Why Your Digital Transformation Problem is a Connection Problem in Disguise
By: Software AG View more from Software AG >>
Download this next:
More Cloud, More Problems?
By:
Type: Replay
The cloud is more pervasive in our organizations and our lives. But security operations centers (SOCs) can keep up, even when their organization adopts multiple public cloud and SaaS solutions. Join this webinar to ensure that your organization’s cloud strategy is less of a problem than you might think. Expert Martin Holste, Cloud CTO at FireEye, shares: • Trade-offs and nuances between cloud providers • Considerations that can affect your strategic direction • Seasoned guidance on how to optimize your cloud migration
These are also closely related to: "Why Your Digital Transformation Problem is a Connection Problem in Disguise"
-
More Cloud, More Problems?
By:
Type: Replay
The cloud is more pervasive in our organizations and our lives. But security operations centers (SOCs) can keep up, even when their organization adopts multiple public cloud and SaaS solutions. Join this webinar to ensure that your organization’s cloud strategy is less of a problem than you might think. Expert Martin Holste, Cloud CTO at FireEye, shares: • Trade-offs and nuances between cloud providers • Considerations that can affect your strategic direction • Seasoned guidance on how to optimize your cloud migration
-
More Clouds, More Problems?
By:
Type: Replay
Between 2017 and 2019, the number of application and service outages increased from 25% to 34%. What’s alarming about these outages is that 80% could have been prevented — they were primarily caused by human error, power outages, network problems and configuration issues. Lack of visibility into the IT infrastructure can create a snowball effect of issues — siloed teams and data, and long times between detecting issues, investigating them and restoring services. According to the latest Uptime Institute survey, half of all workloads are still running on privately owned datacenters, while 25% of surveyed IT practitioners said they would be more likely to put workloads in a public cloud if there were more visibility. Today, IT infrastructures are more complex than ever, and with more distributed components altering the technology stack all the time, new opportunities for outages arise on premises and in the cloud(s). Join this webinar to get an understanding of: - Why infrastructure monitoring is more complex than ever in a distributed world - How your organization can modernize its monitoring practices to get them cloud-ready - How to predict and prevent outages on premises and in the cloud(s) - Why it’s important to measure uptime, performance and response time for hybrid architecture
Find more content like what you just read:
-
Solve my problem!
By:
Type: Video
Join WalkMe on a journey to simplify business workflows. Come on a journey to crack a business workflow challenge using WalkMe. Watch as we unravel the knots of a common problem and quickly and easily build a simple, effective solution.
-
Webcast: New year, old problems
By:
Type: Talk
Christmas cheer was in short supply in the corridors of power, as policymakers struggled to digest the double-helping of Omicron and monetary policy conundrums. With no consensus on the best approach (go easy on social restrictions or harass the unvaccinated? Loosen policy to encourage growth, or batten down the hatches against inflation?) investors must delicately balance their asset allocation. Please join us on Wednesday 2nd February to hear the Jupiter Merlin team’s views on the investment landscape and an update on Portfolio positioning.
-
How Old Math Can Solve New Problems
By:
Type: Talk
5 ways to improve your Security Ecosystem In this presentation I will show you how you can shift left your security layer by learning a new style: detecting and blocking threats at the earliest stage of the attack chain, and how threat intelligence can make your security insightful. I will explain how to translate threat intelligence into actual security enhancements which will lead to more tangible follow up to ensure your SecOps workload will be reduced. The old math will solve new problems by using what’s already on your IT, IoT (and some cases OT) network.
-
Is DoH a Problem or a Solution?
By:
Type: Talk
DoH (DNS over HTTPS) is a means of further encrypting web traffic and another step towards an encrypted safer Internet, or so it would seem. Many browser vendors are offering a means to tunnel your DNS traffic over HTTPS (TLS), combined with other technologies (such as Encrypted SNI) it presents a challenge to any organisation attempting to maintain a strong security posture in the constant battle against Malware and Data Exfiltration. Join Gigamon and (ISC)2 on April 29, 2021 at 1:00PM BST when we will discuss the rise of DoH, what problem it's trying to solve along with the associated problems it inadvertently creates. We'll also look into how it can be implemented and monitored, examining strategies to mitigate any risks this new approach presents us with. We’ll also examine the motivations behind those offering a 'free service' to users on the Internet and how this encrypted traffic is only as private as the trust you put into to the provider in question.
