Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Protecting IoT Devices & Networks From Cyber Crime
    Protecting IoT Devices & Networks From Cyber Crime Cradlepoint's Ken Hosac, VP of IoT Strategy and Business Development, and Brandon Ashey, Infrastructure and Security Manager Live 60 mins
    The potential of widely distributed IoT devices to enable new business opportunities, streamline operations, and reduce costs is vast, but so are the security implications. With IoT playing an increasingly big role at branch offices, within vehicles and in the wild, larger attack surfaces are giving IT teams more to worry about than ever before.

    Well-publicized attacks such as Mirai botnets and WannaCry grabbed headlines, but they're just the tip of the iceberg. IoT threats are becoming too prevalent and advanced to address with traditional security tools. Now is the time for software-defined, policy-based security solutions that isolate IoT devices and protect organizations' most valuable data - regardless of the WAN source.

    Join Cradlepoint's Ken Hosac, VP of IoT strategy and business development, and Brandon Ashey, infrastructure and security manager, for a live webinar on March 21, 2018, at 9 am PT. Learn about IoT security challenges and best practices for mitigating risk, including Software-Defined Perimeter technology that creates micro-segmented device-to-cloud overlay networks that are completely cloaked from other networks.
  • Protect your innovations, products and business with IP insurance
    Protect your innovations, products and business with IP insurance Erik Alsegard & Lewis Parle from CFC Underwriting | Ruta from PatSnap Live 60 mins
    The primary reason why people register their IP - including trademarks patents - is to protect their ideas from being used and monetized by others. Companies across the world spend trillions of dollars on research and patent thousands of new technologies each year, so why would you ever need IP insurance?

    We see dozens of cases each year where companies and individuals are claiming infringement upon their IP and that's when IP insurance comes into play.

    PatSnap is joined by Erik Alsegard, IP Practice Leader and Lewis Parle, In-House Solicitor and IP Underwriter, from CFC Underwriting to discuss the whys and hows of IP Insurance.

    Join this webinar to learn about the risks of IP, if you should consider insurance and what are the pros and cons of the options available to you when it comes to protecting your Intellectual Property assets.
  • Infrastructure Automation with OctoDNS and Terraform
    Infrastructure Automation with OctoDNS and Terraform Devin Bernosky, Lead Solutions Engineer Live 45 mins
    As you build your application environment you've undoubtedly thought about utilizing multiple providers at every level of your stack. The benefits to this are obvious - scalability, redundancy, and performance optimization, among others. However, syncing multiple providers can sometimes pose challenges.

    In this webinar we'll focus on synchronization between multiple DNS providers, including:

    - Available toolsets on the market today
    - Example deployment using NS1's OctoDNS integration
    - Example deployment using NS1's Terraform integration
    - Network redundancy using NS1's Dedicated DNS

    OctoDNS: https://github.com/github/octodns
    Terraform: https://www.terraform.io/
  • CRISPR: Updates and trends in opposition and appeal practice before the EPO
    CRISPR: Updates and trends in opposition and appeal practice before the EPO Catherine Coombes (HGF), Dr. Chris Moore (HGF), Peter Scott (WIPR) Live 90 mins
    This webinar will be on opposition and appeals practice before the EPO. We’ll be discussing the streamlining of the opposition procedure by the EPO, the changes that we are seeing as a result and will be providing practical tips in view of these changes. The talk will also draw on recent case law.
  • Webcast - Aggiornamento BNY Mellon Global Real Return Fund
    Webcast - Aggiornamento BNY Mellon Global Real Return Fund Luca Bollani e Catherine Doyle Live 75 mins
    Catherine Doyle, Investment Specialist del fondo multi-asset globale BNY Mellon Global Real Return, offrirà un aggiornamento dettagliato sull'andamento del fondo, sul posizionamento di portafoglio e sull'outlook di mercato del team di gestione, rispondendo alle domande dirette degli investitori.
  • Understanding the Status of ERP Security in the Cloud
    Understanding the Status of ERP Security in the Cloud JP Perez-Etchegoyen of Onapsis and Shamun Mahmud of CSA Live 60 mins
    With ERP vendors reporting double-digit growth in cloud revenue year over year, many organizations are faced with the challenging task of planning a cloud migration of their most critical assets. Because these systems are typically more complex, and also house the organization's critical data and processes, special precautions must be taken when building a migration plan.

    During this webcast JP Perez-Etchegoyen, CTO of Onapsis Inc and Shamun Mahmud, Research Analyst at CSA, will present their key findings from the recently released white paper, "The State of Enterprise Resource Planning Security in the Cloud." Attendees will learn:
    - Security requirements of ERP and Business-Critical Applications
    - Cloud adoption trends
    - Challenges of migrating ERP solutions to the cloud
    - Common Security and privacy risks in cloud based ERP applications
    o SaaS ERP Applications
    o IaaS ERP Deployments
    o ERP extensions in PaaS cloud
    - Conclusions and key take-aways
  • Data: Don't Let Your Greatest Asset Become a Liability
    Data: Don't Let Your Greatest Asset Become a Liability Laurence Pitt, Global Security Strategy Director at Juniper Networks Live 60 mins
    A discussion around the role and the evolution of data. We will also cover the importance of protecting data throughout its lifecycle.

