With the release of Windows Server 2019 in October 2018 many customers are looking to take advantage of new features in hybrid cloud, security, storage, failover clustering, and the application platform. Upgrading and migrating to Windows Server 2019 can be a relatively easy process but there are things you need to do to ensure that you don’t run into any problems or lose any data.
Intel developed Intel® Select Solutions to simplify and accelerate the process of evaluating, selecting, and deploying hardware with today’s workloads. They are vigorously benchmark-tested to ensure smooth deployments and optimal performance. Intel® Select Solutions for Azure Stack HCI are designed to help customers quickly realize on-premises Microsoft HCI and utilize cloud services powered by Microsoft Azure.
Florida Polytechnic University is a public university that deployed a Microsoft & DataON HCI for its disaster recovery site, then expanded its cluster and upgraded from Windows Server 2016 to 2019.
The webcast will explore the following topics:
• How to successfully plan for an upgrade and migration to Windows Server 2019
• What are Intel Select Solutions and how it simplifies deploying solutions for Azure Stack HCI
• How Florida Poly successfully added a third node to its cluster and upgraded from Windows Server 2016 to 2019.
DataON – Howard Lo, Vice President of Sales & Marketing
Microsoft – Rob Hindman, Senior Program Director of Windows Server
George Spaulding of Pink Elephant and Matt Klassen of Cherwell SoftwareLive63 mins
Value may be overused word, but there is no escaping the reality that IT is faced with pressure to deliver more of it with each passing day. So how can you take what some would make you believe is a legacy framework like ITIL and a commodity technology like ITSM and extract maximum value?
Join us for this relevant and compelling webinar in which George Spalding, VP at PinkElephant and Matt Klassen, VP at Cherwell Software, will unpack the key challenges IT faces today such as self-service, accelerating pace of change, AI and automation technology, Agile and devops practices, and more. They will show you which value levers have the most effect and give you 3 practical tips you can use today in your organization to impact the business in a real way.
Wayne Levin, President & CEO | Farhan Mansoor, Software Engineer, PredictumLive60 mins
In this webinar, we will give an overview of advanced capabilities for addressing the operational challenges faced by engineers, scientists, and researchers with the increased use of machine learning and artificial intelligence.
We will highlight some of the activities involved in leveraging machine learning and artificial intelligence in a developing a comprehensive solution:
- Data ingestion process for collecting and identifying relevant data to fuel machine learning algorithms
- Using semi-automated features to speed up the model construction process
- How the resulting robust models can be optionally integrated with a virtual laboratory system
Using a virtual laboratory system as part of an integrated solution powered by machine learning increases R&D productivity, ensures maximum benefit from lab resources, and helps to manage common business problems, such as mitigating risk associated with the cost and availability of raw materials.
Who should attend:
- Engineers, scientists and other analysts who are interested in extending their use of machine learning and artificial intelligence
- Managers who are looking to accelerate productivity and innovation of scientists and engineers in their teams
Join BrightTALK's LinkedIn Group for BI & Analytics!
Tori Sitcawich, Product Marketing Manager; Jon Hart, Principal Security ResearcherRecorded: Aug 21 201956 mins
Join Rapid7 experts for an in-depth look into Attack Surface Monitoring with Rapid7s Project Sonar research and industry reports. Learn how data from these sources can be leveraged in Rapid7s industry-leading vulnerability management solution, InsightVM, to provide complete visibility into your environment.
During this webinar, youll learn about:
1. The importance of having complete visibility of both your organizations known and unknown assets
2. Rapid7s unique research project, Project Sonar, that regularly catalogs the public internet
3. Industry reports released by Rapid7 based on data from Project Sonar, among other sources
4. How data from Project Sonar can be leveraged within Rapid7s industry-leading vulnerability management tool, InsightVM
Sherry Yu, Principal Partner Success Architect, SAP, Red Hat and Sabari Radhakrishnan, Principal Solution Architect, AWSRecorded: Aug 21 201955 mins
Organizations can no longer delay serious consideration of modernizing their data centers. Among those are many SAP customers who will be required to migrate to SAP HANAⓇ by 2025.
