Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • GDPR Introduction
    GDPR Introduction Manish Walia and Munaf Razzak Recorded: Dec 16 2017 55 mins
    The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU). The session is an introduction to what are some of the key regulations that are being introduced.
  • [Webinar] Shifting Left Without Sacrificing Security and Compliance
    [Webinar] Shifting Left Without Sacrificing Security and Compliance Maya Ber Lerner, VP of Product, Quali Recorded: Dec 15 2017 25 mins
    Deliver Production-like Environments Early in the Dev/Test Lifecycle
    As a growing number of financial enterprises look into adopting Cloud and DevOps, environment complexity is often cited as one of the top barriers for such initiatives. Focusing on a Shift Left philosophy to deliver production-like environment access early on in the dev/test lifecycle can tremendously increase quality, cut down the cost to fix issues and, more importantly, increase innovation speed. This webinar will cover an example of using cloud sandboxes for allowing access to authentic replicas of production environments, allowing financial firms to focus on release software faster without sacrificing security and compliance.
  • Build Your Angular Apps with Sencha Components
    Build Your Angular Apps with Sencha Components Marc Gusmano, Solutions Architect at Sencha Recorded: Dec 15 2017 61 mins
    Attend this hands-on webinar where you will learn how your Angular app can immediately gain access to hundreds of features, components, and widgets from Sencha, all synched to work together!

    Join us and you will:

    - See why Sencha isn’t just Ext JS anymore - including how we are helping Angular and React developers
    - Understand the benefits of our 115+ commercially tested and supported components – a lifeline when your app is on the line
    - See real examples of:
    -->Data Analytics - Grids, Pivot Grids, Analysis, Exports, Excel
    -->Visualization tools – Charts, D3 Visualizations
    -->Prebuilt packages - Calendar, Forms, Tabs, Menus
  • Exclusive Healthcare Webinar: Anatomy of an Email-Borne Attack
    Exclusive Healthcare Webinar: Anatomy of an Email-Borne Attack Bob Adams, Mimecast Cybersecurity Expert; David Hood, Mimecast Director of Product Marketing Recorded: Dec 15 2017 62 mins
    Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going away anytime soon. Join us for Anatomy of an Email-Borne Attack where we'll paint the current healthcare threat landscape for attacks and demonstrate an actual live “hack.”
  • Intelligent Workload Placement and Optimization
    Intelligent Workload Placement and Optimization Bobby Allen, Dir of Technical Services, CloudGenera and Jim Wittry, GM Alliances & Channel, CloudGenera Recorded: Dec 15 2017 53 mins
    The audience will be exposed to a SaaS based analytics platform that allows them to define and or defend their Cloud/ Hybrid IT Strategy. Users have to ability to quickly review, substantive venue analysis for workload placement, with the ability to run “what if scenarios” as well for PVC-Hosted Environments and or Public Cloud as alternative Venues. You are guaranteed to learn something about Cloud and Workload placement that you can apply to your business immediately.
  • Barefoot Deep Insight (TM) - See What Every Packet is Doing in Your Network.
    Barefoot Deep Insight (TM) - See What Every Packet is Doing in Your Network. Nick McKeown, Chief Scientist and Co-Founder. Roberto Mari, Director, Product Management Recorded: Dec 15 2017 59 mins
    A breakthrough in network monitoring, Barefoot Deep Insight is first to provide the four ground truths for every packet in the network:

    1. How did it get here? The sequence of switches the packet visited along its path.

    2. Why is it here? The set of rules it matched upon at every switch along the way.

    3. How long was it delayed? The time it spent buffered in every switch, to the nanosecond.

    4. Why was it delayed? The packets, flows, and applications that the packet shared each queue with.

    Armed with this information, Deep Insight detects almost any anomaly in the network.

    This webinar will cover the concepts used and the technology behind Barefoot Deep Insight network monitoring and analytics system.
  • Security Review & 2018 Predictions for Financial Services
    Security Review & 2018 Predictions for Financial Services Adam Hamm, Managing Director, Protiviti Global Consulting Recorded: Dec 15 2017 62 mins
    The regulators are coming regarding cybersecurity. Are you ready?

    Join this interactive webinar to learn more about:
    - The NYDFS Part 500 cyber regulations, including insights on implementation and auditing
    - Review the NAIC's new Insurance Data Security Model Law adopted on October 24, 2017

    About the Presenter:
    Adam Hamm is a Managing Director at Protiviti Global Consulting who serves financial services industry clients across the country regarding risk, compliance, and cybersecurity matters. He has deep knowledge of financial services regulation with hands on experience in all insurance supervision and policy related matters. Before he joined Protiviti in January 2017, he was a former President of the National Association of Insurance Commissioners (NAIC), Chairman of the NAIC’s Cybersecurity Task Force, Principal on America’s Financial and Banking Information Infrastructure Committee (the primary national regulatory cybersecurity committee for the financial services sector), Principal on the United States Financial Stability Oversight Council (FSOC), and North Dakota’s elected insurance commissioner from 2007-2016. Adam also spent ten years as a violent crimes prosecutor and civil litigator.
  • How Cryptocurrencies are Changing the Face of Financial Services
    How Cryptocurrencies are Changing the Face of Financial Services Eric Larchevêque, CEO at Ledger and Joe Pindar, CTO Office Director of Strategy Recorded: Dec 15 2017 61 mins
    Joint webinar with Ledger and Gemalto discussing how cyrptocurrencies have the potential to revolutionize the financial industry and what needs to be done to secure the digital assets.
  • Using Analytics to Protect At-Risk Children
    Using Analytics to Protect At-Risk Children Beena Tharakan, Ernst & Young and Greg Henderson, SAS Recorded: Dec 15 2017 64 mins
    One of the paramount responsibilities of government is the protection of the welfare of youths and children. Study after study has demonstrated the correlation between contact and interaction with child protective services and later quality-of-life outcomes. And on too many occasions, at-risk youth become tragic statistics before they reach adulthood.

