Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • The Last-Minute Guide to GDPR
    The Last-Minute Guide to GDPR Argin Wong, Data Privacy and Compliance, Box Recorded: May 25 2018 40 mins
    The dawn of GDPR will have a global impact. If you work with European employees, customers or partners, the regulation affects you and failure to comply could result in fines up to 20 million euros, or up to 4% of the company’s total global revenue for the preceding fiscal year, whichever is higher.

    It's not too late to get ready. Sign up for this webinar to learn 3 key steps you need to start now:
     
    •How to show that you are processing data in accordance to the GDPR
    •How to ensure (and document) the security, confidentiality and availability of data
    •How to support the Right to be Forgotten 
     
    You'll also learn how Box can help. Our philosophy is to evaluate and meet the highest bar for data privacy, as well as enable organizations to meet data privacy obligations across the globe, so you can rely on Box to get GDPR-ready.
  • How to Update Marketing Channels for GDPR - A Practical Guide
    How to Update Marketing Channels for GDPR - A Practical Guide Erik Archer Smith, Marketing Director - ABM, Treasure Data Recorded: May 25 2018 47 mins
    The new GDPR regulation goes into effect on May 25th. While a majority of conversations have revolved around the security and IT aspects of the law, marketing teams will play a crucial role in helping organizations meet GDPR standards and playing a strategic role across the organization.

    Join us to learn more, engage with your peers and get prepared.

    This webinar will cover:

    - How complying with the GDPR will drive better marketing and raise the standard of the quality of your customer engagement
    - The GDPR elements marketers must know about
    - The elements of PII that will be affected and what marketers need to do about it
    - A deep dive on how GDPR regulations will affect your marketing channels - email, programmatic advertising, cold calls, etc.
    - Tactical marketing updates needed to meet GDPR guidelines
  • BrightTALK Fri. - Rollcall: ReCode - Topic: WeWork - Ep.04 (PS082)
    BrightTALK Fri. - Rollcall: ReCode - Topic: WeWork - Ep.04 (PS082) Paired Sourcing Recorded: May 25 2018 10 mins
    ++ Rollcall: ReCode
    ++ Topic 82: WeWork


    Connect with us:
    https://twitter.com/pairedsourcing
    https://www.facebook.com/pairedsourcing
    https://www.youtube.com/channel/UCSl1Iu2B0UbpDY_0Yt-rG0w
    https://www.linkedin.com/company/Paired-Sourcing/
    https://www.twitch.tv/pairedsourcing
    https://www.brighttalk.com/channel/16837/paired-sourcing


    Show Links:
    https://www.recode.net/2018/5/24/17391480/amazon-alexa-woman-secret-recording-echo-explanation
    https://www.wework.com/
    https://www.saastr.com/20b-valuation-wework-overvalued/

    ______________________________________________________
    Learn more about us:
    www.PairedSourcing.com
  • If You’re Not Compliant, You’re Behind – 7 Steps to GDPR Compliance
    If You’re Not Compliant, You’re Behind – 7 Steps to GDPR Compliance Paul Kendall, CGEIT, CISSP, GDPR Advisory Services Principal, at Accudata Systems Recorded: May 25 2018 47 mins
    The GDPR deadline is May 25th – and companies that don’t have a solution will face stiff fines. Businesses need to understand the different categories of data, how data is stored, how it moves throughout an organization, and what technical measures they need to take to ensure they are compliant.

    In this 30-minute webinar, GDPR-certified expert Paul Kendall will explain:

    - 7 critical steps to achieve compliance
    - What data companies need to protect
    - How to protect data that lives inside the EU and how to access that data outside the EU
    - How data breaches and response times can severely impact GDPR fine activity
  • Should you Kill the Annual Review?
    Should you Kill the Annual Review? Aaron Adams, Partner - HR Strategy Recorded: May 25 2018 33 mins
    There has been a lot of talk about killing the annual review. Should you really do away with the annual review or should you change it? What are some of the pros and cons of the annual review?

    Join us to learn about when it makes sense to do or not do an annual review.
  • How to Bring BI into the Big Data World
    How to Bring BI into the Big Data World Claudia Imhoff, renowned analyst & Founder - Boulder BI Brain Trust and Ajay Anand, VP Products & Marketing - Kyvos Insights Recorded: May 25 2018 63 mins
    Business intelligence (BI) has been at the forefront of business decision-making for more than two decades. Then along came Big Data and it was thought that traditional BI technologies could never handle the volumes and performance issues associated with this unusual source of data.

