Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Case Study and Best Practices for Protecting Customer Data
    Case Study and Best Practices for Protecting Customer Data Daniel O'Neill, Director of Global Security, Rackspace Live 60 mins
    People HR® helps companies manage their employees, which means handling high volumes of personal information – just the type of data criminals wants. They required support to protect critical customer data and reach an exceptional standard on compliance and security; a need emphasized with the introduction of the General Data Protection Regulation (GDPR).

    Given the sensitive nature of the data, People HR required effective security controls to be put in place to ensure adherence to regulatory requirements. Implementing new technologies can be costly and filling the cyber security skills gap has become increasingly difficult in today’s evolving threat landscape. The set and forget, controls-based strategy of the past will no longer adequately protect organisations against more sophisticated cyberattacks.

    In this session, Rackspace will discuss how the provision of proactive monitoring, intrusion detection and incident response in addition to data encryption enabled People HR to protect customer data and create clear policies around the data governance and protection regulation with an approach that is both platform agnostic and cloud-centric.
  • Webinar: Get up to date with GDPR and ePrivacy
    Webinar: Get up to date with GDPR and ePrivacy James Milligan, DMA Live 75 mins
    GDPR is here, and now there is another piece of legislation set to shake up the marketing industry: introducing the ePrivacy Regulation. Join us for a whistle-stop tour of everything you need to know about how the regulation interacts with the GDPR – and how it will affect your business.
  • Help us Close the Digital Skills Gap with AWS re:Start
    Help us Close the Digital Skills Gap with AWS re:Start Robbie Carroll, Account Manager, AWS Recorded: Jul 16 2018 34 mins
    Recently, the Government found that 72% of large companies and 49% of SMEs have experienced skills gaps when attempting to hire digital talent into their business. Do you fit into this category?
    We’ve created AWS re:Start, a training and job placement programme, in an attempt to help close the digital skills gap. By training and placing groups that have been left behind in the digital revolution, we hope to help you from both a skills and CSR perspective. Join us for this webinar to find out all about the program and hear about how your company can get involved and start placing ex-military personnel with AWS skills.
  • Kettle Hill US L/S Equity Fund Q2 2018 Webcast
    Kettle Hill US L/S Equity Fund Q2 2018 Webcast Andrew Kurita Recorded: Jul 16 2018 35 mins
    Join us for our quarter-end strategy update webcast. Engage with portfolio manager Andrew Kurita to learn about what drove second-quarter performance, the portfolio manager's outlook, and current portfolio positioning.
  • Visibility: The Key to Better Threat Detection
    Visibility: The Key to Better Threat Detection Matt Selheimer, Chief Marketing and Strategy Officer, Alert Logic Recorded: Jul 16 2018 30 mins
    Networks, services, applications and data are under virtually constant siege from both automated and targeted attacks. Once compromises and data breaches are discovered, companies often learn that attackers have been camped out for months – conducting reconnaissance and spreading across the network to find the most valuable resources or data. Therefore, it is important for organisations to have effective threat detection and incident response systems in place to identify and address threats.

    Many organisations are also starting to realise that simply replying on blocking tools is not the right approach, it is the lack of visibility in most cases, that leads organisations missing the obvious signs of a cyber attack.

    Effective threat detection is continuously monitoring your cyber assets for advanced threats, alerting you to validated exploits, and rapidly investigating and responding to confirmed incidents.
  • Top Business Security Risks and How You Can Fight Back
    Top Business Security Risks and How You Can Fight Back Graham Cluley, Independent Computer Security Expert Recorded: Jul 16 2018 30 mins
    According to cyber security experts, the frequency and severity of cyber attacks are on the rise, causing alarm to businesses and customers across a variety of industries. Taking a proactive, strategic approach to evaluating your cyber security strategy is critical, it starts with understanding who your organisations adversaries are and what the impact would be on your business if you were the victim of a cyberattack.

    Hear from Graham Cluley as he examines the latest methods and exploits used by cyber criminals providing an overview of the most current ways they target businesses. You’ll get an insight on how the most sophisticated attackers choose their targets and what they are looking for.

