Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Kevin Mitnick Hacks LinkedIn Two-Factor Authentication
    Kevin Mitnick Hacks LinkedIn Two-Factor Authentication Kevin Mitnick Recorded: Oct 19 2018 7 mins
    KnowBe4's Chief Hacking Officer, Kevin Mitnick, shows a two-factor authentication exploit based on a credentials phishing attack using a typo-squatting domain. Once the user falls for this social engineering tactic and enters their credentials, the 2FA token gets intercepted and it's trivial to hack into the LinkedIn account.
  • Say Goodbye To Your Inner Critic and To Self-Sabotage
    Say Goodbye To Your Inner Critic and To Self-Sabotage Harriet Waley-Cohen, Speaker and certified coach Recorded: Oct 19 2018 61 mins
    Have you ever really wanted to achieve something, perhaps losing weight before a big occasion, or applying for your dream job, yet somehow you always seem to get in your own way, and there's a little voice in your head that tells you not to bother because you'll never get there anyway, so there's no point trying.

    We all have an inner critic to one extent or another, and we can all sabotage our own progress at times. Just ask anyone who needs to fill out their tax return if they've ever found themselves embarking on a kitchen cupboard clear out instead!

    In this webinar you will discover:
    How to identify your inner critic, and get clear on how it holds you back.
    The secret behind self-sabotage and your inner critic - why are they are so powerful?
    How to beat them both and achieve what you really want to achieve in life, be it in your career, relationships or wellbeing.
    Mindset hacks and processes that are immediately implementable that will make a big difference to you.
  • Tableau Careers - Tableau the Skill
    Tableau Careers - Tableau the Skill Andy Kriebel, Head Coach and Tableau Zen Master at The Data School & Eva Murray, Head of BI and Tableau Zen Master at Exasol Recorded: Oct 19 2018 46 mins
    Data analysis and visualization skills are in very high demand and rank among the top technical skills companies are looking for right now.

    Hear from Edward Beaurain, Director of Commercial Sales at Tableau, why Tableau skills have become so important in the market place and what the organizations he works with are looking for when they recruit new talent.

    As a final chapter of our Tableau Careers series, Edward will also share how you can join TC18 from anywhere in the world and make the most of the networking opportunities out there so you can land you dream data job.
  • Tableau Careers - Tableau the Skill
    Tableau Careers - Tableau the Skill Eva Murray, Andy Kriebel, Edward Beaurain Recorded: Oct 19 2018 1 min
    Data analysis and visualization skills are in very high demand and rank among the top technical skills companies are looking for right now.

    Hear from Edward Beaurain, Director of Commercial Sales at Tableau, why Tableau skills have become so important in the market place and what the organizations he works with are looking for when they recruit new talent.

    As a final chapter of our Tableau Careers series, Edward will also share how you can join TC18 from anywhere in the world and make the most of the networking opportunities out there so you can land you dream data job.
  • Beyond the Executive Table: How to be seen as a leader and not a manager
    Beyond the Executive Table: How to be seen as a leader and not a manager Agata Domond, Certified Executive Presence & Career Development Coach, Domond Leadership Institute Recorded: Oct 19 2018 56 mins
    Are you struggling to secure that next promotion?

    One of the biggest challenge women leaders face is confidence and projecting a powerful image. Which then in turns impacts how we show up in career and business. As women continue to advance in leadership roles it’s imperative that we understand the distinction between managing a team and leading a team. To advance in your field you must be able to show up as one that leads.

    In this webinar we will work together to

    1.Discover your overall Leadership Vision and Style
    2.Identify three key strategies to build relationships not procedures
    3.Understand the importance of developing your team members versus directing them