In this webinar, learn about the benefits of modernizing your data center with the premier partners for SAP HANA, Red Hat and Amazon Web Services (AWS).
• How AWS and Red Hat can accelerate your journey to SAP S4/HANA.
• Technical considerations and best practices for SAP HANA and cloud migration.
• Benefits of scalable, on-demand, elastic infrastructure with enterprise support.
Chris Hanna (Evolving Management); Gayathri "G3" Krishnamurthy (NICE inContact); Fancy Mills (moderator)Recorded: Aug 21 201960 mins
Customer satisfaction has long been a top priority for the contact center, but in today’s competitive job market, agent satisfaction is a growing concern for leaders. In a traditionally high-stress, high-turnover industry, every leader wants to know the secret to agent happiness. There’s no magic bullet, but based on brand new ICMI research, we’ve identified four keys to improving the employee experience in the contact center. What do the most engaged employees have in common, what are the top drivers of dissatisfaction, and how might this new insight help your team improve morale and performance, all while boosting CSAT? Join us on August 21 for an eye-opening discussion!
During this webinar, you will learn:
- What the most satisfied contact center agents have in common
- What new ICMI research reveals about top drivers of agent dissatisfaction
- How you can better align your people, processes, strategy, and technology to improve both the employee and customer experience
Join us for an interactive and informative hour, filled with practical tips, and complete with live audience Q&A.
Trick a user into entering creds into our fake O365 login page. Make Microsoft send a passcode to the user’s phone
User enters their passcode on OUR fake page. Hijack the user’s session token.Gain access to SharePoint Online environment
Exfiltrate data from O365. Pivot to on-prem and steal CEO’s emails
Joe Matar, Director of Marketing at BrazenRecorded: Aug 21 201949 mins
Trust in companies is at an all time low. Yet trust is the only way to start a conversation, build a relationship, and close that next big deal with a buyer. Add in the fact that buyers are fickle and bombarded with messages all day long, it is nearly impossible to break through the noise. But breaking through the noise is possible, it just takes patience, grit, and an investment in your personal brand. Why? People trust people, not companies. In this short webinar, Joe Matar will walk through his proven method for building a personal brand. He’ll talk about his video, newsletter, social, and content strategy and share actual examples that have helped him get featured as Skaled Consultings top B2B social marketers next to greats like Dave Gerhardt, VP of Marketing at Drift, and Ryan Bonnici, CMO at G2.
Presenter Bio: Joe Matar is the host of the popular TA video series, Talent Acquisition Talks, as well as the co-host of the only podcast, Chief People Officers On The Rise, that gives Chief Talent/People Officers a platform to share advice on how to build a successful and fulfilling career in TA. Joe is a a passionate marketer at Brazen, which is a conversational recruiting platform.
Richard Chetwynd & Martin DayRecorded: Aug 21 201951 mins
Delivering a secure and elegant customer experience is more critical than ever for businesses who want to seamlessly engage with their customers. And for many organizations, Customer Identity and Access Management (CIAM) is an important first step in engaging customers and reinforcing the company’s brand, while keeping customer data secure.
Learn about cloud-based CIAM and why organizations are looking to migrate their legacy or homegrown solution to the cloud. In this webinar, Richard Chetwynd, OneLogin Product Manager, and Martin Day, Solution Architect, will discuss:
- Why and when your organization should move away from managing user identities in-house
- How to overcome the barriers when it comes to moving CIAM to the Cloud
- Key CIAM capabilities to look for when evaluating solutions
Jayme Williams, TencateRecorded: Aug 21 201960 mins
2019 Results are in: 84% weren’t IT resilient enough
The 2019 IDC State of IT Resilience study found that a whopping 84% of respondents experienced a malicious attack in the past 12 months. Of those organizations who suffered a successful attack, 93%of those attacks resulted in data corruption or loss. Do you know how much a malicious IT attack would cost you?