    You will learn about:
    - The ever-changing threat landscape, and how it affects your business
    - Key Considerations for your Cyber Security Strategy
    - Insight into real-life case studies
  • Strategies for Improving Enterprise Application Security
    Strategies for Improving Enterprise Application Security Brad Causey, CISSP, and Rami Elron, Senior Director of Product Management at WhiteSource Recorded: Jul 16 2018 64 mins
    Most online attacks begin when a hacker discovers a single vulnerability in an enterprise application. But how can organizations eliminate these vulnerabilities before they are exploited? While most enterprises are focused on application scanning and remediation, many software development experts are advocating better, more secure application development initiatives that prevent vulnerabilities from occurring in the first place. In this webcast, experts on application security and the DevOps movement discuss the steps that enterprises can take to build security into the app development process.
  • How to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
    How to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud Shubhra Sinha, VP of Strategic Initiatives at DataStax Recorded: Jul 13 2018 34 mins
    Most enterprises understand the value of hybrid cloud. In fact, your enterprise is already working in a multi-cloud or hybrid cloud environment, whether you know it or not. Watch this 30-minute webinar to gain a greater understanding of the requirements of a geo-distributed cloud database in hybrid and multi-cloud environments. We'll discuss the differences & similarities between hybrid cloud and multi-cloud, why data autonomy is critical, and what you get with a distributed cloud database designed for hybrid cloud.
  • BrightTALK Fri Ep 11 - rollcall: gary v - topic: Chrome Ext Month, seek out - PS
    BrightTALK Fri Ep 11 - rollcall: gary v - topic: Chrome Ext Month, seek out - PS paired sourcing Recorded: Jul 13 2018 22 mins
    rollcall: gary v - topic: Chrome Ext Month, seek out - Paired Stream 101

    Connect with us:
    https://www.twitch.tv/pairedsourcing
    https://www.youtube.com/channel/UCSl1Iu2B0UbpDY_0Yt-rG0w
    https://www.twitter.com/pairedsourcing
    https://www.facebook.com/pairedsourcing
    https://www.linkedin.com/company/paired-sourcing
    https://www.instagram.com/pairedsourcing
    https://www.brighttalk.com/channel/16837/paired-sourcing

    Show Links:
    https://www.garyvaynerchuk.com/optimism-and-the-internet/
    https://chrome.google.com/webstore/detail/seekout-sourcing-assistan/fpeamfhkkhdjdikhbalglpemmhcaikmf
    https://twitter.com/ohsusannamarie

    Learn more about us:
    https://www.pairedsourcing.com
  • Containers and Kubernetes: Visibility through CloudLens
    Containers and Kubernetes: Visibility through CloudLens Sushil K. Srinivasan, Sr. Product Manager, Ixia, a Keysight Business. Chris Hein, Partner Solutions Architect, Amazon Recorded: Jul 13 2018 35 mins
    As systems evolved from physical servers to virtual machines to the public cloud to containers, the design focus shifted from building a single robust, stable component to building a more stable microservice oriented system where individual service components can be modified or replaced without affecting the overall system. Enterprises in this evolution cycle continue to have a mix of their applications running on physical hardware, virtualized platforms, in public cloud infrastructures and Kubernetes container clusters.

    During this webinar, experts from AWS and Ixia, a Keysight business will share:
    •Strategies to provide packet visibility to your workloads in any environment
    •Insights into planning and implementing strategies
    •Review emerging designs and best practices

    You will also see a step-by-step demonstration of how you can establish packet visibility into your workloads in Physical, Virtual, Cloud, Container or in a Kubernetes Cluster by continuing to maximize on your existing investment in APM, NPM and IDS tools.

    Register to watch this webinar and demo now.
  • SOA and legacy modernization: the first step to the New Enterprise
    SOA and legacy modernization: the first step to the New Enterprise Steven Camina, Senior Product Manager Recorded: Jul 13 2018 45 mins
    Service-enabling legacy assets and effectively managing and orchestrating services is the first step toward realizing the promise of the New Enterprise. In this webinar, Steven Camina, Sr. Product Manager at MuleSoft, will present strategies and demo solutions for getting the most out of your legacy assets and outline the steps you can take to build a solid foundation for APIs down the road.

