Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Software Testing for DevOps - When You’re Not a Unicorn
    Software Testing for DevOps - When You’re Not a Unicorn
    Christopher Condo, Senior Analyst, Forrester and Ingo Philipp, Distinguished Evangelist, Tricentis Recorded: Apr 24 2019 62 mins
    Forrester Senior Analyst Christopher Condo and Tricentis Distinguished Evangelist Ingo Philipp explore how mature organizations can transform their testing processes—achieving the speed and efficiency vital for digital transformation.

    You’ll learn:

    - The realities of DevOps adoption and test automation in mature organizations
    - Where testing processes fall short in the context of DevOps initiatives
    - How to achieve notable test automation and risk coverage gains as efficiently as possible
  • Money and Banking
    Money and Banking
    Mira Lathrop Recorded: Apr 23 2019 60 mins
    Deep dive on the future of money and banking with CFP, certified money coach and creator of the Capital One Money Coaching program
  • 2019 Cyberthreat Defense Report
    2019 Cyberthreat Defense Report
    Mark Bouchard, Co-Founder and COO, CyberEdge Group Ian Farquhar, Distinguished Consultant Sales Engineer, Worldwide Security Recorded: Apr 23 2019 59 mins
    New research from CyberEdge’s 2019 Cyberthreat Defense Report shows that in spite of increasing cybersecurity budgets, organizations are dealing with ongoing cyberattacks, challenges finding and properly utilizing both human and financial resources, and obstacles to threat hunting within their environments. Sign up for this webinar to learn how to:

    •Gain pervasive visibility into your network for better threat hunting
    •Deal with inevitable cyberattacks, including malware, phishing and ransomware, including those that enter the organization via the supply channel
    •Become more effective by delivering optimized traffic to tools
    •Overcome skills shortages and retain key staff through efficiency, automation and orchestration
    •Accelerate deployment and integration of new security tools

    Learn how IT security pros plan to protect themselves against cyberthreats in 2019.
    Register now!
  • An Introduction to KSQL & Kafka Streams Processing with Ticketmaster
    An Introduction to KSQL & Kafka Streams Processing with Ticketmaster
    Dani Traphagen, Sr. Systems Engineer, Confluent + Chris Smith, VP Engineering Data Science, Ticketmaster Recorded: Apr 23 2019 64 mins
    In this all too fabulous talk with Ticketmaster, we will be addressing the wonderful and new wonders of KSQL vs. KStreams.

    If you are new-ish to Apache Kafka® you may ask yourself, “What is a large Apache Kafka deployment?” And you may tell yourself, “This is not my beautiful KSQL use case!” And you may tell yourself, “This is not my beautiful KStreams use case!” And you may ask yourself, “What is a beautiful Apache Kafka use case?” And you may ask yourself, “Am I right about this architecture? Am I wrong?” And you may say to yourself, “My God! What have I done?”

    In this session, we’re going to delve into all these issues and more with Chris Smith, VP of Engineering Data Science at Ticketmaster.

    Watch now to learn:
    -Ticketmaster Apache Kafka Architecture
    -KSQL Architecture and Use Cases
    -KSQL Performance Considerations
    -When to KSQL and When to Live the KStream
    -How Ticketmaster uses KSQL and KStreams in production to reduce development friction in machine learning products
  • Crawler Automation - Selenium vs. Puppeteer (USA time)
    Crawler Automation - Selenium vs. Puppeteer (USA time)
    Rachel Holander, Roi Paz Recorded: Apr 23 2019 18 mins
    Make your crawler be seen as a ‘real-user’ and not get blocked.

    Webinar agenda:
    - Select the right tools for browser automation
    - Selenium vs. Puppeteer, pro and cons
    - Setup Selenium and Puppeteer to work with proxy
    - Proxy manipulation for an automated crawler
    - Setup your Proxy Manager with Selenium and Puppeteer
  • Live Tutorial: Stay Secure and Compliant in the Cloud with CloudCheckr
    Live Tutorial: Stay Secure and Compliant in the Cloud with CloudCheckr
    Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Apr 23 2019 29 mins
    Unlike in the Data Center, where an enterprise had complete responsibility for security, the Cloud is different. There is a Shared Responsibility Model. Cloud providers like Amazon Web Services, Microsoft Azure and Google Cloud take responsibility for items under their control, but customers must secure their data and applications. Fortunately, there are hundreds of Best Practice Checks provided by CloudCheckr, that can help automate this. Additionally, those checks are mapped to compliance standards and CloudCheckr's Total Compliance scores an organization according to 35 distinct regulations including CIS, HIPAA, PCI DSS, NIST and more.

