits of our 115+ commercially tested and supported components – a lifeline when your app is on the line
- See real examples of:
-->Data Analytics - Grids, Pivot Grids, Analysis, Exports, Excel
-->Visualization tools – Charts, D3 Visualizations
-->Prebuilt packages - Calendar, Forms, Tabs, Menus
Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going away anytime soon. Join us for Anatomy of an Email-Borne Attack where we'll paint the current healthcare threat landscape for attacks and demonstrate an actual live “hack.”
The audience will be exposed to a SaaS based analytics platform that allows them to define and or defend their Cloud/ Hybrid IT Strategy. Users have to ability to quickly review, substantive venue analysis for workload placement, with the ability to run “what if scenarios” as well for PVC-Hosted Environments and or Public Cloud as alternative Venues. You are guaranteed to learn something about Cloud and Workload placement that you can apply to your business immediately.
The regulators are coming regarding cybersecurity. Are you ready?
Join this interactive webinar to learn more about:
- The NYDFS Part 500 cyber regulations, including insights on implementation and auditing
- Review the NAIC's new Insurance Data Security Model Law adopted on October 24, 2017
About the Presenter:
Adam Hamm is a Managing Director at Protiviti Global Consulting who serves financial services industry clients across the country regarding risk, compliance, and cybersecurity matters. He has deep knowledge of financial services regulation with hands on experience in all insurance supervision and policy related matters. Before he joined Protiviti in January 2017, he was a former President of the National Association of Insurance Commissioners (NAIC), Chairman of the NAIC’s Cybersecurity Task Force, Principal on America’s Financial and Banking Information Infrastructure Committee (the primary national regulatory cybersecurity committee for the financial services sector), Principal on the United States Financial Stability Oversight Council (FSOC), and North Dakota’s elected insurance commissioner from 2007-2016. Adam also spent ten years as a violent crimes prosecutor and civil litigator.
One of the paramount responsibilities of government is the protection of the welfare of youths and children. Study after study has demonstrated the correlation between contact and interaction with child protective services and later quality-of-life outcomes. And on too many occasions, at-risk youth become tragic statistics before they reach adulthood.
In the on-demand webinar Using Advanced Analytics to Protect At-Risk Children, hosted by Institute of Public Administration of Canada (IPAC) Chief Executive Officer Robert Taylor, experts from SAS Institute and Ernst & Young discuss the challenges facing child welfare professionals, how data from disparate sources can flag high-risk situations, and how an evidence-based approach, focused on outcomes for at-risk children, can be driven through the operation, from policy-makers to program managers to front-line workers and improve outcomes.
Aside from hitting 1 million customers, digital bank Revolut has just announced that they will be launching a feature which will allow users to purchase Bitcoin, Litecoin, and Ethereum, and will look to expand to other cryptocurrencies soon after.
BrightTALK's Senior Content Strategy Manager for FinTech and Financial Services, Ina Yulo, chats with Lewis Tuff, Lead Platform Engineer for Revolut.
Aside from opening up to questions from the audience, they will discuss:
-How will the new cryptocurrency feature work?
-How to buy, sell, exchange, transfer cryptocurrencies with Revolut - Demo of the new feature
-Which cryptocurrencies will be in phase 2?
-Plans for expansion to North America, APAC, and the Middle East
-The importance of Revolut's European Banking License application
Ask your questions ahead of time on Twitter using #BrightTALKRevolut
Join Derek Manky, Global Security Strategist at Fortinet, to learn about the top Threat Predictions for 2018, as identified by FortiGuard Labs' 200 expert threat researchers, and gain the latest intelligence on the threat landscape and our predictions for every critical area including malware, botnets, mobile threats and more.
You can also access our 2018 Threat Prediction Report attached to understand what cybercriminals have in store for us and what you, as an IT security professional, should be most prepared to address.
L’année qui s’achève a été essentiellement marquée par des attaques coûteuses, des fuites de données retentissantes et plusieurs cas de ransomwares et d’espionnage économique. La cyber criminalité a gagné en ampleur et en audace, avec des retombées financières bien plus élevées. Les cyber attaques sont désormais régulièrement citées dans les médias.