    In the on-demand webinar Using Advanced Analytics to Protect At-Risk Children, hosted by Institute of Public Administration of Canada (IPAC) Chief Executive Officer Robert Taylor, experts from SAS Institute and Ernst & Young discuss the challenges facing child welfare professionals, how data from disparate sources can flag high-risk situations, and how an evidence-based approach, focused on outcomes for at-risk children, can be driven through the operation, from policy-makers to program managers to front-line workers and improve outcomes.
  • Cryptocurrency in your hands: Interview with Revolut
    Cryptocurrency in your hands: Interview with Revolut Ina Yulo, Senior Content Strategy (BrightTALK) and Lewis Stuff, Lead Platform Engineer (Revolut) Recorded: Dec 15 2017 48 mins
    Aside from hitting 1 million customers, digital bank Revolut has just announced that they will be launching a feature which will allow users to purchase Bitcoin, Litecoin, and Ethereum, and will look to expand to other cryptocurrencies soon after.

    BrightTALK's Senior Content Strategy Manager for FinTech and Financial Services, Ina Yulo, chats with Lewis Tuff, Lead Platform Engineer for Revolut.

    Aside from opening up to questions from the audience, they will discuss:
    -How will the new cryptocurrency feature work?
    -How to buy, sell, exchange, transfer cryptocurrencies with Revolut - Demo of the new feature
    -Which cryptocurrencies will be in phase 2?
    -Plans for expansion to North America, APAC, and the Middle East
    -The importance of Revolut's European Banking License application

    Ask your questions ahead of time on Twitter using #BrightTALKRevolut
  • The 2018 Cyber Threat Predictions from FortiGuard Labs
    The 2018 Cyber Threat Predictions from FortiGuard Labs Derek Manky, Global Security Strategist, Fortinet Recorded: Dec 15 2017 6 mins
    Join Derek Manky, Global Security Strategist at Fortinet, to learn about the top Threat Predictions for 2018, as identified by FortiGuard Labs' 200 expert threat researchers, and gain the latest intelligence on the threat landscape and our predictions for every critical area including malware, botnets, mobile threats and more.

    You can also access our 2018 Threat Prediction Report attached to understand what cybercriminals have in store for us and what you, as an IT security professional, should be most prepared to address.
  • Warum Veeam und Pure Storage so gut zusammenpassen
    Warum Veeam und Pure Storage so gut zusammenpassen Jörg Schneider, Systems Engineer, Pure Storage Recorded: Dec 15 2017 36 mins
    Kurzer Überblick zu Veeam und Einblicke in die Story von Veeam. Darüber hinaus berichte ich über die Integration von Veeam und Pure Storage.
  • Paysage des menaces : tendances cyber sécurité 2017 et au-delà
    Paysage des menaces : tendances cyber sécurité 2017 et au-delà Laurent Heslault, Directeur des Stratégies de Sécurité, Symantec France Recorded: Dec 15 2017 56 mins
    L’année qui s’achève a été essentiellement marquée par des attaques coûteuses, des fuites de données retentissantes et plusieurs cas de ransomwares et d’espionnage économique. La cyber criminalité a gagné en ampleur et en audace, avec des retombées financières bien plus élevées. Les cyber attaques sont désormais régulièrement citées dans les médias.
    Ce webcast aborde les points suivants :
    • Le paysage des menaces en 2017
    • Les personnes ou les erreurs qui ont conduit à ces incidents
    • Les enseignements à tirer de cette année pour les professionnels de la sécurité comme vous
    • Les solutions qui peuvent renforcer votre sécurité à l’approche de 2018
    Inscrivez-vous
  • Financial Crime and the European Precious Metals and Stones Industry
    Financial Crime and the European Precious Metals and Stones Industry Moderator: Samantha Sheen | Speakers: Dr Frédéric Massé, Jean Claude Michelou and Trisevgeni Stavropoulos Recorded: Dec 15 2017 61 mins
    Due to characteristics including high value, portable, virtually untraceable and odourless commodities, precious metals and stones are often exposed to elevated levels of money laundering risks. Money launderers and terrorist financers are drawn to precious metals and stones—especially diamonds since they are often highly valuable relative to their weight and also have a relatively stable price. During this informative webinar, our experts will explore initiatives undertaken by an organisation involved with one of the largest diamond dealer communities in Europe to raise awareness and bolster measures that can be taken to prevent the misuse of these products.

