Jyoti Ponnapalli, DLT Lead, DTCC and Kurt Seifried, Chief Blockchain Officer, Cloud SecurRecorded: May 30 202034 mins
DLT introduces a multitude of value propositions for the financial services industry. The pace of innovation is aggressively picking up in use cases pertaining to finance such as digital assets, tokenization and cryptocurrency. However, the security measures are significantly inadequate to support innovation. There is a growing need for increased vigilance and an industry-standard security framework. Please join us as DTCC & CSA speak about the current state of security in the DLT world and announce the launch of the Blockchain working group to address the needs of industrywide DLT Security Framework.
Jon-Michael Brook, Principal: Security, Cloud & Privacy, Guide Holdings LLCRecorded: May 30 202038 mins
A successful digital transformation requires a lot of moving parts. Even greenfield opportunities challenge organizations in catching all business, IT, DevOps, and security tactics in the effort. The Cloud Security Alliance's Enterprise Architecture, Cloud Controls Matrix, and Security Guidance products help create innovative, manageable, repeatable, and measurable processes. In this session, Jon-Michael C. Brook will discuss how the CSA toolset, a sprinkling of open source or third-party products, and a little elbow grease can bring a positive transition to the cloud for your business.
Kevin Fielder, CISO, Just Eat and Peter Blanks, Chief Product Officer & Head of Engineering, SynackRecorded: May 30 202031 mins
IDC predicts that by 2022, over 90% of enterprises worldwide will be relying on a cloud solution to meet their infrastructure needs, in large part driven by the COVID-19 remote working environments. This rapid migration to the cloud has created new attack surfaces and opportunities for cybercriminals to gain access to sensitive data and wreak havoc to organizations. Join us as we share how organizations are rapidly deploying dynamic security testing to future proof the connected world from the perspective of a CISO, ethical hackers from the Synack Red Team (SRT), and a solutions architect.
o Kevin Fielder, CISO of leading food delivery app Just Eat, shares his approach for creating a more secure cloud environment as they scale up to address an uptick in food deliveries during the pandemic and a recent merger.
o Ethical hackers from the Synack Red Team (SRT) share their perspective on the attacks in the cloud environment and ways to harden cloud-deployed resources.
o A technical expert from Synack’s Solutions Architect team shares his insights from the frontline helping customers deploy rapid crowdsourced security testing to harden their cloud assets against cybercriminals.
Tune in to learn how organizations have embraced rapid, easily deployable crowdsourced security testing solutions for the cloud and why the future of cloud security is linked to the future of trusted crowdsourced security intelligence.
Randy Ferree, Third-Party Risk Consultant, OneTrust VendorpediaRecorded: May 30 202020 mins
Your vendors often handle your most sensitive data. This presents significant challenges as security, procurement, sourcing, IT, and privacy teams struggle to vet and manage vendor risks and performance in real time. So, how can organizations proactively monitor vendors to protect against emerging issues? Additionally, how can cyber risk exchanges help organizations manage the third-party risk management lifecycle with more efficiency? In this session, we'll answer these questions and breakdown how cyber risk exchanges offer a more streamlined approach to vendor risk monitoring.
Juanita Koilpillai Founder and CEO Waverley Labs LLCRecorded: May 29 202042 mins
Today’s network security architectures, tools and platforms fall short of meeting the challenges presented by current security threats. Zero Trust is emerging as a popular anti-hack strategy and, as the concept implies, requires that users are not allowed any access to anything until they are authenticated. Attaching the moniker “Zero Trust” to solutions, while popular, misleads one into a false sense of security (no pun intended).
In this webinar, you’ll learn how a Zero Trust implementation using SDP is applied to network connectivity, meaning it is agnostic of the underlying untrusted IP-based infrastructure, and hones in on securing connections. The webinar will delve into the steps to implement SDP and facilitate organizations to defend from new variations of old attack methods that are constantly surfacing in existing perimeter-centric networking and infrastructure models.