    Just because an enterprise achieves a level of compliance, that doesn't guarantee it will stay there. CloucCheckr's Change Monitoring, combined with Custom Alerts, can help keep a cloud secure. Attendees will learn how CloudCheckr's 550+ Best Practice Checks can help, including automation via Fix Now, Always Fix and Request Fix.

    CloudCheckr is a robust Cloud Management Platform that, in addition to Security & Compliance, delivers Cost Optimization, Automation, and Invoicing capabilities. Look for our other tutorials on those topics.
  • Application platforms as a central component in digital transformation journey
    Application platforms as a central component in digital transformation journey
    Larry Carvalho, Research Director, PaaS, IDC. Tyler Britten, Technical Marketing Manager, OpenShift, Red Hat. Recorded: Apr 23 2019 40 mins
    As businesses in all types of industries are being disrupted by startups, organizations are being challenged to digitally transform themselves. Technology is playing a central role in this transformation, and the demand for applications is increasing to meet transformation goals. Application platforms, which are undergoing a transformation of their own, are playing a central role in accelerating application development.

    Join this webinar to learn about:

    -The evolution of application platforms.
    -How containers are becoming the destination of choice for workloads.
    -How companies are transforming a broad set of existing and new applications.
    -Evolving a culture of greater agility.

    Speakers:

    Larry Carvalho, research director, PaaS, IDC

    Larry Carvalho is research director of IDC's worldwide Platform-as-a-Service (PaaS) research practice. He focuses on the Cloud Applications Platform (CAP)-as-a-Service aspect of PaaS and directs research into the component competitive markets of PaaS, including business process management (BPM) PaaS, database PaaS, cloud testing, and integration PaaS. Larry has extensive experience in systems integration and the enterprise software business.

    Tyler Britten, technical marketing manager, OpenShift, Red Hat

    Tyler Britten is a technical marketing manager for Red Hat® OpenShift® and has spent the last 15 years working with container, cloud, virtualization, and infrastructure technologies. Prior to joining Red Hat, he was a technical advocate for Blue Box, an IBM Company, and principal technical marketing manager and vSpecialist at EMC. Tyler has also been a technical consultant for a small infrastructure reseller, a network engineer for a Fortune 1000 company, and a freelance IT consultant for small businesses.
  • Improve Customer Experiences with Enterprise-Grade Chatbots
    Improve Customer Experiences with Enterprise-Grade Chatbots
    Sebastian Witalec –Senior Developer Advocate Recorded: Apr 23 2019 62 mins
    The right chatbot can improve engagement and help increase customer satisfaction. Kinvey Chat is an enterprise-grade chatbot focused on guiding users to complete tasks without human intervention.

    This webinar examines the different types of chatbots, shows how you can use a chatbot to automate a process, connect to enterprise and cloud data and publish your chatbot to both the web and mobile apps.
  • The Future of Identity Management 2019-2024
    The Future of Identity Management 2019-2024
    Gary Rowe, CEO Principal Consulting Analyst for TechVision Research & Lisa Grady, Solutions Architect with Radiant Logic Recorded: Apr 23 2019 59 mins
    Where is identity management heading in the next five years? Join Radiant Logic and TechVision Research for an important discussion of technology trends and learn how a federated identity and directory service is a vital part of your digital transformation.
    Large enterprises often have complex identity infrastructures already in place; with identity data spread across many heterogeneous data sources—multiple AD domains and forests, other directories, databases, applications, web services/APIs—along with a multitude of legacy applications that rely on those sources. To prepare for the future of IAM, enterprises will generally require a rationalization of, integration with, and ultimately migration to this next generation identity infrastructure.

    This webinar will show you:

    •Technology trends and where identity management is heading in the next five years
    •The role of a federated identity and directory service in digital transformation
    •TechVision Research’s top 10 List of Key Identity Management Trends
  • Immersive Technology-The New Retail Reality
    Immersive Technology-The New Retail Reality
    Hamaad Chippa, Director, Industry Consulting, Retail Recorded: Apr 23 2019 33 mins
    In fact, 8 of 10 retail leaders believe that immersive technologies are a key component of any digital transformation opportunities but have struggled to get much traction from them to date. This must change, and fast as customers have reported that 61% of them prefer stores which offer augmented reality experiences, 71% would return more often and 40% would pay more for a product if they could experience it in AR.

    How can these technologies be considered something more than just gimmicks or games? We’ll explore how important information about customers and products can be used to give these technologies staying power.
  • Optimize Workspace Performance for the Modern WAN
    Optimize Workspace Performance for the Modern WAN
    Valerie DiMartino, Senior Product Marketing Manager at Citrix & Joshua Thompson, Product Marketing Manager at Citrix Recorded: Apr 23 2019 50 mins
    Users in remote and branch locations rely on an optimized network for a superb Workspace experience and high productivity. If your traditional WAN can’t keep up with the bandwidth demands of rich media, high-resolution monitors, virtual, web, and SaaS apps, virtual desktops, and file sync, the user experience — and ultimately the business — will suffer. This webinar explores how Citrix SD-WAN is application aware, allows you to better utilize your existing bandwidth, optimizes the performance of virtual, web, and SaaS apps like Office 365, plus other bandwidth-intensive apps such as VoIP, and ensures always-on connections.

