In this basics of security awareness series, we look at how the principle of authority discussed by Robert Cialdini in his book Influence as well as elsewhere, can be used by malicious social engineers to gain compliance. How can we counter this tactic, and what do we look for to recognise it when it happens.
Introduction to our basics of Security Awareness Series detailing tips, hints and advice for those family, friends and colleagues not in the security industry who would appreciate simple advice on how to be more secure, especially from fraudsters, con artists, scammers and malicious social engineers.
Answering the question "Are there any red flags in social engineering?" this video explains the basics of what to look for in a potential approach from a fraudster, con artist or malicious social engineer. Intended for those who are unfamiliar with the term, these videos explain the basics of social engineering in a simple and straightforward manner.
Rick Collette, Cloud Architect at Palo Alto Networks; John Martinez, Director of Public Cloud R&D, Palo Alto NetworksRecorded: Mar 22 201955 mins
As DevSecOps adoption slowly goes mainstream among organizations, it is fundamentally changing the culture and collaboration semantics among security, development and operations teams.
This webinar will explore whether SecOps and DevOps have been effective in fostering collaboration to align their different goals into a single effort or have they slipped into implementing primitive security models of the past. Is the union of DevOps and SecOps on rocky ground and in need of marriage counseling, or are they copacetic? In this webinar, we’ll explore the needs of DevOps, Security and IT and five principles that will help you move at the speed of cloud together without creating gaps in your security posture.
With the return of innovation to the SIEM market, the definition of what comprises an effective solution has changed. Join Exabeam for an informative discussion on the ten essential features and capabilities for IT security decision makers to look for when evaluating potential candidates. Discussion points include:
- Advanced processing and analytics
- Automated threat detection and prioritization
- Facilitated incident investigation and triage
- Proactive (and reactive) threat hunting
Lucas Varela, CyberSecurity Architect, Caixabank
Orion Cassetto, Sr. Director Product Marketing, Exabeam
Brian Engle, CISO, Managing Director CISO Advisory, CyberDefenses, Inc.
Bharath Ram Ramanathan, Principal Technical and Solutions Marketing Manager - HPE StorageRecorded: Mar 22 201960 mins
Data is the lifeblood of business. A company’s data is usually copied at least once, and often multiple times, to meet the needs of various use cases such as clones for test/dev or analytics, backup copies for data protection, archival copies for compliance, instant recovery copies, or, any particular set of data is likely to have spawned one or more copies. Copies are so important that they now consume 60% of total storage capacity for the average enterprise – even more than production data. While these copies are nearly always made for a good reason, in many organizations they have spiralled out of control, creating a copy data sprawl that is tough for IT to get its arms around, let alone manage.
So how do you protect this important asset, grant copies to all who need it, and avoid paying for extra storage capacity – on-premises and in the cloud? HPE Storage’s Recovery Manager Central (RMC) for 3PAR and Nimble Storage platforms delivers a single-pane-of-glass for Copy Data Management and Data Protection for a variety of workloads such as VMware, Oracle, SQL Server, Exchange, SAP HANA and more. In this talk, we will cover how RMC delivers a DataOps experience for 3PAR and Nimble platforms with live demos.
Chistian Doolmann, Systems Engieneer Specialist, Palo Alto NetworksRecorded: Mar 22 201963 mins
Cyber-Attacken erfolgen heutzutage häufig direkt über gezielt ausgewählte Endgeräte. Daher setzen viele Unternehmen auf EDR (Endpoint Detection and Response) als Lösung, um Cyberangriffe zu erkennen und darauf zu reagieren.
Das Problem dabei: Die Sicht von EDR ist auf den jeweiligen Endpoint beschränkt, ergänzende Informationen fehlen und müssen mühsam und aufwändig ergänzt werden. Laut SANS Institute werden zudem nur 26% aller initialen Angriffsvektoren durch EDR-Lösungen erkannt.
Eines wird dabei deutlich: Ein neuer Ansatz muss her! Und hier kommt XDR ins Spiel. Im Gegensatz zu EDR kombiniert es Daten aus verschiedenen Quellen wie zum Beispiel den Endpoints, dem Netz, der Cloud, Log-Daten mit allgemeinen Bedrohungsinformationen. Dadurch bringt es unterschiedliche Aspekte zusammen und liefert ein weitaus vollständigeres Bild eines Angriffs – der dank der integrierten Analysefunktionen schneller erkannt und besser abgeblockt werden kann.