Separating the control plane where trust is established, from the data plane where actual data is transferred.
Hiding the infrastructure using a dynamic deny-all firewall - the point where all unauthorized packets are dropped for logging and analyzing traffic.
Using single packet authorization to authenticate and authorize users and validate devices for access to protected services and least privilege is implicit.
Cassie Cao (Data Science Manager @ Airbnb)Recorded: May 29 202046 mins
7:00pm EST: Intro
7:05pm EST: How Data Can Propel Business Category Growth & Drive Cost Reduction with Airbnb by Cassie Cao
7:45pm EST: Q&A
At Airbnb, Cassie helped launch new business categories such as Airbnb for work and the Luxury segment. Currently, she is leading a Data Science team to drive Customer Service cost reduction. From new business category growth to cost reduction, data can be the powerful driver. Cassie will share her key learnings with you about different data science tactics to address these two problems on the opposite side.
Cassie Cao is a Data Science Manager at Airbnb. She is deeply passionate about tackling challenging business problems using data. She has built the Airbnb Luxury Data Science team from scratch and recently transited into creating a new DS team focusing on cost reduction. Cassie has a master’s degree in Statistics from Harvard, and was a research associate at HBS.
Secure World Panel Experts & Michael McGrath, Sr. Dir. of Compliance & Digital Risk at ProofpointRecorded: May 29 202092 mins
Legal, compliance and security pressures are evolving in the face of today’s data growth. Understanding the data lifecycle and looking at it through a different lens can help you identify opportunities to improve data usage, governance and compliance. So, what's the best way for you to improve the use and management of data from the perspective of security, cost, governance and regulatory compliance?
Join this webinar and gain valuable insights as we cover:
- How to control the costs associated with exponential data growth and storage
- How to mitigate financial harm and reputation risk by protecting the data of your employees and clients
- How to retain, discover and supervise your data while adhering to complex and changing international regulations
Robin Moffatt, Developer Advocate, ConfluentRecorded: May 29 202058 mins
As data engineers, we frequently need to build scalable systems working with data from a variety of sources and with various ingest rates, sizes, and formats. This talk takes an in-depth look at how Apache Kafka can be used to provide a common platform on which to build data infrastructure driving both real-time analytics as well as event-driven applications.
Using a public feed of railway data it will show how to ingest data from message queues such as ActiveMQ with Kafka Connect, as well as from static sources such as S3 and REST endpoints. We'll then see how to use stream processing to transform the data into a form useful for streaming to analytics in tools such as Elasticsearch and Neo4j. The same data will be used to drive a real-time notifications service through Telegram.
If you're wondering how to build your next scalable data platform, how to reconcile the impedance mismatch between stream and batch, and how to wrangle streams of data—this talk is for you!
Itir Clarke Sr. Product Marketing Manager, Proofpoint and Dan "Hackerman", National Health OrganizationRecorded: May 29 202053 mins
The move to the cloud and a mobile workforce has brought new security and compliance risks. Cloud account takeover, data loss and usage of unapproved cloud applications present big challenges to security teams. Protecting IT-approved applications - Microsoft Office 365, Google G Suite, Box, Dropbox, Salesforce, Slack, AWS, ServiceNow and more – is top of mind.
Join Proofpoint and a healthcare customer as we discuss how CASB enhanced security and operational efficiency for this physician practice management company. We will cover:
Why do you need a CASB?
How to protect users from cloud account compromise
How to defend your data and ensure compliance in the cloud
How to manage third-party apps and risks of cloud to cloud access
Ryan Davis Sr. Cloud Product Manager ExtraHopRecorded: May 29 202040 mins
While the cloud may be a force multiplier for DevOps and IT Ops, for security teams, it can be a vulnerability. With SecOps taking the blame for stalled migration efforts, enterprises are recognizing the need to take a cloud-native approach to securing data and workloads rather than trying to retrofit old technology to new cloud security best practices. The cloud is proven to spur innovation and efficiency, but the speed at which new devices can be added—and new instances spun up—increases risk to data and applications. Traditional security tools focused on prevention, or those that rely on agents or logs for analysis, can’t keep up with the speed and scale of the cloud. They leave too many blind spots, add friction to development cycles, and slow down incident response. Without visibility into network traffic and the ability to analyze full packets, organizations are vulnerable to new and evolving threats, and security teams are forced to slow the pace of cloud migration.
