Dr Heather Skipworth and Dr Emel Aktas, Cranfield School of ManagementJun 19 201912:30 pmUTC30 mins
Join this webinar, led by experts from Cranfield School of Management to hear the results of the Q1 2019 Global Supply Chain Risk Report.
The Global Supply Chain Risk Report is a joint study by Cranfield School of Management’s Centre for Logistics and Supply Chain Management and Dun & Bradstreet, which investigates the level of supply chain risk faced by European companies with international supplier relationships.
Analysis has been carried out using data supplied by Dun & Bradstreet, which included around 200,000 anonymous transactions between European buyers and their suppliers who were located in more than 150 countries worldwide.
During the webinar, we will focus on the Q1 2019 report, published in June 2019. We will cover the background, the key findings and practical implications for procurement professionals.
Register now to learn:
- The level of supply risk in Q1 2019
- The differences across key industry sectors and how this should be considered in procurement decisions
- How dependency on key suppliers changed compares with the previous quarter
Presented by Dr Heather Skipworth and Dr Emel Aktas, Cranfield School of Management
Nicola Askham, Mark Humphries, Pete Youngs, Mark McQueenLive45 mins
Pete Youngs and Mark McQueen from Ortecha ( https://ortecha.com/services/dcam/) walk you through the EDM Council's Data Management Capability Assessment Model (DCAM), describing the structure of the model and how it is used to benefit your organisation.
Panelists to be announcedOct 10 201912:00 pmUTC75 mins
Cloud has become ubiquitous with IT and technology in general. From infrastructure to data centers and collaboration, to wireless networks and service desks, what comes next in cloud? Is multi-cloud the new wave of adoption?
Tune into this live panel discussion at Digital Transformation EXPO London to discuss these and other questions.
- How to increase efficiency and scale your IT on-demand whether you're plugging into a private, hybrid, public or multi-cloud infrastructure
- How to ensure that your servers, storage, and networks are keeping up with demand
- The future of collaborative work and unified communications
Daniel Breston, Technology Leadership Transformation Coach, Virtual ClarityLive60 mins
Sounds easy this Digital Transformation thing. Everyone apparently is doing it. Save a bunch of money. Makes customers happy. Our organisation looks good in the press or on the stock market. Hey – we don’t even have to do it as we can outsource everything to someone else! Nirvana!
Really? I mean REALLY? What percentage of these initiatives do not meet their expectations? What percentage of these initiatives instead make customers unhappy, or cause staff to leave or cost you money because you did not consider what these 2 words REALLY mean?
Let’s discuss what Digital Transformation can mean to you in what I hope is an interactive session on language, leadership expectations, metrics, basic tools you need, challenges, outcomes and the impact on your people. This is not a technical session. This is a discussion for leaders at any level on how to best engage the new industrial movement of our time best known as Digital Transformation.
About the speaker:
Daniel Breston was a technology leader at some level for over 3 decades for large financial services organisations in the USA and UK. Now at Virtual Clarity, Daniel coaches leaders that want to benefit from or lead technology teams to help organisations do better things faster and safer. You can also find Daniel speaking at ITSM, DevOps or local conferences or join him in discussion blogs.
Tim Jarrett, Product Management at VeracodeLive60 mins
Securing code during development increases speed to market and reduces cost – but developers can resist security testing if it’s disruptive to their workflow. That’s why planning your application security program with developer tools and processes in mind often means the difference between success and failure. This session will help you understand how, where, and when application security fits into a modern development organization.
•Learn how to make security invisible, automate security checkpoints and integrate with popular tools like IDEs, ticketing, bug tracking, and build systems.
•Scan as early as possible in the Software Lifecycle, as early as when code is written in an IDE.
•How to proactively approach open source code your developers are using.
Is your organisation moving to Amazon Web Services? Or are you a seasoned AWS pro, but need to know where to start to secure it?
It’s a fact—Cloud environments aren’t going away anytime soon. Cloud adoption is expected to grow at 12.4% annually until 2025. When you need to get started in a new cloud environment, or secure an existing one, vulnerability management is the place to start.
Join Daniel Prauser to learn the fundamentals of setting up vulnerability management in your cloud environment and common pitfalls to watch out for.
