Recent talks on Information Management

Take Control of Your Email Security: Leveraging AWS KMS for Complete Encryption Key Control
Email remains the lifeblood of organizational communication—and the weakest link in your security chain if not encrypted properly. Are you in control of your
encryption keys, or are you leaving critical decisions—and risks—in someone else’s hands? Join Echoworx and AWS for a deep exploration into how managing
your own encryption keys (MYOK) with AWS Key Management Service (AWS KMS) can redefine your email security. Gain complete control without sacrificing…

Exploring AVD Cost, Security and Performance in Virtual Desktops
Azure Virtual Desktop (AVD) is changing the way businesses manage remote work, offering enhanced security, scalability, and cost efficiency. Nathan Taylor
(SVP, Global Microsoft Practice Leader) and Jeremy Santos (Director of Engineering) break down how AVD simplifies IT management, eliminates open ports,
improves security, and reduces infrastructure costs. Whether you're considering alternatives to traditional VDI solutions or looking for a better way to handl…

Navigating 2025: Key Cybersecurity Trends and Strategies for a Resilient Future
As we approach 2025, organizations are grappling with escalating cyber threats and growing regulatory pressures. These challenges are expected to
intensify, with mandatory requirements likely pushing the adoption of Zero Trust models like MFA, driven by evolving rules and insurance demands. In this
webinar, we'll explore how these trends might shape the enterprise's security strategies. Key topics we’ll cover in this webinar include: * Mandatory regulati…

Accelerate Revenue with Sales and Order Management
Join our webinar, "Accelerate Revenue with Sales and Order Management," to learn how to simplify the sales and order lifecycle, speed up revenue
generation, and improve customer experiences. Discover how ServiceNow's single platform integrates traditionally siloed sales functions and automates
many processes, with real results from ServiceNow customers. Register now to invigorate your customers' sales experience.

Effective Cloud Security: Supporting Developers and the SOC
Managing your cloud security posture is a complex endeavor, often requiring a wide range of controls and levers: AI / LMM protection, data security,
container security, and API protection among them. And because of this extensive ecosystem incidents abound, with 92% of folks, Enterprise Strategy Group
(ESG) reports, facing incidents due to misconfiguration or access issues. In this Fireside Chat, ESG Cybersecurity Practice Director Melinda Marks alongside …

Deep Dive on What’s New in OpenShift Virtualization
Come hear directly from the OpenShift Virtualization Product team on virtualization features and ISV ecosystem build out that make it easy for a VM admin to
easily transition from their current environment. These changes include simplified VM management, large scale VM management both at a single and
multi-cluster level with Red Hat ACM, advanced, networking enhancements, density improvements, integration of VM knowledge into Red Hat OpenShift Lig…

Meeting Strict Compliance Standards for Government Work with AVD Description
Azure Virtual Desktop (AVD) is a powerful solution for meeting the stringent compliance and security standards required for government work. In this snippet
of Demystifying Microsoft, Nathan Taylor (SVP, Global Microsoft Practice Leader) and Jeremy Santos (Director of Engineering) explore how AVD is designed to
support government organizations in ensuring data protection, secure access, and compliance with federal regulations. Learn how AVD enables secure rem…

[NA] Ransomware Readiness: Latest Trends & Comprehensive Strategies
The impending threat of ransomware makes protecting your organization’s data and systems more critical than ever before, requiring constant vigilance
from security teams regardless of industry and size. First step, know your enemy. In the inaugural Ransomware Radar Report, Rapid7 Labs researchers
tracked over 2,570 (documented) ransomware incidents and have uncovered trends in attacker behavior that could indicate a paradigm shift in the way the…
Coming up next

Security Risks to Consider with AI Integration: AI in DevOps
In the ever-evolving landscape of DevOps, the paradigm is now shifting - where security is taking the central stage. With vast surface areas including
containers, cloud, repositories and third-party components, cyber threats became more prominent than ever before in DevOps. This presentation will delve
into the evolution from traditional DevOps to the advanced usage of artificial intelligence (AI) technologies to automate and optimize the software develop…

Proactive Defense: Leveraging AI for Predictive Threat Mitigation and Response
As cyber threats grow increasingly sophisticated, traditional reactive approaches to security are no longer sufficient. Proactive defense strategies, powered
by artificial intelligence (AI), are revolutionizing how organizations detect, mitigate, and respond to threats. This session explores how AI can predict and
prevent potential attacks by analyzing patterns, identifying vulnerabilities, and automating preemptive actions. Attendees will gain insights into the technol…

Turning Incidents into Insights: A Product-Led Approach to Incident Response
From data breaches to ransomware attacks, the cost of cybercrime is skyrocketing, demanding a new approach to security. Playing defense is no longer
enough. Organizations need to anticipate threats and build resilience into their systems. CISOs and security leaders face immense pressure to stay ahead
of the curve and build resilient organizations capable of withstanding and recovering quickly from security breaches. A product-led approach offers a proac…

Modernize Secure Access with Universal ZTNA and Endpoint Protection
Tired of Security Gaps and Complex Solutions? Join this webinar to learn how to improve your security posture with Universal ZTNA and endpoint protection.
Fortinet experts will discuss how our solutions: • Combat evolving cyber threats with a Zero-Trust approach and integrated endpoint protection. • Provide your
hybrid workforce with consistent security and user experience across all applications. • Reduce complexity and cost with a single, unified agent for VPN, ZT…

