Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Global Supply Chain Risk Report: Insights and Findings from Q1 2019
    Global Supply Chain Risk Report: Insights and Findings from Q1 2019
    Dr Heather Skipworth and Dr Emel Aktas, Cranfield School of Management Jun 19 2019 12:30 pm UTC 30 mins
    Join this webinar, led by experts from Cranfield School of Management to hear the results of the Q1 2019 Global Supply Chain Risk Report.

    The Global Supply Chain Risk Report is a joint study by Cranfield School of Management’s Centre for Logistics and Supply Chain Management and Dun & Bradstreet, which investigates the level of supply chain risk faced by European companies with international supplier relationships.

    Analysis has been carried out using data supplied by Dun & Bradstreet, which included around 200,000 anonymous transactions between European buyers and their suppliers who were located in more than 150 countries worldwide.

    During the webinar, we will focus on the Q1 2019 report, published in June 2019. We will cover the background, the key findings and practical implications for procurement professionals.

    Register now to learn:

    - The level of supply risk in Q1 2019
    - The differences across key industry sectors and how this should be considered in procurement decisions
    - How dependency on key suppliers changed compares with the previous quarter

    Presented by Dr Heather Skipworth and Dr Emel Aktas, Cranfield School of Management
  • EDM Council's Data Management Capability Assessment Model (DCAM)
    EDM Council's Data Management Capability Assessment Model (DCAM)
    Nicola Askham, Mark Humphries, Pete Youngs, Mark McQueen Live 45 mins
    Pete Youngs and Mark McQueen from Ortecha ( https://ortecha.com/services/dcam/) walk you through the EDM Council's Data Management Capability Assessment Model (DCAM), describing the structure of the model and how it is used to benefit your organisation.
  • Multi-Cloud Management: How to Scale Enterprise IT
    Multi-Cloud Management: How to Scale Enterprise IT
    Panelists to be announced Oct 10 2019 12:00 pm UTC 75 mins
    Cloud has become ubiquitous with IT and technology in general. From infrastructure to data centers and collaboration, to wireless networks and service desks, what comes next in cloud? Is multi-cloud the new wave of adoption?

    Tune into this live panel discussion at Digital Transformation EXPO London to discuss these and other questions.

    Topics include:

    - How to increase efficiency and scale your IT on-demand whether you're plugging into a private, hybrid, public or multi-cloud infrastructure
    - How to ensure that your servers, storage, and networks are keeping up with demand
    - The future of collaborative work and unified communications
  • Digital? Transformation? Oh, you mean shiny new tech! ...Err, no, I don't!
    Digital? Transformation? Oh, you mean shiny new tech! ...Err, no, I don't!
    Daniel Breston, Technology Leadership Transformation Coach, Virtual Clarity Live 60 mins
    Sounds easy this Digital Transformation thing. Everyone apparently is doing it. Save a bunch of money. Makes customers happy. Our organisation looks good in the press or on the stock market. Hey – we don’t even have to do it as we can outsource everything to someone else! Nirvana!

    Really? I mean REALLY? What percentage of these initiatives do not meet their expectations? What percentage of these initiatives instead make customers unhappy, or cause staff to leave or cost you money because you did not consider what these 2 words REALLY mean?

    Let’s discuss what Digital Transformation can mean to you in what I hope is an interactive session on language, leadership expectations, metrics, basic tools you need, challenges, outcomes and the impact on your people. This is not a technical session. This is a discussion for leaders at any level on how to best engage the new industrial movement of our time best known as Digital Transformation.

    About the speaker:
    Daniel Breston was a technology leader at some level for over 3 decades for large financial services organisations in the USA and UK. Now at Virtual Clarity, Daniel coaches leaders that want to benefit from or lead technology teams to help organisations do better things faster and safer. You can also find Daniel speaking at ITSM, DevOps or local conferences or join him in discussion blogs.
  • Integrating AppSec into Developer Tools and Processes
    Integrating AppSec into Developer Tools and Processes
    Tim Jarrett, Product Management at Veracode Live 60 mins
    Securing code during development increases speed to market and reduces cost – but developers can resist security testing if it’s disruptive to their workflow. That’s why planning your application security program with developer tools and processes in mind often means the difference between success and failure. This session will help you understand how, where, and when application security fits into a modern development organization.

    Key Takeaways:
    •Learn how to make security invisible, automate security checkpoints and integrate with popular tools like IDEs, ticketing, bug tracking, and build systems.
    •Scan as early as possible in the Software Lifecycle, as early as when code is written in an IDE.
    •How to proactively approach open source code your developers are using.
  • Shoot for the Cloud: Getting Started with Security in AWS
    Shoot for the Cloud: Getting Started with Security in AWS
    Daniel Prauser Live 60 mins
    Is your organisation moving to Amazon Web Services? Or are you a seasoned AWS pro, but need to know where to start to secure it?

