Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Supply Chain Resiliency
    Supply Chain Resiliency Arghajit Adhicary, Global BCM Manager - Unisy Recorded: Feb 24 2018 61 mins
    Businesses are increasingly becoming more reliant on third parties for critical products and services. The factors are multi-fold : increased customer demand, time criticality, stringent service levels, evolving regulatory landscapes, technological advancements, mergers and acquisitions, diversification of risks, etc. With increasing dependencies on third parties, organizations become susceptible to major service disruptions owing to lack of supplier resilience; thus, running into risks such as loss of revenues, regulatory breaches, service level misses and eventually, loss of customer confidence. Supply Chain Resiliency is the key to sustained business model and must be integrated within the resilience or business continuity framework of organizations.

    This session will reflect upon a few key trends, levers, risks, regulatory requirements and overview of building third party business continuity assessment process.
  • Real-Time Customer Experience for the Right-Now Enterprise featuring Forrester
    Real-Time Customer Experience for the Right-Now Enterprise featuring Forrester Brendan Witcher, Forrester Principal Analyst Recorded: Feb 23 2018 61 mins
    Welcome to the Right-Now Economy. To win in the Right-Now Economy, your enterprise needs to be able to provide delightful, always-on, instantaneously responsive applications via a data layer that can handle data rapidly, in real time, and at cloud scale. Don’t miss our upcoming webinar in which Forrester Principal Analyst Brendan Witcher will discuss why a singular, contextual, 360-degree view of the customer in real-time is critical to CX success and how companies are using data to deliver real-time personalization and recommendations.
  • How to Build IoT solutions Quickly & Easily
    How to Build IoT solutions Quickly & Easily Olivier Bloch, Sr. Program Manager for Microsoft Azure IoT Recorded: Feb 23 2018 62 mins
    Are you interested in building innovative IoT solutions to help your company improve efficiencies or create new revenue opportunities – but not sure where to start?

    Whether you’re an app developer, cloud developer or just looking for your next moonlighting project, come learn about the nuts and bolts of Azure IoT development from the experts.

    In this webinar, presented by Olivier Bloch, Sr. Program Manager for Azure IoT at Microsoft, you will learn:

    - How to get started using Azure IoT Hub, IoT Starter Kits and SDKs.
    - How to connect your first devices to Azure IoT Hub.
    - How to manage devices at scale with IoT Hub device management.
  • How to Hire and Test for Data Skills: A One-Size-Fits-All Interview Kit
    How to Hire and Test for Data Skills: A One-Size-Fits-All Interview Kit Tanya Cashorali, Data Scientist and Entrepreneur, TCB Analytics and Jack Phillips, IIA Co-Founder and CEO Recorded: Feb 23 2018 54 mins
    Given the recent demand for data analytics and data science skills, adequately testing and qualifying candidates can be a daunting task. Interviewing hundreds of individuals of varying experience and skill levels requires a standardized approach. In this webinar, Tanya Cashorali explores strategies, best practices, and deceptively simple interviewing techniques for data analytics and data science candidates.
  • LIVE demo - Safely Enable SaaS Applications with Aperture
    LIVE demo - Safely Enable SaaS Applications with Aperture Omar Amarin, Systems Engineer Recorded: Feb 23 2018 44 mins
    The adoption of SaaS applications continues to grow at an exponential pace. You do not want to clamp down on these applications because they are valuable tools for many of your employees. However, because the data and usage of these SaaS applications is invisible to IT administrators, they do expose your organization to potentially disastrous security and data theft risks.

    Join us for a live webinar where you will learn how your organization can enable safe usage of SaaS applications and:

    •Gain visibility and granular, context-based control of SaaS applications.
    •Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
    •Protect against new insertion and distribution points for malware.
    •Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.

    The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable their use.
  • Il tempo scorre: agisci ora per accelerare il tuo viaggio verso il GDPR
    Il tempo scorre: agisci ora per accelerare il tuo viaggio verso il GDPR Giampiero Nanni Recorded: Feb 23 2018 64 mins
    Mancano pochi mesi alla scadenza del GDPR, e non c’è tempo da perdere. Che cosa puoi fare, praticamente, in questo momento per prepararti al meglio? Organizzato dagli esperti in sicurezza Symantec, il webinar “90 giorni al GDPR” è ricco di suggerimenti e consigli essenziali.

    A prescindere dal tuo livello di preparazione, questo webinar ti aiuterà a capire la tua posizione, offrendoti consigli pratici e concreti da attuare prima della scadenza di maggio.

    Non affidarti al caso: registrati ora.

    Se non lo hai già fatto, prima di seguire il webinar completa il modulo di valutazione d el tuo stato di preparazione al GDPR (GDPR Readiness Assessment) di IDC: ti permetterà di capire a che punto sei nella tua pianificazione per realizzare la compliance al GDPR.

    Completa la valutazione >>
  • Die Uhr tickt: stellen Sie die Weichen für eine erfolgreiche DSGVO - Umsetzung
    Die Uhr tickt: stellen Sie die Weichen für eine erfolgreiche DSGVO - Umsetzung Symantec, Alexander Peters Recorded: Feb 23 2018 61 mins
    Handeln Sie jetzt – und stellen Sie die Weichen für eine erfolgreiche DSGVO - Umsetzung

    Verlieren Sie keine Zeit – die DSGVO kommt schon in einigen Monaten. Aber wie können Sie sich aktiv darauf vorbereiten? Im Webinar
    ‘Noch 90 Tage bis zur DSGVO’ geben Ihnen die Symantec Experten v iele praxisnahe Tipps für die Umsetzung.