Wenn Sie erfahren wollen, wie Ihr Unternehmen dank XDR sicherer werden kann, dann sehen Sie sich dieses Webinar an.
Patrick G. Cohen, VP, Strategic Partnerships, NPower, Inc.Recorded: Mar 22 201930 mins
According to a study by the Center for Cyber Safety and Education, by 2022, there will be a shortage of 1.8 million information security workers. Key influencers like teachers, parents, state and local officials are encouraged to join this webinar to learn more about this growing field and how to engage youth in pursuing cybersecurity careers.
Tim Vine, Head of European Trade Credit at Dun & Bradstreet discusses the ever increasing impact of late payments on UK small-medium businesses, as well as the results on our latest SME-focused study “Brexit & Beyond”. For more information visit www.dnb.co.uk/smallbusiness
Cyber Security Brief PodcastRecorded: Mar 22 201925 mins
We discuss authorities' pursuit of Webstresser users, Japan allowing officials to hack civilians’ IoT devices in an attempt to improve security, and the much-discussed Apple Facetime bug. We also chat about the Razy malware attempting to steal cryptocurrencies, an evolution of business email compromise (BEC) scams, and a bizarre sting operation targeting the Citizen Lab internet watchdog group.
Harriet Waley-Cohen, Speaker and certified coachRecorded: Mar 22 201960 mins
With devices constantly pinging and stealing our attention and flow, and ever increasing demands on our time from all quarters, it can feel hard at times to stay calm, keep your energy up and maximise the use of your time to get everything you want done.
So often when you ask friends and colleagues how they are, they they snap back that they are 'tired', 'stressed', 'got far too much on to fit into the day' or even 'can't stop to chat, must keep going' usually with a big sigh and a look of slight panic or despair on their face. Instead of being one of those people, wouldn't it be amazing to feel energised, to feel calm and to know how to stay productive so that you feel in control of your professional and personal life?
Take an hour out and reflect on
- What eats away at and what creates energy, so that you can feel full of bounce when it matters most to you.
- Ways to stay calm no matter what, and how to understand triggers and behaviours that destroy your calm.
- Productivity hacks, including examining whether it really is possible to multitask or whether it's all just a myth.
Zachary Gauge & Paul GuestRecorded: Mar 22 20195 mins
The enduring appeal of private equity real estate was reinforced by the volatility in more liquid assets at the end of 2018. This popularity was reflected in last year's investment volumes as well as 2019's first investor intention surveys. Fundamentals are broadly healthy, but the pace of price growth has slowed and the focus is now on the value of income
Con el incesante aumento de la adopción de la nube, las prestaciones de firewall de próxima generación resultan esenciales para proteger las cargas de trabajo en la nube contra las amenazas avanzadas mediante funciones automatizadas de detección y protección en tiempo real.
Participe en este seminario virtual interactivo, en el que los expertos de SonicWall le explicarán cómo la serie de firewalls SonicWall Network Security virtual (NSv) puede ayudarle a reforzar la seguridad de sus entornos híbridos y multinube. Obtendrá información sobre:
•Las principales tendencias y amenazas de la industria
•Cómo NSv es capaz de proteger de forma efectiva todos los componentes críticos de sus entornos de nube pública o privada
•Cómo garantizar la protección contra la propagación lateral de las amenazas y una seguridad coherente
•Cómo detener las amenazas avanzadas
•Además, podrá ver una demostración en directo
Thomas Grätz, Sales Engineer, SUSE Linux GmbH, Michael Hojnacki, Geschäftsführer, ProtoSoft AGRecorded: Mar 22 201953 mins
Mit der digitalen Transformation setzt sich das Datenwachstum ungebremst fort. Softwarebasierte-Storage-Lösungen sind die optimale Antwort auf steigende Datenmengen und wachsende Anforderungen an Datenspeicher. Günstiger und skalierbarer als konventionelle Lösungen werden sie hohen Ansprüchen an Verfügbarkeit und Performance gerecht. SUSE Enterprise Storage bietet eine offene Technologie auf Ceph-Basis, die selbstverwaltenden Speicher, praktisch unbegrenzte Skalierbarkeit und höchste Verfügbarkeit kombiniert.
