Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Accelerating Threat Hunting Maturity - From Adhoc to Advanced Machine Learning Accelerating Threat Hunting Maturity - From Adhoc to Advanced Machine Learning James Hanlon, Security Markets Director, Splunk, Adrian Davis, Managing Director, (ISC)² EMEA Live 60 mins
    Threat hunting is evolving. Many organizations still carry out threat hunting in an adhoc manner without a defined and repeatable process. Yet some organizations are now looking at new machine learning driven approaches to accelerate their maturity and success. This session will review the current approaches to threat hunting and explain how Splunk can support & accelerate your threat hunting maturity.
  • 3 Ways to Achieve Workload Portability 3 Ways to Achieve Workload Portability Nigel Tozer, Solutions Marketing Director EMEA Recorded: Dec 9 2016 27 mins
    If you’re concerned about the challenges of vendor lock-in, and how it impacts your organisation’s ability to adopt new technologies, join this webinar in which Nigel Tozer, Commvault Solutions Marketing Director, will reveal ‘3 Ways to Achieve Workload Portability’ for application, virtual and big data workloads.

    This webinar is an expanded version of the speaker session delivered by Nigel at the Gartner Data Center, Infrastructure & Operations Management Summit in London on 29 November 2016.
  • CIO outlook 2017 CIO outlook 2017 Dominic Rossi; Charles McKenzie Recorded: Dec 9 2016 43 mins
    2016 proved to be an eventful year for global markets, with politics and policy moves taking centre stage. As we enter the new year, should we expect more of the same? In a live and interactive webcast, Fidelity’s Global Equity and Fixed Income CIOs Dominic Rossi and Charles McKenzie will answer your questions and discuss some of the key themes that are set to drive markets in the year ahead.
  • Exploit kits: getting in by any means necessary Exploit kits: getting in by any means necessary Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks Recorded: Dec 9 2016 50 mins
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity (hint: it’s a big business!)
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • How to Quantify the ROI of Low-Code Application Development How to Quantify the ROI of Low-Code Application Development Mike Hughes (OutSystems) & Seth Lippincott (Nucleus Research) Recorded: Dec 9 2016 49 mins
    It’s no secret - low-code platforms accelerate digital transformation. They cut app dev time, they help you bring new innovation to market faster, and they catalyze disruption. And, although time-to-market is apparent, the real question is what is the ROI to the business?

    So, we sought to quantify the real impact faster development times have in terms of cost, benefits, payback, and real ROI. To do this, OutSystems engaged Nucleus Research to provide objective reports on the quantitative benefits of our low-code platform.

    Join us and Nucleus Research as we explore the measurable benefits that you’ll enjoy when taking a low-code approach to development. We’ll also share the quantitative results of some recent customer projects and dissect the methodology for determining ROI.

    In this webinar, you will learn:

    * How Japanese electronics company Ricoh achieved a six-month payback and a 253% ROI.
    * How Worcestershire County Council, a UK Government agency, built 30 new applications and saw a 442% ROI.
    * How to build your own business case for low-code by identifying ROI, payback, NPV, TCO, and other metrics.

    Join us for this exciting webinar!
  • Exploit kits: getting in by any means necessary Exploit kits: getting in by any means necessary Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks Recorded: Dec 9 2016 50 mins
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity (hint: it’s a big business!)
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Embracing New Software Agility to Drive Customer Satisfaction, Deliver New Svc. Embracing New Software Agility to Drive Customer Satisfaction, Deliver New Svc. Soloman Barghouthi, STSM, WW - Application Platform Specialist IBM Cloud Recorded: Dec 8 2016 22 mins
    Today’s dynamic business climate is increasingly application-powered, and as a result the need for code to address change is accelerating. Even businesses that have already adopted agile development and deployment processes and DevOps strategies are struggling with many challenges including:
     
    - Requirement for significant IT involvement to deliver functionality
    - The increasing challenge of “multi-speed” IT and connecting front-end and back-end systems, exacerbated by application and data silos
    - Application development, testing and QA backlogs due to increasing user demands driven by consumerization of IT

    to name just a few. Attend this TechBytes video series sponsored by IBM to learn how organizations of all types and sizes are now addressing these myriad challenges by adopting new development and execution platforms that accelerate the entire application lifecycle while creating substantial savings. These bite-sized webinars will cover the latest market conditions in the application development arena, with a particular focus on mobile; dive into the greatest challenges facing development and deployment teams today, and present strategies and tactics that can reduce workload, deliver more, faster, while getting more out of your IT dollar.
  • Managing Technical Writing Outsourcing in an Agile Environment Managing Technical Writing Outsourcing in an Agile Environment Barry Saiff and Fred Williams Recorded: Dec 8 2016 58 mins
    Agile development offers advantages. Short cycles, cross-disciplinary teams, frequent short meetings, and input from users can lead to satisfied customers and faster product delivery. Technical writing outsourcing is often late to the game–with other teams already globally distributed. Even when technical writers are co-located with developers, process issues can pose obstacles. For example, without a mechanism for notifying writers of user interface changes, accuracy suffers.

