Welcome to the mobile computing community on BrightTALK! With the consumerization of IT and the widespread adoption of mobile devices across the globe, mobile computing has become an important part of many people's lives in a culture of bring your own device (BYOD). With mobile devices doubling as work phones and more employees working from home, businesses need to provide secure access to data and work applications from anywhere at any time. Join this growing community and hear from industry thought leaders in webinars and videos as they share their insight on mobile computing research and trends.
Ransomware was one of the biggest threats facing businesses in 2016 and that trend is expected to continue as we press further into 2017.
As more and more cheap malware becomes available to cyber criminals the sheer amount of ransomware attacks is on the rise.
However, cyber defences are beginning to catch up.
This expert video panel will be discussing the ransomware landscape, what you can do to better protect your business from the threat and steps to take should the worst happen.
BrightTALK caught up with Titania's Ian Whiting for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- How to run a comprehensive pentest to protect your business
- How to get the most from your cyber security budget
- AI & Machine learning and the influence it'll have on the security industry
- The explosion of connected devices on the IoT and where networks are especially vulnerable
The Internet of Things (IoT) has us now counting data elements in the trillions. Collecting, storing, and analyzing this data is transforming business intelligence. However, with this new capability, security is also essential. Teradata offers a best-in-class platform for IoT data processing, storage, and analytics. Together with Thales, the solution address the evolving business intelligence needs of enterprises, while protecting data elements and business intelligence. In this webinar, we will examine the key elements necessary to process IoT data, and the security aspects that enterprises need to focus on to safely harness the power of the technology.
• Examine the realities of IoT data processing and analytics
• Describe the architectures needed to support the capability
• Analyze drivers and technique to secure IoT data elements
As Europe’s electricity power sector evolves and utilities embark on their own digital transformation journeys, traditional IT and industrial OEMs have built out adjacent portfolios to address market demand. This presentation looks at what utilities are doing with key digital technologies, such as analytics, digital marketing, cloud, or IoT, and their operational or business objectives. It also compares the routes to market by different types of ecosystem participants to identify utilities’ challenges.
A hole in the way the global email infrastructure works exposes every business to cyber-criminals. DMARC is a new security protocol that secures your email, protects your clients and improves the deliverability of every email you send.
This webinar will provide you with an overview about the DMARC protocol and the types of attack that it protects against, its email configuration and deliverability benefits and how to protect your business.
Reinforcement Learning (RL) is a field within AI that makes machines learn by trial-and-error. RL systems have improved enormously in the recent years, being able to master games like Space Invaders or Go.
However, we have many challenges ahead: How can we make RL systems that live in the real world, with real people? How can we make sure these systems remain stable and well-behaved?
In this talk we will explore these challenges and suggest a few ways forward to bring useful RL technology to people's daily lives.
In 2016 FireEye observed an increase in the number of advanced targeted attacks leveraged against financial institutions in Europe and the Middle East. Much of the activity involved sophisticated financially motivated attackers targeting poorly defended institutions, and centred on the interbanking messaging system.
Join Mandiant’s live webinar and hear real world experts as they discuss recent interbanking messaging system breaches, what lessons should be learnt, and how to avoid such pitfalls in the future.
Security for a Mobile World. Appthority’s mission is to identify, expose, and eliminate mobile risk to the enterprise. We keep security teams informed, employees productive and enterprise data private and secure.
Join this exclusive Forcepoint™ webcast on the Top 5 Risk Mitigations in a Cloud-First World. As applications and data become cloud-based, IT security professionals must prepare their future architecture and risk management programs for a cloud-first world.
In this webcast we will examine:
The perception that cloud data centers are more secure than legacy data centers
Freedom of data – managing the flow of data from endpoint to Cloud and vice-versa
Cloud security – combining application and data security controls for contextual insight
Access control – policy enforcement with applied monitoring, visibility and analytics
Behavior analysis – how to detect threats from external and inside threats
Join security experts from 451 Research and Forcepoint for an in-depth, interactive discussion on these challenges and more.
