IoT
Upcoming Webinars
Webinar Archives
Stop Cyber Attacks with Threat Intelligence
Date: Aug 30, 2016
View webinar
In this informative webinar on August 30th you will hear security experts discuss practical ways to use threat intelligence from the web to identify the methods used by online attackers and to ferret out sophisticated attacks that wouldn't be recognized by traditional information security defenses.

The New Decision Makers... Are You Ready?
Date: Aug 30, 2016
View webinar
Millennials know exactly what they want and expectations are high - very high. They are empowered in their personal life and demand the same in business. Because they are always on and always connected, using everything from mobile devices to social networks, Millennials expect each touchpoint to be as productive as any other - especially in business. No exceptions, no excuses. The discerning nature of Millennials challenges every company as they occupy an ever larger share of customer bases and workforces. Join us for this enlightening three-part virtual event, sponsored by Interactive Intelligence, where analysts from Forrester and Frost & Sullivan will aid us in exploring this revolutionary generation through the lens of our customers and employees. Closing out the event, we'll also explore whether technology can become future-proof as an outcome of this digital revolution.

How Predictive Analytics Solves 6 Big Sales & Marketing Challenges
Date: Aug 25, 2016
View webinar
You don't have to be a data scientist to use predictive analytics. Leading sales and marketing teams are using new, easy-to-use predictive analytics solutions to make data-driven decisions every day. This webinar will walk you through how to get started applying predictive analytics to your sales and marketing efforts, and how to solve the 6 big sales and marketing challenges.

A Multilayered Defense for Securing Your Enterprise's Digital Workspace
Date: Aug 25, 2016
View webinar
Client computing is increasingly providing a back door into the enterprise for the compromise and infiltrating of sensitive or valuable information, including patient and customer data, and intellectual property. A holistic security approach that provides real-time, dynamic, and intelligent controls that extend contextual policy from client devices to the datacentre is an enterprise's best defense. Attend this webinar to learn how to deliver a defense-in-depth approach that improves overall security posture, while ensuring the best user experience possible.

Digital Transformation & the 6 Key Trends Shaping Digital Banking
Date: Aug 23, 2016
View webinar


How to Make Security Part of Your Development Process
Date: Aug 18, 2016
View webinar
Secure software development doesn't need to be a conflict between pushy security teams and resistant developers. In this webinar, find out how to enable developers and development teams in making security an easier and more seamless part of the software development lifecycle (SDLC).

Hacker vs. Defender: How Threat Actors Attack Vulnerabilities & How to Defend Against Them
Date: Aug 17, 2016
View webinar
When it comes to cyber security, you'll find there's no shortage of experts with information as to how to prevent breaches from happening. But what does an impending attack look like from a threat actor's perspective? In this enlightening webinar on August 17th you will hear from both sides - hacker vs. defender, exploitation vs. prevention, exfiltration vs. remediation.

Protect Yourself from Antivirus
Date: Aug 17, 2016
View webinar
Traditional antivirus (AV) is not the solution to breach prevention on the endpoint - it's the problem. In fact, conventional AV no longer offers any real security value. To prevent security breaches, you must protect yourself not only from known and unknown cyber threats, but also from the failures of any traditional AV solutions deployed in your environment.

Find Threats That Have Been Lurking in Your Network
Date: Aug 16, 2016
View webinar
Complex threats execute over time and the traditional security solutions model is limited to visibility of the present and immediate past. We should all be demanding tools and solutions that give us the freedom to move along the dimension of time. The ability to look back at your network across time allows you to see security events as they manifest and develop. It gives you a unique perspective to evaluate the seriousness of threats relative to each other. Let's take a look at what your role and day would look like if you could truly see every corner of your network -- real time and retrospectively. A retrospective view provides context and the ability to see today's events with precision and clarity.

[Security Threats] Prioritizing & Responding In Real Time
Date: Aug 16, 2016
View webinar


Pros, Cons, & Considerations to Implementation Approaches
Date: Aug 11, 2016
View webinar
In this webinar, leading industry analyst Zeus Kerravala discusses the pros and cons of various SD-WAN security architectural approaches, and considerations for choosing the best approach for your implementation. Join us and you will get a review of approaches to securing your WAN environments, learn how to build a secure WAN infrastructure with SD-WAN, get an opportunity to have your SD-WAN questions answered.

The State of Ransomware: 2016 Survey Findings
Date: Aug 10, 2016
View webinar
Ransomware has become one of the biggest cyber security threats in the world, with instances of ransomware in exploit kits increasing about 44% in the last six months. According to FBI statistics, hackers extorted business and institutions for more than $209 million in ransomware payments in the first three months of 2016. The business of ransomware is on pace to be a $1 billion a year crime. Join us to learn about the most impacted industries, common attack vectors, and overall impact on businesses.

A Look at Tomorrow's Data Scientist
Date: Aug 09, 2016
View webinar
Join All Analytics Radio on Tuesday, August 9, at 11 am EDT, to discuss how universities, employers, and even students are defining the role and characteristics of tomorrow's data scientist, and how that data scientist can support the analytics initiatives of the corporate world, and to learn more about how your organization can help to develop the data scientists who will help to make your organization a data-driven business.

Register for InformationWeek Newsletters
White Papers
Current Issue
Top IT Trends to Watch in Financial Services
IT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of July 17, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.