Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Blockchain for Supply Chain: How Real is it?
    Blockchain for Supply Chain: How Real is it?
    Victoria Brown, Senior Research Manager, IDC Retail Insights and Nelson Petracek, CTO, TIBCO Software Inc Recorded: Dec 17 2018 23 mins
    Bitcoin is a hot topic these days, but the technology underneath this digital crypto-currency can potentially be used to build solutions for industries faced with supply chain inefficiencies. Other than simply recording transactions on a ledger, what other aspects of this industry could be impacted by blockchain? Can smart contracts be used to achieve more automated and streamlined interactions in a secure context? And where do concepts such as IoT and AI/ML fit?

    Join this panel discussion to hear about blockchain technology, solution offerings, and related concepts such as smart contracts. We will look at how blockchain can streamline supply chain interactions and improve the visibility and trust of these transactions across a network of participants. The session will discuss what we, as technologists, must consider as part of a blockchain deployment, and how this technology may impact your purchasing experience in the future.
  • Faster, Efficient, More Intelligent Incident Response Orchestration
    Faster, Efficient, More Intelligent Incident Response Orchestration
    Andy Yeates, Engineer, IBM Resilient Recorded: Dec 17 2018 40 mins
    The Resilient incident response platform (IRP) empowers cyber security teams to orchestrate their incident response processes, and respond to and resolve incidents faster, more effectively, and more intelligently. The Resilient IRP is the leading platform for orchestrating and automating incident response processes.

    This presentation will showcase the Resilient IRP’s ability to enable complete IR orchestration and automation - aligning security teams' people, process, and technologies into a single hub for incident response. By understanding the capabilities of the solution, attendees can learn how to:

    • Achieve greater intelligence and efficiency by integrating your existing security technologies, including SIEMs, EDR, threat intelligence, and more.

    • Adapt to real-time incident conditions with Resilient Dynamic Playbooks –ensuring a fast and complete response to all incident types.

    • Build, configure, and maintain your own IR action plans within hours or days
  • Micro Focus ARA: Automating Software Delivery
    Micro Focus ARA: Automating Software Delivery
    Malafronte, Paola Recorded: Dec 17 2018 34 mins
    Looking for a single tool that increases software delivery cadence and unites Agile and DevOps practices to implement Continuous Delivery?

    Micro Focus Application Release Automation (ARA) is the solution that can bring enterprise DevOps efficiencies to your software delivery process.

    Why use Micro Focus ARA?
    •Scale from a single laptop to the largest enterprise.
    •Supports Continuous Delivery
    •Uses a flexible, robust, extensible plug-in for seamless integration
    •The drag-and-drop, graphical process editor eliminates manual deployments
    •Plan, track, and control application releases with end-to-end visibility
  • Der Anstieg von Cyberattacken auf dem DACH-Markt und wie man ihre Auswirkungen m
    Der Anstieg von Cyberattacken auf dem DACH-Markt und wie man ihre Auswirkungen m
    Flaviu Lang & Maik Pietsch | Cloudflare - Experten für Cyber-Sicherheit | DACH Recorded: Dec 17 2018 27 mins
    Dieses Webinar bietet Ihnen einen Überblick über die Lage der Cyber-Sicherheit in der DACH Region. Thematisiert werden die verschiedensten Formen, die Cyberangriffe einnehmen können, sowie passenden Schutzmechanismen, die Sie in Ihrem Unternehmen implementieren können.
  • Обзор решения Dell EMC Hybrid Cloud for Microsoft Azure Stack
    Обзор решения Dell EMC Hybrid Cloud for Microsoft Azure Stack
    Андрей Николаев, Специалист по облачным платформам Recorded: Dec 17 2018 57 mins
    Присоединяйтесь, чтобы узнать, как построить полноценное облако для IaaS и PaaS сервисов “из коробки”. Поговорим о решении Dell EMC Hybrid Cloud for Microsoft Azure Stack.
    Вебинар проводится при поддержке компании Intel®.
  • Обзор новых возможностей в ПО резервного копирования Micro Focus Data Protector
    Обзор новых возможностей в ПО резервного копирования Micro Focus Data Protector
    Александр Аверин, технический консультант по управлению информацией Micro Focus в России и СНГ Recorded: Dec 17 2018 62 mins
    В рамках вебинара мы расскажем вам о новом функционале программных решений Micro Focus по резервному копированию и восстановлению данных (Data Protector) и аналитике систем резервированя данных (Backup Navigator)
  • Data Protector zum Wochenstart: DP 10.20 Neuerungen
    Data Protector zum Wochenstart: DP 10.20 Neuerungen
    Uli Wallscheid, DP Solutions Product Manager, Micro Focus Recorded: Dec 17 2018 81 mins
    In den Webinaren „Data Protector zum Wochenstart“ stellt Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vor.

    Im Webinar am 17. Dezember dreht sich alles um das Thema Data Protector 10.20: Das interne Reporting wurde in Data Protector 10.20 weiter ausgebaut. Desweiteren erhalten Sie einen Einblick in alle neuen Features der Version 10.20 von Data Protector.

    Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb.

    Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.
  • パブリッククラウドを安心して活用するためのセキュリティ対策ご紹介
    パブリッククラウドを安心して活用するためのセキュリティ対策ご紹介
    世羅 英彦, プリンシパルセールスエンジニア, 株式会社シマンテック Recorded: Dec 17 2018 48 mins
    ビジネスの拡大に伴うIT部門への負荷軽減のため、パブリッククラウドを採用する企業は増え続け、この流れが止まることはありません。

    一方、標的型攻撃や情報漏えいなどセキュリティリスクが増加してしまうのではないかとの懸念が、パブリッククラウドへの移行の最大の障壁となっています。

    当Webinarでは、パブリッククラウドの可視化、セキュリティ保護を実現し、リスクの軽減とコスト削減を実現可能にする製品をご紹介します。

    今すぐ登録
  • Ask the Multi-Cloud Expert: Why Cloud needs a new data centre strategy
    Ask the Multi-Cloud Expert: Why Cloud needs a new data centre strategy
    Tim Lawrence Recorded: Dec 16 2018 15 mins
    Join our latest webinar with Tim Lawrence & Andy Skipper as our expert covers topics such as

    - What the major strategic priorities are for UK Organisations in 2018
    - What the first steps are towards Cloud Adoption
    - How UKCloud can help

    By clicking through this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • The Essential Skills All Product Managers Must Master
    The Essential Skills All Product Managers Must Master
    ProductPlan, Pivotal Labs, Jama Software, The Product Stack Recorded: Dec 14 2018 60 mins
    What does it take to be a product manager? Is there a cookie-cutter template, a perfect mold
    into which all PMs should seek to fit? Are the skills finite and easily definable? In the next
    Product Stack webinar, we’re going to find out together if there is a such a thing as a paragon ofproduct management—and if you’re on track to be that kind of PM.

    Here’s what you’ll learn if you join our webinar::

    ●Let’s be truthful: what is and is not a product manager function?
    ●What are the soft skills that product managers should cultivate?
    ●What are the hard skills product managers should know?

    Speakers:
    Annie Dunham, Director of Product Management at ProductPlan.
    Isabelle Berner, Product Manager at Pivotal Labs.
    Kevin Steigerwald is the VP of Products and UX at Jama Software.
    Ronan Dunlop, Marketing Director, Pivotal and Co-Founder of The Product Stack.
  • From LTO to the Cloud: Your Last Data Migration with Backblaze and StorageDNA
    From LTO to the Cloud: Your Last Data Migration with Backblaze and StorageDNA
    Tridib Chakravarty, StorageDNA and Nilay Patel, Backblaze Recorded: Dec 14 2018 32 mins
    Do you have content archived on LTO-5 or LTO-6 tape? If so, what’s your plan for migrating it before it’s too late? LTO-8 is available now, and manufacturers only guarantee at most two generations of backward compatibility. That is, presuming the tape doesn’t fail first.

    With the right strategy, modernizing your archive by migrating from LTO to the cloud doesn’t have to be painful or time-consuming.

    Join this webinar with experts from StorageDNA and Backblaze and learn how to:
    - Avoid the pitfalls of manual LTO migrations with StorageDNA Smart Migration
    - Build a cloud-based archive with Backblaze B2 that you never have to migrate again
    - Unlock the value of your archival content though fast, direct cloud access
  • [Video] Expert Panel: How to Protect Against Hackers in 2019
    [Video] Expert Panel: How to Protect Against Hackers in 2019
    Moderator: Graham Cluley | Panelists: Michael Howard, Louella Ferscunandes, Howard Roberts Recorded: Dec 14 2018 39 mins
    In this HP Security Panel webinar, we’ll look beyond The Wolf films to discuss the smartest ways of safeguarding against hackers.

    Listen and hear how our expert panelist address a series of pressing issues such as:

    • Are vendors using scaremongering to sell their own services?
    • If faces are the new fingerprints, what are the security risks?
    • How big a threat is IoT and what’s the next Mirai Botnet?
    • Is the public sector the weakest link?
    • Can security be baked into the hardware?

    This is an excellent opportunity to gain invaluable security insights from experts on the frontlines.

    Panelists include:

    Graham Cluley: Award-winning security blogger - moderator
    Michael Howard: Head of Security Practice, HP Inc.
    Louella Fernandes: Research Director Quocirca
    Howard Roberts: Print Technologist, HP Inc.

    Stay connected to the latest HP Security Solutions by visiting:

    http://www8.hp.com/us/en/solutions/business-solutions/printingsolutions/securityoverview.html?jumpid=sc_ucq8stx21w
  • Flash Webinar - Talking Storage Consolidation vs. Storage Sprawl with SolarWinds
    Flash Webinar - Talking Storage Consolidation vs. Storage Sprawl with SolarWinds
    Storage Switzerland and SolarWinds Recorded: Dec 14 2018 16 mins
    Join Storage Switzerland and SolarWinds for our Friday Flash webinar. In 15 minutes our panel of experts provide you the information you need so you can better deal with storage sprawl in your data center. Storage Switzerland finds that most organizations have five to six different storage systems and three or four different vendors within their storage infrastructure. These diverse storage architectures can be expensive and time consuming if not correctly managed.

    In 15 Minutes learn:
    - What is causing storage sprawl
    - How to stop storage sprawl
    - Is storage consolidation the right objective
    - How to manage a diverse storage infrastructure
  • Assessing Cyber Risk - Challenges and Solutions
    Assessing Cyber Risk - Challenges and Solutions
    STEPHEN HEAD - Experis Finance: Director of IT Risk Advisory Services Recorded: Dec 14 2018 60 mins
    Managing cyber risk in today’s digital environment is extremely challenging, whether your organization is public, private or governmental. In response to the growing frequency and severity of cyber-attacks, many organizations have decided it’s time to focus more of their efforts on cyber risk, starting with a cyber risk assessment. This approach to proactively dealing with the risk of cyber-attacks increases the organization’s awareness of the potential impacts and costs, and enables them to take actions that reduce the overall risk to the organization, minimize the impact of cyber-attacks, and more predictably ensure the continuity of essential services.

    This webinar will provide participants with a high-level overview of assessing cyber risk and explore the following:
    •Threats and root causes of breaches
    •The changing regulatory landscape
    •Security frameworks and tools
    •Practical ways to assess your risk and organizational exposure
    •Key elements of a successful cyber risk management program
  • How Process Owners Can Build Their Own ‘Apps’ in 15 Minutes Using SMAX Studio
    How Process Owners Can Build Their Own ‘Apps’ in 15 Minutes Using SMAX Studio
    Neville Ward, Senior Solutions Architect & Noel Hopkinson, Senior Solutions Architect Recorded: Dec 14 2018 28 mins
    Codeless configuration is commonly accepted as the only way to ensure that process modifications can be seamlessly incorporated into software upgrades without requiring teams of programmers to make the changes.