    We will look at:
    - Fundamental changes in the way we live, work and communicate
    - How we have become highly reliant on data, so it means more to us
    - The increasing value of data and why we need to protect it

    Presenter: Laurence Pitt, Global Security Strategy Director at Juniper Networks
  • Starting and Navigating the CAMS Certification
    Starting and Navigating the CAMS Certification Jose Lewis Live 60 mins
    Curious about earning the CAMS designation? Not sure where to start? Confused about the certification process? This webinar was made especially for you! We understand that you may have many questions about becoming CAMS certified and we are here to answer them. This webinar will provide you with an in-depth look at the process becoming CAMS certified and help you navigate your way to success.
  • GDPR: The AppSec Twist
    GDPR: The AppSec Twist Roman Garber, Development Manager at Security Innovation and Edward Skraba, Lead Penetration Tester at Smarttech247 Live 60 mins
    When GDPR becomes law in a few months, it will be the most wide-ranging and stringent data protection initiative in history. To prepare for this sea change, most organizations have streamlined and detailed their information security policies; however, many are unaware that immature application security programs arguably pose the biggest threat of a data breach. This oft-forgotten piece of data protection puts organizations at risk of GDPR fines.  

    Attend this joint webinar with Security Innovation and Smarttech247 to learn practical tips on incorporating application security best practices into an InfoSec program to achieve GDPR compliance. 

    Topics include:  
    * Summary of GDPR key concepts
    * Security of data processing in software and the CIA triad
    * The people and process problem of GDPR: Governance
    * Using Data Protection by Design for secure design and business logic
    * Assessments to verify the security of processing

    Roman Garber, Security Innovation
    Edward Skraba, Smarttech247
  • itSMF-CursoTools18: 06-Inteligencia Artificial fundamental en ITSM
    itSMF-CursoTools18: 06-Inteligencia Artificial fundamental en ITSM Antonio Martín Marcos - Informática El Corte Inglés Live 45 mins
    Las posibilidades que nos ofrecen las soluciones ITSM, en nuestro caso BMC Remedy ITSM, a la hora de utilizar Servicios Cognitivos, en la gestión de los servicios de TI:

    •Ayuda a los servicios de Service Desk en la categorización y asignación de las peticiones e incidencias de los usuarios
    •Promueve la innovación y mejora del servicio prestado a los usuarios a través técnicas de Inteligencia Artificial y Machine Learning, mediante la recopilación y el análisis de datos
    •Habilita un nuevo canal de entrada en la relación con los usuarios finales y clientes, que permite la auto-resolución mediante un asistente virtual.

    En el Webinar, se mostrará, la operativa a seguir por un usuario de help desk y el cliente final, y cómo a través de “Innovation Studio” nos integramos con IBM Watson, describiendo el proceso de entrenamiento, evaluación y pruebas de las distintas fases de aprendizaje que habitualmente se sigue en modelos de Machine Learning.

    Agenda del webinar:
    1.Búsqueda inteligente en el soporte TI
    2.Motores de recomendación
    3.Análisis predictivo en las operaciones de TI
    4.Bots para autoservicio y autoayuda

    Plataforma sobre la que se basa:
    1.BMC Truesight
    2. BMC Digital Workplace
    3. BMC Innovation Studio
    4. IBM Watson
  • Best Practices for Encrypting Data on AWS
    Best Practices for Encrypting Data on AWS Ric Harvey, Technical Evangelist, AWS Recorded: Mar 21 2018 41 mins
    This webinar will examine concepts for managing sensitive data in AWS. For example, using tools to encrypt client access with AWS Certificate Manager; secret management with AWS Systems Manager Parameter Store and its integration with deployment pipelines; and how to encrypt data at rest to ensure privacy.
  • Dynamic Scanning with CA Veracode
    Dynamic Scanning with CA Veracode Patrick Hayes, CA Veracode Solution Architect Recorded: Mar 21 2018 19 mins
    Test any web application with as little as a URL!

    Join this 20-minute webinar to see how Veracode can help you unlock the capabilities of DynamicDS and DynamicMP. With these deeper scanning abilities, your organization can identify and remediate application vulnerabilities and comply with several compliance standards, such as PCI and other financial industry regulations. See firsthand how Veracode’s dynamic scanning capabilities enable teams to:

    •Secure individual web apps during SDLC or while in production
    •Automate the overall dynamic scanning process to become an easy-to-use self-service offering
    •Improve quality through vulnerability verification and login configuration assistance
  • Technology and Talent in Financial Services and FinTech
    Technology and Talent in Financial Services and FinTech Lisa Moyle, FinTECHTalents; Diana Biggs, HSBC; Igor Volzhanin, DataSine; Liz Lumley, Global FinTech Commentator Recorded: Mar 21 2018 31 mins
    What will the future talent pipeline mean for the future of the financial services industry?

    We are delighted to be joined by three leading FinTech Influencers, Diana Biggs (Head of Innovation, HSBC Retail Banking), Igor Volzhanin CEO, Datasine), and Liz Lumley (global fintech commentor and advisor) to discuss the pressing issues around access to talent and digital skills, including how best to navigate a post-Brexit world.