    It’s a fact—Cloud environments aren’t going away anytime soon. Cloud adoption is expected to grow at 12.4% annually until 2025. When you need to get started in a new cloud environment, or secure an existing one, vulnerability management is the place to start.

    Join Daniel Prauser to learn the fundamentals of setting up vulnerability management in your cloud environment and common pitfalls to watch out for.

    In this webinar we will cover:

    The future of the cloud infrastructure landscape
    * Some common misconceptions. Did you know AWS doesn’t secure your environment for you?
    * Vulnerability Management best practices
    * How Rapid7's InsightVM and InsightIDR can help
  • Visibility in Public Cloud Umgebungen
    Visibility in Public Cloud Umgebungen
    Daniela Fusaro, Senior Solutions Architect Recorded: Jun 19 2019 14 mins
    Viele Unternehemen ziehen es in Betracht Ihre existierende Infrastruktur in der Public Cloud zu erweitern oder sogar in einigen Fällen zu ersetzen. Während der Einsatz der Public Cloud unerhörte Flexibilität bietet, was das Ausrollen und die Bereitstellung angeht, stellt es Organisationen vor der Herausforderung, wie sie dieses Umfeld am besten sichern und überwachen können, vor allem wenn es sich um den East-West Traffic im Netzwerk handelt.
    Einsicht im Netzwerkverkehr zu gewinnen ist der erste Schritt, diese Umgebungen zu sichern und dafür zu sorgen, daß alle Resourcen effizient genutzt und ihre Performanz optimiert wird.


    Finden Sie heraus in unserem 15minutigen Webinar wie Sie:

    - Mehr erfahren über die Herausforderungen von Unternehmen bei der Einführung von der Public Cloud
    - Einsicht gewinnen wie Tools mit Hilfe der Gigamon Lösung, Zugriff auf diesem Netzwerkverkehr gewinnen und dabei Sicherheit und Leistung verbessert werden
    - Herausfinden wie Gigamon Netzwerk Packet Broker innnerhalb dieser Umgebungen virtualisiert hat und wie alles mit GigaVUE-FM zusammenhängt
  • How to align marketing content with audience buying behaviour…and sales goals
    How to align marketing content with audience buying behaviour…and sales goals
    Rene Power, Founder, Vision B2B Marketing and Training Ltd Live 60 mins
    In all new BrightTalk webinar, regular contributor René Power from Vision B2B Marketing
    and Training will share powerful strategies to help B2B product and service businesses
    maximise their expertise and marketing resources to drive the right kind of inbound inquiry.
    In this session you’ll learn how to
    - Reverse engineer a sales funnel and align marketing activity to it
    - Identify and understand the needs of target audiences
    - Creatively create multi-use content and powerful integrated marketing programmes
    including lead magnets, article syndication, email, PR, social and more.

    Webinar attendees can get access to a bonus workbook for the webinar by emailingrene@visionb2b.co.uk ahead of live broadcast.
  • Securing the Sugar out of Azure DevOps Pipeline
    Securing the Sugar out of Azure DevOps Pipeline
    Colin Domoney DevSecOps Consultant at Veracode Recorded: Jun 19 2019 43 mins
    This webinar will provide a comprehensive look at the security features of the Azure DevOps CD/CD platform. The topics include built-in security features such as user access controls and branch policies; and an overview of best practice for the incorporation of various 3rd party security tooling such as Veracode Greenlight within your pipeline.

    Other topics include best practices for pipeline telemetry, reporting, pipeline protection and templates for security best practices. Whether you are a software developer using Azure DevOps, a security manager or a DevOps expert this webinar should further enhance your expertise in secure software delivery with Azure DevOps.

    Register for this live webinar where Colin Domoney - DevSecOps Consultant at Veracode - will leave you with a clear understanding of how to Secure your DevOps Pipeline.
  • End of Support for Windows 7 and Opportunities with Windows 10
    End of Support for Windows 7 and Opportunities with Windows 10
    Ronan Smyth; Wynand Pretorius & Jonathan Ryall Recorded: Jun 19 2019 55 mins
    After January 14th 2020, Microsoft will no longer provide security updates or support for PCs running Windows 7. But you can keep the good times rolling by moving to Windows 10 with the help from Dell. This webinar will explain the O/S transition and benefits of Windows 10 by Microsoft, modern devices from Dell for Workforce Transformation, followed by Dell Services benefits for the transition by Dell.
    Speakers:
    Ronan Smyth, Dell Account Director, Microsoft;
    Jonathan Ryall, Field Marketing Manager, Client Solutions Group
    Wynand Pretorius, Solution Principal - End User Computing
  • Data Warehouse Testing—The Next Opportunity for QA Leaders
    Data Warehouse Testing—The Next Opportunity for QA Leaders
    Raj Kanuparthi, Founder, Narwal, Inc; Wayne Yaddow, Testing Consultant, Coach & Mentor Recorded: Jun 19 2019 63 mins
    Your testing expertise is great preparation for data warehouse and big data testing—which is fast-becoming a new opportunity for testers. If your organization isn’t already recruiting traditional testers to safeguard data quality, they probably will soon. Are you up for the challenge?

