Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • 3 Common Pitfalls to Avoid when Migrating to Cloud
    3 Common Pitfalls to Avoid when Migrating to Cloud
    Sury Nagarajan , Solution Architect , Asia & Ian Ward, Solution Architect ANZ, Software AG Recorded: Feb 19 2020 34 mins
    Cloud remains to be a top initiative in 2020 and after initial pilots, many are considering increasing their cloud footprint.
    However, when the footprint on the cloud increases, so do the challenges. With a multi-cloud infrastructure comes the complexity of maintaining, controlling, integrating and securing them.
    In this session, we will share details on common mistakes organisations make when migrating applications to cloud.
    Be they packaged applications, legacy applications or even database systems, discover what it takes to successfully migrate to cloud.
  • How to Successfully Deploy a Healthy CMDB
    How to Successfully Deploy a Healthy CMDB
    Simona Lewis, Advisory Solutions Architect, ServiceNow and Kevin Wong, Sr. Technical Trainer, ServiceNow Recorded: Feb 19 2020 13 mins
    ITOM Series - Part 1

    Configuration management database (CMDB) is not a new concept, yet even today leaders in IT Service Management within large organisations struggle with CMDB accuracy and reliability.

    In the first part of this series, we will speak with Kevin Wong, Senior Technical Trainer. Prior to becoming a Trainer, Kevin spent many years implementing ServiceNow across multiple organisations and he brings a great perspective on topics such as:

    - Roadblocks encountered in CMDB deployments
    - Avoiding common issues
    - Real life implementations
  • 2020 State of the Phish - Behind the Scenes
    2020 State of the Phish - Behind the Scenes
    Gretel Egan, Proofpoint’s Security Awareness Training Evangelist Recorded: Feb 18 2020 30 mins
    Join Gretel Egan, Proofpoint’s Security Awareness Training Evangelist, for a Behind the Scenes interview on the 2020 State of the Phish report.

    The sixth annual State of the Phish again delivers critical, actionable insights into the current state of the phishing threat, including:

    - The end-user awareness and knowledge gaps that could be negatively impacting your cybersecurity defenses
    - The impacts infosec professionals are experiencing as a result of phishing attacks and the ways they’re attempting to combat these threats
    - How organizations are delivering phishing awareness training, and the ways they measure program success
  • Good vs Bad Metrics
    Good vs Bad Metrics
    Rhonda Bricco (UnitedHealth Group), Deb Doffing (Optum), Sue Perkins (Optum), Cat Goodfellow (Optum) Recorded: Feb 18 2020 31 mins
    Security leaders are increasingly basing their decisions on metrics to justify spending, quantifying risk, and demonstrating value to the executive suite. This panel of leaders will discuss how they are awash in dashboards, charts, and KPIs of little to no value and what they’ve done to develop contextual, impactful, actionable metrics.
  • What's New and What's Next with Citrix Workspace
    What's New and What's Next with Citrix Workspace
    Alysia Eve Senior Manager, Product Marketing Citrix and Omar ElNaggar Director, Product Management Citrix Recorded: Feb 18 2020 45 mins
    Citrix Workspace offers a unified, secure and intelligent experience where users get instant access to all apps, desktops, and files from one easy-to-use interface across all devices. Users now have an actionable and personalized view into all their systems to help organize, guide and automate work, while IT still has the data visibility and control they’ve come to expect.

    In our interactive webinar, Citrix Product Director Omar ElNaggar will demonstrate the evolution of Citrix Workspace with intelligent features. During the webinar, you’ll get a firsthand view into:

    - The new end user environment with Workspace intelligence.
    - Our Microapps service and how to configure and launch a microapp – Utilizing APIs available within SaaS, web, or home-grown applications, microapps allow users to receive notifications and take action without needing to launch the full application.
    - Additional features that are in development, such as virtual assistance.
  • Best Practices for Object Storage Installation & Management 2020 (Tech Tuesday)
    Best Practices for Object Storage Installation & Management 2020 (Tech Tuesday)
    Ryan Meek, Principal Solution Architect, & Jose Marcos, Sales Engineer Recorded: Feb 18 2020 48 mins
    Now that 2020 is here, you’ve decided you must implement object storage to keep pace with your organization’s exploding data stores. But, do you know all of the best practices around object storage installation and management? Our experts share the techniques we’ve used to set up some of the largest and longest-running installations in existence. Topics include:

    --Planning for Your Installation
    --Designing Your Storage Cluster
    --Moving Data with Various Protocols (S3, NFS and CIFS/SMB)
    --Setting Yourself up for Easy Data Searches (Elasticsearch & Indexing)
    --Managing & Maintaining Your Storage Cluster Efficiently
  • Customizing The Consumer Journey with Amazon Personalize
    Customizing The Consumer Journey with Amazon Personalize
    Mark McQuade, Lead Solutions Architect, Data Science, Onica Recorded: Feb 18 2020 58 mins
    Machine learning is being increasingly used to improve customer engagement by powering personalized product and content recommendations, tailored search results, and targeted marketing promotions. However, developing the machine-learning capabilities necessary to produce these sophisticated recommendation systems can be complex. Amazon Personalize allows developers with no prior machine learning experience or knowledge to easily build sophisticated personalization capabilities into their applications, using machine learning technology perfected from years of use on Amazon.com. Join us for a webinar to learn more about how to easily build personalization capabilities using Amazon Personalize.