Ce webcast aborde les points suivants :
• Le paysage des menaces en 2017
• Les personnes ou les erreurs qui ont conduit à ces incidents
• Les enseignements à tirer de cette année pour les professionnels de la sécurité comme vous
• Les solutions qui peuvent renforcer votre sécurité à l’approche de 2018
Due to characteristics including high value, portable, virtually untraceable and odourless commodities, precious metals and stones are often exposed to elevated levels of money laundering risks. Money launderers and terrorist financers are drawn to precious metals and stones—especially diamonds since they are often highly valuable relative to their weight and also have a relatively stable price. During this informative webinar, our experts will explore initiatives undertaken by an organisation involved with one of the largest diamond dealer communities in Europe to raise awareness and bolster measures that can be taken to prevent the misuse of these products.
•Raising awareness about how precious metals and stones are used to launder proceeds of crime
•Analysing current typologies involving the use of precious metals and stones to move proceeds of crime and conceal its detection
•Understanding measures that European diamond dealers are taking to comply with AML regulatory requirements
В рамках вебинара будут озвучены ключевые обновления технологий в СХД Unity и SC AFA от компании Dell EMC, которые станут доступны заказчикам в декабре 2017 года – январе 2018 года. Вебинар направлен на специалистов по продажам и технических экспертов. На русском языке - in Russian language.
Participe en nuestro seminario virtual sobre la seguridad de correo electrónico hospedada Combata las amenazas avanzadas con SonicWall Hosted Email Security el viernes, 15 de diciembre a las 11:30 h CET.
El correo electrónico continúa siendo vital para los negocios. Sin embargo, a medida que crece el volumen de correos electrónicos, aumenta también la cantidad de ataques de ransomware, phishing, compromiso del correo electrónico de negocio (BEC), spoofing, spam y virus.
Los cibercriminales falsifican direcciones de remitentes de correo electrónico para engañar a los destinatarios, dañando así a marcas legítimas sin que éstas lo sepan. Las organizaciones pueden sustituir sus soluciones antiguas por la solución de seguridad de correo electrónico basada en la nube asequible y fácil de usar de SonicWall, que ofrece protección contra el dinámico y cambiante panorama de las amenazas de correo electrónico.
En este seminario virtual, obtendrá información sobre los siguientes temas:
•Protección contra las amenazas de correo electrónico avanzadas
•Cómo la seguridad de correo electrónico hospedada de SonicWall mejora MS Office 365
•Otras ventajas del servicio de suscripción de seguridad de correo electrónico basado en la nube
Saviez-vous que des millions d’hôtes (domaines, sous-domaines ou adresses IP) apparaissent chaque jour et que, dans bien des cas, leur durée de vie ne dépasse pas 24 heures ?
De nombreuses entreprises choisissent d’instaurer des politiques de passerelles web sécurisées afin d’empêcher les utilisateurs d’accéder à des sites non classifiés à cause du risque qu’ils représentent, même si la plupart sont tout à fait légitimes dans le cadre d’un usage professionnel.
De la même façon, beaucoup d’entreprises décident de bloquer des sites dès lors que le niveau de risque est fort, sans être totalement avéré.
En découle un blocage excessif des sites web qui nourrit l’insatisfaction des utilisateurs.
Certains sites sont réputés pour leur fiabilité, d’autres pour leur dangerosité. Les sites qui posent vraiment problème sont ceux qui se situent entre les deux, lorsqu’il n’y a pas suffisamment de recul ou d’informations.
Principaux thèmes abordés :
- Découvrez le plus grand réseau civil d’intelligence sur les menaces au monde et la protection qu’il peut vous apporter face aux attaques de malware.
- Apprenez à définir des politiques permettant d’isoler tout le trafic dont le risque est indéterminé ou non classifié par le Global Intelligence Network.
- Sachez comment booster la productivité de l’entreprise sans créer de risques supplémentaires.
Inscrivez-vous dès aujourd'hui.
Rejoignez-nous le vendredi 15 décembre à 10h00 CET pour le webcast consacré à la sécurité de messagerie hébergée : Combating Advanced Threats with (Combattre les menaces avancées avec SonicWall Hosted Email Security).
La messagerie reste essentielle pour l’entreprise. Mais l’augmentation en volume des messages électroniques entraîne parallèlement la prolifération des ransomwares, du phishing, des menaces de type BEC (Business Email Compromise), du spoofing et autres attaques de virus.