Als langjähriger SUSE-Partner hat ProtoSoft gemeinsam mit SUSE ein schlüsselfertiges Komplettsystem bestehend aus Soft- und Hardware für den Einsatz vor Ort oder im Rechenzentrum konzipiert. ProtoSoft Enterprise Storage ist ein vorkonfiguriertes System inklusive aller nötigen SUSE-Subskriptionen, 12 Monaten Priority Support sowie Vor-Ort-Installation, das für alle Storage-Aufgaben im Unternehmen oder im Data Center gerüstet ist. Im Webinar geben wir Ihnen Einblick in die neuesten Benchmark-Tests. Melden Sie sich jetzt an!
Agenda im Überblick
•SUSE + Protosoft: eine erfolgreiche Partnerschaft
•Warum Software Defined Storage?
•Vorstellung der Hardware- und Software-Konfiguration
•Benchmarks der Konfigurationen
•Neuerungen in SUSE Enterprise Storage 5.5 und Ausblick auf SUSE Enterprise Storage 6
Mitsuhiro Yuasa provides an update regarding the current macroeconomic environment in the Japanese equity markets and how he and his team are positioning the E.I. Sturdza Strategic Japan Opportunities Fund accordingly, with a focus on companies with consistent revenue / profit growth and strong management regardless of size, history, brand or market capitalization.
Jani Iivonen, Elina SoukolaRecorded: Mar 22 201938 mins
Mitkä ovat toiminnan kehittämisen kilpailut, mitä niistä saa ja kuka niihin voi osallistua? Tämän maksuttoman webinaarin jälkeen tiedät, miksi myös teidän asiakaspalveluyksikön kannattaa ottaa osaa Vuoden Contact Center tai Vuoden Service Desk 2019 -kilpailuun tai valmistautua vuoteen 2020!
Webinaarissa esitellään ensin Vuoden Contact Center -kilpailu ja jäljempänä Vuoden Service Desk -kilpailu. Molemmat kilpailut sisältävät itsearvioinnin sekä finalisteille auditoijien toteuttaman auditoinnin. Puhumassa ovat kilpailuiden pääauditoijat Elina Soukola, Prakto sekä Jani Iivonen, Wakaru Oy.
Vuoden Contact Center -tittelistä kisaavat Suomen parhaat contact center -tiimit! Wave eli Wakarun Asiakaspalveluverkosto järjestää kilpailun yhteistyössä Kehittämistoimisto Prakto Oy:n kanssa. Contact Center Assessment -ohjelmassa (CCA) palvelukeskuksen toiminta arvioidaan kuuden keskeisen osa-alueen osalta.
Vuoden Service Desk -tittelistä kisaavat Suomen parhaat service desk -tiimit! Kisaan voivat osallistua yksityisen tai julkisen sektorin organisaatiot, niin isot kuin pienet yksiköt. Kilpailussa on yksi sarja. Arvioinnissa huomioidaan yksikön koko, toiminnan luonne ja sen luomat tarpeet. Arviointiin on Kansainvälisen HDI-tukipalvelustandardin (The HDI Support Center Standard 2014) lisäksi sisällytetty ITILiä eli IT -palvelunhallinnan parhaita käytäntöjä sekä soveltuvia osia ISO/IEC 20000 -standardista.
Владислав Михайлов, технический консультант Micro Focus в РоссииRecorded: Mar 22 201940 mins
Micro Focus Container Deployment Foundation (CDF) обеспечивает гибкость развертывания и упрощенное администрирование в приложениях ITOM. CDF работает под управлением Kubernetes - которое управляет и запускает контейнеры Docker на большом количестве хостов, а так же обеспечивает совместное размещение и репликацию большого количества контейнеров.
Joan Collar, Asia Employee Health and Benefits Leader, and Alice Harkness, Asia Employee Health and Benefits ConsultantRecorded: Mar 22 201944 mins
Mercer Marsh Benefits' International Health Predictions provide insight into ten areas of potential change in the 2019 health landscape.
Join us as we explore:
- Which of these predictions are most relevant in Asia.