    What we’ll cover:

    What is Amazon Personalize?
    How does Amazon Personalize work?
    How you can use Amazon Personalize in your business today and how you can use your data
    Building a recommendation algorithm vs. utilizing Amazon Personalize
    Demo evaluating the Amazon Personalize service
  • 5 Omnichannel Lessons Learned the Hard Way
    5 Omnichannel Lessons Learned the Hard Way
    Scott Sachs (SJS Solutions); Brian Spraetz (Five9); Roy Atkinson (Moderator) Recorded: Feb 18 2020 61 mins
    There is no doubt that your organization should provide a consistent customer experience across all communication channels. Fielding customer inquiries and providing information in multiple, disconnected channels can contribute to errors, miscommunication, and a disrupted customer journey that forces customers to repeat information. As a result, this can contribute to an increase in customer churn. Omnichannel, however, can create connected customer journeys and exceptional customer experiences.

    In this webinar, you will learn about some omnichannel pitfalls you can avoid, including:
    • The wrong technology (added on top of legacy systems)
    • Agents not cross-trained, leaving channels unstaffed or unavailable
    • Inaccurate metrics and KPIs
    • Insufficient or disorganized customer information

    Join us to gain valuable knowledge so that you don’t have to learn your lessons the hard way.
  • Eight Components of a Powerful Lead-to-Revenue Model
    Eight Components of a Powerful Lead-to-Revenue Model
    Christopher Ryan, The B2B Revenue Growth Expert Recorded: Feb 18 2020 45 mins
    If your goal is to massively grow your B2B company’s revenue and profit, no single tool or tactic is going to get you there. However, an effective Lead-to-Revenue (L2R) model positions you for success by aligning your marketing and sales models so that all your activities are more effective. This game-changing framework eliminates wasted motion and drives revenue and profits sooner by focusing you on the core structural and strategic components you need to succeed. By applying these strategies, you will learn how to out-market and out-sell even the toughest competition.

    Distilling more than 30 years of experience in B2B marketing, working with dozens of leading companies, lead-to-revenue strategist and revenue growth expert Christopher Ryan will provide the information to set-up your L2R model in a way that is effective, consistent and scalable. Specifically, he will share the eight components that go into every successful L2R framework and how to optimize each. He will cover areas like branding, sales models, processes, offers, content, marketing and sales alignment, technology and metrics. You will also hear examples that show you how each component works and set you on the road to great results and strategic B2B marketing clarity.

    You will learn:

    1. Assess your lead-to-revenue readiness.
    2.Spend your money and time on what really works.
    3.Measure marketing’s contribution to revenue.
    4.Build a framework that supports consistency and revenue growth.
  • Why You Should Have Zero Trust in the Web
    Why You Should Have Zero Trust in the Web
    Menlo Security Recorded: Feb 18 2020 38 mins
    "Trusted” Websites Are Not as Safe as First Thought!

    Today, attackers leverage the web’s ubiquity and users’ trust to infect devices and propagate malware. Website categorization has been compromised. Phishing and spear-phishing attacks drive today’s most significant data breaches, and clicking on apparently legitimate links within phishing emails exposes users to credential theft or malware infections, and possibly ransomware. “Trusted” websites are not as safe as first thought, and the list goes on.

    Whether users are accessing it for business or pleasure, the Internet today is no longer a place that can be trusted.

    Watch this webinar to learn how you can protect your users and lower your odds of a web-borne, companywide cyberattack.


    - Why the internet remains a dangerous place
    - Best practices for lowering the odds of a cyberattack
    - Newer technologies that are solving this problem
  • Modern virtualization: Understanding leading methods for scaling enterprise apps
    Modern virtualization: Understanding leading methods for scaling enterprise apps
    Phil Sweany, Red Hat Certified Architect (RHCA), Red Hat Training, Red Hat Recorded: Feb 18 2020 42 mins
    Any enterprise can learn leading protocols and methods for creating efficient, easily managed, cross-platform virtual and cloud application environments. Even experienced virtualization experts can discover significant new virtualization features and capabilities.

    Join this webinar for an overview of facilitating migration to the hybrid cloud, turbocharging legacy applications and services, and reviewing today’s enterprise virtualization goals with a fast-paced tour of the key changes in the newest Red Hat® Virtualization 4.3 release.

