Join this webinar to get actionable information that will help you plan and develop your own security operations strategy and will guide you towards practically proven solutions. During the webinar, Roman Nazarov, Head of SOC Consulting at Kaspersky, will provide (...)
In February 2024, the NIST Cybersecurity Framework (CSF) 2.0 update was released, featuring the latest advancements. This update brings a host of transformative changes, expanding the framework's scope. It also provides stronger governance and supply chain risk management. There are (...)
Win/Loss analysis is critical for any sales organization — you need to understand why you won or lost a deal.
But how do you gather feedback to inform your win/loss analysis? How do you follow up with Closed-Won AND Closed-Lost deals?
Alchemer equips (...)
Legislation requiring stringent software security practices by software producers is being passed around the globe. This requires organizations to rethink their approach to software security, which industry standards they follow, and the best practices for their software development teams.
NIST has (...)
This is a great training for anyone who will be a Kintone App Builder because we’ll go through how to set up permissions for apps. After this training, you'll have all you need to be able to determine how your (...)
Modern cars employ a wide array of communication interfaces. Some, like Bluetooth and Wi-Fi, directly engage users, while others, such as RDS and GPS, provide user-facing services, and still others, like CAN and Ethernet buses, ensure the proper functioning of (...)
There are a number of ways your survey can go South. This webinar will detail WHY those survey disasters occur and HOW to avoid them in the future.
Alchemer thought leaders will discuss topics like sampling, logic, and email deliverability. They (...)
LevelBlue offers a suite of managed detection and response (MDR) services to help organizations protect against evolving threats. The services are powered by cutting-edge LevelBlue Labs threat intelligence, embedded AI, and extensive integrations with best-of-breed technologies. However, our true competitive (...)
It seems like AI is everywhere today. But what implications does using AI have when it comes to your billing processes?
Join this webinar to hear Nathan Shinn, BillingPlatform CSO, as he unveils a revolutionary feature – natural language reporting with (...)
This training is perfect for Kintone App Builders because we’ll go through how to set up views and graphs within an app. After this training, you'll have all you need to display your data to your team.
During this session, (...)
As the industrial landscape evolves, so do the threats that accompany it. While many industrial threats may be developing slowly from year to year, subtle changes are reaching a critical mass, poised to reshape the cybersecurity landscape in the near (...)
A scalable data protection solution doesn't have to feel like scaling a mountain. Veritas and Wasabi are introducing a new way to provision Backup Exec with Hot Cloud Storage so they’ll always have as much as they need—never more, never (...)
Unlocking Speed, Precision, and Efficiency in NDR
NDR is a critical component in most organizations’ cybersecurity tool stack, and ExtraHop is one of the leaders in the NDR market. The Gigamon Deep Observability Pipeline increases the speed and precision of (...)
Are rising costs and performance issues impacting your SAP ECC or S/4 HANA environment? Or are you seeking better visibility into SAP content to improve customer service and drive productivity?
Join Rocket Software’s experts for a focused session on leveraging Rocket (...)
Dan Schrader hosts a webinar on cloud network security featuring IDC's Phil Bues and Fortinet's Aidan Waldan.
IDC sees the cloud market evolving, with organizations at different stages of their cloud journey. Security is a top priority, with a focus on (...)
L'IA peut-elle transformer les équipes de service client en source de revenus ?
Le service client est en pleine évolution et son avenir est prometteur. Aujourd'hui, les clients exigent des interactions rapides, cohérentes et personnalisées dès qu'ils entrent en contact avec (...)
We look forward to sharing the details about Arcserve UDP 10, which will be generally available on December 3rd!
Join Pierre Henny to explore new UDP 10 features and functionality updates.
Register now to learn more about the latest UDP version!
What’s on (...)
Join us for our December TechTalk session where we will introduce the new SN655 and SN861 High capacity and gen5 SSDs, and the new E3.S, E1.S form factors.
Did you know sales professionals estimate they can save 4.5h a week thanks to generative AI?
While the benefits of Sales AI are clear, addressing the complexities of trust and adoption present significant challenges.
Need help navigating AI for sales? Watch this (...)
Moving your infrastructure to the cloud is primarily a business decision, or a choice made by IT managers who have decided to rationalise (not necessarily simplify) their infrastructure by moving to the cloud.
Some have chosen to do so by moving (...)
Understanding the current SAP landscape is the foundation of ERP transformation, as it reveals critical dependencies, data flows, and system integrations. This visibility enables teams to identify improvement areas, prioritize transformation steps, and mitigate risks early on.
Join our webinar to (...)
In today's interconnected world, sophisticated cyberattacks and data breaches are a constant threat, making robust network security essential for businesses of all sizes. While Google Cloud offers a secure foundation, understanding how to configure and manage your network environment is (...)
Today’s customers expect data centers to remain fully operational, online and reliable with minimal downtime, while efficiently maintaining vast amounts of data. The NVMe® Management Interface (NVMe-MI™) Specification simplifies the process of managing NVMe storage devices by enabling the ability (...)
In this "If Your APIs Could Talk" episode, we'll explore the Traffic Audit feature of the Akamai API Security solution. We'll introduce participants to Traffic Audit's powerful capabilities, including recording, visualizing, and analyzing API traffic within their environment. Traffic Audit (...)
Efficient Agile and DevOps Practices have made mobile, web, and desktop apps from Financial Services companies more ubiquitous than ever. While these efficiencies greatly enhance the customer experience, they also present an enticing attack surface to threat actors.
Join us for (...)
Reserve your seat for an exciting webinar about the market research trends we see on the horizon.
Join Leslie Rich, PhD, to discuss trends like the shrinking shelf life of research, how AI is changing the profession, how text analysis can (...)
Unlocking Speed, Precision, and Efficiency in NDR
NDR is a critical component in most organizations’ cybersecurity tool stack, and ExtraHop is one of the leaders in the NDR market. The Gigamon Deep Observability Pipeline increases the speed and precision of (...)
Vanta’s 2024 State of Trust Report found that cybersecurity risk is the biggest concern for business leaders, higher than both financial and operational risk. With more reliance on third-party vendors and increased use of AI technologies, security leaders face a (...)
With Your FinServ Tech Oracles:
• Johna Till Johnson, Nemertes CEO + Founder & Content Committee Chair for the Wall St. Technology Association (WSTA)
• Jerald Murphy, Nemertes Senior VP of Research + Consulting
FinServ Tech Oracles – a weekly video series for (...)
Discover how AI is transforming telecom networks, enabling faster issue detection, optimized resource allocation, and reduced operational costs.
Together, Digis Squared and Intel are pioneering AI solutions that elevate network performance, enhance user experience, and drive the next generation of intelligent (...)
Join us for our December TechTalk session where we will introduce the new SN655 and SN861 High capacity and gen5 SSDs, and the new E3.S, E1.S form factors.
Innovations in video technology are driving changes to compliance regulations and industry standards just as much as those regulations and standards are driving changes in video technology. As standards evolve and new technology emerges, deploying and maintaining a compliant surveillance (...)
This insightful webinar peels back the layers of API security to reveal the complexities of protecting your APIs.
You'll gain an in-depth understanding of:
- The most pervasive API vulnerabilities that compromise systems and how to mitigate them.
- Critical security (...)
Join us as we uncover the five Local Privilege Escalation (LPE) vulnerabilities recently discovered in the needrestart component of Ubuntu Server. These vulnerabilities, identified by Qualys (CVE-2024-48990, CVE-2024-48991, CVE-2024-48992, CVE-2024-11003, and CVE-2024-10224), allow local attackers to gain root privileges and (...)
Stay ahead of the game with critical updates from the Office of the Australian Information Commissioner (OAIC) on tracking pixels and privacy compliance. With fines up to $330,000 and heightened enforcement, businesses must adapt to stricter rules around consent, transparency, (...)
Reserve your seat for an exciting webinar about the market research trends we see on the horizon.
Join Leslie Rich, PhD, to discuss trends like the shrinking shelf life of research, how AI is changing the profession, how text analysis can (...)
Descubre el poder de Salesforce Flows, la herramienta clave para automatizar procesos dentro de Salesforce. Comprenderás el diseño de flujos eficientes sin necesidad de programar, ahorrando tiempo y recursos mientras optimizas la experiencia de usuario. Descubre cómo Flows puede transformar (...)
With the recent NIST announcement of the first set of finalized Post-Quantum Cryptography (PQC) encryption algorithms, many organizations are wondering what to do next. This raises important questions like - what is the PQC timeline and where do we get (...)
In this episode of "If Your APIs Could Talk," we explore the Workflow Automation feature of Akamai API Security. This feature dramatically improves efficiency and productivity by simplifying the creation of multi-action workflows. It uses a user-friendly visual editor, customizable (...)
In einer Welt, in der kritische Infrastrukturen immer stärker von digitalen Technologien abhängig sind, wird die Cybersicherheit von OT- und ICS-Systemen zu einem entscheidenden Faktor. Wir möchten Sie daher herzlich zu unserem Webinar einladen, in dem wir unter anderem die (...)
Reserve your seat for an exciting webinar about the market research trends we see on the horizon.
Join Leslie Rich, PhD, to discuss trends like the shrinking shelf life of research, how AI is changing the profession, how text analysis can (...)
A modern approach to exposure management is a combination of process and technology. New solutions designed to help organizations understand and manage their attack surface include External Attack Surface Management (EASM) and Cyber Asset Attack Surface Management (CAASM), these can (...)
L'aumento dei costi e i problemi di prestazioni hanno un impatto sul vostro ambiente SAP ECC o S/4 HANA? Oppure state cercando una migliore gestione dei contenuti SAP per migliorare il servizio clienti e aumentare la produttività?
Unitevi agli esperti di (...)
Jay Bolden, Senior Director, Eli Lilly and Company Global Quality Laboratories. Presenting:
An Overview of Recent USP Bacterial Endotoxins Standards Development
Dr David Roesti, PhD. Microbiologist/Facilitator QA/QC at Novartis Pharma AG. Presenting:
Overview and Future Plans of the USP Rapid Microbiological Methods Subcommittee
Followed (...)
The holiday season is a time for relaxation and celebration, but it's also when attackers actively search for loopholes.
This gap brings unique IT challenges and gives attackers ample time since staff availability is reduced.
Register now for an insightful (...)
Certain VM workloads are crucial and not obsolete, but lack a clear path to modernization. Currently, they run on IaaS or public clouds, which are costly and require time-intensive maintenance from operators and developers.
What if you could run these VMs (...)
We’re living in an era of rapid transformation where artificial intelligence and technology are reshaping not just industries, but the very nature of work itself. In this insightful session, we’ll explore how advancements in AI and workplace technologies are transforming (...)
The financial sector is facing increasing regulatory pressure, particularly with the evolving BCBS 239 RDAR guidelines. Join experts from Collibra and PwC as they discuss how data intelligence can help financial institutions meet these new standards and improve risk data (...)
This session, originally premiered during Nasuni's CloudBound 2024, explores the intersection of artificial intelligence and cybersecurity, addressing the evolving threats and opportunities posed by rapid advancements in AI technology. Elazari, a renowned cybersecurity expert, highlights how AI is reshaping both (...)
Next-Gen SIEM Focus Series (Myth Busters): SIEMs have gotten a bad rap. With declining detections, skyrocketing costs, and inadequate data visibility, it’s understandable. Gurucul flips these myths on their head. In this Democast Series we bust common myths and show (...)
This webinar explores key findings and analysis from IDC's Business Value White Paper on Wasabi Hot Cloud Storage. IDC independently surveyed Wasabi customers to gather detailed metrics regarding their Return on Investment (ROI) and Total Cost of Ownership (TCO). Join (...)
