* Italy’s largest bank UniCredit to cut 8,000 jobs by 2023 to reward shareholders
* China gears up digital yuan with potential digitisation of ID cards ahead of 2020 launch
* Ant Financial to raise $1 billion fund for Southeast Asian and India start-ups
* South Korea to launch open banking system this month
* Mexican lendtech start-up Konfio bags $100m investment led by SoftBank
For more fintech news, please visit https://fintechfutures.com or sign up to our daily newsletter here: http://bit.ly/2Ulw1aS
Rachel Ackerly, Cisco Umbrella Product ManagerRecorded: Dec 6 201924 mins
Telecommuting is on the rise. More users are working remotely, off the network, and off VPN, which leaves them vulnerable to malware, data exfiltration, and other malicious threats. Because DNS-layer security is built into the backbone of the internet, it can protect all users and devices with internet connections, even when roaming.
More than 91% of malware uses DNS to gain command and control, exfiltrate data, or redirect web traffic. Join us to brush up on DNS security fundamentals, learn how DNS-layer security can help you block threats before they reach your users, and gain visibility into what’s really happening on your network.
Dawn Beyer, Senior Fellow, Lockheed Martin SpaceRecorded: Dec 6 201952 mins
Attracting, developing, and retaining women in cyber top talent fields (continuation on the March WiCyS Conference Keynote).
Dr. Dawn Beyer is a Lockheed Martin Senior Fellow. She has over 30 years of experience covering information security, information assurance, security engineering, cybersecurity, systems engineering, military intelligence and operations, risk assessments, strategy, and policy development and execution. She provides consultation to research and development, proposal, program, and operations and maintenance teams. She also provides guidance, direction, leadership, training, and mentoring to Engineers.
Dr. Beyer provides leadership with visibility into cyber strategy, workforce talent, technology, capabilities, risks, policy, and opportunities. At Lockheed Martin, Dr. Beyer is the Cyber Fellows Action Team Chair. She also engages in industry exchanges and Co-chairs the National Defense Industrial Association Cybersecurity Division and is a member of the INCOSE Systems Security Engineering Working Group. She is also a board member with the Women in CyberSecurity (WiCyS) Board of Governors.
Dr. Beyer is a retired Air Force Intelligence Officer with 24 years of service and has performed additional responsibilities as an Information Systems Security Manager, Computer Systems Security Officer, Communications Security Manager, Operations Security Manager, and Emissions Security Manager.
Dr. Beyer earned her Ph.D., M.S., and B.S. in Information Systems. She maintains the following certifications: Project Management Institute’s Program Management Professional (PMP)®, (ISC)2’s Certified Information Systems Security Professional (CISSP)® and Certified Secure Software Lifecycle Professional (CSSLP)®, and ISACA’s Certified Information Security Manager (CISM)®.
Kerry Doyle, Data Center Knowledge & Brian Eichman, CoreSiteRecorded: Dec 6 201949 mins
It is critical that your employees and end-users have always-on availability to your systems and services. Business continuity has never been more important, and more complex. Cloud? Colocation? Both? Listen to this webinar from Data Center Knowledge and CoreSite on the three business continuity models that every IT expert should know as they plan for 100% uptime.
In order to protect themselves from evolving external threats, financial institutions continue to strengthen their fraud controls by deploying fraud detection solutions across a variety of channels. However, it is imperative that financial institutions do not overlook the threat from within.
Financial institutions are especially vulnerable to employee fraud, as fraudsters within the organization have access to large amounts of personal identification information and financial transactional data, along with access to customer accounts. While these schemes can add up to significant fraud losses for financial institutions and their customers, they can also enable other illicit activity and pose significant compliance concerns.
Join us for this insightful presentation, as we discuss the financial and reputational risks, as well as the potential compliance concerns of employee fraud. Learn the tactics used by internal bad actors and best practices to mitigate losses, including how appropriate monitoring of both employee access logs and transactional activity can alert institutions to fraudulent activity by employees.
