Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • A-Z BASIC SECURITY AWARENESS SERIES - AUTHORITY PRINCIPLE
    A-Z BASIC SECURITY AWARENESS SERIES - AUTHORITY PRINCIPLE
    JENNY RADCLIFFE Recorded: Mar 23 2019 2 mins
    In this basics of security awareness series, we look at how the principle of authority discussed by Robert Cialdini in his book Influence as well as elsewhere, can be used by malicious social engineers to gain compliance. How can we counter this tactic, and what do we look for to recognise it when it happens.
  • A-Z BASIC SECURITY AWARENESS SERIES INTRODUCTION
    A-Z BASIC SECURITY AWARENESS SERIES INTRODUCTION
    JENNY RADCLIFFE Recorded: Mar 23 2019 1 min
    Introduction to our basics of Security Awareness Series detailing tips, hints and advice for those family, friends and colleagues not in the security industry who would appreciate simple advice on how to be more secure, especially from fraudsters, con artists, scammers and malicious social engineers.
  • FAQS WHAT ABOUT INSIDER THREAT? SOCIAL ENGINEERING
    FAQS WHAT ABOUT INSIDER THREAT? SOCIAL ENGINEERING
    JENNY RADCLIFFE Recorded: Mar 23 2019 8 mins
    In the last of our series of FAQS on Social Engineering we look at how the practice is related to Insider Threat and especially the 4 M's of Mistake, Mischief, Malice and Money.
  • FAQS SOCIAL ENGINEERING RED FLAGS
    FAQS SOCIAL ENGINEERING RED FLAGS
    JENNY RADCLIFFE Recorded: Mar 23 2019 4 mins
    Answering the question "Are there any red flags in social engineering?" this video explains the basics of what to look for in a potential approach from a fraudster, con artist or malicious social engineer. Intended for those who are unfamiliar with the term, these videos explain the basics of social engineering in a simple and straightforward manner.
  • FAQS  WHY SOCIAL ENGINEERING/
    FAQS WHY SOCIAL ENGINEERING/
    JENNY RADCLIFFE Recorded: Mar 23 2019 4 mins
    In episode 3 of our series on the basics of social engineering we answer the question "Why Social Engineering?" Looking at why the practice is still so widespread and effective in the digital age.
  • FAQs  Who is at risk? SOCIAL ENGINEERING
    FAQs Who is at risk? SOCIAL ENGINEERING
    JENNY RADCLIFFE Recorded: Mar 23 2019 6 mins
    The second of our video FAQS series about the basics of Social Engineering, answers the question "who is at risk?" and looks at why hacking the people is still so prevalent in the digital age.
  • CISO of William’s Engineering Shares How They Solved O365 Security Challenges
    CISO of William’s Engineering Shares How They Solved O365 Security Challenges
    Graeme Hackland, Chief Informations Officer, Williams Group Recorded: Mar 22 2019 3 mins
    (2:28 Customer Testimonial Video)
    Learn how William’s Racing Group has secured email, data, and threat from account takeover in their Office 365 (O365) environment.
  • CISO of Natural Gas Distribution Company Discusses Security for Office 365
    CISO of Natural Gas Distribution Company Discusses Security for Office 365
    Mo Ahddoud, Chief Information Security Officer, SGN Recorded: Mar 22 2019 2 mins
    (1:47 Customer Testimonial Video)
    Hear how SGN secures their Office 365 instance with Symantec solutions for cloud visibility and control
  • Build Security In: Cloud Security at DevOps Speed
    Build Security In: Cloud Security at DevOps Speed
    Rick Collette, Cloud Architect at Palo Alto Networks; John Martinez, Director of Public Cloud R&D, Palo Alto Networks Recorded: Mar 22 2019 55 mins
    As DevSecOps adoption slowly goes mainstream among organizations, it is fundamentally changing the culture and collaboration semantics among security, development and operations teams.
    This webinar will explore whether SecOps and DevOps have been effective in fostering collaboration to align their different goals into a single effort or have they slipped into implementing primitive security models of the past. Is the union of DevOps and SecOps on rocky ground and in need of marriage counseling, or are they copacetic? In this webinar, we’ll explore the needs of DevOps, Security and IT and five principles that will help you move at the speed of cloud together without creating gaps in your security posture.
  • ISSA Thought Leadership Series: 10 Must-Have Features of a Modern SIEM
    ISSA Thought Leadership Series: 10 Must-Have Features of a Modern SIEM
    ISSA International Recorded: Mar 22 2019 57 mins
    With the return of innovation to the SIEM market, the definition of what comprises an effective solution has changed. Join Exabeam for an informative discussion on the ten essential features and capabilities for IT security decision makers to look for when evaluating potential candidates. Discussion points include:

    - Advanced processing and analytics
    - Automated threat detection and prioritization
    - Facilitated incident investigation and triage
    - Proactive (and reactive) threat hunting