With deepfakes and other advanced fraud tactics on the rise, liveness detection is essential for secure identity verification. Join us as we explore the key questions every organization should ask to ensure their liveness solution is effective and future-proof.
In this (...)
In a world where email is a channel for confidential communication, safeguarding your messages from prying eyes is crucial. If you’re tired of worrying about who’s peeking at your emails or if your attachments are wandering off without your permission, (...)
We are seeing many of our retail customers implementing SD-WAN to their stores for improved in-store app experiences, secure customer transactions and fast check outs. But SD-WAN comes with it own set of challenges for NOC teams. In this Small (...)
The manufacturing sector is changing rapidly, with dynamic computing and technological innovations revolutionizing the industry. However, with these opportunities come increased risks. Manufacturing IT leaders are now facing significant challenges in maintaining visibility into their IT estates, complicated by legacy (...)
Organizations are now expected to integrate an AI strategy into their business transformation efforts. This transformation is crucial for maintaining competitiveness and leveraging AI for a strategic edge. ServiceNow’s Strategic Portfolio Management (SPM) helps organizations align their goals with work (...)
AI and open source code is making waves in the development world, providing teams with the ability to speed up their development process to keep pace with the fast-paced digital economy. But at what cost - If security cannot keep (...)
In an era where innovation is the cornerstone of success, women are increasingly taking the lead in driving transformative changes across technology and business landscapes. This webinar, "Empowering Innovation: Women Leading the Charge in Technology and Business," aims to celebrate (...)
Join us for an engaging session hosted by the ISSA International Apprenticeship, Internships, Mentorship (AIM) Comittee, where we dive into the latest insights from our recent infosec professional study. As the cybersecurity landscape intensifies, professionals face mounting challenges, from resource (...)
Embark on a foresight journey into the future of cybersecurity, highlighting key trends and innovations that are set to redefine the digital defense landscape in the year ahead. Discover how advancements in artificial intelligence will revolutionize the way security teams (...)
Embark on a foresight journey into the future of cybersecurity, highlighting key trends and innovations that are set to redefine the digital defense landscape in the year ahead. Discover how advancements in artificial intelligence will revolutionize the way security teams (...)
From an operational perspective, using an agentless solution such as mirroring for virtual traffic access seems ideal. Nothing to install, easier to manage, less expensive etc. In fact, the opposite is true. Agent-based traffic access solutions are easier to configure, (...)
Earn 1.5 CPE Credits on this webinar
As cyber threats evolve, organizations must strengthen their defenses with a balanced cybersecurity approach, integrating people, processes, and technology. Yet, finding this balance is often challenging. Some focus on tech investments but lack the (...)
As AI and large language models (LLMs) rapidly transform industries, they also introduce new vulnerabilities that traditional cybersecurity methods can't fully address—data leaks, non-compliance, intellectual property theft, and more. In fact, 94% of IT leaders have allocated budgets to safeguard (...)
From STRONGER 2024: Join Patrick Wright, Chief Information Security & Privacy Officer for the State of Nebraska, as he dove into the critical elements of designing an effective cyber risk management program at the state level. Patrick shared his journey (...)
Are your storage solutions optimized for HPC? Join our webinar with experts from Supermicro, NVIDIA, DDN, and Solidigm as they discuss:
- various use cases of HPC
- the evolving landscape of data storage solutions
- the importance of infrastructure in enhancing performance. (...)
Palo Alto Networks is a leader in security solutions that protect the organizations deploying AI everywhere, generating and processing data everywhere. We are inviting Dr. May Wang, CTO of Cyber Security AI, Palo Alto Networks, to discuss how Palo Alto (...)
Palo Alto Networks is a leader in security solutions that protect the organizations deploying AI everywhere, generating and processing data everywhere. We are inviting Dr. May Wang, CTO of IoT Security, Palo Alto Networks, to discuss how Palo Alto sees (...)
Prerequisites for deploying the GigaVUE Cloud Suite for VMware. In this video, we demonstrate the deployment process using GigaVUE Fabric Manager. For further information and to pose any questions, please visit the Hybrid/Public Cloud Group in Gigamon's VÜE Community. (...)
Cloud Native applications and Services are the workhorses of modern cloud environments. They hold most of the organization's crown jewels and are therefore often the target for insider and outsider threats. Existing cloud security posture management and hardening solutions (CSPM) (...)
Are application performance issues consuming your team's resources? In today’s complex multi-cloud environments, teams often spend up to 90 percent of their time identifying root causes rather than fixing problems. Don’t let performance bottlenecks hinder your organization.
In this engaging (...)
In an era defined by rapid technological change, ensuring the optimal performance and reliability of your Storage Area Network (SAN) is paramount. This webinar offers an in-depth exploration of the comprehensive SAN health checkup process, crucial for maintaining robust and (...)
An essential session for leaders and practitioners, this 30-minute session provides a comprehensive overview of the current security landscape, examining macro influences on organizations and Security Operations Center (SOC) teams.
The session explores the dynamic forces at play, from emerging threat (...)
An essential session for leaders and practitioners, this 30-minute session provides a comprehensive overview of the current security landscape, examining macro influences on organizations and Security Operations Center (SOC) teams.
The session explores the dynamic forces at play, from emerging threat (...)
ESG requirements continue to change and adapt, which means its rules and regulations do, too. ESG has become a core part of the risk business — and an organization's ESG framework now requires strict oversight from many different teams. To (...)
Python is a fast, platform-agnostic, and easy-to-learn programming language that is suited for beginners and experienced developers alike. Ever since its first release in 1991, Python has had a constant presence in the computer world and has become a go-to (...)
This Fireside Chat will delve into the transformative role of High Speed Encryption (HSE) in enhancing data security for businesses across various industries. With a focus on practical insights and real world applications, the discussion will feature a detailed exploration (...)
Entdecken Sie die Neuheiten in Arcserve UDP 10!
Wir freuen uns, Ihnen das neueste Update unseres Arcserve-Produkts UDP 10 vorzustellen, das seit dem 15. Oktober offiziell verfügbar ist! In unserem Live-Webinar am Dienstag, den 5. Dezember, um 10 Uhr CEST, gibt (...)
ZTNA adoption skyrocketed during pandemic as organizations looked to quickly enable secure remote access to employees working from home. Now in the post COVID era, organizations are seeking the same security benefits to provide consistent security and simplify user experience (...)
In the last of our five-webinar series about Secure Access Service Edge (SASE), our expert presenters will guide you to a complete understanding of Software-Defined Wide-Area Network (SD-WAN) and the role it plays in a complete SASE deployment.
SD-WAN is a (...)
Créez des applications d'IA rapidement et en toute sécurité !
Vous souhaitez découvrir comment créer rapidement des applications d'IA avec une sécurité de données éprouvée ?
Nous aborderons des sujets tels que :
- partir à la découverte de la plateforme (...)
Modern software development has completely transformed the way organizations operate and compete in the market. With the attack surface growing exponentially and the software supply chain becoming more complex due to developments like the rise of AI and increasing regulatory (...)
Join us for an exclusive coffee-break webinar designed specifically for the Professional Services industry. Our team of experts will guide you through the process of becoming more insights-driven by leveraging data and AI directly within your CRM. Discover how to (...)
The global transformation to sustainable energy is one of the most important investment themes of our generation. And as governments and businesses across the globe are seeking to decarbonize, the economic landscape has shifted over the course of 2024 with (...)
An essential session for leaders and practitioners, this 30-minute session provides a comprehensive overview of the current security landscape, examining macro influences on organizations and Security Operations Center (SOC) teams.
The session explores the dynamic forces at play, from emerging threat (...)
An essential session for leaders and practitioners, this 30-minute session provides a comprehensive overview of the current security landscape, examining macro influences on organizations and Security Operations Center (SOC) teams.
The session explores the dynamic forces at play, from emerging threat (...)
In this special event following COP29 and the US elections, IPR and PRI will assess the long-term implications for investors of these decisive events in the transition towards net zero. Our panel of policy and investment experts will examine (...)
Discover how embracing cutting-edge technologies and innovative processes can transform underwriting, enhancing both agility and profitability. Learn to leverage advanced data analytics for superior risk assessment, streamline operations through automation, and boost decision-making with AI and machine learning.
Discover how to:
- (...)
Insurances face an ongoing race to innovate amidst rising customer expectations and pervasive security threats. The challenge lies in formulating a strategy that weaves robust security and privacy measures with a seamless digital experience for customers and partners.
In this session, (...)
As technology evolves, so do cyber threats. Join us for a forward-looking webinar on Cybersecurity Trends for 2025, where we explore imminent challenges and innovative solutions in the cybersecurity landscape. Our expert panel will uncover emerging threats, cutting-edge technologies, and (...)
Elevate Your SecOps with Advanced Capabilities.
Join this exclusive webinar to discover how the latest updates to the SanerNow platform deliver unparalleled value to your SecOps teams. Dive into the enhanced features that elevate your vulnerability management efforts and fortify your (...)
As IT departments face economic pressures and the uncertainty surrounding VMware, many are turning to OpenStack as a cost-effective, future-proof alternative for on-premises infrastructure.
In this session, Christian Huebner, Mirantis Director of Architecture Services, and Heiko Kraemer, Principal Cloud Architect, will (...)
Learn how international cybersecurity company Malwarebytes selected a CX platform and delivered the ROI they needed in this short webinar.
Malwarebytes needed an enterprise feedback platform that was fast, flexible, and easy to implement. SurveyMonkey wasn't cutting it and Qualtrics would (...)
Join Google's Office of the CISO for a vital webcast designed specifically for Boards of Directors. In today's interconnected world, supply chain attacks are a growing threat to organizations of all sizes. Cybersecurity is no longer just a concern for (...)
Join Alchemer thought leaders for a NEW type of webinar series: The Business of Feedback.
In our first episode, Bo Bandy (CMO) and Ryan Tamminga (SVP, Product and Services) discuss the current state of CX and their 2025 predictions.
Topics include: (...)
In Artificial Intelligence (AI) and Machine Learning (ML) applications, where data demands and processing speeds are continually increasing, ensuring robust signal integrity in PCI Express® (PCIe®) channels is critical. This PCI-SIG® webinar will provide a comprehensive look at the signal (...)
Join us for How to achieve business transformation with GenAI using Strategic Portfolio Management, where ServiceNow experts and our special guest James Ramsay, Product Management Director, ServiceNow, will discuss proven strategies for effectively planning and executing your GenAI strategy. You’ll (...)
Join storage technology leaders from NVIDIA and Cloudian for an in-depth look at breakthrough technology that's transforming AI infrastructure.
Learn how GPUDirect for Object Storage eliminates traditional storage bottlenecks, enabling direct data access from GPU to exabyte-scale data lakes.
In this 35-minute (...)
Digital transformation goals significantly impact network infrastructure needs for enterprise organizations, creating challenges across all IT domains and increasing pressure on IT operations. ESG research shows that 82% of organizations believe their network environments have become more complex over the (...)
Far too many CX leaders view customer service as an either/or decision when it comes to AI—either fully automate with virtual agents or rely entirely on live agents. But in reality, AI shines best with a “both/and” approach, blending human (...)
Year over year data loss and downtime events like these continue to be I.T.’s worst nightmare. But fear not! Zerto is here to save you from the darkest days in the data center.
From ghostly outages to data-haunting ransomware, these DR (...)
An essential session for leaders and practitioners, this 30-minute session provides a comprehensive overview of the current security landscape, examining macro influences on organizations and Security Operations Center (SOC) teams.
The session explores the dynamic forces at play, from emerging threat (...)
An essential session for leaders and practitioners, this 30-minute session provides a comprehensive overview of the current security landscape, examining macro influences on organizations and Security Operations Center (SOC) teams.
The session explores the dynamic forces at play, from emerging threat (...)