In this educational presentation, you will learn:
- The scale of the crime of employee fraud, including the potential for losses and compliance considerations
- Review tactics internal bad actors use to commit fraud against financial institutions
- Best practices to mitigate losses and protect your institution from internal threats, - including appropriate monitoring and fraud controls
Cameron Goedde - Client Solutions Field Marketing | Dell EMCRecorded: Dec 6 201942 mins
Smarter & faster experiences are the driver behind Dell’s 2019 Client Solutions lineup. We have the broadest portfolio to meet all needs. From highly configurable fixed solutions – our OptiPlex desktops and AIOs and our Wyse Thin clients. To the smallest, lightest mobile solutions including Latitude and the XPS to specialty systems – our powerful Precision workstations, including towers, racks and mobile workstations and finally our Rugged devices. We also have a full portfolio of displays and accessories to help build your entire ecosystem.
Nadya Ilina - Senior product manager Kaspersky Security Awareness, adult education expert, master-trainerRecorded: Dec 6 201957 mins
Security Awareness development is influenced by trends from multiple disciplines: IT, education, media and more. How will growing digital transformation change the approach towards the human factor in cybersecurity? How will the change in approach to education modify Security Awareness platforms?
The requirements for types of content in the threat landscape are changing; how will these affect the content of training programs? What will be the future of Security Awareness?
We will go through all these questions and trends in this webinar. With this session, you will learn what innovations need to be implemented and how security awareness training providers can keep up and stay in demand.
Christine Brown-Quinn, The Female CapitalistRecorded: Dec 6 201959 mins
The key to progressing your career is to work hard, right? Well, yes, at the beginning of our careers it’s our hard work, reliability and efficiency which helps us build a positive reputation from which we can position our careers for further growth.
The harsh reality, however, is that the importance of your hard work decreases the more senior you become. Once you start moving up the ladder, certain behaviours and a distinctive mindset drive career progression as this is what enables you to navigate the unwritten rules - rules relating to the so-called ‘soft’ skills which are career critical.
To discover the unwritten rules and the behaviours and mindset required for successful career navigation, join the IFLR Women in Business Law webinar, Career Success – Knowing the Unwritten Rules Changes Everything, hosted by Christine Brown-Quinn, The Female Capitalist on Friday, December 6, 2019 at noon GMT time.
Erich Kron, David LittmanRecorded: Dec 6 201955 mins
It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks.
So, how can your organization avoid getting held hostage? Join us and Erich Kron CISSP, Security Awareness Advocate at KnowBe4 we look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and provide tips on what to do when you are hit with ransomware.
La transition vers AWS, Azure ou Google Cloud crée de nouveau modèles d'architectures et d'applications dont la structure est en perpétuel mouvement. La seule manière que l'infrastructure, la sécurité et les opérations puissent suivent ce rythme est l'automatisation. Dans cette session, Thomas Beaumont, Cloud Consulting Engineer, va détailler les différents outils qui peuvent etre utilises pour déployer de l'infrastructure (as code), expliquer comment ajouter les vm-series pour protéger des menaces de sécurité (security as code) pour enfin modifier les règles de sécurité en se basant sur des outils tiers partie et externes (operations as code). Une brève démonstration conclut la session.
As a tumultuous 2019 draws to a close, we look ahead at what to expect in 2020. Will the US-China trade war gather momentum or are we close to a détente? Will the UK election deliver a path to Brexit? What can we expect from the US elections? And, in South Africa, will Ramaphosa’s promised revival bear fruit or will SA remain mired in low growth and rising debt? MacroSolutions’ John Orford considers the outlook for global and local financial markets in 2020.
Michelle Peterson, Product Owner – CIS Benchmarks, CIS | Andy Miller, Senior Director Global Public Cloud, SophosRecorded: Dec 5 201924 mins
Join this live session with Michelle Peterson, Product Owner, CIS Benchmarks at Center for Internet Security, as she shares how to navigate the shared responsibility model of cloud security.
Focusing on benchmarks that help businesses manage their cloud security journeys under shared frameworks, Michelle is on hand to answer any questions you have about how to monitor and measure such security strategies in the age of threats and disruption.
Josh Long, Spring Developer AdvocateRecorded: Dec 5 201962 mins
You love Spring Boot because it eliminates boilerplate code and helps you build robust Java applications quickly. And you love Spring Cloud because it brings modern microservices patterns to Spring Boot applications. The trouble has been creating, configuring, and maintaining Spring Cloud infrastructure—until now.