    Moderator:
    Lucas Varela, CyberSecurity Architect, Caixabank

    Speakers:
    Orion Cassetto, Sr. Director Product Marketing, Exabeam
    Brian Engle, CISO, Managing Director CISO Advisory, CyberDefenses, Inc.
  • ¿Cómo crecer el Customer Share?
    ¿Cómo crecer el Customer Share?
    Marcelo Garrido Recorded: Mar 22 2019 46 mins
    Estrategias para aumentar el consumo regular de los clientes actuales mediante la comprensión de sus motivaciones y barreras.
  • HPE Recovery Manager Central : Delivering a DataOps experience for Hybrid Cloud
    HPE Recovery Manager Central : Delivering a DataOps experience for Hybrid Cloud
    Bharath Ram Ramanathan, Principal Technical and Solutions Marketing Manager - HPE Storage Recorded: Mar 22 2019 60 mins
    Data is the lifeblood of business. A company’s data is usually copied at least once, and often multiple times, to meet the needs of various use cases such as clones for test/dev or analytics, backup copies for data protection, archival copies for compliance, instant recovery copies, or, any particular set of data is likely to have spawned one or more copies. Copies are so important that they now consume 60% of total storage capacity for the average enterprise – even more than production data. While these copies are nearly always made for a good reason, in many organizations they have spiralled out of control, creating a copy data sprawl that is tough for IT to get its arms around, let alone manage.
    So how do you protect this important asset, grant copies to all who need it, and avoid paying for extra storage capacity – on-premises and in the cloud? HPE Storage’s Recovery Manager Central (RMC) for 3PAR and Nimble Storage platforms delivers a single-pane-of-glass for Copy Data Management and Data Protection for a variety of workloads such as VMware, Oracle, SQL Server, Exchange, SAP HANA and more. In this talk, we will cover how RMC delivers a DataOps experience for 3PAR and Nimble platforms with live demos.
  • XDR - Neue Waffe im Kampf gegen Cyber-Angriffe
    XDR - Neue Waffe im Kampf gegen Cyber-Angriffe
    Chistian Doolmann, Systems Engieneer Specialist, Palo Alto Networks Recorded: Mar 22 2019 63 mins
    Cyber-Attacken erfolgen heutzutage häufig direkt über gezielt ausgewählte Endgeräte. Daher setzen viele Unternehmen auf EDR (Endpoint Detection and Response) als Lösung, um Cyberangriffe zu erkennen und darauf zu reagieren.

    Das Problem dabei: Die Sicht von EDR ist auf den jeweiligen Endpoint beschränkt, ergänzende Informationen fehlen und müssen mühsam und aufwändig ergänzt werden. Laut SANS Institute werden zudem nur 26% aller initialen Angriffsvektoren durch EDR-Lösungen erkannt.

    Eines wird dabei deutlich: Ein neuer Ansatz muss her! Und hier kommt XDR ins Spiel. Im Gegensatz zu EDR kombiniert es Daten aus verschiedenen Quellen wie zum Beispiel den Endpoints, dem Netz, der Cloud, Log-Daten mit allgemeinen Bedrohungsinformationen. Dadurch bringt es unterschiedliche Aspekte zusammen und liefert ein weitaus vollständigeres Bild eines Angriffs – der dank der integrierten Analysefunktionen schneller erkannt und besser abgeblockt werden kann.

    Wenn Sie erfahren wollen, wie Ihr Unternehmen dank XDR sicherer werden kann, dann sehen Sie sich dieses Webinar an.
  • The Digital Workforce Wants YOU: Consider a Career in Cybersecurity
    The Digital Workforce Wants YOU: Consider a Career in Cybersecurity
    Patrick G. Cohen, VP, Strategic Partnerships, NPower, Inc. Recorded: Mar 22 2019 30 mins
    According to a study by the Center for Cyber Safety and Education, by 2022, there will be a shortage of 1.8 million information security workers. Key influencers like teachers, parents, state and local officials are encouraged to join this webinar to learn more about this growing field and how to engage youth in pursuing cybersecurity careers.
  • The Impact of Late Payments on UK SMEs
    The Impact of Late Payments on UK SMEs
    Dun & Bradstreet Recorded: Mar 22 2019 2 mins
    Tim Vine, Head of European Trade Credit at Dun & Bradstreet discusses the ever increasing impact of late payments on UK small-medium businesses, as well as the results on our latest SME-focused study “Brexit & Beyond”. For more information visit www.dnb.co.uk/smallbusiness
  • Cyber Security Brief: Japan to hack IoT devices, Facetime bug, and BEC scams
    Cyber Security Brief: Japan to hack IoT devices, Facetime bug, and BEC scams
    Cyber Security Brief Podcast Recorded: Mar 22 2019 25 mins
    We discuss authorities' pursuit of Webstresser users, Japan allowing officials to hack civilians’ IoT devices in an attempt to improve security, and the much-discussed Apple Facetime bug. We also chat about the Razy malware attempting to steal cryptocurrencies, an evolution of business email compromise (BEC) scams, and a bizarre sting operation targeting the Citizen Lab internet watchdog group.
  • Be More Calm, Energised & Productive
    Be More Calm, Energised & Productive
    Harriet Waley-Cohen, Speaker and certified coach Recorded: Mar 22 2019 60 mins
    With devices constantly pinging and stealing our attention and flow, and ever increasing demands on our time from all quarters, it can feel hard at times to stay calm, keep your energy up and maximise the use of your time to get everything you want done.