Embark on a journey to fortify your API defenses as we delve into the realm of shadow APIs—a silent threat to the digital ecosystem. With the surge in AI-powered applications, the reliance on APIs has skyrocketed, bringing API security to (...)
As with all things tech, software development has been in a constant state of evolution since its infancy. Generative AI, however, has the potential to disrupt software development as we know it.
There are significant benefits offered by generative AI, but (...)
Join us for an informative, members-only webinar where TIA's Government Affairs team will discuss how the new administration could reshape the future of our industry. We will delve into the effects of the Republican majority in Congress, the expected incoming (...)
DevOps orchestration is the process of automating and coordinating multiple tasks to streamline the DevOps workflow. It can help to reduce production issues, speed up time to market, and improve the efficiency of automation tools.
Ensuring the seamless deployment of new (...)
Many organizations think digital transformation is about adopting new technologies, but the real roadblock is fragmented data. In this 10-minute webinar, we'll expose the big lie about digital transformation and reveal why integration is the missing link. Learn how connecting (...)
Descubre cómo Salesforce Sales Cloud transforma la gestión de ventas. Este webinar te mostrará cómo automatizar procesos de ventas, administrar leads y pronosticar con precisión el cierre de oportunidades. Aprenderás a empoderar a tu equipo de ventas con datos en (...)
In large companies, the sheer volume of information resources makes their attack surface significantly larger, compared to smaller businesses. Numerous factors contribute to this exposure, including networks spread across various locations that are consolidated into a single infrastructure, mergers and (...)
Building on our previous discussion on data backup and disaster recovery, this webinar takes a step further to address another critical component of your data security strategy: user credential protection. With cyber threats on the rise, ensuring the security of (...)
In an era defined by rapid technological change, ensuring the optimal performance and reliability of your Storage Area Network (SAN) is paramount. This webinar offers an in-depth exploration of the comprehensive SAN health checkup process, crucial for maintaining robust and (...)
In today’s complex digital landscape, organizations need more than just robust networking and security—they need simplicity, integration, and resilience. Enter VersaONE™, the industry’s first Universal SASE Platform, designed to unify networking, security, and observability across WAN, LAN, data centers, and (...)
During this training, we'll review how to navigate the different features of Kintone as an End User. This includes running through Portal Home, interacting with the People Feature, using Spaces, and reviewing/adding data in an App.
In today's "always on" era, digital trust is the backbone of our connected world. From remote work to smart devices, every interaction relies on a complex system of trust. At the heart of this system lies a powerful force known (...)
Smart adoption and implementation of new technologies hinge on your ability to communicate effectively with decision makers. You need to first understand their unique mindset, and then present bottom-line data and recommendations in their “language.” In this interactive workshop, you’ll (...)
As part of the Kaspersky Security Bulletin 2024, this webinar delves into the risks posed by supply chain weaknesses and global IT disruptions. Hear from top Kaspersky security experts as they reflect on publicly known significant outages and supply chain (...)
In today's "always on" era, digital trust is the backbone of our connected world. From remote work to smart devices, every interaction relies on a complex system of trust. At the heart of this system lies a powerful force known (...)
As with any piece of enterprise software, choosing and buying a PAM solution is a fraction of the battle. Many installations fail or never get rolled out fully due to deployment complications and competing priorities. In this webinar, we will (...)
This keynote panel from STRONGER 2024 delved into the essential components and best practices for building and maintaining a comprehensive cyber risk management program. It explored the critical elements of program development, including risk quantification, integrating automation, and ensuring program (...)
This is a great training for anyone who will be a Kintone Administrator because we’ll go through the highlights of each of our admin sections. This will give you a good base as you start to set up Kintone for (...)
The surge in sophisticated cyber threats, ransomware attacks on critical infrastructure, and the increasing impact of AI and machine learning on cybersecurity have made the attack surface more volatile than ever.
Join us for Rapid7's annual security predictions webinar. Our (...)
In-vehicle deployments, advanced technologies for critical communications, and advanced IoT applications like AI demand peak network performance and scalability. To meet these growing needs, Ericsson is introducing a new solution: the Ericsson Cradlepoint R980, a 5G router delivering higher performance (...)
We look forward to sharing the preview details about Arcserve 10000 Series Appliances, which will be generally available in Q1 2025!
Join our Chief Product Officer, Michael Lin, to explore the updated Arcserve Appliances. This all-in-one data protection solution (...)
The acquisition of desktop and application virtualization leaders Citrix and VMware has brought significant changes, including adjustments to their GTM strategies, licensing models, and support infrastructure. These changes have resulted in customers spending considerably more on licenses and experiencing delays (...)
The surge in sophisticated cyber threats, ransomware attacks on critical infrastructure, and the increasing impact of AI and machine learning on cybersecurity have made the attack surface more volatile than ever.
Join us for Rapid7's annual security predictions webinar. Our (...)
Fulfilling the promise of AI-powered Security Operations to keep up with evolving Cybersecurity threats and regulatory requirements while accelerating threat detection and response is still a challenge. Join us on this journey to turn AI-powered Security Operations into a reality, (...)
Join us for an insightful webinar on how Artificial Intelligence (AI) is revolutionizing customer experiences and help e-visitors to find their perfect products on your eCommerce with Tweakwise!
In this session, Xavier Places, Marketing Director and Ronald Meeuwissen, Tweakwise Business Development, (...)
In-vehicle deployments, advanced technologies for critical communications, and advanced IoT applications like AI demand peak network performance and scalability. To meet these growing needs, Ericsson is introducing a new solution: the Ericsson Cradlepoint R980, a 5G router delivering higher performance (...)
We sat down with Matt Cross, CIO at Places for People, to talk about the innovative ways that data is being used across the built environment industry, and how the advancements in data analytics, and AI can drive more efficient (...)
Join us for an exclusive webinar as we present the latest major update to ETSI TeraFlowSDN, which acts as a Network Automation and Security Framework that is redefining the future of network management. This release introduces groundbreaking features that integrate (...)
As Kubernetes dominates container orchestration, its complexity and resource demands drive interest in lighter alternatives. This talk explores k0s, a CNCF-compliant Kubernetes distribution celebrated for its lightweight, easy-to-maintain design. We will examine k0s's architecture, emphasizing its minimal dependencies and simplified (...)
Join Jordan & Philip from Reward Gateway, alongside Matthias from Bugcrowd, as they answer your questions on the impact of Pen Testing as a Service (PTaaS) on company security.
From understanding the enormous benefits of PTaaS to exploring the best (...)
In today's dynamic business landscape, the seamless collaboration and sharing of sensitive content are paramount, necessitating robust measures to safeguard against unauthorized access and ensure compliance with data protection regulations.
Discover how Thales CCKM and M365 DKE encryption solutions facilitate a (...)
In today's fast-paced digital world, downtime can mean lost revenue, damaged reputation, and compromised customer satisfaction. That's why rapid data recovery is more important than ever.
You’ll learn how to
• Minimize downtime and maximize profits: Discover strategies for quickly restoring your (...)
Learn how to kick your surveys up a notch!
Enhance your surveys using logic, actions, style, and testing. These components help reduce survey fatigue for respondents and improve data accuracy and response rates for survey builders.
Reserve your seat for this (...)
Ransomware has quickly become one of the most severe threats to the financial sector, with attacks skyrocketing by 70% over the past year. Unlike typical cyber incidents, today’s ransomware assaults are multi-staged and highly targeted, designed to not only disrupt (...)
We look forward to sharing the preview details about Arcserve 10000 Series Appliances, which will be generally available in Q1 2025!
Join our Chief Product Officer, Michael Lin, to explore the updated Arcserve Appliances. This all-in-one data protection solution (...)
Cyber threats are constantly evolving. Learn how to stay ahead of them in 2025 with security expert Andrew Kopcienski.
Join this deep-dive session based on the Cybersecurity Forecast 2025 report, where Andrew will cover key trends and insights to help strengthen (...)
Cyber threats are constantly evolving. Learn how to stay ahead of them in 2025 with security expert Andrew Kopcienski.
Join this deep-dive session based on the Cybersecurity Forecast 2025 report, where Andrew will cover key trends and insights to help strengthen (...)
Join is in the final episode of the year as Ramesh Dontha and guests deep dive into the key trends in AI from 2024, and what to expect as we move into 2025.
The surge in sophisticated cyber threats, ransomware attacks on critical infrastructure, and the increasing impact of AI and machine learning on cybersecurity have made the attack surface more volatile than ever.
Join us for Rapid7's annual security predictions webinar. Our (...)
With Your FinServ Tech Oracles:
• Johna Till Johnson, Nemertes CEO + Founder & Content Committee Chair for the Wall St. Technology Association (WSTA)
• Jerald Murphy, Nemertes Senior VP of Research + Consulting
FinServ Tech Oracles – a weekly video series for (...)
Financial institutions are navigating a rapidly evolving landscape, with dynamic computing and technological innovations transforming the industry. However, as opportunities expand, so do the risks. Many financial services IT leaders are facing significant challenges in maintaining visibility into their IT (...)
Securing your business from cyber threats is more critical than ever, as traditional approaches are falling short and leaving organizations vulnerable.
Join us for this Fireside Chat: Cyber Security & Resilience in the World of AI to explore how (...)
Organizations modernizing applications in the cloud find themselves drowning in vulnerabilities and security alerts. With too much noise and not enough time, teams need a better way to prioritize and address real risks to stay ahead of threats.
Join Sysdig for (...)
What happened with personalization in 2024 and what do you need to be aware of in terms of the industry landscape for 2025? We will look at the current trends and assess the impact that AI and other technology advances (...)
In-vehicle deployments, advanced technologies for critical communications, and advanced IoT applications like AI demand peak network performance and scalability. To meet these growing needs, Ericsson is introducing a new solution: the Ericsson Cradlepoint R980, a 5G router delivering higher performance (...)
The pressures on IT operations are only growing. Enterprise Strategy Group research reveals that 96% of enterprise organizations have seen demands to work at least 25% faster over the past three years, and 54% have seen demands to work at (...)
As phishing attacks grow more advanced, even major tech companies have suffered losses exceeding $100 million from sophisticated email scams. With these threats evolving, messaging and collaboration tools are becoming particularly vulnerable, demanding enhanced, AI-driven protection to stay secure. In (...)
As phishing attacks grow more advanced, even major tech companies have suffered losses exceeding $100 million from sophisticated email scams. With these threats evolving, messaging and collaboration tools are becoming particularly vulnerable, demanding enhanced, AI-driven protection to stay secure. In (...)
Explore how Cribl and Gigamon's Application Metadata Insight (AMI) can enhance network security and compliance in today's public sector environments.
In today's complex public sector environments, ensuring network security and compliance is paramount. Application Metadata Insight (AMI) offer a (...)
Open source software is at the heart of modern development, but it comes with its own set of challenges. The number of discovered vulnerabilities continues to rise year after year. Staying ahead in this evolving landscape requires not only vigilance (...)
Learn how to kick your surveys up a notch!
Enhance your surveys using logic, actions, style, and testing. These components help reduce survey fatigue for respondents and improve data accuracy and response rates for survey builders.
Reserve your seat for this (...)
2024 is a wrap, but it’s not too late to get the latest insights on how threat actors continue weaponizing DNS. Join us for an exclusive webinar that reviews the 2024 DNS threat landscape and newly discovered actors. Hear from (...)
Learn how to kick your surveys up a notch!
Enhance your surveys using logic, actions, style, and testing. These components help reduce survey fatigue for respondents and improve data accuracy and response rates for survey builders.
Reserve your seat for this (...)
In today's digital landscape, securing cloud environments is essential to safeguarding enterprise operations. This event is tailored for IT professionals and decision-makers dedicated to fortifying their organization's cloud infrastructure.
