Product Management

Discover the latest collection of talks and videos on Product Management from industry experts.

Recent talks on Product Management

Effective Cloud Security: Supporting Developers and the SOC
Channel Logo

Effective Cloud Security: Supporting Developers and the SOC

Managing your cloud security posture is a complex endeavor, often requiring a wide range of controls and levers: AI / LMM protection, data security,
container security, and API protection among them. And because of this extensive ecosystem incidents abound, with 92% of folks, Enterprise Strategy Group
(ESG) reports, facing incidents due to misconfiguration or access issues. In this Fireside Chat, ESG Cybersecurity Practice Director Melinda Marks alongside …

OE for ICAM: Operational Efficiency that's FedRAMP Proven, & Ready to Scale
Channel Logo

OE for ICAM: Operational Efficiency that's FedRAMP Proven, & Ready to Scale

Federal agencies must modernize identity, credential and access management (ICAM) while ensuring compliance with evolving security mandates. Achieving
an Authority to Operate (ATO) is just the beginning—true operational efficiency requires scalable, centralized solutions that align with ICAM best practices. As
agencies look to modernize, they must ensure their IAM strategies are proven, adaptable, and ready to support thousands of users across multiple environ…

Beyond passwords:  How Okta secured their global workforce with Yubico
Channel Logo

Beyond passwords: How Okta secured their global workforce with Yubico

In today’s cybersecurity landscape, moving beyond passwords is crucial. Okta, an industry leader in identity and access management, adopted Yubico
Enrollment Suite in 2024, deploying YubiKeys to its global workforce to ensure phishing-resistant authentication. This session will explore how to create
phishing-resistant users and implement seamless passwordless authentication. The Yubico Enrollment Suite enables rapid deployment of secure YubiKeys, e…

A Sneak Peek into ignio's AI Agents: Meet AI Assist, Your Personal Guide
Channel Logo

A Sneak Peek into ignio's AI Agents: Meet AI Assist, Your Personal Guide

Join us for an exciting talk where we unveil AI Assist, a cutting-edge GenAI-powered interface designed to be your ultimate personal guide for ignio
enablement. Discover how AI Assist can transform the way you interact with ignio by seamlessly addressing your queries, resolving ambiguities, and providing
actionable recommendations for maximum value gain. In this session, we will explore: • Seamless User Experience: How AI Assist understands language va…

Automating Red Hat Enterprise Linux Management with Red Hat Ansible
Channel Logo

Automating Red Hat Enterprise Linux Management with Red Hat Ansible

Join us with Nuno Martins to review the full life cycle operational management for speed and consistency of your RHEL environments. Live event not at the
best time for you? In order to support our global partner ecosystem, all webinars are available on-demand after the live event. Register and you will receive
an email reminder for on-demand viewing. *Red Hat collects your personal data when you submit information as a part of the registration process within B…

Achieve Digital Continuity: Connect Engineering to Operations
Channel Logo

Achieve Digital Continuity: Connect Engineering to Operations

Join our webinar to discover how integration and bidirectional feedback enable a tightly connected design-to-manufacturing loop. Manufacturers face
growing challenges in aligning engineering and shop floor systems. Disconnected processes delay new product introductions and engineering changes, slow
down issue resolution, reduce quality, and hamper productivity. Digital continuity improves overall efficiency, reduces errors, and enhances responsiveness…

From Phishing to Deepfakes: Staying Ahead in AI-Powered Cybercrime
Channel Logo

From Phishing to Deepfakes: Staying Ahead in AI-Powered Cybercrime

Despite Secure Email Gateways (SEGs) embracing AI, phishing still reaches the inboxes of users. Therefore, employees need to be able to identify attacks, a
skill they can learn with proper training. Join James Hickey, Senior Product Marketing Manager - Cofense, for this session to find out why trusting a
technology-only approach to email security can leave you dangerously exposed: • Discover why technology alone cannot fully detect or prevent phishing. •…

