Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • The Future of FinTech
    The Future of FinTech Louise Beaumont (Publicis.Sapient), Wincie Wong (RBS), Ricky Knox (Tandem), Brian Billingsley (Modo),Emma Pearce (Money 2020) Live 60 mins
    With Europe's biggest FinTech and Financial Services coming up in just a few weeks, we've gathered some of the elite speakers who will be taking the stage and debating on the hottest topics and the biggest challenges that the Financial Services world is currently facing.

    What will they be talking about in Amsterdam, what do they want to hear about, what are they looking forward to?

    Some topics to be covered:
    -Data & Analytics
    -The AI craze
    -Payments
    -The new banking ecosystem
    -Risk & Security
    -The start-up scene: Ones to watch
    -Incumbent players: Who's doing it right, where do we have room for improvement?
    -Blockchain and DLT
    -The R Word: Regulation
  • How to Provide a Winning Customer Delivery Experience
    How to Provide a Winning Customer Delivery Experience Duncan Licence Live 60 mins
    With the growth of online retail, the internet is fast becoming the shopping destination of choice for consumers. As a result, leading retailers and e-commerce brands must work harder to meet rising consumer expectations and to differentiate their offer in an important area.

    Personalised delivery, loyalty programmes, and increased customer expectations show that when it comes to winning and retaining customers, delivery can make or break the online shopping experience.

    Join us for this free webinar as we take a deep dive into the practicalities of providing a seamless delivery experience.

    With our expert panel, you’ll receive the latest insights into customer expectations, as well as practical advice on:

    -How delivery influences purchasing decisions
    -The new era of delivery through personalisation
    -The growth of delivery loyalty programmes
    -10 areas of innovation for brands & retailers in 2018
    -Best practices in providing customer delivery
  • Email Marketing in a Post-GDPR World
    Email Marketing in a Post-GDPR World Jack Clay, Account Director at Pure360 Live 45 mins
    The GDPR is close. So close you can literally count the days on your fingers.

    Chances are you’ve been deep in preparation mode over the last few weeks. But have you taken the time to think what happens next?

    Join us on the eve of the GDPR as we discuss what changes for email marketing and how we can prosper in a post-GDPR world.

    You’ll learn:

    • How GDPR will impact your email marketing
    • How to grow your email list in a compliant manner
    • How to ensure your subscribe forms are compliant and optimised for conversions.

    We’ll be sharing real-life examples of brands who are getting it right and practical advice on how you can ensure GDPR isn’t holding back your marketing.

    Can’t make it? Register anyway and we’ll send you the recording after.
  • Veeam & Quantum help you prepare for GDPR - Backup Best Practices
    Veeam & Quantum help you prepare for GDPR - Backup Best Practices Stephane Estevez, Quantum; Kevin Ridings, Veeam Recorded: May 24 2018 45 mins
    GDPR becomes enforceable on May 25 2018, and affects all companies with customers in the EU. Learn about the new legislation from Stephane Estevez, product manager at Quantum & Kevin Ridings, alliances systems engineer at Veeam. They will explain considerations for GDPR and data backup including retention, security and protection. GDPR will become enforceable in 2018 - Quantum and Veeam's solution for data backups will help ensure you are ready for successful compliance.
  • The Future of Work and Retail Technology: Are you ready?
    The Future of Work and Retail Technology: Are you ready? BRC & PwC Recorded: May 24 2018 60 mins
    The world is changing. FAST. Technological innovation is re-shaping our retail workforce, perhaps more fundamentally and more rapidly than we could ever have imagined. In this webinar we consider what the future workforce could look like and what retailers might consider to keep pace today and get ahead tomorrow.
  • The Future of WorkSpace: Connecting, Managing and Augmenting Your Workforce
    The Future of WorkSpace: Connecting, Managing and Augmenting Your Workforce Gabriele Roberti, Angela Salmeron, Mark Alexander, Mick Heys Recorded: May 24 2018 34 mins
    In the last decade, the way we work has changed beyond recognition. Today’s workforce is more open, agile and collaborative than ever before. The notion of the traditional static workplace is being transformed into the WorkSpace, where the activity is no longer restricted to a physical place, device or defined times of the day.

