Like many state and local jurisdictions, Howard County, MD, has hundreds of IT applications and systems it relies on to run an efficient government. And like many governments, Howard County found it difficult to obtain an accurate view of its IT environment to better streamline and automate processes. Until now.
Join Howard County’s deputy CIO for an hour-long, informative webinar on how the county uses an innovative IT management platform to streamline its workflows and ultimately provide better service both internally and externally.
Don’t miss this webinar where you will learn:
•Why you should be thinking about service automation to improve workflows
•How IT automation can be easily replicated to streamline business and citizen-facing processes
•Best practices for ensuring success as you start down the service automation path
Raja Mukerji is the President and co-founder of ExtraHop Networks, where he is responsible for Customer Services, Systems Engineering, and Solutions Architecture. Raja ensures customer success, leveraging his background in the financial-services industry.
Raja co-founded ExtraHop after a seven-year tenure at F5 Networks where he was a Senior Software Architect and co-inventor of the TMOS platform. He was one of the lead developers behind the BIG-IP v9 product and the major-accounts liaison for critical issues within Product Development. Prior to F5, Raja worked as a Technology Architect at Strong Capital Management.
Raja is a renowned expert in application delivery and network protocols. He was involved in the FreeBSD project and contributed several enhancements to its TCP stack. Raja holds a bachelor’s degree in Computer Engineering from the Milwaukee School of Engineering.
As IT service delivery organizations shift gears to accommodate the business need for new levels of speed and agility, there is growing interest in models such as Lean, Agile and DevOps to accelerate business value generation. Digital Transformation translated to IT Service Delivery means reducing technical debt, becoming more agile and increasing speed to market.
Join Troy DuMoulin, VP of R&D at Pink Elephant, in this strategic webinar to learn:
•How to make a compelling business case for integrated service management
•How to help your organization achieve the elusive challenge to be “better, faster, cheaper”
•How to accelerate value delivery and improve your customer engagement
Thousands of Pulse administrators are using the new Pulse Secure Appliance (PSA) to solve the latest access challenges for the data center, cloud and mobile. The new PSA delivers the same reliability and best-of-breed security that you know and love from your SA or IC appliance, but with greater operational scale, deployment flexibility and use case support.
With hundreds of different requirements, the various Payment Card Industry (PCI) standards can be overwhelming. While the PCI Security Standards Council has provided lots of answers, the devil is often in the details. Our panelists are some of the top PCI QSA’s in the country, with decades of combined PCI and card processing experiences. They’ve seen it all: the good, bad and ugly; and lived to tell the tale.
Join Ben Rothke, David Mundhenk, Arthur Cooper, and Jeff Hall for an interactive Q&A session, and get answers to your most vexing PCI questions. No PCI question is out of bounds.
- Ben Rothke, Principal Security Consultant at Nettitude
- David Mundhenk, Senior Security Consultant at Herjavec Group
- Jeff Hall, Principal Security Consultant at Optiv Security
- Arthur Cooper "Coop", Senior Security Consultant at NuArx
What they don’t know WILL hurt them! Creating programs for Anti-harassment that work
You don’t want to be the next company on the evening news! But if employees don’t know the basics of identifying and reporting harassment how can we expect them to follow your procedures.
We will cover the basics you need to include in Anti-harassment and discrimination training, how to engage your audience and the legal compliance pieces that cover the responsibility your business has. If you are working in a company that expects you to be responsible for this with little or no budget for external training – this is the program for you!
You will learn:
·What are the key components of a training program
·How to align your message with your culture
·Engage employees to participate
·Covering legal obligations
It’s not everyday you get the inside story on how a group of cybersecurity researchers stumbled upon an APT, an advanced persistent threat, when they were examining the intelligence data from their security kit.
It appeared harmless and boring but of advanced attributes. But Fleming Shi and Jonathan Tanner suspected something was amiss.
Facilitated by Amar Singh, practising CISO, on this exclusive webinar as he unpicks what Fleming and Jonathan did next. Their curiosity got the better of them and they set about tinkering to discover the true intentions of this benign malware.
The new Micro Focus File Governance Suite makes network data administration easier by not only letting you know what you’re storing and who has access to it, but lets you in turn, establish policies that automatically clean up, move, archive, and delete, and a variety of other management actions. Additionally, the File Governance Suite offers data protection capabilities that protect High-Value Targets on your network from the potentially catastrophic effects of a ransomware attack.
This webinar will show you some of the more notable features and capabilities of the File Governance Suite and how you can deploy the suite utilizing your current network infrastructure.