Introducing Azure Spring Cloud, the runtime for Spring Boot-based applications and Spring Cloud-based microservices jointly developed by Microsoft and Pivotal—now in public beta. Azure Spring Cloud is a managed environment built on top of Azure Kubernetes Service with preconfigured, opinionated, ready-to-deploy infrastructure services, and runtime for Spring-based applications.
Sound too good to be true? It isn’t! Join Spring Developer Advocate Josh Long (@starbuxman) as he walks you through an overview of Azure Spring Cloud and demos how easy it is to push and run Spring Boot microservices into production with Microsoft and Pivotal managing the infrastructure for you.
See how you can eliminate costly downtime, keep IT workflows intact and perfect your macOS upgrades.
With Apple operating system season in full swing, it’s time to determine when and how you want to update your Mac environment. It’s safe to assume that the best option is the simplest and most effective one, and it doesn’t get easier than pressing one button.
In our webinar, Reinstall a Clean macOS with One Button, we’ll show you how to:
- Identify Macs ready to install macOS Catalina
- Obtain the macOS Catalina installer
- Deploy macOS Catalina to shared Macs in labs
- Deploy macOS Catalina to 1-to-1 Macs
David Slarskey, Matthew Dodge, Casey SullivanRecorded: Dec 5 201961 mins
Slack, the massively popular workplace messaging platform, is changing communications and discovery as we know them. That's because Slack is quickly supplementing, if not replacing, email and discrete documents. Yet legal teams are used to documents, not chat rooms.
Join us for an upcoming webinar on how Slack is changing communications and discovery--and why your discovery and investigations process needs to catch up.
Register now to learn:
How Slack is changing discovery and investigations
Why Slack could hold key data for your case
The unique challenges Slack data poses
How creative legal teams are leveraging Slack data during the discovery process
Best practices for dealing with Slack data, from those who’ve done it
Founder, Slarskey LLC
David Slarskey is the founder of Slarskey LLC and an experienced commercial litigator with more than a decade of experience in litigation, trial, arbitration, and appellate practice. He has represented a wide range of individual and corporate clients, including entrepreneurs, large health care and pharmaceutical companies, financial guarantors and hedge funds, real estate developers, media, energy, and international interests. Prior to founding Slarskey LLC, he was Counsel in the litigation department of Patterson Belknap Webb & Tyler LLP, and associated with Friedman Kaplan Seiler & Adelman LLP. For four years running, David Slarskey has been recognized by Super Lawyers as a Rising Star of Business Litigation in the New York Metro Area.
Customer Success Manager, Logikcull
Matt is a seasoned eDiscovery expert and account manager at Logikcull where he helps law firm and enterprise customers implement efficient, defensible, and cost-effective discovery workflows. Before joining Logikcull, he worked as a director for the Association of Certified eDiscovery Specialists, responsible for training and certification for Fortune 500 companies and leading service providers.
Steve Hunt, Sr. Director of Product Management, DataCoreRecorded: Dec 5 201964 mins
To deliver a distributed file sharing environment, IT organizations often have to deploy multiple, discrete solutions. DataCore vFilO now allows IT organizations to deploy a single, scalable, hybrid file and object storage solution, with built-in data management. Learn how vFilO can enable you to consolidate your existing file storage silos into one globally managed environment, and enable complete control over whether data is on high performance, on-premises storage or archived to the public cloud.
Andres Ruz, Director of Information Security with Meriplex and Jeffrey Reed, Systems Engineer with FortinetRecorded: Dec 5 201932 mins
With digital transformation era evolving, it is a priority for organizations to have complete visibility for every device and user attached to their network. For some organizations, a new device can be added and removed without ever being detected, leaving your network in perpetual risk for a costly data breach. With FortiNAC, organizations receive visibility to see everything connected to the network protecting both wireless and wired networks, as well as the ability to control those devices and users, including dynamic, automated responses.
In this webinar we will discuss:
1. Challenges organizations face with limited visibility on their network
2. Understanding the architecture of FortiNAC and how it works
3. Enabling IoT success with device management and automated response
Oren Falkowitz, Mike BrittonRecorded: Dec 5 201927 mins
Mike Britton of $7.7B leader, Alliance Data, shares a game-changing cybersecurity solution.
Mike was seeing an increase in the frequency and sophistication of phishing emails hitting his organization’s Office 365 inboxes. C-levels were worried. SOC brush fires kept breaking out.