    So what do you do? Cast aside this critical form of analysis? Hardly a good answer. The better answer is to look for BI technologies that can keep up with Big Data, provide the same level of performance regardless of the volume or velocity of the data being analyzed, yet give the BI-savvy business users the familiar interface and multi-dimensionality they have come to know and love.

    This webinar will present the findings from a recent survey of Big Data and the challenges and value many organizations have received from their implementations. In addition, the survey will supply a fascinating look into what Big Data technologies are most commonly used, the types of workloads supported, the most important capabilities for these platforms, the value and operational insights derived from the analytics performed in the environment, and the common use cases.

    Attendees will also learn about a new BI technology built to handle Big Data queries with superior levels of scalability, performance and support for concurrent users. BI on Big Data platforms enables organizations to provide self-service and interactive on big data for all of their users across the enterprise.

    Yes, now you CAN have BI on Big Data platforms!
  • GDPR is here and I'm not ready! Information Governance Best Practices
    GDPR is here and I'm not ready! Information Governance Best Practices Alistair Cole, Partner at Ixium Group and Rex Ahlstrom, Chief Strategy and Technology Officer, BackOffice Associates Recorded: May 25 2018 46 mins
    If you are not yet ready for the General Data Protection Regulation (GDPR), the time is now to make it a key business initiative.

    In this webinar we will discuss a best practice strategy that:

    - Helps you achieve compliance with the Regulation
    - Aligns your data, policies and people with your business strategy.

    About the presenters:

    Alistair Cole, Partner at Ixium Group, has 25 years management & consulting experience covering a wide range of international blue chip clients including the Retail, Transport, Logistics, Finance and Telecoms sectors. From a Transformational Consultancy perspective, he has engaged at all levels with GDPR having been his main focus for the last 4 years. Now working with Clients across a number of different sectors, he has been responsible for establishing and driving GDPR compliance roadmaps & defining monitoring solutions.

    Rex Ahlstrom, Chief Strategy Officer at BackOffice Associates, has over 28 years of technology industry leadership experience. He specializes in enterprise software within the data integration and information management space. Ahlstrom earned a Master of Science in Electrical Engineering from Johns Hopkins University and a Bachelor of Science in Electrical Engineering degree from Drexel University. He is an experienced global lecturer, regularly addressing investors, business professionals and large customer communities.
  • GDPR: Deadline Day Special
    GDPR: Deadline Day Special Mark Rasch, Martyn Hope, Ray Ford, David Morris Recorded: May 25 2018 62 mins
    It's GDPR due date. How will enforcement be rolled out when a breach occurs and what are the likely consequences for the breach?

    Join this panel of experts:

    Martyn Hope: Co-Founder of the GDPR Institut
    Mark Rasch: Chief Legal Compliance Partner at DRM Institute, former Chief Security Evangelist at Verizon, former Lead Prosecutor at U.S. DOJ.
    Ray Ford: Founding Associate of GDPR Institut, DPO for Acer(UK) who currently hold some 15million childrens records on behalf of the Scottish Government.


    This session will cover:
    - How GDPR will be enforced.
    - Who is likely to be among the first brought to court?
    -What Should I do Now?
  • Becoming Compliant: Taming Your GDPR Data
    Becoming Compliant: Taming Your GDPR Data Tom Mighell, Esq., VP of Delivery Services and Greg Forest, CTO, Contoural Recorded: May 25 2018 60 mins
    It's May 25th and the GDPR implementation date is here. Now that you have your GDPR Data Protection Policy in place and you've found all of your GDPR Data out in the wild, what's next? Before you can organize, you need to first answer some basic questions: Where is the right place for specific content to live? How and where do we keep as few copies as possible? Who can and should have access to what? These are all elements of a data placement strategy. At its simplest level a data placement strategy ensures a place for everything and everything in its place. Join Tom Mighell and Greg Forest from Contoural as they discuss unstructured data placement strategies and provide an overview of the components of a strategy including:

    • Determining which data should go in which repositories; including file shares, SharePoint, and enterprise content management systems
    • Organizing data to be intuitive for users, and still meet policy goals
    • Maintaining the fewest copies of information, while still providing collaboration and access for your end users
    • Incorporating records retention, data security and other compliance requirements into your repositories
  • PCI Dream Team: Ask Us Your Toughest Questions [Part 4]
    PCI Dream Team: Ask Us Your Toughest Questions [Part 4] Ben Rothke | David Mundhenk | Jeff Hall | Arthur Cooper Recorded: May 25 2018 7 mins
    With hundreds of different requirements, the various Payment Card Industry (PCI) standards can be overwhelming. While the PCI Security Standards Council has provided lots of answers, the devil is often in the details. Our panelists are some of the top PCI QSA’s in the country, with decades of combined PCI and card processing experiences. They’ve seen it all: the good, bad and ugly; and lived to tell the tale.

