Recent talks on Management

The Impact of AI on the CIO Career
As AI investments surge across large enterprises everywhere, CIOs are facing a new spin on familiar challenges. The rise of "FOMO AI" (Fear of Missing Out
on AI) is driving a renewed focus on issues like business engagement, board influence, team development, and change management. Despite these
challenges, the wave of technological advancement also presents new career opportunities for CIOs at both the executive management and board levels. C…

Detect and Respond to Data Risk with Forcepoint DDR
Forcepoint Data Detection and Response (DDR). enables continuous data monitoring, so you can spot the warning signs that lead to breaches: Get visibility
into data movement and usage by identifying risky data as it’s created, uncovering high-risk user activity and detecting signs of insider threats before they
happen. Forcepoint DDR delivers: - Comprehensive Monitoring: Continuously detect and log data creation, use and movement both in the cloud and on en…

Your AppSec Assessments Are Wrong, And Why It Matters
As software applications grow more complex, so do the security challenges they face. This webinar dives into the critical importance of proper software
vulnerability detection, highlighting how current public vulnerability reporting systems often fall short. We’ll explore why accuracy and timeliness in identifying
and addressing security risks are non-negotiable and demonstrate how free or entry-level tools fail to meet the demands of modern application security. J…

The State of Continuous Controls Monitoring: Your On-Demand Blueprint for GRC Success
We’ve just released the most comprehensive CISO survey ever conducted on GRC automation and future-proofing compliance — and you can access the
insights immediately. Our industry-first State of Continuous Controls Monitoring Report has arrived, featuring critical intelligence gathered from nearly 200
CISOs on the future of GRC. Produced in collaboration with The CISO Society, the report reveals exactly what’s working, what’s failing, and what’s next in G…

Autonomous and Intelligent Data Management for the AI Era
How many experienced drivers get behind the wheel and commute to a routine destination without thinking about it? Almost on autopilot, driving becomes
routine, even if it’s not the most ideal mode of transportation. Legacy data storage mirrors manual driving in this way. For instance, legacy storage
architectures are managed separately (how many cars do you pass on the interstate with a single driver?), are complex to maintain, and miscalculations of…

Stay Safe: Managing Employee Access from Cradle to Grave
In a world where the vast majority of cyber attacks leverage access-based methods to gain entry to an organization's resources, how can you be sure your
organization remains secure? This session explores best practices for ensuring all employees have the access they need, while ensuring that access is
revoked promptly when they no longer need it. It starts with the reality that most enterprises have grown to large to rely on manual efforts, needing a com…

Navigating the Future of IT Management & Innovation
IT teams will continue to face unprecedented challenges such as new remote and distributed work models, increased endpoint complexity, a growing talent
gap in IT and automation. On the flip side, there will be plenty of opportunity for IT teams to become a value generator by enabling business transformation
while improving customer experiences and driving business growth with technology. NinjaOne’s Jeff Hunter will dive into the exciting trends for this year an…

How Threat Intelligence Strengthens Third-Party Risk Management
Join Ali Marwani as he discusses the vital role of Cyber Threat Intelligence (CTI) in managing third-party risks. This webinar will highlight key strategies for
identifying and mitigating vulnerabilities in your supply chain, ensuring you’re equipped to manage cybersecurity, operational, and compliance risks. Register
now to secure your spot and learn how to bolster your third-party risk management practices.
Coming up next

Security Risks to Consider with AI Integration: AI in DevOps
In the ever-evolving landscape of DevOps, the paradigm is now shifting - where security is taking the central stage. With vast surface areas including
containers, cloud, repositories and third-party components, cyber threats became more prominent than ever before in DevOps. This presentation will delve
into the evolution from traditional DevOps to the advanced usage of artificial intelligence (AI) technologies to automate and optimize the software develop…

Mastering a VMware to AWS migration: Optimize performance, cut costs, and minimize risks
Join LogicMonitor and AWS experts for actionable insights to make your VMware migration seamless, cost-effective, and performance-optimized. Discover
how a hybrid observability platform like LogicMonitor Envision helps CloudOps teams manage VMware migrations, mitigate risks, and optimize on-prem and
cloud environments for maximum efficiency. Key takeaways for CloudOps: - Ensure uninterrupted service availability and gain better control over migration…

Mit KI-Erweiterungen und Vasion Automate elektronische Workflows drastisch beschleunigen
Der nächste Schritt der Workflow-Automatisierung In einer Zeit, in der Effizienz und Digitalisierung immer wichtiger werden, zeigt Ihnen dieses Webinar, wie
Sie mit Vasion Automate und innovativen KI-Erweiterungen Ihre elektronischen Workflows auf das nächste Level bringen können. Erfahren Sie, wie Sie
alltägliche Prozesse automatisieren, manuelle Tätigkeiten reduzieren und die Genauigkeit Ihrer Daten steigern können. Lernen Sie praxisnahe Strategien ke…