    By joining the FinTECHTalents webinar, you’ll be able to:

    - Understand the current and future constraints on access to talent
    - Learn how the financial services industry draws in the next generation of innovators
    - Understand how to overcome some of the challenges that your organisation faces in talent acquisition
    - Learn the steps industry can take in order to attract tomorrow’s talent to drive change
  • Prognosis for UC Deminar (March)
    Prognosis for UC Deminar (March) Chuck Geisler, Senior Solutions Engineer Recorded: Mar 21 2018 34 mins
    Join our monthly live demo webinar, hosted by an IR Solutions Engineer with live Q&A.
  • Managed Threat Detection and Response for Securing AWS Applications
    Managed Threat Detection and Response for Securing AWS Applications Ryan Holland, Senior Director, Technology Services Group, Alert Logic Recorded: Mar 21 2018 45 mins
    Security tools alone are not enough as your AWS environment becomes more complex, and the need for comprehensive security – including people, process, and technology – becomes apparent. Cyber threats continue to increase in volume and sophistication, so where do you start when incorporating advanced threat detection and response capabilities into your security strategy?

    Start here with Ryan Holland, Senior Director, Technology Services Group at Alert Logic, as he lists the top considerations to better protect your AWS workloads and applications. Learn the core fundamentals to a stronger AWS cloud security strategy.

    Register now for this engaging webinar and gain key security takeaways, including:

    • Guidelines to security risk modeling: understanding your AWS environment and the exposures your web apps face
    • Learnings from top configuration vulnerabilities involving root, S3, IAM, security groups, and more
    • The use of multiple data sources to attain a “defense in depth” security strategy
    • Threat detection capabilities and creating an effective incident response plan
  • The emerging role of libraries in research information management
    The emerging role of libraries in research information management Anna Clements, University of St Andrews, Jennifer White, University of St Andrews & Rebecca Bryant, OCLC Research Recorded: Mar 21 2018 60 mins
    Pure, as one of the leading CRIS (or research information management RIM) systems, has facilitated the emergence of exciting opportunities for research organisations to transform their support for researchers, with many research libraries taking an increasingly important role. Broadly defined, RIM is the aggregation, curation, and utilization of information about institutional research activities, and as such, intersects with many aspects of traditional library services in discovery, acquisition, dissemination, and analysis of scholarly activities.

    OCLC Research has been working with members of its international OCLC Research Library Partnership, including the University of St Andrews in Scotland, on a publication to help libraries and other institutional stakeholders to understand developing RIM practices and, in particular, their relevance for service and staff development purposes.

    In this presentation, we will provide an overview of the OCLC position paper and provide a case study from the University of St Andrews.
  • Crucial Components of  your SWIFT Customer Security Programme (CSP) Compliance
    Crucial Components of your SWIFT Customer Security Programme (CSP) Compliance Matt Buller, CTO Financial Services, ForeScout & Adam Kohler, Sr. Engineer, ForeScout Recorded: Mar 21 2018 29 mins
    In the wake of the high-profile, multi-million-dollar breaches using their infrastructure, SWIFT created the Customer Security Programme (CSP) to ensure their customers meet the required levels of security and compliance. Learn how ForeScout plays a crucial role in helping ensure SWIFT CSP compliance from ForeScout experts Matt Buller and Adam Kohler.
  • Under the Hood: Getting Started with Vertica Eon Mode Beta
    Under the Hood: Getting Started with Vertica Eon Mode Beta David Sprogis, Product Manager for Cloud and Eon, Micro Focus Recorded: Mar 21 2018 59 mins
    Vertica Eon Mode Beta, a separation of compute and storage architecture option, addresses the common need to rapidly scale your cluster to variable workloads. It also accommodates an almost endless data warehousing capability. Join us as we preview the benefits of this new architecture and walk through a step-by-step demonstration of its capabilities.
  • Future of Thinking Series: Disruptive Thinking
    Future of Thinking Series: Disruptive Thinking Veena Rajkumar, Learning & Development Program Manager, Tegile/Western Digital Recorded: Mar 21 2018 49 mins
    The future of work will look different than the current landscape, and it is approaching rapidly. To prepare, companies must “future-proof” their organizations through a re-evaluation of behaviors to embrace change.

    One of these behaviors is how we think which has the capacity to handle the significant challenges (and opportunities!) that will come from IoT (Internet of Things), AI (Artificial Intelligence), Machine Learning and many other Industry 4.0 trends.

    Simple tweaks to existing “thinking” will not be a match for what’s coming. We need a fresh and powerful perspective - a disruption - in the way we’ve approached thinking in the past.

    Sign up for our free webinar to understand Disruptive Thinking to future-proof your organization.

    Join Veena Rajkumar, Learning & Development Program Manager with Tegile, A Western Digital brand, in the first part of a webinar series about The Future of Thinking. Veena will discuss Disruptive Thinking – a method to alter the status quo, identify unique ways to solve real-world problems using simple ideas and existing resources and build effective results.

    You will learn:

    . The three parts of disruptive thinking: inquiry, discovery, and development

    . Methods to leverage challenge as a vehicle for opportunity

    “If you can’t change it, change the way you think about it.” ~ Maya Angelou
  • Software Development with Open Source: Securing Applications and IP
    Software Development with Open Source: Securing Applications and IP Tim Mackey, Sr. Technology Evangelist at Black Duck by Synopsys Recorded: Mar 21 2018 59 mins
    Open source software is embraced by developers, enterprises, and governments at every level, and with it comes many strong opinions and few facts. How much open source is really being used in the applications you buy? Does the "many eyes" theory make open source more secure? Does traditional security testing address vulnerabilities in open source?