    Ganz egal, wie weit Sie mit Ihrer Vorbereitung heute sind: Im Webinar erfahren Sie, wo Sie aktuell stehen, und erhalten rechtzeitig vor dem Stichtag im Mai klare, handlungsrelevante Tipps.

    Gehen Sie kein Risiko ein – melden Sie sich noch heute an.

    Vor der Teilnahme am Webinar sollten Sie, wenn es noch nicht gesche hen ist, auch das GDPR Readiness Assessment von IDC
    absolvieren. Es hilft Ihnen einzuschätzen, wie weit Ihre Vorbereitung vorangeschritten ist.

    Zum Assessment •http://symantecgdpr.idcready.net/de/?utm=aI638CIsFU

  • Could a buy-in or buy-out be right for your scheme?
    Could a buy-in or buy-out be right for your scheme? Gavin Markham, Partner and Head of Bulk Annuities and Chris Hawley, Associate - Barnett Waddingham Recorded: Feb 23 2018 45 mins
    Are bulk annuities a potential option for your scheme? It could be the right time to consider a transaction. Buy-ins can play an important role in any de-risking journey – offering an effective way of removing both financial and demographic risks.
  • El tiempo corre: haga algo ahora mismo para hacer frente al RGPD
    El tiempo corre: haga algo ahora mismo para hacer frente al RGPD Ramses Gallego, Strategist Symantec Recorded: Feb 23 2018 55 mins
    Faltan pocos meses para que el nuevo RGPD entre en vigor, por lo que no hay tiempo que perder. ¿Sabe qué puede hacer desde ahora mismo para prepararse debidamente? Organizado p or los expertos de Symantec, el seminario web «90 días para el RGPD» incluye numerosos consejos y técnicas al respecto.

    Independientemente de la etapa de preparación en la que se encuentre su organización, este seminario web le ayudará a entender el nivel de preparación de su organización y, además, le ofrece pasos prácticos y ejecutables para cumplir con la fecha límite de mayo.

    No se la juegue e inscríbase ahora mismo.

    Pero antes de asistir al seminario web, si no lo ha hecho aún, sería muy útil que realizara la evaluación de preparación para el RDPG preparada por IDC. Esta le ayudará a determinar en qué etapa se encuentra su plan de preparaci ón para el RGPD.
    Realice la evaluación INSCRÍBASE YA
  • Intend Based Networking im Datacenter
    Intend Based Networking im Datacenter Martin Schönbacher Axians, Martin Krejca Axians, Markus Kunstmann Cisco Recorded: Feb 23 2018 27 mins
    Applikationen sind die Stars im Rechenzentrum. Aber sie werden oft missverstanden. Ohne Applikationen würden wir das Rechenzentrum nicht aufbauen. Es ist die App selbst, die Infrastruktur- und Benutzerdaten für das Unternehmen relevant macht.
    Kennen Sie die Kommunikationsprofile Ihrer Applikationen?
    Wissen Sie wie sie Ihr Datacenter agil und mit höchstmöglicher Sicherheit und unter Einhaltung der Compliance Richtlinien betreiben?
    Was wäre, wenn Sie JEDEN FLUSS in Echtzeit analysieren und seine Eigenschaften und Details in einem Datenpool für weitere Analysen, Simulationen oder Compliance-Berichte speichern könnten? Was wäre, wenn Sie eine automatische Zuordnung von Applikationsabhängigkeiten erhalten könnten und damit die von einer Applikationstransaktion in Echtzeit zugewiesenen Ressourcen beschreiben könnten?
    Die Antwort auf die offenen Fragen ist: Cisco intend based Networking
    -Vorstellung Cisco intend based Networking
    -Livedemo Network Assurance & Tetration
    -Deployment Modelle by Axians
  • Nowy Data Domain 3300 Możliwości, skalowalność, dla kogo?
    Nowy Data Domain 3300 Możliwości, skalowalność, dla kogo? Daniel Olkowski, Dell EMC Recorded: Feb 23 2018 64 mins
    W tym miesiącu został ogłoszony nowy model Data Domain DD330.
    •Dla kogo jest przeznaczony?
    •Jakie środowiska zabezpiecza?
    •Jakie nowości wprowadza?
    Zapraszam na 30 minutową dyskusję gdzie powiemy o wszystkich szczegółach nowego DD3300.

    Piątek, 23 luty, 10:00, 30 minut.
    Całość informacji w trakcie porannej kawy!

    Daniel Olkowski
  • The 7 Steps to a Value Proposition That SELLS
    The 7 Steps to a Value Proposition That SELLS Lisa Dennis Recorded: Feb 22 2018 30 mins
    Brainstorming a 1-line value prop rarely results in a message that is extendable across communications platforms, and is buyer-focused. Focusing on just a tag line or elevator pitch short circuits developing a Value Prop Platform that is both complete and flexible enough for marketing content and sales conversations.
  • Training Snapshot: Proximity Searching From CloudNine
    Training Snapshot: Proximity Searching From CloudNine Brian Kelley Recorded: Feb 22 2018 5 mins
    A snapshot demonstration of the process and syntax required to perform proximity searches within CloudNine to locate responsive terms that are not only in the same document, but close to each other without having to be in an exact phrase.