In this webinar we will cover:
The future of the cloud infrastructure landscape
* Some common misconceptions. Did you know AWS doesn’t secure your environment for you?
* Vulnerability Management best practices
* How Rapid7's InsightVM and InsightIDR can help
Daniela Fusaro, Senior Solutions ArchitectRecorded: Jun 19 201914 mins
Viele Unternehemen ziehen es in Betracht Ihre existierende Infrastruktur in der Public Cloud zu erweitern oder sogar in einigen Fällen zu ersetzen. Während der Einsatz der Public Cloud unerhörte Flexibilität bietet, was das Ausrollen und die Bereitstellung angeht, stellt es Organisationen vor der Herausforderung, wie sie dieses Umfeld am besten sichern und überwachen können, vor allem wenn es sich um den East-West Traffic im Netzwerk handelt.
Einsicht im Netzwerkverkehr zu gewinnen ist der erste Schritt, diese Umgebungen zu sichern und dafür zu sorgen, daß alle Resourcen effizient genutzt und ihre Performanz optimiert wird.
Finden Sie heraus in unserem 15minutigen Webinar wie Sie:
- Mehr erfahren über die Herausforderungen von Unternehmen bei der Einführung von der Public Cloud
- Einsicht gewinnen wie Tools mit Hilfe der Gigamon Lösung, Zugriff auf diesem Netzwerkverkehr gewinnen und dabei Sicherheit und Leistung verbessert werden
- Herausfinden wie Gigamon Netzwerk Packet Broker innnerhalb dieser Umgebungen virtualisiert hat und wie alles mit GigaVUE-FM zusammenhängt
Rene Power, Founder, Vision B2B Marketing and Training LtdLive60 mins
In all new BrightTalk webinar, regular contributor René Power from Vision B2B Marketing
and Training will share powerful strategies to help B2B product and service businesses
maximise their expertise and marketing resources to drive the right kind of inbound inquiry.
In this session you’ll learn how to
- Reverse engineer a sales funnel and align marketing activity to it
- Identify and understand the needs of target audiences
- Creatively create multi-use content and powerful integrated marketing programmes
including lead magnets, article syndication, email, PR, social and more.
Webinar attendees can get access to a bonus workbook for the webinar by email@example.com ahead of live broadcast.
Colin Domoney DevSecOps Consultant at VeracodeRecorded: Jun 19 201943 mins
This webinar will provide a comprehensive look at the security features of the Azure DevOps CD/CD platform. The topics include built-in security features such as user access controls and branch policies; and an overview of best practice for the incorporation of various 3rd party security tooling such as Veracode Greenlight within your pipeline.
Other topics include best practices for pipeline telemetry, reporting, pipeline protection and templates for security best practices. Whether you are a software developer using Azure DevOps, a security manager or a DevOps expert this webinar should further enhance your expertise in secure software delivery with Azure DevOps.
Register for this live webinar where Colin Domoney - DevSecOps Consultant at Veracode - will leave you with a clear understanding of how to Secure your DevOps Pipeline.
Ronan Smyth; Wynand Pretorius & Jonathan RyallRecorded: Jun 19 201955 mins
After January 14th 2020, Microsoft will no longer provide security updates or support for PCs running Windows 7. But you can keep the good times rolling by moving to Windows 10 with the help from Dell. This webinar will explain the O/S transition and benefits of Windows 10 by Microsoft, modern devices from Dell for Workforce Transformation, followed by Dell Services benefits for the transition by Dell.
Ronan Smyth, Dell Account Director, Microsoft;
Jonathan Ryall, Field Marketing Manager, Client Solutions Group
Wynand Pretorius, Solution Principal - End User Computing
Raj Kanuparthi, Founder, Narwal, Inc; Wayne Yaddow, Testing Consultant, Coach & MentorRecorded: Jun 19 201963 mins
Your testing expertise is great preparation for data warehouse and big data testing—which is fast-becoming a new opportunity for testers. If your organization isn’t already recruiting traditional testers to safeguard data quality, they probably will soon. Are you up for the challenge?
If so, watch two data warehouse testing leaders for the webinar Data Warehouse Testing—The Next Opportunity for QA Leaders. Wayne Yaddow is a data warehouse testing consultant who literally wrote the book on data warehouse. Raj Kanuparthi is a senior quality leader who drove the big data testing initiative at one the world’s leading financial service companies. Tricentis has gotten them together to give you a realistic look at why quality leaders are making data testing an integral part of their quality process, and the role that Tricentis Tosca experts are playing in these transformations.