Find out how to make your organization IT resilient. Remove the risk of disruption and data loss, which can jeopardize customer loyalty, company reputation, productivity and employee morale. With the average cost of downtime at $250,000 an hour across industries, implementing an IT Resilience strategy is necessary not just to survive, but to go beyond your competitors and thrive.
Join us to learn more about the 2019 results. Hear Jayme Williams from Tencate discuss how IT resilience is keeping their multi-national advanced-manufacturing operations running 24/7, and the threat of ransomware a non-issue.
Emily Nakashima, Director of Engineering; Ben Hartshorne, Engineer; Alyson van Hardenberg, EngineerRecorded: Aug 21 201945 mins
Switch from deep query to a trace waterfall view and spot outliers with Honeycomb BubbleUp heat-maps - these make debugging effortless and dare we say fun? The Observability that Honeycomb brings literally shifts a Dev team from guessing what the problem may be to knowing exactly how their complex prod is behaving and where in the code the issue lies. Through the experience of all users, dev teams learn faster when they work together and have the same visibility, down to the raw event. We affectionately call it See Prod in Hi-Res.
In Honeycomb, achieve Team Collaboration through shared charts and boards, and follow the breadcrumbs from your teammates' experiences. With Query History, everyone sees results and can tag according to what’s interesting. It’s organized, intuitive, and easy to follow. Incident response and on-call run much more smoothly when everyone is virtually on-call with you.
In this webinar, we’ll discuss and show how:
* Honeycomb's Query History gives rich meaningful context
* Honeycomb’ers dogfood and learn from each others' compound wisdom
* Benefits span engineering cycles and use-cases when debugging and maintaining
* To build a culture of observability and why you should do it now
Paul Hershberger, Tyler Timek, and Kimberly BecanRecorded: Aug 21 201956 mins
Join Bromium customers CISO, Paul Hershberger, and Security Analyst, Tyler Timek as they takes us on their journey to add isolation to their endpoint security stack. Detection alone cannot combat modern malware as it continues to circumvent even the most advanced enterprise perimeter and endpoint security tools. Learn how security leaders are protected against ransomware, polymorphic malware, and threats that lurk inside email attachments, phishing links, file downloads and malicious websites.
Zeus Kerravala, Principal Analyst at ZK Research & Gordon Beith, Sr. Product Marketing Director, GigamonRecorded: Aug 21 201957 mins
“Is it worth it?” is a question you must overcome when purchasing new equipment. Fortunately, when it comes to next-generation network packet brokers (NG-NPBs), getting to Yes is easier than you think.
The latest data from ZK Research shows that next-generation NPBs have grown from simply a nice-to-have to a must-have technology, making it easy to green light your purchase:
•Winning organizations deploy next-generation NPBs for a faster, more agile infrastructure with fewer disruptions during updates
•Enables faster transition to hybrid, multi-cloud model without ever losing out on management and security
•Eliminates blind spots, so fewer security tools are needed
Arm yourself with the right information to justify your next-generation NPB purchase before you fall into the widening gap between winners and losers. You – and your infrastructure – deserve it.
Andreas Günther, Director of TDM Consulting, AnthemRecorded: Aug 21 201950 mins
Finding relevant test data is one of the great pains of testing, and GDPR’s restriction on testing with unmasked production data makes a difficult situation even worse. Once you finally receive (or create) appropriate test data, you still have to inject it into the testing framework and transform it across end-to-end tests.
The complexities of secure, stateful TDM are further exacerbated in SAP environments, where business processes may cross SAP GUI and SAP Fiori, mainframes, and other packaged apps such as Salesforce— and test data may be scattered across Word files, Excel files, databases, flat files, and SAP systems.
Join this webinar to learn strategies for simplifying test data management across end-to-end tests that involve SAP. You’ll learn:
- How to choose the best test data approach (synthetic, masked…) for each task
- Strategies for managing stateful data across end-to-end tests
- Options for extracting and masking data from SAP environments such as SAP S/4HANA, SAP NetWeaver, and even SAP BW/4 HANA
Charles Kalajian & Patrick MassarRecorded: Aug 21 201950 mins
Striving for system efficiency is a common goal. We want our platforms to perform exactly how we expect and then some. Introducing Tradeshift Buy.
