Management

Discover the latest collection of talks and videos on Management from industry experts.

Recent talks on Management

The Impact of AI on the CIO Career
Channel Logo

The Impact of AI on the CIO Career

As AI investments surge across large enterprises everywhere, CIOs are facing a new spin on familiar challenges. The rise of "FOMO AI" (Fear of Missing Out
on AI) is driving a renewed focus on issues like business engagement, board influence, team development, and change management. Despite these
challenges, the wave of technological advancement also presents new career opportunities for CIOs at both the executive management and board levels. C…

Detect and Respond to Data Risk with Forcepoint DDR
Channel Logo

Detect and Respond to Data Risk with Forcepoint DDR

Forcepoint Data Detection and Response (DDR). enables continuous data monitoring, so you can spot the warning signs that lead to breaches: Get visibility
into data movement and usage by identifying risky data as it’s created, uncovering high-risk user activity and detecting signs of insider threats before they
happen. Forcepoint DDR delivers: - Comprehensive Monitoring: Continuously detect and log data creation, use and movement both in the cloud and on en…

Your AppSec Assessments Are Wrong, And Why It Matters
Channel Logo

Your AppSec Assessments Are Wrong, And Why It Matters

As software applications grow more complex, so do the security challenges they face. This webinar dives into the critical importance of proper software
vulnerability detection, highlighting how current public vulnerability reporting systems often fall short. We’ll explore why accuracy and timeliness in identifying
and addressing security risks are non-negotiable and demonstrate how free or entry-level tools fail to meet the demands of modern application security. J…

The State of Continuous Controls Monitoring: Your On-Demand Blueprint for GRC Success
Channel Logo

The State of Continuous Controls Monitoring: Your On-Demand Blueprint for GRC Success

We’ve just released the most comprehensive CISO survey ever conducted on GRC automation and future-proofing compliance — and you can access the
insights immediately. Our industry-first State of Continuous Controls Monitoring Report has arrived, featuring critical intelligence gathered from nearly 200
CISOs on the future of GRC. Produced in collaboration with The CISO Society, the report reveals exactly what’s working, what’s failing, and what’s next in G…

Autonomous and Intelligent Data Management for the AI Era
Channel Logo

Autonomous and Intelligent Data Management for the AI Era

How many experienced drivers get behind the wheel and commute to a routine destination without thinking about it? Almost on autopilot, driving becomes
routine, even if it’s not the most ideal mode of transportation. Legacy data storage mirrors manual driving in this way. For instance, legacy storage
architectures are managed separately (how many cars do you pass on the interstate with a single driver?), are complex to maintain, and miscalculations of…

Stay Safe: Managing Employee Access from Cradle to Grave
Channel Logo

Stay Safe: Managing Employee Access from Cradle to Grave

In a world where the vast majority of cyber attacks leverage access-based methods to gain entry to an organization's resources, how can you be sure your
organization remains secure? This session explores best practices for ensuring all employees have the access they need, while ensuring that access is
revoked promptly when they no longer need it. It starts with the reality that most enterprises have grown to large to rely on manual efforts, needing a com…

Navigating the Future of IT Management & Innovation
Channel Logo

Navigating the Future of IT Management & Innovation

IT teams will continue to face unprecedented challenges such as new remote and distributed work models, increased endpoint complexity, a growing talent
gap in IT and automation. On the flip side, there will be plenty of opportunity for IT teams to become a value generator by enabling business transformation
while improving customer experiences and driving business growth with technology. NinjaOne’s Jeff Hunter will dive into the exciting trends for this year an…

How Threat Intelligence Strengthens Third-Party Risk Management
Channel Logo

How Threat Intelligence Strengthens Third-Party Risk Management

Join Ali Marwani as he discusses the vital role of Cyber Threat Intelligence (CTI) in managing third-party risks. This webinar will highlight key strategies for
identifying and mitigating vulnerabilities in your supply chain, ensuring you’re equipped to manage cybersecurity, operational, and compliance risks. Register
now to secure your spot and learn how to bolster your third-party risk management practices.