    Join Ben Rothke, David Mundhenk, Arthur Cooper, and Jeff Hall for an interactive Q&A session, and get answers to your most vexing PCI questions. No PCI question is out of bounds.

    Speakers:
    - Ben Rothke, Principal Security Consultant at Nettitude
    - David Mundhenk, Senior Security Consultant at Herjavec Group
    - Jeff Hall, Principal Security Consultant at Optiv Security
    - Arthur Cooper "Coop", Senior Security Consultant at NuArx
  • GDPR: The Importance of Looking Beyond 25 May, 2018
    GDPR: The Importance of Looking Beyond 25 May, 2018 Robert Arandjelovic, Giampiero Nanni Recorded: May 25 2018 61 mins
    Today is the day that GDPR changes things substantially in protecting customer data, affecting businesses that handle, store or pass data of European Citizens both in and outside of Europe. It’s a huge undertaking with comprehensive and extensive compliance requirements and as it takes effect inevitably there will be stops and starts, legal and logistical challenges and hefty fines for non-compliance.
  • [APAC BPW] Stopping the Unstoppable: How to Detect and Prevent Fileless Attacks
    [APAC BPW] Stopping the Unstoppable: How to Detect and Prevent Fileless Attacks Kasey Cross, Senior Product Marketing Manager and Yoni Allon, Manager, Behavioral Research Recorded: May 25 2018 48 mins
    Fileless attacks are estimated to account for 35 percent of all attacks in 2018, according to Ponemon Institute. Threat actors can use a combination of exploits, scripts, and “living off the land” to stay under the radar. They can even carry out sophisticated attacks without ever installing malware on compromised endpoints. They can also use common networking and admin tools together with traditional malware to maintain persistence while locating and stealing valuable data.

    By monitoring user and device behavior, organizations can detect anomalies that indicate an attack is under way. Because most fileless attacks start with a vulnerability exploit, advanced endpoint protection can block the initial step of an attack from succeeding in the first place. Join us as we discuss how organizations can detect and stop all stages of fileless attacks.

    Attend this webinar to:
    •Find out how fileless attacks occur with a demo of an attack
    •Learn how Magnifier behavioral analytics, the first app of the Palo Alto Networks Application Framework, can detect the network behaviors associated with fileless attacks.
    •Understand how Traps advanced endpoint protection can block the exploits that lead to endpoint compromise.
  • Wie Sie GDPR in eine gewinnbringende Chance statt in eine Bürde verwandeln
    Wie Sie GDPR in eine gewinnbringende Chance statt in eine Bürde verwandeln Ashutosh Tamhankar und Robert Romanski Recorded: May 25 2018 40 mins
    Die GDPR-Frist steht vor der Tür, und viele Unternehmen zittern in den Startlöchern. Diese neue Regelung muss jedoch nicht unbedingt eine Bürde sein, sondern kann als Chance für Gewinn und Produktivität betrachtet werden.

    Natürlich sind Sie besorgt über das Risiko von Bußgeldern sowie die Compliance-Kosten. Aber die gleichen Tools, die Ihnen helfen, die Herausforderungen von GDPR zu bewältigen, können Ihnen auch helfen, wichtige Einblicke und echten Geschäftswert aus Ihren Daten zu gewinnen. Und wenn Sie sich auf ein besseres Datenmanagement konzentrieren, können Sie auch die Kosten senken und gleichzeitig die Effizienz und Produktivität steigern!

    Melden Sie sich an zu diesem Live-Webinar mit Experten von Commvault und staunen Sie, wie diese einen anderen Blick auf GDPR einnehmen und Ihnen zeigen, wie man es von einem positiven, profitablen und produktiven Standpunkt aus angehen kann.
  • [APAC BPW] Stopping the Unstoppable: How to Detect and Prevent Fileless Attacks
    [APAC BPW] Stopping the Unstoppable: How to Detect and Prevent Fileless Attacks Kasey Cross, Senior Product Marketing Manager and Yoni Allon, Manager, Behavioral Research Recorded: May 25 2018 47 mins
    Fileless attacks are estimated to account for 35 percent of all attacks in 2018, according to Ponemon Institute. Threat actors can use a combination of exploits, scripts, and “living off the land” to stay under the radar. They can even carry out sophisticated attacks without ever installing malware on compromised endpoints. They can also use common networking and admin tools together with traditional malware to maintain persistence while locating and stealing valuable data.