Participants will dive into cutting-edge strategies and technologies for cloud security, covering (...)
2024 is a wrap, but it’s not too late to get the latest insights on how threat actors continue weaponizing DNS. Join us for an exclusive webinar that reviews the 2024 DNS threat landscape and newly discovered actors. Hear from (...)
Find out how to unlock the full potential of your data in this deep dive into building and managing scalable, efficient, and environmentally sustainable data lakes. This webinar explores how organizations can tackle the growing demands of data-intensive workloads and (...)
Ever wondered what a vulnerability like regreSSHion could do to your business? It would cripple your company like it did to almost 16,400 organizations worldwide.
If left unpatched, it could allow attackers to gain full access to critical servers, network (...)
Data monetization offers a powerful opportunity to create new revenue streams, enhance your product offerings, and stay ahead of the competition. By leveraging cutting-edge AI and machine learning technologies — like predictive analytics and generative AI — you can unlock (...)
In this webinar, Doug Madory, Kentik's Director of Internet Analysis, will recap 2024, covering the evolving state of BGP security and RPKI ROV adoption, his collaborations with WIRED magazine and The New York Times in their coverage of major submarine (...)
AI is transforming every industry – are you ready? Join us for an insightful session with Amit Rawlani, Senior Director of Technology Alliances, and Neil Stobart, CTO, to explore how building a scalable, cost-effective DataLake with Cloudian can empower your (...)
In today’s rapidly evolving digital landscape, businesses face a myriad of cyber threats that are becoming increasingly sophisticated and pervasive. To stay ahead, organizations must adopt advanced security measures that go beyond traditional defenses. Join us for an exclusive webinar (...)
We like to think positively at ServiceNow®, but here's the reality: worst-case scenarios and unplanned outages can happen! That's why we prioritize business continuity and disaster recovery to not only survive but thrive. In this session, take a deep dive (...)
As the industry power demand grows, IT operators must focus on both IT infrastructure power demand and supply. A portion of the required power growth can be eliminated through better utilization of existing and new IT infrastructure and software that (...)
As of October 1, 2024, Black Duck has taken flight as an independent company. The Black Duck team is extremely excited to not only take flight but to soar along with our customers. We understand that questions arise from change, (...)
It's time to start thinking about your New Year resolutions! After all, 2024 is almost gone and 2025 is just ahead. So, how about striving to achieve the best network performance possible? During this year-end webcast from NetAlly we will (...)
In this episode of the ServiceNow Enterprise Agility Podcast, host Fred Champlain, ServiceNow Agile Evangelist, talks with Richard Knaster, a SAFe Fellow and author of The Lean Agile Way, about AI’s transformative impact on business agility. Richard highlights AI’s rapid (...)
Discover how Customer Data Platforms (CDPs) are transforming the retail landscape by unifying customer data, enabling personalized experiences, and enhancing engagement across digital and physical channels. This session will cover major retail trends, practical CDP applications, and the power of (...)
Join F5 and GigaOm for an insightful webinar that explores the complexities of application migrations in the cloud. As cloud transformation initiatives reshape enterprise technology strategies, organizations face various increasing challenges in ensuring their applications are secure, resilient, and portable (...)
In the last episode of the year, Diana Kelley and guests will discuss the trends we've seen over the last 12 months, the news stories that dominated our screens - and security strategies - and what learnings we should take (...)
Join us for an insightful webinar covering the new Red Hat Ansible Automation Platform Service on AWS and the win for Red Hat Partners. Red Hat Ansible Automation Platform as a managed service is available on the AWS Marketplace. We (...)
In today's dynamic business landscape, organizations need to be agile and responsive to changing demands. A robust VDI solution can be a game-changer, enabling you to empower your workforce and optimize your IT infrastructure.
In this webinar on HPE Solutions (...)
Every security organization owns a suite of solutions composed of tools covering endpoints, applications, cloud, and network hardware. While these tools deliver the functionality promised, threats are still getting through – so we know more work needs to be done. (...)
This is a Identity professionals have traditionally focused on compliance and governance activities, while leaving Security Operations to the Cybersecurity team to monitor the endpoint (EDR) and network (NDR), potentially missing Identity Threats. Cloud adoption has made identity a primary target (...)
2024 is a wrap, but it’s not too late to get the latest insights on how threat actors continue weaponizing DNS. Join us for an exclusive webinar that reviews the 2024 DNS threat landscape and newly discovered actors. Hear from (...)
According to recent research, a staggering 60% of breaches happen because of vulnerabilities that go unpatched—even when a fix is available. As the volume of vulnerabilities increases, capacity to address them hasn’t kept up, security teams are often overwhelmed and (...)
Join this session of the Supermicro Open Storage Summit where we take a look at the decision-making process between scaling up and scaling out storage architectures. Featuring industry leaders from Supermicro, Intel, OSNexus, Seagate, KIOXIA, and Graid Technology, you'll learn (...)
Join us for a 30-minute chat with Bill Raymond about his upcoming AI Power Prompting Workshop. This hands-on, virtual course will break down multimodal prompting and teach you the basics you need to start using generative AI effectively. During this (...)
Join us for a candid conversation with Mario Duarte, former CISO at Snowflake and now the CISO of Aembit. Mario is now focused on one of cybersecurity’s toughest and most overlooked challenges: securing non-human identities (NHIs) across applications, services, and (...)
This is a great training for anyone who will be a Kintone App Builder because we’ll go through building an app and a few features to set up to prepare it for use. This will give you a good base (...)
The sheer number of ‘things’ added to the Internet of Things (IoT) continues to skyrocket, bringing with it an unbelievable proliferation of unprotected devices on business networks, devices that need protection. With SonicWall’s latest firewall offerings you can be the (...)
Not only do cybercriminals make money by committing cybercrime, but they also expand their operations by offering services to individuals without strong technical skills in malware development. This business model is known as Malware-as-a-Service (MaaS), and it operates on various (...)
Transform Your Airline’s Network and Security
Learn more on how Aryaka’s Unified SASE, in partnership with Deutsche Telekom, can streamline your network, eliminate outdated complexities, and accelerate your business.
Register Now (Call to action button)
Legacy networks often result in multiple vendor issues, (...)
APIs have become central to the daily operations of most businesses. Their rapid proliferation has exposed significant vulnerabilities that need immediate attention. This presentation provides an in-depth assessment of the current state of API security. We discuss the growth of (...)
The PRI invites signatories to join drop-in and feedback sessions to learn more about the future of its emerging and expanding stewardship initiative – the Collaborative Sovereign Engagement on Climate Change.
This initiative was launched as a proof-of-concept pilot in (...)
À l'ère actuelle, où tout est interconnecté, la confiance numérique est le pilier dans notre monde cyber. Du travail à distance aux objets intelligents, chaque interaction repose sur un système de confiance complexe. Au cœur de ce système se trouve (...)
3...2...1... Schützen Sie Ihre Daten und Ihr Unternehmen vor den Folgen von Ransomware und Cyberangriffen!
Die EU hat NIS-2 eingeführt, eine neue Richtlinie zur Verbesserung der Cybersicherheit in ganz Europa. NIS-2 erweitert die ursprüngliche NIS-Richtlinie und führt strengere Anforderungen für (...)
En una era hiperconectada la confianza digital es la columna vertebral de nuestro mundo. Desde el trabajo remoto hasta los dispositivos inteligentes, cada interacción se basa en un sistema de confianza complejo. En el centro de este sistema se encuentra (...)
Today’s highly evolved, AI-enhanced cyberthreat landscape demands powerful new strategies for threat detection and response. But how do you decide which of many options is optimal for your organisation?
Join this webinar and get the whole story about the varieties of (...)
Cyber threats are constantly evolving. Learn how to stay ahead of them in 2025 with security expert Jamie Collier.
Join this deep-dive session based on the Cybersecurity Forecast 2025 report, where we will cover key trends and insights to help strengthen (...)
As far as the Cybersecurity and Infrastructure Security Agency (CISA) is concerned, there are six types of SBOMs that can be created for a single application or piece of software; neither of which will be identical. While CISA doesn’t have (...)
Malicious bots have become so sophisticated, they can now mimic human behaviors and easily evade conventional application security solutions. The weaponization of bots has become a major threat to websites, APIs, and mobile applications with risks that include:
-Account take over (...)
MS Visio is a very capable diagramming tool, though with more understanding and skill you can increase the benefits to users for their diagramming needs. In the last of the 2024 webinar series Callum will show in-house and customer developed (...)
The holiday season brings plenty of cheer, but for cybercriminals, it’s the perfect time to strike. As businesses deck the halls and customers flock online, now is the time to strengthen your defenses. Join us as we uncover the cybersecurity (...)
As we close out 2024, a year marked by unprecedented change and disruption across the world, the question arises: are we set to see more disruption in 2025?
With increasing potential for sophisticated AI cyber-attacks, escalating geopolitical unrest, and the tech (...)
Join us for an enlightening webinar on how DDI (DNS DHCP IPAM) serves as a foundational element of Infrastructure as Code (IaC), propelling network teams towards accelerated multi-cloud transformation and enhanced agility in their automation endeavors.
In this webinar, you (...)
Join our experts for insights into the latest trends with SD-WAN, what’s behind the new wave of growth and where the opportunities and pitfalls are for enterprises navigating this dynamic landscape. Real-world use cases deliver a glimpse into how other (...)
The PRI invites signatories to join drop-in and feedback sessions to learn more about the future of its emerging and expanding stewardship initiative – the Collaborative Sovereign Engagement on Climate Change.
This initiative was launched as a proof-of-concept pilot in 2022 (...)
LIVE WEBINAR + DEMO
Threats from within are the most difficult to identify without the right telemetry and analytics. Small and specialized Insider Threat teams are wasting limited resources chasing false positives, piecemealing strong cases of evidence and manually deriving context (...)
This webinar serves as a short introduction to our newest product, Alchemer Workflow.
Join host Jeannie Zaemes, Director of Growth Marketing, as she welcomes our two guests, Vanessa Bagnato, Director of Product Marketing and Alli Milne, Manager of Product Content (...)
IBM Consulting and Thales join forces to outline the challenges presented by PCI DSS 4.0 and how can organizations achieve compliance in order to meet the upcoming deadline of March 2025. IBM Consulting, a Qualified Security Assessor, will outline the (...)
The quality of your content is the most important factor in how well your artificial intelligence (AI) system performs. The phrase “Garbage in, garbage out” has never been more relevant. Many organizations have years—even decades—of content that may be outdated, (...)
81% of security leaders call staying ahead of threat actors “a constant battle with an unsustainable cost.” We need to rethink how to meet security objectives, and with the chronic talent shortage, that includes activating the endless skill sets and (...)
AI coding tools are helping developers write code faster. Delivery platforms are making planning and releasing teams more efficient. But all that code still must be secured, and all features still must be tested. Security and testing teams need help (...)
Join us for a special installment of the DDS Foundation webinar series, presented by ExxonMobil. This session is designed for professionals in industrial automation, IT infrastructure, and systems architecture who are interested in enhancing the reliability and operational efficiency of (...)
Five of the top 10 MITRE ATT&CK® techniques observed from July 2023 to June 2024 were identity-based. As identity-based attacks become a critical threat in cloud environments, mastering an identity-centric security strategy is imperative.
Join us and Kevin Tsuei, SVP Information (...)
See how Rob Nolan, CISO at Expeditors, built the company's cyber risk management strategy in this session from STRONGER 2024. Rob discussed his challenges and successes while building a comprehensive cyber risk program. He dove into the critical role of (...)
Sometimes just having a SOC isn’t enough to address insider threat issues. Security operations teams are managing massive amounts of data across billions of events from on premises to the cloud. Looking for specific needles like insider threats in this (...)