Les cybercriminels falsifient les adresses e-mail des expéditeurs pour tromper les destinataires et portent par là même préjudice aux marques légitimes. Les entreprises ont tout intérêt à remplacer leurs solutions actuelles par la solution Cloud conviviale et économique SonicWall de sécurisation de la messagerie afin de se protéger d’un paysage de menaces dynamique et changeant.
Dans ce webcast, vous en saurez plus sur les thèmes suivants :
•Protection contre les menaces avancées véhiculées par e-mail
•Comment la sécurité de messagerie hébergée SonicWall améliore MS Office 365
•Autres avantages du service Cloud de sécurisation de messagerie par abonnement
Uusi tietosuoja-asetus ja laki on tulossa, oletko valmistautunut? Mitä konkreettisesti tarkoittaa osoitusvelvollisuus? Lain henki tulee pystyä osoittamaan ohjeistuksen, toimintamallien ja dokumentoinnin avulla. Tule kuuntelemaan lisää, mitä tämä tarkoittaa johdon ja esimiesten näkökulmasta. Tunne rekisterinpitäjän vastuut ja velvollisuudet. Miten johdon pitää valmistautua ja onko roadmap jo hallussa?
- EU:n tietosuoja-asetuksen ja lain velvoitteet johdolle
- Henkilötietojen käsittelyprosessit ja dokumentointi
- Rekisterinpitäjän ja käsittelijän vastuut
- Rekisteröityjen oikeuksien toteutuminen
- Tietosuojavastaavan nimeäminen
- Tietosuojan hallintatyön järjestäminen ja organisointi
- Seuraamukset ja sanktiot
- Tiedonsiirron edellytykset mm EU:n ulkopuolella
- Tietojärjestelmäarkitehtuurin vaatimukset
- Sopimusten hallinta tietosuoja-asetuksen näkökulmasta
Jarkko Koivuniemi, Senior Consultant, Digitrain Oy
Jarkko on pitkän linjan IT-alan yrittäjä ja moniosaaja. Viime aikoina pääpaino on ollut tietosuojassa, kokonaisarkkitehtuurissa ja digitalisaatiossa.
Tällä hetkellä Jarkko toteuttaa useammalle asiakkaalle tietosuojan hallintamallien tekemistä ja konsultointeja.
Asiakkaita löytyy mm Valtion hallinnosta, sairaanhoitopiireistä, kaupungeista, kunnista, kolmannelta sektorilta ja eri toimialoilla olevista yrityksistä.
Join Certain, Demandbase, and Radius as we discuss the ins and outs of our events strategy in a live webcast on Thursday, December 14th at 1pm. From the planning timeline to key successes and challenges, we’re taking a look behind the curtain.
You’ll walk away knowing how to:
-Strategize your presence at conferences & tradeshows to make the most impact
-Measure leading indicators of success and KPIs post event
-Allocate your budget in the best way possible
Data leaders face a daunting challenge: implementing enterprise-wide data strategies that deliver tangible wins without sacrificing security, agility, and transparency. To successfully implement their strategies, they must approach this by deploying a solution that leverages existing investments while meeting changing organizational needs. We will discuss best practices for taking their data strategies through the last mile and how an Analytics OS makes it possible.
* Understanding of the need for an analytics strategy
* Best practices around implementing an analytics strategy
* How the needs of an analytics strategy tie in to the design of an analytics operating system
It’s clear Big Data Analytics drives profitability and is becoming essential to the success of enterprises. Unfortunately, first generation, share-nothing analytics platforms are not sufficient to meet the security, reliability, scalability or performance requirements of business-critical applications. They lack fundamental capabilities necessary to protect critical data, drive costs down, and provide the flexibility needed to meet evolving needs.
First generation Big Data Analytics platforms are built around clusters of individual compute platforms with internal direct-attached storage (DAS), but this architecture is inherently problematic and non-scalable. Component failure, particularly DAS, can cause the analytics’ process to fail or drastically slow down. There is no convenient way to back up the data and quickly restore it, nor any way to manage the data life cycle as analytics become core to the enterprise and the datasets grow exponentially. It is difficult to scale compute and storage elements independently, or even at all. In this webcast learn how an Innovative Big Data Analytics platform addresses and overcomes these challenges.