    So often when you ask friends and colleagues how they are, they they snap back that they are 'tired', 'stressed', 'got far too much on to fit into the day' or even 'can't stop to chat, must keep going' usually with a big sigh and a look of slight panic or despair on their face. Instead of being one of those people, wouldn't it be amazing to feel energised, to feel calm and to know how to stay productive so that you feel in control of your professional and personal life?

    Take an hour out and reflect on
    - What eats away at and what creates energy, so that you can feel full of bounce when it matters most to you.
    - Ways to stay calm no matter what, and how to understand triggers and behaviours that destroy your calm.
    - Productivity hacks, including examining whether it really is possible to multitask or whether it's all just a myth.
  • MetLife walkthrough/refresher
    MetLife walkthrough/refresher
    Stuart Isaac Recorded: Mar 22 2019 34 mins
    MetLife walkthrough/refresher
  • UBS Asset Management: Real Estate Summary, Edition 1, 2019
    UBS Asset Management: Real Estate Summary, Edition 1, 2019
    Zachary Gauge & Paul Guest Recorded: Mar 22 2019 5 mins
    The enduring appeal of private equity real estate was reinforced by the volatility in more liquid assets at the end of 2018. This popularity was reflected in last year's investment volumes as well as 2019's first investor intention surveys. Fundamentals are broadly healthy, but the pace of price growth has slowed and the focus is now on the value of income
  • Refuerce su seguridad con los firewalls virtuales de SonicWall
    Refuerce su seguridad con los firewalls virtuales de SonicWall
    Alex Vazquez Recorded: Mar 22 2019 36 mins
    Con el incesante aumento de la adopción de la nube, las prestaciones de firewall de próxima generación resultan esenciales para proteger las cargas de trabajo en la nube contra las amenazas avanzadas mediante funciones automatizadas de detección y protección en tiempo real.

    Participe en este seminario virtual interactivo, en el que los expertos de SonicWall le explicarán cómo la serie de firewalls SonicWall Network Security virtual (NSv) puede ayudarle a reforzar la seguridad de sus entornos híbridos y multinube. Obtendrá información sobre:

    •Las principales tendencias y amenazas de la industria
    •Cómo NSv es capaz de proteger de forma efectiva todos los componentes críticos de sus entornos de nube pública o privada
    •Cómo garantizar la protección contra la propagación lateral de las amenazas y una seguridad coherente
    •Cómo detener las amenazas avanzadas
    •Además, podrá ver una demostración en directo
  • SUSE und Protosoft: Software Defined Storage - schlüsselfertiges Komplettsystem
    SUSE und Protosoft: Software Defined Storage - schlüsselfertiges Komplettsystem
    Thomas Grätz, Sales Engineer, SUSE Linux GmbH, Michael Hojnacki, Geschäftsführer, ProtoSoft AG Recorded: Mar 22 2019 53 mins
    Mit der digitalen Transformation setzt sich das Datenwachstum ungebremst fort. Softwarebasierte-Storage-Lösungen sind die optimale Antwort auf steigende Datenmengen und wachsende Anforderungen an Datenspeicher. Günstiger und skalierbarer als konventionelle Lösungen werden sie hohen Ansprüchen an Verfügbarkeit und Performance gerecht. SUSE Enterprise Storage bietet eine offene Technologie auf Ceph-Basis, die selbstverwaltenden Speicher, praktisch unbegrenzte Skalierbarkeit und höchste Verfügbarkeit kombiniert.

    Als langjähriger SUSE-Partner hat ProtoSoft gemeinsam mit SUSE ein schlüsselfertiges Komplettsystem bestehend aus Soft- und Hardware für den Einsatz vor Ort oder im Rechenzentrum konzipiert. ProtoSoft Enterprise Storage ist ein vorkonfiguriertes System inklusive aller nötigen SUSE-Subskriptionen, 12 Monaten Priority Support sowie Vor-Ort-Installation, das für alle Storage-Aufgaben im Unternehmen oder im Data Center gerüstet ist. Im Webinar geben wir Ihnen Einblick in die neuesten Benchmark-Tests. Melden Sie sich jetzt an!