    We’ll discuss these new features:

    • Solutions for integration and migration of VMware legacy virtual machines
    • New hyperconverged infrastructure features for efficient, integrated storage on virtualization hosts, easier-to-manage VM migration, and high-availability policies
    • New techniques for resilient scaling and automation, including a self-hosted management engine
    • Enhanced logical networking, including Open Virtual Network (OVN) software-defined networking using Neutron providers
    • Shared images and applications across legacy virtualization and hybrid cloud environments
  • Best Practices for Getting Better at Threat Hunting in 2020
    Best Practices for Getting Better at Threat Hunting in 2020
    Tanner Payne, Sr. Sales Engineer at ExtraHop and Holger Schulze, CEO at Cybersecurity Insiders Recorded: Feb 18 2020 49 mins
    SecOps teams that embrace proactive threat hunting have a huge opportunity to improve their effectiveness in 2020 and beyond. 44% of respondents to the Cybersecurity Insiders Threat Hunting survey indicated that threat hunting should be a top priority, and 71% said their SOC doesn't spend enough time searching for emerging and advanced threats. This webinar will cover:

    - 2020 Cybersecurity Insiders Threat Hunting Survey Results
    - Trends, gaps, and areas for improvement in threat hunting
    - Proven best practices security operations teams can use to accelerate and improve their threat hunting practices using existing data sources and tools.
  • Four Fintech Data Faux Pas and How to Avoid Them
    Four Fintech Data Faux Pas and How to Avoid Them
    Cosme Salazar, Product General Manager at MX Recorded: Feb 18 2020 30 mins
    Data is the new currency—regardless of how you measure it. But is your data quality good enough to effectively compete? And have you ever thought about how much money you could potentially be leaving on the table if your data isn’t easily accessible and actionable?

    Join Cosme Salazar, Product General Manager at MX, to learn what data mistakes you might be making and how to increase profitability by avoiding them once and for all.

    In this webinar, you’ll learn:
    - When it makes sense to buy vs. build. And why building can, in fact, slow you down at times
    - How to reduce unnecessary points of friction in your applications with the highest level of data coverage and tools like IAV
    - What it really takes to meet customers’ expectations, and why the ability to create hyper-personalized experiences is more critical than ever before
    - Why enhanced data and multi-sourced aggregation are essential to winning customers' loyalty in today’s ultra-competitive digital-ecosystem
  • Synopsys Black Duck is now on the VMware Cloud Marketplace
    Synopsys Black Duck is now on the VMware Cloud Marketplace
    Tomas Gonzalez, Alliances Engineer, Synopsys & Neeharika Palaka, Cloud Services Business Operations Manager, VMware Recorded: Feb 18 2020 52 mins
    The use of open source software is free, but that doesn’t mean it won’t cost you. Many customers have felt the pain of managing open source software due to security, license, and operational risk concerns. Luckily, Black Duck exists to help you automatically identify the open source software in your applications and easily manage these risks early in your development life cycle. Now the question becomes how and where to deploy Black Duck. If you want the world’s most trusted enterprise cloud, VMware is the place for you. We are proud to announce that Synopsys Black Duck is now published on VMware Cloud Marketplace.

    Join experts from Synopsys and VMware as we discuss:
    •The key capabilities of the VMware Cloud Marketplace
    •How Synopsys customers can leverage Black Duck on Marketplace
    •A Black Duck demo, showing the ability to identify and manage all
    open source software in your applications
  • Zero Trust is to be earned, not taken!
    Zero Trust is to be earned, not taken!
    Charlie Winkless, Engineering Director– Presidio | Mike Dalgleish, VP Field Engineering and Partner Strategy - LogRhythm Recorded: Feb 18 2020 57 mins
    Experts predict that total losses related to cybercrime will reach $6 trillion in 2021. The weapon of choice has been compromised identity and yet security teams run for the door when discussing identity and access management. The rapid adoption of cloud and mobile is forcing organizations to rethink their security model, with Zero Trust generating the most noise these days.

    In this webinar, we’ll explore how the emerging intersection of identity and security can reduce the risk of a breach (and the resulting financial and reputational losses) and enable a modern day Zero Trust approach.
  • Align your c-suite: A CMO's playbook for securing buy-in
    Align your c-suite: A CMO's playbook for securing buy-in
    Paige O'Neil Chief Marketing Officer, Sitecore; Stefan Tornquist VP Research, Econsultancy Recorded: Feb 18 2020 51 mins
    Most executives don’t really understand the technology and processes required for successful digital transformation, and in turn underestimate the effort, time, and cost required. Neither do they understand the expected results.

    Which is a problem, because meeting modern customer expectations demands digital investment. You know that, but you need buy-in from the rest of your C-Suite. Discover how to win their support.

    Our on-demand C-Suite alignment webinar outlines the perceptions and motivations of:




    Head of Sales

    Discover what matters to them, the specific language that resonates, and how to inspire each to action.
  • QualiFYI | ep.4: How to Alleviate Continuous Testing Bottlenecks
    QualiFYI | ep.4: How to Alleviate Continuous Testing Bottlenecks
    Arta Shita, Quali; Christine Bentsen, Broadcom Recorded: Feb 18 2020 9 mins
    Check out the latest QualiFYI episode with Broadcom's Christine Bentsen, Head of Product Marketing of Continuous Testing, as she discusses how to alleviate bottlenecks using automated test environments to continuously improve quality and more. With host Arta Shita.
  • Components Necessary to Deploy a Container-Based Application
    Components Necessary to Deploy a Container-Based Application
    Pavan Kaushik, Sr. Technical Product Manager, VMware Recorded: Feb 18 2020 49 mins
    With growing adoption of container ecosystems, Kubernetes and OpenShift are becoming easy and popular choices for enterprises today. This webinar will look at the bigger picture by exploring all the components necessary to deploy a production-ready container-based application.