    The Future Workspace has been designed around the end-user, and has business in mind. New solutions are augmenting our skills and capabilities to new horizons never imagined before, connecting humans and machines, and positively impacting productivity (always on), efficiency (business at the speed of “now”) and customer engagement.
  • GDPR: Se non sei pronto, potrebbe essere rischioso”
    GDPR: Se non sei pronto, potrebbe essere rischioso” Giampiero Nanni, Ramses Gallego Recorded: May 24 2018 60 mins
    Il 25 maggio è il “gran giorno”, quello in cui diventerà applicabile il GDPR. Cambierà il modo in cui le aziende gestiscono le informazioni sui soggetti interessati nell’UE. È un’impresa improba che metterà alla prova le organizzazioni, con problemi di natura legale e logistica, e sanzioni potenzialmente gravose in caso di mancata conformità.
    Unisciti a Symantec alla vigilia del giorno fatidico, per acquisire informazioni su:
    •I requisiti di conformità del GDPR, l’esposizione al rischio e le violazioni
    •Il tuo rischio e i consigli per gestire la nuova normativa una volta applicta
    •Le altre normative all'orizzonte •Gli ultimi sviluppi del GDPR
  • GDPR - staying on the right side of the regulation
    GDPR - staying on the right side of the regulation Betsy Kendall, Data Protection Officer and VP of Global Programs, OPP and Petra Merne, Director, Global Marketing, OPP Recorded: May 24 2018 59 mins
    MBTI and other business psychology practitioners hold a lot of information on their clients, much of it of a sensitive nature addressing issues from performance data to aspects of personality profiles, and therefore are disproportionately affected by the General Data Protection Regulation (GDPR). This will not be a legalistic presentation but practical session with time for Q&A to provide an appreciation of how it could affect our professional lives.
  • GDPR: Cutting Through the Noise
    GDPR: Cutting Through the Noise Alex Jordan, Senior Analyst, ISF LTD Recorded: May 24 2018 47 mins
    Data protection has always been important, but with the GDPR deadline looming and data sharing scandals shaking consumer confidence, securing personal data has never been more vital. The GDPR is leading businesses across the world to evaluate, and in many cases modify their data processing activities in line with upcoming law.

    So what if you’ve left it too late? What are the key steps you can take to work towards GDPR compliance, even after deadline day?

    Join us in this webinar with Alex Jordan, Senior Analyst at the Information Security Forum as he shares:

    -The ISF’s phased approach to GDPR implementation
    -Ways to determine the criticality of data and how to protect it appropriately
    -The urgent actions that a business can take to get GDPR compliance started
    -Common myths surrounding the GDPR, and guidance on cutting through the noise.
  • M-Trends 2018 – Rétroviseurs sur les grands faits 2017 et leurs impacts futurs
    M-Trends 2018 – Rétroviseurs sur les grands faits 2017 et leurs impacts futurs David Grout, Directeur Technique, South EMEA Recorded: May 24 2018 60 mins
    Chaque année, les experts FireEye à travers les équipes Mandiant répondent à une grande variété d'incidents informatiques à travers le monde, ces attaques sont dans la plupart des cas orchestrées par des groupes d’attaquants avancés. Ce retour d’expérience, fruit d’heures d’analyses et d’investigations, est résumé dans le rapport annuel M-Trends qui d’années en années nous donne une visibilité sur le changement et l’évolution de la menace et des techniques utilisées lors des attaques mais aussi sur les progrès et les capacités que les entreprises mettent en place pour y répondre.