    Join this webinar to discover how Micro Focus Service Management Automation X (SMAX) Studio takes codeless configuration to the next level by enabling new process-based applications to be created in minutes. Designed for IT and line of business personnel, SMAX offers fast and risk-free configuration and extension of service management applications.

    With SMAX, Enterprise Service Management is delivered out of the box and is based on content such as HR workflow management, ideation and proposal management, and portfolio optimization—all of which can be easily extended or complemented with brand new content using SMAX Studio.

    In this webinar, you’ll learn:

    How SMAX Studio offers faster Time to Value and Lower TCO
    How our modern user interface enables the instant creation of new applications
    How the required data model, business rules, forms, notifications, reports, and user-defined actions can be created without coding
  • How to Choose Your Big Data Analytics Solution
    How to Choose Your Big Data Analytics Solution
    Dominic Colson, ITOM Solutions Architect Recorded: Dec 14 2018 21 mins
    In the past, IT operations teams tended to focus on using either big data analytics or machine learning to grow business intelligence. But the big data landscape has evolved, and emerging platforms now combine both types of solutions. The question is, how do you choose the one that’s right for you?

    This 35-minute webinar tells you how. You’ll learn:

    What big data is and where it fits in your IT operation.
    How to ensure comprehensive insight into past, present, and future states of IT systems. (Hint: Employ AIOps platforms that can ingest and access log data, text data, wire data, metrics, and API data.)
    How multivendor solutions can be deployed and supported across both new and existing applications.
    How the Micro Focus solution works (you’ll see a demo) and why it’s worth your consideration.
  • Exploring the benefits of alternative credit
    Exploring the benefits of alternative credit
    Toby Orpin, Martin Reeves and Jonathan Joiner Recorded: Dec 14 2018 12 mins
    In this video panellists discuss alternative credit, ask how schemes can use it in their portfolios and explain the benefits of allocating to this asset class
  • Segurança, Escalabilidade e Econômia de Recursos, por que escolher um só?
    Segurança, Escalabilidade e Econômia de Recursos, por que escolher um só?
    Marcelo Arantes Recorded: Dec 14 2018 45 mins
    A SUSE Fornece uma infraestrutura ágil e simples de gerenciar, com maior velocidade de entrega, durabilidade e confiabilidade. Acelere a inovação e reduza os custos, transformando sua infraestrutura corporativa de armazenamento com uma solução inteligente de armazenamento definido por software, verdadeiramente aberta e unificada.
  • Essential Retail & Retail Design World’s 2018 Round Up
    Essential Retail & Retail Design World’s 2018 Round Up
    Moderators - Caroline Baldwin & Matthew Valentine Recorded: Dec 14 2018 47 mins
    Essential Retail and Retail Design World sit down with a mulled wine (or two) to discuss their favourite retail stories of the year and their predictions for 2019.

    Join editors Caroline Baldwin and Matthew Valentine for their Christmas webinar on the 14 December 2018 to discover:
    •What were the hottest trends of 2018?
    •What is coming around the corner in 2019 in terms of the latest technology and design trends?
    •And the answer to the biggest question of the year – is the high street really dying? Is it a terminal disease or can we save our favourite shops?
  • Visibilità, conoscenza e controllo per potenziare il tuo ecosistema di sicurezza
    Visibilità, conoscenza e controllo per potenziare il tuo ecosistema di sicurezza
    Luca Pesce Recorded: Dec 14 2018 63 mins
    La gestione della sicurezza e la risposta agli eventi informatici sono tra le principali sfide affrontate dalle aziende. La mancanza di visibilità e conoscenza di questi rischi nel tuo ambiente di rete aggrava ulteriormente il problema.

    Guarda questo webinar per scoprire come adottare un approccio olistico e connesso all'orchestrazione della sicurezza. Scopri come implementare policy e controlli di sicurezza più intelligenti per un ambiente di rete più focalizzato, sicuro e conforme. Argomenti del webinar:

    • Realizzare un accesso Single Sign-On (SSO) per il provisioning e la gestione dei servizi di sicurezza per la rete, gli endpoint e il cloud
    • Gestire tutti i processi e i servizi di sicurezza da un’unica e semplice interfaccia cloud comune
    • Ottenere visibilità e consapevolezza situazionale della sicurezza di rete da un unico pannello
    • Assicurare una gestione delle policy priva di errori
    • Implementare ed eseguire il provisioning dei firewall in remoto attraverso il cloud
  • 5 DŮVODŮ PROČ: Commvault appliance znamená snadné a jednoduché nasazení
    5 DŮVODŮ PROČ: Commvault appliance znamená snadné a jednoduché nasazení
    Presentátor: Miroslav Dvořák, Commvault system engineer Recorded: Dec 14 2018 12 mins
    Vážení zákazníci a obchodní partneři,

    prosím přijměte pozvání na další ze série bezplatných webinářů společnosti Commvault, tentokrát na téma: “5 DŮVODŮ PROČ Commvault appliance znamená snadné a jednoduché nasazení”.

    V dnešním dynamicky se měnícím byznys prostředím společností stále více a více volají po komplexním, spolehlivém a rychle implementovatelném řešení pro ochranu dat svých lokalit. Tato prezentace se zaměřuje na 5 důvodů proč Commvault appliance je nejlepší a nejrychlejší cesta k zajištění lepší připravenosti obnovy dat a to od datových center až k regionálním pobočkám.
  • Netzwerk Upgrades bereiten Ihnen Kopfschmerzen?
    Netzwerk Upgrades bereiten Ihnen Kopfschmerzen?
    Daniela Fusaro, Senior Solutions Architect Recorded: Dec 14 2018 18 mins
    Trotz der unstillbaren Nachfrage nach Bandbreite müssen Unternehmen die Sicherheitsrichtlinien des Netzwerks immer noch schnell überprüfen und durchsetzen. Das ist besonders schwierig, wenn Sie Netzwerke von 10 Gb auf 40 Gb oder von 40 Gb auf 100 Gb aufrüsten.