    Join us to:

    - Review how containers and microservices have changed traditional application delivery
    - Take a deeper look into application service deployment considerations in Kubernetes
    - Understand the 'North-South' and 'East-West' nature of microservices
    - Learn how the VMware Advanced Load Balancer fits into this ecosystem - working either alongside or replacing Kube-proxy
  • Network Automation to Accelerate the Digital-Native Enterprise Journey
    Network Automation to Accelerate the Digital-Native Enterprise Journey
    Karthik Krishnaswamy, Director of Product Marketing at NS1 Recorded: Feb 18 2020 29 mins
    Are you unable to drive agility because of cumbersome and repetitive network administration tasks and processes? Are you using appliances that prevent you from embracing cloud or collaborate with DevOps?

    Learn how organizations address these challenges and break down silos between network operations and DevOps teams by modernizing their infrastructure using API-first DNS, DHCP, and IPAM solutions.
  • Judges Roundtable: What E-Discovery Practices Judges Want to See in their Court
    Judges Roundtable: What E-Discovery Practices Judges Want to See in their Court
    Hon. Bernice Donald, Hon. Andrew Peck(Ret.), Hon. Ron Hedges (Ret.) Recorded: Feb 18 2020 60 mins
    Air Date: 2/18 at 1pm ET

    To stay in compliance with e-discovery rules, legal professionals must keep a pulse on how judges are applying those laws. In this webcast, hear from a roundtable of judges on what e-discovery practices they want to see in their courtrooms and get a first glimpse at the new federal judges survey results.
    Register for this webcast to learn:
    E-Discovery best practices from federal judges with a pulse on how e-discovery rules are being interpreted
    Results to newly released findings from the federal judges survey on e-discovery practices
    What technology tools judges want to see practitioners use more frequently
    Speakers:- Hon. Bernice Donald (https://en.wikipedia.org/wiki/Bernice_B._Donald
    - Hon, Andrew Peck (Ret.) (https://www.dlapiper.com/en/us/people/p/peck-andrew-j/
    - Hon. Ronald Hedges (Ret.) (https://www.dentons.com/en/ronald-hedges)
  • How to Achieve GRC Maturity Using ServiceNow - Part 4 (Vendor Risk Management)
    How to Achieve GRC Maturity Using ServiceNow - Part 4 (Vendor Risk Management)
    Clara Abraham, GRC Consultant; Swetha Shankar, ServiceNow Specialist; Lalith Boovaragavan, ServiceNow Evangelist Recorded: Feb 18 2020 44 mins
    The third-party risk is taken seriously only after increased incidents related to vendors and regulators focusing on supplier risk. In this webinar, our experts will conduct an in-depth analysis on ServiceNow GRC’s Vendor Risk Management. They will also suggest ideas on how to overcome traditional vendor risk management challenges through an automated less time-consuming approach.

    Key takeaways from the webinar includes:

    • Obtain timely and reliable information across your vendor
    • Leverage Vendor Portal to streamline interaction
    • Automate vendor assessments and risk scoring
    • Drive issues to closure with a consistent remediation process
    • Monitor, Prioritize and Automate Response to Third-Party Risk
  • Symantec Privileged Access Management Product Roadmap
    Symantec Privileged Access Management Product Roadmap
    Mike Dullea, Head of Symantec Privileged Access Management Recorded: Feb 18 2020 47 mins
    Learn about the upcoming planned features and future direction of the Symantec Privileged Access Management product portfolio.
  • Solving your operational issues more efficiently with Taskize
    Solving your operational issues more efficiently with Taskize
    Ben Scola, Maksym Bohachek, Tomasz Dziura Feb 19 2020 8:00 am UTC 90 mins
    19 February 09:00 CET

    Whether you’re new to Taskize or looking for advice on how to get the best out of our collaborative client service platform – this webinar is for you.

    Join our experienced client service experts as they explain the benefits Taskize can bring you and how to ensure you solve your operational issues quickly and efficiently.
    We’ll be taking you through some best practices and interesting features that you might not yet be familiar with, such as:
    - Requesting participants to join you
    - Assigning & transferring work to colleagues
    - Attachments & secure document handling
    - Managing your teams
    - Reporting metrics (KPIs)
    - Introduce the Taskize solution for CSDR Settlement Discipline

    Register now to join our webinar
  • Filr – простой удаленный доступ к файловому хранилищу с любого устройства
    Filr – простой удаленный доступ к файловому хранилищу с любого устройства
    Иван Левшин системный инженер Micro Focus CIS) Feb 19 2020 8:00 am UTC 60 mins
    Обзор Micro Focus Filr, решения для организации доступа к файлам и каталогам: его назначение, преимущества и роль в информационных системах корпоративного уровня.