Tune in for an exclusive demonstration of Tradeshift Buy where you’ll learn how to:
• Manage your marketplace offerings in a central place, with custom pricing and options for each buyer or marketplace.
• Aggregate offers from your sellers or marketplace, controlled and managed to the enterprise’s needs
• Give everyone in your organization the power to buy what they need, for any kind of spend, across any marketplace
• See and control all spend, with intelligent recommendations for optimizing your cost structure.
• Connect any number of sellers and buyers, based on your brand and your T&Cs, with full access control
The current Internet is largely a heterogeneous network in the sense that it is a network that is formed by many different networks owned by different identities. Its ability to work with vastly different technologies under very different circumstances in parallel certainly has brought crucial flexibility and incentives for its growth. On the other hand, its heterogeneity has also led to rigid and coarse management which makes Internet’s performance insufficient to support the fast growing traffic with increasingly stricter quality of service requirements. Today, with the rise of cloud computing and software-defined networking, it is now possible to move towards autonomous fine-grained network management. In this talk, we birefly examine opportunities that come from three different aspects: space (finer traffic split), time (faster network load balancing) and application (route different applications differently). We study both the idealized fine-grained network management, which sets a limit for the best possible outcome, and algorithms that take into account important practical factors to approach that limit. The talk ends with some example virtual network functions (VNFs) that can be built under fine-grained network management to further improve network performance
Matt Hebb, Product Marketing, Data Center Systems, Western DigitalRecorded: Aug 21 201918 mins
As you likely know, the reason companies deployed virtualization in the beginning was to get more out of their hardware – and make their lives a little easier – it is the very same reason they are deploying it today. As a result, virtualized servers are the defacto standard in today’s data centers. While, it’s true that virtualization lowers IT infrastructure costs and allows enterprises to respond to new business needs quickly, it also creates an additional layer of infrastructure complexity. Complexity that the IT team has to manage across both the ESX and storage array layer.
We get it – it’s a double-edged sword. Virtualization is meant to lower costs and allow quicker response time, but when the infrastructure becomes complex, the resources required to manage it could increase and offset the savings you were hoping to achieve. Join us for this webinar where we’ll address how IT can more easily manage their virtual environment.
In this webinar, we’ll introduce you to the IntelliFlash vCenter Plug-in and share how the product offers visibility into storage datastore, offers the ability to self-provision VMs, and provides a consistent snapshot of VM-level performance metrics. In addition to better understanding the IntelliFlash vCenter Plug-in, you will learn:
>How to simplify your VMware administrative tasks
>How to take full advantage of All-Flash Arrays to create and deploy denser, faster VMs
Jonny Noble, Technical Marketing Engineer – Cisco UmbrellaRecorded: Aug 21 201968 mins
Join us on for our webinar, A Look into Cisco Umbrella’s Secure Internet Gateway. This session will illustrate the benefits enabled by cloud-delivered security with practical examples. The following services will be reviewed: DNS-layer, intelligent proxy, full proxy, firewall as service, cloud access security brokerage service and roaming users coverage.
Participants will also learn how Umbrella enables branch transformation, increases security posture with leading DNS-layer (added layer) protection, allows for secure XaaS adoption and supports customers' cloud-first strategies.
EIS Director of Delivery Jason Hein and Principal Taxonomist Chantal SchweitzerRecorded: Aug 21 201915 mins
Product content will make or break your digital commerce user experience. But what does that really mean? In this 15-minute session our digital commerce experts use real world examples to:
-- walk through the basics of content strategy
-- illustrate how product content can be used to differentiate from competitors (for better or worse)
-- show how various components of your “Product Rulebook” directly impact the users experience
Joel Sierra, Security Sales Engineer, ProofpointRecorded: Aug 21 201938 mins
What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?
Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.
