Automotive Transformation on the Data Superhighway

"Join Grant Bodley for a webinar on Automotive Transformation on the Information Superhighway. Grant is GM of Global Manufacturing Industry Solutions at Hortonworks and will explain:

Forces transforming the automotive industry
Disruptive innovation driven by Big Data and the Connected Car
Open Enterprise Hadoop and the Information Superhighway, and
How automakers are using new data insights to transform their business"
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

What Salesforce Customers Need to Know About China’s Data Security Law

On September 1st of this year, China’s Data Security Law went into effect, including strict guidelines on data residency. Combined with the existing Cybersecurity law and the PIPL regulation to come into effect on November 1st, this creates new requirements for data storage and processing. Companies that do business in China may need to keep some data in China only. This has significant implications for global companies that rely on Salesforce.
Watch Now

Five Phases of Ethical Hacking

GreyCampus

GreyCampus & EC-Council together bring in an informative 1-hour webinar for ethical hacking aspirants. Our subject matter expert will take you through the 5 phases of Ethical Hacking out of the 18 mentioned above. The webinar will follow as per the outline below: Introduction to Ethical Hacking & Career Opportunities. Phases of Ethical Hacking. Phase 1 – Reconnaissance.
Watch Now

Through the Hacker’s Eyes: Detecting Attacks on Fully Patched Windows Machines

IBM

To successfully stop hackers, you need to understand them; how their minds work, what their goals are, and which techniques they use to break through your defenses. In this special edition of QRadar’s Under the Radar technical demo series, NA Security Architect and QRadar expert Jose Bravo will demonstrate first hand the sophisticated ways in which hackers today compromise Windows systems, even when they are fully patched and have antivirus deployments. He will then walk through how QRadar is able to detect these SIE technology-evading attacks, keeping your most vital data safe from unwanted eyes.
Watch Now

Zero Trust: Identity Security

Today’s IT environments must be able to balance strong security principles while ensuring operational efficiencies. Learn how CyberArk fits into a Zero Trust architecture and allows for significant risk reduction and security for both human and non-person entities (RPA, DevSecOps, etc). Leverage privilege identities remotely in a secure, VPN-less, user friendly workflow to ensure security no matter where access is needed from.
Watch Now