    Learn why your existing WAN may not be able to handle future demands and how to avoid common pitfalls when choosing an SD-WAN solution.

    In this webinar you will learn how to:
    •Enable Internet and SaaS breakout from the branch
    •Increase bandwidth while eliminating outages and interrupted sessions
    •Get deep visibility into the WAN to help you understand the quality of experience
  • Unbreakable API’s: Best Practices for Application Security Testing
    Unbreakable API’s: Best Practices for Application Security Testing
    Eric Sheridan, Chief Scientist, WhiteHat Security Recorded: Apr 23 2019 39 mins
    APIs are doors into your data and applications, so pausing to include security is just as important as securing web applications. In this presentation we will discuss best practices to ensure that APIs have full security coverage, and how teams can find and fix vulnerabilities before problems arise.

    We’ll also cover the inflection points for security assessment in the software development life cycle (SDLC) as they may vary depending on whether the development team is enabling APIs for legacy applications or building new API-first applications. Join us to learn best practices on when to:

    -Perform DAST of APIs for dynamic scanning, and create a plan for remediating/mitigating discovered vulnerabilities
    -Perform SCA & SAST analysis for the API implementation code within the DevOps process
    -Use secure design patterns within the enterprise application architecture
    -Implement a robust feedback loop within the SDLC to act on the findings of various scans
  • ITIL 4: What, How, and Why
    ITIL 4: What, How, and Why
    Lou Hunnenbeck Recorded: Apr 23 2019 61 mins
    Earlier this year, AXELOS, the owners of the ITIL intellectual property, released the Foundation publication and certification part of ITIL 4. But what is it? Our speaker, Lou Hunnebeck, is one of the authors of the new foundation material and the lead editor of the “Direct, Plan & Improve” ITIL 4 publication currently being written. She will speak with us about ITIL 4 and share key information and insights.

    Expect to hear about:
    •The elements and organization of ITIL4 – books and exams
    •How ITIL 4 evolved from earlier versions of the guidance
    •Learning and Certification on ITIL 4
    •Maximizing your value from ITIL 4.

    We’ve all moved into the future. ITIL is doing the same!
  • Tech Tuesday: Measuring Performance of Object Storage
    Tech Tuesday: Measuring Performance of Object Storage
    Ryan Meek, Principal Solution Architect & Michael "Q" Brame, Quality Engineering Lead Recorded: Apr 23 2019 17 mins
    Object protocols and file translations present performance testing challenges that are different from standard file systems. In this webinar, we will identify the relevant performance benchmarks for object storage software testing and discuss best practices for measuring and evaluating performance in object storage systems.
  • Design a Customer Experience Transformation
    Design a Customer Experience Transformation
    Kevin Neher, Partner at McKinsey & Company Recorded: Apr 23 2019 60 mins
    Customer experience is a key part of corporate strategy, but why are so many major transformation efforts frequently failing?

    -Find out common mistakes companies make when attempting to transform their business to meet new customer demands
    - Learn critical elements needed for successful CX transformations, including how to create a clear vision and road map, engage change agents, and determine sequencing.
  • Fighting ATO Attacks: Protect Your Brand and Customers
    Fighting ATO Attacks: Protect Your Brand and Customers
    Alon Shem Tov - VP Product, Ephy Rinsky - Head of Content Recorded: Apr 23 2019 38 mins
    The webinar explains how to balance customer verification measures with defending against attacks that can compromise customer data.

    Watch this session for tips on seeing through common account takeover (ATO) tricks to improve fraud detection efficiency.
  • How to Prevent Mobile App API Abuse: Attacks and Counter-Measures
    How to Prevent Mobile App API Abuse: Attacks and Counter-Measures
    Skip Hovsmith, Principal Engineer & VP Americas, CriticalBlue Recorded: Apr 23 2019 55 mins
    Think a good user authentication solution is enough protection? Think again. Follow the ShipFast courier service’s evolving mobile app and API security defenses as it beats back malicious ShipRaider.

    As ShipFast launches its mobile app with hidden API keys and OAuth2 user authorization, we'll start discussing the existing security threats and how to counter them. Along the way, TLS, certificate pinning, HMAC call signing, app hardening, app attestation and more will strengthen ShipFast's security posture, but ShipRaider will be working hard trying man in the middle attacks, app decompilation and debugging, exploit frameworks, and other reverse engineering techniques to keep exploiting ShipFast's API.