    By monitoring user and device behavior, organizations can detect anomalies that indicate an attack is under way. Because most fileless attacks start with a vulnerability exploit, advanced endpoint protection can block the initial step of an attack from succeeding in the first place. Join us as we discuss how organizations can detect and stop all stages of fileless attacks.

    Attend this webinar to:
    •Find out how fileless attacks occur with a demo of an attack
    •Learn how Magnifier behavioral analytics, the first app of the Palo Alto Networks Application Framework, can detect the network behaviors associated with fileless attacks.
    •Understand how Traps advanced endpoint protection can block the exploits that lead to endpoint compromise.
  • GDPR - Why May 25th Is Just the Beginning
    GDPR - Why May 25th Is Just the Beginning Primitive Logic CEO Jill Reber & President Kevin Moos Recorded: May 24 2018 46 mins
    Even though the GDPR enforcement date is here, it’s never too late to get on board and start assessing your data processes to begin aligning with the requirements.

    And even if your company is already prepared, May 25 is not a finish line.

    Not only will the regulation itself continue to be clarified through interpretation, but certain triggers in your organization down the road will require a re-evaluation of your compliance status.

    Join Jill Reber and Kevin Moos of Primitive Logic to learn:
    - How to assess your GDPR readiness and identify gaps that need to be filled
    - Why GDPR compliance is not a one-and-done endeavor
    - The internal and external triggers that may demand a re-evaluation of your GDPR compliance
    - How to build GDPR checks into your ongoing data management strategy
  • From Insight to Action: Best Practices for the GDPR-Ready Organization
    From Insight to Action: Best Practices for the GDPR-Ready Organization Zachary Bosin, Director, Digital Compliance, Veritas Recorded: May 24 2018 61 mins
    The world’s most expansive data privacy regulation -- the General Data Protection Regulation (GDPR) -- takes effect on May 25, 2018, and organizations of all sizes must be prepared to respond.

    This session will provide powerful insights from recent Veritas research regarding consumer sentiment toward data privacy and the implications for accelerating your compliance journey.  Additionally, we will cover a brief overview of the regulation’s most important tenants and key technology areas that can reinforce your compliance posture, including a helpful new framework for evaluating GDPR Readiness. 
  • It's Who You Know That Counts: Person-centric GDPR DSAR Fulfillment
    It's Who You Know That Counts: Person-centric GDPR DSAR Fulfillment George Chedzemov, Director of Client Success, BigID Recorded: May 24 2018 34 mins
    Privacy is About People. If you don't know whose data you have, you can't protect their privacy. GDPR data subject access rights requires companies to put that principle into practice. Yet, existing tools can't tell you what personal information belongs to which data subject in order to respond to data subject requests.

    A person-centric approach to locating and understanding data enables companies to effectively tackle the most challenging GDPR requirement: fulfilling Data Subject Access Requests at scale, across data sources and in minutes, not days.

    In this webinar, you will learn:
    - Why data subject access rights are a cornerstone of GDPR requirements
    - What are the elements of the data subject rights lifecycle
    - How a person-centric approach addresses GDPR requirements centered on data subject rights.
    - How a person-centric approach can bridge automation of request management with fulfillment at scale by IT teams.
    - What automation and fulfillment of a data subject access request utilizing a person-centric approach looks
  • Life After May 25: Sustainable GDPR Compliance With Visibility and Automation
    Life After May 25: Sustainable GDPR Compliance With Visibility and Automation Peter Hughes, Technical Director, Sales, Skybox Security Recorded: May 24 2018 46 mins
    Deadline day for the European Union’s General Data Protection Regulation (GDPR) has been looming large for security programs around the world. But is your organization ready to efficiently and effectively maintain compliance beyond May 25?

    Join Skybox Security for the BrightTALK webinar on simplifying compliance management with comprehensive attack surface visibility and automation.