    Nehmen Sie teil am Webcast von Daniela Fusaro, Senior Solutions Architect bei Gigamon. Sie erläutert, wie Sie die mit diesen Netzwerkupgrades verbundenen Sicherheitsrisiken lösen, Ihre Sicherheit stärken, die IT vereinfachen und Kosten senken können.

    Sie erfahren folgendes:
    - Erhöhen Sie Ihren ROI für die Sicherheit: Filtern Sie die richtigen Daten aus dem Netzwerkverkehr der physikalischen, virtuellen und Cloud-Infrastruktur und leiten Sie diese an die relevanten Tools weiter
    - Reduzieren Sie Ihr Sicherheitsrisiko: Überdenken Sie Ihre Netzwerksicherheitsarchitektur neu, indem Sie verschlüsselten Datenverkehr nur einmal entschlüsseln und die Überprüfung dieser Daten durch mehrere Sicherheitstools ermöglichen
    - Verbessern Sie die Reaktion auf Bedrohungen: Erkennen Sie Muster und Bedrohungsvektoren in heterogenen Netzwerken schneller

    Finden Sie heraus, wie sowohl Netzwerk- als auch Security-Teams bei Netzwerk-Upgrades schneller und sicherer zusammenarbeiten können, um Sicherheitsbedenken zu lösen - registrieren Sie sich noch heute!
  • Mitä on Lean ja miten HICCS OHD auttaa kokonaisvaltaisen Leanin käyttöönotossa?
    Mitä on Lean ja miten HICCS OHD auttaa kokonaisvaltaisen Leanin käyttöönotossa?
    Kalevi Kaski ja Niklas Christides Recorded: Dec 14 2018 61 mins
    Webinaarin kuvaus - pitkä
    Mitä on LEAN? Tuohon kysymykseen voidaan vastata hyvin erilaisilla painotuksilla. Webinaarissa lähdetään liikkeelle aiheen alkulähteiltä ja kerrotaan miten länsimaat ”löysivät” Leanin. Samoin tuodaan esiin, miten HICCS OHD auttaa kokonaisvaltaisen Leanin käyttöönotossa?

    Nykyajan suuri haaste on saavuttaa kokonaisvaltainen 'Lean' toiminalle, ja se voidaan ainoastaan saavuttaa kun katsotaan yhtiötä ja sen tehokuutta kokonaisaltaisesti 'organisimi' ajatuksella. Organismi 'yleisesti ottaen' toimii vain optimitasolla, kun kaikki osa-alueet ovat terveitä ja se tekee jatkuvasti työtä sen eteen että se sopeutuisi ja selviää omassa elinympäristössä. Hyvä yhtiö on organisimi joka kehittyy orgaanisesti, liian hitaasti se jää jalkoihin ja liian nopeasti se tuhoaa itsensä.

    HICCS OHD Platform tuo meille työkalun, jolla voidaan kartoittaa yhtiön 'organismin' terveys ja kehitystarpeet helpolla liikennevalo vertauksella. Käytäntö perustuu siihen, että yhtiön tehokkuus ja valmius hoitaa tarvittavat tehtävät ja kartoitetaan kokonaisvaltaisesti kysely muodossa [MS Excel], josta saadaan kuva yhtiön tilasta osa-alueittain.

    Kartoituksen perusteella voidaan tehdä jatkuvuus ja kehityssuunnitelmia, jotka ovat kustannustehokkaita ja aidosti tarpeellisia kokonaiskuvaan ja kehitystarpeisiin nähden. Kannattaa muistaa ja huomioida, että nykymaailmassa ei ole yhtäkään yhtiötä, jolla ei olisi kehitystarpeita.

    Tulevaisuuden 'Lean' yhtiö arvioi itseään kriittisesti, on valmis tekemään vaikeitakin päätöksiä nopeasti, ei hitaasti kuten nykypäivänä ja seuraa omaa kehitystä tarkasti [past, present, future]. OHD tarjoaa yhtiöille mahdollisuuden ottaa ensi-askel kohti kokonaisvaltaista 'Lean' tulevaisuutta.
  • Системы хранения Dell EMC старшего класса: что нового в PowerMax и XtremIO X2
    Системы хранения Dell EMC старшего класса: что нового в PowerMax и XtremIO X2
    Александр Седавных, Системный инженер Recorded: Dec 14 2018 43 mins
    Приходите узнать, что нового появилось в системах хранения Dell EMC старшего класса (High-End Storage). Новый Dell EMC PowerMax, самый быстрый в мире массив, является последним дополнением к нашему лидирующему в отрасли портфелю СХД. PowerMax построен на основе проверенных корпоративных функций VMAX, а также обеспечивает беспрецедентную производительность благодаря технологии NVMe и автоматическому размещению данных для максимальной производительности благодаря встроенному механизму машинного обучения. Эта сессия также посвящена XtremIO X2 - специально разработанному массиву с архитектурой All-Flash, ориентированной на метаданные, и обеспечивающему еще более высокую производительность, большую емкость, сеервисы передачи данных и простоту. «Фишка» сессии - уникальный встроенный механизм репликации XtremIO, основанный на метаданных.
  • Tiedonhallintalaki tulossa, mitä ja kenelle?
    Tiedonhallintalaki tulossa, mitä ja kenelle?
    Jarkko Koivuniemi Recorded: Dec 14 2018 48 mins
    Hallituksen Digitalisoidaan julkiset palvelut -kärkihankkeen päätoimenpiteisiin kuuluu uuden tiedonhallintalain valmistelu. Tiedonhallinnan uudistamisen tavoitteena on varmistaa tietojen monipuolinen, sujuva ja turvallinen hyödyntäminen julkisissa palveluissa. Tulossa on siis uusi tiedonhallintaa koskeva yleislaki, julkisen hallinnon tiedonhallintalaki Laki tulisi voimaan vuoden 2019 alkupuolella. Tule webinaariin kuuntelemaan ajatuksia, mihin pitää varautua.

