Information Management

Discover the latest collection of talks and videos on Information Management from industry experts.

Recent talks on Information Management

Take Control of Your Email Security: Leveraging AWS KMS for Complete Encryption Key Control
Channel Logo

Take Control of Your Email Security: Leveraging AWS KMS for Complete Encryption Key Control

Email remains the lifeblood of organizational communication—and the weakest link in your security chain if not encrypted properly. Are you in control of your
encryption keys, or are you leaving critical decisions—and risks—in someone else’s hands? Join Echoworx and AWS for a deep exploration into how managing
your own encryption keys (MYOK) with AWS Key Management Service (AWS KMS) can redefine your email security. Gain complete control without sacrificing…

Exploring AVD Cost, Security and Performance in Virtual Desktops
Channel Logo

Exploring AVD Cost, Security and Performance in Virtual Desktops

Azure Virtual Desktop (AVD) is changing the way businesses manage remote work, offering enhanced security, scalability, and cost efficiency. Nathan Taylor
(SVP, Global Microsoft Practice Leader) and Jeremy Santos (Director of Engineering) break down how AVD simplifies IT management, eliminates open ports,
improves security, and reduces infrastructure costs. Whether you're considering alternatives to traditional VDI solutions or looking for a better way to handl…

Navigating 2025: Key Cybersecurity Trends and Strategies for a Resilient Future
Channel Logo

Navigating 2025: Key Cybersecurity Trends and Strategies for a Resilient Future

As we approach 2025, organizations are grappling with escalating cyber threats and growing regulatory pressures. These challenges are expected to
intensify, with mandatory requirements likely pushing the adoption of Zero Trust models like MFA, driven by evolving rules and insurance demands. In this
webinar, we'll explore how these trends might shape the enterprise's security strategies. Key topics we’ll cover in this webinar include: * Mandatory regulati…

Accelerate Revenue with Sales and Order Management
Channel Logo

Accelerate Revenue with Sales and Order Management

Join our webinar, "Accelerate Revenue with Sales and Order Management," to learn how to simplify the sales and order lifecycle, speed up revenue
generation, and improve customer experiences. Discover how ServiceNow's single platform integrates traditionally siloed sales functions and automates
many processes, with real results from ServiceNow customers. Register now to invigorate your customers' sales experience.

Effective Cloud Security: Supporting Developers and the SOC
Channel Logo

Effective Cloud Security: Supporting Developers and the SOC

Managing your cloud security posture is a complex endeavor, often requiring a wide range of controls and levers: AI / LMM protection, data security,
container security, and API protection among them. And because of this extensive ecosystem incidents abound, with 92% of folks, Enterprise Strategy Group
(ESG) reports, facing incidents due to misconfiguration or access issues. In this Fireside Chat, ESG Cybersecurity Practice Director Melinda Marks alongside …

Deep Dive on What’s New in OpenShift Virtualization
Channel Logo

Deep Dive on What’s New in OpenShift Virtualization

Come hear directly from the OpenShift Virtualization Product team on virtualization features and ISV ecosystem build out that make it easy for a VM admin to
easily transition from their current environment. These changes include simplified VM management, large scale VM management both at a single and
multi-cluster level with Red Hat ACM, advanced, networking enhancements, density improvements, integration of VM knowledge into Red Hat OpenShift Lig…

Meeting Strict Compliance Standards for Government Work with AVD Description
Channel Logo

Meeting Strict Compliance Standards for Government Work with AVD Description

Azure Virtual Desktop (AVD) is a powerful solution for meeting the stringent compliance and security standards required for government work. In this snippet
of Demystifying Microsoft, Nathan Taylor (SVP, Global Microsoft Practice Leader) and Jeremy Santos (Director of Engineering) explore how AVD is designed to
support government organizations in ensuring data protection, secure access, and compliance with federal regulations. Learn how AVD enables secure rem…

[NA] Ransomware Readiness: Latest Trends & Comprehensive Strategies
Channel Logo

[NA] Ransomware Readiness: Latest Trends & Comprehensive Strategies

The impending threat of ransomware makes protecting your organization’s data and systems more critical than ever before, requiring constant vigilance
from security teams regardless of industry and size. First step, know your enemy. In the inaugural Ransomware Radar Report, Rapid7 Labs researchers
tracked over 2,570 (documented) ransomware incidents and have uncovered trends in attacker behavior that could indicate a paradigm shift in the way the…

