ComputerWeekly.com Research Library

Powered by Bitpipe.com

Multimedia

  • Unlock your transformation to the product operating model

    Sponsored by: Atlassian  | Premiered: Sep 18, 2024

    The push for digital transformation has shifted the way many industries look at their operations and legacy solutions. This is true for product management teams. To do so, some have adopted the product operating model to better cater to their customers and better collaborate. Tune into this webinar to learn more.

  • Empowering Your Cyber Defense: Key Insights into the Latest NIST CSF Update

    Sponsored by: OneTrust  | Premiered: Sep 18, 2024

    In this webcast, you’ll gain key insights into the latest NIST CSF updates and find out how you can leverage the framework to bolster cybersecurity for your organization. Tune in now to unlock best practices for elevating your cyber defense.

  • PCI DSS Compliance: How to scope and streamline monitoring with Certification Automation

    Sponsored by: OneTrust  | Premiered: Sep 17, 2024

    To keep up with the evolution of the compliance landscape, many organizations have taken the necessary steps to better understand and abide by the Payment Card Industry Data Security Standard (PCI DDS). However, maintaining your PCI DDS posture isn’t always easy. Tune into this webinar to learn more.

  • DevOps and DevSecOps Tools That Power The Modern IT Department

    Sponsored by: Keeper Security Inc  | Premiered: Sep 17, 2024

    Privileged access management is an ever-popular cybersecurity strategy built to make it difficult for threat actors to penetrate a network and protect privileged account information. But all solutions evolve, and leaders now expect more from today’s PAM offerings. Explore tools that power the modern IT department in this webinar.

  • Transforming Challenges into Opportunities with Microsoft Dynamics 365 Business Central

    Sponsored by: Be-Terna  | Premiered: Sep 17, 2024

    For small to medium-sized businesses (SMBs), challenges such as managing cash flow, poor data quality for decision-making, and ineffective processes can seem daunting, as if left unaddressed, it can hurt the success of your business. Tune into this video to learn more.

  • Utimaco Explainer Movie

    Sponsored by: Utimaco  | Premiered: Sep 14, 2024

    This brief explainer video breaks down Utimaco’s approach to security, highlighting the strategy and philosophy behind their approach, and how they help secure organizations with on-premises and as-a-service solutions. Watch the full explainer now to learn more.

  • Modernize InfoSec: A Rosetta Stone for Translating Compliance

    Sponsored by: OneTrust  | Premiered: Sep 14, 2024

    90% of respondents to a recent survey indicated that fragmented systems and siloed tools hold back GRC reporting. Tune into this webcast now to learn how you can modernize your InfoSec program and make more risk-informed decisions, including a look at 5 key areas primed for better automation.

  • How to uplevel your product discovery practice

    Sponsored by: Atlassian  | Premiered: Sep 13, 2024

    In this webinar, Head of Product for Jira Product Discovery, Tanguy Crusson, will share the practices his team instilled to build Jira Product Discovery. View your on-demand recording to access a “meta” example of how to uplevel your product discovery practice.

  • Toyota Motor Europe Identity in the Driver's Seat

    Sponsored by: SailPoint Technologies  | Premiered: Sep 13, 2024

    Modern organizations can easily find themselves bogged down by endless IT tickets, and abundant data confusion. Enter identity management. In this webcast, Toyota Motor Europe SailPoint Program Manager, Thomas Rollo, describes Toyota’s identity management journey. Watch to learn more.

  • Groundhog Day, But With Compromised Credentials

    Sponsored by: Cisco  | Premiered: Sep 13, 2024

    According to a recent study, 74% of cybersecurity breaches involve the “human element”. This Cisco webcast explores the problems of today’s identity security, invoking the “Groundhog Day” feeling that many security professionals experience as they witness the same challenges day after day. Watch now to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.