BrightTALK webinars and videos

Webinars and videos

  • This webinar will provide you with two complementary perspectives on Business Relationship Management that will help you achieve true romance rather than ending up in unrequited love!
    Based on recent and ongoing interest in Business Relationship Management, there can be no doubt that BRM is a hot topic. Organizations realize that a better relationship between business and IT will result in more business value from the IT provider’s products and services.
    But how do you achieve this from a provider’s perspective? What kind of knowledge, skills, behaviors and processes do you need? And because the relationship is by definition with the business, what do you expect from your partners on ‘the other side of the fence’? How can you help them to fulfil their side of the bargain?
    After listening to Aleksandr and Mark share their two perspectives, there’ll be ample opportunity for you to join in and contribute to the dialogue - you are most welcome!
  • This 40 minute webinar will focus on the practical laboratory techniques needed to create and validate genetically modified cell lines using CRISPR. A Sigma-Aldrich® technology expert will discuss guidelines and techniques utilized when performing genome editing experiments.
    Topics will include:
    •Transfection of CRISPR reagent into a cell line
    •How to validate the activity level of CRISPR
    •Clonal isolation
    •How to screen clonal populations based on desired modification
  • The multi-award winning PowerEdge VRTX now has even more amazing features packed into the extremely compact and amazingly quiet chassis.

    The Dell PowerEdge VRTX brings order to chaos, redefines IT operations and allows you to deploy performance anywhere.
    PowerEdge VRTX is a powerful, scalable, easy to manage solutions platform, optimized specifically for office environments. Clear up the complexity of disparate hardware, multiple management tools, and hardware sprawl with an optimized platform that integrates server nodes, storage, networking and management into a compact 5U chassis.

    Although initially designed with the express goal to deliver on the specialized needs of remote office/branch office (ROBO) environments the PowerEdge VRTX has found itself being deployed in a huge range of locations and solutions due to its power and flexibility.

    •Office-optimized dimensions, acoustics, and security
    •Virtualization-ready
    •Scalable, integrated shared storage to harness data explosion
    •Simplified systems management
    •Simplified networking to fit small business budgets
    •Highly available and easy to service
    •Flexible installation with both rack and standalone options.

    Join us to hear how VRTX and its new features could help you radically rethinking your organisations IT solutions. Get ready to be amazed by how powerful simplicity can be.
  • The development of new therapeutic agents is set to revolutionise treatment of hepatitis C. These new therapies represent a real transformation in care; offering fewer, milder side effects, a shorter treatment duration and dramatically improved success rates. However, they are expensive and there is a possibility that the virus could become resistant if adherence is sub-optimal. This raises fresh questions around medical funding and the types of support patients will need in order to get the best results from their treatments.

    For this 22 April webinar we bring together a panel of experts in hepatitis C to discuss this important topic, including a healthcare funder, a pharma medical director and an adherence researcher. They will discuss the most important issues and examine the opportunities these new treatments present patients and the wider healthcare community.
  • Once upon a time, a knowledge worker accessed proprietary
    documents on a company-owned desktop computer within the corporate
    firewall. Today's work environment is dramatically different - sensitive
    data and proprietary documents are increasingly produced and accessed
    outside the firewall, on employee-owned devices. Virtual collaboration is
    growing, and the cloud is redefining security paradigms even further. Yet,
    some things remain the same. Intellectual property must be protected,
    regulations must be complied with, and individual identities,
    authentication and privileges must be dynamically managed. This panel will
    look at how changing use cases and scenarios are changing the threat
    landscape for corporate IP, and how leading vendors are rising to the
    occasion to help enterprises meet these challenges. It will also discuss
    best practices in developing and executing a forward-looking IP protection
    strategy.
  • Trend Micro sponsored an extensive security survey of businesses in North America and Europe. Conducted by Cyber-Edge Group, LLC, a premier research and marketing firm, the survey examines the current and planned deployment countermeasures for establishing effective cyber defenses. This webinar will reveal the significant findings from the survey and accompanying report and is intended to provide IT security decision makers with a better understanding of how their perceptions, concerns, priorities – and most importantly – current defensive postures stack up against those of other IT security professionals and organizations. Key highlights from the report include:
    • One in four security professionals doubt whether their organization has invested adequately in cyber threat defenses.
    • Over 60% of respondents were affected by a successful cyber-attack in 2013, but less than 40% expect to fall victim again in 2014.
    • Mobile devices (smartphones and tablets) are perceived as IT security’s “weakest link”, followed by laptops and social media applications.
    • One in four organizations lack the tools necessary to properly investigate the root cause and material impact of network security breaches.