    You will learn how to:
    •Identify legacy assets within your organization
    •Move data in and out of legacy systems without downtime [DEMO]
    •Wrap legacy applications with APIs to capitalize on existing investments [DEMO]
    •Build future-proof integrations that deliver continued value [DEMO]
  • The CIO’s Top 10 Strategic Security Metrics
    The CIO’s Top 10 Strategic Security Metrics Pete Lindstrom Recorded: Jul 13 2018 27 mins
    No enterprise can be completely secure, and in the uncertainty that necessarily permeates the landscape, others will find fault. This web conference provides a way for CIOs to use proven scientific and economic principles to enhance their organizations’ security position. Simply put, the most effective security programs reduce the most risk with the least resources; therefore, an organization must find a way to measure the efficacy of its security program to understand how much of the risk it is reducing after it applies security controls. With the appropriate key risk indicator (KRI) data collected, organizations can determine which initiatives are ultimately the most useful in their security program.
  • Fireside Chat Series: Building a Sales Driven Culture
    Fireside Chat Series: Building a Sales Driven Culture Steven Rosen and Ken Thoreson Recorded: Jul 13 2018 49 mins
    Join sales management expert Steven Rosen and his guest sales management expert Ken Thorson for no hold barred fire side chat sharing their insights on the most challenging issues facing sales managers today.

    No powperpoint, no videos, just open and frank discussion.

    Expect an action-packed webinar filled with sales management gems, pearls, powerful insights and stories, that will help you crush your sales numbers.
  • Leaving your Dataviz Comfort Zone
    Leaving your Dataviz Comfort Zone Eva Murray, Head of BI and Tableau Zen Master at Exasol Recorded: Jul 13 2018 63 mins
    Tips and tricks to help you stay engaged, keep your skills sharp and your portfolio evolving.
    Through my engagement with the Tableau and wider data visualization community for Makeover Monday, I have seen what works and what can be challenging. I will give you a shortcut to continued inspiration and data excitement.
    This talk is for everyone, whether you're an analyst, information designer, team leader or executive.
  • Digitising Shared Services
    Digitising Shared Services Iain MacDonald, Director at AuraQ, k2 partner Recorded: Jul 13 2018 28 mins
    Listen to 2 Sisters Food Group disclose how they delivered cost savings of more than £250K p.a. and quality improvements of 40% in just a matter of months.
  • Symantec Control & Compliance Suite – Automatisieren Sie Compliance-Abläufe
    Symantec Control & Compliance Suite – Automatisieren Sie Compliance-Abläufe Armin Schneider ; Olaf Mischkovsky Recorded: Jul 13 2018 52 mins
    Symantec Control & Compliance Suite – Automatisieren Sie Compliance-Abläufe, schaffen Sie Transparenz und sparen Sie wertvolle Zeit