Financial Services enterprises and quickly moving into the 21st century and adopting the BYOD, enterprise mobility and mobile workforce mentality. But with this they are unknowingly increasing the risks their companies face, creating thousands of new end-points with the potential for breaches, hacks and compromises.
Mobility teams can manage devices through EMM (Enterprise Mobility Management) software, but these platforms only go so far. Fully securing an environment from the hidden risks embedded deep in applications, and real time threats from compromised network connections and devices are threats that require a new Mobile Threat Defense strategy (as outlined by Gartner) including state of the art automation and machine learning. But how could, and should you implement this - and where do you start?
Join Domingo Guerra, President & Co-Founder of Appthority as he discusses how Fortune 1000 financial services companies are implementing measures to solve their mobile device challenges. In this session Domingo will cover:
- How to gain visibility of your mobile risks
- How leading financial services companies secure mobile use, while maintaining productivity and privacy
- How to get additional value from an existing EMM deployment while adding security coverage.
As cloud, mobility, Big Data, and social business have transformed the role of technology in the enterprise, workers require access to corporate applications, customers, and data through mobile devices.
This shift requires a fundamental change in the way that networks are designed and managed – and while the technical benefits of a digital workplace may be immediately apparent, enterprises want to understand the business value associated with this network transition.
Join us as IDC and Aruba discuss how to transition to a Mobile-First Enterprise, and hear from six customers who have realized the benefits of the digital workplace, including:
•360% five-year ROI
•9 months breakeven point
•2,844 hours additional productive time per 100 users
•77% less unplanned downtime
As a partner in the oneM2M global IoT standards development Partnership, TIA supports its deployment around the world. oneM2M is designed as an architecture and standards platform for IoT deployments in many industry sectors including Smart Cities, Industrial Automation, Home Automation and eHealth and Telemedicine, among others.
Now in its second published release, it is being deployed in a number of projects.
Now in its second published release, it is being tested for resilience as an IoT standard in a number of projects. This webcast will focus on:
• 3 projects such as Korean Smart Cities(Busan, Ilsan) and Wise-IoT which is the Joint European-Korean project.
• In England, U.K.’s oneTRANSPORT intelligent system trial which serves four U.K. counties. This trial involves England’s highways transportation agency and two private sector sensor-network owners over a single, interoperable IoT platform powered by the oneM2M™ standard.
• Overview of oneM2M certification(including background of the need for oneM2M certification program).
• Introduction of Certified Product (Target service and use cases are included per each company).
• An update from the National Institute for Science and Technology (NIST) on its IoT-enabled Smart City Framework and oneM2M smart city collaboration.
Speakers:
-- Ken Figueredo, IoT Strategy Industry Advisor, InterDigital
-- Sookhyun Jeon, Senior Engineer, Telecommunications Technology Association (TTA)
-- JaeSeung Song, Associate Professor, Sejong University and Korea Electronics Technology Institite (KETI)
-- David Wollman, Deputy Director, Smart Grid and Cyber-Physical Systems Program Office NIST
To speak to TIA about oneM2M for further information, contact: Victoria Mitchell, Director, Global Standards Programs, at [email protected].
To learn more about oneM2M, visit: http://www.onem2m.org/
To learn more about oneM2M certification by TTA, visit: http://www.onem2mcert.com/main/main.php
AI ain't a maybe anymore. New payments and mobile commerce conversion strategies are erupting, all in the wake of the impact that AI and bots are having. More than 2.5 billion people worldwide use instant messaging services, and you need to be where your customers are – it's where AI and commerce meet.
Indeed, messaging platforms are revving up to let businesses dive face-first into the buffet of expanded commerce opportunities, letting businesses leverage customized communications like receipts, shipping notifications, and even direct conversations with customer service.