    This fast-paced overview of mobile attacks and counter-measures demonstrates the defense in-depth techniques required to protect both your mobile apps and your API backends.
  • How to Keep Your Cyber Defenders Sharp: Do You have the right people?
    How to Keep Your Cyber Defenders Sharp: Do You have the right people?
    David Morris and Brian Markus Recorded: Apr 23 2019 62 mins
    Tune into this session to learn how to determine if you have the right people with the sharpest skills defending your organization through the use of a Cyber Training Range.

    Learn what are Persistent Cyber Training Range Environments, the benefits and value of a Cyber Training Range and how they help you answer the question ARE WE READY TO DEFEND AGAINST THE NEXT ATTACK?".
  • Operationalize Kubernetes on Azure with Avi Networks
    Operationalize Kubernetes on Azure with Avi Networks
    Pavan Kaushik and Lei Yang Recorded: Apr 23 2019 52 mins
    Microsoft Azure provides the option of a fully-managed Kubernetes orchestration service - Azure Kubernetes Service (AKS) in addition to user-managed Kubernetes running on Azure instances. Avi integrates natively and deeply into both of these deployments in Azure to help autoscale your applications to meet growing demands.
  • How to Use Technology and Innovation to Get the Upper Hand in Recruiting
    How to Use Technology and Innovation to Get the Upper Hand in Recruiting
    Julie Coucoules - Glassdoor; John Leech - St. Jude Children's Research Hospital; Greg Muccio - Southwest Airlines Recorded: Apr 23 2019 52 mins
    Two top companies on the Best Places to Work list this year have vastly different businesses, but they have one thing in common: they’ve implemented some unique strategies to gain significant competitive advantage. In this session, they’ll divulge some of the out-of-the box approaches they use, and how you too can leverage them to be both superior to and different from your competitors.
  • ESG Research: The Hybrid Cloud Tipping Point
    ESG Research: The Hybrid Cloud Tipping Point
    Scott Sinclair, ESG; Michelle Tidwell, IBM, Mike Jochimsen, Kaminario; Eric Lakin, Univ. of Michigan; Alex McDonald, NetApp Recorded: Apr 23 2019 61 mins
    Has hybrid cloud reached a tipping point? According to research from the Enterprise Strategy Group (ESG), IT organizations today are struggling to strike the right balance between public cloud and their on-premises infrastructure. In this SNIA webcast, ESG senior analyst, Scott Sinclair, will share research on current cloud trends, covering:

    •Key drivers behind IT complexity
    •IT spending priorities
    •Multi-cloud & hybrid cloud adoption drivers
    •When businesses are moving workloads from the cloud back on-premises
    •Top security and cost challenges
    •Future cloud projections

    The research will be followed by a panel discussion with Scott Sinclair and SNIA cloud experts Alex McDonald, Michelle Tidwell, Mike Jochimsen and Eric Lakin.
  • Live Demo: Ramping Up People-Centric Cybersecurity
    Live Demo: Ramping Up People-Centric Cybersecurity
    Craig Morell, Security Sales Engineer, Proofpoint Recorded: Apr 23 2019 37 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the second phase of this maturity model, and see for yourself how the tools work. We'll discuss how to:

    1. Identify and remediate account compromise attacks
    2. Solve for data loss through email
    3. Make your users more resilient against attacks through awareness training
  • The Vulnerability Epidemic in Mobile Financial Apps
    The Vulnerability Epidemic in Mobile Financial Apps
    Aaron Lint, Arxan chief scientist | Alissa Knight, Aite Group senior cybersecurity analyst Recorded: Apr 23 2019 45 mins
    What’s standing between many mobile apps and an epic breach? According to new research, about 8.5 minutes.

    A study conducted by global research and advisory firm Aite Group examined the protective capabilities of more than 30 different financial services applications found on the Google Play store. Using commonly available software tools, study author and Aite senior cybersecurity analyst Alissa Knight discovered nearly all of the apps could be easily reverse engineered – in less than nine minutes on average – exposing sensitive information such as personally identifiable information, account credentials, intellectual property, QA/test and production API urls, private certificates, and API keys/locations.

    In this webinar, Knight and Arxan chief scientist Aaron Lint discuss the report findings and share best practices to enhance mobile app protection. You’ll learn:
    -Common app vulnerabilities and the sensitive information they can reveal
    -Top development mistakes that lead to data exposure
    -Strategies for implementing app protection into the software development lifecycle
  • PCI Dream Team: Ask Us Your Toughest Questions [Part 6]
    PCI Dream Team: Ask Us Your Toughest Questions [Part 6]
    Ben Rothke | David Mundhenk | Jeff Hall | Arthur Cooper "Coop" Recorded: Apr 23 2019 61 mins
    With hundreds of different requirements, the various Payment Card Industry (PCI) standards can be overwhelming. While the PCI Security Standards Council has provided lots of answers, the devil is often in the details. Our panelists are some of the top PCI QSA’s in the country, with decades of combined PCI and card processing experiences. They’ve seen it all: the good, bad and ugly; and lived to tell the tale.