    Filr – новый подход к организации файлового сервиса. Возможности решения: интеграция в существующую инфраструктуру, совместная работа пользователей, самоуправление пользователей. Множество способов организации доступа пользователей к файлам и каталогам. Совместная работа с документами Microsoft Office в браузере. Инструментарий управления решением и активностью пользователей. Выгоды для бизнеса от внедрения решения.
  • Agiler mit Microservices und Containern: Application Delivery Lösungen von SUSE
    Agiler mit Microservices und Containern: Application Delivery Lösungen von SUSE
    Carsten Duch, Sales Engineer, SUSE Feb 19 2020 9:00 am UTC 60 mins
    Container und Microservices sind weiter auf dem Vormarsch. Eine Studie von IDC zeigt, dass 85 Prozent der Firmen und Organisationen in Deutschland Container-Technologien einsetzen oder dies zumindest planen.
    SUSE bietet mit SUSE Container as a Service (CaaS) Platform und Cloud Application Platform zwei Lösungen für den Bereich Anwendungsentwicklung und -bereitstellung an. Diese unterstützen Sie bei der bei der Modernisierung von Anwendungen, vereinfachen die Bereitstellung neuer Services und beschleunigen Entwicklungsprozesse.

    - Übersicht: SUSE Container as a Service (CaaS) Platform und Cloud Application Platform
    - Use Cases: Wie sehen die Einsatzszenarien für die Produkte aus?
    - Update: Was bieten die neue Versionen?
    - Ausblick: Was kommt in der Zukunft?
  • Bye bye Veritas. Hi Commvault!
    Bye bye Veritas. Hi Commvault!
    Mario Hoffmann und Ralf van de Warreburg Feb 19 2020 10:00 am UTC 30 mins
    Erfahren Sie in 25 Minuten mehr über die exzellenten (technischen und kaufmännischen) Gründe, warum Sie von Veritas zu Commvault wechseln sollten. Eine riesige Anzahl möglicher Datenquellen und Sicherungsziele, nativer Support zahlreicher Cloud-Provider, unbegrenzte Skalierbarkeit, Reduzierung der Komplexität, einfache Migrationen, Innovationssicherheit – und nicht zuletzt die Senkung Ihrer jährlichen Supportkosten um 25 %...
  • Sécurisez vos utilisateurs nomades, vos succursales et vos applications SaaS
    Sécurisez vos utilisateurs nomades, vos succursales et vos applications SaaS
    Alaa Riahi, Aurélien Bihel, and Quentin Hidderley Feb 19 2020 10:00 am UTC 60 mins
    Afin de sécuriser votre environnement Cloud d'entreprise, il est nécessaire d'avoir à l'esprit l'ensemble des problématiques propres aux infrastructures Cloud. Cela va de la garantie d'un accès sécurisé, en protégeant tant les utilisateurs que les applications, au contrôle même des données, quelles que soient leurs localisations.

    Joignez-vous à nous pour ce Webinar afin de découvrir notre approche concernant :

    - La sécurisation des utilisateurs et sites distants grâce à Prisma Access, conçu comme SASE,
    - L'amélioration de la visibilité et du contrôle des applications SaaS au travers de Prisma SaaS,
    - Les bonnes pratiques applicables au Cloud à l'aide de scenarii usuels.
  • Enabling Event Streaming at AO.com
    Enabling Event Streaming at AO.com
    Jon Vines, AO.com Feb 19 2020 11:00 am UTC 50 mins
    Learn how AO.com are enabling real-time event-driven applications to improve customer experience using Confluent Platform.
    The introduction of Apache Kafka and the Confluent platform is supporting AO.com in modernizing the technical approach to delighting its customers. A key part of this enablement is the introduction of an event-streaming eco-system enabling event-driven applications and architecture.
    Throughout this session, we’ll look at the challenges AO.com faced when looking to adopt Kafka, their use of Confluent Platform including Kafka Connect and KSQL and the adoption of Confluent Cloud. We’ll look at the first steps, where the team are at now and what the future looks like.
  • Fully funding onsite renewable energy in the post subsidy era
    Fully funding onsite renewable energy in the post subsidy era
    Cameron Welsh, Shimon Shoshani and Imran Khan, Marubeni Europower Feb 19 2020 11:00 am UTC 60 mins
    Marubeni Europower is a subsidiary of the Marubeni Corporation. Marubeni is a leading investor in renewable energy who develops and operates Independent Power Producer (IPP) Projects.
    Funding can be a challenge for many organisations. Marubeni will outline new approaches to fully funding onsite renewable generation projects such as Wind, Solar, Storage & EV Infrastructure. The webinar will introduce Marubeni’s capability & outline the steps involved in producing a Corporate PPA proposal for clients to consider.

    Cameron Welsh
    Business Development Manager
    Cameron focuses on origination of new investment opportunities for the Distributed Energy team. He has been working with I&C clients for over 25 years on critical infrastructure projects most recently in the areas of asset revenue optimisation in grid balancing and demand response markets for assets such as Energy storage, CHP and Flexible Generation.

    Shimon Shoshani
    Head of Distributed Energy
    Before joining Marubeni, Shimon ran his own consultancy company advising large energy consumers on energy storage projects. He was a V.P. with Statkraft, heading its UK development activities in onshore wind. Prior to Statkraft, he held various technical, commercial and project management roles with E.ON in the UK, Lahmeyer International in Germany and with the Israel Electric Corporation.