This new, highly scalable analytics approach provides far more flexibility, and effortlessly leverages the cloud in combination with on-premises resources. Compute and storage infrastructure can be scaled independently – driven only by current requirements. Analytics applications can now efficiently access data directly from existing enterprise storage systems, eliminating unnecessary replication of data. See how an innovative big data analytics platform can reduce server, storage and software license costs by optimizing resource utilization, and provide all the data security, scalability, performance, and analytics capability required by your enterprise.
Humans are hardwired for communicating with visuals. Learn some eye-opening statistics on engagement with video and images, as well as some best practices for improving your marketing and social media videos. Learn how you can use video and visuals to better engage your customers.
Join Val Swisher, sitting in for Scott Abel, The Content Wrangler, and Ryan Knott, Public Relations Specialist at TechSmith, for this free, one-hour webinar. Attendees will learn why visuals and video are so important to your marketing content, why perfection is killing your marketing videos, and three easy ways to improve your video process.
Join us on Monday, December 18th at 9 a.m. GMT for the hosted email security webinar, Combating Advanced Threats with SonicWall Hosted Email Security.
Email continues to be vital to business. However, as the volume of email increases, so too does the amount of ransomware, phishing, business email compromise (BEC), spoofing, spam and virus attacks.
Cyber criminals falsify email sender addresses to fool recipients and inflict damage to unknowing, legitimate brands. Organizations can benefit from replacing legacy solutions with SonicWall’s easy-to-use, affordable cloud-based email security solution that defends against the dynamic, evolving email threat landscape.
In this webinar, gain insights on:
•Protection against advanced email threats
•How SonicWall hosted email security enhances MS Office 365
•Other benefits of the cloud-based email security subscription service
Join us for a new webinar in our series focused on helping companies prepare for the upcoming global government regulations, like European General Data Protection Regulation (GDPR). Data sovereignty, especially for cloud-first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.
This webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our Director of Global Data Privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Alex Hanway, Product Marketing, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.
Join us to hear more about:
•What is GDPR?
•Case Study: A look at how Gemalto has prepared for GDPR
•The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations
Na primeira aula do curso, conversaremos sobre as bases éticas em pesquisa e publicações. Também abordaremos a detecção de erros honestos e má conduta em artigos. Encerraremos a aula com a retratação de artigos publicados.
Minicurso "Seja um pesquisador responsável: publique com ética"
O minicurso é composto por três aulas que abordarão o comportamento ético para a boa qualidade da pesquisa científica. A conduta antiética existe tanto dentro como fora do contexto do mundo acadêmico. Casos rotineiros de trapaça, fraudes e golpes são exemplos de comportamento antiético que têm consequências graves, passíveis de punição. Na Academia, a conduta antiética também pode ter desdobramentos sérios. O desenvolvimento de boas práticas em pesquisa ética ajuda os autores a publicarem seu trabalho de forma responsável e a evitarem assim rejeição e principalmente retração devido à má conduta. Além de acabar com uma trajetória profissional, a má conduta fere gravemente a integridade da Ciência. Neste curso, forneceremos orientação sobre quais são os preceitos éticos em publicação e como não cair em armadilhas durante o processo.
China is well on its way to becoming a world leader in research output. It is therefore critically important for Chinese journals and publishers to become global names and keep pace with China’s rapidly growing stature in scientific research. So how do international journals maintain and advance their standing?
This webinar addresses the “business” of maintaining and advancing a high-quality international journal, delving into what it is that prestigious journals routinely do to attract prospective authors, promote their journal’s identity, and engage a broader readership.
In the first part of this webinar, Professor Mcloughlin will share best practices leading journals follow to engage high-status author prospects, promote the work they publish, increase awareness of their best features, and remind potential contributors about their journals’ publishing opportunities.
In the second part of this webinar, Mr. Rout will talk about how a growing number of journals today are pioneering the use of non-traditional content formats—jargon-free content and audio-visual summaries to increase the visibility of published research, and thereby reach out to and engage with a broader readership.
Note that the webinar will be conducted in English.
Who is this for?
Editorial staff of academic journals who want to promote a more international footprint for their journal, who want to reach a reading audience outside their own nation, and receive submissions from researchers working internationally.
Why should you attend?
This webinar helps editorial staff learn from the practices of prestigious journals by sharing easily reproducible strategies for improving the academic reputation of a journal.
