Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Straight Talk on Business Critical Applications in the Cloud
    Straight Talk on Business Critical Applications in the Cloud Jim Hannan, Principal Architect; House of Brick Technologies Live 60 mins
    As much as the term Cloud Computing gets tossed around these days you would think everyone’s using it. But do cloud predictions really match real world use? If you aren’t “in the cloud” are you already behind the competition?

    During this presentation, we will discuss the pros and cons of moving applications to the cloud, with a particular focus on business critical applications. We will share our experiences working with clients to determine if their applications are “cloud ready” through a review of availability, costs, and operational impacts. Examples of successful use cases in the public cloud will be explored including emerging technologies, DRaaS, new applications, older applications running on older hardware, and startups.

    You’ll leave with a better understanding of the types of applications that are best suited for the cloud, a list of questions you should be asking when considering moving to the cloud, and a checklist you can use to evaluate your application’s cloud readiness.
  • How to Create a Webinar Factory: Lessons Learned from The Content Wrangler
    How to Create a Webinar Factory: Lessons Learned from The Content Wrangler Scott Abel, Chief Wrangler at The Content Wrangler Live 60 mins
    The Content Wrangler is a San Francisco-based global digital media company that exists to help organizations adopt the tools, technologies, and techniques they need to connect content to customers.

    A small shop with two employees, The Content Wrangler uses webinars to build awareness, develop interest, and spot right-fit prospects. To compete with much larger firms, the company leverages its content strategy know-how to produce nearly 100 webinars a year on BrightTALK.

    Producing that many programs may seem unrealistic for even a much larger team, but it’s possible because the company applies principles from lean manufacturing to their webinar production processes -- a format that any company can replicate.

    Join BrightTALK for a special presentation from Scott Abel, Chief Wrangler at The Content Wrangler. You’ll learn how The Content Wrangler built one of the fastest growing—and most engaged—channels on brighttalk.com.

    You’ll discover how adapting lessons learned from single-source publishing can be applied to your webinar production process, enabling you to produce more webinars with less effort.
  • SIEM 2.0 - How Unified Security Management SIEMplifies Threat Detection
    SIEM 2.0 - How Unified Security Management SIEMplifies Threat Detection Sacha Dawes, Principal Product Marketing Manager, AlienVault Live 60 mins
    SIEM solutions have been widely adopted to help IT teams collect and correlate data from a variety of security point products. However, traditional SIEM deployments require a great deal of time, money & expertise to properly normalize data feeds, create correlation rules to detect threats & continuously tune those rules to limit false positives. And, after all that work is done, it has to be continuously re-done as the network & threat landscape changes.

    AlienVault takes a different approach to SIEM. Join this webcast to learn how AlienVault Unified Security Management (USM) overcomes the most common SIEM challenges with:

    Built-in capabilities like asset discovery, vulnerability assessment, intrusion detection, orchestrated incident response, and log management
    Continuously updated correlation directives, vulnerability signatures, incident response guidance, and more
    Fully integrated, real-time threat intelligence from the AlienVault Labs Security Research Team and the AlienVault Open Threat Exchange (OTX)
    The ability to monitor on-premises and cloud environments including AWS and Azure, as well as cloud applications like Office 365
  • How to Use the NIST CSF to Recover from a Healthcare Breach
    How to Use the NIST CSF to Recover from a Healthcare Breach Axel Wirth, CPHIMS, CISSP, HCISPP, Technical Architect, Symantec & Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Live 60 mins
    Part 6 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    The final piece to the puzzle is the RECOVER function, which is arguably the most important area of the NIST CSF. How quickly can you return to business and clinical operations after a cyberattack occured?

    This webinar will focus on the measures required for a timely recovery and return to normal operations to reduce the impact from a cybersecurity event, with a focus on:

    • Recovery Planning: Processes and procedures are executed and maintained to ensure timely restoration of systems or assets.

    • Improvements: Planning and processes are improved by incorporating lessons learned.

    • Communications: Restoration activities are coordinated with internal and external parties.