    Agenda im Überblick
    •SUSE + Protosoft: eine erfolgreiche Partnerschaft
    •Warum Software Defined Storage?
    •Vorstellung der Hardware- und Software-Konfiguration
    •Benchmarks der Konfigurationen
    •Neuerungen in SUSE Enterprise Storage 5.5 und Ausblick auf SUSE Enterprise Storage 6
  • Japanese Equities – Investing in Growth
    Japanese Equities – Investing in Growth
    Mitsuhiro Yuasa Recorded: Mar 22 2019 50 mins
    Mitsuhiro Yuasa provides an update regarding the current macroeconomic environment in the Japanese equity markets and how he and his team are positioning the E.I. Sturdza Strategic Japan Opportunities Fund accordingly, with a focus on companies with consistent revenue / profit growth and strong management regardless of size, history, brand or market capitalization.
  • Matkalla vielä paremmaksi asiakaspalveluyksiköksi
    Matkalla vielä paremmaksi asiakaspalveluyksiköksi
    Jani Iivonen, Elina Soukola Recorded: Mar 22 2019 38 mins
    Mitkä ovat toiminnan kehittämisen kilpailut, mitä niistä saa ja kuka niihin voi osallistua? Tämän maksuttoman webinaarin jälkeen tiedät, miksi myös teidän asiakaspalveluyksikön kannattaa ottaa osaa Vuoden Contact Center tai Vuoden Service Desk 2019 -kilpailuun tai valmistautua vuoteen 2020!

    Webinaarissa esitellään ensin Vuoden Contact Center -kilpailu ja jäljempänä Vuoden Service Desk -kilpailu. Molemmat kilpailut sisältävät itsearvioinnin sekä finalisteille auditoijien toteuttaman auditoinnin. Puhumassa ovat kilpailuiden pääauditoijat Elina Soukola, Prakto sekä Jani Iivonen, Wakaru Oy.

    Vuoden Contact Center -tittelistä kisaavat Suomen parhaat contact center -tiimit! Wave eli Wakarun Asiakaspalveluverkosto järjestää kilpailun yhteistyössä Kehittämistoimisto Prakto Oy:n kanssa. Contact Center Assessment -ohjelmassa (CCA) palvelukeskuksen toiminta arvioidaan kuuden keskeisen osa-alueen osalta.

    Vuoden Service Desk -tittelistä kisaavat Suomen parhaat service desk -tiimit! Kisaan voivat osallistua yksityisen tai julkisen sektorin organisaatiot, niin isot kuin pienet yksiköt. Kilpailussa on yksi sarja. Arvioinnissa huomioidaan yksikön koko, toiminnan luonne ja sen luomat tarpeet. Arviointiin on Kansainvälisen HDI-tukipalvelustandardin (The HDI Support Center Standard 2014) lisäksi sisällytetty ITILiä eli IT -palvelunhallinnan parhaita käytäntöjä sekä soveltuvia osia ISO/IEC 20000 -standardista.
  • Micro Focus Container Deployment Foundation
    Micro Focus Container Deployment Foundation
    Владислав Михайлов, технический консультант Micro Focus в России Recorded: Mar 22 2019 40 mins
    Micro Focus Container Deployment Foundation (CDF) обеспечивает гибкость развертывания и упрощенное администрирование в приложениях ITOM. CDF работает под управлением Kubernetes - которое управляет и запускает контейнеры Docker на большом количестве хостов, а так же обеспечивает совместное размещение и репликацию большого количества контейнеров.
  • 2019 Health Predictions - Employee Benefits Advice
    2019 Health Predictions - Employee Benefits Advice
    Joan Collar, Asia Employee Health and Benefits Leader, and Alice Harkness, Asia Employee Health and Benefits Consultant Recorded: Mar 22 2019 44 mins
    Mercer Marsh Benefits' International Health Predictions provide insight into ten areas of potential change in the 2019 health landscape.

    Join us as we explore:
    - Which of these predictions are most relevant in Asia.
    - How employers should consider them when designing and delivering employee health and benefits programs.
    - Solutions to help employers navigate these changes.
  • SEP Cloud Powerful, yet simple to use
    SEP Cloud Powerful, yet simple to use
    Symantec Mar 25 2019 10:00 am UTC 5 mins
    Delivered endpoint security services can provide powerful threat protection efficacy using the IT headcount already in place supporting your business. In this 5 minute video we will demonstrate the Symantec Endpoint Protection Cloud solution, and show how to get
    endpoint security up and running in as little as 5 minutes using the same powerful protection as large enterprises.
  • Three keys to business planning success in 2019
    Three keys to business planning success in 2019
    Simon Tucker, Anaplan | Ron Dimon, Deloitte Consulting | Chandana Gopal, IDC | Jeff Brobst, Seagate Mar 25 2019 10:15 am UTC 58 mins
    Business planning is a simple idea in concept but in reality, it’s a complex activity woven of data, people, process, and plans. We surveyed 1000+ planning professionals across 45 countries and 18 industries to shed light onto how organizations are accelerating business value through Connected Planning.
    In this webinar, we will discuss the key findings and ask our panel of experts for their predictions on how organizations should plan their way to success in 2019 and beyond.

    In this webinar, our panel will:
    •Share their business planning predictions for 2019
    •Discuss the most intriguing data from the survey
    •Provide tips on turning Connected Planning into a competitive advantage

    About the speakers:
    Simon brings over 15 years of experience in EPM and BI to Anaplan. Prior to Anaplan, Simon was head of product marketing for Adaytum until the acquisition by Cognos in 2003.

