Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • How Does It Work? Intelligent Self-Service Search How Does It Work? Intelligent Self-Service Search Inbenta Recorded: Feb 26 2017 2 mins
    Discover how the Inbenta AI-Powered, Intelligent Search works to improve your Customer Service.
  • AI World 2016 Panel Discussion with CEO Jordi Torras AI World 2016 Panel Discussion with CEO Jordi Torras Jordi Torras, CEO, Inbenta Recorded: Feb 26 2017 36 mins
    Focused on business websites and corporate intranets, Inbenta is a global pioneer in a new class of enterprise semantic search technology that's aimed to dramatically improve the experience of online customers. By using the latest developments in natural language processing technologies and artificial intelligence, Inbenta has helped multiple companies drop incoming email queries and customer support calls because the customer easily finds what they are looking for on the company's website. Inbenta also specializes in self-service, e-commerce search, virtual assistants, chatbots, support ticketing and knowledge management.
  • The economics of using Cloud Storage to replace LTO tape backup The economics of using Cloud Storage to replace LTO tape backup Andrew Klein Recorded: Feb 24 2017 31 mins
    If you’ve considered replacing your LTO tape system, you’ve learned that using cloud storage for backup and archiving can be expensive and nearly impossible to predict your cost when you had to recover your data. Until now. Backblaze B2 provides cloud storage for just $0.005/GB per month. Join us as we show you how companies have saved time, improved their ability to quickly recover data, and saved money by replacing their LTO set-up with B2 Cloud Storage. Never buy another tape again…
  • Symantec Cloud Workload Protection Product Demo Video Symantec Cloud Workload Protection Product Demo Video Symantec Recorded: Feb 24 2017 2 mins
    Symantec Cloud Workload Protection, our latest offering for securing enterprise data center migrations into the public cloud. This new offering adds workload security to Symantec’s security portfolio for the cloud generation.

    Cloud Workload Protection provides elastic security for AWS and Microsoft Azure workloads via cloud-native integration, enabling businesses to enjoy public cloud benefits without worrying about the security and integrity of their brand as they offer new services to their customers.

    To learn more, visit the Symantec Cloud Workload Protection product page: https://www.symantec.com/products/threat-protection/cloud-workload-protection
  • Biz Dev Done Right Biz Dev Done Right Caryn Kopp, Chief Door Opener Recorded: Feb 24 2017 45 mins
    When Business Development is done right, there is no limit to what can be accomplished! Caryn answers the top 4 sales questions she is asked most about sales including, “How do I get more sales? How do I meet more prospects? How do I close sooner? And, how do I find time for business development?”
  • Trends in Optical Communications Trends in Optical Communications Vladimir Kozlov PhD, Founder & CEO of LightCounting and Larry Tarof PhD, Jabil Chief Photonics Scientist Recorded: Feb 24 2017 57 mins
    By 2020, more than 20 billion devices will connect to the internet. To carry the load created by our passion for connected living, much of the digital infrastructure we rely on is turning to high-speed fiber optics. Join Vladimir Kozlov PhD, Founder & CEO of LightCounting, and Jabil Chief Photonics Scientist Larry Tarof PhD, in this one-hour webcast as we explore the technological advancements and market trends shaping the optical communications industry.
  • How Content Marketing on LinkedIn can Boost your Bottom Line How Content Marketing on LinkedIn can Boost your Bottom Line Viveka von Rosen Recorded: Feb 24 2017 48 mins
    LinkedIn Publisher is like a hidden treasure for content marketing. If you have the right “map” to find the gold within! My session will be your roadmap to LinkedIn Content Marketing Success. As one of Linkedin Learning’s authors, we get special access to what LinkedIn is looking for in Publisher Posts- and I’ll share that information with you!
  • eDiscovery and CloudNine: A Complete Demonstration eDiscovery and CloudNine: A Complete Demonstration Doug Austin, VP of Ops and Professional Services, CloudNine Recorded: Feb 24 2017 17 mins
    A complete demonstration of CloudNine's SaaS-delivered eDiscovery automation software by industry expert and author Doug Austin. Used extensively by corporations and law firms to simplify legal discovery in litigation, investigations, and audits, CloudNine provides eDiscovery practitioners with a secure platform that enables the upload, review, and production of documents from a fully integrated and automated fourth-generation eDiscovery platform. For a free trial, visit eDiscovery.co.
  • [VIDEO] Cyber Security Lessons for the Financial Sector [VIDEO] Cyber Security Lessons for the Financial Sector Josh Downs, Community Manager, BrightTALK & Ian Glover, President, CREST Recorded: Feb 24 2017 11 mins
    BrightTALK will be broadcasting its in-depth interview with CREST President Ian Glover and Nettitude MD Rowland Johnson jointly in conversation.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • 2017 Cybersecurity Threat Insights Report for Leaders 2017 Cybersecurity Threat Insights Report for Leaders Chris Yule, Senior Researcher, Counter Threat Unit Recorded: Feb 24 2017 53 mins
    In our “Cybersecurity Threat Insights Report for Leaders”, we shared several key findings and observations from our client engagements and about the security industry. This webcast will cover our findings and observations but will also provide you with clear direction on where you need to focus your resources to evoke positive action in your security program.