- How employers should consider them when designing and delivering employee health and benefits programs.
- Solutions to help employers navigate these changes.
Delivered endpoint security services can provide powerful threat protection efficacy using the IT headcount already in place supporting your business. In this 5 minute video we will demonstrate the Symantec Endpoint Protection Cloud solution, and show how to get
endpoint security up and running in as little as 5 minutes using the same powerful protection as large enterprises.
Simon Tucker, Anaplan | Ron Dimon, Deloitte Consulting | Chandana Gopal, IDC | Jeff Brobst, SeagateMar 25 201910:15 amUTC58 mins
Business planning is a simple idea in concept but in reality, it’s a complex activity woven of data, people, process, and plans. We surveyed 1000+ planning professionals across 45 countries and 18 industries to shed light onto how organizations are accelerating business value through Connected Planning.
In this webinar, we will discuss the key findings and ask our panel of experts for their predictions on how organizations should plan their way to success in 2019 and beyond.
In this webinar, our panel will:
•Share their business planning predictions for 2019
•Discuss the most intriguing data from the survey
•Provide tips on turning Connected Planning into a competitive advantage
About the speakers:
Simon brings over 15 years of experience in EPM and BI to Anaplan. Prior to Anaplan, Simon was head of product marketing for Adaytum until the acquisition by Cognos in 2003.
Ron Dimon has been designing and implementing EPM and Connected Planning solutions for 18 years. The author of “Enterprise Performance Management Done Right” (Wiley, 2013) and the forthcoming “Connected Planning: A Playbook for Agile Decision Making” (Wiley, Dec. 2018), Ron helps clients improve their strategic, financial, and operational performance through better planning, analytics, and decision-making.
Chandana Gopal is Research Manager for IDC Business Analytics software responsible for the advanced and predictive analytics practice. Ms. Gopal’s core research coverage includes the vendor and buyer research in BI and predictive analytics.
Jeff Brobst is responsible for driving optimal financial results through the implementation and management of world-class processes and systems in addition to developing high performance teams. His expertise not only relates to financial planning processes and systems implementations but also accounting & business process management.
This webinar introduces some important techniques for making decisions under stress, on time, without bias, and in group environments.
As an introduction to the one day seminar on Improving Decision Making and Expert Judgement on 4th April 2019, you will get a flavour of the course to help you understand the breadth and depth of the subject and techniques taught.
Josiah kimani, Nicola AskhamMar 25 201912:15 pmUTC45 mins
The next Master Data Management (MDM) webinar will focus on the effect that MDM has in ensuring that a Data Governance (DG) strategy comes to life. Many organizations have a great Data Governance strategy but struggle with buy in. Equally, many organizations have a great desire to resolve Data Quality issues, harmonize data across the enterprise, de-duplicate data and drive data ownership using technology. Could the two, DG and MDM, be the perfect combination to deliver the necessary solution that meets the business strategies? Josiah Kimani of Profisee will be answering this question
Cyber Security Brief PodcastMar 25 20192:00 pmUTC22 mins
Symantec threat researcher Stephen Doherty joins us to discuss our recently published research into a wave of attacks against financial institutions in West Africa. We also discuss some new research that found that many free mobile VPNs could actually compromise people’s privacy, a hitman who was convicted thanks to evidence found on his smartwatch, and an embarrassing compromise of the ATLAS MMO game. Also this week, Russia is back in the headlines again, with the DNC revealing it was targeted once again by a spear-phishing campaign originating in Russia in November last, while Facebook also removed a number of “inauthentic” accounts that it says were based in Russia and involved in spreading misinformation on the social media platform.
Ken Wong, Deputy Director at Sanofi Pasteur and Don DeCou, Extractable and Leachable Technology Manager at West PharmaMar 25 20192:00 pmUTC75 mins
Extractables and Leachables have been used interchangeablely for too long. Are we still confused?
The terminologies of “Extractable” and “Leachable” have been used interchangeably to describe test data from a study which fall in between a grey zone of typical “Extractable” or “Simulation” and “Leachable” study. During this webinar, we will explore to better understand what are the key challenges with case study and survey this grey area to capture the view of all participants.”