    Can technical writing outsourcing work in an Agile environment, even if writers are off-shore and developers are not? Join Scott Abel, The Content Wrangler, Barry Saiff, CEO of Saiff Solutions, and Fred Williams, CEO of Williams Technical, for this free one-hour webinar. Our presenters will discuss how innovative organizations are successfully merging technical writing outsourcing with Agile development.

    You’ll learn the key steps to success in technical writing outsourcing, how outsourced writers integrate into Agile teams, and how to manage these approaches to improve quality, save time, and reduce costs.
  • The Modernization Imperative:  Developing and Deploying in our Hybrid IT World The Modernization Imperative: Developing and Deploying in our Hybrid IT World Soloman Barghouthi, STSM, WW - Application Platform Specialist IBM Cloud Recorded: Dec 8 2016 21 mins
    Today’s dynamic business climate is increasingly application-powered, and as a result the need for code to address change is accelerating. Even businesses that have already adopted agile development and deployment processes and DevOps strategies are struggling with many challenges including:
     
    - Requirement for significant IT involvement to deliver functionality
    - The increasing challenge of “multi-speed” IT and connecting front-end and back-end systems, exacerbated by application and data silos
    - Application development, testing and QA backlogs due to increasing user demands driven by consumerization of IT

    to name just a few. Attend this TechBytes video series sponsored by IBM to learn how organizations of all types and sizes are now addressing these myriad challenges by adopting new development and execution platforms that accelerate the entire application lifecycle while creating substantial savings. These bite-sized webinars will cover the latest market conditions in the application development arena, with a particular focus on mobile; dive into the greatest challenges facing development and deployment teams today, and present strategies and tactics that can reduce workload, deliver more, faster, while getting more out of your IT dollar.
  • How New Cloud Strategies Drive Productivity and Savings for the App Economy How New Cloud Strategies Drive Productivity and Savings for the App Economy Soloman Barghouthi, STSM, WW - Application Platform Specialist IBM Cloud Recorded: Dec 8 2016 18 mins
    Today’s dynamic business climate is increasingly application-powered, and as a result the need for code to address change is accelerating. Even businesses that have already adopted agile development and deployment processes and DevOps strategies are struggling with many challenges including:
     
    - Requirement for significant IT involvement to deliver functionality
    - The increasing challenge of “multi-speed” IT and connecting front-end and back-end systems, exacerbated by application and data silos
    - Application development, testing and QA backlogs due to increasing user demands driven by consumerization of IT

    to name just a few. Attend this TechBytes video series sponsored by IBM to learn how organizations of all types and sizes are now addressing these myriad challenges by adopting new development and execution platforms that accelerate the entire application lifecycle while creating substantial savings. These bite-sized webinars will cover the latest market conditions in the application development arena, with a particular focus on mobile; dive into the greatest challenges facing development and deployment teams today, and present strategies and tactics that can reduce workload, deliver more, faster, while getting more out of your IT dollar.
  • How the ISO Standard for CCMSs Impacts Your Information Architecture How the ISO Standard for CCMSs Impacts Your Information Architecture Casey Jordan, Co-Founder of Jorsek LLC Recorded: Dec 8 2016 59 mins
    Many people in the technical documentation and content management field may not be aware that there is an international ISO Standard for how a Component Content Management System is built and how its functionality conforms to best practices for content creation and management.

    Join Scott Abel, The Content Wrangler and his special guest, Casey Jordan, co-founder of Jorsek LLC, for this free one-hour webinar. As one of three co-authors of the standard (with Dr. JoAnn Hackos and Bob Boiko), Casey helped develop the standard that materially affects the way we utilize structured content in an enterprise or organization. The standard was developed to ensure interoperability between systems and file structures, and to ensure compliance with the open Darwin Information Typing Architecture (DITA) that underlies most Component Content Management Systems.