-
Problem Solving 101
By:
Type: Talk
Ever feel like you're solving the same problem over and over again? Or that solving one problem produces new, unanticipated ones? Or that, despite your best efforts, the problem(s) never really get resolved? It doesn't have to be that way! Join this presentation to improve all your problem-solving and outcomes by: - Understanding simple root-cause analysis - Identifying the real and the right problem(s) before coming up with solutions - Being proactive to troubleshoot and manage problems before they get out of hand - Developing critical thinking skills to diagnose and address problems quickly - Enlisting others in continual improvement This presentation is for leaders at every level who want to use their time productively and avoid getting bogged down by unresolved issues.
-
No Passwords, No Problem: What is WebAuthn?
By:
Type: Replay
Want to eliminate passwords? We all do. WebAuthn is a new web standard published by the World Wide Web Consortium (W3C) for users in the era of passwordless authentication for web applications. This new standard offers strong authenticators such as Touch ID or Face ID directly from your browser to keep attackers out while delivering first-class authentication experiences. Watch this webinar to learn about: • Use cases: Understand how the new standard enables low friction, phishing-resistant authentication • Technology: Peak beneath the hood and see the core technical concepts that comprise WebAuthn • User experience: Look at the user registration and authentication flows • Business impact: WebAuthn helps security and product forge mutually aligned objectives
-
More Data, More Security Problems
By:
Type: Replay
Is your security team struggling to manage high volume, high velocity data and threats that are lost in an endless list of alerts? Join this on demand webinar where we’ll show you: - Why organizations ingest data inefficiently, resulting in duplicate, redundant, or useless information and false positives. - The cost of inefficient data is far greater than monetary. It impacts security, engineering, and even the environment. - Using data pipelines and effective data processing saves time, money, and frustration. - Better data means stronger signal to noise and more effective threat detection.
-
Identity: Humans are the Problem
By:
Type: Talk
Comprehensive IAM frameworks are crucial for safeguarding user identity and access privilege. Human vulnerabilities, like errors and social engineering attacks, can compromise IAM systems. Join us to explore proactive and adaptive approaches for managing IAM, integrating technology and user education. We'll discuss the human aspects of a security framework and balancing user convenience with security. Learn how to achieve adaptability while protecting against threats. Attendees Will Learn How To: • Identify and address vulnerabilities posed by human errors and social engineering attacks in IAM systems through thorough training and awareness programs for employees. • Implement proactive and adaptive approaches to effectively manage IAM and stay ahead of potential security threats. • Integrate technology solutions with comprehensive user education programs to enhance the overall security posture of IAM systems. • Develop and implement strategies that strike the right balance between user convenience and security measures without overly burdening users. • Learn from adversaries and adopt adaptability in IAM management to align with evolving threats and industry best practices.
-
Quick Code Ideas: Solving small problems to fix bigger problems with Ansible®
By:
Type: Talk
Time consuming problems are often the source of delays, frustration, and lack of innovation, but they don’t have to be. In this Quick Code Idea, get: - Insight into the types of problems you should look to solve first. - Approach to take when advancing your Red Hat Ansible usage. - How to get started and what to avoid. Watch now.
-
You’ve Got Security Problems, Patch Management Can Solve Security Problems
By:
Type: Talk
Across Operations and Security, it sometimes seems like the sky is falling. Attend this technical webinar to see how modern Operations teams block the next threats with advanced visibility and automation.
-
The Goldilocks Problem of Software Delivery
By:
Type: Talk
Over the last 15 years, organizations have had difficulty with the entire software delivery process, but two artifacts in particular became a recurring problem. The problem stems from the Goldilocks principle: one of these artifacts is much too big to overcome efficiently, and one of them is much too small to make a significant impact, so we need to find the one that is just right. So what artifact is “just right?” As the user, what we really care about are the Features: the stuff we use and interact with all the time to make our daily lives better. However, the systems we have today haven't advanced to the point where software features are the nearest proxy for customer value. In other words, the feature must be at the forefront of the UI. In this talk, I will share why features are the proxy for value and explore the different levels of abstraction for the “just right” aspect of a Feature in order to shift people's mindset from thinking in terms of Builds or Releases, to thinking in terms of the customer and business value. I will share tactics to address the Goldilocks problem and how to have these discussions at the right level of the software in order to make prioritizations, decisions, and discoveries. What Attendees Will Learn: A different perspective about software delivery, which will help them make better decisions about which features to pursue and builds/releases to postpone. Learn why features are the future and how they are the perfect middle-ground between individual builds and major releases. How to ultimately break free from the Goldilocks problem of software delivery.