Presented by Ken Wong, Deputy Director at Sanofi Pasteur
Followed by Building a Bridge to Leachable Assessment
Extractable data is a practical guide to support selection of components used in drug product container closure systems and to understand potential for leachables. Standardization of extractables testing is a topic of interest in the pharmaceutical industry and debate in the scientific community, however; the challenge for standardized tests is to verify the extent of data and type of extractions needed to drive the best decisions. As a starting point, comparative extractable data can indicate differences, but this may not be relevant to end use application. According to USP informational chapter on extractables assessment, the design of an extraction study is dictated by the purpose of the extractables assessment. This presentation will put into practice the overarching principles of USP for developing extractable study designs. Three case studies will be given representing risk of leachables across product lifecycle. Data will be shown related to the selection process, post approval changes, and considerations for biologic product quality.
Presented by Don DeCou, Extractable and Leachable Technology Manager at West Pharmaceutical Services
Trevor Greetham and Melanie BakerMar 25 20193:00 pmUTC45 mins
With the original Article 50 deadline just around the corner and a decision looming about which path we take next, Head of Multi Asset, Trevor Greetham, and Economist, Melanie Baker share their thoughts on Brexit. Trevor and Melanie will consider the impact the situation has had on the UK so far as well as the range of potential outcomes that are still on the table, from an extension to a no-deal or even no-Brexit, and what this could mean for investors. They will also share their approach to positioning funds during these unpredictable times.
Lars Muller, CRM Partners AG, TIBCO MVPMar 25 20193:00 pmUTC37 mins
Data migration projects are growing more complex. With companies adopting more applications, especially cloud applications, and using more data sources than ever before, migrating just one system to the cloud can be a high-stakes, risky project. CRM Partners AG has a history of implementing successful migration projects, such as a recently completed project for a global manufacturer. Their methodology for data migration projects is designed to reduce the cost and risk they may encounter.
Watch this webinar to learn:
- The advantage of using the TIBCO Cloud™ Integration cloud-based (iPaaS) integration platform for your migration project vs. custom code
- Key decisions you need to make at the outset of your project that will minimize risks
- How to prepare your data for a successful migration
- How to test and execute your migration to ensure a smooth launch
Site Reliability Engineering (or SRE) has been gaining popularity recently to help improve reliability of systems as well as a prescriptive approach to implementing DevOps. Testers similarly play a key role in helping to balance the needs of velocity with overall system quality.
SREs develop, maintain and operate software that automates the traditional roles of the system administrator at large scale, such as configuration and cluster management systems, and that support reliability and scalability goals, such as container virtualization and the systems architecture of microservices
In this webinar we’ll explore:
* The synergies and differences between SREs and testers
* How testers can work with SREs and development teams to balance the needs of velocity and quality
* Tools to help integrate SRE into Continuous Testing and Continuous Delivery
Joshua Dennis, Ellen Lafferty, Dan Ward, A.J. BoscoMar 25 20195:00 pmUTC75 mins
The financial services industry generates and records massive amounts of transactional, operational, and other business data on a daily basis. Yet, the challenge financial institutions face is how best to leverage myriad data sources to effectively mitigate business and regulatory risk.
On March 25, Securities Docket presents a panel of industry and data analytics experts to help brokers, dealers, financial services leaders and their counsel turn data into valuable insights to spot and prevent fraud. Join Joshua Dennis, StoneTurn; Ellen Lafferty, HSBC; and Dan Ward, Ropes & Gray for this thought-provoking panel moderated by A.J. Bosco. Participants will gain an actionable understanding of how data analytics can be used to uncover useful information, suggest conclusions and support sound decision-making in the financial services industry.
Ed Liu, Director – ANZ/GCRMar 25 201911:30 pmUTC45 mins
HYCU is the ONLY purpose-built backup and recovery for Nutanix. A solution that only takes 3 minutes to deploy with minimal training. It is tightly integrated with Nutanix requiring NO additional hardware, agents or licenses to run. If you need an innovative backup solution that is cost-effective, and you are sick of trying to learn another complicated backup product, then HYCU is the perfect solution for you. It was specifically designed for Nutanix administrators in mind, that is YOU.
