Recent talks on Enterprise Software


Bonterra Support: get more from your fundraising software
For years, we’ve seen thousands of nonprofits harness Bonterra Fundraising and Engagement software to drive incredible results. But many nonprofits don’t
have the time, expertise, or resources to unlock the full potential of their data and tools. That’s why we launched our Enhanced and Premier Support
packages — to bring you strategic coaching, advanced support consulting, live training, and priority support services so you can focus on hitting your fundr…


How Many Types of SBOM Are There?
As far as the Cybersecurity and Infrastructure Security Agency (CISA) is concerned, there are six types of SBOMs that can be created for a single application
or piece of software; neither of which will be identical. While CISA doesn’t have a favorite type of SBOM, you may find that your organization, vendors, or
customers prefer some over others. As such, it’s important to understand what to expect from each type, how to generate them, and be prepared to recon…


The importance of data efficiency in optimizing cyber resilience and data protection
As the cyber-threat landscape continues to evolve in sophistication and frequency—75% of pros surveyed by Enterprise Strategy Group (ESG) reported a
ransomware attack in the last year—businesses struggle to protect ever-growing, distributed application and data environments. This is due in part to siloed,
app-specific protection measures that obscure, rather than grant, security visibility. In this webinar, ESG Practice Director Scott Sinclair, and Chris Groot a…


Don’t Take the Bait: Four Software Supply Chain Attacks
Securing your software supply chain requires that you analyze dependencies for risk, harden your development pipeline, and secure the artifacts that you
deploy or ship to customers. Are you prepared for the four common attack vectors that bad actors exploit? In this webinar, we’ll look at different types of
software supply chain attacks and discuss: • The riskiest points of your software development lifecycle • Real-world examples of how attackers take adv…


Integrate mainframe development with Jira, ServiceNow and other modern applications—it’s key to
accelerated development
Your mainframe systems are critical, but when agile teams work in Jira without visibility into them, you're leaving major gaps in planning and execution. How
much longer can you afford this disconnect? Join Lance Knight, Value Stream Architect and former ConnectALL CEO on March 27 for a live talk and demo on
bringing mainframe development into the agile value stream using ConnectALL. You'll discover: 1. How easy it is to automate Endevor with modern applica…


Best Practices for Leveraging the SSDF
Legislation requiring stringent software security practices by software producers is being passed around the globe. This requires organizations to rethink their
approach to software security, which industry standards they follow, and the best practices for their software development teams. NIST has produced
guidance known as the Secure Software Development Framework (SSDF). The SSDF is a series of practices and associated tasks that serve as a baseline fo…


How Technology Leaders Use Data to Improve the Efficiency of End-to-End Digital Value Delivery
Join us for a webinar on transformational leadership featuring Jenny Phillips, a transformation leader who has driven enterprise-wide DevOps transformations
most recently at T-Mobile and lululemon. Together with contributors from the 2024 DORA Report, we’ll explore how years of research and data can guide
organizations to adopt impactful strategies for solving sociotechnical challenges that maximize efficiency and enable cultural change. Jenny’s experiences c…


Agentic and Gen AI Use Cases With Teradata Enterprise Vector Store
Agentic and generative AI use cases rely on vast amounts of unstructured data, including text, audio, PDFs, and videos, often involving millions of objects.
This could result in billions of inferences. These use cases also need to leverage structured data for operationalization purposes. Teradata Enterprise Vector
Store efficiently handles both structured and unstructured data, enabling companies to scale and build toward an agentic AI future for dynamic customer e…
Coming up next


AI, Observability and Intelligent Canaries
Intelligent Canaries are making waves as a quicker alternative to system monitoring than traditional observability methods. Utilising AI for proactive
monitoring, they can drive system performance and security. In this month's episode, Helen Beal and guests are looking at how Intelligent Canaries are
changing DevOps environments for the better: join to learn how they can add value in your architecture.


Securing APIs: How Radware Protects Against the OWASP API Top 10
APIs are the backbone of modern applications, but they also present significant security risks. In this webinar, we’ll explore how Radware’s API protection
safeguards against the most critical API threats, as defined by the OWASP API Top 10. You’ll gain insights into Radware’s advanced security mechanisms,
including AI-based Business Logic Attack Protection, API Gateway integration, and automatic runtime mitigation techniques. Join us to learn how to enhance…


Securing Financial Institutions: Navigating the Next Wave of Cyber Threats
Join us for an engaging fireside chat as we explore the evolving cyber threat landscape targeting the financial sector. We'll discuss key insights into the rise in
DDoS attacks, AI-driven bot traffic, and sophisticated phishing campaigns. Learn how attackers are leveraging AI to bypass defenses and execute deepfake
phishing, and understand the impact of prolonged DDoS-as-a-Service and hacktivist campaigns. We'll also dive into the credential stuffing economy, reveali…


DevOps Operating in a Hybrid Project/Product World
When product and project management are brought into the DevOps lifecycle, businesses can unlock competitive advantages. In this episode, Helen Beal
and guests get together to share the initial challenges of working closer together, give advice on how teams can overcome these hurdles, and look at the
benefits that lay waiting on the other side.


