People HR® helps companies manage their employees, which means handling high volumes of personal information – just the type of data criminals wants. They required support to protect critical customer data and reach an exceptional standard on compliance and security; a need emphasized with the introduction of the General Data Protection Regulation (GDPR).
Given the sensitive nature of the data, People HR required effective security controls to be put in place to ensure adherence to regulatory requirements. Implementing new technologies can be costly and filling the cyber security skills gap has become increasingly difficult in today’s evolving threat landscape. The set and forget, controls-based strategy of the past will no longer adequately protect organisations against more sophisticated cyberattacks.
In this session, Rackspace will discuss how the provision of proactive monitoring, intrusion detection and incident response in addition to data encryption enabled People HR to protect customer data and create clear policies around the data governance and protection regulation with an approach that is both platform agnostic and cloud-centric.
GDPR is here, and now there is another piece of legislation set to shake up the marketing industry: introducing the ePrivacy Regulation. Join us for a whistle-stop tour of everything you need to know about how the regulation interacts with the GDPR – and how it will affect your business.
Recently, the Government found that 72% of large companies and 49% of SMEs have experienced skills gaps when attempting to hire digital talent into their business. Do you fit into this category?
We’ve created AWS re:Start, a training and job placement programme, in an attempt to help close the digital skills gap. By training and placing groups that have been left behind in the digital revolution, we hope to help you from both a skills and CSR perspective. Join us for this webinar to find out all about the program and hear about how your company can get involved and start placing ex-military personnel with AWS skills.
Join us for our quarter-end strategy update webcast. Engage with portfolio manager Andrew Kurita to learn about what drove second-quarter performance, the portfolio manager's outlook, and current portfolio positioning.
Networks, services, applications and data are under virtually constant siege from both automated and targeted attacks. Once compromises and data breaches are discovered, companies often learn that attackers have been camped out for months – conducting reconnaissance and spreading across the network to find the most valuable resources or data. Therefore, it is important for organisations to have effective threat detection and incident response systems in place to identify and address threats.
Many organisations are also starting to realise that simply replying on blocking tools is not the right approach, it is the lack of visibility in most cases, that leads organisations missing the obvious signs of a cyber attack.
Effective threat detection is continuously monitoring your cyber assets for advanced threats, alerting you to validated exploits, and rapidly investigating and responding to confirmed incidents.
According to cyber security experts, the frequency and severity of cyber attacks are on the rise, causing alarm to businesses and customers across a variety of industries. Taking a proactive, strategic approach to evaluating your cyber security strategy is critical, it starts with understanding who your organisations adversaries are and what the impact would be on your business if you were the victim of a cyberattack.
Hear from Graham Cluley as he examines the latest methods and exploits used by cyber criminals providing an overview of the most current ways they target businesses. You’ll get an insight on how the most sophisticated attackers choose their targets and what they are looking for.
You will learn about:
- The ever-changing threat landscape, and how it affects your business
- Key Considerations for your Cyber Security Strategy
- Insight into real-life case studies
Most online attacks begin when a hacker discovers a single vulnerability in an enterprise application. But how can organizations eliminate these vulnerabilities before they are exploited? While most enterprises are focused on application scanning and remediation, many software development experts are advocating better, more secure application development initiatives that prevent vulnerabilities from occurring in the first place. In this webcast, experts on application security and the DevOps movement discuss the steps that enterprises can take to build security into the app development process.
Most enterprises understand the value of hybrid cloud. In fact, your enterprise is already working in a multi-cloud or hybrid cloud environment, whether you know it or not. Watch this 30-minute webinar to gain a greater understanding of the requirements of a geo-distributed cloud database in hybrid and multi-cloud environments. We'll discuss the differences & similarities between hybrid cloud and multi-cloud, why data autonomy is critical, and what you get with a distributed cloud database designed for hybrid cloud.
rollcall: gary v - topic: Chrome Ext Month, seek out - Paired Stream 101
Connect with us:
Learn more about us:
As systems evolved from physical servers to virtual machines to the public cloud to containers, the design focus shifted from building a single robust, stable component to building a more stable microservice oriented system where individual service components can be modified or replaced without affecting the overall system. Enterprises in this evolution cycle continue to have a mix of their applications running on physical hardware, virtualized platforms, in public cloud infrastructures and Kubernetes container clusters.