    Casey will discuss the benefits of working with a standard and how it drives contemporary content management practices and will demonstrate how workflows, authoring, editing, review, publishing, reuse, and localization are all driven by the guidelines set in the ISO standard.
  • Big Data, Predictive Analytics, and Sales Performance Big Data, Predictive Analytics, and Sales Performance Barbara Giamanco, Social Centered Selling, Peter Mollins, Knowledge Tree, & Melissa Treier, Information Builders Recorded: Dec 8 2016 58 mins
    Is your team ready for the new era of data?

    The era of big data and predictive analytics is clearly upon sales and marketing professionals, representing a transformative paradigm shift for sales and marketing teams. No longer can salespeople rely on relationships and other soft factors to target and close business. Marketing has to move beyond one-off campaigns and brand advertising.
    Big data and predictive analytics technologies represent the opportunity to turn the tables. In other words, sales and marketing can finally become more about math than magic.

    Join this webcast to learn how to:
    - Justify big data and predictive analytics as part of your organization's sales and marketing strategy
    - Leverage insights from big data to accurately target high-value prospects in marketing campaigns, keep existing customers on board through account-based marketing strategies, and expand existing opportunities
    - Improve sales forecasting accuracy using more than "gut feel," relying on real-time sales data visualizations

    This webcast is part of our Microsoft Dynamics Business Applications webcast series. Sign up for this session, or the entire series today!
  • Enterprise Storage Megacast: What Makes Tegile Systems Different Than the Rest? Enterprise Storage Megacast: What Makes Tegile Systems Different Than the Rest? Chris Tsilipounidakis, Tegile, Senior Manager Product Marketing Recorded: Dec 8 2016 32 mins
    Storage has become the Achilles’ heel for many datacenter applications. It’s become expensive, constantly requires capacity expansion, and requires staff to keep it operational. Many customers are also dealing with the perpetual cycle of costly support and maintenance.

    Today, there are dozens of different storage options at your disposal. All of these solutions have a place in the market and each one carries its own set of benefits. Whether you’re looking for capacity, performance or TCO savings, an appropriate solution does exist for you.

    This webinar is your opportunity to get a better understanding of Tegile and the unique differentiation it provides in the storage market.
  • Rapid7 InsightIDR Product Demo Rapid7 InsightIDR Product Demo Eric Sun and Pat Haley Recorded: Dec 8 2016 49 mins
    By integrating with your existing network & security stack, InsightIDR leverages user behavior analytics to correlate the millions of events your organization generates daily to the exact users and assets behind them. Along with custom included intruder traps, you'll automatically detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing. Combined with a fully searchable data set and endpoint interrogation, InsightIDR directly addresses the gaps found in most of today's detection technologies, including SIEM and IPS.
  • Digital Marketing 2017: These Strategies Could Make a Difference Digital Marketing 2017: These Strategies Could Make a Difference Jonathan Allen, President of L&T Co. Recorded: Dec 8 2016 46 mins
    Jonathan Allen, former Director Of Search Engine Watch and founder of Longneck & Thunderfoot, shares case studies and personal insight into what elements he thinks will make for a winning marketing strategy in 2017.

    Exploring both paid and organic digital marketing strategies he'll share how to take a blended approach to maximize the benefits of each and have data from paid and organic channels influence each other.
  • Dirty Tricks: Into the Minds of the Trickbot Gang Dirty Tricks: Into the Minds of the Trickbot Gang Uri Rivner - VP of Cyber Strategy and Iain Swaine, Head of Cyber Strategy EMEA Recorded: Dec 8 2016 64 mins
    Dyre was one of the most dangerous, stealthiest Trojans of its time. It hit banks worldwide, evading detection and operating in custom mode based on the banks' defenses. Then its operation was disrupted in mid 2015 and it went silent... But now a new menace emerges: the Trickbot Trjoan. With a new set of dirty tricks in their arsenal, the cyber criminals now have a new, highly effective weapon. In this unique webinar we'll Join our webinar to:
    -See a second-by-second analysis of a real world Trickbot's operator inside a victim's online banking account, and see how the attacker operates.
    -Compare Trickbot's operators methods to those of Dyre and Dridex operators.
    -Learn how Behavioral Biometrics alert on Trickbot
  • How Viable is Google ColdLine Cloud Storage? How Viable is Google ColdLine Cloud Storage? Curtis Preston, Storage Switzerland Recorded: Dec 8 2016 62 mins
    Google has recently announced expansion of their cloud storage service. It offers similar service levels as Amazon S-3 and Glacier, but with simplified pricing. How viable is their cloud storage product for the average customer? How do their service levels compare to Amazon and Azure service levels? What about pricing? Is it really that different? And what are some example use cases?

