Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • 6 Reasons Why Dev Should Own Security
    6 Reasons Why Dev Should Own Security Geva Solomonovich, Snyk and John Morello, Twistlock Recorded: Aug 18 2017 21 mins
    Open source, containers and microservices, and a myriad of DevOps tools reduce the time and friction to deploy code. Oftentimes, security becomes a limiting factor in bringing new innovations to market.

    To build secure applications without slowing development cycles requires a new approach to security: Shift-Left Security. This means moving security to left in the development process and into the purview of developers by integrating it into existing workflows.

    Join us for this to learn:
    - 6 reasons development should own security
    - Best practices to employing Shift-Left security
    - How to deploy secure apps at DevOps speed
  • An interview with Britt Champeau
    An interview with Britt Champeau IT Chronicles Media Recorded: Aug 18 2017 8 mins
    ServiceNow’s Britt Champeau, chatted with Kirstie Magowan and Shane Carlson from 10 in Tech about champion enablement. She helps organizations spread the value of ServiceNow to the enterprise. Britt concentrates on the ‘soft side’ of a ServiceNow implementations. She emphasizes the value of organisational change management.
  • Destination: 3-D Secure 2.0 - Hosted by PYMNTS.com
    Destination: 3-D Secure 2.0 - Hosted by PYMNTS.com Ankur Karer, Director of Payment Security Presales, CA Technologies Recorded: Aug 18 2017 61 mins
    After a 17-year journey through hardships & learning experiences, 3-D Secure is finally undergoing a much-needed overhaul. EMVCo has released EMV 3-D Secure 2.0 (3DS 2.0); optimized for mobile and traditional web browser transactions.

    The new protocol delivers important additional e-commerce transaction metadata, including an extensive set of device data. This enhanced data will facilitate even greater fraud prevention gains for customers, who participate in cardholder authentication programs based on 3-D Secure.

    Join Ankur Karer, Director of Payment Security Presales at CA Technologies to learn how 3-D Secure 2.0 is poised to change online payments authentication.
    • Discover the key drivers that influenced this indisputable transformation
    • Evaluate the important benefits for mobile and in-app purchases
    • Analyze the significant new data elements to combat fraud
  • Secure Web & Cloud Gateway: Security & Threat-Protection for the Enterprise
    Secure Web & Cloud Gateway: Security & Threat-Protection for the Enterprise Michael Mauch Recorded: Aug 18 2017 28 mins
    For business, the web is both essential and dangerous. As more workers go mobile and workloads move to the cloud, the reliance and peril of the web is only going to grow. You need visibility into all this Web traffic, so you can protect your business from the threats it introduces.

    Secure web gateways (SWGs) can deliver the insights and controls you need to mitigate the risks of the web. They pick up where next-generation firewalls (NGFWs) leave off, providing the Layer 7 termination and in-depth inspection of web traffic (port 80 and 443) required to uncover and protect against the increasingly sophisticated web threats targeting your business.

    In this webinar learn how a proxy-based architecture provides unique security and threat-protection advantages for the enterprise in this new normal of remote users/offices, cloud apps, mobile devices.

    ●A proxy-based architecture is ESSENTIAL to meeting the needs of the Cloud Generation.
    ●Symantec BC Proxy SG is the best security defense.
    ●Symantec Proxy SG dramatically improves threat protection, while reducing costs of other security infrastructure.
  • Full Stack Network Monitoring for Traditional to SDx Architectures
    Full Stack Network Monitoring for Traditional to SDx Architectures Jeremy Rossbach, Product Marketing Manager Recorded: Aug 18 2017 43 mins
    What does full stack network coverage look like? From fault, inventory, topology, performance, availability and logs, a comprehensive Network Operations and Analytics platform should cover the entire stack from traditional to SDx environments.
  • The Blurring of Boundaries in a Software-Defined Data Center
    The Blurring of Boundaries in a Software-Defined Data Center JR Rivers, Co-Founder & CTO, Cumulus Networks Recorded: Aug 17 2017 34 mins
    The software-defined data center has been a heavily touted concept over the past few years, and heralded by some as the next step in the evolution of virtualization and cloud computing. Having a data center that is governed by software, rather than dictated by hardware, can lead to more fully automated and intelligent operations. Having infrastructure elements such as networking, storage and security conceived of as a services is, indeed, an attractive concept to many.