    Ron Dimon has been designing and implementing EPM and Connected Planning solutions for 18 years. The author of “Enterprise Performance Management Done Right” (Wiley, 2013) and the forthcoming “Connected Planning: A Playbook for Agile Decision Making” (Wiley, Dec. 2018), Ron helps clients improve their strategic, financial, and operational performance through better planning, analytics, and decision-making.

    Chandana Gopal is Research Manager for IDC Business Analytics software responsible for the advanced and predictive analytics practice. Ms. Gopal’s core research coverage includes the vendor and buyer research in BI and predictive analytics.

    Jeff Brobst is responsible for driving optimal financial results through the implementation and management of world-class processes and systems in addition to developing high performance teams. His expertise not only relates to financial planning processes and systems implementations but also accounting & business process management.
  • Improving Decision Making and Expert Judgement
    Improving Decision Making and Expert Judgement
    Liz Taylor Mar 25 2019 11:00 am UTC 75 mins
    This webinar introduces some important techniques for making decisions under stress, on time, without bias, and in group environments.

    As an introduction to the one day seminar on Improving Decision Making and Expert Judgement on 4th April 2019, you will get a flavour of the course to help you understand the breadth and depth of the subject and techniques taught.
  • MDM and Data Governance
    MDM and Data Governance
    Josiah kimani, Nicola Askham Mar 25 2019 12:15 pm UTC 45 mins
    The next Master Data Management (MDM) webinar will focus on the effect that MDM has in ensuring that a Data Governance (DG) strategy comes to life. Many organizations have a great Data Governance strategy but struggle with buy in. Equally, many organizations have a great desire to resolve Data Quality issues, harmonize data across the enterprise, de-duplicate data and drive data ownership using technology. Could the two, DG and MDM, be the perfect combination to deliver the necessary solution that meets the business strategies? Josiah Kimani of Profisee will be answering this question
  • Cyber Security Brief: Financial institutions hack, VPN apps, and FB account remo
    Cyber Security Brief: Financial institutions hack, VPN apps, and FB account remo
    Cyber Security Brief Podcast Mar 25 2019 2:00 pm UTC 22 mins
    Symantec threat researcher Stephen Doherty joins us to discuss our recently published research into a wave of attacks against financial institutions in West Africa. We also discuss some new research that found that many free mobile VPNs could actually compromise people’s privacy, a hitman who was convicted thanks to evidence found on his smartwatch, and an embarrassing compromise of the ATLAS MMO game. Also this week, Russia is back in the headlines again, with the DNC revealing it was targeted once again by a spear-phishing campaign originating in Russia in November last, while Facebook also removed a number of “inauthentic” accounts that it says were based in Russia and involved in spreading misinformation on the social media platform.
  • Extractables and Leachables have been used interchangeablely for too long. Are w
    Extractables and Leachables have been used interchangeablely for too long. Are w
    Ken Wong, Deputy Director at Sanofi Pasteur and Don DeCou, Extractable and Leachable Technology Manager at West Pharma Mar 25 2019 2:00 pm UTC 75 mins
    Extractables and Leachables have been used interchangeablely for too long. Are we still confused?

    The terminologies of “Extractable” and “Leachable” have been used interchangeably to describe test data from a study which fall in between a grey zone of typical “Extractable” or “Simulation” and “Leachable” study. During this webinar, we will explore to better understand what are the key challenges with case study and survey this grey area to capture the view of all participants.”

    Presented by Ken Wong, Deputy Director at Sanofi Pasteur

    Followed by Building a Bridge to Leachable Assessment

    Extractable data is a practical guide to support selection of components used in drug product container closure systems and to understand potential for leachables. Standardization of extractables testing is a topic of interest in the pharmaceutical industry and debate in the scientific community, however; the challenge for standardized tests is to verify the extent of data and type of extractions needed to drive the best decisions. As a starting point, comparative extractable data can indicate differences, but this may not be relevant to end use application. According to USP informational chapter on extractables assessment, the design of an extraction study is dictated by the purpose of the extractables assessment. This presentation will put into practice the overarching principles of USP for developing extractable study designs. Three case studies will be given representing risk of leachables across product lifecycle. Data will be shown related to the selection process, post approval changes, and considerations for biologic product quality.

    Presented by Don DeCou, Extractable and Leachable Technology Manager at West Pharmaceutical Services
  • Brexit, at the crossroads…
    Brexit, at the crossroads…
    Trevor Greetham and Melanie Baker Mar 25 2019 3:00 pm UTC 45 mins
    With the original Article 50 deadline just around the corner and a decision looming about which path we take next, Head of Multi Asset, Trevor Greetham, and Economist, Melanie Baker share their thoughts on Brexit. Trevor and Melanie will consider the impact the situation has had on the UK so far as well as the range of potential outcomes that are still on the table, from an extension to a no-deal or even no-Brexit, and what this could mean for investors. They will also share their approach to positioning funds during these unpredictable times.
  • Lessons Learned from an Enterprise-Scale Migration Project
    Lessons Learned from an Enterprise-Scale Migration Project
    Lars Muller, CRM Partners AG, TIBCO MVP Mar 25 2019 3:00 pm UTC 37 mins
    Data migration projects are growing more complex. With companies adopting more applications, especially cloud applications, and using more data sources than ever before, migrating just one system to the cloud can be a high-stakes, risky project. CRM Partners AG has a history of implementing successful migration projects, such as a recently completed project for a global manufacturer. Their methodology for data migration projects is designed to reduce the cost and risk they may encounter.

