Webinars

Webinars

  • AI in BI: How to Kickstart Your Adoption Journey

    Theoretically, AI in BI should allow all users within an organization to discern, easy to understand actionable insights that help in attaining business outcomes. Often, lack of definition, standards, defined metrics, alignment to business outcomes, paucity of skilled resources and budgets, poor implementation and hesitancy to adopt AI are among some of the top reasons for failure of AI in projects that showed tremendous promise but did not yield good business outcomes. This discussion explores some critical questions every business must ask before adopting AI and a step-by-step approach for implementing AI. Some key areas of exploration during this session: • Why is AI all around us and what is AI in BI? • What are the benefits of AI in BI? • What does it mean to infuse AI in BI? • How does one successfully implement AI in BI? • How do you drive AI adoption in your business? • What are some key steps to realize the power of AI in BI? This session breaks down some of the complexity of AI in BI, where business can gain deeper insight into their data, using intuitive exploration tools, visualizations, dashboards and other easy-to-comprehend metrics and present a more compelling case to their clients, engaging them through concise, explainable data. Read More

  • Security Issues and Challenges in Machine Learning

    Tune into this webinar to hear University of Washington's Deveeshree Nayak cover the security issues and challenges that may occur due to machine learning software and approaches. Key Takeaways: - Security challenges in the machine learning algorithm; - Best practices to use machine learning products; - Best practices to implement security practices in using AI/ML software. Read More

  • Rethinking Network-Centric Observability for Cloud Security

    Service downtime is more expensive than ever and ensuring consistent access to mission-critical applications and good end-user experience is essential for customer loyalty and employee productivity. Protecting your revenue-generating services and data from security threats and attacks that may stall the business is not a choice. A lot of newer types of attacks emerge from within the network. Businesses must implement a strategy to ensure network-centric security and observability for threat detection and mitigation. Join Andy Idsinga, Sr. Strategic Cloud Architect at cPacket, in this informative talk to learn how to de-risk your IT infrastructure and operations. Learn more about: • Your options to provision a network-centric security and observability practice –i.e., network detection and response (NDR) solution across all three major clouds (Azure, AWS, GCP) • What to expect in your deployment journey and gaining real-time network visibility for vs forensic data for incident response • The key questions and considerations for you and your IT teams in terms of technology and objectives Read More

  • Building Best-In-Class Multi-Cloud Backup Operations

    Bocada’s recently published Backup Monitoring Trends Report highlighted the challenges impacting backup and data protection professionals today, and the key issues they anticipate managing in the future. The report’s themes illuminate the core hurdles backup operators transitioning to cloud or multi-cloud environments must plan for to not just meet, but exceed, data protection guidelines. In this session, we’ll review the report’s findings, and what they mean for building resilient backup environments for years to come. You will learn: - The top issues impacting backup professionals as they migrate to cloud environments - Best practices for mitigating day-to-day cloud backup operations challenges - Trends impacting backup operations in 3-5 years - How to build backup protections to mitigate cloud security threats Speakers: James McDonnell has over ten years' experience working with complex backup environments. As Bocada’s Sr. Systems Engineer, James supports enterprise-scale organizations across the globe to implement automated backup operations and help them meet stringent regulatory guidelines. Laura Troyani is the Principal of PlanBeyond, a market research firm. Laura has spent years leading original research on behalf of IT clients and was the lead on building and fielding the survey for Bocada’s Backup Monitoring Trends Report. Read More

  • Payments Modernization: What Does It Really Mean

    The payments ecosystem is in a state of evolution, with the U.S. moving to adopt faster and real-time payments en masse. To compete with challenger banks and neobanks, banks and credit unions need to deliver tomorrow’s experiences, today with faster payment solutions delivered by scalable RTP technology. But how can financial institutions constrained by inflexible legacy platforms compete? In this webinar, Jim Marous, Co-Publisher, at The Financial Brand and Al Griffin, Principal Solutions Consultant at Alacriti tackle the tough questions surrounding payments modernization and orchestration, why some financial institutions are lagging behind challenger banks and neobanks, and how they can position themselves to compete in the payments landscape. Key Takeaways: What ‘payments modernization’ really means today What challenger banks and neobanks are doing right What do legacy financial institutions need to do today to deliver modern payment solutions Read More

  • Best Practices To Minimize Fraud & Improve Customer Personalization

    Fraud continues to rise year over year. In fact, over 47 percent of Americans experienced financial identity theft in recent years. How can this be? Wide adoption of the highly secure EMV chip on credit and debit cards was supposed to significantly reduce fraud. The problem is that the ‘fraudsters’ are getting smarter, and companies need to respond in kind with more sophisticated solutions. In this webinar, you’ll learn: - How to prevent unexpected costs with fraud that go beyond your bottom line - Prevent damage to your brand and reputation - Why implementing a robust, real-time technology solution to combat fraud can improve your customer360 applications while gaining a competitive advantage - Best practice technology architectures to enable optimal fraud prevention and analytics Read More

  • How Can You Protect What You Can’t See?