    Agata Domond is the CEO of Domond Leadership Institute and Founder of non-profit organization Domond Immigrant Adult Learning Center (501c3). As a Certified Coach, Speaker & Trainer she specializes in Executive Presence for Women, Leadership and Career Development. Agata uses her experience and Corporate training as a former Senior Technical Project Manager for Fortune 10 company to help Women Leaders identify their life’s purpose and develop a strategy to maximize their impact and succeed in Career & Business. For proven tips on establishing your Executive Presence please visit www.MyExecutiveGift.com
  • Two is company, is three too many clouds? Keeping the clichés out of multi-cloud
    Two is company, is three too many clouds? Keeping the clichés out of multi-cloud Brad King, Chief Architect and Co-Founder, Scality Recorded: Oct 19 2018 31 mins
    The term multi-cloud has caught on this year, and we’ll be discussing the reasons it could matter a great deal to your business. If you are a cloud user, a company providing services and solutions that use public cloud infrastructure, or currently defining a cloud strategy, we’ll discuss why being able to keep your cloud options open is so important. Scality is working hard to provide tools to help public and private cloud users keep control of their storage, permitting the use of the right cloud for the right job. We’ll be discussing the business implications of multi-cloud storage, the freedom that our Zenko technology allows. We’ll be joined by Nodeweaver who will share why multi-cloud is important to their business.
  • Sécurité des mobiles: quelles sont les stratégies mises en place par vos pairs ?
    Sécurité des mobiles: quelles sont les stratégies mises en place par vos pairs ? Hervé Doreau, Directeur Technique, et Benjamin Ménard, Consultant Avant-Vente Recorded: Oct 19 2018 27 mins
    Les entreprises de toutes tailles doivent faire face aux nouveaux risques liés à l'utilisation grandissante des mobiles et il leur est difficile de définir la meilleure stratégie pour protéger leurs informations sensibles.
    Au travers de cas d'usages concrets, nos experts vous proposent lors de ce webcast d'en savoir plus sur :
    - Pourquoi est-ce si important de sécuriser les appareils mobiles ?
    - Quelles bonnes pratiques de vos pairs pouvez-vous appliquer dans l'adoption d'une stratégie de protection des terminaux ?
    - Quelles sont les fonctionnalités primordiales d'une solution de sécurité des mobiles ?
  • Worry-Free Security on Azure
    Worry-Free Security on Azure Robert Smith & Hubert Ng Recorded: Oct 19 2018 55 mins
    Presenter

    Robert Smith - Higher Education & Research Specialist – APAC - Microsoft

    Hubert Ng – Cloud Engagement Manager – Asia Pacific - Palo Alto Networks

    An exclusive webinar for the education sector

    Businesses are not the only organisations looking to take advantage of the innovation and disruption that moving to the cloud can provide. Schools, colleges and universities across the Asia-Pacific region are moving their data and applications to the cloud.

    Join our webinar on October 19, and learn how to secure your data and apps in Microsoft® Azure®.

    We will be joined by Robert Smith, higher education and research specialist – APAC from Microsoft, and Hubert Ng, cloud engagement manager for Palo Alto Networks, who will share their experience in bringing the advantages of the cloud specifically to organisations like yours.
  • [#1] Big Data im Fokus: Der Data Catalog – Ihre Big Data Schatzkarte
    [#1] Big Data im Fokus: Der Data Catalog – Ihre Big Data Schatzkarte Thomas Bodenmüller-Dodek - Product Expert Big Data & Analytics, Informatica Recorded: Oct 19 2018 35 mins
    „You can´t use it, if you can´t find it” – Heutzutage werden in Unternehmen mehr Daten denn je gesammelt, gespeichert und genutzt. Studien und Umfragen zeigen jedoch, dass lieber gesammelt als genutzt wird.
    Woran liegt das? Eine Ursache hierfür ist, dass Unternehmen gar nicht wissen, welche Daten gesammelt werden, wo sie gespeichert werden und wie diese genutzt werden können. Es fehlt an Transparenz und Struktur.
    In unserem 45-minütigen Webinar möchten wir Ihnen anhand einiger Praxisbeispiele zeigen, wie Sie mit einem Data Catalog Informationen über alle Datentöpfe hinweg zentral zur Verfügung stellen können. Erfahren Sie, wie unsere Kunden davon profitieren und welche Herausforderungen mit einem Data Catalog gemeistert werden können.
  • Chmura jako archiwum – kiedy, dlaczego, za ile?
    Chmura jako archiwum – kiedy, dlaczego, za ile? Daniel Olkowski Recorded: Oct 19 2018 62 mins
    Czy chmura może być archiwum?
    Co zyskujemy a co tracimy?
    Czy jest to konkurencja do ośrodka zapasowego?

    Zapraszam na 30 minutową dyskusję dotyczącą możliwości przechowywania długoterminowych kopii zapasowych w chmurze.
    Porozmawiamy o możliwościach, technologiach i oczywiście cenach.

    Piątek, 19.09, 10:00, 30 minut.