Join us for a demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:
1. Gain deeper visibility into attacks and respond when things go wrong
2. Solve for unified data protection
3. Defend against email fraud and social media fraud
Senthil Palaniappan, CEO & Founder at Sennovate Inc. | Kumar K, Lead Solution Architect at Sennovate Inc.Recorded: Aug 21 201947 mins
Running SoC on-premise is highly complex and expensive. This calls for expertise (for example -Firewall, DNS, Network analyst, Active Directory Domain, IAM), and well preparedness to handle unique situations. This is key in protecting any organization's digital assets. It becomes imperative for starter companies to build the credibility success factor to stay competitive as against large enterprises. This raises the question of how you would leverage various security products, to build a true Security Operations Center (SoC) yet delivered as a Service.
Register for this webinar and you will learn about:
> SoC as a Service, and its Importance
> Key Components of SoC - Asset Discovery, Threat detection, Vulnerability Assessment, Behavioral Monitoring
> Rapid Incident Response & Event Investigation
> Better Risk & Compliance Management
> Role of AI/ML to simplify the process
> Choosing SoC as a Service vs Build your own SoC
> Things to consider while choosing SoC as a Service provider
About the speakers:
Senthil Palaniappan, CEO & Founder at Sennovate Inc.
- Over 25 Years of Industry Experience in Information technology
- Specializes in Information Security, Identity and Access Management, Infrastructure and Integration
- Consulted with various fortune companies
Kumar K, Lead Solution Architect at Sennovate Inc.
- Over 18 years of industry experience
- Specializes in various Identity and Access Management products including oracle and various cloud products
- Vast experience in building custom solutions with Oracle Access Manager.
It is increasingly apparent that authenticating only with username and password is no longer sufficient as stolen passwords are responsible for 81% of data breaches. And even though many organizations have implemented multi-factor authentication (MFA) through mobile push, or One Time Passwords (OTP) via SMS and mobile apps, these authentication techniques have been shown to be vulnerable to account takeovers.
Attend this webinar to learn:
* How WebAuthn, the new web authentication standard, is paving the way for a highly secure passwordless future
* The key benefits of passwordless login for your employees, partners, and customers
* Best practices for enterprise authentication
Salil Amonkar, Global Head AI for Manufacturing & Retail, Pluto7Aug 21 20199:00 pmUTC45 mins
In this session we will cover key take away and lessons learnt from practical deployment of Ai and ML solutions in actual enterprise settings. Participants can use these learning to incorporate in their own organizations to ensure success of Ai and ML initiatives.
Join BrightTALK's LinkedIn Group for BI & Analytics!
Dr. Umesh R HodeghattaAug 21 201910:00 pmUTC45 mins
AI and Machine Learning have started creating impressions on the life of the industry and people due to the strides the underlying technology has taken because of the active research in this field. On the one side, no doubt there is some hype as to its capabilities and on the other side, there are many things we can do using AI and Machine Learning if we have proper data, inquisitiveness and perseverance. AI and Machine Learning has started percolating across many of the spheres of industrial life as well as human life and started promising many useful applications.
In this session, Dr. Umesh R Hodeghatta will be talking about the areas where the AI and Machine Learning is used significantly, how it is contributing to the society and industry as well as the applications which will be promising for a better future. Further, we will also lead you through an interesting classification problem from the beginning to the end to show you the AI and Machine Learning algorithm in Action!
Join BrightTALK's LinkedIn Group for BI & Analytics!
Applying AI in business has limitless potential. More and more organizations are implementing AI solutions to improve their core business functions. AI is not only revolutionary for end-user experience but also drives productivity and efficiency through automation and cost-savings.
How do you leverage AI to streamline your core Enterprise IT organization?
In this webinar, AI experts Muckai and Sudhakar break down the need for curated historical data, the pros and cons of specific Enterprise IT/Cloud Challenges, and the necessary AI-native solutions. The webinar will provide examples powerful enough to attain the ultimate goal for personalization, automation, prediction, cost savings and improve experience.
Three takeaways planned for the session are:
•Discover how AI will make up 80% of user daily interactions
•Learn how AI delivers automated, human-like service experiences that empower users to self-solve problems
•How AI can be leveraged for your enterprise organization
Join BrightTALK's LinkedIn Group for BI & Analytics!