    If so, watch two data warehouse testing leaders for the webinar Data Warehouse Testing—The Next Opportunity for QA Leaders. Wayne Yaddow is a data warehouse testing consultant who literally wrote the book on data warehouse. Raj Kanuparthi is a senior quality leader who drove the big data testing initiative at one the world’s leading financial service companies. Tricentis has gotten them together to give you a realistic look at why quality leaders are making data testing an integral part of their quality process, and the role that Tricentis Tosca experts are playing in these transformations.

    We’ll cover:

    - Why data testing is important
    - How it compares to “traditional” software testing
    - Where data warehouse testing fits into the broader quality strategy
    - How leading enterprises got started with data warehouse testing
    - The top challenges they faced
    - The importance of automation—and how Tricentis helps
  • If Developers Own Security Testing in DevOps - What is Security's Role?
    If Developers Own Security Testing in DevOps - What is Security's Role?
    Chris Wysopal, CTO at Veracode Recorded: Jun 19 2019 42 mins
    Application security is “shifting left.” As the responsibility for ensuring the stability and security of software shifts to developers, what does this mean for security professionals? What does their job look like if developers are responsible for security testing?

    Learn:
    •What the security professional’s role and responsibilities look like in a DevSecOps shop
    •The DevSecOps cultural changes that will affect security
    •The attributes that security tools will need in this new landscape
    •Best practices for security professionals looking to not only survive, but thrive, in a DevSecOps world
  • Learning from Carillion: Does lightning strike twice?
    Learning from Carillion: Does lightning strike twice?
    Adrian Grant Recorded: Jun 19 2019 40 mins
    While the set of circumstances surrounding the implosion of Carillion is unlikely to be replicated exactly elsewhere, it is important that we assess how closely Carillion’s modus operandi fits to other leading U.K. contractors.

    Following the launch of the popular guide, Deconstructing Carillion, Euromoney Learning has invited the highly esteemed author – Adrian Grant – to expand on some of the key issues and compare Carillion with other similar cases.

    In this webinar, we analyse the fit in terms of:
    • use of early payment facilities and their impact on cash flow presentation
    • levels of debt
    • profit rates
    • exposure to single project risk
    • the importance of acquisitions

    We then move on to the highly distressed case of Drake & Scull International ('DSI'). Although DSI operates in a different environment, some of the allegations regarding creative accounting and excessive rewards to insiders are eerily familiar...
  • 5 LinkedIn Marketing Moves Your Sales Force Will Love You For
    5 LinkedIn Marketing Moves Your Sales Force Will Love You For
    Sarah Hughes, “The LinkedIn Lead Generation Expert” & Founder, Boost Business Growth Recorded: Jun 19 2019 61 mins
    Is there sometimes a mismatch between your sales and marketing teams around social selling?

    Perhaps all’s good, but you want great?

    Either way, get the inside track on the 5 KEY ACTIONS marketers can take to raise brand awareness that generates a pipeline for their sales colleagues.

    Access your FREE BONUS WORKBOOK for the webinar by emailing sarah@boostbusinessgrowth.co.uk ahead of the live broadcast.
  • Panel debate: The risks and rewards of transparency in cybersecurity
    Panel debate: The risks and rewards of transparency in cybersecurity
    Anton Shingarev, Jan-Peter Kleinhans, Kevin Limonier, Melinda Crane, Recorded: Jun 19 2019 54 mins
    An international panel of leaders and influencers from across the security landscape will explore how the global ICT industry can best build trust and assurance for their products in the current cybersecurity landscape. Among other things, the panel will discuss the need to prove trustworthiness and the risks and benefits of transparency actions such as code reviews.

    Panellists are:
    • Kevin Limonier, Associate Researcher, Castex Chair of Cyberstrategy;
    • Jan-Peter Kleinhans, Project Director, Stiftung Neue Verantwortung;
    • Anton Shingarev, Vice President of Public Affairs, Kaspersky.