    Other questions center around applications that support these offerings. If an application supports Amazon, will it be easy for them to support Google? Is there anything about Google cloud storage that makes it easier or harder for service providers to work with them?
  • The End of Proprietary Software The End of Proprietary Software Merav Yuravlivker, Co-founder and CEO, Data Society Recorded: Dec 8 2016 49 mins
    Is it worth it for companies to spend millions of dollars a year on software that can't keep up with constantly evolving open source software? What are the advantages and disadvantages to keeping enterprise licenses and how secure is open source software really?

    Join Data Society CEO, Merav Yuravlivker, as she goes over the software trends in the data science space and where big companies are headed in 2017 and beyond.

    About the speaker: Merav Yuravlivker is the Co-founder and Chief Executive Officer of Data Society. She has over 10 years of experience in instructional design, training, and teaching. Merav has helped bring new insights to businesses and move their organizations forward through implementing data analytics strategies and training. Merav manages all product development and instructional design for Data Society and heads all consulting projects related to the education sector. She is passionate about increasing data science knowledge from the executive level to the analyst level.
  • The Role of Next-Generation IPS in Enterprise Networks The Role of Next-Generation IPS in Enterprise Networks Thomas Skybakmoen, VP, NSS Labs Recorded: Dec 8 2016 44 mins
    Thomas Skybakmoen of NSS Labs discusses:
    • The nature, role, and importance of third-party testing.
    • Trend Micro TippingPoint’s results in the 2016 NGIPS Group Test.
    • Practical uses of NGIPS in enterprise network environments.
  • Content Marketing for Procrastinators – Your Guide to Finally Getting it Done Content Marketing for Procrastinators – Your Guide to Finally Getting it Done Ian Campbell, CEO, Mission Suite Recorded: Dec 8 2016 37 mins
    Have you been planning on a content marketing strategy but just can’t seem to get it launched? If your goal for 2017 is to finally execute a solid content marketing strategy, check out this webinar to go through everything you’ll need to do – from content development to planning to promotion – to execute a successful content marketing plan.
  • Simplifying Container Management with Habitat Simplifying Container Management with Habitat Ian Henry, Habitat Community Manager & Michael Ducy, Director of Product Marketing Dec 9 2016 6:00 pm UTC 60 mins
    Containers provide a delightful development experience. It’s easy to download a container image and get started writing code. But it’s a different story when you have to run containers in production at scale. That’s when all the hidden complexities become apparent and the real challenges begin. What tools are you going to use to build, deploy, run, and manage your containerized applications? How are you going to manage difference between environments like staging and production with a fleet of immutable objects? How will you effectively scale containerized applications once you’ve deployed them?

    Habitat, our open-source project for application automation, simplifies container management by packaging applications in a compact, atomic, and easily auditable format that makes it easier to deploy your application on various container runtimes. Once your applications are deployed, the Habitat supervisor simplifies the complexities of running in production environments with built-in abstractions for functions typically handled by external tooling, such as dynamic scaling and rolling updates.

    Join Ian Henry and Michael Ducy on Friday, December 9th at 10:00 AM PT, to learn how Habitat makes building, deploying, and running your applications in containers simple, no matter how complex the production environment.

    Join us to learn:
    - Why automation is critical to deploying in a containerized world and how - Habitat provides the minimum viable automation.
    - Why a strong container build system is important, and how the Habitat studio provides that system.
    - Why Habitat is the easiest way to build and run containers at scale, no matter the underlying container architecture.

    Who should attend:
    - Anyone new to containers
    - Anyone challenged by running containers in production at scale
  • Oh the things you can do with B2 Oh the things you can do with B2 Andrew Klein Dec 9 2016 6:00 pm UTC 30 mins
    Join us for a quick overview of the things you can do with Backblaze B2 Cloud Storage. We'll walk you through solutions designed to easily backup, archive, and sync your data to the B2 Cloud. In the process you'll learn how to save up to 75% on storage costs over providers like Amazon S3 and Microsoft Azure.
  • Dev and Test Better in the Cloud Dev and Test Better in the Cloud Rajesh Agadi, Technical Solutions Professional & Rodrigo de Carvalho, Cloud AppDev Marketing Manager, Microsoft Dec 9 2016 7:00 pm UTC 60 mins
    Support your IT and applications team better than ever!

    Companies of all sizes are under pressure to deliver greater results. The search for quicker and more impactful results, while balancing costs, governance, and agility, are one of the biggest challenges of many IT organizations. While applications – developed internally, packaged, or off-shored – are the engine behind business transformation, the ability to deliver better apps is compromised by the lack of environments to proper develop and test them. High hardware procurement time and costs are usually major roadblocks faced by IT.