Have you received peer reviewer comments suggesting that your manuscript should be revised by a native English speaker? Would you like some tips on how you can avoid such comments?
Who is this for?
•Researchers and doctoral students who want to learn how to avoid common errors in manuscript writing.
•논문 원고 영작에서 범하기 쉬운 오류들을 알고자 하는 연구원 및 박사 과정 학생들을 위한 웹세미나입니다
Why should you attend?
This webinar, which will be conducted in Korea, will cover some of the common errors in manuscript writing made by Korean authors. Specifically, we will look at errors in modifiers and noun strings. First we will define modifiers, which can be both a word or a phrase, and noun strings. Then we will learn how errors in modifiers and noun strings form, how to detect them, and how to avoid them in scientific writing.
이 웹세비나는 논문 원고 작성에서 한국 저자들이 자주 범하는 오류 중 수식어 사용과 명사 문자열 사용을 다룰 것입니다. 영어에서 수식어와 명사 문자열의 사용을 살펴보고 어떤 오류들을 범할 수 있는지 다룰 것입니다. 이 웹세비나를 통해서 이런 오류들을 발견하는 것과 피하는 방법들을 배우시게 될 것입니다.
The cost of Impostor email has risen to $5.1B. Business email compromise (BEC) is impacting employees, business partners and customers of organizations around the world.
Proofpoint Email Fraud Defense (EFD) extends the security already offered by Email Protection to block criminals that spoof your trusted domains to trick victims, both inside and outside of your organization, into sending money and other sensitive information to the attacker.
Join us for a live webinar on Tuesday, June 6th at 10am PST where you will learn:
• Latest impostor email trends including BEC and consumer phishing
• How to extend your current protection to stop all impostor threats
• Upcoming product integration with Email Protection to secure your entire email ecosystem
From cyber criminals who seek personal financial information and intellectual property to state-sponsored cyberattacks designed to steal data and compromise infrastructure, today’s advanced persistent threats (APTs) can sidestep cyber security efforts and cause serious damage to your organisation. 2017 is already one of the most prolific years in terms of APT activity. Indeed, since the beginning of the year, there have been several examples of major cyberattacks across EMEA and more specifically in the Middle East. How can FireEye help your organisations protect against these persistent threats?
Join this live webinar in Arabic as we will discuss the following topics:
- FireEye Adaptive Defense
Please join us for the Dell EMC webcast on our new solution - VDI Complete with VxRail for VMware Horizon. In this session, you will learn how to maximize your opportunity with desktop and application virtualization through VMware Horizon® on Dell EMC VxRail™ hyper-converged infrastructure appliances. Learn how this industry-leading VDI solution helps you deliver faster time to deployment, radically simplified infrastructure management, and better performance at the edge to your customers, and more profitability to your bottom line. This webcast will be presented in English. We look forward to seeing you.
Join Justin Harris, Public Cloud Architect at Palo Alto Networks and Jason Montgomery, EMEA Manager for Palo Alto Networks Aperture to understand:
- Why organisations are moving to the cloud and the obstacles getting there
- The role of Cloud Access Security Brokers (CASB) and a simpler approach to securing SaaS applications
- How a Next-Generation Firewall compliments and enhances AWS/ Azure's built in security tools
- Automation and how to move quickly with cloud security
- Key strategies to ensure your organisation's data remains protected
- Questions and Answers
We do hope you can join us for this exclusive webinar to understand new cloud security challenges and strategies for protecting your data.
Recent investigations by FireEye’s Mandiant incident response consultants combined with FireEye iSIGHT Threat Intelligence analysis have given us a more complete picture of a suspected Iranian threat group, that we believe has been operating since at least 2014.
APT34 are involved in long-term cyber espionage operations largely focused on the Middle East. This threat group has conducted broad targeting across a variety of industries, including financial, government, energy, chemical, and telecommunications.
Join us in a live webinar as we discuss this threat group whom we assess to be working on behalf of the Iranian Government, with a mission that would benefit nation-state geopolitical and economic needs. APT34 uses a mix of public and non-public tools, often conducting spear phishing operations using compromised accounts from trusted third parties, sometimes coupled with social engineering tactics.
Register today to gain deeper insights into this threat group!