    Moderator: Melinda Crane, Chief Political Correspondent, Deutsche Welle
  • Security at the speed of DevOps
    Security at the speed of DevOps
    Scott Ward: Solutions Architect - Amazon Web Services (AWS), Alexi Papaleonardos: Principal Consultant - CrowdStrike Recorded: Jun 19 2019 59 mins
    Organizations are rapidly adopting DevOps as they retool their IT infrastructure. The speed and agility it delivers enables them to better serve their customers and compete more effectively in the marketplace. Far too often security is seen as an inhibitor — getting in the way of rapid delivery of new applications and the ability to scale infrastructure to meet business opportunity.

    In this session, experts from Amazon Web Services (AWS) and CrowdStrike will outline how to quickly deploy and scale while retaining control and preserving compliance when using the cloud. You’ll learn how you can adopt a DevOps model without sacrificing security by using automated compliance policies, fine-grained controls, and configuration management techniques.

    This webcast will cover these key topics and takeaways:

    - A review and discussion of the shared responsibility model to help you understand the tenets of security that’s “of” the cloud versus security “in” the cloud
    - Best practices in securing your cloud presence
    - Practical steps for how you should assess your infrastructure, management and compliance
  • The State of DevSecOps - Featuring Amy DeMartine of Forrester Research
    The State of DevSecOps - Featuring Amy DeMartine of Forrester Research
    Chris Eng, Veracode Vice President of Research and guest, Forrester Research Principal Analyst Amy DeMartine Recorded: Jun 19 2019 56 mins
    In our recent State of Software Security Volume 9 report, Veracode examined fix rates across 2 trillion lines of code shows that the number of vulnerable applications remains staggeringly high. More than 85 percent of all applications contain at least one vulnerability following the first scan, and more than 13 percent of applications contain at least one very high severity flaw.

    One thing is certain: the sheer volume of vulnerabilities present in most organizations’ application portfolios makes it necessary for them to make daily tradeoffs between security, practicality, and speed.

    There are just too many vulnerabilities for organizations to tackle all at once, which means it requires smart prioritization to close the riskiest vulnerabilities first. For the first time, our report shows a very strong correlation between high rates of security scanning and lower long-term application risks, which we believe presents a significant piece of evidence for the efficacy of DevSecOps. In fact, the most active DevSecOps programs fix flaws more than 11.5 times faster than the typical organization, due to ongoing security checks during continuous delivery of software builds, largely the result of increased code scanning.

    Join guest presenter Amy DeMartine, Principal Analyst, Forrester Research Inc., and Veracode’s Chris Eng as they deliver valuable takeaways for business leaders, security practitioners and development teams seeking to secure their applications. Listeners will learn potential prioritizations and software development methods that could help their organizations reduce risk more quickly.
  • E-Commerce Content ROI
    E-Commerce Content ROI
    Clarice Lin, Content marketing & Analytics Strategist | ROI Doctor, BaselineLabs Recorded: Jun 19 2019 53 mins
    Everyone can do content marketing, but not everyone knows how to turn articles into cold hard cash.

    In this masterclass you'll learn how to create a laser focused content strategy for your targeted focus group and how to use tracking and attribution data to create a content sales feedback loop to maximize the ROI of your content marketing strategy.
  • Embrace the Configuration Data Chaos in DevSecOps
    Embrace the Configuration Data Chaos in DevSecOps
    Benny Van de Sompele, CTO Recorded: Jun 19 2019 43 mins
    Why configuration data matters - today and tomorrow!

    Configuration data is more important now than ever before, as we get releases into production faster and more frequently. We need new code, the right “settings” for the right environment and the right release which comes down to configuration data.

    You probably already use a distributed source code management (SCM) platform like git or bitbucket? You’ve invested in automated testing of your code? You’ve thought about automating the deployments from DEV to TEST to PRODUCTION?
    But how do you manage, test and validate all the configuration data and settings that go with it?

    Join us for this webinar where Benny Van de Sompele will talk about:

    - The current state of configuration data management and the challenges that come with it.
    - How you can introduce a non-intrusive automated process, which will allow your DevOps teams to release more often and faster, whilst at the same time reducing the risk of failure and service degradations.
    - Real use cases from legacy type environments from pure cloud native architectures and hybrid applications. With the increase of CI/CD automation in the market, comes the risk of rapidly breaking application environments.

    The more we automate the less there is “human validation”, but without rigorous testing and validation sooner or later failure will happen.

    The future is digital – everybody agrees, the cost of failure is now the difference between surviving and thriving.
  • How Machine Learning Helps Predict Equipment Failure
    How Machine Learning Helps Predict Equipment Failure
    Yaroslav Nedashkovskyi, System Architect at SoftElegance Recorded: Jun 19 2019 22 mins
    We are going to discuss a case study on a unified data lake for the oil industry -- it is a software architecture and a set of microservices that are used to get business values from the data that are generated during the oil production. Math models were developed to make failure prediction of rod pumps during the oil artificial lifting.