In this interactive VB Live event, we'll dive deep into the latest Bot Insight consumer study to show you why you need to get on board, and take you on a deep dive into how to take a running start, with full C-suite support.
Don't miss out!
In this webinar you'll:
* Dive into the current AI landscape, from free tools to enterprise-class options
* Learn how conversational UI and AI will transform your mobile commerce
* Understand which new platforms are right for your own commerce strategy
* Get the key points to convince your CEO and CFO to put these master class tools in your hands
Speakers:
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Jonathan Jarvis, CEO, Token
* Wendy Schuchart, Moderator, VentureBeat
Cloud apps are being pulled into the enterprise hand-over-fist, with 93% of organizations using cloud-based IT services. But the efficiencies and convenience offered by cloud apps come at a price. While organizations have long been applying two-factor authentication to their network, VPN and email portals, they have failed to extend that same level of security to cloud-based applications, such as Office 365, AWS and Salesforce.
But the need for stronger cloud access security is only part of the story. Businesses looking to scale and increase their cloud adoption find there are other issues to contend with. Visibility into cloud access events and regulatory compliance become challenging to maintain. Helpdesk staff are burdened with password resets, and the most important link in the chain—users—are plagued with password fatigue.
This webinar explains:
•Challenges to greater cloud adoption in the fintech space
•How strong authentication complements access management
•Why cloud access management is critical to an organization’s cloud adoption strategy
Andy Nieto, Healthcare IT Strategist, discusses how secure data exchange can impact patient outcomes by enabling members of a care team to easily exchange information.
Serving public sector constituents efficiently means using today’s digital technologies – cloud services, mobile devices, web portals - to make the services your agencies provide more accessible, responsive and cost effective. But protecting information privacy and maintaining compliance can put the brakes on technology adoption even when new processes are sorely needed.
In this webinar, we will examine how on-demand secure data exchange services can empower government agencies to implement digital workflows using the latest technologies while ensuring trusted security and verifiable compliance for sensitive data:
•Digital technology accelerators
•Security and compliance brakes
•Secure data exchange services solutions
We'll take a look at some real world success stories including:
•Turning a costly background check workflow into a profit center
•Simplified statewide financial reporting workflows
•Secure data collection for sensitive population health reporting
BrightTALK caught up with The IISP's Piers Wison for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- The findings of the IISP Industry Survey
- AI & machine learning in the security sphere
- The steps cyber professionals need to take to prepare for GDPR
- What banks can be doing to remain as protected as possible from cyber criminals
- The growth of IoT networks and their subsequent vulnerabilities
- What to look for when assembling a security team
BrightTALK caught up with The MET's Andrew Gould for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- The rise of Ransomware and what we can be doing to protect ourselves
- The steps that businesses should be taking to prepare for GDPR
- Financial cyber security and what the banks can be doing better to defend against malicious hackers
- Cyber security relations and the future of law enforcement post-Brexit
This short video reviews the DataMotion Identity Validation Service, or IDVS, which provides automated identity proofing using multi-factor authentication.
Consumers want more mobile-friendly financial services, and they want them now -- without any security or privacy compromises. These expectations create tension in the delivery of mobile financial services and apps. What’s the best way to strike a balance between a frictionless mobile experience and the security diligence customers demand?
Learn how to answer this question for your enterprise during a webinar with Ted Eull, NowSecure VP of Risk and Privacy. Ted will apply insights from mobile security engagements with NowSecure customers in the financial services industry, explain best practices, and provide guidance on topics such as:
-- Where do you draw the line between frictionless mobile UX and authentication?
-- What constitutes good two-factor authentication for financial services apps that doesn’t hinder adoption or inconvenience users?
-- How can FFIEC guidance help enterprises develop secure financial services apps?