To reduce risk and stop the fire drills, he launched an anti-phishing project. Join this live webinar and hear Mike discuss his priorities, approach and results. He’ll be joined by Area 1 Security CEO Oren Falkowitz to discuss how pay-for-performance solutions can close the cybersecurity gap.
Ciske van Oosten and Ron TostoRecorded: Dec 5 201958 mins
*We are offering two sessions on December 5, 2019 for your convenience. Please register for the session that works best for you: 10AM EST or 2PM EST.
Organizations might be spending a lot of time and money creating their data protection and compliance programs (DPCPs). Despite good intentions, more than half of companies are struggling to design, implement and maintain a sustainable DPCP.
The 2019 Verizon Payment Security Report provides guidance to accomplish these tasks, and explains how new tools can help you move your compliance management to new levels.
This year’s PSR has exciting aspects in its findings. For the first time, the report contains assessment data compiled from additional qualified security assessor (QSA) companies. This expands the view and perspective provided in past PSRs.
New to ScienceDirect? Are you looking to refresh your searching skills? Join us for a general overview where we will talk about the top features on ScienceDirect that will save you time and increase your productivity. We will also discuss best practices to start searching more efficiently and directly.
Nirvana Farhadi, Global Head RegTech, HV & Dan Knight, CTO, Global Financial Services, HVRecorded: Dec 5 201954 mins
Let’s face it, financial services institutions’ main business objectives are to generate revenue, grow the business and be competitive. Most firms, though, are caught up in ever-increasing cost and resource burdens from dramatic increases in regulatory obligations. Data is changing the world as we know it and pulling us from our comfort zones into change, transformation and, in some cases, uncertainty. Let’s delve into how financial services firms can use their data to navigate these complex changes in regulatory and legal obligations. Learn how to monetize data for better business revenue and outcomes.
In this session, we’ll examine two solutions that allow you to apply your data to simplify compliance and risk obligations and improve your bottom line. We’ll take a look at regulatory challenges around liquidity risk with Intraday Insights and learn how to optimize intraday liquidity to generate immediate savings while simplifying compliance reporting. And Datacom will share observations and insights on the development of Open Banking Standards and APIs and how major banks are complying with the updated policies
Also joining this webinar will be Bruce Hrovat from Intraday Insights and Michael Lentini from Datacom.
Jaime Spector & Timothy KnowlesRecorded: Dec 5 201936 mins
This webinar will cover on the concept of Enterprise Service Management (ESM) and explore why it’s a critical area to focus on in light of Digital Transformation. Additionally, we will demonstrate how our customers today are using ChangeGear’s own Flex Modules in unique ways to manage and deliver processes outside of IT and better support the Enterprise.
Matt Jarvis and Denizer IbrahimDec 9 201911:00 amUTC45 mins
This webinar will provide investors with an update on fund performance and portfolio positioning, as well as looking at a number of case studies where the team is engaging in significant value creation initiatives. Investors will hear from Matt Jarvis, co-Fund Manager of the L&G UK Property Fund, and Denizer Ibrahim, L&G’s new Head of Retail and Futuring. Denizer will discuss our thoughts on retail trends and how we are responding to what is a rapidly changing landscape.
David Froud, Director, Core Concept SecurityDec 9 201911:00 amUTC60 mins
The temptation to buy a technology to fix a security hole is almost overwhelming. Most vendors know this, and will happily exploit it if you let them. The fact is that very few organisations are even doing the basics yet, without which new technology will be no more effective that the Last-Generation.
Technology cannot fix a broken process, it can only make a good process better.
About the speaker:
David has almost 20 years experience in areas of Information / Cybersecurity, including Regulatory Compliance, Secure Architecture Design, Governance Frameworks, Data Privacy & Protection, FinTech and Sustainable Innovation.
As Project Lead for several Fortune / FTSE ‘Enterprise Class’ clients, David has performed hundreds of on-site security and compliance assessments for merchants and service providers globally.
Currently focused on helping organisation unify their security programs with EU regulatory compliance regimes, including GDPR & PSD2.
Andy Cotgreave - Technical Evangelism Director, TableauDec 9 20192:00 pmUTC60 mins
What is a dashboard? And does it matter? Should a dashboard fit one screen? Should it provide instant insight? Should it be interactive?