    Zapraszam na poranną kawę!

    Do zobaczenia…
    Daniel Olkowski
  • SUSE und Empalis: Höchstleistung für Ihre Storage-Umgebung
    SUSE und Empalis: Höchstleistung für Ihre Storage-Umgebung Thomas Grätz, SUSE Linux GmbH & Markus Stumpf, Empalis Consulting GmbH Recorded: Oct 19 2018 54 mins
    Sie haben eine dynamisch wachsende Storage-Umgebung? Sie stehen bei Backup, Desaster Recovery und Archivierung aktuell vor großen Herausforderungen? Sie suchen nach einer zukunftsfähigen Backup-Lösung, die entsprechend Ihrer Anforderungen skalierbar ist? Dann sollten Sie an unserem Webcast teilnehmen!

    Gemeinsam mit Empalis zeigen wir Ihnen, wie Sie mit Hilfe von SUSE Enterprise Storage Ihre TSM / Spectrum Protect Storage Umgebung optimieren und dabei die Grenzen traditioneller Systeme (mangelnde Skalierbarkeit, hohe Kosten, keine Cloudfähigkeit) umgehen. Die intelligente, softwaredefinierte Storage- Lösung auf Basis von Ceph-Technologie ermöglicht Ihnen die Transformation der Storage Infrastruktur Ihres Unternehmens, um Kosten zu senken und unbegrenzte Skalierbarkeit bereitzustellen.
  • Pure 1 - innovativster Support & Monitoring
    Pure 1 - innovativster Support & Monitoring Stilianos Spanidis, Systems Engineer Commercial bei Pure Storage Recorded: Oct 19 2018 59 mins
    Mit dem Einsatz von künstlicher Intelligenz können Fehler behoben werden bevor sie auftreten.
  • The Downsides and Dangers of Cryptocurrency Mining
    The Downsides and Dangers of Cryptocurrency Mining Magni Sigurdsson, Senior Threat Researcher, CYREN Recorded: Oct 19 2018 48 mins
    Browser-based mining for cryptocurrency is up 725% globally since the debut of Coinhive. The rapid spread of "cryptojacking" is grabbing headlines and driving discussion about this new "business model" for websites, but the problems and risks posed by cryptomining run deeper than just non-consensual use of a small bit of CPU power.

    What You Will Learn
    - The different types of cryptominers and why they are an issue for IT security
    - The top 5 security risks and downsides associated with cryptomining
    - How cryptomining scripts and malware is being distributed
    - The recent history of cryptomining and likely future trends
    - Best practices from a security perspective with respect to cryptocurrency mining
  • Index Investing: Addressing FAQs
    Index Investing: Addressing FAQs Stanley Bisho Recorded: Oct 19 2018 32 mins
    Stanley will unpack index investing for you and address the questions we are most frequently asked as index portfolio managers.
  • Worry-Free Security on Azure
    Worry-Free Security on Azure Robert Smith & Hubert Ng Recorded: Oct 19 2018 54 mins
    Presenter

    Robert Smith - Higher Education & Research Specialist – APAC - Microsoft

    Hubert Ng – Cloud Engagement Manager – Asia Pacific - Palo Alto Networks

    An exclusive webinar for the education sector

    Businesses are not the only organisations looking to take advantage of the innovation and disruption that moving to the cloud can provide. Schools, colleges and universities across the Asia-Pacific region are moving their data and applications to the cloud.

    Join our webinar on October 19, and learn how to secure your data and apps in Microsoft® Azure®.

    We will be joined by Robert Smith, higher education and research specialist – APAC from Microsoft, and Hubert Ng, cloud engagement manager for Palo Alto Networks, who will share their experience in bringing the advantages of the cloud specifically to organisations like yours.
  • Transform ServiceNow Data into Business Insights
    Transform ServiceNow Data into Business Insights Arjen Pront (Analytics & Reporting Program Director, ServiceNow), Dan Kane (Analytics Solution Advisor, ServiceNow) Recorded: Oct 18 2018 61 mins
    ServiceNow Performance Analytics brings the power of data to stakeholders and subject matter experts at all levels of your business – delivering actionable insights where they can make the most impact. It can help your organization make better decisions, improve business services, and help align with your organization’s goals.

    But how do you get started on this journey? How can you optimize business processes and deliver outcomes, such as 10% reduction in IT spend?