    Watch this webinar to learn:

    - The advantage of using the TIBCO Cloud™ Integration cloud-based (iPaaS) integration platform for your migration project vs. custom code
    - Key decisions you need to make at the outset of your project that will minimize risks
    - How to prepare your data for a successful migration
    - How to test and execute your migration to ensure a smooth launch
  • The Role of SRE in Continuous Testing and Continuous Delivery
    The Role of SRE in Continuous Testing and Continuous Delivery
    Shamim Ahmed Mar 25 2019 5:00 pm UTC 60 mins
    Site Reliability Engineering (or SRE) has been gaining popularity recently to help improve reliability of systems as well as a prescriptive approach to implementing DevOps. Testers similarly play a key role in helping to balance the needs of velocity with overall system quality.

    SREs develop, maintain and operate software that automates the traditional roles of the system administrator at large scale, such as configuration and cluster management systems, and that support reliability and scalability goals, such as container virtualization and the systems architecture of microservices

    In this webinar we’ll explore:
    * The synergies and differences between SREs and testers
    * How testers can work with SREs and development teams to balance the needs of velocity and quality
    * Tools to help integrate SRE into Continuous Testing and Continuous Delivery
  • Leveraging Data Analytics to Minimize Risk in the Financial Services Industry
    Leveraging Data Analytics to Minimize Risk in the Financial Services Industry
    Joshua Dennis, Ellen Lafferty, Dan Ward, A.J. Bosco Mar 25 2019 5:00 pm UTC 75 mins
    The financial services industry generates and records massive amounts of transactional, operational, and other business data on a daily basis. Yet, the challenge financial institutions face is how best to leverage myriad data sources to effectively mitigate business and regulatory risk.

    On March 25, Securities Docket presents a panel of industry and data analytics experts to help brokers, dealers, financial services leaders and their counsel turn data into valuable insights to spot and prevent fraud. Join Joshua Dennis, StoneTurn; Ellen Lafferty, HSBC; and Dan Ward, Ropes & Gray for this thought-provoking panel moderated by A.J. Bosco. Participants will gain an actionable understanding of how data analytics can be used to uncover useful information, suggest conclusions and support sound decision-making in the financial services industry.
  • Learn Why HYCU is the RIGHT Choice to Backup Nutanix!
    Learn Why HYCU is the RIGHT Choice to Backup Nutanix!
    Ed Liu, Director – ANZ/GCR Mar 25 2019 11:30 pm UTC 45 mins
    HYCU is the ONLY purpose-built backup and recovery for Nutanix. A solution that only takes 3 minutes to deploy with minimal training. It is tightly integrated with Nutanix requiring NO additional hardware, agents or licenses to run. If you need an innovative backup solution that is cost-effective, and you are sick of trying to learn another complicated backup product, then HYCU is the perfect solution for you. It was specifically designed for Nutanix administrators in mind, that is YOU.
  • Beyond the Script Apocalypse: Model Driven Pipelines and Test Automation
    Beyond the Script Apocalypse: Model Driven Pipelines and Test Automation
    Thomas Stocker, Product Manager, Tricentis and Sunil Mavadia, Customer Journey, Electric Cloud Mar 26 2019 2:00 am UTC 59 mins
    DevOps and Agile teams have already recognized that today’s “low-code/no-code” application development approaches are an efficient way to satisfy the relentless demand for more software, faster. Yet, most continue wrestling with the high-maintenance, script-based approach to software delivery and automated testing designed decades ago.

    Watch Electric Cloud and Tricentis as they share hard-won lessons that can help any organization climb out of their scripting hole—for both software test automation and the software delivery pipeline. You’ll learn how scriptless and model-based automation can help you escape the script maintenance trap—enabling you to:

    - Dedicate more time to creative tasks
    - Increase process speed, resiliency ,and scalability
    - Achieve a new level of process visibility and control
  • SUSE Enterprise Storage 5.5运维以及常用命令讲解
    SUSE Enterprise Storage 5.5运维以及常用命令讲解
    杨冬冬 Mar 26 2019 6:30 am UTC 60 mins
    运维的科学性是存储系统健壮运行的重要支持,运维的时效性是衡量一个存储系统的重要指标,运维的标准化是存储系统拓展的重要支持。SES5.5分布式存储系统,通过saltstack和deepsea交付完整高效的运维体系和常用命令,针对常见故障,系统运维人员可直接通过预置的系统命令完成日志分析、故障处理,减少系统宕机时间,提高数据的可靠性。同时,SES5.5针对硬件保养、按计划检修等日常硬件时间处理,提供了完整的上下电操作命令和操作规程,确保存储系统持续健康运行。SES5.5以其高效科学标准的运维支持,很好地保证了存储系统的拓展性、持续性、可靠性。
  • How to Automate Security and Compliance for DevOps
    How to Automate Security and Compliance for DevOps
    Raj Patel: Vice President Cloud Platform Engineering, Symantec and Sameer Vasanthapuram: Partner Solutions Architect,AWS Mar 26 2019 9:00 am UTC 47 mins
    There is a natural tension between decentralized, distributed DevOps and the traditional command-and-control approach of classic security management. When moving to the cloud, organizations must learn how to decentralize and democratize the security process.