    In this webinar we will be joined by JR Rivers, Co-Founder and CTO of Cumulus Networks, to talk about how he (and Cumulus) define the concept of a software-defined data center. He will present how the definition of a software-defined data center has evolved since its inception, and how tools like VXLAN, EVPN, Ansible and more can help organizations further their journey to a “software-defined” state and simplify network operations.
  • Do You Have a Roadmap for EU GDPR Compliance?
    Do You Have a Roadmap for EU GDPR Compliance? Ulf Mattsson, David Morris, Ian West. and Khizar Sheikh Recorded: Aug 17 2017 60 mins
    The General Data Protection Regulation (GDPR) goes into effect in 2018 and it will affect any business that handles data, even if it's not based in the European Union.

    Are you looking to move and host data for EU citizens? Do you have a roadmap and associated estimated costs for EU GDPR compliance?

    Join this webinar to learn:
    • Case study and legal/regulatory impact to GDPR
    • Security Metrics
    • Oversight of third parties
    • How to measure cybersecurity preparedness
    • Automated approaches to integrate Security into DevOps
  • GDPR: The Intersection of Compliance and Customer Satisfaction
    GDPR: The Intersection of Compliance and Customer Satisfaction Lewis Barr, General Counsel and VP, Privacy at Janrain, David Fowler, Head of Digital Compliance at Act-On Software Recorded: Aug 17 2017 49 mins
    In the age of the customer and data hacks a brand’s reputation can come down to their ability to protect customer data. The transparency that will develop between brand and consumer with the upcoming General Data Protection Regulation (GDPR) will provide organizations with an opportunity to empower and build trust with their customer.

    Armed with a unified and single view of the customer, brands will be able to truly personalize the customer journey while maintaining compliance and securing customer data.

    Hear from Lewis Barr and David Fowler as they discuss how to turn the GDPR into business opportunity while focusing on the following topics:
    - Heightened consent requirements and consent lifecycle management
    - Expanded privacy notice requirements
    - Data subject access rights (SARs) and fulfillment requirements
    - Business exposure and liability for failing to meet these GDPR requirements
    - Practical next steps to achieve operational readiness

    About the Presenters:
    Lewis manages Janrain’s legal compliance and privacy functions as the company continues its international expansion. He brings more than 15 years of leadership in a wide range of legal and privacy-related matters for growing technology companies. Lewis also utilizes his diverse background as a litigator in private practice, federal appeals court staff attorney, and teacher.

    David is the Head of Digital Compliance at Act-On Software and is responsible for all issues pertaining to digital compliance, including email deliverability, privacy compliance, and industry stewardship in regard to our customers and our corporate objectives. David has over 20 years’ experience providing senior leadership in the marketing industry. In the last nine years, he has been strictly focused on issues associated with email marketing, deliverability, digital marketing, and privacy compliance.
  • GDPR Compliance and the Role of DLP and Behavioral Analytics
    GDPR Compliance and the Role of DLP and Behavioral Analytics Jon Oltsik, Sr. Principal Analyst, ESG Salah Nassar, Dir. Product Marketing, Symantec Steve Grossman, VP of Strategy Recorded: Aug 17 2017 64 mins
    The General Data Protection Regulation (GDPR) goes into effect in May 2018. It’s predicted that over 50% of companies affected will not be in full compliance in time. With fines as much as 4% annual revenue, cybersecurity experts, executives and boards are paying attention.

    What are the main obligations under the GDPR which will apply to your organization?
    How can you identify the gaps that exist between your existing programs and GDPR requirements?
    What changes are needed and which technologies can help to achieve compliance?
    What is a pragmatic timetable, in what order of priority, and at what cost?