David Davis, Partner & Vexpert, ActualTech Media and Bassam Khan, VP, Product & Technical Marketing Engineering, GigamonAug 22 20191:00 amUTC54 mins
Managing and securing a network can feel like a lot like navigating a ship in a turbulent storm at night. You might hear thunder and see lightning, but you never really know when or from where the next threat is coming.
What if you could permanently illuminate the best path forward? Better visibility will help you uncover hidden threats in your network traffic and prevent waves of duplicate or irrelevant data from overwhelming your analytics and security tools.
Join Gigamon and ActualTech Media in this webinar and learn how to:
- Unleash visibility to secure and optimize your network
- Discover applications that you didn’t even know were running on your network
- Increase overall performance of your network and shared components
- Spot potential security vulnerabilities before they become a problem
Join Gigamon and ActualTech Media in this webinar to learn how to discover applications that you didn’t even know were running on your network.
Watch as we share insight and demonstrate live how to increase overall performance as well as spot potential security vulnerabilities before they become a problem.
Jason Hatch, Senior Director Product Management, Security and Performance, Asia Pacific & Japan, AkamaiAug 22 20192:30 amUTC30 mins
On February 2018, GitHub survived the largest DDoS attack ever recorded with Akamai Prolexic. Today, Akamai continues to invest in its DDoS mitigation capacity and capabilities with the launch of its newest scrubbing centre in Melbourne, Australia. Launched in August 2019, this will become an integral part of the Prolexic DDoS mitigation platform that will now have 19 scrubbing centres deployed globally.
Join us on 22 Aug, 12:30PM Sydney time to learn:
- What this means to Prolexic customers
- Why it is better to protect your data center from DDoS attacks at the Edge
- How zero-second mitigation SLA is achieved
- Upcoming innovations to increase platform flexibility and simplify overhead
Andy Joss, Head of Solutions & Data Governance, Steve Holyer, Solutions Specialist, InformaticaAug 22 20194:30 amUTC58 mins
With organizations collecting an ever-increasing volume of data, the risk of a data breach or falling foul of a regulator is also increasing. Data security, privacy and protection is fast becoming a “must have” requirement within many data programs.
Organizations are starting to realize that there are potentially great synergies in having a much closer understanding of their data from both a governance and security viewpoint. Add in Artificial Intelligence and automation for remediation, together these capabilities are proving to be significant allies in the continuous battle of cyber-security and enabling Data Governance programs.
This webinar explores how these two worlds can now better understand the role that each has to play, in supporting and protecting their organization.
As part of the Reimagine Data Governance series of webinars, Informatica will demonstrate how having a closer relationship between the worlds of governance and security can enhance existing data use and data security capabilities. And how you, in taking that holistic approach, can provide governed and protected data to achieve key business outcomes.
Shashwath Hegde, Solutions Architect, APACAug 22 20195:00 amUTC40 mins
The overall objective of the SOC is stop or reduce the impact of cyber-attacks and this objective is lost in the midst of a cloud of confusing claims and statements about a SIEM. Although, a SIEM is central to SOC operations, a mechanical approach in its adoption has failed to provide any real value.
Join Shashwath Hegde, Solution Architect, for this webinar, as he discusses a shift in mindset in thinking beyond a SIEM and adopting a platform approach and cite practical examples from the field that helps stop the bad guys.
Jeff Pollard, VP & Principal Analyst, Forrester Research and Girish Bhat, Director, Product Marketing, Splunk Inc.Aug 22 20195:00 amUTC54 mins
Security is now becoming a top priority for businesses worldwide, driven by the challenges posed by digital disruption and the continuously expanding threat landscape. Well architected security is regarded as a strategic advantage and security executives are adopting risk and operational driven metrics to communicate and gain mindshare with corporate boards.
However, aligning security with business outcomes while handling corporate velocity, key innovations, the skills shortage and budgets is still a work in progress. There has been a dearth of guidance on tools and techniques to develop strategies to align security with corporate and business goals.
