Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Upgrading & Migrating to WS 2019 and Intel Select Solutions with Azure Stack HCI
    Upgrading & Migrating to WS 2019 and Intel Select Solutions with Azure Stack HCI
    DataON, Microsoft, Intel, Florida Poly Live 60 mins
    With the release of Windows Server 2019 in October 2018 many customers are looking to take advantage of new features in hybrid cloud, security, storage, failover clustering, and the application platform. Upgrading and migrating to Windows Server 2019 can be a relatively easy process but there are things you need to do to ensure that you don’t run into any problems or lose any data.

    Intel developed Intel® Select Solutions to simplify and accelerate the process of evaluating, selecting, and deploying hardware with today’s workloads. They are vigorously benchmark-tested to ensure smooth deployments and optimal performance. Intel® Select Solutions for Azure Stack HCI are designed to help customers quickly realize on-premises Microsoft HCI and utilize cloud services powered by Microsoft Azure.

    Florida Polytechnic University is a public university that deployed a Microsoft & DataON HCI for its disaster recovery site, then expanded its cluster and upgraded from Windows Server 2016 to 2019.

    The webcast will explore the following topics:

    • How to successfully plan for an upgrade and migration to Windows Server 2019

    • What are Intel Select Solutions and how it simplifies deploying solutions for Azure Stack HCI

    • How Florida Poly successfully added a third node to its cluster and upgraded from Windows Server 2016 to 2019.

    Presented by:

    DataON – Howard Lo, Vice President of Sales & Marketing

    Microsoft – Rob Hindman, Senior Program Director of Windows Server

    Intel Corporation – Balaji Iyer, Solutions Strategist

    Florida Polytechnic University – Bill Webster, Assistant Director of Administrative Computing
  • 3 Tips for Maximizing the Business Value of ITIL and ITSM
    3 Tips for Maximizing the Business Value of ITIL and ITSM
    George Spaulding of Pink Elephant and Matt Klassen of Cherwell Software Live 63 mins
    Value may be overused word, but there is no escaping the reality that IT is faced with pressure to deliver more of it with each passing day. So how can you take what some would make you believe is a legacy framework like ITIL and a commodity technology like ITSM and extract maximum value?

    Join us for this relevant and compelling webinar in which George Spalding, VP at PinkElephant and Matt Klassen, VP at Cherwell Software, will unpack the key challenges IT faces today such as self-service, accelerating pace of change, AI and automation technology, Agile and devops practices, and more. They will show you which value levers have the most effect and give you 3 practical tips you can use today in your organization to impact the business in a real way.
  • Leveraging Machine Learning and AI in R&D, Engineering and Science
    Leveraging Machine Learning and AI in R&D, Engineering and Science
    Wayne Levin, President & CEO | Farhan Mansoor, Software Engineer, Predictum Live 60 mins
    In this webinar, we will give an overview of advanced capabilities for addressing the operational challenges faced by engineers, scientists, and researchers with the increased use of machine learning and artificial intelligence.

    We will highlight some of the activities involved in leveraging machine learning and artificial intelligence in a developing a comprehensive solution:

    - Data ingestion process for collecting and identifying relevant data to fuel machine learning algorithms
    - Using semi-automated features to speed up the model construction process
    - How the resulting robust models can be optionally integrated with a virtual laboratory system

    Using a virtual laboratory system as part of an integrated solution powered by machine learning increases R&D productivity, ensures maximum benefit from lab resources, and helps to manage common business problems, such as mitigating risk associated with the cost and availability of raw materials.

    Who should attend:
    - Engineers, scientists and other analysts who are interested in extending their use of machine learning and artificial intelligence
    - Managers who are looking to accelerate productivity and innovation of scientists and engineers in their teams

    Join BrightTALK's LinkedIn Group for BI & Analytics!
    - http://bit.ly/BrightTALKBI
  • Excipio DR Rehersal
    Excipio DR Rehersal
    Jeff Recorded: Aug 21 2019 60 mins
  • Gaining Complete Visibility of Your Environment with Attack Surface Monitoring
    Gaining Complete Visibility of Your Environment with Attack Surface Monitoring
    Tori Sitcawich, Product Marketing Manager; Jon Hart, Principal Security Researcher Recorded: Aug 21 2019 56 mins
    Join Rapid7 experts for an in-depth look into Attack Surface Monitoring with Rapid7s Project Sonar research and industry reports. Learn how data from these sources can be leveraged in Rapid7s industry-leading vulnerability management solution, InsightVM, to provide complete visibility into your environment.

    During this webinar, youll learn about:

    1. The importance of having complete visibility of both your organizations known and unknown assets
    2. Rapid7s unique research project, Project Sonar, that regularly catalogs the public internet
    3. Industry reports released by Rapid7 based on data from Project Sonar, among other sources
    4. How data from Project Sonar can be leveraged within Rapid7s industry-leading vulnerability management tool, InsightVM
  • Modernize Your SAP Environment with Red Hat and AWS
    Modernize Your SAP Environment with Red Hat and AWS
    Sherry Yu, Principal Partner Success Architect, SAP, Red Hat and Sabari Radhakrishnan, Principal Solution Architect, AWS Recorded: Aug 21 2019 55 mins
    Organizations can no longer delay serious consideration of modernizing their data centers. Among those are many SAP customers who will be required to migrate to SAP HANAⓇ by 2025.