    Cloud Computing plays a key role in providing application teams with the tools needed to develop and test in production-like environment, while never ignoring costs, security, and agility.

    Join this webcast to learn how to:
    - Understand the challenges in IT to provision development and testing environments for applications teams
    - See how cloud computing and Microsoft Azure can be the answer for dev-test environments
    - Learn about Microsoft Azure and the Azure Dev-Test Offer
    - Receive an overview of dev-test labs and governance and security of dev-test environments
  • AMPing Up STEM Instruction with 3D Printing AMPing Up STEM Instruction with 3D Printing THE Journal, Stratasys & GIT Dec 9 2016 7:00 pm UTC 60 mins
    Students will enter a job market that requires skills far different that those of today. Learn how schools are taking new approaches to develop critical thinking with 3D printing for future careers. Witness the connection of teacher instruction and student achievement with Jeff Rosen, Program Director for Technology and Robotics at Georgia Institute of Technology. Jeff outlines AMP (Advanced Manufacturing and Prototyping Integrated to Unlock Potential), a National Science Foundation project which includes designed courses, mini challenges and interdisciplinary course experience for grades 6 – 8. Explore the uses of 3D printers for the classroom, and get an introduction to the Stratasys uPrint 3D Printer which offers educators reliability and repeatable results for streamlined learning.
  • Harnessing 2017’s biggest database trends Harnessing 2017’s biggest database trends Matt Aslett, 451 Research Director for Data Platforms & Analytics; Mike Kelly Blue Medora & GM SelectStar platform Dec 9 2016 7:00 pm UTC 60 mins
    Recent years have seen an explosion in the number of different platforms and approaches used to store, process and analyze data in multiple formats from multiple sources. An abundance of data platforms (relational and non-relational databases, NoSQL, NewSQL, Hadoop, database as a service, etc.) has created a complex data management landscape that relies on the integration of multiple interdependent platforms and analysis tools. This trend is expected to continue in 2017. This webinar will preview how the database market is expected to change and what database professionals can do to use these changes to their advantage.

    In this session you’ll:

    - Learn what’s driving increasing adoption trends in specific data platforms like NoSQL and Hadoop
    - See how cloud-based data platforms are being used—and who is using them
    - Discover the implications of IoT for data platforms
    - See a demo of a new database management platform designed to address these changes
  • Abusing Bleeding Edge Web Standards For AppSec Glory Abusing Bleeding Edge Web Standards For AppSec Glory Ryan Lester, CEO & Co-Founder of Cyph Dec 9 2016 8:00 pm UTC 45 mins
    Through cooperation between browser vendors and standards bodies in the recent past, numerous standards have been created to enforce stronger client-side control for web applications. As web appsec practitioners continue to shift from mitigating vulnerabilities to implementing proactive controls, each new standard adds another layer of defense for attack patterns previously accepted as risks.

    With the most basic controls complete, attention is shifting toward mitigating more complex threats. As a result of the drive to control for these threats client-side, standards such as SubResource Integrity (SRI), Content Security Policy (CSP), and HTTP Public Key Pinning (HPKP) carry larger implementation risks than others such as HTTP Strict Transport Security (HSTS). Builders supporting legacy applications actively make trade-offs between implementing the latest standards versus accepting risks simply because of the increased risks newer web standards pose.

    In this talk, we'll strictly explore the risks posed by SRI, CSP, and HPKP; demonstrate effective mitigation strategies and compromises which may make these standards more accessible to builders and defenders supporting legacy applications; as well as examine emergent properties of standards such as HPKP to cover previously unforeseen scenarios.
  • Digital HR Workplace: Simple Ways to Hire and Onboard Faster Digital HR Workplace: Simple Ways to Hire and Onboard Faster Teja Vora, Director Commercial Marketing, DocuSign,Steisha Ponczoch, Human Resources Technology Manager, SDZG Dec 9 2016 8:00 pm UTC 45 mins
    Attracting & retaining talent are two of the most important functions of an HR organization, but paper has a nasty habit of tying up HR resources and keeping HR professionals from getting the job done.

    Now imagine a paper-free workplace. It can happen with eSignature solutions. With eSignatures, organizations can sign, send, and approve documents anywhere, at any time and keep business moving forward.

    Watch this on-demand webinar to learn how you can transform key, paper-heavy functions like hiring, onboarding, and benefits enrollment to fast and secure digital experiences.