BrightTALK caught up with Symantec's Tarah Wheeler for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- The ethics of 'hacking back'
- AI & Machine learning and the influence it'll have on security
- Cyber security in the financial sector
- Cyber warfare and the new tactics coming through
- Vulnerabilities in the IoT and what we can do about them
HIPAA compliance. Those words can create a lot of anxiety for hospitals, providers and their business associates - especially when you have to prove you are in compliance. There is good reason for this concern. There is a lot of pressure to demonstrate sound policy and compliance and it can be challenging to do. But it does not have to be.
Whether you are trying to demonstrate compliance yourself or are a vendor with customers who are working to be compliant, this webinar is for you. Join industry experts Chris Apgar, CISSP, and Andy Nieto, Health IT Strategist, for a “how to” session on demonstrating compliance. Topics covered include:
-How to develop a compliance plan
-How to vet potential vendors
-How to audit existing vendors
-Role of data in use and data in motion
-How to document and report
-Checklist for your BAAs
Historically, Information Governance has been a challenge to implement, viewed as a cost with minimal return, and a reactionary, rather than a preventative solution to crisis. Join this first of the two-part live webinar series and learn how to ensure proper information governance is at the heart of your company’s digital transformation. Discover how you can transform the perception of information governance from a gating factor to a digital enabler.
We covered:
- Why information governance is essential to digital transformation
- How to present information governance as an asset and not a cost
- Digital transformation best practices for information professionals
In today's rapidly changing landscape of Virtual Reality, it can be difficult to stay on top of the plethora of technologies and use-cases for this emerging market. Joseph Radak, Course Developer at Udacity and Co-Founder of Eerie Bear Games, will share his insights on how to stay relevant in the world of VR and keep up with consumer demand - not just in gaming, but in other industries like mobile, technology, media, healthcare and more. Joseph will share trends on VR consumption, up-skilling your existing workforce for VR, and finding the right talent that will help your company excel in the rapidly changing landscape of VR.
One of the most frustrating threat innovations of the last decade has been ‘ransomware’ malware. Initially considered just a consumer threat, financial, government and commercial enterprise networks can now be listed among its victims. Carl Leonard, Principal Security Analyst at Forcepoint, examines the technical and business threats that ransomware continues to pose to organizations for which IT security teams must be prepared to address and overcome.
During the session, Carl will discuss the latest on WannaCry, Jaff and Cradlecore as well as examining the concept of “have-a-go” cybercrime. Highlights include:
- Which ransomware should you defend against?
- Should you pay the ransom?
- What can you do to protect your data and network? (research-based)
- How is your organization using the Cloud in a risky way, putting your data more at risk?
About the Presenter:
Carl Leonard is a Principal Security Analyst within Forcepoint’s Security Labs team. He is responsible for enhancing threat protection and threat monitoring technologies at Forcepoint, in collaboration with the company’s global Security Labs teams. Focusing on protecting companies against the latest cyberattacks that can lead to data theft, Carl advises customers on the state of the threat landscape and how to enhance their security posture. Carl is an active international spokesperson and an expert speaker, regularly contributing to externally-facing blogs and research papers. Carl has over 10 years of experience in the security research arena.
The broad adoption of cloud applications has resulted in more and more data assets leaving the corporate perimeter and being stored in the cloud. However, many organizations need to retool their cybersecurity processes, skills, and technology to be ready for the Cloud First Era. This webinar will explore how bring your own key (BYOK) and Key Management as a Service (KMaaS) offers flexible enterprise-class data encryption capabilities to secure cloud-resident data and meet and maintain compliance with industry regulations.
About the presenter:
Doug Cahill is a senior analyst covering cybersecurity at Enterprise Strategy Group drawing upon more than 25 years of industry experience across a broad range of cloud, host, and network-based products and markets.
Prior to joining ESG, Doug held executive leadership positions at security firms Threat Stack and Bit9 where he launched market leading products and forged strategic partnerships. Over the course of his career, Doug has also served in product management, marketing, and business development roles for cybersecurity, storage management, networking, and database vendors, and started his career in IT as a business analyst.
