5 Tips in 5 Minutes: Improving B2B Tech Marketing and Sales Strategies in APAC
“5 Tips in 5 Minutes” focuses on improving B2B tech marketing and sales strategies in APAC. In this video series, you will hear from expert speakers from TechTarget and BrightTALK as they share the secrets of what the most successful tech vendors are doing in their approach to webinars, sales follow-up, intent data and more.
Download Now
Automated Secure Offboarding: Mitigating Data Breach & Financial Loss
The great resignation, hybrid workforce and current economic uncertainty have created unprecedented employee turnover. Beyond the business impact, IT and security teams require a more streamlined and effective approach to remove exiting employee and contractor access to applications, cloud resources and sensitive information, as well as to warrant that respective endpoints, licenses and workspace data are appropriately reclaimed, imaged, disposed or transferred.
Given the volume of turnover and the scope of technology, how can organizations ensure secure offboarding process efficacy and operational control? Join Jon Oltsik, senior principal analyst and fellow at Enterprise Strategy Group, and Ramin Ettehad, co-founder of Oomnitza, as they examine the challenges impacting enterprise offboarding efficiency, where to apply best practices and how to enable process automation to mitigate the risk of data breach and financial loss.
This expert/practitioner session examines the issues and operational considerations to modernize secure offboarding capabilities and key business processes from Separation to Recovery. Key topics covered are:
Overcoming operational gaps that yield security, compliance, and financial exposures Mapping offboarding scenarios, policies, technologies and resources, and management systems Automating processes “from separation to recovery” Enabling auditability from deprovisioning and technology reclamation to legal hold, imaging and repurposing Reducing losses due to unclaimed technology assets and inaccurate reuse, refresh, renewal and depreciation data
Watch Now
Why, Where, & How to Automate Audit Readiness & Compliance Validation Processes
ITOps and SecOps use an array of tools and data to mitigate security posture exposures, ensure business resiliency, and protect sensitive data. However, audit readiness and compliance validation remain a top challenge.
Why? Asset intelligence, across the myriad of users, endpoints, applications, networks and cloud infrastructure, is siloed and fragmented. The higher order need to efficiently aggregate, correlate, and analyze the information is impacted by the disjointed data within different divisions, departments and management tools. With increased audit frequency and scope to meet expanding internal, industry and regulated specifications – how can organizations reduce complications, delays and expenditures?
Join Dave Neuman, Advisor and Senior Analyst, TAG Cyber, Ken Pfeil Chief Data Officer, and Jon Davis, CISO at Oomnitza, as they examine the issues impacting audit readiness and compliance validation efficacy and where to apply business process automation to improve audit and compliance efficacy.
This expert / practitioner session reviews the operational considerations and means to modernize audit readiness and compliance validation processes. Key topics covered are: – Overcoming data acquisition and analysis gaps that yield audit and compliance exposures – How to apply ISO and CIS frameworks to facilitate more effective auditing processes – Mapping policies, technologies and controls for monitoring, investigation, resolution and reporting – Automating audit processes “from scoping to evidence generation” that enable repetitive, measurable outcomes – A platform approach to negate incomplete, inaccurate and outdated asset and security data
Watch Now
Utilizing Intelligence-Driven XDR for Threat Hunting
Security teams are constantly on the lookout for the next hack or vulnerability. With today’s adversaries and attacks becoming more sophisticated, the need for a more proactive approach has never been greater. The problem is that most security teams are stretched thin and overwhelmed, chasing alerts and false positives.
Threat hunting is one of the key activities organizations can utilize to proactively identify threats and look for traces of attackers, past and present, within their environment. Unfortunately, most struggle with visibility and collaboration across silos and the prioritization of threat-hunting activities. In addition, they often employ a manual, analyst-centric approach that can be time-consuming and bring fewer results.
In this session, Patrick McNaught, Solutions Architect at Anomali, will introduce how a threat intelligence-driven XDR solution can help accelerate threat-hunting activities as well as demonstrate how The Anomali Platform can help organizations develop an automated threat -hunting workflow in minutes, enabling them to: -Quickly research a threat hunting hypothesis -Look for evidence of attackers -Identify suspected points of a breach for further investigation
Join the session and start proactively hunting threats with threat intel-driven detection and response.
