Webinars

Webinars

  • Top Public Cloud Security Fails and How to Avoid Them

    Based on hands-on experiences from a large number of cloud application development projects, Karl has compiled a list of top 5 key security pitfalls that are common across all application types and team sizes. In this session, he will share what these security pitfalls are, why they matter, and how to mitigate them. About the speaker: Karl Ots is a cloud and cybersecurity expert, as well as international speaker and trainer, with a broad range of deep Azure expertise. He believes that secure cloud technologies are the key to successful digital transformation. He applies his passion as Head of Cloud Security at EPAM Systems. Karl has been working with Microsoft Azure since 2011 in a variety of forums ranging from large projects to speaking at largest tech conferences, such as Microsoft Ignite. Karl is a Microsoft Certified Trainer (MCT) and a Certified Information Systems Security Professional (CISSP). He is the author of Azure Security Handbook. Read More

  • The Importance of Cloud Security Education and Awareness

    In this session, the University of Washington's Deveeshree Nayak will cover why cloud security education is so vital. Additionally, this need for awareness spans all facets of educational and working life from K12 schools, universities and businesses across all different industries. Viewers will walk away from this presentation with a greater understanding of: 1. What is cloud security? 2. Why it is so important to understand how cloud security works? 3. How implementation and use of the cloud varies in different industries? 4. Why leaders should take the necessary time and energy to educate everyone on cloud and cloud security whether they are in schools, universities or companies. Read More

  • Cloud Application Security: Best Practices and Vulnerabilities

    In this session, the University of Washington's Deveeshree Nayak will cover the best practices for conducting application security in the cloud as well as the common vulnerabilities cloud-based applications face. Attendees will come away with knowledge of: 1. What is application security in the cloud? 2. The best practices for application security in the cloud? 3. How to identify the potential vulnerabilities facing application in the cloud and preventative measure to take. Read More

  • Implementing Emerging Identity Standards for Better Application Security

    Since the birth of the Internet, it has been missing a layer of identity protocols that define identifiers for people, organizations and things separate from an application, making identity and access management more and more complicated as enterprises are moving to a multi-cloud strategy and face advancing threats from attackers. In the presentation, Kaliya Young, widely known as the Identity Woman, is going to introduce some new and emerging Internet identity standards and technologies, e.g. W3C Verifiable Credentials, W3C Decentralized Identifiers, which can help enterprises improve application security significantly at multiple fronts: • Identity and access management across multiple cloud environments; • Workforce and customer identity and access management; • Information/data security management. Read More

  • Smarketing – Sell Smarter, Not Harder

    Sales and Marketing alignment is nothing new. We know WHY it is a good idea. What has been missing from the conversation is HOW to go about it to make it successful, and WHO needs to be involved to make it sustainable. In this talk, international Sales Acceleration Specialist Peter Strohkorb will outline a series practical steps you can take now to make your Smarketing initiative a success. Read More

  • Transform Struggling Sellers Into Top Performers Using AI Virtual Coaching

    Research shows 84% of buyers say sales reps don’t effectively convey value when selling virtually. Other common mistakes that reps make: not personalizing the conversation, talking too much, and delivering the pitch too early. With virtual selling here to stay, fixing these mistakes is critical. If you don’t, your sales reps won’t hit quota. But you’re only one person, managing several sales reps—all of whom need customized coaching. - How can you improve an individual sales rep’s performance? - How do you gain insight into where reps are falling short and why? - How can you identify where revenue is being won and lost? - How do you coach multiple sellers located in different locations? Conversation Intelligence can help you get the answers to those questions. Join Allego’s Jake Miller to learn how you can use the AI-powered coaching tool to identify skill gaps, pinpoint where revenue is won or lost, prescribe training to fix specific behaviors that lose sales, and keep deals moving through the pipeline. Save your seat today! Read More

  • Better Security with IaC

    One of the most transformative recent shifts within application development in a cloud context is the rise of IaC -- infrastructure as code technologies like Terraform and CloudFormation. As organizations make more use of IaC, it's important for security organizations to pay attention. Why? Because IaC changes the risk equation -- it introduces some new potential risks, and can help close some existing ones. This discussion aims to answer these questions: • Why/how IaC requires thinking about security of assets a new way. • Artifacts produced by IaC and how they can help us. • Security “gotchas” and things to watch out for when changing to IaC. • How you can tailor your security program in light of IaC. Ed Moyle is currently Director of Software and Systems Security for Drake Software. In his 20 years in information security, Ed has held numerous positions including: Director of Thought Leadership and Research for ISACA, Application Security Principal for Adaptive Biotechnologies, Senior Security Strategist with Savvis, Senior Manager with CTG, and Vice President and Information Security Officer for Merrill Lynch Investment Managers. Ed is co-author of Cryptographic Libraries for Developers and Practical Cybersecurity Architecture, and a frequent contributor to the Information Security industry as author, public speaker, and analyst. Read More

  • How virtual selling got a medium enterprise working with global giants

    WhP’s virtual selling journey started at the beginning of 2021. It has enabled WhP to reach new highs in terms of authority and business development, with over 10 new customers signed and 40 prospects in the deal pipeline. In this session, Susy Harrison, Chief Sales & Marketing Officer will share the ingredients of WhP’s successful transformation: Choosing a bold market positioning and shaping it with a rebrand Collaborating closely with the CEO, Sales, Marketing, and our CRM vendor Leveraging the tools of inbound marketing and virtual selling with the new CRM Read More

  • Better Security IaC

    One of the most transformative recent shifts within application development in a cloud context is the rise of IaC -- infrastructure as code technologies like Terraform and CloudFormation. As organizations make more use of IaC, it's important for security organizations to pay attention. Why? Because IaC changes the risk equation -- it introduces some new potential risks, and can help close some existing ones. This discussion aims to answer these questions: • Why/how IaC requires thinking about security of assets a new way. • Artifacts produced by IaC and how they can help us. • Security “gotchas” and things to watch out for when changing to IaC. • How you can tailor your security program in light of IaC. Ed Moyle is currently Director of Software and Systems Security for Drake Software. In his 20 years in information security, Ed has held numerous positions including: Director of Thought Leadership and Research for ISACA, Application Security Principal for Adaptive Biotechnologies, Senior Security Strategist with Savvis, Senior Manager with CTG, and Vice President and Information Security Officer for Merrill Lynch Investment Managers. Ed is co-author of Cryptographic Libraries for Developers and Practical Cybersecurity Architecture, and a frequent contributor to the Information Security industry as author, public speaker, and analyst. Read More