    With organizations becoming more agile but facing increasing regulatory governance, understanding how open source software development works, and how to secure open source, is increasingly important. In this session we’ll cover:
    - Code contribution and IP management
    - Fork management
    - Release process
    - Security response processes
    - Realities of IP risk and open source
    - Pass through security risk and responsibility
    - Keeping up with scope of impact changes within a single disclosure
    - Automating awareness of security risk from development through integration and delivery to deployment
  • How to Combat the 7 Common Emergent Threats
    How to Combat the 7 Common Emergent Threats Keiron Shepherd, Senior Systems Engineer - Security, F5 Networks Recorded: Mar 21 2018 75 mins
    In today’s digital marketplace, your applications are the backbone of your business. However, cloud-based apps create a host of complex challenges and new risks. With automated tools and hackers for hire, threats are increasing and cybercrime has turned into a game for profit. The digital world has opened the door to unprecedented threats, putting your corporate data and reputation at risk.

    Join us for this webinar to learn about:
    • The 7 most common threats to your apps and data: Malicious bots, Credential stuffing, DDoS, Ransomware, Web fraud, Phishing, and Malware
    • How you can leverage threat intelligence to secure your apps and data
    • Where to spend your security budget to provide the strongest level of protection
  • Finding the right information for Medical Device Clinical Evaluation and PMS
    Finding the right information for Medical Device Clinical Evaluation and PMS Embase Senior Product Manager: Dr. Ivan Krstic Recorded: Mar 21 2018 62 mins
    Information found in the biomedical literature is a significant source for every stage of the medical device life cycle, from concept and design through clinical trials to release and reimbursement, as well as post-market surveillance.

    In June 2016, the updated Medical Device Clinical Evaluation Report (CER) guidelines came into effect (Revision 4 of MEDDEV 2.7/1), detailing where and how to search for literature and how to record the process of collecting, appraising and analyzing the items found.

    In this session, Elsevier's senior product manager Dr. Ivan Krstic demonstrated how Embase is especially suited to help Medical Device manufacturers prepare CER, including:

    - How to design effective literature searches for Clinical Evaluation reports using the PICO search form in Embase;
    - How to build a more comprehensive search using Emtree terms and synonyms;
    - How trade name and manufacturer name indexing supports analyses of devices already on the market;
    - How to find mentions of adverse device reactions in the literature for effective post-market surveillance (PMS) reporting
  • Advanced Analytics: Modernizing Enterprise Networks
    Advanced Analytics: Modernizing Enterprise Networks Jim Meehan, Head of Product Marketing, Kentik Mar 21 2018 5:00 pm UTC 45 mins
    Enterprise networks are changing fast. Traffic volumes are growing relentlessly, applications are increasingly dynamic and distributed, and some of them have moved outside of IT’s direct control. On top of these challenges, every category of business process is moving to digital — the network is now both your supply chain and your delivery vehicle. IT and network teams are feeling more squeezed than ever as their traditional tools fall further behind these modern requirements.

    Is your enterprise network facing one or more of these challenges?

    Join Kentik’s Jim Meehan to learn how network traffic intelligence provides:

    --Pervasive visibility within the data center, across the WAN, and into public cloud
    --Proactive alerting and anomaly detection for both NetOps and SecOps
    --Single-pane-of-glass visibility across all applications regardless of where they run
    --And much more for modernizing your enterprise network
  • Top 7 Docker Vulnerabilities & Threats
    Top 7 Docker Vulnerabilities & Threats Knox Anderson, Product Marketing Manager, Sysdig Mar 21 2018 5:00 pm UTC 60 mins
    Docker comes bundled with some neat security safeguards by default: isolation, a smaller attack surface, and task specific workloads.

    There are, however, some specific parts of Docker based architectures which are more prone to attacks. In this webinar we are going to cover 7 fundamental Docker security vulnerabilities and threats.

    Each section will be divided into:
    -Threat description: Attack vector and why it affects containers in particular.
    -Docker security best practices: What can you do to prevent this kind of security threats.
    -Proof of Concept Example(s): A simple but easily reproducible exercise to get some firsthand practice.
  • Crucial Keys to a Successful Sales Hire
    Crucial Keys to a Successful Sales Hire Carole Mahoney Mar 21 2018 5:00 pm UTC 45 mins
    Avoid the expensive costs of a failed sales hire. Join this webinar to learn simple strategies to find and interview the right candidates and set them up for success. Be the first to access links to free tools to help in your hiring and onboarding processes.
  • Best Practices for Windows Server 2016 HCI & How It’s Better with Veeam & HGST
    Best Practices for Windows Server 2016 HCI & How It’s Better with Veeam & HGST DataON, Veeam, HGST, and a Microsoft MVP Mar 21 2018 5:00 pm UTC 60 mins
    Windows Server 2016 launched in late 2016, with new functionality such as Hyper-V, Storage Spaces Direct, Storage Replica and advanced Resilient File System (ReFS). As more and more enterprises are adopting and deploying Windows Server 2016 hyper-converged infrastructure, DataON and our partners would like to share our best practices and know-how so your HCI leverages all the key features and functionalities of a Microsoft software-defined data center (SDDC) with Storage Spaces Direct.

    Veeam Cloud Connect provides cloud-based disaster recovery and offsite backup. It allows businesses and organizations to have physical and virtual backups off-site and replicate VMs without the cost and complexity of building and maintaining an offsite infrastructure. It’s also one of the few solutions that provides full, advanced support for Windows Server 2016.