    Learning Objectives:
    •Raising awareness about how precious metals and stones are used to launder proceeds of crime
    •Analysing current typologies involving the use of precious metals and stones to move proceeds of crime and conceal its detection
    •Understanding measures that European diamond dealers are taking to comply with AML regulatory requirements
  • Новые возможности СХД Dell EMC класса Mid-Range: Unity и SC All Flash
    Новые возможности СХД Dell EMC класса Mid-Range: Unity и SC All Flash Артур Вартанян Recorded: Dec 15 2017 45 mins
    В рамках вебинара будут озвучены ключевые обновления технологий в СХД Unity и SC AFA от компании Dell EMC, которые станут доступны заказчикам в декабре 2017 года – январе 2018 года. Вебинар направлен на специалистов по продажам и технических экспертов. На русском языке - in Russian language.

    Вебинар проводится при поддержке компании Intel.
  • Combata las amenazas avanzadas con SonicWall Hosted Email Security
    Combata las amenazas avanzadas con SonicWall Hosted Email Security Maria Garcia Recorded: Dec 15 2017 41 mins
    Participe en nuestro seminario virtual sobre la seguridad de correo electrónico hospedada Combata las amenazas avanzadas con SonicWall Hosted Email Security el viernes, 15 de diciembre a las 11:30 h CET.

    El correo electrónico continúa siendo vital para los negocios. Sin embargo, a medida que crece el volumen de correos electrónicos, aumenta también la cantidad de ataques de ransomware, phishing, compromiso del correo electrónico de negocio (BEC), spoofing, spam y virus.

    Los cibercriminales falsifican direcciones de remitentes de correo electrónico para engañar a los destinatarios, dañando así a marcas legítimas sin que éstas lo sepan. Las organizaciones pueden sustituir sus soluciones antiguas por la solución de seguridad de correo electrónico basada en la nube asequible y fácil de usar de SonicWall, que ofrece protección contra el dinámico y cambiante panorama de las amenazas de correo electrónico.

    En este seminario virtual, obtendrá información sobre los siguientes temas:
    •Protección contra las amenazas de correo electrónico avanzadas
    •Cómo la seguridad de correo electrónico hospedada de SonicWall mejora MS Office 365
    •Otras ventajas del servicio de suscripción de seguridad de correo electrónico basado en la nube
  • Votre proxy gagne en agilité grâce à l’isolation web
    Votre proxy gagne en agilité grâce à l’isolation web Hervé Doreau, Directeur Technique, Symantec France Recorded: Dec 15 2017 27 mins
    Saviez-vous que des millions d’hôtes (domaines, sous-domaines ou adresses IP) apparaissent chaque jour et que, dans bien des cas, leur durée de vie ne dépasse pas 24 heures ?
    De nombreuses entreprises choisissent d’instaurer des politiques de passerelles web sécurisées afin d’empêcher les utilisateurs d’accéder à des sites non classifiés à cause du risque qu’ils représentent, même si la plupart sont tout à fait légitimes dans le cadre d’un usage professionnel.
    De la même façon, beaucoup d’entreprises décident de bloquer des sites dès lors que le niveau de risque est fort, sans être totalement avéré.
    En découle un blocage excessif des sites web qui nourrit l’insatisfaction des utilisateurs.
    Certains sites sont réputés pour leur fiabilité, d’autres pour leur dangerosité. Les sites qui posent vraiment problème sont ceux qui se situent entre les deux, lorsqu’il n’y a pas suffisamment de recul ou d’informations.
    Principaux thèmes abordés :
    - Découvrez le plus grand réseau civil d’intelligence sur les menaces au monde et la protection qu’il peut vous apporter face aux attaques de malware.
    - Apprenez à définir des politiques permettant d’isoler tout le trafic dont le risque est indéterminé ou non classifié par le Global Intelligence Network.
    - Sachez comment booster la productivité de l’entreprise sans créer de risques supplémentaires.
    Inscrivez-vous dès aujourd'hui.
  • Combattre les menaces avancées avec SonicWall Hosted Email Security
    Combattre les menaces avancées avec SonicWall Hosted Email Security Sylvain Stahl Recorded: Dec 15 2017 33 mins
    Rejoignez-nous le vendredi 15 décembre à 10h00 CET pour le webcast consacré à la sécurité de messagerie hébergée : Combating Advanced Threats with (Combattre les menaces avancées avec SonicWall Hosted Email Security).

    La messagerie reste essentielle pour l’entreprise. Mais l’augmentation en volume des messages électroniques entraîne parallèlement la prolifération des ransomwares, du phishing, des menaces de type BEC (Business Email Compromise), du spoofing et autres attaques de virus.

    Les cybercriminels falsifient les adresses e-mail des expéditeurs pour tromper les destinataires et portent par là même préjudice aux marques légitimes. Les entreprises ont tout intérêt à remplacer leurs solutions actuelles par la solution Cloud conviviale et économique SonicWall de sécurisation de la messagerie afin de se protéger d’un paysage de menaces dynamique et changeant.