An effective business case can help you ease the adoption of cloud and migration to AWS. By examining your existing and upcoming application workloads, AWS help you develop a business case. In this session, we’ll guide you through the key steps to creating a compelling case that communicates the financial and economic benefits of cloud for your organisation.
In this webinar, we’ll look at why IT transformation projects seem so challenging and whether ignoring the probability of success and failure through TCO analysis can make tools dangerous when poorly applied. We’ll also look at the cost of cloud, and whether it’s really lower than buying and running IT on premise; and examine the TCO of cloud adoption.
Training your engineers and developers can speed the pace of cloud adoption, migration, and the delivery of business benefits. In this webinar, we’ll discuss 12 steps you can take to reskill your technical teams so that you can use AWS Cloud securely, efficiently, and effectively. We’ll also review structural mechanisms to help scale your organization’s capacity to operate a cloud-based IT environment.
VeriSM™on palvelunhallinnan lähestymistapa, joka on räätälöity tukemaan organisaatioita digitaalisten palveluiden tuottamisessa. VeriSM™ auttaa organisaatioita määrittämään palvelunhallinnan periaatteensa. Nämä periaatteita sovelletaan kaikkien tuotteiden ja palveluiden tuottamisessa ja ne kattavat alueita kuten turvallisuus, laatu, kustannukset ja riskit.
Minkä takia sen on kehitetty? Mihin kysymyksiin se vastaa? Miten se asemoituu muihin viitekehyksiin? Tervetuloa webinaariin kuulemaan esittely uudesta VeriSM -viitekehyksestä ja saamaan vastaus missä tilanteissa ja millä tavalla siihen kannattaa tutustua paremmin.
Lari Peltoniemi on työskennellyt prosessien ja toiminnan kehittämisen ja arvioinnin alueella yli 10 vuotta. Päätoimisesti IT-palveluiden prosessien määrittelyn, kehittämisen ja johtamisen alueella hän on toiminut vuodesta 2005. Hän on konsultoinut ja valmentanut useita suomalaisia ja kansainvälisiä yrityksiä ja organisaatioita ITIL/ITSM prosessien määrittelyihin, käyttöönottoon ja kehittämiseen liittyen. Lari on sertifioitu ITIL Foundation, ITIL Intermedate, CMDB Foundation, SIAM Foundation ja VeriSM Foundation -valmentaja.
'Having the courage' has become my new personal brand tagline. No longer are we a generation of robots, filing in and out of the same out dated system but we are unique and special individuals that are starting to march to our own beat.
I used to be a robot, but I now march to my own beat after turning down a job at a top PR company in London. At age 22, I found the courage within myself, like many other youthful millennials today to make their own decisions in life, regarding jobs, choices, challenges.
This meant not doing what was expected but what was meaningful to me. This choice of journey means continually defending my decisions to everyone, making harder decisions how to carve up my time, really figuring out what I wanted to do, what I can do, my skills, my passions - continuously thinking whether I am mad or not, questioning how I would make a living - many questions, multiple answers... NOTHING that I had been taught about in university.
I am representing the millennial generation, doing things differently and having the courage to do so. I want to inspire everyone and anyone to not quit their jobs, but find their meaning, their passion and go for it!
Presented By Solon Alva Antibody Purification Group Lead, Senior Scientific Manager, Biocon Research Limited
Continuous manufacturing is an emerging technology in biopharmaceutical industry. The focus of this webinar is a case-study on the benefits of continuous Protein A capture on productivity, capacity utilization and buffer consumption. The potential challenges of adopting the technology such as its integration with cell culture and low pH incubation step has been discussed. There is promise of this technology as an effective platform, and potential of additional savings when considering new generation Protein A resins and in-line concentration technologies.
Followed by Yvan Ruland, PhD, Technology Director, Asia/Pacific operations, Novasep Asia
Lean Agile Enterprise - erfolgreiche Umsetzung mit dem Scaled Agile Framework SAFe®
Um die digitale Transformation erfolgreich zu meistern, müssen Organisationen die Fähigkeit haben, den schnellen Wandel und die Veränderungen des Marktes zu antizipieren und für sich zu nutzen. Immer mehr Unternehmen setzen dabei auf agile Vorgehensweise und führen deshalb die weltweit führende Skalierungsmethode zur Agilität, Scaled Agile Framework (SAFe®), ein.
Erfahren Sie in dieser kostenfreien Webinarreihe, mit welchen Lösungen und Tools wir Sie dabei unterstützen, SAFe® in Ihrem Unternehmen umzusetzen, um damit dauerhaft wettbewerbsfähig und erfolgreich im Markt bestehen zu bleiben.