    HGST (a division of Western Digital) provides high quality and high capacity SAS HDDs that are the core of DataON’s DNS family of JBODs. It lays down the foundation for a worry-free data center powered by Windows Server 2016.

    The webcast will explore the following topics:

    •What are the top deployment best practices you need to know about in Windows Server 2016

    •What is Veeam and how do they support Windows Server 2016

    •How does HGST technology support a Windows Server-based data center

    Presented by: DataON, Veeam, HGST, and a Microsoft MVP
  • [Ep.6] Ask the Expert: Creativity in Marketing
    [Ep.6] Ask the Expert: Creativity in Marketing Kirti Naik, Global Head of Brand & Communications at Russell Investments & Ray Mendez, Founder & Partner of Masa & Boz Mar 21 2018 5:00 pm UTC 60 mins
    This webinar will about the creative side of asset management marketing: ideation & execution.

    Some questions to spark the conversation include:
    How do you create, or re-create a legacy brand?
    What conversations need to happen, how much creative license is used, and where does inspiration come from?
    Is a different type of creativity than what people expect?
    How does data, customer feedback & regulations figure into the creative process?
    What considerations are needed to enter a new market?

    Join in live to ask your own questions.
  • How to Automate Phishing Investigations
    How to Automate Phishing Investigations Tom D’Aquino, Director of Security Solutions at LogicHub Mar 21 2018 5:00 pm UTC 45 mins
    Get to Inbox Zero everyday with Automated Threat Ranking

    Do you struggle with getting too many phishing alerts? Does it take a long time to investigate and respond effectively?

    Join us for a special presentation to see how some of the most sophisticated security teams are applying automated threat ranking to phishing reports from their users and detection tools, helping them get to inbox zero every single day.

    Timely analysis and response is key to combating phishing threats while tracking and rewarding submissions helps keep submitters engaged and participating.

    Join this webinar to gain insight into:
    * The basics of Phishing investigations
    * What automation can and cannot accomplish
    * How to build the automation steps easily
    * Best practices from industry experts

    Learn how you can help make your phishing reporting initiative an asset that drives other security capabilities rather than a burden that exhausts your team!

    Speaker: Tom D’Aquino, Director of Security Solutions at LogicHub
  • ISSA Thought Leadership Series: Security Awareness Strategies
    ISSA Thought Leadership Series: Security Awareness Strategies Jack Koziol, InfoSec Institute | Robb Reck, Ping Identity | Marnie Wilking, Orion Health | Michael Towers, Allergan Mar 21 2018 5:00 pm UTC 60 mins
    Beating Hackers at Their Own Game: Security Awareness Strategies That Work

    If 2017’s explosion of cybersecurity breaches taught us anything, it’s that our workforces, more than ever, are one of our most critical defenses. But with as much as 30% of employees unable to spot a phishing email, how do you keep hackers from hijacking your data? The seemingly obvious answer is security awareness training. Unfortunately, many security education programs today fail to sufficiently change employees’ security attitudes, skills and behaviors -- providing a false sense of protection and safety. Even worse, 48% of companies do not have an employee security education program.

    If your New Year’s infosec resolutions include launching a security awareness initiative, or reviving an existing one, what better way to guarantee results than to learn from pros who have been in your shoes. Join our expert panel as they share:

    ● Their most effective security awareness strategies to improve your organization’s security posture

    ● Proven methods to get employees to take security seriously (before a breach occurs)

    ● Security awareness program pitfalls to avoid and biggest lessons learned

    ● Predictions on what will cyber attacks will look like in the next couple years and what you should do in your security awareness program today to prepare
  • Understanding eDiscovery in Criminal Cases
    Understanding eDiscovery in Criminal Cases Doug Austin and Tom O'Connor Mar 21 2018 5:00 pm UTC 75 mins
    Criminal cases have long been thought of as an arena devoid of electronic discovery issues. But attorneys who regularly handle criminal cases know that’s not the case. So, are there any guidelines and best practices for handling eDiscovery in criminal cases? This CLE-approved* webcast session will take a look at the history of the development of standards and highlight specific issues of importance regarding eDiscovery in criminal matters. Topics include:

    + Overview of Rules for Criminal Matters
    + How Data is Acquired in Criminal Matters
    + Common Data Types and Examples of Cases
    + Data Exchange Formats and Protocols
    + Time Issues Specific to Criminal ESI
    + Working with Social Media as Evidence
    + Border Entry Considerations and Examples
    + Resources for More Information

    Presentation Leader: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

    * MCLE Approved in Selected States
  • 5 Tips for Agile Mobile App Security Testing
    5 Tips for Agile Mobile App Security Testing Brian Reed (Chief Mobility Officer) // Alex Wishkoski (Director of Product) Mar 21 2018 5:00 pm UTC 60 mins
    Most mobile app penetration tests or vulnerability assessments take anywhere from a couple of days to two weeks to deliver because of the manual approaches, brittle open source stacks in homegrown testing rigs and legacy application security testing (AST) tools. The shift to agile development common in mobile app development teams has left appsec testing behind. New mobile app builds are pushed daily, weekly or monthly, and appsec testing teams struggle to keep up. Each new build brings new code, including 3rd-party libraries, and with that code comes new potential vulnerabilities.

    Application security & testing teams - this one’s for you. If you’re looking for ways to join the agile approach and keep pace with the speed of your development team’s CI/CD pipeline, take stock of these 5 tips for mobile appsec testing and integrate them into your company’s workflow.