Learn how AI optimizes security operations and response
Don't miss Learn how AI optimizes security operations and response. Our expert speakers will show you how AI can transform your security processes,
providing you with the tools needed to stay ahead of threats. Gain practical insights into optimizing your security strategy with the latest AI advancements,
including: - Optimizing security workflows - Enhancing threat detection - Automating incident response Join us for this must-attend event to optimize your s…

Protecting Your macOS Applications with Apple Signing CSP of Encryption Consulting
In today’s software ecosystem, securing the integrity and authenticity of your code is paramount, especially for macOS applications. This webinar will look
into the critical importance of Apple Signing for all your Mac OS software, tools, updates, utilities, and applications. We will explore how Apple’s stringent
requirements for code signing not only protect end users from malicious software but also ensure compliance with industry standards. Join Riley Dickens, …

Unified Threat Response: Your Journey to an AI-Powered SOC
Many organizations have under-resourced security teams that are tasked with halting increasingly sophisticated threats. GenAI automates tasks, allowing
teams to focus on critical issues and adapt to advanced attacks. Join our upcoming webinar to hear firsthand stories on building an AI-powered SOC. Learn
how to: - Automate routine tasks - Use our AI-driven threat response to adapt and evolve to counter sophisticated threats - Build an AI-powered SOC to u…

Advance your OT Security Posture with Specialized OT Services
Managing risks within Operational Technology can be challenging with multiple asset types, deployments, use cases, stakeholders and functional
requirements. But when it comes to industrial systems, it is crucial to understand the entire operational technology (OT) environment. This includes the
industrial control systems (ICS), the safety of the people and processes involved and the manufacturing processes. Join this webinar to learn how you can: …

Key Insights from the New LevelBlue Threat Trends Report
Join us for a live webinar on key takeaways from the first edition of LevelBlue’s biannual Threat Trends Report! Hear experts from our security operations and
threat intelligence teams share insights and actionable guidance on threat activity observed in the second half of 2024, including: -Detailed analysis of a new
Phishing-as-a-Service kit from the RaccoonO365 threat group -Review of attacker tactics observed in 12 hands-on-keyboard attacks -Review of the top mal…
Attend Summits on Management
Super Powering the Service Desk in 2022
IT service desks have traditionally been viewed as a cost center, called upon in times of employee problems. However, advancements in machine learning, AI
and Robotic Process Automation coupled with the shift to hybrid working means that the modern service desk can - and needs to - offer so much more. No…
Third Party Risk Management for Financial Services
Financial services are increasingly relying on third-parties to carry out critical elements of their service offerings. By sharing responsibility for services,
companies are increasingly transferring data to facilitate service delivery, which, in turn, leaves them vulnerable to cyber attacks. Join third-party risk mana…
Driving Innovation & Automation in ITSM
ITSM was the unsung hero of 2020 and 2021, helping businesses hold the fort during the switch to remote and then hybrid working. And with Gartner
predicting that IT organizations are set to overspend on ITSM tech by $750m in 2023, it seems that ITSM teams are finally getting their dues. Yet with the se…
Overcoming Supply Chain Challenges
Effectively manage the supply chain in a globalized and uncertain business environment with emerging technologies and proven security strategies.
The Future of ITSM
Stay up to date on the latest trends and technologies in IT service management (ITSM), including AI-driven service management, cloud ITSM solutions, and
IT-style automated workflows for non-IT departments.
Securing Environments with Identity & Access Management
IAM is fast becoming a top business priority. With more transactions and services coming online, businesses’ attack surfaces are growing fast. This risk is
exacerbated by the rise of AI in identity-based attacks. Meanwhile, as regulators tighten requirements around protecting identities, getting visibility on user …
Watch series about Management
Put AI to Work with Strategic Portfolio Management and Enterprise Architecture
Maximize your business transformation with strategic portfolio management and enterprise architecture. Align your strategies with workflows to effectively
plan, deliver, and measure value, while leveraging AI Agents to drive automation within ServiceNow.
Reduce IT Asset Cost and Risk
Realize major savings and mitigate asset-related risk with the AI platform for business transformation.
CCM Implementation Guidelines v2
The Cloud Controls Matrix WG and Shared Security Responsibility Model project teams are creating 17 videos—equal to the number of CCM v4 security
domains—to raise awareness of the CCM implementation guidelines v2.0 and the cloud-shared security responsibility model (SSRM).

ServiceNow Cyber & Tech Risk
Monitor risk and compliance in real time on an integrated platform. Manage third-party risks and business continuity as you innovate.

ITSM Webcast Series
SolarWinds® Service Desk helps organizations simplify daily IT tasks, better connect with employees, and drive business productivity throughout the
organization with an integrated IT asset management and service management platform.

Database Webcast Series
Monitor, analyze, diagnose, and optimize database performance and data ops that drive your business-critical applications. Unify on-premises and cloud
database visibility, control, and management with streamlined monitoring, mapping, data lineage, data integration, and tuning across multiple vendors.