    Au cours de ce webinaire, notre Directeur Technique, David Grout, discutera de plusieurs sujets incluant :

    • Les tendances dans le paysage actuel des menaces et ces évolutions
    • Les principaux groupes APT ayant fait parler d’eux en 2017
    • Les risques de récurrence d’attaques
    • Mais aussi de sujets plus ouverts comme la recherche de talents et la complexité de recruter, les architectures ciblées et leurs faiblesses ou encore la préparation possible à travers des exercices de type Red Teaming.
  • GDPR: An Evolution, Not a Revolution
    GDPR: An Evolution, Not a Revolution Nicola Howell, Senior Compliance & Privacy Attorney at Dun & Bradstreet Recorded: May 24 2018 39 mins
    Feel prepared, not panicked, with our GDPR “need-to-knows” and tips for staying compliant beyond 25th May.

    Join our interactive session (part of the BrightTALK GDPR Deadline Day & Beyond Summit), to hear Nicola Howell, Senior Compliance & Privacy Attorney at Dun & Bradstreet, and Tash Whitaker, Head of Compliance at Moorcrofts LLP lead discussion on the following key topics:

    • Why the GDPR should be treated as an evolution, not a revolution, of current data protection laws

    • The crucial “need-to-knows” for compliance as the deadline approaches

    • Guidance on ongoing compliance monitoring and risk assessment – how to stay compliant past the 25th May deadline

    • Plus - live Q&A with our GDPR experts
  • CRM for Sales
    CRM for Sales Workbooks Recorded: May 24 2018 2 mins
    Workbooks CRM enables you to work more effectively, to better identify opportunities, close more deals and grow revenue.
  • People-Centric Information Security Best Practices
    People-Centric Information Security Best Practices Josh Green, Solutions Engineer - Duo Security Recorded: May 24 2018 33 mins
    In a survey of 722 IT leaders by CIO Magazine, four out of five respondents were concerned about shadow IT projects lacking proper IT oversight in their organizations*. This concern is justified -- when users create "shadow IT" workarounds or avoid security processes altogether, it can leave organizations at risk.

    Security teams are learning that when you account for the human element, you can develop policies that users actually want to adopt. Join us for a discussion on how you can build a strong security culture by learning from user behavior research, and employing concepts like gamification to collaborate with your users.
  • Plakativ! Erfolgsfaktoren starker OOH Kampagnen
    Plakativ! Erfolgsfaktoren starker OOH Kampagnen Shanine Chaudhry, Creative Director und Thomas Deneke, Client Director, Kantar Millward Brown Recorded: May 24 2018 41 mins
    Out of Home (OOH / Außenwerbung) ist neben TV der stärkste Werbeträger für den Aufbau von Markenbekanntheit. Der Medien-Kanal profitiert von mehreren Trends, unter anderem der Urbanisierung, dem geänderten Freizeitverhalten und der fortschreitenden Digitalisierung. Dies spiegelt sich in den kontinuierlichen Wachstumsraten von OOH wider.

    Im Rahmen unseres Webinars zeigen wir
    - Die Bedeutung von OOH im Mediamix
    - Trends in der Außenwerbung
    - Erfolgsfaktoren für starke OOH-Kampagnen.
  • Human Factor 2018 - Cryptocurrencies, Ransomware and Cloud Based Attacks
    Human Factor 2018 - Cryptocurrencies, Ransomware and Cloud Based Attacks Adenike Cosgrove, Cybersecurity Strategist and Davide Canali, Senior Threat Analyst Recorded: May 24 2018 44 mins
    ‘The human factor’—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.

    Join our speakers, Adenike Cosgrove and Davide Canali, as they discuss the findings from our Human Factor 2018 report. We’ll talk through the many ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users.

    During the webinar, we’ll cover:
    -- Trends in volume and type of attack providing useful insights for both defenders and organizations.
    -- Ransomware and Email Fraud - how effective have they become and who is being targeted the
    most.
    -- How bad actors are using cloud services to their benefit
    -- Live Q&A with the speakers
  • [APAC Breach Prevention Week] Best Practices for Effective Endpoint Security
    [APAC Breach Prevention Week] Best Practices for Effective Endpoint Security Joel Boyd, Sr. Product Marketing Manager Recorded: May 24 2018 63 mins
    There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common.

    Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks.

    In this webinar, you’ll learn:
    •Why so many attacks succeed and how to stop them
    •Effective techniques to protect against malware, exploits and ransomware
    •Next steps for successful endpoint protection
  • Public Cloud is Here - Use it Wisely! Hybrid Cloud Strategy Lessons Learned
    Public Cloud is Here - Use it Wisely! Hybrid Cloud Strategy Lessons Learned Gordon Haff, Red Hat and Lauren Nelson, principal analyst serving infrastructure & operations professionals, Forrester Recorded: May 24 2018 56 mins
    For many firms, the migration to public cloud is well underway. Understanding what motivates these migrators and the challenges they face along the way can help you in your own journey.

    Join this webinar for a rare look into an emerging group and a glimpse into the future of public cloud. You'll hear about the results of a Forrester Consulting study, commissioned by Red Hat, that looks at these aspects of firms migrating to the cloud:

    > Their motivations and challenges.
    > The strategies they're adopting for migration.
    > What cloud migration in practice looks like.
  • Llegó el día del RGPD: Si no está preparado, le podría salir caro
    Llegó el día del RGPD: Si no está preparado, le podría salir caro Ramses Gallego, Giampiero Nanni Recorded: May 24 2018 64 mins
    El 25 de mayo es la fecha clave de los datos. El plazo límite del RGPD lo va a cambiar todo en lo que se refiere a la protección de los datos de los clientes y afectará a aquellas empresas que gestionen, almacenen o trasfieran datos de ciudadanos europeos dentro y fuera de la Unión Europea. Se trata de una medida gigantesca con unos requisitos de cumplimiento muy completos y extensos. Además, a medida que entra en vigor, inevitablemente habrá atascos, desafíos legales y logísticos, así como duras penalizaciones en caso de incumplimiento.

    Únase a Symantec antes de la fecha clave de los datos para:
    •Comprender los requisitos del RGPD en cuanto a cumplimiento, exposición y fugas.
    •Evaluar sus riesgos y obtener recomendaciones posteriores a la fecha clave de los datos.
    •Saber qué desafíos se avecinan. Entérese sobre los reglamentos de implementación pronta e inmediata.
    •Mantenerse actualizado con relación a los últimos desarrollos.
    Inscríbase ahora
  • DriveLock Managed Endpoint Protection aus der Cloud
    DriveLock Managed Endpoint Protection aus der Cloud Martin Mangold, DriveLock Head of SaaS Operations Recorded: May 24 2018 53 mins
    Herausforderungen moderner IT-Sicherheit - Es ist nicht damit getan, eine Security-Lösung anzuschaffen und zu installieren. Vielmehr muss eine solche Lösung regelmäßig an die aktuelle Bedrohungssituation und die jeweiligen Business-Bedürfnisse angepasst werden.
    Die Lösung - Managed Endpoint Protection von DriveLock
    Eine Ready2go-Sicherheitslösung, die keine eigene Server-Infrastruktur benötigt, erfordert nur niedrige Investitionskosten.
  • Cybersecurty Webinar – Solving the challenges of SSL decryption in Education
    Cybersecurty Webinar – Solving the challenges of SSL decryption in Education Jamie Jennrich Regional Manager for Education and Jon Wood, Systems Engineer at Palo Alto Networks May 24 2018 2:30 pm UTC 60 mins
    Secure Sockets Layer (SSL) (and its successor Transport Layer Security (TLS)) is an encryption protocol that is designed to protect the privacy and security of sensitive communications across a network, such as the Internet.

    The use of SSL encryption is rapidly increasing. In 2017, approximately 50% of web traffic was secured by the protocol and this is expected to rise to 80% by 2019 according to Gartner. Currently most major websites including Google, Facebook and Wikipedia, enforce encryption and are using SSL across their sites (HTTPS sites).