- Why data testing is important
- How it compares to “traditional” software testing
- Where data warehouse testing fits into the broader quality strategy
- How leading enterprises got started with data warehouse testing
- The top challenges they faced
- The importance of automation—and how Tricentis helps
Chris Wysopal, CTO at VeracodeRecorded: Jun 19 201942 mins
Application security is “shifting left.” As the responsibility for ensuring the stability and security of software shifts to developers, what does this mean for security professionals? What does their job look like if developers are responsible for security testing?
•What the security professional’s role and responsibilities look like in a DevSecOps shop
•The DevSecOps cultural changes that will affect security
•The attributes that security tools will need in this new landscape
•Best practices for security professionals looking to not only survive, but thrive, in a DevSecOps world
While the set of circumstances surrounding the implosion of Carillion is unlikely to be replicated exactly elsewhere, it is important that we assess how closely Carillion’s modus operandi fits to other leading U.K. contractors.
Following the launch of the popular guide, Deconstructing Carillion, Euromoney Learning has invited the highly esteemed author – Adrian Grant – to expand on some of the key issues and compare Carillion with other similar cases.
In this webinar, we analyse the fit in terms of:
• use of early payment facilities and their impact on cash flow presentation
• levels of debt
• profit rates
• exposure to single project risk
• the importance of acquisitions
We then move on to the highly distressed case of Drake & Scull International ('DSI'). Although DSI operates in a different environment, some of the allegations regarding creative accounting and excessive rewards to insiders are eerily familiar...
Anton Shingarev, Jan-Peter Kleinhans, Kevin Limonier, Melinda Crane,Recorded: Jun 19 201954 mins
An international panel of leaders and influencers from across the security landscape will explore how the global ICT industry can best build trust and assurance for their products in the current cybersecurity landscape. Among other things, the panel will discuss the need to prove trustworthiness and the risks and benefits of transparency actions such as code reviews.
• Kevin Limonier, Associate Researcher, Castex Chair of Cyberstrategy;
• Jan-Peter Kleinhans, Project Director, Stiftung Neue Verantwortung;
• Anton Shingarev, Vice President of Public Affairs, Kaspersky.
Moderator: Melinda Crane, Chief Political Correspondent, Deutsche Welle
Scott Ward: Solutions Architect - Amazon Web Services (AWS), Alexi Papaleonardos: Principal Consultant - CrowdStrikeRecorded: Jun 19 201959 mins
Organizations are rapidly adopting DevOps as they retool their IT infrastructure. The speed and agility it delivers enables them to better serve their customers and compete more effectively in the marketplace. Far too often security is seen as an inhibitor — getting in the way of rapid delivery of new applications and the ability to scale infrastructure to meet business opportunity.
In this session, experts from Amazon Web Services (AWS) and CrowdStrike will outline how to quickly deploy and scale while retaining control and preserving compliance when using the cloud. You’ll learn how you can adopt a DevOps model without sacrificing security by using automated compliance policies, fine-grained controls, and configuration management techniques.
This webcast will cover these key topics and takeaways:
- A review and discussion of the shared responsibility model to help you understand the tenets of security that’s “of” the cloud versus security “in” the cloud
- Best practices in securing your cloud presence
- Practical steps for how you should assess your infrastructure, management and compliance
Chris Eng, Veracode Vice President of Research and guest, Forrester Research Principal Analyst Amy DeMartineRecorded: Jun 19 201956 mins
In our recent State of Software Security Volume 9 report, Veracode examined fix rates across 2 trillion lines of code shows that the number of vulnerable applications remains staggeringly high. More than 85 percent of all applications contain at least one vulnerability following the first scan, and more than 13 percent of applications contain at least one very high severity flaw.
One thing is certain: the sheer volume of vulnerabilities present in most organizations’ application portfolios makes it necessary for them to make daily tradeoffs between security, practicality, and speed.