    Register Today

    To view upcoming NIST Cybersecurity Framework for Healthcare Series Part 7 https://resource.elq.symantec.com/LP=4235
  • ExtraHop 7.0: Know the Shape of Your Enterprise
    ExtraHop 7.0: Know the Shape of Your Enterprise Isaac Roybal, Director of Product Marketing and Paul Sanford, Sr. Director of Product Management for ExtraHop Live 60 mins
    Many teams throughout the enterprise—security, network, IT operations—lack the insights needed to make confident, data-driven decisions. People cannot access the data they need quickly, resulting in waste, slow response times, and expensive incidents.

    With the announcement of version 7.0, ExtraHop provides real-time and empirical data all teams can benefit from through complete visibility, faster incident resolution, and stronger security.

    In this webinar, we will cover the new ways we are helping our customers reveal the shape and context of their digital enterprise by demonstrating:
    • Live activity maps that allow for unprecedented visual environment exploration
    • Automated anomaly workflows—including new security anomalies
    • Scheduled reports that share real-time views of the information that matters most to each user
  • SNIA's New 100-Year Archive Survey: Ten Years Later
    SNIA's New 100-Year Archive Survey: Ten Years Later Thomas Rivera, SNIA-DPCO Co-Chair; Sam Fineberg, SNIA LTR TWG Co-chair; Bob Rogers, CTO, Application Matrix Live 75 mins
    Ten years ago, the SNIA 100-Year Archive Task Force developed a survey with the goal to determine the requirements for long-term digital information retention in the data center - requirements needed to frame the definition of best practices and solutions to the retention and preservation problems unique to large,scalable data centers.

    Now in 2017, SNIA presents a new survey developed to assess the following details:

    1. Who needs to retain long term information
    2. What information needs to be retained and for how long
    3. If organizations are able to meet their retention needs
    4. How long term information is stored, secured and preserved

    Join us as we see where we were and where we need to be in the preservation and retention of data.
  • Win the Cyberwar with Zero Trust
    Win the Cyberwar with Zero Trust John Kindervag, Field Chief Technology Officer at Palo Alto Networks Live 60 mins
    Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world.

    In this session, John will discuss the concept of Zero Trust and explain why Zero Trust is the world's only true cybersecurity strategy. He will show a Zero Trust Strategy will achieve tactical and operational goals. This session will demonstrate how Zero Trust will not only transform network security but function as a business enabler, by focusing on the businesses grand strategic objectives.
  • Capital Conundrum: Affording New School Buses in Times of Austerity
    Capital Conundrum: Affording New School Buses in Times of Austerity Tim Ammon, TransPar Group of Companies Live 60 mins
    The talk in transportation is always about having safe and reliable school buses. However, the reality is that finding the funds to purchase new buses to support safety and reliability has been increasingly difficult as capital funding has been more difficult to provide.
  • Cloud-Delivered SD-WAN and Security: Best Practices for Branch Transformation
    Cloud-Delivered SD-WAN and Security: Best Practices for Branch Transformation Dhawal Sharma, Director of Product Management, Zscaler, Inc., Rachna Srivastava, Sr. Director of Product Marketing, VeloCloud Live 60 mins
    Cloud technology is the key enabler to new business opportunities, improved efficiency, and a sustainable competitive edge. IT requires new ways to rapidly deliver business applications and services in the cloud reliably and securely. This can be achieved by adopting a new approach that allows for agility and security in the cloud-era.

    Attend this webinar to learn about a holistic transformation strategy that brings cloud security and SD-WAN from Zscaler and VeloCloud together for secure, efficient, and cost-effective access to cloud applications and services, over the Internet and beyond.
  • How automation is enabling Lean HR Teams to be more productive
    How automation is enabling Lean HR Teams to be more productive Elizabeth Schillo, VP of Sales and Jack Gehrke, Solutions Architect of CareerBuilder Live 60 mins
    You’ve heard “Do more with less” a lot over the last decade. But as teams get leaner, the talent marketplace is becoming more competitive. It’s a candidate marketplace and that’s why it’s now more important than ever to find, engage and hire talent as efficiently—and effectively—as possible.

    Join us October 17 at 1 p.m. EST for our latest webinar: How Automation Is Enabling Lean HR Teams To Be More Productive.