With WannaCry, Ransomware has once again burst onto the scene, reminding us of the need to stay vigilant. Ransomware attacks have continued to grow with security experts estimating that criminals will collect around $1 billion this year.
Join us for this webinar as we discuss WannaCry, its variants and other Ransomware and how you can ensure your people, data and brand are protected.
- The latest attacks, including WannaCry and its variants
- The challenges in combating Ransomware
- Tips and suggestions to mitigate WannaCry and other Ransomware attacks
Half of businesses admit security is their biggest concern to increasing user mobility. Securing enterprise mobility has been an ongoing and arduous topic for IT security professionals. Maintaining high-assurance security, while offering access to company resources to an on-the-go workforce has become a balancing act. So much so, a third of businesses actually prevent employee access to company resources via mobile. This is likely not a long term or sustainable solution to the problem.
So how do you find a compromise that won’t kill your security strategy? There are currently many technologies from derived credentials to mobile PKI. IT professionals are feeling the pressure to find a viable, user friendly, easy-to-deploy and secure options. In this webinar, we will discuss the current solutions in-depth and how they impact your current IT security policies. Attendees will learn more about:
-Software-based security versus hardware-based security
-How this impacts your back-end systems
-Technology such as derived credentials and mobile PKI
-Implementing a mobile PKI solution
With continued improvements in payments security through technologies such as P2PE and EMV, the PCI community has been effective at combating crime in a wide variety of financial institutions, retail environments and enterprises. As the use of stolen or fraudulent cards for in-person card present transactions becomes more difficult, criminals are shifting their focus to online activities. To stay ahead of the bad guys, merchants and institutions need tools that are specifically designed to address these challenges.
There are powerful solutions that enable organizations to securely protect payment transactions and retain control over their consumers’ buying experience, while integrating with existing payment flows. Join us to hear more about proven ways to safeguard sensitive crypto process and protect payment transactions while eliminating the exposure to sensitive cardholder data.
Presenter: Smrithi Konanur
Global Product Manager – Payments, Web, & Mobile, HPE Security – Data Security
Smrithi Konanur has over 14 years of computer software industry experience including more than 7 years of experience in Payment Industry. Her main focus in her current role is providing data security solutions for PCI, P2PE, tokenization, PII, and PHI in different channels like in-store(POS systems), e-commerce/browser-based applications and other mobile applications. Her background ranges from technical product development, management, integration, product management, and product strategy. She holds a Masters in Computer Engineering and multiple management continuing education programs.
As an organization that delivers and protects 15-30% of the world’s web traffic on a daily basis, Akamai is uniquely positioned to observe a large amount of attacks ranging from 20 malicious HTTP requests containing SQL injection to DDoS attacks up to 650 Gbps. Our security experts analyze this information and share trends, observations, and findings in our quarterly State of the Internet / Security Report. We will present this information and associated insights in this webinar series.
In this webinar, you will learn:
• A summary of global findings from the State of the Internet Report
• Attack statistics for APJ
• How IoT botnets have changed the attack topology in APJ
• The responsibilities for security of IoT
Join Akamai and (ISC)² on May 24 (Wed) at 13:00 (Singapore time) for an overview and analysis of traffic and trends from Distributed Denial of Service (DDoS) and web application attacks.
Just one year remains before enforcement of the EU General Data Protection Regulation (GDPR) goes into effect. It’s arguably the most important privacy regulation in a generation. But it’s time to move beyond mere awareness and understanding of what GDPR is, and start making decisions about how you’re going to address it.
In this webinar, join Derek Brink, vice president and research fellow for Aberdeen Group, and Peter Carlisle, EMEA Sales Director for Thales eSecurity, as they share the following helpful insights:
• Short synopsis of the timeline and key provisions of GDPR
• Quantify the business risk of GDPR, in terms of both the likelihood and the business impact of non-compliance
• Summarise the six fundamental strategies for safeguarding sensitive data
• Identify the three most important capabilities for addressing GDPR requirements
Developers and DevOps engineers want to fail fast, iterate, and continuously improve. If security practioners want to join in the fun, they need to integrate security assessments into existing mobile DevOps workflows and toolchains. This webinar will teach security professionals, developers, and DevOps engineers how to avoid common mistakes in embedding automated app security testing into mobile DevOps practices.