How to Optimize Self-Service: Reducing Costs While Improving Customer Satisfaction
Is your self-service portal underutilized or failing to deliver results? Poorly designed self-service can frustrate customers and increase support costs. In this
webcast, Jeff Rumburg will explore how to optimize self-service to reduce costs and improve customer satisfaction. He’ll discuss best practices for design,
content, and promotion, as well as how to measure self-service effectiveness. Attendees will learn how to create a self-service experience that customers lo…

Unifying Data Architecture for the Future: Gen AI, Open Standards, Collaborative Analytics, and
Next-Gen Data Platforms
The data and analytics landscape is undergoing a profound transformation. Emerging trends in Gen AI, open table formats, collaborative analytics, and
next-generation data platforms are converging to reshape the future of data architecture. In this webinar, we'll explore how: - Gen AI is revolutionizing data
roles and workflows. - Open table and open file formats are breaking down data silos, enabling seamless collaboration, and democratizing data access. - N…

Future-proof your automation: Vision AI for seamless Oracle upgrades
In the rapidly evolving Oracle landscape, staying ahead requires agility and foresight. Tricentis for Oracle harnesses the power of AI, enabling you to build
automated tests based on the UI prototypes outlined in the Oracle Upgrade Readiness documentation, even before the official release of the UI. By
seamlessly integrating machine learning capabilities, Vision AI transcends traditional automation frameworks, enabling you to shift testing left and keep up …

Surviving Ransomware: Strategies to Defend, Respond, and Recover
Ransomware attacks have reached unprecedented levels of sophistication, targeting organizations across all industries and sectors. As these threats evolve,
so too must the strategies to combat them. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he provides a deep dive into
strategies that can help organizations effectively navigate the ransomware threat lifecycle. From advanced prevention techniques and risk mitigation to str…
Attend Summits on Information Management
Driving Innovation & Automation in ITSM
ITSM was the unsung hero of 2020 and 2021, helping businesses hold the fort during the switch to remote and then hybrid working. And with Gartner
predicting that IT organizations are set to overspend on ITSM tech by $750m in 2023, it seems that ITSM teams are finally getting their dues. Yet with the se…
Complete Cloud Security
Cloud security accounted for 5% of cloud budgets in 2020 and is expected to rise to 7% in 2022, according to the "2022 State of IT" report by Spiceworks Ziff
Davis. No doubt caused by the shift to remote working provoked by the pandemic, it’s evident that cloud security is more top of IT security leaders’ minds t…
Super Powering the Service Desk in 2022
IT service desks have traditionally been viewed as a cost center, called upon in times of employee problems. However, advancements in machine learning, AI
and Robotic Process Automation coupled with the shift to hybrid working means that the modern service desk can - and needs to - offer so much more. No…
Successfully Securing Endpoints & Mitigating Threats
Achieving endpoint visibility to ward off the threat of a breach has never been more important than it is in the age of data proliferation and hybrid
workplaces. Multiple endpoints and locations heighten that risk, making it essential for CISOs and IT security teams to overcome common challenges. Find o…
AI Security in ITSM: AI Powered Systems & Closing Gaps in Vulnerabilities
ITSM has been helping businesses manage the risks of new security threats since its inception, but in 2022 it’s become clear that ITSM’s role in the fight
against ransomware, malware and hackers cannot be minimized. With businesses more at risk than ever before due to the digital economy most operate in…
Security Strategies to Safeguard the Enterprise
Cybersecurity initiatives are taking center stage as enterprises race to digitally transform and satisfy heightened customer expectations while simultaneously
securing hybrid workforces. As businesses continue to emerge from the COVID-19 pandemic, revamp their business models, and restructure operations, a …
Watch series about Information Management

Reduce IT Asset Cost and Risk
Realize major savings and mitigate asset-related risk with the AI platform for business transformation.

Put AI to Work with Strategic Portfolio Management and Enterprise Architecture
Maximize your business transformation with strategic portfolio management and enterprise architecture. Align your strategies with workflows to effectively
plan, deliver, and measure value, while leveraging AI Agents to drive automation within ServiceNow.

ServiceNow Cyber & Tech Risk
Monitor risk and compliance in real time on an integrated platform. Manage third-party risks and business continuity as you innovate.

CCM Implementation Guidelines v2
The Cloud Controls Matrix WG and Shared Security Responsibility Model project teams are creating 17 videos—equal to the number of CCM v4 security
domains—to raise awareness of the CCM implementation guidelines v2.0 and the cloud-shared security responsibility model (SSRM).

The Brick House
The Brick House is a monthly panel discussion with GuidePoint Security’s CISO, Gary Brickhouse, and his expert guests examining the hottest topics in
cybersecurity. There are no talking heads here, just honest conversations among security practitioners with current, real-world experience solving the most…

Secure machine identities
Simplify securing non-human identities for all applications, DevOps pipelines and cloud workloads Your organization has more clouds, more machines and
more identities to manage - there are now 45 non-human identities for each human. Learn how solve this challenge by extending the reach of your secrets …