    When performing keyword searching, the challenge to performing those searches effectively is to balance recall (retrieving responsive documents with hits) and precision (not retrieving too many non-responsive documents with hits). One way to achieve that balance is through proximity searching, which is simply searching for two or more words that appear close to each other in the document. Proximity searching is more precise then an AND search (where two terms can appear in the document together but be completely unrelated) with more recall than a phrase search (where the terms must be exactly together in that order), so proximity searching can be a valuable search strategy for striking the proper balance in your search results.

    Training Snapshot Presenter: Brian Kelley

    Brian is the Director of Customer Success for CloudNine. At CloudNine, Brian manages training, support and customer success efforts for CloudNine's Software-as-a-Service (SaaS) eDiscovery clients. Brian has extensive experience providing legal technology consulting and technical support services to numerous commercial and government clients ranging from multinationals corporations and large law firms to litigation support providers and governmental agencies.
  • Make Your Customers Your Partners
    Make Your Customers Your Partners Melanie Turek, VP of Connected Work, Frost & Sullivan Recorded: Feb 22 2018 44 mins
    In today’s sharing economy, people like to offer their insights and expertise. Let them.

    By embracing your most loyal followers, you can gain authenticity and reach. Prospects and other customers are more likely to trust information when it comes from a third party, especially one with experience with your products or services.

    Power users can deliver valuable insight through reviews and feedback, but they can also help with FAQs and basic customer support issues. This is especially true in the B2B marketplace, where knowledge and experience can pay huge dividends for employees and companies that use them.

    This session will focus on creating loyalty programs that identify key supporters and power users, and then suggest ways to engage them to help sell and support the brand, ultimately boosting business.
  • GDPR's Effect On Internet Application Developers and Security Professionals
    GDPR's Effect On Internet Application Developers and Security Professionals Eric Greenfeder Primitive Logic, Nathan Wenzler AsTech, Michael Rubin Latham & Watkins, and Robert Shields Informatica Recorded: Feb 22 2018 58 mins
    Join this panel discussion of technology solution, information security, legal privacy and data protection experts along with Informatica’s Director of Product Marketing for Data Security to find out:

    - How does GDPR change the way security is approached by both Internet application developers and security professionals?

    - What are the rights provided to data subjects by GDPR and how does this change the way Internet business applications must be designed and secured?

    - How can organizations demonstrate the GDPR requirements for Article 25: Data Protection by Design and by Default?

    Day 3 of 3 day series:
    Day 3 - Focus on Security side of GDPR from a technology perspective

    ~ Day 1 – Overview of key concepts with legal and technical discussion of suggested actions
    ~ Day 2 – Focus on Privacy side of GDPR from a technology perspective

    Eric Greenfeder, Primitive Logic Chief Architect
    Nathan Wenzler, AsTech Consulting, Chief Security Strategist
    Michael Rubin, Latham & Watkins Partner – Privacy and Data Protection
    Robert Shields, Informatica Director Product Marketing for Data Security
  • Direct Query SAP Hana with Pyramid
    Direct Query SAP Hana with Pyramid Avi Perez, Pyramid CTO Recorded: Feb 22 2018 7 mins
    Pyramid allows you to combine SAP Hana data with other data sources to provide better insights for your business. This short demonstration shows how easy it is to setup and directly query SAP Hana with Pyramid.
  • GDPR: Achieving Compliance and Secure Authentication with 2FA & Customer IAM
    GDPR: Achieving Compliance and Secure Authentication with 2FA & Customer IAM Alex Yakubov (Yubico), Jesper Johansson (Yubico), Baber Amin (Ping Identity) Recorded: Feb 22 2018 31 mins
    The General Data Protection Regulation (GDPR) comes into effect May 25, 2018, and it impacts organizations throughout the world who sell, market to, and even collect any personal data of EU citizens. It has far reaching operational and IT impacts. Critical to GDPR compliance are security, data-access governance, and transparency in the collection and use of personal data for EU citizens, including use-based consent, self-service personal data management, and data encryption in every state (at rest, in motion, in use).

    As organizations look for efficient ways to check the compliance boxes, article by article, it is important to note that compliance is only a step towards strengthening your engagement with customers and preserving their data privacy.

    One of the key components for GDPR compliance is the need for strong authentication and identity management. Join this webinar to learn about the Secure Authentication requirements of GDPR, how to meet those requirements, and strengthen security at the same time.

