Organizations are recognizing that adopting a service-oriented operating model, underpinned by system-based automation, can address many of the core challenges of competing in a digital economy. At the same time, defining value-based outcomes in the form of products and services, and optimizing shared processes with automation, have been proven to increase productivity, foster collaboration, lower costs and improve speed, no matter the business department or function. The sum of these capabilities and outcomes are often referred to as Enterprise Service Management.
Join Troy DuMoulin from Pink Elephant and Bruce Randall from ServiceNow as they provide an overview of the many dimensions of Enterprise Service Management.
In this webinar you’ll learn:
How to increase employee productivity and creativity with ESM
How to focus on service management capabilities like service definition, publishing, and knowledge management
How to transform workflow automation related to incident and request fulfillment
Andrew Bragdon, Principal Product Manager, MuleSoft and Sanjna Verma, Product Marketing Manager, MuleSoftLive50 mins
On average, a business supporting digital transactions now crosses 35 backend systems — and legacy tools haven’t been able to keep up. This session will cover how MuleSoft’s new monitoring and diagnostic solutions provide end-to-end actionable visibility to APIs and integrations to help customers identify and resolve issues quickly.
- Measure application performance across APIs and integrations in production
- How to query and retrieve log data across your network
- End-to-end walkthrough of priority issue identification and resolution
- Exciting new capabilities of Anypoint Monitoring
Francine Parham, Founder and CEO, FrancineParham & Co.Live60 mins
As a professional woman in the workplace, positioning yourself for career advancement means more than understanding the clear-cut obvious skills required for your success. What is really critical for your advancement is that you master the small but powerful skills that are often unwritten and unspoken - e.g. how to successfully manage the key players in your professional network and inner circle. If understood, practiced and ultimately mastered, these types of skills can help prepare and position you for career advancement and on-going success.
Join this webinar to:
1. Learn about the “unwritten and unspoken skills” you need for your professional advancement;
2. Receive tips on how to navigate everyday toward your career goal and;
3. How you can create your own blueprint to engage others within your organization to support your career.
Francine Parham is the Founder and CEO of FrancineParham & Co. Her work focuses on the advancement of women in the workplace. Having spent two decades in the corporate sector advancing to the position of a global vice-president in two Fortune 500 companies, she understands the importance of having the right skills (unwritten and unspoken) to achieve professional success. She shares the actions and approaches that you can take to prepare and position yourself for career advancement through her public speaking, writing, curated and micro-networking events and specialized skill-building workshops. She is also the co-author of the book, “The Ultimate Career Pocket Guide”. Francine has written for various online platforms and has been cited or recognized as a career expert in various published books. Visit FrancineParham.com for more information about her and her work.
Chris Tinker, Chief Technologist, HPE and Hal Woods, CTO, DateraLive75 mins
Chris Tinker, Chief Technologist at Hewlett Packard Enterprise joins Hal Woods, CTO at Datera to discuss some of the leading technologies in the Software Defined Revolution, and how HPE and Datera help cultivate the vast ecosystem of solutions.
Data is at the center of the Software Defined Data Center, where Datera reimagined enterprise storage and partnered with HPE to deliver a complete solution.
What you will learn from this webinar:
• Architecting your data center for high-performance
• Ease of deployment and management
• Advanced automation and future-ready choice to orchestrate data for VMs
At this webinar, learn how you can earn four top cyber certifications (CISSP CEH, CAP and CCRMP) in one program so you can get your $100K+ cyber job---and qualify for a CISSP Exam Voucher.
To get a $100K+ cybersecurity job, you need valuable cyber project experience and top cyber certifications. Learn how to get this combination of cyber credentials and experience in one program. Join our webinar now!
Sign up for this webinar to learn:
•Which four certifications you need and why
•How you can get all four certifications in one program
•How to get valuable cyber project experience
•Best practices to prepare for certification exams
•How to take the exams and pass them the first time
•How to maintain your certifications
•How you can qualify for a CISSP Exam Voucher
IT risk is always evolving, and in 2020 you need to be prepared what it may look like. New technologies and expanding trends such as cloud, digital transformation, and IT risk-related tasks being taken on directly by the business means IT risk will increase and potentially have greater impacts on the business without proper collaboration and management. Prepare for IT risk in 2020 and beyond by attending this live webinar led by Lockpath’s Sam Abadir. Topics to be discussed include:
· Evolution of IT landscapes and what it means to IT risk management
· IT risk management skillsets and disciplines
· Collaboration across departments and building consensus
· How organizational maturity impacts managing IT risk
· How to sustain growth in 2020 and beyond
Find out what you need to know to manage IT risk in 2020 and beyond by attending this educational webinar. Register now!