    In this webinar, learn about the benefits of modernizing your data center with the premier partners for SAP HANA, Red Hat and Amazon Web Services (AWS).

    We’ll examine:

    • How AWS and Red Hat can accelerate your journey to SAP S4/HANA.
    • Technical considerations and best practices for SAP HANA and cloud migration.
    • Benefits of scalable, on-demand, elastic infrastructure with enterprise support.
  • 4 Keys to Improving Agent Satisfaction
    4 Keys to Improving Agent Satisfaction
    Chris Hanna (Evolving Management); Gayathri "G3" Krishnamurthy (NICE inContact); Fancy Mills (moderator) Recorded: Aug 21 2019 60 mins
    Customer satisfaction has long been a top priority for the contact center, but in today’s competitive job market, agent satisfaction is a growing concern for leaders. In a traditionally high-stress, high-turnover industry, every leader wants to know the secret to agent happiness. There’s no magic bullet, but based on brand new ICMI research, we’ve identified four keys to improving the employee experience in the contact center. What do the most engaged employees have in common, what are the top drivers of dissatisfaction, and how might this new insight help your team improve morale and performance, all while boosting CSAT? Join us on August 21 for an eye-opening discussion!

    During this webinar, you will learn:

    - What the most satisfied contact center agents have in common

    - What new ICMI research reveals about top drivers of agent dissatisfaction

    - How you can better align your people, processes, strategy, and technology to improve both the employee and customer experience

    Join us for an interactive and informative hour, filled with practical tips, and complete with live audience Q&A.
  • Office 365 Man-in-the-Middle Attack Demo
    Office 365 Man-in-the-Middle Attack Demo
    Ryan O'Boyle Recorded: Aug 21 2019 19 mins
    Trick a user into entering creds into our fake O365 login page. Make Microsoft send a passcode to the user’s phone
    User enters their passcode on OUR fake page. Hijack the user’s session token.Gain access to SharePoint Online environment
    Exfiltrate data from O365. Pivot to on-prem and steal CEO’s emails
  • The Dangers of Siloed Security
    The Dangers of Siloed Security
    Ken Dang, Senior Product Marketing Manager, SonicWall Recorded: Aug 21 2019 49 mins
    Complete security. One viewpoint.

    A splintered security platform opens threat gaps and adds overhead costs and complexity.. See how you can unify, monitor and manage all your security ecosystem with the Capture Security Center.
  • Personal Brand > Company Brand:  4 Ways to Use your Personal Brand to Get Leads
    Personal Brand > Company Brand: 4 Ways to Use your Personal Brand to Get Leads
    Joe Matar, Director of Marketing at Brazen Recorded: Aug 21 2019 49 mins
    Trust in companies is at an all time low. Yet trust is the only way to start a conversation, build a relationship, and close that next big deal with a buyer. Add in the fact that buyers are fickle and bombarded with messages all day long, it is nearly impossible to break through the noise. But breaking through the noise is possible, it just takes patience, grit, and an investment in your personal brand. Why? People trust people, not companies. In this short webinar, Joe Matar will walk through his proven method for building a personal brand. He’ll talk about his video, newsletter, social, and content strategy and share actual examples that have helped him get featured as Skaled Consultings top B2B social marketers next to greats like Dave Gerhardt, VP of Marketing at Drift, and Ryan Bonnici, CMO at G2.

    Presenter Bio: Joe Matar is the host of the popular TA video series, Talent Acquisition Talks, as well as the co-host of the only podcast, Chief People Officers On The Rise, that gives Chief Talent/People Officers a platform to share advice on how to build a successful and fulfilling career in TA. Joe is a a passionate marketer at Brazen, which is a conversational recruiting platform.
  • Fuel your digital transformation with a cloud-based Customer Identity solution
    Fuel your digital transformation with a cloud-based Customer Identity solution
    Richard Chetwynd & Martin Day Recorded: Aug 21 2019 51 mins
    Delivering a secure and elegant customer experience is more critical than ever for businesses who want to seamlessly engage with their customers. And for many organizations, Customer Identity and Access Management (CIAM) is an important first step in engaging customers and reinforcing the company’s brand, while keeping customer data secure.

    Learn about cloud-based CIAM and why organizations are looking to migrate their legacy or homegrown solution to the cloud. In this webinar, Richard Chetwynd, OneLogin Product Manager, and Martin Day, Solution Architect, will discuss:

    - Why and when your organization should move away from managing user identities in-house
    - How to overcome the barriers when it comes to moving CIAM to the Cloud
    - Key CIAM capabilities to look for when evaluating solutions
  • How AI and Machine Learning Unlock Unstructured data for Enterprise Automation
    How AI and Machine Learning Unlock Unstructured data for Enterprise Automation
    Manish Rai, VP Product Marketing, Automation Anywhere Recorded: Aug 21 2019 49 mins
    While nowadays robotics process automation (RPA) is a leading technology in enterprise automation, it operates with structured data according to well-defined rules.

    However, 80% of enterprise data is unstructured and many complex business processes involve cognitive decision making.