    In this webinar, Yubico and Ping Identity will discuss:
    ● How Customer Identity and Access Management (Customer IAM) solutions provide key capabilities that help meet GDPR requirements ‘out of the box’
    ● Architectural best practices of Customer IAM that make compliance more cost effective and efficient
    ● How organizations can turn the GDPR compliance challenge into an opportunity by providing a single, unified view of the customer, building trust, and enabling secure, seamless and personalized customer engagement

    Alex Yakubov, Senior Director - Ecosystem (Yubico)

    Jesper Johansson, Chief Security Architect (Yubico)
    Baber Amin, Market Leader, Cloud Security Services (Ping Identity)
  • Trends in the Modern Data and Analytics Market and Industry Forecasts for 2018
    Trends in the Modern Data and Analytics Market and Industry Forecasts for 2018 CTO, Ruhollah Farchtchi & Jake Flomenberg Partner at Accel Partners Recorded: Feb 22 2018 61 mins
    Silicon valley venture capitalist Jake Flomenberg gets to see, track and make investments in the evolution of big picture technology trends across areas such as big data analytics, machine learning and artificial intelligence, and emerging modern data platforms and data types that are enabling organizations to be data and analytics-driven. Data driven companies make more effective information backed decisions and tend to significantly outcompete their peers operating on guesses and gut feel. Some companies are now even selling ‘data products’, for example aircraft engine manufacturers tracking and analyzing huge volumes of engine performance data to enable predictive maintenance, fixing things before failure to avoid costs and negative impact on customers.

    Jake will discuss trends he’s seeing related to the data analytics market, such as the growing need for self-service data discovery on very large volumes of data, analytics on streams of data, analytics on unstructured data, and contextual analytics embedded inside of software vendor and enterprise applications. He’ll discuss the characteristics of these markets, where he sees these markets going in the future, and why his firm chose to invest in a company like Zoomdata.

    Zoomdata CTO Ruhollah Farchtchi will then discuss industry trends he has forecast for 2018 including the eclipsing of relational databases by modern data platforms for doing analytics, how the cloud has changed the game for application development, and how working with streaming data is becoming the new normal. He’ll also discuss trends that are more specifically relevant to Zoomdata such as how to leverage the value of company’s investments in modern elastically scalable back-end data infrastructure and how to get corresponding value on the front-end, such as the ability to analyze and get insights from huge volumes of data, streaming data, and unstructured data types.
  • 2018 State of Cross-Device Digital Shopping
    2018 State of Cross-Device Digital Shopping Mary Sheehan, Global Director of Product Marketing at Verto Analytics, Aaron Schwartz, Senior Data Analyst at Verto Analytics Recorded: Feb 22 2018 36 mins
    Browse, Click, Buy: Shopping across screens in 2018

    More than 96% of all American adults engage with an e-commerce property at least once a month.* Consumers use a variety of devices to research, shop, and complete their purchases. To understand today’s digital shopper, it’s imperative to look at the full funnel view, the path before and after purchase, on multiple screens.

    In this live webinar, we’ll look at real-world examples from consumers across devices on top shopping platforms. Also, learn how you can reach and engage the right audience at the right time. We’ll discuss:

    - What does the shopper funnel view look like? See which properties are visited most before or after shopping, including day-in-the-life and week-in-the-life views of key demographics.

    - Who is the online shopper? How often do different demographics shop, how much time do they spend shopping, and when do they shop? How are online shopping behaviors different depending on demographics?

    - How do consumers behave differently with different shopping platforms? Understand how Macy's, Groupon, Wish, Target, Google, and Amazon consumers interact when they’re shopping.

    - How does multitasking play a part in shopping? Understand the other apps consumers are using while shopping, which may influence their purchase decision.

    Learn how Verto Analytics uses single-source panel data to provide the latest in digital shopping analysis. Register today.

    * Source: Verto Analytics data from December 2017.
  • Expanding Language Learning with Projects
    Expanding Language Learning with Projects Melanie Rogers, Lead Trainer at Rosetta Stone Recorded: Feb 22 2018 58 mins
    Project Based Learning is a teaching method in which students gain knowledge and skills by working for an extended period of time to investigate and respond to a complex problem. Learn about ways to incorporate Rosetta Stone lessons into projects for your K - 12 classroom. We'll talk about both elementary and middle/high school project ideas and how to pull them together for a quarter or semester length language projects.

    Join us for our monthly K-12 webinar series, Trainer’s Corner. Each month we will share information and ideas to help schools and districts make the most of their language-learning implementations.
  • Transformation of Business using Containers, Orchestration & Digital Initiatives
    Transformation of Business using Containers, Orchestration & Digital Initiatives Paul Nashawaty, Director of Product Marketing, DataCore Software Recorded: Feb 22 2018 39 mins
    Technological innovation is increasing and expanding at an exponential rate. In response, digital transformation has become an established objective for many enterprises, and the adoption of digital initiatives is now widespread. Docker, Kubernetes and other technologies related to containers are being leveraged to access and deploy systems of engagement. But before you go adding these technologies to your digital transformation road-map, you need to evaluate whether they're the best fit for your needs.

    In this webinar you'll discover how to:
    • Use containers for digital initiatives
    • Maintain the desired application state and manage persistent storage
    • Maximize your IT investments by leveraging existing infrastructure
    • Automate and integrate your infrastructure

    Containers are a solution to the problem of how to get software to run reliably when moved from one computing environment to another. Join us on this webinar to learn how DataCore provides data management and integrity across your infrastructure!
  • A Day in the Life of a GDPR Breach
    A Day in the Life of a GDPR Breach Jae Lee Product Marketing Director, Security Markets Recorded: Feb 22 2018 46 mins
    You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organization has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?

    Join this session to learn about the impact of GDPR and go through a breach investigation and response scenario as it would be after GDPR comes into effect in May 2018.