Michael O’Connell, David Sweenor, Angela Waner, Steven Hillion, Ritika Sehgal, Louis Bajuk-YorganLive60 mins
Join our team of data scientists and data science industry experts for an Ask Me Anything session exploring Data Science and Machine Learning. This is an hour-long session during which you can ask as many questions as possible. You also have the opportunity to ask questions ahead of time by tweeting @TIBCO using the hashtag #TIBCOAMA or posting on the TIBCO data science community. Register Now for this informative session!
Michael O’Connell, Chief Analytics Officer, TIBCO Software,
David Sweenor, Global Marketing Leader - Analytics, TIBCO Software,
Angela Waner, Senior Product Manager - Data Science, TIBCO Software,
Steven Hillion, Sr. Director - Data Science, TIBCO Software,
Ritika Sehgal, Pre-sales Director Analytics, TIBCO Software,
Louis Bajuk-Yorgan, Sr. Director Product Management - Data Science and Streaming, TIBCO Spotfire
Join this webinar where Mark Gaydos, CMO of Nlyte Software, will present the Next Generation of Asset Discovery.
Nlyte Asset Explorer uses agentless technology to scan your network from desktop to data center to cloud to inventory your hardware, software and networking assets. It supports all major protocols, integrates with your CMDB and creates a single source of knowledge of 100’s of data points.
You will learn:
- Security Officers report more than 10% of assets on network are undetected
- Only 10% of IT Operations managers believe that all assets are detectable and monitored
- 6% of Financial Officers feel they have no risk from a vendor software audit
- IT Managers report more than 69% of assets not current with software and patches
- 87% of Organizations believe 10% of assets or more are not in their CMDB
Red Hat® CloudForms® 4.6 provides a new way to migrate virtual machines (VMs) to Kernel-based Virtual Machine (KVM) environments like Red Hat Virtualization and Red Hat OpenStack® Platform in a simple, optimized, and efficient way. Watch this Red Hat Consulting whiteboarding video to see how this powerful tool works.
Mira Rutter, Work-Life Balance Coach and StrategistRecorded: Feb 21 201964 mins
Managing your time is futile unless you have the necessary energy to use your efforts effectively whether you’re ploughing your way through client work or you are out and about by yourself or with your family and friends.
Downing countless cups of teas or coffee or even cans of your favourite ‘energy’ drink isn’t a sustainable long-term answer to your vitality. But what else can you do when you often feel like you’re far too exhausted to do anything once you’ve wrapped up for the day and all you can do is collapse on the sofa or in bed? Sometimes, you may even be having trouble concentrating on your work. Or maybe you find it hard to switch off even when you’re trying to have some downtime.
If you’re experiencing any of these and you’ve had enough of trying ineffective short-term fixes and are ready to stop trying to pour out of an empty cup, it’s time to look at how you manage your energy levels not just your time.
Mira Rutter, a Work-Life Balance Coach and Strategist, will dive into the importance of self-care and how to prioritise your health and wellbeing as an entrepreneur, so that you can enjoy more of what matters to you most.
By attending this webinar, you will discover:
The two essential strategies for managing your energy levels
Highly effective stamina boosting tips to help you be at your best throughout the day that you can apply right away
How to preserve your power by learning how to cope with energy sappers
Join this webinar if you want to reap the benefits of feeling full of energy every day.
Gina Sánchez, Senior Consultant, Latin America, Digital Transformation, Frost & SullivanRecorded: Feb 21 201948 mins
IoT is at the beginning stages of its growth. Because it offers the ability to capture and leverage data across virtually every aspect of the human experience, its potential is enormous. Organizations that do not yet have IoT on the drawing board must figure out what the IoT looks like, where it fits, and its real-world issues and benefits as they weigh their decisions about deployment.
Frost & Sullivan invites you to join Gina Sánchez, Senior Consultant, to gain insights on the current status and future growth potential of the Industrial IoT market in Colombia, the factors that drive and restrict the market, success stories, and projected growth rates until 2022.
· What are the key verticals in this market?
· How will the revenue shares of the hardware, software, services, and connectivity segments change?
· What are the top three drivers for IoT investments?
Evan Blair, Co-Founder, Global VP Channel, ZeroFOX & Jeremy Wood, Vice President, Product Marketing, HootsuiteRecorded: Feb 21 201960 mins
In our connected world, most people engage with brands online prior to making a purchasing decision. With social media marketing on the rise, risks to your brand and reputation are also increasing, from account hacking to impersonating profiles and more. How can you increase engagement while protecting brand integrity from digital risks?