Coming up next

Security Risks to Consider with AI Integration: AI in DevOps
Channel Logo

Security Risks to Consider with AI Integration: AI in DevOps

In the ever-evolving landscape of DevOps, the paradigm is now shifting - where security is taking the central stage. With vast surface areas including
containers, cloud, repositories and third-party components, cyber threats became more prominent than ever before in DevOps. This presentation will delve
into the evolution from traditional DevOps to the advanced usage of artificial intelligence (AI) technologies to automate and optimize the software develop…

Mastering a VMware to AWS migration: Optimize performance, cut costs, and minimize risks
Channel Logo

Mastering a VMware to AWS migration: Optimize performance, cut costs, and minimize risks

Join LogicMonitor and AWS experts for actionable insights to make your VMware migration seamless, cost-effective, and performance-optimized. Discover
how a hybrid observability platform like LogicMonitor Envision helps CloudOps teams manage VMware migrations, mitigate risks, and optimize on-prem and
cloud environments for maximum efficiency. Key takeaways for CloudOps: - Ensure uninterrupted service availability and gain better control over migration…

Mit KI-Erweiterungen und Vasion Automate elektronische Workflows drastisch beschleunigen
Channel Logo

Mit KI-Erweiterungen und Vasion Automate elektronische Workflows drastisch beschleunigen

Der nächste Schritt der Workflow-Automatisierung In einer Zeit, in der Effizienz und Digitalisierung immer wichtiger werden, zeigt Ihnen dieses Webinar, wie
Sie mit Vasion Automate und innovativen KI-Erweiterungen Ihre elektronischen Workflows auf das nächste Level bringen können. Erfahren Sie, wie Sie
alltägliche Prozesse automatisieren, manuelle Tätigkeiten reduzieren und die Genauigkeit Ihrer Daten steigern können. Lernen Sie praxisnahe Strategien ke…

Learn how AI optimizes security operations and response
Channel Logo

Learn how AI optimizes security operations and response

Don't miss Learn how AI optimizes security operations and response. Our expert speakers will show you how AI can transform your security processes,
providing you with the tools needed to stay ahead of threats. Gain practical insights into optimizing your security strategy with the latest AI advancements,
including: - Optimizing security workflows - Enhancing threat detection - Automating incident response Join us for this must-attend event to optimize your s…

Protecting Your macOS Applications with Apple Signing CSP of Encryption Consulting
Channel Logo

Protecting Your macOS Applications with Apple Signing CSP of Encryption Consulting

In today’s software ecosystem, securing the integrity and authenticity of your code is paramount, especially for macOS applications. This webinar will look
into the critical importance of Apple Signing for all your Mac OS software, tools, updates, utilities, and applications. We will explore how Apple’s stringent
requirements for code signing not only protect end users from malicious software but also ensure compliance with industry standards. Join Riley Dickens, …

Unified Threat Response: Your Journey to an AI-Powered SOC
Channel Logo

Unified Threat Response: Your Journey to an AI-Powered SOC

Many organizations have under-resourced security teams that are tasked with halting increasingly sophisticated threats. GenAI automates tasks, allowing
teams to focus on critical issues and adapt to advanced attacks. Join our upcoming webinar to hear firsthand stories on building an AI-powered SOC. Learn
how to: - Automate routine tasks - Use our AI-driven threat response to adapt and evolve to counter sophisticated threats - Build an AI-powered SOC to u…

Advance your OT Security Posture with Specialized OT Services
Channel Logo

Advance your OT Security Posture with Specialized OT Services

Managing risks within Operational Technology can be challenging with multiple asset types, deployments, use cases, stakeholders and functional
requirements. But when it comes to industrial systems, it is crucial to understand the entire operational technology (OT) environment. This includes the
industrial control systems (ICS), the safety of the people and processes involved and the manufacturing processes. Join this webinar to learn how you can: …