    Join ESG Sr. Principal Analyst, Jon Oltsik, Symantec Director, Global Product Marketing and GTM Strategy, Salah Nassar, and Steven Grossman, Bay Dynamics’ Vice President of Strategy as we discuss how to:

    - Identify what data matters for GDPR compliance
    - Implement a framework for change
    - Leverage DLP and behavioral analytics for data governance

    The clock is ticking.
  • AlienVault Partner Program: An Intro to AlienVault USM
    AlienVault Partner Program: An Intro to AlienVault USM Mike LaPeters, VP Global Channel Sales & Garrett Gross, Director of Field Enablement Recorded: Aug 17 2017 60 mins
    Watch our partner webcast to learn about our award-winning, easy-to-sell AlienVault® USM™ platform and the AlienVault Partner Program. SIEM solutions integrate and analyze the data produced by other security technologies but unfortunately most mid-market organizations don't have the resources and time to create and maintain the data correlation rules that make SIEM solutions useful. This offers an opportunity for you to capitalize on the benefits of AlienVault USM. Once your prospects understand our approach to unified security management, it becomes a very quick sales cycle.

    An intro to AlienVault USM
    How to identify prospects quickly with a simple set of questions
    How to sell the benefits of USM for easier and faster threat detection
  • How to Grow and Accelerate your Managed Security Business
    How to Grow and Accelerate your Managed Security Business Garrett Gross, Director Field of Enablement Recorded: Aug 17 2017 33 mins
    Security continues to be one of the top three IT concerns for SMB, mid-market and large enterprise customers. Security and Cloud continue to be the top two industry/market spend opportunities for the channel to invest in, according to CompTIA’s 2016 Annual IT Report. The opportunity for MSPs to become Managed Security Service Providers (MSSPs) is exploding – as is the opportunity for MSSPs to strengthen and expand their bottom line and market share. If you are interested in expanding your current MSP practice with security offerings, please watch this “How-to" discussion on building and growing an MSSP. We discuss best practices and illustrate what “best in class” looks like when it comes to:

    Common security challenges for the mid-market
    Considerations when selecting security vendor partners and ensuring a profitable practice
    Operational, financial, and process considerations that are key to a successful MSSP
    Essential skills critical to build successful MSSPs
    Solutions, business resources, tools, and programs available to enable the success of an MSSP
    In addition, we discuss some common mistakes MSSPs make and how to avoid those when building your practice.
  • Threat Intelligence: The MSP’s Secret Weapon
    Threat Intelligence: The MSP’s Secret Weapon Garrett Gross, Director Field of Enablement Recorded: Aug 17 2017 34 mins
    One of the biggest challenges when creating a managed security offering is developing threat intelligence and instrumenting it with existing security controls. This challenge is magnified exponentially as a company's client base grows and needs evolve.

    In this session, you’ll learn about the benefits of building your service offering around a unified security platform and how integrated threat intelligence accelerates the detection process. We’ll also recommend how MSSPs can leverage open threat sharing communities and custom intelligence development to maximize revenue and differentiate themselves from the competition.

    Attend this Webchat and you will also learn:

    The importance of developing a comprehensive understanding of not only the different data types collected for analysis, but also the ways in which the data types interact with each other
    The need for an intelligent approach to identifying the latest threats to achieve the broadest view of threat vectors, attacker techniques and effective defenses
    Why the use of coordinated rule set updates is key to maximizing the effectiveness and efficiency of threat intelligence
    and to ensuring that your clients are protected no matter how (and how often) their business grows and needs change
  • A Step-By-Step Guide to Building a Profitable Security Practice
    A Step-By-Step Guide to Building a Profitable Security Practice Garrett Gross, Director of Field Enablement Recorded: Aug 17 2017 33 mins
    As your clients work on their 2017 budgets, they will be paying a lot of attention to security. It’s probably the top priority for most of them. Threat profiles have expanded, new attack vectors have emerged and legacy systems simply can’t keep up. It’s not nearly enough to sell some security software or deploy a few firewalls. For IT service providers, this presents both a challenge and an opportunity. On one hand, your customers need new security solutions that you haven’t delivered before. But on the other hand, your customers want to pay you for services that will increase both your revenues and profits.