Join us for the webinar Unleashing Scalable AI Inference with Wallaroo: Transforming Industries for Intel Architecture, where we explore how Wallaroo.AI, a universal AI inference platform, is enabling businesses to accelerate AI adoption across diverse sectors. Built for efficiency, performance, (...)
Cloud has changed the way we develop, deploy, and scale apps. Traditional perimeter and end-point security does not address the distributed and ephemeral nature of cloud and has huge blind spots for adversaries to go undetected. Active cloud risk is (...)
Please join the Qualys research and product teams for the “This Month in Vulnerabilities and Patches” webinar on December 12, 2024.
We will discuss this month's high-impact vulnerabilities, including those that are part of January 2023 Patch Tuesday. We will walk (...)
Please join the Qualys research and product teams for the “This Month in Vulnerabilities and Patches” webinar on December 12, 2024.
We will discuss this month's high-impact vulnerabilities, including those that are part of January 2023 Patch Tuesday. We will walk (...)
Learn about the insights, accomplishments, lessons learned, and future ambitions from DeVry University’s 3-year journey with SAP LeanIX. Since 2021, DeVry has used SAP LeanIX as an effective catalyst to achieve vastly improved understanding and intelligence about all the (...)
Balancing rapid software releases with stringent compliance requirements is a challenge that many organizations face. Compliance and DevOps teams often have competing priorities, leading to bottlenecks, delays, and frustration. But it doesn’t have to be this way.
Join Drata and AWS (...)
In this episode of “Shift + ALT + Disrupt”: Wes Withrow drops in for a conversation about Zero Trust Architecture and Cybersecurity. We are going to talk about what is working for government agencies in terms of cybersecurity and where (...)
The cybersecurity landscape is evolving rapidly, and 2025 is set to bring unprecedented challenges. From advanced threats to shifting technological and political landscapes, staying ahead has never been more critical.
Join our leading security experts, David Holmes and Terry Ray, as (...)
Stay ahead of the curve in data protection. Arcserve UDP 10 is designed to empower your resilience strategy, and we're excited to showcase its benefits in our live webinar. Join Stacey Budd to get exclusive insights into how UDP 10 (...)
2024 has seen a whirlwind of change ranging from political shakeups and the global uncertainty they bring to a growth in data breaches and cyberattacks targeting industries and impacting critical infrastructure. We’ve seen a dramatic increase in phishing attacks that (...)
Many Contact Center Center professionals are unfamiliar with the key performance indicators (KPIs) that are important to track and trend and even fewer are aware of what constitutes acceptable performance. In this webcast, Jeff Rumburg will share the results of (...)
AI apps are the most modern of modern apps, and we know how to protect apps and APIs.
Mission accomplished, right?
Hold on to your GPTs and prepare to dive into the weeds as we unpack what AI security truly means.
Watch this (...)
Securing software takes teamwork—a unified approach from development through testing and into production. But each team has a distinct set of requirements and workflows that need to align to realize a concerted push for security. And while developers influence risk (...)
Whether you have already deployed Microsoft Sentinel or are considering a migration in the near future, there are many questions and challenges that security teams face around scale, data management, and cost optimization to both deploy and continue a successful (...)
AI Ethics has sprung up in discourse like a rabid whackamole. But what does it mean? And how do we align ethics with responsible AI adoption? What do we say to the cool kids who want to play with the (...)
CNAPPs have brought unprecedented visibility into cloud identity and permissions risks, but visibility alone doesn't solve the problem. Thousands of findings (like unused identities, over-permissioned accounts, and lateral movement risks) have been prioritized, but we’re still asking devs to fix (...)
This is a great training for anyone who will be a Kintone App Builder because we’ll go through how to set up permissions for apps. After this training, you'll have all you need to be able to determine how your (...)
As the digital landscape continues to evolve, so do the threats that organizations face. We cordially invite you to our upcoming webinar, where we will delve into the dynamic world of cybersecurity and explore strategies to defend against the ever-changing (...)
In the evolving landscape of cybersecurity, integrating AI tools such as Microsoft Copilot and ChatGPT offers promising enhancements for cyber risk management and compliance. This discussion from STRONGER 2024, featuring Dr. Fortune Onwuzuruike, provided an in-depth discussion on the strategic (...)
Navigating the DoD Framework, Leveraging Cloud Tools, and Overcoming Budget Challenges
The goal of achieving Zero Trust remains a top priority for government agencies, but the realities of operationalizing Zero Trust pose unique challenges to every agency and project. In (...)
This training is perfect for Kintone App Builders because we’ll go through how to set up views and graphs within an app. After this training, you'll have all you need to display your data to your team.
During this session, (...)
Découvrez comment Rapid7 peut unifier votre surface d'attaque pour anticiper les menaces et gérer les risques dans vos environnements hybrides.
Avec l'expansion de votre surface d'attaque, disposer d'une vue fiable de l'ensemble de votre environnement et être en mesure de cibler (...)
Learn more about groundbreaking SASE innovations, enhancing both security and simplicity. Our experts will present live demonstrations, providing you with a firsthand look at how these cutting-edge technologies work in real-world scenarios. Discover how these advancements not only simplify deployment (...)
How are you protecting your Microsoft 365 and Entra ID data from ransomware, deletion, encryption, and other incidents?
Don’t miss this information-packed webinar with the latest best practices, innovations, and insights to help recover your critical business data quickly and completely.
See (...)
Découvrez comment optimiser vos processus, et améliorer vos performances !
Les ETI ont tout à gagner à déployer leur transformation digitale, mais comment s'y prendre sans se perdre dans les méandres des solutions complexes et coûteuses ?
Découvrez comment Batisanté, avec l'aide (...)
Kaspersky’s Global Research and Analysis Team is constantly monitoring known and emerging cyberthreats targeting the financial industry, including banks and fintech companies. We will review the key events that occurred in 2024 in the financial cyberthreat landscape and then predict (...)
Every day there are new CISA alerts warning us of the latest cyber threat activity.
But how do we know if we are exposed to these new threats?
How confident are we that our cybersecurity defenses could withstand these (...)
Faced with several challenges over the past year, several users are looking for a load balancing replacement for Citrix NetScaler. Learn why G2 category leader, Progress Kemp LoadMaster is your best alternative.
During this webinar, we will cover:
- An introduction to (...)
Red team exercises have long been used to test the effectiveness of cybersecurity defenses. Join this technical webinar to learn how advanced red team technology is now being incorporated into cloud security products, and how to smartly combine new virtual (...)
We’re thrilled to announce Alchemer Pulse: AI text analysis that instantly turns noisy text feedback into signals you can act on.
Here’s the problem we’re solving:
Open text feedback is full of valuable insights. But the sorting, tagging, and analysis (...)
Enhance your threat hunting skills with a hands-on session led by a Google Threat Intelligence researcher and a seasoned hunting expert. Learn how to leverage Google Threat Intelligence to generate leads, threat model scenarios, develop hypotheses, and hunt missions.
Join (...)
With Your FinServ Tech Oracles:
• Johna Till Johnson, Nemertes CEO + Founder & Content Committee Chair for the Wall St. Technology Association (WSTA)
• Jerald Murphy, Nemertes Senior VP of Research + Consulting
FinServ Tech Oracles – a weekly video series for (...)
Endpoints are subject to increasingly frequent and sophisticated attacks. Governments across the globe have responded to growing cybersecurity risks with new legislation to combat the modern threat landscape. As businesses look to scale and move to the cloud, the growing (...)
This session explored the critical lessons learned from safeguarding New York City's vast infrastructure and services against evolving cyber threats. Gain a deep understanding of effective cyber risk management strategies, including risk assessment, incident response, and resilience building, with learnings (...)
Register today for insights into:
- SAFe® in the Government space
- Common Challenges for Agile organizations, including the public sector
- How Rally can easily bridge strategy to execution across the organization
- See Rally live in action and how it can help (...)
Today's enterprises face complex regulatory compliance challenges. Many enterprises struggle to stay audit ready. They lack the tools necessary to maintain continuous compliance, to produce detailed reports, and to reduce compliance risk.
These challenges are driving many customers to make the (...)
Tealium's product leaders will unveil our strategic vision and key product updates.
Tealium Speakers:
- Jennifer Artabane, VP of Enterprise Products
- Jay Calavas, VP of Vertical Products
- Matt Parisi, Director of Product Marketing
As multi-cloud adoption rises, organizations increasingly face challenges managing disparate systems across hybrid, multi-cloud networks. This trend complicates the management of critical network services like DNS, DHCP, and IP address management (DDI), as organizations must manage separate DDI services for (...)
We’re thrilled to announce Alchemer Pulse: AI text analysis that instantly turns noisy text feedback into signals you can act on.
Here’s the problem we’re solving:
Open text feedback is full of valuable insights. But the sorting, tagging, and analysis (...)
Join us to explore how Ansible Automation Platform (AAP) can streamline Cisco network management for more efficient and secure operations. As networks expand, manual configuration becomes increasingly complex and error-prone, impacting productivity and consistency. This session will demonstrate how AAP's (...)
We’re thrilled to announce Alchemer Pulse: AI text analysis that instantly turns noisy text feedback into signals you can act on.
Here’s the problem we’re solving:
Open text feedback is full of valuable insights. But the sorting, tagging, and analysis (...)
As multi-cloud adoption rises, organizations increasingly face challenges managing disparate systems across hybrid, multi-cloud networks. This trend complicates the management of critical network services like DNS, DHCP, and IP address management (DDI), as organizations must manage separate DDI services for (...)
Beneath the surface of the digital landscape, a growing threat is hiding in plain sight. In this revealing session, the Sysdig Threat Research Team will unmask the insidious world of ELF malware and its role in powering DDoS-as-a-Service botnets. Sysdig (...)
Next-Gen SIEM Foundation Series: This is not your legacy SIEM that failed to deliver on the promises of yesteryear. This is the new way to SIEM, built on a unified security analytics platform. In this Democast Series, we cover the (...)
Join us — the Verizon Threat Research Advisory Center – for this month's critical threat intelligence briefing featuring a guest speaker. Prepare to delve into the sophisticated evolution of the information security risk intelligence. Our session will spotlight the (...)
In this Small Bytes, learn how to identify if your end users are impacted by larger internet outages quickly and accurately. Outages happen, but unless your users are impacted triaging outages can lead to wasted resources. With more reliance on (...)
Organizations can cultivate trust and foster innovation by implementing the right level of AI governance that is crucial for guiding the responsible development, deployment, and use of AI technologies. See a demo on how IRM can help businesses put effective (...)
Just as most software assets contain open source, modern software applications commonly include third party software functionality via calls to external web services via APIs. By using web services, developers may be inadvertently signing their companies up to terms of (...)
In this episode of the ServiceNow Enterprise Agility Podcast, host Fred Champlain and Richard Knaster continue their conversation on the pressures and opportunities that GenAI and agentic AI bring to enterprises. Organizations face challenges in managing vast data and must (...)
Ready to transform dreaded conversations into productive outcomes? This impactful session will give you practical tools to approach sensitive topics like feedback, performance evaluations, and conflict resolution with confidence and skill.
Through hands-on strategies for planning, preparation, and in-the-moment communication, you'll (...)
This presentation from STRONGER discussed practical tips for building predictive risk models using Python and open-source libraries. Professor Huwyler explored how these models can detect unusual activity and threats in real-time, providing valuable insights to enhance cybersecurity measures. The session (...)
DevOps must deliver business agility and high application performance together with strong application security. How can security and infrastructure teams work with DevOps to ensure network intelligence-derived security is incorporated directly into the software development process – without compromising speed (...)
As multi-cloud adoption rises, organizations increasingly face challenges managing disparate systems across hybrid, multi-cloud networks. This trend complicates the management of critical network services like DNS, DHCP, and IP address management (DDI), as organizations must manage separate DDI services for (...)