Thomas Stocker, Product Manager, Tricentis and Sunil Mavadia, Customer Journey, Electric CloudMar 26 20192:00 amUTC59 mins
DevOps and Agile teams have already recognized that today’s “low-code/no-code” application development approaches are an efficient way to satisfy the relentless demand for more software, faster. Yet, most continue wrestling with the high-maintenance, script-based approach to software delivery and automated testing designed decades ago.
Watch Electric Cloud and Tricentis as they share hard-won lessons that can help any organization climb out of their scripting hole—for both software test automation and the software delivery pipeline. You’ll learn how scriptless and model-based automation can help you escape the script maintenance trap—enabling you to:
- Dedicate more time to creative tasks
- Increase process speed, resiliency ,and scalability
- Achieve a new level of process visibility and control
Raj Patel: Vice President Cloud Platform Engineering, Symantec and Sameer Vasanthapuram: Partner Solutions Architect,AWSMar 26 20199:00 amUTC47 mins
There is a natural tension between decentralized, distributed DevOps and the traditional command-and-control approach of classic security management. When moving to the cloud, organizations must learn how to decentralize and democratize the security process.
Join Raj Patel, Vice President Cloud Platform Engineering, Symantec and Sameer Vasanthapuram, Partner Solutions Architect, AWS to learn how to automate security into the DevOps toolchain and strike a balance between agility and security in the cloud.
In this webinar we'll discuss:
-How DevOps and InfoSec teams can align to the new DevSecOps paradigm
-Why continuous compliance management is a new business imperative
-How to build security in to your Continuous Integration/Continuous Development pipeline
Kevin Fielder, CISO, Just Eat, Justin Shaw-Gray, Sales Director, SynackMar 26 20199:00 amUTC60 mins
Consumers are upping the ante for CISOs in 2019! >19% of consumers reported that they would not feel comfortable shopping at a store that has been breached or using an online service and 50% of consumers claim that security was a priority when choosing a bank. From eCommerce to Financial Services: trust is top of mind for consumers, and trust is becoming a core part of the CISO charter.
Join Synack's Justin Shaw-Gray as he interviews Kevin Fielder, CISO, Just Eat
- The security challenges CISOs face in eCommerce and how they are integrating crowdsourced security into their day-to-day operations to build trust with the board and with customers.
- What security’s role is in building a trusted business
- How to plug security into DevOps
- And Kevin's perspective on which security programs are actually worthwhile and where innovation is needed. What works? What doesn’t?
Marco Miska, Technical Account Manager EMEAMar 26 20199:00 amUTC60 mins
Ihre Teams haben Schwierigkeiten, mit der Häufigkeit von Netzwerksicherheitsanfragen Schritt zu halten, während sie gleichzeitig versuchen die Agilitätsinitiativen Ihres Unternehmens zu unterstützen und die Sicherheit zu wahren.
Sie kennen die Vorteile der Automatisierung, fragen sich aber wahrscheinlich: "Wo fangen wir an?"
Besuchen Sie die Experten von Tufin am 26. März um 10.00 Uhr, um nützliche Tipps für den Einstieg in die Zero-Touch-Automatisierung zu erhalten:
• Warum aktuelle Ansätze nicht funktionieren
• Wie können begrenzte Ressourcenherausforderungen überwunden werden?
• Die Schritte, die Sie unternehmen müssen, um das ultimative Ziel zu erreichen: Zero-Touch-Automatisierung
Frank Thias - Principal Systems Engineer, F5 NetworksMar 26 20199:00 amUTC62 mins
Das Erkennen von bösartigen Bots und der Schutz vor ihnen hat für Unternehmen, die eine nachhaltige Sicherheitsstrategie entwickeln, höchste Priorität. Nehmen Sie an diesem Webinar teil, um zu erfahren:
• Wie Bots Anwendungen infizieren, verbreiten und angreifen
• Welche Arten von Anwendungsangriffen häufig von Bots ausgeführt werden.
• Wie Sie sich gegen schlechte Bots verteidigen können, ohne die guten zu stören.
Durch Ihre Teilnahme an diesem Webinar werden Ihre persönlichen Daten an F5 weitergegeben und in Übereinstimmung mit den F5-Datenschutzrichtlinien behandelt (https://f5.com/about-us/policies/privacy-policy). Zudem stimmen Sie zu, dass wir Sie zukünftig auch über F5-Produkte und -Dienstleistungen informieren dürfen. Sie können dies natürlich jederzeit widerrufen.