    Join Ben Rothke, David Mundhenk, Arthur Cooper, and Jeff Hall for an interactive Q&A session, and get answers to your most vexing PCI questions. No PCI question is out of bounds.

    Speakers:
    - Ben Rothke, Senior Security Consultant at Nettitude
    - David Mundhenk, Senior Security Consultant at Herjavec Group
    - Jeff Hall, Senior Consultant at Wesbey Associates
    - Arthur Cooper "Coop", Senior Security Consultant at NuArx
  • IFRS 16 – Impact on Corporate Treasury
    IFRS 16 – Impact on Corporate Treasury
    Charlie COOKE Apr 24 2019 7:30 am UTC 30 mins
    Hear from Michael Anthony, Managing Director, Global Head of HSBC Thought Leadership and Charlie Cooke, Director HSBC Thought Leadership, as they provide an overview of the key changes introduced by IFRS 16 and the expected impact on risk management, convenants, corporate credit ratings and assets.
  • JOHCM Asia ex Japan Fund & JOHCM Asia ex Japan Small/Mid Cap Fund Q1 19 Update
    JOHCM Asia ex Japan Fund & JOHCM Asia ex Japan Small/Mid Cap Fund Q1 19 Update
    Samir Mehta and Cho-Yu Kooi Apr 24 2019 8:00 am UTC 45 mins
    Samir Mehta, manager of the JOHCM Asia ex Japan Fund and Cho-Yu Kooi, manager of the JOHCM Asia ex Japan Small & Mid-Cap Fund discuss their investment philosophy and approach and gives their thoughts on the current outlook for the Asia region.
  • Fund Update BL Global Flexible and Macroeconomic outlook
    Fund Update BL Global Flexible and Macroeconomic outlook
    Guy Wagner - Fund Manager and Managing Director of BLI Apr 24 2019 8:00 am UTC 60 mins
    Fund Update BL Global Flexible and Macroeconomic outlook with Guy Wagner, Manager of the fund and Managing Director of BLI.
  • Adiós al pensamiento aislado en materia de seguridad
    Adiós al pensamiento aislado en materia de seguridad
    Jesus Diaz Barrero, Manager, Systems Engineering Spain & Portugal Apr 24 2019 9:00 am UTC 135 mins
    Comienza una nueva era de la detección

    Ya está aquí: una estrategia de detección y respuesta que acaba con el pensamiento aislado e integra a la perfección los datos de los endpoints, las redes y la nube para frenar amenazas sofisticadas.

    Jesús Díaz Barrero, ingeniero de Sistemas de Palo Alto Networks España y Portugal, le cuenta sin rodeos cómo Cortex XDR™ ofrece una detección y respuesta nunca vistas.

    La sesión tratará sobre:
    •La importancia de utilizar cualquier fuente de datos
    •El papel del análisis del comportamiento en la detección de amenazas sofisticadas
    •La manera en la que la IA reducirá dramáticamente la complejidad de las investigaciones

    Participe en este seminario web para ser testigo en primera persona de una demostración de Cortex XDR™. Además, tendrá la oportunidad de plantear cualquier duda a nuestro experto durante el turno de preguntas.

    ¿No puede asistir? Inscríbase de todos modos y tendrá acceso a la grabación a la carta.
  • WISSENSMANAGEMENT DER SCHLÜSSEL ZU EINER ZUKUNFT MIT KI
    WISSENSMANAGEMENT DER SCHLÜSSEL ZU EINER ZUKUNFT MIT KI
    Aria Naderi Apr 24 2019 9:00 am UTC 55 mins
    Künstliche Intelligenz, einst auf den Großbildschirm beschränkt, steht den Verbrauchern in Grundform mit Alexa-, Siri- und selbstfahrenden Tesla-Autos zur Verfügung. Aber was bedeutet das für die Wirtschaft? Wir haben vielleicht noch keine Ex-Machina-ähnlichen Roboter, aber engagierte "Futuristen" schließen sich in vielen Unternehmen der C-Suite an, um zukunftssichere Entscheidungen zu treffen und sich auf zukünftige technologische Innovationen vorzubereiten.