    Join Raj Patel, Vice President Cloud Platform Engineering, Symantec and Sameer Vasanthapuram, Partner Solutions Architect, AWS to learn how to automate security into the DevOps toolchain and strike a balance between agility and security in the cloud.

    In this webinar we'll discuss:
    -How DevOps and InfoSec teams can align to the new DevSecOps paradigm
    -Why continuous compliance management is a new business imperative
    -How to build security in to your Continuous Integration/Continuous Development pipeline
  • Trust in Action: A Discussion with Kevin Fielder, CISO, Just Eat
    Trust in Action: A Discussion with Kevin Fielder, CISO, Just Eat
    Kevin Fielder, CISO, Just Eat, Justin Shaw-Gray, Sales Director, Synack Mar 26 2019 9:00 am UTC 60 mins
    Consumers are upping the ante for CISOs in 2019! >19% of consumers reported that they would not feel comfortable shopping at a store that has been breached or using an online service and 50% of consumers claim that security was a priority when choosing a bank. From eCommerce to Financial Services: trust is top of mind for consumers, and trust is becoming a core part of the CISO charter.

    Join Synack's Justin Shaw-Gray as he interviews Kevin Fielder, CISO, Just Eat
    They'll discuss:

    - The security challenges CISOs face in eCommerce and how they are integrating crowdsourced security into their day-to-day operations to build trust with the board and with customers.
    - What security’s role is in building a trusted business
    - How to plug security into DevOps
    - And Kevin's perspective on which security programs are actually worthwhile and where innovation is needed. What works? What doesn’t?

    You won’t want to miss this lively discussion
  • Webinar: Das Reifegradmodell für die Verwaltung von Sicherheitsrichtlinien
    Webinar: Das Reifegradmodell für die Verwaltung von Sicherheitsrichtlinien
    Marco Miska, Technical Account Manager EMEA Mar 26 2019 9:00 am UTC 60 mins
    Ihre Teams haben Schwierigkeiten, mit der Häufigkeit von Netzwerksicherheitsanfragen Schritt zu halten, während sie gleichzeitig versuchen die Agilitätsinitiativen Ihres Unternehmens zu unterstützen und die Sicherheit zu wahren.

    Sie kennen die Vorteile der Automatisierung, fragen sich aber wahrscheinlich: "Wo fangen wir an?"

    Besuchen Sie die Experten von Tufin am 26. März um 10.00 Uhr, um nützliche Tipps für den Einstieg in die Zero-Touch-Automatisierung zu erhalten:

    • Warum aktuelle Ansätze nicht funktionieren
    • Wie können begrenzte Ressourcenherausforderungen überwunden werden?
    • Die Schritte, die Sie unternehmen müssen, um das ultimative Ziel zu erreichen: Zero-Touch-Automatisierung
  • Anleitung zum Kampf gegen bösartige Bots
    Anleitung zum Kampf gegen bösartige Bots
    Frank Thias - Principal Systems Engineer, F5 Networks Mar 26 2019 9:00 am UTC 62 mins
    Das Erkennen von bösartigen Bots und der Schutz vor ihnen hat für Unternehmen, die eine nachhaltige Sicherheitsstrategie entwickeln, höchste Priorität. Nehmen Sie an diesem Webinar teil, um zu erfahren:

    • Wie Bots Anwendungen infizieren, verbreiten und angreifen
    • Welche Arten von Anwendungsangriffen häufig von Bots ausgeführt werden.
    • Wie Sie sich gegen schlechte Bots verteidigen können, ohne die guten zu stören.

    Durch Ihre Teilnahme an diesem Webinar werden Ihre persönlichen Daten an F5 weitergegeben und in Übereinstimmung mit den F5-Datenschutzrichtlinien behandelt (https://f5.com/about-us/policies/privacy-policy). Zudem stimmen Sie zu, dass wir Sie zukünftig auch über F5-Produkte und -Dienstleistungen informieren dürfen. Sie können dies natürlich jederzeit widerrufen.
  • The Accelerate State of DevOps Report
    The Accelerate State of DevOps Report
    Dr. Nicole Forsgren, CEO, DevOps Research and Assessment (DORA) and Richard Seroter, Sr. Director of Product, Pivotal Mar 26 2019 9:30 am UTC 60 mins
    The Accelerate State of DevOps Report is the result of five years of research—with over 30,000 data points—to understand high performance in the context of software development, and the factors that predict it.