    During this webcast one of our lead Counter Threat Unit™ researchers, Chris Yule, who helped develop the report, will give his perspective, observations and guidance through responses to a series of questions led by our EMEA Marketing Manager, Andy Patton.
  • Introducing Yellowfin 7.3 Introducing Yellowfin 7.3 Glen Rabie, CEO, Yellowfin Recorded: Feb 24 2017 31 mins
    Yellowfin is a Business Intelligence platform that makes discovering and sharing insights easy.

    You expect your Business Intelligence (BI) solution to convert data into insights. However, finding insights is only half the puzzle. Data-driven insights are only valuable when shared. Empower the right people to take the right action, at the right time, with Yellowfin.
  • Data defies politics Data defies politics Kevin O'Nolan & Nick Peters Recorded: Feb 24 2017 6 mins
    Economic data indicates a positive growth and inflation backdrop. Multi Asset portfolio managers Kevin O’Nolan and Nick Peters play this off against some of the current political developments and the asset classes and regions best placed to benefit.
  • Cómo recuperar el control de sus datos móviles Cómo recuperar el control de sus datos móviles David Sanz - EMEA Endpoint & Mobile Competency Lead Recorded: Feb 24 2017 54 mins
    Los puestos de trabajo y los dispositivos móviles son habitualmente los aspectos más olvidados en la estrategia de gestión de datos empresarial. Sin embargo, la información presente en ordenadores portátiles, de escritorio y dispositivos móviles es uno de los activos de mayor valor para la organización, pese a que potencialmente se encuentra en máximo riesgo. De acuerdo con IDC hay alrededor de 1.300 millones de trabajadores móviles hoy en día, pero tan solo la mitad de las empresas utiliza algún tipo de backup para puestos de trabajo.

    La fuerza de trabajo móvil es cada vez mayor. Dichos usuarios manejan información fuera del dominio tradicional del departamento de TI y emplean soluciones de colaboración no corporativas. El coste potencial y el riesgo asociados al cumplimiento de la normativa y al eDiscovery, la necesidad de proteger el puesto de trabajo y de aportar soluciones de colaboración corporativas están claros y se encuentran en un punto de inflexión crucial.