Join NowSecure Solutions Engineer Brian Lawrence and Product Marketing Leader Keith Mokris to learn how to do things like:
-- Address DevOps stakeholders' worries and concerns about integrating security testing
-- Determine the right depth of analysis for continuous mobile app security testing
-- Track mobile DevSecOps metrics over time to measure success
You better get good at conversational video marketing, fast—or you're going to be obsolete.
Videos and photos get the most retweets. Last year, Facebook's video viewership doubled from 4 billion views per day to 8 billion views per day in seven months. Google owns YouTube, and coincidentally, rich media is a favorite of the search engine's algorithms.
Conversational videos drive traffic, boost engagement, and serve up information better than any other medium. They promote trust in your brand and your products. They're eminently shareable, potentially viral, and taking over the internet: 74 percent of all Internet traffic in 2017 will be video.
Step up and stand out in every step of the sales funnel with conversational video marketing when you join our latest interactive VB Live event.
By watching this webinar, you'll:
* Optimize your audience takeaways for video content
* Get tips from the savviest sales and marketing people on their video content strategy
* Focus your energy on the right distribution channels for your adverts
* Personalize video content to lock in the close
Speakers:
* Stewart Rogers, Director of Marketing Technology, VentureBeat
More speakers to be announced soon!
On the 1st June, there are just 358 days until the EU GDPR comes into force. At its core, the GDPR aims to put control of personal data back into the hands of EU residents. It regulates how personal data is collected, processed, and managed by organisations.
Businesses have only 358 days left to develop and implement a GDPR compliance roadmap. But what does successful compliance look like? What changes will your organisation have to make to internal processes, and what technologies should your company leverage to ensure that the personal data of EU residents are protected?
Join Adenike Cosgrove, Cybersecurity Strategist at Proofpoint and guest Forrester analyst Enza Iannopollo to discuss:
•The playbook of steps your organisation must implement to drive towards compliance
•How to embed ‘privacy by design’ to your development life cycles
•How to protect all identified EU personal data and prevent data breaches
People remain a wild card to the cyber security of an organisation. Many businesses recognise people as their biggest asset, yet still fail to recognise the need to secure the human element of information security.
In this webinar Steve Durbin, Managing Director of the ISF, tackles the question: How can organisations make people their strongest line of defence against cyber attack?
Digital transformation is impacting the automotive industry thanks to the rise of embedded software, autonomous behavior and hyper connectivity. But connected cars are often mentioned when referring to hacking or security threats and risks. At Frost & Sullivan, we strongly think that connected cars will drastically change the way people interact with vehicles due to the numerous communication technologies and associated services that will be available. Even if security is mandatory to create confidence in connected car usage, real value-added services are also vital for a successful commercial rollout. The My-Car-as-a-Service concept will transform existing car usage in a frictionless experience.
Healthcare security requirements become even more complicated with the move to the cloud. Competing internal priorities, along with numerous cloud apps to control, increase strain on already under-resourced teams. Visibility and control over data can seem almost impossible when it is being stored in locations you do not own or manage.
In this CISO-led webinar, learn about how avoid console overload by consolidating controls with a cloud access security broker platform.
Key topics include:
- Overcoming security dashboard overload when trying to manage authentication, access controls, devices, threats, compliance, malware, DLP, etc
- Healthcare security options to control data in the cloud
- CASB platform and solution overview
Email is the most frequently implemented application in Office 365, and whether you use a cloud or hybrid solution, email needs to be thoroughly secured. A failure to properly encrypt email can lead to loss of intellectual property, breaches of sensitive customer and employee information, and violations of data breach and privacy laws.