Greg Jordan (Nationwide), Pat Shanahan (Nationwide), Emigdio Zambada (Nationwide), and Brian Sampsel (Covail)Recorded: May 29 202050 mins
In honor of International Internal Audit Awareness Month (May 2020), come hear from Greg Jordan, Nationwide's Senior Vice President and Chief Audit Executive, Pat Shanahan, AVP Information Technology Audit Office, Internal Audit and Emigdio Zambada, Nationwide's IA Data Analytics Director, discuss how their department expanded the use of data & analytics by building a continuous auditing program in the cloud. Partnering with Covail, they leveraged advanced analytics like AI and have provided education and resources to all of their auditors to enhance their data analytics skill set.
Jake Turner, Director of Solutions Engineering, State and Local Govt, Education and Matt Lawson, Principal ArchitectRecorded: May 29 202059 mins
Join us for a webcast with NetApp business continuity experts. We will answer your top questions on how to improve your data performance and security while providing remote teaching and learning applications. Our experts will provide insights and best practices, as well as examples of what customers are currently doing in the education sector.
Here is a link to submit your questions:
Christopher Bontempo VP Security Marketing, Routes and Offerings, North America IBM Security |Patrick Vowles Team Lead for NoRecorded: May 29 202038 mins
As organization utilize the cloud for innovation and growth, security teams are challenged with ensuring those business initiatives and missions are successful. We need to drive change and integrate security into the business at many levels, from strategy to technology and incident response. We also need to extract as much value as possible from the tools and data sources we already have in place.
Join us to see how what IBM has learned from thousands of engagements and how the industry is moving towards a true, open, interoperable platform for securing hybrid multicloud environments.
Please feel free to reach out to Patrick and or Chris with any questions or requests at email@example.com and firstname.lastname@example.org
MuckAI Girish, CEO and Board Member, IIT Madras FoundationRecorded: May 29 202047 mins
Numerous studies have pointed out that volunteering offers numerous personal benefits while you make a positive impact on society. Many people toy with the idea of volunteering, but often find it non-trivial to decide which organizations they would like to consider and how they should go about it. In this webinar, we will explain in detail a systematic framework to figure out which organization suits you best and how you can go about this.
MuckAI Girish is a Silicon Valley-based Artificial Intelligence professional who has been volunteering with a number of organizations over the past two decades and has helped raise over $50M. He currently serves as the CEO and Board Member of IIT Madras Foundation and was previously the Board President of CALICO Center, a Board Member of Sankara Eye Foundation, USA and was an executive committee member of the Wharton Non-Profit Board Leadership Program.
Diana Kelley, Cybersecurity Field CTO, MicrosoftRecorded: May 29 202039 mins
Wherever we turn it feels like the news is all COVID-19 all the time. Many of us are feeling stressed and overwhelmed and attackers know it. At Microsoft, we've seen an increase in the success of phishing attacks, one of the common vectors for malware and ransomware infections. Rather than inventing entirely new exploits, attackers are pivoting their existing infrastructure for ransomware and other malware delivery tools to COVID-19 focused lures to get us to click. In this talk, we'll share insights into how the attackers have shifted their lures and provide recommendations for improving detect and response times to reduce the likelihood these attacks will work.
Garth Landers, Director of Product Marketing, MimecastRecorded: May 29 202034 mins
More than ever, the regulatory landscape is evolving. But between multiple communications channels, skyrocketing data volume and intense regulatory scrutiny from the SEC, FINRA and others, how can you trust your data is immutable and audit ready? How are financial services firms adapting in this transformation? How can you solve for next generation retention, supervision and e-discovery?