-
Why Headless CMSes Won't Solve Your Problems
By:
Type: Talk
Do a Google search on “Content Operations” and you’ll get a bunch of vendors trying to sell you their headless CMS as if it’s the answer to all your problems. Jeff Eaton exposes why this is blatantly untrue. We tackle the “headless fixes all” and related myths, such as “let’s use design systems for UX content,” and “you can manage content just like data.” This episode is sure to be informative, possibly inflammatory, and, as always, engaging. Let's Talk Content Operations is brought to you by Content, Seriously, and The Content Wrangler.
-
Gaps and Bridges, Problems and Solutions
By:
Type: Replay
The knowledge and skills gap in the cybersecurity industry is a problem that has been identified and discussed for the past 20 years. However, with the rapid acceleration of technology development, the skills gap seems to worsen as time goes by and may soon become a systemic deficiency. In this presentation, we will highlight some of the key challenges that our community is facing in regards to the skills gap. We will also present some of the ongoing CSA activities intended to help mitigate this issue, including a call for a coordinated multi-stakeholder and multiplayer plan.
-
Hacking ITIL - Problem Management
By:
Type: Talk
Instead of doggedly pursuing training, certification, and maturation…. and then waiting years to see any kind of benefit from all that effort, many organizations have decided instead to hack ITIL. An ITIL hack is simply a shortcut that allows you to achieve the benefits of a mature ITIL practice without having to go through months or even years of effort. In a benchmark that MetricNet performed for one of the largest insurance companies in the world, it was discovered that end users in this company were logging an average of 2 service desk incidents per month. That’s about double the industry average, which was concerning not only because the average cost of a ticket at level 1 was about $25, but also because every ticket represents productive time that’s lost by the user. And that’s usually the bigger cost – that is, the lost user productivity – rather than the direct cost of support. In this webcast, Jeff Rumburg will reveal how this this organization reached their goal of 50% reduction in total incidents – not in a year – but in less than six months! Attendees will learn the four simple, but very effective steps this organization took to realize all the benefits of ITIL, without going through the pain of maturing the formal ITIL practice of problem management.
-
Mehr Clouds, mehr Probleme?
By:
Type: Replay
Zwischen 2017 und 2019 stieg die Zahl der Anwendungs- und Service-Ausfälle von 25 % auf 34 %. Alarmierend ist, dass 80 % dieser Ausfälle verhindert hätten werden können. Sie waren nämlich vor allem auf menschliches Versagen, Stromausfälle sowie Netzwerk- und Konfigurationsprobleme zurückzuführen. Mangelnde Transparenz bei der IT-Infrastruktur kann nicht nur zu Team- und Datensilos führen, sondern auch für eine verlangsamte Erkennung, Untersuchung und Behebung von Problemen verantwortlich sein. Laut der neuesten Umfrage des Uptime Institute wird die Hälfte aller Workloads noch in privaten Rechenzentren ausgeführt. 25 % der befragten IT-Experten gaben jedoch an, dass sie Workloads mit höherer Wahrscheinlichkeit in eine öffentliche Cloud verlagern würden – aber nur, wenn die Transparenz besser wäre. Heutige IT-Infrastrukturen sind komplexer denn je. Und durch die zunehmende Zahl an verteilten Komponenten, die den Technologie-Stack laufend verändern, entstehen immer neue Möglichkeiten für Ausfälle bei lokalen Systemen und in der bzw. den Cloud(s). Registrieren Sie sich für dieses Webinar und lernen Sie: - Warum Infrastruktur-Monitoring verteilter Umgebungen heute komplexer denn je ist - Wie Ihr Unternehmen seine Monitoring-Verfahren modernisieren und auf die Cloud-Nutzung vorbereiten kann - Wie Sie Ausfälle bei lokalen Systemen und in der bzw. den Cloud(s) vorhersagen und vermeiden - Warum es in hybriden Architekturen wichtig ist, Uptime, Performance und Antwortzeiten zu messen
-
Solving Business Problems with Identity
By:
Type: Replay
Clear Skye’s CEO John Milburn and co-founder TJ Gryziec share their approach to identity security and governance, and why it’s important in all verticals. Solving any problem in business takes the right combination of people, process, and technology. Learn how John and TJ incorporate this problem-solving vision into their work, and how it leads to client success. This conversation is brought to you by Clear Skye, Identity Access and Management (IAM) solutions built natively on ServiceNow’s Now Platform.