    In this webinar, we discuss the key findings in the 2018 report. Join us to learn how:

    - Software delivery performance unlocks several competitive advantages including increased profitability, productivity, market share, customer service, and ability to achieve organization or mission goals.
    - Not just using cloud infrastructure, but implementing cloud as it’s intended to be used, contributes to high performance
    - Outsourcing may save money in the short term, but is much more likely to contribute to low performance
    - Identifying key technological practices can drive high performance across your organization (and evidence that industry vertical doesn’t matter)

    Dr. Nicole Forsgren is Co-founder, CEO and Chief Scientist at DevOps Research and Assessment (DORA) and co-author of the book Accelerate: The Science of Lean Software and DevOps. She is best known for her work measuring the technology process and as the lead investigator on the largest DevOps studies to date. In former lives, she’s been a professor, sysadmin, and performance engineer.

    Richard Seroter is a Senior Director of Product for Pivotal, a 10-time Microsoft MVP for cloud, an instructor for developer-centric training company Pluralsight, the lead InfoQ.com editor for cloud computing, and author of multiple books on application integration strategies. As a Senior Director of Product at Pivotal, Richard heads up product marketing and helps customers see how to transform the way they build software. Richard maintains a regularly updated blog (seroter.wordpress.com) on topics of architecture and solution design and can be found on Twitter as @rseroter.
  • Understanding Microservice Latency: Overview of New Relic Distributed Tracing
    Understanding Microservice Latency: Overview of New Relic Distributed Tracing
    Sean Carpenter & Stephen Crowley Mar 26 2019 10:00 am UTC 39 mins
    Software teams, working in an environment where there are many services involved in servicing a request, need to deeply understand the performance of every service, so they can more effectively resolve performance issues, measure overall system health, and prioritise high-value areas for improvement.

    New Relic Distributed Tracing is designed to give software teams an easy way to capture, visualise, and analyse traces through complex architectures, including architectures that use both monoliths and microservices.
  • Cash solutions update
    Cash solutions update
    Tony Cole and Richard Nelson Mar 26 2019 10:00 am UTC 45 mins
    Senior Fund Managers, Tony Cole and Richard Nelson, will discuss their views on rates over the last six months and their thoughts on credit market supply. They will also share their expectations going forward as Brexit approaches and provide listeners with an update on our cash solutions offering.
  • Blockchain: Flying the Friendly Skies
    Blockchain: Flying the Friendly Skies
    Nelson Petrack, CTO, TIBO Software Mar 26 2019 10:00 am UTC 36 mins
    According to the newest research released by SITA, Blockchain is fast emerging among airports and airlines as the priority technology for making the travel experience more efficient. The most commonly expected use of blockchain is for passenger identification, with 40% of airlines saying it would offer a major benefit, and more use cases around passenger experience and airport operations are emerging.

    Watch this webinar with TIBCO CTO Nelson Petrack presenting:

    -A new business model where the traveller is highly connected. Can a blockchain be used to streamline airport operations and improve the customer experience? Increase security?
    -How can blockchain play a role in passenger identity management? What about issues like privacy, GDPR, and blockchain’s immutable behaviour (meaning no deletes)?
    -What is the role of consensus in an enterprise/permission blockchain deployment? What are some examples?

    Learn more about Project Dovetail™ at https://www.tibco.com/resources/community/project-dovetail.
  • Global Bonds: Meeting the Income Challenge
    Global Bonds: Meeting the Income Challenge
    Kenneth Orchard Mar 26 2019 10:00 am UTC 60 mins
    Will the Fed keep interest rates on hold? Will China move to stimulate its economy? Will the ECB delay monetary tightening? Join Diversified Income Bond Strategy PM Kenneth Orchard as he discusses how he plans to navigate the uncertain, and possibly more volatile, market environment of 2019.
  • Cloud Security: Thinking Beyond the Perimeter
    Cloud Security: Thinking Beyond the Perimeter
    Robert Arandjelovic, Director Product Marketing, Symantec and Featuring Guest Speaker, Heidi Shey, Senior Analyst, Forrester Mar 26 2019 10:00 am UTC 55 mins
    Traditional perimeters vanish as organizations move to the cloud and employees work in a world of both sanctioned and unsanctioned applications. Companies must rethink their approach to securing data in this new environment.

    Join Robert Arandjelovic, Director Product Marketing, Symantec and Heidi Shey, Director Product Marketing, Forrester as they discuss:

    - The inherent security challenges of cloud
    - Security strategies and imperatives
    - How organizations are approaching and need to approach cloud security today
  • Website Tips
    Website Tips
    Gus Ryan Mar 26 2019 10:00 am UTC 28 mins
    Whether you're starting from scratch or improving on what you already have, this webinar highlights the key components for a strong web presence.

    Please note: you can submit any questions you may have and we will collect these and respond following the webinar.

    Note: Incorrect timezone may display below if you are not logged into BrightTALK.