Coming up next

Security Risks to Consider with AI Integration: AI in DevOps
Channel Logo

Security Risks to Consider with AI Integration: AI in DevOps

In the ever-evolving landscape of DevOps, the paradigm is now shifting - where security is taking the central stage. With vast surface areas including
containers, cloud, repositories and third-party components, cyber threats became more prominent than ever before in DevOps. This presentation will delve
into the evolution from traditional DevOps to the advanced usage of artificial intelligence (AI) technologies to automate and optimize the software develop…

Proactive Defense: Leveraging AI for Predictive Threat Mitigation and Response
Channel Logo

Proactive Defense: Leveraging AI for Predictive Threat Mitigation and Response

As cyber threats grow increasingly sophisticated, traditional reactive approaches to security are no longer sufficient. Proactive defense strategies, powered
by artificial intelligence (AI), are revolutionizing how organizations detect, mitigate, and respond to threats. This session explores how AI can predict and
prevent potential attacks by analyzing patterns, identifying vulnerabilities, and automating preemptive actions. Attendees will gain insights into the technol…

Turning Incidents into Insights: A Product-Led Approach to Incident Response
Channel Logo

Turning Incidents into Insights: A Product-Led Approach to Incident Response

From data breaches to ransomware attacks, the cost of cybercrime is skyrocketing, demanding a new approach to security. Playing defense is no longer
enough. Organizations need to anticipate threats and build resilience into their systems. CISOs and security leaders face immense pressure to stay ahead
of the curve and build resilient organizations capable of withstanding and recovering quickly from security breaches. A product-led approach offers a proac…

Modernize Secure Access with Universal ZTNA and Endpoint Protection
Channel Logo

Modernize Secure Access with Universal ZTNA and Endpoint Protection

Tired of Security Gaps and Complex Solutions? Join this webinar to learn how to improve your security posture with Universal ZTNA and endpoint protection.
Fortinet experts will discuss how our solutions: • Combat evolving cyber threats with a Zero-Trust approach and integrated endpoint protection. • Provide your
hybrid workforce with consistent security and user experience across all applications. • Reduce complexity and cost with a single, unified agent for VPN, ZT…

How to Optimize Self-Service: Reducing Costs While Improving Customer Satisfaction
Channel Logo

How to Optimize Self-Service: Reducing Costs While Improving Customer Satisfaction

Is your self-service portal underutilized or failing to deliver results? Poorly designed self-service can frustrate customers and increase support costs. In this
webcast, Jeff Rumburg will explore how to optimize self-service to reduce costs and improve customer satisfaction. He’ll discuss best practices for design,
content, and promotion, as well as how to measure self-service effectiveness. Attendees will learn how to create a self-service experience that customers lo…

Unifying Data Architecture for the Future: Gen AI, Open Standards, Collaborative Analytics, and Next-Gen Data Platforms
Channel Logo

Unifying Data Architecture for the Future: Gen AI, Open Standards, Collaborative Analytics, and
Next-Gen Data Platforms

The data and analytics landscape is undergoing a profound transformation. Emerging trends in Gen AI, open table formats, collaborative analytics, and
next-generation data platforms are converging to reshape the future of data architecture. In this webinar, we'll explore how: - Gen AI is revolutionizing data
roles and workflows. - Open table and open file formats are breaking down data silos, enabling seamless collaboration, and democratizing data access. - N…

Future-proof your automation: Vision AI for seamless Oracle upgrades
Channel Logo

Future-proof your automation: Vision AI for seamless Oracle upgrades

In the rapidly evolving Oracle landscape, staying ahead requires agility and foresight. Tricentis for Oracle harnesses the power of AI, enabling you to build
automated tests based on the UI prototypes outlined in the Oracle Upgrade Readiness documentation, even before the official release of the UI. By
seamlessly integrating machine learning capabilities, Vision AI transcends traditional automation frameworks, enabling you to shift testing left and keep up …

Surviving Ransomware: Strategies to Defend, Respond, and Recover
Channel Logo

Surviving Ransomware: Strategies to Defend, Respond, and Recover

Ransomware attacks have reached unprecedented levels of sophistication, targeting organizations across all industries and sectors. As these threats evolve,
so too must the strategies to combat them. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he provides a deep dive into
strategies that can help organizations effectively navigate the ransomware threat lifecycle. From advanced prevention techniques and risk mitigation to str…