    We used modern capabilities of Big Data Architecture, based on Apache Spark set of technologies, machine learning, archived data, and streaming data from wells to build a unified math model to predict failure of that kind of industrial equipment.

    Join this webinar to learn:
    -- How machine learning can help to predict failure of industrial equipment

    -- Architecture to handle near real-time data-flow from oil wells
  • Pharmaceutical/Healthcare Digital Marketing Strategy Business Membership Demo
    Pharmaceutical/Healthcare Digital Marketing Strategy Business Membership Demo
    Jessica Towns and Jake Helliwell Jun 19 2019 1:00 pm UTC 45 mins
    Increase digital team skills, company structure/processes, and increase brand awareness online!

    Healthcare companies face several challenges when it comes to their digital marketing. They're in one of the most highly-regulated industries and must compete with a plethora of medical advice websites and conflicting information to gain their audience's attention. They also have to provide communications and customer journeys that appeal both to patients and multiple healthcare decision makers. That's why having a plan to organize your digital marketing efforts to engage your audiences is integral to improving your brand's performance.

    In this demo of business membership, you will find out how we can help you:

    - Launch/roll-out transformation projects that meet essential business goals.
    - Create integrated marketing, product, and communications strategies and budgets.
    - Improve dashboard/KPI monitoring to communicate value generated.
    - Manage and develop internal team resources and skills for ongoing CPD.
    - Improve ROI from activities by learning the latest best practice techniques.

    With Smart Insights, plan, manage and optimize your strategy to become the best in the industry using a complete and structured system of audits, templates, guides, and e-learning.
  • How To Train Your Email Security Dragon
    How To Train Your Email Security Dragon
    Gareth Fraser-King, Director, Product Marketing EMEA Jun 19 2019 1:00 pm UTC 45 mins
    The numbers make stark reading. 281 billion emails sent daily to over 2 billion business users. 91% of all cyber-attacks start with an email and it only takes 1 with malicious intent to impact your organisation. With evolving methods used by the adversary, it’s becoming increasingly difficult not to get burned.

    Join Gareth Fraser-King, Director, Product Marketing EMEA, to learn:
    - The state of the cyber landscape, specific to email security.
    - How the attack vector is changing with new tactics, techniques, procedures and what you need to look out for.
    - Why is FireEye better at catching evolving attacks and how this can benefit you.
  • Emerging Market Equities: a complex opportunity
    Emerging Market Equities: a complex opportunity
    Rishikesh Patel, Portfolio Manager, LGM Jun 19 2019 1:00 pm UTC 45 mins
    Sentiment in emerging markets has a habit of swinging from euphoria to despair on a catchy headline. Rishikesh will discuss why the emerging markets story is so compelling, the key risks in the market and how to navigate them successfully.
  • Automation of Root Cause Analysis for Big Data Stack Applications
    Automation of Root Cause Analysis for Big Data Stack Applications
    Alkis Simitsis, Chief Scientist, Unravel Data; Shivnath Babu, CTO, Unravel Data Jun 19 2019 1:00 pm UTC 36 mins
    Alkis Simitsis and Shivnath Babu share an automated technique for root cause analysis (RCA) for big data stack applications using deep learning techniques, using Spark and Impala. The concepts they discuss apply generally to the big data stack.
  • Retail Bank 2019 Experience Rankings
    Retail Bank 2019 Experience Rankings
    Fiona Blades (Chief Experience Officer) and Bharat Parmer (Managing Director EMEA), MESH Experience Jun 19 2019 1:30 pm UTC 45 mins
    MESH Experience’s 2019 Retail Bank Experience Ranking Report is out; covering metrics such as share of experience, positivity and impact on brand consideration across paid, owned and earned media. We’d love to share some of their findings and insights with you in our upcoming webinar.
    What you'll get in this webinar:

    •Discover the leaders and laggards in retail banking - who’s moved up and who’s moved down the rankings
    •Find out which challenger brand has had a meteoric rise and how they achieved this
    •See which brand has risen in the rankings with superlative in-branch banking experiences
    •Learn which bank has jumped up the rankings through great banking app experiences
    •Key actions to ensure your brand is a leader
  • How to Capture the Attention of your Ideal Prospect on LinkedIn
    How to Capture the Attention of your Ideal Prospect on LinkedIn
    Rod Sloane Jun 19 2019 1:45 pm UTC 45 mins
    This is NOT about being nice, or posting worthy content that no one sees and reads.