    Dans ce webcast, vous en saurez plus sur les thèmes suivants :
    •Protection contre les menaces avancées véhiculées par e-mail
    •Comment la sécurité de messagerie hébergée SonicWall améliore MS Office 365
    •Autres avantages du service Cloud de sécurisation de messagerie par abonnement
  • Mitä uusi tietosuoja-asetus tarkoittaa johdon näkökulmasta?
    Mitä uusi tietosuoja-asetus tarkoittaa johdon näkökulmasta? Jarkko Koivuniemi Recorded: Dec 15 2017 52 mins
    Uusi tietosuoja-asetus ja laki on tulossa, oletko valmistautunut? Mitä konkreettisesti tarkoittaa osoitusvelvollisuus? Lain henki tulee pystyä osoittamaan ohjeistuksen, toimintamallien ja dokumentoinnin avulla. Tule kuuntelemaan lisää, mitä tämä tarkoittaa johdon ja esimiesten näkökulmasta. Tunne rekisterinpitäjän vastuut ja velvollisuudet. Miten johdon pitää valmistautua ja onko roadmap jo hallussa?

    Webinaarin sisältö:

    - EU:n tietosuoja-asetuksen ja lain velvoitteet johdolle
    - Henkilötietojen käsittelyprosessit ja dokumentointi
    - Rekisterinpitäjän ja käsittelijän vastuut
    - Rekisteröityjen oikeuksien toteutuminen
    - Tietosuojavastaavan nimeäminen
    - Tietosuojan hallintatyön järjestäminen ja organisointi
    - Riskienhallinta
    - Seuraamukset ja sanktiot
    - Tiedonsiirron edellytykset mm EU:n ulkopuolella
    - Tietojärjestelmäarkitehtuurin vaatimukset
    - Sopimusten hallinta tietosuoja-asetuksen näkökulmasta

    Puhuja:

    Jarkko Koivuniemi, Senior Consultant, Digitrain Oy

    Jarkko on pitkän linjan IT-alan yrittäjä ja moniosaaja. Viime aikoina pääpaino on ollut tietosuojassa, kokonaisarkkitehtuurissa ja digitalisaatiossa.
    Tällä hetkellä Jarkko toteuttaa useammalle asiakkaalle tietosuojan hallintamallien tekemistä ja konsultointeja.
    Asiakkaita löytyy mm Valtion hallinnosta, sairaanhoitopiireistä, kaupungeista, kunnista, kolmannelta sektorilta ja eri toimialoilla olevista yrityksistä.
  • The Dreamforce Dialogues: Applying the Best of DF17 to your 2018 Event Strategy
    The Dreamforce Dialogues: Applying the Best of DF17 to your 2018 Event Strategy Angelina Elhassan, James Huddleston, & Lillian Bui Recorded: Dec 14 2017 57 mins
    Join Certain, Demandbase, and Radius as we discuss the ins and outs of our events strategy in a live webcast on Thursday, December 14th at 1pm. From the planning timeline to key successes and challenges, we’re taking a look behind the curtain.

    You’ll walk away knowing how to:
    -Strategize your presence at conferences & tradeshows to make the most impact
    -Measure leading indicators of success and KPIs post event
    -Allocate your budget in the best way possible
  • The Last Mile: Implementing Your Data Strategy
    The Last Mile: Implementing Your Data Strategy Jen Underwood, Founder & Principal Consultant of Impact Analytix & Peter Sprague, VP of Product Management, Pyramid Analytics Recorded: Dec 14 2017 49 mins
    Data leaders face a daunting challenge: implementing enterprise-wide data strategies that deliver tangible wins without sacrificing security, agility, and transparency. To successfully implement their strategies, they must approach this by deploying a solution that leverages existing investments while meeting changing organizational needs. We will discuss best practices for taking their data strategies through the last mile and how an Analytics OS makes it possible.

    Key Takeaways:
    * Understanding of the need for an analytics strategy
    * Best practices around implementing an analytics strategy
    * How the needs of an analytics strategy tie in to the design of an analytics operating system
  • Maximize Business Critical Decision Making with an Innovative Big Data Platform
    Maximize Business Critical Decision Making with an Innovative Big Data Platform Laura Finkelstein, Director of Product Management, Netapp & Santosh Rao, Sr. Technical Director, NetApp Recorded: Dec 14 2017 58 mins
    It’s clear Big Data Analytics drives profitability and is becoming essential to the success of enterprises. Unfortunately, first generation, share-nothing analytics platforms are not sufficient to meet the security, reliability, scalability or performance requirements of business-critical applications. They lack fundamental capabilities necessary to protect critical data, drive costs down, and provide the flexibility needed to meet evolving needs.

    First generation Big Data Analytics platforms are built around clusters of individual compute platforms with internal direct-attached storage (DAS), but this architecture is inherently problematic and non-scalable. Component failure, particularly DAS, can cause the analytics’ process to fail or drastically slow down. There is no convenient way to back up the data and quickly restore it, nor any way to manage the data life cycle as analytics become core to the enterprise and the datasets grow exponentially. It is difficult to scale compute and storage elements independently, or even at all. In this webcast learn how an Innovative Big Data Analytics platform addresses and overcomes these challenges.