Join our webinar to learn how Gaudi 3 AI accelerators are designed for large-scale AI model inferencing and training.
We'll cover:
- Gaudi 3 overview
- How AI training and inferencing can benefit from Gaudi 3 performance
- The new Supermicro X14 AI (...)
Kubernetes pros, this one’s for you! In this Kubernetes Tech Talk Series session, we’re digging deeper into why K8s and containers are the backbone of secure, resilient cloud environments. Hosted by Ron Eddings from Hacker Valley Media, this session starts (...)
Join us for an exclusive webinar series where CrowdStrike's expert speakers reveal cutting-edge strategies to combat cross-domain attacks. Learn how to achieve unparalleled visibility and rapid response across your entire attack surface. Gain insider knowledge to stay ahead of evolving (...)
During this training, we'll review how to navigate the different features of Kintone as an End User. This includes running through Portal Home, interacting with the People Feature, using Spaces, and reviewing/adding data in an App.
Managing vulnerabilities shouldn’t feel like a juggling act. With the redesigned Qualys VMDR for ITSM integration with ServiceNow, we’ve made it easier than ever to bridge the gap between security and IT operations. Join us to see how this powerful (...)
This year’s DevSecOps report defines a vivid image of organizations’ journey to secure their software development pipelines. It provides intriguing conclusions about operational challenges, AppSec efficiency, and evolving risk exposure amid the rise of AI-assisted development. Did you know that (...)
In 2023, Kaspersky Managed Detection and Response (MDR) received more than 314,000 alerts worldwide. Kaspersky team processed these alerts and accumulated as anonymized customer cases to provide information about the current threat landscape. Sergey Soldatov, Head of Kaspersky Security Operations (...)
Explore key insights from the “2024 Vulnerability Snapshot” report, which is based on data from over 200,000 application security scans. This webinar will explore critical findings, such as the prevalence of injection vulnerabilities, and highlight evolving threat landscapes impacting organizations (...)
Transcending the Vendor Hype: How to Interpret Complex Data for Tailored Cybersecurity Solutions
Are you tired of reviewing complex MITRE ATT&CK Engenuity Enterprise Evaluations and vendor marketing materials, unsure of what’s real and what’s hype? You're not alone. The overwhelming use (...)
Compte tenu des énormes quantités de données qui doivent être stockées, les entreprises utilisent des ressources dans le cloud public et privé, en fonction de leur budget, de la fréquence d'accès aux données et de leurs exigences en matière de (...)
What is Apache Kafka® and how does it work?
Apache Kafka® was built with the vision to become the central nervous system that makes real-time data available to all the applications that need to use it, with numerous use cases like (...)
Cybercrime is a multi-billion-dollar industry and a significant threat to all organizations. The cost of damages and protection is immense and continues to grow. At this point, no organization is safe—everyone is a potential target, and ignoring these threats is (...)
“IT expands at such a rapid pace today that holding onto traditional on-premises solutions is like keeping a vintage car—nostalgic, yes, but it's probably not the most efficient way to get from point A to point B,” according to Sesh (...)
High-Fidelity Attacks can kill an entire organization. These attacks use vulnerabilities that are highly exploitable. Stopping high-fidelity attacks requires a proactive approach that focuses on identifying and remediating risks before attackers exploit them.
SanerNow’s preventive risk remediation platform enables enterprises (...)
Discover the critical role of structured data as Andrea Volpini, co-founder and CEO of WordLift, dives into the transformative role of semantic content in a post ChatGPT world. We'll chat with Volpini, a pioneer in the field of semantic content (...)
Human Resources is facing more challenges than ever before, often with less budget and less time to complete tasks. It's time for HR to re-think the employee lifecycle process.
Join a NEW webinar all about how HR improves the onboarding process, (...)
As digital transformation, the cyber landscape, and regulatory pressures continue to evolve rapidly, data security is emerging as a top priority for organizations seeking integrated platforms to meet their broader cybersecurity needs now and as part of their future strategy. (...)
Estamos viviendo un nuevo hito en la ciberseguridad europea: la entrada en vigor de la Ley de Ciberresiliencia el pasado 10 de diciembre de 2024 conlleva cambios significativos para las empresas que operan en la Unión Europea, por lo que necesitamos entender (...)
As remote work becomes the new norm, organizations are seeking scalable and secure solutions to empower their workforce. Join us on December 19th for an insightful webinar: Getting started with Secure Cloud: Azure, where we delve into the transformative benefits (...)
In the evolving world of Governance, Risk, and Compliance (GRC), organizations face growing challenges—expanding digital boundaries, data sprawl, manual processes, and a continuously shifting regulatory landscape. "Elevate Your GRC Game" brings together LevelBlue and OneTrust to showcase how automation can (...)
Join us for a live webinar on Compute Express Link (CXL) technology and its immediate impact on AI and ML applications. You'll discover how CXL is revolutionizing data center performance and efficiency.
We'll explore the current state of the CXL ecosystem, (...)
Today, artificial intelligence presents both unprecedented opportunities and unique challenges for security teams. Grab your coffee and join our webinar to explore the intersection of AI, compliance, and security.
On December 19th at 1:00 p.m. Eastern/10:00 a.m. Pacific, RegScale and (...)
Are you stuck manually juggling updates between Jira and ServiceNow, leading to delayed responses and misaligned teams? Discover how ConnectALL transforms the way you manage incidents by automating data flow between these critical tools. We’ll demo how ConnectALL provides seamless (...)
Enterprises have accumulated various identity security solutions that serve distinct purposes such as identity governance and administration (IGA) and Privileged Account Management (PAM). While well-intentioned, these siloed identity solutions can hinder operations, and visibility gaps across domains are likely to (...)
Securing your software supply chain requires that you analyze dependencies for risk, harden your development pipeline, and secure the artifacts that you deploy or ship to customers. Are you prepared for the four common attack vectors that bad actors exploit? (...)
Go beyond the headlines with N2K CyberWire's Rick Howard and his guests, Kim Jones and Steve Winterfeld, for a discussion on emerging industry trends, recent threats, and events in the last 90 days.
Bridge the gap between traditional vulnerability management and true risk-based prioritization with Qualys TruRisk. Enable security teams to communicate the real impact of cyber risks, helping the business make informed, strategic decisions. Empower your teams to go beyond metrics like CVSS and (...)
DevSecOps is all about incorporating security into every aspect of software development – without compromising productivity or speed. This doesn't just require developers to assume more security responsibilities but rather involves security teams’ participation in early-stage development. While many organizations (...)
In an ever-evolving threat landscape, staying informed is critical for every security team. Join us for an exclusive webinar as we reveal key findings from the 2024 Elastic Global Threat Report. Based on nearly 1 billion unique telemetry data points, (...)
El avance de la tecnología nos permite generar experiencias personalizadas y rápidas. Estas interacciones son clave para conquistar a los clientes, lo que hace que los Einstein Bots de Salesforce se conviertan en un aliado estratégico para las empresas.
Estos asistentes virtuales inteligentes no solo optimizan la atención al (...)
Join us for an insightful webinar on Versa Networks' cutting-edge Data Loss Prevention (DLP) solutions, designed to safeguard sensitive information across both network and endpoint environments. In this session, we will explore how Versa's unified SASE platform leverages AI/ML to (...)
This is a great training for anyone who will be a Kintone Administrator because we’ll go through the highlights of each of our admin sections. This will give you a good base as you start to set up Kintone for (...)
Aprende a diseñar flujos de campaña efectivos utilizando Journey Builder, la herramienta esencial para personalizar la experiencia del cliente y mejorar cada punto de contacto en tiempo real.Descubre casos de éxito que muestran la eficacia de la automatización de campañas (...)
Microsoft’s native and add-on email security capabilities help to protect against basic threats, but they aren’t enough to ensure full protection. Learn how a multi-layered human-centric security strategy can augment Microsoft 365 to defend against modern threats like business email (...)
Join us for an in-depth webinar that redefines how organizations approach threat detection in cybersecurity. Although detection remains the cornerstone of Security Operations Centers (SOCs), the absence of a formalized cybersecurity program often results in inefficiencies and missed opportunities for (...)
CX and feedback professionals face a mountain of challenges coming into the new year. We tackle 6 key CX challenges, giving tips and tricks to succeed where others will fail.
Join Christie Carlson (Director of Sales and Customer Success) and Ashley (...)
In an era of escalating cyber threats, the demand for skilled cyber security professionals has never been greater. This session offered a comprehensive exploration of the growing career opportunities in cyber security. Attendees gained valuable insights into cyber security organizations' (...)
Not knowing whether a performance bottleneck is caused by the network or the application itself often leads to a “blame game” among application, network, and cloud teams. This finger pointing can delay resolution and also stifle collaboration. Join us to (...)
As organizations venture deeper into using complex infrastructures, they are met with the challenge of how to effectively secure lateral movement across all environments.
Join Vectra AI and Gigamon to learn how the biggest dilemma lies in the removal of visibility (...)
This is a great training for anyone who will be a Kintone App Builder because we’ll go through building an app and a few features to set up to prepare it for use. This will give you a good base (...)
CX and feedback professionals face a mountain of challenges coming into the new year. We tackle 6 key CX challenges, giving tips and tricks to succeed where others will fail.
Join Christie Carlson (Director of Sales and Customer Success) and Ashley (...)
CX and feedback professionals face a mountain of challenges coming into the new year. We tackle 6 key CX challenges, giving tips and tricks to succeed where others will fail.
Join Christie Carlson (Director of Sales and Customer Success) and Ashley (...)
Join this webinar to get actionable information that will help you plan and develop your own security operations strategy and will guide you towards practically proven solutions. During the webinar, Roman Nazarov, Head of SOC Consulting at Kaspersky, will provide (...)
In February 2024, the NIST Cybersecurity Framework (CSF) 2.0 update was released, featuring the latest advancements. This update brings a host of transformative changes, expanding the framework's scope. It also provides stronger governance and supply chain risk management. There are (...)
Win/Loss analysis is critical for any sales organization — you need to understand why you won or lost a deal.
But how do you gather feedback to inform your win/loss analysis? How do you follow up with Closed-Won AND Closed-Lost deals?
Alchemer equips (...)
Legislation requiring stringent software security practices by software producers is being passed around the globe. This requires organizations to rethink their approach to software security, which industry standards they follow, and the best practices for their software development teams.
NIST has (...)
This is a great training for anyone who will be a Kintone App Builder because we’ll go through how to set up permissions for apps. After this training, you'll have all you need to be able to determine how your (...)
Modern cars employ a wide array of communication interfaces. Some, like Bluetooth and Wi-Fi, directly engage users, while others, such as RDS and GPS, provide user-facing services, and still others, like CAN and Ethernet buses, ensure the proper functioning of (...)
There are a number of ways your survey can go South. This webinar will detail WHY those survey disasters occur and HOW to avoid them in the future.
Alchemer thought leaders will discuss topics like sampling, logic, and email deliverability. They (...)
LevelBlue offers a suite of managed detection and response (MDR) services to help organizations protect against evolving threats. The services are powered by cutting-edge LevelBlue Labs threat intelligence, embedded AI, and extensive integrations with best-of-breed technologies. However, our true competitive (...)
It seems like AI is everywhere today. But what implications does using AI have when it comes to your billing processes?
Join this webinar to hear Nathan Shinn, BillingPlatform CSO, as he unveils a revolutionary feature – natural language reporting with (...)
This training is perfect for Kintone App Builders because we’ll go through how to set up views and graphs within an app. After this training, you'll have all you need to display your data to your team.
During this session, (...)
There are a number of ways your survey can go South. This webinar will detail WHY those survey disasters occur and HOW to avoid them in the future.