There are just too many vulnerabilities for organizations to tackle all at once, which means it requires smart prioritization to close the riskiest vulnerabilities first. For the first time, our report shows a very strong correlation between high rates of security scanning and lower long-term application risks, which we believe presents a significant piece of evidence for the efficacy of DevSecOps. In fact, the most active DevSecOps programs fix flaws more than 11.5 times faster than the typical organization, due to ongoing security checks during continuous delivery of software builds, largely the result of increased code scanning.
Join guest presenter Amy DeMartine, Principal Analyst, Forrester Research Inc., and Veracode’s Chris Eng as they deliver valuable takeaways for business leaders, security practitioners and development teams seeking to secure their applications. Listeners will learn potential prioritizations and software development methods that could help their organizations reduce risk more quickly.
Clarice Lin, Content marketing & Analytics Strategist | ROI Doctor, BaselineLabsRecorded: Jun 19 201953 mins
Everyone can do content marketing, but not everyone knows how to turn articles into cold hard cash.
In this masterclass you'll learn how to create a laser focused content strategy for your targeted focus group and how to use tracking and attribution data to create a content sales feedback loop to maximize the ROI of your content marketing strategy.
Benny Van de Sompele, CTORecorded: Jun 19 201943 mins
Why configuration data matters - today and tomorrow!
Configuration data is more important now than ever before, as we get releases into production faster and more frequently. We need new code, the right “settings” for the right environment and the right release which comes down to configuration data.
You probably already use a distributed source code management (SCM) platform like git or bitbucket? You’ve invested in automated testing of your code? You’ve thought about automating the deployments from DEV to TEST to PRODUCTION?
But how do you manage, test and validate all the configuration data and settings that go with it?
Join us for this webinar where Benny Van de Sompele will talk about:
- The current state of configuration data management and the challenges that come with it.
- How you can introduce a non-intrusive automated process, which will allow your DevOps teams to release more often and faster, whilst at the same time reducing the risk of failure and service degradations.
- Real use cases from legacy type environments from pure cloud native architectures and hybrid applications. With the increase of CI/CD automation in the market, comes the risk of rapidly breaking application environments.
The more we automate the less there is “human validation”, but without rigorous testing and validation sooner or later failure will happen.
The future is digital – everybody agrees, the cost of failure is now the difference between surviving and thriving.
Yaroslav Nedashkovskyi, System Architect at SoftEleganceRecorded: Jun 19 201922 mins
We are going to discuss a case study on a unified data lake for the oil industry -- it is a software architecture and a set of microservices that are used to get business values from the data that are generated during the oil production. Math models were developed to make failure prediction of rod pumps during the oil artificial lifting.
We used modern capabilities of Big Data Architecture, based on Apache Spark set of technologies, machine learning, archived data, and streaming data from wells to build a unified math model to predict failure of that kind of industrial equipment.
Join this webinar to learn:
-- How machine learning can help to predict failure of industrial equipment
-- Architecture to handle near real-time data-flow from oil wells
Jessica Towns and Jake HelliwellJun 19 20191:00 pmUTC45 mins
Increase digital team skills, company structure/processes, and increase brand awareness online!
Healthcare companies face several challenges when it comes to their digital marketing. They're in one of the most highly-regulated industries and must compete with a plethora of medical advice websites and conflicting information to gain their audience's attention. They also have to provide communications and customer journeys that appeal both to patients and multiple healthcare decision makers. That's why having a plan to organize your digital marketing efforts to engage your audiences is integral to improving your brand's performance.
In this demo of business membership, you will find out how we can help you:
- Launch/roll-out transformation projects that meet essential business goals.
- Create integrated marketing, product, and communications strategies and budgets.
- Improve dashboard/KPI monitoring to communicate value generated.
- Manage and develop internal team resources and skills for ongoing CPD.
- Improve ROI from activities by learning the latest best practice techniques.
With Smart Insights, plan, manage and optimize your strategy to become the best in the industry using a complete and structured system of audits, templates, guides, and e-learning.
Gareth Fraser-King, Director, Product Marketing EMEAJun 19 20191:00 pmUTC45 mins
The numbers make stark reading. 281 billion emails sent daily to over 2 billion business users. 91% of all cyber-attacks start with an email and it only takes 1 with malicious intent to impact your organisation. With evolving methods used by the adversary, it’s becoming increasingly difficult not to get burned.
Join Gareth Fraser-King, Director, Product Marketing EMEA, to learn:
- The state of the cyber landscape, specific to email security.