    This new, highly scalable analytics approach provides far more flexibility, and effortlessly leverages the cloud in combination with on-premises resources. Compute and storage infrastructure can be scaled independently – driven only by current requirements. Analytics applications can now efficiently access data directly from existing enterprise storage systems, eliminating unnecessary replication of data. See how an innovative big data analytics platform can reduce server, storage and software license costs by optimizing resource utilization, and provide all the data security, scalability, performance, and analytics capability required by your enterprise.
  • The Importance of Communicating with Images and Video
    The Importance of Communicating with Images and Video Ryan Knott, TechSmith Corporation Recorded: Dec 14 2017 56 mins
    Humans are hardwired for communicating with visuals. Learn some eye-opening statistics on engagement with video and images, as well as some best practices for improving your marketing and social media videos. Learn how you can use video and visuals to better engage your customers.

    Join Val Swisher, sitting in for Scott Abel, The Content Wrangler, and Ryan Knott, Public Relations Specialist at TechSmith, for this free, one-hour webinar. Attendees will learn why visuals and video are so important to your marketing content, why perfection is killing your marketing videos, and three easy ways to improve your video process.
  • Combating Advanced Threats with SonicWall Hosted Email Security
    Combating Advanced Threats with SonicWall Hosted Email Security John Aarsen Dec 18 2017 9:00 am UTC 75 mins
    Join us on Monday, December 18th at 9 a.m. GMT for the hosted email security webinar, Combating Advanced Threats with SonicWall Hosted Email Security.

    Email continues to be vital to business. However, as the volume of email increases, so too does the amount of ransomware, phishing, business email compromise (BEC), spoofing, spam and virus attacks.

    Cyber criminals falsify email sender addresses to fool recipients and inflict damage to unknowing, legitimate brands. Organizations can benefit from replacing legacy solutions with SonicWall’s easy-to-use, affordable cloud-based email security solution that defends against the dynamic, evolving email threat landscape.

    In this webinar, gain insights on:
    •Protection against advanced email threats
    •How SonicWall hosted email security enhances MS Office 365
    •Other benefits of the cloud-based email security subscription service
  • 2018 Predictions & Recommendations: Financial Services
    2018 Predictions & Recommendations: Financial Services Lawrence Chin, Security Market Architect, Palo Alto Networks Dec 18 2017 2:00 pm UTC 30 mins
    Join Lawrence as he looks into the SWIFT mandatory security controls and what that means for financial institutions in 2018.

    Discover more by reading the blog in the attachments.
  • How to Prepare for GDPR: A Gemalto Case Study
    How to Prepare for GDPR: A Gemalto Case Study Jean-Pierre Mistral, Director of Global Data Privacy and Alex Hanway, Encryption Product Marketing Dec 18 2017 4:00 pm UTC 60 mins
    Join us for a new webinar in our series focused on helping companies prepare for the upcoming global government regulations, like European General Data Protection Regulation (GDPR). Data sovereignty, especially for cloud-first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.

    This webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our Director of Global Data Privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Alex Hanway, Product Marketing, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.

    Join us to hear more about:
    •What is GDPR?
    •Case Study: A look at how Gemalto has prepared for GDPR
    •The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations
  • 1/3- Ética em Pesquisa e Publicações
    1/3- Ética em Pesquisa e Publicações Karin Hoch Fehlauer Ale Dec 18 2017 5:30 pm UTC 90 mins
    Na primeira aula do curso, conversaremos sobre as bases éticas em pesquisa e publicações. Também abordaremos a detecção de erros honestos e má conduta em artigos. Encerraremos a aula com a retratação de artigos publicados.


    Minicurso "Seja um pesquisador responsável: publique com ética"

    O minicurso é composto por três aulas que abordarão o comportamento ético para a boa qualidade da pesquisa científica. A conduta antiética existe tanto dentro como fora do contexto do mundo acadêmico. Casos rotineiros de trapaça, fraudes e golpes são exemplos de comportamento antiético que têm consequências graves, passíveis de punição. Na Academia, a conduta antiética também pode ter desdobramentos sérios. O desenvolvimento de boas práticas em pesquisa ética ajuda os autores a publicarem seu trabalho de forma responsável e a evitarem assim rejeição e principalmente retração devido à má conduta. Além de acabar com uma trajetória profissional, a má conduta fere gravemente a integridade da Ciência. Neste curso, forneceremos orientação sobre quais são os preceitos éticos em publicação e como não cair em armadilhas durante o processo.

    This will be delivered in Portuguese
  • How to bring your journal on par with prestigious international journals
    How to bring your journal on par with prestigious international journals Dr. Caven Mcloughlin & Mr. Satyajit Rout Dec 19 2017 2:30 am UTC 75 mins
    China is well on its way to becoming a world leader in research output. It is therefore critically important for Chinese journals and publishers to become global names and keep pace with China’s rapidly growing stature in scientific research. So how do international journals maintain and advance their standing?

    This webinar addresses the “business” of maintaining and advancing a high-quality international journal, delving into what it is that prestigious journals routinely do to attract prospective authors, promote their journal’s identity, and engage a broader readership.
    In the first part of this webinar, Professor Mcloughlin will share best practices leading journals follow to engage high-status author prospects, promote the work they publish, increase awareness of their best features, and remind potential contributors about their journals’ publishing opportunities.

    In the second part of this webinar, Mr. Rout will talk about how a growing number of journals today are pioneering the use of non-traditional content formats—jargon-free content and audio-visual summaries to increase the visibility of published research, and thereby reach out to and engage with a broader readership.