Alchemer thought leaders will discuss topics like sampling, logic, and email deliverability. They (...)
There are a number of ways your survey can go South. This webinar will detail WHY those survey disasters occur and HOW to avoid them in the future.
Alchemer thought leaders will discuss topics like sampling, logic, and email deliverability. They (...)
Medium-sized enterprises are facing a cyber threat landscape that’s very rapidly growing in sophistication and in the sheer number of attacks. Limited IT resources can be stretched to the breaking point simply responding to all the security incidents.
Fortunately, managed (...)
As the industrial landscape evolves, so do the threats that accompany it. While many industrial threats may be developing slowly from year to year, subtle changes are reaching a critical mass, poised to reshape the cybersecurity landscape in the near (...)
A scalable data protection solution doesn't have to feel like scaling a mountain. Veritas and Wasabi are introducing a new way to provision Backup Exec with Hot Cloud Storage so they’ll always have as much as they need—never more, never (...)
Unlocking Speed, Precision, and Efficiency in NDR
NDR is a critical component in most organizations’ cybersecurity tool stack, and ExtraHop is one of the leaders in the NDR market. The Gigamon Deep Observability Pipeline increases the speed and precision of (...)
Are rising costs and performance issues impacting your SAP ECC or S/4 HANA environment? Or are you seeking better visibility into SAP content to improve customer service and drive productivity?
Join Rocket Software’s experts for a focused session on leveraging Rocket (...)
Dan Schrader hosts a webinar on cloud network security featuring IDC's Phil Bues and Fortinet's Aidan Waldan.
IDC sees the cloud market evolving, with organizations at different stages of their cloud journey. Security is a top priority, with a focus on (...)
L'IA peut-elle transformer les équipes de service client en source de revenus ?
Le service client est en pleine évolution et son avenir est prometteur. Aujourd'hui, les clients exigent des interactions rapides, cohérentes et personnalisées dès qu'ils entrent en contact avec (...)
We look forward to sharing the details about Arcserve UDP 10, which will be generally available on December 3rd!
Join Pierre Henny to explore new UDP 10 features and functionality updates.
Register now to learn more about the latest UDP version!
What’s on (...)
Join us for our December TechTalk session where we will introduce the new SN655 and SN861 High capacity and gen5 SSDs, and the new E3.S, E1.S form factors.
Did you know sales professionals estimate they can save 4.5h a week thanks to generative AI?
While the benefits of Sales AI are clear, addressing the complexities of trust and adoption present significant challenges.
Need help navigating AI for sales? Watch this (...)
Moving your infrastructure to the cloud is primarily a business decision, or a choice made by IT managers who have decided to rationalise (not necessarily simplify) their infrastructure by moving to the cloud.
Some have chosen to do so by moving (...)
Understanding the current SAP landscape is the foundation of ERP transformation, as it reveals critical dependencies, data flows, and system integrations. This visibility enables teams to identify improvement areas, prioritize transformation steps, and mitigate risks early on.
Join our webinar to (...)
In today's interconnected world, sophisticated cyberattacks and data breaches are a constant threat, making robust network security essential for businesses of all sizes. While Google Cloud offers a secure foundation, understanding how to configure and manage your network environment is (...)
Today’s customers expect data centers to remain fully operational, online and reliable with minimal downtime, while efficiently maintaining vast amounts of data. The NVMe® Management Interface (NVMe-MI™) Specification simplifies the process of managing NVMe storage devices by enabling the ability (...)
In this "If Your APIs Could Talk" episode, we'll explore the Traffic Audit feature of the Akamai API Security solution. We'll introduce participants to Traffic Audit's powerful capabilities, including recording, visualizing, and analyzing API traffic within their environment. Traffic Audit (...)
Efficient Agile and DevOps Practices have made mobile, web, and desktop apps from Financial Services companies more ubiquitous than ever. While these efficiencies greatly enhance the customer experience, they also present an enticing attack surface to threat actors.
Join us for (...)
Reserve your seat for an exciting webinar about the market research trends we see on the horizon.
Join Leslie Rich, PhD, to discuss trends like the shrinking shelf life of research, how AI is changing the profession, how text analysis can (...)
Unlocking Speed, Precision, and Efficiency in NDR
NDR is a critical component in most organizations’ cybersecurity tool stack, and ExtraHop is one of the leaders in the NDR market. The Gigamon Deep Observability Pipeline increases the speed and precision of (...)
Vanta’s 2024 State of Trust Report found that cybersecurity risk is the biggest concern for business leaders, higher than both financial and operational risk. With more reliance on third-party vendors and increased use of AI technologies, security leaders face a (...)
With Your FinServ Tech Oracles:
• Johna Till Johnson, Nemertes CEO + Founder & Content Committee Chair for the Wall St. Technology Association (WSTA)
• Jerald Murphy, Nemertes Senior VP of Research + Consulting
FinServ Tech Oracles – a weekly video series for (...)
Discover how AI is transforming telecom networks, enabling faster issue detection, optimized resource allocation, and reduced operational costs.
Together, Digis Squared and Intel are pioneering AI solutions that elevate network performance, enhance user experience, and drive the next generation of intelligent (...)
Join us for our December TechTalk session where we will introduce the new SN655 and SN861 High capacity and gen5 SSDs, and the new E3.S, E1.S form factors.
Innovations in video technology are driving changes to compliance regulations and industry standards just as much as those regulations and standards are driving changes in video technology. As standards evolve and new technology emerges, deploying and maintaining a compliant surveillance (...)
This insightful webinar peels back the layers of API security to reveal the complexities of protecting your APIs.
You'll gain an in-depth understanding of:
- The most pervasive API vulnerabilities that compromise systems and how to mitigate them.
- Critical security (...)
Join us as we uncover the five Local Privilege Escalation (LPE) vulnerabilities recently discovered in the needrestart component of Ubuntu Server. These vulnerabilities, identified by Qualys (CVE-2024-48990, CVE-2024-48991, CVE-2024-48992, CVE-2024-11003, and CVE-2024-10224), allow local attackers to gain root privileges and (...)
Stay ahead of the game with critical updates from the Office of the Australian Information Commissioner (OAIC) on tracking pixels and privacy compliance. With fines up to $330,000 and heightened enforcement, businesses must adapt to stricter rules around consent, transparency, (...)
Reserve your seat for an exciting webinar about the market research trends we see on the horizon.
Join Leslie Rich, PhD, to discuss trends like the shrinking shelf life of research, how AI is changing the profession, how text analysis can (...)
Descubre el poder de Salesforce Flows, la herramienta clave para automatizar procesos dentro de Salesforce. Comprenderás el diseño de flujos eficientes sin necesidad de programar, ahorrando tiempo y recursos mientras optimizas la experiencia de usuario. Descubre cómo Flows puede transformar (...)
With the recent NIST announcement of the first set of finalized Post-Quantum Cryptography (PQC) encryption algorithms, many organizations are wondering what to do next. This raises important questions like - what is the PQC timeline and where do we get (...)
In this episode of "If Your APIs Could Talk," we explore the Workflow Automation feature of Akamai API Security. This feature dramatically improves efficiency and productivity by simplifying the creation of multi-action workflows. It uses a user-friendly visual editor, customizable (...)
In einer Welt, in der kritische Infrastrukturen immer stärker von digitalen Technologien abhängig sind, wird die Cybersicherheit von OT- und ICS-Systemen zu einem entscheidenden Faktor. Wir möchten Sie daher herzlich zu unserem Webinar einladen, in dem wir unter anderem die (...)
Reserve your seat for an exciting webinar about the market research trends we see on the horizon.
Join Leslie Rich, PhD, to discuss trends like the shrinking shelf life of research, how AI is changing the profession, how text analysis can (...)
A modern approach to exposure management is a combination of process and technology. New solutions designed to help organizations understand and manage their attack surface include External Attack Surface Management (EASM) and Cyber Asset Attack Surface Management (CAASM), these can (...)
L'aumento dei costi e i problemi di prestazioni hanno un impatto sul vostro ambiente SAP ECC o S/4 HANA? Oppure state cercando una migliore gestione dei contenuti SAP per migliorare il servizio clienti e aumentare la produttività?
Unitevi agli esperti di (...)
Jay Bolden, Senior Director, Eli Lilly and Company Global Quality Laboratories. Presenting:
An Overview of Recent USP Bacterial Endotoxins Standards Development
Dr David Roesti, PhD. Microbiologist/Facilitator QA/QC at Novartis Pharma AG. Presenting:
Overview and Future Plans of the USP Rapid Microbiological Methods Subcommittee
Followed (...)
The holiday season is a time for relaxation and celebration, but it's also when attackers actively search for loopholes.
This gap brings unique IT challenges and gives attackers ample time since staff availability is reduced.
Register now for an insightful (...)
Certain VM workloads are crucial and not obsolete, but lack a clear path to modernization. Currently, they run on IaaS or public clouds, which are costly and require time-intensive maintenance from operators and developers.
What if you could run these VMs (...)
We’re living in an era of rapid transformation where artificial intelligence and technology are reshaping not just industries, but the very nature of work itself. In this insightful session, we’ll explore how advancements in AI and workplace technologies are transforming (...)
The financial sector is facing increasing regulatory pressure, particularly with the evolving BCBS 239 RDAR guidelines. Join experts from Collibra and PwC as they discuss how data intelligence can help financial institutions meet these new standards and improve risk data (...)
This session, originally premiered during Nasuni's CloudBound 2024, explores the intersection of artificial intelligence and cybersecurity, addressing the evolving threats and opportunities posed by rapid advancements in AI technology. Elazari, a renowned cybersecurity expert, highlights how AI is reshaping both (...)
Next-Gen SIEM Focus Series (Myth Busters): SIEMs have gotten a bad rap. With declining detections, skyrocketing costs, and inadequate data visibility, it’s understandable. Gurucul flips these myths on their head. In this Democast Series we bust common myths and show (...)
This webinar explores key findings and analysis from IDC's Business Value White Paper on Wasabi Hot Cloud Storage. IDC independently surveyed Wasabi customers to gather detailed metrics regarding their Return on Investment (ROI) and Total Cost of Ownership (TCO). Join (...)
With deepfakes and other advanced fraud tactics on the rise, liveness detection is essential for secure identity verification. Join us as we explore the key questions every organization should ask to ensure their liveness solution is effective and future-proof.
In this (...)
In a world where email is a channel for confidential communication, safeguarding your messages from prying eyes is crucial. If you’re tired of worrying about who’s peeking at your emails or if your attachments are wandering off without your permission, (...)
We are seeing many of our retail customers implementing SD-WAN to their stores for improved in-store app experiences, secure customer transactions and fast check outs. But SD-WAN comes with it own set of challenges for NOC teams. In this Small (...)
The manufacturing sector is changing rapidly, with dynamic computing and technological innovations revolutionizing the industry. However, with these opportunities come increased risks. Manufacturing IT leaders are now facing significant challenges in maintaining visibility into their IT estates, complicated by legacy (...)
Organizations are now expected to integrate an AI strategy into their business transformation efforts. This transformation is crucial for maintaining competitiveness and leveraging AI for a strategic edge. ServiceNow’s Strategic Portfolio Management (SPM) helps organizations align their goals with work (...)
AI and open source code is making waves in the development world, providing teams with the ability to speed up their development process to keep pace with the fast-paced digital economy. But at what cost - If security cannot keep (...)
In an era where innovation is the cornerstone of success, women are increasingly taking the lead in driving transformative changes across technology and business landscapes. This webinar, "Empowering Innovation: Women Leading the Charge in Technology and Business," aims to celebrate (...)