Attend this session and learn best practices in process, policies and technology that will put your firm in the power position when responding to regulatory requirements and reducing risk.
Shaul Holtzman, Nacho SanmillanRecorded: May 29 202060 mins
The Linux threat ecosystem is crowded with IoT DDoS botnets and crypto-mining malware. With low detection rates in nearly all leading antivirus solutions, Linux threats pose new challenges to the information security community that have not been observed in other operating systems.
Meghan Steele, Senior Director, and Bob Burwell, CTO, State, Local Government and Education at NetAppRecorded: May 29 202043 mins
Join us for a webcast with NetApp's business continuity experts. We will answer your top questions on how to improve your data performance and security while providing remote working applications. Our experts will provide insights and best practices, as well as examples of State and Local Government customers are doing.
To submit your question, please use the following link:
Banks and credit unions are facing significant challenges to prevent financial crimes, such as money laundering and terrorist financing, as criminals become more sophisticated in their efforts to evade detection.
From criminal groups amassing millions in illicit profits by orchestrating online fraud schemes, to Human Trafficking, Human Smuggling, and Drug trafficking organizations using mule networks to facilitate the movement of criminal proceeds across borders — crime rings operating across multiple institutions are a real and growing threat.
Join us for this educational webinar, as we provide insights into the trends and typologies of crime ring activity. We will discuss the intersection of fraud and money laundering activity in the context of organized criminal networks and provide real-life examples
In this educational webinar, you will learn:
- The role of fraud schemes in funding criminal organizations
- Tactics used by criminal groups to move illicit funds through the US financial system
- Walk through of real-life examples of crime rings that span multiple institutions
- How technology and collaboration can overcome the challenges of a single institution’s limited view of activity.
Ganesh Krishnan, Richard Beckett, and Guy Davis, SophosRecorded: May 29 202041 mins
Curious about how a leader in cybersecurity moves to the cloud? Join us for an exclusive interview with Ganesh Krishnan, VP of Engineering, and Guy Davies, Principal Cloud Architect at Sophos.
We’ll discuss how to approach your transition to the cloud, cybersecurity fundamentals and how they need to be re-orientated to deal with cloud threats, and what they’ve learned after all these years of working with security and DevOps teams around the world.
Peter Elliman- Director of Product Marketing Druva and Steven Manley Chief Technologist DruvaJun 1 20207:00 amUTC58 mins
Protecting business data and ensuring continuity are top-of-mind priorities for IT professionals as their organizations navigate the new normal of working remotely. Cloud data protection offers the reliability, flexibility, and cost savings that organizations need to adapt quickly.
How flexible and resilient is your data center backup and disaster recovery solution? Are you able to protect and manage your workloads in a data center as well as remote offices from a centralized platform - while ensuring security and compliance with local regulations?
Join this webinar with our solution expert to learn:
- How cloud backup and disaster recovery allow IT to adapt and respond quickly
- How a cloud approach minimizes the risk of data loss from ransomware attacks
- How to find significant cost savings today - with up to 50% lower TCO
- What to consider when evaluating SaaS backup and disaster recovery
Belkacem Moussouni, Business Development Lead, EMEA, Automation, Red HatJun 1 20209:00 amUTC44 mins
IDC and Red Hat® know that companies all over the world are optimizing their IT infrastructure with a variety of strategic projects based on emerging technologies. One such technology is automation, a must-have for achieving digital transformation success and modernizing the enterprise IT.
Red Hat® Ansible® Automation Platform delivers the agility and flexibility to scale automation with control and insight, and bring the power of automation to your whole organization.
Join this webinar with Red Hat and IDC to discover:
Why automation is an essential capability.
The benefits of the Ansible Automation Platform.
Adrienne Whitten and David FrickJun 1 20209:30 amUTC40 mins
Marketing automation is much more than just software. Marketing automation is a strategy.