    We will provide you with the resources you need to get started with Performance Analytics and drive adoption within your organization.

    By listening to this webinar, you’ll learn:

    •The importance of trusted data to drive business decisions
    •How to align stakeholders with overall company goals
    •How to drive adoption of Performance Analytics
  • Career Conversations w/ Kristen Judge, Cybercrime Support Network
    Career Conversations w/ Kristen Judge, Cybercrime Support Network Jessica Gulick, MBA | PMP | CISSP Recorded: Oct 18 2018 46 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Guest: Kristin Judge, Author at LinkedIn Learning

    Kristin was elected to serve as a Washtenaw County Commissioner in 2008 and supported the U.S. Department of Homeland Security in growing cybersecurity outreach to state and local government officials. After elected office, she worked at the Center for Internet Security, focusing on connecting state and local governments to federal services and technology needed to improve cyber security.

    As Director of Government Affairs at the National Cyber Security Alliance (NCSA), Kristin worked with Google, FTC, FBI, SBA, DHS, NIST, congressional leaders and other key stakeholders across the country to educate consumers and businesses how to protect sensitive data.

    As a thought leader, Kristin has been seen on the C-SPAN Network, local news outlets and called on by technology publications like SC Magazine and Government Technology to share best practices for online safety; being named an SC Media “Women in IT Security Influencer” in 2017.

    In 2017, Kristin was chosen for the 3rd cohort in the Presidential Leadership Scholars program which is a partnership between the presidential centers of George W. Bush, William J. Clinton, George H.W. Bush, and Lyndon B. Johnson to bring together a select group of leaders who share a desire to create positive change across our Nation.

    To address the needs of cybercrime victims, Kristin recently founded the nonprofit Cybercrime Support Network to connect victims with federal, state and local resources in a coordinated manner.
  • FireEye Cyber Resilience Virtual Summit
    FireEye Cyber Resilience Virtual Summit Vasu Jakkal, Executive Vice President and Chief Marketing Officer, FireEye Recorded: Oct 18 2018 5 mins
    Executive Vice President and Chief Marketing Officer, Vasu Jakkal, shares what you can expect over the next three days of the Cyber Resilience Virtual Summit. Learn why the intelligence-led approach matters and what you need to know to prepare, defend and protect your organization from a breach.
  • Modernizing How HR Work Gets Done for a Better Employee Experience at Whirlpool
    Modernizing How HR Work Gets Done for a Better Employee Experience at Whirlpool Lawrence Krajewski, Carolyn Bradfield, Mike Vilimek Recorded: Oct 18 2018 58 mins
    The journeyfrom manual processes to modern experiencesJoin HR Director of NAR Operations Carolyn Bradfield,and HR Project Manager LorenKrajewski as they share what it took to truly transform Whirlpool’s employee experience. You’ll learn how they were ableto successfully:•Eliminatelegacy HR technologyto meet the needs ofanever-changing workforce•Deliveron their strategic HR Excellence initiative•Gainvisibility into the volume and types of employee inquiries and requests•Providea consistent employeeservice experience with HRacross the globe•Usechat to help drive digital change and improve their service levels
  • How to Target the Best Accounts for Your ABM Programs
    How to Target the Best Accounts for Your ABM Programs Krystan Resch Director of Partnerships | DiscoverOrg & Torrey Dye Director of ABM | Terminus Recorded: Oct 18 2018 48 mins
    Do you feel like you have good visibility into the current status of your target accounts? Can you easily pinpoint which accounts and contacts sales should call next or which target accounts are not engaged and need to be added to a marketing campaign?

    Watch this webinar to learn how to build a 360-degree view of your target accounts that includes firmographic, intent, and engagement insights.

    You will learn how to:

    Prioritize accounts for marketing and sales programs.
    Identify segments of accounts for highly personalized campaigns.
    Ensure you are engaging the best contacts.
    Increase account engagement, opportunity creation, and pipeline velocity.
    Measure the success of your marketing and sales programs.
  • Cassandra, Spark, Kafka: The Benefits of the Managed Platform
    Cassandra, Spark, Kafka: The Benefits of the Managed Platform Ben Slater, Chief Product Officer, Instaclustr Recorded: Oct 18 2018 49 mins
    Instaclustr’s Managed Platform simplifies and accelerates the delivery of reliability at scale through open source solutions. By providing Apache Cassandra, Apache Kafka, Elasticsearch, Apache Spark and other leading open source technologies through single environment, Instaclustr make it easy to deliver applications at any scale and, most importantly, operate them at the highest levels of reliability. Instaclustr provides the benefits of open source without the risk and costs of learning to manage it yourself.