    KI-Tools basieren auf datenbankgestützter, prädiktiver Technologie, die die kognitive Leistungsfähigkeit des Menschen verbessert. Lernen Sie mit uns, wie Sie mit guten Wissensmanagementpraktiken eine solide Grundlage für KI-Initiativen schaffen können.
  • The Vulnerability Epidemic in Mobile Financial Apps
    The Vulnerability Epidemic in Mobile Financial Apps
    Aaron Lint, Arxan chief scientist | Alissa Knight, Aite Group senior cybersecurity analyst Apr 24 2019 9:00 am UTC 60 mins
    What’s standing between many mobile apps and an epic breach? According to new research, about 8.5 minutes.

    A study conducted by global research and advisory firm Aite Group examined the protective capabilities of 30 different financial services applications found on the Google Play store. Using commonly available software tools, study author and Aite senior cybersecurity analyst Alissa Knight discovered nearly all of the apps could be easily reverse engineered – in less than nine minutes on average – exposing sensitive information such as personally identifiable information, account credentials, intellectual property, QA/test and production API urls, private certificates, and API keys/locations.

    In this webinar, Knight and Arxan chief scientist Aaron Lint discuss the report findings and share best practices to enhance mobile app protection. You’ll learn:
    -Common app vulnerabilities and the sensitive information they can reveal
    -Top development mistakes that lead to data exposure
    -Strategies for implementing app protection into the software development lifecycle
  • European Corporate Bond Quarterly Update
    European Corporate Bond Quarterly Update
    Felix Freund, Josef Helmes Apr 24 2019 9:00 am UTC 45 mins
    Join Portfolio Managers, Felix Freund and Josef Helmes, as they provide an update on the Standard Life Investments European Corporate Bond Fund and offer their outlook for the coming months.

    If you do not have the facilities to listen online (headphones / speakers) please use the details below:
    Standard International Access +44 (0) 20 3059 2627
    Password: 9975890#
  • A Day in the Life of a SOC Analyst
    A Day in the Life of a SOC Analyst
    Adam Meyers: VP Intelligence - CrowdStrike, Kurt Baker: Senior Director of Product Marketing for Intelligence - CrowdStrike Apr 24 2019 9:00 am UTC 49 mins
    Today’s Security Operation Center (SOC) teams are challenged by the volume and the growing sophistication of cyber threats. The typical SOC receives tens of thousands of alerts each week, yet, due to a lack of time and resources, only a small percentage will ever be investigated.

    This webcast looks at typical SOC activities, including the pitfalls and failures, and offers a new approach to alert investigation and response. Join CrowdStrike VP of Intelligence Adam Meyers to gain an understanding of how integrating and automating threat intelligence with endpoint protection can accelerate incident research, streamline the investigative process and drive better security responses.

    Join this webcast to hear CrowdStrike experts discuss:

    - How you can cut your incident investigation time from 8 hours to 10 minutes
    - How SOC teams can focus on the most relevant threats
    - How you can automatically investigate all incidents, learn from attacks, and accelerate your decision-making and response
    - How to get ahead of adversaries by understanding their motivations and tradecraft, enabling you to predict and anticipate their next move
  • Carmignac - Notre vision des marchés : équilibre des forces
    Carmignac - Notre vision des marchés : équilibre des forces
    Didier Saint-Georges Apr 24 2019 9:30 am UTC 45 mins
    Participez à notre prochaine conférence en ligne avec Didier Saint-Georges, Managing Director et Membre du Comité d’Investissement, qui présentera notre vision des marchés et résumera notre stratégie d’investissement globale.
  • Crawler Automation - Selenium vs. Puppeteer (UK time)
    Crawler Automation - Selenium vs. Puppeteer (UK time)
    Rachel Holander, Roi Paz Apr 24 2019 10:00 am UTC 18 mins
    Make your crawler be seen as a ‘real-user’ and not get blocked.

    Webinar agenda:
    - Select the right tools for browser automation
    - Selenium vs. Puppeteer, pro and cons
    - Setup Selenium and Puppeteer to work with proxy
    - Proxy manipulation for an automated crawler
    - Setup your Proxy Manager with Selenium and Puppeteer
  • Property - An Open and Shut Case: Hawksmoor Funds Q1 2019 Update
    Property - An Open and Shut Case: Hawksmoor Funds Q1 2019 Update
    Ben Conway and Daniel Lockyer with David Chapman Apr 24 2019 10:00 am UTC 45 mins
    Join our webinar for the opportunity to discuss the Hawksmoor Vanbrugh, Distribution and Global Opportunities Funds with the Fund Managers.

    As our award-winning Vanbrugh Fund celebrates its 10th Anniversary and our Distribution Fund passes 7 years, we'll be looking closely at their top quartile performance over these periods. In addition, our Fund Managers will:

    * discuss open-ended property funds
    * explain our more targeted approach to property exposure
    * highlight the major activity within the portfolios during the quarter

    If you are unavailable to listen live, you can also register to access the recording.

    The webinar will run for approximately 20 minutes with another 10 minutes allocated for Q&A. This webinar qualifies for 30 minutes CPD.