    Learn how AI and Machine Learning help to automate such processes by leveraging AI to bring structure to unstructured data and machine learning models to make an intelligent decision.
  • The State of IT Resilience 2019 Webinar
    The State of IT Resilience 2019 Webinar
    Jayme Williams, Tencate Recorded: Aug 21 2019 60 mins
    2019 Results are in: 84% weren’t IT resilient enough

    The 2019 IDC State of IT Resilience study found that a whopping 84% of respondents experienced a malicious attack in the past 12 months. Of those organizations who suffered a successful attack, 93%of those attacks resulted in data corruption or loss. Do you know how much a malicious IT attack would cost you?

    Find out how to make your organization IT resilient. Remove the risk of disruption and data loss, which can jeopardize customer loyalty, company reputation, productivity and employee morale. With the average cost of downtime at $250,000 an hour across industries, implementing an IT Resilience strategy is necessary not just to survive, but to go beyond your competitors and thrive.

    Join us to learn more about the 2019 results. Hear Jayme Williams from Tencate discuss how IT resilience is keeping their multi-national advanced-manufacturing operations running 24/7, and the threat of ransomware a non-issue.
  • Ep. 5: Never Alone On Call
    Ep. 5: Never Alone On Call
    Emily Nakashima, Director of Engineering; Ben Hartshorne, Engineer; Alyson van Hardenberg, Engineer Recorded: Aug 21 2019 45 mins
    Switch from deep query to a trace waterfall view and spot outliers with Honeycomb BubbleUp heat-maps - these make debugging effortless and dare we say fun? The Observability that Honeycomb brings literally shifts a Dev team from guessing what the problem may be to knowing exactly how their complex prod is behaving and where in the code the issue lies. Through the experience of all users, dev teams learn faster when they work together and have the same visibility, down to the raw event. We affectionately call it See Prod in Hi-Res.

    In Honeycomb, achieve Team Collaboration through shared charts and boards, and follow the breadcrumbs from your teammates' experiences. With Query History, everyone sees results and can tag according to what’s interesting. It’s organized, intuitive, and easy to follow. Incident response and on-call run much more smoothly when everyone is virtually on-call with you.

    In this webinar, we’ll discuss and show how:

    * Honeycomb's Query History gives rich meaningful context
    * Honeycomb’ers dogfood and learn from each others' compound wisdom
    * Benefits span engineering cycles and use-cases when debugging and maintaining
    * To build a culture of observability and why you should do it now
  • Don't Just Detect - Protect (Bromium Customer Panel)
    Don't Just Detect - Protect (Bromium Customer Panel)
    Paul Hershberger, Tyler Timek, and Kimberly Becan Recorded: Aug 21 2019 56 mins
    Join Bromium customers CISO, Paul Hershberger, and Security Analyst, Tyler Timek as they takes us on their journey to add isolation to their endpoint security stack. Detection alone cannot combat modern malware as it continues to circumvent even the most advanced enterprise perimeter and endpoint security tools. Learn how security leaders are protected against ransomware, polymorphic malware, and threats that lurk inside email attachments, phishing links, file downloads and malicious websites.
  • Getting to Yes: How to Justify your Network Packet Broker Purchase
    Getting to Yes: How to Justify your Network Packet Broker Purchase
    Zeus Kerravala, Principal Analyst at ZK Research & Gordon Beith, Sr. Product Marketing Director, Gigamon Recorded: Aug 21 2019 57 mins
    “Is it worth it?” is a question you must overcome when purchasing new equipment. Fortunately, when it comes to next-generation network packet brokers (NG-NPBs), getting to Yes is easier than you think.

    The latest data from ZK Research shows that next-generation NPBs have grown from simply a nice-to-have to a must-have technology, making it easy to green light your purchase:

    •Winning organizations deploy next-generation NPBs for a faster, more agile infrastructure with fewer disruptions during updates
    •Enables faster transition to hybrid, multi-cloud model without ever losing out on management and security
    •Eliminates blind spots, so fewer security tools are needed

    Arm yourself with the right information to justify your next-generation NPB purchase before you fall into the widening gap between winners and losers. You – and your infrastructure – deserve it.
  • Simplify Test Data Management for SAP
    Simplify Test Data Management for SAP
    Andreas Günther, Director of TDM Consulting, Anthem Recorded: Aug 21 2019 50 mins
    Finding relevant test data is one of the great pains of testing, and GDPR’s restriction on testing with unmasked production data makes a difficult situation even worse. Once you finally receive (or create) appropriate test data, you still have to inject it into the testing framework and transform it across end-to-end tests.

    The complexities of secure, stateful TDM are further exacerbated in SAP environments, where business processes may cross SAP GUI and SAP Fiori, mainframes, and other packaged apps such as Salesforce— and test data may be scattered across Word files, Excel files, databases, flat files, and SAP systems.

    Join this webinar to learn strategies for simplifying test data management across end-to-end tests that involve SAP. You’ll learn:

    - How to choose the best test data approach (synthetic, masked…) for each task
    - Strategies for managing stateful data across end-to-end tests
    - Options for extracting and masking data from SAP environments such as SAP S/4HANA, SAP NetWeaver, and even SAP BW/4 HANA
  • Tradeshift Buy Deminar
    Tradeshift Buy Deminar
    Charles Kalajian & Patrick Massar Recorded: Aug 21 2019 50 mins
    Striving for system efficiency is a common goal. We want our platforms to perform exactly how we expect and then some. Introducing Tradeshift Buy.