    Symantec Control Compliance Suite liefert geschäftsrelevante Sicherheits- und Risikoinformationen, mit denen Sie Prioritäten für die Bereiche Sicherheit, IT-Betrieb und Compliance effektiv abstimmen können. Bewertungen erfolgen fortlaufend und automatisiert. Sie erhalten damit eine Gesamtübersicht über Sicherheitskontrollen und Sicherheitslücken. Auf diese Weise sind Sie in der Lage, das Rechenzentrum zu härten, die Behebung von Sicherheitsvorfällen zu priorisieren, sicher auf ein Software-Defined Data Center umzustellen sowie kontinuierliche Bewertungen für die Cyber-Sicherheit und die fortlaufende Überwachung zu unterstützen
  • MultiProtect Wellbeing Support Centre
    MultiProtect Wellbeing Support Centre Jules Clark Recorded: Jul 13 2018 31 mins
    30 minute webinar to confirm how the wellbeing support centre can help increase sales and aid persistency.
  • Why Naspers is more than a Tencent proxy
    Why Naspers is more than a Tencent proxy Philip Short Recorded: Jul 13 2018 31 mins
    Philip Short, Portfolio Manager of the Old Mutual Top20 Fund and Naspers analyst will take us through the “rump” assets and the potential value unlock for Naspers shareholders
  • A 3 step Framework for a Product Manager to Prioritize in a Complex Ecosystem
    A 3 step Framework for a Product Manager to Prioritize in a Complex Ecosystem Sundar Balasubramanian, Director of Product Management at Intuit Recorded: Jul 13 2018 46 mins
    A Product Manager has the unenviable task of prioritization, balancing several short and long-term objectives to arrive at the what and when for the product team. For an early stage product, stack ranking priorities might be sufficient. For a mature product, the challenge is often deciding what not to focus on at any given time because several areas will need at least a minimum level of investment to continue to serve your customers and stay competitive. The right prioritization framework, therefore, depends on the factors such as maturity of the product, organization and competitive environment.
  • Chairman & CEO Violin Systems Interview with Scott Lowe Actualtechmedia
    Chairman & CEO Violin Systems Interview with Scott Lowe Actualtechmedia Mark Lewis, Scott Lowe Recorded: Jul 12 2018 6 mins
    Interview on 'Why Violin' and new momentum in Extreme Performance Storage for mission-critical applications
  • The Macro Outlook for China
    The Macro Outlook for China Callum Thomas, Head of Research, Topdown Charts Recorded: Jul 12 2018 60 mins
    In this presentation Callum Thomas, Head of Research at institutional research house Topdown Charts, will talk through the macro outlook for China. He will talk about where China is at in the business cycle, the key charts and indicators to watch, and how the macro outlook will shape the key risks and opportunities ahead. Listeners will leave the presentation with an understanding of the main things to think about on the macro front in China, and how to integrate that with the investment outlook.

    Callum Thomas, Head of Research, Topdown Charts
    Callum is the founder of Topdown Charts – a chart driven research house covering global asset allocation and economics. Callum has a background in multi-asset investment strategy on the buy-side and has built up strong research and analytical expertise for generating global macro driven investment insights and unique charts. Callum’s vision in creating Topdown Charts is to serve as a vital resource for portfolio managers and active asset allocators on idea generation, risk management, and in informing their macro view. Callum is based in Queenstown, New Zealand.
  • Containers Infrastructure EcoCast
    Containers Infrastructure EcoCast Josh Williams, Product Manager Recorded: Jul 12 2018 18 mins
    Learn how you can improve container troubleshooting and performance using next-gen monitoring techniques; why containers are the future of enterprise workloads; how real companies are adopting container technology; and what you’ll need to prepare yourself for containers in the datacenter or the cloud.
  • How to Foster Diversity & Inclusion in Your Hiring
    How to Foster Diversity & Inclusion in Your Hiring Brenna Child, Head of Talent Management; Amy Forbes Winebright, Project Manager; Jesus Suarez, Recruiting Coordinator Recorded: Jul 12 2018 33 mins
    In this era of ceilings being broken and “culture adds” over “culture fits,” it’s never been more critical to weed out bias within your organization.

    And there’s quantifiable proof that it’s good for your culture, too. Two-thirds of job seekers say that a diverse workforce is an important factor when evaluating companies and job offers (1).

    In this webinar, you’ll learn how to:

    Audit your interview process, from start to finish

    Spotcheck diversity benchmarks to manage expectations

    Refine your content to appeal to the talent you’re trying to reach

    (1) Glassdoor site survey, June 2014

    Speakers:
    Brenna Child, Head of Talent Management, Employer Branding at the Washington Post
    Amy Forbes Winebright, Project Manager, Global Employment Brand at Dell
    Jesus Suarez, Recruiting Coordinator, Glassdoor
  • BrightTALK Masterclass Series: Emotional Wellbeing and Emotional Intelligence
    BrightTALK Masterclass Series: Emotional Wellbeing and Emotional Intelligence Harriet Waley-Cohen, Speaker and certified coach Jul 16 2018 3:00 pm UTC 60 mins
    This webinar is part of BrightTALK's Masterclass Series.

    Do you find experiencing emotions difficult and unsettling at times, and wish you could understand them better? Perhaps you would love to feel more in control of your emotional world instead of feeling at the mercy of feelings all the time…and you’d love to know what to do when you (or others) feel overwhelmed by challenging emotions like anger, frustration or anxiety.

    You know that your emotional wellbeing could be so much better, but you don’t know quite where to start with improving it. Where you are right now in terms of your emotional world worries you sometimes and you know it’s holding you back at times in your career, health, relationships and overall peace of mind.