    Join Jamie Jennrich, Regional Manager for Education and Jon Wood, Systems Engineer at Palo Alto Networks for an exclusive Cybersecurity Webinar ‘Solving the challenges of SSL decryption in Education’ on May 24th at 3.30 p.m. (BST) During this event they will discuss the difficult tension in education today between allowing students and staff easy and open access to information while ensuring their working environment is secure and safe, protected from growing cyber threats.

    Attend this webinar to understand:

    - SSL, its benefits and growth
    - Challenges of encryption in Education
    - How Palo Alto Networks can provide visibility and control across encrypted SSL channels
  • Managing Massive Data Growth
    Managing Massive Data Growth Tyna Callahan - Scality, Yannick Guillerm - Scality, and Charles Tierney - HPE Storage May 24 2018 3:00 pm UTC 75 mins
    Managing Massive Data Growth. It’s true – it is all about you–your data that is. Several different trends have converged to accelerate the creation of valuable data, presenting new challenges to enterprise storage management teams. Many customers along with some analysts suggest object-based storage as a key element in managing the growth of data. What is it that they see in object storage? Join us as we discuss: Recent Trends leading data growth, the benefits of software-defined object storage features to consider, and real-world examples where object solutions are managing data growth issues.
  • Avoid Invaluable Media Loss with eMAM & B2
    Avoid Invaluable Media Loss with eMAM & B2 Dave Miller, eMAM. Nilay Patel, Backblaze May 24 2018 3:00 pm UTC 45 mins
    Any organization that creates rich media under tight deadlines and budget constraints knows the pain of losing data. Learn how using eMam and B2 together can help you avoid losing access to your valuable media through misplacement, accident, or hard drive failure. Backblaze B2 provides a permanent, secure, low-cost cloud archive that can grow with your needs. The eMAM media asset management system can work locally or in the cloud to provide you with proxy copies to search, find, use, and share your media. With the combined solution, you can manage your media from anywhere with any connected device, delivering it however and wherever it may be needed. You can save money on expensive storage systems and time lost in finding or reshooting media. Rest assured, your media will always be protected and accessible with an eMAM managed Backblaze B2 archive.

    The webinar will be 30 minutes followed by 15 minutes of Q&A.
  • Part 2: Data Makeover at the 400 Level
    Part 2: Data Makeover at the 400 Level Jerry Hawk, Capax Global CEO May 24 2018 3:00 pm UTC 60 mins
    Get a deeper understanding of the underlying technical architecture behind a Data Makeover.

    Does data preparation and analysis currently consume 80 percent of your time, with only 20 percent of your time spent actually creating insights? Stop spending all of your time on rear-view reporting and start seeing the data you really want to see.


    Who Should Attend
    Technical leaders who are interested in leveraging Microsoft Azure for enterprise data and analytics, including Big Data, Modern Visualization, IoT or Machine Learning.


    Why You Should Attend
    This educational session enables teams to understand the impact a Capax Global Data Makeover has had on other companies in Finance Services and Retail companies and how we go about these projects in a way that gets progress into their hands quickly.
  • Transforme la manera en la que despliega y entrega servicios en el Data Center
    Transforme la manera en la que despliega y entrega servicios en el Data Center Marco Bañuelos - SUSE Systems Engineer May 24 2018 3:00 pm UTC 75 mins
    ¿Pensando en Devops? Piense en SUSE.
    Para que las organizaciones se den cuenta del valor de una infraestructura definida por software, necesitan adoptar nuevas metodologías, como DevOps.

    SUSE no solo proporciona las tecnologías de infraestructura open source que necesita, sino que también compartimos las herramientas y el IP que estamos desarrollando y utilizando para DevOps (Open Build Service & openQA).