• Knowledge about social media security risks related to brand
• Tips for safe sharing on social media
• Step-by-step guide for protecting your brand
Lorraine Estelle, COUNTER Project Director; Elena Zapryanova-Hadjinikolova, COUNTER Executive CommitteeRecorded: Feb 21 201956 mins
In this instructional webinar, you’ll learn more about the COUNTER Code of Practice Release 5 (COP5), which goes into effect in January 2019. Lorraine Estelle, COUNTER Project Director, will highlight key points in the development of the new release, touching on metric types and new reports. Then Elena Zapryanova-Hadjinikolova, COUNTER Executive Committee and Director Analytics, Elsevier, will take you step-by-step through the new reports and familiarize you with their use cases. If you cannot attend the live webinar, be sure to register so that you will have access to the recorded webinar to view at your convenience and share with your colleagues.
•Introduction to COUNTER COP5
•How COUNTER COP5 will address future needs and stay relevant
•New metric types and how they work
•New reports and common use cases
•Step-by-step instructions on each of the new reports
Lorraine Estelle, COUNTER Project Director
Elena Zapryanova-Hadjinikolova, COUNTER Executive Committee
Jeff Laskowski, Security Consulting Director, FireEye MandiantRecorded: Feb 21 201956 mins
Many breached organizations—of all sizes—believed they had effective security programs and incident response plans. Reality proved otherwise.
Now, executive leaders are far more concerned with incident preparedness. When the Board asks, ‘How ready are we, really?’ your security team must have a defensible response.
In this webinar, Jeff Laskowski, Security Consulting Director of FireEye Mandiant, explains how to achieve effective preparation:
• Test your team’s detection and response capabilities to protect key assets against real-world targeted attacks—without the consequences of a real incident
• Assess your organization’s crisis management capabilities through the lens of an executive team
• Improve your team’s detection and response capabilities in accordance with the latest attacker tactics, techniques, and motivations
Join this webinar today to learn what it takes for your team to know how they would perform under a real threat, before they actually have to.
Join us as we continue this series of webinars specifically designed for the community by the community with the goal to share knowledge, spark innovation, and further build and link the relationships within our HPCC Systems community.
Featured speakers include:
Adwait Joshi, CEO DataSeers - HPCC Systems - An IoT use case for Payments
Traditionally we all have used Thor for data processing and ROXIE indexes for data pulls. Think about using ROXIE for a data ingest and Thor directly pulling data into the back end repository. This talk will explain about how DataSeers has designed a realtime transaction monitoring system using HPCC Systems, Kafka, ElasticSearch and MySQL pushing the envelope for a typical use case. Learn the roadblocks we encountered, how we worked around them, and how we hardened the system to be truly disaster resistant with all open source technologies.
Yanrui Ma, Software Architect, LexisNexis Risk Solutions - Dynamic ESDL Has Become More Dynamic In 7.0
In this talk, Yanrui will talk about some of the major changes with Dynamic ESDL in 7.0, with a focus on the mechanisms and enhancements that have made it even more dynamic. He’ll give a demo of creating a DESDL service with the improved “esdl” command line to show you how easy and quick it can be. He’ll also go over DESDL related ECL Watch changes in 7.0, and some of the upcoming DESDL features.
Bob Foreman, Senior Software Engineer, HPCC Systems, LexisNexis Risk Solutions - ECL Tip: All About the ECL SET
This month’s ECL Tip spotlights the ECL SET definition, value type, and other supported functions that use it. Several code examples and best practices will be demonstrated.
Jeff Lubitz, Stefan BoettrichRecorded: Feb 21 201949 mins
2018 was a watershed year in the securities litigation marketplace. In addition to the record number of newly-filed cases, there was significant growth in the dollar value of settlements, both in the U.S. and across the world. During calendar year 2018, 441 new cases were filed in U.S. federal courts, plus dozens more in state courts and in countries such as Australia, Canada, Denmark, Germany, Netherlands, and the United Kingdom. The value of settlements included significant sums in the U.S., including Petrobras ($3 billion) and Wells Fargo ($480 million), plus more than a dozen non-U.S. settlements led by Ageas (f/k/a Fortis - €1.3 billion).
As we enter the new year, 2019 will likely see similarly robust activity. Already, dozens of newly filed cases are in the court system and the amount of pending litigation is substantial, with a total of more than $1 trillion in Investor Losses (NERA’s measure of case size). Additionally, a few noteworthy settlements were finalized in early 2019, including Wal-Mart ($160 million) and Cobalt International ($146 million).
This webinar will be valuable to all financial and legal professionals practicing in this area. Attendees will benefit from ISS and NERA's timely insights into the complex and rapidly-growing securities litigation environment.
Hosting the event will be ISS Securities Class Action Services and NERA Economic Consulting. Speakers will include Jeff Lubitz, Executive Director at ISS, and Stefan Boettrich, Senior Consultant at NERA. Attendees will gain additional insight as Mr. Lubitz will discuss ISS Securities Class Action Services’ latest report, “The Top 100 U.S. Class Action Settlements of All-Time,” while Mr. Boettrich will highlight data from NERA’s “Recent Trends in Securities Class Action Litigation: 2018 Full-Year Review.”