    In this webinar, you will learn:
    -How to understand your emotions and turn them from enemies to friends.
    -How to proactively manage your emotional wellbeing and create a road map for improving it that is personally tailored to you.
    -What to do when you are triggered by a strong and challenging emotion such as anger or anxiety, so that you are super comfortable with how you’ve handled it both in terms of yourself and other people.
    -A process that will revolutionise how you handle feelings of overwhelm.
    -How to communicate your emotions and what you need in a way that feels empowering and gets you the kind of result you want.
  • How To Evaluate an ICO
    How To Evaluate an ICO George Popescu, Managing Partner, BlockX Ventures Jul 16 2018 4:30 pm UTC 60 mins
    This webinar will provide an analysis of what an Initial Coin Offering is useful for, who uses them, how to do your own, and how to get involved in others. It will provide an overview of how to tokenize an asset, why blockchain is used to do this, and how companies have done it so far.
  • Code with Speed…and Security: Gamified Developer AppSec Training (2018)
    Code with Speed…and Security: Gamified Developer AppSec Training (2018) Matias Madou, Ph.D., Co-Founder and CTO, Secure Code Warrior and Dylan Thomas, Sr. Product Manager, Micro Focus Fortify Jul 16 2018 5:00 pm UTC 60 mins
    Delivering quality code on time and on budget is one of the biggest challenges of organizations worldwide. With evolving cyber security threats, security became a top of mind concern for board rooms and an essential KPI for development/testing. Since fixing security related (or any) issues later on in the software lifecycle is highly inefficient, the best approach is to blend security early on in the development/testing processes. One of the key methods of having fewer vulnerabilities in the code is through not introducing vulnerabilities in the first place. This requires increasing the security knowledge and awareness of developers through secure code development training.

    Fortify on Demand offers application security as a service with integrated secure development, security testing and continuous monitoring making securing applications easy and scalable for organizations. As part of Fortify on Demand, we offer gamified developer training as a result of our partnership with Secure Code Warrior. Secure Code Warrior addresses the root cause of security vulnerabilities in applications by educating developers on how to apply secure coding techniques. Fortify on Demand (FoD) integrates with Secure Code Warrior, so developers can not only identify but also remediate vulnerabilities in application code in a gamified manner—this appeals to the gaming mentality of developers by providing a competitive element.
  • Machine Learning in Reproductive Science: Human Embryo Selection and Beyond
    Machine Learning in Reproductive Science: Human Embryo Selection and Beyond Oleksii Barash Jul 16 2018 7:00 pm UTC 60 mins
    Description:

    In this talk, Oleksii Barash PhD, IVF Laboratory Research Director at the Reproductive Science Center of the San Francisco Bay Area, will discuss his team’s approach to applying machine learning for decision making during infertility treatment. Oleksii will also give a quick overview of how he uses Driverless AI to build models for predicting IVF outcomes and select the best embryo for embryo transfer.


    Speaker's Bio:

    Oleksii believes that evidence-based clinical decisions will greatly improve the efficiency and safety of the medicine. He received his Master degree in Clinical Embryology from University of Leeds (UK) and PhD in Cell Biology. The ultimate goal of his findings is to essentially transform medical records into medical knowledge.
  • What’s New in Data Protector v 10
    What’s New in Data Protector v 10 Paul Carapetis, Presales, Micro Focus Jul 17 2018 3:00 am UTC 60 mins
    In this age of extreme data growth and variety, ever more stringent regulations, complicated hybrid environments including physical, virtual and cloud, and reducing IT budgets, Micro Focus has released version 10 of its Data Protector platform, part of the Micro Focus Data Protection Suite.  In this webcast attendees will learn how they can better protect their applications across legacy and modern platforms, use analytics to track and manage SLAs and improve the security of their backup to mitigate the risk of cyberattacks when they upgrade to Data Protector 10.  A live demo of the new features will be shown should time permit.
  • Encryption – An Important Pillar of Data Security Strategy
    Encryption – An Important Pillar of Data Security Strategy Rahul Kumar, Country Manager, India, SAARC Jul 17 2018 6:00 am UTC 30 mins
    How do you prevent the loss of secure or confidential information of your organisation to an untrusted environment or user?
    Have you met various regulatory requirements regarding financial, health or personal Identifiable Information to avoid risk of massive fines if a breach occurs?
    Join Rahul Kumar, Country Manager India, WinMagic, for a 30 min webinar and ask him why Encryption should be an important pillar of your data security strategy.
  • The Future of Banking
    The Future of Banking Vincent Fokke, CTO FS Benelux, Capgemini Jul 17 2018 7:00 am UTC 45 mins
    The world is changing and whilst you're reading this; the speed of change is increasing even further. What this leads to no one knows - the future of financial services could be "anxious and challenging" or "brilliant and full of opportunities".