Value Stream Networks Powered by DevOps
Value stream networks provide insight into areas for improvement and indicate where teams can optimize workflows and help drive business value. In this
month's episode, Helen Beal and guests take a look at how value stream networks and DevOps can work symbiotically.


Cloud Security Threats 2025
As organizations accelerate cloud adoption, cyber threats targeting cloud environments are evolving at an alarming pace. In Cloud Security Threats 2025,
Security Innovation’s Cloud Center of Excellence Lead, Rohitanshu Singh, provides a deep dive into the latest threats, vulnerabilities, and defensive strategies
that will define cloud security in the coming year. This session begins by analyzing key cloud adoption trends, focusing on the shift toward multi-cloud and h…


Successfully Migrate to the Cloud with Chef and AWS
Cloud migration can be complex, but with the right tools and strategies, you can make it a seamless and successful transition. In this exclusive webinar, you’ll
discover how Chef and AWS can work together to simplify your migration process, improve efficiency, and ensure long-term success. What You'll Learn:
-Best Practices for Cloud Migration: Proven methodologies to ensure a smooth transition to the cloud with minimal disruption. -Security & Compliance: How…


Hackers’ Black Market: How Your Company’s Data is Sold and Traded
Gain exclusive insights into the hidden world of underground forums and Telegram groups, where cybercriminals trade sensitive data, exploits, and stolen
credentials. This session will explore what’s being sold, the key players, and the tactics used to evade detection.
Attend Summits on Enterprise Software
Software Development Methodologies
Achieve efficient and successful software development with emerging technology and the right strategies to set developers up for success.
Leveraging AI in the Enterprise
Data science can drive business success, but organizations must carefully select the tools and techniques that provide the insights they need
Cloud-Native Enterprise DevOps Summit
Uncover the benefits of a cloud-native, cloud-first DevOps approach in the enterprise. With the future of enterprise IT living within the cloud, high
performance software development and agile infrastructure is critical to competitiveness.As new tools and services for developers continue to flood the ma…
The Future of Business Intelligence
Business intelligence and analytics no longer benefit only the enterprise. Companies of all shapes and sizes are now realizing the transformational
advantages of collecting, analyzing and integrating data insights. The future of business intelligence (BI) is becoming universal, with FinancesOnline estimati…
Containers in the Enterprise
Stay on top of containerization with leading orchestration products and best practices to secure and monitor your company's containers
Enterprise Strategy Group: GenAI Summit
GenAI signifies a pivotal shift in today's technological landscape. Discover profound insights, streamline operations, and make data-driven decisions on an
unprecedented scale. However, this brings forth ethical and regulatory considerations that require attention. Engage with thought leaders as they navigate …
Watch series about Enterprise Software

Reduce IT Asset Cost and Risk
Realize major savings and mitigate asset-related risk with the AI platform for business transformation.

Put AI to Work with Strategic Portfolio Management and Enterprise Architecture
Maximize your business transformation with strategic portfolio management and enterprise architecture. Align your strategies with workflows to effectively
plan, deliver, and measure value, while leveraging AI Agents to drive automation within ServiceNow.

Ed TALKS
For two decades, I’ve been fortunate to have crossed paths with respected industry luminaries and practitioners. On a regular basis, I invite them to discuss
practical approaches to securing the software ecosystem based on today’s realities: complex tech stacks, evolving threats, motivated attackers, mounting r…

Mastering Monetization: The Definitive Guide To Maximizing The Value of Your Software
Unlock the secrets to a successful software monetization strategy and grow your software-driven revenue in 2023 and beyond! Join Thales for this 6-part
series of hard-hitting bite-sized sessions. We offer you industry experts, thought leaders, and innovators who will lay out the latest trends and strategies in s…

Mastering Monetization: The Definitive Guide To Maximizing The Value of Your Software
Unlock the secrets to a successful software monetization strategy and grow your software-driven revenue in 2023 and beyond! Join Thales for this 6-part
series of hard-hitting bite-sized sessions. We offer you industry experts, thought leaders, and innovators who will lay out the latest trends and strategies in s…

MEGA EA Exchange 2023
Taking your Enterprise Architecture to the Next Level With technologies like cloud, AI, and discovery, enterprise architecture is evolving to ensure seamless
integration and alignment with business strategy. Join us at this conference to exchange and get insights from industry experts on how to take your enterpri…