-
Solving Problems with Cribl Stream
By:
Type: Video
Join Cribl's Ed Bailey and Max Weber, Senior Detection Engineer, for a discussion about the challenges of detection engineering and how Max is solving these problems every day. The conversation covers the current state of detection engineering, why data engineering is a prerequisite for better detection engineering, and what Max would like to see to help drive better outcomes. Lastly, Max will demo Cribl Stream and show how his data engineering skills drive better detections.
-
You Have a Password Management Problem. Let's Solve It.
By:
Type: Video
This webinar discusses the pros and cons of different methods of storing, sharing and protecting passwords for business applications. You’ll hear about the best strategies for managing and protecting access to non-SSO-integrated apps, capabilities to look for in password management solutions, and how to evaluate your password management vendors.
-
Ransomware Readiness: Why Cybersecurity is Not Just an IT Problem
By:
Type: Video
Sophisticated threat actors, such as ransomware gangs and state-sponsored adversaries, utilize ransomware to disrupt educational institutions and extort millions of dollars in ransoms. As these threats escalate, education leaders recognize the need to invest in cybersecurity. However, navigating the complex marketplace, acronyms, and hyperbolic promises make selecting technology and finding the right solutions challenging. Join cybersecurity expert Mark Sangster, Vice President, Chief of Strategy, as he breaks down why cybersecurity is not just an IT problem but an agency problem. In this webinar, you’ll learn: - Why educational leaders need to grasp the organizational risks related to cybersecurity to make informed decisions. - How to optimize resources and programs to increase return on investment. - Ways to meet regulatory requirements and showcase the success of cybersecurity initiatives to stakeholders within the education sector.
-
It’s When, Not If. The Problem with Passwords.
By:
Type: Replay
As an IT leader, you know that it's a matter of when, not if your business will be attacked. Weak, reused, or stolen passwords are responsible for a whopping 80% of data breaches. It's time to confront this risk – and regain control of the password problem. Join industry experts LastPass CSTO Christofer Hoff and Advisory CISO J. Wolfgang Goerlich to learn how to tackle the credential crisis and step into a more secure era of authentication. Listen in to learn: Why passwords are (still) a problem everyone should worry about. What "passwordless" actually means – and where it fits in your cybersecurity strategy. How password managers, MFA, and SSO simplify access while ensuring secure, centralized password management. Watch now – and get an edge against evolving threats!
-
It’s When, Not If. The Problem with Passwords.
By:
Type: Video
As an IT leader, you know that it's a matter of when, not if your business will be attacked. Weak, reused, or stolen passwords are responsible for a whopping 80% of data breaches. It's time to confront this risk – and regain control of the password problem. Join industry experts LastPass CSTO Christofer Hoff and Advisory CISO J. Wolfgang Goerlich to learn how to tackle the credential crisis and step into a more secure era of authentication. Listen in to learn: Why passwords are (still) a problem everyone should worry about. What "passwordless" actually means – and where it fits in your cybersecurity strategy. How password managers, MFA, and SSO simplify access while ensuring secure, centralized password management. Watch now – and get an edge against evolving threats!
-
It’s When, Not If. The Problem with Passwords.
By:
Type: Replay
As an IT leader, you know that it's a matter of when, not if your business will be attacked. Weak, reused, or stolen passwords are responsible for a whopping 80% of data breaches. It's time to confront this risk – and regain control of the password problem. Join industry experts LastPass CSTO Christofer Hoff and Advisory CISO J. Wolfgang Goerlich to learn how to tackle the credential crisis and step into a more secure era of authentication. Listen in to learn: Why passwords are (still) a problem everyone should worry about. What "passwordless" actually means – and where it fits in your cybersecurity strategy. How password managers, MFA, and SSO simplify access while ensuring secure, centralized password management. Watch now – and get an edge against evolving threats!