    Will customer centricity still be the mindset? What about “AI-first”? Or will we jump into the next phase of life?

    In this session, Vincent Fokke, CTO FS Benelux, Capgemini, will walk you through the future of banking touching on key themes including;

    * AI First as starting point
    * Branch “office" or not…
    * PLC V4.0

    Join this session and start tomorrow's conversation today.
  • [Hebrew session] Is your Office 365 data protected?
    [Hebrew session] Is your Office 365 data protected? Guy Noy, Systems Engineer Jul 17 2018 7:30 am UTC 60 mins
    SaaS applications like Microsoft® Office 365® are wildly popular, and adoption across enterprises continues to grow, but so do the hidden threats lying within these offerings, such as:

    • Accidental data exposure with SharePoint®
    • Uncontrolled use of personal OneDrive® accounts
    • Data security violations in Exchange

    Yes, even trusted SaaS applications like Office 365 can increase your risk of breaches and noncompliance.

    Our Security Operating Platform can help. Sign up for our webinar and learn what you need to meet your CASB needs as well as secure your cloud-based data against malware and accidental exposure.

    You’ll also find out how to achieve complete visibility and reporting, data classification, and fine-grained enforcement across users, folders and file activities to protect your business-critical data in Office 365.
  • DigiDevTransOps - Clearing the Confusion in Digital Transformation & DevOps
    DigiDevTransOps - Clearing the Confusion in Digital Transformation & DevOps Mark Smalley, the IT Paradigmologist and DASA Global Ambassador Jul 17 2018 8:00 am UTC 45 mins
    The title is a cynical reference to the hype around Digital Transformation and DevOps. There’s a lot of confusion and you may be wondering what the terms actually mean and what the relationship is between the two. If we look closer, we’ll see that DevOps has much to support Digital Transformation, but that it’s only one of the pieces in the Digital Transformation jigsaw puzzle.

    Mark Smalley, Global Ambassador DASA
  • The return to growth in Financial Services - Opportunities and Getting it Right
    The return to growth in Financial Services - Opportunities and Getting it Right Ben Matthews, Partner, Baringa Partners Jul 17 2018 8:00 am UTC 60 mins
    The last time the banks were investing the world was a very different place. Prior to 2008 social media was still nascent, there were no bitcoins and there was no ‘Fintech’… the first generation iPhone had only just been released.

    However despite many of these advances and the emergence of new technologies, social and financial inclusion and mobility are arguably at their lowest point and the divide between the richest and poorest is bigger than ever’.

    In this session we explore some of the big trends of 2018 and how Financial Services has the chance to really transform if the right investments are made.

    Ben Matthews
    Ben is a Partner in Baringa’s Banking practice with over 20 years experience in financial services. Ben leads Baringa’s Global Transaction Banking and Payments business and specialises in helping clients to optimise their operating model in the face of new competition and continued regulatory scrutiny and in shaping and delivering the required business transformation.

    Recently Ben has been supporting several Fintechs in the development of their propositions, working on proofs of concepts in Blockchain/DLT and helping banks to make the most from the PSD2/ Openbanking opportunity.
  • Jupiter Asset Management: Ariel Bezalel - Jupiter Strategic Bond Fund
    Jupiter Asset Management: Ariel Bezalel - Jupiter Strategic Bond Fund Ariel Bezalel Jul 17 2018 8:30 am UTC 60 mins
    Ariel Bezalel, Head of Strategy, Fixed Income, provides his latest quarterly update.