    In this webinar, you’ll learn:
    • How network modeling provides fundamental visibility to understand what data is at risk and what resources you have to protect it
    • Which automated processes will have the greatest benefit on reducing an organization’s data security risk
    • How combining visibility and automation can systematically tighten access and improve security process efficiency and impact
    • The benefits of visibility and automation in compliance-related use cases such as firewall auditing, change management, rule life cycle management, vulnerability management and more
  • Big Mon on Campus: OU Improved Netwk Security+Visibility +50% + CAPEX Savings
    Big Mon on Campus: OU Improved Netwk Security+Visibility +50% + CAPEX Savings Aaron Baillio, University of Oklahoma and Fasial Khan, Big Swtich Recorded: May 24 2018 58 mins
    Learn how The University of Oklahoma leverages Big Mon Fabric Out-of-Band (OBB) to achieve unprecedented visibility and security as well as Big Mon Analytics Node and Recorder Node to address the following challenges: Unauthorized Application and Device Sprawl, Capacity Planning, Threat Mitigation. The University of Oklahoma deployed Big Monitoring Fabric nearly two years ago, initially, The University made the decision to replace an incumbent legacy Network Packet Broker (NPB) solution with Big Mon, due to its ease-of-use, to drive innovation and create internal and operational efficiencies, and the versatility of the product appealed to its innovative IT team. Since deploying Big Mon, The University has achieved twice the visibility at nearly 50% CAPEX savings and has benefitted from improved management workflows, including centralized configuration, orchestration troubleshooting, scale-out security, and monitoring.
  • Modern Vulnerability Management : Knowledge, Automation, Analytics 
    Modern Vulnerability Management : Knowledge, Automation, Analytics  Syed Abdur, Brinqa, Director of Product Recorded: May 24 2018 60 mins
    With growing numbers of new vulnerabilities disclosed every year, increasing attacker sophistication, and a myriad of tools and teams that have to be synchronized for effective response, most organizations struggle with designing and implementing an effective vulnerability management program. In this webinar we discuss 3 key components that all modern vulnerability programs must address :

    - Knowledge: How to create actionable intelligence from business context, threat intelligence, and any other relevant data source
    - Automation: How to implement automation to streamline significant parts of the VM process
    - Analytics: How to effectively engage and inform all stakeholders
  • Four Advanced Troubleshooting Tasks for Linux Experts and Beginners
    Four Advanced Troubleshooting Tasks for Linux Experts and Beginners Jennifer LuPiba, Principal Product Marketing Manager, Red Hat Recorded: May 24 2018 39 mins
    In this webinar, we’ll walk you through 4 advanced troubleshooting use cases that simplify management for both the Linux® expert and the beginner.

    The Red Hat® Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more.

    No matter what stage you're in as a Linux user, join this webcast for an overview of how to take your troubleshooting to the next level.
  • The Journey to Service Mesh using a Microservices Demo App
    The Journey to Service Mesh using a Microservices Demo App Charles Pretzer, Technical Architect, NGINX Recorded: May 24 2018 64 mins
    Bringing microservices and service mesh architectures to life in working code is a huge and novel challenge. NGINX makes this easier with Ingenious, a demo app that is part of the Microservices Reference Architecture (MRA). Ingenious works across multiple architectures, bringing the differences and advantages of each to life.

    In this webinar we discuss how Ingenious is (mostly) the same, but also the differences in its code, features, and runtime behavior, as it’s implemented in various architectural models. You then get a chance to ask us, well, anything about microservices, the MRA, and service mesh architectures.
  • PCI DSS, GDPR & Data Security for Call Centers: Navigating Regulatory Landmines
    PCI DSS, GDPR & Data Security for Call Centers: Navigating Regulatory Landmines Scott Kaplan, Semafone, Chanley Howell, Foley & Lardner LLP Recorded: May 24 2018 56 mins
    With the onslaught of cyberattacks we've already seen in just this year alone, data security has never been a higher priority for organizations. Protecting customer data is of utmost importance, especially with governments and regulatory bodies increasingly turning their attention to these issues and producing legislation to implore companies to take additional security measures.

    Contact centers are a part of the organization particularly fraught with responsibility, serving as a vast repository of sensitive customer data and finding themselves to be a favorite target for hackers and fraudsters. Because of this, contact centers face a myriad of laws and regulations governing the way they treat this data, such as the PCI DSS for those taking payments, among many others.

    Register now to join Scott Kaplan from Semafone and Chanley Howell from Foley & Lardner LLP, two leaders in the data security field for an insightful webinar where you'll learn:

    - The top data security regulations, laws, and standards bodies affecting contact center data governance
    - How to comply with sometimes competing regulatory requirements and resolve conflicting stipulations
    - How to achieve compliance more simply and cost effectively

    Additionally, registrants will receive a free copy of Semafone's newly released Navigating the Challenging Regulatory Landscape in Your Contact Center.

    Reserve your space now!