    Given that your customers will want their security challenges addressed immediately, you need to rapidly develop the skills and services required to get the job done.

    In this fast-paced session, join experts from AlienVault and MSPmentor to outline a step-by-step process you can follow to build a thriving, profitable security practice. Key topics to be addressed include:

    The five vital technology tools you need to run an effective security practice
    A detailed profile of the target customers most likely to adopt IT services to help accelerate your sales process
    A map for building and pricing your security service packages to meet customers’ needs (and for building your profits)
  • Cómo convertir tus datos en una audiencia fiel
    Cómo convertir tus datos en una audiencia fiel Gabriel D'Onofrio, General Manager LATAM en Cxense Recorded: Aug 17 2017 20 mins
    Los medios tradicionales enfrentan el enorme desafío de cautivar y retener a una audiencia digital cada vez mayor, para poder lograr crecimiento y diferenciación.

    Únete a Gabriel D'Onofrio, Gerente de Cxense en América Latina, en este taller de 30 minutos.
  • TechTalk: Cost Management Live Demo
    TechTalk: Cost Management Live Demo Todd Bernhard, CloudCheckr Product Marketing Manager and Shannon Houpt, Account Executive, California & Australia Recorded: Aug 17 2017 54 mins
    Moving to the cloud is supposed to cost less. In reality, many organizations overspend on the cloud, paying for unused or under-utilized resources. CloudCheckr offers reports and tools that help administrators see, at a glance, where they are wasting money.

    Additionally, CloudCheckr makes recommendations based on analytics to better utilize resource, upgrade or downgrade instances and more. The results are that customers typically report saving 30% on their cloud spend.

    In this webinar, users will experience the CloudCheckr app in a live demo, with focus on:

    - Cost Savings Dashboard
    - Reserved Instance Right-Sizing Report
    - Utilization Best Practices
  • The Foundation for Data Center Modernization and Open Source Operations
    The Foundation for Data Center Modernization and Open Source Operations Dan Courcy, Red Hat Enterprise Linux, Andre Pitanga, Service Delivery Manager, Red Hat Recorded: Aug 17 2017 41 mins
    No matter what level of modernization you are evaluating, any effort should start with a solid foundation.

    A standardized environment based on an enterprise-ready, open source operating system like Red Hat® Enterprise Linux®, and a hardware platform based on Intel, is key to the modern data center.

    Learn how organizations like yours approached server consolidation projects and migrations from proprietary systems to Linux, to improve efficiency and create a consistent foundation for current and cloud-future IT environments.
  • How GDPR Affects US Companies
    How GDPR Affects US Companies Bob Siegel, President and Founder of Privacy Ref Recorded: Aug 17 2017 37 mins
    Learn how the EU General Data Protection Regulations affect US based companies.

    Join CyberDefenses and Privacy Ref's Bob Siegel to review how the GDPR directly impacts US based corporations. These far-reaching regulations impact any company that stores or transmits identifying information of any individual within the EU.

    In this webinar, you will be introduced to the basic elements of the GDPR and you will discuss the requirements that require action for US focused companies.

    About Bob Siegel:
    President and founder of Privacy Ref, Inc., Bob Siegel, started the company in 2012. After his time as Senior Manager of Worldwide Privacy and Compliance at Staples, Inc., Bob applied his experience and expertise to assisting companies implement and maintain strong privacy programs. Bob has worked with many different organizations, dealing with programs of all sizes and regulatory needs.

    Always seeking to improve his own understanding of all things privacy, Bob has earned certifications from the International Association of Privacy Professionals. These include certifications in US private and public sector, European, and Canadian privacy laws. Bob has also earned certifications in Information Technology Privacy and Privacy Program Management. Bob Siegel has also been recognized as a Fellow of Information Privacy by the IAPP for his outstanding dedication to the privacy community. He has also served on the IAPP's Certification Advisory Board for the CIPM program and the IAPP's Publication Advisory Board. Bob also serves on the IAPP’s teaching faculty leading classes in the areas in which he is certified.