    Tune in for an exclusive demonstration of Tradeshift Buy where you’ll learn how to:

    • Manage your marketplace offerings in a central place, with custom pricing and options for each buyer or marketplace.
    • Aggregate offers from your sellers or marketplace, controlled and managed to the enterprise’s needs
    • Give everyone in your organization the power to buy what they need, for any kind of spend, across any marketplace
    • See and control all spend, with intelligent recommendations for optimizing your cost structure.
    • Connect any number of sellers and buyers, based on your brand and your T&Cs, with full access control
  • Towards Autonomous Fine-Grained Network Management
    Towards Autonomous Fine-Grained Network Management
    Dr. Kevin Tang Recorded: Aug 21 2019 32 mins
    The current Internet is largely a heterogeneous network in the sense that it is a network that is formed by many different networks owned by different identities. Its ability to work with vastly different technologies under very different circumstances in parallel certainly has brought crucial flexibility and incentives for its growth. On the other hand, its heterogeneity has also led to rigid and coarse management which makes Internet’s performance insufficient to support the fast growing traffic with increasingly stricter quality of service requirements. Today, with the rise of cloud computing and software-defined networking, it is now possible to move towards autonomous fine-grained network management. In this talk, we birefly examine opportunities that come from three different aspects: space (finer traffic split), time (faster network load balancing) and application (route different applications differently). We study both the idealized fine-grained network management, which sets a limit for the best possible outcome, and algorithms that take into account important practical factors to approach that limit. The talk ends with some example virtual network functions (VNFs) that can be built under fine-grained network management to further improve network performance
  • How to Integrate Virtualized Server Environments with NVMe AFAs
    How to Integrate Virtualized Server Environments with NVMe AFAs
    Matt Hebb, Product Marketing, Data Center Systems, Western Digital Recorded: Aug 21 2019 18 mins
    As you likely know, the reason companies deployed virtualization in the beginning was to get more out of their hardware – and make their lives a little easier – it is the very same reason they are deploying it today. As a result, virtualized servers are the defacto standard in today’s data centers. While, it’s true that virtualization lowers IT infrastructure costs and allows enterprises to respond to new business needs quickly, it also creates an additional layer of infrastructure complexity. Complexity that the IT team has to manage across both the ESX and storage array layer.

    We get it – it’s a double-edged sword. Virtualization is meant to lower costs and allow quicker response time, but when the infrastructure becomes complex, the resources required to manage it could increase and offset the savings you were hoping to achieve. Join us for this webinar where we’ll address how IT can more easily manage their virtual environment.

    In this webinar, we’ll introduce you to the IntelliFlash vCenter Plug-in and share how the product offers visibility into storage datastore, offers the ability to self-provision VMs, and provides a consistent snapshot of VM-level performance metrics. In addition to better understanding the IntelliFlash vCenter Plug-in, you will learn:
    >How to simplify your VMware administrative tasks
    >How to take full advantage of All-Flash Arrays to create and deploy denser, faster VMs
  • A Look into our Secure Internet Gateway
    A Look into our Secure Internet Gateway
    Jonny Noble, Technical Marketing Engineer – Cisco Umbrella Recorded: Aug 21 2019 68 mins
    Join us on for our webinar, A Look into Cisco Umbrella’s Secure Internet Gateway. This session will illustrate the benefits enabled by cloud-delivered security with practical examples. The following services will be reviewed: DNS-layer, intelligent proxy, full proxy, firewall as service, cloud access security brokerage service and roaming users coverage.

    Participants will also learn how Umbrella enables branch transformation, increases security posture with leading DNS-layer (added layer) protection, allows for secure XaaS adoption and supports customers' cloud-first strategies.
  • The Real-World Impact of Product Data on User Experience
    The Real-World Impact of Product Data on User Experience
    EIS Director of Delivery Jason Hein and Principal Taxonomist Chantal Schweitzer Recorded: Aug 21 2019 15 mins
    Product content will make or break your digital commerce user experience. But what does that really mean? In this 15-minute session our digital commerce experts use real world examples to:

    -- walk through the basics of content strategy
    -- illustrate how product content can be used to differentiate from competitors (for better or worse)
    -- show how various components of your “Product Rulebook” directly impact the users experience
  • Webisode 6: Proofpoint Demo - Advanced People-Centric Cybersecurity
    Webisode 6: Proofpoint Demo - Advanced People-Centric Cybersecurity
    Joel Sierra, Security Sales Engineer, Proofpoint Recorded: Aug 21 2019 38 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1. Gain deeper visibility into attacks and respond when things go wrong
    2. Solve for unified data protection
    3. Defend against email fraud and social media fraud
  • SOC as a Service – What you must know?
    SOC as a Service – What you must know?
    Senthil Palaniappan, CEO & Founder at Sennovate Inc. | Kumar K, Lead Solution Architect at Sennovate Inc. Recorded: Aug 21 2019 47 mins
    Running SoC on-premise is highly complex and expensive. This calls for expertise (for example -Firewall, DNS, Network analyst, Active Directory Domain, IAM), and well preparedness to handle unique situations. This is key in protecting any organization's digital assets. It becomes imperative for starter companies to build the credibility success factor to stay competitive as against large enterprises. This raises the question of how you would leverage various security products, to build a true Security Operations Center (SoC) yet delivered as a Service.