    What you will learn:
    - What breach response will look like under the GDPR
    - What tools and processes a data privacy officer will rely on in case of a breach
    - What departments and entities will be involved beyond IT
    - What activities are currently happening within organizations to prepare for the GDPR
    - What the consequences of the breach could be
  • Technology Secrets to Complying with the GDPR
    Technology Secrets to Complying with the GDPR John Ambra, Vice President Risk Product Strategy, SAI Global and Anton Merk, Director Presales, SAI Global Recorded: Feb 22 2018 61 mins
    It’s no secret that we’re on the heels of the deadline to comply with the General Data Protection Regulation (GDPR)—May 25, 2018. And to help you meet the specific criteria, we’ve built a complete technology platform that’s designed to help you become GDPR compliant.

    So save a seat for our latest GDPR webinar on February 22 at 2:00pm EST and up your understanding of a comprehensive solution that will guide you towards compliance.
  • Protecting your ATMs from Malware and Black Box Attacks
    Protecting your ATMs from Malware and Black Box Attacks NCR ATM Security Team Recorded: Feb 22 2018 38 mins
    ATMs continue to face risks and threats of jackpotting attacks. These attacks can be widespread and lead to significant losses. Recent announcements have highlighted new vulnerabilities in PC processing chips, as well as new organized criminal activities. Join experts from NCR Security for an informational and interactive webinar to learn more about these risks and the steps that you can take to proactively protect your ATMs.
  • Data Protector zum Wochenstart: DP 10 New GUI and Consolidated Scheduler
    Data Protector zum Wochenstart: DP 10 New GUI and Consolidated Scheduler Claus Nöske, Presales Consultant Data Protection, Micro Focus Feb 26 2018 8:00 am UTC 90 mins
    In den Webinaren „Data Protector zum Wochenstart“ wird Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vorstellen.

    Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb. Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.

    In diesem Webinar möchten wir noch detaillierter auf die neue Benutzeroberfläche eingehen. Dabei zeigen wir die verschiedenen Ansichten und Funktionen von Dashboard und Consolidated Scheduler. Hier ist es nun in Zukunft möglich, die Backup Jobs neben der Weboberfläche auch über ein Command Line Interface oder die REST API zu verwalten.
  • Systematic searching in Embase: using PICO to identify relevant results
    Systematic searching in Embase: using PICO to identify relevant results Xuanyan Xu Feb 26 2018 3:00 pm UTC 60 mins
    Join us for a practical webinar on searching the medical literature to answer clinical questions, with a focus on PICO Search Strategies.

    The PICO (Patient, Intervention, Comparator/Control, Outcome) process is a technique used in evidence-based practice to frame and answer a clinical question. The PICO framework is also used to develop literature search strategies.

    In this webinar, Embase solution marketing manager Xuanyan Xu will discuss:

    - The basics of systematic review and guideline making
    - The concepts that form a PICO search strategy
    - How to use PICO search form in Embase to build effective searches

    About Embase
    Embase is a highly versatile, multipurpose and up-to-date biomedical database. It covers the most important international biomedical literature from 1947 to the present day and all articles are indexed in depth using Elsevier's Life Science thesaurus Embase Indexing and Emtree®. The entire database is also conveniently available on multiple platforms.

    Ready to take the next step? Get started with this introductory webinar.
  • Tu consumidor está cambiando. Lo que los mexicanos buscan en alimentos y bebidas
    Tu consumidor está cambiando. Lo que los mexicanos buscan en alimentos y bebidas Rodolfo Garza de Ingredion México Feb 26 2018 4:00 pm UTC 45 mins
    Rodolfo Garza, Gerente de Innovación en Ingredion México, hablará sobre la conferencia TU CONSUMIDOR ESTÄ CAMBIANDO con insights e información valiosa del estudio que realizamos con consumidores mexicanos acerca de su percepción en productos saludables impartida durante The MEXICAN Healthy Product Summit 2018.
  • IR Magazine Webinar – Preparing your investors for revenue recognition
    IR Magazine Webinar – Preparing your investors for revenue recognition IR Magazine and Intelligize Feb 26 2018 4:00 pm UTC 60 mins
    Monday, February 26, 2018
    8.00 am PST / 11.00 am EST / 4.00 pm GMT / 5.00 pm CET
    Duration: 30 minutes

    Many US companies are grappling with FASB’s changes to reporting revenue. These changes have a knock-on effect for the analysts who cover you as internal models need to be updated and revenue needs to be recalculated.

    At Microsoft, the IR and accounting teams recognized the risks of the revenue recognition changes early. By starting early, they were able to address investor and analyst concerns, provide dedicated resources around revenue recognition, and clearly inform their investors and analysts of what the changes meant for them. The teams were recently presented with the Pacesetters of the Year award for excellence in financial reporting. Join this webinar for practical tips on navigating this accounting change and how you, as IR professionals, can keep your investors updated.

    Speakers include:

    • Ben Ashwell, digital editor, IR Magazine
    • Kristin Chester, senior financial manager of investor relations, Microsoft
    • Stacy Harrington, director of corporate revenue assurance, Microsoft

    Short, sharp and packed with expert insight, this webinar will get you up to speed on these critical issues in just 30 minutes. Sign up to BrightTALK to view this essential briefing and be informed of future webinars produced by IR Magazine.
  • Before you choose Microsoft – 5 Things to Check in an Access Management solution
    Before you choose Microsoft – 5 Things to Check in an Access Management solution Mor Ahuvia, Authentication Product Marketing at Gemalto Feb 26 2018 4:00 pm UTC 60 mins
    Organizations with Microsoft environments, such as Azure or Office 365, are inclined to implement Microsoft’s native access management solutions (namely, Azure AD and AD FS). Defaulting to Microsoft’s cloud SSO solutions may appear to be the best choice, a closer examination of these solutions reveals critical downsides, as well.