Coming up next

Securing Financial Institutions: Navigating the Next Wave of Cyber Threats
Channel Logo

Securing Financial Institutions: Navigating the Next Wave of Cyber Threats

Join us for an engaging fireside chat as we explore the evolving cyber threat landscape targeting the financial sector. We'll discuss key insights into the rise in
DDoS attacks, AI-driven bot traffic, and sophisticated phishing campaigns. Learn how attackers are leveraging AI to bypass defenses and execute deepfake
phishing, and understand the impact of prolonged DDoS-as-a-Service and hacktivist campaigns. We'll also dive into the credential stuffing economy, reveali…

Turning Incidents into Insights: A Product-Led Approach to Incident Response
Channel Logo

Turning Incidents into Insights: A Product-Led Approach to Incident Response

From data breaches to ransomware attacks, the cost of cybercrime is skyrocketing, demanding a new approach to security. Playing defense is no longer
enough. Organizations need to anticipate threats and build resilience into their systems. CISOs and security leaders face immense pressure to stay ahead
of the curve and build resilient organizations capable of withstanding and recovering quickly from security breaches. A product-led approach offers a proac…

DevOps Operating in a Hybrid Project/Product World
Channel Logo

DevOps Operating in a Hybrid Project/Product World

When product and project management are brought into the DevOps lifecycle, businesses can unlock competitive advantages. In this episode, Helen Beal
and guests get together to share the initial challenges of working closer together, give advice on how teams can overcome these hurdles, and look at the
benefits that lay waiting on the other side.

How to Optimize Self-Service: Reducing Costs While Improving Customer Satisfaction
Channel Logo

How to Optimize Self-Service: Reducing Costs While Improving Customer Satisfaction

Is your self-service portal underutilized or failing to deliver results? Poorly designed self-service can frustrate customers and increase support costs. In this
webcast, Jeff Rumburg will explore how to optimize self-service to reduce costs and improve customer satisfaction. He’ll discuss best practices for design,
content, and promotion, as well as how to measure self-service effectiveness. Attendees will learn how to create a self-service experience that customers lo…

Benchmarking Roundup 2025 IT Service and Support
Channel Logo

Benchmarking Roundup 2025 IT Service and Support

Many Service and Support professionals are unfamiliar with the key performance indicators (KPIs) that are important to track and trend and even fewer are
aware of what constitutes acceptable performance. In this session, Jeff Rumburg will share the results of MetricNet’s 2025 Global Benchmarking Initiative for
Service and Support, discuss the methodology, define the KPIs used for benchmarking, and share performance data from more than 140 companies world…

Sustainable investment: key factors influencing multi-asset SI performance in Q1 2025
Channel Logo

Sustainable investment: key factors influencing multi-asset SI performance in Q1 2025

What key factors influenced multi-asset sustainable investment performance in Q1 2025, as the market navigates multiple headwinds? Join us for an
insightful review of investment outcomes through FTSE Russell's sustainable investment (SI) index strategies, covering global equities, fixed income, and our
TPI Climate Transition indices. You will gain answers to some of the most pressing questions facing SI and stay updated on the key trends currently shaping …

How to Build a World-Class Service Desk: Lessons from the Top 10%
Channel Logo

How to Build a World-Class Service Desk: Lessons from the Top 10%

What does it take to build a service desk that ranks in the top 10% of performance? In this webcast, Jeff Rumburg will share insights from MetricNet’s
database of top-performing service desks. He’ll discuss the key drivers of success, including workforce management, technology investments, and leadership
practices. Attendees will learn actionable strategies to elevate their service desk performance and benchmark against the best in the industry.