Attend Summits on Information Management

Driving Innovation & Automation in ITSM

Driving Innovation & Automation in ITSM

ITSM was the unsung hero of 2020 and 2021, helping businesses hold the fort during the switch to remote and then hybrid working. And with Gartner
predicting that IT organizations are set to overspend on ITSM tech by $750m in 2023, it seems that ITSM teams are finally getting their dues. Yet with the se…

|9 sessions
Complete Cloud Security

Complete Cloud Security

Cloud security accounted for 5% of cloud budgets in 2020 and is expected to rise to 7% in 2022, according to the "2022 State of IT" report by Spiceworks Ziff
Davis. No doubt caused by the shift to remote working provoked by the pandemic, it’s evident that cloud security is more top of IT security leaders’ minds t…

|16 sessions
Super Powering the Service Desk in 2022

Super Powering the Service Desk in 2022

IT service desks have traditionally been viewed as a cost center, called upon in times of employee problems. However, advancements in machine learning, AI
and Robotic Process Automation coupled with the shift to hybrid working means that the modern service desk can - and needs to - offer so much more. No…

|7 sessions
Successfully Securing Endpoints & Mitigating Threats

Successfully Securing Endpoints & Mitigating Threats

Achieving endpoint visibility to ward off the threat of a breach has never been more important than it is in the age of data proliferation and hybrid
workplaces. Multiple endpoints and locations heighten that risk, making it essential for CISOs and IT security teams to overcome common challenges. Find o…

|19 sessions
AI Security in ITSM: AI Powered Systems & Closing Gaps in Vulnerabilities

AI Security in ITSM: AI Powered Systems & Closing Gaps in Vulnerabilities

ITSM has been helping businesses manage the risks of new security threats since its inception, but in 2022 it’s become clear that ITSM’s role in the fight
against ransomware, malware and hackers cannot be minimized. With businesses more at risk than ever before due to the digital economy most operate in…

|8 sessions
Security Strategies to Safeguard the Enterprise

Security Strategies to Safeguard the Enterprise

Cybersecurity initiatives are taking center stage as enterprises race to digitally transform and satisfy heightened customer expectations while simultaneously
securing hybrid workforces. As businesses continue to emerge from the COVID-19 pandemic, revamp their business models, and restructure operations, a …

|14 sessions

Watch series about Information Management

Reduce IT Asset Cost and Risk
49 episodes
Series Company Logo

Reduce IT Asset Cost and Risk

Realize major savings and mitigate asset-related risk with the AI platform for business transformation.

Watch series

Put AI to Work with Strategic Portfolio Management and Enterprise Architecture
35 episodes
Series Company Logo

Put AI to Work with Strategic Portfolio Management and Enterprise Architecture

Maximize your business transformation with strategic portfolio management and enterprise architecture. Align your strategies with workflows to effectively
plan, deliver, and measure value, while leveraging AI Agents to drive automation within ServiceNow.

Watch series

ServiceNow Cyber & Tech Risk
45 episodes
Series Company Logo

ServiceNow Cyber & Tech Risk

Monitor risk and compliance in real time on an integrated platform. Manage third-party risks and business continuity as you innovate.

Watch series

CCM Implementation Guidelines v2
16 episodes
Series Company Logo

CCM Implementation Guidelines v2

The Cloud Controls Matrix WG and Shared Security Responsibility Model project teams are creating 17 videos—equal to the number of CCM v4 security
domains—to raise awareness of the CCM implementation guidelines v2.0 and the cloud-shared security responsibility model (SSRM).

Watch series

The Brick House
41 episodes
Series Company Logo

The Brick House

The Brick House is a monthly panel discussion with GuidePoint Security’s CISO, Gary Brickhouse, and his expert guests examining the hottest topics in
cybersecurity. There are no talking heads here, just honest conversations among security practitioners with current, real-world experience solving the most…

Watch series

Secure machine identities
26 episodes
Series Company Logo

Secure machine identities

Simplify securing non-human identities for all applications, DevOps pipelines and cloud workloads Your organization has more clouds, more machines and
more identities to manage - there are now 45 non-human identities for each human. Learn how solve this challenge by extending the reach of your secrets …

Watch series