Join Adrienne Whitten and David Frick as they discuss how digital transformation is touching marketer’s lives and changing the way we do business, and how to ensure your organization is prepared to join the digital revolution and not be left behind. In this webinar on marketing automation, you will learn:
What “Marketing Automation is a Strategy” really means and what’s new with marketing automation
What steps you need to take in order to prepare your organization for a shift in strategy
What benefits marketing automation can provide to organizations ready to embrace digital transformation
Given the world’s current pandemic situation where there are travel restrictions and the increased need for remote work, remote assistance, training and the reskilling of millions in the workforce, it is now more important than ever for companies to have enterprise ready, easy to deploy digital solutions. Augmented Reality and Virtual Reality have proven to show value within many critical enterprise verticals including manufacturing, architecture, engineering, construction, energy and the utilities sectors. Lenovo will discuss the current global situation and how customers are deploying solutions like remote assistance, guided workflows, remote collaboration, and training programs to improve productivity, reduce errors, increase learning retention, and decrease service resolution times. Lenovo will announce new ThinkReality solutions for AR and VR that make it easier than ever for enterprises to deploy these solutions at scale.
Aydin Aslaner, Microsoft, Chris Hill, Barracuda Newtorks, Gemma Allen, Barracuda NetworksJun 1 202010:00 amUTC60 mins
Do you have a comprehensive security plan for your cloud infrastructure?
This eye-opening webinar will help you to combat ever-expanding business challenges and threats by strengthening your security posture.
Join us for this webinar co-presented by Microsoft and Barracuda and discover:
• How to secure your applications and data in Microsoft Azure
• How to secure remote access tailored to your needs
• How to easily protect your Office 365 data with advanced backup and recovery
• How to automate public-cloud security compliance and remediation
Plus, get answers to all your questions in the interactive Q&A session following the presentation.
Gab Barbaro, British Gas Business; Suleman Alli, UK Power NetworksJun 1 202010:00 amUTC60 mins
On June 1st watch the first in our series of video webinars with Gab Barbaro and Suleman Alli discussing the concept of the ‘net zero reset’. Where is the future post coronavirus going to take us?
Into a new world, where we now invest only in the cleaner technologies, industries and social structures to get us to net zero. Or will we return to the rush for short term survival, fossil fuels as we did post the 2008 crash?
We have the power to shape the future ahead, help start that conversation going.
Suleman Alli, Director of Customer Service, Strategy, Regulation and Information Systems, UK Power Networks
Suleman joins UK Power Networks from Accenture where he was a Managing Director, leading the utility network operations practice in the UK.
Suleman has 15 years utilities experience, delivering business transformation, company restructures and operational performance improvement across gas, electricity and water sectors.
He holds a BSc (Hons) in Accounting and Finance from the London School of Economics and Political Science
Please note, all data you provide through pre-registration will be shared with our webinar partners once the webinar has been concluded. If you do not wish your data to be shared with the partner, please email email@example.com detailing the specific webinar.
Richard Nicholls, Head of Commercial, Brook Green SupplyJun 1 20201:00 pmUTC60 mins
Transitioning into a green economy has been well documented, however the current Covid-19 pandemic has forced many businesses to reflect on their current priorities and processes. With many corporations finding their futures uncertain, is striving for net zero in a time of crisis even something we should be focusing on? In our presentation, we discuss our perspective on green energy costs and what the short- and long-term effects could be for companies going green in a post pandemic economy.
Please note, all data you provide through pre-registration will be shared with our webinar partners once the webinar has been concluded. If you do not wish your data to be shared with the partner, please email firstname.lastname@example.org detailing the specific webinar.
April LaRusse, Joshua Kendall, Matt Merritt and David JamiesonJun 1 20201:00 pmUTC45 mins
Heightened volatility in markets has caused seismic shifts in the risks and opportunities facing investors, with many considering their hedging strategy, managing liquidity and how to accurately capture growth opportunities, including through synthetic exposures.