    NowSecure - protecting the business at the speed of mobile.
  • A New Way of Predicting Exploitability - Kenna Security with Exploit Prediction
    A New Way of Predicting Exploitability - Kenna Security with Exploit Prediction Ed Bellis, CTO, Co-Founder, Michael Roytman, Chief Data Scientist Mar 21 2018 5:00 pm UTC 60 mins
    Do you think security is overdue for actionable forecasts rather than security dogma? Are you a security leader tired of worrying about the next vulnerability with a logo and a web site? If we can forecast the weather, we can use similar models to foresee which vulnerabilities attackers are likely to weaponize.

    Join Kenna Security's Michael Roytman, Chief Data Scientist and Ed Bellis, CTO, Co-Founder and ex-CISO at Orbitz for a live webinar where they will debut Kenna Security's new Exploit Prediction, the industry's first vulnerability exploit prediction capability, a significant breakthrough for security professionals looking to develop a more mature proactive approach to vulnerability management.

    In this webinar cover:

    "How Kenna Exploit Prediction has delivered 94 percent predictive accuracy
    "How to adopt a proactive approach to contextualize, prioritize and remediate vulnerabilities, based on risk
    "How the Kenna Security Platform with Exploit Predictions can help align security, IT operations, and executive management with a single view of risk
    "A demonstration of the Kenna Security platform with the new Exploit Prediction capabilities
  • Cloud Security - 5 Best Practices To Use in 2018
    Cloud Security - 5 Best Practices To Use in 2018 Rich Campagna and Salim Hafid Mar 21 2018 5:00 pm UTC 60 mins
    As corporate data moves into cloud applications like Office 365, Box, and Salesforce, organizations are forced to rethink their security posture. Modern threats to cloud data range from unauthorized access to uncontrolled BYO devices. IT leaders need a forward-thinking approach to cloud security and must consider best practices when expanding the enterprise's cloud footprint, including proper identity management, comprehensive visibility, and zero-day control to name a few.

    Join cybersecurity experts Rich Campagna, Bitglass, Chief Marketing Officer and Salim Hafid, Bitglass, Product Marketing Manager for a deeper dive on these cloud security best practices.

    •Explore the tools and training you need to protect data in any application
    •Learn how cloud-first organizations are securing corporate data
    •Gain insights to better enable employee productivity and mobility
  • Taking an Enterprise Class Approach to Data Lakes and Modern Analytics
    Taking an Enterprise Class Approach to Data Lakes and Modern Analytics Jay O'Leary, Solution Architect, Cloudera & Murthy Mathiprakasam, Director of Product Marketing, Informatica Mar 21 2018 5:00 pm UTC 60 mins
    Are you struggling to turn big data into useful, accurate, consistent, and impactful insights? Organizations are rapidly adopting new technologies like Hadoop, Spark, and Kafka to help lines of business develop new insights. However, with the sheer quantity of data available and complexity of new technologies, the opportunity to drive operational efficiencies and grow sales can feel overwhelming, inflexible, manual, and complex. Informatica's customers have successfully pursued digital transformation strategies through more systematic approaches for getting the right data, in the right place, at the right time to the right people.

    In this webinar, learn how to:

    • Design an architecture for data management with Hadoop and big data that can scale for large organizations
    • Understand best practices for data integration, data quality, data cataloging, and data preparation
    • Exploit automated approaches to data management to get more trusted data assets every time

    Join experts from Cloudera and Informatica to learn about an enterprise approach to data management that enables big data to be turned into useful, accurate, consistent, and impactful business insights.
  • [Webcam Panel] Threats and Cyber Resilience
    [Webcam Panel] Threats and Cyber Resilience Dan Paltiel (US Bank) | Ben Johnson (Obsidian Security) | Roselle Safran (Rosint Labs) Mar 21 2018 5:00 pm UTC 60 mins
    Cybersecurity is a key priority for CISOs in 2018. What are the cyber threats CISOs should be aware of? How can we build more resilient enterprises in an age of relentless cyber attacks?

    Join this interactive panel to learn more about:
    - The latest cyber threats
    - New attack trends
    - Fighting cyber crime in an age of breaches and stolen personal information
    - Understanding your cyber risk
    - CISO priorities for 2018

    - Dan Paltiel, Security Intelligence Analyst, ‎U.S. Bank
    - Ben Johnson, CTO and Co-founder of Obsidian Security
    - Roselle Safran, President of Rosint Labs
  • Gain Panoramic Perspectives with Product Roadmaps
    Gain Panoramic Perspectives with Product Roadmaps Andy Jordan, Roffensian Consulting Inc. and Jim Tisch, CA Product Marketing Mar 21 2018 5:00 pm UTC 60 mins
    Organizations create roadmaps to communicate strategy. Roadmaps must have the right level of granularity and connect strategy with implementation to ensure desired outcomes are achieved and value is delivered. Roadmaps provide the benefit of visualizing future business outcomes in order to make better-informed investment decisions.