Key Insights from the New LevelBlue Threat Trends Report
Channel Logo

Key Insights from the New LevelBlue Threat Trends Report

Join us for a live webinar on key takeaways from the first edition of LevelBlue’s biannual Threat Trends Report! Hear experts from our security operations and
threat intelligence teams share insights and actionable guidance on threat activity observed in the second half of 2024, including: -Detailed analysis of a new
Phishing-as-a-Service kit from the RaccoonO365 threat group -Review of attacker tactics observed in 12 hands-on-keyboard attacks -Review of the top mal…

Attend Summits on Management

Super Powering the Service Desk in 2022

Super Powering the Service Desk in 2022

IT service desks have traditionally been viewed as a cost center, called upon in times of employee problems. However, advancements in machine learning, AI
and Robotic Process Automation coupled with the shift to hybrid working means that the modern service desk can - and needs to - offer so much more. No…

|7 sessions
Third Party Risk Management for Financial Services

Third Party Risk Management for Financial Services

Financial services are increasingly relying on third-parties to carry out critical elements of their service offerings. By sharing responsibility for services,
companies are increasingly transferring data to facilitate service delivery, which, in turn, leaves them vulnerable to cyber attacks. Join third-party risk mana…

|8 sessions
Driving Innovation & Automation in ITSM

Driving Innovation & Automation in ITSM

ITSM was the unsung hero of 2020 and 2021, helping businesses hold the fort during the switch to remote and then hybrid working. And with Gartner
predicting that IT organizations are set to overspend on ITSM tech by $750m in 2023, it seems that ITSM teams are finally getting their dues. Yet with the se…

|9 sessions
Overcoming Supply Chain Challenges

Overcoming Supply Chain Challenges

Effectively manage the supply chain in a globalized and uncertain business environment with emerging technologies and proven security strategies.

|8 sessions
The Future of ITSM

The Future of ITSM

Stay up to date on the latest trends and technologies in IT service management (ITSM), including AI-driven service management, cloud ITSM solutions, and
IT-style automated workflows for non-IT departments.

|9 sessions
Securing Environments with Identity & Access Management

Securing Environments with Identity & Access Management

IAM is fast becoming a top business priority. With more transactions and services coming online, businesses’ attack surfaces are growing fast. This risk is
exacerbated by the rise of AI in identity-based attacks. Meanwhile, as regulators tighten requirements around protecting identities, getting visibility on user …

|10 sessions

Watch series about Management

Put AI to Work with Strategic Portfolio Management and Enterprise Architecture
34 episodes
Series Company Logo

Put AI to Work with Strategic Portfolio Management and Enterprise Architecture

Maximize your business transformation with strategic portfolio management and enterprise architecture. Align your strategies with workflows to effectively
plan, deliver, and measure value, while leveraging AI Agents to drive automation within ServiceNow.

Watch series

Reduce IT Asset Cost and Risk
48 episodes
Series Company Logo

Reduce IT Asset Cost and Risk

Realize major savings and mitigate asset-related risk with the AI platform for business transformation.

Watch series

CCM Implementation Guidelines v2
15 episodes
Series Company Logo

CCM Implementation Guidelines v2

The Cloud Controls Matrix WG and Shared Security Responsibility Model project teams are creating 17 videos—equal to the number of CCM v4 security
domains—to raise awareness of the CCM implementation guidelines v2.0 and the cloud-shared security responsibility model (SSRM).

Watch series

ServiceNow Cyber & Tech Risk
45 episodes
Series Company Logo

ServiceNow Cyber & Tech Risk

Monitor risk and compliance in real time on an integrated platform. Manage third-party risks and business continuity as you innovate.

Watch series

ITSM Webcast Series
13 episodes
Series Company Logo

ITSM Webcast Series

SolarWinds® Service Desk helps organizations simplify daily IT tasks, better connect with employees, and drive business productivity throughout the
organization with an integrated IT asset management and service management platform.

Watch series

Database Webcast Series
24 episodes
Series Company Logo

Database Webcast Series

Monitor, analyze, diagnose, and optimize database performance and data ops that drive your business-critical applications. Unify on-premises and cloud
database visibility, control, and management with streamlined monitoring, mapping, data lineage, data integration, and tuning across multiple vendors.

Watch series