Oriol Raméntol | Eduardo Javier EspinosaRecorded: Feb 21 201945 mins
La cuarta revolución industrial está centrada en el cliente. Sabemos lo importante que es fidelizarlo. Salesforce nos permite generar un mayor acercamiento manteniendo el compromiso que se tiene con el cliente.
Salesforce es la plataforma de éxito que ayuda a potencializar a los usuarios de servicio, executivos de cuenta y marketing. Everis en conjunto con Salesforce, buscamos las mejores soluciones para tu negocio con más de 10 años de experiencia y 100+ consultores certificados, everis garantiza el éxito de proyecto.
Nikolai Avteniev - Software Engineer, LinkedInRecorded: Feb 21 201956 mins
The contemporary code review practice has been adopted by many organizations and open source projects as a quality assurance measure. This process typically involves software tools such as Review Board and the time of one or more peer reviewers.
However, there is a growing body of empirical research about this broadly‐adopted practice that can help us learn more about the effects of code reviews on software quality. Available research shows that in fact, peer code reviews are better suited for knowledge sharing and code improvements, rather than for eliminating code defects or reducing error rates. The effectiveness of the process seems to depend on the experience of the reviewer with the code, the size of the change set, and the rate at which the review is conducted.
In this talk, Nikolai will share how the LinkedIn Flagship Product Engineering team leverages the code review process to spread organizational knowledge and uplevel individual contributors. I will also discuss the tools we’ve built to support this practice across a team which spans three offices, four development stacks, dozens of teams, and hundreds of individual contributors.
IBC365 | IRT Germany | BT SportRecorded: Feb 21 201975 mins
Join this webinar on Thursday 21 February to learn how 5G will transform the way content is created, produced and distributed.
More than just a faster mobile data connection, 5G reinvents connectivity. The technology enables new types of remote productions, and coverage of more live events, news and sports in higher 4K/HDR quality, and will revolutionise the way consumers receive content, combining broadcast, OTT and data to create a seamless experience regardless of network or device.
That's the theory - but how is 5G being deployed in practice? What are the early adopters doing, and what results are they achieving?
This webinar will explore a series of exciting use cases for 5G with hands-on case studies, including:
- Enriching production and storytelling
- Revitalising newsgathering and live event coverage
- Blending broadcast and live data for mobile audiences in the European 5G-Xcast project
- Dr Jordi Gimenez, 5G research engineer & project manager, IRT Germany
- Matt Stagg, Director of mobile strategy, BT Sport
- Marios Nicolaou, 5G and digital transformation senior strategy advisor
Eric Adams, Technical Marketing Engineer, Intel CorporationRecorded: Feb 21 201948 mins
We are pleased to offer a new Webinar, “Securing your containers with Kata,” focusing on financial and other highly-sensitive use cases. Kata Containers offer hardware-rooted isolation between containers, providing an additional layer of security for sensitive applications. The webinar will include a discussion of the motivations behind the Kata Containers project, how it fits into the broader container ecosystem with Kubernetes and Docker interoperability, and the advantages of its small footprint and stronger security. For familiar users, we’ll also review how the project has evolved from version 1.0 to the recent 1.5 release. We will also provide demonstrations of how to get started with Kata Containers and how Kata Containers can mitigate against an existing security exploit. Join us on February 21, 2019, for an informative hour on Kata Containers.
Radical changes in security have dramatic impact on load balancing. SSL/TLS is changing so rapidly that enterprises are forced to do a forklift upgrade of their hardware load balancers. However, with Avi's software load balancer, it’s as simple as a version update.
In this webinar, we will catch you up the latest SSL facts.
- SSL termination can be done with only software. And it has better security, scalability, and lower cost. That’s how Facebook and Google do it. Let’s see how.
- RSA and Elliptic-curve cryptography (ECC) have different implications for perfect forward secrecy (PFS), HTTP/2 and TLS 1.3 support. Let’s compare.
- SSL health score allows you to manage expiring certificates, automated certificate renewals, and notification alerts from a centralized control plane.
Kamesh Pemmaraju, Head of Product Marketing at Platform9Feb 21 20196:00 pmUTC75 mins
Kubernetes has become the de facto standard today for building and running container workloads. Many organizations would like to leverage their existing investments in VMware to take advantage of the Kubernetes revolution.
Unfortunately, VMware was never designed to run containerized workloads. Furthermore, Kubernetes is complex and notoriously difficult to deploy and operate at scale for production workloads. The lack of Kubernetes skills adds to the challenge.
Join us in this Webinar to learn how you can get a production ready, easy to use Kubernetes solution with a 24x7x365 SLA on your very own VMware infrastructure with the following benefits:
1.Get up and running with Kubernetes in an hour
2.Eliminate the management overhead
3.Enable self-service for your developers to deploy Kubernetes applications with a single click
4.Improve collaboration between your developers and VMware admins
5.And much more!