    Register for this webinar and you will learn about:
    > SoC as a Service, and its Importance
    > Key Components of SoC - Asset Discovery, Threat detection, Vulnerability Assessment, Behavioral Monitoring
    > Rapid Incident Response & Event Investigation
    > Better Risk & Compliance Management
    > Role of AI/ML to simplify the process
    > Choosing SoC as a Service vs Build your own SoC
    > Things to consider while choosing SoC as a Service provider

    About the speakers:

    Senthil Palaniappan, CEO & Founder at Sennovate Inc.
    - Over 25 Years of Industry Experience in Information technology
    - Specializes in Information Security, Identity and Access Management, Infrastructure and Integration
    - Consulted with various fortune companies

    Kumar K, Lead Solution Architect at Sennovate Inc.
    - Over 18 years of industry experience
    - Specializes in various Identity and Access Management products including oracle and various cloud products
    - Vast experience in building custom solutions with Oracle Access Manager.
  • ISSA Thought Leadership Series: Paving the Way to a Passwordless Future
    ISSA Thought Leadership Series: Paving the Way to a Passwordless Future
    ISSA International Recorded: Aug 21 2019 64 mins
    It is increasingly apparent that authenticating only with username and password is no longer sufficient as stolen passwords are responsible for 81% of data breaches. And even though many organizations have implemented multi-factor authentication (MFA) through mobile push, or One Time Passwords (OTP) via SMS and mobile apps, these authentication techniques have been shown to be vulnerable to account takeovers.

    Attend this webinar to learn:

    * How WebAuthn, the new web authentication standard, is paving the way for a highly secure passwordless future
    * The key benefits of passwordless login for your employees, partners, and customers
    * Best practices for enterprise authentication

    Abby Guha, Senior Director, Product Marketing, Yubico
  • Connect SaaS to SD-WAN: Optimize your WAN for the Cloud
    Connect SaaS to SD-WAN: Optimize your WAN for the Cloud
    Irwin Lazar of Nemertes Research, top Unified Communications expert Aug 21 2019 8:00 pm UTC 47 mins
    What SD-WAN means for SaaS and UCaaS. How to provide a breakout at the branch and how to overcome global delivery challenge of real-time communications
  • AI & Machine Learning in Real Life
    AI & Machine Learning in Real Life
    Salil Amonkar, Global Head AI for Manufacturing & Retail, Pluto7 Aug 21 2019 9:00 pm UTC 45 mins
    In this session we will cover key take away and lessons learnt from practical deployment of Ai and ML solutions in actual enterprise settings. Participants can use these learning to incorporate in their own organizations to ensure success of Ai and ML initiatives.

    Join BrightTALK's LinkedIn Group for BI & Analytics!
    - http://bit.ly/BrightTALKBI
  • AI and Machine Learning in Action
    AI and Machine Learning in Action
    Dr. Umesh R Hodeghatta Aug 21 2019 10:00 pm UTC 45 mins
    AI and Machine Learning have started creating impressions on the life of the industry and people due to the strides the underlying technology has taken because of the active research in this field. On the one side, no doubt there is some hype as to its capabilities and on the other side, there are many things we can do using AI and Machine Learning if we have proper data, inquisitiveness and perseverance. AI and Machine Learning has started percolating across many of the spheres of industrial life as well as human life and started promising many useful applications.

    In this session, Dr. Umesh R Hodeghatta will be talking about the areas where the AI and Machine Learning is used significantly, how it is contributing to the society and industry as well as the applications which will be promising for a better future. Further, we will also lead you through an interesting classification problem from the beginning to the end to show you the AI and Machine Learning algorithm in Action!

    Join BrightTALK's LinkedIn Group for BI & Analytics!
    - http://bit.ly/BrightTALKBI
  • An AI Experience Playbook for Enterprise IT
    An AI Experience Playbook for Enterprise IT
    MuckAI Girish, CEO, Muck.AI | Muddu Sudhakar Entrepreneur & Executive Aug 21 2019 11:00 pm UTC 60 mins
    Applying AI in business has limitless potential. More and more organizations are implementing AI solutions to improve their core business functions. AI is not only revolutionary for end-user experience but also drives productivity and efficiency through automation and cost-savings.

    How do you leverage AI to streamline your core Enterprise IT organization?

    In this webinar, AI experts Muckai and Sudhakar break down the need for curated historical data, the pros and cons of specific Enterprise IT/Cloud Challenges, and the necessary AI-native solutions. The webinar will provide examples powerful enough to attain the ultimate goal for personalization, automation, prediction, cost savings and improve experience.

    Three takeaways planned for the session are:

    •Discover how AI will make up 80% of user daily interactions
    •Learn how AI delivers automated, human-like service experiences that empower users to self-solve problems
    •How AI can be leveraged for your enterprise organization

    Join BrightTALK's LinkedIn Group for BI & Analytics!
    - http://bit.ly/BrightTALKBI
  • Application Awareness with the Power to Take Action
    Application Awareness with the Power to Take Action
    David Davis, Partner & Vexpert, ActualTech Media and Bassam Khan, VP, Product & Technical Marketing Engineering, Gigamon Aug 22 2019 1:00 am UTC 54 mins
    Managing and securing a network can feel like a lot like navigating a ship in a turbulent storm at night. You might hear thunder and see lightning, but you never really know when or from where the next threat is coming.