    With so much noise about threats and the tool soup of solutions being marketed, where are security teams supposed to focus? There are a bevy of solutions that enable visibility into endpoint and network centric metrics, but what about visibility into your applications, their connections, user interactions, and the network? Applications are often overlooked. In reality, this accidental oversight makes your organization vulnerable. Visibility and understanding of your applications should be at the top of the list for security teams. So how do you get there? Join TrueFort to understand how an application-centric visibility reduces your attack surface through: · Live application behavioral mapping · Proactive attack prevention · Deep forensic timeline & playback · Real-time detection and automated response Read More

  • Beyond MFA: Building a User-Centric Authentication Strategy That Stops Attacks

    Understand the evolving state of the payments industry and see how you can offer better customer experiences with the latest tech practices. In the payments industry, providing “good users” with as frictionless of an experience as possible is a top priority for fraud & identity teams. Alongside fraud metrics, they are measured on new registration/growth numbers, sign-in completion rate, and transaction conversion rate. Yet the strongest authentication options, such as SMS, push notifications, and biometric authentication, to protect against fraud also increase user abandonment. Authentication today can not be one size fits all to meet user needs at various engagement stages and keep up with the latest tactics of ATOs, fake accounts, and abuse. The digital transformation requires a full funnel approach that starts at registration and login pages and works downstream like attackers do. In this session, we’ll explore how to defend against the latest attack tactics while building a user-friendly authentication strategy. Come ready to learn: - How to understand Dark Web techniques, open-source tools, and services fraudsters to deploy ATO and more - How account security measures at the top of the funnel can help optimize a user-friendly payment experience - What a comprehensive authentication journey looks like - How a combination of active and passive authentication can effectively stop attackers while minimizing good user friction Read More

  • Beyond MFA: Building a User-Centric Authentication Strategy That Stops Attacks

    Understand the evolving state of the payments industry and see how you can offer better customer experiences with the latest tech practices. In the payments industry, providing “good users” with as frictionless of an experience as possible is a top priority for fraud & identity teams. Alongside fraud metrics, they are measured on new registration/growth numbers, sign-in completion rate, and transaction conversion rate. Yet the strongest authentication options, such as SMS, push notifications, and biometric authentication, to protect against fraud also increase user abandonment. Authentication today cannot be one size fits all to meet user needs at various engagement stages and keep up with the latest tactics of ATOs, fake accounts, and abuse. The digital transformation requires a full funnel approach that starts at registration and login pages and works downstream like attackers do. In this session, we’ll explore how to defend against the latest attack tactics while building a user-friendly authentication strategy. Come ready to learn: - How to understand Dark Web techniques, open-source tools, and services fraudsters to deploy ATO and more - How account security measures at the top of the funnel can help optimize a user-friendly payment experience - What a comprehensive authentication journey looks like - How a combination of active and passive authentication can effectively stop attackers while minimizing good user friction Read More

  • Top 5 Leadership Strategies for Multi-Cloud Security

    Emerging cloud leaders are seeking industry collaboration, best practices, and insights on how to tame the thorny stems of multi-cloud security. Contending with technology, talent and governance challenges, join NetApp's Jyoti Wadhwa, as she shares how leaders can deploy a proven approach to realize the promises of greater efficiency, lower cost, and real-time security of the cloud. For fellow security practitioners and leaders, she will address both strategic and operational aspects of multi-cloud security ranging on mission critical topics of migrating an organization’s on-premise data center capabilities to developing standardized architectures and leading enterprise-wide adoption. In her discussion, Jyoti will cover 5 leadership strategies to achieve multi-cloud security: 1. Disentangle the Tech. 2. Unify the Cloud Team. 3. Build your Experts. 4. Update Security Governance. 5. Effectively Communicate. Read More