    Join Andy and CA’s Jim Tisch as they address:
    •Why product roadmaps are more important than ever in an agile operating environment
    •How roadmaps can be leveraged to develop proactive solutions that guide industry trends
    •The importance of integrated product and project portfolio management
    •The need for active roadmap management across the entire product portfolio

    This webinar will not only challenge your assumptions on modern business management, it will provide you a tangible action plan to improve your success through better product roadmap management. Don’t miss out, sign up today.
  • The Anatomy of a 5-Star Employee Experience
    The Anatomy of a 5-Star Employee Experience Stacey Prezel, Meghan Lockwood Mar 21 2018 5:00 pm UTC 60 mins
    How can ServiceNow transform your HR Service Delivery? Start simplifying HR processes, reducing time spent on routine tasks, and modernizing the employee service experience.

    - The Big Picture: Why are we all investing in HR?
    - Real World Examples: What's possible in HRSD
    - Build your Business Case: Alignment, Impact, and your 4 steps to a killer pitch
    - Questions to expect: New demands and changes we see with Acorio clients as ServiceNow HRSD expands
  • Three Ways That Operators Can Fix Slowdowns and Improve Cluster Performance
    Three Ways That Operators Can Fix Slowdowns and Improve Cluster Performance Kirk Lewis Mar 21 2018 6:00 pm UTC 60 mins
    Despite tremendous progress, there remain critically important areas, including multi-tenancy, performance optimization, and workflow monitoring where the DevOps team still requires management help. In this webinar, presenter Kirk lewis discusses the ways that big data clusters slow down, how to fix them, and how to keep them running at an optimal level. He also presents an overview of Pepperdata operation performance management (OPM) solutions. In this online webinar followed by a live Q and A, Field Engineer Kirk Lewis discusses:

    • How Pepperdata Cluster Analyzer helps operators overcome Hadoop and Spark performance limitations by monitoring all facets of cluster performance in real time, including CPU, RAM, disk I/O, and network usage by user, job, and task.

    • How Pepperdata Capacity Optimizer increases capacity utilization by 30-50% without adding new hardware

    • How Pepperdata adaptively and automatically tunes the cluster based on real-time resource utilization with performance improvement results that cannot be achieved through manual tuning.

    Presenter Bio

    Kirk Lewis joined Pepperdata in 2015. Previously, he was a Solutions Engineer at StackVelocity. Before that he was the lead technical architect for big data production platforms at American Express. Kirk has a strong background in big data.
  • Making Threat Intelligence Affordable for the Mid-Market
    Making Threat Intelligence Affordable for the Mid-Market Vice President of Customer Support James Carnall and Vice President of Intelligence Operations Eric Olson Mar 21 2018 6:00 pm UTC 60 mins
    Phishing, ransomware, and data breaches plague organizations of all sizes and industries, but the financial services market has always had the largest target on its back. As a mid-market financial organization, how do you fend off these attacks when you don’t have the budget for everything you need: data feeds, tools, analysis and mitigation?

    The answer: “Threat Intelligence-as-a-service.” This, robust, cost-effective option, brings together dozens of structured threat intelligence feeds, online monitoring of social media and the dark web, and round-the-clock human review to give you vetted, relevant intelligence specific to your organization. Even better, there is no hardware or software to install, this is a completely managed service that can be up and running in hours or days. It finally puts “big bank” threat intelligence capabilities within the reach of smaller organizations.

    Join LookingGlass’ Vice President of Customer Support James Carnall and Vice President of Intelligence Operations Eric Olson on Wednesday, March 21 @ 2pm ET as they discuss how threat intelligence can be affordable for mid-market organizations with LookingGlass’ Information Security-as-a-Service package, a new offering tailor made for your organization’s cybersecurity needs.
  • 5 Cyber Attack Trends from the Threatscape
    5 Cyber Attack Trends from the Threatscape Corey Williams, Senior Director of Products and Marketing Mar 21 2018 6:00 pm UTC 60 mins
    2017 was full of sensational breach headlines—a year full of high-profile news about companies impacted by all sorts of malware and ransomware.

    It’s not surprising, then, that CEOs are reacting to these reports. CEOs overwhelmingly cite malware as the most important cybersecurity risk threatening their organization’s success.

    But technical officers on the front lines (CIOs, CTOs and CISOs) see it differently: They point to identity breaches—including privileged user identity attacks and default, stolen or weak passwords—as the biggest threat.

    Join us for a live webinar that examines recent trends and research on cyber attacks. You will learn about:

    - Recent malware attacks including wannacry, petya, notpetya and badrabbit
    - Current research asking CEOs about cybersecurity strategy and spending
    - The most common cause of breaches that you may be overlooking — compromised credentials
    - A surefire way to secure access without boundaries through the power of Zero Trust Security
  • The Role of the Contact Center in the Customer Experience
    The Role of the Contact Center in the Customer Experience Nate Brown Mar 21 2018 6:00 pm UTC 30 mins
    What is the strategic difference between customer service and customer experience? How can contact centers improve ROI by improving the customer experience? Join us as Nate Brown breaks it all down, and arms you with strategic direction to drive growth in the year ahead. You'll learn how to gain the buy-in you need to move your CX initiatives forward, how to find opportunities for quick wins, and how to leverage customer feedback to generate revenue. Bonus: attendees will gain free access to Nate's newly released CX Primer tool.
  • WiFi vs 5G: Is the end of wireless on the horizon?
    WiFi vs 5G: Is the end of wireless on the horizon? Paul Vanderlaan, Technical Manager - Standardization & Technology Mar 21 2018 6:00 pm UTC 60 mins
    Now that 802.11ac Wi-Fi has established itself in the market, we’re already looking at what’s in development for the next generation of wireless communications. Will communication speeds continue on their rapid upward trend and, if so, what new applications could emerge as a result? And with 5G cellular garnering a lot of attention lately, will it make a play to obsolete Wi-Fi? Register for this webinar to learn:
    -The status of 802.11ax and ay
    -An overview of 5G cellular and how it will effect wireless
    -How infrastructure will adapt to support these new developments
  • Insight-Led Selling: Selling at Private Companies’ C-Suite
    Insight-Led Selling: Selling at Private Companies’ C-Suite Stephen Timme Mar 21 2018 6:00 pm UTC 30 mins
    Over 99% of companies are private. Do you sell to these companies but are challenged to engage at the C-suite? If so, attend this webinar and learn how to develop insights into their goals, financial performance, and what matters most; and how to use these insights to gain access to C-level executives.
  • State of Cyber-Security Arms Race: Preparing for what's coming in 2018
    State of Cyber-Security Arms Race: Preparing for what's coming in 2018 Ken Dang Mar 21 2018 6:00 pm UTC 60 mins
    Examining 2017 to prepare for what's coming in 2018