    You will also learn:

    • Current employee and HR pains in the workplace
    • How companies saved an average of $46 per offer letter
    • How leveraging an eSignature solution can help you save money and work more efficiently
  • Next-Gen File Sharing, Cloud Storage & Collaboration with OneDrive & SharePoint Next-Gen File Sharing, Cloud Storage & Collaboration with OneDrive & SharePoint Todd Kirk, Manager of Product Development, Brainstorm, Inc. Dec 9 2016 9:00 pm UTC 60 mins
    File sharing and cloud storage are quickly becoming commonplace in the modern business. However, it can be difficult to know when to use one tool over another and what advantages each provides. Moreover, technology is evolving quickly and keeping up to date on the latest and greatest can be extremely time-consuming for many professionals.

    Join us for a few minutes to find out how to take your productivity to the next level, and become a file, sync, and share Office all-star with OneDrive for Business Next Generation Synchronization and SharePoint 2016’s wide array of new cloud collaboration tools.

    In this webcast your will learn:
    - When and why to use particular tools for file sharing, storage, and collaboration
    - How OneDrive for business can help you get the most out of personal file storage
    - How to use some of the newest features to securely store, edit, and share your documents
    - How to make professional teamsites in minutes
  • Les cyber-menaces du monde réel et la technologie d’Enterprise Immune System Les cyber-menaces du monde réel et la technologie d’Enterprise Immune System Jérôme Chapolard, Account Executive Dec 12 2016 10:00 am UTC 45 mins
    Les cyber-menaces sont plus diverses et sophistiquées que jamais. Le défi vient également de la complexité de nos réseaux – avec des changements constants, y compris le « Internet of Things », les services de Cloud et les applications SaaS.

    Des nouveaux types d’attaques sont capables de contourner nos outils traditionnels de cyber sécurité. Il est évident qu’une nouvelle approche est nécessaire. 

    Rejoignez ce Webinar pour découvrir :

    • Le panorama des menaces changeant et les nouveaux types d’attaques
    • L’approche d’auto-apprentissage de Darktrace à la détection des menaces
    • Des exemples concrets de menaces détectées par Darktrace
    • Des témoignages clients d’Avancial et Apave Group et pourquoi ils dépendent d’une approche auto-apprenante pour dépasser ces menaces et regagner 100% de visibilité sur votre réseau
     
    www.darktrace.com
  • Asset Allocation in a Rotating World Asset Allocation in a Rotating World Nanette Abuhoff Jacobson, Global Investment Strategist, Wellington Management Dec 12 2016 1:30 pm UTC 60 mins
    Nanette Abuhoff Jacobson of Wellington Management will examine the prevailing global economic and market trends as well as their impact on asset allocation.
  • The API Economy in Banking what is the impact of PSD 2 The API Economy in Banking what is the impact of PSD 2 David Harvey, Senior Principal Banking Practice, & Durvesh Ganveer, Solutions Architect Director, NTT Data Services Dec 12 2016 2:00 pm UTC 90 mins
    Regulatory conditions are preventing many banks from consolidating in the market, and there is evidence to support those financial institutions will need to re-engineer their own businesses, and customer propositions, and transform current models to remain relevant, nurture and grow their customer bases.

    As part of this process, developing differentiating capabilities will be key in highly competitive markets and innovation through the adoption of the new ‘Fintech ecosystem’ or “fintegration” (i.e. the marrying up of banks and Fintechs) will be pivotal in the banking industry’s fight to maintain their current business and grow. Join Anju Tiwari,Senior Enterprise Architect, Dell Services, guest speakers from the Banking Sector to be announced to learn about:

    - The drive to open up APIs in the new Digital banking Economy
    - Approaches on how to better leverage new technologies through Open APIs
    - Best Practice in how to go about partnering
    - How to achieve Data Governance and Security whilst opening up
    APIs to third parties
    - What technologies can we leveraged (Robotics, Machine Based learning, Big Data Analytics and the Digital sixth sense)
  • Keeping Marketing Relevant in the Age of the Customer Keeping Marketing Relevant in the Age of the Customer Thomas Husson, VP and Principal Analyst, Forrester Dec 12 2016 4:00 pm UTC 60 mins
    As marketers, today, we face more challenges and higher business demands than ever before. Our reality is “do more with less, using new technologies”. No small feat, indeed.

    To succeed, we have to rethink our marketing and do away with the hurdles that hold us back. As marketers, we must demand – and deliver – more transformation.