    Acompáñenos en este webinar, donde analizaremos:
    - Cómo recuperar el control sobre lo que ocurre en los dispositivos móviles de los trabajadores
    - Cómo mitigar los riesgos asociados con los ataques cada vez más frecuentes de ransomware
    - Cómo aumentar la productividad con una plataforma segura para la compartición de archivos
  • Comment protéger et surveiller vos données sensibles en tous lieux Comment protéger et surveiller vos données sensibles en tous lieux Hervé Doreau, Directeur Technique - Symantec France Recorded: Feb 24 2017 44 mins
    À l’heure où 5 grandes entreprises sur 6 sont la cible d’attaques avancées, la protection des données est votre meilleure stratégie pour éviter de faire la une des journaux. En quoi consiste la protection des données ?
    Lors de ce webcast, nos experts vous montreront les atouts des technologies Symantec pour mettre en œuvre une approche intégrée en : 
    - Limitant et contrôlant l’accès aux données aux seuls utilisateurs légitimes grâce à une authentification multifacteurs renforcée, quel que soit le périphérique utilisé, même un appareil personnel.
    - Surveillant le flux des données où qu'elles se trouvent : dans le cloud, sur site, sur des appareils mobiles, ou sur un stockage à long terme.- Évitant les pertes de données par l'adoption de politiques de chiffrement ou de blocage des informations critiques avant qu’elles ne quittent le périmètre de protection.
  • The Art of Preventing Ransomware The Art of Preventing Ransomware Bitdefender Recorded: Feb 23 2017 3 mins
    See how ransomware attacks and how Bitdefender is able to prevent those attacks.
  • SECOPS Automation on the Rise: Challenges, Directions, Futures SECOPS Automation on the Rise: Challenges, Directions, Futures Tom Gorup, Director of Security Operations at Rook Security Recorded: Feb 23 2017 33 mins
    With the growing number of newly-released, longtime-funded automation tools and platforms, it’s clear that network security operations automation has reached an inflection point. While automation promises to provide significant value to security and network operations teams, along with hopes and promises comes concerns about limitations, potential failures, and critical oversights—especially when it comes to automating incident response. These limitations don’t stem from a lack of APIs, compute power, or the advancement of machine learning or artificial intelligence, but rather from the tools that are doing the detection, notification, and remediation.

    Security operations expert Tom Gorup addresses short- and long-term automation challenges and provides analysis on why investments should be focused on arming people with more assistive technology, rather than attempting to remove humans from the equation entirely.

    About the Presenter:
    As Director of Security Operations for Rook Security, Tom Gorup oversees Managed Security Services and develops proprietary security operations management tools and services for organizations ranging from Fortune 100 firms to fast-growing startups. Prior to joining Rook, Tom served 6 years in the U.S. Army. As an Infantry Squad Leader, Tom served two tours in Iraq and Afghanistan, where he received a Purple Heart alongside several other awards for actions on the battlefield. Tom is GCIA certified, a participant in the GIAC mentor program and advisory board, Indiana Infragard Sector Specialist, and on the NexTech advisory board.
  • Cloud Security: From Strategy to Incident Response Cloud Security: From Strategy to Incident Response Ondrej Krehel, CEO/Founder, LIFARS and Michael Landewe, Co-Founder, Avanan Recorded: Feb 23 2017 49 mins
    Expert teams from Avanan and LIFARS will discuss what you must do to secure your cloud infrastructure.

    You might think your organization's cloud security posture is strong, but are there gaps you just don't know about? And if there were, how you would identify and remediate them? As companies continue to move to the cloud, it's becoming ever more important to have a multi-layered cybersecurity program in place.

    This webinar will address some of the most important trends in SaaS security, what it takes to be successful, and what you must do now to secure your cloud infrastructure and applications.

    Attendees will learn about:
    · The challenges in protecting users and data in the cloud.
    · How the cloud makes it difficult to identify and remediate security events.
    · What it takes to implement a successful SaaS security program.
    · How a multi-vendor, defense-in-depth approach can further secure their operations.
    · Why having an incident response plan for cloud security incidents is so important.
    · A new cloud security assessment solution to combat the SaaS security issues within their organization.
  • Put your IT Infrastructure First: Tips for Protecting & Securing your Networks Put your IT Infrastructure First: Tips for Protecting & Securing your Networks Alex Shteynberg, Technical Solutions Professional, Microsoft Recorded: Feb 23 2017 19 mins
    Secure your IT infrastructure on-premises and in the cloud through early detection via effective threat intelligence. Microsoft Azure dashboards/glass pane provides simple yet holistic views into what's happening, with the intent of detection-to-mitigation. We'll take you through ‘a born in the cloud approach’ to IT backend infrastructure security that has a high time-to-value, with best practices.