To support decision making at this important juncture, we are launching a new online event to provide you with a succinct round up of key views across our LDI, Fixed Income and Multi-asset teams, including highlighting a special topic briefly all in one meeting.
Our speakers will each highlight what they consider to be the critical issues at this time, allowing time to take your questions to ensure that we cover the issues most relevant and important to you.
Moderator: Eleanor Dallaway, Panellists: Becky Pinkard, Dr Jessica Barker and Sherrod DeGrippoJun 1 20202:00 pmUTC60 mins
Infosecurity Magazine is thrilled to be virtually hosting the 4th annual Women in Cybersecurity networking event in advance of the Infosecurity Europe Virtual Conference. On Monday 01 June, the industry will once again meet to celebrate the women of cybersecurity and discuss the challenges around diversity.
Hosted by Infosecurity Magazine editorial director Eleanor Dallaway, the event will consist of a panel discussion featuring a diverse array of information security practitioners.
Dries Buytaert, Angie Byron, Gábor Hojtsy, Tim LehnenJun 1 20202:00 pmUTC63 mins
June 3rd, 2020 marks the launch date of the highly-anticipated release of Drupal 9 within the Drupal community.
As with any major release of a new version of Drupal, this prompts many questions. "What will change from Drupal 8 to Drupal 9?", "What experience can I expect with Drupal 9?" and "How do I prepare my site today?" Whether you are on Drupal 6, Drupal 7 or Drupal 8, we have answers for you.
Watch Dries Buytaert, the Founder of Drupal and Acquia’s Co-Founder & CTO, alongside Drupal experts Angela Byron & Gábor Hojtsy as they share insights on how to prepare for the release of Drupal 9, followed by an audience Q&A session moderated by Tim Lehnen, Drupal Association’s CTO.
In this session, you’ll learn:
- What to expect from Drupal 9
- How you can prepare your site, whether you’re on Drupal 8 or previous versions of Drupal
- The resources and tools available to make the upgrade as seamless as possible
- What you can expect from the Drupal 9 experience and the benefits of upgrading
Hear how our business partner Base22 is helping one of the States hardest hit by the COVID-19 pandemic get information to their citizens and employees quickly. By strategically re-engineering their digital platform, the State of Ohio can now build websites for agencies and programs with guidelines and patterns to gain time, use a design system to maintain a unified experience, and publish content across all sites without technical support. Learn how you can employ some of these tactics to help keep your audiences safe and informed during these challenging times, maintaining control of your digital experience, making fast but smart decisions, and enabling your environment to offer both timely and relevant responses.
The PRI, BMO Global Asset Management, MFS Investment Management, Business and Human Rights Resource CentreJun 1 20203:00 pmUTC60 mins
The COVID-19 crisis has disrupted the lives of workers across sectors and geographies. It has put an emphasis on the vulnerability and precariousness of the employment status of some workers and has also exposed, in many cases, the lack of adequate safeguards necessary to protect workers and their rights in times of crisis. During this webinar, we will explore the range of risks different categories of workers have been exposed since the beginning of the pandemic and address how investors can contribute to ensuring jobs, workers and their rights are protected and respected in the midst of the crisis. We will also discuss how these considerations might help anticipate longer-term risks, inform and help shape investor action around job and workers’ protection for the long-term recovery.
Nina Roth, Director, Responsible Investment, BMO Global Asset Management
Rob Wilson, Research Analyst, MFS Investment Management
Phil Bloomer, Executive Director, Business and Human Rights Resource Centre
Moderated by: Nabylah Abo Dehman, Manager, Social Issues, PRI
Matt Mayhew and Dan StollJun 1 20205:00 pmUTC27 mins
There is no better time than now to fully understand your business processes and put the combined power of workflow automation, robotic process automation, and document automation to work for organization.
As the industry leader, we know process and we know workflow. There’s a reason why thousands of organizations in more than 90 countries turn to the Nintex Process Platform for managing, automating and optimizing a wide-range of business processes and workflows.