    This webinar will show you how to reach out and grab the heart and soul of your prospect.

    We will show you how to leave your competition looking like also runs.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Joshua Costa, Manager, PS Advisory Services Jun 19 2019 2:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss threat hunting and incident detection leveraging EDR and the current cybersecurity threat landscape.

    We'll cover:
    •Incident investigation considerations - old versus new
    •Threat remediation and recovery
    •Third-party and threat intelligence integration

    Our Verizon Threat Research Advisory Center presenters will be:
    •Hayden Williams, Sr. Manager, PS Advisory Services
    •Joshua Costa, Manager, PS Advisory Services
    - David Kennedy, Managing Principal, Open Source Intelligence

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com


    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Frictionless Inter-provider Operations with MEF 3.0 & LSO Sonata
    Frictionless Inter-provider Operations with MEF 3.0 & LSO Sonata
    Kevin Vachon, COO, MEF; Bob Mandeville, President, Iometrix; Greg Spear, Solution Manager, Accedian Jun 19 2019 2:00 pm UTC 60 mins
    MEF's Carrier Ethernet generated an 80+ Billion USD market. Growth continues with the latest MEF 3.0 Carrier Ethernet standards, secured with the integrity of MEF services & technology certification. The next frontier is frictionless inter-provider service automation focusing on business applications with the first phase. Imagine automating your serviceability queries, quoting, ordering and inventory for the latest Carrier Ethernet E-access services. Given service providers' top deployment challenge of multi-provider network orchestration, this business-to-business automation could not come at a better time. This is your opportunity to get the latest on MEF 3.0 Carrier Ethernet wholesale services, its automation capabilities, LSO Sonata & APIs, plus how to fast-track your API development while getting first-to-market with MEF's LSO Sonata certification.

    Whether a buyer or seller of Carrier Ethernet services, learn how to best guide your wholesale Carrier Ethernet business with LSO Sonata and MEF 3.0 certifications. Join MEF's COO, MEF's Certification Committee Co-Chair and President of Iometrix, MEF's certification partner, to explore MEF 3.0 Carrier Ethernet, amplified by LSO Sonata.

    What you will learn:

    • Highlights of MEF 3.0 Carrier Ethernet
    • MEF 3.0 Carrier Ethernet E-Access business value
    • New certification process and how to achieve MEF 3.0 Carrier Ethernet certification
    • Inter-provider automation enabled by LSO Sonata
    • LSO Sonata certification program
  • Mehrwertsteuer-Rückerstattung leicht gemacht - Mit SAP Concur & seinen Partnern
    Mehrwertsteuer-Rückerstattung leicht gemacht - Mit SAP Concur & seinen Partnern
    Benjamin Tattermusch (Regional Sales Executive, SAP Concur) Jun 19 2019 2:00 pm UTC 35 mins
    SAP Concur App-Center Partner VATBox und Kunde Lonza zeigen, welche Vorteile die Integration von VATBox und SAP Concur hat und wie effektiv die Mehrwertsteuer-Rückerstattung von Geschäftsreisen damit ist.

    Sie wollen zu Travel & Expense Management auf dem Laufenden bleiben? Dann registrieren Sie sich jetzt für den News-Service von SAP Concur: https://bit.ly/2GZRZba
  • How to Deliver Direct Internet Access to Your Global Branches
    How to Deliver Direct Internet Access to Your Global Branches
    Yishay Yovel Jun 19 2019 2:00 pm UTC 22 mins
    How much of your MPLS traffic is actually meant for the cloud? Many of Cato customers managed to offload up to 40% of their MPLS lines while solving latency issues, originated by backhauling traffic across their MPLS.

    Opting for direct Internet access, however, exposes your sites to Internet-borne threats. So how do you deliver direct internet access to the branch without compromising on security and costs?
  • How to start using the Luminati Proxy Manager
    How to start using the Luminati Proxy Manager
    Roi Paz, Product Manager Jun 19 2019 2:00 pm UTC 10 mins
    Learn how to start with Luminati’s Proxy Manager.

    Agenda:
    - What is the Luminati Proxy Manager
    - Proxy ports and preset’s
    - IP rotation
    - Long single session
    - Geo, ISP, ASN and carrier targeting
    - Success metrics
    - HAR viewer and session logs
  • Proving the value of DevOps using metrics
    Proving the value of DevOps using metrics
    Jeremy Brown, Director, Red Hat Open Innovation Labs, EMEA Jun 19 2019 2:00 pm UTC 60 mins
    Are you moving from project-based to product-centric teams? How about using agile delivery methods, or, applying DevOps culture with heavy automation? Are you an advocate of these practices, but struggle to articulate the benefits to your wider organization?