    Join this webcast to learn how to:
    - Collect threat intelligence with good examples such as Malicious IPs and drill down to specific machines to take action/mitigation
    - Leverage Baseline Assessments, a powerful method, that leverages 180 points of security configurations to harden your servers
    - Understand how to bring the power of analytics to configure alerts with a consolidated view
  • A CTO's Perspective on Creating a Template for an Incident Response Plan A CTO's Perspective on Creating a Template for an Incident Response Plan Sam McLane, CTO/Head of Security Ops; Dave Martin, Head of Product Mgmt; Sridhar Karnam, Director of Product Mktg Recorded: Feb 23 2017 49 mins
    Join us for a panel discussion featuring our CTO, head of product management, and head of product strategy as they talk about executing an incident response plan. The discussion will cover how to create a template for IR as well as the critical elements of an IR plan and the testing frequency and methods to ensure you have a good IR plan in place. For those who don’t yet have a set plan but are looking to establish one, having a template to reference can be helpful. There are number of key pieces that should be incorporated into every incident response plan.

    When you have a security incident, do you have a documented incident response plan? If not, who makes the decisions? These incidents could result in a complicated and costly legal, regulatory, and/or security proceedings. The people, process, and technology responsible for responding to these incidents are collectively known as Incident Response.
  • Don't Compromise your Network: How to Safely Run an Open Source Infrastructure Don't Compromise your Network: How to Safely Run an Open Source Infrastructure Mandy Sadowski and Rich Jerrido, Technical Product Marketing Managers, Red Hat Recorded: Feb 23 2017 53 mins
    The foundation of any IT deployment should be a sound infrastructure and standard lifecycle processes and procedures. At the forefront of every IT department this year is how to increase security, improve efficiency, and maintain compliance in an open source environment. With the ever-increasing influx of data, cloud and DevOps comes increased risk for cyber security attacks and data breaches. How can you continue down the path of digital transformation without compromising your network?

    Join this webinar to learn more about these increasing demands, and how Red Hat Satellite is spearheading these advancements.
  • Do You Really Mean ‘I Need a SOC’? Do You Really Mean ‘I Need a SOC’? Andy Herrington, , Fujitsu Services UK Ltd, Paul McEvatt, Fujitsu Services UK Ltd, Adrian Davis, (ISC)² EMEA Feb 27 2017 12:00 pm UTC 60 mins
    Enterprises have generally responded to the security challenge, recognising that they cannot simply cross their fingers and hope to avoid a major cyber incident. Many have reached for the ‘big security technology catalogue’ and in the past couple of years we have seen increasing numbers of organisations setting out with the intention of deploying some form of SOC. While there is no getting away from the fact effectively deployed technologies and the integration of a well organised SOC can be part of the solution, very few organisations can actually set up and operate a form of SOC that will make a material difference. In this webinar, experts from Fujitsu will discuss the considerations that go into an effective SOC, identify common mistakes and recommend a SOC Strategy which is more likely to yield an improved security posture than blowing a massive budget on a ‘home-grown’ SOC.
  • Be your own Nostradamus – why every business needs to see into the future! Be your own Nostradamus – why every business needs to see into the future! John Joe McGinley and Hannah Hutcheon Feb 27 2017 1:00 pm UTC 45 mins
    How often do you look to the future? Now, I am not saying we should all become seers and peer into the unknown, but when it comes to planning for the evolution of your business, knowledge is certainly power.

    When you step back and look at how our world will evolve, then all sorts of possibilities will arise. It is then up to you to decide which you wish to pursue and those you choose to ignore.

    John Joe McGinley from Glassagh Consulting and Panacea Adviser will highlight how you and your business can:

    - Understand how your world is evolving and you can adapt
    - Look at the opportunities and threats the future will bring
    - Document a plan to meet and exploit these profitably.

    This 30 minute webinar will highlight some simple tools and techniques we can all use to prepare for a profitable and less stressful future. Make sure you book your place here.
  • SUSE Container as a Service Platform - Grow your Technical knowledge SUSE Container as a Service Platform - Grow your Technical knowledge Rob Knight Feb 27 2017 3:00 pm UTC 30 mins
    Get some excellent technical details on Container as a Service in only 15 minutes!
  • Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks Feb 28 2017 2:00 am UTC 60 mins
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.
     