In fact, every day our partners and customers successfully solve process problems big to small with automated workflows and digital forms, RPA bots, and more. With the power and ease of our software, you too can build and deploy process apps fast, and without using code.
Join us for an informative and interactive demo of the Nintex Platform. In less than an hour, we’ll show you all the capabilities we offer so your organization can save time and money, increase productivity, accelerate results, and focus your team’s energies on mission-critical work.
In this session, you will learn:
The importance of business processes, and how to map and manage them
What technologies are best to automate repetitive tasks, departmental, and industry-specific business processes
Valuable success resources available to every Nintex community member worldwide
Nintex is here to help you navigate the rapidly changing world today and tomorrow. We remain committed to improving the way people work.
We look forward to having you join us.
Mark Marquez, Executive Vice President of Technology, Momentum Telecom Ritesh Mukherjee, Vice President – Product Management,Jun 1 20205:00 pmUTC60 mins
Any WAN edge infrastructure plans today are based on vCPE and SD-WAN. Momentum Telecom has an innovative offering to enable this trend while making it flexible for customers to choose the functionality they want. Powered by 128 Technology’s Session Smart™ routers, Momentum Telecom has a game-changing solution with unprecedented flexibility, visibility, and reliability. In this webinar we talk to Momentum Telecom to gain an insight into this new offering that redefines the edge, brings differentiated services to the marketplace, and presents superior services to the customer.
Braden Purcell, Omar Abboud (Data Scientists @ Squarespace), Nate Lawson (Data & Operations Lead @ Squarespace)Jun 1 20206:00 pmUTC75 mins
2:00pm EST: Intro
2:05pm EST: Strategy and Marketing Attribution Models with Squarespace by Braden Purcell, Omar Abboud, and Nate Lawson from Squarespace
2:45pm EST: Q&A
Squarespace’s Data Science team helps the company make better strategic decisions using data. The Data Science and Marketing teams collaborate closely to ensure that they quantify the impact of their marketing decisions and use data to optimize spend allocation. In the fireside chat, they will be asked to give a broad overview of marketing data science at Squarespace. They will also be asked to provide examples as to how they have improved the quality of their checkout survey that serves as a key input to their marketing attribution model. To wrap up, they will hang out for a Q&A session with members of both data science and marketing teams to answer questions about how they work together.
Chris Hazelton, Director Security Solutions, LookoutJun 2 202012:00 amUTC37 mins
Your employees work differently now. Employees are working outside of their offices and outside of the protection of security measures. Couple this with the usage of primarily mobile devices and it opens a whole new door of vulnerabilities that organisations need to consider. Namely, phishing threats.
Register to join Chris Hazelton Director, Security Solutions of Lookout to learn:
• How attacks have evolved
• Common mobile phishing attacks
• Ways to thwart threats within your organization
• Protecting your network inside and outside enterprise perimeters
Marco Meisert OEM Alliances Manager APJ, BoomiJun 2 20201:00 amUTC56 mins
Customers require scalable, quicker and easier ways to connect across their application portfolio now more than ever. Boomi has the solution to instantly connect everyone to everything in minutes, so your customers can continue to operate effectively regardless of resource and budget considerations.
Hear the discussion with Q&A on:
*How Skedulo uses Boomi’s embedded partner features to quickly build repeatable integration templates and streamline processes
*How Boomi’s cloud-native integration platform can save time, reduce integration efforts and reduce costs
*Tools to remain agile while delighting customers and adjusting to the new reality.
Join our host Marco Meisert, OEM Alliances Manager, Boomi, with a guest speaker, Greg Martin, Senior Director of Product Management from Skedulo, and Andrew Zeikowitz, Global Director OEM Solutions, Boomi.
Software organisations who want to help customers to connect applications.
Nuix Discover includes powerful functionality that allows legal teams to build custom applications on top of the Nuix Discover database. Watch this session to see Nuix Discover Product Owner David Stromberg demonstrate how to achieve this with Data Models and the Nuix Discover Connect API.