    Elizabeth Schillo, VP of Sales at CareerBuilder, and Jack Gehrke, Solutions Architect at CareerBuilder, will share strategies for attracting, engaging and hiring the best candidates in the least amount of time.

    In the webinar, you’ll understand:

    • Trends that are affecting the HR industry and how you can prepare now to upcoming changes.
    • How to stay ahead of competitors in this ultra-competitive talent market.
    • Strategies lean HR teams can use to attract, engage and hire top talent.
    • Where to make investments in automation to create better efficiencies in your recruitment process.

    You will also get a first-look at CareerBuilder’s latest recruitment solution for staffing and recruitment leaders.
  • Adventures in TI: What is your IP Reputation?
    Adventures in TI: What is your IP Reputation? Guy Rosefelt, Director of PM, APAC Threat Intelligence & Web Security Live 45 mins
    Abstract: Can you afford not knowing how bad your provider's IP reputation is? How likely are IP addresses adjacent to you of being infected with malware or participating in botnets?

    NSFOCUS has been tracking the reputation of IP addresses globally by ASN for over a year and recently released the August 2017 Global IP Reputation report. Some interesting patterns have emerged worldwide as the number of IP addresses added to reputation lists continues to increase due to Mirai, WannaCry and other malware infecting the Internet of Things.

    NSFOCUS SecLab is tracking IP reputation across 9 categories, including SPAM, DDoS, botnets, and web attackers. This talk will present global IP reputation trends and rank the countries with the worst IP reputation…and it may not be China.
  • Are you going to access that data, FROM THERE?
    Are you going to access that data, FROM THERE? Benjamin Massin, CEO at The SCE Group & Gleb EvfaresTov, Solutions Engineer at Bitglass Live 60 mins
    The modern science of securing applications to a broad range of devices.

    Do you want people accessing your data from that device? Do you know where that device has been? Would you trust that device to protect your personal data? While cloud applications offer tremendous benefits over traditional on-premise, IT Executives face many challenges involving data security and compliance. Unmanaged devices, unauthorized access, and unsanctioned apps are all significant threats, increasing the risk of data leakage and being the next organization in the headlines. Cloud access security brokers, or “CASBs” are the tools technology leaders have turned to, protecting data across applications, and mitigating other malicious threats.

    In this webinar, Benjamin Massin, CEO of The SCE Group, and Gleb EvfaresTov, Solutions Engineer at Bitglass, will discuss how to balance the benefits of moving to the cloud, while implementing a security solution, protecting identities and data end-to-end.
  • Connected devices and the rise of invisible payments
    Connected devices and the rise of invisible payments Kevin Gordon, Lead Innovation Architect, Worldpay Recorded: Oct 17 2017 31 mins
    By 2020, five billion people will be online, with 25 billion devices and machines using the Internet. Many devices will share data and services, and the way we engage with them will fundamentally change. In a connected world, consumer expectations of executing transactions on a phone, tablet, VR device – or even a refrigerator – will be higher than ever.

    As time goes on, devices will become smarter and make more and more decisions for us. We’ll be able to create rules as users to tell our devices what we’re comfortable with them paying for automatically. The use cases for rule-based payment are endless!

    As such, the onus of creating frictionless download and shopping experiences while overcoming barriers between devices lies with each business. When it comes to recurring and subscription payments, the technology underpinning these user experiences across devices is critical. Seamless, simple, and secure are the watchwords of an IoT world.

    Don’t wait until 2020 to address consumer pain points and overcome technological barriers to IoT adoption. Tune in to the latest VB Live event and hone in on the fastest, best ways to prepare for the IoT world. After all, it’s already here. Attend this webinar and find out:

    •How companies are already dealing with device connectivity
    •How the challenges posed by IoT are being solved for today
    •Global consumer attitudes around payments made by devices
    •How payments will become ‘invisible’ or ‘translucent’ for users
    •Payment technology that will enable devices to make decisions

    SPEAKERS:
    * Kevin Gordon, Lead Innovation Architect, Worldpay
    * Stewart Rogers, Analyst-at-Large, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by: Worldpay
  • Start Benefiting from PAN-OS 8.0 with User-ID and Global Protect
    Start Benefiting from PAN-OS 8.0 with User-ID and Global Protect Wiley Richardson, Security Engineer, Trainer and Cloud Architect at Cloud Harmonics Recorded: Oct 17 2017 38 mins
    Join us for our follow-up webcast with a focus on Authentication, Global Protect, and User ID enhancements to get a quick overview of SAML Authentication, Global Protect Clientless VPN and other selected new features and enhancements that PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Attendees will:

    •Learn about the key capabilities introduced by 8.0
    •See the value of the update to security deployments
    •Receive a voucher for 8.0 training course - $500 value
  • CASB 2.0: The Next Frontier for CASB
    CASB 2.0: The Next Frontier for CASB Deena Thomchick of Symantec Recorded: Oct 17 2017 50 mins
    The rapid adoption of cloud applications and services has fueled the need for new security solutions, such as Cloud Access Security Brokers (CASBs). But how do these systems weave into your overall security infrastructure? There are many intersections to consider, such as DLP, Advanced Malware Protection, Web Security and Endpoint where organizations are navigating how to best integrate cloud security into their environment. This talk will explore this next frontier of CASB solutions.
  • Getting Started: Automating Google Cloud Platform with Chef
    Getting Started: Automating Google Cloud Platform with Chef JJ, Strategic Technical Alliances at Chef & Nelson Araujo, Software Engineer at Google Recorded: Oct 17 2017 47 mins
    Google and Chef have come together to collaborate to manage the Google Cloud Platform (GCP) natively with Chef. Leveraging the ability of idempotency and Chef you can now declare cloud resources, using Chef, to manage GCP. By combining Chef Automate with GCP, we will show off the ability to programmatically spin up complete cloud infrastructures, without leaving Chef or the need of other tools.

    This webinar will show in action the first wave of products supported deploying a complete end-to-end solution into the cloud, from the ground up, straight from Chef.

    If you have Chef in your infrastructure or are interested in using Chef, your administrators, auditors, and executives will be interested in viewing this webinar.
  • Everything You Need to Know About the Future of Content Experience
    Everything You Need to Know About the Future of Content Experience Randy Frisch, CMO & Co-founder, Uberflip Recorded: Oct 17 2017 46 mins
    Your content experience is the environment in which your content lives, but it’s also so much more than that. It’s the place where all the user action takes place. It’s where a visitor converts to a lead, and where you can measure your content’s effectiveness across the entire buyer journey.

    If you want to improve your content’s performance, you can’t afford to ignore your content experience any longer. In this live webinar, you’ll learn:

    - Why you need to start focusing your content marketing efforts on optimizing your content experience
    - How to build a high converting content experience
    - How a well-optimized content experience can help enable content to be used across your entire B2B organization
  • Multi-Asset Funds: Risk-taking strategies for the current environment
    Multi-Asset Funds: Risk-taking strategies for the current environment Rory Mcpherson (Psigma Investment Management), Jeffrey L. Knight (Columbia Threadneedle), Lawrence Petrone Recorded: Oct 17 2017 51 mins
    Join this panel debate where the speakers will cover:
    -Market outlook
    -Evolution of asset allocation
    -Risk-taking strategies for the current environment
    -2018 predictions
    -Challenges and opportunities
  • The Rise of the Robots - Automating the Content Chain for the Connected Traveler
    The Rise of the Robots - Automating the Content Chain for the Connected Traveler Kevin Ashbridge, Ph.D, Account Director, SDL Recorded: Oct 17 2017 57 mins
    It is now possible to deliver relevant, localized and personalized content instantly, across digital channels and devices globally. Hear how automated content machines can now handle content creation, translation and internet publishing processes.

    Discussion Points:
    *Explore the idea that it is now possible to deliver relevant, localized and personalized content instantly, across digital channels and devices globally.

    *Hear how automated content machines can now handle content creation, translation and internet publishing processes for your travel business"
  • Increase Engagement and Sales with Effective Sales Contests
    Increase Engagement and Sales with Effective Sales Contests Debbie Mrazek, President Recorded: Oct 17 2017 47 mins
    This webinar will help those in charge of conducting contests to inspire results and actions to increase sales. Learn how to create a successful SALES contest that can change behavior and your bottom line….which can be FUN! Learn what to to reward, how to reward and types of rewards.