Benchmarking Roundup 2025 Contact Center
Channel Logo

Benchmarking Roundup 2025 Contact Center

Many Contact Center Center professionals are unfamiliar with the key performance indicators (KPIs) that are important to track and trend and even fewer
are aware of what constitutes acceptable performance. In this webcast, Jeff Rumburg will share the results of MetricNet’s 2025 Global Benchmarking
Initiative for Contact Centers, discuss the methodology, define the KPIs used for benchmarking, and share performance data from more than 140 compani…

Attend Summits on Product Management

Third Party Risk Management for Financial Services

Third Party Risk Management for Financial Services

Financial services are increasingly relying on third-parties to carry out critical elements of their service offerings. By sharing responsibility for services,
companies are increasingly transferring data to facilitate service delivery, which, in turn, leaves them vulnerable to cyber attacks. Join third-party risk mana…

|8 sessions
Data Management: Navigating Opportunities for Success

Data Management: Navigating Opportunities for Success

Drive successful decision-making in your organization with expert data management to gain the most insights.

|8 sessions
Driving Innovation & Automation in ITSM

Driving Innovation & Automation in ITSM

ITSM was the unsung hero of 2020 and 2021, helping businesses hold the fort during the switch to remote and then hybrid working. And with Gartner
predicting that IT organizations are set to overspend on ITSM tech by $750m in 2023, it seems that ITSM teams are finally getting their dues. Yet with the se…

|9 sessions
Overcoming Supply Chain Challenges

Overcoming Supply Chain Challenges

Effectively manage the supply chain in a globalized and uncertain business environment with emerging technologies and proven security strategies.

|8 sessions
Securing Environments with Identity & Access Management

Securing Environments with Identity & Access Management

IAM is fast becoming a top business priority. With more transactions and services coming online, businesses’ attack surfaces are growing fast. This risk is
exacerbated by the rise of AI in identity-based attacks. Meanwhile, as regulators tighten requirements around protecting identities, getting visibility on user …

|10 sessions
CIO Summit

CIO Summit

In an era where AI reshapes industries overnight and cyber threats evolve at breakneck speed, the modern CIO stands at the helm of a digital revolution.
Gone are the days when IT was a purely technical role – today’s CIO is the leader of innovation, guardian of data, and the bridge between tech and busines…

|12 sessions

Watch series about Product Management

Reduce IT Asset Cost and Risk
49 episodes
Series Company Logo

Reduce IT Asset Cost and Risk

Realize major savings and mitigate asset-related risk with the AI platform for business transformation.

Watch series

Put AI to Work with Strategic Portfolio Management and Enterprise Architecture
35 episodes
Series Company Logo

Put AI to Work with Strategic Portfolio Management and Enterprise Architecture

Maximize your business transformation with strategic portfolio management and enterprise architecture. Align your strategies with workflows to effectively
plan, deliver, and measure value, while leveraging AI Agents to drive automation within ServiceNow.

Watch series

CCM Implementation Guidelines v2
16 episodes
Series Company Logo

CCM Implementation Guidelines v2

The Cloud Controls Matrix WG and Shared Security Responsibility Model project teams are creating 17 videos—equal to the number of CCM v4 security
domains—to raise awareness of the CCM implementation guidelines v2.0 and the cloud-shared security responsibility model (SSRM).

Watch series

ServiceNow Cyber & Tech Risk
45 episodes
Series Company Logo

ServiceNow Cyber & Tech Risk

Monitor risk and compliance in real time on an integrated platform. Manage third-party risks and business continuity as you innovate.

Watch series

ITSM Webcast Series
13 episodes
Series Company Logo

ITSM Webcast Series

SolarWinds® Service Desk helps organizations simplify daily IT tasks, better connect with employees, and drive business productivity throughout the
organization with an integrated IT asset management and service management platform.

Watch series

Database Webcast Series
25 episodes
Series Company Logo

Database Webcast Series

Monitor, analyze, diagnose, and optimize database performance and data ops that drive your business-critical applications. Unify on-premises and cloud
database visibility, control, and management with streamlined monitoring, mapping, data lineage, data integration, and tuning across multiple vendors.

Watch series