Webinars

Webinars

  • Connect Enablement & Intelligence to Deliver a Personalized Customer Experience

    There is a lot of activity during the buying and selling process. Buyers do their own research by engaging content, competitors, their network, and more. Internally, you have sellers preparing content, getting trained and coached to influence your buyers when they do get that elusive meeting. While these tracks run parallel with a few intersections or sales meetings, this scenario creates a lot of uncertainties that are impacting your ability to deliver a personalized customer experience. Join Nick Thompson (VP, of Product Marketing at Mediafly) to learn how you can connect enablement, activity, and intelligence to gain a 360° of each and every deal. Read More

  • Help! My Insider Threat Program Is Drowning In Alerts!

    According to Forrester, 25% of breaches resulted from internal incidents, and almost half of those were categorized as malicious. Due to current events, insider threats have evolved, and organizations have more to consider than data leaving the organizations and privileged users. Employee stressors, disengagement, and potential attrition pose a serious risk and are challenging for organizations to detect and mitigate. But even considering the risks, an average of only 31% of internal users are currently covered by behavior analytics monitoring solutions, according to the most recent ThoughtLab "Cybersecurity Solutions for a Riskier World" survey. This session will show how Behavior Analytics can be incorporated into an Insider Threat program to reduce the number of alerts and make investigations faster and easier. From simple enrichment of DLP-generated alerts to a new set of use cases to identify risky insider behavior, advanced analytics can expand the efficiency of insider threat programs and boost risk mitigation strategies. Learn how behavior analytics solutions can: - Provide context to alerts generated by DLP solutions - Identify anomalies related to insider threat activity - Accelerate and simplify investigations Read More

  • Supercharging B2B CX with a First Party Data Strategy

    Storm clouds are on the horizon when it comes to how to successfully and securely leverage the power of customer data. What are marketers to do when third-party cookies are no more? First-party data to the rescue! Join Tealium’s Director of Product Marketing, Matt Parisi, in this lively discussion and learn how to: - Apply 3 key mandates to your CX initiatives - Shift your data strategy from third-party to first-party - Leverage key martech to power more comprehensive marketing campaigns Read More

  • Strategic Approach to Managing the Insider Threat

    There are many facets to minimising the risk companies face from insider threats. In this presentation, In this talk, cyber security lead Martin Nash will present a self-styled, strategic risk-based approach to managing the insider threat. This approach is easy to break down, easy to understand and, ultimately, easy to implement. Attendees will come away with the strategic basis for a modular approach to support ongoing and effective risk-based management of the insider threat. Read More

  • Empowering Sales Through Intent

    Your sales team is only as effective as the intelligence at its fingertips. Too many B2B tech sales organizations are leaving money on the table because they lack visibility into account and prospect behavior. Purchase intent data unlocks a world of possibilities for any seller looking to create bigger and better opportunities. By understanding a buyer's digital interactions, sales can craft more relevant outreach, improve targeting, and create deeper long-term connections. This webinar, featuring Forrester Principal Analyst Seth Marrs and TechTarget’s David Pitta, will break down the power of intent data and its potential impact on your entire sales process. Join us to understand: · The latest research on how intent data can fuel sales activity · Tactical applications of intent data for your sales and marketing teams · Use cases on how companies are employing intent data for better sales results Read More

  • The Cyber Threat Landscape: Get Ready for 2023

    The social, economic and technological shifts of the past two years prompted cyber attackers to refine their methods, becoming more sophisticated and aggressive. This resulted in the business community suffering a series of high-profile attacks with far-reaching repercussions. Threat actors continue to exploit vulnerabilities across endpoints and cloud environments, and are ramping up use of stolen identities and credentials to bypass legacy defenses. This panel of security experts will discuss the top threats of the moment and look toward what to expect in the next 12 months. They'll provide best practices and recommendations for security measures that can offer the best level of defense. Join us to learn about: --The most prevalent attacks today --Emerging attacks that will threaten your business tomorrow --How to take a proactive approach to threat detection --How to prepare for continued global disruption Moderated by: Tamara Prazak, Senior Director | Appgate Panelists: Pete Wood, Partner | Naturally Cyber LLP Seema Sewell, Assistant CISO | Office of Enterprise Technology, Maricopa County Greg Kraft, Director- EMEA | OBS Global Ian Goodhart, Director of Security Operations | Maryland Department of Information Technology (DoIT) Read More

  • Growing as a Challenger Brand in a Hot Security Market

    Part of what innovative teams have been working on and maybe the rise of ABM has helped drive is a much closer alignment between sales and marketing on which accounts to go after, which people in them, when and how. And when the teams intersect like this, ideally, the tech should too. In this panel session, John Steinert, CMO of TechTarget talks with Shelley Hofman and Kimberly Foster, Senior Managers of Demand Generation at Orca Security to discuss how they are using audience education, prospect-level intent data and more to better fuel their pipeline, both strategically, tactically and operationally – doing better things and doing them better by connecting the dots across people, process and technology. Read More

  • Building Trusted Digital Experiences with Customer Identity

    Digital Business is here to flourish. It is hard to find an industry or sector in the economy that is not disrupted by software. Right now, businesses are having to deal with a modern, frictionless experience across all channels and the right level of security for their customers and themselves. Okta is identified as a leader in access management by analysts such as Gartner, Forrester, and others. Their success is due to a unique methodology developed over time that can deliver this frictionless experience while still achieving security at scale. In this session, you will learn: - How to achieve this frictionless experience without compromising on security and other business processes and objectives; - How to simplify customer acquisition and access while protecting their sensitive data at the same time with the right customer identity and access management. You can stop identity-driven attacks and engage with users across all channels. - How organisations like JetBlue & Australian Red Cross use identity to create secure, seamless, digital experiences. Read More

  • Re-calibrate Your CISO Strategy

    In this session, we will detail how to re-calibrate your CISO strategy to gain traction in your enterprise domain and change the executive perception to accelerate business. Key Takeaways: • Establish the fundamentals. • Enable a simple message. • Harden your ecosystem. Read More

  • Implementing a Multi-Layered Security Program to Protect & Defend Your Business

    Attackers are trying everything they can to break into your environment. As a result, CISOs need to ensure that they are protecting as much of that environment as possible using people, process, intelligence, and tools and the focus should be in that order. In this discussion, we’ll look these elements and how CISOs can layer them in order to provide the most effective cyber security program. Read More