    To submit a question ahead of the webinar, please email hannah.isaac@hawksmoorfm.co.uk. Alternatively, questions can be submitted live to the Fund Managers on the day.
  • POWER OF THREE anniversary update - Global Multi Asset Portfolios (GMAP) range
    POWER OF THREE anniversary update - Global Multi Asset Portfolios (GMAP) range
    Trevor Greetham Apr 24 2019 10:00 am UTC 60 mins
    As the GMAP range celebrates its three year anniversary, Trevor will reflect on the GMAP story so far, as well as discuss the investment outlook and introduce the recently launched Multi Asset Strategies Fund designed for investors with an absolute return mindset.
  • Socio-economic impacts of coal power and mining in major coal using economies
    Socio-economic impacts of coal power and mining in major coal using economies
    Paul Baruya Apr 24 2019 11:00 am UTC 45 mins
    The webinar explores the direct and indirect effects of coal-fired power generation. It summarises a report that looks at these impacts with respect to employment and the supply of reliable power generation, especially at a time of uncertainty for many coal communities and economies around the world today.
  • Asia Pacific Equity Income Fund - Q1 update
    Asia Pacific Equity Income Fund - Q1 update
    Tony Jordan Apr 24 2019 11:00 am UTC 45 mins
    Join fund manager Tony Jordan as he presents a Q1 update for the Asia Pacific Equity Income Fund.
  • Why Visual Analytics?
    Why Visual Analytics?
    Grant Lawrence Apr 24 2019 12:00 pm UTC 38 mins
    When you are trying to understand and find key insights from your data, where do you begin?

    There are two popular approaches to visual data exploration-data visualisation and visual analytics. Both methods can help you to better understand your data, and this webinar will show you why.

    You'll discover how visual analysis makes it easy for you to deconstruct your data, quickly identify trends and correlations, get to the bottom of all sticky questions, and improve your reporting efficiency. By doing ad hoc analysis faster, you can put more energy into driving business impact.​

    Join us to learn about:

    The advantages of visual analysis over traditional analysis
    How to take the first step in visual data exploration - answering the 'what' questions
    How visual analytics lets you dig deeper into your data - the power of asking 'why'
  • Technology trends & developments in the wealth management sector
    Technology trends & developments in the wealth management sector
    Stephen Wall, Co-Founder, Head of Marketplace & Content, The Wealth Mosaic Apr 24 2019 12:00 pm UTC 45 mins
    An interview with Christine Ciriani around the topic of technology trends & developments in the wealth management sector.

    Christine is an Industry Partner with Motive Partners, an investment firm dedicated to financial technology. She has more than two decades of experience in advising global and local wealth managers in adding client and market needs through a combination of technology solutions and operational / process efficiency having worked in the US, Europe and Asia. Most recently she was Managing Partner at Capco where she established and led the global wealth practice and was CEO of Switzerland. She is a mentor to F10 and FinTech Fusion incubators in Switzerland.

    In this webinar, our Co-Founder & Head of Marketplace & Content, Stephen Wall, will seek Christine's views in this area including elements like what have been the main focus areas for banks and wealth managers with regard to technology in the last five years, what has the industry achieved thus far, how far into the journey is it, what has it learnt, what is the status today, what more needs to happen, and so on
  • Proactive Preparation: Disaster-Proofing your Data
    Proactive Preparation: Disaster-Proofing your Data
    Seyi Verma, Director of Product Marketing, Druva Apr 24 2019 12:00 pm UTC 56 mins
    Imagine that you're responsible for a massive construction project and you just lost your data due to a disaster. Blueprints? Gone. Timelines? Gone. Drinks? Might be time for one!

    Losing your data is a reality that every company faces—construction is no exception. That's why Egan Company—a leading specialty trades contractor in Minnesota, unsatisfied with their previous backup products)—turned to Druva Phoenix to ensure their critical data was backed up and fully accessible in the event of a disaster.

    Join this informative webinar with experts from Egan Company and Druva, and learn about:

    - The flexibility, security and value of data protection delivered as-a-service in the cloud
    - How Egan Company enjoys fast, reliable restores, including large-scale VM volumes
    - How Druva Phoenix offers the go-to solution for backup, archival, and disaster recovery
  • How to Protect Cloud-Based APIs from Data Scrapers and Cloned Apps
    How to Protect Cloud-Based APIs from Data Scrapers and Cloned Apps
    David Stewart - Co-Founder, CriticalBlue and Stephen Gorton -Technical Architect, Racing Post Apr 24 2019 12:00 pm UTC 46 mins
    If you are deploying APIs, even private ones, you are leaving your revenue stream open to exploitation. APIs are a window into your business and if there is a way to make a gain from abusing that API, someone will do it. Worse, thousands of people or thousands of bots may do it.