    This webinar will
    - walk through the key features of Instaclustr’s platform and offering;
    - illustrate specific features and value-adds for each of the open source technologies offered; and
    - provide insight into Instaclustr’s product roadmap for future enhancements.
  • Her View on Finding Funding
    Her View on Finding Funding Jessica Gulick, CEO of Katzcy & Gail Ball, Managing Partner of Chestnut Street Ventures Recorded: Oct 18 2018 30 mins
    As a woman entrepreneur, you know firsthand how challenging it can be to get venture funding. Finding the right investors and other sources of capital to get your idea off the ground can be difficult. There are ways to get the funding you need to get your business moving! Please join Jessica Gulick, Owner of Katzcy Consulting, and Gail Ball, Managing Partner of Chestnut Street Ventures, as they share how to navigate the funding challenge and match investors to the needs of your growing technology firm. This 30-minute webinar gives you keen insight and tactics to gain capital, increase funding success and launch your business.
  • FireEye Global Threat Response – How we Protect the World
    FireEye Global Threat Response – How we Protect the World Tim Wellsmore, Director, Government Security Programs, Mandiant International, a FireEye Company Oct 22 2018 2:00 am UTC 75 mins
    Most approaches to the global cyber security problem are usually focused locally inside separate organisations, who struggle to look out across the global landscape and effectively respond. National responses from government capabilities can be challenged by capacity and jurisdiction to truly understand the global threat environment, and to effectively respond. This presentation will highlight how FireEye utilises its various capabilities and threat focused teams from all parts of the business to build a cohesive global detection and response capability for the biggest global threats.

    This presentation will outline how we tactically respond within our internal capability teams, and across our customer base of 67 countries and how we keep the media, our customers and our government partners informed on the latest information. How we scale quickly to respond to WannaCry or NotPetya to ensure our Community Protection mandate is relentless maintained is an impressive story. This presentation will highlight how our FireEye technology arm and FireEye's subsidiary companies of Mandiant and iSight work seamlessly together in a global cyber threat event to bring our best against the world's most advanced cyber threat actors.
  • What Executives Should Know about Cyber AI
    What Executives Should Know about Cyber AI Claudio Scarabello Director Product, APAC FireEye Inc Oct 22 2018 6:00 am UTC 60 mins
    Artificial intelligence (AI) is a transformative technology that provides organizations with better cyber defense tools but also helps adversaries improve methods of attack. Organizations need to understand how AI will impact cyber security before they rely on it for their defenses.
    Watch this webinar as we discuss:
    • How AI tools can be used for offensive and defensive purposes in the cyber domain
    • Changing geopolitical landscape as threat actors develop and implement AI capabilities
    • Enhancement of a businesses’ defensive capabilities through AI technology
    • How FireEye uses machine learning to bolster its internal defenses and tools
  • Symantec CASB - Cloud Access Security Broker (CASB) - CLOUD SECURITY
    Symantec CASB - Cloud Access Security Broker (CASB) - CLOUD SECURITY Martin Krömer, Regional Director CEEUR Cloud Security, Symantec (Deutschland) GmbH Oct 22 2018 9:00 am UTC 75 mins
    Nutzen Sie Cloud-Anwendungen und -Services auf sichere Weise, während Ihr Unternehmen dabei sicher, geschützt und richtlinienkonform bleibt.
    Erhalten Sie Einblick in die Schatten-IT, Kontrolle über Ihre Daten in Cloud-Anwendungen sowie Schutz vor Bedrohungen, die auf Cloud-Benutzerkonten abzielen – mit der Lösung, die Forrester als "Leader" im Bereich Cloud Security Gateways bezeichnet.
  • Your breach readiness master plan: take the sting out of a cyber attack
    Your breach readiness master plan: take the sting out of a cyber attack Judith Moore, Director & Partner, FleishmanHillard Fishburn; Mark Deem, Partner, Cooley; Mike Trevett, UKI Director, Mandiant Oct 22 2018 10:00 am UTC 60 mins
    With numerous market-leading companies making negative data breach headlines this year, and attackers constantly evolving their techniques, tactics and procedures, it seems there’s no longer a case of ‘if’ an organisation will be breached, but instead ‘when’.