    Ariel Bezalel started his career at Jupiter and has been a member of the Fixed Income team since 1998 and a fund manager since 2000. He is currently Head of Strategy, Fixed Income.
  • The Biggest Cloud Security Threats are Self-Inflicted
    The Biggest Cloud Security Threats are Self-Inflicted Ryan Holland, Senior Director of Cloud Architecture, Alert Logic Jul 17 2018 9:00 am UTC 60 mins
    We are witnessing a vast wave of data breaches across the globe – these breaches are fruits of sophisticated cyber criminals, but also of the complexity that plagues IT security. Businesses are told to cover the basics of cybersecurity, but even the basics can be complex. The attack surface is larger than ever before, companies are being offered different security tools, new policies are being introduced and all of this has led to a gap that today’s cyber criminals are exploiting.

    Join Ryan Holland, Alert Logic’s Senior Director of Cloud Architecture, as he shares best practices for reducing the negative impact of IT sprawl, security sprawl and the ever-evolving attack surface.

    Highlights include:
    - Cloud security threats
    - The importance of understanding your cloud attack surface
    - Cyber breaches & vulnerabilities – real-life examples
    - CSP security services
    - Security sprawl – what you don’t know can hurt you

    This impactful webinar will help you to understand what key strategies you can adopt to increase security, manage risk and be compliant.
  • Keynote Panel: DevOps & Digital Transformation - How to Overcome Challenges
    Keynote Panel: DevOps & Digital Transformation - How to Overcome Challenges Prakash Vyas (Splunk), James Finister (TCS), Rob Akershoek (Shell), Dimitri van den Broek & Barclay Rae (Essential SM) Jul 17 2018 9:00 am UTC 60 mins
    Businesses are being forced to move at a higher speed than ever before, but the challenges are coming thick and fast - namely facing new competition, cost pressures, skills gaps, monitoring and metrics, and understanding and adhering to evolving standards for innovation, quality and reliability. These challenges make Digital Transformation a tricky game to win.

    In this session, our panel of experts will discuss how DevOps can make digital transformation easier and help you;

    * Deliver business value
    * Boost bottom lines
    * Give the best customer experience

    Join the discussion on and level-up your DevOps game!

    Panellists;
    Rob Akershoek, Solution Architect, Shell
    Prakash Vyas, ITOA Specialist EMEA, Splunk
    James Finister, Global ITSM Strategist, Tata Consultancy Services
    Dimitri van den Broek, EVP, Strategic Alliances & Co-Founder, ITpreneurs

    Moderated by Barclay Rae, ITSMf Board Member and Director, Essential SM
  • Right Shift, Left Shift, No Shift: How Not to Lose Your Job in a DevOps/CD World
    Right Shift, Left Shift, No Shift: How Not to Lose Your Job in a DevOps/CD World Scott Willson - Product Marketing Director, Release Automation at CA Technologies Jul 17 2018 9:00 am UTC 45 mins
    "You think you understand the situation, but what you don't understand is that the situation just changed."
    - Putnam Investments advertisement

    In today's digital economy there's a lot of communication about how companies will become obsolete and close their doors if they don't adapt and change. It turns out this is true for IT professionals as well. 

    For over two decades, IT Operations has mostly stayed the same. Professionals would rack and stack servers, physically wire networks and configure firewalls, and run a script here and there to address a service ticket. This world is dramatically changing! The world of server computing has evolved so that physically tinkering with hardware is quickly approaching obsolescence. The trend that has been growing and the technical direction that makes the most sense when describing and dealing with cloud resources is code. 

    In this webinar, we discuss the skills and thinking that will be necessary to keep your job as companies, methodologies, and best practices all shift left. We aim to help you make a smart transition. No IT professional need to lose their job if they're willing to adapt and to learn.
  • AI and the new Cyber Battlefield
    AI and the new Cyber Battlefield Simon Bryden, Consulting Systems Engineer, Fortinet Jul 17 2018 9:00 am UTC 45 mins
    As the scale and complexity of cyber attacks grows faster than ever, new ways must be explored to fight back.