Join Michael Osterman of Osterman Research and DataMotion for a
55-minute webinar that reviews the Office 365 environment, the reasons for securing email, and addresses best practices for implementing and using email encryption.
This webinar will address a number of important questions:
• Why worry about encryption in Office 365?
• Why should you encrypt email?
• What are the best practices for securing email in Office 365?
• Is the native Office 365 email encryption your best option for
securing email?
Whether you are just beginning your plans to move to Office 365, or you’re already fully implemented, you need to make sure that your organization is moving data as securely as possible.
As financial service companies battle to build customer loyalty and increase security in the age of FinTech, providing efficient, secure and personal services is a source of competitive advantage. The rapid growth of voice biometrics authentication demonstrates it is a convenient and secure way to authenticate real customers, detect impostors and prevent fraud.
In this webinar, join Interactions and Opus Research as they describe the steps that financial service companies should take to incorporate voice biometrics authentication into the customer care experience.
Topics to be discussed include:
• Identifying Responsibilities and Stakeholders: Contact center, security/risk management, marketing, customer care, IT, and communications infrastructure
• Finding the Budget: Making a business case and finding the budget for voice biometrics authentication
• Best Practices: Engaging Marketing to build customer awareness around voice biometrics
• Preparing for Success: Anticipating the need to scale operations to accommodate new interaction patterns to suit multichannel environments
Sure, you have a beautiful app, but if your load times are too slow and your file sizes are too large, you're leaving money on the table. The mandate is clear: Your mobile game needs to start up in five seconds, or you’ll start to churn players.
It’s a tough balancing act between delivering rich content and letting players enjoy the game without a painful loading screen. And in some countries, speed and minimalism are a must, not a nice-to-have, if you're going to succeed.
We're going to take a deep dive in the best practice for reducing load times across both the mobile web and apps. We'll look at screen load micro-data and how slow load times are killing publishers in the mobile arena.
In this webinar, you'll:
* Identify the best practices for optimizing load times for games with rich content
* Find out the risks are if you fail to optimize load times, including the dangers associated with global reach
* Discover what to do first, and which technologies can help you get there quicker
Speakers:
* Stewart Rogers, Director of Marketing Technology, VentureBeat
More speakers to be announced
Which platforms to support? BYOD, CL or Both? Unlocked or Locked? Cover all employees or just some? What about security? We deal with these questions on a daily basis, so why make the same mistakes as your peers? In this webcast we’ll share pitfalls to avoid and best practices to successfully deploy, manage and secure mobile to initiate transformation and promote growth within your organization.
Your employees are using more cloud apps than ever, and mobile workers frequently work without turning on their VPN. You need new ways to extend protection anywhere your employees work — and you need it to be simple, yet incredibly effective.
Exciting innovations in network security-as-a-service offer distributed organizations the potential to extend and meaningfully increase security effectiveness. Join this 451 Research webinar with Cisco Security to hear a discussion about new cloud-delivered protection for mobile workers, lean branch offices, and cloud applications. We’ll cover the changing market landscape, the emergence of the Secure Internet Gateway, and highlight important buying considerations for companies looking to add these capabilities.
With the growing demands of enterprise outdoor Wi-Fi users, customers’ expectations of outdoor Wi-Fi has gone beyond the basic network connection. Outdoor Wi-Fi deployments for small and large areas are often different and how to improve the user experience while minimizing costs has always been a concern for enterprises.
This webinar will address various outdoor use cases and their most appropriate solution; DreamWorks Animations will share their real-life outdoor deployment experience with the audience, including their unique outdoor Wi-Fi requirements, deployment challenges and their future move to enable an always-on indoor/outdoor Wi-Fi connectivity in the entire work place.
Join us to learn more about the current challenges and benefits of outdoor Wi-Fi and ways to meet the new demands and performance standards.