    Imran Khan
    Business Development Manager
    Prior to Joining Marubeni Imran has spent over 12 years building his career within the renewable energy sector. Having worked for some of the larger Utilities and Solar developers working across various roles he has now bought his experience and works with the distributed energy team in progressing our PPA offer to the C&I sector.

    Please note, all data you provide through pre-registration will be shared with our webinar partners once the webinar has been concluded. If you do not wish your data to be shared with the partner, please email harry.matyjaszek@energylivenews.com detailing the webinar.
  • Secure your Mobile Users, Branch Offices, and SaaS Applications
    Secure your Mobile Users, Branch Offices, and SaaS Applications
    Darren D'Arcy, Issam Aouad Tabet, and Marina Daniela Costache Feb 19 2020 11:00 am UTC 60 mins
    To secure your Cloud-enabled organization, you need to have a cloud-delivered security mindset. This is achieved through enabling secure access, protecting users & applications, and controlling data from anywhere.

    Join our Webinar to learn more about:

    - Securing your mobile users and branch offices with Prisma Access designed for SASE
    - Providing visibility and control for your SaaS applications through Prisma SaaS
    - Your cloud environment design best practices and use case
  • Episode 1: Managing the commercial risks of cloud
    Episode 1: Managing the commercial risks of cloud
    Nicky Stewart, UKCloud; Henry Rex, TechUK and Sue Daley, TechUK Feb 19 2020 1:00 pm UTC 45 mins
    Following on from the results from our State of Cloud Adoption survey we're launching a new webinar series that examines the key blockers to cloud in closer detail. In the first episode, we take a look at how public sector organisations can better manage the commercial risks of cloud.
  • Current State of Play of SD-WAN
    Current State of Play of SD-WAN
    Gerhard Auer, VP EMEA | Edouard Karam, Director, Solution Marketing & Product Strategy, Accedian Feb 19 2020 1:00 pm UTC 60 mins
    Join this webinar where we will be discussing SD-WAN deployment scenarios along with:
    - The current state of “standardisation” of SD-WAN
    - Where are the main problem areas for Enterprises and SPs alike, depending on deployment scenarios chosen
    - Challenges and solutions for deployments
    - Operational issues managing a deployment
  • 3 practical tips to manage cloud config
    3 practical tips to manage cloud config
    Ben Riley, Technical Director at Sweagle & Emily Tippins, Global Marketing Director, Sweagle Feb 19 2020 2:00 pm UTC 30 mins
    When deploying to cloud-based workloads, have you got a process in place for separating your secrets from your configuration data? Do you know what practices you'll put in place to lock down access to make changes to your microservices? Will you be able to limit the access to your cloud environments in a granular way to give co-dependent teams the right privileges?

    These are all pertinent questions when adopting a hybrid and multicloud infrastructure. The way you run multiple microservices and containers in a flexible environment that provides you with enough agility, posses a few challenges for operations and cloud teams.

    That's why Ben Riley, UK Technical Director at Sweagle is here to help share his 3 practical tips to managing cloud config.

    What this live talk will cover:

    1. How to introduce standardization without losing agility
    2. How to leverage role-based access control in the cloud
    3. How to practically manage a hybrid cloud infrastructure that validates and automates config data control.

    Join us live as Ben takes you through these vital tips in a technical demonstration of managing cloud config.
  • Taking the Soreness out of SOAR
    Taking the Soreness out of SOAR
    Tim Wenzlau and Mike Reynolds, Respond Software Feb 19 2020 2:15 pm UTC 7 mins
    Respond Software is announcing the integration of the Respond Analyst with SOAR solutions from Demisto (Palo Alto Networks), Phantom (Splunk) and Security Operations (ServiceNow). The Respond Analyst from Respond Software enables organizations to unlock the true value of their SOAR deployments by managing the up-front analysis of events before they are passed to the SOAR system. Learn how the integration of the Respond Analyst and your SOAR can help you reduce attack dwell time, speed up remediation, and reduce cost.
  • CA Gen to Azure Cloud
    CA Gen to Azure Cloud
    Scott Spiro, Sen. Partner Developer Mgr, Microsoft, Rob Anderson, VP, Alliances, John Regan, VP of Delivery, Modern Systems Feb 19 2020 3:00 pm UTC 30 mins
    An educational webinar with Microsoft and Modern Systems, detailing the business challenge, process and solutions available when looking to move CA Gen application workloads to Azure Cloud.
  • Webinar: Climate risk analytics for sovereign debt markets
    Webinar: Climate risk analytics for sovereign debt markets
    Katie Prideaux, Analytics Product Specialist,Yield Book, Helene Bakhtiar, Sustainable Investment Product, Beyond Ratings Feb 19 2020 3:00 pm UTC 60 mins
    The Information Services Division of LSEG is pleased to announce that Beyond Ratings, a leading provider of climate risk in fixed income and Yield Book, a leading fixed income analytics platform, have combined their expertise in a flexible and transparent analytics solution.