    Note that the webinar will be conducted in English.

    Who is this for?
    Editorial staff of academic journals who want to promote a more international footprint for their journal, who want to reach a reading audience outside their own nation, and receive submissions from researchers working internationally.


    Why should you attend?
    This webinar helps editorial staff learn from the practices of prestigious journals by sharing easily reproducible strategies for improving the academic reputation of a journal.
  • 한국 저자들이 흔하게 범하는 공통적 오류들: 수식어 & 명사 문자열
    한국 저자들이 흔하게 범하는 공통적 오류들: 수식어 & 명사 문자열 Jieun Hani Kim Dec 19 2017 5:30 am UTC 75 mins
    Have you received peer reviewer comments suggesting that your manuscript should be revised by a native English speaker? Would you like some tips on how you can avoid such comments?

    Who is this for?
    •Researchers and doctoral students who want to learn how to avoid common errors in manuscript writing.
    •논문 원고 영작에서 범하기 쉬운 오류들을 알고자 하는 연구원 및 박사 과정 학생들을 위한 웹세미나입니다
    Why should you attend?
    This webinar, which will be conducted in Korea, will cover some of the common errors in manuscript writing made by Korean authors. Specifically, we will look at errors in modifiers and noun strings. First we will define modifiers, which can be both a word or a phrase, and noun strings. Then we will learn how errors in modifiers and noun strings form, how to detect them, and how to avoid them in scientific writing.
    이 웹세비나는 논문 원고 작성에서 한국 저자들이 자주 범하는 오류 중 수식어 사용과 명사 문자열 사용을 다룰 것입니다. 영어에서 수식어와 명사 문자열의 사용을 살펴보고 어떤 오류들을 범할 수 있는지 다룰 것입니다. 이 웹세비나를 통해서 이런 오류들을 발견하는 것과 피하는 방법들을 배우시게 될 것입니다.
  • How to Stop All Impostor Threats Coming Into, and Going Out of Your Organization
    How to Stop All Impostor Threats Coming Into, and Going Out of Your Organization Ryan Terry, Product Marketing Manager and Ash Valeski, Sr. Manager Product Managemen Dec 19 2017 11:00 am UTC 60 mins
    The cost of Impostor email has risen to $5.1B. Business email compromise (BEC) is impacting employees, business partners and customers of organizations around the world.

    Proofpoint Email Fraud Defense (EFD) extends the security already offered by Email Protection to block criminals that spoof your trusted domains to trick victims, both inside and outside of your organization, into sending money and other sensitive information to the attacker.

    Join us for a live webinar on Tuesday, June 6th at 10am PST where you will learn:
    • Latest impostor email trends including BEC and consumer phishing
    • How to extend your current protection to stop all impostor threats
    • Upcoming product integration with Email Protection to secure your entire email ecosystem
  • [ARABIC] 2017 - How FireEye can help MEA organisations to protect against APTs
    [ARABIC] 2017 - How FireEye can help MEA organisations to protect against APTs Yazan Hammoudah, Director of System Engineers, Middle East and Africa Dec 19 2017 11:00 am UTC 45 mins
    From cyber criminals who seek personal financial information and intellectual property to state-sponsored cyberattacks designed to steal data and compromise infrastructure, today’s advanced persistent threats (APTs) can sidestep cyber security efforts and cause serious damage to your organisation. 2017 is already one of the most prolific years in terms of APT activity. Indeed, since the beginning of the year, there have been several examples of major cyberattacks across EMEA and more specifically in the Middle East. How can FireEye help your organisations protect against these persistent threats?

    Join this live webinar in Arabic as we will discuss the following topics:
    - FireEye Adaptive Defense
    - Technology
    - Intelligence
    - Expertise

    https://www.fireeye.com/
  • VDI with VxRail for VMware Horizon
    VDI with VxRail for VMware Horizon Andrew McDaniel: Director CCC Data Center Solutions (ISG) Dec 19 2017 11:00 am UTC 60 mins
    Please join us for the Dell EMC webcast on our new solution - VDI Complete with VxRail for VMware Horizon. In this session, you will learn how to maximize your opportunity with desktop and application virtualization through VMware Horizon® on Dell EMC VxRail™ hyper-converged infrastructure appliances. Learn how this industry-leading VDI solution helps you deliver faster time to deployment, radically simplified infrastructure management, and better performance at the edge to your customers, and more profitability to your bottom line. This webcast will be presented in English. We look forward to seeing you.
  • Cyber Security Webinar:  Strategies to protect your data in the cloud
    Cyber Security Webinar: Strategies to protect your data in the cloud Justin Harris, Public Cloud Architect and Jason Montgomery, EMEA Manager for Palo Alto Networks Aperture Dec 19 2017 11:00 am UTC 60 mins
    Join Justin Harris, Public Cloud Architect at Palo Alto Networks and Jason Montgomery, EMEA Manager for Palo Alto Networks Aperture to understand:

    - Why organisations are moving to the cloud and the obstacles getting there
    - The role of Cloud Access Security Brokers (CASB) and a simpler approach to securing SaaS applications
    - How a Next-Generation Firewall compliments and enhances AWS/ Azure's built in security tools
    - Automation and how to move quickly with cloud security
    - Key strategies to ensure your organisation's data remains protected
    - Questions and Answers

    We do hope you can join us for this exclusive webinar to understand new cloud security challenges and strategies for protecting your data.
  • APT34 - New Targeted Attack in the Middle East
    APT34 - New Targeted Attack in the Middle East Dan Caban, Principal Consultant; Stuart Davis, Regional Sales Director Dec 19 2017 1:30 pm UTC 60 mins
    Recent investigations by FireEye’s Mandiant incident response consultants combined with FireEye iSIGHT Threat Intelligence analysis have given us a more complete picture of a suspected Iranian threat group, that we believe has been operating since at least 2014.