    Using machines to perform tasks such as malware analysis and real-time anomaly detection means a faster time to protection, frees up analyst time for more advanced research, and marks a big step forward in the battle against cyber crime.

    This session discusses how you can leverage machine learning and other artificial intelligence techniques to enhance and extend your existing detection methods.
  • FP Argonaut Absolute Return Fund Q2 2018 Update
    FP Argonaut Absolute Return Fund Q2 2018 Update Barry Norris Jul 17 2018 10:00 am UTC 60 mins
    During the webcast, Barry will talk about activity during the quarter, as well as discussing current fund positioning and the outlook for markets.
  • WEBCAST: Trust me I'm an Insurer? Re-designing insurance for tomorrow's customer
    WEBCAST: Trust me I'm an Insurer? Re-designing insurance for tomorrow's customer Simon Hardie, MagnaCarta, Kate Astall, Zurich, Heidi Hogalmen, Cloud Insurance Jul 17 2018 10:00 am UTC 45 mins
    A global panel of insurance incumbents and innovators discuss the rise of insurtech and how the insurance market is adapting to the drive for digital and responding to changing consumer demands.
  • Opportunity Costs: Hawksmoor Funds Q2 Update
    Opportunity Costs: Hawksmoor Funds Q2 Update Daniel Lockyer & Ben Conway Jul 17 2018 10:00 am UTC 45 mins
    Join us for the latest of our BrightTalk updates on the Hawksmoor Vanbrugh and Distribution Funds.

    In this webinar, our Fund Managers will:
    ▪discuss the best investment opportunities and their associated costs
    ▪explain the rise in the Funds' OCFs due to the new PRIIPs legislation
    ▪review how performance over the past quarter builds on our Funds' strong long-term records
    ▪highlight the major activity within the portfolios

    The webinar will run for approximately 20 minutes with another 10 minutes allocated for Q&A.

    Questions can be submitted live to the Fund Managers on the day.

    This webinar qualifies for 30 minutes CPD.
  • Maximising SoC Effectiveness With Advanced Threat Intelligence
    Maximising SoC Effectiveness With Advanced Threat Intelligence Amar Singh Jul 17 2018 10:00 am UTC 60 mins
    Running a security operations is not a simple undertaking. It takes skilled staff, technology, processes and procedures and loads of practice. In addition, actionable contextual threat intelligence is key when it comes to ensuring the SoC and its teams are affective in early detection of attacks.

    The key word here is EARLY detection. Join Amar Singh and his special panelists as they discuss some of the key pillars of threat intelligence and how to make them work in any SoC environment.
  • Onboarding: How to Turn an A-Player into a B-player in Under 4 Weeks
    Onboarding: How to Turn an A-Player into a B-player in Under 4 Weeks Marcus Cauchi, ISM Fellow Jul 17 2018 10:00 am UTC 60 mins
    You’ve just hired James Bond on to your sales team and you have high hopes for his performance. Assuming you really did hire James Bond and not Mr Bean in a Tux, what can you do to ensure disappointment?

    Why! Fail to do a proper onboarding process! Delude yourself into thinking you hired an adult, a professional, someone who can be depended on to hit the ground running. “John is a big boy and doesn’t want me crowding him. I’ll let him get on with it.”

    This is called management by abdication and is one of the cardinal sins of sales management.

    Onboarding is the lost element of successful recruitment. The best sales managers have a 120 day onboarding plan for new hires. Why 120 days? Because that is the probation period a new hire is typically putting you (their manager, the job they actually bought, the company and the other people on the team) on in case they believe they have made a bad choice of career move.

    You’ve invested time and money in attracting them, selecting them, offering them, legal & HR costs, managing their notice period, paying them, training them and you risk blowing your winnings because you’re too busy, too stupid or too lazy to finish the job you started!

    Onboarding is not about giving them an Ops & Employee Manual to read, giving them some product training and provisioning them with passwords, a laptop and a phone. Those are the tiniest part of a good onboarding process. Onboarding should set up a new hire for success. It should be structured and confirm that you have made the right hire. It should tell you quickly if you haven’t so you can hire slow and fire fast.

    A reliable onboarding process needs to cover 3 things:

    * What do they need to know?
    * By when do they need to know it?
    * Where can they find it?