- How the attack vector is changing with new tactics, techniques, procedures and what you need to look out for.
- Why is FireEye better at catching evolving attacks and how this can benefit you.
Rishikesh Patel, Portfolio Manager, LGMJun 19 20191:00 pmUTC45 mins
Sentiment in emerging markets has a habit of swinging from euphoria to despair on a catchy headline. Rishikesh will discuss why the emerging markets story is so compelling, the key risks in the market and how to navigate them successfully.
Alkis Simitsis and Shivnath Babu share an automated technique for root cause analysis (RCA) for big data stack applications using deep learning techniques, using Spark and Impala. The concepts they discuss apply generally to the big data stack.
Fiona Blades (Chief Experience Officer) and Bharat Parmer (Managing Director EMEA), MESH ExperienceJun 19 20191:30 pmUTC45 mins
MESH Experience’s 2019 Retail Bank Experience Ranking Report is out; covering metrics such as share of experience, positivity and impact on brand consideration across paid, owned and earned media. We’d love to share some of their findings and insights with you in our upcoming webinar.
What you'll get in this webinar:
•Discover the leaders and laggards in retail banking - who’s moved up and who’s moved down the rankings
•Find out which challenger brand has had a meteoric rise and how they achieved this
•See which brand has risen in the rankings with superlative in-branch banking experiences
•Learn which bank has jumped up the rankings through great banking app experiences
•Key actions to ensure your brand is a leader
Joshua Costa, Manager, PS Advisory ServicesJun 19 20192:00 pmUTC90 mins
Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss threat hunting and incident detection leveraging EDR and the current cybersecurity threat landscape.
•Incident investigation considerations - old versus new
•Threat remediation and recovery
•Third-party and threat intelligence integration
Our Verizon Threat Research Advisory Center presenters will be:
•Hayden Williams, Sr. Manager, PS Advisory Services
•Joshua Costa, Manager, PS Advisory Services
- David Kennedy, Managing Principal, Open Source Intelligence
And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
•Current Intelligence Overview
•Attacks and Threat Indicators
•Latest Malware Trends
If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
Kevin Vachon, COO, MEF; Bob Mandeville, President, Iometrix; Greg Spear, Solution Manager, AccedianJun 19 20192:00 pmUTC60 mins
MEF's Carrier Ethernet generated an 80+ Billion USD market. Growth continues with the latest MEF 3.0 Carrier Ethernet standards, secured with the integrity of MEF services & technology certification. The next frontier is frictionless inter-provider service automation focusing on business applications with the first phase. Imagine automating your serviceability queries, quoting, ordering and inventory for the latest Carrier Ethernet E-access services. Given service providers' top deployment challenge of multi-provider network orchestration, this business-to-business automation could not come at a better time. This is your opportunity to get the latest on MEF 3.0 Carrier Ethernet wholesale services, its automation capabilities, LSO Sonata & APIs, plus how to fast-track your API development while getting first-to-market with MEF's LSO Sonata certification.
Whether a buyer or seller of Carrier Ethernet services, learn how to best guide your wholesale Carrier Ethernet business with LSO Sonata and MEF 3.0 certifications. Join MEF's COO, MEF's Certification Committee Co-Chair and President of Iometrix, MEF's certification partner, to explore MEF 3.0 Carrier Ethernet, amplified by LSO Sonata.
What you will learn:
• Highlights of MEF 3.0 Carrier Ethernet
• MEF 3.0 Carrier Ethernet E-Access business value
• New certification process and how to achieve MEF 3.0 Carrier Ethernet certification
• Inter-provider automation enabled by LSO Sonata
• LSO Sonata certification program
Benjamin Tattermusch (Regional Sales Executive, SAP Concur)Jun 19 20192:00 pmUTC35 mins
SAP Concur App-Center Partner VATBox und Kunde Lonza zeigen, welche Vorteile die Integration von VATBox und SAP Concur hat und wie effektiv die Mehrwertsteuer-Rückerstattung von Geschäftsreisen damit ist.
Sie wollen zu Travel & Expense Management auf dem Laufenden bleiben? Dann registrieren Sie sich jetzt für den News-Service von SAP Concur: https://bit.ly/2GZRZba
How much of your MPLS traffic is actually meant for the cloud? Many of Cato customers managed to offload up to 40% of their MPLS lines while solving latency issues, originated by backhauling traffic across their MPLS.