    About CyberDefenses:
    CyberDefenses is a premiere cyber security services organization, providing advanced security services to the commercial and federal sectors. CyberDefenses Academy provides advanced training the IT, security and privacy professionals that wish to be at the top of their field.
  • Adding the S to MSP: Making Money in a Competitive Market
    Adding the S to MSP: Making Money in a Competitive Market Mike LaPeters, VP Global Channel Sales & Mike Calonica, VP American Sales Recorded: Aug 17 2017 35 mins
    Anybody can deliver technology, but these days MSPs also need to protect their customers’ networks and data. Cyber threats are a growing concern, and if you can’t provide security, your customers will find a provider who can. That’s why adding security to an MSP’s palette of services isn’t just an option; it’s a must.


    In this webcast, experts from Penton and AlienVault will discuss how to turn your MSP into a profitable MSSP by adding security for customers to protect their business from the scourge of cybercrime. Join this session to learn more about:

    Current threats and how they are evolving
    Comprehensive threat protection for the cloud
    Unified security for detecting threats and responding to incidents
  • GDPR and What It Means for Security Teams
    GDPR and What It Means for Security Teams Cheryl Tang, Director Data Security Products, Imperva Recorded: Aug 17 2017 37 mins
    The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.

    Join us to learn:

    - What is GDPR
    - Deep dive into relevant data security articles of the GDPR
    - Review how different technology can address some of the GDPR data security requirements
  • Top 10 Secrets to a Successful Virtualization Upgrade
    Top 10 Secrets to a Successful Virtualization Upgrade Dan Richardson, Systems Engineer, and Bo Busillo, Senior Technical Account Manager Recorded: Aug 17 2017 43 mins
    Upgrading your IT operations -- even with the industry's leading virtualization platform -- is an unpredictable process. During this webcast, our technical experts will share common do's and don'ts for an easier virtualization upgrade execution for your DevOps and IT teams.
  • Use of Managed Security Service Providers (MSSPs) - Benefits, Challenges and Tre
    Use of Managed Security Service Providers (MSSPs) - Benefits, Challenges and Tre Garrett Gross Director, Field Enablement Recorded: Aug 17 2017 55 mins
    Research shows that about half of organizations deploy a mix of in-house and outsourced IT security. Companies turn to outsourced and managed security services providers to alleviate the pressures they face, such as assessing and remediating against new types of attacks, protecting their organization against data theft, and addressing skills shortages and filling resource gaps. The 2017 Spotlight Report covering MSSP usage revealed the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource their security programs.

    In this session you'll learn about key findings from this survey including:

    The predominant driver for organizations to consider managed security services
    The most critical capabilities organizations look for in MSSPs
    The most requested security services offered by MSSPs
    Key benefits respondents have achieved by partnering with an MSSP

    Whether you are evaluating using an MSSP, or are an MSSP yourself, join us to gain valuable insights into how MSSPs are helping their clients. We'll also provide an overview of how our report sponsor, AlienVault, enables the threat detection capabilities of many MSSP's with their unified threat detection platform, AlienVault USM
  • An interview with Chris Pope
    An interview with Chris Pope Kepner-Tregoe Recorded: Aug 17 2017 11 mins
    10 in Tech’s Kirstie Magowan and Shane Carlson chatted with Chris Pope of Service Now at Knowledge17. There were 15,000 attendees at Knowledge17 and Chris talked about how ServiceNow is sticking to its roots of understanding how people work and what they want and need to do.
  • Defend Against WannaCry
    Defend Against WannaCry Alex Hinchliffe, EMEA Threat Intelligence Analyst, Unit 42 Aug 21 2017 10:00 am UTC 30 mins
    What you need to know and how to defend against it.

    Hours after WanaCrypt0r first emerged , the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world.

    Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over.