    Join this webinar to learn the five things to consider before implementing Microsoft’s access management solutions. You will also see a demo of how you can centrally define access management policies (including cloud SSO and step-up authentication) for Microsoft and 3rd party apps with a vendor agnostic-solution.
  • Introducing Narrow High Factor Intensity Indices
    Introducing Narrow High Factor Intensity Indices Eric Shirbini, PhD, is Global Research and Investment Solutions Director with ERI Scientific Beta Feb 26 2018 4:00 pm UTC 60 mins
    Scientific Beta has produced a series of single narrow high factor intensity indices. These narrow smart factor indices have strong exposure to the desired factor tilt but are nevertheless well diversified through the application of a multi-strategy weighting scheme, thus remaining consistent with the Smart Beta 2.0 approach developed by EDHEC-Risk Institute and ERI Scientific Beta. These indices provide more pronounced factor exposure at the single factor level and can possibly be used in custom allocation solutions, notably in the case of factor overlay, because these indices:
    - Significantly strengthen the allocation of the overall portfolio to the selected risk factor through the strong exposure to this factor
    - Avoid altering the exposures to the other rewarded factors and preserve a very good level of factor intensity through the presence of a high factor intensity filter
  • Prevent Sophisticated Threats to Financial Services - Protect Your Endpoints
    Prevent Sophisticated Threats to Financial Services - Protect Your Endpoints Lawrence Chin, Financial Services Security Architect & Joel Boyd, Director of Endpoint Protection Feb 26 2018 5:00 pm UTC 60 mins
    It’s clear that targeted and zero day attacks aren’t going away any time soon. So what do these attacks have in common?

    Endpoints were compromised.

    In fact, according to a 2017 analysis of financial services attacks by our threat research team Unit 42, 96% of cyberattacks were delivered by email in the financial services industry.

    Register for our webinar and learn:
    •How cyberattackers bypassed legacy security solutions in recent attacks
    •What you can do to reliably reduce the risk of successful attacks
    •How to prevent unknown threats from compromising your systems, even unpatched ones
  • A Silver Bullet for Zero-day and Ransomware Attacks
    A Silver Bullet for Zero-day and Ransomware Attacks Jason Rose, Senior Security Consultant Feb 26 2018 6:00 pm UTC 60 mins
    How to address the unknown of Zero-day threats and cryptoware variants.

    Anti-virus and anti-malware has a fundamental flaw that’s becoming more and more obvious: it needs a catalog of all the malicious software in the world in order to work effectively. Building this catalog is an impossible task; new exploits (“zero-day exploits”) are created every day and often go undetected for months at a time. The gap between the release and the discovery of malicious software is where the real threat to your organization lies. DriveLock addresses this gap with application whitelisting, and with DriveLock Smart AppGuard, maintaining that whitelist is easier than ever before.

    Anti-virus and anti-malware software is fundamentally flawed. A time lag will always exist between release of an exploit and its discovery; that time lag can mean your systems are vulnerable to that exploit for weeks or even months at a time.

    Application whitelisting addresses this flaw by taking the opposite approach of anti-malware: instead of providing a list of software the system is NOT allowed to run, it provides a list of software it IS allowed to run. Zero-day exploits never even have a chance to run because they aren’t on the approved list of software.

    By using a cryptographic hash function to positively identify software files, attackers can’t impersonate an entry on the whitelist. File name, file location, and file owner whitelist rules can all be easily circumvented.

    With DriveLock’s Smart AppGuard, the work that goes into maintaining an application whitelist database is effectively cut to zero. Enjoy the security of application whitelisting without the headaches of whitelist database maintenance.
  • Ransomware Hostage Rescue Guide
    Ransomware Hostage Rescue Guide Erich Kron CISSP, Security Awareness Advocate Feb 26 2018 7:00 pm UTC 60 mins
    2017 was a Ransomware nightmare. If you've been in the IT trenches over the past year, you've probably noticed that ransomware attacks are accelerating, damages are more severe and there is no end in sight for 2018

    Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4 for the webinar “Ransomware Hostage Rescue Guide”. We will look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and advise what to do when you are hit with ransomware.

    Erich will cover these topics:

    * What are new scary ransomware features in the wild?
    * I’m infected, now what?
    * Proven methods of protecting your organization
    * Why the “human firewall” is so effective
  • Bridging the Gap Between Sales and Marketing
    Bridging the Gap Between Sales and Marketing Alice Heiman and Liz Heiman Feb 26 2018 9:00 pm UTC 45 mins
    We have all seen just how devastating the results can be when sales and marketing teams aren't aligned. In this webinar, Alice and Liz will share their secrets about how aligning sales and marketing will better engage your customers at critical junctures in the buyer journey and will boost sales and marketing results.