During this webinar, experts from AWS and Ixia, a Keysight business will share:
•Strategies to provide packet visibility to your workloads in any environment
•Insights into planning and implementing strategies
•Review emerging designs and best practices
You will also see a step-by-step demonstration of how you can establish packet visibility into your workloads in Physical, Virtual, Cloud, Container or in a Kubernetes Cluster by continuing to maximize on your existing investment in APM, NPM and IDS tools.
Service-enabling legacy assets and effectively managing and orchestrating services is the first step toward realizing the promise of the New Enterprise. In this webinar, Steven Camina, Sr. Product Manager at MuleSoft, will present strategies and demo solutions for getting the most out of your legacy assets and outline the steps you can take to build a solid foundation for APIs down the road.
You will learn how to:
•Identify legacy assets within your organization
•Move data in and out of legacy systems without downtime [DEMO]
•Wrap legacy applications with APIs to capitalize on existing investments [DEMO]
•Build future-proof integrations that deliver continued value [DEMO]
No enterprise can be completely secure, and in the uncertainty that necessarily permeates the landscape, others will find fault. This web conference provides a way for CIOs to use proven scientific and economic principles to enhance their organizations’ security position. Simply put, the most effective security programs reduce the most risk with the least resources; therefore, an organization must find a way to measure the efficacy of its security program to understand how much of the risk it is reducing after it applies security controls. With the appropriate key risk indicator (KRI) data collected, organizations can determine which initiatives are ultimately the most useful in their security program.
Join sales management expert Steven Rosen and his guest sales management expert Ken Thorson for no hold barred fire side chat sharing their insights on the most challenging issues facing sales managers today.
No powperpoint, no videos, just open and frank discussion.
Expect an action-packed webinar filled with sales management gems, pearls, powerful insights and stories, that will help you crush your sales numbers.
Tips and tricks to help you stay engaged, keep your skills sharp and your portfolio evolving.
Through my engagement with the Tableau and wider data visualization community for Makeover Monday, I have seen what works and what can be challenging. I will give you a shortcut to continued inspiration and data excitement.
This talk is for everyone, whether you're an analyst, information designer, team leader or executive.
Symantec Control & Compliance Suite – Automatisieren Sie Compliance-Abläufe, schaffen Sie Transparenz und sparen Sie wertvolle Zeit
Symantec Control Compliance Suite liefert geschäftsrelevante Sicherheits- und Risikoinformationen, mit denen Sie Prioritäten für die Bereiche Sicherheit, IT-Betrieb und Compliance effektiv abstimmen können. Bewertungen erfolgen fortlaufend und automatisiert. Sie erhalten damit eine Gesamtübersicht über Sicherheitskontrollen und Sicherheitslücken. Auf diese Weise sind Sie in der Lage, das Rechenzentrum zu härten, die Behebung von Sicherheitsvorfällen zu priorisieren, sicher auf ein Software-Defined Data Center umzustellen sowie kontinuierliche Bewertungen für die Cyber-Sicherheit und die fortlaufende Überwachung zu unterstützen
A Product Manager has the unenviable task of prioritization, balancing several short and long-term objectives to arrive at the what and when for the product team. For an early stage product, stack ranking priorities might be sufficient. For a mature product, the challenge is often deciding what not to focus on at any given time because several areas will need at least a minimum level of investment to continue to serve your customers and stay competitive. The right prioritization framework, therefore, depends on the factors such as maturity of the product, organization and competitive environment.
In this presentation Callum Thomas, Head of Research at institutional research house Topdown Charts, will talk through the macro outlook for China. He will talk about where China is at in the business cycle, the key charts and indicators to watch, and how the macro outlook will shape the key risks and opportunities ahead. Listeners will leave the presentation with an understanding of the main things to think about on the macro front in China, and how to integrate that with the investment outlook.