    This webinar will cover:
     
    • Visibility:  Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management:  Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.
  • Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks Feb 28 2017 8:00 am UTC 60 mins
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.
     
    This webinar will cover:
     
    • Visibility:  Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management:  Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.
  • How to overcome the challenges of pension transfers How to overcome the challenges of pension transfers Ben Clacker, Associate and Administration manager – Barnett Waddingham Feb 28 2017 11:00 am UTC 60 mins
    Are you aware of the challenges surrounding pension transfers? During this webinar, our Administration Manager, Ben Clacker, will guide you through the key issues to look out for – and how to avoid them.

    The introduction of Freedom and Choice brought about an increased frequency of pension transfer requests. In addition, developments such as HMRC’s change to their QROPS listing, and the rise of pension scams, have impacted administrative due diligence requirements.

    Reflecting on high profile news stories, case studies and current developments, Ben will demonstrate how administration teams can act as the first line of defense and effectively mitigate the risk of transfers, protecting member’s benefits by implementing a comprehensive quality control frame work, practicing due diligence, and engaging with trustees.

    Ben will guide you through:

    •The impact scams can have on members’ benefits
    •Insight into the administrative challenges of pensions transfers
    •Examples of tactics scammers may use to defraud members’ benefits
    •The importance of quality administration when it comes to pensions transfers
  • Facing up to Mobile Security Challenges Facing up to Mobile Security Challenges Stephen McCormack, Mobile Security Leader, IBM MaaS360, Adrian Davis, Managing Director, (ISC)² EMEA Feb 28 2017 12:00 pm UTC 60 mins
    Whether it is iOS, Android or Windows Phone, you can enable employees to be more productive and work flexibly on the go by supporting the smartphones, tablets and business applications they use on a daily basis. But what about the risks? Join me, Stephen McCormack from IBM MaaS360 as I take you step-by-step through the key challenges that mobile devices bring, and how you can easily act to ensure your organisation is protected.
  • [VIDEO] The Influence of Machine Learning and AI on Cyber Security [VIDEO] The Influence of Machine Learning and AI on Cyber Security Josh Downs, Community Manager, BrightTALK & Troels Oerting, CISO, Barclays Feb 28 2017 2:00 pm UTC 45 mins
    BrightTALK will be broadcasting its in-depth interview with Troels Oerting, CISO of Barclays and Josh Downs, Community Manager of the BrightTALK Information Security Community.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • Pyrford Global Total Return (Sterling) Fund - 2016 review and outlook for 2017 Pyrford Global Total Return (Sterling) Fund - 2016 review and outlook for 2017 Lars Nielsen, Senior Product Specialist, Pyrford International Feb 28 2017 2:00 pm UTC 45 mins
    A key aim of the Pyrford Global Total Return (Sterling) Fund is not to lose clients' money. Lars will update on the Fund’s performance during 2016 and its ongoing quest to generate real returns for investors. He will also discuss global markets, return expectations and opportunities for asset allocators during 2017.



    BMO, Pyrford, 2017 outlook, multi-asset, Lars Nielsen
  • Simulating Electromagnetic Communication & Interference with COMSOL Multiphysics Simulating Electromagnetic Communication & Interference with COMSOL Multiphysics Dr Simone Zonetti, Applications Engineer, COMSOL Feb 28 2017 2:00 pm UTC 60 mins
    The physics of electromagnetic coupling through space is fundamental to modern technology. It is exploited in some devices such as RFID tags and directional couplers to communicate information. In other devices, electromagnetic interference (EMI) is an unwanted effect that must be controlled: for example, the problem of crosstalk in electrical circuits and cables. In this webinar we will discuss the simulation of electromagnetic coupling in a variety of different applications, considering examples of capacitive, inductive and radiative couplings in frequencies from the kHz to GHz range. We will show how modelling can provide insight into design, either to improve the quality of a communication device, or to mitigate EMI through effective electromagnetic shielding. A live demo will illustrate how to simulate antenna crosstalk using COMSOL Multiphysics®. We will conclude this webinar with a Q&A session.
  • Money Market Reform Money Market Reform Marcus Littler, Managing Director, BNY Mellon Investment Management - Liquidity Feb 28 2017 2:30 pm UTC 60 mins
    With European Money Market Fund Reform fast approaching, BNY Mellon Investment Management is undertaking a series of events to ensure our clients and distributors are kept fully up to date on developments.
  • Digital transformation of tracking Digital transformation of tracking Mark Chamberlain, Sector Managing Director, Service, Retail & Transformation Brands and Alex Taylor, Client Strategy Officer Feb 28 2017 3:00 pm UTC 60 mins
    Like every other industry, the research industry is in the midst of its own transformation. Changes in consumer behaviour, increased business pressures and new technologies have created a perfect storm. We see businesses track brand experience, consumer loyalty, customer satisfaction, in-store activation and more as they strive to understand their consumer.