    Learn how Beyond Ratings’ climate risk and ESG data can be utilized within Yield Book’s Excel Add-In for fixed income markets across 170+ sovereigns in this interactive webinar.

    •Demonstration of how to conduct climate risk portfolio analytics on-demand, with transparency into 300+ underlying climate, social and governance-aligned factors through the Yield Book Excel Add-In
    •Create climate-adjusted portfolio and benchmark analytics, including measurement of your portfolio’s current carbon footprint, temperature trajectory and gap to 2-degree scenarios
    •Automation of reports for snapshotting ESG performance, understanding drivers of Sustainability Ratings and fulfilling numerous disclosure frameworks such as TCFD and PRI.

    Interested in the product? Contact sales@yieldbook.com for more information.
  • Webinar: Using JICMAIL on your journey to the DMA Awards
    Webinar: Using JICMAIL on your journey to the DMA Awards
    Ian Gibbs, Director of Data Leadership and Learning, JICMAIL Feb 19 2020 3:00 pm UTC 75 mins
    Join JICMAIL for a webinar on Wednesday 19 February and hear case studies from users on how they used JICMAIL in their award-winning campaign and how you can use it too
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Dave Kennedy, Managing Principal, Open Source Intelligence Feb 19 2020 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This webinar will cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
  • Using machine learning to identify adverse events from scientific literature
    Using machine learning to identify adverse events from scientific literature
    Umesh Nandal Feb 19 2020 3:00 pm UTC 60 mins
    Information found in the biomedical literature is a significant source for tracking and reporting adverse drug reactions (ADR). The EMA and FDA have both mandated that market authorization holders maintain active screening of literature for any mentions of ADRs related to their drugs or other medicinal products. Given the increasing amount of literature, manual screening, reviewing and monitoring literature costs more time, money and creates an additional compliance risk. Using the advanced technologies in Artificial intelligence (AI), Machine learning (ML) and Natural language processing (NLP), we have developed models to identify Adverse events (AE) in the literature, which can save considerable time and effort in large-scale analysis and in integrating data from multiple diverse information sources.

    This webinar will discuss:
    - the challenges of literature mining using AI
    - the Biomedical Named Entity Recognition (BNER) and its advantages for information extraction tasks
    - how to create a quality training set for machine learning
    - the experiment outcome and further applications

    About speaker:

    Umesh Nandal, PhD, is the Principal Machine Learning & NLP scientist in Content Transformation (CT) department at Elsevier. With a background in Chemistry and computational biology, Umesh is applying state-of-the-art methods in ML and NLP to improve or build new life science products of Elsevier that can help researchers in getting correct answers to their questions quickly. Prior to joining Elsevier, he used various ML and computational approaches to analyse molecular data generated from high-throughput technologies to understand biological processes in healthy and diseased organisms. During his PhD, he intensively worked on the comparison of mouse models with humans by building a network based integration method that can compare their biological networks.
  • Disability Inclusion: a strategic ESG perspective for investors
    Disability Inclusion: a strategic ESG perspective for investors
    PRI, AAPD, Illinois State Treasurer & Voya Financial Feb 19 2020 3:00 pm UTC 60 mins
    This webinar will explore disability inclusion in the workplace as a critical social issue for investors which needs to be examined with a strategic perceptive, mitigating risks and realising the opportunities that disability brings. The speakers will discuss increasing evidence that embracing equality and diversity contributes to the long-term success of corporations, key initiatives such as the Disability Equality Index and the Investor Statement on Disability Inclusion and how investors can not only seek to align their portfolios but also to promote this practice within their own firms.

    Speakers include:

    - Fiona Reynolds, CEO, PRI
    - Ted Kennedy Jr, Chair of the Board of the American Association of People with Disabilities (AAPD) and Member of the Firm in the Health Care and Life Sciences practice, Epstein Becker Green
    - Michael Frerichs, Illinois State Treasurer
    - Paul Gennaro, Senior VP and Chief Brand and Communications Officer, Voya Financial
  • Next Generation AI: Transforming Data Analytics & Product Decisioning
    Next Generation AI: Transforming Data Analytics & Product Decisioning
    Ton An Huynh, Head of Global Platforms, Nielsen & Kobi Gershoni, Co-Founder & Chief Research Officer, Signals Analytics Feb 19 2020 4:00 pm UTC 60 mins
    Data is everywhere. Some have described it as a natural resource, readily available but needed to be harnessed in order to uncover its true value. The problem is how to separate the signals from the noise and derive actions that will be long-lasting and meaningful to the bottom line. The most successful brands will know how to extract the important pieces, and uncover actionable insights to develop innovative products, improve targeting and drive revenue. Increasingly, they are using AI to accomplish this, because the data that is out there is too vast, too varied and too disconnected to be meaningful on its own.

    Nielsen is a leading data provider, linking consumer purchasing habits to demographic information. Signals Analytics is an advanced analytics platform that joins all the aspects of the external data ecosystem, from data collection, developing taxonomies and establishing visualization elements that leading brands rely on for trend information and deriving predictive insights that lead to better strategic decision making.