Callum Thomas, Head of Research, Topdown Charts
Callum is the founder of Topdown Charts – a chart driven research house covering global asset allocation and economics. Callum has a background in multi-asset investment strategy on the buy-side and has built up strong research and analytical expertise for generating global macro driven investment insights and unique charts. Callum’s vision in creating Topdown Charts is to serve as a vital resource for portfolio managers and active asset allocators on idea generation, risk management, and in informing their macro view. Callum is based in Queenstown, New Zealand.
Learn how you can improve container troubleshooting and performance using next-gen monitoring techniques; why containers are the future of enterprise workloads; how real companies are adopting container technology; and what you’ll need to prepare yourself for containers in the datacenter or the cloud.
In this era of ceilings being broken and “culture adds” over “culture fits,” it’s never been more critical to weed out bias within your organization.
And there’s quantifiable proof that it’s good for your culture, too. Two-thirds of job seekers say that a diverse workforce is an important factor when evaluating companies and job offers (1).
In this webinar, you’ll learn how to:
Audit your interview process, from start to finish
Spotcheck diversity benchmarks to manage expectations
Refine your content to appeal to the talent you’re trying to reach
(1) Glassdoor site survey, June 2014
Brenna Child, Head of Talent Management, Employer Branding at the Washington Post
Amy Forbes Winebright, Project Manager, Global Employment Brand at Dell
Jesus Suarez, Recruiting Coordinator, Glassdoor
This webinar is part of BrightTALK's Masterclass Series.
Do you find experiencing emotions difficult and unsettling at times, and wish you could understand them better? Perhaps you would love to feel more in control of your emotional world instead of feeling at the mercy of feelings all the time…and you’d love to know what to do when you (or others) feel overwhelmed by challenging emotions like anger, frustration or anxiety.
You know that your emotional wellbeing could be so much better, but you don’t know quite where to start with improving it. Where you are right now in terms of your emotional world worries you sometimes and you know it’s holding you back at times in your career, health, relationships and overall peace of mind.
In this webinar, you will learn:
-How to understand your emotions and turn them from enemies to friends.
-How to proactively manage your emotional wellbeing and create a road map for improving it that is personally tailored to you.
-What to do when you are triggered by a strong and challenging emotion such as anger or anxiety, so that you are super comfortable with how you’ve handled it both in terms of yourself and other people.
-A process that will revolutionise how you handle feelings of overwhelm.
-How to communicate your emotions and what you need in a way that feels empowering and gets you the kind of result you want.
This webinar will provide an analysis of what an Initial Coin Offering is useful for, who uses them, how to do your own, and how to get involved in others. It will provide an overview of how to tokenize an asset, why blockchain is used to do this, and how companies have done it so far.
Delivering quality code on time and on budget is one of the biggest challenges of organizations worldwide. With evolving cyber security threats, security became a top of mind concern for board rooms and an essential KPI for development/testing. Since fixing security related (or any) issues later on in the software lifecycle is highly inefficient, the best approach is to blend security early on in the development/testing processes. One of the key methods of having fewer vulnerabilities in the code is through not introducing vulnerabilities in the first place. This requires increasing the security knowledge and awareness of developers through secure code development training.
Fortify on Demand offers application security as a service with integrated secure development, security testing and continuous monitoring making securing applications easy and scalable for organizations. As part of Fortify on Demand, we offer gamified developer training as a result of our partnership with Secure Code Warrior. Secure Code Warrior addresses the root cause of security vulnerabilities in applications by educating developers on how to apply secure coding techniques. Fortify on Demand (FoD) integrates with Secure Code Warrior, so developers can not only identify but also remediate vulnerabilities in application code in a gamified manner—this appeals to the gaming mentality of developers by providing a competitive element.
In this talk, Oleksii Barash PhD, IVF Laboratory Research Director at the Reproductive Science Center of the San Francisco Bay Area, will discuss his team’s approach to applying machine learning for decision making during infertility treatment. Oleksii will also give a quick overview of how he uses Driverless AI to build models for predicting IVF outcomes and select the best embryo for embryo transfer.
Oleksii believes that evidence-based clinical decisions will greatly improve the efficiency and safety of the medicine. He received his Master degree in Clinical Embryology from University of Leeds (UK) and PhD in Cell Biology. The ultimate goal of his findings is to essentially transform medical records into medical knowledge.