    Join us in this webinar as we dig into the digital transformation of tracking. Transformation: changing ‘how we do it’ not ‘what we do’.
  • Going Global with In-Memory Data Going Global with In-Memory Data Viktor Gamov, Senior Solution Architect Hazelcast, Michael Hilmen,Solutions Architect, Solace Feb 28 2017 3:00 pm UTC 60 mins
    Solace, the leading provider of open data movement technology, combines with Hazelcast, the fastest in-memory data grid, to accelerate the processing of global data workloads. Solace integrates with Hazelcast to provide a distributed publish/subscribe backbone that enables remarkably fast, efficient cluster synchronization across WANs.
    This joint solution enables multi-cloud and hybrid cloud replication of Hazelcast clusters for worldwide operation with enterprise grade reliability, massive WAN scale-out and low latency cluster replication.
    In this webinar, Michael and Viktor are going to describe some example applications of this solution such as financial institutions that synchronize real-time position books and mobile carriers that use in-memory operational data to provide a fast and seamless end user experience.
  • HNW Asset Allocation trends: Europe and Americas HNW Asset Allocation trends: Europe and Americas Bartosz Golba, Head of Content – Wealth Management (GlobalData) Feb 28 2017 4:00 pm UTC 45 mins
    Political turbulences – it’s enough to mention US election and Brexit referendum – only added to the list of factors significantly affecting global asset allocation strategies in 2016, particularly in Europe and North America. Looking forward, how can wealth managers adjust their HNW clients’ portfolios in 2017 to make sure that they are not encouraged to try alternative investment managers?

    This webinar sheds light into what is and will be driving investment choices in the European and American HNW space now and in 2017.
  • Unlocking Data and Clinical Applications with APIs: The New Face of Health IT Unlocking Data and Clinical Applications with APIs: The New Face of Health IT Matt Serna, Manager, Industry Marketing; Jonathan Ben-Hamou, Enterprise Systems Architect, ICOE Group Feb 28 2017 4:00 pm UTC 60 mins
    As healthcare organizations seek to unlock Electronic Health Record (EHR) data and develop modern clinical applications, health APIs can be used to simultaneously increase IT agility and improve data security.

    Furthermore, APIs (Application Program Interface) and API management serve as a core enabler for development on the SMART on FHIR (Fast Healthcare Interoperability Resources) platform, which promises to improve clinical care, research, and public health by supporting application interoperability.

    Join MuleSoft and ICOE Group for a discussion on how APIs can serve as a key enabler for EHR connectivity initiatives, and a live demo showcasing how MuleSoft’s Anypoint Platform can be used to develop a SMART on FHIR clinical application.

    Attendees will learn:

    - What impact upcoming legislative changes may have on health IT, and how APIs can insulate healthcare organizations from potential disruption.
    - How to build and manage APIs in a way that improves health data security and increases IT agility.​
    - How MuleSoft's Anypoint Platform enables the development and adoption of SMART on FHIR clinical applications.
  • Top 10 Business Intelligence Trends for 2017 Top 10 Business Intelligence Trends for 2017 Francois Ajenstat, Chief Product Officer, Dan Jewett VP, Product Management, and Josh Parenteau, Product Manager Feb 28 2017 4:00 pm UTC 60 mins
    Every year at Tableau, we look back at the previous 12 months and evaluate the new ways technology is changing the face of business decisions. That discussion drives our list of top business intelligence trends for the year.