    “Do you know how your team will respond to and remediate a cyber-attack?”, is an increasingly pertinent question that all C-suite leaders should be able to answer—and more importantly, have a role in finding that answer to ensure their organisation’s cyber-security posture and incident response (IR) plan is built for success.

    Join and contribute to the conversation as Judith Moore, Director & Partner, Corporate and Crisis at FleishmanHillard Fishburn, Mark Deem, Partner at Cooley LLP and Mike Trevett, UKI Director at Mandiant discuss:

    •How to identify security maturity improvement areas before, during and after a breach
    •Why constantly-evolving threats require organisations to periodically revisit their crisis communication plans
    •What actions organisations should take to ensure they can effectively protect their reputation in the event of a breach
    •Which key strategic communication tactics should be considered when reporting a breach
  • Cyber Security in Today's IoT World
    Cyber Security in Today's IoT World Parnian Najafi Borazjani, Senior Analyst, FireEye Oct 22 2018 11:00 am UTC 45 mins
    IoT devices have become a mainstream part of our lives. IoT devices are no longer just consumer devices, rather they are interwoven in different parts of corporations.

    The August 2016 Mirai botnet attack has shown that security in IoT is required to have overall security. The lack of security in IoT devices not only affects users, but also affects the society in a larger scale. Manufactures of these devices need to follow a set of guidelines to ensure secure developments and deployments.
    Moreover, device consumers such as corporations should be aware of their attack surface.

    Join us for a live webinar as we address the top security and privacy issues in IoT devices, the threats that are targeting them and recommendations for possible solutions.
  • Something Big Is Happening in Emerging Markets
    Something Big Is Happening in Emerging Markets Kevin Carter Founder & Chief Investment Officer, EMQQ Oct 22 2018 1:00 pm UTC 45 mins
    HANetf and EMQQ Index explore how increased affluence and growing access to mobile-based broadband is transforming lives and businesses in emerging and frontier market and introduce the EMQQ Emerging Market Internet & Ecommerce UCITS ETF
  • 3D Organ-on-a-chip Applications Using the AIM Biotech Chip
    3D Organ-on-a-chip Applications Using the AIM Biotech Chip Kuan Chee Mun and Mahama Aziz Traore Oct 22 2018 1:00 pm UTC 75 mins
    In vitro 3D cell culture models have emerged as a bridge between conventional 2D cell culture models and the complex & expensive in vivo animal models. By analyzing and comparing the biological behavior of tissues embedded in 3 dimensional hydrogels, results are significantly different from classic 2D cell culture in terms of proliferation, morphology, drug response and gene expression. These differences have been attributed to the topographically complex 3D environment surrounding the cells, where cell adhesion, structure, effector transport and mechanotransduction are substantially altered. A carefully designed 3D model can provide more physiologically relevant information using experimental designs unachievable by conventional 2D assays at a fraction of the cost of in vivo models.
    Current 3D cell culture assays like hanging drop culture often lack the capability to organize different co-cultured cell types in a meaningful way. The application of chemical gradients or flow is usually not possible.
    We are now able to address this issue with a modular microfluidic platform that can co-culture multiple cell types in discrete 3D and 2D channels. Organotypic assays with animal model-like complexities using human cells have been developed for research, drug discovery & diagnostics. These include models for immune checkpoint, T-cell killing efficiency, angiogenesis, metastasis, cell migration, microvascular networks and the blood-brain barrier. Additional applications that focus on a liver model will also be discussed. Drug Induced Liver Injuries (DILI) contributes to drug failures, drug withdrawals and acute liver failures. The liver strongly interacts with other organ systems and in some instances the metabolites secreted by the liver are responsible for other organs' injury. Engineered 3D liver models may increase the physiological relevance of drug toxicity by maintaining the expression levels of key cytochrome P450 enzymes and metabolic activity in liver cells.
  • Kettle Hill US L/S Equity Fund Q3 2018 Webcast
    Kettle Hill US L/S Equity Fund Q3 2018 Webcast Andrew Kurita Oct 22 2018 1:00 pm UTC 60 mins
    Join us for our quarter-end strategy update webcast. Engage with portfolio manager Andrew Kurita to learn about what drove third-quarter performance, the portfolio manager's outlook, and current portfolio positioning.
  • Cloud Security: The next generation
    Cloud Security: The next generation Chris Hill, RVP, Public Cloud EMEA; Alex Hilton, Chief Executive, Cloud Industry Forum Oct 22 2018 2:00 pm UTC 60 mins
    Multi-Cloud or hybrid environments has become a growing strategy for many organisations moving their applications and data in the cloud as it gives organisations the ability to be flexible in what they need for their business. In fact, according to recent research by Computing, 26 per cent of enterprises surveyed were using a multi-cloud approach compared with 22 per cent last year. However, along with this approach one thing organisations should not forget is that the need for security does not diminish. As the cloud continues to offer more in services, organisations need to be aware of the protection they are responsible for to ensure their applications and workloads are safe.