    In this session, Jeremy Brown, Red Hat Open Innovation Labs, will introduce a powerful metrics-based process mapping tool that can be used to help teams articulate the benefits, return, and value of DevOps adoption to the wider organization. Jeremy will demonstrate how this metrics-based process mapping tool was used with a European automotive company to reveal a 30x improvement in their key metrics. You will leave with the ability to implement this very simple yet effective tool in your own organizations to begin or accelerate DevOps adoption.
  • Creating A Winning Digital Transformation Strategy
    Creating A Winning Digital Transformation Strategy
    Art Langer, David Linthicum, EJ Bodner AI, Artificial Intelligence, Internet of Things, Mobile, 5G, IoT Jun 19 2019 2:00 pm UTC 58 mins
    This free 1-hour webinar from GigaOm Research brings together experts in Digital Transformation, featuring GigaOm David Linthicum and special guest from Nutanix, Dr. Arthur Langer. The discussion will focus on the stepwise process of understanding where you are in employing digital, where you need to go, and the specifics to drive success the first time.

    “Digital transformation” is certainly the buzzword of 2019, but most don’t know what it is, why it is important and how to do it right. By investing in digital experience transformation enterprises can discover valuable customer behavior insights and execute personalized experiences to engage, delight and retain customers.

    In this Webinar, we’ll take the mystery out of what it takes to create and execute on a digital transformation strategy, including what’s important, and what needs to be avoided. This will be a candid discussion with industry experts. We’ll explore what technology to leverage, best practices, and approaches.

    In this 1-hour webinar, you will discover:

    • Reference technical architecture of digital transformation, from 5G to IoT.
    • Social architecture, or how people are important to this transformation strategy.
    • How to sell digital initiatives to the board of directors, and other stakeholders.
    • Core metrics and continuous integration that keep priorities straight.
  • DBRS Webinar: Global ABS 2019 Recap
    DBRS Webinar: Global ABS 2019 Recap
    Gordon Kerr, Head of European Structured Finance Research Jun 19 2019 2:00 pm UTC 75 mins
    DBRS Ratings Limited (DBRS) invites you to attend a webinar updating you on its Global ABS 2019 Recap on 19 June 2019 at 3 p.m. BST/4 p.m. CEST/10 a.m. EDT. The webinar will be hosted by Gordon Kerr,
    Senior Vice President and Head of European Structured Finance Research, in London.
    For those who were unable to attend the prime securitisation industry event of the year, or perhaps spent the majority of it in meetings, DBRS offers the opportunity for its analysts to provide their key takeaways from the event.
    On the call, Gordon will be joined by Christian Aufsatz, Head of European Structured Finance; Paolo Conti, Head of European ABS; Carlos Silva, Head of European Structured Credit; Alfonso Candelas, Head of European Structured Finance Surveillance; Kali Sirugudi, European RMBS; and Mudasar Chaudhry,
    European Structured Credit. The discussion will cover all sectors and provide DBRS’s perspective on important highlights.
    The discussion will last approximately 25 to 30 minutes and will be followed by an interactive questionand-answer session. DBRS welcomes all who wish to participate.
  • FTSE Russell Liquidity Metrics
    FTSE Russell Liquidity Metrics
    Mikhail Bezroukov, Yield Book Product Specialist, FTSE Russell Jun 19 2019 2:00 pm UTC 60 mins
    Transaction-level approaches to liquidity ratio analytics within fixed income market.

    • The Yield Book is offering a new Liquidity Ratio metric which is able to incorporate both traded price and volume information and adjusts for yield curve and sector-wide movements
    • Innovative approach to inferring a liquidity score for bonds that do not have observed trades
    • The measure produces intuitive results allowing for comparison across bonds and markets
  • The Definitive Guide to the Ambiguous Role of Product Marketing
    The Definitive Guide to the Ambiguous Role of Product Marketing
    Elisabeth Cullivan Thomas, Founder, Launch Product Marketing Jun 19 2019 2:00 pm UTC 60 mins
    Product marketers are not building a product, nor are they selling a product, so what do they do? Most often, they find themselves at the intersection of product development, sales, and marketing. The role is ambiguous - sometimes strategic with persona development, pricing, and messaging responsibilities or tactically focused on collateral, webinars, and research. Great product marketers thrive on the role’s ambiguity and cross-functionality. Attend this webinar for an inside look at the high-demand role of product marketing.
  • Using LinkedIn to Drive Lead Gen (ScaledUp Ep. 4)
    Using LinkedIn to Drive Lead Gen (ScaledUp Ep. 4)
    Lloyd Yip, The Startup Sales Expert Jun 19 2019 3:00 pm UTC 45 mins
    Linkedin is the most powerful, yet under-utilized channel for business development out there. If you are in B2B, your clients are on LinkedIn, so why not capitalize on it?