In this age of extreme data growth and variety, ever more stringent regulations, complicated hybrid environments including physical, virtual and cloud, and reducing IT budgets, Micro Focus has released version 10 of its Data Protector platform, part of the Micro Focus Data Protection Suite. In this webcast attendees will learn how they can better protect their applications across legacy and modern platforms, use analytics to track and manage SLAs and improve the security of their backup to mitigate the risk of cyberattacks when they upgrade to Data Protector 10. A live demo of the new features will be shown should time permit.
How do you prevent the loss of secure or confidential information of your organisation to an untrusted environment or user?
Have you met various regulatory requirements regarding financial, health or personal Identifiable Information to avoid risk of massive fines if a breach occurs?
Join Rahul Kumar, Country Manager India, WinMagic, for a 30 min webinar and ask him why Encryption should be an important pillar of your data security strategy.
The world is changing and whilst you're reading this; the speed of change is increasing even further. What this leads to no one knows - the future of financial services could be "anxious and challenging" or "brilliant and full of opportunities".
Will customer centricity still be the mindset? What about “AI-first”? Or will we jump into the next phase of life?
In this session, Vincent Fokke, CTO FS Benelux, Capgemini, will walk you through the future of banking touching on key themes including;
* AI First as starting point
* Branch “office" or not…
* PLC V4.0
Join this session and start tomorrow's conversation today.
SaaS applications like Microsoft® Office 365® are wildly popular, and adoption across enterprises continues to grow, but so do the hidden threats lying within these offerings, such as:
• Accidental data exposure with SharePoint®
• Uncontrolled use of personal OneDrive® accounts
• Data security violations in Exchange
Yes, even trusted SaaS applications like Office 365 can increase your risk of breaches and noncompliance.
Our Security Operating Platform can help. Sign up for our webinar and learn what you need to meet your CASB needs as well as secure your cloud-based data against malware and accidental exposure.
You’ll also find out how to achieve complete visibility and reporting, data classification, and fine-grained enforcement across users, folders and file activities to protect your business-critical data in Office 365.
The title is a cynical reference to the hype around Digital Transformation and DevOps. There’s a lot of confusion and you may be wondering what the terms actually mean and what the relationship is between the two. If we look closer, we’ll see that DevOps has much to support Digital Transformation, but that it’s only one of the pieces in the Digital Transformation jigsaw puzzle.
The last time the banks were investing the world was a very different place. Prior to 2008 social media was still nascent, there were no bitcoins and there was no ‘Fintech’… the first generation iPhone had only just been released.
However despite many of these advances and the emergence of new technologies, social and financial inclusion and mobility are arguably at their lowest point and the divide between the richest and poorest is bigger than ever’.
In this session we explore some of the big trends of 2018 and how Financial Services has the chance to really transform if the right investments are made.
Ben is a Partner in Baringa’s Banking practice with over 20 years experience in financial services. Ben leads Baringa’s Global Transaction Banking and Payments business and specialises in helping clients to optimise their operating model in the face of new competition and continued regulatory scrutiny and in shaping and delivering the required business transformation.
Recently Ben has been supporting several Fintechs in the development of their propositions, working on proofs of concepts in Blockchain/DLT and helping banks to make the most from the PSD2/ Openbanking opportunity.
We are witnessing a vast wave of data breaches across the globe – these breaches are fruits of sophisticated cyber criminals, but also of the complexity that plagues IT security. Businesses are told to cover the basics of cybersecurity, but even the basics can be complex. The attack surface is larger than ever before, companies are being offered different security tools, new policies are being introduced and all of this has led to a gap that today’s cyber criminals are exploiting.
Join Ryan Holland, Alert Logic’s Senior Director of Cloud Architecture, as he shares best practices for reducing the negative impact of IT sprawl, security sprawl and the ever-evolving attack surface.
- Cloud security threats
- The importance of understanding your cloud attack surface
- Cyber breaches & vulnerabilities – real-life examples
- CSP security services
- Security sprawl – what you don’t know can hurt you
This impactful webinar will help you to understand what key strategies you can adopt to increase security, manage risk and be compliant.
Businesses are being forced to move at a higher speed than ever before, but the challenges are coming thick and fast - namely facing new competition, cost pressures, skills gaps, monitoring and metrics, and understanding and adhering to evolving standards for innovation, quality and reliability. These challenges make Digital Transformation a tricky game to win.