    Join us to learn:
    - Forrester’s five market imperatives for becoming customer obsessed
    - Why a “mobile first” strategy will not be enough to win and retain your customers
    - How context is transforming marketing, and what it means for your business

    You’ll walk away with powerful, proven ideas for delivering amazing customer experiences and keeping your marketing relevant during future, inevitable disruptions!
  • Introducción a Amazon EC2 Introducción a Amazon EC2 Carlos Carús Dec 12 2016 4:00 pm UTC 60 mins
    Amazon Elastic Compute Cloud (Amazon EC2) es un Servicio Web de AWS que proporciona capacidad de cómputo con tamaño modificable en la nube. Está diseñado para ofrecer un auténtico entorno virtual de cómputo profesional y escalable que permite utilizar interfaces de servicios web para lanzar instancias con distintos sistemas operativos, cargarlas con su entorno de aplicaciones personalizado, administrar sus permisos de acceso a la red y ejecutar su imagen utilizando los sistemas que desee.

    En este webinar gratuito te mostraremos en directo los principales beneficios y uso de Amazon EC2 tales como control total sobre sus instancias, aumentar o disminuir la capacidad en minutos, posibilidad de elegir entre varios tipos de instancia, sistemas operativos y paquetes de software, pago por uso o funcionalidad de red sólida y segura para sus recursos informáticos.
  • New reformed Eduqas GCSE Film Studies from 2017: A guide to the specification New reformed Eduqas GCSE Film Studies from 2017: A guide to the specification Rebecca Ellis, Subject Officer Dec 12 2016 4:30 pm UTC 90 mins
    WJEC Eduqas Film Studies Subject Officer Rebecca Ellis, will provide guidance and support on the new GCSE (9-1) Film Studies qualification and its assessment structure.
  • 7 Reasons Salespeople Don't Get Better 7 Reasons Salespeople Don't Get Better Carole Mahoney Dec 12 2016 5:00 pm UTC 45 mins
    There is no shortage of sales experts telling salespeople how to get better. Why is it we give them everything they need, but they just can’t seem to do it? Which of these 7 reasons are preventing your salespeople from improving and what can you do about it?
  • How Cybersecurity, Technology and Risk Is Maturing the Role of the Modern CISO How Cybersecurity, Technology and Risk Is Maturing the Role of the Modern CISO Gary Hayslip, CISO - City of San Diego, CA Dec 12 2016 5:00 pm UTC 60 mins
    The landscape that today’s CISOs operate in and the role they fill has fundamentally changed in the last few years. Today, CISOs must understand the technical side of cyber security, as well as enterprise risk management and how both disciplines impact their organization’s ability to successfully conduct business.

    Join this presentation to learn about the evolving cyber threat landscape, the challenges for CISOs and the requirements to ensure cyber security throughout their organization.
  • Increase Productivity & Take your Business Global with eSignatures Increase Productivity & Take your Business Global with eSignatures Damon Mino Director, Legal Industry Vertical, DocuSign Dec 12 2016 6:00 pm UTC 60 mins
    Growing your business across borders and gaining a competitive advantage requires use of all the electronic resources at your disposal and a deep understanding of the laws and regulations that affect those resources. What if you could spark global growth while saving time, increasing accuracy, providing a better experience, and ultimately getting faster approvals?
    This webcast will teach best practices regarding the adoption, use, and verification of electronic signatures and document management for growing companies conducting business globally, with an emphasis on the new EU eIDAS law and how the courts are handling that issue. Attendees will learn how to:
    Adapt to new regulatory and laws in different areas of the globe.
    Maintain visibility, compliance and control of important documentation.
    Increase efficiency and make processing transactional documents more cost effectiv
  • Reducing Threats through Improving Identity Security Reducing Threats through Improving Identity Security David Coxe, Co-Founder, Criterion Systems and Co-Founder & CEO of ID DataWeb Dec 12 2016 6:00 pm UTC 45 mins
    Cyber threats are increasing in frequency and complexity, and all industry segments are vulnerable. Join this presentation to learn the advances in identity security and privacy, and how you can protect your organization in 2017.

    Presenter:
    David Coxe is the CEO of ID DataWeb, Inc. (IDW) and was the Principal Investigator for the Criterion Systems NSTIC pilot program. He is also co- founder of Criterion Systems, a successful IT services contractor that provides information security, cloud computing, software development and other services to civilian agencies, DoD, and the Intelligence community. David has 20 years identity management experience and is currently very active in the development and implementation of attribute exchange trust frameworks. He co-chaired the Attribute Exchange Working Group (AXWG) at the Open Identity Exchange (OIX) for implementing the business, legal, technical, policy/privacy and assessor/certification requirements for Attribute Exchange (AX) Trust Frameworks.
  • Combating Cloud Security Threats in 2017 Combating Cloud Security Threats in 2017 Manolo Gonzalez, VP, ​Platform and​ Technology Alliances​ at CloudLock Dec 12 2016 7:00 pm UTC 60 mins
    Gartner named CASB the #1 infosecurity technology in 2016. Why is cloud security number one? As users, data and applications move to the cloud and traffic happens off the network, new vectors for malware and threats open up and a new paradigm and breed of security solutions is required: Cloud Access Security Brokers (CASB).