-
The GDPR: Problem, Pain, and Preparedness
By:
Type: Video
With the European Union's General Data Protection Regulation (GDPR) coming into force on May 25, 2018, law firms and corporations that have not considered and prepared for this far-reaching privacy regulation may begin to experience the problem and pain of non-compliance. Are you prepared? For those prepared for the GDPR, the ability to do business may increase based on the implementation of data privacy controls required for compliance. For those not prepared, there is a risk of not only losing business to GDPR compliant organizations but also of potentially being fined for non-compliance. So the question of preparedness is a real and material concern for any legal and business professional. So where do you stand on GDPR preparedness? Join HaystackID and a panel of privacy, compliance, and eDiscovery experts to learn more about the GDPR and how you can avoid the problems and pain of unpreparedness. Expert Panelists: + Michael Sarlo, EnCE, RCA, CBE, CCLO, CCPA | HaystackID + Deepali Doddi, JD CIPP/US, CIPP/E | Ice Miller LLP + Paul McGrady, JD | Winston & Strawn LLP + Andrew Soodek, CISSP, CISM, PMP, MBA | Secure Compliance Solutions + Martin Tully, JD | Actuate Law LLC Learn more at HaystackID.com
-
How SMEs Can Tackle the Data Problem
By:
Type: Replay
Data is everywhere and has gone from scarce to superabundant in a short period of time. That brings huge new benefits for businesses but also big headaches. Watch the first episode of our new series *Salesforce Solves,* as we talk to special guest Ian Jennings CEO of BlueFort Security on how he overcame the data silo problem and achieved a single source of truth to deliver a more efficient and integrated service to his customers. In this webinar you will learn: - How the lack of control over data is hurting your bottom line - How fragmented data and operating in silos is negatively impacting your productivity - Key tips and strategies to overcome these challenges
-
PKI Problems: Stories from the Trenches
By:
Type: Replay
It’s time to come clean about the biggest PKI and certificate management challenges facing teams today and get practical advice on how to overcome them. Join seasoned PKI experts Chris Hickman, CSO at Keyfactor, and Sami Van Vliet, Principal Product Manager, as they share insights and shed a little humor on the ups and downs of working with PKI. What You’ll Learn: Insights with the ups and down of PKI Tips and Recommendations to help you leave your PKI problems behind So, whether PKI is your passion or it’s just another plate you're spinning, this discussion is for you.
-
Cannabis Fires - A Growing Problem
By:
Type: Video
CILA Property SIG members will discuss the significant increase in seizure of cannabis plants in the UK over the last few years and how this increase has resulted in a major rise in the number of fires related to the illegal factories or farms. The topic is explored from the perspective of an Insurer, Loss Adjuster and Forensic Investigator with a number of real life examples considered demonstrating the challenges of this growing issue. This type of investigation when handling such claims is inherently difficult because virtually all will have been previously investigated by the Police and Fire Service. In most cases, the scene will have been all but destroyed and the significant evidence removed. NOTE: This webinar has been made available by the Chartered Institute of Loss Adjusters (CILA) solely for the use and convenience of the viewer. The content, views and representations made in this presentation are the sole product and responsibility of the speakers who have produced it. By making this presentation available the CILA does not offer any endorsement or recommendation of the views and opinions expressed therein. For a full explanation of the terms and conditions upon which the CILA provides this webinar please see our full disclaimer which available on the Institute website.
-
How to Solve Your Spreadsheet Problems with Kintone
By:
Type: Replay
Tired of juggling spreadsheets to manage your team’s data and processes? Learn how to transform your spreadsheets into customizable apps with just a few clicks—and spend less time reorganizing your data and more time learning from it. If your team relies on spreadsheets to share important data, you’ve probably run into a few common issues, including maintaining data integrity and security, managing version control, and collaborating with teammates to name a few. While spreadsheets have their purposes, they’re often used for far more than the tasks they’re ideally suited for. Not sure what your alternatives are? In this 30-minute webinar, we’ll show you: The problems that arise with over-reliance on spreadsheets How to import your spreadsheets into customizable database apps with just a few clicks Why switching from a system based on scattered spreadsheets and emails to a centralized platform like Kintone will transform the way your team works Join us to learn more about streamlining your communication, processes, and data management in one fell swoop. This webinar is strongly recommended for anyone who has experienced the spreadsheet struggle and wants to learn how to scale your team’s processes efficiently and do more with your data.
-
Solving Your Spreadsheet Problems with Kintone
By:
Type: Replay
Tired of juggling spreadsheets to manage your team’s data and processes? Learn how to transform your spreadsheets into customizable apps with just a few clicks—and spend less time reorganizing your data and more time learning from it. If your team relies on spreadsheets to share important data, you’ve probably run into a few common issues, including maintaining data integrity and security, managing version control, and collaborating with teammates to name a few. While spreadsheets have their purposes, they’re often used for far more than the tasks they’re ideally suited for. Not sure what your alternatives are? In this 30-minute webinar, we’ll show you: The problems that arise with over-reliance on spreadsheets How to import your spreadsheets into customizable database apps with just a few clicks Why switching from a system based on scattered spreadsheets and emails to a centralized platform like Kintone will transform the way your team works Join us to learn more about streamlining your communication, processes, and data management in one fell swoop. This webinar is strongly recommended for anyone who has experienced the spreadsheet struggle and wants to learn how to scale your team’s processes efficiently and do more with your data.