    What if you could permanently illuminate the best path forward? Better visibility will help you uncover hidden threats in your network traffic and prevent waves of duplicate or irrelevant data from overwhelming your analytics and security tools.

    Join Gigamon and ActualTech Media in this webinar and learn how to:
    - Unleash visibility to secure and optimize your network
    - Discover applications that you didn’t even know were running on your network
    - Increase overall performance of your network and shared components
    - Spot potential security vulnerabilities before they become a problem

    Join Gigamon and ActualTech Media in this webinar to learn how to discover applications that you didn’t even know were running on your network.

    Watch as we share insight and demonstrate live how to increase overall performance as well as spot potential security vulnerabilities before they become a problem.
  • Akamai’s latest Melbourne scrubbing centre and Prolexic enhancements
    Akamai’s latest Melbourne scrubbing centre and Prolexic enhancements
    Jason Hatch, Senior Director Product Management, Security and Performance, Asia Pacific & Japan, Akamai Aug 22 2019 2:30 am UTC 30 mins
    On February 2018, GitHub survived the largest DDoS attack ever recorded with Akamai Prolexic. Today, Akamai continues to invest in its DDoS mitigation capacity and capabilities with the launch of its newest scrubbing centre in Melbourne, Australia. Launched in August 2019, this will become an integral part of the Prolexic DDoS mitigation platform that will now have 19 scrubbing centres deployed globally.

    Join us on 22 Aug, 12:30PM Sydney time to learn:

    - What this means to Prolexic customers
    - Why it is better to protect your data center from DDoS attacks at the Edge
    - How zero-second mitigation SLA is achieved
    - Upcoming innovations to increase platform flexibility and simplify overhead
  • Reimagine Data Governance: Data Governance. Meet Data Security.
    Reimagine Data Governance: Data Governance. Meet Data Security.
    Andy Joss, Head of Solutions & Data Governance, Steve Holyer, Solutions Specialist, Informatica Aug 22 2019 4:30 am UTC 58 mins
    With organizations collecting an ever-increasing volume of data, the risk of a data breach or falling foul of a regulator is also increasing. Data security, privacy and protection is fast becoming a “must have” requirement within many data programs.

    Organizations are starting to realize that there are potentially great synergies in having a much closer understanding of their data from both a governance and security viewpoint. Add in Artificial Intelligence and automation for remediation, together these capabilities are proving to be significant allies in the continuous battle of cyber-security and enabling Data Governance programs.

    This webinar explores how these two worlds can now better understand the role that each has to play, in supporting and protecting their organization.

    As part of the Reimagine Data Governance series of webinars, Informatica will demonstrate how having a closer relationship between the worlds of governance and security can enhance existing data use and data security capabilities. And how you, in taking that holistic approach, can provide governed and protected data to achieve key business outcomes.
  • Moving Beyond SIEM
    Moving Beyond SIEM
    Shashwath Hegde, Solutions Architect, APAC Aug 22 2019 5:00 am UTC 40 mins
    The overall objective of the SOC is stop or reduce the impact of cyber-attacks and this objective is lost in the midst of a cloud of confusing claims and statements about a SIEM. Although, a SIEM is central to SOC operations, a mechanical approach in its adoption has failed to provide any real value.

    Join Shashwath Hegde, Solution Architect, for this webinar, as he discusses a shift in mindset in thinking beyond a SIEM and adopting a platform approach and cite practical examples from the field that helps stop the bad guys.
  • Learn How To Align Your Security with Business Outcomes
    Learn How To Align Your Security with Business Outcomes
    Jeff Pollard, VP & Principal Analyst, Forrester Research and Girish Bhat, Director, Product Marketing, Splunk Inc. Aug 22 2019 5:00 am UTC 54 mins
    Security is now becoming a top priority for businesses worldwide, driven by the challenges posed by digital disruption and the continuously expanding threat landscape. Well architected security is regarded as a strategic advantage and security executives are adopting risk and operational driven metrics to communicate and gain mindshare with corporate boards.

    However, aligning security with business outcomes while handling corporate velocity, key innovations, the skills shortage and budgets is still a work in progress. There has been a dearth of guidance on tools and techniques to develop strategies to align security with corporate and business goals.

    Join this thought leadership Splunk webinar, featuring Forrester, to hear from guest speaker Jeff Pollard, VP and Principal Analyst at Forrester Research and Splunk’s Girish Bhat to understand:

    •How to talk to your board about security
    •How aligning security has helped businesses
    •Forrester’s CISO Strategic Canvas
    •How to apply lessons learned to your own organization
  • Kristin Demo Test
    Kristin Demo Test
    Kristin Casey, Director Marketing, WWT Aug 22 2019 5:00 am UTC 7 mins
    This is to demo the BT platform to the team so everyone can see how it works. We want to make sure it doesn't have the same challenges we have with webex event center.
  • 2019 年クラウドセキュリティ脅威レポート: クラウドセキュリティの最新トレンドを学ぶ
    2019 年クラウドセキュリティ脅威レポート: クラウドセキュリティの最新トレンドを学ぶ
    髙岡隆佳, 株式会社シマンテック、エバンジェリスト Aug 22 2019 6:00 am UTC 60 mins



    • 『2019 年クラウドセキュリティ脅威レポート』の主な内容。
    • セキュリティ脅威の実例、およびクラウドセキュリティに対する認識と進化し続けるクラウドの脅威とのギャップ。
    • ゼロトラストセキュリティアーキテクチャを使った、進化し続ける攻撃への対処方法と、実装のためのベストプラクティス。
  • IAST Stories From the Field
    IAST Stories From the Field
    Michael Haddon IAST Evangelist for North America Aug 22 2019 6:00 am UTC 39 mins
    As DevOps continues along its path of domination, organizations are seeking to make use of application security testing tools that leverage automation and easily scale up.