    In this session, we’ll discuss how to leverage LinkedIn so you can build your brand and generate more pipeline for your business. Long gone will be the days where LinkedIn is just an online resume

    You Will Learn:

    1.How LinkedIn differs from other channels
    2.Using LinkedIn to identify your ideal clients
    3.A step by step process for building an outbound prospecting process on LinkedIn
    4.BONUS: How to become a thought leader on LinkedIn to drive pipeline
  • [Panel] DevOps Adoption Challenges and How to Overcome Them
    [Panel] DevOps Adoption Challenges and How to Overcome Them
    Brad Schick, Skytap | Daniel Breston, Virtual Clarity | Jeremy Brown, Red Hat EMEA Jun 19 2019 3:00 pm UTC 60 mins
    To win with DevOps, you need to be aware of potential issues and know how to overcome the challenges so that you can make the most of its benefits.

    With the incredible growth of DevOps in a short space of time comes numerous questions about how best to adopt it. From insights and driving factors of adoption - to dealing with legacy systems and incorporating robust security features - join our panel of experts to hear advice and learnings from those at the forefront of DevOps adoption.

    Panelists:
    Brad Schick, CTO, Skytap
    Jeremy Brown, Director, Red Hat Open Innovation Labs - EMEA, Red Hat
    Daniel Breston, Technology Leadership Transformation Coach, Virtual Clarity
  • SonicHour: Seguridad de última generación para aplicaciones SAAS
    SonicHour: Seguridad de última generación para aplicaciones SAAS
    Carlos Gomez Jun 19 2019 3:00 pm UTC 60 mins
    Para los negocios que utilizan aplicaciones SaaS, incluidos el correo electrónico, el almacenamiento de archivos y las aplicaciones para el uso compartido de archivos, Cloud App Security (CAS) de SonicWall brinda la mejor protección avanzada contra amenazas de su clase para los ataques de phishing dirigidos, las amenazas de día cero, los fraudes de identidad y las apropiaciones fraudulentas de cuentas. CAS garantiza políticas consistentes en las aplicaciones que se utilizan en la nube. Y cuando se integra con los NGFW de SonicWall, CAS ofrece visibilidad y control de Shadow IT a través del descubrimiento automatizado de la nube.
  • Critical Incident Response: Why Good Enough Is Just Not Good Enough
    Critical Incident Response: Why Good Enough Is Just Not Good Enough
    Valerie O'Connell, Research Director, EMA and Vincent Geffray, Senior Director, Product Marketing, Everbridge Jun 19 2019 3:00 pm UTC 58 mins
    Technology incidents happen every day to companies of all sizes, across every vertical, in all degrees of impact from inconvenient to potentially catastrophic. So, by definition, all organizations do IT incident response. The question is, how well do they do it? Research from leading IT analyst firm Enterprise Management Associates (EMA) shows that unless the response takes advantage of automation, the answer “not nearly well enough” is an understatement.

    With the average time to engage the right response team taking 1 to 2 hours, and the average time to resolve a major outage taking 5 to 6 hours, there is a definitive need for immediate and dramatic operational improvement.

    Leveraging EMA research and a case-based approach, this webinar will explain how to reduce mean time to repair (MTTR) through automated slashing of the time it takes to begin effective response. A simple method for determining the point at which it makes more business sense to invest in an improvement than it does to continue funding the status quo will also be discussed.

    Additionally, webinar attendees will learn more about:

    *Top automation drivers, indicators, obstacles, and benefits realized
    *The case for automating incident response – real numbers from real places
    *Quantifying the high cost of status quo – a conservative approach to demonstrating value
  • Cyber Threats and Elections: What You Need to Know
    Cyber Threats and Elections: What You Need to Know
    Luke McNamara, Principal Intelligence Analyst, FireEye Jun 19 2019 3:00 pm UTC 60 mins
    Election security has become a growing priority for governments and citizens alike on a global scale.
    While cyber-enabled interference and election tampering continues to make headlines, coverage of the root cause can seem unclear due to the wide range of differing threats facing entities within an election’s ecosystem.

    Join this webinar with Luke McNamara, Principal Analyst of Threat Intelligence, as he uncovers:
    • Frontline observances by FireEye of election-driven threat actors—and their key target areas
    • A risk framework for organizations to categorize election threat activities and targets
    • Beyond the enterprise, how these threats impact individuals and donors involved in political campaigns
    • Best practices used by FireEye and implemented by election administrators to reduce targeted cyber risks
    • The anticipated evolution of sophisticated attacker techniques in future elections