    So how do organisations stay ahead of the curve with security as well as being able to manage these multi-cloud or hybrid environments?

    Join our latest webinar where, Chris Hill, VP Public Cloud EMEA at Barracuda, and Alex Hilton, Chief Executive and Cloud Industry Forum (CIF)will discuss the latest challenges when it comes to migrating to the cloud, especially in a multi-cloud environment as well as analyse CIFs latest research findings on what organisations need to consider when adopting these cloud services.
  • Closing the Backdoor with Endpoint Security
    Closing the Backdoor with Endpoint Security Brook Chelmo, Senior Product Marketing Manager, SonicWall Migo Kedem, Senior Director of Products & Marketing SentinelOne Oct 22 2018 3:00 pm UTC 60 mins
    Threat actors leverage malware to create backdoors into systems for a few key reasons. These forms of malware, even when they fail, can create serious vulnerabilities in systems.

    This webcast will cover the threat landscape and discuss new types of attacks. Come for the news but stay for a live hacking demonstration that will install a backdoor on an unprotected endpoint and later, an attempt on a protected one.

    In this webcast you’ll learn:

    •The current threat landscape
    •What backdoors are
    •How to stop backdoors like Calisto
    •How to roll back the damage of an attack like ransomware
  • Introduction to React Native and GraphQL for App Development: Part 1
    Introduction to React Native and GraphQL for App Development: Part 1 Nicola Zaghini - Solution Architect | Senior Software Engineer, Phorest Salon Software Oct 22 2018 3:00 pm UTC 60 mins
    The objective of the workshop is to provide basic understanding of the React Native framework and the React designs principles by building a Native App for iOS and Android platform.

    Additionally, the GraphQL query language will be presented and used during the workshop as a strategic companion for frontend development and a perfect match for React design.

    By the end of the workshop, attendees will be capable of understanding the technologies involved and proactively progress in their learning journey.

    Who is it for?
    Developers of all levels interested in mobile application development with very little or no knowledge of React Native and GraphQL technologies.

    The workshop is provided in 3 sessions of 1h each.
    - In the first session we will focus on React and React Native principles, code organisations and useful tips and tricks.
    - In the second session an app will be produced using React Native, running on both iOS and Android.
    - In the third and final session we will focus on GraphQL and its integration with the previously built React Native App.

    Main topics:
    - Core principles of React and React Native
    - How to organise a React Native project
    - Core principles of GraphQL
    - How to query GraphQL from React Native

    Technologies involved.
    - React
    - React Native
    - TypeScript and Javascript
    - GraphQL
    - Apollo for GraphQL

    Pre-requisites.
    In order to follow the workshop with your computer a software stack should be installed. Details will be provided.
  • Getting Identity Management Right
    Getting Identity Management Right Neil Chapman (ForgeRock), Regina Yulo (BrightTALK) Oct 22 2018 3:30 pm UTC 30 mins
    Finding the right balance between security and risk is a tough one to manage. Banks and financial services organisations face larger challenges because of their complex legacy systems and the amount of sensitive data they have to deal with.

    Join this session where our identity expert will discuss:
    -What are the key challenges we see in the industry adopting and adapting the technology?
    -How can businesses know when they have got identity management right?
    -What are the barriers to making this happen?
    -How will IoT and AI change how we think about, and manage, identity?
    -How can we make identity an enabler of, rather than a barrier to, innovation?
    -How is Open Banking and PSD2 affecting and impacting the wider industry?