    Follow Alex Hinchliffe on a video interview during which he will cover this pervasive threat, and how it exploits vulnerabilities and spreads across networks.
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities
    Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Nathaniel Ford, Moderator (ISC)² EMEA, Membership Services, (ISC)² EMEA Aug 21 2017 12:00 pm UTC 60 mins
    Are you an (ISC)² member with questions about your certification and member benefits, or want to keep in touch with (ISC)² news in EMEA? Are you thinking about joining, and curious to hear more about what membership means and how (ISC)² can help you?

    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session
  • Challenges in Building Connected Communities
    Challenges in Building Connected Communities Kate Garman, Jascha Franklin-Hodge, Peter Marx, Limor Schafman Aug 21 2017 3:00 pm UTC 75 mins
    Creating a seamless connected environment that supports smart community citizen services, streamlines operations, supports economic development is already a challenge for community officials. There are many different needs and directions to begin the conversion to an “intelligent” environment. Communities are also planning and building not just for current needs, but also for future connectivity infrastructure that will be used by autonomous vehicles, smart buildings, connected homes, AR/VR, eRetail, eHealthcare, smartgrid and more.

    This webcast will discuss such questions as:
    > What issues are city officials prioritizing for resolution through smart community applications?
    > How are communities planning for and deploying small cell infrastructure?
    > Which departments are involved in communications infrastructure?
    > How can suppliers navigate the multiple departments involved in decision making?
    > What business models are cities negotiating with their technology product partners?
    > What are some of the lessons learned from cities that you can translate into your own business offering?

    Speakers:
    Jascha Franklin-Hodge, CIO, Boston, MA
    Kate Garman,Smart City Coordinator, Seattle, WA
    Peter Marx, currently in the position of VP, GE Digital and former CTO, City of Los Angeles
  • Sales Lessons from the Masters: Session 4
    Sales Lessons from the Masters: Session 4 Ken Smith Aug 21 2017 3:00 pm UTC 60 mins
    Ken Smith will be presenting a four-week webinar training series based on his book "Sales Lessons from the Masters." This week's topic is "Making the Close."


    Agenda:
    *Review of Accident, Hospital Indemnity and Dental
    *Closing
    *Answer objections
    *Common Denominator of Successful sales people
  • Emerging trends in Incident Response: SANS 2017 Incident Response Survey Results
    Emerging trends in Incident Response: SANS 2017 Incident Response Survey Results James Carder (LogRhythm CISO & VP of LogRhythm Labs), Matt Bromiley (SANS Analyst and DFIR Instructor) Aug 22 2017 9:00 am UTC 60 mins
    SANS' 2016 survey of incident response (IR) capabilities indicated that the IR landscape was ever changing. Advanced industries were able to maintain effective IR teams, but it identified hurdles responders face to increase the efficiency of their IR teams.

    In this SANS Incident Response Survey webcast, James Carder, LogRhythm CISO & VP of LogRhythm Labs, joins industry experts to explore the results of the fourth annual SANS survey on incident response. Together they'll provide insight into the maturity of IR processes and functions spanning a variety of environments.

    You'll learn:

    • Types of attacks experienced and nature of the breaches
    • Time needed to detect, contain, and remediate breaches
    • Maturity of network visibility infrastructures and security operations centers' response capabilities

    Watch now to learn more about the incident response capabilities of your peers and how IR can help you protect your network.
  • Asian Capabilities Webinar – HGIF Indian Fixed Income: Five years and counting
    Asian Capabilities Webinar – HGIF Indian Fixed Income: Five years and counting Gordon Rodrigues, Geoff Lunt Aug 22 2017 9:00 am UTC 60 mins
    Thanks to supportive macro and political conditions and the spate of reforms introduced in recent years, the Indian economy has been gathering momentum and is set to reach its medium to long term growth potential. Join Gordon Rodrigues and Geoff Lunt to understand what the latest developments, including the repo rate cut earlier in August, mean for the Indian Fixed Income asset class and our strategy.