Join us at 1 PM EST/10 AM PST on February 21, 2019 to learn more.
Paul Kurtz, Co-Founder and CEO of TruSTARFeb 21 20196:00 pmUTC60 mins
Join TruSTAR Co-Founder and CEO Paul Kurtz as he hosts a panel with Jerry Archer, CISO of Sallie Mae, and Gary Warzala, Former CISO of PNC, VISA and Fifth Third Bank.
In the past twenty years, companies have deployed more technology, processes, and people to defend its applications and systems than ever before… but when pressed, many CISOs will admit they still don’t have a firm grip on the security-related data inside their own four walls.
Enter Intelligence Fusion.
Intelligence Fusion can be defined as the convergence of cyber threat intelligence with other security data sources, including fraud and physical security data. When implemented correctly, Intelligence Fusion can speed threat investigations and lead to a more proactive security stance.
In the panel you will learn:
-- How to blueprint an Intelligence Fusion program within your security organization
-- Real-life anecdotes from CISO panelists about the challenges and opportunities of Intelligence Fusion
-- How to measure the ROI of fusion programs
James Herbert, Solutions Engineer, OneLogin, TJ Gryziec, Chief Product Officer, Clear SkyeFeb 21 20196:00 pmUTC54 mins
Are you looking to strengthen identity governance and risk management for compliance initiatives like GDPR? Or to automate enterprise access management?
Today’s enterprises handle a growing volume of unique identities and applications and the process is only getting more complex. The combination of complex web of identities and manual workflows for application provisioning, compliance reporting, and access fulfillment, leads to massive inefficiencies and potential risk.
With Clear Skye and OneLogin, ServiceNow customers achieve a single system of record for all enterprise identities and access management. Additionally, the joint solution integrates seamlessly with ServiceNow GRC and provides evidence for auditing and IT compliance.
Join us on Wednesday, Aug 29th at 10 am PST to hear from security experts from OneLogin and Clear Skye on how to automate identity orchestration for enhanced security and compliance on ServiceNow.
In this webinar, you will learn how to:
- Simplify identity management on ServiceNow including real time user provisioning and deprovisioning
- Build automation processes to reduce risk and extend service management
- Fast track your GDPR or other compliance initiatives
Eric Carter, Director of Product Marketing, Sysdig & Shadi Albouyeh, Offering Manager, Developer Services - IBM CloudFeb 21 20196:00 pmUTC45 mins
If you’re involved with developing applications, chances are you’re being tasked with adapting to cloud-native infrastructure and being able to support cloud-native workloads with solutions like containers and Kubernetes. Join this discussion with Sysdig and IBM Cloud, who have recently built a partnership focused on improving monitoring and troubleshooting for your modern DevOps services. Together, IBM and Sysdig have launched a new offering that provides end-to-end monitoring capabilities in the IBM Cloud. You’ll come away with a better understanding of key visibility challenges and solutions that will help you successfully deliver the apps that drive your business.
Petri Kallberg, CTO at Nordcloud Finland & Markku Rossi CTO at SSH.COMFeb 21 20196:00 pmUTC60 mins
The cloud promises to bring savings, agility and scalability. All of this is attainable provided that you know which services to choose for which purpose and how to set up your environment properly. Join multi-cloud experts from Nordcloud and SSH.COM for this exclusive webinar hosted by Cloud Security Alliance where we will discuss the following topics:
•Why vendor-lock might not be your best option in the cloud
•Why ensuring the best possible privileged access experience for developers and administrators is vital for your business
•How to make daily access routines operationally efficient with automation
•How to choose best-of-breed services for the cloud based on your business needs
•Why existing cloud vendor or legacy solutions might sometimes add increase costs
Damon Tepe & Jeff HickmanFeb 21 20196:00 pmUTC60 mins
Breaches continue to litter headlines, increasing in volume and severity. To protect critical systems and assets from attack many organizations rely on two-factor authentication (2FA). But that may be resulting in a false sense of security.
Join SecureAuth as we explore how evolved attackers are working around popular 2FA methods. And we will demonstrate how behind-the-scenes adaptive risk checks of device, location, IP address, account type, and behavior can elevate identity trust and stop attackers cold! Even if they have stolen credentials and can bypass 2FA.
Better breach protection starts with better identity trust!
During this session you’ll learn how:
• Attackers are getting around two-factor authentication
• Risk and context checks can raise trust in identities and identify attackers
• Adaptive authentication delivers better access security without slowing down your business
Damon Tepe - Director, Product Marketing, SecureAuth
Jeff Hickman - Director of Sales Engineering, SecureAuth
Seth Earley, CEO, Earley Information Science & Enid Martinez, Senior Director of Engineering and Automation, ADPFeb 21 20196:00 pmUTC60 mins
ADP shares their successes in harnessing AI to drive engagement and information sharing with customers.