    Las soluciones de SUSE ayudan a respaldar su adopción de un modelo DevOps al proporcionar y respaldar las herramientas que necesita para transformar su infraestructura para administración del ciclo de vida de la aplicación, reduciendo el tiempo de comercialización, mejorando la eficiencia y satisfaciendo las cambiantes demandas comerciales.
  • Digital Identity Authorities - The Key to Enterprise Cloud Transformation
    Digital Identity Authorities - The Key to Enterprise Cloud Transformation Loren Russon, VP of Product Management, Ping Identity May 24 2018 3:00 pm UTC 60 mins
    Managing digital identities and access control for users, applications and things remains one of the greatest challenges facing cloud computing today. This has led to a new cloud security service paradigm that requires your organization to reevaluate the criteria for designing and implementing identity and access management (IAM) services across data centers, and private and public cloud infrastructure. This new criteria addresses the continued transformation to the cloud, mobile and internet of things (IoT), and the increased demand for open business balanced by user data security found in initiatives such as GDPR, Open Banking and PSD2.

    In this webinar, you will learn about key requirements and design principles required for modern IAM systems, and how to effectively drive digital transformation, address user data security regulations and ensure you successfully manage your company’s transformation to the cloud.
  • Transforming Live Sports Production with Artificial Intelligence
    Transforming Live Sports Production with Artificial Intelligence IBC365 | Timeline TV | Salsa Sound | Tedial | MediaPro May 24 2018 3:00 pm UTC 75 mins
    Producing and managing the most valuable live sport broadcasts is being transformed through AI-enabled tools automating critical parts the production process.

    From AI cameras focusing in on the action, automated multi-channel sound mixes, to powerful media management tools linking live action with real-time metadata to speed production and automate match highlights creation.

    In this webinar we'll explore cutting-edge tools for live sports production and hear from leading broadcasters that are using them.

    Speakers:
    Daniel McDonnell, Managing Director, Timeline TV
    Dr Rob Oldfield, Co-Founder, Salsa Sound
    Jérôme Wauthoz, Vice President Products, Tedial
    Dr Ignasi Rius Ferrer, Product Owner Automatic TV, MediaPro

    Moderator
    Robert Ambrose, Managing Consultant, High Green Media
  • IT Trends 2018 Webinar: How to turn your smart building into a smart workplace
    IT Trends 2018 Webinar: How to turn your smart building into a smart workplace David Williams , Microsoft Digital and Alex Bennett, Dimension Data. May 24 2018 3:00 pm UTC 45 mins
    Currently, buildings are only considered ‘smart’ if they manage consumption and security. Yet the world’s most innovative companies are accomplishing much more within their working spaces. In this webinar, we’ll look at how to go beyond energy savings and security,
    providing you with big-picture thinking that will inspire workplace action. To illustrate, we’ll look in detail at Microsoft’s Redmond Campus, which has saved millions of dollars thanks to the vast amounts of data harvested from its new comprehensive network of sensors.
    Watch the webinar to discover why digitisation and the Internet of Things are critical to creating a smarter workplace that can help drive down costs, improve customer experience, and allow employees to work better together. We’ll also take a closer look at how you can make these changes within your business, including the main benefits of a smart workplace and three starting points you can implement right away.

    SPEAKERS: David Williams Business Architect Applied Innovation Team Microsoft Digital
    Alex Bennett Group SVP Go-to-market: CX & Workplace Productivity, Dimension Data
  • Top 5 Reasons an Outdated Retention Schedule Will Undermine Your GDPR Compliance
    Top 5 Reasons an Outdated Retention Schedule Will Undermine Your GDPR Compliance Tom Mighell, Esq., VP of Delivery Services, Contoural May 24 2018 3:00 pm UTC 60 mins
    Many of you are no doubt preparing for compliance with the European General Data Protection Regulation (GDPR) requirements, which have a fast-approaching enforcement date of May 25. A significant component of the regulation will require companies to retain personal data on European residents no longer than is necessary to satisfy the purposes for which it was processed. If your organization does collect and process any personal data, have you justified its retention through your records retention schedule or privacy policies? Companies need an up-to-date records retention policy and schedule to support both deletion and retention of critical information. Join Tom Mighell, Esq., as he discusses the top 5 reasons an outdated retention schedule can undermine your GDPR compliance.