    Sales, Marketing, Sales Enablement, Buyer's Journey, Sales Cycle, Customers
  • The 5 Essentials of Every Next-Gen SOC
    The 5 Essentials of Every Next-Gen SOC Peter Sparkes, Senior Director, Cyber Security Services, Symantec Feb 27 2018 5:00 am UTC 60 mins
    Every cybersecurity organisation is challenged with enabling the fast pace and nuances of their business strategy. Security measures must quickly keep up and be an enabler while continuing to mitigate the risks of a breach occurring.

    New technology adoption and expanded attack surfaces, evasive cyber threats, and limited budget and staffing resources make this challenging – there’s a lot to stay on top of.

    How does your Security Operations Center (SOC) keep up?

    Join us to learn how to scale and extend the capabilities of your SOC.

    We’ll review topics such as:

    - Automated security event analysis

    - Human security event analysis and prioritisation

    - Threat visibility across key on-premise and cloud control points

    - Consumption of technical and strategic threat intelligence

    - Proactive threat hunting and incident response

    Register Today
  • 한국인 저자를 위한 팁: 원고의 명료성를 높이는 방법
    한국인 저자를 위한 팁: 원고의 명료성를 높이는 방법 Jieun Hani Kim Feb 27 2018 5:30 am UTC 75 mins
    This webinar which will be delivered in Korean.

    You will understand why ESL authors fail to write clearly and coherently in English. The contents of the webinar are tailored to the Korean audience, explaining key differences between Korean and English and common misconceptions in technical writing that lead to poor readability and clarity when authors write scientific manuscripts. We will explain through examples how you can increase clarity at various levels of the text.
  • Everything You Need to Know About Critical Healthcare Segments
    Everything You Need to Know About Critical Healthcare Segments Sanjeev Kumar (Industry Manager), Natasha Gulati (Industry Manager), Siddharth Shah (Industry Analyst) Feb 27 2018 6:30 am UTC 135 mins
    Frost & Sullivan is forecasting another year of disruptions in critical healthcare segments such as diabetes care, smart hospitals, healthcare cloud computing and digital pathology. This webinar will focus on these industries along with insights on key trends influencing the healthcare system, followed by a live question-and-answer session.

    Join Us to Gain Insights on:

    • Future paradigms in diabetes care and harnessing evolutionary trends to improve the quality of life for diabetics
    • Understanding the smart hospital concept and identifying relevant applications and growth opportunities
    • Healthcare cloud computing trends, such as global provider spending on cloud solutions approaching $10 billion by 2021
    • Growth opportunities in the global digital pathology market
  • Cyber Security Update 2018
    Cyber Security Update 2018 Markus Grüneberg, Security Strategist and Mario Seefried, Cyber Security Professional Feb 27 2018 9:00 am UTC 60 mins
    So bleiben Sie vor den neuesten Cyber-Bedrohungen geschützt

    Erfahren Sie in unserem Cybersecurity-Jahresupdate für 2018, wie aktuelle Angriffe aussehen und wie Sie Ihr Unternehmen vor diesen neuen Bedrohungen schützen. Informieren Sie sich unter anderem, über

    - Vorhersagen für die Bedrohungslandschaft 2018 mit besonderem Fokus auf Europa
    - Wichtige Maßnahmen, die Sie ergreifen können, um Ihr Unternehmen zu schützen
    - Top-Ressourcen zur Unterstützung Ihrer Sicherheitsanstrengungen
  • Sind sie richtig abgesichert?
    Sind sie richtig abgesichert? Kai Kudlek, CISSP, CISA, CISM Senior Systems Engineer Feb 27 2018 9:00 am UTC 60 mins
    Auf der Wunschliste für tägliche Aufgaben steht Hunting bei Sicherheitsanalysten, SOC Mitarbeitern und Administratoren häufig ganz oben. Die fehlenden Möglichkeiten, Aufgaben sinnvoll und effizient zu priorisieren und dabei die Sicht aufs Ganze zu behalten sorgt aber oft dafür, dass dieser Wunsch selten erfüllt wird und stattdessen die tägliche Routine in der Analyse von false positive Alarmen und Alarmen mit geringer Kritikalität liegt.

    FireEye Helix stellt eingehende Alarme in Kontext dar, bewertet diese und bietet Ihnen so die Möglichkeit, schnell zu priorisieren und bei den wenigen, entscheidenden Fällen in der gleichen Oberfläche mit dem Hunting zu beginnen.