You can also qualify for a free Aruba access point*
*Terms and Conditions apply
It's 2017 and the digital ad space hasn't stopped growing in size and complexity. Mobile advertisers are seeing increased opportunities for ad placements in apps and messaging platforms, which means more opportunities, but also new marketing challenges—and a major surge in fraud.
Make this the year you stop letting fraudulent bots burn through your budget and start maximizing the power of mobile advertising with must-click messaging. Join our latest live, interactive event for an in-depth look at how to stay in front of your audience, ahead of your competitors, and on top of fraud.
In this webinar you'll:
* Learn what works and what doesn't in 2017's mobile advertising arena
* Mitigate the mobile advertising fraud risk in your own applications
* Create the most engaging mobile advertisements for savvy app patrons
* Use video and 360 advertising to stay abreast of the latest trends in mobile advertising
Speakers:
* Stewart Rogers, Director of Technology, VentureBeat
* Wendy Schuchart, Moderator, VentureBeat
More speakers to be announced?
Want to be a speaker on a VB Live event? Pitch your story at Webinars at VentureBeat Dot Com.
As self-driving vehicles are coming off the production line, automakers are deploying technology to improve the driving experience, from the infotainment system to enhancing brake and fuel efficiency. Yet, adequate cyber security measures still need to catch up. Whether it’s the hacked Jeep or the Nissan Leaf app vulnerability, connected vehicles often fail to implement basic authentication and encryption measures to protect users.
Mike Nelson, VP, Critical Infrastructure at DigiCert will cover the following topics:
- Insight into the state of connected vehicle security and the need for interoperable standards-based solutions.
- How connected device manufacturers are using public key infrastructure (PKI) to provide scalable authentication, encryption and data integrity for the vehicle and its thousands of connected parts.
- Specific steps security teams can take beginning today.
A push notification is a tricky kind of social engagement: it can be a tap on the shoulder, a punch in the face, or water torture. In other words, it can be tremendously successful at driving commerce and engagement, or it could piss your customer off so badly they'll go rip you a new one on Twitter. And we've seen how well that works out for brands.
At the very least, every misstep reduces open rates, strikes a blow against retention and destroys engagement. You want to know how to not be the boor at a cocktail party, because push notifications, one of the most powerful and immediate engagement tools in your arsenal (when you do it right) can garner 2770% higher conversion rates.
Don't be part of the 63 percent of marketers who stumble on the messaging, timing, and frequency of your notification strategy—join this interactive VB Live event.
You'll:
* Discover the one trick to never-fail push notifications everywhere, not just apps
* Drive 2770% higher conversion rates through a specific kind of push notifications
* Learn how to apply behavioral triggered push notifications in your own marketing strategy
* Build better timing into your push notifications to increase conversions
Speakers:
* Stewart Rogers, Director of Marketing Technology for VentureBeat
• Wendy Schuchart, Moderator, VentureBeat
For LTV, engagement, and lifecycle, organic installs blow paid install campaigns out of the water—and they're a lot cheaper. VB Insight analysts report that if you want to boost organic downloads by at least 20 percent—or in some cases double or even triple that rate—you need to get in the ASO game.
ASO basics have been buried alive in the avalanche of new apps, flawed app search, and rapid-fire algorithm changes that aren't always developer friendly. To get the most out of your entire marketing funnel, not just your app store presence, you need to step up your ASO game with these key takeaways from our latest in-depth, Godzilla-sized ASO report.
For report highlights, key best practices and can't-miss ASO insights from super-analyst Stewart Rogers, join our latest interactive VB Live event!
In this webinar you'll:
* Learn why ASO is fundamental to the success of any app
* Familiarize yourself with the pillars of solid ASO strategy
* Leverage technology to increase your lifetime user value
* Think beyond keywords for your search strategies
Speakers:
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Peggy Anne Salz, Chief Analyst, MobileGroove
* Wendy Schuchart, Moderator, VentureBeat