    Julkisen hallinnon tiedonhallintaon muutosten edessä.

    Sisältö

    - Sääntelykohteet
    - Tiedonhallinta ja tietoturvallisuus
    - Tietoturvallisuussäännöksiä
    - Tekniset rajapinnat
    - VAHTI suositusvaatimukset
    - Asianhallinta ja tietoaineistojen muodostaminen
    - Metatietoa ja rekistereitä
    - Tiedonhallinnan elinkaarikysymykset ja arkistointi
    - JHS-179 ja kokonaisarkkitehtuuri
  • European Commission Technical Expert Group: Call for Feedback on the EU Taxonomy
    European Commission Technical Expert Group: Call for Feedback on the EU Taxonomy
    Elodie Feller | Nathan Fabian | Martin Spolc Dec 17 2018 2:30 pm UTC 60 mins
    The Technical Expert Group on Sustainable Finance set up by the Commission in July 2018 has launched a call for feedback on EU action to develop a unified EU-wide classification system – or taxonomy – for environmentally sustainable economic activities.

    The call for feedback aims to help the Technical Expert Group engage with a broad range of stakeholders and experts and will close on 22 February 2019.
    Find out more: https://ec.europa.eu/info/publications/sustainable-finance-taxonomy_en

    This Webinar will provide background and guidance on the feedback process to support stakeholders and experts interested in contributing.

    Presented by:

    • Martin Spolc, Head of Unit, DG Financial Stability, Financial Services and Capital Markets Union, European Commission
    • Nathan Fabian, Chief Responsible Investment Officer, PRI, Chair of the TEG Taxonomy Working Group
    • Elodie Feller, Investment Programme Lead, UNEP FI, Observer in the Technical Expert Group
  • More Things You Can Do with a Security Policy Management Solution
    More Things You Can Do with a Security Policy Management Solution
    Dania Ben Peretz, Product Manager Dec 17 2018 3:00 pm UTC 45 mins
    Are you getting the most out of your Security Policy Management Solution?

    Today’s security policy management solutions do much more than automate traditional change management tasks. And yet, managing processes is becoming increasingly complex, time consuming and riddled with errors.

    Many professionals believe they need additional sophisticated tools to address these challenges. However, you may already have what you need, up and running in your organization.

    Join us in this webinar to learn how AlgoSec’s solution simplifies and automates security policy management to make the enterprise more agile, more secure and more compliant across your ever-changing network:

    •Gaining visibility of unsecured traffic used by your business applications
    •Closing the gaps in your network map to get your automation in place faster
    •Tying cyberattacks to business impact
    •Being audit-ready all the time
  • 5 things CISOs & CIOs must do in 2019 – Cybersecurity Handbook
    5 things CISOs & CIOs must do in 2019 – Cybersecurity Handbook
    Balaji Desikamani, VP - Marketing & Channel Sales Dec 17 2018 5:00 pm UTC 60 mins
    As year 2018 draws to a close, one thing is clearly evident – more enterprises than ever are getting breached and the traditional line of defenses are simply not holding up! With an unprecedented sophistication to these new breed of cyberattacks, now run by organized syndicates instead of mere criminals, and an equal pressure on resources, CIOs and CISOs are facing a classic dilemma. How does one secure their enterprise and actively reduce risk, while they also strive to empower their employees, organizations and digitally transformed businesses to be productive and competitively agile in the marketplace.

    As the cybersecurity space innovates and evolves, there are clear must-do items that CIOs and CISOs must act upon for dramatically improving their cybersecurity with optimal investment and time. Attend this webinar as Bala Desikamani, Vice President – Marketing, Cyberinc highlights ‘5 things CISOs & CIOs must do in 2019’. He will offer a simple yet highly effective approach that will help leaders secure and significantly mitigate the risk to their businesses while empowering their businesses and employees with a new level of freedom and productivity.

    The webinar will cover

    1. A brief reprise of the harsh realities of Cybersecurity today
    2. Caught in the web: The vicious reactive model of cybersecurity
    3. Breaking free: The Cybersecurity Handbook – 5 thing CISOs and CIOs must do in 2019
    4. The path to get there – dramatically reduce attack surface, unlock value and empower organizations
  • Consumption Based Data Management Providing Peace of Mind
    Consumption Based Data Management Providing Peace of Mind
    Storage Switzerland, Veeam, HPE Dec 17 2018 6:00 pm UTC 60 mins
    Consumption based IT is a curated set of IT solutions that focus on business outcomes. As the name implies it is purchased on a pay-as-you-go model. The goal of consumption based IT is to simplify establishing IT infrastructure that incorporates both the on-premises data center and the cloud to support a wide variety of workloads including traditional transactional databases, big data analytics, containers and many others.

    A key aspect of consumption based IT is how the data created by these workloads will be protected. In fact, the right consumption based IT solution should curate end-to-end backup directly into the solution.

    In our live webinar join Storage Switzerland, Veeam, and HPE to learn about consumption based IT, what to look for in a consumption based solution, how data protection can protect the solution and how data protection can be offered as a consumption based solution protecting both legacy and new architectures.
  • Ask the Expert: Everything You Ever Wanted To Know About SD-WAN
    Ask the Expert: Everything You Ever Wanted To Know About SD-WAN
    Ritesh Mukherjee, Vice President Product Management at 128 Technology Dec 17 2018 6:00 pm UTC 60 mins
    Bring your toughest questions and most important SD-WAN challenges to Ritesh Mukherjee, Vice President of Product Management at 128 Technology.
  • Closing the DevOps/SecOps Security Gap
    Closing the DevOps/SecOps Security Gap
    Bashyam Anant, Vice President Product Management, Cavirin Dec 17 2018 6:00 pm UTC 60 mins
    As 2019 approaches, DevOps & SecOps are looking to minimize the risks due to change management delays and manual processes. Today's existing approaches are good at monitoring and presenting what is wrong, but don’t take that vital next step in automating the correction of any issues.