    Dieses Webinar gibt einen kurzen Überblick über die Möglichkeiten der FireEye Helix Plattform gefolgt von einer leicht verständlichen Hunting-Demonstration.
  • Poznaj SUSE
    Poznaj SUSE Aleksandra Trzcińska i Artur Duszczyk Feb 27 2018 9:00 am UTC 60 mins
    Zapraszamy nowych partnerów handlowych SUSE na krótki briefing z naszych rozwiązań, sposób sprzedaży i licencjonowania, korzystania z zasobów przygotowanych dla partnerów, w tym bezpłatnych szkoleń handlowych i technicznych.
  • Introducing the Zurich Property Fund
    Introducing the Zurich Property Fund David Walls and Ian Johnston Feb 27 2018 10:00 am UTC 60 mins
    David Walls, Head of Retail Investment Sales, will be joined by Ian Johnston, Head of SSGA Ireland Real Estate, to discuss the outlook for property markets, SSGA's approach to real estate investment, and how the fund could fit into your investment portfolio
  • Transitions From CA eHealth® to CA Performance Management for Modern Network Ops
    Transitions From CA eHealth® to CA Performance Management for Modern Network Ops Drew Gardner, CA Technologies, Solution Sales & Gary Williams, Telefonica UK, Product Manager - OSS Tools & Gateway SDN Feb 27 2018 10:00 am UTC 60 mins
    O2/Telefonica is launching their SD-WAN offering to the market this year built using the Network Operations and Analytics platform from CA. After a successful CA eHealth to CA Performance Management upgrade, they now have the capability to define their customer SD-WAN offering thanks to modern network performance monitoring from CA. In this session, learn how one of the largest UK telecommunications providers transitioned to a modern network monitoring platform that delivers fast and intuitive network operations insights, capacity planning and high scale and future proofs their next-gen SDN initiatives to competitively win the digital marketplace.
  • HGST SVR2U24 NVMe Storage Server
    HGST SVR2U24 NVMe Storage Server Manfred Berger, HGST - Sr. Mgr. Business Development Platforms EMEAI Feb 27 2018 10:00 am UTC 45 mins
    In this webinar Manfred Berger introduces the latest addition to the HGST platform portfolio, the SVR2U24 NVMe all-flash storage server.

    Combining high performance NVMe SSDs and Intel®’s Purley server architecture into one tried and tested unit, the SVR2U24 enables customers to come to market quickly with a multitude of software defined storage solutions or data base servers optimized for high speed search operations, catering to a multitude of industry verticals.
  • Overcoming the income challenge - Kames Multi-Asset Income Solution
    Overcoming the income challenge - Kames Multi-Asset Income Solution Steve Kenny Feb 27 2018 10:00 am UTC 60 mins
    Vincent McEntegart, co-manager of the Kames Multi-Asset Income strategy, will explore the income theme in today’s low interest rate environment, explaining the benefits of a multi-asset approach to meet a target income of 5% per annum without taking undue levels of risk.
  • 5 Key Principles for Managing the Multi-Cloud Maze
    5 Key Principles for Managing the Multi-Cloud Maze Matthew Prickett - Cloud Systems Engineer, F5 Networks Feb 27 2018 10:00 am UTC 60 mins
    85% of organisations are committed to a multi-cloud architecture. The other 15% are probably doing it by accident. However, with every additional cloud comes increased operational complexity, a new set of interfaces, and another potential security loophole to worry about.

    Help your organisation nullify these challenges and succeed in a multi-cloud world by providing the key principles, solutions, technologies, and tools that enable you to deliver services consistently, efficiently, and securely across all your clouds.

    In this webinar, you will learn:

    5 key principles including abstraction, standardisation, and automation ‒ the new imperatives for network operations
    How planning for a multi-cloud architecture will help you avoid the pitfalls of disparate environments across multiple cloud providers
    Common use cases that will give you the confidence to deploy your cloud apps in a fast, controlled, and more secure manner
  • GDPR’s Dirty Little Secret and How Object Storage Enables Compliance
    GDPR’s Dirty Little Secret and How Object Storage Enables Compliance Glen Olsen, Product Manager, and Alex Oldfield, Solutions Architect Feb 27 2018 10:30 am UTC 60 mins
    The dirty little secret? The General Data Protection Regulation (GDPR) does not just affect companies in the EU, it affects companies around the world that collect or process data concerning EU residents. Caringo Product Manager Glen Olsen and Solutions Architect Alex Oldfield explain the challenges organisations face and how Caringo Swarm Object Storage provides a cost-effective solution to help meet the requirements as well as how Data Protection Officers can use Swarm to monitor and enable GDPR compliance.
  • Embrace Next-Generation Cloud Communications For Governance And Compliance
    Embrace Next-Generation Cloud Communications For Governance And Compliance Mark Elwood, Marketing Director, TeleWare Feb 27 2018 11:00 am UTC 60 mins
    New regulations such as MiFID II mean that the regulatory requirement for recording, storage and retrieval of communication data has grown exponentially. Infrastructure and governance overheads and security must be managed wisely, utilising next generation technologies where available to ensure compliance is cost-effective, robust and meets required SLAs.

    Join a group of industry experts including TeleWare and Microsoft to hear more about how financial markets players are turning to the cloud to meet and surpass exacting standards in recording, storage, retrieval and governance for communications data.

    This webinar will be an interactive panel session discussing:
    • Cloud services for Cap Markets - how have cloud services developed to meet the exacting standards of the investment banks and brokers?
    • Why now is the time for cloud services in capital markets.
    • Voice and eCommunication recording – why the cloud is taking the sting out of the increased data storage requirements for MiFIDII.
    • Compliance-specific requirements – including data security and in-country storage.
    • Hybrid deployment models – leveraging cloud services alongside existing enterprise environments.
    • Cost factors – how TCO can be significantly reduced by intelligent outsourcing, including cost of governance, security and compliance.
    • Reaching new heights – methods of migration, deployment and ongoing data management.
    • And why uncertainty about Brexit is driving the need for more flexibility to scale up or down across different geographies.

    The session will be hosted by Mark Elwood, Marketing Director, TeleWare

    Ian Salmon, Director, IgniteG2M Limited. Specialist regulatory advisers
    Andrew Fawcett, MiFID II Product Manager, TeleWare
    Hannah Cawthorne, Financial Services Industry Lead, Microsoft