Webinar 1: Lean Agile Enterprise: Umsetzung mithilfe von SAFe
15. Juni 2018 I 10:00 - 11:00 Uhr
Erfahren Sie in diesem Webinar, was ein Lean Agile Enterprise auszeichnet und wie man agile Prinzipien auf Unternehmensebene skalieren kann. Das Webinar zeigt anhand des Scaled Agile Frameworks (SAFe®), welche Lösungsansätze sich anbieten, schlanke Strukturen und agile Prinzipien in großen Unternehmen zu unterstützen, um Lean Agile Enterprise erfolgreich umzusetzen. Dieses Webinar, das das erste einer Webinarreihe ist, soll Ihnen hierzu einen umfassenden Überblick geben. In den Folge-Webinaren wird dann der Gedanke des Lean Agile Enterprise im Detail betrachtet, angefangen auf Teamebene in der agilen Softwareentwicklung über die Architektur (DevOps, Continuous Integration, Continuous Testing und Continuous Delivery) bis hin zu Lean Project- & Portfolio Management.
AN INTERVIEW WITH DR GÜNTER JAGSCHIES, OF GE BIOPROCESS TEAMS ON WHAT ARE THE MAIN OPPORTUNITIES AND CHALLENGES IN THE RAPIDLY EVOLVING ASIAN BIOPHARMA MARKETS?
Demand for better, more precise, and effective medicines is driven by a changing global population and increased economic power in growth economies. Asia and the Sub-Saharan Africa are almost exclusively driving the global population growth. Also, the ageing populations are growing there, resulting in an increased demand on the healthcare systems. But simultaneously, there are also more and more Asian patients who can afford treatment with biologics, which is aided by generally lower price levels and improved economic situations in the region.
Currently, the Asian biopharma industry is mainly concentrated in China, India, South Korea, Japan, and Taiwan, but the development of these markets is going to be heterogenous as they have, for example, different starting points, local policies and biopharma know-how. However, these countries are likely to face a market fragmentation challenge, because a large number of Asian companies are all focusing on the development of biosimilars for only a very few (5-10) original drugs, while at the same time many multinational companies are also entering the region. This requires more product development and manufacturing innovation from the local players to develop a differentiated position in their markets and to move to original drugs, although access to affordable biosimilars is also critical.
Andy Acker, co-manager of the Janus Henderson Global Life Sciences Fund, explains why expert insight is required when investing in healthcare – a highly complex, dynamic growth sector. In this webcast, he will expand on the case for long-term investment, why an active approach is crucial, and the key strengths of his team and their process.
The webcast will also include a review of the fund’s performance, summary of current positioning, and Mr. Acker’s outlook.
Today’s data centers are expected to deploy, manage, and report on different tiers of business applications, databases, virtual workloads, home directories, and file sharing simultaneously.
HPE 3PAR StoreServ is highly efficient, flash-optimized storage engineered for the true convergence of block, file, and object access to help consolidate diverse workloads efficiently.
This session provides an overview HPE 3PAR File Persona and core file data services.
Most organizations already have ways to backup and recover their data, typically using replication technologies. In most cases, however, the process used to failover business services is still manual. And that spells potential disaster—the most significant risk being dependence on the human factor in the middle of a crisis.
In this webinar, learn how specialized automation applied to the disaster recovery plan can give you the confidence to succeed, mitigate negative brand impact, and exceed RTO and RPO objectives when disaster strikes.
How do you manage the explosive growth and diversity of devices connecting to your network? How do you handle those devices when the vast majority are IoT devices and operational technologies (OT), most of which cannot be managed via traditional agent-based security systems? Accurate device visibility is paramount for solving security use cases such as network access control, device compliance, asset management, network segmentation and incident response.
Join us to learn how the ForeScout platform solves the device visibility problem across the extended enterprise. Get insight into the new capabilities of CounterACT 8, including:
• Passive-only discovery and profiling in sensitive OT and industrial network zones without requiring agents
• Support for cloud-based network management systems
• A customizable web dashboard for device intelligence across campus, data center, cloud and OT networks
The Equifax data breach, Cambridge Analytics and GDPR are all recent examples of the risks which today’s organisations face around the personal information they store. Come for a journey as we explore how Micro Focus can help you discover, secure, pseudonymize and control personally identifiable information within your organisation using the SCM suite. Learn how Structured Data Manager can target structured data, ControlPoint can target unstructured data, and Content Manager can secure both.