    In this Webinar we will show you how to close the security gap through auto-remediation, combining AWS Lambda functions and Ansible Playbooks. Auto-remediation extends from your cloud security posture to your VMs and container instances, on-prem, or in the cloud.

    Can't make the date? No problem. Simply complete the registration form and we'll send you the recording to watch at your convenience.

    Earn one CPE credit for attending this webcast.
  • Learn about HYCU Data Protection for Nutanix – Introducing version 3.5
    Learn about HYCU Data Protection for Nutanix – Introducing version 3.5
    Paul Nashawaty, Chief Evangelist | Global Product Marketing Leader HYCU, Inc. Dec 18 2018 5:00 am UTC 30 mins
    Building on HYCU data protection offering for Nutanix, release 3.5 takes the current offering to the next level. The purpose of this session is to provide a brief overview of HYCU then introduce the extended features and enhancements with our latest release. In this session, you will learn about:
    •The added support for Nutanix Volume Groups and why it matters to you
    •Advanced reporting capabilities built into the HYCU user interface – no need to use different tools / interfaces
    •The only simplified protection of SAP HANA leveraging the Nutanix platform
    •And many additional features
  • VMware vSAN Technology: актуальное решение для гиперконвергентной инфраструктуры
    VMware vSAN Technology: актуальное решение для гиперконвергентной инфраструктуры
    Николай Куликов, менеджер по развитию бизнеса VMware Dec 18 2018 8:00 am UTC 60 mins
    Самые «быстрорастущие» продукты Dell Technologies - VxRail и VxRack - основаны на VMware vSAN, ведущем решении хранения для гиперконвергентной инфраструктуры (HCI). Послушайте экспертов, обсудите, как последние инновации vSAN помогают организациям модернизировать свою инфраструктуру и обеспечить общие операции – от границы до ядра сеит и облаков. Узнайте у экспертов, как работают последние функции vSAN.
  • La modernisation de votre architecture de données avec Microsoft Azure
    La modernisation de votre architecture de données avec Microsoft Azure
    Cédric Israel (Informatica et Ludovic Bouaziz (Microsoft) Dec 18 2018 9:00 am UTC 60 mins
    Les data warehouses dans le Cloud public, tel qu'Azure SQL Data Warehouse, offrent des fonctionnalités robustes, ne requièrent pratiquement aucun investissement en amont et s'accompagnent des avantages liés au Cloud : élasticité, évolutivité infinie et agilité.

    Avec les data warehouses dans le Cloud, vous payez pour ce dont vous avez besoin, quand vous en avez besoin, éliminant ainsi la nécessité d'une planification de capacité complexe et d'investissements en capital fixe.

    Le déplacement d'un data warehouse vers le cloud réclame une approche incrémentale et gouvernée afin de délivrer des résultats rapides en assurant le minimum d’interruption dans les applications existantes et les tâches d'analyses de données.

    A l'occasion de ce webinar Ludovic Bouaziz, Pre-sales Engineer Data platform & AI chez Microsoft pour Azure SQL DW et Cédric Israel, Integration Cloud Sales Specialist chez Informatica échangeront sur :

    • Opportunités et challenges rencontrés dans les projets déplacement de data warehouse vers le Cloud
    • Meilleurs pratiques
    • Construction d'un business case et préparation de l'adoption d'Azure

    Durant les 3 prochaines années, plus de la moitié des entreprises seront concernées par l'évolution ou le remplacement de leur système décisionnel et analytique.

    Participez à ce webinar le 18 décembre afin d’apprendre comment initier, rapidement et facilement, votre transition vers le data warehouse Cloud avec Informatica et Microsoft Azure.
  • BL-Global Flexible
    BL-Global Flexible
    Guy Wagner Dec 18 2018 9:00 am UTC 120 mins
  • Cherwell + Everbridge: IT-Services schneller als je zuvor wiederherstellen
    Cherwell + Everbridge: IT-Services schneller als je zuvor wiederherstellen
    Aria Naderi; Zbigniew Skurczynski Dec 18 2018 9:00 am UTC 60 mins
    IT-Vorfälle treten ständig auf, von Ausfällen, Verlangsamungen von Anwendungen bis hin zu Cyberangriffen und einigen, die kritischer sind als andere. Bei IT-Vorfällen, die eine sofortige Aufmerksamkeit erfordern, müssen IT-Experten rechtzeitig einbezogen und verschiedene Gruppen informiert und/oder aktualisiert werden. Die Herausforderung, vor der die meisten Unternehmen stehen, besteht in der Koordination der Reaktion auf IT-Vorfälle, wenn Zeit im Vordergrund steht. Zum Beispiel, wie man:
    Sammeln und verwalten Sie alle relevanten Informationen zentral.
    Identifizieren Sie den geeigneten Informationsaustausch mit verschiedenen Rollen.
    Sicherstellung einer zeitnahen und effektiven Reaktion zwischen den Teams
    Ermöglicht eine effiziente Zusammenarbeit unabhängig vom Standort der Mitarbeiter.

    In diesem Webinar erläutern Aria Naderi von Cherwell und Zbigniew Skurczynski von Everbridge, wie die integrierte Cherwell-Everbridge-Lösung Unternehmen bei der Verwaltung, Kontrolle und Automatisierung ihrer Reaktion auf IT-Vorfälle unterstützt, um die Auswirkungen auf ihre IT-Experten und ihr Unternehmen zu minimieren.
  • Securing the IoT: Keeping planes in the air and the lights on at home
    Securing the IoT: Keeping planes in the air and the lights on at home
    Adam Brady & Mark Baker, LogRhythm Dec 18 2018 9:00 am UTC 48 mins
    The Internet of Things (IoT) will generate, process and share more data than ever before. Data that needs to be secured.

    The data generated by non-traditional sensors and systems can help detect anomalous behaviour and maintain the uptime we expect from the new wave of connected devices.