-
How do you solve a problem like security training?
By: TechTarget ComputerWeekly.com
Type: eGuide
In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
-
Kentik: Solving Your Unsolvable Problems
By:
Type: Video
Trying to see through the cloud to manage unexpected costs and performance mysteries can feel like an unsolvable problem. You know, like “What’s the sound of one-hand clapping?” Or “If a tree falls in a forest, does it make a sound?” But guess what? One hand clapping sounds like regular clapping, trees totally make sounds, and Kentik eliminates network guesswork forever.
-
Cloud Security is a Layer 8 Problem
By:
Type: Talk
Real security requires collaboration among multiple teams to be successful, but 35% of companies in the cloud report siloed teams. In this session I will talk about the best ways to integrate security across the application lifecycle, and how to work across multiple teams to achieve your goals with Prisma Cloud.
-
Cloud Security: Not Just a Visibility Problem Anymore
By:
Type: Replay
Managing complex cloud environments is a reality for most organizations. They need to effectively see what’s occurring across multi-cloud environments, ensure that verification checks are met, and have the right enforcement mechanisms in place. Ultimately, they need to confirm that security controls are performing as expected at scale across distributed cloud platforms. Join us on Thursday, September 24 at 12 p.m. PT/3 p.m. ET to learn from frontline response experts and former CISOs about effective cloud security. This webinar covers cloud visibility, compliance, governance, controls validation and overall “health” of those environments. You’ll get answers to questions like: • How can I gain greater visibility across hybrid, public, private, and multi-cloud environments? • Is my organization prioritizing the correct information when monitoring cloud environments? • Is my team effectively stopping data leakage and protecting data integrity? • What side of the shared cloud responsibility model is my team accountable for? • Does my team have evidence to properly communicate key metrics to our executives? Expert panel includes: • Moderator: Brian Contos, VP, Technology Innovation, Mandiant Security Validation • Major General Earl Matthews, VP of Strategy, Mandiant Security Validation • Matt McWhirt Director, Mandiant Consulting • Lisun Kung, Sr. Director, Cloudvisory, FireEye Register Now
-
It's Not a Pipeline Problem... Engaging Underrepresented Talent
By:
Type: Talk
Join our webinar, It's Not a Pipeline Problem: Engaging Underrepresented Talent, in partnership with the Black Recruiters Network. We’ll discuss actionable approaches to attract and retain diverse talent, moving beyond the "pipeline problem" narrative. Learn how to build an inclusive employer brand, implement top recruitment practices, and create a workplace where underrepresented talent thrives. Featuring real-world examples and proven strategies, this session is perfect for HR professionals, DEI leaders, and anyone focused on enhancing their diversity recruitment efforts. Arsema Fessehazion - Founder @ Black Recruiters Network Kianna Briggs - DEI Manager @ Mediabrabds Alicia Richardson - Founder @ Create Connect, an employer branding agency Presented by: Kendal Jay - Global Senior Talent Partner @ Depop
-
Cloud Security: Not Just a Visibility Problem Anymore
By:
Type: Talk
Managing complex cloud environments is a reality for most organizations. They need to effectively see what’s occurring across multi-cloud environments, ensure that verification checks are met, and have the right enforcement mechanisms in place. Ultimately, they need to confirm that security controls are performing as expected at scale across distributed cloud platforms. Join us on Thursday, September 24 at 12 p.m. PT/3 p.m. ET to learn from frontline response experts and former CISOs about effective cloud security. This webinar covers cloud visibility, compliance, governance, controls validation and overall “health” of those environments. You’ll get answers to questions like: • How can I gain greater visibility across hybrid, public, private, and multi-cloud environments? • Is my organization prioritizing the correct information when monitoring cloud environments? • Is my team effectively stopping data leakage and protecting data integrity? • What side of the shared cloud responsibility model is my team accountable for? • Does my team have evidence to properly communicate key metrics to our executives? Expert panel includes: • Moderator: Brian Contos, VP, Technology Innovation, Mandiant Security Validation • Major General Earl Matthews, VP of Strategy, Mandiant Security Validation • Matt McWhirt Director, Mandiant Consulting • Lisun Kung, Sr. Director, Cloudvisory, FireEye Register Now
-
Cost of Compliance - The $270B problem.
