Webinars

Webinars

  • The 6 principles for successful data governance

    Are you getting started with data governance? Whether you’re about to commission a new initiative or you’ve been tasked with running one, you’re probably feeling overwhelmed. You may have lots of questions like: - Where do I start? - How will I know if I’m doing the right things, at the right time? - What can I expect to get in place in the next 6 months? What will be longer term? This webinar will answer your initial questions about data governance and share six principles that underpin all successful data governance initiatives. You’ll learn: o What to do from the start so you can avoid mistakes which take time and money to resolve o The opportunities data governance will bring to your organization so know why you are doing this and what the wins will be o How to approach your data governance initiative in the right way, so you have a realistic idea of what is involved About the speaker: Known as The Data Governance Coach, Nicola helps organizations understand and manage their data better. For almost two decades she’s helped corporates to reduce costs, inefficiencies and to remain competitive. Typically, people turn to her because their data is a mess, and they need help unravelling it. As well as providing coaching and consulting to help her clients better manage their data, Nicola runs three popular training courses every year, because she feels it is important to give people the skills to make sure that data is used to solve problems and make better informed decisions. Nicola initially worked for a leading UK Bank and moved into consultancy at the beginning of 2009. Nicola is a Director and Committee Member of DAMA UK, she sits on the Expert Panel of Dataqualitypro.com, and regularly writes and presents internationally on data governance best practice. Read More

  • Take charge of your data: Enabling it for a profitable and sustainable business

    What is data governance and why is it still a fundamental prerequisite for business success? Presented by Rajeev Pai, Director of Technology Strategy & Transformation at Deloitte, this session will explore what data governance is and the key reasons why organizations should have a data governance program in place. Attendees will learn: - Key principles of data governance. - Value delivered due to effective data governance. - Key trends shaping up in the space of data governance. About the speaker: Rajeev is a leader in the space of Technology Consulting & Transformation with over 20 years of experience across the globe in the financial services industry, helping business leaders navigate change. He combines deep domain expertise in Capital Markets F2B Processes and Banking to provide thought leadership and tailored advise while challenging business leaders to achieve their vision. He is an AWS Certified Solutions Architect experienced in large scale System Integration, Platform Re-engineering, Enterprise Data Management (Data Strategy, Architecture and Management), Analytics & Data Visualisation, Operating Model constructs, Design Thinking, and has strong familiarity with Emerging Tech. He is certified in Business Sustainability Management from the Cambridge Institute of Sustainability Leadership (CISL). Rajeev has nurtured trusted relationships and high performing teams throughout his career and is committed to help business leaders succeed in their stated mission by combining his industry and digital transformation experience. He is passionate about solving enterprise architecture, sustainability & data challenges for clients. Read More

  • The Future Is Agentless: Cloud Security for Modern Environments

    Traditional agent-based cloud security tools have blind spots. They either can’t see all of your cloud assets or can’t analyze them with proper risk context. Security teams are increasingly turning to agentless Cloud Native Application Protection Platforms (CNAPPs), which offer faster setup and deployment, less maintenance and lower provisioning costs, wider visibility, and greater scalability than traditional security tools. Sagy Kratu, Director of Enablement and Evangelism and Jason Silberman, Senior Product Marketing Manager, will cover: - The current security threat landscape and risks to look out for - Capabilities and limitations of various cloud security approaches - Tips for selecting and getting started with a cloud-native application protection platform Read More

  • Kubernetes Resource Optimization

    Have you ever worked in an environment where servers were sort of just sitting around under-utilized? What about in an environment where you requested resources and they weren’t available? On-prem, this was a big deal. In the cloud world, you don’t see that as much. Instead, you see something just as bad -- if not worse. In the cloud, resources (compute, storage, etc.) are always either over- or under-provisioned. Organizations are either spending way too much money monthly in the cloud for resources that aren’t needed or “scaling up” strategies aren’t in place, which ends in production environments not performing the way engineers are expecting. How can you plan for resource and cost optimization in the cloud? In this session, you will learn: - How to optimize Kubernetes clusters from a resource perspective. - How to optimize Kubernetes resources/objects. - Cost optimization strategies. - Planning how resources will be used to avoid over or under utilization. Read More