    In this webinar, LogRhythm’s security experts will explain how this data can be used, with examples from a range of industries – from jet turbine manufacturers to in-home automation providers.

    Join the webinar to discover:
    1. How IoT devices blur the boundaries between IT security, operational technology and security in the physical world
    2. How to gain visibility into the data generated by these devices – and what it really means
    3. What customers have experienced through real-life use cases
  • Authoring in The Lancet — Learn from the Editors!
    Authoring in The Lancet — Learn from the Editors!
    John McConnell, Editor-in-Chief of The Lancet Infectious Diseases Dec 18 2018 9:30 am UTC 75 mins
    Join John McConnell, Editor-in-Chief of The Lancet Infectious Diseases to learn about techniques and strategies for authoring in high-impact journals. Mr. McConnell will present his experience working with researchers and authors throughout the research publishing cycle. You will learn how to develop papers for premium publications, and how to broadly disseminate findings. Do not miss this engaging webinar, join and ask any questions that you feel will benefit your research!
  • Wie rechtfertigen Sie die Kosten eines AppSec-Programms?
    Wie rechtfertigen Sie die Kosten eines AppSec-Programms?
    Julian Totzek-Hallhuber, Principal Solutions Architect at Veracode Dec 18 2018 10:00 am UTC 45 mins
    Traditionell haben die meisten Führungskräfte die IT Sicherheit als notwendiges Übel betrachtet - eine Investition, die nur erforderlich war, um ein schlechtes Ergebnis zu vermeiden, aber nicht als etwas, das neue Kunden einbringen oder den Umsatz steigern würde. Aber das scheint sich zu ändern. Wir stellen zunehmend fest, dass die Erstellung sicherer Software zu einem Wettbewerbsvorteil führt und das Endergebnis steigert.

    Dieses Webinar, das von Julian Totzek-Hallhuber - Principal Solutions Architect bei Veracode gehalten wird, hilft Ihnen dabei, AppSec zu unterstützen. Durch die Darstellung des möglichen ROI einer Cloud-basierten Anwendungssicherheitslösung, die in den Softwareentwicklungslebenszyklus integriert ist, stellen wir Ihnen die Tools zur Verfügung, die Sie zur Erstellung Ihres C-Level-Pitch benötigen.
  • Passwords: The Keys to your (Online) Kingdom
    Passwords: The Keys to your (Online) Kingdom
    David Emm, Principle Security Researcher and Prof. Steven Furnell, Professor of Information Security, University of Plymouth Dec 18 2018 11:00 am UTC 75 mins
    24/7 connectivity is fast becoming an integral part of everyday life. Most of us now routinely bank, shop and socialise online, and the Internet is the life-blood of business.

    Yet too many of us fail to secure our online identities adequately. This presentation will examine why this is important, what we should do to secure our online accounts and how criminals exploit our lack of security.

    **************************************************************************************************

    Steven Furnell is a the Associate Dean and IT Security Professor at the University of Plymouth. His research interests spans multiple areas including: Cyber Security / IT Security, including user authentication, biometrics, cyber crime, intrusion detection and response, security management and culture, usable security; Internet Technologies and Applications; Mobility.
    A published author, Steven will share his insights we can all individually make it harder for Cyber Criminals to access your passwords.

    David Emm is a Principle Research Analyst at Kaspersky Lab and regularly delivers presentations on malware and other IT security threats at industry events, highlighting what organisations and consumers can do to stay safe online. He also provides comment to broadcast and print media on the ever-changing cyber-security and threat landscape. David has a strong interest in malware, ID theft and the human aspects of security, and is a knowledgeable adviser on all aspects of online security.
  • App and Network Attacks
    App and Network Attacks
    Akhilesh Dhawan, Dir of Prod Marketing- Cloud/Security Citrix & Darshant Bhagat, Dir of Prod Management/Strat Citrix Dec 18 2018 11:00 am UTC 47 mins
    Find out how the Citrix Security approach brings together the entire Citrix portfolio to address internal and external threats by providing holistic visibility and proactive protection of your company assets.

    This webinar deep dives into: protection of applications from on-premise to the cloud, hypervisor protection of servers before the threat hits the operating system, and device and user protection from external threats. Proactively counter internal and external threats through analytics.
  • Analytics für alle - Mit Datenvirtualisierung zu Self-Service BI
    Analytics für alle - Mit Datenvirtualisierung zu Self-Service BI
    Thomas Niewel, Technical Sales Director, Denodo Dec 18 2018 1:00 pm UTC 45 mins
    Self-Service-Analytics ermöglicht es Geschäftsanwender Analysen selbständig durchzuführen und sich damit aus der Abhängigkeit der IT zu lösen. Das spart wertvolle Zeit, da Reportings ohne den Umweg über die IT Abteilungen erstellt werden und es Fachabteilungen ermöglicht, kritische Entscheidungen schneller zu treffen.

    In diesem Webinar erläutern wir, wie Sie mithilfe von Datenvirtualisierung, Echtzeitzugriffe auf integrierte unternehmensweite Daten erhalten und eine geeignete Infrastruktur aufbauen um Self-Service-Analysen bereitstellen zu können.

    FRAGEN DIE IN DIESEM WEBINAR BEANTWORTET WERDEN:

    - Wie können fragmentierte Daten nahtlos zusammengeführt werden?
    - Wie lässt sich die wartungs- und kostenintensive Datenintegrationen mithilfe einer virtuellen Datenschicht ersetzen?
    - Wie kann Datensicherheit erhalten und die Herkunft der Daten nachvollziehbar bleiben?


    AGENDA

    1) Das Verspechen von Self-Service BI
    2) Der Aufbau einer Self-Service Infrastruktur
    3) Live Demo
    4) Q&A
  • Ask the expert: Cloud Adoption & Procurement in UK Public Sector
    Ask the expert: Cloud Adoption & Procurement in UK Public Sector
    Nicky Stewart Dec 18 2018 2:00 pm UTC 14 mins
    After presenting your business case it's time to think about procurement - but how do you choose between the government's G-Cloud framework or TS2?