Award-winning JustPark is the UK’s leading parking app, with more than 1.5 million users and over £1m in transactions each month. In 2015, its first crowd funding effort broke records, reaching £3.5m. Its second round – which is still in progress - raised £1m in just three hours.
With investment in the second round currently sitting at just over £2m, we talk to one of the app’s senior developers about how JustPark will develop for scale, and its plans for taking on the £50bn UK parking industry.
Discussions will include:
• Recommendations for scaling for a growing user base
• Discover novel liquid biopsy platforms enabling enhanced cancer management
• Explore biomarker opportunities for diabetes management
• Learn about minimally invasive cancer screening technologies
• Understand the impact of biomarker studies in enabling precision medicine
The NetNumber Multi-protocol Signaling Firewall is the industry's most comprehensive signalling firewall, providing protection for all signalling protocols including SS7, Diameter, SIP, HTTP and DNS/ENUM. As these firewall applications can be combined seamlessly with other NetNumber applications such as an STP, DSC, HSS or HLR on the same TITAN platform, telecom operators have an unprecedented level of multi-protocol signaling protection, flexibility and operational uniformity in a platform that can reduce Opex/Capex costs and improve efficiency.
Vulnerabilities are an inevitable part of software development and management. Whether it’s open source or custom code, new vulnerabilities will be discovered as a code base ages. A 2017 Black Duck analysis of code audits conducted on 1,071 applications found that 97% contained open source, but 67% of the applications had open source vulnerabilities, half of which were categorized as severe. As the number of disclosures, patches, and updates grows, security professionals must decide which items are critical and must be addressed immediately and which items can be deferred.
Join Black Duck’s VP of Security Strategy, Mike Pittenger, for a 30-minute discussion of best practices in open source security and vulnerability management. You’ll learn:
- Methods for determining which applications are most attractive to attackers, and which pose the greatest risk
- Ways to assess the risk associated with a disclosed open source vulnerability
- Strategies to minimize the impact of open source security vulnerabilities when immediate fixes can’t be made
Join Michael Gorelik, distinguished threat researcher and Morphisec Chief Technology Officer and Vice President of R&D, for a close look at top cyber threats targeting enterprises today. He will walk through the where, what and how of the leading attack vectors as well as explore ways to protect your company.
• Learn the primary attack vectors used by cybercriminals to infiltrate an organization
• Understand how different attack techniques work and what damage they can do
• Find out what protection methods work and where they fall short
• Get answers directly from our chief bad-guy researcher during the Q&
-The Lifesize Portfolio: what it does and why it matters
-The Lifesize Icon 450: a zoomed in view of camera quality, smart framing, specs and more
-The Lifesize Phone HD: a close up look at sound quality, ports and all.
-The Brand New App: Take a tour of the interface
Plus we’ll have time for Q&A from our product experts.
Cybersecurity disasters dominated the news in 2017. WannaCry alone bashed hundreds of thousands of targets. Now is the time for CIOs and CSOs to scrutinize multiple components of their security because, let’s face it, attackers are busy working up new creative ways to hijack your data in 2018.
Attend this webinar to learn what it takes to build an in-depth defense. This straightforward presentation will cover:
• Security KPIs with risky validation processes (far more common than you think)
• A checklist of security points that need tight inspection (and where to drill down)
• New security services that streamline the process
The Practical Guide to Cloud Computing is the CSCC’s seminal deliverable outlining key definitions, characteristics, and benefits of cloud computing. The heart of the guide is a comprehensive 10-step “Roadmap for Cloud Computing” containing guidance and strategies for the successful migration and deployment of cloud computing applications.
In this webinar, the authors will review each of the 10 steps in the guide and highlight the technical changes made to this latest version including the emergence of hybrid cloud, containers, serverless computing and microservices architectures.
Read the corresponding paper here:
This talk will explore the evolution of multimode fiber from inception to current time against the historical transceiver roadmap. We will explore various transceiver form-factors with respect to capability, technology risk, density and cost vs. fiber types that have been deployed (and those yet to be widely deployed). Both transceivers and supported fibers will also be discussed with respect to the evolution of standards that support them.
Attendees will earn 1 BICSI CEC.
In this IDC FutureScape presentation, the IDC Worldwide SMB team discusses the key predictions that will impact CIOs and IT professionals in the worldwide industry over the next one to three years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.
About IDC FutureScape
IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.