Join this thought leadership Splunk webinar, featuring Forrester, to hear from guest speaker Jeff Pollard, VP and Principal Analyst at Forrester Research and Splunk’s Girish Bhat to understand:
•How to talk to your board about security
•How aligning security has helped businesses
•Forrester’s CISO Strategic Canvas
•How to apply lessons learned to your own organization
Michael Haddon IAST Evangelist for North AmericaAug 22 20196:00 amUTC39 mins
As DevOps continues along its path of domination, organizations are seeking to make use of application security testing tools that leverage automation and easily scale up.
With that, we see that Interactive Application Security Testing (IAST) is gaining increasing momentum.
Join industry-experts Michael Haddon for insights on:
•Why customers are seeking IAST solutions
•Common IAST use cases
•How customers are using IAST successfully
•The benefits customers gain from using IAST
Andrea Fumagalli, VP of Engineering at DFLabs and John Chai, Solution Engineer at SEMNetAug 22 20197:00 amUTC60 mins
In the race to keep up with the increasing number and sophistication of cyberattacks, organizations need to have the capability to not only try to prevent attacks, but to also respond to them when they should occur, before they turn into more damaging security breaches.
With security operations teams experiencing a number of common challenges and pain points, including a lack of skilled cyber security professionals, a growing volume of security alerts being received, as well as a lack of integration of existing tools in the security tool stack to name a few, organizations are recognizing the need for security orchestration and automation and response (SOAR) technology to help to overcome them.
Partnering with DFLabs, SEMNet is able to offer its award-winning SOAR solution, IncMan SOAR to customers throughout Asia pacific, providing them with the localized knowledge, guidance and support needed to enable them to successfully implement efficient and effective security operations and incident response programs.
During this webinar you will learn:
- What is Security Orchestration, Automation and Response (SOAR) technology?
- Why there is a growing need for SOAR solutions?
- The problems SOAR technology can help you solve
- How it helps to improve security operations and incident response programs
- How DFLabs and SEMNet partner together to make this possible
Plus, you will get to see IncMan SOAR live in action, discover some of its use cases and ask any questions you may have.
Together, DFLabs and SEMNet can ensure security operations teams have the right SOAR solution in place, with standardized processes and workflows to detect, respond to and remediate security incidents in the fastest possible time frame, before significantly impacting your organization.
Please note: Your registration information will be shared with SEMNet who may contact you in follow-up to your registration and/or attendance of this webinar.
Cyber Security Brief podcastAug 22 20198:00 amUTC21 mins
On this week’s Cyber Security Brief podcast, it's episode 50! We discuss the EU’s bug bounty program, bad password security practice, and why “secure” websites are becomingly increasingly untrustworthy. We also chat about the start-up that hacked its own customers’ cryptocurrency wallets – in order to safeguard their funds, a further update on the RDP vulnerability we’ve discussed previously, and how the Spanish soccer league La Liga was misusing its mobile app. Finally, the story of how Radiohead called the bluff of a ransomware criminal.
This webinar will show you how Nlyte’s Asset Explorer's discovery application continuously improves asset accuracy in your Nlyte DCIM implementation.
See how you can:
- Improve capacity planning and resource utilization
- Improve and increase SLAs and Support responsiveness by reducing MTTR and RCA
- Eliminate manual audit efforts improving efficiency and accuracy of workflows
- Accelerate implementation or expansion of DCIM with auto-discovery and auto-updating of asset data
Colin Domoney DevSecOps Consultant & Adam Reyland, Regional Marketing Specialist at VeracodeAug 22 201910:00 amUTC45 mins
The Cloud Native Computing Foundation is home to literally hundreds of projects enabling developers to embrace every benefit of cloud native development from container deployment and orchestration to monitoring and messaging.
This webinar gives an overview of the work of the Cloud Native Computing Foundation; highlights a few flagship projects such as Kubernetes and Istio; and explains how these projects are transforming the way developers work. Security practitioners will benefit from insights into how these new technologies and projects can be applied to ensure that cloud native applications are also natively secure by design.