    This session will be presented by our Commercial Director Nicky Stewart who will be answering the most frequently asked questions surrounding procurement

    What you'll learn
    - The main differences between TS2 & G-Cloud
    - The Pros & Cons of using TS2 vs G-Cloud
    - Top Tips for making a succesful bid through either framework

    By clicking through this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Introduction to writing research articles
    Introduction to writing research articles
    Dr Trevor Lane Dec 18 2018 2:00 pm UTC 60 mins
    Join Dr Trevor Lane as he hosts a webinar covering an introduction to writing research articles. In this webinar, you will learn how to write original research articles clearly and concisely and use an appropriate writing style for journals. You will also gain valuable insight into making strategic publication decisions that will help increase your chances of publication success.

    During this webinar you will hear how to:

    1. Make strategic decisions on how and where to publish your work
    2. Identify the features of effective research articles
    3. Devise some strategies to improve your research writing
  • DFLabs’ New Open Integration Framework and Customer Community Portal
    DFLabs’ New Open Integration Framework and Customer Community Portal
    John Moran, Senior Product Manager, DFLabs and Heather Hixon, Senior Solutions Architect, DFLabs Dec 18 2018 3:00 pm UTC 41 mins
    DFLabs’ innovative Open Integration Framework is designed to enable security teams to customize and easily add new automated integrations between their existing security tools and our IncMan SOAR platform, enabling SOCs and MSSPs to add unique incident response actions without the need for complex coding. The new framework is part of DFLabs’ commitment to delivering a more open, community-oriented solution to automation and orchestration, which also includes a new Community Portal.

    The Community Portal serves as a hub for customers, where they can get the latest information and support from DFLabs and interact with other like-minded customers. Moreover, this Community Portal aims to provide a cooperation ecosystem for companies and organizations, where they can share integrations of security tools and IncMan SOAR. This approach will enable our customers to tackle specific use cases by uploading or downloading integration files from the Portal to IncMan SOAR.

    Join this webinar to learn more about these two new exciting features, as well as DFLabs’ other latest developments and enhancements to IncMan SOAR v4.5 including:

    - Open Integration Framework
    - Community Portal
    - Enhanced REST API
    - Automated event triage (START Triage)
    - New bidirectional integrations
    - Improvements to existing integrations
    - And more...
  • Learn about HYCU Data Protection for Nutanix – Introducing version 3.5
    Learn about HYCU Data Protection for Nutanix – Introducing version 3.5
    Paul Nashawaty, Chief Evangelist | Global Product Marketing Leader HYCU, Inc. Dec 18 2018 3:00 pm UTC 30 mins
    Building on HYCU data protection offering for Nutanix, release 3.5 takes the current offering to the next level. The purpose of this session is to provide a brief overview of HYCU then introduce the extended features and enhancements with our latest release. In this session, you will learn about:
    •The added support for Nutanix Volume Groups and why it matters to you
    •Advanced reporting capabilities built into the HYCU user interface – no need to use different tools / interfaces
    •The only simplified protection of SAP HANA leveraging the Nutanix platform
    •And many additional features
  • Discover Storage Spaces Direct in Windows Server 2019 with Dell EMC Ready Nodes
    Discover Storage Spaces Direct in Windows Server 2019 with Dell EMC Ready Nodes
    Steve McMaster, Dell EMC Global Sales Enablement & Cosmos Darwin, Microsoft PM Core OS Engineering Dec 18 2018 3:00 pm UTC 45 mins
    Over 15.000 server clusters run Storage Spaces Direct (S2D) to implement hyper-converged infrastructure (HCI) powered by Windows Server 2016/2019 and based on validated hardware. Join this live webinar to understand why organizations around the world are adopting Storage Spaces Direct, the best-kept secret in HCI, and to learn how Dell EMC together with Microsoft can help you accelerate IT transformation with Dell EMC S2D Ready Nodes. This webinar will also cover the latest news about Windows Admin Center and new storage features in Windows Server 2019.
  • Jingle Bells, Phishing Smells, Hackers Go Away!
    Jingle Bells, Phishing Smells, Hackers Go Away!
    Robert O'Brien, CEO MetaCompliance Dec 18 2018 3:00 pm UTC 30 mins
    Phishing scams are a persistent problem for organisations at all times of the year, however there is a steep increase in the number of scams at Christmas as hackers take advantage of distracted staff to launch targeted attacks.

    When we’re distracted, mistakes happen, and Christmas tends to be the one time of the year when employees let their guard down which can result in a massive loss of sensitive data.

    Cybercriminals don’t care about your internal processes around Cyber Security awareness communication. They are not stifled by the rules around staff communication.

    Cyber Security awareness training needs to be a top priority and it has to be of “stand out” quality. Not the normal “techno porridge” that has been passing for Information Security and Privacy training over the last 15 years.

    Cyber Security awareness is about the hearts and minds of your staff and it’s one of the biggest challenges in this new digital economy. Join us at our short webinar to hear about the best practice approaches to getting employees to participate in securing your digital assets.

    This 15-minute webinar will cover:

    •The seasonal phishing scams your employees need to be wary of
    •The 5 key aspects of a Cyber Security Awareness program
    •How Cyber Security is not about indulging in wishful thinking.
  • IoT Series [Ep.1]: Foundations -- Architecture and Framework
    IoT Series [Ep.1]: Foundations -- Architecture and Framework
    Johna Till Johnson, CEO & Founder, Nemertes Research Dec 18 2018 4:00 pm UTC 60 mins
    Everyone talks about IoT, and many organizations are implementing it and reaping the business benefits. But even those who have had IoT projects deployed for years may not have a comprehensive architecture and framework in place to help guide technology decisions and streamline operations.

    Join Nemertes CEO Johna Till Johnson as she reviews the IoT architecture and framework and shares guidance gleaned from leading-edge clients and research study participants.