    APT34 are involved in long-term cyber espionage operations largely focused on the Middle East. This threat group has conducted broad targeting across a variety of industries, including financial, government, energy, chemical, and telecommunications.

    Join us in a live webinar as we discuss this threat group whom we assess to be working on behalf of the Iranian Government, with a mission that would benefit nation-state geopolitical and economic needs. APT34 uses a mix of public and non-public tools, often conducting spear phishing operations using compromised accounts from trusted third parties, sometimes coupled with social engineering tactics.

    Register today to gain deeper insights into this threat group!
  • 2018 Predictions & Recommendations: ICS/SCADA
    2018 Predictions & Recommendations: ICS/SCADA Del Rodillas, Dir. Product Marketing, Palo Alto Networks Dec 19 2017 2:00 pm UTC 30 mins
    Prediction Number 1: In 2018 we will start seeing large-scale deployments of Automated Threat Response by leading operators of ICS in critical infrastructure and manufacturing environments.

    Find out more predictions about where Security and IOT will be in 2018 by watching the video.

    Discover more by reading the blog in the attachments.
  • Developing your app for scale: a talk with JustPark, UK's leading parking app
    Developing your app for scale: a talk with JustPark, UK's leading parking app Jono Warren, Senior Developer at JustPark; Ina Yulo and Harriet Jamieson, BrightTALK Dec 19 2017 2:00 pm UTC 60 mins
    Award-winning JustPark is the UK’s leading parking app, with more than 1.5 million users and over £1m in transactions each month. In 2015, its first crowd funding effort broke records, reaching £3.5m. Its second round – which is still in progress - raised £1m in just three hours.

    With investment in the second round currently sitting at just over £2m, we talk to one of the app’s senior developers about how JustPark will develop for scale, and its plans for taking on the £50bn UK parking industry.

    Discussions will include:

    • Recommendations for scaling for a growing user base

    • Coding environments, standards and styles

    • Mobile payments and integration
  • Biomarkers Poised to Transform Disease Management
    Biomarkers Poised to Transform Disease Management Vandana Iyer, Senior Research Analyst, TechVision - Healthcare Dec 19 2017 3:00 pm UTC 60 mins
    Expert Insight You Will Not Want to Miss:

    • Discover novel liquid biopsy platforms enabling enhanced cancer management
    • Explore biomarker opportunities for diabetes management
    • Learn about minimally invasive cancer screening technologies
    • Understand the impact of biomarker studies in enabling precision medicine
  • Why should banks and insurance companies care about Blockchain?
    Why should banks and insurance companies care about Blockchain? Paolo Sironi (IBM Watson Financial Services), Ariel Berman (AIG), Roberto Mancone (Deutsche Bank) Dec 19 2017 4:00 pm UTC 60 mins
    - Why is Blockchain a foundational innovation along 3 dimensions: complexity, novelty and computing power.

    - Why should banks and insurance companies care about Blockchain?

    - What are the major hurdles to overcome to make Blockchain truly transformational?

    - What are the consequences of Blockchain for payments and Digital Currencies?

    - What is Deutsche Bank working on with the Trade & Finance consortium?

    - What is AIG working on with Standard Chartered?

    - What benefits and impacts will Blockchain deliver in the near term?
  • The Winners - Best New Security Solution - Multi-protocol Signaling Firewall
    The Winners - Best New Security Solution - Multi-protocol Signaling Firewall Pieter Veenstra, Senior Manager Product Development – Security and Routing, NetNumber Dec 19 2017 4:00 pm UTC 60 mins
    The NetNumber Multi-protocol Signaling Firewall is the industry's most comprehensive signalling firewall, providing protection for all signalling protocols including SS7, Diameter, SIP, HTTP and DNS/ENUM. As these firewall applications can be combined seamlessly with other NetNumber applications such as an STP, DSC, HSS or HLR on the same TITAN platform, telecom operators have an unprecedented level of multi-protocol signaling protection, flexibility and operational uniformity in a platform that can reduce Opex/Capex costs and improve efficiency.
  • DFLabs IncMan Product Overview
    DFLabs IncMan Product Overview Oliver Rochford, VP of Security Evangelism at DFLabs, Steven Ditmore Senior Sales Engineer at DFLabs Dec 19 2017 4:00 pm UTC 45 mins
    Learn how DFLabs IncMan can help you automate, orchestrate and measure your incident response and security operations.