Watch Now
Recession Proof Recruitment Strategy
Want to make sure your recruitment strategy stays strong and efficient during an economic downturn? Join Thad Price, Talroo CEO and Talent Acquisition veteran, to: – Learn how to build an effective recruitment strategy – Discover tips for recruiting in a recession – Get tools for hiring the best people for your company
Watch Now
Prep Your Data for Analytics – Fast, Free and Frictionless
Learn About Informatica Cloud Data Integration-Free Data teams struggle with making data more accessible and reliable. Dealing with these issues eats away at time better spent on customer insights. How do you overcome these challenges to reap the rewards? Find out by watching our on-demand webinar “Prep Your Data for Analytics – Fast, Free and Frictionless.” Hear from our resident data experts about how to: -Combine the best of both ETL and ELT for faster, easier no-code cloud data integration -Make your data more accessible and reliable -See how Informatica’s Cloud Data Integration-Free leads to 50X faster data processing
Watch Now
How to Assess and Protect the Modern SaaS Supply Chain
Recent high-profile breaches at Circle CI, Okta, and Slack reflect a growing trend in attackers targeting enterprise SaaS tools to infiltrate not just the targeted organization’s environment, but that of their customers as well. This new reality requires security teams to expand how they define the modern attack surface, and how they approach monitoring and securing it. In this session, we’ll analyze recent SaaS provider attacks and discuss ways organizations can protect and defend themselves from such threats with greater visibility of their always-changing SaaS attack surface and digital supply chain. About the speaker: Danielle has spent over a decade helping B2B technology companies gain a deep understanding of the challenges faced by IT and security teams in order to keep customer needs at the center of product development. Prior to joining the founding team at Nudge Security, Danielle led product marketing for AT&T Cybersecurity. Her professional experiences span cybersecurity, enterprise networking, telecommunications, and brief, but joyous detours into public radio and environmental sustainability work.
Watch Now
How to Assess and Protect the Modern SaaS Supply Chain
Recent high-profile breaches at Circle CI, Okta, and Slack reflect a growing trend in attackers targeting enterprise SaaS tools to infiltrate not just the targeted organization’s environment, but that of their customers as well. This new reality requires security teams to expand how they define the modern attack surface, and how they approach monitoring and securing it. In this session, we’ll analyze recent SaaS provider attacks and discuss ways organizations can protect and defend themselves from such threats with greater visibility of their always-changing SaaS attack surface and digital supply chain. About the speaker: Danielle has spent over a decade helping B2B technology companies gain a deep understanding of the challenges faced by IT and security teams in order to keep customer needs at the center of product development. Prior to joining the founding team at Nudge Security, Danielle led product marketing for AT&T Cybersecurity. Her professional experiences span cybersecurity, enterprise networking, telecommunications, and brief, but joyous detours into public radio and environmental sustainability work.
Watch Now
Demo: Discover and secure all SaaS apps with Nudge Security
Danielle Russell, Head of Product Marketing at Nudge Security and Garrett Gross, Head of Product at Nudge Security
About this talk
Learn how Nudge Security gives you instant visibility into shadow IT. SaaS applications are making work faster, easier, and more collaborative for teams scattered all over the globe. It’s pretty great…unless you’re the person who has to manage and secure all those apps. Join us for a demo webcast and see how Nudge Security gives you instant visibility into all SaaS and cloud accounts ever created at your organization, along with the ability to nudge employees toward more secure practices. You’ll see how our platform can help you: • Discover all SaaS & cloud accounts • View first user, privileged users, and all users • Audit SSO & MFA status along with OAuth grants • Identify accounts of former employees for deactivation • Review vendor breach histories and get alerted of new incidents
Watch Now
Planes, Trains, and Automobiles
The pandemic was a universal wake-up call and a reminder that a strong travel policy is about more than just cost control.
This whitepaper shares insights from a conversation with Rachel D’Argenio of Ernst & Young, Kathy Nolfo of Huron, and Hansini Sharma of Acquis Consulting Group to build a sustainable travel program.