In this webinar, Andy Cotgreave will challenge the traditional definition of a dashboard. He will share his own definition and explain how the purpose of sharing data isn't to fit a particular definition but to fulfill a goal. Andy will show many examples of different dashboards, explaining why they work and how they push the definition of the term "dashboard". Attend this webinar if you want to more effectively engage the users of your dashboards.
Armit Bhambra, Head of iShares UK Retirement, BlackRock; Guido Giese, Executive Director, Applied Equity Research, MSCIDec 9 20192:00 pmUTC75 mins
Sustainability is the future of investing. With an improvement in investment data, more sophisticated ESG analysis and a broad range of products to choose from, investors have more choice than ever before when building sustainable portfolios. However, the industry’s rapid growth has made the space confusing and difficult to navigate. Hear from experts at MSCI & iShares as they break down the sustainable investing landscape and the various ways investors are building sustainable portfolios.
- Armit Bhambra, Head of iShares UK Retirement, BlackRock
- Guido Giese, Executive Director, Applied Equity Research, MSCI
Fiona Challis, Channel Enablement & Sales Expert, Next GenDec 9 20193:00 pmUTC60 mins
** This is an EMEA focused webinar **
The role of the cloud in IT security can be confusing and frightening for many customers and clients.
Learn five tips for implementing cloud-based security for your clients. Discuss how to balance an approach with customers with those tips and understand the important questions to consider with customers considering cloud security as an option.
Ken Mertzel, Global Industry Leader–Insurance, Automation Anywhere & Ann Delmedico IPA Advisory Managing Principal, CognizantDec 9 20194:00 pmUTC60 mins
InsurTechs and new online insurance companies are disrupting the industry, forcing insurers to rethink how they interact with customers and deliver a high-quality experience. With the emergence of attended automation and cognitive intelligence capabilities, Robotic Process Automation (RPA) is a critical technology solution empowering insurance associates to quickly deliver exceptional service by putting critical information at their fingertips, automating manual tasks and enabling real-time collaboration across the organization.
Automation Anywhere, the leading provider of RPA and cognitive intelligence solutions, and Cognizant, a leader among intelligent process automation service providers, will offer insights on how insurance organizations are using RPA, machine learning and intelligent automation to drive operational efficiency and transform insurance operations.
During this session, we will discuss:
•Robotic Process Automation trends and benefits
•Use cases describing where companies typically apply RPA in the insurance industry
•Specific examples showing how RPA and intelligent automation can be used to increase operational efficiency and improve customer service.
Salil Amonkar, Global Head AI for Manufacturing & Retail, Pluto7Dec 9 20196:00 pmUTC42 mins
In this session we will cover key take away and lessons learnt from practical deployment of Ai and ML solutions in actual enterprise settings. Participants can use these learning to incorporate in their own organizations to ensure success of Ai and ML initiatives.
Join BrightTALK's LinkedIn Group for BI & Analytics!
Dr. Lynette Nusbacher | Owner, Coach & Devil's Advocate, Nusbacher AssociatesDec 9 20196:00 pmUTC45 mins
Alliance is a strong word for a strong relationship. An alliance that sought to achieve collective security in the cyber domain would need to include states with closely aligned interests, would need to agree formal terms of alliance, and would need carefully-defined conditions governing mutual support. Whether or not the United States were formally a member of this alliance, American participation (or non-participation) would critically shape the alliance. Participants close to US security structures, senior figures (active and retired in the Five Eyes Community) and senior cyber security professionals would contribute both the political and technical realities that would determine the paper’s message.
Cyberspace, like the high seas of classical security strategy, is a space that is partly governable, but inherently chaotic. In order for states’ economies to function in cyberspace, states need to exercise optimal governance over this hard-to-govern space. To do so in an arrangement for collective defence could optimise trading advantages for all.
About the Speaker:
Dr. Lynette Nusbacher | Owner, Coach & Devil's Advocate, Nusbacher Associates
Lynette Nusbacher is an expert on horizon scanning and strategy. She was part of the team that created two of the UK’s National Security Strategies and set up Britain’s National Security Council. She has been Senior Lecturer in War Studies, Royal Military Academy Sandhurst, Head of the Strategic Horizons Unit in the UK Cabinet Office and the Devil’s Advocate in Britain’s Joint Intelligence Organisation. She has a background in red teaming, devil’s advocacy and structured methods of analysis.