    With that, we see that Interactive Application Security Testing (IAST) is gaining increasing momentum.

    Join industry-experts Michael Haddon for insights on:
    •Why customers are seeking IAST solutions
    •Common IAST use cases
    •How customers are using IAST successfully
    •The benefits customers gain from using IAST
  • DFLabs and SEMNet: Strengthening Security Operations with SOAR
    DFLabs and SEMNet: Strengthening Security Operations with SOAR
    Andrea Fumagalli, VP of Engineering at DFLabs and John Chai, Solution Engineer at SEMNet Aug 22 2019 7:00 am UTC 60 mins
    In the race to keep up with the increasing number and sophistication of cyberattacks, organizations need to have the capability to not only try to prevent attacks, but to also respond to them when they should occur, before they turn into more damaging security breaches.

    With security operations teams experiencing a number of common challenges and pain points, including a lack of skilled cyber security professionals, a growing volume of security alerts being received, as well as a lack of integration of existing tools in the security tool stack to name a few, organizations are recognizing the need for security orchestration and automation and response (SOAR) technology to help to overcome them.

    Partnering with DFLabs, SEMNet is able to offer its award-winning SOAR solution, IncMan SOAR to customers throughout Asia pacific, providing them with the localized knowledge, guidance and support needed to enable them to successfully implement efficient and effective security operations and incident response programs.

    During this webinar you will learn:

    - What is Security Orchestration, Automation and Response (SOAR) technology?
    - Why there is a growing need for SOAR solutions?
    - The problems SOAR technology can help you solve
    - How it helps to improve security operations and incident response programs
    - How DFLabs and SEMNet partner together to make this possible

    Plus, you will get to see IncMan SOAR live in action, discover some of its use cases and ask any questions you may have.

    Together, DFLabs and SEMNet can ensure security operations teams have the right SOAR solution in place, with standardized processes and workflows to detect, respond to and remediate security incidents in the fastest possible time frame, before significantly impacting your organization.

    Please note: Your registration information will be shared with SEMNet who may contact you in follow-up to your registration and/or attendance of this webinar.
  • Cyber Security Brief: Bug bounties, bad passwords, and Radiohead
    Cyber Security Brief: Bug bounties, bad passwords, and Radiohead
    Cyber Security Brief podcast Aug 22 2019 8:00 am UTC 21 mins
    On this week’s Cyber Security Brief podcast, it's episode 50! We discuss the EU’s bug bounty program, bad password security practice, and why “secure” websites are becomingly increasingly untrustworthy. We also chat about the start-up that hacked its own customers’ cryptocurrency wallets – in order to safeguard their funds, a further update on the RDP vulnerability we’ve discussed previously, and how the Spanish soccer league La Liga was misusing its mobile app. Finally, the story of how Radiohead called the bluff of a ransomware criminal.
  • Automation for a Continuously Aware Data Center
    Automation for a Continuously Aware Data Center
    Nlyte Aug 22 2019 8:00 am UTC 45 mins
    This webinar will show you how Nlyte’s Asset Explorer's discovery application continuously improves asset accuracy in your Nlyte DCIM implementation.

    See how you can:

    - Improve capacity planning and resource utilization
    - Improve and increase SLAs and Support responsiveness by reducing MTTR and RCA
    - Eliminate manual audit efforts improving efficiency and accuracy of workflows
    - Accelerate implementation or expansion of DCIM with auto-discovery and auto-updating of asset data

    We look forward to seeing you there!
  • Cloud Native – Everything a Security Professional Needs to Know
    Cloud Native – Everything a Security Professional Needs to Know
    Colin Domoney DevSecOps Consultant & Adam Reyland, Regional Marketing Specialist at Veracode Aug 22 2019 10:00 am UTC 45 mins
    The Cloud Native Computing Foundation is home to literally hundreds of projects enabling developers to embrace every benefit of cloud native development from container deployment and orchestration to monitoring and messaging.

    This webinar gives an overview of the work of the Cloud Native Computing Foundation; highlights a few flagship projects such as Kubernetes and Istio; and explains how these projects are transforming the way developers work. Security practitioners will benefit from insights into how these new technologies and projects can be applied to ensure that cloud native applications are also natively secure by design.
  • Breach Detection and Response - The whole business challenge
    Breach Detection and Response - The whole business challenge
    Ade Taylor, CTO, ITC Secure Aug 22 2019 10:00 am UTC 45 mins
    Technical detection is now just the starting point for a series of exercises which will see the entire business work together to identify what happened and to mitigate the results.