New research from CyberEdge’s 2018 Cyberthreat Defense Report shows that in spite of increasing their security budgets, companies are finding that there is too much data even for new tools to analyze, not enough skilled IT security professionals and little confidence in current investments. Sign up for this webinar to gain key insights into the cyberthreat landscape and how to protect your organization.
Attendees will learn how to:
- Deal with cyberthreat headaches such as increased breaches, vulnerabilities and encrypted traffic.
- Reduce incident response and remediation time with automation.
- Find products that use automation to minimize their dependency on skilled security personnel.
Now in its fifth year, this report provides a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. Register now to learn how your colleagues plan to defend against cyberthreats!
This session walks through the IoT landscape, from its origins up until the present day. From there we will explore the diverse use-cases that currently dominate IoT including smart cities, connected-cars and wearable technology. We will then expand these into a solution architecture with the streaming platform as the central nervous system and backbone of IoT projects.
Putting Kafka at the heart of the IoT stack opens up unique ‘Kafka’ semantics which supports the opportunity to drive IoT solutions via heuristics, machine learning or other methods. This approach reinforces the concepts of event-time streaming and stateful stream processing. By exploring Message Queuing Telemetry Transport (MQTT) and how MQTT streams can be sent to Kafka using ‘Connect’ we build several IoT solutions that leverage Kafka Streams and KSQL to see how they can be used to underpin real solutions. Use-cases include ‘Car towed alert’ and ‘Location-based advertising’.
Email Fraud is one of the oldest yet most successful threats against your organisations. Proofpoint Email Fraud Defense (EFD) can help you protect your organisation and your customers, leveraging the power of email authentication.
Join this product demo to discover how you can protect your organisation and people by leveraging the power of EFD.
•Block malicious emails spoofing your domains before they reach your employees and customers
•Monitor all emails (inbound and outbound) from your domains and those of third parties
•Accurately distinguish between legitimate emails and fraudulent emails
Data is everywhere! Growing exponentially in size, and complexity too. In this session, we look specifically at the ‘Holy Grail’ of Single Customer View, and at some of these techniques required to achieve that in your own data. But why is it exclusive to Customer Data? Isn’t product data is just as important to a Product manager as Customer Data is to a Marketer or Salesperson? Davinity explores the DQ techniques which can be applied to any type or kind of data to keep it clean and fit for purpose. And is there any difference in achieving such high Data Quality in a Big Data space over more traditional environment? Tune in to find out…
GDPR is an EU regulation that comes into effect on the 25th of May 2018.
GDPR is designed to uphold the rights of the individual in terms of how their personal data is handled, stored and secured.
It also places greater responsibility on businesses to observe data security and related processes and practices.
Kaspersky Lab solutions help companies process personal data by offering effective measures to reduce the risks of a data breach, prevent security incidents and enhance visibility of the monitored infrastructure.
During the webinar, we’ll look at the following topics:
•What GDPR is - and isn’t - when it comes to cybersecurity.
•How cybersecurity fits into GDPR-aligned processes.
•The endpoint: a good starting point for the cybersecurity aspect of a data protection strategy.
•The role of storage and the impact of storage security.
•Guarding the bottlenecks: perimeter defenses to reduce the risks of human influence.
•Why data in the cloud requires special security.
•Forewarned is forearmed: the importance of cybersecurity essentials training.
•Understanding the risks: get more from your Data Protection Impact Assessments.
•Kaspersky Lab’s GDPR readiness.
Inline security tools operate by actively preventing threats in your network, but deploying and optimising these tools presents several challenges to both network and security engineers. The downsides can include a potential point of failure, degradation of network and application performance, difficulty to scale and upgrade.
The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges.
Join Gigamon and (ISC)² EMEA in this webinar where we aim to examine how inline bypass can overcome physical deployment obstacles, maximise network availability, increase the scale of inspection and reduce the impact to network performance.
Processos de negócios tradicionais estão sob pressão dos novos disruptores digitais, e isso requer um nível mais alto de automação dos processos. Isso é ainda mais complicado pela necessidade de se reorganizar processos que abrangem várias plataformas para incluir aplicativos na nuvem, fontes de dados externas e infraestrutura de terceiros.
Junte-se à CA Automic em um webinar empolgante e rápido e obtenha informações de especialistas sobre como sua empresa pode se beneficiar do Business Automation.
Os participantes terão a oportunidade de ouvir Marcelo Devesa, consultor de automação da CA Technologies.
Join this IDC webinar to find out:
•How SD-WAN can help organizations progress on their digital transformation journey
•What vendors and service providers should do to succeed as SD-WAN disrupts the enterprise networking market
Watch this short, teaser video now: https://youtu.be/rfJ1Hd6hJQs