    By joining this webinar you will have the opportunity to discover DFLabs IncMan and how our solution can help you to:

    - Minimize Incident Resolution Time by 90%
    - Maximize Analyst Efficiency by 80%
    - Increase the amount of handled Incidents by 300%
  • 4 Steps to Risk Ranking Your Vulnerabilities
    4 Steps to Risk Ranking Your Vulnerabilities Mike Pittenger, VP Security Strategy, Black Duck Software Dec 19 2017 4:00 pm UTC 30 mins
    Vulnerabilities are an inevitable part of software development and management. Whether it’s open source or custom code, new vulnerabilities will be discovered as a code base ages. A 2017 Black Duck analysis of code audits conducted on 1,071 applications found that 97% contained open source, but 67% of the applications had open source vulnerabilities, half of which were categorized as severe. As the number of disclosures, patches, and updates grows, security professionals must decide which items are critical and must be addressed immediately and which items can be deferred.
     
    Join Black Duck’s VP of Security Strategy, Mike Pittenger, for a 30-minute discussion of best practices in open source security and vulnerability management. You’ll learn:
     
    - Methods for determining which applications are most attractive to attackers, and which pose the greatest risk
    - Ways to assess the risk associated with a disclosed open source vulnerability
    - Strategies to minimize the impact of open source security vulnerabilities when immediate fixes can’t be made
  • How Your Enterprise is Targeted - Today's Top Attack Vectors
    How Your Enterprise is Targeted - Today's Top Attack Vectors Michael Gorelik, CTO and VP R&D at Morphisec Dec 19 2017 4:00 pm UTC 45 mins
    Join Michael Gorelik, distinguished threat researcher and Morphisec Chief Technology Officer and Vice President of R&D, for a close look at top cyber threats targeting enterprises today. He will walk through the where, what and how of the leading attack vectors as well as explore ways to protect your company.
    • Learn the primary attack vectors used by cybercriminals to infiltrate an organization
    • Understand how different attack techniques work and what damage they can do
    • Find out what protection methods work and where they fall short
    • Get answers directly from our chief bad-guy researcher during the Q&
  • Lifesize Deep Dive: A look at the engine that powers collaboration.
    Lifesize Deep Dive: A look at the engine that powers collaboration. Scott Rankin, Global Director of Sales Engineering, Lifesize & Amanda Etheridge, Sr. Product Marketing Manager, Lifesize Dec 19 2017 4:00 pm UTC 60 mins
    In this unique webinar we’ll cover:

    -The Lifesize Portfolio: what it does and why it matters
    -The Lifesize Icon 450: a zoomed in view of camera quality, smart framing, specs and more
    -The Lifesize Phone HD: a close up look at sound quality, ports and all.
    -The Brand New App: Take a tour of the interface

    Plus we’ll have time for Q&A from our product experts.
  • How to Approach a Cyber Security Review with Your Eyes Wide Open
    How to Approach a Cyber Security Review with Your Eyes Wide Open Matthew Rogers, Security Director at Freudenberg IT Dec 19 2017 4:00 pm UTC 15 mins
    Cybersecurity disasters dominated the news in 2017. WannaCry alone bashed hundreds of thousands of targets. Now is the time for CIOs and CSOs to scrutinize multiple components of their security because, let’s face it, attackers are busy working up new creative ways to hijack your data in 2018.

    Attend this webinar to learn what it takes to build an in-depth defense. This straightforward presentation will cover:

    • Security KPIs with risky validation processes (far more common than you think)

    • A checklist of security points that need tight inspection (and where to drill down)

    • New security services that streamline the process
  • Practical Guide to Cloud Computing v3.0
    Practical Guide to Cloud Computing v3.0 Cloud Standards Customer Council Dec 19 2017 4:00 pm UTC 60 mins
    The Practical Guide to Cloud Computing is the CSCC’s seminal deliverable outlining key definitions, characteristics, and benefits of cloud computing. The heart of the guide is a comprehensive 10-step “Roadmap for Cloud Computing” containing guidance and strategies for the successful migration and deployment of cloud computing applications.

    In this webinar, the authors will review each of the 10 steps in the guide and highlight the technical changes made to this latest version including the emergence of hybrid cloud, containers, serverless computing and microservices architectures.

    Read the corresponding paper here:
    http://www.cloud-council.org/deliverables/practical-guide-to-cloud-computing.htm
  • Where Do We Go From Here?  A Fork in the Road for Multimode Fiber
    Where Do We Go From Here? A Fork in the Road for Multimode Fiber Robert Reid, Panduit Dec 19 2017 4:00 pm UTC 90 mins
    This talk will explore the evolution of multimode fiber from inception to current time against the historical transceiver roadmap. We will explore various transceiver form-factors with respect to capability, technology risk, density and cost vs. fiber types that have been deployed (and those yet to be widely deployed). Both transceivers and supported fibers will also be discussed with respect to the evolution of standards that support them.
    Attendees will earn 1 BICSI CEC.
  • IDC FutureScape: Worldwide SMB 2018 Predictions
    IDC FutureScape: Worldwide SMB 2018 Predictions Ray Boggs, Vice President, Small and Medium Business Research Dec 19 2017 4:00 pm UTC 60 mins
    In this IDC FutureScape presentation, the IDC Worldwide SMB team discusses the key predictions that will impact CIOs and IT professionals in the worldwide industry over the next one to three years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.