    We are also marking the fifth anniversary of HGIF Indian Fixed Income, which has seen its AUM swell to ~ $600 million earlier this year. Gordon and Geoff will explain why the asset class continues to look appealing when compared with most of its EM and DM peers, and why we consider it a strategic rather than thematic allocation in a global portfolio.
  • Omnichannel Marketing Excellence: It Starts With Email
    Omnichannel Marketing Excellence: It Starts With Email Andy Culligan, Head of Demand Generation, Emarsys Aug 22 2017 9:00 am UTC 45 mins
    The ultimate goal of marketing is to provide the consumer with a personalized experience across numerous channels and devices, at scale.

    The first step to achieving omnichannel excellence starts with an often-underestimated channel, email. Why start here? The answer is simple; the consumer is constantly changing channels and devices, but not email address. In essence, an email address is the consumers’ digital ID. This is the first part of key data that the marketer needs to start the omnichannel journey.

    In this presentation, we will focus on how to start your journey with the #1 digital channel for ROI, email.
  • Unsupervised learning to uncover advanced cyber attacks
    Unsupervised learning to uncover advanced cyber attacks Rafael San Miguel Carrasco, Senior Specialist, British Telecom EMEA Aug 22 2017 10:00 am UTC 45 mins
    This case study is framed in a multinational company with 300k+ employees, present in 100+ countries, that is adding one extra layer of security based on big data analytics capabilities, in order to provide net-new value to their ongoing SOC-related investments.

    Having billions of events being generated on a weekly basis, real-time monitoring must be complemented with deep analysis to hunt targeted and advanced attacks.

    By leveraging a cloud-based Spark cluster, ElasticSearch, R, Scala and PowerBI, a security analytics platform based on anomaly detection is being progressively implemented.

    Anomalies are spotted by applying well-known analytics techniques, from data transformation and mining to clustering, graph analysis, topic modeling, classification and dimensionality reduction.
  • The Art of Enhancing the Customer Experience using Personalisation
    The Art of Enhancing the Customer Experience using Personalisation Kath Pay, CEO of Holistic Email Marketing Aug 22 2017 10:00 am UTC 45 mins
    Personalisation is the latest trend within email marketing and with good reason - it delivers the goods. However, the reason behind its success is not what you may think. In this must-attend session, Kath Pay, CEO of Holistic Email Marketing de-mystifies personalisation and reveals that contrary to popular opinion, personalisation should not in fact be our objective, but instead it should be to deliver a great customer experience using personalisation as a strategy to achieve this.

    This session will be packed full of practical tips and advice on not only how to achieve a better customer experience using personalisation, but will also demonstrate as to why it's so powerful. Beware though - you may well be pleasantly surprised at the many ways to achieve personalised emails beyond product recommendations!
  • Security According to Leafcutter Ants
    Security According to Leafcutter Ants Mike Chung, Drs. Ing. RE CISSP, Associate Partner at IBM Security Aug 22 2017 12:00 pm UTC 45 mins
    Humans have been protecting our complex network infrastructures for decades with varying degrees of success, while eusocial insects such as ants are capable of withstanding countless attacks on their networks.

    This presentation is about what ants in general and Leafcutter Ants in particular approach security and how we can learn from these survivors of millions years of warfare.

    You will learn:
    -How social insects (ants) are dealing with predictive analysis
    -Applying the defense mechanism of ants on threat intelligence
    -How information sharing and communication can lead to better security
    -Data and Identity Management
  • GDPR update - less than 1 year to May 2018
    GDPR update - less than 1 year to May 2018 Greg Day, EMEA VP & CSO Palo Alto Networks Aug 22 2017 1:00 pm UTC 75 mins
    The General Data Protection Regulation (GDPR) and the Network and Information Security (NIS) Directive will both be enforced as of May 2018. You may think you’re ready for these laws, but covered companies may need to improve the security of personal data they hold, and of their networks and information systems. Data breaches and security incidents will have to be reported. As they prepare for the GDPR and NIS, it is imperative that organisations understand their cybersecurity risks and invest appropriately.