    In this session, you will learn:

    - How EDR and MDR are morphing into BDR
    - Why BDR is a challenge for the whole business
    - How technology can help, and how it doesn’t

    In this 30 minute webinar Ade will discuss how the world of cyber-security detection and response is changing, fast. From IT and technical analysts to the CEO via HR, this is a problem for the whole business to solve together.
  • InsurTech 2020: Emerging Trends and Technologies
    InsurTech 2020: Emerging Trends and Technologies
    Matthew Jones (Anthemis) + InsurTech and Insurance experts Aug 22 2019 10:00 am UTC 60 mins
    This panel session will go over the current landscape in the insurance industry and the trends and technologies that are looking to disrupt in.

    Topics to be discussed:
    -Do we need a new model for insurance?
    -Understand the mindset of the modern customer
    -Who are the players to watch out for
  • Delivering an Effective Cyber Security Exercise: Enhanced Breach Response
    Delivering an Effective Cyber Security Exercise: Enhanced Breach Response
    Daniel Norman, Research Analyst, ISF Aug 22 2019 12:00 pm UTC 44 mins
    Organisations are constantly under threat with over two-thirds of them experiencing data breaches in 2018. As a result, preparedness and resiliency are paramount to protecting an organisation’s information from cyber attacks.

    Business leaders and their security teams can improve their ability to handle cyber attacks by running cyber security exercises. These exercises should help the organisation identify areas of improvement in people, process and technology, reducing the impact should a real cyber attack occur.

    In this webinar Daniel Norman, Research Analyst, ISF will share how organisations should approach running internal cyber security exercises to support breach identification, prevention and response.
  • What can we learn from radiosurgery platform comparison studies?
    What can we learn from radiosurgery platform comparison studies?
    Ian Paddick Aug 22 2019 12:00 pm UTC 60 mins
    Various SRS treatment platforms are available, and there has been an increasing number of platform-comparison studies in recent years, but most of these are limited to single-centre studies. The recently published NHS England study, a national commissioning programme benchmarking different planning cases to evaluate current practices across clinical centres treating SRS cases for benign brain tumours and metastases, will be reviewed in detail during the webinar. Bias is common, due to various study flaws, including comparison of non-contemporary equipment, unequal expertise and comparison of plans created in a clinical versus study environment.

    However, this NHS study, arguably the "study to end all studies", provides a unique dataset of current practice across a large number of providers and equipment platforms.
  • Payments & Retail: the impact of friendly fraud
    Payments & Retail: the impact of friendly fraud
    BRC & The Chargeback Company Aug 22 2019 1:00 pm UTC 60 mins
    This webinar will explore how retailers can manage payment disputes and stop revenue loss with key trend analysis and case study examples.
  • How to overcome the challenges of a computer vision project
    How to overcome the challenges of a computer vision project
    Matthew Stainer & Haidar Altaie, SAS UK&I Aug 22 2019 1:00 pm UTC 60 mins
    From recognizing faces to processing the live action of a football game, computer vision opens many exciting possibilities.

    Find out what it takes to really capitalize on advancements in AI.

    Many Data Scientists tend to get very excited about deep learning. And why not? It has strongly contributed to the further development of game-changing applications like computer vision or Neural Language Processing.

    However, before starting any computer vision endeavours, it pays to zoom in on some basics: Using a repeatable end-to-end process – to guide you through image pre-processing, deep learning and productionising your models - will help ensure your deep learning models are as accurate as possible and take your models out of the lab and drive actual business value.

    Speakers: Matthew Stainer & Haidar Altaie

    Matthew is a Principal Data Scientist at SAS UKI, supporting customers to enhance their businesses decision making. He works across the analytical technologies including data mining and forecasting. His particular areas of interest and expertise is text analysis, identifying the impact of analytical solutions on business processes and communicating the results of analysis to a business audience. He has specific experience in Customer Management solutions, including Complaints Analysis, NPS, Customer Analysis, Optimisation, Decision Management, Recommendation Engines, Campaign Management, Debt Management and Web Analytics.

    Haidar is a Data Scientist at SAS UKI. He joined SAS in September 2018 after graduating from University with a Mathematics and Statistics degree, and is passionate about integrating the analytical skills he’s learned across growing industries to enable customers to solve complex real life issues.
  • Security Symposium - Morning Sessions
    Security Symposium - Morning Sessions
    Red Hat Aug 22 2019 1:00 pm UTC 210 mins
    Join Red Hat senior principal security global technical evangelist and strategist, Lucy Kerner, talking about automating security and compliance for hybrid environments. Followed by Dan Walsh, senior consulting software engineer, sharing container security and container technologies like kubernetes, buildah, and podman. Followed by a short Q&A, join live to submit your questions on August 22.
  • Core Banking System Offloading with DataStax Enterprise
    Core Banking System Offloading with DataStax Enterprise
    Maciej Stępień, CEO at Braintri, & Nicolas Soum, DataStax Aug 22 2019 1:00 pm UTC 39 mins
    Load from electronic banking puts strain on your core systems. In this webinar we discuss how to capture data changes in mainframe-based core banking system and replicate them to DataStax Enterprise (DSE) in real time using automatically generated C++ code. Electronic channels are redirected to DSE using existing legacy APIs. The presentation will discuss solution design, innovative approach to automatic code generation and lessons learned from the platform implementation.