The age of customer-driven, Artificial Intelligence (AI)-powered enterprises is here, and B2B/B2C companies are beginning to harness its value. Yet, while many companies are considering AI initiatives, few are provided with a clear roadmap and best practices to evaluate, develop, implement, and measure the impact of their efforts.
Join Seth Earley, Founder and CEO, Earley Information Science and special guest Enid Martinez, Senior Director of Engineering and Automation, ADP, for "Why AI? A Case Study with ADP."
Topics they will cover include:
**The business drivers considered when evaluating AI for ADP
**Best practices in building the initial project plan
**Tips to overcome roadblocks and pitfalls to avoid
**Lessons learned when implementing a large-scale AI initiative
Bryan Friedman, Director of Product Marketing, Pivotal and Brian McClain, Principal Product Marketing Manager, PivotalFeb 21 20196:00 pmUTC60 mins
Serverless computing has become a hot topic in developer communities. The use of ephemeral containers eliminates the need for always-on infrastructure. But the real payoff for serverless is greater code simplicity and developer efficiency. Sounds great! Except the open-source serverless framework space is crowded and complex. Each unique offering approaches functions differently, with varying methods for triggering, scaling, and event formatting. How is that efficient?
One thing that most everybody can agree on is to build on top of Kubernetes. With that as the only common ground though, there is still too much fragmentation for developers to wade through when deciding on the right open source serverless solution.
That's where Knative comes in. An open-source project from Google, Pivotal, and other industry leaders, Knative provides a set of common tooling on top of Kubernetes to help developers build serverless applications. It extends Kubernetes by combining Istio with Custom Resource Definitions to enable a higher-level of abstraction for developers. This brings support for source-to-container builds, autoscaling, routing, and event sourcing. Join this session with Brian McClain and Bryan Friedman to see a complete working demo of Knative and learn:
● What are the components of Knative and how do they work together
● What are the different ways to deploy serverless applications and functions on Knative
● How and when to use Knative’s build features, such as Buildpacks
● What is Knative’s eventing model and how are event sources used to trigger functions
● How Project riff compliments development on top of Knative
Dr. Peter Stephenson and Carolyn CrandallFeb 21 20196:00 pmUTC60 mins
Dr. Peter Stephenson has 55 years of experience consulting and teaching in the cybersecurity space. He now spends his time researching and writing about cyber criminology, cyber jurisprudence, and cyber threat/intelligence analysis on large-scale computer networks. Join this webinar to learn more about his forensic research and why deception technology has proven to be instrumental within the security tool set he uses for forensic analysis and faster remediation to threats.
This Q&A style webcast will be moderated by Carolyn Crandall, Chief Deception Officer at Attivo Networks and will dive deeper into advanced deception strategies for root cause analysis and faster response to threats. Don’t miss your chance to register now to find out why deception is not just about early detection but also arms the defender with automated attack analysis, endpoint forensics, and substantiated alerts for accelerated incident response.
Komal Bhardwaj & Ritesh PatelFeb 21 20196:00 pmUTC60 mins
When applications that are deployed in Kubernetes need to be accessed from outside the cluster, an Ingress needs to be created. In Kubernetes, Services can also be exposed via a Load Balancer. There are several options available to make your application accessible and the right choice may depend on your requirements.
In this webinar, we will discuss how Ingress and Load Balancing works in Kubernetes. We will also show a demo of how Citrix ADC serves as an Ingress device on a Nirmata managed Kubernetes distribution.
Ritesh Patel - VP Products at Nirmata
Komal Bhardwaj - Principal Product Manager at Citrix
James Clampffer and Anatoli Shein, VerticaFeb 21 20196:00 pmUTC60 mins
If you use Vertica, you already know that it’s a high-performance MPP analytical database. But, did you know that Vertica is also a highly performant query engine?
Join us for this Webcast to learn how Vertica for SQL on Hadoop offers the fastest and most enterprise-ready way to perform SQL queries on your Hadoop data. We’ve leveraged our years of experience in Big Data analytics and opened up our platform to use the full power of the Hadoop cluster.
In this webcast, you’ll learn to take advantage of our open source contributions to the Apache community, ORC and Parquet file readers/writers, and various connectors and features to accelerate the exploration of your growing data lakes.
Matt Smith, Chief Architect, Red Hat & Christopher Liljenstolpe, CTO, Solutions, TigeraFeb 21 20196:00 pmUTC60 mins
Join Red Hat Chief Architect, Matt Smith, along with Tigera CTO, Solutions, Christopher Liljenstolpe, as they share their experience and knowledge helping leading enterprises achieve their key business transformation initiatives around moving to secure cloud-based, containerized microservice applications. In this 60 minute webinar, they will cover their top lessons learned on network security and Red Hat OpenShift.