By:
Type: Talk
Join four leading experts as they discuss why the financial industry spends $270 billion per year on maintaining compliance. The European Union’s overhaul of data privacy regulation (GDPR) is estimated to have generated 114 million euros ($126 million) in fines over the past two years – a staggering 160,000 data breach notifications. These almost incomprehensible numbers, hide the challenges faced by every organisation in keeping up with changing regulations while maintaining reporting and customer service. Join us on as we discuss: - The factors driving compliance cost - How regulatory technology (Reg Tech) and modern-day data behaviour are evolving through 2020 Controlling costs is critical: Every penny saved in compliance costs is another added to the bottom line. We anticipate this panel discussion will be a rewarding and profitable event to attend. The talk is led by Michael McGrath, Senior Director for Compliance and Digital Risk at Proofpoint. He is joined by: Susannah Hammond, Senior Regulatory Intelligence Expert at Thomson Reuters. Dennis Sullivan, Vice President, Senior Compliance Officer at PIMCO. Paul Clulow-Phillips, Managing Director - Global Head of Markets Compliance and Global Head of Surveillance at Société Générale.
-
Cyber Security: One Problem, One Purpose, One Answer
By:
Type: Replay
On this session, Jason Rivera, Director, Strategic Threat Advisory Group, at CrowdStrike will share his perspective on how to detect, react and remediate advanced cyber intrusions through achieving scalability, reducing cybersecurity complexity and increasing speed.
-
Cost of Compliance - The $270B problem.
By:
Type: Replay
Join four leading experts as they discuss why the financial industry spends $270 billion per year on maintaining compliance. The European Union’s overhaul of data privacy regulation (GDPR) is estimated to have generated 114 million euros ($126 million) in fines over the past two years – a staggering 160,000 data breach notifications. These almost incomprehensible numbers, hide the challenges faced by every organisation in keeping up with changing regulations while maintaining reporting and customer service. Join us on as we discuss: - The factors driving compliance cost - How regulatory technology (Reg Tech) and modern-day data behaviour are evolving through 2020 Controlling costs is critical: Every penny saved in compliance costs is another added to the bottom line. We anticipate this panel discussion will be a rewarding and profitable event to attend. The talk is led by Michael McGrath, Senior Director for Compliance and Digital Risk at Proofpoint. He is joined by: Susannah Hammond, Senior Regulatory Intelligence Expert at Thomson Reuters. Dennis Sullivan, Vice President, Senior Compliance Officer at PIMCO. Paul Clulow-Phillips, Managing Director - Global Head of Markets Compliance and Global Head of Surveillance at Société Générale.
-
Back to Basics: Solving the Email Fraud Problem
By:
Type: Replay
In our recent market study, we found that 77% of businesses expect to fall victim to Email Fraud in the next 12 months. Call it business email compromise (BEC) or phishing, the multi-faceted Email Fraud threat is always lurking and continues to grow. However, unlike most cyberthreats these socially engineered attacks seek to exploit people rather than technology. Join this webinar to learn: - Findings from our latest Email Fraud study - Email Fraud trends from 2017 and threats to look out for in 2018 - Helpful tips to protect your people, data and brand against Email Fraud - Live Q&A with the speakers
-
Using AI to Solve Real Problems
By:
Type: Video
Francis Ryu, Director of Data Science, BNY Rashmi Badwe, Chief Operating Officer, TIAA Wealth Management Mike Demissie, Head of Applied AI and Practice, BNY Craig Iskowitz, Founder and CEO, Ezra Group
-
Solve my Problem Series - Foundations of Personalisation
By:
Type: Talk
Back by popular demand, our personalisation experts are here to guide you through all the recent changes with the first-party data landscape. Last time we discussed delivering personalisation to customers at the right time and implementing a personalisation strategy for your customer’s journey in a scalable way. In this brand new Solve my Problem episode, we’re taking a step back and are here to help you with the ‘Foundations of Personalisation’. To manage an uncertain future, it’s all about setting the right foundations and the time to start doing that is now! So join us on 10th November at 2:00pm AEST, with our experts, Ben Fettes, Co-founder and Head of Strategy, The Lumery & Kieran Smith, Senior Solutions Consultant, Tealium. You will learn about: - Foundational personalisation 101 - Identity as a strategy - Data driven decisions - Contextualisation based on lifecycle stage - Acting now versus starting later Be sure to come armed with questions for our experts to solve. It’s time to get your data in order for personalisation! Ben and Kieran have tons of experience helping and guiding customers with successful personalisation strategies and will be sharing their knowledge while answering your questions. Don’t miss out, register now!