    The art of keeping scripts and bots from abusing your APIs requires you to validate that the incoming traffic is coming from an authentic client. Merely authenticating users may not be appropriate or may not be enough. When the remote client is a mobile app and you know that mobile devices should not be trusted, achieving the authentication goal is easier said than done.

    This session will explain how Racing Post launched a feature-rich API and a new native mobile app and managed to protect their valuable data from API scrapers and their brand reputation from cloned apps. We will cover their experiences with bots, their approach to the problem and how they solved it.

    Whether you are a mobile or API developer, an enterprise system architect, or even a product owner with strong mobile revenue, you'll want to hear this story.
  • Q1 Overview - LF Gresham House UK Micro Cap Fund
    Q1 Overview - LF Gresham House UK Micro Cap Fund
    Ken Wotton and Brendan Gulston Apr 24 2019 1:00 pm UTC 45 mins
    Hear from our Fund Managers, Ken Wotton and Brendan Gulston, as they share views on the market and discuss performance over the first quarter of 2019.

    Please note Livingbridge Equity Funds has been renamed Gresham House Equity Funds following the sale in November 2018.
  • Quilter Cheviot MPS Q1 2019 review
    Quilter Cheviot MPS Q1 2019 review
    Simon Doherty and David Butler Apr 24 2019 1:00 pm UTC 60 mins
    Join Simon Doherty, Lead Portfolio Manager of the MPS strategies, and David Butler, Strategic Accounts Director on 24th April at 14:00 BST as we discuss performance for the MPS models over the first quarter and what we can expect at a critical juncture for markets.
  • Investing in The New Kuwait | KUW8
    Investing in The New Kuwait | KUW8
    HANetf | FTSE Russell Apr 24 2019 1:00 pm UTC 60 mins
    HANetf and guests uncover the transformation of the Kuwaiti economy and the opportunities for investors in this unique emerging market.
  • How to Build a Security Visibility Strategy in the Cloud
    How to Build a Security Visibility Strategy in the Cloud
    Dave Shackleford, SANS | David Aiken, AWS Marketplace Apr 24 2019 1:00 pm UTC 60 mins
    True accountability for the security of cloud-based assets requires visibility into the events and behaviors that move into and through your cloud environment. Security today relies on visibility in several areas: networks, systems, storage and applications.

    In this recorded webcast, SANS Analyst and cloud security expert Dave Shackleford explains how visibility in the cloud differs from more traditional security visibility and suggests how organizations can move toward establishing a cloud visibility strategy, using practical examples to illustrate the process.

    Attendees will learn about:
    - Types of visibility needed today
    - Event data and information available in the cloud
    - Cloud-native controls offered by services providers
    - Third-party options to enhance monitoring and visibility strategies
    - How to tie event monitoring, vulnerability scanning and control planes together to enhance visibility

    Register for this webcast to be among the first to receive the associated whitepaper written by Dave Shackleford.

    Speaker Bios

    Dave Shackleford, a SANS analyst, instructor, course author, GIAC technical director and member of the board of directors for the SANS Technology Institute, is the founder and principal consultant with Voodoo Security. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering. A VMware vExpert, Dave has extensive experience designing and configuring secure virtualized infrastructures. He previously worked as chief security officer for Configuresoft and CTO for the Center for Internet Security.

    David Aiken is a Solutions Architect Manager at AWS Marketplace and is an AWS Certified Solutions Architect. He leads a team of specialist SA's that help customers implement security and governance best practices. His skills include cloud computing, enterprise architecture, agile methodologies, web services, and software design and development.
  • JOHCM Global Emerging Markets Opportunities Fund Q1 19 Update
    JOHCM Global Emerging Markets Opportunities Fund Q1 19 Update
    James Syme, Paul Wimborne Apr 24 2019 2:00 pm UTC 45 mins
    James Syme and Paul Wimborne, co-manager's of the JOHCM Global Emerging Markets Opportunities Strategy, review the Strategy's performance over Q1 2019 and provide an update on the team's outlook for the asset class and current portfolio positioning.
  • Dimension Data – Connecting the world to the Cape Epic
    Dimension Data – Connecting the world to the Cape Epic
    Kevin Vermaak: Cape Epic Race Founder and Wolf Stinnes: Dimension Data Chief Solutions Architect Apr 24 2019 2:00 pm UTC 60 mins
    Connecting the Cape Epic across all terrains is no small feat. Dimension Data's technology solution delivers a world class digital solution to the public, the riders, the fans and the event organisers, in some of the most remote, rugged and beautiful parts of the world. We’ll be joined by the founder of the Cape Epic, Kevin Vermaak and Dimension Data’s Chief Solutions Architect as we delve into exactly how this incredible race all comes together.