Michael Hamilton, Director, Morpheus Asset ManagementFeb 21 20196:00 pmUTC33 mins
The global pace of change is only increasing. Consumers demand efficient self service technology based products and services 24/7. This webinar will focus on the why, strategic and infrastructure decisions behind implementing an automated or DevOps software delivery model. Topics such as workforce culture, people, processes & infrastructure themes will be covered to support those seeking knowledge and guidance around this challenging global subject.
What you’ll learn:
- Why developing an automated or DevOps software delivery model is critical today
- Why infrastructure decisions need to be made before new tooling is brought in
- How to leverage new software delivery models to deliver products faster and more efficiently
Ulf Mattsson, Head of Innovation, TokenExFeb 21 20196:00 pmUTC60 mins
With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.
Learn about Data Protection solutions for enterprise.
Learn about the new trends in Data Masking, Tokenization and Encryption.
Learn about new Standards for masking from ISO and NIST.
Learn about the new API Economy and how to control access to sensitive data — both on-premises, and in public and private clouds.
Jason Price, Solutions Engineer at Spirion & Jacob Serpa: Product Marketing Manager at BitglassFeb 21 20196:00 pmUTC60 mins
Data is one of an organization's most valuable assets. Unfortunately, in today's dynamic, cloud-first world, protecting sensitive information without the right tools is incredibly difficult. However, through solutions like data discovery, data classification, and cloud access security brokers, the enterprise can rest assured that its data is secure. In this webinar, you will:
- Understand the benefits of data discovery and classification
- Learn about cloud access security brokers (CASBs)
- Discover how the two work together to protect the cloud-first enterprise from data leakage
Amy Franko, The Strategic Sales ExpertFeb 21 20196:00 pmUTC45 mins
The new sales economy has made the standard definition of “satisfaction” obsolete. To attract and grow the best customers today, we need to cultivate loyalty. This requires sellers and sales leaders who are ambassadors. Loyal clients are 3X more likely to continue buying from you; you can expand your reach at higher margins. Amy’s session reveals strategies to improve overall client loyalty and boost your sales success.
You will learn:
1. What it means to sell like an ambassador
2.Key value elements that are most important to our prospects and customers
3.The differences between tables stakes (satisfaction) and differentiators (loyalty)
4.Loyalty strategies you can apply with prospects and existing clients
Matthew Webster, Senior Security Researcher, Secureworks Counter Threat UnitFeb 21 20197:00 pmUTC61 mins
All too often companies are learning the hard way — during an incident — how they could have been better prepared to stop the threat or reduce the damage. Join us for a one hour webcast, hosted by SC Magazine, featuring the key findings of Secureworks newly-released Incident Response Insights Report 2018: Risks, Remedies, and Best Practices for Defending Against Cyber Threats.
Webcast takeaways will include:
- Threat and attack trends identified by responders in 2017.
- Lessons learned by organizations in a wide variety of incident response (IR) scenarios.
- Key recommendations for IR planning, practices and capabilities that improve security defenses and mitigate business risk.
- Live Q&A with experts from our Counter Threat Unit™ (CTU) and Incident Response team.
In 2017, Secureworks’ team of incident responders helped hundreds of organizations navigate through complex and high-risk security incidents. Now the top insights from those collective engagements will be shared by speakers from the Secureworks Counter Threat Unit and Incident Response practice.
This program offers the support you need to prepare better for emerging threats, understand how you might be vulnerable, and respond more effectively when an incident does occur. Program content is appropriate for cybersecurity leaders, incident responders, CIOs, CTOs, and executives with responsibility for enterprise risk management.
Todd Thiemann, Director Product Marketing - Arctic Wolf NetworksFeb 21 20197:00 pmUTC39 mins
The evidence is clear: law firms of all sizes need to securely handle sensitive information associated with their clients, investigators, and witnesses. According to the American Bar Association’s 2017 Legal Technology Survey Report, 22 percent of respondents suffered a security breach at their law firms.*
Compromised client information can destroy reputations and lead to decreased billables and lost business. While the need for improved security is evident, IT and security teams struggle to locate, retain and train talent needed to maintain and improve their security posture. So, what are optimal approaches for law firms to manage staffing needed to monitor and defend their valuable data and infrastructure?
In this Arctic Wolf webinar, you will:
- Discover why cybersecurity is top of mind in the legal community
- Recognize the IT and Cybersecurity skills shortage and its impact on security
- Understand how SOC-as-a-Service approaches enable law firms to rapidly improve their security posture and provide evidence to satisfy technology audits
Volmar Pereira | Diretor de Arquitetura Digital na everis BrasilFeb 21 20197:00 pmUTC60 mins
Os sistemas mainframe existentes construídos ao longo dos anos encapsularam enormes lógicas e dados de negócios fundamentais para a transformação digital. No entanto, apresentam características que podem dificultar as iniciativas digitais. Neste webinar, vamos discutir a descomposição desses sistemas em uma arquitetura de microsserviços como uma abordagem de melhores práticas.