Nat Bongiovanni, Chief Technology Officer, NTT DATA Federal Services, Inc.Dec 9 20197:00 pmUTC45 mins
Cybersecurity policies meant to protect sensitive information are often misunderstood, avoided, or circumvented by employees. Employees don’t like to be inconvenienced by the extra steps necessary for protection that to them seem unnecessary. This can be compounded by a complex cybersecurity environment with multiple competing standards that seem similar but have unique approaches, naming conventions, and acronyms.
This session will discuss how to solve these challenges by creating cooperative compliance. Cooperative compliance starts by understanding the entire risk environment based on the NIST SP 800-171 Framework, a foundational minimum for confidentiality and integrity. Using the NIST framework and straightforward messaging for employees, cooperative compliance communicates the reasons for cybersecurity inconveniences and protection.
•Define cooperative compliance
•Define and describe the cybersecurity foundational minimum
•Describe communication strategies
•Provide practical approaches based on the foundational minimum
•Comment on useful tools, techniques, and approaches
About the speaker:
NTT DATA Federal Services, Chief Technology Officer, Nat Bongiovanni is a US Navy veteran with over 35 years’ experience. Mr. Bongiovanni’s broad IT background allows him to view IT challenges through multiple lenses-- analyst, architect, manager, software developer and cybersecurity expert.
Nat has spoken extensively on cybersecurity, software and policy development. He recently spearheaded a team of cyber experts to develop a cybersecurity solution to protect network assets and data from internal vulnerabilities.
Nat’s experience comes from practical application and valuable lessons learned across a diverse set of clients including, the Office of the Secretary of Defense, Defense Intelligence Agency, the Department of the Interior CIO, the U.S. Securities and Exchange Commission, Blue Cross Blue Shield, and Enterprise Rent-A-Car.
Lori Kleiman, SPHR SHRM-SCPDec 9 20199:00 pmUTC30 mins
Year-end often has the HR departments head spinning. Calculating imputed income, processing year-end bonus’, finalizing open enrollment, getting ready for your 401(k) testing, the list feels endless!
In this program, Lori Kleiman, Managing Director at HR Topics will review the compliance obligations that are essentials along with the tools you’ll need to ensure your obligations are completed efficiently and accurately. Lori will also discuss resources for cost-effective support to ensure you can enjoy the holiday like the rest of your team!
During this webinar, you’ll learn:
How to create your personal to-do list for year-end
Ways to evaluate resources that have worked for many businesses
How to understand what must be done now, and which things could wait until 2020
Ryan Yackel, Product Management, Tricentis Jason Secola, Support Sales Manager, Tx3Dec 10 20192:00 amUTC41 mins
Traditional electronic signature approaches don’t work when Life Sciences companies adopt Agile and DevOps.
Testing regulated applications has long required programmatic process controls with electronic signatures. Now, with the shift to Agile processes and DevOps tools, many organizations are attempting to apply traditionally rigid governance practices within processes and tools architected for a much faster, more flexible paradigm. This is a risky approach.
Watch our on-demand webinar as a panel of Life Sciences and Agile testing experts explore the top challenges and best practices associated with testing regulated Life Sciences applications in Agile and DevOps processes. We cover:
- How to adopt a data-driven approach to computer systems validation (CSV) for a balance of speed and governance
- How to take a practical approach to applying the “right” balance of programmatic process controls
- How Tricentis and Tx3 Vera work together to help you achieve Continuous Testing that meets regulatory requirements
Naveen Chhabra, Senior Analyst Forrester Research and Mike Palmer, Chief Product Officer DruvaDec 10 20194:00 amUTC59 mins
Why should your business adopt a modern data-resiliency mindset? Data is becoming increasingly distributed across on-premises and multi-cloud environments and according to Forrester “this scattering of data requires infrastructure and operations leaders to take a fresh approach to data resiliency.”
To address today’s IT challenges, companies are looking for innovative data-resiliency solutions, and best practices to manage, protect and optimize their valuable data.