    Topics include:
    • Moving away from a “save everything forever” mindset to a “saving smart” approach
    • Strategies for handling retention requirements of personal data, when you may need to keep the record longer
    • Building consensus with business users on the importance of deleting personal data when required
    • Behavior change management approaches for getting employees to comply
  • AI and the Future of Cyber Conflict
    AI and the Future of Cyber Conflict Michelle Cantos, Strategic Intelligence Analyst, FireEye May 24 2018 3:00 pm UTC 60 mins
    Adversarial use of artificial intelligence (AI) in cyberspace will lead to attacks that are more targeted, affect more people, and inflict more damage. It’s imperative that security professionals understand what this means for the future of conflict.

    Additionally as more companies integrate AI applications into their businesses, they must understand the risks associated with this technology.

    Join Michelle Cantos, Strategic Intelligence Analyst, for the final episode of our three-part series on AI as we discuss the:

    • Changing geopolitical landscape as threat actors develop and implement AI capabilities
    • Use of AI applications in businesses and associated vulnerabilities
  • 2018 Open Source Audit Findings: How Do You Stack Up?
    2018 Open Source Audit Findings: How Do You Stack Up? Evan Klein, Head of Product Marketing for Software Composition Analysis, Synopsys May 24 2018 3:00 pm UTC 60 mins
    Open source components are the foundation of modern applications, but ineffective management around open source can lead to serious risks and unwanted media attention when security flaws lead to data breaches. The Black Duck by Synopsys 2018 Open Source Security and Risk Analysis (OSSRA) examines the previous year’s open source and security news and analyzes trends based on the audits of more than 1,100 codebases.
    Not surprisingly, 96% of the audited codebases contained open source components, and nearly 78% of the codebases contained at least one vulnerability. As the percentage of open source in codebases continues to grow, it’s clear that open source management practices need to improve.
    In this webinar, open source expert Tim Mackey will walk through the report’s findings in depth and discuss strategies companies can use to minimize open source security risk while maximizing the benefits open source provides.
  • Advanced Endpoint Protection (AEP) 2.0 Group Test Results - SentinelOne
    Advanced Endpoint Protection (AEP) 2.0 Group Test Results - SentinelOne Mike Spanbauer - NSS Labs, Aviram Shmueli - Sentinel One & Gary Mello - SentinelOne May 24 2018 3:00 pm UTC 60 mins
    NSS Labs recently announced the results of the highly anticipated Advanced Endpoint Protection (AEP) 2.0 Group Test. This year’s test included 20 of the industry’s leading AEP vendors to measure how well each of their products could detect, prevent, and log threats accurately, while remaining resistant to false positives. In addition to security effectiveness, each product was scored according to its total cost of ownership so that enterprises can understand each AEP product's overall value.

    Tune into this webinar to learn how SentinelOne performed in NSS Labs' AEP 2.0 Group Test.