Join us for an engaging session hosted by the ISSA International Apprenticeship, Internships, Mentorship (AIM) Comittee, where we dive into the latest insights from our recent infosec professional study. As the cybersecurity landscape intensifies, professionals face mounting challenges, from resource (...)
Embark on a foresight journey into the future of cybersecurity, highlighting key trends and innovations that are set to redefine the digital defense landscape in the year ahead. Discover how advancements in artificial intelligence will revolutionize the way security teams (...)
Embark on a foresight journey into the future of cybersecurity, highlighting key trends and innovations that are set to redefine the digital defense landscape in the year ahead. Discover how advancements in artificial intelligence will revolutionize the way security teams (...)
From an operational perspective, using an agentless solution such as mirroring for virtual traffic access seems ideal. Nothing to install, easier to manage, less expensive etc. In fact, the opposite is true. Agent-based traffic access solutions are easier to configure, (...)
Earn 1.5 CPE Credits on this webinar
As cyber threats evolve, organizations must strengthen their defenses with a balanced cybersecurity approach, integrating people, processes, and technology. Yet, finding this balance is often challenging. Some focus on tech investments but lack the (...)
As AI and large language models (LLMs) rapidly transform industries, they also introduce new vulnerabilities that traditional cybersecurity methods can't fully address—data leaks, non-compliance, intellectual property theft, and more. In fact, 94% of IT leaders have allocated budgets to safeguard (...)
From STRONGER 2024: Join Patrick Wright, Chief Information Security & Privacy Officer for the State of Nebraska, as he dove into the critical elements of designing an effective cyber risk management program at the state level. Patrick shared his journey (...)
Are your storage solutions optimized for HPC? Join our webinar with experts from Supermicro, NVIDIA, DDN, and Solidigm as they discuss:
- various use cases of HPC
- the evolving landscape of data storage solutions
- the importance of infrastructure in enhancing performance. (...)
Palo Alto Networks is a leader in security solutions that protect the organizations deploying AI everywhere, generating and processing data everywhere. We are inviting Dr. May Wang, CTO of Cyber Security AI, Palo Alto Networks, to discuss how Palo Alto (...)
Palo Alto Networks is a leader in security solutions that protect the organizations deploying AI everywhere, generating and processing data everywhere. We are inviting Dr. May Wang, CTO of IoT Security, Palo Alto Networks, to discuss how Palo Alto sees (...)
Prerequisites for deploying the GigaVUE Cloud Suite for VMware. In this video, we demonstrate the deployment process using GigaVUE Fabric Manager. For further information and to pose any questions, please visit the Hybrid/Public Cloud Group in Gigamon's VÜE Community. (...)
Cloud Native applications and Services are the workhorses of modern cloud environments. They hold most of the organization's crown jewels and are therefore often the target for insider and outsider threats. Existing cloud security posture management and hardening solutions (CSPM) (...)
Are application performance issues consuming your team's resources? In today’s complex multi-cloud environments, teams often spend up to 90 percent of their time identifying root causes rather than fixing problems. Don’t let performance bottlenecks hinder your organization.
In this engaging (...)
In an era defined by rapid technological change, ensuring the optimal performance and reliability of your Storage Area Network (SAN) is paramount. This webinar offers an in-depth exploration of the comprehensive SAN health checkup process, crucial for maintaining robust and (...)
An essential session for leaders and practitioners, this 30-minute session provides a comprehensive overview of the current security landscape, examining macro influences on organizations and Security Operations Center (SOC) teams.
The session explores the dynamic forces at play, from emerging threat (...)
An essential session for leaders and practitioners, this 30-minute session provides a comprehensive overview of the current security landscape, examining macro influences on organizations and Security Operations Center (SOC) teams.
The session explores the dynamic forces at play, from emerging threat (...)
ESG requirements continue to change and adapt, which means its rules and regulations do, too. ESG has become a core part of the risk business — and an organization's ESG framework now requires strict oversight from many different teams. To (...)
Python is a fast, platform-agnostic, and easy-to-learn programming language that is suited for beginners and experienced developers alike. Ever since its first release in 1991, Python has had a constant presence in the computer world and has become a go-to (...)
This Fireside Chat will delve into the transformative role of High Speed Encryption (HSE) in enhancing data security for businesses across various industries. With a focus on practical insights and real world applications, the discussion will feature a detailed exploration (...)
Entdecken Sie die Neuheiten in Arcserve UDP 10!
Wir freuen uns, Ihnen das neueste Update unseres Arcserve-Produkts UDP 10 vorzustellen, das seit dem 15. Oktober offiziell verfügbar ist! In unserem Live-Webinar am Dienstag, den 5. Dezember, um 10 Uhr CEST, gibt (...)
ZTNA adoption skyrocketed during pandemic as organizations looked to quickly enable secure remote access to employees working from home. Now in the post COVID era, organizations are seeking the same security benefits to provide consistent security and simplify user experience (...)
In the last of our five-webinar series about Secure Access Service Edge (SASE), our expert presenters will guide you to a complete understanding of Software-Defined Wide-Area Network (SD-WAN) and the role it plays in a complete SASE deployment.
SD-WAN is a (...)
Créez des applications d'IA rapidement et en toute sécurité !
Vous souhaitez découvrir comment créer rapidement des applications d'IA avec une sécurité de données éprouvée ?
Nous aborderons des sujets tels que :
- partir à la découverte de la plateforme (...)
Modern software development has completely transformed the way organizations operate and compete in the market. With the attack surface growing exponentially and the software supply chain becoming more complex due to developments like the rise of AI and increasing regulatory (...)
Join us for an exclusive coffee-break webinar designed specifically for the Professional Services industry. Our team of experts will guide you through the process of becoming more insights-driven by leveraging data and AI directly within your CRM. Discover how to (...)
The global transformation to sustainable energy is one of the most important investment themes of our generation. And as governments and businesses across the globe are seeking to decarbonize, the economic landscape has shifted over the course of 2024 with (...)
An essential session for leaders and practitioners, this 30-minute session provides a comprehensive overview of the current security landscape, examining macro influences on organizations and Security Operations Center (SOC) teams.
The session explores the dynamic forces at play, from emerging threat (...)
An essential session for leaders and practitioners, this 30-minute session provides a comprehensive overview of the current security landscape, examining macro influences on organizations and Security Operations Center (SOC) teams.
The session explores the dynamic forces at play, from emerging threat (...)
In this special event following COP29 and the US elections, IPR and PRI will assess the long-term implications for investors of these decisive events in the transition towards net zero. Our panel of policy and investment experts will examine (...)
Discover how embracing cutting-edge technologies and innovative processes can transform underwriting, enhancing both agility and profitability. Learn to leverage advanced data analytics for superior risk assessment, streamline operations through automation, and boost decision-making with AI and machine learning.
Discover how to:
- (...)
Insurances face an ongoing race to innovate amidst rising customer expectations and pervasive security threats. The challenge lies in formulating a strategy that weaves robust security and privacy measures with a seamless digital experience for customers and partners.
In this session, (...)
As technology evolves, so do cyber threats. Join us for a forward-looking webinar on Cybersecurity Trends for 2025, where we explore imminent challenges and innovative solutions in the cybersecurity landscape. Our expert panel will uncover emerging threats, cutting-edge technologies, and (...)
Elevate Your SecOps with Advanced Capabilities.
Join this exclusive webinar to discover how the latest updates to the SanerNow platform deliver unparalleled value to your SecOps teams. Dive into the enhanced features that elevate your vulnerability management efforts and fortify your (...)
As IT departments face economic pressures and the uncertainty surrounding VMware, many are turning to OpenStack as a cost-effective, future-proof alternative for on-premises infrastructure.
In this session, Christian Huebner, Mirantis Director of Architecture Services, and Heiko Kraemer, Principal Cloud Architect, will (...)
Learn how international cybersecurity company Malwarebytes selected a CX platform and delivered the ROI they needed in this short webinar.
Malwarebytes needed an enterprise feedback platform that was fast, flexible, and easy to implement. SurveyMonkey wasn't cutting it and Qualtrics would (...)
Join Google's Office of the CISO for a vital webcast designed specifically for Boards of Directors. In today's interconnected world, supply chain attacks are a growing threat to organizations of all sizes. Cybersecurity is no longer just a concern for (...)
Join Alchemer thought leaders for a NEW type of webinar series: The Business of Feedback.
In our first episode, Bo Bandy (CMO) and Ryan Tamminga (SVP, Product and Services) discuss the current state of CX and their 2025 predictions.
Topics include: (...)
In Artificial Intelligence (AI) and Machine Learning (ML) applications, where data demands and processing speeds are continually increasing, ensuring robust signal integrity in PCI Express® (PCIe®) channels is critical. This PCI-SIG® webinar will provide a comprehensive look at the signal (...)
Join us for How to achieve business transformation with GenAI using Strategic Portfolio Management, where ServiceNow experts and our special guest James Ramsay, Product Management Director, ServiceNow, will discuss proven strategies for effectively planning and executing your GenAI strategy. You’ll (...)
Join storage technology leaders from NVIDIA and Cloudian for an in-depth look at breakthrough technology that's transforming AI infrastructure.
Learn how GPUDirect for Object Storage eliminates traditional storage bottlenecks, enabling direct data access from GPU to exabyte-scale data lakes.
In this 35-minute (...)
Digital transformation goals significantly impact network infrastructure needs for enterprise organizations, creating challenges across all IT domains and increasing pressure on IT operations. ESG research shows that 82% of organizations believe their network environments have become more complex over the (...)
Far too many CX leaders view customer service as an either/or decision when it comes to AI—either fully automate with virtual agents or rely entirely on live agents. But in reality, AI shines best with a “both/and” approach, blending human (...)
Year over year data loss and downtime events like these continue to be I.T.’s worst nightmare. But fear not! Zerto is here to save you from the darkest days in the data center.
From ghostly outages to data-haunting ransomware, these DR (...)
An essential session for leaders and practitioners, this 30-minute session provides a comprehensive overview of the current security landscape, examining macro influences on organizations and Security Operations Center (SOC) teams.
The session explores the dynamic forces at play, from emerging threat (...)
An essential session for leaders and practitioners, this 30-minute session provides a comprehensive overview of the current security landscape, examining macro influences on organizations and Security Operations Center (SOC) teams.
The session explores the dynamic forces at play, from emerging threat (...)
Embark on a journey to fortify your API defenses as we delve into the realm of shadow APIs—a silent threat to the digital ecosystem. With the surge in AI-powered applications, the reliance on APIs has skyrocketed, bringing API security to (...)
As with all things tech, software development has been in a constant state of evolution since its infancy. Generative AI, however, has the potential to disrupt software development as we know it.
There are significant benefits offered by generative AI, but (...)
Join us for an informative, members-only webinar where TIA's Government Affairs team will discuss how the new administration could reshape the future of our industry. We will delve into the effects of the Republican majority in Congress, the expected incoming (...)
DevOps orchestration is the process of automating and coordinating multiple tasks to streamline the DevOps workflow. It can help to reduce production issues, speed up time to market, and improve the efficiency of automation tools.
Ensuring the seamless deployment of new (...)
Many organizations think digital transformation is about adopting new technologies, but the real roadblock is fragmented data. In this 10-minute webinar, we'll expose the big lie about digital transformation and reveal why integration is the missing link. Learn how connecting (...)
La Autoridad Portuaria de la Bahía de Algeciras (APBA) ha instalado cámaras térmicas en las zonas de mayor tránsito de pasajeros del puerto para controlar la temperatura corporal de los pasajeros sin necesidad de pararles. ... Leer más ►
Publicamos grabación de webinar que tuvo lugar el pasado 28/03/2019 por el CIO del Grupo de Medios de Comunicación español Vocento Jorge Oteo en el que explica su visión de la Ciberseguridad hoy.
... Leer más ►