    In this webinar, explore:

    •Emerging trends in business intelligence
    •Tableau experts' take on the changing BI landscape
    •Considerations for your 2017 business intelligence strategy
  • Operation Grand Mars: Defending Against Carbanak Cyber Attacks Operation Grand Mars: Defending Against Carbanak Cyber Attacks Thanassis Diogos, Managing Consultant, Incident Response EMEA at Trustwave Feb 28 2017 4:00 pm UTC 60 mins
    Cybercriminals are setting their sights on hospitality businesses across the U.S. and Europe with unprecedented malware attacks known as Carbanak, as part of precise and difficult-to-stop APT-style operation that we code-named 'Grand Mars'.

    Our Trustwave SpiderLabs team of incident responders and researchers have spent months analyzing Grand Mars and its elements, and unlocking strategies that can be used to identify and mitigate this insidious campaign – which may soon spread to e-commerce and retail organizations as well.

    Join our webinar where the author of the report will be sharing the findings including:

    •How the attackers make initial entry and force infection
    •How they achieve persistence
    •How they perform lateral movements
    •Which malicious files they use
    •Which signs indicate you’ve been compromised
    •Which countermeasures you should apply immediately
  • How to Achieve Cyber Resiliency in an Evolving Threatscape - Roundtable How to Achieve Cyber Resiliency in an Evolving Threatscape - Roundtable Dante Disparte, John Bone, Ed Liebig, Sidney Pearl Feb 28 2017 4:00 pm UTC 60 mins
    Join fellow security executives for a roundtable discussion over the necessity and importance of staying secure in a dynamically evolving and competitive landscape.

    The cyber resiliency assessments are based on the U.S. Department of Defense’s mission-critical procedures and Unisys’ commercial best business practices. They provide an unbiased 3rd party expert assessment of the client’s Incident Response Capabilities, deliver a Security Enhancement Playbook, and identify the gaps in their cyber defense network that leads to improved cyber resiliency.

    These assessments provide leadership with:
    - A deeper insight into the effectiveness of decision making
    - Understanding of the vulnerabilities in their cyber defenses
    - How to enhance adaptability to the unanticipated and the capacity to emerge from a crisis faster with less damage to profitability, brand and customer loyalty.

    We will also discuss how crisis-preparedness exercises help your team experience real-world threat scenarios in order to assess the team’s ability to address, contain, respond and mitigate security threats.

    Facilitator:
    Dante Disparte, CEO of Risk Cooperative

    Panelists:
    John Bone, Global Director of Cyber Resilience, Unisys
    Ed Liebig, VP of Global Security, Professional Services, Unisys
    Sidney Pearl, Global MSS Executive Architect, Unisys
  • Why Digital Business Automation is vital to the Customer Experience Why Digital Business Automation is vital to the Customer Experience Rob Koplowitz, VP and Principal Analyst - Forrester Research & Sapna Maheswari, Product Marketing Manager - Bizagi Feb 28 2017 5:00 pm UTC 60 mins
    As businesses strive to transform in order to survive and thrive in the digital age, digital initiatives have become increasingly focused on the customer experience (CX) rather than more traditional goals of efficiency and cost reduction.

    So what does this mean for those tasked with delivering digital innovation and applications to the business? It means re-thinking operational models to connect employees, processes and devices with personalized and contextualized information – all to better serve customers.

    Join Bizagi and guest speaker Rob Koplowitz, VP and Principal Analyst at Forrester Research as they discuss how today’s digital platform technologies can support these goals.

    Register now to join the discussion on questions like:

    -What does digital transformation mean for traditional businesses?
    -Why is the shift from cost efficiency to customer experience so important?
    -How can digital platforms help you improve the customer experience?
    -Important strategies for delivering business applications faster in 2017

    Who should attend: Digital Transformation Leaders, Application Development Leaders, IT and Business Process Professionals.

    About Rob Koplowitz

    Rob’s research focuses on business process management as well as artificial intelligence and cognitive computing.
    Rob returns to Forrester after leading IBM’s strategy for integrating Watson into the company’s collaboration services. Rob brings many years of experience in enterprise software consulting, product marketing, product management, and strategy.