  • Controlling costs in a resource that has no limits…

    When given a resource that has unlimited scalability, software developers and other IT personnel can become like kids in a candy store. Nothing is off limits because there are no limits to what the cloud can provide. Unfortunately, the same IT personnel using these resources are not the ones paying the bills. In this session, instructor and architect Brian Kirsch will explore ways to control your cloud costs through cost optimization and resource discovery and allocation. In addition, he will review better policy and procedure tips to help streamline the initial requests, work to remove the need for going back and correcting cost issues as well as how to make sure you see a sustainable impact forward that does not affect the users. Key takeaways: - Cost Optimization. - Resource Discovery. - Resource Allocation. - Policy Request Tips. - Procedure Tips. - Reporting. Read More

  • Mark Twain & Cloud Security

    As the saying goes, “everyone talks about the weather, but no one does anything about it.”  A storm is continually brewing around how much to embrace the cloud and where to set limits. As enterprises are turning to the cloud for improved economics, scalability, performance and capacity, the natural shift between embracing cloud and the need for application and workload protection is increasing. How do we safely and securely put the emphasis on application and workload protection in the cloud as we have done on premises? In this session we will talk about: · how you can easily enforce microsegmentation to protect from lateral movement · how learned behaviors are the barometer for creating least privilege access policies · how you can build security borders / fences around your applications protecting your crown jewels Read More

  • How to Simplify Multi-Cloud Security & Compliance

    Organizations are increasingly distributing their operations across multiple public clouds in order to reduce cost, increase resiliency, and optimize services. However, multi-cloud strategies significantly increase complexity for security and governance teams tasked with applying consistent controls and policies across all cloud environments. In this webinar, Deborah Galea discusses the challenges of applying consistent security controls across multiple cloud platforms, as well as practical steps that organizations can take to minimize the complexity and overhead of securing a multi-cloud environment. In this session, you’ll learn Why organizations choose a multi-cloud strategy Security and compliance challenges in multi-cloud environments Recommendations to simplify multi-cloud security Read More

  • Building a Cybersecure Cloud Infrastructure with Validated Digital Identities

    Using cloud and cloud-migration to accelerate business growth and explore new ways to innovate and quickly implement new services emphasizes the need to adopt the mindset of security-by-design and zero trust. Without a solid foundation of cyberprotection, businesses open a gateway for cyberattacks and cybercriminals to cause severe and irreparable damage. The core and foundation of true cybersecurity is validated digital identities (eID): The prerequisite of all other cybersecurity measures. Validated digital identities must be the one and only authorized way to identify and gain access across all user groups, services, and devices. For more than 15 years, Denmark has provided public access to the eID-solution MitID. 3rd. generation is now available delivering one unified system giving both citizens, employees, public authorities, and businesses easy access to validated digital identities. Bjarke Alling has been closely involved in the development of the solution and will share insights into how it is used and how validated digital identities can be implemented. Takeaways: 1.) How the Danish solution for validated digital identities works 2.) What the Danish solution for validates identities gives access to 3.) How to adopt validated digital identities as the foundation of a truly cybersecure cloud infrastructure About the speaker: Bjarke Alling is co-founder and acting Group Managing Director of cybersecurity company Liga. He is a current member and prior co-chair of the National Danish Cyber Security Council, former chair of their IT-security committee, member of the board at The Danish ICT Industry Association (ITB), and member of the board of D-Mærket (D-Seal) Read More

  • Cloud patterns for SAP environments

    Tune into this webinar from DevOps expert Ethan Jewett to learn about distributed cloud patterns for SAP environments, including techniques for secure authentication and identity propagation. This will focus on how to build applications and business logic to extend your SAP environment using cloud technologies, how to expose the data and business logic within your SAP system as services that can be leveraged in cloud environments, as well as how to achieve interoperability between SAP Business Technology Platform (BTP) and hyper-scaler services such as AWS, Azure, and GCP. We’ll cover each of these topics through reference architectures and potential applications. Key Takeaways: - Learn some of the basic of ERP and SAP environments, which are often insulated from the rest of the enterprise. - Understand the challenges of integrating SAP systems and tools into a distributed cloud environment. - Learn techniques for working with SAP-related groups in your organization to merge SAP (and other) applications into your enterprise cloud strategy. - Find out about resources available to support this integration. Read More

  • The Future of Distributed Cloud

    Technology has the power to shape our evolution, and distributed cloud is the technology that will usher us into a new age. Join Paul Miller, Wind River CTO, as he shares how technologists can harness the power of the distributed cloud to succeed in 5G and intelligent edge cloud systems in order to advance our collective future. View the entire session above, or pick and choose the sections you’re most interested in below. Read More