    This presentation will demonstrate how to regain visibility and control in your cloud environments, as well as key use cases in the cloud, and how CloudLock works to provide effective security.
  • Protecting Your Business from the Ransomware Threat Protecting Your Business from the Ransomware Threat James Carder, CISO of LogRhythm, Ryan Sommers, Manager of Threat Intelligence and Incident Response, LogRhythm Labs Dec 13 2016 12:00 am UTC 45 mins
    The Scenario

    It's 2:00 p.m. on a Friday afternoon, and you get that fateful call. An employee's laptop was hit by the latest CryptoWall variant. The employee was merely searching for how to solve a computer problem, but within minutes of clicking a link, his files have been encrypted and he must pay a ransom fee to get them back.

    Unfortunately, his laptop wasn't the only thing affected. The file shares that he was connected to were also encrypted beyond reach. Other calls start coming in. Files in various department shares are "corrupted" and things are grinding to a halt. Another ruined weekend for the SOC and IT--and likely another payday for the bad guys.

    Defending Your Organization Against Ransomware

    In this webinar, LogRhythm will look at the business problems surrounding the new and evolved ransomware threat. The webinar will also give you a brief technical overview of how these schemes function and how they can be spotted and responded to early enough in the threat lifecycle to severely limit the potential damage. You'll also be given a framework that you can work through to better protect your organization in the face of this looming menace.

    Webinar topics include:

    • The early indicators of ransomware
    • Automated defenses that you can put in place to thwart the attack
    • The steps that must be followed (with robotic precision) to make a mole hill out of the potential mountain.
  • Help! Easy Ways to Validate 10G Network Connectivity? Help! Easy Ways to Validate 10G Network Connectivity? Mike Pennacchi, Network Protocol Specialists Dec 13 2016 1:00 am UTC 60 mins
    “I don’t always validate network connectivity… but when I do, it’s an enormous time sink.” -The Most Interesting IT Pro in the World
    If this sounds familiar, we have good news. You can now drastically reduce the time spent on network analysis and validation with the right tools and know-how.
    Join us for a guided walkthrough of the validation process and learn about:
    Understanding and navigating the Open Systems Interconnection model (OSI model)
    Troubleshooting connectivity vs. network performance
    Determining availability of services
  • Hidden Benefits of OneTouch AT Network Tester Hidden Benefits of OneTouch AT Network Tester Mike Pennacchi, Network Protocol Specialists Dec 13 2016 2:01 am UTC 60 mins
    There is no doubt that when it comes to network validation, the NETSCOUT OneTouch AT is the best tool. However, this highly portable network troubleshooting tool has many features to offer, beyond just network validation. In this webcast, we will cover a number of tools built into the OneTouch AT that will help you quickly get to the root of your networking problems.
    In this webcast, we will look at:
    •How to trace a path through the network at layer 2 and layer 3
    •Using the built-in web browser and SSH client to configure devices
    •Inspect fiber end faces, using the optional Fiber Inspector
    •Locate wireless interference sources
    •Remotely control the OneTouch AT via the cloud based web interface
    •Automatically upload test results to the cloud
    •Control the OneTouch AT via the management interface
    •Perform in-line packet capture
    •Export test results to XML files, so they can be opened in MS Excel
  • Digitalisierung auf der Überholspur Digitalisierung auf der Überholspur Erik Hansmann, Thorsten Biehl Dec 13 2016 9:00 am UTC 90 mins
    Es werden Ihnen spannende Informationen rund um das Thema Digitalisierung und die daraus resultierende Disruption gezeigt. Wir zeigen Ihnen aber auch konkrete Lösungsansätze für diese Herausforderung und wie sie durch Digitalisierung von Geschäftsprozessen profitieren können. Es erwartet Sie eine unkonventionelle Präsentation, die auch eine Live Vorführung enthält.
  • Legg Mason RARE Infrastructure Value Fund Legg Mason RARE Infrastructure Value Fund Nick Langley Dec 13 2016 9:00 am UTC 45 mins
    Nick Langley, co-CIO of RARE Infrastructure gives an update on the recent sell off sparked by the US election result and the potential impact of rising rates on the portfolio and Infrastructure in general.