In this session, our panel of experts will discuss how DevOps can make digital transformation easier and help you;
* Deliver business value
* Boost bottom lines
* Give the best customer experience
Join the discussion on and level-up your DevOps game!
Rob Akershoek, Solution Architect, Shell
Prakash Vyas, ITOA Specialist EMEA, Splunk
James Finister, Global ITSM Strategist, Tata Consultancy Services
Dimitri van den Broek, EVP, Strategic Alliances & Co-Founder, ITpreneurs
Moderated by Barclay Rae, ITSMf Board Member and Director, Essential SM
"You think you understand the situation, but what you don't understand is that the situation just changed."
- Putnam Investments advertisement
In today's digital economy there's a lot of communication about how companies will become obsolete and close their doors if they don't adapt and change. It turns out this is true for IT professionals as well.
For over two decades, IT Operations has mostly stayed the same. Professionals would rack and stack servers, physically wire networks and configure firewalls, and run a script here and there to address a service ticket. This world is dramatically changing! The world of server computing has evolved so that physically tinkering with hardware is quickly approaching obsolescence. The trend that has been growing and the technical direction that makes the most sense when describing and dealing with cloud resources is code.
In this webinar, we discuss the skills and thinking that will be necessary to keep your job as companies, methodologies, and best practices all shift left. We aim to help you make a smart transition. No IT professional need to lose their job if they're willing to adapt and to learn.
As the scale and complexity of cyber attacks grows faster than ever, new ways must be explored to fight back.
Using machines to perform tasks such as malware analysis and real-time anomaly detection means a faster time to protection, frees up analyst time for more advanced research, and marks a big step forward in the battle against cyber crime.
This session discusses how you can leverage machine learning and other artificial intelligence techniques to enhance and extend your existing detection methods.
Join us for the latest of our BrightTalk updates on the Hawksmoor Vanbrugh and Distribution Funds.
In this webinar, our Fund Managers will:
▪discuss the best investment opportunities and their associated costs
▪explain the rise in the Funds' OCFs due to the new PRIIPs legislation
▪review how performance over the past quarter builds on our Funds' strong long-term records
▪highlight the major activity within the portfolios
The webinar will run for approximately 20 minutes with another 10 minutes allocated for Q&A.
Questions can be submitted live to the Fund Managers on the day.
Running a security operations is not a simple undertaking. It takes skilled staff, technology, processes and procedures and loads of practice. In addition, actionable contextual threat intelligence is key when it comes to ensuring the SoC and its teams are affective in early detection of attacks.
The key word here is EARLY detection. Join Amar Singh and his special panelists as they discuss some of the key pillars of threat intelligence and how to make them work in any SoC environment.
You’ve just hired James Bond on to your sales team and you have high hopes for his performance. Assuming you really did hire James Bond and not Mr Bean in a Tux, what can you do to ensure disappointment?
Why! Fail to do a proper onboarding process! Delude yourself into thinking you hired an adult, a professional, someone who can be depended on to hit the ground running. “John is a big boy and doesn’t want me crowding him. I’ll let him get on with it.”
This is called management by abdication and is one of the cardinal sins of sales management.
Onboarding is the lost element of successful recruitment. The best sales managers have a 120 day onboarding plan for new hires. Why 120 days? Because that is the probation period a new hire is typically putting you (their manager, the job they actually bought, the company and the other people on the team) on in case they believe they have made a bad choice of career move.
You’ve invested time and money in attracting them, selecting them, offering them, legal & HR costs, managing their notice period, paying them, training them and you risk blowing your winnings because you’re too busy, too stupid or too lazy to finish the job you started!
Onboarding is not about giving them an Ops & Employee Manual to read, giving them some product training and provisioning them with passwords, a laptop and a phone. Those are the tiniest part of a good onboarding process. Onboarding should set up a new hire for success. It should be structured and confirm that you have made the right hire. It should tell you quickly if you haven’t so you can hire slow and fire fast.
A reliable onboarding process needs to cover 3 things:
* What do they need to know?
* By when do they need to know it?
* Where can they find it?