Join our webinar to hear a guest speaker from Forrester discuss:
•Why businesses need data resiliency more than ever before
•Methodology and market research findings in evaluation of data resiliency providers
Also in this presentation, Druva will discuss:
•Their debut as a Strong Performer in The Forrester Wave™: Data Resiliency Solutions, Q3 2019
•How Druva’s data protection solutions align to the global shift in moving data applications to the cloud.
Nauman Fakhar, Solutions Architect at Databricks Brett Olmstead, Data Scientist at DataRobotDec 10 20194:00 amUTC62 mins
Creating and testing machine learning models is time consuming, and delivering results in production at high volumes is prone to error. Automating the development of models is not only helping companies reduce errors but it’s also uncovering powerful business insights - faster.
Join our upcoming webinar, How to Automate Machine Learning and Scale Delivery, to learn how to:
Use automation to dynamically select optimal machine learning models for your use case
Automate the process of deploying models to production with high-volume data pipelines
Configure your automation to quickly scale up and down as data volumes change
Lee Doyle, Principal Analyst at Doyle Research & Rosa Lear, Director of Marketing at VeloCloud, now part of VMwareDec 10 20194:30 amUTC28 mins
SD-WAN technology is becoming widely deployed to enable quality of user experience, increased WAN bandwidth and support for IoT applications. IT organizations should select SD-WAN solutions based on their ability to support multi-cloud (e.g. 1 click access), application performance at scale, and security (both native and via partnership). In this webinar, industry analyst and Principal Analyst at Doyle Research, Lee Doyle, shares his perspective on the accelerated evolution of SD-WAN to support changing business requirements including: multi- and hybrid cloud, client-to-cloud-to-container, native advanced security, and hyperscale.
Laura Jordana, Technical Marketing Engineer, NutanixDec 10 20195:00 amUTC29 mins
Legacy backup solutions can be complicated and can take too much time to deploy and manage, requiring resources that could be spent doing more productive tasks that drive the business. There are disparate silos and management teams that can lead to missing SLAs and backup window targets.
A backup platform should be cloud-ready, intelligent and designed for a data-centric world. Join us to learn how to solve these pain points with a single platform, hosted on any hardware, managed from a single management interface
Дмитрий Войтышин Архитектор программных решений Micro Focus УкраинаDec 10 20198:00 amUTC60 mins
Directory and Resource Administrator обеспечивает улучшенное администрирование каталогов Microsoft и сред обмена сообщениями.
Администратор групповой политики(GPA) - это инструмент централизованного управления, который позволяет редактировать, тестировать, проверять и сравнивать изменения объекта групповой политики перед их внедрением в действующую среду. Это поможет вам безопасно внедрить и изменить объекты групповой политики Microsoft (GPO) в вашей среде Active Directory.
AD Bridging for the Complex Hybrid Enterprise
Extend the power of Active Directory to better manage and secure your Linux resources.
AD Bridging для комплексного гибридного предприятия Расширяет возможности Active Directory, чтобы лучше управлять и защищать ресурсы Linux.
☰ ОБЗОР ТЕМ ВЕБИНАРА
● Обеспечение безопасного и эффективного администрирования ресурсов Microsoft
● Администрация Exchange & Office 365
● Примените гранулярный политик делегирования, чтобы уменьшить сложность и риск
● Внедрение автоматизации для облегчения ИТ-нагрузки и поддержки соответствия
● Автоматизация и безопасное делегирование прав
● Безопасная архитектура с полным прокси
● Управление задачами для бизнеса и вспомогательного персонала
● Изменения групповой политики документированы и могут быть отражены в отчете, что идеально подходит для прохождения аудита или подтверждения соответствия.
● Встроенные инструменты помогают анализировать, сравнивать, устранять неполадки и тестировать объекты групповой политики.
● управление привилегиями
● гранулированноея делегирование
● групповая политика
● Управление сервером и пользователями
● Политика соблюдения
● Аудиторское покрытие"
John Bilton, Head of Global Multi-Asset Strategy & Patrik Schowitz, Global Strategist, Multi-Asset Solutions - J.P. MorganDec 10 20199:00 amUTC15 mins
This session discusses the 2020 Long-Term Capital Market Assumptions and look at how you can use them to inform your own strategic asset allocation. They will explore the key themes that have emerged from this year’s research, from the failure of monetary stimulus to the next phase of Chinese growth.