    Join us as both companies come together in a thought-leadership webinar, highlighting how AI is transforming the world of data analytics and product decisioning. We will discuss the challenges of properly extracting the relevant information out of various external, unstructured data sets and how with machine learning it is possible to uncover connections and provide a complete picture of consumer sentiments, hype cycles and predictions on what is coming next.
  • Four Tips for “New Decade” Sales Messaging
    Four Tips for “New Decade” Sales Messaging
    Lisa Dennis, The Buyer-Focused Value Propositions Expert Feb 19 2020 4:00 pm UTC 45 mins
    A new year is always a whirlwind of activity. You’re sizing up last year’s sales results, while at the same time building marketing and sales programs for the current year. But this year is 2020. A new decade. That’s a big thing. So working on a kickstart for the a new year isn’t enough. You need to think even BIGGER. Now is a great opportunity to look beyond this year and to think about a bigger, more impactful message. Yes – this year’s targets and revenue numbers are insane – and you have to be focused on demand generation and closing deals. BUT with a message that may not resonate in this new period we are in, will you be missing opportunities? So, what do you need to do to upgrade your sales messaging for a new decade?
    You will learn:

    1.Conducting a value proposition audit
    2.How to “mirror test” your key messages
    3.Checking in with your personas for 2020
    4.Translating marketing language into sales conversations
  • Get 2020 Vision Into Your Cold Data: Know Before You Act
    Get 2020 Vision Into Your Cold Data: Know Before You Act
    Krishna Subramanian, COO, Komprise Feb 19 2020 4:00 pm UTC 23 mins
    By 2025, 175 ZB of data will be created, up from just 33 ZB in 2018, including structured, semi-structured and unstructured data. The result? Costs to store and transmit data , while always a concern, has taken on increased importance in this era of explosive data growth and pressure to become data-driven. How can you keep up with today’s growth while identifying the “who, when and what” of your unstructured data? It starts with knowing your data, improving your organization’s competencies to manage and capitalize data, helping you to better-understand data types, access patterns, and place them strategically in the right infrastructure

    Join our upcoming webinar to understand the value of Intelligent Data Management as a critical first step to become a data-driven enterprise. We’ll cover how in three easy steps:

    Analyze data prior to making any decision
    Move data with zero interference to apps, users or hot data
    Access your data whenever, wherever
  • Part 2: The 2020 State of Crypto Crime
    Part 2: The 2020 State of Crypto Crime
    Nina Heyden, Economist Feb 19 2020 4:00 pm UTC 60 mins
    Myth: Criminals love cryptocurrency because it enables untraceable, illicit transactions.

    Reality: Criminals accounted for just 1.1% of cryptocurrency transaction volume in 2019. And thanks to blockchain analysis, we can dig into that 1.1% and provide deep insight into how criminals use cryptocurrency today.

    In this two-part webinar series, Chainalysis researchers will walk you through the crypto crime trends that matter for law enforcement, regulators, financial institutions, and cryptocurrency businesses in 2020.

    Part 2 of the webinar will cover:

    -Terrorism financing
    -Exchange hacks
  • Makeover Monday Viz Review - week 7, 2020
    Makeover Monday Viz Review - week 7, 2020
    Eva Murray, Head of BI & Tableau Zen Master at Exasol | Charlie Hutcheson, Data Visualization Expert, Makeover Monday Feb 19 2020 4:00 pm UTC 75 mins
    Get live feedback on your MakeoverMonday viz in this weekly webinar. Submit your viz by tagging #MMVizReview on Twitter and registering for this webinar ahead of time.

    VIZ REVIEW is our way to provide comprehensive feedback for those who want to learn more.

    Find out everything you need to know about Makeover Monday on www.makeovermonday.co.uk (http://www.makeovermonday.co.uk/) and join the conversation on Twitter by following Eva (@TriMyData), Charlie (@CharlieHTableau) as well as the #MakeoverMonday community.
  • Disconnected environments in a connected world
    Disconnected environments in a connected world
    Alex Mayberry, Senior Cloud Consultant, Red Hat & Paul Begovich, Senior Consultant, Red Hat Feb 19 2020 4:00 pm UTC 56 mins
    In today’s market, many compliance and regulatory guidelines call for isolated environments. With that comes an ever-present challenge to design and deliver solutions that are created to operate in a connected state. While seemingly unique, this is a common situation that can impact many sectors of a business.

    During this webinar, we’ll cover several solutions for the most common problems that arise when deploying in disconnected environments and how to mitigate them.

    You’ll walk away with an understanding of the following:

    • Cross section of industry sectors employing disconnected enclaves
    • Example deployment scenarios and approaches
    • Need for collaborative development of standard approaches within services
    • Need for product teams to consider these use cases when developing
  • Q1 2020 U.S. Truckload Market Update
    Q1 2020 U.S. Truckload Market Update
    Chris Pickett Feb 19 2020 4:00 pm UTC 36 mins
    Join us for another quarterly update and forecast, where we'll discuss the current state of the market, our updated 2020 outlook, how new government regulations and a potential economic recession could impact the market, and best practices for both shippers and carriers.