Opting for direct Internet access, however, exposes your sites to Internet-borne threats. So how do you deliver direct internet access to the branch without compromising on security and costs?
Jeremy Brown, Director, Red Hat Open Innovation Labs, EMEAJun 19 20192:00 pmUTC60 mins
Are you moving from project-based to product-centric teams? How about using agile delivery methods, or, applying DevOps culture with heavy automation? Are you an advocate of these practices, but struggle to articulate the benefits to your wider organization?
In this session, Jeremy Brown, Red Hat Open Innovation Labs, will introduce a powerful metrics-based process mapping tool that can be used to help teams articulate the benefits, return, and value of DevOps adoption to the wider organization. Jeremy will demonstrate how this metrics-based process mapping tool was used with a European automotive company to reveal a 30x improvement in their key metrics. You will leave with the ability to implement this very simple yet effective tool in your own organizations to begin or accelerate DevOps adoption.
Art Langer, David Linthicum, EJ Bodner AI, Artificial Intelligence, Internet of Things, Mobile, 5G, IoTJun 19 20192:00 pmUTC58 mins
This free 1-hour webinar from GigaOm Research brings together experts in Digital Transformation, featuring GigaOm David Linthicum and special guest from Nutanix, Dr. Arthur Langer. The discussion will focus on the stepwise process of understanding where you are in employing digital, where you need to go, and the specifics to drive success the first time.
“Digital transformation” is certainly the buzzword of 2019, but most don’t know what it is, why it is important and how to do it right. By investing in digital experience transformation enterprises can discover valuable customer behavior insights and execute personalized experiences to engage, delight and retain customers.
In this Webinar, we’ll take the mystery out of what it takes to create and execute on a digital transformation strategy, including what’s important, and what needs to be avoided. This will be a candid discussion with industry experts. We’ll explore what technology to leverage, best practices, and approaches.
In this 1-hour webinar, you will discover:
• Reference technical architecture of digital transformation, from 5G to IoT.
• Social architecture, or how people are important to this transformation strategy.
• How to sell digital initiatives to the board of directors, and other stakeholders.
• Core metrics and continuous integration that keep priorities straight.
Gordon Kerr, Head of European Structured Finance ResearchJun 19 20192:00 pmUTC75 mins
DBRS Ratings Limited (DBRS) invites you to attend a webinar updating you on its Global ABS 2019 Recap on 19 June 2019 at 3 p.m. BST/4 p.m. CEST/10 a.m. EDT. The webinar will be hosted by Gordon Kerr,
Senior Vice President and Head of European Structured Finance Research, in London.
For those who were unable to attend the prime securitisation industry event of the year, or perhaps spent the majority of it in meetings, DBRS offers the opportunity for its analysts to provide their key takeaways from the event.
On the call, Gordon will be joined by Christian Aufsatz, Head of European Structured Finance; Paolo Conti, Head of European ABS; Carlos Silva, Head of European Structured Credit; Alfonso Candelas, Head of European Structured Finance Surveillance; Kali Sirugudi, European RMBS; and Mudasar Chaudhry,
European Structured Credit. The discussion will cover all sectors and provide DBRS’s perspective on important highlights.
The discussion will last approximately 25 to 30 minutes and will be followed by an interactive questionand-answer session. DBRS welcomes all who wish to participate.
Mikhail Bezroukov, Yield Book Product Specialist, FTSE RussellJun 19 20192:00 pmUTC60 mins
Transaction-level approaches to liquidity ratio analytics within fixed income market.
• The Yield Book is offering a new Liquidity Ratio metric which is able to incorporate both traded price and volume information and adjusts for yield curve and sector-wide movements
• Innovative approach to inferring a liquidity score for bonds that do not have observed trades
• The measure produces intuitive results allowing for comparison across bonds and markets
Elisabeth Cullivan Thomas, Founder, Launch Product MarketingJun 19 20192:00 pmUTC60 mins
Product marketers are not building a product, nor are they selling a product, so what do they do? Most often, they find themselves at the intersection of product development, sales, and marketing. The role is ambiguous - sometimes strategic with persona development, pricing, and messaging responsibilities or tactically focused on collateral, webinars, and research. Great product marketers thrive on the role’s ambiguity and cross-functionality. Attend this webinar for an inside look at the high-demand role of product marketing.