Dr. Nicole Forsgren, CEO, DevOps Research and Assessment (DORA) and Richard Seroter, Sr. Director of Product, PivotalMar 26 20199:30 amUTC60 mins
The Accelerate State of DevOps Report is the result of five years of research—with over 30,000 data points—to understand high performance in the context of software development, and the factors that predict it.
In this webinar, we discuss the key findings in the 2018 report. Join us to learn how:
- Software delivery performance unlocks several competitive advantages including increased profitability, productivity, market share, customer service, and ability to achieve organization or mission goals.
- Not just using cloud infrastructure, but implementing cloud as it’s intended to be used, contributes to high performance
- Outsourcing may save money in the short term, but is much more likely to contribute to low performance
- Identifying key technological practices can drive high performance across your organization (and evidence that industry vertical doesn’t matter)
Dr. Nicole Forsgren is Co-founder, CEO and Chief Scientist at DevOps Research and Assessment (DORA) and co-author of the book Accelerate: The Science of Lean Software and DevOps. She is best known for her work measuring the technology process and as the lead investigator on the largest DevOps studies to date. In former lives, she’s been a professor, sysadmin, and performance engineer.
Richard Seroter is a Senior Director of Product for Pivotal, a 10-time Microsoft MVP for cloud, an instructor for developer-centric training company Pluralsight, the lead InfoQ.com editor for cloud computing, and author of multiple books on application integration strategies. As a Senior Director of Product at Pivotal, Richard heads up product marketing and helps customers see how to transform the way they build software. Richard maintains a regularly updated blog (seroter.wordpress.com) on topics of architecture and solution design and can be found on Twitter as @rseroter.
Sean Carpenter & Stephen CrowleyMar 26 201910:00 amUTC39 mins
Software teams, working in an environment where there are many services involved in servicing a request, need to deeply understand the performance of every service, so they can more effectively resolve performance issues, measure overall system health, and prioritise high-value areas for improvement.
New Relic Distributed Tracing is designed to give software teams an easy way to capture, visualise, and analyse traces through complex architectures, including architectures that use both monoliths and microservices.
Tony Cole and Richard NelsonMar 26 201910:00 amUTC45 mins
Senior Fund Managers, Tony Cole and Richard Nelson, will discuss their views on rates over the last six months and their thoughts on credit market supply. They will also share their expectations going forward as Brexit approaches and provide listeners with an update on our cash solutions offering.
Nelson Petrack, CTO, TIBO SoftwareMar 26 201910:00 amUTC36 mins
According to the newest research released by SITA, Blockchain is fast emerging among airports and airlines as the priority technology for making the travel experience more efficient. The most commonly expected use of blockchain is for passenger identification, with 40% of airlines saying it would offer a major benefit, and more use cases around passenger experience and airport operations are emerging.
Watch this webinar with TIBCO CTO Nelson Petrack presenting:
-A new business model where the traveller is highly connected. Can a blockchain be used to streamline airport operations and improve the customer experience? Increase security?
-How can blockchain play a role in passenger identity management? What about issues like privacy, GDPR, and blockchain’s immutable behaviour (meaning no deletes)?
-What is the role of consensus in an enterprise/permission blockchain deployment? What are some examples?
Learn more about Project Dovetail™ at https://www.tibco.com/resources/community/project-dovetail.
Will the Fed keep interest rates on hold? Will China move to stimulate its economy? Will the ECB delay monetary tightening? Join Diversified Income Bond Strategy PM Kenneth Orchard as he discusses how he plans to navigate the uncertain, and possibly more volatile, market environment of 2019.
Robert Arandjelovic, Director Product Marketing, Symantec and Featuring Guest Speaker, Heidi Shey, Senior Analyst, ForresterMar 26 201910:00 amUTC55 mins
Traditional perimeters vanish as organizations move to the cloud and employees work in a world of both sanctioned and unsanctioned applications. Companies must rethink their approach to securing data in this new environment.
Join Robert Arandjelovic, Director Product Marketing, Symantec and Heidi Shey, Director Product Marketing, Forrester as they discuss:
- The inherent security challenges of cloud
- Security strategies and imperatives
- How organizations are approaching and need to approach cloud security today