Ade Taylor, CTO, ITC SecureAug 22 201910:00 amUTC45 mins
Technical detection is now just the starting point for a series of exercises which will see the entire business work together to identify what happened and to mitigate the results.
In this session, you will learn:
- How EDR and MDR are morphing into BDR
- Why BDR is a challenge for the whole business
- How technology can help, and how it doesn’t
In this 30 minute webinar Ade will discuss how the world of cyber-security detection and response is changing, fast. From IT and technical analysts to the CEO via HR, this is a problem for the whole business to solve together.
Daniel Norman, Research Analyst, ISFAug 22 201912:00 pmUTC44 mins
Organisations are constantly under threat with over two-thirds of them experiencing data breaches in 2018. As a result, preparedness and resiliency are paramount to protecting an organisation’s information from cyber attacks.
Business leaders and their security teams can improve their ability to handle cyber attacks by running cyber security exercises. These exercises should help the organisation identify areas of improvement in people, process and technology, reducing the impact should a real cyber attack occur.
In this webinar Daniel Norman, Research Analyst, ISF will share how organisations should approach running internal cyber security exercises to support breach identification, prevention and response.
Various SRS treatment platforms are available, and there has been an increasing number of platform-comparison studies in recent years, but most of these are limited to single-centre studies. The recently published NHS England study, a national commissioning programme benchmarking different planning cases to evaluate current practices across clinical centres treating SRS cases for benign brain tumours and metastases, will be reviewed in detail during the webinar. Bias is common, due to various study flaws, including comparison of non-contemporary equipment, unequal expertise and comparison of plans created in a clinical versus study environment.
However, this NHS study, arguably the "study to end all studies", provides a unique dataset of current practice across a large number of providers and equipment platforms.
Matthew Stainer & Haidar Altaie, SAS UK&IAug 22 20191:00 pmUTC60 mins
From recognizing faces to processing the live action of a football game, computer vision opens many exciting possibilities.
Find out what it takes to really capitalize on advancements in AI.
Many Data Scientists tend to get very excited about deep learning. And why not? It has strongly contributed to the further development of game-changing applications like computer vision or Neural Language Processing.
However, before starting any computer vision endeavours, it pays to zoom in on some basics: Using a repeatable end-to-end process – to guide you through image pre-processing, deep learning and productionising your models - will help ensure your deep learning models are as accurate as possible and take your models out of the lab and drive actual business value.
Speakers: Matthew Stainer & Haidar Altaie
Matthew is a Principal Data Scientist at SAS UKI, supporting customers to enhance their businesses decision making. He works across the analytical technologies including data mining and forecasting. His particular areas of interest and expertise is text analysis, identifying the impact of analytical solutions on business processes and communicating the results of analysis to a business audience. He has specific experience in Customer Management solutions, including Complaints Analysis, NPS, Customer Analysis, Optimisation, Decision Management, Recommendation Engines, Campaign Management, Debt Management and Web Analytics.
Haidar is a Data Scientist at SAS UKI. He joined SAS in September 2018 after graduating from University with a Mathematics and Statistics degree, and is passionate about integrating the analytical skills he’s learned across growing industries to enable customers to solve complex real life issues.
Join Red Hat senior principal security global technical evangelist and strategist, Lucy Kerner, talking about automating security and compliance for hybrid environments. Followed by Dan Walsh, senior consulting software engineer, sharing container security and container technologies like kubernetes, buildah, and podman. Followed by a short Q&A, join live to submit your questions on August 22.
Maciej Stępień, CEO at Braintri, & Nicolas Soum, DataStaxAug 22 20191:00 pmUTC39 mins
Load from electronic banking puts strain on your core systems. In this webinar we discuss how to capture data changes in mainframe-based core banking system and replicate them to DataStax Enterprise (DSE) in real time using automatically generated C++ code. Electronic channels are redirected to DSE using existing legacy APIs. The presentation will discuss solution design, innovative approach to automatic code generation and lessons learned from the platform implementation.