Lloyd Yip, The Startup Sales ExpertJun 19 20193:00 pmUTC45 mins
Linkedin is the most powerful, yet under-utilized channel for business development out there. If you are in B2B, your clients are on LinkedIn, so why not capitalize on it?
In this session, we’ll discuss how to leverage LinkedIn so you can build your brand and generate more pipeline for your business. Long gone will be the days where LinkedIn is just an online resume
You Will Learn:
1.How LinkedIn differs from other channels
2.Using LinkedIn to identify your ideal clients
3.A step by step process for building an outbound prospecting process on LinkedIn
4.BONUS: How to become a thought leader on LinkedIn to drive pipeline
Brad Schick, Skytap | Daniel Breston, Virtual Clarity | Jeremy Brown, Red Hat EMEAJun 19 20193:00 pmUTC60 mins
To win with DevOps, you need to be aware of potential issues and know how to overcome the challenges so that you can make the most of its benefits.
With the incredible growth of DevOps in a short space of time comes numerous questions about how best to adopt it. From insights and driving factors of adoption - to dealing with legacy systems and incorporating robust security features - join our panel of experts to hear advice and learnings from those at the forefront of DevOps adoption.
Brad Schick, CTO, Skytap
Jeremy Brown, Director, Red Hat Open Innovation Labs - EMEA, Red Hat
Daniel Breston, Technology Leadership Transformation Coach, Virtual Clarity
Para los negocios que utilizan aplicaciones SaaS, incluidos el correo electrónico, el almacenamiento de archivos y las aplicaciones para el uso compartido de archivos, Cloud App Security (CAS) de SonicWall brinda la mejor protección avanzada contra amenazas de su clase para los ataques de phishing dirigidos, las amenazas de día cero, los fraudes de identidad y las apropiaciones fraudulentas de cuentas. CAS garantiza políticas consistentes en las aplicaciones que se utilizan en la nube. Y cuando se integra con los NGFW de SonicWall, CAS ofrece visibilidad y control de Shadow IT a través del descubrimiento automatizado de la nube.
Valerie O'Connell, Research Director, EMA and Vincent Geffray, Senior Director, Product Marketing, EverbridgeJun 19 20193:00 pmUTC58 mins
Technology incidents happen every day to companies of all sizes, across every vertical, in all degrees of impact from inconvenient to potentially catastrophic. So, by definition, all organizations do IT incident response. The question is, how well do they do it? Research from leading IT analyst firm Enterprise Management Associates (EMA) shows that unless the response takes advantage of automation, the answer “not nearly well enough” is an understatement.
With the average time to engage the right response team taking 1 to 2 hours, and the average time to resolve a major outage taking 5 to 6 hours, there is a definitive need for immediate and dramatic operational improvement.
Leveraging EMA research and a case-based approach, this webinar will explain how to reduce mean time to repair (MTTR) through automated slashing of the time it takes to begin effective response. A simple method for determining the point at which it makes more business sense to invest in an improvement than it does to continue funding the status quo will also be discussed.
Additionally, webinar attendees will learn more about:
*Top automation drivers, indicators, obstacles, and benefits realized
*The case for automating incident response – real numbers from real places
*Quantifying the high cost of status quo – a conservative approach to demonstrating value
Luke McNamara, Principal Intelligence Analyst, FireEyeJun 19 20193:00 pmUTC60 mins
Election security has become a growing priority for governments and citizens alike on a global scale.
While cyber-enabled interference and election tampering continues to make headlines, coverage of the root cause can seem unclear due to the wide range of differing threats facing entities within an election’s ecosystem.
Join this webinar with Luke McNamara, Principal Analyst of Threat Intelligence, as he uncovers:
• Frontline observances by FireEye of election-driven threat actors—and their key target areas
• A risk framework for organizations to categorize election threat activities and targets
• Beyond the enterprise, how these threats impact individuals and donors involved in political campaigns
• Best practices used by FireEye and implemented by election administrators to reduce targeted cyber risks
• The anticipated evolution of sophisticated attacker techniques in future elections