    Join Mark Bouchard, Vice President with Cyber-Edge Group and Jon Clay, Director of Global Threat Research with Trend Micro, for this webinar to learn more about the state of cyber threat defenses among today’s businesses and gain a better understanding of what you can do to improve your defenses going forward.
  • This 40 minute webinar will focus on the practical laboratory techniques needed to create and validate genetically modified cell lines using CRISPR. A Sigma-Aldrich® technology expert will discuss guidelines and techniques utilized when performing genome editing experiments.
    Topics will include:
    •Transfection of CRISPR reagent into a cell line
    •How to validate the activity level of CRISPR
    •Clonal isolation
    •How to screen clonal populations based on desired modification
  • Collaboration, coordination, and consistency around marketing campaigns and messaging can be challenging when running a global marketing organization. Without the ability to store, share, and monitor your campaigns and content on a common platform, marketers struggle with communicating across the silos of their company. The potential result of this disconnect can range from wasted content to inconsistent messaging.

    Join this webinar with Fathom, a top digital marketing agency, to learn how their marketing team works together with Box to save time, keep branding consistent, and increase efficiency.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • 1) Accelerated, error-free builds
    Agile development creates more frequent builds. A CD platform that optimizes and parallelizes large builds across hundreds, or even thousands of cores is good. A solution that automatically detects dependencies to eliminate broken builds is even better.
    2) Faster feedback
    You shouldn’t have to wait until builds or tests are 100% complete before receiving feedback. A CD platform that allows real-time drill-down into warnings and errors as they occur give helps eliminate wasted time and CPU cycles.
    3) Bulletproof and painless processes
    CD isn’t continuous if jobs in flight are lost when a CI server goes own; or when it takes days for QA machines to be provisioned; or when deployments fail because of differences between QA and production. A CD platform should automate and normalize the build, test and deploy process across ANY environment (public, private or hybrid) with 1-click simplicity.
  • McAfee is unique among secure web gateway solution providers with its hybrid delivery model, which provides the flexibility to deploy a web gateway on-premises, in the cloud, or in combination. In this session, McAfee will discuss details of the hybrid web protection deployment model and the various elements that comprise it, along with provide guidance on to choose the deployment scenario that best addresses your organization’s specific business needs.
  • Fibre Channel (FC) has come a long way since its introduction to provide a networking solution that would provide the efficiency and speed necessary for storage to be networked and shared across multiple hosts. However, recently some have begun to question whether FC still has relevancy. The answer is a simple and definitive yes! It is all about the right technology for the job. Come and hear Ben Woo, Managing Director, Neuralytix, describe why Fibre Channel is the right tool for your job.
  • From political hacktivists to international cybercrime organizations, enterprise security has been under a barrage of attacks that run the gamut of complexity. Security breaches now seem inevitable even at organizations that invest heavily in their information security operations. With numerous recent examples of cybercriminals and malware penetrating corporate networks almost at will, the role of incident response teams has been thrust into the spotlight. In this presentation I will discuss the fundamentals of incident response planning and the critical role audit has in reviewing incident response plans, documentation and the plan testing process.
    At the end of this session:
    You will understand:
    -incident response
    -identify the different types of incidents
    -planning process
    -roles and responsibilities
    -team activation process
    -response process flows
    -response scenarios, and
    -auditing incident response
  • Property has long been known as an important source of diversification for investors as well as being a hard, tangible asset that generates regular cash flows. After several years of pressure on capital values, UK commercial property markets have shown clear signs of recovery across all the major sectors as investors have been attracted by the combination of attractive real yields and the prospect of further improvements in capital values as the UK domestic economy strengthens.

    Join Threadneedle’s Property Managing Director Don Jordison as he discusses topics including:

    • Property’s high relative income return when compared to other asset classes
    • The tailwinds for property in 2014, such as the attractive supply fundamentals due to a lack of development in the noughties
    • Current portfolio themes

    Participants will be able to ask questions at the registration stage or online in the Q&A session that follows the main presentation.