-
How to Handle 7 Types of Problem Employees
By:
Type: Replay
Fascinating finds from observations of and interviews with 7 types of problem employees... You've probably got at least 1 in your organization. This workshop is for managers and business partners who aren't quite sure what to do next with the renegades, chronic complainers, inconsistent performers and others that make your job more challenging. Join me for a different perspective, one that comes directly from these problem employees.
-
[Vision] The Hidden Problems of Collaboration Tools
By:
Type: Talk
One of the primary concerns for business leaders in a remote work era is ensuring productivity and effective collaboration is key to ensuring productivity. Every day employees use numerous tools to communicate and collaborate – from Teams, Zoom, Go to Meeting and more. Yet doing this in a secure, corporate environment on mixed digital workspaces spread out around the world that must be managed, maintained, updated, and configured by IT can be a bit of a quagmire. Join this session to gain insights into how to effectively test and ensure that your collaboration tools function effectively and enable a better future of work in the process. Presented by Blair Parkhill, Product Manager, Login VSI
-
Data Security Is Everyone's Problem: How Are You Tackling It?
By:
Type: Replay
Industry experts will share strategies for breaking down silos, fostering open communication, and aligning objectives to create a cohesive and proactive security framework. Gain actionable insights to strengthen your organization's data security practices, minimize vulnerabilities, and create a united front against cyber threats. Elevate your defense strategies. Join this session to hear how Rubrik customers are tackling this critical challenge. Make sure to take a look at the attachments as well - we've added extra learnings on how to optimise data protection and provided you with additional resources to help set you up for success.
-
It's Time To Go International, Where Cooling Isn't A Problem... [Podcast]
By:
Type: Video
This week on the podcast, we’re going International. We’re joined by Rui Gomes from atNorth. atNorth, headquartered in Iceland, has recently deployed WEKA for its HPC and AI workloads. Rui explains his WEKA journey and how atNorth using WEKA, can offer their customers HPC-as-a-service with the best performance and price point.
-
Problem Analysis and Performance Tuning for CICS
By:
Type: Talk
CICS problems, whether they’re related to performance or transaction failures, can in some cases be easily remediated in the short term. But getting to the root cause of the problem and creating a permanent fix can be quite a bit more difficult. In this session, we’ll discuss a methodology for finding and resolving CICS problems, whether they’re related to performance or outages, and show some CICS products that can each help in isolation, but when combined can provide a solution to even the most difficult issues. In this session, you will: - Understand the common types of CICS problems that can occur, including performance issues and transaction failures. - Gain insights into a systematic methodology for effectively finding and resolving CICS problems. - Gain an understanding of the importance of proactive monitoring and preventive measures. - Learn how to analyze CICS performance metrics and logs to identify problem areas and potential bottlenecks. - Explore real-world case studies or examples that highlight resolving complex CICS problems
-
Prioritize People and Problems with Altify Insights
By:
Type: Video
Join Graham Dando from Upland Software for an in-depth overview of Altify Insights, a powerful tool designed to help you understand stakeholders and their priorities within an account or opportunity. Altify Insights is fully integrated with Salesforce and mobile-friendly, making it an essential solution for managing deals, building pipelines, and identifying cross-sell and upsell opportunities. In this webcast, you'll discover how to use Altify Insights' relationship and stakeholder maps to gain a clear, hierarchical view of the people involved in your opportunities. Learn to identify informal influences, conflict lines, and other dynamics that can impact your success. Prioritize the people and problems that matter most with Altify Insights.
-
How can we solve quantum problems today and in the future?
By:
Type: Video
Join us to learn how years of Microsoft research reveal how the discovery of new chemicals, materials, and drugs will greatly benefit from quantum computing. While a scalable quantum computer will ultimately help solve the world’s most challenging problems, Dr. Troyer will explore: How real progress can be made today by combining HPC, state-of-the-art ML, and quantum knowledge to fundamentally transform our ability to model and predict the outcome of chemical processes Real-world insights from co-innovation projects happening right now with leading chemical and materials science companies around the world How researchers in chemical and materials fields can get started on their quantum journey today