    The modern cyber war — against governments, businesses and individuals alike — is comprised of a series of attacks, counterattacks and respective defensive countermeasures. The SonicWall 2018 Cyber Threat Report provides exclusive data that highlights advances by both the security industry and cyber criminals.

    Attend this webinar to gain a better understand the current State of Cyber-Security Arms Race. We’ll share our findings, intelligence, analysis and research to help you improve your security preparations and posture going forward.
  • Is Microsoft Office 365™ Good Enough Protection and Recovery?
    Is Microsoft Office 365™ Good Enough Protection and Recovery? Shane Harris - Director Product Marketing, Mimecast & Glenn Brown - Director Product Management, Mimecast Mar 21 2018 6:00 pm UTC 60 mins
    While every organization needs to keep data protected and accessible for its users, many are unaware of the risky protection and recovery gaps when malicious attacks occur or point-in-time recovery is required. Many organizations are asking themselves, “Is Microsoft O365 good enough protection and recovery?” or “Is my on-premises backup solution enough?” Join this webinar to learn where your biggest risks are and how to mitigate them.

    Presenter Info:

    Shane Harris - Director Product Marketing, Mimecast

    Shane Harris has had varied experience spanning 20 years across IT, Product Management, Sales, Engineering and Research Analyst roles in the areas information management, eDiscovery, archive and compliance. Prior to Mimecast , Shane was the lead analyst for the Enterprise Information Archiving Magic Quadrant at Gartner and has held executive leadership positions at kCura, Commvault and Johns Hopkins. In these roles, he has held countless customer conversations across all verticals and was a frequent speaker, presenter and thought-leader at industry events.

    Glenn Brown - Director Product Management, Mimecast

    Glenn joined Mimecast in 2007 and is responsible for Mimecast’s archiving, compliance and data resilience products group. He is tasked with defining and bringing the product roadmap from vision to reality and is a passionate advocate of cloud technology enabling strong data resilience strategies.
  • No Safe Harbors: Charting a Smarter Course
    No Safe Harbors: Charting a Smarter Course Mark DuPont, Alan Rudd, Sage Wagner Mar 21 2018 6:00 pm UTC 60 mins
    Is the status quo really an option? What do maritime stakeholders (shipping companies, terminal operators, cruise lines, port authorities) need to do to prevent, prepare for and respond to the next attack on the horizon?

    To coin an old adage that has been used in many sports discussions and is also known as a principal of war, "The best defense is a good offense." This webinar will demonstrate tools and resources that maritime stakeholders can utilize to be Proactive and control their cyber risk.

    This webinar, focused on maritime operations, will provide unique insights of the recent cyber events and emerging threats. We will also:
    • Discuss nationally-recognized solutions and management approaches that can lead your organization to a proactive and predictive posture with a Cyber Risk Management strategy,
    • Include experts from a “bench” of cybersecurity experts that are recognized internationally for their knowledge and skills,
    • Demonstrate our Cyber Risk Management platform that can give you the “Situational Analysis and Awareness” that you need in today’s rapidly expanding and complex environment, and
    • Learn how we can provide you the same resources that the Department of Defense, NASA, and other federal agencies use and trust, with RiskSense.

    Attending this webinar will provide you and your staff valuable insights and offer a course of action that can be a game changer for all maritime organizations
  • Case Study: Measuring How Out-of-Home Increases Foot Traffic
    Case Study: Measuring How Out-of-Home Increases Foot Traffic Aaron Stewart & Shawn Spooner Mar 21 2018 6:00 pm UTC 30 mins
    For decades, OOH measurement was limited to impressions. But all that is changing. By using mobile data, we’re now able to track the movements of people who pass by an out-of-home unit. Combined with the right data science, measurement goes beyond simple impressions to a true map of your OOH campaign’s impact.

    In this webinar, our Science Product Director Aaron Stewart and Chief Scientist Shawn Spooner will walk you through a real campaign that we tracked. You’ll get a chance to see advanced measurement in action and how it answers these key marketing questions:

    How many people saw the ad, then went to the client location?
    Who are these visitors? Where do they go and what do they do?
    How do I target people who saw my ad with online ads?
    How can we build a stronger audience profile?

    We are on the cusp of a whole new world that integrates out-of-home seamlessly into our technological society. And observational results are only the beginning. Join us to see how data science and technology are changing the out-of-home world.