    Thursday May 24, 2018 @ 10:00 a.m. CST | 4:00 p.m. CET
  • Skype for Business: Troubleshoot Voice and Video like a Ninja
    Skype for Business: Troubleshoot Voice and Video like a Ninja Richard Smith, Global Microsoft Alliance Director | Dave Bottomley, Senior Solutions Engineer May 24 2018 3:00 pm UTC 60 mins
    Quality of experience is key to a successful UC environment and Skype for Business is no different.In this session we will discuss keys to troubleshooting Voice and Video in a Skype for Business deployment, whether that is on-premises, hybrid or cloud.
  • Understanding the SEC’s Guidance on Cybersecurity Disclosures and Compliance
    Understanding the SEC’s Guidance on Cybersecurity Disclosures and Compliance Marty Dunn and Emily Beers, Morrison & Foerster; Suzanne Barr, Fannie Mae May 24 2018 3:30 pm UTC 60 mins
    The US Securities and Exchange Commission (SEC) recently indicated it was intensifying scrutiny of public companies’ cybersecurity practices. In this webinar we will cover:
    - The latest SEC guidance on cyber risk disclosure and insider trading practices for public companies;
    - The impact of the guidance on public company disclosure regarding cyber risk disclosure;
    - Insider trading practices following the guidance; and
    - Recent SEC enforcement action regarding cyber risk disclosure.
  • Lead your finance function into the digital age
    Lead your finance function into the digital age Percy Dumasia, Partner and Srini Krishnamurthy, Managing Consultant, Application services, Wipro Ltd. May 24 2018 3:30 pm UTC 90 mins
    Digital tools and technologies are redefining the way we work, as the world looks for simpler, better, and faster ways of doing business. The modern finance function, characterized by agility and simplicity, is at odds with most legacy enterprise finance functions today – but the need to modernize is at the top of every CFO’s strategic agenda.

    But CFOs are faced with many challenges. How can they modernize the function while continuing to support traditional processes and systems in the interim? How can they reskill and optimize roles and resources quickly? And most importantly, how can the finance function be a true partner to the business by responding quickly to their needs for fiscal reporting and control?

    Join our webinar to learn about the challenges and opportunities in redesigning and simplifying the finance function in a digital age.
  • Does it matter if an algorithm can't explain how it knows what it knows?
    Does it matter if an algorithm can't explain how it knows what it knows? Beau Walker, Founder, Method Data Science May 24 2018 3:30 pm UTC 60 mins
    With the General Data Protection Regulation (GDPR) becoming enforceable in the EU on May 25, 2018, many data scientists are worried about the impact that this regulation and similar initiatives in other countries that give consumers a "right to explanation" of decisions made by algorithms will have on the field of predictive and prescriptive analytics.

    In this session, Beau will discuss the role of interpretable algorithms in data science as well as explore tools and methods for explaining high-performing algorithms.

    Beau Walker has a Juris Doctorate (law degree) and BS and MS Degrees in Biology and Ecology and Evolution. Beau has worked in many domains including academia, pharma, healthcare, life sciences, insurance, legal, financial services, marketing, and IoT.
  • Nemertes Conversations: Is Your Data Ready for GDPR?
    Nemertes Conversations: Is Your Data Ready for GDPR? Co-presented by: Julie McCoy, Solutions Engineer, AvePoint; and Irwin Lazar, VP & Service Director, Nemertes Research May 24 2018 4:00 pm UTC 60 mins
    GDPR requires organizations to identify, classify, and protect personal information, but how do you prepare and protect against a possible breach if you don't know what data you have, where it lives, or how it's classified?

    In this informative webinar we'll discuss:
    • GDPR data classification requirements
    • How to incorporate GDPR data analysis into your breech prevention and reaction plan
    • How to classify and protect information across multiple data stores
    • Solutions for automating classification and information protection

    We look forward to sharing this information with you!
  • [Ep.15] Ask the Expert: Managing Change in Cloud-Based Systems
    [Ep.15] Ask the Expert: Managing Change in Cloud-Based Systems David Cuthbertson, CEO, Square Mile Systems and Kelly Harris, Senior Content Manager, BrightTALK May 24 2018 4:00 pm UTC 45 mins
    This webinar is part of BrightTALK's Ask the Expert Series.

    Join David Cuthbertson, CEO of Square Mile Systems, as he takes a deep dive into cloud management. Many senior decision makers have negative feelings regarding the issues of technical teams and don't want to bring them to light - data security, change control, lock in to a supplier who overcharges, proper outage stats, etc.

    Just as there is more awareness of outsourcing contract nightmares, many of the same issues apply to cloud providers. Managing change in cloud-based systems is still a relatively new issue as most technical teams don't think about how cloud systems are managed and the potential risks posed by many suppliers without a viable business model.

    Audience members are encouraged to send questions to the expert which will be answered during the live session.