Sebastian Straub - Systems Engineer at N2WS; Jessica Eisenberg - Customer Success Manager at N2WSFeb 21 20197:00 pmUTC60 mins
The promise of the cloud has been a more agile, cost-effective and disaster-proof way to scale. However, this promise comes with some fine print - AWS and other public cloud providers guarantee the safety of your infrastructure but not your data.
Join our LIVE session to find out more about:
•Why you need to protect your AWS environments and why native backup is just not enough
•How to perfect rapid, granular disaster recovery
•How you can reach application consistency for 100% uptime
Paul Moxon, VP of Data Architectures and Chief EvangelistFeb 21 20197:00 pmUTC60 mins
What makes data scientists happy? Of course data. They want it fast and flexible, and they want to do it themselves. But most classic data warehouses (DW) and data lakes are not easy to deal with for agile data access. A more practical solution is the logical data warehouse (LDW), which has shown to be a more agile foundation for delivering and transforming data and makes it easy to quickly plug in new data sources.
Attend this webinar to learn:
* How easily new data sources can be made available for analytics and data science
* How your organization can successfully migrate to a flexible LDW architecture in a step-by-step fashion
* How LDWs help integrate self-service analytics with classic forms of business intelligence
John Masci, Principal Technologist - Cloud SolutionsFeb 21 20197:00 pmUTC60 mins
Today, 77 percent of enterprises have at least one application on the cloud (IDG State of the Enterprise Cloud, 2018). If you are part of that 77 percent, then cloud is now a critical element of your competitiveness. Heading into 2019, the growing pains of cloud will be cost and security: you’ll face the difficult balance between empowering your teams with the newest cloud technologies and ensuring those teams stay within budgets and comply with organization-wide policies.
As you take on this challenge, you need a cloud management platform that provides proactive ways to control and minimize costs, while enforcing governance and security.
In partnership with LiftOff IT, HyperGrid invites you to attend this webinar and demo, highlighting the capabilities we offer to help you optimally manage and benefit from your cloud strategy.
This webinar focuses on the following critical topics:
• How your cost, security & governance challenges will change at different stages of cloud adoption
• Key methods to manage costs including instance optimization, budget tracking, bill analysis and chargebacks
• Mitigating security risks using risk-based policies, and automated threat detection
• Maintaining compliance against internal and external standards corporate when operating in the public cloud
• How the HyperCloud™ platform can simplify all the above
Receive a complimentary copy of Gartner’s 2019 Magic Quadrant for Cloud Management Platform Report
As a webinar participant, you’ll receive a courtesy copy of Gartner’s new landmark overview of the CMP marketplace. Learn why Gartner singled out HyperGrid as the only “visionary” in this category in its Magic Quadrant for Cloud Management Platforms.
Rolf Agather (FTSE Russell), Michael Curtis (DWS), Sam Wright (DWS)Feb 21 20197:00 pmUTC60 mins
*** Please note that this webinar is addressed exclusively to professional investors in the US. ***
"How can I efficiently capture and maintain exposure to factors" is a common question heard by index providers and ETF issuers alike. Of equal importance, though, is how the index methodology works to maintain exposure to chosen factors over time.
Join Rolf Agather, Managing Director, Research and Innovation, FTSE Russell
Michael Curtis, Product Development, DWS and
Sam Wright, Capital Markets, DWS for the latest semi-annual update on:
- Efficiently capturing multi-factor exposure
- The changing factor exposures within indexes over time
- The impact of latest rebalancing on embedded factor exposures
- Top security and sector weight changes in FTSE Comprehensive Factor Indexes
Mark Bowker, Senior Analyst, ESG / Richard Diver,Cloud Security Architect. Insight/ Jereme Lee, System Engineer, SymantecFeb 21 20197:00 pmUTC62 mins
Its your job to secure email, sensitive data and apps in Office 365. Now What?
Moving to cloud applications provides the opportunity to get your security right. This is the time to set up optimum data loss prevention, malware and phishing prevention, and access controls on your systems. No matter if you are still planning, have just started, are in the midst, or are fully migrated to Office 365, there are security policies and procedures to implement and optimize.
Join ESG industry analyst Mark Bowker, Insight’s Cloud Security Architect, Richard Diver, and Symantec’s System Engineering Manager, Jereme Lee to learn how to:
- Get the most out of your Office 365 instance by enhancing the security
- Understand what Microsoft offers and how Symantec compliments their security offering
- Enhance your email, app and data security in Microsoft Office 365 which can be used across all your cloud apps