    Greg Day, EMEA VP & CSO Palo Alto Networks, explains the security-related requirements.
  • Personalisation and Predictive: The Pillars of Account-Based Marketing
    Personalisation and Predictive: The Pillars of Account-Based Marketing Ray Coppinger, Head of Marketing EMEA, Marketo Aug 22 2017 1:00 pm UTC 45 mins
    Tomorrow’s Marketer is focused on targeting key accounts to generate new business. What’s the secret to creating 1:1 moments with your key targets? Personalisation and Predictive Technologies are the secret weapons that empower account-based marketing (ABM) strategies to target and engage key accounts at the top of the funnel.

    Join our webinar as Ray Coppinger, Head of Marketing EMEA at Marketo looks at how personalisation and predictive content can power your account-based marketing strategy. You will learn how to:

    * Complement your account-based marketing (ABM) strategy with personalisation
    * Generate more sales-ready leads by focusing on the accounts that matter
    * Leverage best practices from companies personalising their websites for prospects
    * Measure the impact of your personalised campaigns with an account-focus
    * Leverage predictive content to drive engagement with target accounts
  • Is Real-Time Content Creepy?
    Is Real-Time Content Creepy? Antony Humphreys, Adestra & Guy Hanson, Return Path & Jenna Tiffany, Let'sTalk Strategy & Lili Boev, dotmailer Aug 22 2017 2:00 pm UTC 75 mins
    One of digital marketing's biggest bugbears is the ability for brands to follow customers, often clumsily. Join this webinar on BrightTALK to hear how to make 'real time' work really well for your brand.

    Join us to find out:
    · Why to use it
    · How to use it effectively
    · Whether it actually makes a difference
    · If it's worth the time, money and effort to set-up for the long-term benefits

    Brands are increasingly investing in 'real time' content. This webinar will feature experts in email and real-time marketing to give you the answers your business needs. Explore what this actually means, and what the implications and rules are for marketers.
  • Managing Complexity in the World of Predictive
    Managing Complexity in the World of Predictive Dr. Megan Sheehan and Vandan Nayak, HPE Aug 22 2017 3:00 pm UTC 45 mins
    If you haven’t already, we recommend you listen to the first webinar in this series, the 9-minute overview by our SVP and GM Raffi Margaliot as he introduces the three core disruptions facing application delivery teams today.

    Software development teams are under pressure to release faster while maintaining the same level of quality—or ideally increasing it. This has significantly increased application lifecycle complexity to the point of chaos. Join us, as we discuss how application development teams can leverage HPE’s ALM Octane, an integrated lifecycle management solution, along with advanced analytics to mitigate the risks in application delivery and optimize their resource investments. Learn how to scale Agile and DevOps processes with data driven insights and prescriptive guidance.
  • Analytics Nightmares and How You Can Prevent Them
    Analytics Nightmares and How You Can Prevent Them Meta S. Brown, Author, Data Mining for Dummies and President, A4A Brown, Inc. Aug 22 2017 3:00 pm UTC 60 mins
    Analytics risks can keep you up at night. What if…
    · We make a big investment and don’t break even?
    · Management doesn’t trust the results?
    · Analysts cross data privacy boundaries?

    What a dilemma! You see the perils, yet you want the rewards that analytics can bring. The appropriate process enables you to dramatically reduce risks and maximize returns on your data and analytics investment.

    In this presentation, you will learn:
    · What causes most analytics failures
    · How you can diminish risk and maximize returns through strong analytics process
    · Why you (yes, you!) have a pivotal opportunity to establish high standards for analytics process right now
  • GDPR with Marketing Automation in Mind: Modern Email Marketing Compliance
    GDPR with Marketing Automation in Mind: Modern Email Marketing Compliance Nick Burrell, Co-Founder, CleverTouch Marketing Aug 22 2017 3:00 pm UTC 45 mins
    The General Data Protection Regulation (GDPR) is fast approaching and whilst there's lots of information about GDPR from an IT security perspective, marketers are still trying to understand the implications it will have on their marketing efforts from 25 May 2018 and beyond.

    As the modern email marketing landscape changes dramatically with the introduction of GDPR, this webinar explores the role of Marketing Automation in helping organisations stay GDPR compliant.